]> git.ipfire.org Git - thirdparty/qemu.git/blame - block.c
util - add automated ID generation utility
[thirdparty/qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
3990d09a 24#include "config-host.h"
faf07963 25#include "qemu-common.h"
6d519a5f 26#include "trace.h"
737e150e
PB
27#include "block/block_int.h"
28#include "block/blockjob.h"
d49b6836 29#include "qemu/error-report.h"
1de7afc9 30#include "qemu/module.h"
cc7a8ea7 31#include "qapi/qmp/qerror.h"
7b1b5d19 32#include "qapi/qmp/qjson.h"
bfb197e0 33#include "sysemu/block-backend.h"
9c17d615 34#include "sysemu/sysemu.h"
1de7afc9 35#include "qemu/notify.h"
737e150e 36#include "block/coroutine.h"
c13163fb 37#include "block/qapi.h"
b2023818 38#include "qmp-commands.h"
1de7afc9 39#include "qemu/timer.h"
a5ee7bd4 40#include "qapi-event.h"
db628338 41#include "block/throttle-groups.h"
fc01f7e7 42
71e72a19 43#ifdef CONFIG_BSD
7674e7bf
FB
44#include <sys/types.h>
45#include <sys/stat.h>
46#include <sys/ioctl.h>
72cf2d4f 47#include <sys/queue.h>
c5e97233 48#ifndef __DragonFly__
7674e7bf
FB
49#include <sys/disk.h>
50#endif
c5e97233 51#endif
7674e7bf 52
49dc768d
AL
53#ifdef _WIN32
54#include <windows.h>
55#endif
56
9bd2b08f
JS
57/**
58 * A BdrvDirtyBitmap can be in three possible states:
59 * (1) successor is NULL and disabled is false: full r/w mode
60 * (2) successor is NULL and disabled is true: read only mode ("disabled")
61 * (3) successor is set: frozen mode.
62 * A frozen bitmap cannot be renamed, deleted, anonymized, cleared, set,
63 * or enabled. A frozen bitmap can only abdicate() or reclaim().
64 */
e4654d2d 65struct BdrvDirtyBitmap {
aa0c7ca5
JS
66 HBitmap *bitmap; /* Dirty sector bitmap implementation */
67 BdrvDirtyBitmap *successor; /* Anonymous child; implies frozen status */
68 char *name; /* Optional non-empty unique ID */
69 int64_t size; /* Size of the bitmap (Number of sectors) */
70 bool disabled; /* Bitmap is read-only */
e4654d2d
FZ
71 QLIST_ENTRY(BdrvDirtyBitmap) list;
72};
73
1c9805a3
SH
74#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
75
1b7bdbc1
SH
76static QTAILQ_HEAD(, BlockDriverState) bdrv_states =
77 QTAILQ_HEAD_INITIALIZER(bdrv_states);
7ee930d0 78
dc364f4c
BC
79static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
80 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
81
8a22f02a
SH
82static QLIST_HEAD(, BlockDriver) bdrv_drivers =
83 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 84
f3930ed0
KW
85static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
86 const char *reference, QDict *options, int flags,
87 BlockDriverState *parent,
ce343771 88 const BdrvChildRole *child_role, Error **errp);
f3930ed0 89
ce1ffea8 90static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs);
eb852011
MA
91/* If non-zero, use only whitelisted block drivers */
92static int use_bdrv_whitelist;
93
9e0b22f4
SH
94#ifdef _WIN32
95static int is_windows_drive_prefix(const char *filename)
96{
97 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
98 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
99 filename[1] == ':');
100}
101
102int is_windows_drive(const char *filename)
103{
104 if (is_windows_drive_prefix(filename) &&
105 filename[2] == '\0')
106 return 1;
107 if (strstart(filename, "\\\\.\\", NULL) ||
108 strstart(filename, "//./", NULL))
109 return 1;
110 return 0;
111}
112#endif
113
339064d5
KW
114size_t bdrv_opt_mem_align(BlockDriverState *bs)
115{
116 if (!bs || !bs->drv) {
459b4e66
DL
117 /* page size or 4k (hdd sector size) should be on the safe side */
118 return MAX(4096, getpagesize());
339064d5
KW
119 }
120
121 return bs->bl.opt_mem_alignment;
122}
123
4196d2f0
DL
124size_t bdrv_min_mem_align(BlockDriverState *bs)
125{
126 if (!bs || !bs->drv) {
459b4e66
DL
127 /* page size or 4k (hdd sector size) should be on the safe side */
128 return MAX(4096, getpagesize());
4196d2f0
DL
129 }
130
131 return bs->bl.min_mem_alignment;
132}
133
9e0b22f4 134/* check if the path starts with "<protocol>:" */
5c98415b 135int path_has_protocol(const char *path)
9e0b22f4 136{
947995c0
PB
137 const char *p;
138
9e0b22f4
SH
139#ifdef _WIN32
140 if (is_windows_drive(path) ||
141 is_windows_drive_prefix(path)) {
142 return 0;
143 }
947995c0
PB
144 p = path + strcspn(path, ":/\\");
145#else
146 p = path + strcspn(path, ":/");
9e0b22f4
SH
147#endif
148
947995c0 149 return *p == ':';
9e0b22f4
SH
150}
151
83f64091 152int path_is_absolute(const char *path)
3b0d4f61 153{
21664424
FB
154#ifdef _WIN32
155 /* specific case for names like: "\\.\d:" */
f53f4da9 156 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 157 return 1;
f53f4da9
PB
158 }
159 return (*path == '/' || *path == '\\');
3b9f94e1 160#else
f53f4da9 161 return (*path == '/');
3b9f94e1 162#endif
3b0d4f61
FB
163}
164
83f64091
FB
165/* if filename is absolute, just copy it to dest. Otherwise, build a
166 path to it by considering it is relative to base_path. URL are
167 supported. */
168void path_combine(char *dest, int dest_size,
169 const char *base_path,
170 const char *filename)
3b0d4f61 171{
83f64091
FB
172 const char *p, *p1;
173 int len;
174
175 if (dest_size <= 0)
176 return;
177 if (path_is_absolute(filename)) {
178 pstrcpy(dest, dest_size, filename);
179 } else {
180 p = strchr(base_path, ':');
181 if (p)
182 p++;
183 else
184 p = base_path;
3b9f94e1
FB
185 p1 = strrchr(base_path, '/');
186#ifdef _WIN32
187 {
188 const char *p2;
189 p2 = strrchr(base_path, '\\');
190 if (!p1 || p2 > p1)
191 p1 = p2;
192 }
193#endif
83f64091
FB
194 if (p1)
195 p1++;
196 else
197 p1 = base_path;
198 if (p1 > p)
199 p = p1;
200 len = p - base_path;
201 if (len > dest_size - 1)
202 len = dest_size - 1;
203 memcpy(dest, base_path, len);
204 dest[len] = '\0';
205 pstrcat(dest, dest_size, filename);
3b0d4f61 206 }
3b0d4f61
FB
207}
208
0a82855a
HR
209void bdrv_get_full_backing_filename_from_filename(const char *backed,
210 const char *backing,
9f07429e
HR
211 char *dest, size_t sz,
212 Error **errp)
dc5a1371 213{
9f07429e
HR
214 if (backing[0] == '\0' || path_has_protocol(backing) ||
215 path_is_absolute(backing))
216 {
0a82855a 217 pstrcpy(dest, sz, backing);
9f07429e
HR
218 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
219 error_setg(errp, "Cannot use relative backing file names for '%s'",
220 backed);
dc5a1371 221 } else {
0a82855a 222 path_combine(dest, sz, backed, backing);
dc5a1371
PB
223 }
224}
225
9f07429e
HR
226void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
227 Error **errp)
0a82855a 228{
9f07429e
HR
229 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
230
231 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
232 dest, sz, errp);
0a82855a
HR
233}
234
0eb7217e
SH
235void bdrv_register(BlockDriver *bdrv)
236{
237 bdrv_setup_io_funcs(bdrv);
b2e12bc6 238
8a22f02a 239 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 240}
b338082b 241
7f06d47e 242BlockDriverState *bdrv_new_root(void)
b338082b 243{
7f06d47e 244 BlockDriverState *bs = bdrv_new();
e4e9986b 245
e4e9986b 246 QTAILQ_INSERT_TAIL(&bdrv_states, bs, device_list);
e4e9986b
MA
247 return bs;
248}
249
250BlockDriverState *bdrv_new(void)
251{
252 BlockDriverState *bs;
253 int i;
254
5839e53b 255 bs = g_new0(BlockDriverState, 1);
e4654d2d 256 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
257 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
258 QLIST_INIT(&bs->op_blockers[i]);
259 }
28a7282a 260 bdrv_iostatus_disable(bs);
d7d512f6 261 notifier_list_init(&bs->close_notifiers);
d616b224 262 notifier_with_return_list_init(&bs->before_write_notifiers);
cc0681c4
BC
263 qemu_co_queue_init(&bs->throttled_reqs[0]);
264 qemu_co_queue_init(&bs->throttled_reqs[1]);
9fcb0251 265 bs->refcnt = 1;
dcd04228 266 bs->aio_context = qemu_get_aio_context();
d7d512f6 267
b338082b
FB
268 return bs;
269}
270
d7d512f6
PB
271void bdrv_add_close_notifier(BlockDriverState *bs, Notifier *notify)
272{
273 notifier_list_add(&bs->close_notifiers, notify);
274}
275
ea2384d3
FB
276BlockDriver *bdrv_find_format(const char *format_name)
277{
278 BlockDriver *drv1;
8a22f02a
SH
279 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
280 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 281 return drv1;
8a22f02a 282 }
ea2384d3
FB
283 }
284 return NULL;
285}
286
b64ec4e4 287static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 288{
b64ec4e4
FZ
289 static const char *whitelist_rw[] = {
290 CONFIG_BDRV_RW_WHITELIST
291 };
292 static const char *whitelist_ro[] = {
293 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
294 };
295 const char **p;
296
b64ec4e4 297 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 298 return 1; /* no whitelist, anything goes */
b64ec4e4 299 }
eb852011 300
b64ec4e4 301 for (p = whitelist_rw; *p; p++) {
eb852011
MA
302 if (!strcmp(drv->format_name, *p)) {
303 return 1;
304 }
305 }
b64ec4e4
FZ
306 if (read_only) {
307 for (p = whitelist_ro; *p; p++) {
308 if (!strcmp(drv->format_name, *p)) {
309 return 1;
310 }
311 }
312 }
eb852011
MA
313 return 0;
314}
315
5b7e1542
ZYW
316typedef struct CreateCo {
317 BlockDriver *drv;
318 char *filename;
83d0521a 319 QemuOpts *opts;
5b7e1542 320 int ret;
cc84d90f 321 Error *err;
5b7e1542
ZYW
322} CreateCo;
323
324static void coroutine_fn bdrv_create_co_entry(void *opaque)
325{
cc84d90f
HR
326 Error *local_err = NULL;
327 int ret;
328
5b7e1542
ZYW
329 CreateCo *cco = opaque;
330 assert(cco->drv);
331
c282e1fd 332 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
84d18f06 333 if (local_err) {
cc84d90f
HR
334 error_propagate(&cco->err, local_err);
335 }
336 cco->ret = ret;
5b7e1542
ZYW
337}
338
0e7e1989 339int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 340 QemuOpts *opts, Error **errp)
ea2384d3 341{
5b7e1542
ZYW
342 int ret;
343
344 Coroutine *co;
345 CreateCo cco = {
346 .drv = drv,
347 .filename = g_strdup(filename),
83d0521a 348 .opts = opts,
5b7e1542 349 .ret = NOT_DONE,
cc84d90f 350 .err = NULL,
5b7e1542
ZYW
351 };
352
c282e1fd 353 if (!drv->bdrv_create) {
cc84d90f 354 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
355 ret = -ENOTSUP;
356 goto out;
5b7e1542
ZYW
357 }
358
359 if (qemu_in_coroutine()) {
360 /* Fast-path if already in coroutine context */
361 bdrv_create_co_entry(&cco);
362 } else {
363 co = qemu_coroutine_create(bdrv_create_co_entry);
364 qemu_coroutine_enter(co, &cco);
365 while (cco.ret == NOT_DONE) {
b47ec2c4 366 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
367 }
368 }
369
370 ret = cco.ret;
cc84d90f 371 if (ret < 0) {
84d18f06 372 if (cco.err) {
cc84d90f
HR
373 error_propagate(errp, cco.err);
374 } else {
375 error_setg_errno(errp, -ret, "Could not create image");
376 }
377 }
0e7e1989 378
80168bff
LC
379out:
380 g_free(cco.filename);
5b7e1542 381 return ret;
ea2384d3
FB
382}
383
c282e1fd 384int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
385{
386 BlockDriver *drv;
cc84d90f
HR
387 Error *local_err = NULL;
388 int ret;
84a12e66 389
b65a5e12 390 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 391 if (drv == NULL) {
16905d71 392 return -ENOENT;
84a12e66
CH
393 }
394
c282e1fd 395 ret = bdrv_create(drv, filename, opts, &local_err);
84d18f06 396 if (local_err) {
cc84d90f
HR
397 error_propagate(errp, local_err);
398 }
399 return ret;
84a12e66
CH
400}
401
892b7de8
ET
402/**
403 * Try to get @bs's logical and physical block size.
404 * On success, store them in @bsz struct and return 0.
405 * On failure return -errno.
406 * @bs must not be empty.
407 */
408int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
409{
410 BlockDriver *drv = bs->drv;
411
412 if (drv && drv->bdrv_probe_blocksizes) {
413 return drv->bdrv_probe_blocksizes(bs, bsz);
414 }
415
416 return -ENOTSUP;
417}
418
419/**
420 * Try to get @bs's geometry (cyls, heads, sectors).
421 * On success, store them in @geo struct and return 0.
422 * On failure return -errno.
423 * @bs must not be empty.
424 */
425int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
426{
427 BlockDriver *drv = bs->drv;
428
429 if (drv && drv->bdrv_probe_geometry) {
430 return drv->bdrv_probe_geometry(bs, geo);
431 }
432
433 return -ENOTSUP;
434}
435
eba25057
JM
436/*
437 * Create a uniquely-named empty temporary file.
438 * Return 0 upon success, otherwise a negative errno value.
439 */
440int get_tmp_filename(char *filename, int size)
d5249393 441{
eba25057 442#ifdef _WIN32
3b9f94e1 443 char temp_dir[MAX_PATH];
eba25057
JM
444 /* GetTempFileName requires that its output buffer (4th param)
445 have length MAX_PATH or greater. */
446 assert(size >= MAX_PATH);
447 return (GetTempPath(MAX_PATH, temp_dir)
448 && GetTempFileName(temp_dir, "qem", 0, filename)
449 ? 0 : -GetLastError());
d5249393 450#else
67b915a5 451 int fd;
7ccfb2eb 452 const char *tmpdir;
0badc1ee 453 tmpdir = getenv("TMPDIR");
69bef793
AS
454 if (!tmpdir) {
455 tmpdir = "/var/tmp";
456 }
eba25057
JM
457 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
458 return -EOVERFLOW;
459 }
ea2384d3 460 fd = mkstemp(filename);
fe235a06
DH
461 if (fd < 0) {
462 return -errno;
463 }
464 if (close(fd) != 0) {
465 unlink(filename);
eba25057
JM
466 return -errno;
467 }
468 return 0;
d5249393 469#endif
eba25057 470}
fc01f7e7 471
84a12e66
CH
472/*
473 * Detect host devices. By convention, /dev/cdrom[N] is always
474 * recognized as a host CDROM.
475 */
476static BlockDriver *find_hdev_driver(const char *filename)
477{
478 int score_max = 0, score;
479 BlockDriver *drv = NULL, *d;
480
481 QLIST_FOREACH(d, &bdrv_drivers, list) {
482 if (d->bdrv_probe_device) {
483 score = d->bdrv_probe_device(filename);
484 if (score > score_max) {
485 score_max = score;
486 drv = d;
487 }
488 }
489 }
490
491 return drv;
492}
493
98289620 494BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
495 bool allow_protocol_prefix,
496 Error **errp)
83f64091
FB
497{
498 BlockDriver *drv1;
499 char protocol[128];
1cec71e3 500 int len;
83f64091 501 const char *p;
19cb3738 502
66f82cee
KW
503 /* TODO Drivers without bdrv_file_open must be specified explicitly */
504
39508e7a
CH
505 /*
506 * XXX(hch): we really should not let host device detection
507 * override an explicit protocol specification, but moving this
508 * later breaks access to device names with colons in them.
509 * Thanks to the brain-dead persistent naming schemes on udev-
510 * based Linux systems those actually are quite common.
511 */
512 drv1 = find_hdev_driver(filename);
513 if (drv1) {
514 return drv1;
515 }
516
98289620 517 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 518 return &bdrv_file;
84a12e66 519 }
98289620 520
9e0b22f4
SH
521 p = strchr(filename, ':');
522 assert(p != NULL);
1cec71e3
AL
523 len = p - filename;
524 if (len > sizeof(protocol) - 1)
525 len = sizeof(protocol) - 1;
526 memcpy(protocol, filename, len);
527 protocol[len] = '\0';
8a22f02a 528 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
5fafdf24 529 if (drv1->protocol_name &&
8a22f02a 530 !strcmp(drv1->protocol_name, protocol)) {
83f64091 531 return drv1;
8a22f02a 532 }
83f64091 533 }
b65a5e12
HR
534
535 error_setg(errp, "Unknown protocol '%s'", protocol);
83f64091
FB
536 return NULL;
537}
538
c6684249
MA
539/*
540 * Guess image format by probing its contents.
541 * This is not a good idea when your image is raw (CVE-2008-2004), but
542 * we do it anyway for backward compatibility.
543 *
544 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
545 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
546 * but can be smaller if the image file is smaller)
c6684249
MA
547 * @filename is its filename.
548 *
549 * For all block drivers, call the bdrv_probe() method to get its
550 * probing score.
551 * Return the first block driver with the highest probing score.
552 */
38f3ef57
KW
553BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
554 const char *filename)
c6684249
MA
555{
556 int score_max = 0, score;
557 BlockDriver *drv = NULL, *d;
558
559 QLIST_FOREACH(d, &bdrv_drivers, list) {
560 if (d->bdrv_probe) {
561 score = d->bdrv_probe(buf, buf_size, filename);
562 if (score > score_max) {
563 score_max = score;
564 drv = d;
565 }
566 }
567 }
568
569 return drv;
570}
571
f500a6d3 572static int find_image_format(BlockDriverState *bs, const char *filename,
34b5d2c6 573 BlockDriver **pdrv, Error **errp)
f3a5d3f8 574{
c6684249 575 BlockDriver *drv;
7cddd372 576 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 577 int ret = 0;
f8ea0b00 578
08a00559 579 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
b192af8a 580 if (bdrv_is_sg(bs) || !bdrv_is_inserted(bs) || bdrv_getlength(bs) == 0) {
ef810437 581 *pdrv = &bdrv_raw;
c98ac35d 582 return ret;
1a396859 583 }
f8ea0b00 584
83f64091 585 ret = bdrv_pread(bs, 0, buf, sizeof(buf));
83f64091 586 if (ret < 0) {
34b5d2c6
HR
587 error_setg_errno(errp, -ret, "Could not read image for determining its "
588 "format");
c98ac35d
SW
589 *pdrv = NULL;
590 return ret;
83f64091
FB
591 }
592
c6684249 593 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 594 if (!drv) {
34b5d2c6
HR
595 error_setg(errp, "Could not determine image format: No compatible "
596 "driver found");
c98ac35d
SW
597 ret = -ENOENT;
598 }
599 *pdrv = drv;
600 return ret;
ea2384d3
FB
601}
602
51762288
SH
603/**
604 * Set the current 'total_sectors' value
65a9bb25 605 * Return 0 on success, -errno on error.
51762288
SH
606 */
607static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
608{
609 BlockDriver *drv = bs->drv;
610
396759ad 611 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 612 if (bdrv_is_sg(bs))
396759ad
NB
613 return 0;
614
51762288
SH
615 /* query actual device if possible, otherwise just trust the hint */
616 if (drv->bdrv_getlength) {
617 int64_t length = drv->bdrv_getlength(bs);
618 if (length < 0) {
619 return length;
620 }
7e382003 621 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
622 }
623
624 bs->total_sectors = hint;
625 return 0;
626}
627
9e8f1835
PB
628/**
629 * Set open flags for a given discard mode
630 *
631 * Return 0 on success, -1 if the discard mode was invalid.
632 */
633int bdrv_parse_discard_flags(const char *mode, int *flags)
634{
635 *flags &= ~BDRV_O_UNMAP;
636
637 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
638 /* do nothing */
639 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
640 *flags |= BDRV_O_UNMAP;
641 } else {
642 return -1;
643 }
644
645 return 0;
646}
647
c3993cdc
SH
648/**
649 * Set open flags for a given cache mode
650 *
651 * Return 0 on success, -1 if the cache mode was invalid.
652 */
653int bdrv_parse_cache_flags(const char *mode, int *flags)
654{
655 *flags &= ~BDRV_O_CACHE_MASK;
656
657 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
658 *flags |= BDRV_O_NOCACHE | BDRV_O_CACHE_WB;
92196b2f
SH
659 } else if (!strcmp(mode, "directsync")) {
660 *flags |= BDRV_O_NOCACHE;
c3993cdc
SH
661 } else if (!strcmp(mode, "writeback")) {
662 *flags |= BDRV_O_CACHE_WB;
663 } else if (!strcmp(mode, "unsafe")) {
664 *flags |= BDRV_O_CACHE_WB;
665 *flags |= BDRV_O_NO_FLUSH;
666 } else if (!strcmp(mode, "writethrough")) {
667 /* this is the default */
668 } else {
669 return -1;
670 }
671
672 return 0;
673}
674
b1e6fc08
KW
675/*
676 * Returns the flags that a temporary snapshot should get, based on the
677 * originally requested flags (the originally requested image will have flags
678 * like a backing file)
679 */
680static int bdrv_temp_snapshot_flags(int flags)
681{
682 return (flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
683}
684
0b50cc88 685/*
f3930ed0
KW
686 * Returns the flags that bs->file should get if a protocol driver is expected,
687 * based on the given flags for the parent BDS
0b50cc88
KW
688 */
689static int bdrv_inherited_flags(int flags)
690{
691 /* Enable protocol handling, disable format probing for bs->file */
692 flags |= BDRV_O_PROTOCOL;
693
694 /* Our block drivers take care to send flushes and respect unmap policy,
695 * so we can enable both unconditionally on lower layers. */
696 flags |= BDRV_O_CACHE_WB | BDRV_O_UNMAP;
697
0b50cc88 698 /* Clear flags that only apply to the top layer */
5669b44d 699 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ);
0b50cc88
KW
700
701 return flags;
702}
703
f3930ed0
KW
704const BdrvChildRole child_file = {
705 .inherit_flags = bdrv_inherited_flags,
706};
707
708/*
709 * Returns the flags that bs->file should get if the use of formats (and not
710 * only protocols) is permitted for it, based on the given flags for the parent
711 * BDS
712 */
713static int bdrv_inherited_fmt_flags(int parent_flags)
714{
715 int flags = child_file.inherit_flags(parent_flags);
716 return flags & ~BDRV_O_PROTOCOL;
717}
718
719const BdrvChildRole child_format = {
720 .inherit_flags = bdrv_inherited_fmt_flags,
721};
722
317fc44e 723/*
760e0063 724 * Returns the flags that bs->backing should get, based on the given flags
317fc44e
KW
725 * for the parent BDS
726 */
727static int bdrv_backing_flags(int flags)
728{
729 /* backing files always opened read-only */
730 flags &= ~(BDRV_O_RDWR | BDRV_O_COPY_ON_READ);
731
732 /* snapshot=on is handled on the top layer */
8bfea15d 733 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e
KW
734
735 return flags;
736}
737
f3930ed0
KW
738static const BdrvChildRole child_backing = {
739 .inherit_flags = bdrv_backing_flags,
740};
741
7b272452
KW
742static int bdrv_open_flags(BlockDriverState *bs, int flags)
743{
744 int open_flags = flags | BDRV_O_CACHE_WB;
745
746 /*
747 * Clear flags that are internal to the block layer before opening the
748 * image.
749 */
20cca275 750 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
751
752 /*
753 * Snapshots should be writable.
754 */
8bfea15d 755 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
756 open_flags |= BDRV_O_RDWR;
757 }
758
759 return open_flags;
760}
761
636ea370
KW
762static void bdrv_assign_node_name(BlockDriverState *bs,
763 const char *node_name,
764 Error **errp)
6913c0c2
BC
765{
766 if (!node_name) {
636ea370 767 return;
6913c0c2
BC
768 }
769
9aebf3b8 770 /* Check for empty string or invalid characters */
f5bebbbb 771 if (!id_wellformed(node_name)) {
9aebf3b8 772 error_setg(errp, "Invalid node name");
636ea370 773 return;
6913c0c2
BC
774 }
775
0c5e94ee 776 /* takes care of avoiding namespaces collisions */
7f06d47e 777 if (blk_by_name(node_name)) {
0c5e94ee
BC
778 error_setg(errp, "node-name=%s is conflicting with a device id",
779 node_name);
636ea370 780 return;
0c5e94ee
BC
781 }
782
6913c0c2
BC
783 /* takes care of avoiding duplicates node names */
784 if (bdrv_find_node(node_name)) {
785 error_setg(errp, "Duplicate node name");
636ea370 786 return;
6913c0c2
BC
787 }
788
789 /* copy node name into the bs and insert it into the graph list */
790 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
791 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
6913c0c2
BC
792}
793
18edf289
KW
794static QemuOptsList bdrv_runtime_opts = {
795 .name = "bdrv_common",
796 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
797 .desc = {
798 {
799 .name = "node-name",
800 .type = QEMU_OPT_STRING,
801 .help = "Node name of the block device node",
802 },
803 { /* end of list */ }
804 },
805};
806
57915332
KW
807/*
808 * Common part for opening disk images and files
b6ad491a
KW
809 *
810 * Removes all processed options from *options.
57915332 811 */
9a4f4c31 812static int bdrv_open_common(BlockDriverState *bs, BdrvChild *file,
34b5d2c6 813 QDict *options, int flags, BlockDriver *drv, Error **errp)
57915332
KW
814{
815 int ret, open_flags;
035fccdf 816 const char *filename;
6913c0c2 817 const char *node_name = NULL;
18edf289 818 QemuOpts *opts;
34b5d2c6 819 Error *local_err = NULL;
57915332
KW
820
821 assert(drv != NULL);
6405875c 822 assert(bs->file == NULL);
707ff828 823 assert(options != NULL && bs->options != options);
57915332 824
45673671 825 if (file != NULL) {
9a4f4c31 826 filename = file->bs->filename;
45673671
KW
827 } else {
828 filename = qdict_get_try_str(options, "filename");
829 }
830
765003db
KW
831 if (drv->bdrv_needs_filename && !filename) {
832 error_setg(errp, "The '%s' block driver requires a file name",
833 drv->format_name);
834 return -EINVAL;
835 }
836
45673671 837 trace_bdrv_open_common(bs, filename ?: "", flags, drv->format_name);
28dcee10 838
18edf289
KW
839 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
840 qemu_opts_absorb_qdict(opts, options, &local_err);
0fb6395c 841 if (local_err) {
636ea370 842 error_propagate(errp, local_err);
18edf289
KW
843 ret = -EINVAL;
844 goto fail_opts;
6913c0c2 845 }
6913c0c2 846
18edf289 847 node_name = qemu_opt_get(opts, "node-name");
636ea370 848 bdrv_assign_node_name(bs, node_name, &local_err);
0fb6395c 849 if (local_err) {
636ea370 850 error_propagate(errp, local_err);
18edf289
KW
851 ret = -EINVAL;
852 goto fail_opts;
5d186eb0
KW
853 }
854
1b7fd729 855 bs->guest_block_size = 512;
c25f53b0 856 bs->request_alignment = 512;
0d51b4de 857 bs->zero_beyond_eof = true;
b64ec4e4
FZ
858 open_flags = bdrv_open_flags(bs, flags);
859 bs->read_only = !(open_flags & BDRV_O_RDWR);
860
861 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
862 error_setg(errp,
863 !bs->read_only && bdrv_is_whitelisted(drv, true)
864 ? "Driver '%s' can only be used for read-only devices"
865 : "Driver '%s' is not whitelisted",
866 drv->format_name);
18edf289
KW
867 ret = -ENOTSUP;
868 goto fail_opts;
b64ec4e4 869 }
57915332 870
53fec9d3 871 assert(bs->copy_on_read == 0); /* bdrv_new() and bdrv_close() make it so */
0ebd24e0
KW
872 if (flags & BDRV_O_COPY_ON_READ) {
873 if (!bs->read_only) {
874 bdrv_enable_copy_on_read(bs);
875 } else {
876 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
877 ret = -EINVAL;
878 goto fail_opts;
0ebd24e0 879 }
53fec9d3
SH
880 }
881
c2ad1b0c
KW
882 if (filename != NULL) {
883 pstrcpy(bs->filename, sizeof(bs->filename), filename);
884 } else {
885 bs->filename[0] = '\0';
886 }
91af7014 887 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 888
57915332 889 bs->drv = drv;
7267c094 890 bs->opaque = g_malloc0(drv->instance_size);
57915332 891
03f541bd 892 bs->enable_write_cache = !!(flags & BDRV_O_CACHE_WB);
e7c63796 893
66f82cee
KW
894 /* Open the image, either directly or using a protocol */
895 if (drv->bdrv_file_open) {
5d186eb0 896 assert(file == NULL);
030be321 897 assert(!drv->bdrv_needs_filename || filename != NULL);
34b5d2c6 898 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
f500a6d3 899 } else {
2af5ef70 900 if (file == NULL) {
34b5d2c6
HR
901 error_setg(errp, "Can't use '%s' as a block driver for the "
902 "protocol level", drv->format_name);
2af5ef70
KW
903 ret = -EINVAL;
904 goto free_and_fail;
905 }
f500a6d3 906 bs->file = file;
34b5d2c6 907 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
66f82cee
KW
908 }
909
57915332 910 if (ret < 0) {
84d18f06 911 if (local_err) {
34b5d2c6 912 error_propagate(errp, local_err);
2fa9aa59
DH
913 } else if (bs->filename[0]) {
914 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
34b5d2c6
HR
915 } else {
916 error_setg_errno(errp, -ret, "Could not open image");
917 }
57915332
KW
918 goto free_and_fail;
919 }
920
a1f688f4
MA
921 if (bs->encrypted) {
922 error_report("Encrypted images are deprecated");
923 error_printf("Support for them will be removed in a future release.\n"
924 "You can use 'qemu-img convert' to convert your image"
925 " to an unencrypted one.\n");
926 }
927
51762288
SH
928 ret = refresh_total_sectors(bs, bs->total_sectors);
929 if (ret < 0) {
34b5d2c6 930 error_setg_errno(errp, -ret, "Could not refresh total sector count");
51762288 931 goto free_and_fail;
57915332 932 }
51762288 933
3baca891
KW
934 bdrv_refresh_limits(bs, &local_err);
935 if (local_err) {
936 error_propagate(errp, local_err);
937 ret = -EINVAL;
938 goto free_and_fail;
939 }
940
c25f53b0 941 assert(bdrv_opt_mem_align(bs) != 0);
4196d2f0 942 assert(bdrv_min_mem_align(bs) != 0);
b192af8a 943 assert((bs->request_alignment != 0) || bdrv_is_sg(bs));
18edf289
KW
944
945 qemu_opts_del(opts);
57915332
KW
946 return 0;
947
948free_and_fail:
f500a6d3 949 bs->file = NULL;
7267c094 950 g_free(bs->opaque);
57915332
KW
951 bs->opaque = NULL;
952 bs->drv = NULL;
18edf289
KW
953fail_opts:
954 qemu_opts_del(opts);
57915332
KW
955 return ret;
956}
957
5e5c4f63
KW
958static QDict *parse_json_filename(const char *filename, Error **errp)
959{
960 QObject *options_obj;
961 QDict *options;
962 int ret;
963
964 ret = strstart(filename, "json:", &filename);
965 assert(ret);
966
967 options_obj = qobject_from_json(filename);
968 if (!options_obj) {
969 error_setg(errp, "Could not parse the JSON options");
970 return NULL;
971 }
972
973 if (qobject_type(options_obj) != QTYPE_QDICT) {
974 qobject_decref(options_obj);
975 error_setg(errp, "Invalid JSON object given");
976 return NULL;
977 }
978
979 options = qobject_to_qdict(options_obj);
980 qdict_flatten(options);
981
982 return options;
983}
984
b6ce07aa 985/*
f54120ff
KW
986 * Fills in default options for opening images and converts the legacy
987 * filename/flags pair to option QDict entries.
53a29513
HR
988 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
989 * block driver has been specified explicitly.
b6ce07aa 990 */
53a29513 991static int bdrv_fill_options(QDict **options, const char **pfilename,
053e1578 992 int *flags, Error **errp)
ea2384d3 993{
5e5c4f63 994 const char *filename = *pfilename;
c2ad1b0c 995 const char *drvname;
53a29513 996 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 997 bool parse_filename = false;
053e1578 998 BlockDriver *drv = NULL;
34b5d2c6 999 Error *local_err = NULL;
83f64091 1000
5e5c4f63
KW
1001 /* Parse json: pseudo-protocol */
1002 if (filename && g_str_has_prefix(filename, "json:")) {
1003 QDict *json_options = parse_json_filename(filename, &local_err);
1004 if (local_err) {
1005 error_propagate(errp, local_err);
1006 return -EINVAL;
1007 }
1008
1009 /* Options given in the filename have lower priority than options
1010 * specified directly */
1011 qdict_join(*options, json_options, false);
1012 QDECREF(json_options);
1013 *pfilename = filename = NULL;
1014 }
1015
53a29513 1016 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1017 if (drvname) {
1018 drv = bdrv_find_format(drvname);
1019 if (!drv) {
1020 error_setg(errp, "Unknown driver '%s'", drvname);
1021 return -ENOENT;
1022 }
1023 /* If the user has explicitly specified the driver, this choice should
1024 * override the BDRV_O_PROTOCOL flag */
1025 protocol = drv->bdrv_file_open;
53a29513
HR
1026 }
1027
1028 if (protocol) {
1029 *flags |= BDRV_O_PROTOCOL;
1030 } else {
1031 *flags &= ~BDRV_O_PROTOCOL;
1032 }
1033
035fccdf 1034 /* Fetch the file name from the options QDict if necessary */
17b005f1 1035 if (protocol && filename) {
f54120ff
KW
1036 if (!qdict_haskey(*options, "filename")) {
1037 qdict_put(*options, "filename", qstring_from_str(filename));
1038 parse_filename = true;
1039 } else {
1040 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1041 "the same time");
1042 return -EINVAL;
1043 }
035fccdf
KW
1044 }
1045
c2ad1b0c 1046 /* Find the right block driver */
f54120ff 1047 filename = qdict_get_try_str(*options, "filename");
f54120ff 1048
053e1578
HR
1049 if (!drvname && protocol) {
1050 if (filename) {
1051 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1052 if (!drv) {
053e1578 1053 return -EINVAL;
17b005f1 1054 }
053e1578
HR
1055
1056 drvname = drv->format_name;
1057 qdict_put(*options, "driver", qstring_from_str(drvname));
1058 } else {
1059 error_setg(errp, "Must specify either driver or file");
1060 return -EINVAL;
98289620 1061 }
c2ad1b0c
KW
1062 }
1063
17b005f1 1064 assert(drv || !protocol);
c2ad1b0c 1065
f54120ff 1066 /* Driver-specific filename parsing */
17b005f1 1067 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1068 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1069 if (local_err) {
34b5d2c6 1070 error_propagate(errp, local_err);
f54120ff 1071 return -EINVAL;
6963a30d 1072 }
cd5d031e
HR
1073
1074 if (!drv->bdrv_needs_filename) {
1075 qdict_del(*options, "filename");
cd5d031e 1076 }
6963a30d
KW
1077 }
1078
f54120ff
KW
1079 return 0;
1080}
1081
b4b059f6
KW
1082static BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
1083 BlockDriverState *child_bs,
1084 const BdrvChildRole *child_role)
df581792
KW
1085{
1086 BdrvChild *child = g_new(BdrvChild, 1);
1087 *child = (BdrvChild) {
1088 .bs = child_bs,
1089 .role = child_role,
1090 };
1091
1092 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
d42a8a93 1093 QLIST_INSERT_HEAD(&child_bs->parents, child, next_parent);
b4b059f6
KW
1094
1095 return child;
df581792
KW
1096}
1097
3f09bfbc 1098static void bdrv_detach_child(BdrvChild *child)
33a60407
KW
1099{
1100 QLIST_REMOVE(child, next);
d42a8a93 1101 QLIST_REMOVE(child, next_parent);
33a60407
KW
1102 g_free(child);
1103}
1104
1105void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
1106{
779020cb
KW
1107 BlockDriverState *child_bs;
1108
1109 if (child == NULL) {
1110 return;
1111 }
33a60407
KW
1112
1113 if (child->bs->inherits_from == parent) {
1114 child->bs->inherits_from = NULL;
1115 }
1116
779020cb 1117 child_bs = child->bs;
33a60407
KW
1118 bdrv_detach_child(child);
1119 bdrv_unref(child_bs);
1120}
1121
5db15a57
KW
1122/*
1123 * Sets the backing file link of a BDS. A new reference is created; callers
1124 * which don't need their own reference any more must call bdrv_unref().
1125 */
8d24cce1
FZ
1126void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd)
1127{
5db15a57
KW
1128 if (backing_hd) {
1129 bdrv_ref(backing_hd);
1130 }
8d24cce1 1131
760e0063 1132 if (bs->backing) {
826b6ca0 1133 assert(bs->backing_blocker);
760e0063 1134 bdrv_op_unblock_all(bs->backing->bs, bs->backing_blocker);
5db15a57 1135 bdrv_unref_child(bs, bs->backing);
826b6ca0
FZ
1136 } else if (backing_hd) {
1137 error_setg(&bs->backing_blocker,
81e5f78a
AG
1138 "node is used as backing hd of '%s'",
1139 bdrv_get_device_or_node_name(bs));
826b6ca0
FZ
1140 }
1141
8d24cce1 1142 if (!backing_hd) {
826b6ca0
FZ
1143 error_free(bs->backing_blocker);
1144 bs->backing_blocker = NULL;
760e0063 1145 bs->backing = NULL;
8d24cce1
FZ
1146 goto out;
1147 }
760e0063 1148 bs->backing = bdrv_attach_child(bs, backing_hd, &child_backing);
8d24cce1
FZ
1149 bs->open_flags &= ~BDRV_O_NO_BACKING;
1150 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_hd->filename);
1151 pstrcpy(bs->backing_format, sizeof(bs->backing_format),
1152 backing_hd->drv ? backing_hd->drv->format_name : "");
826b6ca0 1153
760e0063 1154 bdrv_op_block_all(backing_hd, bs->backing_blocker);
826b6ca0 1155 /* Otherwise we won't be able to commit due to check in bdrv_commit */
760e0063 1156 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
826b6ca0 1157 bs->backing_blocker);
8d24cce1 1158out:
3baca891 1159 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
1160}
1161
31ca6d07
KW
1162/*
1163 * Opens the backing file for a BlockDriverState if not yet open
1164 *
1165 * options is a QDict of options to pass to the block drivers, or NULL for an
1166 * empty set of options. The reference to the QDict is transferred to this
1167 * function (even on failure), so if the caller intends to reuse the dictionary,
1168 * it needs to use QINCREF() before calling bdrv_file_open.
1169 */
34b5d2c6 1170int bdrv_open_backing_file(BlockDriverState *bs, QDict *options, Error **errp)
9156df12 1171{
1ba4b6a5 1172 char *backing_filename = g_malloc0(PATH_MAX);
317fc44e 1173 int ret = 0;
8d24cce1 1174 BlockDriverState *backing_hd;
34b5d2c6 1175 Error *local_err = NULL;
9156df12 1176
760e0063 1177 if (bs->backing != NULL) {
31ca6d07 1178 QDECREF(options);
1ba4b6a5 1179 goto free_exit;
9156df12
PB
1180 }
1181
31ca6d07
KW
1182 /* NULL means an empty set of options */
1183 if (options == NULL) {
1184 options = qdict_new();
1185 }
1186
9156df12 1187 bs->open_flags &= ~BDRV_O_NO_BACKING;
1cb6f506
KW
1188 if (qdict_haskey(options, "file.filename")) {
1189 backing_filename[0] = '\0';
1190 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 1191 QDECREF(options);
1ba4b6a5 1192 goto free_exit;
dbecebdd 1193 } else {
9f07429e
HR
1194 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
1195 &local_err);
1196 if (local_err) {
1197 ret = -EINVAL;
1198 error_propagate(errp, local_err);
1199 QDECREF(options);
1200 goto free_exit;
1201 }
9156df12
PB
1202 }
1203
8ee79e70
KW
1204 if (!bs->drv || !bs->drv->supports_backing) {
1205 ret = -EINVAL;
1206 error_setg(errp, "Driver doesn't support backing files");
1207 QDECREF(options);
1208 goto free_exit;
1209 }
1210
e4e9986b 1211 backing_hd = bdrv_new();
8d24cce1 1212
c5f6e493
KW
1213 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
1214 qdict_put(options, "driver", qstring_from_str(bs->backing_format));
9156df12
PB
1215 }
1216
760e0063 1217 assert(bs->backing == NULL);
f3930ed0
KW
1218 ret = bdrv_open_inherit(&backing_hd,
1219 *backing_filename ? backing_filename : NULL,
ce343771 1220 NULL, options, 0, bs, &child_backing, &local_err);
9156df12 1221 if (ret < 0) {
8d24cce1
FZ
1222 bdrv_unref(backing_hd);
1223 backing_hd = NULL;
9156df12 1224 bs->open_flags |= BDRV_O_NO_BACKING;
b04b6b6e
FZ
1225 error_setg(errp, "Could not open backing file: %s",
1226 error_get_pretty(local_err));
1227 error_free(local_err);
1ba4b6a5 1228 goto free_exit;
9156df12 1229 }
df581792 1230
5db15a57
KW
1231 /* Hook up the backing file link; drop our reference, bs owns the
1232 * backing_hd reference now */
8d24cce1 1233 bdrv_set_backing_hd(bs, backing_hd);
5db15a57 1234 bdrv_unref(backing_hd);
d80ac658 1235
1ba4b6a5
BC
1236free_exit:
1237 g_free(backing_filename);
1238 return ret;
9156df12
PB
1239}
1240
da557aac
HR
1241/*
1242 * Opens a disk image whose options are given as BlockdevRef in another block
1243 * device's options.
1244 *
da557aac 1245 * If allow_none is true, no image will be opened if filename is false and no
b4b059f6 1246 * BlockdevRef is given. NULL will be returned, but errp remains unset.
da557aac
HR
1247 *
1248 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
1249 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1250 * itself, all options starting with "${bdref_key}." are considered part of the
1251 * BlockdevRef.
1252 *
1253 * The BlockdevRef will be removed from the options QDict.
1254 */
b4b059f6
KW
1255BdrvChild *bdrv_open_child(const char *filename,
1256 QDict *options, const char *bdref_key,
1257 BlockDriverState* parent,
1258 const BdrvChildRole *child_role,
1259 bool allow_none, Error **errp)
da557aac 1260{
b4b059f6
KW
1261 BdrvChild *c = NULL;
1262 BlockDriverState *bs;
da557aac
HR
1263 QDict *image_options;
1264 int ret;
1265 char *bdref_key_dot;
1266 const char *reference;
1267
df581792 1268 assert(child_role != NULL);
f67503e5 1269
da557aac
HR
1270 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1271 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
1272 g_free(bdref_key_dot);
1273
1274 reference = qdict_get_try_str(options, bdref_key);
1275 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 1276 if (!allow_none) {
da557aac
HR
1277 error_setg(errp, "A block device must be specified for \"%s\"",
1278 bdref_key);
da557aac 1279 }
b20e61e0 1280 QDECREF(image_options);
da557aac
HR
1281 goto done;
1282 }
1283
b4b059f6
KW
1284 bs = NULL;
1285 ret = bdrv_open_inherit(&bs, filename, reference, image_options, 0,
ce343771 1286 parent, child_role, errp);
df581792
KW
1287 if (ret < 0) {
1288 goto done;
1289 }
1290
b4b059f6 1291 c = bdrv_attach_child(parent, bs, child_role);
da557aac
HR
1292
1293done:
1294 qdict_del(options, bdref_key);
b4b059f6
KW
1295 return c;
1296}
1297
6b8aeca5 1298int bdrv_append_temp_snapshot(BlockDriverState *bs, int flags, Error **errp)
b998875d
KW
1299{
1300 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 1301 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 1302 int64_t total_size;
83d0521a 1303 QemuOpts *opts = NULL;
b998875d
KW
1304 QDict *snapshot_options;
1305 BlockDriverState *bs_snapshot;
c2e0dbbf 1306 Error *local_err = NULL;
b998875d
KW
1307 int ret;
1308
1309 /* if snapshot, we create a temporary backing file and open it
1310 instead of opening 'filename' directly */
1311
1312 /* Get the required size from the image */
f187743a
KW
1313 total_size = bdrv_getlength(bs);
1314 if (total_size < 0) {
6b8aeca5 1315 ret = total_size;
f187743a 1316 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 1317 goto out;
f187743a 1318 }
b998875d
KW
1319
1320 /* Create the temporary image */
1ba4b6a5 1321 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
1322 if (ret < 0) {
1323 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 1324 goto out;
b998875d
KW
1325 }
1326
ef810437 1327 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 1328 &error_abort);
39101f25 1329 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
ef810437 1330 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, &local_err);
83d0521a 1331 qemu_opts_del(opts);
b998875d
KW
1332 if (ret < 0) {
1333 error_setg_errno(errp, -ret, "Could not create temporary overlay "
1334 "'%s': %s", tmp_filename,
1335 error_get_pretty(local_err));
1336 error_free(local_err);
1ba4b6a5 1337 goto out;
b998875d
KW
1338 }
1339
1340 /* Prepare a new options QDict for the temporary file */
1341 snapshot_options = qdict_new();
1342 qdict_put(snapshot_options, "file.driver",
1343 qstring_from_str("file"));
1344 qdict_put(snapshot_options, "file.filename",
1345 qstring_from_str(tmp_filename));
e6641719
HR
1346 qdict_put(snapshot_options, "driver",
1347 qstring_from_str("qcow2"));
b998875d 1348
e4e9986b 1349 bs_snapshot = bdrv_new();
b998875d
KW
1350
1351 ret = bdrv_open(&bs_snapshot, NULL, NULL, snapshot_options,
6ebf9aa2 1352 flags, &local_err);
b998875d
KW
1353 if (ret < 0) {
1354 error_propagate(errp, local_err);
1ba4b6a5 1355 goto out;
b998875d
KW
1356 }
1357
1358 bdrv_append(bs_snapshot, bs);
1ba4b6a5
BC
1359
1360out:
1361 g_free(tmp_filename);
6b8aeca5 1362 return ret;
b998875d
KW
1363}
1364
b6ce07aa
KW
1365/*
1366 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
1367 *
1368 * options is a QDict of options to pass to the block drivers, or NULL for an
1369 * empty set of options. The reference to the QDict belongs to the block layer
1370 * after the call (even on failure), so if the caller intends to reuse the
1371 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
1372 *
1373 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
1374 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
1375 *
1376 * The reference parameter may be used to specify an existing block device which
1377 * should be opened. If specified, neither options nor a filename may be given,
1378 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 1379 */
f3930ed0
KW
1380static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
1381 const char *reference, QDict *options, int flags,
1382 BlockDriverState *parent,
ce343771 1383 const BdrvChildRole *child_role, Error **errp)
ea2384d3 1384{
b6ce07aa 1385 int ret;
9a4f4c31
KW
1386 BdrvChild *file = NULL;
1387 BlockDriverState *bs;
ce343771 1388 BlockDriver *drv = NULL;
74fe54f2 1389 const char *drvname;
34b5d2c6 1390 Error *local_err = NULL;
b1e6fc08 1391 int snapshot_flags = 0;
712e7874 1392
f67503e5 1393 assert(pbs);
f3930ed0
KW
1394 assert(!child_role || !flags);
1395 assert(!child_role == !parent);
f67503e5 1396
ddf5636d
HR
1397 if (reference) {
1398 bool options_non_empty = options ? qdict_size(options) : false;
1399 QDECREF(options);
1400
1401 if (*pbs) {
1402 error_setg(errp, "Cannot reuse an existing BDS when referencing "
1403 "another block device");
1404 return -EINVAL;
1405 }
1406
1407 if (filename || options_non_empty) {
1408 error_setg(errp, "Cannot reference an existing block device with "
1409 "additional options or a new filename");
1410 return -EINVAL;
1411 }
1412
1413 bs = bdrv_lookup_bs(reference, reference, errp);
1414 if (!bs) {
1415 return -ENODEV;
1416 }
1417 bdrv_ref(bs);
1418 *pbs = bs;
1419 return 0;
1420 }
1421
f67503e5
HR
1422 if (*pbs) {
1423 bs = *pbs;
1424 } else {
e4e9986b 1425 bs = bdrv_new();
f67503e5
HR
1426 }
1427
de9c0cec
KW
1428 /* NULL means an empty set of options */
1429 if (options == NULL) {
1430 options = qdict_new();
1431 }
1432
f3930ed0 1433 if (child_role) {
bddcec37 1434 bs->inherits_from = parent;
f3930ed0
KW
1435 flags = child_role->inherit_flags(parent->open_flags);
1436 }
1437
053e1578 1438 ret = bdrv_fill_options(&options, &filename, &flags, &local_err);
462f5bcf
KW
1439 if (local_err) {
1440 goto fail;
1441 }
1442
76c591b0 1443 /* Find the right image format driver */
76c591b0
KW
1444 drvname = qdict_get_try_str(options, "driver");
1445 if (drvname) {
1446 drv = bdrv_find_format(drvname);
1447 qdict_del(options, "driver");
1448 if (!drv) {
1449 error_setg(errp, "Unknown driver: '%s'", drvname);
1450 ret = -EINVAL;
1451 goto fail;
1452 }
1453 }
1454
1455 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 1456
f3930ed0 1457 bs->open_flags = flags;
de9c0cec 1458 bs->options = options;
b6ad491a 1459 options = qdict_clone_shallow(options);
de9c0cec 1460
f500a6d3 1461 /* Open image file without format layer */
f4788adc
KW
1462 if ((flags & BDRV_O_PROTOCOL) == 0) {
1463 if (flags & BDRV_O_RDWR) {
1464 flags |= BDRV_O_ALLOW_RDWR;
1465 }
1466 if (flags & BDRV_O_SNAPSHOT) {
1467 snapshot_flags = bdrv_temp_snapshot_flags(flags);
1468 flags = bdrv_backing_flags(flags);
1469 }
f500a6d3 1470
f3930ed0 1471 bs->open_flags = flags;
1fdd6933 1472
9a4f4c31
KW
1473 file = bdrv_open_child(filename, options, "file", bs,
1474 &child_file, true, &local_err);
1fdd6933
KW
1475 if (local_err) {
1476 ret = -EINVAL;
f4788adc
KW
1477 goto fail;
1478 }
f500a6d3
KW
1479 }
1480
76c591b0 1481 /* Image format probing */
38f3ef57 1482 bs->probed = !drv;
76c591b0 1483 if (!drv && file) {
9a4f4c31 1484 ret = find_image_format(file->bs, filename, &drv, &local_err);
17b005f1 1485 if (ret < 0) {
8bfea15d 1486 goto fail;
2a05cbe4 1487 }
76c591b0 1488 } else if (!drv) {
17b005f1
KW
1489 error_setg(errp, "Must specify either driver or file");
1490 ret = -EINVAL;
8bfea15d 1491 goto fail;
ea2384d3 1492 }
b6ce07aa 1493
53a29513
HR
1494 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
1495 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
1496 /* file must be NULL if a protocol BDS is about to be created
1497 * (the inverse results in an error message from bdrv_open_common()) */
1498 assert(!(flags & BDRV_O_PROTOCOL) || !file);
1499
b6ce07aa 1500 /* Open the image */
34b5d2c6 1501 ret = bdrv_open_common(bs, file, options, flags, drv, &local_err);
b6ce07aa 1502 if (ret < 0) {
8bfea15d 1503 goto fail;
6987307c
CH
1504 }
1505
2a05cbe4 1506 if (file && (bs->file != file)) {
9a4f4c31 1507 bdrv_unref_child(bs, file);
f500a6d3
KW
1508 file = NULL;
1509 }
1510
b6ce07aa 1511 /* If there is a backing file, use it */
9156df12 1512 if ((flags & BDRV_O_NO_BACKING) == 0) {
31ca6d07
KW
1513 QDict *backing_options;
1514
5726d872 1515 qdict_extract_subqdict(options, &backing_options, "backing.");
34b5d2c6 1516 ret = bdrv_open_backing_file(bs, backing_options, &local_err);
b6ce07aa 1517 if (ret < 0) {
b6ad491a 1518 goto close_and_fail;
b6ce07aa 1519 }
b6ce07aa
KW
1520 }
1521
91af7014
HR
1522 bdrv_refresh_filename(bs);
1523
b6ad491a 1524 /* Check if any unknown options were used */
5acd9d81 1525 if (options && (qdict_size(options) != 0)) {
b6ad491a 1526 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
1527 if (flags & BDRV_O_PROTOCOL) {
1528 error_setg(errp, "Block protocol '%s' doesn't support the option "
1529 "'%s'", drv->format_name, entry->key);
1530 } else {
1531 error_setg(errp, "Block format '%s' used by device '%s' doesn't "
1532 "support the option '%s'", drv->format_name,
bfb197e0 1533 bdrv_get_device_name(bs), entry->key);
5acd9d81 1534 }
b6ad491a
KW
1535
1536 ret = -EINVAL;
1537 goto close_and_fail;
1538 }
b6ad491a 1539
b6ce07aa 1540 if (!bdrv_key_required(bs)) {
a7f53e26
MA
1541 if (bs->blk) {
1542 blk_dev_change_media_cb(bs->blk, true);
1543 }
c3adb58f
MA
1544 } else if (!runstate_check(RUN_STATE_PRELAUNCH)
1545 && !runstate_check(RUN_STATE_INMIGRATE)
1546 && !runstate_check(RUN_STATE_PAUSED)) { /* HACK */
1547 error_setg(errp,
1548 "Guest must be stopped for opening of encrypted image");
1549 ret = -EBUSY;
1550 goto close_and_fail;
b6ce07aa
KW
1551 }
1552
c3adb58f 1553 QDECREF(options);
f67503e5 1554 *pbs = bs;
dd62f1ca
KW
1555
1556 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
1557 * temporary snapshot afterwards. */
1558 if (snapshot_flags) {
1559 ret = bdrv_append_temp_snapshot(bs, snapshot_flags, &local_err);
1560 if (local_err) {
1561 goto close_and_fail;
1562 }
1563 }
1564
b6ce07aa
KW
1565 return 0;
1566
8bfea15d 1567fail:
f500a6d3 1568 if (file != NULL) {
9a4f4c31 1569 bdrv_unref_child(bs, file);
f500a6d3 1570 }
de9c0cec 1571 QDECREF(bs->options);
b6ad491a 1572 QDECREF(options);
de9c0cec 1573 bs->options = NULL;
f67503e5
HR
1574 if (!*pbs) {
1575 /* If *pbs is NULL, a new BDS has been created in this function and
1576 needs to be freed now. Otherwise, it does not need to be closed,
1577 since it has not really been opened yet. */
1578 bdrv_unref(bs);
1579 }
84d18f06 1580 if (local_err) {
34b5d2c6
HR
1581 error_propagate(errp, local_err);
1582 }
b6ad491a 1583 return ret;
de9c0cec 1584
b6ad491a 1585close_and_fail:
f67503e5
HR
1586 /* See fail path, but now the BDS has to be always closed */
1587 if (*pbs) {
1588 bdrv_close(bs);
1589 } else {
1590 bdrv_unref(bs);
1591 }
b6ad491a 1592 QDECREF(options);
84d18f06 1593 if (local_err) {
34b5d2c6
HR
1594 error_propagate(errp, local_err);
1595 }
b6ce07aa
KW
1596 return ret;
1597}
1598
f3930ed0 1599int bdrv_open(BlockDriverState **pbs, const char *filename,
6ebf9aa2 1600 const char *reference, QDict *options, int flags, Error **errp)
f3930ed0
KW
1601{
1602 return bdrv_open_inherit(pbs, filename, reference, options, flags, NULL,
ce343771 1603 NULL, errp);
f3930ed0
KW
1604}
1605
e971aa12
JC
1606typedef struct BlockReopenQueueEntry {
1607 bool prepared;
1608 BDRVReopenState state;
1609 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
1610} BlockReopenQueueEntry;
1611
1612/*
1613 * Adds a BlockDriverState to a simple queue for an atomic, transactional
1614 * reopen of multiple devices.
1615 *
1616 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
1617 * already performed, or alternatively may be NULL a new BlockReopenQueue will
1618 * be created and initialized. This newly created BlockReopenQueue should be
1619 * passed back in for subsequent calls that are intended to be of the same
1620 * atomic 'set'.
1621 *
1622 * bs is the BlockDriverState to add to the reopen queue.
1623 *
4d2cb092
KW
1624 * options contains the changed options for the associated bs
1625 * (the BlockReopenQueue takes ownership)
1626 *
e971aa12
JC
1627 * flags contains the open flags for the associated bs
1628 *
1629 * returns a pointer to bs_queue, which is either the newly allocated
1630 * bs_queue, or the existing bs_queue being used.
1631 *
1632 */
1633BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
4d2cb092
KW
1634 BlockDriverState *bs,
1635 QDict *options, int flags)
e971aa12
JC
1636{
1637 assert(bs != NULL);
1638
1639 BlockReopenQueueEntry *bs_entry;
67251a31 1640 BdrvChild *child;
4d2cb092 1641 QDict *old_options;
67251a31 1642
e971aa12
JC
1643 if (bs_queue == NULL) {
1644 bs_queue = g_new0(BlockReopenQueue, 1);
1645 QSIMPLEQ_INIT(bs_queue);
1646 }
1647
4d2cb092
KW
1648 if (!options) {
1649 options = qdict_new();
1650 }
1651
1652 old_options = qdict_clone_shallow(bs->options);
1653 qdict_join(options, old_options, false);
1654 QDECREF(old_options);
1655
f1f25a2e
KW
1656 /* bdrv_open() masks this flag out */
1657 flags &= ~BDRV_O_PROTOCOL;
1658
67251a31
KW
1659 QLIST_FOREACH(child, &bs->children, next) {
1660 int child_flags;
1661
1662 if (child->bs->inherits_from != bs) {
1663 continue;
1664 }
1665
1666 child_flags = child->role->inherit_flags(flags);
4d2cb092
KW
1667 /* TODO Pass down child flags (backing.*, extents.*, ...) */
1668 bdrv_reopen_queue(bs_queue, child->bs, NULL, child_flags);
e971aa12
JC
1669 }
1670
1671 bs_entry = g_new0(BlockReopenQueueEntry, 1);
1672 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
1673
1674 bs_entry->state.bs = bs;
4d2cb092 1675 bs_entry->state.options = options;
e971aa12
JC
1676 bs_entry->state.flags = flags;
1677
1678 return bs_queue;
1679}
1680
1681/*
1682 * Reopen multiple BlockDriverStates atomically & transactionally.
1683 *
1684 * The queue passed in (bs_queue) must have been built up previous
1685 * via bdrv_reopen_queue().
1686 *
1687 * Reopens all BDS specified in the queue, with the appropriate
1688 * flags. All devices are prepared for reopen, and failure of any
1689 * device will cause all device changes to be abandonded, and intermediate
1690 * data cleaned up.
1691 *
1692 * If all devices prepare successfully, then the changes are committed
1693 * to all devices.
1694 *
1695 */
1696int bdrv_reopen_multiple(BlockReopenQueue *bs_queue, Error **errp)
1697{
1698 int ret = -1;
1699 BlockReopenQueueEntry *bs_entry, *next;
1700 Error *local_err = NULL;
1701
1702 assert(bs_queue != NULL);
1703
1704 bdrv_drain_all();
1705
1706 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1707 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
1708 error_propagate(errp, local_err);
1709 goto cleanup;
1710 }
1711 bs_entry->prepared = true;
1712 }
1713
1714 /* If we reach this point, we have success and just need to apply the
1715 * changes
1716 */
1717 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1718 bdrv_reopen_commit(&bs_entry->state);
1719 }
1720
1721 ret = 0;
1722
1723cleanup:
1724 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
1725 if (ret && bs_entry->prepared) {
1726 bdrv_reopen_abort(&bs_entry->state);
1727 }
4d2cb092 1728 QDECREF(bs_entry->state.options);
e971aa12
JC
1729 g_free(bs_entry);
1730 }
1731 g_free(bs_queue);
1732 return ret;
1733}
1734
1735
1736/* Reopen a single BlockDriverState with the specified flags. */
1737int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
1738{
1739 int ret = -1;
1740 Error *local_err = NULL;
4d2cb092 1741 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12
JC
1742
1743 ret = bdrv_reopen_multiple(queue, &local_err);
1744 if (local_err != NULL) {
1745 error_propagate(errp, local_err);
1746 }
1747 return ret;
1748}
1749
1750
1751/*
1752 * Prepares a BlockDriverState for reopen. All changes are staged in the
1753 * 'opaque' field of the BDRVReopenState, which is used and allocated by
1754 * the block driver layer .bdrv_reopen_prepare()
1755 *
1756 * bs is the BlockDriverState to reopen
1757 * flags are the new open flags
1758 * queue is the reopen queue
1759 *
1760 * Returns 0 on success, non-zero on error. On error errp will be set
1761 * as well.
1762 *
1763 * On failure, bdrv_reopen_abort() will be called to clean up any data.
1764 * It is the responsibility of the caller to then call the abort() or
1765 * commit() for any other BDS that have been left in a prepare() state
1766 *
1767 */
1768int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
1769 Error **errp)
1770{
1771 int ret = -1;
1772 Error *local_err = NULL;
1773 BlockDriver *drv;
1774
1775 assert(reopen_state != NULL);
1776 assert(reopen_state->bs->drv != NULL);
1777 drv = reopen_state->bs->drv;
1778
1779 /* if we are to stay read-only, do not allow permission change
1780 * to r/w */
1781 if (!(reopen_state->bs->open_flags & BDRV_O_ALLOW_RDWR) &&
1782 reopen_state->flags & BDRV_O_RDWR) {
81e5f78a
AG
1783 error_setg(errp, "Node '%s' is read only",
1784 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
1785 goto error;
1786 }
1787
1788
1789 ret = bdrv_flush(reopen_state->bs);
1790 if (ret) {
1791 error_set(errp, ERROR_CLASS_GENERIC_ERROR, "Error (%s) flushing drive",
1792 strerror(-ret));
1793 goto error;
1794 }
1795
1796 if (drv->bdrv_reopen_prepare) {
1797 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
1798 if (ret) {
1799 if (local_err != NULL) {
1800 error_propagate(errp, local_err);
1801 } else {
d8b6895f
LC
1802 error_setg(errp, "failed while preparing to reopen image '%s'",
1803 reopen_state->bs->filename);
e971aa12
JC
1804 }
1805 goto error;
1806 }
1807 } else {
1808 /* It is currently mandatory to have a bdrv_reopen_prepare()
1809 * handler for each supported drv. */
81e5f78a
AG
1810 error_setg(errp, "Block format '%s' used by node '%s' "
1811 "does not support reopening files", drv->format_name,
1812 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
1813 ret = -1;
1814 goto error;
1815 }
1816
4d2cb092
KW
1817 /* Options that are not handled are only okay if they are unchanged
1818 * compared to the old state. It is expected that some options are only
1819 * used for the initial open, but not reopen (e.g. filename) */
1820 if (qdict_size(reopen_state->options)) {
1821 const QDictEntry *entry = qdict_first(reopen_state->options);
1822
1823 do {
1824 QString *new_obj = qobject_to_qstring(entry->value);
1825 const char *new = qstring_get_str(new_obj);
1826 const char *old = qdict_get_try_str(reopen_state->bs->options,
1827 entry->key);
1828
1829 if (!old || strcmp(new, old)) {
1830 error_setg(errp, "Cannot change the option '%s'", entry->key);
1831 ret = -EINVAL;
1832 goto error;
1833 }
1834 } while ((entry = qdict_next(reopen_state->options, entry)));
1835 }
1836
e971aa12
JC
1837 ret = 0;
1838
1839error:
1840 return ret;
1841}
1842
1843/*
1844 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
1845 * makes them final by swapping the staging BlockDriverState contents into
1846 * the active BlockDriverState contents.
1847 */
1848void bdrv_reopen_commit(BDRVReopenState *reopen_state)
1849{
1850 BlockDriver *drv;
1851
1852 assert(reopen_state != NULL);
1853 drv = reopen_state->bs->drv;
1854 assert(drv != NULL);
1855
1856 /* If there are any driver level actions to take */
1857 if (drv->bdrv_reopen_commit) {
1858 drv->bdrv_reopen_commit(reopen_state);
1859 }
1860
1861 /* set BDS specific flags now */
1862 reopen_state->bs->open_flags = reopen_state->flags;
1863 reopen_state->bs->enable_write_cache = !!(reopen_state->flags &
1864 BDRV_O_CACHE_WB);
1865 reopen_state->bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 1866
3baca891 1867 bdrv_refresh_limits(reopen_state->bs, NULL);
e971aa12
JC
1868}
1869
1870/*
1871 * Abort the reopen, and delete and free the staged changes in
1872 * reopen_state
1873 */
1874void bdrv_reopen_abort(BDRVReopenState *reopen_state)
1875{
1876 BlockDriver *drv;
1877
1878 assert(reopen_state != NULL);
1879 drv = reopen_state->bs->drv;
1880 assert(drv != NULL);
1881
1882 if (drv->bdrv_reopen_abort) {
1883 drv->bdrv_reopen_abort(reopen_state);
1884 }
1885}
1886
1887
fc01f7e7
FB
1888void bdrv_close(BlockDriverState *bs)
1889{
33384421
HR
1890 BdrvAioNotifier *ban, *ban_next;
1891
3cbc002c
PB
1892 if (bs->job) {
1893 block_job_cancel_sync(bs->job);
1894 }
99b7e775
AG
1895
1896 /* Disable I/O limits and drain all pending throttled requests */
1897 if (bs->io_limits_enabled) {
1898 bdrv_io_limits_disable(bs);
1899 }
1900
53ec73e2 1901 bdrv_drain(bs); /* complete I/O */
58fda173 1902 bdrv_flush(bs);
53ec73e2 1903 bdrv_drain(bs); /* in case flush left pending I/O */
d7d512f6 1904 notifier_list_notify(&bs->close_notifiers, bs);
7094f12f 1905
3cbc002c 1906 if (bs->drv) {
6e93e7c4
KW
1907 BdrvChild *child, *next;
1908
9a7dedbc 1909 bs->drv->bdrv_close(bs);
9a4f4c31 1910 bs->drv = NULL;
9a7dedbc 1911
5db15a57 1912 bdrv_set_backing_hd(bs, NULL);
9a7dedbc 1913
9a4f4c31
KW
1914 if (bs->file != NULL) {
1915 bdrv_unref_child(bs, bs->file);
1916 bs->file = NULL;
1917 }
1918
6e93e7c4 1919 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
1920 /* TODO Remove bdrv_unref() from drivers' close function and use
1921 * bdrv_unref_child() here */
bddcec37
KW
1922 if (child->bs->inherits_from == bs) {
1923 child->bs->inherits_from = NULL;
1924 }
33a60407 1925 bdrv_detach_child(child);
6e93e7c4
KW
1926 }
1927
7267c094 1928 g_free(bs->opaque);
ea2384d3 1929 bs->opaque = NULL;
53fec9d3 1930 bs->copy_on_read = 0;
a275fa42
PB
1931 bs->backing_file[0] = '\0';
1932 bs->backing_format[0] = '\0';
6405875c
PB
1933 bs->total_sectors = 0;
1934 bs->encrypted = 0;
1935 bs->valid_key = 0;
1936 bs->sg = 0;
0d51b4de 1937 bs->zero_beyond_eof = false;
de9c0cec
KW
1938 QDECREF(bs->options);
1939 bs->options = NULL;
91af7014
HR
1940 QDECREF(bs->full_open_options);
1941 bs->full_open_options = NULL;
b338082b 1942 }
98f90dba 1943
a7f53e26
MA
1944 if (bs->blk) {
1945 blk_dev_change_media_cb(bs->blk, false);
1946 }
9ca11154 1947
33384421
HR
1948 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
1949 g_free(ban);
1950 }
1951 QLIST_INIT(&bs->aio_notifiers);
b338082b
FB
1952}
1953
2bc93fed
MK
1954void bdrv_close_all(void)
1955{
1956 BlockDriverState *bs;
1957
dc364f4c 1958 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
1959 AioContext *aio_context = bdrv_get_aio_context(bs);
1960
1961 aio_context_acquire(aio_context);
2bc93fed 1962 bdrv_close(bs);
ed78cda3 1963 aio_context_release(aio_context);
2bc93fed
MK
1964 }
1965}
1966
dc364f4c
BC
1967/* make a BlockDriverState anonymous by removing from bdrv_state and
1968 * graph_bdrv_state list.
d22b2f41
RH
1969 Also, NULL terminate the device_name to prevent double remove */
1970void bdrv_make_anon(BlockDriverState *bs)
1971{
bfb197e0
MA
1972 /*
1973 * Take care to remove bs from bdrv_states only when it's actually
1974 * in it. Note that bs->device_list.tqe_prev is initially null,
1975 * and gets set to non-null by QTAILQ_INSERT_TAIL(). Establish
1976 * the useful invariant "bs in bdrv_states iff bs->tqe_prev" by
1977 * resetting it to null on remove.
1978 */
1979 if (bs->device_list.tqe_prev) {
dc364f4c 1980 QTAILQ_REMOVE(&bdrv_states, bs, device_list);
bfb197e0 1981 bs->device_list.tqe_prev = NULL;
d22b2f41 1982 }
dc364f4c
BC
1983 if (bs->node_name[0] != '\0') {
1984 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
1985 }
1986 bs->node_name[0] = '\0';
d22b2f41
RH
1987}
1988
8e419aef 1989/* Fields that need to stay with the top-level BDS */
4ddc07ca
PB
1990static void bdrv_move_feature_fields(BlockDriverState *bs_dest,
1991 BlockDriverState *bs_src)
8802d1fd 1992{
4ddc07ca 1993 /* move some fields that need to stay attached to the device */
8802d1fd
JC
1994
1995 /* dev info */
1b7fd729 1996 bs_dest->guest_block_size = bs_src->guest_block_size;
4ddc07ca 1997 bs_dest->copy_on_read = bs_src->copy_on_read;
8802d1fd 1998
4ddc07ca 1999 bs_dest->enable_write_cache = bs_src->enable_write_cache;
c4a248a1 2000
8802d1fd 2001 /* r/w error */
4ddc07ca
PB
2002 bs_dest->on_read_error = bs_src->on_read_error;
2003 bs_dest->on_write_error = bs_src->on_write_error;
8802d1fd
JC
2004
2005 /* i/o status */
4ddc07ca
PB
2006 bs_dest->iostatus_enabled = bs_src->iostatus_enabled;
2007 bs_dest->iostatus = bs_src->iostatus;
8802d1fd 2008
a9fc4408 2009 /* dirty bitmap */
e4654d2d 2010 bs_dest->dirty_bitmaps = bs_src->dirty_bitmaps;
063dd40e 2011}
a9fc4408 2012
dd62f1ca
KW
2013static void change_parent_backing_link(BlockDriverState *from,
2014 BlockDriverState *to)
2015{
2016 BdrvChild *c, *next;
2017
2018 QLIST_FOREACH_SAFE(c, &from->parents, next_parent, next) {
2019 assert(c->role != &child_backing);
2020 c->bs = to;
2021 QLIST_REMOVE(c, next_parent);
2022 QLIST_INSERT_HEAD(&to->parents, c, next_parent);
2023 bdrv_ref(to);
2024 bdrv_unref(from);
2025 }
2026 if (from->blk) {
2027 blk_set_bs(from->blk, to);
2028 if (!to->device_list.tqe_prev) {
2029 QTAILQ_INSERT_BEFORE(from, to, device_list);
2030 }
2031 QTAILQ_REMOVE(&bdrv_states, from, device_list);
2032 }
2033}
2034
2035static void swap_feature_fields(BlockDriverState *bs_top,
2036 BlockDriverState *bs_new)
2037{
2038 BlockDriverState tmp;
2039
2040 bdrv_move_feature_fields(&tmp, bs_top);
2041 bdrv_move_feature_fields(bs_top, bs_new);
2042 bdrv_move_feature_fields(bs_new, &tmp);
2043
2044 assert(!bs_new->throttle_state);
2045 if (bs_top->throttle_state) {
2046 assert(bs_top->io_limits_enabled);
2047 bdrv_io_limits_enable(bs_new, throttle_group_get_name(bs_top));
2048 bdrv_io_limits_disable(bs_top);
2049 }
2050}
2051
4ddc07ca
PB
2052/*
2053 * Add new bs contents at the top of an image chain while the chain is
2054 * live, while keeping required fields on the top layer.
2055 *
2056 * This will modify the BlockDriverState fields, and swap contents
2057 * between bs_new and bs_top. Both bs_new and bs_top are modified.
2058 *
bfb197e0 2059 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2060 *
2061 * This function does not create any image files.
dd62f1ca
KW
2062 *
2063 * bdrv_append() takes ownership of a bs_new reference and unrefs it because
2064 * that's what the callers commonly need. bs_new will be referenced by the old
2065 * parents of bs_top after bdrv_append() returns. If the caller needs to keep a
2066 * reference of its own, it must call bdrv_ref().
4ddc07ca
PB
2067 */
2068void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top)
2069{
dd62f1ca
KW
2070 assert(!bdrv_requests_pending(bs_top));
2071 assert(!bdrv_requests_pending(bs_new));
2072
2073 bdrv_ref(bs_top);
2074 change_parent_backing_link(bs_top, bs_new);
2075
2076 /* Some fields always stay on top of the backing file chain */
2077 swap_feature_fields(bs_top, bs_new);
2078
2079 bdrv_set_backing_hd(bs_new, bs_top);
2080 bdrv_unref(bs_top);
4ddc07ca 2081
dd62f1ca
KW
2082 /* bs_new is now referenced by its new parents, we don't need the
2083 * additional reference any more. */
2084 bdrv_unref(bs_new);
8802d1fd
JC
2085}
2086
3f09bfbc
KW
2087void bdrv_replace_in_backing_chain(BlockDriverState *old, BlockDriverState *new)
2088{
2089 assert(!bdrv_requests_pending(old));
2090 assert(!bdrv_requests_pending(new));
2091
2092 bdrv_ref(old);
2093
2094 if (old->blk) {
2095 /* As long as these fields aren't in BlockBackend, but in the top-level
2096 * BlockDriverState, it's not possible for a BDS to have two BBs.
2097 *
2098 * We really want to copy the fields from old to new, but we go for a
2099 * swap instead so that pointers aren't duplicated and cause trouble.
2100 * (Also, bdrv_swap() used to do the same.) */
2101 assert(!new->blk);
2102 swap_feature_fields(old, new);
2103 }
2104 change_parent_backing_link(old, new);
2105
2106 /* Change backing files if a previously independent node is added to the
2107 * chain. For active commit, we replace top by its own (indirect) backing
2108 * file and don't do anything here so we don't build a loop. */
2109 if (new->backing == NULL && !bdrv_chain_contains(backing_bs(old), new)) {
2110 bdrv_set_backing_hd(new, backing_bs(old));
2111 bdrv_set_backing_hd(old, NULL);
2112 }
2113
2114 bdrv_unref(old);
2115}
2116
4f6fd349 2117static void bdrv_delete(BlockDriverState *bs)
b338082b 2118{
3e914655 2119 assert(!bs->job);
3718d8ab 2120 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 2121 assert(!bs->refcnt);
e4654d2d 2122 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
18846dee 2123
e1b5c52e
SH
2124 bdrv_close(bs);
2125
1b7bdbc1 2126 /* remove from list, if necessary */
d22b2f41 2127 bdrv_make_anon(bs);
34c6f050 2128
7267c094 2129 g_free(bs);
fc01f7e7
FB
2130}
2131
e97fc193
AL
2132/*
2133 * Run consistency checks on an image
2134 *
e076f338 2135 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 2136 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 2137 * check are stored in res.
e97fc193 2138 */
4534ff54 2139int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 2140{
908bcd54
HR
2141 if (bs->drv == NULL) {
2142 return -ENOMEDIUM;
2143 }
e97fc193
AL
2144 if (bs->drv->bdrv_check == NULL) {
2145 return -ENOTSUP;
2146 }
2147
e076f338 2148 memset(res, 0, sizeof(*res));
4534ff54 2149 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
2150}
2151
8a426614
KW
2152#define COMMIT_BUF_SECTORS 2048
2153
33e3963e
FB
2154/* commit COW file into the raw image */
2155int bdrv_commit(BlockDriverState *bs)
2156{
19cb3738 2157 BlockDriver *drv = bs->drv;
72706ea4 2158 int64_t sector, total_sectors, length, backing_length;
8a426614 2159 int n, ro, open_flags;
0bce597d 2160 int ret = 0;
72706ea4 2161 uint8_t *buf = NULL;
33e3963e 2162
19cb3738
FB
2163 if (!drv)
2164 return -ENOMEDIUM;
6bb45158 2165
760e0063 2166 if (!bs->backing) {
4dca4b63 2167 return -ENOTSUP;
33e3963e
FB
2168 }
2169
bb00021d 2170 if (bdrv_op_is_blocked(bs, BLOCK_OP_TYPE_COMMIT_SOURCE, NULL) ||
760e0063 2171 bdrv_op_is_blocked(bs->backing->bs, BLOCK_OP_TYPE_COMMIT_TARGET, NULL)) {
2d3735d3
SH
2172 return -EBUSY;
2173 }
2174
760e0063
KW
2175 ro = bs->backing->bs->read_only;
2176 open_flags = bs->backing->bs->open_flags;
4dca4b63
NS
2177
2178 if (ro) {
760e0063 2179 if (bdrv_reopen(bs->backing->bs, open_flags | BDRV_O_RDWR, NULL)) {
0bce597d 2180 return -EACCES;
4dca4b63 2181 }
ea2384d3 2182 }
33e3963e 2183
72706ea4
JC
2184 length = bdrv_getlength(bs);
2185 if (length < 0) {
2186 ret = length;
2187 goto ro_cleanup;
2188 }
2189
760e0063 2190 backing_length = bdrv_getlength(bs->backing->bs);
72706ea4
JC
2191 if (backing_length < 0) {
2192 ret = backing_length;
2193 goto ro_cleanup;
2194 }
2195
2196 /* If our top snapshot is larger than the backing file image,
2197 * grow the backing file image if possible. If not possible,
2198 * we must return an error */
2199 if (length > backing_length) {
760e0063 2200 ret = bdrv_truncate(bs->backing->bs, length);
72706ea4
JC
2201 if (ret < 0) {
2202 goto ro_cleanup;
2203 }
2204 }
2205
2206 total_sectors = length >> BDRV_SECTOR_BITS;
857d4f46
KW
2207
2208 /* qemu_try_blockalign() for bs will choose an alignment that works for
760e0063 2209 * bs->backing->bs as well, so no need to compare the alignment manually. */
857d4f46
KW
2210 buf = qemu_try_blockalign(bs, COMMIT_BUF_SECTORS * BDRV_SECTOR_SIZE);
2211 if (buf == NULL) {
2212 ret = -ENOMEM;
2213 goto ro_cleanup;
2214 }
8a426614
KW
2215
2216 for (sector = 0; sector < total_sectors; sector += n) {
d663640c
PB
2217 ret = bdrv_is_allocated(bs, sector, COMMIT_BUF_SECTORS, &n);
2218 if (ret < 0) {
2219 goto ro_cleanup;
2220 }
2221 if (ret) {
dabfa6cc
KW
2222 ret = bdrv_read(bs, sector, buf, n);
2223 if (ret < 0) {
8a426614
KW
2224 goto ro_cleanup;
2225 }
2226
760e0063 2227 ret = bdrv_write(bs->backing->bs, sector, buf, n);
dabfa6cc 2228 if (ret < 0) {
8a426614
KW
2229 goto ro_cleanup;
2230 }
ea2384d3 2231 }
33e3963e 2232 }
95389c86 2233
1d44952f
CH
2234 if (drv->bdrv_make_empty) {
2235 ret = drv->bdrv_make_empty(bs);
dabfa6cc
KW
2236 if (ret < 0) {
2237 goto ro_cleanup;
2238 }
1d44952f
CH
2239 bdrv_flush(bs);
2240 }
95389c86 2241
3f5075ae
CH
2242 /*
2243 * Make sure all data we wrote to the backing device is actually
2244 * stable on disk.
2245 */
760e0063
KW
2246 if (bs->backing) {
2247 bdrv_flush(bs->backing->bs);
dabfa6cc 2248 }
4dca4b63 2249
dabfa6cc 2250 ret = 0;
4dca4b63 2251ro_cleanup:
857d4f46 2252 qemu_vfree(buf);
4dca4b63
NS
2253
2254 if (ro) {
0bce597d 2255 /* ignoring error return here */
760e0063 2256 bdrv_reopen(bs->backing->bs, open_flags & ~BDRV_O_RDWR, NULL);
4dca4b63
NS
2257 }
2258
1d44952f 2259 return ret;
33e3963e
FB
2260}
2261
e8877497 2262int bdrv_commit_all(void)
6ab4b5ab
MA
2263{
2264 BlockDriverState *bs;
2265
dc364f4c 2266 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
2267 AioContext *aio_context = bdrv_get_aio_context(bs);
2268
2269 aio_context_acquire(aio_context);
760e0063 2270 if (bs->drv && bs->backing) {
272d2d8e
JC
2271 int ret = bdrv_commit(bs);
2272 if (ret < 0) {
ed78cda3 2273 aio_context_release(aio_context);
272d2d8e
JC
2274 return ret;
2275 }
e8877497 2276 }
ed78cda3 2277 aio_context_release(aio_context);
6ab4b5ab 2278 }
e8877497 2279 return 0;
6ab4b5ab
MA
2280}
2281
756e6736
KW
2282/*
2283 * Return values:
2284 * 0 - success
2285 * -EINVAL - backing format specified, but no file
2286 * -ENOSPC - can't update the backing file because no space is left in the
2287 * image file header
2288 * -ENOTSUP - format driver doesn't support changing the backing file
2289 */
2290int bdrv_change_backing_file(BlockDriverState *bs,
2291 const char *backing_file, const char *backing_fmt)
2292{
2293 BlockDriver *drv = bs->drv;
469ef350 2294 int ret;
756e6736 2295
5f377794
PB
2296 /* Backing file format doesn't make sense without a backing file */
2297 if (backing_fmt && !backing_file) {
2298 return -EINVAL;
2299 }
2300
756e6736 2301 if (drv->bdrv_change_backing_file != NULL) {
469ef350 2302 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 2303 } else {
469ef350 2304 ret = -ENOTSUP;
756e6736 2305 }
469ef350
PB
2306
2307 if (ret == 0) {
2308 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
2309 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
2310 }
2311 return ret;
756e6736
KW
2312}
2313
6ebdcee2
JC
2314/*
2315 * Finds the image layer in the chain that has 'bs' as its backing file.
2316 *
2317 * active is the current topmost image.
2318 *
2319 * Returns NULL if bs is not found in active's image chain,
2320 * or if active == bs.
4caf0fcd
JC
2321 *
2322 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
2323 */
2324BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
2325 BlockDriverState *bs)
2326{
760e0063
KW
2327 while (active && bs != backing_bs(active)) {
2328 active = backing_bs(active);
6ebdcee2
JC
2329 }
2330
4caf0fcd
JC
2331 return active;
2332}
6ebdcee2 2333
4caf0fcd
JC
2334/* Given a BDS, searches for the base layer. */
2335BlockDriverState *bdrv_find_base(BlockDriverState *bs)
2336{
2337 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
2338}
2339
6ebdcee2
JC
2340/*
2341 * Drops images above 'base' up to and including 'top', and sets the image
2342 * above 'top' to have base as its backing file.
2343 *
2344 * Requires that the overlay to 'top' is opened r/w, so that the backing file
2345 * information in 'bs' can be properly updated.
2346 *
2347 * E.g., this will convert the following chain:
2348 * bottom <- base <- intermediate <- top <- active
2349 *
2350 * to
2351 *
2352 * bottom <- base <- active
2353 *
2354 * It is allowed for bottom==base, in which case it converts:
2355 *
2356 * base <- intermediate <- top <- active
2357 *
2358 * to
2359 *
2360 * base <- active
2361 *
54e26900
JC
2362 * If backing_file_str is non-NULL, it will be used when modifying top's
2363 * overlay image metadata.
2364 *
6ebdcee2
JC
2365 * Error conditions:
2366 * if active == top, that is considered an error
2367 *
2368 */
2369int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 2370 BlockDriverState *base, const char *backing_file_str)
6ebdcee2 2371{
6ebdcee2 2372 BlockDriverState *new_top_bs = NULL;
6ebdcee2
JC
2373 int ret = -EIO;
2374
6ebdcee2
JC
2375 if (!top->drv || !base->drv) {
2376 goto exit;
2377 }
2378
2379 new_top_bs = bdrv_find_overlay(active, top);
2380
2381 if (new_top_bs == NULL) {
2382 /* we could not find the image above 'top', this is an error */
2383 goto exit;
2384 }
2385
760e0063 2386 /* special case of new_top_bs->backing->bs already pointing to base - nothing
6ebdcee2 2387 * to do, no intermediate images */
760e0063 2388 if (backing_bs(new_top_bs) == base) {
6ebdcee2
JC
2389 ret = 0;
2390 goto exit;
2391 }
2392
5db15a57
KW
2393 /* Make sure that base is in the backing chain of top */
2394 if (!bdrv_chain_contains(top, base)) {
6ebdcee2
JC
2395 goto exit;
2396 }
2397
2398 /* success - we can delete the intermediate states, and link top->base */
5db15a57 2399 backing_file_str = backing_file_str ? backing_file_str : base->filename;
54e26900 2400 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
5db15a57 2401 base->drv ? base->drv->format_name : "");
6ebdcee2
JC
2402 if (ret) {
2403 goto exit;
2404 }
5db15a57 2405 bdrv_set_backing_hd(new_top_bs, base);
6ebdcee2 2406
6ebdcee2 2407 ret = 0;
6ebdcee2 2408exit:
6ebdcee2
JC
2409 return ret;
2410}
2411
61007b31
SH
2412/**
2413 * Truncate file to 'offset' bytes (needed only for file protocols)
2414 */
2415int bdrv_truncate(BlockDriverState *bs, int64_t offset)
71d0770c 2416{
61007b31
SH
2417 BlockDriver *drv = bs->drv;
2418 int ret;
2419 if (!drv)
71d0770c 2420 return -ENOMEDIUM;
61007b31
SH
2421 if (!drv->bdrv_truncate)
2422 return -ENOTSUP;
2423 if (bs->read_only)
2424 return -EACCES;
71d0770c 2425
61007b31
SH
2426 ret = drv->bdrv_truncate(bs, offset);
2427 if (ret == 0) {
2428 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
2429 bdrv_dirty_bitmap_truncate(bs);
2430 if (bs->blk) {
2431 blk_dev_resize_cb(bs->blk);
2432 }
c0191e76 2433 }
61007b31 2434 return ret;
71d0770c
AL
2435}
2436
61007b31
SH
2437/**
2438 * Length of a allocated file in bytes. Sparse files are counted by actual
2439 * allocated space. Return < 0 if error or unknown.
2440 */
2441int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 2442{
61007b31
SH
2443 BlockDriver *drv = bs->drv;
2444 if (!drv) {
2445 return -ENOMEDIUM;
8f4754ed 2446 }
61007b31
SH
2447 if (drv->bdrv_get_allocated_file_size) {
2448 return drv->bdrv_get_allocated_file_size(bs);
2449 }
2450 if (bs->file) {
9a4f4c31 2451 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 2452 }
61007b31 2453 return -ENOTSUP;
1c9805a3 2454}
e7a8a783 2455
61007b31
SH
2456/**
2457 * Return number of sectors on success, -errno on error.
1c9805a3 2458 */
61007b31 2459int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 2460{
61007b31 2461 BlockDriver *drv = bs->drv;
498e386c 2462
61007b31
SH
2463 if (!drv)
2464 return -ENOMEDIUM;
2572b37a 2465
61007b31
SH
2466 if (drv->has_variable_length) {
2467 int ret = refresh_total_sectors(bs, bs->total_sectors);
2468 if (ret < 0) {
2469 return ret;
1c9805a3
SH
2470 }
2471 }
61007b31 2472 return bs->total_sectors;
1c9805a3 2473}
b338082b 2474
61007b31
SH
2475/**
2476 * Return length in bytes on success, -errno on error.
2477 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 2478 */
61007b31 2479int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 2480{
61007b31 2481 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 2482
4a9c9ea0 2483 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 2484 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
2485}
2486
61007b31
SH
2487/* return 0 as number of sectors if no device present or error */
2488void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 2489{
61007b31 2490 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 2491
61007b31 2492 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
2493}
2494
61007b31
SH
2495void bdrv_set_on_error(BlockDriverState *bs, BlockdevOnError on_read_error,
2496 BlockdevOnError on_write_error)
fc01f7e7 2497{
61007b31
SH
2498 bs->on_read_error = on_read_error;
2499 bs->on_write_error = on_write_error;
83f64091
FB
2500}
2501
61007b31 2502BlockdevOnError bdrv_get_on_error(BlockDriverState *bs, bool is_read)
4105eaaa 2503{
61007b31 2504 return is_read ? bs->on_read_error : bs->on_write_error;
8d3b1a2d
KW
2505}
2506
61007b31 2507BlockErrorAction bdrv_get_error_action(BlockDriverState *bs, bool is_read, int error)
d75cbb5e 2508{
61007b31 2509 BlockdevOnError on_err = is_read ? bs->on_read_error : bs->on_write_error;
9ce10c0b 2510
61007b31
SH
2511 switch (on_err) {
2512 case BLOCKDEV_ON_ERROR_ENOSPC:
2513 return (error == ENOSPC) ?
2514 BLOCK_ERROR_ACTION_STOP : BLOCK_ERROR_ACTION_REPORT;
2515 case BLOCKDEV_ON_ERROR_STOP:
2516 return BLOCK_ERROR_ACTION_STOP;
2517 case BLOCKDEV_ON_ERROR_REPORT:
2518 return BLOCK_ERROR_ACTION_REPORT;
2519 case BLOCKDEV_ON_ERROR_IGNORE:
2520 return BLOCK_ERROR_ACTION_IGNORE;
2521 default:
2522 abort();
d75cbb5e
PL
2523 }
2524}
2525
61007b31
SH
2526static void send_qmp_error_event(BlockDriverState *bs,
2527 BlockErrorAction action,
2528 bool is_read, int error)
83f64091 2529{
61007b31 2530 IoOperationType optype;
a3ef6571 2531
61007b31
SH
2532 optype = is_read ? IO_OPERATION_TYPE_READ : IO_OPERATION_TYPE_WRITE;
2533 qapi_event_send_block_io_error(bdrv_get_device_name(bs), optype, action,
2534 bdrv_iostatus_is_enabled(bs),
2535 error == ENOSPC, strerror(error),
2536 &error_abort);
83f64091
FB
2537}
2538
61007b31
SH
2539/* This is done by device models because, while the block layer knows
2540 * about the error, it does not know whether an operation comes from
2541 * the device or the block layer (from a job, for example).
2542 */
2543void bdrv_error_action(BlockDriverState *bs, BlockErrorAction action,
2544 bool is_read, int error)
83f64091 2545{
61007b31 2546 assert(error >= 0);
83f64091 2547
61007b31
SH
2548 if (action == BLOCK_ERROR_ACTION_STOP) {
2549 /* First set the iostatus, so that "info block" returns an iostatus
2550 * that matches the events raised so far (an additional error iostatus
2551 * is fine, but not a lost one).
2552 */
2553 bdrv_iostatus_set_err(bs, error);
83f64091 2554
61007b31
SH
2555 /* Then raise the request to stop the VM and the event.
2556 * qemu_system_vmstop_request_prepare has two effects. First,
2557 * it ensures that the STOP event always comes after the
2558 * BLOCK_IO_ERROR event. Second, it ensures that even if management
2559 * can observe the STOP event and do a "cont" before the STOP
2560 * event is issued, the VM will not stop. In this case, vm_start()
2561 * also ensures that the STOP/RESUME pair of events is emitted.
2562 */
2563 qemu_system_vmstop_request_prepare();
2564 send_qmp_error_event(bs, action, is_read, error);
2565 qemu_system_vmstop_request(RUN_STATE_IO_ERROR);
2566 } else {
2567 send_qmp_error_event(bs, action, is_read, error);
2568 }
8d3b1a2d
KW
2569}
2570
61007b31 2571int bdrv_is_read_only(BlockDriverState *bs)
8d3b1a2d 2572{
61007b31 2573 return bs->read_only;
83f64091 2574}
83f64091 2575
61007b31 2576int bdrv_is_sg(BlockDriverState *bs)
f08145fe 2577{
61007b31 2578 return bs->sg;
f08145fe
KW
2579}
2580
61007b31 2581int bdrv_enable_write_cache(BlockDriverState *bs)
ab185921 2582{
61007b31 2583 return bs->enable_write_cache;
ab185921
SH
2584}
2585
61007b31 2586void bdrv_set_enable_write_cache(BlockDriverState *bs, bool wce)
da1fa91d 2587{
61007b31 2588 bs->enable_write_cache = wce;
ab185921 2589
61007b31
SH
2590 /* so a reopen() will preserve wce */
2591 if (wce) {
2592 bs->open_flags |= BDRV_O_CACHE_WB;
893a8f62 2593 } else {
61007b31 2594 bs->open_flags &= ~BDRV_O_CACHE_WB;
893a8f62 2595 }
da1fa91d
KW
2596}
2597
61007b31 2598int bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 2599{
760e0063 2600 if (bs->backing && bs->backing->bs->encrypted) {
61007b31 2601 return 1;
760e0063 2602 }
61007b31 2603 return bs->encrypted;
fc3959e4
FZ
2604}
2605
61007b31 2606int bdrv_key_required(BlockDriverState *bs)
fc3959e4 2607{
760e0063 2608 BdrvChild *backing = bs->backing;
61007b31 2609
760e0063 2610 if (backing && backing->bs->encrypted && !backing->bs->valid_key) {
61007b31 2611 return 1;
760e0063 2612 }
61007b31 2613 return (bs->encrypted && !bs->valid_key);
fc3959e4
FZ
2614}
2615
61007b31 2616int bdrv_set_key(BlockDriverState *bs, const char *key)
d0c7f642 2617{
d0c7f642 2618 int ret;
760e0063
KW
2619 if (bs->backing && bs->backing->bs->encrypted) {
2620 ret = bdrv_set_key(bs->backing->bs, key);
61007b31
SH
2621 if (ret < 0)
2622 return ret;
2623 if (!bs->encrypted)
2624 return 0;
2625 }
2626 if (!bs->encrypted) {
2627 return -EINVAL;
2628 } else if (!bs->drv || !bs->drv->bdrv_set_key) {
d0c7f642
KW
2629 return -ENOMEDIUM;
2630 }
61007b31 2631 ret = bs->drv->bdrv_set_key(bs, key);
b9c64947 2632 if (ret < 0) {
61007b31
SH
2633 bs->valid_key = 0;
2634 } else if (!bs->valid_key) {
2635 bs->valid_key = 1;
2636 if (bs->blk) {
2637 /* call the change callback now, we skipped it on open */
2638 blk_dev_change_media_cb(bs->blk, true);
2639 }
1b0288ae 2640 }
61007b31
SH
2641 return ret;
2642}
f08f2dda 2643
c5fbe571 2644/*
61007b31
SH
2645 * Provide an encryption key for @bs.
2646 * If @key is non-null:
2647 * If @bs is not encrypted, fail.
2648 * Else if the key is invalid, fail.
2649 * Else set @bs's key to @key, replacing the existing key, if any.
2650 * If @key is null:
2651 * If @bs is encrypted and still lacks a key, fail.
2652 * Else do nothing.
2653 * On failure, store an error object through @errp if non-null.
c5fbe571 2654 */
61007b31 2655void bdrv_add_key(BlockDriverState *bs, const char *key, Error **errp)
c5fbe571 2656{
61007b31
SH
2657 if (key) {
2658 if (!bdrv_is_encrypted(bs)) {
2659 error_setg(errp, "Node '%s' is not encrypted",
2660 bdrv_get_device_or_node_name(bs));
2661 } else if (bdrv_set_key(bs, key) < 0) {
c6bd8c70 2662 error_setg(errp, QERR_INVALID_PASSWORD);
4d2855a3
MA
2663 }
2664 } else {
2665 if (bdrv_key_required(bs)) {
b1ca6391
MA
2666 error_set(errp, ERROR_CLASS_DEVICE_ENCRYPTED,
2667 "'%s' (%s) is encrypted",
81e5f78a 2668 bdrv_get_device_or_node_name(bs),
4d2855a3
MA
2669 bdrv_get_encrypted_filename(bs));
2670 }
2671 }
2672}
2673
61007b31 2674const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 2675{
61007b31 2676 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
2677}
2678
61007b31 2679static int qsort_strcmp(const void *a, const void *b)
40b4f539 2680{
61007b31 2681 return strcmp(a, b);
40b4f539
KW
2682}
2683
61007b31
SH
2684void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
2685 void *opaque)
40b4f539 2686{
61007b31
SH
2687 BlockDriver *drv;
2688 int count = 0;
2689 int i;
2690 const char **formats = NULL;
40b4f539 2691
61007b31
SH
2692 QLIST_FOREACH(drv, &bdrv_drivers, list) {
2693 if (drv->format_name) {
2694 bool found = false;
2695 int i = count;
2696 while (formats && i && !found) {
2697 found = !strcmp(formats[--i], drv->format_name);
2698 }
e2a305fb 2699
61007b31
SH
2700 if (!found) {
2701 formats = g_renew(const char *, formats, count + 1);
2702 formats[count++] = drv->format_name;
2703 }
6c5a42ac 2704 }
61007b31 2705 }
6c5a42ac 2706
61007b31 2707 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 2708
61007b31
SH
2709 for (i = 0; i < count; i++) {
2710 it(opaque, formats[i]);
2711 }
40b4f539 2712
61007b31
SH
2713 g_free(formats);
2714}
40b4f539 2715
61007b31
SH
2716/* This function is to find a node in the bs graph */
2717BlockDriverState *bdrv_find_node(const char *node_name)
2718{
2719 BlockDriverState *bs;
391827eb 2720
61007b31 2721 assert(node_name);
40b4f539 2722
61007b31
SH
2723 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2724 if (!strcmp(node_name, bs->node_name)) {
2725 return bs;
40b4f539
KW
2726 }
2727 }
61007b31 2728 return NULL;
40b4f539
KW
2729}
2730
61007b31
SH
2731/* Put this QMP function here so it can access the static graph_bdrv_states. */
2732BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 2733{
61007b31
SH
2734 BlockDeviceInfoList *list, *entry;
2735 BlockDriverState *bs;
40b4f539 2736
61007b31
SH
2737 list = NULL;
2738 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2739 BlockDeviceInfo *info = bdrv_block_device_info(bs, errp);
2740 if (!info) {
2741 qapi_free_BlockDeviceInfoList(list);
2742 return NULL;
301db7c2 2743 }
61007b31
SH
2744 entry = g_malloc0(sizeof(*entry));
2745 entry->value = info;
2746 entry->next = list;
2747 list = entry;
301db7c2
RH
2748 }
2749
61007b31
SH
2750 return list;
2751}
40b4f539 2752
61007b31
SH
2753BlockDriverState *bdrv_lookup_bs(const char *device,
2754 const char *node_name,
2755 Error **errp)
2756{
2757 BlockBackend *blk;
2758 BlockDriverState *bs;
40b4f539 2759
61007b31
SH
2760 if (device) {
2761 blk = blk_by_name(device);
40b4f539 2762
61007b31
SH
2763 if (blk) {
2764 return blk_bs(blk);
2765 }
2766 }
40b4f539 2767
61007b31
SH
2768 if (node_name) {
2769 bs = bdrv_find_node(node_name);
6d519a5f 2770
61007b31
SH
2771 if (bs) {
2772 return bs;
2773 }
40b4f539
KW
2774 }
2775
61007b31
SH
2776 error_setg(errp, "Cannot find device=%s nor node_name=%s",
2777 device ? device : "",
2778 node_name ? node_name : "");
2779 return NULL;
40b4f539
KW
2780}
2781
61007b31
SH
2782/* If 'base' is in the same chain as 'top', return true. Otherwise,
2783 * return false. If either argument is NULL, return false. */
2784bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 2785{
61007b31 2786 while (top && top != base) {
760e0063 2787 top = backing_bs(top);
02c50efe 2788 }
61007b31
SH
2789
2790 return top != NULL;
02c50efe
FZ
2791}
2792
61007b31 2793BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 2794{
61007b31
SH
2795 if (!bs) {
2796 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 2797 }
61007b31 2798 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
2799}
2800
61007b31 2801BlockDriverState *bdrv_next(BlockDriverState *bs)
83f64091 2802{
61007b31
SH
2803 if (!bs) {
2804 return QTAILQ_FIRST(&bdrv_states);
857d4f46 2805 }
61007b31 2806 return QTAILQ_NEXT(bs, device_list);
83f64091 2807}
beac80cd 2808
61007b31 2809const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 2810{
61007b31 2811 return bs->node_name;
beac80cd
FB
2812}
2813
61007b31
SH
2814/* TODO check what callers really want: bs->node_name or blk_name() */
2815const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 2816{
61007b31 2817 return bs->blk ? blk_name(bs->blk) : "";
f141eafe 2818}
83f64091 2819
61007b31
SH
2820/* This can be used to identify nodes that might not have a device
2821 * name associated. Since node and device names live in the same
2822 * namespace, the result is unambiguous. The exception is if both are
2823 * absent, then this returns an empty (non-null) string. */
2824const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 2825{
61007b31 2826 return bs->blk ? blk_name(bs->blk) : bs->node_name;
beac80cd 2827}
beac80cd 2828
61007b31 2829int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 2830{
61007b31 2831 return bs->open_flags;
0b5a2445
PB
2832}
2833
61007b31 2834int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 2835{
61007b31 2836 return 1;
0b5a2445
PB
2837}
2838
61007b31 2839int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 2840{
61007b31 2841 assert(bs->drv);
0b5a2445 2842
61007b31
SH
2843 /* If BS is a copy on write image, it is initialized to
2844 the contents of the base image, which may not be zeroes. */
760e0063 2845 if (bs->backing) {
61007b31
SH
2846 return 0;
2847 }
2848 if (bs->drv->bdrv_has_zero_init) {
2849 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 2850 }
61007b31
SH
2851
2852 /* safe default */
2853 return 0;
68485420
KW
2854}
2855
61007b31 2856bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 2857{
61007b31 2858 BlockDriverInfo bdi;
b2a61371 2859
760e0063 2860 if (bs->backing) {
61007b31
SH
2861 return false;
2862 }
2863
2864 if (bdrv_get_info(bs, &bdi) == 0) {
2865 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
2866 }
2867
61007b31 2868 return false;
b2a61371
SH
2869}
2870
61007b31 2871bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 2872{
61007b31 2873 BlockDriverInfo bdi;
68485420 2874
760e0063 2875 if (bs->backing || !(bs->open_flags & BDRV_O_UNMAP)) {
61007b31
SH
2876 return false;
2877 }
68485420 2878
61007b31
SH
2879 if (bdrv_get_info(bs, &bdi) == 0) {
2880 return bdi.can_write_zeroes_with_unmap;
2881 }
68485420 2882
61007b31 2883 return false;
68485420
KW
2884}
2885
61007b31 2886const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 2887{
760e0063 2888 if (bs->backing && bs->backing->bs->encrypted)
61007b31
SH
2889 return bs->backing_file;
2890 else if (bs->encrypted)
2891 return bs->filename;
2892 else
2893 return NULL;
b2e12bc6
CH
2894}
2895
61007b31
SH
2896void bdrv_get_backing_filename(BlockDriverState *bs,
2897 char *filename, int filename_size)
016f5cf6 2898{
61007b31
SH
2899 pstrcpy(filename, filename_size, bs->backing_file);
2900}
d318aea9 2901
61007b31
SH
2902int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
2903{
2904 BlockDriver *drv = bs->drv;
2905 if (!drv)
2906 return -ENOMEDIUM;
2907 if (!drv->bdrv_get_info)
2908 return -ENOTSUP;
2909 memset(bdi, 0, sizeof(*bdi));
2910 return drv->bdrv_get_info(bs, bdi);
2911}
016f5cf6 2912
61007b31
SH
2913ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
2914{
2915 BlockDriver *drv = bs->drv;
2916 if (drv && drv->bdrv_get_specific_info) {
2917 return drv->bdrv_get_specific_info(bs);
2918 }
2919 return NULL;
016f5cf6
AG
2920}
2921
61007b31 2922void bdrv_debug_event(BlockDriverState *bs, BlkDebugEvent event)
4265d620 2923{
61007b31
SH
2924 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
2925 return;
2926 }
4265d620 2927
61007b31 2928 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
2929}
2930
61007b31
SH
2931int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
2932 const char *tag)
4265d620 2933{
61007b31 2934 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 2935 bs = bs->file ? bs->file->bs : NULL;
61007b31 2936 }
4265d620 2937
61007b31
SH
2938 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
2939 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
2940 }
4265d620 2941
61007b31 2942 return -ENOTSUP;
4265d620
PB
2943}
2944
61007b31 2945int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 2946{
61007b31 2947 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 2948 bs = bs->file ? bs->file->bs : NULL;
61007b31 2949 }
ce1a14dc 2950
61007b31
SH
2951 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
2952 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
2953 }
2954
2955 return -ENOTSUP;
eb852011
MA
2956}
2957
61007b31 2958int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 2959{
61007b31 2960 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 2961 bs = bs->file ? bs->file->bs : NULL;
61007b31 2962 }
ce1a14dc 2963
61007b31
SH
2964 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
2965 return bs->drv->bdrv_debug_resume(bs, tag);
2966 }
ce1a14dc 2967
61007b31 2968 return -ENOTSUP;
f197fe2b
FZ
2969}
2970
61007b31 2971bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 2972{
61007b31 2973 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 2974 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 2975 }
19cb3738 2976
61007b31
SH
2977 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
2978 return bs->drv->bdrv_debug_is_suspended(bs, tag);
2979 }
f9f05dc5 2980
61007b31
SH
2981 return false;
2982}
f9f05dc5 2983
61007b31 2984int bdrv_is_snapshot(BlockDriverState *bs)
f9f05dc5 2985{
61007b31 2986 return !!(bs->open_flags & BDRV_O_SNAPSHOT);
f9f05dc5
KW
2987}
2988
61007b31
SH
2989/* backing_file can either be relative, or absolute, or a protocol. If it is
2990 * relative, it must be relative to the chain. So, passing in bs->filename
2991 * from a BDS as backing_file should not be done, as that may be relative to
2992 * the CWD rather than the chain. */
2993BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
2994 const char *backing_file)
f9f05dc5 2995{
61007b31
SH
2996 char *filename_full = NULL;
2997 char *backing_file_full = NULL;
2998 char *filename_tmp = NULL;
2999 int is_protocol = 0;
3000 BlockDriverState *curr_bs = NULL;
3001 BlockDriverState *retval = NULL;
f9f05dc5 3002
61007b31
SH
3003 if (!bs || !bs->drv || !backing_file) {
3004 return NULL;
f9f05dc5
KW
3005 }
3006
61007b31
SH
3007 filename_full = g_malloc(PATH_MAX);
3008 backing_file_full = g_malloc(PATH_MAX);
3009 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 3010
61007b31 3011 is_protocol = path_has_protocol(backing_file);
f9f05dc5 3012
760e0063 3013 for (curr_bs = bs; curr_bs->backing; curr_bs = curr_bs->backing->bs) {
f9f05dc5 3014
61007b31
SH
3015 /* If either of the filename paths is actually a protocol, then
3016 * compare unmodified paths; otherwise make paths relative */
3017 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
3018 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
760e0063 3019 retval = curr_bs->backing->bs;
61007b31
SH
3020 break;
3021 }
3022 } else {
3023 /* If not an absolute filename path, make it relative to the current
3024 * image's filename path */
3025 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3026 backing_file);
f9f05dc5 3027
61007b31
SH
3028 /* We are going to compare absolute pathnames */
3029 if (!realpath(filename_tmp, filename_full)) {
3030 continue;
3031 }
07f07615 3032
61007b31
SH
3033 /* We need to make sure the backing filename we are comparing against
3034 * is relative to the current image filename (or absolute) */
3035 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3036 curr_bs->backing_file);
07f07615 3037
61007b31
SH
3038 if (!realpath(filename_tmp, backing_file_full)) {
3039 continue;
3040 }
eb489bb1 3041
61007b31 3042 if (strcmp(backing_file_full, filename_full) == 0) {
760e0063 3043 retval = curr_bs->backing->bs;
61007b31
SH
3044 break;
3045 }
3046 }
eb489bb1
KW
3047 }
3048
61007b31
SH
3049 g_free(filename_full);
3050 g_free(backing_file_full);
3051 g_free(filename_tmp);
3052 return retval;
3053}
3054
3055int bdrv_get_backing_file_depth(BlockDriverState *bs)
3056{
3057 if (!bs->drv) {
3058 return 0;
eb489bb1
KW
3059 }
3060
760e0063 3061 if (!bs->backing) {
61007b31 3062 return 0;
ca716364
KW
3063 }
3064
760e0063 3065 return 1 + bdrv_get_backing_file_depth(bs->backing->bs);
61007b31 3066}
07f07615 3067
61007b31
SH
3068void bdrv_init(void)
3069{
3070 module_call_init(MODULE_INIT_BLOCK);
3071}
29cdb251 3072
61007b31
SH
3073void bdrv_init_with_whitelist(void)
3074{
3075 use_bdrv_whitelist = 1;
3076 bdrv_init();
07f07615
PB
3077}
3078
5a8a30db 3079void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 3080{
5a8a30db
KW
3081 Error *local_err = NULL;
3082 int ret;
3083
3456a8d1
KW
3084 if (!bs->drv) {
3085 return;
3086 }
3087
7ea2d269
AK
3088 if (!(bs->open_flags & BDRV_O_INCOMING)) {
3089 return;
3090 }
3091 bs->open_flags &= ~BDRV_O_INCOMING;
3092
3456a8d1 3093 if (bs->drv->bdrv_invalidate_cache) {
5a8a30db 3094 bs->drv->bdrv_invalidate_cache(bs, &local_err);
3456a8d1 3095 } else if (bs->file) {
9a4f4c31 3096 bdrv_invalidate_cache(bs->file->bs, &local_err);
5a8a30db
KW
3097 }
3098 if (local_err) {
3099 error_propagate(errp, local_err);
3100 return;
0f15423c 3101 }
3456a8d1 3102
5a8a30db
KW
3103 ret = refresh_total_sectors(bs, bs->total_sectors);
3104 if (ret < 0) {
3105 error_setg_errno(errp, -ret, "Could not refresh total sector count");
3106 return;
3107 }
0f15423c
AL
3108}
3109
5a8a30db 3110void bdrv_invalidate_cache_all(Error **errp)
0f15423c
AL
3111{
3112 BlockDriverState *bs;
5a8a30db 3113 Error *local_err = NULL;
0f15423c 3114
dc364f4c 3115 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
3116 AioContext *aio_context = bdrv_get_aio_context(bs);
3117
3118 aio_context_acquire(aio_context);
5a8a30db 3119 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 3120 aio_context_release(aio_context);
5a8a30db
KW
3121 if (local_err) {
3122 error_propagate(errp, local_err);
3123 return;
3124 }
0f15423c
AL
3125 }
3126}
3127
19cb3738
FB
3128/**************************************************************/
3129/* removable device support */
3130
3131/**
3132 * Return TRUE if the media is present
3133 */
3134int bdrv_is_inserted(BlockDriverState *bs)
3135{
3136 BlockDriver *drv = bs->drv;
a1aff5bf 3137
19cb3738
FB
3138 if (!drv)
3139 return 0;
3140 if (!drv->bdrv_is_inserted)
a1aff5bf
MA
3141 return 1;
3142 return drv->bdrv_is_inserted(bs);
19cb3738
FB
3143}
3144
3145/**
8e49ca46
MA
3146 * Return whether the media changed since the last call to this
3147 * function, or -ENOTSUP if we don't know. Most drivers don't know.
19cb3738
FB
3148 */
3149int bdrv_media_changed(BlockDriverState *bs)
3150{
3151 BlockDriver *drv = bs->drv;
19cb3738 3152
8e49ca46
MA
3153 if (drv && drv->bdrv_media_changed) {
3154 return drv->bdrv_media_changed(bs);
3155 }
3156 return -ENOTSUP;
19cb3738
FB
3157}
3158
3159/**
3160 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
3161 */
f36f3949 3162void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
3163{
3164 BlockDriver *drv = bs->drv;
bfb197e0 3165 const char *device_name;
19cb3738 3166
822e1cd1
MA
3167 if (drv && drv->bdrv_eject) {
3168 drv->bdrv_eject(bs, eject_flag);
19cb3738 3169 }
6f382ed2 3170
bfb197e0
MA
3171 device_name = bdrv_get_device_name(bs);
3172 if (device_name[0] != '\0') {
3173 qapi_event_send_device_tray_moved(device_name,
a5ee7bd4 3174 eject_flag, &error_abort);
6f382ed2 3175 }
19cb3738
FB
3176}
3177
19cb3738
FB
3178/**
3179 * Lock or unlock the media (if it is locked, the user won't be able
3180 * to eject it manually).
3181 */
025e849a 3182void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
3183{
3184 BlockDriver *drv = bs->drv;
3185
025e849a 3186 trace_bdrv_lock_medium(bs, locked);
b8c6d095 3187
025e849a
MA
3188 if (drv && drv->bdrv_lock_medium) {
3189 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
3190 }
3191}
985a03b0 3192
1b7fd729 3193void bdrv_set_guest_block_size(BlockDriverState *bs, int align)
7b6f9300 3194{
1b7fd729 3195 bs->guest_block_size = align;
7b6f9300 3196}
7cd1e32a 3197
0db6e54a
FZ
3198BdrvDirtyBitmap *bdrv_find_dirty_bitmap(BlockDriverState *bs, const char *name)
3199{
3200 BdrvDirtyBitmap *bm;
3201
3202 assert(name);
3203 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
3204 if (bm->name && !strcmp(name, bm->name)) {
3205 return bm;
3206 }
3207 }
3208 return NULL;
3209}
3210
20dca810 3211void bdrv_dirty_bitmap_make_anon(BdrvDirtyBitmap *bitmap)
0db6e54a 3212{
9bd2b08f 3213 assert(!bdrv_dirty_bitmap_frozen(bitmap));
0db6e54a
FZ
3214 g_free(bitmap->name);
3215 bitmap->name = NULL;
3216}
3217
3218BdrvDirtyBitmap *bdrv_create_dirty_bitmap(BlockDriverState *bs,
5fba6c0e 3219 uint32_t granularity,
0db6e54a 3220 const char *name,
b8afb520 3221 Error **errp)
7cd1e32a
LS
3222{
3223 int64_t bitmap_size;
e4654d2d 3224 BdrvDirtyBitmap *bitmap;
5fba6c0e 3225 uint32_t sector_granularity;
a55eb92c 3226
50717e94
PB
3227 assert((granularity & (granularity - 1)) == 0);
3228
0db6e54a
FZ
3229 if (name && bdrv_find_dirty_bitmap(bs, name)) {
3230 error_setg(errp, "Bitmap already exists: %s", name);
3231 return NULL;
3232 }
5fba6c0e
JS
3233 sector_granularity = granularity >> BDRV_SECTOR_BITS;
3234 assert(sector_granularity);
57322b78 3235 bitmap_size = bdrv_nb_sectors(bs);
b8afb520
FZ
3236 if (bitmap_size < 0) {
3237 error_setg_errno(errp, -bitmap_size, "could not get length of device");
3238 errno = -bitmap_size;
3239 return NULL;
3240 }
5839e53b 3241 bitmap = g_new0(BdrvDirtyBitmap, 1);
5fba6c0e 3242 bitmap->bitmap = hbitmap_alloc(bitmap_size, ctz32(sector_granularity));
e74e6b78 3243 bitmap->size = bitmap_size;
0db6e54a 3244 bitmap->name = g_strdup(name);
b8e6fb75 3245 bitmap->disabled = false;
e4654d2d
FZ
3246 QLIST_INSERT_HEAD(&bs->dirty_bitmaps, bitmap, list);
3247 return bitmap;
3248}
3249
9bd2b08f
JS
3250bool bdrv_dirty_bitmap_frozen(BdrvDirtyBitmap *bitmap)
3251{
3252 return bitmap->successor;
3253}
3254
b8e6fb75
JS
3255bool bdrv_dirty_bitmap_enabled(BdrvDirtyBitmap *bitmap)
3256{
9bd2b08f
JS
3257 return !(bitmap->disabled || bitmap->successor);
3258}
3259
9abe3bdc
JS
3260DirtyBitmapStatus bdrv_dirty_bitmap_status(BdrvDirtyBitmap *bitmap)
3261{
3262 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3263 return DIRTY_BITMAP_STATUS_FROZEN;
3264 } else if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3265 return DIRTY_BITMAP_STATUS_DISABLED;
3266 } else {
3267 return DIRTY_BITMAP_STATUS_ACTIVE;
3268 }
3269}
3270
9bd2b08f
JS
3271/**
3272 * Create a successor bitmap destined to replace this bitmap after an operation.
3273 * Requires that the bitmap is not frozen and has no successor.
3274 */
3275int bdrv_dirty_bitmap_create_successor(BlockDriverState *bs,
3276 BdrvDirtyBitmap *bitmap, Error **errp)
3277{
3278 uint64_t granularity;
3279 BdrvDirtyBitmap *child;
3280
3281 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3282 error_setg(errp, "Cannot create a successor for a bitmap that is "
3283 "currently frozen");
3284 return -1;
3285 }
3286 assert(!bitmap->successor);
3287
3288 /* Create an anonymous successor */
3289 granularity = bdrv_dirty_bitmap_granularity(bitmap);
3290 child = bdrv_create_dirty_bitmap(bs, granularity, NULL, errp);
3291 if (!child) {
3292 return -1;
3293 }
3294
3295 /* Successor will be on or off based on our current state. */
3296 child->disabled = bitmap->disabled;
3297
3298 /* Install the successor and freeze the parent */
3299 bitmap->successor = child;
3300 return 0;
3301}
3302
3303/**
3304 * For a bitmap with a successor, yield our name to the successor,
3305 * delete the old bitmap, and return a handle to the new bitmap.
3306 */
3307BdrvDirtyBitmap *bdrv_dirty_bitmap_abdicate(BlockDriverState *bs,
3308 BdrvDirtyBitmap *bitmap,
3309 Error **errp)
3310{
3311 char *name;
3312 BdrvDirtyBitmap *successor = bitmap->successor;
3313
3314 if (successor == NULL) {
3315 error_setg(errp, "Cannot relinquish control if "
3316 "there's no successor present");
3317 return NULL;
3318 }
3319
3320 name = bitmap->name;
3321 bitmap->name = NULL;
3322 successor->name = name;
3323 bitmap->successor = NULL;
3324 bdrv_release_dirty_bitmap(bs, bitmap);
3325
3326 return successor;
3327}
3328
3329/**
3330 * In cases of failure where we can no longer safely delete the parent,
3331 * we may wish to re-join the parent and child/successor.
3332 * The merged parent will be un-frozen, but not explicitly re-enabled.
3333 */
3334BdrvDirtyBitmap *bdrv_reclaim_dirty_bitmap(BlockDriverState *bs,
3335 BdrvDirtyBitmap *parent,
3336 Error **errp)
3337{
3338 BdrvDirtyBitmap *successor = parent->successor;
3339
3340 if (!successor) {
3341 error_setg(errp, "Cannot reclaim a successor when none is present");
3342 return NULL;
3343 }
3344
3345 if (!hbitmap_merge(parent->bitmap, successor->bitmap)) {
3346 error_setg(errp, "Merging of parent and successor bitmap failed");
3347 return NULL;
3348 }
3349 bdrv_release_dirty_bitmap(bs, successor);
3350 parent->successor = NULL;
3351
3352 return parent;
b8e6fb75
JS
3353}
3354
ce1ffea8
JS
3355/**
3356 * Truncates _all_ bitmaps attached to a BDS.
3357 */
3358static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs)
3359{
3360 BdrvDirtyBitmap *bitmap;
3361 uint64_t size = bdrv_nb_sectors(bs);
3362
3363 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
06207b0f 3364 assert(!bdrv_dirty_bitmap_frozen(bitmap));
ce1ffea8 3365 hbitmap_truncate(bitmap->bitmap, size);
5270b6a0 3366 bitmap->size = size;
ce1ffea8
JS
3367 }
3368}
3369
e4654d2d
FZ
3370void bdrv_release_dirty_bitmap(BlockDriverState *bs, BdrvDirtyBitmap *bitmap)
3371{
3372 BdrvDirtyBitmap *bm, *next;
3373 QLIST_FOREACH_SAFE(bm, &bs->dirty_bitmaps, list, next) {
3374 if (bm == bitmap) {
9bd2b08f 3375 assert(!bdrv_dirty_bitmap_frozen(bm));
e4654d2d
FZ
3376 QLIST_REMOVE(bitmap, list);
3377 hbitmap_free(bitmap->bitmap);
0db6e54a 3378 g_free(bitmap->name);
e4654d2d
FZ
3379 g_free(bitmap);
3380 return;
a55eb92c 3381 }
7cd1e32a
LS
3382 }
3383}
3384
b8e6fb75
JS
3385void bdrv_disable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3386{
9bd2b08f 3387 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3388 bitmap->disabled = true;
3389}
3390
3391void bdrv_enable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3392{
9bd2b08f 3393 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3394 bitmap->disabled = false;
3395}
3396
21b56835
FZ
3397BlockDirtyInfoList *bdrv_query_dirty_bitmaps(BlockDriverState *bs)
3398{
3399 BdrvDirtyBitmap *bm;
3400 BlockDirtyInfoList *list = NULL;
3401 BlockDirtyInfoList **plist = &list;
3402
3403 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
5839e53b
MA
3404 BlockDirtyInfo *info = g_new0(BlockDirtyInfo, 1);
3405 BlockDirtyInfoList *entry = g_new0(BlockDirtyInfoList, 1);
20dca810 3406 info->count = bdrv_get_dirty_count(bm);
592fdd02 3407 info->granularity = bdrv_dirty_bitmap_granularity(bm);
0db6e54a
FZ
3408 info->has_name = !!bm->name;
3409 info->name = g_strdup(bm->name);
9abe3bdc 3410 info->status = bdrv_dirty_bitmap_status(bm);
21b56835
FZ
3411 entry->value = info;
3412 *plist = entry;
3413 plist = &entry->next;
3414 }
3415
3416 return list;
3417}
3418
e4654d2d 3419int bdrv_get_dirty(BlockDriverState *bs, BdrvDirtyBitmap *bitmap, int64_t sector)
7cd1e32a 3420{
e4654d2d
FZ
3421 if (bitmap) {
3422 return hbitmap_get(bitmap->bitmap, sector);
7cd1e32a
LS
3423 } else {
3424 return 0;
3425 }
3426}
3427
341ebc2f
JS
3428/**
3429 * Chooses a default granularity based on the existing cluster size,
3430 * but clamped between [4K, 64K]. Defaults to 64K in the case that there
3431 * is no cluster size information available.
3432 */
3433uint32_t bdrv_get_default_bitmap_granularity(BlockDriverState *bs)
3434{
3435 BlockDriverInfo bdi;
3436 uint32_t granularity;
3437
3438 if (bdrv_get_info(bs, &bdi) >= 0 && bdi.cluster_size > 0) {
3439 granularity = MAX(4096, bdi.cluster_size);
3440 granularity = MIN(65536, granularity);
3441 } else {
3442 granularity = 65536;
3443 }
3444
3445 return granularity;
3446}
3447
592fdd02
JS
3448uint32_t bdrv_dirty_bitmap_granularity(BdrvDirtyBitmap *bitmap)
3449{
3450 return BDRV_SECTOR_SIZE << hbitmap_granularity(bitmap->bitmap);
3451}
3452
20dca810 3453void bdrv_dirty_iter_init(BdrvDirtyBitmap *bitmap, HBitmapIter *hbi)
1755da16 3454{
e4654d2d 3455 hbitmap_iter_init(hbi, bitmap->bitmap, 0);
1755da16
PB
3456}
3457
20dca810 3458void bdrv_set_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3459 int64_t cur_sector, int nr_sectors)
3460{
b8e6fb75 3461 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3462 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3463}
3464
20dca810 3465void bdrv_reset_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3466 int64_t cur_sector, int nr_sectors)
3467{
b8e6fb75 3468 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3469 hbitmap_reset(bitmap->bitmap, cur_sector, nr_sectors);
3470}
3471
e74e6b78
JS
3472void bdrv_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3473{
3474 assert(bdrv_dirty_bitmap_enabled(bitmap));
c6a8c328 3475 hbitmap_reset_all(bitmap->bitmap);
e74e6b78
JS
3476}
3477
e0c47b6c
SH
3478void bdrv_set_dirty(BlockDriverState *bs, int64_t cur_sector,
3479 int nr_sectors)
1755da16 3480{
e4654d2d
FZ
3481 BdrvDirtyBitmap *bitmap;
3482 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
b8e6fb75
JS
3483 if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3484 continue;
3485 }
e4654d2d
FZ
3486 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3487 }
1755da16
PB
3488}
3489
d58d8453
JS
3490/**
3491 * Advance an HBitmapIter to an arbitrary offset.
3492 */
3493void bdrv_set_dirty_iter(HBitmapIter *hbi, int64_t offset)
3494{
3495 assert(hbi->hb);
3496 hbitmap_iter_init(hbi, hbi->hb, offset);
3497}
3498
20dca810 3499int64_t bdrv_get_dirty_count(BdrvDirtyBitmap *bitmap)
aaa0eb75 3500{
e4654d2d 3501 return hbitmap_count(bitmap->bitmap);
aaa0eb75 3502}
f88e1a42 3503
9fcb0251
FZ
3504/* Get a reference to bs */
3505void bdrv_ref(BlockDriverState *bs)
3506{
3507 bs->refcnt++;
3508}
3509
3510/* Release a previously grabbed reference to bs.
3511 * If after releasing, reference count is zero, the BlockDriverState is
3512 * deleted. */
3513void bdrv_unref(BlockDriverState *bs)
3514{
9a4d5ca6
JC
3515 if (!bs) {
3516 return;
3517 }
9fcb0251
FZ
3518 assert(bs->refcnt > 0);
3519 if (--bs->refcnt == 0) {
3520 bdrv_delete(bs);
3521 }
3522}
3523
fbe40ff7
FZ
3524struct BdrvOpBlocker {
3525 Error *reason;
3526 QLIST_ENTRY(BdrvOpBlocker) list;
3527};
3528
3529bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
3530{
3531 BdrvOpBlocker *blocker;
3532 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3533 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
3534 blocker = QLIST_FIRST(&bs->op_blockers[op]);
3535 if (errp) {
81e5f78a
AG
3536 error_setg(errp, "Node '%s' is busy: %s",
3537 bdrv_get_device_or_node_name(bs),
bfb197e0 3538 error_get_pretty(blocker->reason));
fbe40ff7
FZ
3539 }
3540 return true;
3541 }
3542 return false;
3543}
3544
3545void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
3546{
3547 BdrvOpBlocker *blocker;
3548 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3549
5839e53b 3550 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
3551 blocker->reason = reason;
3552 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
3553}
3554
3555void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
3556{
3557 BdrvOpBlocker *blocker, *next;
3558 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3559 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
3560 if (blocker->reason == reason) {
3561 QLIST_REMOVE(blocker, list);
3562 g_free(blocker);
3563 }
3564 }
3565}
3566
3567void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
3568{
3569 int i;
3570 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3571 bdrv_op_block(bs, i, reason);
3572 }
3573}
3574
3575void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
3576{
3577 int i;
3578 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3579 bdrv_op_unblock(bs, i, reason);
3580 }
3581}
3582
3583bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
3584{
3585 int i;
3586
3587 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3588 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
3589 return false;
3590 }
3591 }
3592 return true;
3593}
3594
28a7282a
LC
3595void bdrv_iostatus_enable(BlockDriverState *bs)
3596{
d6bf279e 3597 bs->iostatus_enabled = true;
58e21ef5 3598 bs->iostatus = BLOCK_DEVICE_IO_STATUS_OK;
28a7282a
LC
3599}
3600
3601/* The I/O status is only enabled if the drive explicitly
3602 * enables it _and_ the VM is configured to stop on errors */
3603bool bdrv_iostatus_is_enabled(const BlockDriverState *bs)
3604{
d6bf279e 3605 return (bs->iostatus_enabled &&
92aa5c6d
PB
3606 (bs->on_write_error == BLOCKDEV_ON_ERROR_ENOSPC ||
3607 bs->on_write_error == BLOCKDEV_ON_ERROR_STOP ||
3608 bs->on_read_error == BLOCKDEV_ON_ERROR_STOP));
28a7282a
LC
3609}
3610
3611void bdrv_iostatus_disable(BlockDriverState *bs)
3612{
d6bf279e 3613 bs->iostatus_enabled = false;
28a7282a
LC
3614}
3615
3616void bdrv_iostatus_reset(BlockDriverState *bs)
3617{
3618 if (bdrv_iostatus_is_enabled(bs)) {
58e21ef5 3619 bs->iostatus = BLOCK_DEVICE_IO_STATUS_OK;
3bd293c3
PB
3620 if (bs->job) {
3621 block_job_iostatus_reset(bs->job);
3622 }
28a7282a
LC
3623 }
3624}
3625
28a7282a
LC
3626void bdrv_iostatus_set_err(BlockDriverState *bs, int error)
3627{
3e1caa5f
PB
3628 assert(bdrv_iostatus_is_enabled(bs));
3629 if (bs->iostatus == BLOCK_DEVICE_IO_STATUS_OK) {
58e21ef5
LC
3630 bs->iostatus = error == ENOSPC ? BLOCK_DEVICE_IO_STATUS_NOSPACE :
3631 BLOCK_DEVICE_IO_STATUS_FAILED;
28a7282a
LC
3632 }
3633}
3634
d92ada22
LC
3635void bdrv_img_create(const char *filename, const char *fmt,
3636 const char *base_filename, const char *base_fmt,
f382d43a
MR
3637 char *options, uint64_t img_size, int flags,
3638 Error **errp, bool quiet)
f88e1a42 3639{
83d0521a
CL
3640 QemuOptsList *create_opts = NULL;
3641 QemuOpts *opts = NULL;
3642 const char *backing_fmt, *backing_file;
3643 int64_t size;
f88e1a42 3644 BlockDriver *drv, *proto_drv;
cc84d90f 3645 Error *local_err = NULL;
f88e1a42
JS
3646 int ret = 0;
3647
3648 /* Find driver and parse its options */
3649 drv = bdrv_find_format(fmt);
3650 if (!drv) {
71c79813 3651 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 3652 return;
f88e1a42
JS
3653 }
3654
b65a5e12 3655 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 3656 if (!proto_drv) {
d92ada22 3657 return;
f88e1a42
JS
3658 }
3659
c6149724
HR
3660 if (!drv->create_opts) {
3661 error_setg(errp, "Format driver '%s' does not support image creation",
3662 drv->format_name);
3663 return;
3664 }
3665
3666 if (!proto_drv->create_opts) {
3667 error_setg(errp, "Protocol driver '%s' does not support image creation",
3668 proto_drv->format_name);
3669 return;
3670 }
3671
c282e1fd
CL
3672 create_opts = qemu_opts_append(create_opts, drv->create_opts);
3673 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
3674
3675 /* Create parameter list with default values */
83d0521a 3676 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 3677 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
3678
3679 /* Parse -o options */
3680 if (options) {
dc523cd3
MA
3681 qemu_opts_do_parse(opts, options, NULL, &local_err);
3682 if (local_err) {
3683 error_report_err(local_err);
3684 local_err = NULL;
83d0521a 3685 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
3686 goto out;
3687 }
3688 }
3689
3690 if (base_filename) {
f43e47db 3691 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 3692 if (local_err) {
71c79813
LC
3693 error_setg(errp, "Backing file not supported for file format '%s'",
3694 fmt);
f88e1a42
JS
3695 goto out;
3696 }
3697 }
3698
3699 if (base_fmt) {
f43e47db 3700 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 3701 if (local_err) {
71c79813
LC
3702 error_setg(errp, "Backing file format not supported for file "
3703 "format '%s'", fmt);
f88e1a42
JS
3704 goto out;
3705 }
3706 }
3707
83d0521a
CL
3708 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
3709 if (backing_file) {
3710 if (!strcmp(filename, backing_file)) {
71c79813
LC
3711 error_setg(errp, "Error: Trying to create an image with the "
3712 "same filename as the backing file");
792da93a
JS
3713 goto out;
3714 }
3715 }
3716
83d0521a 3717 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42
JS
3718
3719 // The size for the image must always be specified, with one exception:
3720 // If we are using a backing file, we can obtain the size from there
83d0521a
CL
3721 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
3722 if (size == -1) {
3723 if (backing_file) {
66f6b814 3724 BlockDriverState *bs;
29168018 3725 char *full_backing = g_new0(char, PATH_MAX);
52bf1e72 3726 int64_t size;
63090dac 3727 int back_flags;
e6641719 3728 QDict *backing_options = NULL;
63090dac 3729
29168018
HR
3730 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
3731 full_backing, PATH_MAX,
3732 &local_err);
3733 if (local_err) {
3734 g_free(full_backing);
3735 goto out;
3736 }
3737
63090dac
PB
3738 /* backing files always opened read-only */
3739 back_flags =
3740 flags & ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 3741
e6641719
HR
3742 if (backing_fmt) {
3743 backing_options = qdict_new();
3744 qdict_put(backing_options, "driver",
3745 qstring_from_str(backing_fmt));
3746 }
3747
f67503e5 3748 bs = NULL;
e6641719 3749 ret = bdrv_open(&bs, full_backing, NULL, backing_options,
6ebf9aa2 3750 back_flags, &local_err);
29168018 3751 g_free(full_backing);
f88e1a42 3752 if (ret < 0) {
f88e1a42
JS
3753 goto out;
3754 }
52bf1e72
MA
3755 size = bdrv_getlength(bs);
3756 if (size < 0) {
3757 error_setg_errno(errp, -size, "Could not get size of '%s'",
3758 backing_file);
3759 bdrv_unref(bs);
3760 goto out;
3761 }
f88e1a42 3762
39101f25 3763 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
66f6b814
HR
3764
3765 bdrv_unref(bs);
f88e1a42 3766 } else {
71c79813 3767 error_setg(errp, "Image creation needs a size parameter");
f88e1a42
JS
3768 goto out;
3769 }
3770 }
3771
f382d43a 3772 if (!quiet) {
fe646693 3773 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 3774 qemu_opts_print(opts, " ");
f382d43a
MR
3775 puts("");
3776 }
83d0521a 3777
c282e1fd 3778 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 3779
cc84d90f
HR
3780 if (ret == -EFBIG) {
3781 /* This is generally a better message than whatever the driver would
3782 * deliver (especially because of the cluster_size_hint), since that
3783 * is most probably not much different from "image too large". */
3784 const char *cluster_size_hint = "";
83d0521a 3785 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 3786 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 3787 }
cc84d90f
HR
3788 error_setg(errp, "The image size is too large for file format '%s'"
3789 "%s", fmt, cluster_size_hint);
3790 error_free(local_err);
3791 local_err = NULL;
f88e1a42
JS
3792 }
3793
3794out:
83d0521a
CL
3795 qemu_opts_del(opts);
3796 qemu_opts_free(create_opts);
84d18f06 3797 if (local_err) {
cc84d90f
HR
3798 error_propagate(errp, local_err);
3799 }
f88e1a42 3800}
85d126f3
SH
3801
3802AioContext *bdrv_get_aio_context(BlockDriverState *bs)
3803{
dcd04228
SH
3804 return bs->aio_context;
3805}
3806
3807void bdrv_detach_aio_context(BlockDriverState *bs)
3808{
33384421
HR
3809 BdrvAioNotifier *baf;
3810
dcd04228
SH
3811 if (!bs->drv) {
3812 return;
3813 }
3814
33384421
HR
3815 QLIST_FOREACH(baf, &bs->aio_notifiers, list) {
3816 baf->detach_aio_context(baf->opaque);
3817 }
3818
13af91eb 3819 if (bs->io_limits_enabled) {
0e5b0a2d 3820 throttle_timers_detach_aio_context(&bs->throttle_timers);
13af91eb 3821 }
dcd04228
SH
3822 if (bs->drv->bdrv_detach_aio_context) {
3823 bs->drv->bdrv_detach_aio_context(bs);
3824 }
3825 if (bs->file) {
9a4f4c31 3826 bdrv_detach_aio_context(bs->file->bs);
dcd04228 3827 }
760e0063
KW
3828 if (bs->backing) {
3829 bdrv_detach_aio_context(bs->backing->bs);
dcd04228
SH
3830 }
3831
3832 bs->aio_context = NULL;
3833}
3834
3835void bdrv_attach_aio_context(BlockDriverState *bs,
3836 AioContext *new_context)
3837{
33384421
HR
3838 BdrvAioNotifier *ban;
3839
dcd04228
SH
3840 if (!bs->drv) {
3841 return;
3842 }
3843
3844 bs->aio_context = new_context;
3845
760e0063
KW
3846 if (bs->backing) {
3847 bdrv_attach_aio_context(bs->backing->bs, new_context);
dcd04228
SH
3848 }
3849 if (bs->file) {
9a4f4c31 3850 bdrv_attach_aio_context(bs->file->bs, new_context);
dcd04228
SH
3851 }
3852 if (bs->drv->bdrv_attach_aio_context) {
3853 bs->drv->bdrv_attach_aio_context(bs, new_context);
3854 }
13af91eb 3855 if (bs->io_limits_enabled) {
0e5b0a2d 3856 throttle_timers_attach_aio_context(&bs->throttle_timers, new_context);
13af91eb 3857 }
33384421
HR
3858
3859 QLIST_FOREACH(ban, &bs->aio_notifiers, list) {
3860 ban->attached_aio_context(new_context, ban->opaque);
3861 }
dcd04228
SH
3862}
3863
3864void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
3865{
53ec73e2 3866 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228
SH
3867
3868 bdrv_detach_aio_context(bs);
3869
3870 /* This function executes in the old AioContext so acquire the new one in
3871 * case it runs in a different thread.
3872 */
3873 aio_context_acquire(new_context);
3874 bdrv_attach_aio_context(bs, new_context);
3875 aio_context_release(new_context);
85d126f3 3876}
d616b224 3877
33384421
HR
3878void bdrv_add_aio_context_notifier(BlockDriverState *bs,
3879 void (*attached_aio_context)(AioContext *new_context, void *opaque),
3880 void (*detach_aio_context)(void *opaque), void *opaque)
3881{
3882 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
3883 *ban = (BdrvAioNotifier){
3884 .attached_aio_context = attached_aio_context,
3885 .detach_aio_context = detach_aio_context,
3886 .opaque = opaque
3887 };
3888
3889 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
3890}
3891
3892void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
3893 void (*attached_aio_context)(AioContext *,
3894 void *),
3895 void (*detach_aio_context)(void *),
3896 void *opaque)
3897{
3898 BdrvAioNotifier *ban, *ban_next;
3899
3900 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
3901 if (ban->attached_aio_context == attached_aio_context &&
3902 ban->detach_aio_context == detach_aio_context &&
3903 ban->opaque == opaque)
3904 {
3905 QLIST_REMOVE(ban, list);
3906 g_free(ban);
3907
3908 return;
3909 }
3910 }
3911
3912 abort();
3913}
3914
77485434
HR
3915int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
3916 BlockDriverAmendStatusCB *status_cb)
6f176b48 3917{
c282e1fd 3918 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
3919 return -ENOTSUP;
3920 }
77485434 3921 return bs->drv->bdrv_amend_options(bs, opts, status_cb);
6f176b48 3922}
f6186f49 3923
b5042a36
BC
3924/* This function will be called by the bdrv_recurse_is_first_non_filter method
3925 * of block filter and by bdrv_is_first_non_filter.
3926 * It is used to test if the given bs is the candidate or recurse more in the
3927 * node graph.
212a5a8f 3928 */
b5042a36 3929bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 3930 BlockDriverState *candidate)
f6186f49 3931{
b5042a36
BC
3932 /* return false if basic checks fails */
3933 if (!bs || !bs->drv) {
212a5a8f 3934 return false;
f6186f49
BC
3935 }
3936
b5042a36
BC
3937 /* the code reached a non block filter driver -> check if the bs is
3938 * the same as the candidate. It's the recursion termination condition.
3939 */
3940 if (!bs->drv->is_filter) {
3941 return bs == candidate;
212a5a8f 3942 }
b5042a36 3943 /* Down this path the driver is a block filter driver */
212a5a8f 3944
b5042a36
BC
3945 /* If the block filter recursion method is defined use it to recurse down
3946 * the node graph.
3947 */
3948 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 3949 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
3950 }
3951
b5042a36
BC
3952 /* the driver is a block filter but don't allow to recurse -> return false
3953 */
3954 return false;
f6186f49
BC
3955}
3956
212a5a8f
BC
3957/* This function checks if the candidate is the first non filter bs down it's
3958 * bs chain. Since we don't have pointers to parents it explore all bs chains
3959 * from the top. Some filters can choose not to pass down the recursion.
3960 */
3961bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 3962{
212a5a8f
BC
3963 BlockDriverState *bs;
3964
3965 /* walk down the bs forest recursively */
3966 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
3967 bool perm;
3968
b5042a36 3969 /* try to recurse in this top level bs */
e6dc8a1f 3970 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
3971
3972 /* candidate is the first non filter */
3973 if (perm) {
3974 return true;
3975 }
3976 }
3977
3978 return false;
f6186f49 3979}
09158f00 3980
e12f3784
WC
3981BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
3982 const char *node_name, Error **errp)
09158f00
BC
3983{
3984 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
3985 AioContext *aio_context;
3986
09158f00
BC
3987 if (!to_replace_bs) {
3988 error_setg(errp, "Node name '%s' not found", node_name);
3989 return NULL;
3990 }
3991
5a7e7a0b
SH
3992 aio_context = bdrv_get_aio_context(to_replace_bs);
3993 aio_context_acquire(aio_context);
3994
09158f00 3995 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
3996 to_replace_bs = NULL;
3997 goto out;
09158f00
BC
3998 }
3999
4000 /* We don't want arbitrary node of the BDS chain to be replaced only the top
4001 * most non filter in order to prevent data corruption.
4002 * Another benefit is that this tests exclude backing files which are
4003 * blocked by the backing blockers.
4004 */
e12f3784 4005 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 4006 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
4007 to_replace_bs = NULL;
4008 goto out;
09158f00
BC
4009 }
4010
5a7e7a0b
SH
4011out:
4012 aio_context_release(aio_context);
09158f00
BC
4013 return to_replace_bs;
4014}
448ad91d 4015
91af7014
HR
4016static bool append_open_options(QDict *d, BlockDriverState *bs)
4017{
4018 const QDictEntry *entry;
4019 bool found_any = false;
4020
4021 for (entry = qdict_first(bs->options); entry;
4022 entry = qdict_next(bs->options, entry))
4023 {
4024 /* Only take options for this level and exclude all non-driver-specific
4025 * options */
4026 if (!strchr(qdict_entry_key(entry), '.') &&
4027 strcmp(qdict_entry_key(entry), "node-name"))
4028 {
4029 qobject_incref(qdict_entry_value(entry));
4030 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
4031 found_any = true;
4032 }
4033 }
4034
4035 return found_any;
4036}
4037
4038/* Updates the following BDS fields:
4039 * - exact_filename: A filename which may be used for opening a block device
4040 * which (mostly) equals the given BDS (even without any
4041 * other options; so reading and writing must return the same
4042 * results, but caching etc. may be different)
4043 * - full_open_options: Options which, when given when opening a block device
4044 * (without a filename), result in a BDS (mostly)
4045 * equalling the given one
4046 * - filename: If exact_filename is set, it is copied here. Otherwise,
4047 * full_open_options is converted to a JSON object, prefixed with
4048 * "json:" (for use through the JSON pseudo protocol) and put here.
4049 */
4050void bdrv_refresh_filename(BlockDriverState *bs)
4051{
4052 BlockDriver *drv = bs->drv;
4053 QDict *opts;
4054
4055 if (!drv) {
4056 return;
4057 }
4058
4059 /* This BDS's file name will most probably depend on its file's name, so
4060 * refresh that first */
4061 if (bs->file) {
9a4f4c31 4062 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
4063 }
4064
4065 if (drv->bdrv_refresh_filename) {
4066 /* Obsolete information is of no use here, so drop the old file name
4067 * information before refreshing it */
4068 bs->exact_filename[0] = '\0';
4069 if (bs->full_open_options) {
4070 QDECREF(bs->full_open_options);
4071 bs->full_open_options = NULL;
4072 }
4073
4074 drv->bdrv_refresh_filename(bs);
4075 } else if (bs->file) {
4076 /* Try to reconstruct valid information from the underlying file */
4077 bool has_open_options;
4078
4079 bs->exact_filename[0] = '\0';
4080 if (bs->full_open_options) {
4081 QDECREF(bs->full_open_options);
4082 bs->full_open_options = NULL;
4083 }
4084
4085 opts = qdict_new();
4086 has_open_options = append_open_options(opts, bs);
4087
4088 /* If no specific options have been given for this BDS, the filename of
4089 * the underlying file should suffice for this one as well */
9a4f4c31
KW
4090 if (bs->file->bs->exact_filename[0] && !has_open_options) {
4091 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
4092 }
4093 /* Reconstructing the full options QDict is simple for most format block
4094 * drivers, as long as the full options are known for the underlying
4095 * file BDS. The full options QDict of that file BDS should somehow
4096 * contain a representation of the filename, therefore the following
4097 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 4098 if (bs->file->bs->full_open_options) {
91af7014
HR
4099 qdict_put_obj(opts, "driver",
4100 QOBJECT(qstring_from_str(drv->format_name)));
9a4f4c31
KW
4101 QINCREF(bs->file->bs->full_open_options);
4102 qdict_put_obj(opts, "file",
4103 QOBJECT(bs->file->bs->full_open_options));
91af7014
HR
4104
4105 bs->full_open_options = opts;
4106 } else {
4107 QDECREF(opts);
4108 }
4109 } else if (!bs->full_open_options && qdict_size(bs->options)) {
4110 /* There is no underlying file BDS (at least referenced by BDS.file),
4111 * so the full options QDict should be equal to the options given
4112 * specifically for this block device when it was opened (plus the
4113 * driver specification).
4114 * Because those options don't change, there is no need to update
4115 * full_open_options when it's already set. */
4116
4117 opts = qdict_new();
4118 append_open_options(opts, bs);
4119 qdict_put_obj(opts, "driver",
4120 QOBJECT(qstring_from_str(drv->format_name)));
4121
4122 if (bs->exact_filename[0]) {
4123 /* This may not work for all block protocol drivers (some may
4124 * require this filename to be parsed), but we have to find some
4125 * default solution here, so just include it. If some block driver
4126 * does not support pure options without any filename at all or
4127 * needs some special format of the options QDict, it needs to
4128 * implement the driver-specific bdrv_refresh_filename() function.
4129 */
4130 qdict_put_obj(opts, "filename",
4131 QOBJECT(qstring_from_str(bs->exact_filename)));
4132 }
4133
4134 bs->full_open_options = opts;
4135 }
4136
4137 if (bs->exact_filename[0]) {
4138 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4139 } else if (bs->full_open_options) {
4140 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4141 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4142 qstring_get_str(json));
4143 QDECREF(json);
4144 }
4145}
5366d0c8
BC
4146
4147/* This accessor function purpose is to allow the device models to access the
4148 * BlockAcctStats structure embedded inside a BlockDriverState without being
4149 * aware of the BlockDriverState structure layout.
4150 * It will go away when the BlockAcctStats structure will be moved inside
4151 * the device models.
4152 */
4153BlockAcctStats *bdrv_get_stats(BlockDriverState *bs)
4154{
4155 return &bs->stats;
4156}