]> git.proxmox.com Git - mirror_qemu.git/blame - block.c
block: Manage backing file references in bdrv_set_backing_hd()
[mirror_qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
3990d09a 24#include "config-host.h"
faf07963 25#include "qemu-common.h"
6d519a5f 26#include "trace.h"
737e150e
PB
27#include "block/block_int.h"
28#include "block/blockjob.h"
d49b6836 29#include "qemu/error-report.h"
1de7afc9 30#include "qemu/module.h"
cc7a8ea7 31#include "qapi/qmp/qerror.h"
7b1b5d19 32#include "qapi/qmp/qjson.h"
bfb197e0 33#include "sysemu/block-backend.h"
9c17d615 34#include "sysemu/sysemu.h"
1de7afc9 35#include "qemu/notify.h"
737e150e 36#include "block/coroutine.h"
c13163fb 37#include "block/qapi.h"
b2023818 38#include "qmp-commands.h"
1de7afc9 39#include "qemu/timer.h"
a5ee7bd4 40#include "qapi-event.h"
db628338 41#include "block/throttle-groups.h"
fc01f7e7 42
71e72a19 43#ifdef CONFIG_BSD
7674e7bf
FB
44#include <sys/types.h>
45#include <sys/stat.h>
46#include <sys/ioctl.h>
72cf2d4f 47#include <sys/queue.h>
c5e97233 48#ifndef __DragonFly__
7674e7bf
FB
49#include <sys/disk.h>
50#endif
c5e97233 51#endif
7674e7bf 52
49dc768d
AL
53#ifdef _WIN32
54#include <windows.h>
55#endif
56
9bd2b08f
JS
57/**
58 * A BdrvDirtyBitmap can be in three possible states:
59 * (1) successor is NULL and disabled is false: full r/w mode
60 * (2) successor is NULL and disabled is true: read only mode ("disabled")
61 * (3) successor is set: frozen mode.
62 * A frozen bitmap cannot be renamed, deleted, anonymized, cleared, set,
63 * or enabled. A frozen bitmap can only abdicate() or reclaim().
64 */
e4654d2d 65struct BdrvDirtyBitmap {
aa0c7ca5
JS
66 HBitmap *bitmap; /* Dirty sector bitmap implementation */
67 BdrvDirtyBitmap *successor; /* Anonymous child; implies frozen status */
68 char *name; /* Optional non-empty unique ID */
69 int64_t size; /* Size of the bitmap (Number of sectors) */
70 bool disabled; /* Bitmap is read-only */
e4654d2d
FZ
71 QLIST_ENTRY(BdrvDirtyBitmap) list;
72};
73
1c9805a3
SH
74#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
75
1b7bdbc1
SH
76static QTAILQ_HEAD(, BlockDriverState) bdrv_states =
77 QTAILQ_HEAD_INITIALIZER(bdrv_states);
7ee930d0 78
dc364f4c
BC
79static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
80 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
81
8a22f02a
SH
82static QLIST_HEAD(, BlockDriver) bdrv_drivers =
83 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 84
f3930ed0
KW
85static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
86 const char *reference, QDict *options, int flags,
87 BlockDriverState *parent,
ce343771 88 const BdrvChildRole *child_role, Error **errp);
f3930ed0 89
ce1ffea8 90static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs);
eb852011
MA
91/* If non-zero, use only whitelisted block drivers */
92static int use_bdrv_whitelist;
93
9e0b22f4
SH
94#ifdef _WIN32
95static int is_windows_drive_prefix(const char *filename)
96{
97 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
98 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
99 filename[1] == ':');
100}
101
102int is_windows_drive(const char *filename)
103{
104 if (is_windows_drive_prefix(filename) &&
105 filename[2] == '\0')
106 return 1;
107 if (strstart(filename, "\\\\.\\", NULL) ||
108 strstart(filename, "//./", NULL))
109 return 1;
110 return 0;
111}
112#endif
113
339064d5
KW
114size_t bdrv_opt_mem_align(BlockDriverState *bs)
115{
116 if (!bs || !bs->drv) {
459b4e66
DL
117 /* page size or 4k (hdd sector size) should be on the safe side */
118 return MAX(4096, getpagesize());
339064d5
KW
119 }
120
121 return bs->bl.opt_mem_alignment;
122}
123
4196d2f0
DL
124size_t bdrv_min_mem_align(BlockDriverState *bs)
125{
126 if (!bs || !bs->drv) {
459b4e66
DL
127 /* page size or 4k (hdd sector size) should be on the safe side */
128 return MAX(4096, getpagesize());
4196d2f0
DL
129 }
130
131 return bs->bl.min_mem_alignment;
132}
133
9e0b22f4 134/* check if the path starts with "<protocol>:" */
5c98415b 135int path_has_protocol(const char *path)
9e0b22f4 136{
947995c0
PB
137 const char *p;
138
9e0b22f4
SH
139#ifdef _WIN32
140 if (is_windows_drive(path) ||
141 is_windows_drive_prefix(path)) {
142 return 0;
143 }
947995c0
PB
144 p = path + strcspn(path, ":/\\");
145#else
146 p = path + strcspn(path, ":/");
9e0b22f4
SH
147#endif
148
947995c0 149 return *p == ':';
9e0b22f4
SH
150}
151
83f64091 152int path_is_absolute(const char *path)
3b0d4f61 153{
21664424
FB
154#ifdef _WIN32
155 /* specific case for names like: "\\.\d:" */
f53f4da9 156 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 157 return 1;
f53f4da9
PB
158 }
159 return (*path == '/' || *path == '\\');
3b9f94e1 160#else
f53f4da9 161 return (*path == '/');
3b9f94e1 162#endif
3b0d4f61
FB
163}
164
83f64091
FB
165/* if filename is absolute, just copy it to dest. Otherwise, build a
166 path to it by considering it is relative to base_path. URL are
167 supported. */
168void path_combine(char *dest, int dest_size,
169 const char *base_path,
170 const char *filename)
3b0d4f61 171{
83f64091
FB
172 const char *p, *p1;
173 int len;
174
175 if (dest_size <= 0)
176 return;
177 if (path_is_absolute(filename)) {
178 pstrcpy(dest, dest_size, filename);
179 } else {
180 p = strchr(base_path, ':');
181 if (p)
182 p++;
183 else
184 p = base_path;
3b9f94e1
FB
185 p1 = strrchr(base_path, '/');
186#ifdef _WIN32
187 {
188 const char *p2;
189 p2 = strrchr(base_path, '\\');
190 if (!p1 || p2 > p1)
191 p1 = p2;
192 }
193#endif
83f64091
FB
194 if (p1)
195 p1++;
196 else
197 p1 = base_path;
198 if (p1 > p)
199 p = p1;
200 len = p - base_path;
201 if (len > dest_size - 1)
202 len = dest_size - 1;
203 memcpy(dest, base_path, len);
204 dest[len] = '\0';
205 pstrcat(dest, dest_size, filename);
3b0d4f61 206 }
3b0d4f61
FB
207}
208
0a82855a
HR
209void bdrv_get_full_backing_filename_from_filename(const char *backed,
210 const char *backing,
9f07429e
HR
211 char *dest, size_t sz,
212 Error **errp)
dc5a1371 213{
9f07429e
HR
214 if (backing[0] == '\0' || path_has_protocol(backing) ||
215 path_is_absolute(backing))
216 {
0a82855a 217 pstrcpy(dest, sz, backing);
9f07429e
HR
218 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
219 error_setg(errp, "Cannot use relative backing file names for '%s'",
220 backed);
dc5a1371 221 } else {
0a82855a 222 path_combine(dest, sz, backed, backing);
dc5a1371
PB
223 }
224}
225
9f07429e
HR
226void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
227 Error **errp)
0a82855a 228{
9f07429e
HR
229 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
230
231 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
232 dest, sz, errp);
0a82855a
HR
233}
234
0eb7217e
SH
235void bdrv_register(BlockDriver *bdrv)
236{
237 bdrv_setup_io_funcs(bdrv);
b2e12bc6 238
8a22f02a 239 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 240}
b338082b 241
7f06d47e 242BlockDriverState *bdrv_new_root(void)
b338082b 243{
7f06d47e 244 BlockDriverState *bs = bdrv_new();
e4e9986b 245
e4e9986b 246 QTAILQ_INSERT_TAIL(&bdrv_states, bs, device_list);
e4e9986b
MA
247 return bs;
248}
249
250BlockDriverState *bdrv_new(void)
251{
252 BlockDriverState *bs;
253 int i;
254
5839e53b 255 bs = g_new0(BlockDriverState, 1);
e4654d2d 256 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
257 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
258 QLIST_INIT(&bs->op_blockers[i]);
259 }
28a7282a 260 bdrv_iostatus_disable(bs);
d7d512f6 261 notifier_list_init(&bs->close_notifiers);
d616b224 262 notifier_with_return_list_init(&bs->before_write_notifiers);
cc0681c4
BC
263 qemu_co_queue_init(&bs->throttled_reqs[0]);
264 qemu_co_queue_init(&bs->throttled_reqs[1]);
9fcb0251 265 bs->refcnt = 1;
dcd04228 266 bs->aio_context = qemu_get_aio_context();
d7d512f6 267
b338082b
FB
268 return bs;
269}
270
d7d512f6
PB
271void bdrv_add_close_notifier(BlockDriverState *bs, Notifier *notify)
272{
273 notifier_list_add(&bs->close_notifiers, notify);
274}
275
ea2384d3
FB
276BlockDriver *bdrv_find_format(const char *format_name)
277{
278 BlockDriver *drv1;
8a22f02a
SH
279 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
280 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 281 return drv1;
8a22f02a 282 }
ea2384d3
FB
283 }
284 return NULL;
285}
286
b64ec4e4 287static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 288{
b64ec4e4
FZ
289 static const char *whitelist_rw[] = {
290 CONFIG_BDRV_RW_WHITELIST
291 };
292 static const char *whitelist_ro[] = {
293 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
294 };
295 const char **p;
296
b64ec4e4 297 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 298 return 1; /* no whitelist, anything goes */
b64ec4e4 299 }
eb852011 300
b64ec4e4 301 for (p = whitelist_rw; *p; p++) {
eb852011
MA
302 if (!strcmp(drv->format_name, *p)) {
303 return 1;
304 }
305 }
b64ec4e4
FZ
306 if (read_only) {
307 for (p = whitelist_ro; *p; p++) {
308 if (!strcmp(drv->format_name, *p)) {
309 return 1;
310 }
311 }
312 }
eb852011
MA
313 return 0;
314}
315
5b7e1542
ZYW
316typedef struct CreateCo {
317 BlockDriver *drv;
318 char *filename;
83d0521a 319 QemuOpts *opts;
5b7e1542 320 int ret;
cc84d90f 321 Error *err;
5b7e1542
ZYW
322} CreateCo;
323
324static void coroutine_fn bdrv_create_co_entry(void *opaque)
325{
cc84d90f
HR
326 Error *local_err = NULL;
327 int ret;
328
5b7e1542
ZYW
329 CreateCo *cco = opaque;
330 assert(cco->drv);
331
c282e1fd 332 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
84d18f06 333 if (local_err) {
cc84d90f
HR
334 error_propagate(&cco->err, local_err);
335 }
336 cco->ret = ret;
5b7e1542
ZYW
337}
338
0e7e1989 339int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 340 QemuOpts *opts, Error **errp)
ea2384d3 341{
5b7e1542
ZYW
342 int ret;
343
344 Coroutine *co;
345 CreateCo cco = {
346 .drv = drv,
347 .filename = g_strdup(filename),
83d0521a 348 .opts = opts,
5b7e1542 349 .ret = NOT_DONE,
cc84d90f 350 .err = NULL,
5b7e1542
ZYW
351 };
352
c282e1fd 353 if (!drv->bdrv_create) {
cc84d90f 354 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
355 ret = -ENOTSUP;
356 goto out;
5b7e1542
ZYW
357 }
358
359 if (qemu_in_coroutine()) {
360 /* Fast-path if already in coroutine context */
361 bdrv_create_co_entry(&cco);
362 } else {
363 co = qemu_coroutine_create(bdrv_create_co_entry);
364 qemu_coroutine_enter(co, &cco);
365 while (cco.ret == NOT_DONE) {
b47ec2c4 366 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
367 }
368 }
369
370 ret = cco.ret;
cc84d90f 371 if (ret < 0) {
84d18f06 372 if (cco.err) {
cc84d90f
HR
373 error_propagate(errp, cco.err);
374 } else {
375 error_setg_errno(errp, -ret, "Could not create image");
376 }
377 }
0e7e1989 378
80168bff
LC
379out:
380 g_free(cco.filename);
5b7e1542 381 return ret;
ea2384d3
FB
382}
383
c282e1fd 384int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
385{
386 BlockDriver *drv;
cc84d90f
HR
387 Error *local_err = NULL;
388 int ret;
84a12e66 389
b65a5e12 390 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 391 if (drv == NULL) {
16905d71 392 return -ENOENT;
84a12e66
CH
393 }
394
c282e1fd 395 ret = bdrv_create(drv, filename, opts, &local_err);
84d18f06 396 if (local_err) {
cc84d90f
HR
397 error_propagate(errp, local_err);
398 }
399 return ret;
84a12e66
CH
400}
401
892b7de8
ET
402/**
403 * Try to get @bs's logical and physical block size.
404 * On success, store them in @bsz struct and return 0.
405 * On failure return -errno.
406 * @bs must not be empty.
407 */
408int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
409{
410 BlockDriver *drv = bs->drv;
411
412 if (drv && drv->bdrv_probe_blocksizes) {
413 return drv->bdrv_probe_blocksizes(bs, bsz);
414 }
415
416 return -ENOTSUP;
417}
418
419/**
420 * Try to get @bs's geometry (cyls, heads, sectors).
421 * On success, store them in @geo struct and return 0.
422 * On failure return -errno.
423 * @bs must not be empty.
424 */
425int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
426{
427 BlockDriver *drv = bs->drv;
428
429 if (drv && drv->bdrv_probe_geometry) {
430 return drv->bdrv_probe_geometry(bs, geo);
431 }
432
433 return -ENOTSUP;
434}
435
eba25057
JM
436/*
437 * Create a uniquely-named empty temporary file.
438 * Return 0 upon success, otherwise a negative errno value.
439 */
440int get_tmp_filename(char *filename, int size)
d5249393 441{
eba25057 442#ifdef _WIN32
3b9f94e1 443 char temp_dir[MAX_PATH];
eba25057
JM
444 /* GetTempFileName requires that its output buffer (4th param)
445 have length MAX_PATH or greater. */
446 assert(size >= MAX_PATH);
447 return (GetTempPath(MAX_PATH, temp_dir)
448 && GetTempFileName(temp_dir, "qem", 0, filename)
449 ? 0 : -GetLastError());
d5249393 450#else
67b915a5 451 int fd;
7ccfb2eb 452 const char *tmpdir;
0badc1ee 453 tmpdir = getenv("TMPDIR");
69bef793
AS
454 if (!tmpdir) {
455 tmpdir = "/var/tmp";
456 }
eba25057
JM
457 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
458 return -EOVERFLOW;
459 }
ea2384d3 460 fd = mkstemp(filename);
fe235a06
DH
461 if (fd < 0) {
462 return -errno;
463 }
464 if (close(fd) != 0) {
465 unlink(filename);
eba25057
JM
466 return -errno;
467 }
468 return 0;
d5249393 469#endif
eba25057 470}
fc01f7e7 471
84a12e66
CH
472/*
473 * Detect host devices. By convention, /dev/cdrom[N] is always
474 * recognized as a host CDROM.
475 */
476static BlockDriver *find_hdev_driver(const char *filename)
477{
478 int score_max = 0, score;
479 BlockDriver *drv = NULL, *d;
480
481 QLIST_FOREACH(d, &bdrv_drivers, list) {
482 if (d->bdrv_probe_device) {
483 score = d->bdrv_probe_device(filename);
484 if (score > score_max) {
485 score_max = score;
486 drv = d;
487 }
488 }
489 }
490
491 return drv;
492}
493
98289620 494BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
495 bool allow_protocol_prefix,
496 Error **errp)
83f64091
FB
497{
498 BlockDriver *drv1;
499 char protocol[128];
1cec71e3 500 int len;
83f64091 501 const char *p;
19cb3738 502
66f82cee
KW
503 /* TODO Drivers without bdrv_file_open must be specified explicitly */
504
39508e7a
CH
505 /*
506 * XXX(hch): we really should not let host device detection
507 * override an explicit protocol specification, but moving this
508 * later breaks access to device names with colons in them.
509 * Thanks to the brain-dead persistent naming schemes on udev-
510 * based Linux systems those actually are quite common.
511 */
512 drv1 = find_hdev_driver(filename);
513 if (drv1) {
514 return drv1;
515 }
516
98289620 517 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 518 return &bdrv_file;
84a12e66 519 }
98289620 520
9e0b22f4
SH
521 p = strchr(filename, ':');
522 assert(p != NULL);
1cec71e3
AL
523 len = p - filename;
524 if (len > sizeof(protocol) - 1)
525 len = sizeof(protocol) - 1;
526 memcpy(protocol, filename, len);
527 protocol[len] = '\0';
8a22f02a 528 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
5fafdf24 529 if (drv1->protocol_name &&
8a22f02a 530 !strcmp(drv1->protocol_name, protocol)) {
83f64091 531 return drv1;
8a22f02a 532 }
83f64091 533 }
b65a5e12
HR
534
535 error_setg(errp, "Unknown protocol '%s'", protocol);
83f64091
FB
536 return NULL;
537}
538
c6684249
MA
539/*
540 * Guess image format by probing its contents.
541 * This is not a good idea when your image is raw (CVE-2008-2004), but
542 * we do it anyway for backward compatibility.
543 *
544 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
545 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
546 * but can be smaller if the image file is smaller)
c6684249
MA
547 * @filename is its filename.
548 *
549 * For all block drivers, call the bdrv_probe() method to get its
550 * probing score.
551 * Return the first block driver with the highest probing score.
552 */
38f3ef57
KW
553BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
554 const char *filename)
c6684249
MA
555{
556 int score_max = 0, score;
557 BlockDriver *drv = NULL, *d;
558
559 QLIST_FOREACH(d, &bdrv_drivers, list) {
560 if (d->bdrv_probe) {
561 score = d->bdrv_probe(buf, buf_size, filename);
562 if (score > score_max) {
563 score_max = score;
564 drv = d;
565 }
566 }
567 }
568
569 return drv;
570}
571
f500a6d3 572static int find_image_format(BlockDriverState *bs, const char *filename,
34b5d2c6 573 BlockDriver **pdrv, Error **errp)
f3a5d3f8 574{
c6684249 575 BlockDriver *drv;
7cddd372 576 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 577 int ret = 0;
f8ea0b00 578
08a00559 579 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
b192af8a 580 if (bdrv_is_sg(bs) || !bdrv_is_inserted(bs) || bdrv_getlength(bs) == 0) {
ef810437 581 *pdrv = &bdrv_raw;
c98ac35d 582 return ret;
1a396859 583 }
f8ea0b00 584
83f64091 585 ret = bdrv_pread(bs, 0, buf, sizeof(buf));
83f64091 586 if (ret < 0) {
34b5d2c6
HR
587 error_setg_errno(errp, -ret, "Could not read image for determining its "
588 "format");
c98ac35d
SW
589 *pdrv = NULL;
590 return ret;
83f64091
FB
591 }
592
c6684249 593 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 594 if (!drv) {
34b5d2c6
HR
595 error_setg(errp, "Could not determine image format: No compatible "
596 "driver found");
c98ac35d
SW
597 ret = -ENOENT;
598 }
599 *pdrv = drv;
600 return ret;
ea2384d3
FB
601}
602
51762288
SH
603/**
604 * Set the current 'total_sectors' value
65a9bb25 605 * Return 0 on success, -errno on error.
51762288
SH
606 */
607static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
608{
609 BlockDriver *drv = bs->drv;
610
396759ad 611 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 612 if (bdrv_is_sg(bs))
396759ad
NB
613 return 0;
614
51762288
SH
615 /* query actual device if possible, otherwise just trust the hint */
616 if (drv->bdrv_getlength) {
617 int64_t length = drv->bdrv_getlength(bs);
618 if (length < 0) {
619 return length;
620 }
7e382003 621 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
622 }
623
624 bs->total_sectors = hint;
625 return 0;
626}
627
9e8f1835
PB
628/**
629 * Set open flags for a given discard mode
630 *
631 * Return 0 on success, -1 if the discard mode was invalid.
632 */
633int bdrv_parse_discard_flags(const char *mode, int *flags)
634{
635 *flags &= ~BDRV_O_UNMAP;
636
637 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
638 /* do nothing */
639 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
640 *flags |= BDRV_O_UNMAP;
641 } else {
642 return -1;
643 }
644
645 return 0;
646}
647
c3993cdc
SH
648/**
649 * Set open flags for a given cache mode
650 *
651 * Return 0 on success, -1 if the cache mode was invalid.
652 */
653int bdrv_parse_cache_flags(const char *mode, int *flags)
654{
655 *flags &= ~BDRV_O_CACHE_MASK;
656
657 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
658 *flags |= BDRV_O_NOCACHE | BDRV_O_CACHE_WB;
92196b2f
SH
659 } else if (!strcmp(mode, "directsync")) {
660 *flags |= BDRV_O_NOCACHE;
c3993cdc
SH
661 } else if (!strcmp(mode, "writeback")) {
662 *flags |= BDRV_O_CACHE_WB;
663 } else if (!strcmp(mode, "unsafe")) {
664 *flags |= BDRV_O_CACHE_WB;
665 *flags |= BDRV_O_NO_FLUSH;
666 } else if (!strcmp(mode, "writethrough")) {
667 /* this is the default */
668 } else {
669 return -1;
670 }
671
672 return 0;
673}
674
b1e6fc08
KW
675/*
676 * Returns the flags that a temporary snapshot should get, based on the
677 * originally requested flags (the originally requested image will have flags
678 * like a backing file)
679 */
680static int bdrv_temp_snapshot_flags(int flags)
681{
682 return (flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
683}
684
0b50cc88 685/*
f3930ed0
KW
686 * Returns the flags that bs->file should get if a protocol driver is expected,
687 * based on the given flags for the parent BDS
0b50cc88
KW
688 */
689static int bdrv_inherited_flags(int flags)
690{
691 /* Enable protocol handling, disable format probing for bs->file */
692 flags |= BDRV_O_PROTOCOL;
693
694 /* Our block drivers take care to send flushes and respect unmap policy,
695 * so we can enable both unconditionally on lower layers. */
696 flags |= BDRV_O_CACHE_WB | BDRV_O_UNMAP;
697
0b50cc88 698 /* Clear flags that only apply to the top layer */
5669b44d 699 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ);
0b50cc88
KW
700
701 return flags;
702}
703
f3930ed0
KW
704const BdrvChildRole child_file = {
705 .inherit_flags = bdrv_inherited_flags,
706};
707
708/*
709 * Returns the flags that bs->file should get if the use of formats (and not
710 * only protocols) is permitted for it, based on the given flags for the parent
711 * BDS
712 */
713static int bdrv_inherited_fmt_flags(int parent_flags)
714{
715 int flags = child_file.inherit_flags(parent_flags);
716 return flags & ~BDRV_O_PROTOCOL;
717}
718
719const BdrvChildRole child_format = {
720 .inherit_flags = bdrv_inherited_fmt_flags,
721};
722
317fc44e 723/*
760e0063 724 * Returns the flags that bs->backing should get, based on the given flags
317fc44e
KW
725 * for the parent BDS
726 */
727static int bdrv_backing_flags(int flags)
728{
729 /* backing files always opened read-only */
730 flags &= ~(BDRV_O_RDWR | BDRV_O_COPY_ON_READ);
731
732 /* snapshot=on is handled on the top layer */
8bfea15d 733 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e
KW
734
735 return flags;
736}
737
f3930ed0
KW
738static const BdrvChildRole child_backing = {
739 .inherit_flags = bdrv_backing_flags,
740};
741
7b272452
KW
742static int bdrv_open_flags(BlockDriverState *bs, int flags)
743{
744 int open_flags = flags | BDRV_O_CACHE_WB;
745
746 /*
747 * Clear flags that are internal to the block layer before opening the
748 * image.
749 */
20cca275 750 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
751
752 /*
753 * Snapshots should be writable.
754 */
8bfea15d 755 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
756 open_flags |= BDRV_O_RDWR;
757 }
758
759 return open_flags;
760}
761
636ea370
KW
762static void bdrv_assign_node_name(BlockDriverState *bs,
763 const char *node_name,
764 Error **errp)
6913c0c2
BC
765{
766 if (!node_name) {
636ea370 767 return;
6913c0c2
BC
768 }
769
9aebf3b8 770 /* Check for empty string or invalid characters */
f5bebbbb 771 if (!id_wellformed(node_name)) {
9aebf3b8 772 error_setg(errp, "Invalid node name");
636ea370 773 return;
6913c0c2
BC
774 }
775
0c5e94ee 776 /* takes care of avoiding namespaces collisions */
7f06d47e 777 if (blk_by_name(node_name)) {
0c5e94ee
BC
778 error_setg(errp, "node-name=%s is conflicting with a device id",
779 node_name);
636ea370 780 return;
0c5e94ee
BC
781 }
782
6913c0c2
BC
783 /* takes care of avoiding duplicates node names */
784 if (bdrv_find_node(node_name)) {
785 error_setg(errp, "Duplicate node name");
636ea370 786 return;
6913c0c2
BC
787 }
788
789 /* copy node name into the bs and insert it into the graph list */
790 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
791 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
6913c0c2
BC
792}
793
18edf289
KW
794static QemuOptsList bdrv_runtime_opts = {
795 .name = "bdrv_common",
796 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
797 .desc = {
798 {
799 .name = "node-name",
800 .type = QEMU_OPT_STRING,
801 .help = "Node name of the block device node",
802 },
803 { /* end of list */ }
804 },
805};
806
57915332
KW
807/*
808 * Common part for opening disk images and files
b6ad491a
KW
809 *
810 * Removes all processed options from *options.
57915332 811 */
9a4f4c31 812static int bdrv_open_common(BlockDriverState *bs, BdrvChild *file,
34b5d2c6 813 QDict *options, int flags, BlockDriver *drv, Error **errp)
57915332
KW
814{
815 int ret, open_flags;
035fccdf 816 const char *filename;
6913c0c2 817 const char *node_name = NULL;
18edf289 818 QemuOpts *opts;
34b5d2c6 819 Error *local_err = NULL;
57915332
KW
820
821 assert(drv != NULL);
6405875c 822 assert(bs->file == NULL);
707ff828 823 assert(options != NULL && bs->options != options);
57915332 824
45673671 825 if (file != NULL) {
9a4f4c31 826 filename = file->bs->filename;
45673671
KW
827 } else {
828 filename = qdict_get_try_str(options, "filename");
829 }
830
765003db
KW
831 if (drv->bdrv_needs_filename && !filename) {
832 error_setg(errp, "The '%s' block driver requires a file name",
833 drv->format_name);
834 return -EINVAL;
835 }
836
45673671 837 trace_bdrv_open_common(bs, filename ?: "", flags, drv->format_name);
28dcee10 838
18edf289
KW
839 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
840 qemu_opts_absorb_qdict(opts, options, &local_err);
0fb6395c 841 if (local_err) {
636ea370 842 error_propagate(errp, local_err);
18edf289
KW
843 ret = -EINVAL;
844 goto fail_opts;
6913c0c2 845 }
6913c0c2 846
18edf289 847 node_name = qemu_opt_get(opts, "node-name");
636ea370 848 bdrv_assign_node_name(bs, node_name, &local_err);
0fb6395c 849 if (local_err) {
636ea370 850 error_propagate(errp, local_err);
18edf289
KW
851 ret = -EINVAL;
852 goto fail_opts;
5d186eb0
KW
853 }
854
1b7fd729 855 bs->guest_block_size = 512;
c25f53b0 856 bs->request_alignment = 512;
0d51b4de 857 bs->zero_beyond_eof = true;
b64ec4e4
FZ
858 open_flags = bdrv_open_flags(bs, flags);
859 bs->read_only = !(open_flags & BDRV_O_RDWR);
860
861 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
862 error_setg(errp,
863 !bs->read_only && bdrv_is_whitelisted(drv, true)
864 ? "Driver '%s' can only be used for read-only devices"
865 : "Driver '%s' is not whitelisted",
866 drv->format_name);
18edf289
KW
867 ret = -ENOTSUP;
868 goto fail_opts;
b64ec4e4 869 }
57915332 870
53fec9d3 871 assert(bs->copy_on_read == 0); /* bdrv_new() and bdrv_close() make it so */
0ebd24e0
KW
872 if (flags & BDRV_O_COPY_ON_READ) {
873 if (!bs->read_only) {
874 bdrv_enable_copy_on_read(bs);
875 } else {
876 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
877 ret = -EINVAL;
878 goto fail_opts;
0ebd24e0 879 }
53fec9d3
SH
880 }
881
c2ad1b0c
KW
882 if (filename != NULL) {
883 pstrcpy(bs->filename, sizeof(bs->filename), filename);
884 } else {
885 bs->filename[0] = '\0';
886 }
91af7014 887 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 888
57915332 889 bs->drv = drv;
7267c094 890 bs->opaque = g_malloc0(drv->instance_size);
57915332 891
03f541bd 892 bs->enable_write_cache = !!(flags & BDRV_O_CACHE_WB);
e7c63796 893
66f82cee
KW
894 /* Open the image, either directly or using a protocol */
895 if (drv->bdrv_file_open) {
5d186eb0 896 assert(file == NULL);
030be321 897 assert(!drv->bdrv_needs_filename || filename != NULL);
34b5d2c6 898 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
f500a6d3 899 } else {
2af5ef70 900 if (file == NULL) {
34b5d2c6
HR
901 error_setg(errp, "Can't use '%s' as a block driver for the "
902 "protocol level", drv->format_name);
2af5ef70
KW
903 ret = -EINVAL;
904 goto free_and_fail;
905 }
f500a6d3 906 bs->file = file;
34b5d2c6 907 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
66f82cee
KW
908 }
909
57915332 910 if (ret < 0) {
84d18f06 911 if (local_err) {
34b5d2c6 912 error_propagate(errp, local_err);
2fa9aa59
DH
913 } else if (bs->filename[0]) {
914 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
34b5d2c6
HR
915 } else {
916 error_setg_errno(errp, -ret, "Could not open image");
917 }
57915332
KW
918 goto free_and_fail;
919 }
920
a1f688f4
MA
921 if (bs->encrypted) {
922 error_report("Encrypted images are deprecated");
923 error_printf("Support for them will be removed in a future release.\n"
924 "You can use 'qemu-img convert' to convert your image"
925 " to an unencrypted one.\n");
926 }
927
51762288
SH
928 ret = refresh_total_sectors(bs, bs->total_sectors);
929 if (ret < 0) {
34b5d2c6 930 error_setg_errno(errp, -ret, "Could not refresh total sector count");
51762288 931 goto free_and_fail;
57915332 932 }
51762288 933
3baca891
KW
934 bdrv_refresh_limits(bs, &local_err);
935 if (local_err) {
936 error_propagate(errp, local_err);
937 ret = -EINVAL;
938 goto free_and_fail;
939 }
940
c25f53b0 941 assert(bdrv_opt_mem_align(bs) != 0);
4196d2f0 942 assert(bdrv_min_mem_align(bs) != 0);
b192af8a 943 assert((bs->request_alignment != 0) || bdrv_is_sg(bs));
18edf289
KW
944
945 qemu_opts_del(opts);
57915332
KW
946 return 0;
947
948free_and_fail:
f500a6d3 949 bs->file = NULL;
7267c094 950 g_free(bs->opaque);
57915332
KW
951 bs->opaque = NULL;
952 bs->drv = NULL;
18edf289
KW
953fail_opts:
954 qemu_opts_del(opts);
57915332
KW
955 return ret;
956}
957
5e5c4f63
KW
958static QDict *parse_json_filename(const char *filename, Error **errp)
959{
960 QObject *options_obj;
961 QDict *options;
962 int ret;
963
964 ret = strstart(filename, "json:", &filename);
965 assert(ret);
966
967 options_obj = qobject_from_json(filename);
968 if (!options_obj) {
969 error_setg(errp, "Could not parse the JSON options");
970 return NULL;
971 }
972
973 if (qobject_type(options_obj) != QTYPE_QDICT) {
974 qobject_decref(options_obj);
975 error_setg(errp, "Invalid JSON object given");
976 return NULL;
977 }
978
979 options = qobject_to_qdict(options_obj);
980 qdict_flatten(options);
981
982 return options;
983}
984
b6ce07aa 985/*
f54120ff
KW
986 * Fills in default options for opening images and converts the legacy
987 * filename/flags pair to option QDict entries.
53a29513
HR
988 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
989 * block driver has been specified explicitly.
b6ce07aa 990 */
53a29513 991static int bdrv_fill_options(QDict **options, const char **pfilename,
053e1578 992 int *flags, Error **errp)
ea2384d3 993{
5e5c4f63 994 const char *filename = *pfilename;
c2ad1b0c 995 const char *drvname;
53a29513 996 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 997 bool parse_filename = false;
053e1578 998 BlockDriver *drv = NULL;
34b5d2c6 999 Error *local_err = NULL;
83f64091 1000
5e5c4f63
KW
1001 /* Parse json: pseudo-protocol */
1002 if (filename && g_str_has_prefix(filename, "json:")) {
1003 QDict *json_options = parse_json_filename(filename, &local_err);
1004 if (local_err) {
1005 error_propagate(errp, local_err);
1006 return -EINVAL;
1007 }
1008
1009 /* Options given in the filename have lower priority than options
1010 * specified directly */
1011 qdict_join(*options, json_options, false);
1012 QDECREF(json_options);
1013 *pfilename = filename = NULL;
1014 }
1015
53a29513 1016 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1017 if (drvname) {
1018 drv = bdrv_find_format(drvname);
1019 if (!drv) {
1020 error_setg(errp, "Unknown driver '%s'", drvname);
1021 return -ENOENT;
1022 }
1023 /* If the user has explicitly specified the driver, this choice should
1024 * override the BDRV_O_PROTOCOL flag */
1025 protocol = drv->bdrv_file_open;
53a29513
HR
1026 }
1027
1028 if (protocol) {
1029 *flags |= BDRV_O_PROTOCOL;
1030 } else {
1031 *flags &= ~BDRV_O_PROTOCOL;
1032 }
1033
035fccdf 1034 /* Fetch the file name from the options QDict if necessary */
17b005f1 1035 if (protocol && filename) {
f54120ff
KW
1036 if (!qdict_haskey(*options, "filename")) {
1037 qdict_put(*options, "filename", qstring_from_str(filename));
1038 parse_filename = true;
1039 } else {
1040 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1041 "the same time");
1042 return -EINVAL;
1043 }
035fccdf
KW
1044 }
1045
c2ad1b0c 1046 /* Find the right block driver */
f54120ff 1047 filename = qdict_get_try_str(*options, "filename");
f54120ff 1048
053e1578
HR
1049 if (!drvname && protocol) {
1050 if (filename) {
1051 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1052 if (!drv) {
053e1578 1053 return -EINVAL;
17b005f1 1054 }
053e1578
HR
1055
1056 drvname = drv->format_name;
1057 qdict_put(*options, "driver", qstring_from_str(drvname));
1058 } else {
1059 error_setg(errp, "Must specify either driver or file");
1060 return -EINVAL;
98289620 1061 }
c2ad1b0c
KW
1062 }
1063
17b005f1 1064 assert(drv || !protocol);
c2ad1b0c 1065
f54120ff 1066 /* Driver-specific filename parsing */
17b005f1 1067 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1068 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1069 if (local_err) {
34b5d2c6 1070 error_propagate(errp, local_err);
f54120ff 1071 return -EINVAL;
6963a30d 1072 }
cd5d031e
HR
1073
1074 if (!drv->bdrv_needs_filename) {
1075 qdict_del(*options, "filename");
cd5d031e 1076 }
6963a30d
KW
1077 }
1078
f54120ff
KW
1079 return 0;
1080}
1081
b4b059f6
KW
1082static BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
1083 BlockDriverState *child_bs,
1084 const BdrvChildRole *child_role)
df581792
KW
1085{
1086 BdrvChild *child = g_new(BdrvChild, 1);
1087 *child = (BdrvChild) {
1088 .bs = child_bs,
1089 .role = child_role,
1090 };
1091
1092 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
b4b059f6
KW
1093
1094 return child;
df581792
KW
1095}
1096
5db15a57 1097void bdrv_detach_child(BdrvChild *child)
33a60407
KW
1098{
1099 QLIST_REMOVE(child, next);
1100 g_free(child);
1101}
1102
1103void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
1104{
1105 BlockDriverState *child_bs = child->bs;
1106
1107 if (child->bs->inherits_from == parent) {
1108 child->bs->inherits_from = NULL;
1109 }
1110
1111 bdrv_detach_child(child);
1112 bdrv_unref(child_bs);
1113}
1114
5db15a57
KW
1115/*
1116 * Sets the backing file link of a BDS. A new reference is created; callers
1117 * which don't need their own reference any more must call bdrv_unref().
1118 */
8d24cce1
FZ
1119void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd)
1120{
5db15a57
KW
1121 if (backing_hd) {
1122 bdrv_ref(backing_hd);
1123 }
8d24cce1 1124
760e0063 1125 if (bs->backing) {
826b6ca0 1126 assert(bs->backing_blocker);
760e0063 1127 bdrv_op_unblock_all(bs->backing->bs, bs->backing_blocker);
5db15a57 1128 bdrv_unref_child(bs, bs->backing);
826b6ca0
FZ
1129 } else if (backing_hd) {
1130 error_setg(&bs->backing_blocker,
81e5f78a
AG
1131 "node is used as backing hd of '%s'",
1132 bdrv_get_device_or_node_name(bs));
826b6ca0
FZ
1133 }
1134
8d24cce1 1135 if (!backing_hd) {
826b6ca0
FZ
1136 error_free(bs->backing_blocker);
1137 bs->backing_blocker = NULL;
760e0063 1138 bs->backing = NULL;
8d24cce1
FZ
1139 goto out;
1140 }
760e0063 1141 bs->backing = bdrv_attach_child(bs, backing_hd, &child_backing);
8d24cce1
FZ
1142 bs->open_flags &= ~BDRV_O_NO_BACKING;
1143 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_hd->filename);
1144 pstrcpy(bs->backing_format, sizeof(bs->backing_format),
1145 backing_hd->drv ? backing_hd->drv->format_name : "");
826b6ca0 1146
760e0063 1147 bdrv_op_block_all(backing_hd, bs->backing_blocker);
826b6ca0 1148 /* Otherwise we won't be able to commit due to check in bdrv_commit */
760e0063 1149 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
826b6ca0 1150 bs->backing_blocker);
8d24cce1 1151out:
3baca891 1152 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
1153}
1154
31ca6d07
KW
1155/*
1156 * Opens the backing file for a BlockDriverState if not yet open
1157 *
1158 * options is a QDict of options to pass to the block drivers, or NULL for an
1159 * empty set of options. The reference to the QDict is transferred to this
1160 * function (even on failure), so if the caller intends to reuse the dictionary,
1161 * it needs to use QINCREF() before calling bdrv_file_open.
1162 */
34b5d2c6 1163int bdrv_open_backing_file(BlockDriverState *bs, QDict *options, Error **errp)
9156df12 1164{
1ba4b6a5 1165 char *backing_filename = g_malloc0(PATH_MAX);
317fc44e 1166 int ret = 0;
8d24cce1 1167 BlockDriverState *backing_hd;
34b5d2c6 1168 Error *local_err = NULL;
9156df12 1169
760e0063 1170 if (bs->backing != NULL) {
31ca6d07 1171 QDECREF(options);
1ba4b6a5 1172 goto free_exit;
9156df12
PB
1173 }
1174
31ca6d07
KW
1175 /* NULL means an empty set of options */
1176 if (options == NULL) {
1177 options = qdict_new();
1178 }
1179
9156df12 1180 bs->open_flags &= ~BDRV_O_NO_BACKING;
1cb6f506
KW
1181 if (qdict_haskey(options, "file.filename")) {
1182 backing_filename[0] = '\0';
1183 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 1184 QDECREF(options);
1ba4b6a5 1185 goto free_exit;
dbecebdd 1186 } else {
9f07429e
HR
1187 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
1188 &local_err);
1189 if (local_err) {
1190 ret = -EINVAL;
1191 error_propagate(errp, local_err);
1192 QDECREF(options);
1193 goto free_exit;
1194 }
9156df12
PB
1195 }
1196
8ee79e70
KW
1197 if (!bs->drv || !bs->drv->supports_backing) {
1198 ret = -EINVAL;
1199 error_setg(errp, "Driver doesn't support backing files");
1200 QDECREF(options);
1201 goto free_exit;
1202 }
1203
e4e9986b 1204 backing_hd = bdrv_new();
8d24cce1 1205
c5f6e493
KW
1206 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
1207 qdict_put(options, "driver", qstring_from_str(bs->backing_format));
9156df12
PB
1208 }
1209
760e0063 1210 assert(bs->backing == NULL);
f3930ed0
KW
1211 ret = bdrv_open_inherit(&backing_hd,
1212 *backing_filename ? backing_filename : NULL,
ce343771 1213 NULL, options, 0, bs, &child_backing, &local_err);
9156df12 1214 if (ret < 0) {
8d24cce1
FZ
1215 bdrv_unref(backing_hd);
1216 backing_hd = NULL;
9156df12 1217 bs->open_flags |= BDRV_O_NO_BACKING;
b04b6b6e
FZ
1218 error_setg(errp, "Could not open backing file: %s",
1219 error_get_pretty(local_err));
1220 error_free(local_err);
1ba4b6a5 1221 goto free_exit;
9156df12 1222 }
df581792 1223
5db15a57
KW
1224 /* Hook up the backing file link; drop our reference, bs owns the
1225 * backing_hd reference now */
8d24cce1 1226 bdrv_set_backing_hd(bs, backing_hd);
5db15a57 1227 bdrv_unref(backing_hd);
d80ac658 1228
1ba4b6a5
BC
1229free_exit:
1230 g_free(backing_filename);
1231 return ret;
9156df12
PB
1232}
1233
da557aac
HR
1234/*
1235 * Opens a disk image whose options are given as BlockdevRef in another block
1236 * device's options.
1237 *
da557aac 1238 * If allow_none is true, no image will be opened if filename is false and no
b4b059f6 1239 * BlockdevRef is given. NULL will be returned, but errp remains unset.
da557aac
HR
1240 *
1241 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
1242 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1243 * itself, all options starting with "${bdref_key}." are considered part of the
1244 * BlockdevRef.
1245 *
1246 * The BlockdevRef will be removed from the options QDict.
1247 */
b4b059f6
KW
1248BdrvChild *bdrv_open_child(const char *filename,
1249 QDict *options, const char *bdref_key,
1250 BlockDriverState* parent,
1251 const BdrvChildRole *child_role,
1252 bool allow_none, Error **errp)
da557aac 1253{
b4b059f6
KW
1254 BdrvChild *c = NULL;
1255 BlockDriverState *bs;
da557aac
HR
1256 QDict *image_options;
1257 int ret;
1258 char *bdref_key_dot;
1259 const char *reference;
1260
df581792 1261 assert(child_role != NULL);
f67503e5 1262
da557aac
HR
1263 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1264 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
1265 g_free(bdref_key_dot);
1266
1267 reference = qdict_get_try_str(options, bdref_key);
1268 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 1269 if (!allow_none) {
da557aac
HR
1270 error_setg(errp, "A block device must be specified for \"%s\"",
1271 bdref_key);
da557aac 1272 }
b20e61e0 1273 QDECREF(image_options);
da557aac
HR
1274 goto done;
1275 }
1276
b4b059f6
KW
1277 bs = NULL;
1278 ret = bdrv_open_inherit(&bs, filename, reference, image_options, 0,
ce343771 1279 parent, child_role, errp);
df581792
KW
1280 if (ret < 0) {
1281 goto done;
1282 }
1283
b4b059f6 1284 c = bdrv_attach_child(parent, bs, child_role);
da557aac
HR
1285
1286done:
1287 qdict_del(options, bdref_key);
b4b059f6
KW
1288 return c;
1289}
1290
6b8aeca5 1291int bdrv_append_temp_snapshot(BlockDriverState *bs, int flags, Error **errp)
b998875d
KW
1292{
1293 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 1294 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 1295 int64_t total_size;
83d0521a 1296 QemuOpts *opts = NULL;
b998875d
KW
1297 QDict *snapshot_options;
1298 BlockDriverState *bs_snapshot;
c2e0dbbf 1299 Error *local_err = NULL;
b998875d
KW
1300 int ret;
1301
1302 /* if snapshot, we create a temporary backing file and open it
1303 instead of opening 'filename' directly */
1304
1305 /* Get the required size from the image */
f187743a
KW
1306 total_size = bdrv_getlength(bs);
1307 if (total_size < 0) {
6b8aeca5 1308 ret = total_size;
f187743a 1309 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 1310 goto out;
f187743a 1311 }
b998875d
KW
1312
1313 /* Create the temporary image */
1ba4b6a5 1314 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
1315 if (ret < 0) {
1316 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 1317 goto out;
b998875d
KW
1318 }
1319
ef810437 1320 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 1321 &error_abort);
39101f25 1322 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
ef810437 1323 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, &local_err);
83d0521a 1324 qemu_opts_del(opts);
b998875d
KW
1325 if (ret < 0) {
1326 error_setg_errno(errp, -ret, "Could not create temporary overlay "
1327 "'%s': %s", tmp_filename,
1328 error_get_pretty(local_err));
1329 error_free(local_err);
1ba4b6a5 1330 goto out;
b998875d
KW
1331 }
1332
1333 /* Prepare a new options QDict for the temporary file */
1334 snapshot_options = qdict_new();
1335 qdict_put(snapshot_options, "file.driver",
1336 qstring_from_str("file"));
1337 qdict_put(snapshot_options, "file.filename",
1338 qstring_from_str(tmp_filename));
e6641719
HR
1339 qdict_put(snapshot_options, "driver",
1340 qstring_from_str("qcow2"));
b998875d 1341
e4e9986b 1342 bs_snapshot = bdrv_new();
b998875d
KW
1343
1344 ret = bdrv_open(&bs_snapshot, NULL, NULL, snapshot_options,
6ebf9aa2 1345 flags, &local_err);
b998875d
KW
1346 if (ret < 0) {
1347 error_propagate(errp, local_err);
1ba4b6a5 1348 goto out;
b998875d
KW
1349 }
1350
1351 bdrv_append(bs_snapshot, bs);
1ba4b6a5
BC
1352
1353out:
1354 g_free(tmp_filename);
6b8aeca5 1355 return ret;
b998875d
KW
1356}
1357
b6ce07aa
KW
1358/*
1359 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
1360 *
1361 * options is a QDict of options to pass to the block drivers, or NULL for an
1362 * empty set of options. The reference to the QDict belongs to the block layer
1363 * after the call (even on failure), so if the caller intends to reuse the
1364 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
1365 *
1366 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
1367 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
1368 *
1369 * The reference parameter may be used to specify an existing block device which
1370 * should be opened. If specified, neither options nor a filename may be given,
1371 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 1372 */
f3930ed0
KW
1373static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
1374 const char *reference, QDict *options, int flags,
1375 BlockDriverState *parent,
ce343771 1376 const BdrvChildRole *child_role, Error **errp)
ea2384d3 1377{
b6ce07aa 1378 int ret;
9a4f4c31
KW
1379 BdrvChild *file = NULL;
1380 BlockDriverState *bs;
ce343771 1381 BlockDriver *drv = NULL;
74fe54f2 1382 const char *drvname;
34b5d2c6 1383 Error *local_err = NULL;
b1e6fc08 1384 int snapshot_flags = 0;
712e7874 1385
f67503e5 1386 assert(pbs);
f3930ed0
KW
1387 assert(!child_role || !flags);
1388 assert(!child_role == !parent);
f67503e5 1389
ddf5636d
HR
1390 if (reference) {
1391 bool options_non_empty = options ? qdict_size(options) : false;
1392 QDECREF(options);
1393
1394 if (*pbs) {
1395 error_setg(errp, "Cannot reuse an existing BDS when referencing "
1396 "another block device");
1397 return -EINVAL;
1398 }
1399
1400 if (filename || options_non_empty) {
1401 error_setg(errp, "Cannot reference an existing block device with "
1402 "additional options or a new filename");
1403 return -EINVAL;
1404 }
1405
1406 bs = bdrv_lookup_bs(reference, reference, errp);
1407 if (!bs) {
1408 return -ENODEV;
1409 }
1410 bdrv_ref(bs);
1411 *pbs = bs;
1412 return 0;
1413 }
1414
f67503e5
HR
1415 if (*pbs) {
1416 bs = *pbs;
1417 } else {
e4e9986b 1418 bs = bdrv_new();
f67503e5
HR
1419 }
1420
de9c0cec
KW
1421 /* NULL means an empty set of options */
1422 if (options == NULL) {
1423 options = qdict_new();
1424 }
1425
f3930ed0 1426 if (child_role) {
bddcec37 1427 bs->inherits_from = parent;
f3930ed0
KW
1428 flags = child_role->inherit_flags(parent->open_flags);
1429 }
1430
053e1578 1431 ret = bdrv_fill_options(&options, &filename, &flags, &local_err);
462f5bcf
KW
1432 if (local_err) {
1433 goto fail;
1434 }
1435
76c591b0 1436 /* Find the right image format driver */
76c591b0
KW
1437 drvname = qdict_get_try_str(options, "driver");
1438 if (drvname) {
1439 drv = bdrv_find_format(drvname);
1440 qdict_del(options, "driver");
1441 if (!drv) {
1442 error_setg(errp, "Unknown driver: '%s'", drvname);
1443 ret = -EINVAL;
1444 goto fail;
1445 }
1446 }
1447
1448 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 1449
f3930ed0 1450 bs->open_flags = flags;
de9c0cec 1451 bs->options = options;
b6ad491a 1452 options = qdict_clone_shallow(options);
de9c0cec 1453
f500a6d3 1454 /* Open image file without format layer */
f4788adc
KW
1455 if ((flags & BDRV_O_PROTOCOL) == 0) {
1456 if (flags & BDRV_O_RDWR) {
1457 flags |= BDRV_O_ALLOW_RDWR;
1458 }
1459 if (flags & BDRV_O_SNAPSHOT) {
1460 snapshot_flags = bdrv_temp_snapshot_flags(flags);
1461 flags = bdrv_backing_flags(flags);
1462 }
f500a6d3 1463
f3930ed0 1464 bs->open_flags = flags;
1fdd6933 1465
9a4f4c31
KW
1466 file = bdrv_open_child(filename, options, "file", bs,
1467 &child_file, true, &local_err);
1fdd6933
KW
1468 if (local_err) {
1469 ret = -EINVAL;
f4788adc
KW
1470 goto fail;
1471 }
f500a6d3
KW
1472 }
1473
76c591b0 1474 /* Image format probing */
38f3ef57 1475 bs->probed = !drv;
76c591b0 1476 if (!drv && file) {
9a4f4c31 1477 ret = find_image_format(file->bs, filename, &drv, &local_err);
17b005f1 1478 if (ret < 0) {
8bfea15d 1479 goto fail;
2a05cbe4 1480 }
76c591b0 1481 } else if (!drv) {
17b005f1
KW
1482 error_setg(errp, "Must specify either driver or file");
1483 ret = -EINVAL;
8bfea15d 1484 goto fail;
ea2384d3 1485 }
b6ce07aa 1486
53a29513
HR
1487 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
1488 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
1489 /* file must be NULL if a protocol BDS is about to be created
1490 * (the inverse results in an error message from bdrv_open_common()) */
1491 assert(!(flags & BDRV_O_PROTOCOL) || !file);
1492
b6ce07aa 1493 /* Open the image */
34b5d2c6 1494 ret = bdrv_open_common(bs, file, options, flags, drv, &local_err);
b6ce07aa 1495 if (ret < 0) {
8bfea15d 1496 goto fail;
6987307c
CH
1497 }
1498
2a05cbe4 1499 if (file && (bs->file != file)) {
9a4f4c31 1500 bdrv_unref_child(bs, file);
f500a6d3
KW
1501 file = NULL;
1502 }
1503
b6ce07aa 1504 /* If there is a backing file, use it */
9156df12 1505 if ((flags & BDRV_O_NO_BACKING) == 0) {
31ca6d07
KW
1506 QDict *backing_options;
1507
5726d872 1508 qdict_extract_subqdict(options, &backing_options, "backing.");
34b5d2c6 1509 ret = bdrv_open_backing_file(bs, backing_options, &local_err);
b6ce07aa 1510 if (ret < 0) {
b6ad491a 1511 goto close_and_fail;
b6ce07aa 1512 }
b6ce07aa
KW
1513 }
1514
91af7014
HR
1515 bdrv_refresh_filename(bs);
1516
b998875d
KW
1517 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
1518 * temporary snapshot afterwards. */
b1e6fc08 1519 if (snapshot_flags) {
6b8aeca5 1520 ret = bdrv_append_temp_snapshot(bs, snapshot_flags, &local_err);
b998875d 1521 if (local_err) {
b998875d
KW
1522 goto close_and_fail;
1523 }
1524 }
1525
b6ad491a 1526 /* Check if any unknown options were used */
5acd9d81 1527 if (options && (qdict_size(options) != 0)) {
b6ad491a 1528 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
1529 if (flags & BDRV_O_PROTOCOL) {
1530 error_setg(errp, "Block protocol '%s' doesn't support the option "
1531 "'%s'", drv->format_name, entry->key);
1532 } else {
1533 error_setg(errp, "Block format '%s' used by device '%s' doesn't "
1534 "support the option '%s'", drv->format_name,
bfb197e0 1535 bdrv_get_device_name(bs), entry->key);
5acd9d81 1536 }
b6ad491a
KW
1537
1538 ret = -EINVAL;
1539 goto close_and_fail;
1540 }
b6ad491a 1541
b6ce07aa 1542 if (!bdrv_key_required(bs)) {
a7f53e26
MA
1543 if (bs->blk) {
1544 blk_dev_change_media_cb(bs->blk, true);
1545 }
c3adb58f
MA
1546 } else if (!runstate_check(RUN_STATE_PRELAUNCH)
1547 && !runstate_check(RUN_STATE_INMIGRATE)
1548 && !runstate_check(RUN_STATE_PAUSED)) { /* HACK */
1549 error_setg(errp,
1550 "Guest must be stopped for opening of encrypted image");
1551 ret = -EBUSY;
1552 goto close_and_fail;
b6ce07aa
KW
1553 }
1554
c3adb58f 1555 QDECREF(options);
f67503e5 1556 *pbs = bs;
b6ce07aa
KW
1557 return 0;
1558
8bfea15d 1559fail:
f500a6d3 1560 if (file != NULL) {
9a4f4c31 1561 bdrv_unref_child(bs, file);
f500a6d3 1562 }
de9c0cec 1563 QDECREF(bs->options);
b6ad491a 1564 QDECREF(options);
de9c0cec 1565 bs->options = NULL;
f67503e5
HR
1566 if (!*pbs) {
1567 /* If *pbs is NULL, a new BDS has been created in this function and
1568 needs to be freed now. Otherwise, it does not need to be closed,
1569 since it has not really been opened yet. */
1570 bdrv_unref(bs);
1571 }
84d18f06 1572 if (local_err) {
34b5d2c6
HR
1573 error_propagate(errp, local_err);
1574 }
b6ad491a 1575 return ret;
de9c0cec 1576
b6ad491a 1577close_and_fail:
f67503e5
HR
1578 /* See fail path, but now the BDS has to be always closed */
1579 if (*pbs) {
1580 bdrv_close(bs);
1581 } else {
1582 bdrv_unref(bs);
1583 }
b6ad491a 1584 QDECREF(options);
84d18f06 1585 if (local_err) {
34b5d2c6
HR
1586 error_propagate(errp, local_err);
1587 }
b6ce07aa
KW
1588 return ret;
1589}
1590
f3930ed0 1591int bdrv_open(BlockDriverState **pbs, const char *filename,
6ebf9aa2 1592 const char *reference, QDict *options, int flags, Error **errp)
f3930ed0
KW
1593{
1594 return bdrv_open_inherit(pbs, filename, reference, options, flags, NULL,
ce343771 1595 NULL, errp);
f3930ed0
KW
1596}
1597
e971aa12
JC
1598typedef struct BlockReopenQueueEntry {
1599 bool prepared;
1600 BDRVReopenState state;
1601 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
1602} BlockReopenQueueEntry;
1603
1604/*
1605 * Adds a BlockDriverState to a simple queue for an atomic, transactional
1606 * reopen of multiple devices.
1607 *
1608 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
1609 * already performed, or alternatively may be NULL a new BlockReopenQueue will
1610 * be created and initialized. This newly created BlockReopenQueue should be
1611 * passed back in for subsequent calls that are intended to be of the same
1612 * atomic 'set'.
1613 *
1614 * bs is the BlockDriverState to add to the reopen queue.
1615 *
4d2cb092
KW
1616 * options contains the changed options for the associated bs
1617 * (the BlockReopenQueue takes ownership)
1618 *
e971aa12
JC
1619 * flags contains the open flags for the associated bs
1620 *
1621 * returns a pointer to bs_queue, which is either the newly allocated
1622 * bs_queue, or the existing bs_queue being used.
1623 *
1624 */
1625BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
4d2cb092
KW
1626 BlockDriverState *bs,
1627 QDict *options, int flags)
e971aa12
JC
1628{
1629 assert(bs != NULL);
1630
1631 BlockReopenQueueEntry *bs_entry;
67251a31 1632 BdrvChild *child;
4d2cb092 1633 QDict *old_options;
67251a31 1634
e971aa12
JC
1635 if (bs_queue == NULL) {
1636 bs_queue = g_new0(BlockReopenQueue, 1);
1637 QSIMPLEQ_INIT(bs_queue);
1638 }
1639
4d2cb092
KW
1640 if (!options) {
1641 options = qdict_new();
1642 }
1643
1644 old_options = qdict_clone_shallow(bs->options);
1645 qdict_join(options, old_options, false);
1646 QDECREF(old_options);
1647
f1f25a2e
KW
1648 /* bdrv_open() masks this flag out */
1649 flags &= ~BDRV_O_PROTOCOL;
1650
67251a31
KW
1651 QLIST_FOREACH(child, &bs->children, next) {
1652 int child_flags;
1653
1654 if (child->bs->inherits_from != bs) {
1655 continue;
1656 }
1657
1658 child_flags = child->role->inherit_flags(flags);
4d2cb092
KW
1659 /* TODO Pass down child flags (backing.*, extents.*, ...) */
1660 bdrv_reopen_queue(bs_queue, child->bs, NULL, child_flags);
e971aa12
JC
1661 }
1662
1663 bs_entry = g_new0(BlockReopenQueueEntry, 1);
1664 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
1665
1666 bs_entry->state.bs = bs;
4d2cb092 1667 bs_entry->state.options = options;
e971aa12
JC
1668 bs_entry->state.flags = flags;
1669
1670 return bs_queue;
1671}
1672
1673/*
1674 * Reopen multiple BlockDriverStates atomically & transactionally.
1675 *
1676 * The queue passed in (bs_queue) must have been built up previous
1677 * via bdrv_reopen_queue().
1678 *
1679 * Reopens all BDS specified in the queue, with the appropriate
1680 * flags. All devices are prepared for reopen, and failure of any
1681 * device will cause all device changes to be abandonded, and intermediate
1682 * data cleaned up.
1683 *
1684 * If all devices prepare successfully, then the changes are committed
1685 * to all devices.
1686 *
1687 */
1688int bdrv_reopen_multiple(BlockReopenQueue *bs_queue, Error **errp)
1689{
1690 int ret = -1;
1691 BlockReopenQueueEntry *bs_entry, *next;
1692 Error *local_err = NULL;
1693
1694 assert(bs_queue != NULL);
1695
1696 bdrv_drain_all();
1697
1698 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1699 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
1700 error_propagate(errp, local_err);
1701 goto cleanup;
1702 }
1703 bs_entry->prepared = true;
1704 }
1705
1706 /* If we reach this point, we have success and just need to apply the
1707 * changes
1708 */
1709 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1710 bdrv_reopen_commit(&bs_entry->state);
1711 }
1712
1713 ret = 0;
1714
1715cleanup:
1716 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
1717 if (ret && bs_entry->prepared) {
1718 bdrv_reopen_abort(&bs_entry->state);
1719 }
4d2cb092 1720 QDECREF(bs_entry->state.options);
e971aa12
JC
1721 g_free(bs_entry);
1722 }
1723 g_free(bs_queue);
1724 return ret;
1725}
1726
1727
1728/* Reopen a single BlockDriverState with the specified flags. */
1729int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
1730{
1731 int ret = -1;
1732 Error *local_err = NULL;
4d2cb092 1733 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12
JC
1734
1735 ret = bdrv_reopen_multiple(queue, &local_err);
1736 if (local_err != NULL) {
1737 error_propagate(errp, local_err);
1738 }
1739 return ret;
1740}
1741
1742
1743/*
1744 * Prepares a BlockDriverState for reopen. All changes are staged in the
1745 * 'opaque' field of the BDRVReopenState, which is used and allocated by
1746 * the block driver layer .bdrv_reopen_prepare()
1747 *
1748 * bs is the BlockDriverState to reopen
1749 * flags are the new open flags
1750 * queue is the reopen queue
1751 *
1752 * Returns 0 on success, non-zero on error. On error errp will be set
1753 * as well.
1754 *
1755 * On failure, bdrv_reopen_abort() will be called to clean up any data.
1756 * It is the responsibility of the caller to then call the abort() or
1757 * commit() for any other BDS that have been left in a prepare() state
1758 *
1759 */
1760int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
1761 Error **errp)
1762{
1763 int ret = -1;
1764 Error *local_err = NULL;
1765 BlockDriver *drv;
1766
1767 assert(reopen_state != NULL);
1768 assert(reopen_state->bs->drv != NULL);
1769 drv = reopen_state->bs->drv;
1770
1771 /* if we are to stay read-only, do not allow permission change
1772 * to r/w */
1773 if (!(reopen_state->bs->open_flags & BDRV_O_ALLOW_RDWR) &&
1774 reopen_state->flags & BDRV_O_RDWR) {
81e5f78a
AG
1775 error_setg(errp, "Node '%s' is read only",
1776 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
1777 goto error;
1778 }
1779
1780
1781 ret = bdrv_flush(reopen_state->bs);
1782 if (ret) {
1783 error_set(errp, ERROR_CLASS_GENERIC_ERROR, "Error (%s) flushing drive",
1784 strerror(-ret));
1785 goto error;
1786 }
1787
1788 if (drv->bdrv_reopen_prepare) {
1789 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
1790 if (ret) {
1791 if (local_err != NULL) {
1792 error_propagate(errp, local_err);
1793 } else {
d8b6895f
LC
1794 error_setg(errp, "failed while preparing to reopen image '%s'",
1795 reopen_state->bs->filename);
e971aa12
JC
1796 }
1797 goto error;
1798 }
1799 } else {
1800 /* It is currently mandatory to have a bdrv_reopen_prepare()
1801 * handler for each supported drv. */
81e5f78a
AG
1802 error_setg(errp, "Block format '%s' used by node '%s' "
1803 "does not support reopening files", drv->format_name,
1804 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
1805 ret = -1;
1806 goto error;
1807 }
1808
4d2cb092
KW
1809 /* Options that are not handled are only okay if they are unchanged
1810 * compared to the old state. It is expected that some options are only
1811 * used for the initial open, but not reopen (e.g. filename) */
1812 if (qdict_size(reopen_state->options)) {
1813 const QDictEntry *entry = qdict_first(reopen_state->options);
1814
1815 do {
1816 QString *new_obj = qobject_to_qstring(entry->value);
1817 const char *new = qstring_get_str(new_obj);
1818 const char *old = qdict_get_try_str(reopen_state->bs->options,
1819 entry->key);
1820
1821 if (!old || strcmp(new, old)) {
1822 error_setg(errp, "Cannot change the option '%s'", entry->key);
1823 ret = -EINVAL;
1824 goto error;
1825 }
1826 } while ((entry = qdict_next(reopen_state->options, entry)));
1827 }
1828
e971aa12
JC
1829 ret = 0;
1830
1831error:
1832 return ret;
1833}
1834
1835/*
1836 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
1837 * makes them final by swapping the staging BlockDriverState contents into
1838 * the active BlockDriverState contents.
1839 */
1840void bdrv_reopen_commit(BDRVReopenState *reopen_state)
1841{
1842 BlockDriver *drv;
1843
1844 assert(reopen_state != NULL);
1845 drv = reopen_state->bs->drv;
1846 assert(drv != NULL);
1847
1848 /* If there are any driver level actions to take */
1849 if (drv->bdrv_reopen_commit) {
1850 drv->bdrv_reopen_commit(reopen_state);
1851 }
1852
1853 /* set BDS specific flags now */
1854 reopen_state->bs->open_flags = reopen_state->flags;
1855 reopen_state->bs->enable_write_cache = !!(reopen_state->flags &
1856 BDRV_O_CACHE_WB);
1857 reopen_state->bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 1858
3baca891 1859 bdrv_refresh_limits(reopen_state->bs, NULL);
e971aa12
JC
1860}
1861
1862/*
1863 * Abort the reopen, and delete and free the staged changes in
1864 * reopen_state
1865 */
1866void bdrv_reopen_abort(BDRVReopenState *reopen_state)
1867{
1868 BlockDriver *drv;
1869
1870 assert(reopen_state != NULL);
1871 drv = reopen_state->bs->drv;
1872 assert(drv != NULL);
1873
1874 if (drv->bdrv_reopen_abort) {
1875 drv->bdrv_reopen_abort(reopen_state);
1876 }
1877}
1878
1879
fc01f7e7
FB
1880void bdrv_close(BlockDriverState *bs)
1881{
33384421
HR
1882 BdrvAioNotifier *ban, *ban_next;
1883
3cbc002c
PB
1884 if (bs->job) {
1885 block_job_cancel_sync(bs->job);
1886 }
99b7e775
AG
1887
1888 /* Disable I/O limits and drain all pending throttled requests */
1889 if (bs->io_limits_enabled) {
1890 bdrv_io_limits_disable(bs);
1891 }
1892
53ec73e2 1893 bdrv_drain(bs); /* complete I/O */
58fda173 1894 bdrv_flush(bs);
53ec73e2 1895 bdrv_drain(bs); /* in case flush left pending I/O */
d7d512f6 1896 notifier_list_notify(&bs->close_notifiers, bs);
7094f12f 1897
3cbc002c 1898 if (bs->drv) {
6e93e7c4
KW
1899 BdrvChild *child, *next;
1900
9a7dedbc 1901 bs->drv->bdrv_close(bs);
9a4f4c31 1902 bs->drv = NULL;
9a7dedbc 1903
5db15a57 1904 bdrv_set_backing_hd(bs, NULL);
9a7dedbc 1905
9a4f4c31
KW
1906 if (bs->file != NULL) {
1907 bdrv_unref_child(bs, bs->file);
1908 bs->file = NULL;
1909 }
1910
6e93e7c4 1911 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
1912 /* TODO Remove bdrv_unref() from drivers' close function and use
1913 * bdrv_unref_child() here */
bddcec37
KW
1914 if (child->bs->inherits_from == bs) {
1915 child->bs->inherits_from = NULL;
1916 }
33a60407 1917 bdrv_detach_child(child);
6e93e7c4
KW
1918 }
1919
7267c094 1920 g_free(bs->opaque);
ea2384d3 1921 bs->opaque = NULL;
53fec9d3 1922 bs->copy_on_read = 0;
a275fa42
PB
1923 bs->backing_file[0] = '\0';
1924 bs->backing_format[0] = '\0';
6405875c
PB
1925 bs->total_sectors = 0;
1926 bs->encrypted = 0;
1927 bs->valid_key = 0;
1928 bs->sg = 0;
0d51b4de 1929 bs->zero_beyond_eof = false;
de9c0cec
KW
1930 QDECREF(bs->options);
1931 bs->options = NULL;
91af7014
HR
1932 QDECREF(bs->full_open_options);
1933 bs->full_open_options = NULL;
b338082b 1934 }
98f90dba 1935
a7f53e26
MA
1936 if (bs->blk) {
1937 blk_dev_change_media_cb(bs->blk, false);
1938 }
9ca11154 1939
33384421
HR
1940 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
1941 g_free(ban);
1942 }
1943 QLIST_INIT(&bs->aio_notifiers);
b338082b
FB
1944}
1945
2bc93fed
MK
1946void bdrv_close_all(void)
1947{
1948 BlockDriverState *bs;
1949
dc364f4c 1950 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
1951 AioContext *aio_context = bdrv_get_aio_context(bs);
1952
1953 aio_context_acquire(aio_context);
2bc93fed 1954 bdrv_close(bs);
ed78cda3 1955 aio_context_release(aio_context);
2bc93fed
MK
1956 }
1957}
1958
dc364f4c
BC
1959/* make a BlockDriverState anonymous by removing from bdrv_state and
1960 * graph_bdrv_state list.
d22b2f41
RH
1961 Also, NULL terminate the device_name to prevent double remove */
1962void bdrv_make_anon(BlockDriverState *bs)
1963{
bfb197e0
MA
1964 /*
1965 * Take care to remove bs from bdrv_states only when it's actually
1966 * in it. Note that bs->device_list.tqe_prev is initially null,
1967 * and gets set to non-null by QTAILQ_INSERT_TAIL(). Establish
1968 * the useful invariant "bs in bdrv_states iff bs->tqe_prev" by
1969 * resetting it to null on remove.
1970 */
1971 if (bs->device_list.tqe_prev) {
dc364f4c 1972 QTAILQ_REMOVE(&bdrv_states, bs, device_list);
bfb197e0 1973 bs->device_list.tqe_prev = NULL;
d22b2f41 1974 }
dc364f4c
BC
1975 if (bs->node_name[0] != '\0') {
1976 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
1977 }
1978 bs->node_name[0] = '\0';
d22b2f41
RH
1979}
1980
e023b2e2
PB
1981static void bdrv_rebind(BlockDriverState *bs)
1982{
1983 if (bs->drv && bs->drv->bdrv_rebind) {
1984 bs->drv->bdrv_rebind(bs);
1985 }
1986}
1987
4ddc07ca
PB
1988static void bdrv_move_feature_fields(BlockDriverState *bs_dest,
1989 BlockDriverState *bs_src)
8802d1fd 1990{
4ddc07ca 1991 /* move some fields that need to stay attached to the device */
8802d1fd
JC
1992
1993 /* dev info */
1b7fd729 1994 bs_dest->guest_block_size = bs_src->guest_block_size;
4ddc07ca 1995 bs_dest->copy_on_read = bs_src->copy_on_read;
8802d1fd 1996
4ddc07ca 1997 bs_dest->enable_write_cache = bs_src->enable_write_cache;
c4a248a1 1998
cc0681c4 1999 /* i/o throttled req */
76f4afb4
AG
2000 bs_dest->throttle_state = bs_src->throttle_state,
2001 bs_dest->io_limits_enabled = bs_src->io_limits_enabled;
2002 bs_dest->pending_reqs[0] = bs_src->pending_reqs[0];
2003 bs_dest->pending_reqs[1] = bs_src->pending_reqs[1];
2004 bs_dest->throttled_reqs[0] = bs_src->throttled_reqs[0];
2005 bs_dest->throttled_reqs[1] = bs_src->throttled_reqs[1];
2006 memcpy(&bs_dest->round_robin,
2007 &bs_src->round_robin,
2008 sizeof(bs_dest->round_robin));
0e5b0a2d
BC
2009 memcpy(&bs_dest->throttle_timers,
2010 &bs_src->throttle_timers,
2011 sizeof(ThrottleTimers));
8802d1fd 2012
8802d1fd 2013 /* r/w error */
4ddc07ca
PB
2014 bs_dest->on_read_error = bs_src->on_read_error;
2015 bs_dest->on_write_error = bs_src->on_write_error;
8802d1fd
JC
2016
2017 /* i/o status */
4ddc07ca
PB
2018 bs_dest->iostatus_enabled = bs_src->iostatus_enabled;
2019 bs_dest->iostatus = bs_src->iostatus;
8802d1fd 2020
a9fc4408 2021 /* dirty bitmap */
e4654d2d 2022 bs_dest->dirty_bitmaps = bs_src->dirty_bitmaps;
a9fc4408 2023
9fcb0251
FZ
2024 /* reference count */
2025 bs_dest->refcnt = bs_src->refcnt;
2026
a9fc4408 2027 /* job */
4ddc07ca 2028 bs_dest->job = bs_src->job;
a9fc4408 2029
8802d1fd 2030 /* keep the same entry in bdrv_states */
dc364f4c 2031 bs_dest->device_list = bs_src->device_list;
7e7d56d9
MA
2032 bs_dest->blk = bs_src->blk;
2033
fbe40ff7
FZ
2034 memcpy(bs_dest->op_blockers, bs_src->op_blockers,
2035 sizeof(bs_dest->op_blockers));
4ddc07ca 2036}
8802d1fd 2037
4ddc07ca
PB
2038/*
2039 * Swap bs contents for two image chains while they are live,
2040 * while keeping required fields on the BlockDriverState that is
2041 * actually attached to a device.
2042 *
2043 * This will modify the BlockDriverState fields, and swap contents
2044 * between bs_new and bs_old. Both bs_new and bs_old are modified.
2045 *
bfb197e0 2046 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2047 *
2048 * This function does not create any image files.
2049 */
2050void bdrv_swap(BlockDriverState *bs_new, BlockDriverState *bs_old)
2051{
2052 BlockDriverState tmp;
bddcec37 2053 BdrvChild *child;
f6801b83 2054
6ee4ce1e
KW
2055 bdrv_drain(bs_new);
2056 bdrv_drain(bs_old);
f6801b83 2057
90ce8a06
BC
2058 /* The code needs to swap the node_name but simply swapping node_list won't
2059 * work so first remove the nodes from the graph list, do the swap then
2060 * insert them back if needed.
2061 */
2062 if (bs_new->node_name[0] != '\0') {
2063 QTAILQ_REMOVE(&graph_bdrv_states, bs_new, node_list);
2064 }
2065 if (bs_old->node_name[0] != '\0') {
2066 QTAILQ_REMOVE(&graph_bdrv_states, bs_old, node_list);
2067 }
2068
db628338
AG
2069 /* If the BlockDriverState is part of a throttling group acquire
2070 * its lock since we're going to mess with the protected fields.
2071 * Otherwise there's no need to worry since no one else can touch
2072 * them. */
2073 if (bs_old->throttle_state) {
2074 throttle_group_lock(bs_old);
2075 }
2076
bfb197e0 2077 /* bs_new must be unattached and shouldn't have anything fancy enabled */
7e7d56d9 2078 assert(!bs_new->blk);
e4654d2d 2079 assert(QLIST_EMPTY(&bs_new->dirty_bitmaps));
4ddc07ca 2080 assert(bs_new->job == NULL);
4ddc07ca 2081 assert(bs_new->io_limits_enabled == false);
db628338 2082 assert(bs_new->throttle_state == NULL);
0e5b0a2d 2083 assert(!throttle_timers_are_initialized(&bs_new->throttle_timers));
8802d1fd 2084
4ddc07ca
PB
2085 tmp = *bs_new;
2086 *bs_new = *bs_old;
2087 *bs_old = tmp;
a9fc4408 2088
4ddc07ca
PB
2089 /* there are some fields that should not be swapped, move them back */
2090 bdrv_move_feature_fields(&tmp, bs_old);
2091 bdrv_move_feature_fields(bs_old, bs_new);
2092 bdrv_move_feature_fields(bs_new, &tmp);
8802d1fd 2093
bfb197e0 2094 /* bs_new must remain unattached */
7e7d56d9 2095 assert(!bs_new->blk);
4ddc07ca
PB
2096
2097 /* Check a few fields that should remain attached to the device */
4ddc07ca 2098 assert(bs_new->job == NULL);
4ddc07ca 2099 assert(bs_new->io_limits_enabled == false);
db628338 2100 assert(bs_new->throttle_state == NULL);
0e5b0a2d 2101 assert(!throttle_timers_are_initialized(&bs_new->throttle_timers));
e023b2e2 2102
db628338
AG
2103 /* Release the ThrottleGroup lock */
2104 if (bs_old->throttle_state) {
2105 throttle_group_unlock(bs_old);
2106 }
2107
90ce8a06
BC
2108 /* insert the nodes back into the graph node list if needed */
2109 if (bs_new->node_name[0] != '\0') {
2110 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs_new, node_list);
2111 }
2112 if (bs_old->node_name[0] != '\0') {
2113 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs_old, node_list);
2114 }
2115
6e93e7c4
KW
2116 /*
2117 * Update lh_first.le_prev for non-empty lists.
2118 *
2119 * The head of the op blocker list doesn't change because it is moved back
2120 * in bdrv_move_feature_fields().
2121 */
6ee4ce1e
KW
2122 assert(QLIST_EMPTY(&bs_old->tracked_requests));
2123 assert(QLIST_EMPTY(&bs_new->tracked_requests));
2124
6e93e7c4
KW
2125 QLIST_FIX_HEAD_PTR(&bs_new->children, next);
2126 QLIST_FIX_HEAD_PTR(&bs_old->children, next);
2127
bddcec37
KW
2128 /* Update references in bs->opaque and children */
2129 QLIST_FOREACH(child, &bs_old->children, next) {
2130 if (child->bs->inherits_from == bs_new) {
2131 child->bs->inherits_from = bs_old;
2132 }
2133 }
2134 QLIST_FOREACH(child, &bs_new->children, next) {
2135 if (child->bs->inherits_from == bs_old) {
2136 child->bs->inherits_from = bs_new;
2137 }
2138 }
2139
e023b2e2 2140 bdrv_rebind(bs_new);
4ddc07ca
PB
2141 bdrv_rebind(bs_old);
2142}
2143
2144/*
2145 * Add new bs contents at the top of an image chain while the chain is
2146 * live, while keeping required fields on the top layer.
2147 *
2148 * This will modify the BlockDriverState fields, and swap contents
2149 * between bs_new and bs_top. Both bs_new and bs_top are modified.
2150 *
bfb197e0 2151 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2152 *
2153 * This function does not create any image files.
2154 */
2155void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top)
2156{
2157 bdrv_swap(bs_new, bs_top);
2158
2159 /* The contents of 'tmp' will become bs_top, as we are
2160 * swapping bs_new and bs_top contents. */
8d24cce1 2161 bdrv_set_backing_hd(bs_top, bs_new);
8802d1fd
JC
2162}
2163
4f6fd349 2164static void bdrv_delete(BlockDriverState *bs)
b338082b 2165{
3e914655 2166 assert(!bs->job);
3718d8ab 2167 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 2168 assert(!bs->refcnt);
e4654d2d 2169 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
18846dee 2170
e1b5c52e
SH
2171 bdrv_close(bs);
2172
1b7bdbc1 2173 /* remove from list, if necessary */
d22b2f41 2174 bdrv_make_anon(bs);
34c6f050 2175
7267c094 2176 g_free(bs);
fc01f7e7
FB
2177}
2178
e97fc193
AL
2179/*
2180 * Run consistency checks on an image
2181 *
e076f338 2182 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 2183 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 2184 * check are stored in res.
e97fc193 2185 */
4534ff54 2186int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 2187{
908bcd54
HR
2188 if (bs->drv == NULL) {
2189 return -ENOMEDIUM;
2190 }
e97fc193
AL
2191 if (bs->drv->bdrv_check == NULL) {
2192 return -ENOTSUP;
2193 }
2194
e076f338 2195 memset(res, 0, sizeof(*res));
4534ff54 2196 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
2197}
2198
8a426614
KW
2199#define COMMIT_BUF_SECTORS 2048
2200
33e3963e
FB
2201/* commit COW file into the raw image */
2202int bdrv_commit(BlockDriverState *bs)
2203{
19cb3738 2204 BlockDriver *drv = bs->drv;
72706ea4 2205 int64_t sector, total_sectors, length, backing_length;
8a426614 2206 int n, ro, open_flags;
0bce597d 2207 int ret = 0;
72706ea4 2208 uint8_t *buf = NULL;
33e3963e 2209
19cb3738
FB
2210 if (!drv)
2211 return -ENOMEDIUM;
6bb45158 2212
760e0063 2213 if (!bs->backing) {
4dca4b63 2214 return -ENOTSUP;
33e3963e
FB
2215 }
2216
bb00021d 2217 if (bdrv_op_is_blocked(bs, BLOCK_OP_TYPE_COMMIT_SOURCE, NULL) ||
760e0063 2218 bdrv_op_is_blocked(bs->backing->bs, BLOCK_OP_TYPE_COMMIT_TARGET, NULL)) {
2d3735d3
SH
2219 return -EBUSY;
2220 }
2221
760e0063
KW
2222 ro = bs->backing->bs->read_only;
2223 open_flags = bs->backing->bs->open_flags;
4dca4b63
NS
2224
2225 if (ro) {
760e0063 2226 if (bdrv_reopen(bs->backing->bs, open_flags | BDRV_O_RDWR, NULL)) {
0bce597d 2227 return -EACCES;
4dca4b63 2228 }
ea2384d3 2229 }
33e3963e 2230
72706ea4
JC
2231 length = bdrv_getlength(bs);
2232 if (length < 0) {
2233 ret = length;
2234 goto ro_cleanup;
2235 }
2236
760e0063 2237 backing_length = bdrv_getlength(bs->backing->bs);
72706ea4
JC
2238 if (backing_length < 0) {
2239 ret = backing_length;
2240 goto ro_cleanup;
2241 }
2242
2243 /* If our top snapshot is larger than the backing file image,
2244 * grow the backing file image if possible. If not possible,
2245 * we must return an error */
2246 if (length > backing_length) {
760e0063 2247 ret = bdrv_truncate(bs->backing->bs, length);
72706ea4
JC
2248 if (ret < 0) {
2249 goto ro_cleanup;
2250 }
2251 }
2252
2253 total_sectors = length >> BDRV_SECTOR_BITS;
857d4f46
KW
2254
2255 /* qemu_try_blockalign() for bs will choose an alignment that works for
760e0063 2256 * bs->backing->bs as well, so no need to compare the alignment manually. */
857d4f46
KW
2257 buf = qemu_try_blockalign(bs, COMMIT_BUF_SECTORS * BDRV_SECTOR_SIZE);
2258 if (buf == NULL) {
2259 ret = -ENOMEM;
2260 goto ro_cleanup;
2261 }
8a426614
KW
2262
2263 for (sector = 0; sector < total_sectors; sector += n) {
d663640c
PB
2264 ret = bdrv_is_allocated(bs, sector, COMMIT_BUF_SECTORS, &n);
2265 if (ret < 0) {
2266 goto ro_cleanup;
2267 }
2268 if (ret) {
dabfa6cc
KW
2269 ret = bdrv_read(bs, sector, buf, n);
2270 if (ret < 0) {
8a426614
KW
2271 goto ro_cleanup;
2272 }
2273
760e0063 2274 ret = bdrv_write(bs->backing->bs, sector, buf, n);
dabfa6cc 2275 if (ret < 0) {
8a426614
KW
2276 goto ro_cleanup;
2277 }
ea2384d3 2278 }
33e3963e 2279 }
95389c86 2280
1d44952f
CH
2281 if (drv->bdrv_make_empty) {
2282 ret = drv->bdrv_make_empty(bs);
dabfa6cc
KW
2283 if (ret < 0) {
2284 goto ro_cleanup;
2285 }
1d44952f
CH
2286 bdrv_flush(bs);
2287 }
95389c86 2288
3f5075ae
CH
2289 /*
2290 * Make sure all data we wrote to the backing device is actually
2291 * stable on disk.
2292 */
760e0063
KW
2293 if (bs->backing) {
2294 bdrv_flush(bs->backing->bs);
dabfa6cc 2295 }
4dca4b63 2296
dabfa6cc 2297 ret = 0;
4dca4b63 2298ro_cleanup:
857d4f46 2299 qemu_vfree(buf);
4dca4b63
NS
2300
2301 if (ro) {
0bce597d 2302 /* ignoring error return here */
760e0063 2303 bdrv_reopen(bs->backing->bs, open_flags & ~BDRV_O_RDWR, NULL);
4dca4b63
NS
2304 }
2305
1d44952f 2306 return ret;
33e3963e
FB
2307}
2308
e8877497 2309int bdrv_commit_all(void)
6ab4b5ab
MA
2310{
2311 BlockDriverState *bs;
2312
dc364f4c 2313 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
2314 AioContext *aio_context = bdrv_get_aio_context(bs);
2315
2316 aio_context_acquire(aio_context);
760e0063 2317 if (bs->drv && bs->backing) {
272d2d8e
JC
2318 int ret = bdrv_commit(bs);
2319 if (ret < 0) {
ed78cda3 2320 aio_context_release(aio_context);
272d2d8e
JC
2321 return ret;
2322 }
e8877497 2323 }
ed78cda3 2324 aio_context_release(aio_context);
6ab4b5ab 2325 }
e8877497 2326 return 0;
6ab4b5ab
MA
2327}
2328
756e6736
KW
2329/*
2330 * Return values:
2331 * 0 - success
2332 * -EINVAL - backing format specified, but no file
2333 * -ENOSPC - can't update the backing file because no space is left in the
2334 * image file header
2335 * -ENOTSUP - format driver doesn't support changing the backing file
2336 */
2337int bdrv_change_backing_file(BlockDriverState *bs,
2338 const char *backing_file, const char *backing_fmt)
2339{
2340 BlockDriver *drv = bs->drv;
469ef350 2341 int ret;
756e6736 2342
5f377794
PB
2343 /* Backing file format doesn't make sense without a backing file */
2344 if (backing_fmt && !backing_file) {
2345 return -EINVAL;
2346 }
2347
756e6736 2348 if (drv->bdrv_change_backing_file != NULL) {
469ef350 2349 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 2350 } else {
469ef350 2351 ret = -ENOTSUP;
756e6736 2352 }
469ef350
PB
2353
2354 if (ret == 0) {
2355 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
2356 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
2357 }
2358 return ret;
756e6736
KW
2359}
2360
6ebdcee2
JC
2361/*
2362 * Finds the image layer in the chain that has 'bs' as its backing file.
2363 *
2364 * active is the current topmost image.
2365 *
2366 * Returns NULL if bs is not found in active's image chain,
2367 * or if active == bs.
4caf0fcd
JC
2368 *
2369 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
2370 */
2371BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
2372 BlockDriverState *bs)
2373{
760e0063
KW
2374 while (active && bs != backing_bs(active)) {
2375 active = backing_bs(active);
6ebdcee2
JC
2376 }
2377
4caf0fcd
JC
2378 return active;
2379}
6ebdcee2 2380
4caf0fcd
JC
2381/* Given a BDS, searches for the base layer. */
2382BlockDriverState *bdrv_find_base(BlockDriverState *bs)
2383{
2384 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
2385}
2386
6ebdcee2
JC
2387/*
2388 * Drops images above 'base' up to and including 'top', and sets the image
2389 * above 'top' to have base as its backing file.
2390 *
2391 * Requires that the overlay to 'top' is opened r/w, so that the backing file
2392 * information in 'bs' can be properly updated.
2393 *
2394 * E.g., this will convert the following chain:
2395 * bottom <- base <- intermediate <- top <- active
2396 *
2397 * to
2398 *
2399 * bottom <- base <- active
2400 *
2401 * It is allowed for bottom==base, in which case it converts:
2402 *
2403 * base <- intermediate <- top <- active
2404 *
2405 * to
2406 *
2407 * base <- active
2408 *
54e26900
JC
2409 * If backing_file_str is non-NULL, it will be used when modifying top's
2410 * overlay image metadata.
2411 *
6ebdcee2
JC
2412 * Error conditions:
2413 * if active == top, that is considered an error
2414 *
2415 */
2416int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 2417 BlockDriverState *base, const char *backing_file_str)
6ebdcee2 2418{
6ebdcee2 2419 BlockDriverState *new_top_bs = NULL;
6ebdcee2
JC
2420 int ret = -EIO;
2421
6ebdcee2
JC
2422 if (!top->drv || !base->drv) {
2423 goto exit;
2424 }
2425
2426 new_top_bs = bdrv_find_overlay(active, top);
2427
2428 if (new_top_bs == NULL) {
2429 /* we could not find the image above 'top', this is an error */
2430 goto exit;
2431 }
2432
760e0063 2433 /* special case of new_top_bs->backing->bs already pointing to base - nothing
6ebdcee2 2434 * to do, no intermediate images */
760e0063 2435 if (backing_bs(new_top_bs) == base) {
6ebdcee2
JC
2436 ret = 0;
2437 goto exit;
2438 }
2439
5db15a57
KW
2440 /* Make sure that base is in the backing chain of top */
2441 if (!bdrv_chain_contains(top, base)) {
6ebdcee2
JC
2442 goto exit;
2443 }
2444
2445 /* success - we can delete the intermediate states, and link top->base */
5db15a57 2446 backing_file_str = backing_file_str ? backing_file_str : base->filename;
54e26900 2447 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
5db15a57 2448 base->drv ? base->drv->format_name : "");
6ebdcee2
JC
2449 if (ret) {
2450 goto exit;
2451 }
5db15a57 2452 bdrv_set_backing_hd(new_top_bs, base);
6ebdcee2 2453
6ebdcee2 2454 ret = 0;
6ebdcee2 2455exit:
6ebdcee2
JC
2456 return ret;
2457}
2458
61007b31
SH
2459/**
2460 * Truncate file to 'offset' bytes (needed only for file protocols)
2461 */
2462int bdrv_truncate(BlockDriverState *bs, int64_t offset)
71d0770c 2463{
61007b31
SH
2464 BlockDriver *drv = bs->drv;
2465 int ret;
2466 if (!drv)
71d0770c 2467 return -ENOMEDIUM;
61007b31
SH
2468 if (!drv->bdrv_truncate)
2469 return -ENOTSUP;
2470 if (bs->read_only)
2471 return -EACCES;
71d0770c 2472
61007b31
SH
2473 ret = drv->bdrv_truncate(bs, offset);
2474 if (ret == 0) {
2475 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
2476 bdrv_dirty_bitmap_truncate(bs);
2477 if (bs->blk) {
2478 blk_dev_resize_cb(bs->blk);
2479 }
c0191e76 2480 }
61007b31 2481 return ret;
71d0770c
AL
2482}
2483
61007b31
SH
2484/**
2485 * Length of a allocated file in bytes. Sparse files are counted by actual
2486 * allocated space. Return < 0 if error or unknown.
2487 */
2488int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 2489{
61007b31
SH
2490 BlockDriver *drv = bs->drv;
2491 if (!drv) {
2492 return -ENOMEDIUM;
8f4754ed 2493 }
61007b31
SH
2494 if (drv->bdrv_get_allocated_file_size) {
2495 return drv->bdrv_get_allocated_file_size(bs);
2496 }
2497 if (bs->file) {
9a4f4c31 2498 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 2499 }
61007b31 2500 return -ENOTSUP;
1c9805a3 2501}
e7a8a783 2502
61007b31
SH
2503/**
2504 * Return number of sectors on success, -errno on error.
1c9805a3 2505 */
61007b31 2506int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 2507{
61007b31 2508 BlockDriver *drv = bs->drv;
498e386c 2509
61007b31
SH
2510 if (!drv)
2511 return -ENOMEDIUM;
2572b37a 2512
61007b31
SH
2513 if (drv->has_variable_length) {
2514 int ret = refresh_total_sectors(bs, bs->total_sectors);
2515 if (ret < 0) {
2516 return ret;
1c9805a3
SH
2517 }
2518 }
61007b31 2519 return bs->total_sectors;
1c9805a3 2520}
b338082b 2521
61007b31
SH
2522/**
2523 * Return length in bytes on success, -errno on error.
2524 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 2525 */
61007b31 2526int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 2527{
61007b31 2528 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 2529
4a9c9ea0 2530 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 2531 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
2532}
2533
61007b31
SH
2534/* return 0 as number of sectors if no device present or error */
2535void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 2536{
61007b31 2537 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 2538
61007b31 2539 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
2540}
2541
61007b31
SH
2542void bdrv_set_on_error(BlockDriverState *bs, BlockdevOnError on_read_error,
2543 BlockdevOnError on_write_error)
fc01f7e7 2544{
61007b31
SH
2545 bs->on_read_error = on_read_error;
2546 bs->on_write_error = on_write_error;
83f64091
FB
2547}
2548
61007b31 2549BlockdevOnError bdrv_get_on_error(BlockDriverState *bs, bool is_read)
4105eaaa 2550{
61007b31 2551 return is_read ? bs->on_read_error : bs->on_write_error;
8d3b1a2d
KW
2552}
2553
61007b31 2554BlockErrorAction bdrv_get_error_action(BlockDriverState *bs, bool is_read, int error)
d75cbb5e 2555{
61007b31 2556 BlockdevOnError on_err = is_read ? bs->on_read_error : bs->on_write_error;
9ce10c0b 2557
61007b31
SH
2558 switch (on_err) {
2559 case BLOCKDEV_ON_ERROR_ENOSPC:
2560 return (error == ENOSPC) ?
2561 BLOCK_ERROR_ACTION_STOP : BLOCK_ERROR_ACTION_REPORT;
2562 case BLOCKDEV_ON_ERROR_STOP:
2563 return BLOCK_ERROR_ACTION_STOP;
2564 case BLOCKDEV_ON_ERROR_REPORT:
2565 return BLOCK_ERROR_ACTION_REPORT;
2566 case BLOCKDEV_ON_ERROR_IGNORE:
2567 return BLOCK_ERROR_ACTION_IGNORE;
2568 default:
2569 abort();
d75cbb5e
PL
2570 }
2571}
2572
61007b31
SH
2573static void send_qmp_error_event(BlockDriverState *bs,
2574 BlockErrorAction action,
2575 bool is_read, int error)
83f64091 2576{
61007b31 2577 IoOperationType optype;
a3ef6571 2578
61007b31
SH
2579 optype = is_read ? IO_OPERATION_TYPE_READ : IO_OPERATION_TYPE_WRITE;
2580 qapi_event_send_block_io_error(bdrv_get_device_name(bs), optype, action,
2581 bdrv_iostatus_is_enabled(bs),
2582 error == ENOSPC, strerror(error),
2583 &error_abort);
83f64091
FB
2584}
2585
61007b31
SH
2586/* This is done by device models because, while the block layer knows
2587 * about the error, it does not know whether an operation comes from
2588 * the device or the block layer (from a job, for example).
2589 */
2590void bdrv_error_action(BlockDriverState *bs, BlockErrorAction action,
2591 bool is_read, int error)
83f64091 2592{
61007b31 2593 assert(error >= 0);
83f64091 2594
61007b31
SH
2595 if (action == BLOCK_ERROR_ACTION_STOP) {
2596 /* First set the iostatus, so that "info block" returns an iostatus
2597 * that matches the events raised so far (an additional error iostatus
2598 * is fine, but not a lost one).
2599 */
2600 bdrv_iostatus_set_err(bs, error);
83f64091 2601
61007b31
SH
2602 /* Then raise the request to stop the VM and the event.
2603 * qemu_system_vmstop_request_prepare has two effects. First,
2604 * it ensures that the STOP event always comes after the
2605 * BLOCK_IO_ERROR event. Second, it ensures that even if management
2606 * can observe the STOP event and do a "cont" before the STOP
2607 * event is issued, the VM will not stop. In this case, vm_start()
2608 * also ensures that the STOP/RESUME pair of events is emitted.
2609 */
2610 qemu_system_vmstop_request_prepare();
2611 send_qmp_error_event(bs, action, is_read, error);
2612 qemu_system_vmstop_request(RUN_STATE_IO_ERROR);
2613 } else {
2614 send_qmp_error_event(bs, action, is_read, error);
2615 }
8d3b1a2d
KW
2616}
2617
61007b31 2618int bdrv_is_read_only(BlockDriverState *bs)
8d3b1a2d 2619{
61007b31 2620 return bs->read_only;
83f64091 2621}
83f64091 2622
61007b31 2623int bdrv_is_sg(BlockDriverState *bs)
f08145fe 2624{
61007b31 2625 return bs->sg;
f08145fe
KW
2626}
2627
61007b31 2628int bdrv_enable_write_cache(BlockDriverState *bs)
ab185921 2629{
61007b31 2630 return bs->enable_write_cache;
ab185921
SH
2631}
2632
61007b31 2633void bdrv_set_enable_write_cache(BlockDriverState *bs, bool wce)
da1fa91d 2634{
61007b31 2635 bs->enable_write_cache = wce;
ab185921 2636
61007b31
SH
2637 /* so a reopen() will preserve wce */
2638 if (wce) {
2639 bs->open_flags |= BDRV_O_CACHE_WB;
893a8f62 2640 } else {
61007b31 2641 bs->open_flags &= ~BDRV_O_CACHE_WB;
893a8f62 2642 }
da1fa91d
KW
2643}
2644
61007b31 2645int bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 2646{
760e0063 2647 if (bs->backing && bs->backing->bs->encrypted) {
61007b31 2648 return 1;
760e0063 2649 }
61007b31 2650 return bs->encrypted;
fc3959e4
FZ
2651}
2652
61007b31 2653int bdrv_key_required(BlockDriverState *bs)
fc3959e4 2654{
760e0063 2655 BdrvChild *backing = bs->backing;
61007b31 2656
760e0063 2657 if (backing && backing->bs->encrypted && !backing->bs->valid_key) {
61007b31 2658 return 1;
760e0063 2659 }
61007b31 2660 return (bs->encrypted && !bs->valid_key);
fc3959e4
FZ
2661}
2662
61007b31 2663int bdrv_set_key(BlockDriverState *bs, const char *key)
d0c7f642 2664{
d0c7f642 2665 int ret;
760e0063
KW
2666 if (bs->backing && bs->backing->bs->encrypted) {
2667 ret = bdrv_set_key(bs->backing->bs, key);
61007b31
SH
2668 if (ret < 0)
2669 return ret;
2670 if (!bs->encrypted)
2671 return 0;
2672 }
2673 if (!bs->encrypted) {
2674 return -EINVAL;
2675 } else if (!bs->drv || !bs->drv->bdrv_set_key) {
d0c7f642
KW
2676 return -ENOMEDIUM;
2677 }
61007b31 2678 ret = bs->drv->bdrv_set_key(bs, key);
b9c64947 2679 if (ret < 0) {
61007b31
SH
2680 bs->valid_key = 0;
2681 } else if (!bs->valid_key) {
2682 bs->valid_key = 1;
2683 if (bs->blk) {
2684 /* call the change callback now, we skipped it on open */
2685 blk_dev_change_media_cb(bs->blk, true);
2686 }
1b0288ae 2687 }
61007b31
SH
2688 return ret;
2689}
f08f2dda 2690
c5fbe571 2691/*
61007b31
SH
2692 * Provide an encryption key for @bs.
2693 * If @key is non-null:
2694 * If @bs is not encrypted, fail.
2695 * Else if the key is invalid, fail.
2696 * Else set @bs's key to @key, replacing the existing key, if any.
2697 * If @key is null:
2698 * If @bs is encrypted and still lacks a key, fail.
2699 * Else do nothing.
2700 * On failure, store an error object through @errp if non-null.
c5fbe571 2701 */
61007b31 2702void bdrv_add_key(BlockDriverState *bs, const char *key, Error **errp)
c5fbe571 2703{
61007b31
SH
2704 if (key) {
2705 if (!bdrv_is_encrypted(bs)) {
2706 error_setg(errp, "Node '%s' is not encrypted",
2707 bdrv_get_device_or_node_name(bs));
2708 } else if (bdrv_set_key(bs, key) < 0) {
c6bd8c70 2709 error_setg(errp, QERR_INVALID_PASSWORD);
4d2855a3
MA
2710 }
2711 } else {
2712 if (bdrv_key_required(bs)) {
b1ca6391
MA
2713 error_set(errp, ERROR_CLASS_DEVICE_ENCRYPTED,
2714 "'%s' (%s) is encrypted",
81e5f78a 2715 bdrv_get_device_or_node_name(bs),
4d2855a3
MA
2716 bdrv_get_encrypted_filename(bs));
2717 }
2718 }
2719}
2720
61007b31 2721const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 2722{
61007b31 2723 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
2724}
2725
61007b31 2726static int qsort_strcmp(const void *a, const void *b)
40b4f539 2727{
61007b31 2728 return strcmp(a, b);
40b4f539
KW
2729}
2730
61007b31
SH
2731void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
2732 void *opaque)
40b4f539 2733{
61007b31
SH
2734 BlockDriver *drv;
2735 int count = 0;
2736 int i;
2737 const char **formats = NULL;
40b4f539 2738
61007b31
SH
2739 QLIST_FOREACH(drv, &bdrv_drivers, list) {
2740 if (drv->format_name) {
2741 bool found = false;
2742 int i = count;
2743 while (formats && i && !found) {
2744 found = !strcmp(formats[--i], drv->format_name);
2745 }
e2a305fb 2746
61007b31
SH
2747 if (!found) {
2748 formats = g_renew(const char *, formats, count + 1);
2749 formats[count++] = drv->format_name;
2750 }
6c5a42ac 2751 }
61007b31 2752 }
6c5a42ac 2753
61007b31 2754 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 2755
61007b31
SH
2756 for (i = 0; i < count; i++) {
2757 it(opaque, formats[i]);
2758 }
40b4f539 2759
61007b31
SH
2760 g_free(formats);
2761}
40b4f539 2762
61007b31
SH
2763/* This function is to find a node in the bs graph */
2764BlockDriverState *bdrv_find_node(const char *node_name)
2765{
2766 BlockDriverState *bs;
391827eb 2767
61007b31 2768 assert(node_name);
40b4f539 2769
61007b31
SH
2770 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2771 if (!strcmp(node_name, bs->node_name)) {
2772 return bs;
40b4f539
KW
2773 }
2774 }
61007b31 2775 return NULL;
40b4f539
KW
2776}
2777
61007b31
SH
2778/* Put this QMP function here so it can access the static graph_bdrv_states. */
2779BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 2780{
61007b31
SH
2781 BlockDeviceInfoList *list, *entry;
2782 BlockDriverState *bs;
40b4f539 2783
61007b31
SH
2784 list = NULL;
2785 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2786 BlockDeviceInfo *info = bdrv_block_device_info(bs, errp);
2787 if (!info) {
2788 qapi_free_BlockDeviceInfoList(list);
2789 return NULL;
301db7c2 2790 }
61007b31
SH
2791 entry = g_malloc0(sizeof(*entry));
2792 entry->value = info;
2793 entry->next = list;
2794 list = entry;
301db7c2
RH
2795 }
2796
61007b31
SH
2797 return list;
2798}
40b4f539 2799
61007b31
SH
2800BlockDriverState *bdrv_lookup_bs(const char *device,
2801 const char *node_name,
2802 Error **errp)
2803{
2804 BlockBackend *blk;
2805 BlockDriverState *bs;
40b4f539 2806
61007b31
SH
2807 if (device) {
2808 blk = blk_by_name(device);
40b4f539 2809
61007b31
SH
2810 if (blk) {
2811 return blk_bs(blk);
2812 }
2813 }
40b4f539 2814
61007b31
SH
2815 if (node_name) {
2816 bs = bdrv_find_node(node_name);
6d519a5f 2817
61007b31
SH
2818 if (bs) {
2819 return bs;
2820 }
40b4f539
KW
2821 }
2822
61007b31
SH
2823 error_setg(errp, "Cannot find device=%s nor node_name=%s",
2824 device ? device : "",
2825 node_name ? node_name : "");
2826 return NULL;
40b4f539
KW
2827}
2828
61007b31
SH
2829/* If 'base' is in the same chain as 'top', return true. Otherwise,
2830 * return false. If either argument is NULL, return false. */
2831bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 2832{
61007b31 2833 while (top && top != base) {
760e0063 2834 top = backing_bs(top);
02c50efe 2835 }
61007b31
SH
2836
2837 return top != NULL;
02c50efe
FZ
2838}
2839
61007b31 2840BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 2841{
61007b31
SH
2842 if (!bs) {
2843 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 2844 }
61007b31 2845 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
2846}
2847
61007b31 2848BlockDriverState *bdrv_next(BlockDriverState *bs)
83f64091 2849{
61007b31
SH
2850 if (!bs) {
2851 return QTAILQ_FIRST(&bdrv_states);
857d4f46 2852 }
61007b31 2853 return QTAILQ_NEXT(bs, device_list);
83f64091 2854}
beac80cd 2855
61007b31 2856const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 2857{
61007b31 2858 return bs->node_name;
beac80cd
FB
2859}
2860
61007b31
SH
2861/* TODO check what callers really want: bs->node_name or blk_name() */
2862const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 2863{
61007b31 2864 return bs->blk ? blk_name(bs->blk) : "";
f141eafe 2865}
83f64091 2866
61007b31
SH
2867/* This can be used to identify nodes that might not have a device
2868 * name associated. Since node and device names live in the same
2869 * namespace, the result is unambiguous. The exception is if both are
2870 * absent, then this returns an empty (non-null) string. */
2871const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 2872{
61007b31 2873 return bs->blk ? blk_name(bs->blk) : bs->node_name;
beac80cd 2874}
beac80cd 2875
61007b31 2876int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 2877{
61007b31 2878 return bs->open_flags;
0b5a2445
PB
2879}
2880
61007b31 2881int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 2882{
61007b31 2883 return 1;
0b5a2445
PB
2884}
2885
61007b31 2886int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 2887{
61007b31 2888 assert(bs->drv);
0b5a2445 2889
61007b31
SH
2890 /* If BS is a copy on write image, it is initialized to
2891 the contents of the base image, which may not be zeroes. */
760e0063 2892 if (bs->backing) {
61007b31
SH
2893 return 0;
2894 }
2895 if (bs->drv->bdrv_has_zero_init) {
2896 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 2897 }
61007b31
SH
2898
2899 /* safe default */
2900 return 0;
68485420
KW
2901}
2902
61007b31 2903bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 2904{
61007b31 2905 BlockDriverInfo bdi;
b2a61371 2906
760e0063 2907 if (bs->backing) {
61007b31
SH
2908 return false;
2909 }
2910
2911 if (bdrv_get_info(bs, &bdi) == 0) {
2912 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
2913 }
2914
61007b31 2915 return false;
b2a61371
SH
2916}
2917
61007b31 2918bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 2919{
61007b31 2920 BlockDriverInfo bdi;
68485420 2921
760e0063 2922 if (bs->backing || !(bs->open_flags & BDRV_O_UNMAP)) {
61007b31
SH
2923 return false;
2924 }
68485420 2925
61007b31
SH
2926 if (bdrv_get_info(bs, &bdi) == 0) {
2927 return bdi.can_write_zeroes_with_unmap;
2928 }
68485420 2929
61007b31 2930 return false;
68485420
KW
2931}
2932
61007b31 2933const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 2934{
760e0063 2935 if (bs->backing && bs->backing->bs->encrypted)
61007b31
SH
2936 return bs->backing_file;
2937 else if (bs->encrypted)
2938 return bs->filename;
2939 else
2940 return NULL;
b2e12bc6
CH
2941}
2942
61007b31
SH
2943void bdrv_get_backing_filename(BlockDriverState *bs,
2944 char *filename, int filename_size)
016f5cf6 2945{
61007b31
SH
2946 pstrcpy(filename, filename_size, bs->backing_file);
2947}
d318aea9 2948
61007b31
SH
2949int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
2950{
2951 BlockDriver *drv = bs->drv;
2952 if (!drv)
2953 return -ENOMEDIUM;
2954 if (!drv->bdrv_get_info)
2955 return -ENOTSUP;
2956 memset(bdi, 0, sizeof(*bdi));
2957 return drv->bdrv_get_info(bs, bdi);
2958}
016f5cf6 2959
61007b31
SH
2960ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
2961{
2962 BlockDriver *drv = bs->drv;
2963 if (drv && drv->bdrv_get_specific_info) {
2964 return drv->bdrv_get_specific_info(bs);
2965 }
2966 return NULL;
016f5cf6
AG
2967}
2968
61007b31 2969void bdrv_debug_event(BlockDriverState *bs, BlkDebugEvent event)
4265d620 2970{
61007b31
SH
2971 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
2972 return;
2973 }
4265d620 2974
61007b31 2975 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
2976}
2977
61007b31
SH
2978int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
2979 const char *tag)
4265d620 2980{
61007b31 2981 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 2982 bs = bs->file ? bs->file->bs : NULL;
61007b31 2983 }
4265d620 2984
61007b31
SH
2985 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
2986 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
2987 }
4265d620 2988
61007b31 2989 return -ENOTSUP;
4265d620
PB
2990}
2991
61007b31 2992int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 2993{
61007b31 2994 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 2995 bs = bs->file ? bs->file->bs : NULL;
61007b31 2996 }
ce1a14dc 2997
61007b31
SH
2998 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
2999 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
3000 }
3001
3002 return -ENOTSUP;
eb852011
MA
3003}
3004
61007b31 3005int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 3006{
61007b31 3007 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 3008 bs = bs->file ? bs->file->bs : NULL;
61007b31 3009 }
ce1a14dc 3010
61007b31
SH
3011 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
3012 return bs->drv->bdrv_debug_resume(bs, tag);
3013 }
ce1a14dc 3014
61007b31 3015 return -ENOTSUP;
f197fe2b
FZ
3016}
3017
61007b31 3018bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 3019{
61007b31 3020 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 3021 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 3022 }
19cb3738 3023
61007b31
SH
3024 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
3025 return bs->drv->bdrv_debug_is_suspended(bs, tag);
3026 }
f9f05dc5 3027
61007b31
SH
3028 return false;
3029}
f9f05dc5 3030
61007b31 3031int bdrv_is_snapshot(BlockDriverState *bs)
f9f05dc5 3032{
61007b31 3033 return !!(bs->open_flags & BDRV_O_SNAPSHOT);
f9f05dc5
KW
3034}
3035
61007b31
SH
3036/* backing_file can either be relative, or absolute, or a protocol. If it is
3037 * relative, it must be relative to the chain. So, passing in bs->filename
3038 * from a BDS as backing_file should not be done, as that may be relative to
3039 * the CWD rather than the chain. */
3040BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
3041 const char *backing_file)
f9f05dc5 3042{
61007b31
SH
3043 char *filename_full = NULL;
3044 char *backing_file_full = NULL;
3045 char *filename_tmp = NULL;
3046 int is_protocol = 0;
3047 BlockDriverState *curr_bs = NULL;
3048 BlockDriverState *retval = NULL;
f9f05dc5 3049
61007b31
SH
3050 if (!bs || !bs->drv || !backing_file) {
3051 return NULL;
f9f05dc5
KW
3052 }
3053
61007b31
SH
3054 filename_full = g_malloc(PATH_MAX);
3055 backing_file_full = g_malloc(PATH_MAX);
3056 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 3057
61007b31 3058 is_protocol = path_has_protocol(backing_file);
f9f05dc5 3059
760e0063 3060 for (curr_bs = bs; curr_bs->backing; curr_bs = curr_bs->backing->bs) {
f9f05dc5 3061
61007b31
SH
3062 /* If either of the filename paths is actually a protocol, then
3063 * compare unmodified paths; otherwise make paths relative */
3064 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
3065 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
760e0063 3066 retval = curr_bs->backing->bs;
61007b31
SH
3067 break;
3068 }
3069 } else {
3070 /* If not an absolute filename path, make it relative to the current
3071 * image's filename path */
3072 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3073 backing_file);
f9f05dc5 3074
61007b31
SH
3075 /* We are going to compare absolute pathnames */
3076 if (!realpath(filename_tmp, filename_full)) {
3077 continue;
3078 }
07f07615 3079
61007b31
SH
3080 /* We need to make sure the backing filename we are comparing against
3081 * is relative to the current image filename (or absolute) */
3082 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3083 curr_bs->backing_file);
07f07615 3084
61007b31
SH
3085 if (!realpath(filename_tmp, backing_file_full)) {
3086 continue;
3087 }
eb489bb1 3088
61007b31 3089 if (strcmp(backing_file_full, filename_full) == 0) {
760e0063 3090 retval = curr_bs->backing->bs;
61007b31
SH
3091 break;
3092 }
3093 }
eb489bb1
KW
3094 }
3095
61007b31
SH
3096 g_free(filename_full);
3097 g_free(backing_file_full);
3098 g_free(filename_tmp);
3099 return retval;
3100}
3101
3102int bdrv_get_backing_file_depth(BlockDriverState *bs)
3103{
3104 if (!bs->drv) {
3105 return 0;
eb489bb1
KW
3106 }
3107
760e0063 3108 if (!bs->backing) {
61007b31 3109 return 0;
ca716364
KW
3110 }
3111
760e0063 3112 return 1 + bdrv_get_backing_file_depth(bs->backing->bs);
61007b31 3113}
07f07615 3114
61007b31
SH
3115void bdrv_init(void)
3116{
3117 module_call_init(MODULE_INIT_BLOCK);
3118}
29cdb251 3119
61007b31
SH
3120void bdrv_init_with_whitelist(void)
3121{
3122 use_bdrv_whitelist = 1;
3123 bdrv_init();
07f07615
PB
3124}
3125
5a8a30db 3126void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 3127{
5a8a30db
KW
3128 Error *local_err = NULL;
3129 int ret;
3130
3456a8d1
KW
3131 if (!bs->drv) {
3132 return;
3133 }
3134
7ea2d269
AK
3135 if (!(bs->open_flags & BDRV_O_INCOMING)) {
3136 return;
3137 }
3138 bs->open_flags &= ~BDRV_O_INCOMING;
3139
3456a8d1 3140 if (bs->drv->bdrv_invalidate_cache) {
5a8a30db 3141 bs->drv->bdrv_invalidate_cache(bs, &local_err);
3456a8d1 3142 } else if (bs->file) {
9a4f4c31 3143 bdrv_invalidate_cache(bs->file->bs, &local_err);
5a8a30db
KW
3144 }
3145 if (local_err) {
3146 error_propagate(errp, local_err);
3147 return;
0f15423c 3148 }
3456a8d1 3149
5a8a30db
KW
3150 ret = refresh_total_sectors(bs, bs->total_sectors);
3151 if (ret < 0) {
3152 error_setg_errno(errp, -ret, "Could not refresh total sector count");
3153 return;
3154 }
0f15423c
AL
3155}
3156
5a8a30db 3157void bdrv_invalidate_cache_all(Error **errp)
0f15423c
AL
3158{
3159 BlockDriverState *bs;
5a8a30db 3160 Error *local_err = NULL;
0f15423c 3161
dc364f4c 3162 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
3163 AioContext *aio_context = bdrv_get_aio_context(bs);
3164
3165 aio_context_acquire(aio_context);
5a8a30db 3166 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 3167 aio_context_release(aio_context);
5a8a30db
KW
3168 if (local_err) {
3169 error_propagate(errp, local_err);
3170 return;
3171 }
0f15423c
AL
3172 }
3173}
3174
19cb3738
FB
3175/**************************************************************/
3176/* removable device support */
3177
3178/**
3179 * Return TRUE if the media is present
3180 */
3181int bdrv_is_inserted(BlockDriverState *bs)
3182{
3183 BlockDriver *drv = bs->drv;
a1aff5bf 3184
19cb3738
FB
3185 if (!drv)
3186 return 0;
3187 if (!drv->bdrv_is_inserted)
a1aff5bf
MA
3188 return 1;
3189 return drv->bdrv_is_inserted(bs);
19cb3738
FB
3190}
3191
3192/**
8e49ca46
MA
3193 * Return whether the media changed since the last call to this
3194 * function, or -ENOTSUP if we don't know. Most drivers don't know.
19cb3738
FB
3195 */
3196int bdrv_media_changed(BlockDriverState *bs)
3197{
3198 BlockDriver *drv = bs->drv;
19cb3738 3199
8e49ca46
MA
3200 if (drv && drv->bdrv_media_changed) {
3201 return drv->bdrv_media_changed(bs);
3202 }
3203 return -ENOTSUP;
19cb3738
FB
3204}
3205
3206/**
3207 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
3208 */
f36f3949 3209void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
3210{
3211 BlockDriver *drv = bs->drv;
bfb197e0 3212 const char *device_name;
19cb3738 3213
822e1cd1
MA
3214 if (drv && drv->bdrv_eject) {
3215 drv->bdrv_eject(bs, eject_flag);
19cb3738 3216 }
6f382ed2 3217
bfb197e0
MA
3218 device_name = bdrv_get_device_name(bs);
3219 if (device_name[0] != '\0') {
3220 qapi_event_send_device_tray_moved(device_name,
a5ee7bd4 3221 eject_flag, &error_abort);
6f382ed2 3222 }
19cb3738
FB
3223}
3224
19cb3738
FB
3225/**
3226 * Lock or unlock the media (if it is locked, the user won't be able
3227 * to eject it manually).
3228 */
025e849a 3229void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
3230{
3231 BlockDriver *drv = bs->drv;
3232
025e849a 3233 trace_bdrv_lock_medium(bs, locked);
b8c6d095 3234
025e849a
MA
3235 if (drv && drv->bdrv_lock_medium) {
3236 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
3237 }
3238}
985a03b0 3239
1b7fd729 3240void bdrv_set_guest_block_size(BlockDriverState *bs, int align)
7b6f9300 3241{
1b7fd729 3242 bs->guest_block_size = align;
7b6f9300 3243}
7cd1e32a 3244
0db6e54a
FZ
3245BdrvDirtyBitmap *bdrv_find_dirty_bitmap(BlockDriverState *bs, const char *name)
3246{
3247 BdrvDirtyBitmap *bm;
3248
3249 assert(name);
3250 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
3251 if (bm->name && !strcmp(name, bm->name)) {
3252 return bm;
3253 }
3254 }
3255 return NULL;
3256}
3257
20dca810 3258void bdrv_dirty_bitmap_make_anon(BdrvDirtyBitmap *bitmap)
0db6e54a 3259{
9bd2b08f 3260 assert(!bdrv_dirty_bitmap_frozen(bitmap));
0db6e54a
FZ
3261 g_free(bitmap->name);
3262 bitmap->name = NULL;
3263}
3264
3265BdrvDirtyBitmap *bdrv_create_dirty_bitmap(BlockDriverState *bs,
5fba6c0e 3266 uint32_t granularity,
0db6e54a 3267 const char *name,
b8afb520 3268 Error **errp)
7cd1e32a
LS
3269{
3270 int64_t bitmap_size;
e4654d2d 3271 BdrvDirtyBitmap *bitmap;
5fba6c0e 3272 uint32_t sector_granularity;
a55eb92c 3273
50717e94
PB
3274 assert((granularity & (granularity - 1)) == 0);
3275
0db6e54a
FZ
3276 if (name && bdrv_find_dirty_bitmap(bs, name)) {
3277 error_setg(errp, "Bitmap already exists: %s", name);
3278 return NULL;
3279 }
5fba6c0e
JS
3280 sector_granularity = granularity >> BDRV_SECTOR_BITS;
3281 assert(sector_granularity);
57322b78 3282 bitmap_size = bdrv_nb_sectors(bs);
b8afb520
FZ
3283 if (bitmap_size < 0) {
3284 error_setg_errno(errp, -bitmap_size, "could not get length of device");
3285 errno = -bitmap_size;
3286 return NULL;
3287 }
5839e53b 3288 bitmap = g_new0(BdrvDirtyBitmap, 1);
5fba6c0e 3289 bitmap->bitmap = hbitmap_alloc(bitmap_size, ctz32(sector_granularity));
e74e6b78 3290 bitmap->size = bitmap_size;
0db6e54a 3291 bitmap->name = g_strdup(name);
b8e6fb75 3292 bitmap->disabled = false;
e4654d2d
FZ
3293 QLIST_INSERT_HEAD(&bs->dirty_bitmaps, bitmap, list);
3294 return bitmap;
3295}
3296
9bd2b08f
JS
3297bool bdrv_dirty_bitmap_frozen(BdrvDirtyBitmap *bitmap)
3298{
3299 return bitmap->successor;
3300}
3301
b8e6fb75
JS
3302bool bdrv_dirty_bitmap_enabled(BdrvDirtyBitmap *bitmap)
3303{
9bd2b08f
JS
3304 return !(bitmap->disabled || bitmap->successor);
3305}
3306
9abe3bdc
JS
3307DirtyBitmapStatus bdrv_dirty_bitmap_status(BdrvDirtyBitmap *bitmap)
3308{
3309 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3310 return DIRTY_BITMAP_STATUS_FROZEN;
3311 } else if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3312 return DIRTY_BITMAP_STATUS_DISABLED;
3313 } else {
3314 return DIRTY_BITMAP_STATUS_ACTIVE;
3315 }
3316}
3317
9bd2b08f
JS
3318/**
3319 * Create a successor bitmap destined to replace this bitmap after an operation.
3320 * Requires that the bitmap is not frozen and has no successor.
3321 */
3322int bdrv_dirty_bitmap_create_successor(BlockDriverState *bs,
3323 BdrvDirtyBitmap *bitmap, Error **errp)
3324{
3325 uint64_t granularity;
3326 BdrvDirtyBitmap *child;
3327
3328 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3329 error_setg(errp, "Cannot create a successor for a bitmap that is "
3330 "currently frozen");
3331 return -1;
3332 }
3333 assert(!bitmap->successor);
3334
3335 /* Create an anonymous successor */
3336 granularity = bdrv_dirty_bitmap_granularity(bitmap);
3337 child = bdrv_create_dirty_bitmap(bs, granularity, NULL, errp);
3338 if (!child) {
3339 return -1;
3340 }
3341
3342 /* Successor will be on or off based on our current state. */
3343 child->disabled = bitmap->disabled;
3344
3345 /* Install the successor and freeze the parent */
3346 bitmap->successor = child;
3347 return 0;
3348}
3349
3350/**
3351 * For a bitmap with a successor, yield our name to the successor,
3352 * delete the old bitmap, and return a handle to the new bitmap.
3353 */
3354BdrvDirtyBitmap *bdrv_dirty_bitmap_abdicate(BlockDriverState *bs,
3355 BdrvDirtyBitmap *bitmap,
3356 Error **errp)
3357{
3358 char *name;
3359 BdrvDirtyBitmap *successor = bitmap->successor;
3360
3361 if (successor == NULL) {
3362 error_setg(errp, "Cannot relinquish control if "
3363 "there's no successor present");
3364 return NULL;
3365 }
3366
3367 name = bitmap->name;
3368 bitmap->name = NULL;
3369 successor->name = name;
3370 bitmap->successor = NULL;
3371 bdrv_release_dirty_bitmap(bs, bitmap);
3372
3373 return successor;
3374}
3375
3376/**
3377 * In cases of failure where we can no longer safely delete the parent,
3378 * we may wish to re-join the parent and child/successor.
3379 * The merged parent will be un-frozen, but not explicitly re-enabled.
3380 */
3381BdrvDirtyBitmap *bdrv_reclaim_dirty_bitmap(BlockDriverState *bs,
3382 BdrvDirtyBitmap *parent,
3383 Error **errp)
3384{
3385 BdrvDirtyBitmap *successor = parent->successor;
3386
3387 if (!successor) {
3388 error_setg(errp, "Cannot reclaim a successor when none is present");
3389 return NULL;
3390 }
3391
3392 if (!hbitmap_merge(parent->bitmap, successor->bitmap)) {
3393 error_setg(errp, "Merging of parent and successor bitmap failed");
3394 return NULL;
3395 }
3396 bdrv_release_dirty_bitmap(bs, successor);
3397 parent->successor = NULL;
3398
3399 return parent;
b8e6fb75
JS
3400}
3401
ce1ffea8
JS
3402/**
3403 * Truncates _all_ bitmaps attached to a BDS.
3404 */
3405static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs)
3406{
3407 BdrvDirtyBitmap *bitmap;
3408 uint64_t size = bdrv_nb_sectors(bs);
3409
3410 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
06207b0f 3411 assert(!bdrv_dirty_bitmap_frozen(bitmap));
ce1ffea8 3412 hbitmap_truncate(bitmap->bitmap, size);
5270b6a0 3413 bitmap->size = size;
ce1ffea8
JS
3414 }
3415}
3416
e4654d2d
FZ
3417void bdrv_release_dirty_bitmap(BlockDriverState *bs, BdrvDirtyBitmap *bitmap)
3418{
3419 BdrvDirtyBitmap *bm, *next;
3420 QLIST_FOREACH_SAFE(bm, &bs->dirty_bitmaps, list, next) {
3421 if (bm == bitmap) {
9bd2b08f 3422 assert(!bdrv_dirty_bitmap_frozen(bm));
e4654d2d
FZ
3423 QLIST_REMOVE(bitmap, list);
3424 hbitmap_free(bitmap->bitmap);
0db6e54a 3425 g_free(bitmap->name);
e4654d2d
FZ
3426 g_free(bitmap);
3427 return;
a55eb92c 3428 }
7cd1e32a
LS
3429 }
3430}
3431
b8e6fb75
JS
3432void bdrv_disable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3433{
9bd2b08f 3434 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3435 bitmap->disabled = true;
3436}
3437
3438void bdrv_enable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3439{
9bd2b08f 3440 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3441 bitmap->disabled = false;
3442}
3443
21b56835
FZ
3444BlockDirtyInfoList *bdrv_query_dirty_bitmaps(BlockDriverState *bs)
3445{
3446 BdrvDirtyBitmap *bm;
3447 BlockDirtyInfoList *list = NULL;
3448 BlockDirtyInfoList **plist = &list;
3449
3450 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
5839e53b
MA
3451 BlockDirtyInfo *info = g_new0(BlockDirtyInfo, 1);
3452 BlockDirtyInfoList *entry = g_new0(BlockDirtyInfoList, 1);
20dca810 3453 info->count = bdrv_get_dirty_count(bm);
592fdd02 3454 info->granularity = bdrv_dirty_bitmap_granularity(bm);
0db6e54a
FZ
3455 info->has_name = !!bm->name;
3456 info->name = g_strdup(bm->name);
9abe3bdc 3457 info->status = bdrv_dirty_bitmap_status(bm);
21b56835
FZ
3458 entry->value = info;
3459 *plist = entry;
3460 plist = &entry->next;
3461 }
3462
3463 return list;
3464}
3465
e4654d2d 3466int bdrv_get_dirty(BlockDriverState *bs, BdrvDirtyBitmap *bitmap, int64_t sector)
7cd1e32a 3467{
e4654d2d
FZ
3468 if (bitmap) {
3469 return hbitmap_get(bitmap->bitmap, sector);
7cd1e32a
LS
3470 } else {
3471 return 0;
3472 }
3473}
3474
341ebc2f
JS
3475/**
3476 * Chooses a default granularity based on the existing cluster size,
3477 * but clamped between [4K, 64K]. Defaults to 64K in the case that there
3478 * is no cluster size information available.
3479 */
3480uint32_t bdrv_get_default_bitmap_granularity(BlockDriverState *bs)
3481{
3482 BlockDriverInfo bdi;
3483 uint32_t granularity;
3484
3485 if (bdrv_get_info(bs, &bdi) >= 0 && bdi.cluster_size > 0) {
3486 granularity = MAX(4096, bdi.cluster_size);
3487 granularity = MIN(65536, granularity);
3488 } else {
3489 granularity = 65536;
3490 }
3491
3492 return granularity;
3493}
3494
592fdd02
JS
3495uint32_t bdrv_dirty_bitmap_granularity(BdrvDirtyBitmap *bitmap)
3496{
3497 return BDRV_SECTOR_SIZE << hbitmap_granularity(bitmap->bitmap);
3498}
3499
20dca810 3500void bdrv_dirty_iter_init(BdrvDirtyBitmap *bitmap, HBitmapIter *hbi)
1755da16 3501{
e4654d2d 3502 hbitmap_iter_init(hbi, bitmap->bitmap, 0);
1755da16
PB
3503}
3504
20dca810 3505void bdrv_set_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3506 int64_t cur_sector, int nr_sectors)
3507{
b8e6fb75 3508 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3509 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3510}
3511
20dca810 3512void bdrv_reset_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3513 int64_t cur_sector, int nr_sectors)
3514{
b8e6fb75 3515 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3516 hbitmap_reset(bitmap->bitmap, cur_sector, nr_sectors);
3517}
3518
e74e6b78
JS
3519void bdrv_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3520{
3521 assert(bdrv_dirty_bitmap_enabled(bitmap));
c6a8c328 3522 hbitmap_reset_all(bitmap->bitmap);
e74e6b78
JS
3523}
3524
e0c47b6c
SH
3525void bdrv_set_dirty(BlockDriverState *bs, int64_t cur_sector,
3526 int nr_sectors)
1755da16 3527{
e4654d2d
FZ
3528 BdrvDirtyBitmap *bitmap;
3529 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
b8e6fb75
JS
3530 if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3531 continue;
3532 }
e4654d2d
FZ
3533 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3534 }
1755da16
PB
3535}
3536
d58d8453
JS
3537/**
3538 * Advance an HBitmapIter to an arbitrary offset.
3539 */
3540void bdrv_set_dirty_iter(HBitmapIter *hbi, int64_t offset)
3541{
3542 assert(hbi->hb);
3543 hbitmap_iter_init(hbi, hbi->hb, offset);
3544}
3545
20dca810 3546int64_t bdrv_get_dirty_count(BdrvDirtyBitmap *bitmap)
aaa0eb75 3547{
e4654d2d 3548 return hbitmap_count(bitmap->bitmap);
aaa0eb75 3549}
f88e1a42 3550
9fcb0251
FZ
3551/* Get a reference to bs */
3552void bdrv_ref(BlockDriverState *bs)
3553{
3554 bs->refcnt++;
3555}
3556
3557/* Release a previously grabbed reference to bs.
3558 * If after releasing, reference count is zero, the BlockDriverState is
3559 * deleted. */
3560void bdrv_unref(BlockDriverState *bs)
3561{
9a4d5ca6
JC
3562 if (!bs) {
3563 return;
3564 }
9fcb0251
FZ
3565 assert(bs->refcnt > 0);
3566 if (--bs->refcnt == 0) {
3567 bdrv_delete(bs);
3568 }
3569}
3570
fbe40ff7
FZ
3571struct BdrvOpBlocker {
3572 Error *reason;
3573 QLIST_ENTRY(BdrvOpBlocker) list;
3574};
3575
3576bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
3577{
3578 BdrvOpBlocker *blocker;
3579 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3580 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
3581 blocker = QLIST_FIRST(&bs->op_blockers[op]);
3582 if (errp) {
81e5f78a
AG
3583 error_setg(errp, "Node '%s' is busy: %s",
3584 bdrv_get_device_or_node_name(bs),
bfb197e0 3585 error_get_pretty(blocker->reason));
fbe40ff7
FZ
3586 }
3587 return true;
3588 }
3589 return false;
3590}
3591
3592void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
3593{
3594 BdrvOpBlocker *blocker;
3595 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3596
5839e53b 3597 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
3598 blocker->reason = reason;
3599 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
3600}
3601
3602void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
3603{
3604 BdrvOpBlocker *blocker, *next;
3605 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3606 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
3607 if (blocker->reason == reason) {
3608 QLIST_REMOVE(blocker, list);
3609 g_free(blocker);
3610 }
3611 }
3612}
3613
3614void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
3615{
3616 int i;
3617 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3618 bdrv_op_block(bs, i, reason);
3619 }
3620}
3621
3622void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
3623{
3624 int i;
3625 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3626 bdrv_op_unblock(bs, i, reason);
3627 }
3628}
3629
3630bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
3631{
3632 int i;
3633
3634 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3635 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
3636 return false;
3637 }
3638 }
3639 return true;
3640}
3641
28a7282a
LC
3642void bdrv_iostatus_enable(BlockDriverState *bs)
3643{
d6bf279e 3644 bs->iostatus_enabled = true;
58e21ef5 3645 bs->iostatus = BLOCK_DEVICE_IO_STATUS_OK;
28a7282a
LC
3646}
3647
3648/* The I/O status is only enabled if the drive explicitly
3649 * enables it _and_ the VM is configured to stop on errors */
3650bool bdrv_iostatus_is_enabled(const BlockDriverState *bs)
3651{
d6bf279e 3652 return (bs->iostatus_enabled &&
92aa5c6d
PB
3653 (bs->on_write_error == BLOCKDEV_ON_ERROR_ENOSPC ||
3654 bs->on_write_error == BLOCKDEV_ON_ERROR_STOP ||
3655 bs->on_read_error == BLOCKDEV_ON_ERROR_STOP));
28a7282a
LC
3656}
3657
3658void bdrv_iostatus_disable(BlockDriverState *bs)
3659{
d6bf279e 3660 bs->iostatus_enabled = false;
28a7282a
LC
3661}
3662
3663void bdrv_iostatus_reset(BlockDriverState *bs)
3664{
3665 if (bdrv_iostatus_is_enabled(bs)) {
58e21ef5 3666 bs->iostatus = BLOCK_DEVICE_IO_STATUS_OK;
3bd293c3
PB
3667 if (bs->job) {
3668 block_job_iostatus_reset(bs->job);
3669 }
28a7282a
LC
3670 }
3671}
3672
28a7282a
LC
3673void bdrv_iostatus_set_err(BlockDriverState *bs, int error)
3674{
3e1caa5f
PB
3675 assert(bdrv_iostatus_is_enabled(bs));
3676 if (bs->iostatus == BLOCK_DEVICE_IO_STATUS_OK) {
58e21ef5
LC
3677 bs->iostatus = error == ENOSPC ? BLOCK_DEVICE_IO_STATUS_NOSPACE :
3678 BLOCK_DEVICE_IO_STATUS_FAILED;
28a7282a
LC
3679 }
3680}
3681
d92ada22
LC
3682void bdrv_img_create(const char *filename, const char *fmt,
3683 const char *base_filename, const char *base_fmt,
f382d43a
MR
3684 char *options, uint64_t img_size, int flags,
3685 Error **errp, bool quiet)
f88e1a42 3686{
83d0521a
CL
3687 QemuOptsList *create_opts = NULL;
3688 QemuOpts *opts = NULL;
3689 const char *backing_fmt, *backing_file;
3690 int64_t size;
f88e1a42 3691 BlockDriver *drv, *proto_drv;
cc84d90f 3692 Error *local_err = NULL;
f88e1a42
JS
3693 int ret = 0;
3694
3695 /* Find driver and parse its options */
3696 drv = bdrv_find_format(fmt);
3697 if (!drv) {
71c79813 3698 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 3699 return;
f88e1a42
JS
3700 }
3701
b65a5e12 3702 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 3703 if (!proto_drv) {
d92ada22 3704 return;
f88e1a42
JS
3705 }
3706
c6149724
HR
3707 if (!drv->create_opts) {
3708 error_setg(errp, "Format driver '%s' does not support image creation",
3709 drv->format_name);
3710 return;
3711 }
3712
3713 if (!proto_drv->create_opts) {
3714 error_setg(errp, "Protocol driver '%s' does not support image creation",
3715 proto_drv->format_name);
3716 return;
3717 }
3718
c282e1fd
CL
3719 create_opts = qemu_opts_append(create_opts, drv->create_opts);
3720 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
3721
3722 /* Create parameter list with default values */
83d0521a 3723 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 3724 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
3725
3726 /* Parse -o options */
3727 if (options) {
dc523cd3
MA
3728 qemu_opts_do_parse(opts, options, NULL, &local_err);
3729 if (local_err) {
3730 error_report_err(local_err);
3731 local_err = NULL;
83d0521a 3732 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
3733 goto out;
3734 }
3735 }
3736
3737 if (base_filename) {
f43e47db 3738 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 3739 if (local_err) {
71c79813
LC
3740 error_setg(errp, "Backing file not supported for file format '%s'",
3741 fmt);
f88e1a42
JS
3742 goto out;
3743 }
3744 }
3745
3746 if (base_fmt) {
f43e47db 3747 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 3748 if (local_err) {
71c79813
LC
3749 error_setg(errp, "Backing file format not supported for file "
3750 "format '%s'", fmt);
f88e1a42
JS
3751 goto out;
3752 }
3753 }
3754
83d0521a
CL
3755 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
3756 if (backing_file) {
3757 if (!strcmp(filename, backing_file)) {
71c79813
LC
3758 error_setg(errp, "Error: Trying to create an image with the "
3759 "same filename as the backing file");
792da93a
JS
3760 goto out;
3761 }
3762 }
3763
83d0521a 3764 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42
JS
3765
3766 // The size for the image must always be specified, with one exception:
3767 // If we are using a backing file, we can obtain the size from there
83d0521a
CL
3768 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
3769 if (size == -1) {
3770 if (backing_file) {
66f6b814 3771 BlockDriverState *bs;
29168018 3772 char *full_backing = g_new0(char, PATH_MAX);
52bf1e72 3773 int64_t size;
63090dac 3774 int back_flags;
e6641719 3775 QDict *backing_options = NULL;
63090dac 3776
29168018
HR
3777 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
3778 full_backing, PATH_MAX,
3779 &local_err);
3780 if (local_err) {
3781 g_free(full_backing);
3782 goto out;
3783 }
3784
63090dac
PB
3785 /* backing files always opened read-only */
3786 back_flags =
3787 flags & ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 3788
e6641719
HR
3789 if (backing_fmt) {
3790 backing_options = qdict_new();
3791 qdict_put(backing_options, "driver",
3792 qstring_from_str(backing_fmt));
3793 }
3794
f67503e5 3795 bs = NULL;
e6641719 3796 ret = bdrv_open(&bs, full_backing, NULL, backing_options,
6ebf9aa2 3797 back_flags, &local_err);
29168018 3798 g_free(full_backing);
f88e1a42 3799 if (ret < 0) {
f88e1a42
JS
3800 goto out;
3801 }
52bf1e72
MA
3802 size = bdrv_getlength(bs);
3803 if (size < 0) {
3804 error_setg_errno(errp, -size, "Could not get size of '%s'",
3805 backing_file);
3806 bdrv_unref(bs);
3807 goto out;
3808 }
f88e1a42 3809
39101f25 3810 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
66f6b814
HR
3811
3812 bdrv_unref(bs);
f88e1a42 3813 } else {
71c79813 3814 error_setg(errp, "Image creation needs a size parameter");
f88e1a42
JS
3815 goto out;
3816 }
3817 }
3818
f382d43a 3819 if (!quiet) {
fe646693 3820 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 3821 qemu_opts_print(opts, " ");
f382d43a
MR
3822 puts("");
3823 }
83d0521a 3824
c282e1fd 3825 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 3826
cc84d90f
HR
3827 if (ret == -EFBIG) {
3828 /* This is generally a better message than whatever the driver would
3829 * deliver (especially because of the cluster_size_hint), since that
3830 * is most probably not much different from "image too large". */
3831 const char *cluster_size_hint = "";
83d0521a 3832 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 3833 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 3834 }
cc84d90f
HR
3835 error_setg(errp, "The image size is too large for file format '%s'"
3836 "%s", fmt, cluster_size_hint);
3837 error_free(local_err);
3838 local_err = NULL;
f88e1a42
JS
3839 }
3840
3841out:
83d0521a
CL
3842 qemu_opts_del(opts);
3843 qemu_opts_free(create_opts);
84d18f06 3844 if (local_err) {
cc84d90f
HR
3845 error_propagate(errp, local_err);
3846 }
f88e1a42 3847}
85d126f3
SH
3848
3849AioContext *bdrv_get_aio_context(BlockDriverState *bs)
3850{
dcd04228
SH
3851 return bs->aio_context;
3852}
3853
3854void bdrv_detach_aio_context(BlockDriverState *bs)
3855{
33384421
HR
3856 BdrvAioNotifier *baf;
3857
dcd04228
SH
3858 if (!bs->drv) {
3859 return;
3860 }
3861
33384421
HR
3862 QLIST_FOREACH(baf, &bs->aio_notifiers, list) {
3863 baf->detach_aio_context(baf->opaque);
3864 }
3865
13af91eb 3866 if (bs->io_limits_enabled) {
0e5b0a2d 3867 throttle_timers_detach_aio_context(&bs->throttle_timers);
13af91eb 3868 }
dcd04228
SH
3869 if (bs->drv->bdrv_detach_aio_context) {
3870 bs->drv->bdrv_detach_aio_context(bs);
3871 }
3872 if (bs->file) {
9a4f4c31 3873 bdrv_detach_aio_context(bs->file->bs);
dcd04228 3874 }
760e0063
KW
3875 if (bs->backing) {
3876 bdrv_detach_aio_context(bs->backing->bs);
dcd04228
SH
3877 }
3878
3879 bs->aio_context = NULL;
3880}
3881
3882void bdrv_attach_aio_context(BlockDriverState *bs,
3883 AioContext *new_context)
3884{
33384421
HR
3885 BdrvAioNotifier *ban;
3886
dcd04228
SH
3887 if (!bs->drv) {
3888 return;
3889 }
3890
3891 bs->aio_context = new_context;
3892
760e0063
KW
3893 if (bs->backing) {
3894 bdrv_attach_aio_context(bs->backing->bs, new_context);
dcd04228
SH
3895 }
3896 if (bs->file) {
9a4f4c31 3897 bdrv_attach_aio_context(bs->file->bs, new_context);
dcd04228
SH
3898 }
3899 if (bs->drv->bdrv_attach_aio_context) {
3900 bs->drv->bdrv_attach_aio_context(bs, new_context);
3901 }
13af91eb 3902 if (bs->io_limits_enabled) {
0e5b0a2d 3903 throttle_timers_attach_aio_context(&bs->throttle_timers, new_context);
13af91eb 3904 }
33384421
HR
3905
3906 QLIST_FOREACH(ban, &bs->aio_notifiers, list) {
3907 ban->attached_aio_context(new_context, ban->opaque);
3908 }
dcd04228
SH
3909}
3910
3911void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
3912{
53ec73e2 3913 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228
SH
3914
3915 bdrv_detach_aio_context(bs);
3916
3917 /* This function executes in the old AioContext so acquire the new one in
3918 * case it runs in a different thread.
3919 */
3920 aio_context_acquire(new_context);
3921 bdrv_attach_aio_context(bs, new_context);
3922 aio_context_release(new_context);
85d126f3 3923}
d616b224 3924
33384421
HR
3925void bdrv_add_aio_context_notifier(BlockDriverState *bs,
3926 void (*attached_aio_context)(AioContext *new_context, void *opaque),
3927 void (*detach_aio_context)(void *opaque), void *opaque)
3928{
3929 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
3930 *ban = (BdrvAioNotifier){
3931 .attached_aio_context = attached_aio_context,
3932 .detach_aio_context = detach_aio_context,
3933 .opaque = opaque
3934 };
3935
3936 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
3937}
3938
3939void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
3940 void (*attached_aio_context)(AioContext *,
3941 void *),
3942 void (*detach_aio_context)(void *),
3943 void *opaque)
3944{
3945 BdrvAioNotifier *ban, *ban_next;
3946
3947 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
3948 if (ban->attached_aio_context == attached_aio_context &&
3949 ban->detach_aio_context == detach_aio_context &&
3950 ban->opaque == opaque)
3951 {
3952 QLIST_REMOVE(ban, list);
3953 g_free(ban);
3954
3955 return;
3956 }
3957 }
3958
3959 abort();
3960}
3961
77485434
HR
3962int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
3963 BlockDriverAmendStatusCB *status_cb)
6f176b48 3964{
c282e1fd 3965 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
3966 return -ENOTSUP;
3967 }
77485434 3968 return bs->drv->bdrv_amend_options(bs, opts, status_cb);
6f176b48 3969}
f6186f49 3970
b5042a36
BC
3971/* This function will be called by the bdrv_recurse_is_first_non_filter method
3972 * of block filter and by bdrv_is_first_non_filter.
3973 * It is used to test if the given bs is the candidate or recurse more in the
3974 * node graph.
212a5a8f 3975 */
b5042a36 3976bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 3977 BlockDriverState *candidate)
f6186f49 3978{
b5042a36
BC
3979 /* return false if basic checks fails */
3980 if (!bs || !bs->drv) {
212a5a8f 3981 return false;
f6186f49
BC
3982 }
3983
b5042a36
BC
3984 /* the code reached a non block filter driver -> check if the bs is
3985 * the same as the candidate. It's the recursion termination condition.
3986 */
3987 if (!bs->drv->is_filter) {
3988 return bs == candidate;
212a5a8f 3989 }
b5042a36 3990 /* Down this path the driver is a block filter driver */
212a5a8f 3991
b5042a36
BC
3992 /* If the block filter recursion method is defined use it to recurse down
3993 * the node graph.
3994 */
3995 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 3996 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
3997 }
3998
b5042a36
BC
3999 /* the driver is a block filter but don't allow to recurse -> return false
4000 */
4001 return false;
f6186f49
BC
4002}
4003
212a5a8f
BC
4004/* This function checks if the candidate is the first non filter bs down it's
4005 * bs chain. Since we don't have pointers to parents it explore all bs chains
4006 * from the top. Some filters can choose not to pass down the recursion.
4007 */
4008bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 4009{
212a5a8f
BC
4010 BlockDriverState *bs;
4011
4012 /* walk down the bs forest recursively */
4013 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
4014 bool perm;
4015
b5042a36 4016 /* try to recurse in this top level bs */
e6dc8a1f 4017 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
4018
4019 /* candidate is the first non filter */
4020 if (perm) {
4021 return true;
4022 }
4023 }
4024
4025 return false;
f6186f49 4026}
09158f00 4027
e12f3784
WC
4028BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
4029 const char *node_name, Error **errp)
09158f00
BC
4030{
4031 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
4032 AioContext *aio_context;
4033
09158f00
BC
4034 if (!to_replace_bs) {
4035 error_setg(errp, "Node name '%s' not found", node_name);
4036 return NULL;
4037 }
4038
5a7e7a0b
SH
4039 aio_context = bdrv_get_aio_context(to_replace_bs);
4040 aio_context_acquire(aio_context);
4041
09158f00 4042 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
4043 to_replace_bs = NULL;
4044 goto out;
09158f00
BC
4045 }
4046
4047 /* We don't want arbitrary node of the BDS chain to be replaced only the top
4048 * most non filter in order to prevent data corruption.
4049 * Another benefit is that this tests exclude backing files which are
4050 * blocked by the backing blockers.
4051 */
e12f3784 4052 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 4053 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
4054 to_replace_bs = NULL;
4055 goto out;
09158f00
BC
4056 }
4057
5a7e7a0b
SH
4058out:
4059 aio_context_release(aio_context);
09158f00
BC
4060 return to_replace_bs;
4061}
448ad91d 4062
91af7014
HR
4063static bool append_open_options(QDict *d, BlockDriverState *bs)
4064{
4065 const QDictEntry *entry;
4066 bool found_any = false;
4067
4068 for (entry = qdict_first(bs->options); entry;
4069 entry = qdict_next(bs->options, entry))
4070 {
4071 /* Only take options for this level and exclude all non-driver-specific
4072 * options */
4073 if (!strchr(qdict_entry_key(entry), '.') &&
4074 strcmp(qdict_entry_key(entry), "node-name"))
4075 {
4076 qobject_incref(qdict_entry_value(entry));
4077 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
4078 found_any = true;
4079 }
4080 }
4081
4082 return found_any;
4083}
4084
4085/* Updates the following BDS fields:
4086 * - exact_filename: A filename which may be used for opening a block device
4087 * which (mostly) equals the given BDS (even without any
4088 * other options; so reading and writing must return the same
4089 * results, but caching etc. may be different)
4090 * - full_open_options: Options which, when given when opening a block device
4091 * (without a filename), result in a BDS (mostly)
4092 * equalling the given one
4093 * - filename: If exact_filename is set, it is copied here. Otherwise,
4094 * full_open_options is converted to a JSON object, prefixed with
4095 * "json:" (for use through the JSON pseudo protocol) and put here.
4096 */
4097void bdrv_refresh_filename(BlockDriverState *bs)
4098{
4099 BlockDriver *drv = bs->drv;
4100 QDict *opts;
4101
4102 if (!drv) {
4103 return;
4104 }
4105
4106 /* This BDS's file name will most probably depend on its file's name, so
4107 * refresh that first */
4108 if (bs->file) {
9a4f4c31 4109 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
4110 }
4111
4112 if (drv->bdrv_refresh_filename) {
4113 /* Obsolete information is of no use here, so drop the old file name
4114 * information before refreshing it */
4115 bs->exact_filename[0] = '\0';
4116 if (bs->full_open_options) {
4117 QDECREF(bs->full_open_options);
4118 bs->full_open_options = NULL;
4119 }
4120
4121 drv->bdrv_refresh_filename(bs);
4122 } else if (bs->file) {
4123 /* Try to reconstruct valid information from the underlying file */
4124 bool has_open_options;
4125
4126 bs->exact_filename[0] = '\0';
4127 if (bs->full_open_options) {
4128 QDECREF(bs->full_open_options);
4129 bs->full_open_options = NULL;
4130 }
4131
4132 opts = qdict_new();
4133 has_open_options = append_open_options(opts, bs);
4134
4135 /* If no specific options have been given for this BDS, the filename of
4136 * the underlying file should suffice for this one as well */
9a4f4c31
KW
4137 if (bs->file->bs->exact_filename[0] && !has_open_options) {
4138 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
4139 }
4140 /* Reconstructing the full options QDict is simple for most format block
4141 * drivers, as long as the full options are known for the underlying
4142 * file BDS. The full options QDict of that file BDS should somehow
4143 * contain a representation of the filename, therefore the following
4144 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 4145 if (bs->file->bs->full_open_options) {
91af7014
HR
4146 qdict_put_obj(opts, "driver",
4147 QOBJECT(qstring_from_str(drv->format_name)));
9a4f4c31
KW
4148 QINCREF(bs->file->bs->full_open_options);
4149 qdict_put_obj(opts, "file",
4150 QOBJECT(bs->file->bs->full_open_options));
91af7014
HR
4151
4152 bs->full_open_options = opts;
4153 } else {
4154 QDECREF(opts);
4155 }
4156 } else if (!bs->full_open_options && qdict_size(bs->options)) {
4157 /* There is no underlying file BDS (at least referenced by BDS.file),
4158 * so the full options QDict should be equal to the options given
4159 * specifically for this block device when it was opened (plus the
4160 * driver specification).
4161 * Because those options don't change, there is no need to update
4162 * full_open_options when it's already set. */
4163
4164 opts = qdict_new();
4165 append_open_options(opts, bs);
4166 qdict_put_obj(opts, "driver",
4167 QOBJECT(qstring_from_str(drv->format_name)));
4168
4169 if (bs->exact_filename[0]) {
4170 /* This may not work for all block protocol drivers (some may
4171 * require this filename to be parsed), but we have to find some
4172 * default solution here, so just include it. If some block driver
4173 * does not support pure options without any filename at all or
4174 * needs some special format of the options QDict, it needs to
4175 * implement the driver-specific bdrv_refresh_filename() function.
4176 */
4177 qdict_put_obj(opts, "filename",
4178 QOBJECT(qstring_from_str(bs->exact_filename)));
4179 }
4180
4181 bs->full_open_options = opts;
4182 }
4183
4184 if (bs->exact_filename[0]) {
4185 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4186 } else if (bs->full_open_options) {
4187 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4188 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4189 qstring_get_str(json));
4190 QDECREF(json);
4191 }
4192}
5366d0c8
BC
4193
4194/* This accessor function purpose is to allow the device models to access the
4195 * BlockAcctStats structure embedded inside a BlockDriverState without being
4196 * aware of the BlockDriverState structure layout.
4197 * It will go away when the BlockAcctStats structure will be moved inside
4198 * the device models.
4199 */
4200BlockAcctStats *bdrv_get_stats(BlockDriverState *bs)
4201{
4202 return &bs->stats;
4203}