]> git.ipfire.org Git - thirdparty/qemu.git/blame - block.c
error: Use error_reportf_err() where it makes obvious sense
[thirdparty/qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
3990d09a 24#include "config-host.h"
faf07963 25#include "qemu-common.h"
6d519a5f 26#include "trace.h"
737e150e
PB
27#include "block/block_int.h"
28#include "block/blockjob.h"
d49b6836 29#include "qemu/error-report.h"
1de7afc9 30#include "qemu/module.h"
cc7a8ea7 31#include "qapi/qmp/qerror.h"
91a097e7 32#include "qapi/qmp/qbool.h"
7b1b5d19 33#include "qapi/qmp/qjson.h"
bfb197e0 34#include "sysemu/block-backend.h"
9c17d615 35#include "sysemu/sysemu.h"
1de7afc9 36#include "qemu/notify.h"
10817bf0 37#include "qemu/coroutine.h"
c13163fb 38#include "block/qapi.h"
b2023818 39#include "qmp-commands.h"
1de7afc9 40#include "qemu/timer.h"
a5ee7bd4 41#include "qapi-event.h"
db628338 42#include "block/throttle-groups.h"
fc01f7e7 43
71e72a19 44#ifdef CONFIG_BSD
7674e7bf
FB
45#include <sys/types.h>
46#include <sys/stat.h>
47#include <sys/ioctl.h>
72cf2d4f 48#include <sys/queue.h>
c5e97233 49#ifndef __DragonFly__
7674e7bf
FB
50#include <sys/disk.h>
51#endif
c5e97233 52#endif
7674e7bf 53
49dc768d
AL
54#ifdef _WIN32
55#include <windows.h>
56#endif
57
9bd2b08f
JS
58/**
59 * A BdrvDirtyBitmap can be in three possible states:
60 * (1) successor is NULL and disabled is false: full r/w mode
61 * (2) successor is NULL and disabled is true: read only mode ("disabled")
62 * (3) successor is set: frozen mode.
63 * A frozen bitmap cannot be renamed, deleted, anonymized, cleared, set,
64 * or enabled. A frozen bitmap can only abdicate() or reclaim().
65 */
e4654d2d 66struct BdrvDirtyBitmap {
aa0c7ca5
JS
67 HBitmap *bitmap; /* Dirty sector bitmap implementation */
68 BdrvDirtyBitmap *successor; /* Anonymous child; implies frozen status */
69 char *name; /* Optional non-empty unique ID */
70 int64_t size; /* Size of the bitmap (Number of sectors) */
71 bool disabled; /* Bitmap is read-only */
e4654d2d
FZ
72 QLIST_ENTRY(BdrvDirtyBitmap) list;
73};
74
1c9805a3
SH
75#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
76
c69a4dd8 77struct BdrvStates bdrv_states = QTAILQ_HEAD_INITIALIZER(bdrv_states);
7ee930d0 78
dc364f4c
BC
79static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
80 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
81
8a22f02a
SH
82static QLIST_HEAD(, BlockDriver) bdrv_drivers =
83 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 84
f3930ed0
KW
85static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
86 const char *reference, QDict *options, int flags,
87 BlockDriverState *parent,
ce343771 88 const BdrvChildRole *child_role, Error **errp);
f3930ed0 89
ce1ffea8 90static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs);
eb852011
MA
91/* If non-zero, use only whitelisted block drivers */
92static int use_bdrv_whitelist;
93
9e0b22f4
SH
94#ifdef _WIN32
95static int is_windows_drive_prefix(const char *filename)
96{
97 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
98 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
99 filename[1] == ':');
100}
101
102int is_windows_drive(const char *filename)
103{
104 if (is_windows_drive_prefix(filename) &&
105 filename[2] == '\0')
106 return 1;
107 if (strstart(filename, "\\\\.\\", NULL) ||
108 strstart(filename, "//./", NULL))
109 return 1;
110 return 0;
111}
112#endif
113
339064d5
KW
114size_t bdrv_opt_mem_align(BlockDriverState *bs)
115{
116 if (!bs || !bs->drv) {
459b4e66
DL
117 /* page size or 4k (hdd sector size) should be on the safe side */
118 return MAX(4096, getpagesize());
339064d5
KW
119 }
120
121 return bs->bl.opt_mem_alignment;
122}
123
4196d2f0
DL
124size_t bdrv_min_mem_align(BlockDriverState *bs)
125{
126 if (!bs || !bs->drv) {
459b4e66
DL
127 /* page size or 4k (hdd sector size) should be on the safe side */
128 return MAX(4096, getpagesize());
4196d2f0
DL
129 }
130
131 return bs->bl.min_mem_alignment;
132}
133
9e0b22f4 134/* check if the path starts with "<protocol>:" */
5c98415b 135int path_has_protocol(const char *path)
9e0b22f4 136{
947995c0
PB
137 const char *p;
138
9e0b22f4
SH
139#ifdef _WIN32
140 if (is_windows_drive(path) ||
141 is_windows_drive_prefix(path)) {
142 return 0;
143 }
947995c0
PB
144 p = path + strcspn(path, ":/\\");
145#else
146 p = path + strcspn(path, ":/");
9e0b22f4
SH
147#endif
148
947995c0 149 return *p == ':';
9e0b22f4
SH
150}
151
83f64091 152int path_is_absolute(const char *path)
3b0d4f61 153{
21664424
FB
154#ifdef _WIN32
155 /* specific case for names like: "\\.\d:" */
f53f4da9 156 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 157 return 1;
f53f4da9
PB
158 }
159 return (*path == '/' || *path == '\\');
3b9f94e1 160#else
f53f4da9 161 return (*path == '/');
3b9f94e1 162#endif
3b0d4f61
FB
163}
164
83f64091
FB
165/* if filename is absolute, just copy it to dest. Otherwise, build a
166 path to it by considering it is relative to base_path. URL are
167 supported. */
168void path_combine(char *dest, int dest_size,
169 const char *base_path,
170 const char *filename)
3b0d4f61 171{
83f64091
FB
172 const char *p, *p1;
173 int len;
174
175 if (dest_size <= 0)
176 return;
177 if (path_is_absolute(filename)) {
178 pstrcpy(dest, dest_size, filename);
179 } else {
180 p = strchr(base_path, ':');
181 if (p)
182 p++;
183 else
184 p = base_path;
3b9f94e1
FB
185 p1 = strrchr(base_path, '/');
186#ifdef _WIN32
187 {
188 const char *p2;
189 p2 = strrchr(base_path, '\\');
190 if (!p1 || p2 > p1)
191 p1 = p2;
192 }
193#endif
83f64091
FB
194 if (p1)
195 p1++;
196 else
197 p1 = base_path;
198 if (p1 > p)
199 p = p1;
200 len = p - base_path;
201 if (len > dest_size - 1)
202 len = dest_size - 1;
203 memcpy(dest, base_path, len);
204 dest[len] = '\0';
205 pstrcat(dest, dest_size, filename);
3b0d4f61 206 }
3b0d4f61
FB
207}
208
0a82855a
HR
209void bdrv_get_full_backing_filename_from_filename(const char *backed,
210 const char *backing,
9f07429e
HR
211 char *dest, size_t sz,
212 Error **errp)
dc5a1371 213{
9f07429e
HR
214 if (backing[0] == '\0' || path_has_protocol(backing) ||
215 path_is_absolute(backing))
216 {
0a82855a 217 pstrcpy(dest, sz, backing);
9f07429e
HR
218 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
219 error_setg(errp, "Cannot use relative backing file names for '%s'",
220 backed);
dc5a1371 221 } else {
0a82855a 222 path_combine(dest, sz, backed, backing);
dc5a1371
PB
223 }
224}
225
9f07429e
HR
226void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
227 Error **errp)
0a82855a 228{
9f07429e
HR
229 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
230
231 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
232 dest, sz, errp);
0a82855a
HR
233}
234
0eb7217e
SH
235void bdrv_register(BlockDriver *bdrv)
236{
237 bdrv_setup_io_funcs(bdrv);
b2e12bc6 238
8a22f02a 239 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 240}
b338082b 241
7f06d47e 242BlockDriverState *bdrv_new_root(void)
b338082b 243{
7f06d47e 244 BlockDriverState *bs = bdrv_new();
e4e9986b 245
e4e9986b 246 QTAILQ_INSERT_TAIL(&bdrv_states, bs, device_list);
e4e9986b
MA
247 return bs;
248}
249
250BlockDriverState *bdrv_new(void)
251{
252 BlockDriverState *bs;
253 int i;
254
5839e53b 255 bs = g_new0(BlockDriverState, 1);
e4654d2d 256 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
257 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
258 QLIST_INIT(&bs->op_blockers[i]);
259 }
d7d512f6 260 notifier_list_init(&bs->close_notifiers);
d616b224 261 notifier_with_return_list_init(&bs->before_write_notifiers);
cc0681c4
BC
262 qemu_co_queue_init(&bs->throttled_reqs[0]);
263 qemu_co_queue_init(&bs->throttled_reqs[1]);
9fcb0251 264 bs->refcnt = 1;
dcd04228 265 bs->aio_context = qemu_get_aio_context();
d7d512f6 266
b338082b
FB
267 return bs;
268}
269
d7d512f6
PB
270void bdrv_add_close_notifier(BlockDriverState *bs, Notifier *notify)
271{
272 notifier_list_add(&bs->close_notifiers, notify);
273}
274
ea2384d3
FB
275BlockDriver *bdrv_find_format(const char *format_name)
276{
277 BlockDriver *drv1;
8a22f02a
SH
278 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
279 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 280 return drv1;
8a22f02a 281 }
ea2384d3
FB
282 }
283 return NULL;
284}
285
b64ec4e4 286static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 287{
b64ec4e4
FZ
288 static const char *whitelist_rw[] = {
289 CONFIG_BDRV_RW_WHITELIST
290 };
291 static const char *whitelist_ro[] = {
292 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
293 };
294 const char **p;
295
b64ec4e4 296 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 297 return 1; /* no whitelist, anything goes */
b64ec4e4 298 }
eb852011 299
b64ec4e4 300 for (p = whitelist_rw; *p; p++) {
eb852011
MA
301 if (!strcmp(drv->format_name, *p)) {
302 return 1;
303 }
304 }
b64ec4e4
FZ
305 if (read_only) {
306 for (p = whitelist_ro; *p; p++) {
307 if (!strcmp(drv->format_name, *p)) {
308 return 1;
309 }
310 }
311 }
eb852011
MA
312 return 0;
313}
314
5b7e1542
ZYW
315typedef struct CreateCo {
316 BlockDriver *drv;
317 char *filename;
83d0521a 318 QemuOpts *opts;
5b7e1542 319 int ret;
cc84d90f 320 Error *err;
5b7e1542
ZYW
321} CreateCo;
322
323static void coroutine_fn bdrv_create_co_entry(void *opaque)
324{
cc84d90f
HR
325 Error *local_err = NULL;
326 int ret;
327
5b7e1542
ZYW
328 CreateCo *cco = opaque;
329 assert(cco->drv);
330
c282e1fd 331 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
84d18f06 332 if (local_err) {
cc84d90f
HR
333 error_propagate(&cco->err, local_err);
334 }
335 cco->ret = ret;
5b7e1542
ZYW
336}
337
0e7e1989 338int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 339 QemuOpts *opts, Error **errp)
ea2384d3 340{
5b7e1542
ZYW
341 int ret;
342
343 Coroutine *co;
344 CreateCo cco = {
345 .drv = drv,
346 .filename = g_strdup(filename),
83d0521a 347 .opts = opts,
5b7e1542 348 .ret = NOT_DONE,
cc84d90f 349 .err = NULL,
5b7e1542
ZYW
350 };
351
c282e1fd 352 if (!drv->bdrv_create) {
cc84d90f 353 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
354 ret = -ENOTSUP;
355 goto out;
5b7e1542
ZYW
356 }
357
358 if (qemu_in_coroutine()) {
359 /* Fast-path if already in coroutine context */
360 bdrv_create_co_entry(&cco);
361 } else {
362 co = qemu_coroutine_create(bdrv_create_co_entry);
363 qemu_coroutine_enter(co, &cco);
364 while (cco.ret == NOT_DONE) {
b47ec2c4 365 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
366 }
367 }
368
369 ret = cco.ret;
cc84d90f 370 if (ret < 0) {
84d18f06 371 if (cco.err) {
cc84d90f
HR
372 error_propagate(errp, cco.err);
373 } else {
374 error_setg_errno(errp, -ret, "Could not create image");
375 }
376 }
0e7e1989 377
80168bff
LC
378out:
379 g_free(cco.filename);
5b7e1542 380 return ret;
ea2384d3
FB
381}
382
c282e1fd 383int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
384{
385 BlockDriver *drv;
cc84d90f
HR
386 Error *local_err = NULL;
387 int ret;
84a12e66 388
b65a5e12 389 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 390 if (drv == NULL) {
16905d71 391 return -ENOENT;
84a12e66
CH
392 }
393
c282e1fd 394 ret = bdrv_create(drv, filename, opts, &local_err);
84d18f06 395 if (local_err) {
cc84d90f
HR
396 error_propagate(errp, local_err);
397 }
398 return ret;
84a12e66
CH
399}
400
892b7de8
ET
401/**
402 * Try to get @bs's logical and physical block size.
403 * On success, store them in @bsz struct and return 0.
404 * On failure return -errno.
405 * @bs must not be empty.
406 */
407int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
408{
409 BlockDriver *drv = bs->drv;
410
411 if (drv && drv->bdrv_probe_blocksizes) {
412 return drv->bdrv_probe_blocksizes(bs, bsz);
413 }
414
415 return -ENOTSUP;
416}
417
418/**
419 * Try to get @bs's geometry (cyls, heads, sectors).
420 * On success, store them in @geo struct and return 0.
421 * On failure return -errno.
422 * @bs must not be empty.
423 */
424int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
425{
426 BlockDriver *drv = bs->drv;
427
428 if (drv && drv->bdrv_probe_geometry) {
429 return drv->bdrv_probe_geometry(bs, geo);
430 }
431
432 return -ENOTSUP;
433}
434
eba25057
JM
435/*
436 * Create a uniquely-named empty temporary file.
437 * Return 0 upon success, otherwise a negative errno value.
438 */
439int get_tmp_filename(char *filename, int size)
d5249393 440{
eba25057 441#ifdef _WIN32
3b9f94e1 442 char temp_dir[MAX_PATH];
eba25057
JM
443 /* GetTempFileName requires that its output buffer (4th param)
444 have length MAX_PATH or greater. */
445 assert(size >= MAX_PATH);
446 return (GetTempPath(MAX_PATH, temp_dir)
447 && GetTempFileName(temp_dir, "qem", 0, filename)
448 ? 0 : -GetLastError());
d5249393 449#else
67b915a5 450 int fd;
7ccfb2eb 451 const char *tmpdir;
0badc1ee 452 tmpdir = getenv("TMPDIR");
69bef793
AS
453 if (!tmpdir) {
454 tmpdir = "/var/tmp";
455 }
eba25057
JM
456 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
457 return -EOVERFLOW;
458 }
ea2384d3 459 fd = mkstemp(filename);
fe235a06
DH
460 if (fd < 0) {
461 return -errno;
462 }
463 if (close(fd) != 0) {
464 unlink(filename);
eba25057
JM
465 return -errno;
466 }
467 return 0;
d5249393 468#endif
eba25057 469}
fc01f7e7 470
84a12e66
CH
471/*
472 * Detect host devices. By convention, /dev/cdrom[N] is always
473 * recognized as a host CDROM.
474 */
475static BlockDriver *find_hdev_driver(const char *filename)
476{
477 int score_max = 0, score;
478 BlockDriver *drv = NULL, *d;
479
480 QLIST_FOREACH(d, &bdrv_drivers, list) {
481 if (d->bdrv_probe_device) {
482 score = d->bdrv_probe_device(filename);
483 if (score > score_max) {
484 score_max = score;
485 drv = d;
486 }
487 }
488 }
489
490 return drv;
491}
492
98289620 493BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
494 bool allow_protocol_prefix,
495 Error **errp)
83f64091
FB
496{
497 BlockDriver *drv1;
498 char protocol[128];
1cec71e3 499 int len;
83f64091 500 const char *p;
19cb3738 501
66f82cee
KW
502 /* TODO Drivers without bdrv_file_open must be specified explicitly */
503
39508e7a
CH
504 /*
505 * XXX(hch): we really should not let host device detection
506 * override an explicit protocol specification, but moving this
507 * later breaks access to device names with colons in them.
508 * Thanks to the brain-dead persistent naming schemes on udev-
509 * based Linux systems those actually are quite common.
510 */
511 drv1 = find_hdev_driver(filename);
512 if (drv1) {
513 return drv1;
514 }
515
98289620 516 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 517 return &bdrv_file;
84a12e66 518 }
98289620 519
9e0b22f4
SH
520 p = strchr(filename, ':');
521 assert(p != NULL);
1cec71e3
AL
522 len = p - filename;
523 if (len > sizeof(protocol) - 1)
524 len = sizeof(protocol) - 1;
525 memcpy(protocol, filename, len);
526 protocol[len] = '\0';
8a22f02a 527 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
5fafdf24 528 if (drv1->protocol_name &&
8a22f02a 529 !strcmp(drv1->protocol_name, protocol)) {
83f64091 530 return drv1;
8a22f02a 531 }
83f64091 532 }
b65a5e12
HR
533
534 error_setg(errp, "Unknown protocol '%s'", protocol);
83f64091
FB
535 return NULL;
536}
537
c6684249
MA
538/*
539 * Guess image format by probing its contents.
540 * This is not a good idea when your image is raw (CVE-2008-2004), but
541 * we do it anyway for backward compatibility.
542 *
543 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
544 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
545 * but can be smaller if the image file is smaller)
c6684249
MA
546 * @filename is its filename.
547 *
548 * For all block drivers, call the bdrv_probe() method to get its
549 * probing score.
550 * Return the first block driver with the highest probing score.
551 */
38f3ef57
KW
552BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
553 const char *filename)
c6684249
MA
554{
555 int score_max = 0, score;
556 BlockDriver *drv = NULL, *d;
557
558 QLIST_FOREACH(d, &bdrv_drivers, list) {
559 if (d->bdrv_probe) {
560 score = d->bdrv_probe(buf, buf_size, filename);
561 if (score > score_max) {
562 score_max = score;
563 drv = d;
564 }
565 }
566 }
567
568 return drv;
569}
570
f500a6d3 571static int find_image_format(BlockDriverState *bs, const char *filename,
34b5d2c6 572 BlockDriver **pdrv, Error **errp)
f3a5d3f8 573{
c6684249 574 BlockDriver *drv;
7cddd372 575 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 576 int ret = 0;
f8ea0b00 577
08a00559 578 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
b192af8a 579 if (bdrv_is_sg(bs) || !bdrv_is_inserted(bs) || bdrv_getlength(bs) == 0) {
ef810437 580 *pdrv = &bdrv_raw;
c98ac35d 581 return ret;
1a396859 582 }
f8ea0b00 583
83f64091 584 ret = bdrv_pread(bs, 0, buf, sizeof(buf));
83f64091 585 if (ret < 0) {
34b5d2c6
HR
586 error_setg_errno(errp, -ret, "Could not read image for determining its "
587 "format");
c98ac35d
SW
588 *pdrv = NULL;
589 return ret;
83f64091
FB
590 }
591
c6684249 592 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 593 if (!drv) {
34b5d2c6
HR
594 error_setg(errp, "Could not determine image format: No compatible "
595 "driver found");
c98ac35d
SW
596 ret = -ENOENT;
597 }
598 *pdrv = drv;
599 return ret;
ea2384d3
FB
600}
601
51762288
SH
602/**
603 * Set the current 'total_sectors' value
65a9bb25 604 * Return 0 on success, -errno on error.
51762288
SH
605 */
606static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
607{
608 BlockDriver *drv = bs->drv;
609
396759ad 610 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 611 if (bdrv_is_sg(bs))
396759ad
NB
612 return 0;
613
51762288
SH
614 /* query actual device if possible, otherwise just trust the hint */
615 if (drv->bdrv_getlength) {
616 int64_t length = drv->bdrv_getlength(bs);
617 if (length < 0) {
618 return length;
619 }
7e382003 620 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
621 }
622
623 bs->total_sectors = hint;
624 return 0;
625}
626
cddff5ba
KW
627/**
628 * Combines a QDict of new block driver @options with any missing options taken
629 * from @old_options, so that leaving out an option defaults to its old value.
630 */
631static void bdrv_join_options(BlockDriverState *bs, QDict *options,
632 QDict *old_options)
633{
634 if (bs->drv && bs->drv->bdrv_join_options) {
635 bs->drv->bdrv_join_options(options, old_options);
636 } else {
637 qdict_join(options, old_options, false);
638 }
639}
640
9e8f1835
PB
641/**
642 * Set open flags for a given discard mode
643 *
644 * Return 0 on success, -1 if the discard mode was invalid.
645 */
646int bdrv_parse_discard_flags(const char *mode, int *flags)
647{
648 *flags &= ~BDRV_O_UNMAP;
649
650 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
651 /* do nothing */
652 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
653 *flags |= BDRV_O_UNMAP;
654 } else {
655 return -1;
656 }
657
658 return 0;
659}
660
c3993cdc
SH
661/**
662 * Set open flags for a given cache mode
663 *
664 * Return 0 on success, -1 if the cache mode was invalid.
665 */
666int bdrv_parse_cache_flags(const char *mode, int *flags)
667{
668 *flags &= ~BDRV_O_CACHE_MASK;
669
670 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
671 *flags |= BDRV_O_NOCACHE | BDRV_O_CACHE_WB;
92196b2f
SH
672 } else if (!strcmp(mode, "directsync")) {
673 *flags |= BDRV_O_NOCACHE;
c3993cdc
SH
674 } else if (!strcmp(mode, "writeback")) {
675 *flags |= BDRV_O_CACHE_WB;
676 } else if (!strcmp(mode, "unsafe")) {
677 *flags |= BDRV_O_CACHE_WB;
678 *flags |= BDRV_O_NO_FLUSH;
679 } else if (!strcmp(mode, "writethrough")) {
680 /* this is the default */
681 } else {
682 return -1;
683 }
684
685 return 0;
686}
687
b1e6fc08
KW
688/*
689 * Returns the flags that a temporary snapshot should get, based on the
690 * originally requested flags (the originally requested image will have flags
691 * like a backing file)
692 */
693static int bdrv_temp_snapshot_flags(int flags)
694{
695 return (flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
696}
697
0b50cc88 698/*
8e2160e2
KW
699 * Returns the options and flags that bs->file should get if a protocol driver
700 * is expected, based on the given options and flags for the parent BDS
0b50cc88 701 */
8e2160e2
KW
702static void bdrv_inherited_options(int *child_flags, QDict *child_options,
703 int parent_flags, QDict *parent_options)
0b50cc88 704{
8e2160e2
KW
705 int flags = parent_flags;
706
0b50cc88
KW
707 /* Enable protocol handling, disable format probing for bs->file */
708 flags |= BDRV_O_PROTOCOL;
709
91a097e7
KW
710 /* If the cache mode isn't explicitly set, inherit direct and no-flush from
711 * the parent. */
712 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
713 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
714
0b50cc88 715 /* Our block drivers take care to send flushes and respect unmap policy,
91a097e7
KW
716 * so we can default to enable both on lower layers regardless of the
717 * corresponding parent options. */
718 qdict_set_default_str(child_options, BDRV_OPT_CACHE_WB, "on");
719 flags |= BDRV_O_UNMAP;
0b50cc88 720
0b50cc88 721 /* Clear flags that only apply to the top layer */
5669b44d 722 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ);
0b50cc88 723
8e2160e2 724 *child_flags = flags;
0b50cc88
KW
725}
726
f3930ed0 727const BdrvChildRole child_file = {
8e2160e2 728 .inherit_options = bdrv_inherited_options,
f3930ed0
KW
729};
730
731/*
8e2160e2
KW
732 * Returns the options and flags that bs->file should get if the use of formats
733 * (and not only protocols) is permitted for it, based on the given options and
734 * flags for the parent BDS
f3930ed0 735 */
8e2160e2
KW
736static void bdrv_inherited_fmt_options(int *child_flags, QDict *child_options,
737 int parent_flags, QDict *parent_options)
f3930ed0 738{
8e2160e2
KW
739 child_file.inherit_options(child_flags, child_options,
740 parent_flags, parent_options);
741
742 *child_flags &= ~BDRV_O_PROTOCOL;
f3930ed0
KW
743}
744
745const BdrvChildRole child_format = {
8e2160e2 746 .inherit_options = bdrv_inherited_fmt_options,
f3930ed0
KW
747};
748
317fc44e 749/*
8e2160e2
KW
750 * Returns the options and flags that bs->backing should get, based on the
751 * given options and flags for the parent BDS
317fc44e 752 */
8e2160e2
KW
753static void bdrv_backing_options(int *child_flags, QDict *child_options,
754 int parent_flags, QDict *parent_options)
317fc44e 755{
8e2160e2
KW
756 int flags = parent_flags;
757
91a097e7
KW
758 /* The cache mode is inherited unmodified for backing files */
759 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_WB);
760 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
761 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
762
317fc44e
KW
763 /* backing files always opened read-only */
764 flags &= ~(BDRV_O_RDWR | BDRV_O_COPY_ON_READ);
765
766 /* snapshot=on is handled on the top layer */
8bfea15d 767 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e 768
8e2160e2 769 *child_flags = flags;
317fc44e
KW
770}
771
f3930ed0 772static const BdrvChildRole child_backing = {
8e2160e2 773 .inherit_options = bdrv_backing_options,
f3930ed0
KW
774};
775
7b272452
KW
776static int bdrv_open_flags(BlockDriverState *bs, int flags)
777{
778 int open_flags = flags | BDRV_O_CACHE_WB;
779
780 /*
781 * Clear flags that are internal to the block layer before opening the
782 * image.
783 */
20cca275 784 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
785
786 /*
787 * Snapshots should be writable.
788 */
8bfea15d 789 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
790 open_flags |= BDRV_O_RDWR;
791 }
792
793 return open_flags;
794}
795
91a097e7
KW
796static void update_flags_from_options(int *flags, QemuOpts *opts)
797{
798 *flags &= ~BDRV_O_CACHE_MASK;
799
800 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_WB));
801 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_WB, false)) {
802 *flags |= BDRV_O_CACHE_WB;
803 }
804
805 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_NO_FLUSH));
806 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_NO_FLUSH, false)) {
807 *flags |= BDRV_O_NO_FLUSH;
808 }
809
810 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_DIRECT));
811 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_DIRECT, false)) {
812 *flags |= BDRV_O_NOCACHE;
813 }
814}
815
816static void update_options_from_flags(QDict *options, int flags)
817{
818 if (!qdict_haskey(options, BDRV_OPT_CACHE_WB)) {
819 qdict_put(options, BDRV_OPT_CACHE_WB,
820 qbool_from_bool(flags & BDRV_O_CACHE_WB));
821 }
822 if (!qdict_haskey(options, BDRV_OPT_CACHE_DIRECT)) {
823 qdict_put(options, BDRV_OPT_CACHE_DIRECT,
824 qbool_from_bool(flags & BDRV_O_NOCACHE));
825 }
826 if (!qdict_haskey(options, BDRV_OPT_CACHE_NO_FLUSH)) {
827 qdict_put(options, BDRV_OPT_CACHE_NO_FLUSH,
828 qbool_from_bool(flags & BDRV_O_NO_FLUSH));
829 }
830}
831
636ea370
KW
832static void bdrv_assign_node_name(BlockDriverState *bs,
833 const char *node_name,
834 Error **errp)
6913c0c2 835{
15489c76 836 char *gen_node_name = NULL;
6913c0c2 837
15489c76
JC
838 if (!node_name) {
839 node_name = gen_node_name = id_generate(ID_BLOCK);
840 } else if (!id_wellformed(node_name)) {
841 /*
842 * Check for empty string or invalid characters, but not if it is
843 * generated (generated names use characters not available to the user)
844 */
9aebf3b8 845 error_setg(errp, "Invalid node name");
636ea370 846 return;
6913c0c2
BC
847 }
848
0c5e94ee 849 /* takes care of avoiding namespaces collisions */
7f06d47e 850 if (blk_by_name(node_name)) {
0c5e94ee
BC
851 error_setg(errp, "node-name=%s is conflicting with a device id",
852 node_name);
15489c76 853 goto out;
0c5e94ee
BC
854 }
855
6913c0c2
BC
856 /* takes care of avoiding duplicates node names */
857 if (bdrv_find_node(node_name)) {
858 error_setg(errp, "Duplicate node name");
15489c76 859 goto out;
6913c0c2
BC
860 }
861
862 /* copy node name into the bs and insert it into the graph list */
863 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
864 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
15489c76
JC
865out:
866 g_free(gen_node_name);
6913c0c2
BC
867}
868
18edf289
KW
869static QemuOptsList bdrv_runtime_opts = {
870 .name = "bdrv_common",
871 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
872 .desc = {
873 {
874 .name = "node-name",
875 .type = QEMU_OPT_STRING,
876 .help = "Node name of the block device node",
877 },
62392ebb
KW
878 {
879 .name = "driver",
880 .type = QEMU_OPT_STRING,
881 .help = "Block driver to use for the node",
882 },
91a097e7
KW
883 {
884 .name = BDRV_OPT_CACHE_WB,
885 .type = QEMU_OPT_BOOL,
886 .help = "Enable writeback mode",
887 },
888 {
889 .name = BDRV_OPT_CACHE_DIRECT,
890 .type = QEMU_OPT_BOOL,
891 .help = "Bypass software writeback cache on the host",
892 },
893 {
894 .name = BDRV_OPT_CACHE_NO_FLUSH,
895 .type = QEMU_OPT_BOOL,
896 .help = "Ignore flush requests",
897 },
18edf289
KW
898 { /* end of list */ }
899 },
900};
901
57915332
KW
902/*
903 * Common part for opening disk images and files
b6ad491a
KW
904 *
905 * Removes all processed options from *options.
57915332 906 */
9a4f4c31 907static int bdrv_open_common(BlockDriverState *bs, BdrvChild *file,
62392ebb 908 QDict *options, int flags, Error **errp)
57915332
KW
909{
910 int ret, open_flags;
035fccdf 911 const char *filename;
62392ebb 912 const char *driver_name = NULL;
6913c0c2 913 const char *node_name = NULL;
18edf289 914 QemuOpts *opts;
62392ebb 915 BlockDriver *drv;
34b5d2c6 916 Error *local_err = NULL;
57915332 917
6405875c 918 assert(bs->file == NULL);
707ff828 919 assert(options != NULL && bs->options != options);
57915332 920
62392ebb
KW
921 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
922 qemu_opts_absorb_qdict(opts, options, &local_err);
923 if (local_err) {
924 error_propagate(errp, local_err);
925 ret = -EINVAL;
926 goto fail_opts;
927 }
928
929 driver_name = qemu_opt_get(opts, "driver");
930 drv = bdrv_find_format(driver_name);
931 assert(drv != NULL);
932
45673671 933 if (file != NULL) {
9a4f4c31 934 filename = file->bs->filename;
45673671
KW
935 } else {
936 filename = qdict_get_try_str(options, "filename");
937 }
938
765003db
KW
939 if (drv->bdrv_needs_filename && !filename) {
940 error_setg(errp, "The '%s' block driver requires a file name",
941 drv->format_name);
18edf289
KW
942 ret = -EINVAL;
943 goto fail_opts;
6913c0c2 944 }
6913c0c2 945
62392ebb
KW
946 trace_bdrv_open_common(bs, filename ?: "", flags, drv->format_name);
947
18edf289 948 node_name = qemu_opt_get(opts, "node-name");
636ea370 949 bdrv_assign_node_name(bs, node_name, &local_err);
0fb6395c 950 if (local_err) {
636ea370 951 error_propagate(errp, local_err);
18edf289
KW
952 ret = -EINVAL;
953 goto fail_opts;
5d186eb0
KW
954 }
955
c25f53b0 956 bs->request_alignment = 512;
0d51b4de 957 bs->zero_beyond_eof = true;
b64ec4e4
FZ
958 open_flags = bdrv_open_flags(bs, flags);
959 bs->read_only = !(open_flags & BDRV_O_RDWR);
960
961 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
962 error_setg(errp,
963 !bs->read_only && bdrv_is_whitelisted(drv, true)
964 ? "Driver '%s' can only be used for read-only devices"
965 : "Driver '%s' is not whitelisted",
966 drv->format_name);
18edf289
KW
967 ret = -ENOTSUP;
968 goto fail_opts;
b64ec4e4 969 }
57915332 970
53fec9d3 971 assert(bs->copy_on_read == 0); /* bdrv_new() and bdrv_close() make it so */
0ebd24e0
KW
972 if (flags & BDRV_O_COPY_ON_READ) {
973 if (!bs->read_only) {
974 bdrv_enable_copy_on_read(bs);
975 } else {
976 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
977 ret = -EINVAL;
978 goto fail_opts;
0ebd24e0 979 }
53fec9d3
SH
980 }
981
c2ad1b0c
KW
982 if (filename != NULL) {
983 pstrcpy(bs->filename, sizeof(bs->filename), filename);
984 } else {
985 bs->filename[0] = '\0';
986 }
91af7014 987 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 988
57915332 989 bs->drv = drv;
7267c094 990 bs->opaque = g_malloc0(drv->instance_size);
57915332 991
91a097e7
KW
992 /* Apply cache mode options */
993 update_flags_from_options(&bs->open_flags, opts);
994 bdrv_set_enable_write_cache(bs, bs->open_flags & BDRV_O_CACHE_WB);
e7c63796 995
66f82cee
KW
996 /* Open the image, either directly or using a protocol */
997 if (drv->bdrv_file_open) {
5d186eb0 998 assert(file == NULL);
030be321 999 assert(!drv->bdrv_needs_filename || filename != NULL);
34b5d2c6 1000 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
f500a6d3 1001 } else {
2af5ef70 1002 if (file == NULL) {
34b5d2c6
HR
1003 error_setg(errp, "Can't use '%s' as a block driver for the "
1004 "protocol level", drv->format_name);
2af5ef70
KW
1005 ret = -EINVAL;
1006 goto free_and_fail;
1007 }
f500a6d3 1008 bs->file = file;
34b5d2c6 1009 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
66f82cee
KW
1010 }
1011
57915332 1012 if (ret < 0) {
84d18f06 1013 if (local_err) {
34b5d2c6 1014 error_propagate(errp, local_err);
2fa9aa59
DH
1015 } else if (bs->filename[0]) {
1016 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
34b5d2c6
HR
1017 } else {
1018 error_setg_errno(errp, -ret, "Could not open image");
1019 }
57915332
KW
1020 goto free_and_fail;
1021 }
1022
a1f688f4
MA
1023 if (bs->encrypted) {
1024 error_report("Encrypted images are deprecated");
1025 error_printf("Support for them will be removed in a future release.\n"
1026 "You can use 'qemu-img convert' to convert your image"
1027 " to an unencrypted one.\n");
1028 }
1029
51762288
SH
1030 ret = refresh_total_sectors(bs, bs->total_sectors);
1031 if (ret < 0) {
34b5d2c6 1032 error_setg_errno(errp, -ret, "Could not refresh total sector count");
51762288 1033 goto free_and_fail;
57915332 1034 }
51762288 1035
3baca891
KW
1036 bdrv_refresh_limits(bs, &local_err);
1037 if (local_err) {
1038 error_propagate(errp, local_err);
1039 ret = -EINVAL;
1040 goto free_and_fail;
1041 }
1042
c25f53b0 1043 assert(bdrv_opt_mem_align(bs) != 0);
4196d2f0 1044 assert(bdrv_min_mem_align(bs) != 0);
b192af8a 1045 assert((bs->request_alignment != 0) || bdrv_is_sg(bs));
18edf289
KW
1046
1047 qemu_opts_del(opts);
57915332
KW
1048 return 0;
1049
1050free_and_fail:
f500a6d3 1051 bs->file = NULL;
7267c094 1052 g_free(bs->opaque);
57915332
KW
1053 bs->opaque = NULL;
1054 bs->drv = NULL;
18edf289
KW
1055fail_opts:
1056 qemu_opts_del(opts);
57915332
KW
1057 return ret;
1058}
1059
5e5c4f63
KW
1060static QDict *parse_json_filename(const char *filename, Error **errp)
1061{
1062 QObject *options_obj;
1063 QDict *options;
1064 int ret;
1065
1066 ret = strstart(filename, "json:", &filename);
1067 assert(ret);
1068
1069 options_obj = qobject_from_json(filename);
1070 if (!options_obj) {
1071 error_setg(errp, "Could not parse the JSON options");
1072 return NULL;
1073 }
1074
1075 if (qobject_type(options_obj) != QTYPE_QDICT) {
1076 qobject_decref(options_obj);
1077 error_setg(errp, "Invalid JSON object given");
1078 return NULL;
1079 }
1080
1081 options = qobject_to_qdict(options_obj);
1082 qdict_flatten(options);
1083
1084 return options;
1085}
1086
de3b53f0
KW
1087static void parse_json_protocol(QDict *options, const char **pfilename,
1088 Error **errp)
1089{
1090 QDict *json_options;
1091 Error *local_err = NULL;
1092
1093 /* Parse json: pseudo-protocol */
1094 if (!*pfilename || !g_str_has_prefix(*pfilename, "json:")) {
1095 return;
1096 }
1097
1098 json_options = parse_json_filename(*pfilename, &local_err);
1099 if (local_err) {
1100 error_propagate(errp, local_err);
1101 return;
1102 }
1103
1104 /* Options given in the filename have lower priority than options
1105 * specified directly */
1106 qdict_join(options, json_options, false);
1107 QDECREF(json_options);
1108 *pfilename = NULL;
1109}
1110
b6ce07aa 1111/*
f54120ff
KW
1112 * Fills in default options for opening images and converts the legacy
1113 * filename/flags pair to option QDict entries.
53a29513
HR
1114 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
1115 * block driver has been specified explicitly.
b6ce07aa 1116 */
de3b53f0 1117static int bdrv_fill_options(QDict **options, const char *filename,
053e1578 1118 int *flags, Error **errp)
ea2384d3 1119{
c2ad1b0c 1120 const char *drvname;
53a29513 1121 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 1122 bool parse_filename = false;
053e1578 1123 BlockDriver *drv = NULL;
34b5d2c6 1124 Error *local_err = NULL;
83f64091 1125
53a29513 1126 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1127 if (drvname) {
1128 drv = bdrv_find_format(drvname);
1129 if (!drv) {
1130 error_setg(errp, "Unknown driver '%s'", drvname);
1131 return -ENOENT;
1132 }
1133 /* If the user has explicitly specified the driver, this choice should
1134 * override the BDRV_O_PROTOCOL flag */
1135 protocol = drv->bdrv_file_open;
53a29513
HR
1136 }
1137
1138 if (protocol) {
1139 *flags |= BDRV_O_PROTOCOL;
1140 } else {
1141 *flags &= ~BDRV_O_PROTOCOL;
1142 }
1143
91a097e7
KW
1144 /* Translate cache options from flags into options */
1145 update_options_from_flags(*options, *flags);
1146
035fccdf 1147 /* Fetch the file name from the options QDict if necessary */
17b005f1 1148 if (protocol && filename) {
f54120ff
KW
1149 if (!qdict_haskey(*options, "filename")) {
1150 qdict_put(*options, "filename", qstring_from_str(filename));
1151 parse_filename = true;
1152 } else {
1153 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1154 "the same time");
1155 return -EINVAL;
1156 }
035fccdf
KW
1157 }
1158
c2ad1b0c 1159 /* Find the right block driver */
f54120ff 1160 filename = qdict_get_try_str(*options, "filename");
f54120ff 1161
053e1578
HR
1162 if (!drvname && protocol) {
1163 if (filename) {
1164 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1165 if (!drv) {
053e1578 1166 return -EINVAL;
17b005f1 1167 }
053e1578
HR
1168
1169 drvname = drv->format_name;
1170 qdict_put(*options, "driver", qstring_from_str(drvname));
1171 } else {
1172 error_setg(errp, "Must specify either driver or file");
1173 return -EINVAL;
98289620 1174 }
c2ad1b0c
KW
1175 }
1176
17b005f1 1177 assert(drv || !protocol);
c2ad1b0c 1178
f54120ff 1179 /* Driver-specific filename parsing */
17b005f1 1180 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1181 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1182 if (local_err) {
34b5d2c6 1183 error_propagate(errp, local_err);
f54120ff 1184 return -EINVAL;
6963a30d 1185 }
cd5d031e
HR
1186
1187 if (!drv->bdrv_needs_filename) {
1188 qdict_del(*options, "filename");
cd5d031e 1189 }
6963a30d
KW
1190 }
1191
d44f928a
HR
1192 if (runstate_check(RUN_STATE_INMIGRATE)) {
1193 *flags |= BDRV_O_INCOMING;
1194 }
1195
f54120ff
KW
1196 return 0;
1197}
1198
b4b059f6
KW
1199static BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
1200 BlockDriverState *child_bs,
260fecf1 1201 const char *child_name,
b4b059f6 1202 const BdrvChildRole *child_role)
df581792
KW
1203{
1204 BdrvChild *child = g_new(BdrvChild, 1);
1205 *child = (BdrvChild) {
1206 .bs = child_bs,
260fecf1 1207 .name = g_strdup(child_name),
df581792
KW
1208 .role = child_role,
1209 };
1210
1211 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
d42a8a93 1212 QLIST_INSERT_HEAD(&child_bs->parents, child, next_parent);
b4b059f6
KW
1213
1214 return child;
df581792
KW
1215}
1216
3f09bfbc 1217static void bdrv_detach_child(BdrvChild *child)
33a60407
KW
1218{
1219 QLIST_REMOVE(child, next);
d42a8a93 1220 QLIST_REMOVE(child, next_parent);
260fecf1 1221 g_free(child->name);
33a60407
KW
1222 g_free(child);
1223}
1224
1225void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
1226{
779020cb
KW
1227 BlockDriverState *child_bs;
1228
1229 if (child == NULL) {
1230 return;
1231 }
33a60407
KW
1232
1233 if (child->bs->inherits_from == parent) {
1234 child->bs->inherits_from = NULL;
1235 }
1236
779020cb 1237 child_bs = child->bs;
33a60407
KW
1238 bdrv_detach_child(child);
1239 bdrv_unref(child_bs);
1240}
1241
5db15a57
KW
1242/*
1243 * Sets the backing file link of a BDS. A new reference is created; callers
1244 * which don't need their own reference any more must call bdrv_unref().
1245 */
8d24cce1
FZ
1246void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd)
1247{
5db15a57
KW
1248 if (backing_hd) {
1249 bdrv_ref(backing_hd);
1250 }
8d24cce1 1251
760e0063 1252 if (bs->backing) {
826b6ca0 1253 assert(bs->backing_blocker);
760e0063 1254 bdrv_op_unblock_all(bs->backing->bs, bs->backing_blocker);
5db15a57 1255 bdrv_unref_child(bs, bs->backing);
826b6ca0
FZ
1256 } else if (backing_hd) {
1257 error_setg(&bs->backing_blocker,
81e5f78a
AG
1258 "node is used as backing hd of '%s'",
1259 bdrv_get_device_or_node_name(bs));
826b6ca0
FZ
1260 }
1261
8d24cce1 1262 if (!backing_hd) {
826b6ca0
FZ
1263 error_free(bs->backing_blocker);
1264 bs->backing_blocker = NULL;
760e0063 1265 bs->backing = NULL;
8d24cce1
FZ
1266 goto out;
1267 }
260fecf1 1268 bs->backing = bdrv_attach_child(bs, backing_hd, "backing", &child_backing);
8d24cce1
FZ
1269 bs->open_flags &= ~BDRV_O_NO_BACKING;
1270 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_hd->filename);
1271 pstrcpy(bs->backing_format, sizeof(bs->backing_format),
1272 backing_hd->drv ? backing_hd->drv->format_name : "");
826b6ca0 1273
760e0063 1274 bdrv_op_block_all(backing_hd, bs->backing_blocker);
826b6ca0 1275 /* Otherwise we won't be able to commit due to check in bdrv_commit */
760e0063 1276 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
826b6ca0 1277 bs->backing_blocker);
8d24cce1 1278out:
3baca891 1279 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
1280}
1281
31ca6d07
KW
1282/*
1283 * Opens the backing file for a BlockDriverState if not yet open
1284 *
d9b7b057
KW
1285 * bdref_key specifies the key for the image's BlockdevRef in the options QDict.
1286 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1287 * itself, all options starting with "${bdref_key}." are considered part of the
1288 * BlockdevRef.
1289 *
1290 * TODO Can this be unified with bdrv_open_image()?
31ca6d07 1291 */
d9b7b057
KW
1292int bdrv_open_backing_file(BlockDriverState *bs, QDict *parent_options,
1293 const char *bdref_key, Error **errp)
9156df12 1294{
1ba4b6a5 1295 char *backing_filename = g_malloc0(PATH_MAX);
d9b7b057
KW
1296 char *bdref_key_dot;
1297 const char *reference = NULL;
317fc44e 1298 int ret = 0;
8d24cce1 1299 BlockDriverState *backing_hd;
d9b7b057
KW
1300 QDict *options;
1301 QDict *tmp_parent_options = NULL;
34b5d2c6 1302 Error *local_err = NULL;
9156df12 1303
760e0063 1304 if (bs->backing != NULL) {
1ba4b6a5 1305 goto free_exit;
9156df12
PB
1306 }
1307
31ca6d07 1308 /* NULL means an empty set of options */
d9b7b057
KW
1309 if (parent_options == NULL) {
1310 tmp_parent_options = qdict_new();
1311 parent_options = tmp_parent_options;
31ca6d07
KW
1312 }
1313
9156df12 1314 bs->open_flags &= ~BDRV_O_NO_BACKING;
d9b7b057
KW
1315
1316 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1317 qdict_extract_subqdict(parent_options, &options, bdref_key_dot);
1318 g_free(bdref_key_dot);
1319
1320 reference = qdict_get_try_str(parent_options, bdref_key);
1321 if (reference || qdict_haskey(options, "file.filename")) {
1cb6f506
KW
1322 backing_filename[0] = '\0';
1323 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 1324 QDECREF(options);
1ba4b6a5 1325 goto free_exit;
dbecebdd 1326 } else {
9f07429e
HR
1327 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
1328 &local_err);
1329 if (local_err) {
1330 ret = -EINVAL;
1331 error_propagate(errp, local_err);
1332 QDECREF(options);
1333 goto free_exit;
1334 }
9156df12
PB
1335 }
1336
8ee79e70
KW
1337 if (!bs->drv || !bs->drv->supports_backing) {
1338 ret = -EINVAL;
1339 error_setg(errp, "Driver doesn't support backing files");
1340 QDECREF(options);
1341 goto free_exit;
1342 }
1343
c5f6e493
KW
1344 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
1345 qdict_put(options, "driver", qstring_from_str(bs->backing_format));
9156df12
PB
1346 }
1347
d9b7b057 1348 backing_hd = NULL;
f3930ed0
KW
1349 ret = bdrv_open_inherit(&backing_hd,
1350 *backing_filename ? backing_filename : NULL,
d9b7b057
KW
1351 reference, options, 0, bs, &child_backing,
1352 &local_err);
9156df12 1353 if (ret < 0) {
9156df12 1354 bs->open_flags |= BDRV_O_NO_BACKING;
b04b6b6e
FZ
1355 error_setg(errp, "Could not open backing file: %s",
1356 error_get_pretty(local_err));
1357 error_free(local_err);
1ba4b6a5 1358 goto free_exit;
9156df12 1359 }
df581792 1360
5db15a57
KW
1361 /* Hook up the backing file link; drop our reference, bs owns the
1362 * backing_hd reference now */
8d24cce1 1363 bdrv_set_backing_hd(bs, backing_hd);
5db15a57 1364 bdrv_unref(backing_hd);
d80ac658 1365
d9b7b057
KW
1366 qdict_del(parent_options, bdref_key);
1367
1ba4b6a5
BC
1368free_exit:
1369 g_free(backing_filename);
d9b7b057 1370 QDECREF(tmp_parent_options);
1ba4b6a5 1371 return ret;
9156df12
PB
1372}
1373
da557aac
HR
1374/*
1375 * Opens a disk image whose options are given as BlockdevRef in another block
1376 * device's options.
1377 *
da557aac 1378 * If allow_none is true, no image will be opened if filename is false and no
b4b059f6 1379 * BlockdevRef is given. NULL will be returned, but errp remains unset.
da557aac
HR
1380 *
1381 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
1382 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1383 * itself, all options starting with "${bdref_key}." are considered part of the
1384 * BlockdevRef.
1385 *
1386 * The BlockdevRef will be removed from the options QDict.
1387 */
b4b059f6
KW
1388BdrvChild *bdrv_open_child(const char *filename,
1389 QDict *options, const char *bdref_key,
1390 BlockDriverState* parent,
1391 const BdrvChildRole *child_role,
1392 bool allow_none, Error **errp)
da557aac 1393{
b4b059f6
KW
1394 BdrvChild *c = NULL;
1395 BlockDriverState *bs;
da557aac
HR
1396 QDict *image_options;
1397 int ret;
1398 char *bdref_key_dot;
1399 const char *reference;
1400
df581792 1401 assert(child_role != NULL);
f67503e5 1402
da557aac
HR
1403 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1404 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
1405 g_free(bdref_key_dot);
1406
1407 reference = qdict_get_try_str(options, bdref_key);
1408 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 1409 if (!allow_none) {
da557aac
HR
1410 error_setg(errp, "A block device must be specified for \"%s\"",
1411 bdref_key);
da557aac 1412 }
b20e61e0 1413 QDECREF(image_options);
da557aac
HR
1414 goto done;
1415 }
1416
b4b059f6
KW
1417 bs = NULL;
1418 ret = bdrv_open_inherit(&bs, filename, reference, image_options, 0,
ce343771 1419 parent, child_role, errp);
df581792
KW
1420 if (ret < 0) {
1421 goto done;
1422 }
1423
260fecf1 1424 c = bdrv_attach_child(parent, bs, bdref_key, child_role);
da557aac
HR
1425
1426done:
1427 qdict_del(options, bdref_key);
b4b059f6
KW
1428 return c;
1429}
1430
6b8aeca5 1431int bdrv_append_temp_snapshot(BlockDriverState *bs, int flags, Error **errp)
b998875d
KW
1432{
1433 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 1434 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 1435 int64_t total_size;
83d0521a 1436 QemuOpts *opts = NULL;
b998875d
KW
1437 QDict *snapshot_options;
1438 BlockDriverState *bs_snapshot;
c2e0dbbf 1439 Error *local_err = NULL;
b998875d
KW
1440 int ret;
1441
1442 /* if snapshot, we create a temporary backing file and open it
1443 instead of opening 'filename' directly */
1444
1445 /* Get the required size from the image */
f187743a
KW
1446 total_size = bdrv_getlength(bs);
1447 if (total_size < 0) {
6b8aeca5 1448 ret = total_size;
f187743a 1449 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 1450 goto out;
f187743a 1451 }
b998875d
KW
1452
1453 /* Create the temporary image */
1ba4b6a5 1454 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
1455 if (ret < 0) {
1456 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 1457 goto out;
b998875d
KW
1458 }
1459
ef810437 1460 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 1461 &error_abort);
39101f25 1462 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
ef810437 1463 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, &local_err);
83d0521a 1464 qemu_opts_del(opts);
b998875d 1465 if (ret < 0) {
cd5c2dac
MA
1466 error_setg(errp, "Could not create temporary overlay '%s': %s",
1467 tmp_filename, error_get_pretty(local_err));
b998875d 1468 error_free(local_err);
1ba4b6a5 1469 goto out;
b998875d
KW
1470 }
1471
1472 /* Prepare a new options QDict for the temporary file */
1473 snapshot_options = qdict_new();
1474 qdict_put(snapshot_options, "file.driver",
1475 qstring_from_str("file"));
1476 qdict_put(snapshot_options, "file.filename",
1477 qstring_from_str(tmp_filename));
e6641719
HR
1478 qdict_put(snapshot_options, "driver",
1479 qstring_from_str("qcow2"));
b998875d 1480
e4e9986b 1481 bs_snapshot = bdrv_new();
b998875d
KW
1482
1483 ret = bdrv_open(&bs_snapshot, NULL, NULL, snapshot_options,
6ebf9aa2 1484 flags, &local_err);
b998875d
KW
1485 if (ret < 0) {
1486 error_propagate(errp, local_err);
1ba4b6a5 1487 goto out;
b998875d
KW
1488 }
1489
1490 bdrv_append(bs_snapshot, bs);
1ba4b6a5
BC
1491
1492out:
1493 g_free(tmp_filename);
6b8aeca5 1494 return ret;
b998875d
KW
1495}
1496
b6ce07aa
KW
1497/*
1498 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
1499 *
1500 * options is a QDict of options to pass to the block drivers, or NULL for an
1501 * empty set of options. The reference to the QDict belongs to the block layer
1502 * after the call (even on failure), so if the caller intends to reuse the
1503 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
1504 *
1505 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
1506 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
1507 *
1508 * The reference parameter may be used to specify an existing block device which
1509 * should be opened. If specified, neither options nor a filename may be given,
1510 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 1511 */
f3930ed0
KW
1512static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
1513 const char *reference, QDict *options, int flags,
1514 BlockDriverState *parent,
ce343771 1515 const BdrvChildRole *child_role, Error **errp)
ea2384d3 1516{
b6ce07aa 1517 int ret;
9a4f4c31
KW
1518 BdrvChild *file = NULL;
1519 BlockDriverState *bs;
ce343771 1520 BlockDriver *drv = NULL;
74fe54f2 1521 const char *drvname;
3e8c2e57 1522 const char *backing;
34b5d2c6 1523 Error *local_err = NULL;
b1e6fc08 1524 int snapshot_flags = 0;
712e7874 1525
f67503e5 1526 assert(pbs);
f3930ed0
KW
1527 assert(!child_role || !flags);
1528 assert(!child_role == !parent);
f67503e5 1529
ddf5636d
HR
1530 if (reference) {
1531 bool options_non_empty = options ? qdict_size(options) : false;
1532 QDECREF(options);
1533
1534 if (*pbs) {
1535 error_setg(errp, "Cannot reuse an existing BDS when referencing "
1536 "another block device");
1537 return -EINVAL;
1538 }
1539
1540 if (filename || options_non_empty) {
1541 error_setg(errp, "Cannot reference an existing block device with "
1542 "additional options or a new filename");
1543 return -EINVAL;
1544 }
1545
1546 bs = bdrv_lookup_bs(reference, reference, errp);
1547 if (!bs) {
1548 return -ENODEV;
1549 }
1550 bdrv_ref(bs);
1551 *pbs = bs;
1552 return 0;
1553 }
1554
f67503e5
HR
1555 if (*pbs) {
1556 bs = *pbs;
1557 } else {
e4e9986b 1558 bs = bdrv_new();
f67503e5
HR
1559 }
1560
de9c0cec
KW
1561 /* NULL means an empty set of options */
1562 if (options == NULL) {
1563 options = qdict_new();
1564 }
1565
145f598e 1566 /* json: syntax counts as explicit options, as if in the QDict */
de3b53f0
KW
1567 parse_json_protocol(options, &filename, &local_err);
1568 if (local_err) {
1569 ret = -EINVAL;
1570 goto fail;
1571 }
1572
145f598e
KW
1573 bs->explicit_options = qdict_clone_shallow(options);
1574
f3930ed0 1575 if (child_role) {
bddcec37 1576 bs->inherits_from = parent;
8e2160e2
KW
1577 child_role->inherit_options(&flags, options,
1578 parent->open_flags, parent->options);
f3930ed0
KW
1579 }
1580
de3b53f0 1581 ret = bdrv_fill_options(&options, filename, &flags, &local_err);
462f5bcf
KW
1582 if (local_err) {
1583 goto fail;
1584 }
1585
62392ebb
KW
1586 bs->open_flags = flags;
1587 bs->options = options;
1588 options = qdict_clone_shallow(options);
1589
76c591b0 1590 /* Find the right image format driver */
76c591b0
KW
1591 drvname = qdict_get_try_str(options, "driver");
1592 if (drvname) {
1593 drv = bdrv_find_format(drvname);
76c591b0
KW
1594 if (!drv) {
1595 error_setg(errp, "Unknown driver: '%s'", drvname);
1596 ret = -EINVAL;
1597 goto fail;
1598 }
1599 }
1600
1601 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 1602
3e8c2e57
AG
1603 backing = qdict_get_try_str(options, "backing");
1604 if (backing && *backing == '\0') {
1605 flags |= BDRV_O_NO_BACKING;
1606 qdict_del(options, "backing");
1607 }
1608
f500a6d3 1609 /* Open image file without format layer */
f4788adc
KW
1610 if ((flags & BDRV_O_PROTOCOL) == 0) {
1611 if (flags & BDRV_O_RDWR) {
1612 flags |= BDRV_O_ALLOW_RDWR;
1613 }
1614 if (flags & BDRV_O_SNAPSHOT) {
1615 snapshot_flags = bdrv_temp_snapshot_flags(flags);
8e2160e2 1616 bdrv_backing_options(&flags, options, flags, options);
f4788adc 1617 }
f500a6d3 1618
f3930ed0 1619 bs->open_flags = flags;
1fdd6933 1620
9a4f4c31
KW
1621 file = bdrv_open_child(filename, options, "file", bs,
1622 &child_file, true, &local_err);
1fdd6933
KW
1623 if (local_err) {
1624 ret = -EINVAL;
f4788adc
KW
1625 goto fail;
1626 }
f500a6d3
KW
1627 }
1628
76c591b0 1629 /* Image format probing */
38f3ef57 1630 bs->probed = !drv;
76c591b0 1631 if (!drv && file) {
9a4f4c31 1632 ret = find_image_format(file->bs, filename, &drv, &local_err);
17b005f1 1633 if (ret < 0) {
8bfea15d 1634 goto fail;
2a05cbe4 1635 }
62392ebb
KW
1636 /*
1637 * This option update would logically belong in bdrv_fill_options(),
1638 * but we first need to open bs->file for the probing to work, while
1639 * opening bs->file already requires the (mostly) final set of options
1640 * so that cache mode etc. can be inherited.
1641 *
1642 * Adding the driver later is somewhat ugly, but it's not an option
1643 * that would ever be inherited, so it's correct. We just need to make
1644 * sure to update both bs->options (which has the full effective
1645 * options for bs) and options (which has file.* already removed).
1646 */
1647 qdict_put(bs->options, "driver", qstring_from_str(drv->format_name));
1648 qdict_put(options, "driver", qstring_from_str(drv->format_name));
76c591b0 1649 } else if (!drv) {
17b005f1
KW
1650 error_setg(errp, "Must specify either driver or file");
1651 ret = -EINVAL;
8bfea15d 1652 goto fail;
ea2384d3 1653 }
b6ce07aa 1654
53a29513
HR
1655 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
1656 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
1657 /* file must be NULL if a protocol BDS is about to be created
1658 * (the inverse results in an error message from bdrv_open_common()) */
1659 assert(!(flags & BDRV_O_PROTOCOL) || !file);
1660
b6ce07aa 1661 /* Open the image */
62392ebb 1662 ret = bdrv_open_common(bs, file, options, flags, &local_err);
b6ce07aa 1663 if (ret < 0) {
8bfea15d 1664 goto fail;
6987307c
CH
1665 }
1666
2a05cbe4 1667 if (file && (bs->file != file)) {
9a4f4c31 1668 bdrv_unref_child(bs, file);
f500a6d3
KW
1669 file = NULL;
1670 }
1671
b6ce07aa 1672 /* If there is a backing file, use it */
9156df12 1673 if ((flags & BDRV_O_NO_BACKING) == 0) {
d9b7b057 1674 ret = bdrv_open_backing_file(bs, options, "backing", &local_err);
b6ce07aa 1675 if (ret < 0) {
b6ad491a 1676 goto close_and_fail;
b6ce07aa 1677 }
b6ce07aa
KW
1678 }
1679
91af7014
HR
1680 bdrv_refresh_filename(bs);
1681
b6ad491a 1682 /* Check if any unknown options were used */
5acd9d81 1683 if (options && (qdict_size(options) != 0)) {
b6ad491a 1684 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
1685 if (flags & BDRV_O_PROTOCOL) {
1686 error_setg(errp, "Block protocol '%s' doesn't support the option "
1687 "'%s'", drv->format_name, entry->key);
1688 } else {
1689 error_setg(errp, "Block format '%s' used by device '%s' doesn't "
1690 "support the option '%s'", drv->format_name,
bfb197e0 1691 bdrv_get_device_name(bs), entry->key);
5acd9d81 1692 }
b6ad491a
KW
1693
1694 ret = -EINVAL;
1695 goto close_and_fail;
1696 }
b6ad491a 1697
b6ce07aa 1698 if (!bdrv_key_required(bs)) {
a7f53e26
MA
1699 if (bs->blk) {
1700 blk_dev_change_media_cb(bs->blk, true);
1701 }
c3adb58f
MA
1702 } else if (!runstate_check(RUN_STATE_PRELAUNCH)
1703 && !runstate_check(RUN_STATE_INMIGRATE)
1704 && !runstate_check(RUN_STATE_PAUSED)) { /* HACK */
1705 error_setg(errp,
1706 "Guest must be stopped for opening of encrypted image");
1707 ret = -EBUSY;
1708 goto close_and_fail;
b6ce07aa
KW
1709 }
1710
c3adb58f 1711 QDECREF(options);
f67503e5 1712 *pbs = bs;
dd62f1ca
KW
1713
1714 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
1715 * temporary snapshot afterwards. */
1716 if (snapshot_flags) {
1717 ret = bdrv_append_temp_snapshot(bs, snapshot_flags, &local_err);
1718 if (local_err) {
1719 goto close_and_fail;
1720 }
1721 }
1722
b6ce07aa
KW
1723 return 0;
1724
8bfea15d 1725fail:
f500a6d3 1726 if (file != NULL) {
9a4f4c31 1727 bdrv_unref_child(bs, file);
f500a6d3 1728 }
145f598e 1729 QDECREF(bs->explicit_options);
de9c0cec 1730 QDECREF(bs->options);
b6ad491a 1731 QDECREF(options);
de9c0cec 1732 bs->options = NULL;
f67503e5
HR
1733 if (!*pbs) {
1734 /* If *pbs is NULL, a new BDS has been created in this function and
1735 needs to be freed now. Otherwise, it does not need to be closed,
1736 since it has not really been opened yet. */
1737 bdrv_unref(bs);
1738 }
84d18f06 1739 if (local_err) {
34b5d2c6
HR
1740 error_propagate(errp, local_err);
1741 }
b6ad491a 1742 return ret;
de9c0cec 1743
b6ad491a 1744close_and_fail:
f67503e5
HR
1745 /* See fail path, but now the BDS has to be always closed */
1746 if (*pbs) {
1747 bdrv_close(bs);
1748 } else {
1749 bdrv_unref(bs);
1750 }
b6ad491a 1751 QDECREF(options);
84d18f06 1752 if (local_err) {
34b5d2c6
HR
1753 error_propagate(errp, local_err);
1754 }
b6ce07aa
KW
1755 return ret;
1756}
1757
f3930ed0 1758int bdrv_open(BlockDriverState **pbs, const char *filename,
6ebf9aa2 1759 const char *reference, QDict *options, int flags, Error **errp)
f3930ed0
KW
1760{
1761 return bdrv_open_inherit(pbs, filename, reference, options, flags, NULL,
ce343771 1762 NULL, errp);
f3930ed0
KW
1763}
1764
e971aa12
JC
1765typedef struct BlockReopenQueueEntry {
1766 bool prepared;
1767 BDRVReopenState state;
1768 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
1769} BlockReopenQueueEntry;
1770
1771/*
1772 * Adds a BlockDriverState to a simple queue for an atomic, transactional
1773 * reopen of multiple devices.
1774 *
1775 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
1776 * already performed, or alternatively may be NULL a new BlockReopenQueue will
1777 * be created and initialized. This newly created BlockReopenQueue should be
1778 * passed back in for subsequent calls that are intended to be of the same
1779 * atomic 'set'.
1780 *
1781 * bs is the BlockDriverState to add to the reopen queue.
1782 *
4d2cb092
KW
1783 * options contains the changed options for the associated bs
1784 * (the BlockReopenQueue takes ownership)
1785 *
e971aa12
JC
1786 * flags contains the open flags for the associated bs
1787 *
1788 * returns a pointer to bs_queue, which is either the newly allocated
1789 * bs_queue, or the existing bs_queue being used.
1790 *
1791 */
28518102
KW
1792static BlockReopenQueue *bdrv_reopen_queue_child(BlockReopenQueue *bs_queue,
1793 BlockDriverState *bs,
1794 QDict *options,
1795 int flags,
1796 const BdrvChildRole *role,
1797 QDict *parent_options,
1798 int parent_flags)
e971aa12
JC
1799{
1800 assert(bs != NULL);
1801
1802 BlockReopenQueueEntry *bs_entry;
67251a31 1803 BdrvChild *child;
145f598e 1804 QDict *old_options, *explicit_options;
67251a31 1805
e971aa12
JC
1806 if (bs_queue == NULL) {
1807 bs_queue = g_new0(BlockReopenQueue, 1);
1808 QSIMPLEQ_INIT(bs_queue);
1809 }
1810
4d2cb092
KW
1811 if (!options) {
1812 options = qdict_new();
1813 }
1814
28518102
KW
1815 /*
1816 * Precedence of options:
1817 * 1. Explicitly passed in options (highest)
91a097e7 1818 * 2. Set in flags (only for top level)
145f598e 1819 * 3. Retained from explicitly set options of bs
8e2160e2 1820 * 4. Inherited from parent node
28518102
KW
1821 * 5. Retained from effective options of bs
1822 */
1823
91a097e7
KW
1824 if (!parent_options) {
1825 /*
1826 * Any setting represented by flags is always updated. If the
1827 * corresponding QDict option is set, it takes precedence. Otherwise
1828 * the flag is translated into a QDict option. The old setting of bs is
1829 * not considered.
1830 */
1831 update_options_from_flags(options, flags);
1832 }
1833
145f598e
KW
1834 /* Old explicitly set values (don't overwrite by inherited value) */
1835 old_options = qdict_clone_shallow(bs->explicit_options);
1836 bdrv_join_options(bs, options, old_options);
1837 QDECREF(old_options);
1838
1839 explicit_options = qdict_clone_shallow(options);
1840
28518102
KW
1841 /* Inherit from parent node */
1842 if (parent_options) {
1843 assert(!flags);
8e2160e2 1844 role->inherit_options(&flags, options, parent_flags, parent_options);
28518102
KW
1845 }
1846
1847 /* Old values are used for options that aren't set yet */
4d2cb092 1848 old_options = qdict_clone_shallow(bs->options);
cddff5ba 1849 bdrv_join_options(bs, options, old_options);
4d2cb092
KW
1850 QDECREF(old_options);
1851
f1f25a2e
KW
1852 /* bdrv_open() masks this flag out */
1853 flags &= ~BDRV_O_PROTOCOL;
1854
67251a31 1855 QLIST_FOREACH(child, &bs->children, next) {
4c9dfe5d
KW
1856 QDict *new_child_options;
1857 char *child_key_dot;
67251a31 1858
4c9dfe5d
KW
1859 /* reopen can only change the options of block devices that were
1860 * implicitly created and inherited options. For other (referenced)
1861 * block devices, a syntax like "backing.foo" results in an error. */
67251a31
KW
1862 if (child->bs->inherits_from != bs) {
1863 continue;
1864 }
1865
4c9dfe5d
KW
1866 child_key_dot = g_strdup_printf("%s.", child->name);
1867 qdict_extract_subqdict(options, &new_child_options, child_key_dot);
1868 g_free(child_key_dot);
1869
28518102
KW
1870 bdrv_reopen_queue_child(bs_queue, child->bs, new_child_options, 0,
1871 child->role, options, flags);
e971aa12
JC
1872 }
1873
1874 bs_entry = g_new0(BlockReopenQueueEntry, 1);
1875 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
1876
1877 bs_entry->state.bs = bs;
4d2cb092 1878 bs_entry->state.options = options;
145f598e 1879 bs_entry->state.explicit_options = explicit_options;
e971aa12
JC
1880 bs_entry->state.flags = flags;
1881
1882 return bs_queue;
1883}
1884
28518102
KW
1885BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
1886 BlockDriverState *bs,
1887 QDict *options, int flags)
1888{
1889 return bdrv_reopen_queue_child(bs_queue, bs, options, flags,
1890 NULL, NULL, 0);
1891}
1892
e971aa12
JC
1893/*
1894 * Reopen multiple BlockDriverStates atomically & transactionally.
1895 *
1896 * The queue passed in (bs_queue) must have been built up previous
1897 * via bdrv_reopen_queue().
1898 *
1899 * Reopens all BDS specified in the queue, with the appropriate
1900 * flags. All devices are prepared for reopen, and failure of any
1901 * device will cause all device changes to be abandonded, and intermediate
1902 * data cleaned up.
1903 *
1904 * If all devices prepare successfully, then the changes are committed
1905 * to all devices.
1906 *
1907 */
1908int bdrv_reopen_multiple(BlockReopenQueue *bs_queue, Error **errp)
1909{
1910 int ret = -1;
1911 BlockReopenQueueEntry *bs_entry, *next;
1912 Error *local_err = NULL;
1913
1914 assert(bs_queue != NULL);
1915
1916 bdrv_drain_all();
1917
1918 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1919 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
1920 error_propagate(errp, local_err);
1921 goto cleanup;
1922 }
1923 bs_entry->prepared = true;
1924 }
1925
1926 /* If we reach this point, we have success and just need to apply the
1927 * changes
1928 */
1929 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1930 bdrv_reopen_commit(&bs_entry->state);
1931 }
1932
1933 ret = 0;
1934
1935cleanup:
1936 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
1937 if (ret && bs_entry->prepared) {
1938 bdrv_reopen_abort(&bs_entry->state);
145f598e
KW
1939 } else if (ret) {
1940 QDECREF(bs_entry->state.explicit_options);
e971aa12 1941 }
4d2cb092 1942 QDECREF(bs_entry->state.options);
e971aa12
JC
1943 g_free(bs_entry);
1944 }
1945 g_free(bs_queue);
1946 return ret;
1947}
1948
1949
1950/* Reopen a single BlockDriverState with the specified flags. */
1951int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
1952{
1953 int ret = -1;
1954 Error *local_err = NULL;
4d2cb092 1955 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12
JC
1956
1957 ret = bdrv_reopen_multiple(queue, &local_err);
1958 if (local_err != NULL) {
1959 error_propagate(errp, local_err);
1960 }
1961 return ret;
1962}
1963
1964
1965/*
1966 * Prepares a BlockDriverState for reopen. All changes are staged in the
1967 * 'opaque' field of the BDRVReopenState, which is used and allocated by
1968 * the block driver layer .bdrv_reopen_prepare()
1969 *
1970 * bs is the BlockDriverState to reopen
1971 * flags are the new open flags
1972 * queue is the reopen queue
1973 *
1974 * Returns 0 on success, non-zero on error. On error errp will be set
1975 * as well.
1976 *
1977 * On failure, bdrv_reopen_abort() will be called to clean up any data.
1978 * It is the responsibility of the caller to then call the abort() or
1979 * commit() for any other BDS that have been left in a prepare() state
1980 *
1981 */
1982int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
1983 Error **errp)
1984{
1985 int ret = -1;
1986 Error *local_err = NULL;
1987 BlockDriver *drv;
ccf9dc07
KW
1988 QemuOpts *opts;
1989 const char *value;
e971aa12
JC
1990
1991 assert(reopen_state != NULL);
1992 assert(reopen_state->bs->drv != NULL);
1993 drv = reopen_state->bs->drv;
1994
ccf9dc07
KW
1995 /* Process generic block layer options */
1996 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
1997 qemu_opts_absorb_qdict(opts, reopen_state->options, &local_err);
1998 if (local_err) {
1999 error_propagate(errp, local_err);
2000 ret = -EINVAL;
2001 goto error;
2002 }
2003
91a097e7
KW
2004 update_flags_from_options(&reopen_state->flags, opts);
2005
2006 /* If a guest device is attached, it owns WCE */
2007 if (reopen_state->bs->blk && blk_get_attached_dev(reopen_state->bs->blk)) {
2008 bool old_wce = bdrv_enable_write_cache(reopen_state->bs);
2009 bool new_wce = (reopen_state->flags & BDRV_O_CACHE_WB);
2010 if (old_wce != new_wce) {
2011 error_setg(errp, "Cannot change cache.writeback: Device attached");
2012 ret = -EINVAL;
2013 goto error;
2014 }
2015 }
2016
ccf9dc07
KW
2017 /* node-name and driver must be unchanged. Put them back into the QDict, so
2018 * that they are checked at the end of this function. */
2019 value = qemu_opt_get(opts, "node-name");
2020 if (value) {
2021 qdict_put(reopen_state->options, "node-name", qstring_from_str(value));
2022 }
2023
2024 value = qemu_opt_get(opts, "driver");
2025 if (value) {
2026 qdict_put(reopen_state->options, "driver", qstring_from_str(value));
2027 }
2028
e971aa12
JC
2029 /* if we are to stay read-only, do not allow permission change
2030 * to r/w */
2031 if (!(reopen_state->bs->open_flags & BDRV_O_ALLOW_RDWR) &&
2032 reopen_state->flags & BDRV_O_RDWR) {
81e5f78a
AG
2033 error_setg(errp, "Node '%s' is read only",
2034 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
2035 goto error;
2036 }
2037
2038
2039 ret = bdrv_flush(reopen_state->bs);
2040 if (ret) {
455b0fde 2041 error_setg_errno(errp, -ret, "Error flushing drive");
e971aa12
JC
2042 goto error;
2043 }
2044
2045 if (drv->bdrv_reopen_prepare) {
2046 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
2047 if (ret) {
2048 if (local_err != NULL) {
2049 error_propagate(errp, local_err);
2050 } else {
d8b6895f
LC
2051 error_setg(errp, "failed while preparing to reopen image '%s'",
2052 reopen_state->bs->filename);
e971aa12
JC
2053 }
2054 goto error;
2055 }
2056 } else {
2057 /* It is currently mandatory to have a bdrv_reopen_prepare()
2058 * handler for each supported drv. */
81e5f78a
AG
2059 error_setg(errp, "Block format '%s' used by node '%s' "
2060 "does not support reopening files", drv->format_name,
2061 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
2062 ret = -1;
2063 goto error;
2064 }
2065
4d2cb092
KW
2066 /* Options that are not handled are only okay if they are unchanged
2067 * compared to the old state. It is expected that some options are only
2068 * used for the initial open, but not reopen (e.g. filename) */
2069 if (qdict_size(reopen_state->options)) {
2070 const QDictEntry *entry = qdict_first(reopen_state->options);
2071
2072 do {
2073 QString *new_obj = qobject_to_qstring(entry->value);
2074 const char *new = qstring_get_str(new_obj);
2075 const char *old = qdict_get_try_str(reopen_state->bs->options,
2076 entry->key);
2077
2078 if (!old || strcmp(new, old)) {
2079 error_setg(errp, "Cannot change the option '%s'", entry->key);
2080 ret = -EINVAL;
2081 goto error;
2082 }
2083 } while ((entry = qdict_next(reopen_state->options, entry)));
2084 }
2085
e971aa12
JC
2086 ret = 0;
2087
2088error:
ccf9dc07 2089 qemu_opts_del(opts);
e971aa12
JC
2090 return ret;
2091}
2092
2093/*
2094 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
2095 * makes them final by swapping the staging BlockDriverState contents into
2096 * the active BlockDriverState contents.
2097 */
2098void bdrv_reopen_commit(BDRVReopenState *reopen_state)
2099{
2100 BlockDriver *drv;
2101
2102 assert(reopen_state != NULL);
2103 drv = reopen_state->bs->drv;
2104 assert(drv != NULL);
2105
2106 /* If there are any driver level actions to take */
2107 if (drv->bdrv_reopen_commit) {
2108 drv->bdrv_reopen_commit(reopen_state);
2109 }
2110
2111 /* set BDS specific flags now */
145f598e
KW
2112 QDECREF(reopen_state->bs->explicit_options);
2113
2114 reopen_state->bs->explicit_options = reopen_state->explicit_options;
e971aa12
JC
2115 reopen_state->bs->open_flags = reopen_state->flags;
2116 reopen_state->bs->enable_write_cache = !!(reopen_state->flags &
2117 BDRV_O_CACHE_WB);
2118 reopen_state->bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 2119
3baca891 2120 bdrv_refresh_limits(reopen_state->bs, NULL);
e971aa12
JC
2121}
2122
2123/*
2124 * Abort the reopen, and delete and free the staged changes in
2125 * reopen_state
2126 */
2127void bdrv_reopen_abort(BDRVReopenState *reopen_state)
2128{
2129 BlockDriver *drv;
2130
2131 assert(reopen_state != NULL);
2132 drv = reopen_state->bs->drv;
2133 assert(drv != NULL);
2134
2135 if (drv->bdrv_reopen_abort) {
2136 drv->bdrv_reopen_abort(reopen_state);
2137 }
145f598e
KW
2138
2139 QDECREF(reopen_state->explicit_options);
e971aa12
JC
2140}
2141
2142
fc01f7e7
FB
2143void bdrv_close(BlockDriverState *bs)
2144{
33384421
HR
2145 BdrvAioNotifier *ban, *ban_next;
2146
3cbc002c
PB
2147 if (bs->job) {
2148 block_job_cancel_sync(bs->job);
2149 }
99b7e775
AG
2150
2151 /* Disable I/O limits and drain all pending throttled requests */
a0d64a61 2152 if (bs->throttle_state) {
99b7e775
AG
2153 bdrv_io_limits_disable(bs);
2154 }
2155
fc27291d 2156 bdrv_drained_begin(bs); /* complete I/O */
58fda173 2157 bdrv_flush(bs);
53ec73e2 2158 bdrv_drain(bs); /* in case flush left pending I/O */
fc27291d 2159
d7d512f6 2160 notifier_list_notify(&bs->close_notifiers, bs);
7094f12f 2161
b4d02820
HR
2162 if (bs->blk) {
2163 blk_dev_change_media_cb(bs->blk, false);
2164 }
2165
3cbc002c 2166 if (bs->drv) {
6e93e7c4
KW
2167 BdrvChild *child, *next;
2168
9a7dedbc 2169 bs->drv->bdrv_close(bs);
9a4f4c31 2170 bs->drv = NULL;
9a7dedbc 2171
5db15a57 2172 bdrv_set_backing_hd(bs, NULL);
9a7dedbc 2173
9a4f4c31
KW
2174 if (bs->file != NULL) {
2175 bdrv_unref_child(bs, bs->file);
2176 bs->file = NULL;
2177 }
2178
6e93e7c4 2179 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
2180 /* TODO Remove bdrv_unref() from drivers' close function and use
2181 * bdrv_unref_child() here */
bddcec37
KW
2182 if (child->bs->inherits_from == bs) {
2183 child->bs->inherits_from = NULL;
2184 }
33a60407 2185 bdrv_detach_child(child);
6e93e7c4
KW
2186 }
2187
7267c094 2188 g_free(bs->opaque);
ea2384d3 2189 bs->opaque = NULL;
53fec9d3 2190 bs->copy_on_read = 0;
a275fa42
PB
2191 bs->backing_file[0] = '\0';
2192 bs->backing_format[0] = '\0';
6405875c
PB
2193 bs->total_sectors = 0;
2194 bs->encrypted = 0;
2195 bs->valid_key = 0;
2196 bs->sg = 0;
0d51b4de 2197 bs->zero_beyond_eof = false;
de9c0cec 2198 QDECREF(bs->options);
145f598e 2199 QDECREF(bs->explicit_options);
de9c0cec 2200 bs->options = NULL;
91af7014
HR
2201 QDECREF(bs->full_open_options);
2202 bs->full_open_options = NULL;
b338082b 2203 }
98f90dba 2204
33384421
HR
2205 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
2206 g_free(ban);
2207 }
2208 QLIST_INIT(&bs->aio_notifiers);
fc27291d 2209 bdrv_drained_end(bs);
b338082b
FB
2210}
2211
2bc93fed
MK
2212void bdrv_close_all(void)
2213{
2214 BlockDriverState *bs;
2215
dc364f4c 2216 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
2217 AioContext *aio_context = bdrv_get_aio_context(bs);
2218
2219 aio_context_acquire(aio_context);
2bc93fed 2220 bdrv_close(bs);
ed78cda3 2221 aio_context_release(aio_context);
2bc93fed
MK
2222 }
2223}
2224
dc364f4c
BC
2225/* make a BlockDriverState anonymous by removing from bdrv_state and
2226 * graph_bdrv_state list.
d22b2f41
RH
2227 Also, NULL terminate the device_name to prevent double remove */
2228void bdrv_make_anon(BlockDriverState *bs)
2229{
bfb197e0
MA
2230 /*
2231 * Take care to remove bs from bdrv_states only when it's actually
2232 * in it. Note that bs->device_list.tqe_prev is initially null,
2233 * and gets set to non-null by QTAILQ_INSERT_TAIL(). Establish
2234 * the useful invariant "bs in bdrv_states iff bs->tqe_prev" by
2235 * resetting it to null on remove.
2236 */
2237 if (bs->device_list.tqe_prev) {
dc364f4c 2238 QTAILQ_REMOVE(&bdrv_states, bs, device_list);
bfb197e0 2239 bs->device_list.tqe_prev = NULL;
d22b2f41 2240 }
dc364f4c
BC
2241 if (bs->node_name[0] != '\0') {
2242 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
2243 }
2244 bs->node_name[0] = '\0';
d22b2f41
RH
2245}
2246
8e419aef 2247/* Fields that need to stay with the top-level BDS */
4ddc07ca
PB
2248static void bdrv_move_feature_fields(BlockDriverState *bs_dest,
2249 BlockDriverState *bs_src)
8802d1fd 2250{
4ddc07ca 2251 /* move some fields that need to stay attached to the device */
8802d1fd
JC
2252
2253 /* dev info */
4ddc07ca 2254 bs_dest->copy_on_read = bs_src->copy_on_read;
8802d1fd 2255
4ddc07ca 2256 bs_dest->enable_write_cache = bs_src->enable_write_cache;
c4a248a1 2257
a9fc4408 2258 /* dirty bitmap */
e4654d2d 2259 bs_dest->dirty_bitmaps = bs_src->dirty_bitmaps;
063dd40e 2260}
a9fc4408 2261
dd62f1ca
KW
2262static void change_parent_backing_link(BlockDriverState *from,
2263 BlockDriverState *to)
2264{
2265 BdrvChild *c, *next;
2266
2267 QLIST_FOREACH_SAFE(c, &from->parents, next_parent, next) {
2268 assert(c->role != &child_backing);
2269 c->bs = to;
2270 QLIST_REMOVE(c, next_parent);
2271 QLIST_INSERT_HEAD(&to->parents, c, next_parent);
2272 bdrv_ref(to);
2273 bdrv_unref(from);
2274 }
2275 if (from->blk) {
2276 blk_set_bs(from->blk, to);
2277 if (!to->device_list.tqe_prev) {
2278 QTAILQ_INSERT_BEFORE(from, to, device_list);
2279 }
2280 QTAILQ_REMOVE(&bdrv_states, from, device_list);
2281 }
2282}
2283
2284static void swap_feature_fields(BlockDriverState *bs_top,
2285 BlockDriverState *bs_new)
2286{
2287 BlockDriverState tmp;
2288
2289 bdrv_move_feature_fields(&tmp, bs_top);
2290 bdrv_move_feature_fields(bs_top, bs_new);
2291 bdrv_move_feature_fields(bs_new, &tmp);
2292
2293 assert(!bs_new->throttle_state);
2294 if (bs_top->throttle_state) {
2295 assert(bs_top->io_limits_enabled);
2296 bdrv_io_limits_enable(bs_new, throttle_group_get_name(bs_top));
2297 bdrv_io_limits_disable(bs_top);
2298 }
2299}
2300
4ddc07ca
PB
2301/*
2302 * Add new bs contents at the top of an image chain while the chain is
2303 * live, while keeping required fields on the top layer.
2304 *
2305 * This will modify the BlockDriverState fields, and swap contents
2306 * between bs_new and bs_top. Both bs_new and bs_top are modified.
2307 *
bfb197e0 2308 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2309 *
2310 * This function does not create any image files.
dd62f1ca
KW
2311 *
2312 * bdrv_append() takes ownership of a bs_new reference and unrefs it because
2313 * that's what the callers commonly need. bs_new will be referenced by the old
2314 * parents of bs_top after bdrv_append() returns. If the caller needs to keep a
2315 * reference of its own, it must call bdrv_ref().
4ddc07ca
PB
2316 */
2317void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top)
2318{
dd62f1ca
KW
2319 assert(!bdrv_requests_pending(bs_top));
2320 assert(!bdrv_requests_pending(bs_new));
2321
2322 bdrv_ref(bs_top);
2323 change_parent_backing_link(bs_top, bs_new);
2324
2325 /* Some fields always stay on top of the backing file chain */
2326 swap_feature_fields(bs_top, bs_new);
2327
2328 bdrv_set_backing_hd(bs_new, bs_top);
2329 bdrv_unref(bs_top);
4ddc07ca 2330
dd62f1ca
KW
2331 /* bs_new is now referenced by its new parents, we don't need the
2332 * additional reference any more. */
2333 bdrv_unref(bs_new);
8802d1fd
JC
2334}
2335
3f09bfbc
KW
2336void bdrv_replace_in_backing_chain(BlockDriverState *old, BlockDriverState *new)
2337{
2338 assert(!bdrv_requests_pending(old));
2339 assert(!bdrv_requests_pending(new));
2340
2341 bdrv_ref(old);
2342
2343 if (old->blk) {
2344 /* As long as these fields aren't in BlockBackend, but in the top-level
2345 * BlockDriverState, it's not possible for a BDS to have two BBs.
2346 *
2347 * We really want to copy the fields from old to new, but we go for a
2348 * swap instead so that pointers aren't duplicated and cause trouble.
2349 * (Also, bdrv_swap() used to do the same.) */
2350 assert(!new->blk);
2351 swap_feature_fields(old, new);
2352 }
2353 change_parent_backing_link(old, new);
2354
2355 /* Change backing files if a previously independent node is added to the
2356 * chain. For active commit, we replace top by its own (indirect) backing
2357 * file and don't do anything here so we don't build a loop. */
2358 if (new->backing == NULL && !bdrv_chain_contains(backing_bs(old), new)) {
2359 bdrv_set_backing_hd(new, backing_bs(old));
2360 bdrv_set_backing_hd(old, NULL);
2361 }
2362
2363 bdrv_unref(old);
2364}
2365
4f6fd349 2366static void bdrv_delete(BlockDriverState *bs)
b338082b 2367{
3e914655 2368 assert(!bs->job);
3718d8ab 2369 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 2370 assert(!bs->refcnt);
e4654d2d 2371 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
18846dee 2372
e1b5c52e
SH
2373 bdrv_close(bs);
2374
1b7bdbc1 2375 /* remove from list, if necessary */
d22b2f41 2376 bdrv_make_anon(bs);
34c6f050 2377
7267c094 2378 g_free(bs);
fc01f7e7
FB
2379}
2380
e97fc193
AL
2381/*
2382 * Run consistency checks on an image
2383 *
e076f338 2384 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 2385 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 2386 * check are stored in res.
e97fc193 2387 */
4534ff54 2388int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 2389{
908bcd54
HR
2390 if (bs->drv == NULL) {
2391 return -ENOMEDIUM;
2392 }
e97fc193
AL
2393 if (bs->drv->bdrv_check == NULL) {
2394 return -ENOTSUP;
2395 }
2396
e076f338 2397 memset(res, 0, sizeof(*res));
4534ff54 2398 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
2399}
2400
8a426614
KW
2401#define COMMIT_BUF_SECTORS 2048
2402
33e3963e
FB
2403/* commit COW file into the raw image */
2404int bdrv_commit(BlockDriverState *bs)
2405{
19cb3738 2406 BlockDriver *drv = bs->drv;
72706ea4 2407 int64_t sector, total_sectors, length, backing_length;
8a426614 2408 int n, ro, open_flags;
0bce597d 2409 int ret = 0;
72706ea4 2410 uint8_t *buf = NULL;
33e3963e 2411
19cb3738
FB
2412 if (!drv)
2413 return -ENOMEDIUM;
6bb45158 2414
760e0063 2415 if (!bs->backing) {
4dca4b63 2416 return -ENOTSUP;
33e3963e
FB
2417 }
2418
bb00021d 2419 if (bdrv_op_is_blocked(bs, BLOCK_OP_TYPE_COMMIT_SOURCE, NULL) ||
760e0063 2420 bdrv_op_is_blocked(bs->backing->bs, BLOCK_OP_TYPE_COMMIT_TARGET, NULL)) {
2d3735d3
SH
2421 return -EBUSY;
2422 }
2423
760e0063
KW
2424 ro = bs->backing->bs->read_only;
2425 open_flags = bs->backing->bs->open_flags;
4dca4b63
NS
2426
2427 if (ro) {
760e0063 2428 if (bdrv_reopen(bs->backing->bs, open_flags | BDRV_O_RDWR, NULL)) {
0bce597d 2429 return -EACCES;
4dca4b63 2430 }
ea2384d3 2431 }
33e3963e 2432
72706ea4
JC
2433 length = bdrv_getlength(bs);
2434 if (length < 0) {
2435 ret = length;
2436 goto ro_cleanup;
2437 }
2438
760e0063 2439 backing_length = bdrv_getlength(bs->backing->bs);
72706ea4
JC
2440 if (backing_length < 0) {
2441 ret = backing_length;
2442 goto ro_cleanup;
2443 }
2444
2445 /* If our top snapshot is larger than the backing file image,
2446 * grow the backing file image if possible. If not possible,
2447 * we must return an error */
2448 if (length > backing_length) {
760e0063 2449 ret = bdrv_truncate(bs->backing->bs, length);
72706ea4
JC
2450 if (ret < 0) {
2451 goto ro_cleanup;
2452 }
2453 }
2454
2455 total_sectors = length >> BDRV_SECTOR_BITS;
857d4f46
KW
2456
2457 /* qemu_try_blockalign() for bs will choose an alignment that works for
760e0063 2458 * bs->backing->bs as well, so no need to compare the alignment manually. */
857d4f46
KW
2459 buf = qemu_try_blockalign(bs, COMMIT_BUF_SECTORS * BDRV_SECTOR_SIZE);
2460 if (buf == NULL) {
2461 ret = -ENOMEM;
2462 goto ro_cleanup;
2463 }
8a426614
KW
2464
2465 for (sector = 0; sector < total_sectors; sector += n) {
d663640c
PB
2466 ret = bdrv_is_allocated(bs, sector, COMMIT_BUF_SECTORS, &n);
2467 if (ret < 0) {
2468 goto ro_cleanup;
2469 }
2470 if (ret) {
dabfa6cc
KW
2471 ret = bdrv_read(bs, sector, buf, n);
2472 if (ret < 0) {
8a426614
KW
2473 goto ro_cleanup;
2474 }
2475
760e0063 2476 ret = bdrv_write(bs->backing->bs, sector, buf, n);
dabfa6cc 2477 if (ret < 0) {
8a426614
KW
2478 goto ro_cleanup;
2479 }
ea2384d3 2480 }
33e3963e 2481 }
95389c86 2482
1d44952f
CH
2483 if (drv->bdrv_make_empty) {
2484 ret = drv->bdrv_make_empty(bs);
dabfa6cc
KW
2485 if (ret < 0) {
2486 goto ro_cleanup;
2487 }
1d44952f
CH
2488 bdrv_flush(bs);
2489 }
95389c86 2490
3f5075ae
CH
2491 /*
2492 * Make sure all data we wrote to the backing device is actually
2493 * stable on disk.
2494 */
760e0063
KW
2495 if (bs->backing) {
2496 bdrv_flush(bs->backing->bs);
dabfa6cc 2497 }
4dca4b63 2498
dabfa6cc 2499 ret = 0;
4dca4b63 2500ro_cleanup:
857d4f46 2501 qemu_vfree(buf);
4dca4b63
NS
2502
2503 if (ro) {
0bce597d 2504 /* ignoring error return here */
760e0063 2505 bdrv_reopen(bs->backing->bs, open_flags & ~BDRV_O_RDWR, NULL);
4dca4b63
NS
2506 }
2507
1d44952f 2508 return ret;
33e3963e
FB
2509}
2510
e8877497 2511int bdrv_commit_all(void)
6ab4b5ab
MA
2512{
2513 BlockDriverState *bs;
2514
dc364f4c 2515 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
2516 AioContext *aio_context = bdrv_get_aio_context(bs);
2517
2518 aio_context_acquire(aio_context);
760e0063 2519 if (bs->drv && bs->backing) {
272d2d8e
JC
2520 int ret = bdrv_commit(bs);
2521 if (ret < 0) {
ed78cda3 2522 aio_context_release(aio_context);
272d2d8e
JC
2523 return ret;
2524 }
e8877497 2525 }
ed78cda3 2526 aio_context_release(aio_context);
6ab4b5ab 2527 }
e8877497 2528 return 0;
6ab4b5ab
MA
2529}
2530
756e6736
KW
2531/*
2532 * Return values:
2533 * 0 - success
2534 * -EINVAL - backing format specified, but no file
2535 * -ENOSPC - can't update the backing file because no space is left in the
2536 * image file header
2537 * -ENOTSUP - format driver doesn't support changing the backing file
2538 */
2539int bdrv_change_backing_file(BlockDriverState *bs,
2540 const char *backing_file, const char *backing_fmt)
2541{
2542 BlockDriver *drv = bs->drv;
469ef350 2543 int ret;
756e6736 2544
5f377794
PB
2545 /* Backing file format doesn't make sense without a backing file */
2546 if (backing_fmt && !backing_file) {
2547 return -EINVAL;
2548 }
2549
756e6736 2550 if (drv->bdrv_change_backing_file != NULL) {
469ef350 2551 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 2552 } else {
469ef350 2553 ret = -ENOTSUP;
756e6736 2554 }
469ef350
PB
2555
2556 if (ret == 0) {
2557 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
2558 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
2559 }
2560 return ret;
756e6736
KW
2561}
2562
6ebdcee2
JC
2563/*
2564 * Finds the image layer in the chain that has 'bs' as its backing file.
2565 *
2566 * active is the current topmost image.
2567 *
2568 * Returns NULL if bs is not found in active's image chain,
2569 * or if active == bs.
4caf0fcd
JC
2570 *
2571 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
2572 */
2573BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
2574 BlockDriverState *bs)
2575{
760e0063
KW
2576 while (active && bs != backing_bs(active)) {
2577 active = backing_bs(active);
6ebdcee2
JC
2578 }
2579
4caf0fcd
JC
2580 return active;
2581}
6ebdcee2 2582
4caf0fcd
JC
2583/* Given a BDS, searches for the base layer. */
2584BlockDriverState *bdrv_find_base(BlockDriverState *bs)
2585{
2586 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
2587}
2588
6ebdcee2
JC
2589/*
2590 * Drops images above 'base' up to and including 'top', and sets the image
2591 * above 'top' to have base as its backing file.
2592 *
2593 * Requires that the overlay to 'top' is opened r/w, so that the backing file
2594 * information in 'bs' can be properly updated.
2595 *
2596 * E.g., this will convert the following chain:
2597 * bottom <- base <- intermediate <- top <- active
2598 *
2599 * to
2600 *
2601 * bottom <- base <- active
2602 *
2603 * It is allowed for bottom==base, in which case it converts:
2604 *
2605 * base <- intermediate <- top <- active
2606 *
2607 * to
2608 *
2609 * base <- active
2610 *
54e26900
JC
2611 * If backing_file_str is non-NULL, it will be used when modifying top's
2612 * overlay image metadata.
2613 *
6ebdcee2
JC
2614 * Error conditions:
2615 * if active == top, that is considered an error
2616 *
2617 */
2618int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 2619 BlockDriverState *base, const char *backing_file_str)
6ebdcee2 2620{
6ebdcee2 2621 BlockDriverState *new_top_bs = NULL;
6ebdcee2
JC
2622 int ret = -EIO;
2623
6ebdcee2
JC
2624 if (!top->drv || !base->drv) {
2625 goto exit;
2626 }
2627
2628 new_top_bs = bdrv_find_overlay(active, top);
2629
2630 if (new_top_bs == NULL) {
2631 /* we could not find the image above 'top', this is an error */
2632 goto exit;
2633 }
2634
760e0063 2635 /* special case of new_top_bs->backing->bs already pointing to base - nothing
6ebdcee2 2636 * to do, no intermediate images */
760e0063 2637 if (backing_bs(new_top_bs) == base) {
6ebdcee2
JC
2638 ret = 0;
2639 goto exit;
2640 }
2641
5db15a57
KW
2642 /* Make sure that base is in the backing chain of top */
2643 if (!bdrv_chain_contains(top, base)) {
6ebdcee2
JC
2644 goto exit;
2645 }
2646
2647 /* success - we can delete the intermediate states, and link top->base */
5db15a57 2648 backing_file_str = backing_file_str ? backing_file_str : base->filename;
54e26900 2649 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
5db15a57 2650 base->drv ? base->drv->format_name : "");
6ebdcee2
JC
2651 if (ret) {
2652 goto exit;
2653 }
5db15a57 2654 bdrv_set_backing_hd(new_top_bs, base);
6ebdcee2 2655
6ebdcee2 2656 ret = 0;
6ebdcee2 2657exit:
6ebdcee2
JC
2658 return ret;
2659}
2660
61007b31
SH
2661/**
2662 * Truncate file to 'offset' bytes (needed only for file protocols)
2663 */
2664int bdrv_truncate(BlockDriverState *bs, int64_t offset)
71d0770c 2665{
61007b31
SH
2666 BlockDriver *drv = bs->drv;
2667 int ret;
2668 if (!drv)
71d0770c 2669 return -ENOMEDIUM;
61007b31
SH
2670 if (!drv->bdrv_truncate)
2671 return -ENOTSUP;
2672 if (bs->read_only)
2673 return -EACCES;
71d0770c 2674
61007b31
SH
2675 ret = drv->bdrv_truncate(bs, offset);
2676 if (ret == 0) {
2677 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
2678 bdrv_dirty_bitmap_truncate(bs);
2679 if (bs->blk) {
2680 blk_dev_resize_cb(bs->blk);
2681 }
c0191e76 2682 }
61007b31 2683 return ret;
71d0770c
AL
2684}
2685
61007b31
SH
2686/**
2687 * Length of a allocated file in bytes. Sparse files are counted by actual
2688 * allocated space. Return < 0 if error or unknown.
2689 */
2690int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 2691{
61007b31
SH
2692 BlockDriver *drv = bs->drv;
2693 if (!drv) {
2694 return -ENOMEDIUM;
8f4754ed 2695 }
61007b31
SH
2696 if (drv->bdrv_get_allocated_file_size) {
2697 return drv->bdrv_get_allocated_file_size(bs);
2698 }
2699 if (bs->file) {
9a4f4c31 2700 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 2701 }
61007b31 2702 return -ENOTSUP;
1c9805a3 2703}
e7a8a783 2704
61007b31
SH
2705/**
2706 * Return number of sectors on success, -errno on error.
1c9805a3 2707 */
61007b31 2708int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 2709{
61007b31 2710 BlockDriver *drv = bs->drv;
498e386c 2711
61007b31
SH
2712 if (!drv)
2713 return -ENOMEDIUM;
2572b37a 2714
61007b31
SH
2715 if (drv->has_variable_length) {
2716 int ret = refresh_total_sectors(bs, bs->total_sectors);
2717 if (ret < 0) {
2718 return ret;
1c9805a3
SH
2719 }
2720 }
61007b31 2721 return bs->total_sectors;
1c9805a3 2722}
b338082b 2723
61007b31
SH
2724/**
2725 * Return length in bytes on success, -errno on error.
2726 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 2727 */
61007b31 2728int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 2729{
61007b31 2730 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 2731
4a9c9ea0 2732 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 2733 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
2734}
2735
61007b31
SH
2736/* return 0 as number of sectors if no device present or error */
2737void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 2738{
61007b31 2739 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 2740
61007b31 2741 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
2742}
2743
61007b31 2744int bdrv_is_read_only(BlockDriverState *bs)
8d3b1a2d 2745{
61007b31 2746 return bs->read_only;
83f64091 2747}
83f64091 2748
61007b31 2749int bdrv_is_sg(BlockDriverState *bs)
f08145fe 2750{
61007b31 2751 return bs->sg;
f08145fe
KW
2752}
2753
61007b31 2754int bdrv_enable_write_cache(BlockDriverState *bs)
ab185921 2755{
61007b31 2756 return bs->enable_write_cache;
ab185921
SH
2757}
2758
61007b31 2759void bdrv_set_enable_write_cache(BlockDriverState *bs, bool wce)
da1fa91d 2760{
61007b31 2761 bs->enable_write_cache = wce;
ab185921 2762
61007b31
SH
2763 /* so a reopen() will preserve wce */
2764 if (wce) {
2765 bs->open_flags |= BDRV_O_CACHE_WB;
893a8f62 2766 } else {
61007b31 2767 bs->open_flags &= ~BDRV_O_CACHE_WB;
893a8f62 2768 }
da1fa91d
KW
2769}
2770
61007b31 2771int bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 2772{
760e0063 2773 if (bs->backing && bs->backing->bs->encrypted) {
61007b31 2774 return 1;
760e0063 2775 }
61007b31 2776 return bs->encrypted;
fc3959e4
FZ
2777}
2778
61007b31 2779int bdrv_key_required(BlockDriverState *bs)
fc3959e4 2780{
760e0063 2781 BdrvChild *backing = bs->backing;
61007b31 2782
760e0063 2783 if (backing && backing->bs->encrypted && !backing->bs->valid_key) {
61007b31 2784 return 1;
760e0063 2785 }
61007b31 2786 return (bs->encrypted && !bs->valid_key);
fc3959e4
FZ
2787}
2788
61007b31 2789int bdrv_set_key(BlockDriverState *bs, const char *key)
d0c7f642 2790{
d0c7f642 2791 int ret;
760e0063
KW
2792 if (bs->backing && bs->backing->bs->encrypted) {
2793 ret = bdrv_set_key(bs->backing->bs, key);
61007b31
SH
2794 if (ret < 0)
2795 return ret;
2796 if (!bs->encrypted)
2797 return 0;
2798 }
2799 if (!bs->encrypted) {
2800 return -EINVAL;
2801 } else if (!bs->drv || !bs->drv->bdrv_set_key) {
d0c7f642
KW
2802 return -ENOMEDIUM;
2803 }
61007b31 2804 ret = bs->drv->bdrv_set_key(bs, key);
b9c64947 2805 if (ret < 0) {
61007b31
SH
2806 bs->valid_key = 0;
2807 } else if (!bs->valid_key) {
2808 bs->valid_key = 1;
2809 if (bs->blk) {
2810 /* call the change callback now, we skipped it on open */
2811 blk_dev_change_media_cb(bs->blk, true);
2812 }
1b0288ae 2813 }
61007b31
SH
2814 return ret;
2815}
f08f2dda 2816
c5fbe571 2817/*
61007b31
SH
2818 * Provide an encryption key for @bs.
2819 * If @key is non-null:
2820 * If @bs is not encrypted, fail.
2821 * Else if the key is invalid, fail.
2822 * Else set @bs's key to @key, replacing the existing key, if any.
2823 * If @key is null:
2824 * If @bs is encrypted and still lacks a key, fail.
2825 * Else do nothing.
2826 * On failure, store an error object through @errp if non-null.
c5fbe571 2827 */
61007b31 2828void bdrv_add_key(BlockDriverState *bs, const char *key, Error **errp)
c5fbe571 2829{
61007b31
SH
2830 if (key) {
2831 if (!bdrv_is_encrypted(bs)) {
2832 error_setg(errp, "Node '%s' is not encrypted",
2833 bdrv_get_device_or_node_name(bs));
2834 } else if (bdrv_set_key(bs, key) < 0) {
c6bd8c70 2835 error_setg(errp, QERR_INVALID_PASSWORD);
4d2855a3
MA
2836 }
2837 } else {
2838 if (bdrv_key_required(bs)) {
b1ca6391
MA
2839 error_set(errp, ERROR_CLASS_DEVICE_ENCRYPTED,
2840 "'%s' (%s) is encrypted",
81e5f78a 2841 bdrv_get_device_or_node_name(bs),
4d2855a3
MA
2842 bdrv_get_encrypted_filename(bs));
2843 }
2844 }
2845}
2846
61007b31 2847const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 2848{
61007b31 2849 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
2850}
2851
61007b31 2852static int qsort_strcmp(const void *a, const void *b)
40b4f539 2853{
61007b31 2854 return strcmp(a, b);
40b4f539
KW
2855}
2856
61007b31
SH
2857void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
2858 void *opaque)
40b4f539 2859{
61007b31
SH
2860 BlockDriver *drv;
2861 int count = 0;
2862 int i;
2863 const char **formats = NULL;
40b4f539 2864
61007b31
SH
2865 QLIST_FOREACH(drv, &bdrv_drivers, list) {
2866 if (drv->format_name) {
2867 bool found = false;
2868 int i = count;
2869 while (formats && i && !found) {
2870 found = !strcmp(formats[--i], drv->format_name);
2871 }
e2a305fb 2872
61007b31
SH
2873 if (!found) {
2874 formats = g_renew(const char *, formats, count + 1);
2875 formats[count++] = drv->format_name;
2876 }
6c5a42ac 2877 }
61007b31 2878 }
6c5a42ac 2879
61007b31 2880 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 2881
61007b31
SH
2882 for (i = 0; i < count; i++) {
2883 it(opaque, formats[i]);
2884 }
40b4f539 2885
61007b31
SH
2886 g_free(formats);
2887}
40b4f539 2888
61007b31
SH
2889/* This function is to find a node in the bs graph */
2890BlockDriverState *bdrv_find_node(const char *node_name)
2891{
2892 BlockDriverState *bs;
391827eb 2893
61007b31 2894 assert(node_name);
40b4f539 2895
61007b31
SH
2896 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2897 if (!strcmp(node_name, bs->node_name)) {
2898 return bs;
40b4f539
KW
2899 }
2900 }
61007b31 2901 return NULL;
40b4f539
KW
2902}
2903
61007b31
SH
2904/* Put this QMP function here so it can access the static graph_bdrv_states. */
2905BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 2906{
61007b31
SH
2907 BlockDeviceInfoList *list, *entry;
2908 BlockDriverState *bs;
40b4f539 2909
61007b31
SH
2910 list = NULL;
2911 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2912 BlockDeviceInfo *info = bdrv_block_device_info(bs, errp);
2913 if (!info) {
2914 qapi_free_BlockDeviceInfoList(list);
2915 return NULL;
301db7c2 2916 }
61007b31
SH
2917 entry = g_malloc0(sizeof(*entry));
2918 entry->value = info;
2919 entry->next = list;
2920 list = entry;
301db7c2
RH
2921 }
2922
61007b31
SH
2923 return list;
2924}
40b4f539 2925
61007b31
SH
2926BlockDriverState *bdrv_lookup_bs(const char *device,
2927 const char *node_name,
2928 Error **errp)
2929{
2930 BlockBackend *blk;
2931 BlockDriverState *bs;
40b4f539 2932
61007b31
SH
2933 if (device) {
2934 blk = blk_by_name(device);
40b4f539 2935
61007b31 2936 if (blk) {
9f4ed6fb
AG
2937 bs = blk_bs(blk);
2938 if (!bs) {
5433c24f 2939 error_setg(errp, "Device '%s' has no medium", device);
5433c24f
HR
2940 }
2941
9f4ed6fb 2942 return bs;
61007b31
SH
2943 }
2944 }
40b4f539 2945
61007b31
SH
2946 if (node_name) {
2947 bs = bdrv_find_node(node_name);
6d519a5f 2948
61007b31
SH
2949 if (bs) {
2950 return bs;
2951 }
40b4f539
KW
2952 }
2953
61007b31
SH
2954 error_setg(errp, "Cannot find device=%s nor node_name=%s",
2955 device ? device : "",
2956 node_name ? node_name : "");
2957 return NULL;
40b4f539
KW
2958}
2959
61007b31
SH
2960/* If 'base' is in the same chain as 'top', return true. Otherwise,
2961 * return false. If either argument is NULL, return false. */
2962bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 2963{
61007b31 2964 while (top && top != base) {
760e0063 2965 top = backing_bs(top);
02c50efe 2966 }
61007b31
SH
2967
2968 return top != NULL;
02c50efe
FZ
2969}
2970
61007b31 2971BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 2972{
61007b31
SH
2973 if (!bs) {
2974 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 2975 }
61007b31 2976 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
2977}
2978
61007b31 2979BlockDriverState *bdrv_next(BlockDriverState *bs)
83f64091 2980{
61007b31
SH
2981 if (!bs) {
2982 return QTAILQ_FIRST(&bdrv_states);
857d4f46 2983 }
61007b31 2984 return QTAILQ_NEXT(bs, device_list);
83f64091 2985}
beac80cd 2986
61007b31 2987const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 2988{
61007b31 2989 return bs->node_name;
beac80cd
FB
2990}
2991
61007b31
SH
2992/* TODO check what callers really want: bs->node_name or blk_name() */
2993const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 2994{
61007b31 2995 return bs->blk ? blk_name(bs->blk) : "";
f141eafe 2996}
83f64091 2997
61007b31
SH
2998/* This can be used to identify nodes that might not have a device
2999 * name associated. Since node and device names live in the same
3000 * namespace, the result is unambiguous. The exception is if both are
3001 * absent, then this returns an empty (non-null) string. */
3002const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 3003{
61007b31 3004 return bs->blk ? blk_name(bs->blk) : bs->node_name;
beac80cd 3005}
beac80cd 3006
61007b31 3007int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 3008{
61007b31 3009 return bs->open_flags;
0b5a2445
PB
3010}
3011
61007b31 3012int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 3013{
61007b31 3014 return 1;
0b5a2445
PB
3015}
3016
61007b31 3017int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 3018{
61007b31 3019 assert(bs->drv);
0b5a2445 3020
61007b31
SH
3021 /* If BS is a copy on write image, it is initialized to
3022 the contents of the base image, which may not be zeroes. */
760e0063 3023 if (bs->backing) {
61007b31
SH
3024 return 0;
3025 }
3026 if (bs->drv->bdrv_has_zero_init) {
3027 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 3028 }
61007b31
SH
3029
3030 /* safe default */
3031 return 0;
68485420
KW
3032}
3033
61007b31 3034bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 3035{
61007b31 3036 BlockDriverInfo bdi;
b2a61371 3037
760e0063 3038 if (bs->backing) {
61007b31
SH
3039 return false;
3040 }
3041
3042 if (bdrv_get_info(bs, &bdi) == 0) {
3043 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
3044 }
3045
61007b31 3046 return false;
b2a61371
SH
3047}
3048
61007b31 3049bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 3050{
61007b31 3051 BlockDriverInfo bdi;
68485420 3052
760e0063 3053 if (bs->backing || !(bs->open_flags & BDRV_O_UNMAP)) {
61007b31
SH
3054 return false;
3055 }
68485420 3056
61007b31
SH
3057 if (bdrv_get_info(bs, &bdi) == 0) {
3058 return bdi.can_write_zeroes_with_unmap;
3059 }
68485420 3060
61007b31 3061 return false;
68485420
KW
3062}
3063
61007b31 3064const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 3065{
760e0063 3066 if (bs->backing && bs->backing->bs->encrypted)
61007b31
SH
3067 return bs->backing_file;
3068 else if (bs->encrypted)
3069 return bs->filename;
3070 else
3071 return NULL;
b2e12bc6
CH
3072}
3073
61007b31
SH
3074void bdrv_get_backing_filename(BlockDriverState *bs,
3075 char *filename, int filename_size)
016f5cf6 3076{
61007b31
SH
3077 pstrcpy(filename, filename_size, bs->backing_file);
3078}
d318aea9 3079
61007b31
SH
3080int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
3081{
3082 BlockDriver *drv = bs->drv;
3083 if (!drv)
3084 return -ENOMEDIUM;
3085 if (!drv->bdrv_get_info)
3086 return -ENOTSUP;
3087 memset(bdi, 0, sizeof(*bdi));
3088 return drv->bdrv_get_info(bs, bdi);
3089}
016f5cf6 3090
61007b31
SH
3091ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
3092{
3093 BlockDriver *drv = bs->drv;
3094 if (drv && drv->bdrv_get_specific_info) {
3095 return drv->bdrv_get_specific_info(bs);
3096 }
3097 return NULL;
016f5cf6
AG
3098}
3099
a31939e6 3100void bdrv_debug_event(BlockDriverState *bs, BlkdebugEvent event)
4265d620 3101{
61007b31
SH
3102 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
3103 return;
3104 }
4265d620 3105
61007b31 3106 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
3107}
3108
61007b31
SH
3109int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
3110 const char *tag)
4265d620 3111{
61007b31 3112 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 3113 bs = bs->file ? bs->file->bs : NULL;
61007b31 3114 }
4265d620 3115
61007b31
SH
3116 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
3117 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
3118 }
4265d620 3119
61007b31 3120 return -ENOTSUP;
4265d620
PB
3121}
3122
61007b31 3123int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 3124{
61007b31 3125 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 3126 bs = bs->file ? bs->file->bs : NULL;
61007b31 3127 }
ce1a14dc 3128
61007b31
SH
3129 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
3130 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
3131 }
3132
3133 return -ENOTSUP;
eb852011
MA
3134}
3135
61007b31 3136int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 3137{
61007b31 3138 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 3139 bs = bs->file ? bs->file->bs : NULL;
61007b31 3140 }
ce1a14dc 3141
61007b31
SH
3142 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
3143 return bs->drv->bdrv_debug_resume(bs, tag);
3144 }
ce1a14dc 3145
61007b31 3146 return -ENOTSUP;
f197fe2b
FZ
3147}
3148
61007b31 3149bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 3150{
61007b31 3151 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 3152 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 3153 }
19cb3738 3154
61007b31
SH
3155 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
3156 return bs->drv->bdrv_debug_is_suspended(bs, tag);
3157 }
f9f05dc5 3158
61007b31
SH
3159 return false;
3160}
f9f05dc5 3161
61007b31 3162int bdrv_is_snapshot(BlockDriverState *bs)
f9f05dc5 3163{
61007b31 3164 return !!(bs->open_flags & BDRV_O_SNAPSHOT);
f9f05dc5
KW
3165}
3166
61007b31
SH
3167/* backing_file can either be relative, or absolute, or a protocol. If it is
3168 * relative, it must be relative to the chain. So, passing in bs->filename
3169 * from a BDS as backing_file should not be done, as that may be relative to
3170 * the CWD rather than the chain. */
3171BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
3172 const char *backing_file)
f9f05dc5 3173{
61007b31
SH
3174 char *filename_full = NULL;
3175 char *backing_file_full = NULL;
3176 char *filename_tmp = NULL;
3177 int is_protocol = 0;
3178 BlockDriverState *curr_bs = NULL;
3179 BlockDriverState *retval = NULL;
f9f05dc5 3180
61007b31
SH
3181 if (!bs || !bs->drv || !backing_file) {
3182 return NULL;
f9f05dc5
KW
3183 }
3184
61007b31
SH
3185 filename_full = g_malloc(PATH_MAX);
3186 backing_file_full = g_malloc(PATH_MAX);
3187 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 3188
61007b31 3189 is_protocol = path_has_protocol(backing_file);
f9f05dc5 3190
760e0063 3191 for (curr_bs = bs; curr_bs->backing; curr_bs = curr_bs->backing->bs) {
f9f05dc5 3192
61007b31
SH
3193 /* If either of the filename paths is actually a protocol, then
3194 * compare unmodified paths; otherwise make paths relative */
3195 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
3196 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
760e0063 3197 retval = curr_bs->backing->bs;
61007b31
SH
3198 break;
3199 }
3200 } else {
3201 /* If not an absolute filename path, make it relative to the current
3202 * image's filename path */
3203 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3204 backing_file);
f9f05dc5 3205
61007b31
SH
3206 /* We are going to compare absolute pathnames */
3207 if (!realpath(filename_tmp, filename_full)) {
3208 continue;
3209 }
07f07615 3210
61007b31
SH
3211 /* We need to make sure the backing filename we are comparing against
3212 * is relative to the current image filename (or absolute) */
3213 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3214 curr_bs->backing_file);
07f07615 3215
61007b31
SH
3216 if (!realpath(filename_tmp, backing_file_full)) {
3217 continue;
3218 }
eb489bb1 3219
61007b31 3220 if (strcmp(backing_file_full, filename_full) == 0) {
760e0063 3221 retval = curr_bs->backing->bs;
61007b31
SH
3222 break;
3223 }
3224 }
eb489bb1
KW
3225 }
3226
61007b31
SH
3227 g_free(filename_full);
3228 g_free(backing_file_full);
3229 g_free(filename_tmp);
3230 return retval;
3231}
3232
3233int bdrv_get_backing_file_depth(BlockDriverState *bs)
3234{
3235 if (!bs->drv) {
3236 return 0;
eb489bb1
KW
3237 }
3238
760e0063 3239 if (!bs->backing) {
61007b31 3240 return 0;
ca716364
KW
3241 }
3242
760e0063 3243 return 1 + bdrv_get_backing_file_depth(bs->backing->bs);
61007b31 3244}
07f07615 3245
61007b31
SH
3246void bdrv_init(void)
3247{
3248 module_call_init(MODULE_INIT_BLOCK);
3249}
29cdb251 3250
61007b31
SH
3251void bdrv_init_with_whitelist(void)
3252{
3253 use_bdrv_whitelist = 1;
3254 bdrv_init();
07f07615
PB
3255}
3256
5a8a30db 3257void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 3258{
5a8a30db
KW
3259 Error *local_err = NULL;
3260 int ret;
3261
3456a8d1
KW
3262 if (!bs->drv) {
3263 return;
3264 }
3265
7ea2d269
AK
3266 if (!(bs->open_flags & BDRV_O_INCOMING)) {
3267 return;
3268 }
3269 bs->open_flags &= ~BDRV_O_INCOMING;
3270
3456a8d1 3271 if (bs->drv->bdrv_invalidate_cache) {
5a8a30db 3272 bs->drv->bdrv_invalidate_cache(bs, &local_err);
3456a8d1 3273 } else if (bs->file) {
9a4f4c31 3274 bdrv_invalidate_cache(bs->file->bs, &local_err);
5a8a30db
KW
3275 }
3276 if (local_err) {
3277 error_propagate(errp, local_err);
3278 return;
0f15423c 3279 }
3456a8d1 3280
5a8a30db
KW
3281 ret = refresh_total_sectors(bs, bs->total_sectors);
3282 if (ret < 0) {
3283 error_setg_errno(errp, -ret, "Could not refresh total sector count");
3284 return;
3285 }
0f15423c
AL
3286}
3287
5a8a30db 3288void bdrv_invalidate_cache_all(Error **errp)
0f15423c
AL
3289{
3290 BlockDriverState *bs;
5a8a30db 3291 Error *local_err = NULL;
0f15423c 3292
dc364f4c 3293 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
3294 AioContext *aio_context = bdrv_get_aio_context(bs);
3295
3296 aio_context_acquire(aio_context);
5a8a30db 3297 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 3298 aio_context_release(aio_context);
5a8a30db
KW
3299 if (local_err) {
3300 error_propagate(errp, local_err);
3301 return;
3302 }
0f15423c
AL
3303 }
3304}
3305
19cb3738
FB
3306/**************************************************************/
3307/* removable device support */
3308
3309/**
3310 * Return TRUE if the media is present
3311 */
e031f750 3312bool bdrv_is_inserted(BlockDriverState *bs)
19cb3738
FB
3313{
3314 BlockDriver *drv = bs->drv;
28d7a789 3315 BdrvChild *child;
a1aff5bf 3316
e031f750
HR
3317 if (!drv) {
3318 return false;
3319 }
28d7a789
HR
3320 if (drv->bdrv_is_inserted) {
3321 return drv->bdrv_is_inserted(bs);
3322 }
3323 QLIST_FOREACH(child, &bs->children, next) {
3324 if (!bdrv_is_inserted(child->bs)) {
3325 return false;
3326 }
e031f750 3327 }
28d7a789 3328 return true;
19cb3738
FB
3329}
3330
3331/**
8e49ca46
MA
3332 * Return whether the media changed since the last call to this
3333 * function, or -ENOTSUP if we don't know. Most drivers don't know.
19cb3738
FB
3334 */
3335int bdrv_media_changed(BlockDriverState *bs)
3336{
3337 BlockDriver *drv = bs->drv;
19cb3738 3338
8e49ca46
MA
3339 if (drv && drv->bdrv_media_changed) {
3340 return drv->bdrv_media_changed(bs);
3341 }
3342 return -ENOTSUP;
19cb3738
FB
3343}
3344
3345/**
3346 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
3347 */
f36f3949 3348void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
3349{
3350 BlockDriver *drv = bs->drv;
bfb197e0 3351 const char *device_name;
19cb3738 3352
822e1cd1
MA
3353 if (drv && drv->bdrv_eject) {
3354 drv->bdrv_eject(bs, eject_flag);
19cb3738 3355 }
6f382ed2 3356
bfb197e0
MA
3357 device_name = bdrv_get_device_name(bs);
3358 if (device_name[0] != '\0') {
3359 qapi_event_send_device_tray_moved(device_name,
a5ee7bd4 3360 eject_flag, &error_abort);
6f382ed2 3361 }
19cb3738
FB
3362}
3363
19cb3738
FB
3364/**
3365 * Lock or unlock the media (if it is locked, the user won't be able
3366 * to eject it manually).
3367 */
025e849a 3368void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
3369{
3370 BlockDriver *drv = bs->drv;
3371
025e849a 3372 trace_bdrv_lock_medium(bs, locked);
b8c6d095 3373
025e849a
MA
3374 if (drv && drv->bdrv_lock_medium) {
3375 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
3376 }
3377}
985a03b0 3378
0db6e54a
FZ
3379BdrvDirtyBitmap *bdrv_find_dirty_bitmap(BlockDriverState *bs, const char *name)
3380{
3381 BdrvDirtyBitmap *bm;
3382
3383 assert(name);
3384 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
3385 if (bm->name && !strcmp(name, bm->name)) {
3386 return bm;
3387 }
3388 }
3389 return NULL;
3390}
3391
20dca810 3392void bdrv_dirty_bitmap_make_anon(BdrvDirtyBitmap *bitmap)
0db6e54a 3393{
9bd2b08f 3394 assert(!bdrv_dirty_bitmap_frozen(bitmap));
0db6e54a
FZ
3395 g_free(bitmap->name);
3396 bitmap->name = NULL;
3397}
3398
3399BdrvDirtyBitmap *bdrv_create_dirty_bitmap(BlockDriverState *bs,
5fba6c0e 3400 uint32_t granularity,
0db6e54a 3401 const char *name,
b8afb520 3402 Error **errp)
7cd1e32a
LS
3403{
3404 int64_t bitmap_size;
e4654d2d 3405 BdrvDirtyBitmap *bitmap;
5fba6c0e 3406 uint32_t sector_granularity;
a55eb92c 3407
50717e94
PB
3408 assert((granularity & (granularity - 1)) == 0);
3409
0db6e54a
FZ
3410 if (name && bdrv_find_dirty_bitmap(bs, name)) {
3411 error_setg(errp, "Bitmap already exists: %s", name);
3412 return NULL;
3413 }
5fba6c0e
JS
3414 sector_granularity = granularity >> BDRV_SECTOR_BITS;
3415 assert(sector_granularity);
57322b78 3416 bitmap_size = bdrv_nb_sectors(bs);
b8afb520
FZ
3417 if (bitmap_size < 0) {
3418 error_setg_errno(errp, -bitmap_size, "could not get length of device");
3419 errno = -bitmap_size;
3420 return NULL;
3421 }
5839e53b 3422 bitmap = g_new0(BdrvDirtyBitmap, 1);
5fba6c0e 3423 bitmap->bitmap = hbitmap_alloc(bitmap_size, ctz32(sector_granularity));
e74e6b78 3424 bitmap->size = bitmap_size;
0db6e54a 3425 bitmap->name = g_strdup(name);
b8e6fb75 3426 bitmap->disabled = false;
e4654d2d
FZ
3427 QLIST_INSERT_HEAD(&bs->dirty_bitmaps, bitmap, list);
3428 return bitmap;
3429}
3430
9bd2b08f
JS
3431bool bdrv_dirty_bitmap_frozen(BdrvDirtyBitmap *bitmap)
3432{
3433 return bitmap->successor;
3434}
3435
b8e6fb75
JS
3436bool bdrv_dirty_bitmap_enabled(BdrvDirtyBitmap *bitmap)
3437{
9bd2b08f
JS
3438 return !(bitmap->disabled || bitmap->successor);
3439}
3440
9abe3bdc
JS
3441DirtyBitmapStatus bdrv_dirty_bitmap_status(BdrvDirtyBitmap *bitmap)
3442{
3443 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3444 return DIRTY_BITMAP_STATUS_FROZEN;
3445 } else if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3446 return DIRTY_BITMAP_STATUS_DISABLED;
3447 } else {
3448 return DIRTY_BITMAP_STATUS_ACTIVE;
3449 }
3450}
3451
9bd2b08f
JS
3452/**
3453 * Create a successor bitmap destined to replace this bitmap after an operation.
3454 * Requires that the bitmap is not frozen and has no successor.
3455 */
3456int bdrv_dirty_bitmap_create_successor(BlockDriverState *bs,
3457 BdrvDirtyBitmap *bitmap, Error **errp)
3458{
3459 uint64_t granularity;
3460 BdrvDirtyBitmap *child;
3461
3462 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3463 error_setg(errp, "Cannot create a successor for a bitmap that is "
3464 "currently frozen");
3465 return -1;
3466 }
3467 assert(!bitmap->successor);
3468
3469 /* Create an anonymous successor */
3470 granularity = bdrv_dirty_bitmap_granularity(bitmap);
3471 child = bdrv_create_dirty_bitmap(bs, granularity, NULL, errp);
3472 if (!child) {
3473 return -1;
3474 }
3475
3476 /* Successor will be on or off based on our current state. */
3477 child->disabled = bitmap->disabled;
3478
3479 /* Install the successor and freeze the parent */
3480 bitmap->successor = child;
3481 return 0;
3482}
3483
3484/**
3485 * For a bitmap with a successor, yield our name to the successor,
3486 * delete the old bitmap, and return a handle to the new bitmap.
3487 */
3488BdrvDirtyBitmap *bdrv_dirty_bitmap_abdicate(BlockDriverState *bs,
3489 BdrvDirtyBitmap *bitmap,
3490 Error **errp)
3491{
3492 char *name;
3493 BdrvDirtyBitmap *successor = bitmap->successor;
3494
3495 if (successor == NULL) {
3496 error_setg(errp, "Cannot relinquish control if "
3497 "there's no successor present");
3498 return NULL;
3499 }
3500
3501 name = bitmap->name;
3502 bitmap->name = NULL;
3503 successor->name = name;
3504 bitmap->successor = NULL;
3505 bdrv_release_dirty_bitmap(bs, bitmap);
3506
3507 return successor;
3508}
3509
3510/**
3511 * In cases of failure where we can no longer safely delete the parent,
3512 * we may wish to re-join the parent and child/successor.
3513 * The merged parent will be un-frozen, but not explicitly re-enabled.
3514 */
3515BdrvDirtyBitmap *bdrv_reclaim_dirty_bitmap(BlockDriverState *bs,
3516 BdrvDirtyBitmap *parent,
3517 Error **errp)
3518{
3519 BdrvDirtyBitmap *successor = parent->successor;
3520
3521 if (!successor) {
3522 error_setg(errp, "Cannot reclaim a successor when none is present");
3523 return NULL;
3524 }
3525
3526 if (!hbitmap_merge(parent->bitmap, successor->bitmap)) {
3527 error_setg(errp, "Merging of parent and successor bitmap failed");
3528 return NULL;
3529 }
3530 bdrv_release_dirty_bitmap(bs, successor);
3531 parent->successor = NULL;
3532
3533 return parent;
b8e6fb75
JS
3534}
3535
ce1ffea8
JS
3536/**
3537 * Truncates _all_ bitmaps attached to a BDS.
3538 */
3539static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs)
3540{
3541 BdrvDirtyBitmap *bitmap;
3542 uint64_t size = bdrv_nb_sectors(bs);
3543
3544 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
06207b0f 3545 assert(!bdrv_dirty_bitmap_frozen(bitmap));
ce1ffea8 3546 hbitmap_truncate(bitmap->bitmap, size);
5270b6a0 3547 bitmap->size = size;
ce1ffea8
JS
3548 }
3549}
3550
e4654d2d
FZ
3551void bdrv_release_dirty_bitmap(BlockDriverState *bs, BdrvDirtyBitmap *bitmap)
3552{
3553 BdrvDirtyBitmap *bm, *next;
3554 QLIST_FOREACH_SAFE(bm, &bs->dirty_bitmaps, list, next) {
3555 if (bm == bitmap) {
9bd2b08f 3556 assert(!bdrv_dirty_bitmap_frozen(bm));
e4654d2d
FZ
3557 QLIST_REMOVE(bitmap, list);
3558 hbitmap_free(bitmap->bitmap);
0db6e54a 3559 g_free(bitmap->name);
e4654d2d
FZ
3560 g_free(bitmap);
3561 return;
a55eb92c 3562 }
7cd1e32a
LS
3563 }
3564}
3565
b8e6fb75
JS
3566void bdrv_disable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3567{
9bd2b08f 3568 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3569 bitmap->disabled = true;
3570}
3571
3572void bdrv_enable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3573{
9bd2b08f 3574 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3575 bitmap->disabled = false;
3576}
3577
21b56835
FZ
3578BlockDirtyInfoList *bdrv_query_dirty_bitmaps(BlockDriverState *bs)
3579{
3580 BdrvDirtyBitmap *bm;
3581 BlockDirtyInfoList *list = NULL;
3582 BlockDirtyInfoList **plist = &list;
3583
3584 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
5839e53b
MA
3585 BlockDirtyInfo *info = g_new0(BlockDirtyInfo, 1);
3586 BlockDirtyInfoList *entry = g_new0(BlockDirtyInfoList, 1);
20dca810 3587 info->count = bdrv_get_dirty_count(bm);
592fdd02 3588 info->granularity = bdrv_dirty_bitmap_granularity(bm);
0db6e54a
FZ
3589 info->has_name = !!bm->name;
3590 info->name = g_strdup(bm->name);
9abe3bdc 3591 info->status = bdrv_dirty_bitmap_status(bm);
21b56835
FZ
3592 entry->value = info;
3593 *plist = entry;
3594 plist = &entry->next;
3595 }
3596
3597 return list;
3598}
3599
e4654d2d 3600int bdrv_get_dirty(BlockDriverState *bs, BdrvDirtyBitmap *bitmap, int64_t sector)
7cd1e32a 3601{
e4654d2d
FZ
3602 if (bitmap) {
3603 return hbitmap_get(bitmap->bitmap, sector);
7cd1e32a
LS
3604 } else {
3605 return 0;
3606 }
3607}
3608
341ebc2f
JS
3609/**
3610 * Chooses a default granularity based on the existing cluster size,
3611 * but clamped between [4K, 64K]. Defaults to 64K in the case that there
3612 * is no cluster size information available.
3613 */
3614uint32_t bdrv_get_default_bitmap_granularity(BlockDriverState *bs)
3615{
3616 BlockDriverInfo bdi;
3617 uint32_t granularity;
3618
3619 if (bdrv_get_info(bs, &bdi) >= 0 && bdi.cluster_size > 0) {
3620 granularity = MAX(4096, bdi.cluster_size);
3621 granularity = MIN(65536, granularity);
3622 } else {
3623 granularity = 65536;
3624 }
3625
3626 return granularity;
3627}
3628
592fdd02
JS
3629uint32_t bdrv_dirty_bitmap_granularity(BdrvDirtyBitmap *bitmap)
3630{
3631 return BDRV_SECTOR_SIZE << hbitmap_granularity(bitmap->bitmap);
3632}
3633
20dca810 3634void bdrv_dirty_iter_init(BdrvDirtyBitmap *bitmap, HBitmapIter *hbi)
1755da16 3635{
e4654d2d 3636 hbitmap_iter_init(hbi, bitmap->bitmap, 0);
1755da16
PB
3637}
3638
20dca810 3639void bdrv_set_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3640 int64_t cur_sector, int nr_sectors)
3641{
b8e6fb75 3642 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3643 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3644}
3645
20dca810 3646void bdrv_reset_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3647 int64_t cur_sector, int nr_sectors)
3648{
b8e6fb75 3649 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3650 hbitmap_reset(bitmap->bitmap, cur_sector, nr_sectors);
3651}
3652
df9a681d 3653void bdrv_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap, HBitmap **out)
e74e6b78
JS
3654{
3655 assert(bdrv_dirty_bitmap_enabled(bitmap));
df9a681d
FZ
3656 if (!out) {
3657 hbitmap_reset_all(bitmap->bitmap);
3658 } else {
3659 HBitmap *backup = bitmap->bitmap;
3660 bitmap->bitmap = hbitmap_alloc(bitmap->size,
3661 hbitmap_granularity(backup));
3662 *out = backup;
3663 }
3664}
3665
3666void bdrv_undo_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap, HBitmap *in)
3667{
3668 HBitmap *tmp = bitmap->bitmap;
3669 assert(bdrv_dirty_bitmap_enabled(bitmap));
3670 bitmap->bitmap = in;
3671 hbitmap_free(tmp);
e74e6b78
JS
3672}
3673
e0c47b6c
SH
3674void bdrv_set_dirty(BlockDriverState *bs, int64_t cur_sector,
3675 int nr_sectors)
1755da16 3676{
e4654d2d
FZ
3677 BdrvDirtyBitmap *bitmap;
3678 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
b8e6fb75
JS
3679 if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3680 continue;
3681 }
e4654d2d
FZ
3682 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3683 }
1755da16
PB
3684}
3685
d58d8453
JS
3686/**
3687 * Advance an HBitmapIter to an arbitrary offset.
3688 */
3689void bdrv_set_dirty_iter(HBitmapIter *hbi, int64_t offset)
3690{
3691 assert(hbi->hb);
3692 hbitmap_iter_init(hbi, hbi->hb, offset);
3693}
3694
20dca810 3695int64_t bdrv_get_dirty_count(BdrvDirtyBitmap *bitmap)
aaa0eb75 3696{
e4654d2d 3697 return hbitmap_count(bitmap->bitmap);
aaa0eb75 3698}
f88e1a42 3699
9fcb0251
FZ
3700/* Get a reference to bs */
3701void bdrv_ref(BlockDriverState *bs)
3702{
3703 bs->refcnt++;
3704}
3705
3706/* Release a previously grabbed reference to bs.
3707 * If after releasing, reference count is zero, the BlockDriverState is
3708 * deleted. */
3709void bdrv_unref(BlockDriverState *bs)
3710{
9a4d5ca6
JC
3711 if (!bs) {
3712 return;
3713 }
9fcb0251
FZ
3714 assert(bs->refcnt > 0);
3715 if (--bs->refcnt == 0) {
3716 bdrv_delete(bs);
3717 }
3718}
3719
fbe40ff7
FZ
3720struct BdrvOpBlocker {
3721 Error *reason;
3722 QLIST_ENTRY(BdrvOpBlocker) list;
3723};
3724
3725bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
3726{
3727 BdrvOpBlocker *blocker;
3728 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3729 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
3730 blocker = QLIST_FIRST(&bs->op_blockers[op]);
3731 if (errp) {
81e5f78a
AG
3732 error_setg(errp, "Node '%s' is busy: %s",
3733 bdrv_get_device_or_node_name(bs),
bfb197e0 3734 error_get_pretty(blocker->reason));
fbe40ff7
FZ
3735 }
3736 return true;
3737 }
3738 return false;
3739}
3740
3741void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
3742{
3743 BdrvOpBlocker *blocker;
3744 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3745
5839e53b 3746 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
3747 blocker->reason = reason;
3748 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
3749}
3750
3751void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
3752{
3753 BdrvOpBlocker *blocker, *next;
3754 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3755 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
3756 if (blocker->reason == reason) {
3757 QLIST_REMOVE(blocker, list);
3758 g_free(blocker);
3759 }
3760 }
3761}
3762
3763void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
3764{
3765 int i;
3766 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3767 bdrv_op_block(bs, i, reason);
3768 }
3769}
3770
3771void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
3772{
3773 int i;
3774 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3775 bdrv_op_unblock(bs, i, reason);
3776 }
3777}
3778
3779bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
3780{
3781 int i;
3782
3783 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3784 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
3785 return false;
3786 }
3787 }
3788 return true;
3789}
3790
d92ada22
LC
3791void bdrv_img_create(const char *filename, const char *fmt,
3792 const char *base_filename, const char *base_fmt,
f382d43a
MR
3793 char *options, uint64_t img_size, int flags,
3794 Error **errp, bool quiet)
f88e1a42 3795{
83d0521a
CL
3796 QemuOptsList *create_opts = NULL;
3797 QemuOpts *opts = NULL;
3798 const char *backing_fmt, *backing_file;
3799 int64_t size;
f88e1a42 3800 BlockDriver *drv, *proto_drv;
cc84d90f 3801 Error *local_err = NULL;
f88e1a42
JS
3802 int ret = 0;
3803
3804 /* Find driver and parse its options */
3805 drv = bdrv_find_format(fmt);
3806 if (!drv) {
71c79813 3807 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 3808 return;
f88e1a42
JS
3809 }
3810
b65a5e12 3811 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 3812 if (!proto_drv) {
d92ada22 3813 return;
f88e1a42
JS
3814 }
3815
c6149724
HR
3816 if (!drv->create_opts) {
3817 error_setg(errp, "Format driver '%s' does not support image creation",
3818 drv->format_name);
3819 return;
3820 }
3821
3822 if (!proto_drv->create_opts) {
3823 error_setg(errp, "Protocol driver '%s' does not support image creation",
3824 proto_drv->format_name);
3825 return;
3826 }
3827
c282e1fd
CL
3828 create_opts = qemu_opts_append(create_opts, drv->create_opts);
3829 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
3830
3831 /* Create parameter list with default values */
83d0521a 3832 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 3833 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
3834
3835 /* Parse -o options */
3836 if (options) {
dc523cd3
MA
3837 qemu_opts_do_parse(opts, options, NULL, &local_err);
3838 if (local_err) {
3839 error_report_err(local_err);
3840 local_err = NULL;
83d0521a 3841 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
3842 goto out;
3843 }
3844 }
3845
3846 if (base_filename) {
f43e47db 3847 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 3848 if (local_err) {
71c79813
LC
3849 error_setg(errp, "Backing file not supported for file format '%s'",
3850 fmt);
f88e1a42
JS
3851 goto out;
3852 }
3853 }
3854
3855 if (base_fmt) {
f43e47db 3856 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 3857 if (local_err) {
71c79813
LC
3858 error_setg(errp, "Backing file format not supported for file "
3859 "format '%s'", fmt);
f88e1a42
JS
3860 goto out;
3861 }
3862 }
3863
83d0521a
CL
3864 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
3865 if (backing_file) {
3866 if (!strcmp(filename, backing_file)) {
71c79813
LC
3867 error_setg(errp, "Error: Trying to create an image with the "
3868 "same filename as the backing file");
792da93a
JS
3869 goto out;
3870 }
3871 }
3872
83d0521a 3873 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42
JS
3874
3875 // The size for the image must always be specified, with one exception:
3876 // If we are using a backing file, we can obtain the size from there
83d0521a
CL
3877 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
3878 if (size == -1) {
3879 if (backing_file) {
66f6b814 3880 BlockDriverState *bs;
29168018 3881 char *full_backing = g_new0(char, PATH_MAX);
52bf1e72 3882 int64_t size;
63090dac 3883 int back_flags;
e6641719 3884 QDict *backing_options = NULL;
63090dac 3885
29168018
HR
3886 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
3887 full_backing, PATH_MAX,
3888 &local_err);
3889 if (local_err) {
3890 g_free(full_backing);
3891 goto out;
3892 }
3893
63090dac
PB
3894 /* backing files always opened read-only */
3895 back_flags =
3896 flags & ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 3897
e6641719
HR
3898 if (backing_fmt) {
3899 backing_options = qdict_new();
3900 qdict_put(backing_options, "driver",
3901 qstring_from_str(backing_fmt));
3902 }
3903
f67503e5 3904 bs = NULL;
e6641719 3905 ret = bdrv_open(&bs, full_backing, NULL, backing_options,
6ebf9aa2 3906 back_flags, &local_err);
29168018 3907 g_free(full_backing);
f88e1a42 3908 if (ret < 0) {
f88e1a42
JS
3909 goto out;
3910 }
52bf1e72
MA
3911 size = bdrv_getlength(bs);
3912 if (size < 0) {
3913 error_setg_errno(errp, -size, "Could not get size of '%s'",
3914 backing_file);
3915 bdrv_unref(bs);
3916 goto out;
3917 }
f88e1a42 3918
39101f25 3919 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
66f6b814
HR
3920
3921 bdrv_unref(bs);
f88e1a42 3922 } else {
71c79813 3923 error_setg(errp, "Image creation needs a size parameter");
f88e1a42
JS
3924 goto out;
3925 }
3926 }
3927
f382d43a 3928 if (!quiet) {
fe646693 3929 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 3930 qemu_opts_print(opts, " ");
f382d43a
MR
3931 puts("");
3932 }
83d0521a 3933
c282e1fd 3934 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 3935
cc84d90f
HR
3936 if (ret == -EFBIG) {
3937 /* This is generally a better message than whatever the driver would
3938 * deliver (especially because of the cluster_size_hint), since that
3939 * is most probably not much different from "image too large". */
3940 const char *cluster_size_hint = "";
83d0521a 3941 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 3942 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 3943 }
cc84d90f
HR
3944 error_setg(errp, "The image size is too large for file format '%s'"
3945 "%s", fmt, cluster_size_hint);
3946 error_free(local_err);
3947 local_err = NULL;
f88e1a42
JS
3948 }
3949
3950out:
83d0521a
CL
3951 qemu_opts_del(opts);
3952 qemu_opts_free(create_opts);
84d18f06 3953 if (local_err) {
cc84d90f
HR
3954 error_propagate(errp, local_err);
3955 }
f88e1a42 3956}
85d126f3
SH
3957
3958AioContext *bdrv_get_aio_context(BlockDriverState *bs)
3959{
dcd04228
SH
3960 return bs->aio_context;
3961}
3962
3963void bdrv_detach_aio_context(BlockDriverState *bs)
3964{
33384421
HR
3965 BdrvAioNotifier *baf;
3966
dcd04228
SH
3967 if (!bs->drv) {
3968 return;
3969 }
3970
33384421
HR
3971 QLIST_FOREACH(baf, &bs->aio_notifiers, list) {
3972 baf->detach_aio_context(baf->opaque);
3973 }
3974
a0d64a61 3975 if (bs->throttle_state) {
0e5b0a2d 3976 throttle_timers_detach_aio_context(&bs->throttle_timers);
13af91eb 3977 }
dcd04228
SH
3978 if (bs->drv->bdrv_detach_aio_context) {
3979 bs->drv->bdrv_detach_aio_context(bs);
3980 }
3981 if (bs->file) {
9a4f4c31 3982 bdrv_detach_aio_context(bs->file->bs);
dcd04228 3983 }
760e0063
KW
3984 if (bs->backing) {
3985 bdrv_detach_aio_context(bs->backing->bs);
dcd04228
SH
3986 }
3987
3988 bs->aio_context = NULL;
3989}
3990
3991void bdrv_attach_aio_context(BlockDriverState *bs,
3992 AioContext *new_context)
3993{
33384421
HR
3994 BdrvAioNotifier *ban;
3995
dcd04228
SH
3996 if (!bs->drv) {
3997 return;
3998 }
3999
4000 bs->aio_context = new_context;
4001
760e0063
KW
4002 if (bs->backing) {
4003 bdrv_attach_aio_context(bs->backing->bs, new_context);
dcd04228
SH
4004 }
4005 if (bs->file) {
9a4f4c31 4006 bdrv_attach_aio_context(bs->file->bs, new_context);
dcd04228
SH
4007 }
4008 if (bs->drv->bdrv_attach_aio_context) {
4009 bs->drv->bdrv_attach_aio_context(bs, new_context);
4010 }
a0d64a61 4011 if (bs->throttle_state) {
0e5b0a2d 4012 throttle_timers_attach_aio_context(&bs->throttle_timers, new_context);
13af91eb 4013 }
33384421
HR
4014
4015 QLIST_FOREACH(ban, &bs->aio_notifiers, list) {
4016 ban->attached_aio_context(new_context, ban->opaque);
4017 }
dcd04228
SH
4018}
4019
4020void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
4021{
53ec73e2 4022 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228
SH
4023
4024 bdrv_detach_aio_context(bs);
4025
4026 /* This function executes in the old AioContext so acquire the new one in
4027 * case it runs in a different thread.
4028 */
4029 aio_context_acquire(new_context);
4030 bdrv_attach_aio_context(bs, new_context);
4031 aio_context_release(new_context);
85d126f3 4032}
d616b224 4033
33384421
HR
4034void bdrv_add_aio_context_notifier(BlockDriverState *bs,
4035 void (*attached_aio_context)(AioContext *new_context, void *opaque),
4036 void (*detach_aio_context)(void *opaque), void *opaque)
4037{
4038 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
4039 *ban = (BdrvAioNotifier){
4040 .attached_aio_context = attached_aio_context,
4041 .detach_aio_context = detach_aio_context,
4042 .opaque = opaque
4043 };
4044
4045 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
4046}
4047
4048void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
4049 void (*attached_aio_context)(AioContext *,
4050 void *),
4051 void (*detach_aio_context)(void *),
4052 void *opaque)
4053{
4054 BdrvAioNotifier *ban, *ban_next;
4055
4056 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
4057 if (ban->attached_aio_context == attached_aio_context &&
4058 ban->detach_aio_context == detach_aio_context &&
4059 ban->opaque == opaque)
4060 {
4061 QLIST_REMOVE(ban, list);
4062 g_free(ban);
4063
4064 return;
4065 }
4066 }
4067
4068 abort();
4069}
4070
77485434 4071int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
8b13976d 4072 BlockDriverAmendStatusCB *status_cb, void *cb_opaque)
6f176b48 4073{
c282e1fd 4074 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
4075 return -ENOTSUP;
4076 }
8b13976d 4077 return bs->drv->bdrv_amend_options(bs, opts, status_cb, cb_opaque);
6f176b48 4078}
f6186f49 4079
b5042a36
BC
4080/* This function will be called by the bdrv_recurse_is_first_non_filter method
4081 * of block filter and by bdrv_is_first_non_filter.
4082 * It is used to test if the given bs is the candidate or recurse more in the
4083 * node graph.
212a5a8f 4084 */
b5042a36 4085bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 4086 BlockDriverState *candidate)
f6186f49 4087{
b5042a36
BC
4088 /* return false if basic checks fails */
4089 if (!bs || !bs->drv) {
212a5a8f 4090 return false;
f6186f49
BC
4091 }
4092
b5042a36
BC
4093 /* the code reached a non block filter driver -> check if the bs is
4094 * the same as the candidate. It's the recursion termination condition.
4095 */
4096 if (!bs->drv->is_filter) {
4097 return bs == candidate;
212a5a8f 4098 }
b5042a36 4099 /* Down this path the driver is a block filter driver */
212a5a8f 4100
b5042a36
BC
4101 /* If the block filter recursion method is defined use it to recurse down
4102 * the node graph.
4103 */
4104 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 4105 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
4106 }
4107
b5042a36
BC
4108 /* the driver is a block filter but don't allow to recurse -> return false
4109 */
4110 return false;
f6186f49
BC
4111}
4112
212a5a8f
BC
4113/* This function checks if the candidate is the first non filter bs down it's
4114 * bs chain. Since we don't have pointers to parents it explore all bs chains
4115 * from the top. Some filters can choose not to pass down the recursion.
4116 */
4117bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 4118{
212a5a8f
BC
4119 BlockDriverState *bs;
4120
4121 /* walk down the bs forest recursively */
4122 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
4123 bool perm;
4124
b5042a36 4125 /* try to recurse in this top level bs */
e6dc8a1f 4126 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
4127
4128 /* candidate is the first non filter */
4129 if (perm) {
4130 return true;
4131 }
4132 }
4133
4134 return false;
f6186f49 4135}
09158f00 4136
e12f3784
WC
4137BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
4138 const char *node_name, Error **errp)
09158f00
BC
4139{
4140 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
4141 AioContext *aio_context;
4142
09158f00
BC
4143 if (!to_replace_bs) {
4144 error_setg(errp, "Node name '%s' not found", node_name);
4145 return NULL;
4146 }
4147
5a7e7a0b
SH
4148 aio_context = bdrv_get_aio_context(to_replace_bs);
4149 aio_context_acquire(aio_context);
4150
09158f00 4151 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
4152 to_replace_bs = NULL;
4153 goto out;
09158f00
BC
4154 }
4155
4156 /* We don't want arbitrary node of the BDS chain to be replaced only the top
4157 * most non filter in order to prevent data corruption.
4158 * Another benefit is that this tests exclude backing files which are
4159 * blocked by the backing blockers.
4160 */
e12f3784 4161 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 4162 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
4163 to_replace_bs = NULL;
4164 goto out;
09158f00
BC
4165 }
4166
5a7e7a0b
SH
4167out:
4168 aio_context_release(aio_context);
09158f00
BC
4169 return to_replace_bs;
4170}
448ad91d 4171
91af7014
HR
4172static bool append_open_options(QDict *d, BlockDriverState *bs)
4173{
4174 const QDictEntry *entry;
9e700c1a 4175 QemuOptDesc *desc;
260fecf1 4176 BdrvChild *child;
91af7014 4177 bool found_any = false;
260fecf1 4178 const char *p;
91af7014
HR
4179
4180 for (entry = qdict_first(bs->options); entry;
4181 entry = qdict_next(bs->options, entry))
4182 {
260fecf1
KW
4183 /* Exclude options for children */
4184 QLIST_FOREACH(child, &bs->children, next) {
4185 if (strstart(qdict_entry_key(entry), child->name, &p)
4186 && (!*p || *p == '.'))
4187 {
4188 break;
4189 }
4190 }
4191 if (child) {
9e700c1a 4192 continue;
91af7014 4193 }
9e700c1a
KW
4194
4195 /* And exclude all non-driver-specific options */
4196 for (desc = bdrv_runtime_opts.desc; desc->name; desc++) {
4197 if (!strcmp(qdict_entry_key(entry), desc->name)) {
4198 break;
4199 }
4200 }
4201 if (desc->name) {
4202 continue;
4203 }
4204
4205 qobject_incref(qdict_entry_value(entry));
4206 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
4207 found_any = true;
91af7014
HR
4208 }
4209
4210 return found_any;
4211}
4212
4213/* Updates the following BDS fields:
4214 * - exact_filename: A filename which may be used for opening a block device
4215 * which (mostly) equals the given BDS (even without any
4216 * other options; so reading and writing must return the same
4217 * results, but caching etc. may be different)
4218 * - full_open_options: Options which, when given when opening a block device
4219 * (without a filename), result in a BDS (mostly)
4220 * equalling the given one
4221 * - filename: If exact_filename is set, it is copied here. Otherwise,
4222 * full_open_options is converted to a JSON object, prefixed with
4223 * "json:" (for use through the JSON pseudo protocol) and put here.
4224 */
4225void bdrv_refresh_filename(BlockDriverState *bs)
4226{
4227 BlockDriver *drv = bs->drv;
4228 QDict *opts;
4229
4230 if (!drv) {
4231 return;
4232 }
4233
4234 /* This BDS's file name will most probably depend on its file's name, so
4235 * refresh that first */
4236 if (bs->file) {
9a4f4c31 4237 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
4238 }
4239
4240 if (drv->bdrv_refresh_filename) {
4241 /* Obsolete information is of no use here, so drop the old file name
4242 * information before refreshing it */
4243 bs->exact_filename[0] = '\0';
4244 if (bs->full_open_options) {
4245 QDECREF(bs->full_open_options);
4246 bs->full_open_options = NULL;
4247 }
4248
4cdd01d3
KW
4249 opts = qdict_new();
4250 append_open_options(opts, bs);
4251 drv->bdrv_refresh_filename(bs, opts);
4252 QDECREF(opts);
91af7014
HR
4253 } else if (bs->file) {
4254 /* Try to reconstruct valid information from the underlying file */
4255 bool has_open_options;
4256
4257 bs->exact_filename[0] = '\0';
4258 if (bs->full_open_options) {
4259 QDECREF(bs->full_open_options);
4260 bs->full_open_options = NULL;
4261 }
4262
4263 opts = qdict_new();
4264 has_open_options = append_open_options(opts, bs);
4265
4266 /* If no specific options have been given for this BDS, the filename of
4267 * the underlying file should suffice for this one as well */
9a4f4c31
KW
4268 if (bs->file->bs->exact_filename[0] && !has_open_options) {
4269 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
4270 }
4271 /* Reconstructing the full options QDict is simple for most format block
4272 * drivers, as long as the full options are known for the underlying
4273 * file BDS. The full options QDict of that file BDS should somehow
4274 * contain a representation of the filename, therefore the following
4275 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 4276 if (bs->file->bs->full_open_options) {
91af7014
HR
4277 qdict_put_obj(opts, "driver",
4278 QOBJECT(qstring_from_str(drv->format_name)));
9a4f4c31
KW
4279 QINCREF(bs->file->bs->full_open_options);
4280 qdict_put_obj(opts, "file",
4281 QOBJECT(bs->file->bs->full_open_options));
91af7014
HR
4282
4283 bs->full_open_options = opts;
4284 } else {
4285 QDECREF(opts);
4286 }
4287 } else if (!bs->full_open_options && qdict_size(bs->options)) {
4288 /* There is no underlying file BDS (at least referenced by BDS.file),
4289 * so the full options QDict should be equal to the options given
4290 * specifically for this block device when it was opened (plus the
4291 * driver specification).
4292 * Because those options don't change, there is no need to update
4293 * full_open_options when it's already set. */
4294
4295 opts = qdict_new();
4296 append_open_options(opts, bs);
4297 qdict_put_obj(opts, "driver",
4298 QOBJECT(qstring_from_str(drv->format_name)));
4299
4300 if (bs->exact_filename[0]) {
4301 /* This may not work for all block protocol drivers (some may
4302 * require this filename to be parsed), but we have to find some
4303 * default solution here, so just include it. If some block driver
4304 * does not support pure options without any filename at all or
4305 * needs some special format of the options QDict, it needs to
4306 * implement the driver-specific bdrv_refresh_filename() function.
4307 */
4308 qdict_put_obj(opts, "filename",
4309 QOBJECT(qstring_from_str(bs->exact_filename)));
4310 }
4311
4312 bs->full_open_options = opts;
4313 }
4314
4315 if (bs->exact_filename[0]) {
4316 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4317 } else if (bs->full_open_options) {
4318 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4319 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4320 qstring_get_str(json));
4321 QDECREF(json);
4322 }
4323}