]> git.proxmox.com Git - mirror_qemu.git/blame - block.c
qemu-iotests: merge "check" and "common"
[mirror_qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
d38ea87a 24#include "qemu/osdep.h"
0ab8ed18 25#include "block/trace.h"
737e150e
PB
26#include "block/block_int.h"
27#include "block/blockjob.h"
cd7fca95 28#include "block/nbd.h"
d49b6836 29#include "qemu/error-report.h"
88d88798 30#include "module_block.h"
1de7afc9 31#include "qemu/module.h"
cc7a8ea7 32#include "qapi/qmp/qerror.h"
91a097e7 33#include "qapi/qmp/qbool.h"
7b1b5d19 34#include "qapi/qmp/qjson.h"
bfb197e0 35#include "sysemu/block-backend.h"
9c17d615 36#include "sysemu/sysemu.h"
1de7afc9 37#include "qemu/notify.h"
10817bf0 38#include "qemu/coroutine.h"
c13163fb 39#include "block/qapi.h"
b2023818 40#include "qmp-commands.h"
1de7afc9 41#include "qemu/timer.h"
a5ee7bd4 42#include "qapi-event.h"
f348b6d1
VB
43#include "qemu/cutils.h"
44#include "qemu/id.h"
fc01f7e7 45
71e72a19 46#ifdef CONFIG_BSD
7674e7bf 47#include <sys/ioctl.h>
72cf2d4f 48#include <sys/queue.h>
c5e97233 49#ifndef __DragonFly__
7674e7bf
FB
50#include <sys/disk.h>
51#endif
c5e97233 52#endif
7674e7bf 53
49dc768d
AL
54#ifdef _WIN32
55#include <windows.h>
56#endif
57
1c9805a3
SH
58#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
59
dc364f4c
BC
60static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
61 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
62
2c1d04e0
HR
63static QTAILQ_HEAD(, BlockDriverState) all_bdrv_states =
64 QTAILQ_HEAD_INITIALIZER(all_bdrv_states);
65
8a22f02a
SH
66static QLIST_HEAD(, BlockDriver) bdrv_drivers =
67 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 68
5b363937
HR
69static BlockDriverState *bdrv_open_inherit(const char *filename,
70 const char *reference,
71 QDict *options, int flags,
72 BlockDriverState *parent,
73 const BdrvChildRole *child_role,
74 Error **errp);
f3930ed0 75
eb852011
MA
76/* If non-zero, use only whitelisted block drivers */
77static int use_bdrv_whitelist;
78
9e0b22f4
SH
79#ifdef _WIN32
80static int is_windows_drive_prefix(const char *filename)
81{
82 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
83 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
84 filename[1] == ':');
85}
86
87int is_windows_drive(const char *filename)
88{
89 if (is_windows_drive_prefix(filename) &&
90 filename[2] == '\0')
91 return 1;
92 if (strstart(filename, "\\\\.\\", NULL) ||
93 strstart(filename, "//./", NULL))
94 return 1;
95 return 0;
96}
97#endif
98
339064d5
KW
99size_t bdrv_opt_mem_align(BlockDriverState *bs)
100{
101 if (!bs || !bs->drv) {
459b4e66
DL
102 /* page size or 4k (hdd sector size) should be on the safe side */
103 return MAX(4096, getpagesize());
339064d5
KW
104 }
105
106 return bs->bl.opt_mem_alignment;
107}
108
4196d2f0
DL
109size_t bdrv_min_mem_align(BlockDriverState *bs)
110{
111 if (!bs || !bs->drv) {
459b4e66
DL
112 /* page size or 4k (hdd sector size) should be on the safe side */
113 return MAX(4096, getpagesize());
4196d2f0
DL
114 }
115
116 return bs->bl.min_mem_alignment;
117}
118
9e0b22f4 119/* check if the path starts with "<protocol>:" */
5c98415b 120int path_has_protocol(const char *path)
9e0b22f4 121{
947995c0
PB
122 const char *p;
123
9e0b22f4
SH
124#ifdef _WIN32
125 if (is_windows_drive(path) ||
126 is_windows_drive_prefix(path)) {
127 return 0;
128 }
947995c0
PB
129 p = path + strcspn(path, ":/\\");
130#else
131 p = path + strcspn(path, ":/");
9e0b22f4
SH
132#endif
133
947995c0 134 return *p == ':';
9e0b22f4
SH
135}
136
83f64091 137int path_is_absolute(const char *path)
3b0d4f61 138{
21664424
FB
139#ifdef _WIN32
140 /* specific case for names like: "\\.\d:" */
f53f4da9 141 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 142 return 1;
f53f4da9
PB
143 }
144 return (*path == '/' || *path == '\\');
3b9f94e1 145#else
f53f4da9 146 return (*path == '/');
3b9f94e1 147#endif
3b0d4f61
FB
148}
149
83f64091
FB
150/* if filename is absolute, just copy it to dest. Otherwise, build a
151 path to it by considering it is relative to base_path. URL are
152 supported. */
153void path_combine(char *dest, int dest_size,
154 const char *base_path,
155 const char *filename)
3b0d4f61 156{
83f64091
FB
157 const char *p, *p1;
158 int len;
159
160 if (dest_size <= 0)
161 return;
162 if (path_is_absolute(filename)) {
163 pstrcpy(dest, dest_size, filename);
164 } else {
0d54a6fe
HR
165 const char *protocol_stripped = NULL;
166
167 if (path_has_protocol(base_path)) {
168 protocol_stripped = strchr(base_path, ':');
169 if (protocol_stripped) {
170 protocol_stripped++;
171 }
172 }
173 p = protocol_stripped ?: base_path;
174
3b9f94e1
FB
175 p1 = strrchr(base_path, '/');
176#ifdef _WIN32
177 {
178 const char *p2;
179 p2 = strrchr(base_path, '\\');
180 if (!p1 || p2 > p1)
181 p1 = p2;
182 }
183#endif
83f64091
FB
184 if (p1)
185 p1++;
186 else
187 p1 = base_path;
188 if (p1 > p)
189 p = p1;
190 len = p - base_path;
191 if (len > dest_size - 1)
192 len = dest_size - 1;
193 memcpy(dest, base_path, len);
194 dest[len] = '\0';
195 pstrcat(dest, dest_size, filename);
3b0d4f61 196 }
3b0d4f61
FB
197}
198
03c320d8
HR
199/*
200 * Helper function for bdrv_parse_filename() implementations to remove optional
201 * protocol prefixes (especially "file:") from a filename and for putting the
202 * stripped filename into the options QDict if there is such a prefix.
203 */
204void bdrv_parse_filename_strip_prefix(const char *filename, const char *prefix,
205 QDict *options)
206{
207 if (strstart(filename, prefix, &filename)) {
208 /* Stripping the explicit protocol prefix may result in a protocol
209 * prefix being (wrongly) detected (if the filename contains a colon) */
210 if (path_has_protocol(filename)) {
211 QString *fat_filename;
212
213 /* This means there is some colon before the first slash; therefore,
214 * this cannot be an absolute path */
215 assert(!path_is_absolute(filename));
216
217 /* And we can thus fix the protocol detection issue by prefixing it
218 * by "./" */
219 fat_filename = qstring_from_str("./");
220 qstring_append(fat_filename, filename);
221
222 assert(!path_has_protocol(qstring_get_str(fat_filename)));
223
224 qdict_put(options, "filename", fat_filename);
225 } else {
226 /* If no protocol prefix was detected, we can use the shortened
227 * filename as-is */
228 qdict_put_str(options, "filename", filename);
229 }
230 }
231}
232
233
9c5e6594
KW
234/* Returns whether the image file is opened as read-only. Note that this can
235 * return false and writing to the image file is still not possible because the
236 * image is inactivated. */
93ed524e
JC
237bool bdrv_is_read_only(BlockDriverState *bs)
238{
239 return bs->read_only;
240}
241
54a32bfe
KW
242int bdrv_can_set_read_only(BlockDriverState *bs, bool read_only,
243 bool ignore_allow_rdw, Error **errp)
fe5241bf 244{
e2b8247a
JC
245 /* Do not set read_only if copy_on_read is enabled */
246 if (bs->copy_on_read && read_only) {
247 error_setg(errp, "Can't set node '%s' to r/o with copy-on-read enabled",
248 bdrv_get_device_or_node_name(bs));
249 return -EINVAL;
250 }
251
d6fcdf06 252 /* Do not clear read_only if it is prohibited */
54a32bfe
KW
253 if (!read_only && !(bs->open_flags & BDRV_O_ALLOW_RDWR) &&
254 !ignore_allow_rdw)
255 {
d6fcdf06
JC
256 error_setg(errp, "Node '%s' is read only",
257 bdrv_get_device_or_node_name(bs));
258 return -EPERM;
259 }
260
45803a03
JC
261 return 0;
262}
263
264int bdrv_set_read_only(BlockDriverState *bs, bool read_only, Error **errp)
265{
266 int ret = 0;
267
54a32bfe 268 ret = bdrv_can_set_read_only(bs, read_only, false, errp);
45803a03
JC
269 if (ret < 0) {
270 return ret;
271 }
272
fe5241bf 273 bs->read_only = read_only;
e2b8247a 274 return 0;
fe5241bf
JC
275}
276
0a82855a
HR
277void bdrv_get_full_backing_filename_from_filename(const char *backed,
278 const char *backing,
9f07429e
HR
279 char *dest, size_t sz,
280 Error **errp)
dc5a1371 281{
9f07429e
HR
282 if (backing[0] == '\0' || path_has_protocol(backing) ||
283 path_is_absolute(backing))
284 {
0a82855a 285 pstrcpy(dest, sz, backing);
9f07429e
HR
286 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
287 error_setg(errp, "Cannot use relative backing file names for '%s'",
288 backed);
dc5a1371 289 } else {
0a82855a 290 path_combine(dest, sz, backed, backing);
dc5a1371
PB
291 }
292}
293
9f07429e
HR
294void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
295 Error **errp)
0a82855a 296{
9f07429e
HR
297 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
298
299 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
300 dest, sz, errp);
0a82855a
HR
301}
302
0eb7217e
SH
303void bdrv_register(BlockDriver *bdrv)
304{
8a22f02a 305 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 306}
b338082b 307
e4e9986b
MA
308BlockDriverState *bdrv_new(void)
309{
310 BlockDriverState *bs;
311 int i;
312
5839e53b 313 bs = g_new0(BlockDriverState, 1);
e4654d2d 314 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
315 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
316 QLIST_INIT(&bs->op_blockers[i]);
317 }
d616b224 318 notifier_with_return_list_init(&bs->before_write_notifiers);
3783fa3d 319 qemu_co_mutex_init(&bs->reqs_lock);
2119882c 320 qemu_mutex_init(&bs->dirty_bitmap_mutex);
9fcb0251 321 bs->refcnt = 1;
dcd04228 322 bs->aio_context = qemu_get_aio_context();
d7d512f6 323
3ff2f67a
EY
324 qemu_co_queue_init(&bs->flush_queue);
325
2c1d04e0
HR
326 QTAILQ_INSERT_TAIL(&all_bdrv_states, bs, bs_list);
327
b338082b
FB
328 return bs;
329}
330
88d88798 331static BlockDriver *bdrv_do_find_format(const char *format_name)
ea2384d3
FB
332{
333 BlockDriver *drv1;
88d88798 334
8a22f02a
SH
335 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
336 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 337 return drv1;
8a22f02a 338 }
ea2384d3 339 }
88d88798 340
ea2384d3
FB
341 return NULL;
342}
343
88d88798
MM
344BlockDriver *bdrv_find_format(const char *format_name)
345{
346 BlockDriver *drv1;
347 int i;
348
349 drv1 = bdrv_do_find_format(format_name);
350 if (drv1) {
351 return drv1;
352 }
353
354 /* The driver isn't registered, maybe we need to load a module */
355 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); ++i) {
356 if (!strcmp(block_driver_modules[i].format_name, format_name)) {
357 block_module_load_one(block_driver_modules[i].library_name);
358 break;
359 }
360 }
361
362 return bdrv_do_find_format(format_name);
363}
364
b64ec4e4 365static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 366{
b64ec4e4
FZ
367 static const char *whitelist_rw[] = {
368 CONFIG_BDRV_RW_WHITELIST
369 };
370 static const char *whitelist_ro[] = {
371 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
372 };
373 const char **p;
374
b64ec4e4 375 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 376 return 1; /* no whitelist, anything goes */
b64ec4e4 377 }
eb852011 378
b64ec4e4 379 for (p = whitelist_rw; *p; p++) {
eb852011
MA
380 if (!strcmp(drv->format_name, *p)) {
381 return 1;
382 }
383 }
b64ec4e4
FZ
384 if (read_only) {
385 for (p = whitelist_ro; *p; p++) {
386 if (!strcmp(drv->format_name, *p)) {
387 return 1;
388 }
389 }
390 }
eb852011
MA
391 return 0;
392}
393
e6ff69bf
DB
394bool bdrv_uses_whitelist(void)
395{
396 return use_bdrv_whitelist;
397}
398
5b7e1542
ZYW
399typedef struct CreateCo {
400 BlockDriver *drv;
401 char *filename;
83d0521a 402 QemuOpts *opts;
5b7e1542 403 int ret;
cc84d90f 404 Error *err;
5b7e1542
ZYW
405} CreateCo;
406
407static void coroutine_fn bdrv_create_co_entry(void *opaque)
408{
cc84d90f
HR
409 Error *local_err = NULL;
410 int ret;
411
5b7e1542
ZYW
412 CreateCo *cco = opaque;
413 assert(cco->drv);
414
c282e1fd 415 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
621ff94d 416 error_propagate(&cco->err, local_err);
cc84d90f 417 cco->ret = ret;
5b7e1542
ZYW
418}
419
0e7e1989 420int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 421 QemuOpts *opts, Error **errp)
ea2384d3 422{
5b7e1542
ZYW
423 int ret;
424
425 Coroutine *co;
426 CreateCo cco = {
427 .drv = drv,
428 .filename = g_strdup(filename),
83d0521a 429 .opts = opts,
5b7e1542 430 .ret = NOT_DONE,
cc84d90f 431 .err = NULL,
5b7e1542
ZYW
432 };
433
c282e1fd 434 if (!drv->bdrv_create) {
cc84d90f 435 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
436 ret = -ENOTSUP;
437 goto out;
5b7e1542
ZYW
438 }
439
440 if (qemu_in_coroutine()) {
441 /* Fast-path if already in coroutine context */
442 bdrv_create_co_entry(&cco);
443 } else {
0b8b8753
PB
444 co = qemu_coroutine_create(bdrv_create_co_entry, &cco);
445 qemu_coroutine_enter(co);
5b7e1542 446 while (cco.ret == NOT_DONE) {
b47ec2c4 447 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
448 }
449 }
450
451 ret = cco.ret;
cc84d90f 452 if (ret < 0) {
84d18f06 453 if (cco.err) {
cc84d90f
HR
454 error_propagate(errp, cco.err);
455 } else {
456 error_setg_errno(errp, -ret, "Could not create image");
457 }
458 }
0e7e1989 459
80168bff
LC
460out:
461 g_free(cco.filename);
5b7e1542 462 return ret;
ea2384d3
FB
463}
464
c282e1fd 465int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
466{
467 BlockDriver *drv;
cc84d90f
HR
468 Error *local_err = NULL;
469 int ret;
84a12e66 470
b65a5e12 471 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 472 if (drv == NULL) {
16905d71 473 return -ENOENT;
84a12e66
CH
474 }
475
c282e1fd 476 ret = bdrv_create(drv, filename, opts, &local_err);
621ff94d 477 error_propagate(errp, local_err);
cc84d90f 478 return ret;
84a12e66
CH
479}
480
892b7de8
ET
481/**
482 * Try to get @bs's logical and physical block size.
483 * On success, store them in @bsz struct and return 0.
484 * On failure return -errno.
485 * @bs must not be empty.
486 */
487int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
488{
489 BlockDriver *drv = bs->drv;
490
491 if (drv && drv->bdrv_probe_blocksizes) {
492 return drv->bdrv_probe_blocksizes(bs, bsz);
5a612c00
MP
493 } else if (drv && drv->is_filter && bs->file) {
494 return bdrv_probe_blocksizes(bs->file->bs, bsz);
892b7de8
ET
495 }
496
497 return -ENOTSUP;
498}
499
500/**
501 * Try to get @bs's geometry (cyls, heads, sectors).
502 * On success, store them in @geo struct and return 0.
503 * On failure return -errno.
504 * @bs must not be empty.
505 */
506int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
507{
508 BlockDriver *drv = bs->drv;
509
510 if (drv && drv->bdrv_probe_geometry) {
511 return drv->bdrv_probe_geometry(bs, geo);
5a612c00
MP
512 } else if (drv && drv->is_filter && bs->file) {
513 return bdrv_probe_geometry(bs->file->bs, geo);
892b7de8
ET
514 }
515
516 return -ENOTSUP;
517}
518
eba25057
JM
519/*
520 * Create a uniquely-named empty temporary file.
521 * Return 0 upon success, otherwise a negative errno value.
522 */
523int get_tmp_filename(char *filename, int size)
d5249393 524{
eba25057 525#ifdef _WIN32
3b9f94e1 526 char temp_dir[MAX_PATH];
eba25057
JM
527 /* GetTempFileName requires that its output buffer (4th param)
528 have length MAX_PATH or greater. */
529 assert(size >= MAX_PATH);
530 return (GetTempPath(MAX_PATH, temp_dir)
531 && GetTempFileName(temp_dir, "qem", 0, filename)
532 ? 0 : -GetLastError());
d5249393 533#else
67b915a5 534 int fd;
7ccfb2eb 535 const char *tmpdir;
0badc1ee 536 tmpdir = getenv("TMPDIR");
69bef793
AS
537 if (!tmpdir) {
538 tmpdir = "/var/tmp";
539 }
eba25057
JM
540 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
541 return -EOVERFLOW;
542 }
ea2384d3 543 fd = mkstemp(filename);
fe235a06
DH
544 if (fd < 0) {
545 return -errno;
546 }
547 if (close(fd) != 0) {
548 unlink(filename);
eba25057
JM
549 return -errno;
550 }
551 return 0;
d5249393 552#endif
eba25057 553}
fc01f7e7 554
84a12e66
CH
555/*
556 * Detect host devices. By convention, /dev/cdrom[N] is always
557 * recognized as a host CDROM.
558 */
559static BlockDriver *find_hdev_driver(const char *filename)
560{
561 int score_max = 0, score;
562 BlockDriver *drv = NULL, *d;
563
564 QLIST_FOREACH(d, &bdrv_drivers, list) {
565 if (d->bdrv_probe_device) {
566 score = d->bdrv_probe_device(filename);
567 if (score > score_max) {
568 score_max = score;
569 drv = d;
570 }
571 }
572 }
573
574 return drv;
575}
576
88d88798
MM
577static BlockDriver *bdrv_do_find_protocol(const char *protocol)
578{
579 BlockDriver *drv1;
580
581 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
582 if (drv1->protocol_name && !strcmp(drv1->protocol_name, protocol)) {
583 return drv1;
584 }
585 }
586
587 return NULL;
588}
589
98289620 590BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
591 bool allow_protocol_prefix,
592 Error **errp)
83f64091
FB
593{
594 BlockDriver *drv1;
595 char protocol[128];
1cec71e3 596 int len;
83f64091 597 const char *p;
88d88798 598 int i;
19cb3738 599
66f82cee
KW
600 /* TODO Drivers without bdrv_file_open must be specified explicitly */
601
39508e7a
CH
602 /*
603 * XXX(hch): we really should not let host device detection
604 * override an explicit protocol specification, but moving this
605 * later breaks access to device names with colons in them.
606 * Thanks to the brain-dead persistent naming schemes on udev-
607 * based Linux systems those actually are quite common.
608 */
609 drv1 = find_hdev_driver(filename);
610 if (drv1) {
611 return drv1;
612 }
613
98289620 614 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 615 return &bdrv_file;
84a12e66 616 }
98289620 617
9e0b22f4
SH
618 p = strchr(filename, ':');
619 assert(p != NULL);
1cec71e3
AL
620 len = p - filename;
621 if (len > sizeof(protocol) - 1)
622 len = sizeof(protocol) - 1;
623 memcpy(protocol, filename, len);
624 protocol[len] = '\0';
88d88798
MM
625
626 drv1 = bdrv_do_find_protocol(protocol);
627 if (drv1) {
628 return drv1;
629 }
630
631 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); ++i) {
632 if (block_driver_modules[i].protocol_name &&
633 !strcmp(block_driver_modules[i].protocol_name, protocol)) {
634 block_module_load_one(block_driver_modules[i].library_name);
635 break;
8a22f02a 636 }
83f64091 637 }
b65a5e12 638
88d88798
MM
639 drv1 = bdrv_do_find_protocol(protocol);
640 if (!drv1) {
641 error_setg(errp, "Unknown protocol '%s'", protocol);
642 }
643 return drv1;
83f64091
FB
644}
645
c6684249
MA
646/*
647 * Guess image format by probing its contents.
648 * This is not a good idea when your image is raw (CVE-2008-2004), but
649 * we do it anyway for backward compatibility.
650 *
651 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
652 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
653 * but can be smaller if the image file is smaller)
c6684249
MA
654 * @filename is its filename.
655 *
656 * For all block drivers, call the bdrv_probe() method to get its
657 * probing score.
658 * Return the first block driver with the highest probing score.
659 */
38f3ef57
KW
660BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
661 const char *filename)
c6684249
MA
662{
663 int score_max = 0, score;
664 BlockDriver *drv = NULL, *d;
665
666 QLIST_FOREACH(d, &bdrv_drivers, list) {
667 if (d->bdrv_probe) {
668 score = d->bdrv_probe(buf, buf_size, filename);
669 if (score > score_max) {
670 score_max = score;
671 drv = d;
672 }
673 }
674 }
675
676 return drv;
677}
678
5696c6e3 679static int find_image_format(BlockBackend *file, const char *filename,
34b5d2c6 680 BlockDriver **pdrv, Error **errp)
f3a5d3f8 681{
c6684249 682 BlockDriver *drv;
7cddd372 683 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 684 int ret = 0;
f8ea0b00 685
08a00559 686 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
5696c6e3 687 if (blk_is_sg(file) || !blk_is_inserted(file) || blk_getlength(file) == 0) {
ef810437 688 *pdrv = &bdrv_raw;
c98ac35d 689 return ret;
1a396859 690 }
f8ea0b00 691
5696c6e3 692 ret = blk_pread(file, 0, buf, sizeof(buf));
83f64091 693 if (ret < 0) {
34b5d2c6
HR
694 error_setg_errno(errp, -ret, "Could not read image for determining its "
695 "format");
c98ac35d
SW
696 *pdrv = NULL;
697 return ret;
83f64091
FB
698 }
699
c6684249 700 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 701 if (!drv) {
34b5d2c6
HR
702 error_setg(errp, "Could not determine image format: No compatible "
703 "driver found");
c98ac35d
SW
704 ret = -ENOENT;
705 }
706 *pdrv = drv;
707 return ret;
ea2384d3
FB
708}
709
51762288
SH
710/**
711 * Set the current 'total_sectors' value
65a9bb25 712 * Return 0 on success, -errno on error.
51762288
SH
713 */
714static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
715{
716 BlockDriver *drv = bs->drv;
717
396759ad 718 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 719 if (bdrv_is_sg(bs))
396759ad
NB
720 return 0;
721
51762288
SH
722 /* query actual device if possible, otherwise just trust the hint */
723 if (drv->bdrv_getlength) {
724 int64_t length = drv->bdrv_getlength(bs);
725 if (length < 0) {
726 return length;
727 }
7e382003 728 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
729 }
730
731 bs->total_sectors = hint;
732 return 0;
733}
734
cddff5ba
KW
735/**
736 * Combines a QDict of new block driver @options with any missing options taken
737 * from @old_options, so that leaving out an option defaults to its old value.
738 */
739static void bdrv_join_options(BlockDriverState *bs, QDict *options,
740 QDict *old_options)
741{
742 if (bs->drv && bs->drv->bdrv_join_options) {
743 bs->drv->bdrv_join_options(options, old_options);
744 } else {
745 qdict_join(options, old_options, false);
746 }
747}
748
9e8f1835
PB
749/**
750 * Set open flags for a given discard mode
751 *
752 * Return 0 on success, -1 if the discard mode was invalid.
753 */
754int bdrv_parse_discard_flags(const char *mode, int *flags)
755{
756 *flags &= ~BDRV_O_UNMAP;
757
758 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
759 /* do nothing */
760 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
761 *flags |= BDRV_O_UNMAP;
762 } else {
763 return -1;
764 }
765
766 return 0;
767}
768
c3993cdc
SH
769/**
770 * Set open flags for a given cache mode
771 *
772 * Return 0 on success, -1 if the cache mode was invalid.
773 */
53e8ae01 774int bdrv_parse_cache_mode(const char *mode, int *flags, bool *writethrough)
c3993cdc
SH
775{
776 *flags &= ~BDRV_O_CACHE_MASK;
777
778 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
53e8ae01
KW
779 *writethrough = false;
780 *flags |= BDRV_O_NOCACHE;
92196b2f 781 } else if (!strcmp(mode, "directsync")) {
53e8ae01 782 *writethrough = true;
92196b2f 783 *flags |= BDRV_O_NOCACHE;
c3993cdc 784 } else if (!strcmp(mode, "writeback")) {
53e8ae01 785 *writethrough = false;
c3993cdc 786 } else if (!strcmp(mode, "unsafe")) {
53e8ae01 787 *writethrough = false;
c3993cdc
SH
788 *flags |= BDRV_O_NO_FLUSH;
789 } else if (!strcmp(mode, "writethrough")) {
53e8ae01 790 *writethrough = true;
c3993cdc
SH
791 } else {
792 return -1;
793 }
794
795 return 0;
796}
797
b5411555
KW
798static char *bdrv_child_get_parent_desc(BdrvChild *c)
799{
800 BlockDriverState *parent = c->opaque;
801 return g_strdup(bdrv_get_device_or_node_name(parent));
802}
803
20018e12
KW
804static void bdrv_child_cb_drained_begin(BdrvChild *child)
805{
806 BlockDriverState *bs = child->opaque;
807 bdrv_drained_begin(bs);
808}
809
810static void bdrv_child_cb_drained_end(BdrvChild *child)
811{
812 BlockDriverState *bs = child->opaque;
813 bdrv_drained_end(bs);
814}
815
38701b6a
KW
816static int bdrv_child_cb_inactivate(BdrvChild *child)
817{
818 BlockDriverState *bs = child->opaque;
819 assert(bs->open_flags & BDRV_O_INACTIVE);
820 return 0;
821}
822
b1e6fc08 823/*
73176bee
KW
824 * Returns the options and flags that a temporary snapshot should get, based on
825 * the originally requested flags (the originally requested image will have
826 * flags like a backing file)
b1e6fc08 827 */
73176bee
KW
828static void bdrv_temp_snapshot_options(int *child_flags, QDict *child_options,
829 int parent_flags, QDict *parent_options)
b1e6fc08 830{
73176bee
KW
831 *child_flags = (parent_flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
832
833 /* For temporary files, unconditional cache=unsafe is fine */
73176bee
KW
834 qdict_set_default_str(child_options, BDRV_OPT_CACHE_DIRECT, "off");
835 qdict_set_default_str(child_options, BDRV_OPT_CACHE_NO_FLUSH, "on");
41869044 836
f87a0e29
AG
837 /* Copy the read-only option from the parent */
838 qdict_copy_default(child_options, parent_options, BDRV_OPT_READ_ONLY);
839
41869044
KW
840 /* aio=native doesn't work for cache.direct=off, so disable it for the
841 * temporary snapshot */
842 *child_flags &= ~BDRV_O_NATIVE_AIO;
b1e6fc08
KW
843}
844
0b50cc88 845/*
8e2160e2
KW
846 * Returns the options and flags that bs->file should get if a protocol driver
847 * is expected, based on the given options and flags for the parent BDS
0b50cc88 848 */
8e2160e2
KW
849static void bdrv_inherited_options(int *child_flags, QDict *child_options,
850 int parent_flags, QDict *parent_options)
0b50cc88 851{
8e2160e2
KW
852 int flags = parent_flags;
853
0b50cc88
KW
854 /* Enable protocol handling, disable format probing for bs->file */
855 flags |= BDRV_O_PROTOCOL;
856
91a097e7
KW
857 /* If the cache mode isn't explicitly set, inherit direct and no-flush from
858 * the parent. */
859 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
860 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
5a9347c6 861 qdict_copy_default(child_options, parent_options, BDRV_OPT_FORCE_SHARE);
91a097e7 862
f87a0e29
AG
863 /* Inherit the read-only option from the parent if it's not set */
864 qdict_copy_default(child_options, parent_options, BDRV_OPT_READ_ONLY);
865
0b50cc88 866 /* Our block drivers take care to send flushes and respect unmap policy,
91a097e7
KW
867 * so we can default to enable both on lower layers regardless of the
868 * corresponding parent options. */
818584a4 869 qdict_set_default_str(child_options, BDRV_OPT_DISCARD, "unmap");
0b50cc88 870
0b50cc88 871 /* Clear flags that only apply to the top layer */
abb06c5a
DB
872 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ |
873 BDRV_O_NO_IO);
0b50cc88 874
8e2160e2 875 *child_flags = flags;
0b50cc88
KW
876}
877
f3930ed0 878const BdrvChildRole child_file = {
b5411555 879 .get_parent_desc = bdrv_child_get_parent_desc,
8e2160e2 880 .inherit_options = bdrv_inherited_options,
20018e12
KW
881 .drained_begin = bdrv_child_cb_drained_begin,
882 .drained_end = bdrv_child_cb_drained_end,
38701b6a 883 .inactivate = bdrv_child_cb_inactivate,
f3930ed0
KW
884};
885
886/*
8e2160e2
KW
887 * Returns the options and flags that bs->file should get if the use of formats
888 * (and not only protocols) is permitted for it, based on the given options and
889 * flags for the parent BDS
f3930ed0 890 */
8e2160e2
KW
891static void bdrv_inherited_fmt_options(int *child_flags, QDict *child_options,
892 int parent_flags, QDict *parent_options)
f3930ed0 893{
8e2160e2
KW
894 child_file.inherit_options(child_flags, child_options,
895 parent_flags, parent_options);
896
abb06c5a 897 *child_flags &= ~(BDRV_O_PROTOCOL | BDRV_O_NO_IO);
f3930ed0
KW
898}
899
900const BdrvChildRole child_format = {
b5411555 901 .get_parent_desc = bdrv_child_get_parent_desc,
8e2160e2 902 .inherit_options = bdrv_inherited_fmt_options,
20018e12
KW
903 .drained_begin = bdrv_child_cb_drained_begin,
904 .drained_end = bdrv_child_cb_drained_end,
38701b6a 905 .inactivate = bdrv_child_cb_inactivate,
f3930ed0
KW
906};
907
db95dbba
KW
908static void bdrv_backing_attach(BdrvChild *c)
909{
910 BlockDriverState *parent = c->opaque;
911 BlockDriverState *backing_hd = c->bs;
912
913 assert(!parent->backing_blocker);
914 error_setg(&parent->backing_blocker,
915 "node is used as backing hd of '%s'",
916 bdrv_get_device_or_node_name(parent));
917
918 parent->open_flags &= ~BDRV_O_NO_BACKING;
919 pstrcpy(parent->backing_file, sizeof(parent->backing_file),
920 backing_hd->filename);
921 pstrcpy(parent->backing_format, sizeof(parent->backing_format),
922 backing_hd->drv ? backing_hd->drv->format_name : "");
923
924 bdrv_op_block_all(backing_hd, parent->backing_blocker);
925 /* Otherwise we won't be able to commit or stream */
926 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
927 parent->backing_blocker);
928 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_STREAM,
929 parent->backing_blocker);
930 /*
931 * We do backup in 3 ways:
932 * 1. drive backup
933 * The target bs is new opened, and the source is top BDS
934 * 2. blockdev backup
935 * Both the source and the target are top BDSes.
936 * 3. internal backup(used for block replication)
937 * Both the source and the target are backing file
938 *
939 * In case 1 and 2, neither the source nor the target is the backing file.
940 * In case 3, we will block the top BDS, so there is only one block job
941 * for the top BDS and its backing chain.
942 */
943 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_BACKUP_SOURCE,
944 parent->backing_blocker);
945 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_BACKUP_TARGET,
946 parent->backing_blocker);
947}
948
949static void bdrv_backing_detach(BdrvChild *c)
950{
951 BlockDriverState *parent = c->opaque;
952
953 assert(parent->backing_blocker);
954 bdrv_op_unblock_all(c->bs, parent->backing_blocker);
955 error_free(parent->backing_blocker);
956 parent->backing_blocker = NULL;
957}
958
317fc44e 959/*
8e2160e2
KW
960 * Returns the options and flags that bs->backing should get, based on the
961 * given options and flags for the parent BDS
317fc44e 962 */
8e2160e2
KW
963static void bdrv_backing_options(int *child_flags, QDict *child_options,
964 int parent_flags, QDict *parent_options)
317fc44e 965{
8e2160e2
KW
966 int flags = parent_flags;
967
b8816a43
KW
968 /* The cache mode is inherited unmodified for backing files; except WCE,
969 * which is only applied on the top level (BlockBackend) */
91a097e7
KW
970 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
971 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
5a9347c6 972 qdict_copy_default(child_options, parent_options, BDRV_OPT_FORCE_SHARE);
91a097e7 973
317fc44e 974 /* backing files always opened read-only */
f87a0e29
AG
975 qdict_set_default_str(child_options, BDRV_OPT_READ_ONLY, "on");
976 flags &= ~BDRV_O_COPY_ON_READ;
317fc44e
KW
977
978 /* snapshot=on is handled on the top layer */
8bfea15d 979 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e 980
8e2160e2 981 *child_flags = flags;
317fc44e
KW
982}
983
91ef3825 984const BdrvChildRole child_backing = {
b5411555 985 .get_parent_desc = bdrv_child_get_parent_desc,
db95dbba
KW
986 .attach = bdrv_backing_attach,
987 .detach = bdrv_backing_detach,
8e2160e2 988 .inherit_options = bdrv_backing_options,
20018e12
KW
989 .drained_begin = bdrv_child_cb_drained_begin,
990 .drained_end = bdrv_child_cb_drained_end,
38701b6a 991 .inactivate = bdrv_child_cb_inactivate,
f3930ed0
KW
992};
993
7b272452
KW
994static int bdrv_open_flags(BlockDriverState *bs, int flags)
995{
61de4c68 996 int open_flags = flags;
7b272452
KW
997
998 /*
999 * Clear flags that are internal to the block layer before opening the
1000 * image.
1001 */
20cca275 1002 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
1003
1004 /*
1005 * Snapshots should be writable.
1006 */
8bfea15d 1007 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
1008 open_flags |= BDRV_O_RDWR;
1009 }
1010
1011 return open_flags;
1012}
1013
91a097e7
KW
1014static void update_flags_from_options(int *flags, QemuOpts *opts)
1015{
1016 *flags &= ~BDRV_O_CACHE_MASK;
1017
91a097e7
KW
1018 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_NO_FLUSH));
1019 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_NO_FLUSH, false)) {
1020 *flags |= BDRV_O_NO_FLUSH;
1021 }
1022
1023 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_DIRECT));
1024 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_DIRECT, false)) {
1025 *flags |= BDRV_O_NOCACHE;
1026 }
f87a0e29
AG
1027
1028 *flags &= ~BDRV_O_RDWR;
1029
1030 assert(qemu_opt_find(opts, BDRV_OPT_READ_ONLY));
1031 if (!qemu_opt_get_bool(opts, BDRV_OPT_READ_ONLY, false)) {
1032 *flags |= BDRV_O_RDWR;
1033 }
1034
91a097e7
KW
1035}
1036
1037static void update_options_from_flags(QDict *options, int flags)
1038{
91a097e7 1039 if (!qdict_haskey(options, BDRV_OPT_CACHE_DIRECT)) {
46f5ac20 1040 qdict_put_bool(options, BDRV_OPT_CACHE_DIRECT, flags & BDRV_O_NOCACHE);
91a097e7
KW
1041 }
1042 if (!qdict_haskey(options, BDRV_OPT_CACHE_NO_FLUSH)) {
46f5ac20
EB
1043 qdict_put_bool(options, BDRV_OPT_CACHE_NO_FLUSH,
1044 flags & BDRV_O_NO_FLUSH);
91a097e7 1045 }
f87a0e29 1046 if (!qdict_haskey(options, BDRV_OPT_READ_ONLY)) {
46f5ac20 1047 qdict_put_bool(options, BDRV_OPT_READ_ONLY, !(flags & BDRV_O_RDWR));
f87a0e29 1048 }
91a097e7
KW
1049}
1050
636ea370
KW
1051static void bdrv_assign_node_name(BlockDriverState *bs,
1052 const char *node_name,
1053 Error **errp)
6913c0c2 1054{
15489c76 1055 char *gen_node_name = NULL;
6913c0c2 1056
15489c76
JC
1057 if (!node_name) {
1058 node_name = gen_node_name = id_generate(ID_BLOCK);
1059 } else if (!id_wellformed(node_name)) {
1060 /*
1061 * Check for empty string or invalid characters, but not if it is
1062 * generated (generated names use characters not available to the user)
1063 */
9aebf3b8 1064 error_setg(errp, "Invalid node name");
636ea370 1065 return;
6913c0c2
BC
1066 }
1067
0c5e94ee 1068 /* takes care of avoiding namespaces collisions */
7f06d47e 1069 if (blk_by_name(node_name)) {
0c5e94ee
BC
1070 error_setg(errp, "node-name=%s is conflicting with a device id",
1071 node_name);
15489c76 1072 goto out;
0c5e94ee
BC
1073 }
1074
6913c0c2
BC
1075 /* takes care of avoiding duplicates node names */
1076 if (bdrv_find_node(node_name)) {
1077 error_setg(errp, "Duplicate node name");
15489c76 1078 goto out;
6913c0c2
BC
1079 }
1080
1081 /* copy node name into the bs and insert it into the graph list */
1082 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
1083 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
15489c76
JC
1084out:
1085 g_free(gen_node_name);
6913c0c2
BC
1086}
1087
01a56501
KW
1088static int bdrv_open_driver(BlockDriverState *bs, BlockDriver *drv,
1089 const char *node_name, QDict *options,
1090 int open_flags, Error **errp)
1091{
1092 Error *local_err = NULL;
1093 int ret;
1094
1095 bdrv_assign_node_name(bs, node_name, &local_err);
1096 if (local_err) {
1097 error_propagate(errp, local_err);
1098 return -EINVAL;
1099 }
1100
1101 bs->drv = drv;
680c7f96 1102 bs->read_only = !(bs->open_flags & BDRV_O_RDWR);
01a56501
KW
1103 bs->opaque = g_malloc0(drv->instance_size);
1104
1105 if (drv->bdrv_file_open) {
1106 assert(!drv->bdrv_needs_filename || bs->filename[0]);
1107 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
680c7f96 1108 } else if (drv->bdrv_open) {
01a56501 1109 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
680c7f96
KW
1110 } else {
1111 ret = 0;
01a56501
KW
1112 }
1113
1114 if (ret < 0) {
1115 if (local_err) {
1116 error_propagate(errp, local_err);
1117 } else if (bs->filename[0]) {
1118 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
1119 } else {
1120 error_setg_errno(errp, -ret, "Could not open image");
1121 }
180ca19a 1122 goto open_failed;
01a56501
KW
1123 }
1124
1125 ret = refresh_total_sectors(bs, bs->total_sectors);
1126 if (ret < 0) {
1127 error_setg_errno(errp, -ret, "Could not refresh total sector count");
180ca19a 1128 return ret;
01a56501
KW
1129 }
1130
1131 bdrv_refresh_limits(bs, &local_err);
1132 if (local_err) {
1133 error_propagate(errp, local_err);
180ca19a 1134 return -EINVAL;
01a56501
KW
1135 }
1136
1137 assert(bdrv_opt_mem_align(bs) != 0);
1138 assert(bdrv_min_mem_align(bs) != 0);
1139 assert(is_power_of_2(bs->bl.request_alignment));
1140
1141 return 0;
180ca19a
MP
1142open_failed:
1143 bs->drv = NULL;
1144 if (bs->file != NULL) {
1145 bdrv_unref_child(bs, bs->file);
1146 bs->file = NULL;
1147 }
01a56501
KW
1148 g_free(bs->opaque);
1149 bs->opaque = NULL;
01a56501
KW
1150 return ret;
1151}
1152
680c7f96
KW
1153BlockDriverState *bdrv_new_open_driver(BlockDriver *drv, const char *node_name,
1154 int flags, Error **errp)
1155{
1156 BlockDriverState *bs;
1157 int ret;
1158
1159 bs = bdrv_new();
1160 bs->open_flags = flags;
1161 bs->explicit_options = qdict_new();
1162 bs->options = qdict_new();
1163 bs->opaque = NULL;
1164
1165 update_options_from_flags(bs->options, flags);
1166
1167 ret = bdrv_open_driver(bs, drv, node_name, bs->options, flags, errp);
1168 if (ret < 0) {
1169 QDECREF(bs->explicit_options);
180ca19a 1170 bs->explicit_options = NULL;
680c7f96 1171 QDECREF(bs->options);
180ca19a 1172 bs->options = NULL;
680c7f96
KW
1173 bdrv_unref(bs);
1174 return NULL;
1175 }
1176
1177 return bs;
1178}
1179
c5f3014b 1180QemuOptsList bdrv_runtime_opts = {
18edf289
KW
1181 .name = "bdrv_common",
1182 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
1183 .desc = {
1184 {
1185 .name = "node-name",
1186 .type = QEMU_OPT_STRING,
1187 .help = "Node name of the block device node",
1188 },
62392ebb
KW
1189 {
1190 .name = "driver",
1191 .type = QEMU_OPT_STRING,
1192 .help = "Block driver to use for the node",
1193 },
91a097e7
KW
1194 {
1195 .name = BDRV_OPT_CACHE_DIRECT,
1196 .type = QEMU_OPT_BOOL,
1197 .help = "Bypass software writeback cache on the host",
1198 },
1199 {
1200 .name = BDRV_OPT_CACHE_NO_FLUSH,
1201 .type = QEMU_OPT_BOOL,
1202 .help = "Ignore flush requests",
1203 },
f87a0e29
AG
1204 {
1205 .name = BDRV_OPT_READ_ONLY,
1206 .type = QEMU_OPT_BOOL,
1207 .help = "Node is opened in read-only mode",
1208 },
692e01a2
KW
1209 {
1210 .name = "detect-zeroes",
1211 .type = QEMU_OPT_STRING,
1212 .help = "try to optimize zero writes (off, on, unmap)",
1213 },
818584a4
KW
1214 {
1215 .name = "discard",
1216 .type = QEMU_OPT_STRING,
1217 .help = "discard operation (ignore/off, unmap/on)",
1218 },
5a9347c6
FZ
1219 {
1220 .name = BDRV_OPT_FORCE_SHARE,
1221 .type = QEMU_OPT_BOOL,
1222 .help = "always accept other writers (default: off)",
1223 },
18edf289
KW
1224 { /* end of list */ }
1225 },
1226};
1227
57915332
KW
1228/*
1229 * Common part for opening disk images and files
b6ad491a
KW
1230 *
1231 * Removes all processed options from *options.
57915332 1232 */
5696c6e3 1233static int bdrv_open_common(BlockDriverState *bs, BlockBackend *file,
82dc8b41 1234 QDict *options, Error **errp)
57915332
KW
1235{
1236 int ret, open_flags;
035fccdf 1237 const char *filename;
62392ebb 1238 const char *driver_name = NULL;
6913c0c2 1239 const char *node_name = NULL;
818584a4 1240 const char *discard;
692e01a2 1241 const char *detect_zeroes;
18edf289 1242 QemuOpts *opts;
62392ebb 1243 BlockDriver *drv;
34b5d2c6 1244 Error *local_err = NULL;
57915332 1245
6405875c 1246 assert(bs->file == NULL);
707ff828 1247 assert(options != NULL && bs->options != options);
57915332 1248
62392ebb
KW
1249 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
1250 qemu_opts_absorb_qdict(opts, options, &local_err);
1251 if (local_err) {
1252 error_propagate(errp, local_err);
1253 ret = -EINVAL;
1254 goto fail_opts;
1255 }
1256
9b7e8691
AG
1257 update_flags_from_options(&bs->open_flags, opts);
1258
62392ebb
KW
1259 driver_name = qemu_opt_get(opts, "driver");
1260 drv = bdrv_find_format(driver_name);
1261 assert(drv != NULL);
1262
5a9347c6
FZ
1263 bs->force_share = qemu_opt_get_bool(opts, BDRV_OPT_FORCE_SHARE, false);
1264
1265 if (bs->force_share && (bs->open_flags & BDRV_O_RDWR)) {
1266 error_setg(errp,
1267 BDRV_OPT_FORCE_SHARE
1268 "=on can only be used with read-only images");
1269 ret = -EINVAL;
1270 goto fail_opts;
1271 }
1272
45673671 1273 if (file != NULL) {
5696c6e3 1274 filename = blk_bs(file)->filename;
45673671 1275 } else {
129c7d1c
MA
1276 /*
1277 * Caution: while qdict_get_try_str() is fine, getting
1278 * non-string types would require more care. When @options
1279 * come from -blockdev or blockdev_add, its members are typed
1280 * according to the QAPI schema, but when they come from
1281 * -drive, they're all QString.
1282 */
45673671
KW
1283 filename = qdict_get_try_str(options, "filename");
1284 }
1285
4a008240 1286 if (drv->bdrv_needs_filename && (!filename || !filename[0])) {
765003db
KW
1287 error_setg(errp, "The '%s' block driver requires a file name",
1288 drv->format_name);
18edf289
KW
1289 ret = -EINVAL;
1290 goto fail_opts;
6913c0c2 1291 }
6913c0c2 1292
82dc8b41
KW
1293 trace_bdrv_open_common(bs, filename ?: "", bs->open_flags,
1294 drv->format_name);
62392ebb 1295
82dc8b41 1296 bs->read_only = !(bs->open_flags & BDRV_O_RDWR);
b64ec4e4
FZ
1297
1298 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
1299 error_setg(errp,
1300 !bs->read_only && bdrv_is_whitelisted(drv, true)
1301 ? "Driver '%s' can only be used for read-only devices"
1302 : "Driver '%s' is not whitelisted",
1303 drv->format_name);
18edf289
KW
1304 ret = -ENOTSUP;
1305 goto fail_opts;
b64ec4e4 1306 }
57915332 1307
d3faa13e
PB
1308 /* bdrv_new() and bdrv_close() make it so */
1309 assert(atomic_read(&bs->copy_on_read) == 0);
1310
82dc8b41 1311 if (bs->open_flags & BDRV_O_COPY_ON_READ) {
0ebd24e0
KW
1312 if (!bs->read_only) {
1313 bdrv_enable_copy_on_read(bs);
1314 } else {
1315 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
1316 ret = -EINVAL;
1317 goto fail_opts;
0ebd24e0 1318 }
53fec9d3
SH
1319 }
1320
818584a4
KW
1321 discard = qemu_opt_get(opts, "discard");
1322 if (discard != NULL) {
1323 if (bdrv_parse_discard_flags(discard, &bs->open_flags) != 0) {
1324 error_setg(errp, "Invalid discard option");
1325 ret = -EINVAL;
1326 goto fail_opts;
1327 }
1328 }
1329
692e01a2
KW
1330 detect_zeroes = qemu_opt_get(opts, "detect-zeroes");
1331 if (detect_zeroes) {
1332 BlockdevDetectZeroesOptions value =
f7abe0ec 1333 qapi_enum_parse(&BlockdevDetectZeroesOptions_lookup,
692e01a2 1334 detect_zeroes,
692e01a2
KW
1335 BLOCKDEV_DETECT_ZEROES_OPTIONS_OFF,
1336 &local_err);
1337 if (local_err) {
1338 error_propagate(errp, local_err);
1339 ret = -EINVAL;
1340 goto fail_opts;
1341 }
1342
1343 if (value == BLOCKDEV_DETECT_ZEROES_OPTIONS_UNMAP &&
1344 !(bs->open_flags & BDRV_O_UNMAP))
1345 {
1346 error_setg(errp, "setting detect-zeroes to unmap is not allowed "
1347 "without setting discard operation to unmap");
1348 ret = -EINVAL;
1349 goto fail_opts;
1350 }
1351
1352 bs->detect_zeroes = value;
1353 }
1354
c2ad1b0c
KW
1355 if (filename != NULL) {
1356 pstrcpy(bs->filename, sizeof(bs->filename), filename);
1357 } else {
1358 bs->filename[0] = '\0';
1359 }
91af7014 1360 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 1361
66f82cee 1362 /* Open the image, either directly or using a protocol */
82dc8b41 1363 open_flags = bdrv_open_flags(bs, bs->open_flags);
01a56501 1364 node_name = qemu_opt_get(opts, "node-name");
57915332 1365
01a56501
KW
1366 assert(!drv->bdrv_file_open || file == NULL);
1367 ret = bdrv_open_driver(bs, drv, node_name, options, open_flags, errp);
51762288 1368 if (ret < 0) {
01a56501 1369 goto fail_opts;
3baca891
KW
1370 }
1371
18edf289 1372 qemu_opts_del(opts);
57915332
KW
1373 return 0;
1374
18edf289
KW
1375fail_opts:
1376 qemu_opts_del(opts);
57915332
KW
1377 return ret;
1378}
1379
5e5c4f63
KW
1380static QDict *parse_json_filename(const char *filename, Error **errp)
1381{
1382 QObject *options_obj;
1383 QDict *options;
1384 int ret;
1385
1386 ret = strstart(filename, "json:", &filename);
1387 assert(ret);
1388
5577fff7 1389 options_obj = qobject_from_json(filename, errp);
5e5c4f63 1390 if (!options_obj) {
5577fff7
MA
1391 /* Work around qobject_from_json() lossage TODO fix that */
1392 if (errp && !*errp) {
1393 error_setg(errp, "Could not parse the JSON options");
1394 return NULL;
1395 }
1396 error_prepend(errp, "Could not parse the JSON options: ");
5e5c4f63
KW
1397 return NULL;
1398 }
1399
ca6b6e1e
MA
1400 options = qobject_to_qdict(options_obj);
1401 if (!options) {
5e5c4f63
KW
1402 qobject_decref(options_obj);
1403 error_setg(errp, "Invalid JSON object given");
1404 return NULL;
1405 }
1406
5e5c4f63
KW
1407 qdict_flatten(options);
1408
1409 return options;
1410}
1411
de3b53f0
KW
1412static void parse_json_protocol(QDict *options, const char **pfilename,
1413 Error **errp)
1414{
1415 QDict *json_options;
1416 Error *local_err = NULL;
1417
1418 /* Parse json: pseudo-protocol */
1419 if (!*pfilename || !g_str_has_prefix(*pfilename, "json:")) {
1420 return;
1421 }
1422
1423 json_options = parse_json_filename(*pfilename, &local_err);
1424 if (local_err) {
1425 error_propagate(errp, local_err);
1426 return;
1427 }
1428
1429 /* Options given in the filename have lower priority than options
1430 * specified directly */
1431 qdict_join(options, json_options, false);
1432 QDECREF(json_options);
1433 *pfilename = NULL;
1434}
1435
b6ce07aa 1436/*
f54120ff
KW
1437 * Fills in default options for opening images and converts the legacy
1438 * filename/flags pair to option QDict entries.
53a29513
HR
1439 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
1440 * block driver has been specified explicitly.
b6ce07aa 1441 */
de3b53f0 1442static int bdrv_fill_options(QDict **options, const char *filename,
053e1578 1443 int *flags, Error **errp)
ea2384d3 1444{
c2ad1b0c 1445 const char *drvname;
53a29513 1446 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 1447 bool parse_filename = false;
053e1578 1448 BlockDriver *drv = NULL;
34b5d2c6 1449 Error *local_err = NULL;
83f64091 1450
129c7d1c
MA
1451 /*
1452 * Caution: while qdict_get_try_str() is fine, getting non-string
1453 * types would require more care. When @options come from
1454 * -blockdev or blockdev_add, its members are typed according to
1455 * the QAPI schema, but when they come from -drive, they're all
1456 * QString.
1457 */
53a29513 1458 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1459 if (drvname) {
1460 drv = bdrv_find_format(drvname);
1461 if (!drv) {
1462 error_setg(errp, "Unknown driver '%s'", drvname);
1463 return -ENOENT;
1464 }
1465 /* If the user has explicitly specified the driver, this choice should
1466 * override the BDRV_O_PROTOCOL flag */
1467 protocol = drv->bdrv_file_open;
53a29513
HR
1468 }
1469
1470 if (protocol) {
1471 *flags |= BDRV_O_PROTOCOL;
1472 } else {
1473 *flags &= ~BDRV_O_PROTOCOL;
1474 }
1475
91a097e7
KW
1476 /* Translate cache options from flags into options */
1477 update_options_from_flags(*options, *flags);
1478
035fccdf 1479 /* Fetch the file name from the options QDict if necessary */
17b005f1 1480 if (protocol && filename) {
f54120ff 1481 if (!qdict_haskey(*options, "filename")) {
46f5ac20 1482 qdict_put_str(*options, "filename", filename);
f54120ff
KW
1483 parse_filename = true;
1484 } else {
1485 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1486 "the same time");
1487 return -EINVAL;
1488 }
035fccdf
KW
1489 }
1490
c2ad1b0c 1491 /* Find the right block driver */
129c7d1c 1492 /* See cautionary note on accessing @options above */
f54120ff 1493 filename = qdict_get_try_str(*options, "filename");
f54120ff 1494
053e1578
HR
1495 if (!drvname && protocol) {
1496 if (filename) {
1497 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1498 if (!drv) {
053e1578 1499 return -EINVAL;
17b005f1 1500 }
053e1578
HR
1501
1502 drvname = drv->format_name;
46f5ac20 1503 qdict_put_str(*options, "driver", drvname);
053e1578
HR
1504 } else {
1505 error_setg(errp, "Must specify either driver or file");
1506 return -EINVAL;
98289620 1507 }
c2ad1b0c
KW
1508 }
1509
17b005f1 1510 assert(drv || !protocol);
c2ad1b0c 1511
f54120ff 1512 /* Driver-specific filename parsing */
17b005f1 1513 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1514 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1515 if (local_err) {
34b5d2c6 1516 error_propagate(errp, local_err);
f54120ff 1517 return -EINVAL;
6963a30d 1518 }
cd5d031e
HR
1519
1520 if (!drv->bdrv_needs_filename) {
1521 qdict_del(*options, "filename");
cd5d031e 1522 }
6963a30d
KW
1523 }
1524
f54120ff
KW
1525 return 0;
1526}
1527
3121fb45
KW
1528static int bdrv_child_check_perm(BdrvChild *c, BlockReopenQueue *q,
1529 uint64_t perm, uint64_t shared,
c1cef672
FZ
1530 GSList *ignore_children, Error **errp);
1531static void bdrv_child_abort_perm_update(BdrvChild *c);
1532static void bdrv_child_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared);
1533
148eb13c
KW
1534typedef struct BlockReopenQueueEntry {
1535 bool prepared;
1536 BDRVReopenState state;
1537 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
1538} BlockReopenQueueEntry;
1539
1540/*
1541 * Return the flags that @bs will have after the reopens in @q have
1542 * successfully completed. If @q is NULL (or @bs is not contained in @q),
1543 * return the current flags.
1544 */
1545static int bdrv_reopen_get_flags(BlockReopenQueue *q, BlockDriverState *bs)
1546{
1547 BlockReopenQueueEntry *entry;
1548
1549 if (q != NULL) {
1550 QSIMPLEQ_FOREACH(entry, q, entry) {
1551 if (entry->state.bs == bs) {
1552 return entry->state.flags;
1553 }
1554 }
1555 }
1556
1557 return bs->open_flags;
1558}
1559
1560/* Returns whether the image file can be written to after the reopen queue @q
1561 * has been successfully applied, or right now if @q is NULL. */
1562static bool bdrv_is_writable(BlockDriverState *bs, BlockReopenQueue *q)
1563{
1564 int flags = bdrv_reopen_get_flags(q, bs);
1565
1566 return (flags & (BDRV_O_RDWR | BDRV_O_INACTIVE)) == BDRV_O_RDWR;
1567}
1568
ffd1a5a2 1569static void bdrv_child_perm(BlockDriverState *bs, BlockDriverState *child_bs,
e0995dc3
KW
1570 BdrvChild *c, const BdrvChildRole *role,
1571 BlockReopenQueue *reopen_queue,
ffd1a5a2
FZ
1572 uint64_t parent_perm, uint64_t parent_shared,
1573 uint64_t *nperm, uint64_t *nshared)
1574{
1575 if (bs->drv && bs->drv->bdrv_child_perm) {
e0995dc3 1576 bs->drv->bdrv_child_perm(bs, c, role, reopen_queue,
ffd1a5a2
FZ
1577 parent_perm, parent_shared,
1578 nperm, nshared);
1579 }
e0995dc3 1580 /* TODO Take force_share from reopen_queue */
ffd1a5a2
FZ
1581 if (child_bs && child_bs->force_share) {
1582 *nshared = BLK_PERM_ALL;
1583 }
1584}
1585
33a610c3
KW
1586/*
1587 * Check whether permissions on this node can be changed in a way that
1588 * @cumulative_perms and @cumulative_shared_perms are the new cumulative
1589 * permissions of all its parents. This involves checking whether all necessary
1590 * permission changes to child nodes can be performed.
1591 *
1592 * A call to this function must always be followed by a call to bdrv_set_perm()
1593 * or bdrv_abort_perm_update().
1594 */
3121fb45
KW
1595static int bdrv_check_perm(BlockDriverState *bs, BlockReopenQueue *q,
1596 uint64_t cumulative_perms,
46181129
KW
1597 uint64_t cumulative_shared_perms,
1598 GSList *ignore_children, Error **errp)
33a610c3
KW
1599{
1600 BlockDriver *drv = bs->drv;
1601 BdrvChild *c;
1602 int ret;
1603
1604 /* Write permissions never work with read-only images */
1605 if ((cumulative_perms & (BLK_PERM_WRITE | BLK_PERM_WRITE_UNCHANGED)) &&
148eb13c 1606 !bdrv_is_writable(bs, q))
33a610c3
KW
1607 {
1608 error_setg(errp, "Block node is read-only");
1609 return -EPERM;
1610 }
1611
1612 /* Check this node */
1613 if (!drv) {
1614 return 0;
1615 }
1616
1617 if (drv->bdrv_check_perm) {
1618 return drv->bdrv_check_perm(bs, cumulative_perms,
1619 cumulative_shared_perms, errp);
1620 }
1621
78e421c9 1622 /* Drivers that never have children can omit .bdrv_child_perm() */
33a610c3 1623 if (!drv->bdrv_child_perm) {
78e421c9 1624 assert(QLIST_EMPTY(&bs->children));
33a610c3
KW
1625 return 0;
1626 }
1627
1628 /* Check all children */
1629 QLIST_FOREACH(c, &bs->children, next) {
1630 uint64_t cur_perm, cur_shared;
3121fb45 1631 bdrv_child_perm(bs, c->bs, c, c->role, q,
ffd1a5a2
FZ
1632 cumulative_perms, cumulative_shared_perms,
1633 &cur_perm, &cur_shared);
3121fb45
KW
1634 ret = bdrv_child_check_perm(c, q, cur_perm, cur_shared,
1635 ignore_children, errp);
33a610c3
KW
1636 if (ret < 0) {
1637 return ret;
1638 }
1639 }
1640
1641 return 0;
1642}
1643
1644/*
1645 * Notifies drivers that after a previous bdrv_check_perm() call, the
1646 * permission update is not performed and any preparations made for it (e.g.
1647 * taken file locks) need to be undone.
1648 *
1649 * This function recursively notifies all child nodes.
1650 */
1651static void bdrv_abort_perm_update(BlockDriverState *bs)
1652{
1653 BlockDriver *drv = bs->drv;
1654 BdrvChild *c;
1655
1656 if (!drv) {
1657 return;
1658 }
1659
1660 if (drv->bdrv_abort_perm_update) {
1661 drv->bdrv_abort_perm_update(bs);
1662 }
1663
1664 QLIST_FOREACH(c, &bs->children, next) {
1665 bdrv_child_abort_perm_update(c);
1666 }
1667}
1668
1669static void bdrv_set_perm(BlockDriverState *bs, uint64_t cumulative_perms,
1670 uint64_t cumulative_shared_perms)
1671{
1672 BlockDriver *drv = bs->drv;
1673 BdrvChild *c;
1674
1675 if (!drv) {
1676 return;
1677 }
1678
1679 /* Update this node */
1680 if (drv->bdrv_set_perm) {
1681 drv->bdrv_set_perm(bs, cumulative_perms, cumulative_shared_perms);
1682 }
1683
78e421c9 1684 /* Drivers that never have children can omit .bdrv_child_perm() */
33a610c3 1685 if (!drv->bdrv_child_perm) {
78e421c9 1686 assert(QLIST_EMPTY(&bs->children));
33a610c3
KW
1687 return;
1688 }
1689
1690 /* Update all children */
1691 QLIST_FOREACH(c, &bs->children, next) {
1692 uint64_t cur_perm, cur_shared;
e0995dc3 1693 bdrv_child_perm(bs, c->bs, c, c->role, NULL,
ffd1a5a2
FZ
1694 cumulative_perms, cumulative_shared_perms,
1695 &cur_perm, &cur_shared);
33a610c3
KW
1696 bdrv_child_set_perm(c, cur_perm, cur_shared);
1697 }
1698}
1699
1700static void bdrv_get_cumulative_perm(BlockDriverState *bs, uint64_t *perm,
1701 uint64_t *shared_perm)
1702{
1703 BdrvChild *c;
1704 uint64_t cumulative_perms = 0;
1705 uint64_t cumulative_shared_perms = BLK_PERM_ALL;
1706
1707 QLIST_FOREACH(c, &bs->parents, next_parent) {
1708 cumulative_perms |= c->perm;
1709 cumulative_shared_perms &= c->shared_perm;
1710 }
1711
1712 *perm = cumulative_perms;
1713 *shared_perm = cumulative_shared_perms;
1714}
1715
d083319f
KW
1716static char *bdrv_child_user_desc(BdrvChild *c)
1717{
1718 if (c->role->get_parent_desc) {
1719 return c->role->get_parent_desc(c);
1720 }
1721
1722 return g_strdup("another user");
1723}
1724
5176196c 1725char *bdrv_perm_names(uint64_t perm)
d083319f
KW
1726{
1727 struct perm_name {
1728 uint64_t perm;
1729 const char *name;
1730 } permissions[] = {
1731 { BLK_PERM_CONSISTENT_READ, "consistent read" },
1732 { BLK_PERM_WRITE, "write" },
1733 { BLK_PERM_WRITE_UNCHANGED, "write unchanged" },
1734 { BLK_PERM_RESIZE, "resize" },
1735 { BLK_PERM_GRAPH_MOD, "change children" },
1736 { 0, NULL }
1737 };
1738
1739 char *result = g_strdup("");
1740 struct perm_name *p;
1741
1742 for (p = permissions; p->name; p++) {
1743 if (perm & p->perm) {
1744 char *old = result;
1745 result = g_strdup_printf("%s%s%s", old, *old ? ", " : "", p->name);
1746 g_free(old);
1747 }
1748 }
1749
1750 return result;
1751}
1752
33a610c3
KW
1753/*
1754 * Checks whether a new reference to @bs can be added if the new user requires
46181129
KW
1755 * @new_used_perm/@new_shared_perm as its permissions. If @ignore_children is
1756 * set, the BdrvChild objects in this list are ignored in the calculations;
1757 * this allows checking permission updates for an existing reference.
33a610c3
KW
1758 *
1759 * Needs to be followed by a call to either bdrv_set_perm() or
1760 * bdrv_abort_perm_update(). */
3121fb45
KW
1761static int bdrv_check_update_perm(BlockDriverState *bs, BlockReopenQueue *q,
1762 uint64_t new_used_perm,
d5e6f437 1763 uint64_t new_shared_perm,
46181129 1764 GSList *ignore_children, Error **errp)
d5e6f437
KW
1765{
1766 BdrvChild *c;
33a610c3
KW
1767 uint64_t cumulative_perms = new_used_perm;
1768 uint64_t cumulative_shared_perms = new_shared_perm;
d5e6f437
KW
1769
1770 /* There is no reason why anyone couldn't tolerate write_unchanged */
1771 assert(new_shared_perm & BLK_PERM_WRITE_UNCHANGED);
1772
1773 QLIST_FOREACH(c, &bs->parents, next_parent) {
46181129 1774 if (g_slist_find(ignore_children, c)) {
d5e6f437
KW
1775 continue;
1776 }
1777
d083319f
KW
1778 if ((new_used_perm & c->shared_perm) != new_used_perm) {
1779 char *user = bdrv_child_user_desc(c);
1780 char *perm_names = bdrv_perm_names(new_used_perm & ~c->shared_perm);
1781 error_setg(errp, "Conflicts with use by %s as '%s', which does not "
1782 "allow '%s' on %s",
1783 user, c->name, perm_names, bdrv_get_node_name(c->bs));
1784 g_free(user);
1785 g_free(perm_names);
1786 return -EPERM;
1787 }
1788
1789 if ((c->perm & new_shared_perm) != c->perm) {
1790 char *user = bdrv_child_user_desc(c);
1791 char *perm_names = bdrv_perm_names(c->perm & ~new_shared_perm);
1792 error_setg(errp, "Conflicts with use by %s as '%s', which uses "
1793 "'%s' on %s",
1794 user, c->name, perm_names, bdrv_get_node_name(c->bs));
1795 g_free(user);
1796 g_free(perm_names);
d5e6f437
KW
1797 return -EPERM;
1798 }
33a610c3
KW
1799
1800 cumulative_perms |= c->perm;
1801 cumulative_shared_perms &= c->shared_perm;
d5e6f437
KW
1802 }
1803
3121fb45 1804 return bdrv_check_perm(bs, q, cumulative_perms, cumulative_shared_perms,
46181129 1805 ignore_children, errp);
33a610c3
KW
1806}
1807
1808/* Needs to be followed by a call to either bdrv_child_set_perm() or
1809 * bdrv_child_abort_perm_update(). */
3121fb45
KW
1810static int bdrv_child_check_perm(BdrvChild *c, BlockReopenQueue *q,
1811 uint64_t perm, uint64_t shared,
c1cef672 1812 GSList *ignore_children, Error **errp)
33a610c3 1813{
46181129
KW
1814 int ret;
1815
1816 ignore_children = g_slist_prepend(g_slist_copy(ignore_children), c);
3121fb45 1817 ret = bdrv_check_update_perm(c->bs, q, perm, shared, ignore_children, errp);
46181129
KW
1818 g_slist_free(ignore_children);
1819
1820 return ret;
33a610c3
KW
1821}
1822
c1cef672 1823static void bdrv_child_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared)
33a610c3
KW
1824{
1825 uint64_t cumulative_perms, cumulative_shared_perms;
1826
1827 c->perm = perm;
1828 c->shared_perm = shared;
1829
1830 bdrv_get_cumulative_perm(c->bs, &cumulative_perms,
1831 &cumulative_shared_perms);
1832 bdrv_set_perm(c->bs, cumulative_perms, cumulative_shared_perms);
1833}
1834
c1cef672 1835static void bdrv_child_abort_perm_update(BdrvChild *c)
33a610c3
KW
1836{
1837 bdrv_abort_perm_update(c->bs);
1838}
1839
1840int bdrv_child_try_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared,
1841 Error **errp)
1842{
1843 int ret;
1844
3121fb45 1845 ret = bdrv_child_check_perm(c, NULL, perm, shared, NULL, errp);
33a610c3
KW
1846 if (ret < 0) {
1847 bdrv_child_abort_perm_update(c);
1848 return ret;
1849 }
1850
1851 bdrv_child_set_perm(c, perm, shared);
1852
d5e6f437
KW
1853 return 0;
1854}
1855
6a1b9ee1
KW
1856#define DEFAULT_PERM_PASSTHROUGH (BLK_PERM_CONSISTENT_READ \
1857 | BLK_PERM_WRITE \
1858 | BLK_PERM_WRITE_UNCHANGED \
1859 | BLK_PERM_RESIZE)
1860#define DEFAULT_PERM_UNCHANGED (BLK_PERM_ALL & ~DEFAULT_PERM_PASSTHROUGH)
1861
1862void bdrv_filter_default_perms(BlockDriverState *bs, BdrvChild *c,
1863 const BdrvChildRole *role,
e0995dc3 1864 BlockReopenQueue *reopen_queue,
6a1b9ee1
KW
1865 uint64_t perm, uint64_t shared,
1866 uint64_t *nperm, uint64_t *nshared)
1867{
1868 if (c == NULL) {
1869 *nperm = perm & DEFAULT_PERM_PASSTHROUGH;
1870 *nshared = (shared & DEFAULT_PERM_PASSTHROUGH) | DEFAULT_PERM_UNCHANGED;
1871 return;
1872 }
1873
1874 *nperm = (perm & DEFAULT_PERM_PASSTHROUGH) |
1875 (c->perm & DEFAULT_PERM_UNCHANGED);
1876 *nshared = (shared & DEFAULT_PERM_PASSTHROUGH) |
1877 (c->shared_perm & DEFAULT_PERM_UNCHANGED);
1878}
1879
6b1a044a
KW
1880void bdrv_format_default_perms(BlockDriverState *bs, BdrvChild *c,
1881 const BdrvChildRole *role,
e0995dc3 1882 BlockReopenQueue *reopen_queue,
6b1a044a
KW
1883 uint64_t perm, uint64_t shared,
1884 uint64_t *nperm, uint64_t *nshared)
1885{
1886 bool backing = (role == &child_backing);
1887 assert(role == &child_backing || role == &child_file);
1888
1889 if (!backing) {
1890 /* Apart from the modifications below, the same permissions are
1891 * forwarded and left alone as for filters */
e0995dc3
KW
1892 bdrv_filter_default_perms(bs, c, role, reopen_queue, perm, shared,
1893 &perm, &shared);
6b1a044a
KW
1894
1895 /* Format drivers may touch metadata even if the guest doesn't write */
148eb13c 1896 if (bdrv_is_writable(bs, reopen_queue)) {
6b1a044a
KW
1897 perm |= BLK_PERM_WRITE | BLK_PERM_RESIZE;
1898 }
1899
1900 /* bs->file always needs to be consistent because of the metadata. We
1901 * can never allow other users to resize or write to it. */
1902 perm |= BLK_PERM_CONSISTENT_READ;
1903 shared &= ~(BLK_PERM_WRITE | BLK_PERM_RESIZE);
1904 } else {
1905 /* We want consistent read from backing files if the parent needs it.
1906 * No other operations are performed on backing files. */
1907 perm &= BLK_PERM_CONSISTENT_READ;
1908
1909 /* If the parent can deal with changing data, we're okay with a
1910 * writable and resizable backing file. */
1911 /* TODO Require !(perm & BLK_PERM_CONSISTENT_READ), too? */
1912 if (shared & BLK_PERM_WRITE) {
1913 shared = BLK_PERM_WRITE | BLK_PERM_RESIZE;
1914 } else {
1915 shared = 0;
1916 }
1917
1918 shared |= BLK_PERM_CONSISTENT_READ | BLK_PERM_GRAPH_MOD |
1919 BLK_PERM_WRITE_UNCHANGED;
1920 }
1921
9c5e6594
KW
1922 if (bs->open_flags & BDRV_O_INACTIVE) {
1923 shared |= BLK_PERM_WRITE | BLK_PERM_RESIZE;
1924 }
1925
6b1a044a
KW
1926 *nperm = perm;
1927 *nshared = shared;
1928}
1929
8ee03995
KW
1930static void bdrv_replace_child_noperm(BdrvChild *child,
1931 BlockDriverState *new_bs)
e9740bc6
KW
1932{
1933 BlockDriverState *old_bs = child->bs;
1934
bb2614e9
FZ
1935 if (old_bs && new_bs) {
1936 assert(bdrv_get_aio_context(old_bs) == bdrv_get_aio_context(new_bs));
1937 }
e9740bc6 1938 if (old_bs) {
36fe1331
KW
1939 if (old_bs->quiesce_counter && child->role->drained_end) {
1940 child->role->drained_end(child);
1941 }
db95dbba
KW
1942 if (child->role->detach) {
1943 child->role->detach(child);
1944 }
e9740bc6
KW
1945 QLIST_REMOVE(child, next_parent);
1946 }
36fe1331
KW
1947
1948 child->bs = new_bs;
1949
e9740bc6
KW
1950 if (new_bs) {
1951 QLIST_INSERT_HEAD(&new_bs->parents, child, next_parent);
36fe1331
KW
1952 if (new_bs->quiesce_counter && child->role->drained_begin) {
1953 child->role->drained_begin(child);
1954 }
33a610c3 1955
8ee03995
KW
1956 if (child->role->attach) {
1957 child->role->attach(child);
1958 }
1959 }
1960}
33a610c3 1961
466787fb
KW
1962/*
1963 * Updates @child to change its reference to point to @new_bs, including
1964 * checking and applying the necessary permisson updates both to the old node
1965 * and to @new_bs.
1966 *
1967 * NULL is passed as @new_bs for removing the reference before freeing @child.
1968 *
1969 * If @new_bs is not NULL, bdrv_check_perm() must be called beforehand, as this
1970 * function uses bdrv_set_perm() to update the permissions according to the new
1971 * reference that @new_bs gets.
1972 */
1973static void bdrv_replace_child(BdrvChild *child, BlockDriverState *new_bs)
8ee03995
KW
1974{
1975 BlockDriverState *old_bs = child->bs;
1976 uint64_t perm, shared_perm;
1977
8aecf1d1
KW
1978 bdrv_replace_child_noperm(child, new_bs);
1979
8ee03995 1980 if (old_bs) {
33a610c3
KW
1981 /* Update permissions for old node. This is guaranteed to succeed
1982 * because we're just taking a parent away, so we're loosening
1983 * restrictions. */
1984 bdrv_get_cumulative_perm(old_bs, &perm, &shared_perm);
3121fb45 1985 bdrv_check_perm(old_bs, NULL, perm, shared_perm, NULL, &error_abort);
33a610c3 1986 bdrv_set_perm(old_bs, perm, shared_perm);
e9740bc6 1987 }
36fe1331 1988
e9740bc6 1989 if (new_bs) {
33a610c3 1990 bdrv_get_cumulative_perm(new_bs, &perm, &shared_perm);
33a610c3 1991 bdrv_set_perm(new_bs, perm, shared_perm);
e9740bc6 1992 }
e9740bc6
KW
1993}
1994
f21d96d0
KW
1995BdrvChild *bdrv_root_attach_child(BlockDriverState *child_bs,
1996 const char *child_name,
36fe1331 1997 const BdrvChildRole *child_role,
d5e6f437
KW
1998 uint64_t perm, uint64_t shared_perm,
1999 void *opaque, Error **errp)
df581792 2000{
d5e6f437
KW
2001 BdrvChild *child;
2002 int ret;
2003
3121fb45 2004 ret = bdrv_check_update_perm(child_bs, NULL, perm, shared_perm, NULL, errp);
d5e6f437 2005 if (ret < 0) {
33a610c3 2006 bdrv_abort_perm_update(child_bs);
d5e6f437
KW
2007 return NULL;
2008 }
2009
2010 child = g_new(BdrvChild, 1);
df581792 2011 *child = (BdrvChild) {
d5e6f437
KW
2012 .bs = NULL,
2013 .name = g_strdup(child_name),
2014 .role = child_role,
2015 .perm = perm,
2016 .shared_perm = shared_perm,
2017 .opaque = opaque,
df581792
KW
2018 };
2019
33a610c3 2020 /* This performs the matching bdrv_set_perm() for the above check. */
466787fb 2021 bdrv_replace_child(child, child_bs);
b4b059f6
KW
2022
2023 return child;
df581792
KW
2024}
2025
98292c61
WC
2026BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
2027 BlockDriverState *child_bs,
2028 const char *child_name,
8b2ff529
KW
2029 const BdrvChildRole *child_role,
2030 Error **errp)
f21d96d0 2031{
d5e6f437 2032 BdrvChild *child;
f68c598b
KW
2033 uint64_t perm, shared_perm;
2034
2035 bdrv_get_cumulative_perm(parent_bs, &perm, &shared_perm);
2036
2037 assert(parent_bs->drv);
bb2614e9 2038 assert(bdrv_get_aio_context(parent_bs) == bdrv_get_aio_context(child_bs));
e0995dc3 2039 bdrv_child_perm(parent_bs, child_bs, NULL, child_role, NULL,
ffd1a5a2 2040 perm, shared_perm, &perm, &shared_perm);
d5e6f437 2041
d5e6f437 2042 child = bdrv_root_attach_child(child_bs, child_name, child_role,
f68c598b 2043 perm, shared_perm, parent_bs, errp);
d5e6f437
KW
2044 if (child == NULL) {
2045 return NULL;
2046 }
2047
f21d96d0
KW
2048 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
2049 return child;
2050}
2051
3f09bfbc 2052static void bdrv_detach_child(BdrvChild *child)
33a60407 2053{
f21d96d0
KW
2054 if (child->next.le_prev) {
2055 QLIST_REMOVE(child, next);
2056 child->next.le_prev = NULL;
2057 }
e9740bc6 2058
466787fb 2059 bdrv_replace_child(child, NULL);
e9740bc6 2060
260fecf1 2061 g_free(child->name);
33a60407
KW
2062 g_free(child);
2063}
2064
f21d96d0 2065void bdrv_root_unref_child(BdrvChild *child)
33a60407 2066{
779020cb
KW
2067 BlockDriverState *child_bs;
2068
f21d96d0
KW
2069 child_bs = child->bs;
2070 bdrv_detach_child(child);
2071 bdrv_unref(child_bs);
2072}
2073
2074void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
2075{
779020cb
KW
2076 if (child == NULL) {
2077 return;
2078 }
33a60407
KW
2079
2080 if (child->bs->inherits_from == parent) {
4e4bf5c4
KW
2081 BdrvChild *c;
2082
2083 /* Remove inherits_from only when the last reference between parent and
2084 * child->bs goes away. */
2085 QLIST_FOREACH(c, &parent->children, next) {
2086 if (c != child && c->bs == child->bs) {
2087 break;
2088 }
2089 }
2090 if (c == NULL) {
2091 child->bs->inherits_from = NULL;
2092 }
33a60407
KW
2093 }
2094
f21d96d0 2095 bdrv_root_unref_child(child);
33a60407
KW
2096}
2097
5c8cab48
KW
2098
2099static void bdrv_parent_cb_change_media(BlockDriverState *bs, bool load)
2100{
2101 BdrvChild *c;
2102 QLIST_FOREACH(c, &bs->parents, next_parent) {
2103 if (c->role->change_media) {
2104 c->role->change_media(c, load);
2105 }
2106 }
2107}
2108
2109static void bdrv_parent_cb_resize(BlockDriverState *bs)
2110{
2111 BdrvChild *c;
2112 QLIST_FOREACH(c, &bs->parents, next_parent) {
2113 if (c->role->resize) {
2114 c->role->resize(c);
2115 }
2116 }
2117}
2118
5db15a57
KW
2119/*
2120 * Sets the backing file link of a BDS. A new reference is created; callers
2121 * which don't need their own reference any more must call bdrv_unref().
2122 */
12fa4af6
KW
2123void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd,
2124 Error **errp)
8d24cce1 2125{
5db15a57
KW
2126 if (backing_hd) {
2127 bdrv_ref(backing_hd);
2128 }
8d24cce1 2129
760e0063 2130 if (bs->backing) {
5db15a57 2131 bdrv_unref_child(bs, bs->backing);
826b6ca0
FZ
2132 }
2133
8d24cce1 2134 if (!backing_hd) {
760e0063 2135 bs->backing = NULL;
8d24cce1
FZ
2136 goto out;
2137 }
12fa4af6 2138
8b2ff529 2139 bs->backing = bdrv_attach_child(bs, backing_hd, "backing", &child_backing,
12fa4af6
KW
2140 errp);
2141 if (!bs->backing) {
2142 bdrv_unref(backing_hd);
2143 }
826b6ca0 2144
9e7e940c
KW
2145 bdrv_refresh_filename(bs);
2146
8d24cce1 2147out:
3baca891 2148 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
2149}
2150
31ca6d07
KW
2151/*
2152 * Opens the backing file for a BlockDriverState if not yet open
2153 *
d9b7b057
KW
2154 * bdref_key specifies the key for the image's BlockdevRef in the options QDict.
2155 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
2156 * itself, all options starting with "${bdref_key}." are considered part of the
2157 * BlockdevRef.
2158 *
2159 * TODO Can this be unified with bdrv_open_image()?
31ca6d07 2160 */
d9b7b057
KW
2161int bdrv_open_backing_file(BlockDriverState *bs, QDict *parent_options,
2162 const char *bdref_key, Error **errp)
9156df12 2163{
1ba4b6a5 2164 char *backing_filename = g_malloc0(PATH_MAX);
d9b7b057
KW
2165 char *bdref_key_dot;
2166 const char *reference = NULL;
317fc44e 2167 int ret = 0;
8d24cce1 2168 BlockDriverState *backing_hd;
d9b7b057
KW
2169 QDict *options;
2170 QDict *tmp_parent_options = NULL;
34b5d2c6 2171 Error *local_err = NULL;
9156df12 2172
760e0063 2173 if (bs->backing != NULL) {
1ba4b6a5 2174 goto free_exit;
9156df12
PB
2175 }
2176
31ca6d07 2177 /* NULL means an empty set of options */
d9b7b057
KW
2178 if (parent_options == NULL) {
2179 tmp_parent_options = qdict_new();
2180 parent_options = tmp_parent_options;
31ca6d07
KW
2181 }
2182
9156df12 2183 bs->open_flags &= ~BDRV_O_NO_BACKING;
d9b7b057
KW
2184
2185 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
2186 qdict_extract_subqdict(parent_options, &options, bdref_key_dot);
2187 g_free(bdref_key_dot);
2188
129c7d1c
MA
2189 /*
2190 * Caution: while qdict_get_try_str() is fine, getting non-string
2191 * types would require more care. When @parent_options come from
2192 * -blockdev or blockdev_add, its members are typed according to
2193 * the QAPI schema, but when they come from -drive, they're all
2194 * QString.
2195 */
d9b7b057
KW
2196 reference = qdict_get_try_str(parent_options, bdref_key);
2197 if (reference || qdict_haskey(options, "file.filename")) {
1cb6f506
KW
2198 backing_filename[0] = '\0';
2199 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 2200 QDECREF(options);
1ba4b6a5 2201 goto free_exit;
dbecebdd 2202 } else {
9f07429e
HR
2203 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
2204 &local_err);
2205 if (local_err) {
2206 ret = -EINVAL;
2207 error_propagate(errp, local_err);
2208 QDECREF(options);
2209 goto free_exit;
2210 }
9156df12
PB
2211 }
2212
8ee79e70
KW
2213 if (!bs->drv || !bs->drv->supports_backing) {
2214 ret = -EINVAL;
2215 error_setg(errp, "Driver doesn't support backing files");
2216 QDECREF(options);
2217 goto free_exit;
2218 }
2219
c5f6e493 2220 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
46f5ac20 2221 qdict_put_str(options, "driver", bs->backing_format);
9156df12
PB
2222 }
2223
5b363937
HR
2224 backing_hd = bdrv_open_inherit(*backing_filename ? backing_filename : NULL,
2225 reference, options, 0, bs, &child_backing,
2226 errp);
2227 if (!backing_hd) {
9156df12 2228 bs->open_flags |= BDRV_O_NO_BACKING;
e43bfd9c 2229 error_prepend(errp, "Could not open backing file: ");
5b363937 2230 ret = -EINVAL;
1ba4b6a5 2231 goto free_exit;
9156df12 2232 }
5ce6bfe2 2233 bdrv_set_aio_context(backing_hd, bdrv_get_aio_context(bs));
df581792 2234
5db15a57
KW
2235 /* Hook up the backing file link; drop our reference, bs owns the
2236 * backing_hd reference now */
12fa4af6 2237 bdrv_set_backing_hd(bs, backing_hd, &local_err);
5db15a57 2238 bdrv_unref(backing_hd);
12fa4af6 2239 if (local_err) {
8cd1a3e4 2240 error_propagate(errp, local_err);
12fa4af6
KW
2241 ret = -EINVAL;
2242 goto free_exit;
2243 }
d80ac658 2244
d9b7b057
KW
2245 qdict_del(parent_options, bdref_key);
2246
1ba4b6a5
BC
2247free_exit:
2248 g_free(backing_filename);
d9b7b057 2249 QDECREF(tmp_parent_options);
1ba4b6a5 2250 return ret;
9156df12
PB
2251}
2252
2d6b86af
KW
2253static BlockDriverState *
2254bdrv_open_child_bs(const char *filename, QDict *options, const char *bdref_key,
2255 BlockDriverState *parent, const BdrvChildRole *child_role,
2256 bool allow_none, Error **errp)
da557aac 2257{
2d6b86af 2258 BlockDriverState *bs = NULL;
da557aac 2259 QDict *image_options;
da557aac
HR
2260 char *bdref_key_dot;
2261 const char *reference;
2262
df581792 2263 assert(child_role != NULL);
f67503e5 2264
da557aac
HR
2265 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
2266 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
2267 g_free(bdref_key_dot);
2268
129c7d1c
MA
2269 /*
2270 * Caution: while qdict_get_try_str() is fine, getting non-string
2271 * types would require more care. When @options come from
2272 * -blockdev or blockdev_add, its members are typed according to
2273 * the QAPI schema, but when they come from -drive, they're all
2274 * QString.
2275 */
da557aac
HR
2276 reference = qdict_get_try_str(options, bdref_key);
2277 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 2278 if (!allow_none) {
da557aac
HR
2279 error_setg(errp, "A block device must be specified for \"%s\"",
2280 bdref_key);
da557aac 2281 }
b20e61e0 2282 QDECREF(image_options);
da557aac
HR
2283 goto done;
2284 }
2285
5b363937
HR
2286 bs = bdrv_open_inherit(filename, reference, image_options, 0,
2287 parent, child_role, errp);
2288 if (!bs) {
df581792
KW
2289 goto done;
2290 }
2291
da557aac
HR
2292done:
2293 qdict_del(options, bdref_key);
2d6b86af
KW
2294 return bs;
2295}
2296
2297/*
2298 * Opens a disk image whose options are given as BlockdevRef in another block
2299 * device's options.
2300 *
2301 * If allow_none is true, no image will be opened if filename is false and no
2302 * BlockdevRef is given. NULL will be returned, but errp remains unset.
2303 *
2304 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
2305 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
2306 * itself, all options starting with "${bdref_key}." are considered part of the
2307 * BlockdevRef.
2308 *
2309 * The BlockdevRef will be removed from the options QDict.
2310 */
2311BdrvChild *bdrv_open_child(const char *filename,
2312 QDict *options, const char *bdref_key,
2313 BlockDriverState *parent,
2314 const BdrvChildRole *child_role,
2315 bool allow_none, Error **errp)
2316{
8b2ff529 2317 BdrvChild *c;
2d6b86af
KW
2318 BlockDriverState *bs;
2319
2320 bs = bdrv_open_child_bs(filename, options, bdref_key, parent, child_role,
2321 allow_none, errp);
2322 if (bs == NULL) {
2323 return NULL;
2324 }
2325
8b2ff529
KW
2326 c = bdrv_attach_child(parent, bs, bdref_key, child_role, errp);
2327 if (!c) {
2328 bdrv_unref(bs);
2329 return NULL;
2330 }
2331
2332 return c;
b4b059f6
KW
2333}
2334
66836189
HR
2335static BlockDriverState *bdrv_append_temp_snapshot(BlockDriverState *bs,
2336 int flags,
2337 QDict *snapshot_options,
2338 Error **errp)
b998875d
KW
2339{
2340 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 2341 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 2342 int64_t total_size;
83d0521a 2343 QemuOpts *opts = NULL;
ff6ed714 2344 BlockDriverState *bs_snapshot = NULL;
b2c2832c 2345 Error *local_err = NULL;
b998875d
KW
2346 int ret;
2347
2348 /* if snapshot, we create a temporary backing file and open it
2349 instead of opening 'filename' directly */
2350
2351 /* Get the required size from the image */
f187743a
KW
2352 total_size = bdrv_getlength(bs);
2353 if (total_size < 0) {
2354 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 2355 goto out;
f187743a 2356 }
b998875d
KW
2357
2358 /* Create the temporary image */
1ba4b6a5 2359 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
2360 if (ret < 0) {
2361 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 2362 goto out;
b998875d
KW
2363 }
2364
ef810437 2365 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 2366 &error_abort);
39101f25 2367 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
e43bfd9c 2368 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, errp);
83d0521a 2369 qemu_opts_del(opts);
b998875d 2370 if (ret < 0) {
e43bfd9c
MA
2371 error_prepend(errp, "Could not create temporary overlay '%s': ",
2372 tmp_filename);
1ba4b6a5 2373 goto out;
b998875d
KW
2374 }
2375
73176bee 2376 /* Prepare options QDict for the temporary file */
46f5ac20
EB
2377 qdict_put_str(snapshot_options, "file.driver", "file");
2378 qdict_put_str(snapshot_options, "file.filename", tmp_filename);
2379 qdict_put_str(snapshot_options, "driver", "qcow2");
b998875d 2380
5b363937 2381 bs_snapshot = bdrv_open(NULL, NULL, snapshot_options, flags, errp);
73176bee 2382 snapshot_options = NULL;
5b363937 2383 if (!bs_snapshot) {
1ba4b6a5 2384 goto out;
b998875d
KW
2385 }
2386
ff6ed714
EB
2387 /* bdrv_append() consumes a strong reference to bs_snapshot
2388 * (i.e. it will call bdrv_unref() on it) even on error, so in
2389 * order to be able to return one, we have to increase
2390 * bs_snapshot's refcount here */
66836189 2391 bdrv_ref(bs_snapshot);
b2c2832c
KW
2392 bdrv_append(bs_snapshot, bs, &local_err);
2393 if (local_err) {
2394 error_propagate(errp, local_err);
ff6ed714 2395 bs_snapshot = NULL;
b2c2832c
KW
2396 goto out;
2397 }
1ba4b6a5
BC
2398
2399out:
73176bee 2400 QDECREF(snapshot_options);
1ba4b6a5 2401 g_free(tmp_filename);
ff6ed714 2402 return bs_snapshot;
b998875d
KW
2403}
2404
b6ce07aa
KW
2405/*
2406 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
2407 *
2408 * options is a QDict of options to pass to the block drivers, or NULL for an
2409 * empty set of options. The reference to the QDict belongs to the block layer
2410 * after the call (even on failure), so if the caller intends to reuse the
2411 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
2412 *
2413 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
2414 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
2415 *
2416 * The reference parameter may be used to specify an existing block device which
2417 * should be opened. If specified, neither options nor a filename may be given,
2418 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 2419 */
5b363937
HR
2420static BlockDriverState *bdrv_open_inherit(const char *filename,
2421 const char *reference,
2422 QDict *options, int flags,
2423 BlockDriverState *parent,
2424 const BdrvChildRole *child_role,
2425 Error **errp)
ea2384d3 2426{
b6ce07aa 2427 int ret;
5696c6e3 2428 BlockBackend *file = NULL;
9a4f4c31 2429 BlockDriverState *bs;
ce343771 2430 BlockDriver *drv = NULL;
74fe54f2 2431 const char *drvname;
3e8c2e57 2432 const char *backing;
34b5d2c6 2433 Error *local_err = NULL;
73176bee 2434 QDict *snapshot_options = NULL;
b1e6fc08 2435 int snapshot_flags = 0;
712e7874 2436
f3930ed0
KW
2437 assert(!child_role || !flags);
2438 assert(!child_role == !parent);
f67503e5 2439
ddf5636d
HR
2440 if (reference) {
2441 bool options_non_empty = options ? qdict_size(options) : false;
2442 QDECREF(options);
2443
ddf5636d
HR
2444 if (filename || options_non_empty) {
2445 error_setg(errp, "Cannot reference an existing block device with "
2446 "additional options or a new filename");
5b363937 2447 return NULL;
ddf5636d
HR
2448 }
2449
2450 bs = bdrv_lookup_bs(reference, reference, errp);
2451 if (!bs) {
5b363937 2452 return NULL;
ddf5636d 2453 }
76b22320 2454
ddf5636d 2455 bdrv_ref(bs);
5b363937 2456 return bs;
ddf5636d
HR
2457 }
2458
5b363937 2459 bs = bdrv_new();
f67503e5 2460
de9c0cec
KW
2461 /* NULL means an empty set of options */
2462 if (options == NULL) {
2463 options = qdict_new();
2464 }
2465
145f598e 2466 /* json: syntax counts as explicit options, as if in the QDict */
de3b53f0
KW
2467 parse_json_protocol(options, &filename, &local_err);
2468 if (local_err) {
de3b53f0
KW
2469 goto fail;
2470 }
2471
145f598e
KW
2472 bs->explicit_options = qdict_clone_shallow(options);
2473
f3930ed0 2474 if (child_role) {
bddcec37 2475 bs->inherits_from = parent;
8e2160e2
KW
2476 child_role->inherit_options(&flags, options,
2477 parent->open_flags, parent->options);
f3930ed0
KW
2478 }
2479
de3b53f0 2480 ret = bdrv_fill_options(&options, filename, &flags, &local_err);
462f5bcf
KW
2481 if (local_err) {
2482 goto fail;
2483 }
2484
129c7d1c
MA
2485 /*
2486 * Set the BDRV_O_RDWR and BDRV_O_ALLOW_RDWR flags.
2487 * Caution: getting a boolean member of @options requires care.
2488 * When @options come from -blockdev or blockdev_add, members are
2489 * typed according to the QAPI schema, but when they come from
2490 * -drive, they're all QString.
2491 */
f87a0e29
AG
2492 if (g_strcmp0(qdict_get_try_str(options, BDRV_OPT_READ_ONLY), "on") &&
2493 !qdict_get_try_bool(options, BDRV_OPT_READ_ONLY, false)) {
2494 flags |= (BDRV_O_RDWR | BDRV_O_ALLOW_RDWR);
2495 } else {
2496 flags &= ~BDRV_O_RDWR;
14499ea5
AG
2497 }
2498
2499 if (flags & BDRV_O_SNAPSHOT) {
2500 snapshot_options = qdict_new();
2501 bdrv_temp_snapshot_options(&snapshot_flags, snapshot_options,
2502 flags, options);
f87a0e29
AG
2503 /* Let bdrv_backing_options() override "read-only" */
2504 qdict_del(options, BDRV_OPT_READ_ONLY);
14499ea5
AG
2505 bdrv_backing_options(&flags, options, flags, options);
2506 }
2507
62392ebb
KW
2508 bs->open_flags = flags;
2509 bs->options = options;
2510 options = qdict_clone_shallow(options);
2511
76c591b0 2512 /* Find the right image format driver */
129c7d1c 2513 /* See cautionary note on accessing @options above */
76c591b0
KW
2514 drvname = qdict_get_try_str(options, "driver");
2515 if (drvname) {
2516 drv = bdrv_find_format(drvname);
76c591b0
KW
2517 if (!drv) {
2518 error_setg(errp, "Unknown driver: '%s'", drvname);
76c591b0
KW
2519 goto fail;
2520 }
2521 }
2522
2523 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 2524
129c7d1c 2525 /* See cautionary note on accessing @options above */
3e8c2e57
AG
2526 backing = qdict_get_try_str(options, "backing");
2527 if (backing && *backing == '\0') {
2528 flags |= BDRV_O_NO_BACKING;
2529 qdict_del(options, "backing");
2530 }
2531
5696c6e3 2532 /* Open image file without format layer. This BlockBackend is only used for
4e4bf5c4
KW
2533 * probing, the block drivers will do their own bdrv_open_child() for the
2534 * same BDS, which is why we put the node name back into options. */
f4788adc 2535 if ((flags & BDRV_O_PROTOCOL) == 0) {
5696c6e3
KW
2536 BlockDriverState *file_bs;
2537
2538 file_bs = bdrv_open_child_bs(filename, options, "file", bs,
2539 &child_file, true, &local_err);
1fdd6933 2540 if (local_err) {
f4788adc
KW
2541 goto fail;
2542 }
5696c6e3 2543 if (file_bs != NULL) {
6d0eb64d 2544 file = blk_new(BLK_PERM_CONSISTENT_READ, BLK_PERM_ALL);
d7086422 2545 blk_insert_bs(file, file_bs, &local_err);
5696c6e3 2546 bdrv_unref(file_bs);
d7086422
KW
2547 if (local_err) {
2548 goto fail;
2549 }
5696c6e3 2550
46f5ac20 2551 qdict_put_str(options, "file", bdrv_get_node_name(file_bs));
4e4bf5c4 2552 }
f500a6d3
KW
2553 }
2554
76c591b0 2555 /* Image format probing */
38f3ef57 2556 bs->probed = !drv;
76c591b0 2557 if (!drv && file) {
cf2ab8fc 2558 ret = find_image_format(file, filename, &drv, &local_err);
17b005f1 2559 if (ret < 0) {
8bfea15d 2560 goto fail;
2a05cbe4 2561 }
62392ebb
KW
2562 /*
2563 * This option update would logically belong in bdrv_fill_options(),
2564 * but we first need to open bs->file for the probing to work, while
2565 * opening bs->file already requires the (mostly) final set of options
2566 * so that cache mode etc. can be inherited.
2567 *
2568 * Adding the driver later is somewhat ugly, but it's not an option
2569 * that would ever be inherited, so it's correct. We just need to make
2570 * sure to update both bs->options (which has the full effective
2571 * options for bs) and options (which has file.* already removed).
2572 */
46f5ac20
EB
2573 qdict_put_str(bs->options, "driver", drv->format_name);
2574 qdict_put_str(options, "driver", drv->format_name);
76c591b0 2575 } else if (!drv) {
17b005f1 2576 error_setg(errp, "Must specify either driver or file");
8bfea15d 2577 goto fail;
ea2384d3 2578 }
b6ce07aa 2579
53a29513
HR
2580 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
2581 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
2582 /* file must be NULL if a protocol BDS is about to be created
2583 * (the inverse results in an error message from bdrv_open_common()) */
2584 assert(!(flags & BDRV_O_PROTOCOL) || !file);
2585
b6ce07aa 2586 /* Open the image */
82dc8b41 2587 ret = bdrv_open_common(bs, file, options, &local_err);
b6ce07aa 2588 if (ret < 0) {
8bfea15d 2589 goto fail;
6987307c
CH
2590 }
2591
4e4bf5c4 2592 if (file) {
5696c6e3 2593 blk_unref(file);
f500a6d3
KW
2594 file = NULL;
2595 }
2596
b6ce07aa 2597 /* If there is a backing file, use it */
9156df12 2598 if ((flags & BDRV_O_NO_BACKING) == 0) {
d9b7b057 2599 ret = bdrv_open_backing_file(bs, options, "backing", &local_err);
b6ce07aa 2600 if (ret < 0) {
b6ad491a 2601 goto close_and_fail;
b6ce07aa 2602 }
b6ce07aa
KW
2603 }
2604
91af7014
HR
2605 bdrv_refresh_filename(bs);
2606
b6ad491a 2607 /* Check if any unknown options were used */
7ad2757f 2608 if (qdict_size(options) != 0) {
b6ad491a 2609 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
2610 if (flags & BDRV_O_PROTOCOL) {
2611 error_setg(errp, "Block protocol '%s' doesn't support the option "
2612 "'%s'", drv->format_name, entry->key);
2613 } else {
d0e46a55
HR
2614 error_setg(errp,
2615 "Block format '%s' does not support the option '%s'",
2616 drv->format_name, entry->key);
5acd9d81 2617 }
b6ad491a 2618
b6ad491a
KW
2619 goto close_and_fail;
2620 }
b6ad491a 2621
c01c214b 2622 bdrv_parent_cb_change_media(bs, true);
b6ce07aa 2623
c3adb58f 2624 QDECREF(options);
dd62f1ca
KW
2625
2626 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
2627 * temporary snapshot afterwards. */
2628 if (snapshot_flags) {
66836189
HR
2629 BlockDriverState *snapshot_bs;
2630 snapshot_bs = bdrv_append_temp_snapshot(bs, snapshot_flags,
2631 snapshot_options, &local_err);
73176bee 2632 snapshot_options = NULL;
dd62f1ca
KW
2633 if (local_err) {
2634 goto close_and_fail;
2635 }
5b363937
HR
2636 /* We are not going to return bs but the overlay on top of it
2637 * (snapshot_bs); thus, we have to drop the strong reference to bs
2638 * (which we obtained by calling bdrv_new()). bs will not be deleted,
2639 * though, because the overlay still has a reference to it. */
2640 bdrv_unref(bs);
2641 bs = snapshot_bs;
dd62f1ca
KW
2642 }
2643
5b363937 2644 return bs;
b6ce07aa 2645
8bfea15d 2646fail:
5696c6e3 2647 blk_unref(file);
73176bee 2648 QDECREF(snapshot_options);
145f598e 2649 QDECREF(bs->explicit_options);
de9c0cec 2650 QDECREF(bs->options);
b6ad491a 2651 QDECREF(options);
de9c0cec 2652 bs->options = NULL;
998cbd6a 2653 bs->explicit_options = NULL;
5b363937 2654 bdrv_unref(bs);
621ff94d 2655 error_propagate(errp, local_err);
5b363937 2656 return NULL;
de9c0cec 2657
b6ad491a 2658close_and_fail:
5b363937 2659 bdrv_unref(bs);
73176bee 2660 QDECREF(snapshot_options);
b6ad491a 2661 QDECREF(options);
621ff94d 2662 error_propagate(errp, local_err);
5b363937 2663 return NULL;
b6ce07aa
KW
2664}
2665
5b363937
HR
2666BlockDriverState *bdrv_open(const char *filename, const char *reference,
2667 QDict *options, int flags, Error **errp)
f3930ed0 2668{
5b363937 2669 return bdrv_open_inherit(filename, reference, options, flags, NULL,
ce343771 2670 NULL, errp);
f3930ed0
KW
2671}
2672
e971aa12
JC
2673/*
2674 * Adds a BlockDriverState to a simple queue for an atomic, transactional
2675 * reopen of multiple devices.
2676 *
2677 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
2678 * already performed, or alternatively may be NULL a new BlockReopenQueue will
2679 * be created and initialized. This newly created BlockReopenQueue should be
2680 * passed back in for subsequent calls that are intended to be of the same
2681 * atomic 'set'.
2682 *
2683 * bs is the BlockDriverState to add to the reopen queue.
2684 *
4d2cb092
KW
2685 * options contains the changed options for the associated bs
2686 * (the BlockReopenQueue takes ownership)
2687 *
e971aa12
JC
2688 * flags contains the open flags for the associated bs
2689 *
2690 * returns a pointer to bs_queue, which is either the newly allocated
2691 * bs_queue, or the existing bs_queue being used.
2692 *
2693 */
28518102
KW
2694static BlockReopenQueue *bdrv_reopen_queue_child(BlockReopenQueue *bs_queue,
2695 BlockDriverState *bs,
2696 QDict *options,
2697 int flags,
2698 const BdrvChildRole *role,
2699 QDict *parent_options,
2700 int parent_flags)
e971aa12
JC
2701{
2702 assert(bs != NULL);
2703
2704 BlockReopenQueueEntry *bs_entry;
67251a31 2705 BdrvChild *child;
145f598e 2706 QDict *old_options, *explicit_options;
67251a31 2707
e971aa12
JC
2708 if (bs_queue == NULL) {
2709 bs_queue = g_new0(BlockReopenQueue, 1);
2710 QSIMPLEQ_INIT(bs_queue);
2711 }
2712
4d2cb092
KW
2713 if (!options) {
2714 options = qdict_new();
2715 }
2716
5b7ba05f
AG
2717 /* Check if this BlockDriverState is already in the queue */
2718 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
2719 if (bs == bs_entry->state.bs) {
2720 break;
2721 }
2722 }
2723
28518102
KW
2724 /*
2725 * Precedence of options:
2726 * 1. Explicitly passed in options (highest)
91a097e7 2727 * 2. Set in flags (only for top level)
145f598e 2728 * 3. Retained from explicitly set options of bs
8e2160e2 2729 * 4. Inherited from parent node
28518102
KW
2730 * 5. Retained from effective options of bs
2731 */
2732
91a097e7
KW
2733 if (!parent_options) {
2734 /*
2735 * Any setting represented by flags is always updated. If the
2736 * corresponding QDict option is set, it takes precedence. Otherwise
2737 * the flag is translated into a QDict option. The old setting of bs is
2738 * not considered.
2739 */
2740 update_options_from_flags(options, flags);
2741 }
2742
145f598e 2743 /* Old explicitly set values (don't overwrite by inherited value) */
5b7ba05f
AG
2744 if (bs_entry) {
2745 old_options = qdict_clone_shallow(bs_entry->state.explicit_options);
2746 } else {
2747 old_options = qdict_clone_shallow(bs->explicit_options);
2748 }
145f598e
KW
2749 bdrv_join_options(bs, options, old_options);
2750 QDECREF(old_options);
2751
2752 explicit_options = qdict_clone_shallow(options);
2753
28518102
KW
2754 /* Inherit from parent node */
2755 if (parent_options) {
2756 assert(!flags);
8e2160e2 2757 role->inherit_options(&flags, options, parent_flags, parent_options);
28518102
KW
2758 }
2759
2760 /* Old values are used for options that aren't set yet */
4d2cb092 2761 old_options = qdict_clone_shallow(bs->options);
cddff5ba 2762 bdrv_join_options(bs, options, old_options);
4d2cb092
KW
2763 QDECREF(old_options);
2764
fd452021 2765 /* bdrv_open_inherit() sets and clears some additional flags internally */
f1f25a2e 2766 flags &= ~BDRV_O_PROTOCOL;
fd452021
KW
2767 if (flags & BDRV_O_RDWR) {
2768 flags |= BDRV_O_ALLOW_RDWR;
2769 }
f1f25a2e 2770
1857c97b
KW
2771 if (!bs_entry) {
2772 bs_entry = g_new0(BlockReopenQueueEntry, 1);
2773 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
2774 } else {
2775 QDECREF(bs_entry->state.options);
2776 QDECREF(bs_entry->state.explicit_options);
2777 }
2778
2779 bs_entry->state.bs = bs;
2780 bs_entry->state.options = options;
2781 bs_entry->state.explicit_options = explicit_options;
2782 bs_entry->state.flags = flags;
2783
30450259
KW
2784 /* This needs to be overwritten in bdrv_reopen_prepare() */
2785 bs_entry->state.perm = UINT64_MAX;
2786 bs_entry->state.shared_perm = 0;
2787
67251a31 2788 QLIST_FOREACH(child, &bs->children, next) {
4c9dfe5d
KW
2789 QDict *new_child_options;
2790 char *child_key_dot;
67251a31 2791
4c9dfe5d
KW
2792 /* reopen can only change the options of block devices that were
2793 * implicitly created and inherited options. For other (referenced)
2794 * block devices, a syntax like "backing.foo" results in an error. */
67251a31
KW
2795 if (child->bs->inherits_from != bs) {
2796 continue;
2797 }
2798
4c9dfe5d
KW
2799 child_key_dot = g_strdup_printf("%s.", child->name);
2800 qdict_extract_subqdict(options, &new_child_options, child_key_dot);
2801 g_free(child_key_dot);
2802
28518102
KW
2803 bdrv_reopen_queue_child(bs_queue, child->bs, new_child_options, 0,
2804 child->role, options, flags);
e971aa12
JC
2805 }
2806
e971aa12
JC
2807 return bs_queue;
2808}
2809
28518102
KW
2810BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
2811 BlockDriverState *bs,
2812 QDict *options, int flags)
2813{
2814 return bdrv_reopen_queue_child(bs_queue, bs, options, flags,
2815 NULL, NULL, 0);
2816}
2817
e971aa12
JC
2818/*
2819 * Reopen multiple BlockDriverStates atomically & transactionally.
2820 *
2821 * The queue passed in (bs_queue) must have been built up previous
2822 * via bdrv_reopen_queue().
2823 *
2824 * Reopens all BDS specified in the queue, with the appropriate
2825 * flags. All devices are prepared for reopen, and failure of any
2826 * device will cause all device changes to be abandonded, and intermediate
2827 * data cleaned up.
2828 *
2829 * If all devices prepare successfully, then the changes are committed
2830 * to all devices.
2831 *
2832 */
720150f3 2833int bdrv_reopen_multiple(AioContext *ctx, BlockReopenQueue *bs_queue, Error **errp)
e971aa12
JC
2834{
2835 int ret = -1;
2836 BlockReopenQueueEntry *bs_entry, *next;
2837 Error *local_err = NULL;
2838
2839 assert(bs_queue != NULL);
2840
c9d1a561 2841 aio_context_release(ctx);
40840e41 2842 bdrv_drain_all_begin();
c9d1a561 2843 aio_context_acquire(ctx);
e971aa12
JC
2844
2845 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
2846 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
2847 error_propagate(errp, local_err);
2848 goto cleanup;
2849 }
2850 bs_entry->prepared = true;
2851 }
2852
2853 /* If we reach this point, we have success and just need to apply the
2854 * changes
2855 */
2856 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
2857 bdrv_reopen_commit(&bs_entry->state);
2858 }
2859
2860 ret = 0;
2861
2862cleanup:
2863 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
2864 if (ret && bs_entry->prepared) {
2865 bdrv_reopen_abort(&bs_entry->state);
145f598e
KW
2866 } else if (ret) {
2867 QDECREF(bs_entry->state.explicit_options);
e971aa12 2868 }
4d2cb092 2869 QDECREF(bs_entry->state.options);
e971aa12
JC
2870 g_free(bs_entry);
2871 }
2872 g_free(bs_queue);
40840e41
AG
2873
2874 bdrv_drain_all_end();
2875
e971aa12
JC
2876 return ret;
2877}
2878
2879
2880/* Reopen a single BlockDriverState with the specified flags. */
2881int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
2882{
2883 int ret = -1;
2884 Error *local_err = NULL;
4d2cb092 2885 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12 2886
720150f3 2887 ret = bdrv_reopen_multiple(bdrv_get_aio_context(bs), queue, &local_err);
e971aa12
JC
2888 if (local_err != NULL) {
2889 error_propagate(errp, local_err);
2890 }
2891 return ret;
2892}
2893
30450259
KW
2894static BlockReopenQueueEntry *find_parent_in_reopen_queue(BlockReopenQueue *q,
2895 BdrvChild *c)
2896{
2897 BlockReopenQueueEntry *entry;
2898
2899 QSIMPLEQ_FOREACH(entry, q, entry) {
2900 BlockDriverState *bs = entry->state.bs;
2901 BdrvChild *child;
2902
2903 QLIST_FOREACH(child, &bs->children, next) {
2904 if (child == c) {
2905 return entry;
2906 }
2907 }
2908 }
2909
2910 return NULL;
2911}
2912
2913static void bdrv_reopen_perm(BlockReopenQueue *q, BlockDriverState *bs,
2914 uint64_t *perm, uint64_t *shared)
2915{
2916 BdrvChild *c;
2917 BlockReopenQueueEntry *parent;
2918 uint64_t cumulative_perms = 0;
2919 uint64_t cumulative_shared_perms = BLK_PERM_ALL;
2920
2921 QLIST_FOREACH(c, &bs->parents, next_parent) {
2922 parent = find_parent_in_reopen_queue(q, c);
2923 if (!parent) {
2924 cumulative_perms |= c->perm;
2925 cumulative_shared_perms &= c->shared_perm;
2926 } else {
2927 uint64_t nperm, nshared;
2928
2929 bdrv_child_perm(parent->state.bs, bs, c, c->role, q,
2930 parent->state.perm, parent->state.shared_perm,
2931 &nperm, &nshared);
2932
2933 cumulative_perms |= nperm;
2934 cumulative_shared_perms &= nshared;
2935 }
2936 }
2937 *perm = cumulative_perms;
2938 *shared = cumulative_shared_perms;
2939}
e971aa12
JC
2940
2941/*
2942 * Prepares a BlockDriverState for reopen. All changes are staged in the
2943 * 'opaque' field of the BDRVReopenState, which is used and allocated by
2944 * the block driver layer .bdrv_reopen_prepare()
2945 *
2946 * bs is the BlockDriverState to reopen
2947 * flags are the new open flags
2948 * queue is the reopen queue
2949 *
2950 * Returns 0 on success, non-zero on error. On error errp will be set
2951 * as well.
2952 *
2953 * On failure, bdrv_reopen_abort() will be called to clean up any data.
2954 * It is the responsibility of the caller to then call the abort() or
2955 * commit() for any other BDS that have been left in a prepare() state
2956 *
2957 */
2958int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
2959 Error **errp)
2960{
2961 int ret = -1;
2962 Error *local_err = NULL;
2963 BlockDriver *drv;
ccf9dc07
KW
2964 QemuOpts *opts;
2965 const char *value;
3d8ce171 2966 bool read_only;
e971aa12
JC
2967
2968 assert(reopen_state != NULL);
2969 assert(reopen_state->bs->drv != NULL);
2970 drv = reopen_state->bs->drv;
2971
ccf9dc07
KW
2972 /* Process generic block layer options */
2973 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
2974 qemu_opts_absorb_qdict(opts, reopen_state->options, &local_err);
2975 if (local_err) {
2976 error_propagate(errp, local_err);
2977 ret = -EINVAL;
2978 goto error;
2979 }
2980
91a097e7
KW
2981 update_flags_from_options(&reopen_state->flags, opts);
2982
ccf9dc07
KW
2983 /* node-name and driver must be unchanged. Put them back into the QDict, so
2984 * that they are checked at the end of this function. */
2985 value = qemu_opt_get(opts, "node-name");
2986 if (value) {
46f5ac20 2987 qdict_put_str(reopen_state->options, "node-name", value);
ccf9dc07
KW
2988 }
2989
2990 value = qemu_opt_get(opts, "driver");
2991 if (value) {
46f5ac20 2992 qdict_put_str(reopen_state->options, "driver", value);
ccf9dc07
KW
2993 }
2994
3d8ce171
JC
2995 /* If we are to stay read-only, do not allow permission change
2996 * to r/w. Attempting to set to r/w may fail if either BDRV_O_ALLOW_RDWR is
2997 * not set, or if the BDS still has copy_on_read enabled */
2998 read_only = !(reopen_state->flags & BDRV_O_RDWR);
54a32bfe 2999 ret = bdrv_can_set_read_only(reopen_state->bs, read_only, true, &local_err);
3d8ce171
JC
3000 if (local_err) {
3001 error_propagate(errp, local_err);
e971aa12
JC
3002 goto error;
3003 }
3004
30450259
KW
3005 /* Calculate required permissions after reopening */
3006 bdrv_reopen_perm(queue, reopen_state->bs,
3007 &reopen_state->perm, &reopen_state->shared_perm);
e971aa12
JC
3008
3009 ret = bdrv_flush(reopen_state->bs);
3010 if (ret) {
455b0fde 3011 error_setg_errno(errp, -ret, "Error flushing drive");
e971aa12
JC
3012 goto error;
3013 }
3014
3015 if (drv->bdrv_reopen_prepare) {
3016 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
3017 if (ret) {
3018 if (local_err != NULL) {
3019 error_propagate(errp, local_err);
3020 } else {
d8b6895f
LC
3021 error_setg(errp, "failed while preparing to reopen image '%s'",
3022 reopen_state->bs->filename);
e971aa12
JC
3023 }
3024 goto error;
3025 }
3026 } else {
3027 /* It is currently mandatory to have a bdrv_reopen_prepare()
3028 * handler for each supported drv. */
81e5f78a
AG
3029 error_setg(errp, "Block format '%s' used by node '%s' "
3030 "does not support reopening files", drv->format_name,
3031 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
3032 ret = -1;
3033 goto error;
3034 }
3035
4d2cb092
KW
3036 /* Options that are not handled are only okay if they are unchanged
3037 * compared to the old state. It is expected that some options are only
3038 * used for the initial open, but not reopen (e.g. filename) */
3039 if (qdict_size(reopen_state->options)) {
3040 const QDictEntry *entry = qdict_first(reopen_state->options);
3041
3042 do {
3043 QString *new_obj = qobject_to_qstring(entry->value);
3044 const char *new = qstring_get_str(new_obj);
129c7d1c
MA
3045 /*
3046 * Caution: while qdict_get_try_str() is fine, getting
3047 * non-string types would require more care. When
3048 * bs->options come from -blockdev or blockdev_add, its
3049 * members are typed according to the QAPI schema, but
3050 * when they come from -drive, they're all QString.
3051 */
4d2cb092
KW
3052 const char *old = qdict_get_try_str(reopen_state->bs->options,
3053 entry->key);
3054
3055 if (!old || strcmp(new, old)) {
3056 error_setg(errp, "Cannot change the option '%s'", entry->key);
3057 ret = -EINVAL;
3058 goto error;
3059 }
3060 } while ((entry = qdict_next(reopen_state->options, entry)));
3061 }
3062
30450259
KW
3063 ret = bdrv_check_perm(reopen_state->bs, queue, reopen_state->perm,
3064 reopen_state->shared_perm, NULL, errp);
3065 if (ret < 0) {
3066 goto error;
3067 }
3068
e971aa12
JC
3069 ret = 0;
3070
3071error:
ccf9dc07 3072 qemu_opts_del(opts);
e971aa12
JC
3073 return ret;
3074}
3075
3076/*
3077 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
3078 * makes them final by swapping the staging BlockDriverState contents into
3079 * the active BlockDriverState contents.
3080 */
3081void bdrv_reopen_commit(BDRVReopenState *reopen_state)
3082{
3083 BlockDriver *drv;
50bf65ba 3084 BlockDriverState *bs;
cb9ff6c2 3085 bool old_can_write, new_can_write;
e971aa12
JC
3086
3087 assert(reopen_state != NULL);
50bf65ba
VSO
3088 bs = reopen_state->bs;
3089 drv = bs->drv;
e971aa12
JC
3090 assert(drv != NULL);
3091
cb9ff6c2
VSO
3092 old_can_write =
3093 !bdrv_is_read_only(bs) && !(bdrv_get_flags(bs) & BDRV_O_INACTIVE);
3094
e971aa12
JC
3095 /* If there are any driver level actions to take */
3096 if (drv->bdrv_reopen_commit) {
3097 drv->bdrv_reopen_commit(reopen_state);
3098 }
3099
3100 /* set BDS specific flags now */
50bf65ba 3101 QDECREF(bs->explicit_options);
145f598e 3102
50bf65ba
VSO
3103 bs->explicit_options = reopen_state->explicit_options;
3104 bs->open_flags = reopen_state->flags;
3105 bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 3106
50bf65ba 3107 bdrv_refresh_limits(bs, NULL);
cb9ff6c2 3108
30450259
KW
3109 bdrv_set_perm(reopen_state->bs, reopen_state->perm,
3110 reopen_state->shared_perm);
3111
cb9ff6c2
VSO
3112 new_can_write =
3113 !bdrv_is_read_only(bs) && !(bdrv_get_flags(bs) & BDRV_O_INACTIVE);
3114 if (!old_can_write && new_can_write && drv->bdrv_reopen_bitmaps_rw) {
3115 Error *local_err = NULL;
3116 if (drv->bdrv_reopen_bitmaps_rw(bs, &local_err) < 0) {
3117 /* This is not fatal, bitmaps just left read-only, so all following
3118 * writes will fail. User can remove read-only bitmaps to unblock
3119 * writes.
3120 */
3121 error_reportf_err(local_err,
3122 "%s: Failed to make dirty bitmaps writable: ",
3123 bdrv_get_node_name(bs));
3124 }
3125 }
e971aa12
JC
3126}
3127
3128/*
3129 * Abort the reopen, and delete and free the staged changes in
3130 * reopen_state
3131 */
3132void bdrv_reopen_abort(BDRVReopenState *reopen_state)
3133{
3134 BlockDriver *drv;
3135
3136 assert(reopen_state != NULL);
3137 drv = reopen_state->bs->drv;
3138 assert(drv != NULL);
3139
3140 if (drv->bdrv_reopen_abort) {
3141 drv->bdrv_reopen_abort(reopen_state);
3142 }
145f598e
KW
3143
3144 QDECREF(reopen_state->explicit_options);
30450259
KW
3145
3146 bdrv_abort_perm_update(reopen_state->bs);
e971aa12
JC
3147}
3148
3149
64dff520 3150static void bdrv_close(BlockDriverState *bs)
fc01f7e7 3151{
33384421
HR
3152 BdrvAioNotifier *ban, *ban_next;
3153
ca9bd24c 3154 assert(!bs->job);
30f55fb8 3155 assert(!bs->refcnt);
99b7e775 3156
fc27291d 3157 bdrv_drained_begin(bs); /* complete I/O */
58fda173 3158 bdrv_flush(bs);
53ec73e2 3159 bdrv_drain(bs); /* in case flush left pending I/O */
fc27291d 3160
3cbc002c 3161 if (bs->drv) {
6e93e7c4
KW
3162 BdrvChild *child, *next;
3163
9a7dedbc 3164 bs->drv->bdrv_close(bs);
9a4f4c31 3165 bs->drv = NULL;
9a7dedbc 3166
12fa4af6 3167 bdrv_set_backing_hd(bs, NULL, &error_abort);
9a7dedbc 3168
9a4f4c31
KW
3169 if (bs->file != NULL) {
3170 bdrv_unref_child(bs, bs->file);
3171 bs->file = NULL;
3172 }
3173
6e93e7c4 3174 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
3175 /* TODO Remove bdrv_unref() from drivers' close function and use
3176 * bdrv_unref_child() here */
bddcec37
KW
3177 if (child->bs->inherits_from == bs) {
3178 child->bs->inherits_from = NULL;
3179 }
33a60407 3180 bdrv_detach_child(child);
6e93e7c4
KW
3181 }
3182
7267c094 3183 g_free(bs->opaque);
ea2384d3 3184 bs->opaque = NULL;
d3faa13e 3185 atomic_set(&bs->copy_on_read, 0);
a275fa42
PB
3186 bs->backing_file[0] = '\0';
3187 bs->backing_format[0] = '\0';
6405875c 3188 bs->total_sectors = 0;
54115412 3189 bs->encrypted = false;
54115412 3190 bs->sg = false;
de9c0cec 3191 QDECREF(bs->options);
145f598e 3192 QDECREF(bs->explicit_options);
de9c0cec 3193 bs->options = NULL;
998cbd6a 3194 bs->explicit_options = NULL;
91af7014
HR
3195 QDECREF(bs->full_open_options);
3196 bs->full_open_options = NULL;
b338082b 3197 }
98f90dba 3198
cca43ae1
VSO
3199 bdrv_release_named_dirty_bitmaps(bs);
3200 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
3201
33384421
HR
3202 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
3203 g_free(ban);
3204 }
3205 QLIST_INIT(&bs->aio_notifiers);
fc27291d 3206 bdrv_drained_end(bs);
b338082b
FB
3207}
3208
2bc93fed
MK
3209void bdrv_close_all(void)
3210{
a1a2af07 3211 block_job_cancel_sync_all();
cd7fca95 3212 nbd_export_close_all();
ca9bd24c
HR
3213
3214 /* Drop references from requests still in flight, such as canceled block
3215 * jobs whose AIO context has not been polled yet */
3216 bdrv_drain_all();
2bc93fed 3217
ca9bd24c
HR
3218 blk_remove_all_bs();
3219 blockdev_close_all_bdrv_states();
ed78cda3 3220
a1a2af07 3221 assert(QTAILQ_EMPTY(&all_bdrv_states));
2bc93fed
MK
3222}
3223
d0ac0380
KW
3224static bool should_update_child(BdrvChild *c, BlockDriverState *to)
3225{
3226 BdrvChild *to_c;
3227
3228 if (c->role->stay_at_node) {
3229 return false;
3230 }
3231
3232 if (c->role == &child_backing) {
3233 /* If @from is a backing file of @to, ignore the child to avoid
3234 * creating a loop. We only want to change the pointer of other
3235 * parents. */
3236 QLIST_FOREACH(to_c, &to->children, next) {
3237 if (to_c == c) {
3238 break;
3239 }
3240 }
3241 if (to_c) {
3242 return false;
3243 }
3244 }
3245
3246 return true;
3247}
3248
5fe31c25
KW
3249void bdrv_replace_node(BlockDriverState *from, BlockDriverState *to,
3250 Error **errp)
dd62f1ca 3251{
d0ac0380 3252 BdrvChild *c, *next;
234ac1a9
KW
3253 GSList *list = NULL, *p;
3254 uint64_t old_perm, old_shared;
3255 uint64_t perm = 0, shared = BLK_PERM_ALL;
3256 int ret;
3257
5fe31c25
KW
3258 assert(!atomic_read(&from->in_flight));
3259 assert(!atomic_read(&to->in_flight));
dd62f1ca 3260
234ac1a9
KW
3261 /* Make sure that @from doesn't go away until we have successfully attached
3262 * all of its parents to @to. */
3263 bdrv_ref(from);
dd62f1ca 3264
234ac1a9 3265 /* Put all parents into @list and calculate their cumulative permissions */
dd62f1ca 3266 QLIST_FOREACH_SAFE(c, &from->parents, next_parent, next) {
d0ac0380 3267 if (!should_update_child(c, to)) {
26de9438
KW
3268 continue;
3269 }
234ac1a9
KW
3270 list = g_slist_prepend(list, c);
3271 perm |= c->perm;
3272 shared &= c->shared_perm;
3273 }
3274
3275 /* Check whether the required permissions can be granted on @to, ignoring
3276 * all BdrvChild in @list so that they can't block themselves. */
3121fb45 3277 ret = bdrv_check_update_perm(to, NULL, perm, shared, list, errp);
234ac1a9
KW
3278 if (ret < 0) {
3279 bdrv_abort_perm_update(to);
3280 goto out;
3281 }
3282
3283 /* Now actually perform the change. We performed the permission check for
3284 * all elements of @list at once, so set the permissions all at once at the
3285 * very end. */
3286 for (p = list; p != NULL; p = p->next) {
3287 c = p->data;
9bd910e2 3288
dd62f1ca 3289 bdrv_ref(to);
234ac1a9 3290 bdrv_replace_child_noperm(c, to);
dd62f1ca
KW
3291 bdrv_unref(from);
3292 }
234ac1a9
KW
3293
3294 bdrv_get_cumulative_perm(to, &old_perm, &old_shared);
3295 bdrv_set_perm(to, old_perm | perm, old_shared | shared);
3296
3297out:
3298 g_slist_free(list);
3299 bdrv_unref(from);
dd62f1ca
KW
3300}
3301
4ddc07ca
PB
3302/*
3303 * Add new bs contents at the top of an image chain while the chain is
3304 * live, while keeping required fields on the top layer.
3305 *
3306 * This will modify the BlockDriverState fields, and swap contents
3307 * between bs_new and bs_top. Both bs_new and bs_top are modified.
3308 *
bfb197e0 3309 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
3310 *
3311 * This function does not create any image files.
dd62f1ca
KW
3312 *
3313 * bdrv_append() takes ownership of a bs_new reference and unrefs it because
3314 * that's what the callers commonly need. bs_new will be referenced by the old
3315 * parents of bs_top after bdrv_append() returns. If the caller needs to keep a
3316 * reference of its own, it must call bdrv_ref().
4ddc07ca 3317 */
b2c2832c
KW
3318void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top,
3319 Error **errp)
4ddc07ca 3320{
b2c2832c
KW
3321 Error *local_err = NULL;
3322
b2c2832c
KW
3323 bdrv_set_backing_hd(bs_new, bs_top, &local_err);
3324 if (local_err) {
3325 error_propagate(errp, local_err);
3326 goto out;
3327 }
dd62f1ca 3328
5fe31c25 3329 bdrv_replace_node(bs_top, bs_new, &local_err);
234ac1a9
KW
3330 if (local_err) {
3331 error_propagate(errp, local_err);
3332 bdrv_set_backing_hd(bs_new, NULL, &error_abort);
3333 goto out;
3334 }
4ddc07ca 3335
dd62f1ca
KW
3336 /* bs_new is now referenced by its new parents, we don't need the
3337 * additional reference any more. */
b2c2832c 3338out:
dd62f1ca 3339 bdrv_unref(bs_new);
8802d1fd
JC
3340}
3341
4f6fd349 3342static void bdrv_delete(BlockDriverState *bs)
b338082b 3343{
3e914655 3344 assert(!bs->job);
3718d8ab 3345 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 3346 assert(!bs->refcnt);
18846dee 3347
e1b5c52e
SH
3348 bdrv_close(bs);
3349
1b7bdbc1 3350 /* remove from list, if necessary */
63eaaae0
KW
3351 if (bs->node_name[0] != '\0') {
3352 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
3353 }
2c1d04e0
HR
3354 QTAILQ_REMOVE(&all_bdrv_states, bs, bs_list);
3355
7267c094 3356 g_free(bs);
fc01f7e7
FB
3357}
3358
e97fc193
AL
3359/*
3360 * Run consistency checks on an image
3361 *
e076f338 3362 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 3363 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 3364 * check are stored in res.
e97fc193 3365 */
4534ff54 3366int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 3367{
908bcd54
HR
3368 if (bs->drv == NULL) {
3369 return -ENOMEDIUM;
3370 }
e97fc193
AL
3371 if (bs->drv->bdrv_check == NULL) {
3372 return -ENOTSUP;
3373 }
3374
e076f338 3375 memset(res, 0, sizeof(*res));
4534ff54 3376 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
3377}
3378
756e6736
KW
3379/*
3380 * Return values:
3381 * 0 - success
3382 * -EINVAL - backing format specified, but no file
3383 * -ENOSPC - can't update the backing file because no space is left in the
3384 * image file header
3385 * -ENOTSUP - format driver doesn't support changing the backing file
3386 */
3387int bdrv_change_backing_file(BlockDriverState *bs,
3388 const char *backing_file, const char *backing_fmt)
3389{
3390 BlockDriver *drv = bs->drv;
469ef350 3391 int ret;
756e6736 3392
5f377794
PB
3393 /* Backing file format doesn't make sense without a backing file */
3394 if (backing_fmt && !backing_file) {
3395 return -EINVAL;
3396 }
3397
756e6736 3398 if (drv->bdrv_change_backing_file != NULL) {
469ef350 3399 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 3400 } else {
469ef350 3401 ret = -ENOTSUP;
756e6736 3402 }
469ef350
PB
3403
3404 if (ret == 0) {
3405 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
3406 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
3407 }
3408 return ret;
756e6736
KW
3409}
3410
6ebdcee2
JC
3411/*
3412 * Finds the image layer in the chain that has 'bs' as its backing file.
3413 *
3414 * active is the current topmost image.
3415 *
3416 * Returns NULL if bs is not found in active's image chain,
3417 * or if active == bs.
4caf0fcd
JC
3418 *
3419 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
3420 */
3421BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
3422 BlockDriverState *bs)
3423{
760e0063
KW
3424 while (active && bs != backing_bs(active)) {
3425 active = backing_bs(active);
6ebdcee2
JC
3426 }
3427
4caf0fcd
JC
3428 return active;
3429}
6ebdcee2 3430
4caf0fcd
JC
3431/* Given a BDS, searches for the base layer. */
3432BlockDriverState *bdrv_find_base(BlockDriverState *bs)
3433{
3434 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
3435}
3436
6ebdcee2
JC
3437/*
3438 * Drops images above 'base' up to and including 'top', and sets the image
3439 * above 'top' to have base as its backing file.
3440 *
3441 * Requires that the overlay to 'top' is opened r/w, so that the backing file
3442 * information in 'bs' can be properly updated.
3443 *
3444 * E.g., this will convert the following chain:
3445 * bottom <- base <- intermediate <- top <- active
3446 *
3447 * to
3448 *
3449 * bottom <- base <- active
3450 *
3451 * It is allowed for bottom==base, in which case it converts:
3452 *
3453 * base <- intermediate <- top <- active
3454 *
3455 * to
3456 *
3457 * base <- active
3458 *
54e26900
JC
3459 * If backing_file_str is non-NULL, it will be used when modifying top's
3460 * overlay image metadata.
3461 *
6ebdcee2
JC
3462 * Error conditions:
3463 * if active == top, that is considered an error
3464 *
3465 */
3466int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 3467 BlockDriverState *base, const char *backing_file_str)
6ebdcee2 3468{
6ebdcee2 3469 BlockDriverState *new_top_bs = NULL;
12fa4af6 3470 Error *local_err = NULL;
6ebdcee2
JC
3471 int ret = -EIO;
3472
6ebdcee2
JC
3473 if (!top->drv || !base->drv) {
3474 goto exit;
3475 }
3476
3477 new_top_bs = bdrv_find_overlay(active, top);
3478
3479 if (new_top_bs == NULL) {
3480 /* we could not find the image above 'top', this is an error */
3481 goto exit;
3482 }
3483
760e0063 3484 /* special case of new_top_bs->backing->bs already pointing to base - nothing
6ebdcee2 3485 * to do, no intermediate images */
760e0063 3486 if (backing_bs(new_top_bs) == base) {
6ebdcee2
JC
3487 ret = 0;
3488 goto exit;
3489 }
3490
5db15a57
KW
3491 /* Make sure that base is in the backing chain of top */
3492 if (!bdrv_chain_contains(top, base)) {
6ebdcee2
JC
3493 goto exit;
3494 }
3495
3496 /* success - we can delete the intermediate states, and link top->base */
5db15a57 3497 backing_file_str = backing_file_str ? backing_file_str : base->filename;
54e26900 3498 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
5db15a57 3499 base->drv ? base->drv->format_name : "");
6ebdcee2
JC
3500 if (ret) {
3501 goto exit;
3502 }
12fa4af6
KW
3503
3504 bdrv_set_backing_hd(new_top_bs, base, &local_err);
3505 if (local_err) {
3506 ret = -EPERM;
3507 error_report_err(local_err);
3508 goto exit;
3509 }
6ebdcee2 3510
6ebdcee2 3511 ret = 0;
6ebdcee2 3512exit:
6ebdcee2
JC
3513 return ret;
3514}
3515
61007b31
SH
3516/**
3517 * Truncate file to 'offset' bytes (needed only for file protocols)
3518 */
7ea37c30
HR
3519int bdrv_truncate(BdrvChild *child, int64_t offset, PreallocMode prealloc,
3520 Error **errp)
71d0770c 3521{
52cdbc58 3522 BlockDriverState *bs = child->bs;
61007b31
SH
3523 BlockDriver *drv = bs->drv;
3524 int ret;
c8f6d58e 3525
362b3786 3526 assert(child->perm & BLK_PERM_RESIZE);
c8f6d58e 3527
5a612c00 3528 /* if bs->drv == NULL, bs is closed, so there's nothing to do here */
ed3d2ec9
HR
3529 if (!drv) {
3530 error_setg(errp, "No medium inserted");
71d0770c 3531 return -ENOMEDIUM;
ed3d2ec9
HR
3532 }
3533 if (!drv->bdrv_truncate) {
5a612c00
MP
3534 if (bs->file && drv->is_filter) {
3535 return bdrv_truncate(bs->file, offset, prealloc, errp);
3536 }
ed3d2ec9 3537 error_setg(errp, "Image format driver does not support resize");
61007b31 3538 return -ENOTSUP;
ed3d2ec9
HR
3539 }
3540 if (bs->read_only) {
3541 error_setg(errp, "Image is read-only");
61007b31 3542 return -EACCES;
ed3d2ec9 3543 }
71d0770c 3544
504c205a
DL
3545 assert(!(bs->open_flags & BDRV_O_INACTIVE));
3546
7ea37c30 3547 ret = drv->bdrv_truncate(bs, offset, prealloc, errp);
1b6cc579
EB
3548 if (ret < 0) {
3549 return ret;
3550 }
3551 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
3552 if (ret < 0) {
3553 error_setg_errno(errp, -ret, "Could not refresh total sector count");
3554 } else {
3555 offset = bs->total_sectors * BDRV_SECTOR_SIZE;
c0191e76 3556 }
1b6cc579
EB
3557 bdrv_dirty_bitmap_truncate(bs, offset);
3558 bdrv_parent_cb_resize(bs);
3559 atomic_inc(&bs->write_gen);
61007b31 3560 return ret;
71d0770c
AL
3561}
3562
61007b31
SH
3563/**
3564 * Length of a allocated file in bytes. Sparse files are counted by actual
3565 * allocated space. Return < 0 if error or unknown.
3566 */
3567int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 3568{
61007b31
SH
3569 BlockDriver *drv = bs->drv;
3570 if (!drv) {
3571 return -ENOMEDIUM;
8f4754ed 3572 }
61007b31
SH
3573 if (drv->bdrv_get_allocated_file_size) {
3574 return drv->bdrv_get_allocated_file_size(bs);
3575 }
3576 if (bs->file) {
9a4f4c31 3577 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 3578 }
61007b31 3579 return -ENOTSUP;
1c9805a3 3580}
e7a8a783 3581
90880ff1
SH
3582/*
3583 * bdrv_measure:
3584 * @drv: Format driver
3585 * @opts: Creation options for new image
3586 * @in_bs: Existing image containing data for new image (may be NULL)
3587 * @errp: Error object
3588 * Returns: A #BlockMeasureInfo (free using qapi_free_BlockMeasureInfo())
3589 * or NULL on error
3590 *
3591 * Calculate file size required to create a new image.
3592 *
3593 * If @in_bs is given then space for allocated clusters and zero clusters
3594 * from that image are included in the calculation. If @opts contains a
3595 * backing file that is shared by @in_bs then backing clusters may be omitted
3596 * from the calculation.
3597 *
3598 * If @in_bs is NULL then the calculation includes no allocated clusters
3599 * unless a preallocation option is given in @opts.
3600 *
3601 * Note that @in_bs may use a different BlockDriver from @drv.
3602 *
3603 * If an error occurs the @errp pointer is set.
3604 */
3605BlockMeasureInfo *bdrv_measure(BlockDriver *drv, QemuOpts *opts,
3606 BlockDriverState *in_bs, Error **errp)
3607{
3608 if (!drv->bdrv_measure) {
3609 error_setg(errp, "Block driver '%s' does not support size measurement",
3610 drv->format_name);
3611 return NULL;
3612 }
3613
3614 return drv->bdrv_measure(opts, in_bs, errp);
3615}
3616
61007b31
SH
3617/**
3618 * Return number of sectors on success, -errno on error.
1c9805a3 3619 */
61007b31 3620int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 3621{
61007b31 3622 BlockDriver *drv = bs->drv;
498e386c 3623
61007b31
SH
3624 if (!drv)
3625 return -ENOMEDIUM;
2572b37a 3626
61007b31
SH
3627 if (drv->has_variable_length) {
3628 int ret = refresh_total_sectors(bs, bs->total_sectors);
3629 if (ret < 0) {
3630 return ret;
1c9805a3
SH
3631 }
3632 }
61007b31 3633 return bs->total_sectors;
1c9805a3 3634}
b338082b 3635
61007b31
SH
3636/**
3637 * Return length in bytes on success, -errno on error.
3638 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 3639 */
61007b31 3640int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 3641{
61007b31 3642 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 3643
4a9c9ea0 3644 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 3645 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
3646}
3647
61007b31
SH
3648/* return 0 as number of sectors if no device present or error */
3649void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 3650{
61007b31 3651 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 3652
61007b31 3653 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
3654}
3655
54115412 3656bool bdrv_is_sg(BlockDriverState *bs)
f08145fe 3657{
61007b31 3658 return bs->sg;
f08145fe
KW
3659}
3660
54115412 3661bool bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 3662{
760e0063 3663 if (bs->backing && bs->backing->bs->encrypted) {
54115412 3664 return true;
760e0063 3665 }
61007b31 3666 return bs->encrypted;
fc3959e4
FZ
3667}
3668
61007b31 3669const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 3670{
61007b31 3671 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
3672}
3673
61007b31 3674static int qsort_strcmp(const void *a, const void *b)
40b4f539 3675{
ceff5bd7 3676 return strcmp(*(char *const *)a, *(char *const *)b);
40b4f539
KW
3677}
3678
61007b31
SH
3679void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
3680 void *opaque)
40b4f539 3681{
61007b31
SH
3682 BlockDriver *drv;
3683 int count = 0;
3684 int i;
3685 const char **formats = NULL;
40b4f539 3686
61007b31
SH
3687 QLIST_FOREACH(drv, &bdrv_drivers, list) {
3688 if (drv->format_name) {
3689 bool found = false;
3690 int i = count;
3691 while (formats && i && !found) {
3692 found = !strcmp(formats[--i], drv->format_name);
3693 }
e2a305fb 3694
61007b31
SH
3695 if (!found) {
3696 formats = g_renew(const char *, formats, count + 1);
3697 formats[count++] = drv->format_name;
3698 }
6c5a42ac 3699 }
61007b31 3700 }
6c5a42ac 3701
eb0df69f
HR
3702 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); i++) {
3703 const char *format_name = block_driver_modules[i].format_name;
3704
3705 if (format_name) {
3706 bool found = false;
3707 int j = count;
3708
3709 while (formats && j && !found) {
3710 found = !strcmp(formats[--j], format_name);
3711 }
3712
3713 if (!found) {
3714 formats = g_renew(const char *, formats, count + 1);
3715 formats[count++] = format_name;
3716 }
3717 }
3718 }
3719
61007b31 3720 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 3721
61007b31
SH
3722 for (i = 0; i < count; i++) {
3723 it(opaque, formats[i]);
3724 }
40b4f539 3725
61007b31
SH
3726 g_free(formats);
3727}
40b4f539 3728
61007b31
SH
3729/* This function is to find a node in the bs graph */
3730BlockDriverState *bdrv_find_node(const char *node_name)
3731{
3732 BlockDriverState *bs;
391827eb 3733
61007b31 3734 assert(node_name);
40b4f539 3735
61007b31
SH
3736 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
3737 if (!strcmp(node_name, bs->node_name)) {
3738 return bs;
40b4f539
KW
3739 }
3740 }
61007b31 3741 return NULL;
40b4f539
KW
3742}
3743
61007b31
SH
3744/* Put this QMP function here so it can access the static graph_bdrv_states. */
3745BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 3746{
61007b31
SH
3747 BlockDeviceInfoList *list, *entry;
3748 BlockDriverState *bs;
40b4f539 3749
61007b31
SH
3750 list = NULL;
3751 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
c83f9fba 3752 BlockDeviceInfo *info = bdrv_block_device_info(NULL, bs, errp);
61007b31
SH
3753 if (!info) {
3754 qapi_free_BlockDeviceInfoList(list);
3755 return NULL;
301db7c2 3756 }
61007b31
SH
3757 entry = g_malloc0(sizeof(*entry));
3758 entry->value = info;
3759 entry->next = list;
3760 list = entry;
301db7c2
RH
3761 }
3762
61007b31
SH
3763 return list;
3764}
40b4f539 3765
61007b31
SH
3766BlockDriverState *bdrv_lookup_bs(const char *device,
3767 const char *node_name,
3768 Error **errp)
3769{
3770 BlockBackend *blk;
3771 BlockDriverState *bs;
40b4f539 3772
61007b31
SH
3773 if (device) {
3774 blk = blk_by_name(device);
40b4f539 3775
61007b31 3776 if (blk) {
9f4ed6fb
AG
3777 bs = blk_bs(blk);
3778 if (!bs) {
5433c24f 3779 error_setg(errp, "Device '%s' has no medium", device);
5433c24f
HR
3780 }
3781
9f4ed6fb 3782 return bs;
61007b31
SH
3783 }
3784 }
40b4f539 3785
61007b31
SH
3786 if (node_name) {
3787 bs = bdrv_find_node(node_name);
6d519a5f 3788
61007b31
SH
3789 if (bs) {
3790 return bs;
3791 }
40b4f539
KW
3792 }
3793
61007b31
SH
3794 error_setg(errp, "Cannot find device=%s nor node_name=%s",
3795 device ? device : "",
3796 node_name ? node_name : "");
3797 return NULL;
40b4f539
KW
3798}
3799
61007b31
SH
3800/* If 'base' is in the same chain as 'top', return true. Otherwise,
3801 * return false. If either argument is NULL, return false. */
3802bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 3803{
61007b31 3804 while (top && top != base) {
760e0063 3805 top = backing_bs(top);
02c50efe 3806 }
61007b31
SH
3807
3808 return top != NULL;
02c50efe
FZ
3809}
3810
61007b31 3811BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 3812{
61007b31
SH
3813 if (!bs) {
3814 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 3815 }
61007b31 3816 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
3817}
3818
61007b31 3819const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 3820{
61007b31 3821 return bs->node_name;
beac80cd
FB
3822}
3823
1f0c461b 3824const char *bdrv_get_parent_name(const BlockDriverState *bs)
4c265bf9
KW
3825{
3826 BdrvChild *c;
3827 const char *name;
3828
3829 /* If multiple parents have a name, just pick the first one. */
3830 QLIST_FOREACH(c, &bs->parents, next_parent) {
3831 if (c->role->get_name) {
3832 name = c->role->get_name(c);
3833 if (name && *name) {
3834 return name;
3835 }
3836 }
3837 }
3838
3839 return NULL;
3840}
3841
61007b31
SH
3842/* TODO check what callers really want: bs->node_name or blk_name() */
3843const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 3844{
4c265bf9 3845 return bdrv_get_parent_name(bs) ?: "";
f141eafe 3846}
83f64091 3847
61007b31
SH
3848/* This can be used to identify nodes that might not have a device
3849 * name associated. Since node and device names live in the same
3850 * namespace, the result is unambiguous. The exception is if both are
3851 * absent, then this returns an empty (non-null) string. */
3852const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 3853{
4c265bf9 3854 return bdrv_get_parent_name(bs) ?: bs->node_name;
beac80cd 3855}
beac80cd 3856
61007b31 3857int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 3858{
61007b31 3859 return bs->open_flags;
0b5a2445
PB
3860}
3861
61007b31 3862int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 3863{
61007b31 3864 return 1;
0b5a2445
PB
3865}
3866
61007b31 3867int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 3868{
61007b31 3869 assert(bs->drv);
0b5a2445 3870
61007b31
SH
3871 /* If BS is a copy on write image, it is initialized to
3872 the contents of the base image, which may not be zeroes. */
760e0063 3873 if (bs->backing) {
61007b31
SH
3874 return 0;
3875 }
3876 if (bs->drv->bdrv_has_zero_init) {
3877 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 3878 }
5a612c00
MP
3879 if (bs->file && bs->drv->is_filter) {
3880 return bdrv_has_zero_init(bs->file->bs);
3881 }
61007b31
SH
3882
3883 /* safe default */
3884 return 0;
68485420
KW
3885}
3886
61007b31 3887bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 3888{
61007b31 3889 BlockDriverInfo bdi;
b2a61371 3890
760e0063 3891 if (bs->backing) {
61007b31
SH
3892 return false;
3893 }
3894
3895 if (bdrv_get_info(bs, &bdi) == 0) {
3896 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
3897 }
3898
61007b31 3899 return false;
b2a61371
SH
3900}
3901
61007b31 3902bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 3903{
61007b31 3904 BlockDriverInfo bdi;
68485420 3905
2f0342ef 3906 if (!(bs->open_flags & BDRV_O_UNMAP)) {
61007b31
SH
3907 return false;
3908 }
68485420 3909
61007b31
SH
3910 if (bdrv_get_info(bs, &bdi) == 0) {
3911 return bdi.can_write_zeroes_with_unmap;
3912 }
68485420 3913
61007b31 3914 return false;
68485420
KW
3915}
3916
61007b31 3917const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 3918{
760e0063 3919 if (bs->backing && bs->backing->bs->encrypted)
61007b31
SH
3920 return bs->backing_file;
3921 else if (bs->encrypted)
3922 return bs->filename;
3923 else
3924 return NULL;
b2e12bc6
CH
3925}
3926
61007b31
SH
3927void bdrv_get_backing_filename(BlockDriverState *bs,
3928 char *filename, int filename_size)
016f5cf6 3929{
61007b31
SH
3930 pstrcpy(filename, filename_size, bs->backing_file);
3931}
d318aea9 3932
61007b31
SH
3933int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
3934{
3935 BlockDriver *drv = bs->drv;
5a612c00
MP
3936 /* if bs->drv == NULL, bs is closed, so there's nothing to do here */
3937 if (!drv) {
61007b31 3938 return -ENOMEDIUM;
5a612c00
MP
3939 }
3940 if (!drv->bdrv_get_info) {
3941 if (bs->file && drv->is_filter) {
3942 return bdrv_get_info(bs->file->bs, bdi);
3943 }
61007b31 3944 return -ENOTSUP;
5a612c00 3945 }
61007b31
SH
3946 memset(bdi, 0, sizeof(*bdi));
3947 return drv->bdrv_get_info(bs, bdi);
3948}
016f5cf6 3949
61007b31
SH
3950ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
3951{
3952 BlockDriver *drv = bs->drv;
3953 if (drv && drv->bdrv_get_specific_info) {
3954 return drv->bdrv_get_specific_info(bs);
3955 }
3956 return NULL;
016f5cf6
AG
3957}
3958
a31939e6 3959void bdrv_debug_event(BlockDriverState *bs, BlkdebugEvent event)
4265d620 3960{
61007b31
SH
3961 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
3962 return;
3963 }
4265d620 3964
61007b31 3965 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
3966}
3967
61007b31
SH
3968int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
3969 const char *tag)
4265d620 3970{
61007b31 3971 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 3972 bs = bs->file ? bs->file->bs : NULL;
61007b31 3973 }
4265d620 3974
61007b31
SH
3975 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
3976 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
3977 }
4265d620 3978
61007b31 3979 return -ENOTSUP;
4265d620
PB
3980}
3981
61007b31 3982int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 3983{
61007b31 3984 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 3985 bs = bs->file ? bs->file->bs : NULL;
61007b31 3986 }
ce1a14dc 3987
61007b31
SH
3988 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
3989 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
3990 }
3991
3992 return -ENOTSUP;
eb852011
MA
3993}
3994
61007b31 3995int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 3996{
61007b31 3997 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 3998 bs = bs->file ? bs->file->bs : NULL;
61007b31 3999 }
ce1a14dc 4000
61007b31
SH
4001 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
4002 return bs->drv->bdrv_debug_resume(bs, tag);
4003 }
ce1a14dc 4004
61007b31 4005 return -ENOTSUP;
f197fe2b
FZ
4006}
4007
61007b31 4008bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 4009{
61007b31 4010 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 4011 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 4012 }
19cb3738 4013
61007b31
SH
4014 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
4015 return bs->drv->bdrv_debug_is_suspended(bs, tag);
4016 }
f9f05dc5 4017
61007b31
SH
4018 return false;
4019}
f9f05dc5 4020
61007b31
SH
4021/* backing_file can either be relative, or absolute, or a protocol. If it is
4022 * relative, it must be relative to the chain. So, passing in bs->filename
4023 * from a BDS as backing_file should not be done, as that may be relative to
4024 * the CWD rather than the chain. */
4025BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
4026 const char *backing_file)
f9f05dc5 4027{
61007b31
SH
4028 char *filename_full = NULL;
4029 char *backing_file_full = NULL;
4030 char *filename_tmp = NULL;
4031 int is_protocol = 0;
4032 BlockDriverState *curr_bs = NULL;
4033 BlockDriverState *retval = NULL;
418661e0 4034 Error *local_error = NULL;
f9f05dc5 4035
61007b31
SH
4036 if (!bs || !bs->drv || !backing_file) {
4037 return NULL;
f9f05dc5
KW
4038 }
4039
61007b31
SH
4040 filename_full = g_malloc(PATH_MAX);
4041 backing_file_full = g_malloc(PATH_MAX);
4042 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 4043
61007b31 4044 is_protocol = path_has_protocol(backing_file);
f9f05dc5 4045
760e0063 4046 for (curr_bs = bs; curr_bs->backing; curr_bs = curr_bs->backing->bs) {
f9f05dc5 4047
61007b31
SH
4048 /* If either of the filename paths is actually a protocol, then
4049 * compare unmodified paths; otherwise make paths relative */
4050 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
4051 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
760e0063 4052 retval = curr_bs->backing->bs;
61007b31
SH
4053 break;
4054 }
418661e0
JC
4055 /* Also check against the full backing filename for the image */
4056 bdrv_get_full_backing_filename(curr_bs, backing_file_full, PATH_MAX,
4057 &local_error);
4058 if (local_error == NULL) {
4059 if (strcmp(backing_file, backing_file_full) == 0) {
4060 retval = curr_bs->backing->bs;
4061 break;
4062 }
4063 } else {
4064 error_free(local_error);
4065 local_error = NULL;
4066 }
61007b31
SH
4067 } else {
4068 /* If not an absolute filename path, make it relative to the current
4069 * image's filename path */
4070 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
4071 backing_file);
f9f05dc5 4072
61007b31
SH
4073 /* We are going to compare absolute pathnames */
4074 if (!realpath(filename_tmp, filename_full)) {
4075 continue;
4076 }
07f07615 4077
61007b31
SH
4078 /* We need to make sure the backing filename we are comparing against
4079 * is relative to the current image filename (or absolute) */
4080 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
4081 curr_bs->backing_file);
07f07615 4082
61007b31
SH
4083 if (!realpath(filename_tmp, backing_file_full)) {
4084 continue;
4085 }
eb489bb1 4086
61007b31 4087 if (strcmp(backing_file_full, filename_full) == 0) {
760e0063 4088 retval = curr_bs->backing->bs;
61007b31
SH
4089 break;
4090 }
4091 }
eb489bb1
KW
4092 }
4093
61007b31
SH
4094 g_free(filename_full);
4095 g_free(backing_file_full);
4096 g_free(filename_tmp);
4097 return retval;
4098}
4099
61007b31
SH
4100void bdrv_init(void)
4101{
4102 module_call_init(MODULE_INIT_BLOCK);
4103}
29cdb251 4104
61007b31
SH
4105void bdrv_init_with_whitelist(void)
4106{
4107 use_bdrv_whitelist = 1;
4108 bdrv_init();
07f07615
PB
4109}
4110
5a8a30db 4111void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 4112{
4417ab7a 4113 BdrvChild *child, *parent;
9c5e6594 4114 uint64_t perm, shared_perm;
5a8a30db
KW
4115 Error *local_err = NULL;
4116 int ret;
4117
3456a8d1
KW
4118 if (!bs->drv) {
4119 return;
4120 }
4121
04c01a5c 4122 if (!(bs->open_flags & BDRV_O_INACTIVE)) {
7ea2d269
AK
4123 return;
4124 }
7ea2d269 4125
16e977d5
VSO
4126 QLIST_FOREACH(child, &bs->children, next) {
4127 bdrv_invalidate_cache(child->bs, &local_err);
0d1c5c91 4128 if (local_err) {
0d1c5c91
FZ
4129 error_propagate(errp, local_err);
4130 return;
4131 }
5a8a30db 4132 }
0d1c5c91 4133
16e977d5
VSO
4134 bs->open_flags &= ~BDRV_O_INACTIVE;
4135 if (bs->drv->bdrv_invalidate_cache) {
4136 bs->drv->bdrv_invalidate_cache(bs, &local_err);
0d1c5c91
FZ
4137 if (local_err) {
4138 bs->open_flags |= BDRV_O_INACTIVE;
4139 error_propagate(errp, local_err);
4140 return;
4141 }
0f15423c 4142 }
3456a8d1 4143
5a8a30db
KW
4144 ret = refresh_total_sectors(bs, bs->total_sectors);
4145 if (ret < 0) {
04c01a5c 4146 bs->open_flags |= BDRV_O_INACTIVE;
5a8a30db
KW
4147 error_setg_errno(errp, -ret, "Could not refresh total sector count");
4148 return;
4149 }
4417ab7a 4150
9c5e6594
KW
4151 /* Update permissions, they may differ for inactive nodes */
4152 bdrv_get_cumulative_perm(bs, &perm, &shared_perm);
3121fb45 4153 ret = bdrv_check_perm(bs, NULL, perm, shared_perm, NULL, &local_err);
9c5e6594
KW
4154 if (ret < 0) {
4155 bs->open_flags |= BDRV_O_INACTIVE;
4156 error_propagate(errp, local_err);
4157 return;
4158 }
4159 bdrv_set_perm(bs, perm, shared_perm);
4160
4417ab7a
KW
4161 QLIST_FOREACH(parent, &bs->parents, next_parent) {
4162 if (parent->role->activate) {
4163 parent->role->activate(parent, &local_err);
4164 if (local_err) {
4165 error_propagate(errp, local_err);
4166 return;
4167 }
4168 }
4169 }
0f15423c
AL
4170}
4171
5a8a30db 4172void bdrv_invalidate_cache_all(Error **errp)
0f15423c 4173{
7c8eece4 4174 BlockDriverState *bs;
5a8a30db 4175 Error *local_err = NULL;
88be7b4b 4176 BdrvNextIterator it;
0f15423c 4177
88be7b4b 4178 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
ed78cda3
SH
4179 AioContext *aio_context = bdrv_get_aio_context(bs);
4180
4181 aio_context_acquire(aio_context);
5a8a30db 4182 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 4183 aio_context_release(aio_context);
5a8a30db
KW
4184 if (local_err) {
4185 error_propagate(errp, local_err);
4186 return;
4187 }
0f15423c
AL
4188 }
4189}
4190
aad0b7a0
FZ
4191static int bdrv_inactivate_recurse(BlockDriverState *bs,
4192 bool setting_flag)
76b1c7fe 4193{
cfa1a572 4194 BdrvChild *child, *parent;
76b1c7fe
KW
4195 int ret;
4196
aad0b7a0 4197 if (!setting_flag && bs->drv->bdrv_inactivate) {
76b1c7fe
KW
4198 ret = bs->drv->bdrv_inactivate(bs);
4199 if (ret < 0) {
4200 return ret;
4201 }
4202 }
4203
7d5b5261 4204 if (setting_flag && !(bs->open_flags & BDRV_O_INACTIVE)) {
9c5e6594
KW
4205 uint64_t perm, shared_perm;
4206
cfa1a572
KW
4207 QLIST_FOREACH(parent, &bs->parents, next_parent) {
4208 if (parent->role->inactivate) {
4209 ret = parent->role->inactivate(parent);
4210 if (ret < 0) {
cfa1a572
KW
4211 return ret;
4212 }
4213 }
4214 }
9c5e6594 4215
7d5b5261
SH
4216 bs->open_flags |= BDRV_O_INACTIVE;
4217
9c5e6594
KW
4218 /* Update permissions, they may differ for inactive nodes */
4219 bdrv_get_cumulative_perm(bs, &perm, &shared_perm);
3121fb45 4220 bdrv_check_perm(bs, NULL, perm, shared_perm, NULL, &error_abort);
9c5e6594 4221 bdrv_set_perm(bs, perm, shared_perm);
aad0b7a0 4222 }
38701b6a
KW
4223
4224 QLIST_FOREACH(child, &bs->children, next) {
4225 ret = bdrv_inactivate_recurse(child->bs, setting_flag);
4226 if (ret < 0) {
4227 return ret;
4228 }
4229 }
4230
615b5dcf
VSO
4231 /* At this point persistent bitmaps should be already stored by the format
4232 * driver */
4233 bdrv_release_persistent_dirty_bitmaps(bs);
4234
76b1c7fe
KW
4235 return 0;
4236}
4237
4238int bdrv_inactivate_all(void)
4239{
79720af6 4240 BlockDriverState *bs = NULL;
88be7b4b 4241 BdrvNextIterator it;
aad0b7a0
FZ
4242 int ret = 0;
4243 int pass;
76b1c7fe 4244
88be7b4b 4245 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
4246 aio_context_acquire(bdrv_get_aio_context(bs));
4247 }
76b1c7fe 4248
aad0b7a0
FZ
4249 /* We do two passes of inactivation. The first pass calls to drivers'
4250 * .bdrv_inactivate callbacks recursively so all cache is flushed to disk;
4251 * the second pass sets the BDRV_O_INACTIVE flag so that no further write
4252 * is allowed. */
4253 for (pass = 0; pass < 2; pass++) {
88be7b4b 4254 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
4255 ret = bdrv_inactivate_recurse(bs, pass);
4256 if (ret < 0) {
4257 goto out;
4258 }
76b1c7fe
KW
4259 }
4260 }
4261
aad0b7a0 4262out:
88be7b4b 4263 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
4264 aio_context_release(bdrv_get_aio_context(bs));
4265 }
4266
4267 return ret;
76b1c7fe
KW
4268}
4269
19cb3738
FB
4270/**************************************************************/
4271/* removable device support */
4272
4273/**
4274 * Return TRUE if the media is present
4275 */
e031f750 4276bool bdrv_is_inserted(BlockDriverState *bs)
19cb3738
FB
4277{
4278 BlockDriver *drv = bs->drv;
28d7a789 4279 BdrvChild *child;
a1aff5bf 4280
e031f750
HR
4281 if (!drv) {
4282 return false;
4283 }
28d7a789
HR
4284 if (drv->bdrv_is_inserted) {
4285 return drv->bdrv_is_inserted(bs);
4286 }
4287 QLIST_FOREACH(child, &bs->children, next) {
4288 if (!bdrv_is_inserted(child->bs)) {
4289 return false;
4290 }
e031f750 4291 }
28d7a789 4292 return true;
19cb3738
FB
4293}
4294
19cb3738
FB
4295/**
4296 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
4297 */
f36f3949 4298void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
4299{
4300 BlockDriver *drv = bs->drv;
19cb3738 4301
822e1cd1
MA
4302 if (drv && drv->bdrv_eject) {
4303 drv->bdrv_eject(bs, eject_flag);
19cb3738
FB
4304 }
4305}
4306
19cb3738
FB
4307/**
4308 * Lock or unlock the media (if it is locked, the user won't be able
4309 * to eject it manually).
4310 */
025e849a 4311void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
4312{
4313 BlockDriver *drv = bs->drv;
4314
025e849a 4315 trace_bdrv_lock_medium(bs, locked);
b8c6d095 4316
025e849a
MA
4317 if (drv && drv->bdrv_lock_medium) {
4318 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
4319 }
4320}
985a03b0 4321
9fcb0251
FZ
4322/* Get a reference to bs */
4323void bdrv_ref(BlockDriverState *bs)
4324{
4325 bs->refcnt++;
4326}
4327
4328/* Release a previously grabbed reference to bs.
4329 * If after releasing, reference count is zero, the BlockDriverState is
4330 * deleted. */
4331void bdrv_unref(BlockDriverState *bs)
4332{
9a4d5ca6
JC
4333 if (!bs) {
4334 return;
4335 }
9fcb0251
FZ
4336 assert(bs->refcnt > 0);
4337 if (--bs->refcnt == 0) {
4338 bdrv_delete(bs);
4339 }
4340}
4341
fbe40ff7
FZ
4342struct BdrvOpBlocker {
4343 Error *reason;
4344 QLIST_ENTRY(BdrvOpBlocker) list;
4345};
4346
4347bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
4348{
4349 BdrvOpBlocker *blocker;
4350 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4351 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
4352 blocker = QLIST_FIRST(&bs->op_blockers[op]);
57ef3f12
EH
4353 error_propagate(errp, error_copy(blocker->reason));
4354 error_prepend(errp, "Node '%s' is busy: ",
4355 bdrv_get_device_or_node_name(bs));
fbe40ff7
FZ
4356 return true;
4357 }
4358 return false;
4359}
4360
4361void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
4362{
4363 BdrvOpBlocker *blocker;
4364 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4365
5839e53b 4366 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
4367 blocker->reason = reason;
4368 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
4369}
4370
4371void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
4372{
4373 BdrvOpBlocker *blocker, *next;
4374 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4375 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
4376 if (blocker->reason == reason) {
4377 QLIST_REMOVE(blocker, list);
4378 g_free(blocker);
4379 }
4380 }
4381}
4382
4383void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
4384{
4385 int i;
4386 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4387 bdrv_op_block(bs, i, reason);
4388 }
4389}
4390
4391void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
4392{
4393 int i;
4394 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4395 bdrv_op_unblock(bs, i, reason);
4396 }
4397}
4398
4399bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
4400{
4401 int i;
4402
4403 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4404 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
4405 return false;
4406 }
4407 }
4408 return true;
4409}
4410
d92ada22
LC
4411void bdrv_img_create(const char *filename, const char *fmt,
4412 const char *base_filename, const char *base_fmt,
9217283d
FZ
4413 char *options, uint64_t img_size, int flags, bool quiet,
4414 Error **errp)
f88e1a42 4415{
83d0521a
CL
4416 QemuOptsList *create_opts = NULL;
4417 QemuOpts *opts = NULL;
4418 const char *backing_fmt, *backing_file;
4419 int64_t size;
f88e1a42 4420 BlockDriver *drv, *proto_drv;
cc84d90f 4421 Error *local_err = NULL;
f88e1a42
JS
4422 int ret = 0;
4423
4424 /* Find driver and parse its options */
4425 drv = bdrv_find_format(fmt);
4426 if (!drv) {
71c79813 4427 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 4428 return;
f88e1a42
JS
4429 }
4430
b65a5e12 4431 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 4432 if (!proto_drv) {
d92ada22 4433 return;
f88e1a42
JS
4434 }
4435
c6149724
HR
4436 if (!drv->create_opts) {
4437 error_setg(errp, "Format driver '%s' does not support image creation",
4438 drv->format_name);
4439 return;
4440 }
4441
4442 if (!proto_drv->create_opts) {
4443 error_setg(errp, "Protocol driver '%s' does not support image creation",
4444 proto_drv->format_name);
4445 return;
4446 }
4447
c282e1fd
CL
4448 create_opts = qemu_opts_append(create_opts, drv->create_opts);
4449 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
4450
4451 /* Create parameter list with default values */
83d0521a 4452 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 4453 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
4454
4455 /* Parse -o options */
4456 if (options) {
dc523cd3
MA
4457 qemu_opts_do_parse(opts, options, NULL, &local_err);
4458 if (local_err) {
4459 error_report_err(local_err);
4460 local_err = NULL;
83d0521a 4461 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
4462 goto out;
4463 }
4464 }
4465
4466 if (base_filename) {
f43e47db 4467 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 4468 if (local_err) {
71c79813
LC
4469 error_setg(errp, "Backing file not supported for file format '%s'",
4470 fmt);
f88e1a42
JS
4471 goto out;
4472 }
4473 }
4474
4475 if (base_fmt) {
f43e47db 4476 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 4477 if (local_err) {
71c79813
LC
4478 error_setg(errp, "Backing file format not supported for file "
4479 "format '%s'", fmt);
f88e1a42
JS
4480 goto out;
4481 }
4482 }
4483
83d0521a
CL
4484 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
4485 if (backing_file) {
4486 if (!strcmp(filename, backing_file)) {
71c79813
LC
4487 error_setg(errp, "Error: Trying to create an image with the "
4488 "same filename as the backing file");
792da93a
JS
4489 goto out;
4490 }
4491 }
4492
83d0521a 4493 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42 4494
6e6e55f5
JS
4495 /* The size for the image must always be specified, unless we have a backing
4496 * file and we have not been forbidden from opening it. */
a8b42a1c 4497 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, img_size);
6e6e55f5
JS
4498 if (backing_file && !(flags & BDRV_O_NO_BACKING)) {
4499 BlockDriverState *bs;
4500 char *full_backing = g_new0(char, PATH_MAX);
4501 int back_flags;
4502 QDict *backing_options = NULL;
4503
4504 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
4505 full_backing, PATH_MAX,
4506 &local_err);
4507 if (local_err) {
4508 g_free(full_backing);
4509 goto out;
4510 }
29168018 4511
6e6e55f5
JS
4512 /* backing files always opened read-only */
4513 back_flags = flags;
4514 back_flags &= ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 4515
6e6e55f5
JS
4516 if (backing_fmt) {
4517 backing_options = qdict_new();
4518 qdict_put_str(backing_options, "driver", backing_fmt);
4519 }
e6641719 4520
6e6e55f5
JS
4521 bs = bdrv_open(full_backing, NULL, backing_options, back_flags,
4522 &local_err);
4523 g_free(full_backing);
4524 if (!bs && size != -1) {
4525 /* Couldn't open BS, but we have a size, so it's nonfatal */
4526 warn_reportf_err(local_err,
4527 "Could not verify backing image. "
4528 "This may become an error in future versions.\n");
4529 local_err = NULL;
4530 } else if (!bs) {
4531 /* Couldn't open bs, do not have size */
4532 error_append_hint(&local_err,
4533 "Could not open backing image to determine size.\n");
4534 goto out;
4535 } else {
4536 if (size == -1) {
4537 /* Opened BS, have no size */
4538 size = bdrv_getlength(bs);
4539 if (size < 0) {
4540 error_setg_errno(errp, -size, "Could not get size of '%s'",
4541 backing_file);
4542 bdrv_unref(bs);
4543 goto out;
4544 }
4545 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
52bf1e72 4546 }
66f6b814 4547 bdrv_unref(bs);
f88e1a42 4548 }
6e6e55f5
JS
4549 } /* (backing_file && !(flags & BDRV_O_NO_BACKING)) */
4550
4551 if (size == -1) {
4552 error_setg(errp, "Image creation needs a size parameter");
4553 goto out;
f88e1a42
JS
4554 }
4555
f382d43a 4556 if (!quiet) {
fe646693 4557 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 4558 qemu_opts_print(opts, " ");
f382d43a
MR
4559 puts("");
4560 }
83d0521a 4561
c282e1fd 4562 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 4563
cc84d90f
HR
4564 if (ret == -EFBIG) {
4565 /* This is generally a better message than whatever the driver would
4566 * deliver (especially because of the cluster_size_hint), since that
4567 * is most probably not much different from "image too large". */
4568 const char *cluster_size_hint = "";
83d0521a 4569 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 4570 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 4571 }
cc84d90f
HR
4572 error_setg(errp, "The image size is too large for file format '%s'"
4573 "%s", fmt, cluster_size_hint);
4574 error_free(local_err);
4575 local_err = NULL;
f88e1a42
JS
4576 }
4577
4578out:
83d0521a
CL
4579 qemu_opts_del(opts);
4580 qemu_opts_free(create_opts);
621ff94d 4581 error_propagate(errp, local_err);
f88e1a42 4582}
85d126f3
SH
4583
4584AioContext *bdrv_get_aio_context(BlockDriverState *bs)
4585{
dcd04228
SH
4586 return bs->aio_context;
4587}
4588
052a7572
FZ
4589void bdrv_coroutine_enter(BlockDriverState *bs, Coroutine *co)
4590{
4591 aio_co_enter(bdrv_get_aio_context(bs), co);
4592}
4593
e8a095da
SH
4594static void bdrv_do_remove_aio_context_notifier(BdrvAioNotifier *ban)
4595{
4596 QLIST_REMOVE(ban, list);
4597 g_free(ban);
4598}
4599
dcd04228
SH
4600void bdrv_detach_aio_context(BlockDriverState *bs)
4601{
e8a095da 4602 BdrvAioNotifier *baf, *baf_tmp;
b97511c7 4603 BdrvChild *child;
33384421 4604
dcd04228
SH
4605 if (!bs->drv) {
4606 return;
4607 }
4608
e8a095da
SH
4609 assert(!bs->walking_aio_notifiers);
4610 bs->walking_aio_notifiers = true;
4611 QLIST_FOREACH_SAFE(baf, &bs->aio_notifiers, list, baf_tmp) {
4612 if (baf->deleted) {
4613 bdrv_do_remove_aio_context_notifier(baf);
4614 } else {
4615 baf->detach_aio_context(baf->opaque);
4616 }
33384421 4617 }
e8a095da
SH
4618 /* Never mind iterating again to check for ->deleted. bdrv_close() will
4619 * remove remaining aio notifiers if we aren't called again.
4620 */
4621 bs->walking_aio_notifiers = false;
33384421 4622
dcd04228
SH
4623 if (bs->drv->bdrv_detach_aio_context) {
4624 bs->drv->bdrv_detach_aio_context(bs);
4625 }
b97511c7
HR
4626 QLIST_FOREACH(child, &bs->children, next) {
4627 bdrv_detach_aio_context(child->bs);
dcd04228
SH
4628 }
4629
4630 bs->aio_context = NULL;
4631}
4632
4633void bdrv_attach_aio_context(BlockDriverState *bs,
4634 AioContext *new_context)
4635{
e8a095da 4636 BdrvAioNotifier *ban, *ban_tmp;
b97511c7 4637 BdrvChild *child;
33384421 4638
dcd04228
SH
4639 if (!bs->drv) {
4640 return;
4641 }
4642
4643 bs->aio_context = new_context;
4644
b97511c7
HR
4645 QLIST_FOREACH(child, &bs->children, next) {
4646 bdrv_attach_aio_context(child->bs, new_context);
dcd04228
SH
4647 }
4648 if (bs->drv->bdrv_attach_aio_context) {
4649 bs->drv->bdrv_attach_aio_context(bs, new_context);
4650 }
33384421 4651
e8a095da
SH
4652 assert(!bs->walking_aio_notifiers);
4653 bs->walking_aio_notifiers = true;
4654 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_tmp) {
4655 if (ban->deleted) {
4656 bdrv_do_remove_aio_context_notifier(ban);
4657 } else {
4658 ban->attached_aio_context(new_context, ban->opaque);
4659 }
33384421 4660 }
e8a095da 4661 bs->walking_aio_notifiers = false;
dcd04228
SH
4662}
4663
4664void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
4665{
aabf5910 4666 AioContext *ctx = bdrv_get_aio_context(bs);
c2b6428d 4667
aabf5910
FZ
4668 aio_disable_external(ctx);
4669 bdrv_parent_drained_begin(bs);
53ec73e2 4670 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228 4671
c2b6428d
PB
4672 while (aio_poll(ctx, false)) {
4673 /* wait for all bottom halves to execute */
4674 }
4675
dcd04228
SH
4676 bdrv_detach_aio_context(bs);
4677
4678 /* This function executes in the old AioContext so acquire the new one in
4679 * case it runs in a different thread.
4680 */
4681 aio_context_acquire(new_context);
4682 bdrv_attach_aio_context(bs, new_context);
aabf5910
FZ
4683 bdrv_parent_drained_end(bs);
4684 aio_enable_external(ctx);
dcd04228 4685 aio_context_release(new_context);
85d126f3 4686}
d616b224 4687
33384421
HR
4688void bdrv_add_aio_context_notifier(BlockDriverState *bs,
4689 void (*attached_aio_context)(AioContext *new_context, void *opaque),
4690 void (*detach_aio_context)(void *opaque), void *opaque)
4691{
4692 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
4693 *ban = (BdrvAioNotifier){
4694 .attached_aio_context = attached_aio_context,
4695 .detach_aio_context = detach_aio_context,
4696 .opaque = opaque
4697 };
4698
4699 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
4700}
4701
4702void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
4703 void (*attached_aio_context)(AioContext *,
4704 void *),
4705 void (*detach_aio_context)(void *),
4706 void *opaque)
4707{
4708 BdrvAioNotifier *ban, *ban_next;
4709
4710 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
4711 if (ban->attached_aio_context == attached_aio_context &&
4712 ban->detach_aio_context == detach_aio_context &&
e8a095da
SH
4713 ban->opaque == opaque &&
4714 ban->deleted == false)
33384421 4715 {
e8a095da
SH
4716 if (bs->walking_aio_notifiers) {
4717 ban->deleted = true;
4718 } else {
4719 bdrv_do_remove_aio_context_notifier(ban);
4720 }
33384421
HR
4721 return;
4722 }
4723 }
4724
4725 abort();
4726}
4727
77485434 4728int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
8b13976d 4729 BlockDriverAmendStatusCB *status_cb, void *cb_opaque)
6f176b48 4730{
c282e1fd 4731 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
4732 return -ENOTSUP;
4733 }
8b13976d 4734 return bs->drv->bdrv_amend_options(bs, opts, status_cb, cb_opaque);
6f176b48 4735}
f6186f49 4736
b5042a36
BC
4737/* This function will be called by the bdrv_recurse_is_first_non_filter method
4738 * of block filter and by bdrv_is_first_non_filter.
4739 * It is used to test if the given bs is the candidate or recurse more in the
4740 * node graph.
212a5a8f 4741 */
b5042a36 4742bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 4743 BlockDriverState *candidate)
f6186f49 4744{
b5042a36
BC
4745 /* return false if basic checks fails */
4746 if (!bs || !bs->drv) {
212a5a8f 4747 return false;
f6186f49
BC
4748 }
4749
b5042a36
BC
4750 /* the code reached a non block filter driver -> check if the bs is
4751 * the same as the candidate. It's the recursion termination condition.
4752 */
4753 if (!bs->drv->is_filter) {
4754 return bs == candidate;
212a5a8f 4755 }
b5042a36 4756 /* Down this path the driver is a block filter driver */
212a5a8f 4757
b5042a36
BC
4758 /* If the block filter recursion method is defined use it to recurse down
4759 * the node graph.
4760 */
4761 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 4762 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
4763 }
4764
b5042a36
BC
4765 /* the driver is a block filter but don't allow to recurse -> return false
4766 */
4767 return false;
f6186f49
BC
4768}
4769
212a5a8f
BC
4770/* This function checks if the candidate is the first non filter bs down it's
4771 * bs chain. Since we don't have pointers to parents it explore all bs chains
4772 * from the top. Some filters can choose not to pass down the recursion.
4773 */
4774bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 4775{
7c8eece4 4776 BlockDriverState *bs;
88be7b4b 4777 BdrvNextIterator it;
212a5a8f
BC
4778
4779 /* walk down the bs forest recursively */
88be7b4b 4780 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
212a5a8f
BC
4781 bool perm;
4782
b5042a36 4783 /* try to recurse in this top level bs */
e6dc8a1f 4784 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
4785
4786 /* candidate is the first non filter */
4787 if (perm) {
4788 return true;
4789 }
4790 }
4791
4792 return false;
f6186f49 4793}
09158f00 4794
e12f3784
WC
4795BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
4796 const char *node_name, Error **errp)
09158f00
BC
4797{
4798 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
4799 AioContext *aio_context;
4800
09158f00
BC
4801 if (!to_replace_bs) {
4802 error_setg(errp, "Node name '%s' not found", node_name);
4803 return NULL;
4804 }
4805
5a7e7a0b
SH
4806 aio_context = bdrv_get_aio_context(to_replace_bs);
4807 aio_context_acquire(aio_context);
4808
09158f00 4809 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
4810 to_replace_bs = NULL;
4811 goto out;
09158f00
BC
4812 }
4813
4814 /* We don't want arbitrary node of the BDS chain to be replaced only the top
4815 * most non filter in order to prevent data corruption.
4816 * Another benefit is that this tests exclude backing files which are
4817 * blocked by the backing blockers.
4818 */
e12f3784 4819 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 4820 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
4821 to_replace_bs = NULL;
4822 goto out;
09158f00
BC
4823 }
4824
5a7e7a0b
SH
4825out:
4826 aio_context_release(aio_context);
09158f00
BC
4827 return to_replace_bs;
4828}
448ad91d 4829
91af7014
HR
4830static bool append_open_options(QDict *d, BlockDriverState *bs)
4831{
4832 const QDictEntry *entry;
9e700c1a 4833 QemuOptDesc *desc;
260fecf1 4834 BdrvChild *child;
91af7014 4835 bool found_any = false;
260fecf1 4836 const char *p;
91af7014
HR
4837
4838 for (entry = qdict_first(bs->options); entry;
4839 entry = qdict_next(bs->options, entry))
4840 {
260fecf1
KW
4841 /* Exclude options for children */
4842 QLIST_FOREACH(child, &bs->children, next) {
4843 if (strstart(qdict_entry_key(entry), child->name, &p)
4844 && (!*p || *p == '.'))
4845 {
4846 break;
4847 }
4848 }
4849 if (child) {
9e700c1a 4850 continue;
91af7014 4851 }
9e700c1a
KW
4852
4853 /* And exclude all non-driver-specific options */
4854 for (desc = bdrv_runtime_opts.desc; desc->name; desc++) {
4855 if (!strcmp(qdict_entry_key(entry), desc->name)) {
4856 break;
4857 }
4858 }
4859 if (desc->name) {
4860 continue;
4861 }
4862
4863 qobject_incref(qdict_entry_value(entry));
4864 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
4865 found_any = true;
91af7014
HR
4866 }
4867
4868 return found_any;
4869}
4870
4871/* Updates the following BDS fields:
4872 * - exact_filename: A filename which may be used for opening a block device
4873 * which (mostly) equals the given BDS (even without any
4874 * other options; so reading and writing must return the same
4875 * results, but caching etc. may be different)
4876 * - full_open_options: Options which, when given when opening a block device
4877 * (without a filename), result in a BDS (mostly)
4878 * equalling the given one
4879 * - filename: If exact_filename is set, it is copied here. Otherwise,
4880 * full_open_options is converted to a JSON object, prefixed with
4881 * "json:" (for use through the JSON pseudo protocol) and put here.
4882 */
4883void bdrv_refresh_filename(BlockDriverState *bs)
4884{
4885 BlockDriver *drv = bs->drv;
4886 QDict *opts;
4887
4888 if (!drv) {
4889 return;
4890 }
4891
4892 /* This BDS's file name will most probably depend on its file's name, so
4893 * refresh that first */
4894 if (bs->file) {
9a4f4c31 4895 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
4896 }
4897
4898 if (drv->bdrv_refresh_filename) {
4899 /* Obsolete information is of no use here, so drop the old file name
4900 * information before refreshing it */
4901 bs->exact_filename[0] = '\0';
4902 if (bs->full_open_options) {
4903 QDECREF(bs->full_open_options);
4904 bs->full_open_options = NULL;
4905 }
4906
4cdd01d3
KW
4907 opts = qdict_new();
4908 append_open_options(opts, bs);
4909 drv->bdrv_refresh_filename(bs, opts);
4910 QDECREF(opts);
91af7014
HR
4911 } else if (bs->file) {
4912 /* Try to reconstruct valid information from the underlying file */
4913 bool has_open_options;
4914
4915 bs->exact_filename[0] = '\0';
4916 if (bs->full_open_options) {
4917 QDECREF(bs->full_open_options);
4918 bs->full_open_options = NULL;
4919 }
4920
4921 opts = qdict_new();
4922 has_open_options = append_open_options(opts, bs);
4923
4924 /* If no specific options have been given for this BDS, the filename of
4925 * the underlying file should suffice for this one as well */
9a4f4c31
KW
4926 if (bs->file->bs->exact_filename[0] && !has_open_options) {
4927 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
4928 }
4929 /* Reconstructing the full options QDict is simple for most format block
4930 * drivers, as long as the full options are known for the underlying
4931 * file BDS. The full options QDict of that file BDS should somehow
4932 * contain a representation of the filename, therefore the following
4933 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 4934 if (bs->file->bs->full_open_options) {
46f5ac20 4935 qdict_put_str(opts, "driver", drv->format_name);
9a4f4c31 4936 QINCREF(bs->file->bs->full_open_options);
de6e7951 4937 qdict_put(opts, "file", bs->file->bs->full_open_options);
91af7014
HR
4938
4939 bs->full_open_options = opts;
4940 } else {
4941 QDECREF(opts);
4942 }
4943 } else if (!bs->full_open_options && qdict_size(bs->options)) {
4944 /* There is no underlying file BDS (at least referenced by BDS.file),
4945 * so the full options QDict should be equal to the options given
4946 * specifically for this block device when it was opened (plus the
4947 * driver specification).
4948 * Because those options don't change, there is no need to update
4949 * full_open_options when it's already set. */
4950
4951 opts = qdict_new();
4952 append_open_options(opts, bs);
46f5ac20 4953 qdict_put_str(opts, "driver", drv->format_name);
91af7014
HR
4954
4955 if (bs->exact_filename[0]) {
4956 /* This may not work for all block protocol drivers (some may
4957 * require this filename to be parsed), but we have to find some
4958 * default solution here, so just include it. If some block driver
4959 * does not support pure options without any filename at all or
4960 * needs some special format of the options QDict, it needs to
4961 * implement the driver-specific bdrv_refresh_filename() function.
4962 */
46f5ac20 4963 qdict_put_str(opts, "filename", bs->exact_filename);
91af7014
HR
4964 }
4965
4966 bs->full_open_options = opts;
4967 }
4968
4969 if (bs->exact_filename[0]) {
4970 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4971 } else if (bs->full_open_options) {
4972 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4973 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4974 qstring_get_str(json));
4975 QDECREF(json);
4976 }
4977}
e06018ad
WC
4978
4979/*
4980 * Hot add/remove a BDS's child. So the user can take a child offline when
4981 * it is broken and take a new child online
4982 */
4983void bdrv_add_child(BlockDriverState *parent_bs, BlockDriverState *child_bs,
4984 Error **errp)
4985{
4986
4987 if (!parent_bs->drv || !parent_bs->drv->bdrv_add_child) {
4988 error_setg(errp, "The node %s does not support adding a child",
4989 bdrv_get_device_or_node_name(parent_bs));
4990 return;
4991 }
4992
4993 if (!QLIST_EMPTY(&child_bs->parents)) {
4994 error_setg(errp, "The node %s already has a parent",
4995 child_bs->node_name);
4996 return;
4997 }
4998
4999 parent_bs->drv->bdrv_add_child(parent_bs, child_bs, errp);
5000}
5001
5002void bdrv_del_child(BlockDriverState *parent_bs, BdrvChild *child, Error **errp)
5003{
5004 BdrvChild *tmp;
5005
5006 if (!parent_bs->drv || !parent_bs->drv->bdrv_del_child) {
5007 error_setg(errp, "The node %s does not support removing a child",
5008 bdrv_get_device_or_node_name(parent_bs));
5009 return;
5010 }
5011
5012 QLIST_FOREACH(tmp, &parent_bs->children, next) {
5013 if (tmp == child) {
5014 break;
5015 }
5016 }
5017
5018 if (!tmp) {
5019 error_setg(errp, "The node %s does not have a child named %s",
5020 bdrv_get_device_or_node_name(parent_bs),
5021 bdrv_get_device_or_node_name(child->bs));
5022 return;
5023 }
5024
5025 parent_bs->drv->bdrv_del_child(parent_bs, child, errp);
5026}
67b792f5
VSO
5027
5028bool bdrv_can_store_new_dirty_bitmap(BlockDriverState *bs, const char *name,
5029 uint32_t granularity, Error **errp)
5030{
5031 BlockDriver *drv = bs->drv;
5032
5033 if (!drv) {
5034 error_setg_errno(errp, ENOMEDIUM,
5035 "Can't store persistent bitmaps to %s",
5036 bdrv_get_device_or_node_name(bs));
5037 return false;
5038 }
5039
5040 if (!drv->bdrv_can_store_new_dirty_bitmap) {
5041 error_setg_errno(errp, ENOTSUP,
5042 "Can't store persistent bitmaps to %s",
5043 bdrv_get_device_or_node_name(bs));
5044 return false;
5045 }
5046
5047 return drv->bdrv_can_store_new_dirty_bitmap(bs, name, granularity, errp);
5048}