]> Git Repo - qemu.git/blame - block.c
nbd: Always call "close_fn" in nbd_client_new
[qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
3990d09a 24#include "config-host.h"
faf07963 25#include "qemu-common.h"
6d519a5f 26#include "trace.h"
737e150e
PB
27#include "block/block_int.h"
28#include "block/blockjob.h"
d49b6836 29#include "qemu/error-report.h"
1de7afc9 30#include "qemu/module.h"
cc7a8ea7 31#include "qapi/qmp/qerror.h"
91a097e7 32#include "qapi/qmp/qbool.h"
7b1b5d19 33#include "qapi/qmp/qjson.h"
bfb197e0 34#include "sysemu/block-backend.h"
9c17d615 35#include "sysemu/sysemu.h"
1de7afc9 36#include "qemu/notify.h"
10817bf0 37#include "qemu/coroutine.h"
c13163fb 38#include "block/qapi.h"
b2023818 39#include "qmp-commands.h"
1de7afc9 40#include "qemu/timer.h"
a5ee7bd4 41#include "qapi-event.h"
db628338 42#include "block/throttle-groups.h"
fc01f7e7 43
71e72a19 44#ifdef CONFIG_BSD
7674e7bf
FB
45#include <sys/types.h>
46#include <sys/stat.h>
47#include <sys/ioctl.h>
72cf2d4f 48#include <sys/queue.h>
c5e97233 49#ifndef __DragonFly__
7674e7bf
FB
50#include <sys/disk.h>
51#endif
c5e97233 52#endif
7674e7bf 53
49dc768d
AL
54#ifdef _WIN32
55#include <windows.h>
56#endif
57
9bd2b08f
JS
58/**
59 * A BdrvDirtyBitmap can be in three possible states:
60 * (1) successor is NULL and disabled is false: full r/w mode
61 * (2) successor is NULL and disabled is true: read only mode ("disabled")
62 * (3) successor is set: frozen mode.
63 * A frozen bitmap cannot be renamed, deleted, anonymized, cleared, set,
64 * or enabled. A frozen bitmap can only abdicate() or reclaim().
65 */
e4654d2d 66struct BdrvDirtyBitmap {
aa0c7ca5
JS
67 HBitmap *bitmap; /* Dirty sector bitmap implementation */
68 BdrvDirtyBitmap *successor; /* Anonymous child; implies frozen status */
69 char *name; /* Optional non-empty unique ID */
70 int64_t size; /* Size of the bitmap (Number of sectors) */
71 bool disabled; /* Bitmap is read-only */
e4654d2d
FZ
72 QLIST_ENTRY(BdrvDirtyBitmap) list;
73};
74
1c9805a3
SH
75#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
76
c69a4dd8 77struct BdrvStates bdrv_states = QTAILQ_HEAD_INITIALIZER(bdrv_states);
7ee930d0 78
dc364f4c
BC
79static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
80 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
81
8a22f02a
SH
82static QLIST_HEAD(, BlockDriver) bdrv_drivers =
83 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 84
f3930ed0
KW
85static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
86 const char *reference, QDict *options, int flags,
87 BlockDriverState *parent,
ce343771 88 const BdrvChildRole *child_role, Error **errp);
f3930ed0 89
ce1ffea8 90static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs);
eb852011
MA
91/* If non-zero, use only whitelisted block drivers */
92static int use_bdrv_whitelist;
93
9e0b22f4
SH
94#ifdef _WIN32
95static int is_windows_drive_prefix(const char *filename)
96{
97 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
98 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
99 filename[1] == ':');
100}
101
102int is_windows_drive(const char *filename)
103{
104 if (is_windows_drive_prefix(filename) &&
105 filename[2] == '\0')
106 return 1;
107 if (strstart(filename, "\\\\.\\", NULL) ||
108 strstart(filename, "//./", NULL))
109 return 1;
110 return 0;
111}
112#endif
113
339064d5
KW
114size_t bdrv_opt_mem_align(BlockDriverState *bs)
115{
116 if (!bs || !bs->drv) {
459b4e66
DL
117 /* page size or 4k (hdd sector size) should be on the safe side */
118 return MAX(4096, getpagesize());
339064d5
KW
119 }
120
121 return bs->bl.opt_mem_alignment;
122}
123
4196d2f0
DL
124size_t bdrv_min_mem_align(BlockDriverState *bs)
125{
126 if (!bs || !bs->drv) {
459b4e66
DL
127 /* page size or 4k (hdd sector size) should be on the safe side */
128 return MAX(4096, getpagesize());
4196d2f0
DL
129 }
130
131 return bs->bl.min_mem_alignment;
132}
133
9e0b22f4 134/* check if the path starts with "<protocol>:" */
5c98415b 135int path_has_protocol(const char *path)
9e0b22f4 136{
947995c0
PB
137 const char *p;
138
9e0b22f4
SH
139#ifdef _WIN32
140 if (is_windows_drive(path) ||
141 is_windows_drive_prefix(path)) {
142 return 0;
143 }
947995c0
PB
144 p = path + strcspn(path, ":/\\");
145#else
146 p = path + strcspn(path, ":/");
9e0b22f4
SH
147#endif
148
947995c0 149 return *p == ':';
9e0b22f4
SH
150}
151
83f64091 152int path_is_absolute(const char *path)
3b0d4f61 153{
21664424
FB
154#ifdef _WIN32
155 /* specific case for names like: "\\.\d:" */
f53f4da9 156 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 157 return 1;
f53f4da9
PB
158 }
159 return (*path == '/' || *path == '\\');
3b9f94e1 160#else
f53f4da9 161 return (*path == '/');
3b9f94e1 162#endif
3b0d4f61
FB
163}
164
83f64091
FB
165/* if filename is absolute, just copy it to dest. Otherwise, build a
166 path to it by considering it is relative to base_path. URL are
167 supported. */
168void path_combine(char *dest, int dest_size,
169 const char *base_path,
170 const char *filename)
3b0d4f61 171{
83f64091
FB
172 const char *p, *p1;
173 int len;
174
175 if (dest_size <= 0)
176 return;
177 if (path_is_absolute(filename)) {
178 pstrcpy(dest, dest_size, filename);
179 } else {
180 p = strchr(base_path, ':');
181 if (p)
182 p++;
183 else
184 p = base_path;
3b9f94e1
FB
185 p1 = strrchr(base_path, '/');
186#ifdef _WIN32
187 {
188 const char *p2;
189 p2 = strrchr(base_path, '\\');
190 if (!p1 || p2 > p1)
191 p1 = p2;
192 }
193#endif
83f64091
FB
194 if (p1)
195 p1++;
196 else
197 p1 = base_path;
198 if (p1 > p)
199 p = p1;
200 len = p - base_path;
201 if (len > dest_size - 1)
202 len = dest_size - 1;
203 memcpy(dest, base_path, len);
204 dest[len] = '\0';
205 pstrcat(dest, dest_size, filename);
3b0d4f61 206 }
3b0d4f61
FB
207}
208
0a82855a
HR
209void bdrv_get_full_backing_filename_from_filename(const char *backed,
210 const char *backing,
9f07429e
HR
211 char *dest, size_t sz,
212 Error **errp)
dc5a1371 213{
9f07429e
HR
214 if (backing[0] == '\0' || path_has_protocol(backing) ||
215 path_is_absolute(backing))
216 {
0a82855a 217 pstrcpy(dest, sz, backing);
9f07429e
HR
218 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
219 error_setg(errp, "Cannot use relative backing file names for '%s'",
220 backed);
dc5a1371 221 } else {
0a82855a 222 path_combine(dest, sz, backed, backing);
dc5a1371
PB
223 }
224}
225
9f07429e
HR
226void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
227 Error **errp)
0a82855a 228{
9f07429e
HR
229 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
230
231 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
232 dest, sz, errp);
0a82855a
HR
233}
234
0eb7217e
SH
235void bdrv_register(BlockDriver *bdrv)
236{
237 bdrv_setup_io_funcs(bdrv);
b2e12bc6 238
8a22f02a 239 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 240}
b338082b 241
7f06d47e 242BlockDriverState *bdrv_new_root(void)
b338082b 243{
7f06d47e 244 BlockDriverState *bs = bdrv_new();
e4e9986b 245
e4e9986b 246 QTAILQ_INSERT_TAIL(&bdrv_states, bs, device_list);
e4e9986b
MA
247 return bs;
248}
249
250BlockDriverState *bdrv_new(void)
251{
252 BlockDriverState *bs;
253 int i;
254
5839e53b 255 bs = g_new0(BlockDriverState, 1);
e4654d2d 256 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
257 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
258 QLIST_INIT(&bs->op_blockers[i]);
259 }
d7d512f6 260 notifier_list_init(&bs->close_notifiers);
d616b224 261 notifier_with_return_list_init(&bs->before_write_notifiers);
cc0681c4
BC
262 qemu_co_queue_init(&bs->throttled_reqs[0]);
263 qemu_co_queue_init(&bs->throttled_reqs[1]);
9fcb0251 264 bs->refcnt = 1;
dcd04228 265 bs->aio_context = qemu_get_aio_context();
d7d512f6 266
b338082b
FB
267 return bs;
268}
269
d7d512f6
PB
270void bdrv_add_close_notifier(BlockDriverState *bs, Notifier *notify)
271{
272 notifier_list_add(&bs->close_notifiers, notify);
273}
274
ea2384d3
FB
275BlockDriver *bdrv_find_format(const char *format_name)
276{
277 BlockDriver *drv1;
8a22f02a
SH
278 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
279 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 280 return drv1;
8a22f02a 281 }
ea2384d3
FB
282 }
283 return NULL;
284}
285
b64ec4e4 286static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 287{
b64ec4e4
FZ
288 static const char *whitelist_rw[] = {
289 CONFIG_BDRV_RW_WHITELIST
290 };
291 static const char *whitelist_ro[] = {
292 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
293 };
294 const char **p;
295
b64ec4e4 296 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 297 return 1; /* no whitelist, anything goes */
b64ec4e4 298 }
eb852011 299
b64ec4e4 300 for (p = whitelist_rw; *p; p++) {
eb852011
MA
301 if (!strcmp(drv->format_name, *p)) {
302 return 1;
303 }
304 }
b64ec4e4
FZ
305 if (read_only) {
306 for (p = whitelist_ro; *p; p++) {
307 if (!strcmp(drv->format_name, *p)) {
308 return 1;
309 }
310 }
311 }
eb852011
MA
312 return 0;
313}
314
5b7e1542
ZYW
315typedef struct CreateCo {
316 BlockDriver *drv;
317 char *filename;
83d0521a 318 QemuOpts *opts;
5b7e1542 319 int ret;
cc84d90f 320 Error *err;
5b7e1542
ZYW
321} CreateCo;
322
323static void coroutine_fn bdrv_create_co_entry(void *opaque)
324{
cc84d90f
HR
325 Error *local_err = NULL;
326 int ret;
327
5b7e1542
ZYW
328 CreateCo *cco = opaque;
329 assert(cco->drv);
330
c282e1fd 331 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
84d18f06 332 if (local_err) {
cc84d90f
HR
333 error_propagate(&cco->err, local_err);
334 }
335 cco->ret = ret;
5b7e1542
ZYW
336}
337
0e7e1989 338int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 339 QemuOpts *opts, Error **errp)
ea2384d3 340{
5b7e1542
ZYW
341 int ret;
342
343 Coroutine *co;
344 CreateCo cco = {
345 .drv = drv,
346 .filename = g_strdup(filename),
83d0521a 347 .opts = opts,
5b7e1542 348 .ret = NOT_DONE,
cc84d90f 349 .err = NULL,
5b7e1542
ZYW
350 };
351
c282e1fd 352 if (!drv->bdrv_create) {
cc84d90f 353 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
354 ret = -ENOTSUP;
355 goto out;
5b7e1542
ZYW
356 }
357
358 if (qemu_in_coroutine()) {
359 /* Fast-path if already in coroutine context */
360 bdrv_create_co_entry(&cco);
361 } else {
362 co = qemu_coroutine_create(bdrv_create_co_entry);
363 qemu_coroutine_enter(co, &cco);
364 while (cco.ret == NOT_DONE) {
b47ec2c4 365 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
366 }
367 }
368
369 ret = cco.ret;
cc84d90f 370 if (ret < 0) {
84d18f06 371 if (cco.err) {
cc84d90f
HR
372 error_propagate(errp, cco.err);
373 } else {
374 error_setg_errno(errp, -ret, "Could not create image");
375 }
376 }
0e7e1989 377
80168bff
LC
378out:
379 g_free(cco.filename);
5b7e1542 380 return ret;
ea2384d3
FB
381}
382
c282e1fd 383int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
384{
385 BlockDriver *drv;
cc84d90f
HR
386 Error *local_err = NULL;
387 int ret;
84a12e66 388
b65a5e12 389 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 390 if (drv == NULL) {
16905d71 391 return -ENOENT;
84a12e66
CH
392 }
393
c282e1fd 394 ret = bdrv_create(drv, filename, opts, &local_err);
84d18f06 395 if (local_err) {
cc84d90f
HR
396 error_propagate(errp, local_err);
397 }
398 return ret;
84a12e66
CH
399}
400
892b7de8
ET
401/**
402 * Try to get @bs's logical and physical block size.
403 * On success, store them in @bsz struct and return 0.
404 * On failure return -errno.
405 * @bs must not be empty.
406 */
407int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
408{
409 BlockDriver *drv = bs->drv;
410
411 if (drv && drv->bdrv_probe_blocksizes) {
412 return drv->bdrv_probe_blocksizes(bs, bsz);
413 }
414
415 return -ENOTSUP;
416}
417
418/**
419 * Try to get @bs's geometry (cyls, heads, sectors).
420 * On success, store them in @geo struct and return 0.
421 * On failure return -errno.
422 * @bs must not be empty.
423 */
424int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
425{
426 BlockDriver *drv = bs->drv;
427
428 if (drv && drv->bdrv_probe_geometry) {
429 return drv->bdrv_probe_geometry(bs, geo);
430 }
431
432 return -ENOTSUP;
433}
434
eba25057
JM
435/*
436 * Create a uniquely-named empty temporary file.
437 * Return 0 upon success, otherwise a negative errno value.
438 */
439int get_tmp_filename(char *filename, int size)
d5249393 440{
eba25057 441#ifdef _WIN32
3b9f94e1 442 char temp_dir[MAX_PATH];
eba25057
JM
443 /* GetTempFileName requires that its output buffer (4th param)
444 have length MAX_PATH or greater. */
445 assert(size >= MAX_PATH);
446 return (GetTempPath(MAX_PATH, temp_dir)
447 && GetTempFileName(temp_dir, "qem", 0, filename)
448 ? 0 : -GetLastError());
d5249393 449#else
67b915a5 450 int fd;
7ccfb2eb 451 const char *tmpdir;
0badc1ee 452 tmpdir = getenv("TMPDIR");
69bef793
AS
453 if (!tmpdir) {
454 tmpdir = "/var/tmp";
455 }
eba25057
JM
456 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
457 return -EOVERFLOW;
458 }
ea2384d3 459 fd = mkstemp(filename);
fe235a06
DH
460 if (fd < 0) {
461 return -errno;
462 }
463 if (close(fd) != 0) {
464 unlink(filename);
eba25057
JM
465 return -errno;
466 }
467 return 0;
d5249393 468#endif
eba25057 469}
fc01f7e7 470
84a12e66
CH
471/*
472 * Detect host devices. By convention, /dev/cdrom[N] is always
473 * recognized as a host CDROM.
474 */
475static BlockDriver *find_hdev_driver(const char *filename)
476{
477 int score_max = 0, score;
478 BlockDriver *drv = NULL, *d;
479
480 QLIST_FOREACH(d, &bdrv_drivers, list) {
481 if (d->bdrv_probe_device) {
482 score = d->bdrv_probe_device(filename);
483 if (score > score_max) {
484 score_max = score;
485 drv = d;
486 }
487 }
488 }
489
490 return drv;
491}
492
98289620 493BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
494 bool allow_protocol_prefix,
495 Error **errp)
83f64091
FB
496{
497 BlockDriver *drv1;
498 char protocol[128];
1cec71e3 499 int len;
83f64091 500 const char *p;
19cb3738 501
66f82cee
KW
502 /* TODO Drivers without bdrv_file_open must be specified explicitly */
503
39508e7a
CH
504 /*
505 * XXX(hch): we really should not let host device detection
506 * override an explicit protocol specification, but moving this
507 * later breaks access to device names with colons in them.
508 * Thanks to the brain-dead persistent naming schemes on udev-
509 * based Linux systems those actually are quite common.
510 */
511 drv1 = find_hdev_driver(filename);
512 if (drv1) {
513 return drv1;
514 }
515
98289620 516 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 517 return &bdrv_file;
84a12e66 518 }
98289620 519
9e0b22f4
SH
520 p = strchr(filename, ':');
521 assert(p != NULL);
1cec71e3
AL
522 len = p - filename;
523 if (len > sizeof(protocol) - 1)
524 len = sizeof(protocol) - 1;
525 memcpy(protocol, filename, len);
526 protocol[len] = '\0';
8a22f02a 527 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
5fafdf24 528 if (drv1->protocol_name &&
8a22f02a 529 !strcmp(drv1->protocol_name, protocol)) {
83f64091 530 return drv1;
8a22f02a 531 }
83f64091 532 }
b65a5e12
HR
533
534 error_setg(errp, "Unknown protocol '%s'", protocol);
83f64091
FB
535 return NULL;
536}
537
c6684249
MA
538/*
539 * Guess image format by probing its contents.
540 * This is not a good idea when your image is raw (CVE-2008-2004), but
541 * we do it anyway for backward compatibility.
542 *
543 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
544 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
545 * but can be smaller if the image file is smaller)
c6684249
MA
546 * @filename is its filename.
547 *
548 * For all block drivers, call the bdrv_probe() method to get its
549 * probing score.
550 * Return the first block driver with the highest probing score.
551 */
38f3ef57
KW
552BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
553 const char *filename)
c6684249
MA
554{
555 int score_max = 0, score;
556 BlockDriver *drv = NULL, *d;
557
558 QLIST_FOREACH(d, &bdrv_drivers, list) {
559 if (d->bdrv_probe) {
560 score = d->bdrv_probe(buf, buf_size, filename);
561 if (score > score_max) {
562 score_max = score;
563 drv = d;
564 }
565 }
566 }
567
568 return drv;
569}
570
f500a6d3 571static int find_image_format(BlockDriverState *bs, const char *filename,
34b5d2c6 572 BlockDriver **pdrv, Error **errp)
f3a5d3f8 573{
c6684249 574 BlockDriver *drv;
7cddd372 575 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 576 int ret = 0;
f8ea0b00 577
08a00559 578 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
b192af8a 579 if (bdrv_is_sg(bs) || !bdrv_is_inserted(bs) || bdrv_getlength(bs) == 0) {
ef810437 580 *pdrv = &bdrv_raw;
c98ac35d 581 return ret;
1a396859 582 }
f8ea0b00 583
83f64091 584 ret = bdrv_pread(bs, 0, buf, sizeof(buf));
83f64091 585 if (ret < 0) {
34b5d2c6
HR
586 error_setg_errno(errp, -ret, "Could not read image for determining its "
587 "format");
c98ac35d
SW
588 *pdrv = NULL;
589 return ret;
83f64091
FB
590 }
591
c6684249 592 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 593 if (!drv) {
34b5d2c6
HR
594 error_setg(errp, "Could not determine image format: No compatible "
595 "driver found");
c98ac35d
SW
596 ret = -ENOENT;
597 }
598 *pdrv = drv;
599 return ret;
ea2384d3
FB
600}
601
51762288
SH
602/**
603 * Set the current 'total_sectors' value
65a9bb25 604 * Return 0 on success, -errno on error.
51762288
SH
605 */
606static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
607{
608 BlockDriver *drv = bs->drv;
609
396759ad 610 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 611 if (bdrv_is_sg(bs))
396759ad
NB
612 return 0;
613
51762288
SH
614 /* query actual device if possible, otherwise just trust the hint */
615 if (drv->bdrv_getlength) {
616 int64_t length = drv->bdrv_getlength(bs);
617 if (length < 0) {
618 return length;
619 }
7e382003 620 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
621 }
622
623 bs->total_sectors = hint;
624 return 0;
625}
626
cddff5ba
KW
627/**
628 * Combines a QDict of new block driver @options with any missing options taken
629 * from @old_options, so that leaving out an option defaults to its old value.
630 */
631static void bdrv_join_options(BlockDriverState *bs, QDict *options,
632 QDict *old_options)
633{
634 if (bs->drv && bs->drv->bdrv_join_options) {
635 bs->drv->bdrv_join_options(options, old_options);
636 } else {
637 qdict_join(options, old_options, false);
638 }
639}
640
9e8f1835
PB
641/**
642 * Set open flags for a given discard mode
643 *
644 * Return 0 on success, -1 if the discard mode was invalid.
645 */
646int bdrv_parse_discard_flags(const char *mode, int *flags)
647{
648 *flags &= ~BDRV_O_UNMAP;
649
650 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
651 /* do nothing */
652 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
653 *flags |= BDRV_O_UNMAP;
654 } else {
655 return -1;
656 }
657
658 return 0;
659}
660
c3993cdc
SH
661/**
662 * Set open flags for a given cache mode
663 *
664 * Return 0 on success, -1 if the cache mode was invalid.
665 */
666int bdrv_parse_cache_flags(const char *mode, int *flags)
667{
668 *flags &= ~BDRV_O_CACHE_MASK;
669
670 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
671 *flags |= BDRV_O_NOCACHE | BDRV_O_CACHE_WB;
92196b2f
SH
672 } else if (!strcmp(mode, "directsync")) {
673 *flags |= BDRV_O_NOCACHE;
c3993cdc
SH
674 } else if (!strcmp(mode, "writeback")) {
675 *flags |= BDRV_O_CACHE_WB;
676 } else if (!strcmp(mode, "unsafe")) {
677 *flags |= BDRV_O_CACHE_WB;
678 *flags |= BDRV_O_NO_FLUSH;
679 } else if (!strcmp(mode, "writethrough")) {
680 /* this is the default */
681 } else {
682 return -1;
683 }
684
685 return 0;
686}
687
b1e6fc08
KW
688/*
689 * Returns the flags that a temporary snapshot should get, based on the
690 * originally requested flags (the originally requested image will have flags
691 * like a backing file)
692 */
693static int bdrv_temp_snapshot_flags(int flags)
694{
695 return (flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
696}
697
0b50cc88 698/*
8e2160e2
KW
699 * Returns the options and flags that bs->file should get if a protocol driver
700 * is expected, based on the given options and flags for the parent BDS
0b50cc88 701 */
8e2160e2
KW
702static void bdrv_inherited_options(int *child_flags, QDict *child_options,
703 int parent_flags, QDict *parent_options)
0b50cc88 704{
8e2160e2
KW
705 int flags = parent_flags;
706
0b50cc88
KW
707 /* Enable protocol handling, disable format probing for bs->file */
708 flags |= BDRV_O_PROTOCOL;
709
91a097e7
KW
710 /* If the cache mode isn't explicitly set, inherit direct and no-flush from
711 * the parent. */
712 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
713 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
714
0b50cc88 715 /* Our block drivers take care to send flushes and respect unmap policy,
91a097e7
KW
716 * so we can default to enable both on lower layers regardless of the
717 * corresponding parent options. */
718 qdict_set_default_str(child_options, BDRV_OPT_CACHE_WB, "on");
719 flags |= BDRV_O_UNMAP;
0b50cc88 720
0b50cc88 721 /* Clear flags that only apply to the top layer */
5669b44d 722 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ);
0b50cc88 723
8e2160e2 724 *child_flags = flags;
0b50cc88
KW
725}
726
f3930ed0 727const BdrvChildRole child_file = {
8e2160e2 728 .inherit_options = bdrv_inherited_options,
f3930ed0
KW
729};
730
731/*
8e2160e2
KW
732 * Returns the options and flags that bs->file should get if the use of formats
733 * (and not only protocols) is permitted for it, based on the given options and
734 * flags for the parent BDS
f3930ed0 735 */
8e2160e2
KW
736static void bdrv_inherited_fmt_options(int *child_flags, QDict *child_options,
737 int parent_flags, QDict *parent_options)
f3930ed0 738{
8e2160e2
KW
739 child_file.inherit_options(child_flags, child_options,
740 parent_flags, parent_options);
741
742 *child_flags &= ~BDRV_O_PROTOCOL;
f3930ed0
KW
743}
744
745const BdrvChildRole child_format = {
8e2160e2 746 .inherit_options = bdrv_inherited_fmt_options,
f3930ed0
KW
747};
748
317fc44e 749/*
8e2160e2
KW
750 * Returns the options and flags that bs->backing should get, based on the
751 * given options and flags for the parent BDS
317fc44e 752 */
8e2160e2
KW
753static void bdrv_backing_options(int *child_flags, QDict *child_options,
754 int parent_flags, QDict *parent_options)
317fc44e 755{
8e2160e2
KW
756 int flags = parent_flags;
757
91a097e7
KW
758 /* The cache mode is inherited unmodified for backing files */
759 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_WB);
760 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
761 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
762
317fc44e
KW
763 /* backing files always opened read-only */
764 flags &= ~(BDRV_O_RDWR | BDRV_O_COPY_ON_READ);
765
766 /* snapshot=on is handled on the top layer */
8bfea15d 767 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e 768
8e2160e2 769 *child_flags = flags;
317fc44e
KW
770}
771
f3930ed0 772static const BdrvChildRole child_backing = {
8e2160e2 773 .inherit_options = bdrv_backing_options,
f3930ed0
KW
774};
775
7b272452
KW
776static int bdrv_open_flags(BlockDriverState *bs, int flags)
777{
778 int open_flags = flags | BDRV_O_CACHE_WB;
779
780 /*
781 * Clear flags that are internal to the block layer before opening the
782 * image.
783 */
20cca275 784 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
785
786 /*
787 * Snapshots should be writable.
788 */
8bfea15d 789 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
790 open_flags |= BDRV_O_RDWR;
791 }
792
793 return open_flags;
794}
795
91a097e7
KW
796static void update_flags_from_options(int *flags, QemuOpts *opts)
797{
798 *flags &= ~BDRV_O_CACHE_MASK;
799
800 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_WB));
801 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_WB, false)) {
802 *flags |= BDRV_O_CACHE_WB;
803 }
804
805 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_NO_FLUSH));
806 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_NO_FLUSH, false)) {
807 *flags |= BDRV_O_NO_FLUSH;
808 }
809
810 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_DIRECT));
811 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_DIRECT, false)) {
812 *flags |= BDRV_O_NOCACHE;
813 }
814}
815
816static void update_options_from_flags(QDict *options, int flags)
817{
818 if (!qdict_haskey(options, BDRV_OPT_CACHE_WB)) {
819 qdict_put(options, BDRV_OPT_CACHE_WB,
820 qbool_from_bool(flags & BDRV_O_CACHE_WB));
821 }
822 if (!qdict_haskey(options, BDRV_OPT_CACHE_DIRECT)) {
823 qdict_put(options, BDRV_OPT_CACHE_DIRECT,
824 qbool_from_bool(flags & BDRV_O_NOCACHE));
825 }
826 if (!qdict_haskey(options, BDRV_OPT_CACHE_NO_FLUSH)) {
827 qdict_put(options, BDRV_OPT_CACHE_NO_FLUSH,
828 qbool_from_bool(flags & BDRV_O_NO_FLUSH));
829 }
830}
831
636ea370
KW
832static void bdrv_assign_node_name(BlockDriverState *bs,
833 const char *node_name,
834 Error **errp)
6913c0c2 835{
15489c76 836 char *gen_node_name = NULL;
6913c0c2 837
15489c76
JC
838 if (!node_name) {
839 node_name = gen_node_name = id_generate(ID_BLOCK);
840 } else if (!id_wellformed(node_name)) {
841 /*
842 * Check for empty string or invalid characters, but not if it is
843 * generated (generated names use characters not available to the user)
844 */
9aebf3b8 845 error_setg(errp, "Invalid node name");
636ea370 846 return;
6913c0c2
BC
847 }
848
0c5e94ee 849 /* takes care of avoiding namespaces collisions */
7f06d47e 850 if (blk_by_name(node_name)) {
0c5e94ee
BC
851 error_setg(errp, "node-name=%s is conflicting with a device id",
852 node_name);
15489c76 853 goto out;
0c5e94ee
BC
854 }
855
6913c0c2
BC
856 /* takes care of avoiding duplicates node names */
857 if (bdrv_find_node(node_name)) {
858 error_setg(errp, "Duplicate node name");
15489c76 859 goto out;
6913c0c2
BC
860 }
861
862 /* copy node name into the bs and insert it into the graph list */
863 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
864 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
15489c76
JC
865out:
866 g_free(gen_node_name);
6913c0c2
BC
867}
868
18edf289
KW
869static QemuOptsList bdrv_runtime_opts = {
870 .name = "bdrv_common",
871 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
872 .desc = {
873 {
874 .name = "node-name",
875 .type = QEMU_OPT_STRING,
876 .help = "Node name of the block device node",
877 },
62392ebb
KW
878 {
879 .name = "driver",
880 .type = QEMU_OPT_STRING,
881 .help = "Block driver to use for the node",
882 },
91a097e7
KW
883 {
884 .name = BDRV_OPT_CACHE_WB,
885 .type = QEMU_OPT_BOOL,
886 .help = "Enable writeback mode",
887 },
888 {
889 .name = BDRV_OPT_CACHE_DIRECT,
890 .type = QEMU_OPT_BOOL,
891 .help = "Bypass software writeback cache on the host",
892 },
893 {
894 .name = BDRV_OPT_CACHE_NO_FLUSH,
895 .type = QEMU_OPT_BOOL,
896 .help = "Ignore flush requests",
897 },
18edf289
KW
898 { /* end of list */ }
899 },
900};
901
57915332
KW
902/*
903 * Common part for opening disk images and files
b6ad491a
KW
904 *
905 * Removes all processed options from *options.
57915332 906 */
9a4f4c31 907static int bdrv_open_common(BlockDriverState *bs, BdrvChild *file,
62392ebb 908 QDict *options, int flags, Error **errp)
57915332
KW
909{
910 int ret, open_flags;
035fccdf 911 const char *filename;
62392ebb 912 const char *driver_name = NULL;
6913c0c2 913 const char *node_name = NULL;
18edf289 914 QemuOpts *opts;
62392ebb 915 BlockDriver *drv;
34b5d2c6 916 Error *local_err = NULL;
57915332 917
6405875c 918 assert(bs->file == NULL);
707ff828 919 assert(options != NULL && bs->options != options);
57915332 920
62392ebb
KW
921 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
922 qemu_opts_absorb_qdict(opts, options, &local_err);
923 if (local_err) {
924 error_propagate(errp, local_err);
925 ret = -EINVAL;
926 goto fail_opts;
927 }
928
929 driver_name = qemu_opt_get(opts, "driver");
930 drv = bdrv_find_format(driver_name);
931 assert(drv != NULL);
932
45673671 933 if (file != NULL) {
9a4f4c31 934 filename = file->bs->filename;
45673671
KW
935 } else {
936 filename = qdict_get_try_str(options, "filename");
937 }
938
765003db
KW
939 if (drv->bdrv_needs_filename && !filename) {
940 error_setg(errp, "The '%s' block driver requires a file name",
941 drv->format_name);
18edf289
KW
942 ret = -EINVAL;
943 goto fail_opts;
6913c0c2 944 }
6913c0c2 945
62392ebb
KW
946 trace_bdrv_open_common(bs, filename ?: "", flags, drv->format_name);
947
18edf289 948 node_name = qemu_opt_get(opts, "node-name");
636ea370 949 bdrv_assign_node_name(bs, node_name, &local_err);
0fb6395c 950 if (local_err) {
636ea370 951 error_propagate(errp, local_err);
18edf289
KW
952 ret = -EINVAL;
953 goto fail_opts;
5d186eb0
KW
954 }
955
c25f53b0 956 bs->request_alignment = 512;
0d51b4de 957 bs->zero_beyond_eof = true;
b64ec4e4
FZ
958 open_flags = bdrv_open_flags(bs, flags);
959 bs->read_only = !(open_flags & BDRV_O_RDWR);
960
961 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
962 error_setg(errp,
963 !bs->read_only && bdrv_is_whitelisted(drv, true)
964 ? "Driver '%s' can only be used for read-only devices"
965 : "Driver '%s' is not whitelisted",
966 drv->format_name);
18edf289
KW
967 ret = -ENOTSUP;
968 goto fail_opts;
b64ec4e4 969 }
57915332 970
53fec9d3 971 assert(bs->copy_on_read == 0); /* bdrv_new() and bdrv_close() make it so */
0ebd24e0
KW
972 if (flags & BDRV_O_COPY_ON_READ) {
973 if (!bs->read_only) {
974 bdrv_enable_copy_on_read(bs);
975 } else {
976 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
977 ret = -EINVAL;
978 goto fail_opts;
0ebd24e0 979 }
53fec9d3
SH
980 }
981
c2ad1b0c
KW
982 if (filename != NULL) {
983 pstrcpy(bs->filename, sizeof(bs->filename), filename);
984 } else {
985 bs->filename[0] = '\0';
986 }
91af7014 987 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 988
57915332 989 bs->drv = drv;
7267c094 990 bs->opaque = g_malloc0(drv->instance_size);
57915332 991
91a097e7
KW
992 /* Apply cache mode options */
993 update_flags_from_options(&bs->open_flags, opts);
994 bdrv_set_enable_write_cache(bs, bs->open_flags & BDRV_O_CACHE_WB);
e7c63796 995
66f82cee
KW
996 /* Open the image, either directly or using a protocol */
997 if (drv->bdrv_file_open) {
5d186eb0 998 assert(file == NULL);
030be321 999 assert(!drv->bdrv_needs_filename || filename != NULL);
34b5d2c6 1000 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
f500a6d3 1001 } else {
2af5ef70 1002 if (file == NULL) {
34b5d2c6
HR
1003 error_setg(errp, "Can't use '%s' as a block driver for the "
1004 "protocol level", drv->format_name);
2af5ef70
KW
1005 ret = -EINVAL;
1006 goto free_and_fail;
1007 }
f500a6d3 1008 bs->file = file;
34b5d2c6 1009 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
66f82cee
KW
1010 }
1011
57915332 1012 if (ret < 0) {
84d18f06 1013 if (local_err) {
34b5d2c6 1014 error_propagate(errp, local_err);
2fa9aa59
DH
1015 } else if (bs->filename[0]) {
1016 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
34b5d2c6
HR
1017 } else {
1018 error_setg_errno(errp, -ret, "Could not open image");
1019 }
57915332
KW
1020 goto free_and_fail;
1021 }
1022
a1f688f4
MA
1023 if (bs->encrypted) {
1024 error_report("Encrypted images are deprecated");
1025 error_printf("Support for them will be removed in a future release.\n"
1026 "You can use 'qemu-img convert' to convert your image"
1027 " to an unencrypted one.\n");
1028 }
1029
51762288
SH
1030 ret = refresh_total_sectors(bs, bs->total_sectors);
1031 if (ret < 0) {
34b5d2c6 1032 error_setg_errno(errp, -ret, "Could not refresh total sector count");
51762288 1033 goto free_and_fail;
57915332 1034 }
51762288 1035
3baca891
KW
1036 bdrv_refresh_limits(bs, &local_err);
1037 if (local_err) {
1038 error_propagate(errp, local_err);
1039 ret = -EINVAL;
1040 goto free_and_fail;
1041 }
1042
c25f53b0 1043 assert(bdrv_opt_mem_align(bs) != 0);
4196d2f0 1044 assert(bdrv_min_mem_align(bs) != 0);
b192af8a 1045 assert((bs->request_alignment != 0) || bdrv_is_sg(bs));
18edf289
KW
1046
1047 qemu_opts_del(opts);
57915332
KW
1048 return 0;
1049
1050free_and_fail:
f500a6d3 1051 bs->file = NULL;
7267c094 1052 g_free(bs->opaque);
57915332
KW
1053 bs->opaque = NULL;
1054 bs->drv = NULL;
18edf289
KW
1055fail_opts:
1056 qemu_opts_del(opts);
57915332
KW
1057 return ret;
1058}
1059
5e5c4f63
KW
1060static QDict *parse_json_filename(const char *filename, Error **errp)
1061{
1062 QObject *options_obj;
1063 QDict *options;
1064 int ret;
1065
1066 ret = strstart(filename, "json:", &filename);
1067 assert(ret);
1068
1069 options_obj = qobject_from_json(filename);
1070 if (!options_obj) {
1071 error_setg(errp, "Could not parse the JSON options");
1072 return NULL;
1073 }
1074
1075 if (qobject_type(options_obj) != QTYPE_QDICT) {
1076 qobject_decref(options_obj);
1077 error_setg(errp, "Invalid JSON object given");
1078 return NULL;
1079 }
1080
1081 options = qobject_to_qdict(options_obj);
1082 qdict_flatten(options);
1083
1084 return options;
1085}
1086
de3b53f0
KW
1087static void parse_json_protocol(QDict *options, const char **pfilename,
1088 Error **errp)
1089{
1090 QDict *json_options;
1091 Error *local_err = NULL;
1092
1093 /* Parse json: pseudo-protocol */
1094 if (!*pfilename || !g_str_has_prefix(*pfilename, "json:")) {
1095 return;
1096 }
1097
1098 json_options = parse_json_filename(*pfilename, &local_err);
1099 if (local_err) {
1100 error_propagate(errp, local_err);
1101 return;
1102 }
1103
1104 /* Options given in the filename have lower priority than options
1105 * specified directly */
1106 qdict_join(options, json_options, false);
1107 QDECREF(json_options);
1108 *pfilename = NULL;
1109}
1110
b6ce07aa 1111/*
f54120ff
KW
1112 * Fills in default options for opening images and converts the legacy
1113 * filename/flags pair to option QDict entries.
53a29513
HR
1114 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
1115 * block driver has been specified explicitly.
b6ce07aa 1116 */
de3b53f0 1117static int bdrv_fill_options(QDict **options, const char *filename,
053e1578 1118 int *flags, Error **errp)
ea2384d3 1119{
c2ad1b0c 1120 const char *drvname;
53a29513 1121 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 1122 bool parse_filename = false;
053e1578 1123 BlockDriver *drv = NULL;
34b5d2c6 1124 Error *local_err = NULL;
83f64091 1125
53a29513 1126 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1127 if (drvname) {
1128 drv = bdrv_find_format(drvname);
1129 if (!drv) {
1130 error_setg(errp, "Unknown driver '%s'", drvname);
1131 return -ENOENT;
1132 }
1133 /* If the user has explicitly specified the driver, this choice should
1134 * override the BDRV_O_PROTOCOL flag */
1135 protocol = drv->bdrv_file_open;
53a29513
HR
1136 }
1137
1138 if (protocol) {
1139 *flags |= BDRV_O_PROTOCOL;
1140 } else {
1141 *flags &= ~BDRV_O_PROTOCOL;
1142 }
1143
91a097e7
KW
1144 /* Translate cache options from flags into options */
1145 update_options_from_flags(*options, *flags);
1146
035fccdf 1147 /* Fetch the file name from the options QDict if necessary */
17b005f1 1148 if (protocol && filename) {
f54120ff
KW
1149 if (!qdict_haskey(*options, "filename")) {
1150 qdict_put(*options, "filename", qstring_from_str(filename));
1151 parse_filename = true;
1152 } else {
1153 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1154 "the same time");
1155 return -EINVAL;
1156 }
035fccdf
KW
1157 }
1158
c2ad1b0c 1159 /* Find the right block driver */
f54120ff 1160 filename = qdict_get_try_str(*options, "filename");
f54120ff 1161
053e1578
HR
1162 if (!drvname && protocol) {
1163 if (filename) {
1164 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1165 if (!drv) {
053e1578 1166 return -EINVAL;
17b005f1 1167 }
053e1578
HR
1168
1169 drvname = drv->format_name;
1170 qdict_put(*options, "driver", qstring_from_str(drvname));
1171 } else {
1172 error_setg(errp, "Must specify either driver or file");
1173 return -EINVAL;
98289620 1174 }
c2ad1b0c
KW
1175 }
1176
17b005f1 1177 assert(drv || !protocol);
c2ad1b0c 1178
f54120ff 1179 /* Driver-specific filename parsing */
17b005f1 1180 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1181 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1182 if (local_err) {
34b5d2c6 1183 error_propagate(errp, local_err);
f54120ff 1184 return -EINVAL;
6963a30d 1185 }
cd5d031e
HR
1186
1187 if (!drv->bdrv_needs_filename) {
1188 qdict_del(*options, "filename");
cd5d031e 1189 }
6963a30d
KW
1190 }
1191
d44f928a
HR
1192 if (runstate_check(RUN_STATE_INMIGRATE)) {
1193 *flags |= BDRV_O_INCOMING;
1194 }
1195
f54120ff
KW
1196 return 0;
1197}
1198
b4b059f6
KW
1199static BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
1200 BlockDriverState *child_bs,
260fecf1 1201 const char *child_name,
b4b059f6 1202 const BdrvChildRole *child_role)
df581792
KW
1203{
1204 BdrvChild *child = g_new(BdrvChild, 1);
1205 *child = (BdrvChild) {
1206 .bs = child_bs,
260fecf1 1207 .name = g_strdup(child_name),
df581792
KW
1208 .role = child_role,
1209 };
1210
1211 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
d42a8a93 1212 QLIST_INSERT_HEAD(&child_bs->parents, child, next_parent);
b4b059f6
KW
1213
1214 return child;
df581792
KW
1215}
1216
3f09bfbc 1217static void bdrv_detach_child(BdrvChild *child)
33a60407
KW
1218{
1219 QLIST_REMOVE(child, next);
d42a8a93 1220 QLIST_REMOVE(child, next_parent);
260fecf1 1221 g_free(child->name);
33a60407
KW
1222 g_free(child);
1223}
1224
1225void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
1226{
779020cb
KW
1227 BlockDriverState *child_bs;
1228
1229 if (child == NULL) {
1230 return;
1231 }
33a60407
KW
1232
1233 if (child->bs->inherits_from == parent) {
1234 child->bs->inherits_from = NULL;
1235 }
1236
779020cb 1237 child_bs = child->bs;
33a60407
KW
1238 bdrv_detach_child(child);
1239 bdrv_unref(child_bs);
1240}
1241
5db15a57
KW
1242/*
1243 * Sets the backing file link of a BDS. A new reference is created; callers
1244 * which don't need their own reference any more must call bdrv_unref().
1245 */
8d24cce1
FZ
1246void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd)
1247{
5db15a57
KW
1248 if (backing_hd) {
1249 bdrv_ref(backing_hd);
1250 }
8d24cce1 1251
760e0063 1252 if (bs->backing) {
826b6ca0 1253 assert(bs->backing_blocker);
760e0063 1254 bdrv_op_unblock_all(bs->backing->bs, bs->backing_blocker);
5db15a57 1255 bdrv_unref_child(bs, bs->backing);
826b6ca0
FZ
1256 } else if (backing_hd) {
1257 error_setg(&bs->backing_blocker,
81e5f78a
AG
1258 "node is used as backing hd of '%s'",
1259 bdrv_get_device_or_node_name(bs));
826b6ca0
FZ
1260 }
1261
8d24cce1 1262 if (!backing_hd) {
826b6ca0
FZ
1263 error_free(bs->backing_blocker);
1264 bs->backing_blocker = NULL;
760e0063 1265 bs->backing = NULL;
8d24cce1
FZ
1266 goto out;
1267 }
260fecf1 1268 bs->backing = bdrv_attach_child(bs, backing_hd, "backing", &child_backing);
8d24cce1
FZ
1269 bs->open_flags &= ~BDRV_O_NO_BACKING;
1270 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_hd->filename);
1271 pstrcpy(bs->backing_format, sizeof(bs->backing_format),
1272 backing_hd->drv ? backing_hd->drv->format_name : "");
826b6ca0 1273
760e0063 1274 bdrv_op_block_all(backing_hd, bs->backing_blocker);
826b6ca0 1275 /* Otherwise we won't be able to commit due to check in bdrv_commit */
760e0063 1276 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
826b6ca0 1277 bs->backing_blocker);
8d24cce1 1278out:
3baca891 1279 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
1280}
1281
31ca6d07
KW
1282/*
1283 * Opens the backing file for a BlockDriverState if not yet open
1284 *
d9b7b057
KW
1285 * bdref_key specifies the key for the image's BlockdevRef in the options QDict.
1286 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1287 * itself, all options starting with "${bdref_key}." are considered part of the
1288 * BlockdevRef.
1289 *
1290 * TODO Can this be unified with bdrv_open_image()?
31ca6d07 1291 */
d9b7b057
KW
1292int bdrv_open_backing_file(BlockDriverState *bs, QDict *parent_options,
1293 const char *bdref_key, Error **errp)
9156df12 1294{
1ba4b6a5 1295 char *backing_filename = g_malloc0(PATH_MAX);
d9b7b057
KW
1296 char *bdref_key_dot;
1297 const char *reference = NULL;
317fc44e 1298 int ret = 0;
8d24cce1 1299 BlockDriverState *backing_hd;
d9b7b057
KW
1300 QDict *options;
1301 QDict *tmp_parent_options = NULL;
34b5d2c6 1302 Error *local_err = NULL;
9156df12 1303
760e0063 1304 if (bs->backing != NULL) {
1ba4b6a5 1305 goto free_exit;
9156df12
PB
1306 }
1307
31ca6d07 1308 /* NULL means an empty set of options */
d9b7b057
KW
1309 if (parent_options == NULL) {
1310 tmp_parent_options = qdict_new();
1311 parent_options = tmp_parent_options;
31ca6d07
KW
1312 }
1313
9156df12 1314 bs->open_flags &= ~BDRV_O_NO_BACKING;
d9b7b057
KW
1315
1316 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1317 qdict_extract_subqdict(parent_options, &options, bdref_key_dot);
1318 g_free(bdref_key_dot);
1319
1320 reference = qdict_get_try_str(parent_options, bdref_key);
1321 if (reference || qdict_haskey(options, "file.filename")) {
1cb6f506
KW
1322 backing_filename[0] = '\0';
1323 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 1324 QDECREF(options);
1ba4b6a5 1325 goto free_exit;
dbecebdd 1326 } else {
9f07429e
HR
1327 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
1328 &local_err);
1329 if (local_err) {
1330 ret = -EINVAL;
1331 error_propagate(errp, local_err);
1332 QDECREF(options);
1333 goto free_exit;
1334 }
9156df12
PB
1335 }
1336
8ee79e70
KW
1337 if (!bs->drv || !bs->drv->supports_backing) {
1338 ret = -EINVAL;
1339 error_setg(errp, "Driver doesn't support backing files");
1340 QDECREF(options);
1341 goto free_exit;
1342 }
1343
c5f6e493
KW
1344 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
1345 qdict_put(options, "driver", qstring_from_str(bs->backing_format));
9156df12
PB
1346 }
1347
d9b7b057 1348 backing_hd = NULL;
f3930ed0
KW
1349 ret = bdrv_open_inherit(&backing_hd,
1350 *backing_filename ? backing_filename : NULL,
d9b7b057 1351 reference, options, 0, bs, &child_backing,
e43bfd9c 1352 errp);
9156df12 1353 if (ret < 0) {
9156df12 1354 bs->open_flags |= BDRV_O_NO_BACKING;
e43bfd9c 1355 error_prepend(errp, "Could not open backing file: ");
1ba4b6a5 1356 goto free_exit;
9156df12 1357 }
df581792 1358
5db15a57
KW
1359 /* Hook up the backing file link; drop our reference, bs owns the
1360 * backing_hd reference now */
8d24cce1 1361 bdrv_set_backing_hd(bs, backing_hd);
5db15a57 1362 bdrv_unref(backing_hd);
d80ac658 1363
d9b7b057
KW
1364 qdict_del(parent_options, bdref_key);
1365
1ba4b6a5
BC
1366free_exit:
1367 g_free(backing_filename);
d9b7b057 1368 QDECREF(tmp_parent_options);
1ba4b6a5 1369 return ret;
9156df12
PB
1370}
1371
da557aac
HR
1372/*
1373 * Opens a disk image whose options are given as BlockdevRef in another block
1374 * device's options.
1375 *
da557aac 1376 * If allow_none is true, no image will be opened if filename is false and no
b4b059f6 1377 * BlockdevRef is given. NULL will be returned, but errp remains unset.
da557aac
HR
1378 *
1379 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
1380 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1381 * itself, all options starting with "${bdref_key}." are considered part of the
1382 * BlockdevRef.
1383 *
1384 * The BlockdevRef will be removed from the options QDict.
1385 */
b4b059f6
KW
1386BdrvChild *bdrv_open_child(const char *filename,
1387 QDict *options, const char *bdref_key,
1388 BlockDriverState* parent,
1389 const BdrvChildRole *child_role,
1390 bool allow_none, Error **errp)
da557aac 1391{
b4b059f6
KW
1392 BdrvChild *c = NULL;
1393 BlockDriverState *bs;
da557aac
HR
1394 QDict *image_options;
1395 int ret;
1396 char *bdref_key_dot;
1397 const char *reference;
1398
df581792 1399 assert(child_role != NULL);
f67503e5 1400
da557aac
HR
1401 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1402 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
1403 g_free(bdref_key_dot);
1404
1405 reference = qdict_get_try_str(options, bdref_key);
1406 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 1407 if (!allow_none) {
da557aac
HR
1408 error_setg(errp, "A block device must be specified for \"%s\"",
1409 bdref_key);
da557aac 1410 }
b20e61e0 1411 QDECREF(image_options);
da557aac
HR
1412 goto done;
1413 }
1414
b4b059f6
KW
1415 bs = NULL;
1416 ret = bdrv_open_inherit(&bs, filename, reference, image_options, 0,
ce343771 1417 parent, child_role, errp);
df581792
KW
1418 if (ret < 0) {
1419 goto done;
1420 }
1421
260fecf1 1422 c = bdrv_attach_child(parent, bs, bdref_key, child_role);
da557aac
HR
1423
1424done:
1425 qdict_del(options, bdref_key);
b4b059f6
KW
1426 return c;
1427}
1428
6b8aeca5 1429int bdrv_append_temp_snapshot(BlockDriverState *bs, int flags, Error **errp)
b998875d
KW
1430{
1431 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 1432 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 1433 int64_t total_size;
83d0521a 1434 QemuOpts *opts = NULL;
b998875d
KW
1435 QDict *snapshot_options;
1436 BlockDriverState *bs_snapshot;
c2e0dbbf 1437 Error *local_err = NULL;
b998875d
KW
1438 int ret;
1439
1440 /* if snapshot, we create a temporary backing file and open it
1441 instead of opening 'filename' directly */
1442
1443 /* Get the required size from the image */
f187743a
KW
1444 total_size = bdrv_getlength(bs);
1445 if (total_size < 0) {
6b8aeca5 1446 ret = total_size;
f187743a 1447 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 1448 goto out;
f187743a 1449 }
b998875d
KW
1450
1451 /* Create the temporary image */
1ba4b6a5 1452 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
1453 if (ret < 0) {
1454 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 1455 goto out;
b998875d
KW
1456 }
1457
ef810437 1458 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 1459 &error_abort);
39101f25 1460 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
e43bfd9c 1461 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, errp);
83d0521a 1462 qemu_opts_del(opts);
b998875d 1463 if (ret < 0) {
e43bfd9c
MA
1464 error_prepend(errp, "Could not create temporary overlay '%s': ",
1465 tmp_filename);
1ba4b6a5 1466 goto out;
b998875d
KW
1467 }
1468
1469 /* Prepare a new options QDict for the temporary file */
1470 snapshot_options = qdict_new();
1471 qdict_put(snapshot_options, "file.driver",
1472 qstring_from_str("file"));
1473 qdict_put(snapshot_options, "file.filename",
1474 qstring_from_str(tmp_filename));
e6641719
HR
1475 qdict_put(snapshot_options, "driver",
1476 qstring_from_str("qcow2"));
b998875d 1477
e4e9986b 1478 bs_snapshot = bdrv_new();
b998875d
KW
1479
1480 ret = bdrv_open(&bs_snapshot, NULL, NULL, snapshot_options,
6ebf9aa2 1481 flags, &local_err);
b998875d
KW
1482 if (ret < 0) {
1483 error_propagate(errp, local_err);
1ba4b6a5 1484 goto out;
b998875d
KW
1485 }
1486
1487 bdrv_append(bs_snapshot, bs);
1ba4b6a5
BC
1488
1489out:
1490 g_free(tmp_filename);
6b8aeca5 1491 return ret;
b998875d
KW
1492}
1493
b6ce07aa
KW
1494/*
1495 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
1496 *
1497 * options is a QDict of options to pass to the block drivers, or NULL for an
1498 * empty set of options. The reference to the QDict belongs to the block layer
1499 * after the call (even on failure), so if the caller intends to reuse the
1500 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
1501 *
1502 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
1503 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
1504 *
1505 * The reference parameter may be used to specify an existing block device which
1506 * should be opened. If specified, neither options nor a filename may be given,
1507 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 1508 */
f3930ed0
KW
1509static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
1510 const char *reference, QDict *options, int flags,
1511 BlockDriverState *parent,
ce343771 1512 const BdrvChildRole *child_role, Error **errp)
ea2384d3 1513{
b6ce07aa 1514 int ret;
9a4f4c31
KW
1515 BdrvChild *file = NULL;
1516 BlockDriverState *bs;
ce343771 1517 BlockDriver *drv = NULL;
74fe54f2 1518 const char *drvname;
3e8c2e57 1519 const char *backing;
34b5d2c6 1520 Error *local_err = NULL;
b1e6fc08 1521 int snapshot_flags = 0;
712e7874 1522
f67503e5 1523 assert(pbs);
f3930ed0
KW
1524 assert(!child_role || !flags);
1525 assert(!child_role == !parent);
f67503e5 1526
ddf5636d
HR
1527 if (reference) {
1528 bool options_non_empty = options ? qdict_size(options) : false;
1529 QDECREF(options);
1530
1531 if (*pbs) {
1532 error_setg(errp, "Cannot reuse an existing BDS when referencing "
1533 "another block device");
1534 return -EINVAL;
1535 }
1536
1537 if (filename || options_non_empty) {
1538 error_setg(errp, "Cannot reference an existing block device with "
1539 "additional options or a new filename");
1540 return -EINVAL;
1541 }
1542
1543 bs = bdrv_lookup_bs(reference, reference, errp);
1544 if (!bs) {
1545 return -ENODEV;
1546 }
1547 bdrv_ref(bs);
1548 *pbs = bs;
1549 return 0;
1550 }
1551
f67503e5
HR
1552 if (*pbs) {
1553 bs = *pbs;
1554 } else {
e4e9986b 1555 bs = bdrv_new();
f67503e5
HR
1556 }
1557
de9c0cec
KW
1558 /* NULL means an empty set of options */
1559 if (options == NULL) {
1560 options = qdict_new();
1561 }
1562
145f598e 1563 /* json: syntax counts as explicit options, as if in the QDict */
de3b53f0
KW
1564 parse_json_protocol(options, &filename, &local_err);
1565 if (local_err) {
1566 ret = -EINVAL;
1567 goto fail;
1568 }
1569
145f598e
KW
1570 bs->explicit_options = qdict_clone_shallow(options);
1571
f3930ed0 1572 if (child_role) {
bddcec37 1573 bs->inherits_from = parent;
8e2160e2
KW
1574 child_role->inherit_options(&flags, options,
1575 parent->open_flags, parent->options);
f3930ed0
KW
1576 }
1577
de3b53f0 1578 ret = bdrv_fill_options(&options, filename, &flags, &local_err);
462f5bcf
KW
1579 if (local_err) {
1580 goto fail;
1581 }
1582
62392ebb
KW
1583 bs->open_flags = flags;
1584 bs->options = options;
1585 options = qdict_clone_shallow(options);
1586
76c591b0 1587 /* Find the right image format driver */
76c591b0
KW
1588 drvname = qdict_get_try_str(options, "driver");
1589 if (drvname) {
1590 drv = bdrv_find_format(drvname);
76c591b0
KW
1591 if (!drv) {
1592 error_setg(errp, "Unknown driver: '%s'", drvname);
1593 ret = -EINVAL;
1594 goto fail;
1595 }
1596 }
1597
1598 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 1599
3e8c2e57
AG
1600 backing = qdict_get_try_str(options, "backing");
1601 if (backing && *backing == '\0') {
1602 flags |= BDRV_O_NO_BACKING;
1603 qdict_del(options, "backing");
1604 }
1605
f500a6d3 1606 /* Open image file without format layer */
f4788adc
KW
1607 if ((flags & BDRV_O_PROTOCOL) == 0) {
1608 if (flags & BDRV_O_RDWR) {
1609 flags |= BDRV_O_ALLOW_RDWR;
1610 }
1611 if (flags & BDRV_O_SNAPSHOT) {
1612 snapshot_flags = bdrv_temp_snapshot_flags(flags);
8e2160e2 1613 bdrv_backing_options(&flags, options, flags, options);
f4788adc 1614 }
f500a6d3 1615
f3930ed0 1616 bs->open_flags = flags;
1fdd6933 1617
9a4f4c31
KW
1618 file = bdrv_open_child(filename, options, "file", bs,
1619 &child_file, true, &local_err);
1fdd6933
KW
1620 if (local_err) {
1621 ret = -EINVAL;
f4788adc
KW
1622 goto fail;
1623 }
f500a6d3
KW
1624 }
1625
76c591b0 1626 /* Image format probing */
38f3ef57 1627 bs->probed = !drv;
76c591b0 1628 if (!drv && file) {
9a4f4c31 1629 ret = find_image_format(file->bs, filename, &drv, &local_err);
17b005f1 1630 if (ret < 0) {
8bfea15d 1631 goto fail;
2a05cbe4 1632 }
62392ebb
KW
1633 /*
1634 * This option update would logically belong in bdrv_fill_options(),
1635 * but we first need to open bs->file for the probing to work, while
1636 * opening bs->file already requires the (mostly) final set of options
1637 * so that cache mode etc. can be inherited.
1638 *
1639 * Adding the driver later is somewhat ugly, but it's not an option
1640 * that would ever be inherited, so it's correct. We just need to make
1641 * sure to update both bs->options (which has the full effective
1642 * options for bs) and options (which has file.* already removed).
1643 */
1644 qdict_put(bs->options, "driver", qstring_from_str(drv->format_name));
1645 qdict_put(options, "driver", qstring_from_str(drv->format_name));
76c591b0 1646 } else if (!drv) {
17b005f1
KW
1647 error_setg(errp, "Must specify either driver or file");
1648 ret = -EINVAL;
8bfea15d 1649 goto fail;
ea2384d3 1650 }
b6ce07aa 1651
53a29513
HR
1652 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
1653 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
1654 /* file must be NULL if a protocol BDS is about to be created
1655 * (the inverse results in an error message from bdrv_open_common()) */
1656 assert(!(flags & BDRV_O_PROTOCOL) || !file);
1657
b6ce07aa 1658 /* Open the image */
62392ebb 1659 ret = bdrv_open_common(bs, file, options, flags, &local_err);
b6ce07aa 1660 if (ret < 0) {
8bfea15d 1661 goto fail;
6987307c
CH
1662 }
1663
2a05cbe4 1664 if (file && (bs->file != file)) {
9a4f4c31 1665 bdrv_unref_child(bs, file);
f500a6d3
KW
1666 file = NULL;
1667 }
1668
b6ce07aa 1669 /* If there is a backing file, use it */
9156df12 1670 if ((flags & BDRV_O_NO_BACKING) == 0) {
d9b7b057 1671 ret = bdrv_open_backing_file(bs, options, "backing", &local_err);
b6ce07aa 1672 if (ret < 0) {
b6ad491a 1673 goto close_and_fail;
b6ce07aa 1674 }
b6ce07aa
KW
1675 }
1676
91af7014
HR
1677 bdrv_refresh_filename(bs);
1678
b6ad491a 1679 /* Check if any unknown options were used */
5acd9d81 1680 if (options && (qdict_size(options) != 0)) {
b6ad491a 1681 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
1682 if (flags & BDRV_O_PROTOCOL) {
1683 error_setg(errp, "Block protocol '%s' doesn't support the option "
1684 "'%s'", drv->format_name, entry->key);
1685 } else {
1686 error_setg(errp, "Block format '%s' used by device '%s' doesn't "
1687 "support the option '%s'", drv->format_name,
bfb197e0 1688 bdrv_get_device_name(bs), entry->key);
5acd9d81 1689 }
b6ad491a
KW
1690
1691 ret = -EINVAL;
1692 goto close_and_fail;
1693 }
b6ad491a 1694
b6ce07aa 1695 if (!bdrv_key_required(bs)) {
a7f53e26
MA
1696 if (bs->blk) {
1697 blk_dev_change_media_cb(bs->blk, true);
1698 }
c3adb58f
MA
1699 } else if (!runstate_check(RUN_STATE_PRELAUNCH)
1700 && !runstate_check(RUN_STATE_INMIGRATE)
1701 && !runstate_check(RUN_STATE_PAUSED)) { /* HACK */
1702 error_setg(errp,
1703 "Guest must be stopped for opening of encrypted image");
1704 ret = -EBUSY;
1705 goto close_and_fail;
b6ce07aa
KW
1706 }
1707
c3adb58f 1708 QDECREF(options);
f67503e5 1709 *pbs = bs;
dd62f1ca
KW
1710
1711 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
1712 * temporary snapshot afterwards. */
1713 if (snapshot_flags) {
1714 ret = bdrv_append_temp_snapshot(bs, snapshot_flags, &local_err);
1715 if (local_err) {
1716 goto close_and_fail;
1717 }
1718 }
1719
b6ce07aa
KW
1720 return 0;
1721
8bfea15d 1722fail:
f500a6d3 1723 if (file != NULL) {
9a4f4c31 1724 bdrv_unref_child(bs, file);
f500a6d3 1725 }
145f598e 1726 QDECREF(bs->explicit_options);
de9c0cec 1727 QDECREF(bs->options);
b6ad491a 1728 QDECREF(options);
de9c0cec 1729 bs->options = NULL;
f67503e5
HR
1730 if (!*pbs) {
1731 /* If *pbs is NULL, a new BDS has been created in this function and
1732 needs to be freed now. Otherwise, it does not need to be closed,
1733 since it has not really been opened yet. */
1734 bdrv_unref(bs);
1735 }
84d18f06 1736 if (local_err) {
34b5d2c6
HR
1737 error_propagate(errp, local_err);
1738 }
b6ad491a 1739 return ret;
de9c0cec 1740
b6ad491a 1741close_and_fail:
f67503e5
HR
1742 /* See fail path, but now the BDS has to be always closed */
1743 if (*pbs) {
1744 bdrv_close(bs);
1745 } else {
1746 bdrv_unref(bs);
1747 }
b6ad491a 1748 QDECREF(options);
84d18f06 1749 if (local_err) {
34b5d2c6
HR
1750 error_propagate(errp, local_err);
1751 }
b6ce07aa
KW
1752 return ret;
1753}
1754
f3930ed0 1755int bdrv_open(BlockDriverState **pbs, const char *filename,
6ebf9aa2 1756 const char *reference, QDict *options, int flags, Error **errp)
f3930ed0
KW
1757{
1758 return bdrv_open_inherit(pbs, filename, reference, options, flags, NULL,
ce343771 1759 NULL, errp);
f3930ed0
KW
1760}
1761
e971aa12
JC
1762typedef struct BlockReopenQueueEntry {
1763 bool prepared;
1764 BDRVReopenState state;
1765 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
1766} BlockReopenQueueEntry;
1767
1768/*
1769 * Adds a BlockDriverState to a simple queue for an atomic, transactional
1770 * reopen of multiple devices.
1771 *
1772 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
1773 * already performed, or alternatively may be NULL a new BlockReopenQueue will
1774 * be created and initialized. This newly created BlockReopenQueue should be
1775 * passed back in for subsequent calls that are intended to be of the same
1776 * atomic 'set'.
1777 *
1778 * bs is the BlockDriverState to add to the reopen queue.
1779 *
4d2cb092
KW
1780 * options contains the changed options for the associated bs
1781 * (the BlockReopenQueue takes ownership)
1782 *
e971aa12
JC
1783 * flags contains the open flags for the associated bs
1784 *
1785 * returns a pointer to bs_queue, which is either the newly allocated
1786 * bs_queue, or the existing bs_queue being used.
1787 *
1788 */
28518102
KW
1789static BlockReopenQueue *bdrv_reopen_queue_child(BlockReopenQueue *bs_queue,
1790 BlockDriverState *bs,
1791 QDict *options,
1792 int flags,
1793 const BdrvChildRole *role,
1794 QDict *parent_options,
1795 int parent_flags)
e971aa12
JC
1796{
1797 assert(bs != NULL);
1798
1799 BlockReopenQueueEntry *bs_entry;
67251a31 1800 BdrvChild *child;
145f598e 1801 QDict *old_options, *explicit_options;
67251a31 1802
e971aa12
JC
1803 if (bs_queue == NULL) {
1804 bs_queue = g_new0(BlockReopenQueue, 1);
1805 QSIMPLEQ_INIT(bs_queue);
1806 }
1807
4d2cb092
KW
1808 if (!options) {
1809 options = qdict_new();
1810 }
1811
28518102
KW
1812 /*
1813 * Precedence of options:
1814 * 1. Explicitly passed in options (highest)
91a097e7 1815 * 2. Set in flags (only for top level)
145f598e 1816 * 3. Retained from explicitly set options of bs
8e2160e2 1817 * 4. Inherited from parent node
28518102
KW
1818 * 5. Retained from effective options of bs
1819 */
1820
91a097e7
KW
1821 if (!parent_options) {
1822 /*
1823 * Any setting represented by flags is always updated. If the
1824 * corresponding QDict option is set, it takes precedence. Otherwise
1825 * the flag is translated into a QDict option. The old setting of bs is
1826 * not considered.
1827 */
1828 update_options_from_flags(options, flags);
1829 }
1830
145f598e
KW
1831 /* Old explicitly set values (don't overwrite by inherited value) */
1832 old_options = qdict_clone_shallow(bs->explicit_options);
1833 bdrv_join_options(bs, options, old_options);
1834 QDECREF(old_options);
1835
1836 explicit_options = qdict_clone_shallow(options);
1837
28518102
KW
1838 /* Inherit from parent node */
1839 if (parent_options) {
1840 assert(!flags);
8e2160e2 1841 role->inherit_options(&flags, options, parent_flags, parent_options);
28518102
KW
1842 }
1843
1844 /* Old values are used for options that aren't set yet */
4d2cb092 1845 old_options = qdict_clone_shallow(bs->options);
cddff5ba 1846 bdrv_join_options(bs, options, old_options);
4d2cb092
KW
1847 QDECREF(old_options);
1848
f1f25a2e
KW
1849 /* bdrv_open() masks this flag out */
1850 flags &= ~BDRV_O_PROTOCOL;
1851
67251a31 1852 QLIST_FOREACH(child, &bs->children, next) {
4c9dfe5d
KW
1853 QDict *new_child_options;
1854 char *child_key_dot;
67251a31 1855
4c9dfe5d
KW
1856 /* reopen can only change the options of block devices that were
1857 * implicitly created and inherited options. For other (referenced)
1858 * block devices, a syntax like "backing.foo" results in an error. */
67251a31
KW
1859 if (child->bs->inherits_from != bs) {
1860 continue;
1861 }
1862
4c9dfe5d
KW
1863 child_key_dot = g_strdup_printf("%s.", child->name);
1864 qdict_extract_subqdict(options, &new_child_options, child_key_dot);
1865 g_free(child_key_dot);
1866
28518102
KW
1867 bdrv_reopen_queue_child(bs_queue, child->bs, new_child_options, 0,
1868 child->role, options, flags);
e971aa12
JC
1869 }
1870
1871 bs_entry = g_new0(BlockReopenQueueEntry, 1);
1872 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
1873
1874 bs_entry->state.bs = bs;
4d2cb092 1875 bs_entry->state.options = options;
145f598e 1876 bs_entry->state.explicit_options = explicit_options;
e971aa12
JC
1877 bs_entry->state.flags = flags;
1878
1879 return bs_queue;
1880}
1881
28518102
KW
1882BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
1883 BlockDriverState *bs,
1884 QDict *options, int flags)
1885{
1886 return bdrv_reopen_queue_child(bs_queue, bs, options, flags,
1887 NULL, NULL, 0);
1888}
1889
e971aa12
JC
1890/*
1891 * Reopen multiple BlockDriverStates atomically & transactionally.
1892 *
1893 * The queue passed in (bs_queue) must have been built up previous
1894 * via bdrv_reopen_queue().
1895 *
1896 * Reopens all BDS specified in the queue, with the appropriate
1897 * flags. All devices are prepared for reopen, and failure of any
1898 * device will cause all device changes to be abandonded, and intermediate
1899 * data cleaned up.
1900 *
1901 * If all devices prepare successfully, then the changes are committed
1902 * to all devices.
1903 *
1904 */
1905int bdrv_reopen_multiple(BlockReopenQueue *bs_queue, Error **errp)
1906{
1907 int ret = -1;
1908 BlockReopenQueueEntry *bs_entry, *next;
1909 Error *local_err = NULL;
1910
1911 assert(bs_queue != NULL);
1912
1913 bdrv_drain_all();
1914
1915 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1916 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
1917 error_propagate(errp, local_err);
1918 goto cleanup;
1919 }
1920 bs_entry->prepared = true;
1921 }
1922
1923 /* If we reach this point, we have success and just need to apply the
1924 * changes
1925 */
1926 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1927 bdrv_reopen_commit(&bs_entry->state);
1928 }
1929
1930 ret = 0;
1931
1932cleanup:
1933 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
1934 if (ret && bs_entry->prepared) {
1935 bdrv_reopen_abort(&bs_entry->state);
145f598e
KW
1936 } else if (ret) {
1937 QDECREF(bs_entry->state.explicit_options);
e971aa12 1938 }
4d2cb092 1939 QDECREF(bs_entry->state.options);
e971aa12
JC
1940 g_free(bs_entry);
1941 }
1942 g_free(bs_queue);
1943 return ret;
1944}
1945
1946
1947/* Reopen a single BlockDriverState with the specified flags. */
1948int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
1949{
1950 int ret = -1;
1951 Error *local_err = NULL;
4d2cb092 1952 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12
JC
1953
1954 ret = bdrv_reopen_multiple(queue, &local_err);
1955 if (local_err != NULL) {
1956 error_propagate(errp, local_err);
1957 }
1958 return ret;
1959}
1960
1961
1962/*
1963 * Prepares a BlockDriverState for reopen. All changes are staged in the
1964 * 'opaque' field of the BDRVReopenState, which is used and allocated by
1965 * the block driver layer .bdrv_reopen_prepare()
1966 *
1967 * bs is the BlockDriverState to reopen
1968 * flags are the new open flags
1969 * queue is the reopen queue
1970 *
1971 * Returns 0 on success, non-zero on error. On error errp will be set
1972 * as well.
1973 *
1974 * On failure, bdrv_reopen_abort() will be called to clean up any data.
1975 * It is the responsibility of the caller to then call the abort() or
1976 * commit() for any other BDS that have been left in a prepare() state
1977 *
1978 */
1979int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
1980 Error **errp)
1981{
1982 int ret = -1;
1983 Error *local_err = NULL;
1984 BlockDriver *drv;
ccf9dc07
KW
1985 QemuOpts *opts;
1986 const char *value;
e971aa12
JC
1987
1988 assert(reopen_state != NULL);
1989 assert(reopen_state->bs->drv != NULL);
1990 drv = reopen_state->bs->drv;
1991
ccf9dc07
KW
1992 /* Process generic block layer options */
1993 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
1994 qemu_opts_absorb_qdict(opts, reopen_state->options, &local_err);
1995 if (local_err) {
1996 error_propagate(errp, local_err);
1997 ret = -EINVAL;
1998 goto error;
1999 }
2000
91a097e7
KW
2001 update_flags_from_options(&reopen_state->flags, opts);
2002
2003 /* If a guest device is attached, it owns WCE */
2004 if (reopen_state->bs->blk && blk_get_attached_dev(reopen_state->bs->blk)) {
2005 bool old_wce = bdrv_enable_write_cache(reopen_state->bs);
2006 bool new_wce = (reopen_state->flags & BDRV_O_CACHE_WB);
2007 if (old_wce != new_wce) {
2008 error_setg(errp, "Cannot change cache.writeback: Device attached");
2009 ret = -EINVAL;
2010 goto error;
2011 }
2012 }
2013
ccf9dc07
KW
2014 /* node-name and driver must be unchanged. Put them back into the QDict, so
2015 * that they are checked at the end of this function. */
2016 value = qemu_opt_get(opts, "node-name");
2017 if (value) {
2018 qdict_put(reopen_state->options, "node-name", qstring_from_str(value));
2019 }
2020
2021 value = qemu_opt_get(opts, "driver");
2022 if (value) {
2023 qdict_put(reopen_state->options, "driver", qstring_from_str(value));
2024 }
2025
e971aa12
JC
2026 /* if we are to stay read-only, do not allow permission change
2027 * to r/w */
2028 if (!(reopen_state->bs->open_flags & BDRV_O_ALLOW_RDWR) &&
2029 reopen_state->flags & BDRV_O_RDWR) {
81e5f78a
AG
2030 error_setg(errp, "Node '%s' is read only",
2031 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
2032 goto error;
2033 }
2034
2035
2036 ret = bdrv_flush(reopen_state->bs);
2037 if (ret) {
455b0fde 2038 error_setg_errno(errp, -ret, "Error flushing drive");
e971aa12
JC
2039 goto error;
2040 }
2041
2042 if (drv->bdrv_reopen_prepare) {
2043 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
2044 if (ret) {
2045 if (local_err != NULL) {
2046 error_propagate(errp, local_err);
2047 } else {
d8b6895f
LC
2048 error_setg(errp, "failed while preparing to reopen image '%s'",
2049 reopen_state->bs->filename);
e971aa12
JC
2050 }
2051 goto error;
2052 }
2053 } else {
2054 /* It is currently mandatory to have a bdrv_reopen_prepare()
2055 * handler for each supported drv. */
81e5f78a
AG
2056 error_setg(errp, "Block format '%s' used by node '%s' "
2057 "does not support reopening files", drv->format_name,
2058 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
2059 ret = -1;
2060 goto error;
2061 }
2062
4d2cb092
KW
2063 /* Options that are not handled are only okay if they are unchanged
2064 * compared to the old state. It is expected that some options are only
2065 * used for the initial open, but not reopen (e.g. filename) */
2066 if (qdict_size(reopen_state->options)) {
2067 const QDictEntry *entry = qdict_first(reopen_state->options);
2068
2069 do {
2070 QString *new_obj = qobject_to_qstring(entry->value);
2071 const char *new = qstring_get_str(new_obj);
2072 const char *old = qdict_get_try_str(reopen_state->bs->options,
2073 entry->key);
2074
2075 if (!old || strcmp(new, old)) {
2076 error_setg(errp, "Cannot change the option '%s'", entry->key);
2077 ret = -EINVAL;
2078 goto error;
2079 }
2080 } while ((entry = qdict_next(reopen_state->options, entry)));
2081 }
2082
e971aa12
JC
2083 ret = 0;
2084
2085error:
ccf9dc07 2086 qemu_opts_del(opts);
e971aa12
JC
2087 return ret;
2088}
2089
2090/*
2091 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
2092 * makes them final by swapping the staging BlockDriverState contents into
2093 * the active BlockDriverState contents.
2094 */
2095void bdrv_reopen_commit(BDRVReopenState *reopen_state)
2096{
2097 BlockDriver *drv;
2098
2099 assert(reopen_state != NULL);
2100 drv = reopen_state->bs->drv;
2101 assert(drv != NULL);
2102
2103 /* If there are any driver level actions to take */
2104 if (drv->bdrv_reopen_commit) {
2105 drv->bdrv_reopen_commit(reopen_state);
2106 }
2107
2108 /* set BDS specific flags now */
145f598e
KW
2109 QDECREF(reopen_state->bs->explicit_options);
2110
2111 reopen_state->bs->explicit_options = reopen_state->explicit_options;
e971aa12
JC
2112 reopen_state->bs->open_flags = reopen_state->flags;
2113 reopen_state->bs->enable_write_cache = !!(reopen_state->flags &
2114 BDRV_O_CACHE_WB);
2115 reopen_state->bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 2116
3baca891 2117 bdrv_refresh_limits(reopen_state->bs, NULL);
e971aa12
JC
2118}
2119
2120/*
2121 * Abort the reopen, and delete and free the staged changes in
2122 * reopen_state
2123 */
2124void bdrv_reopen_abort(BDRVReopenState *reopen_state)
2125{
2126 BlockDriver *drv;
2127
2128 assert(reopen_state != NULL);
2129 drv = reopen_state->bs->drv;
2130 assert(drv != NULL);
2131
2132 if (drv->bdrv_reopen_abort) {
2133 drv->bdrv_reopen_abort(reopen_state);
2134 }
145f598e
KW
2135
2136 QDECREF(reopen_state->explicit_options);
e971aa12
JC
2137}
2138
2139
fc01f7e7
FB
2140void bdrv_close(BlockDriverState *bs)
2141{
33384421
HR
2142 BdrvAioNotifier *ban, *ban_next;
2143
3cbc002c
PB
2144 if (bs->job) {
2145 block_job_cancel_sync(bs->job);
2146 }
99b7e775
AG
2147
2148 /* Disable I/O limits and drain all pending throttled requests */
a0d64a61 2149 if (bs->throttle_state) {
99b7e775
AG
2150 bdrv_io_limits_disable(bs);
2151 }
2152
fc27291d 2153 bdrv_drained_begin(bs); /* complete I/O */
58fda173 2154 bdrv_flush(bs);
53ec73e2 2155 bdrv_drain(bs); /* in case flush left pending I/O */
fc27291d 2156
d7d512f6 2157 notifier_list_notify(&bs->close_notifiers, bs);
7094f12f 2158
b4d02820
HR
2159 if (bs->blk) {
2160 blk_dev_change_media_cb(bs->blk, false);
2161 }
2162
3cbc002c 2163 if (bs->drv) {
6e93e7c4
KW
2164 BdrvChild *child, *next;
2165
9a7dedbc 2166 bs->drv->bdrv_close(bs);
9a4f4c31 2167 bs->drv = NULL;
9a7dedbc 2168
5db15a57 2169 bdrv_set_backing_hd(bs, NULL);
9a7dedbc 2170
9a4f4c31
KW
2171 if (bs->file != NULL) {
2172 bdrv_unref_child(bs, bs->file);
2173 bs->file = NULL;
2174 }
2175
6e93e7c4 2176 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
2177 /* TODO Remove bdrv_unref() from drivers' close function and use
2178 * bdrv_unref_child() here */
bddcec37
KW
2179 if (child->bs->inherits_from == bs) {
2180 child->bs->inherits_from = NULL;
2181 }
33a60407 2182 bdrv_detach_child(child);
6e93e7c4
KW
2183 }
2184
7267c094 2185 g_free(bs->opaque);
ea2384d3 2186 bs->opaque = NULL;
53fec9d3 2187 bs->copy_on_read = 0;
a275fa42
PB
2188 bs->backing_file[0] = '\0';
2189 bs->backing_format[0] = '\0';
6405875c
PB
2190 bs->total_sectors = 0;
2191 bs->encrypted = 0;
2192 bs->valid_key = 0;
2193 bs->sg = 0;
0d51b4de 2194 bs->zero_beyond_eof = false;
de9c0cec 2195 QDECREF(bs->options);
145f598e 2196 QDECREF(bs->explicit_options);
de9c0cec 2197 bs->options = NULL;
91af7014
HR
2198 QDECREF(bs->full_open_options);
2199 bs->full_open_options = NULL;
b338082b 2200 }
98f90dba 2201
33384421
HR
2202 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
2203 g_free(ban);
2204 }
2205 QLIST_INIT(&bs->aio_notifiers);
fc27291d 2206 bdrv_drained_end(bs);
b338082b
FB
2207}
2208
2bc93fed
MK
2209void bdrv_close_all(void)
2210{
2211 BlockDriverState *bs;
2212
dc364f4c 2213 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
2214 AioContext *aio_context = bdrv_get_aio_context(bs);
2215
2216 aio_context_acquire(aio_context);
2bc93fed 2217 bdrv_close(bs);
ed78cda3 2218 aio_context_release(aio_context);
2bc93fed
MK
2219 }
2220}
2221
dc364f4c
BC
2222/* make a BlockDriverState anonymous by removing from bdrv_state and
2223 * graph_bdrv_state list.
d22b2f41
RH
2224 Also, NULL terminate the device_name to prevent double remove */
2225void bdrv_make_anon(BlockDriverState *bs)
2226{
bfb197e0
MA
2227 /*
2228 * Take care to remove bs from bdrv_states only when it's actually
2229 * in it. Note that bs->device_list.tqe_prev is initially null,
2230 * and gets set to non-null by QTAILQ_INSERT_TAIL(). Establish
2231 * the useful invariant "bs in bdrv_states iff bs->tqe_prev" by
2232 * resetting it to null on remove.
2233 */
2234 if (bs->device_list.tqe_prev) {
dc364f4c 2235 QTAILQ_REMOVE(&bdrv_states, bs, device_list);
bfb197e0 2236 bs->device_list.tqe_prev = NULL;
d22b2f41 2237 }
dc364f4c
BC
2238 if (bs->node_name[0] != '\0') {
2239 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
2240 }
2241 bs->node_name[0] = '\0';
d22b2f41
RH
2242}
2243
8e419aef 2244/* Fields that need to stay with the top-level BDS */
4ddc07ca
PB
2245static void bdrv_move_feature_fields(BlockDriverState *bs_dest,
2246 BlockDriverState *bs_src)
8802d1fd 2247{
4ddc07ca 2248 /* move some fields that need to stay attached to the device */
8802d1fd
JC
2249
2250 /* dev info */
4ddc07ca 2251 bs_dest->copy_on_read = bs_src->copy_on_read;
8802d1fd 2252
4ddc07ca 2253 bs_dest->enable_write_cache = bs_src->enable_write_cache;
c4a248a1 2254
a9fc4408 2255 /* dirty bitmap */
e4654d2d 2256 bs_dest->dirty_bitmaps = bs_src->dirty_bitmaps;
063dd40e 2257}
a9fc4408 2258
dd62f1ca
KW
2259static void change_parent_backing_link(BlockDriverState *from,
2260 BlockDriverState *to)
2261{
2262 BdrvChild *c, *next;
2263
2264 QLIST_FOREACH_SAFE(c, &from->parents, next_parent, next) {
2265 assert(c->role != &child_backing);
2266 c->bs = to;
2267 QLIST_REMOVE(c, next_parent);
2268 QLIST_INSERT_HEAD(&to->parents, c, next_parent);
2269 bdrv_ref(to);
2270 bdrv_unref(from);
2271 }
2272 if (from->blk) {
2273 blk_set_bs(from->blk, to);
2274 if (!to->device_list.tqe_prev) {
2275 QTAILQ_INSERT_BEFORE(from, to, device_list);
2276 }
2277 QTAILQ_REMOVE(&bdrv_states, from, device_list);
2278 }
2279}
2280
2281static void swap_feature_fields(BlockDriverState *bs_top,
2282 BlockDriverState *bs_new)
2283{
2284 BlockDriverState tmp;
2285
2286 bdrv_move_feature_fields(&tmp, bs_top);
2287 bdrv_move_feature_fields(bs_top, bs_new);
2288 bdrv_move_feature_fields(bs_new, &tmp);
2289
2290 assert(!bs_new->throttle_state);
2291 if (bs_top->throttle_state) {
2292 assert(bs_top->io_limits_enabled);
2293 bdrv_io_limits_enable(bs_new, throttle_group_get_name(bs_top));
2294 bdrv_io_limits_disable(bs_top);
2295 }
2296}
2297
4ddc07ca
PB
2298/*
2299 * Add new bs contents at the top of an image chain while the chain is
2300 * live, while keeping required fields on the top layer.
2301 *
2302 * This will modify the BlockDriverState fields, and swap contents
2303 * between bs_new and bs_top. Both bs_new and bs_top are modified.
2304 *
bfb197e0 2305 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2306 *
2307 * This function does not create any image files.
dd62f1ca
KW
2308 *
2309 * bdrv_append() takes ownership of a bs_new reference and unrefs it because
2310 * that's what the callers commonly need. bs_new will be referenced by the old
2311 * parents of bs_top after bdrv_append() returns. If the caller needs to keep a
2312 * reference of its own, it must call bdrv_ref().
4ddc07ca
PB
2313 */
2314void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top)
2315{
dd62f1ca
KW
2316 assert(!bdrv_requests_pending(bs_top));
2317 assert(!bdrv_requests_pending(bs_new));
2318
2319 bdrv_ref(bs_top);
2320 change_parent_backing_link(bs_top, bs_new);
2321
2322 /* Some fields always stay on top of the backing file chain */
2323 swap_feature_fields(bs_top, bs_new);
2324
2325 bdrv_set_backing_hd(bs_new, bs_top);
2326 bdrv_unref(bs_top);
4ddc07ca 2327
dd62f1ca
KW
2328 /* bs_new is now referenced by its new parents, we don't need the
2329 * additional reference any more. */
2330 bdrv_unref(bs_new);
8802d1fd
JC
2331}
2332
3f09bfbc
KW
2333void bdrv_replace_in_backing_chain(BlockDriverState *old, BlockDriverState *new)
2334{
2335 assert(!bdrv_requests_pending(old));
2336 assert(!bdrv_requests_pending(new));
2337
2338 bdrv_ref(old);
2339
2340 if (old->blk) {
2341 /* As long as these fields aren't in BlockBackend, but in the top-level
2342 * BlockDriverState, it's not possible for a BDS to have two BBs.
2343 *
2344 * We really want to copy the fields from old to new, but we go for a
2345 * swap instead so that pointers aren't duplicated and cause trouble.
2346 * (Also, bdrv_swap() used to do the same.) */
2347 assert(!new->blk);
2348 swap_feature_fields(old, new);
2349 }
2350 change_parent_backing_link(old, new);
2351
2352 /* Change backing files if a previously independent node is added to the
2353 * chain. For active commit, we replace top by its own (indirect) backing
2354 * file and don't do anything here so we don't build a loop. */
2355 if (new->backing == NULL && !bdrv_chain_contains(backing_bs(old), new)) {
2356 bdrv_set_backing_hd(new, backing_bs(old));
2357 bdrv_set_backing_hd(old, NULL);
2358 }
2359
2360 bdrv_unref(old);
2361}
2362
4f6fd349 2363static void bdrv_delete(BlockDriverState *bs)
b338082b 2364{
3e914655 2365 assert(!bs->job);
3718d8ab 2366 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 2367 assert(!bs->refcnt);
e4654d2d 2368 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
18846dee 2369
e1b5c52e
SH
2370 bdrv_close(bs);
2371
1b7bdbc1 2372 /* remove from list, if necessary */
d22b2f41 2373 bdrv_make_anon(bs);
34c6f050 2374
7267c094 2375 g_free(bs);
fc01f7e7
FB
2376}
2377
e97fc193
AL
2378/*
2379 * Run consistency checks on an image
2380 *
e076f338 2381 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 2382 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 2383 * check are stored in res.
e97fc193 2384 */
4534ff54 2385int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 2386{
908bcd54
HR
2387 if (bs->drv == NULL) {
2388 return -ENOMEDIUM;
2389 }
e97fc193
AL
2390 if (bs->drv->bdrv_check == NULL) {
2391 return -ENOTSUP;
2392 }
2393
e076f338 2394 memset(res, 0, sizeof(*res));
4534ff54 2395 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
2396}
2397
8a426614
KW
2398#define COMMIT_BUF_SECTORS 2048
2399
33e3963e
FB
2400/* commit COW file into the raw image */
2401int bdrv_commit(BlockDriverState *bs)
2402{
19cb3738 2403 BlockDriver *drv = bs->drv;
72706ea4 2404 int64_t sector, total_sectors, length, backing_length;
8a426614 2405 int n, ro, open_flags;
0bce597d 2406 int ret = 0;
72706ea4 2407 uint8_t *buf = NULL;
33e3963e 2408
19cb3738
FB
2409 if (!drv)
2410 return -ENOMEDIUM;
6bb45158 2411
760e0063 2412 if (!bs->backing) {
4dca4b63 2413 return -ENOTSUP;
33e3963e
FB
2414 }
2415
bb00021d 2416 if (bdrv_op_is_blocked(bs, BLOCK_OP_TYPE_COMMIT_SOURCE, NULL) ||
760e0063 2417 bdrv_op_is_blocked(bs->backing->bs, BLOCK_OP_TYPE_COMMIT_TARGET, NULL)) {
2d3735d3
SH
2418 return -EBUSY;
2419 }
2420
760e0063
KW
2421 ro = bs->backing->bs->read_only;
2422 open_flags = bs->backing->bs->open_flags;
4dca4b63
NS
2423
2424 if (ro) {
760e0063 2425 if (bdrv_reopen(bs->backing->bs, open_flags | BDRV_O_RDWR, NULL)) {
0bce597d 2426 return -EACCES;
4dca4b63 2427 }
ea2384d3 2428 }
33e3963e 2429
72706ea4
JC
2430 length = bdrv_getlength(bs);
2431 if (length < 0) {
2432 ret = length;
2433 goto ro_cleanup;
2434 }
2435
760e0063 2436 backing_length = bdrv_getlength(bs->backing->bs);
72706ea4
JC
2437 if (backing_length < 0) {
2438 ret = backing_length;
2439 goto ro_cleanup;
2440 }
2441
2442 /* If our top snapshot is larger than the backing file image,
2443 * grow the backing file image if possible. If not possible,
2444 * we must return an error */
2445 if (length > backing_length) {
760e0063 2446 ret = bdrv_truncate(bs->backing->bs, length);
72706ea4
JC
2447 if (ret < 0) {
2448 goto ro_cleanup;
2449 }
2450 }
2451
2452 total_sectors = length >> BDRV_SECTOR_BITS;
857d4f46
KW
2453
2454 /* qemu_try_blockalign() for bs will choose an alignment that works for
760e0063 2455 * bs->backing->bs as well, so no need to compare the alignment manually. */
857d4f46
KW
2456 buf = qemu_try_blockalign(bs, COMMIT_BUF_SECTORS * BDRV_SECTOR_SIZE);
2457 if (buf == NULL) {
2458 ret = -ENOMEM;
2459 goto ro_cleanup;
2460 }
8a426614
KW
2461
2462 for (sector = 0; sector < total_sectors; sector += n) {
d663640c
PB
2463 ret = bdrv_is_allocated(bs, sector, COMMIT_BUF_SECTORS, &n);
2464 if (ret < 0) {
2465 goto ro_cleanup;
2466 }
2467 if (ret) {
dabfa6cc
KW
2468 ret = bdrv_read(bs, sector, buf, n);
2469 if (ret < 0) {
8a426614
KW
2470 goto ro_cleanup;
2471 }
2472
760e0063 2473 ret = bdrv_write(bs->backing->bs, sector, buf, n);
dabfa6cc 2474 if (ret < 0) {
8a426614
KW
2475 goto ro_cleanup;
2476 }
ea2384d3 2477 }
33e3963e 2478 }
95389c86 2479
1d44952f
CH
2480 if (drv->bdrv_make_empty) {
2481 ret = drv->bdrv_make_empty(bs);
dabfa6cc
KW
2482 if (ret < 0) {
2483 goto ro_cleanup;
2484 }
1d44952f
CH
2485 bdrv_flush(bs);
2486 }
95389c86 2487
3f5075ae
CH
2488 /*
2489 * Make sure all data we wrote to the backing device is actually
2490 * stable on disk.
2491 */
760e0063
KW
2492 if (bs->backing) {
2493 bdrv_flush(bs->backing->bs);
dabfa6cc 2494 }
4dca4b63 2495
dabfa6cc 2496 ret = 0;
4dca4b63 2497ro_cleanup:
857d4f46 2498 qemu_vfree(buf);
4dca4b63
NS
2499
2500 if (ro) {
0bce597d 2501 /* ignoring error return here */
760e0063 2502 bdrv_reopen(bs->backing->bs, open_flags & ~BDRV_O_RDWR, NULL);
4dca4b63
NS
2503 }
2504
1d44952f 2505 return ret;
33e3963e
FB
2506}
2507
e8877497 2508int bdrv_commit_all(void)
6ab4b5ab
MA
2509{
2510 BlockDriverState *bs;
2511
dc364f4c 2512 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
2513 AioContext *aio_context = bdrv_get_aio_context(bs);
2514
2515 aio_context_acquire(aio_context);
760e0063 2516 if (bs->drv && bs->backing) {
272d2d8e
JC
2517 int ret = bdrv_commit(bs);
2518 if (ret < 0) {
ed78cda3 2519 aio_context_release(aio_context);
272d2d8e
JC
2520 return ret;
2521 }
e8877497 2522 }
ed78cda3 2523 aio_context_release(aio_context);
6ab4b5ab 2524 }
e8877497 2525 return 0;
6ab4b5ab
MA
2526}
2527
756e6736
KW
2528/*
2529 * Return values:
2530 * 0 - success
2531 * -EINVAL - backing format specified, but no file
2532 * -ENOSPC - can't update the backing file because no space is left in the
2533 * image file header
2534 * -ENOTSUP - format driver doesn't support changing the backing file
2535 */
2536int bdrv_change_backing_file(BlockDriverState *bs,
2537 const char *backing_file, const char *backing_fmt)
2538{
2539 BlockDriver *drv = bs->drv;
469ef350 2540 int ret;
756e6736 2541
5f377794
PB
2542 /* Backing file format doesn't make sense without a backing file */
2543 if (backing_fmt && !backing_file) {
2544 return -EINVAL;
2545 }
2546
756e6736 2547 if (drv->bdrv_change_backing_file != NULL) {
469ef350 2548 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 2549 } else {
469ef350 2550 ret = -ENOTSUP;
756e6736 2551 }
469ef350
PB
2552
2553 if (ret == 0) {
2554 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
2555 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
2556 }
2557 return ret;
756e6736
KW
2558}
2559
6ebdcee2
JC
2560/*
2561 * Finds the image layer in the chain that has 'bs' as its backing file.
2562 *
2563 * active is the current topmost image.
2564 *
2565 * Returns NULL if bs is not found in active's image chain,
2566 * or if active == bs.
4caf0fcd
JC
2567 *
2568 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
2569 */
2570BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
2571 BlockDriverState *bs)
2572{
760e0063
KW
2573 while (active && bs != backing_bs(active)) {
2574 active = backing_bs(active);
6ebdcee2
JC
2575 }
2576
4caf0fcd
JC
2577 return active;
2578}
6ebdcee2 2579
4caf0fcd
JC
2580/* Given a BDS, searches for the base layer. */
2581BlockDriverState *bdrv_find_base(BlockDriverState *bs)
2582{
2583 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
2584}
2585
6ebdcee2
JC
2586/*
2587 * Drops images above 'base' up to and including 'top', and sets the image
2588 * above 'top' to have base as its backing file.
2589 *
2590 * Requires that the overlay to 'top' is opened r/w, so that the backing file
2591 * information in 'bs' can be properly updated.
2592 *
2593 * E.g., this will convert the following chain:
2594 * bottom <- base <- intermediate <- top <- active
2595 *
2596 * to
2597 *
2598 * bottom <- base <- active
2599 *
2600 * It is allowed for bottom==base, in which case it converts:
2601 *
2602 * base <- intermediate <- top <- active
2603 *
2604 * to
2605 *
2606 * base <- active
2607 *
54e26900
JC
2608 * If backing_file_str is non-NULL, it will be used when modifying top's
2609 * overlay image metadata.
2610 *
6ebdcee2
JC
2611 * Error conditions:
2612 * if active == top, that is considered an error
2613 *
2614 */
2615int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 2616 BlockDriverState *base, const char *backing_file_str)
6ebdcee2 2617{
6ebdcee2 2618 BlockDriverState *new_top_bs = NULL;
6ebdcee2
JC
2619 int ret = -EIO;
2620
6ebdcee2
JC
2621 if (!top->drv || !base->drv) {
2622 goto exit;
2623 }
2624
2625 new_top_bs = bdrv_find_overlay(active, top);
2626
2627 if (new_top_bs == NULL) {
2628 /* we could not find the image above 'top', this is an error */
2629 goto exit;
2630 }
2631
760e0063 2632 /* special case of new_top_bs->backing->bs already pointing to base - nothing
6ebdcee2 2633 * to do, no intermediate images */
760e0063 2634 if (backing_bs(new_top_bs) == base) {
6ebdcee2
JC
2635 ret = 0;
2636 goto exit;
2637 }
2638
5db15a57
KW
2639 /* Make sure that base is in the backing chain of top */
2640 if (!bdrv_chain_contains(top, base)) {
6ebdcee2
JC
2641 goto exit;
2642 }
2643
2644 /* success - we can delete the intermediate states, and link top->base */
5db15a57 2645 backing_file_str = backing_file_str ? backing_file_str : base->filename;
54e26900 2646 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
5db15a57 2647 base->drv ? base->drv->format_name : "");
6ebdcee2
JC
2648 if (ret) {
2649 goto exit;
2650 }
5db15a57 2651 bdrv_set_backing_hd(new_top_bs, base);
6ebdcee2 2652
6ebdcee2 2653 ret = 0;
6ebdcee2 2654exit:
6ebdcee2
JC
2655 return ret;
2656}
2657
61007b31
SH
2658/**
2659 * Truncate file to 'offset' bytes (needed only for file protocols)
2660 */
2661int bdrv_truncate(BlockDriverState *bs, int64_t offset)
71d0770c 2662{
61007b31
SH
2663 BlockDriver *drv = bs->drv;
2664 int ret;
2665 if (!drv)
71d0770c 2666 return -ENOMEDIUM;
61007b31
SH
2667 if (!drv->bdrv_truncate)
2668 return -ENOTSUP;
2669 if (bs->read_only)
2670 return -EACCES;
71d0770c 2671
61007b31
SH
2672 ret = drv->bdrv_truncate(bs, offset);
2673 if (ret == 0) {
2674 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
2675 bdrv_dirty_bitmap_truncate(bs);
2676 if (bs->blk) {
2677 blk_dev_resize_cb(bs->blk);
2678 }
c0191e76 2679 }
61007b31 2680 return ret;
71d0770c
AL
2681}
2682
61007b31
SH
2683/**
2684 * Length of a allocated file in bytes. Sparse files are counted by actual
2685 * allocated space. Return < 0 if error or unknown.
2686 */
2687int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 2688{
61007b31
SH
2689 BlockDriver *drv = bs->drv;
2690 if (!drv) {
2691 return -ENOMEDIUM;
8f4754ed 2692 }
61007b31
SH
2693 if (drv->bdrv_get_allocated_file_size) {
2694 return drv->bdrv_get_allocated_file_size(bs);
2695 }
2696 if (bs->file) {
9a4f4c31 2697 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 2698 }
61007b31 2699 return -ENOTSUP;
1c9805a3 2700}
e7a8a783 2701
61007b31
SH
2702/**
2703 * Return number of sectors on success, -errno on error.
1c9805a3 2704 */
61007b31 2705int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 2706{
61007b31 2707 BlockDriver *drv = bs->drv;
498e386c 2708
61007b31
SH
2709 if (!drv)
2710 return -ENOMEDIUM;
2572b37a 2711
61007b31
SH
2712 if (drv->has_variable_length) {
2713 int ret = refresh_total_sectors(bs, bs->total_sectors);
2714 if (ret < 0) {
2715 return ret;
1c9805a3
SH
2716 }
2717 }
61007b31 2718 return bs->total_sectors;
1c9805a3 2719}
b338082b 2720
61007b31
SH
2721/**
2722 * Return length in bytes on success, -errno on error.
2723 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 2724 */
61007b31 2725int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 2726{
61007b31 2727 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 2728
4a9c9ea0 2729 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 2730 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
2731}
2732
61007b31
SH
2733/* return 0 as number of sectors if no device present or error */
2734void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 2735{
61007b31 2736 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 2737
61007b31 2738 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
2739}
2740
61007b31 2741int bdrv_is_read_only(BlockDriverState *bs)
8d3b1a2d 2742{
61007b31 2743 return bs->read_only;
83f64091 2744}
83f64091 2745
61007b31 2746int bdrv_is_sg(BlockDriverState *bs)
f08145fe 2747{
61007b31 2748 return bs->sg;
f08145fe
KW
2749}
2750
61007b31 2751int bdrv_enable_write_cache(BlockDriverState *bs)
ab185921 2752{
61007b31 2753 return bs->enable_write_cache;
ab185921
SH
2754}
2755
61007b31 2756void bdrv_set_enable_write_cache(BlockDriverState *bs, bool wce)
da1fa91d 2757{
61007b31 2758 bs->enable_write_cache = wce;
ab185921 2759
61007b31
SH
2760 /* so a reopen() will preserve wce */
2761 if (wce) {
2762 bs->open_flags |= BDRV_O_CACHE_WB;
893a8f62 2763 } else {
61007b31 2764 bs->open_flags &= ~BDRV_O_CACHE_WB;
893a8f62 2765 }
da1fa91d
KW
2766}
2767
61007b31 2768int bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 2769{
760e0063 2770 if (bs->backing && bs->backing->bs->encrypted) {
61007b31 2771 return 1;
760e0063 2772 }
61007b31 2773 return bs->encrypted;
fc3959e4
FZ
2774}
2775
61007b31 2776int bdrv_key_required(BlockDriverState *bs)
fc3959e4 2777{
760e0063 2778 BdrvChild *backing = bs->backing;
61007b31 2779
760e0063 2780 if (backing && backing->bs->encrypted && !backing->bs->valid_key) {
61007b31 2781 return 1;
760e0063 2782 }
61007b31 2783 return (bs->encrypted && !bs->valid_key);
fc3959e4
FZ
2784}
2785
61007b31 2786int bdrv_set_key(BlockDriverState *bs, const char *key)
d0c7f642 2787{
d0c7f642 2788 int ret;
760e0063
KW
2789 if (bs->backing && bs->backing->bs->encrypted) {
2790 ret = bdrv_set_key(bs->backing->bs, key);
61007b31
SH
2791 if (ret < 0)
2792 return ret;
2793 if (!bs->encrypted)
2794 return 0;
2795 }
2796 if (!bs->encrypted) {
2797 return -EINVAL;
2798 } else if (!bs->drv || !bs->drv->bdrv_set_key) {
d0c7f642
KW
2799 return -ENOMEDIUM;
2800 }
61007b31 2801 ret = bs->drv->bdrv_set_key(bs, key);
b9c64947 2802 if (ret < 0) {
61007b31
SH
2803 bs->valid_key = 0;
2804 } else if (!bs->valid_key) {
2805 bs->valid_key = 1;
2806 if (bs->blk) {
2807 /* call the change callback now, we skipped it on open */
2808 blk_dev_change_media_cb(bs->blk, true);
2809 }
1b0288ae 2810 }
61007b31
SH
2811 return ret;
2812}
f08f2dda 2813
c5fbe571 2814/*
61007b31
SH
2815 * Provide an encryption key for @bs.
2816 * If @key is non-null:
2817 * If @bs is not encrypted, fail.
2818 * Else if the key is invalid, fail.
2819 * Else set @bs's key to @key, replacing the existing key, if any.
2820 * If @key is null:
2821 * If @bs is encrypted and still lacks a key, fail.
2822 * Else do nothing.
2823 * On failure, store an error object through @errp if non-null.
c5fbe571 2824 */
61007b31 2825void bdrv_add_key(BlockDriverState *bs, const char *key, Error **errp)
c5fbe571 2826{
61007b31
SH
2827 if (key) {
2828 if (!bdrv_is_encrypted(bs)) {
2829 error_setg(errp, "Node '%s' is not encrypted",
2830 bdrv_get_device_or_node_name(bs));
2831 } else if (bdrv_set_key(bs, key) < 0) {
c6bd8c70 2832 error_setg(errp, QERR_INVALID_PASSWORD);
4d2855a3
MA
2833 }
2834 } else {
2835 if (bdrv_key_required(bs)) {
b1ca6391
MA
2836 error_set(errp, ERROR_CLASS_DEVICE_ENCRYPTED,
2837 "'%s' (%s) is encrypted",
81e5f78a 2838 bdrv_get_device_or_node_name(bs),
4d2855a3
MA
2839 bdrv_get_encrypted_filename(bs));
2840 }
2841 }
2842}
2843
61007b31 2844const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 2845{
61007b31 2846 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
2847}
2848
61007b31 2849static int qsort_strcmp(const void *a, const void *b)
40b4f539 2850{
61007b31 2851 return strcmp(a, b);
40b4f539
KW
2852}
2853
61007b31
SH
2854void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
2855 void *opaque)
40b4f539 2856{
61007b31
SH
2857 BlockDriver *drv;
2858 int count = 0;
2859 int i;
2860 const char **formats = NULL;
40b4f539 2861
61007b31
SH
2862 QLIST_FOREACH(drv, &bdrv_drivers, list) {
2863 if (drv->format_name) {
2864 bool found = false;
2865 int i = count;
2866 while (formats && i && !found) {
2867 found = !strcmp(formats[--i], drv->format_name);
2868 }
e2a305fb 2869
61007b31
SH
2870 if (!found) {
2871 formats = g_renew(const char *, formats, count + 1);
2872 formats[count++] = drv->format_name;
2873 }
6c5a42ac 2874 }
61007b31 2875 }
6c5a42ac 2876
61007b31 2877 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 2878
61007b31
SH
2879 for (i = 0; i < count; i++) {
2880 it(opaque, formats[i]);
2881 }
40b4f539 2882
61007b31
SH
2883 g_free(formats);
2884}
40b4f539 2885
61007b31
SH
2886/* This function is to find a node in the bs graph */
2887BlockDriverState *bdrv_find_node(const char *node_name)
2888{
2889 BlockDriverState *bs;
391827eb 2890
61007b31 2891 assert(node_name);
40b4f539 2892
61007b31
SH
2893 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2894 if (!strcmp(node_name, bs->node_name)) {
2895 return bs;
40b4f539
KW
2896 }
2897 }
61007b31 2898 return NULL;
40b4f539
KW
2899}
2900
61007b31
SH
2901/* Put this QMP function here so it can access the static graph_bdrv_states. */
2902BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 2903{
61007b31
SH
2904 BlockDeviceInfoList *list, *entry;
2905 BlockDriverState *bs;
40b4f539 2906
61007b31
SH
2907 list = NULL;
2908 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2909 BlockDeviceInfo *info = bdrv_block_device_info(bs, errp);
2910 if (!info) {
2911 qapi_free_BlockDeviceInfoList(list);
2912 return NULL;
301db7c2 2913 }
61007b31
SH
2914 entry = g_malloc0(sizeof(*entry));
2915 entry->value = info;
2916 entry->next = list;
2917 list = entry;
301db7c2
RH
2918 }
2919
61007b31
SH
2920 return list;
2921}
40b4f539 2922
61007b31
SH
2923BlockDriverState *bdrv_lookup_bs(const char *device,
2924 const char *node_name,
2925 Error **errp)
2926{
2927 BlockBackend *blk;
2928 BlockDriverState *bs;
40b4f539 2929
61007b31
SH
2930 if (device) {
2931 blk = blk_by_name(device);
40b4f539 2932
61007b31 2933 if (blk) {
9f4ed6fb
AG
2934 bs = blk_bs(blk);
2935 if (!bs) {
5433c24f 2936 error_setg(errp, "Device '%s' has no medium", device);
5433c24f
HR
2937 }
2938
9f4ed6fb 2939 return bs;
61007b31
SH
2940 }
2941 }
40b4f539 2942
61007b31
SH
2943 if (node_name) {
2944 bs = bdrv_find_node(node_name);
6d519a5f 2945
61007b31
SH
2946 if (bs) {
2947 return bs;
2948 }
40b4f539
KW
2949 }
2950
61007b31
SH
2951 error_setg(errp, "Cannot find device=%s nor node_name=%s",
2952 device ? device : "",
2953 node_name ? node_name : "");
2954 return NULL;
40b4f539
KW
2955}
2956
61007b31
SH
2957/* If 'base' is in the same chain as 'top', return true. Otherwise,
2958 * return false. If either argument is NULL, return false. */
2959bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 2960{
61007b31 2961 while (top && top != base) {
760e0063 2962 top = backing_bs(top);
02c50efe 2963 }
61007b31
SH
2964
2965 return top != NULL;
02c50efe
FZ
2966}
2967
61007b31 2968BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 2969{
61007b31
SH
2970 if (!bs) {
2971 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 2972 }
61007b31 2973 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
2974}
2975
61007b31 2976BlockDriverState *bdrv_next(BlockDriverState *bs)
83f64091 2977{
61007b31
SH
2978 if (!bs) {
2979 return QTAILQ_FIRST(&bdrv_states);
857d4f46 2980 }
61007b31 2981 return QTAILQ_NEXT(bs, device_list);
83f64091 2982}
beac80cd 2983
61007b31 2984const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 2985{
61007b31 2986 return bs->node_name;
beac80cd
FB
2987}
2988
61007b31
SH
2989/* TODO check what callers really want: bs->node_name or blk_name() */
2990const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 2991{
61007b31 2992 return bs->blk ? blk_name(bs->blk) : "";
f141eafe 2993}
83f64091 2994
61007b31
SH
2995/* This can be used to identify nodes that might not have a device
2996 * name associated. Since node and device names live in the same
2997 * namespace, the result is unambiguous. The exception is if both are
2998 * absent, then this returns an empty (non-null) string. */
2999const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 3000{
61007b31 3001 return bs->blk ? blk_name(bs->blk) : bs->node_name;
beac80cd 3002}
beac80cd 3003
61007b31 3004int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 3005{
61007b31 3006 return bs->open_flags;
0b5a2445
PB
3007}
3008
61007b31 3009int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 3010{
61007b31 3011 return 1;
0b5a2445
PB
3012}
3013
61007b31 3014int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 3015{
61007b31 3016 assert(bs->drv);
0b5a2445 3017
61007b31
SH
3018 /* If BS is a copy on write image, it is initialized to
3019 the contents of the base image, which may not be zeroes. */
760e0063 3020 if (bs->backing) {
61007b31
SH
3021 return 0;
3022 }
3023 if (bs->drv->bdrv_has_zero_init) {
3024 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 3025 }
61007b31
SH
3026
3027 /* safe default */
3028 return 0;
68485420
KW
3029}
3030
61007b31 3031bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 3032{
61007b31 3033 BlockDriverInfo bdi;
b2a61371 3034
760e0063 3035 if (bs->backing) {
61007b31
SH
3036 return false;
3037 }
3038
3039 if (bdrv_get_info(bs, &bdi) == 0) {
3040 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
3041 }
3042
61007b31 3043 return false;
b2a61371
SH
3044}
3045
61007b31 3046bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 3047{
61007b31 3048 BlockDriverInfo bdi;
68485420 3049
760e0063 3050 if (bs->backing || !(bs->open_flags & BDRV_O_UNMAP)) {
61007b31
SH
3051 return false;
3052 }
68485420 3053
61007b31
SH
3054 if (bdrv_get_info(bs, &bdi) == 0) {
3055 return bdi.can_write_zeroes_with_unmap;
3056 }
68485420 3057
61007b31 3058 return false;
68485420
KW
3059}
3060
61007b31 3061const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 3062{
760e0063 3063 if (bs->backing && bs->backing->bs->encrypted)
61007b31
SH
3064 return bs->backing_file;
3065 else if (bs->encrypted)
3066 return bs->filename;
3067 else
3068 return NULL;
b2e12bc6
CH
3069}
3070
61007b31
SH
3071void bdrv_get_backing_filename(BlockDriverState *bs,
3072 char *filename, int filename_size)
016f5cf6 3073{
61007b31
SH
3074 pstrcpy(filename, filename_size, bs->backing_file);
3075}
d318aea9 3076
61007b31
SH
3077int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
3078{
3079 BlockDriver *drv = bs->drv;
3080 if (!drv)
3081 return -ENOMEDIUM;
3082 if (!drv->bdrv_get_info)
3083 return -ENOTSUP;
3084 memset(bdi, 0, sizeof(*bdi));
3085 return drv->bdrv_get_info(bs, bdi);
3086}
016f5cf6 3087
61007b31
SH
3088ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
3089{
3090 BlockDriver *drv = bs->drv;
3091 if (drv && drv->bdrv_get_specific_info) {
3092 return drv->bdrv_get_specific_info(bs);
3093 }
3094 return NULL;
016f5cf6
AG
3095}
3096
a31939e6 3097void bdrv_debug_event(BlockDriverState *bs, BlkdebugEvent event)
4265d620 3098{
61007b31
SH
3099 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
3100 return;
3101 }
4265d620 3102
61007b31 3103 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
3104}
3105
61007b31
SH
3106int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
3107 const char *tag)
4265d620 3108{
61007b31 3109 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 3110 bs = bs->file ? bs->file->bs : NULL;
61007b31 3111 }
4265d620 3112
61007b31
SH
3113 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
3114 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
3115 }
4265d620 3116
61007b31 3117 return -ENOTSUP;
4265d620
PB
3118}
3119
61007b31 3120int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 3121{
61007b31 3122 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 3123 bs = bs->file ? bs->file->bs : NULL;
61007b31 3124 }
ce1a14dc 3125
61007b31
SH
3126 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
3127 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
3128 }
3129
3130 return -ENOTSUP;
eb852011
MA
3131}
3132
61007b31 3133int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 3134{
61007b31 3135 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 3136 bs = bs->file ? bs->file->bs : NULL;
61007b31 3137 }
ce1a14dc 3138
61007b31
SH
3139 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
3140 return bs->drv->bdrv_debug_resume(bs, tag);
3141 }
ce1a14dc 3142
61007b31 3143 return -ENOTSUP;
f197fe2b
FZ
3144}
3145
61007b31 3146bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 3147{
61007b31 3148 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 3149 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 3150 }
19cb3738 3151
61007b31
SH
3152 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
3153 return bs->drv->bdrv_debug_is_suspended(bs, tag);
3154 }
f9f05dc5 3155
61007b31
SH
3156 return false;
3157}
f9f05dc5 3158
61007b31 3159int bdrv_is_snapshot(BlockDriverState *bs)
f9f05dc5 3160{
61007b31 3161 return !!(bs->open_flags & BDRV_O_SNAPSHOT);
f9f05dc5
KW
3162}
3163
61007b31
SH
3164/* backing_file can either be relative, or absolute, or a protocol. If it is
3165 * relative, it must be relative to the chain. So, passing in bs->filename
3166 * from a BDS as backing_file should not be done, as that may be relative to
3167 * the CWD rather than the chain. */
3168BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
3169 const char *backing_file)
f9f05dc5 3170{
61007b31
SH
3171 char *filename_full = NULL;
3172 char *backing_file_full = NULL;
3173 char *filename_tmp = NULL;
3174 int is_protocol = 0;
3175 BlockDriverState *curr_bs = NULL;
3176 BlockDriverState *retval = NULL;
f9f05dc5 3177
61007b31
SH
3178 if (!bs || !bs->drv || !backing_file) {
3179 return NULL;
f9f05dc5
KW
3180 }
3181
61007b31
SH
3182 filename_full = g_malloc(PATH_MAX);
3183 backing_file_full = g_malloc(PATH_MAX);
3184 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 3185
61007b31 3186 is_protocol = path_has_protocol(backing_file);
f9f05dc5 3187
760e0063 3188 for (curr_bs = bs; curr_bs->backing; curr_bs = curr_bs->backing->bs) {
f9f05dc5 3189
61007b31
SH
3190 /* If either of the filename paths is actually a protocol, then
3191 * compare unmodified paths; otherwise make paths relative */
3192 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
3193 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
760e0063 3194 retval = curr_bs->backing->bs;
61007b31
SH
3195 break;
3196 }
3197 } else {
3198 /* If not an absolute filename path, make it relative to the current
3199 * image's filename path */
3200 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3201 backing_file);
f9f05dc5 3202
61007b31
SH
3203 /* We are going to compare absolute pathnames */
3204 if (!realpath(filename_tmp, filename_full)) {
3205 continue;
3206 }
07f07615 3207
61007b31
SH
3208 /* We need to make sure the backing filename we are comparing against
3209 * is relative to the current image filename (or absolute) */
3210 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3211 curr_bs->backing_file);
07f07615 3212
61007b31
SH
3213 if (!realpath(filename_tmp, backing_file_full)) {
3214 continue;
3215 }
eb489bb1 3216
61007b31 3217 if (strcmp(backing_file_full, filename_full) == 0) {
760e0063 3218 retval = curr_bs->backing->bs;
61007b31
SH
3219 break;
3220 }
3221 }
eb489bb1
KW
3222 }
3223
61007b31
SH
3224 g_free(filename_full);
3225 g_free(backing_file_full);
3226 g_free(filename_tmp);
3227 return retval;
3228}
3229
3230int bdrv_get_backing_file_depth(BlockDriverState *bs)
3231{
3232 if (!bs->drv) {
3233 return 0;
eb489bb1
KW
3234 }
3235
760e0063 3236 if (!bs->backing) {
61007b31 3237 return 0;
ca716364
KW
3238 }
3239
760e0063 3240 return 1 + bdrv_get_backing_file_depth(bs->backing->bs);
61007b31 3241}
07f07615 3242
61007b31
SH
3243void bdrv_init(void)
3244{
3245 module_call_init(MODULE_INIT_BLOCK);
3246}
29cdb251 3247
61007b31
SH
3248void bdrv_init_with_whitelist(void)
3249{
3250 use_bdrv_whitelist = 1;
3251 bdrv_init();
07f07615
PB
3252}
3253
5a8a30db 3254void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 3255{
5a8a30db
KW
3256 Error *local_err = NULL;
3257 int ret;
3258
3456a8d1
KW
3259 if (!bs->drv) {
3260 return;
3261 }
3262
7ea2d269
AK
3263 if (!(bs->open_flags & BDRV_O_INCOMING)) {
3264 return;
3265 }
3266 bs->open_flags &= ~BDRV_O_INCOMING;
3267
3456a8d1 3268 if (bs->drv->bdrv_invalidate_cache) {
5a8a30db 3269 bs->drv->bdrv_invalidate_cache(bs, &local_err);
3456a8d1 3270 } else if (bs->file) {
9a4f4c31 3271 bdrv_invalidate_cache(bs->file->bs, &local_err);
5a8a30db
KW
3272 }
3273 if (local_err) {
3274 error_propagate(errp, local_err);
3275 return;
0f15423c 3276 }
3456a8d1 3277
5a8a30db
KW
3278 ret = refresh_total_sectors(bs, bs->total_sectors);
3279 if (ret < 0) {
3280 error_setg_errno(errp, -ret, "Could not refresh total sector count");
3281 return;
3282 }
0f15423c
AL
3283}
3284
5a8a30db 3285void bdrv_invalidate_cache_all(Error **errp)
0f15423c
AL
3286{
3287 BlockDriverState *bs;
5a8a30db 3288 Error *local_err = NULL;
0f15423c 3289
dc364f4c 3290 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
3291 AioContext *aio_context = bdrv_get_aio_context(bs);
3292
3293 aio_context_acquire(aio_context);
5a8a30db 3294 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 3295 aio_context_release(aio_context);
5a8a30db
KW
3296 if (local_err) {
3297 error_propagate(errp, local_err);
3298 return;
3299 }
0f15423c
AL
3300 }
3301}
3302
19cb3738
FB
3303/**************************************************************/
3304/* removable device support */
3305
3306/**
3307 * Return TRUE if the media is present
3308 */
e031f750 3309bool bdrv_is_inserted(BlockDriverState *bs)
19cb3738
FB
3310{
3311 BlockDriver *drv = bs->drv;
28d7a789 3312 BdrvChild *child;
a1aff5bf 3313
e031f750
HR
3314 if (!drv) {
3315 return false;
3316 }
28d7a789
HR
3317 if (drv->bdrv_is_inserted) {
3318 return drv->bdrv_is_inserted(bs);
3319 }
3320 QLIST_FOREACH(child, &bs->children, next) {
3321 if (!bdrv_is_inserted(child->bs)) {
3322 return false;
3323 }
e031f750 3324 }
28d7a789 3325 return true;
19cb3738
FB
3326}
3327
3328/**
8e49ca46
MA
3329 * Return whether the media changed since the last call to this
3330 * function, or -ENOTSUP if we don't know. Most drivers don't know.
19cb3738
FB
3331 */
3332int bdrv_media_changed(BlockDriverState *bs)
3333{
3334 BlockDriver *drv = bs->drv;
19cb3738 3335
8e49ca46
MA
3336 if (drv && drv->bdrv_media_changed) {
3337 return drv->bdrv_media_changed(bs);
3338 }
3339 return -ENOTSUP;
19cb3738
FB
3340}
3341
3342/**
3343 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
3344 */
f36f3949 3345void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
3346{
3347 BlockDriver *drv = bs->drv;
bfb197e0 3348 const char *device_name;
19cb3738 3349
822e1cd1
MA
3350 if (drv && drv->bdrv_eject) {
3351 drv->bdrv_eject(bs, eject_flag);
19cb3738 3352 }
6f382ed2 3353
bfb197e0
MA
3354 device_name = bdrv_get_device_name(bs);
3355 if (device_name[0] != '\0') {
3356 qapi_event_send_device_tray_moved(device_name,
a5ee7bd4 3357 eject_flag, &error_abort);
6f382ed2 3358 }
19cb3738
FB
3359}
3360
19cb3738
FB
3361/**
3362 * Lock or unlock the media (if it is locked, the user won't be able
3363 * to eject it manually).
3364 */
025e849a 3365void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
3366{
3367 BlockDriver *drv = bs->drv;
3368
025e849a 3369 trace_bdrv_lock_medium(bs, locked);
b8c6d095 3370
025e849a
MA
3371 if (drv && drv->bdrv_lock_medium) {
3372 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
3373 }
3374}
985a03b0 3375
0db6e54a
FZ
3376BdrvDirtyBitmap *bdrv_find_dirty_bitmap(BlockDriverState *bs, const char *name)
3377{
3378 BdrvDirtyBitmap *bm;
3379
3380 assert(name);
3381 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
3382 if (bm->name && !strcmp(name, bm->name)) {
3383 return bm;
3384 }
3385 }
3386 return NULL;
3387}
3388
20dca810 3389void bdrv_dirty_bitmap_make_anon(BdrvDirtyBitmap *bitmap)
0db6e54a 3390{
9bd2b08f 3391 assert(!bdrv_dirty_bitmap_frozen(bitmap));
0db6e54a
FZ
3392 g_free(bitmap->name);
3393 bitmap->name = NULL;
3394}
3395
3396BdrvDirtyBitmap *bdrv_create_dirty_bitmap(BlockDriverState *bs,
5fba6c0e 3397 uint32_t granularity,
0db6e54a 3398 const char *name,
b8afb520 3399 Error **errp)
7cd1e32a
LS
3400{
3401 int64_t bitmap_size;
e4654d2d 3402 BdrvDirtyBitmap *bitmap;
5fba6c0e 3403 uint32_t sector_granularity;
a55eb92c 3404
50717e94
PB
3405 assert((granularity & (granularity - 1)) == 0);
3406
0db6e54a
FZ
3407 if (name && bdrv_find_dirty_bitmap(bs, name)) {
3408 error_setg(errp, "Bitmap already exists: %s", name);
3409 return NULL;
3410 }
5fba6c0e
JS
3411 sector_granularity = granularity >> BDRV_SECTOR_BITS;
3412 assert(sector_granularity);
57322b78 3413 bitmap_size = bdrv_nb_sectors(bs);
b8afb520
FZ
3414 if (bitmap_size < 0) {
3415 error_setg_errno(errp, -bitmap_size, "could not get length of device");
3416 errno = -bitmap_size;
3417 return NULL;
3418 }
5839e53b 3419 bitmap = g_new0(BdrvDirtyBitmap, 1);
5fba6c0e 3420 bitmap->bitmap = hbitmap_alloc(bitmap_size, ctz32(sector_granularity));
e74e6b78 3421 bitmap->size = bitmap_size;
0db6e54a 3422 bitmap->name = g_strdup(name);
b8e6fb75 3423 bitmap->disabled = false;
e4654d2d
FZ
3424 QLIST_INSERT_HEAD(&bs->dirty_bitmaps, bitmap, list);
3425 return bitmap;
3426}
3427
9bd2b08f
JS
3428bool bdrv_dirty_bitmap_frozen(BdrvDirtyBitmap *bitmap)
3429{
3430 return bitmap->successor;
3431}
3432
b8e6fb75
JS
3433bool bdrv_dirty_bitmap_enabled(BdrvDirtyBitmap *bitmap)
3434{
9bd2b08f
JS
3435 return !(bitmap->disabled || bitmap->successor);
3436}
3437
9abe3bdc
JS
3438DirtyBitmapStatus bdrv_dirty_bitmap_status(BdrvDirtyBitmap *bitmap)
3439{
3440 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3441 return DIRTY_BITMAP_STATUS_FROZEN;
3442 } else if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3443 return DIRTY_BITMAP_STATUS_DISABLED;
3444 } else {
3445 return DIRTY_BITMAP_STATUS_ACTIVE;
3446 }
3447}
3448
9bd2b08f
JS
3449/**
3450 * Create a successor bitmap destined to replace this bitmap after an operation.
3451 * Requires that the bitmap is not frozen and has no successor.
3452 */
3453int bdrv_dirty_bitmap_create_successor(BlockDriverState *bs,
3454 BdrvDirtyBitmap *bitmap, Error **errp)
3455{
3456 uint64_t granularity;
3457 BdrvDirtyBitmap *child;
3458
3459 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3460 error_setg(errp, "Cannot create a successor for a bitmap that is "
3461 "currently frozen");
3462 return -1;
3463 }
3464 assert(!bitmap->successor);
3465
3466 /* Create an anonymous successor */
3467 granularity = bdrv_dirty_bitmap_granularity(bitmap);
3468 child = bdrv_create_dirty_bitmap(bs, granularity, NULL, errp);
3469 if (!child) {
3470 return -1;
3471 }
3472
3473 /* Successor will be on or off based on our current state. */
3474 child->disabled = bitmap->disabled;
3475
3476 /* Install the successor and freeze the parent */
3477 bitmap->successor = child;
3478 return 0;
3479}
3480
3481/**
3482 * For a bitmap with a successor, yield our name to the successor,
3483 * delete the old bitmap, and return a handle to the new bitmap.
3484 */
3485BdrvDirtyBitmap *bdrv_dirty_bitmap_abdicate(BlockDriverState *bs,
3486 BdrvDirtyBitmap *bitmap,
3487 Error **errp)
3488{
3489 char *name;
3490 BdrvDirtyBitmap *successor = bitmap->successor;
3491
3492 if (successor == NULL) {
3493 error_setg(errp, "Cannot relinquish control if "
3494 "there's no successor present");
3495 return NULL;
3496 }
3497
3498 name = bitmap->name;
3499 bitmap->name = NULL;
3500 successor->name = name;
3501 bitmap->successor = NULL;
3502 bdrv_release_dirty_bitmap(bs, bitmap);
3503
3504 return successor;
3505}
3506
3507/**
3508 * In cases of failure where we can no longer safely delete the parent,
3509 * we may wish to re-join the parent and child/successor.
3510 * The merged parent will be un-frozen, but not explicitly re-enabled.
3511 */
3512BdrvDirtyBitmap *bdrv_reclaim_dirty_bitmap(BlockDriverState *bs,
3513 BdrvDirtyBitmap *parent,
3514 Error **errp)
3515{
3516 BdrvDirtyBitmap *successor = parent->successor;
3517
3518 if (!successor) {
3519 error_setg(errp, "Cannot reclaim a successor when none is present");
3520 return NULL;
3521 }
3522
3523 if (!hbitmap_merge(parent->bitmap, successor->bitmap)) {
3524 error_setg(errp, "Merging of parent and successor bitmap failed");
3525 return NULL;
3526 }
3527 bdrv_release_dirty_bitmap(bs, successor);
3528 parent->successor = NULL;
3529
3530 return parent;
b8e6fb75
JS
3531}
3532
ce1ffea8
JS
3533/**
3534 * Truncates _all_ bitmaps attached to a BDS.
3535 */
3536static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs)
3537{
3538 BdrvDirtyBitmap *bitmap;
3539 uint64_t size = bdrv_nb_sectors(bs);
3540
3541 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
06207b0f 3542 assert(!bdrv_dirty_bitmap_frozen(bitmap));
ce1ffea8 3543 hbitmap_truncate(bitmap->bitmap, size);
5270b6a0 3544 bitmap->size = size;
ce1ffea8
JS
3545 }
3546}
3547
e4654d2d
FZ
3548void bdrv_release_dirty_bitmap(BlockDriverState *bs, BdrvDirtyBitmap *bitmap)
3549{
3550 BdrvDirtyBitmap *bm, *next;
3551 QLIST_FOREACH_SAFE(bm, &bs->dirty_bitmaps, list, next) {
3552 if (bm == bitmap) {
9bd2b08f 3553 assert(!bdrv_dirty_bitmap_frozen(bm));
e4654d2d
FZ
3554 QLIST_REMOVE(bitmap, list);
3555 hbitmap_free(bitmap->bitmap);
0db6e54a 3556 g_free(bitmap->name);
e4654d2d
FZ
3557 g_free(bitmap);
3558 return;
a55eb92c 3559 }
7cd1e32a
LS
3560 }
3561}
3562
b8e6fb75
JS
3563void bdrv_disable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3564{
9bd2b08f 3565 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3566 bitmap->disabled = true;
3567}
3568
3569void bdrv_enable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3570{
9bd2b08f 3571 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3572 bitmap->disabled = false;
3573}
3574
21b56835
FZ
3575BlockDirtyInfoList *bdrv_query_dirty_bitmaps(BlockDriverState *bs)
3576{
3577 BdrvDirtyBitmap *bm;
3578 BlockDirtyInfoList *list = NULL;
3579 BlockDirtyInfoList **plist = &list;
3580
3581 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
5839e53b
MA
3582 BlockDirtyInfo *info = g_new0(BlockDirtyInfo, 1);
3583 BlockDirtyInfoList *entry = g_new0(BlockDirtyInfoList, 1);
20dca810 3584 info->count = bdrv_get_dirty_count(bm);
592fdd02 3585 info->granularity = bdrv_dirty_bitmap_granularity(bm);
0db6e54a
FZ
3586 info->has_name = !!bm->name;
3587 info->name = g_strdup(bm->name);
9abe3bdc 3588 info->status = bdrv_dirty_bitmap_status(bm);
21b56835
FZ
3589 entry->value = info;
3590 *plist = entry;
3591 plist = &entry->next;
3592 }
3593
3594 return list;
3595}
3596
e4654d2d 3597int bdrv_get_dirty(BlockDriverState *bs, BdrvDirtyBitmap *bitmap, int64_t sector)
7cd1e32a 3598{
e4654d2d
FZ
3599 if (bitmap) {
3600 return hbitmap_get(bitmap->bitmap, sector);
7cd1e32a
LS
3601 } else {
3602 return 0;
3603 }
3604}
3605
341ebc2f
JS
3606/**
3607 * Chooses a default granularity based on the existing cluster size,
3608 * but clamped between [4K, 64K]. Defaults to 64K in the case that there
3609 * is no cluster size information available.
3610 */
3611uint32_t bdrv_get_default_bitmap_granularity(BlockDriverState *bs)
3612{
3613 BlockDriverInfo bdi;
3614 uint32_t granularity;
3615
3616 if (bdrv_get_info(bs, &bdi) >= 0 && bdi.cluster_size > 0) {
3617 granularity = MAX(4096, bdi.cluster_size);
3618 granularity = MIN(65536, granularity);
3619 } else {
3620 granularity = 65536;
3621 }
3622
3623 return granularity;
3624}
3625
592fdd02
JS
3626uint32_t bdrv_dirty_bitmap_granularity(BdrvDirtyBitmap *bitmap)
3627{
3628 return BDRV_SECTOR_SIZE << hbitmap_granularity(bitmap->bitmap);
3629}
3630
20dca810 3631void bdrv_dirty_iter_init(BdrvDirtyBitmap *bitmap, HBitmapIter *hbi)
1755da16 3632{
e4654d2d 3633 hbitmap_iter_init(hbi, bitmap->bitmap, 0);
1755da16
PB
3634}
3635
20dca810 3636void bdrv_set_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3637 int64_t cur_sector, int nr_sectors)
3638{
b8e6fb75 3639 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3640 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3641}
3642
20dca810 3643void bdrv_reset_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3644 int64_t cur_sector, int nr_sectors)
3645{
b8e6fb75 3646 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3647 hbitmap_reset(bitmap->bitmap, cur_sector, nr_sectors);
3648}
3649
df9a681d 3650void bdrv_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap, HBitmap **out)
e74e6b78
JS
3651{
3652 assert(bdrv_dirty_bitmap_enabled(bitmap));
df9a681d
FZ
3653 if (!out) {
3654 hbitmap_reset_all(bitmap->bitmap);
3655 } else {
3656 HBitmap *backup = bitmap->bitmap;
3657 bitmap->bitmap = hbitmap_alloc(bitmap->size,
3658 hbitmap_granularity(backup));
3659 *out = backup;
3660 }
3661}
3662
3663void bdrv_undo_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap, HBitmap *in)
3664{
3665 HBitmap *tmp = bitmap->bitmap;
3666 assert(bdrv_dirty_bitmap_enabled(bitmap));
3667 bitmap->bitmap = in;
3668 hbitmap_free(tmp);
e74e6b78
JS
3669}
3670
e0c47b6c
SH
3671void bdrv_set_dirty(BlockDriverState *bs, int64_t cur_sector,
3672 int nr_sectors)
1755da16 3673{
e4654d2d
FZ
3674 BdrvDirtyBitmap *bitmap;
3675 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
b8e6fb75
JS
3676 if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3677 continue;
3678 }
e4654d2d
FZ
3679 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3680 }
1755da16
PB
3681}
3682
d58d8453
JS
3683/**
3684 * Advance an HBitmapIter to an arbitrary offset.
3685 */
3686void bdrv_set_dirty_iter(HBitmapIter *hbi, int64_t offset)
3687{
3688 assert(hbi->hb);
3689 hbitmap_iter_init(hbi, hbi->hb, offset);
3690}
3691
20dca810 3692int64_t bdrv_get_dirty_count(BdrvDirtyBitmap *bitmap)
aaa0eb75 3693{
e4654d2d 3694 return hbitmap_count(bitmap->bitmap);
aaa0eb75 3695}
f88e1a42 3696
9fcb0251
FZ
3697/* Get a reference to bs */
3698void bdrv_ref(BlockDriverState *bs)
3699{
3700 bs->refcnt++;
3701}
3702
3703/* Release a previously grabbed reference to bs.
3704 * If after releasing, reference count is zero, the BlockDriverState is
3705 * deleted. */
3706void bdrv_unref(BlockDriverState *bs)
3707{
9a4d5ca6
JC
3708 if (!bs) {
3709 return;
3710 }
9fcb0251
FZ
3711 assert(bs->refcnt > 0);
3712 if (--bs->refcnt == 0) {
3713 bdrv_delete(bs);
3714 }
3715}
3716
fbe40ff7
FZ
3717struct BdrvOpBlocker {
3718 Error *reason;
3719 QLIST_ENTRY(BdrvOpBlocker) list;
3720};
3721
3722bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
3723{
3724 BdrvOpBlocker *blocker;
3725 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3726 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
3727 blocker = QLIST_FIRST(&bs->op_blockers[op]);
3728 if (errp) {
e43bfd9c
MA
3729 *errp = error_copy(blocker->reason);
3730 error_prepend(errp, "Node '%s' is busy: ",
3731 bdrv_get_device_or_node_name(bs));
fbe40ff7
FZ
3732 }
3733 return true;
3734 }
3735 return false;
3736}
3737
3738void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
3739{
3740 BdrvOpBlocker *blocker;
3741 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3742
5839e53b 3743 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
3744 blocker->reason = reason;
3745 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
3746}
3747
3748void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
3749{
3750 BdrvOpBlocker *blocker, *next;
3751 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3752 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
3753 if (blocker->reason == reason) {
3754 QLIST_REMOVE(blocker, list);
3755 g_free(blocker);
3756 }
3757 }
3758}
3759
3760void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
3761{
3762 int i;
3763 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3764 bdrv_op_block(bs, i, reason);
3765 }
3766}
3767
3768void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
3769{
3770 int i;
3771 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3772 bdrv_op_unblock(bs, i, reason);
3773 }
3774}
3775
3776bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
3777{
3778 int i;
3779
3780 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3781 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
3782 return false;
3783 }
3784 }
3785 return true;
3786}
3787
d92ada22
LC
3788void bdrv_img_create(const char *filename, const char *fmt,
3789 const char *base_filename, const char *base_fmt,
f382d43a
MR
3790 char *options, uint64_t img_size, int flags,
3791 Error **errp, bool quiet)
f88e1a42 3792{
83d0521a
CL
3793 QemuOptsList *create_opts = NULL;
3794 QemuOpts *opts = NULL;
3795 const char *backing_fmt, *backing_file;
3796 int64_t size;
f88e1a42 3797 BlockDriver *drv, *proto_drv;
cc84d90f 3798 Error *local_err = NULL;
f88e1a42
JS
3799 int ret = 0;
3800
3801 /* Find driver and parse its options */
3802 drv = bdrv_find_format(fmt);
3803 if (!drv) {
71c79813 3804 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 3805 return;
f88e1a42
JS
3806 }
3807
b65a5e12 3808 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 3809 if (!proto_drv) {
d92ada22 3810 return;
f88e1a42
JS
3811 }
3812
c6149724
HR
3813 if (!drv->create_opts) {
3814 error_setg(errp, "Format driver '%s' does not support image creation",
3815 drv->format_name);
3816 return;
3817 }
3818
3819 if (!proto_drv->create_opts) {
3820 error_setg(errp, "Protocol driver '%s' does not support image creation",
3821 proto_drv->format_name);
3822 return;
3823 }
3824
c282e1fd
CL
3825 create_opts = qemu_opts_append(create_opts, drv->create_opts);
3826 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
3827
3828 /* Create parameter list with default values */
83d0521a 3829 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 3830 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
3831
3832 /* Parse -o options */
3833 if (options) {
dc523cd3
MA
3834 qemu_opts_do_parse(opts, options, NULL, &local_err);
3835 if (local_err) {
3836 error_report_err(local_err);
3837 local_err = NULL;
83d0521a 3838 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
3839 goto out;
3840 }
3841 }
3842
3843 if (base_filename) {
f43e47db 3844 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 3845 if (local_err) {
71c79813
LC
3846 error_setg(errp, "Backing file not supported for file format '%s'",
3847 fmt);
f88e1a42
JS
3848 goto out;
3849 }
3850 }
3851
3852 if (base_fmt) {
f43e47db 3853 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 3854 if (local_err) {
71c79813
LC
3855 error_setg(errp, "Backing file format not supported for file "
3856 "format '%s'", fmt);
f88e1a42
JS
3857 goto out;
3858 }
3859 }
3860
83d0521a
CL
3861 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
3862 if (backing_file) {
3863 if (!strcmp(filename, backing_file)) {
71c79813
LC
3864 error_setg(errp, "Error: Trying to create an image with the "
3865 "same filename as the backing file");
792da93a
JS
3866 goto out;
3867 }
3868 }
3869
83d0521a 3870 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42
JS
3871
3872 // The size for the image must always be specified, with one exception:
3873 // If we are using a backing file, we can obtain the size from there
83d0521a
CL
3874 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
3875 if (size == -1) {
3876 if (backing_file) {
66f6b814 3877 BlockDriverState *bs;
29168018 3878 char *full_backing = g_new0(char, PATH_MAX);
52bf1e72 3879 int64_t size;
63090dac 3880 int back_flags;
e6641719 3881 QDict *backing_options = NULL;
63090dac 3882
29168018
HR
3883 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
3884 full_backing, PATH_MAX,
3885 &local_err);
3886 if (local_err) {
3887 g_free(full_backing);
3888 goto out;
3889 }
3890
63090dac
PB
3891 /* backing files always opened read-only */
3892 back_flags =
3893 flags & ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 3894
e6641719
HR
3895 if (backing_fmt) {
3896 backing_options = qdict_new();
3897 qdict_put(backing_options, "driver",
3898 qstring_from_str(backing_fmt));
3899 }
3900
f67503e5 3901 bs = NULL;
e6641719 3902 ret = bdrv_open(&bs, full_backing, NULL, backing_options,
6ebf9aa2 3903 back_flags, &local_err);
29168018 3904 g_free(full_backing);
f88e1a42 3905 if (ret < 0) {
f88e1a42
JS
3906 goto out;
3907 }
52bf1e72
MA
3908 size = bdrv_getlength(bs);
3909 if (size < 0) {
3910 error_setg_errno(errp, -size, "Could not get size of '%s'",
3911 backing_file);
3912 bdrv_unref(bs);
3913 goto out;
3914 }
f88e1a42 3915
39101f25 3916 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
66f6b814
HR
3917
3918 bdrv_unref(bs);
f88e1a42 3919 } else {
71c79813 3920 error_setg(errp, "Image creation needs a size parameter");
f88e1a42
JS
3921 goto out;
3922 }
3923 }
3924
f382d43a 3925 if (!quiet) {
fe646693 3926 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 3927 qemu_opts_print(opts, " ");
f382d43a
MR
3928 puts("");
3929 }
83d0521a 3930
c282e1fd 3931 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 3932
cc84d90f
HR
3933 if (ret == -EFBIG) {
3934 /* This is generally a better message than whatever the driver would
3935 * deliver (especially because of the cluster_size_hint), since that
3936 * is most probably not much different from "image too large". */
3937 const char *cluster_size_hint = "";
83d0521a 3938 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 3939 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 3940 }
cc84d90f
HR
3941 error_setg(errp, "The image size is too large for file format '%s'"
3942 "%s", fmt, cluster_size_hint);
3943 error_free(local_err);
3944 local_err = NULL;
f88e1a42
JS
3945 }
3946
3947out:
83d0521a
CL
3948 qemu_opts_del(opts);
3949 qemu_opts_free(create_opts);
84d18f06 3950 if (local_err) {
cc84d90f
HR
3951 error_propagate(errp, local_err);
3952 }
f88e1a42 3953}
85d126f3
SH
3954
3955AioContext *bdrv_get_aio_context(BlockDriverState *bs)
3956{
dcd04228
SH
3957 return bs->aio_context;
3958}
3959
3960void bdrv_detach_aio_context(BlockDriverState *bs)
3961{
33384421
HR
3962 BdrvAioNotifier *baf;
3963
dcd04228
SH
3964 if (!bs->drv) {
3965 return;
3966 }
3967
33384421
HR
3968 QLIST_FOREACH(baf, &bs->aio_notifiers, list) {
3969 baf->detach_aio_context(baf->opaque);
3970 }
3971
a0d64a61 3972 if (bs->throttle_state) {
0e5b0a2d 3973 throttle_timers_detach_aio_context(&bs->throttle_timers);
13af91eb 3974 }
dcd04228
SH
3975 if (bs->drv->bdrv_detach_aio_context) {
3976 bs->drv->bdrv_detach_aio_context(bs);
3977 }
3978 if (bs->file) {
9a4f4c31 3979 bdrv_detach_aio_context(bs->file->bs);
dcd04228 3980 }
760e0063
KW
3981 if (bs->backing) {
3982 bdrv_detach_aio_context(bs->backing->bs);
dcd04228
SH
3983 }
3984
3985 bs->aio_context = NULL;
3986}
3987
3988void bdrv_attach_aio_context(BlockDriverState *bs,
3989 AioContext *new_context)
3990{
33384421
HR
3991 BdrvAioNotifier *ban;
3992
dcd04228
SH
3993 if (!bs->drv) {
3994 return;
3995 }
3996
3997 bs->aio_context = new_context;
3998
760e0063
KW
3999 if (bs->backing) {
4000 bdrv_attach_aio_context(bs->backing->bs, new_context);
dcd04228
SH
4001 }
4002 if (bs->file) {
9a4f4c31 4003 bdrv_attach_aio_context(bs->file->bs, new_context);
dcd04228
SH
4004 }
4005 if (bs->drv->bdrv_attach_aio_context) {
4006 bs->drv->bdrv_attach_aio_context(bs, new_context);
4007 }
a0d64a61 4008 if (bs->throttle_state) {
0e5b0a2d 4009 throttle_timers_attach_aio_context(&bs->throttle_timers, new_context);
13af91eb 4010 }
33384421
HR
4011
4012 QLIST_FOREACH(ban, &bs->aio_notifiers, list) {
4013 ban->attached_aio_context(new_context, ban->opaque);
4014 }
dcd04228
SH
4015}
4016
4017void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
4018{
53ec73e2 4019 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228
SH
4020
4021 bdrv_detach_aio_context(bs);
4022
4023 /* This function executes in the old AioContext so acquire the new one in
4024 * case it runs in a different thread.
4025 */
4026 aio_context_acquire(new_context);
4027 bdrv_attach_aio_context(bs, new_context);
4028 aio_context_release(new_context);
85d126f3 4029}
d616b224 4030
33384421
HR
4031void bdrv_add_aio_context_notifier(BlockDriverState *bs,
4032 void (*attached_aio_context)(AioContext *new_context, void *opaque),
4033 void (*detach_aio_context)(void *opaque), void *opaque)
4034{
4035 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
4036 *ban = (BdrvAioNotifier){
4037 .attached_aio_context = attached_aio_context,
4038 .detach_aio_context = detach_aio_context,
4039 .opaque = opaque
4040 };
4041
4042 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
4043}
4044
4045void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
4046 void (*attached_aio_context)(AioContext *,
4047 void *),
4048 void (*detach_aio_context)(void *),
4049 void *opaque)
4050{
4051 BdrvAioNotifier *ban, *ban_next;
4052
4053 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
4054 if (ban->attached_aio_context == attached_aio_context &&
4055 ban->detach_aio_context == detach_aio_context &&
4056 ban->opaque == opaque)
4057 {
4058 QLIST_REMOVE(ban, list);
4059 g_free(ban);
4060
4061 return;
4062 }
4063 }
4064
4065 abort();
4066}
4067
77485434 4068int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
8b13976d 4069 BlockDriverAmendStatusCB *status_cb, void *cb_opaque)
6f176b48 4070{
c282e1fd 4071 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
4072 return -ENOTSUP;
4073 }
8b13976d 4074 return bs->drv->bdrv_amend_options(bs, opts, status_cb, cb_opaque);
6f176b48 4075}
f6186f49 4076
b5042a36
BC
4077/* This function will be called by the bdrv_recurse_is_first_non_filter method
4078 * of block filter and by bdrv_is_first_non_filter.
4079 * It is used to test if the given bs is the candidate or recurse more in the
4080 * node graph.
212a5a8f 4081 */
b5042a36 4082bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 4083 BlockDriverState *candidate)
f6186f49 4084{
b5042a36
BC
4085 /* return false if basic checks fails */
4086 if (!bs || !bs->drv) {
212a5a8f 4087 return false;
f6186f49
BC
4088 }
4089
b5042a36
BC
4090 /* the code reached a non block filter driver -> check if the bs is
4091 * the same as the candidate. It's the recursion termination condition.
4092 */
4093 if (!bs->drv->is_filter) {
4094 return bs == candidate;
212a5a8f 4095 }
b5042a36 4096 /* Down this path the driver is a block filter driver */
212a5a8f 4097
b5042a36
BC
4098 /* If the block filter recursion method is defined use it to recurse down
4099 * the node graph.
4100 */
4101 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 4102 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
4103 }
4104
b5042a36
BC
4105 /* the driver is a block filter but don't allow to recurse -> return false
4106 */
4107 return false;
f6186f49
BC
4108}
4109
212a5a8f
BC
4110/* This function checks if the candidate is the first non filter bs down it's
4111 * bs chain. Since we don't have pointers to parents it explore all bs chains
4112 * from the top. Some filters can choose not to pass down the recursion.
4113 */
4114bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 4115{
212a5a8f
BC
4116 BlockDriverState *bs;
4117
4118 /* walk down the bs forest recursively */
4119 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
4120 bool perm;
4121
b5042a36 4122 /* try to recurse in this top level bs */
e6dc8a1f 4123 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
4124
4125 /* candidate is the first non filter */
4126 if (perm) {
4127 return true;
4128 }
4129 }
4130
4131 return false;
f6186f49 4132}
09158f00 4133
e12f3784
WC
4134BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
4135 const char *node_name, Error **errp)
09158f00
BC
4136{
4137 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
4138 AioContext *aio_context;
4139
09158f00
BC
4140 if (!to_replace_bs) {
4141 error_setg(errp, "Node name '%s' not found", node_name);
4142 return NULL;
4143 }
4144
5a7e7a0b
SH
4145 aio_context = bdrv_get_aio_context(to_replace_bs);
4146 aio_context_acquire(aio_context);
4147
09158f00 4148 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
4149 to_replace_bs = NULL;
4150 goto out;
09158f00
BC
4151 }
4152
4153 /* We don't want arbitrary node of the BDS chain to be replaced only the top
4154 * most non filter in order to prevent data corruption.
4155 * Another benefit is that this tests exclude backing files which are
4156 * blocked by the backing blockers.
4157 */
e12f3784 4158 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 4159 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
4160 to_replace_bs = NULL;
4161 goto out;
09158f00
BC
4162 }
4163
5a7e7a0b
SH
4164out:
4165 aio_context_release(aio_context);
09158f00
BC
4166 return to_replace_bs;
4167}
448ad91d 4168
91af7014
HR
4169static bool append_open_options(QDict *d, BlockDriverState *bs)
4170{
4171 const QDictEntry *entry;
9e700c1a 4172 QemuOptDesc *desc;
260fecf1 4173 BdrvChild *child;
91af7014 4174 bool found_any = false;
260fecf1 4175 const char *p;
91af7014
HR
4176
4177 for (entry = qdict_first(bs->options); entry;
4178 entry = qdict_next(bs->options, entry))
4179 {
260fecf1
KW
4180 /* Exclude options for children */
4181 QLIST_FOREACH(child, &bs->children, next) {
4182 if (strstart(qdict_entry_key(entry), child->name, &p)
4183 && (!*p || *p == '.'))
4184 {
4185 break;
4186 }
4187 }
4188 if (child) {
9e700c1a 4189 continue;
91af7014 4190 }
9e700c1a
KW
4191
4192 /* And exclude all non-driver-specific options */
4193 for (desc = bdrv_runtime_opts.desc; desc->name; desc++) {
4194 if (!strcmp(qdict_entry_key(entry), desc->name)) {
4195 break;
4196 }
4197 }
4198 if (desc->name) {
4199 continue;
4200 }
4201
4202 qobject_incref(qdict_entry_value(entry));
4203 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
4204 found_any = true;
91af7014
HR
4205 }
4206
4207 return found_any;
4208}
4209
4210/* Updates the following BDS fields:
4211 * - exact_filename: A filename which may be used for opening a block device
4212 * which (mostly) equals the given BDS (even without any
4213 * other options; so reading and writing must return the same
4214 * results, but caching etc. may be different)
4215 * - full_open_options: Options which, when given when opening a block device
4216 * (without a filename), result in a BDS (mostly)
4217 * equalling the given one
4218 * - filename: If exact_filename is set, it is copied here. Otherwise,
4219 * full_open_options is converted to a JSON object, prefixed with
4220 * "json:" (for use through the JSON pseudo protocol) and put here.
4221 */
4222void bdrv_refresh_filename(BlockDriverState *bs)
4223{
4224 BlockDriver *drv = bs->drv;
4225 QDict *opts;
4226
4227 if (!drv) {
4228 return;
4229 }
4230
4231 /* This BDS's file name will most probably depend on its file's name, so
4232 * refresh that first */
4233 if (bs->file) {
9a4f4c31 4234 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
4235 }
4236
4237 if (drv->bdrv_refresh_filename) {
4238 /* Obsolete information is of no use here, so drop the old file name
4239 * information before refreshing it */
4240 bs->exact_filename[0] = '\0';
4241 if (bs->full_open_options) {
4242 QDECREF(bs->full_open_options);
4243 bs->full_open_options = NULL;
4244 }
4245
4cdd01d3
KW
4246 opts = qdict_new();
4247 append_open_options(opts, bs);
4248 drv->bdrv_refresh_filename(bs, opts);
4249 QDECREF(opts);
91af7014
HR
4250 } else if (bs->file) {
4251 /* Try to reconstruct valid information from the underlying file */
4252 bool has_open_options;
4253
4254 bs->exact_filename[0] = '\0';
4255 if (bs->full_open_options) {
4256 QDECREF(bs->full_open_options);
4257 bs->full_open_options = NULL;
4258 }
4259
4260 opts = qdict_new();
4261 has_open_options = append_open_options(opts, bs);
4262
4263 /* If no specific options have been given for this BDS, the filename of
4264 * the underlying file should suffice for this one as well */
9a4f4c31
KW
4265 if (bs->file->bs->exact_filename[0] && !has_open_options) {
4266 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
4267 }
4268 /* Reconstructing the full options QDict is simple for most format block
4269 * drivers, as long as the full options are known for the underlying
4270 * file BDS. The full options QDict of that file BDS should somehow
4271 * contain a representation of the filename, therefore the following
4272 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 4273 if (bs->file->bs->full_open_options) {
91af7014
HR
4274 qdict_put_obj(opts, "driver",
4275 QOBJECT(qstring_from_str(drv->format_name)));
9a4f4c31
KW
4276 QINCREF(bs->file->bs->full_open_options);
4277 qdict_put_obj(opts, "file",
4278 QOBJECT(bs->file->bs->full_open_options));
91af7014
HR
4279
4280 bs->full_open_options = opts;
4281 } else {
4282 QDECREF(opts);
4283 }
4284 } else if (!bs->full_open_options && qdict_size(bs->options)) {
4285 /* There is no underlying file BDS (at least referenced by BDS.file),
4286 * so the full options QDict should be equal to the options given
4287 * specifically for this block device when it was opened (plus the
4288 * driver specification).
4289 * Because those options don't change, there is no need to update
4290 * full_open_options when it's already set. */
4291
4292 opts = qdict_new();
4293 append_open_options(opts, bs);
4294 qdict_put_obj(opts, "driver",
4295 QOBJECT(qstring_from_str(drv->format_name)));
4296
4297 if (bs->exact_filename[0]) {
4298 /* This may not work for all block protocol drivers (some may
4299 * require this filename to be parsed), but we have to find some
4300 * default solution here, so just include it. If some block driver
4301 * does not support pure options without any filename at all or
4302 * needs some special format of the options QDict, it needs to
4303 * implement the driver-specific bdrv_refresh_filename() function.
4304 */
4305 qdict_put_obj(opts, "filename",
4306 QOBJECT(qstring_from_str(bs->exact_filename)));
4307 }
4308
4309 bs->full_open_options = opts;
4310 }
4311
4312 if (bs->exact_filename[0]) {
4313 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4314 } else if (bs->full_open_options) {
4315 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4316 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4317 qstring_get_str(json));
4318 QDECREF(json);
4319 }
4320}
This page took 1.661087 seconds and 4 git commands to generate.