]> git.proxmox.com Git - mirror_qemu.git/blame - block.c
tcg: Save insn data and use it in cpu_restore_state_from_tb
[mirror_qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
3990d09a 24#include "config-host.h"
faf07963 25#include "qemu-common.h"
6d519a5f 26#include "trace.h"
737e150e
PB
27#include "block/block_int.h"
28#include "block/blockjob.h"
d49b6836 29#include "qemu/error-report.h"
1de7afc9 30#include "qemu/module.h"
cc7a8ea7 31#include "qapi/qmp/qerror.h"
7b1b5d19 32#include "qapi/qmp/qjson.h"
bfb197e0 33#include "sysemu/block-backend.h"
9c17d615 34#include "sysemu/sysemu.h"
1de7afc9 35#include "qemu/notify.h"
737e150e 36#include "block/coroutine.h"
c13163fb 37#include "block/qapi.h"
b2023818 38#include "qmp-commands.h"
1de7afc9 39#include "qemu/timer.h"
a5ee7bd4 40#include "qapi-event.h"
db628338 41#include "block/throttle-groups.h"
fc01f7e7 42
71e72a19 43#ifdef CONFIG_BSD
7674e7bf
FB
44#include <sys/types.h>
45#include <sys/stat.h>
46#include <sys/ioctl.h>
72cf2d4f 47#include <sys/queue.h>
c5e97233 48#ifndef __DragonFly__
7674e7bf
FB
49#include <sys/disk.h>
50#endif
c5e97233 51#endif
7674e7bf 52
49dc768d
AL
53#ifdef _WIN32
54#include <windows.h>
55#endif
56
9bd2b08f
JS
57/**
58 * A BdrvDirtyBitmap can be in three possible states:
59 * (1) successor is NULL and disabled is false: full r/w mode
60 * (2) successor is NULL and disabled is true: read only mode ("disabled")
61 * (3) successor is set: frozen mode.
62 * A frozen bitmap cannot be renamed, deleted, anonymized, cleared, set,
63 * or enabled. A frozen bitmap can only abdicate() or reclaim().
64 */
e4654d2d 65struct BdrvDirtyBitmap {
aa0c7ca5
JS
66 HBitmap *bitmap; /* Dirty sector bitmap implementation */
67 BdrvDirtyBitmap *successor; /* Anonymous child; implies frozen status */
68 char *name; /* Optional non-empty unique ID */
69 int64_t size; /* Size of the bitmap (Number of sectors) */
70 bool disabled; /* Bitmap is read-only */
e4654d2d
FZ
71 QLIST_ENTRY(BdrvDirtyBitmap) list;
72};
73
1c9805a3
SH
74#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
75
1b7bdbc1
SH
76static QTAILQ_HEAD(, BlockDriverState) bdrv_states =
77 QTAILQ_HEAD_INITIALIZER(bdrv_states);
7ee930d0 78
dc364f4c
BC
79static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
80 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
81
8a22f02a
SH
82static QLIST_HEAD(, BlockDriver) bdrv_drivers =
83 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 84
f3930ed0
KW
85static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
86 const char *reference, QDict *options, int flags,
87 BlockDriverState *parent,
ce343771 88 const BdrvChildRole *child_role, Error **errp);
f3930ed0 89
ce1ffea8 90static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs);
eb852011
MA
91/* If non-zero, use only whitelisted block drivers */
92static int use_bdrv_whitelist;
93
9e0b22f4
SH
94#ifdef _WIN32
95static int is_windows_drive_prefix(const char *filename)
96{
97 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
98 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
99 filename[1] == ':');
100}
101
102int is_windows_drive(const char *filename)
103{
104 if (is_windows_drive_prefix(filename) &&
105 filename[2] == '\0')
106 return 1;
107 if (strstart(filename, "\\\\.\\", NULL) ||
108 strstart(filename, "//./", NULL))
109 return 1;
110 return 0;
111}
112#endif
113
339064d5
KW
114size_t bdrv_opt_mem_align(BlockDriverState *bs)
115{
116 if (!bs || !bs->drv) {
459b4e66
DL
117 /* page size or 4k (hdd sector size) should be on the safe side */
118 return MAX(4096, getpagesize());
339064d5
KW
119 }
120
121 return bs->bl.opt_mem_alignment;
122}
123
4196d2f0
DL
124size_t bdrv_min_mem_align(BlockDriverState *bs)
125{
126 if (!bs || !bs->drv) {
459b4e66
DL
127 /* page size or 4k (hdd sector size) should be on the safe side */
128 return MAX(4096, getpagesize());
4196d2f0
DL
129 }
130
131 return bs->bl.min_mem_alignment;
132}
133
9e0b22f4 134/* check if the path starts with "<protocol>:" */
5c98415b 135int path_has_protocol(const char *path)
9e0b22f4 136{
947995c0
PB
137 const char *p;
138
9e0b22f4
SH
139#ifdef _WIN32
140 if (is_windows_drive(path) ||
141 is_windows_drive_prefix(path)) {
142 return 0;
143 }
947995c0
PB
144 p = path + strcspn(path, ":/\\");
145#else
146 p = path + strcspn(path, ":/");
9e0b22f4
SH
147#endif
148
947995c0 149 return *p == ':';
9e0b22f4
SH
150}
151
83f64091 152int path_is_absolute(const char *path)
3b0d4f61 153{
21664424
FB
154#ifdef _WIN32
155 /* specific case for names like: "\\.\d:" */
f53f4da9 156 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 157 return 1;
f53f4da9
PB
158 }
159 return (*path == '/' || *path == '\\');
3b9f94e1 160#else
f53f4da9 161 return (*path == '/');
3b9f94e1 162#endif
3b0d4f61
FB
163}
164
83f64091
FB
165/* if filename is absolute, just copy it to dest. Otherwise, build a
166 path to it by considering it is relative to base_path. URL are
167 supported. */
168void path_combine(char *dest, int dest_size,
169 const char *base_path,
170 const char *filename)
3b0d4f61 171{
83f64091
FB
172 const char *p, *p1;
173 int len;
174
175 if (dest_size <= 0)
176 return;
177 if (path_is_absolute(filename)) {
178 pstrcpy(dest, dest_size, filename);
179 } else {
180 p = strchr(base_path, ':');
181 if (p)
182 p++;
183 else
184 p = base_path;
3b9f94e1
FB
185 p1 = strrchr(base_path, '/');
186#ifdef _WIN32
187 {
188 const char *p2;
189 p2 = strrchr(base_path, '\\');
190 if (!p1 || p2 > p1)
191 p1 = p2;
192 }
193#endif
83f64091
FB
194 if (p1)
195 p1++;
196 else
197 p1 = base_path;
198 if (p1 > p)
199 p = p1;
200 len = p - base_path;
201 if (len > dest_size - 1)
202 len = dest_size - 1;
203 memcpy(dest, base_path, len);
204 dest[len] = '\0';
205 pstrcat(dest, dest_size, filename);
3b0d4f61 206 }
3b0d4f61
FB
207}
208
0a82855a
HR
209void bdrv_get_full_backing_filename_from_filename(const char *backed,
210 const char *backing,
9f07429e
HR
211 char *dest, size_t sz,
212 Error **errp)
dc5a1371 213{
9f07429e
HR
214 if (backing[0] == '\0' || path_has_protocol(backing) ||
215 path_is_absolute(backing))
216 {
0a82855a 217 pstrcpy(dest, sz, backing);
9f07429e
HR
218 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
219 error_setg(errp, "Cannot use relative backing file names for '%s'",
220 backed);
dc5a1371 221 } else {
0a82855a 222 path_combine(dest, sz, backed, backing);
dc5a1371
PB
223 }
224}
225
9f07429e
HR
226void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
227 Error **errp)
0a82855a 228{
9f07429e
HR
229 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
230
231 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
232 dest, sz, errp);
0a82855a
HR
233}
234
0eb7217e
SH
235void bdrv_register(BlockDriver *bdrv)
236{
237 bdrv_setup_io_funcs(bdrv);
b2e12bc6 238
8a22f02a 239 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 240}
b338082b 241
7f06d47e 242BlockDriverState *bdrv_new_root(void)
b338082b 243{
7f06d47e 244 BlockDriverState *bs = bdrv_new();
e4e9986b 245
e4e9986b 246 QTAILQ_INSERT_TAIL(&bdrv_states, bs, device_list);
e4e9986b
MA
247 return bs;
248}
249
250BlockDriverState *bdrv_new(void)
251{
252 BlockDriverState *bs;
253 int i;
254
5839e53b 255 bs = g_new0(BlockDriverState, 1);
e4654d2d 256 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
257 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
258 QLIST_INIT(&bs->op_blockers[i]);
259 }
28a7282a 260 bdrv_iostatus_disable(bs);
d7d512f6 261 notifier_list_init(&bs->close_notifiers);
d616b224 262 notifier_with_return_list_init(&bs->before_write_notifiers);
cc0681c4
BC
263 qemu_co_queue_init(&bs->throttled_reqs[0]);
264 qemu_co_queue_init(&bs->throttled_reqs[1]);
9fcb0251 265 bs->refcnt = 1;
dcd04228 266 bs->aio_context = qemu_get_aio_context();
d7d512f6 267
b338082b
FB
268 return bs;
269}
270
d7d512f6
PB
271void bdrv_add_close_notifier(BlockDriverState *bs, Notifier *notify)
272{
273 notifier_list_add(&bs->close_notifiers, notify);
274}
275
ea2384d3
FB
276BlockDriver *bdrv_find_format(const char *format_name)
277{
278 BlockDriver *drv1;
8a22f02a
SH
279 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
280 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 281 return drv1;
8a22f02a 282 }
ea2384d3
FB
283 }
284 return NULL;
285}
286
b64ec4e4 287static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 288{
b64ec4e4
FZ
289 static const char *whitelist_rw[] = {
290 CONFIG_BDRV_RW_WHITELIST
291 };
292 static const char *whitelist_ro[] = {
293 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
294 };
295 const char **p;
296
b64ec4e4 297 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 298 return 1; /* no whitelist, anything goes */
b64ec4e4 299 }
eb852011 300
b64ec4e4 301 for (p = whitelist_rw; *p; p++) {
eb852011
MA
302 if (!strcmp(drv->format_name, *p)) {
303 return 1;
304 }
305 }
b64ec4e4
FZ
306 if (read_only) {
307 for (p = whitelist_ro; *p; p++) {
308 if (!strcmp(drv->format_name, *p)) {
309 return 1;
310 }
311 }
312 }
eb852011
MA
313 return 0;
314}
315
5b7e1542
ZYW
316typedef struct CreateCo {
317 BlockDriver *drv;
318 char *filename;
83d0521a 319 QemuOpts *opts;
5b7e1542 320 int ret;
cc84d90f 321 Error *err;
5b7e1542
ZYW
322} CreateCo;
323
324static void coroutine_fn bdrv_create_co_entry(void *opaque)
325{
cc84d90f
HR
326 Error *local_err = NULL;
327 int ret;
328
5b7e1542
ZYW
329 CreateCo *cco = opaque;
330 assert(cco->drv);
331
c282e1fd 332 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
84d18f06 333 if (local_err) {
cc84d90f
HR
334 error_propagate(&cco->err, local_err);
335 }
336 cco->ret = ret;
5b7e1542
ZYW
337}
338
0e7e1989 339int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 340 QemuOpts *opts, Error **errp)
ea2384d3 341{
5b7e1542
ZYW
342 int ret;
343
344 Coroutine *co;
345 CreateCo cco = {
346 .drv = drv,
347 .filename = g_strdup(filename),
83d0521a 348 .opts = opts,
5b7e1542 349 .ret = NOT_DONE,
cc84d90f 350 .err = NULL,
5b7e1542
ZYW
351 };
352
c282e1fd 353 if (!drv->bdrv_create) {
cc84d90f 354 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
355 ret = -ENOTSUP;
356 goto out;
5b7e1542
ZYW
357 }
358
359 if (qemu_in_coroutine()) {
360 /* Fast-path if already in coroutine context */
361 bdrv_create_co_entry(&cco);
362 } else {
363 co = qemu_coroutine_create(bdrv_create_co_entry);
364 qemu_coroutine_enter(co, &cco);
365 while (cco.ret == NOT_DONE) {
b47ec2c4 366 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
367 }
368 }
369
370 ret = cco.ret;
cc84d90f 371 if (ret < 0) {
84d18f06 372 if (cco.err) {
cc84d90f
HR
373 error_propagate(errp, cco.err);
374 } else {
375 error_setg_errno(errp, -ret, "Could not create image");
376 }
377 }
0e7e1989 378
80168bff
LC
379out:
380 g_free(cco.filename);
5b7e1542 381 return ret;
ea2384d3
FB
382}
383
c282e1fd 384int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
385{
386 BlockDriver *drv;
cc84d90f
HR
387 Error *local_err = NULL;
388 int ret;
84a12e66 389
b65a5e12 390 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 391 if (drv == NULL) {
16905d71 392 return -ENOENT;
84a12e66
CH
393 }
394
c282e1fd 395 ret = bdrv_create(drv, filename, opts, &local_err);
84d18f06 396 if (local_err) {
cc84d90f
HR
397 error_propagate(errp, local_err);
398 }
399 return ret;
84a12e66
CH
400}
401
892b7de8
ET
402/**
403 * Try to get @bs's logical and physical block size.
404 * On success, store them in @bsz struct and return 0.
405 * On failure return -errno.
406 * @bs must not be empty.
407 */
408int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
409{
410 BlockDriver *drv = bs->drv;
411
412 if (drv && drv->bdrv_probe_blocksizes) {
413 return drv->bdrv_probe_blocksizes(bs, bsz);
414 }
415
416 return -ENOTSUP;
417}
418
419/**
420 * Try to get @bs's geometry (cyls, heads, sectors).
421 * On success, store them in @geo struct and return 0.
422 * On failure return -errno.
423 * @bs must not be empty.
424 */
425int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
426{
427 BlockDriver *drv = bs->drv;
428
429 if (drv && drv->bdrv_probe_geometry) {
430 return drv->bdrv_probe_geometry(bs, geo);
431 }
432
433 return -ENOTSUP;
434}
435
eba25057
JM
436/*
437 * Create a uniquely-named empty temporary file.
438 * Return 0 upon success, otherwise a negative errno value.
439 */
440int get_tmp_filename(char *filename, int size)
d5249393 441{
eba25057 442#ifdef _WIN32
3b9f94e1 443 char temp_dir[MAX_PATH];
eba25057
JM
444 /* GetTempFileName requires that its output buffer (4th param)
445 have length MAX_PATH or greater. */
446 assert(size >= MAX_PATH);
447 return (GetTempPath(MAX_PATH, temp_dir)
448 && GetTempFileName(temp_dir, "qem", 0, filename)
449 ? 0 : -GetLastError());
d5249393 450#else
67b915a5 451 int fd;
7ccfb2eb 452 const char *tmpdir;
0badc1ee 453 tmpdir = getenv("TMPDIR");
69bef793
AS
454 if (!tmpdir) {
455 tmpdir = "/var/tmp";
456 }
eba25057
JM
457 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
458 return -EOVERFLOW;
459 }
ea2384d3 460 fd = mkstemp(filename);
fe235a06
DH
461 if (fd < 0) {
462 return -errno;
463 }
464 if (close(fd) != 0) {
465 unlink(filename);
eba25057
JM
466 return -errno;
467 }
468 return 0;
d5249393 469#endif
eba25057 470}
fc01f7e7 471
84a12e66
CH
472/*
473 * Detect host devices. By convention, /dev/cdrom[N] is always
474 * recognized as a host CDROM.
475 */
476static BlockDriver *find_hdev_driver(const char *filename)
477{
478 int score_max = 0, score;
479 BlockDriver *drv = NULL, *d;
480
481 QLIST_FOREACH(d, &bdrv_drivers, list) {
482 if (d->bdrv_probe_device) {
483 score = d->bdrv_probe_device(filename);
484 if (score > score_max) {
485 score_max = score;
486 drv = d;
487 }
488 }
489 }
490
491 return drv;
492}
493
98289620 494BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
495 bool allow_protocol_prefix,
496 Error **errp)
83f64091
FB
497{
498 BlockDriver *drv1;
499 char protocol[128];
1cec71e3 500 int len;
83f64091 501 const char *p;
19cb3738 502
66f82cee
KW
503 /* TODO Drivers without bdrv_file_open must be specified explicitly */
504
39508e7a
CH
505 /*
506 * XXX(hch): we really should not let host device detection
507 * override an explicit protocol specification, but moving this
508 * later breaks access to device names with colons in them.
509 * Thanks to the brain-dead persistent naming schemes on udev-
510 * based Linux systems those actually are quite common.
511 */
512 drv1 = find_hdev_driver(filename);
513 if (drv1) {
514 return drv1;
515 }
516
98289620 517 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 518 return &bdrv_file;
84a12e66 519 }
98289620 520
9e0b22f4
SH
521 p = strchr(filename, ':');
522 assert(p != NULL);
1cec71e3
AL
523 len = p - filename;
524 if (len > sizeof(protocol) - 1)
525 len = sizeof(protocol) - 1;
526 memcpy(protocol, filename, len);
527 protocol[len] = '\0';
8a22f02a 528 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
5fafdf24 529 if (drv1->protocol_name &&
8a22f02a 530 !strcmp(drv1->protocol_name, protocol)) {
83f64091 531 return drv1;
8a22f02a 532 }
83f64091 533 }
b65a5e12
HR
534
535 error_setg(errp, "Unknown protocol '%s'", protocol);
83f64091
FB
536 return NULL;
537}
538
c6684249
MA
539/*
540 * Guess image format by probing its contents.
541 * This is not a good idea when your image is raw (CVE-2008-2004), but
542 * we do it anyway for backward compatibility.
543 *
544 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
545 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
546 * but can be smaller if the image file is smaller)
c6684249
MA
547 * @filename is its filename.
548 *
549 * For all block drivers, call the bdrv_probe() method to get its
550 * probing score.
551 * Return the first block driver with the highest probing score.
552 */
38f3ef57
KW
553BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
554 const char *filename)
c6684249
MA
555{
556 int score_max = 0, score;
557 BlockDriver *drv = NULL, *d;
558
559 QLIST_FOREACH(d, &bdrv_drivers, list) {
560 if (d->bdrv_probe) {
561 score = d->bdrv_probe(buf, buf_size, filename);
562 if (score > score_max) {
563 score_max = score;
564 drv = d;
565 }
566 }
567 }
568
569 return drv;
570}
571
f500a6d3 572static int find_image_format(BlockDriverState *bs, const char *filename,
34b5d2c6 573 BlockDriver **pdrv, Error **errp)
f3a5d3f8 574{
c6684249 575 BlockDriver *drv;
7cddd372 576 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 577 int ret = 0;
f8ea0b00 578
08a00559 579 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
b192af8a 580 if (bdrv_is_sg(bs) || !bdrv_is_inserted(bs) || bdrv_getlength(bs) == 0) {
ef810437 581 *pdrv = &bdrv_raw;
c98ac35d 582 return ret;
1a396859 583 }
f8ea0b00 584
83f64091 585 ret = bdrv_pread(bs, 0, buf, sizeof(buf));
83f64091 586 if (ret < 0) {
34b5d2c6
HR
587 error_setg_errno(errp, -ret, "Could not read image for determining its "
588 "format");
c98ac35d
SW
589 *pdrv = NULL;
590 return ret;
83f64091
FB
591 }
592
c6684249 593 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 594 if (!drv) {
34b5d2c6
HR
595 error_setg(errp, "Could not determine image format: No compatible "
596 "driver found");
c98ac35d
SW
597 ret = -ENOENT;
598 }
599 *pdrv = drv;
600 return ret;
ea2384d3
FB
601}
602
51762288
SH
603/**
604 * Set the current 'total_sectors' value
65a9bb25 605 * Return 0 on success, -errno on error.
51762288
SH
606 */
607static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
608{
609 BlockDriver *drv = bs->drv;
610
396759ad 611 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 612 if (bdrv_is_sg(bs))
396759ad
NB
613 return 0;
614
51762288
SH
615 /* query actual device if possible, otherwise just trust the hint */
616 if (drv->bdrv_getlength) {
617 int64_t length = drv->bdrv_getlength(bs);
618 if (length < 0) {
619 return length;
620 }
7e382003 621 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
622 }
623
624 bs->total_sectors = hint;
625 return 0;
626}
627
9e8f1835
PB
628/**
629 * Set open flags for a given discard mode
630 *
631 * Return 0 on success, -1 if the discard mode was invalid.
632 */
633int bdrv_parse_discard_flags(const char *mode, int *flags)
634{
635 *flags &= ~BDRV_O_UNMAP;
636
637 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
638 /* do nothing */
639 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
640 *flags |= BDRV_O_UNMAP;
641 } else {
642 return -1;
643 }
644
645 return 0;
646}
647
c3993cdc
SH
648/**
649 * Set open flags for a given cache mode
650 *
651 * Return 0 on success, -1 if the cache mode was invalid.
652 */
653int bdrv_parse_cache_flags(const char *mode, int *flags)
654{
655 *flags &= ~BDRV_O_CACHE_MASK;
656
657 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
658 *flags |= BDRV_O_NOCACHE | BDRV_O_CACHE_WB;
92196b2f
SH
659 } else if (!strcmp(mode, "directsync")) {
660 *flags |= BDRV_O_NOCACHE;
c3993cdc
SH
661 } else if (!strcmp(mode, "writeback")) {
662 *flags |= BDRV_O_CACHE_WB;
663 } else if (!strcmp(mode, "unsafe")) {
664 *flags |= BDRV_O_CACHE_WB;
665 *flags |= BDRV_O_NO_FLUSH;
666 } else if (!strcmp(mode, "writethrough")) {
667 /* this is the default */
668 } else {
669 return -1;
670 }
671
672 return 0;
673}
674
b1e6fc08
KW
675/*
676 * Returns the flags that a temporary snapshot should get, based on the
677 * originally requested flags (the originally requested image will have flags
678 * like a backing file)
679 */
680static int bdrv_temp_snapshot_flags(int flags)
681{
682 return (flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
683}
684
0b50cc88 685/*
f3930ed0
KW
686 * Returns the flags that bs->file should get if a protocol driver is expected,
687 * based on the given flags for the parent BDS
0b50cc88
KW
688 */
689static int bdrv_inherited_flags(int flags)
690{
691 /* Enable protocol handling, disable format probing for bs->file */
692 flags |= BDRV_O_PROTOCOL;
693
694 /* Our block drivers take care to send flushes and respect unmap policy,
695 * so we can enable both unconditionally on lower layers. */
696 flags |= BDRV_O_CACHE_WB | BDRV_O_UNMAP;
697
0b50cc88 698 /* Clear flags that only apply to the top layer */
5669b44d 699 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ);
0b50cc88
KW
700
701 return flags;
702}
703
f3930ed0
KW
704const BdrvChildRole child_file = {
705 .inherit_flags = bdrv_inherited_flags,
706};
707
708/*
709 * Returns the flags that bs->file should get if the use of formats (and not
710 * only protocols) is permitted for it, based on the given flags for the parent
711 * BDS
712 */
713static int bdrv_inherited_fmt_flags(int parent_flags)
714{
715 int flags = child_file.inherit_flags(parent_flags);
716 return flags & ~BDRV_O_PROTOCOL;
717}
718
719const BdrvChildRole child_format = {
720 .inherit_flags = bdrv_inherited_fmt_flags,
721};
722
317fc44e
KW
723/*
724 * Returns the flags that bs->backing_hd should get, based on the given flags
725 * for the parent BDS
726 */
727static int bdrv_backing_flags(int flags)
728{
729 /* backing files always opened read-only */
730 flags &= ~(BDRV_O_RDWR | BDRV_O_COPY_ON_READ);
731
732 /* snapshot=on is handled on the top layer */
8bfea15d 733 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e
KW
734
735 return flags;
736}
737
f3930ed0
KW
738static const BdrvChildRole child_backing = {
739 .inherit_flags = bdrv_backing_flags,
740};
741
7b272452
KW
742static int bdrv_open_flags(BlockDriverState *bs, int flags)
743{
744 int open_flags = flags | BDRV_O_CACHE_WB;
745
746 /*
747 * Clear flags that are internal to the block layer before opening the
748 * image.
749 */
20cca275 750 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
751
752 /*
753 * Snapshots should be writable.
754 */
8bfea15d 755 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
756 open_flags |= BDRV_O_RDWR;
757 }
758
759 return open_flags;
760}
761
636ea370
KW
762static void bdrv_assign_node_name(BlockDriverState *bs,
763 const char *node_name,
764 Error **errp)
6913c0c2
BC
765{
766 if (!node_name) {
636ea370 767 return;
6913c0c2
BC
768 }
769
9aebf3b8 770 /* Check for empty string or invalid characters */
f5bebbbb 771 if (!id_wellformed(node_name)) {
9aebf3b8 772 error_setg(errp, "Invalid node name");
636ea370 773 return;
6913c0c2
BC
774 }
775
0c5e94ee 776 /* takes care of avoiding namespaces collisions */
7f06d47e 777 if (blk_by_name(node_name)) {
0c5e94ee
BC
778 error_setg(errp, "node-name=%s is conflicting with a device id",
779 node_name);
636ea370 780 return;
0c5e94ee
BC
781 }
782
6913c0c2
BC
783 /* takes care of avoiding duplicates node names */
784 if (bdrv_find_node(node_name)) {
785 error_setg(errp, "Duplicate node name");
636ea370 786 return;
6913c0c2
BC
787 }
788
789 /* copy node name into the bs and insert it into the graph list */
790 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
791 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
6913c0c2
BC
792}
793
18edf289
KW
794static QemuOptsList bdrv_runtime_opts = {
795 .name = "bdrv_common",
796 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
797 .desc = {
798 {
799 .name = "node-name",
800 .type = QEMU_OPT_STRING,
801 .help = "Node name of the block device node",
802 },
803 { /* end of list */ }
804 },
805};
806
57915332
KW
807/*
808 * Common part for opening disk images and files
b6ad491a
KW
809 *
810 * Removes all processed options from *options.
57915332 811 */
f500a6d3 812static int bdrv_open_common(BlockDriverState *bs, BlockDriverState *file,
34b5d2c6 813 QDict *options, int flags, BlockDriver *drv, Error **errp)
57915332
KW
814{
815 int ret, open_flags;
035fccdf 816 const char *filename;
6913c0c2 817 const char *node_name = NULL;
18edf289 818 QemuOpts *opts;
34b5d2c6 819 Error *local_err = NULL;
57915332
KW
820
821 assert(drv != NULL);
6405875c 822 assert(bs->file == NULL);
707ff828 823 assert(options != NULL && bs->options != options);
57915332 824
45673671
KW
825 if (file != NULL) {
826 filename = file->filename;
827 } else {
828 filename = qdict_get_try_str(options, "filename");
829 }
830
765003db
KW
831 if (drv->bdrv_needs_filename && !filename) {
832 error_setg(errp, "The '%s' block driver requires a file name",
833 drv->format_name);
834 return -EINVAL;
835 }
836
45673671 837 trace_bdrv_open_common(bs, filename ?: "", flags, drv->format_name);
28dcee10 838
18edf289
KW
839 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
840 qemu_opts_absorb_qdict(opts, options, &local_err);
0fb6395c 841 if (local_err) {
636ea370 842 error_propagate(errp, local_err);
18edf289
KW
843 ret = -EINVAL;
844 goto fail_opts;
6913c0c2 845 }
6913c0c2 846
18edf289 847 node_name = qemu_opt_get(opts, "node-name");
636ea370 848 bdrv_assign_node_name(bs, node_name, &local_err);
0fb6395c 849 if (local_err) {
636ea370 850 error_propagate(errp, local_err);
18edf289
KW
851 ret = -EINVAL;
852 goto fail_opts;
5d186eb0
KW
853 }
854
1b7fd729 855 bs->guest_block_size = 512;
c25f53b0 856 bs->request_alignment = 512;
0d51b4de 857 bs->zero_beyond_eof = true;
b64ec4e4
FZ
858 open_flags = bdrv_open_flags(bs, flags);
859 bs->read_only = !(open_flags & BDRV_O_RDWR);
860
861 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
862 error_setg(errp,
863 !bs->read_only && bdrv_is_whitelisted(drv, true)
864 ? "Driver '%s' can only be used for read-only devices"
865 : "Driver '%s' is not whitelisted",
866 drv->format_name);
18edf289
KW
867 ret = -ENOTSUP;
868 goto fail_opts;
b64ec4e4 869 }
57915332 870
53fec9d3 871 assert(bs->copy_on_read == 0); /* bdrv_new() and bdrv_close() make it so */
0ebd24e0
KW
872 if (flags & BDRV_O_COPY_ON_READ) {
873 if (!bs->read_only) {
874 bdrv_enable_copy_on_read(bs);
875 } else {
876 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
877 ret = -EINVAL;
878 goto fail_opts;
0ebd24e0 879 }
53fec9d3
SH
880 }
881
c2ad1b0c
KW
882 if (filename != NULL) {
883 pstrcpy(bs->filename, sizeof(bs->filename), filename);
884 } else {
885 bs->filename[0] = '\0';
886 }
91af7014 887 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 888
57915332 889 bs->drv = drv;
7267c094 890 bs->opaque = g_malloc0(drv->instance_size);
57915332 891
03f541bd 892 bs->enable_write_cache = !!(flags & BDRV_O_CACHE_WB);
e7c63796 893
66f82cee
KW
894 /* Open the image, either directly or using a protocol */
895 if (drv->bdrv_file_open) {
5d186eb0 896 assert(file == NULL);
030be321 897 assert(!drv->bdrv_needs_filename || filename != NULL);
34b5d2c6 898 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
f500a6d3 899 } else {
2af5ef70 900 if (file == NULL) {
34b5d2c6
HR
901 error_setg(errp, "Can't use '%s' as a block driver for the "
902 "protocol level", drv->format_name);
2af5ef70
KW
903 ret = -EINVAL;
904 goto free_and_fail;
905 }
f500a6d3 906 bs->file = file;
34b5d2c6 907 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
66f82cee
KW
908 }
909
57915332 910 if (ret < 0) {
84d18f06 911 if (local_err) {
34b5d2c6 912 error_propagate(errp, local_err);
2fa9aa59
DH
913 } else if (bs->filename[0]) {
914 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
34b5d2c6
HR
915 } else {
916 error_setg_errno(errp, -ret, "Could not open image");
917 }
57915332
KW
918 goto free_and_fail;
919 }
920
a1f688f4
MA
921 if (bs->encrypted) {
922 error_report("Encrypted images are deprecated");
923 error_printf("Support for them will be removed in a future release.\n"
924 "You can use 'qemu-img convert' to convert your image"
925 " to an unencrypted one.\n");
926 }
927
51762288
SH
928 ret = refresh_total_sectors(bs, bs->total_sectors);
929 if (ret < 0) {
34b5d2c6 930 error_setg_errno(errp, -ret, "Could not refresh total sector count");
51762288 931 goto free_and_fail;
57915332 932 }
51762288 933
3baca891
KW
934 bdrv_refresh_limits(bs, &local_err);
935 if (local_err) {
936 error_propagate(errp, local_err);
937 ret = -EINVAL;
938 goto free_and_fail;
939 }
940
c25f53b0 941 assert(bdrv_opt_mem_align(bs) != 0);
4196d2f0 942 assert(bdrv_min_mem_align(bs) != 0);
b192af8a 943 assert((bs->request_alignment != 0) || bdrv_is_sg(bs));
18edf289
KW
944
945 qemu_opts_del(opts);
57915332
KW
946 return 0;
947
948free_and_fail:
f500a6d3 949 bs->file = NULL;
7267c094 950 g_free(bs->opaque);
57915332
KW
951 bs->opaque = NULL;
952 bs->drv = NULL;
18edf289
KW
953fail_opts:
954 qemu_opts_del(opts);
57915332
KW
955 return ret;
956}
957
5e5c4f63
KW
958static QDict *parse_json_filename(const char *filename, Error **errp)
959{
960 QObject *options_obj;
961 QDict *options;
962 int ret;
963
964 ret = strstart(filename, "json:", &filename);
965 assert(ret);
966
967 options_obj = qobject_from_json(filename);
968 if (!options_obj) {
969 error_setg(errp, "Could not parse the JSON options");
970 return NULL;
971 }
972
973 if (qobject_type(options_obj) != QTYPE_QDICT) {
974 qobject_decref(options_obj);
975 error_setg(errp, "Invalid JSON object given");
976 return NULL;
977 }
978
979 options = qobject_to_qdict(options_obj);
980 qdict_flatten(options);
981
982 return options;
983}
984
b6ce07aa 985/*
f54120ff
KW
986 * Fills in default options for opening images and converts the legacy
987 * filename/flags pair to option QDict entries.
53a29513
HR
988 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
989 * block driver has been specified explicitly.
b6ce07aa 990 */
53a29513 991static int bdrv_fill_options(QDict **options, const char **pfilename,
053e1578 992 int *flags, Error **errp)
ea2384d3 993{
5e5c4f63 994 const char *filename = *pfilename;
c2ad1b0c 995 const char *drvname;
53a29513 996 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 997 bool parse_filename = false;
053e1578 998 BlockDriver *drv = NULL;
34b5d2c6 999 Error *local_err = NULL;
83f64091 1000
5e5c4f63
KW
1001 /* Parse json: pseudo-protocol */
1002 if (filename && g_str_has_prefix(filename, "json:")) {
1003 QDict *json_options = parse_json_filename(filename, &local_err);
1004 if (local_err) {
1005 error_propagate(errp, local_err);
1006 return -EINVAL;
1007 }
1008
1009 /* Options given in the filename have lower priority than options
1010 * specified directly */
1011 qdict_join(*options, json_options, false);
1012 QDECREF(json_options);
1013 *pfilename = filename = NULL;
1014 }
1015
53a29513 1016 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1017 if (drvname) {
1018 drv = bdrv_find_format(drvname);
1019 if (!drv) {
1020 error_setg(errp, "Unknown driver '%s'", drvname);
1021 return -ENOENT;
1022 }
1023 /* If the user has explicitly specified the driver, this choice should
1024 * override the BDRV_O_PROTOCOL flag */
1025 protocol = drv->bdrv_file_open;
53a29513
HR
1026 }
1027
1028 if (protocol) {
1029 *flags |= BDRV_O_PROTOCOL;
1030 } else {
1031 *flags &= ~BDRV_O_PROTOCOL;
1032 }
1033
035fccdf 1034 /* Fetch the file name from the options QDict if necessary */
17b005f1 1035 if (protocol && filename) {
f54120ff
KW
1036 if (!qdict_haskey(*options, "filename")) {
1037 qdict_put(*options, "filename", qstring_from_str(filename));
1038 parse_filename = true;
1039 } else {
1040 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1041 "the same time");
1042 return -EINVAL;
1043 }
035fccdf
KW
1044 }
1045
c2ad1b0c 1046 /* Find the right block driver */
f54120ff 1047 filename = qdict_get_try_str(*options, "filename");
f54120ff 1048
053e1578
HR
1049 if (!drvname && protocol) {
1050 if (filename) {
1051 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1052 if (!drv) {
053e1578 1053 return -EINVAL;
17b005f1 1054 }
053e1578
HR
1055
1056 drvname = drv->format_name;
1057 qdict_put(*options, "driver", qstring_from_str(drvname));
1058 } else {
1059 error_setg(errp, "Must specify either driver or file");
1060 return -EINVAL;
98289620 1061 }
c2ad1b0c
KW
1062 }
1063
17b005f1 1064 assert(drv || !protocol);
c2ad1b0c 1065
f54120ff 1066 /* Driver-specific filename parsing */
17b005f1 1067 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1068 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1069 if (local_err) {
34b5d2c6 1070 error_propagate(errp, local_err);
f54120ff 1071 return -EINVAL;
6963a30d 1072 }
cd5d031e
HR
1073
1074 if (!drv->bdrv_needs_filename) {
1075 qdict_del(*options, "filename");
cd5d031e 1076 }
6963a30d
KW
1077 }
1078
f54120ff
KW
1079 return 0;
1080}
1081
b4b059f6
KW
1082static BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
1083 BlockDriverState *child_bs,
1084 const BdrvChildRole *child_role)
df581792
KW
1085{
1086 BdrvChild *child = g_new(BdrvChild, 1);
1087 *child = (BdrvChild) {
1088 .bs = child_bs,
1089 .role = child_role,
1090 };
1091
1092 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
b4b059f6
KW
1093
1094 return child;
df581792
KW
1095}
1096
33a60407
KW
1097static void bdrv_detach_child(BdrvChild *child)
1098{
1099 QLIST_REMOVE(child, next);
1100 g_free(child);
1101}
1102
1103void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
1104{
1105 BlockDriverState *child_bs = child->bs;
1106
1107 if (child->bs->inherits_from == parent) {
1108 child->bs->inherits_from = NULL;
1109 }
1110
1111 bdrv_detach_child(child);
1112 bdrv_unref(child_bs);
1113}
1114
8d24cce1
FZ
1115void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd)
1116{
1117
826b6ca0
FZ
1118 if (bs->backing_hd) {
1119 assert(bs->backing_blocker);
1120 bdrv_op_unblock_all(bs->backing_hd, bs->backing_blocker);
80a1e130 1121 bdrv_detach_child(bs->backing_child);
826b6ca0
FZ
1122 } else if (backing_hd) {
1123 error_setg(&bs->backing_blocker,
81e5f78a
AG
1124 "node is used as backing hd of '%s'",
1125 bdrv_get_device_or_node_name(bs));
826b6ca0
FZ
1126 }
1127
8d24cce1
FZ
1128 bs->backing_hd = backing_hd;
1129 if (!backing_hd) {
826b6ca0
FZ
1130 error_free(bs->backing_blocker);
1131 bs->backing_blocker = NULL;
80a1e130 1132 bs->backing_child = NULL;
8d24cce1
FZ
1133 goto out;
1134 }
80a1e130 1135 bs->backing_child = bdrv_attach_child(bs, backing_hd, &child_backing);
8d24cce1
FZ
1136 bs->open_flags &= ~BDRV_O_NO_BACKING;
1137 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_hd->filename);
1138 pstrcpy(bs->backing_format, sizeof(bs->backing_format),
1139 backing_hd->drv ? backing_hd->drv->format_name : "");
826b6ca0
FZ
1140
1141 bdrv_op_block_all(bs->backing_hd, bs->backing_blocker);
1142 /* Otherwise we won't be able to commit due to check in bdrv_commit */
bb00021d 1143 bdrv_op_unblock(bs->backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
826b6ca0 1144 bs->backing_blocker);
8d24cce1 1145out:
3baca891 1146 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
1147}
1148
31ca6d07
KW
1149/*
1150 * Opens the backing file for a BlockDriverState if not yet open
1151 *
1152 * options is a QDict of options to pass to the block drivers, or NULL for an
1153 * empty set of options. The reference to the QDict is transferred to this
1154 * function (even on failure), so if the caller intends to reuse the dictionary,
1155 * it needs to use QINCREF() before calling bdrv_file_open.
1156 */
34b5d2c6 1157int bdrv_open_backing_file(BlockDriverState *bs, QDict *options, Error **errp)
9156df12 1158{
1ba4b6a5 1159 char *backing_filename = g_malloc0(PATH_MAX);
317fc44e 1160 int ret = 0;
8d24cce1 1161 BlockDriverState *backing_hd;
34b5d2c6 1162 Error *local_err = NULL;
9156df12
PB
1163
1164 if (bs->backing_hd != NULL) {
31ca6d07 1165 QDECREF(options);
1ba4b6a5 1166 goto free_exit;
9156df12
PB
1167 }
1168
31ca6d07
KW
1169 /* NULL means an empty set of options */
1170 if (options == NULL) {
1171 options = qdict_new();
1172 }
1173
9156df12 1174 bs->open_flags &= ~BDRV_O_NO_BACKING;
1cb6f506
KW
1175 if (qdict_haskey(options, "file.filename")) {
1176 backing_filename[0] = '\0';
1177 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 1178 QDECREF(options);
1ba4b6a5 1179 goto free_exit;
dbecebdd 1180 } else {
9f07429e
HR
1181 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
1182 &local_err);
1183 if (local_err) {
1184 ret = -EINVAL;
1185 error_propagate(errp, local_err);
1186 QDECREF(options);
1187 goto free_exit;
1188 }
9156df12
PB
1189 }
1190
8ee79e70
KW
1191 if (!bs->drv || !bs->drv->supports_backing) {
1192 ret = -EINVAL;
1193 error_setg(errp, "Driver doesn't support backing files");
1194 QDECREF(options);
1195 goto free_exit;
1196 }
1197
e4e9986b 1198 backing_hd = bdrv_new();
8d24cce1 1199
c5f6e493
KW
1200 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
1201 qdict_put(options, "driver", qstring_from_str(bs->backing_format));
9156df12
PB
1202 }
1203
f67503e5 1204 assert(bs->backing_hd == NULL);
f3930ed0
KW
1205 ret = bdrv_open_inherit(&backing_hd,
1206 *backing_filename ? backing_filename : NULL,
ce343771 1207 NULL, options, 0, bs, &child_backing, &local_err);
9156df12 1208 if (ret < 0) {
8d24cce1
FZ
1209 bdrv_unref(backing_hd);
1210 backing_hd = NULL;
9156df12 1211 bs->open_flags |= BDRV_O_NO_BACKING;
b04b6b6e
FZ
1212 error_setg(errp, "Could not open backing file: %s",
1213 error_get_pretty(local_err));
1214 error_free(local_err);
1ba4b6a5 1215 goto free_exit;
9156df12 1216 }
df581792 1217
8d24cce1 1218 bdrv_set_backing_hd(bs, backing_hd);
d80ac658 1219
1ba4b6a5
BC
1220free_exit:
1221 g_free(backing_filename);
1222 return ret;
9156df12
PB
1223}
1224
da557aac
HR
1225/*
1226 * Opens a disk image whose options are given as BlockdevRef in another block
1227 * device's options.
1228 *
da557aac 1229 * If allow_none is true, no image will be opened if filename is false and no
b4b059f6 1230 * BlockdevRef is given. NULL will be returned, but errp remains unset.
da557aac
HR
1231 *
1232 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
1233 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1234 * itself, all options starting with "${bdref_key}." are considered part of the
1235 * BlockdevRef.
1236 *
1237 * The BlockdevRef will be removed from the options QDict.
1238 */
b4b059f6
KW
1239BdrvChild *bdrv_open_child(const char *filename,
1240 QDict *options, const char *bdref_key,
1241 BlockDriverState* parent,
1242 const BdrvChildRole *child_role,
1243 bool allow_none, Error **errp)
da557aac 1244{
b4b059f6
KW
1245 BdrvChild *c = NULL;
1246 BlockDriverState *bs;
da557aac
HR
1247 QDict *image_options;
1248 int ret;
1249 char *bdref_key_dot;
1250 const char *reference;
1251
df581792 1252 assert(child_role != NULL);
f67503e5 1253
da557aac
HR
1254 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1255 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
1256 g_free(bdref_key_dot);
1257
1258 reference = qdict_get_try_str(options, bdref_key);
1259 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 1260 if (!allow_none) {
da557aac
HR
1261 error_setg(errp, "A block device must be specified for \"%s\"",
1262 bdref_key);
da557aac 1263 }
b20e61e0 1264 QDECREF(image_options);
da557aac
HR
1265 goto done;
1266 }
1267
b4b059f6
KW
1268 bs = NULL;
1269 ret = bdrv_open_inherit(&bs, filename, reference, image_options, 0,
ce343771 1270 parent, child_role, errp);
df581792
KW
1271 if (ret < 0) {
1272 goto done;
1273 }
1274
b4b059f6 1275 c = bdrv_attach_child(parent, bs, child_role);
da557aac
HR
1276
1277done:
1278 qdict_del(options, bdref_key);
b4b059f6
KW
1279 return c;
1280}
1281
1282/*
1283 * This is a version of bdrv_open_child() that returns 0/-EINVAL instead of
1284 * a BdrvChild object.
1285 *
1286 * If allow_none is true, no image will be opened if filename is false and no
1287 * BlockdevRef is given. *pbs will remain unchanged and 0 will be returned.
1288 *
1289 * To conform with the behavior of bdrv_open(), *pbs has to be NULL.
1290 */
1291int bdrv_open_image(BlockDriverState **pbs, const char *filename,
1292 QDict *options, const char *bdref_key,
1293 BlockDriverState* parent, const BdrvChildRole *child_role,
1294 bool allow_none, Error **errp)
1295{
1296 Error *local_err = NULL;
1297 BdrvChild *c;
1298
1299 assert(pbs);
1300 assert(*pbs == NULL);
1301
1302 c = bdrv_open_child(filename, options, bdref_key, parent, child_role,
1303 allow_none, &local_err);
1304 if (local_err) {
1305 error_propagate(errp, local_err);
1306 return -EINVAL;
1307 }
1308
1309 if (c != NULL) {
1310 *pbs = c->bs;
1311 }
1312
1313 return 0;
da557aac
HR
1314}
1315
6b8aeca5 1316int bdrv_append_temp_snapshot(BlockDriverState *bs, int flags, Error **errp)
b998875d
KW
1317{
1318 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 1319 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 1320 int64_t total_size;
83d0521a 1321 QemuOpts *opts = NULL;
b998875d
KW
1322 QDict *snapshot_options;
1323 BlockDriverState *bs_snapshot;
c2e0dbbf 1324 Error *local_err = NULL;
b998875d
KW
1325 int ret;
1326
1327 /* if snapshot, we create a temporary backing file and open it
1328 instead of opening 'filename' directly */
1329
1330 /* Get the required size from the image */
f187743a
KW
1331 total_size = bdrv_getlength(bs);
1332 if (total_size < 0) {
6b8aeca5 1333 ret = total_size;
f187743a 1334 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 1335 goto out;
f187743a 1336 }
b998875d
KW
1337
1338 /* Create the temporary image */
1ba4b6a5 1339 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
1340 if (ret < 0) {
1341 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 1342 goto out;
b998875d
KW
1343 }
1344
ef810437 1345 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 1346 &error_abort);
39101f25 1347 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
ef810437 1348 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, &local_err);
83d0521a 1349 qemu_opts_del(opts);
b998875d
KW
1350 if (ret < 0) {
1351 error_setg_errno(errp, -ret, "Could not create temporary overlay "
1352 "'%s': %s", tmp_filename,
1353 error_get_pretty(local_err));
1354 error_free(local_err);
1ba4b6a5 1355 goto out;
b998875d
KW
1356 }
1357
1358 /* Prepare a new options QDict for the temporary file */
1359 snapshot_options = qdict_new();
1360 qdict_put(snapshot_options, "file.driver",
1361 qstring_from_str("file"));
1362 qdict_put(snapshot_options, "file.filename",
1363 qstring_from_str(tmp_filename));
e6641719
HR
1364 qdict_put(snapshot_options, "driver",
1365 qstring_from_str("qcow2"));
b998875d 1366
e4e9986b 1367 bs_snapshot = bdrv_new();
b998875d
KW
1368
1369 ret = bdrv_open(&bs_snapshot, NULL, NULL, snapshot_options,
6ebf9aa2 1370 flags, &local_err);
b998875d
KW
1371 if (ret < 0) {
1372 error_propagate(errp, local_err);
1ba4b6a5 1373 goto out;
b998875d
KW
1374 }
1375
1376 bdrv_append(bs_snapshot, bs);
1ba4b6a5
BC
1377
1378out:
1379 g_free(tmp_filename);
6b8aeca5 1380 return ret;
b998875d
KW
1381}
1382
b6ce07aa
KW
1383/*
1384 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
1385 *
1386 * options is a QDict of options to pass to the block drivers, or NULL for an
1387 * empty set of options. The reference to the QDict belongs to the block layer
1388 * after the call (even on failure), so if the caller intends to reuse the
1389 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
1390 *
1391 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
1392 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
1393 *
1394 * The reference parameter may be used to specify an existing block device which
1395 * should be opened. If specified, neither options nor a filename may be given,
1396 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 1397 */
f3930ed0
KW
1398static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
1399 const char *reference, QDict *options, int flags,
1400 BlockDriverState *parent,
ce343771 1401 const BdrvChildRole *child_role, Error **errp)
ea2384d3 1402{
b6ce07aa 1403 int ret;
f67503e5 1404 BlockDriverState *file = NULL, *bs;
ce343771 1405 BlockDriver *drv = NULL;
74fe54f2 1406 const char *drvname;
34b5d2c6 1407 Error *local_err = NULL;
b1e6fc08 1408 int snapshot_flags = 0;
712e7874 1409
f67503e5 1410 assert(pbs);
f3930ed0
KW
1411 assert(!child_role || !flags);
1412 assert(!child_role == !parent);
f67503e5 1413
ddf5636d
HR
1414 if (reference) {
1415 bool options_non_empty = options ? qdict_size(options) : false;
1416 QDECREF(options);
1417
1418 if (*pbs) {
1419 error_setg(errp, "Cannot reuse an existing BDS when referencing "
1420 "another block device");
1421 return -EINVAL;
1422 }
1423
1424 if (filename || options_non_empty) {
1425 error_setg(errp, "Cannot reference an existing block device with "
1426 "additional options or a new filename");
1427 return -EINVAL;
1428 }
1429
1430 bs = bdrv_lookup_bs(reference, reference, errp);
1431 if (!bs) {
1432 return -ENODEV;
1433 }
1434 bdrv_ref(bs);
1435 *pbs = bs;
1436 return 0;
1437 }
1438
f67503e5
HR
1439 if (*pbs) {
1440 bs = *pbs;
1441 } else {
e4e9986b 1442 bs = bdrv_new();
f67503e5
HR
1443 }
1444
de9c0cec
KW
1445 /* NULL means an empty set of options */
1446 if (options == NULL) {
1447 options = qdict_new();
1448 }
1449
f3930ed0 1450 if (child_role) {
bddcec37 1451 bs->inherits_from = parent;
f3930ed0
KW
1452 flags = child_role->inherit_flags(parent->open_flags);
1453 }
1454
053e1578 1455 ret = bdrv_fill_options(&options, &filename, &flags, &local_err);
462f5bcf
KW
1456 if (local_err) {
1457 goto fail;
1458 }
1459
76c591b0 1460 /* Find the right image format driver */
76c591b0
KW
1461 drvname = qdict_get_try_str(options, "driver");
1462 if (drvname) {
1463 drv = bdrv_find_format(drvname);
1464 qdict_del(options, "driver");
1465 if (!drv) {
1466 error_setg(errp, "Unknown driver: '%s'", drvname);
1467 ret = -EINVAL;
1468 goto fail;
1469 }
1470 }
1471
1472 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 1473
f3930ed0 1474 bs->open_flags = flags;
de9c0cec 1475 bs->options = options;
b6ad491a 1476 options = qdict_clone_shallow(options);
de9c0cec 1477
f500a6d3 1478 /* Open image file without format layer */
f4788adc
KW
1479 if ((flags & BDRV_O_PROTOCOL) == 0) {
1480 if (flags & BDRV_O_RDWR) {
1481 flags |= BDRV_O_ALLOW_RDWR;
1482 }
1483 if (flags & BDRV_O_SNAPSHOT) {
1484 snapshot_flags = bdrv_temp_snapshot_flags(flags);
1485 flags = bdrv_backing_flags(flags);
1486 }
f500a6d3 1487
f4788adc 1488 assert(file == NULL);
f3930ed0 1489 bs->open_flags = flags;
f4788adc 1490 ret = bdrv_open_image(&file, filename, options, "file",
f3930ed0 1491 bs, &child_file, true, &local_err);
f4788adc
KW
1492 if (ret < 0) {
1493 goto fail;
1494 }
f500a6d3
KW
1495 }
1496
76c591b0 1497 /* Image format probing */
38f3ef57 1498 bs->probed = !drv;
76c591b0 1499 if (!drv && file) {
17b005f1
KW
1500 ret = find_image_format(file, filename, &drv, &local_err);
1501 if (ret < 0) {
8bfea15d 1502 goto fail;
2a05cbe4 1503 }
76c591b0 1504 } else if (!drv) {
17b005f1
KW
1505 error_setg(errp, "Must specify either driver or file");
1506 ret = -EINVAL;
8bfea15d 1507 goto fail;
ea2384d3 1508 }
b6ce07aa 1509
53a29513
HR
1510 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
1511 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
1512 /* file must be NULL if a protocol BDS is about to be created
1513 * (the inverse results in an error message from bdrv_open_common()) */
1514 assert(!(flags & BDRV_O_PROTOCOL) || !file);
1515
b6ce07aa 1516 /* Open the image */
34b5d2c6 1517 ret = bdrv_open_common(bs, file, options, flags, drv, &local_err);
b6ce07aa 1518 if (ret < 0) {
8bfea15d 1519 goto fail;
6987307c
CH
1520 }
1521
2a05cbe4 1522 if (file && (bs->file != file)) {
4f6fd349 1523 bdrv_unref(file);
f500a6d3
KW
1524 file = NULL;
1525 }
1526
b6ce07aa 1527 /* If there is a backing file, use it */
9156df12 1528 if ((flags & BDRV_O_NO_BACKING) == 0) {
31ca6d07
KW
1529 QDict *backing_options;
1530
5726d872 1531 qdict_extract_subqdict(options, &backing_options, "backing.");
34b5d2c6 1532 ret = bdrv_open_backing_file(bs, backing_options, &local_err);
b6ce07aa 1533 if (ret < 0) {
b6ad491a 1534 goto close_and_fail;
b6ce07aa 1535 }
b6ce07aa
KW
1536 }
1537
91af7014
HR
1538 bdrv_refresh_filename(bs);
1539
b998875d
KW
1540 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
1541 * temporary snapshot afterwards. */
b1e6fc08 1542 if (snapshot_flags) {
6b8aeca5 1543 ret = bdrv_append_temp_snapshot(bs, snapshot_flags, &local_err);
b998875d 1544 if (local_err) {
b998875d
KW
1545 goto close_and_fail;
1546 }
1547 }
1548
b6ad491a 1549 /* Check if any unknown options were used */
5acd9d81 1550 if (options && (qdict_size(options) != 0)) {
b6ad491a 1551 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
1552 if (flags & BDRV_O_PROTOCOL) {
1553 error_setg(errp, "Block protocol '%s' doesn't support the option "
1554 "'%s'", drv->format_name, entry->key);
1555 } else {
1556 error_setg(errp, "Block format '%s' used by device '%s' doesn't "
1557 "support the option '%s'", drv->format_name,
bfb197e0 1558 bdrv_get_device_name(bs), entry->key);
5acd9d81 1559 }
b6ad491a
KW
1560
1561 ret = -EINVAL;
1562 goto close_and_fail;
1563 }
b6ad491a 1564
b6ce07aa 1565 if (!bdrv_key_required(bs)) {
a7f53e26
MA
1566 if (bs->blk) {
1567 blk_dev_change_media_cb(bs->blk, true);
1568 }
c3adb58f
MA
1569 } else if (!runstate_check(RUN_STATE_PRELAUNCH)
1570 && !runstate_check(RUN_STATE_INMIGRATE)
1571 && !runstate_check(RUN_STATE_PAUSED)) { /* HACK */
1572 error_setg(errp,
1573 "Guest must be stopped for opening of encrypted image");
1574 ret = -EBUSY;
1575 goto close_and_fail;
b6ce07aa
KW
1576 }
1577
c3adb58f 1578 QDECREF(options);
f67503e5 1579 *pbs = bs;
b6ce07aa
KW
1580 return 0;
1581
8bfea15d 1582fail:
f500a6d3 1583 if (file != NULL) {
4f6fd349 1584 bdrv_unref(file);
f500a6d3 1585 }
de9c0cec 1586 QDECREF(bs->options);
b6ad491a 1587 QDECREF(options);
de9c0cec 1588 bs->options = NULL;
f67503e5
HR
1589 if (!*pbs) {
1590 /* If *pbs is NULL, a new BDS has been created in this function and
1591 needs to be freed now. Otherwise, it does not need to be closed,
1592 since it has not really been opened yet. */
1593 bdrv_unref(bs);
1594 }
84d18f06 1595 if (local_err) {
34b5d2c6
HR
1596 error_propagate(errp, local_err);
1597 }
b6ad491a 1598 return ret;
de9c0cec 1599
b6ad491a 1600close_and_fail:
f67503e5
HR
1601 /* See fail path, but now the BDS has to be always closed */
1602 if (*pbs) {
1603 bdrv_close(bs);
1604 } else {
1605 bdrv_unref(bs);
1606 }
b6ad491a 1607 QDECREF(options);
84d18f06 1608 if (local_err) {
34b5d2c6
HR
1609 error_propagate(errp, local_err);
1610 }
b6ce07aa
KW
1611 return ret;
1612}
1613
f3930ed0 1614int bdrv_open(BlockDriverState **pbs, const char *filename,
6ebf9aa2 1615 const char *reference, QDict *options, int flags, Error **errp)
f3930ed0
KW
1616{
1617 return bdrv_open_inherit(pbs, filename, reference, options, flags, NULL,
ce343771 1618 NULL, errp);
f3930ed0
KW
1619}
1620
e971aa12
JC
1621typedef struct BlockReopenQueueEntry {
1622 bool prepared;
1623 BDRVReopenState state;
1624 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
1625} BlockReopenQueueEntry;
1626
1627/*
1628 * Adds a BlockDriverState to a simple queue for an atomic, transactional
1629 * reopen of multiple devices.
1630 *
1631 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
1632 * already performed, or alternatively may be NULL a new BlockReopenQueue will
1633 * be created and initialized. This newly created BlockReopenQueue should be
1634 * passed back in for subsequent calls that are intended to be of the same
1635 * atomic 'set'.
1636 *
1637 * bs is the BlockDriverState to add to the reopen queue.
1638 *
4d2cb092
KW
1639 * options contains the changed options for the associated bs
1640 * (the BlockReopenQueue takes ownership)
1641 *
e971aa12
JC
1642 * flags contains the open flags for the associated bs
1643 *
1644 * returns a pointer to bs_queue, which is either the newly allocated
1645 * bs_queue, or the existing bs_queue being used.
1646 *
1647 */
1648BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
4d2cb092
KW
1649 BlockDriverState *bs,
1650 QDict *options, int flags)
e971aa12
JC
1651{
1652 assert(bs != NULL);
1653
1654 BlockReopenQueueEntry *bs_entry;
67251a31 1655 BdrvChild *child;
4d2cb092 1656 QDict *old_options;
67251a31 1657
e971aa12
JC
1658 if (bs_queue == NULL) {
1659 bs_queue = g_new0(BlockReopenQueue, 1);
1660 QSIMPLEQ_INIT(bs_queue);
1661 }
1662
4d2cb092
KW
1663 if (!options) {
1664 options = qdict_new();
1665 }
1666
1667 old_options = qdict_clone_shallow(bs->options);
1668 qdict_join(options, old_options, false);
1669 QDECREF(old_options);
1670
f1f25a2e
KW
1671 /* bdrv_open() masks this flag out */
1672 flags &= ~BDRV_O_PROTOCOL;
1673
67251a31
KW
1674 QLIST_FOREACH(child, &bs->children, next) {
1675 int child_flags;
1676
1677 if (child->bs->inherits_from != bs) {
1678 continue;
1679 }
1680
1681 child_flags = child->role->inherit_flags(flags);
4d2cb092
KW
1682 /* TODO Pass down child flags (backing.*, extents.*, ...) */
1683 bdrv_reopen_queue(bs_queue, child->bs, NULL, child_flags);
e971aa12
JC
1684 }
1685
1686 bs_entry = g_new0(BlockReopenQueueEntry, 1);
1687 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
1688
1689 bs_entry->state.bs = bs;
4d2cb092 1690 bs_entry->state.options = options;
e971aa12
JC
1691 bs_entry->state.flags = flags;
1692
1693 return bs_queue;
1694}
1695
1696/*
1697 * Reopen multiple BlockDriverStates atomically & transactionally.
1698 *
1699 * The queue passed in (bs_queue) must have been built up previous
1700 * via bdrv_reopen_queue().
1701 *
1702 * Reopens all BDS specified in the queue, with the appropriate
1703 * flags. All devices are prepared for reopen, and failure of any
1704 * device will cause all device changes to be abandonded, and intermediate
1705 * data cleaned up.
1706 *
1707 * If all devices prepare successfully, then the changes are committed
1708 * to all devices.
1709 *
1710 */
1711int bdrv_reopen_multiple(BlockReopenQueue *bs_queue, Error **errp)
1712{
1713 int ret = -1;
1714 BlockReopenQueueEntry *bs_entry, *next;
1715 Error *local_err = NULL;
1716
1717 assert(bs_queue != NULL);
1718
1719 bdrv_drain_all();
1720
1721 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1722 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
1723 error_propagate(errp, local_err);
1724 goto cleanup;
1725 }
1726 bs_entry->prepared = true;
1727 }
1728
1729 /* If we reach this point, we have success and just need to apply the
1730 * changes
1731 */
1732 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1733 bdrv_reopen_commit(&bs_entry->state);
1734 }
1735
1736 ret = 0;
1737
1738cleanup:
1739 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
1740 if (ret && bs_entry->prepared) {
1741 bdrv_reopen_abort(&bs_entry->state);
1742 }
4d2cb092 1743 QDECREF(bs_entry->state.options);
e971aa12
JC
1744 g_free(bs_entry);
1745 }
1746 g_free(bs_queue);
1747 return ret;
1748}
1749
1750
1751/* Reopen a single BlockDriverState with the specified flags. */
1752int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
1753{
1754 int ret = -1;
1755 Error *local_err = NULL;
4d2cb092 1756 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12
JC
1757
1758 ret = bdrv_reopen_multiple(queue, &local_err);
1759 if (local_err != NULL) {
1760 error_propagate(errp, local_err);
1761 }
1762 return ret;
1763}
1764
1765
1766/*
1767 * Prepares a BlockDriverState for reopen. All changes are staged in the
1768 * 'opaque' field of the BDRVReopenState, which is used and allocated by
1769 * the block driver layer .bdrv_reopen_prepare()
1770 *
1771 * bs is the BlockDriverState to reopen
1772 * flags are the new open flags
1773 * queue is the reopen queue
1774 *
1775 * Returns 0 on success, non-zero on error. On error errp will be set
1776 * as well.
1777 *
1778 * On failure, bdrv_reopen_abort() will be called to clean up any data.
1779 * It is the responsibility of the caller to then call the abort() or
1780 * commit() for any other BDS that have been left in a prepare() state
1781 *
1782 */
1783int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
1784 Error **errp)
1785{
1786 int ret = -1;
1787 Error *local_err = NULL;
1788 BlockDriver *drv;
1789
1790 assert(reopen_state != NULL);
1791 assert(reopen_state->bs->drv != NULL);
1792 drv = reopen_state->bs->drv;
1793
1794 /* if we are to stay read-only, do not allow permission change
1795 * to r/w */
1796 if (!(reopen_state->bs->open_flags & BDRV_O_ALLOW_RDWR) &&
1797 reopen_state->flags & BDRV_O_RDWR) {
81e5f78a
AG
1798 error_setg(errp, "Node '%s' is read only",
1799 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
1800 goto error;
1801 }
1802
1803
1804 ret = bdrv_flush(reopen_state->bs);
1805 if (ret) {
1806 error_set(errp, ERROR_CLASS_GENERIC_ERROR, "Error (%s) flushing drive",
1807 strerror(-ret));
1808 goto error;
1809 }
1810
1811 if (drv->bdrv_reopen_prepare) {
1812 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
1813 if (ret) {
1814 if (local_err != NULL) {
1815 error_propagate(errp, local_err);
1816 } else {
d8b6895f
LC
1817 error_setg(errp, "failed while preparing to reopen image '%s'",
1818 reopen_state->bs->filename);
e971aa12
JC
1819 }
1820 goto error;
1821 }
1822 } else {
1823 /* It is currently mandatory to have a bdrv_reopen_prepare()
1824 * handler for each supported drv. */
81e5f78a
AG
1825 error_setg(errp, "Block format '%s' used by node '%s' "
1826 "does not support reopening files", drv->format_name,
1827 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
1828 ret = -1;
1829 goto error;
1830 }
1831
4d2cb092
KW
1832 /* Options that are not handled are only okay if they are unchanged
1833 * compared to the old state. It is expected that some options are only
1834 * used for the initial open, but not reopen (e.g. filename) */
1835 if (qdict_size(reopen_state->options)) {
1836 const QDictEntry *entry = qdict_first(reopen_state->options);
1837
1838 do {
1839 QString *new_obj = qobject_to_qstring(entry->value);
1840 const char *new = qstring_get_str(new_obj);
1841 const char *old = qdict_get_try_str(reopen_state->bs->options,
1842 entry->key);
1843
1844 if (!old || strcmp(new, old)) {
1845 error_setg(errp, "Cannot change the option '%s'", entry->key);
1846 ret = -EINVAL;
1847 goto error;
1848 }
1849 } while ((entry = qdict_next(reopen_state->options, entry)));
1850 }
1851
e971aa12
JC
1852 ret = 0;
1853
1854error:
1855 return ret;
1856}
1857
1858/*
1859 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
1860 * makes them final by swapping the staging BlockDriverState contents into
1861 * the active BlockDriverState contents.
1862 */
1863void bdrv_reopen_commit(BDRVReopenState *reopen_state)
1864{
1865 BlockDriver *drv;
1866
1867 assert(reopen_state != NULL);
1868 drv = reopen_state->bs->drv;
1869 assert(drv != NULL);
1870
1871 /* If there are any driver level actions to take */
1872 if (drv->bdrv_reopen_commit) {
1873 drv->bdrv_reopen_commit(reopen_state);
1874 }
1875
1876 /* set BDS specific flags now */
1877 reopen_state->bs->open_flags = reopen_state->flags;
1878 reopen_state->bs->enable_write_cache = !!(reopen_state->flags &
1879 BDRV_O_CACHE_WB);
1880 reopen_state->bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 1881
3baca891 1882 bdrv_refresh_limits(reopen_state->bs, NULL);
e971aa12
JC
1883}
1884
1885/*
1886 * Abort the reopen, and delete and free the staged changes in
1887 * reopen_state
1888 */
1889void bdrv_reopen_abort(BDRVReopenState *reopen_state)
1890{
1891 BlockDriver *drv;
1892
1893 assert(reopen_state != NULL);
1894 drv = reopen_state->bs->drv;
1895 assert(drv != NULL);
1896
1897 if (drv->bdrv_reopen_abort) {
1898 drv->bdrv_reopen_abort(reopen_state);
1899 }
1900}
1901
1902
fc01f7e7
FB
1903void bdrv_close(BlockDriverState *bs)
1904{
33384421
HR
1905 BdrvAioNotifier *ban, *ban_next;
1906
3cbc002c
PB
1907 if (bs->job) {
1908 block_job_cancel_sync(bs->job);
1909 }
99b7e775
AG
1910
1911 /* Disable I/O limits and drain all pending throttled requests */
1912 if (bs->io_limits_enabled) {
1913 bdrv_io_limits_disable(bs);
1914 }
1915
53ec73e2 1916 bdrv_drain(bs); /* complete I/O */
58fda173 1917 bdrv_flush(bs);
53ec73e2 1918 bdrv_drain(bs); /* in case flush left pending I/O */
d7d512f6 1919 notifier_list_notify(&bs->close_notifiers, bs);
7094f12f 1920
3cbc002c 1921 if (bs->drv) {
6e93e7c4
KW
1922 BdrvChild *child, *next;
1923
9a7dedbc
KW
1924 bs->drv->bdrv_close(bs);
1925
1926 if (bs->backing_hd) {
1927 BlockDriverState *backing_hd = bs->backing_hd;
1928 bdrv_set_backing_hd(bs, NULL);
1929 bdrv_unref(backing_hd);
1930 }
1931
6e93e7c4 1932 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
1933 /* TODO Remove bdrv_unref() from drivers' close function and use
1934 * bdrv_unref_child() here */
bddcec37
KW
1935 if (child->bs->inherits_from == bs) {
1936 child->bs->inherits_from = NULL;
1937 }
33a60407 1938 bdrv_detach_child(child);
6e93e7c4
KW
1939 }
1940
7267c094 1941 g_free(bs->opaque);
ea2384d3
FB
1942 bs->opaque = NULL;
1943 bs->drv = NULL;
53fec9d3 1944 bs->copy_on_read = 0;
a275fa42
PB
1945 bs->backing_file[0] = '\0';
1946 bs->backing_format[0] = '\0';
6405875c
PB
1947 bs->total_sectors = 0;
1948 bs->encrypted = 0;
1949 bs->valid_key = 0;
1950 bs->sg = 0;
0d51b4de 1951 bs->zero_beyond_eof = false;
de9c0cec
KW
1952 QDECREF(bs->options);
1953 bs->options = NULL;
91af7014
HR
1954 QDECREF(bs->full_open_options);
1955 bs->full_open_options = NULL;
b338082b 1956
66f82cee 1957 if (bs->file != NULL) {
4f6fd349 1958 bdrv_unref(bs->file);
0ac9377d 1959 bs->file = NULL;
66f82cee 1960 }
b338082b 1961 }
98f90dba 1962
a7f53e26
MA
1963 if (bs->blk) {
1964 blk_dev_change_media_cb(bs->blk, false);
1965 }
9ca11154 1966
33384421
HR
1967 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
1968 g_free(ban);
1969 }
1970 QLIST_INIT(&bs->aio_notifiers);
b338082b
FB
1971}
1972
2bc93fed
MK
1973void bdrv_close_all(void)
1974{
1975 BlockDriverState *bs;
1976
dc364f4c 1977 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
1978 AioContext *aio_context = bdrv_get_aio_context(bs);
1979
1980 aio_context_acquire(aio_context);
2bc93fed 1981 bdrv_close(bs);
ed78cda3 1982 aio_context_release(aio_context);
2bc93fed
MK
1983 }
1984}
1985
dc364f4c
BC
1986/* make a BlockDriverState anonymous by removing from bdrv_state and
1987 * graph_bdrv_state list.
d22b2f41
RH
1988 Also, NULL terminate the device_name to prevent double remove */
1989void bdrv_make_anon(BlockDriverState *bs)
1990{
bfb197e0
MA
1991 /*
1992 * Take care to remove bs from bdrv_states only when it's actually
1993 * in it. Note that bs->device_list.tqe_prev is initially null,
1994 * and gets set to non-null by QTAILQ_INSERT_TAIL(). Establish
1995 * the useful invariant "bs in bdrv_states iff bs->tqe_prev" by
1996 * resetting it to null on remove.
1997 */
1998 if (bs->device_list.tqe_prev) {
dc364f4c 1999 QTAILQ_REMOVE(&bdrv_states, bs, device_list);
bfb197e0 2000 bs->device_list.tqe_prev = NULL;
d22b2f41 2001 }
dc364f4c
BC
2002 if (bs->node_name[0] != '\0') {
2003 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
2004 }
2005 bs->node_name[0] = '\0';
d22b2f41
RH
2006}
2007
e023b2e2
PB
2008static void bdrv_rebind(BlockDriverState *bs)
2009{
2010 if (bs->drv && bs->drv->bdrv_rebind) {
2011 bs->drv->bdrv_rebind(bs);
2012 }
2013}
2014
4ddc07ca
PB
2015static void bdrv_move_feature_fields(BlockDriverState *bs_dest,
2016 BlockDriverState *bs_src)
8802d1fd 2017{
4ddc07ca 2018 /* move some fields that need to stay attached to the device */
8802d1fd
JC
2019
2020 /* dev info */
1b7fd729 2021 bs_dest->guest_block_size = bs_src->guest_block_size;
4ddc07ca 2022 bs_dest->copy_on_read = bs_src->copy_on_read;
8802d1fd 2023
4ddc07ca 2024 bs_dest->enable_write_cache = bs_src->enable_write_cache;
c4a248a1 2025
cc0681c4 2026 /* i/o throttled req */
76f4afb4
AG
2027 bs_dest->throttle_state = bs_src->throttle_state,
2028 bs_dest->io_limits_enabled = bs_src->io_limits_enabled;
2029 bs_dest->pending_reqs[0] = bs_src->pending_reqs[0];
2030 bs_dest->pending_reqs[1] = bs_src->pending_reqs[1];
2031 bs_dest->throttled_reqs[0] = bs_src->throttled_reqs[0];
2032 bs_dest->throttled_reqs[1] = bs_src->throttled_reqs[1];
2033 memcpy(&bs_dest->round_robin,
2034 &bs_src->round_robin,
2035 sizeof(bs_dest->round_robin));
0e5b0a2d
BC
2036 memcpy(&bs_dest->throttle_timers,
2037 &bs_src->throttle_timers,
2038 sizeof(ThrottleTimers));
8802d1fd 2039
8802d1fd 2040 /* r/w error */
4ddc07ca
PB
2041 bs_dest->on_read_error = bs_src->on_read_error;
2042 bs_dest->on_write_error = bs_src->on_write_error;
8802d1fd
JC
2043
2044 /* i/o status */
4ddc07ca
PB
2045 bs_dest->iostatus_enabled = bs_src->iostatus_enabled;
2046 bs_dest->iostatus = bs_src->iostatus;
8802d1fd 2047
a9fc4408 2048 /* dirty bitmap */
e4654d2d 2049 bs_dest->dirty_bitmaps = bs_src->dirty_bitmaps;
a9fc4408 2050
9fcb0251
FZ
2051 /* reference count */
2052 bs_dest->refcnt = bs_src->refcnt;
2053
a9fc4408 2054 /* job */
4ddc07ca 2055 bs_dest->job = bs_src->job;
a9fc4408 2056
8802d1fd 2057 /* keep the same entry in bdrv_states */
dc364f4c 2058 bs_dest->device_list = bs_src->device_list;
7e7d56d9
MA
2059 bs_dest->blk = bs_src->blk;
2060
fbe40ff7
FZ
2061 memcpy(bs_dest->op_blockers, bs_src->op_blockers,
2062 sizeof(bs_dest->op_blockers));
4ddc07ca 2063}
8802d1fd 2064
4ddc07ca
PB
2065/*
2066 * Swap bs contents for two image chains while they are live,
2067 * while keeping required fields on the BlockDriverState that is
2068 * actually attached to a device.
2069 *
2070 * This will modify the BlockDriverState fields, and swap contents
2071 * between bs_new and bs_old. Both bs_new and bs_old are modified.
2072 *
bfb197e0 2073 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2074 *
2075 * This function does not create any image files.
2076 */
2077void bdrv_swap(BlockDriverState *bs_new, BlockDriverState *bs_old)
2078{
2079 BlockDriverState tmp;
bddcec37 2080 BdrvChild *child;
f6801b83 2081
6ee4ce1e
KW
2082 bdrv_drain(bs_new);
2083 bdrv_drain(bs_old);
f6801b83 2084
90ce8a06
BC
2085 /* The code needs to swap the node_name but simply swapping node_list won't
2086 * work so first remove the nodes from the graph list, do the swap then
2087 * insert them back if needed.
2088 */
2089 if (bs_new->node_name[0] != '\0') {
2090 QTAILQ_REMOVE(&graph_bdrv_states, bs_new, node_list);
2091 }
2092 if (bs_old->node_name[0] != '\0') {
2093 QTAILQ_REMOVE(&graph_bdrv_states, bs_old, node_list);
2094 }
2095
db628338
AG
2096 /* If the BlockDriverState is part of a throttling group acquire
2097 * its lock since we're going to mess with the protected fields.
2098 * Otherwise there's no need to worry since no one else can touch
2099 * them. */
2100 if (bs_old->throttle_state) {
2101 throttle_group_lock(bs_old);
2102 }
2103
bfb197e0 2104 /* bs_new must be unattached and shouldn't have anything fancy enabled */
7e7d56d9 2105 assert(!bs_new->blk);
e4654d2d 2106 assert(QLIST_EMPTY(&bs_new->dirty_bitmaps));
4ddc07ca 2107 assert(bs_new->job == NULL);
4ddc07ca 2108 assert(bs_new->io_limits_enabled == false);
db628338 2109 assert(bs_new->throttle_state == NULL);
0e5b0a2d 2110 assert(!throttle_timers_are_initialized(&bs_new->throttle_timers));
8802d1fd 2111
4ddc07ca
PB
2112 tmp = *bs_new;
2113 *bs_new = *bs_old;
2114 *bs_old = tmp;
a9fc4408 2115
4ddc07ca
PB
2116 /* there are some fields that should not be swapped, move them back */
2117 bdrv_move_feature_fields(&tmp, bs_old);
2118 bdrv_move_feature_fields(bs_old, bs_new);
2119 bdrv_move_feature_fields(bs_new, &tmp);
8802d1fd 2120
bfb197e0 2121 /* bs_new must remain unattached */
7e7d56d9 2122 assert(!bs_new->blk);
4ddc07ca
PB
2123
2124 /* Check a few fields that should remain attached to the device */
4ddc07ca 2125 assert(bs_new->job == NULL);
4ddc07ca 2126 assert(bs_new->io_limits_enabled == false);
db628338 2127 assert(bs_new->throttle_state == NULL);
0e5b0a2d 2128 assert(!throttle_timers_are_initialized(&bs_new->throttle_timers));
e023b2e2 2129
db628338
AG
2130 /* Release the ThrottleGroup lock */
2131 if (bs_old->throttle_state) {
2132 throttle_group_unlock(bs_old);
2133 }
2134
90ce8a06
BC
2135 /* insert the nodes back into the graph node list if needed */
2136 if (bs_new->node_name[0] != '\0') {
2137 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs_new, node_list);
2138 }
2139 if (bs_old->node_name[0] != '\0') {
2140 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs_old, node_list);
2141 }
2142
6e93e7c4
KW
2143 /*
2144 * Update lh_first.le_prev for non-empty lists.
2145 *
2146 * The head of the op blocker list doesn't change because it is moved back
2147 * in bdrv_move_feature_fields().
2148 */
6ee4ce1e
KW
2149 assert(QLIST_EMPTY(&bs_old->tracked_requests));
2150 assert(QLIST_EMPTY(&bs_new->tracked_requests));
2151
6e93e7c4
KW
2152 QLIST_FIX_HEAD_PTR(&bs_new->children, next);
2153 QLIST_FIX_HEAD_PTR(&bs_old->children, next);
2154
bddcec37
KW
2155 /* Update references in bs->opaque and children */
2156 QLIST_FOREACH(child, &bs_old->children, next) {
2157 if (child->bs->inherits_from == bs_new) {
2158 child->bs->inherits_from = bs_old;
2159 }
2160 }
2161 QLIST_FOREACH(child, &bs_new->children, next) {
2162 if (child->bs->inherits_from == bs_old) {
2163 child->bs->inherits_from = bs_new;
2164 }
2165 }
2166
e023b2e2 2167 bdrv_rebind(bs_new);
4ddc07ca
PB
2168 bdrv_rebind(bs_old);
2169}
2170
2171/*
2172 * Add new bs contents at the top of an image chain while the chain is
2173 * live, while keeping required fields on the top layer.
2174 *
2175 * This will modify the BlockDriverState fields, and swap contents
2176 * between bs_new and bs_top. Both bs_new and bs_top are modified.
2177 *
bfb197e0 2178 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2179 *
2180 * This function does not create any image files.
2181 */
2182void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top)
2183{
2184 bdrv_swap(bs_new, bs_top);
2185
2186 /* The contents of 'tmp' will become bs_top, as we are
2187 * swapping bs_new and bs_top contents. */
8d24cce1 2188 bdrv_set_backing_hd(bs_top, bs_new);
8802d1fd
JC
2189}
2190
4f6fd349 2191static void bdrv_delete(BlockDriverState *bs)
b338082b 2192{
3e914655 2193 assert(!bs->job);
3718d8ab 2194 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 2195 assert(!bs->refcnt);
e4654d2d 2196 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
18846dee 2197
e1b5c52e
SH
2198 bdrv_close(bs);
2199
1b7bdbc1 2200 /* remove from list, if necessary */
d22b2f41 2201 bdrv_make_anon(bs);
34c6f050 2202
7267c094 2203 g_free(bs);
fc01f7e7
FB
2204}
2205
e97fc193
AL
2206/*
2207 * Run consistency checks on an image
2208 *
e076f338 2209 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 2210 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 2211 * check are stored in res.
e97fc193 2212 */
4534ff54 2213int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 2214{
908bcd54
HR
2215 if (bs->drv == NULL) {
2216 return -ENOMEDIUM;
2217 }
e97fc193
AL
2218 if (bs->drv->bdrv_check == NULL) {
2219 return -ENOTSUP;
2220 }
2221
e076f338 2222 memset(res, 0, sizeof(*res));
4534ff54 2223 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
2224}
2225
8a426614
KW
2226#define COMMIT_BUF_SECTORS 2048
2227
33e3963e
FB
2228/* commit COW file into the raw image */
2229int bdrv_commit(BlockDriverState *bs)
2230{
19cb3738 2231 BlockDriver *drv = bs->drv;
72706ea4 2232 int64_t sector, total_sectors, length, backing_length;
8a426614 2233 int n, ro, open_flags;
0bce597d 2234 int ret = 0;
72706ea4 2235 uint8_t *buf = NULL;
33e3963e 2236
19cb3738
FB
2237 if (!drv)
2238 return -ENOMEDIUM;
6bb45158 2239
4dca4b63
NS
2240 if (!bs->backing_hd) {
2241 return -ENOTSUP;
33e3963e
FB
2242 }
2243
bb00021d
FZ
2244 if (bdrv_op_is_blocked(bs, BLOCK_OP_TYPE_COMMIT_SOURCE, NULL) ||
2245 bdrv_op_is_blocked(bs->backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET, NULL)) {
2d3735d3
SH
2246 return -EBUSY;
2247 }
2248
4dca4b63 2249 ro = bs->backing_hd->read_only;
4dca4b63
NS
2250 open_flags = bs->backing_hd->open_flags;
2251
2252 if (ro) {
0bce597d
JC
2253 if (bdrv_reopen(bs->backing_hd, open_flags | BDRV_O_RDWR, NULL)) {
2254 return -EACCES;
4dca4b63 2255 }
ea2384d3 2256 }
33e3963e 2257
72706ea4
JC
2258 length = bdrv_getlength(bs);
2259 if (length < 0) {
2260 ret = length;
2261 goto ro_cleanup;
2262 }
2263
2264 backing_length = bdrv_getlength(bs->backing_hd);
2265 if (backing_length < 0) {
2266 ret = backing_length;
2267 goto ro_cleanup;
2268 }
2269
2270 /* If our top snapshot is larger than the backing file image,
2271 * grow the backing file image if possible. If not possible,
2272 * we must return an error */
2273 if (length > backing_length) {
2274 ret = bdrv_truncate(bs->backing_hd, length);
2275 if (ret < 0) {
2276 goto ro_cleanup;
2277 }
2278 }
2279
2280 total_sectors = length >> BDRV_SECTOR_BITS;
857d4f46
KW
2281
2282 /* qemu_try_blockalign() for bs will choose an alignment that works for
2283 * bs->backing_hd as well, so no need to compare the alignment manually. */
2284 buf = qemu_try_blockalign(bs, COMMIT_BUF_SECTORS * BDRV_SECTOR_SIZE);
2285 if (buf == NULL) {
2286 ret = -ENOMEM;
2287 goto ro_cleanup;
2288 }
8a426614
KW
2289
2290 for (sector = 0; sector < total_sectors; sector += n) {
d663640c
PB
2291 ret = bdrv_is_allocated(bs, sector, COMMIT_BUF_SECTORS, &n);
2292 if (ret < 0) {
2293 goto ro_cleanup;
2294 }
2295 if (ret) {
dabfa6cc
KW
2296 ret = bdrv_read(bs, sector, buf, n);
2297 if (ret < 0) {
8a426614
KW
2298 goto ro_cleanup;
2299 }
2300
dabfa6cc
KW
2301 ret = bdrv_write(bs->backing_hd, sector, buf, n);
2302 if (ret < 0) {
8a426614
KW
2303 goto ro_cleanup;
2304 }
ea2384d3 2305 }
33e3963e 2306 }
95389c86 2307
1d44952f
CH
2308 if (drv->bdrv_make_empty) {
2309 ret = drv->bdrv_make_empty(bs);
dabfa6cc
KW
2310 if (ret < 0) {
2311 goto ro_cleanup;
2312 }
1d44952f
CH
2313 bdrv_flush(bs);
2314 }
95389c86 2315
3f5075ae
CH
2316 /*
2317 * Make sure all data we wrote to the backing device is actually
2318 * stable on disk.
2319 */
dabfa6cc 2320 if (bs->backing_hd) {
3f5075ae 2321 bdrv_flush(bs->backing_hd);
dabfa6cc 2322 }
4dca4b63 2323
dabfa6cc 2324 ret = 0;
4dca4b63 2325ro_cleanup:
857d4f46 2326 qemu_vfree(buf);
4dca4b63
NS
2327
2328 if (ro) {
0bce597d
JC
2329 /* ignoring error return here */
2330 bdrv_reopen(bs->backing_hd, open_flags & ~BDRV_O_RDWR, NULL);
4dca4b63
NS
2331 }
2332
1d44952f 2333 return ret;
33e3963e
FB
2334}
2335
e8877497 2336int bdrv_commit_all(void)
6ab4b5ab
MA
2337{
2338 BlockDriverState *bs;
2339
dc364f4c 2340 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
2341 AioContext *aio_context = bdrv_get_aio_context(bs);
2342
2343 aio_context_acquire(aio_context);
272d2d8e
JC
2344 if (bs->drv && bs->backing_hd) {
2345 int ret = bdrv_commit(bs);
2346 if (ret < 0) {
ed78cda3 2347 aio_context_release(aio_context);
272d2d8e
JC
2348 return ret;
2349 }
e8877497 2350 }
ed78cda3 2351 aio_context_release(aio_context);
6ab4b5ab 2352 }
e8877497 2353 return 0;
6ab4b5ab
MA
2354}
2355
756e6736
KW
2356/*
2357 * Return values:
2358 * 0 - success
2359 * -EINVAL - backing format specified, but no file
2360 * -ENOSPC - can't update the backing file because no space is left in the
2361 * image file header
2362 * -ENOTSUP - format driver doesn't support changing the backing file
2363 */
2364int bdrv_change_backing_file(BlockDriverState *bs,
2365 const char *backing_file, const char *backing_fmt)
2366{
2367 BlockDriver *drv = bs->drv;
469ef350 2368 int ret;
756e6736 2369
5f377794
PB
2370 /* Backing file format doesn't make sense without a backing file */
2371 if (backing_fmt && !backing_file) {
2372 return -EINVAL;
2373 }
2374
756e6736 2375 if (drv->bdrv_change_backing_file != NULL) {
469ef350 2376 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 2377 } else {
469ef350 2378 ret = -ENOTSUP;
756e6736 2379 }
469ef350
PB
2380
2381 if (ret == 0) {
2382 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
2383 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
2384 }
2385 return ret;
756e6736
KW
2386}
2387
6ebdcee2
JC
2388/*
2389 * Finds the image layer in the chain that has 'bs' as its backing file.
2390 *
2391 * active is the current topmost image.
2392 *
2393 * Returns NULL if bs is not found in active's image chain,
2394 * or if active == bs.
4caf0fcd
JC
2395 *
2396 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
2397 */
2398BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
2399 BlockDriverState *bs)
2400{
4caf0fcd
JC
2401 while (active && bs != active->backing_hd) {
2402 active = active->backing_hd;
6ebdcee2
JC
2403 }
2404
4caf0fcd
JC
2405 return active;
2406}
6ebdcee2 2407
4caf0fcd
JC
2408/* Given a BDS, searches for the base layer. */
2409BlockDriverState *bdrv_find_base(BlockDriverState *bs)
2410{
2411 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
2412}
2413
2414typedef struct BlkIntermediateStates {
2415 BlockDriverState *bs;
2416 QSIMPLEQ_ENTRY(BlkIntermediateStates) entry;
2417} BlkIntermediateStates;
2418
2419
2420/*
2421 * Drops images above 'base' up to and including 'top', and sets the image
2422 * above 'top' to have base as its backing file.
2423 *
2424 * Requires that the overlay to 'top' is opened r/w, so that the backing file
2425 * information in 'bs' can be properly updated.
2426 *
2427 * E.g., this will convert the following chain:
2428 * bottom <- base <- intermediate <- top <- active
2429 *
2430 * to
2431 *
2432 * bottom <- base <- active
2433 *
2434 * It is allowed for bottom==base, in which case it converts:
2435 *
2436 * base <- intermediate <- top <- active
2437 *
2438 * to
2439 *
2440 * base <- active
2441 *
54e26900
JC
2442 * If backing_file_str is non-NULL, it will be used when modifying top's
2443 * overlay image metadata.
2444 *
6ebdcee2
JC
2445 * Error conditions:
2446 * if active == top, that is considered an error
2447 *
2448 */
2449int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 2450 BlockDriverState *base, const char *backing_file_str)
6ebdcee2
JC
2451{
2452 BlockDriverState *intermediate;
2453 BlockDriverState *base_bs = NULL;
2454 BlockDriverState *new_top_bs = NULL;
2455 BlkIntermediateStates *intermediate_state, *next;
2456 int ret = -EIO;
2457
2458 QSIMPLEQ_HEAD(states_to_delete, BlkIntermediateStates) states_to_delete;
2459 QSIMPLEQ_INIT(&states_to_delete);
2460
2461 if (!top->drv || !base->drv) {
2462 goto exit;
2463 }
2464
2465 new_top_bs = bdrv_find_overlay(active, top);
2466
2467 if (new_top_bs == NULL) {
2468 /* we could not find the image above 'top', this is an error */
2469 goto exit;
2470 }
2471
2472 /* special case of new_top_bs->backing_hd already pointing to base - nothing
2473 * to do, no intermediate images */
2474 if (new_top_bs->backing_hd == base) {
2475 ret = 0;
2476 goto exit;
2477 }
2478
2479 intermediate = top;
2480
2481 /* now we will go down through the list, and add each BDS we find
2482 * into our deletion queue, until we hit the 'base'
2483 */
2484 while (intermediate) {
5839e53b 2485 intermediate_state = g_new0(BlkIntermediateStates, 1);
6ebdcee2
JC
2486 intermediate_state->bs = intermediate;
2487 QSIMPLEQ_INSERT_TAIL(&states_to_delete, intermediate_state, entry);
2488
2489 if (intermediate->backing_hd == base) {
2490 base_bs = intermediate->backing_hd;
2491 break;
2492 }
2493 intermediate = intermediate->backing_hd;
2494 }
2495 if (base_bs == NULL) {
2496 /* something went wrong, we did not end at the base. safely
2497 * unravel everything, and exit with error */
2498 goto exit;
2499 }
2500
2501 /* success - we can delete the intermediate states, and link top->base */
54e26900
JC
2502 backing_file_str = backing_file_str ? backing_file_str : base_bs->filename;
2503 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
6ebdcee2
JC
2504 base_bs->drv ? base_bs->drv->format_name : "");
2505 if (ret) {
2506 goto exit;
2507 }
920beae1 2508 bdrv_set_backing_hd(new_top_bs, base_bs);
6ebdcee2
JC
2509
2510 QSIMPLEQ_FOREACH_SAFE(intermediate_state, &states_to_delete, entry, next) {
2511 /* so that bdrv_close() does not recursively close the chain */
920beae1 2512 bdrv_set_backing_hd(intermediate_state->bs, NULL);
4f6fd349 2513 bdrv_unref(intermediate_state->bs);
6ebdcee2
JC
2514 }
2515 ret = 0;
2516
2517exit:
2518 QSIMPLEQ_FOREACH_SAFE(intermediate_state, &states_to_delete, entry, next) {
2519 g_free(intermediate_state);
2520 }
2521 return ret;
2522}
2523
61007b31
SH
2524/**
2525 * Truncate file to 'offset' bytes (needed only for file protocols)
2526 */
2527int bdrv_truncate(BlockDriverState *bs, int64_t offset)
71d0770c 2528{
61007b31
SH
2529 BlockDriver *drv = bs->drv;
2530 int ret;
2531 if (!drv)
71d0770c 2532 return -ENOMEDIUM;
61007b31
SH
2533 if (!drv->bdrv_truncate)
2534 return -ENOTSUP;
2535 if (bs->read_only)
2536 return -EACCES;
71d0770c 2537
61007b31
SH
2538 ret = drv->bdrv_truncate(bs, offset);
2539 if (ret == 0) {
2540 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
2541 bdrv_dirty_bitmap_truncate(bs);
2542 if (bs->blk) {
2543 blk_dev_resize_cb(bs->blk);
2544 }
c0191e76 2545 }
61007b31 2546 return ret;
71d0770c
AL
2547}
2548
61007b31
SH
2549/**
2550 * Length of a allocated file in bytes. Sparse files are counted by actual
2551 * allocated space. Return < 0 if error or unknown.
2552 */
2553int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 2554{
61007b31
SH
2555 BlockDriver *drv = bs->drv;
2556 if (!drv) {
2557 return -ENOMEDIUM;
8f4754ed 2558 }
61007b31
SH
2559 if (drv->bdrv_get_allocated_file_size) {
2560 return drv->bdrv_get_allocated_file_size(bs);
2561 }
2562 if (bs->file) {
2563 return bdrv_get_allocated_file_size(bs->file);
1c9805a3 2564 }
61007b31 2565 return -ENOTSUP;
1c9805a3 2566}
e7a8a783 2567
61007b31
SH
2568/**
2569 * Return number of sectors on success, -errno on error.
1c9805a3 2570 */
61007b31 2571int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 2572{
61007b31 2573 BlockDriver *drv = bs->drv;
498e386c 2574
61007b31
SH
2575 if (!drv)
2576 return -ENOMEDIUM;
2572b37a 2577
61007b31
SH
2578 if (drv->has_variable_length) {
2579 int ret = refresh_total_sectors(bs, bs->total_sectors);
2580 if (ret < 0) {
2581 return ret;
1c9805a3
SH
2582 }
2583 }
61007b31 2584 return bs->total_sectors;
1c9805a3 2585}
b338082b 2586
61007b31
SH
2587/**
2588 * Return length in bytes on success, -errno on error.
2589 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 2590 */
61007b31 2591int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 2592{
61007b31 2593 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 2594
4a9c9ea0 2595 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 2596 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
2597}
2598
61007b31
SH
2599/* return 0 as number of sectors if no device present or error */
2600void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 2601{
61007b31 2602 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 2603
61007b31 2604 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
2605}
2606
61007b31
SH
2607void bdrv_set_on_error(BlockDriverState *bs, BlockdevOnError on_read_error,
2608 BlockdevOnError on_write_error)
fc01f7e7 2609{
61007b31
SH
2610 bs->on_read_error = on_read_error;
2611 bs->on_write_error = on_write_error;
83f64091
FB
2612}
2613
61007b31 2614BlockdevOnError bdrv_get_on_error(BlockDriverState *bs, bool is_read)
4105eaaa 2615{
61007b31 2616 return is_read ? bs->on_read_error : bs->on_write_error;
8d3b1a2d
KW
2617}
2618
61007b31 2619BlockErrorAction bdrv_get_error_action(BlockDriverState *bs, bool is_read, int error)
d75cbb5e 2620{
61007b31 2621 BlockdevOnError on_err = is_read ? bs->on_read_error : bs->on_write_error;
9ce10c0b 2622
61007b31
SH
2623 switch (on_err) {
2624 case BLOCKDEV_ON_ERROR_ENOSPC:
2625 return (error == ENOSPC) ?
2626 BLOCK_ERROR_ACTION_STOP : BLOCK_ERROR_ACTION_REPORT;
2627 case BLOCKDEV_ON_ERROR_STOP:
2628 return BLOCK_ERROR_ACTION_STOP;
2629 case BLOCKDEV_ON_ERROR_REPORT:
2630 return BLOCK_ERROR_ACTION_REPORT;
2631 case BLOCKDEV_ON_ERROR_IGNORE:
2632 return BLOCK_ERROR_ACTION_IGNORE;
2633 default:
2634 abort();
d75cbb5e
PL
2635 }
2636}
2637
61007b31
SH
2638static void send_qmp_error_event(BlockDriverState *bs,
2639 BlockErrorAction action,
2640 bool is_read, int error)
83f64091 2641{
61007b31 2642 IoOperationType optype;
a3ef6571 2643
61007b31
SH
2644 optype = is_read ? IO_OPERATION_TYPE_READ : IO_OPERATION_TYPE_WRITE;
2645 qapi_event_send_block_io_error(bdrv_get_device_name(bs), optype, action,
2646 bdrv_iostatus_is_enabled(bs),
2647 error == ENOSPC, strerror(error),
2648 &error_abort);
83f64091
FB
2649}
2650
61007b31
SH
2651/* This is done by device models because, while the block layer knows
2652 * about the error, it does not know whether an operation comes from
2653 * the device or the block layer (from a job, for example).
2654 */
2655void bdrv_error_action(BlockDriverState *bs, BlockErrorAction action,
2656 bool is_read, int error)
83f64091 2657{
61007b31 2658 assert(error >= 0);
83f64091 2659
61007b31
SH
2660 if (action == BLOCK_ERROR_ACTION_STOP) {
2661 /* First set the iostatus, so that "info block" returns an iostatus
2662 * that matches the events raised so far (an additional error iostatus
2663 * is fine, but not a lost one).
2664 */
2665 bdrv_iostatus_set_err(bs, error);
83f64091 2666
61007b31
SH
2667 /* Then raise the request to stop the VM and the event.
2668 * qemu_system_vmstop_request_prepare has two effects. First,
2669 * it ensures that the STOP event always comes after the
2670 * BLOCK_IO_ERROR event. Second, it ensures that even if management
2671 * can observe the STOP event and do a "cont" before the STOP
2672 * event is issued, the VM will not stop. In this case, vm_start()
2673 * also ensures that the STOP/RESUME pair of events is emitted.
2674 */
2675 qemu_system_vmstop_request_prepare();
2676 send_qmp_error_event(bs, action, is_read, error);
2677 qemu_system_vmstop_request(RUN_STATE_IO_ERROR);
2678 } else {
2679 send_qmp_error_event(bs, action, is_read, error);
2680 }
8d3b1a2d
KW
2681}
2682
61007b31 2683int bdrv_is_read_only(BlockDriverState *bs)
8d3b1a2d 2684{
61007b31 2685 return bs->read_only;
83f64091 2686}
83f64091 2687
61007b31 2688int bdrv_is_sg(BlockDriverState *bs)
f08145fe 2689{
61007b31 2690 return bs->sg;
f08145fe
KW
2691}
2692
61007b31 2693int bdrv_enable_write_cache(BlockDriverState *bs)
ab185921 2694{
61007b31 2695 return bs->enable_write_cache;
ab185921
SH
2696}
2697
61007b31 2698void bdrv_set_enable_write_cache(BlockDriverState *bs, bool wce)
da1fa91d 2699{
61007b31 2700 bs->enable_write_cache = wce;
ab185921 2701
61007b31
SH
2702 /* so a reopen() will preserve wce */
2703 if (wce) {
2704 bs->open_flags |= BDRV_O_CACHE_WB;
893a8f62 2705 } else {
61007b31 2706 bs->open_flags &= ~BDRV_O_CACHE_WB;
893a8f62 2707 }
da1fa91d
KW
2708}
2709
61007b31 2710int bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 2711{
61007b31
SH
2712 if (bs->backing_hd && bs->backing_hd->encrypted)
2713 return 1;
2714 return bs->encrypted;
fc3959e4
FZ
2715}
2716
61007b31 2717int bdrv_key_required(BlockDriverState *bs)
fc3959e4 2718{
61007b31
SH
2719 BlockDriverState *backing_hd = bs->backing_hd;
2720
2721 if (backing_hd && backing_hd->encrypted && !backing_hd->valid_key)
2722 return 1;
2723 return (bs->encrypted && !bs->valid_key);
fc3959e4
FZ
2724}
2725
61007b31 2726int bdrv_set_key(BlockDriverState *bs, const char *key)
d0c7f642 2727{
d0c7f642 2728 int ret;
61007b31
SH
2729 if (bs->backing_hd && bs->backing_hd->encrypted) {
2730 ret = bdrv_set_key(bs->backing_hd, key);
2731 if (ret < 0)
2732 return ret;
2733 if (!bs->encrypted)
2734 return 0;
2735 }
2736 if (!bs->encrypted) {
2737 return -EINVAL;
2738 } else if (!bs->drv || !bs->drv->bdrv_set_key) {
d0c7f642
KW
2739 return -ENOMEDIUM;
2740 }
61007b31 2741 ret = bs->drv->bdrv_set_key(bs, key);
b9c64947 2742 if (ret < 0) {
61007b31
SH
2743 bs->valid_key = 0;
2744 } else if (!bs->valid_key) {
2745 bs->valid_key = 1;
2746 if (bs->blk) {
2747 /* call the change callback now, we skipped it on open */
2748 blk_dev_change_media_cb(bs->blk, true);
2749 }
1b0288ae 2750 }
61007b31
SH
2751 return ret;
2752}
f08f2dda 2753
c5fbe571 2754/*
61007b31
SH
2755 * Provide an encryption key for @bs.
2756 * If @key is non-null:
2757 * If @bs is not encrypted, fail.
2758 * Else if the key is invalid, fail.
2759 * Else set @bs's key to @key, replacing the existing key, if any.
2760 * If @key is null:
2761 * If @bs is encrypted and still lacks a key, fail.
2762 * Else do nothing.
2763 * On failure, store an error object through @errp if non-null.
c5fbe571 2764 */
61007b31 2765void bdrv_add_key(BlockDriverState *bs, const char *key, Error **errp)
c5fbe571 2766{
61007b31
SH
2767 if (key) {
2768 if (!bdrv_is_encrypted(bs)) {
2769 error_setg(errp, "Node '%s' is not encrypted",
2770 bdrv_get_device_or_node_name(bs));
2771 } else if (bdrv_set_key(bs, key) < 0) {
c6bd8c70 2772 error_setg(errp, QERR_INVALID_PASSWORD);
4d2855a3
MA
2773 }
2774 } else {
2775 if (bdrv_key_required(bs)) {
b1ca6391
MA
2776 error_set(errp, ERROR_CLASS_DEVICE_ENCRYPTED,
2777 "'%s' (%s) is encrypted",
81e5f78a 2778 bdrv_get_device_or_node_name(bs),
4d2855a3
MA
2779 bdrv_get_encrypted_filename(bs));
2780 }
2781 }
2782}
2783
61007b31 2784const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 2785{
61007b31 2786 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
2787}
2788
61007b31 2789static int qsort_strcmp(const void *a, const void *b)
40b4f539 2790{
61007b31 2791 return strcmp(a, b);
40b4f539
KW
2792}
2793
61007b31
SH
2794void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
2795 void *opaque)
40b4f539 2796{
61007b31
SH
2797 BlockDriver *drv;
2798 int count = 0;
2799 int i;
2800 const char **formats = NULL;
40b4f539 2801
61007b31
SH
2802 QLIST_FOREACH(drv, &bdrv_drivers, list) {
2803 if (drv->format_name) {
2804 bool found = false;
2805 int i = count;
2806 while (formats && i && !found) {
2807 found = !strcmp(formats[--i], drv->format_name);
2808 }
e2a305fb 2809
61007b31
SH
2810 if (!found) {
2811 formats = g_renew(const char *, formats, count + 1);
2812 formats[count++] = drv->format_name;
2813 }
6c5a42ac 2814 }
61007b31 2815 }
6c5a42ac 2816
61007b31 2817 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 2818
61007b31
SH
2819 for (i = 0; i < count; i++) {
2820 it(opaque, formats[i]);
2821 }
40b4f539 2822
61007b31
SH
2823 g_free(formats);
2824}
40b4f539 2825
61007b31
SH
2826/* This function is to find a node in the bs graph */
2827BlockDriverState *bdrv_find_node(const char *node_name)
2828{
2829 BlockDriverState *bs;
391827eb 2830
61007b31 2831 assert(node_name);
40b4f539 2832
61007b31
SH
2833 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2834 if (!strcmp(node_name, bs->node_name)) {
2835 return bs;
40b4f539
KW
2836 }
2837 }
61007b31 2838 return NULL;
40b4f539
KW
2839}
2840
61007b31
SH
2841/* Put this QMP function here so it can access the static graph_bdrv_states. */
2842BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 2843{
61007b31
SH
2844 BlockDeviceInfoList *list, *entry;
2845 BlockDriverState *bs;
40b4f539 2846
61007b31
SH
2847 list = NULL;
2848 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2849 BlockDeviceInfo *info = bdrv_block_device_info(bs, errp);
2850 if (!info) {
2851 qapi_free_BlockDeviceInfoList(list);
2852 return NULL;
301db7c2 2853 }
61007b31
SH
2854 entry = g_malloc0(sizeof(*entry));
2855 entry->value = info;
2856 entry->next = list;
2857 list = entry;
301db7c2
RH
2858 }
2859
61007b31
SH
2860 return list;
2861}
40b4f539 2862
61007b31
SH
2863BlockDriverState *bdrv_lookup_bs(const char *device,
2864 const char *node_name,
2865 Error **errp)
2866{
2867 BlockBackend *blk;
2868 BlockDriverState *bs;
40b4f539 2869
61007b31
SH
2870 if (device) {
2871 blk = blk_by_name(device);
40b4f539 2872
61007b31
SH
2873 if (blk) {
2874 return blk_bs(blk);
2875 }
2876 }
40b4f539 2877
61007b31
SH
2878 if (node_name) {
2879 bs = bdrv_find_node(node_name);
6d519a5f 2880
61007b31
SH
2881 if (bs) {
2882 return bs;
2883 }
40b4f539
KW
2884 }
2885
61007b31
SH
2886 error_setg(errp, "Cannot find device=%s nor node_name=%s",
2887 device ? device : "",
2888 node_name ? node_name : "");
2889 return NULL;
40b4f539
KW
2890}
2891
61007b31
SH
2892/* If 'base' is in the same chain as 'top', return true. Otherwise,
2893 * return false. If either argument is NULL, return false. */
2894bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 2895{
61007b31
SH
2896 while (top && top != base) {
2897 top = top->backing_hd;
02c50efe 2898 }
61007b31
SH
2899
2900 return top != NULL;
02c50efe
FZ
2901}
2902
61007b31 2903BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 2904{
61007b31
SH
2905 if (!bs) {
2906 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 2907 }
61007b31 2908 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
2909}
2910
61007b31 2911BlockDriverState *bdrv_next(BlockDriverState *bs)
83f64091 2912{
61007b31
SH
2913 if (!bs) {
2914 return QTAILQ_FIRST(&bdrv_states);
857d4f46 2915 }
61007b31 2916 return QTAILQ_NEXT(bs, device_list);
83f64091 2917}
beac80cd 2918
61007b31 2919const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 2920{
61007b31 2921 return bs->node_name;
beac80cd
FB
2922}
2923
61007b31
SH
2924/* TODO check what callers really want: bs->node_name or blk_name() */
2925const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 2926{
61007b31 2927 return bs->blk ? blk_name(bs->blk) : "";
f141eafe 2928}
83f64091 2929
61007b31
SH
2930/* This can be used to identify nodes that might not have a device
2931 * name associated. Since node and device names live in the same
2932 * namespace, the result is unambiguous. The exception is if both are
2933 * absent, then this returns an empty (non-null) string. */
2934const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 2935{
61007b31 2936 return bs->blk ? blk_name(bs->blk) : bs->node_name;
beac80cd 2937}
beac80cd 2938
61007b31 2939int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 2940{
61007b31 2941 return bs->open_flags;
0b5a2445
PB
2942}
2943
61007b31 2944int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 2945{
61007b31 2946 return 1;
0b5a2445
PB
2947}
2948
61007b31 2949int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 2950{
61007b31 2951 assert(bs->drv);
0b5a2445 2952
61007b31
SH
2953 /* If BS is a copy on write image, it is initialized to
2954 the contents of the base image, which may not be zeroes. */
2955 if (bs->backing_hd) {
2956 return 0;
2957 }
2958 if (bs->drv->bdrv_has_zero_init) {
2959 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 2960 }
61007b31
SH
2961
2962 /* safe default */
2963 return 0;
68485420
KW
2964}
2965
61007b31 2966bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 2967{
61007b31 2968 BlockDriverInfo bdi;
b2a61371 2969
61007b31
SH
2970 if (bs->backing_hd) {
2971 return false;
2972 }
2973
2974 if (bdrv_get_info(bs, &bdi) == 0) {
2975 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
2976 }
2977
61007b31 2978 return false;
b2a61371
SH
2979}
2980
61007b31 2981bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 2982{
61007b31 2983 BlockDriverInfo bdi;
68485420 2984
61007b31
SH
2985 if (bs->backing_hd || !(bs->open_flags & BDRV_O_UNMAP)) {
2986 return false;
2987 }
68485420 2988
61007b31
SH
2989 if (bdrv_get_info(bs, &bdi) == 0) {
2990 return bdi.can_write_zeroes_with_unmap;
2991 }
68485420 2992
61007b31 2993 return false;
68485420
KW
2994}
2995
61007b31 2996const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 2997{
61007b31
SH
2998 if (bs->backing_hd && bs->backing_hd->encrypted)
2999 return bs->backing_file;
3000 else if (bs->encrypted)
3001 return bs->filename;
3002 else
3003 return NULL;
b2e12bc6
CH
3004}
3005
61007b31
SH
3006void bdrv_get_backing_filename(BlockDriverState *bs,
3007 char *filename, int filename_size)
016f5cf6 3008{
61007b31
SH
3009 pstrcpy(filename, filename_size, bs->backing_file);
3010}
d318aea9 3011
61007b31
SH
3012int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
3013{
3014 BlockDriver *drv = bs->drv;
3015 if (!drv)
3016 return -ENOMEDIUM;
3017 if (!drv->bdrv_get_info)
3018 return -ENOTSUP;
3019 memset(bdi, 0, sizeof(*bdi));
3020 return drv->bdrv_get_info(bs, bdi);
3021}
016f5cf6 3022
61007b31
SH
3023ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
3024{
3025 BlockDriver *drv = bs->drv;
3026 if (drv && drv->bdrv_get_specific_info) {
3027 return drv->bdrv_get_specific_info(bs);
3028 }
3029 return NULL;
016f5cf6
AG
3030}
3031
61007b31 3032void bdrv_debug_event(BlockDriverState *bs, BlkDebugEvent event)
4265d620 3033{
61007b31
SH
3034 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
3035 return;
3036 }
4265d620 3037
61007b31 3038 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
3039}
3040
61007b31
SH
3041int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
3042 const char *tag)
4265d620 3043{
61007b31
SH
3044 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
3045 bs = bs->file;
3046 }
4265d620 3047
61007b31
SH
3048 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
3049 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
3050 }
4265d620 3051
61007b31 3052 return -ENOTSUP;
4265d620
PB
3053}
3054
61007b31 3055int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 3056{
61007b31
SH
3057 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
3058 bs = bs->file;
3059 }
ce1a14dc 3060
61007b31
SH
3061 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
3062 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
3063 }
3064
3065 return -ENOTSUP;
eb852011
MA
3066}
3067
61007b31 3068int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 3069{
61007b31
SH
3070 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
3071 bs = bs->file;
3072 }
ce1a14dc 3073
61007b31
SH
3074 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
3075 return bs->drv->bdrv_debug_resume(bs, tag);
3076 }
ce1a14dc 3077
61007b31 3078 return -ENOTSUP;
f197fe2b
FZ
3079}
3080
61007b31 3081bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 3082{
61007b31
SH
3083 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
3084 bs = bs->file;
f197fe2b 3085 }
19cb3738 3086
61007b31
SH
3087 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
3088 return bs->drv->bdrv_debug_is_suspended(bs, tag);
3089 }
f9f05dc5 3090
61007b31
SH
3091 return false;
3092}
f9f05dc5 3093
61007b31 3094int bdrv_is_snapshot(BlockDriverState *bs)
f9f05dc5 3095{
61007b31 3096 return !!(bs->open_flags & BDRV_O_SNAPSHOT);
f9f05dc5
KW
3097}
3098
61007b31
SH
3099/* backing_file can either be relative, or absolute, or a protocol. If it is
3100 * relative, it must be relative to the chain. So, passing in bs->filename
3101 * from a BDS as backing_file should not be done, as that may be relative to
3102 * the CWD rather than the chain. */
3103BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
3104 const char *backing_file)
f9f05dc5 3105{
61007b31
SH
3106 char *filename_full = NULL;
3107 char *backing_file_full = NULL;
3108 char *filename_tmp = NULL;
3109 int is_protocol = 0;
3110 BlockDriverState *curr_bs = NULL;
3111 BlockDriverState *retval = NULL;
f9f05dc5 3112
61007b31
SH
3113 if (!bs || !bs->drv || !backing_file) {
3114 return NULL;
f9f05dc5
KW
3115 }
3116
61007b31
SH
3117 filename_full = g_malloc(PATH_MAX);
3118 backing_file_full = g_malloc(PATH_MAX);
3119 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 3120
61007b31 3121 is_protocol = path_has_protocol(backing_file);
f9f05dc5 3122
61007b31 3123 for (curr_bs = bs; curr_bs->backing_hd; curr_bs = curr_bs->backing_hd) {
f9f05dc5 3124
61007b31
SH
3125 /* If either of the filename paths is actually a protocol, then
3126 * compare unmodified paths; otherwise make paths relative */
3127 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
3128 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
3129 retval = curr_bs->backing_hd;
3130 break;
3131 }
3132 } else {
3133 /* If not an absolute filename path, make it relative to the current
3134 * image's filename path */
3135 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3136 backing_file);
f9f05dc5 3137
61007b31
SH
3138 /* We are going to compare absolute pathnames */
3139 if (!realpath(filename_tmp, filename_full)) {
3140 continue;
3141 }
07f07615 3142
61007b31
SH
3143 /* We need to make sure the backing filename we are comparing against
3144 * is relative to the current image filename (or absolute) */
3145 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3146 curr_bs->backing_file);
07f07615 3147
61007b31
SH
3148 if (!realpath(filename_tmp, backing_file_full)) {
3149 continue;
3150 }
eb489bb1 3151
61007b31
SH
3152 if (strcmp(backing_file_full, filename_full) == 0) {
3153 retval = curr_bs->backing_hd;
3154 break;
3155 }
3156 }
eb489bb1
KW
3157 }
3158
61007b31
SH
3159 g_free(filename_full);
3160 g_free(backing_file_full);
3161 g_free(filename_tmp);
3162 return retval;
3163}
3164
3165int bdrv_get_backing_file_depth(BlockDriverState *bs)
3166{
3167 if (!bs->drv) {
3168 return 0;
eb489bb1
KW
3169 }
3170
61007b31
SH
3171 if (!bs->backing_hd) {
3172 return 0;
ca716364
KW
3173 }
3174
61007b31
SH
3175 return 1 + bdrv_get_backing_file_depth(bs->backing_hd);
3176}
07f07615 3177
61007b31
SH
3178void bdrv_init(void)
3179{
3180 module_call_init(MODULE_INIT_BLOCK);
3181}
29cdb251 3182
61007b31
SH
3183void bdrv_init_with_whitelist(void)
3184{
3185 use_bdrv_whitelist = 1;
3186 bdrv_init();
07f07615
PB
3187}
3188
5a8a30db 3189void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 3190{
5a8a30db
KW
3191 Error *local_err = NULL;
3192 int ret;
3193
3456a8d1
KW
3194 if (!bs->drv) {
3195 return;
3196 }
3197
7ea2d269
AK
3198 if (!(bs->open_flags & BDRV_O_INCOMING)) {
3199 return;
3200 }
3201 bs->open_flags &= ~BDRV_O_INCOMING;
3202
3456a8d1 3203 if (bs->drv->bdrv_invalidate_cache) {
5a8a30db 3204 bs->drv->bdrv_invalidate_cache(bs, &local_err);
3456a8d1 3205 } else if (bs->file) {
5a8a30db
KW
3206 bdrv_invalidate_cache(bs->file, &local_err);
3207 }
3208 if (local_err) {
3209 error_propagate(errp, local_err);
3210 return;
0f15423c 3211 }
3456a8d1 3212
5a8a30db
KW
3213 ret = refresh_total_sectors(bs, bs->total_sectors);
3214 if (ret < 0) {
3215 error_setg_errno(errp, -ret, "Could not refresh total sector count");
3216 return;
3217 }
0f15423c
AL
3218}
3219
5a8a30db 3220void bdrv_invalidate_cache_all(Error **errp)
0f15423c
AL
3221{
3222 BlockDriverState *bs;
5a8a30db 3223 Error *local_err = NULL;
0f15423c 3224
dc364f4c 3225 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
3226 AioContext *aio_context = bdrv_get_aio_context(bs);
3227
3228 aio_context_acquire(aio_context);
5a8a30db 3229 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 3230 aio_context_release(aio_context);
5a8a30db
KW
3231 if (local_err) {
3232 error_propagate(errp, local_err);
3233 return;
3234 }
0f15423c
AL
3235 }
3236}
3237
19cb3738
FB
3238/**************************************************************/
3239/* removable device support */
3240
3241/**
3242 * Return TRUE if the media is present
3243 */
3244int bdrv_is_inserted(BlockDriverState *bs)
3245{
3246 BlockDriver *drv = bs->drv;
a1aff5bf 3247
19cb3738
FB
3248 if (!drv)
3249 return 0;
3250 if (!drv->bdrv_is_inserted)
a1aff5bf
MA
3251 return 1;
3252 return drv->bdrv_is_inserted(bs);
19cb3738
FB
3253}
3254
3255/**
8e49ca46
MA
3256 * Return whether the media changed since the last call to this
3257 * function, or -ENOTSUP if we don't know. Most drivers don't know.
19cb3738
FB
3258 */
3259int bdrv_media_changed(BlockDriverState *bs)
3260{
3261 BlockDriver *drv = bs->drv;
19cb3738 3262
8e49ca46
MA
3263 if (drv && drv->bdrv_media_changed) {
3264 return drv->bdrv_media_changed(bs);
3265 }
3266 return -ENOTSUP;
19cb3738
FB
3267}
3268
3269/**
3270 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
3271 */
f36f3949 3272void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
3273{
3274 BlockDriver *drv = bs->drv;
bfb197e0 3275 const char *device_name;
19cb3738 3276
822e1cd1
MA
3277 if (drv && drv->bdrv_eject) {
3278 drv->bdrv_eject(bs, eject_flag);
19cb3738 3279 }
6f382ed2 3280
bfb197e0
MA
3281 device_name = bdrv_get_device_name(bs);
3282 if (device_name[0] != '\0') {
3283 qapi_event_send_device_tray_moved(device_name,
a5ee7bd4 3284 eject_flag, &error_abort);
6f382ed2 3285 }
19cb3738
FB
3286}
3287
19cb3738
FB
3288/**
3289 * Lock or unlock the media (if it is locked, the user won't be able
3290 * to eject it manually).
3291 */
025e849a 3292void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
3293{
3294 BlockDriver *drv = bs->drv;
3295
025e849a 3296 trace_bdrv_lock_medium(bs, locked);
b8c6d095 3297
025e849a
MA
3298 if (drv && drv->bdrv_lock_medium) {
3299 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
3300 }
3301}
985a03b0 3302
1b7fd729 3303void bdrv_set_guest_block_size(BlockDriverState *bs, int align)
7b6f9300 3304{
1b7fd729 3305 bs->guest_block_size = align;
7b6f9300 3306}
7cd1e32a 3307
0db6e54a
FZ
3308BdrvDirtyBitmap *bdrv_find_dirty_bitmap(BlockDriverState *bs, const char *name)
3309{
3310 BdrvDirtyBitmap *bm;
3311
3312 assert(name);
3313 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
3314 if (bm->name && !strcmp(name, bm->name)) {
3315 return bm;
3316 }
3317 }
3318 return NULL;
3319}
3320
20dca810 3321void bdrv_dirty_bitmap_make_anon(BdrvDirtyBitmap *bitmap)
0db6e54a 3322{
9bd2b08f 3323 assert(!bdrv_dirty_bitmap_frozen(bitmap));
0db6e54a
FZ
3324 g_free(bitmap->name);
3325 bitmap->name = NULL;
3326}
3327
3328BdrvDirtyBitmap *bdrv_create_dirty_bitmap(BlockDriverState *bs,
5fba6c0e 3329 uint32_t granularity,
0db6e54a 3330 const char *name,
b8afb520 3331 Error **errp)
7cd1e32a
LS
3332{
3333 int64_t bitmap_size;
e4654d2d 3334 BdrvDirtyBitmap *bitmap;
5fba6c0e 3335 uint32_t sector_granularity;
a55eb92c 3336
50717e94
PB
3337 assert((granularity & (granularity - 1)) == 0);
3338
0db6e54a
FZ
3339 if (name && bdrv_find_dirty_bitmap(bs, name)) {
3340 error_setg(errp, "Bitmap already exists: %s", name);
3341 return NULL;
3342 }
5fba6c0e
JS
3343 sector_granularity = granularity >> BDRV_SECTOR_BITS;
3344 assert(sector_granularity);
57322b78 3345 bitmap_size = bdrv_nb_sectors(bs);
b8afb520
FZ
3346 if (bitmap_size < 0) {
3347 error_setg_errno(errp, -bitmap_size, "could not get length of device");
3348 errno = -bitmap_size;
3349 return NULL;
3350 }
5839e53b 3351 bitmap = g_new0(BdrvDirtyBitmap, 1);
5fba6c0e 3352 bitmap->bitmap = hbitmap_alloc(bitmap_size, ctz32(sector_granularity));
e74e6b78 3353 bitmap->size = bitmap_size;
0db6e54a 3354 bitmap->name = g_strdup(name);
b8e6fb75 3355 bitmap->disabled = false;
e4654d2d
FZ
3356 QLIST_INSERT_HEAD(&bs->dirty_bitmaps, bitmap, list);
3357 return bitmap;
3358}
3359
9bd2b08f
JS
3360bool bdrv_dirty_bitmap_frozen(BdrvDirtyBitmap *bitmap)
3361{
3362 return bitmap->successor;
3363}
3364
b8e6fb75
JS
3365bool bdrv_dirty_bitmap_enabled(BdrvDirtyBitmap *bitmap)
3366{
9bd2b08f
JS
3367 return !(bitmap->disabled || bitmap->successor);
3368}
3369
9abe3bdc
JS
3370DirtyBitmapStatus bdrv_dirty_bitmap_status(BdrvDirtyBitmap *bitmap)
3371{
3372 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3373 return DIRTY_BITMAP_STATUS_FROZEN;
3374 } else if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3375 return DIRTY_BITMAP_STATUS_DISABLED;
3376 } else {
3377 return DIRTY_BITMAP_STATUS_ACTIVE;
3378 }
3379}
3380
9bd2b08f
JS
3381/**
3382 * Create a successor bitmap destined to replace this bitmap after an operation.
3383 * Requires that the bitmap is not frozen and has no successor.
3384 */
3385int bdrv_dirty_bitmap_create_successor(BlockDriverState *bs,
3386 BdrvDirtyBitmap *bitmap, Error **errp)
3387{
3388 uint64_t granularity;
3389 BdrvDirtyBitmap *child;
3390
3391 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3392 error_setg(errp, "Cannot create a successor for a bitmap that is "
3393 "currently frozen");
3394 return -1;
3395 }
3396 assert(!bitmap->successor);
3397
3398 /* Create an anonymous successor */
3399 granularity = bdrv_dirty_bitmap_granularity(bitmap);
3400 child = bdrv_create_dirty_bitmap(bs, granularity, NULL, errp);
3401 if (!child) {
3402 return -1;
3403 }
3404
3405 /* Successor will be on or off based on our current state. */
3406 child->disabled = bitmap->disabled;
3407
3408 /* Install the successor and freeze the parent */
3409 bitmap->successor = child;
3410 return 0;
3411}
3412
3413/**
3414 * For a bitmap with a successor, yield our name to the successor,
3415 * delete the old bitmap, and return a handle to the new bitmap.
3416 */
3417BdrvDirtyBitmap *bdrv_dirty_bitmap_abdicate(BlockDriverState *bs,
3418 BdrvDirtyBitmap *bitmap,
3419 Error **errp)
3420{
3421 char *name;
3422 BdrvDirtyBitmap *successor = bitmap->successor;
3423
3424 if (successor == NULL) {
3425 error_setg(errp, "Cannot relinquish control if "
3426 "there's no successor present");
3427 return NULL;
3428 }
3429
3430 name = bitmap->name;
3431 bitmap->name = NULL;
3432 successor->name = name;
3433 bitmap->successor = NULL;
3434 bdrv_release_dirty_bitmap(bs, bitmap);
3435
3436 return successor;
3437}
3438
3439/**
3440 * In cases of failure where we can no longer safely delete the parent,
3441 * we may wish to re-join the parent and child/successor.
3442 * The merged parent will be un-frozen, but not explicitly re-enabled.
3443 */
3444BdrvDirtyBitmap *bdrv_reclaim_dirty_bitmap(BlockDriverState *bs,
3445 BdrvDirtyBitmap *parent,
3446 Error **errp)
3447{
3448 BdrvDirtyBitmap *successor = parent->successor;
3449
3450 if (!successor) {
3451 error_setg(errp, "Cannot reclaim a successor when none is present");
3452 return NULL;
3453 }
3454
3455 if (!hbitmap_merge(parent->bitmap, successor->bitmap)) {
3456 error_setg(errp, "Merging of parent and successor bitmap failed");
3457 return NULL;
3458 }
3459 bdrv_release_dirty_bitmap(bs, successor);
3460 parent->successor = NULL;
3461
3462 return parent;
b8e6fb75
JS
3463}
3464
ce1ffea8
JS
3465/**
3466 * Truncates _all_ bitmaps attached to a BDS.
3467 */
3468static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs)
3469{
3470 BdrvDirtyBitmap *bitmap;
3471 uint64_t size = bdrv_nb_sectors(bs);
3472
3473 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
06207b0f 3474 assert(!bdrv_dirty_bitmap_frozen(bitmap));
ce1ffea8 3475 hbitmap_truncate(bitmap->bitmap, size);
5270b6a0 3476 bitmap->size = size;
ce1ffea8
JS
3477 }
3478}
3479
e4654d2d
FZ
3480void bdrv_release_dirty_bitmap(BlockDriverState *bs, BdrvDirtyBitmap *bitmap)
3481{
3482 BdrvDirtyBitmap *bm, *next;
3483 QLIST_FOREACH_SAFE(bm, &bs->dirty_bitmaps, list, next) {
3484 if (bm == bitmap) {
9bd2b08f 3485 assert(!bdrv_dirty_bitmap_frozen(bm));
e4654d2d
FZ
3486 QLIST_REMOVE(bitmap, list);
3487 hbitmap_free(bitmap->bitmap);
0db6e54a 3488 g_free(bitmap->name);
e4654d2d
FZ
3489 g_free(bitmap);
3490 return;
a55eb92c 3491 }
7cd1e32a
LS
3492 }
3493}
3494
b8e6fb75
JS
3495void bdrv_disable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3496{
9bd2b08f 3497 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3498 bitmap->disabled = true;
3499}
3500
3501void bdrv_enable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3502{
9bd2b08f 3503 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3504 bitmap->disabled = false;
3505}
3506
21b56835
FZ
3507BlockDirtyInfoList *bdrv_query_dirty_bitmaps(BlockDriverState *bs)
3508{
3509 BdrvDirtyBitmap *bm;
3510 BlockDirtyInfoList *list = NULL;
3511 BlockDirtyInfoList **plist = &list;
3512
3513 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
5839e53b
MA
3514 BlockDirtyInfo *info = g_new0(BlockDirtyInfo, 1);
3515 BlockDirtyInfoList *entry = g_new0(BlockDirtyInfoList, 1);
20dca810 3516 info->count = bdrv_get_dirty_count(bm);
592fdd02 3517 info->granularity = bdrv_dirty_bitmap_granularity(bm);
0db6e54a
FZ
3518 info->has_name = !!bm->name;
3519 info->name = g_strdup(bm->name);
9abe3bdc 3520 info->status = bdrv_dirty_bitmap_status(bm);
21b56835
FZ
3521 entry->value = info;
3522 *plist = entry;
3523 plist = &entry->next;
3524 }
3525
3526 return list;
3527}
3528
e4654d2d 3529int bdrv_get_dirty(BlockDriverState *bs, BdrvDirtyBitmap *bitmap, int64_t sector)
7cd1e32a 3530{
e4654d2d
FZ
3531 if (bitmap) {
3532 return hbitmap_get(bitmap->bitmap, sector);
7cd1e32a
LS
3533 } else {
3534 return 0;
3535 }
3536}
3537
341ebc2f
JS
3538/**
3539 * Chooses a default granularity based on the existing cluster size,
3540 * but clamped between [4K, 64K]. Defaults to 64K in the case that there
3541 * is no cluster size information available.
3542 */
3543uint32_t bdrv_get_default_bitmap_granularity(BlockDriverState *bs)
3544{
3545 BlockDriverInfo bdi;
3546 uint32_t granularity;
3547
3548 if (bdrv_get_info(bs, &bdi) >= 0 && bdi.cluster_size > 0) {
3549 granularity = MAX(4096, bdi.cluster_size);
3550 granularity = MIN(65536, granularity);
3551 } else {
3552 granularity = 65536;
3553 }
3554
3555 return granularity;
3556}
3557
592fdd02
JS
3558uint32_t bdrv_dirty_bitmap_granularity(BdrvDirtyBitmap *bitmap)
3559{
3560 return BDRV_SECTOR_SIZE << hbitmap_granularity(bitmap->bitmap);
3561}
3562
20dca810 3563void bdrv_dirty_iter_init(BdrvDirtyBitmap *bitmap, HBitmapIter *hbi)
1755da16 3564{
e4654d2d 3565 hbitmap_iter_init(hbi, bitmap->bitmap, 0);
1755da16
PB
3566}
3567
20dca810 3568void bdrv_set_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3569 int64_t cur_sector, int nr_sectors)
3570{
b8e6fb75 3571 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3572 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3573}
3574
20dca810 3575void bdrv_reset_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3576 int64_t cur_sector, int nr_sectors)
3577{
b8e6fb75 3578 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3579 hbitmap_reset(bitmap->bitmap, cur_sector, nr_sectors);
3580}
3581
e74e6b78
JS
3582void bdrv_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3583{
3584 assert(bdrv_dirty_bitmap_enabled(bitmap));
c6a8c328 3585 hbitmap_reset_all(bitmap->bitmap);
e74e6b78
JS
3586}
3587
e0c47b6c
SH
3588void bdrv_set_dirty(BlockDriverState *bs, int64_t cur_sector,
3589 int nr_sectors)
1755da16 3590{
e4654d2d
FZ
3591 BdrvDirtyBitmap *bitmap;
3592 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
b8e6fb75
JS
3593 if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3594 continue;
3595 }
e4654d2d
FZ
3596 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3597 }
1755da16
PB
3598}
3599
d58d8453
JS
3600/**
3601 * Advance an HBitmapIter to an arbitrary offset.
3602 */
3603void bdrv_set_dirty_iter(HBitmapIter *hbi, int64_t offset)
3604{
3605 assert(hbi->hb);
3606 hbitmap_iter_init(hbi, hbi->hb, offset);
3607}
3608
20dca810 3609int64_t bdrv_get_dirty_count(BdrvDirtyBitmap *bitmap)
aaa0eb75 3610{
e4654d2d 3611 return hbitmap_count(bitmap->bitmap);
aaa0eb75 3612}
f88e1a42 3613
9fcb0251
FZ
3614/* Get a reference to bs */
3615void bdrv_ref(BlockDriverState *bs)
3616{
3617 bs->refcnt++;
3618}
3619
3620/* Release a previously grabbed reference to bs.
3621 * If after releasing, reference count is zero, the BlockDriverState is
3622 * deleted. */
3623void bdrv_unref(BlockDriverState *bs)
3624{
9a4d5ca6
JC
3625 if (!bs) {
3626 return;
3627 }
9fcb0251
FZ
3628 assert(bs->refcnt > 0);
3629 if (--bs->refcnt == 0) {
3630 bdrv_delete(bs);
3631 }
3632}
3633
fbe40ff7
FZ
3634struct BdrvOpBlocker {
3635 Error *reason;
3636 QLIST_ENTRY(BdrvOpBlocker) list;
3637};
3638
3639bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
3640{
3641 BdrvOpBlocker *blocker;
3642 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3643 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
3644 blocker = QLIST_FIRST(&bs->op_blockers[op]);
3645 if (errp) {
81e5f78a
AG
3646 error_setg(errp, "Node '%s' is busy: %s",
3647 bdrv_get_device_or_node_name(bs),
bfb197e0 3648 error_get_pretty(blocker->reason));
fbe40ff7
FZ
3649 }
3650 return true;
3651 }
3652 return false;
3653}
3654
3655void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
3656{
3657 BdrvOpBlocker *blocker;
3658 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3659
5839e53b 3660 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
3661 blocker->reason = reason;
3662 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
3663}
3664
3665void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
3666{
3667 BdrvOpBlocker *blocker, *next;
3668 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3669 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
3670 if (blocker->reason == reason) {
3671 QLIST_REMOVE(blocker, list);
3672 g_free(blocker);
3673 }
3674 }
3675}
3676
3677void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
3678{
3679 int i;
3680 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3681 bdrv_op_block(bs, i, reason);
3682 }
3683}
3684
3685void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
3686{
3687 int i;
3688 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3689 bdrv_op_unblock(bs, i, reason);
3690 }
3691}
3692
3693bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
3694{
3695 int i;
3696
3697 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3698 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
3699 return false;
3700 }
3701 }
3702 return true;
3703}
3704
28a7282a
LC
3705void bdrv_iostatus_enable(BlockDriverState *bs)
3706{
d6bf279e 3707 bs->iostatus_enabled = true;
58e21ef5 3708 bs->iostatus = BLOCK_DEVICE_IO_STATUS_OK;
28a7282a
LC
3709}
3710
3711/* The I/O status is only enabled if the drive explicitly
3712 * enables it _and_ the VM is configured to stop on errors */
3713bool bdrv_iostatus_is_enabled(const BlockDriverState *bs)
3714{
d6bf279e 3715 return (bs->iostatus_enabled &&
92aa5c6d
PB
3716 (bs->on_write_error == BLOCKDEV_ON_ERROR_ENOSPC ||
3717 bs->on_write_error == BLOCKDEV_ON_ERROR_STOP ||
3718 bs->on_read_error == BLOCKDEV_ON_ERROR_STOP));
28a7282a
LC
3719}
3720
3721void bdrv_iostatus_disable(BlockDriverState *bs)
3722{
d6bf279e 3723 bs->iostatus_enabled = false;
28a7282a
LC
3724}
3725
3726void bdrv_iostatus_reset(BlockDriverState *bs)
3727{
3728 if (bdrv_iostatus_is_enabled(bs)) {
58e21ef5 3729 bs->iostatus = BLOCK_DEVICE_IO_STATUS_OK;
3bd293c3
PB
3730 if (bs->job) {
3731 block_job_iostatus_reset(bs->job);
3732 }
28a7282a
LC
3733 }
3734}
3735
28a7282a
LC
3736void bdrv_iostatus_set_err(BlockDriverState *bs, int error)
3737{
3e1caa5f
PB
3738 assert(bdrv_iostatus_is_enabled(bs));
3739 if (bs->iostatus == BLOCK_DEVICE_IO_STATUS_OK) {
58e21ef5
LC
3740 bs->iostatus = error == ENOSPC ? BLOCK_DEVICE_IO_STATUS_NOSPACE :
3741 BLOCK_DEVICE_IO_STATUS_FAILED;
28a7282a
LC
3742 }
3743}
3744
d92ada22
LC
3745void bdrv_img_create(const char *filename, const char *fmt,
3746 const char *base_filename, const char *base_fmt,
f382d43a
MR
3747 char *options, uint64_t img_size, int flags,
3748 Error **errp, bool quiet)
f88e1a42 3749{
83d0521a
CL
3750 QemuOptsList *create_opts = NULL;
3751 QemuOpts *opts = NULL;
3752 const char *backing_fmt, *backing_file;
3753 int64_t size;
f88e1a42 3754 BlockDriver *drv, *proto_drv;
cc84d90f 3755 Error *local_err = NULL;
f88e1a42
JS
3756 int ret = 0;
3757
3758 /* Find driver and parse its options */
3759 drv = bdrv_find_format(fmt);
3760 if (!drv) {
71c79813 3761 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 3762 return;
f88e1a42
JS
3763 }
3764
b65a5e12 3765 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 3766 if (!proto_drv) {
d92ada22 3767 return;
f88e1a42
JS
3768 }
3769
c6149724
HR
3770 if (!drv->create_opts) {
3771 error_setg(errp, "Format driver '%s' does not support image creation",
3772 drv->format_name);
3773 return;
3774 }
3775
3776 if (!proto_drv->create_opts) {
3777 error_setg(errp, "Protocol driver '%s' does not support image creation",
3778 proto_drv->format_name);
3779 return;
3780 }
3781
c282e1fd
CL
3782 create_opts = qemu_opts_append(create_opts, drv->create_opts);
3783 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
3784
3785 /* Create parameter list with default values */
83d0521a 3786 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 3787 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
3788
3789 /* Parse -o options */
3790 if (options) {
dc523cd3
MA
3791 qemu_opts_do_parse(opts, options, NULL, &local_err);
3792 if (local_err) {
3793 error_report_err(local_err);
3794 local_err = NULL;
83d0521a 3795 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
3796 goto out;
3797 }
3798 }
3799
3800 if (base_filename) {
f43e47db 3801 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 3802 if (local_err) {
71c79813
LC
3803 error_setg(errp, "Backing file not supported for file format '%s'",
3804 fmt);
f88e1a42
JS
3805 goto out;
3806 }
3807 }
3808
3809 if (base_fmt) {
f43e47db 3810 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 3811 if (local_err) {
71c79813
LC
3812 error_setg(errp, "Backing file format not supported for file "
3813 "format '%s'", fmt);
f88e1a42
JS
3814 goto out;
3815 }
3816 }
3817
83d0521a
CL
3818 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
3819 if (backing_file) {
3820 if (!strcmp(filename, backing_file)) {
71c79813
LC
3821 error_setg(errp, "Error: Trying to create an image with the "
3822 "same filename as the backing file");
792da93a
JS
3823 goto out;
3824 }
3825 }
3826
83d0521a 3827 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42
JS
3828
3829 // The size for the image must always be specified, with one exception:
3830 // If we are using a backing file, we can obtain the size from there
83d0521a
CL
3831 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
3832 if (size == -1) {
3833 if (backing_file) {
66f6b814 3834 BlockDriverState *bs;
29168018 3835 char *full_backing = g_new0(char, PATH_MAX);
52bf1e72 3836 int64_t size;
63090dac 3837 int back_flags;
e6641719 3838 QDict *backing_options = NULL;
63090dac 3839
29168018
HR
3840 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
3841 full_backing, PATH_MAX,
3842 &local_err);
3843 if (local_err) {
3844 g_free(full_backing);
3845 goto out;
3846 }
3847
63090dac
PB
3848 /* backing files always opened read-only */
3849 back_flags =
3850 flags & ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 3851
e6641719
HR
3852 if (backing_fmt) {
3853 backing_options = qdict_new();
3854 qdict_put(backing_options, "driver",
3855 qstring_from_str(backing_fmt));
3856 }
3857
f67503e5 3858 bs = NULL;
e6641719 3859 ret = bdrv_open(&bs, full_backing, NULL, backing_options,
6ebf9aa2 3860 back_flags, &local_err);
29168018 3861 g_free(full_backing);
f88e1a42 3862 if (ret < 0) {
f88e1a42
JS
3863 goto out;
3864 }
52bf1e72
MA
3865 size = bdrv_getlength(bs);
3866 if (size < 0) {
3867 error_setg_errno(errp, -size, "Could not get size of '%s'",
3868 backing_file);
3869 bdrv_unref(bs);
3870 goto out;
3871 }
f88e1a42 3872
39101f25 3873 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
66f6b814
HR
3874
3875 bdrv_unref(bs);
f88e1a42 3876 } else {
71c79813 3877 error_setg(errp, "Image creation needs a size parameter");
f88e1a42
JS
3878 goto out;
3879 }
3880 }
3881
f382d43a 3882 if (!quiet) {
fe646693 3883 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 3884 qemu_opts_print(opts, " ");
f382d43a
MR
3885 puts("");
3886 }
83d0521a 3887
c282e1fd 3888 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 3889
cc84d90f
HR
3890 if (ret == -EFBIG) {
3891 /* This is generally a better message than whatever the driver would
3892 * deliver (especially because of the cluster_size_hint), since that
3893 * is most probably not much different from "image too large". */
3894 const char *cluster_size_hint = "";
83d0521a 3895 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 3896 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 3897 }
cc84d90f
HR
3898 error_setg(errp, "The image size is too large for file format '%s'"
3899 "%s", fmt, cluster_size_hint);
3900 error_free(local_err);
3901 local_err = NULL;
f88e1a42
JS
3902 }
3903
3904out:
83d0521a
CL
3905 qemu_opts_del(opts);
3906 qemu_opts_free(create_opts);
84d18f06 3907 if (local_err) {
cc84d90f
HR
3908 error_propagate(errp, local_err);
3909 }
f88e1a42 3910}
85d126f3
SH
3911
3912AioContext *bdrv_get_aio_context(BlockDriverState *bs)
3913{
dcd04228
SH
3914 return bs->aio_context;
3915}
3916
3917void bdrv_detach_aio_context(BlockDriverState *bs)
3918{
33384421
HR
3919 BdrvAioNotifier *baf;
3920
dcd04228
SH
3921 if (!bs->drv) {
3922 return;
3923 }
3924
33384421
HR
3925 QLIST_FOREACH(baf, &bs->aio_notifiers, list) {
3926 baf->detach_aio_context(baf->opaque);
3927 }
3928
13af91eb 3929 if (bs->io_limits_enabled) {
0e5b0a2d 3930 throttle_timers_detach_aio_context(&bs->throttle_timers);
13af91eb 3931 }
dcd04228
SH
3932 if (bs->drv->bdrv_detach_aio_context) {
3933 bs->drv->bdrv_detach_aio_context(bs);
3934 }
3935 if (bs->file) {
3936 bdrv_detach_aio_context(bs->file);
3937 }
3938 if (bs->backing_hd) {
3939 bdrv_detach_aio_context(bs->backing_hd);
3940 }
3941
3942 bs->aio_context = NULL;
3943}
3944
3945void bdrv_attach_aio_context(BlockDriverState *bs,
3946 AioContext *new_context)
3947{
33384421
HR
3948 BdrvAioNotifier *ban;
3949
dcd04228
SH
3950 if (!bs->drv) {
3951 return;
3952 }
3953
3954 bs->aio_context = new_context;
3955
3956 if (bs->backing_hd) {
3957 bdrv_attach_aio_context(bs->backing_hd, new_context);
3958 }
3959 if (bs->file) {
3960 bdrv_attach_aio_context(bs->file, new_context);
3961 }
3962 if (bs->drv->bdrv_attach_aio_context) {
3963 bs->drv->bdrv_attach_aio_context(bs, new_context);
3964 }
13af91eb 3965 if (bs->io_limits_enabled) {
0e5b0a2d 3966 throttle_timers_attach_aio_context(&bs->throttle_timers, new_context);
13af91eb 3967 }
33384421
HR
3968
3969 QLIST_FOREACH(ban, &bs->aio_notifiers, list) {
3970 ban->attached_aio_context(new_context, ban->opaque);
3971 }
dcd04228
SH
3972}
3973
3974void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
3975{
53ec73e2 3976 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228
SH
3977
3978 bdrv_detach_aio_context(bs);
3979
3980 /* This function executes in the old AioContext so acquire the new one in
3981 * case it runs in a different thread.
3982 */
3983 aio_context_acquire(new_context);
3984 bdrv_attach_aio_context(bs, new_context);
3985 aio_context_release(new_context);
85d126f3 3986}
d616b224 3987
33384421
HR
3988void bdrv_add_aio_context_notifier(BlockDriverState *bs,
3989 void (*attached_aio_context)(AioContext *new_context, void *opaque),
3990 void (*detach_aio_context)(void *opaque), void *opaque)
3991{
3992 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
3993 *ban = (BdrvAioNotifier){
3994 .attached_aio_context = attached_aio_context,
3995 .detach_aio_context = detach_aio_context,
3996 .opaque = opaque
3997 };
3998
3999 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
4000}
4001
4002void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
4003 void (*attached_aio_context)(AioContext *,
4004 void *),
4005 void (*detach_aio_context)(void *),
4006 void *opaque)
4007{
4008 BdrvAioNotifier *ban, *ban_next;
4009
4010 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
4011 if (ban->attached_aio_context == attached_aio_context &&
4012 ban->detach_aio_context == detach_aio_context &&
4013 ban->opaque == opaque)
4014 {
4015 QLIST_REMOVE(ban, list);
4016 g_free(ban);
4017
4018 return;
4019 }
4020 }
4021
4022 abort();
4023}
4024
77485434
HR
4025int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
4026 BlockDriverAmendStatusCB *status_cb)
6f176b48 4027{
c282e1fd 4028 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
4029 return -ENOTSUP;
4030 }
77485434 4031 return bs->drv->bdrv_amend_options(bs, opts, status_cb);
6f176b48 4032}
f6186f49 4033
b5042a36
BC
4034/* This function will be called by the bdrv_recurse_is_first_non_filter method
4035 * of block filter and by bdrv_is_first_non_filter.
4036 * It is used to test if the given bs is the candidate or recurse more in the
4037 * node graph.
212a5a8f 4038 */
b5042a36 4039bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 4040 BlockDriverState *candidate)
f6186f49 4041{
b5042a36
BC
4042 /* return false if basic checks fails */
4043 if (!bs || !bs->drv) {
212a5a8f 4044 return false;
f6186f49
BC
4045 }
4046
b5042a36
BC
4047 /* the code reached a non block filter driver -> check if the bs is
4048 * the same as the candidate. It's the recursion termination condition.
4049 */
4050 if (!bs->drv->is_filter) {
4051 return bs == candidate;
212a5a8f 4052 }
b5042a36 4053 /* Down this path the driver is a block filter driver */
212a5a8f 4054
b5042a36
BC
4055 /* If the block filter recursion method is defined use it to recurse down
4056 * the node graph.
4057 */
4058 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 4059 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
4060 }
4061
b5042a36
BC
4062 /* the driver is a block filter but don't allow to recurse -> return false
4063 */
4064 return false;
f6186f49
BC
4065}
4066
212a5a8f
BC
4067/* This function checks if the candidate is the first non filter bs down it's
4068 * bs chain. Since we don't have pointers to parents it explore all bs chains
4069 * from the top. Some filters can choose not to pass down the recursion.
4070 */
4071bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 4072{
212a5a8f
BC
4073 BlockDriverState *bs;
4074
4075 /* walk down the bs forest recursively */
4076 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
4077 bool perm;
4078
b5042a36 4079 /* try to recurse in this top level bs */
e6dc8a1f 4080 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
4081
4082 /* candidate is the first non filter */
4083 if (perm) {
4084 return true;
4085 }
4086 }
4087
4088 return false;
f6186f49 4089}
09158f00 4090
e12f3784
WC
4091BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
4092 const char *node_name, Error **errp)
09158f00
BC
4093{
4094 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
4095 AioContext *aio_context;
4096
09158f00
BC
4097 if (!to_replace_bs) {
4098 error_setg(errp, "Node name '%s' not found", node_name);
4099 return NULL;
4100 }
4101
5a7e7a0b
SH
4102 aio_context = bdrv_get_aio_context(to_replace_bs);
4103 aio_context_acquire(aio_context);
4104
09158f00 4105 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
4106 to_replace_bs = NULL;
4107 goto out;
09158f00
BC
4108 }
4109
4110 /* We don't want arbitrary node of the BDS chain to be replaced only the top
4111 * most non filter in order to prevent data corruption.
4112 * Another benefit is that this tests exclude backing files which are
4113 * blocked by the backing blockers.
4114 */
e12f3784 4115 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 4116 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
4117 to_replace_bs = NULL;
4118 goto out;
09158f00
BC
4119 }
4120
5a7e7a0b
SH
4121out:
4122 aio_context_release(aio_context);
09158f00
BC
4123 return to_replace_bs;
4124}
448ad91d 4125
91af7014
HR
4126static bool append_open_options(QDict *d, BlockDriverState *bs)
4127{
4128 const QDictEntry *entry;
4129 bool found_any = false;
4130
4131 for (entry = qdict_first(bs->options); entry;
4132 entry = qdict_next(bs->options, entry))
4133 {
4134 /* Only take options for this level and exclude all non-driver-specific
4135 * options */
4136 if (!strchr(qdict_entry_key(entry), '.') &&
4137 strcmp(qdict_entry_key(entry), "node-name"))
4138 {
4139 qobject_incref(qdict_entry_value(entry));
4140 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
4141 found_any = true;
4142 }
4143 }
4144
4145 return found_any;
4146}
4147
4148/* Updates the following BDS fields:
4149 * - exact_filename: A filename which may be used for opening a block device
4150 * which (mostly) equals the given BDS (even without any
4151 * other options; so reading and writing must return the same
4152 * results, but caching etc. may be different)
4153 * - full_open_options: Options which, when given when opening a block device
4154 * (without a filename), result in a BDS (mostly)
4155 * equalling the given one
4156 * - filename: If exact_filename is set, it is copied here. Otherwise,
4157 * full_open_options is converted to a JSON object, prefixed with
4158 * "json:" (for use through the JSON pseudo protocol) and put here.
4159 */
4160void bdrv_refresh_filename(BlockDriverState *bs)
4161{
4162 BlockDriver *drv = bs->drv;
4163 QDict *opts;
4164
4165 if (!drv) {
4166 return;
4167 }
4168
4169 /* This BDS's file name will most probably depend on its file's name, so
4170 * refresh that first */
4171 if (bs->file) {
4172 bdrv_refresh_filename(bs->file);
4173 }
4174
4175 if (drv->bdrv_refresh_filename) {
4176 /* Obsolete information is of no use here, so drop the old file name
4177 * information before refreshing it */
4178 bs->exact_filename[0] = '\0';
4179 if (bs->full_open_options) {
4180 QDECREF(bs->full_open_options);
4181 bs->full_open_options = NULL;
4182 }
4183
4184 drv->bdrv_refresh_filename(bs);
4185 } else if (bs->file) {
4186 /* Try to reconstruct valid information from the underlying file */
4187 bool has_open_options;
4188
4189 bs->exact_filename[0] = '\0';
4190 if (bs->full_open_options) {
4191 QDECREF(bs->full_open_options);
4192 bs->full_open_options = NULL;
4193 }
4194
4195 opts = qdict_new();
4196 has_open_options = append_open_options(opts, bs);
4197
4198 /* If no specific options have been given for this BDS, the filename of
4199 * the underlying file should suffice for this one as well */
4200 if (bs->file->exact_filename[0] && !has_open_options) {
4201 strcpy(bs->exact_filename, bs->file->exact_filename);
4202 }
4203 /* Reconstructing the full options QDict is simple for most format block
4204 * drivers, as long as the full options are known for the underlying
4205 * file BDS. The full options QDict of that file BDS should somehow
4206 * contain a representation of the filename, therefore the following
4207 * suffices without querying the (exact_)filename of this BDS. */
4208 if (bs->file->full_open_options) {
4209 qdict_put_obj(opts, "driver",
4210 QOBJECT(qstring_from_str(drv->format_name)));
4211 QINCREF(bs->file->full_open_options);
4212 qdict_put_obj(opts, "file", QOBJECT(bs->file->full_open_options));
4213
4214 bs->full_open_options = opts;
4215 } else {
4216 QDECREF(opts);
4217 }
4218 } else if (!bs->full_open_options && qdict_size(bs->options)) {
4219 /* There is no underlying file BDS (at least referenced by BDS.file),
4220 * so the full options QDict should be equal to the options given
4221 * specifically for this block device when it was opened (plus the
4222 * driver specification).
4223 * Because those options don't change, there is no need to update
4224 * full_open_options when it's already set. */
4225
4226 opts = qdict_new();
4227 append_open_options(opts, bs);
4228 qdict_put_obj(opts, "driver",
4229 QOBJECT(qstring_from_str(drv->format_name)));
4230
4231 if (bs->exact_filename[0]) {
4232 /* This may not work for all block protocol drivers (some may
4233 * require this filename to be parsed), but we have to find some
4234 * default solution here, so just include it. If some block driver
4235 * does not support pure options without any filename at all or
4236 * needs some special format of the options QDict, it needs to
4237 * implement the driver-specific bdrv_refresh_filename() function.
4238 */
4239 qdict_put_obj(opts, "filename",
4240 QOBJECT(qstring_from_str(bs->exact_filename)));
4241 }
4242
4243 bs->full_open_options = opts;
4244 }
4245
4246 if (bs->exact_filename[0]) {
4247 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4248 } else if (bs->full_open_options) {
4249 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4250 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4251 qstring_get_str(json));
4252 QDECREF(json);
4253 }
4254}
5366d0c8
BC
4255
4256/* This accessor function purpose is to allow the device models to access the
4257 * BlockAcctStats structure embedded inside a BlockDriverState without being
4258 * aware of the BlockDriverState structure layout.
4259 * It will go away when the BlockAcctStats structure will be moved inside
4260 * the device models.
4261 */
4262BlockAcctStats *bdrv_get_stats(BlockDriverState *bs)
4263{
4264 return &bs->stats;
4265}