]> git.ipfire.org Git - thirdparty/qemu.git/blame - block.c
block: Add blk_is_available()
[thirdparty/qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
3990d09a 24#include "config-host.h"
faf07963 25#include "qemu-common.h"
6d519a5f 26#include "trace.h"
737e150e
PB
27#include "block/block_int.h"
28#include "block/blockjob.h"
d49b6836 29#include "qemu/error-report.h"
1de7afc9 30#include "qemu/module.h"
cc7a8ea7 31#include "qapi/qmp/qerror.h"
7b1b5d19 32#include "qapi/qmp/qjson.h"
bfb197e0 33#include "sysemu/block-backend.h"
9c17d615 34#include "sysemu/sysemu.h"
1de7afc9 35#include "qemu/notify.h"
10817bf0 36#include "qemu/coroutine.h"
c13163fb 37#include "block/qapi.h"
b2023818 38#include "qmp-commands.h"
1de7afc9 39#include "qemu/timer.h"
a5ee7bd4 40#include "qapi-event.h"
db628338 41#include "block/throttle-groups.h"
fc01f7e7 42
71e72a19 43#ifdef CONFIG_BSD
7674e7bf
FB
44#include <sys/types.h>
45#include <sys/stat.h>
46#include <sys/ioctl.h>
72cf2d4f 47#include <sys/queue.h>
c5e97233 48#ifndef __DragonFly__
7674e7bf
FB
49#include <sys/disk.h>
50#endif
c5e97233 51#endif
7674e7bf 52
49dc768d
AL
53#ifdef _WIN32
54#include <windows.h>
55#endif
56
9bd2b08f
JS
57/**
58 * A BdrvDirtyBitmap can be in three possible states:
59 * (1) successor is NULL and disabled is false: full r/w mode
60 * (2) successor is NULL and disabled is true: read only mode ("disabled")
61 * (3) successor is set: frozen mode.
62 * A frozen bitmap cannot be renamed, deleted, anonymized, cleared, set,
63 * or enabled. A frozen bitmap can only abdicate() or reclaim().
64 */
e4654d2d 65struct BdrvDirtyBitmap {
aa0c7ca5
JS
66 HBitmap *bitmap; /* Dirty sector bitmap implementation */
67 BdrvDirtyBitmap *successor; /* Anonymous child; implies frozen status */
68 char *name; /* Optional non-empty unique ID */
69 int64_t size; /* Size of the bitmap (Number of sectors) */
70 bool disabled; /* Bitmap is read-only */
e4654d2d
FZ
71 QLIST_ENTRY(BdrvDirtyBitmap) list;
72};
73
1c9805a3
SH
74#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
75
1b7bdbc1
SH
76static QTAILQ_HEAD(, BlockDriverState) bdrv_states =
77 QTAILQ_HEAD_INITIALIZER(bdrv_states);
7ee930d0 78
dc364f4c
BC
79static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
80 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
81
8a22f02a
SH
82static QLIST_HEAD(, BlockDriver) bdrv_drivers =
83 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 84
f3930ed0
KW
85static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
86 const char *reference, QDict *options, int flags,
87 BlockDriverState *parent,
ce343771 88 const BdrvChildRole *child_role, Error **errp);
f3930ed0 89
ce1ffea8 90static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs);
eb852011
MA
91/* If non-zero, use only whitelisted block drivers */
92static int use_bdrv_whitelist;
93
9e0b22f4
SH
94#ifdef _WIN32
95static int is_windows_drive_prefix(const char *filename)
96{
97 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
98 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
99 filename[1] == ':');
100}
101
102int is_windows_drive(const char *filename)
103{
104 if (is_windows_drive_prefix(filename) &&
105 filename[2] == '\0')
106 return 1;
107 if (strstart(filename, "\\\\.\\", NULL) ||
108 strstart(filename, "//./", NULL))
109 return 1;
110 return 0;
111}
112#endif
113
339064d5
KW
114size_t bdrv_opt_mem_align(BlockDriverState *bs)
115{
116 if (!bs || !bs->drv) {
459b4e66
DL
117 /* page size or 4k (hdd sector size) should be on the safe side */
118 return MAX(4096, getpagesize());
339064d5
KW
119 }
120
121 return bs->bl.opt_mem_alignment;
122}
123
4196d2f0
DL
124size_t bdrv_min_mem_align(BlockDriverState *bs)
125{
126 if (!bs || !bs->drv) {
459b4e66
DL
127 /* page size or 4k (hdd sector size) should be on the safe side */
128 return MAX(4096, getpagesize());
4196d2f0
DL
129 }
130
131 return bs->bl.min_mem_alignment;
132}
133
9e0b22f4 134/* check if the path starts with "<protocol>:" */
5c98415b 135int path_has_protocol(const char *path)
9e0b22f4 136{
947995c0
PB
137 const char *p;
138
9e0b22f4
SH
139#ifdef _WIN32
140 if (is_windows_drive(path) ||
141 is_windows_drive_prefix(path)) {
142 return 0;
143 }
947995c0
PB
144 p = path + strcspn(path, ":/\\");
145#else
146 p = path + strcspn(path, ":/");
9e0b22f4
SH
147#endif
148
947995c0 149 return *p == ':';
9e0b22f4
SH
150}
151
83f64091 152int path_is_absolute(const char *path)
3b0d4f61 153{
21664424
FB
154#ifdef _WIN32
155 /* specific case for names like: "\\.\d:" */
f53f4da9 156 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 157 return 1;
f53f4da9
PB
158 }
159 return (*path == '/' || *path == '\\');
3b9f94e1 160#else
f53f4da9 161 return (*path == '/');
3b9f94e1 162#endif
3b0d4f61
FB
163}
164
83f64091
FB
165/* if filename is absolute, just copy it to dest. Otherwise, build a
166 path to it by considering it is relative to base_path. URL are
167 supported. */
168void path_combine(char *dest, int dest_size,
169 const char *base_path,
170 const char *filename)
3b0d4f61 171{
83f64091
FB
172 const char *p, *p1;
173 int len;
174
175 if (dest_size <= 0)
176 return;
177 if (path_is_absolute(filename)) {
178 pstrcpy(dest, dest_size, filename);
179 } else {
180 p = strchr(base_path, ':');
181 if (p)
182 p++;
183 else
184 p = base_path;
3b9f94e1
FB
185 p1 = strrchr(base_path, '/');
186#ifdef _WIN32
187 {
188 const char *p2;
189 p2 = strrchr(base_path, '\\');
190 if (!p1 || p2 > p1)
191 p1 = p2;
192 }
193#endif
83f64091
FB
194 if (p1)
195 p1++;
196 else
197 p1 = base_path;
198 if (p1 > p)
199 p = p1;
200 len = p - base_path;
201 if (len > dest_size - 1)
202 len = dest_size - 1;
203 memcpy(dest, base_path, len);
204 dest[len] = '\0';
205 pstrcat(dest, dest_size, filename);
3b0d4f61 206 }
3b0d4f61
FB
207}
208
0a82855a
HR
209void bdrv_get_full_backing_filename_from_filename(const char *backed,
210 const char *backing,
9f07429e
HR
211 char *dest, size_t sz,
212 Error **errp)
dc5a1371 213{
9f07429e
HR
214 if (backing[0] == '\0' || path_has_protocol(backing) ||
215 path_is_absolute(backing))
216 {
0a82855a 217 pstrcpy(dest, sz, backing);
9f07429e
HR
218 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
219 error_setg(errp, "Cannot use relative backing file names for '%s'",
220 backed);
dc5a1371 221 } else {
0a82855a 222 path_combine(dest, sz, backed, backing);
dc5a1371
PB
223 }
224}
225
9f07429e
HR
226void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
227 Error **errp)
0a82855a 228{
9f07429e
HR
229 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
230
231 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
232 dest, sz, errp);
0a82855a
HR
233}
234
0eb7217e
SH
235void bdrv_register(BlockDriver *bdrv)
236{
237 bdrv_setup_io_funcs(bdrv);
b2e12bc6 238
8a22f02a 239 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 240}
b338082b 241
7f06d47e 242BlockDriverState *bdrv_new_root(void)
b338082b 243{
7f06d47e 244 BlockDriverState *bs = bdrv_new();
e4e9986b 245
e4e9986b 246 QTAILQ_INSERT_TAIL(&bdrv_states, bs, device_list);
e4e9986b
MA
247 return bs;
248}
249
250BlockDriverState *bdrv_new(void)
251{
252 BlockDriverState *bs;
253 int i;
254
5839e53b 255 bs = g_new0(BlockDriverState, 1);
e4654d2d 256 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
257 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
258 QLIST_INIT(&bs->op_blockers[i]);
259 }
28a7282a 260 bdrv_iostatus_disable(bs);
d7d512f6 261 notifier_list_init(&bs->close_notifiers);
d616b224 262 notifier_with_return_list_init(&bs->before_write_notifiers);
cc0681c4
BC
263 qemu_co_queue_init(&bs->throttled_reqs[0]);
264 qemu_co_queue_init(&bs->throttled_reqs[1]);
9fcb0251 265 bs->refcnt = 1;
dcd04228 266 bs->aio_context = qemu_get_aio_context();
d7d512f6 267
b338082b
FB
268 return bs;
269}
270
d7d512f6
PB
271void bdrv_add_close_notifier(BlockDriverState *bs, Notifier *notify)
272{
273 notifier_list_add(&bs->close_notifiers, notify);
274}
275
ea2384d3
FB
276BlockDriver *bdrv_find_format(const char *format_name)
277{
278 BlockDriver *drv1;
8a22f02a
SH
279 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
280 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 281 return drv1;
8a22f02a 282 }
ea2384d3
FB
283 }
284 return NULL;
285}
286
b64ec4e4 287static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 288{
b64ec4e4
FZ
289 static const char *whitelist_rw[] = {
290 CONFIG_BDRV_RW_WHITELIST
291 };
292 static const char *whitelist_ro[] = {
293 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
294 };
295 const char **p;
296
b64ec4e4 297 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 298 return 1; /* no whitelist, anything goes */
b64ec4e4 299 }
eb852011 300
b64ec4e4 301 for (p = whitelist_rw; *p; p++) {
eb852011
MA
302 if (!strcmp(drv->format_name, *p)) {
303 return 1;
304 }
305 }
b64ec4e4
FZ
306 if (read_only) {
307 for (p = whitelist_ro; *p; p++) {
308 if (!strcmp(drv->format_name, *p)) {
309 return 1;
310 }
311 }
312 }
eb852011
MA
313 return 0;
314}
315
5b7e1542
ZYW
316typedef struct CreateCo {
317 BlockDriver *drv;
318 char *filename;
83d0521a 319 QemuOpts *opts;
5b7e1542 320 int ret;
cc84d90f 321 Error *err;
5b7e1542
ZYW
322} CreateCo;
323
324static void coroutine_fn bdrv_create_co_entry(void *opaque)
325{
cc84d90f
HR
326 Error *local_err = NULL;
327 int ret;
328
5b7e1542
ZYW
329 CreateCo *cco = opaque;
330 assert(cco->drv);
331
c282e1fd 332 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
84d18f06 333 if (local_err) {
cc84d90f
HR
334 error_propagate(&cco->err, local_err);
335 }
336 cco->ret = ret;
5b7e1542
ZYW
337}
338
0e7e1989 339int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 340 QemuOpts *opts, Error **errp)
ea2384d3 341{
5b7e1542
ZYW
342 int ret;
343
344 Coroutine *co;
345 CreateCo cco = {
346 .drv = drv,
347 .filename = g_strdup(filename),
83d0521a 348 .opts = opts,
5b7e1542 349 .ret = NOT_DONE,
cc84d90f 350 .err = NULL,
5b7e1542
ZYW
351 };
352
c282e1fd 353 if (!drv->bdrv_create) {
cc84d90f 354 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
355 ret = -ENOTSUP;
356 goto out;
5b7e1542
ZYW
357 }
358
359 if (qemu_in_coroutine()) {
360 /* Fast-path if already in coroutine context */
361 bdrv_create_co_entry(&cco);
362 } else {
363 co = qemu_coroutine_create(bdrv_create_co_entry);
364 qemu_coroutine_enter(co, &cco);
365 while (cco.ret == NOT_DONE) {
b47ec2c4 366 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
367 }
368 }
369
370 ret = cco.ret;
cc84d90f 371 if (ret < 0) {
84d18f06 372 if (cco.err) {
cc84d90f
HR
373 error_propagate(errp, cco.err);
374 } else {
375 error_setg_errno(errp, -ret, "Could not create image");
376 }
377 }
0e7e1989 378
80168bff
LC
379out:
380 g_free(cco.filename);
5b7e1542 381 return ret;
ea2384d3
FB
382}
383
c282e1fd 384int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
385{
386 BlockDriver *drv;
cc84d90f
HR
387 Error *local_err = NULL;
388 int ret;
84a12e66 389
b65a5e12 390 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 391 if (drv == NULL) {
16905d71 392 return -ENOENT;
84a12e66
CH
393 }
394
c282e1fd 395 ret = bdrv_create(drv, filename, opts, &local_err);
84d18f06 396 if (local_err) {
cc84d90f
HR
397 error_propagate(errp, local_err);
398 }
399 return ret;
84a12e66
CH
400}
401
892b7de8
ET
402/**
403 * Try to get @bs's logical and physical block size.
404 * On success, store them in @bsz struct and return 0.
405 * On failure return -errno.
406 * @bs must not be empty.
407 */
408int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
409{
410 BlockDriver *drv = bs->drv;
411
412 if (drv && drv->bdrv_probe_blocksizes) {
413 return drv->bdrv_probe_blocksizes(bs, bsz);
414 }
415
416 return -ENOTSUP;
417}
418
419/**
420 * Try to get @bs's geometry (cyls, heads, sectors).
421 * On success, store them in @geo struct and return 0.
422 * On failure return -errno.
423 * @bs must not be empty.
424 */
425int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
426{
427 BlockDriver *drv = bs->drv;
428
429 if (drv && drv->bdrv_probe_geometry) {
430 return drv->bdrv_probe_geometry(bs, geo);
431 }
432
433 return -ENOTSUP;
434}
435
eba25057
JM
436/*
437 * Create a uniquely-named empty temporary file.
438 * Return 0 upon success, otherwise a negative errno value.
439 */
440int get_tmp_filename(char *filename, int size)
d5249393 441{
eba25057 442#ifdef _WIN32
3b9f94e1 443 char temp_dir[MAX_PATH];
eba25057
JM
444 /* GetTempFileName requires that its output buffer (4th param)
445 have length MAX_PATH or greater. */
446 assert(size >= MAX_PATH);
447 return (GetTempPath(MAX_PATH, temp_dir)
448 && GetTempFileName(temp_dir, "qem", 0, filename)
449 ? 0 : -GetLastError());
d5249393 450#else
67b915a5 451 int fd;
7ccfb2eb 452 const char *tmpdir;
0badc1ee 453 tmpdir = getenv("TMPDIR");
69bef793
AS
454 if (!tmpdir) {
455 tmpdir = "/var/tmp";
456 }
eba25057
JM
457 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
458 return -EOVERFLOW;
459 }
ea2384d3 460 fd = mkstemp(filename);
fe235a06
DH
461 if (fd < 0) {
462 return -errno;
463 }
464 if (close(fd) != 0) {
465 unlink(filename);
eba25057
JM
466 return -errno;
467 }
468 return 0;
d5249393 469#endif
eba25057 470}
fc01f7e7 471
84a12e66
CH
472/*
473 * Detect host devices. By convention, /dev/cdrom[N] is always
474 * recognized as a host CDROM.
475 */
476static BlockDriver *find_hdev_driver(const char *filename)
477{
478 int score_max = 0, score;
479 BlockDriver *drv = NULL, *d;
480
481 QLIST_FOREACH(d, &bdrv_drivers, list) {
482 if (d->bdrv_probe_device) {
483 score = d->bdrv_probe_device(filename);
484 if (score > score_max) {
485 score_max = score;
486 drv = d;
487 }
488 }
489 }
490
491 return drv;
492}
493
98289620 494BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
495 bool allow_protocol_prefix,
496 Error **errp)
83f64091
FB
497{
498 BlockDriver *drv1;
499 char protocol[128];
1cec71e3 500 int len;
83f64091 501 const char *p;
19cb3738 502
66f82cee
KW
503 /* TODO Drivers without bdrv_file_open must be specified explicitly */
504
39508e7a
CH
505 /*
506 * XXX(hch): we really should not let host device detection
507 * override an explicit protocol specification, but moving this
508 * later breaks access to device names with colons in them.
509 * Thanks to the brain-dead persistent naming schemes on udev-
510 * based Linux systems those actually are quite common.
511 */
512 drv1 = find_hdev_driver(filename);
513 if (drv1) {
514 return drv1;
515 }
516
98289620 517 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 518 return &bdrv_file;
84a12e66 519 }
98289620 520
9e0b22f4
SH
521 p = strchr(filename, ':');
522 assert(p != NULL);
1cec71e3
AL
523 len = p - filename;
524 if (len > sizeof(protocol) - 1)
525 len = sizeof(protocol) - 1;
526 memcpy(protocol, filename, len);
527 protocol[len] = '\0';
8a22f02a 528 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
5fafdf24 529 if (drv1->protocol_name &&
8a22f02a 530 !strcmp(drv1->protocol_name, protocol)) {
83f64091 531 return drv1;
8a22f02a 532 }
83f64091 533 }
b65a5e12
HR
534
535 error_setg(errp, "Unknown protocol '%s'", protocol);
83f64091
FB
536 return NULL;
537}
538
c6684249
MA
539/*
540 * Guess image format by probing its contents.
541 * This is not a good idea when your image is raw (CVE-2008-2004), but
542 * we do it anyway for backward compatibility.
543 *
544 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
545 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
546 * but can be smaller if the image file is smaller)
c6684249
MA
547 * @filename is its filename.
548 *
549 * For all block drivers, call the bdrv_probe() method to get its
550 * probing score.
551 * Return the first block driver with the highest probing score.
552 */
38f3ef57
KW
553BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
554 const char *filename)
c6684249
MA
555{
556 int score_max = 0, score;
557 BlockDriver *drv = NULL, *d;
558
559 QLIST_FOREACH(d, &bdrv_drivers, list) {
560 if (d->bdrv_probe) {
561 score = d->bdrv_probe(buf, buf_size, filename);
562 if (score > score_max) {
563 score_max = score;
564 drv = d;
565 }
566 }
567 }
568
569 return drv;
570}
571
f500a6d3 572static int find_image_format(BlockDriverState *bs, const char *filename,
34b5d2c6 573 BlockDriver **pdrv, Error **errp)
f3a5d3f8 574{
c6684249 575 BlockDriver *drv;
7cddd372 576 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 577 int ret = 0;
f8ea0b00 578
08a00559 579 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
b192af8a 580 if (bdrv_is_sg(bs) || !bdrv_is_inserted(bs) || bdrv_getlength(bs) == 0) {
ef810437 581 *pdrv = &bdrv_raw;
c98ac35d 582 return ret;
1a396859 583 }
f8ea0b00 584
83f64091 585 ret = bdrv_pread(bs, 0, buf, sizeof(buf));
83f64091 586 if (ret < 0) {
34b5d2c6
HR
587 error_setg_errno(errp, -ret, "Could not read image for determining its "
588 "format");
c98ac35d
SW
589 *pdrv = NULL;
590 return ret;
83f64091
FB
591 }
592
c6684249 593 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 594 if (!drv) {
34b5d2c6
HR
595 error_setg(errp, "Could not determine image format: No compatible "
596 "driver found");
c98ac35d
SW
597 ret = -ENOENT;
598 }
599 *pdrv = drv;
600 return ret;
ea2384d3
FB
601}
602
51762288
SH
603/**
604 * Set the current 'total_sectors' value
65a9bb25 605 * Return 0 on success, -errno on error.
51762288
SH
606 */
607static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
608{
609 BlockDriver *drv = bs->drv;
610
396759ad 611 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 612 if (bdrv_is_sg(bs))
396759ad
NB
613 return 0;
614
51762288
SH
615 /* query actual device if possible, otherwise just trust the hint */
616 if (drv->bdrv_getlength) {
617 int64_t length = drv->bdrv_getlength(bs);
618 if (length < 0) {
619 return length;
620 }
7e382003 621 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
622 }
623
624 bs->total_sectors = hint;
625 return 0;
626}
627
9e8f1835
PB
628/**
629 * Set open flags for a given discard mode
630 *
631 * Return 0 on success, -1 if the discard mode was invalid.
632 */
633int bdrv_parse_discard_flags(const char *mode, int *flags)
634{
635 *flags &= ~BDRV_O_UNMAP;
636
637 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
638 /* do nothing */
639 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
640 *flags |= BDRV_O_UNMAP;
641 } else {
642 return -1;
643 }
644
645 return 0;
646}
647
c3993cdc
SH
648/**
649 * Set open flags for a given cache mode
650 *
651 * Return 0 on success, -1 if the cache mode was invalid.
652 */
653int bdrv_parse_cache_flags(const char *mode, int *flags)
654{
655 *flags &= ~BDRV_O_CACHE_MASK;
656
657 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
658 *flags |= BDRV_O_NOCACHE | BDRV_O_CACHE_WB;
92196b2f
SH
659 } else if (!strcmp(mode, "directsync")) {
660 *flags |= BDRV_O_NOCACHE;
c3993cdc
SH
661 } else if (!strcmp(mode, "writeback")) {
662 *flags |= BDRV_O_CACHE_WB;
663 } else if (!strcmp(mode, "unsafe")) {
664 *flags |= BDRV_O_CACHE_WB;
665 *flags |= BDRV_O_NO_FLUSH;
666 } else if (!strcmp(mode, "writethrough")) {
667 /* this is the default */
668 } else {
669 return -1;
670 }
671
672 return 0;
673}
674
b1e6fc08
KW
675/*
676 * Returns the flags that a temporary snapshot should get, based on the
677 * originally requested flags (the originally requested image will have flags
678 * like a backing file)
679 */
680static int bdrv_temp_snapshot_flags(int flags)
681{
682 return (flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
683}
684
0b50cc88 685/*
f3930ed0
KW
686 * Returns the flags that bs->file should get if a protocol driver is expected,
687 * based on the given flags for the parent BDS
0b50cc88
KW
688 */
689static int bdrv_inherited_flags(int flags)
690{
691 /* Enable protocol handling, disable format probing for bs->file */
692 flags |= BDRV_O_PROTOCOL;
693
694 /* Our block drivers take care to send flushes and respect unmap policy,
695 * so we can enable both unconditionally on lower layers. */
696 flags |= BDRV_O_CACHE_WB | BDRV_O_UNMAP;
697
0b50cc88 698 /* Clear flags that only apply to the top layer */
5669b44d 699 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ);
0b50cc88
KW
700
701 return flags;
702}
703
f3930ed0
KW
704const BdrvChildRole child_file = {
705 .inherit_flags = bdrv_inherited_flags,
706};
707
708/*
709 * Returns the flags that bs->file should get if the use of formats (and not
710 * only protocols) is permitted for it, based on the given flags for the parent
711 * BDS
712 */
713static int bdrv_inherited_fmt_flags(int parent_flags)
714{
715 int flags = child_file.inherit_flags(parent_flags);
716 return flags & ~BDRV_O_PROTOCOL;
717}
718
719const BdrvChildRole child_format = {
720 .inherit_flags = bdrv_inherited_fmt_flags,
721};
722
317fc44e 723/*
760e0063 724 * Returns the flags that bs->backing should get, based on the given flags
317fc44e
KW
725 * for the parent BDS
726 */
727static int bdrv_backing_flags(int flags)
728{
729 /* backing files always opened read-only */
730 flags &= ~(BDRV_O_RDWR | BDRV_O_COPY_ON_READ);
731
732 /* snapshot=on is handled on the top layer */
8bfea15d 733 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e
KW
734
735 return flags;
736}
737
f3930ed0
KW
738static const BdrvChildRole child_backing = {
739 .inherit_flags = bdrv_backing_flags,
740};
741
7b272452
KW
742static int bdrv_open_flags(BlockDriverState *bs, int flags)
743{
744 int open_flags = flags | BDRV_O_CACHE_WB;
745
746 /*
747 * Clear flags that are internal to the block layer before opening the
748 * image.
749 */
20cca275 750 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
751
752 /*
753 * Snapshots should be writable.
754 */
8bfea15d 755 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
756 open_flags |= BDRV_O_RDWR;
757 }
758
759 return open_flags;
760}
761
636ea370
KW
762static void bdrv_assign_node_name(BlockDriverState *bs,
763 const char *node_name,
764 Error **errp)
6913c0c2 765{
15489c76 766 char *gen_node_name = NULL;
6913c0c2 767
15489c76
JC
768 if (!node_name) {
769 node_name = gen_node_name = id_generate(ID_BLOCK);
770 } else if (!id_wellformed(node_name)) {
771 /*
772 * Check for empty string or invalid characters, but not if it is
773 * generated (generated names use characters not available to the user)
774 */
9aebf3b8 775 error_setg(errp, "Invalid node name");
636ea370 776 return;
6913c0c2
BC
777 }
778
0c5e94ee 779 /* takes care of avoiding namespaces collisions */
7f06d47e 780 if (blk_by_name(node_name)) {
0c5e94ee
BC
781 error_setg(errp, "node-name=%s is conflicting with a device id",
782 node_name);
15489c76 783 goto out;
0c5e94ee
BC
784 }
785
6913c0c2
BC
786 /* takes care of avoiding duplicates node names */
787 if (bdrv_find_node(node_name)) {
788 error_setg(errp, "Duplicate node name");
15489c76 789 goto out;
6913c0c2
BC
790 }
791
792 /* copy node name into the bs and insert it into the graph list */
793 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
794 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
15489c76
JC
795out:
796 g_free(gen_node_name);
6913c0c2
BC
797}
798
18edf289
KW
799static QemuOptsList bdrv_runtime_opts = {
800 .name = "bdrv_common",
801 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
802 .desc = {
803 {
804 .name = "node-name",
805 .type = QEMU_OPT_STRING,
806 .help = "Node name of the block device node",
807 },
808 { /* end of list */ }
809 },
810};
811
57915332
KW
812/*
813 * Common part for opening disk images and files
b6ad491a
KW
814 *
815 * Removes all processed options from *options.
57915332 816 */
9a4f4c31 817static int bdrv_open_common(BlockDriverState *bs, BdrvChild *file,
34b5d2c6 818 QDict *options, int flags, BlockDriver *drv, Error **errp)
57915332
KW
819{
820 int ret, open_flags;
035fccdf 821 const char *filename;
6913c0c2 822 const char *node_name = NULL;
18edf289 823 QemuOpts *opts;
34b5d2c6 824 Error *local_err = NULL;
57915332
KW
825
826 assert(drv != NULL);
6405875c 827 assert(bs->file == NULL);
707ff828 828 assert(options != NULL && bs->options != options);
57915332 829
45673671 830 if (file != NULL) {
9a4f4c31 831 filename = file->bs->filename;
45673671
KW
832 } else {
833 filename = qdict_get_try_str(options, "filename");
834 }
835
765003db
KW
836 if (drv->bdrv_needs_filename && !filename) {
837 error_setg(errp, "The '%s' block driver requires a file name",
838 drv->format_name);
839 return -EINVAL;
840 }
841
45673671 842 trace_bdrv_open_common(bs, filename ?: "", flags, drv->format_name);
28dcee10 843
18edf289
KW
844 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
845 qemu_opts_absorb_qdict(opts, options, &local_err);
0fb6395c 846 if (local_err) {
636ea370 847 error_propagate(errp, local_err);
18edf289
KW
848 ret = -EINVAL;
849 goto fail_opts;
6913c0c2 850 }
6913c0c2 851
18edf289 852 node_name = qemu_opt_get(opts, "node-name");
636ea370 853 bdrv_assign_node_name(bs, node_name, &local_err);
0fb6395c 854 if (local_err) {
636ea370 855 error_propagate(errp, local_err);
18edf289
KW
856 ret = -EINVAL;
857 goto fail_opts;
5d186eb0
KW
858 }
859
1b7fd729 860 bs->guest_block_size = 512;
c25f53b0 861 bs->request_alignment = 512;
0d51b4de 862 bs->zero_beyond_eof = true;
b64ec4e4
FZ
863 open_flags = bdrv_open_flags(bs, flags);
864 bs->read_only = !(open_flags & BDRV_O_RDWR);
865
866 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
867 error_setg(errp,
868 !bs->read_only && bdrv_is_whitelisted(drv, true)
869 ? "Driver '%s' can only be used for read-only devices"
870 : "Driver '%s' is not whitelisted",
871 drv->format_name);
18edf289
KW
872 ret = -ENOTSUP;
873 goto fail_opts;
b64ec4e4 874 }
57915332 875
53fec9d3 876 assert(bs->copy_on_read == 0); /* bdrv_new() and bdrv_close() make it so */
0ebd24e0
KW
877 if (flags & BDRV_O_COPY_ON_READ) {
878 if (!bs->read_only) {
879 bdrv_enable_copy_on_read(bs);
880 } else {
881 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
882 ret = -EINVAL;
883 goto fail_opts;
0ebd24e0 884 }
53fec9d3
SH
885 }
886
c2ad1b0c
KW
887 if (filename != NULL) {
888 pstrcpy(bs->filename, sizeof(bs->filename), filename);
889 } else {
890 bs->filename[0] = '\0';
891 }
91af7014 892 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 893
57915332 894 bs->drv = drv;
7267c094 895 bs->opaque = g_malloc0(drv->instance_size);
57915332 896
03f541bd 897 bs->enable_write_cache = !!(flags & BDRV_O_CACHE_WB);
e7c63796 898
66f82cee
KW
899 /* Open the image, either directly or using a protocol */
900 if (drv->bdrv_file_open) {
5d186eb0 901 assert(file == NULL);
030be321 902 assert(!drv->bdrv_needs_filename || filename != NULL);
34b5d2c6 903 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
f500a6d3 904 } else {
2af5ef70 905 if (file == NULL) {
34b5d2c6
HR
906 error_setg(errp, "Can't use '%s' as a block driver for the "
907 "protocol level", drv->format_name);
2af5ef70
KW
908 ret = -EINVAL;
909 goto free_and_fail;
910 }
f500a6d3 911 bs->file = file;
34b5d2c6 912 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
66f82cee
KW
913 }
914
57915332 915 if (ret < 0) {
84d18f06 916 if (local_err) {
34b5d2c6 917 error_propagate(errp, local_err);
2fa9aa59
DH
918 } else if (bs->filename[0]) {
919 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
34b5d2c6
HR
920 } else {
921 error_setg_errno(errp, -ret, "Could not open image");
922 }
57915332
KW
923 goto free_and_fail;
924 }
925
a1f688f4
MA
926 if (bs->encrypted) {
927 error_report("Encrypted images are deprecated");
928 error_printf("Support for them will be removed in a future release.\n"
929 "You can use 'qemu-img convert' to convert your image"
930 " to an unencrypted one.\n");
931 }
932
51762288
SH
933 ret = refresh_total_sectors(bs, bs->total_sectors);
934 if (ret < 0) {
34b5d2c6 935 error_setg_errno(errp, -ret, "Could not refresh total sector count");
51762288 936 goto free_and_fail;
57915332 937 }
51762288 938
3baca891
KW
939 bdrv_refresh_limits(bs, &local_err);
940 if (local_err) {
941 error_propagate(errp, local_err);
942 ret = -EINVAL;
943 goto free_and_fail;
944 }
945
c25f53b0 946 assert(bdrv_opt_mem_align(bs) != 0);
4196d2f0 947 assert(bdrv_min_mem_align(bs) != 0);
b192af8a 948 assert((bs->request_alignment != 0) || bdrv_is_sg(bs));
18edf289
KW
949
950 qemu_opts_del(opts);
57915332
KW
951 return 0;
952
953free_and_fail:
f500a6d3 954 bs->file = NULL;
7267c094 955 g_free(bs->opaque);
57915332
KW
956 bs->opaque = NULL;
957 bs->drv = NULL;
18edf289
KW
958fail_opts:
959 qemu_opts_del(opts);
57915332
KW
960 return ret;
961}
962
5e5c4f63
KW
963static QDict *parse_json_filename(const char *filename, Error **errp)
964{
965 QObject *options_obj;
966 QDict *options;
967 int ret;
968
969 ret = strstart(filename, "json:", &filename);
970 assert(ret);
971
972 options_obj = qobject_from_json(filename);
973 if (!options_obj) {
974 error_setg(errp, "Could not parse the JSON options");
975 return NULL;
976 }
977
978 if (qobject_type(options_obj) != QTYPE_QDICT) {
979 qobject_decref(options_obj);
980 error_setg(errp, "Invalid JSON object given");
981 return NULL;
982 }
983
984 options = qobject_to_qdict(options_obj);
985 qdict_flatten(options);
986
987 return options;
988}
989
b6ce07aa 990/*
f54120ff
KW
991 * Fills in default options for opening images and converts the legacy
992 * filename/flags pair to option QDict entries.
53a29513
HR
993 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
994 * block driver has been specified explicitly.
b6ce07aa 995 */
53a29513 996static int bdrv_fill_options(QDict **options, const char **pfilename,
053e1578 997 int *flags, Error **errp)
ea2384d3 998{
5e5c4f63 999 const char *filename = *pfilename;
c2ad1b0c 1000 const char *drvname;
53a29513 1001 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 1002 bool parse_filename = false;
053e1578 1003 BlockDriver *drv = NULL;
34b5d2c6 1004 Error *local_err = NULL;
83f64091 1005
5e5c4f63
KW
1006 /* Parse json: pseudo-protocol */
1007 if (filename && g_str_has_prefix(filename, "json:")) {
1008 QDict *json_options = parse_json_filename(filename, &local_err);
1009 if (local_err) {
1010 error_propagate(errp, local_err);
1011 return -EINVAL;
1012 }
1013
1014 /* Options given in the filename have lower priority than options
1015 * specified directly */
1016 qdict_join(*options, json_options, false);
1017 QDECREF(json_options);
1018 *pfilename = filename = NULL;
1019 }
1020
53a29513 1021 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1022 if (drvname) {
1023 drv = bdrv_find_format(drvname);
1024 if (!drv) {
1025 error_setg(errp, "Unknown driver '%s'", drvname);
1026 return -ENOENT;
1027 }
1028 /* If the user has explicitly specified the driver, this choice should
1029 * override the BDRV_O_PROTOCOL flag */
1030 protocol = drv->bdrv_file_open;
53a29513
HR
1031 }
1032
1033 if (protocol) {
1034 *flags |= BDRV_O_PROTOCOL;
1035 } else {
1036 *flags &= ~BDRV_O_PROTOCOL;
1037 }
1038
035fccdf 1039 /* Fetch the file name from the options QDict if necessary */
17b005f1 1040 if (protocol && filename) {
f54120ff
KW
1041 if (!qdict_haskey(*options, "filename")) {
1042 qdict_put(*options, "filename", qstring_from_str(filename));
1043 parse_filename = true;
1044 } else {
1045 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1046 "the same time");
1047 return -EINVAL;
1048 }
035fccdf
KW
1049 }
1050
c2ad1b0c 1051 /* Find the right block driver */
f54120ff 1052 filename = qdict_get_try_str(*options, "filename");
f54120ff 1053
053e1578
HR
1054 if (!drvname && protocol) {
1055 if (filename) {
1056 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1057 if (!drv) {
053e1578 1058 return -EINVAL;
17b005f1 1059 }
053e1578
HR
1060
1061 drvname = drv->format_name;
1062 qdict_put(*options, "driver", qstring_from_str(drvname));
1063 } else {
1064 error_setg(errp, "Must specify either driver or file");
1065 return -EINVAL;
98289620 1066 }
c2ad1b0c
KW
1067 }
1068
17b005f1 1069 assert(drv || !protocol);
c2ad1b0c 1070
f54120ff 1071 /* Driver-specific filename parsing */
17b005f1 1072 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1073 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1074 if (local_err) {
34b5d2c6 1075 error_propagate(errp, local_err);
f54120ff 1076 return -EINVAL;
6963a30d 1077 }
cd5d031e
HR
1078
1079 if (!drv->bdrv_needs_filename) {
1080 qdict_del(*options, "filename");
cd5d031e 1081 }
6963a30d
KW
1082 }
1083
d44f928a
HR
1084 if (runstate_check(RUN_STATE_INMIGRATE)) {
1085 *flags |= BDRV_O_INCOMING;
1086 }
1087
f54120ff
KW
1088 return 0;
1089}
1090
b4b059f6
KW
1091static BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
1092 BlockDriverState *child_bs,
1093 const BdrvChildRole *child_role)
df581792
KW
1094{
1095 BdrvChild *child = g_new(BdrvChild, 1);
1096 *child = (BdrvChild) {
1097 .bs = child_bs,
1098 .role = child_role,
1099 };
1100
1101 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
d42a8a93 1102 QLIST_INSERT_HEAD(&child_bs->parents, child, next_parent);
b4b059f6
KW
1103
1104 return child;
df581792
KW
1105}
1106
3f09bfbc 1107static void bdrv_detach_child(BdrvChild *child)
33a60407
KW
1108{
1109 QLIST_REMOVE(child, next);
d42a8a93 1110 QLIST_REMOVE(child, next_parent);
33a60407
KW
1111 g_free(child);
1112}
1113
1114void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
1115{
779020cb
KW
1116 BlockDriverState *child_bs;
1117
1118 if (child == NULL) {
1119 return;
1120 }
33a60407
KW
1121
1122 if (child->bs->inherits_from == parent) {
1123 child->bs->inherits_from = NULL;
1124 }
1125
779020cb 1126 child_bs = child->bs;
33a60407
KW
1127 bdrv_detach_child(child);
1128 bdrv_unref(child_bs);
1129}
1130
5db15a57
KW
1131/*
1132 * Sets the backing file link of a BDS. A new reference is created; callers
1133 * which don't need their own reference any more must call bdrv_unref().
1134 */
8d24cce1
FZ
1135void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd)
1136{
5db15a57
KW
1137 if (backing_hd) {
1138 bdrv_ref(backing_hd);
1139 }
8d24cce1 1140
760e0063 1141 if (bs->backing) {
826b6ca0 1142 assert(bs->backing_blocker);
760e0063 1143 bdrv_op_unblock_all(bs->backing->bs, bs->backing_blocker);
5db15a57 1144 bdrv_unref_child(bs, bs->backing);
826b6ca0
FZ
1145 } else if (backing_hd) {
1146 error_setg(&bs->backing_blocker,
81e5f78a
AG
1147 "node is used as backing hd of '%s'",
1148 bdrv_get_device_or_node_name(bs));
826b6ca0
FZ
1149 }
1150
8d24cce1 1151 if (!backing_hd) {
826b6ca0
FZ
1152 error_free(bs->backing_blocker);
1153 bs->backing_blocker = NULL;
760e0063 1154 bs->backing = NULL;
8d24cce1
FZ
1155 goto out;
1156 }
760e0063 1157 bs->backing = bdrv_attach_child(bs, backing_hd, &child_backing);
8d24cce1
FZ
1158 bs->open_flags &= ~BDRV_O_NO_BACKING;
1159 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_hd->filename);
1160 pstrcpy(bs->backing_format, sizeof(bs->backing_format),
1161 backing_hd->drv ? backing_hd->drv->format_name : "");
826b6ca0 1162
760e0063 1163 bdrv_op_block_all(backing_hd, bs->backing_blocker);
826b6ca0 1164 /* Otherwise we won't be able to commit due to check in bdrv_commit */
760e0063 1165 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
826b6ca0 1166 bs->backing_blocker);
8d24cce1 1167out:
3baca891 1168 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
1169}
1170
31ca6d07
KW
1171/*
1172 * Opens the backing file for a BlockDriverState if not yet open
1173 *
1174 * options is a QDict of options to pass to the block drivers, or NULL for an
1175 * empty set of options. The reference to the QDict is transferred to this
1176 * function (even on failure), so if the caller intends to reuse the dictionary,
1177 * it needs to use QINCREF() before calling bdrv_file_open.
1178 */
34b5d2c6 1179int bdrv_open_backing_file(BlockDriverState *bs, QDict *options, Error **errp)
9156df12 1180{
1ba4b6a5 1181 char *backing_filename = g_malloc0(PATH_MAX);
317fc44e 1182 int ret = 0;
8d24cce1 1183 BlockDriverState *backing_hd;
34b5d2c6 1184 Error *local_err = NULL;
9156df12 1185
760e0063 1186 if (bs->backing != NULL) {
31ca6d07 1187 QDECREF(options);
1ba4b6a5 1188 goto free_exit;
9156df12
PB
1189 }
1190
31ca6d07
KW
1191 /* NULL means an empty set of options */
1192 if (options == NULL) {
1193 options = qdict_new();
1194 }
1195
9156df12 1196 bs->open_flags &= ~BDRV_O_NO_BACKING;
1cb6f506
KW
1197 if (qdict_haskey(options, "file.filename")) {
1198 backing_filename[0] = '\0';
1199 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 1200 QDECREF(options);
1ba4b6a5 1201 goto free_exit;
dbecebdd 1202 } else {
9f07429e
HR
1203 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
1204 &local_err);
1205 if (local_err) {
1206 ret = -EINVAL;
1207 error_propagate(errp, local_err);
1208 QDECREF(options);
1209 goto free_exit;
1210 }
9156df12
PB
1211 }
1212
8ee79e70
KW
1213 if (!bs->drv || !bs->drv->supports_backing) {
1214 ret = -EINVAL;
1215 error_setg(errp, "Driver doesn't support backing files");
1216 QDECREF(options);
1217 goto free_exit;
1218 }
1219
e4e9986b 1220 backing_hd = bdrv_new();
8d24cce1 1221
c5f6e493
KW
1222 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
1223 qdict_put(options, "driver", qstring_from_str(bs->backing_format));
9156df12
PB
1224 }
1225
760e0063 1226 assert(bs->backing == NULL);
f3930ed0
KW
1227 ret = bdrv_open_inherit(&backing_hd,
1228 *backing_filename ? backing_filename : NULL,
ce343771 1229 NULL, options, 0, bs, &child_backing, &local_err);
9156df12 1230 if (ret < 0) {
8d24cce1
FZ
1231 bdrv_unref(backing_hd);
1232 backing_hd = NULL;
9156df12 1233 bs->open_flags |= BDRV_O_NO_BACKING;
b04b6b6e
FZ
1234 error_setg(errp, "Could not open backing file: %s",
1235 error_get_pretty(local_err));
1236 error_free(local_err);
1ba4b6a5 1237 goto free_exit;
9156df12 1238 }
df581792 1239
5db15a57
KW
1240 /* Hook up the backing file link; drop our reference, bs owns the
1241 * backing_hd reference now */
8d24cce1 1242 bdrv_set_backing_hd(bs, backing_hd);
5db15a57 1243 bdrv_unref(backing_hd);
d80ac658 1244
1ba4b6a5
BC
1245free_exit:
1246 g_free(backing_filename);
1247 return ret;
9156df12
PB
1248}
1249
da557aac
HR
1250/*
1251 * Opens a disk image whose options are given as BlockdevRef in another block
1252 * device's options.
1253 *
da557aac 1254 * If allow_none is true, no image will be opened if filename is false and no
b4b059f6 1255 * BlockdevRef is given. NULL will be returned, but errp remains unset.
da557aac
HR
1256 *
1257 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
1258 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1259 * itself, all options starting with "${bdref_key}." are considered part of the
1260 * BlockdevRef.
1261 *
1262 * The BlockdevRef will be removed from the options QDict.
1263 */
b4b059f6
KW
1264BdrvChild *bdrv_open_child(const char *filename,
1265 QDict *options, const char *bdref_key,
1266 BlockDriverState* parent,
1267 const BdrvChildRole *child_role,
1268 bool allow_none, Error **errp)
da557aac 1269{
b4b059f6
KW
1270 BdrvChild *c = NULL;
1271 BlockDriverState *bs;
da557aac
HR
1272 QDict *image_options;
1273 int ret;
1274 char *bdref_key_dot;
1275 const char *reference;
1276
df581792 1277 assert(child_role != NULL);
f67503e5 1278
da557aac
HR
1279 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1280 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
1281 g_free(bdref_key_dot);
1282
1283 reference = qdict_get_try_str(options, bdref_key);
1284 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 1285 if (!allow_none) {
da557aac
HR
1286 error_setg(errp, "A block device must be specified for \"%s\"",
1287 bdref_key);
da557aac 1288 }
b20e61e0 1289 QDECREF(image_options);
da557aac
HR
1290 goto done;
1291 }
1292
b4b059f6
KW
1293 bs = NULL;
1294 ret = bdrv_open_inherit(&bs, filename, reference, image_options, 0,
ce343771 1295 parent, child_role, errp);
df581792
KW
1296 if (ret < 0) {
1297 goto done;
1298 }
1299
b4b059f6 1300 c = bdrv_attach_child(parent, bs, child_role);
da557aac
HR
1301
1302done:
1303 qdict_del(options, bdref_key);
b4b059f6
KW
1304 return c;
1305}
1306
6b8aeca5 1307int bdrv_append_temp_snapshot(BlockDriverState *bs, int flags, Error **errp)
b998875d
KW
1308{
1309 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 1310 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 1311 int64_t total_size;
83d0521a 1312 QemuOpts *opts = NULL;
b998875d
KW
1313 QDict *snapshot_options;
1314 BlockDriverState *bs_snapshot;
c2e0dbbf 1315 Error *local_err = NULL;
b998875d
KW
1316 int ret;
1317
1318 /* if snapshot, we create a temporary backing file and open it
1319 instead of opening 'filename' directly */
1320
1321 /* Get the required size from the image */
f187743a
KW
1322 total_size = bdrv_getlength(bs);
1323 if (total_size < 0) {
6b8aeca5 1324 ret = total_size;
f187743a 1325 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 1326 goto out;
f187743a 1327 }
b998875d
KW
1328
1329 /* Create the temporary image */
1ba4b6a5 1330 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
1331 if (ret < 0) {
1332 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 1333 goto out;
b998875d
KW
1334 }
1335
ef810437 1336 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 1337 &error_abort);
39101f25 1338 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
ef810437 1339 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, &local_err);
83d0521a 1340 qemu_opts_del(opts);
b998875d
KW
1341 if (ret < 0) {
1342 error_setg_errno(errp, -ret, "Could not create temporary overlay "
1343 "'%s': %s", tmp_filename,
1344 error_get_pretty(local_err));
1345 error_free(local_err);
1ba4b6a5 1346 goto out;
b998875d
KW
1347 }
1348
1349 /* Prepare a new options QDict for the temporary file */
1350 snapshot_options = qdict_new();
1351 qdict_put(snapshot_options, "file.driver",
1352 qstring_from_str("file"));
1353 qdict_put(snapshot_options, "file.filename",
1354 qstring_from_str(tmp_filename));
e6641719
HR
1355 qdict_put(snapshot_options, "driver",
1356 qstring_from_str("qcow2"));
b998875d 1357
e4e9986b 1358 bs_snapshot = bdrv_new();
b998875d
KW
1359
1360 ret = bdrv_open(&bs_snapshot, NULL, NULL, snapshot_options,
6ebf9aa2 1361 flags, &local_err);
b998875d
KW
1362 if (ret < 0) {
1363 error_propagate(errp, local_err);
1ba4b6a5 1364 goto out;
b998875d
KW
1365 }
1366
1367 bdrv_append(bs_snapshot, bs);
1ba4b6a5
BC
1368
1369out:
1370 g_free(tmp_filename);
6b8aeca5 1371 return ret;
b998875d
KW
1372}
1373
b6ce07aa
KW
1374/*
1375 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
1376 *
1377 * options is a QDict of options to pass to the block drivers, or NULL for an
1378 * empty set of options. The reference to the QDict belongs to the block layer
1379 * after the call (even on failure), so if the caller intends to reuse the
1380 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
1381 *
1382 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
1383 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
1384 *
1385 * The reference parameter may be used to specify an existing block device which
1386 * should be opened. If specified, neither options nor a filename may be given,
1387 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 1388 */
f3930ed0
KW
1389static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
1390 const char *reference, QDict *options, int flags,
1391 BlockDriverState *parent,
ce343771 1392 const BdrvChildRole *child_role, Error **errp)
ea2384d3 1393{
b6ce07aa 1394 int ret;
9a4f4c31
KW
1395 BdrvChild *file = NULL;
1396 BlockDriverState *bs;
ce343771 1397 BlockDriver *drv = NULL;
74fe54f2 1398 const char *drvname;
34b5d2c6 1399 Error *local_err = NULL;
b1e6fc08 1400 int snapshot_flags = 0;
712e7874 1401
f67503e5 1402 assert(pbs);
f3930ed0
KW
1403 assert(!child_role || !flags);
1404 assert(!child_role == !parent);
f67503e5 1405
ddf5636d
HR
1406 if (reference) {
1407 bool options_non_empty = options ? qdict_size(options) : false;
1408 QDECREF(options);
1409
1410 if (*pbs) {
1411 error_setg(errp, "Cannot reuse an existing BDS when referencing "
1412 "another block device");
1413 return -EINVAL;
1414 }
1415
1416 if (filename || options_non_empty) {
1417 error_setg(errp, "Cannot reference an existing block device with "
1418 "additional options or a new filename");
1419 return -EINVAL;
1420 }
1421
1422 bs = bdrv_lookup_bs(reference, reference, errp);
1423 if (!bs) {
1424 return -ENODEV;
1425 }
1426 bdrv_ref(bs);
1427 *pbs = bs;
1428 return 0;
1429 }
1430
f67503e5
HR
1431 if (*pbs) {
1432 bs = *pbs;
1433 } else {
e4e9986b 1434 bs = bdrv_new();
f67503e5
HR
1435 }
1436
de9c0cec
KW
1437 /* NULL means an empty set of options */
1438 if (options == NULL) {
1439 options = qdict_new();
1440 }
1441
f3930ed0 1442 if (child_role) {
bddcec37 1443 bs->inherits_from = parent;
f3930ed0
KW
1444 flags = child_role->inherit_flags(parent->open_flags);
1445 }
1446
053e1578 1447 ret = bdrv_fill_options(&options, &filename, &flags, &local_err);
462f5bcf
KW
1448 if (local_err) {
1449 goto fail;
1450 }
1451
76c591b0 1452 /* Find the right image format driver */
76c591b0
KW
1453 drvname = qdict_get_try_str(options, "driver");
1454 if (drvname) {
1455 drv = bdrv_find_format(drvname);
1456 qdict_del(options, "driver");
1457 if (!drv) {
1458 error_setg(errp, "Unknown driver: '%s'", drvname);
1459 ret = -EINVAL;
1460 goto fail;
1461 }
1462 }
1463
1464 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 1465
f3930ed0 1466 bs->open_flags = flags;
de9c0cec 1467 bs->options = options;
b6ad491a 1468 options = qdict_clone_shallow(options);
de9c0cec 1469
f500a6d3 1470 /* Open image file without format layer */
f4788adc
KW
1471 if ((flags & BDRV_O_PROTOCOL) == 0) {
1472 if (flags & BDRV_O_RDWR) {
1473 flags |= BDRV_O_ALLOW_RDWR;
1474 }
1475 if (flags & BDRV_O_SNAPSHOT) {
1476 snapshot_flags = bdrv_temp_snapshot_flags(flags);
1477 flags = bdrv_backing_flags(flags);
1478 }
f500a6d3 1479
f3930ed0 1480 bs->open_flags = flags;
1fdd6933 1481
9a4f4c31
KW
1482 file = bdrv_open_child(filename, options, "file", bs,
1483 &child_file, true, &local_err);
1fdd6933
KW
1484 if (local_err) {
1485 ret = -EINVAL;
f4788adc
KW
1486 goto fail;
1487 }
f500a6d3
KW
1488 }
1489
76c591b0 1490 /* Image format probing */
38f3ef57 1491 bs->probed = !drv;
76c591b0 1492 if (!drv && file) {
9a4f4c31 1493 ret = find_image_format(file->bs, filename, &drv, &local_err);
17b005f1 1494 if (ret < 0) {
8bfea15d 1495 goto fail;
2a05cbe4 1496 }
76c591b0 1497 } else if (!drv) {
17b005f1
KW
1498 error_setg(errp, "Must specify either driver or file");
1499 ret = -EINVAL;
8bfea15d 1500 goto fail;
ea2384d3 1501 }
b6ce07aa 1502
53a29513
HR
1503 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
1504 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
1505 /* file must be NULL if a protocol BDS is about to be created
1506 * (the inverse results in an error message from bdrv_open_common()) */
1507 assert(!(flags & BDRV_O_PROTOCOL) || !file);
1508
b6ce07aa 1509 /* Open the image */
34b5d2c6 1510 ret = bdrv_open_common(bs, file, options, flags, drv, &local_err);
b6ce07aa 1511 if (ret < 0) {
8bfea15d 1512 goto fail;
6987307c
CH
1513 }
1514
2a05cbe4 1515 if (file && (bs->file != file)) {
9a4f4c31 1516 bdrv_unref_child(bs, file);
f500a6d3
KW
1517 file = NULL;
1518 }
1519
b6ce07aa 1520 /* If there is a backing file, use it */
9156df12 1521 if ((flags & BDRV_O_NO_BACKING) == 0) {
31ca6d07
KW
1522 QDict *backing_options;
1523
5726d872 1524 qdict_extract_subqdict(options, &backing_options, "backing.");
34b5d2c6 1525 ret = bdrv_open_backing_file(bs, backing_options, &local_err);
b6ce07aa 1526 if (ret < 0) {
b6ad491a 1527 goto close_and_fail;
b6ce07aa 1528 }
b6ce07aa
KW
1529 }
1530
91af7014
HR
1531 bdrv_refresh_filename(bs);
1532
b6ad491a 1533 /* Check if any unknown options were used */
5acd9d81 1534 if (options && (qdict_size(options) != 0)) {
b6ad491a 1535 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
1536 if (flags & BDRV_O_PROTOCOL) {
1537 error_setg(errp, "Block protocol '%s' doesn't support the option "
1538 "'%s'", drv->format_name, entry->key);
1539 } else {
1540 error_setg(errp, "Block format '%s' used by device '%s' doesn't "
1541 "support the option '%s'", drv->format_name,
bfb197e0 1542 bdrv_get_device_name(bs), entry->key);
5acd9d81 1543 }
b6ad491a
KW
1544
1545 ret = -EINVAL;
1546 goto close_and_fail;
1547 }
b6ad491a 1548
b6ce07aa 1549 if (!bdrv_key_required(bs)) {
a7f53e26
MA
1550 if (bs->blk) {
1551 blk_dev_change_media_cb(bs->blk, true);
1552 }
c3adb58f
MA
1553 } else if (!runstate_check(RUN_STATE_PRELAUNCH)
1554 && !runstate_check(RUN_STATE_INMIGRATE)
1555 && !runstate_check(RUN_STATE_PAUSED)) { /* HACK */
1556 error_setg(errp,
1557 "Guest must be stopped for opening of encrypted image");
1558 ret = -EBUSY;
1559 goto close_and_fail;
b6ce07aa
KW
1560 }
1561
c3adb58f 1562 QDECREF(options);
f67503e5 1563 *pbs = bs;
dd62f1ca
KW
1564
1565 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
1566 * temporary snapshot afterwards. */
1567 if (snapshot_flags) {
1568 ret = bdrv_append_temp_snapshot(bs, snapshot_flags, &local_err);
1569 if (local_err) {
1570 goto close_and_fail;
1571 }
1572 }
1573
b6ce07aa
KW
1574 return 0;
1575
8bfea15d 1576fail:
f500a6d3 1577 if (file != NULL) {
9a4f4c31 1578 bdrv_unref_child(bs, file);
f500a6d3 1579 }
de9c0cec 1580 QDECREF(bs->options);
b6ad491a 1581 QDECREF(options);
de9c0cec 1582 bs->options = NULL;
f67503e5
HR
1583 if (!*pbs) {
1584 /* If *pbs is NULL, a new BDS has been created in this function and
1585 needs to be freed now. Otherwise, it does not need to be closed,
1586 since it has not really been opened yet. */
1587 bdrv_unref(bs);
1588 }
84d18f06 1589 if (local_err) {
34b5d2c6
HR
1590 error_propagate(errp, local_err);
1591 }
b6ad491a 1592 return ret;
de9c0cec 1593
b6ad491a 1594close_and_fail:
f67503e5
HR
1595 /* See fail path, but now the BDS has to be always closed */
1596 if (*pbs) {
1597 bdrv_close(bs);
1598 } else {
1599 bdrv_unref(bs);
1600 }
b6ad491a 1601 QDECREF(options);
84d18f06 1602 if (local_err) {
34b5d2c6
HR
1603 error_propagate(errp, local_err);
1604 }
b6ce07aa
KW
1605 return ret;
1606}
1607
f3930ed0 1608int bdrv_open(BlockDriverState **pbs, const char *filename,
6ebf9aa2 1609 const char *reference, QDict *options, int flags, Error **errp)
f3930ed0
KW
1610{
1611 return bdrv_open_inherit(pbs, filename, reference, options, flags, NULL,
ce343771 1612 NULL, errp);
f3930ed0
KW
1613}
1614
e971aa12
JC
1615typedef struct BlockReopenQueueEntry {
1616 bool prepared;
1617 BDRVReopenState state;
1618 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
1619} BlockReopenQueueEntry;
1620
1621/*
1622 * Adds a BlockDriverState to a simple queue for an atomic, transactional
1623 * reopen of multiple devices.
1624 *
1625 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
1626 * already performed, or alternatively may be NULL a new BlockReopenQueue will
1627 * be created and initialized. This newly created BlockReopenQueue should be
1628 * passed back in for subsequent calls that are intended to be of the same
1629 * atomic 'set'.
1630 *
1631 * bs is the BlockDriverState to add to the reopen queue.
1632 *
4d2cb092
KW
1633 * options contains the changed options for the associated bs
1634 * (the BlockReopenQueue takes ownership)
1635 *
e971aa12
JC
1636 * flags contains the open flags for the associated bs
1637 *
1638 * returns a pointer to bs_queue, which is either the newly allocated
1639 * bs_queue, or the existing bs_queue being used.
1640 *
1641 */
1642BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
4d2cb092
KW
1643 BlockDriverState *bs,
1644 QDict *options, int flags)
e971aa12
JC
1645{
1646 assert(bs != NULL);
1647
1648 BlockReopenQueueEntry *bs_entry;
67251a31 1649 BdrvChild *child;
4d2cb092 1650 QDict *old_options;
67251a31 1651
e971aa12
JC
1652 if (bs_queue == NULL) {
1653 bs_queue = g_new0(BlockReopenQueue, 1);
1654 QSIMPLEQ_INIT(bs_queue);
1655 }
1656
4d2cb092
KW
1657 if (!options) {
1658 options = qdict_new();
1659 }
1660
1661 old_options = qdict_clone_shallow(bs->options);
1662 qdict_join(options, old_options, false);
1663 QDECREF(old_options);
1664
f1f25a2e
KW
1665 /* bdrv_open() masks this flag out */
1666 flags &= ~BDRV_O_PROTOCOL;
1667
67251a31
KW
1668 QLIST_FOREACH(child, &bs->children, next) {
1669 int child_flags;
1670
1671 if (child->bs->inherits_from != bs) {
1672 continue;
1673 }
1674
1675 child_flags = child->role->inherit_flags(flags);
4d2cb092
KW
1676 /* TODO Pass down child flags (backing.*, extents.*, ...) */
1677 bdrv_reopen_queue(bs_queue, child->bs, NULL, child_flags);
e971aa12
JC
1678 }
1679
1680 bs_entry = g_new0(BlockReopenQueueEntry, 1);
1681 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
1682
1683 bs_entry->state.bs = bs;
4d2cb092 1684 bs_entry->state.options = options;
e971aa12
JC
1685 bs_entry->state.flags = flags;
1686
1687 return bs_queue;
1688}
1689
1690/*
1691 * Reopen multiple BlockDriverStates atomically & transactionally.
1692 *
1693 * The queue passed in (bs_queue) must have been built up previous
1694 * via bdrv_reopen_queue().
1695 *
1696 * Reopens all BDS specified in the queue, with the appropriate
1697 * flags. All devices are prepared for reopen, and failure of any
1698 * device will cause all device changes to be abandonded, and intermediate
1699 * data cleaned up.
1700 *
1701 * If all devices prepare successfully, then the changes are committed
1702 * to all devices.
1703 *
1704 */
1705int bdrv_reopen_multiple(BlockReopenQueue *bs_queue, Error **errp)
1706{
1707 int ret = -1;
1708 BlockReopenQueueEntry *bs_entry, *next;
1709 Error *local_err = NULL;
1710
1711 assert(bs_queue != NULL);
1712
1713 bdrv_drain_all();
1714
1715 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1716 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
1717 error_propagate(errp, local_err);
1718 goto cleanup;
1719 }
1720 bs_entry->prepared = true;
1721 }
1722
1723 /* If we reach this point, we have success and just need to apply the
1724 * changes
1725 */
1726 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1727 bdrv_reopen_commit(&bs_entry->state);
1728 }
1729
1730 ret = 0;
1731
1732cleanup:
1733 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
1734 if (ret && bs_entry->prepared) {
1735 bdrv_reopen_abort(&bs_entry->state);
1736 }
4d2cb092 1737 QDECREF(bs_entry->state.options);
e971aa12
JC
1738 g_free(bs_entry);
1739 }
1740 g_free(bs_queue);
1741 return ret;
1742}
1743
1744
1745/* Reopen a single BlockDriverState with the specified flags. */
1746int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
1747{
1748 int ret = -1;
1749 Error *local_err = NULL;
4d2cb092 1750 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12
JC
1751
1752 ret = bdrv_reopen_multiple(queue, &local_err);
1753 if (local_err != NULL) {
1754 error_propagate(errp, local_err);
1755 }
1756 return ret;
1757}
1758
1759
1760/*
1761 * Prepares a BlockDriverState for reopen. All changes are staged in the
1762 * 'opaque' field of the BDRVReopenState, which is used and allocated by
1763 * the block driver layer .bdrv_reopen_prepare()
1764 *
1765 * bs is the BlockDriverState to reopen
1766 * flags are the new open flags
1767 * queue is the reopen queue
1768 *
1769 * Returns 0 on success, non-zero on error. On error errp will be set
1770 * as well.
1771 *
1772 * On failure, bdrv_reopen_abort() will be called to clean up any data.
1773 * It is the responsibility of the caller to then call the abort() or
1774 * commit() for any other BDS that have been left in a prepare() state
1775 *
1776 */
1777int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
1778 Error **errp)
1779{
1780 int ret = -1;
1781 Error *local_err = NULL;
1782 BlockDriver *drv;
1783
1784 assert(reopen_state != NULL);
1785 assert(reopen_state->bs->drv != NULL);
1786 drv = reopen_state->bs->drv;
1787
1788 /* if we are to stay read-only, do not allow permission change
1789 * to r/w */
1790 if (!(reopen_state->bs->open_flags & BDRV_O_ALLOW_RDWR) &&
1791 reopen_state->flags & BDRV_O_RDWR) {
81e5f78a
AG
1792 error_setg(errp, "Node '%s' is read only",
1793 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
1794 goto error;
1795 }
1796
1797
1798 ret = bdrv_flush(reopen_state->bs);
1799 if (ret) {
1800 error_set(errp, ERROR_CLASS_GENERIC_ERROR, "Error (%s) flushing drive",
1801 strerror(-ret));
1802 goto error;
1803 }
1804
1805 if (drv->bdrv_reopen_prepare) {
1806 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
1807 if (ret) {
1808 if (local_err != NULL) {
1809 error_propagate(errp, local_err);
1810 } else {
d8b6895f
LC
1811 error_setg(errp, "failed while preparing to reopen image '%s'",
1812 reopen_state->bs->filename);
e971aa12
JC
1813 }
1814 goto error;
1815 }
1816 } else {
1817 /* It is currently mandatory to have a bdrv_reopen_prepare()
1818 * handler for each supported drv. */
81e5f78a
AG
1819 error_setg(errp, "Block format '%s' used by node '%s' "
1820 "does not support reopening files", drv->format_name,
1821 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
1822 ret = -1;
1823 goto error;
1824 }
1825
4d2cb092
KW
1826 /* Options that are not handled are only okay if they are unchanged
1827 * compared to the old state. It is expected that some options are only
1828 * used for the initial open, but not reopen (e.g. filename) */
1829 if (qdict_size(reopen_state->options)) {
1830 const QDictEntry *entry = qdict_first(reopen_state->options);
1831
1832 do {
1833 QString *new_obj = qobject_to_qstring(entry->value);
1834 const char *new = qstring_get_str(new_obj);
1835 const char *old = qdict_get_try_str(reopen_state->bs->options,
1836 entry->key);
1837
1838 if (!old || strcmp(new, old)) {
1839 error_setg(errp, "Cannot change the option '%s'", entry->key);
1840 ret = -EINVAL;
1841 goto error;
1842 }
1843 } while ((entry = qdict_next(reopen_state->options, entry)));
1844 }
1845
e971aa12
JC
1846 ret = 0;
1847
1848error:
1849 return ret;
1850}
1851
1852/*
1853 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
1854 * makes them final by swapping the staging BlockDriverState contents into
1855 * the active BlockDriverState contents.
1856 */
1857void bdrv_reopen_commit(BDRVReopenState *reopen_state)
1858{
1859 BlockDriver *drv;
1860
1861 assert(reopen_state != NULL);
1862 drv = reopen_state->bs->drv;
1863 assert(drv != NULL);
1864
1865 /* If there are any driver level actions to take */
1866 if (drv->bdrv_reopen_commit) {
1867 drv->bdrv_reopen_commit(reopen_state);
1868 }
1869
1870 /* set BDS specific flags now */
1871 reopen_state->bs->open_flags = reopen_state->flags;
1872 reopen_state->bs->enable_write_cache = !!(reopen_state->flags &
1873 BDRV_O_CACHE_WB);
1874 reopen_state->bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 1875
3baca891 1876 bdrv_refresh_limits(reopen_state->bs, NULL);
e971aa12
JC
1877}
1878
1879/*
1880 * Abort the reopen, and delete and free the staged changes in
1881 * reopen_state
1882 */
1883void bdrv_reopen_abort(BDRVReopenState *reopen_state)
1884{
1885 BlockDriver *drv;
1886
1887 assert(reopen_state != NULL);
1888 drv = reopen_state->bs->drv;
1889 assert(drv != NULL);
1890
1891 if (drv->bdrv_reopen_abort) {
1892 drv->bdrv_reopen_abort(reopen_state);
1893 }
1894}
1895
1896
fc01f7e7
FB
1897void bdrv_close(BlockDriverState *bs)
1898{
33384421
HR
1899 BdrvAioNotifier *ban, *ban_next;
1900
3cbc002c
PB
1901 if (bs->job) {
1902 block_job_cancel_sync(bs->job);
1903 }
99b7e775
AG
1904
1905 /* Disable I/O limits and drain all pending throttled requests */
1906 if (bs->io_limits_enabled) {
1907 bdrv_io_limits_disable(bs);
1908 }
1909
53ec73e2 1910 bdrv_drain(bs); /* complete I/O */
58fda173 1911 bdrv_flush(bs);
53ec73e2 1912 bdrv_drain(bs); /* in case flush left pending I/O */
d7d512f6 1913 notifier_list_notify(&bs->close_notifiers, bs);
7094f12f 1914
3cbc002c 1915 if (bs->drv) {
6e93e7c4
KW
1916 BdrvChild *child, *next;
1917
9a7dedbc 1918 bs->drv->bdrv_close(bs);
9a4f4c31 1919 bs->drv = NULL;
9a7dedbc 1920
5db15a57 1921 bdrv_set_backing_hd(bs, NULL);
9a7dedbc 1922
9a4f4c31
KW
1923 if (bs->file != NULL) {
1924 bdrv_unref_child(bs, bs->file);
1925 bs->file = NULL;
1926 }
1927
6e93e7c4 1928 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
1929 /* TODO Remove bdrv_unref() from drivers' close function and use
1930 * bdrv_unref_child() here */
bddcec37
KW
1931 if (child->bs->inherits_from == bs) {
1932 child->bs->inherits_from = NULL;
1933 }
33a60407 1934 bdrv_detach_child(child);
6e93e7c4
KW
1935 }
1936
7267c094 1937 g_free(bs->opaque);
ea2384d3 1938 bs->opaque = NULL;
53fec9d3 1939 bs->copy_on_read = 0;
a275fa42
PB
1940 bs->backing_file[0] = '\0';
1941 bs->backing_format[0] = '\0';
6405875c
PB
1942 bs->total_sectors = 0;
1943 bs->encrypted = 0;
1944 bs->valid_key = 0;
1945 bs->sg = 0;
0d51b4de 1946 bs->zero_beyond_eof = false;
de9c0cec
KW
1947 QDECREF(bs->options);
1948 bs->options = NULL;
91af7014
HR
1949 QDECREF(bs->full_open_options);
1950 bs->full_open_options = NULL;
b338082b 1951 }
98f90dba 1952
a7f53e26
MA
1953 if (bs->blk) {
1954 blk_dev_change_media_cb(bs->blk, false);
1955 }
9ca11154 1956
33384421
HR
1957 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
1958 g_free(ban);
1959 }
1960 QLIST_INIT(&bs->aio_notifiers);
b338082b
FB
1961}
1962
2bc93fed
MK
1963void bdrv_close_all(void)
1964{
1965 BlockDriverState *bs;
1966
dc364f4c 1967 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
1968 AioContext *aio_context = bdrv_get_aio_context(bs);
1969
1970 aio_context_acquire(aio_context);
2bc93fed 1971 bdrv_close(bs);
ed78cda3 1972 aio_context_release(aio_context);
2bc93fed
MK
1973 }
1974}
1975
dc364f4c
BC
1976/* make a BlockDriverState anonymous by removing from bdrv_state and
1977 * graph_bdrv_state list.
d22b2f41
RH
1978 Also, NULL terminate the device_name to prevent double remove */
1979void bdrv_make_anon(BlockDriverState *bs)
1980{
bfb197e0
MA
1981 /*
1982 * Take care to remove bs from bdrv_states only when it's actually
1983 * in it. Note that bs->device_list.tqe_prev is initially null,
1984 * and gets set to non-null by QTAILQ_INSERT_TAIL(). Establish
1985 * the useful invariant "bs in bdrv_states iff bs->tqe_prev" by
1986 * resetting it to null on remove.
1987 */
1988 if (bs->device_list.tqe_prev) {
dc364f4c 1989 QTAILQ_REMOVE(&bdrv_states, bs, device_list);
bfb197e0 1990 bs->device_list.tqe_prev = NULL;
d22b2f41 1991 }
dc364f4c
BC
1992 if (bs->node_name[0] != '\0') {
1993 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
1994 }
1995 bs->node_name[0] = '\0';
d22b2f41
RH
1996}
1997
8e419aef 1998/* Fields that need to stay with the top-level BDS */
4ddc07ca
PB
1999static void bdrv_move_feature_fields(BlockDriverState *bs_dest,
2000 BlockDriverState *bs_src)
8802d1fd 2001{
4ddc07ca 2002 /* move some fields that need to stay attached to the device */
8802d1fd
JC
2003
2004 /* dev info */
1b7fd729 2005 bs_dest->guest_block_size = bs_src->guest_block_size;
4ddc07ca 2006 bs_dest->copy_on_read = bs_src->copy_on_read;
8802d1fd 2007
4ddc07ca 2008 bs_dest->enable_write_cache = bs_src->enable_write_cache;
c4a248a1 2009
8802d1fd 2010 /* r/w error */
4ddc07ca
PB
2011 bs_dest->on_read_error = bs_src->on_read_error;
2012 bs_dest->on_write_error = bs_src->on_write_error;
8802d1fd
JC
2013
2014 /* i/o status */
4ddc07ca
PB
2015 bs_dest->iostatus_enabled = bs_src->iostatus_enabled;
2016 bs_dest->iostatus = bs_src->iostatus;
8802d1fd 2017
a9fc4408 2018 /* dirty bitmap */
e4654d2d 2019 bs_dest->dirty_bitmaps = bs_src->dirty_bitmaps;
063dd40e 2020}
a9fc4408 2021
dd62f1ca
KW
2022static void change_parent_backing_link(BlockDriverState *from,
2023 BlockDriverState *to)
2024{
2025 BdrvChild *c, *next;
2026
2027 QLIST_FOREACH_SAFE(c, &from->parents, next_parent, next) {
2028 assert(c->role != &child_backing);
2029 c->bs = to;
2030 QLIST_REMOVE(c, next_parent);
2031 QLIST_INSERT_HEAD(&to->parents, c, next_parent);
2032 bdrv_ref(to);
2033 bdrv_unref(from);
2034 }
2035 if (from->blk) {
2036 blk_set_bs(from->blk, to);
2037 if (!to->device_list.tqe_prev) {
2038 QTAILQ_INSERT_BEFORE(from, to, device_list);
2039 }
2040 QTAILQ_REMOVE(&bdrv_states, from, device_list);
2041 }
2042}
2043
2044static void swap_feature_fields(BlockDriverState *bs_top,
2045 BlockDriverState *bs_new)
2046{
2047 BlockDriverState tmp;
2048
2049 bdrv_move_feature_fields(&tmp, bs_top);
2050 bdrv_move_feature_fields(bs_top, bs_new);
2051 bdrv_move_feature_fields(bs_new, &tmp);
2052
2053 assert(!bs_new->throttle_state);
2054 if (bs_top->throttle_state) {
2055 assert(bs_top->io_limits_enabled);
2056 bdrv_io_limits_enable(bs_new, throttle_group_get_name(bs_top));
2057 bdrv_io_limits_disable(bs_top);
2058 }
2059}
2060
4ddc07ca
PB
2061/*
2062 * Add new bs contents at the top of an image chain while the chain is
2063 * live, while keeping required fields on the top layer.
2064 *
2065 * This will modify the BlockDriverState fields, and swap contents
2066 * between bs_new and bs_top. Both bs_new and bs_top are modified.
2067 *
bfb197e0 2068 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2069 *
2070 * This function does not create any image files.
dd62f1ca
KW
2071 *
2072 * bdrv_append() takes ownership of a bs_new reference and unrefs it because
2073 * that's what the callers commonly need. bs_new will be referenced by the old
2074 * parents of bs_top after bdrv_append() returns. If the caller needs to keep a
2075 * reference of its own, it must call bdrv_ref().
4ddc07ca
PB
2076 */
2077void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top)
2078{
dd62f1ca
KW
2079 assert(!bdrv_requests_pending(bs_top));
2080 assert(!bdrv_requests_pending(bs_new));
2081
2082 bdrv_ref(bs_top);
2083 change_parent_backing_link(bs_top, bs_new);
2084
2085 /* Some fields always stay on top of the backing file chain */
2086 swap_feature_fields(bs_top, bs_new);
2087
2088 bdrv_set_backing_hd(bs_new, bs_top);
2089 bdrv_unref(bs_top);
4ddc07ca 2090
dd62f1ca
KW
2091 /* bs_new is now referenced by its new parents, we don't need the
2092 * additional reference any more. */
2093 bdrv_unref(bs_new);
8802d1fd
JC
2094}
2095
3f09bfbc
KW
2096void bdrv_replace_in_backing_chain(BlockDriverState *old, BlockDriverState *new)
2097{
2098 assert(!bdrv_requests_pending(old));
2099 assert(!bdrv_requests_pending(new));
2100
2101 bdrv_ref(old);
2102
2103 if (old->blk) {
2104 /* As long as these fields aren't in BlockBackend, but in the top-level
2105 * BlockDriverState, it's not possible for a BDS to have two BBs.
2106 *
2107 * We really want to copy the fields from old to new, but we go for a
2108 * swap instead so that pointers aren't duplicated and cause trouble.
2109 * (Also, bdrv_swap() used to do the same.) */
2110 assert(!new->blk);
2111 swap_feature_fields(old, new);
2112 }
2113 change_parent_backing_link(old, new);
2114
2115 /* Change backing files if a previously independent node is added to the
2116 * chain. For active commit, we replace top by its own (indirect) backing
2117 * file and don't do anything here so we don't build a loop. */
2118 if (new->backing == NULL && !bdrv_chain_contains(backing_bs(old), new)) {
2119 bdrv_set_backing_hd(new, backing_bs(old));
2120 bdrv_set_backing_hd(old, NULL);
2121 }
2122
2123 bdrv_unref(old);
2124}
2125
4f6fd349 2126static void bdrv_delete(BlockDriverState *bs)
b338082b 2127{
3e914655 2128 assert(!bs->job);
3718d8ab 2129 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 2130 assert(!bs->refcnt);
e4654d2d 2131 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
18846dee 2132
e1b5c52e
SH
2133 bdrv_close(bs);
2134
1b7bdbc1 2135 /* remove from list, if necessary */
d22b2f41 2136 bdrv_make_anon(bs);
34c6f050 2137
7267c094 2138 g_free(bs);
fc01f7e7
FB
2139}
2140
e97fc193
AL
2141/*
2142 * Run consistency checks on an image
2143 *
e076f338 2144 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 2145 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 2146 * check are stored in res.
e97fc193 2147 */
4534ff54 2148int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 2149{
908bcd54
HR
2150 if (bs->drv == NULL) {
2151 return -ENOMEDIUM;
2152 }
e97fc193
AL
2153 if (bs->drv->bdrv_check == NULL) {
2154 return -ENOTSUP;
2155 }
2156
e076f338 2157 memset(res, 0, sizeof(*res));
4534ff54 2158 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
2159}
2160
8a426614
KW
2161#define COMMIT_BUF_SECTORS 2048
2162
33e3963e
FB
2163/* commit COW file into the raw image */
2164int bdrv_commit(BlockDriverState *bs)
2165{
19cb3738 2166 BlockDriver *drv = bs->drv;
72706ea4 2167 int64_t sector, total_sectors, length, backing_length;
8a426614 2168 int n, ro, open_flags;
0bce597d 2169 int ret = 0;
72706ea4 2170 uint8_t *buf = NULL;
33e3963e 2171
19cb3738
FB
2172 if (!drv)
2173 return -ENOMEDIUM;
6bb45158 2174
760e0063 2175 if (!bs->backing) {
4dca4b63 2176 return -ENOTSUP;
33e3963e
FB
2177 }
2178
bb00021d 2179 if (bdrv_op_is_blocked(bs, BLOCK_OP_TYPE_COMMIT_SOURCE, NULL) ||
760e0063 2180 bdrv_op_is_blocked(bs->backing->bs, BLOCK_OP_TYPE_COMMIT_TARGET, NULL)) {
2d3735d3
SH
2181 return -EBUSY;
2182 }
2183
760e0063
KW
2184 ro = bs->backing->bs->read_only;
2185 open_flags = bs->backing->bs->open_flags;
4dca4b63
NS
2186
2187 if (ro) {
760e0063 2188 if (bdrv_reopen(bs->backing->bs, open_flags | BDRV_O_RDWR, NULL)) {
0bce597d 2189 return -EACCES;
4dca4b63 2190 }
ea2384d3 2191 }
33e3963e 2192
72706ea4
JC
2193 length = bdrv_getlength(bs);
2194 if (length < 0) {
2195 ret = length;
2196 goto ro_cleanup;
2197 }
2198
760e0063 2199 backing_length = bdrv_getlength(bs->backing->bs);
72706ea4
JC
2200 if (backing_length < 0) {
2201 ret = backing_length;
2202 goto ro_cleanup;
2203 }
2204
2205 /* If our top snapshot is larger than the backing file image,
2206 * grow the backing file image if possible. If not possible,
2207 * we must return an error */
2208 if (length > backing_length) {
760e0063 2209 ret = bdrv_truncate(bs->backing->bs, length);
72706ea4
JC
2210 if (ret < 0) {
2211 goto ro_cleanup;
2212 }
2213 }
2214
2215 total_sectors = length >> BDRV_SECTOR_BITS;
857d4f46
KW
2216
2217 /* qemu_try_blockalign() for bs will choose an alignment that works for
760e0063 2218 * bs->backing->bs as well, so no need to compare the alignment manually. */
857d4f46
KW
2219 buf = qemu_try_blockalign(bs, COMMIT_BUF_SECTORS * BDRV_SECTOR_SIZE);
2220 if (buf == NULL) {
2221 ret = -ENOMEM;
2222 goto ro_cleanup;
2223 }
8a426614
KW
2224
2225 for (sector = 0; sector < total_sectors; sector += n) {
d663640c
PB
2226 ret = bdrv_is_allocated(bs, sector, COMMIT_BUF_SECTORS, &n);
2227 if (ret < 0) {
2228 goto ro_cleanup;
2229 }
2230 if (ret) {
dabfa6cc
KW
2231 ret = bdrv_read(bs, sector, buf, n);
2232 if (ret < 0) {
8a426614
KW
2233 goto ro_cleanup;
2234 }
2235
760e0063 2236 ret = bdrv_write(bs->backing->bs, sector, buf, n);
dabfa6cc 2237 if (ret < 0) {
8a426614
KW
2238 goto ro_cleanup;
2239 }
ea2384d3 2240 }
33e3963e 2241 }
95389c86 2242
1d44952f
CH
2243 if (drv->bdrv_make_empty) {
2244 ret = drv->bdrv_make_empty(bs);
dabfa6cc
KW
2245 if (ret < 0) {
2246 goto ro_cleanup;
2247 }
1d44952f
CH
2248 bdrv_flush(bs);
2249 }
95389c86 2250
3f5075ae
CH
2251 /*
2252 * Make sure all data we wrote to the backing device is actually
2253 * stable on disk.
2254 */
760e0063
KW
2255 if (bs->backing) {
2256 bdrv_flush(bs->backing->bs);
dabfa6cc 2257 }
4dca4b63 2258
dabfa6cc 2259 ret = 0;
4dca4b63 2260ro_cleanup:
857d4f46 2261 qemu_vfree(buf);
4dca4b63
NS
2262
2263 if (ro) {
0bce597d 2264 /* ignoring error return here */
760e0063 2265 bdrv_reopen(bs->backing->bs, open_flags & ~BDRV_O_RDWR, NULL);
4dca4b63
NS
2266 }
2267
1d44952f 2268 return ret;
33e3963e
FB
2269}
2270
e8877497 2271int bdrv_commit_all(void)
6ab4b5ab
MA
2272{
2273 BlockDriverState *bs;
2274
dc364f4c 2275 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
2276 AioContext *aio_context = bdrv_get_aio_context(bs);
2277
2278 aio_context_acquire(aio_context);
760e0063 2279 if (bs->drv && bs->backing) {
272d2d8e
JC
2280 int ret = bdrv_commit(bs);
2281 if (ret < 0) {
ed78cda3 2282 aio_context_release(aio_context);
272d2d8e
JC
2283 return ret;
2284 }
e8877497 2285 }
ed78cda3 2286 aio_context_release(aio_context);
6ab4b5ab 2287 }
e8877497 2288 return 0;
6ab4b5ab
MA
2289}
2290
756e6736
KW
2291/*
2292 * Return values:
2293 * 0 - success
2294 * -EINVAL - backing format specified, but no file
2295 * -ENOSPC - can't update the backing file because no space is left in the
2296 * image file header
2297 * -ENOTSUP - format driver doesn't support changing the backing file
2298 */
2299int bdrv_change_backing_file(BlockDriverState *bs,
2300 const char *backing_file, const char *backing_fmt)
2301{
2302 BlockDriver *drv = bs->drv;
469ef350 2303 int ret;
756e6736 2304
5f377794
PB
2305 /* Backing file format doesn't make sense without a backing file */
2306 if (backing_fmt && !backing_file) {
2307 return -EINVAL;
2308 }
2309
756e6736 2310 if (drv->bdrv_change_backing_file != NULL) {
469ef350 2311 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 2312 } else {
469ef350 2313 ret = -ENOTSUP;
756e6736 2314 }
469ef350
PB
2315
2316 if (ret == 0) {
2317 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
2318 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
2319 }
2320 return ret;
756e6736
KW
2321}
2322
6ebdcee2
JC
2323/*
2324 * Finds the image layer in the chain that has 'bs' as its backing file.
2325 *
2326 * active is the current topmost image.
2327 *
2328 * Returns NULL if bs is not found in active's image chain,
2329 * or if active == bs.
4caf0fcd
JC
2330 *
2331 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
2332 */
2333BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
2334 BlockDriverState *bs)
2335{
760e0063
KW
2336 while (active && bs != backing_bs(active)) {
2337 active = backing_bs(active);
6ebdcee2
JC
2338 }
2339
4caf0fcd
JC
2340 return active;
2341}
6ebdcee2 2342
4caf0fcd
JC
2343/* Given a BDS, searches for the base layer. */
2344BlockDriverState *bdrv_find_base(BlockDriverState *bs)
2345{
2346 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
2347}
2348
6ebdcee2
JC
2349/*
2350 * Drops images above 'base' up to and including 'top', and sets the image
2351 * above 'top' to have base as its backing file.
2352 *
2353 * Requires that the overlay to 'top' is opened r/w, so that the backing file
2354 * information in 'bs' can be properly updated.
2355 *
2356 * E.g., this will convert the following chain:
2357 * bottom <- base <- intermediate <- top <- active
2358 *
2359 * to
2360 *
2361 * bottom <- base <- active
2362 *
2363 * It is allowed for bottom==base, in which case it converts:
2364 *
2365 * base <- intermediate <- top <- active
2366 *
2367 * to
2368 *
2369 * base <- active
2370 *
54e26900
JC
2371 * If backing_file_str is non-NULL, it will be used when modifying top's
2372 * overlay image metadata.
2373 *
6ebdcee2
JC
2374 * Error conditions:
2375 * if active == top, that is considered an error
2376 *
2377 */
2378int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 2379 BlockDriverState *base, const char *backing_file_str)
6ebdcee2 2380{
6ebdcee2 2381 BlockDriverState *new_top_bs = NULL;
6ebdcee2
JC
2382 int ret = -EIO;
2383
6ebdcee2
JC
2384 if (!top->drv || !base->drv) {
2385 goto exit;
2386 }
2387
2388 new_top_bs = bdrv_find_overlay(active, top);
2389
2390 if (new_top_bs == NULL) {
2391 /* we could not find the image above 'top', this is an error */
2392 goto exit;
2393 }
2394
760e0063 2395 /* special case of new_top_bs->backing->bs already pointing to base - nothing
6ebdcee2 2396 * to do, no intermediate images */
760e0063 2397 if (backing_bs(new_top_bs) == base) {
6ebdcee2
JC
2398 ret = 0;
2399 goto exit;
2400 }
2401
5db15a57
KW
2402 /* Make sure that base is in the backing chain of top */
2403 if (!bdrv_chain_contains(top, base)) {
6ebdcee2
JC
2404 goto exit;
2405 }
2406
2407 /* success - we can delete the intermediate states, and link top->base */
5db15a57 2408 backing_file_str = backing_file_str ? backing_file_str : base->filename;
54e26900 2409 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
5db15a57 2410 base->drv ? base->drv->format_name : "");
6ebdcee2
JC
2411 if (ret) {
2412 goto exit;
2413 }
5db15a57 2414 bdrv_set_backing_hd(new_top_bs, base);
6ebdcee2 2415
6ebdcee2 2416 ret = 0;
6ebdcee2 2417exit:
6ebdcee2
JC
2418 return ret;
2419}
2420
61007b31
SH
2421/**
2422 * Truncate file to 'offset' bytes (needed only for file protocols)
2423 */
2424int bdrv_truncate(BlockDriverState *bs, int64_t offset)
71d0770c 2425{
61007b31
SH
2426 BlockDriver *drv = bs->drv;
2427 int ret;
2428 if (!drv)
71d0770c 2429 return -ENOMEDIUM;
61007b31
SH
2430 if (!drv->bdrv_truncate)
2431 return -ENOTSUP;
2432 if (bs->read_only)
2433 return -EACCES;
71d0770c 2434
61007b31
SH
2435 ret = drv->bdrv_truncate(bs, offset);
2436 if (ret == 0) {
2437 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
2438 bdrv_dirty_bitmap_truncate(bs);
2439 if (bs->blk) {
2440 blk_dev_resize_cb(bs->blk);
2441 }
c0191e76 2442 }
61007b31 2443 return ret;
71d0770c
AL
2444}
2445
61007b31
SH
2446/**
2447 * Length of a allocated file in bytes. Sparse files are counted by actual
2448 * allocated space. Return < 0 if error or unknown.
2449 */
2450int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 2451{
61007b31
SH
2452 BlockDriver *drv = bs->drv;
2453 if (!drv) {
2454 return -ENOMEDIUM;
8f4754ed 2455 }
61007b31
SH
2456 if (drv->bdrv_get_allocated_file_size) {
2457 return drv->bdrv_get_allocated_file_size(bs);
2458 }
2459 if (bs->file) {
9a4f4c31 2460 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 2461 }
61007b31 2462 return -ENOTSUP;
1c9805a3 2463}
e7a8a783 2464
61007b31
SH
2465/**
2466 * Return number of sectors on success, -errno on error.
1c9805a3 2467 */
61007b31 2468int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 2469{
61007b31 2470 BlockDriver *drv = bs->drv;
498e386c 2471
61007b31
SH
2472 if (!drv)
2473 return -ENOMEDIUM;
2572b37a 2474
61007b31
SH
2475 if (drv->has_variable_length) {
2476 int ret = refresh_total_sectors(bs, bs->total_sectors);
2477 if (ret < 0) {
2478 return ret;
1c9805a3
SH
2479 }
2480 }
61007b31 2481 return bs->total_sectors;
1c9805a3 2482}
b338082b 2483
61007b31
SH
2484/**
2485 * Return length in bytes on success, -errno on error.
2486 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 2487 */
61007b31 2488int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 2489{
61007b31 2490 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 2491
4a9c9ea0 2492 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 2493 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
2494}
2495
61007b31
SH
2496/* return 0 as number of sectors if no device present or error */
2497void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 2498{
61007b31 2499 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 2500
61007b31 2501 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
2502}
2503
61007b31
SH
2504void bdrv_set_on_error(BlockDriverState *bs, BlockdevOnError on_read_error,
2505 BlockdevOnError on_write_error)
fc01f7e7 2506{
61007b31
SH
2507 bs->on_read_error = on_read_error;
2508 bs->on_write_error = on_write_error;
83f64091
FB
2509}
2510
61007b31 2511BlockdevOnError bdrv_get_on_error(BlockDriverState *bs, bool is_read)
4105eaaa 2512{
61007b31 2513 return is_read ? bs->on_read_error : bs->on_write_error;
8d3b1a2d
KW
2514}
2515
61007b31 2516BlockErrorAction bdrv_get_error_action(BlockDriverState *bs, bool is_read, int error)
d75cbb5e 2517{
61007b31 2518 BlockdevOnError on_err = is_read ? bs->on_read_error : bs->on_write_error;
9ce10c0b 2519
61007b31
SH
2520 switch (on_err) {
2521 case BLOCKDEV_ON_ERROR_ENOSPC:
2522 return (error == ENOSPC) ?
2523 BLOCK_ERROR_ACTION_STOP : BLOCK_ERROR_ACTION_REPORT;
2524 case BLOCKDEV_ON_ERROR_STOP:
2525 return BLOCK_ERROR_ACTION_STOP;
2526 case BLOCKDEV_ON_ERROR_REPORT:
2527 return BLOCK_ERROR_ACTION_REPORT;
2528 case BLOCKDEV_ON_ERROR_IGNORE:
2529 return BLOCK_ERROR_ACTION_IGNORE;
2530 default:
2531 abort();
d75cbb5e
PL
2532 }
2533}
2534
61007b31
SH
2535static void send_qmp_error_event(BlockDriverState *bs,
2536 BlockErrorAction action,
2537 bool is_read, int error)
83f64091 2538{
61007b31 2539 IoOperationType optype;
a3ef6571 2540
61007b31
SH
2541 optype = is_read ? IO_OPERATION_TYPE_READ : IO_OPERATION_TYPE_WRITE;
2542 qapi_event_send_block_io_error(bdrv_get_device_name(bs), optype, action,
2543 bdrv_iostatus_is_enabled(bs),
2544 error == ENOSPC, strerror(error),
2545 &error_abort);
83f64091
FB
2546}
2547
61007b31
SH
2548/* This is done by device models because, while the block layer knows
2549 * about the error, it does not know whether an operation comes from
2550 * the device or the block layer (from a job, for example).
2551 */
2552void bdrv_error_action(BlockDriverState *bs, BlockErrorAction action,
2553 bool is_read, int error)
83f64091 2554{
61007b31 2555 assert(error >= 0);
83f64091 2556
61007b31
SH
2557 if (action == BLOCK_ERROR_ACTION_STOP) {
2558 /* First set the iostatus, so that "info block" returns an iostatus
2559 * that matches the events raised so far (an additional error iostatus
2560 * is fine, but not a lost one).
2561 */
2562 bdrv_iostatus_set_err(bs, error);
83f64091 2563
61007b31
SH
2564 /* Then raise the request to stop the VM and the event.
2565 * qemu_system_vmstop_request_prepare has two effects. First,
2566 * it ensures that the STOP event always comes after the
2567 * BLOCK_IO_ERROR event. Second, it ensures that even if management
2568 * can observe the STOP event and do a "cont" before the STOP
2569 * event is issued, the VM will not stop. In this case, vm_start()
2570 * also ensures that the STOP/RESUME pair of events is emitted.
2571 */
2572 qemu_system_vmstop_request_prepare();
2573 send_qmp_error_event(bs, action, is_read, error);
2574 qemu_system_vmstop_request(RUN_STATE_IO_ERROR);
2575 } else {
2576 send_qmp_error_event(bs, action, is_read, error);
2577 }
8d3b1a2d
KW
2578}
2579
61007b31 2580int bdrv_is_read_only(BlockDriverState *bs)
8d3b1a2d 2581{
61007b31 2582 return bs->read_only;
83f64091 2583}
83f64091 2584
61007b31 2585int bdrv_is_sg(BlockDriverState *bs)
f08145fe 2586{
61007b31 2587 return bs->sg;
f08145fe
KW
2588}
2589
61007b31 2590int bdrv_enable_write_cache(BlockDriverState *bs)
ab185921 2591{
61007b31 2592 return bs->enable_write_cache;
ab185921
SH
2593}
2594
61007b31 2595void bdrv_set_enable_write_cache(BlockDriverState *bs, bool wce)
da1fa91d 2596{
61007b31 2597 bs->enable_write_cache = wce;
ab185921 2598
61007b31
SH
2599 /* so a reopen() will preserve wce */
2600 if (wce) {
2601 bs->open_flags |= BDRV_O_CACHE_WB;
893a8f62 2602 } else {
61007b31 2603 bs->open_flags &= ~BDRV_O_CACHE_WB;
893a8f62 2604 }
da1fa91d
KW
2605}
2606
61007b31 2607int bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 2608{
760e0063 2609 if (bs->backing && bs->backing->bs->encrypted) {
61007b31 2610 return 1;
760e0063 2611 }
61007b31 2612 return bs->encrypted;
fc3959e4
FZ
2613}
2614
61007b31 2615int bdrv_key_required(BlockDriverState *bs)
fc3959e4 2616{
760e0063 2617 BdrvChild *backing = bs->backing;
61007b31 2618
760e0063 2619 if (backing && backing->bs->encrypted && !backing->bs->valid_key) {
61007b31 2620 return 1;
760e0063 2621 }
61007b31 2622 return (bs->encrypted && !bs->valid_key);
fc3959e4
FZ
2623}
2624
61007b31 2625int bdrv_set_key(BlockDriverState *bs, const char *key)
d0c7f642 2626{
d0c7f642 2627 int ret;
760e0063
KW
2628 if (bs->backing && bs->backing->bs->encrypted) {
2629 ret = bdrv_set_key(bs->backing->bs, key);
61007b31
SH
2630 if (ret < 0)
2631 return ret;
2632 if (!bs->encrypted)
2633 return 0;
2634 }
2635 if (!bs->encrypted) {
2636 return -EINVAL;
2637 } else if (!bs->drv || !bs->drv->bdrv_set_key) {
d0c7f642
KW
2638 return -ENOMEDIUM;
2639 }
61007b31 2640 ret = bs->drv->bdrv_set_key(bs, key);
b9c64947 2641 if (ret < 0) {
61007b31
SH
2642 bs->valid_key = 0;
2643 } else if (!bs->valid_key) {
2644 bs->valid_key = 1;
2645 if (bs->blk) {
2646 /* call the change callback now, we skipped it on open */
2647 blk_dev_change_media_cb(bs->blk, true);
2648 }
1b0288ae 2649 }
61007b31
SH
2650 return ret;
2651}
f08f2dda 2652
c5fbe571 2653/*
61007b31
SH
2654 * Provide an encryption key for @bs.
2655 * If @key is non-null:
2656 * If @bs is not encrypted, fail.
2657 * Else if the key is invalid, fail.
2658 * Else set @bs's key to @key, replacing the existing key, if any.
2659 * If @key is null:
2660 * If @bs is encrypted and still lacks a key, fail.
2661 * Else do nothing.
2662 * On failure, store an error object through @errp if non-null.
c5fbe571 2663 */
61007b31 2664void bdrv_add_key(BlockDriverState *bs, const char *key, Error **errp)
c5fbe571 2665{
61007b31
SH
2666 if (key) {
2667 if (!bdrv_is_encrypted(bs)) {
2668 error_setg(errp, "Node '%s' is not encrypted",
2669 bdrv_get_device_or_node_name(bs));
2670 } else if (bdrv_set_key(bs, key) < 0) {
c6bd8c70 2671 error_setg(errp, QERR_INVALID_PASSWORD);
4d2855a3
MA
2672 }
2673 } else {
2674 if (bdrv_key_required(bs)) {
b1ca6391
MA
2675 error_set(errp, ERROR_CLASS_DEVICE_ENCRYPTED,
2676 "'%s' (%s) is encrypted",
81e5f78a 2677 bdrv_get_device_or_node_name(bs),
4d2855a3
MA
2678 bdrv_get_encrypted_filename(bs));
2679 }
2680 }
2681}
2682
61007b31 2683const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 2684{
61007b31 2685 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
2686}
2687
61007b31 2688static int qsort_strcmp(const void *a, const void *b)
40b4f539 2689{
61007b31 2690 return strcmp(a, b);
40b4f539
KW
2691}
2692
61007b31
SH
2693void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
2694 void *opaque)
40b4f539 2695{
61007b31
SH
2696 BlockDriver *drv;
2697 int count = 0;
2698 int i;
2699 const char **formats = NULL;
40b4f539 2700
61007b31
SH
2701 QLIST_FOREACH(drv, &bdrv_drivers, list) {
2702 if (drv->format_name) {
2703 bool found = false;
2704 int i = count;
2705 while (formats && i && !found) {
2706 found = !strcmp(formats[--i], drv->format_name);
2707 }
e2a305fb 2708
61007b31
SH
2709 if (!found) {
2710 formats = g_renew(const char *, formats, count + 1);
2711 formats[count++] = drv->format_name;
2712 }
6c5a42ac 2713 }
61007b31 2714 }
6c5a42ac 2715
61007b31 2716 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 2717
61007b31
SH
2718 for (i = 0; i < count; i++) {
2719 it(opaque, formats[i]);
2720 }
40b4f539 2721
61007b31
SH
2722 g_free(formats);
2723}
40b4f539 2724
61007b31
SH
2725/* This function is to find a node in the bs graph */
2726BlockDriverState *bdrv_find_node(const char *node_name)
2727{
2728 BlockDriverState *bs;
391827eb 2729
61007b31 2730 assert(node_name);
40b4f539 2731
61007b31
SH
2732 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2733 if (!strcmp(node_name, bs->node_name)) {
2734 return bs;
40b4f539
KW
2735 }
2736 }
61007b31 2737 return NULL;
40b4f539
KW
2738}
2739
61007b31
SH
2740/* Put this QMP function here so it can access the static graph_bdrv_states. */
2741BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 2742{
61007b31
SH
2743 BlockDeviceInfoList *list, *entry;
2744 BlockDriverState *bs;
40b4f539 2745
61007b31
SH
2746 list = NULL;
2747 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2748 BlockDeviceInfo *info = bdrv_block_device_info(bs, errp);
2749 if (!info) {
2750 qapi_free_BlockDeviceInfoList(list);
2751 return NULL;
301db7c2 2752 }
61007b31
SH
2753 entry = g_malloc0(sizeof(*entry));
2754 entry->value = info;
2755 entry->next = list;
2756 list = entry;
301db7c2
RH
2757 }
2758
61007b31
SH
2759 return list;
2760}
40b4f539 2761
61007b31
SH
2762BlockDriverState *bdrv_lookup_bs(const char *device,
2763 const char *node_name,
2764 Error **errp)
2765{
2766 BlockBackend *blk;
2767 BlockDriverState *bs;
40b4f539 2768
61007b31
SH
2769 if (device) {
2770 blk = blk_by_name(device);
40b4f539 2771
61007b31
SH
2772 if (blk) {
2773 return blk_bs(blk);
2774 }
2775 }
40b4f539 2776
61007b31
SH
2777 if (node_name) {
2778 bs = bdrv_find_node(node_name);
6d519a5f 2779
61007b31
SH
2780 if (bs) {
2781 return bs;
2782 }
40b4f539
KW
2783 }
2784
61007b31
SH
2785 error_setg(errp, "Cannot find device=%s nor node_name=%s",
2786 device ? device : "",
2787 node_name ? node_name : "");
2788 return NULL;
40b4f539
KW
2789}
2790
61007b31
SH
2791/* If 'base' is in the same chain as 'top', return true. Otherwise,
2792 * return false. If either argument is NULL, return false. */
2793bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 2794{
61007b31 2795 while (top && top != base) {
760e0063 2796 top = backing_bs(top);
02c50efe 2797 }
61007b31
SH
2798
2799 return top != NULL;
02c50efe
FZ
2800}
2801
61007b31 2802BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 2803{
61007b31
SH
2804 if (!bs) {
2805 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 2806 }
61007b31 2807 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
2808}
2809
61007b31 2810BlockDriverState *bdrv_next(BlockDriverState *bs)
83f64091 2811{
61007b31
SH
2812 if (!bs) {
2813 return QTAILQ_FIRST(&bdrv_states);
857d4f46 2814 }
61007b31 2815 return QTAILQ_NEXT(bs, device_list);
83f64091 2816}
beac80cd 2817
61007b31 2818const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 2819{
61007b31 2820 return bs->node_name;
beac80cd
FB
2821}
2822
61007b31
SH
2823/* TODO check what callers really want: bs->node_name or blk_name() */
2824const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 2825{
61007b31 2826 return bs->blk ? blk_name(bs->blk) : "";
f141eafe 2827}
83f64091 2828
61007b31
SH
2829/* This can be used to identify nodes that might not have a device
2830 * name associated. Since node and device names live in the same
2831 * namespace, the result is unambiguous. The exception is if both are
2832 * absent, then this returns an empty (non-null) string. */
2833const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 2834{
61007b31 2835 return bs->blk ? blk_name(bs->blk) : bs->node_name;
beac80cd 2836}
beac80cd 2837
61007b31 2838int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 2839{
61007b31 2840 return bs->open_flags;
0b5a2445
PB
2841}
2842
61007b31 2843int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 2844{
61007b31 2845 return 1;
0b5a2445
PB
2846}
2847
61007b31 2848int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 2849{
61007b31 2850 assert(bs->drv);
0b5a2445 2851
61007b31
SH
2852 /* If BS is a copy on write image, it is initialized to
2853 the contents of the base image, which may not be zeroes. */
760e0063 2854 if (bs->backing) {
61007b31
SH
2855 return 0;
2856 }
2857 if (bs->drv->bdrv_has_zero_init) {
2858 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 2859 }
61007b31
SH
2860
2861 /* safe default */
2862 return 0;
68485420
KW
2863}
2864
61007b31 2865bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 2866{
61007b31 2867 BlockDriverInfo bdi;
b2a61371 2868
760e0063 2869 if (bs->backing) {
61007b31
SH
2870 return false;
2871 }
2872
2873 if (bdrv_get_info(bs, &bdi) == 0) {
2874 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
2875 }
2876
61007b31 2877 return false;
b2a61371
SH
2878}
2879
61007b31 2880bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 2881{
61007b31 2882 BlockDriverInfo bdi;
68485420 2883
760e0063 2884 if (bs->backing || !(bs->open_flags & BDRV_O_UNMAP)) {
61007b31
SH
2885 return false;
2886 }
68485420 2887
61007b31
SH
2888 if (bdrv_get_info(bs, &bdi) == 0) {
2889 return bdi.can_write_zeroes_with_unmap;
2890 }
68485420 2891
61007b31 2892 return false;
68485420
KW
2893}
2894
61007b31 2895const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 2896{
760e0063 2897 if (bs->backing && bs->backing->bs->encrypted)
61007b31
SH
2898 return bs->backing_file;
2899 else if (bs->encrypted)
2900 return bs->filename;
2901 else
2902 return NULL;
b2e12bc6
CH
2903}
2904
61007b31
SH
2905void bdrv_get_backing_filename(BlockDriverState *bs,
2906 char *filename, int filename_size)
016f5cf6 2907{
61007b31
SH
2908 pstrcpy(filename, filename_size, bs->backing_file);
2909}
d318aea9 2910
61007b31
SH
2911int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
2912{
2913 BlockDriver *drv = bs->drv;
2914 if (!drv)
2915 return -ENOMEDIUM;
2916 if (!drv->bdrv_get_info)
2917 return -ENOTSUP;
2918 memset(bdi, 0, sizeof(*bdi));
2919 return drv->bdrv_get_info(bs, bdi);
2920}
016f5cf6 2921
61007b31
SH
2922ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
2923{
2924 BlockDriver *drv = bs->drv;
2925 if (drv && drv->bdrv_get_specific_info) {
2926 return drv->bdrv_get_specific_info(bs);
2927 }
2928 return NULL;
016f5cf6
AG
2929}
2930
61007b31 2931void bdrv_debug_event(BlockDriverState *bs, BlkDebugEvent event)
4265d620 2932{
61007b31
SH
2933 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
2934 return;
2935 }
4265d620 2936
61007b31 2937 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
2938}
2939
61007b31
SH
2940int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
2941 const char *tag)
4265d620 2942{
61007b31 2943 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 2944 bs = bs->file ? bs->file->bs : NULL;
61007b31 2945 }
4265d620 2946
61007b31
SH
2947 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
2948 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
2949 }
4265d620 2950
61007b31 2951 return -ENOTSUP;
4265d620
PB
2952}
2953
61007b31 2954int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 2955{
61007b31 2956 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 2957 bs = bs->file ? bs->file->bs : NULL;
61007b31 2958 }
ce1a14dc 2959
61007b31
SH
2960 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
2961 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
2962 }
2963
2964 return -ENOTSUP;
eb852011
MA
2965}
2966
61007b31 2967int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 2968{
61007b31 2969 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 2970 bs = bs->file ? bs->file->bs : NULL;
61007b31 2971 }
ce1a14dc 2972
61007b31
SH
2973 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
2974 return bs->drv->bdrv_debug_resume(bs, tag);
2975 }
ce1a14dc 2976
61007b31 2977 return -ENOTSUP;
f197fe2b
FZ
2978}
2979
61007b31 2980bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 2981{
61007b31 2982 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 2983 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 2984 }
19cb3738 2985
61007b31
SH
2986 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
2987 return bs->drv->bdrv_debug_is_suspended(bs, tag);
2988 }
f9f05dc5 2989
61007b31
SH
2990 return false;
2991}
f9f05dc5 2992
61007b31 2993int bdrv_is_snapshot(BlockDriverState *bs)
f9f05dc5 2994{
61007b31 2995 return !!(bs->open_flags & BDRV_O_SNAPSHOT);
f9f05dc5
KW
2996}
2997
61007b31
SH
2998/* backing_file can either be relative, or absolute, or a protocol. If it is
2999 * relative, it must be relative to the chain. So, passing in bs->filename
3000 * from a BDS as backing_file should not be done, as that may be relative to
3001 * the CWD rather than the chain. */
3002BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
3003 const char *backing_file)
f9f05dc5 3004{
61007b31
SH
3005 char *filename_full = NULL;
3006 char *backing_file_full = NULL;
3007 char *filename_tmp = NULL;
3008 int is_protocol = 0;
3009 BlockDriverState *curr_bs = NULL;
3010 BlockDriverState *retval = NULL;
f9f05dc5 3011
61007b31
SH
3012 if (!bs || !bs->drv || !backing_file) {
3013 return NULL;
f9f05dc5
KW
3014 }
3015
61007b31
SH
3016 filename_full = g_malloc(PATH_MAX);
3017 backing_file_full = g_malloc(PATH_MAX);
3018 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 3019
61007b31 3020 is_protocol = path_has_protocol(backing_file);
f9f05dc5 3021
760e0063 3022 for (curr_bs = bs; curr_bs->backing; curr_bs = curr_bs->backing->bs) {
f9f05dc5 3023
61007b31
SH
3024 /* If either of the filename paths is actually a protocol, then
3025 * compare unmodified paths; otherwise make paths relative */
3026 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
3027 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
760e0063 3028 retval = curr_bs->backing->bs;
61007b31
SH
3029 break;
3030 }
3031 } else {
3032 /* If not an absolute filename path, make it relative to the current
3033 * image's filename path */
3034 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3035 backing_file);
f9f05dc5 3036
61007b31
SH
3037 /* We are going to compare absolute pathnames */
3038 if (!realpath(filename_tmp, filename_full)) {
3039 continue;
3040 }
07f07615 3041
61007b31
SH
3042 /* We need to make sure the backing filename we are comparing against
3043 * is relative to the current image filename (or absolute) */
3044 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3045 curr_bs->backing_file);
07f07615 3046
61007b31
SH
3047 if (!realpath(filename_tmp, backing_file_full)) {
3048 continue;
3049 }
eb489bb1 3050
61007b31 3051 if (strcmp(backing_file_full, filename_full) == 0) {
760e0063 3052 retval = curr_bs->backing->bs;
61007b31
SH
3053 break;
3054 }
3055 }
eb489bb1
KW
3056 }
3057
61007b31
SH
3058 g_free(filename_full);
3059 g_free(backing_file_full);
3060 g_free(filename_tmp);
3061 return retval;
3062}
3063
3064int bdrv_get_backing_file_depth(BlockDriverState *bs)
3065{
3066 if (!bs->drv) {
3067 return 0;
eb489bb1
KW
3068 }
3069
760e0063 3070 if (!bs->backing) {
61007b31 3071 return 0;
ca716364
KW
3072 }
3073
760e0063 3074 return 1 + bdrv_get_backing_file_depth(bs->backing->bs);
61007b31 3075}
07f07615 3076
61007b31
SH
3077void bdrv_init(void)
3078{
3079 module_call_init(MODULE_INIT_BLOCK);
3080}
29cdb251 3081
61007b31
SH
3082void bdrv_init_with_whitelist(void)
3083{
3084 use_bdrv_whitelist = 1;
3085 bdrv_init();
07f07615
PB
3086}
3087
5a8a30db 3088void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 3089{
5a8a30db
KW
3090 Error *local_err = NULL;
3091 int ret;
3092
3456a8d1
KW
3093 if (!bs->drv) {
3094 return;
3095 }
3096
7ea2d269
AK
3097 if (!(bs->open_flags & BDRV_O_INCOMING)) {
3098 return;
3099 }
3100 bs->open_flags &= ~BDRV_O_INCOMING;
3101
3456a8d1 3102 if (bs->drv->bdrv_invalidate_cache) {
5a8a30db 3103 bs->drv->bdrv_invalidate_cache(bs, &local_err);
3456a8d1 3104 } else if (bs->file) {
9a4f4c31 3105 bdrv_invalidate_cache(bs->file->bs, &local_err);
5a8a30db
KW
3106 }
3107 if (local_err) {
3108 error_propagate(errp, local_err);
3109 return;
0f15423c 3110 }
3456a8d1 3111
5a8a30db
KW
3112 ret = refresh_total_sectors(bs, bs->total_sectors);
3113 if (ret < 0) {
3114 error_setg_errno(errp, -ret, "Could not refresh total sector count");
3115 return;
3116 }
0f15423c
AL
3117}
3118
5a8a30db 3119void bdrv_invalidate_cache_all(Error **errp)
0f15423c
AL
3120{
3121 BlockDriverState *bs;
5a8a30db 3122 Error *local_err = NULL;
0f15423c 3123
dc364f4c 3124 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
3125 AioContext *aio_context = bdrv_get_aio_context(bs);
3126
3127 aio_context_acquire(aio_context);
5a8a30db 3128 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 3129 aio_context_release(aio_context);
5a8a30db
KW
3130 if (local_err) {
3131 error_propagate(errp, local_err);
3132 return;
3133 }
0f15423c
AL
3134 }
3135}
3136
19cb3738
FB
3137/**************************************************************/
3138/* removable device support */
3139
3140/**
3141 * Return TRUE if the media is present
3142 */
e031f750 3143bool bdrv_is_inserted(BlockDriverState *bs)
19cb3738
FB
3144{
3145 BlockDriver *drv = bs->drv;
a1aff5bf 3146
e031f750
HR
3147 if (!drv) {
3148 return false;
3149 }
3150 if (!drv->bdrv_is_inserted) {
3151 return true;
3152 }
a1aff5bf 3153 return drv->bdrv_is_inserted(bs);
19cb3738
FB
3154}
3155
3156/**
8e49ca46
MA
3157 * Return whether the media changed since the last call to this
3158 * function, or -ENOTSUP if we don't know. Most drivers don't know.
19cb3738
FB
3159 */
3160int bdrv_media_changed(BlockDriverState *bs)
3161{
3162 BlockDriver *drv = bs->drv;
19cb3738 3163
8e49ca46
MA
3164 if (drv && drv->bdrv_media_changed) {
3165 return drv->bdrv_media_changed(bs);
3166 }
3167 return -ENOTSUP;
19cb3738
FB
3168}
3169
3170/**
3171 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
3172 */
f36f3949 3173void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
3174{
3175 BlockDriver *drv = bs->drv;
bfb197e0 3176 const char *device_name;
19cb3738 3177
822e1cd1
MA
3178 if (drv && drv->bdrv_eject) {
3179 drv->bdrv_eject(bs, eject_flag);
19cb3738 3180 }
6f382ed2 3181
bfb197e0
MA
3182 device_name = bdrv_get_device_name(bs);
3183 if (device_name[0] != '\0') {
3184 qapi_event_send_device_tray_moved(device_name,
a5ee7bd4 3185 eject_flag, &error_abort);
6f382ed2 3186 }
19cb3738
FB
3187}
3188
19cb3738
FB
3189/**
3190 * Lock or unlock the media (if it is locked, the user won't be able
3191 * to eject it manually).
3192 */
025e849a 3193void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
3194{
3195 BlockDriver *drv = bs->drv;
3196
025e849a 3197 trace_bdrv_lock_medium(bs, locked);
b8c6d095 3198
025e849a
MA
3199 if (drv && drv->bdrv_lock_medium) {
3200 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
3201 }
3202}
985a03b0 3203
1b7fd729 3204void bdrv_set_guest_block_size(BlockDriverState *bs, int align)
7b6f9300 3205{
1b7fd729 3206 bs->guest_block_size = align;
7b6f9300 3207}
7cd1e32a 3208
0db6e54a
FZ
3209BdrvDirtyBitmap *bdrv_find_dirty_bitmap(BlockDriverState *bs, const char *name)
3210{
3211 BdrvDirtyBitmap *bm;
3212
3213 assert(name);
3214 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
3215 if (bm->name && !strcmp(name, bm->name)) {
3216 return bm;
3217 }
3218 }
3219 return NULL;
3220}
3221
20dca810 3222void bdrv_dirty_bitmap_make_anon(BdrvDirtyBitmap *bitmap)
0db6e54a 3223{
9bd2b08f 3224 assert(!bdrv_dirty_bitmap_frozen(bitmap));
0db6e54a
FZ
3225 g_free(bitmap->name);
3226 bitmap->name = NULL;
3227}
3228
3229BdrvDirtyBitmap *bdrv_create_dirty_bitmap(BlockDriverState *bs,
5fba6c0e 3230 uint32_t granularity,
0db6e54a 3231 const char *name,
b8afb520 3232 Error **errp)
7cd1e32a
LS
3233{
3234 int64_t bitmap_size;
e4654d2d 3235 BdrvDirtyBitmap *bitmap;
5fba6c0e 3236 uint32_t sector_granularity;
a55eb92c 3237
50717e94
PB
3238 assert((granularity & (granularity - 1)) == 0);
3239
0db6e54a
FZ
3240 if (name && bdrv_find_dirty_bitmap(bs, name)) {
3241 error_setg(errp, "Bitmap already exists: %s", name);
3242 return NULL;
3243 }
5fba6c0e
JS
3244 sector_granularity = granularity >> BDRV_SECTOR_BITS;
3245 assert(sector_granularity);
57322b78 3246 bitmap_size = bdrv_nb_sectors(bs);
b8afb520
FZ
3247 if (bitmap_size < 0) {
3248 error_setg_errno(errp, -bitmap_size, "could not get length of device");
3249 errno = -bitmap_size;
3250 return NULL;
3251 }
5839e53b 3252 bitmap = g_new0(BdrvDirtyBitmap, 1);
5fba6c0e 3253 bitmap->bitmap = hbitmap_alloc(bitmap_size, ctz32(sector_granularity));
e74e6b78 3254 bitmap->size = bitmap_size;
0db6e54a 3255 bitmap->name = g_strdup(name);
b8e6fb75 3256 bitmap->disabled = false;
e4654d2d
FZ
3257 QLIST_INSERT_HEAD(&bs->dirty_bitmaps, bitmap, list);
3258 return bitmap;
3259}
3260
9bd2b08f
JS
3261bool bdrv_dirty_bitmap_frozen(BdrvDirtyBitmap *bitmap)
3262{
3263 return bitmap->successor;
3264}
3265
b8e6fb75
JS
3266bool bdrv_dirty_bitmap_enabled(BdrvDirtyBitmap *bitmap)
3267{
9bd2b08f
JS
3268 return !(bitmap->disabled || bitmap->successor);
3269}
3270
9abe3bdc
JS
3271DirtyBitmapStatus bdrv_dirty_bitmap_status(BdrvDirtyBitmap *bitmap)
3272{
3273 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3274 return DIRTY_BITMAP_STATUS_FROZEN;
3275 } else if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3276 return DIRTY_BITMAP_STATUS_DISABLED;
3277 } else {
3278 return DIRTY_BITMAP_STATUS_ACTIVE;
3279 }
3280}
3281
9bd2b08f
JS
3282/**
3283 * Create a successor bitmap destined to replace this bitmap after an operation.
3284 * Requires that the bitmap is not frozen and has no successor.
3285 */
3286int bdrv_dirty_bitmap_create_successor(BlockDriverState *bs,
3287 BdrvDirtyBitmap *bitmap, Error **errp)
3288{
3289 uint64_t granularity;
3290 BdrvDirtyBitmap *child;
3291
3292 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3293 error_setg(errp, "Cannot create a successor for a bitmap that is "
3294 "currently frozen");
3295 return -1;
3296 }
3297 assert(!bitmap->successor);
3298
3299 /* Create an anonymous successor */
3300 granularity = bdrv_dirty_bitmap_granularity(bitmap);
3301 child = bdrv_create_dirty_bitmap(bs, granularity, NULL, errp);
3302 if (!child) {
3303 return -1;
3304 }
3305
3306 /* Successor will be on or off based on our current state. */
3307 child->disabled = bitmap->disabled;
3308
3309 /* Install the successor and freeze the parent */
3310 bitmap->successor = child;
3311 return 0;
3312}
3313
3314/**
3315 * For a bitmap with a successor, yield our name to the successor,
3316 * delete the old bitmap, and return a handle to the new bitmap.
3317 */
3318BdrvDirtyBitmap *bdrv_dirty_bitmap_abdicate(BlockDriverState *bs,
3319 BdrvDirtyBitmap *bitmap,
3320 Error **errp)
3321{
3322 char *name;
3323 BdrvDirtyBitmap *successor = bitmap->successor;
3324
3325 if (successor == NULL) {
3326 error_setg(errp, "Cannot relinquish control if "
3327 "there's no successor present");
3328 return NULL;
3329 }
3330
3331 name = bitmap->name;
3332 bitmap->name = NULL;
3333 successor->name = name;
3334 bitmap->successor = NULL;
3335 bdrv_release_dirty_bitmap(bs, bitmap);
3336
3337 return successor;
3338}
3339
3340/**
3341 * In cases of failure where we can no longer safely delete the parent,
3342 * we may wish to re-join the parent and child/successor.
3343 * The merged parent will be un-frozen, but not explicitly re-enabled.
3344 */
3345BdrvDirtyBitmap *bdrv_reclaim_dirty_bitmap(BlockDriverState *bs,
3346 BdrvDirtyBitmap *parent,
3347 Error **errp)
3348{
3349 BdrvDirtyBitmap *successor = parent->successor;
3350
3351 if (!successor) {
3352 error_setg(errp, "Cannot reclaim a successor when none is present");
3353 return NULL;
3354 }
3355
3356 if (!hbitmap_merge(parent->bitmap, successor->bitmap)) {
3357 error_setg(errp, "Merging of parent and successor bitmap failed");
3358 return NULL;
3359 }
3360 bdrv_release_dirty_bitmap(bs, successor);
3361 parent->successor = NULL;
3362
3363 return parent;
b8e6fb75
JS
3364}
3365
ce1ffea8
JS
3366/**
3367 * Truncates _all_ bitmaps attached to a BDS.
3368 */
3369static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs)
3370{
3371 BdrvDirtyBitmap *bitmap;
3372 uint64_t size = bdrv_nb_sectors(bs);
3373
3374 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
06207b0f 3375 assert(!bdrv_dirty_bitmap_frozen(bitmap));
ce1ffea8 3376 hbitmap_truncate(bitmap->bitmap, size);
5270b6a0 3377 bitmap->size = size;
ce1ffea8
JS
3378 }
3379}
3380
e4654d2d
FZ
3381void bdrv_release_dirty_bitmap(BlockDriverState *bs, BdrvDirtyBitmap *bitmap)
3382{
3383 BdrvDirtyBitmap *bm, *next;
3384 QLIST_FOREACH_SAFE(bm, &bs->dirty_bitmaps, list, next) {
3385 if (bm == bitmap) {
9bd2b08f 3386 assert(!bdrv_dirty_bitmap_frozen(bm));
e4654d2d
FZ
3387 QLIST_REMOVE(bitmap, list);
3388 hbitmap_free(bitmap->bitmap);
0db6e54a 3389 g_free(bitmap->name);
e4654d2d
FZ
3390 g_free(bitmap);
3391 return;
a55eb92c 3392 }
7cd1e32a
LS
3393 }
3394}
3395
b8e6fb75
JS
3396void bdrv_disable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3397{
9bd2b08f 3398 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3399 bitmap->disabled = true;
3400}
3401
3402void bdrv_enable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3403{
9bd2b08f 3404 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3405 bitmap->disabled = false;
3406}
3407
21b56835
FZ
3408BlockDirtyInfoList *bdrv_query_dirty_bitmaps(BlockDriverState *bs)
3409{
3410 BdrvDirtyBitmap *bm;
3411 BlockDirtyInfoList *list = NULL;
3412 BlockDirtyInfoList **plist = &list;
3413
3414 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
5839e53b
MA
3415 BlockDirtyInfo *info = g_new0(BlockDirtyInfo, 1);
3416 BlockDirtyInfoList *entry = g_new0(BlockDirtyInfoList, 1);
20dca810 3417 info->count = bdrv_get_dirty_count(bm);
592fdd02 3418 info->granularity = bdrv_dirty_bitmap_granularity(bm);
0db6e54a
FZ
3419 info->has_name = !!bm->name;
3420 info->name = g_strdup(bm->name);
9abe3bdc 3421 info->status = bdrv_dirty_bitmap_status(bm);
21b56835
FZ
3422 entry->value = info;
3423 *plist = entry;
3424 plist = &entry->next;
3425 }
3426
3427 return list;
3428}
3429
e4654d2d 3430int bdrv_get_dirty(BlockDriverState *bs, BdrvDirtyBitmap *bitmap, int64_t sector)
7cd1e32a 3431{
e4654d2d
FZ
3432 if (bitmap) {
3433 return hbitmap_get(bitmap->bitmap, sector);
7cd1e32a
LS
3434 } else {
3435 return 0;
3436 }
3437}
3438
341ebc2f
JS
3439/**
3440 * Chooses a default granularity based on the existing cluster size,
3441 * but clamped between [4K, 64K]. Defaults to 64K in the case that there
3442 * is no cluster size information available.
3443 */
3444uint32_t bdrv_get_default_bitmap_granularity(BlockDriverState *bs)
3445{
3446 BlockDriverInfo bdi;
3447 uint32_t granularity;
3448
3449 if (bdrv_get_info(bs, &bdi) >= 0 && bdi.cluster_size > 0) {
3450 granularity = MAX(4096, bdi.cluster_size);
3451 granularity = MIN(65536, granularity);
3452 } else {
3453 granularity = 65536;
3454 }
3455
3456 return granularity;
3457}
3458
592fdd02
JS
3459uint32_t bdrv_dirty_bitmap_granularity(BdrvDirtyBitmap *bitmap)
3460{
3461 return BDRV_SECTOR_SIZE << hbitmap_granularity(bitmap->bitmap);
3462}
3463
20dca810 3464void bdrv_dirty_iter_init(BdrvDirtyBitmap *bitmap, HBitmapIter *hbi)
1755da16 3465{
e4654d2d 3466 hbitmap_iter_init(hbi, bitmap->bitmap, 0);
1755da16
PB
3467}
3468
20dca810 3469void bdrv_set_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3470 int64_t cur_sector, int nr_sectors)
3471{
b8e6fb75 3472 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3473 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3474}
3475
20dca810 3476void bdrv_reset_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3477 int64_t cur_sector, int nr_sectors)
3478{
b8e6fb75 3479 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3480 hbitmap_reset(bitmap->bitmap, cur_sector, nr_sectors);
3481}
3482
e74e6b78
JS
3483void bdrv_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3484{
3485 assert(bdrv_dirty_bitmap_enabled(bitmap));
c6a8c328 3486 hbitmap_reset_all(bitmap->bitmap);
e74e6b78
JS
3487}
3488
e0c47b6c
SH
3489void bdrv_set_dirty(BlockDriverState *bs, int64_t cur_sector,
3490 int nr_sectors)
1755da16 3491{
e4654d2d
FZ
3492 BdrvDirtyBitmap *bitmap;
3493 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
b8e6fb75
JS
3494 if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3495 continue;
3496 }
e4654d2d
FZ
3497 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3498 }
1755da16
PB
3499}
3500
d58d8453
JS
3501/**
3502 * Advance an HBitmapIter to an arbitrary offset.
3503 */
3504void bdrv_set_dirty_iter(HBitmapIter *hbi, int64_t offset)
3505{
3506 assert(hbi->hb);
3507 hbitmap_iter_init(hbi, hbi->hb, offset);
3508}
3509
20dca810 3510int64_t bdrv_get_dirty_count(BdrvDirtyBitmap *bitmap)
aaa0eb75 3511{
e4654d2d 3512 return hbitmap_count(bitmap->bitmap);
aaa0eb75 3513}
f88e1a42 3514
9fcb0251
FZ
3515/* Get a reference to bs */
3516void bdrv_ref(BlockDriverState *bs)
3517{
3518 bs->refcnt++;
3519}
3520
3521/* Release a previously grabbed reference to bs.
3522 * If after releasing, reference count is zero, the BlockDriverState is
3523 * deleted. */
3524void bdrv_unref(BlockDriverState *bs)
3525{
9a4d5ca6
JC
3526 if (!bs) {
3527 return;
3528 }
9fcb0251
FZ
3529 assert(bs->refcnt > 0);
3530 if (--bs->refcnt == 0) {
3531 bdrv_delete(bs);
3532 }
3533}
3534
fbe40ff7
FZ
3535struct BdrvOpBlocker {
3536 Error *reason;
3537 QLIST_ENTRY(BdrvOpBlocker) list;
3538};
3539
3540bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
3541{
3542 BdrvOpBlocker *blocker;
3543 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3544 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
3545 blocker = QLIST_FIRST(&bs->op_blockers[op]);
3546 if (errp) {
81e5f78a
AG
3547 error_setg(errp, "Node '%s' is busy: %s",
3548 bdrv_get_device_or_node_name(bs),
bfb197e0 3549 error_get_pretty(blocker->reason));
fbe40ff7
FZ
3550 }
3551 return true;
3552 }
3553 return false;
3554}
3555
3556void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
3557{
3558 BdrvOpBlocker *blocker;
3559 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3560
5839e53b 3561 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
3562 blocker->reason = reason;
3563 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
3564}
3565
3566void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
3567{
3568 BdrvOpBlocker *blocker, *next;
3569 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3570 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
3571 if (blocker->reason == reason) {
3572 QLIST_REMOVE(blocker, list);
3573 g_free(blocker);
3574 }
3575 }
3576}
3577
3578void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
3579{
3580 int i;
3581 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3582 bdrv_op_block(bs, i, reason);
3583 }
3584}
3585
3586void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
3587{
3588 int i;
3589 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3590 bdrv_op_unblock(bs, i, reason);
3591 }
3592}
3593
3594bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
3595{
3596 int i;
3597
3598 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3599 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
3600 return false;
3601 }
3602 }
3603 return true;
3604}
3605
28a7282a
LC
3606void bdrv_iostatus_enable(BlockDriverState *bs)
3607{
d6bf279e 3608 bs->iostatus_enabled = true;
58e21ef5 3609 bs->iostatus = BLOCK_DEVICE_IO_STATUS_OK;
28a7282a
LC
3610}
3611
3612/* The I/O status is only enabled if the drive explicitly
3613 * enables it _and_ the VM is configured to stop on errors */
3614bool bdrv_iostatus_is_enabled(const BlockDriverState *bs)
3615{
d6bf279e 3616 return (bs->iostatus_enabled &&
92aa5c6d
PB
3617 (bs->on_write_error == BLOCKDEV_ON_ERROR_ENOSPC ||
3618 bs->on_write_error == BLOCKDEV_ON_ERROR_STOP ||
3619 bs->on_read_error == BLOCKDEV_ON_ERROR_STOP));
28a7282a
LC
3620}
3621
3622void bdrv_iostatus_disable(BlockDriverState *bs)
3623{
d6bf279e 3624 bs->iostatus_enabled = false;
28a7282a
LC
3625}
3626
3627void bdrv_iostatus_reset(BlockDriverState *bs)
3628{
3629 if (bdrv_iostatus_is_enabled(bs)) {
58e21ef5 3630 bs->iostatus = BLOCK_DEVICE_IO_STATUS_OK;
3bd293c3
PB
3631 if (bs->job) {
3632 block_job_iostatus_reset(bs->job);
3633 }
28a7282a
LC
3634 }
3635}
3636
28a7282a
LC
3637void bdrv_iostatus_set_err(BlockDriverState *bs, int error)
3638{
3e1caa5f
PB
3639 assert(bdrv_iostatus_is_enabled(bs));
3640 if (bs->iostatus == BLOCK_DEVICE_IO_STATUS_OK) {
58e21ef5
LC
3641 bs->iostatus = error == ENOSPC ? BLOCK_DEVICE_IO_STATUS_NOSPACE :
3642 BLOCK_DEVICE_IO_STATUS_FAILED;
28a7282a
LC
3643 }
3644}
3645
d92ada22
LC
3646void bdrv_img_create(const char *filename, const char *fmt,
3647 const char *base_filename, const char *base_fmt,
f382d43a
MR
3648 char *options, uint64_t img_size, int flags,
3649 Error **errp, bool quiet)
f88e1a42 3650{
83d0521a
CL
3651 QemuOptsList *create_opts = NULL;
3652 QemuOpts *opts = NULL;
3653 const char *backing_fmt, *backing_file;
3654 int64_t size;
f88e1a42 3655 BlockDriver *drv, *proto_drv;
cc84d90f 3656 Error *local_err = NULL;
f88e1a42
JS
3657 int ret = 0;
3658
3659 /* Find driver and parse its options */
3660 drv = bdrv_find_format(fmt);
3661 if (!drv) {
71c79813 3662 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 3663 return;
f88e1a42
JS
3664 }
3665
b65a5e12 3666 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 3667 if (!proto_drv) {
d92ada22 3668 return;
f88e1a42
JS
3669 }
3670
c6149724
HR
3671 if (!drv->create_opts) {
3672 error_setg(errp, "Format driver '%s' does not support image creation",
3673 drv->format_name);
3674 return;
3675 }
3676
3677 if (!proto_drv->create_opts) {
3678 error_setg(errp, "Protocol driver '%s' does not support image creation",
3679 proto_drv->format_name);
3680 return;
3681 }
3682
c282e1fd
CL
3683 create_opts = qemu_opts_append(create_opts, drv->create_opts);
3684 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
3685
3686 /* Create parameter list with default values */
83d0521a 3687 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 3688 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
3689
3690 /* Parse -o options */
3691 if (options) {
dc523cd3
MA
3692 qemu_opts_do_parse(opts, options, NULL, &local_err);
3693 if (local_err) {
3694 error_report_err(local_err);
3695 local_err = NULL;
83d0521a 3696 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
3697 goto out;
3698 }
3699 }
3700
3701 if (base_filename) {
f43e47db 3702 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 3703 if (local_err) {
71c79813
LC
3704 error_setg(errp, "Backing file not supported for file format '%s'",
3705 fmt);
f88e1a42
JS
3706 goto out;
3707 }
3708 }
3709
3710 if (base_fmt) {
f43e47db 3711 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 3712 if (local_err) {
71c79813
LC
3713 error_setg(errp, "Backing file format not supported for file "
3714 "format '%s'", fmt);
f88e1a42
JS
3715 goto out;
3716 }
3717 }
3718
83d0521a
CL
3719 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
3720 if (backing_file) {
3721 if (!strcmp(filename, backing_file)) {
71c79813
LC
3722 error_setg(errp, "Error: Trying to create an image with the "
3723 "same filename as the backing file");
792da93a
JS
3724 goto out;
3725 }
3726 }
3727
83d0521a 3728 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42
JS
3729
3730 // The size for the image must always be specified, with one exception:
3731 // If we are using a backing file, we can obtain the size from there
83d0521a
CL
3732 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
3733 if (size == -1) {
3734 if (backing_file) {
66f6b814 3735 BlockDriverState *bs;
29168018 3736 char *full_backing = g_new0(char, PATH_MAX);
52bf1e72 3737 int64_t size;
63090dac 3738 int back_flags;
e6641719 3739 QDict *backing_options = NULL;
63090dac 3740
29168018
HR
3741 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
3742 full_backing, PATH_MAX,
3743 &local_err);
3744 if (local_err) {
3745 g_free(full_backing);
3746 goto out;
3747 }
3748
63090dac
PB
3749 /* backing files always opened read-only */
3750 back_flags =
3751 flags & ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 3752
e6641719
HR
3753 if (backing_fmt) {
3754 backing_options = qdict_new();
3755 qdict_put(backing_options, "driver",
3756 qstring_from_str(backing_fmt));
3757 }
3758
f67503e5 3759 bs = NULL;
e6641719 3760 ret = bdrv_open(&bs, full_backing, NULL, backing_options,
6ebf9aa2 3761 back_flags, &local_err);
29168018 3762 g_free(full_backing);
f88e1a42 3763 if (ret < 0) {
f88e1a42
JS
3764 goto out;
3765 }
52bf1e72
MA
3766 size = bdrv_getlength(bs);
3767 if (size < 0) {
3768 error_setg_errno(errp, -size, "Could not get size of '%s'",
3769 backing_file);
3770 bdrv_unref(bs);
3771 goto out;
3772 }
f88e1a42 3773
39101f25 3774 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
66f6b814
HR
3775
3776 bdrv_unref(bs);
f88e1a42 3777 } else {
71c79813 3778 error_setg(errp, "Image creation needs a size parameter");
f88e1a42
JS
3779 goto out;
3780 }
3781 }
3782
f382d43a 3783 if (!quiet) {
fe646693 3784 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 3785 qemu_opts_print(opts, " ");
f382d43a
MR
3786 puts("");
3787 }
83d0521a 3788
c282e1fd 3789 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 3790
cc84d90f
HR
3791 if (ret == -EFBIG) {
3792 /* This is generally a better message than whatever the driver would
3793 * deliver (especially because of the cluster_size_hint), since that
3794 * is most probably not much different from "image too large". */
3795 const char *cluster_size_hint = "";
83d0521a 3796 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 3797 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 3798 }
cc84d90f
HR
3799 error_setg(errp, "The image size is too large for file format '%s'"
3800 "%s", fmt, cluster_size_hint);
3801 error_free(local_err);
3802 local_err = NULL;
f88e1a42
JS
3803 }
3804
3805out:
83d0521a
CL
3806 qemu_opts_del(opts);
3807 qemu_opts_free(create_opts);
84d18f06 3808 if (local_err) {
cc84d90f
HR
3809 error_propagate(errp, local_err);
3810 }
f88e1a42 3811}
85d126f3
SH
3812
3813AioContext *bdrv_get_aio_context(BlockDriverState *bs)
3814{
dcd04228
SH
3815 return bs->aio_context;
3816}
3817
3818void bdrv_detach_aio_context(BlockDriverState *bs)
3819{
33384421
HR
3820 BdrvAioNotifier *baf;
3821
dcd04228
SH
3822 if (!bs->drv) {
3823 return;
3824 }
3825
33384421
HR
3826 QLIST_FOREACH(baf, &bs->aio_notifiers, list) {
3827 baf->detach_aio_context(baf->opaque);
3828 }
3829
13af91eb 3830 if (bs->io_limits_enabled) {
0e5b0a2d 3831 throttle_timers_detach_aio_context(&bs->throttle_timers);
13af91eb 3832 }
dcd04228
SH
3833 if (bs->drv->bdrv_detach_aio_context) {
3834 bs->drv->bdrv_detach_aio_context(bs);
3835 }
3836 if (bs->file) {
9a4f4c31 3837 bdrv_detach_aio_context(bs->file->bs);
dcd04228 3838 }
760e0063
KW
3839 if (bs->backing) {
3840 bdrv_detach_aio_context(bs->backing->bs);
dcd04228
SH
3841 }
3842
3843 bs->aio_context = NULL;
3844}
3845
3846void bdrv_attach_aio_context(BlockDriverState *bs,
3847 AioContext *new_context)
3848{
33384421
HR
3849 BdrvAioNotifier *ban;
3850
dcd04228
SH
3851 if (!bs->drv) {
3852 return;
3853 }
3854
3855 bs->aio_context = new_context;
3856
760e0063
KW
3857 if (bs->backing) {
3858 bdrv_attach_aio_context(bs->backing->bs, new_context);
dcd04228
SH
3859 }
3860 if (bs->file) {
9a4f4c31 3861 bdrv_attach_aio_context(bs->file->bs, new_context);
dcd04228
SH
3862 }
3863 if (bs->drv->bdrv_attach_aio_context) {
3864 bs->drv->bdrv_attach_aio_context(bs, new_context);
3865 }
13af91eb 3866 if (bs->io_limits_enabled) {
0e5b0a2d 3867 throttle_timers_attach_aio_context(&bs->throttle_timers, new_context);
13af91eb 3868 }
33384421
HR
3869
3870 QLIST_FOREACH(ban, &bs->aio_notifiers, list) {
3871 ban->attached_aio_context(new_context, ban->opaque);
3872 }
dcd04228
SH
3873}
3874
3875void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
3876{
53ec73e2 3877 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228
SH
3878
3879 bdrv_detach_aio_context(bs);
3880
3881 /* This function executes in the old AioContext so acquire the new one in
3882 * case it runs in a different thread.
3883 */
3884 aio_context_acquire(new_context);
3885 bdrv_attach_aio_context(bs, new_context);
3886 aio_context_release(new_context);
85d126f3 3887}
d616b224 3888
33384421
HR
3889void bdrv_add_aio_context_notifier(BlockDriverState *bs,
3890 void (*attached_aio_context)(AioContext *new_context, void *opaque),
3891 void (*detach_aio_context)(void *opaque), void *opaque)
3892{
3893 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
3894 *ban = (BdrvAioNotifier){
3895 .attached_aio_context = attached_aio_context,
3896 .detach_aio_context = detach_aio_context,
3897 .opaque = opaque
3898 };
3899
3900 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
3901}
3902
3903void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
3904 void (*attached_aio_context)(AioContext *,
3905 void *),
3906 void (*detach_aio_context)(void *),
3907 void *opaque)
3908{
3909 BdrvAioNotifier *ban, *ban_next;
3910
3911 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
3912 if (ban->attached_aio_context == attached_aio_context &&
3913 ban->detach_aio_context == detach_aio_context &&
3914 ban->opaque == opaque)
3915 {
3916 QLIST_REMOVE(ban, list);
3917 g_free(ban);
3918
3919 return;
3920 }
3921 }
3922
3923 abort();
3924}
3925
77485434
HR
3926int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
3927 BlockDriverAmendStatusCB *status_cb)
6f176b48 3928{
c282e1fd 3929 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
3930 return -ENOTSUP;
3931 }
77485434 3932 return bs->drv->bdrv_amend_options(bs, opts, status_cb);
6f176b48 3933}
f6186f49 3934
b5042a36
BC
3935/* This function will be called by the bdrv_recurse_is_first_non_filter method
3936 * of block filter and by bdrv_is_first_non_filter.
3937 * It is used to test if the given bs is the candidate or recurse more in the
3938 * node graph.
212a5a8f 3939 */
b5042a36 3940bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 3941 BlockDriverState *candidate)
f6186f49 3942{
b5042a36
BC
3943 /* return false if basic checks fails */
3944 if (!bs || !bs->drv) {
212a5a8f 3945 return false;
f6186f49
BC
3946 }
3947
b5042a36
BC
3948 /* the code reached a non block filter driver -> check if the bs is
3949 * the same as the candidate. It's the recursion termination condition.
3950 */
3951 if (!bs->drv->is_filter) {
3952 return bs == candidate;
212a5a8f 3953 }
b5042a36 3954 /* Down this path the driver is a block filter driver */
212a5a8f 3955
b5042a36
BC
3956 /* If the block filter recursion method is defined use it to recurse down
3957 * the node graph.
3958 */
3959 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 3960 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
3961 }
3962
b5042a36
BC
3963 /* the driver is a block filter but don't allow to recurse -> return false
3964 */
3965 return false;
f6186f49
BC
3966}
3967
212a5a8f
BC
3968/* This function checks if the candidate is the first non filter bs down it's
3969 * bs chain. Since we don't have pointers to parents it explore all bs chains
3970 * from the top. Some filters can choose not to pass down the recursion.
3971 */
3972bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 3973{
212a5a8f
BC
3974 BlockDriverState *bs;
3975
3976 /* walk down the bs forest recursively */
3977 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
3978 bool perm;
3979
b5042a36 3980 /* try to recurse in this top level bs */
e6dc8a1f 3981 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
3982
3983 /* candidate is the first non filter */
3984 if (perm) {
3985 return true;
3986 }
3987 }
3988
3989 return false;
f6186f49 3990}
09158f00 3991
e12f3784
WC
3992BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
3993 const char *node_name, Error **errp)
09158f00
BC
3994{
3995 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
3996 AioContext *aio_context;
3997
09158f00
BC
3998 if (!to_replace_bs) {
3999 error_setg(errp, "Node name '%s' not found", node_name);
4000 return NULL;
4001 }
4002
5a7e7a0b
SH
4003 aio_context = bdrv_get_aio_context(to_replace_bs);
4004 aio_context_acquire(aio_context);
4005
09158f00 4006 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
4007 to_replace_bs = NULL;
4008 goto out;
09158f00
BC
4009 }
4010
4011 /* We don't want arbitrary node of the BDS chain to be replaced only the top
4012 * most non filter in order to prevent data corruption.
4013 * Another benefit is that this tests exclude backing files which are
4014 * blocked by the backing blockers.
4015 */
e12f3784 4016 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 4017 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
4018 to_replace_bs = NULL;
4019 goto out;
09158f00
BC
4020 }
4021
5a7e7a0b
SH
4022out:
4023 aio_context_release(aio_context);
09158f00
BC
4024 return to_replace_bs;
4025}
448ad91d 4026
91af7014
HR
4027static bool append_open_options(QDict *d, BlockDriverState *bs)
4028{
4029 const QDictEntry *entry;
4030 bool found_any = false;
4031
4032 for (entry = qdict_first(bs->options); entry;
4033 entry = qdict_next(bs->options, entry))
4034 {
4035 /* Only take options for this level and exclude all non-driver-specific
4036 * options */
4037 if (!strchr(qdict_entry_key(entry), '.') &&
4038 strcmp(qdict_entry_key(entry), "node-name"))
4039 {
4040 qobject_incref(qdict_entry_value(entry));
4041 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
4042 found_any = true;
4043 }
4044 }
4045
4046 return found_any;
4047}
4048
4049/* Updates the following BDS fields:
4050 * - exact_filename: A filename which may be used for opening a block device
4051 * which (mostly) equals the given BDS (even without any
4052 * other options; so reading and writing must return the same
4053 * results, but caching etc. may be different)
4054 * - full_open_options: Options which, when given when opening a block device
4055 * (without a filename), result in a BDS (mostly)
4056 * equalling the given one
4057 * - filename: If exact_filename is set, it is copied here. Otherwise,
4058 * full_open_options is converted to a JSON object, prefixed with
4059 * "json:" (for use through the JSON pseudo protocol) and put here.
4060 */
4061void bdrv_refresh_filename(BlockDriverState *bs)
4062{
4063 BlockDriver *drv = bs->drv;
4064 QDict *opts;
4065
4066 if (!drv) {
4067 return;
4068 }
4069
4070 /* This BDS's file name will most probably depend on its file's name, so
4071 * refresh that first */
4072 if (bs->file) {
9a4f4c31 4073 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
4074 }
4075
4076 if (drv->bdrv_refresh_filename) {
4077 /* Obsolete information is of no use here, so drop the old file name
4078 * information before refreshing it */
4079 bs->exact_filename[0] = '\0';
4080 if (bs->full_open_options) {
4081 QDECREF(bs->full_open_options);
4082 bs->full_open_options = NULL;
4083 }
4084
4085 drv->bdrv_refresh_filename(bs);
4086 } else if (bs->file) {
4087 /* Try to reconstruct valid information from the underlying file */
4088 bool has_open_options;
4089
4090 bs->exact_filename[0] = '\0';
4091 if (bs->full_open_options) {
4092 QDECREF(bs->full_open_options);
4093 bs->full_open_options = NULL;
4094 }
4095
4096 opts = qdict_new();
4097 has_open_options = append_open_options(opts, bs);
4098
4099 /* If no specific options have been given for this BDS, the filename of
4100 * the underlying file should suffice for this one as well */
9a4f4c31
KW
4101 if (bs->file->bs->exact_filename[0] && !has_open_options) {
4102 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
4103 }
4104 /* Reconstructing the full options QDict is simple for most format block
4105 * drivers, as long as the full options are known for the underlying
4106 * file BDS. The full options QDict of that file BDS should somehow
4107 * contain a representation of the filename, therefore the following
4108 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 4109 if (bs->file->bs->full_open_options) {
91af7014
HR
4110 qdict_put_obj(opts, "driver",
4111 QOBJECT(qstring_from_str(drv->format_name)));
9a4f4c31
KW
4112 QINCREF(bs->file->bs->full_open_options);
4113 qdict_put_obj(opts, "file",
4114 QOBJECT(bs->file->bs->full_open_options));
91af7014
HR
4115
4116 bs->full_open_options = opts;
4117 } else {
4118 QDECREF(opts);
4119 }
4120 } else if (!bs->full_open_options && qdict_size(bs->options)) {
4121 /* There is no underlying file BDS (at least referenced by BDS.file),
4122 * so the full options QDict should be equal to the options given
4123 * specifically for this block device when it was opened (plus the
4124 * driver specification).
4125 * Because those options don't change, there is no need to update
4126 * full_open_options when it's already set. */
4127
4128 opts = qdict_new();
4129 append_open_options(opts, bs);
4130 qdict_put_obj(opts, "driver",
4131 QOBJECT(qstring_from_str(drv->format_name)));
4132
4133 if (bs->exact_filename[0]) {
4134 /* This may not work for all block protocol drivers (some may
4135 * require this filename to be parsed), but we have to find some
4136 * default solution here, so just include it. If some block driver
4137 * does not support pure options without any filename at all or
4138 * needs some special format of the options QDict, it needs to
4139 * implement the driver-specific bdrv_refresh_filename() function.
4140 */
4141 qdict_put_obj(opts, "filename",
4142 QOBJECT(qstring_from_str(bs->exact_filename)));
4143 }
4144
4145 bs->full_open_options = opts;
4146 }
4147
4148 if (bs->exact_filename[0]) {
4149 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4150 } else if (bs->full_open_options) {
4151 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4152 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4153 qstring_get_str(json));
4154 QDECREF(json);
4155 }
4156}
5366d0c8
BC
4157
4158/* This accessor function purpose is to allow the device models to access the
4159 * BlockAcctStats structure embedded inside a BlockDriverState without being
4160 * aware of the BlockDriverState structure layout.
4161 * It will go away when the BlockAcctStats structure will be moved inside
4162 * the device models.
4163 */
4164BlockAcctStats *bdrv_get_stats(BlockDriverState *bs)
4165{
4166 return &bs->stats;
4167}