]> git.proxmox.com Git - mirror_qemu.git/blame - block.c
block: reopen: Queue children after their parents
[mirror_qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
d38ea87a 24#include "qemu/osdep.h"
0ab8ed18 25#include "block/trace.h"
737e150e
PB
26#include "block/block_int.h"
27#include "block/blockjob.h"
cd7fca95 28#include "block/nbd.h"
d49b6836 29#include "qemu/error-report.h"
88d88798 30#include "module_block.h"
1de7afc9 31#include "qemu/module.h"
cc7a8ea7 32#include "qapi/qmp/qerror.h"
91a097e7 33#include "qapi/qmp/qbool.h"
7b1b5d19 34#include "qapi/qmp/qjson.h"
bfb197e0 35#include "sysemu/block-backend.h"
9c17d615 36#include "sysemu/sysemu.h"
1de7afc9 37#include "qemu/notify.h"
10817bf0 38#include "qemu/coroutine.h"
c13163fb 39#include "block/qapi.h"
b2023818 40#include "qmp-commands.h"
1de7afc9 41#include "qemu/timer.h"
a5ee7bd4 42#include "qapi-event.h"
f348b6d1
VB
43#include "qemu/cutils.h"
44#include "qemu/id.h"
fc01f7e7 45
71e72a19 46#ifdef CONFIG_BSD
7674e7bf 47#include <sys/ioctl.h>
72cf2d4f 48#include <sys/queue.h>
c5e97233 49#ifndef __DragonFly__
7674e7bf
FB
50#include <sys/disk.h>
51#endif
c5e97233 52#endif
7674e7bf 53
49dc768d
AL
54#ifdef _WIN32
55#include <windows.h>
56#endif
57
1c9805a3
SH
58#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
59
dc364f4c
BC
60static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
61 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
62
2c1d04e0
HR
63static QTAILQ_HEAD(, BlockDriverState) all_bdrv_states =
64 QTAILQ_HEAD_INITIALIZER(all_bdrv_states);
65
8a22f02a
SH
66static QLIST_HEAD(, BlockDriver) bdrv_drivers =
67 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 68
5b363937
HR
69static BlockDriverState *bdrv_open_inherit(const char *filename,
70 const char *reference,
71 QDict *options, int flags,
72 BlockDriverState *parent,
73 const BdrvChildRole *child_role,
74 Error **errp);
f3930ed0 75
eb852011
MA
76/* If non-zero, use only whitelisted block drivers */
77static int use_bdrv_whitelist;
78
9e0b22f4
SH
79#ifdef _WIN32
80static int is_windows_drive_prefix(const char *filename)
81{
82 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
83 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
84 filename[1] == ':');
85}
86
87int is_windows_drive(const char *filename)
88{
89 if (is_windows_drive_prefix(filename) &&
90 filename[2] == '\0')
91 return 1;
92 if (strstart(filename, "\\\\.\\", NULL) ||
93 strstart(filename, "//./", NULL))
94 return 1;
95 return 0;
96}
97#endif
98
339064d5
KW
99size_t bdrv_opt_mem_align(BlockDriverState *bs)
100{
101 if (!bs || !bs->drv) {
459b4e66
DL
102 /* page size or 4k (hdd sector size) should be on the safe side */
103 return MAX(4096, getpagesize());
339064d5
KW
104 }
105
106 return bs->bl.opt_mem_alignment;
107}
108
4196d2f0
DL
109size_t bdrv_min_mem_align(BlockDriverState *bs)
110{
111 if (!bs || !bs->drv) {
459b4e66
DL
112 /* page size or 4k (hdd sector size) should be on the safe side */
113 return MAX(4096, getpagesize());
4196d2f0
DL
114 }
115
116 return bs->bl.min_mem_alignment;
117}
118
9e0b22f4 119/* check if the path starts with "<protocol>:" */
5c98415b 120int path_has_protocol(const char *path)
9e0b22f4 121{
947995c0
PB
122 const char *p;
123
9e0b22f4
SH
124#ifdef _WIN32
125 if (is_windows_drive(path) ||
126 is_windows_drive_prefix(path)) {
127 return 0;
128 }
947995c0
PB
129 p = path + strcspn(path, ":/\\");
130#else
131 p = path + strcspn(path, ":/");
9e0b22f4
SH
132#endif
133
947995c0 134 return *p == ':';
9e0b22f4
SH
135}
136
83f64091 137int path_is_absolute(const char *path)
3b0d4f61 138{
21664424
FB
139#ifdef _WIN32
140 /* specific case for names like: "\\.\d:" */
f53f4da9 141 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 142 return 1;
f53f4da9
PB
143 }
144 return (*path == '/' || *path == '\\');
3b9f94e1 145#else
f53f4da9 146 return (*path == '/');
3b9f94e1 147#endif
3b0d4f61
FB
148}
149
83f64091
FB
150/* if filename is absolute, just copy it to dest. Otherwise, build a
151 path to it by considering it is relative to base_path. URL are
152 supported. */
153void path_combine(char *dest, int dest_size,
154 const char *base_path,
155 const char *filename)
3b0d4f61 156{
83f64091
FB
157 const char *p, *p1;
158 int len;
159
160 if (dest_size <= 0)
161 return;
162 if (path_is_absolute(filename)) {
163 pstrcpy(dest, dest_size, filename);
164 } else {
0d54a6fe
HR
165 const char *protocol_stripped = NULL;
166
167 if (path_has_protocol(base_path)) {
168 protocol_stripped = strchr(base_path, ':');
169 if (protocol_stripped) {
170 protocol_stripped++;
171 }
172 }
173 p = protocol_stripped ?: base_path;
174
3b9f94e1
FB
175 p1 = strrchr(base_path, '/');
176#ifdef _WIN32
177 {
178 const char *p2;
179 p2 = strrchr(base_path, '\\');
180 if (!p1 || p2 > p1)
181 p1 = p2;
182 }
183#endif
83f64091
FB
184 if (p1)
185 p1++;
186 else
187 p1 = base_path;
188 if (p1 > p)
189 p = p1;
190 len = p - base_path;
191 if (len > dest_size - 1)
192 len = dest_size - 1;
193 memcpy(dest, base_path, len);
194 dest[len] = '\0';
195 pstrcat(dest, dest_size, filename);
3b0d4f61 196 }
3b0d4f61
FB
197}
198
03c320d8
HR
199/*
200 * Helper function for bdrv_parse_filename() implementations to remove optional
201 * protocol prefixes (especially "file:") from a filename and for putting the
202 * stripped filename into the options QDict if there is such a prefix.
203 */
204void bdrv_parse_filename_strip_prefix(const char *filename, const char *prefix,
205 QDict *options)
206{
207 if (strstart(filename, prefix, &filename)) {
208 /* Stripping the explicit protocol prefix may result in a protocol
209 * prefix being (wrongly) detected (if the filename contains a colon) */
210 if (path_has_protocol(filename)) {
211 QString *fat_filename;
212
213 /* This means there is some colon before the first slash; therefore,
214 * this cannot be an absolute path */
215 assert(!path_is_absolute(filename));
216
217 /* And we can thus fix the protocol detection issue by prefixing it
218 * by "./" */
219 fat_filename = qstring_from_str("./");
220 qstring_append(fat_filename, filename);
221
222 assert(!path_has_protocol(qstring_get_str(fat_filename)));
223
224 qdict_put(options, "filename", fat_filename);
225 } else {
226 /* If no protocol prefix was detected, we can use the shortened
227 * filename as-is */
228 qdict_put_str(options, "filename", filename);
229 }
230 }
231}
232
233
9c5e6594
KW
234/* Returns whether the image file is opened as read-only. Note that this can
235 * return false and writing to the image file is still not possible because the
236 * image is inactivated. */
93ed524e
JC
237bool bdrv_is_read_only(BlockDriverState *bs)
238{
239 return bs->read_only;
240}
241
54a32bfe
KW
242int bdrv_can_set_read_only(BlockDriverState *bs, bool read_only,
243 bool ignore_allow_rdw, Error **errp)
fe5241bf 244{
e2b8247a
JC
245 /* Do not set read_only if copy_on_read is enabled */
246 if (bs->copy_on_read && read_only) {
247 error_setg(errp, "Can't set node '%s' to r/o with copy-on-read enabled",
248 bdrv_get_device_or_node_name(bs));
249 return -EINVAL;
250 }
251
d6fcdf06 252 /* Do not clear read_only if it is prohibited */
54a32bfe
KW
253 if (!read_only && !(bs->open_flags & BDRV_O_ALLOW_RDWR) &&
254 !ignore_allow_rdw)
255 {
d6fcdf06
JC
256 error_setg(errp, "Node '%s' is read only",
257 bdrv_get_device_or_node_name(bs));
258 return -EPERM;
259 }
260
45803a03
JC
261 return 0;
262}
263
264int bdrv_set_read_only(BlockDriverState *bs, bool read_only, Error **errp)
265{
266 int ret = 0;
267
54a32bfe 268 ret = bdrv_can_set_read_only(bs, read_only, false, errp);
45803a03
JC
269 if (ret < 0) {
270 return ret;
271 }
272
fe5241bf 273 bs->read_only = read_only;
e2b8247a 274 return 0;
fe5241bf
JC
275}
276
0a82855a
HR
277void bdrv_get_full_backing_filename_from_filename(const char *backed,
278 const char *backing,
9f07429e
HR
279 char *dest, size_t sz,
280 Error **errp)
dc5a1371 281{
9f07429e
HR
282 if (backing[0] == '\0' || path_has_protocol(backing) ||
283 path_is_absolute(backing))
284 {
0a82855a 285 pstrcpy(dest, sz, backing);
9f07429e
HR
286 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
287 error_setg(errp, "Cannot use relative backing file names for '%s'",
288 backed);
dc5a1371 289 } else {
0a82855a 290 path_combine(dest, sz, backed, backing);
dc5a1371
PB
291 }
292}
293
9f07429e
HR
294void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
295 Error **errp)
0a82855a 296{
9f07429e
HR
297 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
298
299 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
300 dest, sz, errp);
0a82855a
HR
301}
302
0eb7217e
SH
303void bdrv_register(BlockDriver *bdrv)
304{
8a22f02a 305 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 306}
b338082b 307
e4e9986b
MA
308BlockDriverState *bdrv_new(void)
309{
310 BlockDriverState *bs;
311 int i;
312
5839e53b 313 bs = g_new0(BlockDriverState, 1);
e4654d2d 314 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
315 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
316 QLIST_INIT(&bs->op_blockers[i]);
317 }
d616b224 318 notifier_with_return_list_init(&bs->before_write_notifiers);
3783fa3d 319 qemu_co_mutex_init(&bs->reqs_lock);
2119882c 320 qemu_mutex_init(&bs->dirty_bitmap_mutex);
9fcb0251 321 bs->refcnt = 1;
dcd04228 322 bs->aio_context = qemu_get_aio_context();
d7d512f6 323
3ff2f67a
EY
324 qemu_co_queue_init(&bs->flush_queue);
325
2c1d04e0
HR
326 QTAILQ_INSERT_TAIL(&all_bdrv_states, bs, bs_list);
327
b338082b
FB
328 return bs;
329}
330
88d88798 331static BlockDriver *bdrv_do_find_format(const char *format_name)
ea2384d3
FB
332{
333 BlockDriver *drv1;
88d88798 334
8a22f02a
SH
335 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
336 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 337 return drv1;
8a22f02a 338 }
ea2384d3 339 }
88d88798 340
ea2384d3
FB
341 return NULL;
342}
343
88d88798
MM
344BlockDriver *bdrv_find_format(const char *format_name)
345{
346 BlockDriver *drv1;
347 int i;
348
349 drv1 = bdrv_do_find_format(format_name);
350 if (drv1) {
351 return drv1;
352 }
353
354 /* The driver isn't registered, maybe we need to load a module */
355 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); ++i) {
356 if (!strcmp(block_driver_modules[i].format_name, format_name)) {
357 block_module_load_one(block_driver_modules[i].library_name);
358 break;
359 }
360 }
361
362 return bdrv_do_find_format(format_name);
363}
364
b64ec4e4 365static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 366{
b64ec4e4
FZ
367 static const char *whitelist_rw[] = {
368 CONFIG_BDRV_RW_WHITELIST
369 };
370 static const char *whitelist_ro[] = {
371 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
372 };
373 const char **p;
374
b64ec4e4 375 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 376 return 1; /* no whitelist, anything goes */
b64ec4e4 377 }
eb852011 378
b64ec4e4 379 for (p = whitelist_rw; *p; p++) {
eb852011
MA
380 if (!strcmp(drv->format_name, *p)) {
381 return 1;
382 }
383 }
b64ec4e4
FZ
384 if (read_only) {
385 for (p = whitelist_ro; *p; p++) {
386 if (!strcmp(drv->format_name, *p)) {
387 return 1;
388 }
389 }
390 }
eb852011
MA
391 return 0;
392}
393
e6ff69bf
DB
394bool bdrv_uses_whitelist(void)
395{
396 return use_bdrv_whitelist;
397}
398
5b7e1542
ZYW
399typedef struct CreateCo {
400 BlockDriver *drv;
401 char *filename;
83d0521a 402 QemuOpts *opts;
5b7e1542 403 int ret;
cc84d90f 404 Error *err;
5b7e1542
ZYW
405} CreateCo;
406
407static void coroutine_fn bdrv_create_co_entry(void *opaque)
408{
cc84d90f
HR
409 Error *local_err = NULL;
410 int ret;
411
5b7e1542
ZYW
412 CreateCo *cco = opaque;
413 assert(cco->drv);
414
c282e1fd 415 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
621ff94d 416 error_propagate(&cco->err, local_err);
cc84d90f 417 cco->ret = ret;
5b7e1542
ZYW
418}
419
0e7e1989 420int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 421 QemuOpts *opts, Error **errp)
ea2384d3 422{
5b7e1542
ZYW
423 int ret;
424
425 Coroutine *co;
426 CreateCo cco = {
427 .drv = drv,
428 .filename = g_strdup(filename),
83d0521a 429 .opts = opts,
5b7e1542 430 .ret = NOT_DONE,
cc84d90f 431 .err = NULL,
5b7e1542
ZYW
432 };
433
c282e1fd 434 if (!drv->bdrv_create) {
cc84d90f 435 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
436 ret = -ENOTSUP;
437 goto out;
5b7e1542
ZYW
438 }
439
440 if (qemu_in_coroutine()) {
441 /* Fast-path if already in coroutine context */
442 bdrv_create_co_entry(&cco);
443 } else {
0b8b8753
PB
444 co = qemu_coroutine_create(bdrv_create_co_entry, &cco);
445 qemu_coroutine_enter(co);
5b7e1542 446 while (cco.ret == NOT_DONE) {
b47ec2c4 447 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
448 }
449 }
450
451 ret = cco.ret;
cc84d90f 452 if (ret < 0) {
84d18f06 453 if (cco.err) {
cc84d90f
HR
454 error_propagate(errp, cco.err);
455 } else {
456 error_setg_errno(errp, -ret, "Could not create image");
457 }
458 }
0e7e1989 459
80168bff
LC
460out:
461 g_free(cco.filename);
5b7e1542 462 return ret;
ea2384d3
FB
463}
464
c282e1fd 465int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
466{
467 BlockDriver *drv;
cc84d90f
HR
468 Error *local_err = NULL;
469 int ret;
84a12e66 470
b65a5e12 471 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 472 if (drv == NULL) {
16905d71 473 return -ENOENT;
84a12e66
CH
474 }
475
c282e1fd 476 ret = bdrv_create(drv, filename, opts, &local_err);
621ff94d 477 error_propagate(errp, local_err);
cc84d90f 478 return ret;
84a12e66
CH
479}
480
892b7de8
ET
481/**
482 * Try to get @bs's logical and physical block size.
483 * On success, store them in @bsz struct and return 0.
484 * On failure return -errno.
485 * @bs must not be empty.
486 */
487int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
488{
489 BlockDriver *drv = bs->drv;
490
491 if (drv && drv->bdrv_probe_blocksizes) {
492 return drv->bdrv_probe_blocksizes(bs, bsz);
5a612c00
MP
493 } else if (drv && drv->is_filter && bs->file) {
494 return bdrv_probe_blocksizes(bs->file->bs, bsz);
892b7de8
ET
495 }
496
497 return -ENOTSUP;
498}
499
500/**
501 * Try to get @bs's geometry (cyls, heads, sectors).
502 * On success, store them in @geo struct and return 0.
503 * On failure return -errno.
504 * @bs must not be empty.
505 */
506int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
507{
508 BlockDriver *drv = bs->drv;
509
510 if (drv && drv->bdrv_probe_geometry) {
511 return drv->bdrv_probe_geometry(bs, geo);
5a612c00
MP
512 } else if (drv && drv->is_filter && bs->file) {
513 return bdrv_probe_geometry(bs->file->bs, geo);
892b7de8
ET
514 }
515
516 return -ENOTSUP;
517}
518
eba25057
JM
519/*
520 * Create a uniquely-named empty temporary file.
521 * Return 0 upon success, otherwise a negative errno value.
522 */
523int get_tmp_filename(char *filename, int size)
d5249393 524{
eba25057 525#ifdef _WIN32
3b9f94e1 526 char temp_dir[MAX_PATH];
eba25057
JM
527 /* GetTempFileName requires that its output buffer (4th param)
528 have length MAX_PATH or greater. */
529 assert(size >= MAX_PATH);
530 return (GetTempPath(MAX_PATH, temp_dir)
531 && GetTempFileName(temp_dir, "qem", 0, filename)
532 ? 0 : -GetLastError());
d5249393 533#else
67b915a5 534 int fd;
7ccfb2eb 535 const char *tmpdir;
0badc1ee 536 tmpdir = getenv("TMPDIR");
69bef793
AS
537 if (!tmpdir) {
538 tmpdir = "/var/tmp";
539 }
eba25057
JM
540 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
541 return -EOVERFLOW;
542 }
ea2384d3 543 fd = mkstemp(filename);
fe235a06
DH
544 if (fd < 0) {
545 return -errno;
546 }
547 if (close(fd) != 0) {
548 unlink(filename);
eba25057
JM
549 return -errno;
550 }
551 return 0;
d5249393 552#endif
eba25057 553}
fc01f7e7 554
84a12e66
CH
555/*
556 * Detect host devices. By convention, /dev/cdrom[N] is always
557 * recognized as a host CDROM.
558 */
559static BlockDriver *find_hdev_driver(const char *filename)
560{
561 int score_max = 0, score;
562 BlockDriver *drv = NULL, *d;
563
564 QLIST_FOREACH(d, &bdrv_drivers, list) {
565 if (d->bdrv_probe_device) {
566 score = d->bdrv_probe_device(filename);
567 if (score > score_max) {
568 score_max = score;
569 drv = d;
570 }
571 }
572 }
573
574 return drv;
575}
576
88d88798
MM
577static BlockDriver *bdrv_do_find_protocol(const char *protocol)
578{
579 BlockDriver *drv1;
580
581 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
582 if (drv1->protocol_name && !strcmp(drv1->protocol_name, protocol)) {
583 return drv1;
584 }
585 }
586
587 return NULL;
588}
589
98289620 590BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
591 bool allow_protocol_prefix,
592 Error **errp)
83f64091
FB
593{
594 BlockDriver *drv1;
595 char protocol[128];
1cec71e3 596 int len;
83f64091 597 const char *p;
88d88798 598 int i;
19cb3738 599
66f82cee
KW
600 /* TODO Drivers without bdrv_file_open must be specified explicitly */
601
39508e7a
CH
602 /*
603 * XXX(hch): we really should not let host device detection
604 * override an explicit protocol specification, but moving this
605 * later breaks access to device names with colons in them.
606 * Thanks to the brain-dead persistent naming schemes on udev-
607 * based Linux systems those actually are quite common.
608 */
609 drv1 = find_hdev_driver(filename);
610 if (drv1) {
611 return drv1;
612 }
613
98289620 614 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 615 return &bdrv_file;
84a12e66 616 }
98289620 617
9e0b22f4
SH
618 p = strchr(filename, ':');
619 assert(p != NULL);
1cec71e3
AL
620 len = p - filename;
621 if (len > sizeof(protocol) - 1)
622 len = sizeof(protocol) - 1;
623 memcpy(protocol, filename, len);
624 protocol[len] = '\0';
88d88798
MM
625
626 drv1 = bdrv_do_find_protocol(protocol);
627 if (drv1) {
628 return drv1;
629 }
630
631 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); ++i) {
632 if (block_driver_modules[i].protocol_name &&
633 !strcmp(block_driver_modules[i].protocol_name, protocol)) {
634 block_module_load_one(block_driver_modules[i].library_name);
635 break;
8a22f02a 636 }
83f64091 637 }
b65a5e12 638
88d88798
MM
639 drv1 = bdrv_do_find_protocol(protocol);
640 if (!drv1) {
641 error_setg(errp, "Unknown protocol '%s'", protocol);
642 }
643 return drv1;
83f64091
FB
644}
645
c6684249
MA
646/*
647 * Guess image format by probing its contents.
648 * This is not a good idea when your image is raw (CVE-2008-2004), but
649 * we do it anyway for backward compatibility.
650 *
651 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
652 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
653 * but can be smaller if the image file is smaller)
c6684249
MA
654 * @filename is its filename.
655 *
656 * For all block drivers, call the bdrv_probe() method to get its
657 * probing score.
658 * Return the first block driver with the highest probing score.
659 */
38f3ef57
KW
660BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
661 const char *filename)
c6684249
MA
662{
663 int score_max = 0, score;
664 BlockDriver *drv = NULL, *d;
665
666 QLIST_FOREACH(d, &bdrv_drivers, list) {
667 if (d->bdrv_probe) {
668 score = d->bdrv_probe(buf, buf_size, filename);
669 if (score > score_max) {
670 score_max = score;
671 drv = d;
672 }
673 }
674 }
675
676 return drv;
677}
678
5696c6e3 679static int find_image_format(BlockBackend *file, const char *filename,
34b5d2c6 680 BlockDriver **pdrv, Error **errp)
f3a5d3f8 681{
c6684249 682 BlockDriver *drv;
7cddd372 683 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 684 int ret = 0;
f8ea0b00 685
08a00559 686 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
5696c6e3 687 if (blk_is_sg(file) || !blk_is_inserted(file) || blk_getlength(file) == 0) {
ef810437 688 *pdrv = &bdrv_raw;
c98ac35d 689 return ret;
1a396859 690 }
f8ea0b00 691
5696c6e3 692 ret = blk_pread(file, 0, buf, sizeof(buf));
83f64091 693 if (ret < 0) {
34b5d2c6
HR
694 error_setg_errno(errp, -ret, "Could not read image for determining its "
695 "format");
c98ac35d
SW
696 *pdrv = NULL;
697 return ret;
83f64091
FB
698 }
699
c6684249 700 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 701 if (!drv) {
34b5d2c6
HR
702 error_setg(errp, "Could not determine image format: No compatible "
703 "driver found");
c98ac35d
SW
704 ret = -ENOENT;
705 }
706 *pdrv = drv;
707 return ret;
ea2384d3
FB
708}
709
51762288
SH
710/**
711 * Set the current 'total_sectors' value
65a9bb25 712 * Return 0 on success, -errno on error.
51762288
SH
713 */
714static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
715{
716 BlockDriver *drv = bs->drv;
717
396759ad 718 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 719 if (bdrv_is_sg(bs))
396759ad
NB
720 return 0;
721
51762288
SH
722 /* query actual device if possible, otherwise just trust the hint */
723 if (drv->bdrv_getlength) {
724 int64_t length = drv->bdrv_getlength(bs);
725 if (length < 0) {
726 return length;
727 }
7e382003 728 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
729 }
730
731 bs->total_sectors = hint;
732 return 0;
733}
734
cddff5ba
KW
735/**
736 * Combines a QDict of new block driver @options with any missing options taken
737 * from @old_options, so that leaving out an option defaults to its old value.
738 */
739static void bdrv_join_options(BlockDriverState *bs, QDict *options,
740 QDict *old_options)
741{
742 if (bs->drv && bs->drv->bdrv_join_options) {
743 bs->drv->bdrv_join_options(options, old_options);
744 } else {
745 qdict_join(options, old_options, false);
746 }
747}
748
9e8f1835
PB
749/**
750 * Set open flags for a given discard mode
751 *
752 * Return 0 on success, -1 if the discard mode was invalid.
753 */
754int bdrv_parse_discard_flags(const char *mode, int *flags)
755{
756 *flags &= ~BDRV_O_UNMAP;
757
758 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
759 /* do nothing */
760 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
761 *flags |= BDRV_O_UNMAP;
762 } else {
763 return -1;
764 }
765
766 return 0;
767}
768
c3993cdc
SH
769/**
770 * Set open flags for a given cache mode
771 *
772 * Return 0 on success, -1 if the cache mode was invalid.
773 */
53e8ae01 774int bdrv_parse_cache_mode(const char *mode, int *flags, bool *writethrough)
c3993cdc
SH
775{
776 *flags &= ~BDRV_O_CACHE_MASK;
777
778 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
53e8ae01
KW
779 *writethrough = false;
780 *flags |= BDRV_O_NOCACHE;
92196b2f 781 } else if (!strcmp(mode, "directsync")) {
53e8ae01 782 *writethrough = true;
92196b2f 783 *flags |= BDRV_O_NOCACHE;
c3993cdc 784 } else if (!strcmp(mode, "writeback")) {
53e8ae01 785 *writethrough = false;
c3993cdc 786 } else if (!strcmp(mode, "unsafe")) {
53e8ae01 787 *writethrough = false;
c3993cdc
SH
788 *flags |= BDRV_O_NO_FLUSH;
789 } else if (!strcmp(mode, "writethrough")) {
53e8ae01 790 *writethrough = true;
c3993cdc
SH
791 } else {
792 return -1;
793 }
794
795 return 0;
796}
797
b5411555
KW
798static char *bdrv_child_get_parent_desc(BdrvChild *c)
799{
800 BlockDriverState *parent = c->opaque;
801 return g_strdup(bdrv_get_device_or_node_name(parent));
802}
803
20018e12
KW
804static void bdrv_child_cb_drained_begin(BdrvChild *child)
805{
806 BlockDriverState *bs = child->opaque;
807 bdrv_drained_begin(bs);
808}
809
810static void bdrv_child_cb_drained_end(BdrvChild *child)
811{
812 BlockDriverState *bs = child->opaque;
813 bdrv_drained_end(bs);
814}
815
38701b6a
KW
816static int bdrv_child_cb_inactivate(BdrvChild *child)
817{
818 BlockDriverState *bs = child->opaque;
819 assert(bs->open_flags & BDRV_O_INACTIVE);
820 return 0;
821}
822
b1e6fc08 823/*
73176bee
KW
824 * Returns the options and flags that a temporary snapshot should get, based on
825 * the originally requested flags (the originally requested image will have
826 * flags like a backing file)
b1e6fc08 827 */
73176bee
KW
828static void bdrv_temp_snapshot_options(int *child_flags, QDict *child_options,
829 int parent_flags, QDict *parent_options)
b1e6fc08 830{
73176bee
KW
831 *child_flags = (parent_flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
832
833 /* For temporary files, unconditional cache=unsafe is fine */
73176bee
KW
834 qdict_set_default_str(child_options, BDRV_OPT_CACHE_DIRECT, "off");
835 qdict_set_default_str(child_options, BDRV_OPT_CACHE_NO_FLUSH, "on");
41869044 836
f87a0e29
AG
837 /* Copy the read-only option from the parent */
838 qdict_copy_default(child_options, parent_options, BDRV_OPT_READ_ONLY);
839
41869044
KW
840 /* aio=native doesn't work for cache.direct=off, so disable it for the
841 * temporary snapshot */
842 *child_flags &= ~BDRV_O_NATIVE_AIO;
b1e6fc08
KW
843}
844
0b50cc88 845/*
8e2160e2
KW
846 * Returns the options and flags that bs->file should get if a protocol driver
847 * is expected, based on the given options and flags for the parent BDS
0b50cc88 848 */
8e2160e2
KW
849static void bdrv_inherited_options(int *child_flags, QDict *child_options,
850 int parent_flags, QDict *parent_options)
0b50cc88 851{
8e2160e2
KW
852 int flags = parent_flags;
853
0b50cc88
KW
854 /* Enable protocol handling, disable format probing for bs->file */
855 flags |= BDRV_O_PROTOCOL;
856
91a097e7
KW
857 /* If the cache mode isn't explicitly set, inherit direct and no-flush from
858 * the parent. */
859 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
860 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
5a9347c6 861 qdict_copy_default(child_options, parent_options, BDRV_OPT_FORCE_SHARE);
91a097e7 862
f87a0e29
AG
863 /* Inherit the read-only option from the parent if it's not set */
864 qdict_copy_default(child_options, parent_options, BDRV_OPT_READ_ONLY);
865
0b50cc88 866 /* Our block drivers take care to send flushes and respect unmap policy,
91a097e7
KW
867 * so we can default to enable both on lower layers regardless of the
868 * corresponding parent options. */
818584a4 869 qdict_set_default_str(child_options, BDRV_OPT_DISCARD, "unmap");
0b50cc88 870
0b50cc88 871 /* Clear flags that only apply to the top layer */
abb06c5a
DB
872 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ |
873 BDRV_O_NO_IO);
0b50cc88 874
8e2160e2 875 *child_flags = flags;
0b50cc88
KW
876}
877
f3930ed0 878const BdrvChildRole child_file = {
b5411555 879 .get_parent_desc = bdrv_child_get_parent_desc,
8e2160e2 880 .inherit_options = bdrv_inherited_options,
20018e12
KW
881 .drained_begin = bdrv_child_cb_drained_begin,
882 .drained_end = bdrv_child_cb_drained_end,
38701b6a 883 .inactivate = bdrv_child_cb_inactivate,
f3930ed0
KW
884};
885
886/*
8e2160e2
KW
887 * Returns the options and flags that bs->file should get if the use of formats
888 * (and not only protocols) is permitted for it, based on the given options and
889 * flags for the parent BDS
f3930ed0 890 */
8e2160e2
KW
891static void bdrv_inherited_fmt_options(int *child_flags, QDict *child_options,
892 int parent_flags, QDict *parent_options)
f3930ed0 893{
8e2160e2
KW
894 child_file.inherit_options(child_flags, child_options,
895 parent_flags, parent_options);
896
abb06c5a 897 *child_flags &= ~(BDRV_O_PROTOCOL | BDRV_O_NO_IO);
f3930ed0
KW
898}
899
900const BdrvChildRole child_format = {
b5411555 901 .get_parent_desc = bdrv_child_get_parent_desc,
8e2160e2 902 .inherit_options = bdrv_inherited_fmt_options,
20018e12
KW
903 .drained_begin = bdrv_child_cb_drained_begin,
904 .drained_end = bdrv_child_cb_drained_end,
38701b6a 905 .inactivate = bdrv_child_cb_inactivate,
f3930ed0
KW
906};
907
db95dbba
KW
908static void bdrv_backing_attach(BdrvChild *c)
909{
910 BlockDriverState *parent = c->opaque;
911 BlockDriverState *backing_hd = c->bs;
912
913 assert(!parent->backing_blocker);
914 error_setg(&parent->backing_blocker,
915 "node is used as backing hd of '%s'",
916 bdrv_get_device_or_node_name(parent));
917
918 parent->open_flags &= ~BDRV_O_NO_BACKING;
919 pstrcpy(parent->backing_file, sizeof(parent->backing_file),
920 backing_hd->filename);
921 pstrcpy(parent->backing_format, sizeof(parent->backing_format),
922 backing_hd->drv ? backing_hd->drv->format_name : "");
923
924 bdrv_op_block_all(backing_hd, parent->backing_blocker);
925 /* Otherwise we won't be able to commit or stream */
926 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
927 parent->backing_blocker);
928 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_STREAM,
929 parent->backing_blocker);
930 /*
931 * We do backup in 3 ways:
932 * 1. drive backup
933 * The target bs is new opened, and the source is top BDS
934 * 2. blockdev backup
935 * Both the source and the target are top BDSes.
936 * 3. internal backup(used for block replication)
937 * Both the source and the target are backing file
938 *
939 * In case 1 and 2, neither the source nor the target is the backing file.
940 * In case 3, we will block the top BDS, so there is only one block job
941 * for the top BDS and its backing chain.
942 */
943 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_BACKUP_SOURCE,
944 parent->backing_blocker);
945 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_BACKUP_TARGET,
946 parent->backing_blocker);
947}
948
949static void bdrv_backing_detach(BdrvChild *c)
950{
951 BlockDriverState *parent = c->opaque;
952
953 assert(parent->backing_blocker);
954 bdrv_op_unblock_all(c->bs, parent->backing_blocker);
955 error_free(parent->backing_blocker);
956 parent->backing_blocker = NULL;
957}
958
317fc44e 959/*
8e2160e2
KW
960 * Returns the options and flags that bs->backing should get, based on the
961 * given options and flags for the parent BDS
317fc44e 962 */
8e2160e2
KW
963static void bdrv_backing_options(int *child_flags, QDict *child_options,
964 int parent_flags, QDict *parent_options)
317fc44e 965{
8e2160e2
KW
966 int flags = parent_flags;
967
b8816a43
KW
968 /* The cache mode is inherited unmodified for backing files; except WCE,
969 * which is only applied on the top level (BlockBackend) */
91a097e7
KW
970 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
971 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
5a9347c6 972 qdict_copy_default(child_options, parent_options, BDRV_OPT_FORCE_SHARE);
91a097e7 973
317fc44e 974 /* backing files always opened read-only */
f87a0e29
AG
975 qdict_set_default_str(child_options, BDRV_OPT_READ_ONLY, "on");
976 flags &= ~BDRV_O_COPY_ON_READ;
317fc44e
KW
977
978 /* snapshot=on is handled on the top layer */
8bfea15d 979 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e 980
8e2160e2 981 *child_flags = flags;
317fc44e
KW
982}
983
91ef3825 984const BdrvChildRole child_backing = {
b5411555 985 .get_parent_desc = bdrv_child_get_parent_desc,
db95dbba
KW
986 .attach = bdrv_backing_attach,
987 .detach = bdrv_backing_detach,
8e2160e2 988 .inherit_options = bdrv_backing_options,
20018e12
KW
989 .drained_begin = bdrv_child_cb_drained_begin,
990 .drained_end = bdrv_child_cb_drained_end,
38701b6a 991 .inactivate = bdrv_child_cb_inactivate,
f3930ed0
KW
992};
993
7b272452
KW
994static int bdrv_open_flags(BlockDriverState *bs, int flags)
995{
61de4c68 996 int open_flags = flags;
7b272452
KW
997
998 /*
999 * Clear flags that are internal to the block layer before opening the
1000 * image.
1001 */
20cca275 1002 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
1003
1004 /*
1005 * Snapshots should be writable.
1006 */
8bfea15d 1007 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
1008 open_flags |= BDRV_O_RDWR;
1009 }
1010
1011 return open_flags;
1012}
1013
91a097e7
KW
1014static void update_flags_from_options(int *flags, QemuOpts *opts)
1015{
1016 *flags &= ~BDRV_O_CACHE_MASK;
1017
91a097e7
KW
1018 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_NO_FLUSH));
1019 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_NO_FLUSH, false)) {
1020 *flags |= BDRV_O_NO_FLUSH;
1021 }
1022
1023 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_DIRECT));
1024 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_DIRECT, false)) {
1025 *flags |= BDRV_O_NOCACHE;
1026 }
f87a0e29
AG
1027
1028 *flags &= ~BDRV_O_RDWR;
1029
1030 assert(qemu_opt_find(opts, BDRV_OPT_READ_ONLY));
1031 if (!qemu_opt_get_bool(opts, BDRV_OPT_READ_ONLY, false)) {
1032 *flags |= BDRV_O_RDWR;
1033 }
1034
91a097e7
KW
1035}
1036
1037static void update_options_from_flags(QDict *options, int flags)
1038{
91a097e7 1039 if (!qdict_haskey(options, BDRV_OPT_CACHE_DIRECT)) {
46f5ac20 1040 qdict_put_bool(options, BDRV_OPT_CACHE_DIRECT, flags & BDRV_O_NOCACHE);
91a097e7
KW
1041 }
1042 if (!qdict_haskey(options, BDRV_OPT_CACHE_NO_FLUSH)) {
46f5ac20
EB
1043 qdict_put_bool(options, BDRV_OPT_CACHE_NO_FLUSH,
1044 flags & BDRV_O_NO_FLUSH);
91a097e7 1045 }
f87a0e29 1046 if (!qdict_haskey(options, BDRV_OPT_READ_ONLY)) {
46f5ac20 1047 qdict_put_bool(options, BDRV_OPT_READ_ONLY, !(flags & BDRV_O_RDWR));
f87a0e29 1048 }
91a097e7
KW
1049}
1050
636ea370
KW
1051static void bdrv_assign_node_name(BlockDriverState *bs,
1052 const char *node_name,
1053 Error **errp)
6913c0c2 1054{
15489c76 1055 char *gen_node_name = NULL;
6913c0c2 1056
15489c76
JC
1057 if (!node_name) {
1058 node_name = gen_node_name = id_generate(ID_BLOCK);
1059 } else if (!id_wellformed(node_name)) {
1060 /*
1061 * Check for empty string or invalid characters, but not if it is
1062 * generated (generated names use characters not available to the user)
1063 */
9aebf3b8 1064 error_setg(errp, "Invalid node name");
636ea370 1065 return;
6913c0c2
BC
1066 }
1067
0c5e94ee 1068 /* takes care of avoiding namespaces collisions */
7f06d47e 1069 if (blk_by_name(node_name)) {
0c5e94ee
BC
1070 error_setg(errp, "node-name=%s is conflicting with a device id",
1071 node_name);
15489c76 1072 goto out;
0c5e94ee
BC
1073 }
1074
6913c0c2
BC
1075 /* takes care of avoiding duplicates node names */
1076 if (bdrv_find_node(node_name)) {
1077 error_setg(errp, "Duplicate node name");
15489c76 1078 goto out;
6913c0c2
BC
1079 }
1080
1081 /* copy node name into the bs and insert it into the graph list */
1082 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
1083 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
15489c76
JC
1084out:
1085 g_free(gen_node_name);
6913c0c2
BC
1086}
1087
01a56501
KW
1088static int bdrv_open_driver(BlockDriverState *bs, BlockDriver *drv,
1089 const char *node_name, QDict *options,
1090 int open_flags, Error **errp)
1091{
1092 Error *local_err = NULL;
1093 int ret;
1094
1095 bdrv_assign_node_name(bs, node_name, &local_err);
1096 if (local_err) {
1097 error_propagate(errp, local_err);
1098 return -EINVAL;
1099 }
1100
1101 bs->drv = drv;
680c7f96 1102 bs->read_only = !(bs->open_flags & BDRV_O_RDWR);
01a56501
KW
1103 bs->opaque = g_malloc0(drv->instance_size);
1104
1105 if (drv->bdrv_file_open) {
1106 assert(!drv->bdrv_needs_filename || bs->filename[0]);
1107 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
680c7f96 1108 } else if (drv->bdrv_open) {
01a56501 1109 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
680c7f96
KW
1110 } else {
1111 ret = 0;
01a56501
KW
1112 }
1113
1114 if (ret < 0) {
1115 if (local_err) {
1116 error_propagate(errp, local_err);
1117 } else if (bs->filename[0]) {
1118 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
1119 } else {
1120 error_setg_errno(errp, -ret, "Could not open image");
1121 }
180ca19a 1122 goto open_failed;
01a56501
KW
1123 }
1124
1125 ret = refresh_total_sectors(bs, bs->total_sectors);
1126 if (ret < 0) {
1127 error_setg_errno(errp, -ret, "Could not refresh total sector count");
180ca19a 1128 return ret;
01a56501
KW
1129 }
1130
1131 bdrv_refresh_limits(bs, &local_err);
1132 if (local_err) {
1133 error_propagate(errp, local_err);
180ca19a 1134 return -EINVAL;
01a56501
KW
1135 }
1136
1137 assert(bdrv_opt_mem_align(bs) != 0);
1138 assert(bdrv_min_mem_align(bs) != 0);
1139 assert(is_power_of_2(bs->bl.request_alignment));
1140
1141 return 0;
180ca19a
MP
1142open_failed:
1143 bs->drv = NULL;
1144 if (bs->file != NULL) {
1145 bdrv_unref_child(bs, bs->file);
1146 bs->file = NULL;
1147 }
01a56501
KW
1148 g_free(bs->opaque);
1149 bs->opaque = NULL;
01a56501
KW
1150 return ret;
1151}
1152
680c7f96
KW
1153BlockDriverState *bdrv_new_open_driver(BlockDriver *drv, const char *node_name,
1154 int flags, Error **errp)
1155{
1156 BlockDriverState *bs;
1157 int ret;
1158
1159 bs = bdrv_new();
1160 bs->open_flags = flags;
1161 bs->explicit_options = qdict_new();
1162 bs->options = qdict_new();
1163 bs->opaque = NULL;
1164
1165 update_options_from_flags(bs->options, flags);
1166
1167 ret = bdrv_open_driver(bs, drv, node_name, bs->options, flags, errp);
1168 if (ret < 0) {
1169 QDECREF(bs->explicit_options);
180ca19a 1170 bs->explicit_options = NULL;
680c7f96 1171 QDECREF(bs->options);
180ca19a 1172 bs->options = NULL;
680c7f96
KW
1173 bdrv_unref(bs);
1174 return NULL;
1175 }
1176
1177 return bs;
1178}
1179
c5f3014b 1180QemuOptsList bdrv_runtime_opts = {
18edf289
KW
1181 .name = "bdrv_common",
1182 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
1183 .desc = {
1184 {
1185 .name = "node-name",
1186 .type = QEMU_OPT_STRING,
1187 .help = "Node name of the block device node",
1188 },
62392ebb
KW
1189 {
1190 .name = "driver",
1191 .type = QEMU_OPT_STRING,
1192 .help = "Block driver to use for the node",
1193 },
91a097e7
KW
1194 {
1195 .name = BDRV_OPT_CACHE_DIRECT,
1196 .type = QEMU_OPT_BOOL,
1197 .help = "Bypass software writeback cache on the host",
1198 },
1199 {
1200 .name = BDRV_OPT_CACHE_NO_FLUSH,
1201 .type = QEMU_OPT_BOOL,
1202 .help = "Ignore flush requests",
1203 },
f87a0e29
AG
1204 {
1205 .name = BDRV_OPT_READ_ONLY,
1206 .type = QEMU_OPT_BOOL,
1207 .help = "Node is opened in read-only mode",
1208 },
692e01a2
KW
1209 {
1210 .name = "detect-zeroes",
1211 .type = QEMU_OPT_STRING,
1212 .help = "try to optimize zero writes (off, on, unmap)",
1213 },
818584a4
KW
1214 {
1215 .name = "discard",
1216 .type = QEMU_OPT_STRING,
1217 .help = "discard operation (ignore/off, unmap/on)",
1218 },
5a9347c6
FZ
1219 {
1220 .name = BDRV_OPT_FORCE_SHARE,
1221 .type = QEMU_OPT_BOOL,
1222 .help = "always accept other writers (default: off)",
1223 },
18edf289
KW
1224 { /* end of list */ }
1225 },
1226};
1227
57915332
KW
1228/*
1229 * Common part for opening disk images and files
b6ad491a
KW
1230 *
1231 * Removes all processed options from *options.
57915332 1232 */
5696c6e3 1233static int bdrv_open_common(BlockDriverState *bs, BlockBackend *file,
82dc8b41 1234 QDict *options, Error **errp)
57915332
KW
1235{
1236 int ret, open_flags;
035fccdf 1237 const char *filename;
62392ebb 1238 const char *driver_name = NULL;
6913c0c2 1239 const char *node_name = NULL;
818584a4 1240 const char *discard;
692e01a2 1241 const char *detect_zeroes;
18edf289 1242 QemuOpts *opts;
62392ebb 1243 BlockDriver *drv;
34b5d2c6 1244 Error *local_err = NULL;
57915332 1245
6405875c 1246 assert(bs->file == NULL);
707ff828 1247 assert(options != NULL && bs->options != options);
57915332 1248
62392ebb
KW
1249 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
1250 qemu_opts_absorb_qdict(opts, options, &local_err);
1251 if (local_err) {
1252 error_propagate(errp, local_err);
1253 ret = -EINVAL;
1254 goto fail_opts;
1255 }
1256
9b7e8691
AG
1257 update_flags_from_options(&bs->open_flags, opts);
1258
62392ebb
KW
1259 driver_name = qemu_opt_get(opts, "driver");
1260 drv = bdrv_find_format(driver_name);
1261 assert(drv != NULL);
1262
5a9347c6
FZ
1263 bs->force_share = qemu_opt_get_bool(opts, BDRV_OPT_FORCE_SHARE, false);
1264
1265 if (bs->force_share && (bs->open_flags & BDRV_O_RDWR)) {
1266 error_setg(errp,
1267 BDRV_OPT_FORCE_SHARE
1268 "=on can only be used with read-only images");
1269 ret = -EINVAL;
1270 goto fail_opts;
1271 }
1272
45673671 1273 if (file != NULL) {
5696c6e3 1274 filename = blk_bs(file)->filename;
45673671 1275 } else {
129c7d1c
MA
1276 /*
1277 * Caution: while qdict_get_try_str() is fine, getting
1278 * non-string types would require more care. When @options
1279 * come from -blockdev or blockdev_add, its members are typed
1280 * according to the QAPI schema, but when they come from
1281 * -drive, they're all QString.
1282 */
45673671
KW
1283 filename = qdict_get_try_str(options, "filename");
1284 }
1285
4a008240 1286 if (drv->bdrv_needs_filename && (!filename || !filename[0])) {
765003db
KW
1287 error_setg(errp, "The '%s' block driver requires a file name",
1288 drv->format_name);
18edf289
KW
1289 ret = -EINVAL;
1290 goto fail_opts;
6913c0c2 1291 }
6913c0c2 1292
82dc8b41
KW
1293 trace_bdrv_open_common(bs, filename ?: "", bs->open_flags,
1294 drv->format_name);
62392ebb 1295
82dc8b41 1296 bs->read_only = !(bs->open_flags & BDRV_O_RDWR);
b64ec4e4
FZ
1297
1298 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
1299 error_setg(errp,
1300 !bs->read_only && bdrv_is_whitelisted(drv, true)
1301 ? "Driver '%s' can only be used for read-only devices"
1302 : "Driver '%s' is not whitelisted",
1303 drv->format_name);
18edf289
KW
1304 ret = -ENOTSUP;
1305 goto fail_opts;
b64ec4e4 1306 }
57915332 1307
d3faa13e
PB
1308 /* bdrv_new() and bdrv_close() make it so */
1309 assert(atomic_read(&bs->copy_on_read) == 0);
1310
82dc8b41 1311 if (bs->open_flags & BDRV_O_COPY_ON_READ) {
0ebd24e0
KW
1312 if (!bs->read_only) {
1313 bdrv_enable_copy_on_read(bs);
1314 } else {
1315 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
1316 ret = -EINVAL;
1317 goto fail_opts;
0ebd24e0 1318 }
53fec9d3
SH
1319 }
1320
818584a4
KW
1321 discard = qemu_opt_get(opts, "discard");
1322 if (discard != NULL) {
1323 if (bdrv_parse_discard_flags(discard, &bs->open_flags) != 0) {
1324 error_setg(errp, "Invalid discard option");
1325 ret = -EINVAL;
1326 goto fail_opts;
1327 }
1328 }
1329
692e01a2
KW
1330 detect_zeroes = qemu_opt_get(opts, "detect-zeroes");
1331 if (detect_zeroes) {
1332 BlockdevDetectZeroesOptions value =
f7abe0ec 1333 qapi_enum_parse(&BlockdevDetectZeroesOptions_lookup,
692e01a2 1334 detect_zeroes,
692e01a2
KW
1335 BLOCKDEV_DETECT_ZEROES_OPTIONS_OFF,
1336 &local_err);
1337 if (local_err) {
1338 error_propagate(errp, local_err);
1339 ret = -EINVAL;
1340 goto fail_opts;
1341 }
1342
1343 if (value == BLOCKDEV_DETECT_ZEROES_OPTIONS_UNMAP &&
1344 !(bs->open_flags & BDRV_O_UNMAP))
1345 {
1346 error_setg(errp, "setting detect-zeroes to unmap is not allowed "
1347 "without setting discard operation to unmap");
1348 ret = -EINVAL;
1349 goto fail_opts;
1350 }
1351
1352 bs->detect_zeroes = value;
1353 }
1354
c2ad1b0c
KW
1355 if (filename != NULL) {
1356 pstrcpy(bs->filename, sizeof(bs->filename), filename);
1357 } else {
1358 bs->filename[0] = '\0';
1359 }
91af7014 1360 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 1361
66f82cee 1362 /* Open the image, either directly or using a protocol */
82dc8b41 1363 open_flags = bdrv_open_flags(bs, bs->open_flags);
01a56501 1364 node_name = qemu_opt_get(opts, "node-name");
57915332 1365
01a56501
KW
1366 assert(!drv->bdrv_file_open || file == NULL);
1367 ret = bdrv_open_driver(bs, drv, node_name, options, open_flags, errp);
51762288 1368 if (ret < 0) {
01a56501 1369 goto fail_opts;
3baca891
KW
1370 }
1371
18edf289 1372 qemu_opts_del(opts);
57915332
KW
1373 return 0;
1374
18edf289
KW
1375fail_opts:
1376 qemu_opts_del(opts);
57915332
KW
1377 return ret;
1378}
1379
5e5c4f63
KW
1380static QDict *parse_json_filename(const char *filename, Error **errp)
1381{
1382 QObject *options_obj;
1383 QDict *options;
1384 int ret;
1385
1386 ret = strstart(filename, "json:", &filename);
1387 assert(ret);
1388
5577fff7 1389 options_obj = qobject_from_json(filename, errp);
5e5c4f63 1390 if (!options_obj) {
5577fff7
MA
1391 /* Work around qobject_from_json() lossage TODO fix that */
1392 if (errp && !*errp) {
1393 error_setg(errp, "Could not parse the JSON options");
1394 return NULL;
1395 }
1396 error_prepend(errp, "Could not parse the JSON options: ");
5e5c4f63
KW
1397 return NULL;
1398 }
1399
ca6b6e1e
MA
1400 options = qobject_to_qdict(options_obj);
1401 if (!options) {
5e5c4f63
KW
1402 qobject_decref(options_obj);
1403 error_setg(errp, "Invalid JSON object given");
1404 return NULL;
1405 }
1406
5e5c4f63
KW
1407 qdict_flatten(options);
1408
1409 return options;
1410}
1411
de3b53f0
KW
1412static void parse_json_protocol(QDict *options, const char **pfilename,
1413 Error **errp)
1414{
1415 QDict *json_options;
1416 Error *local_err = NULL;
1417
1418 /* Parse json: pseudo-protocol */
1419 if (!*pfilename || !g_str_has_prefix(*pfilename, "json:")) {
1420 return;
1421 }
1422
1423 json_options = parse_json_filename(*pfilename, &local_err);
1424 if (local_err) {
1425 error_propagate(errp, local_err);
1426 return;
1427 }
1428
1429 /* Options given in the filename have lower priority than options
1430 * specified directly */
1431 qdict_join(options, json_options, false);
1432 QDECREF(json_options);
1433 *pfilename = NULL;
1434}
1435
b6ce07aa 1436/*
f54120ff
KW
1437 * Fills in default options for opening images and converts the legacy
1438 * filename/flags pair to option QDict entries.
53a29513
HR
1439 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
1440 * block driver has been specified explicitly.
b6ce07aa 1441 */
de3b53f0 1442static int bdrv_fill_options(QDict **options, const char *filename,
053e1578 1443 int *flags, Error **errp)
ea2384d3 1444{
c2ad1b0c 1445 const char *drvname;
53a29513 1446 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 1447 bool parse_filename = false;
053e1578 1448 BlockDriver *drv = NULL;
34b5d2c6 1449 Error *local_err = NULL;
83f64091 1450
129c7d1c
MA
1451 /*
1452 * Caution: while qdict_get_try_str() is fine, getting non-string
1453 * types would require more care. When @options come from
1454 * -blockdev or blockdev_add, its members are typed according to
1455 * the QAPI schema, but when they come from -drive, they're all
1456 * QString.
1457 */
53a29513 1458 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1459 if (drvname) {
1460 drv = bdrv_find_format(drvname);
1461 if (!drv) {
1462 error_setg(errp, "Unknown driver '%s'", drvname);
1463 return -ENOENT;
1464 }
1465 /* If the user has explicitly specified the driver, this choice should
1466 * override the BDRV_O_PROTOCOL flag */
1467 protocol = drv->bdrv_file_open;
53a29513
HR
1468 }
1469
1470 if (protocol) {
1471 *flags |= BDRV_O_PROTOCOL;
1472 } else {
1473 *flags &= ~BDRV_O_PROTOCOL;
1474 }
1475
91a097e7
KW
1476 /* Translate cache options from flags into options */
1477 update_options_from_flags(*options, *flags);
1478
035fccdf 1479 /* Fetch the file name from the options QDict if necessary */
17b005f1 1480 if (protocol && filename) {
f54120ff 1481 if (!qdict_haskey(*options, "filename")) {
46f5ac20 1482 qdict_put_str(*options, "filename", filename);
f54120ff
KW
1483 parse_filename = true;
1484 } else {
1485 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1486 "the same time");
1487 return -EINVAL;
1488 }
035fccdf
KW
1489 }
1490
c2ad1b0c 1491 /* Find the right block driver */
129c7d1c 1492 /* See cautionary note on accessing @options above */
f54120ff 1493 filename = qdict_get_try_str(*options, "filename");
f54120ff 1494
053e1578
HR
1495 if (!drvname && protocol) {
1496 if (filename) {
1497 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1498 if (!drv) {
053e1578 1499 return -EINVAL;
17b005f1 1500 }
053e1578
HR
1501
1502 drvname = drv->format_name;
46f5ac20 1503 qdict_put_str(*options, "driver", drvname);
053e1578
HR
1504 } else {
1505 error_setg(errp, "Must specify either driver or file");
1506 return -EINVAL;
98289620 1507 }
c2ad1b0c
KW
1508 }
1509
17b005f1 1510 assert(drv || !protocol);
c2ad1b0c 1511
f54120ff 1512 /* Driver-specific filename parsing */
17b005f1 1513 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1514 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1515 if (local_err) {
34b5d2c6 1516 error_propagate(errp, local_err);
f54120ff 1517 return -EINVAL;
6963a30d 1518 }
cd5d031e
HR
1519
1520 if (!drv->bdrv_needs_filename) {
1521 qdict_del(*options, "filename");
cd5d031e 1522 }
6963a30d
KW
1523 }
1524
f54120ff
KW
1525 return 0;
1526}
1527
3121fb45
KW
1528static int bdrv_child_check_perm(BdrvChild *c, BlockReopenQueue *q,
1529 uint64_t perm, uint64_t shared,
c1cef672
FZ
1530 GSList *ignore_children, Error **errp);
1531static void bdrv_child_abort_perm_update(BdrvChild *c);
1532static void bdrv_child_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared);
1533
148eb13c
KW
1534typedef struct BlockReopenQueueEntry {
1535 bool prepared;
1536 BDRVReopenState state;
1537 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
1538} BlockReopenQueueEntry;
1539
1540/*
1541 * Return the flags that @bs will have after the reopens in @q have
1542 * successfully completed. If @q is NULL (or @bs is not contained in @q),
1543 * return the current flags.
1544 */
1545static int bdrv_reopen_get_flags(BlockReopenQueue *q, BlockDriverState *bs)
1546{
1547 BlockReopenQueueEntry *entry;
1548
1549 if (q != NULL) {
1550 QSIMPLEQ_FOREACH(entry, q, entry) {
1551 if (entry->state.bs == bs) {
1552 return entry->state.flags;
1553 }
1554 }
1555 }
1556
1557 return bs->open_flags;
1558}
1559
1560/* Returns whether the image file can be written to after the reopen queue @q
1561 * has been successfully applied, or right now if @q is NULL. */
1562static bool bdrv_is_writable(BlockDriverState *bs, BlockReopenQueue *q)
1563{
1564 int flags = bdrv_reopen_get_flags(q, bs);
1565
1566 return (flags & (BDRV_O_RDWR | BDRV_O_INACTIVE)) == BDRV_O_RDWR;
1567}
1568
ffd1a5a2 1569static void bdrv_child_perm(BlockDriverState *bs, BlockDriverState *child_bs,
e0995dc3
KW
1570 BdrvChild *c, const BdrvChildRole *role,
1571 BlockReopenQueue *reopen_queue,
ffd1a5a2
FZ
1572 uint64_t parent_perm, uint64_t parent_shared,
1573 uint64_t *nperm, uint64_t *nshared)
1574{
1575 if (bs->drv && bs->drv->bdrv_child_perm) {
e0995dc3 1576 bs->drv->bdrv_child_perm(bs, c, role, reopen_queue,
ffd1a5a2
FZ
1577 parent_perm, parent_shared,
1578 nperm, nshared);
1579 }
e0995dc3 1580 /* TODO Take force_share from reopen_queue */
ffd1a5a2
FZ
1581 if (child_bs && child_bs->force_share) {
1582 *nshared = BLK_PERM_ALL;
1583 }
1584}
1585
33a610c3
KW
1586/*
1587 * Check whether permissions on this node can be changed in a way that
1588 * @cumulative_perms and @cumulative_shared_perms are the new cumulative
1589 * permissions of all its parents. This involves checking whether all necessary
1590 * permission changes to child nodes can be performed.
1591 *
1592 * A call to this function must always be followed by a call to bdrv_set_perm()
1593 * or bdrv_abort_perm_update().
1594 */
3121fb45
KW
1595static int bdrv_check_perm(BlockDriverState *bs, BlockReopenQueue *q,
1596 uint64_t cumulative_perms,
46181129
KW
1597 uint64_t cumulative_shared_perms,
1598 GSList *ignore_children, Error **errp)
33a610c3
KW
1599{
1600 BlockDriver *drv = bs->drv;
1601 BdrvChild *c;
1602 int ret;
1603
1604 /* Write permissions never work with read-only images */
1605 if ((cumulative_perms & (BLK_PERM_WRITE | BLK_PERM_WRITE_UNCHANGED)) &&
148eb13c 1606 !bdrv_is_writable(bs, q))
33a610c3
KW
1607 {
1608 error_setg(errp, "Block node is read-only");
1609 return -EPERM;
1610 }
1611
1612 /* Check this node */
1613 if (!drv) {
1614 return 0;
1615 }
1616
1617 if (drv->bdrv_check_perm) {
1618 return drv->bdrv_check_perm(bs, cumulative_perms,
1619 cumulative_shared_perms, errp);
1620 }
1621
78e421c9 1622 /* Drivers that never have children can omit .bdrv_child_perm() */
33a610c3 1623 if (!drv->bdrv_child_perm) {
78e421c9 1624 assert(QLIST_EMPTY(&bs->children));
33a610c3
KW
1625 return 0;
1626 }
1627
1628 /* Check all children */
1629 QLIST_FOREACH(c, &bs->children, next) {
1630 uint64_t cur_perm, cur_shared;
3121fb45 1631 bdrv_child_perm(bs, c->bs, c, c->role, q,
ffd1a5a2
FZ
1632 cumulative_perms, cumulative_shared_perms,
1633 &cur_perm, &cur_shared);
3121fb45
KW
1634 ret = bdrv_child_check_perm(c, q, cur_perm, cur_shared,
1635 ignore_children, errp);
33a610c3
KW
1636 if (ret < 0) {
1637 return ret;
1638 }
1639 }
1640
1641 return 0;
1642}
1643
1644/*
1645 * Notifies drivers that after a previous bdrv_check_perm() call, the
1646 * permission update is not performed and any preparations made for it (e.g.
1647 * taken file locks) need to be undone.
1648 *
1649 * This function recursively notifies all child nodes.
1650 */
1651static void bdrv_abort_perm_update(BlockDriverState *bs)
1652{
1653 BlockDriver *drv = bs->drv;
1654 BdrvChild *c;
1655
1656 if (!drv) {
1657 return;
1658 }
1659
1660 if (drv->bdrv_abort_perm_update) {
1661 drv->bdrv_abort_perm_update(bs);
1662 }
1663
1664 QLIST_FOREACH(c, &bs->children, next) {
1665 bdrv_child_abort_perm_update(c);
1666 }
1667}
1668
1669static void bdrv_set_perm(BlockDriverState *bs, uint64_t cumulative_perms,
1670 uint64_t cumulative_shared_perms)
1671{
1672 BlockDriver *drv = bs->drv;
1673 BdrvChild *c;
1674
1675 if (!drv) {
1676 return;
1677 }
1678
1679 /* Update this node */
1680 if (drv->bdrv_set_perm) {
1681 drv->bdrv_set_perm(bs, cumulative_perms, cumulative_shared_perms);
1682 }
1683
78e421c9 1684 /* Drivers that never have children can omit .bdrv_child_perm() */
33a610c3 1685 if (!drv->bdrv_child_perm) {
78e421c9 1686 assert(QLIST_EMPTY(&bs->children));
33a610c3
KW
1687 return;
1688 }
1689
1690 /* Update all children */
1691 QLIST_FOREACH(c, &bs->children, next) {
1692 uint64_t cur_perm, cur_shared;
e0995dc3 1693 bdrv_child_perm(bs, c->bs, c, c->role, NULL,
ffd1a5a2
FZ
1694 cumulative_perms, cumulative_shared_perms,
1695 &cur_perm, &cur_shared);
33a610c3
KW
1696 bdrv_child_set_perm(c, cur_perm, cur_shared);
1697 }
1698}
1699
1700static void bdrv_get_cumulative_perm(BlockDriverState *bs, uint64_t *perm,
1701 uint64_t *shared_perm)
1702{
1703 BdrvChild *c;
1704 uint64_t cumulative_perms = 0;
1705 uint64_t cumulative_shared_perms = BLK_PERM_ALL;
1706
1707 QLIST_FOREACH(c, &bs->parents, next_parent) {
1708 cumulative_perms |= c->perm;
1709 cumulative_shared_perms &= c->shared_perm;
1710 }
1711
1712 *perm = cumulative_perms;
1713 *shared_perm = cumulative_shared_perms;
1714}
1715
d083319f
KW
1716static char *bdrv_child_user_desc(BdrvChild *c)
1717{
1718 if (c->role->get_parent_desc) {
1719 return c->role->get_parent_desc(c);
1720 }
1721
1722 return g_strdup("another user");
1723}
1724
5176196c 1725char *bdrv_perm_names(uint64_t perm)
d083319f
KW
1726{
1727 struct perm_name {
1728 uint64_t perm;
1729 const char *name;
1730 } permissions[] = {
1731 { BLK_PERM_CONSISTENT_READ, "consistent read" },
1732 { BLK_PERM_WRITE, "write" },
1733 { BLK_PERM_WRITE_UNCHANGED, "write unchanged" },
1734 { BLK_PERM_RESIZE, "resize" },
1735 { BLK_PERM_GRAPH_MOD, "change children" },
1736 { 0, NULL }
1737 };
1738
1739 char *result = g_strdup("");
1740 struct perm_name *p;
1741
1742 for (p = permissions; p->name; p++) {
1743 if (perm & p->perm) {
1744 char *old = result;
1745 result = g_strdup_printf("%s%s%s", old, *old ? ", " : "", p->name);
1746 g_free(old);
1747 }
1748 }
1749
1750 return result;
1751}
1752
33a610c3
KW
1753/*
1754 * Checks whether a new reference to @bs can be added if the new user requires
46181129
KW
1755 * @new_used_perm/@new_shared_perm as its permissions. If @ignore_children is
1756 * set, the BdrvChild objects in this list are ignored in the calculations;
1757 * this allows checking permission updates for an existing reference.
33a610c3
KW
1758 *
1759 * Needs to be followed by a call to either bdrv_set_perm() or
1760 * bdrv_abort_perm_update(). */
3121fb45
KW
1761static int bdrv_check_update_perm(BlockDriverState *bs, BlockReopenQueue *q,
1762 uint64_t new_used_perm,
d5e6f437 1763 uint64_t new_shared_perm,
46181129 1764 GSList *ignore_children, Error **errp)
d5e6f437
KW
1765{
1766 BdrvChild *c;
33a610c3
KW
1767 uint64_t cumulative_perms = new_used_perm;
1768 uint64_t cumulative_shared_perms = new_shared_perm;
d5e6f437
KW
1769
1770 /* There is no reason why anyone couldn't tolerate write_unchanged */
1771 assert(new_shared_perm & BLK_PERM_WRITE_UNCHANGED);
1772
1773 QLIST_FOREACH(c, &bs->parents, next_parent) {
46181129 1774 if (g_slist_find(ignore_children, c)) {
d5e6f437
KW
1775 continue;
1776 }
1777
d083319f
KW
1778 if ((new_used_perm & c->shared_perm) != new_used_perm) {
1779 char *user = bdrv_child_user_desc(c);
1780 char *perm_names = bdrv_perm_names(new_used_perm & ~c->shared_perm);
1781 error_setg(errp, "Conflicts with use by %s as '%s', which does not "
1782 "allow '%s' on %s",
1783 user, c->name, perm_names, bdrv_get_node_name(c->bs));
1784 g_free(user);
1785 g_free(perm_names);
1786 return -EPERM;
1787 }
1788
1789 if ((c->perm & new_shared_perm) != c->perm) {
1790 char *user = bdrv_child_user_desc(c);
1791 char *perm_names = bdrv_perm_names(c->perm & ~new_shared_perm);
1792 error_setg(errp, "Conflicts with use by %s as '%s', which uses "
1793 "'%s' on %s",
1794 user, c->name, perm_names, bdrv_get_node_name(c->bs));
1795 g_free(user);
1796 g_free(perm_names);
d5e6f437
KW
1797 return -EPERM;
1798 }
33a610c3
KW
1799
1800 cumulative_perms |= c->perm;
1801 cumulative_shared_perms &= c->shared_perm;
d5e6f437
KW
1802 }
1803
3121fb45 1804 return bdrv_check_perm(bs, q, cumulative_perms, cumulative_shared_perms,
46181129 1805 ignore_children, errp);
33a610c3
KW
1806}
1807
1808/* Needs to be followed by a call to either bdrv_child_set_perm() or
1809 * bdrv_child_abort_perm_update(). */
3121fb45
KW
1810static int bdrv_child_check_perm(BdrvChild *c, BlockReopenQueue *q,
1811 uint64_t perm, uint64_t shared,
c1cef672 1812 GSList *ignore_children, Error **errp)
33a610c3 1813{
46181129
KW
1814 int ret;
1815
1816 ignore_children = g_slist_prepend(g_slist_copy(ignore_children), c);
3121fb45 1817 ret = bdrv_check_update_perm(c->bs, q, perm, shared, ignore_children, errp);
46181129
KW
1818 g_slist_free(ignore_children);
1819
1820 return ret;
33a610c3
KW
1821}
1822
c1cef672 1823static void bdrv_child_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared)
33a610c3
KW
1824{
1825 uint64_t cumulative_perms, cumulative_shared_perms;
1826
1827 c->perm = perm;
1828 c->shared_perm = shared;
1829
1830 bdrv_get_cumulative_perm(c->bs, &cumulative_perms,
1831 &cumulative_shared_perms);
1832 bdrv_set_perm(c->bs, cumulative_perms, cumulative_shared_perms);
1833}
1834
c1cef672 1835static void bdrv_child_abort_perm_update(BdrvChild *c)
33a610c3
KW
1836{
1837 bdrv_abort_perm_update(c->bs);
1838}
1839
1840int bdrv_child_try_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared,
1841 Error **errp)
1842{
1843 int ret;
1844
3121fb45 1845 ret = bdrv_child_check_perm(c, NULL, perm, shared, NULL, errp);
33a610c3
KW
1846 if (ret < 0) {
1847 bdrv_child_abort_perm_update(c);
1848 return ret;
1849 }
1850
1851 bdrv_child_set_perm(c, perm, shared);
1852
d5e6f437
KW
1853 return 0;
1854}
1855
6a1b9ee1
KW
1856#define DEFAULT_PERM_PASSTHROUGH (BLK_PERM_CONSISTENT_READ \
1857 | BLK_PERM_WRITE \
1858 | BLK_PERM_WRITE_UNCHANGED \
1859 | BLK_PERM_RESIZE)
1860#define DEFAULT_PERM_UNCHANGED (BLK_PERM_ALL & ~DEFAULT_PERM_PASSTHROUGH)
1861
1862void bdrv_filter_default_perms(BlockDriverState *bs, BdrvChild *c,
1863 const BdrvChildRole *role,
e0995dc3 1864 BlockReopenQueue *reopen_queue,
6a1b9ee1
KW
1865 uint64_t perm, uint64_t shared,
1866 uint64_t *nperm, uint64_t *nshared)
1867{
1868 if (c == NULL) {
1869 *nperm = perm & DEFAULT_PERM_PASSTHROUGH;
1870 *nshared = (shared & DEFAULT_PERM_PASSTHROUGH) | DEFAULT_PERM_UNCHANGED;
1871 return;
1872 }
1873
1874 *nperm = (perm & DEFAULT_PERM_PASSTHROUGH) |
1875 (c->perm & DEFAULT_PERM_UNCHANGED);
1876 *nshared = (shared & DEFAULT_PERM_PASSTHROUGH) |
1877 (c->shared_perm & DEFAULT_PERM_UNCHANGED);
1878}
1879
6b1a044a
KW
1880void bdrv_format_default_perms(BlockDriverState *bs, BdrvChild *c,
1881 const BdrvChildRole *role,
e0995dc3 1882 BlockReopenQueue *reopen_queue,
6b1a044a
KW
1883 uint64_t perm, uint64_t shared,
1884 uint64_t *nperm, uint64_t *nshared)
1885{
1886 bool backing = (role == &child_backing);
1887 assert(role == &child_backing || role == &child_file);
1888
1889 if (!backing) {
1890 /* Apart from the modifications below, the same permissions are
1891 * forwarded and left alone as for filters */
e0995dc3
KW
1892 bdrv_filter_default_perms(bs, c, role, reopen_queue, perm, shared,
1893 &perm, &shared);
6b1a044a
KW
1894
1895 /* Format drivers may touch metadata even if the guest doesn't write */
148eb13c 1896 if (bdrv_is_writable(bs, reopen_queue)) {
6b1a044a
KW
1897 perm |= BLK_PERM_WRITE | BLK_PERM_RESIZE;
1898 }
1899
1900 /* bs->file always needs to be consistent because of the metadata. We
1901 * can never allow other users to resize or write to it. */
1902 perm |= BLK_PERM_CONSISTENT_READ;
1903 shared &= ~(BLK_PERM_WRITE | BLK_PERM_RESIZE);
1904 } else {
1905 /* We want consistent read from backing files if the parent needs it.
1906 * No other operations are performed on backing files. */
1907 perm &= BLK_PERM_CONSISTENT_READ;
1908
1909 /* If the parent can deal with changing data, we're okay with a
1910 * writable and resizable backing file. */
1911 /* TODO Require !(perm & BLK_PERM_CONSISTENT_READ), too? */
1912 if (shared & BLK_PERM_WRITE) {
1913 shared = BLK_PERM_WRITE | BLK_PERM_RESIZE;
1914 } else {
1915 shared = 0;
1916 }
1917
1918 shared |= BLK_PERM_CONSISTENT_READ | BLK_PERM_GRAPH_MOD |
1919 BLK_PERM_WRITE_UNCHANGED;
1920 }
1921
9c5e6594
KW
1922 if (bs->open_flags & BDRV_O_INACTIVE) {
1923 shared |= BLK_PERM_WRITE | BLK_PERM_RESIZE;
1924 }
1925
6b1a044a
KW
1926 *nperm = perm;
1927 *nshared = shared;
1928}
1929
8ee03995
KW
1930static void bdrv_replace_child_noperm(BdrvChild *child,
1931 BlockDriverState *new_bs)
e9740bc6
KW
1932{
1933 BlockDriverState *old_bs = child->bs;
1934
bb2614e9
FZ
1935 if (old_bs && new_bs) {
1936 assert(bdrv_get_aio_context(old_bs) == bdrv_get_aio_context(new_bs));
1937 }
e9740bc6 1938 if (old_bs) {
36fe1331
KW
1939 if (old_bs->quiesce_counter && child->role->drained_end) {
1940 child->role->drained_end(child);
1941 }
db95dbba
KW
1942 if (child->role->detach) {
1943 child->role->detach(child);
1944 }
e9740bc6
KW
1945 QLIST_REMOVE(child, next_parent);
1946 }
36fe1331
KW
1947
1948 child->bs = new_bs;
1949
e9740bc6
KW
1950 if (new_bs) {
1951 QLIST_INSERT_HEAD(&new_bs->parents, child, next_parent);
36fe1331
KW
1952 if (new_bs->quiesce_counter && child->role->drained_begin) {
1953 child->role->drained_begin(child);
1954 }
33a610c3 1955
8ee03995
KW
1956 if (child->role->attach) {
1957 child->role->attach(child);
1958 }
1959 }
1960}
33a610c3 1961
466787fb
KW
1962/*
1963 * Updates @child to change its reference to point to @new_bs, including
1964 * checking and applying the necessary permisson updates both to the old node
1965 * and to @new_bs.
1966 *
1967 * NULL is passed as @new_bs for removing the reference before freeing @child.
1968 *
1969 * If @new_bs is not NULL, bdrv_check_perm() must be called beforehand, as this
1970 * function uses bdrv_set_perm() to update the permissions according to the new
1971 * reference that @new_bs gets.
1972 */
1973static void bdrv_replace_child(BdrvChild *child, BlockDriverState *new_bs)
8ee03995
KW
1974{
1975 BlockDriverState *old_bs = child->bs;
1976 uint64_t perm, shared_perm;
1977
8aecf1d1
KW
1978 bdrv_replace_child_noperm(child, new_bs);
1979
8ee03995 1980 if (old_bs) {
33a610c3
KW
1981 /* Update permissions for old node. This is guaranteed to succeed
1982 * because we're just taking a parent away, so we're loosening
1983 * restrictions. */
1984 bdrv_get_cumulative_perm(old_bs, &perm, &shared_perm);
3121fb45 1985 bdrv_check_perm(old_bs, NULL, perm, shared_perm, NULL, &error_abort);
33a610c3 1986 bdrv_set_perm(old_bs, perm, shared_perm);
e9740bc6 1987 }
36fe1331 1988
e9740bc6 1989 if (new_bs) {
33a610c3 1990 bdrv_get_cumulative_perm(new_bs, &perm, &shared_perm);
33a610c3 1991 bdrv_set_perm(new_bs, perm, shared_perm);
e9740bc6 1992 }
e9740bc6
KW
1993}
1994
f21d96d0
KW
1995BdrvChild *bdrv_root_attach_child(BlockDriverState *child_bs,
1996 const char *child_name,
36fe1331 1997 const BdrvChildRole *child_role,
d5e6f437
KW
1998 uint64_t perm, uint64_t shared_perm,
1999 void *opaque, Error **errp)
df581792 2000{
d5e6f437
KW
2001 BdrvChild *child;
2002 int ret;
2003
3121fb45 2004 ret = bdrv_check_update_perm(child_bs, NULL, perm, shared_perm, NULL, errp);
d5e6f437 2005 if (ret < 0) {
33a610c3 2006 bdrv_abort_perm_update(child_bs);
d5e6f437
KW
2007 return NULL;
2008 }
2009
2010 child = g_new(BdrvChild, 1);
df581792 2011 *child = (BdrvChild) {
d5e6f437
KW
2012 .bs = NULL,
2013 .name = g_strdup(child_name),
2014 .role = child_role,
2015 .perm = perm,
2016 .shared_perm = shared_perm,
2017 .opaque = opaque,
df581792
KW
2018 };
2019
33a610c3 2020 /* This performs the matching bdrv_set_perm() for the above check. */
466787fb 2021 bdrv_replace_child(child, child_bs);
b4b059f6
KW
2022
2023 return child;
df581792
KW
2024}
2025
98292c61
WC
2026BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
2027 BlockDriverState *child_bs,
2028 const char *child_name,
8b2ff529
KW
2029 const BdrvChildRole *child_role,
2030 Error **errp)
f21d96d0 2031{
d5e6f437 2032 BdrvChild *child;
f68c598b
KW
2033 uint64_t perm, shared_perm;
2034
2035 bdrv_get_cumulative_perm(parent_bs, &perm, &shared_perm);
2036
2037 assert(parent_bs->drv);
bb2614e9 2038 assert(bdrv_get_aio_context(parent_bs) == bdrv_get_aio_context(child_bs));
e0995dc3 2039 bdrv_child_perm(parent_bs, child_bs, NULL, child_role, NULL,
ffd1a5a2 2040 perm, shared_perm, &perm, &shared_perm);
d5e6f437 2041
d5e6f437 2042 child = bdrv_root_attach_child(child_bs, child_name, child_role,
f68c598b 2043 perm, shared_perm, parent_bs, errp);
d5e6f437
KW
2044 if (child == NULL) {
2045 return NULL;
2046 }
2047
f21d96d0
KW
2048 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
2049 return child;
2050}
2051
3f09bfbc 2052static void bdrv_detach_child(BdrvChild *child)
33a60407 2053{
f21d96d0
KW
2054 if (child->next.le_prev) {
2055 QLIST_REMOVE(child, next);
2056 child->next.le_prev = NULL;
2057 }
e9740bc6 2058
466787fb 2059 bdrv_replace_child(child, NULL);
e9740bc6 2060
260fecf1 2061 g_free(child->name);
33a60407
KW
2062 g_free(child);
2063}
2064
f21d96d0 2065void bdrv_root_unref_child(BdrvChild *child)
33a60407 2066{
779020cb
KW
2067 BlockDriverState *child_bs;
2068
f21d96d0
KW
2069 child_bs = child->bs;
2070 bdrv_detach_child(child);
2071 bdrv_unref(child_bs);
2072}
2073
2074void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
2075{
779020cb
KW
2076 if (child == NULL) {
2077 return;
2078 }
33a60407
KW
2079
2080 if (child->bs->inherits_from == parent) {
4e4bf5c4
KW
2081 BdrvChild *c;
2082
2083 /* Remove inherits_from only when the last reference between parent and
2084 * child->bs goes away. */
2085 QLIST_FOREACH(c, &parent->children, next) {
2086 if (c != child && c->bs == child->bs) {
2087 break;
2088 }
2089 }
2090 if (c == NULL) {
2091 child->bs->inherits_from = NULL;
2092 }
33a60407
KW
2093 }
2094
f21d96d0 2095 bdrv_root_unref_child(child);
33a60407
KW
2096}
2097
5c8cab48
KW
2098
2099static void bdrv_parent_cb_change_media(BlockDriverState *bs, bool load)
2100{
2101 BdrvChild *c;
2102 QLIST_FOREACH(c, &bs->parents, next_parent) {
2103 if (c->role->change_media) {
2104 c->role->change_media(c, load);
2105 }
2106 }
2107}
2108
2109static void bdrv_parent_cb_resize(BlockDriverState *bs)
2110{
2111 BdrvChild *c;
2112 QLIST_FOREACH(c, &bs->parents, next_parent) {
2113 if (c->role->resize) {
2114 c->role->resize(c);
2115 }
2116 }
2117}
2118
5db15a57
KW
2119/*
2120 * Sets the backing file link of a BDS. A new reference is created; callers
2121 * which don't need their own reference any more must call bdrv_unref().
2122 */
12fa4af6
KW
2123void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd,
2124 Error **errp)
8d24cce1 2125{
5db15a57
KW
2126 if (backing_hd) {
2127 bdrv_ref(backing_hd);
2128 }
8d24cce1 2129
760e0063 2130 if (bs->backing) {
5db15a57 2131 bdrv_unref_child(bs, bs->backing);
826b6ca0
FZ
2132 }
2133
8d24cce1 2134 if (!backing_hd) {
760e0063 2135 bs->backing = NULL;
8d24cce1
FZ
2136 goto out;
2137 }
12fa4af6 2138
8b2ff529 2139 bs->backing = bdrv_attach_child(bs, backing_hd, "backing", &child_backing,
12fa4af6
KW
2140 errp);
2141 if (!bs->backing) {
2142 bdrv_unref(backing_hd);
2143 }
826b6ca0 2144
9e7e940c
KW
2145 bdrv_refresh_filename(bs);
2146
8d24cce1 2147out:
3baca891 2148 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
2149}
2150
31ca6d07
KW
2151/*
2152 * Opens the backing file for a BlockDriverState if not yet open
2153 *
d9b7b057
KW
2154 * bdref_key specifies the key for the image's BlockdevRef in the options QDict.
2155 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
2156 * itself, all options starting with "${bdref_key}." are considered part of the
2157 * BlockdevRef.
2158 *
2159 * TODO Can this be unified with bdrv_open_image()?
31ca6d07 2160 */
d9b7b057
KW
2161int bdrv_open_backing_file(BlockDriverState *bs, QDict *parent_options,
2162 const char *bdref_key, Error **errp)
9156df12 2163{
1ba4b6a5 2164 char *backing_filename = g_malloc0(PATH_MAX);
d9b7b057
KW
2165 char *bdref_key_dot;
2166 const char *reference = NULL;
317fc44e 2167 int ret = 0;
8d24cce1 2168 BlockDriverState *backing_hd;
d9b7b057
KW
2169 QDict *options;
2170 QDict *tmp_parent_options = NULL;
34b5d2c6 2171 Error *local_err = NULL;
9156df12 2172
760e0063 2173 if (bs->backing != NULL) {
1ba4b6a5 2174 goto free_exit;
9156df12
PB
2175 }
2176
31ca6d07 2177 /* NULL means an empty set of options */
d9b7b057
KW
2178 if (parent_options == NULL) {
2179 tmp_parent_options = qdict_new();
2180 parent_options = tmp_parent_options;
31ca6d07
KW
2181 }
2182
9156df12 2183 bs->open_flags &= ~BDRV_O_NO_BACKING;
d9b7b057
KW
2184
2185 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
2186 qdict_extract_subqdict(parent_options, &options, bdref_key_dot);
2187 g_free(bdref_key_dot);
2188
129c7d1c
MA
2189 /*
2190 * Caution: while qdict_get_try_str() is fine, getting non-string
2191 * types would require more care. When @parent_options come from
2192 * -blockdev or blockdev_add, its members are typed according to
2193 * the QAPI schema, but when they come from -drive, they're all
2194 * QString.
2195 */
d9b7b057
KW
2196 reference = qdict_get_try_str(parent_options, bdref_key);
2197 if (reference || qdict_haskey(options, "file.filename")) {
1cb6f506
KW
2198 backing_filename[0] = '\0';
2199 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 2200 QDECREF(options);
1ba4b6a5 2201 goto free_exit;
dbecebdd 2202 } else {
9f07429e
HR
2203 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
2204 &local_err);
2205 if (local_err) {
2206 ret = -EINVAL;
2207 error_propagate(errp, local_err);
2208 QDECREF(options);
2209 goto free_exit;
2210 }
9156df12
PB
2211 }
2212
8ee79e70
KW
2213 if (!bs->drv || !bs->drv->supports_backing) {
2214 ret = -EINVAL;
2215 error_setg(errp, "Driver doesn't support backing files");
2216 QDECREF(options);
2217 goto free_exit;
2218 }
2219
c5f6e493 2220 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
46f5ac20 2221 qdict_put_str(options, "driver", bs->backing_format);
9156df12
PB
2222 }
2223
5b363937
HR
2224 backing_hd = bdrv_open_inherit(*backing_filename ? backing_filename : NULL,
2225 reference, options, 0, bs, &child_backing,
2226 errp);
2227 if (!backing_hd) {
9156df12 2228 bs->open_flags |= BDRV_O_NO_BACKING;
e43bfd9c 2229 error_prepend(errp, "Could not open backing file: ");
5b363937 2230 ret = -EINVAL;
1ba4b6a5 2231 goto free_exit;
9156df12 2232 }
5ce6bfe2 2233 bdrv_set_aio_context(backing_hd, bdrv_get_aio_context(bs));
df581792 2234
5db15a57
KW
2235 /* Hook up the backing file link; drop our reference, bs owns the
2236 * backing_hd reference now */
12fa4af6 2237 bdrv_set_backing_hd(bs, backing_hd, &local_err);
5db15a57 2238 bdrv_unref(backing_hd);
12fa4af6 2239 if (local_err) {
8cd1a3e4 2240 error_propagate(errp, local_err);
12fa4af6
KW
2241 ret = -EINVAL;
2242 goto free_exit;
2243 }
d80ac658 2244
d9b7b057
KW
2245 qdict_del(parent_options, bdref_key);
2246
1ba4b6a5
BC
2247free_exit:
2248 g_free(backing_filename);
d9b7b057 2249 QDECREF(tmp_parent_options);
1ba4b6a5 2250 return ret;
9156df12
PB
2251}
2252
2d6b86af
KW
2253static BlockDriverState *
2254bdrv_open_child_bs(const char *filename, QDict *options, const char *bdref_key,
2255 BlockDriverState *parent, const BdrvChildRole *child_role,
2256 bool allow_none, Error **errp)
da557aac 2257{
2d6b86af 2258 BlockDriverState *bs = NULL;
da557aac 2259 QDict *image_options;
da557aac
HR
2260 char *bdref_key_dot;
2261 const char *reference;
2262
df581792 2263 assert(child_role != NULL);
f67503e5 2264
da557aac
HR
2265 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
2266 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
2267 g_free(bdref_key_dot);
2268
129c7d1c
MA
2269 /*
2270 * Caution: while qdict_get_try_str() is fine, getting non-string
2271 * types would require more care. When @options come from
2272 * -blockdev or blockdev_add, its members are typed according to
2273 * the QAPI schema, but when they come from -drive, they're all
2274 * QString.
2275 */
da557aac
HR
2276 reference = qdict_get_try_str(options, bdref_key);
2277 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 2278 if (!allow_none) {
da557aac
HR
2279 error_setg(errp, "A block device must be specified for \"%s\"",
2280 bdref_key);
da557aac 2281 }
b20e61e0 2282 QDECREF(image_options);
da557aac
HR
2283 goto done;
2284 }
2285
5b363937
HR
2286 bs = bdrv_open_inherit(filename, reference, image_options, 0,
2287 parent, child_role, errp);
2288 if (!bs) {
df581792
KW
2289 goto done;
2290 }
2291
da557aac
HR
2292done:
2293 qdict_del(options, bdref_key);
2d6b86af
KW
2294 return bs;
2295}
2296
2297/*
2298 * Opens a disk image whose options are given as BlockdevRef in another block
2299 * device's options.
2300 *
2301 * If allow_none is true, no image will be opened if filename is false and no
2302 * BlockdevRef is given. NULL will be returned, but errp remains unset.
2303 *
2304 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
2305 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
2306 * itself, all options starting with "${bdref_key}." are considered part of the
2307 * BlockdevRef.
2308 *
2309 * The BlockdevRef will be removed from the options QDict.
2310 */
2311BdrvChild *bdrv_open_child(const char *filename,
2312 QDict *options, const char *bdref_key,
2313 BlockDriverState *parent,
2314 const BdrvChildRole *child_role,
2315 bool allow_none, Error **errp)
2316{
8b2ff529 2317 BdrvChild *c;
2d6b86af
KW
2318 BlockDriverState *bs;
2319
2320 bs = bdrv_open_child_bs(filename, options, bdref_key, parent, child_role,
2321 allow_none, errp);
2322 if (bs == NULL) {
2323 return NULL;
2324 }
2325
8b2ff529
KW
2326 c = bdrv_attach_child(parent, bs, bdref_key, child_role, errp);
2327 if (!c) {
2328 bdrv_unref(bs);
2329 return NULL;
2330 }
2331
2332 return c;
b4b059f6
KW
2333}
2334
66836189
HR
2335static BlockDriverState *bdrv_append_temp_snapshot(BlockDriverState *bs,
2336 int flags,
2337 QDict *snapshot_options,
2338 Error **errp)
b998875d
KW
2339{
2340 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 2341 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 2342 int64_t total_size;
83d0521a 2343 QemuOpts *opts = NULL;
ff6ed714 2344 BlockDriverState *bs_snapshot = NULL;
b2c2832c 2345 Error *local_err = NULL;
b998875d
KW
2346 int ret;
2347
2348 /* if snapshot, we create a temporary backing file and open it
2349 instead of opening 'filename' directly */
2350
2351 /* Get the required size from the image */
f187743a
KW
2352 total_size = bdrv_getlength(bs);
2353 if (total_size < 0) {
2354 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 2355 goto out;
f187743a 2356 }
b998875d
KW
2357
2358 /* Create the temporary image */
1ba4b6a5 2359 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
2360 if (ret < 0) {
2361 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 2362 goto out;
b998875d
KW
2363 }
2364
ef810437 2365 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 2366 &error_abort);
39101f25 2367 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
e43bfd9c 2368 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, errp);
83d0521a 2369 qemu_opts_del(opts);
b998875d 2370 if (ret < 0) {
e43bfd9c
MA
2371 error_prepend(errp, "Could not create temporary overlay '%s': ",
2372 tmp_filename);
1ba4b6a5 2373 goto out;
b998875d
KW
2374 }
2375
73176bee 2376 /* Prepare options QDict for the temporary file */
46f5ac20
EB
2377 qdict_put_str(snapshot_options, "file.driver", "file");
2378 qdict_put_str(snapshot_options, "file.filename", tmp_filename);
2379 qdict_put_str(snapshot_options, "driver", "qcow2");
b998875d 2380
5b363937 2381 bs_snapshot = bdrv_open(NULL, NULL, snapshot_options, flags, errp);
73176bee 2382 snapshot_options = NULL;
5b363937 2383 if (!bs_snapshot) {
1ba4b6a5 2384 goto out;
b998875d
KW
2385 }
2386
ff6ed714
EB
2387 /* bdrv_append() consumes a strong reference to bs_snapshot
2388 * (i.e. it will call bdrv_unref() on it) even on error, so in
2389 * order to be able to return one, we have to increase
2390 * bs_snapshot's refcount here */
66836189 2391 bdrv_ref(bs_snapshot);
b2c2832c
KW
2392 bdrv_append(bs_snapshot, bs, &local_err);
2393 if (local_err) {
2394 error_propagate(errp, local_err);
ff6ed714 2395 bs_snapshot = NULL;
b2c2832c
KW
2396 goto out;
2397 }
1ba4b6a5
BC
2398
2399out:
73176bee 2400 QDECREF(snapshot_options);
1ba4b6a5 2401 g_free(tmp_filename);
ff6ed714 2402 return bs_snapshot;
b998875d
KW
2403}
2404
b6ce07aa
KW
2405/*
2406 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
2407 *
2408 * options is a QDict of options to pass to the block drivers, or NULL for an
2409 * empty set of options. The reference to the QDict belongs to the block layer
2410 * after the call (even on failure), so if the caller intends to reuse the
2411 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
2412 *
2413 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
2414 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
2415 *
2416 * The reference parameter may be used to specify an existing block device which
2417 * should be opened. If specified, neither options nor a filename may be given,
2418 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 2419 */
5b363937
HR
2420static BlockDriverState *bdrv_open_inherit(const char *filename,
2421 const char *reference,
2422 QDict *options, int flags,
2423 BlockDriverState *parent,
2424 const BdrvChildRole *child_role,
2425 Error **errp)
ea2384d3 2426{
b6ce07aa 2427 int ret;
5696c6e3 2428 BlockBackend *file = NULL;
9a4f4c31 2429 BlockDriverState *bs;
ce343771 2430 BlockDriver *drv = NULL;
74fe54f2 2431 const char *drvname;
3e8c2e57 2432 const char *backing;
34b5d2c6 2433 Error *local_err = NULL;
73176bee 2434 QDict *snapshot_options = NULL;
b1e6fc08 2435 int snapshot_flags = 0;
712e7874 2436
f3930ed0
KW
2437 assert(!child_role || !flags);
2438 assert(!child_role == !parent);
f67503e5 2439
ddf5636d
HR
2440 if (reference) {
2441 bool options_non_empty = options ? qdict_size(options) : false;
2442 QDECREF(options);
2443
ddf5636d
HR
2444 if (filename || options_non_empty) {
2445 error_setg(errp, "Cannot reference an existing block device with "
2446 "additional options or a new filename");
5b363937 2447 return NULL;
ddf5636d
HR
2448 }
2449
2450 bs = bdrv_lookup_bs(reference, reference, errp);
2451 if (!bs) {
5b363937 2452 return NULL;
ddf5636d 2453 }
76b22320 2454
ddf5636d 2455 bdrv_ref(bs);
5b363937 2456 return bs;
ddf5636d
HR
2457 }
2458
5b363937 2459 bs = bdrv_new();
f67503e5 2460
de9c0cec
KW
2461 /* NULL means an empty set of options */
2462 if (options == NULL) {
2463 options = qdict_new();
2464 }
2465
145f598e 2466 /* json: syntax counts as explicit options, as if in the QDict */
de3b53f0
KW
2467 parse_json_protocol(options, &filename, &local_err);
2468 if (local_err) {
de3b53f0
KW
2469 goto fail;
2470 }
2471
145f598e
KW
2472 bs->explicit_options = qdict_clone_shallow(options);
2473
f3930ed0 2474 if (child_role) {
bddcec37 2475 bs->inherits_from = parent;
8e2160e2
KW
2476 child_role->inherit_options(&flags, options,
2477 parent->open_flags, parent->options);
f3930ed0
KW
2478 }
2479
de3b53f0 2480 ret = bdrv_fill_options(&options, filename, &flags, &local_err);
462f5bcf
KW
2481 if (local_err) {
2482 goto fail;
2483 }
2484
129c7d1c
MA
2485 /*
2486 * Set the BDRV_O_RDWR and BDRV_O_ALLOW_RDWR flags.
2487 * Caution: getting a boolean member of @options requires care.
2488 * When @options come from -blockdev or blockdev_add, members are
2489 * typed according to the QAPI schema, but when they come from
2490 * -drive, they're all QString.
2491 */
f87a0e29
AG
2492 if (g_strcmp0(qdict_get_try_str(options, BDRV_OPT_READ_ONLY), "on") &&
2493 !qdict_get_try_bool(options, BDRV_OPT_READ_ONLY, false)) {
2494 flags |= (BDRV_O_RDWR | BDRV_O_ALLOW_RDWR);
2495 } else {
2496 flags &= ~BDRV_O_RDWR;
14499ea5
AG
2497 }
2498
2499 if (flags & BDRV_O_SNAPSHOT) {
2500 snapshot_options = qdict_new();
2501 bdrv_temp_snapshot_options(&snapshot_flags, snapshot_options,
2502 flags, options);
f87a0e29
AG
2503 /* Let bdrv_backing_options() override "read-only" */
2504 qdict_del(options, BDRV_OPT_READ_ONLY);
14499ea5
AG
2505 bdrv_backing_options(&flags, options, flags, options);
2506 }
2507
62392ebb
KW
2508 bs->open_flags = flags;
2509 bs->options = options;
2510 options = qdict_clone_shallow(options);
2511
76c591b0 2512 /* Find the right image format driver */
129c7d1c 2513 /* See cautionary note on accessing @options above */
76c591b0
KW
2514 drvname = qdict_get_try_str(options, "driver");
2515 if (drvname) {
2516 drv = bdrv_find_format(drvname);
76c591b0
KW
2517 if (!drv) {
2518 error_setg(errp, "Unknown driver: '%s'", drvname);
76c591b0
KW
2519 goto fail;
2520 }
2521 }
2522
2523 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 2524
129c7d1c 2525 /* See cautionary note on accessing @options above */
3e8c2e57
AG
2526 backing = qdict_get_try_str(options, "backing");
2527 if (backing && *backing == '\0') {
2528 flags |= BDRV_O_NO_BACKING;
2529 qdict_del(options, "backing");
2530 }
2531
5696c6e3 2532 /* Open image file without format layer. This BlockBackend is only used for
4e4bf5c4
KW
2533 * probing, the block drivers will do their own bdrv_open_child() for the
2534 * same BDS, which is why we put the node name back into options. */
f4788adc 2535 if ((flags & BDRV_O_PROTOCOL) == 0) {
5696c6e3
KW
2536 BlockDriverState *file_bs;
2537
2538 file_bs = bdrv_open_child_bs(filename, options, "file", bs,
2539 &child_file, true, &local_err);
1fdd6933 2540 if (local_err) {
f4788adc
KW
2541 goto fail;
2542 }
5696c6e3 2543 if (file_bs != NULL) {
6d0eb64d 2544 file = blk_new(BLK_PERM_CONSISTENT_READ, BLK_PERM_ALL);
d7086422 2545 blk_insert_bs(file, file_bs, &local_err);
5696c6e3 2546 bdrv_unref(file_bs);
d7086422
KW
2547 if (local_err) {
2548 goto fail;
2549 }
5696c6e3 2550
46f5ac20 2551 qdict_put_str(options, "file", bdrv_get_node_name(file_bs));
4e4bf5c4 2552 }
f500a6d3
KW
2553 }
2554
76c591b0 2555 /* Image format probing */
38f3ef57 2556 bs->probed = !drv;
76c591b0 2557 if (!drv && file) {
cf2ab8fc 2558 ret = find_image_format(file, filename, &drv, &local_err);
17b005f1 2559 if (ret < 0) {
8bfea15d 2560 goto fail;
2a05cbe4 2561 }
62392ebb
KW
2562 /*
2563 * This option update would logically belong in bdrv_fill_options(),
2564 * but we first need to open bs->file for the probing to work, while
2565 * opening bs->file already requires the (mostly) final set of options
2566 * so that cache mode etc. can be inherited.
2567 *
2568 * Adding the driver later is somewhat ugly, but it's not an option
2569 * that would ever be inherited, so it's correct. We just need to make
2570 * sure to update both bs->options (which has the full effective
2571 * options for bs) and options (which has file.* already removed).
2572 */
46f5ac20
EB
2573 qdict_put_str(bs->options, "driver", drv->format_name);
2574 qdict_put_str(options, "driver", drv->format_name);
76c591b0 2575 } else if (!drv) {
17b005f1 2576 error_setg(errp, "Must specify either driver or file");
8bfea15d 2577 goto fail;
ea2384d3 2578 }
b6ce07aa 2579
53a29513
HR
2580 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
2581 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
2582 /* file must be NULL if a protocol BDS is about to be created
2583 * (the inverse results in an error message from bdrv_open_common()) */
2584 assert(!(flags & BDRV_O_PROTOCOL) || !file);
2585
b6ce07aa 2586 /* Open the image */
82dc8b41 2587 ret = bdrv_open_common(bs, file, options, &local_err);
b6ce07aa 2588 if (ret < 0) {
8bfea15d 2589 goto fail;
6987307c
CH
2590 }
2591
4e4bf5c4 2592 if (file) {
5696c6e3 2593 blk_unref(file);
f500a6d3
KW
2594 file = NULL;
2595 }
2596
b6ce07aa 2597 /* If there is a backing file, use it */
9156df12 2598 if ((flags & BDRV_O_NO_BACKING) == 0) {
d9b7b057 2599 ret = bdrv_open_backing_file(bs, options, "backing", &local_err);
b6ce07aa 2600 if (ret < 0) {
b6ad491a 2601 goto close_and_fail;
b6ce07aa 2602 }
b6ce07aa
KW
2603 }
2604
91af7014
HR
2605 bdrv_refresh_filename(bs);
2606
b6ad491a 2607 /* Check if any unknown options were used */
7ad2757f 2608 if (qdict_size(options) != 0) {
b6ad491a 2609 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
2610 if (flags & BDRV_O_PROTOCOL) {
2611 error_setg(errp, "Block protocol '%s' doesn't support the option "
2612 "'%s'", drv->format_name, entry->key);
2613 } else {
d0e46a55
HR
2614 error_setg(errp,
2615 "Block format '%s' does not support the option '%s'",
2616 drv->format_name, entry->key);
5acd9d81 2617 }
b6ad491a 2618
b6ad491a
KW
2619 goto close_and_fail;
2620 }
b6ad491a 2621
c01c214b 2622 bdrv_parent_cb_change_media(bs, true);
b6ce07aa 2623
c3adb58f 2624 QDECREF(options);
dd62f1ca
KW
2625
2626 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
2627 * temporary snapshot afterwards. */
2628 if (snapshot_flags) {
66836189
HR
2629 BlockDriverState *snapshot_bs;
2630 snapshot_bs = bdrv_append_temp_snapshot(bs, snapshot_flags,
2631 snapshot_options, &local_err);
73176bee 2632 snapshot_options = NULL;
dd62f1ca
KW
2633 if (local_err) {
2634 goto close_and_fail;
2635 }
5b363937
HR
2636 /* We are not going to return bs but the overlay on top of it
2637 * (snapshot_bs); thus, we have to drop the strong reference to bs
2638 * (which we obtained by calling bdrv_new()). bs will not be deleted,
2639 * though, because the overlay still has a reference to it. */
2640 bdrv_unref(bs);
2641 bs = snapshot_bs;
dd62f1ca
KW
2642 }
2643
5b363937 2644 return bs;
b6ce07aa 2645
8bfea15d 2646fail:
5696c6e3 2647 blk_unref(file);
73176bee 2648 QDECREF(snapshot_options);
145f598e 2649 QDECREF(bs->explicit_options);
de9c0cec 2650 QDECREF(bs->options);
b6ad491a 2651 QDECREF(options);
de9c0cec 2652 bs->options = NULL;
998cbd6a 2653 bs->explicit_options = NULL;
5b363937 2654 bdrv_unref(bs);
621ff94d 2655 error_propagate(errp, local_err);
5b363937 2656 return NULL;
de9c0cec 2657
b6ad491a 2658close_and_fail:
5b363937 2659 bdrv_unref(bs);
73176bee 2660 QDECREF(snapshot_options);
b6ad491a 2661 QDECREF(options);
621ff94d 2662 error_propagate(errp, local_err);
5b363937 2663 return NULL;
b6ce07aa
KW
2664}
2665
5b363937
HR
2666BlockDriverState *bdrv_open(const char *filename, const char *reference,
2667 QDict *options, int flags, Error **errp)
f3930ed0 2668{
5b363937 2669 return bdrv_open_inherit(filename, reference, options, flags, NULL,
ce343771 2670 NULL, errp);
f3930ed0
KW
2671}
2672
e971aa12
JC
2673/*
2674 * Adds a BlockDriverState to a simple queue for an atomic, transactional
2675 * reopen of multiple devices.
2676 *
2677 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
2678 * already performed, or alternatively may be NULL a new BlockReopenQueue will
2679 * be created and initialized. This newly created BlockReopenQueue should be
2680 * passed back in for subsequent calls that are intended to be of the same
2681 * atomic 'set'.
2682 *
2683 * bs is the BlockDriverState to add to the reopen queue.
2684 *
4d2cb092
KW
2685 * options contains the changed options for the associated bs
2686 * (the BlockReopenQueue takes ownership)
2687 *
e971aa12
JC
2688 * flags contains the open flags for the associated bs
2689 *
2690 * returns a pointer to bs_queue, which is either the newly allocated
2691 * bs_queue, or the existing bs_queue being used.
2692 *
2693 */
28518102
KW
2694static BlockReopenQueue *bdrv_reopen_queue_child(BlockReopenQueue *bs_queue,
2695 BlockDriverState *bs,
2696 QDict *options,
2697 int flags,
2698 const BdrvChildRole *role,
2699 QDict *parent_options,
2700 int parent_flags)
e971aa12
JC
2701{
2702 assert(bs != NULL);
2703
2704 BlockReopenQueueEntry *bs_entry;
67251a31 2705 BdrvChild *child;
145f598e 2706 QDict *old_options, *explicit_options;
67251a31 2707
e971aa12
JC
2708 if (bs_queue == NULL) {
2709 bs_queue = g_new0(BlockReopenQueue, 1);
2710 QSIMPLEQ_INIT(bs_queue);
2711 }
2712
4d2cb092
KW
2713 if (!options) {
2714 options = qdict_new();
2715 }
2716
5b7ba05f
AG
2717 /* Check if this BlockDriverState is already in the queue */
2718 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
2719 if (bs == bs_entry->state.bs) {
2720 break;
2721 }
2722 }
2723
28518102
KW
2724 /*
2725 * Precedence of options:
2726 * 1. Explicitly passed in options (highest)
91a097e7 2727 * 2. Set in flags (only for top level)
145f598e 2728 * 3. Retained from explicitly set options of bs
8e2160e2 2729 * 4. Inherited from parent node
28518102
KW
2730 * 5. Retained from effective options of bs
2731 */
2732
91a097e7
KW
2733 if (!parent_options) {
2734 /*
2735 * Any setting represented by flags is always updated. If the
2736 * corresponding QDict option is set, it takes precedence. Otherwise
2737 * the flag is translated into a QDict option. The old setting of bs is
2738 * not considered.
2739 */
2740 update_options_from_flags(options, flags);
2741 }
2742
145f598e 2743 /* Old explicitly set values (don't overwrite by inherited value) */
5b7ba05f
AG
2744 if (bs_entry) {
2745 old_options = qdict_clone_shallow(bs_entry->state.explicit_options);
2746 } else {
2747 old_options = qdict_clone_shallow(bs->explicit_options);
2748 }
145f598e
KW
2749 bdrv_join_options(bs, options, old_options);
2750 QDECREF(old_options);
2751
2752 explicit_options = qdict_clone_shallow(options);
2753
28518102
KW
2754 /* Inherit from parent node */
2755 if (parent_options) {
2756 assert(!flags);
8e2160e2 2757 role->inherit_options(&flags, options, parent_flags, parent_options);
28518102
KW
2758 }
2759
2760 /* Old values are used for options that aren't set yet */
4d2cb092 2761 old_options = qdict_clone_shallow(bs->options);
cddff5ba 2762 bdrv_join_options(bs, options, old_options);
4d2cb092
KW
2763 QDECREF(old_options);
2764
fd452021 2765 /* bdrv_open_inherit() sets and clears some additional flags internally */
f1f25a2e 2766 flags &= ~BDRV_O_PROTOCOL;
fd452021
KW
2767 if (flags & BDRV_O_RDWR) {
2768 flags |= BDRV_O_ALLOW_RDWR;
2769 }
f1f25a2e 2770
1857c97b
KW
2771 if (!bs_entry) {
2772 bs_entry = g_new0(BlockReopenQueueEntry, 1);
2773 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
2774 } else {
2775 QDECREF(bs_entry->state.options);
2776 QDECREF(bs_entry->state.explicit_options);
2777 }
2778
2779 bs_entry->state.bs = bs;
2780 bs_entry->state.options = options;
2781 bs_entry->state.explicit_options = explicit_options;
2782 bs_entry->state.flags = flags;
2783
67251a31 2784 QLIST_FOREACH(child, &bs->children, next) {
4c9dfe5d
KW
2785 QDict *new_child_options;
2786 char *child_key_dot;
67251a31 2787
4c9dfe5d
KW
2788 /* reopen can only change the options of block devices that were
2789 * implicitly created and inherited options. For other (referenced)
2790 * block devices, a syntax like "backing.foo" results in an error. */
67251a31
KW
2791 if (child->bs->inherits_from != bs) {
2792 continue;
2793 }
2794
4c9dfe5d
KW
2795 child_key_dot = g_strdup_printf("%s.", child->name);
2796 qdict_extract_subqdict(options, &new_child_options, child_key_dot);
2797 g_free(child_key_dot);
2798
28518102
KW
2799 bdrv_reopen_queue_child(bs_queue, child->bs, new_child_options, 0,
2800 child->role, options, flags);
e971aa12
JC
2801 }
2802
e971aa12
JC
2803 return bs_queue;
2804}
2805
28518102
KW
2806BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
2807 BlockDriverState *bs,
2808 QDict *options, int flags)
2809{
2810 return bdrv_reopen_queue_child(bs_queue, bs, options, flags,
2811 NULL, NULL, 0);
2812}
2813
e971aa12
JC
2814/*
2815 * Reopen multiple BlockDriverStates atomically & transactionally.
2816 *
2817 * The queue passed in (bs_queue) must have been built up previous
2818 * via bdrv_reopen_queue().
2819 *
2820 * Reopens all BDS specified in the queue, with the appropriate
2821 * flags. All devices are prepared for reopen, and failure of any
2822 * device will cause all device changes to be abandonded, and intermediate
2823 * data cleaned up.
2824 *
2825 * If all devices prepare successfully, then the changes are committed
2826 * to all devices.
2827 *
2828 */
720150f3 2829int bdrv_reopen_multiple(AioContext *ctx, BlockReopenQueue *bs_queue, Error **errp)
e971aa12
JC
2830{
2831 int ret = -1;
2832 BlockReopenQueueEntry *bs_entry, *next;
2833 Error *local_err = NULL;
2834
2835 assert(bs_queue != NULL);
2836
c9d1a561 2837 aio_context_release(ctx);
40840e41 2838 bdrv_drain_all_begin();
c9d1a561 2839 aio_context_acquire(ctx);
e971aa12
JC
2840
2841 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
2842 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
2843 error_propagate(errp, local_err);
2844 goto cleanup;
2845 }
2846 bs_entry->prepared = true;
2847 }
2848
2849 /* If we reach this point, we have success and just need to apply the
2850 * changes
2851 */
2852 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
2853 bdrv_reopen_commit(&bs_entry->state);
2854 }
2855
2856 ret = 0;
2857
2858cleanup:
2859 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
2860 if (ret && bs_entry->prepared) {
2861 bdrv_reopen_abort(&bs_entry->state);
145f598e
KW
2862 } else if (ret) {
2863 QDECREF(bs_entry->state.explicit_options);
e971aa12 2864 }
4d2cb092 2865 QDECREF(bs_entry->state.options);
e971aa12
JC
2866 g_free(bs_entry);
2867 }
2868 g_free(bs_queue);
40840e41
AG
2869
2870 bdrv_drain_all_end();
2871
e971aa12
JC
2872 return ret;
2873}
2874
2875
2876/* Reopen a single BlockDriverState with the specified flags. */
2877int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
2878{
2879 int ret = -1;
2880 Error *local_err = NULL;
4d2cb092 2881 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12 2882
720150f3 2883 ret = bdrv_reopen_multiple(bdrv_get_aio_context(bs), queue, &local_err);
e971aa12
JC
2884 if (local_err != NULL) {
2885 error_propagate(errp, local_err);
2886 }
2887 return ret;
2888}
2889
2890
2891/*
2892 * Prepares a BlockDriverState for reopen. All changes are staged in the
2893 * 'opaque' field of the BDRVReopenState, which is used and allocated by
2894 * the block driver layer .bdrv_reopen_prepare()
2895 *
2896 * bs is the BlockDriverState to reopen
2897 * flags are the new open flags
2898 * queue is the reopen queue
2899 *
2900 * Returns 0 on success, non-zero on error. On error errp will be set
2901 * as well.
2902 *
2903 * On failure, bdrv_reopen_abort() will be called to clean up any data.
2904 * It is the responsibility of the caller to then call the abort() or
2905 * commit() for any other BDS that have been left in a prepare() state
2906 *
2907 */
2908int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
2909 Error **errp)
2910{
2911 int ret = -1;
2912 Error *local_err = NULL;
2913 BlockDriver *drv;
ccf9dc07
KW
2914 QemuOpts *opts;
2915 const char *value;
3d8ce171 2916 bool read_only;
e971aa12
JC
2917
2918 assert(reopen_state != NULL);
2919 assert(reopen_state->bs->drv != NULL);
2920 drv = reopen_state->bs->drv;
2921
ccf9dc07
KW
2922 /* Process generic block layer options */
2923 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
2924 qemu_opts_absorb_qdict(opts, reopen_state->options, &local_err);
2925 if (local_err) {
2926 error_propagate(errp, local_err);
2927 ret = -EINVAL;
2928 goto error;
2929 }
2930
91a097e7
KW
2931 update_flags_from_options(&reopen_state->flags, opts);
2932
ccf9dc07
KW
2933 /* node-name and driver must be unchanged. Put them back into the QDict, so
2934 * that they are checked at the end of this function. */
2935 value = qemu_opt_get(opts, "node-name");
2936 if (value) {
46f5ac20 2937 qdict_put_str(reopen_state->options, "node-name", value);
ccf9dc07
KW
2938 }
2939
2940 value = qemu_opt_get(opts, "driver");
2941 if (value) {
46f5ac20 2942 qdict_put_str(reopen_state->options, "driver", value);
ccf9dc07
KW
2943 }
2944
3d8ce171
JC
2945 /* If we are to stay read-only, do not allow permission change
2946 * to r/w. Attempting to set to r/w may fail if either BDRV_O_ALLOW_RDWR is
2947 * not set, or if the BDS still has copy_on_read enabled */
2948 read_only = !(reopen_state->flags & BDRV_O_RDWR);
54a32bfe 2949 ret = bdrv_can_set_read_only(reopen_state->bs, read_only, true, &local_err);
3d8ce171
JC
2950 if (local_err) {
2951 error_propagate(errp, local_err);
e971aa12
JC
2952 goto error;
2953 }
2954
2955
2956 ret = bdrv_flush(reopen_state->bs);
2957 if (ret) {
455b0fde 2958 error_setg_errno(errp, -ret, "Error flushing drive");
e971aa12
JC
2959 goto error;
2960 }
2961
2962 if (drv->bdrv_reopen_prepare) {
2963 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
2964 if (ret) {
2965 if (local_err != NULL) {
2966 error_propagate(errp, local_err);
2967 } else {
d8b6895f
LC
2968 error_setg(errp, "failed while preparing to reopen image '%s'",
2969 reopen_state->bs->filename);
e971aa12
JC
2970 }
2971 goto error;
2972 }
2973 } else {
2974 /* It is currently mandatory to have a bdrv_reopen_prepare()
2975 * handler for each supported drv. */
81e5f78a
AG
2976 error_setg(errp, "Block format '%s' used by node '%s' "
2977 "does not support reopening files", drv->format_name,
2978 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
2979 ret = -1;
2980 goto error;
2981 }
2982
4d2cb092
KW
2983 /* Options that are not handled are only okay if they are unchanged
2984 * compared to the old state. It is expected that some options are only
2985 * used for the initial open, but not reopen (e.g. filename) */
2986 if (qdict_size(reopen_state->options)) {
2987 const QDictEntry *entry = qdict_first(reopen_state->options);
2988
2989 do {
2990 QString *new_obj = qobject_to_qstring(entry->value);
2991 const char *new = qstring_get_str(new_obj);
129c7d1c
MA
2992 /*
2993 * Caution: while qdict_get_try_str() is fine, getting
2994 * non-string types would require more care. When
2995 * bs->options come from -blockdev or blockdev_add, its
2996 * members are typed according to the QAPI schema, but
2997 * when they come from -drive, they're all QString.
2998 */
4d2cb092
KW
2999 const char *old = qdict_get_try_str(reopen_state->bs->options,
3000 entry->key);
3001
3002 if (!old || strcmp(new, old)) {
3003 error_setg(errp, "Cannot change the option '%s'", entry->key);
3004 ret = -EINVAL;
3005 goto error;
3006 }
3007 } while ((entry = qdict_next(reopen_state->options, entry)));
3008 }
3009
e971aa12
JC
3010 ret = 0;
3011
3012error:
ccf9dc07 3013 qemu_opts_del(opts);
e971aa12
JC
3014 return ret;
3015}
3016
3017/*
3018 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
3019 * makes them final by swapping the staging BlockDriverState contents into
3020 * the active BlockDriverState contents.
3021 */
3022void bdrv_reopen_commit(BDRVReopenState *reopen_state)
3023{
3024 BlockDriver *drv;
50bf65ba 3025 BlockDriverState *bs;
cb9ff6c2 3026 bool old_can_write, new_can_write;
e971aa12
JC
3027
3028 assert(reopen_state != NULL);
50bf65ba
VSO
3029 bs = reopen_state->bs;
3030 drv = bs->drv;
e971aa12
JC
3031 assert(drv != NULL);
3032
cb9ff6c2
VSO
3033 old_can_write =
3034 !bdrv_is_read_only(bs) && !(bdrv_get_flags(bs) & BDRV_O_INACTIVE);
3035
e971aa12
JC
3036 /* If there are any driver level actions to take */
3037 if (drv->bdrv_reopen_commit) {
3038 drv->bdrv_reopen_commit(reopen_state);
3039 }
3040
3041 /* set BDS specific flags now */
50bf65ba 3042 QDECREF(bs->explicit_options);
145f598e 3043
50bf65ba
VSO
3044 bs->explicit_options = reopen_state->explicit_options;
3045 bs->open_flags = reopen_state->flags;
3046 bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 3047
50bf65ba 3048 bdrv_refresh_limits(bs, NULL);
cb9ff6c2
VSO
3049
3050 new_can_write =
3051 !bdrv_is_read_only(bs) && !(bdrv_get_flags(bs) & BDRV_O_INACTIVE);
3052 if (!old_can_write && new_can_write && drv->bdrv_reopen_bitmaps_rw) {
3053 Error *local_err = NULL;
3054 if (drv->bdrv_reopen_bitmaps_rw(bs, &local_err) < 0) {
3055 /* This is not fatal, bitmaps just left read-only, so all following
3056 * writes will fail. User can remove read-only bitmaps to unblock
3057 * writes.
3058 */
3059 error_reportf_err(local_err,
3060 "%s: Failed to make dirty bitmaps writable: ",
3061 bdrv_get_node_name(bs));
3062 }
3063 }
e971aa12
JC
3064}
3065
3066/*
3067 * Abort the reopen, and delete and free the staged changes in
3068 * reopen_state
3069 */
3070void bdrv_reopen_abort(BDRVReopenState *reopen_state)
3071{
3072 BlockDriver *drv;
3073
3074 assert(reopen_state != NULL);
3075 drv = reopen_state->bs->drv;
3076 assert(drv != NULL);
3077
3078 if (drv->bdrv_reopen_abort) {
3079 drv->bdrv_reopen_abort(reopen_state);
3080 }
145f598e
KW
3081
3082 QDECREF(reopen_state->explicit_options);
e971aa12
JC
3083}
3084
3085
64dff520 3086static void bdrv_close(BlockDriverState *bs)
fc01f7e7 3087{
33384421
HR
3088 BdrvAioNotifier *ban, *ban_next;
3089
ca9bd24c 3090 assert(!bs->job);
30f55fb8 3091 assert(!bs->refcnt);
99b7e775 3092
fc27291d 3093 bdrv_drained_begin(bs); /* complete I/O */
58fda173 3094 bdrv_flush(bs);
53ec73e2 3095 bdrv_drain(bs); /* in case flush left pending I/O */
fc27291d 3096
3cbc002c 3097 if (bs->drv) {
6e93e7c4
KW
3098 BdrvChild *child, *next;
3099
9a7dedbc 3100 bs->drv->bdrv_close(bs);
9a4f4c31 3101 bs->drv = NULL;
9a7dedbc 3102
12fa4af6 3103 bdrv_set_backing_hd(bs, NULL, &error_abort);
9a7dedbc 3104
9a4f4c31
KW
3105 if (bs->file != NULL) {
3106 bdrv_unref_child(bs, bs->file);
3107 bs->file = NULL;
3108 }
3109
6e93e7c4 3110 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
3111 /* TODO Remove bdrv_unref() from drivers' close function and use
3112 * bdrv_unref_child() here */
bddcec37
KW
3113 if (child->bs->inherits_from == bs) {
3114 child->bs->inherits_from = NULL;
3115 }
33a60407 3116 bdrv_detach_child(child);
6e93e7c4
KW
3117 }
3118
7267c094 3119 g_free(bs->opaque);
ea2384d3 3120 bs->opaque = NULL;
d3faa13e 3121 atomic_set(&bs->copy_on_read, 0);
a275fa42
PB
3122 bs->backing_file[0] = '\0';
3123 bs->backing_format[0] = '\0';
6405875c 3124 bs->total_sectors = 0;
54115412 3125 bs->encrypted = false;
54115412 3126 bs->sg = false;
de9c0cec 3127 QDECREF(bs->options);
145f598e 3128 QDECREF(bs->explicit_options);
de9c0cec 3129 bs->options = NULL;
998cbd6a 3130 bs->explicit_options = NULL;
91af7014
HR
3131 QDECREF(bs->full_open_options);
3132 bs->full_open_options = NULL;
b338082b 3133 }
98f90dba 3134
cca43ae1
VSO
3135 bdrv_release_named_dirty_bitmaps(bs);
3136 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
3137
33384421
HR
3138 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
3139 g_free(ban);
3140 }
3141 QLIST_INIT(&bs->aio_notifiers);
fc27291d 3142 bdrv_drained_end(bs);
b338082b
FB
3143}
3144
2bc93fed
MK
3145void bdrv_close_all(void)
3146{
a1a2af07 3147 block_job_cancel_sync_all();
cd7fca95 3148 nbd_export_close_all();
ca9bd24c
HR
3149
3150 /* Drop references from requests still in flight, such as canceled block
3151 * jobs whose AIO context has not been polled yet */
3152 bdrv_drain_all();
2bc93fed 3153
ca9bd24c
HR
3154 blk_remove_all_bs();
3155 blockdev_close_all_bdrv_states();
ed78cda3 3156
a1a2af07 3157 assert(QTAILQ_EMPTY(&all_bdrv_states));
2bc93fed
MK
3158}
3159
d0ac0380
KW
3160static bool should_update_child(BdrvChild *c, BlockDriverState *to)
3161{
3162 BdrvChild *to_c;
3163
3164 if (c->role->stay_at_node) {
3165 return false;
3166 }
3167
3168 if (c->role == &child_backing) {
3169 /* If @from is a backing file of @to, ignore the child to avoid
3170 * creating a loop. We only want to change the pointer of other
3171 * parents. */
3172 QLIST_FOREACH(to_c, &to->children, next) {
3173 if (to_c == c) {
3174 break;
3175 }
3176 }
3177 if (to_c) {
3178 return false;
3179 }
3180 }
3181
3182 return true;
3183}
3184
5fe31c25
KW
3185void bdrv_replace_node(BlockDriverState *from, BlockDriverState *to,
3186 Error **errp)
dd62f1ca 3187{
d0ac0380 3188 BdrvChild *c, *next;
234ac1a9
KW
3189 GSList *list = NULL, *p;
3190 uint64_t old_perm, old_shared;
3191 uint64_t perm = 0, shared = BLK_PERM_ALL;
3192 int ret;
3193
5fe31c25
KW
3194 assert(!atomic_read(&from->in_flight));
3195 assert(!atomic_read(&to->in_flight));
dd62f1ca 3196
234ac1a9
KW
3197 /* Make sure that @from doesn't go away until we have successfully attached
3198 * all of its parents to @to. */
3199 bdrv_ref(from);
dd62f1ca 3200
234ac1a9 3201 /* Put all parents into @list and calculate their cumulative permissions */
dd62f1ca 3202 QLIST_FOREACH_SAFE(c, &from->parents, next_parent, next) {
d0ac0380 3203 if (!should_update_child(c, to)) {
26de9438
KW
3204 continue;
3205 }
234ac1a9
KW
3206 list = g_slist_prepend(list, c);
3207 perm |= c->perm;
3208 shared &= c->shared_perm;
3209 }
3210
3211 /* Check whether the required permissions can be granted on @to, ignoring
3212 * all BdrvChild in @list so that they can't block themselves. */
3121fb45 3213 ret = bdrv_check_update_perm(to, NULL, perm, shared, list, errp);
234ac1a9
KW
3214 if (ret < 0) {
3215 bdrv_abort_perm_update(to);
3216 goto out;
3217 }
3218
3219 /* Now actually perform the change. We performed the permission check for
3220 * all elements of @list at once, so set the permissions all at once at the
3221 * very end. */
3222 for (p = list; p != NULL; p = p->next) {
3223 c = p->data;
9bd910e2 3224
dd62f1ca 3225 bdrv_ref(to);
234ac1a9 3226 bdrv_replace_child_noperm(c, to);
dd62f1ca
KW
3227 bdrv_unref(from);
3228 }
234ac1a9
KW
3229
3230 bdrv_get_cumulative_perm(to, &old_perm, &old_shared);
3231 bdrv_set_perm(to, old_perm | perm, old_shared | shared);
3232
3233out:
3234 g_slist_free(list);
3235 bdrv_unref(from);
dd62f1ca
KW
3236}
3237
4ddc07ca
PB
3238/*
3239 * Add new bs contents at the top of an image chain while the chain is
3240 * live, while keeping required fields on the top layer.
3241 *
3242 * This will modify the BlockDriverState fields, and swap contents
3243 * between bs_new and bs_top. Both bs_new and bs_top are modified.
3244 *
bfb197e0 3245 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
3246 *
3247 * This function does not create any image files.
dd62f1ca
KW
3248 *
3249 * bdrv_append() takes ownership of a bs_new reference and unrefs it because
3250 * that's what the callers commonly need. bs_new will be referenced by the old
3251 * parents of bs_top after bdrv_append() returns. If the caller needs to keep a
3252 * reference of its own, it must call bdrv_ref().
4ddc07ca 3253 */
b2c2832c
KW
3254void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top,
3255 Error **errp)
4ddc07ca 3256{
b2c2832c
KW
3257 Error *local_err = NULL;
3258
b2c2832c
KW
3259 bdrv_set_backing_hd(bs_new, bs_top, &local_err);
3260 if (local_err) {
3261 error_propagate(errp, local_err);
3262 goto out;
3263 }
dd62f1ca 3264
5fe31c25 3265 bdrv_replace_node(bs_top, bs_new, &local_err);
234ac1a9
KW
3266 if (local_err) {
3267 error_propagate(errp, local_err);
3268 bdrv_set_backing_hd(bs_new, NULL, &error_abort);
3269 goto out;
3270 }
4ddc07ca 3271
dd62f1ca
KW
3272 /* bs_new is now referenced by its new parents, we don't need the
3273 * additional reference any more. */
b2c2832c 3274out:
dd62f1ca 3275 bdrv_unref(bs_new);
8802d1fd
JC
3276}
3277
4f6fd349 3278static void bdrv_delete(BlockDriverState *bs)
b338082b 3279{
3e914655 3280 assert(!bs->job);
3718d8ab 3281 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 3282 assert(!bs->refcnt);
18846dee 3283
e1b5c52e
SH
3284 bdrv_close(bs);
3285
1b7bdbc1 3286 /* remove from list, if necessary */
63eaaae0
KW
3287 if (bs->node_name[0] != '\0') {
3288 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
3289 }
2c1d04e0
HR
3290 QTAILQ_REMOVE(&all_bdrv_states, bs, bs_list);
3291
7267c094 3292 g_free(bs);
fc01f7e7
FB
3293}
3294
e97fc193
AL
3295/*
3296 * Run consistency checks on an image
3297 *
e076f338 3298 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 3299 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 3300 * check are stored in res.
e97fc193 3301 */
4534ff54 3302int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 3303{
908bcd54
HR
3304 if (bs->drv == NULL) {
3305 return -ENOMEDIUM;
3306 }
e97fc193
AL
3307 if (bs->drv->bdrv_check == NULL) {
3308 return -ENOTSUP;
3309 }
3310
e076f338 3311 memset(res, 0, sizeof(*res));
4534ff54 3312 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
3313}
3314
756e6736
KW
3315/*
3316 * Return values:
3317 * 0 - success
3318 * -EINVAL - backing format specified, but no file
3319 * -ENOSPC - can't update the backing file because no space is left in the
3320 * image file header
3321 * -ENOTSUP - format driver doesn't support changing the backing file
3322 */
3323int bdrv_change_backing_file(BlockDriverState *bs,
3324 const char *backing_file, const char *backing_fmt)
3325{
3326 BlockDriver *drv = bs->drv;
469ef350 3327 int ret;
756e6736 3328
5f377794
PB
3329 /* Backing file format doesn't make sense without a backing file */
3330 if (backing_fmt && !backing_file) {
3331 return -EINVAL;
3332 }
3333
756e6736 3334 if (drv->bdrv_change_backing_file != NULL) {
469ef350 3335 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 3336 } else {
469ef350 3337 ret = -ENOTSUP;
756e6736 3338 }
469ef350
PB
3339
3340 if (ret == 0) {
3341 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
3342 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
3343 }
3344 return ret;
756e6736
KW
3345}
3346
6ebdcee2
JC
3347/*
3348 * Finds the image layer in the chain that has 'bs' as its backing file.
3349 *
3350 * active is the current topmost image.
3351 *
3352 * Returns NULL if bs is not found in active's image chain,
3353 * or if active == bs.
4caf0fcd
JC
3354 *
3355 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
3356 */
3357BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
3358 BlockDriverState *bs)
3359{
760e0063
KW
3360 while (active && bs != backing_bs(active)) {
3361 active = backing_bs(active);
6ebdcee2
JC
3362 }
3363
4caf0fcd
JC
3364 return active;
3365}
6ebdcee2 3366
4caf0fcd
JC
3367/* Given a BDS, searches for the base layer. */
3368BlockDriverState *bdrv_find_base(BlockDriverState *bs)
3369{
3370 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
3371}
3372
6ebdcee2
JC
3373/*
3374 * Drops images above 'base' up to and including 'top', and sets the image
3375 * above 'top' to have base as its backing file.
3376 *
3377 * Requires that the overlay to 'top' is opened r/w, so that the backing file
3378 * information in 'bs' can be properly updated.
3379 *
3380 * E.g., this will convert the following chain:
3381 * bottom <- base <- intermediate <- top <- active
3382 *
3383 * to
3384 *
3385 * bottom <- base <- active
3386 *
3387 * It is allowed for bottom==base, in which case it converts:
3388 *
3389 * base <- intermediate <- top <- active
3390 *
3391 * to
3392 *
3393 * base <- active
3394 *
54e26900
JC
3395 * If backing_file_str is non-NULL, it will be used when modifying top's
3396 * overlay image metadata.
3397 *
6ebdcee2
JC
3398 * Error conditions:
3399 * if active == top, that is considered an error
3400 *
3401 */
3402int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 3403 BlockDriverState *base, const char *backing_file_str)
6ebdcee2 3404{
6ebdcee2 3405 BlockDriverState *new_top_bs = NULL;
12fa4af6 3406 Error *local_err = NULL;
6ebdcee2
JC
3407 int ret = -EIO;
3408
6ebdcee2
JC
3409 if (!top->drv || !base->drv) {
3410 goto exit;
3411 }
3412
3413 new_top_bs = bdrv_find_overlay(active, top);
3414
3415 if (new_top_bs == NULL) {
3416 /* we could not find the image above 'top', this is an error */
3417 goto exit;
3418 }
3419
760e0063 3420 /* special case of new_top_bs->backing->bs already pointing to base - nothing
6ebdcee2 3421 * to do, no intermediate images */
760e0063 3422 if (backing_bs(new_top_bs) == base) {
6ebdcee2
JC
3423 ret = 0;
3424 goto exit;
3425 }
3426
5db15a57
KW
3427 /* Make sure that base is in the backing chain of top */
3428 if (!bdrv_chain_contains(top, base)) {
6ebdcee2
JC
3429 goto exit;
3430 }
3431
3432 /* success - we can delete the intermediate states, and link top->base */
5db15a57 3433 backing_file_str = backing_file_str ? backing_file_str : base->filename;
54e26900 3434 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
5db15a57 3435 base->drv ? base->drv->format_name : "");
6ebdcee2
JC
3436 if (ret) {
3437 goto exit;
3438 }
12fa4af6
KW
3439
3440 bdrv_set_backing_hd(new_top_bs, base, &local_err);
3441 if (local_err) {
3442 ret = -EPERM;
3443 error_report_err(local_err);
3444 goto exit;
3445 }
6ebdcee2 3446
6ebdcee2 3447 ret = 0;
6ebdcee2 3448exit:
6ebdcee2
JC
3449 return ret;
3450}
3451
61007b31
SH
3452/**
3453 * Truncate file to 'offset' bytes (needed only for file protocols)
3454 */
7ea37c30
HR
3455int bdrv_truncate(BdrvChild *child, int64_t offset, PreallocMode prealloc,
3456 Error **errp)
71d0770c 3457{
52cdbc58 3458 BlockDriverState *bs = child->bs;
61007b31
SH
3459 BlockDriver *drv = bs->drv;
3460 int ret;
c8f6d58e 3461
362b3786 3462 assert(child->perm & BLK_PERM_RESIZE);
c8f6d58e 3463
5a612c00 3464 /* if bs->drv == NULL, bs is closed, so there's nothing to do here */
ed3d2ec9
HR
3465 if (!drv) {
3466 error_setg(errp, "No medium inserted");
71d0770c 3467 return -ENOMEDIUM;
ed3d2ec9
HR
3468 }
3469 if (!drv->bdrv_truncate) {
5a612c00
MP
3470 if (bs->file && drv->is_filter) {
3471 return bdrv_truncate(bs->file, offset, prealloc, errp);
3472 }
ed3d2ec9 3473 error_setg(errp, "Image format driver does not support resize");
61007b31 3474 return -ENOTSUP;
ed3d2ec9
HR
3475 }
3476 if (bs->read_only) {
3477 error_setg(errp, "Image is read-only");
61007b31 3478 return -EACCES;
ed3d2ec9 3479 }
71d0770c 3480
504c205a
DL
3481 assert(!(bs->open_flags & BDRV_O_INACTIVE));
3482
7ea37c30 3483 ret = drv->bdrv_truncate(bs, offset, prealloc, errp);
61007b31
SH
3484 if (ret == 0) {
3485 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
3486 bdrv_dirty_bitmap_truncate(bs);
5c8cab48 3487 bdrv_parent_cb_resize(bs);
47fec599 3488 atomic_inc(&bs->write_gen);
c0191e76 3489 }
61007b31 3490 return ret;
71d0770c
AL
3491}
3492
61007b31
SH
3493/**
3494 * Length of a allocated file in bytes. Sparse files are counted by actual
3495 * allocated space. Return < 0 if error or unknown.
3496 */
3497int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 3498{
61007b31
SH
3499 BlockDriver *drv = bs->drv;
3500 if (!drv) {
3501 return -ENOMEDIUM;
8f4754ed 3502 }
61007b31
SH
3503 if (drv->bdrv_get_allocated_file_size) {
3504 return drv->bdrv_get_allocated_file_size(bs);
3505 }
3506 if (bs->file) {
9a4f4c31 3507 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 3508 }
61007b31 3509 return -ENOTSUP;
1c9805a3 3510}
e7a8a783 3511
90880ff1
SH
3512/*
3513 * bdrv_measure:
3514 * @drv: Format driver
3515 * @opts: Creation options for new image
3516 * @in_bs: Existing image containing data for new image (may be NULL)
3517 * @errp: Error object
3518 * Returns: A #BlockMeasureInfo (free using qapi_free_BlockMeasureInfo())
3519 * or NULL on error
3520 *
3521 * Calculate file size required to create a new image.
3522 *
3523 * If @in_bs is given then space for allocated clusters and zero clusters
3524 * from that image are included in the calculation. If @opts contains a
3525 * backing file that is shared by @in_bs then backing clusters may be omitted
3526 * from the calculation.
3527 *
3528 * If @in_bs is NULL then the calculation includes no allocated clusters
3529 * unless a preallocation option is given in @opts.
3530 *
3531 * Note that @in_bs may use a different BlockDriver from @drv.
3532 *
3533 * If an error occurs the @errp pointer is set.
3534 */
3535BlockMeasureInfo *bdrv_measure(BlockDriver *drv, QemuOpts *opts,
3536 BlockDriverState *in_bs, Error **errp)
3537{
3538 if (!drv->bdrv_measure) {
3539 error_setg(errp, "Block driver '%s' does not support size measurement",
3540 drv->format_name);
3541 return NULL;
3542 }
3543
3544 return drv->bdrv_measure(opts, in_bs, errp);
3545}
3546
61007b31
SH
3547/**
3548 * Return number of sectors on success, -errno on error.
1c9805a3 3549 */
61007b31 3550int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 3551{
61007b31 3552 BlockDriver *drv = bs->drv;
498e386c 3553
61007b31
SH
3554 if (!drv)
3555 return -ENOMEDIUM;
2572b37a 3556
61007b31
SH
3557 if (drv->has_variable_length) {
3558 int ret = refresh_total_sectors(bs, bs->total_sectors);
3559 if (ret < 0) {
3560 return ret;
1c9805a3
SH
3561 }
3562 }
61007b31 3563 return bs->total_sectors;
1c9805a3 3564}
b338082b 3565
61007b31
SH
3566/**
3567 * Return length in bytes on success, -errno on error.
3568 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 3569 */
61007b31 3570int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 3571{
61007b31 3572 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 3573
4a9c9ea0 3574 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 3575 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
3576}
3577
61007b31
SH
3578/* return 0 as number of sectors if no device present or error */
3579void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 3580{
61007b31 3581 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 3582
61007b31 3583 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
3584}
3585
54115412 3586bool bdrv_is_sg(BlockDriverState *bs)
f08145fe 3587{
61007b31 3588 return bs->sg;
f08145fe
KW
3589}
3590
54115412 3591bool bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 3592{
760e0063 3593 if (bs->backing && bs->backing->bs->encrypted) {
54115412 3594 return true;
760e0063 3595 }
61007b31 3596 return bs->encrypted;
fc3959e4
FZ
3597}
3598
61007b31 3599const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 3600{
61007b31 3601 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
3602}
3603
61007b31 3604static int qsort_strcmp(const void *a, const void *b)
40b4f539 3605{
ceff5bd7 3606 return strcmp(*(char *const *)a, *(char *const *)b);
40b4f539
KW
3607}
3608
61007b31
SH
3609void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
3610 void *opaque)
40b4f539 3611{
61007b31
SH
3612 BlockDriver *drv;
3613 int count = 0;
3614 int i;
3615 const char **formats = NULL;
40b4f539 3616
61007b31
SH
3617 QLIST_FOREACH(drv, &bdrv_drivers, list) {
3618 if (drv->format_name) {
3619 bool found = false;
3620 int i = count;
3621 while (formats && i && !found) {
3622 found = !strcmp(formats[--i], drv->format_name);
3623 }
e2a305fb 3624
61007b31
SH
3625 if (!found) {
3626 formats = g_renew(const char *, formats, count + 1);
3627 formats[count++] = drv->format_name;
3628 }
6c5a42ac 3629 }
61007b31 3630 }
6c5a42ac 3631
eb0df69f
HR
3632 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); i++) {
3633 const char *format_name = block_driver_modules[i].format_name;
3634
3635 if (format_name) {
3636 bool found = false;
3637 int j = count;
3638
3639 while (formats && j && !found) {
3640 found = !strcmp(formats[--j], format_name);
3641 }
3642
3643 if (!found) {
3644 formats = g_renew(const char *, formats, count + 1);
3645 formats[count++] = format_name;
3646 }
3647 }
3648 }
3649
61007b31 3650 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 3651
61007b31
SH
3652 for (i = 0; i < count; i++) {
3653 it(opaque, formats[i]);
3654 }
40b4f539 3655
61007b31
SH
3656 g_free(formats);
3657}
40b4f539 3658
61007b31
SH
3659/* This function is to find a node in the bs graph */
3660BlockDriverState *bdrv_find_node(const char *node_name)
3661{
3662 BlockDriverState *bs;
391827eb 3663
61007b31 3664 assert(node_name);
40b4f539 3665
61007b31
SH
3666 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
3667 if (!strcmp(node_name, bs->node_name)) {
3668 return bs;
40b4f539
KW
3669 }
3670 }
61007b31 3671 return NULL;
40b4f539
KW
3672}
3673
61007b31
SH
3674/* Put this QMP function here so it can access the static graph_bdrv_states. */
3675BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 3676{
61007b31
SH
3677 BlockDeviceInfoList *list, *entry;
3678 BlockDriverState *bs;
40b4f539 3679
61007b31
SH
3680 list = NULL;
3681 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
c83f9fba 3682 BlockDeviceInfo *info = bdrv_block_device_info(NULL, bs, errp);
61007b31
SH
3683 if (!info) {
3684 qapi_free_BlockDeviceInfoList(list);
3685 return NULL;
301db7c2 3686 }
61007b31
SH
3687 entry = g_malloc0(sizeof(*entry));
3688 entry->value = info;
3689 entry->next = list;
3690 list = entry;
301db7c2
RH
3691 }
3692
61007b31
SH
3693 return list;
3694}
40b4f539 3695
61007b31
SH
3696BlockDriverState *bdrv_lookup_bs(const char *device,
3697 const char *node_name,
3698 Error **errp)
3699{
3700 BlockBackend *blk;
3701 BlockDriverState *bs;
40b4f539 3702
61007b31
SH
3703 if (device) {
3704 blk = blk_by_name(device);
40b4f539 3705
61007b31 3706 if (blk) {
9f4ed6fb
AG
3707 bs = blk_bs(blk);
3708 if (!bs) {
5433c24f 3709 error_setg(errp, "Device '%s' has no medium", device);
5433c24f
HR
3710 }
3711
9f4ed6fb 3712 return bs;
61007b31
SH
3713 }
3714 }
40b4f539 3715
61007b31
SH
3716 if (node_name) {
3717 bs = bdrv_find_node(node_name);
6d519a5f 3718
61007b31
SH
3719 if (bs) {
3720 return bs;
3721 }
40b4f539
KW
3722 }
3723
61007b31
SH
3724 error_setg(errp, "Cannot find device=%s nor node_name=%s",
3725 device ? device : "",
3726 node_name ? node_name : "");
3727 return NULL;
40b4f539
KW
3728}
3729
61007b31
SH
3730/* If 'base' is in the same chain as 'top', return true. Otherwise,
3731 * return false. If either argument is NULL, return false. */
3732bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 3733{
61007b31 3734 while (top && top != base) {
760e0063 3735 top = backing_bs(top);
02c50efe 3736 }
61007b31
SH
3737
3738 return top != NULL;
02c50efe
FZ
3739}
3740
61007b31 3741BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 3742{
61007b31
SH
3743 if (!bs) {
3744 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 3745 }
61007b31 3746 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
3747}
3748
61007b31 3749const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 3750{
61007b31 3751 return bs->node_name;
beac80cd
FB
3752}
3753
1f0c461b 3754const char *bdrv_get_parent_name(const BlockDriverState *bs)
4c265bf9
KW
3755{
3756 BdrvChild *c;
3757 const char *name;
3758
3759 /* If multiple parents have a name, just pick the first one. */
3760 QLIST_FOREACH(c, &bs->parents, next_parent) {
3761 if (c->role->get_name) {
3762 name = c->role->get_name(c);
3763 if (name && *name) {
3764 return name;
3765 }
3766 }
3767 }
3768
3769 return NULL;
3770}
3771
61007b31
SH
3772/* TODO check what callers really want: bs->node_name or blk_name() */
3773const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 3774{
4c265bf9 3775 return bdrv_get_parent_name(bs) ?: "";
f141eafe 3776}
83f64091 3777
61007b31
SH
3778/* This can be used to identify nodes that might not have a device
3779 * name associated. Since node and device names live in the same
3780 * namespace, the result is unambiguous. The exception is if both are
3781 * absent, then this returns an empty (non-null) string. */
3782const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 3783{
4c265bf9 3784 return bdrv_get_parent_name(bs) ?: bs->node_name;
beac80cd 3785}
beac80cd 3786
61007b31 3787int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 3788{
61007b31 3789 return bs->open_flags;
0b5a2445
PB
3790}
3791
61007b31 3792int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 3793{
61007b31 3794 return 1;
0b5a2445
PB
3795}
3796
61007b31 3797int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 3798{
61007b31 3799 assert(bs->drv);
0b5a2445 3800
61007b31
SH
3801 /* If BS is a copy on write image, it is initialized to
3802 the contents of the base image, which may not be zeroes. */
760e0063 3803 if (bs->backing) {
61007b31
SH
3804 return 0;
3805 }
3806 if (bs->drv->bdrv_has_zero_init) {
3807 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 3808 }
5a612c00
MP
3809 if (bs->file && bs->drv->is_filter) {
3810 return bdrv_has_zero_init(bs->file->bs);
3811 }
61007b31
SH
3812
3813 /* safe default */
3814 return 0;
68485420
KW
3815}
3816
61007b31 3817bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 3818{
61007b31 3819 BlockDriverInfo bdi;
b2a61371 3820
760e0063 3821 if (bs->backing) {
61007b31
SH
3822 return false;
3823 }
3824
3825 if (bdrv_get_info(bs, &bdi) == 0) {
3826 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
3827 }
3828
61007b31 3829 return false;
b2a61371
SH
3830}
3831
61007b31 3832bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 3833{
61007b31 3834 BlockDriverInfo bdi;
68485420 3835
2f0342ef 3836 if (!(bs->open_flags & BDRV_O_UNMAP)) {
61007b31
SH
3837 return false;
3838 }
68485420 3839
61007b31
SH
3840 if (bdrv_get_info(bs, &bdi) == 0) {
3841 return bdi.can_write_zeroes_with_unmap;
3842 }
68485420 3843
61007b31 3844 return false;
68485420
KW
3845}
3846
61007b31 3847const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 3848{
760e0063 3849 if (bs->backing && bs->backing->bs->encrypted)
61007b31
SH
3850 return bs->backing_file;
3851 else if (bs->encrypted)
3852 return bs->filename;
3853 else
3854 return NULL;
b2e12bc6
CH
3855}
3856
61007b31
SH
3857void bdrv_get_backing_filename(BlockDriverState *bs,
3858 char *filename, int filename_size)
016f5cf6 3859{
61007b31
SH
3860 pstrcpy(filename, filename_size, bs->backing_file);
3861}
d318aea9 3862
61007b31
SH
3863int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
3864{
3865 BlockDriver *drv = bs->drv;
5a612c00
MP
3866 /* if bs->drv == NULL, bs is closed, so there's nothing to do here */
3867 if (!drv) {
61007b31 3868 return -ENOMEDIUM;
5a612c00
MP
3869 }
3870 if (!drv->bdrv_get_info) {
3871 if (bs->file && drv->is_filter) {
3872 return bdrv_get_info(bs->file->bs, bdi);
3873 }
61007b31 3874 return -ENOTSUP;
5a612c00 3875 }
61007b31
SH
3876 memset(bdi, 0, sizeof(*bdi));
3877 return drv->bdrv_get_info(bs, bdi);
3878}
016f5cf6 3879
61007b31
SH
3880ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
3881{
3882 BlockDriver *drv = bs->drv;
3883 if (drv && drv->bdrv_get_specific_info) {
3884 return drv->bdrv_get_specific_info(bs);
3885 }
3886 return NULL;
016f5cf6
AG
3887}
3888
a31939e6 3889void bdrv_debug_event(BlockDriverState *bs, BlkdebugEvent event)
4265d620 3890{
61007b31
SH
3891 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
3892 return;
3893 }
4265d620 3894
61007b31 3895 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
3896}
3897
61007b31
SH
3898int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
3899 const char *tag)
4265d620 3900{
61007b31 3901 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 3902 bs = bs->file ? bs->file->bs : NULL;
61007b31 3903 }
4265d620 3904
61007b31
SH
3905 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
3906 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
3907 }
4265d620 3908
61007b31 3909 return -ENOTSUP;
4265d620
PB
3910}
3911
61007b31 3912int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 3913{
61007b31 3914 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 3915 bs = bs->file ? bs->file->bs : NULL;
61007b31 3916 }
ce1a14dc 3917
61007b31
SH
3918 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
3919 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
3920 }
3921
3922 return -ENOTSUP;
eb852011
MA
3923}
3924
61007b31 3925int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 3926{
61007b31 3927 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 3928 bs = bs->file ? bs->file->bs : NULL;
61007b31 3929 }
ce1a14dc 3930
61007b31
SH
3931 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
3932 return bs->drv->bdrv_debug_resume(bs, tag);
3933 }
ce1a14dc 3934
61007b31 3935 return -ENOTSUP;
f197fe2b
FZ
3936}
3937
61007b31 3938bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 3939{
61007b31 3940 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 3941 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 3942 }
19cb3738 3943
61007b31
SH
3944 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
3945 return bs->drv->bdrv_debug_is_suspended(bs, tag);
3946 }
f9f05dc5 3947
61007b31
SH
3948 return false;
3949}
f9f05dc5 3950
61007b31
SH
3951/* backing_file can either be relative, or absolute, or a protocol. If it is
3952 * relative, it must be relative to the chain. So, passing in bs->filename
3953 * from a BDS as backing_file should not be done, as that may be relative to
3954 * the CWD rather than the chain. */
3955BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
3956 const char *backing_file)
f9f05dc5 3957{
61007b31
SH
3958 char *filename_full = NULL;
3959 char *backing_file_full = NULL;
3960 char *filename_tmp = NULL;
3961 int is_protocol = 0;
3962 BlockDriverState *curr_bs = NULL;
3963 BlockDriverState *retval = NULL;
418661e0 3964 Error *local_error = NULL;
f9f05dc5 3965
61007b31
SH
3966 if (!bs || !bs->drv || !backing_file) {
3967 return NULL;
f9f05dc5
KW
3968 }
3969
61007b31
SH
3970 filename_full = g_malloc(PATH_MAX);
3971 backing_file_full = g_malloc(PATH_MAX);
3972 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 3973
61007b31 3974 is_protocol = path_has_protocol(backing_file);
f9f05dc5 3975
760e0063 3976 for (curr_bs = bs; curr_bs->backing; curr_bs = curr_bs->backing->bs) {
f9f05dc5 3977
61007b31
SH
3978 /* If either of the filename paths is actually a protocol, then
3979 * compare unmodified paths; otherwise make paths relative */
3980 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
3981 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
760e0063 3982 retval = curr_bs->backing->bs;
61007b31
SH
3983 break;
3984 }
418661e0
JC
3985 /* Also check against the full backing filename for the image */
3986 bdrv_get_full_backing_filename(curr_bs, backing_file_full, PATH_MAX,
3987 &local_error);
3988 if (local_error == NULL) {
3989 if (strcmp(backing_file, backing_file_full) == 0) {
3990 retval = curr_bs->backing->bs;
3991 break;
3992 }
3993 } else {
3994 error_free(local_error);
3995 local_error = NULL;
3996 }
61007b31
SH
3997 } else {
3998 /* If not an absolute filename path, make it relative to the current
3999 * image's filename path */
4000 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
4001 backing_file);
f9f05dc5 4002
61007b31
SH
4003 /* We are going to compare absolute pathnames */
4004 if (!realpath(filename_tmp, filename_full)) {
4005 continue;
4006 }
07f07615 4007
61007b31
SH
4008 /* We need to make sure the backing filename we are comparing against
4009 * is relative to the current image filename (or absolute) */
4010 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
4011 curr_bs->backing_file);
07f07615 4012
61007b31
SH
4013 if (!realpath(filename_tmp, backing_file_full)) {
4014 continue;
4015 }
eb489bb1 4016
61007b31 4017 if (strcmp(backing_file_full, filename_full) == 0) {
760e0063 4018 retval = curr_bs->backing->bs;
61007b31
SH
4019 break;
4020 }
4021 }
eb489bb1
KW
4022 }
4023
61007b31
SH
4024 g_free(filename_full);
4025 g_free(backing_file_full);
4026 g_free(filename_tmp);
4027 return retval;
4028}
4029
61007b31
SH
4030void bdrv_init(void)
4031{
4032 module_call_init(MODULE_INIT_BLOCK);
4033}
29cdb251 4034
61007b31
SH
4035void bdrv_init_with_whitelist(void)
4036{
4037 use_bdrv_whitelist = 1;
4038 bdrv_init();
07f07615
PB
4039}
4040
5a8a30db 4041void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 4042{
4417ab7a 4043 BdrvChild *child, *parent;
9c5e6594 4044 uint64_t perm, shared_perm;
5a8a30db
KW
4045 Error *local_err = NULL;
4046 int ret;
4047
3456a8d1
KW
4048 if (!bs->drv) {
4049 return;
4050 }
4051
04c01a5c 4052 if (!(bs->open_flags & BDRV_O_INACTIVE)) {
7ea2d269
AK
4053 return;
4054 }
7ea2d269 4055
16e977d5
VSO
4056 QLIST_FOREACH(child, &bs->children, next) {
4057 bdrv_invalidate_cache(child->bs, &local_err);
0d1c5c91 4058 if (local_err) {
0d1c5c91
FZ
4059 error_propagate(errp, local_err);
4060 return;
4061 }
5a8a30db 4062 }
0d1c5c91 4063
16e977d5
VSO
4064 bs->open_flags &= ~BDRV_O_INACTIVE;
4065 if (bs->drv->bdrv_invalidate_cache) {
4066 bs->drv->bdrv_invalidate_cache(bs, &local_err);
0d1c5c91
FZ
4067 if (local_err) {
4068 bs->open_flags |= BDRV_O_INACTIVE;
4069 error_propagate(errp, local_err);
4070 return;
4071 }
0f15423c 4072 }
3456a8d1 4073
5a8a30db
KW
4074 ret = refresh_total_sectors(bs, bs->total_sectors);
4075 if (ret < 0) {
04c01a5c 4076 bs->open_flags |= BDRV_O_INACTIVE;
5a8a30db
KW
4077 error_setg_errno(errp, -ret, "Could not refresh total sector count");
4078 return;
4079 }
4417ab7a 4080
9c5e6594
KW
4081 /* Update permissions, they may differ for inactive nodes */
4082 bdrv_get_cumulative_perm(bs, &perm, &shared_perm);
3121fb45 4083 ret = bdrv_check_perm(bs, NULL, perm, shared_perm, NULL, &local_err);
9c5e6594
KW
4084 if (ret < 0) {
4085 bs->open_flags |= BDRV_O_INACTIVE;
4086 error_propagate(errp, local_err);
4087 return;
4088 }
4089 bdrv_set_perm(bs, perm, shared_perm);
4090
4417ab7a
KW
4091 QLIST_FOREACH(parent, &bs->parents, next_parent) {
4092 if (parent->role->activate) {
4093 parent->role->activate(parent, &local_err);
4094 if (local_err) {
4095 error_propagate(errp, local_err);
4096 return;
4097 }
4098 }
4099 }
0f15423c
AL
4100}
4101
5a8a30db 4102void bdrv_invalidate_cache_all(Error **errp)
0f15423c 4103{
7c8eece4 4104 BlockDriverState *bs;
5a8a30db 4105 Error *local_err = NULL;
88be7b4b 4106 BdrvNextIterator it;
0f15423c 4107
88be7b4b 4108 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
ed78cda3
SH
4109 AioContext *aio_context = bdrv_get_aio_context(bs);
4110
4111 aio_context_acquire(aio_context);
5a8a30db 4112 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 4113 aio_context_release(aio_context);
5a8a30db
KW
4114 if (local_err) {
4115 error_propagate(errp, local_err);
4116 return;
4117 }
0f15423c
AL
4118 }
4119}
4120
aad0b7a0
FZ
4121static int bdrv_inactivate_recurse(BlockDriverState *bs,
4122 bool setting_flag)
76b1c7fe 4123{
cfa1a572 4124 BdrvChild *child, *parent;
76b1c7fe
KW
4125 int ret;
4126
aad0b7a0 4127 if (!setting_flag && bs->drv->bdrv_inactivate) {
76b1c7fe
KW
4128 ret = bs->drv->bdrv_inactivate(bs);
4129 if (ret < 0) {
4130 return ret;
4131 }
4132 }
4133
7d5b5261 4134 if (setting_flag && !(bs->open_flags & BDRV_O_INACTIVE)) {
9c5e6594
KW
4135 uint64_t perm, shared_perm;
4136
cfa1a572
KW
4137 QLIST_FOREACH(parent, &bs->parents, next_parent) {
4138 if (parent->role->inactivate) {
4139 ret = parent->role->inactivate(parent);
4140 if (ret < 0) {
cfa1a572
KW
4141 return ret;
4142 }
4143 }
4144 }
9c5e6594 4145
7d5b5261
SH
4146 bs->open_flags |= BDRV_O_INACTIVE;
4147
9c5e6594
KW
4148 /* Update permissions, they may differ for inactive nodes */
4149 bdrv_get_cumulative_perm(bs, &perm, &shared_perm);
3121fb45 4150 bdrv_check_perm(bs, NULL, perm, shared_perm, NULL, &error_abort);
9c5e6594 4151 bdrv_set_perm(bs, perm, shared_perm);
aad0b7a0 4152 }
38701b6a
KW
4153
4154 QLIST_FOREACH(child, &bs->children, next) {
4155 ret = bdrv_inactivate_recurse(child->bs, setting_flag);
4156 if (ret < 0) {
4157 return ret;
4158 }
4159 }
4160
615b5dcf
VSO
4161 /* At this point persistent bitmaps should be already stored by the format
4162 * driver */
4163 bdrv_release_persistent_dirty_bitmaps(bs);
4164
76b1c7fe
KW
4165 return 0;
4166}
4167
4168int bdrv_inactivate_all(void)
4169{
79720af6 4170 BlockDriverState *bs = NULL;
88be7b4b 4171 BdrvNextIterator it;
aad0b7a0
FZ
4172 int ret = 0;
4173 int pass;
76b1c7fe 4174
88be7b4b 4175 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
4176 aio_context_acquire(bdrv_get_aio_context(bs));
4177 }
76b1c7fe 4178
aad0b7a0
FZ
4179 /* We do two passes of inactivation. The first pass calls to drivers'
4180 * .bdrv_inactivate callbacks recursively so all cache is flushed to disk;
4181 * the second pass sets the BDRV_O_INACTIVE flag so that no further write
4182 * is allowed. */
4183 for (pass = 0; pass < 2; pass++) {
88be7b4b 4184 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
4185 ret = bdrv_inactivate_recurse(bs, pass);
4186 if (ret < 0) {
4187 goto out;
4188 }
76b1c7fe
KW
4189 }
4190 }
4191
aad0b7a0 4192out:
88be7b4b 4193 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
4194 aio_context_release(bdrv_get_aio_context(bs));
4195 }
4196
4197 return ret;
76b1c7fe
KW
4198}
4199
19cb3738
FB
4200/**************************************************************/
4201/* removable device support */
4202
4203/**
4204 * Return TRUE if the media is present
4205 */
e031f750 4206bool bdrv_is_inserted(BlockDriverState *bs)
19cb3738
FB
4207{
4208 BlockDriver *drv = bs->drv;
28d7a789 4209 BdrvChild *child;
a1aff5bf 4210
e031f750
HR
4211 if (!drv) {
4212 return false;
4213 }
28d7a789
HR
4214 if (drv->bdrv_is_inserted) {
4215 return drv->bdrv_is_inserted(bs);
4216 }
4217 QLIST_FOREACH(child, &bs->children, next) {
4218 if (!bdrv_is_inserted(child->bs)) {
4219 return false;
4220 }
e031f750 4221 }
28d7a789 4222 return true;
19cb3738
FB
4223}
4224
19cb3738
FB
4225/**
4226 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
4227 */
f36f3949 4228void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
4229{
4230 BlockDriver *drv = bs->drv;
19cb3738 4231
822e1cd1
MA
4232 if (drv && drv->bdrv_eject) {
4233 drv->bdrv_eject(bs, eject_flag);
19cb3738
FB
4234 }
4235}
4236
19cb3738
FB
4237/**
4238 * Lock or unlock the media (if it is locked, the user won't be able
4239 * to eject it manually).
4240 */
025e849a 4241void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
4242{
4243 BlockDriver *drv = bs->drv;
4244
025e849a 4245 trace_bdrv_lock_medium(bs, locked);
b8c6d095 4246
025e849a
MA
4247 if (drv && drv->bdrv_lock_medium) {
4248 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
4249 }
4250}
985a03b0 4251
9fcb0251
FZ
4252/* Get a reference to bs */
4253void bdrv_ref(BlockDriverState *bs)
4254{
4255 bs->refcnt++;
4256}
4257
4258/* Release a previously grabbed reference to bs.
4259 * If after releasing, reference count is zero, the BlockDriverState is
4260 * deleted. */
4261void bdrv_unref(BlockDriverState *bs)
4262{
9a4d5ca6
JC
4263 if (!bs) {
4264 return;
4265 }
9fcb0251
FZ
4266 assert(bs->refcnt > 0);
4267 if (--bs->refcnt == 0) {
4268 bdrv_delete(bs);
4269 }
4270}
4271
fbe40ff7
FZ
4272struct BdrvOpBlocker {
4273 Error *reason;
4274 QLIST_ENTRY(BdrvOpBlocker) list;
4275};
4276
4277bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
4278{
4279 BdrvOpBlocker *blocker;
4280 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4281 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
4282 blocker = QLIST_FIRST(&bs->op_blockers[op]);
57ef3f12
EH
4283 error_propagate(errp, error_copy(blocker->reason));
4284 error_prepend(errp, "Node '%s' is busy: ",
4285 bdrv_get_device_or_node_name(bs));
fbe40ff7
FZ
4286 return true;
4287 }
4288 return false;
4289}
4290
4291void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
4292{
4293 BdrvOpBlocker *blocker;
4294 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4295
5839e53b 4296 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
4297 blocker->reason = reason;
4298 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
4299}
4300
4301void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
4302{
4303 BdrvOpBlocker *blocker, *next;
4304 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4305 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
4306 if (blocker->reason == reason) {
4307 QLIST_REMOVE(blocker, list);
4308 g_free(blocker);
4309 }
4310 }
4311}
4312
4313void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
4314{
4315 int i;
4316 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4317 bdrv_op_block(bs, i, reason);
4318 }
4319}
4320
4321void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
4322{
4323 int i;
4324 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4325 bdrv_op_unblock(bs, i, reason);
4326 }
4327}
4328
4329bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
4330{
4331 int i;
4332
4333 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4334 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
4335 return false;
4336 }
4337 }
4338 return true;
4339}
4340
d92ada22
LC
4341void bdrv_img_create(const char *filename, const char *fmt,
4342 const char *base_filename, const char *base_fmt,
9217283d
FZ
4343 char *options, uint64_t img_size, int flags, bool quiet,
4344 Error **errp)
f88e1a42 4345{
83d0521a
CL
4346 QemuOptsList *create_opts = NULL;
4347 QemuOpts *opts = NULL;
4348 const char *backing_fmt, *backing_file;
4349 int64_t size;
f88e1a42 4350 BlockDriver *drv, *proto_drv;
cc84d90f 4351 Error *local_err = NULL;
f88e1a42
JS
4352 int ret = 0;
4353
4354 /* Find driver and parse its options */
4355 drv = bdrv_find_format(fmt);
4356 if (!drv) {
71c79813 4357 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 4358 return;
f88e1a42
JS
4359 }
4360
b65a5e12 4361 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 4362 if (!proto_drv) {
d92ada22 4363 return;
f88e1a42
JS
4364 }
4365
c6149724
HR
4366 if (!drv->create_opts) {
4367 error_setg(errp, "Format driver '%s' does not support image creation",
4368 drv->format_name);
4369 return;
4370 }
4371
4372 if (!proto_drv->create_opts) {
4373 error_setg(errp, "Protocol driver '%s' does not support image creation",
4374 proto_drv->format_name);
4375 return;
4376 }
4377
c282e1fd
CL
4378 create_opts = qemu_opts_append(create_opts, drv->create_opts);
4379 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
4380
4381 /* Create parameter list with default values */
83d0521a 4382 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 4383 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
4384
4385 /* Parse -o options */
4386 if (options) {
dc523cd3
MA
4387 qemu_opts_do_parse(opts, options, NULL, &local_err);
4388 if (local_err) {
4389 error_report_err(local_err);
4390 local_err = NULL;
83d0521a 4391 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
4392 goto out;
4393 }
4394 }
4395
4396 if (base_filename) {
f43e47db 4397 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 4398 if (local_err) {
71c79813
LC
4399 error_setg(errp, "Backing file not supported for file format '%s'",
4400 fmt);
f88e1a42
JS
4401 goto out;
4402 }
4403 }
4404
4405 if (base_fmt) {
f43e47db 4406 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 4407 if (local_err) {
71c79813
LC
4408 error_setg(errp, "Backing file format not supported for file "
4409 "format '%s'", fmt);
f88e1a42
JS
4410 goto out;
4411 }
4412 }
4413
83d0521a
CL
4414 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
4415 if (backing_file) {
4416 if (!strcmp(filename, backing_file)) {
71c79813
LC
4417 error_setg(errp, "Error: Trying to create an image with the "
4418 "same filename as the backing file");
792da93a
JS
4419 goto out;
4420 }
4421 }
4422
83d0521a 4423 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42 4424
6e6e55f5
JS
4425 /* The size for the image must always be specified, unless we have a backing
4426 * file and we have not been forbidden from opening it. */
83d0521a 4427 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
6e6e55f5
JS
4428 if (backing_file && !(flags & BDRV_O_NO_BACKING)) {
4429 BlockDriverState *bs;
4430 char *full_backing = g_new0(char, PATH_MAX);
4431 int back_flags;
4432 QDict *backing_options = NULL;
4433
4434 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
4435 full_backing, PATH_MAX,
4436 &local_err);
4437 if (local_err) {
4438 g_free(full_backing);
4439 goto out;
4440 }
29168018 4441
6e6e55f5
JS
4442 /* backing files always opened read-only */
4443 back_flags = flags;
4444 back_flags &= ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 4445
6e6e55f5
JS
4446 if (backing_fmt) {
4447 backing_options = qdict_new();
4448 qdict_put_str(backing_options, "driver", backing_fmt);
4449 }
e6641719 4450
6e6e55f5
JS
4451 bs = bdrv_open(full_backing, NULL, backing_options, back_flags,
4452 &local_err);
4453 g_free(full_backing);
4454 if (!bs && size != -1) {
4455 /* Couldn't open BS, but we have a size, so it's nonfatal */
4456 warn_reportf_err(local_err,
4457 "Could not verify backing image. "
4458 "This may become an error in future versions.\n");
4459 local_err = NULL;
4460 } else if (!bs) {
4461 /* Couldn't open bs, do not have size */
4462 error_append_hint(&local_err,
4463 "Could not open backing image to determine size.\n");
4464 goto out;
4465 } else {
4466 if (size == -1) {
4467 /* Opened BS, have no size */
4468 size = bdrv_getlength(bs);
4469 if (size < 0) {
4470 error_setg_errno(errp, -size, "Could not get size of '%s'",
4471 backing_file);
4472 bdrv_unref(bs);
4473 goto out;
4474 }
4475 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
52bf1e72 4476 }
66f6b814 4477 bdrv_unref(bs);
f88e1a42 4478 }
6e6e55f5
JS
4479 } /* (backing_file && !(flags & BDRV_O_NO_BACKING)) */
4480
4481 if (size == -1) {
4482 error_setg(errp, "Image creation needs a size parameter");
4483 goto out;
f88e1a42
JS
4484 }
4485
f382d43a 4486 if (!quiet) {
fe646693 4487 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 4488 qemu_opts_print(opts, " ");
f382d43a
MR
4489 puts("");
4490 }
83d0521a 4491
c282e1fd 4492 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 4493
cc84d90f
HR
4494 if (ret == -EFBIG) {
4495 /* This is generally a better message than whatever the driver would
4496 * deliver (especially because of the cluster_size_hint), since that
4497 * is most probably not much different from "image too large". */
4498 const char *cluster_size_hint = "";
83d0521a 4499 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 4500 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 4501 }
cc84d90f
HR
4502 error_setg(errp, "The image size is too large for file format '%s'"
4503 "%s", fmt, cluster_size_hint);
4504 error_free(local_err);
4505 local_err = NULL;
f88e1a42
JS
4506 }
4507
4508out:
83d0521a
CL
4509 qemu_opts_del(opts);
4510 qemu_opts_free(create_opts);
621ff94d 4511 error_propagate(errp, local_err);
f88e1a42 4512}
85d126f3
SH
4513
4514AioContext *bdrv_get_aio_context(BlockDriverState *bs)
4515{
dcd04228
SH
4516 return bs->aio_context;
4517}
4518
052a7572
FZ
4519void bdrv_coroutine_enter(BlockDriverState *bs, Coroutine *co)
4520{
4521 aio_co_enter(bdrv_get_aio_context(bs), co);
4522}
4523
e8a095da
SH
4524static void bdrv_do_remove_aio_context_notifier(BdrvAioNotifier *ban)
4525{
4526 QLIST_REMOVE(ban, list);
4527 g_free(ban);
4528}
4529
dcd04228
SH
4530void bdrv_detach_aio_context(BlockDriverState *bs)
4531{
e8a095da 4532 BdrvAioNotifier *baf, *baf_tmp;
b97511c7 4533 BdrvChild *child;
33384421 4534
dcd04228
SH
4535 if (!bs->drv) {
4536 return;
4537 }
4538
e8a095da
SH
4539 assert(!bs->walking_aio_notifiers);
4540 bs->walking_aio_notifiers = true;
4541 QLIST_FOREACH_SAFE(baf, &bs->aio_notifiers, list, baf_tmp) {
4542 if (baf->deleted) {
4543 bdrv_do_remove_aio_context_notifier(baf);
4544 } else {
4545 baf->detach_aio_context(baf->opaque);
4546 }
33384421 4547 }
e8a095da
SH
4548 /* Never mind iterating again to check for ->deleted. bdrv_close() will
4549 * remove remaining aio notifiers if we aren't called again.
4550 */
4551 bs->walking_aio_notifiers = false;
33384421 4552
dcd04228
SH
4553 if (bs->drv->bdrv_detach_aio_context) {
4554 bs->drv->bdrv_detach_aio_context(bs);
4555 }
b97511c7
HR
4556 QLIST_FOREACH(child, &bs->children, next) {
4557 bdrv_detach_aio_context(child->bs);
dcd04228
SH
4558 }
4559
4560 bs->aio_context = NULL;
4561}
4562
4563void bdrv_attach_aio_context(BlockDriverState *bs,
4564 AioContext *new_context)
4565{
e8a095da 4566 BdrvAioNotifier *ban, *ban_tmp;
b97511c7 4567 BdrvChild *child;
33384421 4568
dcd04228
SH
4569 if (!bs->drv) {
4570 return;
4571 }
4572
4573 bs->aio_context = new_context;
4574
b97511c7
HR
4575 QLIST_FOREACH(child, &bs->children, next) {
4576 bdrv_attach_aio_context(child->bs, new_context);
dcd04228
SH
4577 }
4578 if (bs->drv->bdrv_attach_aio_context) {
4579 bs->drv->bdrv_attach_aio_context(bs, new_context);
4580 }
33384421 4581
e8a095da
SH
4582 assert(!bs->walking_aio_notifiers);
4583 bs->walking_aio_notifiers = true;
4584 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_tmp) {
4585 if (ban->deleted) {
4586 bdrv_do_remove_aio_context_notifier(ban);
4587 } else {
4588 ban->attached_aio_context(new_context, ban->opaque);
4589 }
33384421 4590 }
e8a095da 4591 bs->walking_aio_notifiers = false;
dcd04228
SH
4592}
4593
4594void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
4595{
aabf5910 4596 AioContext *ctx = bdrv_get_aio_context(bs);
c2b6428d 4597
aabf5910
FZ
4598 aio_disable_external(ctx);
4599 bdrv_parent_drained_begin(bs);
53ec73e2 4600 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228 4601
c2b6428d
PB
4602 while (aio_poll(ctx, false)) {
4603 /* wait for all bottom halves to execute */
4604 }
4605
dcd04228
SH
4606 bdrv_detach_aio_context(bs);
4607
4608 /* This function executes in the old AioContext so acquire the new one in
4609 * case it runs in a different thread.
4610 */
4611 aio_context_acquire(new_context);
4612 bdrv_attach_aio_context(bs, new_context);
aabf5910
FZ
4613 bdrv_parent_drained_end(bs);
4614 aio_enable_external(ctx);
dcd04228 4615 aio_context_release(new_context);
85d126f3 4616}
d616b224 4617
33384421
HR
4618void bdrv_add_aio_context_notifier(BlockDriverState *bs,
4619 void (*attached_aio_context)(AioContext *new_context, void *opaque),
4620 void (*detach_aio_context)(void *opaque), void *opaque)
4621{
4622 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
4623 *ban = (BdrvAioNotifier){
4624 .attached_aio_context = attached_aio_context,
4625 .detach_aio_context = detach_aio_context,
4626 .opaque = opaque
4627 };
4628
4629 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
4630}
4631
4632void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
4633 void (*attached_aio_context)(AioContext *,
4634 void *),
4635 void (*detach_aio_context)(void *),
4636 void *opaque)
4637{
4638 BdrvAioNotifier *ban, *ban_next;
4639
4640 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
4641 if (ban->attached_aio_context == attached_aio_context &&
4642 ban->detach_aio_context == detach_aio_context &&
e8a095da
SH
4643 ban->opaque == opaque &&
4644 ban->deleted == false)
33384421 4645 {
e8a095da
SH
4646 if (bs->walking_aio_notifiers) {
4647 ban->deleted = true;
4648 } else {
4649 bdrv_do_remove_aio_context_notifier(ban);
4650 }
33384421
HR
4651 return;
4652 }
4653 }
4654
4655 abort();
4656}
4657
77485434 4658int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
8b13976d 4659 BlockDriverAmendStatusCB *status_cb, void *cb_opaque)
6f176b48 4660{
c282e1fd 4661 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
4662 return -ENOTSUP;
4663 }
8b13976d 4664 return bs->drv->bdrv_amend_options(bs, opts, status_cb, cb_opaque);
6f176b48 4665}
f6186f49 4666
b5042a36
BC
4667/* This function will be called by the bdrv_recurse_is_first_non_filter method
4668 * of block filter and by bdrv_is_first_non_filter.
4669 * It is used to test if the given bs is the candidate or recurse more in the
4670 * node graph.
212a5a8f 4671 */
b5042a36 4672bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 4673 BlockDriverState *candidate)
f6186f49 4674{
b5042a36
BC
4675 /* return false if basic checks fails */
4676 if (!bs || !bs->drv) {
212a5a8f 4677 return false;
f6186f49
BC
4678 }
4679
b5042a36
BC
4680 /* the code reached a non block filter driver -> check if the bs is
4681 * the same as the candidate. It's the recursion termination condition.
4682 */
4683 if (!bs->drv->is_filter) {
4684 return bs == candidate;
212a5a8f 4685 }
b5042a36 4686 /* Down this path the driver is a block filter driver */
212a5a8f 4687
b5042a36
BC
4688 /* If the block filter recursion method is defined use it to recurse down
4689 * the node graph.
4690 */
4691 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 4692 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
4693 }
4694
b5042a36
BC
4695 /* the driver is a block filter but don't allow to recurse -> return false
4696 */
4697 return false;
f6186f49
BC
4698}
4699
212a5a8f
BC
4700/* This function checks if the candidate is the first non filter bs down it's
4701 * bs chain. Since we don't have pointers to parents it explore all bs chains
4702 * from the top. Some filters can choose not to pass down the recursion.
4703 */
4704bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 4705{
7c8eece4 4706 BlockDriverState *bs;
88be7b4b 4707 BdrvNextIterator it;
212a5a8f
BC
4708
4709 /* walk down the bs forest recursively */
88be7b4b 4710 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
212a5a8f
BC
4711 bool perm;
4712
b5042a36 4713 /* try to recurse in this top level bs */
e6dc8a1f 4714 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
4715
4716 /* candidate is the first non filter */
4717 if (perm) {
4718 return true;
4719 }
4720 }
4721
4722 return false;
f6186f49 4723}
09158f00 4724
e12f3784
WC
4725BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
4726 const char *node_name, Error **errp)
09158f00
BC
4727{
4728 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
4729 AioContext *aio_context;
4730
09158f00
BC
4731 if (!to_replace_bs) {
4732 error_setg(errp, "Node name '%s' not found", node_name);
4733 return NULL;
4734 }
4735
5a7e7a0b
SH
4736 aio_context = bdrv_get_aio_context(to_replace_bs);
4737 aio_context_acquire(aio_context);
4738
09158f00 4739 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
4740 to_replace_bs = NULL;
4741 goto out;
09158f00
BC
4742 }
4743
4744 /* We don't want arbitrary node of the BDS chain to be replaced only the top
4745 * most non filter in order to prevent data corruption.
4746 * Another benefit is that this tests exclude backing files which are
4747 * blocked by the backing blockers.
4748 */
e12f3784 4749 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 4750 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
4751 to_replace_bs = NULL;
4752 goto out;
09158f00
BC
4753 }
4754
5a7e7a0b
SH
4755out:
4756 aio_context_release(aio_context);
09158f00
BC
4757 return to_replace_bs;
4758}
448ad91d 4759
91af7014
HR
4760static bool append_open_options(QDict *d, BlockDriverState *bs)
4761{
4762 const QDictEntry *entry;
9e700c1a 4763 QemuOptDesc *desc;
260fecf1 4764 BdrvChild *child;
91af7014 4765 bool found_any = false;
260fecf1 4766 const char *p;
91af7014
HR
4767
4768 for (entry = qdict_first(bs->options); entry;
4769 entry = qdict_next(bs->options, entry))
4770 {
260fecf1
KW
4771 /* Exclude options for children */
4772 QLIST_FOREACH(child, &bs->children, next) {
4773 if (strstart(qdict_entry_key(entry), child->name, &p)
4774 && (!*p || *p == '.'))
4775 {
4776 break;
4777 }
4778 }
4779 if (child) {
9e700c1a 4780 continue;
91af7014 4781 }
9e700c1a
KW
4782
4783 /* And exclude all non-driver-specific options */
4784 for (desc = bdrv_runtime_opts.desc; desc->name; desc++) {
4785 if (!strcmp(qdict_entry_key(entry), desc->name)) {
4786 break;
4787 }
4788 }
4789 if (desc->name) {
4790 continue;
4791 }
4792
4793 qobject_incref(qdict_entry_value(entry));
4794 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
4795 found_any = true;
91af7014
HR
4796 }
4797
4798 return found_any;
4799}
4800
4801/* Updates the following BDS fields:
4802 * - exact_filename: A filename which may be used for opening a block device
4803 * which (mostly) equals the given BDS (even without any
4804 * other options; so reading and writing must return the same
4805 * results, but caching etc. may be different)
4806 * - full_open_options: Options which, when given when opening a block device
4807 * (without a filename), result in a BDS (mostly)
4808 * equalling the given one
4809 * - filename: If exact_filename is set, it is copied here. Otherwise,
4810 * full_open_options is converted to a JSON object, prefixed with
4811 * "json:" (for use through the JSON pseudo protocol) and put here.
4812 */
4813void bdrv_refresh_filename(BlockDriverState *bs)
4814{
4815 BlockDriver *drv = bs->drv;
4816 QDict *opts;
4817
4818 if (!drv) {
4819 return;
4820 }
4821
4822 /* This BDS's file name will most probably depend on its file's name, so
4823 * refresh that first */
4824 if (bs->file) {
9a4f4c31 4825 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
4826 }
4827
4828 if (drv->bdrv_refresh_filename) {
4829 /* Obsolete information is of no use here, so drop the old file name
4830 * information before refreshing it */
4831 bs->exact_filename[0] = '\0';
4832 if (bs->full_open_options) {
4833 QDECREF(bs->full_open_options);
4834 bs->full_open_options = NULL;
4835 }
4836
4cdd01d3
KW
4837 opts = qdict_new();
4838 append_open_options(opts, bs);
4839 drv->bdrv_refresh_filename(bs, opts);
4840 QDECREF(opts);
91af7014
HR
4841 } else if (bs->file) {
4842 /* Try to reconstruct valid information from the underlying file */
4843 bool has_open_options;
4844
4845 bs->exact_filename[0] = '\0';
4846 if (bs->full_open_options) {
4847 QDECREF(bs->full_open_options);
4848 bs->full_open_options = NULL;
4849 }
4850
4851 opts = qdict_new();
4852 has_open_options = append_open_options(opts, bs);
4853
4854 /* If no specific options have been given for this BDS, the filename of
4855 * the underlying file should suffice for this one as well */
9a4f4c31
KW
4856 if (bs->file->bs->exact_filename[0] && !has_open_options) {
4857 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
4858 }
4859 /* Reconstructing the full options QDict is simple for most format block
4860 * drivers, as long as the full options are known for the underlying
4861 * file BDS. The full options QDict of that file BDS should somehow
4862 * contain a representation of the filename, therefore the following
4863 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 4864 if (bs->file->bs->full_open_options) {
46f5ac20 4865 qdict_put_str(opts, "driver", drv->format_name);
9a4f4c31 4866 QINCREF(bs->file->bs->full_open_options);
de6e7951 4867 qdict_put(opts, "file", bs->file->bs->full_open_options);
91af7014
HR
4868
4869 bs->full_open_options = opts;
4870 } else {
4871 QDECREF(opts);
4872 }
4873 } else if (!bs->full_open_options && qdict_size(bs->options)) {
4874 /* There is no underlying file BDS (at least referenced by BDS.file),
4875 * so the full options QDict should be equal to the options given
4876 * specifically for this block device when it was opened (plus the
4877 * driver specification).
4878 * Because those options don't change, there is no need to update
4879 * full_open_options when it's already set. */
4880
4881 opts = qdict_new();
4882 append_open_options(opts, bs);
46f5ac20 4883 qdict_put_str(opts, "driver", drv->format_name);
91af7014
HR
4884
4885 if (bs->exact_filename[0]) {
4886 /* This may not work for all block protocol drivers (some may
4887 * require this filename to be parsed), but we have to find some
4888 * default solution here, so just include it. If some block driver
4889 * does not support pure options without any filename at all or
4890 * needs some special format of the options QDict, it needs to
4891 * implement the driver-specific bdrv_refresh_filename() function.
4892 */
46f5ac20 4893 qdict_put_str(opts, "filename", bs->exact_filename);
91af7014
HR
4894 }
4895
4896 bs->full_open_options = opts;
4897 }
4898
4899 if (bs->exact_filename[0]) {
4900 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4901 } else if (bs->full_open_options) {
4902 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4903 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4904 qstring_get_str(json));
4905 QDECREF(json);
4906 }
4907}
e06018ad
WC
4908
4909/*
4910 * Hot add/remove a BDS's child. So the user can take a child offline when
4911 * it is broken and take a new child online
4912 */
4913void bdrv_add_child(BlockDriverState *parent_bs, BlockDriverState *child_bs,
4914 Error **errp)
4915{
4916
4917 if (!parent_bs->drv || !parent_bs->drv->bdrv_add_child) {
4918 error_setg(errp, "The node %s does not support adding a child",
4919 bdrv_get_device_or_node_name(parent_bs));
4920 return;
4921 }
4922
4923 if (!QLIST_EMPTY(&child_bs->parents)) {
4924 error_setg(errp, "The node %s already has a parent",
4925 child_bs->node_name);
4926 return;
4927 }
4928
4929 parent_bs->drv->bdrv_add_child(parent_bs, child_bs, errp);
4930}
4931
4932void bdrv_del_child(BlockDriverState *parent_bs, BdrvChild *child, Error **errp)
4933{
4934 BdrvChild *tmp;
4935
4936 if (!parent_bs->drv || !parent_bs->drv->bdrv_del_child) {
4937 error_setg(errp, "The node %s does not support removing a child",
4938 bdrv_get_device_or_node_name(parent_bs));
4939 return;
4940 }
4941
4942 QLIST_FOREACH(tmp, &parent_bs->children, next) {
4943 if (tmp == child) {
4944 break;
4945 }
4946 }
4947
4948 if (!tmp) {
4949 error_setg(errp, "The node %s does not have a child named %s",
4950 bdrv_get_device_or_node_name(parent_bs),
4951 bdrv_get_device_or_node_name(child->bs));
4952 return;
4953 }
4954
4955 parent_bs->drv->bdrv_del_child(parent_bs, child, errp);
4956}
67b792f5
VSO
4957
4958bool bdrv_can_store_new_dirty_bitmap(BlockDriverState *bs, const char *name,
4959 uint32_t granularity, Error **errp)
4960{
4961 BlockDriver *drv = bs->drv;
4962
4963 if (!drv) {
4964 error_setg_errno(errp, ENOMEDIUM,
4965 "Can't store persistent bitmaps to %s",
4966 bdrv_get_device_or_node_name(bs));
4967 return false;
4968 }
4969
4970 if (!drv->bdrv_can_store_new_dirty_bitmap) {
4971 error_setg_errno(errp, ENOTSUP,
4972 "Can't store persistent bitmaps to %s",
4973 bdrv_get_device_or_node_name(bs));
4974 return false;
4975 }
4976
4977 return drv->bdrv_can_store_new_dirty_bitmap(bs, name, granularity, errp);
4978}