]> git.proxmox.com Git - mirror_qemu.git/blame - block.c
memory: optimize qemu_get_ram_ptr and qemu_ram_ptr_length
[mirror_qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
d38ea87a 24#include "qemu/osdep.h"
faf07963 25#include "qemu-common.h"
6d519a5f 26#include "trace.h"
737e150e
PB
27#include "block/block_int.h"
28#include "block/blockjob.h"
d49b6836 29#include "qemu/error-report.h"
1de7afc9 30#include "qemu/module.h"
cc7a8ea7 31#include "qapi/qmp/qerror.h"
91a097e7 32#include "qapi/qmp/qbool.h"
7b1b5d19 33#include "qapi/qmp/qjson.h"
bfb197e0 34#include "sysemu/block-backend.h"
9c17d615 35#include "sysemu/sysemu.h"
1de7afc9 36#include "qemu/notify.h"
10817bf0 37#include "qemu/coroutine.h"
c13163fb 38#include "block/qapi.h"
b2023818 39#include "qmp-commands.h"
1de7afc9 40#include "qemu/timer.h"
a5ee7bd4 41#include "qapi-event.h"
db628338 42#include "block/throttle-groups.h"
fc01f7e7 43
71e72a19 44#ifdef CONFIG_BSD
7674e7bf 45#include <sys/ioctl.h>
72cf2d4f 46#include <sys/queue.h>
c5e97233 47#ifndef __DragonFly__
7674e7bf
FB
48#include <sys/disk.h>
49#endif
c5e97233 50#endif
7674e7bf 51
49dc768d
AL
52#ifdef _WIN32
53#include <windows.h>
54#endif
55
9bd2b08f
JS
56/**
57 * A BdrvDirtyBitmap can be in three possible states:
58 * (1) successor is NULL and disabled is false: full r/w mode
59 * (2) successor is NULL and disabled is true: read only mode ("disabled")
60 * (3) successor is set: frozen mode.
61 * A frozen bitmap cannot be renamed, deleted, anonymized, cleared, set,
62 * or enabled. A frozen bitmap can only abdicate() or reclaim().
63 */
e4654d2d 64struct BdrvDirtyBitmap {
aa0c7ca5
JS
65 HBitmap *bitmap; /* Dirty sector bitmap implementation */
66 BdrvDirtyBitmap *successor; /* Anonymous child; implies frozen status */
67 char *name; /* Optional non-empty unique ID */
68 int64_t size; /* Size of the bitmap (Number of sectors) */
69 bool disabled; /* Bitmap is read-only */
e4654d2d
FZ
70 QLIST_ENTRY(BdrvDirtyBitmap) list;
71};
72
1c9805a3
SH
73#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
74
c69a4dd8 75struct BdrvStates bdrv_states = QTAILQ_HEAD_INITIALIZER(bdrv_states);
7ee930d0 76
dc364f4c
BC
77static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
78 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
79
2c1d04e0
HR
80static QTAILQ_HEAD(, BlockDriverState) all_bdrv_states =
81 QTAILQ_HEAD_INITIALIZER(all_bdrv_states);
82
8a22f02a
SH
83static QLIST_HEAD(, BlockDriver) bdrv_drivers =
84 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 85
f3930ed0
KW
86static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
87 const char *reference, QDict *options, int flags,
88 BlockDriverState *parent,
ce343771 89 const BdrvChildRole *child_role, Error **errp);
f3930ed0 90
ce1ffea8 91static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs);
c5acdc9a
HR
92static void bdrv_release_named_dirty_bitmaps(BlockDriverState *bs);
93
eb852011
MA
94/* If non-zero, use only whitelisted block drivers */
95static int use_bdrv_whitelist;
96
64dff520
HR
97static void bdrv_close(BlockDriverState *bs);
98
9e0b22f4
SH
99#ifdef _WIN32
100static int is_windows_drive_prefix(const char *filename)
101{
102 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
103 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
104 filename[1] == ':');
105}
106
107int is_windows_drive(const char *filename)
108{
109 if (is_windows_drive_prefix(filename) &&
110 filename[2] == '\0')
111 return 1;
112 if (strstart(filename, "\\\\.\\", NULL) ||
113 strstart(filename, "//./", NULL))
114 return 1;
115 return 0;
116}
117#endif
118
339064d5
KW
119size_t bdrv_opt_mem_align(BlockDriverState *bs)
120{
121 if (!bs || !bs->drv) {
459b4e66
DL
122 /* page size or 4k (hdd sector size) should be on the safe side */
123 return MAX(4096, getpagesize());
339064d5
KW
124 }
125
126 return bs->bl.opt_mem_alignment;
127}
128
4196d2f0
DL
129size_t bdrv_min_mem_align(BlockDriverState *bs)
130{
131 if (!bs || !bs->drv) {
459b4e66
DL
132 /* page size or 4k (hdd sector size) should be on the safe side */
133 return MAX(4096, getpagesize());
4196d2f0
DL
134 }
135
136 return bs->bl.min_mem_alignment;
137}
138
9e0b22f4 139/* check if the path starts with "<protocol>:" */
5c98415b 140int path_has_protocol(const char *path)
9e0b22f4 141{
947995c0
PB
142 const char *p;
143
9e0b22f4
SH
144#ifdef _WIN32
145 if (is_windows_drive(path) ||
146 is_windows_drive_prefix(path)) {
147 return 0;
148 }
947995c0
PB
149 p = path + strcspn(path, ":/\\");
150#else
151 p = path + strcspn(path, ":/");
9e0b22f4
SH
152#endif
153
947995c0 154 return *p == ':';
9e0b22f4
SH
155}
156
83f64091 157int path_is_absolute(const char *path)
3b0d4f61 158{
21664424
FB
159#ifdef _WIN32
160 /* specific case for names like: "\\.\d:" */
f53f4da9 161 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 162 return 1;
f53f4da9
PB
163 }
164 return (*path == '/' || *path == '\\');
3b9f94e1 165#else
f53f4da9 166 return (*path == '/');
3b9f94e1 167#endif
3b0d4f61
FB
168}
169
83f64091
FB
170/* if filename is absolute, just copy it to dest. Otherwise, build a
171 path to it by considering it is relative to base_path. URL are
172 supported. */
173void path_combine(char *dest, int dest_size,
174 const char *base_path,
175 const char *filename)
3b0d4f61 176{
83f64091
FB
177 const char *p, *p1;
178 int len;
179
180 if (dest_size <= 0)
181 return;
182 if (path_is_absolute(filename)) {
183 pstrcpy(dest, dest_size, filename);
184 } else {
185 p = strchr(base_path, ':');
186 if (p)
187 p++;
188 else
189 p = base_path;
3b9f94e1
FB
190 p1 = strrchr(base_path, '/');
191#ifdef _WIN32
192 {
193 const char *p2;
194 p2 = strrchr(base_path, '\\');
195 if (!p1 || p2 > p1)
196 p1 = p2;
197 }
198#endif
83f64091
FB
199 if (p1)
200 p1++;
201 else
202 p1 = base_path;
203 if (p1 > p)
204 p = p1;
205 len = p - base_path;
206 if (len > dest_size - 1)
207 len = dest_size - 1;
208 memcpy(dest, base_path, len);
209 dest[len] = '\0';
210 pstrcat(dest, dest_size, filename);
3b0d4f61 211 }
3b0d4f61
FB
212}
213
0a82855a
HR
214void bdrv_get_full_backing_filename_from_filename(const char *backed,
215 const char *backing,
9f07429e
HR
216 char *dest, size_t sz,
217 Error **errp)
dc5a1371 218{
9f07429e
HR
219 if (backing[0] == '\0' || path_has_protocol(backing) ||
220 path_is_absolute(backing))
221 {
0a82855a 222 pstrcpy(dest, sz, backing);
9f07429e
HR
223 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
224 error_setg(errp, "Cannot use relative backing file names for '%s'",
225 backed);
dc5a1371 226 } else {
0a82855a 227 path_combine(dest, sz, backed, backing);
dc5a1371
PB
228 }
229}
230
9f07429e
HR
231void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
232 Error **errp)
0a82855a 233{
9f07429e
HR
234 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
235
236 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
237 dest, sz, errp);
0a82855a
HR
238}
239
0eb7217e
SH
240void bdrv_register(BlockDriver *bdrv)
241{
242 bdrv_setup_io_funcs(bdrv);
b2e12bc6 243
8a22f02a 244 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 245}
b338082b 246
7f06d47e 247BlockDriverState *bdrv_new_root(void)
b338082b 248{
7f06d47e 249 BlockDriverState *bs = bdrv_new();
e4e9986b 250
e4e9986b 251 QTAILQ_INSERT_TAIL(&bdrv_states, bs, device_list);
e4e9986b
MA
252 return bs;
253}
254
255BlockDriverState *bdrv_new(void)
256{
257 BlockDriverState *bs;
258 int i;
259
5839e53b 260 bs = g_new0(BlockDriverState, 1);
e4654d2d 261 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
262 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
263 QLIST_INIT(&bs->op_blockers[i]);
264 }
d616b224 265 notifier_with_return_list_init(&bs->before_write_notifiers);
cc0681c4
BC
266 qemu_co_queue_init(&bs->throttled_reqs[0]);
267 qemu_co_queue_init(&bs->throttled_reqs[1]);
9fcb0251 268 bs->refcnt = 1;
dcd04228 269 bs->aio_context = qemu_get_aio_context();
d7d512f6 270
2c1d04e0
HR
271 QTAILQ_INSERT_TAIL(&all_bdrv_states, bs, bs_list);
272
b338082b
FB
273 return bs;
274}
275
ea2384d3
FB
276BlockDriver *bdrv_find_format(const char *format_name)
277{
278 BlockDriver *drv1;
8a22f02a
SH
279 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
280 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 281 return drv1;
8a22f02a 282 }
ea2384d3
FB
283 }
284 return NULL;
285}
286
b64ec4e4 287static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 288{
b64ec4e4
FZ
289 static const char *whitelist_rw[] = {
290 CONFIG_BDRV_RW_WHITELIST
291 };
292 static const char *whitelist_ro[] = {
293 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
294 };
295 const char **p;
296
b64ec4e4 297 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 298 return 1; /* no whitelist, anything goes */
b64ec4e4 299 }
eb852011 300
b64ec4e4 301 for (p = whitelist_rw; *p; p++) {
eb852011
MA
302 if (!strcmp(drv->format_name, *p)) {
303 return 1;
304 }
305 }
b64ec4e4
FZ
306 if (read_only) {
307 for (p = whitelist_ro; *p; p++) {
308 if (!strcmp(drv->format_name, *p)) {
309 return 1;
310 }
311 }
312 }
eb852011
MA
313 return 0;
314}
315
5b7e1542
ZYW
316typedef struct CreateCo {
317 BlockDriver *drv;
318 char *filename;
83d0521a 319 QemuOpts *opts;
5b7e1542 320 int ret;
cc84d90f 321 Error *err;
5b7e1542
ZYW
322} CreateCo;
323
324static void coroutine_fn bdrv_create_co_entry(void *opaque)
325{
cc84d90f
HR
326 Error *local_err = NULL;
327 int ret;
328
5b7e1542
ZYW
329 CreateCo *cco = opaque;
330 assert(cco->drv);
331
c282e1fd 332 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
84d18f06 333 if (local_err) {
cc84d90f
HR
334 error_propagate(&cco->err, local_err);
335 }
336 cco->ret = ret;
5b7e1542
ZYW
337}
338
0e7e1989 339int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 340 QemuOpts *opts, Error **errp)
ea2384d3 341{
5b7e1542
ZYW
342 int ret;
343
344 Coroutine *co;
345 CreateCo cco = {
346 .drv = drv,
347 .filename = g_strdup(filename),
83d0521a 348 .opts = opts,
5b7e1542 349 .ret = NOT_DONE,
cc84d90f 350 .err = NULL,
5b7e1542
ZYW
351 };
352
c282e1fd 353 if (!drv->bdrv_create) {
cc84d90f 354 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
355 ret = -ENOTSUP;
356 goto out;
5b7e1542
ZYW
357 }
358
359 if (qemu_in_coroutine()) {
360 /* Fast-path if already in coroutine context */
361 bdrv_create_co_entry(&cco);
362 } else {
363 co = qemu_coroutine_create(bdrv_create_co_entry);
364 qemu_coroutine_enter(co, &cco);
365 while (cco.ret == NOT_DONE) {
b47ec2c4 366 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
367 }
368 }
369
370 ret = cco.ret;
cc84d90f 371 if (ret < 0) {
84d18f06 372 if (cco.err) {
cc84d90f
HR
373 error_propagate(errp, cco.err);
374 } else {
375 error_setg_errno(errp, -ret, "Could not create image");
376 }
377 }
0e7e1989 378
80168bff
LC
379out:
380 g_free(cco.filename);
5b7e1542 381 return ret;
ea2384d3
FB
382}
383
c282e1fd 384int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
385{
386 BlockDriver *drv;
cc84d90f
HR
387 Error *local_err = NULL;
388 int ret;
84a12e66 389
b65a5e12 390 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 391 if (drv == NULL) {
16905d71 392 return -ENOENT;
84a12e66
CH
393 }
394
c282e1fd 395 ret = bdrv_create(drv, filename, opts, &local_err);
84d18f06 396 if (local_err) {
cc84d90f
HR
397 error_propagate(errp, local_err);
398 }
399 return ret;
84a12e66
CH
400}
401
892b7de8
ET
402/**
403 * Try to get @bs's logical and physical block size.
404 * On success, store them in @bsz struct and return 0.
405 * On failure return -errno.
406 * @bs must not be empty.
407 */
408int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
409{
410 BlockDriver *drv = bs->drv;
411
412 if (drv && drv->bdrv_probe_blocksizes) {
413 return drv->bdrv_probe_blocksizes(bs, bsz);
414 }
415
416 return -ENOTSUP;
417}
418
419/**
420 * Try to get @bs's geometry (cyls, heads, sectors).
421 * On success, store them in @geo struct and return 0.
422 * On failure return -errno.
423 * @bs must not be empty.
424 */
425int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
426{
427 BlockDriver *drv = bs->drv;
428
429 if (drv && drv->bdrv_probe_geometry) {
430 return drv->bdrv_probe_geometry(bs, geo);
431 }
432
433 return -ENOTSUP;
434}
435
eba25057
JM
436/*
437 * Create a uniquely-named empty temporary file.
438 * Return 0 upon success, otherwise a negative errno value.
439 */
440int get_tmp_filename(char *filename, int size)
d5249393 441{
eba25057 442#ifdef _WIN32
3b9f94e1 443 char temp_dir[MAX_PATH];
eba25057
JM
444 /* GetTempFileName requires that its output buffer (4th param)
445 have length MAX_PATH or greater. */
446 assert(size >= MAX_PATH);
447 return (GetTempPath(MAX_PATH, temp_dir)
448 && GetTempFileName(temp_dir, "qem", 0, filename)
449 ? 0 : -GetLastError());
d5249393 450#else
67b915a5 451 int fd;
7ccfb2eb 452 const char *tmpdir;
0badc1ee 453 tmpdir = getenv("TMPDIR");
69bef793
AS
454 if (!tmpdir) {
455 tmpdir = "/var/tmp";
456 }
eba25057
JM
457 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
458 return -EOVERFLOW;
459 }
ea2384d3 460 fd = mkstemp(filename);
fe235a06
DH
461 if (fd < 0) {
462 return -errno;
463 }
464 if (close(fd) != 0) {
465 unlink(filename);
eba25057
JM
466 return -errno;
467 }
468 return 0;
d5249393 469#endif
eba25057 470}
fc01f7e7 471
84a12e66
CH
472/*
473 * Detect host devices. By convention, /dev/cdrom[N] is always
474 * recognized as a host CDROM.
475 */
476static BlockDriver *find_hdev_driver(const char *filename)
477{
478 int score_max = 0, score;
479 BlockDriver *drv = NULL, *d;
480
481 QLIST_FOREACH(d, &bdrv_drivers, list) {
482 if (d->bdrv_probe_device) {
483 score = d->bdrv_probe_device(filename);
484 if (score > score_max) {
485 score_max = score;
486 drv = d;
487 }
488 }
489 }
490
491 return drv;
492}
493
98289620 494BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
495 bool allow_protocol_prefix,
496 Error **errp)
83f64091
FB
497{
498 BlockDriver *drv1;
499 char protocol[128];
1cec71e3 500 int len;
83f64091 501 const char *p;
19cb3738 502
66f82cee
KW
503 /* TODO Drivers without bdrv_file_open must be specified explicitly */
504
39508e7a
CH
505 /*
506 * XXX(hch): we really should not let host device detection
507 * override an explicit protocol specification, but moving this
508 * later breaks access to device names with colons in them.
509 * Thanks to the brain-dead persistent naming schemes on udev-
510 * based Linux systems those actually are quite common.
511 */
512 drv1 = find_hdev_driver(filename);
513 if (drv1) {
514 return drv1;
515 }
516
98289620 517 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 518 return &bdrv_file;
84a12e66 519 }
98289620 520
9e0b22f4
SH
521 p = strchr(filename, ':');
522 assert(p != NULL);
1cec71e3
AL
523 len = p - filename;
524 if (len > sizeof(protocol) - 1)
525 len = sizeof(protocol) - 1;
526 memcpy(protocol, filename, len);
527 protocol[len] = '\0';
8a22f02a 528 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
5fafdf24 529 if (drv1->protocol_name &&
8a22f02a 530 !strcmp(drv1->protocol_name, protocol)) {
83f64091 531 return drv1;
8a22f02a 532 }
83f64091 533 }
b65a5e12
HR
534
535 error_setg(errp, "Unknown protocol '%s'", protocol);
83f64091
FB
536 return NULL;
537}
538
c6684249
MA
539/*
540 * Guess image format by probing its contents.
541 * This is not a good idea when your image is raw (CVE-2008-2004), but
542 * we do it anyway for backward compatibility.
543 *
544 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
545 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
546 * but can be smaller if the image file is smaller)
c6684249
MA
547 * @filename is its filename.
548 *
549 * For all block drivers, call the bdrv_probe() method to get its
550 * probing score.
551 * Return the first block driver with the highest probing score.
552 */
38f3ef57
KW
553BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
554 const char *filename)
c6684249
MA
555{
556 int score_max = 0, score;
557 BlockDriver *drv = NULL, *d;
558
559 QLIST_FOREACH(d, &bdrv_drivers, list) {
560 if (d->bdrv_probe) {
561 score = d->bdrv_probe(buf, buf_size, filename);
562 if (score > score_max) {
563 score_max = score;
564 drv = d;
565 }
566 }
567 }
568
569 return drv;
570}
571
f500a6d3 572static int find_image_format(BlockDriverState *bs, const char *filename,
34b5d2c6 573 BlockDriver **pdrv, Error **errp)
f3a5d3f8 574{
c6684249 575 BlockDriver *drv;
7cddd372 576 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 577 int ret = 0;
f8ea0b00 578
08a00559 579 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
b192af8a 580 if (bdrv_is_sg(bs) || !bdrv_is_inserted(bs) || bdrv_getlength(bs) == 0) {
ef810437 581 *pdrv = &bdrv_raw;
c98ac35d 582 return ret;
1a396859 583 }
f8ea0b00 584
83f64091 585 ret = bdrv_pread(bs, 0, buf, sizeof(buf));
83f64091 586 if (ret < 0) {
34b5d2c6
HR
587 error_setg_errno(errp, -ret, "Could not read image for determining its "
588 "format");
c98ac35d
SW
589 *pdrv = NULL;
590 return ret;
83f64091
FB
591 }
592
c6684249 593 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 594 if (!drv) {
34b5d2c6
HR
595 error_setg(errp, "Could not determine image format: No compatible "
596 "driver found");
c98ac35d
SW
597 ret = -ENOENT;
598 }
599 *pdrv = drv;
600 return ret;
ea2384d3
FB
601}
602
51762288
SH
603/**
604 * Set the current 'total_sectors' value
65a9bb25 605 * Return 0 on success, -errno on error.
51762288
SH
606 */
607static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
608{
609 BlockDriver *drv = bs->drv;
610
396759ad 611 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 612 if (bdrv_is_sg(bs))
396759ad
NB
613 return 0;
614
51762288
SH
615 /* query actual device if possible, otherwise just trust the hint */
616 if (drv->bdrv_getlength) {
617 int64_t length = drv->bdrv_getlength(bs);
618 if (length < 0) {
619 return length;
620 }
7e382003 621 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
622 }
623
624 bs->total_sectors = hint;
625 return 0;
626}
627
cddff5ba
KW
628/**
629 * Combines a QDict of new block driver @options with any missing options taken
630 * from @old_options, so that leaving out an option defaults to its old value.
631 */
632static void bdrv_join_options(BlockDriverState *bs, QDict *options,
633 QDict *old_options)
634{
635 if (bs->drv && bs->drv->bdrv_join_options) {
636 bs->drv->bdrv_join_options(options, old_options);
637 } else {
638 qdict_join(options, old_options, false);
639 }
640}
641
9e8f1835
PB
642/**
643 * Set open flags for a given discard mode
644 *
645 * Return 0 on success, -1 if the discard mode was invalid.
646 */
647int bdrv_parse_discard_flags(const char *mode, int *flags)
648{
649 *flags &= ~BDRV_O_UNMAP;
650
651 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
652 /* do nothing */
653 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
654 *flags |= BDRV_O_UNMAP;
655 } else {
656 return -1;
657 }
658
659 return 0;
660}
661
c3993cdc
SH
662/**
663 * Set open flags for a given cache mode
664 *
665 * Return 0 on success, -1 if the cache mode was invalid.
666 */
667int bdrv_parse_cache_flags(const char *mode, int *flags)
668{
669 *flags &= ~BDRV_O_CACHE_MASK;
670
671 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
672 *flags |= BDRV_O_NOCACHE | BDRV_O_CACHE_WB;
92196b2f
SH
673 } else if (!strcmp(mode, "directsync")) {
674 *flags |= BDRV_O_NOCACHE;
c3993cdc
SH
675 } else if (!strcmp(mode, "writeback")) {
676 *flags |= BDRV_O_CACHE_WB;
677 } else if (!strcmp(mode, "unsafe")) {
678 *flags |= BDRV_O_CACHE_WB;
679 *flags |= BDRV_O_NO_FLUSH;
680 } else if (!strcmp(mode, "writethrough")) {
681 /* this is the default */
682 } else {
683 return -1;
684 }
685
686 return 0;
687}
688
b1e6fc08
KW
689/*
690 * Returns the flags that a temporary snapshot should get, based on the
691 * originally requested flags (the originally requested image will have flags
692 * like a backing file)
693 */
694static int bdrv_temp_snapshot_flags(int flags)
695{
696 return (flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
697}
698
0b50cc88 699/*
8e2160e2
KW
700 * Returns the options and flags that bs->file should get if a protocol driver
701 * is expected, based on the given options and flags for the parent BDS
0b50cc88 702 */
8e2160e2
KW
703static void bdrv_inherited_options(int *child_flags, QDict *child_options,
704 int parent_flags, QDict *parent_options)
0b50cc88 705{
8e2160e2
KW
706 int flags = parent_flags;
707
0b50cc88
KW
708 /* Enable protocol handling, disable format probing for bs->file */
709 flags |= BDRV_O_PROTOCOL;
710
91a097e7
KW
711 /* If the cache mode isn't explicitly set, inherit direct and no-flush from
712 * the parent. */
713 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
714 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
715
0b50cc88 716 /* Our block drivers take care to send flushes and respect unmap policy,
91a097e7
KW
717 * so we can default to enable both on lower layers regardless of the
718 * corresponding parent options. */
719 qdict_set_default_str(child_options, BDRV_OPT_CACHE_WB, "on");
720 flags |= BDRV_O_UNMAP;
0b50cc88 721
0b50cc88 722 /* Clear flags that only apply to the top layer */
5669b44d 723 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ);
0b50cc88 724
8e2160e2 725 *child_flags = flags;
0b50cc88
KW
726}
727
f3930ed0 728const BdrvChildRole child_file = {
8e2160e2 729 .inherit_options = bdrv_inherited_options,
f3930ed0
KW
730};
731
732/*
8e2160e2
KW
733 * Returns the options and flags that bs->file should get if the use of formats
734 * (and not only protocols) is permitted for it, based on the given options and
735 * flags for the parent BDS
f3930ed0 736 */
8e2160e2
KW
737static void bdrv_inherited_fmt_options(int *child_flags, QDict *child_options,
738 int parent_flags, QDict *parent_options)
f3930ed0 739{
8e2160e2
KW
740 child_file.inherit_options(child_flags, child_options,
741 parent_flags, parent_options);
742
743 *child_flags &= ~BDRV_O_PROTOCOL;
f3930ed0
KW
744}
745
746const BdrvChildRole child_format = {
8e2160e2 747 .inherit_options = bdrv_inherited_fmt_options,
f3930ed0
KW
748};
749
317fc44e 750/*
8e2160e2
KW
751 * Returns the options and flags that bs->backing should get, based on the
752 * given options and flags for the parent BDS
317fc44e 753 */
8e2160e2
KW
754static void bdrv_backing_options(int *child_flags, QDict *child_options,
755 int parent_flags, QDict *parent_options)
317fc44e 756{
8e2160e2
KW
757 int flags = parent_flags;
758
91a097e7
KW
759 /* The cache mode is inherited unmodified for backing files */
760 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_WB);
761 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
762 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
763
317fc44e
KW
764 /* backing files always opened read-only */
765 flags &= ~(BDRV_O_RDWR | BDRV_O_COPY_ON_READ);
766
767 /* snapshot=on is handled on the top layer */
8bfea15d 768 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e 769
8e2160e2 770 *child_flags = flags;
317fc44e
KW
771}
772
f3930ed0 773static const BdrvChildRole child_backing = {
8e2160e2 774 .inherit_options = bdrv_backing_options,
f3930ed0
KW
775};
776
7b272452
KW
777static int bdrv_open_flags(BlockDriverState *bs, int flags)
778{
779 int open_flags = flags | BDRV_O_CACHE_WB;
780
781 /*
782 * Clear flags that are internal to the block layer before opening the
783 * image.
784 */
20cca275 785 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
786
787 /*
788 * Snapshots should be writable.
789 */
8bfea15d 790 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
791 open_flags |= BDRV_O_RDWR;
792 }
793
794 return open_flags;
795}
796
91a097e7
KW
797static void update_flags_from_options(int *flags, QemuOpts *opts)
798{
799 *flags &= ~BDRV_O_CACHE_MASK;
800
801 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_WB));
802 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_WB, false)) {
803 *flags |= BDRV_O_CACHE_WB;
804 }
805
806 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_NO_FLUSH));
807 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_NO_FLUSH, false)) {
808 *flags |= BDRV_O_NO_FLUSH;
809 }
810
811 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_DIRECT));
812 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_DIRECT, false)) {
813 *flags |= BDRV_O_NOCACHE;
814 }
815}
816
817static void update_options_from_flags(QDict *options, int flags)
818{
819 if (!qdict_haskey(options, BDRV_OPT_CACHE_WB)) {
820 qdict_put(options, BDRV_OPT_CACHE_WB,
821 qbool_from_bool(flags & BDRV_O_CACHE_WB));
822 }
823 if (!qdict_haskey(options, BDRV_OPT_CACHE_DIRECT)) {
824 qdict_put(options, BDRV_OPT_CACHE_DIRECT,
825 qbool_from_bool(flags & BDRV_O_NOCACHE));
826 }
827 if (!qdict_haskey(options, BDRV_OPT_CACHE_NO_FLUSH)) {
828 qdict_put(options, BDRV_OPT_CACHE_NO_FLUSH,
829 qbool_from_bool(flags & BDRV_O_NO_FLUSH));
830 }
831}
832
636ea370
KW
833static void bdrv_assign_node_name(BlockDriverState *bs,
834 const char *node_name,
835 Error **errp)
6913c0c2 836{
15489c76 837 char *gen_node_name = NULL;
6913c0c2 838
15489c76
JC
839 if (!node_name) {
840 node_name = gen_node_name = id_generate(ID_BLOCK);
841 } else if (!id_wellformed(node_name)) {
842 /*
843 * Check for empty string or invalid characters, but not if it is
844 * generated (generated names use characters not available to the user)
845 */
9aebf3b8 846 error_setg(errp, "Invalid node name");
636ea370 847 return;
6913c0c2
BC
848 }
849
0c5e94ee 850 /* takes care of avoiding namespaces collisions */
7f06d47e 851 if (blk_by_name(node_name)) {
0c5e94ee
BC
852 error_setg(errp, "node-name=%s is conflicting with a device id",
853 node_name);
15489c76 854 goto out;
0c5e94ee
BC
855 }
856
6913c0c2
BC
857 /* takes care of avoiding duplicates node names */
858 if (bdrv_find_node(node_name)) {
859 error_setg(errp, "Duplicate node name");
15489c76 860 goto out;
6913c0c2
BC
861 }
862
863 /* copy node name into the bs and insert it into the graph list */
864 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
865 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
15489c76
JC
866out:
867 g_free(gen_node_name);
6913c0c2
BC
868}
869
18edf289
KW
870static QemuOptsList bdrv_runtime_opts = {
871 .name = "bdrv_common",
872 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
873 .desc = {
874 {
875 .name = "node-name",
876 .type = QEMU_OPT_STRING,
877 .help = "Node name of the block device node",
878 },
62392ebb
KW
879 {
880 .name = "driver",
881 .type = QEMU_OPT_STRING,
882 .help = "Block driver to use for the node",
883 },
91a097e7
KW
884 {
885 .name = BDRV_OPT_CACHE_WB,
886 .type = QEMU_OPT_BOOL,
887 .help = "Enable writeback mode",
888 },
889 {
890 .name = BDRV_OPT_CACHE_DIRECT,
891 .type = QEMU_OPT_BOOL,
892 .help = "Bypass software writeback cache on the host",
893 },
894 {
895 .name = BDRV_OPT_CACHE_NO_FLUSH,
896 .type = QEMU_OPT_BOOL,
897 .help = "Ignore flush requests",
898 },
18edf289
KW
899 { /* end of list */ }
900 },
901};
902
57915332
KW
903/*
904 * Common part for opening disk images and files
b6ad491a
KW
905 *
906 * Removes all processed options from *options.
57915332 907 */
9a4f4c31 908static int bdrv_open_common(BlockDriverState *bs, BdrvChild *file,
82dc8b41 909 QDict *options, Error **errp)
57915332
KW
910{
911 int ret, open_flags;
035fccdf 912 const char *filename;
62392ebb 913 const char *driver_name = NULL;
6913c0c2 914 const char *node_name = NULL;
18edf289 915 QemuOpts *opts;
62392ebb 916 BlockDriver *drv;
34b5d2c6 917 Error *local_err = NULL;
57915332 918
6405875c 919 assert(bs->file == NULL);
707ff828 920 assert(options != NULL && bs->options != options);
57915332 921
62392ebb
KW
922 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
923 qemu_opts_absorb_qdict(opts, options, &local_err);
924 if (local_err) {
925 error_propagate(errp, local_err);
926 ret = -EINVAL;
927 goto fail_opts;
928 }
929
930 driver_name = qemu_opt_get(opts, "driver");
931 drv = bdrv_find_format(driver_name);
932 assert(drv != NULL);
933
45673671 934 if (file != NULL) {
9a4f4c31 935 filename = file->bs->filename;
45673671
KW
936 } else {
937 filename = qdict_get_try_str(options, "filename");
938 }
939
765003db
KW
940 if (drv->bdrv_needs_filename && !filename) {
941 error_setg(errp, "The '%s' block driver requires a file name",
942 drv->format_name);
18edf289
KW
943 ret = -EINVAL;
944 goto fail_opts;
6913c0c2 945 }
6913c0c2 946
82dc8b41
KW
947 trace_bdrv_open_common(bs, filename ?: "", bs->open_flags,
948 drv->format_name);
62392ebb 949
18edf289 950 node_name = qemu_opt_get(opts, "node-name");
636ea370 951 bdrv_assign_node_name(bs, node_name, &local_err);
0fb6395c 952 if (local_err) {
636ea370 953 error_propagate(errp, local_err);
18edf289
KW
954 ret = -EINVAL;
955 goto fail_opts;
5d186eb0
KW
956 }
957
c25f53b0 958 bs->request_alignment = 512;
0d51b4de 959 bs->zero_beyond_eof = true;
82dc8b41 960 bs->read_only = !(bs->open_flags & BDRV_O_RDWR);
b64ec4e4
FZ
961
962 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
963 error_setg(errp,
964 !bs->read_only && bdrv_is_whitelisted(drv, true)
965 ? "Driver '%s' can only be used for read-only devices"
966 : "Driver '%s' is not whitelisted",
967 drv->format_name);
18edf289
KW
968 ret = -ENOTSUP;
969 goto fail_opts;
b64ec4e4 970 }
57915332 971
53fec9d3 972 assert(bs->copy_on_read == 0); /* bdrv_new() and bdrv_close() make it so */
82dc8b41 973 if (bs->open_flags & BDRV_O_COPY_ON_READ) {
0ebd24e0
KW
974 if (!bs->read_only) {
975 bdrv_enable_copy_on_read(bs);
976 } else {
977 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
978 ret = -EINVAL;
979 goto fail_opts;
0ebd24e0 980 }
53fec9d3
SH
981 }
982
c2ad1b0c
KW
983 if (filename != NULL) {
984 pstrcpy(bs->filename, sizeof(bs->filename), filename);
985 } else {
986 bs->filename[0] = '\0';
987 }
91af7014 988 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 989
57915332 990 bs->drv = drv;
7267c094 991 bs->opaque = g_malloc0(drv->instance_size);
57915332 992
91a097e7
KW
993 /* Apply cache mode options */
994 update_flags_from_options(&bs->open_flags, opts);
995 bdrv_set_enable_write_cache(bs, bs->open_flags & BDRV_O_CACHE_WB);
e7c63796 996
66f82cee 997 /* Open the image, either directly or using a protocol */
82dc8b41 998 open_flags = bdrv_open_flags(bs, bs->open_flags);
66f82cee 999 if (drv->bdrv_file_open) {
5d186eb0 1000 assert(file == NULL);
030be321 1001 assert(!drv->bdrv_needs_filename || filename != NULL);
34b5d2c6 1002 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
f500a6d3 1003 } else {
2af5ef70 1004 if (file == NULL) {
34b5d2c6
HR
1005 error_setg(errp, "Can't use '%s' as a block driver for the "
1006 "protocol level", drv->format_name);
2af5ef70
KW
1007 ret = -EINVAL;
1008 goto free_and_fail;
1009 }
f500a6d3 1010 bs->file = file;
34b5d2c6 1011 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
66f82cee
KW
1012 }
1013
57915332 1014 if (ret < 0) {
84d18f06 1015 if (local_err) {
34b5d2c6 1016 error_propagate(errp, local_err);
2fa9aa59
DH
1017 } else if (bs->filename[0]) {
1018 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
34b5d2c6
HR
1019 } else {
1020 error_setg_errno(errp, -ret, "Could not open image");
1021 }
57915332
KW
1022 goto free_and_fail;
1023 }
1024
a1f688f4
MA
1025 if (bs->encrypted) {
1026 error_report("Encrypted images are deprecated");
1027 error_printf("Support for them will be removed in a future release.\n"
1028 "You can use 'qemu-img convert' to convert your image"
1029 " to an unencrypted one.\n");
1030 }
1031
51762288
SH
1032 ret = refresh_total_sectors(bs, bs->total_sectors);
1033 if (ret < 0) {
34b5d2c6 1034 error_setg_errno(errp, -ret, "Could not refresh total sector count");
51762288 1035 goto free_and_fail;
57915332 1036 }
51762288 1037
3baca891
KW
1038 bdrv_refresh_limits(bs, &local_err);
1039 if (local_err) {
1040 error_propagate(errp, local_err);
1041 ret = -EINVAL;
1042 goto free_and_fail;
1043 }
1044
c25f53b0 1045 assert(bdrv_opt_mem_align(bs) != 0);
4196d2f0 1046 assert(bdrv_min_mem_align(bs) != 0);
b192af8a 1047 assert((bs->request_alignment != 0) || bdrv_is_sg(bs));
18edf289
KW
1048
1049 qemu_opts_del(opts);
57915332
KW
1050 return 0;
1051
1052free_and_fail:
f500a6d3 1053 bs->file = NULL;
7267c094 1054 g_free(bs->opaque);
57915332
KW
1055 bs->opaque = NULL;
1056 bs->drv = NULL;
18edf289
KW
1057fail_opts:
1058 qemu_opts_del(opts);
57915332
KW
1059 return ret;
1060}
1061
5e5c4f63
KW
1062static QDict *parse_json_filename(const char *filename, Error **errp)
1063{
1064 QObject *options_obj;
1065 QDict *options;
1066 int ret;
1067
1068 ret = strstart(filename, "json:", &filename);
1069 assert(ret);
1070
1071 options_obj = qobject_from_json(filename);
1072 if (!options_obj) {
1073 error_setg(errp, "Could not parse the JSON options");
1074 return NULL;
1075 }
1076
1077 if (qobject_type(options_obj) != QTYPE_QDICT) {
1078 qobject_decref(options_obj);
1079 error_setg(errp, "Invalid JSON object given");
1080 return NULL;
1081 }
1082
1083 options = qobject_to_qdict(options_obj);
1084 qdict_flatten(options);
1085
1086 return options;
1087}
1088
de3b53f0
KW
1089static void parse_json_protocol(QDict *options, const char **pfilename,
1090 Error **errp)
1091{
1092 QDict *json_options;
1093 Error *local_err = NULL;
1094
1095 /* Parse json: pseudo-protocol */
1096 if (!*pfilename || !g_str_has_prefix(*pfilename, "json:")) {
1097 return;
1098 }
1099
1100 json_options = parse_json_filename(*pfilename, &local_err);
1101 if (local_err) {
1102 error_propagate(errp, local_err);
1103 return;
1104 }
1105
1106 /* Options given in the filename have lower priority than options
1107 * specified directly */
1108 qdict_join(options, json_options, false);
1109 QDECREF(json_options);
1110 *pfilename = NULL;
1111}
1112
b6ce07aa 1113/*
f54120ff
KW
1114 * Fills in default options for opening images and converts the legacy
1115 * filename/flags pair to option QDict entries.
53a29513
HR
1116 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
1117 * block driver has been specified explicitly.
b6ce07aa 1118 */
de3b53f0 1119static int bdrv_fill_options(QDict **options, const char *filename,
053e1578 1120 int *flags, Error **errp)
ea2384d3 1121{
c2ad1b0c 1122 const char *drvname;
53a29513 1123 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 1124 bool parse_filename = false;
053e1578 1125 BlockDriver *drv = NULL;
34b5d2c6 1126 Error *local_err = NULL;
83f64091 1127
53a29513 1128 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1129 if (drvname) {
1130 drv = bdrv_find_format(drvname);
1131 if (!drv) {
1132 error_setg(errp, "Unknown driver '%s'", drvname);
1133 return -ENOENT;
1134 }
1135 /* If the user has explicitly specified the driver, this choice should
1136 * override the BDRV_O_PROTOCOL flag */
1137 protocol = drv->bdrv_file_open;
53a29513
HR
1138 }
1139
1140 if (protocol) {
1141 *flags |= BDRV_O_PROTOCOL;
1142 } else {
1143 *flags &= ~BDRV_O_PROTOCOL;
1144 }
1145
91a097e7
KW
1146 /* Translate cache options from flags into options */
1147 update_options_from_flags(*options, *flags);
1148
035fccdf 1149 /* Fetch the file name from the options QDict if necessary */
17b005f1 1150 if (protocol && filename) {
f54120ff
KW
1151 if (!qdict_haskey(*options, "filename")) {
1152 qdict_put(*options, "filename", qstring_from_str(filename));
1153 parse_filename = true;
1154 } else {
1155 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1156 "the same time");
1157 return -EINVAL;
1158 }
035fccdf
KW
1159 }
1160
c2ad1b0c 1161 /* Find the right block driver */
f54120ff 1162 filename = qdict_get_try_str(*options, "filename");
f54120ff 1163
053e1578
HR
1164 if (!drvname && protocol) {
1165 if (filename) {
1166 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1167 if (!drv) {
053e1578 1168 return -EINVAL;
17b005f1 1169 }
053e1578
HR
1170
1171 drvname = drv->format_name;
1172 qdict_put(*options, "driver", qstring_from_str(drvname));
1173 } else {
1174 error_setg(errp, "Must specify either driver or file");
1175 return -EINVAL;
98289620 1176 }
c2ad1b0c
KW
1177 }
1178
17b005f1 1179 assert(drv || !protocol);
c2ad1b0c 1180
f54120ff 1181 /* Driver-specific filename parsing */
17b005f1 1182 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1183 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1184 if (local_err) {
34b5d2c6 1185 error_propagate(errp, local_err);
f54120ff 1186 return -EINVAL;
6963a30d 1187 }
cd5d031e
HR
1188
1189 if (!drv->bdrv_needs_filename) {
1190 qdict_del(*options, "filename");
cd5d031e 1191 }
6963a30d
KW
1192 }
1193
d44f928a 1194 if (runstate_check(RUN_STATE_INMIGRATE)) {
04c01a5c 1195 *flags |= BDRV_O_INACTIVE;
d44f928a
HR
1196 }
1197
f54120ff
KW
1198 return 0;
1199}
1200
b4b059f6
KW
1201static BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
1202 BlockDriverState *child_bs,
260fecf1 1203 const char *child_name,
b4b059f6 1204 const BdrvChildRole *child_role)
df581792
KW
1205{
1206 BdrvChild *child = g_new(BdrvChild, 1);
1207 *child = (BdrvChild) {
1208 .bs = child_bs,
260fecf1 1209 .name = g_strdup(child_name),
df581792
KW
1210 .role = child_role,
1211 };
1212
1213 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
d42a8a93 1214 QLIST_INSERT_HEAD(&child_bs->parents, child, next_parent);
b4b059f6
KW
1215
1216 return child;
df581792
KW
1217}
1218
3f09bfbc 1219static void bdrv_detach_child(BdrvChild *child)
33a60407
KW
1220{
1221 QLIST_REMOVE(child, next);
d42a8a93 1222 QLIST_REMOVE(child, next_parent);
260fecf1 1223 g_free(child->name);
33a60407
KW
1224 g_free(child);
1225}
1226
1227void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
1228{
779020cb
KW
1229 BlockDriverState *child_bs;
1230
1231 if (child == NULL) {
1232 return;
1233 }
33a60407
KW
1234
1235 if (child->bs->inherits_from == parent) {
1236 child->bs->inherits_from = NULL;
1237 }
1238
779020cb 1239 child_bs = child->bs;
33a60407
KW
1240 bdrv_detach_child(child);
1241 bdrv_unref(child_bs);
1242}
1243
5db15a57
KW
1244/*
1245 * Sets the backing file link of a BDS. A new reference is created; callers
1246 * which don't need their own reference any more must call bdrv_unref().
1247 */
8d24cce1
FZ
1248void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd)
1249{
5db15a57
KW
1250 if (backing_hd) {
1251 bdrv_ref(backing_hd);
1252 }
8d24cce1 1253
760e0063 1254 if (bs->backing) {
826b6ca0 1255 assert(bs->backing_blocker);
760e0063 1256 bdrv_op_unblock_all(bs->backing->bs, bs->backing_blocker);
5db15a57 1257 bdrv_unref_child(bs, bs->backing);
826b6ca0
FZ
1258 } else if (backing_hd) {
1259 error_setg(&bs->backing_blocker,
81e5f78a
AG
1260 "node is used as backing hd of '%s'",
1261 bdrv_get_device_or_node_name(bs));
826b6ca0
FZ
1262 }
1263
8d24cce1 1264 if (!backing_hd) {
826b6ca0
FZ
1265 error_free(bs->backing_blocker);
1266 bs->backing_blocker = NULL;
760e0063 1267 bs->backing = NULL;
8d24cce1
FZ
1268 goto out;
1269 }
260fecf1 1270 bs->backing = bdrv_attach_child(bs, backing_hd, "backing", &child_backing);
8d24cce1
FZ
1271 bs->open_flags &= ~BDRV_O_NO_BACKING;
1272 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_hd->filename);
1273 pstrcpy(bs->backing_format, sizeof(bs->backing_format),
1274 backing_hd->drv ? backing_hd->drv->format_name : "");
826b6ca0 1275
760e0063 1276 bdrv_op_block_all(backing_hd, bs->backing_blocker);
826b6ca0 1277 /* Otherwise we won't be able to commit due to check in bdrv_commit */
760e0063 1278 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
826b6ca0 1279 bs->backing_blocker);
8d24cce1 1280out:
3baca891 1281 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
1282}
1283
31ca6d07
KW
1284/*
1285 * Opens the backing file for a BlockDriverState if not yet open
1286 *
d9b7b057
KW
1287 * bdref_key specifies the key for the image's BlockdevRef in the options QDict.
1288 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1289 * itself, all options starting with "${bdref_key}." are considered part of the
1290 * BlockdevRef.
1291 *
1292 * TODO Can this be unified with bdrv_open_image()?
31ca6d07 1293 */
d9b7b057
KW
1294int bdrv_open_backing_file(BlockDriverState *bs, QDict *parent_options,
1295 const char *bdref_key, Error **errp)
9156df12 1296{
1ba4b6a5 1297 char *backing_filename = g_malloc0(PATH_MAX);
d9b7b057
KW
1298 char *bdref_key_dot;
1299 const char *reference = NULL;
317fc44e 1300 int ret = 0;
8d24cce1 1301 BlockDriverState *backing_hd;
d9b7b057
KW
1302 QDict *options;
1303 QDict *tmp_parent_options = NULL;
34b5d2c6 1304 Error *local_err = NULL;
9156df12 1305
760e0063 1306 if (bs->backing != NULL) {
1ba4b6a5 1307 goto free_exit;
9156df12
PB
1308 }
1309
31ca6d07 1310 /* NULL means an empty set of options */
d9b7b057
KW
1311 if (parent_options == NULL) {
1312 tmp_parent_options = qdict_new();
1313 parent_options = tmp_parent_options;
31ca6d07
KW
1314 }
1315
9156df12 1316 bs->open_flags &= ~BDRV_O_NO_BACKING;
d9b7b057
KW
1317
1318 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1319 qdict_extract_subqdict(parent_options, &options, bdref_key_dot);
1320 g_free(bdref_key_dot);
1321
1322 reference = qdict_get_try_str(parent_options, bdref_key);
1323 if (reference || qdict_haskey(options, "file.filename")) {
1cb6f506
KW
1324 backing_filename[0] = '\0';
1325 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 1326 QDECREF(options);
1ba4b6a5 1327 goto free_exit;
dbecebdd 1328 } else {
9f07429e
HR
1329 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
1330 &local_err);
1331 if (local_err) {
1332 ret = -EINVAL;
1333 error_propagate(errp, local_err);
1334 QDECREF(options);
1335 goto free_exit;
1336 }
9156df12
PB
1337 }
1338
8ee79e70
KW
1339 if (!bs->drv || !bs->drv->supports_backing) {
1340 ret = -EINVAL;
1341 error_setg(errp, "Driver doesn't support backing files");
1342 QDECREF(options);
1343 goto free_exit;
1344 }
1345
c5f6e493
KW
1346 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
1347 qdict_put(options, "driver", qstring_from_str(bs->backing_format));
9156df12
PB
1348 }
1349
d9b7b057 1350 backing_hd = NULL;
f3930ed0
KW
1351 ret = bdrv_open_inherit(&backing_hd,
1352 *backing_filename ? backing_filename : NULL,
d9b7b057 1353 reference, options, 0, bs, &child_backing,
e43bfd9c 1354 errp);
9156df12 1355 if (ret < 0) {
9156df12 1356 bs->open_flags |= BDRV_O_NO_BACKING;
e43bfd9c 1357 error_prepend(errp, "Could not open backing file: ");
1ba4b6a5 1358 goto free_exit;
9156df12 1359 }
df581792 1360
5db15a57
KW
1361 /* Hook up the backing file link; drop our reference, bs owns the
1362 * backing_hd reference now */
8d24cce1 1363 bdrv_set_backing_hd(bs, backing_hd);
5db15a57 1364 bdrv_unref(backing_hd);
d80ac658 1365
d9b7b057
KW
1366 qdict_del(parent_options, bdref_key);
1367
1ba4b6a5
BC
1368free_exit:
1369 g_free(backing_filename);
d9b7b057 1370 QDECREF(tmp_parent_options);
1ba4b6a5 1371 return ret;
9156df12
PB
1372}
1373
da557aac
HR
1374/*
1375 * Opens a disk image whose options are given as BlockdevRef in another block
1376 * device's options.
1377 *
da557aac 1378 * If allow_none is true, no image will be opened if filename is false and no
b4b059f6 1379 * BlockdevRef is given. NULL will be returned, but errp remains unset.
da557aac
HR
1380 *
1381 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
1382 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1383 * itself, all options starting with "${bdref_key}." are considered part of the
1384 * BlockdevRef.
1385 *
1386 * The BlockdevRef will be removed from the options QDict.
1387 */
b4b059f6
KW
1388BdrvChild *bdrv_open_child(const char *filename,
1389 QDict *options, const char *bdref_key,
1390 BlockDriverState* parent,
1391 const BdrvChildRole *child_role,
1392 bool allow_none, Error **errp)
da557aac 1393{
b4b059f6
KW
1394 BdrvChild *c = NULL;
1395 BlockDriverState *bs;
da557aac
HR
1396 QDict *image_options;
1397 int ret;
1398 char *bdref_key_dot;
1399 const char *reference;
1400
df581792 1401 assert(child_role != NULL);
f67503e5 1402
da557aac
HR
1403 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1404 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
1405 g_free(bdref_key_dot);
1406
1407 reference = qdict_get_try_str(options, bdref_key);
1408 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 1409 if (!allow_none) {
da557aac
HR
1410 error_setg(errp, "A block device must be specified for \"%s\"",
1411 bdref_key);
da557aac 1412 }
b20e61e0 1413 QDECREF(image_options);
da557aac
HR
1414 goto done;
1415 }
1416
b4b059f6
KW
1417 bs = NULL;
1418 ret = bdrv_open_inherit(&bs, filename, reference, image_options, 0,
ce343771 1419 parent, child_role, errp);
df581792
KW
1420 if (ret < 0) {
1421 goto done;
1422 }
1423
260fecf1 1424 c = bdrv_attach_child(parent, bs, bdref_key, child_role);
da557aac
HR
1425
1426done:
1427 qdict_del(options, bdref_key);
b4b059f6
KW
1428 return c;
1429}
1430
6b8aeca5 1431int bdrv_append_temp_snapshot(BlockDriverState *bs, int flags, Error **errp)
b998875d
KW
1432{
1433 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 1434 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 1435 int64_t total_size;
83d0521a 1436 QemuOpts *opts = NULL;
b998875d
KW
1437 QDict *snapshot_options;
1438 BlockDriverState *bs_snapshot;
c2e0dbbf 1439 Error *local_err = NULL;
b998875d
KW
1440 int ret;
1441
1442 /* if snapshot, we create a temporary backing file and open it
1443 instead of opening 'filename' directly */
1444
1445 /* Get the required size from the image */
f187743a
KW
1446 total_size = bdrv_getlength(bs);
1447 if (total_size < 0) {
6b8aeca5 1448 ret = total_size;
f187743a 1449 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 1450 goto out;
f187743a 1451 }
b998875d
KW
1452
1453 /* Create the temporary image */
1ba4b6a5 1454 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
1455 if (ret < 0) {
1456 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 1457 goto out;
b998875d
KW
1458 }
1459
ef810437 1460 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 1461 &error_abort);
39101f25 1462 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
e43bfd9c 1463 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, errp);
83d0521a 1464 qemu_opts_del(opts);
b998875d 1465 if (ret < 0) {
e43bfd9c
MA
1466 error_prepend(errp, "Could not create temporary overlay '%s': ",
1467 tmp_filename);
1ba4b6a5 1468 goto out;
b998875d
KW
1469 }
1470
1471 /* Prepare a new options QDict for the temporary file */
1472 snapshot_options = qdict_new();
1473 qdict_put(snapshot_options, "file.driver",
1474 qstring_from_str("file"));
1475 qdict_put(snapshot_options, "file.filename",
1476 qstring_from_str(tmp_filename));
e6641719
HR
1477 qdict_put(snapshot_options, "driver",
1478 qstring_from_str("qcow2"));
b998875d 1479
e4e9986b 1480 bs_snapshot = bdrv_new();
b998875d
KW
1481
1482 ret = bdrv_open(&bs_snapshot, NULL, NULL, snapshot_options,
6ebf9aa2 1483 flags, &local_err);
b998875d
KW
1484 if (ret < 0) {
1485 error_propagate(errp, local_err);
1ba4b6a5 1486 goto out;
b998875d
KW
1487 }
1488
1489 bdrv_append(bs_snapshot, bs);
1ba4b6a5
BC
1490
1491out:
1492 g_free(tmp_filename);
6b8aeca5 1493 return ret;
b998875d
KW
1494}
1495
b6ce07aa
KW
1496/*
1497 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
1498 *
1499 * options is a QDict of options to pass to the block drivers, or NULL for an
1500 * empty set of options. The reference to the QDict belongs to the block layer
1501 * after the call (even on failure), so if the caller intends to reuse the
1502 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
1503 *
1504 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
1505 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
1506 *
1507 * The reference parameter may be used to specify an existing block device which
1508 * should be opened. If specified, neither options nor a filename may be given,
1509 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 1510 */
f3930ed0
KW
1511static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
1512 const char *reference, QDict *options, int flags,
1513 BlockDriverState *parent,
ce343771 1514 const BdrvChildRole *child_role, Error **errp)
ea2384d3 1515{
b6ce07aa 1516 int ret;
9a4f4c31
KW
1517 BdrvChild *file = NULL;
1518 BlockDriverState *bs;
ce343771 1519 BlockDriver *drv = NULL;
74fe54f2 1520 const char *drvname;
3e8c2e57 1521 const char *backing;
34b5d2c6 1522 Error *local_err = NULL;
b1e6fc08 1523 int snapshot_flags = 0;
712e7874 1524
f67503e5 1525 assert(pbs);
f3930ed0
KW
1526 assert(!child_role || !flags);
1527 assert(!child_role == !parent);
f67503e5 1528
ddf5636d
HR
1529 if (reference) {
1530 bool options_non_empty = options ? qdict_size(options) : false;
1531 QDECREF(options);
1532
1533 if (*pbs) {
1534 error_setg(errp, "Cannot reuse an existing BDS when referencing "
1535 "another block device");
1536 return -EINVAL;
1537 }
1538
1539 if (filename || options_non_empty) {
1540 error_setg(errp, "Cannot reference an existing block device with "
1541 "additional options or a new filename");
1542 return -EINVAL;
1543 }
1544
1545 bs = bdrv_lookup_bs(reference, reference, errp);
1546 if (!bs) {
1547 return -ENODEV;
1548 }
1549 bdrv_ref(bs);
1550 *pbs = bs;
1551 return 0;
1552 }
1553
f67503e5
HR
1554 if (*pbs) {
1555 bs = *pbs;
1556 } else {
e4e9986b 1557 bs = bdrv_new();
f67503e5
HR
1558 }
1559
de9c0cec
KW
1560 /* NULL means an empty set of options */
1561 if (options == NULL) {
1562 options = qdict_new();
1563 }
1564
145f598e 1565 /* json: syntax counts as explicit options, as if in the QDict */
de3b53f0
KW
1566 parse_json_protocol(options, &filename, &local_err);
1567 if (local_err) {
1568 ret = -EINVAL;
1569 goto fail;
1570 }
1571
145f598e
KW
1572 bs->explicit_options = qdict_clone_shallow(options);
1573
f3930ed0 1574 if (child_role) {
bddcec37 1575 bs->inherits_from = parent;
8e2160e2
KW
1576 child_role->inherit_options(&flags, options,
1577 parent->open_flags, parent->options);
f3930ed0
KW
1578 }
1579
de3b53f0 1580 ret = bdrv_fill_options(&options, filename, &flags, &local_err);
462f5bcf
KW
1581 if (local_err) {
1582 goto fail;
1583 }
1584
62392ebb
KW
1585 bs->open_flags = flags;
1586 bs->options = options;
1587 options = qdict_clone_shallow(options);
1588
76c591b0 1589 /* Find the right image format driver */
76c591b0
KW
1590 drvname = qdict_get_try_str(options, "driver");
1591 if (drvname) {
1592 drv = bdrv_find_format(drvname);
76c591b0
KW
1593 if (!drv) {
1594 error_setg(errp, "Unknown driver: '%s'", drvname);
1595 ret = -EINVAL;
1596 goto fail;
1597 }
1598 }
1599
1600 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 1601
3e8c2e57
AG
1602 backing = qdict_get_try_str(options, "backing");
1603 if (backing && *backing == '\0') {
1604 flags |= BDRV_O_NO_BACKING;
1605 qdict_del(options, "backing");
1606 }
1607
f500a6d3 1608 /* Open image file without format layer */
f4788adc
KW
1609 if ((flags & BDRV_O_PROTOCOL) == 0) {
1610 if (flags & BDRV_O_RDWR) {
1611 flags |= BDRV_O_ALLOW_RDWR;
1612 }
1613 if (flags & BDRV_O_SNAPSHOT) {
1614 snapshot_flags = bdrv_temp_snapshot_flags(flags);
8e2160e2 1615 bdrv_backing_options(&flags, options, flags, options);
f4788adc 1616 }
f500a6d3 1617
f3930ed0 1618 bs->open_flags = flags;
1fdd6933 1619
9a4f4c31
KW
1620 file = bdrv_open_child(filename, options, "file", bs,
1621 &child_file, true, &local_err);
1fdd6933
KW
1622 if (local_err) {
1623 ret = -EINVAL;
f4788adc
KW
1624 goto fail;
1625 }
f500a6d3
KW
1626 }
1627
76c591b0 1628 /* Image format probing */
38f3ef57 1629 bs->probed = !drv;
76c591b0 1630 if (!drv && file) {
9a4f4c31 1631 ret = find_image_format(file->bs, filename, &drv, &local_err);
17b005f1 1632 if (ret < 0) {
8bfea15d 1633 goto fail;
2a05cbe4 1634 }
62392ebb
KW
1635 /*
1636 * This option update would logically belong in bdrv_fill_options(),
1637 * but we first need to open bs->file for the probing to work, while
1638 * opening bs->file already requires the (mostly) final set of options
1639 * so that cache mode etc. can be inherited.
1640 *
1641 * Adding the driver later is somewhat ugly, but it's not an option
1642 * that would ever be inherited, so it's correct. We just need to make
1643 * sure to update both bs->options (which has the full effective
1644 * options for bs) and options (which has file.* already removed).
1645 */
1646 qdict_put(bs->options, "driver", qstring_from_str(drv->format_name));
1647 qdict_put(options, "driver", qstring_from_str(drv->format_name));
76c591b0 1648 } else if (!drv) {
17b005f1
KW
1649 error_setg(errp, "Must specify either driver or file");
1650 ret = -EINVAL;
8bfea15d 1651 goto fail;
ea2384d3 1652 }
b6ce07aa 1653
53a29513
HR
1654 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
1655 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
1656 /* file must be NULL if a protocol BDS is about to be created
1657 * (the inverse results in an error message from bdrv_open_common()) */
1658 assert(!(flags & BDRV_O_PROTOCOL) || !file);
1659
b6ce07aa 1660 /* Open the image */
82dc8b41 1661 ret = bdrv_open_common(bs, file, options, &local_err);
b6ce07aa 1662 if (ret < 0) {
8bfea15d 1663 goto fail;
6987307c
CH
1664 }
1665
2a05cbe4 1666 if (file && (bs->file != file)) {
9a4f4c31 1667 bdrv_unref_child(bs, file);
f500a6d3
KW
1668 file = NULL;
1669 }
1670
b6ce07aa 1671 /* If there is a backing file, use it */
9156df12 1672 if ((flags & BDRV_O_NO_BACKING) == 0) {
d9b7b057 1673 ret = bdrv_open_backing_file(bs, options, "backing", &local_err);
b6ce07aa 1674 if (ret < 0) {
b6ad491a 1675 goto close_and_fail;
b6ce07aa 1676 }
b6ce07aa
KW
1677 }
1678
91af7014
HR
1679 bdrv_refresh_filename(bs);
1680
b6ad491a 1681 /* Check if any unknown options were used */
5acd9d81 1682 if (options && (qdict_size(options) != 0)) {
b6ad491a 1683 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
1684 if (flags & BDRV_O_PROTOCOL) {
1685 error_setg(errp, "Block protocol '%s' doesn't support the option "
1686 "'%s'", drv->format_name, entry->key);
1687 } else {
1688 error_setg(errp, "Block format '%s' used by device '%s' doesn't "
1689 "support the option '%s'", drv->format_name,
bfb197e0 1690 bdrv_get_device_name(bs), entry->key);
5acd9d81 1691 }
b6ad491a
KW
1692
1693 ret = -EINVAL;
1694 goto close_and_fail;
1695 }
b6ad491a 1696
b6ce07aa 1697 if (!bdrv_key_required(bs)) {
a7f53e26
MA
1698 if (bs->blk) {
1699 blk_dev_change_media_cb(bs->blk, true);
1700 }
c3adb58f
MA
1701 } else if (!runstate_check(RUN_STATE_PRELAUNCH)
1702 && !runstate_check(RUN_STATE_INMIGRATE)
1703 && !runstate_check(RUN_STATE_PAUSED)) { /* HACK */
1704 error_setg(errp,
1705 "Guest must be stopped for opening of encrypted image");
1706 ret = -EBUSY;
1707 goto close_and_fail;
b6ce07aa
KW
1708 }
1709
c3adb58f 1710 QDECREF(options);
f67503e5 1711 *pbs = bs;
dd62f1ca
KW
1712
1713 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
1714 * temporary snapshot afterwards. */
1715 if (snapshot_flags) {
1716 ret = bdrv_append_temp_snapshot(bs, snapshot_flags, &local_err);
1717 if (local_err) {
1718 goto close_and_fail;
1719 }
1720 }
1721
b6ce07aa
KW
1722 return 0;
1723
8bfea15d 1724fail:
f500a6d3 1725 if (file != NULL) {
9a4f4c31 1726 bdrv_unref_child(bs, file);
f500a6d3 1727 }
145f598e 1728 QDECREF(bs->explicit_options);
de9c0cec 1729 QDECREF(bs->options);
b6ad491a 1730 QDECREF(options);
de9c0cec 1731 bs->options = NULL;
f67503e5
HR
1732 if (!*pbs) {
1733 /* If *pbs is NULL, a new BDS has been created in this function and
1734 needs to be freed now. Otherwise, it does not need to be closed,
1735 since it has not really been opened yet. */
1736 bdrv_unref(bs);
1737 }
84d18f06 1738 if (local_err) {
34b5d2c6
HR
1739 error_propagate(errp, local_err);
1740 }
b6ad491a 1741 return ret;
de9c0cec 1742
b6ad491a 1743close_and_fail:
f67503e5
HR
1744 /* See fail path, but now the BDS has to be always closed */
1745 if (*pbs) {
1746 bdrv_close(bs);
1747 } else {
1748 bdrv_unref(bs);
1749 }
b6ad491a 1750 QDECREF(options);
84d18f06 1751 if (local_err) {
34b5d2c6
HR
1752 error_propagate(errp, local_err);
1753 }
b6ce07aa
KW
1754 return ret;
1755}
1756
f3930ed0 1757int bdrv_open(BlockDriverState **pbs, const char *filename,
6ebf9aa2 1758 const char *reference, QDict *options, int flags, Error **errp)
f3930ed0
KW
1759{
1760 return bdrv_open_inherit(pbs, filename, reference, options, flags, NULL,
ce343771 1761 NULL, errp);
f3930ed0
KW
1762}
1763
e971aa12
JC
1764typedef struct BlockReopenQueueEntry {
1765 bool prepared;
1766 BDRVReopenState state;
1767 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
1768} BlockReopenQueueEntry;
1769
1770/*
1771 * Adds a BlockDriverState to a simple queue for an atomic, transactional
1772 * reopen of multiple devices.
1773 *
1774 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
1775 * already performed, or alternatively may be NULL a new BlockReopenQueue will
1776 * be created and initialized. This newly created BlockReopenQueue should be
1777 * passed back in for subsequent calls that are intended to be of the same
1778 * atomic 'set'.
1779 *
1780 * bs is the BlockDriverState to add to the reopen queue.
1781 *
4d2cb092
KW
1782 * options contains the changed options for the associated bs
1783 * (the BlockReopenQueue takes ownership)
1784 *
e971aa12
JC
1785 * flags contains the open flags for the associated bs
1786 *
1787 * returns a pointer to bs_queue, which is either the newly allocated
1788 * bs_queue, or the existing bs_queue being used.
1789 *
1790 */
28518102
KW
1791static BlockReopenQueue *bdrv_reopen_queue_child(BlockReopenQueue *bs_queue,
1792 BlockDriverState *bs,
1793 QDict *options,
1794 int flags,
1795 const BdrvChildRole *role,
1796 QDict *parent_options,
1797 int parent_flags)
e971aa12
JC
1798{
1799 assert(bs != NULL);
1800
1801 BlockReopenQueueEntry *bs_entry;
67251a31 1802 BdrvChild *child;
145f598e 1803 QDict *old_options, *explicit_options;
67251a31 1804
e971aa12
JC
1805 if (bs_queue == NULL) {
1806 bs_queue = g_new0(BlockReopenQueue, 1);
1807 QSIMPLEQ_INIT(bs_queue);
1808 }
1809
4d2cb092
KW
1810 if (!options) {
1811 options = qdict_new();
1812 }
1813
28518102
KW
1814 /*
1815 * Precedence of options:
1816 * 1. Explicitly passed in options (highest)
91a097e7 1817 * 2. Set in flags (only for top level)
145f598e 1818 * 3. Retained from explicitly set options of bs
8e2160e2 1819 * 4. Inherited from parent node
28518102
KW
1820 * 5. Retained from effective options of bs
1821 */
1822
91a097e7
KW
1823 if (!parent_options) {
1824 /*
1825 * Any setting represented by flags is always updated. If the
1826 * corresponding QDict option is set, it takes precedence. Otherwise
1827 * the flag is translated into a QDict option. The old setting of bs is
1828 * not considered.
1829 */
1830 update_options_from_flags(options, flags);
1831 }
1832
145f598e
KW
1833 /* Old explicitly set values (don't overwrite by inherited value) */
1834 old_options = qdict_clone_shallow(bs->explicit_options);
1835 bdrv_join_options(bs, options, old_options);
1836 QDECREF(old_options);
1837
1838 explicit_options = qdict_clone_shallow(options);
1839
28518102
KW
1840 /* Inherit from parent node */
1841 if (parent_options) {
1842 assert(!flags);
8e2160e2 1843 role->inherit_options(&flags, options, parent_flags, parent_options);
28518102
KW
1844 }
1845
1846 /* Old values are used for options that aren't set yet */
4d2cb092 1847 old_options = qdict_clone_shallow(bs->options);
cddff5ba 1848 bdrv_join_options(bs, options, old_options);
4d2cb092
KW
1849 QDECREF(old_options);
1850
f1f25a2e
KW
1851 /* bdrv_open() masks this flag out */
1852 flags &= ~BDRV_O_PROTOCOL;
1853
67251a31 1854 QLIST_FOREACH(child, &bs->children, next) {
4c9dfe5d
KW
1855 QDict *new_child_options;
1856 char *child_key_dot;
67251a31 1857
4c9dfe5d
KW
1858 /* reopen can only change the options of block devices that were
1859 * implicitly created and inherited options. For other (referenced)
1860 * block devices, a syntax like "backing.foo" results in an error. */
67251a31
KW
1861 if (child->bs->inherits_from != bs) {
1862 continue;
1863 }
1864
4c9dfe5d
KW
1865 child_key_dot = g_strdup_printf("%s.", child->name);
1866 qdict_extract_subqdict(options, &new_child_options, child_key_dot);
1867 g_free(child_key_dot);
1868
28518102
KW
1869 bdrv_reopen_queue_child(bs_queue, child->bs, new_child_options, 0,
1870 child->role, options, flags);
e971aa12
JC
1871 }
1872
1873 bs_entry = g_new0(BlockReopenQueueEntry, 1);
1874 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
1875
1876 bs_entry->state.bs = bs;
4d2cb092 1877 bs_entry->state.options = options;
145f598e 1878 bs_entry->state.explicit_options = explicit_options;
e971aa12
JC
1879 bs_entry->state.flags = flags;
1880
1881 return bs_queue;
1882}
1883
28518102
KW
1884BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
1885 BlockDriverState *bs,
1886 QDict *options, int flags)
1887{
1888 return bdrv_reopen_queue_child(bs_queue, bs, options, flags,
1889 NULL, NULL, 0);
1890}
1891
e971aa12
JC
1892/*
1893 * Reopen multiple BlockDriverStates atomically & transactionally.
1894 *
1895 * The queue passed in (bs_queue) must have been built up previous
1896 * via bdrv_reopen_queue().
1897 *
1898 * Reopens all BDS specified in the queue, with the appropriate
1899 * flags. All devices are prepared for reopen, and failure of any
1900 * device will cause all device changes to be abandonded, and intermediate
1901 * data cleaned up.
1902 *
1903 * If all devices prepare successfully, then the changes are committed
1904 * to all devices.
1905 *
1906 */
1907int bdrv_reopen_multiple(BlockReopenQueue *bs_queue, Error **errp)
1908{
1909 int ret = -1;
1910 BlockReopenQueueEntry *bs_entry, *next;
1911 Error *local_err = NULL;
1912
1913 assert(bs_queue != NULL);
1914
1915 bdrv_drain_all();
1916
1917 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1918 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
1919 error_propagate(errp, local_err);
1920 goto cleanup;
1921 }
1922 bs_entry->prepared = true;
1923 }
1924
1925 /* If we reach this point, we have success and just need to apply the
1926 * changes
1927 */
1928 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1929 bdrv_reopen_commit(&bs_entry->state);
1930 }
1931
1932 ret = 0;
1933
1934cleanup:
1935 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
1936 if (ret && bs_entry->prepared) {
1937 bdrv_reopen_abort(&bs_entry->state);
145f598e
KW
1938 } else if (ret) {
1939 QDECREF(bs_entry->state.explicit_options);
e971aa12 1940 }
4d2cb092 1941 QDECREF(bs_entry->state.options);
e971aa12
JC
1942 g_free(bs_entry);
1943 }
1944 g_free(bs_queue);
1945 return ret;
1946}
1947
1948
1949/* Reopen a single BlockDriverState with the specified flags. */
1950int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
1951{
1952 int ret = -1;
1953 Error *local_err = NULL;
4d2cb092 1954 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12
JC
1955
1956 ret = bdrv_reopen_multiple(queue, &local_err);
1957 if (local_err != NULL) {
1958 error_propagate(errp, local_err);
1959 }
1960 return ret;
1961}
1962
1963
1964/*
1965 * Prepares a BlockDriverState for reopen. All changes are staged in the
1966 * 'opaque' field of the BDRVReopenState, which is used and allocated by
1967 * the block driver layer .bdrv_reopen_prepare()
1968 *
1969 * bs is the BlockDriverState to reopen
1970 * flags are the new open flags
1971 * queue is the reopen queue
1972 *
1973 * Returns 0 on success, non-zero on error. On error errp will be set
1974 * as well.
1975 *
1976 * On failure, bdrv_reopen_abort() will be called to clean up any data.
1977 * It is the responsibility of the caller to then call the abort() or
1978 * commit() for any other BDS that have been left in a prepare() state
1979 *
1980 */
1981int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
1982 Error **errp)
1983{
1984 int ret = -1;
1985 Error *local_err = NULL;
1986 BlockDriver *drv;
ccf9dc07
KW
1987 QemuOpts *opts;
1988 const char *value;
e971aa12
JC
1989
1990 assert(reopen_state != NULL);
1991 assert(reopen_state->bs->drv != NULL);
1992 drv = reopen_state->bs->drv;
1993
ccf9dc07
KW
1994 /* Process generic block layer options */
1995 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
1996 qemu_opts_absorb_qdict(opts, reopen_state->options, &local_err);
1997 if (local_err) {
1998 error_propagate(errp, local_err);
1999 ret = -EINVAL;
2000 goto error;
2001 }
2002
91a097e7
KW
2003 update_flags_from_options(&reopen_state->flags, opts);
2004
2005 /* If a guest device is attached, it owns WCE */
2006 if (reopen_state->bs->blk && blk_get_attached_dev(reopen_state->bs->blk)) {
2007 bool old_wce = bdrv_enable_write_cache(reopen_state->bs);
2008 bool new_wce = (reopen_state->flags & BDRV_O_CACHE_WB);
2009 if (old_wce != new_wce) {
2010 error_setg(errp, "Cannot change cache.writeback: Device attached");
2011 ret = -EINVAL;
2012 goto error;
2013 }
2014 }
2015
ccf9dc07
KW
2016 /* node-name and driver must be unchanged. Put them back into the QDict, so
2017 * that they are checked at the end of this function. */
2018 value = qemu_opt_get(opts, "node-name");
2019 if (value) {
2020 qdict_put(reopen_state->options, "node-name", qstring_from_str(value));
2021 }
2022
2023 value = qemu_opt_get(opts, "driver");
2024 if (value) {
2025 qdict_put(reopen_state->options, "driver", qstring_from_str(value));
2026 }
2027
e971aa12
JC
2028 /* if we are to stay read-only, do not allow permission change
2029 * to r/w */
2030 if (!(reopen_state->bs->open_flags & BDRV_O_ALLOW_RDWR) &&
2031 reopen_state->flags & BDRV_O_RDWR) {
81e5f78a
AG
2032 error_setg(errp, "Node '%s' is read only",
2033 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
2034 goto error;
2035 }
2036
2037
2038 ret = bdrv_flush(reopen_state->bs);
2039 if (ret) {
455b0fde 2040 error_setg_errno(errp, -ret, "Error flushing drive");
e971aa12
JC
2041 goto error;
2042 }
2043
2044 if (drv->bdrv_reopen_prepare) {
2045 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
2046 if (ret) {
2047 if (local_err != NULL) {
2048 error_propagate(errp, local_err);
2049 } else {
d8b6895f
LC
2050 error_setg(errp, "failed while preparing to reopen image '%s'",
2051 reopen_state->bs->filename);
e971aa12
JC
2052 }
2053 goto error;
2054 }
2055 } else {
2056 /* It is currently mandatory to have a bdrv_reopen_prepare()
2057 * handler for each supported drv. */
81e5f78a
AG
2058 error_setg(errp, "Block format '%s' used by node '%s' "
2059 "does not support reopening files", drv->format_name,
2060 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
2061 ret = -1;
2062 goto error;
2063 }
2064
4d2cb092
KW
2065 /* Options that are not handled are only okay if they are unchanged
2066 * compared to the old state. It is expected that some options are only
2067 * used for the initial open, but not reopen (e.g. filename) */
2068 if (qdict_size(reopen_state->options)) {
2069 const QDictEntry *entry = qdict_first(reopen_state->options);
2070
2071 do {
2072 QString *new_obj = qobject_to_qstring(entry->value);
2073 const char *new = qstring_get_str(new_obj);
2074 const char *old = qdict_get_try_str(reopen_state->bs->options,
2075 entry->key);
2076
2077 if (!old || strcmp(new, old)) {
2078 error_setg(errp, "Cannot change the option '%s'", entry->key);
2079 ret = -EINVAL;
2080 goto error;
2081 }
2082 } while ((entry = qdict_next(reopen_state->options, entry)));
2083 }
2084
e971aa12
JC
2085 ret = 0;
2086
2087error:
ccf9dc07 2088 qemu_opts_del(opts);
e971aa12
JC
2089 return ret;
2090}
2091
2092/*
2093 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
2094 * makes them final by swapping the staging BlockDriverState contents into
2095 * the active BlockDriverState contents.
2096 */
2097void bdrv_reopen_commit(BDRVReopenState *reopen_state)
2098{
2099 BlockDriver *drv;
2100
2101 assert(reopen_state != NULL);
2102 drv = reopen_state->bs->drv;
2103 assert(drv != NULL);
2104
2105 /* If there are any driver level actions to take */
2106 if (drv->bdrv_reopen_commit) {
2107 drv->bdrv_reopen_commit(reopen_state);
2108 }
2109
2110 /* set BDS specific flags now */
145f598e
KW
2111 QDECREF(reopen_state->bs->explicit_options);
2112
2113 reopen_state->bs->explicit_options = reopen_state->explicit_options;
e971aa12
JC
2114 reopen_state->bs->open_flags = reopen_state->flags;
2115 reopen_state->bs->enable_write_cache = !!(reopen_state->flags &
2116 BDRV_O_CACHE_WB);
2117 reopen_state->bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 2118
3baca891 2119 bdrv_refresh_limits(reopen_state->bs, NULL);
e971aa12
JC
2120}
2121
2122/*
2123 * Abort the reopen, and delete and free the staged changes in
2124 * reopen_state
2125 */
2126void bdrv_reopen_abort(BDRVReopenState *reopen_state)
2127{
2128 BlockDriver *drv;
2129
2130 assert(reopen_state != NULL);
2131 drv = reopen_state->bs->drv;
2132 assert(drv != NULL);
2133
2134 if (drv->bdrv_reopen_abort) {
2135 drv->bdrv_reopen_abort(reopen_state);
2136 }
145f598e
KW
2137
2138 QDECREF(reopen_state->explicit_options);
e971aa12
JC
2139}
2140
2141
64dff520 2142static void bdrv_close(BlockDriverState *bs)
fc01f7e7 2143{
33384421
HR
2144 BdrvAioNotifier *ban, *ban_next;
2145
ca9bd24c 2146 assert(!bs->job);
99b7e775
AG
2147
2148 /* Disable I/O limits and drain all pending throttled requests */
a0d64a61 2149 if (bs->throttle_state) {
99b7e775
AG
2150 bdrv_io_limits_disable(bs);
2151 }
2152
fc27291d 2153 bdrv_drained_begin(bs); /* complete I/O */
58fda173 2154 bdrv_flush(bs);
53ec73e2 2155 bdrv_drain(bs); /* in case flush left pending I/O */
fc27291d 2156
c5acdc9a
HR
2157 bdrv_release_named_dirty_bitmaps(bs);
2158 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
2159
b4d02820
HR
2160 if (bs->blk) {
2161 blk_dev_change_media_cb(bs->blk, false);
2162 }
2163
3cbc002c 2164 if (bs->drv) {
6e93e7c4
KW
2165 BdrvChild *child, *next;
2166
9a7dedbc 2167 bs->drv->bdrv_close(bs);
9a4f4c31 2168 bs->drv = NULL;
9a7dedbc 2169
5db15a57 2170 bdrv_set_backing_hd(bs, NULL);
9a7dedbc 2171
9a4f4c31
KW
2172 if (bs->file != NULL) {
2173 bdrv_unref_child(bs, bs->file);
2174 bs->file = NULL;
2175 }
2176
6e93e7c4 2177 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
2178 /* TODO Remove bdrv_unref() from drivers' close function and use
2179 * bdrv_unref_child() here */
bddcec37
KW
2180 if (child->bs->inherits_from == bs) {
2181 child->bs->inherits_from = NULL;
2182 }
33a60407 2183 bdrv_detach_child(child);
6e93e7c4
KW
2184 }
2185
7267c094 2186 g_free(bs->opaque);
ea2384d3 2187 bs->opaque = NULL;
53fec9d3 2188 bs->copy_on_read = 0;
a275fa42
PB
2189 bs->backing_file[0] = '\0';
2190 bs->backing_format[0] = '\0';
6405875c
PB
2191 bs->total_sectors = 0;
2192 bs->encrypted = 0;
2193 bs->valid_key = 0;
2194 bs->sg = 0;
0d51b4de 2195 bs->zero_beyond_eof = false;
de9c0cec 2196 QDECREF(bs->options);
145f598e 2197 QDECREF(bs->explicit_options);
de9c0cec 2198 bs->options = NULL;
91af7014
HR
2199 QDECREF(bs->full_open_options);
2200 bs->full_open_options = NULL;
b338082b 2201 }
98f90dba 2202
33384421
HR
2203 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
2204 g_free(ban);
2205 }
2206 QLIST_INIT(&bs->aio_notifiers);
fc27291d 2207 bdrv_drained_end(bs);
b338082b
FB
2208}
2209
2bc93fed
MK
2210void bdrv_close_all(void)
2211{
2212 BlockDriverState *bs;
ca9bd24c
HR
2213 AioContext *aio_context;
2214
2215 /* Drop references from requests still in flight, such as canceled block
2216 * jobs whose AIO context has not been polled yet */
2217 bdrv_drain_all();
2bc93fed 2218
ca9bd24c
HR
2219 blk_remove_all_bs();
2220 blockdev_close_all_bdrv_states();
ed78cda3 2221
ca9bd24c
HR
2222 /* Cancel all block jobs */
2223 while (!QTAILQ_EMPTY(&all_bdrv_states)) {
2224 QTAILQ_FOREACH(bs, &all_bdrv_states, bs_list) {
2225 aio_context = bdrv_get_aio_context(bs);
2226
2227 aio_context_acquire(aio_context);
2228 if (bs->job) {
2229 block_job_cancel_sync(bs->job);
2230 aio_context_release(aio_context);
2231 break;
2232 }
2233 aio_context_release(aio_context);
2234 }
2235
2236 /* All the remaining BlockDriverStates are referenced directly or
2237 * indirectly from block jobs, so there needs to be at least one BDS
2238 * directly used by a block job */
2239 assert(bs);
2bc93fed
MK
2240 }
2241}
2242
f8aa905a
JC
2243/* Note that bs->device_list.tqe_prev is initially null,
2244 * and gets set to non-null by QTAILQ_INSERT_TAIL(). Establish
2245 * the useful invariant "bs in bdrv_states iff bs->tqe_prev" by
2246 * resetting it to null on remove. */
2247void bdrv_device_remove(BlockDriverState *bs)
2248{
2249 QTAILQ_REMOVE(&bdrv_states, bs, device_list);
2250 bs->device_list.tqe_prev = NULL;
2251}
2252
dc364f4c
BC
2253/* make a BlockDriverState anonymous by removing from bdrv_state and
2254 * graph_bdrv_state list.
d22b2f41
RH
2255 Also, NULL terminate the device_name to prevent double remove */
2256void bdrv_make_anon(BlockDriverState *bs)
2257{
f8aa905a
JC
2258 /* Take care to remove bs from bdrv_states only when it's actually
2259 * in it. */
bfb197e0 2260 if (bs->device_list.tqe_prev) {
f8aa905a 2261 bdrv_device_remove(bs);
d22b2f41 2262 }
dc364f4c
BC
2263 if (bs->node_name[0] != '\0') {
2264 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
2265 }
2266 bs->node_name[0] = '\0';
d22b2f41
RH
2267}
2268
8e419aef 2269/* Fields that need to stay with the top-level BDS */
4ddc07ca
PB
2270static void bdrv_move_feature_fields(BlockDriverState *bs_dest,
2271 BlockDriverState *bs_src)
8802d1fd 2272{
4ddc07ca 2273 /* move some fields that need to stay attached to the device */
8802d1fd
JC
2274
2275 /* dev info */
4ddc07ca 2276 bs_dest->copy_on_read = bs_src->copy_on_read;
8802d1fd 2277
4ddc07ca 2278 bs_dest->enable_write_cache = bs_src->enable_write_cache;
c4a248a1 2279
a9fc4408 2280 /* dirty bitmap */
e4654d2d 2281 bs_dest->dirty_bitmaps = bs_src->dirty_bitmaps;
063dd40e 2282}
a9fc4408 2283
dd62f1ca
KW
2284static void change_parent_backing_link(BlockDriverState *from,
2285 BlockDriverState *to)
2286{
2287 BdrvChild *c, *next;
2288
2289 QLIST_FOREACH_SAFE(c, &from->parents, next_parent, next) {
2290 assert(c->role != &child_backing);
2291 c->bs = to;
2292 QLIST_REMOVE(c, next_parent);
2293 QLIST_INSERT_HEAD(&to->parents, c, next_parent);
2294 bdrv_ref(to);
2295 bdrv_unref(from);
2296 }
2297 if (from->blk) {
2298 blk_set_bs(from->blk, to);
2299 if (!to->device_list.tqe_prev) {
2300 QTAILQ_INSERT_BEFORE(from, to, device_list);
2301 }
f8aa905a 2302 bdrv_device_remove(from);
dd62f1ca
KW
2303 }
2304}
2305
2306static void swap_feature_fields(BlockDriverState *bs_top,
2307 BlockDriverState *bs_new)
2308{
2309 BlockDriverState tmp;
2310
2311 bdrv_move_feature_fields(&tmp, bs_top);
2312 bdrv_move_feature_fields(bs_top, bs_new);
2313 bdrv_move_feature_fields(bs_new, &tmp);
2314
2315 assert(!bs_new->throttle_state);
2316 if (bs_top->throttle_state) {
2317 assert(bs_top->io_limits_enabled);
2318 bdrv_io_limits_enable(bs_new, throttle_group_get_name(bs_top));
2319 bdrv_io_limits_disable(bs_top);
2320 }
2321}
2322
4ddc07ca
PB
2323/*
2324 * Add new bs contents at the top of an image chain while the chain is
2325 * live, while keeping required fields on the top layer.
2326 *
2327 * This will modify the BlockDriverState fields, and swap contents
2328 * between bs_new and bs_top. Both bs_new and bs_top are modified.
2329 *
bfb197e0 2330 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2331 *
2332 * This function does not create any image files.
dd62f1ca
KW
2333 *
2334 * bdrv_append() takes ownership of a bs_new reference and unrefs it because
2335 * that's what the callers commonly need. bs_new will be referenced by the old
2336 * parents of bs_top after bdrv_append() returns. If the caller needs to keep a
2337 * reference of its own, it must call bdrv_ref().
4ddc07ca
PB
2338 */
2339void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top)
2340{
dd62f1ca
KW
2341 assert(!bdrv_requests_pending(bs_top));
2342 assert(!bdrv_requests_pending(bs_new));
2343
2344 bdrv_ref(bs_top);
2345 change_parent_backing_link(bs_top, bs_new);
2346
2347 /* Some fields always stay on top of the backing file chain */
2348 swap_feature_fields(bs_top, bs_new);
2349
2350 bdrv_set_backing_hd(bs_new, bs_top);
2351 bdrv_unref(bs_top);
4ddc07ca 2352
dd62f1ca
KW
2353 /* bs_new is now referenced by its new parents, we don't need the
2354 * additional reference any more. */
2355 bdrv_unref(bs_new);
8802d1fd
JC
2356}
2357
3f09bfbc
KW
2358void bdrv_replace_in_backing_chain(BlockDriverState *old, BlockDriverState *new)
2359{
2360 assert(!bdrv_requests_pending(old));
2361 assert(!bdrv_requests_pending(new));
2362
2363 bdrv_ref(old);
2364
2365 if (old->blk) {
2366 /* As long as these fields aren't in BlockBackend, but in the top-level
2367 * BlockDriverState, it's not possible for a BDS to have two BBs.
2368 *
2369 * We really want to copy the fields from old to new, but we go for a
2370 * swap instead so that pointers aren't duplicated and cause trouble.
2371 * (Also, bdrv_swap() used to do the same.) */
2372 assert(!new->blk);
2373 swap_feature_fields(old, new);
2374 }
2375 change_parent_backing_link(old, new);
2376
2377 /* Change backing files if a previously independent node is added to the
2378 * chain. For active commit, we replace top by its own (indirect) backing
2379 * file and don't do anything here so we don't build a loop. */
2380 if (new->backing == NULL && !bdrv_chain_contains(backing_bs(old), new)) {
2381 bdrv_set_backing_hd(new, backing_bs(old));
2382 bdrv_set_backing_hd(old, NULL);
2383 }
2384
2385 bdrv_unref(old);
2386}
2387
4f6fd349 2388static void bdrv_delete(BlockDriverState *bs)
b338082b 2389{
3e914655 2390 assert(!bs->job);
3718d8ab 2391 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 2392 assert(!bs->refcnt);
18846dee 2393
e1b5c52e
SH
2394 bdrv_close(bs);
2395
1b7bdbc1 2396 /* remove from list, if necessary */
d22b2f41 2397 bdrv_make_anon(bs);
34c6f050 2398
2c1d04e0
HR
2399 QTAILQ_REMOVE(&all_bdrv_states, bs, bs_list);
2400
7267c094 2401 g_free(bs);
fc01f7e7
FB
2402}
2403
e97fc193
AL
2404/*
2405 * Run consistency checks on an image
2406 *
e076f338 2407 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 2408 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 2409 * check are stored in res.
e97fc193 2410 */
4534ff54 2411int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 2412{
908bcd54
HR
2413 if (bs->drv == NULL) {
2414 return -ENOMEDIUM;
2415 }
e97fc193
AL
2416 if (bs->drv->bdrv_check == NULL) {
2417 return -ENOTSUP;
2418 }
2419
e076f338 2420 memset(res, 0, sizeof(*res));
4534ff54 2421 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
2422}
2423
8a426614
KW
2424#define COMMIT_BUF_SECTORS 2048
2425
33e3963e
FB
2426/* commit COW file into the raw image */
2427int bdrv_commit(BlockDriverState *bs)
2428{
19cb3738 2429 BlockDriver *drv = bs->drv;
72706ea4 2430 int64_t sector, total_sectors, length, backing_length;
8a426614 2431 int n, ro, open_flags;
0bce597d 2432 int ret = 0;
72706ea4 2433 uint8_t *buf = NULL;
33e3963e 2434
19cb3738
FB
2435 if (!drv)
2436 return -ENOMEDIUM;
6bb45158 2437
760e0063 2438 if (!bs->backing) {
4dca4b63 2439 return -ENOTSUP;
33e3963e
FB
2440 }
2441
bb00021d 2442 if (bdrv_op_is_blocked(bs, BLOCK_OP_TYPE_COMMIT_SOURCE, NULL) ||
760e0063 2443 bdrv_op_is_blocked(bs->backing->bs, BLOCK_OP_TYPE_COMMIT_TARGET, NULL)) {
2d3735d3
SH
2444 return -EBUSY;
2445 }
2446
760e0063
KW
2447 ro = bs->backing->bs->read_only;
2448 open_flags = bs->backing->bs->open_flags;
4dca4b63
NS
2449
2450 if (ro) {
760e0063 2451 if (bdrv_reopen(bs->backing->bs, open_flags | BDRV_O_RDWR, NULL)) {
0bce597d 2452 return -EACCES;
4dca4b63 2453 }
ea2384d3 2454 }
33e3963e 2455
72706ea4
JC
2456 length = bdrv_getlength(bs);
2457 if (length < 0) {
2458 ret = length;
2459 goto ro_cleanup;
2460 }
2461
760e0063 2462 backing_length = bdrv_getlength(bs->backing->bs);
72706ea4
JC
2463 if (backing_length < 0) {
2464 ret = backing_length;
2465 goto ro_cleanup;
2466 }
2467
2468 /* If our top snapshot is larger than the backing file image,
2469 * grow the backing file image if possible. If not possible,
2470 * we must return an error */
2471 if (length > backing_length) {
760e0063 2472 ret = bdrv_truncate(bs->backing->bs, length);
72706ea4
JC
2473 if (ret < 0) {
2474 goto ro_cleanup;
2475 }
2476 }
2477
2478 total_sectors = length >> BDRV_SECTOR_BITS;
857d4f46
KW
2479
2480 /* qemu_try_blockalign() for bs will choose an alignment that works for
760e0063 2481 * bs->backing->bs as well, so no need to compare the alignment manually. */
857d4f46
KW
2482 buf = qemu_try_blockalign(bs, COMMIT_BUF_SECTORS * BDRV_SECTOR_SIZE);
2483 if (buf == NULL) {
2484 ret = -ENOMEM;
2485 goto ro_cleanup;
2486 }
8a426614
KW
2487
2488 for (sector = 0; sector < total_sectors; sector += n) {
d663640c
PB
2489 ret = bdrv_is_allocated(bs, sector, COMMIT_BUF_SECTORS, &n);
2490 if (ret < 0) {
2491 goto ro_cleanup;
2492 }
2493 if (ret) {
dabfa6cc
KW
2494 ret = bdrv_read(bs, sector, buf, n);
2495 if (ret < 0) {
8a426614
KW
2496 goto ro_cleanup;
2497 }
2498
760e0063 2499 ret = bdrv_write(bs->backing->bs, sector, buf, n);
dabfa6cc 2500 if (ret < 0) {
8a426614
KW
2501 goto ro_cleanup;
2502 }
ea2384d3 2503 }
33e3963e 2504 }
95389c86 2505
1d44952f
CH
2506 if (drv->bdrv_make_empty) {
2507 ret = drv->bdrv_make_empty(bs);
dabfa6cc
KW
2508 if (ret < 0) {
2509 goto ro_cleanup;
2510 }
1d44952f
CH
2511 bdrv_flush(bs);
2512 }
95389c86 2513
3f5075ae
CH
2514 /*
2515 * Make sure all data we wrote to the backing device is actually
2516 * stable on disk.
2517 */
760e0063
KW
2518 if (bs->backing) {
2519 bdrv_flush(bs->backing->bs);
dabfa6cc 2520 }
4dca4b63 2521
dabfa6cc 2522 ret = 0;
4dca4b63 2523ro_cleanup:
857d4f46 2524 qemu_vfree(buf);
4dca4b63
NS
2525
2526 if (ro) {
0bce597d 2527 /* ignoring error return here */
760e0063 2528 bdrv_reopen(bs->backing->bs, open_flags & ~BDRV_O_RDWR, NULL);
4dca4b63
NS
2529 }
2530
1d44952f 2531 return ret;
33e3963e
FB
2532}
2533
e8877497 2534int bdrv_commit_all(void)
6ab4b5ab
MA
2535{
2536 BlockDriverState *bs;
2537
dc364f4c 2538 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
2539 AioContext *aio_context = bdrv_get_aio_context(bs);
2540
2541 aio_context_acquire(aio_context);
760e0063 2542 if (bs->drv && bs->backing) {
272d2d8e
JC
2543 int ret = bdrv_commit(bs);
2544 if (ret < 0) {
ed78cda3 2545 aio_context_release(aio_context);
272d2d8e
JC
2546 return ret;
2547 }
e8877497 2548 }
ed78cda3 2549 aio_context_release(aio_context);
6ab4b5ab 2550 }
e8877497 2551 return 0;
6ab4b5ab
MA
2552}
2553
756e6736
KW
2554/*
2555 * Return values:
2556 * 0 - success
2557 * -EINVAL - backing format specified, but no file
2558 * -ENOSPC - can't update the backing file because no space is left in the
2559 * image file header
2560 * -ENOTSUP - format driver doesn't support changing the backing file
2561 */
2562int bdrv_change_backing_file(BlockDriverState *bs,
2563 const char *backing_file, const char *backing_fmt)
2564{
2565 BlockDriver *drv = bs->drv;
469ef350 2566 int ret;
756e6736 2567
5f377794
PB
2568 /* Backing file format doesn't make sense without a backing file */
2569 if (backing_fmt && !backing_file) {
2570 return -EINVAL;
2571 }
2572
756e6736 2573 if (drv->bdrv_change_backing_file != NULL) {
469ef350 2574 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 2575 } else {
469ef350 2576 ret = -ENOTSUP;
756e6736 2577 }
469ef350
PB
2578
2579 if (ret == 0) {
2580 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
2581 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
2582 }
2583 return ret;
756e6736
KW
2584}
2585
6ebdcee2
JC
2586/*
2587 * Finds the image layer in the chain that has 'bs' as its backing file.
2588 *
2589 * active is the current topmost image.
2590 *
2591 * Returns NULL if bs is not found in active's image chain,
2592 * or if active == bs.
4caf0fcd
JC
2593 *
2594 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
2595 */
2596BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
2597 BlockDriverState *bs)
2598{
760e0063
KW
2599 while (active && bs != backing_bs(active)) {
2600 active = backing_bs(active);
6ebdcee2
JC
2601 }
2602
4caf0fcd
JC
2603 return active;
2604}
6ebdcee2 2605
4caf0fcd
JC
2606/* Given a BDS, searches for the base layer. */
2607BlockDriverState *bdrv_find_base(BlockDriverState *bs)
2608{
2609 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
2610}
2611
6ebdcee2
JC
2612/*
2613 * Drops images above 'base' up to and including 'top', and sets the image
2614 * above 'top' to have base as its backing file.
2615 *
2616 * Requires that the overlay to 'top' is opened r/w, so that the backing file
2617 * information in 'bs' can be properly updated.
2618 *
2619 * E.g., this will convert the following chain:
2620 * bottom <- base <- intermediate <- top <- active
2621 *
2622 * to
2623 *
2624 * bottom <- base <- active
2625 *
2626 * It is allowed for bottom==base, in which case it converts:
2627 *
2628 * base <- intermediate <- top <- active
2629 *
2630 * to
2631 *
2632 * base <- active
2633 *
54e26900
JC
2634 * If backing_file_str is non-NULL, it will be used when modifying top's
2635 * overlay image metadata.
2636 *
6ebdcee2
JC
2637 * Error conditions:
2638 * if active == top, that is considered an error
2639 *
2640 */
2641int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 2642 BlockDriverState *base, const char *backing_file_str)
6ebdcee2 2643{
6ebdcee2 2644 BlockDriverState *new_top_bs = NULL;
6ebdcee2
JC
2645 int ret = -EIO;
2646
6ebdcee2
JC
2647 if (!top->drv || !base->drv) {
2648 goto exit;
2649 }
2650
2651 new_top_bs = bdrv_find_overlay(active, top);
2652
2653 if (new_top_bs == NULL) {
2654 /* we could not find the image above 'top', this is an error */
2655 goto exit;
2656 }
2657
760e0063 2658 /* special case of new_top_bs->backing->bs already pointing to base - nothing
6ebdcee2 2659 * to do, no intermediate images */
760e0063 2660 if (backing_bs(new_top_bs) == base) {
6ebdcee2
JC
2661 ret = 0;
2662 goto exit;
2663 }
2664
5db15a57
KW
2665 /* Make sure that base is in the backing chain of top */
2666 if (!bdrv_chain_contains(top, base)) {
6ebdcee2
JC
2667 goto exit;
2668 }
2669
2670 /* success - we can delete the intermediate states, and link top->base */
5db15a57 2671 backing_file_str = backing_file_str ? backing_file_str : base->filename;
54e26900 2672 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
5db15a57 2673 base->drv ? base->drv->format_name : "");
6ebdcee2
JC
2674 if (ret) {
2675 goto exit;
2676 }
5db15a57 2677 bdrv_set_backing_hd(new_top_bs, base);
6ebdcee2 2678
6ebdcee2 2679 ret = 0;
6ebdcee2 2680exit:
6ebdcee2
JC
2681 return ret;
2682}
2683
61007b31
SH
2684/**
2685 * Truncate file to 'offset' bytes (needed only for file protocols)
2686 */
2687int bdrv_truncate(BlockDriverState *bs, int64_t offset)
71d0770c 2688{
61007b31
SH
2689 BlockDriver *drv = bs->drv;
2690 int ret;
2691 if (!drv)
71d0770c 2692 return -ENOMEDIUM;
61007b31
SH
2693 if (!drv->bdrv_truncate)
2694 return -ENOTSUP;
2695 if (bs->read_only)
2696 return -EACCES;
71d0770c 2697
61007b31
SH
2698 ret = drv->bdrv_truncate(bs, offset);
2699 if (ret == 0) {
2700 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
2701 bdrv_dirty_bitmap_truncate(bs);
2702 if (bs->blk) {
2703 blk_dev_resize_cb(bs->blk);
2704 }
c0191e76 2705 }
61007b31 2706 return ret;
71d0770c
AL
2707}
2708
61007b31
SH
2709/**
2710 * Length of a allocated file in bytes. Sparse files are counted by actual
2711 * allocated space. Return < 0 if error or unknown.
2712 */
2713int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 2714{
61007b31
SH
2715 BlockDriver *drv = bs->drv;
2716 if (!drv) {
2717 return -ENOMEDIUM;
8f4754ed 2718 }
61007b31
SH
2719 if (drv->bdrv_get_allocated_file_size) {
2720 return drv->bdrv_get_allocated_file_size(bs);
2721 }
2722 if (bs->file) {
9a4f4c31 2723 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 2724 }
61007b31 2725 return -ENOTSUP;
1c9805a3 2726}
e7a8a783 2727
61007b31
SH
2728/**
2729 * Return number of sectors on success, -errno on error.
1c9805a3 2730 */
61007b31 2731int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 2732{
61007b31 2733 BlockDriver *drv = bs->drv;
498e386c 2734
61007b31
SH
2735 if (!drv)
2736 return -ENOMEDIUM;
2572b37a 2737
61007b31
SH
2738 if (drv->has_variable_length) {
2739 int ret = refresh_total_sectors(bs, bs->total_sectors);
2740 if (ret < 0) {
2741 return ret;
1c9805a3
SH
2742 }
2743 }
61007b31 2744 return bs->total_sectors;
1c9805a3 2745}
b338082b 2746
61007b31
SH
2747/**
2748 * Return length in bytes on success, -errno on error.
2749 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 2750 */
61007b31 2751int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 2752{
61007b31 2753 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 2754
4a9c9ea0 2755 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 2756 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
2757}
2758
61007b31
SH
2759/* return 0 as number of sectors if no device present or error */
2760void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 2761{
61007b31 2762 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 2763
61007b31 2764 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
2765}
2766
61007b31 2767int bdrv_is_read_only(BlockDriverState *bs)
8d3b1a2d 2768{
61007b31 2769 return bs->read_only;
83f64091 2770}
83f64091 2771
61007b31 2772int bdrv_is_sg(BlockDriverState *bs)
f08145fe 2773{
61007b31 2774 return bs->sg;
f08145fe
KW
2775}
2776
61007b31 2777int bdrv_enable_write_cache(BlockDriverState *bs)
ab185921 2778{
61007b31 2779 return bs->enable_write_cache;
ab185921
SH
2780}
2781
61007b31 2782void bdrv_set_enable_write_cache(BlockDriverState *bs, bool wce)
da1fa91d 2783{
61007b31 2784 bs->enable_write_cache = wce;
ab185921 2785
61007b31
SH
2786 /* so a reopen() will preserve wce */
2787 if (wce) {
2788 bs->open_flags |= BDRV_O_CACHE_WB;
893a8f62 2789 } else {
61007b31 2790 bs->open_flags &= ~BDRV_O_CACHE_WB;
893a8f62 2791 }
da1fa91d
KW
2792}
2793
61007b31 2794int bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 2795{
760e0063 2796 if (bs->backing && bs->backing->bs->encrypted) {
61007b31 2797 return 1;
760e0063 2798 }
61007b31 2799 return bs->encrypted;
fc3959e4
FZ
2800}
2801
61007b31 2802int bdrv_key_required(BlockDriverState *bs)
fc3959e4 2803{
760e0063 2804 BdrvChild *backing = bs->backing;
61007b31 2805
760e0063 2806 if (backing && backing->bs->encrypted && !backing->bs->valid_key) {
61007b31 2807 return 1;
760e0063 2808 }
61007b31 2809 return (bs->encrypted && !bs->valid_key);
fc3959e4
FZ
2810}
2811
61007b31 2812int bdrv_set_key(BlockDriverState *bs, const char *key)
d0c7f642 2813{
d0c7f642 2814 int ret;
760e0063
KW
2815 if (bs->backing && bs->backing->bs->encrypted) {
2816 ret = bdrv_set_key(bs->backing->bs, key);
61007b31
SH
2817 if (ret < 0)
2818 return ret;
2819 if (!bs->encrypted)
2820 return 0;
2821 }
2822 if (!bs->encrypted) {
2823 return -EINVAL;
2824 } else if (!bs->drv || !bs->drv->bdrv_set_key) {
d0c7f642
KW
2825 return -ENOMEDIUM;
2826 }
61007b31 2827 ret = bs->drv->bdrv_set_key(bs, key);
b9c64947 2828 if (ret < 0) {
61007b31
SH
2829 bs->valid_key = 0;
2830 } else if (!bs->valid_key) {
2831 bs->valid_key = 1;
2832 if (bs->blk) {
2833 /* call the change callback now, we skipped it on open */
2834 blk_dev_change_media_cb(bs->blk, true);
2835 }
1b0288ae 2836 }
61007b31
SH
2837 return ret;
2838}
f08f2dda 2839
c5fbe571 2840/*
61007b31
SH
2841 * Provide an encryption key for @bs.
2842 * If @key is non-null:
2843 * If @bs is not encrypted, fail.
2844 * Else if the key is invalid, fail.
2845 * Else set @bs's key to @key, replacing the existing key, if any.
2846 * If @key is null:
2847 * If @bs is encrypted and still lacks a key, fail.
2848 * Else do nothing.
2849 * On failure, store an error object through @errp if non-null.
c5fbe571 2850 */
61007b31 2851void bdrv_add_key(BlockDriverState *bs, const char *key, Error **errp)
c5fbe571 2852{
61007b31
SH
2853 if (key) {
2854 if (!bdrv_is_encrypted(bs)) {
2855 error_setg(errp, "Node '%s' is not encrypted",
2856 bdrv_get_device_or_node_name(bs));
2857 } else if (bdrv_set_key(bs, key) < 0) {
c6bd8c70 2858 error_setg(errp, QERR_INVALID_PASSWORD);
4d2855a3
MA
2859 }
2860 } else {
2861 if (bdrv_key_required(bs)) {
b1ca6391
MA
2862 error_set(errp, ERROR_CLASS_DEVICE_ENCRYPTED,
2863 "'%s' (%s) is encrypted",
81e5f78a 2864 bdrv_get_device_or_node_name(bs),
4d2855a3
MA
2865 bdrv_get_encrypted_filename(bs));
2866 }
2867 }
2868}
2869
61007b31 2870const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 2871{
61007b31 2872 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
2873}
2874
61007b31 2875static int qsort_strcmp(const void *a, const void *b)
40b4f539 2876{
61007b31 2877 return strcmp(a, b);
40b4f539
KW
2878}
2879
61007b31
SH
2880void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
2881 void *opaque)
40b4f539 2882{
61007b31
SH
2883 BlockDriver *drv;
2884 int count = 0;
2885 int i;
2886 const char **formats = NULL;
40b4f539 2887
61007b31
SH
2888 QLIST_FOREACH(drv, &bdrv_drivers, list) {
2889 if (drv->format_name) {
2890 bool found = false;
2891 int i = count;
2892 while (formats && i && !found) {
2893 found = !strcmp(formats[--i], drv->format_name);
2894 }
e2a305fb 2895
61007b31
SH
2896 if (!found) {
2897 formats = g_renew(const char *, formats, count + 1);
2898 formats[count++] = drv->format_name;
2899 }
6c5a42ac 2900 }
61007b31 2901 }
6c5a42ac 2902
61007b31 2903 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 2904
61007b31
SH
2905 for (i = 0; i < count; i++) {
2906 it(opaque, formats[i]);
2907 }
40b4f539 2908
61007b31
SH
2909 g_free(formats);
2910}
40b4f539 2911
61007b31
SH
2912/* This function is to find a node in the bs graph */
2913BlockDriverState *bdrv_find_node(const char *node_name)
2914{
2915 BlockDriverState *bs;
391827eb 2916
61007b31 2917 assert(node_name);
40b4f539 2918
61007b31
SH
2919 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2920 if (!strcmp(node_name, bs->node_name)) {
2921 return bs;
40b4f539
KW
2922 }
2923 }
61007b31 2924 return NULL;
40b4f539
KW
2925}
2926
61007b31
SH
2927/* Put this QMP function here so it can access the static graph_bdrv_states. */
2928BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 2929{
61007b31
SH
2930 BlockDeviceInfoList *list, *entry;
2931 BlockDriverState *bs;
40b4f539 2932
61007b31
SH
2933 list = NULL;
2934 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2935 BlockDeviceInfo *info = bdrv_block_device_info(bs, errp);
2936 if (!info) {
2937 qapi_free_BlockDeviceInfoList(list);
2938 return NULL;
301db7c2 2939 }
61007b31
SH
2940 entry = g_malloc0(sizeof(*entry));
2941 entry->value = info;
2942 entry->next = list;
2943 list = entry;
301db7c2
RH
2944 }
2945
61007b31
SH
2946 return list;
2947}
40b4f539 2948
61007b31
SH
2949BlockDriverState *bdrv_lookup_bs(const char *device,
2950 const char *node_name,
2951 Error **errp)
2952{
2953 BlockBackend *blk;
2954 BlockDriverState *bs;
40b4f539 2955
61007b31
SH
2956 if (device) {
2957 blk = blk_by_name(device);
40b4f539 2958
61007b31 2959 if (blk) {
9f4ed6fb
AG
2960 bs = blk_bs(blk);
2961 if (!bs) {
5433c24f 2962 error_setg(errp, "Device '%s' has no medium", device);
5433c24f
HR
2963 }
2964
9f4ed6fb 2965 return bs;
61007b31
SH
2966 }
2967 }
40b4f539 2968
61007b31
SH
2969 if (node_name) {
2970 bs = bdrv_find_node(node_name);
6d519a5f 2971
61007b31
SH
2972 if (bs) {
2973 return bs;
2974 }
40b4f539
KW
2975 }
2976
61007b31
SH
2977 error_setg(errp, "Cannot find device=%s nor node_name=%s",
2978 device ? device : "",
2979 node_name ? node_name : "");
2980 return NULL;
40b4f539
KW
2981}
2982
61007b31
SH
2983/* If 'base' is in the same chain as 'top', return true. Otherwise,
2984 * return false. If either argument is NULL, return false. */
2985bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 2986{
61007b31 2987 while (top && top != base) {
760e0063 2988 top = backing_bs(top);
02c50efe 2989 }
61007b31
SH
2990
2991 return top != NULL;
02c50efe
FZ
2992}
2993
61007b31 2994BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 2995{
61007b31
SH
2996 if (!bs) {
2997 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 2998 }
61007b31 2999 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
3000}
3001
61007b31 3002BlockDriverState *bdrv_next(BlockDriverState *bs)
83f64091 3003{
61007b31
SH
3004 if (!bs) {
3005 return QTAILQ_FIRST(&bdrv_states);
857d4f46 3006 }
61007b31 3007 return QTAILQ_NEXT(bs, device_list);
83f64091 3008}
beac80cd 3009
61007b31 3010const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 3011{
61007b31 3012 return bs->node_name;
beac80cd
FB
3013}
3014
61007b31
SH
3015/* TODO check what callers really want: bs->node_name or blk_name() */
3016const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 3017{
61007b31 3018 return bs->blk ? blk_name(bs->blk) : "";
f141eafe 3019}
83f64091 3020
61007b31
SH
3021/* This can be used to identify nodes that might not have a device
3022 * name associated. Since node and device names live in the same
3023 * namespace, the result is unambiguous. The exception is if both are
3024 * absent, then this returns an empty (non-null) string. */
3025const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 3026{
61007b31 3027 return bs->blk ? blk_name(bs->blk) : bs->node_name;
beac80cd 3028}
beac80cd 3029
61007b31 3030int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 3031{
61007b31 3032 return bs->open_flags;
0b5a2445
PB
3033}
3034
61007b31 3035int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 3036{
61007b31 3037 return 1;
0b5a2445
PB
3038}
3039
61007b31 3040int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 3041{
61007b31 3042 assert(bs->drv);
0b5a2445 3043
61007b31
SH
3044 /* If BS is a copy on write image, it is initialized to
3045 the contents of the base image, which may not be zeroes. */
760e0063 3046 if (bs->backing) {
61007b31
SH
3047 return 0;
3048 }
3049 if (bs->drv->bdrv_has_zero_init) {
3050 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 3051 }
61007b31
SH
3052
3053 /* safe default */
3054 return 0;
68485420
KW
3055}
3056
61007b31 3057bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 3058{
61007b31 3059 BlockDriverInfo bdi;
b2a61371 3060
760e0063 3061 if (bs->backing) {
61007b31
SH
3062 return false;
3063 }
3064
3065 if (bdrv_get_info(bs, &bdi) == 0) {
3066 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
3067 }
3068
61007b31 3069 return false;
b2a61371
SH
3070}
3071
61007b31 3072bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 3073{
61007b31 3074 BlockDriverInfo bdi;
68485420 3075
760e0063 3076 if (bs->backing || !(bs->open_flags & BDRV_O_UNMAP)) {
61007b31
SH
3077 return false;
3078 }
68485420 3079
61007b31
SH
3080 if (bdrv_get_info(bs, &bdi) == 0) {
3081 return bdi.can_write_zeroes_with_unmap;
3082 }
68485420 3083
61007b31 3084 return false;
68485420
KW
3085}
3086
61007b31 3087const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 3088{
760e0063 3089 if (bs->backing && bs->backing->bs->encrypted)
61007b31
SH
3090 return bs->backing_file;
3091 else if (bs->encrypted)
3092 return bs->filename;
3093 else
3094 return NULL;
b2e12bc6
CH
3095}
3096
61007b31
SH
3097void bdrv_get_backing_filename(BlockDriverState *bs,
3098 char *filename, int filename_size)
016f5cf6 3099{
61007b31
SH
3100 pstrcpy(filename, filename_size, bs->backing_file);
3101}
d318aea9 3102
61007b31
SH
3103int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
3104{
3105 BlockDriver *drv = bs->drv;
3106 if (!drv)
3107 return -ENOMEDIUM;
3108 if (!drv->bdrv_get_info)
3109 return -ENOTSUP;
3110 memset(bdi, 0, sizeof(*bdi));
3111 return drv->bdrv_get_info(bs, bdi);
3112}
016f5cf6 3113
61007b31
SH
3114ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
3115{
3116 BlockDriver *drv = bs->drv;
3117 if (drv && drv->bdrv_get_specific_info) {
3118 return drv->bdrv_get_specific_info(bs);
3119 }
3120 return NULL;
016f5cf6
AG
3121}
3122
a31939e6 3123void bdrv_debug_event(BlockDriverState *bs, BlkdebugEvent event)
4265d620 3124{
61007b31
SH
3125 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
3126 return;
3127 }
4265d620 3128
61007b31 3129 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
3130}
3131
61007b31
SH
3132int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
3133 const char *tag)
4265d620 3134{
61007b31 3135 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 3136 bs = bs->file ? bs->file->bs : NULL;
61007b31 3137 }
4265d620 3138
61007b31
SH
3139 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
3140 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
3141 }
4265d620 3142
61007b31 3143 return -ENOTSUP;
4265d620
PB
3144}
3145
61007b31 3146int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 3147{
61007b31 3148 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 3149 bs = bs->file ? bs->file->bs : NULL;
61007b31 3150 }
ce1a14dc 3151
61007b31
SH
3152 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
3153 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
3154 }
3155
3156 return -ENOTSUP;
eb852011
MA
3157}
3158
61007b31 3159int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 3160{
61007b31 3161 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 3162 bs = bs->file ? bs->file->bs : NULL;
61007b31 3163 }
ce1a14dc 3164
61007b31
SH
3165 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
3166 return bs->drv->bdrv_debug_resume(bs, tag);
3167 }
ce1a14dc 3168
61007b31 3169 return -ENOTSUP;
f197fe2b
FZ
3170}
3171
61007b31 3172bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 3173{
61007b31 3174 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 3175 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 3176 }
19cb3738 3177
61007b31
SH
3178 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
3179 return bs->drv->bdrv_debug_is_suspended(bs, tag);
3180 }
f9f05dc5 3181
61007b31
SH
3182 return false;
3183}
f9f05dc5 3184
61007b31 3185int bdrv_is_snapshot(BlockDriverState *bs)
f9f05dc5 3186{
61007b31 3187 return !!(bs->open_flags & BDRV_O_SNAPSHOT);
f9f05dc5
KW
3188}
3189
61007b31
SH
3190/* backing_file can either be relative, or absolute, or a protocol. If it is
3191 * relative, it must be relative to the chain. So, passing in bs->filename
3192 * from a BDS as backing_file should not be done, as that may be relative to
3193 * the CWD rather than the chain. */
3194BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
3195 const char *backing_file)
f9f05dc5 3196{
61007b31
SH
3197 char *filename_full = NULL;
3198 char *backing_file_full = NULL;
3199 char *filename_tmp = NULL;
3200 int is_protocol = 0;
3201 BlockDriverState *curr_bs = NULL;
3202 BlockDriverState *retval = NULL;
f9f05dc5 3203
61007b31
SH
3204 if (!bs || !bs->drv || !backing_file) {
3205 return NULL;
f9f05dc5
KW
3206 }
3207
61007b31
SH
3208 filename_full = g_malloc(PATH_MAX);
3209 backing_file_full = g_malloc(PATH_MAX);
3210 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 3211
61007b31 3212 is_protocol = path_has_protocol(backing_file);
f9f05dc5 3213
760e0063 3214 for (curr_bs = bs; curr_bs->backing; curr_bs = curr_bs->backing->bs) {
f9f05dc5 3215
61007b31
SH
3216 /* If either of the filename paths is actually a protocol, then
3217 * compare unmodified paths; otherwise make paths relative */
3218 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
3219 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
760e0063 3220 retval = curr_bs->backing->bs;
61007b31
SH
3221 break;
3222 }
3223 } else {
3224 /* If not an absolute filename path, make it relative to the current
3225 * image's filename path */
3226 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3227 backing_file);
f9f05dc5 3228
61007b31
SH
3229 /* We are going to compare absolute pathnames */
3230 if (!realpath(filename_tmp, filename_full)) {
3231 continue;
3232 }
07f07615 3233
61007b31
SH
3234 /* We need to make sure the backing filename we are comparing against
3235 * is relative to the current image filename (or absolute) */
3236 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3237 curr_bs->backing_file);
07f07615 3238
61007b31
SH
3239 if (!realpath(filename_tmp, backing_file_full)) {
3240 continue;
3241 }
eb489bb1 3242
61007b31 3243 if (strcmp(backing_file_full, filename_full) == 0) {
760e0063 3244 retval = curr_bs->backing->bs;
61007b31
SH
3245 break;
3246 }
3247 }
eb489bb1
KW
3248 }
3249
61007b31
SH
3250 g_free(filename_full);
3251 g_free(backing_file_full);
3252 g_free(filename_tmp);
3253 return retval;
3254}
3255
3256int bdrv_get_backing_file_depth(BlockDriverState *bs)
3257{
3258 if (!bs->drv) {
3259 return 0;
eb489bb1
KW
3260 }
3261
760e0063 3262 if (!bs->backing) {
61007b31 3263 return 0;
ca716364
KW
3264 }
3265
760e0063 3266 return 1 + bdrv_get_backing_file_depth(bs->backing->bs);
61007b31 3267}
07f07615 3268
61007b31
SH
3269void bdrv_init(void)
3270{
3271 module_call_init(MODULE_INIT_BLOCK);
3272}
29cdb251 3273
61007b31
SH
3274void bdrv_init_with_whitelist(void)
3275{
3276 use_bdrv_whitelist = 1;
3277 bdrv_init();
07f07615
PB
3278}
3279
5a8a30db 3280void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 3281{
5a8a30db
KW
3282 Error *local_err = NULL;
3283 int ret;
3284
3456a8d1
KW
3285 if (!bs->drv) {
3286 return;
3287 }
3288
04c01a5c 3289 if (!(bs->open_flags & BDRV_O_INACTIVE)) {
7ea2d269
AK
3290 return;
3291 }
04c01a5c 3292 bs->open_flags &= ~BDRV_O_INACTIVE;
7ea2d269 3293
3456a8d1 3294 if (bs->drv->bdrv_invalidate_cache) {
5a8a30db 3295 bs->drv->bdrv_invalidate_cache(bs, &local_err);
3456a8d1 3296 } else if (bs->file) {
9a4f4c31 3297 bdrv_invalidate_cache(bs->file->bs, &local_err);
5a8a30db
KW
3298 }
3299 if (local_err) {
04c01a5c 3300 bs->open_flags |= BDRV_O_INACTIVE;
5a8a30db
KW
3301 error_propagate(errp, local_err);
3302 return;
0f15423c 3303 }
3456a8d1 3304
5a8a30db
KW
3305 ret = refresh_total_sectors(bs, bs->total_sectors);
3306 if (ret < 0) {
04c01a5c 3307 bs->open_flags |= BDRV_O_INACTIVE;
5a8a30db
KW
3308 error_setg_errno(errp, -ret, "Could not refresh total sector count");
3309 return;
3310 }
0f15423c
AL
3311}
3312
5a8a30db 3313void bdrv_invalidate_cache_all(Error **errp)
0f15423c
AL
3314{
3315 BlockDriverState *bs;
5a8a30db 3316 Error *local_err = NULL;
0f15423c 3317
dc364f4c 3318 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
3319 AioContext *aio_context = bdrv_get_aio_context(bs);
3320
3321 aio_context_acquire(aio_context);
5a8a30db 3322 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 3323 aio_context_release(aio_context);
5a8a30db
KW
3324 if (local_err) {
3325 error_propagate(errp, local_err);
3326 return;
3327 }
0f15423c
AL
3328 }
3329}
3330
76b1c7fe
KW
3331static int bdrv_inactivate(BlockDriverState *bs)
3332{
3333 int ret;
3334
3335 if (bs->drv->bdrv_inactivate) {
3336 ret = bs->drv->bdrv_inactivate(bs);
3337 if (ret < 0) {
3338 return ret;
3339 }
3340 }
3341
3342 bs->open_flags |= BDRV_O_INACTIVE;
3343 return 0;
3344}
3345
3346int bdrv_inactivate_all(void)
3347{
3348 BlockDriverState *bs;
3349 int ret;
3350
3351 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
3352 AioContext *aio_context = bdrv_get_aio_context(bs);
3353
3354 aio_context_acquire(aio_context);
3355 ret = bdrv_inactivate(bs);
3356 aio_context_release(aio_context);
3357 if (ret < 0) {
3358 return ret;
3359 }
3360 }
3361
3362 return 0;
3363}
3364
19cb3738
FB
3365/**************************************************************/
3366/* removable device support */
3367
3368/**
3369 * Return TRUE if the media is present
3370 */
e031f750 3371bool bdrv_is_inserted(BlockDriverState *bs)
19cb3738
FB
3372{
3373 BlockDriver *drv = bs->drv;
28d7a789 3374 BdrvChild *child;
a1aff5bf 3375
e031f750
HR
3376 if (!drv) {
3377 return false;
3378 }
28d7a789
HR
3379 if (drv->bdrv_is_inserted) {
3380 return drv->bdrv_is_inserted(bs);
3381 }
3382 QLIST_FOREACH(child, &bs->children, next) {
3383 if (!bdrv_is_inserted(child->bs)) {
3384 return false;
3385 }
e031f750 3386 }
28d7a789 3387 return true;
19cb3738
FB
3388}
3389
3390/**
8e49ca46
MA
3391 * Return whether the media changed since the last call to this
3392 * function, or -ENOTSUP if we don't know. Most drivers don't know.
19cb3738
FB
3393 */
3394int bdrv_media_changed(BlockDriverState *bs)
3395{
3396 BlockDriver *drv = bs->drv;
19cb3738 3397
8e49ca46
MA
3398 if (drv && drv->bdrv_media_changed) {
3399 return drv->bdrv_media_changed(bs);
3400 }
3401 return -ENOTSUP;
19cb3738
FB
3402}
3403
3404/**
3405 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
3406 */
f36f3949 3407void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
3408{
3409 BlockDriver *drv = bs->drv;
bfb197e0 3410 const char *device_name;
19cb3738 3411
822e1cd1
MA
3412 if (drv && drv->bdrv_eject) {
3413 drv->bdrv_eject(bs, eject_flag);
19cb3738 3414 }
6f382ed2 3415
bfb197e0
MA
3416 device_name = bdrv_get_device_name(bs);
3417 if (device_name[0] != '\0') {
3418 qapi_event_send_device_tray_moved(device_name,
a5ee7bd4 3419 eject_flag, &error_abort);
6f382ed2 3420 }
19cb3738
FB
3421}
3422
19cb3738
FB
3423/**
3424 * Lock or unlock the media (if it is locked, the user won't be able
3425 * to eject it manually).
3426 */
025e849a 3427void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
3428{
3429 BlockDriver *drv = bs->drv;
3430
025e849a 3431 trace_bdrv_lock_medium(bs, locked);
b8c6d095 3432
025e849a
MA
3433 if (drv && drv->bdrv_lock_medium) {
3434 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
3435 }
3436}
985a03b0 3437
0db6e54a
FZ
3438BdrvDirtyBitmap *bdrv_find_dirty_bitmap(BlockDriverState *bs, const char *name)
3439{
3440 BdrvDirtyBitmap *bm;
3441
3442 assert(name);
3443 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
3444 if (bm->name && !strcmp(name, bm->name)) {
3445 return bm;
3446 }
3447 }
3448 return NULL;
3449}
3450
20dca810 3451void bdrv_dirty_bitmap_make_anon(BdrvDirtyBitmap *bitmap)
0db6e54a 3452{
9bd2b08f 3453 assert(!bdrv_dirty_bitmap_frozen(bitmap));
0db6e54a
FZ
3454 g_free(bitmap->name);
3455 bitmap->name = NULL;
3456}
3457
3458BdrvDirtyBitmap *bdrv_create_dirty_bitmap(BlockDriverState *bs,
5fba6c0e 3459 uint32_t granularity,
0db6e54a 3460 const char *name,
b8afb520 3461 Error **errp)
7cd1e32a
LS
3462{
3463 int64_t bitmap_size;
e4654d2d 3464 BdrvDirtyBitmap *bitmap;
5fba6c0e 3465 uint32_t sector_granularity;
a55eb92c 3466
50717e94
PB
3467 assert((granularity & (granularity - 1)) == 0);
3468
0db6e54a
FZ
3469 if (name && bdrv_find_dirty_bitmap(bs, name)) {
3470 error_setg(errp, "Bitmap already exists: %s", name);
3471 return NULL;
3472 }
5fba6c0e
JS
3473 sector_granularity = granularity >> BDRV_SECTOR_BITS;
3474 assert(sector_granularity);
57322b78 3475 bitmap_size = bdrv_nb_sectors(bs);
b8afb520
FZ
3476 if (bitmap_size < 0) {
3477 error_setg_errno(errp, -bitmap_size, "could not get length of device");
3478 errno = -bitmap_size;
3479 return NULL;
3480 }
5839e53b 3481 bitmap = g_new0(BdrvDirtyBitmap, 1);
5fba6c0e 3482 bitmap->bitmap = hbitmap_alloc(bitmap_size, ctz32(sector_granularity));
e74e6b78 3483 bitmap->size = bitmap_size;
0db6e54a 3484 bitmap->name = g_strdup(name);
b8e6fb75 3485 bitmap->disabled = false;
e4654d2d
FZ
3486 QLIST_INSERT_HEAD(&bs->dirty_bitmaps, bitmap, list);
3487 return bitmap;
3488}
3489
9bd2b08f
JS
3490bool bdrv_dirty_bitmap_frozen(BdrvDirtyBitmap *bitmap)
3491{
3492 return bitmap->successor;
3493}
3494
b8e6fb75
JS
3495bool bdrv_dirty_bitmap_enabled(BdrvDirtyBitmap *bitmap)
3496{
9bd2b08f
JS
3497 return !(bitmap->disabled || bitmap->successor);
3498}
3499
9abe3bdc
JS
3500DirtyBitmapStatus bdrv_dirty_bitmap_status(BdrvDirtyBitmap *bitmap)
3501{
3502 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3503 return DIRTY_BITMAP_STATUS_FROZEN;
3504 } else if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3505 return DIRTY_BITMAP_STATUS_DISABLED;
3506 } else {
3507 return DIRTY_BITMAP_STATUS_ACTIVE;
3508 }
3509}
3510
9bd2b08f
JS
3511/**
3512 * Create a successor bitmap destined to replace this bitmap after an operation.
3513 * Requires that the bitmap is not frozen and has no successor.
3514 */
3515int bdrv_dirty_bitmap_create_successor(BlockDriverState *bs,
3516 BdrvDirtyBitmap *bitmap, Error **errp)
3517{
3518 uint64_t granularity;
3519 BdrvDirtyBitmap *child;
3520
3521 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3522 error_setg(errp, "Cannot create a successor for a bitmap that is "
3523 "currently frozen");
3524 return -1;
3525 }
3526 assert(!bitmap->successor);
3527
3528 /* Create an anonymous successor */
3529 granularity = bdrv_dirty_bitmap_granularity(bitmap);
3530 child = bdrv_create_dirty_bitmap(bs, granularity, NULL, errp);
3531 if (!child) {
3532 return -1;
3533 }
3534
3535 /* Successor will be on or off based on our current state. */
3536 child->disabled = bitmap->disabled;
3537
3538 /* Install the successor and freeze the parent */
3539 bitmap->successor = child;
3540 return 0;
3541}
3542
3543/**
3544 * For a bitmap with a successor, yield our name to the successor,
3545 * delete the old bitmap, and return a handle to the new bitmap.
3546 */
3547BdrvDirtyBitmap *bdrv_dirty_bitmap_abdicate(BlockDriverState *bs,
3548 BdrvDirtyBitmap *bitmap,
3549 Error **errp)
3550{
3551 char *name;
3552 BdrvDirtyBitmap *successor = bitmap->successor;
3553
3554 if (successor == NULL) {
3555 error_setg(errp, "Cannot relinquish control if "
3556 "there's no successor present");
3557 return NULL;
3558 }
3559
3560 name = bitmap->name;
3561 bitmap->name = NULL;
3562 successor->name = name;
3563 bitmap->successor = NULL;
3564 bdrv_release_dirty_bitmap(bs, bitmap);
3565
3566 return successor;
3567}
3568
3569/**
3570 * In cases of failure where we can no longer safely delete the parent,
3571 * we may wish to re-join the parent and child/successor.
3572 * The merged parent will be un-frozen, but not explicitly re-enabled.
3573 */
3574BdrvDirtyBitmap *bdrv_reclaim_dirty_bitmap(BlockDriverState *bs,
3575 BdrvDirtyBitmap *parent,
3576 Error **errp)
3577{
3578 BdrvDirtyBitmap *successor = parent->successor;
3579
3580 if (!successor) {
3581 error_setg(errp, "Cannot reclaim a successor when none is present");
3582 return NULL;
3583 }
3584
3585 if (!hbitmap_merge(parent->bitmap, successor->bitmap)) {
3586 error_setg(errp, "Merging of parent and successor bitmap failed");
3587 return NULL;
3588 }
3589 bdrv_release_dirty_bitmap(bs, successor);
3590 parent->successor = NULL;
3591
3592 return parent;
b8e6fb75
JS
3593}
3594
ce1ffea8
JS
3595/**
3596 * Truncates _all_ bitmaps attached to a BDS.
3597 */
3598static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs)
3599{
3600 BdrvDirtyBitmap *bitmap;
3601 uint64_t size = bdrv_nb_sectors(bs);
3602
3603 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
06207b0f 3604 assert(!bdrv_dirty_bitmap_frozen(bitmap));
ce1ffea8 3605 hbitmap_truncate(bitmap->bitmap, size);
5270b6a0 3606 bitmap->size = size;
ce1ffea8
JS
3607 }
3608}
3609
c5acdc9a
HR
3610static void bdrv_do_release_matching_dirty_bitmap(BlockDriverState *bs,
3611 BdrvDirtyBitmap *bitmap,
3612 bool only_named)
e4654d2d
FZ
3613{
3614 BdrvDirtyBitmap *bm, *next;
3615 QLIST_FOREACH_SAFE(bm, &bs->dirty_bitmaps, list, next) {
c5acdc9a 3616 if ((!bitmap || bm == bitmap) && (!only_named || bm->name)) {
9bd2b08f 3617 assert(!bdrv_dirty_bitmap_frozen(bm));
c5acdc9a
HR
3618 QLIST_REMOVE(bm, list);
3619 hbitmap_free(bm->bitmap);
3620 g_free(bm->name);
3621 g_free(bm);
3622
3623 if (bitmap) {
3624 return;
3625 }
a55eb92c 3626 }
7cd1e32a
LS
3627 }
3628}
3629
c5acdc9a
HR
3630void bdrv_release_dirty_bitmap(BlockDriverState *bs, BdrvDirtyBitmap *bitmap)
3631{
3632 bdrv_do_release_matching_dirty_bitmap(bs, bitmap, false);
3633}
3634
3635/**
3636 * Release all named dirty bitmaps attached to a BDS (for use in bdrv_close()).
3637 * There must not be any frozen bitmaps attached.
3638 */
3639static void bdrv_release_named_dirty_bitmaps(BlockDriverState *bs)
3640{
3641 bdrv_do_release_matching_dirty_bitmap(bs, NULL, true);
3642}
3643
b8e6fb75
JS
3644void bdrv_disable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3645{
9bd2b08f 3646 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3647 bitmap->disabled = true;
3648}
3649
3650void bdrv_enable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3651{
9bd2b08f 3652 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3653 bitmap->disabled = false;
3654}
3655
21b56835
FZ
3656BlockDirtyInfoList *bdrv_query_dirty_bitmaps(BlockDriverState *bs)
3657{
3658 BdrvDirtyBitmap *bm;
3659 BlockDirtyInfoList *list = NULL;
3660 BlockDirtyInfoList **plist = &list;
3661
3662 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
5839e53b
MA
3663 BlockDirtyInfo *info = g_new0(BlockDirtyInfo, 1);
3664 BlockDirtyInfoList *entry = g_new0(BlockDirtyInfoList, 1);
20dca810 3665 info->count = bdrv_get_dirty_count(bm);
592fdd02 3666 info->granularity = bdrv_dirty_bitmap_granularity(bm);
0db6e54a
FZ
3667 info->has_name = !!bm->name;
3668 info->name = g_strdup(bm->name);
9abe3bdc 3669 info->status = bdrv_dirty_bitmap_status(bm);
21b56835
FZ
3670 entry->value = info;
3671 *plist = entry;
3672 plist = &entry->next;
3673 }
3674
3675 return list;
3676}
3677
e4654d2d 3678int bdrv_get_dirty(BlockDriverState *bs, BdrvDirtyBitmap *bitmap, int64_t sector)
7cd1e32a 3679{
e4654d2d
FZ
3680 if (bitmap) {
3681 return hbitmap_get(bitmap->bitmap, sector);
7cd1e32a
LS
3682 } else {
3683 return 0;
3684 }
3685}
3686
341ebc2f
JS
3687/**
3688 * Chooses a default granularity based on the existing cluster size,
3689 * but clamped between [4K, 64K]. Defaults to 64K in the case that there
3690 * is no cluster size information available.
3691 */
3692uint32_t bdrv_get_default_bitmap_granularity(BlockDriverState *bs)
3693{
3694 BlockDriverInfo bdi;
3695 uint32_t granularity;
3696
3697 if (bdrv_get_info(bs, &bdi) >= 0 && bdi.cluster_size > 0) {
3698 granularity = MAX(4096, bdi.cluster_size);
3699 granularity = MIN(65536, granularity);
3700 } else {
3701 granularity = 65536;
3702 }
3703
3704 return granularity;
3705}
3706
592fdd02
JS
3707uint32_t bdrv_dirty_bitmap_granularity(BdrvDirtyBitmap *bitmap)
3708{
3709 return BDRV_SECTOR_SIZE << hbitmap_granularity(bitmap->bitmap);
3710}
3711
20dca810 3712void bdrv_dirty_iter_init(BdrvDirtyBitmap *bitmap, HBitmapIter *hbi)
1755da16 3713{
e4654d2d 3714 hbitmap_iter_init(hbi, bitmap->bitmap, 0);
1755da16
PB
3715}
3716
20dca810 3717void bdrv_set_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3718 int64_t cur_sector, int nr_sectors)
3719{
b8e6fb75 3720 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3721 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3722}
3723
20dca810 3724void bdrv_reset_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3725 int64_t cur_sector, int nr_sectors)
3726{
b8e6fb75 3727 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3728 hbitmap_reset(bitmap->bitmap, cur_sector, nr_sectors);
3729}
3730
df9a681d 3731void bdrv_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap, HBitmap **out)
e74e6b78
JS
3732{
3733 assert(bdrv_dirty_bitmap_enabled(bitmap));
df9a681d
FZ
3734 if (!out) {
3735 hbitmap_reset_all(bitmap->bitmap);
3736 } else {
3737 HBitmap *backup = bitmap->bitmap;
3738 bitmap->bitmap = hbitmap_alloc(bitmap->size,
3739 hbitmap_granularity(backup));
3740 *out = backup;
3741 }
3742}
3743
3744void bdrv_undo_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap, HBitmap *in)
3745{
3746 HBitmap *tmp = bitmap->bitmap;
3747 assert(bdrv_dirty_bitmap_enabled(bitmap));
3748 bitmap->bitmap = in;
3749 hbitmap_free(tmp);
e74e6b78
JS
3750}
3751
e0c47b6c
SH
3752void bdrv_set_dirty(BlockDriverState *bs, int64_t cur_sector,
3753 int nr_sectors)
1755da16 3754{
e4654d2d
FZ
3755 BdrvDirtyBitmap *bitmap;
3756 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
b8e6fb75
JS
3757 if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3758 continue;
3759 }
e4654d2d
FZ
3760 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3761 }
1755da16
PB
3762}
3763
d58d8453
JS
3764/**
3765 * Advance an HBitmapIter to an arbitrary offset.
3766 */
3767void bdrv_set_dirty_iter(HBitmapIter *hbi, int64_t offset)
3768{
3769 assert(hbi->hb);
3770 hbitmap_iter_init(hbi, hbi->hb, offset);
3771}
3772
20dca810 3773int64_t bdrv_get_dirty_count(BdrvDirtyBitmap *bitmap)
aaa0eb75 3774{
e4654d2d 3775 return hbitmap_count(bitmap->bitmap);
aaa0eb75 3776}
f88e1a42 3777
9fcb0251
FZ
3778/* Get a reference to bs */
3779void bdrv_ref(BlockDriverState *bs)
3780{
3781 bs->refcnt++;
3782}
3783
3784/* Release a previously grabbed reference to bs.
3785 * If after releasing, reference count is zero, the BlockDriverState is
3786 * deleted. */
3787void bdrv_unref(BlockDriverState *bs)
3788{
9a4d5ca6
JC
3789 if (!bs) {
3790 return;
3791 }
9fcb0251
FZ
3792 assert(bs->refcnt > 0);
3793 if (--bs->refcnt == 0) {
3794 bdrv_delete(bs);
3795 }
3796}
3797
fbe40ff7
FZ
3798struct BdrvOpBlocker {
3799 Error *reason;
3800 QLIST_ENTRY(BdrvOpBlocker) list;
3801};
3802
3803bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
3804{
3805 BdrvOpBlocker *blocker;
3806 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3807 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
3808 blocker = QLIST_FIRST(&bs->op_blockers[op]);
3809 if (errp) {
e43bfd9c
MA
3810 *errp = error_copy(blocker->reason);
3811 error_prepend(errp, "Node '%s' is busy: ",
3812 bdrv_get_device_or_node_name(bs));
fbe40ff7
FZ
3813 }
3814 return true;
3815 }
3816 return false;
3817}
3818
3819void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
3820{
3821 BdrvOpBlocker *blocker;
3822 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3823
5839e53b 3824 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
3825 blocker->reason = reason;
3826 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
3827}
3828
3829void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
3830{
3831 BdrvOpBlocker *blocker, *next;
3832 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3833 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
3834 if (blocker->reason == reason) {
3835 QLIST_REMOVE(blocker, list);
3836 g_free(blocker);
3837 }
3838 }
3839}
3840
3841void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
3842{
3843 int i;
3844 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3845 bdrv_op_block(bs, i, reason);
3846 }
3847}
3848
3849void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
3850{
3851 int i;
3852 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3853 bdrv_op_unblock(bs, i, reason);
3854 }
3855}
3856
3857bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
3858{
3859 int i;
3860
3861 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3862 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
3863 return false;
3864 }
3865 }
3866 return true;
3867}
3868
d92ada22
LC
3869void bdrv_img_create(const char *filename, const char *fmt,
3870 const char *base_filename, const char *base_fmt,
f382d43a
MR
3871 char *options, uint64_t img_size, int flags,
3872 Error **errp, bool quiet)
f88e1a42 3873{
83d0521a
CL
3874 QemuOptsList *create_opts = NULL;
3875 QemuOpts *opts = NULL;
3876 const char *backing_fmt, *backing_file;
3877 int64_t size;
f88e1a42 3878 BlockDriver *drv, *proto_drv;
cc84d90f 3879 Error *local_err = NULL;
f88e1a42
JS
3880 int ret = 0;
3881
3882 /* Find driver and parse its options */
3883 drv = bdrv_find_format(fmt);
3884 if (!drv) {
71c79813 3885 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 3886 return;
f88e1a42
JS
3887 }
3888
b65a5e12 3889 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 3890 if (!proto_drv) {
d92ada22 3891 return;
f88e1a42
JS
3892 }
3893
c6149724
HR
3894 if (!drv->create_opts) {
3895 error_setg(errp, "Format driver '%s' does not support image creation",
3896 drv->format_name);
3897 return;
3898 }
3899
3900 if (!proto_drv->create_opts) {
3901 error_setg(errp, "Protocol driver '%s' does not support image creation",
3902 proto_drv->format_name);
3903 return;
3904 }
3905
c282e1fd
CL
3906 create_opts = qemu_opts_append(create_opts, drv->create_opts);
3907 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
3908
3909 /* Create parameter list with default values */
83d0521a 3910 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 3911 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
3912
3913 /* Parse -o options */
3914 if (options) {
dc523cd3
MA
3915 qemu_opts_do_parse(opts, options, NULL, &local_err);
3916 if (local_err) {
3917 error_report_err(local_err);
3918 local_err = NULL;
83d0521a 3919 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
3920 goto out;
3921 }
3922 }
3923
3924 if (base_filename) {
f43e47db 3925 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 3926 if (local_err) {
71c79813
LC
3927 error_setg(errp, "Backing file not supported for file format '%s'",
3928 fmt);
f88e1a42
JS
3929 goto out;
3930 }
3931 }
3932
3933 if (base_fmt) {
f43e47db 3934 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 3935 if (local_err) {
71c79813
LC
3936 error_setg(errp, "Backing file format not supported for file "
3937 "format '%s'", fmt);
f88e1a42
JS
3938 goto out;
3939 }
3940 }
3941
83d0521a
CL
3942 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
3943 if (backing_file) {
3944 if (!strcmp(filename, backing_file)) {
71c79813
LC
3945 error_setg(errp, "Error: Trying to create an image with the "
3946 "same filename as the backing file");
792da93a
JS
3947 goto out;
3948 }
3949 }
3950
83d0521a 3951 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42
JS
3952
3953 // The size for the image must always be specified, with one exception:
3954 // If we are using a backing file, we can obtain the size from there
83d0521a
CL
3955 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
3956 if (size == -1) {
3957 if (backing_file) {
66f6b814 3958 BlockDriverState *bs;
29168018 3959 char *full_backing = g_new0(char, PATH_MAX);
52bf1e72 3960 int64_t size;
63090dac 3961 int back_flags;
e6641719 3962 QDict *backing_options = NULL;
63090dac 3963
29168018
HR
3964 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
3965 full_backing, PATH_MAX,
3966 &local_err);
3967 if (local_err) {
3968 g_free(full_backing);
3969 goto out;
3970 }
3971
63090dac
PB
3972 /* backing files always opened read-only */
3973 back_flags =
3974 flags & ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 3975
e6641719
HR
3976 if (backing_fmt) {
3977 backing_options = qdict_new();
3978 qdict_put(backing_options, "driver",
3979 qstring_from_str(backing_fmt));
3980 }
3981
f67503e5 3982 bs = NULL;
e6641719 3983 ret = bdrv_open(&bs, full_backing, NULL, backing_options,
6ebf9aa2 3984 back_flags, &local_err);
29168018 3985 g_free(full_backing);
f88e1a42 3986 if (ret < 0) {
f88e1a42
JS
3987 goto out;
3988 }
52bf1e72
MA
3989 size = bdrv_getlength(bs);
3990 if (size < 0) {
3991 error_setg_errno(errp, -size, "Could not get size of '%s'",
3992 backing_file);
3993 bdrv_unref(bs);
3994 goto out;
3995 }
f88e1a42 3996
39101f25 3997 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
66f6b814
HR
3998
3999 bdrv_unref(bs);
f88e1a42 4000 } else {
71c79813 4001 error_setg(errp, "Image creation needs a size parameter");
f88e1a42
JS
4002 goto out;
4003 }
4004 }
4005
f382d43a 4006 if (!quiet) {
fe646693 4007 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 4008 qemu_opts_print(opts, " ");
f382d43a
MR
4009 puts("");
4010 }
83d0521a 4011
c282e1fd 4012 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 4013
cc84d90f
HR
4014 if (ret == -EFBIG) {
4015 /* This is generally a better message than whatever the driver would
4016 * deliver (especially because of the cluster_size_hint), since that
4017 * is most probably not much different from "image too large". */
4018 const char *cluster_size_hint = "";
83d0521a 4019 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 4020 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 4021 }
cc84d90f
HR
4022 error_setg(errp, "The image size is too large for file format '%s'"
4023 "%s", fmt, cluster_size_hint);
4024 error_free(local_err);
4025 local_err = NULL;
f88e1a42
JS
4026 }
4027
4028out:
83d0521a
CL
4029 qemu_opts_del(opts);
4030 qemu_opts_free(create_opts);
84d18f06 4031 if (local_err) {
cc84d90f
HR
4032 error_propagate(errp, local_err);
4033 }
f88e1a42 4034}
85d126f3
SH
4035
4036AioContext *bdrv_get_aio_context(BlockDriverState *bs)
4037{
dcd04228
SH
4038 return bs->aio_context;
4039}
4040
4041void bdrv_detach_aio_context(BlockDriverState *bs)
4042{
33384421
HR
4043 BdrvAioNotifier *baf;
4044
dcd04228
SH
4045 if (!bs->drv) {
4046 return;
4047 }
4048
33384421
HR
4049 QLIST_FOREACH(baf, &bs->aio_notifiers, list) {
4050 baf->detach_aio_context(baf->opaque);
4051 }
4052
a0d64a61 4053 if (bs->throttle_state) {
0e5b0a2d 4054 throttle_timers_detach_aio_context(&bs->throttle_timers);
13af91eb 4055 }
dcd04228
SH
4056 if (bs->drv->bdrv_detach_aio_context) {
4057 bs->drv->bdrv_detach_aio_context(bs);
4058 }
4059 if (bs->file) {
9a4f4c31 4060 bdrv_detach_aio_context(bs->file->bs);
dcd04228 4061 }
760e0063
KW
4062 if (bs->backing) {
4063 bdrv_detach_aio_context(bs->backing->bs);
dcd04228
SH
4064 }
4065
4066 bs->aio_context = NULL;
4067}
4068
4069void bdrv_attach_aio_context(BlockDriverState *bs,
4070 AioContext *new_context)
4071{
33384421
HR
4072 BdrvAioNotifier *ban;
4073
dcd04228
SH
4074 if (!bs->drv) {
4075 return;
4076 }
4077
4078 bs->aio_context = new_context;
4079
760e0063
KW
4080 if (bs->backing) {
4081 bdrv_attach_aio_context(bs->backing->bs, new_context);
dcd04228
SH
4082 }
4083 if (bs->file) {
9a4f4c31 4084 bdrv_attach_aio_context(bs->file->bs, new_context);
dcd04228
SH
4085 }
4086 if (bs->drv->bdrv_attach_aio_context) {
4087 bs->drv->bdrv_attach_aio_context(bs, new_context);
4088 }
a0d64a61 4089 if (bs->throttle_state) {
0e5b0a2d 4090 throttle_timers_attach_aio_context(&bs->throttle_timers, new_context);
13af91eb 4091 }
33384421
HR
4092
4093 QLIST_FOREACH(ban, &bs->aio_notifiers, list) {
4094 ban->attached_aio_context(new_context, ban->opaque);
4095 }
dcd04228
SH
4096}
4097
4098void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
4099{
53ec73e2 4100 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228
SH
4101
4102 bdrv_detach_aio_context(bs);
4103
4104 /* This function executes in the old AioContext so acquire the new one in
4105 * case it runs in a different thread.
4106 */
4107 aio_context_acquire(new_context);
4108 bdrv_attach_aio_context(bs, new_context);
4109 aio_context_release(new_context);
85d126f3 4110}
d616b224 4111
33384421
HR
4112void bdrv_add_aio_context_notifier(BlockDriverState *bs,
4113 void (*attached_aio_context)(AioContext *new_context, void *opaque),
4114 void (*detach_aio_context)(void *opaque), void *opaque)
4115{
4116 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
4117 *ban = (BdrvAioNotifier){
4118 .attached_aio_context = attached_aio_context,
4119 .detach_aio_context = detach_aio_context,
4120 .opaque = opaque
4121 };
4122
4123 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
4124}
4125
4126void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
4127 void (*attached_aio_context)(AioContext *,
4128 void *),
4129 void (*detach_aio_context)(void *),
4130 void *opaque)
4131{
4132 BdrvAioNotifier *ban, *ban_next;
4133
4134 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
4135 if (ban->attached_aio_context == attached_aio_context &&
4136 ban->detach_aio_context == detach_aio_context &&
4137 ban->opaque == opaque)
4138 {
4139 QLIST_REMOVE(ban, list);
4140 g_free(ban);
4141
4142 return;
4143 }
4144 }
4145
4146 abort();
4147}
4148
77485434 4149int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
8b13976d 4150 BlockDriverAmendStatusCB *status_cb, void *cb_opaque)
6f176b48 4151{
c282e1fd 4152 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
4153 return -ENOTSUP;
4154 }
8b13976d 4155 return bs->drv->bdrv_amend_options(bs, opts, status_cb, cb_opaque);
6f176b48 4156}
f6186f49 4157
b5042a36
BC
4158/* This function will be called by the bdrv_recurse_is_first_non_filter method
4159 * of block filter and by bdrv_is_first_non_filter.
4160 * It is used to test if the given bs is the candidate or recurse more in the
4161 * node graph.
212a5a8f 4162 */
b5042a36 4163bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 4164 BlockDriverState *candidate)
f6186f49 4165{
b5042a36
BC
4166 /* return false if basic checks fails */
4167 if (!bs || !bs->drv) {
212a5a8f 4168 return false;
f6186f49
BC
4169 }
4170
b5042a36
BC
4171 /* the code reached a non block filter driver -> check if the bs is
4172 * the same as the candidate. It's the recursion termination condition.
4173 */
4174 if (!bs->drv->is_filter) {
4175 return bs == candidate;
212a5a8f 4176 }
b5042a36 4177 /* Down this path the driver is a block filter driver */
212a5a8f 4178
b5042a36
BC
4179 /* If the block filter recursion method is defined use it to recurse down
4180 * the node graph.
4181 */
4182 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 4183 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
4184 }
4185
b5042a36
BC
4186 /* the driver is a block filter but don't allow to recurse -> return false
4187 */
4188 return false;
f6186f49
BC
4189}
4190
212a5a8f
BC
4191/* This function checks if the candidate is the first non filter bs down it's
4192 * bs chain. Since we don't have pointers to parents it explore all bs chains
4193 * from the top. Some filters can choose not to pass down the recursion.
4194 */
4195bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 4196{
212a5a8f
BC
4197 BlockDriverState *bs;
4198
4199 /* walk down the bs forest recursively */
4200 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
4201 bool perm;
4202
b5042a36 4203 /* try to recurse in this top level bs */
e6dc8a1f 4204 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
4205
4206 /* candidate is the first non filter */
4207 if (perm) {
4208 return true;
4209 }
4210 }
4211
4212 return false;
f6186f49 4213}
09158f00 4214
e12f3784
WC
4215BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
4216 const char *node_name, Error **errp)
09158f00
BC
4217{
4218 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
4219 AioContext *aio_context;
4220
09158f00
BC
4221 if (!to_replace_bs) {
4222 error_setg(errp, "Node name '%s' not found", node_name);
4223 return NULL;
4224 }
4225
5a7e7a0b
SH
4226 aio_context = bdrv_get_aio_context(to_replace_bs);
4227 aio_context_acquire(aio_context);
4228
09158f00 4229 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
4230 to_replace_bs = NULL;
4231 goto out;
09158f00
BC
4232 }
4233
4234 /* We don't want arbitrary node of the BDS chain to be replaced only the top
4235 * most non filter in order to prevent data corruption.
4236 * Another benefit is that this tests exclude backing files which are
4237 * blocked by the backing blockers.
4238 */
e12f3784 4239 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 4240 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
4241 to_replace_bs = NULL;
4242 goto out;
09158f00
BC
4243 }
4244
5a7e7a0b
SH
4245out:
4246 aio_context_release(aio_context);
09158f00
BC
4247 return to_replace_bs;
4248}
448ad91d 4249
91af7014
HR
4250static bool append_open_options(QDict *d, BlockDriverState *bs)
4251{
4252 const QDictEntry *entry;
9e700c1a 4253 QemuOptDesc *desc;
260fecf1 4254 BdrvChild *child;
91af7014 4255 bool found_any = false;
260fecf1 4256 const char *p;
91af7014
HR
4257
4258 for (entry = qdict_first(bs->options); entry;
4259 entry = qdict_next(bs->options, entry))
4260 {
260fecf1
KW
4261 /* Exclude options for children */
4262 QLIST_FOREACH(child, &bs->children, next) {
4263 if (strstart(qdict_entry_key(entry), child->name, &p)
4264 && (!*p || *p == '.'))
4265 {
4266 break;
4267 }
4268 }
4269 if (child) {
9e700c1a 4270 continue;
91af7014 4271 }
9e700c1a
KW
4272
4273 /* And exclude all non-driver-specific options */
4274 for (desc = bdrv_runtime_opts.desc; desc->name; desc++) {
4275 if (!strcmp(qdict_entry_key(entry), desc->name)) {
4276 break;
4277 }
4278 }
4279 if (desc->name) {
4280 continue;
4281 }
4282
4283 qobject_incref(qdict_entry_value(entry));
4284 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
4285 found_any = true;
91af7014
HR
4286 }
4287
4288 return found_any;
4289}
4290
4291/* Updates the following BDS fields:
4292 * - exact_filename: A filename which may be used for opening a block device
4293 * which (mostly) equals the given BDS (even without any
4294 * other options; so reading and writing must return the same
4295 * results, but caching etc. may be different)
4296 * - full_open_options: Options which, when given when opening a block device
4297 * (without a filename), result in a BDS (mostly)
4298 * equalling the given one
4299 * - filename: If exact_filename is set, it is copied here. Otherwise,
4300 * full_open_options is converted to a JSON object, prefixed with
4301 * "json:" (for use through the JSON pseudo protocol) and put here.
4302 */
4303void bdrv_refresh_filename(BlockDriverState *bs)
4304{
4305 BlockDriver *drv = bs->drv;
4306 QDict *opts;
4307
4308 if (!drv) {
4309 return;
4310 }
4311
4312 /* This BDS's file name will most probably depend on its file's name, so
4313 * refresh that first */
4314 if (bs->file) {
9a4f4c31 4315 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
4316 }
4317
4318 if (drv->bdrv_refresh_filename) {
4319 /* Obsolete information is of no use here, so drop the old file name
4320 * information before refreshing it */
4321 bs->exact_filename[0] = '\0';
4322 if (bs->full_open_options) {
4323 QDECREF(bs->full_open_options);
4324 bs->full_open_options = NULL;
4325 }
4326
4cdd01d3
KW
4327 opts = qdict_new();
4328 append_open_options(opts, bs);
4329 drv->bdrv_refresh_filename(bs, opts);
4330 QDECREF(opts);
91af7014
HR
4331 } else if (bs->file) {
4332 /* Try to reconstruct valid information from the underlying file */
4333 bool has_open_options;
4334
4335 bs->exact_filename[0] = '\0';
4336 if (bs->full_open_options) {
4337 QDECREF(bs->full_open_options);
4338 bs->full_open_options = NULL;
4339 }
4340
4341 opts = qdict_new();
4342 has_open_options = append_open_options(opts, bs);
4343
4344 /* If no specific options have been given for this BDS, the filename of
4345 * the underlying file should suffice for this one as well */
9a4f4c31
KW
4346 if (bs->file->bs->exact_filename[0] && !has_open_options) {
4347 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
4348 }
4349 /* Reconstructing the full options QDict is simple for most format block
4350 * drivers, as long as the full options are known for the underlying
4351 * file BDS. The full options QDict of that file BDS should somehow
4352 * contain a representation of the filename, therefore the following
4353 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 4354 if (bs->file->bs->full_open_options) {
91af7014
HR
4355 qdict_put_obj(opts, "driver",
4356 QOBJECT(qstring_from_str(drv->format_name)));
9a4f4c31
KW
4357 QINCREF(bs->file->bs->full_open_options);
4358 qdict_put_obj(opts, "file",
4359 QOBJECT(bs->file->bs->full_open_options));
91af7014
HR
4360
4361 bs->full_open_options = opts;
4362 } else {
4363 QDECREF(opts);
4364 }
4365 } else if (!bs->full_open_options && qdict_size(bs->options)) {
4366 /* There is no underlying file BDS (at least referenced by BDS.file),
4367 * so the full options QDict should be equal to the options given
4368 * specifically for this block device when it was opened (plus the
4369 * driver specification).
4370 * Because those options don't change, there is no need to update
4371 * full_open_options when it's already set. */
4372
4373 opts = qdict_new();
4374 append_open_options(opts, bs);
4375 qdict_put_obj(opts, "driver",
4376 QOBJECT(qstring_from_str(drv->format_name)));
4377
4378 if (bs->exact_filename[0]) {
4379 /* This may not work for all block protocol drivers (some may
4380 * require this filename to be parsed), but we have to find some
4381 * default solution here, so just include it. If some block driver
4382 * does not support pure options without any filename at all or
4383 * needs some special format of the options QDict, it needs to
4384 * implement the driver-specific bdrv_refresh_filename() function.
4385 */
4386 qdict_put_obj(opts, "filename",
4387 QOBJECT(qstring_from_str(bs->exact_filename)));
4388 }
4389
4390 bs->full_open_options = opts;
4391 }
4392
4393 if (bs->exact_filename[0]) {
4394 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4395 } else if (bs->full_open_options) {
4396 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4397 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4398 qstring_get_str(json));
4399 QDECREF(json);
4400 }
4401}