]> git.ipfire.org Git - thirdparty/qemu.git/blame - block.c
job: Move completion and cancellation to Job
[thirdparty/qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
e688df6b 24
d38ea87a 25#include "qemu/osdep.h"
0ab8ed18 26#include "block/trace.h"
737e150e
PB
27#include "block/block_int.h"
28#include "block/blockjob.h"
cd7fca95 29#include "block/nbd.h"
d49b6836 30#include "qemu/error-report.h"
88d88798 31#include "module_block.h"
1de7afc9 32#include "qemu/module.h"
e688df6b 33#include "qapi/error.h"
452fcdbc 34#include "qapi/qmp/qdict.h"
7b1b5d19 35#include "qapi/qmp/qjson.h"
e59a0cf1 36#include "qapi/qmp/qnull.h"
fc81fa1e 37#include "qapi/qmp/qstring.h"
e1d74bc6
KW
38#include "qapi/qobject-output-visitor.h"
39#include "qapi/qapi-visit-block-core.h"
bfb197e0 40#include "sysemu/block-backend.h"
9c17d615 41#include "sysemu/sysemu.h"
1de7afc9 42#include "qemu/notify.h"
922a01a0 43#include "qemu/option.h"
10817bf0 44#include "qemu/coroutine.h"
c13163fb 45#include "block/qapi.h"
1de7afc9 46#include "qemu/timer.h"
f348b6d1
VB
47#include "qemu/cutils.h"
48#include "qemu/id.h"
fc01f7e7 49
71e72a19 50#ifdef CONFIG_BSD
7674e7bf 51#include <sys/ioctl.h>
72cf2d4f 52#include <sys/queue.h>
c5e97233 53#ifndef __DragonFly__
7674e7bf
FB
54#include <sys/disk.h>
55#endif
c5e97233 56#endif
7674e7bf 57
49dc768d
AL
58#ifdef _WIN32
59#include <windows.h>
60#endif
61
1c9805a3
SH
62#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
63
dc364f4c
BC
64static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
65 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
66
2c1d04e0
HR
67static QTAILQ_HEAD(, BlockDriverState) all_bdrv_states =
68 QTAILQ_HEAD_INITIALIZER(all_bdrv_states);
69
8a22f02a
SH
70static QLIST_HEAD(, BlockDriver) bdrv_drivers =
71 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 72
5b363937
HR
73static BlockDriverState *bdrv_open_inherit(const char *filename,
74 const char *reference,
75 QDict *options, int flags,
76 BlockDriverState *parent,
77 const BdrvChildRole *child_role,
78 Error **errp);
f3930ed0 79
eb852011
MA
80/* If non-zero, use only whitelisted block drivers */
81static int use_bdrv_whitelist;
82
9e0b22f4
SH
83#ifdef _WIN32
84static int is_windows_drive_prefix(const char *filename)
85{
86 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
87 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
88 filename[1] == ':');
89}
90
91int is_windows_drive(const char *filename)
92{
93 if (is_windows_drive_prefix(filename) &&
94 filename[2] == '\0')
95 return 1;
96 if (strstart(filename, "\\\\.\\", NULL) ||
97 strstart(filename, "//./", NULL))
98 return 1;
99 return 0;
100}
101#endif
102
339064d5
KW
103size_t bdrv_opt_mem_align(BlockDriverState *bs)
104{
105 if (!bs || !bs->drv) {
459b4e66
DL
106 /* page size or 4k (hdd sector size) should be on the safe side */
107 return MAX(4096, getpagesize());
339064d5
KW
108 }
109
110 return bs->bl.opt_mem_alignment;
111}
112
4196d2f0
DL
113size_t bdrv_min_mem_align(BlockDriverState *bs)
114{
115 if (!bs || !bs->drv) {
459b4e66
DL
116 /* page size or 4k (hdd sector size) should be on the safe side */
117 return MAX(4096, getpagesize());
4196d2f0
DL
118 }
119
120 return bs->bl.min_mem_alignment;
121}
122
9e0b22f4 123/* check if the path starts with "<protocol>:" */
5c98415b 124int path_has_protocol(const char *path)
9e0b22f4 125{
947995c0
PB
126 const char *p;
127
9e0b22f4
SH
128#ifdef _WIN32
129 if (is_windows_drive(path) ||
130 is_windows_drive_prefix(path)) {
131 return 0;
132 }
947995c0
PB
133 p = path + strcspn(path, ":/\\");
134#else
135 p = path + strcspn(path, ":/");
9e0b22f4
SH
136#endif
137
947995c0 138 return *p == ':';
9e0b22f4
SH
139}
140
83f64091 141int path_is_absolute(const char *path)
3b0d4f61 142{
21664424
FB
143#ifdef _WIN32
144 /* specific case for names like: "\\.\d:" */
f53f4da9 145 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 146 return 1;
f53f4da9
PB
147 }
148 return (*path == '/' || *path == '\\');
3b9f94e1 149#else
f53f4da9 150 return (*path == '/');
3b9f94e1 151#endif
3b0d4f61
FB
152}
153
83f64091
FB
154/* if filename is absolute, just copy it to dest. Otherwise, build a
155 path to it by considering it is relative to base_path. URL are
156 supported. */
157void path_combine(char *dest, int dest_size,
158 const char *base_path,
159 const char *filename)
3b0d4f61 160{
83f64091
FB
161 const char *p, *p1;
162 int len;
163
164 if (dest_size <= 0)
165 return;
166 if (path_is_absolute(filename)) {
167 pstrcpy(dest, dest_size, filename);
168 } else {
0d54a6fe
HR
169 const char *protocol_stripped = NULL;
170
171 if (path_has_protocol(base_path)) {
172 protocol_stripped = strchr(base_path, ':');
173 if (protocol_stripped) {
174 protocol_stripped++;
175 }
176 }
177 p = protocol_stripped ?: base_path;
178
3b9f94e1
FB
179 p1 = strrchr(base_path, '/');
180#ifdef _WIN32
181 {
182 const char *p2;
183 p2 = strrchr(base_path, '\\');
184 if (!p1 || p2 > p1)
185 p1 = p2;
186 }
187#endif
83f64091
FB
188 if (p1)
189 p1++;
190 else
191 p1 = base_path;
192 if (p1 > p)
193 p = p1;
194 len = p - base_path;
195 if (len > dest_size - 1)
196 len = dest_size - 1;
197 memcpy(dest, base_path, len);
198 dest[len] = '\0';
199 pstrcat(dest, dest_size, filename);
3b0d4f61 200 }
3b0d4f61
FB
201}
202
03c320d8
HR
203/*
204 * Helper function for bdrv_parse_filename() implementations to remove optional
205 * protocol prefixes (especially "file:") from a filename and for putting the
206 * stripped filename into the options QDict if there is such a prefix.
207 */
208void bdrv_parse_filename_strip_prefix(const char *filename, const char *prefix,
209 QDict *options)
210{
211 if (strstart(filename, prefix, &filename)) {
212 /* Stripping the explicit protocol prefix may result in a protocol
213 * prefix being (wrongly) detected (if the filename contains a colon) */
214 if (path_has_protocol(filename)) {
215 QString *fat_filename;
216
217 /* This means there is some colon before the first slash; therefore,
218 * this cannot be an absolute path */
219 assert(!path_is_absolute(filename));
220
221 /* And we can thus fix the protocol detection issue by prefixing it
222 * by "./" */
223 fat_filename = qstring_from_str("./");
224 qstring_append(fat_filename, filename);
225
226 assert(!path_has_protocol(qstring_get_str(fat_filename)));
227
228 qdict_put(options, "filename", fat_filename);
229 } else {
230 /* If no protocol prefix was detected, we can use the shortened
231 * filename as-is */
232 qdict_put_str(options, "filename", filename);
233 }
234 }
235}
236
237
9c5e6594
KW
238/* Returns whether the image file is opened as read-only. Note that this can
239 * return false and writing to the image file is still not possible because the
240 * image is inactivated. */
93ed524e
JC
241bool bdrv_is_read_only(BlockDriverState *bs)
242{
243 return bs->read_only;
244}
245
54a32bfe
KW
246int bdrv_can_set_read_only(BlockDriverState *bs, bool read_only,
247 bool ignore_allow_rdw, Error **errp)
fe5241bf 248{
e2b8247a
JC
249 /* Do not set read_only if copy_on_read is enabled */
250 if (bs->copy_on_read && read_only) {
251 error_setg(errp, "Can't set node '%s' to r/o with copy-on-read enabled",
252 bdrv_get_device_or_node_name(bs));
253 return -EINVAL;
254 }
255
d6fcdf06 256 /* Do not clear read_only if it is prohibited */
54a32bfe
KW
257 if (!read_only && !(bs->open_flags & BDRV_O_ALLOW_RDWR) &&
258 !ignore_allow_rdw)
259 {
d6fcdf06
JC
260 error_setg(errp, "Node '%s' is read only",
261 bdrv_get_device_or_node_name(bs));
262 return -EPERM;
263 }
264
45803a03
JC
265 return 0;
266}
267
398e6ad0
KW
268/* TODO Remove (deprecated since 2.11)
269 * Block drivers are not supposed to automatically change bs->read_only.
270 * Instead, they should just check whether they can provide what the user
271 * explicitly requested and error out if read-write is requested, but they can
272 * only provide read-only access. */
45803a03
JC
273int bdrv_set_read_only(BlockDriverState *bs, bool read_only, Error **errp)
274{
275 int ret = 0;
276
54a32bfe 277 ret = bdrv_can_set_read_only(bs, read_only, false, errp);
45803a03
JC
278 if (ret < 0) {
279 return ret;
280 }
281
fe5241bf 282 bs->read_only = read_only;
e2b8247a 283 return 0;
fe5241bf
JC
284}
285
0a82855a
HR
286void bdrv_get_full_backing_filename_from_filename(const char *backed,
287 const char *backing,
9f07429e
HR
288 char *dest, size_t sz,
289 Error **errp)
dc5a1371 290{
9f07429e
HR
291 if (backing[0] == '\0' || path_has_protocol(backing) ||
292 path_is_absolute(backing))
293 {
0a82855a 294 pstrcpy(dest, sz, backing);
9f07429e
HR
295 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
296 error_setg(errp, "Cannot use relative backing file names for '%s'",
297 backed);
dc5a1371 298 } else {
0a82855a 299 path_combine(dest, sz, backed, backing);
dc5a1371
PB
300 }
301}
302
9f07429e
HR
303void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
304 Error **errp)
0a82855a 305{
9f07429e
HR
306 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
307
308 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
309 dest, sz, errp);
0a82855a
HR
310}
311
0eb7217e
SH
312void bdrv_register(BlockDriver *bdrv)
313{
8a22f02a 314 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 315}
b338082b 316
e4e9986b
MA
317BlockDriverState *bdrv_new(void)
318{
319 BlockDriverState *bs;
320 int i;
321
5839e53b 322 bs = g_new0(BlockDriverState, 1);
e4654d2d 323 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
324 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
325 QLIST_INIT(&bs->op_blockers[i]);
326 }
d616b224 327 notifier_with_return_list_init(&bs->before_write_notifiers);
3783fa3d 328 qemu_co_mutex_init(&bs->reqs_lock);
2119882c 329 qemu_mutex_init(&bs->dirty_bitmap_mutex);
9fcb0251 330 bs->refcnt = 1;
dcd04228 331 bs->aio_context = qemu_get_aio_context();
d7d512f6 332
3ff2f67a
EY
333 qemu_co_queue_init(&bs->flush_queue);
334
2c1d04e0
HR
335 QTAILQ_INSERT_TAIL(&all_bdrv_states, bs, bs_list);
336
b338082b
FB
337 return bs;
338}
339
88d88798 340static BlockDriver *bdrv_do_find_format(const char *format_name)
ea2384d3
FB
341{
342 BlockDriver *drv1;
88d88798 343
8a22f02a
SH
344 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
345 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 346 return drv1;
8a22f02a 347 }
ea2384d3 348 }
88d88798 349
ea2384d3
FB
350 return NULL;
351}
352
88d88798
MM
353BlockDriver *bdrv_find_format(const char *format_name)
354{
355 BlockDriver *drv1;
356 int i;
357
358 drv1 = bdrv_do_find_format(format_name);
359 if (drv1) {
360 return drv1;
361 }
362
363 /* The driver isn't registered, maybe we need to load a module */
364 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); ++i) {
365 if (!strcmp(block_driver_modules[i].format_name, format_name)) {
366 block_module_load_one(block_driver_modules[i].library_name);
367 break;
368 }
369 }
370
371 return bdrv_do_find_format(format_name);
372}
373
e8eb8637 374int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 375{
b64ec4e4
FZ
376 static const char *whitelist_rw[] = {
377 CONFIG_BDRV_RW_WHITELIST
378 };
379 static const char *whitelist_ro[] = {
380 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
381 };
382 const char **p;
383
b64ec4e4 384 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 385 return 1; /* no whitelist, anything goes */
b64ec4e4 386 }
eb852011 387
b64ec4e4 388 for (p = whitelist_rw; *p; p++) {
eb852011
MA
389 if (!strcmp(drv->format_name, *p)) {
390 return 1;
391 }
392 }
b64ec4e4
FZ
393 if (read_only) {
394 for (p = whitelist_ro; *p; p++) {
395 if (!strcmp(drv->format_name, *p)) {
396 return 1;
397 }
398 }
399 }
eb852011
MA
400 return 0;
401}
402
e6ff69bf
DB
403bool bdrv_uses_whitelist(void)
404{
405 return use_bdrv_whitelist;
406}
407
5b7e1542
ZYW
408typedef struct CreateCo {
409 BlockDriver *drv;
410 char *filename;
83d0521a 411 QemuOpts *opts;
5b7e1542 412 int ret;
cc84d90f 413 Error *err;
5b7e1542
ZYW
414} CreateCo;
415
416static void coroutine_fn bdrv_create_co_entry(void *opaque)
417{
cc84d90f
HR
418 Error *local_err = NULL;
419 int ret;
420
5b7e1542
ZYW
421 CreateCo *cco = opaque;
422 assert(cco->drv);
423
efc75e2a 424 ret = cco->drv->bdrv_co_create_opts(cco->filename, cco->opts, &local_err);
621ff94d 425 error_propagate(&cco->err, local_err);
cc84d90f 426 cco->ret = ret;
5b7e1542
ZYW
427}
428
0e7e1989 429int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 430 QemuOpts *opts, Error **errp)
ea2384d3 431{
5b7e1542
ZYW
432 int ret;
433
434 Coroutine *co;
435 CreateCo cco = {
436 .drv = drv,
437 .filename = g_strdup(filename),
83d0521a 438 .opts = opts,
5b7e1542 439 .ret = NOT_DONE,
cc84d90f 440 .err = NULL,
5b7e1542
ZYW
441 };
442
efc75e2a 443 if (!drv->bdrv_co_create_opts) {
cc84d90f 444 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
445 ret = -ENOTSUP;
446 goto out;
5b7e1542
ZYW
447 }
448
449 if (qemu_in_coroutine()) {
450 /* Fast-path if already in coroutine context */
451 bdrv_create_co_entry(&cco);
452 } else {
0b8b8753
PB
453 co = qemu_coroutine_create(bdrv_create_co_entry, &cco);
454 qemu_coroutine_enter(co);
5b7e1542 455 while (cco.ret == NOT_DONE) {
b47ec2c4 456 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
457 }
458 }
459
460 ret = cco.ret;
cc84d90f 461 if (ret < 0) {
84d18f06 462 if (cco.err) {
cc84d90f
HR
463 error_propagate(errp, cco.err);
464 } else {
465 error_setg_errno(errp, -ret, "Could not create image");
466 }
467 }
0e7e1989 468
80168bff
LC
469out:
470 g_free(cco.filename);
5b7e1542 471 return ret;
ea2384d3
FB
472}
473
c282e1fd 474int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
475{
476 BlockDriver *drv;
cc84d90f
HR
477 Error *local_err = NULL;
478 int ret;
84a12e66 479
b65a5e12 480 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 481 if (drv == NULL) {
16905d71 482 return -ENOENT;
84a12e66
CH
483 }
484
c282e1fd 485 ret = bdrv_create(drv, filename, opts, &local_err);
621ff94d 486 error_propagate(errp, local_err);
cc84d90f 487 return ret;
84a12e66
CH
488}
489
892b7de8
ET
490/**
491 * Try to get @bs's logical and physical block size.
492 * On success, store them in @bsz struct and return 0.
493 * On failure return -errno.
494 * @bs must not be empty.
495 */
496int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
497{
498 BlockDriver *drv = bs->drv;
499
500 if (drv && drv->bdrv_probe_blocksizes) {
501 return drv->bdrv_probe_blocksizes(bs, bsz);
5a612c00
MP
502 } else if (drv && drv->is_filter && bs->file) {
503 return bdrv_probe_blocksizes(bs->file->bs, bsz);
892b7de8
ET
504 }
505
506 return -ENOTSUP;
507}
508
509/**
510 * Try to get @bs's geometry (cyls, heads, sectors).
511 * On success, store them in @geo struct and return 0.
512 * On failure return -errno.
513 * @bs must not be empty.
514 */
515int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
516{
517 BlockDriver *drv = bs->drv;
518
519 if (drv && drv->bdrv_probe_geometry) {
520 return drv->bdrv_probe_geometry(bs, geo);
5a612c00
MP
521 } else if (drv && drv->is_filter && bs->file) {
522 return bdrv_probe_geometry(bs->file->bs, geo);
892b7de8
ET
523 }
524
525 return -ENOTSUP;
526}
527
eba25057
JM
528/*
529 * Create a uniquely-named empty temporary file.
530 * Return 0 upon success, otherwise a negative errno value.
531 */
532int get_tmp_filename(char *filename, int size)
d5249393 533{
eba25057 534#ifdef _WIN32
3b9f94e1 535 char temp_dir[MAX_PATH];
eba25057
JM
536 /* GetTempFileName requires that its output buffer (4th param)
537 have length MAX_PATH or greater. */
538 assert(size >= MAX_PATH);
539 return (GetTempPath(MAX_PATH, temp_dir)
540 && GetTempFileName(temp_dir, "qem", 0, filename)
541 ? 0 : -GetLastError());
d5249393 542#else
67b915a5 543 int fd;
7ccfb2eb 544 const char *tmpdir;
0badc1ee 545 tmpdir = getenv("TMPDIR");
69bef793
AS
546 if (!tmpdir) {
547 tmpdir = "/var/tmp";
548 }
eba25057
JM
549 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
550 return -EOVERFLOW;
551 }
ea2384d3 552 fd = mkstemp(filename);
fe235a06
DH
553 if (fd < 0) {
554 return -errno;
555 }
556 if (close(fd) != 0) {
557 unlink(filename);
eba25057
JM
558 return -errno;
559 }
560 return 0;
d5249393 561#endif
eba25057 562}
fc01f7e7 563
84a12e66
CH
564/*
565 * Detect host devices. By convention, /dev/cdrom[N] is always
566 * recognized as a host CDROM.
567 */
568static BlockDriver *find_hdev_driver(const char *filename)
569{
570 int score_max = 0, score;
571 BlockDriver *drv = NULL, *d;
572
573 QLIST_FOREACH(d, &bdrv_drivers, list) {
574 if (d->bdrv_probe_device) {
575 score = d->bdrv_probe_device(filename);
576 if (score > score_max) {
577 score_max = score;
578 drv = d;
579 }
580 }
581 }
582
583 return drv;
584}
585
88d88798
MM
586static BlockDriver *bdrv_do_find_protocol(const char *protocol)
587{
588 BlockDriver *drv1;
589
590 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
591 if (drv1->protocol_name && !strcmp(drv1->protocol_name, protocol)) {
592 return drv1;
593 }
594 }
595
596 return NULL;
597}
598
98289620 599BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
600 bool allow_protocol_prefix,
601 Error **errp)
83f64091
FB
602{
603 BlockDriver *drv1;
604 char protocol[128];
1cec71e3 605 int len;
83f64091 606 const char *p;
88d88798 607 int i;
19cb3738 608
66f82cee
KW
609 /* TODO Drivers without bdrv_file_open must be specified explicitly */
610
39508e7a
CH
611 /*
612 * XXX(hch): we really should not let host device detection
613 * override an explicit protocol specification, but moving this
614 * later breaks access to device names with colons in them.
615 * Thanks to the brain-dead persistent naming schemes on udev-
616 * based Linux systems those actually are quite common.
617 */
618 drv1 = find_hdev_driver(filename);
619 if (drv1) {
620 return drv1;
621 }
622
98289620 623 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 624 return &bdrv_file;
84a12e66 625 }
98289620 626
9e0b22f4
SH
627 p = strchr(filename, ':');
628 assert(p != NULL);
1cec71e3
AL
629 len = p - filename;
630 if (len > sizeof(protocol) - 1)
631 len = sizeof(protocol) - 1;
632 memcpy(protocol, filename, len);
633 protocol[len] = '\0';
88d88798
MM
634
635 drv1 = bdrv_do_find_protocol(protocol);
636 if (drv1) {
637 return drv1;
638 }
639
640 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); ++i) {
641 if (block_driver_modules[i].protocol_name &&
642 !strcmp(block_driver_modules[i].protocol_name, protocol)) {
643 block_module_load_one(block_driver_modules[i].library_name);
644 break;
8a22f02a 645 }
83f64091 646 }
b65a5e12 647
88d88798
MM
648 drv1 = bdrv_do_find_protocol(protocol);
649 if (!drv1) {
650 error_setg(errp, "Unknown protocol '%s'", protocol);
651 }
652 return drv1;
83f64091
FB
653}
654
c6684249
MA
655/*
656 * Guess image format by probing its contents.
657 * This is not a good idea when your image is raw (CVE-2008-2004), but
658 * we do it anyway for backward compatibility.
659 *
660 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
661 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
662 * but can be smaller if the image file is smaller)
c6684249
MA
663 * @filename is its filename.
664 *
665 * For all block drivers, call the bdrv_probe() method to get its
666 * probing score.
667 * Return the first block driver with the highest probing score.
668 */
38f3ef57
KW
669BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
670 const char *filename)
c6684249
MA
671{
672 int score_max = 0, score;
673 BlockDriver *drv = NULL, *d;
674
675 QLIST_FOREACH(d, &bdrv_drivers, list) {
676 if (d->bdrv_probe) {
677 score = d->bdrv_probe(buf, buf_size, filename);
678 if (score > score_max) {
679 score_max = score;
680 drv = d;
681 }
682 }
683 }
684
685 return drv;
686}
687
5696c6e3 688static int find_image_format(BlockBackend *file, const char *filename,
34b5d2c6 689 BlockDriver **pdrv, Error **errp)
f3a5d3f8 690{
c6684249 691 BlockDriver *drv;
7cddd372 692 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 693 int ret = 0;
f8ea0b00 694
08a00559 695 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
5696c6e3 696 if (blk_is_sg(file) || !blk_is_inserted(file) || blk_getlength(file) == 0) {
ef810437 697 *pdrv = &bdrv_raw;
c98ac35d 698 return ret;
1a396859 699 }
f8ea0b00 700
5696c6e3 701 ret = blk_pread(file, 0, buf, sizeof(buf));
83f64091 702 if (ret < 0) {
34b5d2c6
HR
703 error_setg_errno(errp, -ret, "Could not read image for determining its "
704 "format");
c98ac35d
SW
705 *pdrv = NULL;
706 return ret;
83f64091
FB
707 }
708
c6684249 709 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 710 if (!drv) {
34b5d2c6
HR
711 error_setg(errp, "Could not determine image format: No compatible "
712 "driver found");
c98ac35d
SW
713 ret = -ENOENT;
714 }
715 *pdrv = drv;
716 return ret;
ea2384d3
FB
717}
718
51762288
SH
719/**
720 * Set the current 'total_sectors' value
65a9bb25 721 * Return 0 on success, -errno on error.
51762288
SH
722 */
723static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
724{
725 BlockDriver *drv = bs->drv;
726
d470ad42
HR
727 if (!drv) {
728 return -ENOMEDIUM;
729 }
730
396759ad 731 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 732 if (bdrv_is_sg(bs))
396759ad
NB
733 return 0;
734
51762288
SH
735 /* query actual device if possible, otherwise just trust the hint */
736 if (drv->bdrv_getlength) {
737 int64_t length = drv->bdrv_getlength(bs);
738 if (length < 0) {
739 return length;
740 }
7e382003 741 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
742 }
743
744 bs->total_sectors = hint;
745 return 0;
746}
747
cddff5ba
KW
748/**
749 * Combines a QDict of new block driver @options with any missing options taken
750 * from @old_options, so that leaving out an option defaults to its old value.
751 */
752static void bdrv_join_options(BlockDriverState *bs, QDict *options,
753 QDict *old_options)
754{
755 if (bs->drv && bs->drv->bdrv_join_options) {
756 bs->drv->bdrv_join_options(options, old_options);
757 } else {
758 qdict_join(options, old_options, false);
759 }
760}
761
9e8f1835
PB
762/**
763 * Set open flags for a given discard mode
764 *
765 * Return 0 on success, -1 if the discard mode was invalid.
766 */
767int bdrv_parse_discard_flags(const char *mode, int *flags)
768{
769 *flags &= ~BDRV_O_UNMAP;
770
771 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
772 /* do nothing */
773 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
774 *flags |= BDRV_O_UNMAP;
775 } else {
776 return -1;
777 }
778
779 return 0;
780}
781
c3993cdc
SH
782/**
783 * Set open flags for a given cache mode
784 *
785 * Return 0 on success, -1 if the cache mode was invalid.
786 */
53e8ae01 787int bdrv_parse_cache_mode(const char *mode, int *flags, bool *writethrough)
c3993cdc
SH
788{
789 *flags &= ~BDRV_O_CACHE_MASK;
790
791 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
53e8ae01
KW
792 *writethrough = false;
793 *flags |= BDRV_O_NOCACHE;
92196b2f 794 } else if (!strcmp(mode, "directsync")) {
53e8ae01 795 *writethrough = true;
92196b2f 796 *flags |= BDRV_O_NOCACHE;
c3993cdc 797 } else if (!strcmp(mode, "writeback")) {
53e8ae01 798 *writethrough = false;
c3993cdc 799 } else if (!strcmp(mode, "unsafe")) {
53e8ae01 800 *writethrough = false;
c3993cdc
SH
801 *flags |= BDRV_O_NO_FLUSH;
802 } else if (!strcmp(mode, "writethrough")) {
53e8ae01 803 *writethrough = true;
c3993cdc
SH
804 } else {
805 return -1;
806 }
807
808 return 0;
809}
810
b5411555
KW
811static char *bdrv_child_get_parent_desc(BdrvChild *c)
812{
813 BlockDriverState *parent = c->opaque;
814 return g_strdup(bdrv_get_device_or_node_name(parent));
815}
816
20018e12
KW
817static void bdrv_child_cb_drained_begin(BdrvChild *child)
818{
819 BlockDriverState *bs = child->opaque;
820 bdrv_drained_begin(bs);
821}
822
823static void bdrv_child_cb_drained_end(BdrvChild *child)
824{
825 BlockDriverState *bs = child->opaque;
826 bdrv_drained_end(bs);
827}
828
d736f119
KW
829static void bdrv_child_cb_attach(BdrvChild *child)
830{
831 BlockDriverState *bs = child->opaque;
832 bdrv_apply_subtree_drain(child, bs);
833}
834
835static void bdrv_child_cb_detach(BdrvChild *child)
836{
837 BlockDriverState *bs = child->opaque;
838 bdrv_unapply_subtree_drain(child, bs);
839}
840
38701b6a
KW
841static int bdrv_child_cb_inactivate(BdrvChild *child)
842{
843 BlockDriverState *bs = child->opaque;
844 assert(bs->open_flags & BDRV_O_INACTIVE);
845 return 0;
846}
847
b1e6fc08 848/*
73176bee
KW
849 * Returns the options and flags that a temporary snapshot should get, based on
850 * the originally requested flags (the originally requested image will have
851 * flags like a backing file)
b1e6fc08 852 */
73176bee
KW
853static void bdrv_temp_snapshot_options(int *child_flags, QDict *child_options,
854 int parent_flags, QDict *parent_options)
b1e6fc08 855{
73176bee
KW
856 *child_flags = (parent_flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
857
858 /* For temporary files, unconditional cache=unsafe is fine */
73176bee
KW
859 qdict_set_default_str(child_options, BDRV_OPT_CACHE_DIRECT, "off");
860 qdict_set_default_str(child_options, BDRV_OPT_CACHE_NO_FLUSH, "on");
41869044 861
f87a0e29
AG
862 /* Copy the read-only option from the parent */
863 qdict_copy_default(child_options, parent_options, BDRV_OPT_READ_ONLY);
864
41869044
KW
865 /* aio=native doesn't work for cache.direct=off, so disable it for the
866 * temporary snapshot */
867 *child_flags &= ~BDRV_O_NATIVE_AIO;
b1e6fc08
KW
868}
869
0b50cc88 870/*
8e2160e2
KW
871 * Returns the options and flags that bs->file should get if a protocol driver
872 * is expected, based on the given options and flags for the parent BDS
0b50cc88 873 */
8e2160e2
KW
874static void bdrv_inherited_options(int *child_flags, QDict *child_options,
875 int parent_flags, QDict *parent_options)
0b50cc88 876{
8e2160e2
KW
877 int flags = parent_flags;
878
0b50cc88
KW
879 /* Enable protocol handling, disable format probing for bs->file */
880 flags |= BDRV_O_PROTOCOL;
881
91a097e7
KW
882 /* If the cache mode isn't explicitly set, inherit direct and no-flush from
883 * the parent. */
884 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
885 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
5a9347c6 886 qdict_copy_default(child_options, parent_options, BDRV_OPT_FORCE_SHARE);
91a097e7 887
f87a0e29
AG
888 /* Inherit the read-only option from the parent if it's not set */
889 qdict_copy_default(child_options, parent_options, BDRV_OPT_READ_ONLY);
890
0b50cc88 891 /* Our block drivers take care to send flushes and respect unmap policy,
91a097e7
KW
892 * so we can default to enable both on lower layers regardless of the
893 * corresponding parent options. */
818584a4 894 qdict_set_default_str(child_options, BDRV_OPT_DISCARD, "unmap");
0b50cc88 895
0b50cc88 896 /* Clear flags that only apply to the top layer */
abb06c5a
DB
897 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ |
898 BDRV_O_NO_IO);
0b50cc88 899
8e2160e2 900 *child_flags = flags;
0b50cc88
KW
901}
902
f3930ed0 903const BdrvChildRole child_file = {
b5411555 904 .get_parent_desc = bdrv_child_get_parent_desc,
8e2160e2 905 .inherit_options = bdrv_inherited_options,
20018e12
KW
906 .drained_begin = bdrv_child_cb_drained_begin,
907 .drained_end = bdrv_child_cb_drained_end,
d736f119
KW
908 .attach = bdrv_child_cb_attach,
909 .detach = bdrv_child_cb_detach,
38701b6a 910 .inactivate = bdrv_child_cb_inactivate,
f3930ed0
KW
911};
912
913/*
8e2160e2
KW
914 * Returns the options and flags that bs->file should get if the use of formats
915 * (and not only protocols) is permitted for it, based on the given options and
916 * flags for the parent BDS
f3930ed0 917 */
8e2160e2
KW
918static void bdrv_inherited_fmt_options(int *child_flags, QDict *child_options,
919 int parent_flags, QDict *parent_options)
f3930ed0 920{
8e2160e2
KW
921 child_file.inherit_options(child_flags, child_options,
922 parent_flags, parent_options);
923
abb06c5a 924 *child_flags &= ~(BDRV_O_PROTOCOL | BDRV_O_NO_IO);
f3930ed0
KW
925}
926
927const BdrvChildRole child_format = {
b5411555 928 .get_parent_desc = bdrv_child_get_parent_desc,
8e2160e2 929 .inherit_options = bdrv_inherited_fmt_options,
20018e12
KW
930 .drained_begin = bdrv_child_cb_drained_begin,
931 .drained_end = bdrv_child_cb_drained_end,
d736f119
KW
932 .attach = bdrv_child_cb_attach,
933 .detach = bdrv_child_cb_detach,
38701b6a 934 .inactivate = bdrv_child_cb_inactivate,
f3930ed0
KW
935};
936
db95dbba
KW
937static void bdrv_backing_attach(BdrvChild *c)
938{
939 BlockDriverState *parent = c->opaque;
940 BlockDriverState *backing_hd = c->bs;
941
942 assert(!parent->backing_blocker);
943 error_setg(&parent->backing_blocker,
944 "node is used as backing hd of '%s'",
945 bdrv_get_device_or_node_name(parent));
946
947 parent->open_flags &= ~BDRV_O_NO_BACKING;
948 pstrcpy(parent->backing_file, sizeof(parent->backing_file),
949 backing_hd->filename);
950 pstrcpy(parent->backing_format, sizeof(parent->backing_format),
951 backing_hd->drv ? backing_hd->drv->format_name : "");
952
953 bdrv_op_block_all(backing_hd, parent->backing_blocker);
954 /* Otherwise we won't be able to commit or stream */
955 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
956 parent->backing_blocker);
957 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_STREAM,
958 parent->backing_blocker);
959 /*
960 * We do backup in 3 ways:
961 * 1. drive backup
962 * The target bs is new opened, and the source is top BDS
963 * 2. blockdev backup
964 * Both the source and the target are top BDSes.
965 * 3. internal backup(used for block replication)
966 * Both the source and the target are backing file
967 *
968 * In case 1 and 2, neither the source nor the target is the backing file.
969 * In case 3, we will block the top BDS, so there is only one block job
970 * for the top BDS and its backing chain.
971 */
972 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_BACKUP_SOURCE,
973 parent->backing_blocker);
974 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_BACKUP_TARGET,
975 parent->backing_blocker);
d736f119
KW
976
977 bdrv_child_cb_attach(c);
db95dbba
KW
978}
979
980static void bdrv_backing_detach(BdrvChild *c)
981{
982 BlockDriverState *parent = c->opaque;
983
984 assert(parent->backing_blocker);
985 bdrv_op_unblock_all(c->bs, parent->backing_blocker);
986 error_free(parent->backing_blocker);
987 parent->backing_blocker = NULL;
d736f119
KW
988
989 bdrv_child_cb_detach(c);
db95dbba
KW
990}
991
317fc44e 992/*
8e2160e2
KW
993 * Returns the options and flags that bs->backing should get, based on the
994 * given options and flags for the parent BDS
317fc44e 995 */
8e2160e2
KW
996static void bdrv_backing_options(int *child_flags, QDict *child_options,
997 int parent_flags, QDict *parent_options)
317fc44e 998{
8e2160e2
KW
999 int flags = parent_flags;
1000
b8816a43
KW
1001 /* The cache mode is inherited unmodified for backing files; except WCE,
1002 * which is only applied on the top level (BlockBackend) */
91a097e7
KW
1003 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
1004 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
5a9347c6 1005 qdict_copy_default(child_options, parent_options, BDRV_OPT_FORCE_SHARE);
91a097e7 1006
317fc44e 1007 /* backing files always opened read-only */
f87a0e29
AG
1008 qdict_set_default_str(child_options, BDRV_OPT_READ_ONLY, "on");
1009 flags &= ~BDRV_O_COPY_ON_READ;
317fc44e
KW
1010
1011 /* snapshot=on is handled on the top layer */
8bfea15d 1012 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e 1013
8e2160e2 1014 *child_flags = flags;
317fc44e
KW
1015}
1016
6858eba0
KW
1017static int bdrv_backing_update_filename(BdrvChild *c, BlockDriverState *base,
1018 const char *filename, Error **errp)
1019{
1020 BlockDriverState *parent = c->opaque;
61f09cea 1021 int orig_flags = bdrv_get_flags(parent);
6858eba0
KW
1022 int ret;
1023
61f09cea
KW
1024 if (!(orig_flags & BDRV_O_RDWR)) {
1025 ret = bdrv_reopen(parent, orig_flags | BDRV_O_RDWR, errp);
1026 if (ret < 0) {
1027 return ret;
1028 }
1029 }
1030
6858eba0
KW
1031 ret = bdrv_change_backing_file(parent, filename,
1032 base->drv ? base->drv->format_name : "");
1033 if (ret < 0) {
64730694 1034 error_setg_errno(errp, -ret, "Could not update backing file link");
6858eba0
KW
1035 }
1036
61f09cea
KW
1037 if (!(orig_flags & BDRV_O_RDWR)) {
1038 bdrv_reopen(parent, orig_flags, NULL);
1039 }
1040
6858eba0
KW
1041 return ret;
1042}
1043
91ef3825 1044const BdrvChildRole child_backing = {
b5411555 1045 .get_parent_desc = bdrv_child_get_parent_desc,
db95dbba
KW
1046 .attach = bdrv_backing_attach,
1047 .detach = bdrv_backing_detach,
8e2160e2 1048 .inherit_options = bdrv_backing_options,
20018e12
KW
1049 .drained_begin = bdrv_child_cb_drained_begin,
1050 .drained_end = bdrv_child_cb_drained_end,
38701b6a 1051 .inactivate = bdrv_child_cb_inactivate,
6858eba0 1052 .update_filename = bdrv_backing_update_filename,
f3930ed0
KW
1053};
1054
7b272452
KW
1055static int bdrv_open_flags(BlockDriverState *bs, int flags)
1056{
61de4c68 1057 int open_flags = flags;
7b272452
KW
1058
1059 /*
1060 * Clear flags that are internal to the block layer before opening the
1061 * image.
1062 */
20cca275 1063 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
1064
1065 /*
1066 * Snapshots should be writable.
1067 */
8bfea15d 1068 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
1069 open_flags |= BDRV_O_RDWR;
1070 }
1071
1072 return open_flags;
1073}
1074
91a097e7
KW
1075static void update_flags_from_options(int *flags, QemuOpts *opts)
1076{
1077 *flags &= ~BDRV_O_CACHE_MASK;
1078
91a097e7
KW
1079 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_NO_FLUSH));
1080 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_NO_FLUSH, false)) {
1081 *flags |= BDRV_O_NO_FLUSH;
1082 }
1083
1084 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_DIRECT));
1085 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_DIRECT, false)) {
1086 *flags |= BDRV_O_NOCACHE;
1087 }
f87a0e29
AG
1088
1089 *flags &= ~BDRV_O_RDWR;
1090
1091 assert(qemu_opt_find(opts, BDRV_OPT_READ_ONLY));
1092 if (!qemu_opt_get_bool(opts, BDRV_OPT_READ_ONLY, false)) {
1093 *flags |= BDRV_O_RDWR;
1094 }
1095
91a097e7
KW
1096}
1097
1098static void update_options_from_flags(QDict *options, int flags)
1099{
91a097e7 1100 if (!qdict_haskey(options, BDRV_OPT_CACHE_DIRECT)) {
46f5ac20 1101 qdict_put_bool(options, BDRV_OPT_CACHE_DIRECT, flags & BDRV_O_NOCACHE);
91a097e7
KW
1102 }
1103 if (!qdict_haskey(options, BDRV_OPT_CACHE_NO_FLUSH)) {
46f5ac20
EB
1104 qdict_put_bool(options, BDRV_OPT_CACHE_NO_FLUSH,
1105 flags & BDRV_O_NO_FLUSH);
91a097e7 1106 }
f87a0e29 1107 if (!qdict_haskey(options, BDRV_OPT_READ_ONLY)) {
46f5ac20 1108 qdict_put_bool(options, BDRV_OPT_READ_ONLY, !(flags & BDRV_O_RDWR));
f87a0e29 1109 }
91a097e7
KW
1110}
1111
636ea370
KW
1112static void bdrv_assign_node_name(BlockDriverState *bs,
1113 const char *node_name,
1114 Error **errp)
6913c0c2 1115{
15489c76 1116 char *gen_node_name = NULL;
6913c0c2 1117
15489c76
JC
1118 if (!node_name) {
1119 node_name = gen_node_name = id_generate(ID_BLOCK);
1120 } else if (!id_wellformed(node_name)) {
1121 /*
1122 * Check for empty string or invalid characters, but not if it is
1123 * generated (generated names use characters not available to the user)
1124 */
9aebf3b8 1125 error_setg(errp, "Invalid node name");
636ea370 1126 return;
6913c0c2
BC
1127 }
1128
0c5e94ee 1129 /* takes care of avoiding namespaces collisions */
7f06d47e 1130 if (blk_by_name(node_name)) {
0c5e94ee
BC
1131 error_setg(errp, "node-name=%s is conflicting with a device id",
1132 node_name);
15489c76 1133 goto out;
0c5e94ee
BC
1134 }
1135
6913c0c2
BC
1136 /* takes care of avoiding duplicates node names */
1137 if (bdrv_find_node(node_name)) {
1138 error_setg(errp, "Duplicate node name");
15489c76 1139 goto out;
6913c0c2
BC
1140 }
1141
1142 /* copy node name into the bs and insert it into the graph list */
1143 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
1144 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
15489c76
JC
1145out:
1146 g_free(gen_node_name);
6913c0c2
BC
1147}
1148
01a56501
KW
1149static int bdrv_open_driver(BlockDriverState *bs, BlockDriver *drv,
1150 const char *node_name, QDict *options,
1151 int open_flags, Error **errp)
1152{
1153 Error *local_err = NULL;
1154 int ret;
1155
1156 bdrv_assign_node_name(bs, node_name, &local_err);
1157 if (local_err) {
1158 error_propagate(errp, local_err);
1159 return -EINVAL;
1160 }
1161
1162 bs->drv = drv;
680c7f96 1163 bs->read_only = !(bs->open_flags & BDRV_O_RDWR);
01a56501
KW
1164 bs->opaque = g_malloc0(drv->instance_size);
1165
1166 if (drv->bdrv_file_open) {
1167 assert(!drv->bdrv_needs_filename || bs->filename[0]);
1168 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
680c7f96 1169 } else if (drv->bdrv_open) {
01a56501 1170 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
680c7f96
KW
1171 } else {
1172 ret = 0;
01a56501
KW
1173 }
1174
1175 if (ret < 0) {
1176 if (local_err) {
1177 error_propagate(errp, local_err);
1178 } else if (bs->filename[0]) {
1179 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
1180 } else {
1181 error_setg_errno(errp, -ret, "Could not open image");
1182 }
180ca19a 1183 goto open_failed;
01a56501
KW
1184 }
1185
1186 ret = refresh_total_sectors(bs, bs->total_sectors);
1187 if (ret < 0) {
1188 error_setg_errno(errp, -ret, "Could not refresh total sector count");
180ca19a 1189 return ret;
01a56501
KW
1190 }
1191
1192 bdrv_refresh_limits(bs, &local_err);
1193 if (local_err) {
1194 error_propagate(errp, local_err);
180ca19a 1195 return -EINVAL;
01a56501
KW
1196 }
1197
1198 assert(bdrv_opt_mem_align(bs) != 0);
1199 assert(bdrv_min_mem_align(bs) != 0);
1200 assert(is_power_of_2(bs->bl.request_alignment));
1201
1202 return 0;
180ca19a
MP
1203open_failed:
1204 bs->drv = NULL;
1205 if (bs->file != NULL) {
1206 bdrv_unref_child(bs, bs->file);
1207 bs->file = NULL;
1208 }
01a56501
KW
1209 g_free(bs->opaque);
1210 bs->opaque = NULL;
01a56501
KW
1211 return ret;
1212}
1213
680c7f96
KW
1214BlockDriverState *bdrv_new_open_driver(BlockDriver *drv, const char *node_name,
1215 int flags, Error **errp)
1216{
1217 BlockDriverState *bs;
1218 int ret;
1219
1220 bs = bdrv_new();
1221 bs->open_flags = flags;
1222 bs->explicit_options = qdict_new();
1223 bs->options = qdict_new();
1224 bs->opaque = NULL;
1225
1226 update_options_from_flags(bs->options, flags);
1227
1228 ret = bdrv_open_driver(bs, drv, node_name, bs->options, flags, errp);
1229 if (ret < 0) {
cb3e7f08 1230 qobject_unref(bs->explicit_options);
180ca19a 1231 bs->explicit_options = NULL;
cb3e7f08 1232 qobject_unref(bs->options);
180ca19a 1233 bs->options = NULL;
680c7f96
KW
1234 bdrv_unref(bs);
1235 return NULL;
1236 }
1237
1238 return bs;
1239}
1240
c5f3014b 1241QemuOptsList bdrv_runtime_opts = {
18edf289
KW
1242 .name = "bdrv_common",
1243 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
1244 .desc = {
1245 {
1246 .name = "node-name",
1247 .type = QEMU_OPT_STRING,
1248 .help = "Node name of the block device node",
1249 },
62392ebb
KW
1250 {
1251 .name = "driver",
1252 .type = QEMU_OPT_STRING,
1253 .help = "Block driver to use for the node",
1254 },
91a097e7
KW
1255 {
1256 .name = BDRV_OPT_CACHE_DIRECT,
1257 .type = QEMU_OPT_BOOL,
1258 .help = "Bypass software writeback cache on the host",
1259 },
1260 {
1261 .name = BDRV_OPT_CACHE_NO_FLUSH,
1262 .type = QEMU_OPT_BOOL,
1263 .help = "Ignore flush requests",
1264 },
f87a0e29
AG
1265 {
1266 .name = BDRV_OPT_READ_ONLY,
1267 .type = QEMU_OPT_BOOL,
1268 .help = "Node is opened in read-only mode",
1269 },
692e01a2
KW
1270 {
1271 .name = "detect-zeroes",
1272 .type = QEMU_OPT_STRING,
1273 .help = "try to optimize zero writes (off, on, unmap)",
1274 },
818584a4
KW
1275 {
1276 .name = "discard",
1277 .type = QEMU_OPT_STRING,
1278 .help = "discard operation (ignore/off, unmap/on)",
1279 },
5a9347c6
FZ
1280 {
1281 .name = BDRV_OPT_FORCE_SHARE,
1282 .type = QEMU_OPT_BOOL,
1283 .help = "always accept other writers (default: off)",
1284 },
18edf289
KW
1285 { /* end of list */ }
1286 },
1287};
1288
57915332
KW
1289/*
1290 * Common part for opening disk images and files
b6ad491a
KW
1291 *
1292 * Removes all processed options from *options.
57915332 1293 */
5696c6e3 1294static int bdrv_open_common(BlockDriverState *bs, BlockBackend *file,
82dc8b41 1295 QDict *options, Error **errp)
57915332
KW
1296{
1297 int ret, open_flags;
035fccdf 1298 const char *filename;
62392ebb 1299 const char *driver_name = NULL;
6913c0c2 1300 const char *node_name = NULL;
818584a4 1301 const char *discard;
692e01a2 1302 const char *detect_zeroes;
18edf289 1303 QemuOpts *opts;
62392ebb 1304 BlockDriver *drv;
34b5d2c6 1305 Error *local_err = NULL;
57915332 1306
6405875c 1307 assert(bs->file == NULL);
707ff828 1308 assert(options != NULL && bs->options != options);
57915332 1309
62392ebb
KW
1310 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
1311 qemu_opts_absorb_qdict(opts, options, &local_err);
1312 if (local_err) {
1313 error_propagate(errp, local_err);
1314 ret = -EINVAL;
1315 goto fail_opts;
1316 }
1317
9b7e8691
AG
1318 update_flags_from_options(&bs->open_flags, opts);
1319
62392ebb
KW
1320 driver_name = qemu_opt_get(opts, "driver");
1321 drv = bdrv_find_format(driver_name);
1322 assert(drv != NULL);
1323
5a9347c6
FZ
1324 bs->force_share = qemu_opt_get_bool(opts, BDRV_OPT_FORCE_SHARE, false);
1325
1326 if (bs->force_share && (bs->open_flags & BDRV_O_RDWR)) {
1327 error_setg(errp,
1328 BDRV_OPT_FORCE_SHARE
1329 "=on can only be used with read-only images");
1330 ret = -EINVAL;
1331 goto fail_opts;
1332 }
1333
45673671 1334 if (file != NULL) {
5696c6e3 1335 filename = blk_bs(file)->filename;
45673671 1336 } else {
129c7d1c
MA
1337 /*
1338 * Caution: while qdict_get_try_str() is fine, getting
1339 * non-string types would require more care. When @options
1340 * come from -blockdev or blockdev_add, its members are typed
1341 * according to the QAPI schema, but when they come from
1342 * -drive, they're all QString.
1343 */
45673671
KW
1344 filename = qdict_get_try_str(options, "filename");
1345 }
1346
4a008240 1347 if (drv->bdrv_needs_filename && (!filename || !filename[0])) {
765003db
KW
1348 error_setg(errp, "The '%s' block driver requires a file name",
1349 drv->format_name);
18edf289
KW
1350 ret = -EINVAL;
1351 goto fail_opts;
6913c0c2 1352 }
6913c0c2 1353
82dc8b41
KW
1354 trace_bdrv_open_common(bs, filename ?: "", bs->open_flags,
1355 drv->format_name);
62392ebb 1356
82dc8b41 1357 bs->read_only = !(bs->open_flags & BDRV_O_RDWR);
b64ec4e4
FZ
1358
1359 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
1360 error_setg(errp,
1361 !bs->read_only && bdrv_is_whitelisted(drv, true)
1362 ? "Driver '%s' can only be used for read-only devices"
1363 : "Driver '%s' is not whitelisted",
1364 drv->format_name);
18edf289
KW
1365 ret = -ENOTSUP;
1366 goto fail_opts;
b64ec4e4 1367 }
57915332 1368
d3faa13e
PB
1369 /* bdrv_new() and bdrv_close() make it so */
1370 assert(atomic_read(&bs->copy_on_read) == 0);
1371
82dc8b41 1372 if (bs->open_flags & BDRV_O_COPY_ON_READ) {
0ebd24e0
KW
1373 if (!bs->read_only) {
1374 bdrv_enable_copy_on_read(bs);
1375 } else {
1376 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
1377 ret = -EINVAL;
1378 goto fail_opts;
0ebd24e0 1379 }
53fec9d3
SH
1380 }
1381
818584a4
KW
1382 discard = qemu_opt_get(opts, "discard");
1383 if (discard != NULL) {
1384 if (bdrv_parse_discard_flags(discard, &bs->open_flags) != 0) {
1385 error_setg(errp, "Invalid discard option");
1386 ret = -EINVAL;
1387 goto fail_opts;
1388 }
1389 }
1390
692e01a2
KW
1391 detect_zeroes = qemu_opt_get(opts, "detect-zeroes");
1392 if (detect_zeroes) {
1393 BlockdevDetectZeroesOptions value =
f7abe0ec 1394 qapi_enum_parse(&BlockdevDetectZeroesOptions_lookup,
692e01a2 1395 detect_zeroes,
692e01a2
KW
1396 BLOCKDEV_DETECT_ZEROES_OPTIONS_OFF,
1397 &local_err);
1398 if (local_err) {
1399 error_propagate(errp, local_err);
1400 ret = -EINVAL;
1401 goto fail_opts;
1402 }
1403
1404 if (value == BLOCKDEV_DETECT_ZEROES_OPTIONS_UNMAP &&
1405 !(bs->open_flags & BDRV_O_UNMAP))
1406 {
1407 error_setg(errp, "setting detect-zeroes to unmap is not allowed "
1408 "without setting discard operation to unmap");
1409 ret = -EINVAL;
1410 goto fail_opts;
1411 }
1412
1413 bs->detect_zeroes = value;
1414 }
1415
c2ad1b0c
KW
1416 if (filename != NULL) {
1417 pstrcpy(bs->filename, sizeof(bs->filename), filename);
1418 } else {
1419 bs->filename[0] = '\0';
1420 }
91af7014 1421 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 1422
66f82cee 1423 /* Open the image, either directly or using a protocol */
82dc8b41 1424 open_flags = bdrv_open_flags(bs, bs->open_flags);
01a56501 1425 node_name = qemu_opt_get(opts, "node-name");
57915332 1426
01a56501
KW
1427 assert(!drv->bdrv_file_open || file == NULL);
1428 ret = bdrv_open_driver(bs, drv, node_name, options, open_flags, errp);
51762288 1429 if (ret < 0) {
01a56501 1430 goto fail_opts;
3baca891
KW
1431 }
1432
18edf289 1433 qemu_opts_del(opts);
57915332
KW
1434 return 0;
1435
18edf289
KW
1436fail_opts:
1437 qemu_opts_del(opts);
57915332
KW
1438 return ret;
1439}
1440
5e5c4f63
KW
1441static QDict *parse_json_filename(const char *filename, Error **errp)
1442{
1443 QObject *options_obj;
1444 QDict *options;
1445 int ret;
1446
1447 ret = strstart(filename, "json:", &filename);
1448 assert(ret);
1449
5577fff7 1450 options_obj = qobject_from_json(filename, errp);
5e5c4f63 1451 if (!options_obj) {
5577fff7
MA
1452 /* Work around qobject_from_json() lossage TODO fix that */
1453 if (errp && !*errp) {
1454 error_setg(errp, "Could not parse the JSON options");
1455 return NULL;
1456 }
1457 error_prepend(errp, "Could not parse the JSON options: ");
5e5c4f63
KW
1458 return NULL;
1459 }
1460
7dc847eb 1461 options = qobject_to(QDict, options_obj);
ca6b6e1e 1462 if (!options) {
cb3e7f08 1463 qobject_unref(options_obj);
5e5c4f63
KW
1464 error_setg(errp, "Invalid JSON object given");
1465 return NULL;
1466 }
1467
5e5c4f63
KW
1468 qdict_flatten(options);
1469
1470 return options;
1471}
1472
de3b53f0
KW
1473static void parse_json_protocol(QDict *options, const char **pfilename,
1474 Error **errp)
1475{
1476 QDict *json_options;
1477 Error *local_err = NULL;
1478
1479 /* Parse json: pseudo-protocol */
1480 if (!*pfilename || !g_str_has_prefix(*pfilename, "json:")) {
1481 return;
1482 }
1483
1484 json_options = parse_json_filename(*pfilename, &local_err);
1485 if (local_err) {
1486 error_propagate(errp, local_err);
1487 return;
1488 }
1489
1490 /* Options given in the filename have lower priority than options
1491 * specified directly */
1492 qdict_join(options, json_options, false);
cb3e7f08 1493 qobject_unref(json_options);
de3b53f0
KW
1494 *pfilename = NULL;
1495}
1496
b6ce07aa 1497/*
f54120ff
KW
1498 * Fills in default options for opening images and converts the legacy
1499 * filename/flags pair to option QDict entries.
53a29513
HR
1500 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
1501 * block driver has been specified explicitly.
b6ce07aa 1502 */
de3b53f0 1503static int bdrv_fill_options(QDict **options, const char *filename,
053e1578 1504 int *flags, Error **errp)
ea2384d3 1505{
c2ad1b0c 1506 const char *drvname;
53a29513 1507 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 1508 bool parse_filename = false;
053e1578 1509 BlockDriver *drv = NULL;
34b5d2c6 1510 Error *local_err = NULL;
83f64091 1511
129c7d1c
MA
1512 /*
1513 * Caution: while qdict_get_try_str() is fine, getting non-string
1514 * types would require more care. When @options come from
1515 * -blockdev or blockdev_add, its members are typed according to
1516 * the QAPI schema, but when they come from -drive, they're all
1517 * QString.
1518 */
53a29513 1519 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1520 if (drvname) {
1521 drv = bdrv_find_format(drvname);
1522 if (!drv) {
1523 error_setg(errp, "Unknown driver '%s'", drvname);
1524 return -ENOENT;
1525 }
1526 /* If the user has explicitly specified the driver, this choice should
1527 * override the BDRV_O_PROTOCOL flag */
1528 protocol = drv->bdrv_file_open;
53a29513
HR
1529 }
1530
1531 if (protocol) {
1532 *flags |= BDRV_O_PROTOCOL;
1533 } else {
1534 *flags &= ~BDRV_O_PROTOCOL;
1535 }
1536
91a097e7
KW
1537 /* Translate cache options from flags into options */
1538 update_options_from_flags(*options, *flags);
1539
035fccdf 1540 /* Fetch the file name from the options QDict if necessary */
17b005f1 1541 if (protocol && filename) {
f54120ff 1542 if (!qdict_haskey(*options, "filename")) {
46f5ac20 1543 qdict_put_str(*options, "filename", filename);
f54120ff
KW
1544 parse_filename = true;
1545 } else {
1546 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1547 "the same time");
1548 return -EINVAL;
1549 }
035fccdf
KW
1550 }
1551
c2ad1b0c 1552 /* Find the right block driver */
129c7d1c 1553 /* See cautionary note on accessing @options above */
f54120ff 1554 filename = qdict_get_try_str(*options, "filename");
f54120ff 1555
053e1578
HR
1556 if (!drvname && protocol) {
1557 if (filename) {
1558 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1559 if (!drv) {
053e1578 1560 return -EINVAL;
17b005f1 1561 }
053e1578
HR
1562
1563 drvname = drv->format_name;
46f5ac20 1564 qdict_put_str(*options, "driver", drvname);
053e1578
HR
1565 } else {
1566 error_setg(errp, "Must specify either driver or file");
1567 return -EINVAL;
98289620 1568 }
c2ad1b0c
KW
1569 }
1570
17b005f1 1571 assert(drv || !protocol);
c2ad1b0c 1572
f54120ff 1573 /* Driver-specific filename parsing */
17b005f1 1574 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1575 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1576 if (local_err) {
34b5d2c6 1577 error_propagate(errp, local_err);
f54120ff 1578 return -EINVAL;
6963a30d 1579 }
cd5d031e
HR
1580
1581 if (!drv->bdrv_needs_filename) {
1582 qdict_del(*options, "filename");
cd5d031e 1583 }
6963a30d
KW
1584 }
1585
f54120ff
KW
1586 return 0;
1587}
1588
3121fb45
KW
1589static int bdrv_child_check_perm(BdrvChild *c, BlockReopenQueue *q,
1590 uint64_t perm, uint64_t shared,
c1cef672
FZ
1591 GSList *ignore_children, Error **errp);
1592static void bdrv_child_abort_perm_update(BdrvChild *c);
1593static void bdrv_child_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared);
1594
148eb13c
KW
1595typedef struct BlockReopenQueueEntry {
1596 bool prepared;
1597 BDRVReopenState state;
1598 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
1599} BlockReopenQueueEntry;
1600
1601/*
1602 * Return the flags that @bs will have after the reopens in @q have
1603 * successfully completed. If @q is NULL (or @bs is not contained in @q),
1604 * return the current flags.
1605 */
1606static int bdrv_reopen_get_flags(BlockReopenQueue *q, BlockDriverState *bs)
1607{
1608 BlockReopenQueueEntry *entry;
1609
1610 if (q != NULL) {
1611 QSIMPLEQ_FOREACH(entry, q, entry) {
1612 if (entry->state.bs == bs) {
1613 return entry->state.flags;
1614 }
1615 }
1616 }
1617
1618 return bs->open_flags;
1619}
1620
1621/* Returns whether the image file can be written to after the reopen queue @q
1622 * has been successfully applied, or right now if @q is NULL. */
1623static bool bdrv_is_writable(BlockDriverState *bs, BlockReopenQueue *q)
1624{
1625 int flags = bdrv_reopen_get_flags(q, bs);
1626
1627 return (flags & (BDRV_O_RDWR | BDRV_O_INACTIVE)) == BDRV_O_RDWR;
1628}
1629
ffd1a5a2 1630static void bdrv_child_perm(BlockDriverState *bs, BlockDriverState *child_bs,
e0995dc3
KW
1631 BdrvChild *c, const BdrvChildRole *role,
1632 BlockReopenQueue *reopen_queue,
ffd1a5a2
FZ
1633 uint64_t parent_perm, uint64_t parent_shared,
1634 uint64_t *nperm, uint64_t *nshared)
1635{
1636 if (bs->drv && bs->drv->bdrv_child_perm) {
e0995dc3 1637 bs->drv->bdrv_child_perm(bs, c, role, reopen_queue,
ffd1a5a2
FZ
1638 parent_perm, parent_shared,
1639 nperm, nshared);
1640 }
e0995dc3 1641 /* TODO Take force_share from reopen_queue */
ffd1a5a2
FZ
1642 if (child_bs && child_bs->force_share) {
1643 *nshared = BLK_PERM_ALL;
1644 }
1645}
1646
33a610c3
KW
1647/*
1648 * Check whether permissions on this node can be changed in a way that
1649 * @cumulative_perms and @cumulative_shared_perms are the new cumulative
1650 * permissions of all its parents. This involves checking whether all necessary
1651 * permission changes to child nodes can be performed.
1652 *
1653 * A call to this function must always be followed by a call to bdrv_set_perm()
1654 * or bdrv_abort_perm_update().
1655 */
3121fb45
KW
1656static int bdrv_check_perm(BlockDriverState *bs, BlockReopenQueue *q,
1657 uint64_t cumulative_perms,
46181129
KW
1658 uint64_t cumulative_shared_perms,
1659 GSList *ignore_children, Error **errp)
33a610c3
KW
1660{
1661 BlockDriver *drv = bs->drv;
1662 BdrvChild *c;
1663 int ret;
1664
1665 /* Write permissions never work with read-only images */
1666 if ((cumulative_perms & (BLK_PERM_WRITE | BLK_PERM_WRITE_UNCHANGED)) &&
148eb13c 1667 !bdrv_is_writable(bs, q))
33a610c3
KW
1668 {
1669 error_setg(errp, "Block node is read-only");
1670 return -EPERM;
1671 }
1672
1673 /* Check this node */
1674 if (!drv) {
1675 return 0;
1676 }
1677
1678 if (drv->bdrv_check_perm) {
1679 return drv->bdrv_check_perm(bs, cumulative_perms,
1680 cumulative_shared_perms, errp);
1681 }
1682
78e421c9 1683 /* Drivers that never have children can omit .bdrv_child_perm() */
33a610c3 1684 if (!drv->bdrv_child_perm) {
78e421c9 1685 assert(QLIST_EMPTY(&bs->children));
33a610c3
KW
1686 return 0;
1687 }
1688
1689 /* Check all children */
1690 QLIST_FOREACH(c, &bs->children, next) {
1691 uint64_t cur_perm, cur_shared;
3121fb45 1692 bdrv_child_perm(bs, c->bs, c, c->role, q,
ffd1a5a2
FZ
1693 cumulative_perms, cumulative_shared_perms,
1694 &cur_perm, &cur_shared);
3121fb45
KW
1695 ret = bdrv_child_check_perm(c, q, cur_perm, cur_shared,
1696 ignore_children, errp);
33a610c3
KW
1697 if (ret < 0) {
1698 return ret;
1699 }
1700 }
1701
1702 return 0;
1703}
1704
1705/*
1706 * Notifies drivers that after a previous bdrv_check_perm() call, the
1707 * permission update is not performed and any preparations made for it (e.g.
1708 * taken file locks) need to be undone.
1709 *
1710 * This function recursively notifies all child nodes.
1711 */
1712static void bdrv_abort_perm_update(BlockDriverState *bs)
1713{
1714 BlockDriver *drv = bs->drv;
1715 BdrvChild *c;
1716
1717 if (!drv) {
1718 return;
1719 }
1720
1721 if (drv->bdrv_abort_perm_update) {
1722 drv->bdrv_abort_perm_update(bs);
1723 }
1724
1725 QLIST_FOREACH(c, &bs->children, next) {
1726 bdrv_child_abort_perm_update(c);
1727 }
1728}
1729
1730static void bdrv_set_perm(BlockDriverState *bs, uint64_t cumulative_perms,
1731 uint64_t cumulative_shared_perms)
1732{
1733 BlockDriver *drv = bs->drv;
1734 BdrvChild *c;
1735
1736 if (!drv) {
1737 return;
1738 }
1739
1740 /* Update this node */
1741 if (drv->bdrv_set_perm) {
1742 drv->bdrv_set_perm(bs, cumulative_perms, cumulative_shared_perms);
1743 }
1744
78e421c9 1745 /* Drivers that never have children can omit .bdrv_child_perm() */
33a610c3 1746 if (!drv->bdrv_child_perm) {
78e421c9 1747 assert(QLIST_EMPTY(&bs->children));
33a610c3
KW
1748 return;
1749 }
1750
1751 /* Update all children */
1752 QLIST_FOREACH(c, &bs->children, next) {
1753 uint64_t cur_perm, cur_shared;
e0995dc3 1754 bdrv_child_perm(bs, c->bs, c, c->role, NULL,
ffd1a5a2
FZ
1755 cumulative_perms, cumulative_shared_perms,
1756 &cur_perm, &cur_shared);
33a610c3
KW
1757 bdrv_child_set_perm(c, cur_perm, cur_shared);
1758 }
1759}
1760
1761static void bdrv_get_cumulative_perm(BlockDriverState *bs, uint64_t *perm,
1762 uint64_t *shared_perm)
1763{
1764 BdrvChild *c;
1765 uint64_t cumulative_perms = 0;
1766 uint64_t cumulative_shared_perms = BLK_PERM_ALL;
1767
1768 QLIST_FOREACH(c, &bs->parents, next_parent) {
1769 cumulative_perms |= c->perm;
1770 cumulative_shared_perms &= c->shared_perm;
1771 }
1772
1773 *perm = cumulative_perms;
1774 *shared_perm = cumulative_shared_perms;
1775}
1776
d083319f
KW
1777static char *bdrv_child_user_desc(BdrvChild *c)
1778{
1779 if (c->role->get_parent_desc) {
1780 return c->role->get_parent_desc(c);
1781 }
1782
1783 return g_strdup("another user");
1784}
1785
5176196c 1786char *bdrv_perm_names(uint64_t perm)
d083319f
KW
1787{
1788 struct perm_name {
1789 uint64_t perm;
1790 const char *name;
1791 } permissions[] = {
1792 { BLK_PERM_CONSISTENT_READ, "consistent read" },
1793 { BLK_PERM_WRITE, "write" },
1794 { BLK_PERM_WRITE_UNCHANGED, "write unchanged" },
1795 { BLK_PERM_RESIZE, "resize" },
1796 { BLK_PERM_GRAPH_MOD, "change children" },
1797 { 0, NULL }
1798 };
1799
1800 char *result = g_strdup("");
1801 struct perm_name *p;
1802
1803 for (p = permissions; p->name; p++) {
1804 if (perm & p->perm) {
1805 char *old = result;
1806 result = g_strdup_printf("%s%s%s", old, *old ? ", " : "", p->name);
1807 g_free(old);
1808 }
1809 }
1810
1811 return result;
1812}
1813
33a610c3
KW
1814/*
1815 * Checks whether a new reference to @bs can be added if the new user requires
46181129
KW
1816 * @new_used_perm/@new_shared_perm as its permissions. If @ignore_children is
1817 * set, the BdrvChild objects in this list are ignored in the calculations;
1818 * this allows checking permission updates for an existing reference.
33a610c3
KW
1819 *
1820 * Needs to be followed by a call to either bdrv_set_perm() or
1821 * bdrv_abort_perm_update(). */
3121fb45
KW
1822static int bdrv_check_update_perm(BlockDriverState *bs, BlockReopenQueue *q,
1823 uint64_t new_used_perm,
d5e6f437 1824 uint64_t new_shared_perm,
46181129 1825 GSList *ignore_children, Error **errp)
d5e6f437
KW
1826{
1827 BdrvChild *c;
33a610c3
KW
1828 uint64_t cumulative_perms = new_used_perm;
1829 uint64_t cumulative_shared_perms = new_shared_perm;
d5e6f437
KW
1830
1831 /* There is no reason why anyone couldn't tolerate write_unchanged */
1832 assert(new_shared_perm & BLK_PERM_WRITE_UNCHANGED);
1833
1834 QLIST_FOREACH(c, &bs->parents, next_parent) {
46181129 1835 if (g_slist_find(ignore_children, c)) {
d5e6f437
KW
1836 continue;
1837 }
1838
d083319f
KW
1839 if ((new_used_perm & c->shared_perm) != new_used_perm) {
1840 char *user = bdrv_child_user_desc(c);
1841 char *perm_names = bdrv_perm_names(new_used_perm & ~c->shared_perm);
1842 error_setg(errp, "Conflicts with use by %s as '%s', which does not "
1843 "allow '%s' on %s",
1844 user, c->name, perm_names, bdrv_get_node_name(c->bs));
1845 g_free(user);
1846 g_free(perm_names);
1847 return -EPERM;
1848 }
1849
1850 if ((c->perm & new_shared_perm) != c->perm) {
1851 char *user = bdrv_child_user_desc(c);
1852 char *perm_names = bdrv_perm_names(c->perm & ~new_shared_perm);
1853 error_setg(errp, "Conflicts with use by %s as '%s', which uses "
1854 "'%s' on %s",
1855 user, c->name, perm_names, bdrv_get_node_name(c->bs));
1856 g_free(user);
1857 g_free(perm_names);
d5e6f437
KW
1858 return -EPERM;
1859 }
33a610c3
KW
1860
1861 cumulative_perms |= c->perm;
1862 cumulative_shared_perms &= c->shared_perm;
d5e6f437
KW
1863 }
1864
3121fb45 1865 return bdrv_check_perm(bs, q, cumulative_perms, cumulative_shared_perms,
46181129 1866 ignore_children, errp);
33a610c3
KW
1867}
1868
1869/* Needs to be followed by a call to either bdrv_child_set_perm() or
1870 * bdrv_child_abort_perm_update(). */
3121fb45
KW
1871static int bdrv_child_check_perm(BdrvChild *c, BlockReopenQueue *q,
1872 uint64_t perm, uint64_t shared,
c1cef672 1873 GSList *ignore_children, Error **errp)
33a610c3 1874{
46181129
KW
1875 int ret;
1876
1877 ignore_children = g_slist_prepend(g_slist_copy(ignore_children), c);
3121fb45 1878 ret = bdrv_check_update_perm(c->bs, q, perm, shared, ignore_children, errp);
46181129
KW
1879 g_slist_free(ignore_children);
1880
1881 return ret;
33a610c3
KW
1882}
1883
c1cef672 1884static void bdrv_child_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared)
33a610c3
KW
1885{
1886 uint64_t cumulative_perms, cumulative_shared_perms;
1887
1888 c->perm = perm;
1889 c->shared_perm = shared;
1890
1891 bdrv_get_cumulative_perm(c->bs, &cumulative_perms,
1892 &cumulative_shared_perms);
1893 bdrv_set_perm(c->bs, cumulative_perms, cumulative_shared_perms);
1894}
1895
c1cef672 1896static void bdrv_child_abort_perm_update(BdrvChild *c)
33a610c3
KW
1897{
1898 bdrv_abort_perm_update(c->bs);
1899}
1900
1901int bdrv_child_try_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared,
1902 Error **errp)
1903{
1904 int ret;
1905
3121fb45 1906 ret = bdrv_child_check_perm(c, NULL, perm, shared, NULL, errp);
33a610c3
KW
1907 if (ret < 0) {
1908 bdrv_child_abort_perm_update(c);
1909 return ret;
1910 }
1911
1912 bdrv_child_set_perm(c, perm, shared);
1913
d5e6f437
KW
1914 return 0;
1915}
1916
6a1b9ee1
KW
1917#define DEFAULT_PERM_PASSTHROUGH (BLK_PERM_CONSISTENT_READ \
1918 | BLK_PERM_WRITE \
1919 | BLK_PERM_WRITE_UNCHANGED \
1920 | BLK_PERM_RESIZE)
1921#define DEFAULT_PERM_UNCHANGED (BLK_PERM_ALL & ~DEFAULT_PERM_PASSTHROUGH)
1922
1923void bdrv_filter_default_perms(BlockDriverState *bs, BdrvChild *c,
1924 const BdrvChildRole *role,
e0995dc3 1925 BlockReopenQueue *reopen_queue,
6a1b9ee1
KW
1926 uint64_t perm, uint64_t shared,
1927 uint64_t *nperm, uint64_t *nshared)
1928{
1929 if (c == NULL) {
1930 *nperm = perm & DEFAULT_PERM_PASSTHROUGH;
1931 *nshared = (shared & DEFAULT_PERM_PASSTHROUGH) | DEFAULT_PERM_UNCHANGED;
1932 return;
1933 }
1934
1935 *nperm = (perm & DEFAULT_PERM_PASSTHROUGH) |
1936 (c->perm & DEFAULT_PERM_UNCHANGED);
1937 *nshared = (shared & DEFAULT_PERM_PASSTHROUGH) |
1938 (c->shared_perm & DEFAULT_PERM_UNCHANGED);
1939}
1940
6b1a044a
KW
1941void bdrv_format_default_perms(BlockDriverState *bs, BdrvChild *c,
1942 const BdrvChildRole *role,
e0995dc3 1943 BlockReopenQueue *reopen_queue,
6b1a044a
KW
1944 uint64_t perm, uint64_t shared,
1945 uint64_t *nperm, uint64_t *nshared)
1946{
1947 bool backing = (role == &child_backing);
1948 assert(role == &child_backing || role == &child_file);
1949
1950 if (!backing) {
5fbfabd3
KW
1951 int flags = bdrv_reopen_get_flags(reopen_queue, bs);
1952
6b1a044a
KW
1953 /* Apart from the modifications below, the same permissions are
1954 * forwarded and left alone as for filters */
e0995dc3
KW
1955 bdrv_filter_default_perms(bs, c, role, reopen_queue, perm, shared,
1956 &perm, &shared);
6b1a044a
KW
1957
1958 /* Format drivers may touch metadata even if the guest doesn't write */
148eb13c 1959 if (bdrv_is_writable(bs, reopen_queue)) {
6b1a044a
KW
1960 perm |= BLK_PERM_WRITE | BLK_PERM_RESIZE;
1961 }
1962
1963 /* bs->file always needs to be consistent because of the metadata. We
1964 * can never allow other users to resize or write to it. */
5fbfabd3
KW
1965 if (!(flags & BDRV_O_NO_IO)) {
1966 perm |= BLK_PERM_CONSISTENT_READ;
1967 }
6b1a044a
KW
1968 shared &= ~(BLK_PERM_WRITE | BLK_PERM_RESIZE);
1969 } else {
1970 /* We want consistent read from backing files if the parent needs it.
1971 * No other operations are performed on backing files. */
1972 perm &= BLK_PERM_CONSISTENT_READ;
1973
1974 /* If the parent can deal with changing data, we're okay with a
1975 * writable and resizable backing file. */
1976 /* TODO Require !(perm & BLK_PERM_CONSISTENT_READ), too? */
1977 if (shared & BLK_PERM_WRITE) {
1978 shared = BLK_PERM_WRITE | BLK_PERM_RESIZE;
1979 } else {
1980 shared = 0;
1981 }
1982
1983 shared |= BLK_PERM_CONSISTENT_READ | BLK_PERM_GRAPH_MOD |
1984 BLK_PERM_WRITE_UNCHANGED;
1985 }
1986
9c5e6594
KW
1987 if (bs->open_flags & BDRV_O_INACTIVE) {
1988 shared |= BLK_PERM_WRITE | BLK_PERM_RESIZE;
1989 }
1990
6b1a044a
KW
1991 *nperm = perm;
1992 *nshared = shared;
1993}
1994
8ee03995
KW
1995static void bdrv_replace_child_noperm(BdrvChild *child,
1996 BlockDriverState *new_bs)
e9740bc6
KW
1997{
1998 BlockDriverState *old_bs = child->bs;
0152bf40 1999 int i;
e9740bc6 2000
bb2614e9
FZ
2001 if (old_bs && new_bs) {
2002 assert(bdrv_get_aio_context(old_bs) == bdrv_get_aio_context(new_bs));
2003 }
e9740bc6 2004 if (old_bs) {
d736f119
KW
2005 /* Detach first so that the recursive drain sections coming from @child
2006 * are already gone and we only end the drain sections that came from
2007 * elsewhere. */
2008 if (child->role->detach) {
2009 child->role->detach(child);
2010 }
36fe1331 2011 if (old_bs->quiesce_counter && child->role->drained_end) {
0152bf40
KW
2012 for (i = 0; i < old_bs->quiesce_counter; i++) {
2013 child->role->drained_end(child);
2014 }
36fe1331 2015 }
e9740bc6
KW
2016 QLIST_REMOVE(child, next_parent);
2017 }
36fe1331
KW
2018
2019 child->bs = new_bs;
2020
e9740bc6
KW
2021 if (new_bs) {
2022 QLIST_INSERT_HEAD(&new_bs->parents, child, next_parent);
36fe1331 2023 if (new_bs->quiesce_counter && child->role->drained_begin) {
0152bf40
KW
2024 for (i = 0; i < new_bs->quiesce_counter; i++) {
2025 child->role->drained_begin(child);
2026 }
36fe1331 2027 }
33a610c3 2028
d736f119
KW
2029 /* Attach only after starting new drained sections, so that recursive
2030 * drain sections coming from @child don't get an extra .drained_begin
2031 * callback. */
8ee03995
KW
2032 if (child->role->attach) {
2033 child->role->attach(child);
2034 }
2035 }
2036}
33a610c3 2037
466787fb
KW
2038/*
2039 * Updates @child to change its reference to point to @new_bs, including
2040 * checking and applying the necessary permisson updates both to the old node
2041 * and to @new_bs.
2042 *
2043 * NULL is passed as @new_bs for removing the reference before freeing @child.
2044 *
2045 * If @new_bs is not NULL, bdrv_check_perm() must be called beforehand, as this
2046 * function uses bdrv_set_perm() to update the permissions according to the new
2047 * reference that @new_bs gets.
2048 */
2049static void bdrv_replace_child(BdrvChild *child, BlockDriverState *new_bs)
8ee03995
KW
2050{
2051 BlockDriverState *old_bs = child->bs;
2052 uint64_t perm, shared_perm;
2053
8aecf1d1
KW
2054 bdrv_replace_child_noperm(child, new_bs);
2055
8ee03995 2056 if (old_bs) {
33a610c3
KW
2057 /* Update permissions for old node. This is guaranteed to succeed
2058 * because we're just taking a parent away, so we're loosening
2059 * restrictions. */
2060 bdrv_get_cumulative_perm(old_bs, &perm, &shared_perm);
3121fb45 2061 bdrv_check_perm(old_bs, NULL, perm, shared_perm, NULL, &error_abort);
33a610c3 2062 bdrv_set_perm(old_bs, perm, shared_perm);
e9740bc6 2063 }
36fe1331 2064
e9740bc6 2065 if (new_bs) {
33a610c3 2066 bdrv_get_cumulative_perm(new_bs, &perm, &shared_perm);
33a610c3 2067 bdrv_set_perm(new_bs, perm, shared_perm);
e9740bc6 2068 }
e9740bc6
KW
2069}
2070
f21d96d0
KW
2071BdrvChild *bdrv_root_attach_child(BlockDriverState *child_bs,
2072 const char *child_name,
36fe1331 2073 const BdrvChildRole *child_role,
d5e6f437
KW
2074 uint64_t perm, uint64_t shared_perm,
2075 void *opaque, Error **errp)
df581792 2076{
d5e6f437
KW
2077 BdrvChild *child;
2078 int ret;
2079
3121fb45 2080 ret = bdrv_check_update_perm(child_bs, NULL, perm, shared_perm, NULL, errp);
d5e6f437 2081 if (ret < 0) {
33a610c3 2082 bdrv_abort_perm_update(child_bs);
d5e6f437
KW
2083 return NULL;
2084 }
2085
2086 child = g_new(BdrvChild, 1);
df581792 2087 *child = (BdrvChild) {
d5e6f437
KW
2088 .bs = NULL,
2089 .name = g_strdup(child_name),
2090 .role = child_role,
2091 .perm = perm,
2092 .shared_perm = shared_perm,
2093 .opaque = opaque,
df581792
KW
2094 };
2095
33a610c3 2096 /* This performs the matching bdrv_set_perm() for the above check. */
466787fb 2097 bdrv_replace_child(child, child_bs);
b4b059f6
KW
2098
2099 return child;
df581792
KW
2100}
2101
98292c61
WC
2102BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
2103 BlockDriverState *child_bs,
2104 const char *child_name,
8b2ff529
KW
2105 const BdrvChildRole *child_role,
2106 Error **errp)
f21d96d0 2107{
d5e6f437 2108 BdrvChild *child;
f68c598b
KW
2109 uint64_t perm, shared_perm;
2110
2111 bdrv_get_cumulative_perm(parent_bs, &perm, &shared_perm);
2112
2113 assert(parent_bs->drv);
bb2614e9 2114 assert(bdrv_get_aio_context(parent_bs) == bdrv_get_aio_context(child_bs));
e0995dc3 2115 bdrv_child_perm(parent_bs, child_bs, NULL, child_role, NULL,
ffd1a5a2 2116 perm, shared_perm, &perm, &shared_perm);
d5e6f437 2117
d5e6f437 2118 child = bdrv_root_attach_child(child_bs, child_name, child_role,
f68c598b 2119 perm, shared_perm, parent_bs, errp);
d5e6f437
KW
2120 if (child == NULL) {
2121 return NULL;
2122 }
2123
f21d96d0
KW
2124 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
2125 return child;
2126}
2127
3f09bfbc 2128static void bdrv_detach_child(BdrvChild *child)
33a60407 2129{
f21d96d0
KW
2130 if (child->next.le_prev) {
2131 QLIST_REMOVE(child, next);
2132 child->next.le_prev = NULL;
2133 }
e9740bc6 2134
466787fb 2135 bdrv_replace_child(child, NULL);
e9740bc6 2136
260fecf1 2137 g_free(child->name);
33a60407
KW
2138 g_free(child);
2139}
2140
f21d96d0 2141void bdrv_root_unref_child(BdrvChild *child)
33a60407 2142{
779020cb
KW
2143 BlockDriverState *child_bs;
2144
f21d96d0
KW
2145 child_bs = child->bs;
2146 bdrv_detach_child(child);
2147 bdrv_unref(child_bs);
2148}
2149
2150void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
2151{
779020cb
KW
2152 if (child == NULL) {
2153 return;
2154 }
33a60407
KW
2155
2156 if (child->bs->inherits_from == parent) {
4e4bf5c4
KW
2157 BdrvChild *c;
2158
2159 /* Remove inherits_from only when the last reference between parent and
2160 * child->bs goes away. */
2161 QLIST_FOREACH(c, &parent->children, next) {
2162 if (c != child && c->bs == child->bs) {
2163 break;
2164 }
2165 }
2166 if (c == NULL) {
2167 child->bs->inherits_from = NULL;
2168 }
33a60407
KW
2169 }
2170
f21d96d0 2171 bdrv_root_unref_child(child);
33a60407
KW
2172}
2173
5c8cab48
KW
2174
2175static void bdrv_parent_cb_change_media(BlockDriverState *bs, bool load)
2176{
2177 BdrvChild *c;
2178 QLIST_FOREACH(c, &bs->parents, next_parent) {
2179 if (c->role->change_media) {
2180 c->role->change_media(c, load);
2181 }
2182 }
2183}
2184
2185static void bdrv_parent_cb_resize(BlockDriverState *bs)
2186{
2187 BdrvChild *c;
2188 QLIST_FOREACH(c, &bs->parents, next_parent) {
2189 if (c->role->resize) {
2190 c->role->resize(c);
2191 }
2192 }
2193}
2194
5db15a57
KW
2195/*
2196 * Sets the backing file link of a BDS. A new reference is created; callers
2197 * which don't need their own reference any more must call bdrv_unref().
2198 */
12fa4af6
KW
2199void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd,
2200 Error **errp)
8d24cce1 2201{
5db15a57
KW
2202 if (backing_hd) {
2203 bdrv_ref(backing_hd);
2204 }
8d24cce1 2205
760e0063 2206 if (bs->backing) {
5db15a57 2207 bdrv_unref_child(bs, bs->backing);
826b6ca0
FZ
2208 }
2209
8d24cce1 2210 if (!backing_hd) {
760e0063 2211 bs->backing = NULL;
8d24cce1
FZ
2212 goto out;
2213 }
12fa4af6 2214
8b2ff529 2215 bs->backing = bdrv_attach_child(bs, backing_hd, "backing", &child_backing,
12fa4af6
KW
2216 errp);
2217 if (!bs->backing) {
2218 bdrv_unref(backing_hd);
2219 }
826b6ca0 2220
9e7e940c
KW
2221 bdrv_refresh_filename(bs);
2222
8d24cce1 2223out:
3baca891 2224 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
2225}
2226
31ca6d07
KW
2227/*
2228 * Opens the backing file for a BlockDriverState if not yet open
2229 *
d9b7b057
KW
2230 * bdref_key specifies the key for the image's BlockdevRef in the options QDict.
2231 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
2232 * itself, all options starting with "${bdref_key}." are considered part of the
2233 * BlockdevRef.
2234 *
2235 * TODO Can this be unified with bdrv_open_image()?
31ca6d07 2236 */
d9b7b057
KW
2237int bdrv_open_backing_file(BlockDriverState *bs, QDict *parent_options,
2238 const char *bdref_key, Error **errp)
9156df12 2239{
1ba4b6a5 2240 char *backing_filename = g_malloc0(PATH_MAX);
d9b7b057
KW
2241 char *bdref_key_dot;
2242 const char *reference = NULL;
317fc44e 2243 int ret = 0;
8d24cce1 2244 BlockDriverState *backing_hd;
d9b7b057
KW
2245 QDict *options;
2246 QDict *tmp_parent_options = NULL;
34b5d2c6 2247 Error *local_err = NULL;
9156df12 2248
760e0063 2249 if (bs->backing != NULL) {
1ba4b6a5 2250 goto free_exit;
9156df12
PB
2251 }
2252
31ca6d07 2253 /* NULL means an empty set of options */
d9b7b057
KW
2254 if (parent_options == NULL) {
2255 tmp_parent_options = qdict_new();
2256 parent_options = tmp_parent_options;
31ca6d07
KW
2257 }
2258
9156df12 2259 bs->open_flags &= ~BDRV_O_NO_BACKING;
d9b7b057
KW
2260
2261 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
2262 qdict_extract_subqdict(parent_options, &options, bdref_key_dot);
2263 g_free(bdref_key_dot);
2264
129c7d1c
MA
2265 /*
2266 * Caution: while qdict_get_try_str() is fine, getting non-string
2267 * types would require more care. When @parent_options come from
2268 * -blockdev or blockdev_add, its members are typed according to
2269 * the QAPI schema, but when they come from -drive, they're all
2270 * QString.
2271 */
d9b7b057
KW
2272 reference = qdict_get_try_str(parent_options, bdref_key);
2273 if (reference || qdict_haskey(options, "file.filename")) {
1cb6f506
KW
2274 backing_filename[0] = '\0';
2275 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
cb3e7f08 2276 qobject_unref(options);
1ba4b6a5 2277 goto free_exit;
dbecebdd 2278 } else {
9f07429e
HR
2279 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
2280 &local_err);
2281 if (local_err) {
2282 ret = -EINVAL;
2283 error_propagate(errp, local_err);
cb3e7f08 2284 qobject_unref(options);
9f07429e
HR
2285 goto free_exit;
2286 }
9156df12
PB
2287 }
2288
8ee79e70
KW
2289 if (!bs->drv || !bs->drv->supports_backing) {
2290 ret = -EINVAL;
2291 error_setg(errp, "Driver doesn't support backing files");
cb3e7f08 2292 qobject_unref(options);
8ee79e70
KW
2293 goto free_exit;
2294 }
2295
6bff597b
PK
2296 if (!reference &&
2297 bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
46f5ac20 2298 qdict_put_str(options, "driver", bs->backing_format);
9156df12
PB
2299 }
2300
5b363937
HR
2301 backing_hd = bdrv_open_inherit(*backing_filename ? backing_filename : NULL,
2302 reference, options, 0, bs, &child_backing,
2303 errp);
2304 if (!backing_hd) {
9156df12 2305 bs->open_flags |= BDRV_O_NO_BACKING;
e43bfd9c 2306 error_prepend(errp, "Could not open backing file: ");
5b363937 2307 ret = -EINVAL;
1ba4b6a5 2308 goto free_exit;
9156df12 2309 }
5ce6bfe2 2310 bdrv_set_aio_context(backing_hd, bdrv_get_aio_context(bs));
df581792 2311
5db15a57
KW
2312 /* Hook up the backing file link; drop our reference, bs owns the
2313 * backing_hd reference now */
12fa4af6 2314 bdrv_set_backing_hd(bs, backing_hd, &local_err);
5db15a57 2315 bdrv_unref(backing_hd);
12fa4af6 2316 if (local_err) {
8cd1a3e4 2317 error_propagate(errp, local_err);
12fa4af6
KW
2318 ret = -EINVAL;
2319 goto free_exit;
2320 }
d80ac658 2321
d9b7b057
KW
2322 qdict_del(parent_options, bdref_key);
2323
1ba4b6a5
BC
2324free_exit:
2325 g_free(backing_filename);
cb3e7f08 2326 qobject_unref(tmp_parent_options);
1ba4b6a5 2327 return ret;
9156df12
PB
2328}
2329
2d6b86af
KW
2330static BlockDriverState *
2331bdrv_open_child_bs(const char *filename, QDict *options, const char *bdref_key,
2332 BlockDriverState *parent, const BdrvChildRole *child_role,
2333 bool allow_none, Error **errp)
da557aac 2334{
2d6b86af 2335 BlockDriverState *bs = NULL;
da557aac 2336 QDict *image_options;
da557aac
HR
2337 char *bdref_key_dot;
2338 const char *reference;
2339
df581792 2340 assert(child_role != NULL);
f67503e5 2341
da557aac
HR
2342 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
2343 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
2344 g_free(bdref_key_dot);
2345
129c7d1c
MA
2346 /*
2347 * Caution: while qdict_get_try_str() is fine, getting non-string
2348 * types would require more care. When @options come from
2349 * -blockdev or blockdev_add, its members are typed according to
2350 * the QAPI schema, but when they come from -drive, they're all
2351 * QString.
2352 */
da557aac
HR
2353 reference = qdict_get_try_str(options, bdref_key);
2354 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 2355 if (!allow_none) {
da557aac
HR
2356 error_setg(errp, "A block device must be specified for \"%s\"",
2357 bdref_key);
da557aac 2358 }
cb3e7f08 2359 qobject_unref(image_options);
da557aac
HR
2360 goto done;
2361 }
2362
5b363937
HR
2363 bs = bdrv_open_inherit(filename, reference, image_options, 0,
2364 parent, child_role, errp);
2365 if (!bs) {
df581792
KW
2366 goto done;
2367 }
2368
da557aac
HR
2369done:
2370 qdict_del(options, bdref_key);
2d6b86af
KW
2371 return bs;
2372}
2373
2374/*
2375 * Opens a disk image whose options are given as BlockdevRef in another block
2376 * device's options.
2377 *
2378 * If allow_none is true, no image will be opened if filename is false and no
2379 * BlockdevRef is given. NULL will be returned, but errp remains unset.
2380 *
2381 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
2382 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
2383 * itself, all options starting with "${bdref_key}." are considered part of the
2384 * BlockdevRef.
2385 *
2386 * The BlockdevRef will be removed from the options QDict.
2387 */
2388BdrvChild *bdrv_open_child(const char *filename,
2389 QDict *options, const char *bdref_key,
2390 BlockDriverState *parent,
2391 const BdrvChildRole *child_role,
2392 bool allow_none, Error **errp)
2393{
8b2ff529 2394 BdrvChild *c;
2d6b86af
KW
2395 BlockDriverState *bs;
2396
2397 bs = bdrv_open_child_bs(filename, options, bdref_key, parent, child_role,
2398 allow_none, errp);
2399 if (bs == NULL) {
2400 return NULL;
2401 }
2402
8b2ff529
KW
2403 c = bdrv_attach_child(parent, bs, bdref_key, child_role, errp);
2404 if (!c) {
2405 bdrv_unref(bs);
2406 return NULL;
2407 }
2408
2409 return c;
b4b059f6
KW
2410}
2411
e1d74bc6
KW
2412/* TODO Future callers may need to specify parent/child_role in order for
2413 * option inheritance to work. Existing callers use it for the root node. */
2414BlockDriverState *bdrv_open_blockdev_ref(BlockdevRef *ref, Error **errp)
2415{
2416 BlockDriverState *bs = NULL;
2417 Error *local_err = NULL;
2418 QObject *obj = NULL;
2419 QDict *qdict = NULL;
2420 const char *reference = NULL;
2421 Visitor *v = NULL;
2422
2423 if (ref->type == QTYPE_QSTRING) {
2424 reference = ref->u.reference;
2425 } else {
2426 BlockdevOptions *options = &ref->u.definition;
2427 assert(ref->type == QTYPE_QDICT);
2428
2429 v = qobject_output_visitor_new(&obj);
2430 visit_type_BlockdevOptions(v, NULL, &options, &local_err);
2431 if (local_err) {
2432 error_propagate(errp, local_err);
2433 goto fail;
2434 }
2435 visit_complete(v, &obj);
2436
7dc847eb 2437 qdict = qobject_to(QDict, obj);
e1d74bc6
KW
2438 qdict_flatten(qdict);
2439
2440 /* bdrv_open_inherit() defaults to the values in bdrv_flags (for
2441 * compatibility with other callers) rather than what we want as the
2442 * real defaults. Apply the defaults here instead. */
2443 qdict_set_default_str(qdict, BDRV_OPT_CACHE_DIRECT, "off");
2444 qdict_set_default_str(qdict, BDRV_OPT_CACHE_NO_FLUSH, "off");
2445 qdict_set_default_str(qdict, BDRV_OPT_READ_ONLY, "off");
2446 }
2447
2448 bs = bdrv_open_inherit(NULL, reference, qdict, 0, NULL, NULL, errp);
2449 obj = NULL;
2450
2451fail:
cb3e7f08 2452 qobject_unref(obj);
e1d74bc6
KW
2453 visit_free(v);
2454 return bs;
2455}
2456
66836189
HR
2457static BlockDriverState *bdrv_append_temp_snapshot(BlockDriverState *bs,
2458 int flags,
2459 QDict *snapshot_options,
2460 Error **errp)
b998875d
KW
2461{
2462 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 2463 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 2464 int64_t total_size;
83d0521a 2465 QemuOpts *opts = NULL;
ff6ed714 2466 BlockDriverState *bs_snapshot = NULL;
b2c2832c 2467 Error *local_err = NULL;
b998875d
KW
2468 int ret;
2469
2470 /* if snapshot, we create a temporary backing file and open it
2471 instead of opening 'filename' directly */
2472
2473 /* Get the required size from the image */
f187743a
KW
2474 total_size = bdrv_getlength(bs);
2475 if (total_size < 0) {
2476 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 2477 goto out;
f187743a 2478 }
b998875d
KW
2479
2480 /* Create the temporary image */
1ba4b6a5 2481 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
2482 if (ret < 0) {
2483 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 2484 goto out;
b998875d
KW
2485 }
2486
ef810437 2487 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 2488 &error_abort);
39101f25 2489 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
e43bfd9c 2490 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, errp);
83d0521a 2491 qemu_opts_del(opts);
b998875d 2492 if (ret < 0) {
e43bfd9c
MA
2493 error_prepend(errp, "Could not create temporary overlay '%s': ",
2494 tmp_filename);
1ba4b6a5 2495 goto out;
b998875d
KW
2496 }
2497
73176bee 2498 /* Prepare options QDict for the temporary file */
46f5ac20
EB
2499 qdict_put_str(snapshot_options, "file.driver", "file");
2500 qdict_put_str(snapshot_options, "file.filename", tmp_filename);
2501 qdict_put_str(snapshot_options, "driver", "qcow2");
b998875d 2502
5b363937 2503 bs_snapshot = bdrv_open(NULL, NULL, snapshot_options, flags, errp);
73176bee 2504 snapshot_options = NULL;
5b363937 2505 if (!bs_snapshot) {
1ba4b6a5 2506 goto out;
b998875d
KW
2507 }
2508
ff6ed714
EB
2509 /* bdrv_append() consumes a strong reference to bs_snapshot
2510 * (i.e. it will call bdrv_unref() on it) even on error, so in
2511 * order to be able to return one, we have to increase
2512 * bs_snapshot's refcount here */
66836189 2513 bdrv_ref(bs_snapshot);
b2c2832c
KW
2514 bdrv_append(bs_snapshot, bs, &local_err);
2515 if (local_err) {
2516 error_propagate(errp, local_err);
ff6ed714 2517 bs_snapshot = NULL;
b2c2832c
KW
2518 goto out;
2519 }
1ba4b6a5
BC
2520
2521out:
cb3e7f08 2522 qobject_unref(snapshot_options);
1ba4b6a5 2523 g_free(tmp_filename);
ff6ed714 2524 return bs_snapshot;
b998875d
KW
2525}
2526
b6ce07aa
KW
2527/*
2528 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
2529 *
2530 * options is a QDict of options to pass to the block drivers, or NULL for an
2531 * empty set of options. The reference to the QDict belongs to the block layer
2532 * after the call (even on failure), so if the caller intends to reuse the
cb3e7f08 2533 * dictionary, it needs to use qobject_ref() before calling bdrv_open.
f67503e5
HR
2534 *
2535 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
2536 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
2537 *
2538 * The reference parameter may be used to specify an existing block device which
2539 * should be opened. If specified, neither options nor a filename may be given,
2540 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 2541 */
5b363937
HR
2542static BlockDriverState *bdrv_open_inherit(const char *filename,
2543 const char *reference,
2544 QDict *options, int flags,
2545 BlockDriverState *parent,
2546 const BdrvChildRole *child_role,
2547 Error **errp)
ea2384d3 2548{
b6ce07aa 2549 int ret;
5696c6e3 2550 BlockBackend *file = NULL;
9a4f4c31 2551 BlockDriverState *bs;
ce343771 2552 BlockDriver *drv = NULL;
74fe54f2 2553 const char *drvname;
3e8c2e57 2554 const char *backing;
34b5d2c6 2555 Error *local_err = NULL;
73176bee 2556 QDict *snapshot_options = NULL;
b1e6fc08 2557 int snapshot_flags = 0;
712e7874 2558
f3930ed0
KW
2559 assert(!child_role || !flags);
2560 assert(!child_role == !parent);
f67503e5 2561
ddf5636d
HR
2562 if (reference) {
2563 bool options_non_empty = options ? qdict_size(options) : false;
cb3e7f08 2564 qobject_unref(options);
ddf5636d 2565
ddf5636d
HR
2566 if (filename || options_non_empty) {
2567 error_setg(errp, "Cannot reference an existing block device with "
2568 "additional options or a new filename");
5b363937 2569 return NULL;
ddf5636d
HR
2570 }
2571
2572 bs = bdrv_lookup_bs(reference, reference, errp);
2573 if (!bs) {
5b363937 2574 return NULL;
ddf5636d 2575 }
76b22320 2576
ddf5636d 2577 bdrv_ref(bs);
5b363937 2578 return bs;
ddf5636d
HR
2579 }
2580
5b363937 2581 bs = bdrv_new();
f67503e5 2582
de9c0cec
KW
2583 /* NULL means an empty set of options */
2584 if (options == NULL) {
2585 options = qdict_new();
2586 }
2587
145f598e 2588 /* json: syntax counts as explicit options, as if in the QDict */
de3b53f0
KW
2589 parse_json_protocol(options, &filename, &local_err);
2590 if (local_err) {
de3b53f0
KW
2591 goto fail;
2592 }
2593
145f598e
KW
2594 bs->explicit_options = qdict_clone_shallow(options);
2595
f3930ed0 2596 if (child_role) {
bddcec37 2597 bs->inherits_from = parent;
8e2160e2
KW
2598 child_role->inherit_options(&flags, options,
2599 parent->open_flags, parent->options);
f3930ed0
KW
2600 }
2601
de3b53f0 2602 ret = bdrv_fill_options(&options, filename, &flags, &local_err);
462f5bcf
KW
2603 if (local_err) {
2604 goto fail;
2605 }
2606
129c7d1c
MA
2607 /*
2608 * Set the BDRV_O_RDWR and BDRV_O_ALLOW_RDWR flags.
2609 * Caution: getting a boolean member of @options requires care.
2610 * When @options come from -blockdev or blockdev_add, members are
2611 * typed according to the QAPI schema, but when they come from
2612 * -drive, they're all QString.
2613 */
f87a0e29
AG
2614 if (g_strcmp0(qdict_get_try_str(options, BDRV_OPT_READ_ONLY), "on") &&
2615 !qdict_get_try_bool(options, BDRV_OPT_READ_ONLY, false)) {
2616 flags |= (BDRV_O_RDWR | BDRV_O_ALLOW_RDWR);
2617 } else {
2618 flags &= ~BDRV_O_RDWR;
14499ea5
AG
2619 }
2620
2621 if (flags & BDRV_O_SNAPSHOT) {
2622 snapshot_options = qdict_new();
2623 bdrv_temp_snapshot_options(&snapshot_flags, snapshot_options,
2624 flags, options);
f87a0e29
AG
2625 /* Let bdrv_backing_options() override "read-only" */
2626 qdict_del(options, BDRV_OPT_READ_ONLY);
14499ea5
AG
2627 bdrv_backing_options(&flags, options, flags, options);
2628 }
2629
62392ebb
KW
2630 bs->open_flags = flags;
2631 bs->options = options;
2632 options = qdict_clone_shallow(options);
2633
76c591b0 2634 /* Find the right image format driver */
129c7d1c 2635 /* See cautionary note on accessing @options above */
76c591b0
KW
2636 drvname = qdict_get_try_str(options, "driver");
2637 if (drvname) {
2638 drv = bdrv_find_format(drvname);
76c591b0
KW
2639 if (!drv) {
2640 error_setg(errp, "Unknown driver: '%s'", drvname);
76c591b0
KW
2641 goto fail;
2642 }
2643 }
2644
2645 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 2646
129c7d1c 2647 /* See cautionary note on accessing @options above */
3e8c2e57 2648 backing = qdict_get_try_str(options, "backing");
e59a0cf1
HR
2649 if (qobject_to(QNull, qdict_get(options, "backing")) != NULL ||
2650 (backing && *backing == '\0'))
2651 {
4f7be280
HR
2652 if (backing) {
2653 warn_report("Use of \"backing\": \"\" is deprecated; "
2654 "use \"backing\": null instead");
2655 }
3e8c2e57
AG
2656 flags |= BDRV_O_NO_BACKING;
2657 qdict_del(options, "backing");
2658 }
2659
5696c6e3 2660 /* Open image file without format layer. This BlockBackend is only used for
4e4bf5c4
KW
2661 * probing, the block drivers will do their own bdrv_open_child() for the
2662 * same BDS, which is why we put the node name back into options. */
f4788adc 2663 if ((flags & BDRV_O_PROTOCOL) == 0) {
5696c6e3
KW
2664 BlockDriverState *file_bs;
2665
2666 file_bs = bdrv_open_child_bs(filename, options, "file", bs,
2667 &child_file, true, &local_err);
1fdd6933 2668 if (local_err) {
f4788adc
KW
2669 goto fail;
2670 }
5696c6e3 2671 if (file_bs != NULL) {
dacaa162
KW
2672 /* Not requesting BLK_PERM_CONSISTENT_READ because we're only
2673 * looking at the header to guess the image format. This works even
2674 * in cases where a guest would not see a consistent state. */
2675 file = blk_new(0, BLK_PERM_ALL);
d7086422 2676 blk_insert_bs(file, file_bs, &local_err);
5696c6e3 2677 bdrv_unref(file_bs);
d7086422
KW
2678 if (local_err) {
2679 goto fail;
2680 }
5696c6e3 2681
46f5ac20 2682 qdict_put_str(options, "file", bdrv_get_node_name(file_bs));
4e4bf5c4 2683 }
f500a6d3
KW
2684 }
2685
76c591b0 2686 /* Image format probing */
38f3ef57 2687 bs->probed = !drv;
76c591b0 2688 if (!drv && file) {
cf2ab8fc 2689 ret = find_image_format(file, filename, &drv, &local_err);
17b005f1 2690 if (ret < 0) {
8bfea15d 2691 goto fail;
2a05cbe4 2692 }
62392ebb
KW
2693 /*
2694 * This option update would logically belong in bdrv_fill_options(),
2695 * but we first need to open bs->file for the probing to work, while
2696 * opening bs->file already requires the (mostly) final set of options
2697 * so that cache mode etc. can be inherited.
2698 *
2699 * Adding the driver later is somewhat ugly, but it's not an option
2700 * that would ever be inherited, so it's correct. We just need to make
2701 * sure to update both bs->options (which has the full effective
2702 * options for bs) and options (which has file.* already removed).
2703 */
46f5ac20
EB
2704 qdict_put_str(bs->options, "driver", drv->format_name);
2705 qdict_put_str(options, "driver", drv->format_name);
76c591b0 2706 } else if (!drv) {
17b005f1 2707 error_setg(errp, "Must specify either driver or file");
8bfea15d 2708 goto fail;
ea2384d3 2709 }
b6ce07aa 2710
53a29513
HR
2711 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
2712 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
2713 /* file must be NULL if a protocol BDS is about to be created
2714 * (the inverse results in an error message from bdrv_open_common()) */
2715 assert(!(flags & BDRV_O_PROTOCOL) || !file);
2716
b6ce07aa 2717 /* Open the image */
82dc8b41 2718 ret = bdrv_open_common(bs, file, options, &local_err);
b6ce07aa 2719 if (ret < 0) {
8bfea15d 2720 goto fail;
6987307c
CH
2721 }
2722
4e4bf5c4 2723 if (file) {
5696c6e3 2724 blk_unref(file);
f500a6d3
KW
2725 file = NULL;
2726 }
2727
b6ce07aa 2728 /* If there is a backing file, use it */
9156df12 2729 if ((flags & BDRV_O_NO_BACKING) == 0) {
d9b7b057 2730 ret = bdrv_open_backing_file(bs, options, "backing", &local_err);
b6ce07aa 2731 if (ret < 0) {
b6ad491a 2732 goto close_and_fail;
b6ce07aa 2733 }
b6ce07aa
KW
2734 }
2735
91af7014
HR
2736 bdrv_refresh_filename(bs);
2737
b6ad491a 2738 /* Check if any unknown options were used */
7ad2757f 2739 if (qdict_size(options) != 0) {
b6ad491a 2740 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
2741 if (flags & BDRV_O_PROTOCOL) {
2742 error_setg(errp, "Block protocol '%s' doesn't support the option "
2743 "'%s'", drv->format_name, entry->key);
2744 } else {
d0e46a55
HR
2745 error_setg(errp,
2746 "Block format '%s' does not support the option '%s'",
2747 drv->format_name, entry->key);
5acd9d81 2748 }
b6ad491a 2749
b6ad491a
KW
2750 goto close_and_fail;
2751 }
b6ad491a 2752
c01c214b 2753 bdrv_parent_cb_change_media(bs, true);
b6ce07aa 2754
cb3e7f08 2755 qobject_unref(options);
dd62f1ca
KW
2756
2757 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
2758 * temporary snapshot afterwards. */
2759 if (snapshot_flags) {
66836189
HR
2760 BlockDriverState *snapshot_bs;
2761 snapshot_bs = bdrv_append_temp_snapshot(bs, snapshot_flags,
2762 snapshot_options, &local_err);
73176bee 2763 snapshot_options = NULL;
dd62f1ca
KW
2764 if (local_err) {
2765 goto close_and_fail;
2766 }
5b363937
HR
2767 /* We are not going to return bs but the overlay on top of it
2768 * (snapshot_bs); thus, we have to drop the strong reference to bs
2769 * (which we obtained by calling bdrv_new()). bs will not be deleted,
2770 * though, because the overlay still has a reference to it. */
2771 bdrv_unref(bs);
2772 bs = snapshot_bs;
dd62f1ca
KW
2773 }
2774
5b363937 2775 return bs;
b6ce07aa 2776
8bfea15d 2777fail:
5696c6e3 2778 blk_unref(file);
cb3e7f08
MAL
2779 qobject_unref(snapshot_options);
2780 qobject_unref(bs->explicit_options);
2781 qobject_unref(bs->options);
2782 qobject_unref(options);
de9c0cec 2783 bs->options = NULL;
998cbd6a 2784 bs->explicit_options = NULL;
5b363937 2785 bdrv_unref(bs);
621ff94d 2786 error_propagate(errp, local_err);
5b363937 2787 return NULL;
de9c0cec 2788
b6ad491a 2789close_and_fail:
5b363937 2790 bdrv_unref(bs);
cb3e7f08
MAL
2791 qobject_unref(snapshot_options);
2792 qobject_unref(options);
621ff94d 2793 error_propagate(errp, local_err);
5b363937 2794 return NULL;
b6ce07aa
KW
2795}
2796
5b363937
HR
2797BlockDriverState *bdrv_open(const char *filename, const char *reference,
2798 QDict *options, int flags, Error **errp)
f3930ed0 2799{
5b363937 2800 return bdrv_open_inherit(filename, reference, options, flags, NULL,
ce343771 2801 NULL, errp);
f3930ed0
KW
2802}
2803
e971aa12
JC
2804/*
2805 * Adds a BlockDriverState to a simple queue for an atomic, transactional
2806 * reopen of multiple devices.
2807 *
2808 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
2809 * already performed, or alternatively may be NULL a new BlockReopenQueue will
2810 * be created and initialized. This newly created BlockReopenQueue should be
2811 * passed back in for subsequent calls that are intended to be of the same
2812 * atomic 'set'.
2813 *
2814 * bs is the BlockDriverState to add to the reopen queue.
2815 *
4d2cb092
KW
2816 * options contains the changed options for the associated bs
2817 * (the BlockReopenQueue takes ownership)
2818 *
e971aa12
JC
2819 * flags contains the open flags for the associated bs
2820 *
2821 * returns a pointer to bs_queue, which is either the newly allocated
2822 * bs_queue, or the existing bs_queue being used.
2823 *
1a63a907 2824 * bs must be drained between bdrv_reopen_queue() and bdrv_reopen_multiple().
e971aa12 2825 */
28518102
KW
2826static BlockReopenQueue *bdrv_reopen_queue_child(BlockReopenQueue *bs_queue,
2827 BlockDriverState *bs,
2828 QDict *options,
2829 int flags,
2830 const BdrvChildRole *role,
2831 QDict *parent_options,
2832 int parent_flags)
e971aa12
JC
2833{
2834 assert(bs != NULL);
2835
2836 BlockReopenQueueEntry *bs_entry;
67251a31 2837 BdrvChild *child;
145f598e 2838 QDict *old_options, *explicit_options;
67251a31 2839
1a63a907
KW
2840 /* Make sure that the caller remembered to use a drained section. This is
2841 * important to avoid graph changes between the recursive queuing here and
2842 * bdrv_reopen_multiple(). */
2843 assert(bs->quiesce_counter > 0);
2844
e971aa12
JC
2845 if (bs_queue == NULL) {
2846 bs_queue = g_new0(BlockReopenQueue, 1);
2847 QSIMPLEQ_INIT(bs_queue);
2848 }
2849
4d2cb092
KW
2850 if (!options) {
2851 options = qdict_new();
2852 }
2853
5b7ba05f
AG
2854 /* Check if this BlockDriverState is already in the queue */
2855 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
2856 if (bs == bs_entry->state.bs) {
2857 break;
2858 }
2859 }
2860
28518102
KW
2861 /*
2862 * Precedence of options:
2863 * 1. Explicitly passed in options (highest)
91a097e7 2864 * 2. Set in flags (only for top level)
145f598e 2865 * 3. Retained from explicitly set options of bs
8e2160e2 2866 * 4. Inherited from parent node
28518102
KW
2867 * 5. Retained from effective options of bs
2868 */
2869
91a097e7
KW
2870 if (!parent_options) {
2871 /*
2872 * Any setting represented by flags is always updated. If the
2873 * corresponding QDict option is set, it takes precedence. Otherwise
2874 * the flag is translated into a QDict option. The old setting of bs is
2875 * not considered.
2876 */
2877 update_options_from_flags(options, flags);
2878 }
2879
145f598e 2880 /* Old explicitly set values (don't overwrite by inherited value) */
5b7ba05f
AG
2881 if (bs_entry) {
2882 old_options = qdict_clone_shallow(bs_entry->state.explicit_options);
2883 } else {
2884 old_options = qdict_clone_shallow(bs->explicit_options);
2885 }
145f598e 2886 bdrv_join_options(bs, options, old_options);
cb3e7f08 2887 qobject_unref(old_options);
145f598e
KW
2888
2889 explicit_options = qdict_clone_shallow(options);
2890
28518102
KW
2891 /* Inherit from parent node */
2892 if (parent_options) {
1a529736
FZ
2893 QemuOpts *opts;
2894 QDict *options_copy;
28518102 2895 assert(!flags);
8e2160e2 2896 role->inherit_options(&flags, options, parent_flags, parent_options);
1a529736
FZ
2897 options_copy = qdict_clone_shallow(options);
2898 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
2899 qemu_opts_absorb_qdict(opts, options_copy, NULL);
2900 update_flags_from_options(&flags, opts);
2901 qemu_opts_del(opts);
cb3e7f08 2902 qobject_unref(options_copy);
28518102
KW
2903 }
2904
2905 /* Old values are used for options that aren't set yet */
4d2cb092 2906 old_options = qdict_clone_shallow(bs->options);
cddff5ba 2907 bdrv_join_options(bs, options, old_options);
cb3e7f08 2908 qobject_unref(old_options);
4d2cb092 2909
fd452021 2910 /* bdrv_open_inherit() sets and clears some additional flags internally */
f1f25a2e 2911 flags &= ~BDRV_O_PROTOCOL;
fd452021
KW
2912 if (flags & BDRV_O_RDWR) {
2913 flags |= BDRV_O_ALLOW_RDWR;
2914 }
f1f25a2e 2915
1857c97b
KW
2916 if (!bs_entry) {
2917 bs_entry = g_new0(BlockReopenQueueEntry, 1);
2918 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
2919 } else {
cb3e7f08
MAL
2920 qobject_unref(bs_entry->state.options);
2921 qobject_unref(bs_entry->state.explicit_options);
1857c97b
KW
2922 }
2923
2924 bs_entry->state.bs = bs;
2925 bs_entry->state.options = options;
2926 bs_entry->state.explicit_options = explicit_options;
2927 bs_entry->state.flags = flags;
2928
30450259
KW
2929 /* This needs to be overwritten in bdrv_reopen_prepare() */
2930 bs_entry->state.perm = UINT64_MAX;
2931 bs_entry->state.shared_perm = 0;
2932
67251a31 2933 QLIST_FOREACH(child, &bs->children, next) {
4c9dfe5d
KW
2934 QDict *new_child_options;
2935 char *child_key_dot;
67251a31 2936
4c9dfe5d
KW
2937 /* reopen can only change the options of block devices that were
2938 * implicitly created and inherited options. For other (referenced)
2939 * block devices, a syntax like "backing.foo" results in an error. */
67251a31
KW
2940 if (child->bs->inherits_from != bs) {
2941 continue;
2942 }
2943
4c9dfe5d
KW
2944 child_key_dot = g_strdup_printf("%s.", child->name);
2945 qdict_extract_subqdict(options, &new_child_options, child_key_dot);
2946 g_free(child_key_dot);
2947
28518102
KW
2948 bdrv_reopen_queue_child(bs_queue, child->bs, new_child_options, 0,
2949 child->role, options, flags);
e971aa12
JC
2950 }
2951
e971aa12
JC
2952 return bs_queue;
2953}
2954
28518102
KW
2955BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
2956 BlockDriverState *bs,
2957 QDict *options, int flags)
2958{
2959 return bdrv_reopen_queue_child(bs_queue, bs, options, flags,
2960 NULL, NULL, 0);
2961}
2962
e971aa12
JC
2963/*
2964 * Reopen multiple BlockDriverStates atomically & transactionally.
2965 *
2966 * The queue passed in (bs_queue) must have been built up previous
2967 * via bdrv_reopen_queue().
2968 *
2969 * Reopens all BDS specified in the queue, with the appropriate
2970 * flags. All devices are prepared for reopen, and failure of any
2971 * device will cause all device changes to be abandonded, and intermediate
2972 * data cleaned up.
2973 *
2974 * If all devices prepare successfully, then the changes are committed
2975 * to all devices.
2976 *
1a63a907
KW
2977 * All affected nodes must be drained between bdrv_reopen_queue() and
2978 * bdrv_reopen_multiple().
e971aa12 2979 */
720150f3 2980int bdrv_reopen_multiple(AioContext *ctx, BlockReopenQueue *bs_queue, Error **errp)
e971aa12
JC
2981{
2982 int ret = -1;
2983 BlockReopenQueueEntry *bs_entry, *next;
2984 Error *local_err = NULL;
2985
2986 assert(bs_queue != NULL);
2987
e971aa12 2988 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1a63a907 2989 assert(bs_entry->state.bs->quiesce_counter > 0);
e971aa12
JC
2990 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
2991 error_propagate(errp, local_err);
2992 goto cleanup;
2993 }
2994 bs_entry->prepared = true;
2995 }
2996
2997 /* If we reach this point, we have success and just need to apply the
2998 * changes
2999 */
3000 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
3001 bdrv_reopen_commit(&bs_entry->state);
3002 }
3003
3004 ret = 0;
3005
3006cleanup:
3007 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
3008 if (ret && bs_entry->prepared) {
3009 bdrv_reopen_abort(&bs_entry->state);
145f598e 3010 } else if (ret) {
cb3e7f08 3011 qobject_unref(bs_entry->state.explicit_options);
e971aa12 3012 }
cb3e7f08 3013 qobject_unref(bs_entry->state.options);
e971aa12
JC
3014 g_free(bs_entry);
3015 }
3016 g_free(bs_queue);
40840e41 3017
e971aa12
JC
3018 return ret;
3019}
3020
3021
3022/* Reopen a single BlockDriverState with the specified flags. */
3023int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
3024{
3025 int ret = -1;
3026 Error *local_err = NULL;
1a63a907 3027 BlockReopenQueue *queue;
e971aa12 3028
1a63a907
KW
3029 bdrv_subtree_drained_begin(bs);
3030
3031 queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
720150f3 3032 ret = bdrv_reopen_multiple(bdrv_get_aio_context(bs), queue, &local_err);
e971aa12
JC
3033 if (local_err != NULL) {
3034 error_propagate(errp, local_err);
3035 }
1a63a907
KW
3036
3037 bdrv_subtree_drained_end(bs);
3038
e971aa12
JC
3039 return ret;
3040}
3041
30450259
KW
3042static BlockReopenQueueEntry *find_parent_in_reopen_queue(BlockReopenQueue *q,
3043 BdrvChild *c)
3044{
3045 BlockReopenQueueEntry *entry;
3046
3047 QSIMPLEQ_FOREACH(entry, q, entry) {
3048 BlockDriverState *bs = entry->state.bs;
3049 BdrvChild *child;
3050
3051 QLIST_FOREACH(child, &bs->children, next) {
3052 if (child == c) {
3053 return entry;
3054 }
3055 }
3056 }
3057
3058 return NULL;
3059}
3060
3061static void bdrv_reopen_perm(BlockReopenQueue *q, BlockDriverState *bs,
3062 uint64_t *perm, uint64_t *shared)
3063{
3064 BdrvChild *c;
3065 BlockReopenQueueEntry *parent;
3066 uint64_t cumulative_perms = 0;
3067 uint64_t cumulative_shared_perms = BLK_PERM_ALL;
3068
3069 QLIST_FOREACH(c, &bs->parents, next_parent) {
3070 parent = find_parent_in_reopen_queue(q, c);
3071 if (!parent) {
3072 cumulative_perms |= c->perm;
3073 cumulative_shared_perms &= c->shared_perm;
3074 } else {
3075 uint64_t nperm, nshared;
3076
3077 bdrv_child_perm(parent->state.bs, bs, c, c->role, q,
3078 parent->state.perm, parent->state.shared_perm,
3079 &nperm, &nshared);
3080
3081 cumulative_perms |= nperm;
3082 cumulative_shared_perms &= nshared;
3083 }
3084 }
3085 *perm = cumulative_perms;
3086 *shared = cumulative_shared_perms;
3087}
e971aa12
JC
3088
3089/*
3090 * Prepares a BlockDriverState for reopen. All changes are staged in the
3091 * 'opaque' field of the BDRVReopenState, which is used and allocated by
3092 * the block driver layer .bdrv_reopen_prepare()
3093 *
3094 * bs is the BlockDriverState to reopen
3095 * flags are the new open flags
3096 * queue is the reopen queue
3097 *
3098 * Returns 0 on success, non-zero on error. On error errp will be set
3099 * as well.
3100 *
3101 * On failure, bdrv_reopen_abort() will be called to clean up any data.
3102 * It is the responsibility of the caller to then call the abort() or
3103 * commit() for any other BDS that have been left in a prepare() state
3104 *
3105 */
3106int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
3107 Error **errp)
3108{
3109 int ret = -1;
3110 Error *local_err = NULL;
3111 BlockDriver *drv;
ccf9dc07
KW
3112 QemuOpts *opts;
3113 const char *value;
3d8ce171 3114 bool read_only;
e971aa12
JC
3115
3116 assert(reopen_state != NULL);
3117 assert(reopen_state->bs->drv != NULL);
3118 drv = reopen_state->bs->drv;
3119
ccf9dc07
KW
3120 /* Process generic block layer options */
3121 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
3122 qemu_opts_absorb_qdict(opts, reopen_state->options, &local_err);
3123 if (local_err) {
3124 error_propagate(errp, local_err);
3125 ret = -EINVAL;
3126 goto error;
3127 }
3128
91a097e7
KW
3129 update_flags_from_options(&reopen_state->flags, opts);
3130
ccf9dc07
KW
3131 /* node-name and driver must be unchanged. Put them back into the QDict, so
3132 * that they are checked at the end of this function. */
3133 value = qemu_opt_get(opts, "node-name");
3134 if (value) {
46f5ac20 3135 qdict_put_str(reopen_state->options, "node-name", value);
ccf9dc07
KW
3136 }
3137
3138 value = qemu_opt_get(opts, "driver");
3139 if (value) {
46f5ac20 3140 qdict_put_str(reopen_state->options, "driver", value);
ccf9dc07
KW
3141 }
3142
3d8ce171
JC
3143 /* If we are to stay read-only, do not allow permission change
3144 * to r/w. Attempting to set to r/w may fail if either BDRV_O_ALLOW_RDWR is
3145 * not set, or if the BDS still has copy_on_read enabled */
3146 read_only = !(reopen_state->flags & BDRV_O_RDWR);
54a32bfe 3147 ret = bdrv_can_set_read_only(reopen_state->bs, read_only, true, &local_err);
3d8ce171
JC
3148 if (local_err) {
3149 error_propagate(errp, local_err);
e971aa12
JC
3150 goto error;
3151 }
3152
30450259
KW
3153 /* Calculate required permissions after reopening */
3154 bdrv_reopen_perm(queue, reopen_state->bs,
3155 &reopen_state->perm, &reopen_state->shared_perm);
e971aa12
JC
3156
3157 ret = bdrv_flush(reopen_state->bs);
3158 if (ret) {
455b0fde 3159 error_setg_errno(errp, -ret, "Error flushing drive");
e971aa12
JC
3160 goto error;
3161 }
3162
3163 if (drv->bdrv_reopen_prepare) {
3164 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
3165 if (ret) {
3166 if (local_err != NULL) {
3167 error_propagate(errp, local_err);
3168 } else {
d8b6895f
LC
3169 error_setg(errp, "failed while preparing to reopen image '%s'",
3170 reopen_state->bs->filename);
e971aa12
JC
3171 }
3172 goto error;
3173 }
3174 } else {
3175 /* It is currently mandatory to have a bdrv_reopen_prepare()
3176 * handler for each supported drv. */
81e5f78a
AG
3177 error_setg(errp, "Block format '%s' used by node '%s' "
3178 "does not support reopening files", drv->format_name,
3179 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
3180 ret = -1;
3181 goto error;
3182 }
3183
4d2cb092
KW
3184 /* Options that are not handled are only okay if they are unchanged
3185 * compared to the old state. It is expected that some options are only
3186 * used for the initial open, but not reopen (e.g. filename) */
3187 if (qdict_size(reopen_state->options)) {
3188 const QDictEntry *entry = qdict_first(reopen_state->options);
3189
3190 do {
54fd1b0d
HR
3191 QObject *new = entry->value;
3192 QObject *old = qdict_get(reopen_state->bs->options, entry->key);
3193
129c7d1c 3194 /*
54fd1b0d
HR
3195 * TODO: When using -drive to specify blockdev options, all values
3196 * will be strings; however, when using -blockdev, blockdev-add or
3197 * filenames using the json:{} pseudo-protocol, they will be
3198 * correctly typed.
3199 * In contrast, reopening options are (currently) always strings
3200 * (because you can only specify them through qemu-io; all other
3201 * callers do not specify any options).
3202 * Therefore, when using anything other than -drive to create a BDS,
3203 * this cannot detect non-string options as unchanged, because
3204 * qobject_is_equal() always returns false for objects of different
3205 * type. In the future, this should be remedied by correctly typing
3206 * all options. For now, this is not too big of an issue because
3207 * the user can simply omit options which cannot be changed anyway,
3208 * so they will stay unchanged.
129c7d1c 3209 */
54fd1b0d 3210 if (!qobject_is_equal(new, old)) {
4d2cb092
KW
3211 error_setg(errp, "Cannot change the option '%s'", entry->key);
3212 ret = -EINVAL;
3213 goto error;
3214 }
3215 } while ((entry = qdict_next(reopen_state->options, entry)));
3216 }
3217
30450259
KW
3218 ret = bdrv_check_perm(reopen_state->bs, queue, reopen_state->perm,
3219 reopen_state->shared_perm, NULL, errp);
3220 if (ret < 0) {
3221 goto error;
3222 }
3223
e971aa12
JC
3224 ret = 0;
3225
3226error:
ccf9dc07 3227 qemu_opts_del(opts);
e971aa12
JC
3228 return ret;
3229}
3230
3231/*
3232 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
3233 * makes them final by swapping the staging BlockDriverState contents into
3234 * the active BlockDriverState contents.
3235 */
3236void bdrv_reopen_commit(BDRVReopenState *reopen_state)
3237{
3238 BlockDriver *drv;
50bf65ba 3239 BlockDriverState *bs;
cb9ff6c2 3240 bool old_can_write, new_can_write;
e971aa12
JC
3241
3242 assert(reopen_state != NULL);
50bf65ba
VSO
3243 bs = reopen_state->bs;
3244 drv = bs->drv;
e971aa12
JC
3245 assert(drv != NULL);
3246
cb9ff6c2
VSO
3247 old_can_write =
3248 !bdrv_is_read_only(bs) && !(bdrv_get_flags(bs) & BDRV_O_INACTIVE);
3249
e971aa12
JC
3250 /* If there are any driver level actions to take */
3251 if (drv->bdrv_reopen_commit) {
3252 drv->bdrv_reopen_commit(reopen_state);
3253 }
3254
3255 /* set BDS specific flags now */
cb3e7f08 3256 qobject_unref(bs->explicit_options);
145f598e 3257
50bf65ba
VSO
3258 bs->explicit_options = reopen_state->explicit_options;
3259 bs->open_flags = reopen_state->flags;
3260 bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 3261
50bf65ba 3262 bdrv_refresh_limits(bs, NULL);
cb9ff6c2 3263
30450259
KW
3264 bdrv_set_perm(reopen_state->bs, reopen_state->perm,
3265 reopen_state->shared_perm);
3266
cb9ff6c2
VSO
3267 new_can_write =
3268 !bdrv_is_read_only(bs) && !(bdrv_get_flags(bs) & BDRV_O_INACTIVE);
3269 if (!old_can_write && new_can_write && drv->bdrv_reopen_bitmaps_rw) {
3270 Error *local_err = NULL;
3271 if (drv->bdrv_reopen_bitmaps_rw(bs, &local_err) < 0) {
3272 /* This is not fatal, bitmaps just left read-only, so all following
3273 * writes will fail. User can remove read-only bitmaps to unblock
3274 * writes.
3275 */
3276 error_reportf_err(local_err,
3277 "%s: Failed to make dirty bitmaps writable: ",
3278 bdrv_get_node_name(bs));
3279 }
3280 }
e971aa12
JC
3281}
3282
3283/*
3284 * Abort the reopen, and delete and free the staged changes in
3285 * reopen_state
3286 */
3287void bdrv_reopen_abort(BDRVReopenState *reopen_state)
3288{
3289 BlockDriver *drv;
3290
3291 assert(reopen_state != NULL);
3292 drv = reopen_state->bs->drv;
3293 assert(drv != NULL);
3294
3295 if (drv->bdrv_reopen_abort) {
3296 drv->bdrv_reopen_abort(reopen_state);
3297 }
145f598e 3298
cb3e7f08 3299 qobject_unref(reopen_state->explicit_options);
30450259
KW
3300
3301 bdrv_abort_perm_update(reopen_state->bs);
e971aa12
JC
3302}
3303
3304
64dff520 3305static void bdrv_close(BlockDriverState *bs)
fc01f7e7 3306{
33384421 3307 BdrvAioNotifier *ban, *ban_next;
50a3efb0 3308 BdrvChild *child, *next;
33384421 3309
ca9bd24c 3310 assert(!bs->job);
30f55fb8 3311 assert(!bs->refcnt);
99b7e775 3312
fc27291d 3313 bdrv_drained_begin(bs); /* complete I/O */
58fda173 3314 bdrv_flush(bs);
53ec73e2 3315 bdrv_drain(bs); /* in case flush left pending I/O */
fc27291d 3316
3cbc002c 3317 if (bs->drv) {
9a7dedbc 3318 bs->drv->bdrv_close(bs);
9a4f4c31 3319 bs->drv = NULL;
50a3efb0 3320 }
9a7dedbc 3321
50a3efb0 3322 bdrv_set_backing_hd(bs, NULL, &error_abort);
9a7dedbc 3323
50a3efb0
AG
3324 if (bs->file != NULL) {
3325 bdrv_unref_child(bs, bs->file);
3326 bs->file = NULL;
3327 }
9a4f4c31 3328
50a3efb0
AG
3329 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
3330 /* TODO Remove bdrv_unref() from drivers' close function and use
3331 * bdrv_unref_child() here */
3332 if (child->bs->inherits_from == bs) {
3333 child->bs->inherits_from = NULL;
6e93e7c4 3334 }
50a3efb0 3335 bdrv_detach_child(child);
b338082b 3336 }
98f90dba 3337
50a3efb0
AG
3338 g_free(bs->opaque);
3339 bs->opaque = NULL;
3340 atomic_set(&bs->copy_on_read, 0);
3341 bs->backing_file[0] = '\0';
3342 bs->backing_format[0] = '\0';
3343 bs->total_sectors = 0;
3344 bs->encrypted = false;
3345 bs->sg = false;
cb3e7f08
MAL
3346 qobject_unref(bs->options);
3347 qobject_unref(bs->explicit_options);
50a3efb0
AG
3348 bs->options = NULL;
3349 bs->explicit_options = NULL;
cb3e7f08 3350 qobject_unref(bs->full_open_options);
50a3efb0
AG
3351 bs->full_open_options = NULL;
3352
cca43ae1
VSO
3353 bdrv_release_named_dirty_bitmaps(bs);
3354 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
3355
33384421
HR
3356 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
3357 g_free(ban);
3358 }
3359 QLIST_INIT(&bs->aio_notifiers);
fc27291d 3360 bdrv_drained_end(bs);
b338082b
FB
3361}
3362
2bc93fed
MK
3363void bdrv_close_all(void)
3364{
3d70ff53
KW
3365 /* TODO We do want to cancel all jobs instead of just block jobs on
3366 * shutdown, but bdrv_close_all() isn't the right place any more. */
3367 job_cancel_sync_all();
cd7fca95 3368 nbd_export_close_all();
ca9bd24c
HR
3369
3370 /* Drop references from requests still in flight, such as canceled block
3371 * jobs whose AIO context has not been polled yet */
3372 bdrv_drain_all();
2bc93fed 3373
ca9bd24c
HR
3374 blk_remove_all_bs();
3375 blockdev_close_all_bdrv_states();
ed78cda3 3376
a1a2af07 3377 assert(QTAILQ_EMPTY(&all_bdrv_states));
2bc93fed
MK
3378}
3379
d0ac0380
KW
3380static bool should_update_child(BdrvChild *c, BlockDriverState *to)
3381{
3382 BdrvChild *to_c;
3383
3384 if (c->role->stay_at_node) {
3385 return false;
3386 }
3387
3388 if (c->role == &child_backing) {
3389 /* If @from is a backing file of @to, ignore the child to avoid
3390 * creating a loop. We only want to change the pointer of other
3391 * parents. */
3392 QLIST_FOREACH(to_c, &to->children, next) {
3393 if (to_c == c) {
3394 break;
3395 }
3396 }
3397 if (to_c) {
3398 return false;
3399 }
3400 }
3401
3402 return true;
3403}
3404
5fe31c25
KW
3405void bdrv_replace_node(BlockDriverState *from, BlockDriverState *to,
3406 Error **errp)
dd62f1ca 3407{
d0ac0380 3408 BdrvChild *c, *next;
234ac1a9
KW
3409 GSList *list = NULL, *p;
3410 uint64_t old_perm, old_shared;
3411 uint64_t perm = 0, shared = BLK_PERM_ALL;
3412 int ret;
3413
5fe31c25
KW
3414 assert(!atomic_read(&from->in_flight));
3415 assert(!atomic_read(&to->in_flight));
dd62f1ca 3416
234ac1a9
KW
3417 /* Make sure that @from doesn't go away until we have successfully attached
3418 * all of its parents to @to. */
3419 bdrv_ref(from);
dd62f1ca 3420
234ac1a9 3421 /* Put all parents into @list and calculate their cumulative permissions */
dd62f1ca 3422 QLIST_FOREACH_SAFE(c, &from->parents, next_parent, next) {
d0ac0380 3423 if (!should_update_child(c, to)) {
26de9438
KW
3424 continue;
3425 }
234ac1a9
KW
3426 list = g_slist_prepend(list, c);
3427 perm |= c->perm;
3428 shared &= c->shared_perm;
3429 }
3430
3431 /* Check whether the required permissions can be granted on @to, ignoring
3432 * all BdrvChild in @list so that they can't block themselves. */
3121fb45 3433 ret = bdrv_check_update_perm(to, NULL, perm, shared, list, errp);
234ac1a9
KW
3434 if (ret < 0) {
3435 bdrv_abort_perm_update(to);
3436 goto out;
3437 }
3438
3439 /* Now actually perform the change. We performed the permission check for
3440 * all elements of @list at once, so set the permissions all at once at the
3441 * very end. */
3442 for (p = list; p != NULL; p = p->next) {
3443 c = p->data;
9bd910e2 3444
dd62f1ca 3445 bdrv_ref(to);
234ac1a9 3446 bdrv_replace_child_noperm(c, to);
dd62f1ca
KW
3447 bdrv_unref(from);
3448 }
234ac1a9
KW
3449
3450 bdrv_get_cumulative_perm(to, &old_perm, &old_shared);
3451 bdrv_set_perm(to, old_perm | perm, old_shared | shared);
3452
3453out:
3454 g_slist_free(list);
3455 bdrv_unref(from);
dd62f1ca
KW
3456}
3457
4ddc07ca
PB
3458/*
3459 * Add new bs contents at the top of an image chain while the chain is
3460 * live, while keeping required fields on the top layer.
3461 *
3462 * This will modify the BlockDriverState fields, and swap contents
3463 * between bs_new and bs_top. Both bs_new and bs_top are modified.
3464 *
bfb197e0 3465 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
3466 *
3467 * This function does not create any image files.
dd62f1ca
KW
3468 *
3469 * bdrv_append() takes ownership of a bs_new reference and unrefs it because
3470 * that's what the callers commonly need. bs_new will be referenced by the old
3471 * parents of bs_top after bdrv_append() returns. If the caller needs to keep a
3472 * reference of its own, it must call bdrv_ref().
4ddc07ca 3473 */
b2c2832c
KW
3474void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top,
3475 Error **errp)
4ddc07ca 3476{
b2c2832c
KW
3477 Error *local_err = NULL;
3478
b2c2832c
KW
3479 bdrv_set_backing_hd(bs_new, bs_top, &local_err);
3480 if (local_err) {
3481 error_propagate(errp, local_err);
3482 goto out;
3483 }
dd62f1ca 3484
5fe31c25 3485 bdrv_replace_node(bs_top, bs_new, &local_err);
234ac1a9
KW
3486 if (local_err) {
3487 error_propagate(errp, local_err);
3488 bdrv_set_backing_hd(bs_new, NULL, &error_abort);
3489 goto out;
3490 }
4ddc07ca 3491
dd62f1ca
KW
3492 /* bs_new is now referenced by its new parents, we don't need the
3493 * additional reference any more. */
b2c2832c 3494out:
dd62f1ca 3495 bdrv_unref(bs_new);
8802d1fd
JC
3496}
3497
4f6fd349 3498static void bdrv_delete(BlockDriverState *bs)
b338082b 3499{
3e914655 3500 assert(!bs->job);
3718d8ab 3501 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 3502 assert(!bs->refcnt);
18846dee 3503
e1b5c52e
SH
3504 bdrv_close(bs);
3505
1b7bdbc1 3506 /* remove from list, if necessary */
63eaaae0
KW
3507 if (bs->node_name[0] != '\0') {
3508 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
3509 }
2c1d04e0
HR
3510 QTAILQ_REMOVE(&all_bdrv_states, bs, bs_list);
3511
7267c094 3512 g_free(bs);
fc01f7e7
FB
3513}
3514
e97fc193
AL
3515/*
3516 * Run consistency checks on an image
3517 *
e076f338 3518 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 3519 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 3520 * check are stored in res.
e97fc193 3521 */
2fd61638
PB
3522static int coroutine_fn bdrv_co_check(BlockDriverState *bs,
3523 BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 3524{
908bcd54
HR
3525 if (bs->drv == NULL) {
3526 return -ENOMEDIUM;
3527 }
2fd61638 3528 if (bs->drv->bdrv_co_check == NULL) {
e97fc193
AL
3529 return -ENOTSUP;
3530 }
3531
e076f338 3532 memset(res, 0, sizeof(*res));
2fd61638
PB
3533 return bs->drv->bdrv_co_check(bs, res, fix);
3534}
3535
3536typedef struct CheckCo {
3537 BlockDriverState *bs;
3538 BdrvCheckResult *res;
3539 BdrvCheckMode fix;
3540 int ret;
3541} CheckCo;
3542
3543static void bdrv_check_co_entry(void *opaque)
3544{
3545 CheckCo *cco = opaque;
3546 cco->ret = bdrv_co_check(cco->bs, cco->res, cco->fix);
3547}
3548
3549int bdrv_check(BlockDriverState *bs,
3550 BdrvCheckResult *res, BdrvCheckMode fix)
3551{
3552 Coroutine *co;
3553 CheckCo cco = {
3554 .bs = bs,
3555 .res = res,
3556 .ret = -EINPROGRESS,
3557 .fix = fix,
3558 };
3559
3560 if (qemu_in_coroutine()) {
3561 /* Fast-path if already in coroutine context */
3562 bdrv_check_co_entry(&cco);
3563 } else {
3564 co = qemu_coroutine_create(bdrv_check_co_entry, &cco);
3565 qemu_coroutine_enter(co);
3566 BDRV_POLL_WHILE(bs, cco.ret == -EINPROGRESS);
3567 }
3568
3569 return cco.ret;
e97fc193
AL
3570}
3571
756e6736
KW
3572/*
3573 * Return values:
3574 * 0 - success
3575 * -EINVAL - backing format specified, but no file
3576 * -ENOSPC - can't update the backing file because no space is left in the
3577 * image file header
3578 * -ENOTSUP - format driver doesn't support changing the backing file
3579 */
3580int bdrv_change_backing_file(BlockDriverState *bs,
3581 const char *backing_file, const char *backing_fmt)
3582{
3583 BlockDriver *drv = bs->drv;
469ef350 3584 int ret;
756e6736 3585
d470ad42
HR
3586 if (!drv) {
3587 return -ENOMEDIUM;
3588 }
3589
5f377794
PB
3590 /* Backing file format doesn't make sense without a backing file */
3591 if (backing_fmt && !backing_file) {
3592 return -EINVAL;
3593 }
3594
756e6736 3595 if (drv->bdrv_change_backing_file != NULL) {
469ef350 3596 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 3597 } else {
469ef350 3598 ret = -ENOTSUP;
756e6736 3599 }
469ef350
PB
3600
3601 if (ret == 0) {
3602 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
3603 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
3604 }
3605 return ret;
756e6736
KW
3606}
3607
6ebdcee2
JC
3608/*
3609 * Finds the image layer in the chain that has 'bs' as its backing file.
3610 *
3611 * active is the current topmost image.
3612 *
3613 * Returns NULL if bs is not found in active's image chain,
3614 * or if active == bs.
4caf0fcd
JC
3615 *
3616 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
3617 */
3618BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
3619 BlockDriverState *bs)
3620{
760e0063
KW
3621 while (active && bs != backing_bs(active)) {
3622 active = backing_bs(active);
6ebdcee2
JC
3623 }
3624
4caf0fcd
JC
3625 return active;
3626}
6ebdcee2 3627
4caf0fcd
JC
3628/* Given a BDS, searches for the base layer. */
3629BlockDriverState *bdrv_find_base(BlockDriverState *bs)
3630{
3631 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
3632}
3633
6ebdcee2
JC
3634/*
3635 * Drops images above 'base' up to and including 'top', and sets the image
3636 * above 'top' to have base as its backing file.
3637 *
3638 * Requires that the overlay to 'top' is opened r/w, so that the backing file
3639 * information in 'bs' can be properly updated.
3640 *
3641 * E.g., this will convert the following chain:
3642 * bottom <- base <- intermediate <- top <- active
3643 *
3644 * to
3645 *
3646 * bottom <- base <- active
3647 *
3648 * It is allowed for bottom==base, in which case it converts:
3649 *
3650 * base <- intermediate <- top <- active
3651 *
3652 * to
3653 *
3654 * base <- active
3655 *
54e26900
JC
3656 * If backing_file_str is non-NULL, it will be used when modifying top's
3657 * overlay image metadata.
3658 *
6ebdcee2
JC
3659 * Error conditions:
3660 * if active == top, that is considered an error
3661 *
3662 */
bde70715
KW
3663int bdrv_drop_intermediate(BlockDriverState *top, BlockDriverState *base,
3664 const char *backing_file_str)
6ebdcee2 3665{
61f09cea 3666 BdrvChild *c, *next;
12fa4af6 3667 Error *local_err = NULL;
6ebdcee2
JC
3668 int ret = -EIO;
3669
6858eba0
KW
3670 bdrv_ref(top);
3671
6ebdcee2
JC
3672 if (!top->drv || !base->drv) {
3673 goto exit;
3674 }
3675
5db15a57
KW
3676 /* Make sure that base is in the backing chain of top */
3677 if (!bdrv_chain_contains(top, base)) {
6ebdcee2
JC
3678 goto exit;
3679 }
3680
3681 /* success - we can delete the intermediate states, and link top->base */
bde70715
KW
3682 /* TODO Check graph modification op blockers (BLK_PERM_GRAPH_MOD) once
3683 * we've figured out how they should work. */
61f09cea
KW
3684 backing_file_str = backing_file_str ? backing_file_str : base->filename;
3685
3686 QLIST_FOREACH_SAFE(c, &top->parents, next_parent, next) {
3687 /* Check whether we are allowed to switch c from top to base */
3688 GSList *ignore_children = g_slist_prepend(NULL, c);
3689 bdrv_check_update_perm(base, NULL, c->perm, c->shared_perm,
3690 ignore_children, &local_err);
2c860e79 3691 g_slist_free(ignore_children);
61f09cea
KW
3692 if (local_err) {
3693 ret = -EPERM;
3694 error_report_err(local_err);
6858eba0
KW
3695 goto exit;
3696 }
12fa4af6 3697
61f09cea
KW
3698 /* If so, update the backing file path in the image file */
3699 if (c->role->update_filename) {
3700 ret = c->role->update_filename(c, base, backing_file_str,
3701 &local_err);
3702 if (ret < 0) {
3703 bdrv_abort_perm_update(base);
3704 error_report_err(local_err);
3705 goto exit;
3706 }
3707 }
3708
3709 /* Do the actual switch in the in-memory graph.
3710 * Completes bdrv_check_update_perm() transaction internally. */
3711 bdrv_ref(base);
3712 bdrv_replace_child(c, base);
3713 bdrv_unref(top);
12fa4af6 3714 }
6ebdcee2 3715
6ebdcee2 3716 ret = 0;
6ebdcee2 3717exit:
6858eba0 3718 bdrv_unref(top);
6ebdcee2
JC
3719 return ret;
3720}
3721
61007b31
SH
3722/**
3723 * Truncate file to 'offset' bytes (needed only for file protocols)
3724 */
7ea37c30
HR
3725int bdrv_truncate(BdrvChild *child, int64_t offset, PreallocMode prealloc,
3726 Error **errp)
71d0770c 3727{
52cdbc58 3728 BlockDriverState *bs = child->bs;
61007b31
SH
3729 BlockDriver *drv = bs->drv;
3730 int ret;
c8f6d58e 3731
362b3786 3732 assert(child->perm & BLK_PERM_RESIZE);
c8f6d58e 3733
5a612c00 3734 /* if bs->drv == NULL, bs is closed, so there's nothing to do here */
ed3d2ec9
HR
3735 if (!drv) {
3736 error_setg(errp, "No medium inserted");
71d0770c 3737 return -ENOMEDIUM;
ed3d2ec9 3738 }
cd8b7aaa
KW
3739 if (offset < 0) {
3740 error_setg(errp, "Image size cannot be negative");
3741 return -EINVAL;
3742 }
3743
ed3d2ec9 3744 if (!drv->bdrv_truncate) {
5a612c00
MP
3745 if (bs->file && drv->is_filter) {
3746 return bdrv_truncate(bs->file, offset, prealloc, errp);
3747 }
ed3d2ec9 3748 error_setg(errp, "Image format driver does not support resize");
61007b31 3749 return -ENOTSUP;
ed3d2ec9
HR
3750 }
3751 if (bs->read_only) {
3752 error_setg(errp, "Image is read-only");
61007b31 3753 return -EACCES;
ed3d2ec9 3754 }
71d0770c 3755
504c205a
DL
3756 assert(!(bs->open_flags & BDRV_O_INACTIVE));
3757
7ea37c30 3758 ret = drv->bdrv_truncate(bs, offset, prealloc, errp);
1b6cc579
EB
3759 if (ret < 0) {
3760 return ret;
3761 }
3762 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
3763 if (ret < 0) {
3764 error_setg_errno(errp, -ret, "Could not refresh total sector count");
3765 } else {
3766 offset = bs->total_sectors * BDRV_SECTOR_SIZE;
c0191e76 3767 }
1b6cc579
EB
3768 bdrv_dirty_bitmap_truncate(bs, offset);
3769 bdrv_parent_cb_resize(bs);
3770 atomic_inc(&bs->write_gen);
61007b31 3771 return ret;
71d0770c
AL
3772}
3773
61007b31
SH
3774/**
3775 * Length of a allocated file in bytes. Sparse files are counted by actual
3776 * allocated space. Return < 0 if error or unknown.
3777 */
3778int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 3779{
61007b31
SH
3780 BlockDriver *drv = bs->drv;
3781 if (!drv) {
3782 return -ENOMEDIUM;
8f4754ed 3783 }
61007b31
SH
3784 if (drv->bdrv_get_allocated_file_size) {
3785 return drv->bdrv_get_allocated_file_size(bs);
3786 }
3787 if (bs->file) {
9a4f4c31 3788 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 3789 }
61007b31 3790 return -ENOTSUP;
1c9805a3 3791}
e7a8a783 3792
90880ff1
SH
3793/*
3794 * bdrv_measure:
3795 * @drv: Format driver
3796 * @opts: Creation options for new image
3797 * @in_bs: Existing image containing data for new image (may be NULL)
3798 * @errp: Error object
3799 * Returns: A #BlockMeasureInfo (free using qapi_free_BlockMeasureInfo())
3800 * or NULL on error
3801 *
3802 * Calculate file size required to create a new image.
3803 *
3804 * If @in_bs is given then space for allocated clusters and zero clusters
3805 * from that image are included in the calculation. If @opts contains a
3806 * backing file that is shared by @in_bs then backing clusters may be omitted
3807 * from the calculation.
3808 *
3809 * If @in_bs is NULL then the calculation includes no allocated clusters
3810 * unless a preallocation option is given in @opts.
3811 *
3812 * Note that @in_bs may use a different BlockDriver from @drv.
3813 *
3814 * If an error occurs the @errp pointer is set.
3815 */
3816BlockMeasureInfo *bdrv_measure(BlockDriver *drv, QemuOpts *opts,
3817 BlockDriverState *in_bs, Error **errp)
3818{
3819 if (!drv->bdrv_measure) {
3820 error_setg(errp, "Block driver '%s' does not support size measurement",
3821 drv->format_name);
3822 return NULL;
3823 }
3824
3825 return drv->bdrv_measure(opts, in_bs, errp);
3826}
3827
61007b31
SH
3828/**
3829 * Return number of sectors on success, -errno on error.
1c9805a3 3830 */
61007b31 3831int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 3832{
61007b31 3833 BlockDriver *drv = bs->drv;
498e386c 3834
61007b31
SH
3835 if (!drv)
3836 return -ENOMEDIUM;
2572b37a 3837
61007b31
SH
3838 if (drv->has_variable_length) {
3839 int ret = refresh_total_sectors(bs, bs->total_sectors);
3840 if (ret < 0) {
3841 return ret;
1c9805a3
SH
3842 }
3843 }
61007b31 3844 return bs->total_sectors;
1c9805a3 3845}
b338082b 3846
61007b31
SH
3847/**
3848 * Return length in bytes on success, -errno on error.
3849 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 3850 */
61007b31 3851int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 3852{
61007b31 3853 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 3854
4a9c9ea0 3855 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 3856 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
3857}
3858
61007b31
SH
3859/* return 0 as number of sectors if no device present or error */
3860void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 3861{
61007b31 3862 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 3863
61007b31 3864 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
3865}
3866
54115412 3867bool bdrv_is_sg(BlockDriverState *bs)
f08145fe 3868{
61007b31 3869 return bs->sg;
f08145fe
KW
3870}
3871
54115412 3872bool bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 3873{
760e0063 3874 if (bs->backing && bs->backing->bs->encrypted) {
54115412 3875 return true;
760e0063 3876 }
61007b31 3877 return bs->encrypted;
fc3959e4
FZ
3878}
3879
61007b31 3880const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 3881{
61007b31 3882 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
3883}
3884
61007b31 3885static int qsort_strcmp(const void *a, const void *b)
40b4f539 3886{
ceff5bd7 3887 return strcmp(*(char *const *)a, *(char *const *)b);
40b4f539
KW
3888}
3889
61007b31
SH
3890void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
3891 void *opaque)
40b4f539 3892{
61007b31
SH
3893 BlockDriver *drv;
3894 int count = 0;
3895 int i;
3896 const char **formats = NULL;
40b4f539 3897
61007b31
SH
3898 QLIST_FOREACH(drv, &bdrv_drivers, list) {
3899 if (drv->format_name) {
3900 bool found = false;
3901 int i = count;
3902 while (formats && i && !found) {
3903 found = !strcmp(formats[--i], drv->format_name);
3904 }
e2a305fb 3905
61007b31
SH
3906 if (!found) {
3907 formats = g_renew(const char *, formats, count + 1);
3908 formats[count++] = drv->format_name;
3909 }
6c5a42ac 3910 }
61007b31 3911 }
6c5a42ac 3912
eb0df69f
HR
3913 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); i++) {
3914 const char *format_name = block_driver_modules[i].format_name;
3915
3916 if (format_name) {
3917 bool found = false;
3918 int j = count;
3919
3920 while (formats && j && !found) {
3921 found = !strcmp(formats[--j], format_name);
3922 }
3923
3924 if (!found) {
3925 formats = g_renew(const char *, formats, count + 1);
3926 formats[count++] = format_name;
3927 }
3928 }
3929 }
3930
61007b31 3931 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 3932
61007b31
SH
3933 for (i = 0; i < count; i++) {
3934 it(opaque, formats[i]);
3935 }
40b4f539 3936
61007b31
SH
3937 g_free(formats);
3938}
40b4f539 3939
61007b31
SH
3940/* This function is to find a node in the bs graph */
3941BlockDriverState *bdrv_find_node(const char *node_name)
3942{
3943 BlockDriverState *bs;
391827eb 3944
61007b31 3945 assert(node_name);
40b4f539 3946
61007b31
SH
3947 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
3948 if (!strcmp(node_name, bs->node_name)) {
3949 return bs;
40b4f539
KW
3950 }
3951 }
61007b31 3952 return NULL;
40b4f539
KW
3953}
3954
61007b31
SH
3955/* Put this QMP function here so it can access the static graph_bdrv_states. */
3956BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 3957{
61007b31
SH
3958 BlockDeviceInfoList *list, *entry;
3959 BlockDriverState *bs;
40b4f539 3960
61007b31
SH
3961 list = NULL;
3962 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
c83f9fba 3963 BlockDeviceInfo *info = bdrv_block_device_info(NULL, bs, errp);
61007b31
SH
3964 if (!info) {
3965 qapi_free_BlockDeviceInfoList(list);
3966 return NULL;
301db7c2 3967 }
61007b31
SH
3968 entry = g_malloc0(sizeof(*entry));
3969 entry->value = info;
3970 entry->next = list;
3971 list = entry;
301db7c2
RH
3972 }
3973
61007b31
SH
3974 return list;
3975}
40b4f539 3976
61007b31
SH
3977BlockDriverState *bdrv_lookup_bs(const char *device,
3978 const char *node_name,
3979 Error **errp)
3980{
3981 BlockBackend *blk;
3982 BlockDriverState *bs;
40b4f539 3983
61007b31
SH
3984 if (device) {
3985 blk = blk_by_name(device);
40b4f539 3986
61007b31 3987 if (blk) {
9f4ed6fb
AG
3988 bs = blk_bs(blk);
3989 if (!bs) {
5433c24f 3990 error_setg(errp, "Device '%s' has no medium", device);
5433c24f
HR
3991 }
3992
9f4ed6fb 3993 return bs;
61007b31
SH
3994 }
3995 }
40b4f539 3996
61007b31
SH
3997 if (node_name) {
3998 bs = bdrv_find_node(node_name);
6d519a5f 3999
61007b31
SH
4000 if (bs) {
4001 return bs;
4002 }
40b4f539
KW
4003 }
4004
61007b31
SH
4005 error_setg(errp, "Cannot find device=%s nor node_name=%s",
4006 device ? device : "",
4007 node_name ? node_name : "");
4008 return NULL;
40b4f539
KW
4009}
4010
61007b31
SH
4011/* If 'base' is in the same chain as 'top', return true. Otherwise,
4012 * return false. If either argument is NULL, return false. */
4013bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 4014{
61007b31 4015 while (top && top != base) {
760e0063 4016 top = backing_bs(top);
02c50efe 4017 }
61007b31
SH
4018
4019 return top != NULL;
02c50efe
FZ
4020}
4021
61007b31 4022BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 4023{
61007b31
SH
4024 if (!bs) {
4025 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 4026 }
61007b31 4027 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
4028}
4029
61007b31 4030const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 4031{
61007b31 4032 return bs->node_name;
beac80cd
FB
4033}
4034
1f0c461b 4035const char *bdrv_get_parent_name(const BlockDriverState *bs)
4c265bf9
KW
4036{
4037 BdrvChild *c;
4038 const char *name;
4039
4040 /* If multiple parents have a name, just pick the first one. */
4041 QLIST_FOREACH(c, &bs->parents, next_parent) {
4042 if (c->role->get_name) {
4043 name = c->role->get_name(c);
4044 if (name && *name) {
4045 return name;
4046 }
4047 }
4048 }
4049
4050 return NULL;
4051}
4052
61007b31
SH
4053/* TODO check what callers really want: bs->node_name or blk_name() */
4054const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 4055{
4c265bf9 4056 return bdrv_get_parent_name(bs) ?: "";
f141eafe 4057}
83f64091 4058
61007b31
SH
4059/* This can be used to identify nodes that might not have a device
4060 * name associated. Since node and device names live in the same
4061 * namespace, the result is unambiguous. The exception is if both are
4062 * absent, then this returns an empty (non-null) string. */
4063const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 4064{
4c265bf9 4065 return bdrv_get_parent_name(bs) ?: bs->node_name;
beac80cd 4066}
beac80cd 4067
61007b31 4068int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 4069{
61007b31 4070 return bs->open_flags;
0b5a2445
PB
4071}
4072
61007b31 4073int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 4074{
61007b31 4075 return 1;
0b5a2445
PB
4076}
4077
61007b31 4078int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 4079{
d470ad42
HR
4080 if (!bs->drv) {
4081 return 0;
4082 }
0b5a2445 4083
61007b31
SH
4084 /* If BS is a copy on write image, it is initialized to
4085 the contents of the base image, which may not be zeroes. */
760e0063 4086 if (bs->backing) {
61007b31
SH
4087 return 0;
4088 }
4089 if (bs->drv->bdrv_has_zero_init) {
4090 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 4091 }
5a612c00
MP
4092 if (bs->file && bs->drv->is_filter) {
4093 return bdrv_has_zero_init(bs->file->bs);
4094 }
61007b31
SH
4095
4096 /* safe default */
4097 return 0;
68485420
KW
4098}
4099
61007b31 4100bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 4101{
61007b31 4102 BlockDriverInfo bdi;
b2a61371 4103
760e0063 4104 if (bs->backing) {
61007b31
SH
4105 return false;
4106 }
4107
4108 if (bdrv_get_info(bs, &bdi) == 0) {
4109 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
4110 }
4111
61007b31 4112 return false;
b2a61371
SH
4113}
4114
61007b31 4115bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 4116{
2f0342ef 4117 if (!(bs->open_flags & BDRV_O_UNMAP)) {
61007b31
SH
4118 return false;
4119 }
68485420 4120
e24d813b 4121 return bs->supported_zero_flags & BDRV_REQ_MAY_UNMAP;
68485420
KW
4122}
4123
61007b31 4124const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 4125{
760e0063 4126 if (bs->backing && bs->backing->bs->encrypted)
61007b31
SH
4127 return bs->backing_file;
4128 else if (bs->encrypted)
4129 return bs->filename;
4130 else
4131 return NULL;
b2e12bc6
CH
4132}
4133
61007b31
SH
4134void bdrv_get_backing_filename(BlockDriverState *bs,
4135 char *filename, int filename_size)
016f5cf6 4136{
61007b31
SH
4137 pstrcpy(filename, filename_size, bs->backing_file);
4138}
d318aea9 4139
61007b31
SH
4140int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
4141{
4142 BlockDriver *drv = bs->drv;
5a612c00
MP
4143 /* if bs->drv == NULL, bs is closed, so there's nothing to do here */
4144 if (!drv) {
61007b31 4145 return -ENOMEDIUM;
5a612c00
MP
4146 }
4147 if (!drv->bdrv_get_info) {
4148 if (bs->file && drv->is_filter) {
4149 return bdrv_get_info(bs->file->bs, bdi);
4150 }
61007b31 4151 return -ENOTSUP;
5a612c00 4152 }
61007b31
SH
4153 memset(bdi, 0, sizeof(*bdi));
4154 return drv->bdrv_get_info(bs, bdi);
4155}
016f5cf6 4156
61007b31
SH
4157ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
4158{
4159 BlockDriver *drv = bs->drv;
4160 if (drv && drv->bdrv_get_specific_info) {
4161 return drv->bdrv_get_specific_info(bs);
4162 }
4163 return NULL;
016f5cf6
AG
4164}
4165
a31939e6 4166void bdrv_debug_event(BlockDriverState *bs, BlkdebugEvent event)
4265d620 4167{
61007b31
SH
4168 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
4169 return;
4170 }
4265d620 4171
61007b31 4172 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
4173}
4174
61007b31
SH
4175int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
4176 const char *tag)
4265d620 4177{
61007b31 4178 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 4179 bs = bs->file ? bs->file->bs : NULL;
61007b31 4180 }
4265d620 4181
61007b31
SH
4182 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
4183 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
4184 }
4265d620 4185
61007b31 4186 return -ENOTSUP;
4265d620
PB
4187}
4188
61007b31 4189int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 4190{
61007b31 4191 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 4192 bs = bs->file ? bs->file->bs : NULL;
61007b31 4193 }
ce1a14dc 4194
61007b31
SH
4195 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
4196 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
4197 }
4198
4199 return -ENOTSUP;
eb852011
MA
4200}
4201
61007b31 4202int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 4203{
61007b31 4204 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 4205 bs = bs->file ? bs->file->bs : NULL;
61007b31 4206 }
ce1a14dc 4207
61007b31
SH
4208 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
4209 return bs->drv->bdrv_debug_resume(bs, tag);
4210 }
ce1a14dc 4211
61007b31 4212 return -ENOTSUP;
f197fe2b
FZ
4213}
4214
61007b31 4215bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 4216{
61007b31 4217 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 4218 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 4219 }
19cb3738 4220
61007b31
SH
4221 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
4222 return bs->drv->bdrv_debug_is_suspended(bs, tag);
4223 }
f9f05dc5 4224
61007b31
SH
4225 return false;
4226}
f9f05dc5 4227
61007b31
SH
4228/* backing_file can either be relative, or absolute, or a protocol. If it is
4229 * relative, it must be relative to the chain. So, passing in bs->filename
4230 * from a BDS as backing_file should not be done, as that may be relative to
4231 * the CWD rather than the chain. */
4232BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
4233 const char *backing_file)
f9f05dc5 4234{
61007b31
SH
4235 char *filename_full = NULL;
4236 char *backing_file_full = NULL;
4237 char *filename_tmp = NULL;
4238 int is_protocol = 0;
4239 BlockDriverState *curr_bs = NULL;
4240 BlockDriverState *retval = NULL;
418661e0 4241 Error *local_error = NULL;
f9f05dc5 4242
61007b31
SH
4243 if (!bs || !bs->drv || !backing_file) {
4244 return NULL;
f9f05dc5
KW
4245 }
4246
61007b31
SH
4247 filename_full = g_malloc(PATH_MAX);
4248 backing_file_full = g_malloc(PATH_MAX);
4249 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 4250
61007b31 4251 is_protocol = path_has_protocol(backing_file);
f9f05dc5 4252
760e0063 4253 for (curr_bs = bs; curr_bs->backing; curr_bs = curr_bs->backing->bs) {
f9f05dc5 4254
61007b31
SH
4255 /* If either of the filename paths is actually a protocol, then
4256 * compare unmodified paths; otherwise make paths relative */
4257 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
4258 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
760e0063 4259 retval = curr_bs->backing->bs;
61007b31
SH
4260 break;
4261 }
418661e0
JC
4262 /* Also check against the full backing filename for the image */
4263 bdrv_get_full_backing_filename(curr_bs, backing_file_full, PATH_MAX,
4264 &local_error);
4265 if (local_error == NULL) {
4266 if (strcmp(backing_file, backing_file_full) == 0) {
4267 retval = curr_bs->backing->bs;
4268 break;
4269 }
4270 } else {
4271 error_free(local_error);
4272 local_error = NULL;
4273 }
61007b31
SH
4274 } else {
4275 /* If not an absolute filename path, make it relative to the current
4276 * image's filename path */
4277 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
4278 backing_file);
f9f05dc5 4279
61007b31
SH
4280 /* We are going to compare absolute pathnames */
4281 if (!realpath(filename_tmp, filename_full)) {
4282 continue;
4283 }
07f07615 4284
61007b31
SH
4285 /* We need to make sure the backing filename we are comparing against
4286 * is relative to the current image filename (or absolute) */
4287 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
4288 curr_bs->backing_file);
07f07615 4289
61007b31
SH
4290 if (!realpath(filename_tmp, backing_file_full)) {
4291 continue;
4292 }
eb489bb1 4293
61007b31 4294 if (strcmp(backing_file_full, filename_full) == 0) {
760e0063 4295 retval = curr_bs->backing->bs;
61007b31
SH
4296 break;
4297 }
4298 }
eb489bb1
KW
4299 }
4300
61007b31
SH
4301 g_free(filename_full);
4302 g_free(backing_file_full);
4303 g_free(filename_tmp);
4304 return retval;
4305}
4306
61007b31
SH
4307void bdrv_init(void)
4308{
4309 module_call_init(MODULE_INIT_BLOCK);
4310}
29cdb251 4311
61007b31
SH
4312void bdrv_init_with_whitelist(void)
4313{
4314 use_bdrv_whitelist = 1;
4315 bdrv_init();
07f07615
PB
4316}
4317
2b148f39
PB
4318static void coroutine_fn bdrv_co_invalidate_cache(BlockDriverState *bs,
4319 Error **errp)
0f15423c 4320{
4417ab7a 4321 BdrvChild *child, *parent;
9c5e6594 4322 uint64_t perm, shared_perm;
5a8a30db
KW
4323 Error *local_err = NULL;
4324 int ret;
4325
3456a8d1
KW
4326 if (!bs->drv) {
4327 return;
4328 }
4329
04c01a5c 4330 if (!(bs->open_flags & BDRV_O_INACTIVE)) {
7ea2d269
AK
4331 return;
4332 }
7ea2d269 4333
16e977d5 4334 QLIST_FOREACH(child, &bs->children, next) {
2b148f39 4335 bdrv_co_invalidate_cache(child->bs, &local_err);
0d1c5c91 4336 if (local_err) {
0d1c5c91
FZ
4337 error_propagate(errp, local_err);
4338 return;
4339 }
5a8a30db 4340 }
0d1c5c91 4341
dafe0960
KW
4342 /*
4343 * Update permissions, they may differ for inactive nodes.
4344 *
4345 * Note that the required permissions of inactive images are always a
4346 * subset of the permissions required after activating the image. This
4347 * allows us to just get the permissions upfront without restricting
4348 * drv->bdrv_invalidate_cache().
4349 *
4350 * It also means that in error cases, we don't have to try and revert to
4351 * the old permissions (which is an operation that could fail, too). We can
4352 * just keep the extended permissions for the next time that an activation
4353 * of the image is tried.
4354 */
16e977d5 4355 bs->open_flags &= ~BDRV_O_INACTIVE;
dafe0960
KW
4356 bdrv_get_cumulative_perm(bs, &perm, &shared_perm);
4357 ret = bdrv_check_perm(bs, NULL, perm, shared_perm, NULL, &local_err);
4358 if (ret < 0) {
4359 bs->open_flags |= BDRV_O_INACTIVE;
4360 error_propagate(errp, local_err);
4361 return;
4362 }
4363 bdrv_set_perm(bs, perm, shared_perm);
4364
2b148f39
PB
4365 if (bs->drv->bdrv_co_invalidate_cache) {
4366 bs->drv->bdrv_co_invalidate_cache(bs, &local_err);
0d1c5c91
FZ
4367 if (local_err) {
4368 bs->open_flags |= BDRV_O_INACTIVE;
4369 error_propagate(errp, local_err);
4370 return;
4371 }
0f15423c 4372 }
3456a8d1 4373
5a8a30db
KW
4374 ret = refresh_total_sectors(bs, bs->total_sectors);
4375 if (ret < 0) {
04c01a5c 4376 bs->open_flags |= BDRV_O_INACTIVE;
5a8a30db
KW
4377 error_setg_errno(errp, -ret, "Could not refresh total sector count");
4378 return;
4379 }
4417ab7a
KW
4380
4381 QLIST_FOREACH(parent, &bs->parents, next_parent) {
4382 if (parent->role->activate) {
4383 parent->role->activate(parent, &local_err);
4384 if (local_err) {
4385 error_propagate(errp, local_err);
4386 return;
4387 }
4388 }
4389 }
0f15423c
AL
4390}
4391
2b148f39
PB
4392typedef struct InvalidateCacheCo {
4393 BlockDriverState *bs;
4394 Error **errp;
4395 bool done;
4396} InvalidateCacheCo;
4397
4398static void coroutine_fn bdrv_invalidate_cache_co_entry(void *opaque)
4399{
4400 InvalidateCacheCo *ico = opaque;
4401 bdrv_co_invalidate_cache(ico->bs, ico->errp);
4402 ico->done = true;
4403}
4404
4405void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
4406{
4407 Coroutine *co;
4408 InvalidateCacheCo ico = {
4409 .bs = bs,
4410 .done = false,
4411 .errp = errp
4412 };
4413
4414 if (qemu_in_coroutine()) {
4415 /* Fast-path if already in coroutine context */
4416 bdrv_invalidate_cache_co_entry(&ico);
4417 } else {
4418 co = qemu_coroutine_create(bdrv_invalidate_cache_co_entry, &ico);
4419 qemu_coroutine_enter(co);
4420 BDRV_POLL_WHILE(bs, !ico.done);
4421 }
4422}
4423
5a8a30db 4424void bdrv_invalidate_cache_all(Error **errp)
0f15423c 4425{
7c8eece4 4426 BlockDriverState *bs;
5a8a30db 4427 Error *local_err = NULL;
88be7b4b 4428 BdrvNextIterator it;
0f15423c 4429
88be7b4b 4430 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
ed78cda3
SH
4431 AioContext *aio_context = bdrv_get_aio_context(bs);
4432
4433 aio_context_acquire(aio_context);
5a8a30db 4434 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 4435 aio_context_release(aio_context);
5a8a30db
KW
4436 if (local_err) {
4437 error_propagate(errp, local_err);
5e003f17 4438 bdrv_next_cleanup(&it);
5a8a30db
KW
4439 return;
4440 }
0f15423c
AL
4441 }
4442}
4443
aad0b7a0
FZ
4444static int bdrv_inactivate_recurse(BlockDriverState *bs,
4445 bool setting_flag)
76b1c7fe 4446{
cfa1a572 4447 BdrvChild *child, *parent;
76b1c7fe
KW
4448 int ret;
4449
d470ad42
HR
4450 if (!bs->drv) {
4451 return -ENOMEDIUM;
4452 }
4453
aad0b7a0 4454 if (!setting_flag && bs->drv->bdrv_inactivate) {
76b1c7fe
KW
4455 ret = bs->drv->bdrv_inactivate(bs);
4456 if (ret < 0) {
4457 return ret;
4458 }
4459 }
4460
7d5b5261 4461 if (setting_flag && !(bs->open_flags & BDRV_O_INACTIVE)) {
9c5e6594
KW
4462 uint64_t perm, shared_perm;
4463
cfa1a572
KW
4464 QLIST_FOREACH(parent, &bs->parents, next_parent) {
4465 if (parent->role->inactivate) {
4466 ret = parent->role->inactivate(parent);
4467 if (ret < 0) {
cfa1a572
KW
4468 return ret;
4469 }
4470 }
4471 }
9c5e6594 4472
7d5b5261
SH
4473 bs->open_flags |= BDRV_O_INACTIVE;
4474
9c5e6594
KW
4475 /* Update permissions, they may differ for inactive nodes */
4476 bdrv_get_cumulative_perm(bs, &perm, &shared_perm);
3121fb45 4477 bdrv_check_perm(bs, NULL, perm, shared_perm, NULL, &error_abort);
9c5e6594 4478 bdrv_set_perm(bs, perm, shared_perm);
aad0b7a0 4479 }
38701b6a
KW
4480
4481 QLIST_FOREACH(child, &bs->children, next) {
4482 ret = bdrv_inactivate_recurse(child->bs, setting_flag);
4483 if (ret < 0) {
4484 return ret;
4485 }
4486 }
4487
615b5dcf
VSO
4488 /* At this point persistent bitmaps should be already stored by the format
4489 * driver */
4490 bdrv_release_persistent_dirty_bitmaps(bs);
4491
76b1c7fe
KW
4492 return 0;
4493}
4494
4495int bdrv_inactivate_all(void)
4496{
79720af6 4497 BlockDriverState *bs = NULL;
88be7b4b 4498 BdrvNextIterator it;
aad0b7a0
FZ
4499 int ret = 0;
4500 int pass;
bd6458e4 4501 GSList *aio_ctxs = NULL, *ctx;
76b1c7fe 4502
88be7b4b 4503 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
bd6458e4
PB
4504 AioContext *aio_context = bdrv_get_aio_context(bs);
4505
4506 if (!g_slist_find(aio_ctxs, aio_context)) {
4507 aio_ctxs = g_slist_prepend(aio_ctxs, aio_context);
4508 aio_context_acquire(aio_context);
4509 }
aad0b7a0 4510 }
76b1c7fe 4511
aad0b7a0
FZ
4512 /* We do two passes of inactivation. The first pass calls to drivers'
4513 * .bdrv_inactivate callbacks recursively so all cache is flushed to disk;
4514 * the second pass sets the BDRV_O_INACTIVE flag so that no further write
4515 * is allowed. */
4516 for (pass = 0; pass < 2; pass++) {
88be7b4b 4517 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
4518 ret = bdrv_inactivate_recurse(bs, pass);
4519 if (ret < 0) {
5e003f17 4520 bdrv_next_cleanup(&it);
aad0b7a0
FZ
4521 goto out;
4522 }
76b1c7fe
KW
4523 }
4524 }
4525
aad0b7a0 4526out:
bd6458e4
PB
4527 for (ctx = aio_ctxs; ctx != NULL; ctx = ctx->next) {
4528 AioContext *aio_context = ctx->data;
4529 aio_context_release(aio_context);
aad0b7a0 4530 }
bd6458e4 4531 g_slist_free(aio_ctxs);
aad0b7a0
FZ
4532
4533 return ret;
76b1c7fe
KW
4534}
4535
19cb3738
FB
4536/**************************************************************/
4537/* removable device support */
4538
4539/**
4540 * Return TRUE if the media is present
4541 */
e031f750 4542bool bdrv_is_inserted(BlockDriverState *bs)
19cb3738
FB
4543{
4544 BlockDriver *drv = bs->drv;
28d7a789 4545 BdrvChild *child;
a1aff5bf 4546
e031f750
HR
4547 if (!drv) {
4548 return false;
4549 }
28d7a789
HR
4550 if (drv->bdrv_is_inserted) {
4551 return drv->bdrv_is_inserted(bs);
4552 }
4553 QLIST_FOREACH(child, &bs->children, next) {
4554 if (!bdrv_is_inserted(child->bs)) {
4555 return false;
4556 }
e031f750 4557 }
28d7a789 4558 return true;
19cb3738
FB
4559}
4560
19cb3738
FB
4561/**
4562 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
4563 */
f36f3949 4564void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
4565{
4566 BlockDriver *drv = bs->drv;
19cb3738 4567
822e1cd1
MA
4568 if (drv && drv->bdrv_eject) {
4569 drv->bdrv_eject(bs, eject_flag);
19cb3738
FB
4570 }
4571}
4572
19cb3738
FB
4573/**
4574 * Lock or unlock the media (if it is locked, the user won't be able
4575 * to eject it manually).
4576 */
025e849a 4577void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
4578{
4579 BlockDriver *drv = bs->drv;
4580
025e849a 4581 trace_bdrv_lock_medium(bs, locked);
b8c6d095 4582
025e849a
MA
4583 if (drv && drv->bdrv_lock_medium) {
4584 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
4585 }
4586}
985a03b0 4587
9fcb0251
FZ
4588/* Get a reference to bs */
4589void bdrv_ref(BlockDriverState *bs)
4590{
4591 bs->refcnt++;
4592}
4593
4594/* Release a previously grabbed reference to bs.
4595 * If after releasing, reference count is zero, the BlockDriverState is
4596 * deleted. */
4597void bdrv_unref(BlockDriverState *bs)
4598{
9a4d5ca6
JC
4599 if (!bs) {
4600 return;
4601 }
9fcb0251
FZ
4602 assert(bs->refcnt > 0);
4603 if (--bs->refcnt == 0) {
4604 bdrv_delete(bs);
4605 }
4606}
4607
fbe40ff7
FZ
4608struct BdrvOpBlocker {
4609 Error *reason;
4610 QLIST_ENTRY(BdrvOpBlocker) list;
4611};
4612
4613bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
4614{
4615 BdrvOpBlocker *blocker;
4616 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4617 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
4618 blocker = QLIST_FIRST(&bs->op_blockers[op]);
57ef3f12
EH
4619 error_propagate(errp, error_copy(blocker->reason));
4620 error_prepend(errp, "Node '%s' is busy: ",
4621 bdrv_get_device_or_node_name(bs));
fbe40ff7
FZ
4622 return true;
4623 }
4624 return false;
4625}
4626
4627void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
4628{
4629 BdrvOpBlocker *blocker;
4630 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4631
5839e53b 4632 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
4633 blocker->reason = reason;
4634 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
4635}
4636
4637void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
4638{
4639 BdrvOpBlocker *blocker, *next;
4640 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4641 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
4642 if (blocker->reason == reason) {
4643 QLIST_REMOVE(blocker, list);
4644 g_free(blocker);
4645 }
4646 }
4647}
4648
4649void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
4650{
4651 int i;
4652 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4653 bdrv_op_block(bs, i, reason);
4654 }
4655}
4656
4657void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
4658{
4659 int i;
4660 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4661 bdrv_op_unblock(bs, i, reason);
4662 }
4663}
4664
4665bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
4666{
4667 int i;
4668
4669 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4670 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
4671 return false;
4672 }
4673 }
4674 return true;
4675}
4676
d92ada22
LC
4677void bdrv_img_create(const char *filename, const char *fmt,
4678 const char *base_filename, const char *base_fmt,
9217283d
FZ
4679 char *options, uint64_t img_size, int flags, bool quiet,
4680 Error **errp)
f88e1a42 4681{
83d0521a
CL
4682 QemuOptsList *create_opts = NULL;
4683 QemuOpts *opts = NULL;
4684 const char *backing_fmt, *backing_file;
4685 int64_t size;
f88e1a42 4686 BlockDriver *drv, *proto_drv;
cc84d90f 4687 Error *local_err = NULL;
f88e1a42
JS
4688 int ret = 0;
4689
4690 /* Find driver and parse its options */
4691 drv = bdrv_find_format(fmt);
4692 if (!drv) {
71c79813 4693 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 4694 return;
f88e1a42
JS
4695 }
4696
b65a5e12 4697 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 4698 if (!proto_drv) {
d92ada22 4699 return;
f88e1a42
JS
4700 }
4701
c6149724
HR
4702 if (!drv->create_opts) {
4703 error_setg(errp, "Format driver '%s' does not support image creation",
4704 drv->format_name);
4705 return;
4706 }
4707
4708 if (!proto_drv->create_opts) {
4709 error_setg(errp, "Protocol driver '%s' does not support image creation",
4710 proto_drv->format_name);
4711 return;
4712 }
4713
c282e1fd
CL
4714 create_opts = qemu_opts_append(create_opts, drv->create_opts);
4715 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
4716
4717 /* Create parameter list with default values */
83d0521a 4718 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 4719 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
4720
4721 /* Parse -o options */
4722 if (options) {
dc523cd3
MA
4723 qemu_opts_do_parse(opts, options, NULL, &local_err);
4724 if (local_err) {
4725 error_report_err(local_err);
4726 local_err = NULL;
83d0521a 4727 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
4728 goto out;
4729 }
4730 }
4731
4732 if (base_filename) {
f43e47db 4733 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 4734 if (local_err) {
71c79813
LC
4735 error_setg(errp, "Backing file not supported for file format '%s'",
4736 fmt);
f88e1a42
JS
4737 goto out;
4738 }
4739 }
4740
4741 if (base_fmt) {
f43e47db 4742 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 4743 if (local_err) {
71c79813
LC
4744 error_setg(errp, "Backing file format not supported for file "
4745 "format '%s'", fmt);
f88e1a42
JS
4746 goto out;
4747 }
4748 }
4749
83d0521a
CL
4750 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
4751 if (backing_file) {
4752 if (!strcmp(filename, backing_file)) {
71c79813
LC
4753 error_setg(errp, "Error: Trying to create an image with the "
4754 "same filename as the backing file");
792da93a
JS
4755 goto out;
4756 }
4757 }
4758
83d0521a 4759 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42 4760
6e6e55f5
JS
4761 /* The size for the image must always be specified, unless we have a backing
4762 * file and we have not been forbidden from opening it. */
a8b42a1c 4763 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, img_size);
6e6e55f5
JS
4764 if (backing_file && !(flags & BDRV_O_NO_BACKING)) {
4765 BlockDriverState *bs;
4766 char *full_backing = g_new0(char, PATH_MAX);
4767 int back_flags;
4768 QDict *backing_options = NULL;
4769
4770 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
4771 full_backing, PATH_MAX,
4772 &local_err);
4773 if (local_err) {
4774 g_free(full_backing);
4775 goto out;
4776 }
29168018 4777
6e6e55f5
JS
4778 /* backing files always opened read-only */
4779 back_flags = flags;
4780 back_flags &= ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 4781
cc954f01 4782 backing_options = qdict_new();
6e6e55f5 4783 if (backing_fmt) {
6e6e55f5
JS
4784 qdict_put_str(backing_options, "driver", backing_fmt);
4785 }
cc954f01 4786 qdict_put_bool(backing_options, BDRV_OPT_FORCE_SHARE, true);
e6641719 4787
6e6e55f5
JS
4788 bs = bdrv_open(full_backing, NULL, backing_options, back_flags,
4789 &local_err);
4790 g_free(full_backing);
4791 if (!bs && size != -1) {
4792 /* Couldn't open BS, but we have a size, so it's nonfatal */
4793 warn_reportf_err(local_err,
4794 "Could not verify backing image. "
4795 "This may become an error in future versions.\n");
4796 local_err = NULL;
4797 } else if (!bs) {
4798 /* Couldn't open bs, do not have size */
4799 error_append_hint(&local_err,
4800 "Could not open backing image to determine size.\n");
4801 goto out;
4802 } else {
4803 if (size == -1) {
4804 /* Opened BS, have no size */
4805 size = bdrv_getlength(bs);
4806 if (size < 0) {
4807 error_setg_errno(errp, -size, "Could not get size of '%s'",
4808 backing_file);
4809 bdrv_unref(bs);
4810 goto out;
4811 }
4812 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
52bf1e72 4813 }
66f6b814 4814 bdrv_unref(bs);
f88e1a42 4815 }
6e6e55f5
JS
4816 } /* (backing_file && !(flags & BDRV_O_NO_BACKING)) */
4817
4818 if (size == -1) {
4819 error_setg(errp, "Image creation needs a size parameter");
4820 goto out;
f88e1a42
JS
4821 }
4822
f382d43a 4823 if (!quiet) {
fe646693 4824 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 4825 qemu_opts_print(opts, " ");
f382d43a
MR
4826 puts("");
4827 }
83d0521a 4828
c282e1fd 4829 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 4830
cc84d90f
HR
4831 if (ret == -EFBIG) {
4832 /* This is generally a better message than whatever the driver would
4833 * deliver (especially because of the cluster_size_hint), since that
4834 * is most probably not much different from "image too large". */
4835 const char *cluster_size_hint = "";
83d0521a 4836 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 4837 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 4838 }
cc84d90f
HR
4839 error_setg(errp, "The image size is too large for file format '%s'"
4840 "%s", fmt, cluster_size_hint);
4841 error_free(local_err);
4842 local_err = NULL;
f88e1a42
JS
4843 }
4844
4845out:
83d0521a
CL
4846 qemu_opts_del(opts);
4847 qemu_opts_free(create_opts);
621ff94d 4848 error_propagate(errp, local_err);
f88e1a42 4849}
85d126f3
SH
4850
4851AioContext *bdrv_get_aio_context(BlockDriverState *bs)
4852{
33f2a757 4853 return bs ? bs->aio_context : qemu_get_aio_context();
dcd04228
SH
4854}
4855
7719f3c9
SH
4856AioWait *bdrv_get_aio_wait(BlockDriverState *bs)
4857{
4858 return bs ? &bs->wait : NULL;
dcd04228
SH
4859}
4860
052a7572
FZ
4861void bdrv_coroutine_enter(BlockDriverState *bs, Coroutine *co)
4862{
4863 aio_co_enter(bdrv_get_aio_context(bs), co);
4864}
4865
e8a095da
SH
4866static void bdrv_do_remove_aio_context_notifier(BdrvAioNotifier *ban)
4867{
4868 QLIST_REMOVE(ban, list);
4869 g_free(ban);
4870}
4871
dcd04228
SH
4872void bdrv_detach_aio_context(BlockDriverState *bs)
4873{
e8a095da 4874 BdrvAioNotifier *baf, *baf_tmp;
b97511c7 4875 BdrvChild *child;
33384421 4876
dcd04228
SH
4877 if (!bs->drv) {
4878 return;
4879 }
4880
e8a095da
SH
4881 assert(!bs->walking_aio_notifiers);
4882 bs->walking_aio_notifiers = true;
4883 QLIST_FOREACH_SAFE(baf, &bs->aio_notifiers, list, baf_tmp) {
4884 if (baf->deleted) {
4885 bdrv_do_remove_aio_context_notifier(baf);
4886 } else {
4887 baf->detach_aio_context(baf->opaque);
4888 }
33384421 4889 }
e8a095da
SH
4890 /* Never mind iterating again to check for ->deleted. bdrv_close() will
4891 * remove remaining aio notifiers if we aren't called again.
4892 */
4893 bs->walking_aio_notifiers = false;
33384421 4894
dcd04228
SH
4895 if (bs->drv->bdrv_detach_aio_context) {
4896 bs->drv->bdrv_detach_aio_context(bs);
4897 }
b97511c7
HR
4898 QLIST_FOREACH(child, &bs->children, next) {
4899 bdrv_detach_aio_context(child->bs);
dcd04228
SH
4900 }
4901
4902 bs->aio_context = NULL;
4903}
4904
4905void bdrv_attach_aio_context(BlockDriverState *bs,
4906 AioContext *new_context)
4907{
e8a095da 4908 BdrvAioNotifier *ban, *ban_tmp;
b97511c7 4909 BdrvChild *child;
33384421 4910
dcd04228
SH
4911 if (!bs->drv) {
4912 return;
4913 }
4914
4915 bs->aio_context = new_context;
4916
b97511c7
HR
4917 QLIST_FOREACH(child, &bs->children, next) {
4918 bdrv_attach_aio_context(child->bs, new_context);
dcd04228
SH
4919 }
4920 if (bs->drv->bdrv_attach_aio_context) {
4921 bs->drv->bdrv_attach_aio_context(bs, new_context);
4922 }
33384421 4923
e8a095da
SH
4924 assert(!bs->walking_aio_notifiers);
4925 bs->walking_aio_notifiers = true;
4926 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_tmp) {
4927 if (ban->deleted) {
4928 bdrv_do_remove_aio_context_notifier(ban);
4929 } else {
4930 ban->attached_aio_context(new_context, ban->opaque);
4931 }
33384421 4932 }
e8a095da 4933 bs->walking_aio_notifiers = false;
dcd04228
SH
4934}
4935
4936void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
4937{
aabf5910 4938 AioContext *ctx = bdrv_get_aio_context(bs);
c2b6428d 4939
aabf5910 4940 aio_disable_external(ctx);
0152bf40 4941 bdrv_parent_drained_begin(bs, NULL);
53ec73e2 4942 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228 4943
c2b6428d
PB
4944 while (aio_poll(ctx, false)) {
4945 /* wait for all bottom halves to execute */
4946 }
4947
dcd04228
SH
4948 bdrv_detach_aio_context(bs);
4949
4950 /* This function executes in the old AioContext so acquire the new one in
4951 * case it runs in a different thread.
4952 */
4953 aio_context_acquire(new_context);
4954 bdrv_attach_aio_context(bs, new_context);
0152bf40 4955 bdrv_parent_drained_end(bs, NULL);
aabf5910 4956 aio_enable_external(ctx);
dcd04228 4957 aio_context_release(new_context);
85d126f3 4958}
d616b224 4959
33384421
HR
4960void bdrv_add_aio_context_notifier(BlockDriverState *bs,
4961 void (*attached_aio_context)(AioContext *new_context, void *opaque),
4962 void (*detach_aio_context)(void *opaque), void *opaque)
4963{
4964 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
4965 *ban = (BdrvAioNotifier){
4966 .attached_aio_context = attached_aio_context,
4967 .detach_aio_context = detach_aio_context,
4968 .opaque = opaque
4969 };
4970
4971 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
4972}
4973
4974void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
4975 void (*attached_aio_context)(AioContext *,
4976 void *),
4977 void (*detach_aio_context)(void *),
4978 void *opaque)
4979{
4980 BdrvAioNotifier *ban, *ban_next;
4981
4982 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
4983 if (ban->attached_aio_context == attached_aio_context &&
4984 ban->detach_aio_context == detach_aio_context &&
e8a095da
SH
4985 ban->opaque == opaque &&
4986 ban->deleted == false)
33384421 4987 {
e8a095da
SH
4988 if (bs->walking_aio_notifiers) {
4989 ban->deleted = true;
4990 } else {
4991 bdrv_do_remove_aio_context_notifier(ban);
4992 }
33384421
HR
4993 return;
4994 }
4995 }
4996
4997 abort();
4998}
4999
77485434 5000int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
8b13976d 5001 BlockDriverAmendStatusCB *status_cb, void *cb_opaque)
6f176b48 5002{
d470ad42
HR
5003 if (!bs->drv) {
5004 return -ENOMEDIUM;
5005 }
c282e1fd 5006 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
5007 return -ENOTSUP;
5008 }
8b13976d 5009 return bs->drv->bdrv_amend_options(bs, opts, status_cb, cb_opaque);
6f176b48 5010}
f6186f49 5011
b5042a36
BC
5012/* This function will be called by the bdrv_recurse_is_first_non_filter method
5013 * of block filter and by bdrv_is_first_non_filter.
5014 * It is used to test if the given bs is the candidate or recurse more in the
5015 * node graph.
212a5a8f 5016 */
b5042a36 5017bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 5018 BlockDriverState *candidate)
f6186f49 5019{
b5042a36
BC
5020 /* return false if basic checks fails */
5021 if (!bs || !bs->drv) {
212a5a8f 5022 return false;
f6186f49
BC
5023 }
5024
b5042a36
BC
5025 /* the code reached a non block filter driver -> check if the bs is
5026 * the same as the candidate. It's the recursion termination condition.
5027 */
5028 if (!bs->drv->is_filter) {
5029 return bs == candidate;
212a5a8f 5030 }
b5042a36 5031 /* Down this path the driver is a block filter driver */
212a5a8f 5032
b5042a36
BC
5033 /* If the block filter recursion method is defined use it to recurse down
5034 * the node graph.
5035 */
5036 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 5037 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
5038 }
5039
b5042a36
BC
5040 /* the driver is a block filter but don't allow to recurse -> return false
5041 */
5042 return false;
f6186f49
BC
5043}
5044
212a5a8f
BC
5045/* This function checks if the candidate is the first non filter bs down it's
5046 * bs chain. Since we don't have pointers to parents it explore all bs chains
5047 * from the top. Some filters can choose not to pass down the recursion.
5048 */
5049bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 5050{
7c8eece4 5051 BlockDriverState *bs;
88be7b4b 5052 BdrvNextIterator it;
212a5a8f
BC
5053
5054 /* walk down the bs forest recursively */
88be7b4b 5055 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
212a5a8f
BC
5056 bool perm;
5057
b5042a36 5058 /* try to recurse in this top level bs */
e6dc8a1f 5059 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
5060
5061 /* candidate is the first non filter */
5062 if (perm) {
5e003f17 5063 bdrv_next_cleanup(&it);
212a5a8f
BC
5064 return true;
5065 }
5066 }
5067
5068 return false;
f6186f49 5069}
09158f00 5070
e12f3784
WC
5071BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
5072 const char *node_name, Error **errp)
09158f00
BC
5073{
5074 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
5075 AioContext *aio_context;
5076
09158f00
BC
5077 if (!to_replace_bs) {
5078 error_setg(errp, "Node name '%s' not found", node_name);
5079 return NULL;
5080 }
5081
5a7e7a0b
SH
5082 aio_context = bdrv_get_aio_context(to_replace_bs);
5083 aio_context_acquire(aio_context);
5084
09158f00 5085 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
5086 to_replace_bs = NULL;
5087 goto out;
09158f00
BC
5088 }
5089
5090 /* We don't want arbitrary node of the BDS chain to be replaced only the top
5091 * most non filter in order to prevent data corruption.
5092 * Another benefit is that this tests exclude backing files which are
5093 * blocked by the backing blockers.
5094 */
e12f3784 5095 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 5096 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
5097 to_replace_bs = NULL;
5098 goto out;
09158f00
BC
5099 }
5100
5a7e7a0b
SH
5101out:
5102 aio_context_release(aio_context);
09158f00
BC
5103 return to_replace_bs;
5104}
448ad91d 5105
91af7014
HR
5106static bool append_open_options(QDict *d, BlockDriverState *bs)
5107{
5108 const QDictEntry *entry;
9e700c1a 5109 QemuOptDesc *desc;
260fecf1 5110 BdrvChild *child;
91af7014 5111 bool found_any = false;
260fecf1 5112 const char *p;
91af7014
HR
5113
5114 for (entry = qdict_first(bs->options); entry;
5115 entry = qdict_next(bs->options, entry))
5116 {
260fecf1
KW
5117 /* Exclude options for children */
5118 QLIST_FOREACH(child, &bs->children, next) {
5119 if (strstart(qdict_entry_key(entry), child->name, &p)
5120 && (!*p || *p == '.'))
5121 {
5122 break;
5123 }
5124 }
5125 if (child) {
9e700c1a 5126 continue;
91af7014 5127 }
9e700c1a
KW
5128
5129 /* And exclude all non-driver-specific options */
5130 for (desc = bdrv_runtime_opts.desc; desc->name; desc++) {
5131 if (!strcmp(qdict_entry_key(entry), desc->name)) {
5132 break;
5133 }
5134 }
5135 if (desc->name) {
5136 continue;
5137 }
5138
f5a74a5a
MAL
5139 qdict_put_obj(d, qdict_entry_key(entry),
5140 qobject_ref(qdict_entry_value(entry)));
9e700c1a 5141 found_any = true;
91af7014
HR
5142 }
5143
5144 return found_any;
5145}
5146
5147/* Updates the following BDS fields:
5148 * - exact_filename: A filename which may be used for opening a block device
5149 * which (mostly) equals the given BDS (even without any
5150 * other options; so reading and writing must return the same
5151 * results, but caching etc. may be different)
5152 * - full_open_options: Options which, when given when opening a block device
5153 * (without a filename), result in a BDS (mostly)
5154 * equalling the given one
5155 * - filename: If exact_filename is set, it is copied here. Otherwise,
5156 * full_open_options is converted to a JSON object, prefixed with
5157 * "json:" (for use through the JSON pseudo protocol) and put here.
5158 */
5159void bdrv_refresh_filename(BlockDriverState *bs)
5160{
5161 BlockDriver *drv = bs->drv;
5162 QDict *opts;
5163
5164 if (!drv) {
5165 return;
5166 }
5167
5168 /* This BDS's file name will most probably depend on its file's name, so
5169 * refresh that first */
5170 if (bs->file) {
9a4f4c31 5171 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
5172 }
5173
5174 if (drv->bdrv_refresh_filename) {
5175 /* Obsolete information is of no use here, so drop the old file name
5176 * information before refreshing it */
5177 bs->exact_filename[0] = '\0';
5178 if (bs->full_open_options) {
cb3e7f08 5179 qobject_unref(bs->full_open_options);
91af7014
HR
5180 bs->full_open_options = NULL;
5181 }
5182
4cdd01d3
KW
5183 opts = qdict_new();
5184 append_open_options(opts, bs);
5185 drv->bdrv_refresh_filename(bs, opts);
cb3e7f08 5186 qobject_unref(opts);
91af7014
HR
5187 } else if (bs->file) {
5188 /* Try to reconstruct valid information from the underlying file */
5189 bool has_open_options;
5190
5191 bs->exact_filename[0] = '\0';
5192 if (bs->full_open_options) {
cb3e7f08 5193 qobject_unref(bs->full_open_options);
91af7014
HR
5194 bs->full_open_options = NULL;
5195 }
5196
5197 opts = qdict_new();
5198 has_open_options = append_open_options(opts, bs);
5199
5200 /* If no specific options have been given for this BDS, the filename of
5201 * the underlying file should suffice for this one as well */
9a4f4c31
KW
5202 if (bs->file->bs->exact_filename[0] && !has_open_options) {
5203 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
5204 }
5205 /* Reconstructing the full options QDict is simple for most format block
5206 * drivers, as long as the full options are known for the underlying
5207 * file BDS. The full options QDict of that file BDS should somehow
5208 * contain a representation of the filename, therefore the following
5209 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 5210 if (bs->file->bs->full_open_options) {
46f5ac20 5211 qdict_put_str(opts, "driver", drv->format_name);
f5a74a5a
MAL
5212 qdict_put(opts, "file",
5213 qobject_ref(bs->file->bs->full_open_options));
91af7014
HR
5214
5215 bs->full_open_options = opts;
5216 } else {
cb3e7f08 5217 qobject_unref(opts);
91af7014
HR
5218 }
5219 } else if (!bs->full_open_options && qdict_size(bs->options)) {
5220 /* There is no underlying file BDS (at least referenced by BDS.file),
5221 * so the full options QDict should be equal to the options given
5222 * specifically for this block device when it was opened (plus the
5223 * driver specification).
5224 * Because those options don't change, there is no need to update
5225 * full_open_options when it's already set. */
5226
5227 opts = qdict_new();
5228 append_open_options(opts, bs);
46f5ac20 5229 qdict_put_str(opts, "driver", drv->format_name);
91af7014
HR
5230
5231 if (bs->exact_filename[0]) {
5232 /* This may not work for all block protocol drivers (some may
5233 * require this filename to be parsed), but we have to find some
5234 * default solution here, so just include it. If some block driver
5235 * does not support pure options without any filename at all or
5236 * needs some special format of the options QDict, it needs to
5237 * implement the driver-specific bdrv_refresh_filename() function.
5238 */
46f5ac20 5239 qdict_put_str(opts, "filename", bs->exact_filename);
91af7014
HR
5240 }
5241
5242 bs->full_open_options = opts;
5243 }
5244
5245 if (bs->exact_filename[0]) {
5246 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
5247 } else if (bs->full_open_options) {
5248 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
5249 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
5250 qstring_get_str(json));
cb3e7f08 5251 qobject_unref(json);
91af7014
HR
5252 }
5253}
e06018ad
WC
5254
5255/*
5256 * Hot add/remove a BDS's child. So the user can take a child offline when
5257 * it is broken and take a new child online
5258 */
5259void bdrv_add_child(BlockDriverState *parent_bs, BlockDriverState *child_bs,
5260 Error **errp)
5261{
5262
5263 if (!parent_bs->drv || !parent_bs->drv->bdrv_add_child) {
5264 error_setg(errp, "The node %s does not support adding a child",
5265 bdrv_get_device_or_node_name(parent_bs));
5266 return;
5267 }
5268
5269 if (!QLIST_EMPTY(&child_bs->parents)) {
5270 error_setg(errp, "The node %s already has a parent",
5271 child_bs->node_name);
5272 return;
5273 }
5274
5275 parent_bs->drv->bdrv_add_child(parent_bs, child_bs, errp);
5276}
5277
5278void bdrv_del_child(BlockDriverState *parent_bs, BdrvChild *child, Error **errp)
5279{
5280 BdrvChild *tmp;
5281
5282 if (!parent_bs->drv || !parent_bs->drv->bdrv_del_child) {
5283 error_setg(errp, "The node %s does not support removing a child",
5284 bdrv_get_device_or_node_name(parent_bs));
5285 return;
5286 }
5287
5288 QLIST_FOREACH(tmp, &parent_bs->children, next) {
5289 if (tmp == child) {
5290 break;
5291 }
5292 }
5293
5294 if (!tmp) {
5295 error_setg(errp, "The node %s does not have a child named %s",
5296 bdrv_get_device_or_node_name(parent_bs),
5297 bdrv_get_device_or_node_name(child->bs));
5298 return;
5299 }
5300
5301 parent_bs->drv->bdrv_del_child(parent_bs, child, errp);
5302}
67b792f5
VSO
5303
5304bool bdrv_can_store_new_dirty_bitmap(BlockDriverState *bs, const char *name,
5305 uint32_t granularity, Error **errp)
5306{
5307 BlockDriver *drv = bs->drv;
5308
5309 if (!drv) {
5310 error_setg_errno(errp, ENOMEDIUM,
5311 "Can't store persistent bitmaps to %s",
5312 bdrv_get_device_or_node_name(bs));
5313 return false;
5314 }
5315
5316 if (!drv->bdrv_can_store_new_dirty_bitmap) {
5317 error_setg_errno(errp, ENOTSUP,
5318 "Can't store persistent bitmaps to %s",
5319 bdrv_get_device_or_node_name(bs));
5320 return false;
5321 }
5322
5323 return drv->bdrv_can_store_new_dirty_bitmap(bs, name, granularity, errp);
5324}