]> git.proxmox.com Git - mirror_qemu.git/blame - block.c
block: Initial implementation of -blockdev
[mirror_qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
d38ea87a 24#include "qemu/osdep.h"
0ab8ed18 25#include "block/trace.h"
737e150e
PB
26#include "block/block_int.h"
27#include "block/blockjob.h"
cd7fca95 28#include "block/nbd.h"
d49b6836 29#include "qemu/error-report.h"
88d88798 30#include "module_block.h"
1de7afc9 31#include "qemu/module.h"
cc7a8ea7 32#include "qapi/qmp/qerror.h"
91a097e7 33#include "qapi/qmp/qbool.h"
7b1b5d19 34#include "qapi/qmp/qjson.h"
bfb197e0 35#include "sysemu/block-backend.h"
9c17d615 36#include "sysemu/sysemu.h"
1de7afc9 37#include "qemu/notify.h"
10817bf0 38#include "qemu/coroutine.h"
c13163fb 39#include "block/qapi.h"
b2023818 40#include "qmp-commands.h"
1de7afc9 41#include "qemu/timer.h"
a5ee7bd4 42#include "qapi-event.h"
f348b6d1
VB
43#include "qemu/cutils.h"
44#include "qemu/id.h"
692e01a2 45#include "qapi/util.h"
fc01f7e7 46
71e72a19 47#ifdef CONFIG_BSD
7674e7bf 48#include <sys/ioctl.h>
72cf2d4f 49#include <sys/queue.h>
c5e97233 50#ifndef __DragonFly__
7674e7bf
FB
51#include <sys/disk.h>
52#endif
c5e97233 53#endif
7674e7bf 54
49dc768d
AL
55#ifdef _WIN32
56#include <windows.h>
57#endif
58
1c9805a3
SH
59#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
60
dc364f4c
BC
61static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
62 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
63
2c1d04e0
HR
64static QTAILQ_HEAD(, BlockDriverState) all_bdrv_states =
65 QTAILQ_HEAD_INITIALIZER(all_bdrv_states);
66
8a22f02a
SH
67static QLIST_HEAD(, BlockDriver) bdrv_drivers =
68 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 69
5b363937
HR
70static BlockDriverState *bdrv_open_inherit(const char *filename,
71 const char *reference,
72 QDict *options, int flags,
73 BlockDriverState *parent,
74 const BdrvChildRole *child_role,
75 Error **errp);
f3930ed0 76
eb852011
MA
77/* If non-zero, use only whitelisted block drivers */
78static int use_bdrv_whitelist;
79
9e0b22f4
SH
80#ifdef _WIN32
81static int is_windows_drive_prefix(const char *filename)
82{
83 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
84 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
85 filename[1] == ':');
86}
87
88int is_windows_drive(const char *filename)
89{
90 if (is_windows_drive_prefix(filename) &&
91 filename[2] == '\0')
92 return 1;
93 if (strstart(filename, "\\\\.\\", NULL) ||
94 strstart(filename, "//./", NULL))
95 return 1;
96 return 0;
97}
98#endif
99
339064d5
KW
100size_t bdrv_opt_mem_align(BlockDriverState *bs)
101{
102 if (!bs || !bs->drv) {
459b4e66
DL
103 /* page size or 4k (hdd sector size) should be on the safe side */
104 return MAX(4096, getpagesize());
339064d5
KW
105 }
106
107 return bs->bl.opt_mem_alignment;
108}
109
4196d2f0
DL
110size_t bdrv_min_mem_align(BlockDriverState *bs)
111{
112 if (!bs || !bs->drv) {
459b4e66
DL
113 /* page size or 4k (hdd sector size) should be on the safe side */
114 return MAX(4096, getpagesize());
4196d2f0
DL
115 }
116
117 return bs->bl.min_mem_alignment;
118}
119
9e0b22f4 120/* check if the path starts with "<protocol>:" */
5c98415b 121int path_has_protocol(const char *path)
9e0b22f4 122{
947995c0
PB
123 const char *p;
124
9e0b22f4
SH
125#ifdef _WIN32
126 if (is_windows_drive(path) ||
127 is_windows_drive_prefix(path)) {
128 return 0;
129 }
947995c0
PB
130 p = path + strcspn(path, ":/\\");
131#else
132 p = path + strcspn(path, ":/");
9e0b22f4
SH
133#endif
134
947995c0 135 return *p == ':';
9e0b22f4
SH
136}
137
83f64091 138int path_is_absolute(const char *path)
3b0d4f61 139{
21664424
FB
140#ifdef _WIN32
141 /* specific case for names like: "\\.\d:" */
f53f4da9 142 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 143 return 1;
f53f4da9
PB
144 }
145 return (*path == '/' || *path == '\\');
3b9f94e1 146#else
f53f4da9 147 return (*path == '/');
3b9f94e1 148#endif
3b0d4f61
FB
149}
150
83f64091
FB
151/* if filename is absolute, just copy it to dest. Otherwise, build a
152 path to it by considering it is relative to base_path. URL are
153 supported. */
154void path_combine(char *dest, int dest_size,
155 const char *base_path,
156 const char *filename)
3b0d4f61 157{
83f64091
FB
158 const char *p, *p1;
159 int len;
160
161 if (dest_size <= 0)
162 return;
163 if (path_is_absolute(filename)) {
164 pstrcpy(dest, dest_size, filename);
165 } else {
166 p = strchr(base_path, ':');
167 if (p)
168 p++;
169 else
170 p = base_path;
3b9f94e1
FB
171 p1 = strrchr(base_path, '/');
172#ifdef _WIN32
173 {
174 const char *p2;
175 p2 = strrchr(base_path, '\\');
176 if (!p1 || p2 > p1)
177 p1 = p2;
178 }
179#endif
83f64091
FB
180 if (p1)
181 p1++;
182 else
183 p1 = base_path;
184 if (p1 > p)
185 p = p1;
186 len = p - base_path;
187 if (len > dest_size - 1)
188 len = dest_size - 1;
189 memcpy(dest, base_path, len);
190 dest[len] = '\0';
191 pstrcat(dest, dest_size, filename);
3b0d4f61 192 }
3b0d4f61
FB
193}
194
0a82855a
HR
195void bdrv_get_full_backing_filename_from_filename(const char *backed,
196 const char *backing,
9f07429e
HR
197 char *dest, size_t sz,
198 Error **errp)
dc5a1371 199{
9f07429e
HR
200 if (backing[0] == '\0' || path_has_protocol(backing) ||
201 path_is_absolute(backing))
202 {
0a82855a 203 pstrcpy(dest, sz, backing);
9f07429e
HR
204 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
205 error_setg(errp, "Cannot use relative backing file names for '%s'",
206 backed);
dc5a1371 207 } else {
0a82855a 208 path_combine(dest, sz, backed, backing);
dc5a1371
PB
209 }
210}
211
9f07429e
HR
212void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
213 Error **errp)
0a82855a 214{
9f07429e
HR
215 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
216
217 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
218 dest, sz, errp);
0a82855a
HR
219}
220
0eb7217e
SH
221void bdrv_register(BlockDriver *bdrv)
222{
8a22f02a 223 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 224}
b338082b 225
e4e9986b
MA
226BlockDriverState *bdrv_new(void)
227{
228 BlockDriverState *bs;
229 int i;
230
5839e53b 231 bs = g_new0(BlockDriverState, 1);
e4654d2d 232 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
233 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
234 QLIST_INIT(&bs->op_blockers[i]);
235 }
d616b224 236 notifier_with_return_list_init(&bs->before_write_notifiers);
9fcb0251 237 bs->refcnt = 1;
dcd04228 238 bs->aio_context = qemu_get_aio_context();
d7d512f6 239
3ff2f67a
EY
240 qemu_co_queue_init(&bs->flush_queue);
241
2c1d04e0
HR
242 QTAILQ_INSERT_TAIL(&all_bdrv_states, bs, bs_list);
243
b338082b
FB
244 return bs;
245}
246
88d88798 247static BlockDriver *bdrv_do_find_format(const char *format_name)
ea2384d3
FB
248{
249 BlockDriver *drv1;
88d88798 250
8a22f02a
SH
251 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
252 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 253 return drv1;
8a22f02a 254 }
ea2384d3 255 }
88d88798 256
ea2384d3
FB
257 return NULL;
258}
259
88d88798
MM
260BlockDriver *bdrv_find_format(const char *format_name)
261{
262 BlockDriver *drv1;
263 int i;
264
265 drv1 = bdrv_do_find_format(format_name);
266 if (drv1) {
267 return drv1;
268 }
269
270 /* The driver isn't registered, maybe we need to load a module */
271 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); ++i) {
272 if (!strcmp(block_driver_modules[i].format_name, format_name)) {
273 block_module_load_one(block_driver_modules[i].library_name);
274 break;
275 }
276 }
277
278 return bdrv_do_find_format(format_name);
279}
280
b64ec4e4 281static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 282{
b64ec4e4
FZ
283 static const char *whitelist_rw[] = {
284 CONFIG_BDRV_RW_WHITELIST
285 };
286 static const char *whitelist_ro[] = {
287 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
288 };
289 const char **p;
290
b64ec4e4 291 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 292 return 1; /* no whitelist, anything goes */
b64ec4e4 293 }
eb852011 294
b64ec4e4 295 for (p = whitelist_rw; *p; p++) {
eb852011
MA
296 if (!strcmp(drv->format_name, *p)) {
297 return 1;
298 }
299 }
b64ec4e4
FZ
300 if (read_only) {
301 for (p = whitelist_ro; *p; p++) {
302 if (!strcmp(drv->format_name, *p)) {
303 return 1;
304 }
305 }
306 }
eb852011
MA
307 return 0;
308}
309
e6ff69bf
DB
310bool bdrv_uses_whitelist(void)
311{
312 return use_bdrv_whitelist;
313}
314
5b7e1542
ZYW
315typedef struct CreateCo {
316 BlockDriver *drv;
317 char *filename;
83d0521a 318 QemuOpts *opts;
5b7e1542 319 int ret;
cc84d90f 320 Error *err;
5b7e1542
ZYW
321} CreateCo;
322
323static void coroutine_fn bdrv_create_co_entry(void *opaque)
324{
cc84d90f
HR
325 Error *local_err = NULL;
326 int ret;
327
5b7e1542
ZYW
328 CreateCo *cco = opaque;
329 assert(cco->drv);
330
c282e1fd 331 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
621ff94d 332 error_propagate(&cco->err, local_err);
cc84d90f 333 cco->ret = ret;
5b7e1542
ZYW
334}
335
0e7e1989 336int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 337 QemuOpts *opts, Error **errp)
ea2384d3 338{
5b7e1542
ZYW
339 int ret;
340
341 Coroutine *co;
342 CreateCo cco = {
343 .drv = drv,
344 .filename = g_strdup(filename),
83d0521a 345 .opts = opts,
5b7e1542 346 .ret = NOT_DONE,
cc84d90f 347 .err = NULL,
5b7e1542
ZYW
348 };
349
c282e1fd 350 if (!drv->bdrv_create) {
cc84d90f 351 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
352 ret = -ENOTSUP;
353 goto out;
5b7e1542
ZYW
354 }
355
356 if (qemu_in_coroutine()) {
357 /* Fast-path if already in coroutine context */
358 bdrv_create_co_entry(&cco);
359 } else {
0b8b8753
PB
360 co = qemu_coroutine_create(bdrv_create_co_entry, &cco);
361 qemu_coroutine_enter(co);
5b7e1542 362 while (cco.ret == NOT_DONE) {
b47ec2c4 363 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
364 }
365 }
366
367 ret = cco.ret;
cc84d90f 368 if (ret < 0) {
84d18f06 369 if (cco.err) {
cc84d90f
HR
370 error_propagate(errp, cco.err);
371 } else {
372 error_setg_errno(errp, -ret, "Could not create image");
373 }
374 }
0e7e1989 375
80168bff
LC
376out:
377 g_free(cco.filename);
5b7e1542 378 return ret;
ea2384d3
FB
379}
380
c282e1fd 381int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
382{
383 BlockDriver *drv;
cc84d90f
HR
384 Error *local_err = NULL;
385 int ret;
84a12e66 386
b65a5e12 387 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 388 if (drv == NULL) {
16905d71 389 return -ENOENT;
84a12e66
CH
390 }
391
c282e1fd 392 ret = bdrv_create(drv, filename, opts, &local_err);
621ff94d 393 error_propagate(errp, local_err);
cc84d90f 394 return ret;
84a12e66
CH
395}
396
892b7de8
ET
397/**
398 * Try to get @bs's logical and physical block size.
399 * On success, store them in @bsz struct and return 0.
400 * On failure return -errno.
401 * @bs must not be empty.
402 */
403int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
404{
405 BlockDriver *drv = bs->drv;
406
407 if (drv && drv->bdrv_probe_blocksizes) {
408 return drv->bdrv_probe_blocksizes(bs, bsz);
409 }
410
411 return -ENOTSUP;
412}
413
414/**
415 * Try to get @bs's geometry (cyls, heads, sectors).
416 * On success, store them in @geo struct and return 0.
417 * On failure return -errno.
418 * @bs must not be empty.
419 */
420int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
421{
422 BlockDriver *drv = bs->drv;
423
424 if (drv && drv->bdrv_probe_geometry) {
425 return drv->bdrv_probe_geometry(bs, geo);
426 }
427
428 return -ENOTSUP;
429}
430
eba25057
JM
431/*
432 * Create a uniquely-named empty temporary file.
433 * Return 0 upon success, otherwise a negative errno value.
434 */
435int get_tmp_filename(char *filename, int size)
d5249393 436{
eba25057 437#ifdef _WIN32
3b9f94e1 438 char temp_dir[MAX_PATH];
eba25057
JM
439 /* GetTempFileName requires that its output buffer (4th param)
440 have length MAX_PATH or greater. */
441 assert(size >= MAX_PATH);
442 return (GetTempPath(MAX_PATH, temp_dir)
443 && GetTempFileName(temp_dir, "qem", 0, filename)
444 ? 0 : -GetLastError());
d5249393 445#else
67b915a5 446 int fd;
7ccfb2eb 447 const char *tmpdir;
0badc1ee 448 tmpdir = getenv("TMPDIR");
69bef793
AS
449 if (!tmpdir) {
450 tmpdir = "/var/tmp";
451 }
eba25057
JM
452 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
453 return -EOVERFLOW;
454 }
ea2384d3 455 fd = mkstemp(filename);
fe235a06
DH
456 if (fd < 0) {
457 return -errno;
458 }
459 if (close(fd) != 0) {
460 unlink(filename);
eba25057
JM
461 return -errno;
462 }
463 return 0;
d5249393 464#endif
eba25057 465}
fc01f7e7 466
84a12e66
CH
467/*
468 * Detect host devices. By convention, /dev/cdrom[N] is always
469 * recognized as a host CDROM.
470 */
471static BlockDriver *find_hdev_driver(const char *filename)
472{
473 int score_max = 0, score;
474 BlockDriver *drv = NULL, *d;
475
476 QLIST_FOREACH(d, &bdrv_drivers, list) {
477 if (d->bdrv_probe_device) {
478 score = d->bdrv_probe_device(filename);
479 if (score > score_max) {
480 score_max = score;
481 drv = d;
482 }
483 }
484 }
485
486 return drv;
487}
488
88d88798
MM
489static BlockDriver *bdrv_do_find_protocol(const char *protocol)
490{
491 BlockDriver *drv1;
492
493 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
494 if (drv1->protocol_name && !strcmp(drv1->protocol_name, protocol)) {
495 return drv1;
496 }
497 }
498
499 return NULL;
500}
501
98289620 502BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
503 bool allow_protocol_prefix,
504 Error **errp)
83f64091
FB
505{
506 BlockDriver *drv1;
507 char protocol[128];
1cec71e3 508 int len;
83f64091 509 const char *p;
88d88798 510 int i;
19cb3738 511
66f82cee
KW
512 /* TODO Drivers without bdrv_file_open must be specified explicitly */
513
39508e7a
CH
514 /*
515 * XXX(hch): we really should not let host device detection
516 * override an explicit protocol specification, but moving this
517 * later breaks access to device names with colons in them.
518 * Thanks to the brain-dead persistent naming schemes on udev-
519 * based Linux systems those actually are quite common.
520 */
521 drv1 = find_hdev_driver(filename);
522 if (drv1) {
523 return drv1;
524 }
525
98289620 526 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 527 return &bdrv_file;
84a12e66 528 }
98289620 529
9e0b22f4
SH
530 p = strchr(filename, ':');
531 assert(p != NULL);
1cec71e3
AL
532 len = p - filename;
533 if (len > sizeof(protocol) - 1)
534 len = sizeof(protocol) - 1;
535 memcpy(protocol, filename, len);
536 protocol[len] = '\0';
88d88798
MM
537
538 drv1 = bdrv_do_find_protocol(protocol);
539 if (drv1) {
540 return drv1;
541 }
542
543 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); ++i) {
544 if (block_driver_modules[i].protocol_name &&
545 !strcmp(block_driver_modules[i].protocol_name, protocol)) {
546 block_module_load_one(block_driver_modules[i].library_name);
547 break;
8a22f02a 548 }
83f64091 549 }
b65a5e12 550
88d88798
MM
551 drv1 = bdrv_do_find_protocol(protocol);
552 if (!drv1) {
553 error_setg(errp, "Unknown protocol '%s'", protocol);
554 }
555 return drv1;
83f64091
FB
556}
557
c6684249
MA
558/*
559 * Guess image format by probing its contents.
560 * This is not a good idea when your image is raw (CVE-2008-2004), but
561 * we do it anyway for backward compatibility.
562 *
563 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
564 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
565 * but can be smaller if the image file is smaller)
c6684249
MA
566 * @filename is its filename.
567 *
568 * For all block drivers, call the bdrv_probe() method to get its
569 * probing score.
570 * Return the first block driver with the highest probing score.
571 */
38f3ef57
KW
572BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
573 const char *filename)
c6684249
MA
574{
575 int score_max = 0, score;
576 BlockDriver *drv = NULL, *d;
577
578 QLIST_FOREACH(d, &bdrv_drivers, list) {
579 if (d->bdrv_probe) {
580 score = d->bdrv_probe(buf, buf_size, filename);
581 if (score > score_max) {
582 score_max = score;
583 drv = d;
584 }
585 }
586 }
587
588 return drv;
589}
590
5696c6e3 591static int find_image_format(BlockBackend *file, const char *filename,
34b5d2c6 592 BlockDriver **pdrv, Error **errp)
f3a5d3f8 593{
c6684249 594 BlockDriver *drv;
7cddd372 595 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 596 int ret = 0;
f8ea0b00 597
08a00559 598 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
5696c6e3 599 if (blk_is_sg(file) || !blk_is_inserted(file) || blk_getlength(file) == 0) {
ef810437 600 *pdrv = &bdrv_raw;
c98ac35d 601 return ret;
1a396859 602 }
f8ea0b00 603
5696c6e3 604 ret = blk_pread(file, 0, buf, sizeof(buf));
83f64091 605 if (ret < 0) {
34b5d2c6
HR
606 error_setg_errno(errp, -ret, "Could not read image for determining its "
607 "format");
c98ac35d
SW
608 *pdrv = NULL;
609 return ret;
83f64091
FB
610 }
611
c6684249 612 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 613 if (!drv) {
34b5d2c6
HR
614 error_setg(errp, "Could not determine image format: No compatible "
615 "driver found");
c98ac35d
SW
616 ret = -ENOENT;
617 }
618 *pdrv = drv;
619 return ret;
ea2384d3
FB
620}
621
51762288
SH
622/**
623 * Set the current 'total_sectors' value
65a9bb25 624 * Return 0 on success, -errno on error.
51762288
SH
625 */
626static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
627{
628 BlockDriver *drv = bs->drv;
629
396759ad 630 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 631 if (bdrv_is_sg(bs))
396759ad
NB
632 return 0;
633
51762288
SH
634 /* query actual device if possible, otherwise just trust the hint */
635 if (drv->bdrv_getlength) {
636 int64_t length = drv->bdrv_getlength(bs);
637 if (length < 0) {
638 return length;
639 }
7e382003 640 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
641 }
642
643 bs->total_sectors = hint;
644 return 0;
645}
646
cddff5ba
KW
647/**
648 * Combines a QDict of new block driver @options with any missing options taken
649 * from @old_options, so that leaving out an option defaults to its old value.
650 */
651static void bdrv_join_options(BlockDriverState *bs, QDict *options,
652 QDict *old_options)
653{
654 if (bs->drv && bs->drv->bdrv_join_options) {
655 bs->drv->bdrv_join_options(options, old_options);
656 } else {
657 qdict_join(options, old_options, false);
658 }
659}
660
9e8f1835
PB
661/**
662 * Set open flags for a given discard mode
663 *
664 * Return 0 on success, -1 if the discard mode was invalid.
665 */
666int bdrv_parse_discard_flags(const char *mode, int *flags)
667{
668 *flags &= ~BDRV_O_UNMAP;
669
670 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
671 /* do nothing */
672 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
673 *flags |= BDRV_O_UNMAP;
674 } else {
675 return -1;
676 }
677
678 return 0;
679}
680
c3993cdc
SH
681/**
682 * Set open flags for a given cache mode
683 *
684 * Return 0 on success, -1 if the cache mode was invalid.
685 */
53e8ae01 686int bdrv_parse_cache_mode(const char *mode, int *flags, bool *writethrough)
c3993cdc
SH
687{
688 *flags &= ~BDRV_O_CACHE_MASK;
689
690 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
53e8ae01
KW
691 *writethrough = false;
692 *flags |= BDRV_O_NOCACHE;
92196b2f 693 } else if (!strcmp(mode, "directsync")) {
53e8ae01 694 *writethrough = true;
92196b2f 695 *flags |= BDRV_O_NOCACHE;
c3993cdc 696 } else if (!strcmp(mode, "writeback")) {
53e8ae01 697 *writethrough = false;
c3993cdc 698 } else if (!strcmp(mode, "unsafe")) {
53e8ae01 699 *writethrough = false;
c3993cdc
SH
700 *flags |= BDRV_O_NO_FLUSH;
701 } else if (!strcmp(mode, "writethrough")) {
53e8ae01 702 *writethrough = true;
c3993cdc
SH
703 } else {
704 return -1;
705 }
706
707 return 0;
708}
709
b5411555
KW
710static char *bdrv_child_get_parent_desc(BdrvChild *c)
711{
712 BlockDriverState *parent = c->opaque;
713 return g_strdup(bdrv_get_device_or_node_name(parent));
714}
715
20018e12
KW
716static void bdrv_child_cb_drained_begin(BdrvChild *child)
717{
718 BlockDriverState *bs = child->opaque;
719 bdrv_drained_begin(bs);
720}
721
722static void bdrv_child_cb_drained_end(BdrvChild *child)
723{
724 BlockDriverState *bs = child->opaque;
725 bdrv_drained_end(bs);
726}
727
b1e6fc08 728/*
73176bee
KW
729 * Returns the options and flags that a temporary snapshot should get, based on
730 * the originally requested flags (the originally requested image will have
731 * flags like a backing file)
b1e6fc08 732 */
73176bee
KW
733static void bdrv_temp_snapshot_options(int *child_flags, QDict *child_options,
734 int parent_flags, QDict *parent_options)
b1e6fc08 735{
73176bee
KW
736 *child_flags = (parent_flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
737
738 /* For temporary files, unconditional cache=unsafe is fine */
73176bee
KW
739 qdict_set_default_str(child_options, BDRV_OPT_CACHE_DIRECT, "off");
740 qdict_set_default_str(child_options, BDRV_OPT_CACHE_NO_FLUSH, "on");
41869044 741
f87a0e29
AG
742 /* Copy the read-only option from the parent */
743 qdict_copy_default(child_options, parent_options, BDRV_OPT_READ_ONLY);
744
41869044
KW
745 /* aio=native doesn't work for cache.direct=off, so disable it for the
746 * temporary snapshot */
747 *child_flags &= ~BDRV_O_NATIVE_AIO;
b1e6fc08
KW
748}
749
0b50cc88 750/*
8e2160e2
KW
751 * Returns the options and flags that bs->file should get if a protocol driver
752 * is expected, based on the given options and flags for the parent BDS
0b50cc88 753 */
8e2160e2
KW
754static void bdrv_inherited_options(int *child_flags, QDict *child_options,
755 int parent_flags, QDict *parent_options)
0b50cc88 756{
8e2160e2
KW
757 int flags = parent_flags;
758
0b50cc88
KW
759 /* Enable protocol handling, disable format probing for bs->file */
760 flags |= BDRV_O_PROTOCOL;
761
91a097e7
KW
762 /* If the cache mode isn't explicitly set, inherit direct and no-flush from
763 * the parent. */
764 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
765 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
766
f87a0e29
AG
767 /* Inherit the read-only option from the parent if it's not set */
768 qdict_copy_default(child_options, parent_options, BDRV_OPT_READ_ONLY);
769
0b50cc88 770 /* Our block drivers take care to send flushes and respect unmap policy,
91a097e7
KW
771 * so we can default to enable both on lower layers regardless of the
772 * corresponding parent options. */
818584a4 773 qdict_set_default_str(child_options, BDRV_OPT_DISCARD, "unmap");
0b50cc88 774
0b50cc88 775 /* Clear flags that only apply to the top layer */
abb06c5a
DB
776 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ |
777 BDRV_O_NO_IO);
0b50cc88 778
8e2160e2 779 *child_flags = flags;
0b50cc88
KW
780}
781
f3930ed0 782const BdrvChildRole child_file = {
b5411555 783 .get_parent_desc = bdrv_child_get_parent_desc,
8e2160e2 784 .inherit_options = bdrv_inherited_options,
20018e12
KW
785 .drained_begin = bdrv_child_cb_drained_begin,
786 .drained_end = bdrv_child_cb_drained_end,
f3930ed0
KW
787};
788
789/*
8e2160e2
KW
790 * Returns the options and flags that bs->file should get if the use of formats
791 * (and not only protocols) is permitted for it, based on the given options and
792 * flags for the parent BDS
f3930ed0 793 */
8e2160e2
KW
794static void bdrv_inherited_fmt_options(int *child_flags, QDict *child_options,
795 int parent_flags, QDict *parent_options)
f3930ed0 796{
8e2160e2
KW
797 child_file.inherit_options(child_flags, child_options,
798 parent_flags, parent_options);
799
abb06c5a 800 *child_flags &= ~(BDRV_O_PROTOCOL | BDRV_O_NO_IO);
f3930ed0
KW
801}
802
803const BdrvChildRole child_format = {
b5411555 804 .get_parent_desc = bdrv_child_get_parent_desc,
8e2160e2 805 .inherit_options = bdrv_inherited_fmt_options,
20018e12
KW
806 .drained_begin = bdrv_child_cb_drained_begin,
807 .drained_end = bdrv_child_cb_drained_end,
f3930ed0
KW
808};
809
db95dbba
KW
810static void bdrv_backing_attach(BdrvChild *c)
811{
812 BlockDriverState *parent = c->opaque;
813 BlockDriverState *backing_hd = c->bs;
814
815 assert(!parent->backing_blocker);
816 error_setg(&parent->backing_blocker,
817 "node is used as backing hd of '%s'",
818 bdrv_get_device_or_node_name(parent));
819
820 parent->open_flags &= ~BDRV_O_NO_BACKING;
821 pstrcpy(parent->backing_file, sizeof(parent->backing_file),
822 backing_hd->filename);
823 pstrcpy(parent->backing_format, sizeof(parent->backing_format),
824 backing_hd->drv ? backing_hd->drv->format_name : "");
825
826 bdrv_op_block_all(backing_hd, parent->backing_blocker);
827 /* Otherwise we won't be able to commit or stream */
828 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
829 parent->backing_blocker);
830 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_STREAM,
831 parent->backing_blocker);
832 /*
833 * We do backup in 3 ways:
834 * 1. drive backup
835 * The target bs is new opened, and the source is top BDS
836 * 2. blockdev backup
837 * Both the source and the target are top BDSes.
838 * 3. internal backup(used for block replication)
839 * Both the source and the target are backing file
840 *
841 * In case 1 and 2, neither the source nor the target is the backing file.
842 * In case 3, we will block the top BDS, so there is only one block job
843 * for the top BDS and its backing chain.
844 */
845 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_BACKUP_SOURCE,
846 parent->backing_blocker);
847 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_BACKUP_TARGET,
848 parent->backing_blocker);
849}
850
851static void bdrv_backing_detach(BdrvChild *c)
852{
853 BlockDriverState *parent = c->opaque;
854
855 assert(parent->backing_blocker);
856 bdrv_op_unblock_all(c->bs, parent->backing_blocker);
857 error_free(parent->backing_blocker);
858 parent->backing_blocker = NULL;
859}
860
317fc44e 861/*
8e2160e2
KW
862 * Returns the options and flags that bs->backing should get, based on the
863 * given options and flags for the parent BDS
317fc44e 864 */
8e2160e2
KW
865static void bdrv_backing_options(int *child_flags, QDict *child_options,
866 int parent_flags, QDict *parent_options)
317fc44e 867{
8e2160e2
KW
868 int flags = parent_flags;
869
b8816a43
KW
870 /* The cache mode is inherited unmodified for backing files; except WCE,
871 * which is only applied on the top level (BlockBackend) */
91a097e7
KW
872 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
873 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
874
317fc44e 875 /* backing files always opened read-only */
f87a0e29
AG
876 qdict_set_default_str(child_options, BDRV_OPT_READ_ONLY, "on");
877 flags &= ~BDRV_O_COPY_ON_READ;
317fc44e
KW
878
879 /* snapshot=on is handled on the top layer */
8bfea15d 880 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e 881
8e2160e2 882 *child_flags = flags;
317fc44e
KW
883}
884
91ef3825 885const BdrvChildRole child_backing = {
b5411555 886 .get_parent_desc = bdrv_child_get_parent_desc,
db95dbba
KW
887 .attach = bdrv_backing_attach,
888 .detach = bdrv_backing_detach,
8e2160e2 889 .inherit_options = bdrv_backing_options,
20018e12
KW
890 .drained_begin = bdrv_child_cb_drained_begin,
891 .drained_end = bdrv_child_cb_drained_end,
f3930ed0
KW
892};
893
7b272452
KW
894static int bdrv_open_flags(BlockDriverState *bs, int flags)
895{
61de4c68 896 int open_flags = flags;
7b272452
KW
897
898 /*
899 * Clear flags that are internal to the block layer before opening the
900 * image.
901 */
20cca275 902 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
903
904 /*
905 * Snapshots should be writable.
906 */
8bfea15d 907 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
908 open_flags |= BDRV_O_RDWR;
909 }
910
911 return open_flags;
912}
913
91a097e7
KW
914static void update_flags_from_options(int *flags, QemuOpts *opts)
915{
916 *flags &= ~BDRV_O_CACHE_MASK;
917
91a097e7
KW
918 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_NO_FLUSH));
919 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_NO_FLUSH, false)) {
920 *flags |= BDRV_O_NO_FLUSH;
921 }
922
923 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_DIRECT));
924 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_DIRECT, false)) {
925 *flags |= BDRV_O_NOCACHE;
926 }
f87a0e29
AG
927
928 *flags &= ~BDRV_O_RDWR;
929
930 assert(qemu_opt_find(opts, BDRV_OPT_READ_ONLY));
931 if (!qemu_opt_get_bool(opts, BDRV_OPT_READ_ONLY, false)) {
932 *flags |= BDRV_O_RDWR;
933 }
934
91a097e7
KW
935}
936
937static void update_options_from_flags(QDict *options, int flags)
938{
91a097e7
KW
939 if (!qdict_haskey(options, BDRV_OPT_CACHE_DIRECT)) {
940 qdict_put(options, BDRV_OPT_CACHE_DIRECT,
941 qbool_from_bool(flags & BDRV_O_NOCACHE));
942 }
943 if (!qdict_haskey(options, BDRV_OPT_CACHE_NO_FLUSH)) {
944 qdict_put(options, BDRV_OPT_CACHE_NO_FLUSH,
945 qbool_from_bool(flags & BDRV_O_NO_FLUSH));
946 }
f87a0e29
AG
947 if (!qdict_haskey(options, BDRV_OPT_READ_ONLY)) {
948 qdict_put(options, BDRV_OPT_READ_ONLY,
949 qbool_from_bool(!(flags & BDRV_O_RDWR)));
950 }
91a097e7
KW
951}
952
636ea370
KW
953static void bdrv_assign_node_name(BlockDriverState *bs,
954 const char *node_name,
955 Error **errp)
6913c0c2 956{
15489c76 957 char *gen_node_name = NULL;
6913c0c2 958
15489c76
JC
959 if (!node_name) {
960 node_name = gen_node_name = id_generate(ID_BLOCK);
961 } else if (!id_wellformed(node_name)) {
962 /*
963 * Check for empty string or invalid characters, but not if it is
964 * generated (generated names use characters not available to the user)
965 */
9aebf3b8 966 error_setg(errp, "Invalid node name");
636ea370 967 return;
6913c0c2
BC
968 }
969
0c5e94ee 970 /* takes care of avoiding namespaces collisions */
7f06d47e 971 if (blk_by_name(node_name)) {
0c5e94ee
BC
972 error_setg(errp, "node-name=%s is conflicting with a device id",
973 node_name);
15489c76 974 goto out;
0c5e94ee
BC
975 }
976
6913c0c2
BC
977 /* takes care of avoiding duplicates node names */
978 if (bdrv_find_node(node_name)) {
979 error_setg(errp, "Duplicate node name");
15489c76 980 goto out;
6913c0c2
BC
981 }
982
983 /* copy node name into the bs and insert it into the graph list */
984 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
985 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
15489c76
JC
986out:
987 g_free(gen_node_name);
6913c0c2
BC
988}
989
01a56501
KW
990static int bdrv_open_driver(BlockDriverState *bs, BlockDriver *drv,
991 const char *node_name, QDict *options,
992 int open_flags, Error **errp)
993{
994 Error *local_err = NULL;
995 int ret;
996
997 bdrv_assign_node_name(bs, node_name, &local_err);
998 if (local_err) {
999 error_propagate(errp, local_err);
1000 return -EINVAL;
1001 }
1002
1003 bs->drv = drv;
680c7f96 1004 bs->read_only = !(bs->open_flags & BDRV_O_RDWR);
01a56501
KW
1005 bs->opaque = g_malloc0(drv->instance_size);
1006
1007 if (drv->bdrv_file_open) {
1008 assert(!drv->bdrv_needs_filename || bs->filename[0]);
1009 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
680c7f96 1010 } else if (drv->bdrv_open) {
01a56501 1011 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
680c7f96
KW
1012 } else {
1013 ret = 0;
01a56501
KW
1014 }
1015
1016 if (ret < 0) {
1017 if (local_err) {
1018 error_propagate(errp, local_err);
1019 } else if (bs->filename[0]) {
1020 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
1021 } else {
1022 error_setg_errno(errp, -ret, "Could not open image");
1023 }
1024 goto free_and_fail;
1025 }
1026
1027 ret = refresh_total_sectors(bs, bs->total_sectors);
1028 if (ret < 0) {
1029 error_setg_errno(errp, -ret, "Could not refresh total sector count");
1030 goto free_and_fail;
1031 }
1032
1033 bdrv_refresh_limits(bs, &local_err);
1034 if (local_err) {
1035 error_propagate(errp, local_err);
1036 ret = -EINVAL;
1037 goto free_and_fail;
1038 }
1039
1040 assert(bdrv_opt_mem_align(bs) != 0);
1041 assert(bdrv_min_mem_align(bs) != 0);
1042 assert(is_power_of_2(bs->bl.request_alignment));
1043
1044 return 0;
1045
1046free_and_fail:
1047 /* FIXME Close bs first if already opened*/
1048 g_free(bs->opaque);
1049 bs->opaque = NULL;
1050 bs->drv = NULL;
1051 return ret;
1052}
1053
680c7f96
KW
1054BlockDriverState *bdrv_new_open_driver(BlockDriver *drv, const char *node_name,
1055 int flags, Error **errp)
1056{
1057 BlockDriverState *bs;
1058 int ret;
1059
1060 bs = bdrv_new();
1061 bs->open_flags = flags;
1062 bs->explicit_options = qdict_new();
1063 bs->options = qdict_new();
1064 bs->opaque = NULL;
1065
1066 update_options_from_flags(bs->options, flags);
1067
1068 ret = bdrv_open_driver(bs, drv, node_name, bs->options, flags, errp);
1069 if (ret < 0) {
1070 QDECREF(bs->explicit_options);
1071 QDECREF(bs->options);
1072 bdrv_unref(bs);
1073 return NULL;
1074 }
1075
1076 return bs;
1077}
1078
c5f3014b 1079QemuOptsList bdrv_runtime_opts = {
18edf289
KW
1080 .name = "bdrv_common",
1081 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
1082 .desc = {
1083 {
1084 .name = "node-name",
1085 .type = QEMU_OPT_STRING,
1086 .help = "Node name of the block device node",
1087 },
62392ebb
KW
1088 {
1089 .name = "driver",
1090 .type = QEMU_OPT_STRING,
1091 .help = "Block driver to use for the node",
1092 },
91a097e7
KW
1093 {
1094 .name = BDRV_OPT_CACHE_DIRECT,
1095 .type = QEMU_OPT_BOOL,
1096 .help = "Bypass software writeback cache on the host",
1097 },
1098 {
1099 .name = BDRV_OPT_CACHE_NO_FLUSH,
1100 .type = QEMU_OPT_BOOL,
1101 .help = "Ignore flush requests",
1102 },
f87a0e29
AG
1103 {
1104 .name = BDRV_OPT_READ_ONLY,
1105 .type = QEMU_OPT_BOOL,
1106 .help = "Node is opened in read-only mode",
1107 },
692e01a2
KW
1108 {
1109 .name = "detect-zeroes",
1110 .type = QEMU_OPT_STRING,
1111 .help = "try to optimize zero writes (off, on, unmap)",
1112 },
818584a4
KW
1113 {
1114 .name = "discard",
1115 .type = QEMU_OPT_STRING,
1116 .help = "discard operation (ignore/off, unmap/on)",
1117 },
18edf289
KW
1118 { /* end of list */ }
1119 },
1120};
1121
57915332
KW
1122/*
1123 * Common part for opening disk images and files
b6ad491a
KW
1124 *
1125 * Removes all processed options from *options.
57915332 1126 */
5696c6e3 1127static int bdrv_open_common(BlockDriverState *bs, BlockBackend *file,
82dc8b41 1128 QDict *options, Error **errp)
57915332
KW
1129{
1130 int ret, open_flags;
035fccdf 1131 const char *filename;
62392ebb 1132 const char *driver_name = NULL;
6913c0c2 1133 const char *node_name = NULL;
818584a4 1134 const char *discard;
692e01a2 1135 const char *detect_zeroes;
18edf289 1136 QemuOpts *opts;
62392ebb 1137 BlockDriver *drv;
34b5d2c6 1138 Error *local_err = NULL;
57915332 1139
6405875c 1140 assert(bs->file == NULL);
707ff828 1141 assert(options != NULL && bs->options != options);
57915332 1142
62392ebb
KW
1143 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
1144 qemu_opts_absorb_qdict(opts, options, &local_err);
1145 if (local_err) {
1146 error_propagate(errp, local_err);
1147 ret = -EINVAL;
1148 goto fail_opts;
1149 }
1150
9b7e8691
AG
1151 update_flags_from_options(&bs->open_flags, opts);
1152
62392ebb
KW
1153 driver_name = qemu_opt_get(opts, "driver");
1154 drv = bdrv_find_format(driver_name);
1155 assert(drv != NULL);
1156
45673671 1157 if (file != NULL) {
5696c6e3 1158 filename = blk_bs(file)->filename;
45673671
KW
1159 } else {
1160 filename = qdict_get_try_str(options, "filename");
1161 }
1162
765003db
KW
1163 if (drv->bdrv_needs_filename && !filename) {
1164 error_setg(errp, "The '%s' block driver requires a file name",
1165 drv->format_name);
18edf289
KW
1166 ret = -EINVAL;
1167 goto fail_opts;
6913c0c2 1168 }
6913c0c2 1169
82dc8b41
KW
1170 trace_bdrv_open_common(bs, filename ?: "", bs->open_flags,
1171 drv->format_name);
62392ebb 1172
82dc8b41 1173 bs->read_only = !(bs->open_flags & BDRV_O_RDWR);
b64ec4e4
FZ
1174
1175 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
1176 error_setg(errp,
1177 !bs->read_only && bdrv_is_whitelisted(drv, true)
1178 ? "Driver '%s' can only be used for read-only devices"
1179 : "Driver '%s' is not whitelisted",
1180 drv->format_name);
18edf289
KW
1181 ret = -ENOTSUP;
1182 goto fail_opts;
b64ec4e4 1183 }
57915332 1184
53fec9d3 1185 assert(bs->copy_on_read == 0); /* bdrv_new() and bdrv_close() make it so */
82dc8b41 1186 if (bs->open_flags & BDRV_O_COPY_ON_READ) {
0ebd24e0
KW
1187 if (!bs->read_only) {
1188 bdrv_enable_copy_on_read(bs);
1189 } else {
1190 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
1191 ret = -EINVAL;
1192 goto fail_opts;
0ebd24e0 1193 }
53fec9d3
SH
1194 }
1195
818584a4
KW
1196 discard = qemu_opt_get(opts, "discard");
1197 if (discard != NULL) {
1198 if (bdrv_parse_discard_flags(discard, &bs->open_flags) != 0) {
1199 error_setg(errp, "Invalid discard option");
1200 ret = -EINVAL;
1201 goto fail_opts;
1202 }
1203 }
1204
692e01a2
KW
1205 detect_zeroes = qemu_opt_get(opts, "detect-zeroes");
1206 if (detect_zeroes) {
1207 BlockdevDetectZeroesOptions value =
1208 qapi_enum_parse(BlockdevDetectZeroesOptions_lookup,
1209 detect_zeroes,
1210 BLOCKDEV_DETECT_ZEROES_OPTIONS__MAX,
1211 BLOCKDEV_DETECT_ZEROES_OPTIONS_OFF,
1212 &local_err);
1213 if (local_err) {
1214 error_propagate(errp, local_err);
1215 ret = -EINVAL;
1216 goto fail_opts;
1217 }
1218
1219 if (value == BLOCKDEV_DETECT_ZEROES_OPTIONS_UNMAP &&
1220 !(bs->open_flags & BDRV_O_UNMAP))
1221 {
1222 error_setg(errp, "setting detect-zeroes to unmap is not allowed "
1223 "without setting discard operation to unmap");
1224 ret = -EINVAL;
1225 goto fail_opts;
1226 }
1227
1228 bs->detect_zeroes = value;
1229 }
1230
c2ad1b0c
KW
1231 if (filename != NULL) {
1232 pstrcpy(bs->filename, sizeof(bs->filename), filename);
1233 } else {
1234 bs->filename[0] = '\0';
1235 }
91af7014 1236 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 1237
66f82cee 1238 /* Open the image, either directly or using a protocol */
82dc8b41 1239 open_flags = bdrv_open_flags(bs, bs->open_flags);
01a56501 1240 node_name = qemu_opt_get(opts, "node-name");
57915332 1241
01a56501
KW
1242 assert(!drv->bdrv_file_open || file == NULL);
1243 ret = bdrv_open_driver(bs, drv, node_name, options, open_flags, errp);
51762288 1244 if (ret < 0) {
01a56501 1245 goto fail_opts;
3baca891
KW
1246 }
1247
18edf289 1248 qemu_opts_del(opts);
57915332
KW
1249 return 0;
1250
18edf289
KW
1251fail_opts:
1252 qemu_opts_del(opts);
57915332
KW
1253 return ret;
1254}
1255
5e5c4f63
KW
1256static QDict *parse_json_filename(const char *filename, Error **errp)
1257{
1258 QObject *options_obj;
1259 QDict *options;
1260 int ret;
1261
1262 ret = strstart(filename, "json:", &filename);
1263 assert(ret);
1264
5577fff7 1265 options_obj = qobject_from_json(filename, errp);
5e5c4f63 1266 if (!options_obj) {
5577fff7
MA
1267 /* Work around qobject_from_json() lossage TODO fix that */
1268 if (errp && !*errp) {
1269 error_setg(errp, "Could not parse the JSON options");
1270 return NULL;
1271 }
1272 error_prepend(errp, "Could not parse the JSON options: ");
5e5c4f63
KW
1273 return NULL;
1274 }
1275
ca6b6e1e
MA
1276 options = qobject_to_qdict(options_obj);
1277 if (!options) {
5e5c4f63
KW
1278 qobject_decref(options_obj);
1279 error_setg(errp, "Invalid JSON object given");
1280 return NULL;
1281 }
1282
5e5c4f63
KW
1283 qdict_flatten(options);
1284
1285 return options;
1286}
1287
de3b53f0
KW
1288static void parse_json_protocol(QDict *options, const char **pfilename,
1289 Error **errp)
1290{
1291 QDict *json_options;
1292 Error *local_err = NULL;
1293
1294 /* Parse json: pseudo-protocol */
1295 if (!*pfilename || !g_str_has_prefix(*pfilename, "json:")) {
1296 return;
1297 }
1298
1299 json_options = parse_json_filename(*pfilename, &local_err);
1300 if (local_err) {
1301 error_propagate(errp, local_err);
1302 return;
1303 }
1304
1305 /* Options given in the filename have lower priority than options
1306 * specified directly */
1307 qdict_join(options, json_options, false);
1308 QDECREF(json_options);
1309 *pfilename = NULL;
1310}
1311
b6ce07aa 1312/*
f54120ff
KW
1313 * Fills in default options for opening images and converts the legacy
1314 * filename/flags pair to option QDict entries.
53a29513
HR
1315 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
1316 * block driver has been specified explicitly.
b6ce07aa 1317 */
de3b53f0 1318static int bdrv_fill_options(QDict **options, const char *filename,
053e1578 1319 int *flags, Error **errp)
ea2384d3 1320{
c2ad1b0c 1321 const char *drvname;
53a29513 1322 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 1323 bool parse_filename = false;
053e1578 1324 BlockDriver *drv = NULL;
34b5d2c6 1325 Error *local_err = NULL;
83f64091 1326
53a29513 1327 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1328 if (drvname) {
1329 drv = bdrv_find_format(drvname);
1330 if (!drv) {
1331 error_setg(errp, "Unknown driver '%s'", drvname);
1332 return -ENOENT;
1333 }
1334 /* If the user has explicitly specified the driver, this choice should
1335 * override the BDRV_O_PROTOCOL flag */
1336 protocol = drv->bdrv_file_open;
53a29513
HR
1337 }
1338
1339 if (protocol) {
1340 *flags |= BDRV_O_PROTOCOL;
1341 } else {
1342 *flags &= ~BDRV_O_PROTOCOL;
1343 }
1344
91a097e7
KW
1345 /* Translate cache options from flags into options */
1346 update_options_from_flags(*options, *flags);
1347
035fccdf 1348 /* Fetch the file name from the options QDict if necessary */
17b005f1 1349 if (protocol && filename) {
f54120ff
KW
1350 if (!qdict_haskey(*options, "filename")) {
1351 qdict_put(*options, "filename", qstring_from_str(filename));
1352 parse_filename = true;
1353 } else {
1354 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1355 "the same time");
1356 return -EINVAL;
1357 }
035fccdf
KW
1358 }
1359
c2ad1b0c 1360 /* Find the right block driver */
f54120ff 1361 filename = qdict_get_try_str(*options, "filename");
f54120ff 1362
053e1578
HR
1363 if (!drvname && protocol) {
1364 if (filename) {
1365 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1366 if (!drv) {
053e1578 1367 return -EINVAL;
17b005f1 1368 }
053e1578
HR
1369
1370 drvname = drv->format_name;
1371 qdict_put(*options, "driver", qstring_from_str(drvname));
1372 } else {
1373 error_setg(errp, "Must specify either driver or file");
1374 return -EINVAL;
98289620 1375 }
c2ad1b0c
KW
1376 }
1377
17b005f1 1378 assert(drv || !protocol);
c2ad1b0c 1379
f54120ff 1380 /* Driver-specific filename parsing */
17b005f1 1381 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1382 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1383 if (local_err) {
34b5d2c6 1384 error_propagate(errp, local_err);
f54120ff 1385 return -EINVAL;
6963a30d 1386 }
cd5d031e
HR
1387
1388 if (!drv->bdrv_needs_filename) {
1389 qdict_del(*options, "filename");
cd5d031e 1390 }
6963a30d
KW
1391 }
1392
f54120ff
KW
1393 return 0;
1394}
1395
33a610c3
KW
1396/*
1397 * Check whether permissions on this node can be changed in a way that
1398 * @cumulative_perms and @cumulative_shared_perms are the new cumulative
1399 * permissions of all its parents. This involves checking whether all necessary
1400 * permission changes to child nodes can be performed.
1401 *
1402 * A call to this function must always be followed by a call to bdrv_set_perm()
1403 * or bdrv_abort_perm_update().
1404 */
1405static int bdrv_check_perm(BlockDriverState *bs, uint64_t cumulative_perms,
1406 uint64_t cumulative_shared_perms, Error **errp)
1407{
1408 BlockDriver *drv = bs->drv;
1409 BdrvChild *c;
1410 int ret;
1411
1412 /* Write permissions never work with read-only images */
1413 if ((cumulative_perms & (BLK_PERM_WRITE | BLK_PERM_WRITE_UNCHANGED)) &&
1414 bdrv_is_read_only(bs))
1415 {
1416 error_setg(errp, "Block node is read-only");
1417 return -EPERM;
1418 }
1419
1420 /* Check this node */
1421 if (!drv) {
1422 return 0;
1423 }
1424
1425 if (drv->bdrv_check_perm) {
1426 return drv->bdrv_check_perm(bs, cumulative_perms,
1427 cumulative_shared_perms, errp);
1428 }
1429
78e421c9 1430 /* Drivers that never have children can omit .bdrv_child_perm() */
33a610c3 1431 if (!drv->bdrv_child_perm) {
78e421c9 1432 assert(QLIST_EMPTY(&bs->children));
33a610c3
KW
1433 return 0;
1434 }
1435
1436 /* Check all children */
1437 QLIST_FOREACH(c, &bs->children, next) {
1438 uint64_t cur_perm, cur_shared;
1439 drv->bdrv_child_perm(bs, c, c->role,
1440 cumulative_perms, cumulative_shared_perms,
1441 &cur_perm, &cur_shared);
1442 ret = bdrv_child_check_perm(c, cur_perm, cur_shared, errp);
1443 if (ret < 0) {
1444 return ret;
1445 }
1446 }
1447
1448 return 0;
1449}
1450
1451/*
1452 * Notifies drivers that after a previous bdrv_check_perm() call, the
1453 * permission update is not performed and any preparations made for it (e.g.
1454 * taken file locks) need to be undone.
1455 *
1456 * This function recursively notifies all child nodes.
1457 */
1458static void bdrv_abort_perm_update(BlockDriverState *bs)
1459{
1460 BlockDriver *drv = bs->drv;
1461 BdrvChild *c;
1462
1463 if (!drv) {
1464 return;
1465 }
1466
1467 if (drv->bdrv_abort_perm_update) {
1468 drv->bdrv_abort_perm_update(bs);
1469 }
1470
1471 QLIST_FOREACH(c, &bs->children, next) {
1472 bdrv_child_abort_perm_update(c);
1473 }
1474}
1475
1476static void bdrv_set_perm(BlockDriverState *bs, uint64_t cumulative_perms,
1477 uint64_t cumulative_shared_perms)
1478{
1479 BlockDriver *drv = bs->drv;
1480 BdrvChild *c;
1481
1482 if (!drv) {
1483 return;
1484 }
1485
1486 /* Update this node */
1487 if (drv->bdrv_set_perm) {
1488 drv->bdrv_set_perm(bs, cumulative_perms, cumulative_shared_perms);
1489 }
1490
78e421c9 1491 /* Drivers that never have children can omit .bdrv_child_perm() */
33a610c3 1492 if (!drv->bdrv_child_perm) {
78e421c9 1493 assert(QLIST_EMPTY(&bs->children));
33a610c3
KW
1494 return;
1495 }
1496
1497 /* Update all children */
1498 QLIST_FOREACH(c, &bs->children, next) {
1499 uint64_t cur_perm, cur_shared;
1500 drv->bdrv_child_perm(bs, c, c->role,
1501 cumulative_perms, cumulative_shared_perms,
1502 &cur_perm, &cur_shared);
1503 bdrv_child_set_perm(c, cur_perm, cur_shared);
1504 }
1505}
1506
1507static void bdrv_get_cumulative_perm(BlockDriverState *bs, uint64_t *perm,
1508 uint64_t *shared_perm)
1509{
1510 BdrvChild *c;
1511 uint64_t cumulative_perms = 0;
1512 uint64_t cumulative_shared_perms = BLK_PERM_ALL;
1513
1514 QLIST_FOREACH(c, &bs->parents, next_parent) {
1515 cumulative_perms |= c->perm;
1516 cumulative_shared_perms &= c->shared_perm;
1517 }
1518
1519 *perm = cumulative_perms;
1520 *shared_perm = cumulative_shared_perms;
1521}
1522
d083319f
KW
1523static char *bdrv_child_user_desc(BdrvChild *c)
1524{
1525 if (c->role->get_parent_desc) {
1526 return c->role->get_parent_desc(c);
1527 }
1528
1529 return g_strdup("another user");
1530}
1531
1532static char *bdrv_perm_names(uint64_t perm)
1533{
1534 struct perm_name {
1535 uint64_t perm;
1536 const char *name;
1537 } permissions[] = {
1538 { BLK_PERM_CONSISTENT_READ, "consistent read" },
1539 { BLK_PERM_WRITE, "write" },
1540 { BLK_PERM_WRITE_UNCHANGED, "write unchanged" },
1541 { BLK_PERM_RESIZE, "resize" },
1542 { BLK_PERM_GRAPH_MOD, "change children" },
1543 { 0, NULL }
1544 };
1545
1546 char *result = g_strdup("");
1547 struct perm_name *p;
1548
1549 for (p = permissions; p->name; p++) {
1550 if (perm & p->perm) {
1551 char *old = result;
1552 result = g_strdup_printf("%s%s%s", old, *old ? ", " : "", p->name);
1553 g_free(old);
1554 }
1555 }
1556
1557 return result;
1558}
1559
33a610c3
KW
1560/*
1561 * Checks whether a new reference to @bs can be added if the new user requires
1562 * @new_used_perm/@new_shared_perm as its permissions. If @ignore_child is set,
1563 * this old reference is ignored in the calculations; this allows checking
1564 * permission updates for an existing reference.
1565 *
1566 * Needs to be followed by a call to either bdrv_set_perm() or
1567 * bdrv_abort_perm_update(). */
d5e6f437
KW
1568static int bdrv_check_update_perm(BlockDriverState *bs, uint64_t new_used_perm,
1569 uint64_t new_shared_perm,
1570 BdrvChild *ignore_child, Error **errp)
1571{
1572 BdrvChild *c;
33a610c3
KW
1573 uint64_t cumulative_perms = new_used_perm;
1574 uint64_t cumulative_shared_perms = new_shared_perm;
d5e6f437
KW
1575
1576 /* There is no reason why anyone couldn't tolerate write_unchanged */
1577 assert(new_shared_perm & BLK_PERM_WRITE_UNCHANGED);
1578
1579 QLIST_FOREACH(c, &bs->parents, next_parent) {
1580 if (c == ignore_child) {
1581 continue;
1582 }
1583
d083319f
KW
1584 if ((new_used_perm & c->shared_perm) != new_used_perm) {
1585 char *user = bdrv_child_user_desc(c);
1586 char *perm_names = bdrv_perm_names(new_used_perm & ~c->shared_perm);
1587 error_setg(errp, "Conflicts with use by %s as '%s', which does not "
1588 "allow '%s' on %s",
1589 user, c->name, perm_names, bdrv_get_node_name(c->bs));
1590 g_free(user);
1591 g_free(perm_names);
1592 return -EPERM;
1593 }
1594
1595 if ((c->perm & new_shared_perm) != c->perm) {
1596 char *user = bdrv_child_user_desc(c);
1597 char *perm_names = bdrv_perm_names(c->perm & ~new_shared_perm);
1598 error_setg(errp, "Conflicts with use by %s as '%s', which uses "
1599 "'%s' on %s",
1600 user, c->name, perm_names, bdrv_get_node_name(c->bs));
1601 g_free(user);
1602 g_free(perm_names);
d5e6f437
KW
1603 return -EPERM;
1604 }
33a610c3
KW
1605
1606 cumulative_perms |= c->perm;
1607 cumulative_shared_perms &= c->shared_perm;
d5e6f437
KW
1608 }
1609
33a610c3
KW
1610 return bdrv_check_perm(bs, cumulative_perms, cumulative_shared_perms, errp);
1611}
1612
1613/* Needs to be followed by a call to either bdrv_child_set_perm() or
1614 * bdrv_child_abort_perm_update(). */
1615int bdrv_child_check_perm(BdrvChild *c, uint64_t perm, uint64_t shared,
1616 Error **errp)
1617{
1618 return bdrv_check_update_perm(c->bs, perm, shared, c, errp);
1619}
1620
1621void bdrv_child_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared)
1622{
1623 uint64_t cumulative_perms, cumulative_shared_perms;
1624
1625 c->perm = perm;
1626 c->shared_perm = shared;
1627
1628 bdrv_get_cumulative_perm(c->bs, &cumulative_perms,
1629 &cumulative_shared_perms);
1630 bdrv_set_perm(c->bs, cumulative_perms, cumulative_shared_perms);
1631}
1632
1633void bdrv_child_abort_perm_update(BdrvChild *c)
1634{
1635 bdrv_abort_perm_update(c->bs);
1636}
1637
1638int bdrv_child_try_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared,
1639 Error **errp)
1640{
1641 int ret;
1642
1643 ret = bdrv_child_check_perm(c, perm, shared, errp);
1644 if (ret < 0) {
1645 bdrv_child_abort_perm_update(c);
1646 return ret;
1647 }
1648
1649 bdrv_child_set_perm(c, perm, shared);
1650
d5e6f437
KW
1651 return 0;
1652}
1653
6a1b9ee1
KW
1654#define DEFAULT_PERM_PASSTHROUGH (BLK_PERM_CONSISTENT_READ \
1655 | BLK_PERM_WRITE \
1656 | BLK_PERM_WRITE_UNCHANGED \
1657 | BLK_PERM_RESIZE)
1658#define DEFAULT_PERM_UNCHANGED (BLK_PERM_ALL & ~DEFAULT_PERM_PASSTHROUGH)
1659
1660void bdrv_filter_default_perms(BlockDriverState *bs, BdrvChild *c,
1661 const BdrvChildRole *role,
1662 uint64_t perm, uint64_t shared,
1663 uint64_t *nperm, uint64_t *nshared)
1664{
1665 if (c == NULL) {
1666 *nperm = perm & DEFAULT_PERM_PASSTHROUGH;
1667 *nshared = (shared & DEFAULT_PERM_PASSTHROUGH) | DEFAULT_PERM_UNCHANGED;
1668 return;
1669 }
1670
1671 *nperm = (perm & DEFAULT_PERM_PASSTHROUGH) |
1672 (c->perm & DEFAULT_PERM_UNCHANGED);
1673 *nshared = (shared & DEFAULT_PERM_PASSTHROUGH) |
1674 (c->shared_perm & DEFAULT_PERM_UNCHANGED);
1675}
1676
6b1a044a
KW
1677void bdrv_format_default_perms(BlockDriverState *bs, BdrvChild *c,
1678 const BdrvChildRole *role,
1679 uint64_t perm, uint64_t shared,
1680 uint64_t *nperm, uint64_t *nshared)
1681{
1682 bool backing = (role == &child_backing);
1683 assert(role == &child_backing || role == &child_file);
1684
1685 if (!backing) {
1686 /* Apart from the modifications below, the same permissions are
1687 * forwarded and left alone as for filters */
1688 bdrv_filter_default_perms(bs, c, role, perm, shared, &perm, &shared);
1689
1690 /* Format drivers may touch metadata even if the guest doesn't write */
1691 if (!bdrv_is_read_only(bs)) {
1692 perm |= BLK_PERM_WRITE | BLK_PERM_RESIZE;
1693 }
1694
1695 /* bs->file always needs to be consistent because of the metadata. We
1696 * can never allow other users to resize or write to it. */
1697 perm |= BLK_PERM_CONSISTENT_READ;
1698 shared &= ~(BLK_PERM_WRITE | BLK_PERM_RESIZE);
1699 } else {
1700 /* We want consistent read from backing files if the parent needs it.
1701 * No other operations are performed on backing files. */
1702 perm &= BLK_PERM_CONSISTENT_READ;
1703
1704 /* If the parent can deal with changing data, we're okay with a
1705 * writable and resizable backing file. */
1706 /* TODO Require !(perm & BLK_PERM_CONSISTENT_READ), too? */
1707 if (shared & BLK_PERM_WRITE) {
1708 shared = BLK_PERM_WRITE | BLK_PERM_RESIZE;
1709 } else {
1710 shared = 0;
1711 }
1712
1713 shared |= BLK_PERM_CONSISTENT_READ | BLK_PERM_GRAPH_MOD |
1714 BLK_PERM_WRITE_UNCHANGED;
1715 }
1716
1717 *nperm = perm;
1718 *nshared = shared;
1719}
1720
33a610c3
KW
1721static void bdrv_replace_child(BdrvChild *child, BlockDriverState *new_bs,
1722 bool check_new_perm)
e9740bc6
KW
1723{
1724 BlockDriverState *old_bs = child->bs;
33a610c3 1725 uint64_t perm, shared_perm;
e9740bc6
KW
1726
1727 if (old_bs) {
36fe1331
KW
1728 if (old_bs->quiesce_counter && child->role->drained_end) {
1729 child->role->drained_end(child);
1730 }
db95dbba
KW
1731 if (child->role->detach) {
1732 child->role->detach(child);
1733 }
e9740bc6 1734 QLIST_REMOVE(child, next_parent);
33a610c3
KW
1735
1736 /* Update permissions for old node. This is guaranteed to succeed
1737 * because we're just taking a parent away, so we're loosening
1738 * restrictions. */
1739 bdrv_get_cumulative_perm(old_bs, &perm, &shared_perm);
1740 bdrv_check_perm(old_bs, perm, shared_perm, &error_abort);
1741 bdrv_set_perm(old_bs, perm, shared_perm);
e9740bc6 1742 }
36fe1331
KW
1743
1744 child->bs = new_bs;
1745
e9740bc6
KW
1746 if (new_bs) {
1747 QLIST_INSERT_HEAD(&new_bs->parents, child, next_parent);
36fe1331
KW
1748 if (new_bs->quiesce_counter && child->role->drained_begin) {
1749 child->role->drained_begin(child);
1750 }
33a610c3
KW
1751
1752 bdrv_get_cumulative_perm(new_bs, &perm, &shared_perm);
1753 if (check_new_perm) {
1754 bdrv_check_perm(new_bs, perm, shared_perm, &error_abort);
1755 }
1756 bdrv_set_perm(new_bs, perm, shared_perm);
db95dbba
KW
1757
1758 if (child->role->attach) {
1759 child->role->attach(child);
1760 }
e9740bc6 1761 }
e9740bc6
KW
1762}
1763
f21d96d0
KW
1764BdrvChild *bdrv_root_attach_child(BlockDriverState *child_bs,
1765 const char *child_name,
36fe1331 1766 const BdrvChildRole *child_role,
d5e6f437
KW
1767 uint64_t perm, uint64_t shared_perm,
1768 void *opaque, Error **errp)
df581792 1769{
d5e6f437
KW
1770 BdrvChild *child;
1771 int ret;
1772
1773 ret = bdrv_check_update_perm(child_bs, perm, shared_perm, NULL, errp);
1774 if (ret < 0) {
33a610c3 1775 bdrv_abort_perm_update(child_bs);
d5e6f437
KW
1776 return NULL;
1777 }
1778
1779 child = g_new(BdrvChild, 1);
df581792 1780 *child = (BdrvChild) {
d5e6f437
KW
1781 .bs = NULL,
1782 .name = g_strdup(child_name),
1783 .role = child_role,
1784 .perm = perm,
1785 .shared_perm = shared_perm,
1786 .opaque = opaque,
df581792
KW
1787 };
1788
33a610c3
KW
1789 /* This performs the matching bdrv_set_perm() for the above check. */
1790 bdrv_replace_child(child, child_bs, false);
b4b059f6
KW
1791
1792 return child;
df581792
KW
1793}
1794
98292c61
WC
1795BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
1796 BlockDriverState *child_bs,
1797 const char *child_name,
8b2ff529
KW
1798 const BdrvChildRole *child_role,
1799 Error **errp)
f21d96d0 1800{
d5e6f437 1801 BdrvChild *child;
f68c598b
KW
1802 uint64_t perm, shared_perm;
1803
1804 bdrv_get_cumulative_perm(parent_bs, &perm, &shared_perm);
1805
1806 assert(parent_bs->drv);
1807 parent_bs->drv->bdrv_child_perm(parent_bs, NULL, child_role,
1808 perm, shared_perm, &perm, &shared_perm);
d5e6f437 1809
d5e6f437 1810 child = bdrv_root_attach_child(child_bs, child_name, child_role,
f68c598b 1811 perm, shared_perm, parent_bs, errp);
d5e6f437
KW
1812 if (child == NULL) {
1813 return NULL;
1814 }
1815
f21d96d0
KW
1816 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
1817 return child;
1818}
1819
3f09bfbc 1820static void bdrv_detach_child(BdrvChild *child)
33a60407 1821{
f21d96d0
KW
1822 if (child->next.le_prev) {
1823 QLIST_REMOVE(child, next);
1824 child->next.le_prev = NULL;
1825 }
e9740bc6 1826
33a610c3 1827 bdrv_replace_child(child, NULL, false);
e9740bc6 1828
260fecf1 1829 g_free(child->name);
33a60407
KW
1830 g_free(child);
1831}
1832
f21d96d0 1833void bdrv_root_unref_child(BdrvChild *child)
33a60407 1834{
779020cb
KW
1835 BlockDriverState *child_bs;
1836
f21d96d0
KW
1837 child_bs = child->bs;
1838 bdrv_detach_child(child);
1839 bdrv_unref(child_bs);
1840}
1841
1842void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
1843{
779020cb
KW
1844 if (child == NULL) {
1845 return;
1846 }
33a60407
KW
1847
1848 if (child->bs->inherits_from == parent) {
4e4bf5c4
KW
1849 BdrvChild *c;
1850
1851 /* Remove inherits_from only when the last reference between parent and
1852 * child->bs goes away. */
1853 QLIST_FOREACH(c, &parent->children, next) {
1854 if (c != child && c->bs == child->bs) {
1855 break;
1856 }
1857 }
1858 if (c == NULL) {
1859 child->bs->inherits_from = NULL;
1860 }
33a60407
KW
1861 }
1862
f21d96d0 1863 bdrv_root_unref_child(child);
33a60407
KW
1864}
1865
5c8cab48
KW
1866
1867static void bdrv_parent_cb_change_media(BlockDriverState *bs, bool load)
1868{
1869 BdrvChild *c;
1870 QLIST_FOREACH(c, &bs->parents, next_parent) {
1871 if (c->role->change_media) {
1872 c->role->change_media(c, load);
1873 }
1874 }
1875}
1876
1877static void bdrv_parent_cb_resize(BlockDriverState *bs)
1878{
1879 BdrvChild *c;
1880 QLIST_FOREACH(c, &bs->parents, next_parent) {
1881 if (c->role->resize) {
1882 c->role->resize(c);
1883 }
1884 }
1885}
1886
5db15a57
KW
1887/*
1888 * Sets the backing file link of a BDS. A new reference is created; callers
1889 * which don't need their own reference any more must call bdrv_unref().
1890 */
12fa4af6
KW
1891void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd,
1892 Error **errp)
8d24cce1 1893{
5db15a57
KW
1894 if (backing_hd) {
1895 bdrv_ref(backing_hd);
1896 }
8d24cce1 1897
760e0063 1898 if (bs->backing) {
5db15a57 1899 bdrv_unref_child(bs, bs->backing);
826b6ca0
FZ
1900 }
1901
8d24cce1 1902 if (!backing_hd) {
760e0063 1903 bs->backing = NULL;
8d24cce1
FZ
1904 goto out;
1905 }
12fa4af6 1906
8b2ff529 1907 bs->backing = bdrv_attach_child(bs, backing_hd, "backing", &child_backing,
12fa4af6
KW
1908 errp);
1909 if (!bs->backing) {
1910 bdrv_unref(backing_hd);
1911 }
826b6ca0 1912
8d24cce1 1913out:
3baca891 1914 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
1915}
1916
31ca6d07
KW
1917/*
1918 * Opens the backing file for a BlockDriverState if not yet open
1919 *
d9b7b057
KW
1920 * bdref_key specifies the key for the image's BlockdevRef in the options QDict.
1921 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1922 * itself, all options starting with "${bdref_key}." are considered part of the
1923 * BlockdevRef.
1924 *
1925 * TODO Can this be unified with bdrv_open_image()?
31ca6d07 1926 */
d9b7b057
KW
1927int bdrv_open_backing_file(BlockDriverState *bs, QDict *parent_options,
1928 const char *bdref_key, Error **errp)
9156df12 1929{
1ba4b6a5 1930 char *backing_filename = g_malloc0(PATH_MAX);
d9b7b057
KW
1931 char *bdref_key_dot;
1932 const char *reference = NULL;
317fc44e 1933 int ret = 0;
8d24cce1 1934 BlockDriverState *backing_hd;
d9b7b057
KW
1935 QDict *options;
1936 QDict *tmp_parent_options = NULL;
34b5d2c6 1937 Error *local_err = NULL;
9156df12 1938
760e0063 1939 if (bs->backing != NULL) {
1ba4b6a5 1940 goto free_exit;
9156df12
PB
1941 }
1942
31ca6d07 1943 /* NULL means an empty set of options */
d9b7b057
KW
1944 if (parent_options == NULL) {
1945 tmp_parent_options = qdict_new();
1946 parent_options = tmp_parent_options;
31ca6d07
KW
1947 }
1948
9156df12 1949 bs->open_flags &= ~BDRV_O_NO_BACKING;
d9b7b057
KW
1950
1951 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1952 qdict_extract_subqdict(parent_options, &options, bdref_key_dot);
1953 g_free(bdref_key_dot);
1954
1955 reference = qdict_get_try_str(parent_options, bdref_key);
1956 if (reference || qdict_haskey(options, "file.filename")) {
1cb6f506
KW
1957 backing_filename[0] = '\0';
1958 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 1959 QDECREF(options);
1ba4b6a5 1960 goto free_exit;
dbecebdd 1961 } else {
9f07429e
HR
1962 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
1963 &local_err);
1964 if (local_err) {
1965 ret = -EINVAL;
1966 error_propagate(errp, local_err);
1967 QDECREF(options);
1968 goto free_exit;
1969 }
9156df12
PB
1970 }
1971
8ee79e70
KW
1972 if (!bs->drv || !bs->drv->supports_backing) {
1973 ret = -EINVAL;
1974 error_setg(errp, "Driver doesn't support backing files");
1975 QDECREF(options);
1976 goto free_exit;
1977 }
1978
c5f6e493
KW
1979 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
1980 qdict_put(options, "driver", qstring_from_str(bs->backing_format));
9156df12
PB
1981 }
1982
5b363937
HR
1983 backing_hd = bdrv_open_inherit(*backing_filename ? backing_filename : NULL,
1984 reference, options, 0, bs, &child_backing,
1985 errp);
1986 if (!backing_hd) {
9156df12 1987 bs->open_flags |= BDRV_O_NO_BACKING;
e43bfd9c 1988 error_prepend(errp, "Could not open backing file: ");
5b363937 1989 ret = -EINVAL;
1ba4b6a5 1990 goto free_exit;
9156df12 1991 }
df581792 1992
5db15a57
KW
1993 /* Hook up the backing file link; drop our reference, bs owns the
1994 * backing_hd reference now */
12fa4af6 1995 bdrv_set_backing_hd(bs, backing_hd, &local_err);
5db15a57 1996 bdrv_unref(backing_hd);
12fa4af6
KW
1997 if (local_err) {
1998 ret = -EINVAL;
1999 goto free_exit;
2000 }
d80ac658 2001
d9b7b057
KW
2002 qdict_del(parent_options, bdref_key);
2003
1ba4b6a5
BC
2004free_exit:
2005 g_free(backing_filename);
d9b7b057 2006 QDECREF(tmp_parent_options);
1ba4b6a5 2007 return ret;
9156df12
PB
2008}
2009
2d6b86af
KW
2010static BlockDriverState *
2011bdrv_open_child_bs(const char *filename, QDict *options, const char *bdref_key,
2012 BlockDriverState *parent, const BdrvChildRole *child_role,
2013 bool allow_none, Error **errp)
da557aac 2014{
2d6b86af 2015 BlockDriverState *bs = NULL;
da557aac 2016 QDict *image_options;
da557aac
HR
2017 char *bdref_key_dot;
2018 const char *reference;
2019
df581792 2020 assert(child_role != NULL);
f67503e5 2021
da557aac
HR
2022 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
2023 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
2024 g_free(bdref_key_dot);
2025
2026 reference = qdict_get_try_str(options, bdref_key);
2027 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 2028 if (!allow_none) {
da557aac
HR
2029 error_setg(errp, "A block device must be specified for \"%s\"",
2030 bdref_key);
da557aac 2031 }
b20e61e0 2032 QDECREF(image_options);
da557aac
HR
2033 goto done;
2034 }
2035
5b363937
HR
2036 bs = bdrv_open_inherit(filename, reference, image_options, 0,
2037 parent, child_role, errp);
2038 if (!bs) {
df581792
KW
2039 goto done;
2040 }
2041
da557aac
HR
2042done:
2043 qdict_del(options, bdref_key);
2d6b86af
KW
2044 return bs;
2045}
2046
2047/*
2048 * Opens a disk image whose options are given as BlockdevRef in another block
2049 * device's options.
2050 *
2051 * If allow_none is true, no image will be opened if filename is false and no
2052 * BlockdevRef is given. NULL will be returned, but errp remains unset.
2053 *
2054 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
2055 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
2056 * itself, all options starting with "${bdref_key}." are considered part of the
2057 * BlockdevRef.
2058 *
2059 * The BlockdevRef will be removed from the options QDict.
2060 */
2061BdrvChild *bdrv_open_child(const char *filename,
2062 QDict *options, const char *bdref_key,
2063 BlockDriverState *parent,
2064 const BdrvChildRole *child_role,
2065 bool allow_none, Error **errp)
2066{
8b2ff529 2067 BdrvChild *c;
2d6b86af
KW
2068 BlockDriverState *bs;
2069
2070 bs = bdrv_open_child_bs(filename, options, bdref_key, parent, child_role,
2071 allow_none, errp);
2072 if (bs == NULL) {
2073 return NULL;
2074 }
2075
8b2ff529
KW
2076 c = bdrv_attach_child(parent, bs, bdref_key, child_role, errp);
2077 if (!c) {
2078 bdrv_unref(bs);
2079 return NULL;
2080 }
2081
2082 return c;
b4b059f6
KW
2083}
2084
66836189
HR
2085static BlockDriverState *bdrv_append_temp_snapshot(BlockDriverState *bs,
2086 int flags,
2087 QDict *snapshot_options,
2088 Error **errp)
b998875d
KW
2089{
2090 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 2091 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 2092 int64_t total_size;
83d0521a 2093 QemuOpts *opts = NULL;
b998875d 2094 BlockDriverState *bs_snapshot;
b2c2832c 2095 Error *local_err = NULL;
b998875d
KW
2096 int ret;
2097
2098 /* if snapshot, we create a temporary backing file and open it
2099 instead of opening 'filename' directly */
2100
2101 /* Get the required size from the image */
f187743a
KW
2102 total_size = bdrv_getlength(bs);
2103 if (total_size < 0) {
2104 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 2105 goto out;
f187743a 2106 }
b998875d
KW
2107
2108 /* Create the temporary image */
1ba4b6a5 2109 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
2110 if (ret < 0) {
2111 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 2112 goto out;
b998875d
KW
2113 }
2114
ef810437 2115 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 2116 &error_abort);
39101f25 2117 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
e43bfd9c 2118 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, errp);
83d0521a 2119 qemu_opts_del(opts);
b998875d 2120 if (ret < 0) {
e43bfd9c
MA
2121 error_prepend(errp, "Could not create temporary overlay '%s': ",
2122 tmp_filename);
1ba4b6a5 2123 goto out;
b998875d
KW
2124 }
2125
73176bee 2126 /* Prepare options QDict for the temporary file */
b998875d
KW
2127 qdict_put(snapshot_options, "file.driver",
2128 qstring_from_str("file"));
2129 qdict_put(snapshot_options, "file.filename",
2130 qstring_from_str(tmp_filename));
e6641719
HR
2131 qdict_put(snapshot_options, "driver",
2132 qstring_from_str("qcow2"));
b998875d 2133
5b363937 2134 bs_snapshot = bdrv_open(NULL, NULL, snapshot_options, flags, errp);
73176bee 2135 snapshot_options = NULL;
5b363937
HR
2136 if (!bs_snapshot) {
2137 ret = -EINVAL;
1ba4b6a5 2138 goto out;
b998875d
KW
2139 }
2140
66836189
HR
2141 /* bdrv_append() consumes a strong reference to bs_snapshot (i.e. it will
2142 * call bdrv_unref() on it), so in order to be able to return one, we have
2143 * to increase bs_snapshot's refcount here */
2144 bdrv_ref(bs_snapshot);
b2c2832c
KW
2145 bdrv_append(bs_snapshot, bs, &local_err);
2146 if (local_err) {
2147 error_propagate(errp, local_err);
2148 ret = -EINVAL;
2149 goto out;
2150 }
1ba4b6a5 2151
66836189
HR
2152 g_free(tmp_filename);
2153 return bs_snapshot;
2154
1ba4b6a5 2155out:
73176bee 2156 QDECREF(snapshot_options);
1ba4b6a5 2157 g_free(tmp_filename);
66836189 2158 return NULL;
b998875d
KW
2159}
2160
b6ce07aa
KW
2161/*
2162 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
2163 *
2164 * options is a QDict of options to pass to the block drivers, or NULL for an
2165 * empty set of options. The reference to the QDict belongs to the block layer
2166 * after the call (even on failure), so if the caller intends to reuse the
2167 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
2168 *
2169 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
2170 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
2171 *
2172 * The reference parameter may be used to specify an existing block device which
2173 * should be opened. If specified, neither options nor a filename may be given,
2174 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 2175 */
5b363937
HR
2176static BlockDriverState *bdrv_open_inherit(const char *filename,
2177 const char *reference,
2178 QDict *options, int flags,
2179 BlockDriverState *parent,
2180 const BdrvChildRole *child_role,
2181 Error **errp)
ea2384d3 2182{
b6ce07aa 2183 int ret;
5696c6e3 2184 BlockBackend *file = NULL;
9a4f4c31 2185 BlockDriverState *bs;
ce343771 2186 BlockDriver *drv = NULL;
74fe54f2 2187 const char *drvname;
3e8c2e57 2188 const char *backing;
34b5d2c6 2189 Error *local_err = NULL;
73176bee 2190 QDict *snapshot_options = NULL;
b1e6fc08 2191 int snapshot_flags = 0;
712e7874 2192
f3930ed0
KW
2193 assert(!child_role || !flags);
2194 assert(!child_role == !parent);
f67503e5 2195
ddf5636d
HR
2196 if (reference) {
2197 bool options_non_empty = options ? qdict_size(options) : false;
2198 QDECREF(options);
2199
ddf5636d
HR
2200 if (filename || options_non_empty) {
2201 error_setg(errp, "Cannot reference an existing block device with "
2202 "additional options or a new filename");
5b363937 2203 return NULL;
ddf5636d
HR
2204 }
2205
2206 bs = bdrv_lookup_bs(reference, reference, errp);
2207 if (!bs) {
5b363937 2208 return NULL;
ddf5636d 2209 }
76b22320 2210
ddf5636d 2211 bdrv_ref(bs);
5b363937 2212 return bs;
ddf5636d
HR
2213 }
2214
5b363937 2215 bs = bdrv_new();
f67503e5 2216
de9c0cec
KW
2217 /* NULL means an empty set of options */
2218 if (options == NULL) {
2219 options = qdict_new();
2220 }
2221
145f598e 2222 /* json: syntax counts as explicit options, as if in the QDict */
de3b53f0
KW
2223 parse_json_protocol(options, &filename, &local_err);
2224 if (local_err) {
de3b53f0
KW
2225 goto fail;
2226 }
2227
145f598e
KW
2228 bs->explicit_options = qdict_clone_shallow(options);
2229
f3930ed0 2230 if (child_role) {
bddcec37 2231 bs->inherits_from = parent;
8e2160e2
KW
2232 child_role->inherit_options(&flags, options,
2233 parent->open_flags, parent->options);
f3930ed0
KW
2234 }
2235
de3b53f0 2236 ret = bdrv_fill_options(&options, filename, &flags, &local_err);
462f5bcf
KW
2237 if (local_err) {
2238 goto fail;
2239 }
2240
f87a0e29
AG
2241 /* Set the BDRV_O_RDWR and BDRV_O_ALLOW_RDWR flags.
2242 * FIXME: we're parsing the QDict to avoid having to create a
2243 * QemuOpts just for this, but neither option is optimal. */
2244 if (g_strcmp0(qdict_get_try_str(options, BDRV_OPT_READ_ONLY), "on") &&
2245 !qdict_get_try_bool(options, BDRV_OPT_READ_ONLY, false)) {
2246 flags |= (BDRV_O_RDWR | BDRV_O_ALLOW_RDWR);
2247 } else {
2248 flags &= ~BDRV_O_RDWR;
14499ea5
AG
2249 }
2250
2251 if (flags & BDRV_O_SNAPSHOT) {
2252 snapshot_options = qdict_new();
2253 bdrv_temp_snapshot_options(&snapshot_flags, snapshot_options,
2254 flags, options);
f87a0e29
AG
2255 /* Let bdrv_backing_options() override "read-only" */
2256 qdict_del(options, BDRV_OPT_READ_ONLY);
14499ea5
AG
2257 bdrv_backing_options(&flags, options, flags, options);
2258 }
2259
62392ebb
KW
2260 bs->open_flags = flags;
2261 bs->options = options;
2262 options = qdict_clone_shallow(options);
2263
76c591b0 2264 /* Find the right image format driver */
76c591b0
KW
2265 drvname = qdict_get_try_str(options, "driver");
2266 if (drvname) {
2267 drv = bdrv_find_format(drvname);
76c591b0
KW
2268 if (!drv) {
2269 error_setg(errp, "Unknown driver: '%s'", drvname);
76c591b0
KW
2270 goto fail;
2271 }
2272 }
2273
2274 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 2275
3e8c2e57
AG
2276 backing = qdict_get_try_str(options, "backing");
2277 if (backing && *backing == '\0') {
2278 flags |= BDRV_O_NO_BACKING;
2279 qdict_del(options, "backing");
2280 }
2281
5696c6e3 2282 /* Open image file without format layer. This BlockBackend is only used for
4e4bf5c4
KW
2283 * probing, the block drivers will do their own bdrv_open_child() for the
2284 * same BDS, which is why we put the node name back into options. */
f4788adc 2285 if ((flags & BDRV_O_PROTOCOL) == 0) {
5696c6e3
KW
2286 BlockDriverState *file_bs;
2287
2288 file_bs = bdrv_open_child_bs(filename, options, "file", bs,
2289 &child_file, true, &local_err);
1fdd6933 2290 if (local_err) {
f4788adc
KW
2291 goto fail;
2292 }
5696c6e3 2293 if (file_bs != NULL) {
6d0eb64d 2294 file = blk_new(BLK_PERM_CONSISTENT_READ, BLK_PERM_ALL);
d7086422 2295 blk_insert_bs(file, file_bs, &local_err);
5696c6e3 2296 bdrv_unref(file_bs);
d7086422
KW
2297 if (local_err) {
2298 goto fail;
2299 }
5696c6e3 2300
4e4bf5c4 2301 qdict_put(options, "file",
5696c6e3 2302 qstring_from_str(bdrv_get_node_name(file_bs)));
4e4bf5c4 2303 }
f500a6d3
KW
2304 }
2305
76c591b0 2306 /* Image format probing */
38f3ef57 2307 bs->probed = !drv;
76c591b0 2308 if (!drv && file) {
cf2ab8fc 2309 ret = find_image_format(file, filename, &drv, &local_err);
17b005f1 2310 if (ret < 0) {
8bfea15d 2311 goto fail;
2a05cbe4 2312 }
62392ebb
KW
2313 /*
2314 * This option update would logically belong in bdrv_fill_options(),
2315 * but we first need to open bs->file for the probing to work, while
2316 * opening bs->file already requires the (mostly) final set of options
2317 * so that cache mode etc. can be inherited.
2318 *
2319 * Adding the driver later is somewhat ugly, but it's not an option
2320 * that would ever be inherited, so it's correct. We just need to make
2321 * sure to update both bs->options (which has the full effective
2322 * options for bs) and options (which has file.* already removed).
2323 */
2324 qdict_put(bs->options, "driver", qstring_from_str(drv->format_name));
2325 qdict_put(options, "driver", qstring_from_str(drv->format_name));
76c591b0 2326 } else if (!drv) {
17b005f1 2327 error_setg(errp, "Must specify either driver or file");
8bfea15d 2328 goto fail;
ea2384d3 2329 }
b6ce07aa 2330
53a29513
HR
2331 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
2332 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
2333 /* file must be NULL if a protocol BDS is about to be created
2334 * (the inverse results in an error message from bdrv_open_common()) */
2335 assert(!(flags & BDRV_O_PROTOCOL) || !file);
2336
b6ce07aa 2337 /* Open the image */
82dc8b41 2338 ret = bdrv_open_common(bs, file, options, &local_err);
b6ce07aa 2339 if (ret < 0) {
8bfea15d 2340 goto fail;
6987307c
CH
2341 }
2342
4e4bf5c4 2343 if (file) {
5696c6e3 2344 blk_unref(file);
f500a6d3
KW
2345 file = NULL;
2346 }
2347
b6ce07aa 2348 /* If there is a backing file, use it */
9156df12 2349 if ((flags & BDRV_O_NO_BACKING) == 0) {
d9b7b057 2350 ret = bdrv_open_backing_file(bs, options, "backing", &local_err);
b6ce07aa 2351 if (ret < 0) {
b6ad491a 2352 goto close_and_fail;
b6ce07aa 2353 }
b6ce07aa
KW
2354 }
2355
91af7014
HR
2356 bdrv_refresh_filename(bs);
2357
b6ad491a 2358 /* Check if any unknown options were used */
7ad2757f 2359 if (qdict_size(options) != 0) {
b6ad491a 2360 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
2361 if (flags & BDRV_O_PROTOCOL) {
2362 error_setg(errp, "Block protocol '%s' doesn't support the option "
2363 "'%s'", drv->format_name, entry->key);
2364 } else {
d0e46a55
HR
2365 error_setg(errp,
2366 "Block format '%s' does not support the option '%s'",
2367 drv->format_name, entry->key);
5acd9d81 2368 }
b6ad491a 2369
b6ad491a
KW
2370 goto close_and_fail;
2371 }
b6ad491a 2372
b6ce07aa 2373 if (!bdrv_key_required(bs)) {
5c8cab48 2374 bdrv_parent_cb_change_media(bs, true);
c3adb58f
MA
2375 } else if (!runstate_check(RUN_STATE_PRELAUNCH)
2376 && !runstate_check(RUN_STATE_INMIGRATE)
2377 && !runstate_check(RUN_STATE_PAUSED)) { /* HACK */
2378 error_setg(errp,
2379 "Guest must be stopped for opening of encrypted image");
c3adb58f 2380 goto close_and_fail;
b6ce07aa
KW
2381 }
2382
c3adb58f 2383 QDECREF(options);
dd62f1ca
KW
2384
2385 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
2386 * temporary snapshot afterwards. */
2387 if (snapshot_flags) {
66836189
HR
2388 BlockDriverState *snapshot_bs;
2389 snapshot_bs = bdrv_append_temp_snapshot(bs, snapshot_flags,
2390 snapshot_options, &local_err);
73176bee 2391 snapshot_options = NULL;
dd62f1ca
KW
2392 if (local_err) {
2393 goto close_and_fail;
2394 }
5b363937
HR
2395 /* We are not going to return bs but the overlay on top of it
2396 * (snapshot_bs); thus, we have to drop the strong reference to bs
2397 * (which we obtained by calling bdrv_new()). bs will not be deleted,
2398 * though, because the overlay still has a reference to it. */
2399 bdrv_unref(bs);
2400 bs = snapshot_bs;
dd62f1ca
KW
2401 }
2402
5b363937 2403 return bs;
b6ce07aa 2404
8bfea15d 2405fail:
5696c6e3 2406 blk_unref(file);
4e4bf5c4
KW
2407 if (bs->file != NULL) {
2408 bdrv_unref_child(bs, bs->file);
f500a6d3 2409 }
73176bee 2410 QDECREF(snapshot_options);
145f598e 2411 QDECREF(bs->explicit_options);
de9c0cec 2412 QDECREF(bs->options);
b6ad491a 2413 QDECREF(options);
de9c0cec 2414 bs->options = NULL;
5b363937 2415 bdrv_unref(bs);
621ff94d 2416 error_propagate(errp, local_err);
5b363937 2417 return NULL;
de9c0cec 2418
b6ad491a 2419close_and_fail:
5b363937 2420 bdrv_unref(bs);
73176bee 2421 QDECREF(snapshot_options);
b6ad491a 2422 QDECREF(options);
621ff94d 2423 error_propagate(errp, local_err);
5b363937 2424 return NULL;
b6ce07aa
KW
2425}
2426
5b363937
HR
2427BlockDriverState *bdrv_open(const char *filename, const char *reference,
2428 QDict *options, int flags, Error **errp)
f3930ed0 2429{
5b363937 2430 return bdrv_open_inherit(filename, reference, options, flags, NULL,
ce343771 2431 NULL, errp);
f3930ed0
KW
2432}
2433
e971aa12
JC
2434typedef struct BlockReopenQueueEntry {
2435 bool prepared;
2436 BDRVReopenState state;
2437 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
2438} BlockReopenQueueEntry;
2439
2440/*
2441 * Adds a BlockDriverState to a simple queue for an atomic, transactional
2442 * reopen of multiple devices.
2443 *
2444 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
2445 * already performed, or alternatively may be NULL a new BlockReopenQueue will
2446 * be created and initialized. This newly created BlockReopenQueue should be
2447 * passed back in for subsequent calls that are intended to be of the same
2448 * atomic 'set'.
2449 *
2450 * bs is the BlockDriverState to add to the reopen queue.
2451 *
4d2cb092
KW
2452 * options contains the changed options for the associated bs
2453 * (the BlockReopenQueue takes ownership)
2454 *
e971aa12
JC
2455 * flags contains the open flags for the associated bs
2456 *
2457 * returns a pointer to bs_queue, which is either the newly allocated
2458 * bs_queue, or the existing bs_queue being used.
2459 *
2460 */
28518102
KW
2461static BlockReopenQueue *bdrv_reopen_queue_child(BlockReopenQueue *bs_queue,
2462 BlockDriverState *bs,
2463 QDict *options,
2464 int flags,
2465 const BdrvChildRole *role,
2466 QDict *parent_options,
2467 int parent_flags)
e971aa12
JC
2468{
2469 assert(bs != NULL);
2470
2471 BlockReopenQueueEntry *bs_entry;
67251a31 2472 BdrvChild *child;
145f598e 2473 QDict *old_options, *explicit_options;
67251a31 2474
e971aa12
JC
2475 if (bs_queue == NULL) {
2476 bs_queue = g_new0(BlockReopenQueue, 1);
2477 QSIMPLEQ_INIT(bs_queue);
2478 }
2479
4d2cb092
KW
2480 if (!options) {
2481 options = qdict_new();
2482 }
2483
5b7ba05f
AG
2484 /* Check if this BlockDriverState is already in the queue */
2485 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
2486 if (bs == bs_entry->state.bs) {
2487 break;
2488 }
2489 }
2490
28518102
KW
2491 /*
2492 * Precedence of options:
2493 * 1. Explicitly passed in options (highest)
91a097e7 2494 * 2. Set in flags (only for top level)
145f598e 2495 * 3. Retained from explicitly set options of bs
8e2160e2 2496 * 4. Inherited from parent node
28518102
KW
2497 * 5. Retained from effective options of bs
2498 */
2499
91a097e7
KW
2500 if (!parent_options) {
2501 /*
2502 * Any setting represented by flags is always updated. If the
2503 * corresponding QDict option is set, it takes precedence. Otherwise
2504 * the flag is translated into a QDict option. The old setting of bs is
2505 * not considered.
2506 */
2507 update_options_from_flags(options, flags);
2508 }
2509
145f598e 2510 /* Old explicitly set values (don't overwrite by inherited value) */
5b7ba05f
AG
2511 if (bs_entry) {
2512 old_options = qdict_clone_shallow(bs_entry->state.explicit_options);
2513 } else {
2514 old_options = qdict_clone_shallow(bs->explicit_options);
2515 }
145f598e
KW
2516 bdrv_join_options(bs, options, old_options);
2517 QDECREF(old_options);
2518
2519 explicit_options = qdict_clone_shallow(options);
2520
28518102
KW
2521 /* Inherit from parent node */
2522 if (parent_options) {
2523 assert(!flags);
8e2160e2 2524 role->inherit_options(&flags, options, parent_flags, parent_options);
28518102
KW
2525 }
2526
2527 /* Old values are used for options that aren't set yet */
4d2cb092 2528 old_options = qdict_clone_shallow(bs->options);
cddff5ba 2529 bdrv_join_options(bs, options, old_options);
4d2cb092
KW
2530 QDECREF(old_options);
2531
f1f25a2e
KW
2532 /* bdrv_open() masks this flag out */
2533 flags &= ~BDRV_O_PROTOCOL;
2534
67251a31 2535 QLIST_FOREACH(child, &bs->children, next) {
4c9dfe5d
KW
2536 QDict *new_child_options;
2537 char *child_key_dot;
67251a31 2538
4c9dfe5d
KW
2539 /* reopen can only change the options of block devices that were
2540 * implicitly created and inherited options. For other (referenced)
2541 * block devices, a syntax like "backing.foo" results in an error. */
67251a31
KW
2542 if (child->bs->inherits_from != bs) {
2543 continue;
2544 }
2545
4c9dfe5d
KW
2546 child_key_dot = g_strdup_printf("%s.", child->name);
2547 qdict_extract_subqdict(options, &new_child_options, child_key_dot);
2548 g_free(child_key_dot);
2549
28518102
KW
2550 bdrv_reopen_queue_child(bs_queue, child->bs, new_child_options, 0,
2551 child->role, options, flags);
e971aa12
JC
2552 }
2553
5b7ba05f
AG
2554 if (!bs_entry) {
2555 bs_entry = g_new0(BlockReopenQueueEntry, 1);
2556 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
2557 } else {
2558 QDECREF(bs_entry->state.options);
2559 QDECREF(bs_entry->state.explicit_options);
2560 }
e971aa12
JC
2561
2562 bs_entry->state.bs = bs;
4d2cb092 2563 bs_entry->state.options = options;
145f598e 2564 bs_entry->state.explicit_options = explicit_options;
e971aa12
JC
2565 bs_entry->state.flags = flags;
2566
2567 return bs_queue;
2568}
2569
28518102
KW
2570BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
2571 BlockDriverState *bs,
2572 QDict *options, int flags)
2573{
2574 return bdrv_reopen_queue_child(bs_queue, bs, options, flags,
2575 NULL, NULL, 0);
2576}
2577
e971aa12
JC
2578/*
2579 * Reopen multiple BlockDriverStates atomically & transactionally.
2580 *
2581 * The queue passed in (bs_queue) must have been built up previous
2582 * via bdrv_reopen_queue().
2583 *
2584 * Reopens all BDS specified in the queue, with the appropriate
2585 * flags. All devices are prepared for reopen, and failure of any
2586 * device will cause all device changes to be abandonded, and intermediate
2587 * data cleaned up.
2588 *
2589 * If all devices prepare successfully, then the changes are committed
2590 * to all devices.
2591 *
2592 */
720150f3 2593int bdrv_reopen_multiple(AioContext *ctx, BlockReopenQueue *bs_queue, Error **errp)
e971aa12
JC
2594{
2595 int ret = -1;
2596 BlockReopenQueueEntry *bs_entry, *next;
2597 Error *local_err = NULL;
2598
2599 assert(bs_queue != NULL);
2600
c9d1a561 2601 aio_context_release(ctx);
40840e41 2602 bdrv_drain_all_begin();
c9d1a561 2603 aio_context_acquire(ctx);
e971aa12
JC
2604
2605 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
2606 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
2607 error_propagate(errp, local_err);
2608 goto cleanup;
2609 }
2610 bs_entry->prepared = true;
2611 }
2612
2613 /* If we reach this point, we have success and just need to apply the
2614 * changes
2615 */
2616 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
2617 bdrv_reopen_commit(&bs_entry->state);
2618 }
2619
2620 ret = 0;
2621
2622cleanup:
2623 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
2624 if (ret && bs_entry->prepared) {
2625 bdrv_reopen_abort(&bs_entry->state);
145f598e
KW
2626 } else if (ret) {
2627 QDECREF(bs_entry->state.explicit_options);
e971aa12 2628 }
4d2cb092 2629 QDECREF(bs_entry->state.options);
e971aa12
JC
2630 g_free(bs_entry);
2631 }
2632 g_free(bs_queue);
40840e41
AG
2633
2634 bdrv_drain_all_end();
2635
e971aa12
JC
2636 return ret;
2637}
2638
2639
2640/* Reopen a single BlockDriverState with the specified flags. */
2641int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
2642{
2643 int ret = -1;
2644 Error *local_err = NULL;
4d2cb092 2645 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12 2646
720150f3 2647 ret = bdrv_reopen_multiple(bdrv_get_aio_context(bs), queue, &local_err);
e971aa12
JC
2648 if (local_err != NULL) {
2649 error_propagate(errp, local_err);
2650 }
2651 return ret;
2652}
2653
2654
2655/*
2656 * Prepares a BlockDriverState for reopen. All changes are staged in the
2657 * 'opaque' field of the BDRVReopenState, which is used and allocated by
2658 * the block driver layer .bdrv_reopen_prepare()
2659 *
2660 * bs is the BlockDriverState to reopen
2661 * flags are the new open flags
2662 * queue is the reopen queue
2663 *
2664 * Returns 0 on success, non-zero on error. On error errp will be set
2665 * as well.
2666 *
2667 * On failure, bdrv_reopen_abort() will be called to clean up any data.
2668 * It is the responsibility of the caller to then call the abort() or
2669 * commit() for any other BDS that have been left in a prepare() state
2670 *
2671 */
2672int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
2673 Error **errp)
2674{
2675 int ret = -1;
2676 Error *local_err = NULL;
2677 BlockDriver *drv;
ccf9dc07
KW
2678 QemuOpts *opts;
2679 const char *value;
e971aa12
JC
2680
2681 assert(reopen_state != NULL);
2682 assert(reopen_state->bs->drv != NULL);
2683 drv = reopen_state->bs->drv;
2684
ccf9dc07
KW
2685 /* Process generic block layer options */
2686 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
2687 qemu_opts_absorb_qdict(opts, reopen_state->options, &local_err);
2688 if (local_err) {
2689 error_propagate(errp, local_err);
2690 ret = -EINVAL;
2691 goto error;
2692 }
2693
91a097e7
KW
2694 update_flags_from_options(&reopen_state->flags, opts);
2695
ccf9dc07
KW
2696 /* node-name and driver must be unchanged. Put them back into the QDict, so
2697 * that they are checked at the end of this function. */
2698 value = qemu_opt_get(opts, "node-name");
2699 if (value) {
2700 qdict_put(reopen_state->options, "node-name", qstring_from_str(value));
2701 }
2702
2703 value = qemu_opt_get(opts, "driver");
2704 if (value) {
2705 qdict_put(reopen_state->options, "driver", qstring_from_str(value));
2706 }
2707
e971aa12
JC
2708 /* if we are to stay read-only, do not allow permission change
2709 * to r/w */
2710 if (!(reopen_state->bs->open_flags & BDRV_O_ALLOW_RDWR) &&
2711 reopen_state->flags & BDRV_O_RDWR) {
81e5f78a
AG
2712 error_setg(errp, "Node '%s' is read only",
2713 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
2714 goto error;
2715 }
2716
2717
2718 ret = bdrv_flush(reopen_state->bs);
2719 if (ret) {
455b0fde 2720 error_setg_errno(errp, -ret, "Error flushing drive");
e971aa12
JC
2721 goto error;
2722 }
2723
2724 if (drv->bdrv_reopen_prepare) {
2725 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
2726 if (ret) {
2727 if (local_err != NULL) {
2728 error_propagate(errp, local_err);
2729 } else {
d8b6895f
LC
2730 error_setg(errp, "failed while preparing to reopen image '%s'",
2731 reopen_state->bs->filename);
e971aa12
JC
2732 }
2733 goto error;
2734 }
2735 } else {
2736 /* It is currently mandatory to have a bdrv_reopen_prepare()
2737 * handler for each supported drv. */
81e5f78a
AG
2738 error_setg(errp, "Block format '%s' used by node '%s' "
2739 "does not support reopening files", drv->format_name,
2740 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
2741 ret = -1;
2742 goto error;
2743 }
2744
4d2cb092
KW
2745 /* Options that are not handled are only okay if they are unchanged
2746 * compared to the old state. It is expected that some options are only
2747 * used for the initial open, but not reopen (e.g. filename) */
2748 if (qdict_size(reopen_state->options)) {
2749 const QDictEntry *entry = qdict_first(reopen_state->options);
2750
2751 do {
2752 QString *new_obj = qobject_to_qstring(entry->value);
2753 const char *new = qstring_get_str(new_obj);
2754 const char *old = qdict_get_try_str(reopen_state->bs->options,
2755 entry->key);
2756
2757 if (!old || strcmp(new, old)) {
2758 error_setg(errp, "Cannot change the option '%s'", entry->key);
2759 ret = -EINVAL;
2760 goto error;
2761 }
2762 } while ((entry = qdict_next(reopen_state->options, entry)));
2763 }
2764
e971aa12
JC
2765 ret = 0;
2766
2767error:
ccf9dc07 2768 qemu_opts_del(opts);
e971aa12
JC
2769 return ret;
2770}
2771
2772/*
2773 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
2774 * makes them final by swapping the staging BlockDriverState contents into
2775 * the active BlockDriverState contents.
2776 */
2777void bdrv_reopen_commit(BDRVReopenState *reopen_state)
2778{
2779 BlockDriver *drv;
2780
2781 assert(reopen_state != NULL);
2782 drv = reopen_state->bs->drv;
2783 assert(drv != NULL);
2784
2785 /* If there are any driver level actions to take */
2786 if (drv->bdrv_reopen_commit) {
2787 drv->bdrv_reopen_commit(reopen_state);
2788 }
2789
2790 /* set BDS specific flags now */
145f598e
KW
2791 QDECREF(reopen_state->bs->explicit_options);
2792
2793 reopen_state->bs->explicit_options = reopen_state->explicit_options;
e971aa12 2794 reopen_state->bs->open_flags = reopen_state->flags;
e971aa12 2795 reopen_state->bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 2796
3baca891 2797 bdrv_refresh_limits(reopen_state->bs, NULL);
e971aa12
JC
2798}
2799
2800/*
2801 * Abort the reopen, and delete and free the staged changes in
2802 * reopen_state
2803 */
2804void bdrv_reopen_abort(BDRVReopenState *reopen_state)
2805{
2806 BlockDriver *drv;
2807
2808 assert(reopen_state != NULL);
2809 drv = reopen_state->bs->drv;
2810 assert(drv != NULL);
2811
2812 if (drv->bdrv_reopen_abort) {
2813 drv->bdrv_reopen_abort(reopen_state);
2814 }
145f598e
KW
2815
2816 QDECREF(reopen_state->explicit_options);
e971aa12
JC
2817}
2818
2819
64dff520 2820static void bdrv_close(BlockDriverState *bs)
fc01f7e7 2821{
33384421
HR
2822 BdrvAioNotifier *ban, *ban_next;
2823
ca9bd24c 2824 assert(!bs->job);
30f55fb8 2825 assert(!bs->refcnt);
99b7e775 2826
fc27291d 2827 bdrv_drained_begin(bs); /* complete I/O */
58fda173 2828 bdrv_flush(bs);
53ec73e2 2829 bdrv_drain(bs); /* in case flush left pending I/O */
fc27291d 2830
c5acdc9a
HR
2831 bdrv_release_named_dirty_bitmaps(bs);
2832 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
2833
3cbc002c 2834 if (bs->drv) {
6e93e7c4
KW
2835 BdrvChild *child, *next;
2836
9a7dedbc 2837 bs->drv->bdrv_close(bs);
9a4f4c31 2838 bs->drv = NULL;
9a7dedbc 2839
12fa4af6 2840 bdrv_set_backing_hd(bs, NULL, &error_abort);
9a7dedbc 2841
9a4f4c31
KW
2842 if (bs->file != NULL) {
2843 bdrv_unref_child(bs, bs->file);
2844 bs->file = NULL;
2845 }
2846
6e93e7c4 2847 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
2848 /* TODO Remove bdrv_unref() from drivers' close function and use
2849 * bdrv_unref_child() here */
bddcec37
KW
2850 if (child->bs->inherits_from == bs) {
2851 child->bs->inherits_from = NULL;
2852 }
33a60407 2853 bdrv_detach_child(child);
6e93e7c4
KW
2854 }
2855
7267c094 2856 g_free(bs->opaque);
ea2384d3 2857 bs->opaque = NULL;
53fec9d3 2858 bs->copy_on_read = 0;
a275fa42
PB
2859 bs->backing_file[0] = '\0';
2860 bs->backing_format[0] = '\0';
6405875c 2861 bs->total_sectors = 0;
54115412
EB
2862 bs->encrypted = false;
2863 bs->valid_key = false;
2864 bs->sg = false;
de9c0cec 2865 QDECREF(bs->options);
145f598e 2866 QDECREF(bs->explicit_options);
de9c0cec 2867 bs->options = NULL;
91af7014
HR
2868 QDECREF(bs->full_open_options);
2869 bs->full_open_options = NULL;
b338082b 2870 }
98f90dba 2871
33384421
HR
2872 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
2873 g_free(ban);
2874 }
2875 QLIST_INIT(&bs->aio_notifiers);
fc27291d 2876 bdrv_drained_end(bs);
b338082b
FB
2877}
2878
2bc93fed
MK
2879void bdrv_close_all(void)
2880{
a1a2af07 2881 block_job_cancel_sync_all();
cd7fca95 2882 nbd_export_close_all();
ca9bd24c
HR
2883
2884 /* Drop references from requests still in flight, such as canceled block
2885 * jobs whose AIO context has not been polled yet */
2886 bdrv_drain_all();
2bc93fed 2887
ca9bd24c
HR
2888 blk_remove_all_bs();
2889 blockdev_close_all_bdrv_states();
ed78cda3 2890
a1a2af07 2891 assert(QTAILQ_EMPTY(&all_bdrv_states));
2bc93fed
MK
2892}
2893
dd62f1ca
KW
2894static void change_parent_backing_link(BlockDriverState *from,
2895 BlockDriverState *to)
2896{
9bd910e2 2897 BdrvChild *c, *next, *to_c;
dd62f1ca
KW
2898
2899 QLIST_FOREACH_SAFE(c, &from->parents, next_parent, next) {
26de9438
KW
2900 if (c->role->stay_at_node) {
2901 continue;
2902 }
9bd910e2 2903 if (c->role == &child_backing) {
3e44c8e0
KW
2904 /* If @from is a backing file of @to, ignore the child to avoid
2905 * creating a loop. We only want to change the pointer of other
2906 * parents. */
9bd910e2
HR
2907 QLIST_FOREACH(to_c, &to->children, next) {
2908 if (to_c == c) {
2909 break;
2910 }
2911 }
2912 if (to_c) {
2913 continue;
2914 }
2915 }
2916
dd62f1ca 2917 bdrv_ref(to);
33a610c3
KW
2918 /* FIXME Are we sure that bdrv_replace_child() can't run into
2919 * &error_abort because of permissions? */
2920 bdrv_replace_child(c, to, true);
dd62f1ca
KW
2921 bdrv_unref(from);
2922 }
dd62f1ca
KW
2923}
2924
4ddc07ca
PB
2925/*
2926 * Add new bs contents at the top of an image chain while the chain is
2927 * live, while keeping required fields on the top layer.
2928 *
2929 * This will modify the BlockDriverState fields, and swap contents
2930 * between bs_new and bs_top. Both bs_new and bs_top are modified.
2931 *
bfb197e0 2932 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2933 *
2934 * This function does not create any image files.
dd62f1ca
KW
2935 *
2936 * bdrv_append() takes ownership of a bs_new reference and unrefs it because
2937 * that's what the callers commonly need. bs_new will be referenced by the old
2938 * parents of bs_top after bdrv_append() returns. If the caller needs to keep a
2939 * reference of its own, it must call bdrv_ref().
4ddc07ca 2940 */
b2c2832c
KW
2941void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top,
2942 Error **errp)
4ddc07ca 2943{
b2c2832c
KW
2944 Error *local_err = NULL;
2945
dd65a52e
KW
2946 assert(!atomic_read(&bs_top->in_flight));
2947 assert(!atomic_read(&bs_new->in_flight));
dd62f1ca 2948
b2c2832c
KW
2949 bdrv_set_backing_hd(bs_new, bs_top, &local_err);
2950 if (local_err) {
2951 error_propagate(errp, local_err);
2952 goto out;
2953 }
dd62f1ca 2954
27ccdd52 2955 change_parent_backing_link(bs_top, bs_new);
4ddc07ca 2956
dd62f1ca
KW
2957 /* bs_new is now referenced by its new parents, we don't need the
2958 * additional reference any more. */
b2c2832c 2959out:
dd62f1ca 2960 bdrv_unref(bs_new);
8802d1fd
JC
2961}
2962
3f09bfbc
KW
2963void bdrv_replace_in_backing_chain(BlockDriverState *old, BlockDriverState *new)
2964{
2965 assert(!bdrv_requests_pending(old));
2966 assert(!bdrv_requests_pending(new));
2967
2968 bdrv_ref(old);
2969
3f09bfbc
KW
2970 change_parent_backing_link(old, new);
2971
3f09bfbc
KW
2972 bdrv_unref(old);
2973}
2974
4f6fd349 2975static void bdrv_delete(BlockDriverState *bs)
b338082b 2976{
3e914655 2977 assert(!bs->job);
3718d8ab 2978 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 2979 assert(!bs->refcnt);
18846dee 2980
e1b5c52e
SH
2981 bdrv_close(bs);
2982
1b7bdbc1 2983 /* remove from list, if necessary */
63eaaae0
KW
2984 if (bs->node_name[0] != '\0') {
2985 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
2986 }
2c1d04e0
HR
2987 QTAILQ_REMOVE(&all_bdrv_states, bs, bs_list);
2988
7267c094 2989 g_free(bs);
fc01f7e7
FB
2990}
2991
e97fc193
AL
2992/*
2993 * Run consistency checks on an image
2994 *
e076f338 2995 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 2996 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 2997 * check are stored in res.
e97fc193 2998 */
4534ff54 2999int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 3000{
908bcd54
HR
3001 if (bs->drv == NULL) {
3002 return -ENOMEDIUM;
3003 }
e97fc193
AL
3004 if (bs->drv->bdrv_check == NULL) {
3005 return -ENOTSUP;
3006 }
3007
e076f338 3008 memset(res, 0, sizeof(*res));
4534ff54 3009 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
3010}
3011
756e6736
KW
3012/*
3013 * Return values:
3014 * 0 - success
3015 * -EINVAL - backing format specified, but no file
3016 * -ENOSPC - can't update the backing file because no space is left in the
3017 * image file header
3018 * -ENOTSUP - format driver doesn't support changing the backing file
3019 */
3020int bdrv_change_backing_file(BlockDriverState *bs,
3021 const char *backing_file, const char *backing_fmt)
3022{
3023 BlockDriver *drv = bs->drv;
469ef350 3024 int ret;
756e6736 3025
5f377794
PB
3026 /* Backing file format doesn't make sense without a backing file */
3027 if (backing_fmt && !backing_file) {
3028 return -EINVAL;
3029 }
3030
756e6736 3031 if (drv->bdrv_change_backing_file != NULL) {
469ef350 3032 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 3033 } else {
469ef350 3034 ret = -ENOTSUP;
756e6736 3035 }
469ef350
PB
3036
3037 if (ret == 0) {
3038 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
3039 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
3040 }
3041 return ret;
756e6736
KW
3042}
3043
6ebdcee2
JC
3044/*
3045 * Finds the image layer in the chain that has 'bs' as its backing file.
3046 *
3047 * active is the current topmost image.
3048 *
3049 * Returns NULL if bs is not found in active's image chain,
3050 * or if active == bs.
4caf0fcd
JC
3051 *
3052 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
3053 */
3054BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
3055 BlockDriverState *bs)
3056{
760e0063
KW
3057 while (active && bs != backing_bs(active)) {
3058 active = backing_bs(active);
6ebdcee2
JC
3059 }
3060
4caf0fcd
JC
3061 return active;
3062}
6ebdcee2 3063
4caf0fcd
JC
3064/* Given a BDS, searches for the base layer. */
3065BlockDriverState *bdrv_find_base(BlockDriverState *bs)
3066{
3067 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
3068}
3069
6ebdcee2
JC
3070/*
3071 * Drops images above 'base' up to and including 'top', and sets the image
3072 * above 'top' to have base as its backing file.
3073 *
3074 * Requires that the overlay to 'top' is opened r/w, so that the backing file
3075 * information in 'bs' can be properly updated.
3076 *
3077 * E.g., this will convert the following chain:
3078 * bottom <- base <- intermediate <- top <- active
3079 *
3080 * to
3081 *
3082 * bottom <- base <- active
3083 *
3084 * It is allowed for bottom==base, in which case it converts:
3085 *
3086 * base <- intermediate <- top <- active
3087 *
3088 * to
3089 *
3090 * base <- active
3091 *
54e26900
JC
3092 * If backing_file_str is non-NULL, it will be used when modifying top's
3093 * overlay image metadata.
3094 *
6ebdcee2
JC
3095 * Error conditions:
3096 * if active == top, that is considered an error
3097 *
3098 */
3099int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 3100 BlockDriverState *base, const char *backing_file_str)
6ebdcee2 3101{
6ebdcee2 3102 BlockDriverState *new_top_bs = NULL;
12fa4af6 3103 Error *local_err = NULL;
6ebdcee2
JC
3104 int ret = -EIO;
3105
6ebdcee2
JC
3106 if (!top->drv || !base->drv) {
3107 goto exit;
3108 }
3109
3110 new_top_bs = bdrv_find_overlay(active, top);
3111
3112 if (new_top_bs == NULL) {
3113 /* we could not find the image above 'top', this is an error */
3114 goto exit;
3115 }
3116
760e0063 3117 /* special case of new_top_bs->backing->bs already pointing to base - nothing
6ebdcee2 3118 * to do, no intermediate images */
760e0063 3119 if (backing_bs(new_top_bs) == base) {
6ebdcee2
JC
3120 ret = 0;
3121 goto exit;
3122 }
3123
5db15a57
KW
3124 /* Make sure that base is in the backing chain of top */
3125 if (!bdrv_chain_contains(top, base)) {
6ebdcee2
JC
3126 goto exit;
3127 }
3128
3129 /* success - we can delete the intermediate states, and link top->base */
5db15a57 3130 backing_file_str = backing_file_str ? backing_file_str : base->filename;
54e26900 3131 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
5db15a57 3132 base->drv ? base->drv->format_name : "");
6ebdcee2
JC
3133 if (ret) {
3134 goto exit;
3135 }
12fa4af6
KW
3136
3137 bdrv_set_backing_hd(new_top_bs, base, &local_err);
3138 if (local_err) {
3139 ret = -EPERM;
3140 error_report_err(local_err);
3141 goto exit;
3142 }
6ebdcee2 3143
6ebdcee2 3144 ret = 0;
6ebdcee2 3145exit:
6ebdcee2
JC
3146 return ret;
3147}
3148
61007b31
SH
3149/**
3150 * Truncate file to 'offset' bytes (needed only for file protocols)
3151 */
52cdbc58 3152int bdrv_truncate(BdrvChild *child, int64_t offset)
71d0770c 3153{
52cdbc58 3154 BlockDriverState *bs = child->bs;
61007b31
SH
3155 BlockDriver *drv = bs->drv;
3156 int ret;
c8f6d58e
KW
3157
3158 assert(child->perm & BLK_PERM_RESIZE);
3159
61007b31 3160 if (!drv)
71d0770c 3161 return -ENOMEDIUM;
61007b31
SH
3162 if (!drv->bdrv_truncate)
3163 return -ENOTSUP;
3164 if (bs->read_only)
3165 return -EACCES;
71d0770c 3166
61007b31
SH
3167 ret = drv->bdrv_truncate(bs, offset);
3168 if (ret == 0) {
3169 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
3170 bdrv_dirty_bitmap_truncate(bs);
5c8cab48 3171 bdrv_parent_cb_resize(bs);
3ff2f67a 3172 ++bs->write_gen;
c0191e76 3173 }
61007b31 3174 return ret;
71d0770c
AL
3175}
3176
61007b31
SH
3177/**
3178 * Length of a allocated file in bytes. Sparse files are counted by actual
3179 * allocated space. Return < 0 if error or unknown.
3180 */
3181int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 3182{
61007b31
SH
3183 BlockDriver *drv = bs->drv;
3184 if (!drv) {
3185 return -ENOMEDIUM;
8f4754ed 3186 }
61007b31
SH
3187 if (drv->bdrv_get_allocated_file_size) {
3188 return drv->bdrv_get_allocated_file_size(bs);
3189 }
3190 if (bs->file) {
9a4f4c31 3191 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 3192 }
61007b31 3193 return -ENOTSUP;
1c9805a3 3194}
e7a8a783 3195
61007b31
SH
3196/**
3197 * Return number of sectors on success, -errno on error.
1c9805a3 3198 */
61007b31 3199int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 3200{
61007b31 3201 BlockDriver *drv = bs->drv;
498e386c 3202
61007b31
SH
3203 if (!drv)
3204 return -ENOMEDIUM;
2572b37a 3205
61007b31
SH
3206 if (drv->has_variable_length) {
3207 int ret = refresh_total_sectors(bs, bs->total_sectors);
3208 if (ret < 0) {
3209 return ret;
1c9805a3
SH
3210 }
3211 }
61007b31 3212 return bs->total_sectors;
1c9805a3 3213}
b338082b 3214
61007b31
SH
3215/**
3216 * Return length in bytes on success, -errno on error.
3217 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 3218 */
61007b31 3219int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 3220{
61007b31 3221 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 3222
4a9c9ea0 3223 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 3224 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
3225}
3226
61007b31
SH
3227/* return 0 as number of sectors if no device present or error */
3228void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 3229{
61007b31 3230 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 3231
61007b31 3232 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
3233}
3234
54115412 3235bool bdrv_is_read_only(BlockDriverState *bs)
8d3b1a2d 3236{
61007b31 3237 return bs->read_only;
83f64091 3238}
83f64091 3239
54115412 3240bool bdrv_is_sg(BlockDriverState *bs)
f08145fe 3241{
61007b31 3242 return bs->sg;
f08145fe
KW
3243}
3244
54115412 3245bool bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 3246{
760e0063 3247 if (bs->backing && bs->backing->bs->encrypted) {
54115412 3248 return true;
760e0063 3249 }
61007b31 3250 return bs->encrypted;
fc3959e4
FZ
3251}
3252
54115412 3253bool bdrv_key_required(BlockDriverState *bs)
fc3959e4 3254{
760e0063 3255 BdrvChild *backing = bs->backing;
61007b31 3256
760e0063 3257 if (backing && backing->bs->encrypted && !backing->bs->valid_key) {
54115412 3258 return true;
760e0063 3259 }
61007b31 3260 return (bs->encrypted && !bs->valid_key);
fc3959e4
FZ
3261}
3262
61007b31 3263int bdrv_set_key(BlockDriverState *bs, const char *key)
d0c7f642 3264{
d0c7f642 3265 int ret;
760e0063
KW
3266 if (bs->backing && bs->backing->bs->encrypted) {
3267 ret = bdrv_set_key(bs->backing->bs, key);
61007b31
SH
3268 if (ret < 0)
3269 return ret;
3270 if (!bs->encrypted)
3271 return 0;
3272 }
3273 if (!bs->encrypted) {
3274 return -EINVAL;
3275 } else if (!bs->drv || !bs->drv->bdrv_set_key) {
d0c7f642
KW
3276 return -ENOMEDIUM;
3277 }
61007b31 3278 ret = bs->drv->bdrv_set_key(bs, key);
b9c64947 3279 if (ret < 0) {
54115412 3280 bs->valid_key = false;
61007b31 3281 } else if (!bs->valid_key) {
5c8cab48 3282 /* call the change callback now, we skipped it on open */
54115412 3283 bs->valid_key = true;
5c8cab48 3284 bdrv_parent_cb_change_media(bs, true);
1b0288ae 3285 }
61007b31
SH
3286 return ret;
3287}
f08f2dda 3288
c5fbe571 3289/*
61007b31
SH
3290 * Provide an encryption key for @bs.
3291 * If @key is non-null:
3292 * If @bs is not encrypted, fail.
3293 * Else if the key is invalid, fail.
3294 * Else set @bs's key to @key, replacing the existing key, if any.
3295 * If @key is null:
3296 * If @bs is encrypted and still lacks a key, fail.
3297 * Else do nothing.
3298 * On failure, store an error object through @errp if non-null.
c5fbe571 3299 */
61007b31 3300void bdrv_add_key(BlockDriverState *bs, const char *key, Error **errp)
c5fbe571 3301{
61007b31
SH
3302 if (key) {
3303 if (!bdrv_is_encrypted(bs)) {
3304 error_setg(errp, "Node '%s' is not encrypted",
3305 bdrv_get_device_or_node_name(bs));
3306 } else if (bdrv_set_key(bs, key) < 0) {
c6bd8c70 3307 error_setg(errp, QERR_INVALID_PASSWORD);
4d2855a3
MA
3308 }
3309 } else {
3310 if (bdrv_key_required(bs)) {
b1ca6391
MA
3311 error_set(errp, ERROR_CLASS_DEVICE_ENCRYPTED,
3312 "'%s' (%s) is encrypted",
81e5f78a 3313 bdrv_get_device_or_node_name(bs),
4d2855a3
MA
3314 bdrv_get_encrypted_filename(bs));
3315 }
3316 }
3317}
3318
61007b31 3319const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 3320{
61007b31 3321 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
3322}
3323
61007b31 3324static int qsort_strcmp(const void *a, const void *b)
40b4f539 3325{
ceff5bd7 3326 return strcmp(*(char *const *)a, *(char *const *)b);
40b4f539
KW
3327}
3328
61007b31
SH
3329void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
3330 void *opaque)
40b4f539 3331{
61007b31
SH
3332 BlockDriver *drv;
3333 int count = 0;
3334 int i;
3335 const char **formats = NULL;
40b4f539 3336
61007b31
SH
3337 QLIST_FOREACH(drv, &bdrv_drivers, list) {
3338 if (drv->format_name) {
3339 bool found = false;
3340 int i = count;
3341 while (formats && i && !found) {
3342 found = !strcmp(formats[--i], drv->format_name);
3343 }
e2a305fb 3344
61007b31
SH
3345 if (!found) {
3346 formats = g_renew(const char *, formats, count + 1);
3347 formats[count++] = drv->format_name;
3348 }
6c5a42ac 3349 }
61007b31 3350 }
6c5a42ac 3351
eb0df69f
HR
3352 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); i++) {
3353 const char *format_name = block_driver_modules[i].format_name;
3354
3355 if (format_name) {
3356 bool found = false;
3357 int j = count;
3358
3359 while (formats && j && !found) {
3360 found = !strcmp(formats[--j], format_name);
3361 }
3362
3363 if (!found) {
3364 formats = g_renew(const char *, formats, count + 1);
3365 formats[count++] = format_name;
3366 }
3367 }
3368 }
3369
61007b31 3370 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 3371
61007b31
SH
3372 for (i = 0; i < count; i++) {
3373 it(opaque, formats[i]);
3374 }
40b4f539 3375
61007b31
SH
3376 g_free(formats);
3377}
40b4f539 3378
61007b31
SH
3379/* This function is to find a node in the bs graph */
3380BlockDriverState *bdrv_find_node(const char *node_name)
3381{
3382 BlockDriverState *bs;
391827eb 3383
61007b31 3384 assert(node_name);
40b4f539 3385
61007b31
SH
3386 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
3387 if (!strcmp(node_name, bs->node_name)) {
3388 return bs;
40b4f539
KW
3389 }
3390 }
61007b31 3391 return NULL;
40b4f539
KW
3392}
3393
61007b31
SH
3394/* Put this QMP function here so it can access the static graph_bdrv_states. */
3395BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 3396{
61007b31
SH
3397 BlockDeviceInfoList *list, *entry;
3398 BlockDriverState *bs;
40b4f539 3399
61007b31
SH
3400 list = NULL;
3401 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
c83f9fba 3402 BlockDeviceInfo *info = bdrv_block_device_info(NULL, bs, errp);
61007b31
SH
3403 if (!info) {
3404 qapi_free_BlockDeviceInfoList(list);
3405 return NULL;
301db7c2 3406 }
61007b31
SH
3407 entry = g_malloc0(sizeof(*entry));
3408 entry->value = info;
3409 entry->next = list;
3410 list = entry;
301db7c2
RH
3411 }
3412
61007b31
SH
3413 return list;
3414}
40b4f539 3415
61007b31
SH
3416BlockDriverState *bdrv_lookup_bs(const char *device,
3417 const char *node_name,
3418 Error **errp)
3419{
3420 BlockBackend *blk;
3421 BlockDriverState *bs;
40b4f539 3422
61007b31
SH
3423 if (device) {
3424 blk = blk_by_name(device);
40b4f539 3425
61007b31 3426 if (blk) {
9f4ed6fb
AG
3427 bs = blk_bs(blk);
3428 if (!bs) {
5433c24f 3429 error_setg(errp, "Device '%s' has no medium", device);
5433c24f
HR
3430 }
3431
9f4ed6fb 3432 return bs;
61007b31
SH
3433 }
3434 }
40b4f539 3435
61007b31
SH
3436 if (node_name) {
3437 bs = bdrv_find_node(node_name);
6d519a5f 3438
61007b31
SH
3439 if (bs) {
3440 return bs;
3441 }
40b4f539
KW
3442 }
3443
61007b31
SH
3444 error_setg(errp, "Cannot find device=%s nor node_name=%s",
3445 device ? device : "",
3446 node_name ? node_name : "");
3447 return NULL;
40b4f539
KW
3448}
3449
61007b31
SH
3450/* If 'base' is in the same chain as 'top', return true. Otherwise,
3451 * return false. If either argument is NULL, return false. */
3452bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 3453{
61007b31 3454 while (top && top != base) {
760e0063 3455 top = backing_bs(top);
02c50efe 3456 }
61007b31
SH
3457
3458 return top != NULL;
02c50efe
FZ
3459}
3460
61007b31 3461BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 3462{
61007b31
SH
3463 if (!bs) {
3464 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 3465 }
61007b31 3466 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
3467}
3468
61007b31 3469const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 3470{
61007b31 3471 return bs->node_name;
beac80cd
FB
3472}
3473
1f0c461b 3474const char *bdrv_get_parent_name(const BlockDriverState *bs)
4c265bf9
KW
3475{
3476 BdrvChild *c;
3477 const char *name;
3478
3479 /* If multiple parents have a name, just pick the first one. */
3480 QLIST_FOREACH(c, &bs->parents, next_parent) {
3481 if (c->role->get_name) {
3482 name = c->role->get_name(c);
3483 if (name && *name) {
3484 return name;
3485 }
3486 }
3487 }
3488
3489 return NULL;
3490}
3491
61007b31
SH
3492/* TODO check what callers really want: bs->node_name or blk_name() */
3493const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 3494{
4c265bf9 3495 return bdrv_get_parent_name(bs) ?: "";
f141eafe 3496}
83f64091 3497
61007b31
SH
3498/* This can be used to identify nodes that might not have a device
3499 * name associated. Since node and device names live in the same
3500 * namespace, the result is unambiguous. The exception is if both are
3501 * absent, then this returns an empty (non-null) string. */
3502const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 3503{
4c265bf9 3504 return bdrv_get_parent_name(bs) ?: bs->node_name;
beac80cd 3505}
beac80cd 3506
61007b31 3507int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 3508{
61007b31 3509 return bs->open_flags;
0b5a2445
PB
3510}
3511
61007b31 3512int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 3513{
61007b31 3514 return 1;
0b5a2445
PB
3515}
3516
61007b31 3517int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 3518{
61007b31 3519 assert(bs->drv);
0b5a2445 3520
61007b31
SH
3521 /* If BS is a copy on write image, it is initialized to
3522 the contents of the base image, which may not be zeroes. */
760e0063 3523 if (bs->backing) {
61007b31
SH
3524 return 0;
3525 }
3526 if (bs->drv->bdrv_has_zero_init) {
3527 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 3528 }
61007b31
SH
3529
3530 /* safe default */
3531 return 0;
68485420
KW
3532}
3533
61007b31 3534bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 3535{
61007b31 3536 BlockDriverInfo bdi;
b2a61371 3537
760e0063 3538 if (bs->backing) {
61007b31
SH
3539 return false;
3540 }
3541
3542 if (bdrv_get_info(bs, &bdi) == 0) {
3543 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
3544 }
3545
61007b31 3546 return false;
b2a61371
SH
3547}
3548
61007b31 3549bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 3550{
61007b31 3551 BlockDriverInfo bdi;
68485420 3552
2f0342ef 3553 if (!(bs->open_flags & BDRV_O_UNMAP)) {
61007b31
SH
3554 return false;
3555 }
68485420 3556
61007b31
SH
3557 if (bdrv_get_info(bs, &bdi) == 0) {
3558 return bdi.can_write_zeroes_with_unmap;
3559 }
68485420 3560
61007b31 3561 return false;
68485420
KW
3562}
3563
61007b31 3564const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 3565{
760e0063 3566 if (bs->backing && bs->backing->bs->encrypted)
61007b31
SH
3567 return bs->backing_file;
3568 else if (bs->encrypted)
3569 return bs->filename;
3570 else
3571 return NULL;
b2e12bc6
CH
3572}
3573
61007b31
SH
3574void bdrv_get_backing_filename(BlockDriverState *bs,
3575 char *filename, int filename_size)
016f5cf6 3576{
61007b31
SH
3577 pstrcpy(filename, filename_size, bs->backing_file);
3578}
d318aea9 3579
61007b31
SH
3580int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
3581{
3582 BlockDriver *drv = bs->drv;
3583 if (!drv)
3584 return -ENOMEDIUM;
3585 if (!drv->bdrv_get_info)
3586 return -ENOTSUP;
3587 memset(bdi, 0, sizeof(*bdi));
3588 return drv->bdrv_get_info(bs, bdi);
3589}
016f5cf6 3590
61007b31
SH
3591ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
3592{
3593 BlockDriver *drv = bs->drv;
3594 if (drv && drv->bdrv_get_specific_info) {
3595 return drv->bdrv_get_specific_info(bs);
3596 }
3597 return NULL;
016f5cf6
AG
3598}
3599
a31939e6 3600void bdrv_debug_event(BlockDriverState *bs, BlkdebugEvent event)
4265d620 3601{
61007b31
SH
3602 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
3603 return;
3604 }
4265d620 3605
61007b31 3606 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
3607}
3608
61007b31
SH
3609int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
3610 const char *tag)
4265d620 3611{
61007b31 3612 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 3613 bs = bs->file ? bs->file->bs : NULL;
61007b31 3614 }
4265d620 3615
61007b31
SH
3616 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
3617 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
3618 }
4265d620 3619
61007b31 3620 return -ENOTSUP;
4265d620
PB
3621}
3622
61007b31 3623int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 3624{
61007b31 3625 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 3626 bs = bs->file ? bs->file->bs : NULL;
61007b31 3627 }
ce1a14dc 3628
61007b31
SH
3629 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
3630 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
3631 }
3632
3633 return -ENOTSUP;
eb852011
MA
3634}
3635
61007b31 3636int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 3637{
61007b31 3638 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 3639 bs = bs->file ? bs->file->bs : NULL;
61007b31 3640 }
ce1a14dc 3641
61007b31
SH
3642 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
3643 return bs->drv->bdrv_debug_resume(bs, tag);
3644 }
ce1a14dc 3645
61007b31 3646 return -ENOTSUP;
f197fe2b
FZ
3647}
3648
61007b31 3649bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 3650{
61007b31 3651 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 3652 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 3653 }
19cb3738 3654
61007b31
SH
3655 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
3656 return bs->drv->bdrv_debug_is_suspended(bs, tag);
3657 }
f9f05dc5 3658
61007b31
SH
3659 return false;
3660}
f9f05dc5 3661
61007b31
SH
3662/* backing_file can either be relative, or absolute, or a protocol. If it is
3663 * relative, it must be relative to the chain. So, passing in bs->filename
3664 * from a BDS as backing_file should not be done, as that may be relative to
3665 * the CWD rather than the chain. */
3666BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
3667 const char *backing_file)
f9f05dc5 3668{
61007b31
SH
3669 char *filename_full = NULL;
3670 char *backing_file_full = NULL;
3671 char *filename_tmp = NULL;
3672 int is_protocol = 0;
3673 BlockDriverState *curr_bs = NULL;
3674 BlockDriverState *retval = NULL;
418661e0 3675 Error *local_error = NULL;
f9f05dc5 3676
61007b31
SH
3677 if (!bs || !bs->drv || !backing_file) {
3678 return NULL;
f9f05dc5
KW
3679 }
3680
61007b31
SH
3681 filename_full = g_malloc(PATH_MAX);
3682 backing_file_full = g_malloc(PATH_MAX);
3683 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 3684
61007b31 3685 is_protocol = path_has_protocol(backing_file);
f9f05dc5 3686
760e0063 3687 for (curr_bs = bs; curr_bs->backing; curr_bs = curr_bs->backing->bs) {
f9f05dc5 3688
61007b31
SH
3689 /* If either of the filename paths is actually a protocol, then
3690 * compare unmodified paths; otherwise make paths relative */
3691 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
3692 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
760e0063 3693 retval = curr_bs->backing->bs;
61007b31
SH
3694 break;
3695 }
418661e0
JC
3696 /* Also check against the full backing filename for the image */
3697 bdrv_get_full_backing_filename(curr_bs, backing_file_full, PATH_MAX,
3698 &local_error);
3699 if (local_error == NULL) {
3700 if (strcmp(backing_file, backing_file_full) == 0) {
3701 retval = curr_bs->backing->bs;
3702 break;
3703 }
3704 } else {
3705 error_free(local_error);
3706 local_error = NULL;
3707 }
61007b31
SH
3708 } else {
3709 /* If not an absolute filename path, make it relative to the current
3710 * image's filename path */
3711 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3712 backing_file);
f9f05dc5 3713
61007b31
SH
3714 /* We are going to compare absolute pathnames */
3715 if (!realpath(filename_tmp, filename_full)) {
3716 continue;
3717 }
07f07615 3718
61007b31
SH
3719 /* We need to make sure the backing filename we are comparing against
3720 * is relative to the current image filename (or absolute) */
3721 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3722 curr_bs->backing_file);
07f07615 3723
61007b31
SH
3724 if (!realpath(filename_tmp, backing_file_full)) {
3725 continue;
3726 }
eb489bb1 3727
61007b31 3728 if (strcmp(backing_file_full, filename_full) == 0) {
760e0063 3729 retval = curr_bs->backing->bs;
61007b31
SH
3730 break;
3731 }
3732 }
eb489bb1
KW
3733 }
3734
61007b31
SH
3735 g_free(filename_full);
3736 g_free(backing_file_full);
3737 g_free(filename_tmp);
3738 return retval;
3739}
3740
3741int bdrv_get_backing_file_depth(BlockDriverState *bs)
3742{
3743 if (!bs->drv) {
3744 return 0;
eb489bb1
KW
3745 }
3746
760e0063 3747 if (!bs->backing) {
61007b31 3748 return 0;
ca716364
KW
3749 }
3750
760e0063 3751 return 1 + bdrv_get_backing_file_depth(bs->backing->bs);
61007b31 3752}
07f07615 3753
61007b31
SH
3754void bdrv_init(void)
3755{
3756 module_call_init(MODULE_INIT_BLOCK);
3757}
29cdb251 3758
61007b31
SH
3759void bdrv_init_with_whitelist(void)
3760{
3761 use_bdrv_whitelist = 1;
3762 bdrv_init();
07f07615
PB
3763}
3764
5a8a30db 3765void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 3766{
0d1c5c91 3767 BdrvChild *child;
5a8a30db
KW
3768 Error *local_err = NULL;
3769 int ret;
3770
3456a8d1
KW
3771 if (!bs->drv) {
3772 return;
3773 }
3774
04c01a5c 3775 if (!(bs->open_flags & BDRV_O_INACTIVE)) {
7ea2d269
AK
3776 return;
3777 }
7ea2d269 3778
16e977d5
VSO
3779 QLIST_FOREACH(child, &bs->children, next) {
3780 bdrv_invalidate_cache(child->bs, &local_err);
0d1c5c91 3781 if (local_err) {
0d1c5c91
FZ
3782 error_propagate(errp, local_err);
3783 return;
3784 }
5a8a30db 3785 }
0d1c5c91 3786
16e977d5
VSO
3787 bs->open_flags &= ~BDRV_O_INACTIVE;
3788 if (bs->drv->bdrv_invalidate_cache) {
3789 bs->drv->bdrv_invalidate_cache(bs, &local_err);
0d1c5c91
FZ
3790 if (local_err) {
3791 bs->open_flags |= BDRV_O_INACTIVE;
3792 error_propagate(errp, local_err);
3793 return;
3794 }
0f15423c 3795 }
3456a8d1 3796
5a8a30db
KW
3797 ret = refresh_total_sectors(bs, bs->total_sectors);
3798 if (ret < 0) {
04c01a5c 3799 bs->open_flags |= BDRV_O_INACTIVE;
5a8a30db
KW
3800 error_setg_errno(errp, -ret, "Could not refresh total sector count");
3801 return;
3802 }
0f15423c
AL
3803}
3804
5a8a30db 3805void bdrv_invalidate_cache_all(Error **errp)
0f15423c 3806{
7c8eece4 3807 BlockDriverState *bs;
5a8a30db 3808 Error *local_err = NULL;
88be7b4b 3809 BdrvNextIterator it;
0f15423c 3810
88be7b4b 3811 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
ed78cda3
SH
3812 AioContext *aio_context = bdrv_get_aio_context(bs);
3813
3814 aio_context_acquire(aio_context);
5a8a30db 3815 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 3816 aio_context_release(aio_context);
5a8a30db
KW
3817 if (local_err) {
3818 error_propagate(errp, local_err);
3819 return;
3820 }
0f15423c
AL
3821 }
3822}
3823
aad0b7a0
FZ
3824static int bdrv_inactivate_recurse(BlockDriverState *bs,
3825 bool setting_flag)
76b1c7fe 3826{
aad0b7a0 3827 BdrvChild *child;
76b1c7fe
KW
3828 int ret;
3829
aad0b7a0 3830 if (!setting_flag && bs->drv->bdrv_inactivate) {
76b1c7fe
KW
3831 ret = bs->drv->bdrv_inactivate(bs);
3832 if (ret < 0) {
3833 return ret;
3834 }
3835 }
3836
aad0b7a0
FZ
3837 QLIST_FOREACH(child, &bs->children, next) {
3838 ret = bdrv_inactivate_recurse(child->bs, setting_flag);
3839 if (ret < 0) {
3840 return ret;
3841 }
3842 }
3843
3844 if (setting_flag) {
3845 bs->open_flags |= BDRV_O_INACTIVE;
3846 }
76b1c7fe
KW
3847 return 0;
3848}
3849
3850int bdrv_inactivate_all(void)
3851{
79720af6 3852 BlockDriverState *bs = NULL;
88be7b4b 3853 BdrvNextIterator it;
aad0b7a0
FZ
3854 int ret = 0;
3855 int pass;
76b1c7fe 3856
88be7b4b 3857 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
3858 aio_context_acquire(bdrv_get_aio_context(bs));
3859 }
76b1c7fe 3860
aad0b7a0
FZ
3861 /* We do two passes of inactivation. The first pass calls to drivers'
3862 * .bdrv_inactivate callbacks recursively so all cache is flushed to disk;
3863 * the second pass sets the BDRV_O_INACTIVE flag so that no further write
3864 * is allowed. */
3865 for (pass = 0; pass < 2; pass++) {
88be7b4b 3866 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
3867 ret = bdrv_inactivate_recurse(bs, pass);
3868 if (ret < 0) {
3869 goto out;
3870 }
76b1c7fe
KW
3871 }
3872 }
3873
aad0b7a0 3874out:
88be7b4b 3875 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
3876 aio_context_release(bdrv_get_aio_context(bs));
3877 }
3878
3879 return ret;
76b1c7fe
KW
3880}
3881
19cb3738
FB
3882/**************************************************************/
3883/* removable device support */
3884
3885/**
3886 * Return TRUE if the media is present
3887 */
e031f750 3888bool bdrv_is_inserted(BlockDriverState *bs)
19cb3738
FB
3889{
3890 BlockDriver *drv = bs->drv;
28d7a789 3891 BdrvChild *child;
a1aff5bf 3892
e031f750
HR
3893 if (!drv) {
3894 return false;
3895 }
28d7a789
HR
3896 if (drv->bdrv_is_inserted) {
3897 return drv->bdrv_is_inserted(bs);
3898 }
3899 QLIST_FOREACH(child, &bs->children, next) {
3900 if (!bdrv_is_inserted(child->bs)) {
3901 return false;
3902 }
e031f750 3903 }
28d7a789 3904 return true;
19cb3738
FB
3905}
3906
3907/**
8e49ca46
MA
3908 * Return whether the media changed since the last call to this
3909 * function, or -ENOTSUP if we don't know. Most drivers don't know.
19cb3738
FB
3910 */
3911int bdrv_media_changed(BlockDriverState *bs)
3912{
3913 BlockDriver *drv = bs->drv;
19cb3738 3914
8e49ca46
MA
3915 if (drv && drv->bdrv_media_changed) {
3916 return drv->bdrv_media_changed(bs);
3917 }
3918 return -ENOTSUP;
19cb3738
FB
3919}
3920
3921/**
3922 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
3923 */
f36f3949 3924void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
3925{
3926 BlockDriver *drv = bs->drv;
19cb3738 3927
822e1cd1
MA
3928 if (drv && drv->bdrv_eject) {
3929 drv->bdrv_eject(bs, eject_flag);
19cb3738
FB
3930 }
3931}
3932
19cb3738
FB
3933/**
3934 * Lock or unlock the media (if it is locked, the user won't be able
3935 * to eject it manually).
3936 */
025e849a 3937void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
3938{
3939 BlockDriver *drv = bs->drv;
3940
025e849a 3941 trace_bdrv_lock_medium(bs, locked);
b8c6d095 3942
025e849a
MA
3943 if (drv && drv->bdrv_lock_medium) {
3944 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
3945 }
3946}
985a03b0 3947
9fcb0251
FZ
3948/* Get a reference to bs */
3949void bdrv_ref(BlockDriverState *bs)
3950{
3951 bs->refcnt++;
3952}
3953
3954/* Release a previously grabbed reference to bs.
3955 * If after releasing, reference count is zero, the BlockDriverState is
3956 * deleted. */
3957void bdrv_unref(BlockDriverState *bs)
3958{
9a4d5ca6
JC
3959 if (!bs) {
3960 return;
3961 }
9fcb0251
FZ
3962 assert(bs->refcnt > 0);
3963 if (--bs->refcnt == 0) {
3964 bdrv_delete(bs);
3965 }
3966}
3967
fbe40ff7
FZ
3968struct BdrvOpBlocker {
3969 Error *reason;
3970 QLIST_ENTRY(BdrvOpBlocker) list;
3971};
3972
3973bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
3974{
3975 BdrvOpBlocker *blocker;
3976 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3977 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
3978 blocker = QLIST_FIRST(&bs->op_blockers[op]);
3979 if (errp) {
e43bfd9c
MA
3980 *errp = error_copy(blocker->reason);
3981 error_prepend(errp, "Node '%s' is busy: ",
3982 bdrv_get_device_or_node_name(bs));
fbe40ff7
FZ
3983 }
3984 return true;
3985 }
3986 return false;
3987}
3988
3989void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
3990{
3991 BdrvOpBlocker *blocker;
3992 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3993
5839e53b 3994 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
3995 blocker->reason = reason;
3996 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
3997}
3998
3999void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
4000{
4001 BdrvOpBlocker *blocker, *next;
4002 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4003 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
4004 if (blocker->reason == reason) {
4005 QLIST_REMOVE(blocker, list);
4006 g_free(blocker);
4007 }
4008 }
4009}
4010
4011void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
4012{
4013 int i;
4014 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4015 bdrv_op_block(bs, i, reason);
4016 }
4017}
4018
4019void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
4020{
4021 int i;
4022 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4023 bdrv_op_unblock(bs, i, reason);
4024 }
4025}
4026
4027bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
4028{
4029 int i;
4030
4031 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4032 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
4033 return false;
4034 }
4035 }
4036 return true;
4037}
4038
d92ada22
LC
4039void bdrv_img_create(const char *filename, const char *fmt,
4040 const char *base_filename, const char *base_fmt,
f382d43a
MR
4041 char *options, uint64_t img_size, int flags,
4042 Error **errp, bool quiet)
f88e1a42 4043{
83d0521a
CL
4044 QemuOptsList *create_opts = NULL;
4045 QemuOpts *opts = NULL;
4046 const char *backing_fmt, *backing_file;
4047 int64_t size;
f88e1a42 4048 BlockDriver *drv, *proto_drv;
cc84d90f 4049 Error *local_err = NULL;
f88e1a42
JS
4050 int ret = 0;
4051
4052 /* Find driver and parse its options */
4053 drv = bdrv_find_format(fmt);
4054 if (!drv) {
71c79813 4055 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 4056 return;
f88e1a42
JS
4057 }
4058
b65a5e12 4059 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 4060 if (!proto_drv) {
d92ada22 4061 return;
f88e1a42
JS
4062 }
4063
c6149724
HR
4064 if (!drv->create_opts) {
4065 error_setg(errp, "Format driver '%s' does not support image creation",
4066 drv->format_name);
4067 return;
4068 }
4069
4070 if (!proto_drv->create_opts) {
4071 error_setg(errp, "Protocol driver '%s' does not support image creation",
4072 proto_drv->format_name);
4073 return;
4074 }
4075
c282e1fd
CL
4076 create_opts = qemu_opts_append(create_opts, drv->create_opts);
4077 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
4078
4079 /* Create parameter list with default values */
83d0521a 4080 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 4081 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
4082
4083 /* Parse -o options */
4084 if (options) {
dc523cd3
MA
4085 qemu_opts_do_parse(opts, options, NULL, &local_err);
4086 if (local_err) {
4087 error_report_err(local_err);
4088 local_err = NULL;
83d0521a 4089 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
4090 goto out;
4091 }
4092 }
4093
4094 if (base_filename) {
f43e47db 4095 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 4096 if (local_err) {
71c79813
LC
4097 error_setg(errp, "Backing file not supported for file format '%s'",
4098 fmt);
f88e1a42
JS
4099 goto out;
4100 }
4101 }
4102
4103 if (base_fmt) {
f43e47db 4104 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 4105 if (local_err) {
71c79813
LC
4106 error_setg(errp, "Backing file format not supported for file "
4107 "format '%s'", fmt);
f88e1a42
JS
4108 goto out;
4109 }
4110 }
4111
83d0521a
CL
4112 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
4113 if (backing_file) {
4114 if (!strcmp(filename, backing_file)) {
71c79813
LC
4115 error_setg(errp, "Error: Trying to create an image with the "
4116 "same filename as the backing file");
792da93a
JS
4117 goto out;
4118 }
4119 }
4120
83d0521a 4121 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42
JS
4122
4123 // The size for the image must always be specified, with one exception:
4124 // If we are using a backing file, we can obtain the size from there
83d0521a
CL
4125 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
4126 if (size == -1) {
4127 if (backing_file) {
66f6b814 4128 BlockDriverState *bs;
29168018 4129 char *full_backing = g_new0(char, PATH_MAX);
52bf1e72 4130 int64_t size;
63090dac 4131 int back_flags;
e6641719 4132 QDict *backing_options = NULL;
63090dac 4133
29168018
HR
4134 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
4135 full_backing, PATH_MAX,
4136 &local_err);
4137 if (local_err) {
4138 g_free(full_backing);
4139 goto out;
4140 }
4141
63090dac 4142 /* backing files always opened read-only */
61de4c68 4143 back_flags = flags;
bfd18d1e 4144 back_flags &= ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 4145
e6641719
HR
4146 if (backing_fmt) {
4147 backing_options = qdict_new();
4148 qdict_put(backing_options, "driver",
4149 qstring_from_str(backing_fmt));
4150 }
4151
5b363937
HR
4152 bs = bdrv_open(full_backing, NULL, backing_options, back_flags,
4153 &local_err);
29168018 4154 g_free(full_backing);
5b363937 4155 if (!bs) {
f88e1a42
JS
4156 goto out;
4157 }
52bf1e72
MA
4158 size = bdrv_getlength(bs);
4159 if (size < 0) {
4160 error_setg_errno(errp, -size, "Could not get size of '%s'",
4161 backing_file);
4162 bdrv_unref(bs);
4163 goto out;
4164 }
f88e1a42 4165
39101f25 4166 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
66f6b814
HR
4167
4168 bdrv_unref(bs);
f88e1a42 4169 } else {
71c79813 4170 error_setg(errp, "Image creation needs a size parameter");
f88e1a42
JS
4171 goto out;
4172 }
4173 }
4174
f382d43a 4175 if (!quiet) {
fe646693 4176 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 4177 qemu_opts_print(opts, " ");
f382d43a
MR
4178 puts("");
4179 }
83d0521a 4180
c282e1fd 4181 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 4182
cc84d90f
HR
4183 if (ret == -EFBIG) {
4184 /* This is generally a better message than whatever the driver would
4185 * deliver (especially because of the cluster_size_hint), since that
4186 * is most probably not much different from "image too large". */
4187 const char *cluster_size_hint = "";
83d0521a 4188 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 4189 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 4190 }
cc84d90f
HR
4191 error_setg(errp, "The image size is too large for file format '%s'"
4192 "%s", fmt, cluster_size_hint);
4193 error_free(local_err);
4194 local_err = NULL;
f88e1a42
JS
4195 }
4196
4197out:
83d0521a
CL
4198 qemu_opts_del(opts);
4199 qemu_opts_free(create_opts);
621ff94d 4200 error_propagate(errp, local_err);
f88e1a42 4201}
85d126f3
SH
4202
4203AioContext *bdrv_get_aio_context(BlockDriverState *bs)
4204{
dcd04228
SH
4205 return bs->aio_context;
4206}
4207
e8a095da
SH
4208static void bdrv_do_remove_aio_context_notifier(BdrvAioNotifier *ban)
4209{
4210 QLIST_REMOVE(ban, list);
4211 g_free(ban);
4212}
4213
dcd04228
SH
4214void bdrv_detach_aio_context(BlockDriverState *bs)
4215{
e8a095da 4216 BdrvAioNotifier *baf, *baf_tmp;
b97511c7 4217 BdrvChild *child;
33384421 4218
dcd04228
SH
4219 if (!bs->drv) {
4220 return;
4221 }
4222
e8a095da
SH
4223 assert(!bs->walking_aio_notifiers);
4224 bs->walking_aio_notifiers = true;
4225 QLIST_FOREACH_SAFE(baf, &bs->aio_notifiers, list, baf_tmp) {
4226 if (baf->deleted) {
4227 bdrv_do_remove_aio_context_notifier(baf);
4228 } else {
4229 baf->detach_aio_context(baf->opaque);
4230 }
33384421 4231 }
e8a095da
SH
4232 /* Never mind iterating again to check for ->deleted. bdrv_close() will
4233 * remove remaining aio notifiers if we aren't called again.
4234 */
4235 bs->walking_aio_notifiers = false;
33384421 4236
dcd04228
SH
4237 if (bs->drv->bdrv_detach_aio_context) {
4238 bs->drv->bdrv_detach_aio_context(bs);
4239 }
b97511c7
HR
4240 QLIST_FOREACH(child, &bs->children, next) {
4241 bdrv_detach_aio_context(child->bs);
dcd04228
SH
4242 }
4243
4244 bs->aio_context = NULL;
4245}
4246
4247void bdrv_attach_aio_context(BlockDriverState *bs,
4248 AioContext *new_context)
4249{
e8a095da 4250 BdrvAioNotifier *ban, *ban_tmp;
b97511c7 4251 BdrvChild *child;
33384421 4252
dcd04228
SH
4253 if (!bs->drv) {
4254 return;
4255 }
4256
4257 bs->aio_context = new_context;
4258
b97511c7
HR
4259 QLIST_FOREACH(child, &bs->children, next) {
4260 bdrv_attach_aio_context(child->bs, new_context);
dcd04228
SH
4261 }
4262 if (bs->drv->bdrv_attach_aio_context) {
4263 bs->drv->bdrv_attach_aio_context(bs, new_context);
4264 }
33384421 4265
e8a095da
SH
4266 assert(!bs->walking_aio_notifiers);
4267 bs->walking_aio_notifiers = true;
4268 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_tmp) {
4269 if (ban->deleted) {
4270 bdrv_do_remove_aio_context_notifier(ban);
4271 } else {
4272 ban->attached_aio_context(new_context, ban->opaque);
4273 }
33384421 4274 }
e8a095da 4275 bs->walking_aio_notifiers = false;
dcd04228
SH
4276}
4277
4278void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
4279{
53ec73e2 4280 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228
SH
4281
4282 bdrv_detach_aio_context(bs);
4283
4284 /* This function executes in the old AioContext so acquire the new one in
4285 * case it runs in a different thread.
4286 */
4287 aio_context_acquire(new_context);
4288 bdrv_attach_aio_context(bs, new_context);
4289 aio_context_release(new_context);
85d126f3 4290}
d616b224 4291
33384421
HR
4292void bdrv_add_aio_context_notifier(BlockDriverState *bs,
4293 void (*attached_aio_context)(AioContext *new_context, void *opaque),
4294 void (*detach_aio_context)(void *opaque), void *opaque)
4295{
4296 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
4297 *ban = (BdrvAioNotifier){
4298 .attached_aio_context = attached_aio_context,
4299 .detach_aio_context = detach_aio_context,
4300 .opaque = opaque
4301 };
4302
4303 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
4304}
4305
4306void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
4307 void (*attached_aio_context)(AioContext *,
4308 void *),
4309 void (*detach_aio_context)(void *),
4310 void *opaque)
4311{
4312 BdrvAioNotifier *ban, *ban_next;
4313
4314 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
4315 if (ban->attached_aio_context == attached_aio_context &&
4316 ban->detach_aio_context == detach_aio_context &&
e8a095da
SH
4317 ban->opaque == opaque &&
4318 ban->deleted == false)
33384421 4319 {
e8a095da
SH
4320 if (bs->walking_aio_notifiers) {
4321 ban->deleted = true;
4322 } else {
4323 bdrv_do_remove_aio_context_notifier(ban);
4324 }
33384421
HR
4325 return;
4326 }
4327 }
4328
4329 abort();
4330}
4331
77485434 4332int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
8b13976d 4333 BlockDriverAmendStatusCB *status_cb, void *cb_opaque)
6f176b48 4334{
c282e1fd 4335 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
4336 return -ENOTSUP;
4337 }
8b13976d 4338 return bs->drv->bdrv_amend_options(bs, opts, status_cb, cb_opaque);
6f176b48 4339}
f6186f49 4340
b5042a36
BC
4341/* This function will be called by the bdrv_recurse_is_first_non_filter method
4342 * of block filter and by bdrv_is_first_non_filter.
4343 * It is used to test if the given bs is the candidate or recurse more in the
4344 * node graph.
212a5a8f 4345 */
b5042a36 4346bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 4347 BlockDriverState *candidate)
f6186f49 4348{
b5042a36
BC
4349 /* return false if basic checks fails */
4350 if (!bs || !bs->drv) {
212a5a8f 4351 return false;
f6186f49
BC
4352 }
4353
b5042a36
BC
4354 /* the code reached a non block filter driver -> check if the bs is
4355 * the same as the candidate. It's the recursion termination condition.
4356 */
4357 if (!bs->drv->is_filter) {
4358 return bs == candidate;
212a5a8f 4359 }
b5042a36 4360 /* Down this path the driver is a block filter driver */
212a5a8f 4361
b5042a36
BC
4362 /* If the block filter recursion method is defined use it to recurse down
4363 * the node graph.
4364 */
4365 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 4366 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
4367 }
4368
b5042a36
BC
4369 /* the driver is a block filter but don't allow to recurse -> return false
4370 */
4371 return false;
f6186f49
BC
4372}
4373
212a5a8f
BC
4374/* This function checks if the candidate is the first non filter bs down it's
4375 * bs chain. Since we don't have pointers to parents it explore all bs chains
4376 * from the top. Some filters can choose not to pass down the recursion.
4377 */
4378bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 4379{
7c8eece4 4380 BlockDriverState *bs;
88be7b4b 4381 BdrvNextIterator it;
212a5a8f
BC
4382
4383 /* walk down the bs forest recursively */
88be7b4b 4384 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
212a5a8f
BC
4385 bool perm;
4386
b5042a36 4387 /* try to recurse in this top level bs */
e6dc8a1f 4388 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
4389
4390 /* candidate is the first non filter */
4391 if (perm) {
4392 return true;
4393 }
4394 }
4395
4396 return false;
f6186f49 4397}
09158f00 4398
e12f3784
WC
4399BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
4400 const char *node_name, Error **errp)
09158f00
BC
4401{
4402 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
4403 AioContext *aio_context;
4404
09158f00
BC
4405 if (!to_replace_bs) {
4406 error_setg(errp, "Node name '%s' not found", node_name);
4407 return NULL;
4408 }
4409
5a7e7a0b
SH
4410 aio_context = bdrv_get_aio_context(to_replace_bs);
4411 aio_context_acquire(aio_context);
4412
09158f00 4413 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
4414 to_replace_bs = NULL;
4415 goto out;
09158f00
BC
4416 }
4417
4418 /* We don't want arbitrary node of the BDS chain to be replaced only the top
4419 * most non filter in order to prevent data corruption.
4420 * Another benefit is that this tests exclude backing files which are
4421 * blocked by the backing blockers.
4422 */
e12f3784 4423 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 4424 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
4425 to_replace_bs = NULL;
4426 goto out;
09158f00
BC
4427 }
4428
5a7e7a0b
SH
4429out:
4430 aio_context_release(aio_context);
09158f00
BC
4431 return to_replace_bs;
4432}
448ad91d 4433
91af7014
HR
4434static bool append_open_options(QDict *d, BlockDriverState *bs)
4435{
4436 const QDictEntry *entry;
9e700c1a 4437 QemuOptDesc *desc;
260fecf1 4438 BdrvChild *child;
91af7014 4439 bool found_any = false;
260fecf1 4440 const char *p;
91af7014
HR
4441
4442 for (entry = qdict_first(bs->options); entry;
4443 entry = qdict_next(bs->options, entry))
4444 {
260fecf1
KW
4445 /* Exclude options for children */
4446 QLIST_FOREACH(child, &bs->children, next) {
4447 if (strstart(qdict_entry_key(entry), child->name, &p)
4448 && (!*p || *p == '.'))
4449 {
4450 break;
4451 }
4452 }
4453 if (child) {
9e700c1a 4454 continue;
91af7014 4455 }
9e700c1a
KW
4456
4457 /* And exclude all non-driver-specific options */
4458 for (desc = bdrv_runtime_opts.desc; desc->name; desc++) {
4459 if (!strcmp(qdict_entry_key(entry), desc->name)) {
4460 break;
4461 }
4462 }
4463 if (desc->name) {
4464 continue;
4465 }
4466
4467 qobject_incref(qdict_entry_value(entry));
4468 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
4469 found_any = true;
91af7014
HR
4470 }
4471
4472 return found_any;
4473}
4474
4475/* Updates the following BDS fields:
4476 * - exact_filename: A filename which may be used for opening a block device
4477 * which (mostly) equals the given BDS (even without any
4478 * other options; so reading and writing must return the same
4479 * results, but caching etc. may be different)
4480 * - full_open_options: Options which, when given when opening a block device
4481 * (without a filename), result in a BDS (mostly)
4482 * equalling the given one
4483 * - filename: If exact_filename is set, it is copied here. Otherwise,
4484 * full_open_options is converted to a JSON object, prefixed with
4485 * "json:" (for use through the JSON pseudo protocol) and put here.
4486 */
4487void bdrv_refresh_filename(BlockDriverState *bs)
4488{
4489 BlockDriver *drv = bs->drv;
4490 QDict *opts;
4491
4492 if (!drv) {
4493 return;
4494 }
4495
4496 /* This BDS's file name will most probably depend on its file's name, so
4497 * refresh that first */
4498 if (bs->file) {
9a4f4c31 4499 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
4500 }
4501
4502 if (drv->bdrv_refresh_filename) {
4503 /* Obsolete information is of no use here, so drop the old file name
4504 * information before refreshing it */
4505 bs->exact_filename[0] = '\0';
4506 if (bs->full_open_options) {
4507 QDECREF(bs->full_open_options);
4508 bs->full_open_options = NULL;
4509 }
4510
4cdd01d3
KW
4511 opts = qdict_new();
4512 append_open_options(opts, bs);
4513 drv->bdrv_refresh_filename(bs, opts);
4514 QDECREF(opts);
91af7014
HR
4515 } else if (bs->file) {
4516 /* Try to reconstruct valid information from the underlying file */
4517 bool has_open_options;
4518
4519 bs->exact_filename[0] = '\0';
4520 if (bs->full_open_options) {
4521 QDECREF(bs->full_open_options);
4522 bs->full_open_options = NULL;
4523 }
4524
4525 opts = qdict_new();
4526 has_open_options = append_open_options(opts, bs);
4527
4528 /* If no specific options have been given for this BDS, the filename of
4529 * the underlying file should suffice for this one as well */
9a4f4c31
KW
4530 if (bs->file->bs->exact_filename[0] && !has_open_options) {
4531 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
4532 }
4533 /* Reconstructing the full options QDict is simple for most format block
4534 * drivers, as long as the full options are known for the underlying
4535 * file BDS. The full options QDict of that file BDS should somehow
4536 * contain a representation of the filename, therefore the following
4537 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 4538 if (bs->file->bs->full_open_options) {
91af7014
HR
4539 qdict_put_obj(opts, "driver",
4540 QOBJECT(qstring_from_str(drv->format_name)));
9a4f4c31
KW
4541 QINCREF(bs->file->bs->full_open_options);
4542 qdict_put_obj(opts, "file",
4543 QOBJECT(bs->file->bs->full_open_options));
91af7014
HR
4544
4545 bs->full_open_options = opts;
4546 } else {
4547 QDECREF(opts);
4548 }
4549 } else if (!bs->full_open_options && qdict_size(bs->options)) {
4550 /* There is no underlying file BDS (at least referenced by BDS.file),
4551 * so the full options QDict should be equal to the options given
4552 * specifically for this block device when it was opened (plus the
4553 * driver specification).
4554 * Because those options don't change, there is no need to update
4555 * full_open_options when it's already set. */
4556
4557 opts = qdict_new();
4558 append_open_options(opts, bs);
4559 qdict_put_obj(opts, "driver",
4560 QOBJECT(qstring_from_str(drv->format_name)));
4561
4562 if (bs->exact_filename[0]) {
4563 /* This may not work for all block protocol drivers (some may
4564 * require this filename to be parsed), but we have to find some
4565 * default solution here, so just include it. If some block driver
4566 * does not support pure options without any filename at all or
4567 * needs some special format of the options QDict, it needs to
4568 * implement the driver-specific bdrv_refresh_filename() function.
4569 */
4570 qdict_put_obj(opts, "filename",
4571 QOBJECT(qstring_from_str(bs->exact_filename)));
4572 }
4573
4574 bs->full_open_options = opts;
4575 }
4576
4577 if (bs->exact_filename[0]) {
4578 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4579 } else if (bs->full_open_options) {
4580 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4581 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4582 qstring_get_str(json));
4583 QDECREF(json);
4584 }
4585}
e06018ad
WC
4586
4587/*
4588 * Hot add/remove a BDS's child. So the user can take a child offline when
4589 * it is broken and take a new child online
4590 */
4591void bdrv_add_child(BlockDriverState *parent_bs, BlockDriverState *child_bs,
4592 Error **errp)
4593{
4594
4595 if (!parent_bs->drv || !parent_bs->drv->bdrv_add_child) {
4596 error_setg(errp, "The node %s does not support adding a child",
4597 bdrv_get_device_or_node_name(parent_bs));
4598 return;
4599 }
4600
4601 if (!QLIST_EMPTY(&child_bs->parents)) {
4602 error_setg(errp, "The node %s already has a parent",
4603 child_bs->node_name);
4604 return;
4605 }
4606
4607 parent_bs->drv->bdrv_add_child(parent_bs, child_bs, errp);
4608}
4609
4610void bdrv_del_child(BlockDriverState *parent_bs, BdrvChild *child, Error **errp)
4611{
4612 BdrvChild *tmp;
4613
4614 if (!parent_bs->drv || !parent_bs->drv->bdrv_del_child) {
4615 error_setg(errp, "The node %s does not support removing a child",
4616 bdrv_get_device_or_node_name(parent_bs));
4617 return;
4618 }
4619
4620 QLIST_FOREACH(tmp, &parent_bs->children, next) {
4621 if (tmp == child) {
4622 break;
4623 }
4624 }
4625
4626 if (!tmp) {
4627 error_setg(errp, "The node %s does not have a child named %s",
4628 bdrv_get_device_or_node_name(parent_bs),
4629 bdrv_get_device_or_node_name(child->bs));
4630 return;
4631 }
4632
4633 parent_bs->drv->bdrv_del_child(parent_bs, child, errp);
4634}