]> git.ipfire.org Git - thirdparty/qemu.git/blame - block.c
block: Introduce parents list
[thirdparty/qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
3990d09a 24#include "config-host.h"
faf07963 25#include "qemu-common.h"
6d519a5f 26#include "trace.h"
737e150e
PB
27#include "block/block_int.h"
28#include "block/blockjob.h"
d49b6836 29#include "qemu/error-report.h"
1de7afc9 30#include "qemu/module.h"
cc7a8ea7 31#include "qapi/qmp/qerror.h"
7b1b5d19 32#include "qapi/qmp/qjson.h"
bfb197e0 33#include "sysemu/block-backend.h"
9c17d615 34#include "sysemu/sysemu.h"
1de7afc9 35#include "qemu/notify.h"
737e150e 36#include "block/coroutine.h"
c13163fb 37#include "block/qapi.h"
b2023818 38#include "qmp-commands.h"
1de7afc9 39#include "qemu/timer.h"
a5ee7bd4 40#include "qapi-event.h"
db628338 41#include "block/throttle-groups.h"
fc01f7e7 42
71e72a19 43#ifdef CONFIG_BSD
7674e7bf
FB
44#include <sys/types.h>
45#include <sys/stat.h>
46#include <sys/ioctl.h>
72cf2d4f 47#include <sys/queue.h>
c5e97233 48#ifndef __DragonFly__
7674e7bf
FB
49#include <sys/disk.h>
50#endif
c5e97233 51#endif
7674e7bf 52
49dc768d
AL
53#ifdef _WIN32
54#include <windows.h>
55#endif
56
9bd2b08f
JS
57/**
58 * A BdrvDirtyBitmap can be in three possible states:
59 * (1) successor is NULL and disabled is false: full r/w mode
60 * (2) successor is NULL and disabled is true: read only mode ("disabled")
61 * (3) successor is set: frozen mode.
62 * A frozen bitmap cannot be renamed, deleted, anonymized, cleared, set,
63 * or enabled. A frozen bitmap can only abdicate() or reclaim().
64 */
e4654d2d 65struct BdrvDirtyBitmap {
aa0c7ca5
JS
66 HBitmap *bitmap; /* Dirty sector bitmap implementation */
67 BdrvDirtyBitmap *successor; /* Anonymous child; implies frozen status */
68 char *name; /* Optional non-empty unique ID */
69 int64_t size; /* Size of the bitmap (Number of sectors) */
70 bool disabled; /* Bitmap is read-only */
e4654d2d
FZ
71 QLIST_ENTRY(BdrvDirtyBitmap) list;
72};
73
1c9805a3
SH
74#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
75
1b7bdbc1
SH
76static QTAILQ_HEAD(, BlockDriverState) bdrv_states =
77 QTAILQ_HEAD_INITIALIZER(bdrv_states);
7ee930d0 78
dc364f4c
BC
79static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
80 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
81
8a22f02a
SH
82static QLIST_HEAD(, BlockDriver) bdrv_drivers =
83 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 84
f3930ed0
KW
85static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
86 const char *reference, QDict *options, int flags,
87 BlockDriverState *parent,
ce343771 88 const BdrvChildRole *child_role, Error **errp);
f3930ed0 89
ce1ffea8 90static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs);
eb852011
MA
91/* If non-zero, use only whitelisted block drivers */
92static int use_bdrv_whitelist;
93
9e0b22f4
SH
94#ifdef _WIN32
95static int is_windows_drive_prefix(const char *filename)
96{
97 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
98 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
99 filename[1] == ':');
100}
101
102int is_windows_drive(const char *filename)
103{
104 if (is_windows_drive_prefix(filename) &&
105 filename[2] == '\0')
106 return 1;
107 if (strstart(filename, "\\\\.\\", NULL) ||
108 strstart(filename, "//./", NULL))
109 return 1;
110 return 0;
111}
112#endif
113
339064d5
KW
114size_t bdrv_opt_mem_align(BlockDriverState *bs)
115{
116 if (!bs || !bs->drv) {
459b4e66
DL
117 /* page size or 4k (hdd sector size) should be on the safe side */
118 return MAX(4096, getpagesize());
339064d5
KW
119 }
120
121 return bs->bl.opt_mem_alignment;
122}
123
4196d2f0
DL
124size_t bdrv_min_mem_align(BlockDriverState *bs)
125{
126 if (!bs || !bs->drv) {
459b4e66
DL
127 /* page size or 4k (hdd sector size) should be on the safe side */
128 return MAX(4096, getpagesize());
4196d2f0
DL
129 }
130
131 return bs->bl.min_mem_alignment;
132}
133
9e0b22f4 134/* check if the path starts with "<protocol>:" */
5c98415b 135int path_has_protocol(const char *path)
9e0b22f4 136{
947995c0
PB
137 const char *p;
138
9e0b22f4
SH
139#ifdef _WIN32
140 if (is_windows_drive(path) ||
141 is_windows_drive_prefix(path)) {
142 return 0;
143 }
947995c0
PB
144 p = path + strcspn(path, ":/\\");
145#else
146 p = path + strcspn(path, ":/");
9e0b22f4
SH
147#endif
148
947995c0 149 return *p == ':';
9e0b22f4
SH
150}
151
83f64091 152int path_is_absolute(const char *path)
3b0d4f61 153{
21664424
FB
154#ifdef _WIN32
155 /* specific case for names like: "\\.\d:" */
f53f4da9 156 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 157 return 1;
f53f4da9
PB
158 }
159 return (*path == '/' || *path == '\\');
3b9f94e1 160#else
f53f4da9 161 return (*path == '/');
3b9f94e1 162#endif
3b0d4f61
FB
163}
164
83f64091
FB
165/* if filename is absolute, just copy it to dest. Otherwise, build a
166 path to it by considering it is relative to base_path. URL are
167 supported. */
168void path_combine(char *dest, int dest_size,
169 const char *base_path,
170 const char *filename)
3b0d4f61 171{
83f64091
FB
172 const char *p, *p1;
173 int len;
174
175 if (dest_size <= 0)
176 return;
177 if (path_is_absolute(filename)) {
178 pstrcpy(dest, dest_size, filename);
179 } else {
180 p = strchr(base_path, ':');
181 if (p)
182 p++;
183 else
184 p = base_path;
3b9f94e1
FB
185 p1 = strrchr(base_path, '/');
186#ifdef _WIN32
187 {
188 const char *p2;
189 p2 = strrchr(base_path, '\\');
190 if (!p1 || p2 > p1)
191 p1 = p2;
192 }
193#endif
83f64091
FB
194 if (p1)
195 p1++;
196 else
197 p1 = base_path;
198 if (p1 > p)
199 p = p1;
200 len = p - base_path;
201 if (len > dest_size - 1)
202 len = dest_size - 1;
203 memcpy(dest, base_path, len);
204 dest[len] = '\0';
205 pstrcat(dest, dest_size, filename);
3b0d4f61 206 }
3b0d4f61
FB
207}
208
0a82855a
HR
209void bdrv_get_full_backing_filename_from_filename(const char *backed,
210 const char *backing,
9f07429e
HR
211 char *dest, size_t sz,
212 Error **errp)
dc5a1371 213{
9f07429e
HR
214 if (backing[0] == '\0' || path_has_protocol(backing) ||
215 path_is_absolute(backing))
216 {
0a82855a 217 pstrcpy(dest, sz, backing);
9f07429e
HR
218 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
219 error_setg(errp, "Cannot use relative backing file names for '%s'",
220 backed);
dc5a1371 221 } else {
0a82855a 222 path_combine(dest, sz, backed, backing);
dc5a1371
PB
223 }
224}
225
9f07429e
HR
226void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
227 Error **errp)
0a82855a 228{
9f07429e
HR
229 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
230
231 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
232 dest, sz, errp);
0a82855a
HR
233}
234
0eb7217e
SH
235void bdrv_register(BlockDriver *bdrv)
236{
237 bdrv_setup_io_funcs(bdrv);
b2e12bc6 238
8a22f02a 239 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 240}
b338082b 241
7f06d47e 242BlockDriverState *bdrv_new_root(void)
b338082b 243{
7f06d47e 244 BlockDriverState *bs = bdrv_new();
e4e9986b 245
e4e9986b 246 QTAILQ_INSERT_TAIL(&bdrv_states, bs, device_list);
e4e9986b
MA
247 return bs;
248}
249
250BlockDriverState *bdrv_new(void)
251{
252 BlockDriverState *bs;
253 int i;
254
5839e53b 255 bs = g_new0(BlockDriverState, 1);
e4654d2d 256 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
257 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
258 QLIST_INIT(&bs->op_blockers[i]);
259 }
28a7282a 260 bdrv_iostatus_disable(bs);
d7d512f6 261 notifier_list_init(&bs->close_notifiers);
d616b224 262 notifier_with_return_list_init(&bs->before_write_notifiers);
cc0681c4
BC
263 qemu_co_queue_init(&bs->throttled_reqs[0]);
264 qemu_co_queue_init(&bs->throttled_reqs[1]);
9fcb0251 265 bs->refcnt = 1;
dcd04228 266 bs->aio_context = qemu_get_aio_context();
d7d512f6 267
b338082b
FB
268 return bs;
269}
270
d7d512f6
PB
271void bdrv_add_close_notifier(BlockDriverState *bs, Notifier *notify)
272{
273 notifier_list_add(&bs->close_notifiers, notify);
274}
275
ea2384d3
FB
276BlockDriver *bdrv_find_format(const char *format_name)
277{
278 BlockDriver *drv1;
8a22f02a
SH
279 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
280 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 281 return drv1;
8a22f02a 282 }
ea2384d3
FB
283 }
284 return NULL;
285}
286
b64ec4e4 287static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 288{
b64ec4e4
FZ
289 static const char *whitelist_rw[] = {
290 CONFIG_BDRV_RW_WHITELIST
291 };
292 static const char *whitelist_ro[] = {
293 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
294 };
295 const char **p;
296
b64ec4e4 297 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 298 return 1; /* no whitelist, anything goes */
b64ec4e4 299 }
eb852011 300
b64ec4e4 301 for (p = whitelist_rw; *p; p++) {
eb852011
MA
302 if (!strcmp(drv->format_name, *p)) {
303 return 1;
304 }
305 }
b64ec4e4
FZ
306 if (read_only) {
307 for (p = whitelist_ro; *p; p++) {
308 if (!strcmp(drv->format_name, *p)) {
309 return 1;
310 }
311 }
312 }
eb852011
MA
313 return 0;
314}
315
5b7e1542
ZYW
316typedef struct CreateCo {
317 BlockDriver *drv;
318 char *filename;
83d0521a 319 QemuOpts *opts;
5b7e1542 320 int ret;
cc84d90f 321 Error *err;
5b7e1542
ZYW
322} CreateCo;
323
324static void coroutine_fn bdrv_create_co_entry(void *opaque)
325{
cc84d90f
HR
326 Error *local_err = NULL;
327 int ret;
328
5b7e1542
ZYW
329 CreateCo *cco = opaque;
330 assert(cco->drv);
331
c282e1fd 332 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
84d18f06 333 if (local_err) {
cc84d90f
HR
334 error_propagate(&cco->err, local_err);
335 }
336 cco->ret = ret;
5b7e1542
ZYW
337}
338
0e7e1989 339int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 340 QemuOpts *opts, Error **errp)
ea2384d3 341{
5b7e1542
ZYW
342 int ret;
343
344 Coroutine *co;
345 CreateCo cco = {
346 .drv = drv,
347 .filename = g_strdup(filename),
83d0521a 348 .opts = opts,
5b7e1542 349 .ret = NOT_DONE,
cc84d90f 350 .err = NULL,
5b7e1542
ZYW
351 };
352
c282e1fd 353 if (!drv->bdrv_create) {
cc84d90f 354 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
355 ret = -ENOTSUP;
356 goto out;
5b7e1542
ZYW
357 }
358
359 if (qemu_in_coroutine()) {
360 /* Fast-path if already in coroutine context */
361 bdrv_create_co_entry(&cco);
362 } else {
363 co = qemu_coroutine_create(bdrv_create_co_entry);
364 qemu_coroutine_enter(co, &cco);
365 while (cco.ret == NOT_DONE) {
b47ec2c4 366 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
367 }
368 }
369
370 ret = cco.ret;
cc84d90f 371 if (ret < 0) {
84d18f06 372 if (cco.err) {
cc84d90f
HR
373 error_propagate(errp, cco.err);
374 } else {
375 error_setg_errno(errp, -ret, "Could not create image");
376 }
377 }
0e7e1989 378
80168bff
LC
379out:
380 g_free(cco.filename);
5b7e1542 381 return ret;
ea2384d3
FB
382}
383
c282e1fd 384int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
385{
386 BlockDriver *drv;
cc84d90f
HR
387 Error *local_err = NULL;
388 int ret;
84a12e66 389
b65a5e12 390 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 391 if (drv == NULL) {
16905d71 392 return -ENOENT;
84a12e66
CH
393 }
394
c282e1fd 395 ret = bdrv_create(drv, filename, opts, &local_err);
84d18f06 396 if (local_err) {
cc84d90f
HR
397 error_propagate(errp, local_err);
398 }
399 return ret;
84a12e66
CH
400}
401
892b7de8
ET
402/**
403 * Try to get @bs's logical and physical block size.
404 * On success, store them in @bsz struct and return 0.
405 * On failure return -errno.
406 * @bs must not be empty.
407 */
408int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
409{
410 BlockDriver *drv = bs->drv;
411
412 if (drv && drv->bdrv_probe_blocksizes) {
413 return drv->bdrv_probe_blocksizes(bs, bsz);
414 }
415
416 return -ENOTSUP;
417}
418
419/**
420 * Try to get @bs's geometry (cyls, heads, sectors).
421 * On success, store them in @geo struct and return 0.
422 * On failure return -errno.
423 * @bs must not be empty.
424 */
425int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
426{
427 BlockDriver *drv = bs->drv;
428
429 if (drv && drv->bdrv_probe_geometry) {
430 return drv->bdrv_probe_geometry(bs, geo);
431 }
432
433 return -ENOTSUP;
434}
435
eba25057
JM
436/*
437 * Create a uniquely-named empty temporary file.
438 * Return 0 upon success, otherwise a negative errno value.
439 */
440int get_tmp_filename(char *filename, int size)
d5249393 441{
eba25057 442#ifdef _WIN32
3b9f94e1 443 char temp_dir[MAX_PATH];
eba25057
JM
444 /* GetTempFileName requires that its output buffer (4th param)
445 have length MAX_PATH or greater. */
446 assert(size >= MAX_PATH);
447 return (GetTempPath(MAX_PATH, temp_dir)
448 && GetTempFileName(temp_dir, "qem", 0, filename)
449 ? 0 : -GetLastError());
d5249393 450#else
67b915a5 451 int fd;
7ccfb2eb 452 const char *tmpdir;
0badc1ee 453 tmpdir = getenv("TMPDIR");
69bef793
AS
454 if (!tmpdir) {
455 tmpdir = "/var/tmp";
456 }
eba25057
JM
457 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
458 return -EOVERFLOW;
459 }
ea2384d3 460 fd = mkstemp(filename);
fe235a06
DH
461 if (fd < 0) {
462 return -errno;
463 }
464 if (close(fd) != 0) {
465 unlink(filename);
eba25057
JM
466 return -errno;
467 }
468 return 0;
d5249393 469#endif
eba25057 470}
fc01f7e7 471
84a12e66
CH
472/*
473 * Detect host devices. By convention, /dev/cdrom[N] is always
474 * recognized as a host CDROM.
475 */
476static BlockDriver *find_hdev_driver(const char *filename)
477{
478 int score_max = 0, score;
479 BlockDriver *drv = NULL, *d;
480
481 QLIST_FOREACH(d, &bdrv_drivers, list) {
482 if (d->bdrv_probe_device) {
483 score = d->bdrv_probe_device(filename);
484 if (score > score_max) {
485 score_max = score;
486 drv = d;
487 }
488 }
489 }
490
491 return drv;
492}
493
98289620 494BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
495 bool allow_protocol_prefix,
496 Error **errp)
83f64091
FB
497{
498 BlockDriver *drv1;
499 char protocol[128];
1cec71e3 500 int len;
83f64091 501 const char *p;
19cb3738 502
66f82cee
KW
503 /* TODO Drivers without bdrv_file_open must be specified explicitly */
504
39508e7a
CH
505 /*
506 * XXX(hch): we really should not let host device detection
507 * override an explicit protocol specification, but moving this
508 * later breaks access to device names with colons in them.
509 * Thanks to the brain-dead persistent naming schemes on udev-
510 * based Linux systems those actually are quite common.
511 */
512 drv1 = find_hdev_driver(filename);
513 if (drv1) {
514 return drv1;
515 }
516
98289620 517 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 518 return &bdrv_file;
84a12e66 519 }
98289620 520
9e0b22f4
SH
521 p = strchr(filename, ':');
522 assert(p != NULL);
1cec71e3
AL
523 len = p - filename;
524 if (len > sizeof(protocol) - 1)
525 len = sizeof(protocol) - 1;
526 memcpy(protocol, filename, len);
527 protocol[len] = '\0';
8a22f02a 528 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
5fafdf24 529 if (drv1->protocol_name &&
8a22f02a 530 !strcmp(drv1->protocol_name, protocol)) {
83f64091 531 return drv1;
8a22f02a 532 }
83f64091 533 }
b65a5e12
HR
534
535 error_setg(errp, "Unknown protocol '%s'", protocol);
83f64091
FB
536 return NULL;
537}
538
c6684249
MA
539/*
540 * Guess image format by probing its contents.
541 * This is not a good idea when your image is raw (CVE-2008-2004), but
542 * we do it anyway for backward compatibility.
543 *
544 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
545 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
546 * but can be smaller if the image file is smaller)
c6684249
MA
547 * @filename is its filename.
548 *
549 * For all block drivers, call the bdrv_probe() method to get its
550 * probing score.
551 * Return the first block driver with the highest probing score.
552 */
38f3ef57
KW
553BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
554 const char *filename)
c6684249
MA
555{
556 int score_max = 0, score;
557 BlockDriver *drv = NULL, *d;
558
559 QLIST_FOREACH(d, &bdrv_drivers, list) {
560 if (d->bdrv_probe) {
561 score = d->bdrv_probe(buf, buf_size, filename);
562 if (score > score_max) {
563 score_max = score;
564 drv = d;
565 }
566 }
567 }
568
569 return drv;
570}
571
f500a6d3 572static int find_image_format(BlockDriverState *bs, const char *filename,
34b5d2c6 573 BlockDriver **pdrv, Error **errp)
f3a5d3f8 574{
c6684249 575 BlockDriver *drv;
7cddd372 576 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 577 int ret = 0;
f8ea0b00 578
08a00559 579 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
b192af8a 580 if (bdrv_is_sg(bs) || !bdrv_is_inserted(bs) || bdrv_getlength(bs) == 0) {
ef810437 581 *pdrv = &bdrv_raw;
c98ac35d 582 return ret;
1a396859 583 }
f8ea0b00 584
83f64091 585 ret = bdrv_pread(bs, 0, buf, sizeof(buf));
83f64091 586 if (ret < 0) {
34b5d2c6
HR
587 error_setg_errno(errp, -ret, "Could not read image for determining its "
588 "format");
c98ac35d
SW
589 *pdrv = NULL;
590 return ret;
83f64091
FB
591 }
592
c6684249 593 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 594 if (!drv) {
34b5d2c6
HR
595 error_setg(errp, "Could not determine image format: No compatible "
596 "driver found");
c98ac35d
SW
597 ret = -ENOENT;
598 }
599 *pdrv = drv;
600 return ret;
ea2384d3
FB
601}
602
51762288
SH
603/**
604 * Set the current 'total_sectors' value
65a9bb25 605 * Return 0 on success, -errno on error.
51762288
SH
606 */
607static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
608{
609 BlockDriver *drv = bs->drv;
610
396759ad 611 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 612 if (bdrv_is_sg(bs))
396759ad
NB
613 return 0;
614
51762288
SH
615 /* query actual device if possible, otherwise just trust the hint */
616 if (drv->bdrv_getlength) {
617 int64_t length = drv->bdrv_getlength(bs);
618 if (length < 0) {
619 return length;
620 }
7e382003 621 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
622 }
623
624 bs->total_sectors = hint;
625 return 0;
626}
627
9e8f1835
PB
628/**
629 * Set open flags for a given discard mode
630 *
631 * Return 0 on success, -1 if the discard mode was invalid.
632 */
633int bdrv_parse_discard_flags(const char *mode, int *flags)
634{
635 *flags &= ~BDRV_O_UNMAP;
636
637 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
638 /* do nothing */
639 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
640 *flags |= BDRV_O_UNMAP;
641 } else {
642 return -1;
643 }
644
645 return 0;
646}
647
c3993cdc
SH
648/**
649 * Set open flags for a given cache mode
650 *
651 * Return 0 on success, -1 if the cache mode was invalid.
652 */
653int bdrv_parse_cache_flags(const char *mode, int *flags)
654{
655 *flags &= ~BDRV_O_CACHE_MASK;
656
657 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
658 *flags |= BDRV_O_NOCACHE | BDRV_O_CACHE_WB;
92196b2f
SH
659 } else if (!strcmp(mode, "directsync")) {
660 *flags |= BDRV_O_NOCACHE;
c3993cdc
SH
661 } else if (!strcmp(mode, "writeback")) {
662 *flags |= BDRV_O_CACHE_WB;
663 } else if (!strcmp(mode, "unsafe")) {
664 *flags |= BDRV_O_CACHE_WB;
665 *flags |= BDRV_O_NO_FLUSH;
666 } else if (!strcmp(mode, "writethrough")) {
667 /* this is the default */
668 } else {
669 return -1;
670 }
671
672 return 0;
673}
674
b1e6fc08
KW
675/*
676 * Returns the flags that a temporary snapshot should get, based on the
677 * originally requested flags (the originally requested image will have flags
678 * like a backing file)
679 */
680static int bdrv_temp_snapshot_flags(int flags)
681{
682 return (flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
683}
684
0b50cc88 685/*
f3930ed0
KW
686 * Returns the flags that bs->file should get if a protocol driver is expected,
687 * based on the given flags for the parent BDS
0b50cc88
KW
688 */
689static int bdrv_inherited_flags(int flags)
690{
691 /* Enable protocol handling, disable format probing for bs->file */
692 flags |= BDRV_O_PROTOCOL;
693
694 /* Our block drivers take care to send flushes and respect unmap policy,
695 * so we can enable both unconditionally on lower layers. */
696 flags |= BDRV_O_CACHE_WB | BDRV_O_UNMAP;
697
0b50cc88 698 /* Clear flags that only apply to the top layer */
5669b44d 699 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ);
0b50cc88
KW
700
701 return flags;
702}
703
f3930ed0
KW
704const BdrvChildRole child_file = {
705 .inherit_flags = bdrv_inherited_flags,
706};
707
708/*
709 * Returns the flags that bs->file should get if the use of formats (and not
710 * only protocols) is permitted for it, based on the given flags for the parent
711 * BDS
712 */
713static int bdrv_inherited_fmt_flags(int parent_flags)
714{
715 int flags = child_file.inherit_flags(parent_flags);
716 return flags & ~BDRV_O_PROTOCOL;
717}
718
719const BdrvChildRole child_format = {
720 .inherit_flags = bdrv_inherited_fmt_flags,
721};
722
317fc44e 723/*
760e0063 724 * Returns the flags that bs->backing should get, based on the given flags
317fc44e
KW
725 * for the parent BDS
726 */
727static int bdrv_backing_flags(int flags)
728{
729 /* backing files always opened read-only */
730 flags &= ~(BDRV_O_RDWR | BDRV_O_COPY_ON_READ);
731
732 /* snapshot=on is handled on the top layer */
8bfea15d 733 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e
KW
734
735 return flags;
736}
737
f3930ed0
KW
738static const BdrvChildRole child_backing = {
739 .inherit_flags = bdrv_backing_flags,
740};
741
7b272452
KW
742static int bdrv_open_flags(BlockDriverState *bs, int flags)
743{
744 int open_flags = flags | BDRV_O_CACHE_WB;
745
746 /*
747 * Clear flags that are internal to the block layer before opening the
748 * image.
749 */
20cca275 750 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
751
752 /*
753 * Snapshots should be writable.
754 */
8bfea15d 755 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
756 open_flags |= BDRV_O_RDWR;
757 }
758
759 return open_flags;
760}
761
636ea370
KW
762static void bdrv_assign_node_name(BlockDriverState *bs,
763 const char *node_name,
764 Error **errp)
6913c0c2
BC
765{
766 if (!node_name) {
636ea370 767 return;
6913c0c2
BC
768 }
769
9aebf3b8 770 /* Check for empty string or invalid characters */
f5bebbbb 771 if (!id_wellformed(node_name)) {
9aebf3b8 772 error_setg(errp, "Invalid node name");
636ea370 773 return;
6913c0c2
BC
774 }
775
0c5e94ee 776 /* takes care of avoiding namespaces collisions */
7f06d47e 777 if (blk_by_name(node_name)) {
0c5e94ee
BC
778 error_setg(errp, "node-name=%s is conflicting with a device id",
779 node_name);
636ea370 780 return;
0c5e94ee
BC
781 }
782
6913c0c2
BC
783 /* takes care of avoiding duplicates node names */
784 if (bdrv_find_node(node_name)) {
785 error_setg(errp, "Duplicate node name");
636ea370 786 return;
6913c0c2
BC
787 }
788
789 /* copy node name into the bs and insert it into the graph list */
790 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
791 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
6913c0c2
BC
792}
793
18edf289
KW
794static QemuOptsList bdrv_runtime_opts = {
795 .name = "bdrv_common",
796 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
797 .desc = {
798 {
799 .name = "node-name",
800 .type = QEMU_OPT_STRING,
801 .help = "Node name of the block device node",
802 },
803 { /* end of list */ }
804 },
805};
806
57915332
KW
807/*
808 * Common part for opening disk images and files
b6ad491a
KW
809 *
810 * Removes all processed options from *options.
57915332 811 */
9a4f4c31 812static int bdrv_open_common(BlockDriverState *bs, BdrvChild *file,
34b5d2c6 813 QDict *options, int flags, BlockDriver *drv, Error **errp)
57915332
KW
814{
815 int ret, open_flags;
035fccdf 816 const char *filename;
6913c0c2 817 const char *node_name = NULL;
18edf289 818 QemuOpts *opts;
34b5d2c6 819 Error *local_err = NULL;
57915332
KW
820
821 assert(drv != NULL);
6405875c 822 assert(bs->file == NULL);
707ff828 823 assert(options != NULL && bs->options != options);
57915332 824
45673671 825 if (file != NULL) {
9a4f4c31 826 filename = file->bs->filename;
45673671
KW
827 } else {
828 filename = qdict_get_try_str(options, "filename");
829 }
830
765003db
KW
831 if (drv->bdrv_needs_filename && !filename) {
832 error_setg(errp, "The '%s' block driver requires a file name",
833 drv->format_name);
834 return -EINVAL;
835 }
836
45673671 837 trace_bdrv_open_common(bs, filename ?: "", flags, drv->format_name);
28dcee10 838
18edf289
KW
839 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
840 qemu_opts_absorb_qdict(opts, options, &local_err);
0fb6395c 841 if (local_err) {
636ea370 842 error_propagate(errp, local_err);
18edf289
KW
843 ret = -EINVAL;
844 goto fail_opts;
6913c0c2 845 }
6913c0c2 846
18edf289 847 node_name = qemu_opt_get(opts, "node-name");
636ea370 848 bdrv_assign_node_name(bs, node_name, &local_err);
0fb6395c 849 if (local_err) {
636ea370 850 error_propagate(errp, local_err);
18edf289
KW
851 ret = -EINVAL;
852 goto fail_opts;
5d186eb0
KW
853 }
854
1b7fd729 855 bs->guest_block_size = 512;
c25f53b0 856 bs->request_alignment = 512;
0d51b4de 857 bs->zero_beyond_eof = true;
b64ec4e4
FZ
858 open_flags = bdrv_open_flags(bs, flags);
859 bs->read_only = !(open_flags & BDRV_O_RDWR);
860
861 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
862 error_setg(errp,
863 !bs->read_only && bdrv_is_whitelisted(drv, true)
864 ? "Driver '%s' can only be used for read-only devices"
865 : "Driver '%s' is not whitelisted",
866 drv->format_name);
18edf289
KW
867 ret = -ENOTSUP;
868 goto fail_opts;
b64ec4e4 869 }
57915332 870
53fec9d3 871 assert(bs->copy_on_read == 0); /* bdrv_new() and bdrv_close() make it so */
0ebd24e0
KW
872 if (flags & BDRV_O_COPY_ON_READ) {
873 if (!bs->read_only) {
874 bdrv_enable_copy_on_read(bs);
875 } else {
876 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
877 ret = -EINVAL;
878 goto fail_opts;
0ebd24e0 879 }
53fec9d3
SH
880 }
881
c2ad1b0c
KW
882 if (filename != NULL) {
883 pstrcpy(bs->filename, sizeof(bs->filename), filename);
884 } else {
885 bs->filename[0] = '\0';
886 }
91af7014 887 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 888
57915332 889 bs->drv = drv;
7267c094 890 bs->opaque = g_malloc0(drv->instance_size);
57915332 891
03f541bd 892 bs->enable_write_cache = !!(flags & BDRV_O_CACHE_WB);
e7c63796 893
66f82cee
KW
894 /* Open the image, either directly or using a protocol */
895 if (drv->bdrv_file_open) {
5d186eb0 896 assert(file == NULL);
030be321 897 assert(!drv->bdrv_needs_filename || filename != NULL);
34b5d2c6 898 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
f500a6d3 899 } else {
2af5ef70 900 if (file == NULL) {
34b5d2c6
HR
901 error_setg(errp, "Can't use '%s' as a block driver for the "
902 "protocol level", drv->format_name);
2af5ef70
KW
903 ret = -EINVAL;
904 goto free_and_fail;
905 }
f500a6d3 906 bs->file = file;
34b5d2c6 907 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
66f82cee
KW
908 }
909
57915332 910 if (ret < 0) {
84d18f06 911 if (local_err) {
34b5d2c6 912 error_propagate(errp, local_err);
2fa9aa59
DH
913 } else if (bs->filename[0]) {
914 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
34b5d2c6
HR
915 } else {
916 error_setg_errno(errp, -ret, "Could not open image");
917 }
57915332
KW
918 goto free_and_fail;
919 }
920
a1f688f4
MA
921 if (bs->encrypted) {
922 error_report("Encrypted images are deprecated");
923 error_printf("Support for them will be removed in a future release.\n"
924 "You can use 'qemu-img convert' to convert your image"
925 " to an unencrypted one.\n");
926 }
927
51762288
SH
928 ret = refresh_total_sectors(bs, bs->total_sectors);
929 if (ret < 0) {
34b5d2c6 930 error_setg_errno(errp, -ret, "Could not refresh total sector count");
51762288 931 goto free_and_fail;
57915332 932 }
51762288 933
3baca891
KW
934 bdrv_refresh_limits(bs, &local_err);
935 if (local_err) {
936 error_propagate(errp, local_err);
937 ret = -EINVAL;
938 goto free_and_fail;
939 }
940
c25f53b0 941 assert(bdrv_opt_mem_align(bs) != 0);
4196d2f0 942 assert(bdrv_min_mem_align(bs) != 0);
b192af8a 943 assert((bs->request_alignment != 0) || bdrv_is_sg(bs));
18edf289
KW
944
945 qemu_opts_del(opts);
57915332
KW
946 return 0;
947
948free_and_fail:
f500a6d3 949 bs->file = NULL;
7267c094 950 g_free(bs->opaque);
57915332
KW
951 bs->opaque = NULL;
952 bs->drv = NULL;
18edf289
KW
953fail_opts:
954 qemu_opts_del(opts);
57915332
KW
955 return ret;
956}
957
5e5c4f63
KW
958static QDict *parse_json_filename(const char *filename, Error **errp)
959{
960 QObject *options_obj;
961 QDict *options;
962 int ret;
963
964 ret = strstart(filename, "json:", &filename);
965 assert(ret);
966
967 options_obj = qobject_from_json(filename);
968 if (!options_obj) {
969 error_setg(errp, "Could not parse the JSON options");
970 return NULL;
971 }
972
973 if (qobject_type(options_obj) != QTYPE_QDICT) {
974 qobject_decref(options_obj);
975 error_setg(errp, "Invalid JSON object given");
976 return NULL;
977 }
978
979 options = qobject_to_qdict(options_obj);
980 qdict_flatten(options);
981
982 return options;
983}
984
b6ce07aa 985/*
f54120ff
KW
986 * Fills in default options for opening images and converts the legacy
987 * filename/flags pair to option QDict entries.
53a29513
HR
988 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
989 * block driver has been specified explicitly.
b6ce07aa 990 */
53a29513 991static int bdrv_fill_options(QDict **options, const char **pfilename,
053e1578 992 int *flags, Error **errp)
ea2384d3 993{
5e5c4f63 994 const char *filename = *pfilename;
c2ad1b0c 995 const char *drvname;
53a29513 996 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 997 bool parse_filename = false;
053e1578 998 BlockDriver *drv = NULL;
34b5d2c6 999 Error *local_err = NULL;
83f64091 1000
5e5c4f63
KW
1001 /* Parse json: pseudo-protocol */
1002 if (filename && g_str_has_prefix(filename, "json:")) {
1003 QDict *json_options = parse_json_filename(filename, &local_err);
1004 if (local_err) {
1005 error_propagate(errp, local_err);
1006 return -EINVAL;
1007 }
1008
1009 /* Options given in the filename have lower priority than options
1010 * specified directly */
1011 qdict_join(*options, json_options, false);
1012 QDECREF(json_options);
1013 *pfilename = filename = NULL;
1014 }
1015
53a29513 1016 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1017 if (drvname) {
1018 drv = bdrv_find_format(drvname);
1019 if (!drv) {
1020 error_setg(errp, "Unknown driver '%s'", drvname);
1021 return -ENOENT;
1022 }
1023 /* If the user has explicitly specified the driver, this choice should
1024 * override the BDRV_O_PROTOCOL flag */
1025 protocol = drv->bdrv_file_open;
53a29513
HR
1026 }
1027
1028 if (protocol) {
1029 *flags |= BDRV_O_PROTOCOL;
1030 } else {
1031 *flags &= ~BDRV_O_PROTOCOL;
1032 }
1033
035fccdf 1034 /* Fetch the file name from the options QDict if necessary */
17b005f1 1035 if (protocol && filename) {
f54120ff
KW
1036 if (!qdict_haskey(*options, "filename")) {
1037 qdict_put(*options, "filename", qstring_from_str(filename));
1038 parse_filename = true;
1039 } else {
1040 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1041 "the same time");
1042 return -EINVAL;
1043 }
035fccdf
KW
1044 }
1045
c2ad1b0c 1046 /* Find the right block driver */
f54120ff 1047 filename = qdict_get_try_str(*options, "filename");
f54120ff 1048
053e1578
HR
1049 if (!drvname && protocol) {
1050 if (filename) {
1051 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1052 if (!drv) {
053e1578 1053 return -EINVAL;
17b005f1 1054 }
053e1578
HR
1055
1056 drvname = drv->format_name;
1057 qdict_put(*options, "driver", qstring_from_str(drvname));
1058 } else {
1059 error_setg(errp, "Must specify either driver or file");
1060 return -EINVAL;
98289620 1061 }
c2ad1b0c
KW
1062 }
1063
17b005f1 1064 assert(drv || !protocol);
c2ad1b0c 1065
f54120ff 1066 /* Driver-specific filename parsing */
17b005f1 1067 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1068 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1069 if (local_err) {
34b5d2c6 1070 error_propagate(errp, local_err);
f54120ff 1071 return -EINVAL;
6963a30d 1072 }
cd5d031e
HR
1073
1074 if (!drv->bdrv_needs_filename) {
1075 qdict_del(*options, "filename");
cd5d031e 1076 }
6963a30d
KW
1077 }
1078
f54120ff
KW
1079 return 0;
1080}
1081
b4b059f6
KW
1082static BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
1083 BlockDriverState *child_bs,
1084 const BdrvChildRole *child_role)
df581792
KW
1085{
1086 BdrvChild *child = g_new(BdrvChild, 1);
1087 *child = (BdrvChild) {
1088 .bs = child_bs,
1089 .role = child_role,
1090 };
1091
1092 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
d42a8a93 1093 QLIST_INSERT_HEAD(&child_bs->parents, child, next_parent);
b4b059f6
KW
1094
1095 return child;
df581792
KW
1096}
1097
5db15a57 1098void bdrv_detach_child(BdrvChild *child)
33a60407
KW
1099{
1100 QLIST_REMOVE(child, next);
d42a8a93 1101 QLIST_REMOVE(child, next_parent);
33a60407
KW
1102 g_free(child);
1103}
1104
1105void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
1106{
1107 BlockDriverState *child_bs = child->bs;
1108
1109 if (child->bs->inherits_from == parent) {
1110 child->bs->inherits_from = NULL;
1111 }
1112
1113 bdrv_detach_child(child);
1114 bdrv_unref(child_bs);
1115}
1116
5db15a57
KW
1117/*
1118 * Sets the backing file link of a BDS. A new reference is created; callers
1119 * which don't need their own reference any more must call bdrv_unref().
1120 */
8d24cce1
FZ
1121void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd)
1122{
5db15a57
KW
1123 if (backing_hd) {
1124 bdrv_ref(backing_hd);
1125 }
8d24cce1 1126
760e0063 1127 if (bs->backing) {
826b6ca0 1128 assert(bs->backing_blocker);
760e0063 1129 bdrv_op_unblock_all(bs->backing->bs, bs->backing_blocker);
5db15a57 1130 bdrv_unref_child(bs, bs->backing);
826b6ca0
FZ
1131 } else if (backing_hd) {
1132 error_setg(&bs->backing_blocker,
81e5f78a
AG
1133 "node is used as backing hd of '%s'",
1134 bdrv_get_device_or_node_name(bs));
826b6ca0
FZ
1135 }
1136
8d24cce1 1137 if (!backing_hd) {
826b6ca0
FZ
1138 error_free(bs->backing_blocker);
1139 bs->backing_blocker = NULL;
760e0063 1140 bs->backing = NULL;
8d24cce1
FZ
1141 goto out;
1142 }
760e0063 1143 bs->backing = bdrv_attach_child(bs, backing_hd, &child_backing);
8d24cce1
FZ
1144 bs->open_flags &= ~BDRV_O_NO_BACKING;
1145 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_hd->filename);
1146 pstrcpy(bs->backing_format, sizeof(bs->backing_format),
1147 backing_hd->drv ? backing_hd->drv->format_name : "");
826b6ca0 1148
760e0063 1149 bdrv_op_block_all(backing_hd, bs->backing_blocker);
826b6ca0 1150 /* Otherwise we won't be able to commit due to check in bdrv_commit */
760e0063 1151 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
826b6ca0 1152 bs->backing_blocker);
8d24cce1 1153out:
3baca891 1154 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
1155}
1156
31ca6d07
KW
1157/*
1158 * Opens the backing file for a BlockDriverState if not yet open
1159 *
1160 * options is a QDict of options to pass to the block drivers, or NULL for an
1161 * empty set of options. The reference to the QDict is transferred to this
1162 * function (even on failure), so if the caller intends to reuse the dictionary,
1163 * it needs to use QINCREF() before calling bdrv_file_open.
1164 */
34b5d2c6 1165int bdrv_open_backing_file(BlockDriverState *bs, QDict *options, Error **errp)
9156df12 1166{
1ba4b6a5 1167 char *backing_filename = g_malloc0(PATH_MAX);
317fc44e 1168 int ret = 0;
8d24cce1 1169 BlockDriverState *backing_hd;
34b5d2c6 1170 Error *local_err = NULL;
9156df12 1171
760e0063 1172 if (bs->backing != NULL) {
31ca6d07 1173 QDECREF(options);
1ba4b6a5 1174 goto free_exit;
9156df12
PB
1175 }
1176
31ca6d07
KW
1177 /* NULL means an empty set of options */
1178 if (options == NULL) {
1179 options = qdict_new();
1180 }
1181
9156df12 1182 bs->open_flags &= ~BDRV_O_NO_BACKING;
1cb6f506
KW
1183 if (qdict_haskey(options, "file.filename")) {
1184 backing_filename[0] = '\0';
1185 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 1186 QDECREF(options);
1ba4b6a5 1187 goto free_exit;
dbecebdd 1188 } else {
9f07429e
HR
1189 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
1190 &local_err);
1191 if (local_err) {
1192 ret = -EINVAL;
1193 error_propagate(errp, local_err);
1194 QDECREF(options);
1195 goto free_exit;
1196 }
9156df12
PB
1197 }
1198
8ee79e70
KW
1199 if (!bs->drv || !bs->drv->supports_backing) {
1200 ret = -EINVAL;
1201 error_setg(errp, "Driver doesn't support backing files");
1202 QDECREF(options);
1203 goto free_exit;
1204 }
1205
e4e9986b 1206 backing_hd = bdrv_new();
8d24cce1 1207
c5f6e493
KW
1208 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
1209 qdict_put(options, "driver", qstring_from_str(bs->backing_format));
9156df12
PB
1210 }
1211
760e0063 1212 assert(bs->backing == NULL);
f3930ed0
KW
1213 ret = bdrv_open_inherit(&backing_hd,
1214 *backing_filename ? backing_filename : NULL,
ce343771 1215 NULL, options, 0, bs, &child_backing, &local_err);
9156df12 1216 if (ret < 0) {
8d24cce1
FZ
1217 bdrv_unref(backing_hd);
1218 backing_hd = NULL;
9156df12 1219 bs->open_flags |= BDRV_O_NO_BACKING;
b04b6b6e
FZ
1220 error_setg(errp, "Could not open backing file: %s",
1221 error_get_pretty(local_err));
1222 error_free(local_err);
1ba4b6a5 1223 goto free_exit;
9156df12 1224 }
df581792 1225
5db15a57
KW
1226 /* Hook up the backing file link; drop our reference, bs owns the
1227 * backing_hd reference now */
8d24cce1 1228 bdrv_set_backing_hd(bs, backing_hd);
5db15a57 1229 bdrv_unref(backing_hd);
d80ac658 1230
1ba4b6a5
BC
1231free_exit:
1232 g_free(backing_filename);
1233 return ret;
9156df12
PB
1234}
1235
da557aac
HR
1236/*
1237 * Opens a disk image whose options are given as BlockdevRef in another block
1238 * device's options.
1239 *
da557aac 1240 * If allow_none is true, no image will be opened if filename is false and no
b4b059f6 1241 * BlockdevRef is given. NULL will be returned, but errp remains unset.
da557aac
HR
1242 *
1243 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
1244 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1245 * itself, all options starting with "${bdref_key}." are considered part of the
1246 * BlockdevRef.
1247 *
1248 * The BlockdevRef will be removed from the options QDict.
1249 */
b4b059f6
KW
1250BdrvChild *bdrv_open_child(const char *filename,
1251 QDict *options, const char *bdref_key,
1252 BlockDriverState* parent,
1253 const BdrvChildRole *child_role,
1254 bool allow_none, Error **errp)
da557aac 1255{
b4b059f6
KW
1256 BdrvChild *c = NULL;
1257 BlockDriverState *bs;
da557aac
HR
1258 QDict *image_options;
1259 int ret;
1260 char *bdref_key_dot;
1261 const char *reference;
1262
df581792 1263 assert(child_role != NULL);
f67503e5 1264
da557aac
HR
1265 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1266 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
1267 g_free(bdref_key_dot);
1268
1269 reference = qdict_get_try_str(options, bdref_key);
1270 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 1271 if (!allow_none) {
da557aac
HR
1272 error_setg(errp, "A block device must be specified for \"%s\"",
1273 bdref_key);
da557aac 1274 }
b20e61e0 1275 QDECREF(image_options);
da557aac
HR
1276 goto done;
1277 }
1278
b4b059f6
KW
1279 bs = NULL;
1280 ret = bdrv_open_inherit(&bs, filename, reference, image_options, 0,
ce343771 1281 parent, child_role, errp);
df581792
KW
1282 if (ret < 0) {
1283 goto done;
1284 }
1285
b4b059f6 1286 c = bdrv_attach_child(parent, bs, child_role);
da557aac
HR
1287
1288done:
1289 qdict_del(options, bdref_key);
b4b059f6
KW
1290 return c;
1291}
1292
6b8aeca5 1293int bdrv_append_temp_snapshot(BlockDriverState *bs, int flags, Error **errp)
b998875d
KW
1294{
1295 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 1296 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 1297 int64_t total_size;
83d0521a 1298 QemuOpts *opts = NULL;
b998875d
KW
1299 QDict *snapshot_options;
1300 BlockDriverState *bs_snapshot;
c2e0dbbf 1301 Error *local_err = NULL;
b998875d
KW
1302 int ret;
1303
1304 /* if snapshot, we create a temporary backing file and open it
1305 instead of opening 'filename' directly */
1306
1307 /* Get the required size from the image */
f187743a
KW
1308 total_size = bdrv_getlength(bs);
1309 if (total_size < 0) {
6b8aeca5 1310 ret = total_size;
f187743a 1311 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 1312 goto out;
f187743a 1313 }
b998875d
KW
1314
1315 /* Create the temporary image */
1ba4b6a5 1316 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
1317 if (ret < 0) {
1318 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 1319 goto out;
b998875d
KW
1320 }
1321
ef810437 1322 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 1323 &error_abort);
39101f25 1324 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
ef810437 1325 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, &local_err);
83d0521a 1326 qemu_opts_del(opts);
b998875d
KW
1327 if (ret < 0) {
1328 error_setg_errno(errp, -ret, "Could not create temporary overlay "
1329 "'%s': %s", tmp_filename,
1330 error_get_pretty(local_err));
1331 error_free(local_err);
1ba4b6a5 1332 goto out;
b998875d
KW
1333 }
1334
1335 /* Prepare a new options QDict for the temporary file */
1336 snapshot_options = qdict_new();
1337 qdict_put(snapshot_options, "file.driver",
1338 qstring_from_str("file"));
1339 qdict_put(snapshot_options, "file.filename",
1340 qstring_from_str(tmp_filename));
e6641719
HR
1341 qdict_put(snapshot_options, "driver",
1342 qstring_from_str("qcow2"));
b998875d 1343
e4e9986b 1344 bs_snapshot = bdrv_new();
b998875d
KW
1345
1346 ret = bdrv_open(&bs_snapshot, NULL, NULL, snapshot_options,
6ebf9aa2 1347 flags, &local_err);
b998875d
KW
1348 if (ret < 0) {
1349 error_propagate(errp, local_err);
1ba4b6a5 1350 goto out;
b998875d
KW
1351 }
1352
1353 bdrv_append(bs_snapshot, bs);
1ba4b6a5
BC
1354
1355out:
1356 g_free(tmp_filename);
6b8aeca5 1357 return ret;
b998875d
KW
1358}
1359
b6ce07aa
KW
1360/*
1361 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
1362 *
1363 * options is a QDict of options to pass to the block drivers, or NULL for an
1364 * empty set of options. The reference to the QDict belongs to the block layer
1365 * after the call (even on failure), so if the caller intends to reuse the
1366 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
1367 *
1368 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
1369 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
1370 *
1371 * The reference parameter may be used to specify an existing block device which
1372 * should be opened. If specified, neither options nor a filename may be given,
1373 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 1374 */
f3930ed0
KW
1375static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
1376 const char *reference, QDict *options, int flags,
1377 BlockDriverState *parent,
ce343771 1378 const BdrvChildRole *child_role, Error **errp)
ea2384d3 1379{
b6ce07aa 1380 int ret;
9a4f4c31
KW
1381 BdrvChild *file = NULL;
1382 BlockDriverState *bs;
ce343771 1383 BlockDriver *drv = NULL;
74fe54f2 1384 const char *drvname;
34b5d2c6 1385 Error *local_err = NULL;
b1e6fc08 1386 int snapshot_flags = 0;
712e7874 1387
f67503e5 1388 assert(pbs);
f3930ed0
KW
1389 assert(!child_role || !flags);
1390 assert(!child_role == !parent);
f67503e5 1391
ddf5636d
HR
1392 if (reference) {
1393 bool options_non_empty = options ? qdict_size(options) : false;
1394 QDECREF(options);
1395
1396 if (*pbs) {
1397 error_setg(errp, "Cannot reuse an existing BDS when referencing "
1398 "another block device");
1399 return -EINVAL;
1400 }
1401
1402 if (filename || options_non_empty) {
1403 error_setg(errp, "Cannot reference an existing block device with "
1404 "additional options or a new filename");
1405 return -EINVAL;
1406 }
1407
1408 bs = bdrv_lookup_bs(reference, reference, errp);
1409 if (!bs) {
1410 return -ENODEV;
1411 }
1412 bdrv_ref(bs);
1413 *pbs = bs;
1414 return 0;
1415 }
1416
f67503e5
HR
1417 if (*pbs) {
1418 bs = *pbs;
1419 } else {
e4e9986b 1420 bs = bdrv_new();
f67503e5
HR
1421 }
1422
de9c0cec
KW
1423 /* NULL means an empty set of options */
1424 if (options == NULL) {
1425 options = qdict_new();
1426 }
1427
f3930ed0 1428 if (child_role) {
bddcec37 1429 bs->inherits_from = parent;
f3930ed0
KW
1430 flags = child_role->inherit_flags(parent->open_flags);
1431 }
1432
053e1578 1433 ret = bdrv_fill_options(&options, &filename, &flags, &local_err);
462f5bcf
KW
1434 if (local_err) {
1435 goto fail;
1436 }
1437
76c591b0 1438 /* Find the right image format driver */
76c591b0
KW
1439 drvname = qdict_get_try_str(options, "driver");
1440 if (drvname) {
1441 drv = bdrv_find_format(drvname);
1442 qdict_del(options, "driver");
1443 if (!drv) {
1444 error_setg(errp, "Unknown driver: '%s'", drvname);
1445 ret = -EINVAL;
1446 goto fail;
1447 }
1448 }
1449
1450 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 1451
f3930ed0 1452 bs->open_flags = flags;
de9c0cec 1453 bs->options = options;
b6ad491a 1454 options = qdict_clone_shallow(options);
de9c0cec 1455
f500a6d3 1456 /* Open image file without format layer */
f4788adc
KW
1457 if ((flags & BDRV_O_PROTOCOL) == 0) {
1458 if (flags & BDRV_O_RDWR) {
1459 flags |= BDRV_O_ALLOW_RDWR;
1460 }
1461 if (flags & BDRV_O_SNAPSHOT) {
1462 snapshot_flags = bdrv_temp_snapshot_flags(flags);
1463 flags = bdrv_backing_flags(flags);
1464 }
f500a6d3 1465
f3930ed0 1466 bs->open_flags = flags;
1fdd6933 1467
9a4f4c31
KW
1468 file = bdrv_open_child(filename, options, "file", bs,
1469 &child_file, true, &local_err);
1fdd6933
KW
1470 if (local_err) {
1471 ret = -EINVAL;
f4788adc
KW
1472 goto fail;
1473 }
f500a6d3
KW
1474 }
1475
76c591b0 1476 /* Image format probing */
38f3ef57 1477 bs->probed = !drv;
76c591b0 1478 if (!drv && file) {
9a4f4c31 1479 ret = find_image_format(file->bs, filename, &drv, &local_err);
17b005f1 1480 if (ret < 0) {
8bfea15d 1481 goto fail;
2a05cbe4 1482 }
76c591b0 1483 } else if (!drv) {
17b005f1
KW
1484 error_setg(errp, "Must specify either driver or file");
1485 ret = -EINVAL;
8bfea15d 1486 goto fail;
ea2384d3 1487 }
b6ce07aa 1488
53a29513
HR
1489 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
1490 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
1491 /* file must be NULL if a protocol BDS is about to be created
1492 * (the inverse results in an error message from bdrv_open_common()) */
1493 assert(!(flags & BDRV_O_PROTOCOL) || !file);
1494
b6ce07aa 1495 /* Open the image */
34b5d2c6 1496 ret = bdrv_open_common(bs, file, options, flags, drv, &local_err);
b6ce07aa 1497 if (ret < 0) {
8bfea15d 1498 goto fail;
6987307c
CH
1499 }
1500
2a05cbe4 1501 if (file && (bs->file != file)) {
9a4f4c31 1502 bdrv_unref_child(bs, file);
f500a6d3
KW
1503 file = NULL;
1504 }
1505
b6ce07aa 1506 /* If there is a backing file, use it */
9156df12 1507 if ((flags & BDRV_O_NO_BACKING) == 0) {
31ca6d07
KW
1508 QDict *backing_options;
1509
5726d872 1510 qdict_extract_subqdict(options, &backing_options, "backing.");
34b5d2c6 1511 ret = bdrv_open_backing_file(bs, backing_options, &local_err);
b6ce07aa 1512 if (ret < 0) {
b6ad491a 1513 goto close_and_fail;
b6ce07aa 1514 }
b6ce07aa
KW
1515 }
1516
91af7014
HR
1517 bdrv_refresh_filename(bs);
1518
b998875d
KW
1519 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
1520 * temporary snapshot afterwards. */
b1e6fc08 1521 if (snapshot_flags) {
6b8aeca5 1522 ret = bdrv_append_temp_snapshot(bs, snapshot_flags, &local_err);
b998875d 1523 if (local_err) {
b998875d
KW
1524 goto close_and_fail;
1525 }
1526 }
1527
b6ad491a 1528 /* Check if any unknown options were used */
5acd9d81 1529 if (options && (qdict_size(options) != 0)) {
b6ad491a 1530 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
1531 if (flags & BDRV_O_PROTOCOL) {
1532 error_setg(errp, "Block protocol '%s' doesn't support the option "
1533 "'%s'", drv->format_name, entry->key);
1534 } else {
1535 error_setg(errp, "Block format '%s' used by device '%s' doesn't "
1536 "support the option '%s'", drv->format_name,
bfb197e0 1537 bdrv_get_device_name(bs), entry->key);
5acd9d81 1538 }
b6ad491a
KW
1539
1540 ret = -EINVAL;
1541 goto close_and_fail;
1542 }
b6ad491a 1543
b6ce07aa 1544 if (!bdrv_key_required(bs)) {
a7f53e26
MA
1545 if (bs->blk) {
1546 blk_dev_change_media_cb(bs->blk, true);
1547 }
c3adb58f
MA
1548 } else if (!runstate_check(RUN_STATE_PRELAUNCH)
1549 && !runstate_check(RUN_STATE_INMIGRATE)
1550 && !runstate_check(RUN_STATE_PAUSED)) { /* HACK */
1551 error_setg(errp,
1552 "Guest must be stopped for opening of encrypted image");
1553 ret = -EBUSY;
1554 goto close_and_fail;
b6ce07aa
KW
1555 }
1556
c3adb58f 1557 QDECREF(options);
f67503e5 1558 *pbs = bs;
b6ce07aa
KW
1559 return 0;
1560
8bfea15d 1561fail:
f500a6d3 1562 if (file != NULL) {
9a4f4c31 1563 bdrv_unref_child(bs, file);
f500a6d3 1564 }
de9c0cec 1565 QDECREF(bs->options);
b6ad491a 1566 QDECREF(options);
de9c0cec 1567 bs->options = NULL;
f67503e5
HR
1568 if (!*pbs) {
1569 /* If *pbs is NULL, a new BDS has been created in this function and
1570 needs to be freed now. Otherwise, it does not need to be closed,
1571 since it has not really been opened yet. */
1572 bdrv_unref(bs);
1573 }
84d18f06 1574 if (local_err) {
34b5d2c6
HR
1575 error_propagate(errp, local_err);
1576 }
b6ad491a 1577 return ret;
de9c0cec 1578
b6ad491a 1579close_and_fail:
f67503e5
HR
1580 /* See fail path, but now the BDS has to be always closed */
1581 if (*pbs) {
1582 bdrv_close(bs);
1583 } else {
1584 bdrv_unref(bs);
1585 }
b6ad491a 1586 QDECREF(options);
84d18f06 1587 if (local_err) {
34b5d2c6
HR
1588 error_propagate(errp, local_err);
1589 }
b6ce07aa
KW
1590 return ret;
1591}
1592
f3930ed0 1593int bdrv_open(BlockDriverState **pbs, const char *filename,
6ebf9aa2 1594 const char *reference, QDict *options, int flags, Error **errp)
f3930ed0
KW
1595{
1596 return bdrv_open_inherit(pbs, filename, reference, options, flags, NULL,
ce343771 1597 NULL, errp);
f3930ed0
KW
1598}
1599
e971aa12
JC
1600typedef struct BlockReopenQueueEntry {
1601 bool prepared;
1602 BDRVReopenState state;
1603 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
1604} BlockReopenQueueEntry;
1605
1606/*
1607 * Adds a BlockDriverState to a simple queue for an atomic, transactional
1608 * reopen of multiple devices.
1609 *
1610 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
1611 * already performed, or alternatively may be NULL a new BlockReopenQueue will
1612 * be created and initialized. This newly created BlockReopenQueue should be
1613 * passed back in for subsequent calls that are intended to be of the same
1614 * atomic 'set'.
1615 *
1616 * bs is the BlockDriverState to add to the reopen queue.
1617 *
4d2cb092
KW
1618 * options contains the changed options for the associated bs
1619 * (the BlockReopenQueue takes ownership)
1620 *
e971aa12
JC
1621 * flags contains the open flags for the associated bs
1622 *
1623 * returns a pointer to bs_queue, which is either the newly allocated
1624 * bs_queue, or the existing bs_queue being used.
1625 *
1626 */
1627BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
4d2cb092
KW
1628 BlockDriverState *bs,
1629 QDict *options, int flags)
e971aa12
JC
1630{
1631 assert(bs != NULL);
1632
1633 BlockReopenQueueEntry *bs_entry;
67251a31 1634 BdrvChild *child;
4d2cb092 1635 QDict *old_options;
67251a31 1636
e971aa12
JC
1637 if (bs_queue == NULL) {
1638 bs_queue = g_new0(BlockReopenQueue, 1);
1639 QSIMPLEQ_INIT(bs_queue);
1640 }
1641
4d2cb092
KW
1642 if (!options) {
1643 options = qdict_new();
1644 }
1645
1646 old_options = qdict_clone_shallow(bs->options);
1647 qdict_join(options, old_options, false);
1648 QDECREF(old_options);
1649
f1f25a2e
KW
1650 /* bdrv_open() masks this flag out */
1651 flags &= ~BDRV_O_PROTOCOL;
1652
67251a31
KW
1653 QLIST_FOREACH(child, &bs->children, next) {
1654 int child_flags;
1655
1656 if (child->bs->inherits_from != bs) {
1657 continue;
1658 }
1659
1660 child_flags = child->role->inherit_flags(flags);
4d2cb092
KW
1661 /* TODO Pass down child flags (backing.*, extents.*, ...) */
1662 bdrv_reopen_queue(bs_queue, child->bs, NULL, child_flags);
e971aa12
JC
1663 }
1664
1665 bs_entry = g_new0(BlockReopenQueueEntry, 1);
1666 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
1667
1668 bs_entry->state.bs = bs;
4d2cb092 1669 bs_entry->state.options = options;
e971aa12
JC
1670 bs_entry->state.flags = flags;
1671
1672 return bs_queue;
1673}
1674
1675/*
1676 * Reopen multiple BlockDriverStates atomically & transactionally.
1677 *
1678 * The queue passed in (bs_queue) must have been built up previous
1679 * via bdrv_reopen_queue().
1680 *
1681 * Reopens all BDS specified in the queue, with the appropriate
1682 * flags. All devices are prepared for reopen, and failure of any
1683 * device will cause all device changes to be abandonded, and intermediate
1684 * data cleaned up.
1685 *
1686 * If all devices prepare successfully, then the changes are committed
1687 * to all devices.
1688 *
1689 */
1690int bdrv_reopen_multiple(BlockReopenQueue *bs_queue, Error **errp)
1691{
1692 int ret = -1;
1693 BlockReopenQueueEntry *bs_entry, *next;
1694 Error *local_err = NULL;
1695
1696 assert(bs_queue != NULL);
1697
1698 bdrv_drain_all();
1699
1700 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1701 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
1702 error_propagate(errp, local_err);
1703 goto cleanup;
1704 }
1705 bs_entry->prepared = true;
1706 }
1707
1708 /* If we reach this point, we have success and just need to apply the
1709 * changes
1710 */
1711 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1712 bdrv_reopen_commit(&bs_entry->state);
1713 }
1714
1715 ret = 0;
1716
1717cleanup:
1718 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
1719 if (ret && bs_entry->prepared) {
1720 bdrv_reopen_abort(&bs_entry->state);
1721 }
4d2cb092 1722 QDECREF(bs_entry->state.options);
e971aa12
JC
1723 g_free(bs_entry);
1724 }
1725 g_free(bs_queue);
1726 return ret;
1727}
1728
1729
1730/* Reopen a single BlockDriverState with the specified flags. */
1731int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
1732{
1733 int ret = -1;
1734 Error *local_err = NULL;
4d2cb092 1735 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12
JC
1736
1737 ret = bdrv_reopen_multiple(queue, &local_err);
1738 if (local_err != NULL) {
1739 error_propagate(errp, local_err);
1740 }
1741 return ret;
1742}
1743
1744
1745/*
1746 * Prepares a BlockDriverState for reopen. All changes are staged in the
1747 * 'opaque' field of the BDRVReopenState, which is used and allocated by
1748 * the block driver layer .bdrv_reopen_prepare()
1749 *
1750 * bs is the BlockDriverState to reopen
1751 * flags are the new open flags
1752 * queue is the reopen queue
1753 *
1754 * Returns 0 on success, non-zero on error. On error errp will be set
1755 * as well.
1756 *
1757 * On failure, bdrv_reopen_abort() will be called to clean up any data.
1758 * It is the responsibility of the caller to then call the abort() or
1759 * commit() for any other BDS that have been left in a prepare() state
1760 *
1761 */
1762int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
1763 Error **errp)
1764{
1765 int ret = -1;
1766 Error *local_err = NULL;
1767 BlockDriver *drv;
1768
1769 assert(reopen_state != NULL);
1770 assert(reopen_state->bs->drv != NULL);
1771 drv = reopen_state->bs->drv;
1772
1773 /* if we are to stay read-only, do not allow permission change
1774 * to r/w */
1775 if (!(reopen_state->bs->open_flags & BDRV_O_ALLOW_RDWR) &&
1776 reopen_state->flags & BDRV_O_RDWR) {
81e5f78a
AG
1777 error_setg(errp, "Node '%s' is read only",
1778 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
1779 goto error;
1780 }
1781
1782
1783 ret = bdrv_flush(reopen_state->bs);
1784 if (ret) {
1785 error_set(errp, ERROR_CLASS_GENERIC_ERROR, "Error (%s) flushing drive",
1786 strerror(-ret));
1787 goto error;
1788 }
1789
1790 if (drv->bdrv_reopen_prepare) {
1791 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
1792 if (ret) {
1793 if (local_err != NULL) {
1794 error_propagate(errp, local_err);
1795 } else {
d8b6895f
LC
1796 error_setg(errp, "failed while preparing to reopen image '%s'",
1797 reopen_state->bs->filename);
e971aa12
JC
1798 }
1799 goto error;
1800 }
1801 } else {
1802 /* It is currently mandatory to have a bdrv_reopen_prepare()
1803 * handler for each supported drv. */
81e5f78a
AG
1804 error_setg(errp, "Block format '%s' used by node '%s' "
1805 "does not support reopening files", drv->format_name,
1806 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
1807 ret = -1;
1808 goto error;
1809 }
1810
4d2cb092
KW
1811 /* Options that are not handled are only okay if they are unchanged
1812 * compared to the old state. It is expected that some options are only
1813 * used for the initial open, but not reopen (e.g. filename) */
1814 if (qdict_size(reopen_state->options)) {
1815 const QDictEntry *entry = qdict_first(reopen_state->options);
1816
1817 do {
1818 QString *new_obj = qobject_to_qstring(entry->value);
1819 const char *new = qstring_get_str(new_obj);
1820 const char *old = qdict_get_try_str(reopen_state->bs->options,
1821 entry->key);
1822
1823 if (!old || strcmp(new, old)) {
1824 error_setg(errp, "Cannot change the option '%s'", entry->key);
1825 ret = -EINVAL;
1826 goto error;
1827 }
1828 } while ((entry = qdict_next(reopen_state->options, entry)));
1829 }
1830
e971aa12
JC
1831 ret = 0;
1832
1833error:
1834 return ret;
1835}
1836
1837/*
1838 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
1839 * makes them final by swapping the staging BlockDriverState contents into
1840 * the active BlockDriverState contents.
1841 */
1842void bdrv_reopen_commit(BDRVReopenState *reopen_state)
1843{
1844 BlockDriver *drv;
1845
1846 assert(reopen_state != NULL);
1847 drv = reopen_state->bs->drv;
1848 assert(drv != NULL);
1849
1850 /* If there are any driver level actions to take */
1851 if (drv->bdrv_reopen_commit) {
1852 drv->bdrv_reopen_commit(reopen_state);
1853 }
1854
1855 /* set BDS specific flags now */
1856 reopen_state->bs->open_flags = reopen_state->flags;
1857 reopen_state->bs->enable_write_cache = !!(reopen_state->flags &
1858 BDRV_O_CACHE_WB);
1859 reopen_state->bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 1860
3baca891 1861 bdrv_refresh_limits(reopen_state->bs, NULL);
e971aa12
JC
1862}
1863
1864/*
1865 * Abort the reopen, and delete and free the staged changes in
1866 * reopen_state
1867 */
1868void bdrv_reopen_abort(BDRVReopenState *reopen_state)
1869{
1870 BlockDriver *drv;
1871
1872 assert(reopen_state != NULL);
1873 drv = reopen_state->bs->drv;
1874 assert(drv != NULL);
1875
1876 if (drv->bdrv_reopen_abort) {
1877 drv->bdrv_reopen_abort(reopen_state);
1878 }
1879}
1880
1881
fc01f7e7
FB
1882void bdrv_close(BlockDriverState *bs)
1883{
33384421
HR
1884 BdrvAioNotifier *ban, *ban_next;
1885
3cbc002c
PB
1886 if (bs->job) {
1887 block_job_cancel_sync(bs->job);
1888 }
99b7e775
AG
1889
1890 /* Disable I/O limits and drain all pending throttled requests */
1891 if (bs->io_limits_enabled) {
1892 bdrv_io_limits_disable(bs);
1893 }
1894
53ec73e2 1895 bdrv_drain(bs); /* complete I/O */
58fda173 1896 bdrv_flush(bs);
53ec73e2 1897 bdrv_drain(bs); /* in case flush left pending I/O */
d7d512f6 1898 notifier_list_notify(&bs->close_notifiers, bs);
7094f12f 1899
3cbc002c 1900 if (bs->drv) {
6e93e7c4
KW
1901 BdrvChild *child, *next;
1902
9a7dedbc 1903 bs->drv->bdrv_close(bs);
9a4f4c31 1904 bs->drv = NULL;
9a7dedbc 1905
5db15a57 1906 bdrv_set_backing_hd(bs, NULL);
9a7dedbc 1907
9a4f4c31
KW
1908 if (bs->file != NULL) {
1909 bdrv_unref_child(bs, bs->file);
1910 bs->file = NULL;
1911 }
1912
6e93e7c4 1913 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
1914 /* TODO Remove bdrv_unref() from drivers' close function and use
1915 * bdrv_unref_child() here */
bddcec37
KW
1916 if (child->bs->inherits_from == bs) {
1917 child->bs->inherits_from = NULL;
1918 }
33a60407 1919 bdrv_detach_child(child);
6e93e7c4
KW
1920 }
1921
7267c094 1922 g_free(bs->opaque);
ea2384d3 1923 bs->opaque = NULL;
53fec9d3 1924 bs->copy_on_read = 0;
a275fa42
PB
1925 bs->backing_file[0] = '\0';
1926 bs->backing_format[0] = '\0';
6405875c
PB
1927 bs->total_sectors = 0;
1928 bs->encrypted = 0;
1929 bs->valid_key = 0;
1930 bs->sg = 0;
0d51b4de 1931 bs->zero_beyond_eof = false;
de9c0cec
KW
1932 QDECREF(bs->options);
1933 bs->options = NULL;
91af7014
HR
1934 QDECREF(bs->full_open_options);
1935 bs->full_open_options = NULL;
b338082b 1936 }
98f90dba 1937
a7f53e26
MA
1938 if (bs->blk) {
1939 blk_dev_change_media_cb(bs->blk, false);
1940 }
9ca11154 1941
33384421
HR
1942 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
1943 g_free(ban);
1944 }
1945 QLIST_INIT(&bs->aio_notifiers);
b338082b
FB
1946}
1947
2bc93fed
MK
1948void bdrv_close_all(void)
1949{
1950 BlockDriverState *bs;
1951
dc364f4c 1952 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
1953 AioContext *aio_context = bdrv_get_aio_context(bs);
1954
1955 aio_context_acquire(aio_context);
2bc93fed 1956 bdrv_close(bs);
ed78cda3 1957 aio_context_release(aio_context);
2bc93fed
MK
1958 }
1959}
1960
dc364f4c
BC
1961/* make a BlockDriverState anonymous by removing from bdrv_state and
1962 * graph_bdrv_state list.
d22b2f41
RH
1963 Also, NULL terminate the device_name to prevent double remove */
1964void bdrv_make_anon(BlockDriverState *bs)
1965{
bfb197e0
MA
1966 /*
1967 * Take care to remove bs from bdrv_states only when it's actually
1968 * in it. Note that bs->device_list.tqe_prev is initially null,
1969 * and gets set to non-null by QTAILQ_INSERT_TAIL(). Establish
1970 * the useful invariant "bs in bdrv_states iff bs->tqe_prev" by
1971 * resetting it to null on remove.
1972 */
1973 if (bs->device_list.tqe_prev) {
dc364f4c 1974 QTAILQ_REMOVE(&bdrv_states, bs, device_list);
bfb197e0 1975 bs->device_list.tqe_prev = NULL;
d22b2f41 1976 }
dc364f4c
BC
1977 if (bs->node_name[0] != '\0') {
1978 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
1979 }
1980 bs->node_name[0] = '\0';
d22b2f41
RH
1981}
1982
e023b2e2
PB
1983static void bdrv_rebind(BlockDriverState *bs)
1984{
1985 if (bs->drv && bs->drv->bdrv_rebind) {
1986 bs->drv->bdrv_rebind(bs);
1987 }
1988}
1989
063dd40e
KW
1990/* Fields that need to stay with the top-level BDS, no matter whether the
1991 * address of the top-level BDS stays the same or not. */
4ddc07ca
PB
1992static void bdrv_move_feature_fields(BlockDriverState *bs_dest,
1993 BlockDriverState *bs_src)
8802d1fd 1994{
4ddc07ca 1995 /* move some fields that need to stay attached to the device */
8802d1fd
JC
1996
1997 /* dev info */
1b7fd729 1998 bs_dest->guest_block_size = bs_src->guest_block_size;
4ddc07ca 1999 bs_dest->copy_on_read = bs_src->copy_on_read;
8802d1fd 2000
4ddc07ca 2001 bs_dest->enable_write_cache = bs_src->enable_write_cache;
c4a248a1 2002
cc0681c4 2003 /* i/o throttled req */
76f4afb4
AG
2004 bs_dest->throttle_state = bs_src->throttle_state,
2005 bs_dest->io_limits_enabled = bs_src->io_limits_enabled;
2006 bs_dest->pending_reqs[0] = bs_src->pending_reqs[0];
2007 bs_dest->pending_reqs[1] = bs_src->pending_reqs[1];
2008 bs_dest->throttled_reqs[0] = bs_src->throttled_reqs[0];
2009 bs_dest->throttled_reqs[1] = bs_src->throttled_reqs[1];
2010 memcpy(&bs_dest->round_robin,
2011 &bs_src->round_robin,
2012 sizeof(bs_dest->round_robin));
0e5b0a2d
BC
2013 memcpy(&bs_dest->throttle_timers,
2014 &bs_src->throttle_timers,
2015 sizeof(ThrottleTimers));
8802d1fd 2016
8802d1fd 2017 /* r/w error */
4ddc07ca
PB
2018 bs_dest->on_read_error = bs_src->on_read_error;
2019 bs_dest->on_write_error = bs_src->on_write_error;
8802d1fd
JC
2020
2021 /* i/o status */
4ddc07ca
PB
2022 bs_dest->iostatus_enabled = bs_src->iostatus_enabled;
2023 bs_dest->iostatus = bs_src->iostatus;
8802d1fd 2024
a9fc4408 2025 /* dirty bitmap */
e4654d2d 2026 bs_dest->dirty_bitmaps = bs_src->dirty_bitmaps;
063dd40e 2027}
a9fc4408 2028
063dd40e
KW
2029/* Fields that only need to be swapped if the contents of BDSes is swapped
2030 * rather than pointers being changed in the parents. */
2031static void bdrv_move_reference_fields(BlockDriverState *bs_dest,
2032 BlockDriverState *bs_src)
2033{
9fcb0251
FZ
2034 /* reference count */
2035 bs_dest->refcnt = bs_src->refcnt;
2036
a9fc4408 2037 /* job */
4ddc07ca 2038 bs_dest->job = bs_src->job;
a9fc4408 2039
8802d1fd 2040 /* keep the same entry in bdrv_states */
dc364f4c 2041 bs_dest->device_list = bs_src->device_list;
7e7d56d9 2042 bs_dest->blk = bs_src->blk;
d42a8a93 2043 bs_dest->parents = bs_src->parents;
7e7d56d9 2044
fbe40ff7
FZ
2045 memcpy(bs_dest->op_blockers, bs_src->op_blockers,
2046 sizeof(bs_dest->op_blockers));
4ddc07ca 2047}
8802d1fd 2048
4ddc07ca
PB
2049/*
2050 * Swap bs contents for two image chains while they are live,
2051 * while keeping required fields on the BlockDriverState that is
2052 * actually attached to a device.
2053 *
2054 * This will modify the BlockDriverState fields, and swap contents
2055 * between bs_new and bs_old. Both bs_new and bs_old are modified.
2056 *
bfb197e0 2057 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2058 *
2059 * This function does not create any image files.
2060 */
2061void bdrv_swap(BlockDriverState *bs_new, BlockDriverState *bs_old)
2062{
2063 BlockDriverState tmp;
bddcec37 2064 BdrvChild *child;
f6801b83 2065
6ee4ce1e
KW
2066 bdrv_drain(bs_new);
2067 bdrv_drain(bs_old);
f6801b83 2068
90ce8a06
BC
2069 /* The code needs to swap the node_name but simply swapping node_list won't
2070 * work so first remove the nodes from the graph list, do the swap then
2071 * insert them back if needed.
2072 */
2073 if (bs_new->node_name[0] != '\0') {
2074 QTAILQ_REMOVE(&graph_bdrv_states, bs_new, node_list);
2075 }
2076 if (bs_old->node_name[0] != '\0') {
2077 QTAILQ_REMOVE(&graph_bdrv_states, bs_old, node_list);
2078 }
2079
db628338
AG
2080 /* If the BlockDriverState is part of a throttling group acquire
2081 * its lock since we're going to mess with the protected fields.
2082 * Otherwise there's no need to worry since no one else can touch
2083 * them. */
2084 if (bs_old->throttle_state) {
2085 throttle_group_lock(bs_old);
2086 }
2087
bfb197e0 2088 /* bs_new must be unattached and shouldn't have anything fancy enabled */
7e7d56d9 2089 assert(!bs_new->blk);
e4654d2d 2090 assert(QLIST_EMPTY(&bs_new->dirty_bitmaps));
4ddc07ca 2091 assert(bs_new->job == NULL);
4ddc07ca 2092 assert(bs_new->io_limits_enabled == false);
db628338 2093 assert(bs_new->throttle_state == NULL);
0e5b0a2d 2094 assert(!throttle_timers_are_initialized(&bs_new->throttle_timers));
8802d1fd 2095
4ddc07ca
PB
2096 tmp = *bs_new;
2097 *bs_new = *bs_old;
2098 *bs_old = tmp;
a9fc4408 2099
4ddc07ca
PB
2100 /* there are some fields that should not be swapped, move them back */
2101 bdrv_move_feature_fields(&tmp, bs_old);
2102 bdrv_move_feature_fields(bs_old, bs_new);
2103 bdrv_move_feature_fields(bs_new, &tmp);
8802d1fd 2104
063dd40e
KW
2105 bdrv_move_reference_fields(&tmp, bs_old);
2106 bdrv_move_reference_fields(bs_old, bs_new);
2107 bdrv_move_reference_fields(bs_new, &tmp);
2108
bfb197e0 2109 /* bs_new must remain unattached */
7e7d56d9 2110 assert(!bs_new->blk);
4ddc07ca
PB
2111
2112 /* Check a few fields that should remain attached to the device */
4ddc07ca 2113 assert(bs_new->job == NULL);
4ddc07ca 2114 assert(bs_new->io_limits_enabled == false);
db628338 2115 assert(bs_new->throttle_state == NULL);
0e5b0a2d 2116 assert(!throttle_timers_are_initialized(&bs_new->throttle_timers));
e023b2e2 2117
db628338
AG
2118 /* Release the ThrottleGroup lock */
2119 if (bs_old->throttle_state) {
2120 throttle_group_unlock(bs_old);
2121 }
2122
90ce8a06
BC
2123 /* insert the nodes back into the graph node list if needed */
2124 if (bs_new->node_name[0] != '\0') {
2125 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs_new, node_list);
2126 }
2127 if (bs_old->node_name[0] != '\0') {
2128 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs_old, node_list);
2129 }
2130
6e93e7c4
KW
2131 /*
2132 * Update lh_first.le_prev for non-empty lists.
2133 *
2134 * The head of the op blocker list doesn't change because it is moved back
2135 * in bdrv_move_feature_fields().
2136 */
6ee4ce1e
KW
2137 assert(QLIST_EMPTY(&bs_old->tracked_requests));
2138 assert(QLIST_EMPTY(&bs_new->tracked_requests));
2139
6e93e7c4
KW
2140 QLIST_FIX_HEAD_PTR(&bs_new->children, next);
2141 QLIST_FIX_HEAD_PTR(&bs_old->children, next);
2142
bddcec37
KW
2143 /* Update references in bs->opaque and children */
2144 QLIST_FOREACH(child, &bs_old->children, next) {
2145 if (child->bs->inherits_from == bs_new) {
2146 child->bs->inherits_from = bs_old;
2147 }
2148 }
2149 QLIST_FOREACH(child, &bs_new->children, next) {
2150 if (child->bs->inherits_from == bs_old) {
2151 child->bs->inherits_from = bs_new;
2152 }
2153 }
2154
e023b2e2 2155 bdrv_rebind(bs_new);
4ddc07ca
PB
2156 bdrv_rebind(bs_old);
2157}
2158
2159/*
2160 * Add new bs contents at the top of an image chain while the chain is
2161 * live, while keeping required fields on the top layer.
2162 *
2163 * This will modify the BlockDriverState fields, and swap contents
2164 * between bs_new and bs_top. Both bs_new and bs_top are modified.
2165 *
bfb197e0 2166 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2167 *
2168 * This function does not create any image files.
2169 */
2170void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top)
2171{
2172 bdrv_swap(bs_new, bs_top);
2173
2174 /* The contents of 'tmp' will become bs_top, as we are
2175 * swapping bs_new and bs_top contents. */
8d24cce1 2176 bdrv_set_backing_hd(bs_top, bs_new);
8802d1fd
JC
2177}
2178
4f6fd349 2179static void bdrv_delete(BlockDriverState *bs)
b338082b 2180{
3e914655 2181 assert(!bs->job);
3718d8ab 2182 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 2183 assert(!bs->refcnt);
e4654d2d 2184 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
18846dee 2185
e1b5c52e
SH
2186 bdrv_close(bs);
2187
1b7bdbc1 2188 /* remove from list, if necessary */
d22b2f41 2189 bdrv_make_anon(bs);
34c6f050 2190
7267c094 2191 g_free(bs);
fc01f7e7
FB
2192}
2193
e97fc193
AL
2194/*
2195 * Run consistency checks on an image
2196 *
e076f338 2197 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 2198 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 2199 * check are stored in res.
e97fc193 2200 */
4534ff54 2201int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 2202{
908bcd54
HR
2203 if (bs->drv == NULL) {
2204 return -ENOMEDIUM;
2205 }
e97fc193
AL
2206 if (bs->drv->bdrv_check == NULL) {
2207 return -ENOTSUP;
2208 }
2209
e076f338 2210 memset(res, 0, sizeof(*res));
4534ff54 2211 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
2212}
2213
8a426614
KW
2214#define COMMIT_BUF_SECTORS 2048
2215
33e3963e
FB
2216/* commit COW file into the raw image */
2217int bdrv_commit(BlockDriverState *bs)
2218{
19cb3738 2219 BlockDriver *drv = bs->drv;
72706ea4 2220 int64_t sector, total_sectors, length, backing_length;
8a426614 2221 int n, ro, open_flags;
0bce597d 2222 int ret = 0;
72706ea4 2223 uint8_t *buf = NULL;
33e3963e 2224
19cb3738
FB
2225 if (!drv)
2226 return -ENOMEDIUM;
6bb45158 2227
760e0063 2228 if (!bs->backing) {
4dca4b63 2229 return -ENOTSUP;
33e3963e
FB
2230 }
2231
bb00021d 2232 if (bdrv_op_is_blocked(bs, BLOCK_OP_TYPE_COMMIT_SOURCE, NULL) ||
760e0063 2233 bdrv_op_is_blocked(bs->backing->bs, BLOCK_OP_TYPE_COMMIT_TARGET, NULL)) {
2d3735d3
SH
2234 return -EBUSY;
2235 }
2236
760e0063
KW
2237 ro = bs->backing->bs->read_only;
2238 open_flags = bs->backing->bs->open_flags;
4dca4b63
NS
2239
2240 if (ro) {
760e0063 2241 if (bdrv_reopen(bs->backing->bs, open_flags | BDRV_O_RDWR, NULL)) {
0bce597d 2242 return -EACCES;
4dca4b63 2243 }
ea2384d3 2244 }
33e3963e 2245
72706ea4
JC
2246 length = bdrv_getlength(bs);
2247 if (length < 0) {
2248 ret = length;
2249 goto ro_cleanup;
2250 }
2251
760e0063 2252 backing_length = bdrv_getlength(bs->backing->bs);
72706ea4
JC
2253 if (backing_length < 0) {
2254 ret = backing_length;
2255 goto ro_cleanup;
2256 }
2257
2258 /* If our top snapshot is larger than the backing file image,
2259 * grow the backing file image if possible. If not possible,
2260 * we must return an error */
2261 if (length > backing_length) {
760e0063 2262 ret = bdrv_truncate(bs->backing->bs, length);
72706ea4
JC
2263 if (ret < 0) {
2264 goto ro_cleanup;
2265 }
2266 }
2267
2268 total_sectors = length >> BDRV_SECTOR_BITS;
857d4f46
KW
2269
2270 /* qemu_try_blockalign() for bs will choose an alignment that works for
760e0063 2271 * bs->backing->bs as well, so no need to compare the alignment manually. */
857d4f46
KW
2272 buf = qemu_try_blockalign(bs, COMMIT_BUF_SECTORS * BDRV_SECTOR_SIZE);
2273 if (buf == NULL) {
2274 ret = -ENOMEM;
2275 goto ro_cleanup;
2276 }
8a426614
KW
2277
2278 for (sector = 0; sector < total_sectors; sector += n) {
d663640c
PB
2279 ret = bdrv_is_allocated(bs, sector, COMMIT_BUF_SECTORS, &n);
2280 if (ret < 0) {
2281 goto ro_cleanup;
2282 }
2283 if (ret) {
dabfa6cc
KW
2284 ret = bdrv_read(bs, sector, buf, n);
2285 if (ret < 0) {
8a426614
KW
2286 goto ro_cleanup;
2287 }
2288
760e0063 2289 ret = bdrv_write(bs->backing->bs, sector, buf, n);
dabfa6cc 2290 if (ret < 0) {
8a426614
KW
2291 goto ro_cleanup;
2292 }
ea2384d3 2293 }
33e3963e 2294 }
95389c86 2295
1d44952f
CH
2296 if (drv->bdrv_make_empty) {
2297 ret = drv->bdrv_make_empty(bs);
dabfa6cc
KW
2298 if (ret < 0) {
2299 goto ro_cleanup;
2300 }
1d44952f
CH
2301 bdrv_flush(bs);
2302 }
95389c86 2303
3f5075ae
CH
2304 /*
2305 * Make sure all data we wrote to the backing device is actually
2306 * stable on disk.
2307 */
760e0063
KW
2308 if (bs->backing) {
2309 bdrv_flush(bs->backing->bs);
dabfa6cc 2310 }
4dca4b63 2311
dabfa6cc 2312 ret = 0;
4dca4b63 2313ro_cleanup:
857d4f46 2314 qemu_vfree(buf);
4dca4b63
NS
2315
2316 if (ro) {
0bce597d 2317 /* ignoring error return here */
760e0063 2318 bdrv_reopen(bs->backing->bs, open_flags & ~BDRV_O_RDWR, NULL);
4dca4b63
NS
2319 }
2320
1d44952f 2321 return ret;
33e3963e
FB
2322}
2323
e8877497 2324int bdrv_commit_all(void)
6ab4b5ab
MA
2325{
2326 BlockDriverState *bs;
2327
dc364f4c 2328 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
2329 AioContext *aio_context = bdrv_get_aio_context(bs);
2330
2331 aio_context_acquire(aio_context);
760e0063 2332 if (bs->drv && bs->backing) {
272d2d8e
JC
2333 int ret = bdrv_commit(bs);
2334 if (ret < 0) {
ed78cda3 2335 aio_context_release(aio_context);
272d2d8e
JC
2336 return ret;
2337 }
e8877497 2338 }
ed78cda3 2339 aio_context_release(aio_context);
6ab4b5ab 2340 }
e8877497 2341 return 0;
6ab4b5ab
MA
2342}
2343
756e6736
KW
2344/*
2345 * Return values:
2346 * 0 - success
2347 * -EINVAL - backing format specified, but no file
2348 * -ENOSPC - can't update the backing file because no space is left in the
2349 * image file header
2350 * -ENOTSUP - format driver doesn't support changing the backing file
2351 */
2352int bdrv_change_backing_file(BlockDriverState *bs,
2353 const char *backing_file, const char *backing_fmt)
2354{
2355 BlockDriver *drv = bs->drv;
469ef350 2356 int ret;
756e6736 2357
5f377794
PB
2358 /* Backing file format doesn't make sense without a backing file */
2359 if (backing_fmt && !backing_file) {
2360 return -EINVAL;
2361 }
2362
756e6736 2363 if (drv->bdrv_change_backing_file != NULL) {
469ef350 2364 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 2365 } else {
469ef350 2366 ret = -ENOTSUP;
756e6736 2367 }
469ef350
PB
2368
2369 if (ret == 0) {
2370 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
2371 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
2372 }
2373 return ret;
756e6736
KW
2374}
2375
6ebdcee2
JC
2376/*
2377 * Finds the image layer in the chain that has 'bs' as its backing file.
2378 *
2379 * active is the current topmost image.
2380 *
2381 * Returns NULL if bs is not found in active's image chain,
2382 * or if active == bs.
4caf0fcd
JC
2383 *
2384 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
2385 */
2386BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
2387 BlockDriverState *bs)
2388{
760e0063
KW
2389 while (active && bs != backing_bs(active)) {
2390 active = backing_bs(active);
6ebdcee2
JC
2391 }
2392
4caf0fcd
JC
2393 return active;
2394}
6ebdcee2 2395
4caf0fcd
JC
2396/* Given a BDS, searches for the base layer. */
2397BlockDriverState *bdrv_find_base(BlockDriverState *bs)
2398{
2399 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
2400}
2401
6ebdcee2
JC
2402/*
2403 * Drops images above 'base' up to and including 'top', and sets the image
2404 * above 'top' to have base as its backing file.
2405 *
2406 * Requires that the overlay to 'top' is opened r/w, so that the backing file
2407 * information in 'bs' can be properly updated.
2408 *
2409 * E.g., this will convert the following chain:
2410 * bottom <- base <- intermediate <- top <- active
2411 *
2412 * to
2413 *
2414 * bottom <- base <- active
2415 *
2416 * It is allowed for bottom==base, in which case it converts:
2417 *
2418 * base <- intermediate <- top <- active
2419 *
2420 * to
2421 *
2422 * base <- active
2423 *
54e26900
JC
2424 * If backing_file_str is non-NULL, it will be used when modifying top's
2425 * overlay image metadata.
2426 *
6ebdcee2
JC
2427 * Error conditions:
2428 * if active == top, that is considered an error
2429 *
2430 */
2431int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 2432 BlockDriverState *base, const char *backing_file_str)
6ebdcee2 2433{
6ebdcee2 2434 BlockDriverState *new_top_bs = NULL;
6ebdcee2
JC
2435 int ret = -EIO;
2436
6ebdcee2
JC
2437 if (!top->drv || !base->drv) {
2438 goto exit;
2439 }
2440
2441 new_top_bs = bdrv_find_overlay(active, top);
2442
2443 if (new_top_bs == NULL) {
2444 /* we could not find the image above 'top', this is an error */
2445 goto exit;
2446 }
2447
760e0063 2448 /* special case of new_top_bs->backing->bs already pointing to base - nothing
6ebdcee2 2449 * to do, no intermediate images */
760e0063 2450 if (backing_bs(new_top_bs) == base) {
6ebdcee2
JC
2451 ret = 0;
2452 goto exit;
2453 }
2454
5db15a57
KW
2455 /* Make sure that base is in the backing chain of top */
2456 if (!bdrv_chain_contains(top, base)) {
6ebdcee2
JC
2457 goto exit;
2458 }
2459
2460 /* success - we can delete the intermediate states, and link top->base */
5db15a57 2461 backing_file_str = backing_file_str ? backing_file_str : base->filename;
54e26900 2462 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
5db15a57 2463 base->drv ? base->drv->format_name : "");
6ebdcee2
JC
2464 if (ret) {
2465 goto exit;
2466 }
5db15a57 2467 bdrv_set_backing_hd(new_top_bs, base);
6ebdcee2 2468
6ebdcee2 2469 ret = 0;
6ebdcee2 2470exit:
6ebdcee2
JC
2471 return ret;
2472}
2473
61007b31
SH
2474/**
2475 * Truncate file to 'offset' bytes (needed only for file protocols)
2476 */
2477int bdrv_truncate(BlockDriverState *bs, int64_t offset)
71d0770c 2478{
61007b31
SH
2479 BlockDriver *drv = bs->drv;
2480 int ret;
2481 if (!drv)
71d0770c 2482 return -ENOMEDIUM;
61007b31
SH
2483 if (!drv->bdrv_truncate)
2484 return -ENOTSUP;
2485 if (bs->read_only)
2486 return -EACCES;
71d0770c 2487
61007b31
SH
2488 ret = drv->bdrv_truncate(bs, offset);
2489 if (ret == 0) {
2490 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
2491 bdrv_dirty_bitmap_truncate(bs);
2492 if (bs->blk) {
2493 blk_dev_resize_cb(bs->blk);
2494 }
c0191e76 2495 }
61007b31 2496 return ret;
71d0770c
AL
2497}
2498
61007b31
SH
2499/**
2500 * Length of a allocated file in bytes. Sparse files are counted by actual
2501 * allocated space. Return < 0 if error or unknown.
2502 */
2503int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 2504{
61007b31
SH
2505 BlockDriver *drv = bs->drv;
2506 if (!drv) {
2507 return -ENOMEDIUM;
8f4754ed 2508 }
61007b31
SH
2509 if (drv->bdrv_get_allocated_file_size) {
2510 return drv->bdrv_get_allocated_file_size(bs);
2511 }
2512 if (bs->file) {
9a4f4c31 2513 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 2514 }
61007b31 2515 return -ENOTSUP;
1c9805a3 2516}
e7a8a783 2517
61007b31
SH
2518/**
2519 * Return number of sectors on success, -errno on error.
1c9805a3 2520 */
61007b31 2521int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 2522{
61007b31 2523 BlockDriver *drv = bs->drv;
498e386c 2524
61007b31
SH
2525 if (!drv)
2526 return -ENOMEDIUM;
2572b37a 2527
61007b31
SH
2528 if (drv->has_variable_length) {
2529 int ret = refresh_total_sectors(bs, bs->total_sectors);
2530 if (ret < 0) {
2531 return ret;
1c9805a3
SH
2532 }
2533 }
61007b31 2534 return bs->total_sectors;
1c9805a3 2535}
b338082b 2536
61007b31
SH
2537/**
2538 * Return length in bytes on success, -errno on error.
2539 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 2540 */
61007b31 2541int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 2542{
61007b31 2543 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 2544
4a9c9ea0 2545 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 2546 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
2547}
2548
61007b31
SH
2549/* return 0 as number of sectors if no device present or error */
2550void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 2551{
61007b31 2552 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 2553
61007b31 2554 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
2555}
2556
61007b31
SH
2557void bdrv_set_on_error(BlockDriverState *bs, BlockdevOnError on_read_error,
2558 BlockdevOnError on_write_error)
fc01f7e7 2559{
61007b31
SH
2560 bs->on_read_error = on_read_error;
2561 bs->on_write_error = on_write_error;
83f64091
FB
2562}
2563
61007b31 2564BlockdevOnError bdrv_get_on_error(BlockDriverState *bs, bool is_read)
4105eaaa 2565{
61007b31 2566 return is_read ? bs->on_read_error : bs->on_write_error;
8d3b1a2d
KW
2567}
2568
61007b31 2569BlockErrorAction bdrv_get_error_action(BlockDriverState *bs, bool is_read, int error)
d75cbb5e 2570{
61007b31 2571 BlockdevOnError on_err = is_read ? bs->on_read_error : bs->on_write_error;
9ce10c0b 2572
61007b31
SH
2573 switch (on_err) {
2574 case BLOCKDEV_ON_ERROR_ENOSPC:
2575 return (error == ENOSPC) ?
2576 BLOCK_ERROR_ACTION_STOP : BLOCK_ERROR_ACTION_REPORT;
2577 case BLOCKDEV_ON_ERROR_STOP:
2578 return BLOCK_ERROR_ACTION_STOP;
2579 case BLOCKDEV_ON_ERROR_REPORT:
2580 return BLOCK_ERROR_ACTION_REPORT;
2581 case BLOCKDEV_ON_ERROR_IGNORE:
2582 return BLOCK_ERROR_ACTION_IGNORE;
2583 default:
2584 abort();
d75cbb5e
PL
2585 }
2586}
2587
61007b31
SH
2588static void send_qmp_error_event(BlockDriverState *bs,
2589 BlockErrorAction action,
2590 bool is_read, int error)
83f64091 2591{
61007b31 2592 IoOperationType optype;
a3ef6571 2593
61007b31
SH
2594 optype = is_read ? IO_OPERATION_TYPE_READ : IO_OPERATION_TYPE_WRITE;
2595 qapi_event_send_block_io_error(bdrv_get_device_name(bs), optype, action,
2596 bdrv_iostatus_is_enabled(bs),
2597 error == ENOSPC, strerror(error),
2598 &error_abort);
83f64091
FB
2599}
2600
61007b31
SH
2601/* This is done by device models because, while the block layer knows
2602 * about the error, it does not know whether an operation comes from
2603 * the device or the block layer (from a job, for example).
2604 */
2605void bdrv_error_action(BlockDriverState *bs, BlockErrorAction action,
2606 bool is_read, int error)
83f64091 2607{
61007b31 2608 assert(error >= 0);
83f64091 2609
61007b31
SH
2610 if (action == BLOCK_ERROR_ACTION_STOP) {
2611 /* First set the iostatus, so that "info block" returns an iostatus
2612 * that matches the events raised so far (an additional error iostatus
2613 * is fine, but not a lost one).
2614 */
2615 bdrv_iostatus_set_err(bs, error);
83f64091 2616
61007b31
SH
2617 /* Then raise the request to stop the VM and the event.
2618 * qemu_system_vmstop_request_prepare has two effects. First,
2619 * it ensures that the STOP event always comes after the
2620 * BLOCK_IO_ERROR event. Second, it ensures that even if management
2621 * can observe the STOP event and do a "cont" before the STOP
2622 * event is issued, the VM will not stop. In this case, vm_start()
2623 * also ensures that the STOP/RESUME pair of events is emitted.
2624 */
2625 qemu_system_vmstop_request_prepare();
2626 send_qmp_error_event(bs, action, is_read, error);
2627 qemu_system_vmstop_request(RUN_STATE_IO_ERROR);
2628 } else {
2629 send_qmp_error_event(bs, action, is_read, error);
2630 }
8d3b1a2d
KW
2631}
2632
61007b31 2633int bdrv_is_read_only(BlockDriverState *bs)
8d3b1a2d 2634{
61007b31 2635 return bs->read_only;
83f64091 2636}
83f64091 2637
61007b31 2638int bdrv_is_sg(BlockDriverState *bs)
f08145fe 2639{
61007b31 2640 return bs->sg;
f08145fe
KW
2641}
2642
61007b31 2643int bdrv_enable_write_cache(BlockDriverState *bs)
ab185921 2644{
61007b31 2645 return bs->enable_write_cache;
ab185921
SH
2646}
2647
61007b31 2648void bdrv_set_enable_write_cache(BlockDriverState *bs, bool wce)
da1fa91d 2649{
61007b31 2650 bs->enable_write_cache = wce;
ab185921 2651
61007b31
SH
2652 /* so a reopen() will preserve wce */
2653 if (wce) {
2654 bs->open_flags |= BDRV_O_CACHE_WB;
893a8f62 2655 } else {
61007b31 2656 bs->open_flags &= ~BDRV_O_CACHE_WB;
893a8f62 2657 }
da1fa91d
KW
2658}
2659
61007b31 2660int bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 2661{
760e0063 2662 if (bs->backing && bs->backing->bs->encrypted) {
61007b31 2663 return 1;
760e0063 2664 }
61007b31 2665 return bs->encrypted;
fc3959e4
FZ
2666}
2667
61007b31 2668int bdrv_key_required(BlockDriverState *bs)
fc3959e4 2669{
760e0063 2670 BdrvChild *backing = bs->backing;
61007b31 2671
760e0063 2672 if (backing && backing->bs->encrypted && !backing->bs->valid_key) {
61007b31 2673 return 1;
760e0063 2674 }
61007b31 2675 return (bs->encrypted && !bs->valid_key);
fc3959e4
FZ
2676}
2677
61007b31 2678int bdrv_set_key(BlockDriverState *bs, const char *key)
d0c7f642 2679{
d0c7f642 2680 int ret;
760e0063
KW
2681 if (bs->backing && bs->backing->bs->encrypted) {
2682 ret = bdrv_set_key(bs->backing->bs, key);
61007b31
SH
2683 if (ret < 0)
2684 return ret;
2685 if (!bs->encrypted)
2686 return 0;
2687 }
2688 if (!bs->encrypted) {
2689 return -EINVAL;
2690 } else if (!bs->drv || !bs->drv->bdrv_set_key) {
d0c7f642
KW
2691 return -ENOMEDIUM;
2692 }
61007b31 2693 ret = bs->drv->bdrv_set_key(bs, key);
b9c64947 2694 if (ret < 0) {
61007b31
SH
2695 bs->valid_key = 0;
2696 } else if (!bs->valid_key) {
2697 bs->valid_key = 1;
2698 if (bs->blk) {
2699 /* call the change callback now, we skipped it on open */
2700 blk_dev_change_media_cb(bs->blk, true);
2701 }
1b0288ae 2702 }
61007b31
SH
2703 return ret;
2704}
f08f2dda 2705
c5fbe571 2706/*
61007b31
SH
2707 * Provide an encryption key for @bs.
2708 * If @key is non-null:
2709 * If @bs is not encrypted, fail.
2710 * Else if the key is invalid, fail.
2711 * Else set @bs's key to @key, replacing the existing key, if any.
2712 * If @key is null:
2713 * If @bs is encrypted and still lacks a key, fail.
2714 * Else do nothing.
2715 * On failure, store an error object through @errp if non-null.
c5fbe571 2716 */
61007b31 2717void bdrv_add_key(BlockDriverState *bs, const char *key, Error **errp)
c5fbe571 2718{
61007b31
SH
2719 if (key) {
2720 if (!bdrv_is_encrypted(bs)) {
2721 error_setg(errp, "Node '%s' is not encrypted",
2722 bdrv_get_device_or_node_name(bs));
2723 } else if (bdrv_set_key(bs, key) < 0) {
c6bd8c70 2724 error_setg(errp, QERR_INVALID_PASSWORD);
4d2855a3
MA
2725 }
2726 } else {
2727 if (bdrv_key_required(bs)) {
b1ca6391
MA
2728 error_set(errp, ERROR_CLASS_DEVICE_ENCRYPTED,
2729 "'%s' (%s) is encrypted",
81e5f78a 2730 bdrv_get_device_or_node_name(bs),
4d2855a3
MA
2731 bdrv_get_encrypted_filename(bs));
2732 }
2733 }
2734}
2735
61007b31 2736const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 2737{
61007b31 2738 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
2739}
2740
61007b31 2741static int qsort_strcmp(const void *a, const void *b)
40b4f539 2742{
61007b31 2743 return strcmp(a, b);
40b4f539
KW
2744}
2745
61007b31
SH
2746void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
2747 void *opaque)
40b4f539 2748{
61007b31
SH
2749 BlockDriver *drv;
2750 int count = 0;
2751 int i;
2752 const char **formats = NULL;
40b4f539 2753
61007b31
SH
2754 QLIST_FOREACH(drv, &bdrv_drivers, list) {
2755 if (drv->format_name) {
2756 bool found = false;
2757 int i = count;
2758 while (formats && i && !found) {
2759 found = !strcmp(formats[--i], drv->format_name);
2760 }
e2a305fb 2761
61007b31
SH
2762 if (!found) {
2763 formats = g_renew(const char *, formats, count + 1);
2764 formats[count++] = drv->format_name;
2765 }
6c5a42ac 2766 }
61007b31 2767 }
6c5a42ac 2768
61007b31 2769 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 2770
61007b31
SH
2771 for (i = 0; i < count; i++) {
2772 it(opaque, formats[i]);
2773 }
40b4f539 2774
61007b31
SH
2775 g_free(formats);
2776}
40b4f539 2777
61007b31
SH
2778/* This function is to find a node in the bs graph */
2779BlockDriverState *bdrv_find_node(const char *node_name)
2780{
2781 BlockDriverState *bs;
391827eb 2782
61007b31 2783 assert(node_name);
40b4f539 2784
61007b31
SH
2785 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2786 if (!strcmp(node_name, bs->node_name)) {
2787 return bs;
40b4f539
KW
2788 }
2789 }
61007b31 2790 return NULL;
40b4f539
KW
2791}
2792
61007b31
SH
2793/* Put this QMP function here so it can access the static graph_bdrv_states. */
2794BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 2795{
61007b31
SH
2796 BlockDeviceInfoList *list, *entry;
2797 BlockDriverState *bs;
40b4f539 2798
61007b31
SH
2799 list = NULL;
2800 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2801 BlockDeviceInfo *info = bdrv_block_device_info(bs, errp);
2802 if (!info) {
2803 qapi_free_BlockDeviceInfoList(list);
2804 return NULL;
301db7c2 2805 }
61007b31
SH
2806 entry = g_malloc0(sizeof(*entry));
2807 entry->value = info;
2808 entry->next = list;
2809 list = entry;
301db7c2
RH
2810 }
2811
61007b31
SH
2812 return list;
2813}
40b4f539 2814
61007b31
SH
2815BlockDriverState *bdrv_lookup_bs(const char *device,
2816 const char *node_name,
2817 Error **errp)
2818{
2819 BlockBackend *blk;
2820 BlockDriverState *bs;
40b4f539 2821
61007b31
SH
2822 if (device) {
2823 blk = blk_by_name(device);
40b4f539 2824
61007b31
SH
2825 if (blk) {
2826 return blk_bs(blk);
2827 }
2828 }
40b4f539 2829
61007b31
SH
2830 if (node_name) {
2831 bs = bdrv_find_node(node_name);
6d519a5f 2832
61007b31
SH
2833 if (bs) {
2834 return bs;
2835 }
40b4f539
KW
2836 }
2837
61007b31
SH
2838 error_setg(errp, "Cannot find device=%s nor node_name=%s",
2839 device ? device : "",
2840 node_name ? node_name : "");
2841 return NULL;
40b4f539
KW
2842}
2843
61007b31
SH
2844/* If 'base' is in the same chain as 'top', return true. Otherwise,
2845 * return false. If either argument is NULL, return false. */
2846bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 2847{
61007b31 2848 while (top && top != base) {
760e0063 2849 top = backing_bs(top);
02c50efe 2850 }
61007b31
SH
2851
2852 return top != NULL;
02c50efe
FZ
2853}
2854
61007b31 2855BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 2856{
61007b31
SH
2857 if (!bs) {
2858 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 2859 }
61007b31 2860 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
2861}
2862
61007b31 2863BlockDriverState *bdrv_next(BlockDriverState *bs)
83f64091 2864{
61007b31
SH
2865 if (!bs) {
2866 return QTAILQ_FIRST(&bdrv_states);
857d4f46 2867 }
61007b31 2868 return QTAILQ_NEXT(bs, device_list);
83f64091 2869}
beac80cd 2870
61007b31 2871const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 2872{
61007b31 2873 return bs->node_name;
beac80cd
FB
2874}
2875
61007b31
SH
2876/* TODO check what callers really want: bs->node_name or blk_name() */
2877const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 2878{
61007b31 2879 return bs->blk ? blk_name(bs->blk) : "";
f141eafe 2880}
83f64091 2881
61007b31
SH
2882/* This can be used to identify nodes that might not have a device
2883 * name associated. Since node and device names live in the same
2884 * namespace, the result is unambiguous. The exception is if both are
2885 * absent, then this returns an empty (non-null) string. */
2886const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 2887{
61007b31 2888 return bs->blk ? blk_name(bs->blk) : bs->node_name;
beac80cd 2889}
beac80cd 2890
61007b31 2891int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 2892{
61007b31 2893 return bs->open_flags;
0b5a2445
PB
2894}
2895
61007b31 2896int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 2897{
61007b31 2898 return 1;
0b5a2445
PB
2899}
2900
61007b31 2901int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 2902{
61007b31 2903 assert(bs->drv);
0b5a2445 2904
61007b31
SH
2905 /* If BS is a copy on write image, it is initialized to
2906 the contents of the base image, which may not be zeroes. */
760e0063 2907 if (bs->backing) {
61007b31
SH
2908 return 0;
2909 }
2910 if (bs->drv->bdrv_has_zero_init) {
2911 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 2912 }
61007b31
SH
2913
2914 /* safe default */
2915 return 0;
68485420
KW
2916}
2917
61007b31 2918bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 2919{
61007b31 2920 BlockDriverInfo bdi;
b2a61371 2921
760e0063 2922 if (bs->backing) {
61007b31
SH
2923 return false;
2924 }
2925
2926 if (bdrv_get_info(bs, &bdi) == 0) {
2927 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
2928 }
2929
61007b31 2930 return false;
b2a61371
SH
2931}
2932
61007b31 2933bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 2934{
61007b31 2935 BlockDriverInfo bdi;
68485420 2936
760e0063 2937 if (bs->backing || !(bs->open_flags & BDRV_O_UNMAP)) {
61007b31
SH
2938 return false;
2939 }
68485420 2940
61007b31
SH
2941 if (bdrv_get_info(bs, &bdi) == 0) {
2942 return bdi.can_write_zeroes_with_unmap;
2943 }
68485420 2944
61007b31 2945 return false;
68485420
KW
2946}
2947
61007b31 2948const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 2949{
760e0063 2950 if (bs->backing && bs->backing->bs->encrypted)
61007b31
SH
2951 return bs->backing_file;
2952 else if (bs->encrypted)
2953 return bs->filename;
2954 else
2955 return NULL;
b2e12bc6
CH
2956}
2957
61007b31
SH
2958void bdrv_get_backing_filename(BlockDriverState *bs,
2959 char *filename, int filename_size)
016f5cf6 2960{
61007b31
SH
2961 pstrcpy(filename, filename_size, bs->backing_file);
2962}
d318aea9 2963
61007b31
SH
2964int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
2965{
2966 BlockDriver *drv = bs->drv;
2967 if (!drv)
2968 return -ENOMEDIUM;
2969 if (!drv->bdrv_get_info)
2970 return -ENOTSUP;
2971 memset(bdi, 0, sizeof(*bdi));
2972 return drv->bdrv_get_info(bs, bdi);
2973}
016f5cf6 2974
61007b31
SH
2975ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
2976{
2977 BlockDriver *drv = bs->drv;
2978 if (drv && drv->bdrv_get_specific_info) {
2979 return drv->bdrv_get_specific_info(bs);
2980 }
2981 return NULL;
016f5cf6
AG
2982}
2983
61007b31 2984void bdrv_debug_event(BlockDriverState *bs, BlkDebugEvent event)
4265d620 2985{
61007b31
SH
2986 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
2987 return;
2988 }
4265d620 2989
61007b31 2990 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
2991}
2992
61007b31
SH
2993int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
2994 const char *tag)
4265d620 2995{
61007b31 2996 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 2997 bs = bs->file ? bs->file->bs : NULL;
61007b31 2998 }
4265d620 2999
61007b31
SH
3000 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
3001 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
3002 }
4265d620 3003
61007b31 3004 return -ENOTSUP;
4265d620
PB
3005}
3006
61007b31 3007int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 3008{
61007b31 3009 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 3010 bs = bs->file ? bs->file->bs : NULL;
61007b31 3011 }
ce1a14dc 3012
61007b31
SH
3013 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
3014 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
3015 }
3016
3017 return -ENOTSUP;
eb852011
MA
3018}
3019
61007b31 3020int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 3021{
61007b31 3022 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 3023 bs = bs->file ? bs->file->bs : NULL;
61007b31 3024 }
ce1a14dc 3025
61007b31
SH
3026 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
3027 return bs->drv->bdrv_debug_resume(bs, tag);
3028 }
ce1a14dc 3029
61007b31 3030 return -ENOTSUP;
f197fe2b
FZ
3031}
3032
61007b31 3033bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 3034{
61007b31 3035 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 3036 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 3037 }
19cb3738 3038
61007b31
SH
3039 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
3040 return bs->drv->bdrv_debug_is_suspended(bs, tag);
3041 }
f9f05dc5 3042
61007b31
SH
3043 return false;
3044}
f9f05dc5 3045
61007b31 3046int bdrv_is_snapshot(BlockDriverState *bs)
f9f05dc5 3047{
61007b31 3048 return !!(bs->open_flags & BDRV_O_SNAPSHOT);
f9f05dc5
KW
3049}
3050
61007b31
SH
3051/* backing_file can either be relative, or absolute, or a protocol. If it is
3052 * relative, it must be relative to the chain. So, passing in bs->filename
3053 * from a BDS as backing_file should not be done, as that may be relative to
3054 * the CWD rather than the chain. */
3055BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
3056 const char *backing_file)
f9f05dc5 3057{
61007b31
SH
3058 char *filename_full = NULL;
3059 char *backing_file_full = NULL;
3060 char *filename_tmp = NULL;
3061 int is_protocol = 0;
3062 BlockDriverState *curr_bs = NULL;
3063 BlockDriverState *retval = NULL;
f9f05dc5 3064
61007b31
SH
3065 if (!bs || !bs->drv || !backing_file) {
3066 return NULL;
f9f05dc5
KW
3067 }
3068
61007b31
SH
3069 filename_full = g_malloc(PATH_MAX);
3070 backing_file_full = g_malloc(PATH_MAX);
3071 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 3072
61007b31 3073 is_protocol = path_has_protocol(backing_file);
f9f05dc5 3074
760e0063 3075 for (curr_bs = bs; curr_bs->backing; curr_bs = curr_bs->backing->bs) {
f9f05dc5 3076
61007b31
SH
3077 /* If either of the filename paths is actually a protocol, then
3078 * compare unmodified paths; otherwise make paths relative */
3079 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
3080 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
760e0063 3081 retval = curr_bs->backing->bs;
61007b31
SH
3082 break;
3083 }
3084 } else {
3085 /* If not an absolute filename path, make it relative to the current
3086 * image's filename path */
3087 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3088 backing_file);
f9f05dc5 3089
61007b31
SH
3090 /* We are going to compare absolute pathnames */
3091 if (!realpath(filename_tmp, filename_full)) {
3092 continue;
3093 }
07f07615 3094
61007b31
SH
3095 /* We need to make sure the backing filename we are comparing against
3096 * is relative to the current image filename (or absolute) */
3097 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3098 curr_bs->backing_file);
07f07615 3099
61007b31
SH
3100 if (!realpath(filename_tmp, backing_file_full)) {
3101 continue;
3102 }
eb489bb1 3103
61007b31 3104 if (strcmp(backing_file_full, filename_full) == 0) {
760e0063 3105 retval = curr_bs->backing->bs;
61007b31
SH
3106 break;
3107 }
3108 }
eb489bb1
KW
3109 }
3110
61007b31
SH
3111 g_free(filename_full);
3112 g_free(backing_file_full);
3113 g_free(filename_tmp);
3114 return retval;
3115}
3116
3117int bdrv_get_backing_file_depth(BlockDriverState *bs)
3118{
3119 if (!bs->drv) {
3120 return 0;
eb489bb1
KW
3121 }
3122
760e0063 3123 if (!bs->backing) {
61007b31 3124 return 0;
ca716364
KW
3125 }
3126
760e0063 3127 return 1 + bdrv_get_backing_file_depth(bs->backing->bs);
61007b31 3128}
07f07615 3129
61007b31
SH
3130void bdrv_init(void)
3131{
3132 module_call_init(MODULE_INIT_BLOCK);
3133}
29cdb251 3134
61007b31
SH
3135void bdrv_init_with_whitelist(void)
3136{
3137 use_bdrv_whitelist = 1;
3138 bdrv_init();
07f07615
PB
3139}
3140
5a8a30db 3141void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 3142{
5a8a30db
KW
3143 Error *local_err = NULL;
3144 int ret;
3145
3456a8d1
KW
3146 if (!bs->drv) {
3147 return;
3148 }
3149
7ea2d269
AK
3150 if (!(bs->open_flags & BDRV_O_INCOMING)) {
3151 return;
3152 }
3153 bs->open_flags &= ~BDRV_O_INCOMING;
3154
3456a8d1 3155 if (bs->drv->bdrv_invalidate_cache) {
5a8a30db 3156 bs->drv->bdrv_invalidate_cache(bs, &local_err);
3456a8d1 3157 } else if (bs->file) {
9a4f4c31 3158 bdrv_invalidate_cache(bs->file->bs, &local_err);
5a8a30db
KW
3159 }
3160 if (local_err) {
3161 error_propagate(errp, local_err);
3162 return;
0f15423c 3163 }
3456a8d1 3164
5a8a30db
KW
3165 ret = refresh_total_sectors(bs, bs->total_sectors);
3166 if (ret < 0) {
3167 error_setg_errno(errp, -ret, "Could not refresh total sector count");
3168 return;
3169 }
0f15423c
AL
3170}
3171
5a8a30db 3172void bdrv_invalidate_cache_all(Error **errp)
0f15423c
AL
3173{
3174 BlockDriverState *bs;
5a8a30db 3175 Error *local_err = NULL;
0f15423c 3176
dc364f4c 3177 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
3178 AioContext *aio_context = bdrv_get_aio_context(bs);
3179
3180 aio_context_acquire(aio_context);
5a8a30db 3181 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 3182 aio_context_release(aio_context);
5a8a30db
KW
3183 if (local_err) {
3184 error_propagate(errp, local_err);
3185 return;
3186 }
0f15423c
AL
3187 }
3188}
3189
19cb3738
FB
3190/**************************************************************/
3191/* removable device support */
3192
3193/**
3194 * Return TRUE if the media is present
3195 */
3196int bdrv_is_inserted(BlockDriverState *bs)
3197{
3198 BlockDriver *drv = bs->drv;
a1aff5bf 3199
19cb3738
FB
3200 if (!drv)
3201 return 0;
3202 if (!drv->bdrv_is_inserted)
a1aff5bf
MA
3203 return 1;
3204 return drv->bdrv_is_inserted(bs);
19cb3738
FB
3205}
3206
3207/**
8e49ca46
MA
3208 * Return whether the media changed since the last call to this
3209 * function, or -ENOTSUP if we don't know. Most drivers don't know.
19cb3738
FB
3210 */
3211int bdrv_media_changed(BlockDriverState *bs)
3212{
3213 BlockDriver *drv = bs->drv;
19cb3738 3214
8e49ca46
MA
3215 if (drv && drv->bdrv_media_changed) {
3216 return drv->bdrv_media_changed(bs);
3217 }
3218 return -ENOTSUP;
19cb3738
FB
3219}
3220
3221/**
3222 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
3223 */
f36f3949 3224void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
3225{
3226 BlockDriver *drv = bs->drv;
bfb197e0 3227 const char *device_name;
19cb3738 3228
822e1cd1
MA
3229 if (drv && drv->bdrv_eject) {
3230 drv->bdrv_eject(bs, eject_flag);
19cb3738 3231 }
6f382ed2 3232
bfb197e0
MA
3233 device_name = bdrv_get_device_name(bs);
3234 if (device_name[0] != '\0') {
3235 qapi_event_send_device_tray_moved(device_name,
a5ee7bd4 3236 eject_flag, &error_abort);
6f382ed2 3237 }
19cb3738
FB
3238}
3239
19cb3738
FB
3240/**
3241 * Lock or unlock the media (if it is locked, the user won't be able
3242 * to eject it manually).
3243 */
025e849a 3244void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
3245{
3246 BlockDriver *drv = bs->drv;
3247
025e849a 3248 trace_bdrv_lock_medium(bs, locked);
b8c6d095 3249
025e849a
MA
3250 if (drv && drv->bdrv_lock_medium) {
3251 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
3252 }
3253}
985a03b0 3254
1b7fd729 3255void bdrv_set_guest_block_size(BlockDriverState *bs, int align)
7b6f9300 3256{
1b7fd729 3257 bs->guest_block_size = align;
7b6f9300 3258}
7cd1e32a 3259
0db6e54a
FZ
3260BdrvDirtyBitmap *bdrv_find_dirty_bitmap(BlockDriverState *bs, const char *name)
3261{
3262 BdrvDirtyBitmap *bm;
3263
3264 assert(name);
3265 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
3266 if (bm->name && !strcmp(name, bm->name)) {
3267 return bm;
3268 }
3269 }
3270 return NULL;
3271}
3272
20dca810 3273void bdrv_dirty_bitmap_make_anon(BdrvDirtyBitmap *bitmap)
0db6e54a 3274{
9bd2b08f 3275 assert(!bdrv_dirty_bitmap_frozen(bitmap));
0db6e54a
FZ
3276 g_free(bitmap->name);
3277 bitmap->name = NULL;
3278}
3279
3280BdrvDirtyBitmap *bdrv_create_dirty_bitmap(BlockDriverState *bs,
5fba6c0e 3281 uint32_t granularity,
0db6e54a 3282 const char *name,
b8afb520 3283 Error **errp)
7cd1e32a
LS
3284{
3285 int64_t bitmap_size;
e4654d2d 3286 BdrvDirtyBitmap *bitmap;
5fba6c0e 3287 uint32_t sector_granularity;
a55eb92c 3288
50717e94
PB
3289 assert((granularity & (granularity - 1)) == 0);
3290
0db6e54a
FZ
3291 if (name && bdrv_find_dirty_bitmap(bs, name)) {
3292 error_setg(errp, "Bitmap already exists: %s", name);
3293 return NULL;
3294 }
5fba6c0e
JS
3295 sector_granularity = granularity >> BDRV_SECTOR_BITS;
3296 assert(sector_granularity);
57322b78 3297 bitmap_size = bdrv_nb_sectors(bs);
b8afb520
FZ
3298 if (bitmap_size < 0) {
3299 error_setg_errno(errp, -bitmap_size, "could not get length of device");
3300 errno = -bitmap_size;
3301 return NULL;
3302 }
5839e53b 3303 bitmap = g_new0(BdrvDirtyBitmap, 1);
5fba6c0e 3304 bitmap->bitmap = hbitmap_alloc(bitmap_size, ctz32(sector_granularity));
e74e6b78 3305 bitmap->size = bitmap_size;
0db6e54a 3306 bitmap->name = g_strdup(name);
b8e6fb75 3307 bitmap->disabled = false;
e4654d2d
FZ
3308 QLIST_INSERT_HEAD(&bs->dirty_bitmaps, bitmap, list);
3309 return bitmap;
3310}
3311
9bd2b08f
JS
3312bool bdrv_dirty_bitmap_frozen(BdrvDirtyBitmap *bitmap)
3313{
3314 return bitmap->successor;
3315}
3316
b8e6fb75
JS
3317bool bdrv_dirty_bitmap_enabled(BdrvDirtyBitmap *bitmap)
3318{
9bd2b08f
JS
3319 return !(bitmap->disabled || bitmap->successor);
3320}
3321
9abe3bdc
JS
3322DirtyBitmapStatus bdrv_dirty_bitmap_status(BdrvDirtyBitmap *bitmap)
3323{
3324 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3325 return DIRTY_BITMAP_STATUS_FROZEN;
3326 } else if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3327 return DIRTY_BITMAP_STATUS_DISABLED;
3328 } else {
3329 return DIRTY_BITMAP_STATUS_ACTIVE;
3330 }
3331}
3332
9bd2b08f
JS
3333/**
3334 * Create a successor bitmap destined to replace this bitmap after an operation.
3335 * Requires that the bitmap is not frozen and has no successor.
3336 */
3337int bdrv_dirty_bitmap_create_successor(BlockDriverState *bs,
3338 BdrvDirtyBitmap *bitmap, Error **errp)
3339{
3340 uint64_t granularity;
3341 BdrvDirtyBitmap *child;
3342
3343 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3344 error_setg(errp, "Cannot create a successor for a bitmap that is "
3345 "currently frozen");
3346 return -1;
3347 }
3348 assert(!bitmap->successor);
3349
3350 /* Create an anonymous successor */
3351 granularity = bdrv_dirty_bitmap_granularity(bitmap);
3352 child = bdrv_create_dirty_bitmap(bs, granularity, NULL, errp);
3353 if (!child) {
3354 return -1;
3355 }
3356
3357 /* Successor will be on or off based on our current state. */
3358 child->disabled = bitmap->disabled;
3359
3360 /* Install the successor and freeze the parent */
3361 bitmap->successor = child;
3362 return 0;
3363}
3364
3365/**
3366 * For a bitmap with a successor, yield our name to the successor,
3367 * delete the old bitmap, and return a handle to the new bitmap.
3368 */
3369BdrvDirtyBitmap *bdrv_dirty_bitmap_abdicate(BlockDriverState *bs,
3370 BdrvDirtyBitmap *bitmap,
3371 Error **errp)
3372{
3373 char *name;
3374 BdrvDirtyBitmap *successor = bitmap->successor;
3375
3376 if (successor == NULL) {
3377 error_setg(errp, "Cannot relinquish control if "
3378 "there's no successor present");
3379 return NULL;
3380 }
3381
3382 name = bitmap->name;
3383 bitmap->name = NULL;
3384 successor->name = name;
3385 bitmap->successor = NULL;
3386 bdrv_release_dirty_bitmap(bs, bitmap);
3387
3388 return successor;
3389}
3390
3391/**
3392 * In cases of failure where we can no longer safely delete the parent,
3393 * we may wish to re-join the parent and child/successor.
3394 * The merged parent will be un-frozen, but not explicitly re-enabled.
3395 */
3396BdrvDirtyBitmap *bdrv_reclaim_dirty_bitmap(BlockDriverState *bs,
3397 BdrvDirtyBitmap *parent,
3398 Error **errp)
3399{
3400 BdrvDirtyBitmap *successor = parent->successor;
3401
3402 if (!successor) {
3403 error_setg(errp, "Cannot reclaim a successor when none is present");
3404 return NULL;
3405 }
3406
3407 if (!hbitmap_merge(parent->bitmap, successor->bitmap)) {
3408 error_setg(errp, "Merging of parent and successor bitmap failed");
3409 return NULL;
3410 }
3411 bdrv_release_dirty_bitmap(bs, successor);
3412 parent->successor = NULL;
3413
3414 return parent;
b8e6fb75
JS
3415}
3416
ce1ffea8
JS
3417/**
3418 * Truncates _all_ bitmaps attached to a BDS.
3419 */
3420static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs)
3421{
3422 BdrvDirtyBitmap *bitmap;
3423 uint64_t size = bdrv_nb_sectors(bs);
3424
3425 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
06207b0f 3426 assert(!bdrv_dirty_bitmap_frozen(bitmap));
ce1ffea8 3427 hbitmap_truncate(bitmap->bitmap, size);
5270b6a0 3428 bitmap->size = size;
ce1ffea8
JS
3429 }
3430}
3431
e4654d2d
FZ
3432void bdrv_release_dirty_bitmap(BlockDriverState *bs, BdrvDirtyBitmap *bitmap)
3433{
3434 BdrvDirtyBitmap *bm, *next;
3435 QLIST_FOREACH_SAFE(bm, &bs->dirty_bitmaps, list, next) {
3436 if (bm == bitmap) {
9bd2b08f 3437 assert(!bdrv_dirty_bitmap_frozen(bm));
e4654d2d
FZ
3438 QLIST_REMOVE(bitmap, list);
3439 hbitmap_free(bitmap->bitmap);
0db6e54a 3440 g_free(bitmap->name);
e4654d2d
FZ
3441 g_free(bitmap);
3442 return;
a55eb92c 3443 }
7cd1e32a
LS
3444 }
3445}
3446
b8e6fb75
JS
3447void bdrv_disable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3448{
9bd2b08f 3449 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3450 bitmap->disabled = true;
3451}
3452
3453void bdrv_enable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3454{
9bd2b08f 3455 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3456 bitmap->disabled = false;
3457}
3458
21b56835
FZ
3459BlockDirtyInfoList *bdrv_query_dirty_bitmaps(BlockDriverState *bs)
3460{
3461 BdrvDirtyBitmap *bm;
3462 BlockDirtyInfoList *list = NULL;
3463 BlockDirtyInfoList **plist = &list;
3464
3465 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
5839e53b
MA
3466 BlockDirtyInfo *info = g_new0(BlockDirtyInfo, 1);
3467 BlockDirtyInfoList *entry = g_new0(BlockDirtyInfoList, 1);
20dca810 3468 info->count = bdrv_get_dirty_count(bm);
592fdd02 3469 info->granularity = bdrv_dirty_bitmap_granularity(bm);
0db6e54a
FZ
3470 info->has_name = !!bm->name;
3471 info->name = g_strdup(bm->name);
9abe3bdc 3472 info->status = bdrv_dirty_bitmap_status(bm);
21b56835
FZ
3473 entry->value = info;
3474 *plist = entry;
3475 plist = &entry->next;
3476 }
3477
3478 return list;
3479}
3480
e4654d2d 3481int bdrv_get_dirty(BlockDriverState *bs, BdrvDirtyBitmap *bitmap, int64_t sector)
7cd1e32a 3482{
e4654d2d
FZ
3483 if (bitmap) {
3484 return hbitmap_get(bitmap->bitmap, sector);
7cd1e32a
LS
3485 } else {
3486 return 0;
3487 }
3488}
3489
341ebc2f
JS
3490/**
3491 * Chooses a default granularity based on the existing cluster size,
3492 * but clamped between [4K, 64K]. Defaults to 64K in the case that there
3493 * is no cluster size information available.
3494 */
3495uint32_t bdrv_get_default_bitmap_granularity(BlockDriverState *bs)
3496{
3497 BlockDriverInfo bdi;
3498 uint32_t granularity;
3499
3500 if (bdrv_get_info(bs, &bdi) >= 0 && bdi.cluster_size > 0) {
3501 granularity = MAX(4096, bdi.cluster_size);
3502 granularity = MIN(65536, granularity);
3503 } else {
3504 granularity = 65536;
3505 }
3506
3507 return granularity;
3508}
3509
592fdd02
JS
3510uint32_t bdrv_dirty_bitmap_granularity(BdrvDirtyBitmap *bitmap)
3511{
3512 return BDRV_SECTOR_SIZE << hbitmap_granularity(bitmap->bitmap);
3513}
3514
20dca810 3515void bdrv_dirty_iter_init(BdrvDirtyBitmap *bitmap, HBitmapIter *hbi)
1755da16 3516{
e4654d2d 3517 hbitmap_iter_init(hbi, bitmap->bitmap, 0);
1755da16
PB
3518}
3519
20dca810 3520void bdrv_set_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3521 int64_t cur_sector, int nr_sectors)
3522{
b8e6fb75 3523 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3524 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3525}
3526
20dca810 3527void bdrv_reset_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3528 int64_t cur_sector, int nr_sectors)
3529{
b8e6fb75 3530 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3531 hbitmap_reset(bitmap->bitmap, cur_sector, nr_sectors);
3532}
3533
e74e6b78
JS
3534void bdrv_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3535{
3536 assert(bdrv_dirty_bitmap_enabled(bitmap));
c6a8c328 3537 hbitmap_reset_all(bitmap->bitmap);
e74e6b78
JS
3538}
3539
e0c47b6c
SH
3540void bdrv_set_dirty(BlockDriverState *bs, int64_t cur_sector,
3541 int nr_sectors)
1755da16 3542{
e4654d2d
FZ
3543 BdrvDirtyBitmap *bitmap;
3544 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
b8e6fb75
JS
3545 if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3546 continue;
3547 }
e4654d2d
FZ
3548 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3549 }
1755da16
PB
3550}
3551
d58d8453
JS
3552/**
3553 * Advance an HBitmapIter to an arbitrary offset.
3554 */
3555void bdrv_set_dirty_iter(HBitmapIter *hbi, int64_t offset)
3556{
3557 assert(hbi->hb);
3558 hbitmap_iter_init(hbi, hbi->hb, offset);
3559}
3560
20dca810 3561int64_t bdrv_get_dirty_count(BdrvDirtyBitmap *bitmap)
aaa0eb75 3562{
e4654d2d 3563 return hbitmap_count(bitmap->bitmap);
aaa0eb75 3564}
f88e1a42 3565
9fcb0251
FZ
3566/* Get a reference to bs */
3567void bdrv_ref(BlockDriverState *bs)
3568{
3569 bs->refcnt++;
3570}
3571
3572/* Release a previously grabbed reference to bs.
3573 * If after releasing, reference count is zero, the BlockDriverState is
3574 * deleted. */
3575void bdrv_unref(BlockDriverState *bs)
3576{
9a4d5ca6
JC
3577 if (!bs) {
3578 return;
3579 }
9fcb0251
FZ
3580 assert(bs->refcnt > 0);
3581 if (--bs->refcnt == 0) {
3582 bdrv_delete(bs);
3583 }
3584}
3585
fbe40ff7
FZ
3586struct BdrvOpBlocker {
3587 Error *reason;
3588 QLIST_ENTRY(BdrvOpBlocker) list;
3589};
3590
3591bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
3592{
3593 BdrvOpBlocker *blocker;
3594 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3595 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
3596 blocker = QLIST_FIRST(&bs->op_blockers[op]);
3597 if (errp) {
81e5f78a
AG
3598 error_setg(errp, "Node '%s' is busy: %s",
3599 bdrv_get_device_or_node_name(bs),
bfb197e0 3600 error_get_pretty(blocker->reason));
fbe40ff7
FZ
3601 }
3602 return true;
3603 }
3604 return false;
3605}
3606
3607void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
3608{
3609 BdrvOpBlocker *blocker;
3610 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3611
5839e53b 3612 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
3613 blocker->reason = reason;
3614 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
3615}
3616
3617void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
3618{
3619 BdrvOpBlocker *blocker, *next;
3620 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3621 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
3622 if (blocker->reason == reason) {
3623 QLIST_REMOVE(blocker, list);
3624 g_free(blocker);
3625 }
3626 }
3627}
3628
3629void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
3630{
3631 int i;
3632 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3633 bdrv_op_block(bs, i, reason);
3634 }
3635}
3636
3637void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
3638{
3639 int i;
3640 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3641 bdrv_op_unblock(bs, i, reason);
3642 }
3643}
3644
3645bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
3646{
3647 int i;
3648
3649 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3650 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
3651 return false;
3652 }
3653 }
3654 return true;
3655}
3656
28a7282a
LC
3657void bdrv_iostatus_enable(BlockDriverState *bs)
3658{
d6bf279e 3659 bs->iostatus_enabled = true;
58e21ef5 3660 bs->iostatus = BLOCK_DEVICE_IO_STATUS_OK;
28a7282a
LC
3661}
3662
3663/* The I/O status is only enabled if the drive explicitly
3664 * enables it _and_ the VM is configured to stop on errors */
3665bool bdrv_iostatus_is_enabled(const BlockDriverState *bs)
3666{
d6bf279e 3667 return (bs->iostatus_enabled &&
92aa5c6d
PB
3668 (bs->on_write_error == BLOCKDEV_ON_ERROR_ENOSPC ||
3669 bs->on_write_error == BLOCKDEV_ON_ERROR_STOP ||
3670 bs->on_read_error == BLOCKDEV_ON_ERROR_STOP));
28a7282a
LC
3671}
3672
3673void bdrv_iostatus_disable(BlockDriverState *bs)
3674{
d6bf279e 3675 bs->iostatus_enabled = false;
28a7282a
LC
3676}
3677
3678void bdrv_iostatus_reset(BlockDriverState *bs)
3679{
3680 if (bdrv_iostatus_is_enabled(bs)) {
58e21ef5 3681 bs->iostatus = BLOCK_DEVICE_IO_STATUS_OK;
3bd293c3
PB
3682 if (bs->job) {
3683 block_job_iostatus_reset(bs->job);
3684 }
28a7282a
LC
3685 }
3686}
3687
28a7282a
LC
3688void bdrv_iostatus_set_err(BlockDriverState *bs, int error)
3689{
3e1caa5f
PB
3690 assert(bdrv_iostatus_is_enabled(bs));
3691 if (bs->iostatus == BLOCK_DEVICE_IO_STATUS_OK) {
58e21ef5
LC
3692 bs->iostatus = error == ENOSPC ? BLOCK_DEVICE_IO_STATUS_NOSPACE :
3693 BLOCK_DEVICE_IO_STATUS_FAILED;
28a7282a
LC
3694 }
3695}
3696
d92ada22
LC
3697void bdrv_img_create(const char *filename, const char *fmt,
3698 const char *base_filename, const char *base_fmt,
f382d43a
MR
3699 char *options, uint64_t img_size, int flags,
3700 Error **errp, bool quiet)
f88e1a42 3701{
83d0521a
CL
3702 QemuOptsList *create_opts = NULL;
3703 QemuOpts *opts = NULL;
3704 const char *backing_fmt, *backing_file;
3705 int64_t size;
f88e1a42 3706 BlockDriver *drv, *proto_drv;
cc84d90f 3707 Error *local_err = NULL;
f88e1a42
JS
3708 int ret = 0;
3709
3710 /* Find driver and parse its options */
3711 drv = bdrv_find_format(fmt);
3712 if (!drv) {
71c79813 3713 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 3714 return;
f88e1a42
JS
3715 }
3716
b65a5e12 3717 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 3718 if (!proto_drv) {
d92ada22 3719 return;
f88e1a42
JS
3720 }
3721
c6149724
HR
3722 if (!drv->create_opts) {
3723 error_setg(errp, "Format driver '%s' does not support image creation",
3724 drv->format_name);
3725 return;
3726 }
3727
3728 if (!proto_drv->create_opts) {
3729 error_setg(errp, "Protocol driver '%s' does not support image creation",
3730 proto_drv->format_name);
3731 return;
3732 }
3733
c282e1fd
CL
3734 create_opts = qemu_opts_append(create_opts, drv->create_opts);
3735 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
3736
3737 /* Create parameter list with default values */
83d0521a 3738 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 3739 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
3740
3741 /* Parse -o options */
3742 if (options) {
dc523cd3
MA
3743 qemu_opts_do_parse(opts, options, NULL, &local_err);
3744 if (local_err) {
3745 error_report_err(local_err);
3746 local_err = NULL;
83d0521a 3747 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
3748 goto out;
3749 }
3750 }
3751
3752 if (base_filename) {
f43e47db 3753 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 3754 if (local_err) {
71c79813
LC
3755 error_setg(errp, "Backing file not supported for file format '%s'",
3756 fmt);
f88e1a42
JS
3757 goto out;
3758 }
3759 }
3760
3761 if (base_fmt) {
f43e47db 3762 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 3763 if (local_err) {
71c79813
LC
3764 error_setg(errp, "Backing file format not supported for file "
3765 "format '%s'", fmt);
f88e1a42
JS
3766 goto out;
3767 }
3768 }
3769
83d0521a
CL
3770 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
3771 if (backing_file) {
3772 if (!strcmp(filename, backing_file)) {
71c79813
LC
3773 error_setg(errp, "Error: Trying to create an image with the "
3774 "same filename as the backing file");
792da93a
JS
3775 goto out;
3776 }
3777 }
3778
83d0521a 3779 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42
JS
3780
3781 // The size for the image must always be specified, with one exception:
3782 // If we are using a backing file, we can obtain the size from there
83d0521a
CL
3783 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
3784 if (size == -1) {
3785 if (backing_file) {
66f6b814 3786 BlockDriverState *bs;
29168018 3787 char *full_backing = g_new0(char, PATH_MAX);
52bf1e72 3788 int64_t size;
63090dac 3789 int back_flags;
e6641719 3790 QDict *backing_options = NULL;
63090dac 3791
29168018
HR
3792 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
3793 full_backing, PATH_MAX,
3794 &local_err);
3795 if (local_err) {
3796 g_free(full_backing);
3797 goto out;
3798 }
3799
63090dac
PB
3800 /* backing files always opened read-only */
3801 back_flags =
3802 flags & ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 3803
e6641719
HR
3804 if (backing_fmt) {
3805 backing_options = qdict_new();
3806 qdict_put(backing_options, "driver",
3807 qstring_from_str(backing_fmt));
3808 }
3809
f67503e5 3810 bs = NULL;
e6641719 3811 ret = bdrv_open(&bs, full_backing, NULL, backing_options,
6ebf9aa2 3812 back_flags, &local_err);
29168018 3813 g_free(full_backing);
f88e1a42 3814 if (ret < 0) {
f88e1a42
JS
3815 goto out;
3816 }
52bf1e72
MA
3817 size = bdrv_getlength(bs);
3818 if (size < 0) {
3819 error_setg_errno(errp, -size, "Could not get size of '%s'",
3820 backing_file);
3821 bdrv_unref(bs);
3822 goto out;
3823 }
f88e1a42 3824
39101f25 3825 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
66f6b814
HR
3826
3827 bdrv_unref(bs);
f88e1a42 3828 } else {
71c79813 3829 error_setg(errp, "Image creation needs a size parameter");
f88e1a42
JS
3830 goto out;
3831 }
3832 }
3833
f382d43a 3834 if (!quiet) {
fe646693 3835 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 3836 qemu_opts_print(opts, " ");
f382d43a
MR
3837 puts("");
3838 }
83d0521a 3839
c282e1fd 3840 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 3841
cc84d90f
HR
3842 if (ret == -EFBIG) {
3843 /* This is generally a better message than whatever the driver would
3844 * deliver (especially because of the cluster_size_hint), since that
3845 * is most probably not much different from "image too large". */
3846 const char *cluster_size_hint = "";
83d0521a 3847 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 3848 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 3849 }
cc84d90f
HR
3850 error_setg(errp, "The image size is too large for file format '%s'"
3851 "%s", fmt, cluster_size_hint);
3852 error_free(local_err);
3853 local_err = NULL;
f88e1a42
JS
3854 }
3855
3856out:
83d0521a
CL
3857 qemu_opts_del(opts);
3858 qemu_opts_free(create_opts);
84d18f06 3859 if (local_err) {
cc84d90f
HR
3860 error_propagate(errp, local_err);
3861 }
f88e1a42 3862}
85d126f3
SH
3863
3864AioContext *bdrv_get_aio_context(BlockDriverState *bs)
3865{
dcd04228
SH
3866 return bs->aio_context;
3867}
3868
3869void bdrv_detach_aio_context(BlockDriverState *bs)
3870{
33384421
HR
3871 BdrvAioNotifier *baf;
3872
dcd04228
SH
3873 if (!bs->drv) {
3874 return;
3875 }
3876
33384421
HR
3877 QLIST_FOREACH(baf, &bs->aio_notifiers, list) {
3878 baf->detach_aio_context(baf->opaque);
3879 }
3880
13af91eb 3881 if (bs->io_limits_enabled) {
0e5b0a2d 3882 throttle_timers_detach_aio_context(&bs->throttle_timers);
13af91eb 3883 }
dcd04228
SH
3884 if (bs->drv->bdrv_detach_aio_context) {
3885 bs->drv->bdrv_detach_aio_context(bs);
3886 }
3887 if (bs->file) {
9a4f4c31 3888 bdrv_detach_aio_context(bs->file->bs);
dcd04228 3889 }
760e0063
KW
3890 if (bs->backing) {
3891 bdrv_detach_aio_context(bs->backing->bs);
dcd04228
SH
3892 }
3893
3894 bs->aio_context = NULL;
3895}
3896
3897void bdrv_attach_aio_context(BlockDriverState *bs,
3898 AioContext *new_context)
3899{
33384421
HR
3900 BdrvAioNotifier *ban;
3901
dcd04228
SH
3902 if (!bs->drv) {
3903 return;
3904 }
3905
3906 bs->aio_context = new_context;
3907
760e0063
KW
3908 if (bs->backing) {
3909 bdrv_attach_aio_context(bs->backing->bs, new_context);
dcd04228
SH
3910 }
3911 if (bs->file) {
9a4f4c31 3912 bdrv_attach_aio_context(bs->file->bs, new_context);
dcd04228
SH
3913 }
3914 if (bs->drv->bdrv_attach_aio_context) {
3915 bs->drv->bdrv_attach_aio_context(bs, new_context);
3916 }
13af91eb 3917 if (bs->io_limits_enabled) {
0e5b0a2d 3918 throttle_timers_attach_aio_context(&bs->throttle_timers, new_context);
13af91eb 3919 }
33384421
HR
3920
3921 QLIST_FOREACH(ban, &bs->aio_notifiers, list) {
3922 ban->attached_aio_context(new_context, ban->opaque);
3923 }
dcd04228
SH
3924}
3925
3926void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
3927{
53ec73e2 3928 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228
SH
3929
3930 bdrv_detach_aio_context(bs);
3931
3932 /* This function executes in the old AioContext so acquire the new one in
3933 * case it runs in a different thread.
3934 */
3935 aio_context_acquire(new_context);
3936 bdrv_attach_aio_context(bs, new_context);
3937 aio_context_release(new_context);
85d126f3 3938}
d616b224 3939
33384421
HR
3940void bdrv_add_aio_context_notifier(BlockDriverState *bs,
3941 void (*attached_aio_context)(AioContext *new_context, void *opaque),
3942 void (*detach_aio_context)(void *opaque), void *opaque)
3943{
3944 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
3945 *ban = (BdrvAioNotifier){
3946 .attached_aio_context = attached_aio_context,
3947 .detach_aio_context = detach_aio_context,
3948 .opaque = opaque
3949 };
3950
3951 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
3952}
3953
3954void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
3955 void (*attached_aio_context)(AioContext *,
3956 void *),
3957 void (*detach_aio_context)(void *),
3958 void *opaque)
3959{
3960 BdrvAioNotifier *ban, *ban_next;
3961
3962 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
3963 if (ban->attached_aio_context == attached_aio_context &&
3964 ban->detach_aio_context == detach_aio_context &&
3965 ban->opaque == opaque)
3966 {
3967 QLIST_REMOVE(ban, list);
3968 g_free(ban);
3969
3970 return;
3971 }
3972 }
3973
3974 abort();
3975}
3976
77485434
HR
3977int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
3978 BlockDriverAmendStatusCB *status_cb)
6f176b48 3979{
c282e1fd 3980 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
3981 return -ENOTSUP;
3982 }
77485434 3983 return bs->drv->bdrv_amend_options(bs, opts, status_cb);
6f176b48 3984}
f6186f49 3985
b5042a36
BC
3986/* This function will be called by the bdrv_recurse_is_first_non_filter method
3987 * of block filter and by bdrv_is_first_non_filter.
3988 * It is used to test if the given bs is the candidate or recurse more in the
3989 * node graph.
212a5a8f 3990 */
b5042a36 3991bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 3992 BlockDriverState *candidate)
f6186f49 3993{
b5042a36
BC
3994 /* return false if basic checks fails */
3995 if (!bs || !bs->drv) {
212a5a8f 3996 return false;
f6186f49
BC
3997 }
3998
b5042a36
BC
3999 /* the code reached a non block filter driver -> check if the bs is
4000 * the same as the candidate. It's the recursion termination condition.
4001 */
4002 if (!bs->drv->is_filter) {
4003 return bs == candidate;
212a5a8f 4004 }
b5042a36 4005 /* Down this path the driver is a block filter driver */
212a5a8f 4006
b5042a36
BC
4007 /* If the block filter recursion method is defined use it to recurse down
4008 * the node graph.
4009 */
4010 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 4011 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
4012 }
4013
b5042a36
BC
4014 /* the driver is a block filter but don't allow to recurse -> return false
4015 */
4016 return false;
f6186f49
BC
4017}
4018
212a5a8f
BC
4019/* This function checks if the candidate is the first non filter bs down it's
4020 * bs chain. Since we don't have pointers to parents it explore all bs chains
4021 * from the top. Some filters can choose not to pass down the recursion.
4022 */
4023bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 4024{
212a5a8f
BC
4025 BlockDriverState *bs;
4026
4027 /* walk down the bs forest recursively */
4028 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
4029 bool perm;
4030
b5042a36 4031 /* try to recurse in this top level bs */
e6dc8a1f 4032 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
4033
4034 /* candidate is the first non filter */
4035 if (perm) {
4036 return true;
4037 }
4038 }
4039
4040 return false;
f6186f49 4041}
09158f00 4042
e12f3784
WC
4043BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
4044 const char *node_name, Error **errp)
09158f00
BC
4045{
4046 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
4047 AioContext *aio_context;
4048
09158f00
BC
4049 if (!to_replace_bs) {
4050 error_setg(errp, "Node name '%s' not found", node_name);
4051 return NULL;
4052 }
4053
5a7e7a0b
SH
4054 aio_context = bdrv_get_aio_context(to_replace_bs);
4055 aio_context_acquire(aio_context);
4056
09158f00 4057 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
4058 to_replace_bs = NULL;
4059 goto out;
09158f00
BC
4060 }
4061
4062 /* We don't want arbitrary node of the BDS chain to be replaced only the top
4063 * most non filter in order to prevent data corruption.
4064 * Another benefit is that this tests exclude backing files which are
4065 * blocked by the backing blockers.
4066 */
e12f3784 4067 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 4068 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
4069 to_replace_bs = NULL;
4070 goto out;
09158f00
BC
4071 }
4072
5a7e7a0b
SH
4073out:
4074 aio_context_release(aio_context);
09158f00
BC
4075 return to_replace_bs;
4076}
448ad91d 4077
91af7014
HR
4078static bool append_open_options(QDict *d, BlockDriverState *bs)
4079{
4080 const QDictEntry *entry;
4081 bool found_any = false;
4082
4083 for (entry = qdict_first(bs->options); entry;
4084 entry = qdict_next(bs->options, entry))
4085 {
4086 /* Only take options for this level and exclude all non-driver-specific
4087 * options */
4088 if (!strchr(qdict_entry_key(entry), '.') &&
4089 strcmp(qdict_entry_key(entry), "node-name"))
4090 {
4091 qobject_incref(qdict_entry_value(entry));
4092 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
4093 found_any = true;
4094 }
4095 }
4096
4097 return found_any;
4098}
4099
4100/* Updates the following BDS fields:
4101 * - exact_filename: A filename which may be used for opening a block device
4102 * which (mostly) equals the given BDS (even without any
4103 * other options; so reading and writing must return the same
4104 * results, but caching etc. may be different)
4105 * - full_open_options: Options which, when given when opening a block device
4106 * (without a filename), result in a BDS (mostly)
4107 * equalling the given one
4108 * - filename: If exact_filename is set, it is copied here. Otherwise,
4109 * full_open_options is converted to a JSON object, prefixed with
4110 * "json:" (for use through the JSON pseudo protocol) and put here.
4111 */
4112void bdrv_refresh_filename(BlockDriverState *bs)
4113{
4114 BlockDriver *drv = bs->drv;
4115 QDict *opts;
4116
4117 if (!drv) {
4118 return;
4119 }
4120
4121 /* This BDS's file name will most probably depend on its file's name, so
4122 * refresh that first */
4123 if (bs->file) {
9a4f4c31 4124 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
4125 }
4126
4127 if (drv->bdrv_refresh_filename) {
4128 /* Obsolete information is of no use here, so drop the old file name
4129 * information before refreshing it */
4130 bs->exact_filename[0] = '\0';
4131 if (bs->full_open_options) {
4132 QDECREF(bs->full_open_options);
4133 bs->full_open_options = NULL;
4134 }
4135
4136 drv->bdrv_refresh_filename(bs);
4137 } else if (bs->file) {
4138 /* Try to reconstruct valid information from the underlying file */
4139 bool has_open_options;
4140
4141 bs->exact_filename[0] = '\0';
4142 if (bs->full_open_options) {
4143 QDECREF(bs->full_open_options);
4144 bs->full_open_options = NULL;
4145 }
4146
4147 opts = qdict_new();
4148 has_open_options = append_open_options(opts, bs);
4149
4150 /* If no specific options have been given for this BDS, the filename of
4151 * the underlying file should suffice for this one as well */
9a4f4c31
KW
4152 if (bs->file->bs->exact_filename[0] && !has_open_options) {
4153 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
4154 }
4155 /* Reconstructing the full options QDict is simple for most format block
4156 * drivers, as long as the full options are known for the underlying
4157 * file BDS. The full options QDict of that file BDS should somehow
4158 * contain a representation of the filename, therefore the following
4159 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 4160 if (bs->file->bs->full_open_options) {
91af7014
HR
4161 qdict_put_obj(opts, "driver",
4162 QOBJECT(qstring_from_str(drv->format_name)));
9a4f4c31
KW
4163 QINCREF(bs->file->bs->full_open_options);
4164 qdict_put_obj(opts, "file",
4165 QOBJECT(bs->file->bs->full_open_options));
91af7014
HR
4166
4167 bs->full_open_options = opts;
4168 } else {
4169 QDECREF(opts);
4170 }
4171 } else if (!bs->full_open_options && qdict_size(bs->options)) {
4172 /* There is no underlying file BDS (at least referenced by BDS.file),
4173 * so the full options QDict should be equal to the options given
4174 * specifically for this block device when it was opened (plus the
4175 * driver specification).
4176 * Because those options don't change, there is no need to update
4177 * full_open_options when it's already set. */
4178
4179 opts = qdict_new();
4180 append_open_options(opts, bs);
4181 qdict_put_obj(opts, "driver",
4182 QOBJECT(qstring_from_str(drv->format_name)));
4183
4184 if (bs->exact_filename[0]) {
4185 /* This may not work for all block protocol drivers (some may
4186 * require this filename to be parsed), but we have to find some
4187 * default solution here, so just include it. If some block driver
4188 * does not support pure options without any filename at all or
4189 * needs some special format of the options QDict, it needs to
4190 * implement the driver-specific bdrv_refresh_filename() function.
4191 */
4192 qdict_put_obj(opts, "filename",
4193 QOBJECT(qstring_from_str(bs->exact_filename)));
4194 }
4195
4196 bs->full_open_options = opts;
4197 }
4198
4199 if (bs->exact_filename[0]) {
4200 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4201 } else if (bs->full_open_options) {
4202 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4203 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4204 qstring_get_str(json));
4205 QDECREF(json);
4206 }
4207}
5366d0c8
BC
4208
4209/* This accessor function purpose is to allow the device models to access the
4210 * BlockAcctStats structure embedded inside a BlockDriverState without being
4211 * aware of the BlockDriverState structure layout.
4212 * It will go away when the BlockAcctStats structure will be moved inside
4213 * the device models.
4214 */
4215BlockAcctStats *bdrv_get_stats(BlockDriverState *bs)
4216{
4217 return &bs->stats;
4218}