]> git.proxmox.com Git - mirror_qemu.git/blame - block.c
block: protect tracked_requests and flush_queue with reqs_lock
[mirror_qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
d38ea87a 24#include "qemu/osdep.h"
0ab8ed18 25#include "block/trace.h"
737e150e
PB
26#include "block/block_int.h"
27#include "block/blockjob.h"
cd7fca95 28#include "block/nbd.h"
d49b6836 29#include "qemu/error-report.h"
88d88798 30#include "module_block.h"
1de7afc9 31#include "qemu/module.h"
cc7a8ea7 32#include "qapi/qmp/qerror.h"
91a097e7 33#include "qapi/qmp/qbool.h"
7b1b5d19 34#include "qapi/qmp/qjson.h"
bfb197e0 35#include "sysemu/block-backend.h"
9c17d615 36#include "sysemu/sysemu.h"
1de7afc9 37#include "qemu/notify.h"
10817bf0 38#include "qemu/coroutine.h"
c13163fb 39#include "block/qapi.h"
b2023818 40#include "qmp-commands.h"
1de7afc9 41#include "qemu/timer.h"
a5ee7bd4 42#include "qapi-event.h"
f348b6d1
VB
43#include "qemu/cutils.h"
44#include "qemu/id.h"
692e01a2 45#include "qapi/util.h"
fc01f7e7 46
71e72a19 47#ifdef CONFIG_BSD
7674e7bf 48#include <sys/ioctl.h>
72cf2d4f 49#include <sys/queue.h>
c5e97233 50#ifndef __DragonFly__
7674e7bf
FB
51#include <sys/disk.h>
52#endif
c5e97233 53#endif
7674e7bf 54
49dc768d
AL
55#ifdef _WIN32
56#include <windows.h>
57#endif
58
1c9805a3
SH
59#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
60
dc364f4c
BC
61static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
62 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
63
2c1d04e0
HR
64static QTAILQ_HEAD(, BlockDriverState) all_bdrv_states =
65 QTAILQ_HEAD_INITIALIZER(all_bdrv_states);
66
8a22f02a
SH
67static QLIST_HEAD(, BlockDriver) bdrv_drivers =
68 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 69
5b363937
HR
70static BlockDriverState *bdrv_open_inherit(const char *filename,
71 const char *reference,
72 QDict *options, int flags,
73 BlockDriverState *parent,
74 const BdrvChildRole *child_role,
75 Error **errp);
f3930ed0 76
eb852011
MA
77/* If non-zero, use only whitelisted block drivers */
78static int use_bdrv_whitelist;
79
9e0b22f4
SH
80#ifdef _WIN32
81static int is_windows_drive_prefix(const char *filename)
82{
83 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
84 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
85 filename[1] == ':');
86}
87
88int is_windows_drive(const char *filename)
89{
90 if (is_windows_drive_prefix(filename) &&
91 filename[2] == '\0')
92 return 1;
93 if (strstart(filename, "\\\\.\\", NULL) ||
94 strstart(filename, "//./", NULL))
95 return 1;
96 return 0;
97}
98#endif
99
339064d5
KW
100size_t bdrv_opt_mem_align(BlockDriverState *bs)
101{
102 if (!bs || !bs->drv) {
459b4e66
DL
103 /* page size or 4k (hdd sector size) should be on the safe side */
104 return MAX(4096, getpagesize());
339064d5
KW
105 }
106
107 return bs->bl.opt_mem_alignment;
108}
109
4196d2f0
DL
110size_t bdrv_min_mem_align(BlockDriverState *bs)
111{
112 if (!bs || !bs->drv) {
459b4e66
DL
113 /* page size or 4k (hdd sector size) should be on the safe side */
114 return MAX(4096, getpagesize());
4196d2f0
DL
115 }
116
117 return bs->bl.min_mem_alignment;
118}
119
9e0b22f4 120/* check if the path starts with "<protocol>:" */
5c98415b 121int path_has_protocol(const char *path)
9e0b22f4 122{
947995c0
PB
123 const char *p;
124
9e0b22f4
SH
125#ifdef _WIN32
126 if (is_windows_drive(path) ||
127 is_windows_drive_prefix(path)) {
128 return 0;
129 }
947995c0
PB
130 p = path + strcspn(path, ":/\\");
131#else
132 p = path + strcspn(path, ":/");
9e0b22f4
SH
133#endif
134
947995c0 135 return *p == ':';
9e0b22f4
SH
136}
137
83f64091 138int path_is_absolute(const char *path)
3b0d4f61 139{
21664424
FB
140#ifdef _WIN32
141 /* specific case for names like: "\\.\d:" */
f53f4da9 142 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 143 return 1;
f53f4da9
PB
144 }
145 return (*path == '/' || *path == '\\');
3b9f94e1 146#else
f53f4da9 147 return (*path == '/');
3b9f94e1 148#endif
3b0d4f61
FB
149}
150
83f64091
FB
151/* if filename is absolute, just copy it to dest. Otherwise, build a
152 path to it by considering it is relative to base_path. URL are
153 supported. */
154void path_combine(char *dest, int dest_size,
155 const char *base_path,
156 const char *filename)
3b0d4f61 157{
83f64091
FB
158 const char *p, *p1;
159 int len;
160
161 if (dest_size <= 0)
162 return;
163 if (path_is_absolute(filename)) {
164 pstrcpy(dest, dest_size, filename);
165 } else {
0d54a6fe
HR
166 const char *protocol_stripped = NULL;
167
168 if (path_has_protocol(base_path)) {
169 protocol_stripped = strchr(base_path, ':');
170 if (protocol_stripped) {
171 protocol_stripped++;
172 }
173 }
174 p = protocol_stripped ?: base_path;
175
3b9f94e1
FB
176 p1 = strrchr(base_path, '/');
177#ifdef _WIN32
178 {
179 const char *p2;
180 p2 = strrchr(base_path, '\\');
181 if (!p1 || p2 > p1)
182 p1 = p2;
183 }
184#endif
83f64091
FB
185 if (p1)
186 p1++;
187 else
188 p1 = base_path;
189 if (p1 > p)
190 p = p1;
191 len = p - base_path;
192 if (len > dest_size - 1)
193 len = dest_size - 1;
194 memcpy(dest, base_path, len);
195 dest[len] = '\0';
196 pstrcat(dest, dest_size, filename);
3b0d4f61 197 }
3b0d4f61
FB
198}
199
03c320d8
HR
200/*
201 * Helper function for bdrv_parse_filename() implementations to remove optional
202 * protocol prefixes (especially "file:") from a filename and for putting the
203 * stripped filename into the options QDict if there is such a prefix.
204 */
205void bdrv_parse_filename_strip_prefix(const char *filename, const char *prefix,
206 QDict *options)
207{
208 if (strstart(filename, prefix, &filename)) {
209 /* Stripping the explicit protocol prefix may result in a protocol
210 * prefix being (wrongly) detected (if the filename contains a colon) */
211 if (path_has_protocol(filename)) {
212 QString *fat_filename;
213
214 /* This means there is some colon before the first slash; therefore,
215 * this cannot be an absolute path */
216 assert(!path_is_absolute(filename));
217
218 /* And we can thus fix the protocol detection issue by prefixing it
219 * by "./" */
220 fat_filename = qstring_from_str("./");
221 qstring_append(fat_filename, filename);
222
223 assert(!path_has_protocol(qstring_get_str(fat_filename)));
224
225 qdict_put(options, "filename", fat_filename);
226 } else {
227 /* If no protocol prefix was detected, we can use the shortened
228 * filename as-is */
229 qdict_put_str(options, "filename", filename);
230 }
231 }
232}
233
234
9c5e6594
KW
235/* Returns whether the image file is opened as read-only. Note that this can
236 * return false and writing to the image file is still not possible because the
237 * image is inactivated. */
93ed524e
JC
238bool bdrv_is_read_only(BlockDriverState *bs)
239{
240 return bs->read_only;
241}
242
9c5e6594
KW
243/* Returns whether the image file can be written to right now */
244bool bdrv_is_writable(BlockDriverState *bs)
245{
246 return !bdrv_is_read_only(bs) && !(bs->open_flags & BDRV_O_INACTIVE);
247}
248
45803a03 249int bdrv_can_set_read_only(BlockDriverState *bs, bool read_only, Error **errp)
fe5241bf 250{
e2b8247a
JC
251 /* Do not set read_only if copy_on_read is enabled */
252 if (bs->copy_on_read && read_only) {
253 error_setg(errp, "Can't set node '%s' to r/o with copy-on-read enabled",
254 bdrv_get_device_or_node_name(bs));
255 return -EINVAL;
256 }
257
d6fcdf06
JC
258 /* Do not clear read_only if it is prohibited */
259 if (!read_only && !(bs->open_flags & BDRV_O_ALLOW_RDWR)) {
260 error_setg(errp, "Node '%s' is read only",
261 bdrv_get_device_or_node_name(bs));
262 return -EPERM;
263 }
264
45803a03
JC
265 return 0;
266}
267
268int bdrv_set_read_only(BlockDriverState *bs, bool read_only, Error **errp)
269{
270 int ret = 0;
271
272 ret = bdrv_can_set_read_only(bs, read_only, errp);
273 if (ret < 0) {
274 return ret;
275 }
276
fe5241bf 277 bs->read_only = read_only;
e2b8247a 278 return 0;
fe5241bf
JC
279}
280
0a82855a
HR
281void bdrv_get_full_backing_filename_from_filename(const char *backed,
282 const char *backing,
9f07429e
HR
283 char *dest, size_t sz,
284 Error **errp)
dc5a1371 285{
9f07429e
HR
286 if (backing[0] == '\0' || path_has_protocol(backing) ||
287 path_is_absolute(backing))
288 {
0a82855a 289 pstrcpy(dest, sz, backing);
9f07429e
HR
290 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
291 error_setg(errp, "Cannot use relative backing file names for '%s'",
292 backed);
dc5a1371 293 } else {
0a82855a 294 path_combine(dest, sz, backed, backing);
dc5a1371
PB
295 }
296}
297
9f07429e
HR
298void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
299 Error **errp)
0a82855a 300{
9f07429e
HR
301 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
302
303 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
304 dest, sz, errp);
0a82855a
HR
305}
306
0eb7217e
SH
307void bdrv_register(BlockDriver *bdrv)
308{
8a22f02a 309 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 310}
b338082b 311
e4e9986b
MA
312BlockDriverState *bdrv_new(void)
313{
314 BlockDriverState *bs;
315 int i;
316
5839e53b 317 bs = g_new0(BlockDriverState, 1);
e4654d2d 318 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
319 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
320 QLIST_INIT(&bs->op_blockers[i]);
321 }
d616b224 322 notifier_with_return_list_init(&bs->before_write_notifiers);
3783fa3d 323 qemu_co_mutex_init(&bs->reqs_lock);
9fcb0251 324 bs->refcnt = 1;
dcd04228 325 bs->aio_context = qemu_get_aio_context();
d7d512f6 326
3ff2f67a
EY
327 qemu_co_queue_init(&bs->flush_queue);
328
2c1d04e0
HR
329 QTAILQ_INSERT_TAIL(&all_bdrv_states, bs, bs_list);
330
b338082b
FB
331 return bs;
332}
333
88d88798 334static BlockDriver *bdrv_do_find_format(const char *format_name)
ea2384d3
FB
335{
336 BlockDriver *drv1;
88d88798 337
8a22f02a
SH
338 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
339 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 340 return drv1;
8a22f02a 341 }
ea2384d3 342 }
88d88798 343
ea2384d3
FB
344 return NULL;
345}
346
88d88798
MM
347BlockDriver *bdrv_find_format(const char *format_name)
348{
349 BlockDriver *drv1;
350 int i;
351
352 drv1 = bdrv_do_find_format(format_name);
353 if (drv1) {
354 return drv1;
355 }
356
357 /* The driver isn't registered, maybe we need to load a module */
358 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); ++i) {
359 if (!strcmp(block_driver_modules[i].format_name, format_name)) {
360 block_module_load_one(block_driver_modules[i].library_name);
361 break;
362 }
363 }
364
365 return bdrv_do_find_format(format_name);
366}
367
b64ec4e4 368static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 369{
b64ec4e4
FZ
370 static const char *whitelist_rw[] = {
371 CONFIG_BDRV_RW_WHITELIST
372 };
373 static const char *whitelist_ro[] = {
374 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
375 };
376 const char **p;
377
b64ec4e4 378 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 379 return 1; /* no whitelist, anything goes */
b64ec4e4 380 }
eb852011 381
b64ec4e4 382 for (p = whitelist_rw; *p; p++) {
eb852011
MA
383 if (!strcmp(drv->format_name, *p)) {
384 return 1;
385 }
386 }
b64ec4e4
FZ
387 if (read_only) {
388 for (p = whitelist_ro; *p; p++) {
389 if (!strcmp(drv->format_name, *p)) {
390 return 1;
391 }
392 }
393 }
eb852011
MA
394 return 0;
395}
396
e6ff69bf
DB
397bool bdrv_uses_whitelist(void)
398{
399 return use_bdrv_whitelist;
400}
401
5b7e1542
ZYW
402typedef struct CreateCo {
403 BlockDriver *drv;
404 char *filename;
83d0521a 405 QemuOpts *opts;
5b7e1542 406 int ret;
cc84d90f 407 Error *err;
5b7e1542
ZYW
408} CreateCo;
409
410static void coroutine_fn bdrv_create_co_entry(void *opaque)
411{
cc84d90f
HR
412 Error *local_err = NULL;
413 int ret;
414
5b7e1542
ZYW
415 CreateCo *cco = opaque;
416 assert(cco->drv);
417
c282e1fd 418 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
621ff94d 419 error_propagate(&cco->err, local_err);
cc84d90f 420 cco->ret = ret;
5b7e1542
ZYW
421}
422
0e7e1989 423int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 424 QemuOpts *opts, Error **errp)
ea2384d3 425{
5b7e1542
ZYW
426 int ret;
427
428 Coroutine *co;
429 CreateCo cco = {
430 .drv = drv,
431 .filename = g_strdup(filename),
83d0521a 432 .opts = opts,
5b7e1542 433 .ret = NOT_DONE,
cc84d90f 434 .err = NULL,
5b7e1542
ZYW
435 };
436
c282e1fd 437 if (!drv->bdrv_create) {
cc84d90f 438 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
439 ret = -ENOTSUP;
440 goto out;
5b7e1542
ZYW
441 }
442
443 if (qemu_in_coroutine()) {
444 /* Fast-path if already in coroutine context */
445 bdrv_create_co_entry(&cco);
446 } else {
0b8b8753
PB
447 co = qemu_coroutine_create(bdrv_create_co_entry, &cco);
448 qemu_coroutine_enter(co);
5b7e1542 449 while (cco.ret == NOT_DONE) {
b47ec2c4 450 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
451 }
452 }
453
454 ret = cco.ret;
cc84d90f 455 if (ret < 0) {
84d18f06 456 if (cco.err) {
cc84d90f
HR
457 error_propagate(errp, cco.err);
458 } else {
459 error_setg_errno(errp, -ret, "Could not create image");
460 }
461 }
0e7e1989 462
80168bff
LC
463out:
464 g_free(cco.filename);
5b7e1542 465 return ret;
ea2384d3
FB
466}
467
c282e1fd 468int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
469{
470 BlockDriver *drv;
cc84d90f
HR
471 Error *local_err = NULL;
472 int ret;
84a12e66 473
b65a5e12 474 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 475 if (drv == NULL) {
16905d71 476 return -ENOENT;
84a12e66
CH
477 }
478
c282e1fd 479 ret = bdrv_create(drv, filename, opts, &local_err);
621ff94d 480 error_propagate(errp, local_err);
cc84d90f 481 return ret;
84a12e66
CH
482}
483
892b7de8
ET
484/**
485 * Try to get @bs's logical and physical block size.
486 * On success, store them in @bsz struct and return 0.
487 * On failure return -errno.
488 * @bs must not be empty.
489 */
490int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
491{
492 BlockDriver *drv = bs->drv;
493
494 if (drv && drv->bdrv_probe_blocksizes) {
495 return drv->bdrv_probe_blocksizes(bs, bsz);
496 }
497
498 return -ENOTSUP;
499}
500
501/**
502 * Try to get @bs's geometry (cyls, heads, sectors).
503 * On success, store them in @geo struct and return 0.
504 * On failure return -errno.
505 * @bs must not be empty.
506 */
507int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
508{
509 BlockDriver *drv = bs->drv;
510
511 if (drv && drv->bdrv_probe_geometry) {
512 return drv->bdrv_probe_geometry(bs, geo);
513 }
514
515 return -ENOTSUP;
516}
517
eba25057
JM
518/*
519 * Create a uniquely-named empty temporary file.
520 * Return 0 upon success, otherwise a negative errno value.
521 */
522int get_tmp_filename(char *filename, int size)
d5249393 523{
eba25057 524#ifdef _WIN32
3b9f94e1 525 char temp_dir[MAX_PATH];
eba25057
JM
526 /* GetTempFileName requires that its output buffer (4th param)
527 have length MAX_PATH or greater. */
528 assert(size >= MAX_PATH);
529 return (GetTempPath(MAX_PATH, temp_dir)
530 && GetTempFileName(temp_dir, "qem", 0, filename)
531 ? 0 : -GetLastError());
d5249393 532#else
67b915a5 533 int fd;
7ccfb2eb 534 const char *tmpdir;
0badc1ee 535 tmpdir = getenv("TMPDIR");
69bef793
AS
536 if (!tmpdir) {
537 tmpdir = "/var/tmp";
538 }
eba25057
JM
539 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
540 return -EOVERFLOW;
541 }
ea2384d3 542 fd = mkstemp(filename);
fe235a06
DH
543 if (fd < 0) {
544 return -errno;
545 }
546 if (close(fd) != 0) {
547 unlink(filename);
eba25057
JM
548 return -errno;
549 }
550 return 0;
d5249393 551#endif
eba25057 552}
fc01f7e7 553
84a12e66
CH
554/*
555 * Detect host devices. By convention, /dev/cdrom[N] is always
556 * recognized as a host CDROM.
557 */
558static BlockDriver *find_hdev_driver(const char *filename)
559{
560 int score_max = 0, score;
561 BlockDriver *drv = NULL, *d;
562
563 QLIST_FOREACH(d, &bdrv_drivers, list) {
564 if (d->bdrv_probe_device) {
565 score = d->bdrv_probe_device(filename);
566 if (score > score_max) {
567 score_max = score;
568 drv = d;
569 }
570 }
571 }
572
573 return drv;
574}
575
88d88798
MM
576static BlockDriver *bdrv_do_find_protocol(const char *protocol)
577{
578 BlockDriver *drv1;
579
580 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
581 if (drv1->protocol_name && !strcmp(drv1->protocol_name, protocol)) {
582 return drv1;
583 }
584 }
585
586 return NULL;
587}
588
98289620 589BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
590 bool allow_protocol_prefix,
591 Error **errp)
83f64091
FB
592{
593 BlockDriver *drv1;
594 char protocol[128];
1cec71e3 595 int len;
83f64091 596 const char *p;
88d88798 597 int i;
19cb3738 598
66f82cee
KW
599 /* TODO Drivers without bdrv_file_open must be specified explicitly */
600
39508e7a
CH
601 /*
602 * XXX(hch): we really should not let host device detection
603 * override an explicit protocol specification, but moving this
604 * later breaks access to device names with colons in them.
605 * Thanks to the brain-dead persistent naming schemes on udev-
606 * based Linux systems those actually are quite common.
607 */
608 drv1 = find_hdev_driver(filename);
609 if (drv1) {
610 return drv1;
611 }
612
98289620 613 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 614 return &bdrv_file;
84a12e66 615 }
98289620 616
9e0b22f4
SH
617 p = strchr(filename, ':');
618 assert(p != NULL);
1cec71e3
AL
619 len = p - filename;
620 if (len > sizeof(protocol) - 1)
621 len = sizeof(protocol) - 1;
622 memcpy(protocol, filename, len);
623 protocol[len] = '\0';
88d88798
MM
624
625 drv1 = bdrv_do_find_protocol(protocol);
626 if (drv1) {
627 return drv1;
628 }
629
630 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); ++i) {
631 if (block_driver_modules[i].protocol_name &&
632 !strcmp(block_driver_modules[i].protocol_name, protocol)) {
633 block_module_load_one(block_driver_modules[i].library_name);
634 break;
8a22f02a 635 }
83f64091 636 }
b65a5e12 637
88d88798
MM
638 drv1 = bdrv_do_find_protocol(protocol);
639 if (!drv1) {
640 error_setg(errp, "Unknown protocol '%s'", protocol);
641 }
642 return drv1;
83f64091
FB
643}
644
c6684249
MA
645/*
646 * Guess image format by probing its contents.
647 * This is not a good idea when your image is raw (CVE-2008-2004), but
648 * we do it anyway for backward compatibility.
649 *
650 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
651 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
652 * but can be smaller if the image file is smaller)
c6684249
MA
653 * @filename is its filename.
654 *
655 * For all block drivers, call the bdrv_probe() method to get its
656 * probing score.
657 * Return the first block driver with the highest probing score.
658 */
38f3ef57
KW
659BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
660 const char *filename)
c6684249
MA
661{
662 int score_max = 0, score;
663 BlockDriver *drv = NULL, *d;
664
665 QLIST_FOREACH(d, &bdrv_drivers, list) {
666 if (d->bdrv_probe) {
667 score = d->bdrv_probe(buf, buf_size, filename);
668 if (score > score_max) {
669 score_max = score;
670 drv = d;
671 }
672 }
673 }
674
675 return drv;
676}
677
5696c6e3 678static int find_image_format(BlockBackend *file, const char *filename,
34b5d2c6 679 BlockDriver **pdrv, Error **errp)
f3a5d3f8 680{
c6684249 681 BlockDriver *drv;
7cddd372 682 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 683 int ret = 0;
f8ea0b00 684
08a00559 685 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
5696c6e3 686 if (blk_is_sg(file) || !blk_is_inserted(file) || blk_getlength(file) == 0) {
ef810437 687 *pdrv = &bdrv_raw;
c98ac35d 688 return ret;
1a396859 689 }
f8ea0b00 690
5696c6e3 691 ret = blk_pread(file, 0, buf, sizeof(buf));
83f64091 692 if (ret < 0) {
34b5d2c6
HR
693 error_setg_errno(errp, -ret, "Could not read image for determining its "
694 "format");
c98ac35d
SW
695 *pdrv = NULL;
696 return ret;
83f64091
FB
697 }
698
c6684249 699 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 700 if (!drv) {
34b5d2c6
HR
701 error_setg(errp, "Could not determine image format: No compatible "
702 "driver found");
c98ac35d
SW
703 ret = -ENOENT;
704 }
705 *pdrv = drv;
706 return ret;
ea2384d3
FB
707}
708
51762288
SH
709/**
710 * Set the current 'total_sectors' value
65a9bb25 711 * Return 0 on success, -errno on error.
51762288
SH
712 */
713static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
714{
715 BlockDriver *drv = bs->drv;
716
396759ad 717 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 718 if (bdrv_is_sg(bs))
396759ad
NB
719 return 0;
720
51762288
SH
721 /* query actual device if possible, otherwise just trust the hint */
722 if (drv->bdrv_getlength) {
723 int64_t length = drv->bdrv_getlength(bs);
724 if (length < 0) {
725 return length;
726 }
7e382003 727 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
728 }
729
730 bs->total_sectors = hint;
731 return 0;
732}
733
cddff5ba
KW
734/**
735 * Combines a QDict of new block driver @options with any missing options taken
736 * from @old_options, so that leaving out an option defaults to its old value.
737 */
738static void bdrv_join_options(BlockDriverState *bs, QDict *options,
739 QDict *old_options)
740{
741 if (bs->drv && bs->drv->bdrv_join_options) {
742 bs->drv->bdrv_join_options(options, old_options);
743 } else {
744 qdict_join(options, old_options, false);
745 }
746}
747
9e8f1835
PB
748/**
749 * Set open flags for a given discard mode
750 *
751 * Return 0 on success, -1 if the discard mode was invalid.
752 */
753int bdrv_parse_discard_flags(const char *mode, int *flags)
754{
755 *flags &= ~BDRV_O_UNMAP;
756
757 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
758 /* do nothing */
759 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
760 *flags |= BDRV_O_UNMAP;
761 } else {
762 return -1;
763 }
764
765 return 0;
766}
767
c3993cdc
SH
768/**
769 * Set open flags for a given cache mode
770 *
771 * Return 0 on success, -1 if the cache mode was invalid.
772 */
53e8ae01 773int bdrv_parse_cache_mode(const char *mode, int *flags, bool *writethrough)
c3993cdc
SH
774{
775 *flags &= ~BDRV_O_CACHE_MASK;
776
777 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
53e8ae01
KW
778 *writethrough = false;
779 *flags |= BDRV_O_NOCACHE;
92196b2f 780 } else if (!strcmp(mode, "directsync")) {
53e8ae01 781 *writethrough = true;
92196b2f 782 *flags |= BDRV_O_NOCACHE;
c3993cdc 783 } else if (!strcmp(mode, "writeback")) {
53e8ae01 784 *writethrough = false;
c3993cdc 785 } else if (!strcmp(mode, "unsafe")) {
53e8ae01 786 *writethrough = false;
c3993cdc
SH
787 *flags |= BDRV_O_NO_FLUSH;
788 } else if (!strcmp(mode, "writethrough")) {
53e8ae01 789 *writethrough = true;
c3993cdc
SH
790 } else {
791 return -1;
792 }
793
794 return 0;
795}
796
b5411555
KW
797static char *bdrv_child_get_parent_desc(BdrvChild *c)
798{
799 BlockDriverState *parent = c->opaque;
800 return g_strdup(bdrv_get_device_or_node_name(parent));
801}
802
20018e12
KW
803static void bdrv_child_cb_drained_begin(BdrvChild *child)
804{
805 BlockDriverState *bs = child->opaque;
806 bdrv_drained_begin(bs);
807}
808
809static void bdrv_child_cb_drained_end(BdrvChild *child)
810{
811 BlockDriverState *bs = child->opaque;
812 bdrv_drained_end(bs);
813}
814
38701b6a
KW
815static int bdrv_child_cb_inactivate(BdrvChild *child)
816{
817 BlockDriverState *bs = child->opaque;
818 assert(bs->open_flags & BDRV_O_INACTIVE);
819 return 0;
820}
821
b1e6fc08 822/*
73176bee
KW
823 * Returns the options and flags that a temporary snapshot should get, based on
824 * the originally requested flags (the originally requested image will have
825 * flags like a backing file)
b1e6fc08 826 */
73176bee
KW
827static void bdrv_temp_snapshot_options(int *child_flags, QDict *child_options,
828 int parent_flags, QDict *parent_options)
b1e6fc08 829{
73176bee
KW
830 *child_flags = (parent_flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
831
832 /* For temporary files, unconditional cache=unsafe is fine */
73176bee
KW
833 qdict_set_default_str(child_options, BDRV_OPT_CACHE_DIRECT, "off");
834 qdict_set_default_str(child_options, BDRV_OPT_CACHE_NO_FLUSH, "on");
41869044 835
f87a0e29
AG
836 /* Copy the read-only option from the parent */
837 qdict_copy_default(child_options, parent_options, BDRV_OPT_READ_ONLY);
838
41869044
KW
839 /* aio=native doesn't work for cache.direct=off, so disable it for the
840 * temporary snapshot */
841 *child_flags &= ~BDRV_O_NATIVE_AIO;
b1e6fc08
KW
842}
843
0b50cc88 844/*
8e2160e2
KW
845 * Returns the options and flags that bs->file should get if a protocol driver
846 * is expected, based on the given options and flags for the parent BDS
0b50cc88 847 */
8e2160e2
KW
848static void bdrv_inherited_options(int *child_flags, QDict *child_options,
849 int parent_flags, QDict *parent_options)
0b50cc88 850{
8e2160e2
KW
851 int flags = parent_flags;
852
0b50cc88
KW
853 /* Enable protocol handling, disable format probing for bs->file */
854 flags |= BDRV_O_PROTOCOL;
855
91a097e7
KW
856 /* If the cache mode isn't explicitly set, inherit direct and no-flush from
857 * the parent. */
858 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
859 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
5a9347c6 860 qdict_copy_default(child_options, parent_options, BDRV_OPT_FORCE_SHARE);
91a097e7 861
f87a0e29
AG
862 /* Inherit the read-only option from the parent if it's not set */
863 qdict_copy_default(child_options, parent_options, BDRV_OPT_READ_ONLY);
864
0b50cc88 865 /* Our block drivers take care to send flushes and respect unmap policy,
91a097e7
KW
866 * so we can default to enable both on lower layers regardless of the
867 * corresponding parent options. */
818584a4 868 qdict_set_default_str(child_options, BDRV_OPT_DISCARD, "unmap");
0b50cc88 869
0b50cc88 870 /* Clear flags that only apply to the top layer */
abb06c5a
DB
871 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ |
872 BDRV_O_NO_IO);
0b50cc88 873
8e2160e2 874 *child_flags = flags;
0b50cc88
KW
875}
876
f3930ed0 877const BdrvChildRole child_file = {
b5411555 878 .get_parent_desc = bdrv_child_get_parent_desc,
8e2160e2 879 .inherit_options = bdrv_inherited_options,
20018e12
KW
880 .drained_begin = bdrv_child_cb_drained_begin,
881 .drained_end = bdrv_child_cb_drained_end,
38701b6a 882 .inactivate = bdrv_child_cb_inactivate,
f3930ed0
KW
883};
884
885/*
8e2160e2
KW
886 * Returns the options and flags that bs->file should get if the use of formats
887 * (and not only protocols) is permitted for it, based on the given options and
888 * flags for the parent BDS
f3930ed0 889 */
8e2160e2
KW
890static void bdrv_inherited_fmt_options(int *child_flags, QDict *child_options,
891 int parent_flags, QDict *parent_options)
f3930ed0 892{
8e2160e2
KW
893 child_file.inherit_options(child_flags, child_options,
894 parent_flags, parent_options);
895
abb06c5a 896 *child_flags &= ~(BDRV_O_PROTOCOL | BDRV_O_NO_IO);
f3930ed0
KW
897}
898
899const BdrvChildRole child_format = {
b5411555 900 .get_parent_desc = bdrv_child_get_parent_desc,
8e2160e2 901 .inherit_options = bdrv_inherited_fmt_options,
20018e12
KW
902 .drained_begin = bdrv_child_cb_drained_begin,
903 .drained_end = bdrv_child_cb_drained_end,
38701b6a 904 .inactivate = bdrv_child_cb_inactivate,
f3930ed0
KW
905};
906
db95dbba
KW
907static void bdrv_backing_attach(BdrvChild *c)
908{
909 BlockDriverState *parent = c->opaque;
910 BlockDriverState *backing_hd = c->bs;
911
912 assert(!parent->backing_blocker);
913 error_setg(&parent->backing_blocker,
914 "node is used as backing hd of '%s'",
915 bdrv_get_device_or_node_name(parent));
916
917 parent->open_flags &= ~BDRV_O_NO_BACKING;
918 pstrcpy(parent->backing_file, sizeof(parent->backing_file),
919 backing_hd->filename);
920 pstrcpy(parent->backing_format, sizeof(parent->backing_format),
921 backing_hd->drv ? backing_hd->drv->format_name : "");
922
923 bdrv_op_block_all(backing_hd, parent->backing_blocker);
924 /* Otherwise we won't be able to commit or stream */
925 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
926 parent->backing_blocker);
927 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_STREAM,
928 parent->backing_blocker);
929 /*
930 * We do backup in 3 ways:
931 * 1. drive backup
932 * The target bs is new opened, and the source is top BDS
933 * 2. blockdev backup
934 * Both the source and the target are top BDSes.
935 * 3. internal backup(used for block replication)
936 * Both the source and the target are backing file
937 *
938 * In case 1 and 2, neither the source nor the target is the backing file.
939 * In case 3, we will block the top BDS, so there is only one block job
940 * for the top BDS and its backing chain.
941 */
942 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_BACKUP_SOURCE,
943 parent->backing_blocker);
944 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_BACKUP_TARGET,
945 parent->backing_blocker);
946}
947
948static void bdrv_backing_detach(BdrvChild *c)
949{
950 BlockDriverState *parent = c->opaque;
951
952 assert(parent->backing_blocker);
953 bdrv_op_unblock_all(c->bs, parent->backing_blocker);
954 error_free(parent->backing_blocker);
955 parent->backing_blocker = NULL;
956}
957
317fc44e 958/*
8e2160e2
KW
959 * Returns the options and flags that bs->backing should get, based on the
960 * given options and flags for the parent BDS
317fc44e 961 */
8e2160e2
KW
962static void bdrv_backing_options(int *child_flags, QDict *child_options,
963 int parent_flags, QDict *parent_options)
317fc44e 964{
8e2160e2
KW
965 int flags = parent_flags;
966
b8816a43
KW
967 /* The cache mode is inherited unmodified for backing files; except WCE,
968 * which is only applied on the top level (BlockBackend) */
91a097e7
KW
969 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
970 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
5a9347c6 971 qdict_copy_default(child_options, parent_options, BDRV_OPT_FORCE_SHARE);
91a097e7 972
317fc44e 973 /* backing files always opened read-only */
f87a0e29
AG
974 qdict_set_default_str(child_options, BDRV_OPT_READ_ONLY, "on");
975 flags &= ~BDRV_O_COPY_ON_READ;
317fc44e
KW
976
977 /* snapshot=on is handled on the top layer */
8bfea15d 978 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e 979
8e2160e2 980 *child_flags = flags;
317fc44e
KW
981}
982
91ef3825 983const BdrvChildRole child_backing = {
b5411555 984 .get_parent_desc = bdrv_child_get_parent_desc,
db95dbba
KW
985 .attach = bdrv_backing_attach,
986 .detach = bdrv_backing_detach,
8e2160e2 987 .inherit_options = bdrv_backing_options,
20018e12
KW
988 .drained_begin = bdrv_child_cb_drained_begin,
989 .drained_end = bdrv_child_cb_drained_end,
38701b6a 990 .inactivate = bdrv_child_cb_inactivate,
f3930ed0
KW
991};
992
7b272452
KW
993static int bdrv_open_flags(BlockDriverState *bs, int flags)
994{
61de4c68 995 int open_flags = flags;
7b272452
KW
996
997 /*
998 * Clear flags that are internal to the block layer before opening the
999 * image.
1000 */
20cca275 1001 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
1002
1003 /*
1004 * Snapshots should be writable.
1005 */
8bfea15d 1006 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
1007 open_flags |= BDRV_O_RDWR;
1008 }
1009
1010 return open_flags;
1011}
1012
91a097e7
KW
1013static void update_flags_from_options(int *flags, QemuOpts *opts)
1014{
1015 *flags &= ~BDRV_O_CACHE_MASK;
1016
91a097e7
KW
1017 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_NO_FLUSH));
1018 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_NO_FLUSH, false)) {
1019 *flags |= BDRV_O_NO_FLUSH;
1020 }
1021
1022 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_DIRECT));
1023 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_DIRECT, false)) {
1024 *flags |= BDRV_O_NOCACHE;
1025 }
f87a0e29
AG
1026
1027 *flags &= ~BDRV_O_RDWR;
1028
1029 assert(qemu_opt_find(opts, BDRV_OPT_READ_ONLY));
1030 if (!qemu_opt_get_bool(opts, BDRV_OPT_READ_ONLY, false)) {
1031 *flags |= BDRV_O_RDWR;
1032 }
1033
91a097e7
KW
1034}
1035
1036static void update_options_from_flags(QDict *options, int flags)
1037{
91a097e7 1038 if (!qdict_haskey(options, BDRV_OPT_CACHE_DIRECT)) {
46f5ac20 1039 qdict_put_bool(options, BDRV_OPT_CACHE_DIRECT, flags & BDRV_O_NOCACHE);
91a097e7
KW
1040 }
1041 if (!qdict_haskey(options, BDRV_OPT_CACHE_NO_FLUSH)) {
46f5ac20
EB
1042 qdict_put_bool(options, BDRV_OPT_CACHE_NO_FLUSH,
1043 flags & BDRV_O_NO_FLUSH);
91a097e7 1044 }
f87a0e29 1045 if (!qdict_haskey(options, BDRV_OPT_READ_ONLY)) {
46f5ac20 1046 qdict_put_bool(options, BDRV_OPT_READ_ONLY, !(flags & BDRV_O_RDWR));
f87a0e29 1047 }
91a097e7
KW
1048}
1049
636ea370
KW
1050static void bdrv_assign_node_name(BlockDriverState *bs,
1051 const char *node_name,
1052 Error **errp)
6913c0c2 1053{
15489c76 1054 char *gen_node_name = NULL;
6913c0c2 1055
15489c76
JC
1056 if (!node_name) {
1057 node_name = gen_node_name = id_generate(ID_BLOCK);
1058 } else if (!id_wellformed(node_name)) {
1059 /*
1060 * Check for empty string or invalid characters, but not if it is
1061 * generated (generated names use characters not available to the user)
1062 */
9aebf3b8 1063 error_setg(errp, "Invalid node name");
636ea370 1064 return;
6913c0c2
BC
1065 }
1066
0c5e94ee 1067 /* takes care of avoiding namespaces collisions */
7f06d47e 1068 if (blk_by_name(node_name)) {
0c5e94ee
BC
1069 error_setg(errp, "node-name=%s is conflicting with a device id",
1070 node_name);
15489c76 1071 goto out;
0c5e94ee
BC
1072 }
1073
6913c0c2
BC
1074 /* takes care of avoiding duplicates node names */
1075 if (bdrv_find_node(node_name)) {
1076 error_setg(errp, "Duplicate node name");
15489c76 1077 goto out;
6913c0c2
BC
1078 }
1079
1080 /* copy node name into the bs and insert it into the graph list */
1081 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
1082 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
15489c76
JC
1083out:
1084 g_free(gen_node_name);
6913c0c2
BC
1085}
1086
01a56501
KW
1087static int bdrv_open_driver(BlockDriverState *bs, BlockDriver *drv,
1088 const char *node_name, QDict *options,
1089 int open_flags, Error **errp)
1090{
1091 Error *local_err = NULL;
1092 int ret;
1093
1094 bdrv_assign_node_name(bs, node_name, &local_err);
1095 if (local_err) {
1096 error_propagate(errp, local_err);
1097 return -EINVAL;
1098 }
1099
1100 bs->drv = drv;
680c7f96 1101 bs->read_only = !(bs->open_flags & BDRV_O_RDWR);
01a56501
KW
1102 bs->opaque = g_malloc0(drv->instance_size);
1103
1104 if (drv->bdrv_file_open) {
1105 assert(!drv->bdrv_needs_filename || bs->filename[0]);
1106 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
680c7f96 1107 } else if (drv->bdrv_open) {
01a56501 1108 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
680c7f96
KW
1109 } else {
1110 ret = 0;
01a56501
KW
1111 }
1112
1113 if (ret < 0) {
1114 if (local_err) {
1115 error_propagate(errp, local_err);
1116 } else if (bs->filename[0]) {
1117 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
1118 } else {
1119 error_setg_errno(errp, -ret, "Could not open image");
1120 }
1121 goto free_and_fail;
1122 }
1123
1124 ret = refresh_total_sectors(bs, bs->total_sectors);
1125 if (ret < 0) {
1126 error_setg_errno(errp, -ret, "Could not refresh total sector count");
1127 goto free_and_fail;
1128 }
1129
1130 bdrv_refresh_limits(bs, &local_err);
1131 if (local_err) {
1132 error_propagate(errp, local_err);
1133 ret = -EINVAL;
1134 goto free_and_fail;
1135 }
1136
1137 assert(bdrv_opt_mem_align(bs) != 0);
1138 assert(bdrv_min_mem_align(bs) != 0);
1139 assert(is_power_of_2(bs->bl.request_alignment));
1140
1141 return 0;
1142
1143free_and_fail:
1144 /* FIXME Close bs first if already opened*/
1145 g_free(bs->opaque);
1146 bs->opaque = NULL;
1147 bs->drv = NULL;
1148 return ret;
1149}
1150
680c7f96
KW
1151BlockDriverState *bdrv_new_open_driver(BlockDriver *drv, const char *node_name,
1152 int flags, Error **errp)
1153{
1154 BlockDriverState *bs;
1155 int ret;
1156
1157 bs = bdrv_new();
1158 bs->open_flags = flags;
1159 bs->explicit_options = qdict_new();
1160 bs->options = qdict_new();
1161 bs->opaque = NULL;
1162
1163 update_options_from_flags(bs->options, flags);
1164
1165 ret = bdrv_open_driver(bs, drv, node_name, bs->options, flags, errp);
1166 if (ret < 0) {
1167 QDECREF(bs->explicit_options);
1168 QDECREF(bs->options);
1169 bdrv_unref(bs);
1170 return NULL;
1171 }
1172
1173 return bs;
1174}
1175
c5f3014b 1176QemuOptsList bdrv_runtime_opts = {
18edf289
KW
1177 .name = "bdrv_common",
1178 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
1179 .desc = {
1180 {
1181 .name = "node-name",
1182 .type = QEMU_OPT_STRING,
1183 .help = "Node name of the block device node",
1184 },
62392ebb
KW
1185 {
1186 .name = "driver",
1187 .type = QEMU_OPT_STRING,
1188 .help = "Block driver to use for the node",
1189 },
91a097e7
KW
1190 {
1191 .name = BDRV_OPT_CACHE_DIRECT,
1192 .type = QEMU_OPT_BOOL,
1193 .help = "Bypass software writeback cache on the host",
1194 },
1195 {
1196 .name = BDRV_OPT_CACHE_NO_FLUSH,
1197 .type = QEMU_OPT_BOOL,
1198 .help = "Ignore flush requests",
1199 },
f87a0e29
AG
1200 {
1201 .name = BDRV_OPT_READ_ONLY,
1202 .type = QEMU_OPT_BOOL,
1203 .help = "Node is opened in read-only mode",
1204 },
692e01a2
KW
1205 {
1206 .name = "detect-zeroes",
1207 .type = QEMU_OPT_STRING,
1208 .help = "try to optimize zero writes (off, on, unmap)",
1209 },
818584a4
KW
1210 {
1211 .name = "discard",
1212 .type = QEMU_OPT_STRING,
1213 .help = "discard operation (ignore/off, unmap/on)",
1214 },
5a9347c6
FZ
1215 {
1216 .name = BDRV_OPT_FORCE_SHARE,
1217 .type = QEMU_OPT_BOOL,
1218 .help = "always accept other writers (default: off)",
1219 },
18edf289
KW
1220 { /* end of list */ }
1221 },
1222};
1223
57915332
KW
1224/*
1225 * Common part for opening disk images and files
b6ad491a
KW
1226 *
1227 * Removes all processed options from *options.
57915332 1228 */
5696c6e3 1229static int bdrv_open_common(BlockDriverState *bs, BlockBackend *file,
82dc8b41 1230 QDict *options, Error **errp)
57915332
KW
1231{
1232 int ret, open_flags;
035fccdf 1233 const char *filename;
62392ebb 1234 const char *driver_name = NULL;
6913c0c2 1235 const char *node_name = NULL;
818584a4 1236 const char *discard;
692e01a2 1237 const char *detect_zeroes;
18edf289 1238 QemuOpts *opts;
62392ebb 1239 BlockDriver *drv;
34b5d2c6 1240 Error *local_err = NULL;
57915332 1241
6405875c 1242 assert(bs->file == NULL);
707ff828 1243 assert(options != NULL && bs->options != options);
57915332 1244
62392ebb
KW
1245 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
1246 qemu_opts_absorb_qdict(opts, options, &local_err);
1247 if (local_err) {
1248 error_propagate(errp, local_err);
1249 ret = -EINVAL;
1250 goto fail_opts;
1251 }
1252
9b7e8691
AG
1253 update_flags_from_options(&bs->open_flags, opts);
1254
62392ebb
KW
1255 driver_name = qemu_opt_get(opts, "driver");
1256 drv = bdrv_find_format(driver_name);
1257 assert(drv != NULL);
1258
5a9347c6
FZ
1259 bs->force_share = qemu_opt_get_bool(opts, BDRV_OPT_FORCE_SHARE, false);
1260
1261 if (bs->force_share && (bs->open_flags & BDRV_O_RDWR)) {
1262 error_setg(errp,
1263 BDRV_OPT_FORCE_SHARE
1264 "=on can only be used with read-only images");
1265 ret = -EINVAL;
1266 goto fail_opts;
1267 }
1268
45673671 1269 if (file != NULL) {
5696c6e3 1270 filename = blk_bs(file)->filename;
45673671 1271 } else {
129c7d1c
MA
1272 /*
1273 * Caution: while qdict_get_try_str() is fine, getting
1274 * non-string types would require more care. When @options
1275 * come from -blockdev or blockdev_add, its members are typed
1276 * according to the QAPI schema, but when they come from
1277 * -drive, they're all QString.
1278 */
45673671
KW
1279 filename = qdict_get_try_str(options, "filename");
1280 }
1281
4a008240 1282 if (drv->bdrv_needs_filename && (!filename || !filename[0])) {
765003db
KW
1283 error_setg(errp, "The '%s' block driver requires a file name",
1284 drv->format_name);
18edf289
KW
1285 ret = -EINVAL;
1286 goto fail_opts;
6913c0c2 1287 }
6913c0c2 1288
82dc8b41
KW
1289 trace_bdrv_open_common(bs, filename ?: "", bs->open_flags,
1290 drv->format_name);
62392ebb 1291
82dc8b41 1292 bs->read_only = !(bs->open_flags & BDRV_O_RDWR);
b64ec4e4
FZ
1293
1294 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
1295 error_setg(errp,
1296 !bs->read_only && bdrv_is_whitelisted(drv, true)
1297 ? "Driver '%s' can only be used for read-only devices"
1298 : "Driver '%s' is not whitelisted",
1299 drv->format_name);
18edf289
KW
1300 ret = -ENOTSUP;
1301 goto fail_opts;
b64ec4e4 1302 }
57915332 1303
d3faa13e
PB
1304 /* bdrv_new() and bdrv_close() make it so */
1305 assert(atomic_read(&bs->copy_on_read) == 0);
1306
82dc8b41 1307 if (bs->open_flags & BDRV_O_COPY_ON_READ) {
0ebd24e0
KW
1308 if (!bs->read_only) {
1309 bdrv_enable_copy_on_read(bs);
1310 } else {
1311 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
1312 ret = -EINVAL;
1313 goto fail_opts;
0ebd24e0 1314 }
53fec9d3
SH
1315 }
1316
818584a4
KW
1317 discard = qemu_opt_get(opts, "discard");
1318 if (discard != NULL) {
1319 if (bdrv_parse_discard_flags(discard, &bs->open_flags) != 0) {
1320 error_setg(errp, "Invalid discard option");
1321 ret = -EINVAL;
1322 goto fail_opts;
1323 }
1324 }
1325
692e01a2
KW
1326 detect_zeroes = qemu_opt_get(opts, "detect-zeroes");
1327 if (detect_zeroes) {
1328 BlockdevDetectZeroesOptions value =
1329 qapi_enum_parse(BlockdevDetectZeroesOptions_lookup,
1330 detect_zeroes,
1331 BLOCKDEV_DETECT_ZEROES_OPTIONS__MAX,
1332 BLOCKDEV_DETECT_ZEROES_OPTIONS_OFF,
1333 &local_err);
1334 if (local_err) {
1335 error_propagate(errp, local_err);
1336 ret = -EINVAL;
1337 goto fail_opts;
1338 }
1339
1340 if (value == BLOCKDEV_DETECT_ZEROES_OPTIONS_UNMAP &&
1341 !(bs->open_flags & BDRV_O_UNMAP))
1342 {
1343 error_setg(errp, "setting detect-zeroes to unmap is not allowed "
1344 "without setting discard operation to unmap");
1345 ret = -EINVAL;
1346 goto fail_opts;
1347 }
1348
1349 bs->detect_zeroes = value;
1350 }
1351
c2ad1b0c
KW
1352 if (filename != NULL) {
1353 pstrcpy(bs->filename, sizeof(bs->filename), filename);
1354 } else {
1355 bs->filename[0] = '\0';
1356 }
91af7014 1357 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 1358
66f82cee 1359 /* Open the image, either directly or using a protocol */
82dc8b41 1360 open_flags = bdrv_open_flags(bs, bs->open_flags);
01a56501 1361 node_name = qemu_opt_get(opts, "node-name");
57915332 1362
01a56501
KW
1363 assert(!drv->bdrv_file_open || file == NULL);
1364 ret = bdrv_open_driver(bs, drv, node_name, options, open_flags, errp);
51762288 1365 if (ret < 0) {
01a56501 1366 goto fail_opts;
3baca891
KW
1367 }
1368
18edf289 1369 qemu_opts_del(opts);
57915332
KW
1370 return 0;
1371
18edf289
KW
1372fail_opts:
1373 qemu_opts_del(opts);
57915332
KW
1374 return ret;
1375}
1376
5e5c4f63
KW
1377static QDict *parse_json_filename(const char *filename, Error **errp)
1378{
1379 QObject *options_obj;
1380 QDict *options;
1381 int ret;
1382
1383 ret = strstart(filename, "json:", &filename);
1384 assert(ret);
1385
5577fff7 1386 options_obj = qobject_from_json(filename, errp);
5e5c4f63 1387 if (!options_obj) {
5577fff7
MA
1388 /* Work around qobject_from_json() lossage TODO fix that */
1389 if (errp && !*errp) {
1390 error_setg(errp, "Could not parse the JSON options");
1391 return NULL;
1392 }
1393 error_prepend(errp, "Could not parse the JSON options: ");
5e5c4f63
KW
1394 return NULL;
1395 }
1396
ca6b6e1e
MA
1397 options = qobject_to_qdict(options_obj);
1398 if (!options) {
5e5c4f63
KW
1399 qobject_decref(options_obj);
1400 error_setg(errp, "Invalid JSON object given");
1401 return NULL;
1402 }
1403
5e5c4f63
KW
1404 qdict_flatten(options);
1405
1406 return options;
1407}
1408
de3b53f0
KW
1409static void parse_json_protocol(QDict *options, const char **pfilename,
1410 Error **errp)
1411{
1412 QDict *json_options;
1413 Error *local_err = NULL;
1414
1415 /* Parse json: pseudo-protocol */
1416 if (!*pfilename || !g_str_has_prefix(*pfilename, "json:")) {
1417 return;
1418 }
1419
1420 json_options = parse_json_filename(*pfilename, &local_err);
1421 if (local_err) {
1422 error_propagate(errp, local_err);
1423 return;
1424 }
1425
1426 /* Options given in the filename have lower priority than options
1427 * specified directly */
1428 qdict_join(options, json_options, false);
1429 QDECREF(json_options);
1430 *pfilename = NULL;
1431}
1432
b6ce07aa 1433/*
f54120ff
KW
1434 * Fills in default options for opening images and converts the legacy
1435 * filename/flags pair to option QDict entries.
53a29513
HR
1436 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
1437 * block driver has been specified explicitly.
b6ce07aa 1438 */
de3b53f0 1439static int bdrv_fill_options(QDict **options, const char *filename,
053e1578 1440 int *flags, Error **errp)
ea2384d3 1441{
c2ad1b0c 1442 const char *drvname;
53a29513 1443 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 1444 bool parse_filename = false;
053e1578 1445 BlockDriver *drv = NULL;
34b5d2c6 1446 Error *local_err = NULL;
83f64091 1447
129c7d1c
MA
1448 /*
1449 * Caution: while qdict_get_try_str() is fine, getting non-string
1450 * types would require more care. When @options come from
1451 * -blockdev or blockdev_add, its members are typed according to
1452 * the QAPI schema, but when they come from -drive, they're all
1453 * QString.
1454 */
53a29513 1455 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1456 if (drvname) {
1457 drv = bdrv_find_format(drvname);
1458 if (!drv) {
1459 error_setg(errp, "Unknown driver '%s'", drvname);
1460 return -ENOENT;
1461 }
1462 /* If the user has explicitly specified the driver, this choice should
1463 * override the BDRV_O_PROTOCOL flag */
1464 protocol = drv->bdrv_file_open;
53a29513
HR
1465 }
1466
1467 if (protocol) {
1468 *flags |= BDRV_O_PROTOCOL;
1469 } else {
1470 *flags &= ~BDRV_O_PROTOCOL;
1471 }
1472
91a097e7
KW
1473 /* Translate cache options from flags into options */
1474 update_options_from_flags(*options, *flags);
1475
035fccdf 1476 /* Fetch the file name from the options QDict if necessary */
17b005f1 1477 if (protocol && filename) {
f54120ff 1478 if (!qdict_haskey(*options, "filename")) {
46f5ac20 1479 qdict_put_str(*options, "filename", filename);
f54120ff
KW
1480 parse_filename = true;
1481 } else {
1482 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1483 "the same time");
1484 return -EINVAL;
1485 }
035fccdf
KW
1486 }
1487
c2ad1b0c 1488 /* Find the right block driver */
129c7d1c 1489 /* See cautionary note on accessing @options above */
f54120ff 1490 filename = qdict_get_try_str(*options, "filename");
f54120ff 1491
053e1578
HR
1492 if (!drvname && protocol) {
1493 if (filename) {
1494 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1495 if (!drv) {
053e1578 1496 return -EINVAL;
17b005f1 1497 }
053e1578
HR
1498
1499 drvname = drv->format_name;
46f5ac20 1500 qdict_put_str(*options, "driver", drvname);
053e1578
HR
1501 } else {
1502 error_setg(errp, "Must specify either driver or file");
1503 return -EINVAL;
98289620 1504 }
c2ad1b0c
KW
1505 }
1506
17b005f1 1507 assert(drv || !protocol);
c2ad1b0c 1508
f54120ff 1509 /* Driver-specific filename parsing */
17b005f1 1510 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1511 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1512 if (local_err) {
34b5d2c6 1513 error_propagate(errp, local_err);
f54120ff 1514 return -EINVAL;
6963a30d 1515 }
cd5d031e
HR
1516
1517 if (!drv->bdrv_needs_filename) {
1518 qdict_del(*options, "filename");
cd5d031e 1519 }
6963a30d
KW
1520 }
1521
f54120ff
KW
1522 return 0;
1523}
1524
c1cef672
FZ
1525static int bdrv_child_check_perm(BdrvChild *c, uint64_t perm, uint64_t shared,
1526 GSList *ignore_children, Error **errp);
1527static void bdrv_child_abort_perm_update(BdrvChild *c);
1528static void bdrv_child_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared);
1529
ffd1a5a2
FZ
1530static void bdrv_child_perm(BlockDriverState *bs, BlockDriverState *child_bs,
1531 BdrvChild *c,
1532 const BdrvChildRole *role,
1533 uint64_t parent_perm, uint64_t parent_shared,
1534 uint64_t *nperm, uint64_t *nshared)
1535{
1536 if (bs->drv && bs->drv->bdrv_child_perm) {
1537 bs->drv->bdrv_child_perm(bs, c, role,
1538 parent_perm, parent_shared,
1539 nperm, nshared);
1540 }
1541 if (child_bs && child_bs->force_share) {
1542 *nshared = BLK_PERM_ALL;
1543 }
1544}
1545
33a610c3
KW
1546/*
1547 * Check whether permissions on this node can be changed in a way that
1548 * @cumulative_perms and @cumulative_shared_perms are the new cumulative
1549 * permissions of all its parents. This involves checking whether all necessary
1550 * permission changes to child nodes can be performed.
1551 *
1552 * A call to this function must always be followed by a call to bdrv_set_perm()
1553 * or bdrv_abort_perm_update().
1554 */
1555static int bdrv_check_perm(BlockDriverState *bs, uint64_t cumulative_perms,
46181129
KW
1556 uint64_t cumulative_shared_perms,
1557 GSList *ignore_children, Error **errp)
33a610c3
KW
1558{
1559 BlockDriver *drv = bs->drv;
1560 BdrvChild *c;
1561 int ret;
1562
1563 /* Write permissions never work with read-only images */
1564 if ((cumulative_perms & (BLK_PERM_WRITE | BLK_PERM_WRITE_UNCHANGED)) &&
9c5e6594 1565 !bdrv_is_writable(bs))
33a610c3
KW
1566 {
1567 error_setg(errp, "Block node is read-only");
1568 return -EPERM;
1569 }
1570
1571 /* Check this node */
1572 if (!drv) {
1573 return 0;
1574 }
1575
1576 if (drv->bdrv_check_perm) {
1577 return drv->bdrv_check_perm(bs, cumulative_perms,
1578 cumulative_shared_perms, errp);
1579 }
1580
78e421c9 1581 /* Drivers that never have children can omit .bdrv_child_perm() */
33a610c3 1582 if (!drv->bdrv_child_perm) {
78e421c9 1583 assert(QLIST_EMPTY(&bs->children));
33a610c3
KW
1584 return 0;
1585 }
1586
1587 /* Check all children */
1588 QLIST_FOREACH(c, &bs->children, next) {
1589 uint64_t cur_perm, cur_shared;
ffd1a5a2
FZ
1590 bdrv_child_perm(bs, c->bs, c, c->role,
1591 cumulative_perms, cumulative_shared_perms,
1592 &cur_perm, &cur_shared);
46181129
KW
1593 ret = bdrv_child_check_perm(c, cur_perm, cur_shared, ignore_children,
1594 errp);
33a610c3
KW
1595 if (ret < 0) {
1596 return ret;
1597 }
1598 }
1599
1600 return 0;
1601}
1602
1603/*
1604 * Notifies drivers that after a previous bdrv_check_perm() call, the
1605 * permission update is not performed and any preparations made for it (e.g.
1606 * taken file locks) need to be undone.
1607 *
1608 * This function recursively notifies all child nodes.
1609 */
1610static void bdrv_abort_perm_update(BlockDriverState *bs)
1611{
1612 BlockDriver *drv = bs->drv;
1613 BdrvChild *c;
1614
1615 if (!drv) {
1616 return;
1617 }
1618
1619 if (drv->bdrv_abort_perm_update) {
1620 drv->bdrv_abort_perm_update(bs);
1621 }
1622
1623 QLIST_FOREACH(c, &bs->children, next) {
1624 bdrv_child_abort_perm_update(c);
1625 }
1626}
1627
1628static void bdrv_set_perm(BlockDriverState *bs, uint64_t cumulative_perms,
1629 uint64_t cumulative_shared_perms)
1630{
1631 BlockDriver *drv = bs->drv;
1632 BdrvChild *c;
1633
1634 if (!drv) {
1635 return;
1636 }
1637
1638 /* Update this node */
1639 if (drv->bdrv_set_perm) {
1640 drv->bdrv_set_perm(bs, cumulative_perms, cumulative_shared_perms);
1641 }
1642
78e421c9 1643 /* Drivers that never have children can omit .bdrv_child_perm() */
33a610c3 1644 if (!drv->bdrv_child_perm) {
78e421c9 1645 assert(QLIST_EMPTY(&bs->children));
33a610c3
KW
1646 return;
1647 }
1648
1649 /* Update all children */
1650 QLIST_FOREACH(c, &bs->children, next) {
1651 uint64_t cur_perm, cur_shared;
ffd1a5a2
FZ
1652 bdrv_child_perm(bs, c->bs, c, c->role,
1653 cumulative_perms, cumulative_shared_perms,
1654 &cur_perm, &cur_shared);
33a610c3
KW
1655 bdrv_child_set_perm(c, cur_perm, cur_shared);
1656 }
1657}
1658
1659static void bdrv_get_cumulative_perm(BlockDriverState *bs, uint64_t *perm,
1660 uint64_t *shared_perm)
1661{
1662 BdrvChild *c;
1663 uint64_t cumulative_perms = 0;
1664 uint64_t cumulative_shared_perms = BLK_PERM_ALL;
1665
1666 QLIST_FOREACH(c, &bs->parents, next_parent) {
1667 cumulative_perms |= c->perm;
1668 cumulative_shared_perms &= c->shared_perm;
1669 }
1670
1671 *perm = cumulative_perms;
1672 *shared_perm = cumulative_shared_perms;
1673}
1674
d083319f
KW
1675static char *bdrv_child_user_desc(BdrvChild *c)
1676{
1677 if (c->role->get_parent_desc) {
1678 return c->role->get_parent_desc(c);
1679 }
1680
1681 return g_strdup("another user");
1682}
1683
5176196c 1684char *bdrv_perm_names(uint64_t perm)
d083319f
KW
1685{
1686 struct perm_name {
1687 uint64_t perm;
1688 const char *name;
1689 } permissions[] = {
1690 { BLK_PERM_CONSISTENT_READ, "consistent read" },
1691 { BLK_PERM_WRITE, "write" },
1692 { BLK_PERM_WRITE_UNCHANGED, "write unchanged" },
1693 { BLK_PERM_RESIZE, "resize" },
1694 { BLK_PERM_GRAPH_MOD, "change children" },
1695 { 0, NULL }
1696 };
1697
1698 char *result = g_strdup("");
1699 struct perm_name *p;
1700
1701 for (p = permissions; p->name; p++) {
1702 if (perm & p->perm) {
1703 char *old = result;
1704 result = g_strdup_printf("%s%s%s", old, *old ? ", " : "", p->name);
1705 g_free(old);
1706 }
1707 }
1708
1709 return result;
1710}
1711
33a610c3
KW
1712/*
1713 * Checks whether a new reference to @bs can be added if the new user requires
46181129
KW
1714 * @new_used_perm/@new_shared_perm as its permissions. If @ignore_children is
1715 * set, the BdrvChild objects in this list are ignored in the calculations;
1716 * this allows checking permission updates for an existing reference.
33a610c3
KW
1717 *
1718 * Needs to be followed by a call to either bdrv_set_perm() or
1719 * bdrv_abort_perm_update(). */
d5e6f437
KW
1720static int bdrv_check_update_perm(BlockDriverState *bs, uint64_t new_used_perm,
1721 uint64_t new_shared_perm,
46181129 1722 GSList *ignore_children, Error **errp)
d5e6f437
KW
1723{
1724 BdrvChild *c;
33a610c3
KW
1725 uint64_t cumulative_perms = new_used_perm;
1726 uint64_t cumulative_shared_perms = new_shared_perm;
d5e6f437
KW
1727
1728 /* There is no reason why anyone couldn't tolerate write_unchanged */
1729 assert(new_shared_perm & BLK_PERM_WRITE_UNCHANGED);
1730
1731 QLIST_FOREACH(c, &bs->parents, next_parent) {
46181129 1732 if (g_slist_find(ignore_children, c)) {
d5e6f437
KW
1733 continue;
1734 }
1735
d083319f
KW
1736 if ((new_used_perm & c->shared_perm) != new_used_perm) {
1737 char *user = bdrv_child_user_desc(c);
1738 char *perm_names = bdrv_perm_names(new_used_perm & ~c->shared_perm);
1739 error_setg(errp, "Conflicts with use by %s as '%s', which does not "
1740 "allow '%s' on %s",
1741 user, c->name, perm_names, bdrv_get_node_name(c->bs));
1742 g_free(user);
1743 g_free(perm_names);
1744 return -EPERM;
1745 }
1746
1747 if ((c->perm & new_shared_perm) != c->perm) {
1748 char *user = bdrv_child_user_desc(c);
1749 char *perm_names = bdrv_perm_names(c->perm & ~new_shared_perm);
1750 error_setg(errp, "Conflicts with use by %s as '%s', which uses "
1751 "'%s' on %s",
1752 user, c->name, perm_names, bdrv_get_node_name(c->bs));
1753 g_free(user);
1754 g_free(perm_names);
d5e6f437
KW
1755 return -EPERM;
1756 }
33a610c3
KW
1757
1758 cumulative_perms |= c->perm;
1759 cumulative_shared_perms &= c->shared_perm;
d5e6f437
KW
1760 }
1761
46181129
KW
1762 return bdrv_check_perm(bs, cumulative_perms, cumulative_shared_perms,
1763 ignore_children, errp);
33a610c3
KW
1764}
1765
1766/* Needs to be followed by a call to either bdrv_child_set_perm() or
1767 * bdrv_child_abort_perm_update(). */
c1cef672
FZ
1768static int bdrv_child_check_perm(BdrvChild *c, uint64_t perm, uint64_t shared,
1769 GSList *ignore_children, Error **errp)
33a610c3 1770{
46181129
KW
1771 int ret;
1772
1773 ignore_children = g_slist_prepend(g_slist_copy(ignore_children), c);
1774 ret = bdrv_check_update_perm(c->bs, perm, shared, ignore_children, errp);
1775 g_slist_free(ignore_children);
1776
1777 return ret;
33a610c3
KW
1778}
1779
c1cef672 1780static void bdrv_child_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared)
33a610c3
KW
1781{
1782 uint64_t cumulative_perms, cumulative_shared_perms;
1783
1784 c->perm = perm;
1785 c->shared_perm = shared;
1786
1787 bdrv_get_cumulative_perm(c->bs, &cumulative_perms,
1788 &cumulative_shared_perms);
1789 bdrv_set_perm(c->bs, cumulative_perms, cumulative_shared_perms);
1790}
1791
c1cef672 1792static void bdrv_child_abort_perm_update(BdrvChild *c)
33a610c3
KW
1793{
1794 bdrv_abort_perm_update(c->bs);
1795}
1796
1797int bdrv_child_try_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared,
1798 Error **errp)
1799{
1800 int ret;
1801
46181129 1802 ret = bdrv_child_check_perm(c, perm, shared, NULL, errp);
33a610c3
KW
1803 if (ret < 0) {
1804 bdrv_child_abort_perm_update(c);
1805 return ret;
1806 }
1807
1808 bdrv_child_set_perm(c, perm, shared);
1809
d5e6f437
KW
1810 return 0;
1811}
1812
6a1b9ee1
KW
1813#define DEFAULT_PERM_PASSTHROUGH (BLK_PERM_CONSISTENT_READ \
1814 | BLK_PERM_WRITE \
1815 | BLK_PERM_WRITE_UNCHANGED \
1816 | BLK_PERM_RESIZE)
1817#define DEFAULT_PERM_UNCHANGED (BLK_PERM_ALL & ~DEFAULT_PERM_PASSTHROUGH)
1818
1819void bdrv_filter_default_perms(BlockDriverState *bs, BdrvChild *c,
1820 const BdrvChildRole *role,
1821 uint64_t perm, uint64_t shared,
1822 uint64_t *nperm, uint64_t *nshared)
1823{
1824 if (c == NULL) {
1825 *nperm = perm & DEFAULT_PERM_PASSTHROUGH;
1826 *nshared = (shared & DEFAULT_PERM_PASSTHROUGH) | DEFAULT_PERM_UNCHANGED;
1827 return;
1828 }
1829
1830 *nperm = (perm & DEFAULT_PERM_PASSTHROUGH) |
1831 (c->perm & DEFAULT_PERM_UNCHANGED);
1832 *nshared = (shared & DEFAULT_PERM_PASSTHROUGH) |
1833 (c->shared_perm & DEFAULT_PERM_UNCHANGED);
1834}
1835
6b1a044a
KW
1836void bdrv_format_default_perms(BlockDriverState *bs, BdrvChild *c,
1837 const BdrvChildRole *role,
1838 uint64_t perm, uint64_t shared,
1839 uint64_t *nperm, uint64_t *nshared)
1840{
1841 bool backing = (role == &child_backing);
1842 assert(role == &child_backing || role == &child_file);
1843
1844 if (!backing) {
1845 /* Apart from the modifications below, the same permissions are
1846 * forwarded and left alone as for filters */
1847 bdrv_filter_default_perms(bs, c, role, perm, shared, &perm, &shared);
1848
1849 /* Format drivers may touch metadata even if the guest doesn't write */
9c5e6594 1850 if (bdrv_is_writable(bs)) {
6b1a044a
KW
1851 perm |= BLK_PERM_WRITE | BLK_PERM_RESIZE;
1852 }
1853
1854 /* bs->file always needs to be consistent because of the metadata. We
1855 * can never allow other users to resize or write to it. */
1856 perm |= BLK_PERM_CONSISTENT_READ;
1857 shared &= ~(BLK_PERM_WRITE | BLK_PERM_RESIZE);
1858 } else {
1859 /* We want consistent read from backing files if the parent needs it.
1860 * No other operations are performed on backing files. */
1861 perm &= BLK_PERM_CONSISTENT_READ;
1862
1863 /* If the parent can deal with changing data, we're okay with a
1864 * writable and resizable backing file. */
1865 /* TODO Require !(perm & BLK_PERM_CONSISTENT_READ), too? */
1866 if (shared & BLK_PERM_WRITE) {
1867 shared = BLK_PERM_WRITE | BLK_PERM_RESIZE;
1868 } else {
1869 shared = 0;
1870 }
1871
1872 shared |= BLK_PERM_CONSISTENT_READ | BLK_PERM_GRAPH_MOD |
1873 BLK_PERM_WRITE_UNCHANGED;
1874 }
1875
9c5e6594
KW
1876 if (bs->open_flags & BDRV_O_INACTIVE) {
1877 shared |= BLK_PERM_WRITE | BLK_PERM_RESIZE;
1878 }
1879
6b1a044a
KW
1880 *nperm = perm;
1881 *nshared = shared;
1882}
1883
8ee03995
KW
1884static void bdrv_replace_child_noperm(BdrvChild *child,
1885 BlockDriverState *new_bs)
e9740bc6
KW
1886{
1887 BlockDriverState *old_bs = child->bs;
1888
bb2614e9
FZ
1889 if (old_bs && new_bs) {
1890 assert(bdrv_get_aio_context(old_bs) == bdrv_get_aio_context(new_bs));
1891 }
e9740bc6 1892 if (old_bs) {
36fe1331
KW
1893 if (old_bs->quiesce_counter && child->role->drained_end) {
1894 child->role->drained_end(child);
1895 }
db95dbba
KW
1896 if (child->role->detach) {
1897 child->role->detach(child);
1898 }
e9740bc6
KW
1899 QLIST_REMOVE(child, next_parent);
1900 }
36fe1331
KW
1901
1902 child->bs = new_bs;
1903
e9740bc6
KW
1904 if (new_bs) {
1905 QLIST_INSERT_HEAD(&new_bs->parents, child, next_parent);
36fe1331
KW
1906 if (new_bs->quiesce_counter && child->role->drained_begin) {
1907 child->role->drained_begin(child);
1908 }
33a610c3 1909
8ee03995
KW
1910 if (child->role->attach) {
1911 child->role->attach(child);
1912 }
1913 }
1914}
33a610c3 1915
466787fb
KW
1916/*
1917 * Updates @child to change its reference to point to @new_bs, including
1918 * checking and applying the necessary permisson updates both to the old node
1919 * and to @new_bs.
1920 *
1921 * NULL is passed as @new_bs for removing the reference before freeing @child.
1922 *
1923 * If @new_bs is not NULL, bdrv_check_perm() must be called beforehand, as this
1924 * function uses bdrv_set_perm() to update the permissions according to the new
1925 * reference that @new_bs gets.
1926 */
1927static void bdrv_replace_child(BdrvChild *child, BlockDriverState *new_bs)
8ee03995
KW
1928{
1929 BlockDriverState *old_bs = child->bs;
1930 uint64_t perm, shared_perm;
1931
1932 if (old_bs) {
33a610c3
KW
1933 /* Update permissions for old node. This is guaranteed to succeed
1934 * because we're just taking a parent away, so we're loosening
1935 * restrictions. */
1936 bdrv_get_cumulative_perm(old_bs, &perm, &shared_perm);
46181129 1937 bdrv_check_perm(old_bs, perm, shared_perm, NULL, &error_abort);
33a610c3 1938 bdrv_set_perm(old_bs, perm, shared_perm);
e9740bc6 1939 }
36fe1331 1940
8ee03995 1941 bdrv_replace_child_noperm(child, new_bs);
36fe1331 1942
e9740bc6 1943 if (new_bs) {
33a610c3 1944 bdrv_get_cumulative_perm(new_bs, &perm, &shared_perm);
33a610c3 1945 bdrv_set_perm(new_bs, perm, shared_perm);
e9740bc6 1946 }
e9740bc6
KW
1947}
1948
f21d96d0
KW
1949BdrvChild *bdrv_root_attach_child(BlockDriverState *child_bs,
1950 const char *child_name,
36fe1331 1951 const BdrvChildRole *child_role,
d5e6f437
KW
1952 uint64_t perm, uint64_t shared_perm,
1953 void *opaque, Error **errp)
df581792 1954{
d5e6f437
KW
1955 BdrvChild *child;
1956 int ret;
1957
1958 ret = bdrv_check_update_perm(child_bs, perm, shared_perm, NULL, errp);
1959 if (ret < 0) {
33a610c3 1960 bdrv_abort_perm_update(child_bs);
d5e6f437
KW
1961 return NULL;
1962 }
1963
1964 child = g_new(BdrvChild, 1);
df581792 1965 *child = (BdrvChild) {
d5e6f437
KW
1966 .bs = NULL,
1967 .name = g_strdup(child_name),
1968 .role = child_role,
1969 .perm = perm,
1970 .shared_perm = shared_perm,
1971 .opaque = opaque,
df581792
KW
1972 };
1973
33a610c3 1974 /* This performs the matching bdrv_set_perm() for the above check. */
466787fb 1975 bdrv_replace_child(child, child_bs);
b4b059f6
KW
1976
1977 return child;
df581792
KW
1978}
1979
98292c61
WC
1980BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
1981 BlockDriverState *child_bs,
1982 const char *child_name,
8b2ff529
KW
1983 const BdrvChildRole *child_role,
1984 Error **errp)
f21d96d0 1985{
d5e6f437 1986 BdrvChild *child;
f68c598b
KW
1987 uint64_t perm, shared_perm;
1988
1989 bdrv_get_cumulative_perm(parent_bs, &perm, &shared_perm);
1990
1991 assert(parent_bs->drv);
bb2614e9 1992 assert(bdrv_get_aio_context(parent_bs) == bdrv_get_aio_context(child_bs));
ffd1a5a2
FZ
1993 bdrv_child_perm(parent_bs, child_bs, NULL, child_role,
1994 perm, shared_perm, &perm, &shared_perm);
d5e6f437 1995
d5e6f437 1996 child = bdrv_root_attach_child(child_bs, child_name, child_role,
f68c598b 1997 perm, shared_perm, parent_bs, errp);
d5e6f437
KW
1998 if (child == NULL) {
1999 return NULL;
2000 }
2001
f21d96d0
KW
2002 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
2003 return child;
2004}
2005
3f09bfbc 2006static void bdrv_detach_child(BdrvChild *child)
33a60407 2007{
f21d96d0
KW
2008 if (child->next.le_prev) {
2009 QLIST_REMOVE(child, next);
2010 child->next.le_prev = NULL;
2011 }
e9740bc6 2012
466787fb 2013 bdrv_replace_child(child, NULL);
e9740bc6 2014
260fecf1 2015 g_free(child->name);
33a60407
KW
2016 g_free(child);
2017}
2018
f21d96d0 2019void bdrv_root_unref_child(BdrvChild *child)
33a60407 2020{
779020cb
KW
2021 BlockDriverState *child_bs;
2022
f21d96d0
KW
2023 child_bs = child->bs;
2024 bdrv_detach_child(child);
2025 bdrv_unref(child_bs);
2026}
2027
2028void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
2029{
779020cb
KW
2030 if (child == NULL) {
2031 return;
2032 }
33a60407
KW
2033
2034 if (child->bs->inherits_from == parent) {
4e4bf5c4
KW
2035 BdrvChild *c;
2036
2037 /* Remove inherits_from only when the last reference between parent and
2038 * child->bs goes away. */
2039 QLIST_FOREACH(c, &parent->children, next) {
2040 if (c != child && c->bs == child->bs) {
2041 break;
2042 }
2043 }
2044 if (c == NULL) {
2045 child->bs->inherits_from = NULL;
2046 }
33a60407
KW
2047 }
2048
f21d96d0 2049 bdrv_root_unref_child(child);
33a60407
KW
2050}
2051
5c8cab48
KW
2052
2053static void bdrv_parent_cb_change_media(BlockDriverState *bs, bool load)
2054{
2055 BdrvChild *c;
2056 QLIST_FOREACH(c, &bs->parents, next_parent) {
2057 if (c->role->change_media) {
2058 c->role->change_media(c, load);
2059 }
2060 }
2061}
2062
2063static void bdrv_parent_cb_resize(BlockDriverState *bs)
2064{
2065 BdrvChild *c;
2066 QLIST_FOREACH(c, &bs->parents, next_parent) {
2067 if (c->role->resize) {
2068 c->role->resize(c);
2069 }
2070 }
2071}
2072
5db15a57
KW
2073/*
2074 * Sets the backing file link of a BDS. A new reference is created; callers
2075 * which don't need their own reference any more must call bdrv_unref().
2076 */
12fa4af6
KW
2077void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd,
2078 Error **errp)
8d24cce1 2079{
5db15a57
KW
2080 if (backing_hd) {
2081 bdrv_ref(backing_hd);
2082 }
8d24cce1 2083
760e0063 2084 if (bs->backing) {
5db15a57 2085 bdrv_unref_child(bs, bs->backing);
826b6ca0
FZ
2086 }
2087
8d24cce1 2088 if (!backing_hd) {
760e0063 2089 bs->backing = NULL;
8d24cce1
FZ
2090 goto out;
2091 }
12fa4af6 2092
8b2ff529 2093 bs->backing = bdrv_attach_child(bs, backing_hd, "backing", &child_backing,
12fa4af6
KW
2094 errp);
2095 if (!bs->backing) {
2096 bdrv_unref(backing_hd);
2097 }
826b6ca0 2098
9e7e940c
KW
2099 bdrv_refresh_filename(bs);
2100
8d24cce1 2101out:
3baca891 2102 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
2103}
2104
31ca6d07
KW
2105/*
2106 * Opens the backing file for a BlockDriverState if not yet open
2107 *
d9b7b057
KW
2108 * bdref_key specifies the key for the image's BlockdevRef in the options QDict.
2109 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
2110 * itself, all options starting with "${bdref_key}." are considered part of the
2111 * BlockdevRef.
2112 *
2113 * TODO Can this be unified with bdrv_open_image()?
31ca6d07 2114 */
d9b7b057
KW
2115int bdrv_open_backing_file(BlockDriverState *bs, QDict *parent_options,
2116 const char *bdref_key, Error **errp)
9156df12 2117{
1ba4b6a5 2118 char *backing_filename = g_malloc0(PATH_MAX);
d9b7b057
KW
2119 char *bdref_key_dot;
2120 const char *reference = NULL;
317fc44e 2121 int ret = 0;
8d24cce1 2122 BlockDriverState *backing_hd;
d9b7b057
KW
2123 QDict *options;
2124 QDict *tmp_parent_options = NULL;
34b5d2c6 2125 Error *local_err = NULL;
9156df12 2126
760e0063 2127 if (bs->backing != NULL) {
1ba4b6a5 2128 goto free_exit;
9156df12
PB
2129 }
2130
31ca6d07 2131 /* NULL means an empty set of options */
d9b7b057
KW
2132 if (parent_options == NULL) {
2133 tmp_parent_options = qdict_new();
2134 parent_options = tmp_parent_options;
31ca6d07
KW
2135 }
2136
9156df12 2137 bs->open_flags &= ~BDRV_O_NO_BACKING;
d9b7b057
KW
2138
2139 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
2140 qdict_extract_subqdict(parent_options, &options, bdref_key_dot);
2141 g_free(bdref_key_dot);
2142
129c7d1c
MA
2143 /*
2144 * Caution: while qdict_get_try_str() is fine, getting non-string
2145 * types would require more care. When @parent_options come from
2146 * -blockdev or blockdev_add, its members are typed according to
2147 * the QAPI schema, but when they come from -drive, they're all
2148 * QString.
2149 */
d9b7b057
KW
2150 reference = qdict_get_try_str(parent_options, bdref_key);
2151 if (reference || qdict_haskey(options, "file.filename")) {
1cb6f506
KW
2152 backing_filename[0] = '\0';
2153 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 2154 QDECREF(options);
1ba4b6a5 2155 goto free_exit;
dbecebdd 2156 } else {
9f07429e
HR
2157 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
2158 &local_err);
2159 if (local_err) {
2160 ret = -EINVAL;
2161 error_propagate(errp, local_err);
2162 QDECREF(options);
2163 goto free_exit;
2164 }
9156df12
PB
2165 }
2166
8ee79e70
KW
2167 if (!bs->drv || !bs->drv->supports_backing) {
2168 ret = -EINVAL;
2169 error_setg(errp, "Driver doesn't support backing files");
2170 QDECREF(options);
2171 goto free_exit;
2172 }
2173
c5f6e493 2174 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
46f5ac20 2175 qdict_put_str(options, "driver", bs->backing_format);
9156df12
PB
2176 }
2177
5b363937
HR
2178 backing_hd = bdrv_open_inherit(*backing_filename ? backing_filename : NULL,
2179 reference, options, 0, bs, &child_backing,
2180 errp);
2181 if (!backing_hd) {
9156df12 2182 bs->open_flags |= BDRV_O_NO_BACKING;
e43bfd9c 2183 error_prepend(errp, "Could not open backing file: ");
5b363937 2184 ret = -EINVAL;
1ba4b6a5 2185 goto free_exit;
9156df12 2186 }
df581792 2187
5db15a57
KW
2188 /* Hook up the backing file link; drop our reference, bs owns the
2189 * backing_hd reference now */
12fa4af6 2190 bdrv_set_backing_hd(bs, backing_hd, &local_err);
5db15a57 2191 bdrv_unref(backing_hd);
12fa4af6 2192 if (local_err) {
8cd1a3e4 2193 error_propagate(errp, local_err);
12fa4af6
KW
2194 ret = -EINVAL;
2195 goto free_exit;
2196 }
d80ac658 2197
d9b7b057
KW
2198 qdict_del(parent_options, bdref_key);
2199
1ba4b6a5
BC
2200free_exit:
2201 g_free(backing_filename);
d9b7b057 2202 QDECREF(tmp_parent_options);
1ba4b6a5 2203 return ret;
9156df12
PB
2204}
2205
2d6b86af
KW
2206static BlockDriverState *
2207bdrv_open_child_bs(const char *filename, QDict *options, const char *bdref_key,
2208 BlockDriverState *parent, const BdrvChildRole *child_role,
2209 bool allow_none, Error **errp)
da557aac 2210{
2d6b86af 2211 BlockDriverState *bs = NULL;
da557aac 2212 QDict *image_options;
da557aac
HR
2213 char *bdref_key_dot;
2214 const char *reference;
2215
df581792 2216 assert(child_role != NULL);
f67503e5 2217
da557aac
HR
2218 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
2219 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
2220 g_free(bdref_key_dot);
2221
129c7d1c
MA
2222 /*
2223 * Caution: while qdict_get_try_str() is fine, getting non-string
2224 * types would require more care. When @options come from
2225 * -blockdev or blockdev_add, its members are typed according to
2226 * the QAPI schema, but when they come from -drive, they're all
2227 * QString.
2228 */
da557aac
HR
2229 reference = qdict_get_try_str(options, bdref_key);
2230 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 2231 if (!allow_none) {
da557aac
HR
2232 error_setg(errp, "A block device must be specified for \"%s\"",
2233 bdref_key);
da557aac 2234 }
b20e61e0 2235 QDECREF(image_options);
da557aac
HR
2236 goto done;
2237 }
2238
5b363937
HR
2239 bs = bdrv_open_inherit(filename, reference, image_options, 0,
2240 parent, child_role, errp);
2241 if (!bs) {
df581792
KW
2242 goto done;
2243 }
2244
da557aac
HR
2245done:
2246 qdict_del(options, bdref_key);
2d6b86af
KW
2247 return bs;
2248}
2249
2250/*
2251 * Opens a disk image whose options are given as BlockdevRef in another block
2252 * device's options.
2253 *
2254 * If allow_none is true, no image will be opened if filename is false and no
2255 * BlockdevRef is given. NULL will be returned, but errp remains unset.
2256 *
2257 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
2258 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
2259 * itself, all options starting with "${bdref_key}." are considered part of the
2260 * BlockdevRef.
2261 *
2262 * The BlockdevRef will be removed from the options QDict.
2263 */
2264BdrvChild *bdrv_open_child(const char *filename,
2265 QDict *options, const char *bdref_key,
2266 BlockDriverState *parent,
2267 const BdrvChildRole *child_role,
2268 bool allow_none, Error **errp)
2269{
8b2ff529 2270 BdrvChild *c;
2d6b86af
KW
2271 BlockDriverState *bs;
2272
2273 bs = bdrv_open_child_bs(filename, options, bdref_key, parent, child_role,
2274 allow_none, errp);
2275 if (bs == NULL) {
2276 return NULL;
2277 }
2278
8b2ff529
KW
2279 c = bdrv_attach_child(parent, bs, bdref_key, child_role, errp);
2280 if (!c) {
2281 bdrv_unref(bs);
2282 return NULL;
2283 }
2284
2285 return c;
b4b059f6
KW
2286}
2287
66836189
HR
2288static BlockDriverState *bdrv_append_temp_snapshot(BlockDriverState *bs,
2289 int flags,
2290 QDict *snapshot_options,
2291 Error **errp)
b998875d
KW
2292{
2293 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 2294 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 2295 int64_t total_size;
83d0521a 2296 QemuOpts *opts = NULL;
ff6ed714 2297 BlockDriverState *bs_snapshot = NULL;
b2c2832c 2298 Error *local_err = NULL;
b998875d
KW
2299 int ret;
2300
2301 /* if snapshot, we create a temporary backing file and open it
2302 instead of opening 'filename' directly */
2303
2304 /* Get the required size from the image */
f187743a
KW
2305 total_size = bdrv_getlength(bs);
2306 if (total_size < 0) {
2307 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 2308 goto out;
f187743a 2309 }
b998875d
KW
2310
2311 /* Create the temporary image */
1ba4b6a5 2312 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
2313 if (ret < 0) {
2314 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 2315 goto out;
b998875d
KW
2316 }
2317
ef810437 2318 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 2319 &error_abort);
39101f25 2320 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
e43bfd9c 2321 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, errp);
83d0521a 2322 qemu_opts_del(opts);
b998875d 2323 if (ret < 0) {
e43bfd9c
MA
2324 error_prepend(errp, "Could not create temporary overlay '%s': ",
2325 tmp_filename);
1ba4b6a5 2326 goto out;
b998875d
KW
2327 }
2328
73176bee 2329 /* Prepare options QDict for the temporary file */
46f5ac20
EB
2330 qdict_put_str(snapshot_options, "file.driver", "file");
2331 qdict_put_str(snapshot_options, "file.filename", tmp_filename);
2332 qdict_put_str(snapshot_options, "driver", "qcow2");
b998875d 2333
5b363937 2334 bs_snapshot = bdrv_open(NULL, NULL, snapshot_options, flags, errp);
73176bee 2335 snapshot_options = NULL;
5b363937 2336 if (!bs_snapshot) {
1ba4b6a5 2337 goto out;
b998875d
KW
2338 }
2339
ff6ed714
EB
2340 /* bdrv_append() consumes a strong reference to bs_snapshot
2341 * (i.e. it will call bdrv_unref() on it) even on error, so in
2342 * order to be able to return one, we have to increase
2343 * bs_snapshot's refcount here */
66836189 2344 bdrv_ref(bs_snapshot);
b2c2832c
KW
2345 bdrv_append(bs_snapshot, bs, &local_err);
2346 if (local_err) {
2347 error_propagate(errp, local_err);
ff6ed714 2348 bs_snapshot = NULL;
b2c2832c
KW
2349 goto out;
2350 }
1ba4b6a5
BC
2351
2352out:
73176bee 2353 QDECREF(snapshot_options);
1ba4b6a5 2354 g_free(tmp_filename);
ff6ed714 2355 return bs_snapshot;
b998875d
KW
2356}
2357
b6ce07aa
KW
2358/*
2359 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
2360 *
2361 * options is a QDict of options to pass to the block drivers, or NULL for an
2362 * empty set of options. The reference to the QDict belongs to the block layer
2363 * after the call (even on failure), so if the caller intends to reuse the
2364 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
2365 *
2366 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
2367 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
2368 *
2369 * The reference parameter may be used to specify an existing block device which
2370 * should be opened. If specified, neither options nor a filename may be given,
2371 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 2372 */
5b363937
HR
2373static BlockDriverState *bdrv_open_inherit(const char *filename,
2374 const char *reference,
2375 QDict *options, int flags,
2376 BlockDriverState *parent,
2377 const BdrvChildRole *child_role,
2378 Error **errp)
ea2384d3 2379{
b6ce07aa 2380 int ret;
5696c6e3 2381 BlockBackend *file = NULL;
9a4f4c31 2382 BlockDriverState *bs;
ce343771 2383 BlockDriver *drv = NULL;
74fe54f2 2384 const char *drvname;
3e8c2e57 2385 const char *backing;
34b5d2c6 2386 Error *local_err = NULL;
73176bee 2387 QDict *snapshot_options = NULL;
b1e6fc08 2388 int snapshot_flags = 0;
712e7874 2389
f3930ed0
KW
2390 assert(!child_role || !flags);
2391 assert(!child_role == !parent);
f67503e5 2392
ddf5636d
HR
2393 if (reference) {
2394 bool options_non_empty = options ? qdict_size(options) : false;
2395 QDECREF(options);
2396
ddf5636d
HR
2397 if (filename || options_non_empty) {
2398 error_setg(errp, "Cannot reference an existing block device with "
2399 "additional options or a new filename");
5b363937 2400 return NULL;
ddf5636d
HR
2401 }
2402
2403 bs = bdrv_lookup_bs(reference, reference, errp);
2404 if (!bs) {
5b363937 2405 return NULL;
ddf5636d 2406 }
76b22320 2407
ddf5636d 2408 bdrv_ref(bs);
5b363937 2409 return bs;
ddf5636d
HR
2410 }
2411
5b363937 2412 bs = bdrv_new();
f67503e5 2413
de9c0cec
KW
2414 /* NULL means an empty set of options */
2415 if (options == NULL) {
2416 options = qdict_new();
2417 }
2418
145f598e 2419 /* json: syntax counts as explicit options, as if in the QDict */
de3b53f0
KW
2420 parse_json_protocol(options, &filename, &local_err);
2421 if (local_err) {
de3b53f0
KW
2422 goto fail;
2423 }
2424
145f598e
KW
2425 bs->explicit_options = qdict_clone_shallow(options);
2426
f3930ed0 2427 if (child_role) {
bddcec37 2428 bs->inherits_from = parent;
8e2160e2
KW
2429 child_role->inherit_options(&flags, options,
2430 parent->open_flags, parent->options);
f3930ed0
KW
2431 }
2432
de3b53f0 2433 ret = bdrv_fill_options(&options, filename, &flags, &local_err);
462f5bcf
KW
2434 if (local_err) {
2435 goto fail;
2436 }
2437
129c7d1c
MA
2438 /*
2439 * Set the BDRV_O_RDWR and BDRV_O_ALLOW_RDWR flags.
2440 * Caution: getting a boolean member of @options requires care.
2441 * When @options come from -blockdev or blockdev_add, members are
2442 * typed according to the QAPI schema, but when they come from
2443 * -drive, they're all QString.
2444 */
f87a0e29
AG
2445 if (g_strcmp0(qdict_get_try_str(options, BDRV_OPT_READ_ONLY), "on") &&
2446 !qdict_get_try_bool(options, BDRV_OPT_READ_ONLY, false)) {
2447 flags |= (BDRV_O_RDWR | BDRV_O_ALLOW_RDWR);
2448 } else {
2449 flags &= ~BDRV_O_RDWR;
14499ea5
AG
2450 }
2451
2452 if (flags & BDRV_O_SNAPSHOT) {
2453 snapshot_options = qdict_new();
2454 bdrv_temp_snapshot_options(&snapshot_flags, snapshot_options,
2455 flags, options);
f87a0e29
AG
2456 /* Let bdrv_backing_options() override "read-only" */
2457 qdict_del(options, BDRV_OPT_READ_ONLY);
14499ea5
AG
2458 bdrv_backing_options(&flags, options, flags, options);
2459 }
2460
62392ebb
KW
2461 bs->open_flags = flags;
2462 bs->options = options;
2463 options = qdict_clone_shallow(options);
2464
76c591b0 2465 /* Find the right image format driver */
129c7d1c 2466 /* See cautionary note on accessing @options above */
76c591b0
KW
2467 drvname = qdict_get_try_str(options, "driver");
2468 if (drvname) {
2469 drv = bdrv_find_format(drvname);
76c591b0
KW
2470 if (!drv) {
2471 error_setg(errp, "Unknown driver: '%s'", drvname);
76c591b0
KW
2472 goto fail;
2473 }
2474 }
2475
2476 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 2477
129c7d1c 2478 /* See cautionary note on accessing @options above */
3e8c2e57
AG
2479 backing = qdict_get_try_str(options, "backing");
2480 if (backing && *backing == '\0') {
2481 flags |= BDRV_O_NO_BACKING;
2482 qdict_del(options, "backing");
2483 }
2484
5696c6e3 2485 /* Open image file without format layer. This BlockBackend is only used for
4e4bf5c4
KW
2486 * probing, the block drivers will do their own bdrv_open_child() for the
2487 * same BDS, which is why we put the node name back into options. */
f4788adc 2488 if ((flags & BDRV_O_PROTOCOL) == 0) {
5696c6e3
KW
2489 BlockDriverState *file_bs;
2490
2491 file_bs = bdrv_open_child_bs(filename, options, "file", bs,
2492 &child_file, true, &local_err);
1fdd6933 2493 if (local_err) {
f4788adc
KW
2494 goto fail;
2495 }
5696c6e3 2496 if (file_bs != NULL) {
6d0eb64d 2497 file = blk_new(BLK_PERM_CONSISTENT_READ, BLK_PERM_ALL);
d7086422 2498 blk_insert_bs(file, file_bs, &local_err);
5696c6e3 2499 bdrv_unref(file_bs);
d7086422
KW
2500 if (local_err) {
2501 goto fail;
2502 }
5696c6e3 2503
46f5ac20 2504 qdict_put_str(options, "file", bdrv_get_node_name(file_bs));
4e4bf5c4 2505 }
f500a6d3
KW
2506 }
2507
76c591b0 2508 /* Image format probing */
38f3ef57 2509 bs->probed = !drv;
76c591b0 2510 if (!drv && file) {
cf2ab8fc 2511 ret = find_image_format(file, filename, &drv, &local_err);
17b005f1 2512 if (ret < 0) {
8bfea15d 2513 goto fail;
2a05cbe4 2514 }
62392ebb
KW
2515 /*
2516 * This option update would logically belong in bdrv_fill_options(),
2517 * but we first need to open bs->file for the probing to work, while
2518 * opening bs->file already requires the (mostly) final set of options
2519 * so that cache mode etc. can be inherited.
2520 *
2521 * Adding the driver later is somewhat ugly, but it's not an option
2522 * that would ever be inherited, so it's correct. We just need to make
2523 * sure to update both bs->options (which has the full effective
2524 * options for bs) and options (which has file.* already removed).
2525 */
46f5ac20
EB
2526 qdict_put_str(bs->options, "driver", drv->format_name);
2527 qdict_put_str(options, "driver", drv->format_name);
76c591b0 2528 } else if (!drv) {
17b005f1 2529 error_setg(errp, "Must specify either driver or file");
8bfea15d 2530 goto fail;
ea2384d3 2531 }
b6ce07aa 2532
53a29513
HR
2533 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
2534 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
2535 /* file must be NULL if a protocol BDS is about to be created
2536 * (the inverse results in an error message from bdrv_open_common()) */
2537 assert(!(flags & BDRV_O_PROTOCOL) || !file);
2538
b6ce07aa 2539 /* Open the image */
82dc8b41 2540 ret = bdrv_open_common(bs, file, options, &local_err);
b6ce07aa 2541 if (ret < 0) {
8bfea15d 2542 goto fail;
6987307c
CH
2543 }
2544
4e4bf5c4 2545 if (file) {
5696c6e3 2546 blk_unref(file);
f500a6d3
KW
2547 file = NULL;
2548 }
2549
b6ce07aa 2550 /* If there is a backing file, use it */
9156df12 2551 if ((flags & BDRV_O_NO_BACKING) == 0) {
d9b7b057 2552 ret = bdrv_open_backing_file(bs, options, "backing", &local_err);
b6ce07aa 2553 if (ret < 0) {
b6ad491a 2554 goto close_and_fail;
b6ce07aa 2555 }
b6ce07aa
KW
2556 }
2557
91af7014
HR
2558 bdrv_refresh_filename(bs);
2559
b6ad491a 2560 /* Check if any unknown options were used */
7ad2757f 2561 if (qdict_size(options) != 0) {
b6ad491a 2562 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
2563 if (flags & BDRV_O_PROTOCOL) {
2564 error_setg(errp, "Block protocol '%s' doesn't support the option "
2565 "'%s'", drv->format_name, entry->key);
2566 } else {
d0e46a55
HR
2567 error_setg(errp,
2568 "Block format '%s' does not support the option '%s'",
2569 drv->format_name, entry->key);
5acd9d81 2570 }
b6ad491a 2571
b6ad491a
KW
2572 goto close_and_fail;
2573 }
b6ad491a 2574
b6ce07aa 2575 if (!bdrv_key_required(bs)) {
5c8cab48 2576 bdrv_parent_cb_change_media(bs, true);
c3adb58f
MA
2577 } else if (!runstate_check(RUN_STATE_PRELAUNCH)
2578 && !runstate_check(RUN_STATE_INMIGRATE)
2579 && !runstate_check(RUN_STATE_PAUSED)) { /* HACK */
2580 error_setg(errp,
2581 "Guest must be stopped for opening of encrypted image");
c3adb58f 2582 goto close_and_fail;
b6ce07aa
KW
2583 }
2584
c3adb58f 2585 QDECREF(options);
dd62f1ca
KW
2586
2587 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
2588 * temporary snapshot afterwards. */
2589 if (snapshot_flags) {
66836189
HR
2590 BlockDriverState *snapshot_bs;
2591 snapshot_bs = bdrv_append_temp_snapshot(bs, snapshot_flags,
2592 snapshot_options, &local_err);
73176bee 2593 snapshot_options = NULL;
dd62f1ca
KW
2594 if (local_err) {
2595 goto close_and_fail;
2596 }
5b363937
HR
2597 /* We are not going to return bs but the overlay on top of it
2598 * (snapshot_bs); thus, we have to drop the strong reference to bs
2599 * (which we obtained by calling bdrv_new()). bs will not be deleted,
2600 * though, because the overlay still has a reference to it. */
2601 bdrv_unref(bs);
2602 bs = snapshot_bs;
dd62f1ca
KW
2603 }
2604
5b363937 2605 return bs;
b6ce07aa 2606
8bfea15d 2607fail:
5696c6e3 2608 blk_unref(file);
4e4bf5c4
KW
2609 if (bs->file != NULL) {
2610 bdrv_unref_child(bs, bs->file);
f500a6d3 2611 }
73176bee 2612 QDECREF(snapshot_options);
145f598e 2613 QDECREF(bs->explicit_options);
de9c0cec 2614 QDECREF(bs->options);
b6ad491a 2615 QDECREF(options);
de9c0cec 2616 bs->options = NULL;
5b363937 2617 bdrv_unref(bs);
621ff94d 2618 error_propagate(errp, local_err);
5b363937 2619 return NULL;
de9c0cec 2620
b6ad491a 2621close_and_fail:
5b363937 2622 bdrv_unref(bs);
73176bee 2623 QDECREF(snapshot_options);
b6ad491a 2624 QDECREF(options);
621ff94d 2625 error_propagate(errp, local_err);
5b363937 2626 return NULL;
b6ce07aa
KW
2627}
2628
5b363937
HR
2629BlockDriverState *bdrv_open(const char *filename, const char *reference,
2630 QDict *options, int flags, Error **errp)
f3930ed0 2631{
5b363937 2632 return bdrv_open_inherit(filename, reference, options, flags, NULL,
ce343771 2633 NULL, errp);
f3930ed0
KW
2634}
2635
e971aa12
JC
2636typedef struct BlockReopenQueueEntry {
2637 bool prepared;
2638 BDRVReopenState state;
2639 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
2640} BlockReopenQueueEntry;
2641
2642/*
2643 * Adds a BlockDriverState to a simple queue for an atomic, transactional
2644 * reopen of multiple devices.
2645 *
2646 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
2647 * already performed, or alternatively may be NULL a new BlockReopenQueue will
2648 * be created and initialized. This newly created BlockReopenQueue should be
2649 * passed back in for subsequent calls that are intended to be of the same
2650 * atomic 'set'.
2651 *
2652 * bs is the BlockDriverState to add to the reopen queue.
2653 *
4d2cb092
KW
2654 * options contains the changed options for the associated bs
2655 * (the BlockReopenQueue takes ownership)
2656 *
e971aa12
JC
2657 * flags contains the open flags for the associated bs
2658 *
2659 * returns a pointer to bs_queue, which is either the newly allocated
2660 * bs_queue, or the existing bs_queue being used.
2661 *
2662 */
28518102
KW
2663static BlockReopenQueue *bdrv_reopen_queue_child(BlockReopenQueue *bs_queue,
2664 BlockDriverState *bs,
2665 QDict *options,
2666 int flags,
2667 const BdrvChildRole *role,
2668 QDict *parent_options,
2669 int parent_flags)
e971aa12
JC
2670{
2671 assert(bs != NULL);
2672
2673 BlockReopenQueueEntry *bs_entry;
67251a31 2674 BdrvChild *child;
145f598e 2675 QDict *old_options, *explicit_options;
67251a31 2676
e971aa12
JC
2677 if (bs_queue == NULL) {
2678 bs_queue = g_new0(BlockReopenQueue, 1);
2679 QSIMPLEQ_INIT(bs_queue);
2680 }
2681
4d2cb092
KW
2682 if (!options) {
2683 options = qdict_new();
2684 }
2685
5b7ba05f
AG
2686 /* Check if this BlockDriverState is already in the queue */
2687 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
2688 if (bs == bs_entry->state.bs) {
2689 break;
2690 }
2691 }
2692
28518102
KW
2693 /*
2694 * Precedence of options:
2695 * 1. Explicitly passed in options (highest)
91a097e7 2696 * 2. Set in flags (only for top level)
145f598e 2697 * 3. Retained from explicitly set options of bs
8e2160e2 2698 * 4. Inherited from parent node
28518102
KW
2699 * 5. Retained from effective options of bs
2700 */
2701
91a097e7
KW
2702 if (!parent_options) {
2703 /*
2704 * Any setting represented by flags is always updated. If the
2705 * corresponding QDict option is set, it takes precedence. Otherwise
2706 * the flag is translated into a QDict option. The old setting of bs is
2707 * not considered.
2708 */
2709 update_options_from_flags(options, flags);
2710 }
2711
145f598e 2712 /* Old explicitly set values (don't overwrite by inherited value) */
5b7ba05f
AG
2713 if (bs_entry) {
2714 old_options = qdict_clone_shallow(bs_entry->state.explicit_options);
2715 } else {
2716 old_options = qdict_clone_shallow(bs->explicit_options);
2717 }
145f598e
KW
2718 bdrv_join_options(bs, options, old_options);
2719 QDECREF(old_options);
2720
2721 explicit_options = qdict_clone_shallow(options);
2722
28518102
KW
2723 /* Inherit from parent node */
2724 if (parent_options) {
2725 assert(!flags);
8e2160e2 2726 role->inherit_options(&flags, options, parent_flags, parent_options);
28518102
KW
2727 }
2728
2729 /* Old values are used for options that aren't set yet */
4d2cb092 2730 old_options = qdict_clone_shallow(bs->options);
cddff5ba 2731 bdrv_join_options(bs, options, old_options);
4d2cb092
KW
2732 QDECREF(old_options);
2733
f1f25a2e
KW
2734 /* bdrv_open() masks this flag out */
2735 flags &= ~BDRV_O_PROTOCOL;
2736
67251a31 2737 QLIST_FOREACH(child, &bs->children, next) {
4c9dfe5d
KW
2738 QDict *new_child_options;
2739 char *child_key_dot;
67251a31 2740
4c9dfe5d
KW
2741 /* reopen can only change the options of block devices that were
2742 * implicitly created and inherited options. For other (referenced)
2743 * block devices, a syntax like "backing.foo" results in an error. */
67251a31
KW
2744 if (child->bs->inherits_from != bs) {
2745 continue;
2746 }
2747
4c9dfe5d
KW
2748 child_key_dot = g_strdup_printf("%s.", child->name);
2749 qdict_extract_subqdict(options, &new_child_options, child_key_dot);
2750 g_free(child_key_dot);
2751
28518102
KW
2752 bdrv_reopen_queue_child(bs_queue, child->bs, new_child_options, 0,
2753 child->role, options, flags);
e971aa12
JC
2754 }
2755
5b7ba05f
AG
2756 if (!bs_entry) {
2757 bs_entry = g_new0(BlockReopenQueueEntry, 1);
2758 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
2759 } else {
2760 QDECREF(bs_entry->state.options);
2761 QDECREF(bs_entry->state.explicit_options);
2762 }
e971aa12
JC
2763
2764 bs_entry->state.bs = bs;
4d2cb092 2765 bs_entry->state.options = options;
145f598e 2766 bs_entry->state.explicit_options = explicit_options;
e971aa12
JC
2767 bs_entry->state.flags = flags;
2768
2769 return bs_queue;
2770}
2771
28518102
KW
2772BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
2773 BlockDriverState *bs,
2774 QDict *options, int flags)
2775{
2776 return bdrv_reopen_queue_child(bs_queue, bs, options, flags,
2777 NULL, NULL, 0);
2778}
2779
e971aa12
JC
2780/*
2781 * Reopen multiple BlockDriverStates atomically & transactionally.
2782 *
2783 * The queue passed in (bs_queue) must have been built up previous
2784 * via bdrv_reopen_queue().
2785 *
2786 * Reopens all BDS specified in the queue, with the appropriate
2787 * flags. All devices are prepared for reopen, and failure of any
2788 * device will cause all device changes to be abandonded, and intermediate
2789 * data cleaned up.
2790 *
2791 * If all devices prepare successfully, then the changes are committed
2792 * to all devices.
2793 *
2794 */
720150f3 2795int bdrv_reopen_multiple(AioContext *ctx, BlockReopenQueue *bs_queue, Error **errp)
e971aa12
JC
2796{
2797 int ret = -1;
2798 BlockReopenQueueEntry *bs_entry, *next;
2799 Error *local_err = NULL;
2800
2801 assert(bs_queue != NULL);
2802
c9d1a561 2803 aio_context_release(ctx);
40840e41 2804 bdrv_drain_all_begin();
c9d1a561 2805 aio_context_acquire(ctx);
e971aa12
JC
2806
2807 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
2808 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
2809 error_propagate(errp, local_err);
2810 goto cleanup;
2811 }
2812 bs_entry->prepared = true;
2813 }
2814
2815 /* If we reach this point, we have success and just need to apply the
2816 * changes
2817 */
2818 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
2819 bdrv_reopen_commit(&bs_entry->state);
2820 }
2821
2822 ret = 0;
2823
2824cleanup:
2825 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
2826 if (ret && bs_entry->prepared) {
2827 bdrv_reopen_abort(&bs_entry->state);
145f598e
KW
2828 } else if (ret) {
2829 QDECREF(bs_entry->state.explicit_options);
e971aa12 2830 }
4d2cb092 2831 QDECREF(bs_entry->state.options);
e971aa12
JC
2832 g_free(bs_entry);
2833 }
2834 g_free(bs_queue);
40840e41
AG
2835
2836 bdrv_drain_all_end();
2837
e971aa12
JC
2838 return ret;
2839}
2840
2841
2842/* Reopen a single BlockDriverState with the specified flags. */
2843int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
2844{
2845 int ret = -1;
2846 Error *local_err = NULL;
4d2cb092 2847 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12 2848
720150f3 2849 ret = bdrv_reopen_multiple(bdrv_get_aio_context(bs), queue, &local_err);
e971aa12
JC
2850 if (local_err != NULL) {
2851 error_propagate(errp, local_err);
2852 }
2853 return ret;
2854}
2855
2856
2857/*
2858 * Prepares a BlockDriverState for reopen. All changes are staged in the
2859 * 'opaque' field of the BDRVReopenState, which is used and allocated by
2860 * the block driver layer .bdrv_reopen_prepare()
2861 *
2862 * bs is the BlockDriverState to reopen
2863 * flags are the new open flags
2864 * queue is the reopen queue
2865 *
2866 * Returns 0 on success, non-zero on error. On error errp will be set
2867 * as well.
2868 *
2869 * On failure, bdrv_reopen_abort() will be called to clean up any data.
2870 * It is the responsibility of the caller to then call the abort() or
2871 * commit() for any other BDS that have been left in a prepare() state
2872 *
2873 */
2874int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
2875 Error **errp)
2876{
2877 int ret = -1;
2878 Error *local_err = NULL;
2879 BlockDriver *drv;
ccf9dc07
KW
2880 QemuOpts *opts;
2881 const char *value;
3d8ce171 2882 bool read_only;
e971aa12
JC
2883
2884 assert(reopen_state != NULL);
2885 assert(reopen_state->bs->drv != NULL);
2886 drv = reopen_state->bs->drv;
2887
ccf9dc07
KW
2888 /* Process generic block layer options */
2889 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
2890 qemu_opts_absorb_qdict(opts, reopen_state->options, &local_err);
2891 if (local_err) {
2892 error_propagate(errp, local_err);
2893 ret = -EINVAL;
2894 goto error;
2895 }
2896
91a097e7
KW
2897 update_flags_from_options(&reopen_state->flags, opts);
2898
ccf9dc07
KW
2899 /* node-name and driver must be unchanged. Put them back into the QDict, so
2900 * that they are checked at the end of this function. */
2901 value = qemu_opt_get(opts, "node-name");
2902 if (value) {
46f5ac20 2903 qdict_put_str(reopen_state->options, "node-name", value);
ccf9dc07
KW
2904 }
2905
2906 value = qemu_opt_get(opts, "driver");
2907 if (value) {
46f5ac20 2908 qdict_put_str(reopen_state->options, "driver", value);
ccf9dc07
KW
2909 }
2910
3d8ce171
JC
2911 /* If we are to stay read-only, do not allow permission change
2912 * to r/w. Attempting to set to r/w may fail if either BDRV_O_ALLOW_RDWR is
2913 * not set, or if the BDS still has copy_on_read enabled */
2914 read_only = !(reopen_state->flags & BDRV_O_RDWR);
2915 ret = bdrv_can_set_read_only(reopen_state->bs, read_only, &local_err);
2916 if (local_err) {
2917 error_propagate(errp, local_err);
e971aa12
JC
2918 goto error;
2919 }
2920
2921
2922 ret = bdrv_flush(reopen_state->bs);
2923 if (ret) {
455b0fde 2924 error_setg_errno(errp, -ret, "Error flushing drive");
e971aa12
JC
2925 goto error;
2926 }
2927
2928 if (drv->bdrv_reopen_prepare) {
2929 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
2930 if (ret) {
2931 if (local_err != NULL) {
2932 error_propagate(errp, local_err);
2933 } else {
d8b6895f
LC
2934 error_setg(errp, "failed while preparing to reopen image '%s'",
2935 reopen_state->bs->filename);
e971aa12
JC
2936 }
2937 goto error;
2938 }
2939 } else {
2940 /* It is currently mandatory to have a bdrv_reopen_prepare()
2941 * handler for each supported drv. */
81e5f78a
AG
2942 error_setg(errp, "Block format '%s' used by node '%s' "
2943 "does not support reopening files", drv->format_name,
2944 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
2945 ret = -1;
2946 goto error;
2947 }
2948
4d2cb092
KW
2949 /* Options that are not handled are only okay if they are unchanged
2950 * compared to the old state. It is expected that some options are only
2951 * used for the initial open, but not reopen (e.g. filename) */
2952 if (qdict_size(reopen_state->options)) {
2953 const QDictEntry *entry = qdict_first(reopen_state->options);
2954
2955 do {
2956 QString *new_obj = qobject_to_qstring(entry->value);
2957 const char *new = qstring_get_str(new_obj);
129c7d1c
MA
2958 /*
2959 * Caution: while qdict_get_try_str() is fine, getting
2960 * non-string types would require more care. When
2961 * bs->options come from -blockdev or blockdev_add, its
2962 * members are typed according to the QAPI schema, but
2963 * when they come from -drive, they're all QString.
2964 */
4d2cb092
KW
2965 const char *old = qdict_get_try_str(reopen_state->bs->options,
2966 entry->key);
2967
2968 if (!old || strcmp(new, old)) {
2969 error_setg(errp, "Cannot change the option '%s'", entry->key);
2970 ret = -EINVAL;
2971 goto error;
2972 }
2973 } while ((entry = qdict_next(reopen_state->options, entry)));
2974 }
2975
e971aa12
JC
2976 ret = 0;
2977
2978error:
ccf9dc07 2979 qemu_opts_del(opts);
e971aa12
JC
2980 return ret;
2981}
2982
2983/*
2984 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
2985 * makes them final by swapping the staging BlockDriverState contents into
2986 * the active BlockDriverState contents.
2987 */
2988void bdrv_reopen_commit(BDRVReopenState *reopen_state)
2989{
2990 BlockDriver *drv;
2991
2992 assert(reopen_state != NULL);
2993 drv = reopen_state->bs->drv;
2994 assert(drv != NULL);
2995
2996 /* If there are any driver level actions to take */
2997 if (drv->bdrv_reopen_commit) {
2998 drv->bdrv_reopen_commit(reopen_state);
2999 }
3000
3001 /* set BDS specific flags now */
145f598e
KW
3002 QDECREF(reopen_state->bs->explicit_options);
3003
3004 reopen_state->bs->explicit_options = reopen_state->explicit_options;
e971aa12 3005 reopen_state->bs->open_flags = reopen_state->flags;
e971aa12 3006 reopen_state->bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 3007
3baca891 3008 bdrv_refresh_limits(reopen_state->bs, NULL);
e971aa12
JC
3009}
3010
3011/*
3012 * Abort the reopen, and delete and free the staged changes in
3013 * reopen_state
3014 */
3015void bdrv_reopen_abort(BDRVReopenState *reopen_state)
3016{
3017 BlockDriver *drv;
3018
3019 assert(reopen_state != NULL);
3020 drv = reopen_state->bs->drv;
3021 assert(drv != NULL);
3022
3023 if (drv->bdrv_reopen_abort) {
3024 drv->bdrv_reopen_abort(reopen_state);
3025 }
145f598e
KW
3026
3027 QDECREF(reopen_state->explicit_options);
e971aa12
JC
3028}
3029
3030
64dff520 3031static void bdrv_close(BlockDriverState *bs)
fc01f7e7 3032{
33384421
HR
3033 BdrvAioNotifier *ban, *ban_next;
3034
ca9bd24c 3035 assert(!bs->job);
30f55fb8 3036 assert(!bs->refcnt);
99b7e775 3037
fc27291d 3038 bdrv_drained_begin(bs); /* complete I/O */
58fda173 3039 bdrv_flush(bs);
53ec73e2 3040 bdrv_drain(bs); /* in case flush left pending I/O */
fc27291d 3041
c5acdc9a
HR
3042 bdrv_release_named_dirty_bitmaps(bs);
3043 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
3044
3cbc002c 3045 if (bs->drv) {
6e93e7c4
KW
3046 BdrvChild *child, *next;
3047
9a7dedbc 3048 bs->drv->bdrv_close(bs);
9a4f4c31 3049 bs->drv = NULL;
9a7dedbc 3050
12fa4af6 3051 bdrv_set_backing_hd(bs, NULL, &error_abort);
9a7dedbc 3052
9a4f4c31
KW
3053 if (bs->file != NULL) {
3054 bdrv_unref_child(bs, bs->file);
3055 bs->file = NULL;
3056 }
3057
6e93e7c4 3058 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
3059 /* TODO Remove bdrv_unref() from drivers' close function and use
3060 * bdrv_unref_child() here */
bddcec37
KW
3061 if (child->bs->inherits_from == bs) {
3062 child->bs->inherits_from = NULL;
3063 }
33a60407 3064 bdrv_detach_child(child);
6e93e7c4
KW
3065 }
3066
7267c094 3067 g_free(bs->opaque);
ea2384d3 3068 bs->opaque = NULL;
d3faa13e 3069 atomic_set(&bs->copy_on_read, 0);
a275fa42
PB
3070 bs->backing_file[0] = '\0';
3071 bs->backing_format[0] = '\0';
6405875c 3072 bs->total_sectors = 0;
54115412
EB
3073 bs->encrypted = false;
3074 bs->valid_key = false;
3075 bs->sg = false;
de9c0cec 3076 QDECREF(bs->options);
145f598e 3077 QDECREF(bs->explicit_options);
de9c0cec 3078 bs->options = NULL;
91af7014
HR
3079 QDECREF(bs->full_open_options);
3080 bs->full_open_options = NULL;
b338082b 3081 }
98f90dba 3082
33384421
HR
3083 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
3084 g_free(ban);
3085 }
3086 QLIST_INIT(&bs->aio_notifiers);
fc27291d 3087 bdrv_drained_end(bs);
b338082b
FB
3088}
3089
2bc93fed
MK
3090void bdrv_close_all(void)
3091{
a1a2af07 3092 block_job_cancel_sync_all();
cd7fca95 3093 nbd_export_close_all();
ca9bd24c
HR
3094
3095 /* Drop references from requests still in flight, such as canceled block
3096 * jobs whose AIO context has not been polled yet */
3097 bdrv_drain_all();
2bc93fed 3098
ca9bd24c
HR
3099 blk_remove_all_bs();
3100 blockdev_close_all_bdrv_states();
ed78cda3 3101
a1a2af07 3102 assert(QTAILQ_EMPTY(&all_bdrv_states));
2bc93fed
MK
3103}
3104
d0ac0380
KW
3105static bool should_update_child(BdrvChild *c, BlockDriverState *to)
3106{
3107 BdrvChild *to_c;
3108
3109 if (c->role->stay_at_node) {
3110 return false;
3111 }
3112
3113 if (c->role == &child_backing) {
3114 /* If @from is a backing file of @to, ignore the child to avoid
3115 * creating a loop. We only want to change the pointer of other
3116 * parents. */
3117 QLIST_FOREACH(to_c, &to->children, next) {
3118 if (to_c == c) {
3119 break;
3120 }
3121 }
3122 if (to_c) {
3123 return false;
3124 }
3125 }
3126
3127 return true;
3128}
3129
5fe31c25
KW
3130void bdrv_replace_node(BlockDriverState *from, BlockDriverState *to,
3131 Error **errp)
dd62f1ca 3132{
d0ac0380 3133 BdrvChild *c, *next;
234ac1a9
KW
3134 GSList *list = NULL, *p;
3135 uint64_t old_perm, old_shared;
3136 uint64_t perm = 0, shared = BLK_PERM_ALL;
3137 int ret;
3138
5fe31c25
KW
3139 assert(!atomic_read(&from->in_flight));
3140 assert(!atomic_read(&to->in_flight));
dd62f1ca 3141
234ac1a9
KW
3142 /* Make sure that @from doesn't go away until we have successfully attached
3143 * all of its parents to @to. */
3144 bdrv_ref(from);
dd62f1ca 3145
234ac1a9 3146 /* Put all parents into @list and calculate their cumulative permissions */
dd62f1ca 3147 QLIST_FOREACH_SAFE(c, &from->parents, next_parent, next) {
d0ac0380 3148 if (!should_update_child(c, to)) {
26de9438
KW
3149 continue;
3150 }
234ac1a9
KW
3151 list = g_slist_prepend(list, c);
3152 perm |= c->perm;
3153 shared &= c->shared_perm;
3154 }
3155
3156 /* Check whether the required permissions can be granted on @to, ignoring
3157 * all BdrvChild in @list so that they can't block themselves. */
3158 ret = bdrv_check_update_perm(to, perm, shared, list, errp);
3159 if (ret < 0) {
3160 bdrv_abort_perm_update(to);
3161 goto out;
3162 }
3163
3164 /* Now actually perform the change. We performed the permission check for
3165 * all elements of @list at once, so set the permissions all at once at the
3166 * very end. */
3167 for (p = list; p != NULL; p = p->next) {
3168 c = p->data;
9bd910e2 3169
dd62f1ca 3170 bdrv_ref(to);
234ac1a9 3171 bdrv_replace_child_noperm(c, to);
dd62f1ca
KW
3172 bdrv_unref(from);
3173 }
234ac1a9
KW
3174
3175 bdrv_get_cumulative_perm(to, &old_perm, &old_shared);
3176 bdrv_set_perm(to, old_perm | perm, old_shared | shared);
3177
3178out:
3179 g_slist_free(list);
3180 bdrv_unref(from);
dd62f1ca
KW
3181}
3182
4ddc07ca
PB
3183/*
3184 * Add new bs contents at the top of an image chain while the chain is
3185 * live, while keeping required fields on the top layer.
3186 *
3187 * This will modify the BlockDriverState fields, and swap contents
3188 * between bs_new and bs_top. Both bs_new and bs_top are modified.
3189 *
bfb197e0 3190 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
3191 *
3192 * This function does not create any image files.
dd62f1ca
KW
3193 *
3194 * bdrv_append() takes ownership of a bs_new reference and unrefs it because
3195 * that's what the callers commonly need. bs_new will be referenced by the old
3196 * parents of bs_top after bdrv_append() returns. If the caller needs to keep a
3197 * reference of its own, it must call bdrv_ref().
4ddc07ca 3198 */
b2c2832c
KW
3199void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top,
3200 Error **errp)
4ddc07ca 3201{
b2c2832c
KW
3202 Error *local_err = NULL;
3203
b2c2832c
KW
3204 bdrv_set_backing_hd(bs_new, bs_top, &local_err);
3205 if (local_err) {
3206 error_propagate(errp, local_err);
3207 goto out;
3208 }
dd62f1ca 3209
5fe31c25 3210 bdrv_replace_node(bs_top, bs_new, &local_err);
234ac1a9
KW
3211 if (local_err) {
3212 error_propagate(errp, local_err);
3213 bdrv_set_backing_hd(bs_new, NULL, &error_abort);
3214 goto out;
3215 }
4ddc07ca 3216
dd62f1ca
KW
3217 /* bs_new is now referenced by its new parents, we don't need the
3218 * additional reference any more. */
b2c2832c 3219out:
dd62f1ca 3220 bdrv_unref(bs_new);
8802d1fd
JC
3221}
3222
4f6fd349 3223static void bdrv_delete(BlockDriverState *bs)
b338082b 3224{
3e914655 3225 assert(!bs->job);
3718d8ab 3226 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 3227 assert(!bs->refcnt);
18846dee 3228
e1b5c52e
SH
3229 bdrv_close(bs);
3230
1b7bdbc1 3231 /* remove from list, if necessary */
63eaaae0
KW
3232 if (bs->node_name[0] != '\0') {
3233 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
3234 }
2c1d04e0
HR
3235 QTAILQ_REMOVE(&all_bdrv_states, bs, bs_list);
3236
7267c094 3237 g_free(bs);
fc01f7e7
FB
3238}
3239
e97fc193
AL
3240/*
3241 * Run consistency checks on an image
3242 *
e076f338 3243 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 3244 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 3245 * check are stored in res.
e97fc193 3246 */
4534ff54 3247int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 3248{
908bcd54
HR
3249 if (bs->drv == NULL) {
3250 return -ENOMEDIUM;
3251 }
e97fc193
AL
3252 if (bs->drv->bdrv_check == NULL) {
3253 return -ENOTSUP;
3254 }
3255
e076f338 3256 memset(res, 0, sizeof(*res));
4534ff54 3257 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
3258}
3259
756e6736
KW
3260/*
3261 * Return values:
3262 * 0 - success
3263 * -EINVAL - backing format specified, but no file
3264 * -ENOSPC - can't update the backing file because no space is left in the
3265 * image file header
3266 * -ENOTSUP - format driver doesn't support changing the backing file
3267 */
3268int bdrv_change_backing_file(BlockDriverState *bs,
3269 const char *backing_file, const char *backing_fmt)
3270{
3271 BlockDriver *drv = bs->drv;
469ef350 3272 int ret;
756e6736 3273
5f377794
PB
3274 /* Backing file format doesn't make sense without a backing file */
3275 if (backing_fmt && !backing_file) {
3276 return -EINVAL;
3277 }
3278
756e6736 3279 if (drv->bdrv_change_backing_file != NULL) {
469ef350 3280 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 3281 } else {
469ef350 3282 ret = -ENOTSUP;
756e6736 3283 }
469ef350
PB
3284
3285 if (ret == 0) {
3286 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
3287 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
3288 }
3289 return ret;
756e6736
KW
3290}
3291
6ebdcee2
JC
3292/*
3293 * Finds the image layer in the chain that has 'bs' as its backing file.
3294 *
3295 * active is the current topmost image.
3296 *
3297 * Returns NULL if bs is not found in active's image chain,
3298 * or if active == bs.
4caf0fcd
JC
3299 *
3300 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
3301 */
3302BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
3303 BlockDriverState *bs)
3304{
760e0063
KW
3305 while (active && bs != backing_bs(active)) {
3306 active = backing_bs(active);
6ebdcee2
JC
3307 }
3308
4caf0fcd
JC
3309 return active;
3310}
6ebdcee2 3311
4caf0fcd
JC
3312/* Given a BDS, searches for the base layer. */
3313BlockDriverState *bdrv_find_base(BlockDriverState *bs)
3314{
3315 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
3316}
3317
6ebdcee2
JC
3318/*
3319 * Drops images above 'base' up to and including 'top', and sets the image
3320 * above 'top' to have base as its backing file.
3321 *
3322 * Requires that the overlay to 'top' is opened r/w, so that the backing file
3323 * information in 'bs' can be properly updated.
3324 *
3325 * E.g., this will convert the following chain:
3326 * bottom <- base <- intermediate <- top <- active
3327 *
3328 * to
3329 *
3330 * bottom <- base <- active
3331 *
3332 * It is allowed for bottom==base, in which case it converts:
3333 *
3334 * base <- intermediate <- top <- active
3335 *
3336 * to
3337 *
3338 * base <- active
3339 *
54e26900
JC
3340 * If backing_file_str is non-NULL, it will be used when modifying top's
3341 * overlay image metadata.
3342 *
6ebdcee2
JC
3343 * Error conditions:
3344 * if active == top, that is considered an error
3345 *
3346 */
3347int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 3348 BlockDriverState *base, const char *backing_file_str)
6ebdcee2 3349{
6ebdcee2 3350 BlockDriverState *new_top_bs = NULL;
12fa4af6 3351 Error *local_err = NULL;
6ebdcee2
JC
3352 int ret = -EIO;
3353
6ebdcee2
JC
3354 if (!top->drv || !base->drv) {
3355 goto exit;
3356 }
3357
3358 new_top_bs = bdrv_find_overlay(active, top);
3359
3360 if (new_top_bs == NULL) {
3361 /* we could not find the image above 'top', this is an error */
3362 goto exit;
3363 }
3364
760e0063 3365 /* special case of new_top_bs->backing->bs already pointing to base - nothing
6ebdcee2 3366 * to do, no intermediate images */
760e0063 3367 if (backing_bs(new_top_bs) == base) {
6ebdcee2
JC
3368 ret = 0;
3369 goto exit;
3370 }
3371
5db15a57
KW
3372 /* Make sure that base is in the backing chain of top */
3373 if (!bdrv_chain_contains(top, base)) {
6ebdcee2
JC
3374 goto exit;
3375 }
3376
3377 /* success - we can delete the intermediate states, and link top->base */
5db15a57 3378 backing_file_str = backing_file_str ? backing_file_str : base->filename;
54e26900 3379 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
5db15a57 3380 base->drv ? base->drv->format_name : "");
6ebdcee2
JC
3381 if (ret) {
3382 goto exit;
3383 }
12fa4af6
KW
3384
3385 bdrv_set_backing_hd(new_top_bs, base, &local_err);
3386 if (local_err) {
3387 ret = -EPERM;
3388 error_report_err(local_err);
3389 goto exit;
3390 }
6ebdcee2 3391
6ebdcee2 3392 ret = 0;
6ebdcee2 3393exit:
6ebdcee2
JC
3394 return ret;
3395}
3396
61007b31
SH
3397/**
3398 * Truncate file to 'offset' bytes (needed only for file protocols)
3399 */
ed3d2ec9 3400int bdrv_truncate(BdrvChild *child, int64_t offset, Error **errp)
71d0770c 3401{
52cdbc58 3402 BlockDriverState *bs = child->bs;
61007b31
SH
3403 BlockDriver *drv = bs->drv;
3404 int ret;
c8f6d58e 3405
362b3786 3406 assert(child->perm & BLK_PERM_RESIZE);
c8f6d58e 3407
ed3d2ec9
HR
3408 if (!drv) {
3409 error_setg(errp, "No medium inserted");
71d0770c 3410 return -ENOMEDIUM;
ed3d2ec9
HR
3411 }
3412 if (!drv->bdrv_truncate) {
3413 error_setg(errp, "Image format driver does not support resize");
61007b31 3414 return -ENOTSUP;
ed3d2ec9
HR
3415 }
3416 if (bs->read_only) {
3417 error_setg(errp, "Image is read-only");
61007b31 3418 return -EACCES;
ed3d2ec9 3419 }
71d0770c 3420
504c205a
DL
3421 assert(!(bs->open_flags & BDRV_O_INACTIVE));
3422
4bff28b8 3423 ret = drv->bdrv_truncate(bs, offset, errp);
61007b31
SH
3424 if (ret == 0) {
3425 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
3426 bdrv_dirty_bitmap_truncate(bs);
5c8cab48 3427 bdrv_parent_cb_resize(bs);
47fec599 3428 atomic_inc(&bs->write_gen);
c0191e76 3429 }
61007b31 3430 return ret;
71d0770c
AL
3431}
3432
61007b31
SH
3433/**
3434 * Length of a allocated file in bytes. Sparse files are counted by actual
3435 * allocated space. Return < 0 if error or unknown.
3436 */
3437int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 3438{
61007b31
SH
3439 BlockDriver *drv = bs->drv;
3440 if (!drv) {
3441 return -ENOMEDIUM;
8f4754ed 3442 }
61007b31
SH
3443 if (drv->bdrv_get_allocated_file_size) {
3444 return drv->bdrv_get_allocated_file_size(bs);
3445 }
3446 if (bs->file) {
9a4f4c31 3447 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 3448 }
61007b31 3449 return -ENOTSUP;
1c9805a3 3450}
e7a8a783 3451
61007b31
SH
3452/**
3453 * Return number of sectors on success, -errno on error.
1c9805a3 3454 */
61007b31 3455int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 3456{
61007b31 3457 BlockDriver *drv = bs->drv;
498e386c 3458
61007b31
SH
3459 if (!drv)
3460 return -ENOMEDIUM;
2572b37a 3461
61007b31
SH
3462 if (drv->has_variable_length) {
3463 int ret = refresh_total_sectors(bs, bs->total_sectors);
3464 if (ret < 0) {
3465 return ret;
1c9805a3
SH
3466 }
3467 }
61007b31 3468 return bs->total_sectors;
1c9805a3 3469}
b338082b 3470
61007b31
SH
3471/**
3472 * Return length in bytes on success, -errno on error.
3473 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 3474 */
61007b31 3475int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 3476{
61007b31 3477 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 3478
4a9c9ea0 3479 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 3480 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
3481}
3482
61007b31
SH
3483/* return 0 as number of sectors if no device present or error */
3484void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 3485{
61007b31 3486 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 3487
61007b31 3488 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
3489}
3490
54115412 3491bool bdrv_is_sg(BlockDriverState *bs)
f08145fe 3492{
61007b31 3493 return bs->sg;
f08145fe
KW
3494}
3495
54115412 3496bool bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 3497{
760e0063 3498 if (bs->backing && bs->backing->bs->encrypted) {
54115412 3499 return true;
760e0063 3500 }
61007b31 3501 return bs->encrypted;
fc3959e4
FZ
3502}
3503
54115412 3504bool bdrv_key_required(BlockDriverState *bs)
fc3959e4 3505{
760e0063 3506 BdrvChild *backing = bs->backing;
61007b31 3507
760e0063 3508 if (backing && backing->bs->encrypted && !backing->bs->valid_key) {
54115412 3509 return true;
760e0063 3510 }
61007b31 3511 return (bs->encrypted && !bs->valid_key);
fc3959e4
FZ
3512}
3513
61007b31 3514int bdrv_set_key(BlockDriverState *bs, const char *key)
d0c7f642 3515{
d0c7f642 3516 int ret;
760e0063
KW
3517 if (bs->backing && bs->backing->bs->encrypted) {
3518 ret = bdrv_set_key(bs->backing->bs, key);
61007b31
SH
3519 if (ret < 0)
3520 return ret;
3521 if (!bs->encrypted)
3522 return 0;
3523 }
3524 if (!bs->encrypted) {
3525 return -EINVAL;
3526 } else if (!bs->drv || !bs->drv->bdrv_set_key) {
d0c7f642
KW
3527 return -ENOMEDIUM;
3528 }
61007b31 3529 ret = bs->drv->bdrv_set_key(bs, key);
b9c64947 3530 if (ret < 0) {
54115412 3531 bs->valid_key = false;
61007b31 3532 } else if (!bs->valid_key) {
5c8cab48 3533 /* call the change callback now, we skipped it on open */
54115412 3534 bs->valid_key = true;
5c8cab48 3535 bdrv_parent_cb_change_media(bs, true);
1b0288ae 3536 }
61007b31
SH
3537 return ret;
3538}
f08f2dda 3539
c5fbe571 3540/*
61007b31
SH
3541 * Provide an encryption key for @bs.
3542 * If @key is non-null:
3543 * If @bs is not encrypted, fail.
3544 * Else if the key is invalid, fail.
3545 * Else set @bs's key to @key, replacing the existing key, if any.
3546 * If @key is null:
3547 * If @bs is encrypted and still lacks a key, fail.
3548 * Else do nothing.
3549 * On failure, store an error object through @errp if non-null.
c5fbe571 3550 */
61007b31 3551void bdrv_add_key(BlockDriverState *bs, const char *key, Error **errp)
c5fbe571 3552{
61007b31
SH
3553 if (key) {
3554 if (!bdrv_is_encrypted(bs)) {
3555 error_setg(errp, "Node '%s' is not encrypted",
3556 bdrv_get_device_or_node_name(bs));
3557 } else if (bdrv_set_key(bs, key) < 0) {
c6bd8c70 3558 error_setg(errp, QERR_INVALID_PASSWORD);
4d2855a3
MA
3559 }
3560 } else {
3561 if (bdrv_key_required(bs)) {
b1ca6391
MA
3562 error_set(errp, ERROR_CLASS_DEVICE_ENCRYPTED,
3563 "'%s' (%s) is encrypted",
81e5f78a 3564 bdrv_get_device_or_node_name(bs),
4d2855a3
MA
3565 bdrv_get_encrypted_filename(bs));
3566 }
3567 }
3568}
3569
61007b31 3570const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 3571{
61007b31 3572 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
3573}
3574
61007b31 3575static int qsort_strcmp(const void *a, const void *b)
40b4f539 3576{
ceff5bd7 3577 return strcmp(*(char *const *)a, *(char *const *)b);
40b4f539
KW
3578}
3579
61007b31
SH
3580void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
3581 void *opaque)
40b4f539 3582{
61007b31
SH
3583 BlockDriver *drv;
3584 int count = 0;
3585 int i;
3586 const char **formats = NULL;
40b4f539 3587
61007b31
SH
3588 QLIST_FOREACH(drv, &bdrv_drivers, list) {
3589 if (drv->format_name) {
3590 bool found = false;
3591 int i = count;
3592 while (formats && i && !found) {
3593 found = !strcmp(formats[--i], drv->format_name);
3594 }
e2a305fb 3595
61007b31
SH
3596 if (!found) {
3597 formats = g_renew(const char *, formats, count + 1);
3598 formats[count++] = drv->format_name;
3599 }
6c5a42ac 3600 }
61007b31 3601 }
6c5a42ac 3602
eb0df69f
HR
3603 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); i++) {
3604 const char *format_name = block_driver_modules[i].format_name;
3605
3606 if (format_name) {
3607 bool found = false;
3608 int j = count;
3609
3610 while (formats && j && !found) {
3611 found = !strcmp(formats[--j], format_name);
3612 }
3613
3614 if (!found) {
3615 formats = g_renew(const char *, formats, count + 1);
3616 formats[count++] = format_name;
3617 }
3618 }
3619 }
3620
61007b31 3621 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 3622
61007b31
SH
3623 for (i = 0; i < count; i++) {
3624 it(opaque, formats[i]);
3625 }
40b4f539 3626
61007b31
SH
3627 g_free(formats);
3628}
40b4f539 3629
61007b31
SH
3630/* This function is to find a node in the bs graph */
3631BlockDriverState *bdrv_find_node(const char *node_name)
3632{
3633 BlockDriverState *bs;
391827eb 3634
61007b31 3635 assert(node_name);
40b4f539 3636
61007b31
SH
3637 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
3638 if (!strcmp(node_name, bs->node_name)) {
3639 return bs;
40b4f539
KW
3640 }
3641 }
61007b31 3642 return NULL;
40b4f539
KW
3643}
3644
61007b31
SH
3645/* Put this QMP function here so it can access the static graph_bdrv_states. */
3646BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 3647{
61007b31
SH
3648 BlockDeviceInfoList *list, *entry;
3649 BlockDriverState *bs;
40b4f539 3650
61007b31
SH
3651 list = NULL;
3652 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
c83f9fba 3653 BlockDeviceInfo *info = bdrv_block_device_info(NULL, bs, errp);
61007b31
SH
3654 if (!info) {
3655 qapi_free_BlockDeviceInfoList(list);
3656 return NULL;
301db7c2 3657 }
61007b31
SH
3658 entry = g_malloc0(sizeof(*entry));
3659 entry->value = info;
3660 entry->next = list;
3661 list = entry;
301db7c2
RH
3662 }
3663
61007b31
SH
3664 return list;
3665}
40b4f539 3666
61007b31
SH
3667BlockDriverState *bdrv_lookup_bs(const char *device,
3668 const char *node_name,
3669 Error **errp)
3670{
3671 BlockBackend *blk;
3672 BlockDriverState *bs;
40b4f539 3673
61007b31
SH
3674 if (device) {
3675 blk = blk_by_name(device);
40b4f539 3676
61007b31 3677 if (blk) {
9f4ed6fb
AG
3678 bs = blk_bs(blk);
3679 if (!bs) {
5433c24f 3680 error_setg(errp, "Device '%s' has no medium", device);
5433c24f
HR
3681 }
3682
9f4ed6fb 3683 return bs;
61007b31
SH
3684 }
3685 }
40b4f539 3686
61007b31
SH
3687 if (node_name) {
3688 bs = bdrv_find_node(node_name);
6d519a5f 3689
61007b31
SH
3690 if (bs) {
3691 return bs;
3692 }
40b4f539
KW
3693 }
3694
61007b31
SH
3695 error_setg(errp, "Cannot find device=%s nor node_name=%s",
3696 device ? device : "",
3697 node_name ? node_name : "");
3698 return NULL;
40b4f539
KW
3699}
3700
61007b31
SH
3701/* If 'base' is in the same chain as 'top', return true. Otherwise,
3702 * return false. If either argument is NULL, return false. */
3703bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 3704{
61007b31 3705 while (top && top != base) {
760e0063 3706 top = backing_bs(top);
02c50efe 3707 }
61007b31
SH
3708
3709 return top != NULL;
02c50efe
FZ
3710}
3711
61007b31 3712BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 3713{
61007b31
SH
3714 if (!bs) {
3715 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 3716 }
61007b31 3717 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
3718}
3719
61007b31 3720const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 3721{
61007b31 3722 return bs->node_name;
beac80cd
FB
3723}
3724
1f0c461b 3725const char *bdrv_get_parent_name(const BlockDriverState *bs)
4c265bf9
KW
3726{
3727 BdrvChild *c;
3728 const char *name;
3729
3730 /* If multiple parents have a name, just pick the first one. */
3731 QLIST_FOREACH(c, &bs->parents, next_parent) {
3732 if (c->role->get_name) {
3733 name = c->role->get_name(c);
3734 if (name && *name) {
3735 return name;
3736 }
3737 }
3738 }
3739
3740 return NULL;
3741}
3742
61007b31
SH
3743/* TODO check what callers really want: bs->node_name or blk_name() */
3744const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 3745{
4c265bf9 3746 return bdrv_get_parent_name(bs) ?: "";
f141eafe 3747}
83f64091 3748
61007b31
SH
3749/* This can be used to identify nodes that might not have a device
3750 * name associated. Since node and device names live in the same
3751 * namespace, the result is unambiguous. The exception is if both are
3752 * absent, then this returns an empty (non-null) string. */
3753const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 3754{
4c265bf9 3755 return bdrv_get_parent_name(bs) ?: bs->node_name;
beac80cd 3756}
beac80cd 3757
61007b31 3758int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 3759{
61007b31 3760 return bs->open_flags;
0b5a2445
PB
3761}
3762
61007b31 3763int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 3764{
61007b31 3765 return 1;
0b5a2445
PB
3766}
3767
61007b31 3768int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 3769{
61007b31 3770 assert(bs->drv);
0b5a2445 3771
61007b31
SH
3772 /* If BS is a copy on write image, it is initialized to
3773 the contents of the base image, which may not be zeroes. */
760e0063 3774 if (bs->backing) {
61007b31
SH
3775 return 0;
3776 }
3777 if (bs->drv->bdrv_has_zero_init) {
3778 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 3779 }
61007b31
SH
3780
3781 /* safe default */
3782 return 0;
68485420
KW
3783}
3784
61007b31 3785bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 3786{
61007b31 3787 BlockDriverInfo bdi;
b2a61371 3788
760e0063 3789 if (bs->backing) {
61007b31
SH
3790 return false;
3791 }
3792
3793 if (bdrv_get_info(bs, &bdi) == 0) {
3794 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
3795 }
3796
61007b31 3797 return false;
b2a61371
SH
3798}
3799
61007b31 3800bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 3801{
61007b31 3802 BlockDriverInfo bdi;
68485420 3803
2f0342ef 3804 if (!(bs->open_flags & BDRV_O_UNMAP)) {
61007b31
SH
3805 return false;
3806 }
68485420 3807
61007b31
SH
3808 if (bdrv_get_info(bs, &bdi) == 0) {
3809 return bdi.can_write_zeroes_with_unmap;
3810 }
68485420 3811
61007b31 3812 return false;
68485420
KW
3813}
3814
61007b31 3815const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 3816{
760e0063 3817 if (bs->backing && bs->backing->bs->encrypted)
61007b31
SH
3818 return bs->backing_file;
3819 else if (bs->encrypted)
3820 return bs->filename;
3821 else
3822 return NULL;
b2e12bc6
CH
3823}
3824
61007b31
SH
3825void bdrv_get_backing_filename(BlockDriverState *bs,
3826 char *filename, int filename_size)
016f5cf6 3827{
61007b31
SH
3828 pstrcpy(filename, filename_size, bs->backing_file);
3829}
d318aea9 3830
61007b31
SH
3831int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
3832{
3833 BlockDriver *drv = bs->drv;
3834 if (!drv)
3835 return -ENOMEDIUM;
3836 if (!drv->bdrv_get_info)
3837 return -ENOTSUP;
3838 memset(bdi, 0, sizeof(*bdi));
3839 return drv->bdrv_get_info(bs, bdi);
3840}
016f5cf6 3841
61007b31
SH
3842ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
3843{
3844 BlockDriver *drv = bs->drv;
3845 if (drv && drv->bdrv_get_specific_info) {
3846 return drv->bdrv_get_specific_info(bs);
3847 }
3848 return NULL;
016f5cf6
AG
3849}
3850
a31939e6 3851void bdrv_debug_event(BlockDriverState *bs, BlkdebugEvent event)
4265d620 3852{
61007b31
SH
3853 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
3854 return;
3855 }
4265d620 3856
61007b31 3857 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
3858}
3859
61007b31
SH
3860int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
3861 const char *tag)
4265d620 3862{
61007b31 3863 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 3864 bs = bs->file ? bs->file->bs : NULL;
61007b31 3865 }
4265d620 3866
61007b31
SH
3867 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
3868 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
3869 }
4265d620 3870
61007b31 3871 return -ENOTSUP;
4265d620
PB
3872}
3873
61007b31 3874int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 3875{
61007b31 3876 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 3877 bs = bs->file ? bs->file->bs : NULL;
61007b31 3878 }
ce1a14dc 3879
61007b31
SH
3880 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
3881 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
3882 }
3883
3884 return -ENOTSUP;
eb852011
MA
3885}
3886
61007b31 3887int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 3888{
61007b31 3889 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 3890 bs = bs->file ? bs->file->bs : NULL;
61007b31 3891 }
ce1a14dc 3892
61007b31
SH
3893 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
3894 return bs->drv->bdrv_debug_resume(bs, tag);
3895 }
ce1a14dc 3896
61007b31 3897 return -ENOTSUP;
f197fe2b
FZ
3898}
3899
61007b31 3900bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 3901{
61007b31 3902 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 3903 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 3904 }
19cb3738 3905
61007b31
SH
3906 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
3907 return bs->drv->bdrv_debug_is_suspended(bs, tag);
3908 }
f9f05dc5 3909
61007b31
SH
3910 return false;
3911}
f9f05dc5 3912
61007b31
SH
3913/* backing_file can either be relative, or absolute, or a protocol. If it is
3914 * relative, it must be relative to the chain. So, passing in bs->filename
3915 * from a BDS as backing_file should not be done, as that may be relative to
3916 * the CWD rather than the chain. */
3917BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
3918 const char *backing_file)
f9f05dc5 3919{
61007b31
SH
3920 char *filename_full = NULL;
3921 char *backing_file_full = NULL;
3922 char *filename_tmp = NULL;
3923 int is_protocol = 0;
3924 BlockDriverState *curr_bs = NULL;
3925 BlockDriverState *retval = NULL;
418661e0 3926 Error *local_error = NULL;
f9f05dc5 3927
61007b31
SH
3928 if (!bs || !bs->drv || !backing_file) {
3929 return NULL;
f9f05dc5
KW
3930 }
3931
61007b31
SH
3932 filename_full = g_malloc(PATH_MAX);
3933 backing_file_full = g_malloc(PATH_MAX);
3934 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 3935
61007b31 3936 is_protocol = path_has_protocol(backing_file);
f9f05dc5 3937
760e0063 3938 for (curr_bs = bs; curr_bs->backing; curr_bs = curr_bs->backing->bs) {
f9f05dc5 3939
61007b31
SH
3940 /* If either of the filename paths is actually a protocol, then
3941 * compare unmodified paths; otherwise make paths relative */
3942 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
3943 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
760e0063 3944 retval = curr_bs->backing->bs;
61007b31
SH
3945 break;
3946 }
418661e0
JC
3947 /* Also check against the full backing filename for the image */
3948 bdrv_get_full_backing_filename(curr_bs, backing_file_full, PATH_MAX,
3949 &local_error);
3950 if (local_error == NULL) {
3951 if (strcmp(backing_file, backing_file_full) == 0) {
3952 retval = curr_bs->backing->bs;
3953 break;
3954 }
3955 } else {
3956 error_free(local_error);
3957 local_error = NULL;
3958 }
61007b31
SH
3959 } else {
3960 /* If not an absolute filename path, make it relative to the current
3961 * image's filename path */
3962 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3963 backing_file);
f9f05dc5 3964
61007b31
SH
3965 /* We are going to compare absolute pathnames */
3966 if (!realpath(filename_tmp, filename_full)) {
3967 continue;
3968 }
07f07615 3969
61007b31
SH
3970 /* We need to make sure the backing filename we are comparing against
3971 * is relative to the current image filename (or absolute) */
3972 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3973 curr_bs->backing_file);
07f07615 3974
61007b31
SH
3975 if (!realpath(filename_tmp, backing_file_full)) {
3976 continue;
3977 }
eb489bb1 3978
61007b31 3979 if (strcmp(backing_file_full, filename_full) == 0) {
760e0063 3980 retval = curr_bs->backing->bs;
61007b31
SH
3981 break;
3982 }
3983 }
eb489bb1
KW
3984 }
3985
61007b31
SH
3986 g_free(filename_full);
3987 g_free(backing_file_full);
3988 g_free(filename_tmp);
3989 return retval;
3990}
3991
3992int bdrv_get_backing_file_depth(BlockDriverState *bs)
3993{
3994 if (!bs->drv) {
3995 return 0;
eb489bb1
KW
3996 }
3997
760e0063 3998 if (!bs->backing) {
61007b31 3999 return 0;
ca716364
KW
4000 }
4001
760e0063 4002 return 1 + bdrv_get_backing_file_depth(bs->backing->bs);
61007b31 4003}
07f07615 4004
61007b31
SH
4005void bdrv_init(void)
4006{
4007 module_call_init(MODULE_INIT_BLOCK);
4008}
29cdb251 4009
61007b31
SH
4010void bdrv_init_with_whitelist(void)
4011{
4012 use_bdrv_whitelist = 1;
4013 bdrv_init();
07f07615
PB
4014}
4015
5a8a30db 4016void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 4017{
4417ab7a 4018 BdrvChild *child, *parent;
9c5e6594 4019 uint64_t perm, shared_perm;
5a8a30db
KW
4020 Error *local_err = NULL;
4021 int ret;
4022
3456a8d1
KW
4023 if (!bs->drv) {
4024 return;
4025 }
4026
04c01a5c 4027 if (!(bs->open_flags & BDRV_O_INACTIVE)) {
7ea2d269
AK
4028 return;
4029 }
7ea2d269 4030
16e977d5
VSO
4031 QLIST_FOREACH(child, &bs->children, next) {
4032 bdrv_invalidate_cache(child->bs, &local_err);
0d1c5c91 4033 if (local_err) {
0d1c5c91
FZ
4034 error_propagate(errp, local_err);
4035 return;
4036 }
5a8a30db 4037 }
0d1c5c91 4038
16e977d5
VSO
4039 bs->open_flags &= ~BDRV_O_INACTIVE;
4040 if (bs->drv->bdrv_invalidate_cache) {
4041 bs->drv->bdrv_invalidate_cache(bs, &local_err);
0d1c5c91
FZ
4042 if (local_err) {
4043 bs->open_flags |= BDRV_O_INACTIVE;
4044 error_propagate(errp, local_err);
4045 return;
4046 }
0f15423c 4047 }
3456a8d1 4048
5a8a30db
KW
4049 ret = refresh_total_sectors(bs, bs->total_sectors);
4050 if (ret < 0) {
04c01a5c 4051 bs->open_flags |= BDRV_O_INACTIVE;
5a8a30db
KW
4052 error_setg_errno(errp, -ret, "Could not refresh total sector count");
4053 return;
4054 }
4417ab7a 4055
9c5e6594
KW
4056 /* Update permissions, they may differ for inactive nodes */
4057 bdrv_get_cumulative_perm(bs, &perm, &shared_perm);
4058 ret = bdrv_check_perm(bs, perm, shared_perm, NULL, &local_err);
4059 if (ret < 0) {
4060 bs->open_flags |= BDRV_O_INACTIVE;
4061 error_propagate(errp, local_err);
4062 return;
4063 }
4064 bdrv_set_perm(bs, perm, shared_perm);
4065
4417ab7a
KW
4066 QLIST_FOREACH(parent, &bs->parents, next_parent) {
4067 if (parent->role->activate) {
4068 parent->role->activate(parent, &local_err);
4069 if (local_err) {
4070 error_propagate(errp, local_err);
4071 return;
4072 }
4073 }
4074 }
0f15423c
AL
4075}
4076
5a8a30db 4077void bdrv_invalidate_cache_all(Error **errp)
0f15423c 4078{
7c8eece4 4079 BlockDriverState *bs;
5a8a30db 4080 Error *local_err = NULL;
88be7b4b 4081 BdrvNextIterator it;
0f15423c 4082
88be7b4b 4083 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
ed78cda3
SH
4084 AioContext *aio_context = bdrv_get_aio_context(bs);
4085
4086 aio_context_acquire(aio_context);
5a8a30db 4087 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 4088 aio_context_release(aio_context);
5a8a30db
KW
4089 if (local_err) {
4090 error_propagate(errp, local_err);
4091 return;
4092 }
0f15423c
AL
4093 }
4094}
4095
aad0b7a0
FZ
4096static int bdrv_inactivate_recurse(BlockDriverState *bs,
4097 bool setting_flag)
76b1c7fe 4098{
cfa1a572 4099 BdrvChild *child, *parent;
76b1c7fe
KW
4100 int ret;
4101
aad0b7a0 4102 if (!setting_flag && bs->drv->bdrv_inactivate) {
76b1c7fe
KW
4103 ret = bs->drv->bdrv_inactivate(bs);
4104 if (ret < 0) {
4105 return ret;
4106 }
4107 }
4108
aad0b7a0 4109 if (setting_flag) {
9c5e6594
KW
4110 uint64_t perm, shared_perm;
4111
aad0b7a0 4112 bs->open_flags |= BDRV_O_INACTIVE;
cfa1a572
KW
4113
4114 QLIST_FOREACH(parent, &bs->parents, next_parent) {
4115 if (parent->role->inactivate) {
4116 ret = parent->role->inactivate(parent);
4117 if (ret < 0) {
4118 bs->open_flags &= ~BDRV_O_INACTIVE;
4119 return ret;
4120 }
4121 }
4122 }
9c5e6594
KW
4123
4124 /* Update permissions, they may differ for inactive nodes */
4125 bdrv_get_cumulative_perm(bs, &perm, &shared_perm);
4126 bdrv_check_perm(bs, perm, shared_perm, NULL, &error_abort);
4127 bdrv_set_perm(bs, perm, shared_perm);
aad0b7a0 4128 }
38701b6a
KW
4129
4130 QLIST_FOREACH(child, &bs->children, next) {
4131 ret = bdrv_inactivate_recurse(child->bs, setting_flag);
4132 if (ret < 0) {
4133 return ret;
4134 }
4135 }
4136
76b1c7fe
KW
4137 return 0;
4138}
4139
4140int bdrv_inactivate_all(void)
4141{
79720af6 4142 BlockDriverState *bs = NULL;
88be7b4b 4143 BdrvNextIterator it;
aad0b7a0
FZ
4144 int ret = 0;
4145 int pass;
76b1c7fe 4146
88be7b4b 4147 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
4148 aio_context_acquire(bdrv_get_aio_context(bs));
4149 }
76b1c7fe 4150
aad0b7a0
FZ
4151 /* We do two passes of inactivation. The first pass calls to drivers'
4152 * .bdrv_inactivate callbacks recursively so all cache is flushed to disk;
4153 * the second pass sets the BDRV_O_INACTIVE flag so that no further write
4154 * is allowed. */
4155 for (pass = 0; pass < 2; pass++) {
88be7b4b 4156 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
4157 ret = bdrv_inactivate_recurse(bs, pass);
4158 if (ret < 0) {
4159 goto out;
4160 }
76b1c7fe
KW
4161 }
4162 }
4163
aad0b7a0 4164out:
88be7b4b 4165 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
4166 aio_context_release(bdrv_get_aio_context(bs));
4167 }
4168
4169 return ret;
76b1c7fe
KW
4170}
4171
19cb3738
FB
4172/**************************************************************/
4173/* removable device support */
4174
4175/**
4176 * Return TRUE if the media is present
4177 */
e031f750 4178bool bdrv_is_inserted(BlockDriverState *bs)
19cb3738
FB
4179{
4180 BlockDriver *drv = bs->drv;
28d7a789 4181 BdrvChild *child;
a1aff5bf 4182
e031f750
HR
4183 if (!drv) {
4184 return false;
4185 }
28d7a789
HR
4186 if (drv->bdrv_is_inserted) {
4187 return drv->bdrv_is_inserted(bs);
4188 }
4189 QLIST_FOREACH(child, &bs->children, next) {
4190 if (!bdrv_is_inserted(child->bs)) {
4191 return false;
4192 }
e031f750 4193 }
28d7a789 4194 return true;
19cb3738
FB
4195}
4196
4197/**
8e49ca46
MA
4198 * Return whether the media changed since the last call to this
4199 * function, or -ENOTSUP if we don't know. Most drivers don't know.
19cb3738
FB
4200 */
4201int bdrv_media_changed(BlockDriverState *bs)
4202{
4203 BlockDriver *drv = bs->drv;
19cb3738 4204
8e49ca46
MA
4205 if (drv && drv->bdrv_media_changed) {
4206 return drv->bdrv_media_changed(bs);
4207 }
4208 return -ENOTSUP;
19cb3738
FB
4209}
4210
4211/**
4212 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
4213 */
f36f3949 4214void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
4215{
4216 BlockDriver *drv = bs->drv;
19cb3738 4217
822e1cd1
MA
4218 if (drv && drv->bdrv_eject) {
4219 drv->bdrv_eject(bs, eject_flag);
19cb3738
FB
4220 }
4221}
4222
19cb3738
FB
4223/**
4224 * Lock or unlock the media (if it is locked, the user won't be able
4225 * to eject it manually).
4226 */
025e849a 4227void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
4228{
4229 BlockDriver *drv = bs->drv;
4230
025e849a 4231 trace_bdrv_lock_medium(bs, locked);
b8c6d095 4232
025e849a
MA
4233 if (drv && drv->bdrv_lock_medium) {
4234 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
4235 }
4236}
985a03b0 4237
9fcb0251
FZ
4238/* Get a reference to bs */
4239void bdrv_ref(BlockDriverState *bs)
4240{
4241 bs->refcnt++;
4242}
4243
4244/* Release a previously grabbed reference to bs.
4245 * If after releasing, reference count is zero, the BlockDriverState is
4246 * deleted. */
4247void bdrv_unref(BlockDriverState *bs)
4248{
9a4d5ca6
JC
4249 if (!bs) {
4250 return;
4251 }
9fcb0251
FZ
4252 assert(bs->refcnt > 0);
4253 if (--bs->refcnt == 0) {
4254 bdrv_delete(bs);
4255 }
4256}
4257
fbe40ff7
FZ
4258struct BdrvOpBlocker {
4259 Error *reason;
4260 QLIST_ENTRY(BdrvOpBlocker) list;
4261};
4262
4263bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
4264{
4265 BdrvOpBlocker *blocker;
4266 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4267 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
4268 blocker = QLIST_FIRST(&bs->op_blockers[op]);
4269 if (errp) {
e43bfd9c
MA
4270 *errp = error_copy(blocker->reason);
4271 error_prepend(errp, "Node '%s' is busy: ",
4272 bdrv_get_device_or_node_name(bs));
fbe40ff7
FZ
4273 }
4274 return true;
4275 }
4276 return false;
4277}
4278
4279void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
4280{
4281 BdrvOpBlocker *blocker;
4282 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4283
5839e53b 4284 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
4285 blocker->reason = reason;
4286 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
4287}
4288
4289void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
4290{
4291 BdrvOpBlocker *blocker, *next;
4292 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4293 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
4294 if (blocker->reason == reason) {
4295 QLIST_REMOVE(blocker, list);
4296 g_free(blocker);
4297 }
4298 }
4299}
4300
4301void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
4302{
4303 int i;
4304 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4305 bdrv_op_block(bs, i, reason);
4306 }
4307}
4308
4309void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
4310{
4311 int i;
4312 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4313 bdrv_op_unblock(bs, i, reason);
4314 }
4315}
4316
4317bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
4318{
4319 int i;
4320
4321 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4322 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
4323 return false;
4324 }
4325 }
4326 return true;
4327}
4328
d92ada22
LC
4329void bdrv_img_create(const char *filename, const char *fmt,
4330 const char *base_filename, const char *base_fmt,
9217283d
FZ
4331 char *options, uint64_t img_size, int flags, bool quiet,
4332 Error **errp)
f88e1a42 4333{
83d0521a
CL
4334 QemuOptsList *create_opts = NULL;
4335 QemuOpts *opts = NULL;
4336 const char *backing_fmt, *backing_file;
4337 int64_t size;
f88e1a42 4338 BlockDriver *drv, *proto_drv;
cc84d90f 4339 Error *local_err = NULL;
f88e1a42
JS
4340 int ret = 0;
4341
4342 /* Find driver and parse its options */
4343 drv = bdrv_find_format(fmt);
4344 if (!drv) {
71c79813 4345 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 4346 return;
f88e1a42
JS
4347 }
4348
b65a5e12 4349 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 4350 if (!proto_drv) {
d92ada22 4351 return;
f88e1a42
JS
4352 }
4353
c6149724
HR
4354 if (!drv->create_opts) {
4355 error_setg(errp, "Format driver '%s' does not support image creation",
4356 drv->format_name);
4357 return;
4358 }
4359
4360 if (!proto_drv->create_opts) {
4361 error_setg(errp, "Protocol driver '%s' does not support image creation",
4362 proto_drv->format_name);
4363 return;
4364 }
4365
c282e1fd
CL
4366 create_opts = qemu_opts_append(create_opts, drv->create_opts);
4367 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
4368
4369 /* Create parameter list with default values */
83d0521a 4370 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 4371 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
4372
4373 /* Parse -o options */
4374 if (options) {
dc523cd3
MA
4375 qemu_opts_do_parse(opts, options, NULL, &local_err);
4376 if (local_err) {
4377 error_report_err(local_err);
4378 local_err = NULL;
83d0521a 4379 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
4380 goto out;
4381 }
4382 }
4383
4384 if (base_filename) {
f43e47db 4385 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 4386 if (local_err) {
71c79813
LC
4387 error_setg(errp, "Backing file not supported for file format '%s'",
4388 fmt);
f88e1a42
JS
4389 goto out;
4390 }
4391 }
4392
4393 if (base_fmt) {
f43e47db 4394 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 4395 if (local_err) {
71c79813
LC
4396 error_setg(errp, "Backing file format not supported for file "
4397 "format '%s'", fmt);
f88e1a42
JS
4398 goto out;
4399 }
4400 }
4401
83d0521a
CL
4402 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
4403 if (backing_file) {
4404 if (!strcmp(filename, backing_file)) {
71c79813
LC
4405 error_setg(errp, "Error: Trying to create an image with the "
4406 "same filename as the backing file");
792da93a
JS
4407 goto out;
4408 }
4409 }
4410
83d0521a 4411 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42
JS
4412
4413 // The size for the image must always be specified, with one exception:
4414 // If we are using a backing file, we can obtain the size from there
83d0521a
CL
4415 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
4416 if (size == -1) {
4417 if (backing_file) {
66f6b814 4418 BlockDriverState *bs;
29168018 4419 char *full_backing = g_new0(char, PATH_MAX);
52bf1e72 4420 int64_t size;
63090dac 4421 int back_flags;
e6641719 4422 QDict *backing_options = NULL;
63090dac 4423
29168018
HR
4424 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
4425 full_backing, PATH_MAX,
4426 &local_err);
4427 if (local_err) {
4428 g_free(full_backing);
4429 goto out;
4430 }
4431
63090dac 4432 /* backing files always opened read-only */
61de4c68 4433 back_flags = flags;
bfd18d1e 4434 back_flags &= ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 4435
e6641719
HR
4436 if (backing_fmt) {
4437 backing_options = qdict_new();
46f5ac20 4438 qdict_put_str(backing_options, "driver", backing_fmt);
e6641719
HR
4439 }
4440
5b363937
HR
4441 bs = bdrv_open(full_backing, NULL, backing_options, back_flags,
4442 &local_err);
29168018 4443 g_free(full_backing);
5b363937 4444 if (!bs) {
f88e1a42
JS
4445 goto out;
4446 }
52bf1e72
MA
4447 size = bdrv_getlength(bs);
4448 if (size < 0) {
4449 error_setg_errno(errp, -size, "Could not get size of '%s'",
4450 backing_file);
4451 bdrv_unref(bs);
4452 goto out;
4453 }
f88e1a42 4454
39101f25 4455 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
66f6b814
HR
4456
4457 bdrv_unref(bs);
f88e1a42 4458 } else {
71c79813 4459 error_setg(errp, "Image creation needs a size parameter");
f88e1a42
JS
4460 goto out;
4461 }
4462 }
4463
f382d43a 4464 if (!quiet) {
fe646693 4465 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 4466 qemu_opts_print(opts, " ");
f382d43a
MR
4467 puts("");
4468 }
83d0521a 4469
c282e1fd 4470 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 4471
cc84d90f
HR
4472 if (ret == -EFBIG) {
4473 /* This is generally a better message than whatever the driver would
4474 * deliver (especially because of the cluster_size_hint), since that
4475 * is most probably not much different from "image too large". */
4476 const char *cluster_size_hint = "";
83d0521a 4477 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 4478 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 4479 }
cc84d90f
HR
4480 error_setg(errp, "The image size is too large for file format '%s'"
4481 "%s", fmt, cluster_size_hint);
4482 error_free(local_err);
4483 local_err = NULL;
f88e1a42
JS
4484 }
4485
4486out:
83d0521a
CL
4487 qemu_opts_del(opts);
4488 qemu_opts_free(create_opts);
621ff94d 4489 error_propagate(errp, local_err);
f88e1a42 4490}
85d126f3
SH
4491
4492AioContext *bdrv_get_aio_context(BlockDriverState *bs)
4493{
dcd04228
SH
4494 return bs->aio_context;
4495}
4496
052a7572
FZ
4497void bdrv_coroutine_enter(BlockDriverState *bs, Coroutine *co)
4498{
4499 aio_co_enter(bdrv_get_aio_context(bs), co);
4500}
4501
e8a095da
SH
4502static void bdrv_do_remove_aio_context_notifier(BdrvAioNotifier *ban)
4503{
4504 QLIST_REMOVE(ban, list);
4505 g_free(ban);
4506}
4507
dcd04228
SH
4508void bdrv_detach_aio_context(BlockDriverState *bs)
4509{
e8a095da 4510 BdrvAioNotifier *baf, *baf_tmp;
b97511c7 4511 BdrvChild *child;
33384421 4512
dcd04228
SH
4513 if (!bs->drv) {
4514 return;
4515 }
4516
e8a095da
SH
4517 assert(!bs->walking_aio_notifiers);
4518 bs->walking_aio_notifiers = true;
4519 QLIST_FOREACH_SAFE(baf, &bs->aio_notifiers, list, baf_tmp) {
4520 if (baf->deleted) {
4521 bdrv_do_remove_aio_context_notifier(baf);
4522 } else {
4523 baf->detach_aio_context(baf->opaque);
4524 }
33384421 4525 }
e8a095da
SH
4526 /* Never mind iterating again to check for ->deleted. bdrv_close() will
4527 * remove remaining aio notifiers if we aren't called again.
4528 */
4529 bs->walking_aio_notifiers = false;
33384421 4530
dcd04228
SH
4531 if (bs->drv->bdrv_detach_aio_context) {
4532 bs->drv->bdrv_detach_aio_context(bs);
4533 }
b97511c7
HR
4534 QLIST_FOREACH(child, &bs->children, next) {
4535 bdrv_detach_aio_context(child->bs);
dcd04228
SH
4536 }
4537
4538 bs->aio_context = NULL;
4539}
4540
4541void bdrv_attach_aio_context(BlockDriverState *bs,
4542 AioContext *new_context)
4543{
e8a095da 4544 BdrvAioNotifier *ban, *ban_tmp;
b97511c7 4545 BdrvChild *child;
33384421 4546
dcd04228
SH
4547 if (!bs->drv) {
4548 return;
4549 }
4550
4551 bs->aio_context = new_context;
4552
b97511c7
HR
4553 QLIST_FOREACH(child, &bs->children, next) {
4554 bdrv_attach_aio_context(child->bs, new_context);
dcd04228
SH
4555 }
4556 if (bs->drv->bdrv_attach_aio_context) {
4557 bs->drv->bdrv_attach_aio_context(bs, new_context);
4558 }
33384421 4559
e8a095da
SH
4560 assert(!bs->walking_aio_notifiers);
4561 bs->walking_aio_notifiers = true;
4562 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_tmp) {
4563 if (ban->deleted) {
4564 bdrv_do_remove_aio_context_notifier(ban);
4565 } else {
4566 ban->attached_aio_context(new_context, ban->opaque);
4567 }
33384421 4568 }
e8a095da 4569 bs->walking_aio_notifiers = false;
dcd04228
SH
4570}
4571
4572void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
4573{
aabf5910 4574 AioContext *ctx = bdrv_get_aio_context(bs);
c2b6428d 4575
aabf5910
FZ
4576 aio_disable_external(ctx);
4577 bdrv_parent_drained_begin(bs);
53ec73e2 4578 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228 4579
c2b6428d
PB
4580 while (aio_poll(ctx, false)) {
4581 /* wait for all bottom halves to execute */
4582 }
4583
dcd04228
SH
4584 bdrv_detach_aio_context(bs);
4585
4586 /* This function executes in the old AioContext so acquire the new one in
4587 * case it runs in a different thread.
4588 */
4589 aio_context_acquire(new_context);
4590 bdrv_attach_aio_context(bs, new_context);
aabf5910
FZ
4591 bdrv_parent_drained_end(bs);
4592 aio_enable_external(ctx);
dcd04228 4593 aio_context_release(new_context);
85d126f3 4594}
d616b224 4595
33384421
HR
4596void bdrv_add_aio_context_notifier(BlockDriverState *bs,
4597 void (*attached_aio_context)(AioContext *new_context, void *opaque),
4598 void (*detach_aio_context)(void *opaque), void *opaque)
4599{
4600 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
4601 *ban = (BdrvAioNotifier){
4602 .attached_aio_context = attached_aio_context,
4603 .detach_aio_context = detach_aio_context,
4604 .opaque = opaque
4605 };
4606
4607 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
4608}
4609
4610void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
4611 void (*attached_aio_context)(AioContext *,
4612 void *),
4613 void (*detach_aio_context)(void *),
4614 void *opaque)
4615{
4616 BdrvAioNotifier *ban, *ban_next;
4617
4618 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
4619 if (ban->attached_aio_context == attached_aio_context &&
4620 ban->detach_aio_context == detach_aio_context &&
e8a095da
SH
4621 ban->opaque == opaque &&
4622 ban->deleted == false)
33384421 4623 {
e8a095da
SH
4624 if (bs->walking_aio_notifiers) {
4625 ban->deleted = true;
4626 } else {
4627 bdrv_do_remove_aio_context_notifier(ban);
4628 }
33384421
HR
4629 return;
4630 }
4631 }
4632
4633 abort();
4634}
4635
77485434 4636int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
8b13976d 4637 BlockDriverAmendStatusCB *status_cb, void *cb_opaque)
6f176b48 4638{
c282e1fd 4639 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
4640 return -ENOTSUP;
4641 }
8b13976d 4642 return bs->drv->bdrv_amend_options(bs, opts, status_cb, cb_opaque);
6f176b48 4643}
f6186f49 4644
b5042a36
BC
4645/* This function will be called by the bdrv_recurse_is_first_non_filter method
4646 * of block filter and by bdrv_is_first_non_filter.
4647 * It is used to test if the given bs is the candidate or recurse more in the
4648 * node graph.
212a5a8f 4649 */
b5042a36 4650bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 4651 BlockDriverState *candidate)
f6186f49 4652{
b5042a36
BC
4653 /* return false if basic checks fails */
4654 if (!bs || !bs->drv) {
212a5a8f 4655 return false;
f6186f49
BC
4656 }
4657
b5042a36
BC
4658 /* the code reached a non block filter driver -> check if the bs is
4659 * the same as the candidate. It's the recursion termination condition.
4660 */
4661 if (!bs->drv->is_filter) {
4662 return bs == candidate;
212a5a8f 4663 }
b5042a36 4664 /* Down this path the driver is a block filter driver */
212a5a8f 4665
b5042a36
BC
4666 /* If the block filter recursion method is defined use it to recurse down
4667 * the node graph.
4668 */
4669 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 4670 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
4671 }
4672
b5042a36
BC
4673 /* the driver is a block filter but don't allow to recurse -> return false
4674 */
4675 return false;
f6186f49
BC
4676}
4677
212a5a8f
BC
4678/* This function checks if the candidate is the first non filter bs down it's
4679 * bs chain. Since we don't have pointers to parents it explore all bs chains
4680 * from the top. Some filters can choose not to pass down the recursion.
4681 */
4682bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 4683{
7c8eece4 4684 BlockDriverState *bs;
88be7b4b 4685 BdrvNextIterator it;
212a5a8f
BC
4686
4687 /* walk down the bs forest recursively */
88be7b4b 4688 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
212a5a8f
BC
4689 bool perm;
4690
b5042a36 4691 /* try to recurse in this top level bs */
e6dc8a1f 4692 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
4693
4694 /* candidate is the first non filter */
4695 if (perm) {
4696 return true;
4697 }
4698 }
4699
4700 return false;
f6186f49 4701}
09158f00 4702
e12f3784
WC
4703BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
4704 const char *node_name, Error **errp)
09158f00
BC
4705{
4706 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
4707 AioContext *aio_context;
4708
09158f00
BC
4709 if (!to_replace_bs) {
4710 error_setg(errp, "Node name '%s' not found", node_name);
4711 return NULL;
4712 }
4713
5a7e7a0b
SH
4714 aio_context = bdrv_get_aio_context(to_replace_bs);
4715 aio_context_acquire(aio_context);
4716
09158f00 4717 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
4718 to_replace_bs = NULL;
4719 goto out;
09158f00
BC
4720 }
4721
4722 /* We don't want arbitrary node of the BDS chain to be replaced only the top
4723 * most non filter in order to prevent data corruption.
4724 * Another benefit is that this tests exclude backing files which are
4725 * blocked by the backing blockers.
4726 */
e12f3784 4727 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 4728 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
4729 to_replace_bs = NULL;
4730 goto out;
09158f00
BC
4731 }
4732
5a7e7a0b
SH
4733out:
4734 aio_context_release(aio_context);
09158f00
BC
4735 return to_replace_bs;
4736}
448ad91d 4737
91af7014
HR
4738static bool append_open_options(QDict *d, BlockDriverState *bs)
4739{
4740 const QDictEntry *entry;
9e700c1a 4741 QemuOptDesc *desc;
260fecf1 4742 BdrvChild *child;
91af7014 4743 bool found_any = false;
260fecf1 4744 const char *p;
91af7014
HR
4745
4746 for (entry = qdict_first(bs->options); entry;
4747 entry = qdict_next(bs->options, entry))
4748 {
260fecf1
KW
4749 /* Exclude options for children */
4750 QLIST_FOREACH(child, &bs->children, next) {
4751 if (strstart(qdict_entry_key(entry), child->name, &p)
4752 && (!*p || *p == '.'))
4753 {
4754 break;
4755 }
4756 }
4757 if (child) {
9e700c1a 4758 continue;
91af7014 4759 }
9e700c1a
KW
4760
4761 /* And exclude all non-driver-specific options */
4762 for (desc = bdrv_runtime_opts.desc; desc->name; desc++) {
4763 if (!strcmp(qdict_entry_key(entry), desc->name)) {
4764 break;
4765 }
4766 }
4767 if (desc->name) {
4768 continue;
4769 }
4770
4771 qobject_incref(qdict_entry_value(entry));
4772 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
4773 found_any = true;
91af7014
HR
4774 }
4775
4776 return found_any;
4777}
4778
4779/* Updates the following BDS fields:
4780 * - exact_filename: A filename which may be used for opening a block device
4781 * which (mostly) equals the given BDS (even without any
4782 * other options; so reading and writing must return the same
4783 * results, but caching etc. may be different)
4784 * - full_open_options: Options which, when given when opening a block device
4785 * (without a filename), result in a BDS (mostly)
4786 * equalling the given one
4787 * - filename: If exact_filename is set, it is copied here. Otherwise,
4788 * full_open_options is converted to a JSON object, prefixed with
4789 * "json:" (for use through the JSON pseudo protocol) and put here.
4790 */
4791void bdrv_refresh_filename(BlockDriverState *bs)
4792{
4793 BlockDriver *drv = bs->drv;
4794 QDict *opts;
4795
4796 if (!drv) {
4797 return;
4798 }
4799
4800 /* This BDS's file name will most probably depend on its file's name, so
4801 * refresh that first */
4802 if (bs->file) {
9a4f4c31 4803 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
4804 }
4805
4806 if (drv->bdrv_refresh_filename) {
4807 /* Obsolete information is of no use here, so drop the old file name
4808 * information before refreshing it */
4809 bs->exact_filename[0] = '\0';
4810 if (bs->full_open_options) {
4811 QDECREF(bs->full_open_options);
4812 bs->full_open_options = NULL;
4813 }
4814
4cdd01d3
KW
4815 opts = qdict_new();
4816 append_open_options(opts, bs);
4817 drv->bdrv_refresh_filename(bs, opts);
4818 QDECREF(opts);
91af7014
HR
4819 } else if (bs->file) {
4820 /* Try to reconstruct valid information from the underlying file */
4821 bool has_open_options;
4822
4823 bs->exact_filename[0] = '\0';
4824 if (bs->full_open_options) {
4825 QDECREF(bs->full_open_options);
4826 bs->full_open_options = NULL;
4827 }
4828
4829 opts = qdict_new();
4830 has_open_options = append_open_options(opts, bs);
4831
4832 /* If no specific options have been given for this BDS, the filename of
4833 * the underlying file should suffice for this one as well */
9a4f4c31
KW
4834 if (bs->file->bs->exact_filename[0] && !has_open_options) {
4835 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
4836 }
4837 /* Reconstructing the full options QDict is simple for most format block
4838 * drivers, as long as the full options are known for the underlying
4839 * file BDS. The full options QDict of that file BDS should somehow
4840 * contain a representation of the filename, therefore the following
4841 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 4842 if (bs->file->bs->full_open_options) {
46f5ac20 4843 qdict_put_str(opts, "driver", drv->format_name);
9a4f4c31 4844 QINCREF(bs->file->bs->full_open_options);
de6e7951 4845 qdict_put(opts, "file", bs->file->bs->full_open_options);
91af7014
HR
4846
4847 bs->full_open_options = opts;
4848 } else {
4849 QDECREF(opts);
4850 }
4851 } else if (!bs->full_open_options && qdict_size(bs->options)) {
4852 /* There is no underlying file BDS (at least referenced by BDS.file),
4853 * so the full options QDict should be equal to the options given
4854 * specifically for this block device when it was opened (plus the
4855 * driver specification).
4856 * Because those options don't change, there is no need to update
4857 * full_open_options when it's already set. */
4858
4859 opts = qdict_new();
4860 append_open_options(opts, bs);
46f5ac20 4861 qdict_put_str(opts, "driver", drv->format_name);
91af7014
HR
4862
4863 if (bs->exact_filename[0]) {
4864 /* This may not work for all block protocol drivers (some may
4865 * require this filename to be parsed), but we have to find some
4866 * default solution here, so just include it. If some block driver
4867 * does not support pure options without any filename at all or
4868 * needs some special format of the options QDict, it needs to
4869 * implement the driver-specific bdrv_refresh_filename() function.
4870 */
46f5ac20 4871 qdict_put_str(opts, "filename", bs->exact_filename);
91af7014
HR
4872 }
4873
4874 bs->full_open_options = opts;
4875 }
4876
4877 if (bs->exact_filename[0]) {
4878 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4879 } else if (bs->full_open_options) {
4880 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4881 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4882 qstring_get_str(json));
4883 QDECREF(json);
4884 }
4885}
e06018ad
WC
4886
4887/*
4888 * Hot add/remove a BDS's child. So the user can take a child offline when
4889 * it is broken and take a new child online
4890 */
4891void bdrv_add_child(BlockDriverState *parent_bs, BlockDriverState *child_bs,
4892 Error **errp)
4893{
4894
4895 if (!parent_bs->drv || !parent_bs->drv->bdrv_add_child) {
4896 error_setg(errp, "The node %s does not support adding a child",
4897 bdrv_get_device_or_node_name(parent_bs));
4898 return;
4899 }
4900
4901 if (!QLIST_EMPTY(&child_bs->parents)) {
4902 error_setg(errp, "The node %s already has a parent",
4903 child_bs->node_name);
4904 return;
4905 }
4906
4907 parent_bs->drv->bdrv_add_child(parent_bs, child_bs, errp);
4908}
4909
4910void bdrv_del_child(BlockDriverState *parent_bs, BdrvChild *child, Error **errp)
4911{
4912 BdrvChild *tmp;
4913
4914 if (!parent_bs->drv || !parent_bs->drv->bdrv_del_child) {
4915 error_setg(errp, "The node %s does not support removing a child",
4916 bdrv_get_device_or_node_name(parent_bs));
4917 return;
4918 }
4919
4920 QLIST_FOREACH(tmp, &parent_bs->children, next) {
4921 if (tmp == child) {
4922 break;
4923 }
4924 }
4925
4926 if (!tmp) {
4927 error_setg(errp, "The node %s does not have a child named %s",
4928 bdrv_get_device_or_node_name(parent_bs),
4929 bdrv_get_device_or_node_name(child->bs));
4930 return;
4931 }
4932
4933 parent_bs->drv->bdrv_del_child(parent_bs, child, errp);
4934}