]> git.proxmox.com Git - mirror_qemu.git/blame - block.c
block: Add reopen queue to bdrv_check_perm()
[mirror_qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
d38ea87a 24#include "qemu/osdep.h"
0ab8ed18 25#include "block/trace.h"
737e150e
PB
26#include "block/block_int.h"
27#include "block/blockjob.h"
cd7fca95 28#include "block/nbd.h"
d49b6836 29#include "qemu/error-report.h"
88d88798 30#include "module_block.h"
1de7afc9 31#include "qemu/module.h"
cc7a8ea7 32#include "qapi/qmp/qerror.h"
91a097e7 33#include "qapi/qmp/qbool.h"
7b1b5d19 34#include "qapi/qmp/qjson.h"
bfb197e0 35#include "sysemu/block-backend.h"
9c17d615 36#include "sysemu/sysemu.h"
1de7afc9 37#include "qemu/notify.h"
10817bf0 38#include "qemu/coroutine.h"
c13163fb 39#include "block/qapi.h"
b2023818 40#include "qmp-commands.h"
1de7afc9 41#include "qemu/timer.h"
a5ee7bd4 42#include "qapi-event.h"
f348b6d1
VB
43#include "qemu/cutils.h"
44#include "qemu/id.h"
fc01f7e7 45
71e72a19 46#ifdef CONFIG_BSD
7674e7bf 47#include <sys/ioctl.h>
72cf2d4f 48#include <sys/queue.h>
c5e97233 49#ifndef __DragonFly__
7674e7bf
FB
50#include <sys/disk.h>
51#endif
c5e97233 52#endif
7674e7bf 53
49dc768d
AL
54#ifdef _WIN32
55#include <windows.h>
56#endif
57
1c9805a3
SH
58#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
59
dc364f4c
BC
60static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
61 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
62
2c1d04e0
HR
63static QTAILQ_HEAD(, BlockDriverState) all_bdrv_states =
64 QTAILQ_HEAD_INITIALIZER(all_bdrv_states);
65
8a22f02a
SH
66static QLIST_HEAD(, BlockDriver) bdrv_drivers =
67 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 68
5b363937
HR
69static BlockDriverState *bdrv_open_inherit(const char *filename,
70 const char *reference,
71 QDict *options, int flags,
72 BlockDriverState *parent,
73 const BdrvChildRole *child_role,
74 Error **errp);
f3930ed0 75
eb852011
MA
76/* If non-zero, use only whitelisted block drivers */
77static int use_bdrv_whitelist;
78
9e0b22f4
SH
79#ifdef _WIN32
80static int is_windows_drive_prefix(const char *filename)
81{
82 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
83 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
84 filename[1] == ':');
85}
86
87int is_windows_drive(const char *filename)
88{
89 if (is_windows_drive_prefix(filename) &&
90 filename[2] == '\0')
91 return 1;
92 if (strstart(filename, "\\\\.\\", NULL) ||
93 strstart(filename, "//./", NULL))
94 return 1;
95 return 0;
96}
97#endif
98
339064d5
KW
99size_t bdrv_opt_mem_align(BlockDriverState *bs)
100{
101 if (!bs || !bs->drv) {
459b4e66
DL
102 /* page size or 4k (hdd sector size) should be on the safe side */
103 return MAX(4096, getpagesize());
339064d5
KW
104 }
105
106 return bs->bl.opt_mem_alignment;
107}
108
4196d2f0
DL
109size_t bdrv_min_mem_align(BlockDriverState *bs)
110{
111 if (!bs || !bs->drv) {
459b4e66
DL
112 /* page size or 4k (hdd sector size) should be on the safe side */
113 return MAX(4096, getpagesize());
4196d2f0
DL
114 }
115
116 return bs->bl.min_mem_alignment;
117}
118
9e0b22f4 119/* check if the path starts with "<protocol>:" */
5c98415b 120int path_has_protocol(const char *path)
9e0b22f4 121{
947995c0
PB
122 const char *p;
123
9e0b22f4
SH
124#ifdef _WIN32
125 if (is_windows_drive(path) ||
126 is_windows_drive_prefix(path)) {
127 return 0;
128 }
947995c0
PB
129 p = path + strcspn(path, ":/\\");
130#else
131 p = path + strcspn(path, ":/");
9e0b22f4
SH
132#endif
133
947995c0 134 return *p == ':';
9e0b22f4
SH
135}
136
83f64091 137int path_is_absolute(const char *path)
3b0d4f61 138{
21664424
FB
139#ifdef _WIN32
140 /* specific case for names like: "\\.\d:" */
f53f4da9 141 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 142 return 1;
f53f4da9
PB
143 }
144 return (*path == '/' || *path == '\\');
3b9f94e1 145#else
f53f4da9 146 return (*path == '/');
3b9f94e1 147#endif
3b0d4f61
FB
148}
149
83f64091
FB
150/* if filename is absolute, just copy it to dest. Otherwise, build a
151 path to it by considering it is relative to base_path. URL are
152 supported. */
153void path_combine(char *dest, int dest_size,
154 const char *base_path,
155 const char *filename)
3b0d4f61 156{
83f64091
FB
157 const char *p, *p1;
158 int len;
159
160 if (dest_size <= 0)
161 return;
162 if (path_is_absolute(filename)) {
163 pstrcpy(dest, dest_size, filename);
164 } else {
0d54a6fe
HR
165 const char *protocol_stripped = NULL;
166
167 if (path_has_protocol(base_path)) {
168 protocol_stripped = strchr(base_path, ':');
169 if (protocol_stripped) {
170 protocol_stripped++;
171 }
172 }
173 p = protocol_stripped ?: base_path;
174
3b9f94e1
FB
175 p1 = strrchr(base_path, '/');
176#ifdef _WIN32
177 {
178 const char *p2;
179 p2 = strrchr(base_path, '\\');
180 if (!p1 || p2 > p1)
181 p1 = p2;
182 }
183#endif
83f64091
FB
184 if (p1)
185 p1++;
186 else
187 p1 = base_path;
188 if (p1 > p)
189 p = p1;
190 len = p - base_path;
191 if (len > dest_size - 1)
192 len = dest_size - 1;
193 memcpy(dest, base_path, len);
194 dest[len] = '\0';
195 pstrcat(dest, dest_size, filename);
3b0d4f61 196 }
3b0d4f61
FB
197}
198
03c320d8
HR
199/*
200 * Helper function for bdrv_parse_filename() implementations to remove optional
201 * protocol prefixes (especially "file:") from a filename and for putting the
202 * stripped filename into the options QDict if there is such a prefix.
203 */
204void bdrv_parse_filename_strip_prefix(const char *filename, const char *prefix,
205 QDict *options)
206{
207 if (strstart(filename, prefix, &filename)) {
208 /* Stripping the explicit protocol prefix may result in a protocol
209 * prefix being (wrongly) detected (if the filename contains a colon) */
210 if (path_has_protocol(filename)) {
211 QString *fat_filename;
212
213 /* This means there is some colon before the first slash; therefore,
214 * this cannot be an absolute path */
215 assert(!path_is_absolute(filename));
216
217 /* And we can thus fix the protocol detection issue by prefixing it
218 * by "./" */
219 fat_filename = qstring_from_str("./");
220 qstring_append(fat_filename, filename);
221
222 assert(!path_has_protocol(qstring_get_str(fat_filename)));
223
224 qdict_put(options, "filename", fat_filename);
225 } else {
226 /* If no protocol prefix was detected, we can use the shortened
227 * filename as-is */
228 qdict_put_str(options, "filename", filename);
229 }
230 }
231}
232
233
9c5e6594
KW
234/* Returns whether the image file is opened as read-only. Note that this can
235 * return false and writing to the image file is still not possible because the
236 * image is inactivated. */
93ed524e
JC
237bool bdrv_is_read_only(BlockDriverState *bs)
238{
239 return bs->read_only;
240}
241
9c5e6594
KW
242/* Returns whether the image file can be written to right now */
243bool bdrv_is_writable(BlockDriverState *bs)
244{
245 return !bdrv_is_read_only(bs) && !(bs->open_flags & BDRV_O_INACTIVE);
246}
247
54a32bfe
KW
248int bdrv_can_set_read_only(BlockDriverState *bs, bool read_only,
249 bool ignore_allow_rdw, Error **errp)
fe5241bf 250{
e2b8247a
JC
251 /* Do not set read_only if copy_on_read is enabled */
252 if (bs->copy_on_read && read_only) {
253 error_setg(errp, "Can't set node '%s' to r/o with copy-on-read enabled",
254 bdrv_get_device_or_node_name(bs));
255 return -EINVAL;
256 }
257
d6fcdf06 258 /* Do not clear read_only if it is prohibited */
54a32bfe
KW
259 if (!read_only && !(bs->open_flags & BDRV_O_ALLOW_RDWR) &&
260 !ignore_allow_rdw)
261 {
d6fcdf06
JC
262 error_setg(errp, "Node '%s' is read only",
263 bdrv_get_device_or_node_name(bs));
264 return -EPERM;
265 }
266
45803a03
JC
267 return 0;
268}
269
270int bdrv_set_read_only(BlockDriverState *bs, bool read_only, Error **errp)
271{
272 int ret = 0;
273
54a32bfe 274 ret = bdrv_can_set_read_only(bs, read_only, false, errp);
45803a03
JC
275 if (ret < 0) {
276 return ret;
277 }
278
fe5241bf 279 bs->read_only = read_only;
e2b8247a 280 return 0;
fe5241bf
JC
281}
282
0a82855a
HR
283void bdrv_get_full_backing_filename_from_filename(const char *backed,
284 const char *backing,
9f07429e
HR
285 char *dest, size_t sz,
286 Error **errp)
dc5a1371 287{
9f07429e
HR
288 if (backing[0] == '\0' || path_has_protocol(backing) ||
289 path_is_absolute(backing))
290 {
0a82855a 291 pstrcpy(dest, sz, backing);
9f07429e
HR
292 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
293 error_setg(errp, "Cannot use relative backing file names for '%s'",
294 backed);
dc5a1371 295 } else {
0a82855a 296 path_combine(dest, sz, backed, backing);
dc5a1371
PB
297 }
298}
299
9f07429e
HR
300void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
301 Error **errp)
0a82855a 302{
9f07429e
HR
303 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
304
305 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
306 dest, sz, errp);
0a82855a
HR
307}
308
0eb7217e
SH
309void bdrv_register(BlockDriver *bdrv)
310{
8a22f02a 311 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 312}
b338082b 313
e4e9986b
MA
314BlockDriverState *bdrv_new(void)
315{
316 BlockDriverState *bs;
317 int i;
318
5839e53b 319 bs = g_new0(BlockDriverState, 1);
e4654d2d 320 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
321 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
322 QLIST_INIT(&bs->op_blockers[i]);
323 }
d616b224 324 notifier_with_return_list_init(&bs->before_write_notifiers);
3783fa3d 325 qemu_co_mutex_init(&bs->reqs_lock);
2119882c 326 qemu_mutex_init(&bs->dirty_bitmap_mutex);
9fcb0251 327 bs->refcnt = 1;
dcd04228 328 bs->aio_context = qemu_get_aio_context();
d7d512f6 329
3ff2f67a
EY
330 qemu_co_queue_init(&bs->flush_queue);
331
2c1d04e0
HR
332 QTAILQ_INSERT_TAIL(&all_bdrv_states, bs, bs_list);
333
b338082b
FB
334 return bs;
335}
336
88d88798 337static BlockDriver *bdrv_do_find_format(const char *format_name)
ea2384d3
FB
338{
339 BlockDriver *drv1;
88d88798 340
8a22f02a
SH
341 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
342 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 343 return drv1;
8a22f02a 344 }
ea2384d3 345 }
88d88798 346
ea2384d3
FB
347 return NULL;
348}
349
88d88798
MM
350BlockDriver *bdrv_find_format(const char *format_name)
351{
352 BlockDriver *drv1;
353 int i;
354
355 drv1 = bdrv_do_find_format(format_name);
356 if (drv1) {
357 return drv1;
358 }
359
360 /* The driver isn't registered, maybe we need to load a module */
361 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); ++i) {
362 if (!strcmp(block_driver_modules[i].format_name, format_name)) {
363 block_module_load_one(block_driver_modules[i].library_name);
364 break;
365 }
366 }
367
368 return bdrv_do_find_format(format_name);
369}
370
b64ec4e4 371static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 372{
b64ec4e4
FZ
373 static const char *whitelist_rw[] = {
374 CONFIG_BDRV_RW_WHITELIST
375 };
376 static const char *whitelist_ro[] = {
377 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
378 };
379 const char **p;
380
b64ec4e4 381 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 382 return 1; /* no whitelist, anything goes */
b64ec4e4 383 }
eb852011 384
b64ec4e4 385 for (p = whitelist_rw; *p; p++) {
eb852011
MA
386 if (!strcmp(drv->format_name, *p)) {
387 return 1;
388 }
389 }
b64ec4e4
FZ
390 if (read_only) {
391 for (p = whitelist_ro; *p; p++) {
392 if (!strcmp(drv->format_name, *p)) {
393 return 1;
394 }
395 }
396 }
eb852011
MA
397 return 0;
398}
399
e6ff69bf
DB
400bool bdrv_uses_whitelist(void)
401{
402 return use_bdrv_whitelist;
403}
404
5b7e1542
ZYW
405typedef struct CreateCo {
406 BlockDriver *drv;
407 char *filename;
83d0521a 408 QemuOpts *opts;
5b7e1542 409 int ret;
cc84d90f 410 Error *err;
5b7e1542
ZYW
411} CreateCo;
412
413static void coroutine_fn bdrv_create_co_entry(void *opaque)
414{
cc84d90f
HR
415 Error *local_err = NULL;
416 int ret;
417
5b7e1542
ZYW
418 CreateCo *cco = opaque;
419 assert(cco->drv);
420
c282e1fd 421 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
621ff94d 422 error_propagate(&cco->err, local_err);
cc84d90f 423 cco->ret = ret;
5b7e1542
ZYW
424}
425
0e7e1989 426int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 427 QemuOpts *opts, Error **errp)
ea2384d3 428{
5b7e1542
ZYW
429 int ret;
430
431 Coroutine *co;
432 CreateCo cco = {
433 .drv = drv,
434 .filename = g_strdup(filename),
83d0521a 435 .opts = opts,
5b7e1542 436 .ret = NOT_DONE,
cc84d90f 437 .err = NULL,
5b7e1542
ZYW
438 };
439
c282e1fd 440 if (!drv->bdrv_create) {
cc84d90f 441 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
442 ret = -ENOTSUP;
443 goto out;
5b7e1542
ZYW
444 }
445
446 if (qemu_in_coroutine()) {
447 /* Fast-path if already in coroutine context */
448 bdrv_create_co_entry(&cco);
449 } else {
0b8b8753
PB
450 co = qemu_coroutine_create(bdrv_create_co_entry, &cco);
451 qemu_coroutine_enter(co);
5b7e1542 452 while (cco.ret == NOT_DONE) {
b47ec2c4 453 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
454 }
455 }
456
457 ret = cco.ret;
cc84d90f 458 if (ret < 0) {
84d18f06 459 if (cco.err) {
cc84d90f
HR
460 error_propagate(errp, cco.err);
461 } else {
462 error_setg_errno(errp, -ret, "Could not create image");
463 }
464 }
0e7e1989 465
80168bff
LC
466out:
467 g_free(cco.filename);
5b7e1542 468 return ret;
ea2384d3
FB
469}
470
c282e1fd 471int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
472{
473 BlockDriver *drv;
cc84d90f
HR
474 Error *local_err = NULL;
475 int ret;
84a12e66 476
b65a5e12 477 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 478 if (drv == NULL) {
16905d71 479 return -ENOENT;
84a12e66
CH
480 }
481
c282e1fd 482 ret = bdrv_create(drv, filename, opts, &local_err);
621ff94d 483 error_propagate(errp, local_err);
cc84d90f 484 return ret;
84a12e66
CH
485}
486
892b7de8
ET
487/**
488 * Try to get @bs's logical and physical block size.
489 * On success, store them in @bsz struct and return 0.
490 * On failure return -errno.
491 * @bs must not be empty.
492 */
493int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
494{
495 BlockDriver *drv = bs->drv;
496
497 if (drv && drv->bdrv_probe_blocksizes) {
498 return drv->bdrv_probe_blocksizes(bs, bsz);
5a612c00
MP
499 } else if (drv && drv->is_filter && bs->file) {
500 return bdrv_probe_blocksizes(bs->file->bs, bsz);
892b7de8
ET
501 }
502
503 return -ENOTSUP;
504}
505
506/**
507 * Try to get @bs's geometry (cyls, heads, sectors).
508 * On success, store them in @geo struct and return 0.
509 * On failure return -errno.
510 * @bs must not be empty.
511 */
512int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
513{
514 BlockDriver *drv = bs->drv;
515
516 if (drv && drv->bdrv_probe_geometry) {
517 return drv->bdrv_probe_geometry(bs, geo);
5a612c00
MP
518 } else if (drv && drv->is_filter && bs->file) {
519 return bdrv_probe_geometry(bs->file->bs, geo);
892b7de8
ET
520 }
521
522 return -ENOTSUP;
523}
524
eba25057
JM
525/*
526 * Create a uniquely-named empty temporary file.
527 * Return 0 upon success, otherwise a negative errno value.
528 */
529int get_tmp_filename(char *filename, int size)
d5249393 530{
eba25057 531#ifdef _WIN32
3b9f94e1 532 char temp_dir[MAX_PATH];
eba25057
JM
533 /* GetTempFileName requires that its output buffer (4th param)
534 have length MAX_PATH or greater. */
535 assert(size >= MAX_PATH);
536 return (GetTempPath(MAX_PATH, temp_dir)
537 && GetTempFileName(temp_dir, "qem", 0, filename)
538 ? 0 : -GetLastError());
d5249393 539#else
67b915a5 540 int fd;
7ccfb2eb 541 const char *tmpdir;
0badc1ee 542 tmpdir = getenv("TMPDIR");
69bef793
AS
543 if (!tmpdir) {
544 tmpdir = "/var/tmp";
545 }
eba25057
JM
546 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
547 return -EOVERFLOW;
548 }
ea2384d3 549 fd = mkstemp(filename);
fe235a06
DH
550 if (fd < 0) {
551 return -errno;
552 }
553 if (close(fd) != 0) {
554 unlink(filename);
eba25057
JM
555 return -errno;
556 }
557 return 0;
d5249393 558#endif
eba25057 559}
fc01f7e7 560
84a12e66
CH
561/*
562 * Detect host devices. By convention, /dev/cdrom[N] is always
563 * recognized as a host CDROM.
564 */
565static BlockDriver *find_hdev_driver(const char *filename)
566{
567 int score_max = 0, score;
568 BlockDriver *drv = NULL, *d;
569
570 QLIST_FOREACH(d, &bdrv_drivers, list) {
571 if (d->bdrv_probe_device) {
572 score = d->bdrv_probe_device(filename);
573 if (score > score_max) {
574 score_max = score;
575 drv = d;
576 }
577 }
578 }
579
580 return drv;
581}
582
88d88798
MM
583static BlockDriver *bdrv_do_find_protocol(const char *protocol)
584{
585 BlockDriver *drv1;
586
587 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
588 if (drv1->protocol_name && !strcmp(drv1->protocol_name, protocol)) {
589 return drv1;
590 }
591 }
592
593 return NULL;
594}
595
98289620 596BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
597 bool allow_protocol_prefix,
598 Error **errp)
83f64091
FB
599{
600 BlockDriver *drv1;
601 char protocol[128];
1cec71e3 602 int len;
83f64091 603 const char *p;
88d88798 604 int i;
19cb3738 605
66f82cee
KW
606 /* TODO Drivers without bdrv_file_open must be specified explicitly */
607
39508e7a
CH
608 /*
609 * XXX(hch): we really should not let host device detection
610 * override an explicit protocol specification, but moving this
611 * later breaks access to device names with colons in them.
612 * Thanks to the brain-dead persistent naming schemes on udev-
613 * based Linux systems those actually are quite common.
614 */
615 drv1 = find_hdev_driver(filename);
616 if (drv1) {
617 return drv1;
618 }
619
98289620 620 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 621 return &bdrv_file;
84a12e66 622 }
98289620 623
9e0b22f4
SH
624 p = strchr(filename, ':');
625 assert(p != NULL);
1cec71e3
AL
626 len = p - filename;
627 if (len > sizeof(protocol) - 1)
628 len = sizeof(protocol) - 1;
629 memcpy(protocol, filename, len);
630 protocol[len] = '\0';
88d88798
MM
631
632 drv1 = bdrv_do_find_protocol(protocol);
633 if (drv1) {
634 return drv1;
635 }
636
637 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); ++i) {
638 if (block_driver_modules[i].protocol_name &&
639 !strcmp(block_driver_modules[i].protocol_name, protocol)) {
640 block_module_load_one(block_driver_modules[i].library_name);
641 break;
8a22f02a 642 }
83f64091 643 }
b65a5e12 644
88d88798
MM
645 drv1 = bdrv_do_find_protocol(protocol);
646 if (!drv1) {
647 error_setg(errp, "Unknown protocol '%s'", protocol);
648 }
649 return drv1;
83f64091
FB
650}
651
c6684249
MA
652/*
653 * Guess image format by probing its contents.
654 * This is not a good idea when your image is raw (CVE-2008-2004), but
655 * we do it anyway for backward compatibility.
656 *
657 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
658 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
659 * but can be smaller if the image file is smaller)
c6684249
MA
660 * @filename is its filename.
661 *
662 * For all block drivers, call the bdrv_probe() method to get its
663 * probing score.
664 * Return the first block driver with the highest probing score.
665 */
38f3ef57
KW
666BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
667 const char *filename)
c6684249
MA
668{
669 int score_max = 0, score;
670 BlockDriver *drv = NULL, *d;
671
672 QLIST_FOREACH(d, &bdrv_drivers, list) {
673 if (d->bdrv_probe) {
674 score = d->bdrv_probe(buf, buf_size, filename);
675 if (score > score_max) {
676 score_max = score;
677 drv = d;
678 }
679 }
680 }
681
682 return drv;
683}
684
5696c6e3 685static int find_image_format(BlockBackend *file, const char *filename,
34b5d2c6 686 BlockDriver **pdrv, Error **errp)
f3a5d3f8 687{
c6684249 688 BlockDriver *drv;
7cddd372 689 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 690 int ret = 0;
f8ea0b00 691
08a00559 692 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
5696c6e3 693 if (blk_is_sg(file) || !blk_is_inserted(file) || blk_getlength(file) == 0) {
ef810437 694 *pdrv = &bdrv_raw;
c98ac35d 695 return ret;
1a396859 696 }
f8ea0b00 697
5696c6e3 698 ret = blk_pread(file, 0, buf, sizeof(buf));
83f64091 699 if (ret < 0) {
34b5d2c6
HR
700 error_setg_errno(errp, -ret, "Could not read image for determining its "
701 "format");
c98ac35d
SW
702 *pdrv = NULL;
703 return ret;
83f64091
FB
704 }
705
c6684249 706 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 707 if (!drv) {
34b5d2c6
HR
708 error_setg(errp, "Could not determine image format: No compatible "
709 "driver found");
c98ac35d
SW
710 ret = -ENOENT;
711 }
712 *pdrv = drv;
713 return ret;
ea2384d3
FB
714}
715
51762288
SH
716/**
717 * Set the current 'total_sectors' value
65a9bb25 718 * Return 0 on success, -errno on error.
51762288
SH
719 */
720static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
721{
722 BlockDriver *drv = bs->drv;
723
396759ad 724 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 725 if (bdrv_is_sg(bs))
396759ad
NB
726 return 0;
727
51762288
SH
728 /* query actual device if possible, otherwise just trust the hint */
729 if (drv->bdrv_getlength) {
730 int64_t length = drv->bdrv_getlength(bs);
731 if (length < 0) {
732 return length;
733 }
7e382003 734 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
735 }
736
737 bs->total_sectors = hint;
738 return 0;
739}
740
cddff5ba
KW
741/**
742 * Combines a QDict of new block driver @options with any missing options taken
743 * from @old_options, so that leaving out an option defaults to its old value.
744 */
745static void bdrv_join_options(BlockDriverState *bs, QDict *options,
746 QDict *old_options)
747{
748 if (bs->drv && bs->drv->bdrv_join_options) {
749 bs->drv->bdrv_join_options(options, old_options);
750 } else {
751 qdict_join(options, old_options, false);
752 }
753}
754
9e8f1835
PB
755/**
756 * Set open flags for a given discard mode
757 *
758 * Return 0 on success, -1 if the discard mode was invalid.
759 */
760int bdrv_parse_discard_flags(const char *mode, int *flags)
761{
762 *flags &= ~BDRV_O_UNMAP;
763
764 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
765 /* do nothing */
766 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
767 *flags |= BDRV_O_UNMAP;
768 } else {
769 return -1;
770 }
771
772 return 0;
773}
774
c3993cdc
SH
775/**
776 * Set open flags for a given cache mode
777 *
778 * Return 0 on success, -1 if the cache mode was invalid.
779 */
53e8ae01 780int bdrv_parse_cache_mode(const char *mode, int *flags, bool *writethrough)
c3993cdc
SH
781{
782 *flags &= ~BDRV_O_CACHE_MASK;
783
784 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
53e8ae01
KW
785 *writethrough = false;
786 *flags |= BDRV_O_NOCACHE;
92196b2f 787 } else if (!strcmp(mode, "directsync")) {
53e8ae01 788 *writethrough = true;
92196b2f 789 *flags |= BDRV_O_NOCACHE;
c3993cdc 790 } else if (!strcmp(mode, "writeback")) {
53e8ae01 791 *writethrough = false;
c3993cdc 792 } else if (!strcmp(mode, "unsafe")) {
53e8ae01 793 *writethrough = false;
c3993cdc
SH
794 *flags |= BDRV_O_NO_FLUSH;
795 } else if (!strcmp(mode, "writethrough")) {
53e8ae01 796 *writethrough = true;
c3993cdc
SH
797 } else {
798 return -1;
799 }
800
801 return 0;
802}
803
b5411555
KW
804static char *bdrv_child_get_parent_desc(BdrvChild *c)
805{
806 BlockDriverState *parent = c->opaque;
807 return g_strdup(bdrv_get_device_or_node_name(parent));
808}
809
20018e12
KW
810static void bdrv_child_cb_drained_begin(BdrvChild *child)
811{
812 BlockDriverState *bs = child->opaque;
813 bdrv_drained_begin(bs);
814}
815
816static void bdrv_child_cb_drained_end(BdrvChild *child)
817{
818 BlockDriverState *bs = child->opaque;
819 bdrv_drained_end(bs);
820}
821
38701b6a
KW
822static int bdrv_child_cb_inactivate(BdrvChild *child)
823{
824 BlockDriverState *bs = child->opaque;
825 assert(bs->open_flags & BDRV_O_INACTIVE);
826 return 0;
827}
828
b1e6fc08 829/*
73176bee
KW
830 * Returns the options and flags that a temporary snapshot should get, based on
831 * the originally requested flags (the originally requested image will have
832 * flags like a backing file)
b1e6fc08 833 */
73176bee
KW
834static void bdrv_temp_snapshot_options(int *child_flags, QDict *child_options,
835 int parent_flags, QDict *parent_options)
b1e6fc08 836{
73176bee
KW
837 *child_flags = (parent_flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
838
839 /* For temporary files, unconditional cache=unsafe is fine */
73176bee
KW
840 qdict_set_default_str(child_options, BDRV_OPT_CACHE_DIRECT, "off");
841 qdict_set_default_str(child_options, BDRV_OPT_CACHE_NO_FLUSH, "on");
41869044 842
f87a0e29
AG
843 /* Copy the read-only option from the parent */
844 qdict_copy_default(child_options, parent_options, BDRV_OPT_READ_ONLY);
845
41869044
KW
846 /* aio=native doesn't work for cache.direct=off, so disable it for the
847 * temporary snapshot */
848 *child_flags &= ~BDRV_O_NATIVE_AIO;
b1e6fc08
KW
849}
850
0b50cc88 851/*
8e2160e2
KW
852 * Returns the options and flags that bs->file should get if a protocol driver
853 * is expected, based on the given options and flags for the parent BDS
0b50cc88 854 */
8e2160e2
KW
855static void bdrv_inherited_options(int *child_flags, QDict *child_options,
856 int parent_flags, QDict *parent_options)
0b50cc88 857{
8e2160e2
KW
858 int flags = parent_flags;
859
0b50cc88
KW
860 /* Enable protocol handling, disable format probing for bs->file */
861 flags |= BDRV_O_PROTOCOL;
862
91a097e7
KW
863 /* If the cache mode isn't explicitly set, inherit direct and no-flush from
864 * the parent. */
865 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
866 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
5a9347c6 867 qdict_copy_default(child_options, parent_options, BDRV_OPT_FORCE_SHARE);
91a097e7 868
f87a0e29
AG
869 /* Inherit the read-only option from the parent if it's not set */
870 qdict_copy_default(child_options, parent_options, BDRV_OPT_READ_ONLY);
871
0b50cc88 872 /* Our block drivers take care to send flushes and respect unmap policy,
91a097e7
KW
873 * so we can default to enable both on lower layers regardless of the
874 * corresponding parent options. */
818584a4 875 qdict_set_default_str(child_options, BDRV_OPT_DISCARD, "unmap");
0b50cc88 876
0b50cc88 877 /* Clear flags that only apply to the top layer */
abb06c5a
DB
878 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ |
879 BDRV_O_NO_IO);
0b50cc88 880
8e2160e2 881 *child_flags = flags;
0b50cc88
KW
882}
883
f3930ed0 884const BdrvChildRole child_file = {
b5411555 885 .get_parent_desc = bdrv_child_get_parent_desc,
8e2160e2 886 .inherit_options = bdrv_inherited_options,
20018e12
KW
887 .drained_begin = bdrv_child_cb_drained_begin,
888 .drained_end = bdrv_child_cb_drained_end,
38701b6a 889 .inactivate = bdrv_child_cb_inactivate,
f3930ed0
KW
890};
891
892/*
8e2160e2
KW
893 * Returns the options and flags that bs->file should get if the use of formats
894 * (and not only protocols) is permitted for it, based on the given options and
895 * flags for the parent BDS
f3930ed0 896 */
8e2160e2
KW
897static void bdrv_inherited_fmt_options(int *child_flags, QDict *child_options,
898 int parent_flags, QDict *parent_options)
f3930ed0 899{
8e2160e2
KW
900 child_file.inherit_options(child_flags, child_options,
901 parent_flags, parent_options);
902
abb06c5a 903 *child_flags &= ~(BDRV_O_PROTOCOL | BDRV_O_NO_IO);
f3930ed0
KW
904}
905
906const BdrvChildRole child_format = {
b5411555 907 .get_parent_desc = bdrv_child_get_parent_desc,
8e2160e2 908 .inherit_options = bdrv_inherited_fmt_options,
20018e12
KW
909 .drained_begin = bdrv_child_cb_drained_begin,
910 .drained_end = bdrv_child_cb_drained_end,
38701b6a 911 .inactivate = bdrv_child_cb_inactivate,
f3930ed0
KW
912};
913
db95dbba
KW
914static void bdrv_backing_attach(BdrvChild *c)
915{
916 BlockDriverState *parent = c->opaque;
917 BlockDriverState *backing_hd = c->bs;
918
919 assert(!parent->backing_blocker);
920 error_setg(&parent->backing_blocker,
921 "node is used as backing hd of '%s'",
922 bdrv_get_device_or_node_name(parent));
923
924 parent->open_flags &= ~BDRV_O_NO_BACKING;
925 pstrcpy(parent->backing_file, sizeof(parent->backing_file),
926 backing_hd->filename);
927 pstrcpy(parent->backing_format, sizeof(parent->backing_format),
928 backing_hd->drv ? backing_hd->drv->format_name : "");
929
930 bdrv_op_block_all(backing_hd, parent->backing_blocker);
931 /* Otherwise we won't be able to commit or stream */
932 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
933 parent->backing_blocker);
934 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_STREAM,
935 parent->backing_blocker);
936 /*
937 * We do backup in 3 ways:
938 * 1. drive backup
939 * The target bs is new opened, and the source is top BDS
940 * 2. blockdev backup
941 * Both the source and the target are top BDSes.
942 * 3. internal backup(used for block replication)
943 * Both the source and the target are backing file
944 *
945 * In case 1 and 2, neither the source nor the target is the backing file.
946 * In case 3, we will block the top BDS, so there is only one block job
947 * for the top BDS and its backing chain.
948 */
949 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_BACKUP_SOURCE,
950 parent->backing_blocker);
951 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_BACKUP_TARGET,
952 parent->backing_blocker);
953}
954
955static void bdrv_backing_detach(BdrvChild *c)
956{
957 BlockDriverState *parent = c->opaque;
958
959 assert(parent->backing_blocker);
960 bdrv_op_unblock_all(c->bs, parent->backing_blocker);
961 error_free(parent->backing_blocker);
962 parent->backing_blocker = NULL;
963}
964
317fc44e 965/*
8e2160e2
KW
966 * Returns the options and flags that bs->backing should get, based on the
967 * given options and flags for the parent BDS
317fc44e 968 */
8e2160e2
KW
969static void bdrv_backing_options(int *child_flags, QDict *child_options,
970 int parent_flags, QDict *parent_options)
317fc44e 971{
8e2160e2
KW
972 int flags = parent_flags;
973
b8816a43
KW
974 /* The cache mode is inherited unmodified for backing files; except WCE,
975 * which is only applied on the top level (BlockBackend) */
91a097e7
KW
976 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
977 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
5a9347c6 978 qdict_copy_default(child_options, parent_options, BDRV_OPT_FORCE_SHARE);
91a097e7 979
317fc44e 980 /* backing files always opened read-only */
f87a0e29
AG
981 qdict_set_default_str(child_options, BDRV_OPT_READ_ONLY, "on");
982 flags &= ~BDRV_O_COPY_ON_READ;
317fc44e
KW
983
984 /* snapshot=on is handled on the top layer */
8bfea15d 985 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e 986
8e2160e2 987 *child_flags = flags;
317fc44e
KW
988}
989
91ef3825 990const BdrvChildRole child_backing = {
b5411555 991 .get_parent_desc = bdrv_child_get_parent_desc,
db95dbba
KW
992 .attach = bdrv_backing_attach,
993 .detach = bdrv_backing_detach,
8e2160e2 994 .inherit_options = bdrv_backing_options,
20018e12
KW
995 .drained_begin = bdrv_child_cb_drained_begin,
996 .drained_end = bdrv_child_cb_drained_end,
38701b6a 997 .inactivate = bdrv_child_cb_inactivate,
f3930ed0
KW
998};
999
7b272452
KW
1000static int bdrv_open_flags(BlockDriverState *bs, int flags)
1001{
61de4c68 1002 int open_flags = flags;
7b272452
KW
1003
1004 /*
1005 * Clear flags that are internal to the block layer before opening the
1006 * image.
1007 */
20cca275 1008 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
1009
1010 /*
1011 * Snapshots should be writable.
1012 */
8bfea15d 1013 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
1014 open_flags |= BDRV_O_RDWR;
1015 }
1016
1017 return open_flags;
1018}
1019
91a097e7
KW
1020static void update_flags_from_options(int *flags, QemuOpts *opts)
1021{
1022 *flags &= ~BDRV_O_CACHE_MASK;
1023
91a097e7
KW
1024 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_NO_FLUSH));
1025 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_NO_FLUSH, false)) {
1026 *flags |= BDRV_O_NO_FLUSH;
1027 }
1028
1029 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_DIRECT));
1030 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_DIRECT, false)) {
1031 *flags |= BDRV_O_NOCACHE;
1032 }
f87a0e29
AG
1033
1034 *flags &= ~BDRV_O_RDWR;
1035
1036 assert(qemu_opt_find(opts, BDRV_OPT_READ_ONLY));
1037 if (!qemu_opt_get_bool(opts, BDRV_OPT_READ_ONLY, false)) {
1038 *flags |= BDRV_O_RDWR;
1039 }
1040
91a097e7
KW
1041}
1042
1043static void update_options_from_flags(QDict *options, int flags)
1044{
91a097e7 1045 if (!qdict_haskey(options, BDRV_OPT_CACHE_DIRECT)) {
46f5ac20 1046 qdict_put_bool(options, BDRV_OPT_CACHE_DIRECT, flags & BDRV_O_NOCACHE);
91a097e7
KW
1047 }
1048 if (!qdict_haskey(options, BDRV_OPT_CACHE_NO_FLUSH)) {
46f5ac20
EB
1049 qdict_put_bool(options, BDRV_OPT_CACHE_NO_FLUSH,
1050 flags & BDRV_O_NO_FLUSH);
91a097e7 1051 }
f87a0e29 1052 if (!qdict_haskey(options, BDRV_OPT_READ_ONLY)) {
46f5ac20 1053 qdict_put_bool(options, BDRV_OPT_READ_ONLY, !(flags & BDRV_O_RDWR));
f87a0e29 1054 }
91a097e7
KW
1055}
1056
636ea370
KW
1057static void bdrv_assign_node_name(BlockDriverState *bs,
1058 const char *node_name,
1059 Error **errp)
6913c0c2 1060{
15489c76 1061 char *gen_node_name = NULL;
6913c0c2 1062
15489c76
JC
1063 if (!node_name) {
1064 node_name = gen_node_name = id_generate(ID_BLOCK);
1065 } else if (!id_wellformed(node_name)) {
1066 /*
1067 * Check for empty string or invalid characters, but not if it is
1068 * generated (generated names use characters not available to the user)
1069 */
9aebf3b8 1070 error_setg(errp, "Invalid node name");
636ea370 1071 return;
6913c0c2
BC
1072 }
1073
0c5e94ee 1074 /* takes care of avoiding namespaces collisions */
7f06d47e 1075 if (blk_by_name(node_name)) {
0c5e94ee
BC
1076 error_setg(errp, "node-name=%s is conflicting with a device id",
1077 node_name);
15489c76 1078 goto out;
0c5e94ee
BC
1079 }
1080
6913c0c2
BC
1081 /* takes care of avoiding duplicates node names */
1082 if (bdrv_find_node(node_name)) {
1083 error_setg(errp, "Duplicate node name");
15489c76 1084 goto out;
6913c0c2
BC
1085 }
1086
1087 /* copy node name into the bs and insert it into the graph list */
1088 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
1089 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
15489c76
JC
1090out:
1091 g_free(gen_node_name);
6913c0c2
BC
1092}
1093
01a56501
KW
1094static int bdrv_open_driver(BlockDriverState *bs, BlockDriver *drv,
1095 const char *node_name, QDict *options,
1096 int open_flags, Error **errp)
1097{
1098 Error *local_err = NULL;
1099 int ret;
1100
1101 bdrv_assign_node_name(bs, node_name, &local_err);
1102 if (local_err) {
1103 error_propagate(errp, local_err);
1104 return -EINVAL;
1105 }
1106
1107 bs->drv = drv;
680c7f96 1108 bs->read_only = !(bs->open_flags & BDRV_O_RDWR);
01a56501
KW
1109 bs->opaque = g_malloc0(drv->instance_size);
1110
1111 if (drv->bdrv_file_open) {
1112 assert(!drv->bdrv_needs_filename || bs->filename[0]);
1113 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
680c7f96 1114 } else if (drv->bdrv_open) {
01a56501 1115 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
680c7f96
KW
1116 } else {
1117 ret = 0;
01a56501
KW
1118 }
1119
1120 if (ret < 0) {
1121 if (local_err) {
1122 error_propagate(errp, local_err);
1123 } else if (bs->filename[0]) {
1124 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
1125 } else {
1126 error_setg_errno(errp, -ret, "Could not open image");
1127 }
180ca19a 1128 goto open_failed;
01a56501
KW
1129 }
1130
1131 ret = refresh_total_sectors(bs, bs->total_sectors);
1132 if (ret < 0) {
1133 error_setg_errno(errp, -ret, "Could not refresh total sector count");
180ca19a 1134 return ret;
01a56501
KW
1135 }
1136
1137 bdrv_refresh_limits(bs, &local_err);
1138 if (local_err) {
1139 error_propagate(errp, local_err);
180ca19a 1140 return -EINVAL;
01a56501
KW
1141 }
1142
1143 assert(bdrv_opt_mem_align(bs) != 0);
1144 assert(bdrv_min_mem_align(bs) != 0);
1145 assert(is_power_of_2(bs->bl.request_alignment));
1146
1147 return 0;
180ca19a
MP
1148open_failed:
1149 bs->drv = NULL;
1150 if (bs->file != NULL) {
1151 bdrv_unref_child(bs, bs->file);
1152 bs->file = NULL;
1153 }
01a56501
KW
1154 g_free(bs->opaque);
1155 bs->opaque = NULL;
01a56501
KW
1156 return ret;
1157}
1158
680c7f96
KW
1159BlockDriverState *bdrv_new_open_driver(BlockDriver *drv, const char *node_name,
1160 int flags, Error **errp)
1161{
1162 BlockDriverState *bs;
1163 int ret;
1164
1165 bs = bdrv_new();
1166 bs->open_flags = flags;
1167 bs->explicit_options = qdict_new();
1168 bs->options = qdict_new();
1169 bs->opaque = NULL;
1170
1171 update_options_from_flags(bs->options, flags);
1172
1173 ret = bdrv_open_driver(bs, drv, node_name, bs->options, flags, errp);
1174 if (ret < 0) {
1175 QDECREF(bs->explicit_options);
180ca19a 1176 bs->explicit_options = NULL;
680c7f96 1177 QDECREF(bs->options);
180ca19a 1178 bs->options = NULL;
680c7f96
KW
1179 bdrv_unref(bs);
1180 return NULL;
1181 }
1182
1183 return bs;
1184}
1185
c5f3014b 1186QemuOptsList bdrv_runtime_opts = {
18edf289
KW
1187 .name = "bdrv_common",
1188 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
1189 .desc = {
1190 {
1191 .name = "node-name",
1192 .type = QEMU_OPT_STRING,
1193 .help = "Node name of the block device node",
1194 },
62392ebb
KW
1195 {
1196 .name = "driver",
1197 .type = QEMU_OPT_STRING,
1198 .help = "Block driver to use for the node",
1199 },
91a097e7
KW
1200 {
1201 .name = BDRV_OPT_CACHE_DIRECT,
1202 .type = QEMU_OPT_BOOL,
1203 .help = "Bypass software writeback cache on the host",
1204 },
1205 {
1206 .name = BDRV_OPT_CACHE_NO_FLUSH,
1207 .type = QEMU_OPT_BOOL,
1208 .help = "Ignore flush requests",
1209 },
f87a0e29
AG
1210 {
1211 .name = BDRV_OPT_READ_ONLY,
1212 .type = QEMU_OPT_BOOL,
1213 .help = "Node is opened in read-only mode",
1214 },
692e01a2
KW
1215 {
1216 .name = "detect-zeroes",
1217 .type = QEMU_OPT_STRING,
1218 .help = "try to optimize zero writes (off, on, unmap)",
1219 },
818584a4
KW
1220 {
1221 .name = "discard",
1222 .type = QEMU_OPT_STRING,
1223 .help = "discard operation (ignore/off, unmap/on)",
1224 },
5a9347c6
FZ
1225 {
1226 .name = BDRV_OPT_FORCE_SHARE,
1227 .type = QEMU_OPT_BOOL,
1228 .help = "always accept other writers (default: off)",
1229 },
18edf289
KW
1230 { /* end of list */ }
1231 },
1232};
1233
57915332
KW
1234/*
1235 * Common part for opening disk images and files
b6ad491a
KW
1236 *
1237 * Removes all processed options from *options.
57915332 1238 */
5696c6e3 1239static int bdrv_open_common(BlockDriverState *bs, BlockBackend *file,
82dc8b41 1240 QDict *options, Error **errp)
57915332
KW
1241{
1242 int ret, open_flags;
035fccdf 1243 const char *filename;
62392ebb 1244 const char *driver_name = NULL;
6913c0c2 1245 const char *node_name = NULL;
818584a4 1246 const char *discard;
692e01a2 1247 const char *detect_zeroes;
18edf289 1248 QemuOpts *opts;
62392ebb 1249 BlockDriver *drv;
34b5d2c6 1250 Error *local_err = NULL;
57915332 1251
6405875c 1252 assert(bs->file == NULL);
707ff828 1253 assert(options != NULL && bs->options != options);
57915332 1254
62392ebb
KW
1255 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
1256 qemu_opts_absorb_qdict(opts, options, &local_err);
1257 if (local_err) {
1258 error_propagate(errp, local_err);
1259 ret = -EINVAL;
1260 goto fail_opts;
1261 }
1262
9b7e8691
AG
1263 update_flags_from_options(&bs->open_flags, opts);
1264
62392ebb
KW
1265 driver_name = qemu_opt_get(opts, "driver");
1266 drv = bdrv_find_format(driver_name);
1267 assert(drv != NULL);
1268
5a9347c6
FZ
1269 bs->force_share = qemu_opt_get_bool(opts, BDRV_OPT_FORCE_SHARE, false);
1270
1271 if (bs->force_share && (bs->open_flags & BDRV_O_RDWR)) {
1272 error_setg(errp,
1273 BDRV_OPT_FORCE_SHARE
1274 "=on can only be used with read-only images");
1275 ret = -EINVAL;
1276 goto fail_opts;
1277 }
1278
45673671 1279 if (file != NULL) {
5696c6e3 1280 filename = blk_bs(file)->filename;
45673671 1281 } else {
129c7d1c
MA
1282 /*
1283 * Caution: while qdict_get_try_str() is fine, getting
1284 * non-string types would require more care. When @options
1285 * come from -blockdev or blockdev_add, its members are typed
1286 * according to the QAPI schema, but when they come from
1287 * -drive, they're all QString.
1288 */
45673671
KW
1289 filename = qdict_get_try_str(options, "filename");
1290 }
1291
4a008240 1292 if (drv->bdrv_needs_filename && (!filename || !filename[0])) {
765003db
KW
1293 error_setg(errp, "The '%s' block driver requires a file name",
1294 drv->format_name);
18edf289
KW
1295 ret = -EINVAL;
1296 goto fail_opts;
6913c0c2 1297 }
6913c0c2 1298
82dc8b41
KW
1299 trace_bdrv_open_common(bs, filename ?: "", bs->open_flags,
1300 drv->format_name);
62392ebb 1301
82dc8b41 1302 bs->read_only = !(bs->open_flags & BDRV_O_RDWR);
b64ec4e4
FZ
1303
1304 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
1305 error_setg(errp,
1306 !bs->read_only && bdrv_is_whitelisted(drv, true)
1307 ? "Driver '%s' can only be used for read-only devices"
1308 : "Driver '%s' is not whitelisted",
1309 drv->format_name);
18edf289
KW
1310 ret = -ENOTSUP;
1311 goto fail_opts;
b64ec4e4 1312 }
57915332 1313
d3faa13e
PB
1314 /* bdrv_new() and bdrv_close() make it so */
1315 assert(atomic_read(&bs->copy_on_read) == 0);
1316
82dc8b41 1317 if (bs->open_flags & BDRV_O_COPY_ON_READ) {
0ebd24e0
KW
1318 if (!bs->read_only) {
1319 bdrv_enable_copy_on_read(bs);
1320 } else {
1321 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
1322 ret = -EINVAL;
1323 goto fail_opts;
0ebd24e0 1324 }
53fec9d3
SH
1325 }
1326
818584a4
KW
1327 discard = qemu_opt_get(opts, "discard");
1328 if (discard != NULL) {
1329 if (bdrv_parse_discard_flags(discard, &bs->open_flags) != 0) {
1330 error_setg(errp, "Invalid discard option");
1331 ret = -EINVAL;
1332 goto fail_opts;
1333 }
1334 }
1335
692e01a2
KW
1336 detect_zeroes = qemu_opt_get(opts, "detect-zeroes");
1337 if (detect_zeroes) {
1338 BlockdevDetectZeroesOptions value =
f7abe0ec 1339 qapi_enum_parse(&BlockdevDetectZeroesOptions_lookup,
692e01a2 1340 detect_zeroes,
692e01a2
KW
1341 BLOCKDEV_DETECT_ZEROES_OPTIONS_OFF,
1342 &local_err);
1343 if (local_err) {
1344 error_propagate(errp, local_err);
1345 ret = -EINVAL;
1346 goto fail_opts;
1347 }
1348
1349 if (value == BLOCKDEV_DETECT_ZEROES_OPTIONS_UNMAP &&
1350 !(bs->open_flags & BDRV_O_UNMAP))
1351 {
1352 error_setg(errp, "setting detect-zeroes to unmap is not allowed "
1353 "without setting discard operation to unmap");
1354 ret = -EINVAL;
1355 goto fail_opts;
1356 }
1357
1358 bs->detect_zeroes = value;
1359 }
1360
c2ad1b0c
KW
1361 if (filename != NULL) {
1362 pstrcpy(bs->filename, sizeof(bs->filename), filename);
1363 } else {
1364 bs->filename[0] = '\0';
1365 }
91af7014 1366 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 1367
66f82cee 1368 /* Open the image, either directly or using a protocol */
82dc8b41 1369 open_flags = bdrv_open_flags(bs, bs->open_flags);
01a56501 1370 node_name = qemu_opt_get(opts, "node-name");
57915332 1371
01a56501
KW
1372 assert(!drv->bdrv_file_open || file == NULL);
1373 ret = bdrv_open_driver(bs, drv, node_name, options, open_flags, errp);
51762288 1374 if (ret < 0) {
01a56501 1375 goto fail_opts;
3baca891
KW
1376 }
1377
18edf289 1378 qemu_opts_del(opts);
57915332
KW
1379 return 0;
1380
18edf289
KW
1381fail_opts:
1382 qemu_opts_del(opts);
57915332
KW
1383 return ret;
1384}
1385
5e5c4f63
KW
1386static QDict *parse_json_filename(const char *filename, Error **errp)
1387{
1388 QObject *options_obj;
1389 QDict *options;
1390 int ret;
1391
1392 ret = strstart(filename, "json:", &filename);
1393 assert(ret);
1394
5577fff7 1395 options_obj = qobject_from_json(filename, errp);
5e5c4f63 1396 if (!options_obj) {
5577fff7
MA
1397 /* Work around qobject_from_json() lossage TODO fix that */
1398 if (errp && !*errp) {
1399 error_setg(errp, "Could not parse the JSON options");
1400 return NULL;
1401 }
1402 error_prepend(errp, "Could not parse the JSON options: ");
5e5c4f63
KW
1403 return NULL;
1404 }
1405
ca6b6e1e
MA
1406 options = qobject_to_qdict(options_obj);
1407 if (!options) {
5e5c4f63
KW
1408 qobject_decref(options_obj);
1409 error_setg(errp, "Invalid JSON object given");
1410 return NULL;
1411 }
1412
5e5c4f63
KW
1413 qdict_flatten(options);
1414
1415 return options;
1416}
1417
de3b53f0
KW
1418static void parse_json_protocol(QDict *options, const char **pfilename,
1419 Error **errp)
1420{
1421 QDict *json_options;
1422 Error *local_err = NULL;
1423
1424 /* Parse json: pseudo-protocol */
1425 if (!*pfilename || !g_str_has_prefix(*pfilename, "json:")) {
1426 return;
1427 }
1428
1429 json_options = parse_json_filename(*pfilename, &local_err);
1430 if (local_err) {
1431 error_propagate(errp, local_err);
1432 return;
1433 }
1434
1435 /* Options given in the filename have lower priority than options
1436 * specified directly */
1437 qdict_join(options, json_options, false);
1438 QDECREF(json_options);
1439 *pfilename = NULL;
1440}
1441
b6ce07aa 1442/*
f54120ff
KW
1443 * Fills in default options for opening images and converts the legacy
1444 * filename/flags pair to option QDict entries.
53a29513
HR
1445 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
1446 * block driver has been specified explicitly.
b6ce07aa 1447 */
de3b53f0 1448static int bdrv_fill_options(QDict **options, const char *filename,
053e1578 1449 int *flags, Error **errp)
ea2384d3 1450{
c2ad1b0c 1451 const char *drvname;
53a29513 1452 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 1453 bool parse_filename = false;
053e1578 1454 BlockDriver *drv = NULL;
34b5d2c6 1455 Error *local_err = NULL;
83f64091 1456
129c7d1c
MA
1457 /*
1458 * Caution: while qdict_get_try_str() is fine, getting non-string
1459 * types would require more care. When @options come from
1460 * -blockdev or blockdev_add, its members are typed according to
1461 * the QAPI schema, but when they come from -drive, they're all
1462 * QString.
1463 */
53a29513 1464 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1465 if (drvname) {
1466 drv = bdrv_find_format(drvname);
1467 if (!drv) {
1468 error_setg(errp, "Unknown driver '%s'", drvname);
1469 return -ENOENT;
1470 }
1471 /* If the user has explicitly specified the driver, this choice should
1472 * override the BDRV_O_PROTOCOL flag */
1473 protocol = drv->bdrv_file_open;
53a29513
HR
1474 }
1475
1476 if (protocol) {
1477 *flags |= BDRV_O_PROTOCOL;
1478 } else {
1479 *flags &= ~BDRV_O_PROTOCOL;
1480 }
1481
91a097e7
KW
1482 /* Translate cache options from flags into options */
1483 update_options_from_flags(*options, *flags);
1484
035fccdf 1485 /* Fetch the file name from the options QDict if necessary */
17b005f1 1486 if (protocol && filename) {
f54120ff 1487 if (!qdict_haskey(*options, "filename")) {
46f5ac20 1488 qdict_put_str(*options, "filename", filename);
f54120ff
KW
1489 parse_filename = true;
1490 } else {
1491 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1492 "the same time");
1493 return -EINVAL;
1494 }
035fccdf
KW
1495 }
1496
c2ad1b0c 1497 /* Find the right block driver */
129c7d1c 1498 /* See cautionary note on accessing @options above */
f54120ff 1499 filename = qdict_get_try_str(*options, "filename");
f54120ff 1500
053e1578
HR
1501 if (!drvname && protocol) {
1502 if (filename) {
1503 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1504 if (!drv) {
053e1578 1505 return -EINVAL;
17b005f1 1506 }
053e1578
HR
1507
1508 drvname = drv->format_name;
46f5ac20 1509 qdict_put_str(*options, "driver", drvname);
053e1578
HR
1510 } else {
1511 error_setg(errp, "Must specify either driver or file");
1512 return -EINVAL;
98289620 1513 }
c2ad1b0c
KW
1514 }
1515
17b005f1 1516 assert(drv || !protocol);
c2ad1b0c 1517
f54120ff 1518 /* Driver-specific filename parsing */
17b005f1 1519 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1520 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1521 if (local_err) {
34b5d2c6 1522 error_propagate(errp, local_err);
f54120ff 1523 return -EINVAL;
6963a30d 1524 }
cd5d031e
HR
1525
1526 if (!drv->bdrv_needs_filename) {
1527 qdict_del(*options, "filename");
cd5d031e 1528 }
6963a30d
KW
1529 }
1530
f54120ff
KW
1531 return 0;
1532}
1533
3121fb45
KW
1534static int bdrv_child_check_perm(BdrvChild *c, BlockReopenQueue *q,
1535 uint64_t perm, uint64_t shared,
c1cef672
FZ
1536 GSList *ignore_children, Error **errp);
1537static void bdrv_child_abort_perm_update(BdrvChild *c);
1538static void bdrv_child_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared);
1539
ffd1a5a2 1540static void bdrv_child_perm(BlockDriverState *bs, BlockDriverState *child_bs,
e0995dc3
KW
1541 BdrvChild *c, const BdrvChildRole *role,
1542 BlockReopenQueue *reopen_queue,
ffd1a5a2
FZ
1543 uint64_t parent_perm, uint64_t parent_shared,
1544 uint64_t *nperm, uint64_t *nshared)
1545{
1546 if (bs->drv && bs->drv->bdrv_child_perm) {
e0995dc3 1547 bs->drv->bdrv_child_perm(bs, c, role, reopen_queue,
ffd1a5a2
FZ
1548 parent_perm, parent_shared,
1549 nperm, nshared);
1550 }
e0995dc3 1551 /* TODO Take force_share from reopen_queue */
ffd1a5a2
FZ
1552 if (child_bs && child_bs->force_share) {
1553 *nshared = BLK_PERM_ALL;
1554 }
1555}
1556
33a610c3
KW
1557/*
1558 * Check whether permissions on this node can be changed in a way that
1559 * @cumulative_perms and @cumulative_shared_perms are the new cumulative
1560 * permissions of all its parents. This involves checking whether all necessary
1561 * permission changes to child nodes can be performed.
1562 *
1563 * A call to this function must always be followed by a call to bdrv_set_perm()
1564 * or bdrv_abort_perm_update().
1565 */
3121fb45
KW
1566static int bdrv_check_perm(BlockDriverState *bs, BlockReopenQueue *q,
1567 uint64_t cumulative_perms,
46181129
KW
1568 uint64_t cumulative_shared_perms,
1569 GSList *ignore_children, Error **errp)
33a610c3
KW
1570{
1571 BlockDriver *drv = bs->drv;
1572 BdrvChild *c;
1573 int ret;
1574
1575 /* Write permissions never work with read-only images */
1576 if ((cumulative_perms & (BLK_PERM_WRITE | BLK_PERM_WRITE_UNCHANGED)) &&
9c5e6594 1577 !bdrv_is_writable(bs))
33a610c3
KW
1578 {
1579 error_setg(errp, "Block node is read-only");
1580 return -EPERM;
1581 }
1582
1583 /* Check this node */
1584 if (!drv) {
1585 return 0;
1586 }
1587
1588 if (drv->bdrv_check_perm) {
1589 return drv->bdrv_check_perm(bs, cumulative_perms,
1590 cumulative_shared_perms, errp);
1591 }
1592
78e421c9 1593 /* Drivers that never have children can omit .bdrv_child_perm() */
33a610c3 1594 if (!drv->bdrv_child_perm) {
78e421c9 1595 assert(QLIST_EMPTY(&bs->children));
33a610c3
KW
1596 return 0;
1597 }
1598
1599 /* Check all children */
1600 QLIST_FOREACH(c, &bs->children, next) {
1601 uint64_t cur_perm, cur_shared;
3121fb45 1602 bdrv_child_perm(bs, c->bs, c, c->role, q,
ffd1a5a2
FZ
1603 cumulative_perms, cumulative_shared_perms,
1604 &cur_perm, &cur_shared);
3121fb45
KW
1605 ret = bdrv_child_check_perm(c, q, cur_perm, cur_shared,
1606 ignore_children, errp);
33a610c3
KW
1607 if (ret < 0) {
1608 return ret;
1609 }
1610 }
1611
1612 return 0;
1613}
1614
1615/*
1616 * Notifies drivers that after a previous bdrv_check_perm() call, the
1617 * permission update is not performed and any preparations made for it (e.g.
1618 * taken file locks) need to be undone.
1619 *
1620 * This function recursively notifies all child nodes.
1621 */
1622static void bdrv_abort_perm_update(BlockDriverState *bs)
1623{
1624 BlockDriver *drv = bs->drv;
1625 BdrvChild *c;
1626
1627 if (!drv) {
1628 return;
1629 }
1630
1631 if (drv->bdrv_abort_perm_update) {
1632 drv->bdrv_abort_perm_update(bs);
1633 }
1634
1635 QLIST_FOREACH(c, &bs->children, next) {
1636 bdrv_child_abort_perm_update(c);
1637 }
1638}
1639
1640static void bdrv_set_perm(BlockDriverState *bs, uint64_t cumulative_perms,
1641 uint64_t cumulative_shared_perms)
1642{
1643 BlockDriver *drv = bs->drv;
1644 BdrvChild *c;
1645
1646 if (!drv) {
1647 return;
1648 }
1649
1650 /* Update this node */
1651 if (drv->bdrv_set_perm) {
1652 drv->bdrv_set_perm(bs, cumulative_perms, cumulative_shared_perms);
1653 }
1654
78e421c9 1655 /* Drivers that never have children can omit .bdrv_child_perm() */
33a610c3 1656 if (!drv->bdrv_child_perm) {
78e421c9 1657 assert(QLIST_EMPTY(&bs->children));
33a610c3
KW
1658 return;
1659 }
1660
1661 /* Update all children */
1662 QLIST_FOREACH(c, &bs->children, next) {
1663 uint64_t cur_perm, cur_shared;
e0995dc3 1664 bdrv_child_perm(bs, c->bs, c, c->role, NULL,
ffd1a5a2
FZ
1665 cumulative_perms, cumulative_shared_perms,
1666 &cur_perm, &cur_shared);
33a610c3
KW
1667 bdrv_child_set_perm(c, cur_perm, cur_shared);
1668 }
1669}
1670
1671static void bdrv_get_cumulative_perm(BlockDriverState *bs, uint64_t *perm,
1672 uint64_t *shared_perm)
1673{
1674 BdrvChild *c;
1675 uint64_t cumulative_perms = 0;
1676 uint64_t cumulative_shared_perms = BLK_PERM_ALL;
1677
1678 QLIST_FOREACH(c, &bs->parents, next_parent) {
1679 cumulative_perms |= c->perm;
1680 cumulative_shared_perms &= c->shared_perm;
1681 }
1682
1683 *perm = cumulative_perms;
1684 *shared_perm = cumulative_shared_perms;
1685}
1686
d083319f
KW
1687static char *bdrv_child_user_desc(BdrvChild *c)
1688{
1689 if (c->role->get_parent_desc) {
1690 return c->role->get_parent_desc(c);
1691 }
1692
1693 return g_strdup("another user");
1694}
1695
5176196c 1696char *bdrv_perm_names(uint64_t perm)
d083319f
KW
1697{
1698 struct perm_name {
1699 uint64_t perm;
1700 const char *name;
1701 } permissions[] = {
1702 { BLK_PERM_CONSISTENT_READ, "consistent read" },
1703 { BLK_PERM_WRITE, "write" },
1704 { BLK_PERM_WRITE_UNCHANGED, "write unchanged" },
1705 { BLK_PERM_RESIZE, "resize" },
1706 { BLK_PERM_GRAPH_MOD, "change children" },
1707 { 0, NULL }
1708 };
1709
1710 char *result = g_strdup("");
1711 struct perm_name *p;
1712
1713 for (p = permissions; p->name; p++) {
1714 if (perm & p->perm) {
1715 char *old = result;
1716 result = g_strdup_printf("%s%s%s", old, *old ? ", " : "", p->name);
1717 g_free(old);
1718 }
1719 }
1720
1721 return result;
1722}
1723
33a610c3
KW
1724/*
1725 * Checks whether a new reference to @bs can be added if the new user requires
46181129
KW
1726 * @new_used_perm/@new_shared_perm as its permissions. If @ignore_children is
1727 * set, the BdrvChild objects in this list are ignored in the calculations;
1728 * this allows checking permission updates for an existing reference.
33a610c3
KW
1729 *
1730 * Needs to be followed by a call to either bdrv_set_perm() or
1731 * bdrv_abort_perm_update(). */
3121fb45
KW
1732static int bdrv_check_update_perm(BlockDriverState *bs, BlockReopenQueue *q,
1733 uint64_t new_used_perm,
d5e6f437 1734 uint64_t new_shared_perm,
46181129 1735 GSList *ignore_children, Error **errp)
d5e6f437
KW
1736{
1737 BdrvChild *c;
33a610c3
KW
1738 uint64_t cumulative_perms = new_used_perm;
1739 uint64_t cumulative_shared_perms = new_shared_perm;
d5e6f437
KW
1740
1741 /* There is no reason why anyone couldn't tolerate write_unchanged */
1742 assert(new_shared_perm & BLK_PERM_WRITE_UNCHANGED);
1743
1744 QLIST_FOREACH(c, &bs->parents, next_parent) {
46181129 1745 if (g_slist_find(ignore_children, c)) {
d5e6f437
KW
1746 continue;
1747 }
1748
d083319f
KW
1749 if ((new_used_perm & c->shared_perm) != new_used_perm) {
1750 char *user = bdrv_child_user_desc(c);
1751 char *perm_names = bdrv_perm_names(new_used_perm & ~c->shared_perm);
1752 error_setg(errp, "Conflicts with use by %s as '%s', which does not "
1753 "allow '%s' on %s",
1754 user, c->name, perm_names, bdrv_get_node_name(c->bs));
1755 g_free(user);
1756 g_free(perm_names);
1757 return -EPERM;
1758 }
1759
1760 if ((c->perm & new_shared_perm) != c->perm) {
1761 char *user = bdrv_child_user_desc(c);
1762 char *perm_names = bdrv_perm_names(c->perm & ~new_shared_perm);
1763 error_setg(errp, "Conflicts with use by %s as '%s', which uses "
1764 "'%s' on %s",
1765 user, c->name, perm_names, bdrv_get_node_name(c->bs));
1766 g_free(user);
1767 g_free(perm_names);
d5e6f437
KW
1768 return -EPERM;
1769 }
33a610c3
KW
1770
1771 cumulative_perms |= c->perm;
1772 cumulative_shared_perms &= c->shared_perm;
d5e6f437
KW
1773 }
1774
3121fb45 1775 return bdrv_check_perm(bs, q, cumulative_perms, cumulative_shared_perms,
46181129 1776 ignore_children, errp);
33a610c3
KW
1777}
1778
1779/* Needs to be followed by a call to either bdrv_child_set_perm() or
1780 * bdrv_child_abort_perm_update(). */
3121fb45
KW
1781static int bdrv_child_check_perm(BdrvChild *c, BlockReopenQueue *q,
1782 uint64_t perm, uint64_t shared,
c1cef672 1783 GSList *ignore_children, Error **errp)
33a610c3 1784{
46181129
KW
1785 int ret;
1786
1787 ignore_children = g_slist_prepend(g_slist_copy(ignore_children), c);
3121fb45 1788 ret = bdrv_check_update_perm(c->bs, q, perm, shared, ignore_children, errp);
46181129
KW
1789 g_slist_free(ignore_children);
1790
1791 return ret;
33a610c3
KW
1792}
1793
c1cef672 1794static void bdrv_child_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared)
33a610c3
KW
1795{
1796 uint64_t cumulative_perms, cumulative_shared_perms;
1797
1798 c->perm = perm;
1799 c->shared_perm = shared;
1800
1801 bdrv_get_cumulative_perm(c->bs, &cumulative_perms,
1802 &cumulative_shared_perms);
1803 bdrv_set_perm(c->bs, cumulative_perms, cumulative_shared_perms);
1804}
1805
c1cef672 1806static void bdrv_child_abort_perm_update(BdrvChild *c)
33a610c3
KW
1807{
1808 bdrv_abort_perm_update(c->bs);
1809}
1810
1811int bdrv_child_try_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared,
1812 Error **errp)
1813{
1814 int ret;
1815
3121fb45 1816 ret = bdrv_child_check_perm(c, NULL, perm, shared, NULL, errp);
33a610c3
KW
1817 if (ret < 0) {
1818 bdrv_child_abort_perm_update(c);
1819 return ret;
1820 }
1821
1822 bdrv_child_set_perm(c, perm, shared);
1823
d5e6f437
KW
1824 return 0;
1825}
1826
6a1b9ee1
KW
1827#define DEFAULT_PERM_PASSTHROUGH (BLK_PERM_CONSISTENT_READ \
1828 | BLK_PERM_WRITE \
1829 | BLK_PERM_WRITE_UNCHANGED \
1830 | BLK_PERM_RESIZE)
1831#define DEFAULT_PERM_UNCHANGED (BLK_PERM_ALL & ~DEFAULT_PERM_PASSTHROUGH)
1832
1833void bdrv_filter_default_perms(BlockDriverState *bs, BdrvChild *c,
1834 const BdrvChildRole *role,
e0995dc3 1835 BlockReopenQueue *reopen_queue,
6a1b9ee1
KW
1836 uint64_t perm, uint64_t shared,
1837 uint64_t *nperm, uint64_t *nshared)
1838{
1839 if (c == NULL) {
1840 *nperm = perm & DEFAULT_PERM_PASSTHROUGH;
1841 *nshared = (shared & DEFAULT_PERM_PASSTHROUGH) | DEFAULT_PERM_UNCHANGED;
1842 return;
1843 }
1844
1845 *nperm = (perm & DEFAULT_PERM_PASSTHROUGH) |
1846 (c->perm & DEFAULT_PERM_UNCHANGED);
1847 *nshared = (shared & DEFAULT_PERM_PASSTHROUGH) |
1848 (c->shared_perm & DEFAULT_PERM_UNCHANGED);
1849}
1850
6b1a044a
KW
1851void bdrv_format_default_perms(BlockDriverState *bs, BdrvChild *c,
1852 const BdrvChildRole *role,
e0995dc3 1853 BlockReopenQueue *reopen_queue,
6b1a044a
KW
1854 uint64_t perm, uint64_t shared,
1855 uint64_t *nperm, uint64_t *nshared)
1856{
1857 bool backing = (role == &child_backing);
1858 assert(role == &child_backing || role == &child_file);
1859
1860 if (!backing) {
1861 /* Apart from the modifications below, the same permissions are
1862 * forwarded and left alone as for filters */
e0995dc3
KW
1863 bdrv_filter_default_perms(bs, c, role, reopen_queue, perm, shared,
1864 &perm, &shared);
6b1a044a
KW
1865
1866 /* Format drivers may touch metadata even if the guest doesn't write */
e0995dc3 1867 /* TODO Take flags from reopen_queue */
9c5e6594 1868 if (bdrv_is_writable(bs)) {
6b1a044a
KW
1869 perm |= BLK_PERM_WRITE | BLK_PERM_RESIZE;
1870 }
1871
1872 /* bs->file always needs to be consistent because of the metadata. We
1873 * can never allow other users to resize or write to it. */
1874 perm |= BLK_PERM_CONSISTENT_READ;
1875 shared &= ~(BLK_PERM_WRITE | BLK_PERM_RESIZE);
1876 } else {
1877 /* We want consistent read from backing files if the parent needs it.
1878 * No other operations are performed on backing files. */
1879 perm &= BLK_PERM_CONSISTENT_READ;
1880
1881 /* If the parent can deal with changing data, we're okay with a
1882 * writable and resizable backing file. */
1883 /* TODO Require !(perm & BLK_PERM_CONSISTENT_READ), too? */
1884 if (shared & BLK_PERM_WRITE) {
1885 shared = BLK_PERM_WRITE | BLK_PERM_RESIZE;
1886 } else {
1887 shared = 0;
1888 }
1889
1890 shared |= BLK_PERM_CONSISTENT_READ | BLK_PERM_GRAPH_MOD |
1891 BLK_PERM_WRITE_UNCHANGED;
1892 }
1893
9c5e6594
KW
1894 if (bs->open_flags & BDRV_O_INACTIVE) {
1895 shared |= BLK_PERM_WRITE | BLK_PERM_RESIZE;
1896 }
1897
6b1a044a
KW
1898 *nperm = perm;
1899 *nshared = shared;
1900}
1901
8ee03995
KW
1902static void bdrv_replace_child_noperm(BdrvChild *child,
1903 BlockDriverState *new_bs)
e9740bc6
KW
1904{
1905 BlockDriverState *old_bs = child->bs;
1906
bb2614e9
FZ
1907 if (old_bs && new_bs) {
1908 assert(bdrv_get_aio_context(old_bs) == bdrv_get_aio_context(new_bs));
1909 }
e9740bc6 1910 if (old_bs) {
36fe1331
KW
1911 if (old_bs->quiesce_counter && child->role->drained_end) {
1912 child->role->drained_end(child);
1913 }
db95dbba
KW
1914 if (child->role->detach) {
1915 child->role->detach(child);
1916 }
e9740bc6
KW
1917 QLIST_REMOVE(child, next_parent);
1918 }
36fe1331
KW
1919
1920 child->bs = new_bs;
1921
e9740bc6
KW
1922 if (new_bs) {
1923 QLIST_INSERT_HEAD(&new_bs->parents, child, next_parent);
36fe1331
KW
1924 if (new_bs->quiesce_counter && child->role->drained_begin) {
1925 child->role->drained_begin(child);
1926 }
33a610c3 1927
8ee03995
KW
1928 if (child->role->attach) {
1929 child->role->attach(child);
1930 }
1931 }
1932}
33a610c3 1933
466787fb
KW
1934/*
1935 * Updates @child to change its reference to point to @new_bs, including
1936 * checking and applying the necessary permisson updates both to the old node
1937 * and to @new_bs.
1938 *
1939 * NULL is passed as @new_bs for removing the reference before freeing @child.
1940 *
1941 * If @new_bs is not NULL, bdrv_check_perm() must be called beforehand, as this
1942 * function uses bdrv_set_perm() to update the permissions according to the new
1943 * reference that @new_bs gets.
1944 */
1945static void bdrv_replace_child(BdrvChild *child, BlockDriverState *new_bs)
8ee03995
KW
1946{
1947 BlockDriverState *old_bs = child->bs;
1948 uint64_t perm, shared_perm;
1949
8aecf1d1
KW
1950 bdrv_replace_child_noperm(child, new_bs);
1951
8ee03995 1952 if (old_bs) {
33a610c3
KW
1953 /* Update permissions for old node. This is guaranteed to succeed
1954 * because we're just taking a parent away, so we're loosening
1955 * restrictions. */
1956 bdrv_get_cumulative_perm(old_bs, &perm, &shared_perm);
3121fb45 1957 bdrv_check_perm(old_bs, NULL, perm, shared_perm, NULL, &error_abort);
33a610c3 1958 bdrv_set_perm(old_bs, perm, shared_perm);
e9740bc6 1959 }
36fe1331 1960
e9740bc6 1961 if (new_bs) {
33a610c3 1962 bdrv_get_cumulative_perm(new_bs, &perm, &shared_perm);
33a610c3 1963 bdrv_set_perm(new_bs, perm, shared_perm);
e9740bc6 1964 }
e9740bc6
KW
1965}
1966
f21d96d0
KW
1967BdrvChild *bdrv_root_attach_child(BlockDriverState *child_bs,
1968 const char *child_name,
36fe1331 1969 const BdrvChildRole *child_role,
d5e6f437
KW
1970 uint64_t perm, uint64_t shared_perm,
1971 void *opaque, Error **errp)
df581792 1972{
d5e6f437
KW
1973 BdrvChild *child;
1974 int ret;
1975
3121fb45 1976 ret = bdrv_check_update_perm(child_bs, NULL, perm, shared_perm, NULL, errp);
d5e6f437 1977 if (ret < 0) {
33a610c3 1978 bdrv_abort_perm_update(child_bs);
d5e6f437
KW
1979 return NULL;
1980 }
1981
1982 child = g_new(BdrvChild, 1);
df581792 1983 *child = (BdrvChild) {
d5e6f437
KW
1984 .bs = NULL,
1985 .name = g_strdup(child_name),
1986 .role = child_role,
1987 .perm = perm,
1988 .shared_perm = shared_perm,
1989 .opaque = opaque,
df581792
KW
1990 };
1991
33a610c3 1992 /* This performs the matching bdrv_set_perm() for the above check. */
466787fb 1993 bdrv_replace_child(child, child_bs);
b4b059f6
KW
1994
1995 return child;
df581792
KW
1996}
1997
98292c61
WC
1998BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
1999 BlockDriverState *child_bs,
2000 const char *child_name,
8b2ff529
KW
2001 const BdrvChildRole *child_role,
2002 Error **errp)
f21d96d0 2003{
d5e6f437 2004 BdrvChild *child;
f68c598b
KW
2005 uint64_t perm, shared_perm;
2006
2007 bdrv_get_cumulative_perm(parent_bs, &perm, &shared_perm);
2008
2009 assert(parent_bs->drv);
bb2614e9 2010 assert(bdrv_get_aio_context(parent_bs) == bdrv_get_aio_context(child_bs));
e0995dc3 2011 bdrv_child_perm(parent_bs, child_bs, NULL, child_role, NULL,
ffd1a5a2 2012 perm, shared_perm, &perm, &shared_perm);
d5e6f437 2013
d5e6f437 2014 child = bdrv_root_attach_child(child_bs, child_name, child_role,
f68c598b 2015 perm, shared_perm, parent_bs, errp);
d5e6f437
KW
2016 if (child == NULL) {
2017 return NULL;
2018 }
2019
f21d96d0
KW
2020 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
2021 return child;
2022}
2023
3f09bfbc 2024static void bdrv_detach_child(BdrvChild *child)
33a60407 2025{
f21d96d0
KW
2026 if (child->next.le_prev) {
2027 QLIST_REMOVE(child, next);
2028 child->next.le_prev = NULL;
2029 }
e9740bc6 2030
466787fb 2031 bdrv_replace_child(child, NULL);
e9740bc6 2032
260fecf1 2033 g_free(child->name);
33a60407
KW
2034 g_free(child);
2035}
2036
f21d96d0 2037void bdrv_root_unref_child(BdrvChild *child)
33a60407 2038{
779020cb
KW
2039 BlockDriverState *child_bs;
2040
f21d96d0
KW
2041 child_bs = child->bs;
2042 bdrv_detach_child(child);
2043 bdrv_unref(child_bs);
2044}
2045
2046void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
2047{
779020cb
KW
2048 if (child == NULL) {
2049 return;
2050 }
33a60407
KW
2051
2052 if (child->bs->inherits_from == parent) {
4e4bf5c4
KW
2053 BdrvChild *c;
2054
2055 /* Remove inherits_from only when the last reference between parent and
2056 * child->bs goes away. */
2057 QLIST_FOREACH(c, &parent->children, next) {
2058 if (c != child && c->bs == child->bs) {
2059 break;
2060 }
2061 }
2062 if (c == NULL) {
2063 child->bs->inherits_from = NULL;
2064 }
33a60407
KW
2065 }
2066
f21d96d0 2067 bdrv_root_unref_child(child);
33a60407
KW
2068}
2069
5c8cab48
KW
2070
2071static void bdrv_parent_cb_change_media(BlockDriverState *bs, bool load)
2072{
2073 BdrvChild *c;
2074 QLIST_FOREACH(c, &bs->parents, next_parent) {
2075 if (c->role->change_media) {
2076 c->role->change_media(c, load);
2077 }
2078 }
2079}
2080
2081static void bdrv_parent_cb_resize(BlockDriverState *bs)
2082{
2083 BdrvChild *c;
2084 QLIST_FOREACH(c, &bs->parents, next_parent) {
2085 if (c->role->resize) {
2086 c->role->resize(c);
2087 }
2088 }
2089}
2090
5db15a57
KW
2091/*
2092 * Sets the backing file link of a BDS. A new reference is created; callers
2093 * which don't need their own reference any more must call bdrv_unref().
2094 */
12fa4af6
KW
2095void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd,
2096 Error **errp)
8d24cce1 2097{
5db15a57
KW
2098 if (backing_hd) {
2099 bdrv_ref(backing_hd);
2100 }
8d24cce1 2101
760e0063 2102 if (bs->backing) {
5db15a57 2103 bdrv_unref_child(bs, bs->backing);
826b6ca0
FZ
2104 }
2105
8d24cce1 2106 if (!backing_hd) {
760e0063 2107 bs->backing = NULL;
8d24cce1
FZ
2108 goto out;
2109 }
12fa4af6 2110
8b2ff529 2111 bs->backing = bdrv_attach_child(bs, backing_hd, "backing", &child_backing,
12fa4af6
KW
2112 errp);
2113 if (!bs->backing) {
2114 bdrv_unref(backing_hd);
2115 }
826b6ca0 2116
9e7e940c
KW
2117 bdrv_refresh_filename(bs);
2118
8d24cce1 2119out:
3baca891 2120 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
2121}
2122
31ca6d07
KW
2123/*
2124 * Opens the backing file for a BlockDriverState if not yet open
2125 *
d9b7b057
KW
2126 * bdref_key specifies the key for the image's BlockdevRef in the options QDict.
2127 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
2128 * itself, all options starting with "${bdref_key}." are considered part of the
2129 * BlockdevRef.
2130 *
2131 * TODO Can this be unified with bdrv_open_image()?
31ca6d07 2132 */
d9b7b057
KW
2133int bdrv_open_backing_file(BlockDriverState *bs, QDict *parent_options,
2134 const char *bdref_key, Error **errp)
9156df12 2135{
1ba4b6a5 2136 char *backing_filename = g_malloc0(PATH_MAX);
d9b7b057
KW
2137 char *bdref_key_dot;
2138 const char *reference = NULL;
317fc44e 2139 int ret = 0;
8d24cce1 2140 BlockDriverState *backing_hd;
d9b7b057
KW
2141 QDict *options;
2142 QDict *tmp_parent_options = NULL;
34b5d2c6 2143 Error *local_err = NULL;
9156df12 2144
760e0063 2145 if (bs->backing != NULL) {
1ba4b6a5 2146 goto free_exit;
9156df12
PB
2147 }
2148
31ca6d07 2149 /* NULL means an empty set of options */
d9b7b057
KW
2150 if (parent_options == NULL) {
2151 tmp_parent_options = qdict_new();
2152 parent_options = tmp_parent_options;
31ca6d07
KW
2153 }
2154
9156df12 2155 bs->open_flags &= ~BDRV_O_NO_BACKING;
d9b7b057
KW
2156
2157 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
2158 qdict_extract_subqdict(parent_options, &options, bdref_key_dot);
2159 g_free(bdref_key_dot);
2160
129c7d1c
MA
2161 /*
2162 * Caution: while qdict_get_try_str() is fine, getting non-string
2163 * types would require more care. When @parent_options come from
2164 * -blockdev or blockdev_add, its members are typed according to
2165 * the QAPI schema, but when they come from -drive, they're all
2166 * QString.
2167 */
d9b7b057
KW
2168 reference = qdict_get_try_str(parent_options, bdref_key);
2169 if (reference || qdict_haskey(options, "file.filename")) {
1cb6f506
KW
2170 backing_filename[0] = '\0';
2171 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 2172 QDECREF(options);
1ba4b6a5 2173 goto free_exit;
dbecebdd 2174 } else {
9f07429e
HR
2175 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
2176 &local_err);
2177 if (local_err) {
2178 ret = -EINVAL;
2179 error_propagate(errp, local_err);
2180 QDECREF(options);
2181 goto free_exit;
2182 }
9156df12
PB
2183 }
2184
8ee79e70
KW
2185 if (!bs->drv || !bs->drv->supports_backing) {
2186 ret = -EINVAL;
2187 error_setg(errp, "Driver doesn't support backing files");
2188 QDECREF(options);
2189 goto free_exit;
2190 }
2191
c5f6e493 2192 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
46f5ac20 2193 qdict_put_str(options, "driver", bs->backing_format);
9156df12
PB
2194 }
2195
5b363937
HR
2196 backing_hd = bdrv_open_inherit(*backing_filename ? backing_filename : NULL,
2197 reference, options, 0, bs, &child_backing,
2198 errp);
2199 if (!backing_hd) {
9156df12 2200 bs->open_flags |= BDRV_O_NO_BACKING;
e43bfd9c 2201 error_prepend(errp, "Could not open backing file: ");
5b363937 2202 ret = -EINVAL;
1ba4b6a5 2203 goto free_exit;
9156df12 2204 }
5ce6bfe2 2205 bdrv_set_aio_context(backing_hd, bdrv_get_aio_context(bs));
df581792 2206
5db15a57
KW
2207 /* Hook up the backing file link; drop our reference, bs owns the
2208 * backing_hd reference now */
12fa4af6 2209 bdrv_set_backing_hd(bs, backing_hd, &local_err);
5db15a57 2210 bdrv_unref(backing_hd);
12fa4af6 2211 if (local_err) {
8cd1a3e4 2212 error_propagate(errp, local_err);
12fa4af6
KW
2213 ret = -EINVAL;
2214 goto free_exit;
2215 }
d80ac658 2216
d9b7b057
KW
2217 qdict_del(parent_options, bdref_key);
2218
1ba4b6a5
BC
2219free_exit:
2220 g_free(backing_filename);
d9b7b057 2221 QDECREF(tmp_parent_options);
1ba4b6a5 2222 return ret;
9156df12
PB
2223}
2224
2d6b86af
KW
2225static BlockDriverState *
2226bdrv_open_child_bs(const char *filename, QDict *options, const char *bdref_key,
2227 BlockDriverState *parent, const BdrvChildRole *child_role,
2228 bool allow_none, Error **errp)
da557aac 2229{
2d6b86af 2230 BlockDriverState *bs = NULL;
da557aac 2231 QDict *image_options;
da557aac
HR
2232 char *bdref_key_dot;
2233 const char *reference;
2234
df581792 2235 assert(child_role != NULL);
f67503e5 2236
da557aac
HR
2237 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
2238 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
2239 g_free(bdref_key_dot);
2240
129c7d1c
MA
2241 /*
2242 * Caution: while qdict_get_try_str() is fine, getting non-string
2243 * types would require more care. When @options come from
2244 * -blockdev or blockdev_add, its members are typed according to
2245 * the QAPI schema, but when they come from -drive, they're all
2246 * QString.
2247 */
da557aac
HR
2248 reference = qdict_get_try_str(options, bdref_key);
2249 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 2250 if (!allow_none) {
da557aac
HR
2251 error_setg(errp, "A block device must be specified for \"%s\"",
2252 bdref_key);
da557aac 2253 }
b20e61e0 2254 QDECREF(image_options);
da557aac
HR
2255 goto done;
2256 }
2257
5b363937
HR
2258 bs = bdrv_open_inherit(filename, reference, image_options, 0,
2259 parent, child_role, errp);
2260 if (!bs) {
df581792
KW
2261 goto done;
2262 }
2263
da557aac
HR
2264done:
2265 qdict_del(options, bdref_key);
2d6b86af
KW
2266 return bs;
2267}
2268
2269/*
2270 * Opens a disk image whose options are given as BlockdevRef in another block
2271 * device's options.
2272 *
2273 * If allow_none is true, no image will be opened if filename is false and no
2274 * BlockdevRef is given. NULL will be returned, but errp remains unset.
2275 *
2276 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
2277 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
2278 * itself, all options starting with "${bdref_key}." are considered part of the
2279 * BlockdevRef.
2280 *
2281 * The BlockdevRef will be removed from the options QDict.
2282 */
2283BdrvChild *bdrv_open_child(const char *filename,
2284 QDict *options, const char *bdref_key,
2285 BlockDriverState *parent,
2286 const BdrvChildRole *child_role,
2287 bool allow_none, Error **errp)
2288{
8b2ff529 2289 BdrvChild *c;
2d6b86af
KW
2290 BlockDriverState *bs;
2291
2292 bs = bdrv_open_child_bs(filename, options, bdref_key, parent, child_role,
2293 allow_none, errp);
2294 if (bs == NULL) {
2295 return NULL;
2296 }
2297
8b2ff529
KW
2298 c = bdrv_attach_child(parent, bs, bdref_key, child_role, errp);
2299 if (!c) {
2300 bdrv_unref(bs);
2301 return NULL;
2302 }
2303
2304 return c;
b4b059f6
KW
2305}
2306
66836189
HR
2307static BlockDriverState *bdrv_append_temp_snapshot(BlockDriverState *bs,
2308 int flags,
2309 QDict *snapshot_options,
2310 Error **errp)
b998875d
KW
2311{
2312 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 2313 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 2314 int64_t total_size;
83d0521a 2315 QemuOpts *opts = NULL;
ff6ed714 2316 BlockDriverState *bs_snapshot = NULL;
b2c2832c 2317 Error *local_err = NULL;
b998875d
KW
2318 int ret;
2319
2320 /* if snapshot, we create a temporary backing file and open it
2321 instead of opening 'filename' directly */
2322
2323 /* Get the required size from the image */
f187743a
KW
2324 total_size = bdrv_getlength(bs);
2325 if (total_size < 0) {
2326 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 2327 goto out;
f187743a 2328 }
b998875d
KW
2329
2330 /* Create the temporary image */
1ba4b6a5 2331 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
2332 if (ret < 0) {
2333 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 2334 goto out;
b998875d
KW
2335 }
2336
ef810437 2337 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 2338 &error_abort);
39101f25 2339 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
e43bfd9c 2340 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, errp);
83d0521a 2341 qemu_opts_del(opts);
b998875d 2342 if (ret < 0) {
e43bfd9c
MA
2343 error_prepend(errp, "Could not create temporary overlay '%s': ",
2344 tmp_filename);
1ba4b6a5 2345 goto out;
b998875d
KW
2346 }
2347
73176bee 2348 /* Prepare options QDict for the temporary file */
46f5ac20
EB
2349 qdict_put_str(snapshot_options, "file.driver", "file");
2350 qdict_put_str(snapshot_options, "file.filename", tmp_filename);
2351 qdict_put_str(snapshot_options, "driver", "qcow2");
b998875d 2352
5b363937 2353 bs_snapshot = bdrv_open(NULL, NULL, snapshot_options, flags, errp);
73176bee 2354 snapshot_options = NULL;
5b363937 2355 if (!bs_snapshot) {
1ba4b6a5 2356 goto out;
b998875d
KW
2357 }
2358
ff6ed714
EB
2359 /* bdrv_append() consumes a strong reference to bs_snapshot
2360 * (i.e. it will call bdrv_unref() on it) even on error, so in
2361 * order to be able to return one, we have to increase
2362 * bs_snapshot's refcount here */
66836189 2363 bdrv_ref(bs_snapshot);
b2c2832c
KW
2364 bdrv_append(bs_snapshot, bs, &local_err);
2365 if (local_err) {
2366 error_propagate(errp, local_err);
ff6ed714 2367 bs_snapshot = NULL;
b2c2832c
KW
2368 goto out;
2369 }
1ba4b6a5
BC
2370
2371out:
73176bee 2372 QDECREF(snapshot_options);
1ba4b6a5 2373 g_free(tmp_filename);
ff6ed714 2374 return bs_snapshot;
b998875d
KW
2375}
2376
b6ce07aa
KW
2377/*
2378 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
2379 *
2380 * options is a QDict of options to pass to the block drivers, or NULL for an
2381 * empty set of options. The reference to the QDict belongs to the block layer
2382 * after the call (even on failure), so if the caller intends to reuse the
2383 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
2384 *
2385 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
2386 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
2387 *
2388 * The reference parameter may be used to specify an existing block device which
2389 * should be opened. If specified, neither options nor a filename may be given,
2390 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 2391 */
5b363937
HR
2392static BlockDriverState *bdrv_open_inherit(const char *filename,
2393 const char *reference,
2394 QDict *options, int flags,
2395 BlockDriverState *parent,
2396 const BdrvChildRole *child_role,
2397 Error **errp)
ea2384d3 2398{
b6ce07aa 2399 int ret;
5696c6e3 2400 BlockBackend *file = NULL;
9a4f4c31 2401 BlockDriverState *bs;
ce343771 2402 BlockDriver *drv = NULL;
74fe54f2 2403 const char *drvname;
3e8c2e57 2404 const char *backing;
34b5d2c6 2405 Error *local_err = NULL;
73176bee 2406 QDict *snapshot_options = NULL;
b1e6fc08 2407 int snapshot_flags = 0;
712e7874 2408
f3930ed0
KW
2409 assert(!child_role || !flags);
2410 assert(!child_role == !parent);
f67503e5 2411
ddf5636d
HR
2412 if (reference) {
2413 bool options_non_empty = options ? qdict_size(options) : false;
2414 QDECREF(options);
2415
ddf5636d
HR
2416 if (filename || options_non_empty) {
2417 error_setg(errp, "Cannot reference an existing block device with "
2418 "additional options or a new filename");
5b363937 2419 return NULL;
ddf5636d
HR
2420 }
2421
2422 bs = bdrv_lookup_bs(reference, reference, errp);
2423 if (!bs) {
5b363937 2424 return NULL;
ddf5636d 2425 }
76b22320 2426
ddf5636d 2427 bdrv_ref(bs);
5b363937 2428 return bs;
ddf5636d
HR
2429 }
2430
5b363937 2431 bs = bdrv_new();
f67503e5 2432
de9c0cec
KW
2433 /* NULL means an empty set of options */
2434 if (options == NULL) {
2435 options = qdict_new();
2436 }
2437
145f598e 2438 /* json: syntax counts as explicit options, as if in the QDict */
de3b53f0
KW
2439 parse_json_protocol(options, &filename, &local_err);
2440 if (local_err) {
de3b53f0
KW
2441 goto fail;
2442 }
2443
145f598e
KW
2444 bs->explicit_options = qdict_clone_shallow(options);
2445
f3930ed0 2446 if (child_role) {
bddcec37 2447 bs->inherits_from = parent;
8e2160e2
KW
2448 child_role->inherit_options(&flags, options,
2449 parent->open_flags, parent->options);
f3930ed0
KW
2450 }
2451
de3b53f0 2452 ret = bdrv_fill_options(&options, filename, &flags, &local_err);
462f5bcf
KW
2453 if (local_err) {
2454 goto fail;
2455 }
2456
129c7d1c
MA
2457 /*
2458 * Set the BDRV_O_RDWR and BDRV_O_ALLOW_RDWR flags.
2459 * Caution: getting a boolean member of @options requires care.
2460 * When @options come from -blockdev or blockdev_add, members are
2461 * typed according to the QAPI schema, but when they come from
2462 * -drive, they're all QString.
2463 */
f87a0e29
AG
2464 if (g_strcmp0(qdict_get_try_str(options, BDRV_OPT_READ_ONLY), "on") &&
2465 !qdict_get_try_bool(options, BDRV_OPT_READ_ONLY, false)) {
2466 flags |= (BDRV_O_RDWR | BDRV_O_ALLOW_RDWR);
2467 } else {
2468 flags &= ~BDRV_O_RDWR;
14499ea5
AG
2469 }
2470
2471 if (flags & BDRV_O_SNAPSHOT) {
2472 snapshot_options = qdict_new();
2473 bdrv_temp_snapshot_options(&snapshot_flags, snapshot_options,
2474 flags, options);
f87a0e29
AG
2475 /* Let bdrv_backing_options() override "read-only" */
2476 qdict_del(options, BDRV_OPT_READ_ONLY);
14499ea5
AG
2477 bdrv_backing_options(&flags, options, flags, options);
2478 }
2479
62392ebb
KW
2480 bs->open_flags = flags;
2481 bs->options = options;
2482 options = qdict_clone_shallow(options);
2483
76c591b0 2484 /* Find the right image format driver */
129c7d1c 2485 /* See cautionary note on accessing @options above */
76c591b0
KW
2486 drvname = qdict_get_try_str(options, "driver");
2487 if (drvname) {
2488 drv = bdrv_find_format(drvname);
76c591b0
KW
2489 if (!drv) {
2490 error_setg(errp, "Unknown driver: '%s'", drvname);
76c591b0
KW
2491 goto fail;
2492 }
2493 }
2494
2495 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 2496
129c7d1c 2497 /* See cautionary note on accessing @options above */
3e8c2e57
AG
2498 backing = qdict_get_try_str(options, "backing");
2499 if (backing && *backing == '\0') {
2500 flags |= BDRV_O_NO_BACKING;
2501 qdict_del(options, "backing");
2502 }
2503
5696c6e3 2504 /* Open image file without format layer. This BlockBackend is only used for
4e4bf5c4
KW
2505 * probing, the block drivers will do their own bdrv_open_child() for the
2506 * same BDS, which is why we put the node name back into options. */
f4788adc 2507 if ((flags & BDRV_O_PROTOCOL) == 0) {
5696c6e3
KW
2508 BlockDriverState *file_bs;
2509
2510 file_bs = bdrv_open_child_bs(filename, options, "file", bs,
2511 &child_file, true, &local_err);
1fdd6933 2512 if (local_err) {
f4788adc
KW
2513 goto fail;
2514 }
5696c6e3 2515 if (file_bs != NULL) {
6d0eb64d 2516 file = blk_new(BLK_PERM_CONSISTENT_READ, BLK_PERM_ALL);
d7086422 2517 blk_insert_bs(file, file_bs, &local_err);
5696c6e3 2518 bdrv_unref(file_bs);
d7086422
KW
2519 if (local_err) {
2520 goto fail;
2521 }
5696c6e3 2522
46f5ac20 2523 qdict_put_str(options, "file", bdrv_get_node_name(file_bs));
4e4bf5c4 2524 }
f500a6d3
KW
2525 }
2526
76c591b0 2527 /* Image format probing */
38f3ef57 2528 bs->probed = !drv;
76c591b0 2529 if (!drv && file) {
cf2ab8fc 2530 ret = find_image_format(file, filename, &drv, &local_err);
17b005f1 2531 if (ret < 0) {
8bfea15d 2532 goto fail;
2a05cbe4 2533 }
62392ebb
KW
2534 /*
2535 * This option update would logically belong in bdrv_fill_options(),
2536 * but we first need to open bs->file for the probing to work, while
2537 * opening bs->file already requires the (mostly) final set of options
2538 * so that cache mode etc. can be inherited.
2539 *
2540 * Adding the driver later is somewhat ugly, but it's not an option
2541 * that would ever be inherited, so it's correct. We just need to make
2542 * sure to update both bs->options (which has the full effective
2543 * options for bs) and options (which has file.* already removed).
2544 */
46f5ac20
EB
2545 qdict_put_str(bs->options, "driver", drv->format_name);
2546 qdict_put_str(options, "driver", drv->format_name);
76c591b0 2547 } else if (!drv) {
17b005f1 2548 error_setg(errp, "Must specify either driver or file");
8bfea15d 2549 goto fail;
ea2384d3 2550 }
b6ce07aa 2551
53a29513
HR
2552 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
2553 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
2554 /* file must be NULL if a protocol BDS is about to be created
2555 * (the inverse results in an error message from bdrv_open_common()) */
2556 assert(!(flags & BDRV_O_PROTOCOL) || !file);
2557
b6ce07aa 2558 /* Open the image */
82dc8b41 2559 ret = bdrv_open_common(bs, file, options, &local_err);
b6ce07aa 2560 if (ret < 0) {
8bfea15d 2561 goto fail;
6987307c
CH
2562 }
2563
4e4bf5c4 2564 if (file) {
5696c6e3 2565 blk_unref(file);
f500a6d3
KW
2566 file = NULL;
2567 }
2568
b6ce07aa 2569 /* If there is a backing file, use it */
9156df12 2570 if ((flags & BDRV_O_NO_BACKING) == 0) {
d9b7b057 2571 ret = bdrv_open_backing_file(bs, options, "backing", &local_err);
b6ce07aa 2572 if (ret < 0) {
b6ad491a 2573 goto close_and_fail;
b6ce07aa 2574 }
b6ce07aa
KW
2575 }
2576
91af7014
HR
2577 bdrv_refresh_filename(bs);
2578
b6ad491a 2579 /* Check if any unknown options were used */
7ad2757f 2580 if (qdict_size(options) != 0) {
b6ad491a 2581 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
2582 if (flags & BDRV_O_PROTOCOL) {
2583 error_setg(errp, "Block protocol '%s' doesn't support the option "
2584 "'%s'", drv->format_name, entry->key);
2585 } else {
d0e46a55
HR
2586 error_setg(errp,
2587 "Block format '%s' does not support the option '%s'",
2588 drv->format_name, entry->key);
5acd9d81 2589 }
b6ad491a 2590
b6ad491a
KW
2591 goto close_and_fail;
2592 }
b6ad491a 2593
c01c214b 2594 bdrv_parent_cb_change_media(bs, true);
b6ce07aa 2595
c3adb58f 2596 QDECREF(options);
dd62f1ca
KW
2597
2598 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
2599 * temporary snapshot afterwards. */
2600 if (snapshot_flags) {
66836189
HR
2601 BlockDriverState *snapshot_bs;
2602 snapshot_bs = bdrv_append_temp_snapshot(bs, snapshot_flags,
2603 snapshot_options, &local_err);
73176bee 2604 snapshot_options = NULL;
dd62f1ca
KW
2605 if (local_err) {
2606 goto close_and_fail;
2607 }
5b363937
HR
2608 /* We are not going to return bs but the overlay on top of it
2609 * (snapshot_bs); thus, we have to drop the strong reference to bs
2610 * (which we obtained by calling bdrv_new()). bs will not be deleted,
2611 * though, because the overlay still has a reference to it. */
2612 bdrv_unref(bs);
2613 bs = snapshot_bs;
dd62f1ca
KW
2614 }
2615
5b363937 2616 return bs;
b6ce07aa 2617
8bfea15d 2618fail:
5696c6e3 2619 blk_unref(file);
73176bee 2620 QDECREF(snapshot_options);
145f598e 2621 QDECREF(bs->explicit_options);
de9c0cec 2622 QDECREF(bs->options);
b6ad491a 2623 QDECREF(options);
de9c0cec 2624 bs->options = NULL;
998cbd6a 2625 bs->explicit_options = NULL;
5b363937 2626 bdrv_unref(bs);
621ff94d 2627 error_propagate(errp, local_err);
5b363937 2628 return NULL;
de9c0cec 2629
b6ad491a 2630close_and_fail:
5b363937 2631 bdrv_unref(bs);
73176bee 2632 QDECREF(snapshot_options);
b6ad491a 2633 QDECREF(options);
621ff94d 2634 error_propagate(errp, local_err);
5b363937 2635 return NULL;
b6ce07aa
KW
2636}
2637
5b363937
HR
2638BlockDriverState *bdrv_open(const char *filename, const char *reference,
2639 QDict *options, int flags, Error **errp)
f3930ed0 2640{
5b363937 2641 return bdrv_open_inherit(filename, reference, options, flags, NULL,
ce343771 2642 NULL, errp);
f3930ed0
KW
2643}
2644
e971aa12
JC
2645typedef struct BlockReopenQueueEntry {
2646 bool prepared;
2647 BDRVReopenState state;
2648 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
2649} BlockReopenQueueEntry;
2650
2651/*
2652 * Adds a BlockDriverState to a simple queue for an atomic, transactional
2653 * reopen of multiple devices.
2654 *
2655 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
2656 * already performed, or alternatively may be NULL a new BlockReopenQueue will
2657 * be created and initialized. This newly created BlockReopenQueue should be
2658 * passed back in for subsequent calls that are intended to be of the same
2659 * atomic 'set'.
2660 *
2661 * bs is the BlockDriverState to add to the reopen queue.
2662 *
4d2cb092
KW
2663 * options contains the changed options for the associated bs
2664 * (the BlockReopenQueue takes ownership)
2665 *
e971aa12
JC
2666 * flags contains the open flags for the associated bs
2667 *
2668 * returns a pointer to bs_queue, which is either the newly allocated
2669 * bs_queue, or the existing bs_queue being used.
2670 *
2671 */
28518102
KW
2672static BlockReopenQueue *bdrv_reopen_queue_child(BlockReopenQueue *bs_queue,
2673 BlockDriverState *bs,
2674 QDict *options,
2675 int flags,
2676 const BdrvChildRole *role,
2677 QDict *parent_options,
2678 int parent_flags)
e971aa12
JC
2679{
2680 assert(bs != NULL);
2681
2682 BlockReopenQueueEntry *bs_entry;
67251a31 2683 BdrvChild *child;
145f598e 2684 QDict *old_options, *explicit_options;
67251a31 2685
e971aa12
JC
2686 if (bs_queue == NULL) {
2687 bs_queue = g_new0(BlockReopenQueue, 1);
2688 QSIMPLEQ_INIT(bs_queue);
2689 }
2690
4d2cb092
KW
2691 if (!options) {
2692 options = qdict_new();
2693 }
2694
5b7ba05f
AG
2695 /* Check if this BlockDriverState is already in the queue */
2696 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
2697 if (bs == bs_entry->state.bs) {
2698 break;
2699 }
2700 }
2701
28518102
KW
2702 /*
2703 * Precedence of options:
2704 * 1. Explicitly passed in options (highest)
91a097e7 2705 * 2. Set in flags (only for top level)
145f598e 2706 * 3. Retained from explicitly set options of bs
8e2160e2 2707 * 4. Inherited from parent node
28518102
KW
2708 * 5. Retained from effective options of bs
2709 */
2710
91a097e7
KW
2711 if (!parent_options) {
2712 /*
2713 * Any setting represented by flags is always updated. If the
2714 * corresponding QDict option is set, it takes precedence. Otherwise
2715 * the flag is translated into a QDict option. The old setting of bs is
2716 * not considered.
2717 */
2718 update_options_from_flags(options, flags);
2719 }
2720
145f598e 2721 /* Old explicitly set values (don't overwrite by inherited value) */
5b7ba05f
AG
2722 if (bs_entry) {
2723 old_options = qdict_clone_shallow(bs_entry->state.explicit_options);
2724 } else {
2725 old_options = qdict_clone_shallow(bs->explicit_options);
2726 }
145f598e
KW
2727 bdrv_join_options(bs, options, old_options);
2728 QDECREF(old_options);
2729
2730 explicit_options = qdict_clone_shallow(options);
2731
28518102
KW
2732 /* Inherit from parent node */
2733 if (parent_options) {
2734 assert(!flags);
8e2160e2 2735 role->inherit_options(&flags, options, parent_flags, parent_options);
28518102
KW
2736 }
2737
2738 /* Old values are used for options that aren't set yet */
4d2cb092 2739 old_options = qdict_clone_shallow(bs->options);
cddff5ba 2740 bdrv_join_options(bs, options, old_options);
4d2cb092
KW
2741 QDECREF(old_options);
2742
fd452021 2743 /* bdrv_open_inherit() sets and clears some additional flags internally */
f1f25a2e 2744 flags &= ~BDRV_O_PROTOCOL;
fd452021
KW
2745 if (flags & BDRV_O_RDWR) {
2746 flags |= BDRV_O_ALLOW_RDWR;
2747 }
f1f25a2e 2748
67251a31 2749 QLIST_FOREACH(child, &bs->children, next) {
4c9dfe5d
KW
2750 QDict *new_child_options;
2751 char *child_key_dot;
67251a31 2752
4c9dfe5d
KW
2753 /* reopen can only change the options of block devices that were
2754 * implicitly created and inherited options. For other (referenced)
2755 * block devices, a syntax like "backing.foo" results in an error. */
67251a31
KW
2756 if (child->bs->inherits_from != bs) {
2757 continue;
2758 }
2759
4c9dfe5d
KW
2760 child_key_dot = g_strdup_printf("%s.", child->name);
2761 qdict_extract_subqdict(options, &new_child_options, child_key_dot);
2762 g_free(child_key_dot);
2763
28518102
KW
2764 bdrv_reopen_queue_child(bs_queue, child->bs, new_child_options, 0,
2765 child->role, options, flags);
e971aa12
JC
2766 }
2767
5b7ba05f
AG
2768 if (!bs_entry) {
2769 bs_entry = g_new0(BlockReopenQueueEntry, 1);
2770 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
2771 } else {
2772 QDECREF(bs_entry->state.options);
2773 QDECREF(bs_entry->state.explicit_options);
2774 }
e971aa12
JC
2775
2776 bs_entry->state.bs = bs;
4d2cb092 2777 bs_entry->state.options = options;
145f598e 2778 bs_entry->state.explicit_options = explicit_options;
e971aa12
JC
2779 bs_entry->state.flags = flags;
2780
2781 return bs_queue;
2782}
2783
28518102
KW
2784BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
2785 BlockDriverState *bs,
2786 QDict *options, int flags)
2787{
2788 return bdrv_reopen_queue_child(bs_queue, bs, options, flags,
2789 NULL, NULL, 0);
2790}
2791
e971aa12
JC
2792/*
2793 * Reopen multiple BlockDriverStates atomically & transactionally.
2794 *
2795 * The queue passed in (bs_queue) must have been built up previous
2796 * via bdrv_reopen_queue().
2797 *
2798 * Reopens all BDS specified in the queue, with the appropriate
2799 * flags. All devices are prepared for reopen, and failure of any
2800 * device will cause all device changes to be abandonded, and intermediate
2801 * data cleaned up.
2802 *
2803 * If all devices prepare successfully, then the changes are committed
2804 * to all devices.
2805 *
2806 */
720150f3 2807int bdrv_reopen_multiple(AioContext *ctx, BlockReopenQueue *bs_queue, Error **errp)
e971aa12
JC
2808{
2809 int ret = -1;
2810 BlockReopenQueueEntry *bs_entry, *next;
2811 Error *local_err = NULL;
2812
2813 assert(bs_queue != NULL);
2814
c9d1a561 2815 aio_context_release(ctx);
40840e41 2816 bdrv_drain_all_begin();
c9d1a561 2817 aio_context_acquire(ctx);
e971aa12
JC
2818
2819 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
2820 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
2821 error_propagate(errp, local_err);
2822 goto cleanup;
2823 }
2824 bs_entry->prepared = true;
2825 }
2826
2827 /* If we reach this point, we have success and just need to apply the
2828 * changes
2829 */
2830 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
2831 bdrv_reopen_commit(&bs_entry->state);
2832 }
2833
2834 ret = 0;
2835
2836cleanup:
2837 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
2838 if (ret && bs_entry->prepared) {
2839 bdrv_reopen_abort(&bs_entry->state);
145f598e
KW
2840 } else if (ret) {
2841 QDECREF(bs_entry->state.explicit_options);
e971aa12 2842 }
4d2cb092 2843 QDECREF(bs_entry->state.options);
e971aa12
JC
2844 g_free(bs_entry);
2845 }
2846 g_free(bs_queue);
40840e41
AG
2847
2848 bdrv_drain_all_end();
2849
e971aa12
JC
2850 return ret;
2851}
2852
2853
2854/* Reopen a single BlockDriverState with the specified flags. */
2855int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
2856{
2857 int ret = -1;
2858 Error *local_err = NULL;
4d2cb092 2859 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12 2860
720150f3 2861 ret = bdrv_reopen_multiple(bdrv_get_aio_context(bs), queue, &local_err);
e971aa12
JC
2862 if (local_err != NULL) {
2863 error_propagate(errp, local_err);
2864 }
2865 return ret;
2866}
2867
2868
2869/*
2870 * Prepares a BlockDriverState for reopen. All changes are staged in the
2871 * 'opaque' field of the BDRVReopenState, which is used and allocated by
2872 * the block driver layer .bdrv_reopen_prepare()
2873 *
2874 * bs is the BlockDriverState to reopen
2875 * flags are the new open flags
2876 * queue is the reopen queue
2877 *
2878 * Returns 0 on success, non-zero on error. On error errp will be set
2879 * as well.
2880 *
2881 * On failure, bdrv_reopen_abort() will be called to clean up any data.
2882 * It is the responsibility of the caller to then call the abort() or
2883 * commit() for any other BDS that have been left in a prepare() state
2884 *
2885 */
2886int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
2887 Error **errp)
2888{
2889 int ret = -1;
2890 Error *local_err = NULL;
2891 BlockDriver *drv;
ccf9dc07
KW
2892 QemuOpts *opts;
2893 const char *value;
3d8ce171 2894 bool read_only;
e971aa12
JC
2895
2896 assert(reopen_state != NULL);
2897 assert(reopen_state->bs->drv != NULL);
2898 drv = reopen_state->bs->drv;
2899
ccf9dc07
KW
2900 /* Process generic block layer options */
2901 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
2902 qemu_opts_absorb_qdict(opts, reopen_state->options, &local_err);
2903 if (local_err) {
2904 error_propagate(errp, local_err);
2905 ret = -EINVAL;
2906 goto error;
2907 }
2908
91a097e7
KW
2909 update_flags_from_options(&reopen_state->flags, opts);
2910
ccf9dc07
KW
2911 /* node-name and driver must be unchanged. Put them back into the QDict, so
2912 * that they are checked at the end of this function. */
2913 value = qemu_opt_get(opts, "node-name");
2914 if (value) {
46f5ac20 2915 qdict_put_str(reopen_state->options, "node-name", value);
ccf9dc07
KW
2916 }
2917
2918 value = qemu_opt_get(opts, "driver");
2919 if (value) {
46f5ac20 2920 qdict_put_str(reopen_state->options, "driver", value);
ccf9dc07
KW
2921 }
2922
3d8ce171
JC
2923 /* If we are to stay read-only, do not allow permission change
2924 * to r/w. Attempting to set to r/w may fail if either BDRV_O_ALLOW_RDWR is
2925 * not set, or if the BDS still has copy_on_read enabled */
2926 read_only = !(reopen_state->flags & BDRV_O_RDWR);
54a32bfe 2927 ret = bdrv_can_set_read_only(reopen_state->bs, read_only, true, &local_err);
3d8ce171
JC
2928 if (local_err) {
2929 error_propagate(errp, local_err);
e971aa12
JC
2930 goto error;
2931 }
2932
2933
2934 ret = bdrv_flush(reopen_state->bs);
2935 if (ret) {
455b0fde 2936 error_setg_errno(errp, -ret, "Error flushing drive");
e971aa12
JC
2937 goto error;
2938 }
2939
2940 if (drv->bdrv_reopen_prepare) {
2941 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
2942 if (ret) {
2943 if (local_err != NULL) {
2944 error_propagate(errp, local_err);
2945 } else {
d8b6895f
LC
2946 error_setg(errp, "failed while preparing to reopen image '%s'",
2947 reopen_state->bs->filename);
e971aa12
JC
2948 }
2949 goto error;
2950 }
2951 } else {
2952 /* It is currently mandatory to have a bdrv_reopen_prepare()
2953 * handler for each supported drv. */
81e5f78a
AG
2954 error_setg(errp, "Block format '%s' used by node '%s' "
2955 "does not support reopening files", drv->format_name,
2956 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
2957 ret = -1;
2958 goto error;
2959 }
2960
4d2cb092
KW
2961 /* Options that are not handled are only okay if they are unchanged
2962 * compared to the old state. It is expected that some options are only
2963 * used for the initial open, but not reopen (e.g. filename) */
2964 if (qdict_size(reopen_state->options)) {
2965 const QDictEntry *entry = qdict_first(reopen_state->options);
2966
2967 do {
2968 QString *new_obj = qobject_to_qstring(entry->value);
2969 const char *new = qstring_get_str(new_obj);
129c7d1c
MA
2970 /*
2971 * Caution: while qdict_get_try_str() is fine, getting
2972 * non-string types would require more care. When
2973 * bs->options come from -blockdev or blockdev_add, its
2974 * members are typed according to the QAPI schema, but
2975 * when they come from -drive, they're all QString.
2976 */
4d2cb092
KW
2977 const char *old = qdict_get_try_str(reopen_state->bs->options,
2978 entry->key);
2979
2980 if (!old || strcmp(new, old)) {
2981 error_setg(errp, "Cannot change the option '%s'", entry->key);
2982 ret = -EINVAL;
2983 goto error;
2984 }
2985 } while ((entry = qdict_next(reopen_state->options, entry)));
2986 }
2987
e971aa12
JC
2988 ret = 0;
2989
2990error:
ccf9dc07 2991 qemu_opts_del(opts);
e971aa12
JC
2992 return ret;
2993}
2994
2995/*
2996 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
2997 * makes them final by swapping the staging BlockDriverState contents into
2998 * the active BlockDriverState contents.
2999 */
3000void bdrv_reopen_commit(BDRVReopenState *reopen_state)
3001{
3002 BlockDriver *drv;
50bf65ba 3003 BlockDriverState *bs;
cb9ff6c2 3004 bool old_can_write, new_can_write;
e971aa12
JC
3005
3006 assert(reopen_state != NULL);
50bf65ba
VSO
3007 bs = reopen_state->bs;
3008 drv = bs->drv;
e971aa12
JC
3009 assert(drv != NULL);
3010
cb9ff6c2
VSO
3011 old_can_write =
3012 !bdrv_is_read_only(bs) && !(bdrv_get_flags(bs) & BDRV_O_INACTIVE);
3013
e971aa12
JC
3014 /* If there are any driver level actions to take */
3015 if (drv->bdrv_reopen_commit) {
3016 drv->bdrv_reopen_commit(reopen_state);
3017 }
3018
3019 /* set BDS specific flags now */
50bf65ba 3020 QDECREF(bs->explicit_options);
145f598e 3021
50bf65ba
VSO
3022 bs->explicit_options = reopen_state->explicit_options;
3023 bs->open_flags = reopen_state->flags;
3024 bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 3025
50bf65ba 3026 bdrv_refresh_limits(bs, NULL);
cb9ff6c2
VSO
3027
3028 new_can_write =
3029 !bdrv_is_read_only(bs) && !(bdrv_get_flags(bs) & BDRV_O_INACTIVE);
3030 if (!old_can_write && new_can_write && drv->bdrv_reopen_bitmaps_rw) {
3031 Error *local_err = NULL;
3032 if (drv->bdrv_reopen_bitmaps_rw(bs, &local_err) < 0) {
3033 /* This is not fatal, bitmaps just left read-only, so all following
3034 * writes will fail. User can remove read-only bitmaps to unblock
3035 * writes.
3036 */
3037 error_reportf_err(local_err,
3038 "%s: Failed to make dirty bitmaps writable: ",
3039 bdrv_get_node_name(bs));
3040 }
3041 }
e971aa12
JC
3042}
3043
3044/*
3045 * Abort the reopen, and delete and free the staged changes in
3046 * reopen_state
3047 */
3048void bdrv_reopen_abort(BDRVReopenState *reopen_state)
3049{
3050 BlockDriver *drv;
3051
3052 assert(reopen_state != NULL);
3053 drv = reopen_state->bs->drv;
3054 assert(drv != NULL);
3055
3056 if (drv->bdrv_reopen_abort) {
3057 drv->bdrv_reopen_abort(reopen_state);
3058 }
145f598e
KW
3059
3060 QDECREF(reopen_state->explicit_options);
e971aa12
JC
3061}
3062
3063
64dff520 3064static void bdrv_close(BlockDriverState *bs)
fc01f7e7 3065{
33384421
HR
3066 BdrvAioNotifier *ban, *ban_next;
3067
ca9bd24c 3068 assert(!bs->job);
30f55fb8 3069 assert(!bs->refcnt);
99b7e775 3070
fc27291d 3071 bdrv_drained_begin(bs); /* complete I/O */
58fda173 3072 bdrv_flush(bs);
53ec73e2 3073 bdrv_drain(bs); /* in case flush left pending I/O */
fc27291d 3074
3cbc002c 3075 if (bs->drv) {
6e93e7c4
KW
3076 BdrvChild *child, *next;
3077
9a7dedbc 3078 bs->drv->bdrv_close(bs);
9a4f4c31 3079 bs->drv = NULL;
9a7dedbc 3080
12fa4af6 3081 bdrv_set_backing_hd(bs, NULL, &error_abort);
9a7dedbc 3082
9a4f4c31
KW
3083 if (bs->file != NULL) {
3084 bdrv_unref_child(bs, bs->file);
3085 bs->file = NULL;
3086 }
3087
6e93e7c4 3088 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
3089 /* TODO Remove bdrv_unref() from drivers' close function and use
3090 * bdrv_unref_child() here */
bddcec37
KW
3091 if (child->bs->inherits_from == bs) {
3092 child->bs->inherits_from = NULL;
3093 }
33a60407 3094 bdrv_detach_child(child);
6e93e7c4
KW
3095 }
3096
7267c094 3097 g_free(bs->opaque);
ea2384d3 3098 bs->opaque = NULL;
d3faa13e 3099 atomic_set(&bs->copy_on_read, 0);
a275fa42
PB
3100 bs->backing_file[0] = '\0';
3101 bs->backing_format[0] = '\0';
6405875c 3102 bs->total_sectors = 0;
54115412 3103 bs->encrypted = false;
54115412 3104 bs->sg = false;
de9c0cec 3105 QDECREF(bs->options);
145f598e 3106 QDECREF(bs->explicit_options);
de9c0cec 3107 bs->options = NULL;
998cbd6a 3108 bs->explicit_options = NULL;
91af7014
HR
3109 QDECREF(bs->full_open_options);
3110 bs->full_open_options = NULL;
b338082b 3111 }
98f90dba 3112
cca43ae1
VSO
3113 bdrv_release_named_dirty_bitmaps(bs);
3114 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
3115
33384421
HR
3116 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
3117 g_free(ban);
3118 }
3119 QLIST_INIT(&bs->aio_notifiers);
fc27291d 3120 bdrv_drained_end(bs);
b338082b
FB
3121}
3122
2bc93fed
MK
3123void bdrv_close_all(void)
3124{
a1a2af07 3125 block_job_cancel_sync_all();
cd7fca95 3126 nbd_export_close_all();
ca9bd24c
HR
3127
3128 /* Drop references from requests still in flight, such as canceled block
3129 * jobs whose AIO context has not been polled yet */
3130 bdrv_drain_all();
2bc93fed 3131
ca9bd24c
HR
3132 blk_remove_all_bs();
3133 blockdev_close_all_bdrv_states();
ed78cda3 3134
a1a2af07 3135 assert(QTAILQ_EMPTY(&all_bdrv_states));
2bc93fed
MK
3136}
3137
d0ac0380
KW
3138static bool should_update_child(BdrvChild *c, BlockDriverState *to)
3139{
3140 BdrvChild *to_c;
3141
3142 if (c->role->stay_at_node) {
3143 return false;
3144 }
3145
3146 if (c->role == &child_backing) {
3147 /* If @from is a backing file of @to, ignore the child to avoid
3148 * creating a loop. We only want to change the pointer of other
3149 * parents. */
3150 QLIST_FOREACH(to_c, &to->children, next) {
3151 if (to_c == c) {
3152 break;
3153 }
3154 }
3155 if (to_c) {
3156 return false;
3157 }
3158 }
3159
3160 return true;
3161}
3162
5fe31c25
KW
3163void bdrv_replace_node(BlockDriverState *from, BlockDriverState *to,
3164 Error **errp)
dd62f1ca 3165{
d0ac0380 3166 BdrvChild *c, *next;
234ac1a9
KW
3167 GSList *list = NULL, *p;
3168 uint64_t old_perm, old_shared;
3169 uint64_t perm = 0, shared = BLK_PERM_ALL;
3170 int ret;
3171
5fe31c25
KW
3172 assert(!atomic_read(&from->in_flight));
3173 assert(!atomic_read(&to->in_flight));
dd62f1ca 3174
234ac1a9
KW
3175 /* Make sure that @from doesn't go away until we have successfully attached
3176 * all of its parents to @to. */
3177 bdrv_ref(from);
dd62f1ca 3178
234ac1a9 3179 /* Put all parents into @list and calculate their cumulative permissions */
dd62f1ca 3180 QLIST_FOREACH_SAFE(c, &from->parents, next_parent, next) {
d0ac0380 3181 if (!should_update_child(c, to)) {
26de9438
KW
3182 continue;
3183 }
234ac1a9
KW
3184 list = g_slist_prepend(list, c);
3185 perm |= c->perm;
3186 shared &= c->shared_perm;
3187 }
3188
3189 /* Check whether the required permissions can be granted on @to, ignoring
3190 * all BdrvChild in @list so that they can't block themselves. */
3121fb45 3191 ret = bdrv_check_update_perm(to, NULL, perm, shared, list, errp);
234ac1a9
KW
3192 if (ret < 0) {
3193 bdrv_abort_perm_update(to);
3194 goto out;
3195 }
3196
3197 /* Now actually perform the change. We performed the permission check for
3198 * all elements of @list at once, so set the permissions all at once at the
3199 * very end. */
3200 for (p = list; p != NULL; p = p->next) {
3201 c = p->data;
9bd910e2 3202
dd62f1ca 3203 bdrv_ref(to);
234ac1a9 3204 bdrv_replace_child_noperm(c, to);
dd62f1ca
KW
3205 bdrv_unref(from);
3206 }
234ac1a9
KW
3207
3208 bdrv_get_cumulative_perm(to, &old_perm, &old_shared);
3209 bdrv_set_perm(to, old_perm | perm, old_shared | shared);
3210
3211out:
3212 g_slist_free(list);
3213 bdrv_unref(from);
dd62f1ca
KW
3214}
3215
4ddc07ca
PB
3216/*
3217 * Add new bs contents at the top of an image chain while the chain is
3218 * live, while keeping required fields on the top layer.
3219 *
3220 * This will modify the BlockDriverState fields, and swap contents
3221 * between bs_new and bs_top. Both bs_new and bs_top are modified.
3222 *
bfb197e0 3223 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
3224 *
3225 * This function does not create any image files.
dd62f1ca
KW
3226 *
3227 * bdrv_append() takes ownership of a bs_new reference and unrefs it because
3228 * that's what the callers commonly need. bs_new will be referenced by the old
3229 * parents of bs_top after bdrv_append() returns. If the caller needs to keep a
3230 * reference of its own, it must call bdrv_ref().
4ddc07ca 3231 */
b2c2832c
KW
3232void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top,
3233 Error **errp)
4ddc07ca 3234{
b2c2832c
KW
3235 Error *local_err = NULL;
3236
b2c2832c
KW
3237 bdrv_set_backing_hd(bs_new, bs_top, &local_err);
3238 if (local_err) {
3239 error_propagate(errp, local_err);
3240 goto out;
3241 }
dd62f1ca 3242
5fe31c25 3243 bdrv_replace_node(bs_top, bs_new, &local_err);
234ac1a9
KW
3244 if (local_err) {
3245 error_propagate(errp, local_err);
3246 bdrv_set_backing_hd(bs_new, NULL, &error_abort);
3247 goto out;
3248 }
4ddc07ca 3249
dd62f1ca
KW
3250 /* bs_new is now referenced by its new parents, we don't need the
3251 * additional reference any more. */
b2c2832c 3252out:
dd62f1ca 3253 bdrv_unref(bs_new);
8802d1fd
JC
3254}
3255
4f6fd349 3256static void bdrv_delete(BlockDriverState *bs)
b338082b 3257{
3e914655 3258 assert(!bs->job);
3718d8ab 3259 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 3260 assert(!bs->refcnt);
18846dee 3261
e1b5c52e
SH
3262 bdrv_close(bs);
3263
1b7bdbc1 3264 /* remove from list, if necessary */
63eaaae0
KW
3265 if (bs->node_name[0] != '\0') {
3266 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
3267 }
2c1d04e0
HR
3268 QTAILQ_REMOVE(&all_bdrv_states, bs, bs_list);
3269
7267c094 3270 g_free(bs);
fc01f7e7
FB
3271}
3272
e97fc193
AL
3273/*
3274 * Run consistency checks on an image
3275 *
e076f338 3276 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 3277 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 3278 * check are stored in res.
e97fc193 3279 */
4534ff54 3280int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 3281{
908bcd54
HR
3282 if (bs->drv == NULL) {
3283 return -ENOMEDIUM;
3284 }
e97fc193
AL
3285 if (bs->drv->bdrv_check == NULL) {
3286 return -ENOTSUP;
3287 }
3288
e076f338 3289 memset(res, 0, sizeof(*res));
4534ff54 3290 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
3291}
3292
756e6736
KW
3293/*
3294 * Return values:
3295 * 0 - success
3296 * -EINVAL - backing format specified, but no file
3297 * -ENOSPC - can't update the backing file because no space is left in the
3298 * image file header
3299 * -ENOTSUP - format driver doesn't support changing the backing file
3300 */
3301int bdrv_change_backing_file(BlockDriverState *bs,
3302 const char *backing_file, const char *backing_fmt)
3303{
3304 BlockDriver *drv = bs->drv;
469ef350 3305 int ret;
756e6736 3306
5f377794
PB
3307 /* Backing file format doesn't make sense without a backing file */
3308 if (backing_fmt && !backing_file) {
3309 return -EINVAL;
3310 }
3311
756e6736 3312 if (drv->bdrv_change_backing_file != NULL) {
469ef350 3313 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 3314 } else {
469ef350 3315 ret = -ENOTSUP;
756e6736 3316 }
469ef350
PB
3317
3318 if (ret == 0) {
3319 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
3320 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
3321 }
3322 return ret;
756e6736
KW
3323}
3324
6ebdcee2
JC
3325/*
3326 * Finds the image layer in the chain that has 'bs' as its backing file.
3327 *
3328 * active is the current topmost image.
3329 *
3330 * Returns NULL if bs is not found in active's image chain,
3331 * or if active == bs.
4caf0fcd
JC
3332 *
3333 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
3334 */
3335BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
3336 BlockDriverState *bs)
3337{
760e0063
KW
3338 while (active && bs != backing_bs(active)) {
3339 active = backing_bs(active);
6ebdcee2
JC
3340 }
3341
4caf0fcd
JC
3342 return active;
3343}
6ebdcee2 3344
4caf0fcd
JC
3345/* Given a BDS, searches for the base layer. */
3346BlockDriverState *bdrv_find_base(BlockDriverState *bs)
3347{
3348 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
3349}
3350
6ebdcee2
JC
3351/*
3352 * Drops images above 'base' up to and including 'top', and sets the image
3353 * above 'top' to have base as its backing file.
3354 *
3355 * Requires that the overlay to 'top' is opened r/w, so that the backing file
3356 * information in 'bs' can be properly updated.
3357 *
3358 * E.g., this will convert the following chain:
3359 * bottom <- base <- intermediate <- top <- active
3360 *
3361 * to
3362 *
3363 * bottom <- base <- active
3364 *
3365 * It is allowed for bottom==base, in which case it converts:
3366 *
3367 * base <- intermediate <- top <- active
3368 *
3369 * to
3370 *
3371 * base <- active
3372 *
54e26900
JC
3373 * If backing_file_str is non-NULL, it will be used when modifying top's
3374 * overlay image metadata.
3375 *
6ebdcee2
JC
3376 * Error conditions:
3377 * if active == top, that is considered an error
3378 *
3379 */
3380int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 3381 BlockDriverState *base, const char *backing_file_str)
6ebdcee2 3382{
6ebdcee2 3383 BlockDriverState *new_top_bs = NULL;
12fa4af6 3384 Error *local_err = NULL;
6ebdcee2
JC
3385 int ret = -EIO;
3386
6ebdcee2
JC
3387 if (!top->drv || !base->drv) {
3388 goto exit;
3389 }
3390
3391 new_top_bs = bdrv_find_overlay(active, top);
3392
3393 if (new_top_bs == NULL) {
3394 /* we could not find the image above 'top', this is an error */
3395 goto exit;
3396 }
3397
760e0063 3398 /* special case of new_top_bs->backing->bs already pointing to base - nothing
6ebdcee2 3399 * to do, no intermediate images */
760e0063 3400 if (backing_bs(new_top_bs) == base) {
6ebdcee2
JC
3401 ret = 0;
3402 goto exit;
3403 }
3404
5db15a57
KW
3405 /* Make sure that base is in the backing chain of top */
3406 if (!bdrv_chain_contains(top, base)) {
6ebdcee2
JC
3407 goto exit;
3408 }
3409
3410 /* success - we can delete the intermediate states, and link top->base */
5db15a57 3411 backing_file_str = backing_file_str ? backing_file_str : base->filename;
54e26900 3412 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
5db15a57 3413 base->drv ? base->drv->format_name : "");
6ebdcee2
JC
3414 if (ret) {
3415 goto exit;
3416 }
12fa4af6
KW
3417
3418 bdrv_set_backing_hd(new_top_bs, base, &local_err);
3419 if (local_err) {
3420 ret = -EPERM;
3421 error_report_err(local_err);
3422 goto exit;
3423 }
6ebdcee2 3424
6ebdcee2 3425 ret = 0;
6ebdcee2 3426exit:
6ebdcee2
JC
3427 return ret;
3428}
3429
61007b31
SH
3430/**
3431 * Truncate file to 'offset' bytes (needed only for file protocols)
3432 */
7ea37c30
HR
3433int bdrv_truncate(BdrvChild *child, int64_t offset, PreallocMode prealloc,
3434 Error **errp)
71d0770c 3435{
52cdbc58 3436 BlockDriverState *bs = child->bs;
61007b31
SH
3437 BlockDriver *drv = bs->drv;
3438 int ret;
c8f6d58e 3439
362b3786 3440 assert(child->perm & BLK_PERM_RESIZE);
c8f6d58e 3441
5a612c00 3442 /* if bs->drv == NULL, bs is closed, so there's nothing to do here */
ed3d2ec9
HR
3443 if (!drv) {
3444 error_setg(errp, "No medium inserted");
71d0770c 3445 return -ENOMEDIUM;
ed3d2ec9
HR
3446 }
3447 if (!drv->bdrv_truncate) {
5a612c00
MP
3448 if (bs->file && drv->is_filter) {
3449 return bdrv_truncate(bs->file, offset, prealloc, errp);
3450 }
ed3d2ec9 3451 error_setg(errp, "Image format driver does not support resize");
61007b31 3452 return -ENOTSUP;
ed3d2ec9
HR
3453 }
3454 if (bs->read_only) {
3455 error_setg(errp, "Image is read-only");
61007b31 3456 return -EACCES;
ed3d2ec9 3457 }
71d0770c 3458
504c205a
DL
3459 assert(!(bs->open_flags & BDRV_O_INACTIVE));
3460
7ea37c30 3461 ret = drv->bdrv_truncate(bs, offset, prealloc, errp);
61007b31
SH
3462 if (ret == 0) {
3463 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
3464 bdrv_dirty_bitmap_truncate(bs);
5c8cab48 3465 bdrv_parent_cb_resize(bs);
47fec599 3466 atomic_inc(&bs->write_gen);
c0191e76 3467 }
61007b31 3468 return ret;
71d0770c
AL
3469}
3470
61007b31
SH
3471/**
3472 * Length of a allocated file in bytes. Sparse files are counted by actual
3473 * allocated space. Return < 0 if error or unknown.
3474 */
3475int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 3476{
61007b31
SH
3477 BlockDriver *drv = bs->drv;
3478 if (!drv) {
3479 return -ENOMEDIUM;
8f4754ed 3480 }
61007b31
SH
3481 if (drv->bdrv_get_allocated_file_size) {
3482 return drv->bdrv_get_allocated_file_size(bs);
3483 }
3484 if (bs->file) {
9a4f4c31 3485 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 3486 }
61007b31 3487 return -ENOTSUP;
1c9805a3 3488}
e7a8a783 3489
90880ff1
SH
3490/*
3491 * bdrv_measure:
3492 * @drv: Format driver
3493 * @opts: Creation options for new image
3494 * @in_bs: Existing image containing data for new image (may be NULL)
3495 * @errp: Error object
3496 * Returns: A #BlockMeasureInfo (free using qapi_free_BlockMeasureInfo())
3497 * or NULL on error
3498 *
3499 * Calculate file size required to create a new image.
3500 *
3501 * If @in_bs is given then space for allocated clusters and zero clusters
3502 * from that image are included in the calculation. If @opts contains a
3503 * backing file that is shared by @in_bs then backing clusters may be omitted
3504 * from the calculation.
3505 *
3506 * If @in_bs is NULL then the calculation includes no allocated clusters
3507 * unless a preallocation option is given in @opts.
3508 *
3509 * Note that @in_bs may use a different BlockDriver from @drv.
3510 *
3511 * If an error occurs the @errp pointer is set.
3512 */
3513BlockMeasureInfo *bdrv_measure(BlockDriver *drv, QemuOpts *opts,
3514 BlockDriverState *in_bs, Error **errp)
3515{
3516 if (!drv->bdrv_measure) {
3517 error_setg(errp, "Block driver '%s' does not support size measurement",
3518 drv->format_name);
3519 return NULL;
3520 }
3521
3522 return drv->bdrv_measure(opts, in_bs, errp);
3523}
3524
61007b31
SH
3525/**
3526 * Return number of sectors on success, -errno on error.
1c9805a3 3527 */
61007b31 3528int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 3529{
61007b31 3530 BlockDriver *drv = bs->drv;
498e386c 3531
61007b31
SH
3532 if (!drv)
3533 return -ENOMEDIUM;
2572b37a 3534
61007b31
SH
3535 if (drv->has_variable_length) {
3536 int ret = refresh_total_sectors(bs, bs->total_sectors);
3537 if (ret < 0) {
3538 return ret;
1c9805a3
SH
3539 }
3540 }
61007b31 3541 return bs->total_sectors;
1c9805a3 3542}
b338082b 3543
61007b31
SH
3544/**
3545 * Return length in bytes on success, -errno on error.
3546 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 3547 */
61007b31 3548int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 3549{
61007b31 3550 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 3551
4a9c9ea0 3552 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 3553 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
3554}
3555
61007b31
SH
3556/* return 0 as number of sectors if no device present or error */
3557void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 3558{
61007b31 3559 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 3560
61007b31 3561 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
3562}
3563
54115412 3564bool bdrv_is_sg(BlockDriverState *bs)
f08145fe 3565{
61007b31 3566 return bs->sg;
f08145fe
KW
3567}
3568
54115412 3569bool bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 3570{
760e0063 3571 if (bs->backing && bs->backing->bs->encrypted) {
54115412 3572 return true;
760e0063 3573 }
61007b31 3574 return bs->encrypted;
fc3959e4
FZ
3575}
3576
61007b31 3577const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 3578{
61007b31 3579 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
3580}
3581
61007b31 3582static int qsort_strcmp(const void *a, const void *b)
40b4f539 3583{
ceff5bd7 3584 return strcmp(*(char *const *)a, *(char *const *)b);
40b4f539
KW
3585}
3586
61007b31
SH
3587void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
3588 void *opaque)
40b4f539 3589{
61007b31
SH
3590 BlockDriver *drv;
3591 int count = 0;
3592 int i;
3593 const char **formats = NULL;
40b4f539 3594
61007b31
SH
3595 QLIST_FOREACH(drv, &bdrv_drivers, list) {
3596 if (drv->format_name) {
3597 bool found = false;
3598 int i = count;
3599 while (formats && i && !found) {
3600 found = !strcmp(formats[--i], drv->format_name);
3601 }
e2a305fb 3602
61007b31
SH
3603 if (!found) {
3604 formats = g_renew(const char *, formats, count + 1);
3605 formats[count++] = drv->format_name;
3606 }
6c5a42ac 3607 }
61007b31 3608 }
6c5a42ac 3609
eb0df69f
HR
3610 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); i++) {
3611 const char *format_name = block_driver_modules[i].format_name;
3612
3613 if (format_name) {
3614 bool found = false;
3615 int j = count;
3616
3617 while (formats && j && !found) {
3618 found = !strcmp(formats[--j], format_name);
3619 }
3620
3621 if (!found) {
3622 formats = g_renew(const char *, formats, count + 1);
3623 formats[count++] = format_name;
3624 }
3625 }
3626 }
3627
61007b31 3628 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 3629
61007b31
SH
3630 for (i = 0; i < count; i++) {
3631 it(opaque, formats[i]);
3632 }
40b4f539 3633
61007b31
SH
3634 g_free(formats);
3635}
40b4f539 3636
61007b31
SH
3637/* This function is to find a node in the bs graph */
3638BlockDriverState *bdrv_find_node(const char *node_name)
3639{
3640 BlockDriverState *bs;
391827eb 3641
61007b31 3642 assert(node_name);
40b4f539 3643
61007b31
SH
3644 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
3645 if (!strcmp(node_name, bs->node_name)) {
3646 return bs;
40b4f539
KW
3647 }
3648 }
61007b31 3649 return NULL;
40b4f539
KW
3650}
3651
61007b31
SH
3652/* Put this QMP function here so it can access the static graph_bdrv_states. */
3653BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 3654{
61007b31
SH
3655 BlockDeviceInfoList *list, *entry;
3656 BlockDriverState *bs;
40b4f539 3657
61007b31
SH
3658 list = NULL;
3659 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
c83f9fba 3660 BlockDeviceInfo *info = bdrv_block_device_info(NULL, bs, errp);
61007b31
SH
3661 if (!info) {
3662 qapi_free_BlockDeviceInfoList(list);
3663 return NULL;
301db7c2 3664 }
61007b31
SH
3665 entry = g_malloc0(sizeof(*entry));
3666 entry->value = info;
3667 entry->next = list;
3668 list = entry;
301db7c2
RH
3669 }
3670
61007b31
SH
3671 return list;
3672}
40b4f539 3673
61007b31
SH
3674BlockDriverState *bdrv_lookup_bs(const char *device,
3675 const char *node_name,
3676 Error **errp)
3677{
3678 BlockBackend *blk;
3679 BlockDriverState *bs;
40b4f539 3680
61007b31
SH
3681 if (device) {
3682 blk = blk_by_name(device);
40b4f539 3683
61007b31 3684 if (blk) {
9f4ed6fb
AG
3685 bs = blk_bs(blk);
3686 if (!bs) {
5433c24f 3687 error_setg(errp, "Device '%s' has no medium", device);
5433c24f
HR
3688 }
3689
9f4ed6fb 3690 return bs;
61007b31
SH
3691 }
3692 }
40b4f539 3693
61007b31
SH
3694 if (node_name) {
3695 bs = bdrv_find_node(node_name);
6d519a5f 3696
61007b31
SH
3697 if (bs) {
3698 return bs;
3699 }
40b4f539
KW
3700 }
3701
61007b31
SH
3702 error_setg(errp, "Cannot find device=%s nor node_name=%s",
3703 device ? device : "",
3704 node_name ? node_name : "");
3705 return NULL;
40b4f539
KW
3706}
3707
61007b31
SH
3708/* If 'base' is in the same chain as 'top', return true. Otherwise,
3709 * return false. If either argument is NULL, return false. */
3710bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 3711{
61007b31 3712 while (top && top != base) {
760e0063 3713 top = backing_bs(top);
02c50efe 3714 }
61007b31
SH
3715
3716 return top != NULL;
02c50efe
FZ
3717}
3718
61007b31 3719BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 3720{
61007b31
SH
3721 if (!bs) {
3722 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 3723 }
61007b31 3724 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
3725}
3726
61007b31 3727const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 3728{
61007b31 3729 return bs->node_name;
beac80cd
FB
3730}
3731
1f0c461b 3732const char *bdrv_get_parent_name(const BlockDriverState *bs)
4c265bf9
KW
3733{
3734 BdrvChild *c;
3735 const char *name;
3736
3737 /* If multiple parents have a name, just pick the first one. */
3738 QLIST_FOREACH(c, &bs->parents, next_parent) {
3739 if (c->role->get_name) {
3740 name = c->role->get_name(c);
3741 if (name && *name) {
3742 return name;
3743 }
3744 }
3745 }
3746
3747 return NULL;
3748}
3749
61007b31
SH
3750/* TODO check what callers really want: bs->node_name or blk_name() */
3751const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 3752{
4c265bf9 3753 return bdrv_get_parent_name(bs) ?: "";
f141eafe 3754}
83f64091 3755
61007b31
SH
3756/* This can be used to identify nodes that might not have a device
3757 * name associated. Since node and device names live in the same
3758 * namespace, the result is unambiguous. The exception is if both are
3759 * absent, then this returns an empty (non-null) string. */
3760const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 3761{
4c265bf9 3762 return bdrv_get_parent_name(bs) ?: bs->node_name;
beac80cd 3763}
beac80cd 3764
61007b31 3765int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 3766{
61007b31 3767 return bs->open_flags;
0b5a2445
PB
3768}
3769
61007b31 3770int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 3771{
61007b31 3772 return 1;
0b5a2445
PB
3773}
3774
61007b31 3775int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 3776{
61007b31 3777 assert(bs->drv);
0b5a2445 3778
61007b31
SH
3779 /* If BS is a copy on write image, it is initialized to
3780 the contents of the base image, which may not be zeroes. */
760e0063 3781 if (bs->backing) {
61007b31
SH
3782 return 0;
3783 }
3784 if (bs->drv->bdrv_has_zero_init) {
3785 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 3786 }
5a612c00
MP
3787 if (bs->file && bs->drv->is_filter) {
3788 return bdrv_has_zero_init(bs->file->bs);
3789 }
61007b31
SH
3790
3791 /* safe default */
3792 return 0;
68485420
KW
3793}
3794
61007b31 3795bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 3796{
61007b31 3797 BlockDriverInfo bdi;
b2a61371 3798
760e0063 3799 if (bs->backing) {
61007b31
SH
3800 return false;
3801 }
3802
3803 if (bdrv_get_info(bs, &bdi) == 0) {
3804 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
3805 }
3806
61007b31 3807 return false;
b2a61371
SH
3808}
3809
61007b31 3810bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 3811{
61007b31 3812 BlockDriverInfo bdi;
68485420 3813
2f0342ef 3814 if (!(bs->open_flags & BDRV_O_UNMAP)) {
61007b31
SH
3815 return false;
3816 }
68485420 3817
61007b31
SH
3818 if (bdrv_get_info(bs, &bdi) == 0) {
3819 return bdi.can_write_zeroes_with_unmap;
3820 }
68485420 3821
61007b31 3822 return false;
68485420
KW
3823}
3824
61007b31 3825const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 3826{
760e0063 3827 if (bs->backing && bs->backing->bs->encrypted)
61007b31
SH
3828 return bs->backing_file;
3829 else if (bs->encrypted)
3830 return bs->filename;
3831 else
3832 return NULL;
b2e12bc6
CH
3833}
3834
61007b31
SH
3835void bdrv_get_backing_filename(BlockDriverState *bs,
3836 char *filename, int filename_size)
016f5cf6 3837{
61007b31
SH
3838 pstrcpy(filename, filename_size, bs->backing_file);
3839}
d318aea9 3840
61007b31
SH
3841int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
3842{
3843 BlockDriver *drv = bs->drv;
5a612c00
MP
3844 /* if bs->drv == NULL, bs is closed, so there's nothing to do here */
3845 if (!drv) {
61007b31 3846 return -ENOMEDIUM;
5a612c00
MP
3847 }
3848 if (!drv->bdrv_get_info) {
3849 if (bs->file && drv->is_filter) {
3850 return bdrv_get_info(bs->file->bs, bdi);
3851 }
61007b31 3852 return -ENOTSUP;
5a612c00 3853 }
61007b31
SH
3854 memset(bdi, 0, sizeof(*bdi));
3855 return drv->bdrv_get_info(bs, bdi);
3856}
016f5cf6 3857
61007b31
SH
3858ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
3859{
3860 BlockDriver *drv = bs->drv;
3861 if (drv && drv->bdrv_get_specific_info) {
3862 return drv->bdrv_get_specific_info(bs);
3863 }
3864 return NULL;
016f5cf6
AG
3865}
3866
a31939e6 3867void bdrv_debug_event(BlockDriverState *bs, BlkdebugEvent event)
4265d620 3868{
61007b31
SH
3869 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
3870 return;
3871 }
4265d620 3872
61007b31 3873 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
3874}
3875
61007b31
SH
3876int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
3877 const char *tag)
4265d620 3878{
61007b31 3879 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 3880 bs = bs->file ? bs->file->bs : NULL;
61007b31 3881 }
4265d620 3882
61007b31
SH
3883 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
3884 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
3885 }
4265d620 3886
61007b31 3887 return -ENOTSUP;
4265d620
PB
3888}
3889
61007b31 3890int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 3891{
61007b31 3892 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 3893 bs = bs->file ? bs->file->bs : NULL;
61007b31 3894 }
ce1a14dc 3895
61007b31
SH
3896 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
3897 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
3898 }
3899
3900 return -ENOTSUP;
eb852011
MA
3901}
3902
61007b31 3903int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 3904{
61007b31 3905 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 3906 bs = bs->file ? bs->file->bs : NULL;
61007b31 3907 }
ce1a14dc 3908
61007b31
SH
3909 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
3910 return bs->drv->bdrv_debug_resume(bs, tag);
3911 }
ce1a14dc 3912
61007b31 3913 return -ENOTSUP;
f197fe2b
FZ
3914}
3915
61007b31 3916bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 3917{
61007b31 3918 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 3919 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 3920 }
19cb3738 3921
61007b31
SH
3922 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
3923 return bs->drv->bdrv_debug_is_suspended(bs, tag);
3924 }
f9f05dc5 3925
61007b31
SH
3926 return false;
3927}
f9f05dc5 3928
61007b31
SH
3929/* backing_file can either be relative, or absolute, or a protocol. If it is
3930 * relative, it must be relative to the chain. So, passing in bs->filename
3931 * from a BDS as backing_file should not be done, as that may be relative to
3932 * the CWD rather than the chain. */
3933BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
3934 const char *backing_file)
f9f05dc5 3935{
61007b31
SH
3936 char *filename_full = NULL;
3937 char *backing_file_full = NULL;
3938 char *filename_tmp = NULL;
3939 int is_protocol = 0;
3940 BlockDriverState *curr_bs = NULL;
3941 BlockDriverState *retval = NULL;
418661e0 3942 Error *local_error = NULL;
f9f05dc5 3943
61007b31
SH
3944 if (!bs || !bs->drv || !backing_file) {
3945 return NULL;
f9f05dc5
KW
3946 }
3947
61007b31
SH
3948 filename_full = g_malloc(PATH_MAX);
3949 backing_file_full = g_malloc(PATH_MAX);
3950 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 3951
61007b31 3952 is_protocol = path_has_protocol(backing_file);
f9f05dc5 3953
760e0063 3954 for (curr_bs = bs; curr_bs->backing; curr_bs = curr_bs->backing->bs) {
f9f05dc5 3955
61007b31
SH
3956 /* If either of the filename paths is actually a protocol, then
3957 * compare unmodified paths; otherwise make paths relative */
3958 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
3959 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
760e0063 3960 retval = curr_bs->backing->bs;
61007b31
SH
3961 break;
3962 }
418661e0
JC
3963 /* Also check against the full backing filename for the image */
3964 bdrv_get_full_backing_filename(curr_bs, backing_file_full, PATH_MAX,
3965 &local_error);
3966 if (local_error == NULL) {
3967 if (strcmp(backing_file, backing_file_full) == 0) {
3968 retval = curr_bs->backing->bs;
3969 break;
3970 }
3971 } else {
3972 error_free(local_error);
3973 local_error = NULL;
3974 }
61007b31
SH
3975 } else {
3976 /* If not an absolute filename path, make it relative to the current
3977 * image's filename path */
3978 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3979 backing_file);
f9f05dc5 3980
61007b31
SH
3981 /* We are going to compare absolute pathnames */
3982 if (!realpath(filename_tmp, filename_full)) {
3983 continue;
3984 }
07f07615 3985
61007b31
SH
3986 /* We need to make sure the backing filename we are comparing against
3987 * is relative to the current image filename (or absolute) */
3988 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3989 curr_bs->backing_file);
07f07615 3990
61007b31
SH
3991 if (!realpath(filename_tmp, backing_file_full)) {
3992 continue;
3993 }
eb489bb1 3994
61007b31 3995 if (strcmp(backing_file_full, filename_full) == 0) {
760e0063 3996 retval = curr_bs->backing->bs;
61007b31
SH
3997 break;
3998 }
3999 }
eb489bb1
KW
4000 }
4001
61007b31
SH
4002 g_free(filename_full);
4003 g_free(backing_file_full);
4004 g_free(filename_tmp);
4005 return retval;
4006}
4007
61007b31
SH
4008void bdrv_init(void)
4009{
4010 module_call_init(MODULE_INIT_BLOCK);
4011}
29cdb251 4012
61007b31
SH
4013void bdrv_init_with_whitelist(void)
4014{
4015 use_bdrv_whitelist = 1;
4016 bdrv_init();
07f07615
PB
4017}
4018
5a8a30db 4019void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 4020{
4417ab7a 4021 BdrvChild *child, *parent;
9c5e6594 4022 uint64_t perm, shared_perm;
5a8a30db
KW
4023 Error *local_err = NULL;
4024 int ret;
4025
3456a8d1
KW
4026 if (!bs->drv) {
4027 return;
4028 }
4029
04c01a5c 4030 if (!(bs->open_flags & BDRV_O_INACTIVE)) {
7ea2d269
AK
4031 return;
4032 }
7ea2d269 4033
16e977d5
VSO
4034 QLIST_FOREACH(child, &bs->children, next) {
4035 bdrv_invalidate_cache(child->bs, &local_err);
0d1c5c91 4036 if (local_err) {
0d1c5c91
FZ
4037 error_propagate(errp, local_err);
4038 return;
4039 }
5a8a30db 4040 }
0d1c5c91 4041
16e977d5
VSO
4042 bs->open_flags &= ~BDRV_O_INACTIVE;
4043 if (bs->drv->bdrv_invalidate_cache) {
4044 bs->drv->bdrv_invalidate_cache(bs, &local_err);
0d1c5c91
FZ
4045 if (local_err) {
4046 bs->open_flags |= BDRV_O_INACTIVE;
4047 error_propagate(errp, local_err);
4048 return;
4049 }
0f15423c 4050 }
3456a8d1 4051
5a8a30db
KW
4052 ret = refresh_total_sectors(bs, bs->total_sectors);
4053 if (ret < 0) {
04c01a5c 4054 bs->open_flags |= BDRV_O_INACTIVE;
5a8a30db
KW
4055 error_setg_errno(errp, -ret, "Could not refresh total sector count");
4056 return;
4057 }
4417ab7a 4058
9c5e6594
KW
4059 /* Update permissions, they may differ for inactive nodes */
4060 bdrv_get_cumulative_perm(bs, &perm, &shared_perm);
3121fb45 4061 ret = bdrv_check_perm(bs, NULL, perm, shared_perm, NULL, &local_err);
9c5e6594
KW
4062 if (ret < 0) {
4063 bs->open_flags |= BDRV_O_INACTIVE;
4064 error_propagate(errp, local_err);
4065 return;
4066 }
4067 bdrv_set_perm(bs, perm, shared_perm);
4068
4417ab7a
KW
4069 QLIST_FOREACH(parent, &bs->parents, next_parent) {
4070 if (parent->role->activate) {
4071 parent->role->activate(parent, &local_err);
4072 if (local_err) {
4073 error_propagate(errp, local_err);
4074 return;
4075 }
4076 }
4077 }
0f15423c
AL
4078}
4079
5a8a30db 4080void bdrv_invalidate_cache_all(Error **errp)
0f15423c 4081{
7c8eece4 4082 BlockDriverState *bs;
5a8a30db 4083 Error *local_err = NULL;
88be7b4b 4084 BdrvNextIterator it;
0f15423c 4085
88be7b4b 4086 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
ed78cda3
SH
4087 AioContext *aio_context = bdrv_get_aio_context(bs);
4088
4089 aio_context_acquire(aio_context);
5a8a30db 4090 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 4091 aio_context_release(aio_context);
5a8a30db
KW
4092 if (local_err) {
4093 error_propagate(errp, local_err);
4094 return;
4095 }
0f15423c
AL
4096 }
4097}
4098
aad0b7a0
FZ
4099static int bdrv_inactivate_recurse(BlockDriverState *bs,
4100 bool setting_flag)
76b1c7fe 4101{
cfa1a572 4102 BdrvChild *child, *parent;
76b1c7fe
KW
4103 int ret;
4104
aad0b7a0 4105 if (!setting_flag && bs->drv->bdrv_inactivate) {
76b1c7fe
KW
4106 ret = bs->drv->bdrv_inactivate(bs);
4107 if (ret < 0) {
4108 return ret;
4109 }
4110 }
4111
7d5b5261 4112 if (setting_flag && !(bs->open_flags & BDRV_O_INACTIVE)) {
9c5e6594
KW
4113 uint64_t perm, shared_perm;
4114
cfa1a572
KW
4115 QLIST_FOREACH(parent, &bs->parents, next_parent) {
4116 if (parent->role->inactivate) {
4117 ret = parent->role->inactivate(parent);
4118 if (ret < 0) {
cfa1a572
KW
4119 return ret;
4120 }
4121 }
4122 }
9c5e6594 4123
7d5b5261
SH
4124 bs->open_flags |= BDRV_O_INACTIVE;
4125
9c5e6594
KW
4126 /* Update permissions, they may differ for inactive nodes */
4127 bdrv_get_cumulative_perm(bs, &perm, &shared_perm);
3121fb45 4128 bdrv_check_perm(bs, NULL, perm, shared_perm, NULL, &error_abort);
9c5e6594 4129 bdrv_set_perm(bs, perm, shared_perm);
aad0b7a0 4130 }
38701b6a
KW
4131
4132 QLIST_FOREACH(child, &bs->children, next) {
4133 ret = bdrv_inactivate_recurse(child->bs, setting_flag);
4134 if (ret < 0) {
4135 return ret;
4136 }
4137 }
4138
615b5dcf
VSO
4139 /* At this point persistent bitmaps should be already stored by the format
4140 * driver */
4141 bdrv_release_persistent_dirty_bitmaps(bs);
4142
76b1c7fe
KW
4143 return 0;
4144}
4145
4146int bdrv_inactivate_all(void)
4147{
79720af6 4148 BlockDriverState *bs = NULL;
88be7b4b 4149 BdrvNextIterator it;
aad0b7a0
FZ
4150 int ret = 0;
4151 int pass;
76b1c7fe 4152
88be7b4b 4153 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
4154 aio_context_acquire(bdrv_get_aio_context(bs));
4155 }
76b1c7fe 4156
aad0b7a0
FZ
4157 /* We do two passes of inactivation. The first pass calls to drivers'
4158 * .bdrv_inactivate callbacks recursively so all cache is flushed to disk;
4159 * the second pass sets the BDRV_O_INACTIVE flag so that no further write
4160 * is allowed. */
4161 for (pass = 0; pass < 2; pass++) {
88be7b4b 4162 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
4163 ret = bdrv_inactivate_recurse(bs, pass);
4164 if (ret < 0) {
4165 goto out;
4166 }
76b1c7fe
KW
4167 }
4168 }
4169
aad0b7a0 4170out:
88be7b4b 4171 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
4172 aio_context_release(bdrv_get_aio_context(bs));
4173 }
4174
4175 return ret;
76b1c7fe
KW
4176}
4177
19cb3738
FB
4178/**************************************************************/
4179/* removable device support */
4180
4181/**
4182 * Return TRUE if the media is present
4183 */
e031f750 4184bool bdrv_is_inserted(BlockDriverState *bs)
19cb3738
FB
4185{
4186 BlockDriver *drv = bs->drv;
28d7a789 4187 BdrvChild *child;
a1aff5bf 4188
e031f750
HR
4189 if (!drv) {
4190 return false;
4191 }
28d7a789
HR
4192 if (drv->bdrv_is_inserted) {
4193 return drv->bdrv_is_inserted(bs);
4194 }
4195 QLIST_FOREACH(child, &bs->children, next) {
4196 if (!bdrv_is_inserted(child->bs)) {
4197 return false;
4198 }
e031f750 4199 }
28d7a789 4200 return true;
19cb3738
FB
4201}
4202
19cb3738
FB
4203/**
4204 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
4205 */
f36f3949 4206void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
4207{
4208 BlockDriver *drv = bs->drv;
19cb3738 4209
822e1cd1
MA
4210 if (drv && drv->bdrv_eject) {
4211 drv->bdrv_eject(bs, eject_flag);
19cb3738
FB
4212 }
4213}
4214
19cb3738
FB
4215/**
4216 * Lock or unlock the media (if it is locked, the user won't be able
4217 * to eject it manually).
4218 */
025e849a 4219void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
4220{
4221 BlockDriver *drv = bs->drv;
4222
025e849a 4223 trace_bdrv_lock_medium(bs, locked);
b8c6d095 4224
025e849a
MA
4225 if (drv && drv->bdrv_lock_medium) {
4226 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
4227 }
4228}
985a03b0 4229
9fcb0251
FZ
4230/* Get a reference to bs */
4231void bdrv_ref(BlockDriverState *bs)
4232{
4233 bs->refcnt++;
4234}
4235
4236/* Release a previously grabbed reference to bs.
4237 * If after releasing, reference count is zero, the BlockDriverState is
4238 * deleted. */
4239void bdrv_unref(BlockDriverState *bs)
4240{
9a4d5ca6
JC
4241 if (!bs) {
4242 return;
4243 }
9fcb0251
FZ
4244 assert(bs->refcnt > 0);
4245 if (--bs->refcnt == 0) {
4246 bdrv_delete(bs);
4247 }
4248}
4249
fbe40ff7
FZ
4250struct BdrvOpBlocker {
4251 Error *reason;
4252 QLIST_ENTRY(BdrvOpBlocker) list;
4253};
4254
4255bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
4256{
4257 BdrvOpBlocker *blocker;
4258 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4259 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
4260 blocker = QLIST_FIRST(&bs->op_blockers[op]);
57ef3f12
EH
4261 error_propagate(errp, error_copy(blocker->reason));
4262 error_prepend(errp, "Node '%s' is busy: ",
4263 bdrv_get_device_or_node_name(bs));
fbe40ff7
FZ
4264 return true;
4265 }
4266 return false;
4267}
4268
4269void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
4270{
4271 BdrvOpBlocker *blocker;
4272 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4273
5839e53b 4274 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
4275 blocker->reason = reason;
4276 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
4277}
4278
4279void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
4280{
4281 BdrvOpBlocker *blocker, *next;
4282 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4283 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
4284 if (blocker->reason == reason) {
4285 QLIST_REMOVE(blocker, list);
4286 g_free(blocker);
4287 }
4288 }
4289}
4290
4291void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
4292{
4293 int i;
4294 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4295 bdrv_op_block(bs, i, reason);
4296 }
4297}
4298
4299void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
4300{
4301 int i;
4302 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4303 bdrv_op_unblock(bs, i, reason);
4304 }
4305}
4306
4307bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
4308{
4309 int i;
4310
4311 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4312 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
4313 return false;
4314 }
4315 }
4316 return true;
4317}
4318
d92ada22
LC
4319void bdrv_img_create(const char *filename, const char *fmt,
4320 const char *base_filename, const char *base_fmt,
9217283d
FZ
4321 char *options, uint64_t img_size, int flags, bool quiet,
4322 Error **errp)
f88e1a42 4323{
83d0521a
CL
4324 QemuOptsList *create_opts = NULL;
4325 QemuOpts *opts = NULL;
4326 const char *backing_fmt, *backing_file;
4327 int64_t size;
f88e1a42 4328 BlockDriver *drv, *proto_drv;
cc84d90f 4329 Error *local_err = NULL;
f88e1a42
JS
4330 int ret = 0;
4331
4332 /* Find driver and parse its options */
4333 drv = bdrv_find_format(fmt);
4334 if (!drv) {
71c79813 4335 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 4336 return;
f88e1a42
JS
4337 }
4338
b65a5e12 4339 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 4340 if (!proto_drv) {
d92ada22 4341 return;
f88e1a42
JS
4342 }
4343
c6149724
HR
4344 if (!drv->create_opts) {
4345 error_setg(errp, "Format driver '%s' does not support image creation",
4346 drv->format_name);
4347 return;
4348 }
4349
4350 if (!proto_drv->create_opts) {
4351 error_setg(errp, "Protocol driver '%s' does not support image creation",
4352 proto_drv->format_name);
4353 return;
4354 }
4355
c282e1fd
CL
4356 create_opts = qemu_opts_append(create_opts, drv->create_opts);
4357 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
4358
4359 /* Create parameter list with default values */
83d0521a 4360 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 4361 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
4362
4363 /* Parse -o options */
4364 if (options) {
dc523cd3
MA
4365 qemu_opts_do_parse(opts, options, NULL, &local_err);
4366 if (local_err) {
4367 error_report_err(local_err);
4368 local_err = NULL;
83d0521a 4369 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
4370 goto out;
4371 }
4372 }
4373
4374 if (base_filename) {
f43e47db 4375 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 4376 if (local_err) {
71c79813
LC
4377 error_setg(errp, "Backing file not supported for file format '%s'",
4378 fmt);
f88e1a42
JS
4379 goto out;
4380 }
4381 }
4382
4383 if (base_fmt) {
f43e47db 4384 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 4385 if (local_err) {
71c79813
LC
4386 error_setg(errp, "Backing file format not supported for file "
4387 "format '%s'", fmt);
f88e1a42
JS
4388 goto out;
4389 }
4390 }
4391
83d0521a
CL
4392 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
4393 if (backing_file) {
4394 if (!strcmp(filename, backing_file)) {
71c79813
LC
4395 error_setg(errp, "Error: Trying to create an image with the "
4396 "same filename as the backing file");
792da93a
JS
4397 goto out;
4398 }
4399 }
4400
83d0521a 4401 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42 4402
6e6e55f5
JS
4403 /* The size for the image must always be specified, unless we have a backing
4404 * file and we have not been forbidden from opening it. */
83d0521a 4405 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
6e6e55f5
JS
4406 if (backing_file && !(flags & BDRV_O_NO_BACKING)) {
4407 BlockDriverState *bs;
4408 char *full_backing = g_new0(char, PATH_MAX);
4409 int back_flags;
4410 QDict *backing_options = NULL;
4411
4412 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
4413 full_backing, PATH_MAX,
4414 &local_err);
4415 if (local_err) {
4416 g_free(full_backing);
4417 goto out;
4418 }
29168018 4419
6e6e55f5
JS
4420 /* backing files always opened read-only */
4421 back_flags = flags;
4422 back_flags &= ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 4423
6e6e55f5
JS
4424 if (backing_fmt) {
4425 backing_options = qdict_new();
4426 qdict_put_str(backing_options, "driver", backing_fmt);
4427 }
e6641719 4428
6e6e55f5
JS
4429 bs = bdrv_open(full_backing, NULL, backing_options, back_flags,
4430 &local_err);
4431 g_free(full_backing);
4432 if (!bs && size != -1) {
4433 /* Couldn't open BS, but we have a size, so it's nonfatal */
4434 warn_reportf_err(local_err,
4435 "Could not verify backing image. "
4436 "This may become an error in future versions.\n");
4437 local_err = NULL;
4438 } else if (!bs) {
4439 /* Couldn't open bs, do not have size */
4440 error_append_hint(&local_err,
4441 "Could not open backing image to determine size.\n");
4442 goto out;
4443 } else {
4444 if (size == -1) {
4445 /* Opened BS, have no size */
4446 size = bdrv_getlength(bs);
4447 if (size < 0) {
4448 error_setg_errno(errp, -size, "Could not get size of '%s'",
4449 backing_file);
4450 bdrv_unref(bs);
4451 goto out;
4452 }
4453 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
52bf1e72 4454 }
66f6b814 4455 bdrv_unref(bs);
f88e1a42 4456 }
6e6e55f5
JS
4457 } /* (backing_file && !(flags & BDRV_O_NO_BACKING)) */
4458
4459 if (size == -1) {
4460 error_setg(errp, "Image creation needs a size parameter");
4461 goto out;
f88e1a42
JS
4462 }
4463
f382d43a 4464 if (!quiet) {
fe646693 4465 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 4466 qemu_opts_print(opts, " ");
f382d43a
MR
4467 puts("");
4468 }
83d0521a 4469
c282e1fd 4470 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 4471
cc84d90f
HR
4472 if (ret == -EFBIG) {
4473 /* This is generally a better message than whatever the driver would
4474 * deliver (especially because of the cluster_size_hint), since that
4475 * is most probably not much different from "image too large". */
4476 const char *cluster_size_hint = "";
83d0521a 4477 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 4478 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 4479 }
cc84d90f
HR
4480 error_setg(errp, "The image size is too large for file format '%s'"
4481 "%s", fmt, cluster_size_hint);
4482 error_free(local_err);
4483 local_err = NULL;
f88e1a42
JS
4484 }
4485
4486out:
83d0521a
CL
4487 qemu_opts_del(opts);
4488 qemu_opts_free(create_opts);
621ff94d 4489 error_propagate(errp, local_err);
f88e1a42 4490}
85d126f3
SH
4491
4492AioContext *bdrv_get_aio_context(BlockDriverState *bs)
4493{
dcd04228
SH
4494 return bs->aio_context;
4495}
4496
052a7572
FZ
4497void bdrv_coroutine_enter(BlockDriverState *bs, Coroutine *co)
4498{
4499 aio_co_enter(bdrv_get_aio_context(bs), co);
4500}
4501
e8a095da
SH
4502static void bdrv_do_remove_aio_context_notifier(BdrvAioNotifier *ban)
4503{
4504 QLIST_REMOVE(ban, list);
4505 g_free(ban);
4506}
4507
dcd04228
SH
4508void bdrv_detach_aio_context(BlockDriverState *bs)
4509{
e8a095da 4510 BdrvAioNotifier *baf, *baf_tmp;
b97511c7 4511 BdrvChild *child;
33384421 4512
dcd04228
SH
4513 if (!bs->drv) {
4514 return;
4515 }
4516
e8a095da
SH
4517 assert(!bs->walking_aio_notifiers);
4518 bs->walking_aio_notifiers = true;
4519 QLIST_FOREACH_SAFE(baf, &bs->aio_notifiers, list, baf_tmp) {
4520 if (baf->deleted) {
4521 bdrv_do_remove_aio_context_notifier(baf);
4522 } else {
4523 baf->detach_aio_context(baf->opaque);
4524 }
33384421 4525 }
e8a095da
SH
4526 /* Never mind iterating again to check for ->deleted. bdrv_close() will
4527 * remove remaining aio notifiers if we aren't called again.
4528 */
4529 bs->walking_aio_notifiers = false;
33384421 4530
dcd04228
SH
4531 if (bs->drv->bdrv_detach_aio_context) {
4532 bs->drv->bdrv_detach_aio_context(bs);
4533 }
b97511c7
HR
4534 QLIST_FOREACH(child, &bs->children, next) {
4535 bdrv_detach_aio_context(child->bs);
dcd04228
SH
4536 }
4537
4538 bs->aio_context = NULL;
4539}
4540
4541void bdrv_attach_aio_context(BlockDriverState *bs,
4542 AioContext *new_context)
4543{
e8a095da 4544 BdrvAioNotifier *ban, *ban_tmp;
b97511c7 4545 BdrvChild *child;
33384421 4546
dcd04228
SH
4547 if (!bs->drv) {
4548 return;
4549 }
4550
4551 bs->aio_context = new_context;
4552
b97511c7
HR
4553 QLIST_FOREACH(child, &bs->children, next) {
4554 bdrv_attach_aio_context(child->bs, new_context);
dcd04228
SH
4555 }
4556 if (bs->drv->bdrv_attach_aio_context) {
4557 bs->drv->bdrv_attach_aio_context(bs, new_context);
4558 }
33384421 4559
e8a095da
SH
4560 assert(!bs->walking_aio_notifiers);
4561 bs->walking_aio_notifiers = true;
4562 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_tmp) {
4563 if (ban->deleted) {
4564 bdrv_do_remove_aio_context_notifier(ban);
4565 } else {
4566 ban->attached_aio_context(new_context, ban->opaque);
4567 }
33384421 4568 }
e8a095da 4569 bs->walking_aio_notifiers = false;
dcd04228
SH
4570}
4571
4572void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
4573{
aabf5910 4574 AioContext *ctx = bdrv_get_aio_context(bs);
c2b6428d 4575
aabf5910
FZ
4576 aio_disable_external(ctx);
4577 bdrv_parent_drained_begin(bs);
53ec73e2 4578 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228 4579
c2b6428d
PB
4580 while (aio_poll(ctx, false)) {
4581 /* wait for all bottom halves to execute */
4582 }
4583
dcd04228
SH
4584 bdrv_detach_aio_context(bs);
4585
4586 /* This function executes in the old AioContext so acquire the new one in
4587 * case it runs in a different thread.
4588 */
4589 aio_context_acquire(new_context);
4590 bdrv_attach_aio_context(bs, new_context);
aabf5910
FZ
4591 bdrv_parent_drained_end(bs);
4592 aio_enable_external(ctx);
dcd04228 4593 aio_context_release(new_context);
85d126f3 4594}
d616b224 4595
33384421
HR
4596void bdrv_add_aio_context_notifier(BlockDriverState *bs,
4597 void (*attached_aio_context)(AioContext *new_context, void *opaque),
4598 void (*detach_aio_context)(void *opaque), void *opaque)
4599{
4600 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
4601 *ban = (BdrvAioNotifier){
4602 .attached_aio_context = attached_aio_context,
4603 .detach_aio_context = detach_aio_context,
4604 .opaque = opaque
4605 };
4606
4607 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
4608}
4609
4610void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
4611 void (*attached_aio_context)(AioContext *,
4612 void *),
4613 void (*detach_aio_context)(void *),
4614 void *opaque)
4615{
4616 BdrvAioNotifier *ban, *ban_next;
4617
4618 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
4619 if (ban->attached_aio_context == attached_aio_context &&
4620 ban->detach_aio_context == detach_aio_context &&
e8a095da
SH
4621 ban->opaque == opaque &&
4622 ban->deleted == false)
33384421 4623 {
e8a095da
SH
4624 if (bs->walking_aio_notifiers) {
4625 ban->deleted = true;
4626 } else {
4627 bdrv_do_remove_aio_context_notifier(ban);
4628 }
33384421
HR
4629 return;
4630 }
4631 }
4632
4633 abort();
4634}
4635
77485434 4636int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
8b13976d 4637 BlockDriverAmendStatusCB *status_cb, void *cb_opaque)
6f176b48 4638{
c282e1fd 4639 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
4640 return -ENOTSUP;
4641 }
8b13976d 4642 return bs->drv->bdrv_amend_options(bs, opts, status_cb, cb_opaque);
6f176b48 4643}
f6186f49 4644
b5042a36
BC
4645/* This function will be called by the bdrv_recurse_is_first_non_filter method
4646 * of block filter and by bdrv_is_first_non_filter.
4647 * It is used to test if the given bs is the candidate or recurse more in the
4648 * node graph.
212a5a8f 4649 */
b5042a36 4650bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 4651 BlockDriverState *candidate)
f6186f49 4652{
b5042a36
BC
4653 /* return false if basic checks fails */
4654 if (!bs || !bs->drv) {
212a5a8f 4655 return false;
f6186f49
BC
4656 }
4657
b5042a36
BC
4658 /* the code reached a non block filter driver -> check if the bs is
4659 * the same as the candidate. It's the recursion termination condition.
4660 */
4661 if (!bs->drv->is_filter) {
4662 return bs == candidate;
212a5a8f 4663 }
b5042a36 4664 /* Down this path the driver is a block filter driver */
212a5a8f 4665
b5042a36
BC
4666 /* If the block filter recursion method is defined use it to recurse down
4667 * the node graph.
4668 */
4669 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 4670 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
4671 }
4672
b5042a36
BC
4673 /* the driver is a block filter but don't allow to recurse -> return false
4674 */
4675 return false;
f6186f49
BC
4676}
4677
212a5a8f
BC
4678/* This function checks if the candidate is the first non filter bs down it's
4679 * bs chain. Since we don't have pointers to parents it explore all bs chains
4680 * from the top. Some filters can choose not to pass down the recursion.
4681 */
4682bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 4683{
7c8eece4 4684 BlockDriverState *bs;
88be7b4b 4685 BdrvNextIterator it;
212a5a8f
BC
4686
4687 /* walk down the bs forest recursively */
88be7b4b 4688 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
212a5a8f
BC
4689 bool perm;
4690
b5042a36 4691 /* try to recurse in this top level bs */
e6dc8a1f 4692 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
4693
4694 /* candidate is the first non filter */
4695 if (perm) {
4696 return true;
4697 }
4698 }
4699
4700 return false;
f6186f49 4701}
09158f00 4702
e12f3784
WC
4703BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
4704 const char *node_name, Error **errp)
09158f00
BC
4705{
4706 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
4707 AioContext *aio_context;
4708
09158f00
BC
4709 if (!to_replace_bs) {
4710 error_setg(errp, "Node name '%s' not found", node_name);
4711 return NULL;
4712 }
4713
5a7e7a0b
SH
4714 aio_context = bdrv_get_aio_context(to_replace_bs);
4715 aio_context_acquire(aio_context);
4716
09158f00 4717 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
4718 to_replace_bs = NULL;
4719 goto out;
09158f00
BC
4720 }
4721
4722 /* We don't want arbitrary node of the BDS chain to be replaced only the top
4723 * most non filter in order to prevent data corruption.
4724 * Another benefit is that this tests exclude backing files which are
4725 * blocked by the backing blockers.
4726 */
e12f3784 4727 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 4728 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
4729 to_replace_bs = NULL;
4730 goto out;
09158f00
BC
4731 }
4732
5a7e7a0b
SH
4733out:
4734 aio_context_release(aio_context);
09158f00
BC
4735 return to_replace_bs;
4736}
448ad91d 4737
91af7014
HR
4738static bool append_open_options(QDict *d, BlockDriverState *bs)
4739{
4740 const QDictEntry *entry;
9e700c1a 4741 QemuOptDesc *desc;
260fecf1 4742 BdrvChild *child;
91af7014 4743 bool found_any = false;
260fecf1 4744 const char *p;
91af7014
HR
4745
4746 for (entry = qdict_first(bs->options); entry;
4747 entry = qdict_next(bs->options, entry))
4748 {
260fecf1
KW
4749 /* Exclude options for children */
4750 QLIST_FOREACH(child, &bs->children, next) {
4751 if (strstart(qdict_entry_key(entry), child->name, &p)
4752 && (!*p || *p == '.'))
4753 {
4754 break;
4755 }
4756 }
4757 if (child) {
9e700c1a 4758 continue;
91af7014 4759 }
9e700c1a
KW
4760
4761 /* And exclude all non-driver-specific options */
4762 for (desc = bdrv_runtime_opts.desc; desc->name; desc++) {
4763 if (!strcmp(qdict_entry_key(entry), desc->name)) {
4764 break;
4765 }
4766 }
4767 if (desc->name) {
4768 continue;
4769 }
4770
4771 qobject_incref(qdict_entry_value(entry));
4772 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
4773 found_any = true;
91af7014
HR
4774 }
4775
4776 return found_any;
4777}
4778
4779/* Updates the following BDS fields:
4780 * - exact_filename: A filename which may be used for opening a block device
4781 * which (mostly) equals the given BDS (even without any
4782 * other options; so reading and writing must return the same
4783 * results, but caching etc. may be different)
4784 * - full_open_options: Options which, when given when opening a block device
4785 * (without a filename), result in a BDS (mostly)
4786 * equalling the given one
4787 * - filename: If exact_filename is set, it is copied here. Otherwise,
4788 * full_open_options is converted to a JSON object, prefixed with
4789 * "json:" (for use through the JSON pseudo protocol) and put here.
4790 */
4791void bdrv_refresh_filename(BlockDriverState *bs)
4792{
4793 BlockDriver *drv = bs->drv;
4794 QDict *opts;
4795
4796 if (!drv) {
4797 return;
4798 }
4799
4800 /* This BDS's file name will most probably depend on its file's name, so
4801 * refresh that first */
4802 if (bs->file) {
9a4f4c31 4803 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
4804 }
4805
4806 if (drv->bdrv_refresh_filename) {
4807 /* Obsolete information is of no use here, so drop the old file name
4808 * information before refreshing it */
4809 bs->exact_filename[0] = '\0';
4810 if (bs->full_open_options) {
4811 QDECREF(bs->full_open_options);
4812 bs->full_open_options = NULL;
4813 }
4814
4cdd01d3
KW
4815 opts = qdict_new();
4816 append_open_options(opts, bs);
4817 drv->bdrv_refresh_filename(bs, opts);
4818 QDECREF(opts);
91af7014
HR
4819 } else if (bs->file) {
4820 /* Try to reconstruct valid information from the underlying file */
4821 bool has_open_options;
4822
4823 bs->exact_filename[0] = '\0';
4824 if (bs->full_open_options) {
4825 QDECREF(bs->full_open_options);
4826 bs->full_open_options = NULL;
4827 }
4828
4829 opts = qdict_new();
4830 has_open_options = append_open_options(opts, bs);
4831
4832 /* If no specific options have been given for this BDS, the filename of
4833 * the underlying file should suffice for this one as well */
9a4f4c31
KW
4834 if (bs->file->bs->exact_filename[0] && !has_open_options) {
4835 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
4836 }
4837 /* Reconstructing the full options QDict is simple for most format block
4838 * drivers, as long as the full options are known for the underlying
4839 * file BDS. The full options QDict of that file BDS should somehow
4840 * contain a representation of the filename, therefore the following
4841 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 4842 if (bs->file->bs->full_open_options) {
46f5ac20 4843 qdict_put_str(opts, "driver", drv->format_name);
9a4f4c31 4844 QINCREF(bs->file->bs->full_open_options);
de6e7951 4845 qdict_put(opts, "file", bs->file->bs->full_open_options);
91af7014
HR
4846
4847 bs->full_open_options = opts;
4848 } else {
4849 QDECREF(opts);
4850 }
4851 } else if (!bs->full_open_options && qdict_size(bs->options)) {
4852 /* There is no underlying file BDS (at least referenced by BDS.file),
4853 * so the full options QDict should be equal to the options given
4854 * specifically for this block device when it was opened (plus the
4855 * driver specification).
4856 * Because those options don't change, there is no need to update
4857 * full_open_options when it's already set. */
4858
4859 opts = qdict_new();
4860 append_open_options(opts, bs);
46f5ac20 4861 qdict_put_str(opts, "driver", drv->format_name);
91af7014
HR
4862
4863 if (bs->exact_filename[0]) {
4864 /* This may not work for all block protocol drivers (some may
4865 * require this filename to be parsed), but we have to find some
4866 * default solution here, so just include it. If some block driver
4867 * does not support pure options without any filename at all or
4868 * needs some special format of the options QDict, it needs to
4869 * implement the driver-specific bdrv_refresh_filename() function.
4870 */
46f5ac20 4871 qdict_put_str(opts, "filename", bs->exact_filename);
91af7014
HR
4872 }
4873
4874 bs->full_open_options = opts;
4875 }
4876
4877 if (bs->exact_filename[0]) {
4878 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4879 } else if (bs->full_open_options) {
4880 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4881 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4882 qstring_get_str(json));
4883 QDECREF(json);
4884 }
4885}
e06018ad
WC
4886
4887/*
4888 * Hot add/remove a BDS's child. So the user can take a child offline when
4889 * it is broken and take a new child online
4890 */
4891void bdrv_add_child(BlockDriverState *parent_bs, BlockDriverState *child_bs,
4892 Error **errp)
4893{
4894
4895 if (!parent_bs->drv || !parent_bs->drv->bdrv_add_child) {
4896 error_setg(errp, "The node %s does not support adding a child",
4897 bdrv_get_device_or_node_name(parent_bs));
4898 return;
4899 }
4900
4901 if (!QLIST_EMPTY(&child_bs->parents)) {
4902 error_setg(errp, "The node %s already has a parent",
4903 child_bs->node_name);
4904 return;
4905 }
4906
4907 parent_bs->drv->bdrv_add_child(parent_bs, child_bs, errp);
4908}
4909
4910void bdrv_del_child(BlockDriverState *parent_bs, BdrvChild *child, Error **errp)
4911{
4912 BdrvChild *tmp;
4913
4914 if (!parent_bs->drv || !parent_bs->drv->bdrv_del_child) {
4915 error_setg(errp, "The node %s does not support removing a child",
4916 bdrv_get_device_or_node_name(parent_bs));
4917 return;
4918 }
4919
4920 QLIST_FOREACH(tmp, &parent_bs->children, next) {
4921 if (tmp == child) {
4922 break;
4923 }
4924 }
4925
4926 if (!tmp) {
4927 error_setg(errp, "The node %s does not have a child named %s",
4928 bdrv_get_device_or_node_name(parent_bs),
4929 bdrv_get_device_or_node_name(child->bs));
4930 return;
4931 }
4932
4933 parent_bs->drv->bdrv_del_child(parent_bs, child, errp);
4934}
67b792f5
VSO
4935
4936bool bdrv_can_store_new_dirty_bitmap(BlockDriverState *bs, const char *name,
4937 uint32_t granularity, Error **errp)
4938{
4939 BlockDriver *drv = bs->drv;
4940
4941 if (!drv) {
4942 error_setg_errno(errp, ENOMEDIUM,
4943 "Can't store persistent bitmaps to %s",
4944 bdrv_get_device_or_node_name(bs));
4945 return false;
4946 }
4947
4948 if (!drv->bdrv_can_store_new_dirty_bitmap) {
4949 error_setg_errno(errp, ENOTSUP,
4950 "Can't store persistent bitmaps to %s",
4951 bdrv_get_device_or_node_name(bs));
4952 return false;
4953 }
4954
4955 return drv->bdrv_can_store_new_dirty_bitmap(bs, name, granularity, errp);
4956}