]> git.proxmox.com Git - mirror_qemu.git/blame - block.c
throttle: Check that burst_level leaks correctly
[mirror_qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
d38ea87a 24#include "qemu/osdep.h"
faf07963 25#include "qemu-common.h"
6d519a5f 26#include "trace.h"
737e150e
PB
27#include "block/block_int.h"
28#include "block/blockjob.h"
d49b6836 29#include "qemu/error-report.h"
1de7afc9 30#include "qemu/module.h"
cc7a8ea7 31#include "qapi/qmp/qerror.h"
91a097e7 32#include "qapi/qmp/qbool.h"
7b1b5d19 33#include "qapi/qmp/qjson.h"
bfb197e0 34#include "sysemu/block-backend.h"
9c17d615 35#include "sysemu/sysemu.h"
1de7afc9 36#include "qemu/notify.h"
10817bf0 37#include "qemu/coroutine.h"
c13163fb 38#include "block/qapi.h"
b2023818 39#include "qmp-commands.h"
1de7afc9 40#include "qemu/timer.h"
a5ee7bd4 41#include "qapi-event.h"
db628338 42#include "block/throttle-groups.h"
fc01f7e7 43
71e72a19 44#ifdef CONFIG_BSD
7674e7bf 45#include <sys/ioctl.h>
72cf2d4f 46#include <sys/queue.h>
c5e97233 47#ifndef __DragonFly__
7674e7bf
FB
48#include <sys/disk.h>
49#endif
c5e97233 50#endif
7674e7bf 51
49dc768d
AL
52#ifdef _WIN32
53#include <windows.h>
54#endif
55
9bd2b08f
JS
56/**
57 * A BdrvDirtyBitmap can be in three possible states:
58 * (1) successor is NULL and disabled is false: full r/w mode
59 * (2) successor is NULL and disabled is true: read only mode ("disabled")
60 * (3) successor is set: frozen mode.
61 * A frozen bitmap cannot be renamed, deleted, anonymized, cleared, set,
62 * or enabled. A frozen bitmap can only abdicate() or reclaim().
63 */
e4654d2d 64struct BdrvDirtyBitmap {
aa0c7ca5
JS
65 HBitmap *bitmap; /* Dirty sector bitmap implementation */
66 BdrvDirtyBitmap *successor; /* Anonymous child; implies frozen status */
67 char *name; /* Optional non-empty unique ID */
68 int64_t size; /* Size of the bitmap (Number of sectors) */
69 bool disabled; /* Bitmap is read-only */
e4654d2d
FZ
70 QLIST_ENTRY(BdrvDirtyBitmap) list;
71};
72
1c9805a3
SH
73#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
74
c69a4dd8 75struct BdrvStates bdrv_states = QTAILQ_HEAD_INITIALIZER(bdrv_states);
7ee930d0 76
dc364f4c
BC
77static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
78 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
79
2c1d04e0
HR
80static QTAILQ_HEAD(, BlockDriverState) all_bdrv_states =
81 QTAILQ_HEAD_INITIALIZER(all_bdrv_states);
82
8a22f02a
SH
83static QLIST_HEAD(, BlockDriver) bdrv_drivers =
84 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 85
f3930ed0
KW
86static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
87 const char *reference, QDict *options, int flags,
88 BlockDriverState *parent,
ce343771 89 const BdrvChildRole *child_role, Error **errp);
f3930ed0 90
ce1ffea8 91static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs);
c5acdc9a
HR
92static void bdrv_release_named_dirty_bitmaps(BlockDriverState *bs);
93
eb852011
MA
94/* If non-zero, use only whitelisted block drivers */
95static int use_bdrv_whitelist;
96
64dff520
HR
97static void bdrv_close(BlockDriverState *bs);
98
9e0b22f4
SH
99#ifdef _WIN32
100static int is_windows_drive_prefix(const char *filename)
101{
102 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
103 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
104 filename[1] == ':');
105}
106
107int is_windows_drive(const char *filename)
108{
109 if (is_windows_drive_prefix(filename) &&
110 filename[2] == '\0')
111 return 1;
112 if (strstart(filename, "\\\\.\\", NULL) ||
113 strstart(filename, "//./", NULL))
114 return 1;
115 return 0;
116}
117#endif
118
339064d5
KW
119size_t bdrv_opt_mem_align(BlockDriverState *bs)
120{
121 if (!bs || !bs->drv) {
459b4e66
DL
122 /* page size or 4k (hdd sector size) should be on the safe side */
123 return MAX(4096, getpagesize());
339064d5
KW
124 }
125
126 return bs->bl.opt_mem_alignment;
127}
128
4196d2f0
DL
129size_t bdrv_min_mem_align(BlockDriverState *bs)
130{
131 if (!bs || !bs->drv) {
459b4e66
DL
132 /* page size or 4k (hdd sector size) should be on the safe side */
133 return MAX(4096, getpagesize());
4196d2f0
DL
134 }
135
136 return bs->bl.min_mem_alignment;
137}
138
9e0b22f4 139/* check if the path starts with "<protocol>:" */
5c98415b 140int path_has_protocol(const char *path)
9e0b22f4 141{
947995c0
PB
142 const char *p;
143
9e0b22f4
SH
144#ifdef _WIN32
145 if (is_windows_drive(path) ||
146 is_windows_drive_prefix(path)) {
147 return 0;
148 }
947995c0
PB
149 p = path + strcspn(path, ":/\\");
150#else
151 p = path + strcspn(path, ":/");
9e0b22f4
SH
152#endif
153
947995c0 154 return *p == ':';
9e0b22f4
SH
155}
156
83f64091 157int path_is_absolute(const char *path)
3b0d4f61 158{
21664424
FB
159#ifdef _WIN32
160 /* specific case for names like: "\\.\d:" */
f53f4da9 161 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 162 return 1;
f53f4da9
PB
163 }
164 return (*path == '/' || *path == '\\');
3b9f94e1 165#else
f53f4da9 166 return (*path == '/');
3b9f94e1 167#endif
3b0d4f61
FB
168}
169
83f64091
FB
170/* if filename is absolute, just copy it to dest. Otherwise, build a
171 path to it by considering it is relative to base_path. URL are
172 supported. */
173void path_combine(char *dest, int dest_size,
174 const char *base_path,
175 const char *filename)
3b0d4f61 176{
83f64091
FB
177 const char *p, *p1;
178 int len;
179
180 if (dest_size <= 0)
181 return;
182 if (path_is_absolute(filename)) {
183 pstrcpy(dest, dest_size, filename);
184 } else {
185 p = strchr(base_path, ':');
186 if (p)
187 p++;
188 else
189 p = base_path;
3b9f94e1
FB
190 p1 = strrchr(base_path, '/');
191#ifdef _WIN32
192 {
193 const char *p2;
194 p2 = strrchr(base_path, '\\');
195 if (!p1 || p2 > p1)
196 p1 = p2;
197 }
198#endif
83f64091
FB
199 if (p1)
200 p1++;
201 else
202 p1 = base_path;
203 if (p1 > p)
204 p = p1;
205 len = p - base_path;
206 if (len > dest_size - 1)
207 len = dest_size - 1;
208 memcpy(dest, base_path, len);
209 dest[len] = '\0';
210 pstrcat(dest, dest_size, filename);
3b0d4f61 211 }
3b0d4f61
FB
212}
213
0a82855a
HR
214void bdrv_get_full_backing_filename_from_filename(const char *backed,
215 const char *backing,
9f07429e
HR
216 char *dest, size_t sz,
217 Error **errp)
dc5a1371 218{
9f07429e
HR
219 if (backing[0] == '\0' || path_has_protocol(backing) ||
220 path_is_absolute(backing))
221 {
0a82855a 222 pstrcpy(dest, sz, backing);
9f07429e
HR
223 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
224 error_setg(errp, "Cannot use relative backing file names for '%s'",
225 backed);
dc5a1371 226 } else {
0a82855a 227 path_combine(dest, sz, backed, backing);
dc5a1371
PB
228 }
229}
230
9f07429e
HR
231void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
232 Error **errp)
0a82855a 233{
9f07429e
HR
234 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
235
236 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
237 dest, sz, errp);
0a82855a
HR
238}
239
0eb7217e
SH
240void bdrv_register(BlockDriver *bdrv)
241{
242 bdrv_setup_io_funcs(bdrv);
b2e12bc6 243
8a22f02a 244 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 245}
b338082b 246
7f06d47e 247BlockDriverState *bdrv_new_root(void)
b338082b 248{
7f06d47e 249 BlockDriverState *bs = bdrv_new();
e4e9986b 250
e4e9986b 251 QTAILQ_INSERT_TAIL(&bdrv_states, bs, device_list);
e4e9986b
MA
252 return bs;
253}
254
255BlockDriverState *bdrv_new(void)
256{
257 BlockDriverState *bs;
258 int i;
259
5839e53b 260 bs = g_new0(BlockDriverState, 1);
e4654d2d 261 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
262 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
263 QLIST_INIT(&bs->op_blockers[i]);
264 }
d616b224 265 notifier_with_return_list_init(&bs->before_write_notifiers);
cc0681c4
BC
266 qemu_co_queue_init(&bs->throttled_reqs[0]);
267 qemu_co_queue_init(&bs->throttled_reqs[1]);
9fcb0251 268 bs->refcnt = 1;
dcd04228 269 bs->aio_context = qemu_get_aio_context();
d7d512f6 270
2c1d04e0
HR
271 QTAILQ_INSERT_TAIL(&all_bdrv_states, bs, bs_list);
272
b338082b
FB
273 return bs;
274}
275
ea2384d3
FB
276BlockDriver *bdrv_find_format(const char *format_name)
277{
278 BlockDriver *drv1;
8a22f02a
SH
279 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
280 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 281 return drv1;
8a22f02a 282 }
ea2384d3
FB
283 }
284 return NULL;
285}
286
b64ec4e4 287static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 288{
b64ec4e4
FZ
289 static const char *whitelist_rw[] = {
290 CONFIG_BDRV_RW_WHITELIST
291 };
292 static const char *whitelist_ro[] = {
293 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
294 };
295 const char **p;
296
b64ec4e4 297 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 298 return 1; /* no whitelist, anything goes */
b64ec4e4 299 }
eb852011 300
b64ec4e4 301 for (p = whitelist_rw; *p; p++) {
eb852011
MA
302 if (!strcmp(drv->format_name, *p)) {
303 return 1;
304 }
305 }
b64ec4e4
FZ
306 if (read_only) {
307 for (p = whitelist_ro; *p; p++) {
308 if (!strcmp(drv->format_name, *p)) {
309 return 1;
310 }
311 }
312 }
eb852011
MA
313 return 0;
314}
315
5b7e1542
ZYW
316typedef struct CreateCo {
317 BlockDriver *drv;
318 char *filename;
83d0521a 319 QemuOpts *opts;
5b7e1542 320 int ret;
cc84d90f 321 Error *err;
5b7e1542
ZYW
322} CreateCo;
323
324static void coroutine_fn bdrv_create_co_entry(void *opaque)
325{
cc84d90f
HR
326 Error *local_err = NULL;
327 int ret;
328
5b7e1542
ZYW
329 CreateCo *cco = opaque;
330 assert(cco->drv);
331
c282e1fd 332 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
84d18f06 333 if (local_err) {
cc84d90f
HR
334 error_propagate(&cco->err, local_err);
335 }
336 cco->ret = ret;
5b7e1542
ZYW
337}
338
0e7e1989 339int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 340 QemuOpts *opts, Error **errp)
ea2384d3 341{
5b7e1542
ZYW
342 int ret;
343
344 Coroutine *co;
345 CreateCo cco = {
346 .drv = drv,
347 .filename = g_strdup(filename),
83d0521a 348 .opts = opts,
5b7e1542 349 .ret = NOT_DONE,
cc84d90f 350 .err = NULL,
5b7e1542
ZYW
351 };
352
c282e1fd 353 if (!drv->bdrv_create) {
cc84d90f 354 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
355 ret = -ENOTSUP;
356 goto out;
5b7e1542
ZYW
357 }
358
359 if (qemu_in_coroutine()) {
360 /* Fast-path if already in coroutine context */
361 bdrv_create_co_entry(&cco);
362 } else {
363 co = qemu_coroutine_create(bdrv_create_co_entry);
364 qemu_coroutine_enter(co, &cco);
365 while (cco.ret == NOT_DONE) {
b47ec2c4 366 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
367 }
368 }
369
370 ret = cco.ret;
cc84d90f 371 if (ret < 0) {
84d18f06 372 if (cco.err) {
cc84d90f
HR
373 error_propagate(errp, cco.err);
374 } else {
375 error_setg_errno(errp, -ret, "Could not create image");
376 }
377 }
0e7e1989 378
80168bff
LC
379out:
380 g_free(cco.filename);
5b7e1542 381 return ret;
ea2384d3
FB
382}
383
c282e1fd 384int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
385{
386 BlockDriver *drv;
cc84d90f
HR
387 Error *local_err = NULL;
388 int ret;
84a12e66 389
b65a5e12 390 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 391 if (drv == NULL) {
16905d71 392 return -ENOENT;
84a12e66
CH
393 }
394
c282e1fd 395 ret = bdrv_create(drv, filename, opts, &local_err);
84d18f06 396 if (local_err) {
cc84d90f
HR
397 error_propagate(errp, local_err);
398 }
399 return ret;
84a12e66
CH
400}
401
892b7de8
ET
402/**
403 * Try to get @bs's logical and physical block size.
404 * On success, store them in @bsz struct and return 0.
405 * On failure return -errno.
406 * @bs must not be empty.
407 */
408int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
409{
410 BlockDriver *drv = bs->drv;
411
412 if (drv && drv->bdrv_probe_blocksizes) {
413 return drv->bdrv_probe_blocksizes(bs, bsz);
414 }
415
416 return -ENOTSUP;
417}
418
419/**
420 * Try to get @bs's geometry (cyls, heads, sectors).
421 * On success, store them in @geo struct and return 0.
422 * On failure return -errno.
423 * @bs must not be empty.
424 */
425int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
426{
427 BlockDriver *drv = bs->drv;
428
429 if (drv && drv->bdrv_probe_geometry) {
430 return drv->bdrv_probe_geometry(bs, geo);
431 }
432
433 return -ENOTSUP;
434}
435
eba25057
JM
436/*
437 * Create a uniquely-named empty temporary file.
438 * Return 0 upon success, otherwise a negative errno value.
439 */
440int get_tmp_filename(char *filename, int size)
d5249393 441{
eba25057 442#ifdef _WIN32
3b9f94e1 443 char temp_dir[MAX_PATH];
eba25057
JM
444 /* GetTempFileName requires that its output buffer (4th param)
445 have length MAX_PATH or greater. */
446 assert(size >= MAX_PATH);
447 return (GetTempPath(MAX_PATH, temp_dir)
448 && GetTempFileName(temp_dir, "qem", 0, filename)
449 ? 0 : -GetLastError());
d5249393 450#else
67b915a5 451 int fd;
7ccfb2eb 452 const char *tmpdir;
0badc1ee 453 tmpdir = getenv("TMPDIR");
69bef793
AS
454 if (!tmpdir) {
455 tmpdir = "/var/tmp";
456 }
eba25057
JM
457 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
458 return -EOVERFLOW;
459 }
ea2384d3 460 fd = mkstemp(filename);
fe235a06
DH
461 if (fd < 0) {
462 return -errno;
463 }
464 if (close(fd) != 0) {
465 unlink(filename);
eba25057
JM
466 return -errno;
467 }
468 return 0;
d5249393 469#endif
eba25057 470}
fc01f7e7 471
84a12e66
CH
472/*
473 * Detect host devices. By convention, /dev/cdrom[N] is always
474 * recognized as a host CDROM.
475 */
476static BlockDriver *find_hdev_driver(const char *filename)
477{
478 int score_max = 0, score;
479 BlockDriver *drv = NULL, *d;
480
481 QLIST_FOREACH(d, &bdrv_drivers, list) {
482 if (d->bdrv_probe_device) {
483 score = d->bdrv_probe_device(filename);
484 if (score > score_max) {
485 score_max = score;
486 drv = d;
487 }
488 }
489 }
490
491 return drv;
492}
493
98289620 494BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
495 bool allow_protocol_prefix,
496 Error **errp)
83f64091
FB
497{
498 BlockDriver *drv1;
499 char protocol[128];
1cec71e3 500 int len;
83f64091 501 const char *p;
19cb3738 502
66f82cee
KW
503 /* TODO Drivers without bdrv_file_open must be specified explicitly */
504
39508e7a
CH
505 /*
506 * XXX(hch): we really should not let host device detection
507 * override an explicit protocol specification, but moving this
508 * later breaks access to device names with colons in them.
509 * Thanks to the brain-dead persistent naming schemes on udev-
510 * based Linux systems those actually are quite common.
511 */
512 drv1 = find_hdev_driver(filename);
513 if (drv1) {
514 return drv1;
515 }
516
98289620 517 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 518 return &bdrv_file;
84a12e66 519 }
98289620 520
9e0b22f4
SH
521 p = strchr(filename, ':');
522 assert(p != NULL);
1cec71e3
AL
523 len = p - filename;
524 if (len > sizeof(protocol) - 1)
525 len = sizeof(protocol) - 1;
526 memcpy(protocol, filename, len);
527 protocol[len] = '\0';
8a22f02a 528 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
5fafdf24 529 if (drv1->protocol_name &&
8a22f02a 530 !strcmp(drv1->protocol_name, protocol)) {
83f64091 531 return drv1;
8a22f02a 532 }
83f64091 533 }
b65a5e12
HR
534
535 error_setg(errp, "Unknown protocol '%s'", protocol);
83f64091
FB
536 return NULL;
537}
538
c6684249
MA
539/*
540 * Guess image format by probing its contents.
541 * This is not a good idea when your image is raw (CVE-2008-2004), but
542 * we do it anyway for backward compatibility.
543 *
544 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
545 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
546 * but can be smaller if the image file is smaller)
c6684249
MA
547 * @filename is its filename.
548 *
549 * For all block drivers, call the bdrv_probe() method to get its
550 * probing score.
551 * Return the first block driver with the highest probing score.
552 */
38f3ef57
KW
553BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
554 const char *filename)
c6684249
MA
555{
556 int score_max = 0, score;
557 BlockDriver *drv = NULL, *d;
558
559 QLIST_FOREACH(d, &bdrv_drivers, list) {
560 if (d->bdrv_probe) {
561 score = d->bdrv_probe(buf, buf_size, filename);
562 if (score > score_max) {
563 score_max = score;
564 drv = d;
565 }
566 }
567 }
568
569 return drv;
570}
571
f500a6d3 572static int find_image_format(BlockDriverState *bs, const char *filename,
34b5d2c6 573 BlockDriver **pdrv, Error **errp)
f3a5d3f8 574{
c6684249 575 BlockDriver *drv;
7cddd372 576 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 577 int ret = 0;
f8ea0b00 578
08a00559 579 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
b192af8a 580 if (bdrv_is_sg(bs) || !bdrv_is_inserted(bs) || bdrv_getlength(bs) == 0) {
ef810437 581 *pdrv = &bdrv_raw;
c98ac35d 582 return ret;
1a396859 583 }
f8ea0b00 584
83f64091 585 ret = bdrv_pread(bs, 0, buf, sizeof(buf));
83f64091 586 if (ret < 0) {
34b5d2c6
HR
587 error_setg_errno(errp, -ret, "Could not read image for determining its "
588 "format");
c98ac35d
SW
589 *pdrv = NULL;
590 return ret;
83f64091
FB
591 }
592
c6684249 593 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 594 if (!drv) {
34b5d2c6
HR
595 error_setg(errp, "Could not determine image format: No compatible "
596 "driver found");
c98ac35d
SW
597 ret = -ENOENT;
598 }
599 *pdrv = drv;
600 return ret;
ea2384d3
FB
601}
602
51762288
SH
603/**
604 * Set the current 'total_sectors' value
65a9bb25 605 * Return 0 on success, -errno on error.
51762288
SH
606 */
607static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
608{
609 BlockDriver *drv = bs->drv;
610
396759ad 611 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 612 if (bdrv_is_sg(bs))
396759ad
NB
613 return 0;
614
51762288
SH
615 /* query actual device if possible, otherwise just trust the hint */
616 if (drv->bdrv_getlength) {
617 int64_t length = drv->bdrv_getlength(bs);
618 if (length < 0) {
619 return length;
620 }
7e382003 621 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
622 }
623
624 bs->total_sectors = hint;
625 return 0;
626}
627
cddff5ba
KW
628/**
629 * Combines a QDict of new block driver @options with any missing options taken
630 * from @old_options, so that leaving out an option defaults to its old value.
631 */
632static void bdrv_join_options(BlockDriverState *bs, QDict *options,
633 QDict *old_options)
634{
635 if (bs->drv && bs->drv->bdrv_join_options) {
636 bs->drv->bdrv_join_options(options, old_options);
637 } else {
638 qdict_join(options, old_options, false);
639 }
640}
641
9e8f1835
PB
642/**
643 * Set open flags for a given discard mode
644 *
645 * Return 0 on success, -1 if the discard mode was invalid.
646 */
647int bdrv_parse_discard_flags(const char *mode, int *flags)
648{
649 *flags &= ~BDRV_O_UNMAP;
650
651 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
652 /* do nothing */
653 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
654 *flags |= BDRV_O_UNMAP;
655 } else {
656 return -1;
657 }
658
659 return 0;
660}
661
c3993cdc
SH
662/**
663 * Set open flags for a given cache mode
664 *
665 * Return 0 on success, -1 if the cache mode was invalid.
666 */
667int bdrv_parse_cache_flags(const char *mode, int *flags)
668{
669 *flags &= ~BDRV_O_CACHE_MASK;
670
671 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
672 *flags |= BDRV_O_NOCACHE | BDRV_O_CACHE_WB;
92196b2f
SH
673 } else if (!strcmp(mode, "directsync")) {
674 *flags |= BDRV_O_NOCACHE;
c3993cdc
SH
675 } else if (!strcmp(mode, "writeback")) {
676 *flags |= BDRV_O_CACHE_WB;
677 } else if (!strcmp(mode, "unsafe")) {
678 *flags |= BDRV_O_CACHE_WB;
679 *flags |= BDRV_O_NO_FLUSH;
680 } else if (!strcmp(mode, "writethrough")) {
681 /* this is the default */
682 } else {
683 return -1;
684 }
685
686 return 0;
687}
688
b1e6fc08
KW
689/*
690 * Returns the flags that a temporary snapshot should get, based on the
691 * originally requested flags (the originally requested image will have flags
692 * like a backing file)
693 */
694static int bdrv_temp_snapshot_flags(int flags)
695{
696 return (flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
697}
698
0b50cc88 699/*
8e2160e2
KW
700 * Returns the options and flags that bs->file should get if a protocol driver
701 * is expected, based on the given options and flags for the parent BDS
0b50cc88 702 */
8e2160e2
KW
703static void bdrv_inherited_options(int *child_flags, QDict *child_options,
704 int parent_flags, QDict *parent_options)
0b50cc88 705{
8e2160e2
KW
706 int flags = parent_flags;
707
0b50cc88
KW
708 /* Enable protocol handling, disable format probing for bs->file */
709 flags |= BDRV_O_PROTOCOL;
710
91a097e7
KW
711 /* If the cache mode isn't explicitly set, inherit direct and no-flush from
712 * the parent. */
713 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
714 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
715
0b50cc88 716 /* Our block drivers take care to send flushes and respect unmap policy,
91a097e7
KW
717 * so we can default to enable both on lower layers regardless of the
718 * corresponding parent options. */
719 qdict_set_default_str(child_options, BDRV_OPT_CACHE_WB, "on");
720 flags |= BDRV_O_UNMAP;
0b50cc88 721
0b50cc88 722 /* Clear flags that only apply to the top layer */
5669b44d 723 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ);
0b50cc88 724
8e2160e2 725 *child_flags = flags;
0b50cc88
KW
726}
727
f3930ed0 728const BdrvChildRole child_file = {
8e2160e2 729 .inherit_options = bdrv_inherited_options,
f3930ed0
KW
730};
731
732/*
8e2160e2
KW
733 * Returns the options and flags that bs->file should get if the use of formats
734 * (and not only protocols) is permitted for it, based on the given options and
735 * flags for the parent BDS
f3930ed0 736 */
8e2160e2
KW
737static void bdrv_inherited_fmt_options(int *child_flags, QDict *child_options,
738 int parent_flags, QDict *parent_options)
f3930ed0 739{
8e2160e2
KW
740 child_file.inherit_options(child_flags, child_options,
741 parent_flags, parent_options);
742
743 *child_flags &= ~BDRV_O_PROTOCOL;
f3930ed0
KW
744}
745
746const BdrvChildRole child_format = {
8e2160e2 747 .inherit_options = bdrv_inherited_fmt_options,
f3930ed0
KW
748};
749
317fc44e 750/*
8e2160e2
KW
751 * Returns the options and flags that bs->backing should get, based on the
752 * given options and flags for the parent BDS
317fc44e 753 */
8e2160e2
KW
754static void bdrv_backing_options(int *child_flags, QDict *child_options,
755 int parent_flags, QDict *parent_options)
317fc44e 756{
8e2160e2
KW
757 int flags = parent_flags;
758
91a097e7
KW
759 /* The cache mode is inherited unmodified for backing files */
760 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_WB);
761 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
762 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
763
317fc44e
KW
764 /* backing files always opened read-only */
765 flags &= ~(BDRV_O_RDWR | BDRV_O_COPY_ON_READ);
766
767 /* snapshot=on is handled on the top layer */
8bfea15d 768 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e 769
8e2160e2 770 *child_flags = flags;
317fc44e
KW
771}
772
f3930ed0 773static const BdrvChildRole child_backing = {
8e2160e2 774 .inherit_options = bdrv_backing_options,
f3930ed0
KW
775};
776
7b272452
KW
777static int bdrv_open_flags(BlockDriverState *bs, int flags)
778{
779 int open_flags = flags | BDRV_O_CACHE_WB;
780
781 /*
782 * Clear flags that are internal to the block layer before opening the
783 * image.
784 */
20cca275 785 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
786
787 /*
788 * Snapshots should be writable.
789 */
8bfea15d 790 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
791 open_flags |= BDRV_O_RDWR;
792 }
793
794 return open_flags;
795}
796
91a097e7
KW
797static void update_flags_from_options(int *flags, QemuOpts *opts)
798{
799 *flags &= ~BDRV_O_CACHE_MASK;
800
801 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_WB));
802 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_WB, false)) {
803 *flags |= BDRV_O_CACHE_WB;
804 }
805
806 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_NO_FLUSH));
807 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_NO_FLUSH, false)) {
808 *flags |= BDRV_O_NO_FLUSH;
809 }
810
811 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_DIRECT));
812 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_DIRECT, false)) {
813 *flags |= BDRV_O_NOCACHE;
814 }
815}
816
817static void update_options_from_flags(QDict *options, int flags)
818{
819 if (!qdict_haskey(options, BDRV_OPT_CACHE_WB)) {
820 qdict_put(options, BDRV_OPT_CACHE_WB,
821 qbool_from_bool(flags & BDRV_O_CACHE_WB));
822 }
823 if (!qdict_haskey(options, BDRV_OPT_CACHE_DIRECT)) {
824 qdict_put(options, BDRV_OPT_CACHE_DIRECT,
825 qbool_from_bool(flags & BDRV_O_NOCACHE));
826 }
827 if (!qdict_haskey(options, BDRV_OPT_CACHE_NO_FLUSH)) {
828 qdict_put(options, BDRV_OPT_CACHE_NO_FLUSH,
829 qbool_from_bool(flags & BDRV_O_NO_FLUSH));
830 }
831}
832
636ea370
KW
833static void bdrv_assign_node_name(BlockDriverState *bs,
834 const char *node_name,
835 Error **errp)
6913c0c2 836{
15489c76 837 char *gen_node_name = NULL;
6913c0c2 838
15489c76
JC
839 if (!node_name) {
840 node_name = gen_node_name = id_generate(ID_BLOCK);
841 } else if (!id_wellformed(node_name)) {
842 /*
843 * Check for empty string or invalid characters, but not if it is
844 * generated (generated names use characters not available to the user)
845 */
9aebf3b8 846 error_setg(errp, "Invalid node name");
636ea370 847 return;
6913c0c2
BC
848 }
849
0c5e94ee 850 /* takes care of avoiding namespaces collisions */
7f06d47e 851 if (blk_by_name(node_name)) {
0c5e94ee
BC
852 error_setg(errp, "node-name=%s is conflicting with a device id",
853 node_name);
15489c76 854 goto out;
0c5e94ee
BC
855 }
856
6913c0c2
BC
857 /* takes care of avoiding duplicates node names */
858 if (bdrv_find_node(node_name)) {
859 error_setg(errp, "Duplicate node name");
15489c76 860 goto out;
6913c0c2
BC
861 }
862
863 /* copy node name into the bs and insert it into the graph list */
864 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
865 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
15489c76
JC
866out:
867 g_free(gen_node_name);
6913c0c2
BC
868}
869
18edf289
KW
870static QemuOptsList bdrv_runtime_opts = {
871 .name = "bdrv_common",
872 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
873 .desc = {
874 {
875 .name = "node-name",
876 .type = QEMU_OPT_STRING,
877 .help = "Node name of the block device node",
878 },
62392ebb
KW
879 {
880 .name = "driver",
881 .type = QEMU_OPT_STRING,
882 .help = "Block driver to use for the node",
883 },
91a097e7
KW
884 {
885 .name = BDRV_OPT_CACHE_WB,
886 .type = QEMU_OPT_BOOL,
887 .help = "Enable writeback mode",
888 },
889 {
890 .name = BDRV_OPT_CACHE_DIRECT,
891 .type = QEMU_OPT_BOOL,
892 .help = "Bypass software writeback cache on the host",
893 },
894 {
895 .name = BDRV_OPT_CACHE_NO_FLUSH,
896 .type = QEMU_OPT_BOOL,
897 .help = "Ignore flush requests",
898 },
18edf289
KW
899 { /* end of list */ }
900 },
901};
902
57915332
KW
903/*
904 * Common part for opening disk images and files
b6ad491a
KW
905 *
906 * Removes all processed options from *options.
57915332 907 */
9a4f4c31 908static int bdrv_open_common(BlockDriverState *bs, BdrvChild *file,
82dc8b41 909 QDict *options, Error **errp)
57915332
KW
910{
911 int ret, open_flags;
035fccdf 912 const char *filename;
62392ebb 913 const char *driver_name = NULL;
6913c0c2 914 const char *node_name = NULL;
18edf289 915 QemuOpts *opts;
62392ebb 916 BlockDriver *drv;
34b5d2c6 917 Error *local_err = NULL;
57915332 918
6405875c 919 assert(bs->file == NULL);
707ff828 920 assert(options != NULL && bs->options != options);
57915332 921
62392ebb
KW
922 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
923 qemu_opts_absorb_qdict(opts, options, &local_err);
924 if (local_err) {
925 error_propagate(errp, local_err);
926 ret = -EINVAL;
927 goto fail_opts;
928 }
929
930 driver_name = qemu_opt_get(opts, "driver");
931 drv = bdrv_find_format(driver_name);
932 assert(drv != NULL);
933
45673671 934 if (file != NULL) {
9a4f4c31 935 filename = file->bs->filename;
45673671
KW
936 } else {
937 filename = qdict_get_try_str(options, "filename");
938 }
939
765003db
KW
940 if (drv->bdrv_needs_filename && !filename) {
941 error_setg(errp, "The '%s' block driver requires a file name",
942 drv->format_name);
18edf289
KW
943 ret = -EINVAL;
944 goto fail_opts;
6913c0c2 945 }
6913c0c2 946
82dc8b41
KW
947 trace_bdrv_open_common(bs, filename ?: "", bs->open_flags,
948 drv->format_name);
62392ebb 949
18edf289 950 node_name = qemu_opt_get(opts, "node-name");
636ea370 951 bdrv_assign_node_name(bs, node_name, &local_err);
0fb6395c 952 if (local_err) {
636ea370 953 error_propagate(errp, local_err);
18edf289
KW
954 ret = -EINVAL;
955 goto fail_opts;
5d186eb0
KW
956 }
957
c25f53b0 958 bs->request_alignment = 512;
0d51b4de 959 bs->zero_beyond_eof = true;
82dc8b41 960 bs->read_only = !(bs->open_flags & BDRV_O_RDWR);
b64ec4e4
FZ
961
962 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
963 error_setg(errp,
964 !bs->read_only && bdrv_is_whitelisted(drv, true)
965 ? "Driver '%s' can only be used for read-only devices"
966 : "Driver '%s' is not whitelisted",
967 drv->format_name);
18edf289
KW
968 ret = -ENOTSUP;
969 goto fail_opts;
b64ec4e4 970 }
57915332 971
53fec9d3 972 assert(bs->copy_on_read == 0); /* bdrv_new() and bdrv_close() make it so */
82dc8b41 973 if (bs->open_flags & BDRV_O_COPY_ON_READ) {
0ebd24e0
KW
974 if (!bs->read_only) {
975 bdrv_enable_copy_on_read(bs);
976 } else {
977 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
978 ret = -EINVAL;
979 goto fail_opts;
0ebd24e0 980 }
53fec9d3
SH
981 }
982
c2ad1b0c
KW
983 if (filename != NULL) {
984 pstrcpy(bs->filename, sizeof(bs->filename), filename);
985 } else {
986 bs->filename[0] = '\0';
987 }
91af7014 988 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 989
57915332 990 bs->drv = drv;
7267c094 991 bs->opaque = g_malloc0(drv->instance_size);
57915332 992
91a097e7
KW
993 /* Apply cache mode options */
994 update_flags_from_options(&bs->open_flags, opts);
995 bdrv_set_enable_write_cache(bs, bs->open_flags & BDRV_O_CACHE_WB);
e7c63796 996
66f82cee 997 /* Open the image, either directly or using a protocol */
82dc8b41 998 open_flags = bdrv_open_flags(bs, bs->open_flags);
66f82cee 999 if (drv->bdrv_file_open) {
5d186eb0 1000 assert(file == NULL);
030be321 1001 assert(!drv->bdrv_needs_filename || filename != NULL);
34b5d2c6 1002 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
f500a6d3 1003 } else {
2af5ef70 1004 if (file == NULL) {
34b5d2c6
HR
1005 error_setg(errp, "Can't use '%s' as a block driver for the "
1006 "protocol level", drv->format_name);
2af5ef70
KW
1007 ret = -EINVAL;
1008 goto free_and_fail;
1009 }
f500a6d3 1010 bs->file = file;
34b5d2c6 1011 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
66f82cee
KW
1012 }
1013
57915332 1014 if (ret < 0) {
84d18f06 1015 if (local_err) {
34b5d2c6 1016 error_propagate(errp, local_err);
2fa9aa59
DH
1017 } else if (bs->filename[0]) {
1018 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
34b5d2c6
HR
1019 } else {
1020 error_setg_errno(errp, -ret, "Could not open image");
1021 }
57915332
KW
1022 goto free_and_fail;
1023 }
1024
a1f688f4
MA
1025 if (bs->encrypted) {
1026 error_report("Encrypted images are deprecated");
1027 error_printf("Support for them will be removed in a future release.\n"
1028 "You can use 'qemu-img convert' to convert your image"
1029 " to an unencrypted one.\n");
1030 }
1031
51762288
SH
1032 ret = refresh_total_sectors(bs, bs->total_sectors);
1033 if (ret < 0) {
34b5d2c6 1034 error_setg_errno(errp, -ret, "Could not refresh total sector count");
51762288 1035 goto free_and_fail;
57915332 1036 }
51762288 1037
3baca891
KW
1038 bdrv_refresh_limits(bs, &local_err);
1039 if (local_err) {
1040 error_propagate(errp, local_err);
1041 ret = -EINVAL;
1042 goto free_and_fail;
1043 }
1044
c25f53b0 1045 assert(bdrv_opt_mem_align(bs) != 0);
4196d2f0 1046 assert(bdrv_min_mem_align(bs) != 0);
b192af8a 1047 assert((bs->request_alignment != 0) || bdrv_is_sg(bs));
18edf289
KW
1048
1049 qemu_opts_del(opts);
57915332
KW
1050 return 0;
1051
1052free_and_fail:
f500a6d3 1053 bs->file = NULL;
7267c094 1054 g_free(bs->opaque);
57915332
KW
1055 bs->opaque = NULL;
1056 bs->drv = NULL;
18edf289
KW
1057fail_opts:
1058 qemu_opts_del(opts);
57915332
KW
1059 return ret;
1060}
1061
5e5c4f63
KW
1062static QDict *parse_json_filename(const char *filename, Error **errp)
1063{
1064 QObject *options_obj;
1065 QDict *options;
1066 int ret;
1067
1068 ret = strstart(filename, "json:", &filename);
1069 assert(ret);
1070
1071 options_obj = qobject_from_json(filename);
1072 if (!options_obj) {
1073 error_setg(errp, "Could not parse the JSON options");
1074 return NULL;
1075 }
1076
1077 if (qobject_type(options_obj) != QTYPE_QDICT) {
1078 qobject_decref(options_obj);
1079 error_setg(errp, "Invalid JSON object given");
1080 return NULL;
1081 }
1082
1083 options = qobject_to_qdict(options_obj);
1084 qdict_flatten(options);
1085
1086 return options;
1087}
1088
de3b53f0
KW
1089static void parse_json_protocol(QDict *options, const char **pfilename,
1090 Error **errp)
1091{
1092 QDict *json_options;
1093 Error *local_err = NULL;
1094
1095 /* Parse json: pseudo-protocol */
1096 if (!*pfilename || !g_str_has_prefix(*pfilename, "json:")) {
1097 return;
1098 }
1099
1100 json_options = parse_json_filename(*pfilename, &local_err);
1101 if (local_err) {
1102 error_propagate(errp, local_err);
1103 return;
1104 }
1105
1106 /* Options given in the filename have lower priority than options
1107 * specified directly */
1108 qdict_join(options, json_options, false);
1109 QDECREF(json_options);
1110 *pfilename = NULL;
1111}
1112
b6ce07aa 1113/*
f54120ff
KW
1114 * Fills in default options for opening images and converts the legacy
1115 * filename/flags pair to option QDict entries.
53a29513
HR
1116 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
1117 * block driver has been specified explicitly.
b6ce07aa 1118 */
de3b53f0 1119static int bdrv_fill_options(QDict **options, const char *filename,
053e1578 1120 int *flags, Error **errp)
ea2384d3 1121{
c2ad1b0c 1122 const char *drvname;
53a29513 1123 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 1124 bool parse_filename = false;
053e1578 1125 BlockDriver *drv = NULL;
34b5d2c6 1126 Error *local_err = NULL;
83f64091 1127
53a29513 1128 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1129 if (drvname) {
1130 drv = bdrv_find_format(drvname);
1131 if (!drv) {
1132 error_setg(errp, "Unknown driver '%s'", drvname);
1133 return -ENOENT;
1134 }
1135 /* If the user has explicitly specified the driver, this choice should
1136 * override the BDRV_O_PROTOCOL flag */
1137 protocol = drv->bdrv_file_open;
53a29513
HR
1138 }
1139
1140 if (protocol) {
1141 *flags |= BDRV_O_PROTOCOL;
1142 } else {
1143 *flags &= ~BDRV_O_PROTOCOL;
1144 }
1145
91a097e7
KW
1146 /* Translate cache options from flags into options */
1147 update_options_from_flags(*options, *flags);
1148
035fccdf 1149 /* Fetch the file name from the options QDict if necessary */
17b005f1 1150 if (protocol && filename) {
f54120ff
KW
1151 if (!qdict_haskey(*options, "filename")) {
1152 qdict_put(*options, "filename", qstring_from_str(filename));
1153 parse_filename = true;
1154 } else {
1155 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1156 "the same time");
1157 return -EINVAL;
1158 }
035fccdf
KW
1159 }
1160
c2ad1b0c 1161 /* Find the right block driver */
f54120ff 1162 filename = qdict_get_try_str(*options, "filename");
f54120ff 1163
053e1578
HR
1164 if (!drvname && protocol) {
1165 if (filename) {
1166 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1167 if (!drv) {
053e1578 1168 return -EINVAL;
17b005f1 1169 }
053e1578
HR
1170
1171 drvname = drv->format_name;
1172 qdict_put(*options, "driver", qstring_from_str(drvname));
1173 } else {
1174 error_setg(errp, "Must specify either driver or file");
1175 return -EINVAL;
98289620 1176 }
c2ad1b0c
KW
1177 }
1178
17b005f1 1179 assert(drv || !protocol);
c2ad1b0c 1180
f54120ff 1181 /* Driver-specific filename parsing */
17b005f1 1182 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1183 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1184 if (local_err) {
34b5d2c6 1185 error_propagate(errp, local_err);
f54120ff 1186 return -EINVAL;
6963a30d 1187 }
cd5d031e
HR
1188
1189 if (!drv->bdrv_needs_filename) {
1190 qdict_del(*options, "filename");
cd5d031e 1191 }
6963a30d
KW
1192 }
1193
f54120ff
KW
1194 return 0;
1195}
1196
b4b059f6
KW
1197static BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
1198 BlockDriverState *child_bs,
260fecf1 1199 const char *child_name,
b4b059f6 1200 const BdrvChildRole *child_role)
df581792
KW
1201{
1202 BdrvChild *child = g_new(BdrvChild, 1);
1203 *child = (BdrvChild) {
1204 .bs = child_bs,
260fecf1 1205 .name = g_strdup(child_name),
df581792
KW
1206 .role = child_role,
1207 };
1208
1209 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
d42a8a93 1210 QLIST_INSERT_HEAD(&child_bs->parents, child, next_parent);
b4b059f6
KW
1211
1212 return child;
df581792
KW
1213}
1214
3f09bfbc 1215static void bdrv_detach_child(BdrvChild *child)
33a60407
KW
1216{
1217 QLIST_REMOVE(child, next);
d42a8a93 1218 QLIST_REMOVE(child, next_parent);
260fecf1 1219 g_free(child->name);
33a60407
KW
1220 g_free(child);
1221}
1222
1223void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
1224{
779020cb
KW
1225 BlockDriverState *child_bs;
1226
1227 if (child == NULL) {
1228 return;
1229 }
33a60407
KW
1230
1231 if (child->bs->inherits_from == parent) {
1232 child->bs->inherits_from = NULL;
1233 }
1234
779020cb 1235 child_bs = child->bs;
33a60407
KW
1236 bdrv_detach_child(child);
1237 bdrv_unref(child_bs);
1238}
1239
5db15a57
KW
1240/*
1241 * Sets the backing file link of a BDS. A new reference is created; callers
1242 * which don't need their own reference any more must call bdrv_unref().
1243 */
8d24cce1
FZ
1244void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd)
1245{
5db15a57
KW
1246 if (backing_hd) {
1247 bdrv_ref(backing_hd);
1248 }
8d24cce1 1249
760e0063 1250 if (bs->backing) {
826b6ca0 1251 assert(bs->backing_blocker);
760e0063 1252 bdrv_op_unblock_all(bs->backing->bs, bs->backing_blocker);
5db15a57 1253 bdrv_unref_child(bs, bs->backing);
826b6ca0
FZ
1254 } else if (backing_hd) {
1255 error_setg(&bs->backing_blocker,
81e5f78a
AG
1256 "node is used as backing hd of '%s'",
1257 bdrv_get_device_or_node_name(bs));
826b6ca0
FZ
1258 }
1259
8d24cce1 1260 if (!backing_hd) {
826b6ca0
FZ
1261 error_free(bs->backing_blocker);
1262 bs->backing_blocker = NULL;
760e0063 1263 bs->backing = NULL;
8d24cce1
FZ
1264 goto out;
1265 }
260fecf1 1266 bs->backing = bdrv_attach_child(bs, backing_hd, "backing", &child_backing);
8d24cce1
FZ
1267 bs->open_flags &= ~BDRV_O_NO_BACKING;
1268 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_hd->filename);
1269 pstrcpy(bs->backing_format, sizeof(bs->backing_format),
1270 backing_hd->drv ? backing_hd->drv->format_name : "");
826b6ca0 1271
760e0063 1272 bdrv_op_block_all(backing_hd, bs->backing_blocker);
826b6ca0 1273 /* Otherwise we won't be able to commit due to check in bdrv_commit */
760e0063 1274 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
826b6ca0 1275 bs->backing_blocker);
8d24cce1 1276out:
3baca891 1277 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
1278}
1279
31ca6d07
KW
1280/*
1281 * Opens the backing file for a BlockDriverState if not yet open
1282 *
d9b7b057
KW
1283 * bdref_key specifies the key for the image's BlockdevRef in the options QDict.
1284 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1285 * itself, all options starting with "${bdref_key}." are considered part of the
1286 * BlockdevRef.
1287 *
1288 * TODO Can this be unified with bdrv_open_image()?
31ca6d07 1289 */
d9b7b057
KW
1290int bdrv_open_backing_file(BlockDriverState *bs, QDict *parent_options,
1291 const char *bdref_key, Error **errp)
9156df12 1292{
1ba4b6a5 1293 char *backing_filename = g_malloc0(PATH_MAX);
d9b7b057
KW
1294 char *bdref_key_dot;
1295 const char *reference = NULL;
317fc44e 1296 int ret = 0;
8d24cce1 1297 BlockDriverState *backing_hd;
d9b7b057
KW
1298 QDict *options;
1299 QDict *tmp_parent_options = NULL;
34b5d2c6 1300 Error *local_err = NULL;
9156df12 1301
760e0063 1302 if (bs->backing != NULL) {
1ba4b6a5 1303 goto free_exit;
9156df12
PB
1304 }
1305
31ca6d07 1306 /* NULL means an empty set of options */
d9b7b057
KW
1307 if (parent_options == NULL) {
1308 tmp_parent_options = qdict_new();
1309 parent_options = tmp_parent_options;
31ca6d07
KW
1310 }
1311
9156df12 1312 bs->open_flags &= ~BDRV_O_NO_BACKING;
d9b7b057
KW
1313
1314 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1315 qdict_extract_subqdict(parent_options, &options, bdref_key_dot);
1316 g_free(bdref_key_dot);
1317
1318 reference = qdict_get_try_str(parent_options, bdref_key);
1319 if (reference || qdict_haskey(options, "file.filename")) {
1cb6f506
KW
1320 backing_filename[0] = '\0';
1321 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 1322 QDECREF(options);
1ba4b6a5 1323 goto free_exit;
dbecebdd 1324 } else {
9f07429e
HR
1325 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
1326 &local_err);
1327 if (local_err) {
1328 ret = -EINVAL;
1329 error_propagate(errp, local_err);
1330 QDECREF(options);
1331 goto free_exit;
1332 }
9156df12
PB
1333 }
1334
8ee79e70
KW
1335 if (!bs->drv || !bs->drv->supports_backing) {
1336 ret = -EINVAL;
1337 error_setg(errp, "Driver doesn't support backing files");
1338 QDECREF(options);
1339 goto free_exit;
1340 }
1341
c5f6e493
KW
1342 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
1343 qdict_put(options, "driver", qstring_from_str(bs->backing_format));
9156df12
PB
1344 }
1345
d9b7b057 1346 backing_hd = NULL;
f3930ed0
KW
1347 ret = bdrv_open_inherit(&backing_hd,
1348 *backing_filename ? backing_filename : NULL,
d9b7b057 1349 reference, options, 0, bs, &child_backing,
e43bfd9c 1350 errp);
9156df12 1351 if (ret < 0) {
9156df12 1352 bs->open_flags |= BDRV_O_NO_BACKING;
e43bfd9c 1353 error_prepend(errp, "Could not open backing file: ");
1ba4b6a5 1354 goto free_exit;
9156df12 1355 }
df581792 1356
5db15a57
KW
1357 /* Hook up the backing file link; drop our reference, bs owns the
1358 * backing_hd reference now */
8d24cce1 1359 bdrv_set_backing_hd(bs, backing_hd);
5db15a57 1360 bdrv_unref(backing_hd);
d80ac658 1361
d9b7b057
KW
1362 qdict_del(parent_options, bdref_key);
1363
1ba4b6a5
BC
1364free_exit:
1365 g_free(backing_filename);
d9b7b057 1366 QDECREF(tmp_parent_options);
1ba4b6a5 1367 return ret;
9156df12
PB
1368}
1369
da557aac
HR
1370/*
1371 * Opens a disk image whose options are given as BlockdevRef in another block
1372 * device's options.
1373 *
da557aac 1374 * If allow_none is true, no image will be opened if filename is false and no
b4b059f6 1375 * BlockdevRef is given. NULL will be returned, but errp remains unset.
da557aac
HR
1376 *
1377 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
1378 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1379 * itself, all options starting with "${bdref_key}." are considered part of the
1380 * BlockdevRef.
1381 *
1382 * The BlockdevRef will be removed from the options QDict.
1383 */
b4b059f6
KW
1384BdrvChild *bdrv_open_child(const char *filename,
1385 QDict *options, const char *bdref_key,
1386 BlockDriverState* parent,
1387 const BdrvChildRole *child_role,
1388 bool allow_none, Error **errp)
da557aac 1389{
b4b059f6
KW
1390 BdrvChild *c = NULL;
1391 BlockDriverState *bs;
da557aac
HR
1392 QDict *image_options;
1393 int ret;
1394 char *bdref_key_dot;
1395 const char *reference;
1396
df581792 1397 assert(child_role != NULL);
f67503e5 1398
da557aac
HR
1399 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1400 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
1401 g_free(bdref_key_dot);
1402
1403 reference = qdict_get_try_str(options, bdref_key);
1404 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 1405 if (!allow_none) {
da557aac
HR
1406 error_setg(errp, "A block device must be specified for \"%s\"",
1407 bdref_key);
da557aac 1408 }
b20e61e0 1409 QDECREF(image_options);
da557aac
HR
1410 goto done;
1411 }
1412
b4b059f6
KW
1413 bs = NULL;
1414 ret = bdrv_open_inherit(&bs, filename, reference, image_options, 0,
ce343771 1415 parent, child_role, errp);
df581792
KW
1416 if (ret < 0) {
1417 goto done;
1418 }
1419
260fecf1 1420 c = bdrv_attach_child(parent, bs, bdref_key, child_role);
da557aac
HR
1421
1422done:
1423 qdict_del(options, bdref_key);
b4b059f6
KW
1424 return c;
1425}
1426
6b8aeca5 1427int bdrv_append_temp_snapshot(BlockDriverState *bs, int flags, Error **errp)
b998875d
KW
1428{
1429 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 1430 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 1431 int64_t total_size;
83d0521a 1432 QemuOpts *opts = NULL;
b998875d
KW
1433 QDict *snapshot_options;
1434 BlockDriverState *bs_snapshot;
c2e0dbbf 1435 Error *local_err = NULL;
b998875d
KW
1436 int ret;
1437
1438 /* if snapshot, we create a temporary backing file and open it
1439 instead of opening 'filename' directly */
1440
1441 /* Get the required size from the image */
f187743a
KW
1442 total_size = bdrv_getlength(bs);
1443 if (total_size < 0) {
6b8aeca5 1444 ret = total_size;
f187743a 1445 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 1446 goto out;
f187743a 1447 }
b998875d
KW
1448
1449 /* Create the temporary image */
1ba4b6a5 1450 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
1451 if (ret < 0) {
1452 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 1453 goto out;
b998875d
KW
1454 }
1455
ef810437 1456 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 1457 &error_abort);
39101f25 1458 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
e43bfd9c 1459 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, errp);
83d0521a 1460 qemu_opts_del(opts);
b998875d 1461 if (ret < 0) {
e43bfd9c
MA
1462 error_prepend(errp, "Could not create temporary overlay '%s': ",
1463 tmp_filename);
1ba4b6a5 1464 goto out;
b998875d
KW
1465 }
1466
1467 /* Prepare a new options QDict for the temporary file */
1468 snapshot_options = qdict_new();
1469 qdict_put(snapshot_options, "file.driver",
1470 qstring_from_str("file"));
1471 qdict_put(snapshot_options, "file.filename",
1472 qstring_from_str(tmp_filename));
e6641719
HR
1473 qdict_put(snapshot_options, "driver",
1474 qstring_from_str("qcow2"));
b998875d 1475
e4e9986b 1476 bs_snapshot = bdrv_new();
b998875d
KW
1477
1478 ret = bdrv_open(&bs_snapshot, NULL, NULL, snapshot_options,
6ebf9aa2 1479 flags, &local_err);
b998875d
KW
1480 if (ret < 0) {
1481 error_propagate(errp, local_err);
1ba4b6a5 1482 goto out;
b998875d
KW
1483 }
1484
1485 bdrv_append(bs_snapshot, bs);
1ba4b6a5
BC
1486
1487out:
1488 g_free(tmp_filename);
6b8aeca5 1489 return ret;
b998875d
KW
1490}
1491
b6ce07aa
KW
1492/*
1493 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
1494 *
1495 * options is a QDict of options to pass to the block drivers, or NULL for an
1496 * empty set of options. The reference to the QDict belongs to the block layer
1497 * after the call (even on failure), so if the caller intends to reuse the
1498 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
1499 *
1500 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
1501 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
1502 *
1503 * The reference parameter may be used to specify an existing block device which
1504 * should be opened. If specified, neither options nor a filename may be given,
1505 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 1506 */
f3930ed0
KW
1507static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
1508 const char *reference, QDict *options, int flags,
1509 BlockDriverState *parent,
ce343771 1510 const BdrvChildRole *child_role, Error **errp)
ea2384d3 1511{
b6ce07aa 1512 int ret;
9a4f4c31
KW
1513 BdrvChild *file = NULL;
1514 BlockDriverState *bs;
ce343771 1515 BlockDriver *drv = NULL;
74fe54f2 1516 const char *drvname;
3e8c2e57 1517 const char *backing;
34b5d2c6 1518 Error *local_err = NULL;
b1e6fc08 1519 int snapshot_flags = 0;
712e7874 1520
f67503e5 1521 assert(pbs);
f3930ed0
KW
1522 assert(!child_role || !flags);
1523 assert(!child_role == !parent);
f67503e5 1524
ddf5636d
HR
1525 if (reference) {
1526 bool options_non_empty = options ? qdict_size(options) : false;
1527 QDECREF(options);
1528
1529 if (*pbs) {
1530 error_setg(errp, "Cannot reuse an existing BDS when referencing "
1531 "another block device");
1532 return -EINVAL;
1533 }
1534
1535 if (filename || options_non_empty) {
1536 error_setg(errp, "Cannot reference an existing block device with "
1537 "additional options or a new filename");
1538 return -EINVAL;
1539 }
1540
1541 bs = bdrv_lookup_bs(reference, reference, errp);
1542 if (!bs) {
1543 return -ENODEV;
1544 }
1545 bdrv_ref(bs);
1546 *pbs = bs;
1547 return 0;
1548 }
1549
f67503e5
HR
1550 if (*pbs) {
1551 bs = *pbs;
1552 } else {
e4e9986b 1553 bs = bdrv_new();
f67503e5
HR
1554 }
1555
de9c0cec
KW
1556 /* NULL means an empty set of options */
1557 if (options == NULL) {
1558 options = qdict_new();
1559 }
1560
145f598e 1561 /* json: syntax counts as explicit options, as if in the QDict */
de3b53f0
KW
1562 parse_json_protocol(options, &filename, &local_err);
1563 if (local_err) {
1564 ret = -EINVAL;
1565 goto fail;
1566 }
1567
145f598e
KW
1568 bs->explicit_options = qdict_clone_shallow(options);
1569
f3930ed0 1570 if (child_role) {
bddcec37 1571 bs->inherits_from = parent;
8e2160e2
KW
1572 child_role->inherit_options(&flags, options,
1573 parent->open_flags, parent->options);
f3930ed0
KW
1574 }
1575
de3b53f0 1576 ret = bdrv_fill_options(&options, filename, &flags, &local_err);
462f5bcf
KW
1577 if (local_err) {
1578 goto fail;
1579 }
1580
62392ebb
KW
1581 bs->open_flags = flags;
1582 bs->options = options;
1583 options = qdict_clone_shallow(options);
1584
76c591b0 1585 /* Find the right image format driver */
76c591b0
KW
1586 drvname = qdict_get_try_str(options, "driver");
1587 if (drvname) {
1588 drv = bdrv_find_format(drvname);
76c591b0
KW
1589 if (!drv) {
1590 error_setg(errp, "Unknown driver: '%s'", drvname);
1591 ret = -EINVAL;
1592 goto fail;
1593 }
1594 }
1595
1596 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 1597
3e8c2e57
AG
1598 backing = qdict_get_try_str(options, "backing");
1599 if (backing && *backing == '\0') {
1600 flags |= BDRV_O_NO_BACKING;
1601 qdict_del(options, "backing");
1602 }
1603
f500a6d3 1604 /* Open image file without format layer */
f4788adc
KW
1605 if ((flags & BDRV_O_PROTOCOL) == 0) {
1606 if (flags & BDRV_O_RDWR) {
1607 flags |= BDRV_O_ALLOW_RDWR;
1608 }
1609 if (flags & BDRV_O_SNAPSHOT) {
1610 snapshot_flags = bdrv_temp_snapshot_flags(flags);
8e2160e2 1611 bdrv_backing_options(&flags, options, flags, options);
f4788adc 1612 }
f500a6d3 1613
f3930ed0 1614 bs->open_flags = flags;
1fdd6933 1615
9a4f4c31
KW
1616 file = bdrv_open_child(filename, options, "file", bs,
1617 &child_file, true, &local_err);
1fdd6933
KW
1618 if (local_err) {
1619 ret = -EINVAL;
f4788adc
KW
1620 goto fail;
1621 }
f500a6d3
KW
1622 }
1623
76c591b0 1624 /* Image format probing */
38f3ef57 1625 bs->probed = !drv;
76c591b0 1626 if (!drv && file) {
9a4f4c31 1627 ret = find_image_format(file->bs, filename, &drv, &local_err);
17b005f1 1628 if (ret < 0) {
8bfea15d 1629 goto fail;
2a05cbe4 1630 }
62392ebb
KW
1631 /*
1632 * This option update would logically belong in bdrv_fill_options(),
1633 * but we first need to open bs->file for the probing to work, while
1634 * opening bs->file already requires the (mostly) final set of options
1635 * so that cache mode etc. can be inherited.
1636 *
1637 * Adding the driver later is somewhat ugly, but it's not an option
1638 * that would ever be inherited, so it's correct. We just need to make
1639 * sure to update both bs->options (which has the full effective
1640 * options for bs) and options (which has file.* already removed).
1641 */
1642 qdict_put(bs->options, "driver", qstring_from_str(drv->format_name));
1643 qdict_put(options, "driver", qstring_from_str(drv->format_name));
76c591b0 1644 } else if (!drv) {
17b005f1
KW
1645 error_setg(errp, "Must specify either driver or file");
1646 ret = -EINVAL;
8bfea15d 1647 goto fail;
ea2384d3 1648 }
b6ce07aa 1649
53a29513
HR
1650 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
1651 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
1652 /* file must be NULL if a protocol BDS is about to be created
1653 * (the inverse results in an error message from bdrv_open_common()) */
1654 assert(!(flags & BDRV_O_PROTOCOL) || !file);
1655
b6ce07aa 1656 /* Open the image */
82dc8b41 1657 ret = bdrv_open_common(bs, file, options, &local_err);
b6ce07aa 1658 if (ret < 0) {
8bfea15d 1659 goto fail;
6987307c
CH
1660 }
1661
2a05cbe4 1662 if (file && (bs->file != file)) {
9a4f4c31 1663 bdrv_unref_child(bs, file);
f500a6d3
KW
1664 file = NULL;
1665 }
1666
b6ce07aa 1667 /* If there is a backing file, use it */
9156df12 1668 if ((flags & BDRV_O_NO_BACKING) == 0) {
d9b7b057 1669 ret = bdrv_open_backing_file(bs, options, "backing", &local_err);
b6ce07aa 1670 if (ret < 0) {
b6ad491a 1671 goto close_and_fail;
b6ce07aa 1672 }
b6ce07aa
KW
1673 }
1674
91af7014
HR
1675 bdrv_refresh_filename(bs);
1676
b6ad491a 1677 /* Check if any unknown options were used */
5acd9d81 1678 if (options && (qdict_size(options) != 0)) {
b6ad491a 1679 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
1680 if (flags & BDRV_O_PROTOCOL) {
1681 error_setg(errp, "Block protocol '%s' doesn't support the option "
1682 "'%s'", drv->format_name, entry->key);
1683 } else {
1684 error_setg(errp, "Block format '%s' used by device '%s' doesn't "
1685 "support the option '%s'", drv->format_name,
bfb197e0 1686 bdrv_get_device_name(bs), entry->key);
5acd9d81 1687 }
b6ad491a
KW
1688
1689 ret = -EINVAL;
1690 goto close_and_fail;
1691 }
b6ad491a 1692
b6ce07aa 1693 if (!bdrv_key_required(bs)) {
a7f53e26
MA
1694 if (bs->blk) {
1695 blk_dev_change_media_cb(bs->blk, true);
1696 }
c3adb58f
MA
1697 } else if (!runstate_check(RUN_STATE_PRELAUNCH)
1698 && !runstate_check(RUN_STATE_INMIGRATE)
1699 && !runstate_check(RUN_STATE_PAUSED)) { /* HACK */
1700 error_setg(errp,
1701 "Guest must be stopped for opening of encrypted image");
1702 ret = -EBUSY;
1703 goto close_and_fail;
b6ce07aa
KW
1704 }
1705
c3adb58f 1706 QDECREF(options);
f67503e5 1707 *pbs = bs;
dd62f1ca
KW
1708
1709 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
1710 * temporary snapshot afterwards. */
1711 if (snapshot_flags) {
1712 ret = bdrv_append_temp_snapshot(bs, snapshot_flags, &local_err);
1713 if (local_err) {
1714 goto close_and_fail;
1715 }
1716 }
1717
b6ce07aa
KW
1718 return 0;
1719
8bfea15d 1720fail:
f500a6d3 1721 if (file != NULL) {
9a4f4c31 1722 bdrv_unref_child(bs, file);
f500a6d3 1723 }
145f598e 1724 QDECREF(bs->explicit_options);
de9c0cec 1725 QDECREF(bs->options);
b6ad491a 1726 QDECREF(options);
de9c0cec 1727 bs->options = NULL;
f67503e5
HR
1728 if (!*pbs) {
1729 /* If *pbs is NULL, a new BDS has been created in this function and
1730 needs to be freed now. Otherwise, it does not need to be closed,
1731 since it has not really been opened yet. */
1732 bdrv_unref(bs);
1733 }
84d18f06 1734 if (local_err) {
34b5d2c6
HR
1735 error_propagate(errp, local_err);
1736 }
b6ad491a 1737 return ret;
de9c0cec 1738
b6ad491a 1739close_and_fail:
f67503e5
HR
1740 /* See fail path, but now the BDS has to be always closed */
1741 if (*pbs) {
1742 bdrv_close(bs);
1743 } else {
1744 bdrv_unref(bs);
1745 }
b6ad491a 1746 QDECREF(options);
84d18f06 1747 if (local_err) {
34b5d2c6
HR
1748 error_propagate(errp, local_err);
1749 }
b6ce07aa
KW
1750 return ret;
1751}
1752
f3930ed0 1753int bdrv_open(BlockDriverState **pbs, const char *filename,
6ebf9aa2 1754 const char *reference, QDict *options, int flags, Error **errp)
f3930ed0
KW
1755{
1756 return bdrv_open_inherit(pbs, filename, reference, options, flags, NULL,
ce343771 1757 NULL, errp);
f3930ed0
KW
1758}
1759
e971aa12
JC
1760typedef struct BlockReopenQueueEntry {
1761 bool prepared;
1762 BDRVReopenState state;
1763 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
1764} BlockReopenQueueEntry;
1765
1766/*
1767 * Adds a BlockDriverState to a simple queue for an atomic, transactional
1768 * reopen of multiple devices.
1769 *
1770 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
1771 * already performed, or alternatively may be NULL a new BlockReopenQueue will
1772 * be created and initialized. This newly created BlockReopenQueue should be
1773 * passed back in for subsequent calls that are intended to be of the same
1774 * atomic 'set'.
1775 *
1776 * bs is the BlockDriverState to add to the reopen queue.
1777 *
4d2cb092
KW
1778 * options contains the changed options for the associated bs
1779 * (the BlockReopenQueue takes ownership)
1780 *
e971aa12
JC
1781 * flags contains the open flags for the associated bs
1782 *
1783 * returns a pointer to bs_queue, which is either the newly allocated
1784 * bs_queue, or the existing bs_queue being used.
1785 *
1786 */
28518102
KW
1787static BlockReopenQueue *bdrv_reopen_queue_child(BlockReopenQueue *bs_queue,
1788 BlockDriverState *bs,
1789 QDict *options,
1790 int flags,
1791 const BdrvChildRole *role,
1792 QDict *parent_options,
1793 int parent_flags)
e971aa12
JC
1794{
1795 assert(bs != NULL);
1796
1797 BlockReopenQueueEntry *bs_entry;
67251a31 1798 BdrvChild *child;
145f598e 1799 QDict *old_options, *explicit_options;
67251a31 1800
e971aa12
JC
1801 if (bs_queue == NULL) {
1802 bs_queue = g_new0(BlockReopenQueue, 1);
1803 QSIMPLEQ_INIT(bs_queue);
1804 }
1805
4d2cb092
KW
1806 if (!options) {
1807 options = qdict_new();
1808 }
1809
28518102
KW
1810 /*
1811 * Precedence of options:
1812 * 1. Explicitly passed in options (highest)
91a097e7 1813 * 2. Set in flags (only for top level)
145f598e 1814 * 3. Retained from explicitly set options of bs
8e2160e2 1815 * 4. Inherited from parent node
28518102
KW
1816 * 5. Retained from effective options of bs
1817 */
1818
91a097e7
KW
1819 if (!parent_options) {
1820 /*
1821 * Any setting represented by flags is always updated. If the
1822 * corresponding QDict option is set, it takes precedence. Otherwise
1823 * the flag is translated into a QDict option. The old setting of bs is
1824 * not considered.
1825 */
1826 update_options_from_flags(options, flags);
1827 }
1828
145f598e
KW
1829 /* Old explicitly set values (don't overwrite by inherited value) */
1830 old_options = qdict_clone_shallow(bs->explicit_options);
1831 bdrv_join_options(bs, options, old_options);
1832 QDECREF(old_options);
1833
1834 explicit_options = qdict_clone_shallow(options);
1835
28518102
KW
1836 /* Inherit from parent node */
1837 if (parent_options) {
1838 assert(!flags);
8e2160e2 1839 role->inherit_options(&flags, options, parent_flags, parent_options);
28518102
KW
1840 }
1841
1842 /* Old values are used for options that aren't set yet */
4d2cb092 1843 old_options = qdict_clone_shallow(bs->options);
cddff5ba 1844 bdrv_join_options(bs, options, old_options);
4d2cb092
KW
1845 QDECREF(old_options);
1846
f1f25a2e
KW
1847 /* bdrv_open() masks this flag out */
1848 flags &= ~BDRV_O_PROTOCOL;
1849
67251a31 1850 QLIST_FOREACH(child, &bs->children, next) {
4c9dfe5d
KW
1851 QDict *new_child_options;
1852 char *child_key_dot;
67251a31 1853
4c9dfe5d
KW
1854 /* reopen can only change the options of block devices that were
1855 * implicitly created and inherited options. For other (referenced)
1856 * block devices, a syntax like "backing.foo" results in an error. */
67251a31
KW
1857 if (child->bs->inherits_from != bs) {
1858 continue;
1859 }
1860
4c9dfe5d
KW
1861 child_key_dot = g_strdup_printf("%s.", child->name);
1862 qdict_extract_subqdict(options, &new_child_options, child_key_dot);
1863 g_free(child_key_dot);
1864
28518102
KW
1865 bdrv_reopen_queue_child(bs_queue, child->bs, new_child_options, 0,
1866 child->role, options, flags);
e971aa12
JC
1867 }
1868
1869 bs_entry = g_new0(BlockReopenQueueEntry, 1);
1870 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
1871
1872 bs_entry->state.bs = bs;
4d2cb092 1873 bs_entry->state.options = options;
145f598e 1874 bs_entry->state.explicit_options = explicit_options;
e971aa12
JC
1875 bs_entry->state.flags = flags;
1876
1877 return bs_queue;
1878}
1879
28518102
KW
1880BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
1881 BlockDriverState *bs,
1882 QDict *options, int flags)
1883{
1884 return bdrv_reopen_queue_child(bs_queue, bs, options, flags,
1885 NULL, NULL, 0);
1886}
1887
e971aa12
JC
1888/*
1889 * Reopen multiple BlockDriverStates atomically & transactionally.
1890 *
1891 * The queue passed in (bs_queue) must have been built up previous
1892 * via bdrv_reopen_queue().
1893 *
1894 * Reopens all BDS specified in the queue, with the appropriate
1895 * flags. All devices are prepared for reopen, and failure of any
1896 * device will cause all device changes to be abandonded, and intermediate
1897 * data cleaned up.
1898 *
1899 * If all devices prepare successfully, then the changes are committed
1900 * to all devices.
1901 *
1902 */
1903int bdrv_reopen_multiple(BlockReopenQueue *bs_queue, Error **errp)
1904{
1905 int ret = -1;
1906 BlockReopenQueueEntry *bs_entry, *next;
1907 Error *local_err = NULL;
1908
1909 assert(bs_queue != NULL);
1910
1911 bdrv_drain_all();
1912
1913 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1914 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
1915 error_propagate(errp, local_err);
1916 goto cleanup;
1917 }
1918 bs_entry->prepared = true;
1919 }
1920
1921 /* If we reach this point, we have success and just need to apply the
1922 * changes
1923 */
1924 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1925 bdrv_reopen_commit(&bs_entry->state);
1926 }
1927
1928 ret = 0;
1929
1930cleanup:
1931 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
1932 if (ret && bs_entry->prepared) {
1933 bdrv_reopen_abort(&bs_entry->state);
145f598e
KW
1934 } else if (ret) {
1935 QDECREF(bs_entry->state.explicit_options);
e971aa12 1936 }
4d2cb092 1937 QDECREF(bs_entry->state.options);
e971aa12
JC
1938 g_free(bs_entry);
1939 }
1940 g_free(bs_queue);
1941 return ret;
1942}
1943
1944
1945/* Reopen a single BlockDriverState with the specified flags. */
1946int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
1947{
1948 int ret = -1;
1949 Error *local_err = NULL;
4d2cb092 1950 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12
JC
1951
1952 ret = bdrv_reopen_multiple(queue, &local_err);
1953 if (local_err != NULL) {
1954 error_propagate(errp, local_err);
1955 }
1956 return ret;
1957}
1958
1959
1960/*
1961 * Prepares a BlockDriverState for reopen. All changes are staged in the
1962 * 'opaque' field of the BDRVReopenState, which is used and allocated by
1963 * the block driver layer .bdrv_reopen_prepare()
1964 *
1965 * bs is the BlockDriverState to reopen
1966 * flags are the new open flags
1967 * queue is the reopen queue
1968 *
1969 * Returns 0 on success, non-zero on error. On error errp will be set
1970 * as well.
1971 *
1972 * On failure, bdrv_reopen_abort() will be called to clean up any data.
1973 * It is the responsibility of the caller to then call the abort() or
1974 * commit() for any other BDS that have been left in a prepare() state
1975 *
1976 */
1977int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
1978 Error **errp)
1979{
1980 int ret = -1;
1981 Error *local_err = NULL;
1982 BlockDriver *drv;
ccf9dc07
KW
1983 QemuOpts *opts;
1984 const char *value;
e971aa12
JC
1985
1986 assert(reopen_state != NULL);
1987 assert(reopen_state->bs->drv != NULL);
1988 drv = reopen_state->bs->drv;
1989
ccf9dc07
KW
1990 /* Process generic block layer options */
1991 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
1992 qemu_opts_absorb_qdict(opts, reopen_state->options, &local_err);
1993 if (local_err) {
1994 error_propagate(errp, local_err);
1995 ret = -EINVAL;
1996 goto error;
1997 }
1998
91a097e7
KW
1999 update_flags_from_options(&reopen_state->flags, opts);
2000
2001 /* If a guest device is attached, it owns WCE */
2002 if (reopen_state->bs->blk && blk_get_attached_dev(reopen_state->bs->blk)) {
2003 bool old_wce = bdrv_enable_write_cache(reopen_state->bs);
2004 bool new_wce = (reopen_state->flags & BDRV_O_CACHE_WB);
2005 if (old_wce != new_wce) {
2006 error_setg(errp, "Cannot change cache.writeback: Device attached");
2007 ret = -EINVAL;
2008 goto error;
2009 }
2010 }
2011
ccf9dc07
KW
2012 /* node-name and driver must be unchanged. Put them back into the QDict, so
2013 * that they are checked at the end of this function. */
2014 value = qemu_opt_get(opts, "node-name");
2015 if (value) {
2016 qdict_put(reopen_state->options, "node-name", qstring_from_str(value));
2017 }
2018
2019 value = qemu_opt_get(opts, "driver");
2020 if (value) {
2021 qdict_put(reopen_state->options, "driver", qstring_from_str(value));
2022 }
2023
e971aa12
JC
2024 /* if we are to stay read-only, do not allow permission change
2025 * to r/w */
2026 if (!(reopen_state->bs->open_flags & BDRV_O_ALLOW_RDWR) &&
2027 reopen_state->flags & BDRV_O_RDWR) {
81e5f78a
AG
2028 error_setg(errp, "Node '%s' is read only",
2029 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
2030 goto error;
2031 }
2032
2033
2034 ret = bdrv_flush(reopen_state->bs);
2035 if (ret) {
455b0fde 2036 error_setg_errno(errp, -ret, "Error flushing drive");
e971aa12
JC
2037 goto error;
2038 }
2039
2040 if (drv->bdrv_reopen_prepare) {
2041 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
2042 if (ret) {
2043 if (local_err != NULL) {
2044 error_propagate(errp, local_err);
2045 } else {
d8b6895f
LC
2046 error_setg(errp, "failed while preparing to reopen image '%s'",
2047 reopen_state->bs->filename);
e971aa12
JC
2048 }
2049 goto error;
2050 }
2051 } else {
2052 /* It is currently mandatory to have a bdrv_reopen_prepare()
2053 * handler for each supported drv. */
81e5f78a
AG
2054 error_setg(errp, "Block format '%s' used by node '%s' "
2055 "does not support reopening files", drv->format_name,
2056 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
2057 ret = -1;
2058 goto error;
2059 }
2060
4d2cb092
KW
2061 /* Options that are not handled are only okay if they are unchanged
2062 * compared to the old state. It is expected that some options are only
2063 * used for the initial open, but not reopen (e.g. filename) */
2064 if (qdict_size(reopen_state->options)) {
2065 const QDictEntry *entry = qdict_first(reopen_state->options);
2066
2067 do {
2068 QString *new_obj = qobject_to_qstring(entry->value);
2069 const char *new = qstring_get_str(new_obj);
2070 const char *old = qdict_get_try_str(reopen_state->bs->options,
2071 entry->key);
2072
2073 if (!old || strcmp(new, old)) {
2074 error_setg(errp, "Cannot change the option '%s'", entry->key);
2075 ret = -EINVAL;
2076 goto error;
2077 }
2078 } while ((entry = qdict_next(reopen_state->options, entry)));
2079 }
2080
e971aa12
JC
2081 ret = 0;
2082
2083error:
ccf9dc07 2084 qemu_opts_del(opts);
e971aa12
JC
2085 return ret;
2086}
2087
2088/*
2089 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
2090 * makes them final by swapping the staging BlockDriverState contents into
2091 * the active BlockDriverState contents.
2092 */
2093void bdrv_reopen_commit(BDRVReopenState *reopen_state)
2094{
2095 BlockDriver *drv;
2096
2097 assert(reopen_state != NULL);
2098 drv = reopen_state->bs->drv;
2099 assert(drv != NULL);
2100
2101 /* If there are any driver level actions to take */
2102 if (drv->bdrv_reopen_commit) {
2103 drv->bdrv_reopen_commit(reopen_state);
2104 }
2105
2106 /* set BDS specific flags now */
145f598e
KW
2107 QDECREF(reopen_state->bs->explicit_options);
2108
2109 reopen_state->bs->explicit_options = reopen_state->explicit_options;
e971aa12
JC
2110 reopen_state->bs->open_flags = reopen_state->flags;
2111 reopen_state->bs->enable_write_cache = !!(reopen_state->flags &
2112 BDRV_O_CACHE_WB);
2113 reopen_state->bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 2114
3baca891 2115 bdrv_refresh_limits(reopen_state->bs, NULL);
e971aa12
JC
2116}
2117
2118/*
2119 * Abort the reopen, and delete and free the staged changes in
2120 * reopen_state
2121 */
2122void bdrv_reopen_abort(BDRVReopenState *reopen_state)
2123{
2124 BlockDriver *drv;
2125
2126 assert(reopen_state != NULL);
2127 drv = reopen_state->bs->drv;
2128 assert(drv != NULL);
2129
2130 if (drv->bdrv_reopen_abort) {
2131 drv->bdrv_reopen_abort(reopen_state);
2132 }
145f598e
KW
2133
2134 QDECREF(reopen_state->explicit_options);
e971aa12
JC
2135}
2136
2137
64dff520 2138static void bdrv_close(BlockDriverState *bs)
fc01f7e7 2139{
33384421
HR
2140 BdrvAioNotifier *ban, *ban_next;
2141
ca9bd24c 2142 assert(!bs->job);
99b7e775
AG
2143
2144 /* Disable I/O limits and drain all pending throttled requests */
a0d64a61 2145 if (bs->throttle_state) {
99b7e775
AG
2146 bdrv_io_limits_disable(bs);
2147 }
2148
fc27291d 2149 bdrv_drained_begin(bs); /* complete I/O */
58fda173 2150 bdrv_flush(bs);
53ec73e2 2151 bdrv_drain(bs); /* in case flush left pending I/O */
fc27291d 2152
c5acdc9a
HR
2153 bdrv_release_named_dirty_bitmaps(bs);
2154 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
2155
b4d02820
HR
2156 if (bs->blk) {
2157 blk_dev_change_media_cb(bs->blk, false);
2158 }
2159
3cbc002c 2160 if (bs->drv) {
6e93e7c4
KW
2161 BdrvChild *child, *next;
2162
9a7dedbc 2163 bs->drv->bdrv_close(bs);
9a4f4c31 2164 bs->drv = NULL;
9a7dedbc 2165
5db15a57 2166 bdrv_set_backing_hd(bs, NULL);
9a7dedbc 2167
9a4f4c31
KW
2168 if (bs->file != NULL) {
2169 bdrv_unref_child(bs, bs->file);
2170 bs->file = NULL;
2171 }
2172
6e93e7c4 2173 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
2174 /* TODO Remove bdrv_unref() from drivers' close function and use
2175 * bdrv_unref_child() here */
bddcec37
KW
2176 if (child->bs->inherits_from == bs) {
2177 child->bs->inherits_from = NULL;
2178 }
33a60407 2179 bdrv_detach_child(child);
6e93e7c4
KW
2180 }
2181
7267c094 2182 g_free(bs->opaque);
ea2384d3 2183 bs->opaque = NULL;
53fec9d3 2184 bs->copy_on_read = 0;
a275fa42
PB
2185 bs->backing_file[0] = '\0';
2186 bs->backing_format[0] = '\0';
6405875c
PB
2187 bs->total_sectors = 0;
2188 bs->encrypted = 0;
2189 bs->valid_key = 0;
2190 bs->sg = 0;
0d51b4de 2191 bs->zero_beyond_eof = false;
de9c0cec 2192 QDECREF(bs->options);
145f598e 2193 QDECREF(bs->explicit_options);
de9c0cec 2194 bs->options = NULL;
91af7014
HR
2195 QDECREF(bs->full_open_options);
2196 bs->full_open_options = NULL;
b338082b 2197 }
98f90dba 2198
33384421
HR
2199 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
2200 g_free(ban);
2201 }
2202 QLIST_INIT(&bs->aio_notifiers);
fc27291d 2203 bdrv_drained_end(bs);
b338082b
FB
2204}
2205
2bc93fed
MK
2206void bdrv_close_all(void)
2207{
2208 BlockDriverState *bs;
ca9bd24c
HR
2209 AioContext *aio_context;
2210
2211 /* Drop references from requests still in flight, such as canceled block
2212 * jobs whose AIO context has not been polled yet */
2213 bdrv_drain_all();
2bc93fed 2214
ca9bd24c
HR
2215 blk_remove_all_bs();
2216 blockdev_close_all_bdrv_states();
ed78cda3 2217
ca9bd24c
HR
2218 /* Cancel all block jobs */
2219 while (!QTAILQ_EMPTY(&all_bdrv_states)) {
2220 QTAILQ_FOREACH(bs, &all_bdrv_states, bs_list) {
2221 aio_context = bdrv_get_aio_context(bs);
2222
2223 aio_context_acquire(aio_context);
2224 if (bs->job) {
2225 block_job_cancel_sync(bs->job);
2226 aio_context_release(aio_context);
2227 break;
2228 }
2229 aio_context_release(aio_context);
2230 }
2231
2232 /* All the remaining BlockDriverStates are referenced directly or
2233 * indirectly from block jobs, so there needs to be at least one BDS
2234 * directly used by a block job */
2235 assert(bs);
2bc93fed
MK
2236 }
2237}
2238
f8aa905a
JC
2239/* Note that bs->device_list.tqe_prev is initially null,
2240 * and gets set to non-null by QTAILQ_INSERT_TAIL(). Establish
2241 * the useful invariant "bs in bdrv_states iff bs->tqe_prev" by
2242 * resetting it to null on remove. */
2243void bdrv_device_remove(BlockDriverState *bs)
2244{
2245 QTAILQ_REMOVE(&bdrv_states, bs, device_list);
2246 bs->device_list.tqe_prev = NULL;
2247}
2248
dc364f4c
BC
2249/* make a BlockDriverState anonymous by removing from bdrv_state and
2250 * graph_bdrv_state list.
d22b2f41
RH
2251 Also, NULL terminate the device_name to prevent double remove */
2252void bdrv_make_anon(BlockDriverState *bs)
2253{
f8aa905a
JC
2254 /* Take care to remove bs from bdrv_states only when it's actually
2255 * in it. */
bfb197e0 2256 if (bs->device_list.tqe_prev) {
f8aa905a 2257 bdrv_device_remove(bs);
d22b2f41 2258 }
dc364f4c
BC
2259 if (bs->node_name[0] != '\0') {
2260 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
2261 }
2262 bs->node_name[0] = '\0';
d22b2f41
RH
2263}
2264
8e419aef 2265/* Fields that need to stay with the top-level BDS */
4ddc07ca
PB
2266static void bdrv_move_feature_fields(BlockDriverState *bs_dest,
2267 BlockDriverState *bs_src)
8802d1fd 2268{
4ddc07ca 2269 /* move some fields that need to stay attached to the device */
8802d1fd
JC
2270
2271 /* dev info */
4ddc07ca 2272 bs_dest->copy_on_read = bs_src->copy_on_read;
8802d1fd 2273
4ddc07ca 2274 bs_dest->enable_write_cache = bs_src->enable_write_cache;
c4a248a1 2275
a9fc4408 2276 /* dirty bitmap */
e4654d2d 2277 bs_dest->dirty_bitmaps = bs_src->dirty_bitmaps;
063dd40e 2278}
a9fc4408 2279
dd62f1ca
KW
2280static void change_parent_backing_link(BlockDriverState *from,
2281 BlockDriverState *to)
2282{
2283 BdrvChild *c, *next;
2284
2285 QLIST_FOREACH_SAFE(c, &from->parents, next_parent, next) {
2286 assert(c->role != &child_backing);
2287 c->bs = to;
2288 QLIST_REMOVE(c, next_parent);
2289 QLIST_INSERT_HEAD(&to->parents, c, next_parent);
2290 bdrv_ref(to);
2291 bdrv_unref(from);
2292 }
2293 if (from->blk) {
2294 blk_set_bs(from->blk, to);
2295 if (!to->device_list.tqe_prev) {
2296 QTAILQ_INSERT_BEFORE(from, to, device_list);
2297 }
f8aa905a 2298 bdrv_device_remove(from);
dd62f1ca
KW
2299 }
2300}
2301
2302static void swap_feature_fields(BlockDriverState *bs_top,
2303 BlockDriverState *bs_new)
2304{
2305 BlockDriverState tmp;
2306
2307 bdrv_move_feature_fields(&tmp, bs_top);
2308 bdrv_move_feature_fields(bs_top, bs_new);
2309 bdrv_move_feature_fields(bs_new, &tmp);
2310
2311 assert(!bs_new->throttle_state);
2312 if (bs_top->throttle_state) {
2313 assert(bs_top->io_limits_enabled);
2314 bdrv_io_limits_enable(bs_new, throttle_group_get_name(bs_top));
2315 bdrv_io_limits_disable(bs_top);
2316 }
2317}
2318
4ddc07ca
PB
2319/*
2320 * Add new bs contents at the top of an image chain while the chain is
2321 * live, while keeping required fields on the top layer.
2322 *
2323 * This will modify the BlockDriverState fields, and swap contents
2324 * between bs_new and bs_top. Both bs_new and bs_top are modified.
2325 *
bfb197e0 2326 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2327 *
2328 * This function does not create any image files.
dd62f1ca
KW
2329 *
2330 * bdrv_append() takes ownership of a bs_new reference and unrefs it because
2331 * that's what the callers commonly need. bs_new will be referenced by the old
2332 * parents of bs_top after bdrv_append() returns. If the caller needs to keep a
2333 * reference of its own, it must call bdrv_ref().
4ddc07ca
PB
2334 */
2335void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top)
2336{
dd62f1ca
KW
2337 assert(!bdrv_requests_pending(bs_top));
2338 assert(!bdrv_requests_pending(bs_new));
2339
2340 bdrv_ref(bs_top);
2341 change_parent_backing_link(bs_top, bs_new);
2342
2343 /* Some fields always stay on top of the backing file chain */
2344 swap_feature_fields(bs_top, bs_new);
2345
2346 bdrv_set_backing_hd(bs_new, bs_top);
2347 bdrv_unref(bs_top);
4ddc07ca 2348
dd62f1ca
KW
2349 /* bs_new is now referenced by its new parents, we don't need the
2350 * additional reference any more. */
2351 bdrv_unref(bs_new);
8802d1fd
JC
2352}
2353
3f09bfbc
KW
2354void bdrv_replace_in_backing_chain(BlockDriverState *old, BlockDriverState *new)
2355{
2356 assert(!bdrv_requests_pending(old));
2357 assert(!bdrv_requests_pending(new));
2358
2359 bdrv_ref(old);
2360
2361 if (old->blk) {
2362 /* As long as these fields aren't in BlockBackend, but in the top-level
2363 * BlockDriverState, it's not possible for a BDS to have two BBs.
2364 *
2365 * We really want to copy the fields from old to new, but we go for a
2366 * swap instead so that pointers aren't duplicated and cause trouble.
2367 * (Also, bdrv_swap() used to do the same.) */
2368 assert(!new->blk);
2369 swap_feature_fields(old, new);
2370 }
2371 change_parent_backing_link(old, new);
2372
2373 /* Change backing files if a previously independent node is added to the
2374 * chain. For active commit, we replace top by its own (indirect) backing
2375 * file and don't do anything here so we don't build a loop. */
2376 if (new->backing == NULL && !bdrv_chain_contains(backing_bs(old), new)) {
2377 bdrv_set_backing_hd(new, backing_bs(old));
2378 bdrv_set_backing_hd(old, NULL);
2379 }
2380
2381 bdrv_unref(old);
2382}
2383
4f6fd349 2384static void bdrv_delete(BlockDriverState *bs)
b338082b 2385{
3e914655 2386 assert(!bs->job);
3718d8ab 2387 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 2388 assert(!bs->refcnt);
18846dee 2389
e1b5c52e
SH
2390 bdrv_close(bs);
2391
1b7bdbc1 2392 /* remove from list, if necessary */
d22b2f41 2393 bdrv_make_anon(bs);
34c6f050 2394
2c1d04e0
HR
2395 QTAILQ_REMOVE(&all_bdrv_states, bs, bs_list);
2396
7267c094 2397 g_free(bs);
fc01f7e7
FB
2398}
2399
e97fc193
AL
2400/*
2401 * Run consistency checks on an image
2402 *
e076f338 2403 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 2404 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 2405 * check are stored in res.
e97fc193 2406 */
4534ff54 2407int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 2408{
908bcd54
HR
2409 if (bs->drv == NULL) {
2410 return -ENOMEDIUM;
2411 }
e97fc193
AL
2412 if (bs->drv->bdrv_check == NULL) {
2413 return -ENOTSUP;
2414 }
2415
e076f338 2416 memset(res, 0, sizeof(*res));
4534ff54 2417 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
2418}
2419
8a426614
KW
2420#define COMMIT_BUF_SECTORS 2048
2421
33e3963e
FB
2422/* commit COW file into the raw image */
2423int bdrv_commit(BlockDriverState *bs)
2424{
19cb3738 2425 BlockDriver *drv = bs->drv;
72706ea4 2426 int64_t sector, total_sectors, length, backing_length;
8a426614 2427 int n, ro, open_flags;
0bce597d 2428 int ret = 0;
72706ea4 2429 uint8_t *buf = NULL;
33e3963e 2430
19cb3738
FB
2431 if (!drv)
2432 return -ENOMEDIUM;
6bb45158 2433
760e0063 2434 if (!bs->backing) {
4dca4b63 2435 return -ENOTSUP;
33e3963e
FB
2436 }
2437
bb00021d 2438 if (bdrv_op_is_blocked(bs, BLOCK_OP_TYPE_COMMIT_SOURCE, NULL) ||
760e0063 2439 bdrv_op_is_blocked(bs->backing->bs, BLOCK_OP_TYPE_COMMIT_TARGET, NULL)) {
2d3735d3
SH
2440 return -EBUSY;
2441 }
2442
760e0063
KW
2443 ro = bs->backing->bs->read_only;
2444 open_flags = bs->backing->bs->open_flags;
4dca4b63
NS
2445
2446 if (ro) {
760e0063 2447 if (bdrv_reopen(bs->backing->bs, open_flags | BDRV_O_RDWR, NULL)) {
0bce597d 2448 return -EACCES;
4dca4b63 2449 }
ea2384d3 2450 }
33e3963e 2451
72706ea4
JC
2452 length = bdrv_getlength(bs);
2453 if (length < 0) {
2454 ret = length;
2455 goto ro_cleanup;
2456 }
2457
760e0063 2458 backing_length = bdrv_getlength(bs->backing->bs);
72706ea4
JC
2459 if (backing_length < 0) {
2460 ret = backing_length;
2461 goto ro_cleanup;
2462 }
2463
2464 /* If our top snapshot is larger than the backing file image,
2465 * grow the backing file image if possible. If not possible,
2466 * we must return an error */
2467 if (length > backing_length) {
760e0063 2468 ret = bdrv_truncate(bs->backing->bs, length);
72706ea4
JC
2469 if (ret < 0) {
2470 goto ro_cleanup;
2471 }
2472 }
2473
2474 total_sectors = length >> BDRV_SECTOR_BITS;
857d4f46
KW
2475
2476 /* qemu_try_blockalign() for bs will choose an alignment that works for
760e0063 2477 * bs->backing->bs as well, so no need to compare the alignment manually. */
857d4f46
KW
2478 buf = qemu_try_blockalign(bs, COMMIT_BUF_SECTORS * BDRV_SECTOR_SIZE);
2479 if (buf == NULL) {
2480 ret = -ENOMEM;
2481 goto ro_cleanup;
2482 }
8a426614
KW
2483
2484 for (sector = 0; sector < total_sectors; sector += n) {
d663640c
PB
2485 ret = bdrv_is_allocated(bs, sector, COMMIT_BUF_SECTORS, &n);
2486 if (ret < 0) {
2487 goto ro_cleanup;
2488 }
2489 if (ret) {
dabfa6cc
KW
2490 ret = bdrv_read(bs, sector, buf, n);
2491 if (ret < 0) {
8a426614
KW
2492 goto ro_cleanup;
2493 }
2494
760e0063 2495 ret = bdrv_write(bs->backing->bs, sector, buf, n);
dabfa6cc 2496 if (ret < 0) {
8a426614
KW
2497 goto ro_cleanup;
2498 }
ea2384d3 2499 }
33e3963e 2500 }
95389c86 2501
1d44952f
CH
2502 if (drv->bdrv_make_empty) {
2503 ret = drv->bdrv_make_empty(bs);
dabfa6cc
KW
2504 if (ret < 0) {
2505 goto ro_cleanup;
2506 }
1d44952f
CH
2507 bdrv_flush(bs);
2508 }
95389c86 2509
3f5075ae
CH
2510 /*
2511 * Make sure all data we wrote to the backing device is actually
2512 * stable on disk.
2513 */
760e0063
KW
2514 if (bs->backing) {
2515 bdrv_flush(bs->backing->bs);
dabfa6cc 2516 }
4dca4b63 2517
dabfa6cc 2518 ret = 0;
4dca4b63 2519ro_cleanup:
857d4f46 2520 qemu_vfree(buf);
4dca4b63
NS
2521
2522 if (ro) {
0bce597d 2523 /* ignoring error return here */
760e0063 2524 bdrv_reopen(bs->backing->bs, open_flags & ~BDRV_O_RDWR, NULL);
4dca4b63
NS
2525 }
2526
1d44952f 2527 return ret;
33e3963e
FB
2528}
2529
e8877497 2530int bdrv_commit_all(void)
6ab4b5ab
MA
2531{
2532 BlockDriverState *bs;
2533
dc364f4c 2534 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
2535 AioContext *aio_context = bdrv_get_aio_context(bs);
2536
2537 aio_context_acquire(aio_context);
760e0063 2538 if (bs->drv && bs->backing) {
272d2d8e
JC
2539 int ret = bdrv_commit(bs);
2540 if (ret < 0) {
ed78cda3 2541 aio_context_release(aio_context);
272d2d8e
JC
2542 return ret;
2543 }
e8877497 2544 }
ed78cda3 2545 aio_context_release(aio_context);
6ab4b5ab 2546 }
e8877497 2547 return 0;
6ab4b5ab
MA
2548}
2549
756e6736
KW
2550/*
2551 * Return values:
2552 * 0 - success
2553 * -EINVAL - backing format specified, but no file
2554 * -ENOSPC - can't update the backing file because no space is left in the
2555 * image file header
2556 * -ENOTSUP - format driver doesn't support changing the backing file
2557 */
2558int bdrv_change_backing_file(BlockDriverState *bs,
2559 const char *backing_file, const char *backing_fmt)
2560{
2561 BlockDriver *drv = bs->drv;
469ef350 2562 int ret;
756e6736 2563
5f377794
PB
2564 /* Backing file format doesn't make sense without a backing file */
2565 if (backing_fmt && !backing_file) {
2566 return -EINVAL;
2567 }
2568
756e6736 2569 if (drv->bdrv_change_backing_file != NULL) {
469ef350 2570 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 2571 } else {
469ef350 2572 ret = -ENOTSUP;
756e6736 2573 }
469ef350
PB
2574
2575 if (ret == 0) {
2576 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
2577 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
2578 }
2579 return ret;
756e6736
KW
2580}
2581
6ebdcee2
JC
2582/*
2583 * Finds the image layer in the chain that has 'bs' as its backing file.
2584 *
2585 * active is the current topmost image.
2586 *
2587 * Returns NULL if bs is not found in active's image chain,
2588 * or if active == bs.
4caf0fcd
JC
2589 *
2590 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
2591 */
2592BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
2593 BlockDriverState *bs)
2594{
760e0063
KW
2595 while (active && bs != backing_bs(active)) {
2596 active = backing_bs(active);
6ebdcee2
JC
2597 }
2598
4caf0fcd
JC
2599 return active;
2600}
6ebdcee2 2601
4caf0fcd
JC
2602/* Given a BDS, searches for the base layer. */
2603BlockDriverState *bdrv_find_base(BlockDriverState *bs)
2604{
2605 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
2606}
2607
6ebdcee2
JC
2608/*
2609 * Drops images above 'base' up to and including 'top', and sets the image
2610 * above 'top' to have base as its backing file.
2611 *
2612 * Requires that the overlay to 'top' is opened r/w, so that the backing file
2613 * information in 'bs' can be properly updated.
2614 *
2615 * E.g., this will convert the following chain:
2616 * bottom <- base <- intermediate <- top <- active
2617 *
2618 * to
2619 *
2620 * bottom <- base <- active
2621 *
2622 * It is allowed for bottom==base, in which case it converts:
2623 *
2624 * base <- intermediate <- top <- active
2625 *
2626 * to
2627 *
2628 * base <- active
2629 *
54e26900
JC
2630 * If backing_file_str is non-NULL, it will be used when modifying top's
2631 * overlay image metadata.
2632 *
6ebdcee2
JC
2633 * Error conditions:
2634 * if active == top, that is considered an error
2635 *
2636 */
2637int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 2638 BlockDriverState *base, const char *backing_file_str)
6ebdcee2 2639{
6ebdcee2 2640 BlockDriverState *new_top_bs = NULL;
6ebdcee2
JC
2641 int ret = -EIO;
2642
6ebdcee2
JC
2643 if (!top->drv || !base->drv) {
2644 goto exit;
2645 }
2646
2647 new_top_bs = bdrv_find_overlay(active, top);
2648
2649 if (new_top_bs == NULL) {
2650 /* we could not find the image above 'top', this is an error */
2651 goto exit;
2652 }
2653
760e0063 2654 /* special case of new_top_bs->backing->bs already pointing to base - nothing
6ebdcee2 2655 * to do, no intermediate images */
760e0063 2656 if (backing_bs(new_top_bs) == base) {
6ebdcee2
JC
2657 ret = 0;
2658 goto exit;
2659 }
2660
5db15a57
KW
2661 /* Make sure that base is in the backing chain of top */
2662 if (!bdrv_chain_contains(top, base)) {
6ebdcee2
JC
2663 goto exit;
2664 }
2665
2666 /* success - we can delete the intermediate states, and link top->base */
5db15a57 2667 backing_file_str = backing_file_str ? backing_file_str : base->filename;
54e26900 2668 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
5db15a57 2669 base->drv ? base->drv->format_name : "");
6ebdcee2
JC
2670 if (ret) {
2671 goto exit;
2672 }
5db15a57 2673 bdrv_set_backing_hd(new_top_bs, base);
6ebdcee2 2674
6ebdcee2 2675 ret = 0;
6ebdcee2 2676exit:
6ebdcee2
JC
2677 return ret;
2678}
2679
61007b31
SH
2680/**
2681 * Truncate file to 'offset' bytes (needed only for file protocols)
2682 */
2683int bdrv_truncate(BlockDriverState *bs, int64_t offset)
71d0770c 2684{
61007b31
SH
2685 BlockDriver *drv = bs->drv;
2686 int ret;
2687 if (!drv)
71d0770c 2688 return -ENOMEDIUM;
61007b31
SH
2689 if (!drv->bdrv_truncate)
2690 return -ENOTSUP;
2691 if (bs->read_only)
2692 return -EACCES;
71d0770c 2693
61007b31
SH
2694 ret = drv->bdrv_truncate(bs, offset);
2695 if (ret == 0) {
2696 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
2697 bdrv_dirty_bitmap_truncate(bs);
2698 if (bs->blk) {
2699 blk_dev_resize_cb(bs->blk);
2700 }
c0191e76 2701 }
61007b31 2702 return ret;
71d0770c
AL
2703}
2704
61007b31
SH
2705/**
2706 * Length of a allocated file in bytes. Sparse files are counted by actual
2707 * allocated space. Return < 0 if error or unknown.
2708 */
2709int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 2710{
61007b31
SH
2711 BlockDriver *drv = bs->drv;
2712 if (!drv) {
2713 return -ENOMEDIUM;
8f4754ed 2714 }
61007b31
SH
2715 if (drv->bdrv_get_allocated_file_size) {
2716 return drv->bdrv_get_allocated_file_size(bs);
2717 }
2718 if (bs->file) {
9a4f4c31 2719 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 2720 }
61007b31 2721 return -ENOTSUP;
1c9805a3 2722}
e7a8a783 2723
61007b31
SH
2724/**
2725 * Return number of sectors on success, -errno on error.
1c9805a3 2726 */
61007b31 2727int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 2728{
61007b31 2729 BlockDriver *drv = bs->drv;
498e386c 2730
61007b31
SH
2731 if (!drv)
2732 return -ENOMEDIUM;
2572b37a 2733
61007b31
SH
2734 if (drv->has_variable_length) {
2735 int ret = refresh_total_sectors(bs, bs->total_sectors);
2736 if (ret < 0) {
2737 return ret;
1c9805a3
SH
2738 }
2739 }
61007b31 2740 return bs->total_sectors;
1c9805a3 2741}
b338082b 2742
61007b31
SH
2743/**
2744 * Return length in bytes on success, -errno on error.
2745 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 2746 */
61007b31 2747int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 2748{
61007b31 2749 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 2750
4a9c9ea0 2751 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 2752 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
2753}
2754
61007b31
SH
2755/* return 0 as number of sectors if no device present or error */
2756void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 2757{
61007b31 2758 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 2759
61007b31 2760 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
2761}
2762
61007b31 2763int bdrv_is_read_only(BlockDriverState *bs)
8d3b1a2d 2764{
61007b31 2765 return bs->read_only;
83f64091 2766}
83f64091 2767
61007b31 2768int bdrv_is_sg(BlockDriverState *bs)
f08145fe 2769{
61007b31 2770 return bs->sg;
f08145fe
KW
2771}
2772
61007b31 2773int bdrv_enable_write_cache(BlockDriverState *bs)
ab185921 2774{
61007b31 2775 return bs->enable_write_cache;
ab185921
SH
2776}
2777
61007b31 2778void bdrv_set_enable_write_cache(BlockDriverState *bs, bool wce)
da1fa91d 2779{
61007b31 2780 bs->enable_write_cache = wce;
ab185921 2781
61007b31
SH
2782 /* so a reopen() will preserve wce */
2783 if (wce) {
2784 bs->open_flags |= BDRV_O_CACHE_WB;
893a8f62 2785 } else {
61007b31 2786 bs->open_flags &= ~BDRV_O_CACHE_WB;
893a8f62 2787 }
da1fa91d
KW
2788}
2789
61007b31 2790int bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 2791{
760e0063 2792 if (bs->backing && bs->backing->bs->encrypted) {
61007b31 2793 return 1;
760e0063 2794 }
61007b31 2795 return bs->encrypted;
fc3959e4
FZ
2796}
2797
61007b31 2798int bdrv_key_required(BlockDriverState *bs)
fc3959e4 2799{
760e0063 2800 BdrvChild *backing = bs->backing;
61007b31 2801
760e0063 2802 if (backing && backing->bs->encrypted && !backing->bs->valid_key) {
61007b31 2803 return 1;
760e0063 2804 }
61007b31 2805 return (bs->encrypted && !bs->valid_key);
fc3959e4
FZ
2806}
2807
61007b31 2808int bdrv_set_key(BlockDriverState *bs, const char *key)
d0c7f642 2809{
d0c7f642 2810 int ret;
760e0063
KW
2811 if (bs->backing && bs->backing->bs->encrypted) {
2812 ret = bdrv_set_key(bs->backing->bs, key);
61007b31
SH
2813 if (ret < 0)
2814 return ret;
2815 if (!bs->encrypted)
2816 return 0;
2817 }
2818 if (!bs->encrypted) {
2819 return -EINVAL;
2820 } else if (!bs->drv || !bs->drv->bdrv_set_key) {
d0c7f642
KW
2821 return -ENOMEDIUM;
2822 }
61007b31 2823 ret = bs->drv->bdrv_set_key(bs, key);
b9c64947 2824 if (ret < 0) {
61007b31
SH
2825 bs->valid_key = 0;
2826 } else if (!bs->valid_key) {
2827 bs->valid_key = 1;
2828 if (bs->blk) {
2829 /* call the change callback now, we skipped it on open */
2830 blk_dev_change_media_cb(bs->blk, true);
2831 }
1b0288ae 2832 }
61007b31
SH
2833 return ret;
2834}
f08f2dda 2835
c5fbe571 2836/*
61007b31
SH
2837 * Provide an encryption key for @bs.
2838 * If @key is non-null:
2839 * If @bs is not encrypted, fail.
2840 * Else if the key is invalid, fail.
2841 * Else set @bs's key to @key, replacing the existing key, if any.
2842 * If @key is null:
2843 * If @bs is encrypted and still lacks a key, fail.
2844 * Else do nothing.
2845 * On failure, store an error object through @errp if non-null.
c5fbe571 2846 */
61007b31 2847void bdrv_add_key(BlockDriverState *bs, const char *key, Error **errp)
c5fbe571 2848{
61007b31
SH
2849 if (key) {
2850 if (!bdrv_is_encrypted(bs)) {
2851 error_setg(errp, "Node '%s' is not encrypted",
2852 bdrv_get_device_or_node_name(bs));
2853 } else if (bdrv_set_key(bs, key) < 0) {
c6bd8c70 2854 error_setg(errp, QERR_INVALID_PASSWORD);
4d2855a3
MA
2855 }
2856 } else {
2857 if (bdrv_key_required(bs)) {
b1ca6391
MA
2858 error_set(errp, ERROR_CLASS_DEVICE_ENCRYPTED,
2859 "'%s' (%s) is encrypted",
81e5f78a 2860 bdrv_get_device_or_node_name(bs),
4d2855a3
MA
2861 bdrv_get_encrypted_filename(bs));
2862 }
2863 }
2864}
2865
61007b31 2866const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 2867{
61007b31 2868 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
2869}
2870
61007b31 2871static int qsort_strcmp(const void *a, const void *b)
40b4f539 2872{
61007b31 2873 return strcmp(a, b);
40b4f539
KW
2874}
2875
61007b31
SH
2876void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
2877 void *opaque)
40b4f539 2878{
61007b31
SH
2879 BlockDriver *drv;
2880 int count = 0;
2881 int i;
2882 const char **formats = NULL;
40b4f539 2883
61007b31
SH
2884 QLIST_FOREACH(drv, &bdrv_drivers, list) {
2885 if (drv->format_name) {
2886 bool found = false;
2887 int i = count;
2888 while (formats && i && !found) {
2889 found = !strcmp(formats[--i], drv->format_name);
2890 }
e2a305fb 2891
61007b31
SH
2892 if (!found) {
2893 formats = g_renew(const char *, formats, count + 1);
2894 formats[count++] = drv->format_name;
2895 }
6c5a42ac 2896 }
61007b31 2897 }
6c5a42ac 2898
61007b31 2899 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 2900
61007b31
SH
2901 for (i = 0; i < count; i++) {
2902 it(opaque, formats[i]);
2903 }
40b4f539 2904
61007b31
SH
2905 g_free(formats);
2906}
40b4f539 2907
61007b31
SH
2908/* This function is to find a node in the bs graph */
2909BlockDriverState *bdrv_find_node(const char *node_name)
2910{
2911 BlockDriverState *bs;
391827eb 2912
61007b31 2913 assert(node_name);
40b4f539 2914
61007b31
SH
2915 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2916 if (!strcmp(node_name, bs->node_name)) {
2917 return bs;
40b4f539
KW
2918 }
2919 }
61007b31 2920 return NULL;
40b4f539
KW
2921}
2922
61007b31
SH
2923/* Put this QMP function here so it can access the static graph_bdrv_states. */
2924BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 2925{
61007b31
SH
2926 BlockDeviceInfoList *list, *entry;
2927 BlockDriverState *bs;
40b4f539 2928
61007b31
SH
2929 list = NULL;
2930 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2931 BlockDeviceInfo *info = bdrv_block_device_info(bs, errp);
2932 if (!info) {
2933 qapi_free_BlockDeviceInfoList(list);
2934 return NULL;
301db7c2 2935 }
61007b31
SH
2936 entry = g_malloc0(sizeof(*entry));
2937 entry->value = info;
2938 entry->next = list;
2939 list = entry;
301db7c2
RH
2940 }
2941
61007b31
SH
2942 return list;
2943}
40b4f539 2944
61007b31
SH
2945BlockDriverState *bdrv_lookup_bs(const char *device,
2946 const char *node_name,
2947 Error **errp)
2948{
2949 BlockBackend *blk;
2950 BlockDriverState *bs;
40b4f539 2951
61007b31
SH
2952 if (device) {
2953 blk = blk_by_name(device);
40b4f539 2954
61007b31 2955 if (blk) {
9f4ed6fb
AG
2956 bs = blk_bs(blk);
2957 if (!bs) {
5433c24f 2958 error_setg(errp, "Device '%s' has no medium", device);
5433c24f
HR
2959 }
2960
9f4ed6fb 2961 return bs;
61007b31
SH
2962 }
2963 }
40b4f539 2964
61007b31
SH
2965 if (node_name) {
2966 bs = bdrv_find_node(node_name);
6d519a5f 2967
61007b31
SH
2968 if (bs) {
2969 return bs;
2970 }
40b4f539
KW
2971 }
2972
61007b31
SH
2973 error_setg(errp, "Cannot find device=%s nor node_name=%s",
2974 device ? device : "",
2975 node_name ? node_name : "");
2976 return NULL;
40b4f539
KW
2977}
2978
61007b31
SH
2979/* If 'base' is in the same chain as 'top', return true. Otherwise,
2980 * return false. If either argument is NULL, return false. */
2981bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 2982{
61007b31 2983 while (top && top != base) {
760e0063 2984 top = backing_bs(top);
02c50efe 2985 }
61007b31
SH
2986
2987 return top != NULL;
02c50efe
FZ
2988}
2989
61007b31 2990BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 2991{
61007b31
SH
2992 if (!bs) {
2993 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 2994 }
61007b31 2995 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
2996}
2997
61007b31 2998BlockDriverState *bdrv_next(BlockDriverState *bs)
83f64091 2999{
61007b31
SH
3000 if (!bs) {
3001 return QTAILQ_FIRST(&bdrv_states);
857d4f46 3002 }
61007b31 3003 return QTAILQ_NEXT(bs, device_list);
83f64091 3004}
beac80cd 3005
61007b31 3006const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 3007{
61007b31 3008 return bs->node_name;
beac80cd
FB
3009}
3010
61007b31
SH
3011/* TODO check what callers really want: bs->node_name or blk_name() */
3012const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 3013{
61007b31 3014 return bs->blk ? blk_name(bs->blk) : "";
f141eafe 3015}
83f64091 3016
61007b31
SH
3017/* This can be used to identify nodes that might not have a device
3018 * name associated. Since node and device names live in the same
3019 * namespace, the result is unambiguous. The exception is if both are
3020 * absent, then this returns an empty (non-null) string. */
3021const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 3022{
61007b31 3023 return bs->blk ? blk_name(bs->blk) : bs->node_name;
beac80cd 3024}
beac80cd 3025
61007b31 3026int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 3027{
61007b31 3028 return bs->open_flags;
0b5a2445
PB
3029}
3030
61007b31 3031int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 3032{
61007b31 3033 return 1;
0b5a2445
PB
3034}
3035
61007b31 3036int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 3037{
61007b31 3038 assert(bs->drv);
0b5a2445 3039
61007b31
SH
3040 /* If BS is a copy on write image, it is initialized to
3041 the contents of the base image, which may not be zeroes. */
760e0063 3042 if (bs->backing) {
61007b31
SH
3043 return 0;
3044 }
3045 if (bs->drv->bdrv_has_zero_init) {
3046 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 3047 }
61007b31
SH
3048
3049 /* safe default */
3050 return 0;
68485420
KW
3051}
3052
61007b31 3053bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 3054{
61007b31 3055 BlockDriverInfo bdi;
b2a61371 3056
760e0063 3057 if (bs->backing) {
61007b31
SH
3058 return false;
3059 }
3060
3061 if (bdrv_get_info(bs, &bdi) == 0) {
3062 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
3063 }
3064
61007b31 3065 return false;
b2a61371
SH
3066}
3067
61007b31 3068bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 3069{
61007b31 3070 BlockDriverInfo bdi;
68485420 3071
760e0063 3072 if (bs->backing || !(bs->open_flags & BDRV_O_UNMAP)) {
61007b31
SH
3073 return false;
3074 }
68485420 3075
61007b31
SH
3076 if (bdrv_get_info(bs, &bdi) == 0) {
3077 return bdi.can_write_zeroes_with_unmap;
3078 }
68485420 3079
61007b31 3080 return false;
68485420
KW
3081}
3082
61007b31 3083const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 3084{
760e0063 3085 if (bs->backing && bs->backing->bs->encrypted)
61007b31
SH
3086 return bs->backing_file;
3087 else if (bs->encrypted)
3088 return bs->filename;
3089 else
3090 return NULL;
b2e12bc6
CH
3091}
3092
61007b31
SH
3093void bdrv_get_backing_filename(BlockDriverState *bs,
3094 char *filename, int filename_size)
016f5cf6 3095{
61007b31
SH
3096 pstrcpy(filename, filename_size, bs->backing_file);
3097}
d318aea9 3098
61007b31
SH
3099int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
3100{
3101 BlockDriver *drv = bs->drv;
3102 if (!drv)
3103 return -ENOMEDIUM;
3104 if (!drv->bdrv_get_info)
3105 return -ENOTSUP;
3106 memset(bdi, 0, sizeof(*bdi));
3107 return drv->bdrv_get_info(bs, bdi);
3108}
016f5cf6 3109
61007b31
SH
3110ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
3111{
3112 BlockDriver *drv = bs->drv;
3113 if (drv && drv->bdrv_get_specific_info) {
3114 return drv->bdrv_get_specific_info(bs);
3115 }
3116 return NULL;
016f5cf6
AG
3117}
3118
a31939e6 3119void bdrv_debug_event(BlockDriverState *bs, BlkdebugEvent event)
4265d620 3120{
61007b31
SH
3121 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
3122 return;
3123 }
4265d620 3124
61007b31 3125 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
3126}
3127
61007b31
SH
3128int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
3129 const char *tag)
4265d620 3130{
61007b31 3131 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 3132 bs = bs->file ? bs->file->bs : NULL;
61007b31 3133 }
4265d620 3134
61007b31
SH
3135 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
3136 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
3137 }
4265d620 3138
61007b31 3139 return -ENOTSUP;
4265d620
PB
3140}
3141
61007b31 3142int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 3143{
61007b31 3144 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 3145 bs = bs->file ? bs->file->bs : NULL;
61007b31 3146 }
ce1a14dc 3147
61007b31
SH
3148 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
3149 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
3150 }
3151
3152 return -ENOTSUP;
eb852011
MA
3153}
3154
61007b31 3155int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 3156{
61007b31 3157 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 3158 bs = bs->file ? bs->file->bs : NULL;
61007b31 3159 }
ce1a14dc 3160
61007b31
SH
3161 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
3162 return bs->drv->bdrv_debug_resume(bs, tag);
3163 }
ce1a14dc 3164
61007b31 3165 return -ENOTSUP;
f197fe2b
FZ
3166}
3167
61007b31 3168bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 3169{
61007b31 3170 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 3171 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 3172 }
19cb3738 3173
61007b31
SH
3174 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
3175 return bs->drv->bdrv_debug_is_suspended(bs, tag);
3176 }
f9f05dc5 3177
61007b31
SH
3178 return false;
3179}
f9f05dc5 3180
61007b31 3181int bdrv_is_snapshot(BlockDriverState *bs)
f9f05dc5 3182{
61007b31 3183 return !!(bs->open_flags & BDRV_O_SNAPSHOT);
f9f05dc5
KW
3184}
3185
61007b31
SH
3186/* backing_file can either be relative, or absolute, or a protocol. If it is
3187 * relative, it must be relative to the chain. So, passing in bs->filename
3188 * from a BDS as backing_file should not be done, as that may be relative to
3189 * the CWD rather than the chain. */
3190BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
3191 const char *backing_file)
f9f05dc5 3192{
61007b31
SH
3193 char *filename_full = NULL;
3194 char *backing_file_full = NULL;
3195 char *filename_tmp = NULL;
3196 int is_protocol = 0;
3197 BlockDriverState *curr_bs = NULL;
3198 BlockDriverState *retval = NULL;
f9f05dc5 3199
61007b31
SH
3200 if (!bs || !bs->drv || !backing_file) {
3201 return NULL;
f9f05dc5
KW
3202 }
3203
61007b31
SH
3204 filename_full = g_malloc(PATH_MAX);
3205 backing_file_full = g_malloc(PATH_MAX);
3206 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 3207
61007b31 3208 is_protocol = path_has_protocol(backing_file);
f9f05dc5 3209
760e0063 3210 for (curr_bs = bs; curr_bs->backing; curr_bs = curr_bs->backing->bs) {
f9f05dc5 3211
61007b31
SH
3212 /* If either of the filename paths is actually a protocol, then
3213 * compare unmodified paths; otherwise make paths relative */
3214 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
3215 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
760e0063 3216 retval = curr_bs->backing->bs;
61007b31
SH
3217 break;
3218 }
3219 } else {
3220 /* If not an absolute filename path, make it relative to the current
3221 * image's filename path */
3222 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3223 backing_file);
f9f05dc5 3224
61007b31
SH
3225 /* We are going to compare absolute pathnames */
3226 if (!realpath(filename_tmp, filename_full)) {
3227 continue;
3228 }
07f07615 3229
61007b31
SH
3230 /* We need to make sure the backing filename we are comparing against
3231 * is relative to the current image filename (or absolute) */
3232 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3233 curr_bs->backing_file);
07f07615 3234
61007b31
SH
3235 if (!realpath(filename_tmp, backing_file_full)) {
3236 continue;
3237 }
eb489bb1 3238
61007b31 3239 if (strcmp(backing_file_full, filename_full) == 0) {
760e0063 3240 retval = curr_bs->backing->bs;
61007b31
SH
3241 break;
3242 }
3243 }
eb489bb1
KW
3244 }
3245
61007b31
SH
3246 g_free(filename_full);
3247 g_free(backing_file_full);
3248 g_free(filename_tmp);
3249 return retval;
3250}
3251
3252int bdrv_get_backing_file_depth(BlockDriverState *bs)
3253{
3254 if (!bs->drv) {
3255 return 0;
eb489bb1
KW
3256 }
3257
760e0063 3258 if (!bs->backing) {
61007b31 3259 return 0;
ca716364
KW
3260 }
3261
760e0063 3262 return 1 + bdrv_get_backing_file_depth(bs->backing->bs);
61007b31 3263}
07f07615 3264
61007b31
SH
3265void bdrv_init(void)
3266{
3267 module_call_init(MODULE_INIT_BLOCK);
3268}
29cdb251 3269
61007b31
SH
3270void bdrv_init_with_whitelist(void)
3271{
3272 use_bdrv_whitelist = 1;
3273 bdrv_init();
07f07615
PB
3274}
3275
5a8a30db 3276void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 3277{
5a8a30db
KW
3278 Error *local_err = NULL;
3279 int ret;
3280
3456a8d1
KW
3281 if (!bs->drv) {
3282 return;
3283 }
3284
04c01a5c 3285 if (!(bs->open_flags & BDRV_O_INACTIVE)) {
7ea2d269
AK
3286 return;
3287 }
04c01a5c 3288 bs->open_flags &= ~BDRV_O_INACTIVE;
7ea2d269 3289
3456a8d1 3290 if (bs->drv->bdrv_invalidate_cache) {
5a8a30db 3291 bs->drv->bdrv_invalidate_cache(bs, &local_err);
3456a8d1 3292 } else if (bs->file) {
9a4f4c31 3293 bdrv_invalidate_cache(bs->file->bs, &local_err);
5a8a30db
KW
3294 }
3295 if (local_err) {
04c01a5c 3296 bs->open_flags |= BDRV_O_INACTIVE;
5a8a30db
KW
3297 error_propagate(errp, local_err);
3298 return;
0f15423c 3299 }
3456a8d1 3300
5a8a30db
KW
3301 ret = refresh_total_sectors(bs, bs->total_sectors);
3302 if (ret < 0) {
04c01a5c 3303 bs->open_flags |= BDRV_O_INACTIVE;
5a8a30db
KW
3304 error_setg_errno(errp, -ret, "Could not refresh total sector count");
3305 return;
3306 }
0f15423c
AL
3307}
3308
5a8a30db 3309void bdrv_invalidate_cache_all(Error **errp)
0f15423c
AL
3310{
3311 BlockDriverState *bs;
5a8a30db 3312 Error *local_err = NULL;
0f15423c 3313
dc364f4c 3314 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
3315 AioContext *aio_context = bdrv_get_aio_context(bs);
3316
3317 aio_context_acquire(aio_context);
5a8a30db 3318 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 3319 aio_context_release(aio_context);
5a8a30db
KW
3320 if (local_err) {
3321 error_propagate(errp, local_err);
3322 return;
3323 }
0f15423c
AL
3324 }
3325}
3326
76b1c7fe
KW
3327static int bdrv_inactivate(BlockDriverState *bs)
3328{
3329 int ret;
3330
3331 if (bs->drv->bdrv_inactivate) {
3332 ret = bs->drv->bdrv_inactivate(bs);
3333 if (ret < 0) {
3334 return ret;
3335 }
3336 }
3337
3338 bs->open_flags |= BDRV_O_INACTIVE;
3339 return 0;
3340}
3341
3342int bdrv_inactivate_all(void)
3343{
3344 BlockDriverState *bs;
3345 int ret;
3346
3347 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
3348 AioContext *aio_context = bdrv_get_aio_context(bs);
3349
3350 aio_context_acquire(aio_context);
3351 ret = bdrv_inactivate(bs);
3352 aio_context_release(aio_context);
3353 if (ret < 0) {
3354 return ret;
3355 }
3356 }
3357
3358 return 0;
3359}
3360
19cb3738
FB
3361/**************************************************************/
3362/* removable device support */
3363
3364/**
3365 * Return TRUE if the media is present
3366 */
e031f750 3367bool bdrv_is_inserted(BlockDriverState *bs)
19cb3738
FB
3368{
3369 BlockDriver *drv = bs->drv;
28d7a789 3370 BdrvChild *child;
a1aff5bf 3371
e031f750
HR
3372 if (!drv) {
3373 return false;
3374 }
28d7a789
HR
3375 if (drv->bdrv_is_inserted) {
3376 return drv->bdrv_is_inserted(bs);
3377 }
3378 QLIST_FOREACH(child, &bs->children, next) {
3379 if (!bdrv_is_inserted(child->bs)) {
3380 return false;
3381 }
e031f750 3382 }
28d7a789 3383 return true;
19cb3738
FB
3384}
3385
3386/**
8e49ca46
MA
3387 * Return whether the media changed since the last call to this
3388 * function, or -ENOTSUP if we don't know. Most drivers don't know.
19cb3738
FB
3389 */
3390int bdrv_media_changed(BlockDriverState *bs)
3391{
3392 BlockDriver *drv = bs->drv;
19cb3738 3393
8e49ca46
MA
3394 if (drv && drv->bdrv_media_changed) {
3395 return drv->bdrv_media_changed(bs);
3396 }
3397 return -ENOTSUP;
19cb3738
FB
3398}
3399
3400/**
3401 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
3402 */
f36f3949 3403void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
3404{
3405 BlockDriver *drv = bs->drv;
bfb197e0 3406 const char *device_name;
19cb3738 3407
822e1cd1
MA
3408 if (drv && drv->bdrv_eject) {
3409 drv->bdrv_eject(bs, eject_flag);
19cb3738 3410 }
6f382ed2 3411
bfb197e0
MA
3412 device_name = bdrv_get_device_name(bs);
3413 if (device_name[0] != '\0') {
3414 qapi_event_send_device_tray_moved(device_name,
a5ee7bd4 3415 eject_flag, &error_abort);
6f382ed2 3416 }
19cb3738
FB
3417}
3418
19cb3738
FB
3419/**
3420 * Lock or unlock the media (if it is locked, the user won't be able
3421 * to eject it manually).
3422 */
025e849a 3423void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
3424{
3425 BlockDriver *drv = bs->drv;
3426
025e849a 3427 trace_bdrv_lock_medium(bs, locked);
b8c6d095 3428
025e849a
MA
3429 if (drv && drv->bdrv_lock_medium) {
3430 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
3431 }
3432}
985a03b0 3433
0db6e54a
FZ
3434BdrvDirtyBitmap *bdrv_find_dirty_bitmap(BlockDriverState *bs, const char *name)
3435{
3436 BdrvDirtyBitmap *bm;
3437
3438 assert(name);
3439 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
3440 if (bm->name && !strcmp(name, bm->name)) {
3441 return bm;
3442 }
3443 }
3444 return NULL;
3445}
3446
20dca810 3447void bdrv_dirty_bitmap_make_anon(BdrvDirtyBitmap *bitmap)
0db6e54a 3448{
9bd2b08f 3449 assert(!bdrv_dirty_bitmap_frozen(bitmap));
0db6e54a
FZ
3450 g_free(bitmap->name);
3451 bitmap->name = NULL;
3452}
3453
3454BdrvDirtyBitmap *bdrv_create_dirty_bitmap(BlockDriverState *bs,
5fba6c0e 3455 uint32_t granularity,
0db6e54a 3456 const char *name,
b8afb520 3457 Error **errp)
7cd1e32a
LS
3458{
3459 int64_t bitmap_size;
e4654d2d 3460 BdrvDirtyBitmap *bitmap;
5fba6c0e 3461 uint32_t sector_granularity;
a55eb92c 3462
50717e94
PB
3463 assert((granularity & (granularity - 1)) == 0);
3464
0db6e54a
FZ
3465 if (name && bdrv_find_dirty_bitmap(bs, name)) {
3466 error_setg(errp, "Bitmap already exists: %s", name);
3467 return NULL;
3468 }
5fba6c0e
JS
3469 sector_granularity = granularity >> BDRV_SECTOR_BITS;
3470 assert(sector_granularity);
57322b78 3471 bitmap_size = bdrv_nb_sectors(bs);
b8afb520
FZ
3472 if (bitmap_size < 0) {
3473 error_setg_errno(errp, -bitmap_size, "could not get length of device");
3474 errno = -bitmap_size;
3475 return NULL;
3476 }
5839e53b 3477 bitmap = g_new0(BdrvDirtyBitmap, 1);
5fba6c0e 3478 bitmap->bitmap = hbitmap_alloc(bitmap_size, ctz32(sector_granularity));
e74e6b78 3479 bitmap->size = bitmap_size;
0db6e54a 3480 bitmap->name = g_strdup(name);
b8e6fb75 3481 bitmap->disabled = false;
e4654d2d
FZ
3482 QLIST_INSERT_HEAD(&bs->dirty_bitmaps, bitmap, list);
3483 return bitmap;
3484}
3485
9bd2b08f
JS
3486bool bdrv_dirty_bitmap_frozen(BdrvDirtyBitmap *bitmap)
3487{
3488 return bitmap->successor;
3489}
3490
b8e6fb75
JS
3491bool bdrv_dirty_bitmap_enabled(BdrvDirtyBitmap *bitmap)
3492{
9bd2b08f
JS
3493 return !(bitmap->disabled || bitmap->successor);
3494}
3495
9abe3bdc
JS
3496DirtyBitmapStatus bdrv_dirty_bitmap_status(BdrvDirtyBitmap *bitmap)
3497{
3498 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3499 return DIRTY_BITMAP_STATUS_FROZEN;
3500 } else if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3501 return DIRTY_BITMAP_STATUS_DISABLED;
3502 } else {
3503 return DIRTY_BITMAP_STATUS_ACTIVE;
3504 }
3505}
3506
9bd2b08f
JS
3507/**
3508 * Create a successor bitmap destined to replace this bitmap after an operation.
3509 * Requires that the bitmap is not frozen and has no successor.
3510 */
3511int bdrv_dirty_bitmap_create_successor(BlockDriverState *bs,
3512 BdrvDirtyBitmap *bitmap, Error **errp)
3513{
3514 uint64_t granularity;
3515 BdrvDirtyBitmap *child;
3516
3517 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3518 error_setg(errp, "Cannot create a successor for a bitmap that is "
3519 "currently frozen");
3520 return -1;
3521 }
3522 assert(!bitmap->successor);
3523
3524 /* Create an anonymous successor */
3525 granularity = bdrv_dirty_bitmap_granularity(bitmap);
3526 child = bdrv_create_dirty_bitmap(bs, granularity, NULL, errp);
3527 if (!child) {
3528 return -1;
3529 }
3530
3531 /* Successor will be on or off based on our current state. */
3532 child->disabled = bitmap->disabled;
3533
3534 /* Install the successor and freeze the parent */
3535 bitmap->successor = child;
3536 return 0;
3537}
3538
3539/**
3540 * For a bitmap with a successor, yield our name to the successor,
3541 * delete the old bitmap, and return a handle to the new bitmap.
3542 */
3543BdrvDirtyBitmap *bdrv_dirty_bitmap_abdicate(BlockDriverState *bs,
3544 BdrvDirtyBitmap *bitmap,
3545 Error **errp)
3546{
3547 char *name;
3548 BdrvDirtyBitmap *successor = bitmap->successor;
3549
3550 if (successor == NULL) {
3551 error_setg(errp, "Cannot relinquish control if "
3552 "there's no successor present");
3553 return NULL;
3554 }
3555
3556 name = bitmap->name;
3557 bitmap->name = NULL;
3558 successor->name = name;
3559 bitmap->successor = NULL;
3560 bdrv_release_dirty_bitmap(bs, bitmap);
3561
3562 return successor;
3563}
3564
3565/**
3566 * In cases of failure where we can no longer safely delete the parent,
3567 * we may wish to re-join the parent and child/successor.
3568 * The merged parent will be un-frozen, but not explicitly re-enabled.
3569 */
3570BdrvDirtyBitmap *bdrv_reclaim_dirty_bitmap(BlockDriverState *bs,
3571 BdrvDirtyBitmap *parent,
3572 Error **errp)
3573{
3574 BdrvDirtyBitmap *successor = parent->successor;
3575
3576 if (!successor) {
3577 error_setg(errp, "Cannot reclaim a successor when none is present");
3578 return NULL;
3579 }
3580
3581 if (!hbitmap_merge(parent->bitmap, successor->bitmap)) {
3582 error_setg(errp, "Merging of parent and successor bitmap failed");
3583 return NULL;
3584 }
3585 bdrv_release_dirty_bitmap(bs, successor);
3586 parent->successor = NULL;
3587
3588 return parent;
b8e6fb75
JS
3589}
3590
ce1ffea8
JS
3591/**
3592 * Truncates _all_ bitmaps attached to a BDS.
3593 */
3594static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs)
3595{
3596 BdrvDirtyBitmap *bitmap;
3597 uint64_t size = bdrv_nb_sectors(bs);
3598
3599 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
06207b0f 3600 assert(!bdrv_dirty_bitmap_frozen(bitmap));
ce1ffea8 3601 hbitmap_truncate(bitmap->bitmap, size);
5270b6a0 3602 bitmap->size = size;
ce1ffea8
JS
3603 }
3604}
3605
c5acdc9a
HR
3606static void bdrv_do_release_matching_dirty_bitmap(BlockDriverState *bs,
3607 BdrvDirtyBitmap *bitmap,
3608 bool only_named)
e4654d2d
FZ
3609{
3610 BdrvDirtyBitmap *bm, *next;
3611 QLIST_FOREACH_SAFE(bm, &bs->dirty_bitmaps, list, next) {
c5acdc9a 3612 if ((!bitmap || bm == bitmap) && (!only_named || bm->name)) {
9bd2b08f 3613 assert(!bdrv_dirty_bitmap_frozen(bm));
c5acdc9a
HR
3614 QLIST_REMOVE(bm, list);
3615 hbitmap_free(bm->bitmap);
3616 g_free(bm->name);
3617 g_free(bm);
3618
3619 if (bitmap) {
3620 return;
3621 }
a55eb92c 3622 }
7cd1e32a
LS
3623 }
3624}
3625
c5acdc9a
HR
3626void bdrv_release_dirty_bitmap(BlockDriverState *bs, BdrvDirtyBitmap *bitmap)
3627{
3628 bdrv_do_release_matching_dirty_bitmap(bs, bitmap, false);
3629}
3630
3631/**
3632 * Release all named dirty bitmaps attached to a BDS (for use in bdrv_close()).
3633 * There must not be any frozen bitmaps attached.
3634 */
3635static void bdrv_release_named_dirty_bitmaps(BlockDriverState *bs)
3636{
3637 bdrv_do_release_matching_dirty_bitmap(bs, NULL, true);
3638}
3639
b8e6fb75
JS
3640void bdrv_disable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3641{
9bd2b08f 3642 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3643 bitmap->disabled = true;
3644}
3645
3646void bdrv_enable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3647{
9bd2b08f 3648 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3649 bitmap->disabled = false;
3650}
3651
21b56835
FZ
3652BlockDirtyInfoList *bdrv_query_dirty_bitmaps(BlockDriverState *bs)
3653{
3654 BdrvDirtyBitmap *bm;
3655 BlockDirtyInfoList *list = NULL;
3656 BlockDirtyInfoList **plist = &list;
3657
3658 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
5839e53b
MA
3659 BlockDirtyInfo *info = g_new0(BlockDirtyInfo, 1);
3660 BlockDirtyInfoList *entry = g_new0(BlockDirtyInfoList, 1);
20dca810 3661 info->count = bdrv_get_dirty_count(bm);
592fdd02 3662 info->granularity = bdrv_dirty_bitmap_granularity(bm);
0db6e54a
FZ
3663 info->has_name = !!bm->name;
3664 info->name = g_strdup(bm->name);
9abe3bdc 3665 info->status = bdrv_dirty_bitmap_status(bm);
21b56835
FZ
3666 entry->value = info;
3667 *plist = entry;
3668 plist = &entry->next;
3669 }
3670
3671 return list;
3672}
3673
e4654d2d 3674int bdrv_get_dirty(BlockDriverState *bs, BdrvDirtyBitmap *bitmap, int64_t sector)
7cd1e32a 3675{
e4654d2d
FZ
3676 if (bitmap) {
3677 return hbitmap_get(bitmap->bitmap, sector);
7cd1e32a
LS
3678 } else {
3679 return 0;
3680 }
3681}
3682
341ebc2f
JS
3683/**
3684 * Chooses a default granularity based on the existing cluster size,
3685 * but clamped between [4K, 64K]. Defaults to 64K in the case that there
3686 * is no cluster size information available.
3687 */
3688uint32_t bdrv_get_default_bitmap_granularity(BlockDriverState *bs)
3689{
3690 BlockDriverInfo bdi;
3691 uint32_t granularity;
3692
3693 if (bdrv_get_info(bs, &bdi) >= 0 && bdi.cluster_size > 0) {
3694 granularity = MAX(4096, bdi.cluster_size);
3695 granularity = MIN(65536, granularity);
3696 } else {
3697 granularity = 65536;
3698 }
3699
3700 return granularity;
3701}
3702
592fdd02
JS
3703uint32_t bdrv_dirty_bitmap_granularity(BdrvDirtyBitmap *bitmap)
3704{
3705 return BDRV_SECTOR_SIZE << hbitmap_granularity(bitmap->bitmap);
3706}
3707
20dca810 3708void bdrv_dirty_iter_init(BdrvDirtyBitmap *bitmap, HBitmapIter *hbi)
1755da16 3709{
e4654d2d 3710 hbitmap_iter_init(hbi, bitmap->bitmap, 0);
1755da16
PB
3711}
3712
20dca810 3713void bdrv_set_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3714 int64_t cur_sector, int nr_sectors)
3715{
b8e6fb75 3716 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3717 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3718}
3719
20dca810 3720void bdrv_reset_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3721 int64_t cur_sector, int nr_sectors)
3722{
b8e6fb75 3723 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3724 hbitmap_reset(bitmap->bitmap, cur_sector, nr_sectors);
3725}
3726
df9a681d 3727void bdrv_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap, HBitmap **out)
e74e6b78
JS
3728{
3729 assert(bdrv_dirty_bitmap_enabled(bitmap));
df9a681d
FZ
3730 if (!out) {
3731 hbitmap_reset_all(bitmap->bitmap);
3732 } else {
3733 HBitmap *backup = bitmap->bitmap;
3734 bitmap->bitmap = hbitmap_alloc(bitmap->size,
3735 hbitmap_granularity(backup));
3736 *out = backup;
3737 }
3738}
3739
3740void bdrv_undo_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap, HBitmap *in)
3741{
3742 HBitmap *tmp = bitmap->bitmap;
3743 assert(bdrv_dirty_bitmap_enabled(bitmap));
3744 bitmap->bitmap = in;
3745 hbitmap_free(tmp);
e74e6b78
JS
3746}
3747
e0c47b6c
SH
3748void bdrv_set_dirty(BlockDriverState *bs, int64_t cur_sector,
3749 int nr_sectors)
1755da16 3750{
e4654d2d
FZ
3751 BdrvDirtyBitmap *bitmap;
3752 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
b8e6fb75
JS
3753 if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3754 continue;
3755 }
e4654d2d
FZ
3756 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3757 }
1755da16
PB
3758}
3759
d58d8453
JS
3760/**
3761 * Advance an HBitmapIter to an arbitrary offset.
3762 */
3763void bdrv_set_dirty_iter(HBitmapIter *hbi, int64_t offset)
3764{
3765 assert(hbi->hb);
3766 hbitmap_iter_init(hbi, hbi->hb, offset);
3767}
3768
20dca810 3769int64_t bdrv_get_dirty_count(BdrvDirtyBitmap *bitmap)
aaa0eb75 3770{
e4654d2d 3771 return hbitmap_count(bitmap->bitmap);
aaa0eb75 3772}
f88e1a42 3773
9fcb0251
FZ
3774/* Get a reference to bs */
3775void bdrv_ref(BlockDriverState *bs)
3776{
3777 bs->refcnt++;
3778}
3779
3780/* Release a previously grabbed reference to bs.
3781 * If after releasing, reference count is zero, the BlockDriverState is
3782 * deleted. */
3783void bdrv_unref(BlockDriverState *bs)
3784{
9a4d5ca6
JC
3785 if (!bs) {
3786 return;
3787 }
9fcb0251
FZ
3788 assert(bs->refcnt > 0);
3789 if (--bs->refcnt == 0) {
3790 bdrv_delete(bs);
3791 }
3792}
3793
fbe40ff7
FZ
3794struct BdrvOpBlocker {
3795 Error *reason;
3796 QLIST_ENTRY(BdrvOpBlocker) list;
3797};
3798
3799bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
3800{
3801 BdrvOpBlocker *blocker;
3802 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3803 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
3804 blocker = QLIST_FIRST(&bs->op_blockers[op]);
3805 if (errp) {
e43bfd9c
MA
3806 *errp = error_copy(blocker->reason);
3807 error_prepend(errp, "Node '%s' is busy: ",
3808 bdrv_get_device_or_node_name(bs));
fbe40ff7
FZ
3809 }
3810 return true;
3811 }
3812 return false;
3813}
3814
3815void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
3816{
3817 BdrvOpBlocker *blocker;
3818 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3819
5839e53b 3820 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
3821 blocker->reason = reason;
3822 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
3823}
3824
3825void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
3826{
3827 BdrvOpBlocker *blocker, *next;
3828 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3829 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
3830 if (blocker->reason == reason) {
3831 QLIST_REMOVE(blocker, list);
3832 g_free(blocker);
3833 }
3834 }
3835}
3836
3837void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
3838{
3839 int i;
3840 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3841 bdrv_op_block(bs, i, reason);
3842 }
3843}
3844
3845void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
3846{
3847 int i;
3848 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3849 bdrv_op_unblock(bs, i, reason);
3850 }
3851}
3852
3853bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
3854{
3855 int i;
3856
3857 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3858 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
3859 return false;
3860 }
3861 }
3862 return true;
3863}
3864
d92ada22
LC
3865void bdrv_img_create(const char *filename, const char *fmt,
3866 const char *base_filename, const char *base_fmt,
f382d43a
MR
3867 char *options, uint64_t img_size, int flags,
3868 Error **errp, bool quiet)
f88e1a42 3869{
83d0521a
CL
3870 QemuOptsList *create_opts = NULL;
3871 QemuOpts *opts = NULL;
3872 const char *backing_fmt, *backing_file;
3873 int64_t size;
f88e1a42 3874 BlockDriver *drv, *proto_drv;
cc84d90f 3875 Error *local_err = NULL;
f88e1a42
JS
3876 int ret = 0;
3877
3878 /* Find driver and parse its options */
3879 drv = bdrv_find_format(fmt);
3880 if (!drv) {
71c79813 3881 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 3882 return;
f88e1a42
JS
3883 }
3884
b65a5e12 3885 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 3886 if (!proto_drv) {
d92ada22 3887 return;
f88e1a42
JS
3888 }
3889
c6149724
HR
3890 if (!drv->create_opts) {
3891 error_setg(errp, "Format driver '%s' does not support image creation",
3892 drv->format_name);
3893 return;
3894 }
3895
3896 if (!proto_drv->create_opts) {
3897 error_setg(errp, "Protocol driver '%s' does not support image creation",
3898 proto_drv->format_name);
3899 return;
3900 }
3901
c282e1fd
CL
3902 create_opts = qemu_opts_append(create_opts, drv->create_opts);
3903 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
3904
3905 /* Create parameter list with default values */
83d0521a 3906 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 3907 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
3908
3909 /* Parse -o options */
3910 if (options) {
dc523cd3
MA
3911 qemu_opts_do_parse(opts, options, NULL, &local_err);
3912 if (local_err) {
3913 error_report_err(local_err);
3914 local_err = NULL;
83d0521a 3915 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
3916 goto out;
3917 }
3918 }
3919
3920 if (base_filename) {
f43e47db 3921 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 3922 if (local_err) {
71c79813
LC
3923 error_setg(errp, "Backing file not supported for file format '%s'",
3924 fmt);
f88e1a42
JS
3925 goto out;
3926 }
3927 }
3928
3929 if (base_fmt) {
f43e47db 3930 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 3931 if (local_err) {
71c79813
LC
3932 error_setg(errp, "Backing file format not supported for file "
3933 "format '%s'", fmt);
f88e1a42
JS
3934 goto out;
3935 }
3936 }
3937
83d0521a
CL
3938 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
3939 if (backing_file) {
3940 if (!strcmp(filename, backing_file)) {
71c79813
LC
3941 error_setg(errp, "Error: Trying to create an image with the "
3942 "same filename as the backing file");
792da93a
JS
3943 goto out;
3944 }
3945 }
3946
83d0521a 3947 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42
JS
3948
3949 // The size for the image must always be specified, with one exception:
3950 // If we are using a backing file, we can obtain the size from there
83d0521a
CL
3951 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
3952 if (size == -1) {
3953 if (backing_file) {
66f6b814 3954 BlockDriverState *bs;
29168018 3955 char *full_backing = g_new0(char, PATH_MAX);
52bf1e72 3956 int64_t size;
63090dac 3957 int back_flags;
e6641719 3958 QDict *backing_options = NULL;
63090dac 3959
29168018
HR
3960 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
3961 full_backing, PATH_MAX,
3962 &local_err);
3963 if (local_err) {
3964 g_free(full_backing);
3965 goto out;
3966 }
3967
63090dac
PB
3968 /* backing files always opened read-only */
3969 back_flags =
3970 flags & ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 3971
e6641719
HR
3972 if (backing_fmt) {
3973 backing_options = qdict_new();
3974 qdict_put(backing_options, "driver",
3975 qstring_from_str(backing_fmt));
3976 }
3977
f67503e5 3978 bs = NULL;
e6641719 3979 ret = bdrv_open(&bs, full_backing, NULL, backing_options,
6ebf9aa2 3980 back_flags, &local_err);
29168018 3981 g_free(full_backing);
f88e1a42 3982 if (ret < 0) {
f88e1a42
JS
3983 goto out;
3984 }
52bf1e72
MA
3985 size = bdrv_getlength(bs);
3986 if (size < 0) {
3987 error_setg_errno(errp, -size, "Could not get size of '%s'",
3988 backing_file);
3989 bdrv_unref(bs);
3990 goto out;
3991 }
f88e1a42 3992
39101f25 3993 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
66f6b814
HR
3994
3995 bdrv_unref(bs);
f88e1a42 3996 } else {
71c79813 3997 error_setg(errp, "Image creation needs a size parameter");
f88e1a42
JS
3998 goto out;
3999 }
4000 }
4001
f382d43a 4002 if (!quiet) {
fe646693 4003 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 4004 qemu_opts_print(opts, " ");
f382d43a
MR
4005 puts("");
4006 }
83d0521a 4007
c282e1fd 4008 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 4009
cc84d90f
HR
4010 if (ret == -EFBIG) {
4011 /* This is generally a better message than whatever the driver would
4012 * deliver (especially because of the cluster_size_hint), since that
4013 * is most probably not much different from "image too large". */
4014 const char *cluster_size_hint = "";
83d0521a 4015 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 4016 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 4017 }
cc84d90f
HR
4018 error_setg(errp, "The image size is too large for file format '%s'"
4019 "%s", fmt, cluster_size_hint);
4020 error_free(local_err);
4021 local_err = NULL;
f88e1a42
JS
4022 }
4023
4024out:
83d0521a
CL
4025 qemu_opts_del(opts);
4026 qemu_opts_free(create_opts);
84d18f06 4027 if (local_err) {
cc84d90f
HR
4028 error_propagate(errp, local_err);
4029 }
f88e1a42 4030}
85d126f3
SH
4031
4032AioContext *bdrv_get_aio_context(BlockDriverState *bs)
4033{
dcd04228
SH
4034 return bs->aio_context;
4035}
4036
4037void bdrv_detach_aio_context(BlockDriverState *bs)
4038{
33384421
HR
4039 BdrvAioNotifier *baf;
4040
dcd04228
SH
4041 if (!bs->drv) {
4042 return;
4043 }
4044
33384421
HR
4045 QLIST_FOREACH(baf, &bs->aio_notifiers, list) {
4046 baf->detach_aio_context(baf->opaque);
4047 }
4048
a0d64a61 4049 if (bs->throttle_state) {
0e5b0a2d 4050 throttle_timers_detach_aio_context(&bs->throttle_timers);
13af91eb 4051 }
dcd04228
SH
4052 if (bs->drv->bdrv_detach_aio_context) {
4053 bs->drv->bdrv_detach_aio_context(bs);
4054 }
4055 if (bs->file) {
9a4f4c31 4056 bdrv_detach_aio_context(bs->file->bs);
dcd04228 4057 }
760e0063
KW
4058 if (bs->backing) {
4059 bdrv_detach_aio_context(bs->backing->bs);
dcd04228
SH
4060 }
4061
4062 bs->aio_context = NULL;
4063}
4064
4065void bdrv_attach_aio_context(BlockDriverState *bs,
4066 AioContext *new_context)
4067{
33384421
HR
4068 BdrvAioNotifier *ban;
4069
dcd04228
SH
4070 if (!bs->drv) {
4071 return;
4072 }
4073
4074 bs->aio_context = new_context;
4075
760e0063
KW
4076 if (bs->backing) {
4077 bdrv_attach_aio_context(bs->backing->bs, new_context);
dcd04228
SH
4078 }
4079 if (bs->file) {
9a4f4c31 4080 bdrv_attach_aio_context(bs->file->bs, new_context);
dcd04228
SH
4081 }
4082 if (bs->drv->bdrv_attach_aio_context) {
4083 bs->drv->bdrv_attach_aio_context(bs, new_context);
4084 }
a0d64a61 4085 if (bs->throttle_state) {
0e5b0a2d 4086 throttle_timers_attach_aio_context(&bs->throttle_timers, new_context);
13af91eb 4087 }
33384421
HR
4088
4089 QLIST_FOREACH(ban, &bs->aio_notifiers, list) {
4090 ban->attached_aio_context(new_context, ban->opaque);
4091 }
dcd04228
SH
4092}
4093
4094void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
4095{
53ec73e2 4096 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228
SH
4097
4098 bdrv_detach_aio_context(bs);
4099
4100 /* This function executes in the old AioContext so acquire the new one in
4101 * case it runs in a different thread.
4102 */
4103 aio_context_acquire(new_context);
4104 bdrv_attach_aio_context(bs, new_context);
4105 aio_context_release(new_context);
85d126f3 4106}
d616b224 4107
33384421
HR
4108void bdrv_add_aio_context_notifier(BlockDriverState *bs,
4109 void (*attached_aio_context)(AioContext *new_context, void *opaque),
4110 void (*detach_aio_context)(void *opaque), void *opaque)
4111{
4112 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
4113 *ban = (BdrvAioNotifier){
4114 .attached_aio_context = attached_aio_context,
4115 .detach_aio_context = detach_aio_context,
4116 .opaque = opaque
4117 };
4118
4119 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
4120}
4121
4122void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
4123 void (*attached_aio_context)(AioContext *,
4124 void *),
4125 void (*detach_aio_context)(void *),
4126 void *opaque)
4127{
4128 BdrvAioNotifier *ban, *ban_next;
4129
4130 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
4131 if (ban->attached_aio_context == attached_aio_context &&
4132 ban->detach_aio_context == detach_aio_context &&
4133 ban->opaque == opaque)
4134 {
4135 QLIST_REMOVE(ban, list);
4136 g_free(ban);
4137
4138 return;
4139 }
4140 }
4141
4142 abort();
4143}
4144
77485434 4145int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
8b13976d 4146 BlockDriverAmendStatusCB *status_cb, void *cb_opaque)
6f176b48 4147{
c282e1fd 4148 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
4149 return -ENOTSUP;
4150 }
8b13976d 4151 return bs->drv->bdrv_amend_options(bs, opts, status_cb, cb_opaque);
6f176b48 4152}
f6186f49 4153
b5042a36
BC
4154/* This function will be called by the bdrv_recurse_is_first_non_filter method
4155 * of block filter and by bdrv_is_first_non_filter.
4156 * It is used to test if the given bs is the candidate or recurse more in the
4157 * node graph.
212a5a8f 4158 */
b5042a36 4159bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 4160 BlockDriverState *candidate)
f6186f49 4161{
b5042a36
BC
4162 /* return false if basic checks fails */
4163 if (!bs || !bs->drv) {
212a5a8f 4164 return false;
f6186f49
BC
4165 }
4166
b5042a36
BC
4167 /* the code reached a non block filter driver -> check if the bs is
4168 * the same as the candidate. It's the recursion termination condition.
4169 */
4170 if (!bs->drv->is_filter) {
4171 return bs == candidate;
212a5a8f 4172 }
b5042a36 4173 /* Down this path the driver is a block filter driver */
212a5a8f 4174
b5042a36
BC
4175 /* If the block filter recursion method is defined use it to recurse down
4176 * the node graph.
4177 */
4178 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 4179 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
4180 }
4181
b5042a36
BC
4182 /* the driver is a block filter but don't allow to recurse -> return false
4183 */
4184 return false;
f6186f49
BC
4185}
4186
212a5a8f
BC
4187/* This function checks if the candidate is the first non filter bs down it's
4188 * bs chain. Since we don't have pointers to parents it explore all bs chains
4189 * from the top. Some filters can choose not to pass down the recursion.
4190 */
4191bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 4192{
212a5a8f
BC
4193 BlockDriverState *bs;
4194
4195 /* walk down the bs forest recursively */
4196 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
4197 bool perm;
4198
b5042a36 4199 /* try to recurse in this top level bs */
e6dc8a1f 4200 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
4201
4202 /* candidate is the first non filter */
4203 if (perm) {
4204 return true;
4205 }
4206 }
4207
4208 return false;
f6186f49 4209}
09158f00 4210
e12f3784
WC
4211BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
4212 const char *node_name, Error **errp)
09158f00
BC
4213{
4214 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
4215 AioContext *aio_context;
4216
09158f00
BC
4217 if (!to_replace_bs) {
4218 error_setg(errp, "Node name '%s' not found", node_name);
4219 return NULL;
4220 }
4221
5a7e7a0b
SH
4222 aio_context = bdrv_get_aio_context(to_replace_bs);
4223 aio_context_acquire(aio_context);
4224
09158f00 4225 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
4226 to_replace_bs = NULL;
4227 goto out;
09158f00
BC
4228 }
4229
4230 /* We don't want arbitrary node of the BDS chain to be replaced only the top
4231 * most non filter in order to prevent data corruption.
4232 * Another benefit is that this tests exclude backing files which are
4233 * blocked by the backing blockers.
4234 */
e12f3784 4235 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 4236 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
4237 to_replace_bs = NULL;
4238 goto out;
09158f00
BC
4239 }
4240
5a7e7a0b
SH
4241out:
4242 aio_context_release(aio_context);
09158f00
BC
4243 return to_replace_bs;
4244}
448ad91d 4245
91af7014
HR
4246static bool append_open_options(QDict *d, BlockDriverState *bs)
4247{
4248 const QDictEntry *entry;
9e700c1a 4249 QemuOptDesc *desc;
260fecf1 4250 BdrvChild *child;
91af7014 4251 bool found_any = false;
260fecf1 4252 const char *p;
91af7014
HR
4253
4254 for (entry = qdict_first(bs->options); entry;
4255 entry = qdict_next(bs->options, entry))
4256 {
260fecf1
KW
4257 /* Exclude options for children */
4258 QLIST_FOREACH(child, &bs->children, next) {
4259 if (strstart(qdict_entry_key(entry), child->name, &p)
4260 && (!*p || *p == '.'))
4261 {
4262 break;
4263 }
4264 }
4265 if (child) {
9e700c1a 4266 continue;
91af7014 4267 }
9e700c1a
KW
4268
4269 /* And exclude all non-driver-specific options */
4270 for (desc = bdrv_runtime_opts.desc; desc->name; desc++) {
4271 if (!strcmp(qdict_entry_key(entry), desc->name)) {
4272 break;
4273 }
4274 }
4275 if (desc->name) {
4276 continue;
4277 }
4278
4279 qobject_incref(qdict_entry_value(entry));
4280 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
4281 found_any = true;
91af7014
HR
4282 }
4283
4284 return found_any;
4285}
4286
4287/* Updates the following BDS fields:
4288 * - exact_filename: A filename which may be used for opening a block device
4289 * which (mostly) equals the given BDS (even without any
4290 * other options; so reading and writing must return the same
4291 * results, but caching etc. may be different)
4292 * - full_open_options: Options which, when given when opening a block device
4293 * (without a filename), result in a BDS (mostly)
4294 * equalling the given one
4295 * - filename: If exact_filename is set, it is copied here. Otherwise,
4296 * full_open_options is converted to a JSON object, prefixed with
4297 * "json:" (for use through the JSON pseudo protocol) and put here.
4298 */
4299void bdrv_refresh_filename(BlockDriverState *bs)
4300{
4301 BlockDriver *drv = bs->drv;
4302 QDict *opts;
4303
4304 if (!drv) {
4305 return;
4306 }
4307
4308 /* This BDS's file name will most probably depend on its file's name, so
4309 * refresh that first */
4310 if (bs->file) {
9a4f4c31 4311 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
4312 }
4313
4314 if (drv->bdrv_refresh_filename) {
4315 /* Obsolete information is of no use here, so drop the old file name
4316 * information before refreshing it */
4317 bs->exact_filename[0] = '\0';
4318 if (bs->full_open_options) {
4319 QDECREF(bs->full_open_options);
4320 bs->full_open_options = NULL;
4321 }
4322
4cdd01d3
KW
4323 opts = qdict_new();
4324 append_open_options(opts, bs);
4325 drv->bdrv_refresh_filename(bs, opts);
4326 QDECREF(opts);
91af7014
HR
4327 } else if (bs->file) {
4328 /* Try to reconstruct valid information from the underlying file */
4329 bool has_open_options;
4330
4331 bs->exact_filename[0] = '\0';
4332 if (bs->full_open_options) {
4333 QDECREF(bs->full_open_options);
4334 bs->full_open_options = NULL;
4335 }
4336
4337 opts = qdict_new();
4338 has_open_options = append_open_options(opts, bs);
4339
4340 /* If no specific options have been given for this BDS, the filename of
4341 * the underlying file should suffice for this one as well */
9a4f4c31
KW
4342 if (bs->file->bs->exact_filename[0] && !has_open_options) {
4343 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
4344 }
4345 /* Reconstructing the full options QDict is simple for most format block
4346 * drivers, as long as the full options are known for the underlying
4347 * file BDS. The full options QDict of that file BDS should somehow
4348 * contain a representation of the filename, therefore the following
4349 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 4350 if (bs->file->bs->full_open_options) {
91af7014
HR
4351 qdict_put_obj(opts, "driver",
4352 QOBJECT(qstring_from_str(drv->format_name)));
9a4f4c31
KW
4353 QINCREF(bs->file->bs->full_open_options);
4354 qdict_put_obj(opts, "file",
4355 QOBJECT(bs->file->bs->full_open_options));
91af7014
HR
4356
4357 bs->full_open_options = opts;
4358 } else {
4359 QDECREF(opts);
4360 }
4361 } else if (!bs->full_open_options && qdict_size(bs->options)) {
4362 /* There is no underlying file BDS (at least referenced by BDS.file),
4363 * so the full options QDict should be equal to the options given
4364 * specifically for this block device when it was opened (plus the
4365 * driver specification).
4366 * Because those options don't change, there is no need to update
4367 * full_open_options when it's already set. */
4368
4369 opts = qdict_new();
4370 append_open_options(opts, bs);
4371 qdict_put_obj(opts, "driver",
4372 QOBJECT(qstring_from_str(drv->format_name)));
4373
4374 if (bs->exact_filename[0]) {
4375 /* This may not work for all block protocol drivers (some may
4376 * require this filename to be parsed), but we have to find some
4377 * default solution here, so just include it. If some block driver
4378 * does not support pure options without any filename at all or
4379 * needs some special format of the options QDict, it needs to
4380 * implement the driver-specific bdrv_refresh_filename() function.
4381 */
4382 qdict_put_obj(opts, "filename",
4383 QOBJECT(qstring_from_str(bs->exact_filename)));
4384 }
4385
4386 bs->full_open_options = opts;
4387 }
4388
4389 if (bs->exact_filename[0]) {
4390 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4391 } else if (bs->full_open_options) {
4392 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4393 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4394 qstring_get_str(json));
4395 QDECREF(json);
4396 }
4397}