]> Git Repo - qemu.git/blame - block.c
docker: Add a glib2-2.22 image
[qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
d38ea87a 24#include "qemu/osdep.h"
6d519a5f 25#include "trace.h"
737e150e
PB
26#include "block/block_int.h"
27#include "block/blockjob.h"
cd7fca95 28#include "block/nbd.h"
d49b6836 29#include "qemu/error-report.h"
1de7afc9 30#include "qemu/module.h"
cc7a8ea7 31#include "qapi/qmp/qerror.h"
91a097e7 32#include "qapi/qmp/qbool.h"
7b1b5d19 33#include "qapi/qmp/qjson.h"
bfb197e0 34#include "sysemu/block-backend.h"
9c17d615 35#include "sysemu/sysemu.h"
1de7afc9 36#include "qemu/notify.h"
10817bf0 37#include "qemu/coroutine.h"
c13163fb 38#include "block/qapi.h"
b2023818 39#include "qmp-commands.h"
1de7afc9 40#include "qemu/timer.h"
a5ee7bd4 41#include "qapi-event.h"
f348b6d1
VB
42#include "qemu/cutils.h"
43#include "qemu/id.h"
fc01f7e7 44
71e72a19 45#ifdef CONFIG_BSD
7674e7bf 46#include <sys/ioctl.h>
72cf2d4f 47#include <sys/queue.h>
c5e97233 48#ifndef __DragonFly__
7674e7bf
FB
49#include <sys/disk.h>
50#endif
c5e97233 51#endif
7674e7bf 52
49dc768d
AL
53#ifdef _WIN32
54#include <windows.h>
55#endif
56
1c9805a3
SH
57#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
58
dc364f4c
BC
59static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
60 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
61
2c1d04e0
HR
62static QTAILQ_HEAD(, BlockDriverState) all_bdrv_states =
63 QTAILQ_HEAD_INITIALIZER(all_bdrv_states);
64
8a22f02a
SH
65static QLIST_HEAD(, BlockDriver) bdrv_drivers =
66 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 67
5b363937
HR
68static BlockDriverState *bdrv_open_inherit(const char *filename,
69 const char *reference,
70 QDict *options, int flags,
71 BlockDriverState *parent,
72 const BdrvChildRole *child_role,
73 Error **errp);
f3930ed0 74
eb852011
MA
75/* If non-zero, use only whitelisted block drivers */
76static int use_bdrv_whitelist;
77
9e0b22f4
SH
78#ifdef _WIN32
79static int is_windows_drive_prefix(const char *filename)
80{
81 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
82 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
83 filename[1] == ':');
84}
85
86int is_windows_drive(const char *filename)
87{
88 if (is_windows_drive_prefix(filename) &&
89 filename[2] == '\0')
90 return 1;
91 if (strstart(filename, "\\\\.\\", NULL) ||
92 strstart(filename, "//./", NULL))
93 return 1;
94 return 0;
95}
96#endif
97
339064d5
KW
98size_t bdrv_opt_mem_align(BlockDriverState *bs)
99{
100 if (!bs || !bs->drv) {
459b4e66
DL
101 /* page size or 4k (hdd sector size) should be on the safe side */
102 return MAX(4096, getpagesize());
339064d5
KW
103 }
104
105 return bs->bl.opt_mem_alignment;
106}
107
4196d2f0
DL
108size_t bdrv_min_mem_align(BlockDriverState *bs)
109{
110 if (!bs || !bs->drv) {
459b4e66
DL
111 /* page size or 4k (hdd sector size) should be on the safe side */
112 return MAX(4096, getpagesize());
4196d2f0
DL
113 }
114
115 return bs->bl.min_mem_alignment;
116}
117
9e0b22f4 118/* check if the path starts with "<protocol>:" */
5c98415b 119int path_has_protocol(const char *path)
9e0b22f4 120{
947995c0
PB
121 const char *p;
122
9e0b22f4
SH
123#ifdef _WIN32
124 if (is_windows_drive(path) ||
125 is_windows_drive_prefix(path)) {
126 return 0;
127 }
947995c0
PB
128 p = path + strcspn(path, ":/\\");
129#else
130 p = path + strcspn(path, ":/");
9e0b22f4
SH
131#endif
132
947995c0 133 return *p == ':';
9e0b22f4
SH
134}
135
83f64091 136int path_is_absolute(const char *path)
3b0d4f61 137{
21664424
FB
138#ifdef _WIN32
139 /* specific case for names like: "\\.\d:" */
f53f4da9 140 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 141 return 1;
f53f4da9
PB
142 }
143 return (*path == '/' || *path == '\\');
3b9f94e1 144#else
f53f4da9 145 return (*path == '/');
3b9f94e1 146#endif
3b0d4f61
FB
147}
148
83f64091
FB
149/* if filename is absolute, just copy it to dest. Otherwise, build a
150 path to it by considering it is relative to base_path. URL are
151 supported. */
152void path_combine(char *dest, int dest_size,
153 const char *base_path,
154 const char *filename)
3b0d4f61 155{
83f64091
FB
156 const char *p, *p1;
157 int len;
158
159 if (dest_size <= 0)
160 return;
161 if (path_is_absolute(filename)) {
162 pstrcpy(dest, dest_size, filename);
163 } else {
164 p = strchr(base_path, ':');
165 if (p)
166 p++;
167 else
168 p = base_path;
3b9f94e1
FB
169 p1 = strrchr(base_path, '/');
170#ifdef _WIN32
171 {
172 const char *p2;
173 p2 = strrchr(base_path, '\\');
174 if (!p1 || p2 > p1)
175 p1 = p2;
176 }
177#endif
83f64091
FB
178 if (p1)
179 p1++;
180 else
181 p1 = base_path;
182 if (p1 > p)
183 p = p1;
184 len = p - base_path;
185 if (len > dest_size - 1)
186 len = dest_size - 1;
187 memcpy(dest, base_path, len);
188 dest[len] = '\0';
189 pstrcat(dest, dest_size, filename);
3b0d4f61 190 }
3b0d4f61
FB
191}
192
0a82855a
HR
193void bdrv_get_full_backing_filename_from_filename(const char *backed,
194 const char *backing,
9f07429e
HR
195 char *dest, size_t sz,
196 Error **errp)
dc5a1371 197{
9f07429e
HR
198 if (backing[0] == '\0' || path_has_protocol(backing) ||
199 path_is_absolute(backing))
200 {
0a82855a 201 pstrcpy(dest, sz, backing);
9f07429e
HR
202 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
203 error_setg(errp, "Cannot use relative backing file names for '%s'",
204 backed);
dc5a1371 205 } else {
0a82855a 206 path_combine(dest, sz, backed, backing);
dc5a1371
PB
207 }
208}
209
9f07429e
HR
210void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
211 Error **errp)
0a82855a 212{
9f07429e
HR
213 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
214
215 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
216 dest, sz, errp);
0a82855a
HR
217}
218
0eb7217e
SH
219void bdrv_register(BlockDriver *bdrv)
220{
8a22f02a 221 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 222}
b338082b 223
e4e9986b
MA
224BlockDriverState *bdrv_new(void)
225{
226 BlockDriverState *bs;
227 int i;
228
5839e53b 229 bs = g_new0(BlockDriverState, 1);
e4654d2d 230 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
231 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
232 QLIST_INIT(&bs->op_blockers[i]);
233 }
d616b224 234 notifier_with_return_list_init(&bs->before_write_notifiers);
9fcb0251 235 bs->refcnt = 1;
dcd04228 236 bs->aio_context = qemu_get_aio_context();
d7d512f6 237
3ff2f67a
EY
238 qemu_co_queue_init(&bs->flush_queue);
239
2c1d04e0
HR
240 QTAILQ_INSERT_TAIL(&all_bdrv_states, bs, bs_list);
241
b338082b
FB
242 return bs;
243}
244
ea2384d3
FB
245BlockDriver *bdrv_find_format(const char *format_name)
246{
247 BlockDriver *drv1;
8a22f02a
SH
248 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
249 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 250 return drv1;
8a22f02a 251 }
ea2384d3
FB
252 }
253 return NULL;
254}
255
b64ec4e4 256static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 257{
b64ec4e4
FZ
258 static const char *whitelist_rw[] = {
259 CONFIG_BDRV_RW_WHITELIST
260 };
261 static const char *whitelist_ro[] = {
262 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
263 };
264 const char **p;
265
b64ec4e4 266 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 267 return 1; /* no whitelist, anything goes */
b64ec4e4 268 }
eb852011 269
b64ec4e4 270 for (p = whitelist_rw; *p; p++) {
eb852011
MA
271 if (!strcmp(drv->format_name, *p)) {
272 return 1;
273 }
274 }
b64ec4e4
FZ
275 if (read_only) {
276 for (p = whitelist_ro; *p; p++) {
277 if (!strcmp(drv->format_name, *p)) {
278 return 1;
279 }
280 }
281 }
eb852011
MA
282 return 0;
283}
284
e6ff69bf
DB
285bool bdrv_uses_whitelist(void)
286{
287 return use_bdrv_whitelist;
288}
289
5b7e1542
ZYW
290typedef struct CreateCo {
291 BlockDriver *drv;
292 char *filename;
83d0521a 293 QemuOpts *opts;
5b7e1542 294 int ret;
cc84d90f 295 Error *err;
5b7e1542
ZYW
296} CreateCo;
297
298static void coroutine_fn bdrv_create_co_entry(void *opaque)
299{
cc84d90f
HR
300 Error *local_err = NULL;
301 int ret;
302
5b7e1542
ZYW
303 CreateCo *cco = opaque;
304 assert(cco->drv);
305
c282e1fd 306 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
621ff94d 307 error_propagate(&cco->err, local_err);
cc84d90f 308 cco->ret = ret;
5b7e1542
ZYW
309}
310
0e7e1989 311int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 312 QemuOpts *opts, Error **errp)
ea2384d3 313{
5b7e1542
ZYW
314 int ret;
315
316 Coroutine *co;
317 CreateCo cco = {
318 .drv = drv,
319 .filename = g_strdup(filename),
83d0521a 320 .opts = opts,
5b7e1542 321 .ret = NOT_DONE,
cc84d90f 322 .err = NULL,
5b7e1542
ZYW
323 };
324
c282e1fd 325 if (!drv->bdrv_create) {
cc84d90f 326 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
327 ret = -ENOTSUP;
328 goto out;
5b7e1542
ZYW
329 }
330
331 if (qemu_in_coroutine()) {
332 /* Fast-path if already in coroutine context */
333 bdrv_create_co_entry(&cco);
334 } else {
0b8b8753
PB
335 co = qemu_coroutine_create(bdrv_create_co_entry, &cco);
336 qemu_coroutine_enter(co);
5b7e1542 337 while (cco.ret == NOT_DONE) {
b47ec2c4 338 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
339 }
340 }
341
342 ret = cco.ret;
cc84d90f 343 if (ret < 0) {
84d18f06 344 if (cco.err) {
cc84d90f
HR
345 error_propagate(errp, cco.err);
346 } else {
347 error_setg_errno(errp, -ret, "Could not create image");
348 }
349 }
0e7e1989 350
80168bff
LC
351out:
352 g_free(cco.filename);
5b7e1542 353 return ret;
ea2384d3
FB
354}
355
c282e1fd 356int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
357{
358 BlockDriver *drv;
cc84d90f
HR
359 Error *local_err = NULL;
360 int ret;
84a12e66 361
b65a5e12 362 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 363 if (drv == NULL) {
16905d71 364 return -ENOENT;
84a12e66
CH
365 }
366
c282e1fd 367 ret = bdrv_create(drv, filename, opts, &local_err);
621ff94d 368 error_propagate(errp, local_err);
cc84d90f 369 return ret;
84a12e66
CH
370}
371
892b7de8
ET
372/**
373 * Try to get @bs's logical and physical block size.
374 * On success, store them in @bsz struct and return 0.
375 * On failure return -errno.
376 * @bs must not be empty.
377 */
378int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
379{
380 BlockDriver *drv = bs->drv;
381
382 if (drv && drv->bdrv_probe_blocksizes) {
383 return drv->bdrv_probe_blocksizes(bs, bsz);
384 }
385
386 return -ENOTSUP;
387}
388
389/**
390 * Try to get @bs's geometry (cyls, heads, sectors).
391 * On success, store them in @geo struct and return 0.
392 * On failure return -errno.
393 * @bs must not be empty.
394 */
395int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
396{
397 BlockDriver *drv = bs->drv;
398
399 if (drv && drv->bdrv_probe_geometry) {
400 return drv->bdrv_probe_geometry(bs, geo);
401 }
402
403 return -ENOTSUP;
404}
405
eba25057
JM
406/*
407 * Create a uniquely-named empty temporary file.
408 * Return 0 upon success, otherwise a negative errno value.
409 */
410int get_tmp_filename(char *filename, int size)
d5249393 411{
eba25057 412#ifdef _WIN32
3b9f94e1 413 char temp_dir[MAX_PATH];
eba25057
JM
414 /* GetTempFileName requires that its output buffer (4th param)
415 have length MAX_PATH or greater. */
416 assert(size >= MAX_PATH);
417 return (GetTempPath(MAX_PATH, temp_dir)
418 && GetTempFileName(temp_dir, "qem", 0, filename)
419 ? 0 : -GetLastError());
d5249393 420#else
67b915a5 421 int fd;
7ccfb2eb 422 const char *tmpdir;
0badc1ee 423 tmpdir = getenv("TMPDIR");
69bef793
AS
424 if (!tmpdir) {
425 tmpdir = "/var/tmp";
426 }
eba25057
JM
427 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
428 return -EOVERFLOW;
429 }
ea2384d3 430 fd = mkstemp(filename);
fe235a06
DH
431 if (fd < 0) {
432 return -errno;
433 }
434 if (close(fd) != 0) {
435 unlink(filename);
eba25057
JM
436 return -errno;
437 }
438 return 0;
d5249393 439#endif
eba25057 440}
fc01f7e7 441
84a12e66
CH
442/*
443 * Detect host devices. By convention, /dev/cdrom[N] is always
444 * recognized as a host CDROM.
445 */
446static BlockDriver *find_hdev_driver(const char *filename)
447{
448 int score_max = 0, score;
449 BlockDriver *drv = NULL, *d;
450
451 QLIST_FOREACH(d, &bdrv_drivers, list) {
452 if (d->bdrv_probe_device) {
453 score = d->bdrv_probe_device(filename);
454 if (score > score_max) {
455 score_max = score;
456 drv = d;
457 }
458 }
459 }
460
461 return drv;
462}
463
98289620 464BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
465 bool allow_protocol_prefix,
466 Error **errp)
83f64091
FB
467{
468 BlockDriver *drv1;
469 char protocol[128];
1cec71e3 470 int len;
83f64091 471 const char *p;
19cb3738 472
66f82cee
KW
473 /* TODO Drivers without bdrv_file_open must be specified explicitly */
474
39508e7a
CH
475 /*
476 * XXX(hch): we really should not let host device detection
477 * override an explicit protocol specification, but moving this
478 * later breaks access to device names with colons in them.
479 * Thanks to the brain-dead persistent naming schemes on udev-
480 * based Linux systems those actually are quite common.
481 */
482 drv1 = find_hdev_driver(filename);
483 if (drv1) {
484 return drv1;
485 }
486
98289620 487 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 488 return &bdrv_file;
84a12e66 489 }
98289620 490
9e0b22f4
SH
491 p = strchr(filename, ':');
492 assert(p != NULL);
1cec71e3
AL
493 len = p - filename;
494 if (len > sizeof(protocol) - 1)
495 len = sizeof(protocol) - 1;
496 memcpy(protocol, filename, len);
497 protocol[len] = '\0';
8a22f02a 498 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
5fafdf24 499 if (drv1->protocol_name &&
8a22f02a 500 !strcmp(drv1->protocol_name, protocol)) {
83f64091 501 return drv1;
8a22f02a 502 }
83f64091 503 }
b65a5e12
HR
504
505 error_setg(errp, "Unknown protocol '%s'", protocol);
83f64091
FB
506 return NULL;
507}
508
c6684249
MA
509/*
510 * Guess image format by probing its contents.
511 * This is not a good idea when your image is raw (CVE-2008-2004), but
512 * we do it anyway for backward compatibility.
513 *
514 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
515 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
516 * but can be smaller if the image file is smaller)
c6684249
MA
517 * @filename is its filename.
518 *
519 * For all block drivers, call the bdrv_probe() method to get its
520 * probing score.
521 * Return the first block driver with the highest probing score.
522 */
38f3ef57
KW
523BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
524 const char *filename)
c6684249
MA
525{
526 int score_max = 0, score;
527 BlockDriver *drv = NULL, *d;
528
529 QLIST_FOREACH(d, &bdrv_drivers, list) {
530 if (d->bdrv_probe) {
531 score = d->bdrv_probe(buf, buf_size, filename);
532 if (score > score_max) {
533 score_max = score;
534 drv = d;
535 }
536 }
537 }
538
539 return drv;
540}
541
cf2ab8fc 542static int find_image_format(BdrvChild *file, const char *filename,
34b5d2c6 543 BlockDriver **pdrv, Error **errp)
f3a5d3f8 544{
cf2ab8fc 545 BlockDriverState *bs = file->bs;
c6684249 546 BlockDriver *drv;
7cddd372 547 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 548 int ret = 0;
f8ea0b00 549
08a00559 550 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
b192af8a 551 if (bdrv_is_sg(bs) || !bdrv_is_inserted(bs) || bdrv_getlength(bs) == 0) {
ef810437 552 *pdrv = &bdrv_raw;
c98ac35d 553 return ret;
1a396859 554 }
f8ea0b00 555
cf2ab8fc 556 ret = bdrv_pread(file, 0, buf, sizeof(buf));
83f64091 557 if (ret < 0) {
34b5d2c6
HR
558 error_setg_errno(errp, -ret, "Could not read image for determining its "
559 "format");
c98ac35d
SW
560 *pdrv = NULL;
561 return ret;
83f64091
FB
562 }
563
c6684249 564 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 565 if (!drv) {
34b5d2c6
HR
566 error_setg(errp, "Could not determine image format: No compatible "
567 "driver found");
c98ac35d
SW
568 ret = -ENOENT;
569 }
570 *pdrv = drv;
571 return ret;
ea2384d3
FB
572}
573
51762288
SH
574/**
575 * Set the current 'total_sectors' value
65a9bb25 576 * Return 0 on success, -errno on error.
51762288
SH
577 */
578static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
579{
580 BlockDriver *drv = bs->drv;
581
396759ad 582 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 583 if (bdrv_is_sg(bs))
396759ad
NB
584 return 0;
585
51762288
SH
586 /* query actual device if possible, otherwise just trust the hint */
587 if (drv->bdrv_getlength) {
588 int64_t length = drv->bdrv_getlength(bs);
589 if (length < 0) {
590 return length;
591 }
7e382003 592 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
593 }
594
595 bs->total_sectors = hint;
596 return 0;
597}
598
cddff5ba
KW
599/**
600 * Combines a QDict of new block driver @options with any missing options taken
601 * from @old_options, so that leaving out an option defaults to its old value.
602 */
603static void bdrv_join_options(BlockDriverState *bs, QDict *options,
604 QDict *old_options)
605{
606 if (bs->drv && bs->drv->bdrv_join_options) {
607 bs->drv->bdrv_join_options(options, old_options);
608 } else {
609 qdict_join(options, old_options, false);
610 }
611}
612
9e8f1835
PB
613/**
614 * Set open flags for a given discard mode
615 *
616 * Return 0 on success, -1 if the discard mode was invalid.
617 */
618int bdrv_parse_discard_flags(const char *mode, int *flags)
619{
620 *flags &= ~BDRV_O_UNMAP;
621
622 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
623 /* do nothing */
624 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
625 *flags |= BDRV_O_UNMAP;
626 } else {
627 return -1;
628 }
629
630 return 0;
631}
632
c3993cdc
SH
633/**
634 * Set open flags for a given cache mode
635 *
636 * Return 0 on success, -1 if the cache mode was invalid.
637 */
53e8ae01 638int bdrv_parse_cache_mode(const char *mode, int *flags, bool *writethrough)
c3993cdc
SH
639{
640 *flags &= ~BDRV_O_CACHE_MASK;
641
642 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
53e8ae01
KW
643 *writethrough = false;
644 *flags |= BDRV_O_NOCACHE;
92196b2f 645 } else if (!strcmp(mode, "directsync")) {
53e8ae01 646 *writethrough = true;
92196b2f 647 *flags |= BDRV_O_NOCACHE;
c3993cdc 648 } else if (!strcmp(mode, "writeback")) {
53e8ae01 649 *writethrough = false;
c3993cdc 650 } else if (!strcmp(mode, "unsafe")) {
53e8ae01 651 *writethrough = false;
c3993cdc
SH
652 *flags |= BDRV_O_NO_FLUSH;
653 } else if (!strcmp(mode, "writethrough")) {
53e8ae01 654 *writethrough = true;
c3993cdc
SH
655 } else {
656 return -1;
657 }
658
659 return 0;
660}
661
20018e12
KW
662static void bdrv_child_cb_drained_begin(BdrvChild *child)
663{
664 BlockDriverState *bs = child->opaque;
665 bdrv_drained_begin(bs);
666}
667
668static void bdrv_child_cb_drained_end(BdrvChild *child)
669{
670 BlockDriverState *bs = child->opaque;
671 bdrv_drained_end(bs);
672}
673
b1e6fc08 674/*
73176bee
KW
675 * Returns the options and flags that a temporary snapshot should get, based on
676 * the originally requested flags (the originally requested image will have
677 * flags like a backing file)
b1e6fc08 678 */
73176bee
KW
679static void bdrv_temp_snapshot_options(int *child_flags, QDict *child_options,
680 int parent_flags, QDict *parent_options)
b1e6fc08 681{
73176bee
KW
682 *child_flags = (parent_flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
683
684 /* For temporary files, unconditional cache=unsafe is fine */
73176bee
KW
685 qdict_set_default_str(child_options, BDRV_OPT_CACHE_DIRECT, "off");
686 qdict_set_default_str(child_options, BDRV_OPT_CACHE_NO_FLUSH, "on");
41869044
KW
687
688 /* aio=native doesn't work for cache.direct=off, so disable it for the
689 * temporary snapshot */
690 *child_flags &= ~BDRV_O_NATIVE_AIO;
b1e6fc08
KW
691}
692
0b50cc88 693/*
8e2160e2
KW
694 * Returns the options and flags that bs->file should get if a protocol driver
695 * is expected, based on the given options and flags for the parent BDS
0b50cc88 696 */
8e2160e2
KW
697static void bdrv_inherited_options(int *child_flags, QDict *child_options,
698 int parent_flags, QDict *parent_options)
0b50cc88 699{
8e2160e2
KW
700 int flags = parent_flags;
701
0b50cc88
KW
702 /* Enable protocol handling, disable format probing for bs->file */
703 flags |= BDRV_O_PROTOCOL;
704
91a097e7
KW
705 /* If the cache mode isn't explicitly set, inherit direct and no-flush from
706 * the parent. */
707 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
708 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
709
0b50cc88 710 /* Our block drivers take care to send flushes and respect unmap policy,
91a097e7
KW
711 * so we can default to enable both on lower layers regardless of the
712 * corresponding parent options. */
91a097e7 713 flags |= BDRV_O_UNMAP;
0b50cc88 714
0b50cc88 715 /* Clear flags that only apply to the top layer */
abb06c5a
DB
716 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ |
717 BDRV_O_NO_IO);
0b50cc88 718
8e2160e2 719 *child_flags = flags;
0b50cc88
KW
720}
721
f3930ed0 722const BdrvChildRole child_file = {
8e2160e2 723 .inherit_options = bdrv_inherited_options,
20018e12
KW
724 .drained_begin = bdrv_child_cb_drained_begin,
725 .drained_end = bdrv_child_cb_drained_end,
f3930ed0
KW
726};
727
728/*
8e2160e2
KW
729 * Returns the options and flags that bs->file should get if the use of formats
730 * (and not only protocols) is permitted for it, based on the given options and
731 * flags for the parent BDS
f3930ed0 732 */
8e2160e2
KW
733static void bdrv_inherited_fmt_options(int *child_flags, QDict *child_options,
734 int parent_flags, QDict *parent_options)
f3930ed0 735{
8e2160e2
KW
736 child_file.inherit_options(child_flags, child_options,
737 parent_flags, parent_options);
738
abb06c5a 739 *child_flags &= ~(BDRV_O_PROTOCOL | BDRV_O_NO_IO);
f3930ed0
KW
740}
741
742const BdrvChildRole child_format = {
8e2160e2 743 .inherit_options = bdrv_inherited_fmt_options,
20018e12
KW
744 .drained_begin = bdrv_child_cb_drained_begin,
745 .drained_end = bdrv_child_cb_drained_end,
f3930ed0
KW
746};
747
317fc44e 748/*
8e2160e2
KW
749 * Returns the options and flags that bs->backing should get, based on the
750 * given options and flags for the parent BDS
317fc44e 751 */
8e2160e2
KW
752static void bdrv_backing_options(int *child_flags, QDict *child_options,
753 int parent_flags, QDict *parent_options)
317fc44e 754{
8e2160e2
KW
755 int flags = parent_flags;
756
b8816a43
KW
757 /* The cache mode is inherited unmodified for backing files; except WCE,
758 * which is only applied on the top level (BlockBackend) */
91a097e7
KW
759 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
760 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
761
317fc44e
KW
762 /* backing files always opened read-only */
763 flags &= ~(BDRV_O_RDWR | BDRV_O_COPY_ON_READ);
764
765 /* snapshot=on is handled on the top layer */
8bfea15d 766 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e 767
8e2160e2 768 *child_flags = flags;
317fc44e
KW
769}
770
f3930ed0 771static const BdrvChildRole child_backing = {
8e2160e2 772 .inherit_options = bdrv_backing_options,
20018e12
KW
773 .drained_begin = bdrv_child_cb_drained_begin,
774 .drained_end = bdrv_child_cb_drained_end,
f3930ed0
KW
775};
776
7b272452
KW
777static int bdrv_open_flags(BlockDriverState *bs, int flags)
778{
61de4c68 779 int open_flags = flags;
7b272452
KW
780
781 /*
782 * Clear flags that are internal to the block layer before opening the
783 * image.
784 */
20cca275 785 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
786
787 /*
788 * Snapshots should be writable.
789 */
8bfea15d 790 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
791 open_flags |= BDRV_O_RDWR;
792 }
793
794 return open_flags;
795}
796
91a097e7
KW
797static void update_flags_from_options(int *flags, QemuOpts *opts)
798{
799 *flags &= ~BDRV_O_CACHE_MASK;
800
91a097e7
KW
801 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_NO_FLUSH));
802 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_NO_FLUSH, false)) {
803 *flags |= BDRV_O_NO_FLUSH;
804 }
805
806 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_DIRECT));
807 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_DIRECT, false)) {
808 *flags |= BDRV_O_NOCACHE;
809 }
810}
811
812static void update_options_from_flags(QDict *options, int flags)
813{
91a097e7
KW
814 if (!qdict_haskey(options, BDRV_OPT_CACHE_DIRECT)) {
815 qdict_put(options, BDRV_OPT_CACHE_DIRECT,
816 qbool_from_bool(flags & BDRV_O_NOCACHE));
817 }
818 if (!qdict_haskey(options, BDRV_OPT_CACHE_NO_FLUSH)) {
819 qdict_put(options, BDRV_OPT_CACHE_NO_FLUSH,
820 qbool_from_bool(flags & BDRV_O_NO_FLUSH));
821 }
822}
823
636ea370
KW
824static void bdrv_assign_node_name(BlockDriverState *bs,
825 const char *node_name,
826 Error **errp)
6913c0c2 827{
15489c76 828 char *gen_node_name = NULL;
6913c0c2 829
15489c76
JC
830 if (!node_name) {
831 node_name = gen_node_name = id_generate(ID_BLOCK);
832 } else if (!id_wellformed(node_name)) {
833 /*
834 * Check for empty string or invalid characters, but not if it is
835 * generated (generated names use characters not available to the user)
836 */
9aebf3b8 837 error_setg(errp, "Invalid node name");
636ea370 838 return;
6913c0c2
BC
839 }
840
0c5e94ee 841 /* takes care of avoiding namespaces collisions */
7f06d47e 842 if (blk_by_name(node_name)) {
0c5e94ee
BC
843 error_setg(errp, "node-name=%s is conflicting with a device id",
844 node_name);
15489c76 845 goto out;
0c5e94ee
BC
846 }
847
6913c0c2
BC
848 /* takes care of avoiding duplicates node names */
849 if (bdrv_find_node(node_name)) {
850 error_setg(errp, "Duplicate node name");
15489c76 851 goto out;
6913c0c2
BC
852 }
853
854 /* copy node name into the bs and insert it into the graph list */
855 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
856 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
15489c76
JC
857out:
858 g_free(gen_node_name);
6913c0c2
BC
859}
860
18edf289
KW
861static QemuOptsList bdrv_runtime_opts = {
862 .name = "bdrv_common",
863 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
864 .desc = {
865 {
866 .name = "node-name",
867 .type = QEMU_OPT_STRING,
868 .help = "Node name of the block device node",
869 },
62392ebb
KW
870 {
871 .name = "driver",
872 .type = QEMU_OPT_STRING,
873 .help = "Block driver to use for the node",
874 },
91a097e7
KW
875 {
876 .name = BDRV_OPT_CACHE_DIRECT,
877 .type = QEMU_OPT_BOOL,
878 .help = "Bypass software writeback cache on the host",
879 },
880 {
881 .name = BDRV_OPT_CACHE_NO_FLUSH,
882 .type = QEMU_OPT_BOOL,
883 .help = "Ignore flush requests",
884 },
18edf289
KW
885 { /* end of list */ }
886 },
887};
888
57915332
KW
889/*
890 * Common part for opening disk images and files
b6ad491a
KW
891 *
892 * Removes all processed options from *options.
57915332 893 */
9a4f4c31 894static int bdrv_open_common(BlockDriverState *bs, BdrvChild *file,
82dc8b41 895 QDict *options, Error **errp)
57915332
KW
896{
897 int ret, open_flags;
035fccdf 898 const char *filename;
62392ebb 899 const char *driver_name = NULL;
6913c0c2 900 const char *node_name = NULL;
18edf289 901 QemuOpts *opts;
62392ebb 902 BlockDriver *drv;
34b5d2c6 903 Error *local_err = NULL;
57915332 904
6405875c 905 assert(bs->file == NULL);
707ff828 906 assert(options != NULL && bs->options != options);
57915332 907
62392ebb
KW
908 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
909 qemu_opts_absorb_qdict(opts, options, &local_err);
910 if (local_err) {
911 error_propagate(errp, local_err);
912 ret = -EINVAL;
913 goto fail_opts;
914 }
915
916 driver_name = qemu_opt_get(opts, "driver");
917 drv = bdrv_find_format(driver_name);
918 assert(drv != NULL);
919
45673671 920 if (file != NULL) {
9a4f4c31 921 filename = file->bs->filename;
45673671
KW
922 } else {
923 filename = qdict_get_try_str(options, "filename");
924 }
925
765003db
KW
926 if (drv->bdrv_needs_filename && !filename) {
927 error_setg(errp, "The '%s' block driver requires a file name",
928 drv->format_name);
18edf289
KW
929 ret = -EINVAL;
930 goto fail_opts;
6913c0c2 931 }
6913c0c2 932
82dc8b41
KW
933 trace_bdrv_open_common(bs, filename ?: "", bs->open_flags,
934 drv->format_name);
62392ebb 935
18edf289 936 node_name = qemu_opt_get(opts, "node-name");
636ea370 937 bdrv_assign_node_name(bs, node_name, &local_err);
0fb6395c 938 if (local_err) {
636ea370 939 error_propagate(errp, local_err);
18edf289
KW
940 ret = -EINVAL;
941 goto fail_opts;
5d186eb0
KW
942 }
943
82dc8b41 944 bs->read_only = !(bs->open_flags & BDRV_O_RDWR);
b64ec4e4
FZ
945
946 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
947 error_setg(errp,
948 !bs->read_only && bdrv_is_whitelisted(drv, true)
949 ? "Driver '%s' can only be used for read-only devices"
950 : "Driver '%s' is not whitelisted",
951 drv->format_name);
18edf289
KW
952 ret = -ENOTSUP;
953 goto fail_opts;
b64ec4e4 954 }
57915332 955
53fec9d3 956 assert(bs->copy_on_read == 0); /* bdrv_new() and bdrv_close() make it so */
82dc8b41 957 if (bs->open_flags & BDRV_O_COPY_ON_READ) {
0ebd24e0
KW
958 if (!bs->read_only) {
959 bdrv_enable_copy_on_read(bs);
960 } else {
961 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
962 ret = -EINVAL;
963 goto fail_opts;
0ebd24e0 964 }
53fec9d3
SH
965 }
966
c2ad1b0c
KW
967 if (filename != NULL) {
968 pstrcpy(bs->filename, sizeof(bs->filename), filename);
969 } else {
970 bs->filename[0] = '\0';
971 }
91af7014 972 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 973
57915332 974 bs->drv = drv;
7267c094 975 bs->opaque = g_malloc0(drv->instance_size);
57915332 976
91a097e7
KW
977 /* Apply cache mode options */
978 update_flags_from_options(&bs->open_flags, opts);
73ac451f 979
66f82cee 980 /* Open the image, either directly or using a protocol */
82dc8b41 981 open_flags = bdrv_open_flags(bs, bs->open_flags);
66f82cee 982 if (drv->bdrv_file_open) {
5d186eb0 983 assert(file == NULL);
030be321 984 assert(!drv->bdrv_needs_filename || filename != NULL);
34b5d2c6 985 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
f500a6d3 986 } else {
2af5ef70 987 if (file == NULL) {
34b5d2c6
HR
988 error_setg(errp, "Can't use '%s' as a block driver for the "
989 "protocol level", drv->format_name);
2af5ef70
KW
990 ret = -EINVAL;
991 goto free_and_fail;
992 }
f500a6d3 993 bs->file = file;
34b5d2c6 994 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
66f82cee
KW
995 }
996
57915332 997 if (ret < 0) {
84d18f06 998 if (local_err) {
34b5d2c6 999 error_propagate(errp, local_err);
2fa9aa59
DH
1000 } else if (bs->filename[0]) {
1001 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
34b5d2c6
HR
1002 } else {
1003 error_setg_errno(errp, -ret, "Could not open image");
1004 }
57915332
KW
1005 goto free_and_fail;
1006 }
1007
51762288
SH
1008 ret = refresh_total_sectors(bs, bs->total_sectors);
1009 if (ret < 0) {
34b5d2c6 1010 error_setg_errno(errp, -ret, "Could not refresh total sector count");
51762288 1011 goto free_and_fail;
57915332 1012 }
51762288 1013
3baca891
KW
1014 bdrv_refresh_limits(bs, &local_err);
1015 if (local_err) {
1016 error_propagate(errp, local_err);
1017 ret = -EINVAL;
1018 goto free_and_fail;
1019 }
1020
c25f53b0 1021 assert(bdrv_opt_mem_align(bs) != 0);
4196d2f0 1022 assert(bdrv_min_mem_align(bs) != 0);
a5b8dd2c 1023 assert(is_power_of_2(bs->bl.request_alignment));
18edf289
KW
1024
1025 qemu_opts_del(opts);
57915332
KW
1026 return 0;
1027
1028free_and_fail:
f500a6d3 1029 bs->file = NULL;
7267c094 1030 g_free(bs->opaque);
57915332
KW
1031 bs->opaque = NULL;
1032 bs->drv = NULL;
18edf289
KW
1033fail_opts:
1034 qemu_opts_del(opts);
57915332
KW
1035 return ret;
1036}
1037
5e5c4f63
KW
1038static QDict *parse_json_filename(const char *filename, Error **errp)
1039{
1040 QObject *options_obj;
1041 QDict *options;
1042 int ret;
1043
1044 ret = strstart(filename, "json:", &filename);
1045 assert(ret);
1046
1047 options_obj = qobject_from_json(filename);
1048 if (!options_obj) {
1049 error_setg(errp, "Could not parse the JSON options");
1050 return NULL;
1051 }
1052
1053 if (qobject_type(options_obj) != QTYPE_QDICT) {
1054 qobject_decref(options_obj);
1055 error_setg(errp, "Invalid JSON object given");
1056 return NULL;
1057 }
1058
1059 options = qobject_to_qdict(options_obj);
1060 qdict_flatten(options);
1061
1062 return options;
1063}
1064
de3b53f0
KW
1065static void parse_json_protocol(QDict *options, const char **pfilename,
1066 Error **errp)
1067{
1068 QDict *json_options;
1069 Error *local_err = NULL;
1070
1071 /* Parse json: pseudo-protocol */
1072 if (!*pfilename || !g_str_has_prefix(*pfilename, "json:")) {
1073 return;
1074 }
1075
1076 json_options = parse_json_filename(*pfilename, &local_err);
1077 if (local_err) {
1078 error_propagate(errp, local_err);
1079 return;
1080 }
1081
1082 /* Options given in the filename have lower priority than options
1083 * specified directly */
1084 qdict_join(options, json_options, false);
1085 QDECREF(json_options);
1086 *pfilename = NULL;
1087}
1088
b6ce07aa 1089/*
f54120ff
KW
1090 * Fills in default options for opening images and converts the legacy
1091 * filename/flags pair to option QDict entries.
53a29513
HR
1092 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
1093 * block driver has been specified explicitly.
b6ce07aa 1094 */
de3b53f0 1095static int bdrv_fill_options(QDict **options, const char *filename,
053e1578 1096 int *flags, Error **errp)
ea2384d3 1097{
c2ad1b0c 1098 const char *drvname;
53a29513 1099 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 1100 bool parse_filename = false;
053e1578 1101 BlockDriver *drv = NULL;
34b5d2c6 1102 Error *local_err = NULL;
83f64091 1103
53a29513 1104 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1105 if (drvname) {
1106 drv = bdrv_find_format(drvname);
1107 if (!drv) {
1108 error_setg(errp, "Unknown driver '%s'", drvname);
1109 return -ENOENT;
1110 }
1111 /* If the user has explicitly specified the driver, this choice should
1112 * override the BDRV_O_PROTOCOL flag */
1113 protocol = drv->bdrv_file_open;
53a29513
HR
1114 }
1115
1116 if (protocol) {
1117 *flags |= BDRV_O_PROTOCOL;
1118 } else {
1119 *flags &= ~BDRV_O_PROTOCOL;
1120 }
1121
91a097e7
KW
1122 /* Translate cache options from flags into options */
1123 update_options_from_flags(*options, *flags);
1124
035fccdf 1125 /* Fetch the file name from the options QDict if necessary */
17b005f1 1126 if (protocol && filename) {
f54120ff
KW
1127 if (!qdict_haskey(*options, "filename")) {
1128 qdict_put(*options, "filename", qstring_from_str(filename));
1129 parse_filename = true;
1130 } else {
1131 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1132 "the same time");
1133 return -EINVAL;
1134 }
035fccdf
KW
1135 }
1136
c2ad1b0c 1137 /* Find the right block driver */
f54120ff 1138 filename = qdict_get_try_str(*options, "filename");
f54120ff 1139
053e1578
HR
1140 if (!drvname && protocol) {
1141 if (filename) {
1142 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1143 if (!drv) {
053e1578 1144 return -EINVAL;
17b005f1 1145 }
053e1578
HR
1146
1147 drvname = drv->format_name;
1148 qdict_put(*options, "driver", qstring_from_str(drvname));
1149 } else {
1150 error_setg(errp, "Must specify either driver or file");
1151 return -EINVAL;
98289620 1152 }
c2ad1b0c
KW
1153 }
1154
17b005f1 1155 assert(drv || !protocol);
c2ad1b0c 1156
f54120ff 1157 /* Driver-specific filename parsing */
17b005f1 1158 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1159 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1160 if (local_err) {
34b5d2c6 1161 error_propagate(errp, local_err);
f54120ff 1162 return -EINVAL;
6963a30d 1163 }
cd5d031e
HR
1164
1165 if (!drv->bdrv_needs_filename) {
1166 qdict_del(*options, "filename");
cd5d031e 1167 }
6963a30d
KW
1168 }
1169
f54120ff
KW
1170 return 0;
1171}
1172
e9740bc6
KW
1173static void bdrv_replace_child(BdrvChild *child, BlockDriverState *new_bs)
1174{
1175 BlockDriverState *old_bs = child->bs;
1176
1177 if (old_bs) {
36fe1331
KW
1178 if (old_bs->quiesce_counter && child->role->drained_end) {
1179 child->role->drained_end(child);
1180 }
e9740bc6
KW
1181 QLIST_REMOVE(child, next_parent);
1182 }
36fe1331
KW
1183
1184 child->bs = new_bs;
1185
e9740bc6
KW
1186 if (new_bs) {
1187 QLIST_INSERT_HEAD(&new_bs->parents, child, next_parent);
36fe1331
KW
1188 if (new_bs->quiesce_counter && child->role->drained_begin) {
1189 child->role->drained_begin(child);
1190 }
e9740bc6 1191 }
e9740bc6
KW
1192}
1193
f21d96d0
KW
1194BdrvChild *bdrv_root_attach_child(BlockDriverState *child_bs,
1195 const char *child_name,
36fe1331
KW
1196 const BdrvChildRole *child_role,
1197 void *opaque)
df581792
KW
1198{
1199 BdrvChild *child = g_new(BdrvChild, 1);
1200 *child = (BdrvChild) {
e9740bc6 1201 .bs = NULL,
260fecf1 1202 .name = g_strdup(child_name),
df581792 1203 .role = child_role,
36fe1331 1204 .opaque = opaque,
df581792
KW
1205 };
1206
e9740bc6 1207 bdrv_replace_child(child, child_bs);
b4b059f6
KW
1208
1209 return child;
df581792
KW
1210}
1211
98292c61
WC
1212BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
1213 BlockDriverState *child_bs,
1214 const char *child_name,
1215 const BdrvChildRole *child_role)
f21d96d0 1216{
36fe1331 1217 BdrvChild *child = bdrv_root_attach_child(child_bs, child_name, child_role,
20018e12 1218 parent_bs);
f21d96d0
KW
1219 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
1220 return child;
1221}
1222
3f09bfbc 1223static void bdrv_detach_child(BdrvChild *child)
33a60407 1224{
f21d96d0
KW
1225 if (child->next.le_prev) {
1226 QLIST_REMOVE(child, next);
1227 child->next.le_prev = NULL;
1228 }
e9740bc6
KW
1229
1230 bdrv_replace_child(child, NULL);
1231
260fecf1 1232 g_free(child->name);
33a60407
KW
1233 g_free(child);
1234}
1235
f21d96d0 1236void bdrv_root_unref_child(BdrvChild *child)
33a60407 1237{
779020cb
KW
1238 BlockDriverState *child_bs;
1239
f21d96d0
KW
1240 child_bs = child->bs;
1241 bdrv_detach_child(child);
1242 bdrv_unref(child_bs);
1243}
1244
1245void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
1246{
779020cb
KW
1247 if (child == NULL) {
1248 return;
1249 }
33a60407
KW
1250
1251 if (child->bs->inherits_from == parent) {
1252 child->bs->inherits_from = NULL;
1253 }
1254
f21d96d0 1255 bdrv_root_unref_child(child);
33a60407
KW
1256}
1257
5c8cab48
KW
1258
1259static void bdrv_parent_cb_change_media(BlockDriverState *bs, bool load)
1260{
1261 BdrvChild *c;
1262 QLIST_FOREACH(c, &bs->parents, next_parent) {
1263 if (c->role->change_media) {
1264 c->role->change_media(c, load);
1265 }
1266 }
1267}
1268
1269static void bdrv_parent_cb_resize(BlockDriverState *bs)
1270{
1271 BdrvChild *c;
1272 QLIST_FOREACH(c, &bs->parents, next_parent) {
1273 if (c->role->resize) {
1274 c->role->resize(c);
1275 }
1276 }
1277}
1278
5db15a57
KW
1279/*
1280 * Sets the backing file link of a BDS. A new reference is created; callers
1281 * which don't need their own reference any more must call bdrv_unref().
1282 */
8d24cce1
FZ
1283void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd)
1284{
5db15a57
KW
1285 if (backing_hd) {
1286 bdrv_ref(backing_hd);
1287 }
8d24cce1 1288
760e0063 1289 if (bs->backing) {
826b6ca0 1290 assert(bs->backing_blocker);
760e0063 1291 bdrv_op_unblock_all(bs->backing->bs, bs->backing_blocker);
5db15a57 1292 bdrv_unref_child(bs, bs->backing);
826b6ca0
FZ
1293 } else if (backing_hd) {
1294 error_setg(&bs->backing_blocker,
81e5f78a
AG
1295 "node is used as backing hd of '%s'",
1296 bdrv_get_device_or_node_name(bs));
826b6ca0
FZ
1297 }
1298
8d24cce1 1299 if (!backing_hd) {
826b6ca0
FZ
1300 error_free(bs->backing_blocker);
1301 bs->backing_blocker = NULL;
760e0063 1302 bs->backing = NULL;
8d24cce1
FZ
1303 goto out;
1304 }
260fecf1 1305 bs->backing = bdrv_attach_child(bs, backing_hd, "backing", &child_backing);
8d24cce1
FZ
1306 bs->open_flags &= ~BDRV_O_NO_BACKING;
1307 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_hd->filename);
1308 pstrcpy(bs->backing_format, sizeof(bs->backing_format),
1309 backing_hd->drv ? backing_hd->drv->format_name : "");
826b6ca0 1310
760e0063 1311 bdrv_op_block_all(backing_hd, bs->backing_blocker);
826b6ca0 1312 /* Otherwise we won't be able to commit due to check in bdrv_commit */
760e0063 1313 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
826b6ca0 1314 bs->backing_blocker);
8d24cce1 1315out:
3baca891 1316 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
1317}
1318
31ca6d07
KW
1319/*
1320 * Opens the backing file for a BlockDriverState if not yet open
1321 *
d9b7b057
KW
1322 * bdref_key specifies the key for the image's BlockdevRef in the options QDict.
1323 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1324 * itself, all options starting with "${bdref_key}." are considered part of the
1325 * BlockdevRef.
1326 *
1327 * TODO Can this be unified with bdrv_open_image()?
31ca6d07 1328 */
d9b7b057
KW
1329int bdrv_open_backing_file(BlockDriverState *bs, QDict *parent_options,
1330 const char *bdref_key, Error **errp)
9156df12 1331{
1ba4b6a5 1332 char *backing_filename = g_malloc0(PATH_MAX);
d9b7b057
KW
1333 char *bdref_key_dot;
1334 const char *reference = NULL;
317fc44e 1335 int ret = 0;
8d24cce1 1336 BlockDriverState *backing_hd;
d9b7b057
KW
1337 QDict *options;
1338 QDict *tmp_parent_options = NULL;
34b5d2c6 1339 Error *local_err = NULL;
9156df12 1340
760e0063 1341 if (bs->backing != NULL) {
1ba4b6a5 1342 goto free_exit;
9156df12
PB
1343 }
1344
31ca6d07 1345 /* NULL means an empty set of options */
d9b7b057
KW
1346 if (parent_options == NULL) {
1347 tmp_parent_options = qdict_new();
1348 parent_options = tmp_parent_options;
31ca6d07
KW
1349 }
1350
9156df12 1351 bs->open_flags &= ~BDRV_O_NO_BACKING;
d9b7b057
KW
1352
1353 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1354 qdict_extract_subqdict(parent_options, &options, bdref_key_dot);
1355 g_free(bdref_key_dot);
1356
1357 reference = qdict_get_try_str(parent_options, bdref_key);
1358 if (reference || qdict_haskey(options, "file.filename")) {
1cb6f506
KW
1359 backing_filename[0] = '\0';
1360 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 1361 QDECREF(options);
1ba4b6a5 1362 goto free_exit;
dbecebdd 1363 } else {
9f07429e
HR
1364 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
1365 &local_err);
1366 if (local_err) {
1367 ret = -EINVAL;
1368 error_propagate(errp, local_err);
1369 QDECREF(options);
1370 goto free_exit;
1371 }
9156df12
PB
1372 }
1373
8ee79e70
KW
1374 if (!bs->drv || !bs->drv->supports_backing) {
1375 ret = -EINVAL;
1376 error_setg(errp, "Driver doesn't support backing files");
1377 QDECREF(options);
1378 goto free_exit;
1379 }
1380
c5f6e493
KW
1381 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
1382 qdict_put(options, "driver", qstring_from_str(bs->backing_format));
9156df12
PB
1383 }
1384
5b363937
HR
1385 backing_hd = bdrv_open_inherit(*backing_filename ? backing_filename : NULL,
1386 reference, options, 0, bs, &child_backing,
1387 errp);
1388 if (!backing_hd) {
9156df12 1389 bs->open_flags |= BDRV_O_NO_BACKING;
e43bfd9c 1390 error_prepend(errp, "Could not open backing file: ");
5b363937 1391 ret = -EINVAL;
1ba4b6a5 1392 goto free_exit;
9156df12 1393 }
df581792 1394
5db15a57
KW
1395 /* Hook up the backing file link; drop our reference, bs owns the
1396 * backing_hd reference now */
8d24cce1 1397 bdrv_set_backing_hd(bs, backing_hd);
5db15a57 1398 bdrv_unref(backing_hd);
d80ac658 1399
d9b7b057
KW
1400 qdict_del(parent_options, bdref_key);
1401
1ba4b6a5
BC
1402free_exit:
1403 g_free(backing_filename);
d9b7b057 1404 QDECREF(tmp_parent_options);
1ba4b6a5 1405 return ret;
9156df12
PB
1406}
1407
da557aac
HR
1408/*
1409 * Opens a disk image whose options are given as BlockdevRef in another block
1410 * device's options.
1411 *
da557aac 1412 * If allow_none is true, no image will be opened if filename is false and no
b4b059f6 1413 * BlockdevRef is given. NULL will be returned, but errp remains unset.
da557aac
HR
1414 *
1415 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
1416 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1417 * itself, all options starting with "${bdref_key}." are considered part of the
1418 * BlockdevRef.
1419 *
1420 * The BlockdevRef will be removed from the options QDict.
1421 */
b4b059f6
KW
1422BdrvChild *bdrv_open_child(const char *filename,
1423 QDict *options, const char *bdref_key,
1424 BlockDriverState* parent,
1425 const BdrvChildRole *child_role,
1426 bool allow_none, Error **errp)
da557aac 1427{
b4b059f6
KW
1428 BdrvChild *c = NULL;
1429 BlockDriverState *bs;
da557aac 1430 QDict *image_options;
da557aac
HR
1431 char *bdref_key_dot;
1432 const char *reference;
1433
df581792 1434 assert(child_role != NULL);
f67503e5 1435
da557aac
HR
1436 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1437 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
1438 g_free(bdref_key_dot);
1439
1440 reference = qdict_get_try_str(options, bdref_key);
1441 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 1442 if (!allow_none) {
da557aac
HR
1443 error_setg(errp, "A block device must be specified for \"%s\"",
1444 bdref_key);
da557aac 1445 }
b20e61e0 1446 QDECREF(image_options);
da557aac
HR
1447 goto done;
1448 }
1449
5b363937
HR
1450 bs = bdrv_open_inherit(filename, reference, image_options, 0,
1451 parent, child_role, errp);
1452 if (!bs) {
df581792
KW
1453 goto done;
1454 }
1455
260fecf1 1456 c = bdrv_attach_child(parent, bs, bdref_key, child_role);
da557aac
HR
1457
1458done:
1459 qdict_del(options, bdref_key);
b4b059f6
KW
1460 return c;
1461}
1462
66836189
HR
1463static BlockDriverState *bdrv_append_temp_snapshot(BlockDriverState *bs,
1464 int flags,
1465 QDict *snapshot_options,
1466 Error **errp)
b998875d
KW
1467{
1468 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 1469 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 1470 int64_t total_size;
83d0521a 1471 QemuOpts *opts = NULL;
b998875d 1472 BlockDriverState *bs_snapshot;
b998875d
KW
1473 int ret;
1474
1475 /* if snapshot, we create a temporary backing file and open it
1476 instead of opening 'filename' directly */
1477
1478 /* Get the required size from the image */
f187743a
KW
1479 total_size = bdrv_getlength(bs);
1480 if (total_size < 0) {
1481 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 1482 goto out;
f187743a 1483 }
b998875d
KW
1484
1485 /* Create the temporary image */
1ba4b6a5 1486 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
1487 if (ret < 0) {
1488 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 1489 goto out;
b998875d
KW
1490 }
1491
ef810437 1492 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 1493 &error_abort);
39101f25 1494 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
e43bfd9c 1495 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, errp);
83d0521a 1496 qemu_opts_del(opts);
b998875d 1497 if (ret < 0) {
e43bfd9c
MA
1498 error_prepend(errp, "Could not create temporary overlay '%s': ",
1499 tmp_filename);
1ba4b6a5 1500 goto out;
b998875d
KW
1501 }
1502
73176bee 1503 /* Prepare options QDict for the temporary file */
b998875d
KW
1504 qdict_put(snapshot_options, "file.driver",
1505 qstring_from_str("file"));
1506 qdict_put(snapshot_options, "file.filename",
1507 qstring_from_str(tmp_filename));
e6641719
HR
1508 qdict_put(snapshot_options, "driver",
1509 qstring_from_str("qcow2"));
b998875d 1510
5b363937 1511 bs_snapshot = bdrv_open(NULL, NULL, snapshot_options, flags, errp);
73176bee 1512 snapshot_options = NULL;
5b363937
HR
1513 if (!bs_snapshot) {
1514 ret = -EINVAL;
1ba4b6a5 1515 goto out;
b998875d
KW
1516 }
1517
66836189
HR
1518 /* bdrv_append() consumes a strong reference to bs_snapshot (i.e. it will
1519 * call bdrv_unref() on it), so in order to be able to return one, we have
1520 * to increase bs_snapshot's refcount here */
1521 bdrv_ref(bs_snapshot);
b998875d 1522 bdrv_append(bs_snapshot, bs);
1ba4b6a5 1523
66836189
HR
1524 g_free(tmp_filename);
1525 return bs_snapshot;
1526
1ba4b6a5 1527out:
73176bee 1528 QDECREF(snapshot_options);
1ba4b6a5 1529 g_free(tmp_filename);
66836189 1530 return NULL;
b998875d
KW
1531}
1532
b6ce07aa
KW
1533/*
1534 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
1535 *
1536 * options is a QDict of options to pass to the block drivers, or NULL for an
1537 * empty set of options. The reference to the QDict belongs to the block layer
1538 * after the call (even on failure), so if the caller intends to reuse the
1539 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
1540 *
1541 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
1542 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
1543 *
1544 * The reference parameter may be used to specify an existing block device which
1545 * should be opened. If specified, neither options nor a filename may be given,
1546 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 1547 */
5b363937
HR
1548static BlockDriverState *bdrv_open_inherit(const char *filename,
1549 const char *reference,
1550 QDict *options, int flags,
1551 BlockDriverState *parent,
1552 const BdrvChildRole *child_role,
1553 Error **errp)
ea2384d3 1554{
b6ce07aa 1555 int ret;
9a4f4c31
KW
1556 BdrvChild *file = NULL;
1557 BlockDriverState *bs;
ce343771 1558 BlockDriver *drv = NULL;
74fe54f2 1559 const char *drvname;
3e8c2e57 1560 const char *backing;
34b5d2c6 1561 Error *local_err = NULL;
73176bee 1562 QDict *snapshot_options = NULL;
b1e6fc08 1563 int snapshot_flags = 0;
712e7874 1564
f3930ed0
KW
1565 assert(!child_role || !flags);
1566 assert(!child_role == !parent);
f67503e5 1567
ddf5636d
HR
1568 if (reference) {
1569 bool options_non_empty = options ? qdict_size(options) : false;
1570 QDECREF(options);
1571
ddf5636d
HR
1572 if (filename || options_non_empty) {
1573 error_setg(errp, "Cannot reference an existing block device with "
1574 "additional options or a new filename");
5b363937 1575 return NULL;
ddf5636d
HR
1576 }
1577
1578 bs = bdrv_lookup_bs(reference, reference, errp);
1579 if (!bs) {
5b363937 1580 return NULL;
ddf5636d 1581 }
76b22320 1582
ddf5636d 1583 bdrv_ref(bs);
5b363937 1584 return bs;
ddf5636d
HR
1585 }
1586
5b363937 1587 bs = bdrv_new();
f67503e5 1588
de9c0cec
KW
1589 /* NULL means an empty set of options */
1590 if (options == NULL) {
1591 options = qdict_new();
1592 }
1593
145f598e 1594 /* json: syntax counts as explicit options, as if in the QDict */
de3b53f0
KW
1595 parse_json_protocol(options, &filename, &local_err);
1596 if (local_err) {
de3b53f0
KW
1597 goto fail;
1598 }
1599
145f598e
KW
1600 bs->explicit_options = qdict_clone_shallow(options);
1601
f3930ed0 1602 if (child_role) {
bddcec37 1603 bs->inherits_from = parent;
8e2160e2
KW
1604 child_role->inherit_options(&flags, options,
1605 parent->open_flags, parent->options);
f3930ed0
KW
1606 }
1607
de3b53f0 1608 ret = bdrv_fill_options(&options, filename, &flags, &local_err);
462f5bcf
KW
1609 if (local_err) {
1610 goto fail;
1611 }
1612
62392ebb
KW
1613 bs->open_flags = flags;
1614 bs->options = options;
1615 options = qdict_clone_shallow(options);
1616
76c591b0 1617 /* Find the right image format driver */
76c591b0
KW
1618 drvname = qdict_get_try_str(options, "driver");
1619 if (drvname) {
1620 drv = bdrv_find_format(drvname);
76c591b0
KW
1621 if (!drv) {
1622 error_setg(errp, "Unknown driver: '%s'", drvname);
76c591b0
KW
1623 goto fail;
1624 }
1625 }
1626
1627 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 1628
3e8c2e57
AG
1629 backing = qdict_get_try_str(options, "backing");
1630 if (backing && *backing == '\0') {
1631 flags |= BDRV_O_NO_BACKING;
1632 qdict_del(options, "backing");
1633 }
1634
f500a6d3 1635 /* Open image file without format layer */
f4788adc
KW
1636 if ((flags & BDRV_O_PROTOCOL) == 0) {
1637 if (flags & BDRV_O_RDWR) {
1638 flags |= BDRV_O_ALLOW_RDWR;
1639 }
1640 if (flags & BDRV_O_SNAPSHOT) {
73176bee
KW
1641 snapshot_options = qdict_new();
1642 bdrv_temp_snapshot_options(&snapshot_flags, snapshot_options,
1643 flags, options);
8e2160e2 1644 bdrv_backing_options(&flags, options, flags, options);
f4788adc 1645 }
f500a6d3 1646
f3930ed0 1647 bs->open_flags = flags;
1fdd6933 1648
9a4f4c31
KW
1649 file = bdrv_open_child(filename, options, "file", bs,
1650 &child_file, true, &local_err);
1fdd6933 1651 if (local_err) {
f4788adc
KW
1652 goto fail;
1653 }
f500a6d3
KW
1654 }
1655
76c591b0 1656 /* Image format probing */
38f3ef57 1657 bs->probed = !drv;
76c591b0 1658 if (!drv && file) {
cf2ab8fc 1659 ret = find_image_format(file, filename, &drv, &local_err);
17b005f1 1660 if (ret < 0) {
8bfea15d 1661 goto fail;
2a05cbe4 1662 }
62392ebb
KW
1663 /*
1664 * This option update would logically belong in bdrv_fill_options(),
1665 * but we first need to open bs->file for the probing to work, while
1666 * opening bs->file already requires the (mostly) final set of options
1667 * so that cache mode etc. can be inherited.
1668 *
1669 * Adding the driver later is somewhat ugly, but it's not an option
1670 * that would ever be inherited, so it's correct. We just need to make
1671 * sure to update both bs->options (which has the full effective
1672 * options for bs) and options (which has file.* already removed).
1673 */
1674 qdict_put(bs->options, "driver", qstring_from_str(drv->format_name));
1675 qdict_put(options, "driver", qstring_from_str(drv->format_name));
76c591b0 1676 } else if (!drv) {
17b005f1 1677 error_setg(errp, "Must specify either driver or file");
8bfea15d 1678 goto fail;
ea2384d3 1679 }
b6ce07aa 1680
53a29513
HR
1681 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
1682 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
1683 /* file must be NULL if a protocol BDS is about to be created
1684 * (the inverse results in an error message from bdrv_open_common()) */
1685 assert(!(flags & BDRV_O_PROTOCOL) || !file);
1686
b6ce07aa 1687 /* Open the image */
82dc8b41 1688 ret = bdrv_open_common(bs, file, options, &local_err);
b6ce07aa 1689 if (ret < 0) {
8bfea15d 1690 goto fail;
6987307c
CH
1691 }
1692
2a05cbe4 1693 if (file && (bs->file != file)) {
9a4f4c31 1694 bdrv_unref_child(bs, file);
f500a6d3
KW
1695 file = NULL;
1696 }
1697
b6ce07aa 1698 /* If there is a backing file, use it */
9156df12 1699 if ((flags & BDRV_O_NO_BACKING) == 0) {
d9b7b057 1700 ret = bdrv_open_backing_file(bs, options, "backing", &local_err);
b6ce07aa 1701 if (ret < 0) {
b6ad491a 1702 goto close_and_fail;
b6ce07aa 1703 }
b6ce07aa
KW
1704 }
1705
91af7014
HR
1706 bdrv_refresh_filename(bs);
1707
b6ad491a 1708 /* Check if any unknown options were used */
5acd9d81 1709 if (options && (qdict_size(options) != 0)) {
b6ad491a 1710 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
1711 if (flags & BDRV_O_PROTOCOL) {
1712 error_setg(errp, "Block protocol '%s' doesn't support the option "
1713 "'%s'", drv->format_name, entry->key);
1714 } else {
d0e46a55
HR
1715 error_setg(errp,
1716 "Block format '%s' does not support the option '%s'",
1717 drv->format_name, entry->key);
5acd9d81 1718 }
b6ad491a 1719
b6ad491a
KW
1720 goto close_and_fail;
1721 }
b6ad491a 1722
b6ce07aa 1723 if (!bdrv_key_required(bs)) {
5c8cab48 1724 bdrv_parent_cb_change_media(bs, true);
c3adb58f
MA
1725 } else if (!runstate_check(RUN_STATE_PRELAUNCH)
1726 && !runstate_check(RUN_STATE_INMIGRATE)
1727 && !runstate_check(RUN_STATE_PAUSED)) { /* HACK */
1728 error_setg(errp,
1729 "Guest must be stopped for opening of encrypted image");
c3adb58f 1730 goto close_and_fail;
b6ce07aa
KW
1731 }
1732
c3adb58f 1733 QDECREF(options);
dd62f1ca
KW
1734
1735 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
1736 * temporary snapshot afterwards. */
1737 if (snapshot_flags) {
66836189
HR
1738 BlockDriverState *snapshot_bs;
1739 snapshot_bs = bdrv_append_temp_snapshot(bs, snapshot_flags,
1740 snapshot_options, &local_err);
73176bee 1741 snapshot_options = NULL;
dd62f1ca
KW
1742 if (local_err) {
1743 goto close_and_fail;
1744 }
5b363937
HR
1745 /* We are not going to return bs but the overlay on top of it
1746 * (snapshot_bs); thus, we have to drop the strong reference to bs
1747 * (which we obtained by calling bdrv_new()). bs will not be deleted,
1748 * though, because the overlay still has a reference to it. */
1749 bdrv_unref(bs);
1750 bs = snapshot_bs;
dd62f1ca
KW
1751 }
1752
5b363937 1753 return bs;
b6ce07aa 1754
8bfea15d 1755fail:
f500a6d3 1756 if (file != NULL) {
9a4f4c31 1757 bdrv_unref_child(bs, file);
f500a6d3 1758 }
73176bee 1759 QDECREF(snapshot_options);
145f598e 1760 QDECREF(bs->explicit_options);
de9c0cec 1761 QDECREF(bs->options);
b6ad491a 1762 QDECREF(options);
de9c0cec 1763 bs->options = NULL;
5b363937 1764 bdrv_unref(bs);
621ff94d 1765 error_propagate(errp, local_err);
5b363937 1766 return NULL;
de9c0cec 1767
b6ad491a 1768close_and_fail:
5b363937 1769 bdrv_unref(bs);
73176bee 1770 QDECREF(snapshot_options);
b6ad491a 1771 QDECREF(options);
621ff94d 1772 error_propagate(errp, local_err);
5b363937 1773 return NULL;
b6ce07aa
KW
1774}
1775
5b363937
HR
1776BlockDriverState *bdrv_open(const char *filename, const char *reference,
1777 QDict *options, int flags, Error **errp)
f3930ed0 1778{
5b363937 1779 return bdrv_open_inherit(filename, reference, options, flags, NULL,
ce343771 1780 NULL, errp);
f3930ed0
KW
1781}
1782
e971aa12
JC
1783typedef struct BlockReopenQueueEntry {
1784 bool prepared;
1785 BDRVReopenState state;
1786 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
1787} BlockReopenQueueEntry;
1788
1789/*
1790 * Adds a BlockDriverState to a simple queue for an atomic, transactional
1791 * reopen of multiple devices.
1792 *
1793 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
1794 * already performed, or alternatively may be NULL a new BlockReopenQueue will
1795 * be created and initialized. This newly created BlockReopenQueue should be
1796 * passed back in for subsequent calls that are intended to be of the same
1797 * atomic 'set'.
1798 *
1799 * bs is the BlockDriverState to add to the reopen queue.
1800 *
4d2cb092
KW
1801 * options contains the changed options for the associated bs
1802 * (the BlockReopenQueue takes ownership)
1803 *
e971aa12
JC
1804 * flags contains the open flags for the associated bs
1805 *
1806 * returns a pointer to bs_queue, which is either the newly allocated
1807 * bs_queue, or the existing bs_queue being used.
1808 *
1809 */
28518102
KW
1810static BlockReopenQueue *bdrv_reopen_queue_child(BlockReopenQueue *bs_queue,
1811 BlockDriverState *bs,
1812 QDict *options,
1813 int flags,
1814 const BdrvChildRole *role,
1815 QDict *parent_options,
1816 int parent_flags)
e971aa12
JC
1817{
1818 assert(bs != NULL);
1819
1820 BlockReopenQueueEntry *bs_entry;
67251a31 1821 BdrvChild *child;
145f598e 1822 QDict *old_options, *explicit_options;
67251a31 1823
e971aa12
JC
1824 if (bs_queue == NULL) {
1825 bs_queue = g_new0(BlockReopenQueue, 1);
1826 QSIMPLEQ_INIT(bs_queue);
1827 }
1828
4d2cb092
KW
1829 if (!options) {
1830 options = qdict_new();
1831 }
1832
28518102
KW
1833 /*
1834 * Precedence of options:
1835 * 1. Explicitly passed in options (highest)
91a097e7 1836 * 2. Set in flags (only for top level)
145f598e 1837 * 3. Retained from explicitly set options of bs
8e2160e2 1838 * 4. Inherited from parent node
28518102
KW
1839 * 5. Retained from effective options of bs
1840 */
1841
91a097e7
KW
1842 if (!parent_options) {
1843 /*
1844 * Any setting represented by flags is always updated. If the
1845 * corresponding QDict option is set, it takes precedence. Otherwise
1846 * the flag is translated into a QDict option. The old setting of bs is
1847 * not considered.
1848 */
1849 update_options_from_flags(options, flags);
1850 }
1851
145f598e
KW
1852 /* Old explicitly set values (don't overwrite by inherited value) */
1853 old_options = qdict_clone_shallow(bs->explicit_options);
1854 bdrv_join_options(bs, options, old_options);
1855 QDECREF(old_options);
1856
1857 explicit_options = qdict_clone_shallow(options);
1858
28518102
KW
1859 /* Inherit from parent node */
1860 if (parent_options) {
1861 assert(!flags);
8e2160e2 1862 role->inherit_options(&flags, options, parent_flags, parent_options);
28518102
KW
1863 }
1864
1865 /* Old values are used for options that aren't set yet */
4d2cb092 1866 old_options = qdict_clone_shallow(bs->options);
cddff5ba 1867 bdrv_join_options(bs, options, old_options);
4d2cb092
KW
1868 QDECREF(old_options);
1869
f1f25a2e
KW
1870 /* bdrv_open() masks this flag out */
1871 flags &= ~BDRV_O_PROTOCOL;
1872
67251a31 1873 QLIST_FOREACH(child, &bs->children, next) {
4c9dfe5d
KW
1874 QDict *new_child_options;
1875 char *child_key_dot;
67251a31 1876
4c9dfe5d
KW
1877 /* reopen can only change the options of block devices that were
1878 * implicitly created and inherited options. For other (referenced)
1879 * block devices, a syntax like "backing.foo" results in an error. */
67251a31
KW
1880 if (child->bs->inherits_from != bs) {
1881 continue;
1882 }
1883
4c9dfe5d
KW
1884 child_key_dot = g_strdup_printf("%s.", child->name);
1885 qdict_extract_subqdict(options, &new_child_options, child_key_dot);
1886 g_free(child_key_dot);
1887
28518102
KW
1888 bdrv_reopen_queue_child(bs_queue, child->bs, new_child_options, 0,
1889 child->role, options, flags);
e971aa12
JC
1890 }
1891
1892 bs_entry = g_new0(BlockReopenQueueEntry, 1);
1893 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
1894
1895 bs_entry->state.bs = bs;
4d2cb092 1896 bs_entry->state.options = options;
145f598e 1897 bs_entry->state.explicit_options = explicit_options;
e971aa12
JC
1898 bs_entry->state.flags = flags;
1899
1900 return bs_queue;
1901}
1902
28518102
KW
1903BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
1904 BlockDriverState *bs,
1905 QDict *options, int flags)
1906{
1907 return bdrv_reopen_queue_child(bs_queue, bs, options, flags,
1908 NULL, NULL, 0);
1909}
1910
e971aa12
JC
1911/*
1912 * Reopen multiple BlockDriverStates atomically & transactionally.
1913 *
1914 * The queue passed in (bs_queue) must have been built up previous
1915 * via bdrv_reopen_queue().
1916 *
1917 * Reopens all BDS specified in the queue, with the appropriate
1918 * flags. All devices are prepared for reopen, and failure of any
1919 * device will cause all device changes to be abandonded, and intermediate
1920 * data cleaned up.
1921 *
1922 * If all devices prepare successfully, then the changes are committed
1923 * to all devices.
1924 *
1925 */
1926int bdrv_reopen_multiple(BlockReopenQueue *bs_queue, Error **errp)
1927{
1928 int ret = -1;
1929 BlockReopenQueueEntry *bs_entry, *next;
1930 Error *local_err = NULL;
1931
1932 assert(bs_queue != NULL);
1933
1934 bdrv_drain_all();
1935
1936 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1937 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
1938 error_propagate(errp, local_err);
1939 goto cleanup;
1940 }
1941 bs_entry->prepared = true;
1942 }
1943
1944 /* If we reach this point, we have success and just need to apply the
1945 * changes
1946 */
1947 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1948 bdrv_reopen_commit(&bs_entry->state);
1949 }
1950
1951 ret = 0;
1952
1953cleanup:
1954 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
1955 if (ret && bs_entry->prepared) {
1956 bdrv_reopen_abort(&bs_entry->state);
145f598e
KW
1957 } else if (ret) {
1958 QDECREF(bs_entry->state.explicit_options);
e971aa12 1959 }
4d2cb092 1960 QDECREF(bs_entry->state.options);
e971aa12
JC
1961 g_free(bs_entry);
1962 }
1963 g_free(bs_queue);
1964 return ret;
1965}
1966
1967
1968/* Reopen a single BlockDriverState with the specified flags. */
1969int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
1970{
1971 int ret = -1;
1972 Error *local_err = NULL;
4d2cb092 1973 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12
JC
1974
1975 ret = bdrv_reopen_multiple(queue, &local_err);
1976 if (local_err != NULL) {
1977 error_propagate(errp, local_err);
1978 }
1979 return ret;
1980}
1981
1982
1983/*
1984 * Prepares a BlockDriverState for reopen. All changes are staged in the
1985 * 'opaque' field of the BDRVReopenState, which is used and allocated by
1986 * the block driver layer .bdrv_reopen_prepare()
1987 *
1988 * bs is the BlockDriverState to reopen
1989 * flags are the new open flags
1990 * queue is the reopen queue
1991 *
1992 * Returns 0 on success, non-zero on error. On error errp will be set
1993 * as well.
1994 *
1995 * On failure, bdrv_reopen_abort() will be called to clean up any data.
1996 * It is the responsibility of the caller to then call the abort() or
1997 * commit() for any other BDS that have been left in a prepare() state
1998 *
1999 */
2000int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
2001 Error **errp)
2002{
2003 int ret = -1;
2004 Error *local_err = NULL;
2005 BlockDriver *drv;
ccf9dc07
KW
2006 QemuOpts *opts;
2007 const char *value;
e971aa12
JC
2008
2009 assert(reopen_state != NULL);
2010 assert(reopen_state->bs->drv != NULL);
2011 drv = reopen_state->bs->drv;
2012
ccf9dc07
KW
2013 /* Process generic block layer options */
2014 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
2015 qemu_opts_absorb_qdict(opts, reopen_state->options, &local_err);
2016 if (local_err) {
2017 error_propagate(errp, local_err);
2018 ret = -EINVAL;
2019 goto error;
2020 }
2021
91a097e7
KW
2022 update_flags_from_options(&reopen_state->flags, opts);
2023
ccf9dc07
KW
2024 /* node-name and driver must be unchanged. Put them back into the QDict, so
2025 * that they are checked at the end of this function. */
2026 value = qemu_opt_get(opts, "node-name");
2027 if (value) {
2028 qdict_put(reopen_state->options, "node-name", qstring_from_str(value));
2029 }
2030
2031 value = qemu_opt_get(opts, "driver");
2032 if (value) {
2033 qdict_put(reopen_state->options, "driver", qstring_from_str(value));
2034 }
2035
e971aa12
JC
2036 /* if we are to stay read-only, do not allow permission change
2037 * to r/w */
2038 if (!(reopen_state->bs->open_flags & BDRV_O_ALLOW_RDWR) &&
2039 reopen_state->flags & BDRV_O_RDWR) {
81e5f78a
AG
2040 error_setg(errp, "Node '%s' is read only",
2041 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
2042 goto error;
2043 }
2044
2045
2046 ret = bdrv_flush(reopen_state->bs);
2047 if (ret) {
455b0fde 2048 error_setg_errno(errp, -ret, "Error flushing drive");
e971aa12
JC
2049 goto error;
2050 }
2051
2052 if (drv->bdrv_reopen_prepare) {
2053 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
2054 if (ret) {
2055 if (local_err != NULL) {
2056 error_propagate(errp, local_err);
2057 } else {
d8b6895f
LC
2058 error_setg(errp, "failed while preparing to reopen image '%s'",
2059 reopen_state->bs->filename);
e971aa12
JC
2060 }
2061 goto error;
2062 }
2063 } else {
2064 /* It is currently mandatory to have a bdrv_reopen_prepare()
2065 * handler for each supported drv. */
81e5f78a
AG
2066 error_setg(errp, "Block format '%s' used by node '%s' "
2067 "does not support reopening files", drv->format_name,
2068 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
2069 ret = -1;
2070 goto error;
2071 }
2072
4d2cb092
KW
2073 /* Options that are not handled are only okay if they are unchanged
2074 * compared to the old state. It is expected that some options are only
2075 * used for the initial open, but not reopen (e.g. filename) */
2076 if (qdict_size(reopen_state->options)) {
2077 const QDictEntry *entry = qdict_first(reopen_state->options);
2078
2079 do {
2080 QString *new_obj = qobject_to_qstring(entry->value);
2081 const char *new = qstring_get_str(new_obj);
2082 const char *old = qdict_get_try_str(reopen_state->bs->options,
2083 entry->key);
2084
2085 if (!old || strcmp(new, old)) {
2086 error_setg(errp, "Cannot change the option '%s'", entry->key);
2087 ret = -EINVAL;
2088 goto error;
2089 }
2090 } while ((entry = qdict_next(reopen_state->options, entry)));
2091 }
2092
e971aa12
JC
2093 ret = 0;
2094
2095error:
ccf9dc07 2096 qemu_opts_del(opts);
e971aa12
JC
2097 return ret;
2098}
2099
2100/*
2101 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
2102 * makes them final by swapping the staging BlockDriverState contents into
2103 * the active BlockDriverState contents.
2104 */
2105void bdrv_reopen_commit(BDRVReopenState *reopen_state)
2106{
2107 BlockDriver *drv;
2108
2109 assert(reopen_state != NULL);
2110 drv = reopen_state->bs->drv;
2111 assert(drv != NULL);
2112
2113 /* If there are any driver level actions to take */
2114 if (drv->bdrv_reopen_commit) {
2115 drv->bdrv_reopen_commit(reopen_state);
2116 }
2117
2118 /* set BDS specific flags now */
145f598e
KW
2119 QDECREF(reopen_state->bs->explicit_options);
2120
2121 reopen_state->bs->explicit_options = reopen_state->explicit_options;
e971aa12 2122 reopen_state->bs->open_flags = reopen_state->flags;
e971aa12 2123 reopen_state->bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 2124
3baca891 2125 bdrv_refresh_limits(reopen_state->bs, NULL);
e971aa12
JC
2126}
2127
2128/*
2129 * Abort the reopen, and delete and free the staged changes in
2130 * reopen_state
2131 */
2132void bdrv_reopen_abort(BDRVReopenState *reopen_state)
2133{
2134 BlockDriver *drv;
2135
2136 assert(reopen_state != NULL);
2137 drv = reopen_state->bs->drv;
2138 assert(drv != NULL);
2139
2140 if (drv->bdrv_reopen_abort) {
2141 drv->bdrv_reopen_abort(reopen_state);
2142 }
145f598e
KW
2143
2144 QDECREF(reopen_state->explicit_options);
e971aa12
JC
2145}
2146
2147
64dff520 2148static void bdrv_close(BlockDriverState *bs)
fc01f7e7 2149{
33384421
HR
2150 BdrvAioNotifier *ban, *ban_next;
2151
ca9bd24c 2152 assert(!bs->job);
30f55fb8 2153 assert(!bs->refcnt);
99b7e775 2154
fc27291d 2155 bdrv_drained_begin(bs); /* complete I/O */
58fda173 2156 bdrv_flush(bs);
53ec73e2 2157 bdrv_drain(bs); /* in case flush left pending I/O */
fc27291d 2158
c5acdc9a
HR
2159 bdrv_release_named_dirty_bitmaps(bs);
2160 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
2161
3cbc002c 2162 if (bs->drv) {
6e93e7c4
KW
2163 BdrvChild *child, *next;
2164
9a7dedbc 2165 bs->drv->bdrv_close(bs);
9a4f4c31 2166 bs->drv = NULL;
9a7dedbc 2167
5db15a57 2168 bdrv_set_backing_hd(bs, NULL);
9a7dedbc 2169
9a4f4c31
KW
2170 if (bs->file != NULL) {
2171 bdrv_unref_child(bs, bs->file);
2172 bs->file = NULL;
2173 }
2174
6e93e7c4 2175 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
2176 /* TODO Remove bdrv_unref() from drivers' close function and use
2177 * bdrv_unref_child() here */
bddcec37
KW
2178 if (child->bs->inherits_from == bs) {
2179 child->bs->inherits_from = NULL;
2180 }
33a60407 2181 bdrv_detach_child(child);
6e93e7c4
KW
2182 }
2183
7267c094 2184 g_free(bs->opaque);
ea2384d3 2185 bs->opaque = NULL;
53fec9d3 2186 bs->copy_on_read = 0;
a275fa42
PB
2187 bs->backing_file[0] = '\0';
2188 bs->backing_format[0] = '\0';
6405875c 2189 bs->total_sectors = 0;
54115412
EB
2190 bs->encrypted = false;
2191 bs->valid_key = false;
2192 bs->sg = false;
de9c0cec 2193 QDECREF(bs->options);
145f598e 2194 QDECREF(bs->explicit_options);
de9c0cec 2195 bs->options = NULL;
91af7014
HR
2196 QDECREF(bs->full_open_options);
2197 bs->full_open_options = NULL;
b338082b 2198 }
98f90dba 2199
33384421
HR
2200 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
2201 g_free(ban);
2202 }
2203 QLIST_INIT(&bs->aio_notifiers);
fc27291d 2204 bdrv_drained_end(bs);
b338082b
FB
2205}
2206
2bc93fed
MK
2207void bdrv_close_all(void)
2208{
a1a2af07 2209 block_job_cancel_sync_all();
cd7fca95 2210 nbd_export_close_all();
ca9bd24c
HR
2211
2212 /* Drop references from requests still in flight, such as canceled block
2213 * jobs whose AIO context has not been polled yet */
2214 bdrv_drain_all();
2bc93fed 2215
ca9bd24c
HR
2216 blk_remove_all_bs();
2217 blockdev_close_all_bdrv_states();
ed78cda3 2218
a1a2af07 2219 assert(QTAILQ_EMPTY(&all_bdrv_states));
2bc93fed
MK
2220}
2221
dd62f1ca
KW
2222static void change_parent_backing_link(BlockDriverState *from,
2223 BlockDriverState *to)
2224{
9bd910e2 2225 BdrvChild *c, *next, *to_c;
dd62f1ca
KW
2226
2227 QLIST_FOREACH_SAFE(c, &from->parents, next_parent, next) {
9bd910e2
HR
2228 if (c->role == &child_backing) {
2229 /* @from is generally not allowed to be a backing file, except for
2230 * when @to is the overlay. In that case, @from may not be replaced
2231 * by @to as @to's backing node. */
2232 QLIST_FOREACH(to_c, &to->children, next) {
2233 if (to_c == c) {
2234 break;
2235 }
2236 }
2237 if (to_c) {
2238 continue;
2239 }
2240 }
2241
dd62f1ca 2242 assert(c->role != &child_backing);
dd62f1ca 2243 bdrv_ref(to);
e9740bc6 2244 bdrv_replace_child(c, to);
dd62f1ca
KW
2245 bdrv_unref(from);
2246 }
dd62f1ca
KW
2247}
2248
4ddc07ca
PB
2249/*
2250 * Add new bs contents at the top of an image chain while the chain is
2251 * live, while keeping required fields on the top layer.
2252 *
2253 * This will modify the BlockDriverState fields, and swap contents
2254 * between bs_new and bs_top. Both bs_new and bs_top are modified.
2255 *
bfb197e0 2256 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2257 *
2258 * This function does not create any image files.
dd62f1ca
KW
2259 *
2260 * bdrv_append() takes ownership of a bs_new reference and unrefs it because
2261 * that's what the callers commonly need. bs_new will be referenced by the old
2262 * parents of bs_top after bdrv_append() returns. If the caller needs to keep a
2263 * reference of its own, it must call bdrv_ref().
4ddc07ca
PB
2264 */
2265void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top)
2266{
dd62f1ca
KW
2267 assert(!bdrv_requests_pending(bs_top));
2268 assert(!bdrv_requests_pending(bs_new));
2269
2270 bdrv_ref(bs_top);
dd62f1ca 2271
27ccdd52 2272 change_parent_backing_link(bs_top, bs_new);
dd62f1ca
KW
2273 bdrv_set_backing_hd(bs_new, bs_top);
2274 bdrv_unref(bs_top);
4ddc07ca 2275
dd62f1ca
KW
2276 /* bs_new is now referenced by its new parents, we don't need the
2277 * additional reference any more. */
2278 bdrv_unref(bs_new);
8802d1fd
JC
2279}
2280
3f09bfbc
KW
2281void bdrv_replace_in_backing_chain(BlockDriverState *old, BlockDriverState *new)
2282{
2283 assert(!bdrv_requests_pending(old));
2284 assert(!bdrv_requests_pending(new));
2285
2286 bdrv_ref(old);
2287
3f09bfbc
KW
2288 change_parent_backing_link(old, new);
2289
3f09bfbc
KW
2290 bdrv_unref(old);
2291}
2292
4f6fd349 2293static void bdrv_delete(BlockDriverState *bs)
b338082b 2294{
3e914655 2295 assert(!bs->job);
3718d8ab 2296 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 2297 assert(!bs->refcnt);
18846dee 2298
e1b5c52e
SH
2299 bdrv_close(bs);
2300
1b7bdbc1 2301 /* remove from list, if necessary */
63eaaae0
KW
2302 if (bs->node_name[0] != '\0') {
2303 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
2304 }
2c1d04e0
HR
2305 QTAILQ_REMOVE(&all_bdrv_states, bs, bs_list);
2306
7267c094 2307 g_free(bs);
fc01f7e7
FB
2308}
2309
e97fc193
AL
2310/*
2311 * Run consistency checks on an image
2312 *
e076f338 2313 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 2314 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 2315 * check are stored in res.
e97fc193 2316 */
4534ff54 2317int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 2318{
908bcd54
HR
2319 if (bs->drv == NULL) {
2320 return -ENOMEDIUM;
2321 }
e97fc193
AL
2322 if (bs->drv->bdrv_check == NULL) {
2323 return -ENOTSUP;
2324 }
2325
e076f338 2326 memset(res, 0, sizeof(*res));
4534ff54 2327 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
2328}
2329
756e6736
KW
2330/*
2331 * Return values:
2332 * 0 - success
2333 * -EINVAL - backing format specified, but no file
2334 * -ENOSPC - can't update the backing file because no space is left in the
2335 * image file header
2336 * -ENOTSUP - format driver doesn't support changing the backing file
2337 */
2338int bdrv_change_backing_file(BlockDriverState *bs,
2339 const char *backing_file, const char *backing_fmt)
2340{
2341 BlockDriver *drv = bs->drv;
469ef350 2342 int ret;
756e6736 2343
5f377794
PB
2344 /* Backing file format doesn't make sense without a backing file */
2345 if (backing_fmt && !backing_file) {
2346 return -EINVAL;
2347 }
2348
756e6736 2349 if (drv->bdrv_change_backing_file != NULL) {
469ef350 2350 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 2351 } else {
469ef350 2352 ret = -ENOTSUP;
756e6736 2353 }
469ef350
PB
2354
2355 if (ret == 0) {
2356 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
2357 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
2358 }
2359 return ret;
756e6736
KW
2360}
2361
6ebdcee2
JC
2362/*
2363 * Finds the image layer in the chain that has 'bs' as its backing file.
2364 *
2365 * active is the current topmost image.
2366 *
2367 * Returns NULL if bs is not found in active's image chain,
2368 * or if active == bs.
4caf0fcd
JC
2369 *
2370 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
2371 */
2372BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
2373 BlockDriverState *bs)
2374{
760e0063
KW
2375 while (active && bs != backing_bs(active)) {
2376 active = backing_bs(active);
6ebdcee2
JC
2377 }
2378
4caf0fcd
JC
2379 return active;
2380}
6ebdcee2 2381
4caf0fcd
JC
2382/* Given a BDS, searches for the base layer. */
2383BlockDriverState *bdrv_find_base(BlockDriverState *bs)
2384{
2385 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
2386}
2387
6ebdcee2
JC
2388/*
2389 * Drops images above 'base' up to and including 'top', and sets the image
2390 * above 'top' to have base as its backing file.
2391 *
2392 * Requires that the overlay to 'top' is opened r/w, so that the backing file
2393 * information in 'bs' can be properly updated.
2394 *
2395 * E.g., this will convert the following chain:
2396 * bottom <- base <- intermediate <- top <- active
2397 *
2398 * to
2399 *
2400 * bottom <- base <- active
2401 *
2402 * It is allowed for bottom==base, in which case it converts:
2403 *
2404 * base <- intermediate <- top <- active
2405 *
2406 * to
2407 *
2408 * base <- active
2409 *
54e26900
JC
2410 * If backing_file_str is non-NULL, it will be used when modifying top's
2411 * overlay image metadata.
2412 *
6ebdcee2
JC
2413 * Error conditions:
2414 * if active == top, that is considered an error
2415 *
2416 */
2417int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 2418 BlockDriverState *base, const char *backing_file_str)
6ebdcee2 2419{
6ebdcee2 2420 BlockDriverState *new_top_bs = NULL;
6ebdcee2
JC
2421 int ret = -EIO;
2422
6ebdcee2
JC
2423 if (!top->drv || !base->drv) {
2424 goto exit;
2425 }
2426
2427 new_top_bs = bdrv_find_overlay(active, top);
2428
2429 if (new_top_bs == NULL) {
2430 /* we could not find the image above 'top', this is an error */
2431 goto exit;
2432 }
2433
760e0063 2434 /* special case of new_top_bs->backing->bs already pointing to base - nothing
6ebdcee2 2435 * to do, no intermediate images */
760e0063 2436 if (backing_bs(new_top_bs) == base) {
6ebdcee2
JC
2437 ret = 0;
2438 goto exit;
2439 }
2440
5db15a57
KW
2441 /* Make sure that base is in the backing chain of top */
2442 if (!bdrv_chain_contains(top, base)) {
6ebdcee2
JC
2443 goto exit;
2444 }
2445
2446 /* success - we can delete the intermediate states, and link top->base */
5db15a57 2447 backing_file_str = backing_file_str ? backing_file_str : base->filename;
54e26900 2448 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
5db15a57 2449 base->drv ? base->drv->format_name : "");
6ebdcee2
JC
2450 if (ret) {
2451 goto exit;
2452 }
5db15a57 2453 bdrv_set_backing_hd(new_top_bs, base);
6ebdcee2 2454
6ebdcee2 2455 ret = 0;
6ebdcee2 2456exit:
6ebdcee2
JC
2457 return ret;
2458}
2459
61007b31
SH
2460/**
2461 * Truncate file to 'offset' bytes (needed only for file protocols)
2462 */
2463int bdrv_truncate(BlockDriverState *bs, int64_t offset)
71d0770c 2464{
61007b31
SH
2465 BlockDriver *drv = bs->drv;
2466 int ret;
2467 if (!drv)
71d0770c 2468 return -ENOMEDIUM;
61007b31
SH
2469 if (!drv->bdrv_truncate)
2470 return -ENOTSUP;
2471 if (bs->read_only)
2472 return -EACCES;
71d0770c 2473
61007b31
SH
2474 ret = drv->bdrv_truncate(bs, offset);
2475 if (ret == 0) {
2476 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
2477 bdrv_dirty_bitmap_truncate(bs);
5c8cab48 2478 bdrv_parent_cb_resize(bs);
3ff2f67a 2479 ++bs->write_gen;
c0191e76 2480 }
61007b31 2481 return ret;
71d0770c
AL
2482}
2483
61007b31
SH
2484/**
2485 * Length of a allocated file in bytes. Sparse files are counted by actual
2486 * allocated space. Return < 0 if error or unknown.
2487 */
2488int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 2489{
61007b31
SH
2490 BlockDriver *drv = bs->drv;
2491 if (!drv) {
2492 return -ENOMEDIUM;
8f4754ed 2493 }
61007b31
SH
2494 if (drv->bdrv_get_allocated_file_size) {
2495 return drv->bdrv_get_allocated_file_size(bs);
2496 }
2497 if (bs->file) {
9a4f4c31 2498 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 2499 }
61007b31 2500 return -ENOTSUP;
1c9805a3 2501}
e7a8a783 2502
61007b31
SH
2503/**
2504 * Return number of sectors on success, -errno on error.
1c9805a3 2505 */
61007b31 2506int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 2507{
61007b31 2508 BlockDriver *drv = bs->drv;
498e386c 2509
61007b31
SH
2510 if (!drv)
2511 return -ENOMEDIUM;
2572b37a 2512
61007b31
SH
2513 if (drv->has_variable_length) {
2514 int ret = refresh_total_sectors(bs, bs->total_sectors);
2515 if (ret < 0) {
2516 return ret;
1c9805a3
SH
2517 }
2518 }
61007b31 2519 return bs->total_sectors;
1c9805a3 2520}
b338082b 2521
61007b31
SH
2522/**
2523 * Return length in bytes on success, -errno on error.
2524 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 2525 */
61007b31 2526int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 2527{
61007b31 2528 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 2529
4a9c9ea0 2530 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 2531 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
2532}
2533
61007b31
SH
2534/* return 0 as number of sectors if no device present or error */
2535void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 2536{
61007b31 2537 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 2538
61007b31 2539 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
2540}
2541
54115412 2542bool bdrv_is_read_only(BlockDriverState *bs)
8d3b1a2d 2543{
61007b31 2544 return bs->read_only;
83f64091 2545}
83f64091 2546
54115412 2547bool bdrv_is_sg(BlockDriverState *bs)
f08145fe 2548{
61007b31 2549 return bs->sg;
f08145fe
KW
2550}
2551
54115412 2552bool bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 2553{
760e0063 2554 if (bs->backing && bs->backing->bs->encrypted) {
54115412 2555 return true;
760e0063 2556 }
61007b31 2557 return bs->encrypted;
fc3959e4
FZ
2558}
2559
54115412 2560bool bdrv_key_required(BlockDriverState *bs)
fc3959e4 2561{
760e0063 2562 BdrvChild *backing = bs->backing;
61007b31 2563
760e0063 2564 if (backing && backing->bs->encrypted && !backing->bs->valid_key) {
54115412 2565 return true;
760e0063 2566 }
61007b31 2567 return (bs->encrypted && !bs->valid_key);
fc3959e4
FZ
2568}
2569
61007b31 2570int bdrv_set_key(BlockDriverState *bs, const char *key)
d0c7f642 2571{
d0c7f642 2572 int ret;
760e0063
KW
2573 if (bs->backing && bs->backing->bs->encrypted) {
2574 ret = bdrv_set_key(bs->backing->bs, key);
61007b31
SH
2575 if (ret < 0)
2576 return ret;
2577 if (!bs->encrypted)
2578 return 0;
2579 }
2580 if (!bs->encrypted) {
2581 return -EINVAL;
2582 } else if (!bs->drv || !bs->drv->bdrv_set_key) {
d0c7f642
KW
2583 return -ENOMEDIUM;
2584 }
61007b31 2585 ret = bs->drv->bdrv_set_key(bs, key);
b9c64947 2586 if (ret < 0) {
54115412 2587 bs->valid_key = false;
61007b31 2588 } else if (!bs->valid_key) {
5c8cab48 2589 /* call the change callback now, we skipped it on open */
54115412 2590 bs->valid_key = true;
5c8cab48 2591 bdrv_parent_cb_change_media(bs, true);
1b0288ae 2592 }
61007b31
SH
2593 return ret;
2594}
f08f2dda 2595
c5fbe571 2596/*
61007b31
SH
2597 * Provide an encryption key for @bs.
2598 * If @key is non-null:
2599 * If @bs is not encrypted, fail.
2600 * Else if the key is invalid, fail.
2601 * Else set @bs's key to @key, replacing the existing key, if any.
2602 * If @key is null:
2603 * If @bs is encrypted and still lacks a key, fail.
2604 * Else do nothing.
2605 * On failure, store an error object through @errp if non-null.
c5fbe571 2606 */
61007b31 2607void bdrv_add_key(BlockDriverState *bs, const char *key, Error **errp)
c5fbe571 2608{
61007b31
SH
2609 if (key) {
2610 if (!bdrv_is_encrypted(bs)) {
2611 error_setg(errp, "Node '%s' is not encrypted",
2612 bdrv_get_device_or_node_name(bs));
2613 } else if (bdrv_set_key(bs, key) < 0) {
c6bd8c70 2614 error_setg(errp, QERR_INVALID_PASSWORD);
4d2855a3
MA
2615 }
2616 } else {
2617 if (bdrv_key_required(bs)) {
b1ca6391
MA
2618 error_set(errp, ERROR_CLASS_DEVICE_ENCRYPTED,
2619 "'%s' (%s) is encrypted",
81e5f78a 2620 bdrv_get_device_or_node_name(bs),
4d2855a3
MA
2621 bdrv_get_encrypted_filename(bs));
2622 }
2623 }
2624}
2625
61007b31 2626const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 2627{
61007b31 2628 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
2629}
2630
61007b31 2631static int qsort_strcmp(const void *a, const void *b)
40b4f539 2632{
61007b31 2633 return strcmp(a, b);
40b4f539
KW
2634}
2635
61007b31
SH
2636void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
2637 void *opaque)
40b4f539 2638{
61007b31
SH
2639 BlockDriver *drv;
2640 int count = 0;
2641 int i;
2642 const char **formats = NULL;
40b4f539 2643
61007b31
SH
2644 QLIST_FOREACH(drv, &bdrv_drivers, list) {
2645 if (drv->format_name) {
2646 bool found = false;
2647 int i = count;
2648 while (formats && i && !found) {
2649 found = !strcmp(formats[--i], drv->format_name);
2650 }
e2a305fb 2651
61007b31
SH
2652 if (!found) {
2653 formats = g_renew(const char *, formats, count + 1);
2654 formats[count++] = drv->format_name;
2655 }
6c5a42ac 2656 }
61007b31 2657 }
6c5a42ac 2658
61007b31 2659 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 2660
61007b31
SH
2661 for (i = 0; i < count; i++) {
2662 it(opaque, formats[i]);
2663 }
40b4f539 2664
61007b31
SH
2665 g_free(formats);
2666}
40b4f539 2667
61007b31
SH
2668/* This function is to find a node in the bs graph */
2669BlockDriverState *bdrv_find_node(const char *node_name)
2670{
2671 BlockDriverState *bs;
391827eb 2672
61007b31 2673 assert(node_name);
40b4f539 2674
61007b31
SH
2675 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2676 if (!strcmp(node_name, bs->node_name)) {
2677 return bs;
40b4f539
KW
2678 }
2679 }
61007b31 2680 return NULL;
40b4f539
KW
2681}
2682
61007b31
SH
2683/* Put this QMP function here so it can access the static graph_bdrv_states. */
2684BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 2685{
61007b31
SH
2686 BlockDeviceInfoList *list, *entry;
2687 BlockDriverState *bs;
40b4f539 2688
61007b31
SH
2689 list = NULL;
2690 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
c83f9fba 2691 BlockDeviceInfo *info = bdrv_block_device_info(NULL, bs, errp);
61007b31
SH
2692 if (!info) {
2693 qapi_free_BlockDeviceInfoList(list);
2694 return NULL;
301db7c2 2695 }
61007b31
SH
2696 entry = g_malloc0(sizeof(*entry));
2697 entry->value = info;
2698 entry->next = list;
2699 list = entry;
301db7c2
RH
2700 }
2701
61007b31
SH
2702 return list;
2703}
40b4f539 2704
61007b31
SH
2705BlockDriverState *bdrv_lookup_bs(const char *device,
2706 const char *node_name,
2707 Error **errp)
2708{
2709 BlockBackend *blk;
2710 BlockDriverState *bs;
40b4f539 2711
61007b31
SH
2712 if (device) {
2713 blk = blk_by_name(device);
40b4f539 2714
61007b31 2715 if (blk) {
9f4ed6fb
AG
2716 bs = blk_bs(blk);
2717 if (!bs) {
5433c24f 2718 error_setg(errp, "Device '%s' has no medium", device);
5433c24f
HR
2719 }
2720
9f4ed6fb 2721 return bs;
61007b31
SH
2722 }
2723 }
40b4f539 2724
61007b31
SH
2725 if (node_name) {
2726 bs = bdrv_find_node(node_name);
6d519a5f 2727
61007b31
SH
2728 if (bs) {
2729 return bs;
2730 }
40b4f539
KW
2731 }
2732
61007b31
SH
2733 error_setg(errp, "Cannot find device=%s nor node_name=%s",
2734 device ? device : "",
2735 node_name ? node_name : "");
2736 return NULL;
40b4f539
KW
2737}
2738
61007b31
SH
2739/* If 'base' is in the same chain as 'top', return true. Otherwise,
2740 * return false. If either argument is NULL, return false. */
2741bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 2742{
61007b31 2743 while (top && top != base) {
760e0063 2744 top = backing_bs(top);
02c50efe 2745 }
61007b31
SH
2746
2747 return top != NULL;
02c50efe
FZ
2748}
2749
61007b31 2750BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 2751{
61007b31
SH
2752 if (!bs) {
2753 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 2754 }
61007b31 2755 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
2756}
2757
61007b31 2758const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 2759{
61007b31 2760 return bs->node_name;
beac80cd
FB
2761}
2762
1f0c461b 2763const char *bdrv_get_parent_name(const BlockDriverState *bs)
4c265bf9
KW
2764{
2765 BdrvChild *c;
2766 const char *name;
2767
2768 /* If multiple parents have a name, just pick the first one. */
2769 QLIST_FOREACH(c, &bs->parents, next_parent) {
2770 if (c->role->get_name) {
2771 name = c->role->get_name(c);
2772 if (name && *name) {
2773 return name;
2774 }
2775 }
2776 }
2777
2778 return NULL;
2779}
2780
61007b31
SH
2781/* TODO check what callers really want: bs->node_name or blk_name() */
2782const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 2783{
4c265bf9 2784 return bdrv_get_parent_name(bs) ?: "";
f141eafe 2785}
83f64091 2786
61007b31
SH
2787/* This can be used to identify nodes that might not have a device
2788 * name associated. Since node and device names live in the same
2789 * namespace, the result is unambiguous. The exception is if both are
2790 * absent, then this returns an empty (non-null) string. */
2791const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 2792{
4c265bf9 2793 return bdrv_get_parent_name(bs) ?: bs->node_name;
beac80cd 2794}
beac80cd 2795
61007b31 2796int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 2797{
61007b31 2798 return bs->open_flags;
0b5a2445
PB
2799}
2800
61007b31 2801int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 2802{
61007b31 2803 return 1;
0b5a2445
PB
2804}
2805
61007b31 2806int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 2807{
61007b31 2808 assert(bs->drv);
0b5a2445 2809
61007b31
SH
2810 /* If BS is a copy on write image, it is initialized to
2811 the contents of the base image, which may not be zeroes. */
760e0063 2812 if (bs->backing) {
61007b31
SH
2813 return 0;
2814 }
2815 if (bs->drv->bdrv_has_zero_init) {
2816 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 2817 }
61007b31
SH
2818
2819 /* safe default */
2820 return 0;
68485420
KW
2821}
2822
61007b31 2823bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 2824{
61007b31 2825 BlockDriverInfo bdi;
b2a61371 2826
760e0063 2827 if (bs->backing) {
61007b31
SH
2828 return false;
2829 }
2830
2831 if (bdrv_get_info(bs, &bdi) == 0) {
2832 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
2833 }
2834
61007b31 2835 return false;
b2a61371
SH
2836}
2837
61007b31 2838bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 2839{
61007b31 2840 BlockDriverInfo bdi;
68485420 2841
2f0342ef 2842 if (!(bs->open_flags & BDRV_O_UNMAP)) {
61007b31
SH
2843 return false;
2844 }
68485420 2845
61007b31
SH
2846 if (bdrv_get_info(bs, &bdi) == 0) {
2847 return bdi.can_write_zeroes_with_unmap;
2848 }
68485420 2849
61007b31 2850 return false;
68485420
KW
2851}
2852
61007b31 2853const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 2854{
760e0063 2855 if (bs->backing && bs->backing->bs->encrypted)
61007b31
SH
2856 return bs->backing_file;
2857 else if (bs->encrypted)
2858 return bs->filename;
2859 else
2860 return NULL;
b2e12bc6
CH
2861}
2862
61007b31
SH
2863void bdrv_get_backing_filename(BlockDriverState *bs,
2864 char *filename, int filename_size)
016f5cf6 2865{
61007b31
SH
2866 pstrcpy(filename, filename_size, bs->backing_file);
2867}
d318aea9 2868
61007b31
SH
2869int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
2870{
2871 BlockDriver *drv = bs->drv;
2872 if (!drv)
2873 return -ENOMEDIUM;
2874 if (!drv->bdrv_get_info)
2875 return -ENOTSUP;
2876 memset(bdi, 0, sizeof(*bdi));
2877 return drv->bdrv_get_info(bs, bdi);
2878}
016f5cf6 2879
61007b31
SH
2880ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
2881{
2882 BlockDriver *drv = bs->drv;
2883 if (drv && drv->bdrv_get_specific_info) {
2884 return drv->bdrv_get_specific_info(bs);
2885 }
2886 return NULL;
016f5cf6
AG
2887}
2888
a31939e6 2889void bdrv_debug_event(BlockDriverState *bs, BlkdebugEvent event)
4265d620 2890{
61007b31
SH
2891 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
2892 return;
2893 }
4265d620 2894
61007b31 2895 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
2896}
2897
61007b31
SH
2898int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
2899 const char *tag)
4265d620 2900{
61007b31 2901 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 2902 bs = bs->file ? bs->file->bs : NULL;
61007b31 2903 }
4265d620 2904
61007b31
SH
2905 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
2906 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
2907 }
4265d620 2908
61007b31 2909 return -ENOTSUP;
4265d620
PB
2910}
2911
61007b31 2912int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 2913{
61007b31 2914 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 2915 bs = bs->file ? bs->file->bs : NULL;
61007b31 2916 }
ce1a14dc 2917
61007b31
SH
2918 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
2919 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
2920 }
2921
2922 return -ENOTSUP;
eb852011
MA
2923}
2924
61007b31 2925int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 2926{
61007b31 2927 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 2928 bs = bs->file ? bs->file->bs : NULL;
61007b31 2929 }
ce1a14dc 2930
61007b31
SH
2931 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
2932 return bs->drv->bdrv_debug_resume(bs, tag);
2933 }
ce1a14dc 2934
61007b31 2935 return -ENOTSUP;
f197fe2b
FZ
2936}
2937
61007b31 2938bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 2939{
61007b31 2940 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 2941 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 2942 }
19cb3738 2943
61007b31
SH
2944 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
2945 return bs->drv->bdrv_debug_is_suspended(bs, tag);
2946 }
f9f05dc5 2947
61007b31
SH
2948 return false;
2949}
f9f05dc5 2950
61007b31 2951int bdrv_is_snapshot(BlockDriverState *bs)
f9f05dc5 2952{
61007b31 2953 return !!(bs->open_flags & BDRV_O_SNAPSHOT);
f9f05dc5
KW
2954}
2955
61007b31
SH
2956/* backing_file can either be relative, or absolute, or a protocol. If it is
2957 * relative, it must be relative to the chain. So, passing in bs->filename
2958 * from a BDS as backing_file should not be done, as that may be relative to
2959 * the CWD rather than the chain. */
2960BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
2961 const char *backing_file)
f9f05dc5 2962{
61007b31
SH
2963 char *filename_full = NULL;
2964 char *backing_file_full = NULL;
2965 char *filename_tmp = NULL;
2966 int is_protocol = 0;
2967 BlockDriverState *curr_bs = NULL;
2968 BlockDriverState *retval = NULL;
f9f05dc5 2969
61007b31
SH
2970 if (!bs || !bs->drv || !backing_file) {
2971 return NULL;
f9f05dc5
KW
2972 }
2973
61007b31
SH
2974 filename_full = g_malloc(PATH_MAX);
2975 backing_file_full = g_malloc(PATH_MAX);
2976 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 2977
61007b31 2978 is_protocol = path_has_protocol(backing_file);
f9f05dc5 2979
760e0063 2980 for (curr_bs = bs; curr_bs->backing; curr_bs = curr_bs->backing->bs) {
f9f05dc5 2981
61007b31
SH
2982 /* If either of the filename paths is actually a protocol, then
2983 * compare unmodified paths; otherwise make paths relative */
2984 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
2985 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
760e0063 2986 retval = curr_bs->backing->bs;
61007b31
SH
2987 break;
2988 }
2989 } else {
2990 /* If not an absolute filename path, make it relative to the current
2991 * image's filename path */
2992 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
2993 backing_file);
f9f05dc5 2994
61007b31
SH
2995 /* We are going to compare absolute pathnames */
2996 if (!realpath(filename_tmp, filename_full)) {
2997 continue;
2998 }
07f07615 2999
61007b31
SH
3000 /* We need to make sure the backing filename we are comparing against
3001 * is relative to the current image filename (or absolute) */
3002 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3003 curr_bs->backing_file);
07f07615 3004
61007b31
SH
3005 if (!realpath(filename_tmp, backing_file_full)) {
3006 continue;
3007 }
eb489bb1 3008
61007b31 3009 if (strcmp(backing_file_full, filename_full) == 0) {
760e0063 3010 retval = curr_bs->backing->bs;
61007b31
SH
3011 break;
3012 }
3013 }
eb489bb1
KW
3014 }
3015
61007b31
SH
3016 g_free(filename_full);
3017 g_free(backing_file_full);
3018 g_free(filename_tmp);
3019 return retval;
3020}
3021
3022int bdrv_get_backing_file_depth(BlockDriverState *bs)
3023{
3024 if (!bs->drv) {
3025 return 0;
eb489bb1
KW
3026 }
3027
760e0063 3028 if (!bs->backing) {
61007b31 3029 return 0;
ca716364
KW
3030 }
3031
760e0063 3032 return 1 + bdrv_get_backing_file_depth(bs->backing->bs);
61007b31 3033}
07f07615 3034
61007b31
SH
3035void bdrv_init(void)
3036{
3037 module_call_init(MODULE_INIT_BLOCK);
3038}
29cdb251 3039
61007b31
SH
3040void bdrv_init_with_whitelist(void)
3041{
3042 use_bdrv_whitelist = 1;
3043 bdrv_init();
07f07615
PB
3044}
3045
5a8a30db 3046void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 3047{
0d1c5c91 3048 BdrvChild *child;
5a8a30db
KW
3049 Error *local_err = NULL;
3050 int ret;
3051
3456a8d1
KW
3052 if (!bs->drv) {
3053 return;
3054 }
3055
04c01a5c 3056 if (!(bs->open_flags & BDRV_O_INACTIVE)) {
7ea2d269
AK
3057 return;
3058 }
04c01a5c 3059 bs->open_flags &= ~BDRV_O_INACTIVE;
7ea2d269 3060
3456a8d1 3061 if (bs->drv->bdrv_invalidate_cache) {
5a8a30db 3062 bs->drv->bdrv_invalidate_cache(bs, &local_err);
0d1c5c91
FZ
3063 if (local_err) {
3064 bs->open_flags |= BDRV_O_INACTIVE;
3065 error_propagate(errp, local_err);
3066 return;
3067 }
5a8a30db 3068 }
0d1c5c91
FZ
3069
3070 QLIST_FOREACH(child, &bs->children, next) {
3071 bdrv_invalidate_cache(child->bs, &local_err);
3072 if (local_err) {
3073 bs->open_flags |= BDRV_O_INACTIVE;
3074 error_propagate(errp, local_err);
3075 return;
3076 }
0f15423c 3077 }
3456a8d1 3078
5a8a30db
KW
3079 ret = refresh_total_sectors(bs, bs->total_sectors);
3080 if (ret < 0) {
04c01a5c 3081 bs->open_flags |= BDRV_O_INACTIVE;
5a8a30db
KW
3082 error_setg_errno(errp, -ret, "Could not refresh total sector count");
3083 return;
3084 }
0f15423c
AL
3085}
3086
5a8a30db 3087void bdrv_invalidate_cache_all(Error **errp)
0f15423c 3088{
7c8eece4 3089 BlockDriverState *bs;
5a8a30db 3090 Error *local_err = NULL;
88be7b4b 3091 BdrvNextIterator it;
0f15423c 3092
88be7b4b 3093 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
ed78cda3
SH
3094 AioContext *aio_context = bdrv_get_aio_context(bs);
3095
3096 aio_context_acquire(aio_context);
5a8a30db 3097 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 3098 aio_context_release(aio_context);
5a8a30db
KW
3099 if (local_err) {
3100 error_propagate(errp, local_err);
3101 return;
3102 }
0f15423c
AL
3103 }
3104}
3105
aad0b7a0
FZ
3106static int bdrv_inactivate_recurse(BlockDriverState *bs,
3107 bool setting_flag)
76b1c7fe 3108{
aad0b7a0 3109 BdrvChild *child;
76b1c7fe
KW
3110 int ret;
3111
aad0b7a0 3112 if (!setting_flag && bs->drv->bdrv_inactivate) {
76b1c7fe
KW
3113 ret = bs->drv->bdrv_inactivate(bs);
3114 if (ret < 0) {
3115 return ret;
3116 }
3117 }
3118
aad0b7a0
FZ
3119 QLIST_FOREACH(child, &bs->children, next) {
3120 ret = bdrv_inactivate_recurse(child->bs, setting_flag);
3121 if (ret < 0) {
3122 return ret;
3123 }
3124 }
3125
3126 if (setting_flag) {
3127 bs->open_flags |= BDRV_O_INACTIVE;
3128 }
76b1c7fe
KW
3129 return 0;
3130}
3131
3132int bdrv_inactivate_all(void)
3133{
79720af6 3134 BlockDriverState *bs = NULL;
88be7b4b 3135 BdrvNextIterator it;
aad0b7a0
FZ
3136 int ret = 0;
3137 int pass;
76b1c7fe 3138
88be7b4b 3139 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
3140 aio_context_acquire(bdrv_get_aio_context(bs));
3141 }
76b1c7fe 3142
aad0b7a0
FZ
3143 /* We do two passes of inactivation. The first pass calls to drivers'
3144 * .bdrv_inactivate callbacks recursively so all cache is flushed to disk;
3145 * the second pass sets the BDRV_O_INACTIVE flag so that no further write
3146 * is allowed. */
3147 for (pass = 0; pass < 2; pass++) {
88be7b4b 3148 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
3149 ret = bdrv_inactivate_recurse(bs, pass);
3150 if (ret < 0) {
3151 goto out;
3152 }
76b1c7fe
KW
3153 }
3154 }
3155
aad0b7a0 3156out:
88be7b4b 3157 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
3158 aio_context_release(bdrv_get_aio_context(bs));
3159 }
3160
3161 return ret;
76b1c7fe
KW
3162}
3163
19cb3738
FB
3164/**************************************************************/
3165/* removable device support */
3166
3167/**
3168 * Return TRUE if the media is present
3169 */
e031f750 3170bool bdrv_is_inserted(BlockDriverState *bs)
19cb3738
FB
3171{
3172 BlockDriver *drv = bs->drv;
28d7a789 3173 BdrvChild *child;
a1aff5bf 3174
e031f750
HR
3175 if (!drv) {
3176 return false;
3177 }
28d7a789
HR
3178 if (drv->bdrv_is_inserted) {
3179 return drv->bdrv_is_inserted(bs);
3180 }
3181 QLIST_FOREACH(child, &bs->children, next) {
3182 if (!bdrv_is_inserted(child->bs)) {
3183 return false;
3184 }
e031f750 3185 }
28d7a789 3186 return true;
19cb3738
FB
3187}
3188
3189/**
8e49ca46
MA
3190 * Return whether the media changed since the last call to this
3191 * function, or -ENOTSUP if we don't know. Most drivers don't know.
19cb3738
FB
3192 */
3193int bdrv_media_changed(BlockDriverState *bs)
3194{
3195 BlockDriver *drv = bs->drv;
19cb3738 3196
8e49ca46
MA
3197 if (drv && drv->bdrv_media_changed) {
3198 return drv->bdrv_media_changed(bs);
3199 }
3200 return -ENOTSUP;
19cb3738
FB
3201}
3202
3203/**
3204 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
3205 */
f36f3949 3206void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
3207{
3208 BlockDriver *drv = bs->drv;
bfb197e0 3209 const char *device_name;
19cb3738 3210
822e1cd1
MA
3211 if (drv && drv->bdrv_eject) {
3212 drv->bdrv_eject(bs, eject_flag);
19cb3738 3213 }
6f382ed2 3214
bfb197e0
MA
3215 device_name = bdrv_get_device_name(bs);
3216 if (device_name[0] != '\0') {
3217 qapi_event_send_device_tray_moved(device_name,
a5ee7bd4 3218 eject_flag, &error_abort);
6f382ed2 3219 }
19cb3738
FB
3220}
3221
19cb3738
FB
3222/**
3223 * Lock or unlock the media (if it is locked, the user won't be able
3224 * to eject it manually).
3225 */
025e849a 3226void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
3227{
3228 BlockDriver *drv = bs->drv;
3229
025e849a 3230 trace_bdrv_lock_medium(bs, locked);
b8c6d095 3231
025e849a
MA
3232 if (drv && drv->bdrv_lock_medium) {
3233 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
3234 }
3235}
985a03b0 3236
9fcb0251
FZ
3237/* Get a reference to bs */
3238void bdrv_ref(BlockDriverState *bs)
3239{
3240 bs->refcnt++;
3241}
3242
3243/* Release a previously grabbed reference to bs.
3244 * If after releasing, reference count is zero, the BlockDriverState is
3245 * deleted. */
3246void bdrv_unref(BlockDriverState *bs)
3247{
9a4d5ca6
JC
3248 if (!bs) {
3249 return;
3250 }
9fcb0251
FZ
3251 assert(bs->refcnt > 0);
3252 if (--bs->refcnt == 0) {
3253 bdrv_delete(bs);
3254 }
3255}
3256
fbe40ff7
FZ
3257struct BdrvOpBlocker {
3258 Error *reason;
3259 QLIST_ENTRY(BdrvOpBlocker) list;
3260};
3261
3262bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
3263{
3264 BdrvOpBlocker *blocker;
3265 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3266 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
3267 blocker = QLIST_FIRST(&bs->op_blockers[op]);
3268 if (errp) {
e43bfd9c
MA
3269 *errp = error_copy(blocker->reason);
3270 error_prepend(errp, "Node '%s' is busy: ",
3271 bdrv_get_device_or_node_name(bs));
fbe40ff7
FZ
3272 }
3273 return true;
3274 }
3275 return false;
3276}
3277
3278void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
3279{
3280 BdrvOpBlocker *blocker;
3281 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3282
5839e53b 3283 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
3284 blocker->reason = reason;
3285 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
3286}
3287
3288void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
3289{
3290 BdrvOpBlocker *blocker, *next;
3291 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3292 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
3293 if (blocker->reason == reason) {
3294 QLIST_REMOVE(blocker, list);
3295 g_free(blocker);
3296 }
3297 }
3298}
3299
3300void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
3301{
3302 int i;
3303 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3304 bdrv_op_block(bs, i, reason);
3305 }
3306}
3307
3308void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
3309{
3310 int i;
3311 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3312 bdrv_op_unblock(bs, i, reason);
3313 }
3314}
3315
3316bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
3317{
3318 int i;
3319
3320 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3321 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
3322 return false;
3323 }
3324 }
3325 return true;
3326}
3327
d92ada22
LC
3328void bdrv_img_create(const char *filename, const char *fmt,
3329 const char *base_filename, const char *base_fmt,
f382d43a
MR
3330 char *options, uint64_t img_size, int flags,
3331 Error **errp, bool quiet)
f88e1a42 3332{
83d0521a
CL
3333 QemuOptsList *create_opts = NULL;
3334 QemuOpts *opts = NULL;
3335 const char *backing_fmt, *backing_file;
3336 int64_t size;
f88e1a42 3337 BlockDriver *drv, *proto_drv;
cc84d90f 3338 Error *local_err = NULL;
f88e1a42
JS
3339 int ret = 0;
3340
3341 /* Find driver and parse its options */
3342 drv = bdrv_find_format(fmt);
3343 if (!drv) {
71c79813 3344 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 3345 return;
f88e1a42
JS
3346 }
3347
b65a5e12 3348 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 3349 if (!proto_drv) {
d92ada22 3350 return;
f88e1a42
JS
3351 }
3352
c6149724
HR
3353 if (!drv->create_opts) {
3354 error_setg(errp, "Format driver '%s' does not support image creation",
3355 drv->format_name);
3356 return;
3357 }
3358
3359 if (!proto_drv->create_opts) {
3360 error_setg(errp, "Protocol driver '%s' does not support image creation",
3361 proto_drv->format_name);
3362 return;
3363 }
3364
c282e1fd
CL
3365 create_opts = qemu_opts_append(create_opts, drv->create_opts);
3366 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
3367
3368 /* Create parameter list with default values */
83d0521a 3369 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 3370 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
3371
3372 /* Parse -o options */
3373 if (options) {
dc523cd3
MA
3374 qemu_opts_do_parse(opts, options, NULL, &local_err);
3375 if (local_err) {
3376 error_report_err(local_err);
3377 local_err = NULL;
83d0521a 3378 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
3379 goto out;
3380 }
3381 }
3382
3383 if (base_filename) {
f43e47db 3384 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 3385 if (local_err) {
71c79813
LC
3386 error_setg(errp, "Backing file not supported for file format '%s'",
3387 fmt);
f88e1a42
JS
3388 goto out;
3389 }
3390 }
3391
3392 if (base_fmt) {
f43e47db 3393 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 3394 if (local_err) {
71c79813
LC
3395 error_setg(errp, "Backing file format not supported for file "
3396 "format '%s'", fmt);
f88e1a42
JS
3397 goto out;
3398 }
3399 }
3400
83d0521a
CL
3401 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
3402 if (backing_file) {
3403 if (!strcmp(filename, backing_file)) {
71c79813
LC
3404 error_setg(errp, "Error: Trying to create an image with the "
3405 "same filename as the backing file");
792da93a
JS
3406 goto out;
3407 }
3408 }
3409
83d0521a 3410 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42
JS
3411
3412 // The size for the image must always be specified, with one exception:
3413 // If we are using a backing file, we can obtain the size from there
83d0521a
CL
3414 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
3415 if (size == -1) {
3416 if (backing_file) {
66f6b814 3417 BlockDriverState *bs;
29168018 3418 char *full_backing = g_new0(char, PATH_MAX);
52bf1e72 3419 int64_t size;
63090dac 3420 int back_flags;
e6641719 3421 QDict *backing_options = NULL;
63090dac 3422
29168018
HR
3423 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
3424 full_backing, PATH_MAX,
3425 &local_err);
3426 if (local_err) {
3427 g_free(full_backing);
3428 goto out;
3429 }
3430
63090dac 3431 /* backing files always opened read-only */
61de4c68 3432 back_flags = flags;
bfd18d1e 3433 back_flags &= ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 3434
e6641719
HR
3435 if (backing_fmt) {
3436 backing_options = qdict_new();
3437 qdict_put(backing_options, "driver",
3438 qstring_from_str(backing_fmt));
3439 }
3440
5b363937
HR
3441 bs = bdrv_open(full_backing, NULL, backing_options, back_flags,
3442 &local_err);
29168018 3443 g_free(full_backing);
5b363937 3444 if (!bs) {
f88e1a42
JS
3445 goto out;
3446 }
52bf1e72
MA
3447 size = bdrv_getlength(bs);
3448 if (size < 0) {
3449 error_setg_errno(errp, -size, "Could not get size of '%s'",
3450 backing_file);
3451 bdrv_unref(bs);
3452 goto out;
3453 }
f88e1a42 3454
39101f25 3455 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
66f6b814
HR
3456
3457 bdrv_unref(bs);
f88e1a42 3458 } else {
71c79813 3459 error_setg(errp, "Image creation needs a size parameter");
f88e1a42
JS
3460 goto out;
3461 }
3462 }
3463
f382d43a 3464 if (!quiet) {
fe646693 3465 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 3466 qemu_opts_print(opts, " ");
f382d43a
MR
3467 puts("");
3468 }
83d0521a 3469
c282e1fd 3470 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 3471
cc84d90f
HR
3472 if (ret == -EFBIG) {
3473 /* This is generally a better message than whatever the driver would
3474 * deliver (especially because of the cluster_size_hint), since that
3475 * is most probably not much different from "image too large". */
3476 const char *cluster_size_hint = "";
83d0521a 3477 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 3478 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 3479 }
cc84d90f
HR
3480 error_setg(errp, "The image size is too large for file format '%s'"
3481 "%s", fmt, cluster_size_hint);
3482 error_free(local_err);
3483 local_err = NULL;
f88e1a42
JS
3484 }
3485
3486out:
83d0521a
CL
3487 qemu_opts_del(opts);
3488 qemu_opts_free(create_opts);
621ff94d 3489 error_propagate(errp, local_err);
f88e1a42 3490}
85d126f3
SH
3491
3492AioContext *bdrv_get_aio_context(BlockDriverState *bs)
3493{
dcd04228
SH
3494 return bs->aio_context;
3495}
3496
e8a095da
SH
3497static void bdrv_do_remove_aio_context_notifier(BdrvAioNotifier *ban)
3498{
3499 QLIST_REMOVE(ban, list);
3500 g_free(ban);
3501}
3502
dcd04228
SH
3503void bdrv_detach_aio_context(BlockDriverState *bs)
3504{
e8a095da 3505 BdrvAioNotifier *baf, *baf_tmp;
b97511c7 3506 BdrvChild *child;
33384421 3507
dcd04228
SH
3508 if (!bs->drv) {
3509 return;
3510 }
3511
e8a095da
SH
3512 assert(!bs->walking_aio_notifiers);
3513 bs->walking_aio_notifiers = true;
3514 QLIST_FOREACH_SAFE(baf, &bs->aio_notifiers, list, baf_tmp) {
3515 if (baf->deleted) {
3516 bdrv_do_remove_aio_context_notifier(baf);
3517 } else {
3518 baf->detach_aio_context(baf->opaque);
3519 }
33384421 3520 }
e8a095da
SH
3521 /* Never mind iterating again to check for ->deleted. bdrv_close() will
3522 * remove remaining aio notifiers if we aren't called again.
3523 */
3524 bs->walking_aio_notifiers = false;
33384421 3525
dcd04228
SH
3526 if (bs->drv->bdrv_detach_aio_context) {
3527 bs->drv->bdrv_detach_aio_context(bs);
3528 }
b97511c7
HR
3529 QLIST_FOREACH(child, &bs->children, next) {
3530 bdrv_detach_aio_context(child->bs);
dcd04228
SH
3531 }
3532
3533 bs->aio_context = NULL;
3534}
3535
3536void bdrv_attach_aio_context(BlockDriverState *bs,
3537 AioContext *new_context)
3538{
e8a095da 3539 BdrvAioNotifier *ban, *ban_tmp;
b97511c7 3540 BdrvChild *child;
33384421 3541
dcd04228
SH
3542 if (!bs->drv) {
3543 return;
3544 }
3545
3546 bs->aio_context = new_context;
3547
b97511c7
HR
3548 QLIST_FOREACH(child, &bs->children, next) {
3549 bdrv_attach_aio_context(child->bs, new_context);
dcd04228
SH
3550 }
3551 if (bs->drv->bdrv_attach_aio_context) {
3552 bs->drv->bdrv_attach_aio_context(bs, new_context);
3553 }
33384421 3554
e8a095da
SH
3555 assert(!bs->walking_aio_notifiers);
3556 bs->walking_aio_notifiers = true;
3557 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_tmp) {
3558 if (ban->deleted) {
3559 bdrv_do_remove_aio_context_notifier(ban);
3560 } else {
3561 ban->attached_aio_context(new_context, ban->opaque);
3562 }
33384421 3563 }
e8a095da 3564 bs->walking_aio_notifiers = false;
dcd04228
SH
3565}
3566
3567void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
3568{
53ec73e2 3569 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228
SH
3570
3571 bdrv_detach_aio_context(bs);
3572
3573 /* This function executes in the old AioContext so acquire the new one in
3574 * case it runs in a different thread.
3575 */
3576 aio_context_acquire(new_context);
3577 bdrv_attach_aio_context(bs, new_context);
3578 aio_context_release(new_context);
85d126f3 3579}
d616b224 3580
33384421
HR
3581void bdrv_add_aio_context_notifier(BlockDriverState *bs,
3582 void (*attached_aio_context)(AioContext *new_context, void *opaque),
3583 void (*detach_aio_context)(void *opaque), void *opaque)
3584{
3585 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
3586 *ban = (BdrvAioNotifier){
3587 .attached_aio_context = attached_aio_context,
3588 .detach_aio_context = detach_aio_context,
3589 .opaque = opaque
3590 };
3591
3592 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
3593}
3594
3595void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
3596 void (*attached_aio_context)(AioContext *,
3597 void *),
3598 void (*detach_aio_context)(void *),
3599 void *opaque)
3600{
3601 BdrvAioNotifier *ban, *ban_next;
3602
3603 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
3604 if (ban->attached_aio_context == attached_aio_context &&
3605 ban->detach_aio_context == detach_aio_context &&
e8a095da
SH
3606 ban->opaque == opaque &&
3607 ban->deleted == false)
33384421 3608 {
e8a095da
SH
3609 if (bs->walking_aio_notifiers) {
3610 ban->deleted = true;
3611 } else {
3612 bdrv_do_remove_aio_context_notifier(ban);
3613 }
33384421
HR
3614 return;
3615 }
3616 }
3617
3618 abort();
3619}
3620
77485434 3621int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
8b13976d 3622 BlockDriverAmendStatusCB *status_cb, void *cb_opaque)
6f176b48 3623{
c282e1fd 3624 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
3625 return -ENOTSUP;
3626 }
8b13976d 3627 return bs->drv->bdrv_amend_options(bs, opts, status_cb, cb_opaque);
6f176b48 3628}
f6186f49 3629
b5042a36
BC
3630/* This function will be called by the bdrv_recurse_is_first_non_filter method
3631 * of block filter and by bdrv_is_first_non_filter.
3632 * It is used to test if the given bs is the candidate or recurse more in the
3633 * node graph.
212a5a8f 3634 */
b5042a36 3635bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 3636 BlockDriverState *candidate)
f6186f49 3637{
b5042a36
BC
3638 /* return false if basic checks fails */
3639 if (!bs || !bs->drv) {
212a5a8f 3640 return false;
f6186f49
BC
3641 }
3642
b5042a36
BC
3643 /* the code reached a non block filter driver -> check if the bs is
3644 * the same as the candidate. It's the recursion termination condition.
3645 */
3646 if (!bs->drv->is_filter) {
3647 return bs == candidate;
212a5a8f 3648 }
b5042a36 3649 /* Down this path the driver is a block filter driver */
212a5a8f 3650
b5042a36
BC
3651 /* If the block filter recursion method is defined use it to recurse down
3652 * the node graph.
3653 */
3654 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 3655 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
3656 }
3657
b5042a36
BC
3658 /* the driver is a block filter but don't allow to recurse -> return false
3659 */
3660 return false;
f6186f49
BC
3661}
3662
212a5a8f
BC
3663/* This function checks if the candidate is the first non filter bs down it's
3664 * bs chain. Since we don't have pointers to parents it explore all bs chains
3665 * from the top. Some filters can choose not to pass down the recursion.
3666 */
3667bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 3668{
7c8eece4 3669 BlockDriverState *bs;
88be7b4b 3670 BdrvNextIterator it;
212a5a8f
BC
3671
3672 /* walk down the bs forest recursively */
88be7b4b 3673 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
212a5a8f
BC
3674 bool perm;
3675
b5042a36 3676 /* try to recurse in this top level bs */
e6dc8a1f 3677 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
3678
3679 /* candidate is the first non filter */
3680 if (perm) {
3681 return true;
3682 }
3683 }
3684
3685 return false;
f6186f49 3686}
09158f00 3687
e12f3784
WC
3688BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
3689 const char *node_name, Error **errp)
09158f00
BC
3690{
3691 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
3692 AioContext *aio_context;
3693
09158f00
BC
3694 if (!to_replace_bs) {
3695 error_setg(errp, "Node name '%s' not found", node_name);
3696 return NULL;
3697 }
3698
5a7e7a0b
SH
3699 aio_context = bdrv_get_aio_context(to_replace_bs);
3700 aio_context_acquire(aio_context);
3701
09158f00 3702 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
3703 to_replace_bs = NULL;
3704 goto out;
09158f00
BC
3705 }
3706
3707 /* We don't want arbitrary node of the BDS chain to be replaced only the top
3708 * most non filter in order to prevent data corruption.
3709 * Another benefit is that this tests exclude backing files which are
3710 * blocked by the backing blockers.
3711 */
e12f3784 3712 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 3713 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
3714 to_replace_bs = NULL;
3715 goto out;
09158f00
BC
3716 }
3717
5a7e7a0b
SH
3718out:
3719 aio_context_release(aio_context);
09158f00
BC
3720 return to_replace_bs;
3721}
448ad91d 3722
91af7014
HR
3723static bool append_open_options(QDict *d, BlockDriverState *bs)
3724{
3725 const QDictEntry *entry;
9e700c1a 3726 QemuOptDesc *desc;
260fecf1 3727 BdrvChild *child;
91af7014 3728 bool found_any = false;
260fecf1 3729 const char *p;
91af7014
HR
3730
3731 for (entry = qdict_first(bs->options); entry;
3732 entry = qdict_next(bs->options, entry))
3733 {
260fecf1
KW
3734 /* Exclude options for children */
3735 QLIST_FOREACH(child, &bs->children, next) {
3736 if (strstart(qdict_entry_key(entry), child->name, &p)
3737 && (!*p || *p == '.'))
3738 {
3739 break;
3740 }
3741 }
3742 if (child) {
9e700c1a 3743 continue;
91af7014 3744 }
9e700c1a
KW
3745
3746 /* And exclude all non-driver-specific options */
3747 for (desc = bdrv_runtime_opts.desc; desc->name; desc++) {
3748 if (!strcmp(qdict_entry_key(entry), desc->name)) {
3749 break;
3750 }
3751 }
3752 if (desc->name) {
3753 continue;
3754 }
3755
3756 qobject_incref(qdict_entry_value(entry));
3757 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
3758 found_any = true;
91af7014
HR
3759 }
3760
3761 return found_any;
3762}
3763
3764/* Updates the following BDS fields:
3765 * - exact_filename: A filename which may be used for opening a block device
3766 * which (mostly) equals the given BDS (even without any
3767 * other options; so reading and writing must return the same
3768 * results, but caching etc. may be different)
3769 * - full_open_options: Options which, when given when opening a block device
3770 * (without a filename), result in a BDS (mostly)
3771 * equalling the given one
3772 * - filename: If exact_filename is set, it is copied here. Otherwise,
3773 * full_open_options is converted to a JSON object, prefixed with
3774 * "json:" (for use through the JSON pseudo protocol) and put here.
3775 */
3776void bdrv_refresh_filename(BlockDriverState *bs)
3777{
3778 BlockDriver *drv = bs->drv;
3779 QDict *opts;
3780
3781 if (!drv) {
3782 return;
3783 }
3784
3785 /* This BDS's file name will most probably depend on its file's name, so
3786 * refresh that first */
3787 if (bs->file) {
9a4f4c31 3788 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
3789 }
3790
3791 if (drv->bdrv_refresh_filename) {
3792 /* Obsolete information is of no use here, so drop the old file name
3793 * information before refreshing it */
3794 bs->exact_filename[0] = '\0';
3795 if (bs->full_open_options) {
3796 QDECREF(bs->full_open_options);
3797 bs->full_open_options = NULL;
3798 }
3799
4cdd01d3
KW
3800 opts = qdict_new();
3801 append_open_options(opts, bs);
3802 drv->bdrv_refresh_filename(bs, opts);
3803 QDECREF(opts);
91af7014
HR
3804 } else if (bs->file) {
3805 /* Try to reconstruct valid information from the underlying file */
3806 bool has_open_options;
3807
3808 bs->exact_filename[0] = '\0';
3809 if (bs->full_open_options) {
3810 QDECREF(bs->full_open_options);
3811 bs->full_open_options = NULL;
3812 }
3813
3814 opts = qdict_new();
3815 has_open_options = append_open_options(opts, bs);
3816
3817 /* If no specific options have been given for this BDS, the filename of
3818 * the underlying file should suffice for this one as well */
9a4f4c31
KW
3819 if (bs->file->bs->exact_filename[0] && !has_open_options) {
3820 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
3821 }
3822 /* Reconstructing the full options QDict is simple for most format block
3823 * drivers, as long as the full options are known for the underlying
3824 * file BDS. The full options QDict of that file BDS should somehow
3825 * contain a representation of the filename, therefore the following
3826 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 3827 if (bs->file->bs->full_open_options) {
91af7014
HR
3828 qdict_put_obj(opts, "driver",
3829 QOBJECT(qstring_from_str(drv->format_name)));
9a4f4c31
KW
3830 QINCREF(bs->file->bs->full_open_options);
3831 qdict_put_obj(opts, "file",
3832 QOBJECT(bs->file->bs->full_open_options));
91af7014
HR
3833
3834 bs->full_open_options = opts;
3835 } else {
3836 QDECREF(opts);
3837 }
3838 } else if (!bs->full_open_options && qdict_size(bs->options)) {
3839 /* There is no underlying file BDS (at least referenced by BDS.file),
3840 * so the full options QDict should be equal to the options given
3841 * specifically for this block device when it was opened (plus the
3842 * driver specification).
3843 * Because those options don't change, there is no need to update
3844 * full_open_options when it's already set. */
3845
3846 opts = qdict_new();
3847 append_open_options(opts, bs);
3848 qdict_put_obj(opts, "driver",
3849 QOBJECT(qstring_from_str(drv->format_name)));
3850
3851 if (bs->exact_filename[0]) {
3852 /* This may not work for all block protocol drivers (some may
3853 * require this filename to be parsed), but we have to find some
3854 * default solution here, so just include it. If some block driver
3855 * does not support pure options without any filename at all or
3856 * needs some special format of the options QDict, it needs to
3857 * implement the driver-specific bdrv_refresh_filename() function.
3858 */
3859 qdict_put_obj(opts, "filename",
3860 QOBJECT(qstring_from_str(bs->exact_filename)));
3861 }
3862
3863 bs->full_open_options = opts;
3864 }
3865
3866 if (bs->exact_filename[0]) {
3867 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
3868 } else if (bs->full_open_options) {
3869 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
3870 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
3871 qstring_get_str(json));
3872 QDECREF(json);
3873 }
3874}
e06018ad
WC
3875
3876/*
3877 * Hot add/remove a BDS's child. So the user can take a child offline when
3878 * it is broken and take a new child online
3879 */
3880void bdrv_add_child(BlockDriverState *parent_bs, BlockDriverState *child_bs,
3881 Error **errp)
3882{
3883
3884 if (!parent_bs->drv || !parent_bs->drv->bdrv_add_child) {
3885 error_setg(errp, "The node %s does not support adding a child",
3886 bdrv_get_device_or_node_name(parent_bs));
3887 return;
3888 }
3889
3890 if (!QLIST_EMPTY(&child_bs->parents)) {
3891 error_setg(errp, "The node %s already has a parent",
3892 child_bs->node_name);
3893 return;
3894 }
3895
3896 parent_bs->drv->bdrv_add_child(parent_bs, child_bs, errp);
3897}
3898
3899void bdrv_del_child(BlockDriverState *parent_bs, BdrvChild *child, Error **errp)
3900{
3901 BdrvChild *tmp;
3902
3903 if (!parent_bs->drv || !parent_bs->drv->bdrv_del_child) {
3904 error_setg(errp, "The node %s does not support removing a child",
3905 bdrv_get_device_or_node_name(parent_bs));
3906 return;
3907 }
3908
3909 QLIST_FOREACH(tmp, &parent_bs->children, next) {
3910 if (tmp == child) {
3911 break;
3912 }
3913 }
3914
3915 if (!tmp) {
3916 error_setg(errp, "The node %s does not have a child named %s",
3917 bdrv_get_device_or_node_name(parent_bs),
3918 bdrv_get_device_or_node_name(child->bs));
3919 return;
3920 }
3921
3922 parent_bs->drv->bdrv_del_child(parent_bs, child, errp);
3923}
This page took 1.932947 seconds and 4 git commands to generate.