]> git.proxmox.com Git - mirror_qemu.git/blame - block.c
block: Convert bs->file to BdrvChild
[mirror_qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
3990d09a 24#include "config-host.h"
faf07963 25#include "qemu-common.h"
6d519a5f 26#include "trace.h"
737e150e
PB
27#include "block/block_int.h"
28#include "block/blockjob.h"
d49b6836 29#include "qemu/error-report.h"
1de7afc9 30#include "qemu/module.h"
cc7a8ea7 31#include "qapi/qmp/qerror.h"
7b1b5d19 32#include "qapi/qmp/qjson.h"
bfb197e0 33#include "sysemu/block-backend.h"
9c17d615 34#include "sysemu/sysemu.h"
1de7afc9 35#include "qemu/notify.h"
737e150e 36#include "block/coroutine.h"
c13163fb 37#include "block/qapi.h"
b2023818 38#include "qmp-commands.h"
1de7afc9 39#include "qemu/timer.h"
a5ee7bd4 40#include "qapi-event.h"
db628338 41#include "block/throttle-groups.h"
fc01f7e7 42
71e72a19 43#ifdef CONFIG_BSD
7674e7bf
FB
44#include <sys/types.h>
45#include <sys/stat.h>
46#include <sys/ioctl.h>
72cf2d4f 47#include <sys/queue.h>
c5e97233 48#ifndef __DragonFly__
7674e7bf
FB
49#include <sys/disk.h>
50#endif
c5e97233 51#endif
7674e7bf 52
49dc768d
AL
53#ifdef _WIN32
54#include <windows.h>
55#endif
56
9bd2b08f
JS
57/**
58 * A BdrvDirtyBitmap can be in three possible states:
59 * (1) successor is NULL and disabled is false: full r/w mode
60 * (2) successor is NULL and disabled is true: read only mode ("disabled")
61 * (3) successor is set: frozen mode.
62 * A frozen bitmap cannot be renamed, deleted, anonymized, cleared, set,
63 * or enabled. A frozen bitmap can only abdicate() or reclaim().
64 */
e4654d2d 65struct BdrvDirtyBitmap {
aa0c7ca5
JS
66 HBitmap *bitmap; /* Dirty sector bitmap implementation */
67 BdrvDirtyBitmap *successor; /* Anonymous child; implies frozen status */
68 char *name; /* Optional non-empty unique ID */
69 int64_t size; /* Size of the bitmap (Number of sectors) */
70 bool disabled; /* Bitmap is read-only */
e4654d2d
FZ
71 QLIST_ENTRY(BdrvDirtyBitmap) list;
72};
73
1c9805a3
SH
74#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
75
1b7bdbc1
SH
76static QTAILQ_HEAD(, BlockDriverState) bdrv_states =
77 QTAILQ_HEAD_INITIALIZER(bdrv_states);
7ee930d0 78
dc364f4c
BC
79static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
80 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
81
8a22f02a
SH
82static QLIST_HEAD(, BlockDriver) bdrv_drivers =
83 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 84
f3930ed0
KW
85static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
86 const char *reference, QDict *options, int flags,
87 BlockDriverState *parent,
ce343771 88 const BdrvChildRole *child_role, Error **errp);
f3930ed0 89
ce1ffea8 90static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs);
eb852011
MA
91/* If non-zero, use only whitelisted block drivers */
92static int use_bdrv_whitelist;
93
9e0b22f4
SH
94#ifdef _WIN32
95static int is_windows_drive_prefix(const char *filename)
96{
97 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
98 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
99 filename[1] == ':');
100}
101
102int is_windows_drive(const char *filename)
103{
104 if (is_windows_drive_prefix(filename) &&
105 filename[2] == '\0')
106 return 1;
107 if (strstart(filename, "\\\\.\\", NULL) ||
108 strstart(filename, "//./", NULL))
109 return 1;
110 return 0;
111}
112#endif
113
339064d5
KW
114size_t bdrv_opt_mem_align(BlockDriverState *bs)
115{
116 if (!bs || !bs->drv) {
459b4e66
DL
117 /* page size or 4k (hdd sector size) should be on the safe side */
118 return MAX(4096, getpagesize());
339064d5
KW
119 }
120
121 return bs->bl.opt_mem_alignment;
122}
123
4196d2f0
DL
124size_t bdrv_min_mem_align(BlockDriverState *bs)
125{
126 if (!bs || !bs->drv) {
459b4e66
DL
127 /* page size or 4k (hdd sector size) should be on the safe side */
128 return MAX(4096, getpagesize());
4196d2f0
DL
129 }
130
131 return bs->bl.min_mem_alignment;
132}
133
9e0b22f4 134/* check if the path starts with "<protocol>:" */
5c98415b 135int path_has_protocol(const char *path)
9e0b22f4 136{
947995c0
PB
137 const char *p;
138
9e0b22f4
SH
139#ifdef _WIN32
140 if (is_windows_drive(path) ||
141 is_windows_drive_prefix(path)) {
142 return 0;
143 }
947995c0
PB
144 p = path + strcspn(path, ":/\\");
145#else
146 p = path + strcspn(path, ":/");
9e0b22f4
SH
147#endif
148
947995c0 149 return *p == ':';
9e0b22f4
SH
150}
151
83f64091 152int path_is_absolute(const char *path)
3b0d4f61 153{
21664424
FB
154#ifdef _WIN32
155 /* specific case for names like: "\\.\d:" */
f53f4da9 156 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 157 return 1;
f53f4da9
PB
158 }
159 return (*path == '/' || *path == '\\');
3b9f94e1 160#else
f53f4da9 161 return (*path == '/');
3b9f94e1 162#endif
3b0d4f61
FB
163}
164
83f64091
FB
165/* if filename is absolute, just copy it to dest. Otherwise, build a
166 path to it by considering it is relative to base_path. URL are
167 supported. */
168void path_combine(char *dest, int dest_size,
169 const char *base_path,
170 const char *filename)
3b0d4f61 171{
83f64091
FB
172 const char *p, *p1;
173 int len;
174
175 if (dest_size <= 0)
176 return;
177 if (path_is_absolute(filename)) {
178 pstrcpy(dest, dest_size, filename);
179 } else {
180 p = strchr(base_path, ':');
181 if (p)
182 p++;
183 else
184 p = base_path;
3b9f94e1
FB
185 p1 = strrchr(base_path, '/');
186#ifdef _WIN32
187 {
188 const char *p2;
189 p2 = strrchr(base_path, '\\');
190 if (!p1 || p2 > p1)
191 p1 = p2;
192 }
193#endif
83f64091
FB
194 if (p1)
195 p1++;
196 else
197 p1 = base_path;
198 if (p1 > p)
199 p = p1;
200 len = p - base_path;
201 if (len > dest_size - 1)
202 len = dest_size - 1;
203 memcpy(dest, base_path, len);
204 dest[len] = '\0';
205 pstrcat(dest, dest_size, filename);
3b0d4f61 206 }
3b0d4f61
FB
207}
208
0a82855a
HR
209void bdrv_get_full_backing_filename_from_filename(const char *backed,
210 const char *backing,
9f07429e
HR
211 char *dest, size_t sz,
212 Error **errp)
dc5a1371 213{
9f07429e
HR
214 if (backing[0] == '\0' || path_has_protocol(backing) ||
215 path_is_absolute(backing))
216 {
0a82855a 217 pstrcpy(dest, sz, backing);
9f07429e
HR
218 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
219 error_setg(errp, "Cannot use relative backing file names for '%s'",
220 backed);
dc5a1371 221 } else {
0a82855a 222 path_combine(dest, sz, backed, backing);
dc5a1371
PB
223 }
224}
225
9f07429e
HR
226void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
227 Error **errp)
0a82855a 228{
9f07429e
HR
229 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
230
231 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
232 dest, sz, errp);
0a82855a
HR
233}
234
0eb7217e
SH
235void bdrv_register(BlockDriver *bdrv)
236{
237 bdrv_setup_io_funcs(bdrv);
b2e12bc6 238
8a22f02a 239 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 240}
b338082b 241
7f06d47e 242BlockDriverState *bdrv_new_root(void)
b338082b 243{
7f06d47e 244 BlockDriverState *bs = bdrv_new();
e4e9986b 245
e4e9986b 246 QTAILQ_INSERT_TAIL(&bdrv_states, bs, device_list);
e4e9986b
MA
247 return bs;
248}
249
250BlockDriverState *bdrv_new(void)
251{
252 BlockDriverState *bs;
253 int i;
254
5839e53b 255 bs = g_new0(BlockDriverState, 1);
e4654d2d 256 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
257 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
258 QLIST_INIT(&bs->op_blockers[i]);
259 }
28a7282a 260 bdrv_iostatus_disable(bs);
d7d512f6 261 notifier_list_init(&bs->close_notifiers);
d616b224 262 notifier_with_return_list_init(&bs->before_write_notifiers);
cc0681c4
BC
263 qemu_co_queue_init(&bs->throttled_reqs[0]);
264 qemu_co_queue_init(&bs->throttled_reqs[1]);
9fcb0251 265 bs->refcnt = 1;
dcd04228 266 bs->aio_context = qemu_get_aio_context();
d7d512f6 267
b338082b
FB
268 return bs;
269}
270
d7d512f6
PB
271void bdrv_add_close_notifier(BlockDriverState *bs, Notifier *notify)
272{
273 notifier_list_add(&bs->close_notifiers, notify);
274}
275
ea2384d3
FB
276BlockDriver *bdrv_find_format(const char *format_name)
277{
278 BlockDriver *drv1;
8a22f02a
SH
279 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
280 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 281 return drv1;
8a22f02a 282 }
ea2384d3
FB
283 }
284 return NULL;
285}
286
b64ec4e4 287static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 288{
b64ec4e4
FZ
289 static const char *whitelist_rw[] = {
290 CONFIG_BDRV_RW_WHITELIST
291 };
292 static const char *whitelist_ro[] = {
293 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
294 };
295 const char **p;
296
b64ec4e4 297 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 298 return 1; /* no whitelist, anything goes */
b64ec4e4 299 }
eb852011 300
b64ec4e4 301 for (p = whitelist_rw; *p; p++) {
eb852011
MA
302 if (!strcmp(drv->format_name, *p)) {
303 return 1;
304 }
305 }
b64ec4e4
FZ
306 if (read_only) {
307 for (p = whitelist_ro; *p; p++) {
308 if (!strcmp(drv->format_name, *p)) {
309 return 1;
310 }
311 }
312 }
eb852011
MA
313 return 0;
314}
315
5b7e1542
ZYW
316typedef struct CreateCo {
317 BlockDriver *drv;
318 char *filename;
83d0521a 319 QemuOpts *opts;
5b7e1542 320 int ret;
cc84d90f 321 Error *err;
5b7e1542
ZYW
322} CreateCo;
323
324static void coroutine_fn bdrv_create_co_entry(void *opaque)
325{
cc84d90f
HR
326 Error *local_err = NULL;
327 int ret;
328
5b7e1542
ZYW
329 CreateCo *cco = opaque;
330 assert(cco->drv);
331
c282e1fd 332 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
84d18f06 333 if (local_err) {
cc84d90f
HR
334 error_propagate(&cco->err, local_err);
335 }
336 cco->ret = ret;
5b7e1542
ZYW
337}
338
0e7e1989 339int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 340 QemuOpts *opts, Error **errp)
ea2384d3 341{
5b7e1542
ZYW
342 int ret;
343
344 Coroutine *co;
345 CreateCo cco = {
346 .drv = drv,
347 .filename = g_strdup(filename),
83d0521a 348 .opts = opts,
5b7e1542 349 .ret = NOT_DONE,
cc84d90f 350 .err = NULL,
5b7e1542
ZYW
351 };
352
c282e1fd 353 if (!drv->bdrv_create) {
cc84d90f 354 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
355 ret = -ENOTSUP;
356 goto out;
5b7e1542
ZYW
357 }
358
359 if (qemu_in_coroutine()) {
360 /* Fast-path if already in coroutine context */
361 bdrv_create_co_entry(&cco);
362 } else {
363 co = qemu_coroutine_create(bdrv_create_co_entry);
364 qemu_coroutine_enter(co, &cco);
365 while (cco.ret == NOT_DONE) {
b47ec2c4 366 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
367 }
368 }
369
370 ret = cco.ret;
cc84d90f 371 if (ret < 0) {
84d18f06 372 if (cco.err) {
cc84d90f
HR
373 error_propagate(errp, cco.err);
374 } else {
375 error_setg_errno(errp, -ret, "Could not create image");
376 }
377 }
0e7e1989 378
80168bff
LC
379out:
380 g_free(cco.filename);
5b7e1542 381 return ret;
ea2384d3
FB
382}
383
c282e1fd 384int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
385{
386 BlockDriver *drv;
cc84d90f
HR
387 Error *local_err = NULL;
388 int ret;
84a12e66 389
b65a5e12 390 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 391 if (drv == NULL) {
16905d71 392 return -ENOENT;
84a12e66
CH
393 }
394
c282e1fd 395 ret = bdrv_create(drv, filename, opts, &local_err);
84d18f06 396 if (local_err) {
cc84d90f
HR
397 error_propagate(errp, local_err);
398 }
399 return ret;
84a12e66
CH
400}
401
892b7de8
ET
402/**
403 * Try to get @bs's logical and physical block size.
404 * On success, store them in @bsz struct and return 0.
405 * On failure return -errno.
406 * @bs must not be empty.
407 */
408int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
409{
410 BlockDriver *drv = bs->drv;
411
412 if (drv && drv->bdrv_probe_blocksizes) {
413 return drv->bdrv_probe_blocksizes(bs, bsz);
414 }
415
416 return -ENOTSUP;
417}
418
419/**
420 * Try to get @bs's geometry (cyls, heads, sectors).
421 * On success, store them in @geo struct and return 0.
422 * On failure return -errno.
423 * @bs must not be empty.
424 */
425int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
426{
427 BlockDriver *drv = bs->drv;
428
429 if (drv && drv->bdrv_probe_geometry) {
430 return drv->bdrv_probe_geometry(bs, geo);
431 }
432
433 return -ENOTSUP;
434}
435
eba25057
JM
436/*
437 * Create a uniquely-named empty temporary file.
438 * Return 0 upon success, otherwise a negative errno value.
439 */
440int get_tmp_filename(char *filename, int size)
d5249393 441{
eba25057 442#ifdef _WIN32
3b9f94e1 443 char temp_dir[MAX_PATH];
eba25057
JM
444 /* GetTempFileName requires that its output buffer (4th param)
445 have length MAX_PATH or greater. */
446 assert(size >= MAX_PATH);
447 return (GetTempPath(MAX_PATH, temp_dir)
448 && GetTempFileName(temp_dir, "qem", 0, filename)
449 ? 0 : -GetLastError());
d5249393 450#else
67b915a5 451 int fd;
7ccfb2eb 452 const char *tmpdir;
0badc1ee 453 tmpdir = getenv("TMPDIR");
69bef793
AS
454 if (!tmpdir) {
455 tmpdir = "/var/tmp";
456 }
eba25057
JM
457 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
458 return -EOVERFLOW;
459 }
ea2384d3 460 fd = mkstemp(filename);
fe235a06
DH
461 if (fd < 0) {
462 return -errno;
463 }
464 if (close(fd) != 0) {
465 unlink(filename);
eba25057
JM
466 return -errno;
467 }
468 return 0;
d5249393 469#endif
eba25057 470}
fc01f7e7 471
84a12e66
CH
472/*
473 * Detect host devices. By convention, /dev/cdrom[N] is always
474 * recognized as a host CDROM.
475 */
476static BlockDriver *find_hdev_driver(const char *filename)
477{
478 int score_max = 0, score;
479 BlockDriver *drv = NULL, *d;
480
481 QLIST_FOREACH(d, &bdrv_drivers, list) {
482 if (d->bdrv_probe_device) {
483 score = d->bdrv_probe_device(filename);
484 if (score > score_max) {
485 score_max = score;
486 drv = d;
487 }
488 }
489 }
490
491 return drv;
492}
493
98289620 494BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
495 bool allow_protocol_prefix,
496 Error **errp)
83f64091
FB
497{
498 BlockDriver *drv1;
499 char protocol[128];
1cec71e3 500 int len;
83f64091 501 const char *p;
19cb3738 502
66f82cee
KW
503 /* TODO Drivers without bdrv_file_open must be specified explicitly */
504
39508e7a
CH
505 /*
506 * XXX(hch): we really should not let host device detection
507 * override an explicit protocol specification, but moving this
508 * later breaks access to device names with colons in them.
509 * Thanks to the brain-dead persistent naming schemes on udev-
510 * based Linux systems those actually are quite common.
511 */
512 drv1 = find_hdev_driver(filename);
513 if (drv1) {
514 return drv1;
515 }
516
98289620 517 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 518 return &bdrv_file;
84a12e66 519 }
98289620 520
9e0b22f4
SH
521 p = strchr(filename, ':');
522 assert(p != NULL);
1cec71e3
AL
523 len = p - filename;
524 if (len > sizeof(protocol) - 1)
525 len = sizeof(protocol) - 1;
526 memcpy(protocol, filename, len);
527 protocol[len] = '\0';
8a22f02a 528 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
5fafdf24 529 if (drv1->protocol_name &&
8a22f02a 530 !strcmp(drv1->protocol_name, protocol)) {
83f64091 531 return drv1;
8a22f02a 532 }
83f64091 533 }
b65a5e12
HR
534
535 error_setg(errp, "Unknown protocol '%s'", protocol);
83f64091
FB
536 return NULL;
537}
538
c6684249
MA
539/*
540 * Guess image format by probing its contents.
541 * This is not a good idea when your image is raw (CVE-2008-2004), but
542 * we do it anyway for backward compatibility.
543 *
544 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
545 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
546 * but can be smaller if the image file is smaller)
c6684249
MA
547 * @filename is its filename.
548 *
549 * For all block drivers, call the bdrv_probe() method to get its
550 * probing score.
551 * Return the first block driver with the highest probing score.
552 */
38f3ef57
KW
553BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
554 const char *filename)
c6684249
MA
555{
556 int score_max = 0, score;
557 BlockDriver *drv = NULL, *d;
558
559 QLIST_FOREACH(d, &bdrv_drivers, list) {
560 if (d->bdrv_probe) {
561 score = d->bdrv_probe(buf, buf_size, filename);
562 if (score > score_max) {
563 score_max = score;
564 drv = d;
565 }
566 }
567 }
568
569 return drv;
570}
571
f500a6d3 572static int find_image_format(BlockDriverState *bs, const char *filename,
34b5d2c6 573 BlockDriver **pdrv, Error **errp)
f3a5d3f8 574{
c6684249 575 BlockDriver *drv;
7cddd372 576 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 577 int ret = 0;
f8ea0b00 578
08a00559 579 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
b192af8a 580 if (bdrv_is_sg(bs) || !bdrv_is_inserted(bs) || bdrv_getlength(bs) == 0) {
ef810437 581 *pdrv = &bdrv_raw;
c98ac35d 582 return ret;
1a396859 583 }
f8ea0b00 584
83f64091 585 ret = bdrv_pread(bs, 0, buf, sizeof(buf));
83f64091 586 if (ret < 0) {
34b5d2c6
HR
587 error_setg_errno(errp, -ret, "Could not read image for determining its "
588 "format");
c98ac35d
SW
589 *pdrv = NULL;
590 return ret;
83f64091
FB
591 }
592
c6684249 593 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 594 if (!drv) {
34b5d2c6
HR
595 error_setg(errp, "Could not determine image format: No compatible "
596 "driver found");
c98ac35d
SW
597 ret = -ENOENT;
598 }
599 *pdrv = drv;
600 return ret;
ea2384d3
FB
601}
602
51762288
SH
603/**
604 * Set the current 'total_sectors' value
65a9bb25 605 * Return 0 on success, -errno on error.
51762288
SH
606 */
607static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
608{
609 BlockDriver *drv = bs->drv;
610
396759ad 611 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 612 if (bdrv_is_sg(bs))
396759ad
NB
613 return 0;
614
51762288
SH
615 /* query actual device if possible, otherwise just trust the hint */
616 if (drv->bdrv_getlength) {
617 int64_t length = drv->bdrv_getlength(bs);
618 if (length < 0) {
619 return length;
620 }
7e382003 621 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
622 }
623
624 bs->total_sectors = hint;
625 return 0;
626}
627
9e8f1835
PB
628/**
629 * Set open flags for a given discard mode
630 *
631 * Return 0 on success, -1 if the discard mode was invalid.
632 */
633int bdrv_parse_discard_flags(const char *mode, int *flags)
634{
635 *flags &= ~BDRV_O_UNMAP;
636
637 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
638 /* do nothing */
639 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
640 *flags |= BDRV_O_UNMAP;
641 } else {
642 return -1;
643 }
644
645 return 0;
646}
647
c3993cdc
SH
648/**
649 * Set open flags for a given cache mode
650 *
651 * Return 0 on success, -1 if the cache mode was invalid.
652 */
653int bdrv_parse_cache_flags(const char *mode, int *flags)
654{
655 *flags &= ~BDRV_O_CACHE_MASK;
656
657 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
658 *flags |= BDRV_O_NOCACHE | BDRV_O_CACHE_WB;
92196b2f
SH
659 } else if (!strcmp(mode, "directsync")) {
660 *flags |= BDRV_O_NOCACHE;
c3993cdc
SH
661 } else if (!strcmp(mode, "writeback")) {
662 *flags |= BDRV_O_CACHE_WB;
663 } else if (!strcmp(mode, "unsafe")) {
664 *flags |= BDRV_O_CACHE_WB;
665 *flags |= BDRV_O_NO_FLUSH;
666 } else if (!strcmp(mode, "writethrough")) {
667 /* this is the default */
668 } else {
669 return -1;
670 }
671
672 return 0;
673}
674
b1e6fc08
KW
675/*
676 * Returns the flags that a temporary snapshot should get, based on the
677 * originally requested flags (the originally requested image will have flags
678 * like a backing file)
679 */
680static int bdrv_temp_snapshot_flags(int flags)
681{
682 return (flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
683}
684
0b50cc88 685/*
f3930ed0
KW
686 * Returns the flags that bs->file should get if a protocol driver is expected,
687 * based on the given flags for the parent BDS
0b50cc88
KW
688 */
689static int bdrv_inherited_flags(int flags)
690{
691 /* Enable protocol handling, disable format probing for bs->file */
692 flags |= BDRV_O_PROTOCOL;
693
694 /* Our block drivers take care to send flushes and respect unmap policy,
695 * so we can enable both unconditionally on lower layers. */
696 flags |= BDRV_O_CACHE_WB | BDRV_O_UNMAP;
697
0b50cc88 698 /* Clear flags that only apply to the top layer */
5669b44d 699 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ);
0b50cc88
KW
700
701 return flags;
702}
703
f3930ed0
KW
704const BdrvChildRole child_file = {
705 .inherit_flags = bdrv_inherited_flags,
706};
707
708/*
709 * Returns the flags that bs->file should get if the use of formats (and not
710 * only protocols) is permitted for it, based on the given flags for the parent
711 * BDS
712 */
713static int bdrv_inherited_fmt_flags(int parent_flags)
714{
715 int flags = child_file.inherit_flags(parent_flags);
716 return flags & ~BDRV_O_PROTOCOL;
717}
718
719const BdrvChildRole child_format = {
720 .inherit_flags = bdrv_inherited_fmt_flags,
721};
722
317fc44e
KW
723/*
724 * Returns the flags that bs->backing_hd should get, based on the given flags
725 * for the parent BDS
726 */
727static int bdrv_backing_flags(int flags)
728{
729 /* backing files always opened read-only */
730 flags &= ~(BDRV_O_RDWR | BDRV_O_COPY_ON_READ);
731
732 /* snapshot=on is handled on the top layer */
8bfea15d 733 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e
KW
734
735 return flags;
736}
737
f3930ed0
KW
738static const BdrvChildRole child_backing = {
739 .inherit_flags = bdrv_backing_flags,
740};
741
7b272452
KW
742static int bdrv_open_flags(BlockDriverState *bs, int flags)
743{
744 int open_flags = flags | BDRV_O_CACHE_WB;
745
746 /*
747 * Clear flags that are internal to the block layer before opening the
748 * image.
749 */
20cca275 750 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
751
752 /*
753 * Snapshots should be writable.
754 */
8bfea15d 755 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
756 open_flags |= BDRV_O_RDWR;
757 }
758
759 return open_flags;
760}
761
636ea370
KW
762static void bdrv_assign_node_name(BlockDriverState *bs,
763 const char *node_name,
764 Error **errp)
6913c0c2
BC
765{
766 if (!node_name) {
636ea370 767 return;
6913c0c2
BC
768 }
769
9aebf3b8 770 /* Check for empty string or invalid characters */
f5bebbbb 771 if (!id_wellformed(node_name)) {
9aebf3b8 772 error_setg(errp, "Invalid node name");
636ea370 773 return;
6913c0c2
BC
774 }
775
0c5e94ee 776 /* takes care of avoiding namespaces collisions */
7f06d47e 777 if (blk_by_name(node_name)) {
0c5e94ee
BC
778 error_setg(errp, "node-name=%s is conflicting with a device id",
779 node_name);
636ea370 780 return;
0c5e94ee
BC
781 }
782
6913c0c2
BC
783 /* takes care of avoiding duplicates node names */
784 if (bdrv_find_node(node_name)) {
785 error_setg(errp, "Duplicate node name");
636ea370 786 return;
6913c0c2
BC
787 }
788
789 /* copy node name into the bs and insert it into the graph list */
790 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
791 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
6913c0c2
BC
792}
793
18edf289
KW
794static QemuOptsList bdrv_runtime_opts = {
795 .name = "bdrv_common",
796 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
797 .desc = {
798 {
799 .name = "node-name",
800 .type = QEMU_OPT_STRING,
801 .help = "Node name of the block device node",
802 },
803 { /* end of list */ }
804 },
805};
806
57915332
KW
807/*
808 * Common part for opening disk images and files
b6ad491a
KW
809 *
810 * Removes all processed options from *options.
57915332 811 */
9a4f4c31 812static int bdrv_open_common(BlockDriverState *bs, BdrvChild *file,
34b5d2c6 813 QDict *options, int flags, BlockDriver *drv, Error **errp)
57915332
KW
814{
815 int ret, open_flags;
035fccdf 816 const char *filename;
6913c0c2 817 const char *node_name = NULL;
18edf289 818 QemuOpts *opts;
34b5d2c6 819 Error *local_err = NULL;
57915332
KW
820
821 assert(drv != NULL);
6405875c 822 assert(bs->file == NULL);
707ff828 823 assert(options != NULL && bs->options != options);
57915332 824
45673671 825 if (file != NULL) {
9a4f4c31 826 filename = file->bs->filename;
45673671
KW
827 } else {
828 filename = qdict_get_try_str(options, "filename");
829 }
830
765003db
KW
831 if (drv->bdrv_needs_filename && !filename) {
832 error_setg(errp, "The '%s' block driver requires a file name",
833 drv->format_name);
834 return -EINVAL;
835 }
836
45673671 837 trace_bdrv_open_common(bs, filename ?: "", flags, drv->format_name);
28dcee10 838
18edf289
KW
839 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
840 qemu_opts_absorb_qdict(opts, options, &local_err);
0fb6395c 841 if (local_err) {
636ea370 842 error_propagate(errp, local_err);
18edf289
KW
843 ret = -EINVAL;
844 goto fail_opts;
6913c0c2 845 }
6913c0c2 846
18edf289 847 node_name = qemu_opt_get(opts, "node-name");
636ea370 848 bdrv_assign_node_name(bs, node_name, &local_err);
0fb6395c 849 if (local_err) {
636ea370 850 error_propagate(errp, local_err);
18edf289
KW
851 ret = -EINVAL;
852 goto fail_opts;
5d186eb0
KW
853 }
854
1b7fd729 855 bs->guest_block_size = 512;
c25f53b0 856 bs->request_alignment = 512;
0d51b4de 857 bs->zero_beyond_eof = true;
b64ec4e4
FZ
858 open_flags = bdrv_open_flags(bs, flags);
859 bs->read_only = !(open_flags & BDRV_O_RDWR);
860
861 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
862 error_setg(errp,
863 !bs->read_only && bdrv_is_whitelisted(drv, true)
864 ? "Driver '%s' can only be used for read-only devices"
865 : "Driver '%s' is not whitelisted",
866 drv->format_name);
18edf289
KW
867 ret = -ENOTSUP;
868 goto fail_opts;
b64ec4e4 869 }
57915332 870
53fec9d3 871 assert(bs->copy_on_read == 0); /* bdrv_new() and bdrv_close() make it so */
0ebd24e0
KW
872 if (flags & BDRV_O_COPY_ON_READ) {
873 if (!bs->read_only) {
874 bdrv_enable_copy_on_read(bs);
875 } else {
876 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
877 ret = -EINVAL;
878 goto fail_opts;
0ebd24e0 879 }
53fec9d3
SH
880 }
881
c2ad1b0c
KW
882 if (filename != NULL) {
883 pstrcpy(bs->filename, sizeof(bs->filename), filename);
884 } else {
885 bs->filename[0] = '\0';
886 }
91af7014 887 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 888
57915332 889 bs->drv = drv;
7267c094 890 bs->opaque = g_malloc0(drv->instance_size);
57915332 891
03f541bd 892 bs->enable_write_cache = !!(flags & BDRV_O_CACHE_WB);
e7c63796 893
66f82cee
KW
894 /* Open the image, either directly or using a protocol */
895 if (drv->bdrv_file_open) {
5d186eb0 896 assert(file == NULL);
030be321 897 assert(!drv->bdrv_needs_filename || filename != NULL);
34b5d2c6 898 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
f500a6d3 899 } else {
2af5ef70 900 if (file == NULL) {
34b5d2c6
HR
901 error_setg(errp, "Can't use '%s' as a block driver for the "
902 "protocol level", drv->format_name);
2af5ef70
KW
903 ret = -EINVAL;
904 goto free_and_fail;
905 }
f500a6d3 906 bs->file = file;
34b5d2c6 907 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
66f82cee
KW
908 }
909
57915332 910 if (ret < 0) {
84d18f06 911 if (local_err) {
34b5d2c6 912 error_propagate(errp, local_err);
2fa9aa59
DH
913 } else if (bs->filename[0]) {
914 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
34b5d2c6
HR
915 } else {
916 error_setg_errno(errp, -ret, "Could not open image");
917 }
57915332
KW
918 goto free_and_fail;
919 }
920
a1f688f4
MA
921 if (bs->encrypted) {
922 error_report("Encrypted images are deprecated");
923 error_printf("Support for them will be removed in a future release.\n"
924 "You can use 'qemu-img convert' to convert your image"
925 " to an unencrypted one.\n");
926 }
927
51762288
SH
928 ret = refresh_total_sectors(bs, bs->total_sectors);
929 if (ret < 0) {
34b5d2c6 930 error_setg_errno(errp, -ret, "Could not refresh total sector count");
51762288 931 goto free_and_fail;
57915332 932 }
51762288 933
3baca891
KW
934 bdrv_refresh_limits(bs, &local_err);
935 if (local_err) {
936 error_propagate(errp, local_err);
937 ret = -EINVAL;
938 goto free_and_fail;
939 }
940
c25f53b0 941 assert(bdrv_opt_mem_align(bs) != 0);
4196d2f0 942 assert(bdrv_min_mem_align(bs) != 0);
b192af8a 943 assert((bs->request_alignment != 0) || bdrv_is_sg(bs));
18edf289
KW
944
945 qemu_opts_del(opts);
57915332
KW
946 return 0;
947
948free_and_fail:
f500a6d3 949 bs->file = NULL;
7267c094 950 g_free(bs->opaque);
57915332
KW
951 bs->opaque = NULL;
952 bs->drv = NULL;
18edf289
KW
953fail_opts:
954 qemu_opts_del(opts);
57915332
KW
955 return ret;
956}
957
5e5c4f63
KW
958static QDict *parse_json_filename(const char *filename, Error **errp)
959{
960 QObject *options_obj;
961 QDict *options;
962 int ret;
963
964 ret = strstart(filename, "json:", &filename);
965 assert(ret);
966
967 options_obj = qobject_from_json(filename);
968 if (!options_obj) {
969 error_setg(errp, "Could not parse the JSON options");
970 return NULL;
971 }
972
973 if (qobject_type(options_obj) != QTYPE_QDICT) {
974 qobject_decref(options_obj);
975 error_setg(errp, "Invalid JSON object given");
976 return NULL;
977 }
978
979 options = qobject_to_qdict(options_obj);
980 qdict_flatten(options);
981
982 return options;
983}
984
b6ce07aa 985/*
f54120ff
KW
986 * Fills in default options for opening images and converts the legacy
987 * filename/flags pair to option QDict entries.
53a29513
HR
988 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
989 * block driver has been specified explicitly.
b6ce07aa 990 */
53a29513 991static int bdrv_fill_options(QDict **options, const char **pfilename,
053e1578 992 int *flags, Error **errp)
ea2384d3 993{
5e5c4f63 994 const char *filename = *pfilename;
c2ad1b0c 995 const char *drvname;
53a29513 996 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 997 bool parse_filename = false;
053e1578 998 BlockDriver *drv = NULL;
34b5d2c6 999 Error *local_err = NULL;
83f64091 1000
5e5c4f63
KW
1001 /* Parse json: pseudo-protocol */
1002 if (filename && g_str_has_prefix(filename, "json:")) {
1003 QDict *json_options = parse_json_filename(filename, &local_err);
1004 if (local_err) {
1005 error_propagate(errp, local_err);
1006 return -EINVAL;
1007 }
1008
1009 /* Options given in the filename have lower priority than options
1010 * specified directly */
1011 qdict_join(*options, json_options, false);
1012 QDECREF(json_options);
1013 *pfilename = filename = NULL;
1014 }
1015
53a29513 1016 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1017 if (drvname) {
1018 drv = bdrv_find_format(drvname);
1019 if (!drv) {
1020 error_setg(errp, "Unknown driver '%s'", drvname);
1021 return -ENOENT;
1022 }
1023 /* If the user has explicitly specified the driver, this choice should
1024 * override the BDRV_O_PROTOCOL flag */
1025 protocol = drv->bdrv_file_open;
53a29513
HR
1026 }
1027
1028 if (protocol) {
1029 *flags |= BDRV_O_PROTOCOL;
1030 } else {
1031 *flags &= ~BDRV_O_PROTOCOL;
1032 }
1033
035fccdf 1034 /* Fetch the file name from the options QDict if necessary */
17b005f1 1035 if (protocol && filename) {
f54120ff
KW
1036 if (!qdict_haskey(*options, "filename")) {
1037 qdict_put(*options, "filename", qstring_from_str(filename));
1038 parse_filename = true;
1039 } else {
1040 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1041 "the same time");
1042 return -EINVAL;
1043 }
035fccdf
KW
1044 }
1045
c2ad1b0c 1046 /* Find the right block driver */
f54120ff 1047 filename = qdict_get_try_str(*options, "filename");
f54120ff 1048
053e1578
HR
1049 if (!drvname && protocol) {
1050 if (filename) {
1051 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1052 if (!drv) {
053e1578 1053 return -EINVAL;
17b005f1 1054 }
053e1578
HR
1055
1056 drvname = drv->format_name;
1057 qdict_put(*options, "driver", qstring_from_str(drvname));
1058 } else {
1059 error_setg(errp, "Must specify either driver or file");
1060 return -EINVAL;
98289620 1061 }
c2ad1b0c
KW
1062 }
1063
17b005f1 1064 assert(drv || !protocol);
c2ad1b0c 1065
f54120ff 1066 /* Driver-specific filename parsing */
17b005f1 1067 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1068 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1069 if (local_err) {
34b5d2c6 1070 error_propagate(errp, local_err);
f54120ff 1071 return -EINVAL;
6963a30d 1072 }
cd5d031e
HR
1073
1074 if (!drv->bdrv_needs_filename) {
1075 qdict_del(*options, "filename");
cd5d031e 1076 }
6963a30d
KW
1077 }
1078
f54120ff
KW
1079 return 0;
1080}
1081
b4b059f6
KW
1082static BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
1083 BlockDriverState *child_bs,
1084 const BdrvChildRole *child_role)
df581792
KW
1085{
1086 BdrvChild *child = g_new(BdrvChild, 1);
1087 *child = (BdrvChild) {
1088 .bs = child_bs,
1089 .role = child_role,
1090 };
1091
1092 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
b4b059f6
KW
1093
1094 return child;
df581792
KW
1095}
1096
33a60407
KW
1097static void bdrv_detach_child(BdrvChild *child)
1098{
1099 QLIST_REMOVE(child, next);
1100 g_free(child);
1101}
1102
1103void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
1104{
1105 BlockDriverState *child_bs = child->bs;
1106
1107 if (child->bs->inherits_from == parent) {
1108 child->bs->inherits_from = NULL;
1109 }
1110
1111 bdrv_detach_child(child);
1112 bdrv_unref(child_bs);
1113}
1114
8d24cce1
FZ
1115void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd)
1116{
1117
826b6ca0
FZ
1118 if (bs->backing_hd) {
1119 assert(bs->backing_blocker);
1120 bdrv_op_unblock_all(bs->backing_hd, bs->backing_blocker);
80a1e130 1121 bdrv_detach_child(bs->backing_child);
826b6ca0
FZ
1122 } else if (backing_hd) {
1123 error_setg(&bs->backing_blocker,
81e5f78a
AG
1124 "node is used as backing hd of '%s'",
1125 bdrv_get_device_or_node_name(bs));
826b6ca0
FZ
1126 }
1127
8d24cce1
FZ
1128 bs->backing_hd = backing_hd;
1129 if (!backing_hd) {
826b6ca0
FZ
1130 error_free(bs->backing_blocker);
1131 bs->backing_blocker = NULL;
80a1e130 1132 bs->backing_child = NULL;
8d24cce1
FZ
1133 goto out;
1134 }
80a1e130 1135 bs->backing_child = bdrv_attach_child(bs, backing_hd, &child_backing);
8d24cce1
FZ
1136 bs->open_flags &= ~BDRV_O_NO_BACKING;
1137 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_hd->filename);
1138 pstrcpy(bs->backing_format, sizeof(bs->backing_format),
1139 backing_hd->drv ? backing_hd->drv->format_name : "");
826b6ca0
FZ
1140
1141 bdrv_op_block_all(bs->backing_hd, bs->backing_blocker);
1142 /* Otherwise we won't be able to commit due to check in bdrv_commit */
bb00021d 1143 bdrv_op_unblock(bs->backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
826b6ca0 1144 bs->backing_blocker);
8d24cce1 1145out:
3baca891 1146 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
1147}
1148
31ca6d07
KW
1149/*
1150 * Opens the backing file for a BlockDriverState if not yet open
1151 *
1152 * options is a QDict of options to pass to the block drivers, or NULL for an
1153 * empty set of options. The reference to the QDict is transferred to this
1154 * function (even on failure), so if the caller intends to reuse the dictionary,
1155 * it needs to use QINCREF() before calling bdrv_file_open.
1156 */
34b5d2c6 1157int bdrv_open_backing_file(BlockDriverState *bs, QDict *options, Error **errp)
9156df12 1158{
1ba4b6a5 1159 char *backing_filename = g_malloc0(PATH_MAX);
317fc44e 1160 int ret = 0;
8d24cce1 1161 BlockDriverState *backing_hd;
34b5d2c6 1162 Error *local_err = NULL;
9156df12
PB
1163
1164 if (bs->backing_hd != NULL) {
31ca6d07 1165 QDECREF(options);
1ba4b6a5 1166 goto free_exit;
9156df12
PB
1167 }
1168
31ca6d07
KW
1169 /* NULL means an empty set of options */
1170 if (options == NULL) {
1171 options = qdict_new();
1172 }
1173
9156df12 1174 bs->open_flags &= ~BDRV_O_NO_BACKING;
1cb6f506
KW
1175 if (qdict_haskey(options, "file.filename")) {
1176 backing_filename[0] = '\0';
1177 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 1178 QDECREF(options);
1ba4b6a5 1179 goto free_exit;
dbecebdd 1180 } else {
9f07429e
HR
1181 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
1182 &local_err);
1183 if (local_err) {
1184 ret = -EINVAL;
1185 error_propagate(errp, local_err);
1186 QDECREF(options);
1187 goto free_exit;
1188 }
9156df12
PB
1189 }
1190
8ee79e70
KW
1191 if (!bs->drv || !bs->drv->supports_backing) {
1192 ret = -EINVAL;
1193 error_setg(errp, "Driver doesn't support backing files");
1194 QDECREF(options);
1195 goto free_exit;
1196 }
1197
e4e9986b 1198 backing_hd = bdrv_new();
8d24cce1 1199
c5f6e493
KW
1200 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
1201 qdict_put(options, "driver", qstring_from_str(bs->backing_format));
9156df12
PB
1202 }
1203
f67503e5 1204 assert(bs->backing_hd == NULL);
f3930ed0
KW
1205 ret = bdrv_open_inherit(&backing_hd,
1206 *backing_filename ? backing_filename : NULL,
ce343771 1207 NULL, options, 0, bs, &child_backing, &local_err);
9156df12 1208 if (ret < 0) {
8d24cce1
FZ
1209 bdrv_unref(backing_hd);
1210 backing_hd = NULL;
9156df12 1211 bs->open_flags |= BDRV_O_NO_BACKING;
b04b6b6e
FZ
1212 error_setg(errp, "Could not open backing file: %s",
1213 error_get_pretty(local_err));
1214 error_free(local_err);
1ba4b6a5 1215 goto free_exit;
9156df12 1216 }
df581792 1217
8d24cce1 1218 bdrv_set_backing_hd(bs, backing_hd);
d80ac658 1219
1ba4b6a5
BC
1220free_exit:
1221 g_free(backing_filename);
1222 return ret;
9156df12
PB
1223}
1224
da557aac
HR
1225/*
1226 * Opens a disk image whose options are given as BlockdevRef in another block
1227 * device's options.
1228 *
da557aac 1229 * If allow_none is true, no image will be opened if filename is false and no
b4b059f6 1230 * BlockdevRef is given. NULL will be returned, but errp remains unset.
da557aac
HR
1231 *
1232 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
1233 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1234 * itself, all options starting with "${bdref_key}." are considered part of the
1235 * BlockdevRef.
1236 *
1237 * The BlockdevRef will be removed from the options QDict.
1238 */
b4b059f6
KW
1239BdrvChild *bdrv_open_child(const char *filename,
1240 QDict *options, const char *bdref_key,
1241 BlockDriverState* parent,
1242 const BdrvChildRole *child_role,
1243 bool allow_none, Error **errp)
da557aac 1244{
b4b059f6
KW
1245 BdrvChild *c = NULL;
1246 BlockDriverState *bs;
da557aac
HR
1247 QDict *image_options;
1248 int ret;
1249 char *bdref_key_dot;
1250 const char *reference;
1251
df581792 1252 assert(child_role != NULL);
f67503e5 1253
da557aac
HR
1254 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1255 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
1256 g_free(bdref_key_dot);
1257
1258 reference = qdict_get_try_str(options, bdref_key);
1259 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 1260 if (!allow_none) {
da557aac
HR
1261 error_setg(errp, "A block device must be specified for \"%s\"",
1262 bdref_key);
da557aac 1263 }
b20e61e0 1264 QDECREF(image_options);
da557aac
HR
1265 goto done;
1266 }
1267
b4b059f6
KW
1268 bs = NULL;
1269 ret = bdrv_open_inherit(&bs, filename, reference, image_options, 0,
ce343771 1270 parent, child_role, errp);
df581792
KW
1271 if (ret < 0) {
1272 goto done;
1273 }
1274
b4b059f6 1275 c = bdrv_attach_child(parent, bs, child_role);
da557aac
HR
1276
1277done:
1278 qdict_del(options, bdref_key);
b4b059f6
KW
1279 return c;
1280}
1281
1282/*
1283 * This is a version of bdrv_open_child() that returns 0/-EINVAL instead of
1284 * a BdrvChild object.
1285 *
1286 * If allow_none is true, no image will be opened if filename is false and no
1287 * BlockdevRef is given. *pbs will remain unchanged and 0 will be returned.
1288 *
1289 * To conform with the behavior of bdrv_open(), *pbs has to be NULL.
1290 */
1291int bdrv_open_image(BlockDriverState **pbs, const char *filename,
1292 QDict *options, const char *bdref_key,
1293 BlockDriverState* parent, const BdrvChildRole *child_role,
1294 bool allow_none, Error **errp)
1295{
1296 Error *local_err = NULL;
1297 BdrvChild *c;
1298
1299 assert(pbs);
1300 assert(*pbs == NULL);
1301
1302 c = bdrv_open_child(filename, options, bdref_key, parent, child_role,
1303 allow_none, &local_err);
1304 if (local_err) {
1305 error_propagate(errp, local_err);
1306 return -EINVAL;
1307 }
1308
1309 if (c != NULL) {
1310 *pbs = c->bs;
1311 }
1312
1313 return 0;
da557aac
HR
1314}
1315
6b8aeca5 1316int bdrv_append_temp_snapshot(BlockDriverState *bs, int flags, Error **errp)
b998875d
KW
1317{
1318 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 1319 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 1320 int64_t total_size;
83d0521a 1321 QemuOpts *opts = NULL;
b998875d
KW
1322 QDict *snapshot_options;
1323 BlockDriverState *bs_snapshot;
c2e0dbbf 1324 Error *local_err = NULL;
b998875d
KW
1325 int ret;
1326
1327 /* if snapshot, we create a temporary backing file and open it
1328 instead of opening 'filename' directly */
1329
1330 /* Get the required size from the image */
f187743a
KW
1331 total_size = bdrv_getlength(bs);
1332 if (total_size < 0) {
6b8aeca5 1333 ret = total_size;
f187743a 1334 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 1335 goto out;
f187743a 1336 }
b998875d
KW
1337
1338 /* Create the temporary image */
1ba4b6a5 1339 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
1340 if (ret < 0) {
1341 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 1342 goto out;
b998875d
KW
1343 }
1344
ef810437 1345 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 1346 &error_abort);
39101f25 1347 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
ef810437 1348 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, &local_err);
83d0521a 1349 qemu_opts_del(opts);
b998875d
KW
1350 if (ret < 0) {
1351 error_setg_errno(errp, -ret, "Could not create temporary overlay "
1352 "'%s': %s", tmp_filename,
1353 error_get_pretty(local_err));
1354 error_free(local_err);
1ba4b6a5 1355 goto out;
b998875d
KW
1356 }
1357
1358 /* Prepare a new options QDict for the temporary file */
1359 snapshot_options = qdict_new();
1360 qdict_put(snapshot_options, "file.driver",
1361 qstring_from_str("file"));
1362 qdict_put(snapshot_options, "file.filename",
1363 qstring_from_str(tmp_filename));
e6641719
HR
1364 qdict_put(snapshot_options, "driver",
1365 qstring_from_str("qcow2"));
b998875d 1366
e4e9986b 1367 bs_snapshot = bdrv_new();
b998875d
KW
1368
1369 ret = bdrv_open(&bs_snapshot, NULL, NULL, snapshot_options,
6ebf9aa2 1370 flags, &local_err);
b998875d
KW
1371 if (ret < 0) {
1372 error_propagate(errp, local_err);
1ba4b6a5 1373 goto out;
b998875d
KW
1374 }
1375
1376 bdrv_append(bs_snapshot, bs);
1ba4b6a5
BC
1377
1378out:
1379 g_free(tmp_filename);
6b8aeca5 1380 return ret;
b998875d
KW
1381}
1382
b6ce07aa
KW
1383/*
1384 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
1385 *
1386 * options is a QDict of options to pass to the block drivers, or NULL for an
1387 * empty set of options. The reference to the QDict belongs to the block layer
1388 * after the call (even on failure), so if the caller intends to reuse the
1389 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
1390 *
1391 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
1392 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
1393 *
1394 * The reference parameter may be used to specify an existing block device which
1395 * should be opened. If specified, neither options nor a filename may be given,
1396 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 1397 */
f3930ed0
KW
1398static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
1399 const char *reference, QDict *options, int flags,
1400 BlockDriverState *parent,
ce343771 1401 const BdrvChildRole *child_role, Error **errp)
ea2384d3 1402{
b6ce07aa 1403 int ret;
9a4f4c31
KW
1404 BdrvChild *file = NULL;
1405 BlockDriverState *bs;
ce343771 1406 BlockDriver *drv = NULL;
74fe54f2 1407 const char *drvname;
34b5d2c6 1408 Error *local_err = NULL;
b1e6fc08 1409 int snapshot_flags = 0;
712e7874 1410
f67503e5 1411 assert(pbs);
f3930ed0
KW
1412 assert(!child_role || !flags);
1413 assert(!child_role == !parent);
f67503e5 1414
ddf5636d
HR
1415 if (reference) {
1416 bool options_non_empty = options ? qdict_size(options) : false;
1417 QDECREF(options);
1418
1419 if (*pbs) {
1420 error_setg(errp, "Cannot reuse an existing BDS when referencing "
1421 "another block device");
1422 return -EINVAL;
1423 }
1424
1425 if (filename || options_non_empty) {
1426 error_setg(errp, "Cannot reference an existing block device with "
1427 "additional options or a new filename");
1428 return -EINVAL;
1429 }
1430
1431 bs = bdrv_lookup_bs(reference, reference, errp);
1432 if (!bs) {
1433 return -ENODEV;
1434 }
1435 bdrv_ref(bs);
1436 *pbs = bs;
1437 return 0;
1438 }
1439
f67503e5
HR
1440 if (*pbs) {
1441 bs = *pbs;
1442 } else {
e4e9986b 1443 bs = bdrv_new();
f67503e5
HR
1444 }
1445
de9c0cec
KW
1446 /* NULL means an empty set of options */
1447 if (options == NULL) {
1448 options = qdict_new();
1449 }
1450
f3930ed0 1451 if (child_role) {
bddcec37 1452 bs->inherits_from = parent;
f3930ed0
KW
1453 flags = child_role->inherit_flags(parent->open_flags);
1454 }
1455
053e1578 1456 ret = bdrv_fill_options(&options, &filename, &flags, &local_err);
462f5bcf
KW
1457 if (local_err) {
1458 goto fail;
1459 }
1460
76c591b0 1461 /* Find the right image format driver */
76c591b0
KW
1462 drvname = qdict_get_try_str(options, "driver");
1463 if (drvname) {
1464 drv = bdrv_find_format(drvname);
1465 qdict_del(options, "driver");
1466 if (!drv) {
1467 error_setg(errp, "Unknown driver: '%s'", drvname);
1468 ret = -EINVAL;
1469 goto fail;
1470 }
1471 }
1472
1473 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 1474
f3930ed0 1475 bs->open_flags = flags;
de9c0cec 1476 bs->options = options;
b6ad491a 1477 options = qdict_clone_shallow(options);
de9c0cec 1478
f500a6d3 1479 /* Open image file without format layer */
f4788adc
KW
1480 if ((flags & BDRV_O_PROTOCOL) == 0) {
1481 if (flags & BDRV_O_RDWR) {
1482 flags |= BDRV_O_ALLOW_RDWR;
1483 }
1484 if (flags & BDRV_O_SNAPSHOT) {
1485 snapshot_flags = bdrv_temp_snapshot_flags(flags);
1486 flags = bdrv_backing_flags(flags);
1487 }
f500a6d3 1488
f3930ed0 1489 bs->open_flags = flags;
1fdd6933 1490
9a4f4c31
KW
1491 file = bdrv_open_child(filename, options, "file", bs,
1492 &child_file, true, &local_err);
1fdd6933
KW
1493 if (local_err) {
1494 ret = -EINVAL;
f4788adc
KW
1495 goto fail;
1496 }
f500a6d3
KW
1497 }
1498
76c591b0 1499 /* Image format probing */
38f3ef57 1500 bs->probed = !drv;
76c591b0 1501 if (!drv && file) {
9a4f4c31 1502 ret = find_image_format(file->bs, filename, &drv, &local_err);
17b005f1 1503 if (ret < 0) {
8bfea15d 1504 goto fail;
2a05cbe4 1505 }
76c591b0 1506 } else if (!drv) {
17b005f1
KW
1507 error_setg(errp, "Must specify either driver or file");
1508 ret = -EINVAL;
8bfea15d 1509 goto fail;
ea2384d3 1510 }
b6ce07aa 1511
53a29513
HR
1512 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
1513 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
1514 /* file must be NULL if a protocol BDS is about to be created
1515 * (the inverse results in an error message from bdrv_open_common()) */
1516 assert(!(flags & BDRV_O_PROTOCOL) || !file);
1517
b6ce07aa 1518 /* Open the image */
34b5d2c6 1519 ret = bdrv_open_common(bs, file, options, flags, drv, &local_err);
b6ce07aa 1520 if (ret < 0) {
8bfea15d 1521 goto fail;
6987307c
CH
1522 }
1523
2a05cbe4 1524 if (file && (bs->file != file)) {
9a4f4c31 1525 bdrv_unref_child(bs, file);
f500a6d3
KW
1526 file = NULL;
1527 }
1528
b6ce07aa 1529 /* If there is a backing file, use it */
9156df12 1530 if ((flags & BDRV_O_NO_BACKING) == 0) {
31ca6d07
KW
1531 QDict *backing_options;
1532
5726d872 1533 qdict_extract_subqdict(options, &backing_options, "backing.");
34b5d2c6 1534 ret = bdrv_open_backing_file(bs, backing_options, &local_err);
b6ce07aa 1535 if (ret < 0) {
b6ad491a 1536 goto close_and_fail;
b6ce07aa 1537 }
b6ce07aa
KW
1538 }
1539
91af7014
HR
1540 bdrv_refresh_filename(bs);
1541
b998875d
KW
1542 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
1543 * temporary snapshot afterwards. */
b1e6fc08 1544 if (snapshot_flags) {
6b8aeca5 1545 ret = bdrv_append_temp_snapshot(bs, snapshot_flags, &local_err);
b998875d 1546 if (local_err) {
b998875d
KW
1547 goto close_and_fail;
1548 }
1549 }
1550
b6ad491a 1551 /* Check if any unknown options were used */
5acd9d81 1552 if (options && (qdict_size(options) != 0)) {
b6ad491a 1553 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
1554 if (flags & BDRV_O_PROTOCOL) {
1555 error_setg(errp, "Block protocol '%s' doesn't support the option "
1556 "'%s'", drv->format_name, entry->key);
1557 } else {
1558 error_setg(errp, "Block format '%s' used by device '%s' doesn't "
1559 "support the option '%s'", drv->format_name,
bfb197e0 1560 bdrv_get_device_name(bs), entry->key);
5acd9d81 1561 }
b6ad491a
KW
1562
1563 ret = -EINVAL;
1564 goto close_and_fail;
1565 }
b6ad491a 1566
b6ce07aa 1567 if (!bdrv_key_required(bs)) {
a7f53e26
MA
1568 if (bs->blk) {
1569 blk_dev_change_media_cb(bs->blk, true);
1570 }
c3adb58f
MA
1571 } else if (!runstate_check(RUN_STATE_PRELAUNCH)
1572 && !runstate_check(RUN_STATE_INMIGRATE)
1573 && !runstate_check(RUN_STATE_PAUSED)) { /* HACK */
1574 error_setg(errp,
1575 "Guest must be stopped for opening of encrypted image");
1576 ret = -EBUSY;
1577 goto close_and_fail;
b6ce07aa
KW
1578 }
1579
c3adb58f 1580 QDECREF(options);
f67503e5 1581 *pbs = bs;
b6ce07aa
KW
1582 return 0;
1583
8bfea15d 1584fail:
f500a6d3 1585 if (file != NULL) {
9a4f4c31 1586 bdrv_unref_child(bs, file);
f500a6d3 1587 }
de9c0cec 1588 QDECREF(bs->options);
b6ad491a 1589 QDECREF(options);
de9c0cec 1590 bs->options = NULL;
f67503e5
HR
1591 if (!*pbs) {
1592 /* If *pbs is NULL, a new BDS has been created in this function and
1593 needs to be freed now. Otherwise, it does not need to be closed,
1594 since it has not really been opened yet. */
1595 bdrv_unref(bs);
1596 }
84d18f06 1597 if (local_err) {
34b5d2c6
HR
1598 error_propagate(errp, local_err);
1599 }
b6ad491a 1600 return ret;
de9c0cec 1601
b6ad491a 1602close_and_fail:
f67503e5
HR
1603 /* See fail path, but now the BDS has to be always closed */
1604 if (*pbs) {
1605 bdrv_close(bs);
1606 } else {
1607 bdrv_unref(bs);
1608 }
b6ad491a 1609 QDECREF(options);
84d18f06 1610 if (local_err) {
34b5d2c6
HR
1611 error_propagate(errp, local_err);
1612 }
b6ce07aa
KW
1613 return ret;
1614}
1615
f3930ed0 1616int bdrv_open(BlockDriverState **pbs, const char *filename,
6ebf9aa2 1617 const char *reference, QDict *options, int flags, Error **errp)
f3930ed0
KW
1618{
1619 return bdrv_open_inherit(pbs, filename, reference, options, flags, NULL,
ce343771 1620 NULL, errp);
f3930ed0
KW
1621}
1622
e971aa12
JC
1623typedef struct BlockReopenQueueEntry {
1624 bool prepared;
1625 BDRVReopenState state;
1626 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
1627} BlockReopenQueueEntry;
1628
1629/*
1630 * Adds a BlockDriverState to a simple queue for an atomic, transactional
1631 * reopen of multiple devices.
1632 *
1633 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
1634 * already performed, or alternatively may be NULL a new BlockReopenQueue will
1635 * be created and initialized. This newly created BlockReopenQueue should be
1636 * passed back in for subsequent calls that are intended to be of the same
1637 * atomic 'set'.
1638 *
1639 * bs is the BlockDriverState to add to the reopen queue.
1640 *
4d2cb092
KW
1641 * options contains the changed options for the associated bs
1642 * (the BlockReopenQueue takes ownership)
1643 *
e971aa12
JC
1644 * flags contains the open flags for the associated bs
1645 *
1646 * returns a pointer to bs_queue, which is either the newly allocated
1647 * bs_queue, or the existing bs_queue being used.
1648 *
1649 */
1650BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
4d2cb092
KW
1651 BlockDriverState *bs,
1652 QDict *options, int flags)
e971aa12
JC
1653{
1654 assert(bs != NULL);
1655
1656 BlockReopenQueueEntry *bs_entry;
67251a31 1657 BdrvChild *child;
4d2cb092 1658 QDict *old_options;
67251a31 1659
e971aa12
JC
1660 if (bs_queue == NULL) {
1661 bs_queue = g_new0(BlockReopenQueue, 1);
1662 QSIMPLEQ_INIT(bs_queue);
1663 }
1664
4d2cb092
KW
1665 if (!options) {
1666 options = qdict_new();
1667 }
1668
1669 old_options = qdict_clone_shallow(bs->options);
1670 qdict_join(options, old_options, false);
1671 QDECREF(old_options);
1672
f1f25a2e
KW
1673 /* bdrv_open() masks this flag out */
1674 flags &= ~BDRV_O_PROTOCOL;
1675
67251a31
KW
1676 QLIST_FOREACH(child, &bs->children, next) {
1677 int child_flags;
1678
1679 if (child->bs->inherits_from != bs) {
1680 continue;
1681 }
1682
1683 child_flags = child->role->inherit_flags(flags);
4d2cb092
KW
1684 /* TODO Pass down child flags (backing.*, extents.*, ...) */
1685 bdrv_reopen_queue(bs_queue, child->bs, NULL, child_flags);
e971aa12
JC
1686 }
1687
1688 bs_entry = g_new0(BlockReopenQueueEntry, 1);
1689 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
1690
1691 bs_entry->state.bs = bs;
4d2cb092 1692 bs_entry->state.options = options;
e971aa12
JC
1693 bs_entry->state.flags = flags;
1694
1695 return bs_queue;
1696}
1697
1698/*
1699 * Reopen multiple BlockDriverStates atomically & transactionally.
1700 *
1701 * The queue passed in (bs_queue) must have been built up previous
1702 * via bdrv_reopen_queue().
1703 *
1704 * Reopens all BDS specified in the queue, with the appropriate
1705 * flags. All devices are prepared for reopen, and failure of any
1706 * device will cause all device changes to be abandonded, and intermediate
1707 * data cleaned up.
1708 *
1709 * If all devices prepare successfully, then the changes are committed
1710 * to all devices.
1711 *
1712 */
1713int bdrv_reopen_multiple(BlockReopenQueue *bs_queue, Error **errp)
1714{
1715 int ret = -1;
1716 BlockReopenQueueEntry *bs_entry, *next;
1717 Error *local_err = NULL;
1718
1719 assert(bs_queue != NULL);
1720
1721 bdrv_drain_all();
1722
1723 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1724 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
1725 error_propagate(errp, local_err);
1726 goto cleanup;
1727 }
1728 bs_entry->prepared = true;
1729 }
1730
1731 /* If we reach this point, we have success and just need to apply the
1732 * changes
1733 */
1734 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1735 bdrv_reopen_commit(&bs_entry->state);
1736 }
1737
1738 ret = 0;
1739
1740cleanup:
1741 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
1742 if (ret && bs_entry->prepared) {
1743 bdrv_reopen_abort(&bs_entry->state);
1744 }
4d2cb092 1745 QDECREF(bs_entry->state.options);
e971aa12
JC
1746 g_free(bs_entry);
1747 }
1748 g_free(bs_queue);
1749 return ret;
1750}
1751
1752
1753/* Reopen a single BlockDriverState with the specified flags. */
1754int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
1755{
1756 int ret = -1;
1757 Error *local_err = NULL;
4d2cb092 1758 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12
JC
1759
1760 ret = bdrv_reopen_multiple(queue, &local_err);
1761 if (local_err != NULL) {
1762 error_propagate(errp, local_err);
1763 }
1764 return ret;
1765}
1766
1767
1768/*
1769 * Prepares a BlockDriverState for reopen. All changes are staged in the
1770 * 'opaque' field of the BDRVReopenState, which is used and allocated by
1771 * the block driver layer .bdrv_reopen_prepare()
1772 *
1773 * bs is the BlockDriverState to reopen
1774 * flags are the new open flags
1775 * queue is the reopen queue
1776 *
1777 * Returns 0 on success, non-zero on error. On error errp will be set
1778 * as well.
1779 *
1780 * On failure, bdrv_reopen_abort() will be called to clean up any data.
1781 * It is the responsibility of the caller to then call the abort() or
1782 * commit() for any other BDS that have been left in a prepare() state
1783 *
1784 */
1785int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
1786 Error **errp)
1787{
1788 int ret = -1;
1789 Error *local_err = NULL;
1790 BlockDriver *drv;
1791
1792 assert(reopen_state != NULL);
1793 assert(reopen_state->bs->drv != NULL);
1794 drv = reopen_state->bs->drv;
1795
1796 /* if we are to stay read-only, do not allow permission change
1797 * to r/w */
1798 if (!(reopen_state->bs->open_flags & BDRV_O_ALLOW_RDWR) &&
1799 reopen_state->flags & BDRV_O_RDWR) {
81e5f78a
AG
1800 error_setg(errp, "Node '%s' is read only",
1801 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
1802 goto error;
1803 }
1804
1805
1806 ret = bdrv_flush(reopen_state->bs);
1807 if (ret) {
1808 error_set(errp, ERROR_CLASS_GENERIC_ERROR, "Error (%s) flushing drive",
1809 strerror(-ret));
1810 goto error;
1811 }
1812
1813 if (drv->bdrv_reopen_prepare) {
1814 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
1815 if (ret) {
1816 if (local_err != NULL) {
1817 error_propagate(errp, local_err);
1818 } else {
d8b6895f
LC
1819 error_setg(errp, "failed while preparing to reopen image '%s'",
1820 reopen_state->bs->filename);
e971aa12
JC
1821 }
1822 goto error;
1823 }
1824 } else {
1825 /* It is currently mandatory to have a bdrv_reopen_prepare()
1826 * handler for each supported drv. */
81e5f78a
AG
1827 error_setg(errp, "Block format '%s' used by node '%s' "
1828 "does not support reopening files", drv->format_name,
1829 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
1830 ret = -1;
1831 goto error;
1832 }
1833
4d2cb092
KW
1834 /* Options that are not handled are only okay if they are unchanged
1835 * compared to the old state. It is expected that some options are only
1836 * used for the initial open, but not reopen (e.g. filename) */
1837 if (qdict_size(reopen_state->options)) {
1838 const QDictEntry *entry = qdict_first(reopen_state->options);
1839
1840 do {
1841 QString *new_obj = qobject_to_qstring(entry->value);
1842 const char *new = qstring_get_str(new_obj);
1843 const char *old = qdict_get_try_str(reopen_state->bs->options,
1844 entry->key);
1845
1846 if (!old || strcmp(new, old)) {
1847 error_setg(errp, "Cannot change the option '%s'", entry->key);
1848 ret = -EINVAL;
1849 goto error;
1850 }
1851 } while ((entry = qdict_next(reopen_state->options, entry)));
1852 }
1853
e971aa12
JC
1854 ret = 0;
1855
1856error:
1857 return ret;
1858}
1859
1860/*
1861 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
1862 * makes them final by swapping the staging BlockDriverState contents into
1863 * the active BlockDriverState contents.
1864 */
1865void bdrv_reopen_commit(BDRVReopenState *reopen_state)
1866{
1867 BlockDriver *drv;
1868
1869 assert(reopen_state != NULL);
1870 drv = reopen_state->bs->drv;
1871 assert(drv != NULL);
1872
1873 /* If there are any driver level actions to take */
1874 if (drv->bdrv_reopen_commit) {
1875 drv->bdrv_reopen_commit(reopen_state);
1876 }
1877
1878 /* set BDS specific flags now */
1879 reopen_state->bs->open_flags = reopen_state->flags;
1880 reopen_state->bs->enable_write_cache = !!(reopen_state->flags &
1881 BDRV_O_CACHE_WB);
1882 reopen_state->bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 1883
3baca891 1884 bdrv_refresh_limits(reopen_state->bs, NULL);
e971aa12
JC
1885}
1886
1887/*
1888 * Abort the reopen, and delete and free the staged changes in
1889 * reopen_state
1890 */
1891void bdrv_reopen_abort(BDRVReopenState *reopen_state)
1892{
1893 BlockDriver *drv;
1894
1895 assert(reopen_state != NULL);
1896 drv = reopen_state->bs->drv;
1897 assert(drv != NULL);
1898
1899 if (drv->bdrv_reopen_abort) {
1900 drv->bdrv_reopen_abort(reopen_state);
1901 }
1902}
1903
1904
fc01f7e7
FB
1905void bdrv_close(BlockDriverState *bs)
1906{
33384421
HR
1907 BdrvAioNotifier *ban, *ban_next;
1908
3cbc002c
PB
1909 if (bs->job) {
1910 block_job_cancel_sync(bs->job);
1911 }
99b7e775
AG
1912
1913 /* Disable I/O limits and drain all pending throttled requests */
1914 if (bs->io_limits_enabled) {
1915 bdrv_io_limits_disable(bs);
1916 }
1917
53ec73e2 1918 bdrv_drain(bs); /* complete I/O */
58fda173 1919 bdrv_flush(bs);
53ec73e2 1920 bdrv_drain(bs); /* in case flush left pending I/O */
d7d512f6 1921 notifier_list_notify(&bs->close_notifiers, bs);
7094f12f 1922
3cbc002c 1923 if (bs->drv) {
6e93e7c4
KW
1924 BdrvChild *child, *next;
1925
9a7dedbc 1926 bs->drv->bdrv_close(bs);
9a4f4c31 1927 bs->drv = NULL;
9a7dedbc
KW
1928
1929 if (bs->backing_hd) {
1930 BlockDriverState *backing_hd = bs->backing_hd;
1931 bdrv_set_backing_hd(bs, NULL);
1932 bdrv_unref(backing_hd);
1933 }
1934
9a4f4c31
KW
1935 if (bs->file != NULL) {
1936 bdrv_unref_child(bs, bs->file);
1937 bs->file = NULL;
1938 }
1939
6e93e7c4 1940 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
1941 /* TODO Remove bdrv_unref() from drivers' close function and use
1942 * bdrv_unref_child() here */
bddcec37
KW
1943 if (child->bs->inherits_from == bs) {
1944 child->bs->inherits_from = NULL;
1945 }
33a60407 1946 bdrv_detach_child(child);
6e93e7c4
KW
1947 }
1948
7267c094 1949 g_free(bs->opaque);
ea2384d3 1950 bs->opaque = NULL;
53fec9d3 1951 bs->copy_on_read = 0;
a275fa42
PB
1952 bs->backing_file[0] = '\0';
1953 bs->backing_format[0] = '\0';
6405875c
PB
1954 bs->total_sectors = 0;
1955 bs->encrypted = 0;
1956 bs->valid_key = 0;
1957 bs->sg = 0;
0d51b4de 1958 bs->zero_beyond_eof = false;
de9c0cec
KW
1959 QDECREF(bs->options);
1960 bs->options = NULL;
91af7014
HR
1961 QDECREF(bs->full_open_options);
1962 bs->full_open_options = NULL;
b338082b 1963 }
98f90dba 1964
a7f53e26
MA
1965 if (bs->blk) {
1966 blk_dev_change_media_cb(bs->blk, false);
1967 }
9ca11154 1968
33384421
HR
1969 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
1970 g_free(ban);
1971 }
1972 QLIST_INIT(&bs->aio_notifiers);
b338082b
FB
1973}
1974
2bc93fed
MK
1975void bdrv_close_all(void)
1976{
1977 BlockDriverState *bs;
1978
dc364f4c 1979 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
1980 AioContext *aio_context = bdrv_get_aio_context(bs);
1981
1982 aio_context_acquire(aio_context);
2bc93fed 1983 bdrv_close(bs);
ed78cda3 1984 aio_context_release(aio_context);
2bc93fed
MK
1985 }
1986}
1987
dc364f4c
BC
1988/* make a BlockDriverState anonymous by removing from bdrv_state and
1989 * graph_bdrv_state list.
d22b2f41
RH
1990 Also, NULL terminate the device_name to prevent double remove */
1991void bdrv_make_anon(BlockDriverState *bs)
1992{
bfb197e0
MA
1993 /*
1994 * Take care to remove bs from bdrv_states only when it's actually
1995 * in it. Note that bs->device_list.tqe_prev is initially null,
1996 * and gets set to non-null by QTAILQ_INSERT_TAIL(). Establish
1997 * the useful invariant "bs in bdrv_states iff bs->tqe_prev" by
1998 * resetting it to null on remove.
1999 */
2000 if (bs->device_list.tqe_prev) {
dc364f4c 2001 QTAILQ_REMOVE(&bdrv_states, bs, device_list);
bfb197e0 2002 bs->device_list.tqe_prev = NULL;
d22b2f41 2003 }
dc364f4c
BC
2004 if (bs->node_name[0] != '\0') {
2005 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
2006 }
2007 bs->node_name[0] = '\0';
d22b2f41
RH
2008}
2009
e023b2e2
PB
2010static void bdrv_rebind(BlockDriverState *bs)
2011{
2012 if (bs->drv && bs->drv->bdrv_rebind) {
2013 bs->drv->bdrv_rebind(bs);
2014 }
2015}
2016
4ddc07ca
PB
2017static void bdrv_move_feature_fields(BlockDriverState *bs_dest,
2018 BlockDriverState *bs_src)
8802d1fd 2019{
4ddc07ca 2020 /* move some fields that need to stay attached to the device */
8802d1fd
JC
2021
2022 /* dev info */
1b7fd729 2023 bs_dest->guest_block_size = bs_src->guest_block_size;
4ddc07ca 2024 bs_dest->copy_on_read = bs_src->copy_on_read;
8802d1fd 2025
4ddc07ca 2026 bs_dest->enable_write_cache = bs_src->enable_write_cache;
c4a248a1 2027
cc0681c4 2028 /* i/o throttled req */
76f4afb4
AG
2029 bs_dest->throttle_state = bs_src->throttle_state,
2030 bs_dest->io_limits_enabled = bs_src->io_limits_enabled;
2031 bs_dest->pending_reqs[0] = bs_src->pending_reqs[0];
2032 bs_dest->pending_reqs[1] = bs_src->pending_reqs[1];
2033 bs_dest->throttled_reqs[0] = bs_src->throttled_reqs[0];
2034 bs_dest->throttled_reqs[1] = bs_src->throttled_reqs[1];
2035 memcpy(&bs_dest->round_robin,
2036 &bs_src->round_robin,
2037 sizeof(bs_dest->round_robin));
0e5b0a2d
BC
2038 memcpy(&bs_dest->throttle_timers,
2039 &bs_src->throttle_timers,
2040 sizeof(ThrottleTimers));
8802d1fd 2041
8802d1fd 2042 /* r/w error */
4ddc07ca
PB
2043 bs_dest->on_read_error = bs_src->on_read_error;
2044 bs_dest->on_write_error = bs_src->on_write_error;
8802d1fd
JC
2045
2046 /* i/o status */
4ddc07ca
PB
2047 bs_dest->iostatus_enabled = bs_src->iostatus_enabled;
2048 bs_dest->iostatus = bs_src->iostatus;
8802d1fd 2049
a9fc4408 2050 /* dirty bitmap */
e4654d2d 2051 bs_dest->dirty_bitmaps = bs_src->dirty_bitmaps;
a9fc4408 2052
9fcb0251
FZ
2053 /* reference count */
2054 bs_dest->refcnt = bs_src->refcnt;
2055
a9fc4408 2056 /* job */
4ddc07ca 2057 bs_dest->job = bs_src->job;
a9fc4408 2058
8802d1fd 2059 /* keep the same entry in bdrv_states */
dc364f4c 2060 bs_dest->device_list = bs_src->device_list;
7e7d56d9
MA
2061 bs_dest->blk = bs_src->blk;
2062
fbe40ff7
FZ
2063 memcpy(bs_dest->op_blockers, bs_src->op_blockers,
2064 sizeof(bs_dest->op_blockers));
4ddc07ca 2065}
8802d1fd 2066
4ddc07ca
PB
2067/*
2068 * Swap bs contents for two image chains while they are live,
2069 * while keeping required fields on the BlockDriverState that is
2070 * actually attached to a device.
2071 *
2072 * This will modify the BlockDriverState fields, and swap contents
2073 * between bs_new and bs_old. Both bs_new and bs_old are modified.
2074 *
bfb197e0 2075 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2076 *
2077 * This function does not create any image files.
2078 */
2079void bdrv_swap(BlockDriverState *bs_new, BlockDriverState *bs_old)
2080{
2081 BlockDriverState tmp;
bddcec37 2082 BdrvChild *child;
f6801b83 2083
6ee4ce1e
KW
2084 bdrv_drain(bs_new);
2085 bdrv_drain(bs_old);
f6801b83 2086
90ce8a06
BC
2087 /* The code needs to swap the node_name but simply swapping node_list won't
2088 * work so first remove the nodes from the graph list, do the swap then
2089 * insert them back if needed.
2090 */
2091 if (bs_new->node_name[0] != '\0') {
2092 QTAILQ_REMOVE(&graph_bdrv_states, bs_new, node_list);
2093 }
2094 if (bs_old->node_name[0] != '\0') {
2095 QTAILQ_REMOVE(&graph_bdrv_states, bs_old, node_list);
2096 }
2097
db628338
AG
2098 /* If the BlockDriverState is part of a throttling group acquire
2099 * its lock since we're going to mess with the protected fields.
2100 * Otherwise there's no need to worry since no one else can touch
2101 * them. */
2102 if (bs_old->throttle_state) {
2103 throttle_group_lock(bs_old);
2104 }
2105
bfb197e0 2106 /* bs_new must be unattached and shouldn't have anything fancy enabled */
7e7d56d9 2107 assert(!bs_new->blk);
e4654d2d 2108 assert(QLIST_EMPTY(&bs_new->dirty_bitmaps));
4ddc07ca 2109 assert(bs_new->job == NULL);
4ddc07ca 2110 assert(bs_new->io_limits_enabled == false);
db628338 2111 assert(bs_new->throttle_state == NULL);
0e5b0a2d 2112 assert(!throttle_timers_are_initialized(&bs_new->throttle_timers));
8802d1fd 2113
4ddc07ca
PB
2114 tmp = *bs_new;
2115 *bs_new = *bs_old;
2116 *bs_old = tmp;
a9fc4408 2117
4ddc07ca
PB
2118 /* there are some fields that should not be swapped, move them back */
2119 bdrv_move_feature_fields(&tmp, bs_old);
2120 bdrv_move_feature_fields(bs_old, bs_new);
2121 bdrv_move_feature_fields(bs_new, &tmp);
8802d1fd 2122
bfb197e0 2123 /* bs_new must remain unattached */
7e7d56d9 2124 assert(!bs_new->blk);
4ddc07ca
PB
2125
2126 /* Check a few fields that should remain attached to the device */
4ddc07ca 2127 assert(bs_new->job == NULL);
4ddc07ca 2128 assert(bs_new->io_limits_enabled == false);
db628338 2129 assert(bs_new->throttle_state == NULL);
0e5b0a2d 2130 assert(!throttle_timers_are_initialized(&bs_new->throttle_timers));
e023b2e2 2131
db628338
AG
2132 /* Release the ThrottleGroup lock */
2133 if (bs_old->throttle_state) {
2134 throttle_group_unlock(bs_old);
2135 }
2136
90ce8a06
BC
2137 /* insert the nodes back into the graph node list if needed */
2138 if (bs_new->node_name[0] != '\0') {
2139 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs_new, node_list);
2140 }
2141 if (bs_old->node_name[0] != '\0') {
2142 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs_old, node_list);
2143 }
2144
6e93e7c4
KW
2145 /*
2146 * Update lh_first.le_prev for non-empty lists.
2147 *
2148 * The head of the op blocker list doesn't change because it is moved back
2149 * in bdrv_move_feature_fields().
2150 */
6ee4ce1e
KW
2151 assert(QLIST_EMPTY(&bs_old->tracked_requests));
2152 assert(QLIST_EMPTY(&bs_new->tracked_requests));
2153
6e93e7c4
KW
2154 QLIST_FIX_HEAD_PTR(&bs_new->children, next);
2155 QLIST_FIX_HEAD_PTR(&bs_old->children, next);
2156
bddcec37
KW
2157 /* Update references in bs->opaque and children */
2158 QLIST_FOREACH(child, &bs_old->children, next) {
2159 if (child->bs->inherits_from == bs_new) {
2160 child->bs->inherits_from = bs_old;
2161 }
2162 }
2163 QLIST_FOREACH(child, &bs_new->children, next) {
2164 if (child->bs->inherits_from == bs_old) {
2165 child->bs->inherits_from = bs_new;
2166 }
2167 }
2168
e023b2e2 2169 bdrv_rebind(bs_new);
4ddc07ca
PB
2170 bdrv_rebind(bs_old);
2171}
2172
2173/*
2174 * Add new bs contents at the top of an image chain while the chain is
2175 * live, while keeping required fields on the top layer.
2176 *
2177 * This will modify the BlockDriverState fields, and swap contents
2178 * between bs_new and bs_top. Both bs_new and bs_top are modified.
2179 *
bfb197e0 2180 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2181 *
2182 * This function does not create any image files.
2183 */
2184void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top)
2185{
2186 bdrv_swap(bs_new, bs_top);
2187
2188 /* The contents of 'tmp' will become bs_top, as we are
2189 * swapping bs_new and bs_top contents. */
8d24cce1 2190 bdrv_set_backing_hd(bs_top, bs_new);
8802d1fd
JC
2191}
2192
4f6fd349 2193static void bdrv_delete(BlockDriverState *bs)
b338082b 2194{
3e914655 2195 assert(!bs->job);
3718d8ab 2196 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 2197 assert(!bs->refcnt);
e4654d2d 2198 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
18846dee 2199
e1b5c52e
SH
2200 bdrv_close(bs);
2201
1b7bdbc1 2202 /* remove from list, if necessary */
d22b2f41 2203 bdrv_make_anon(bs);
34c6f050 2204
7267c094 2205 g_free(bs);
fc01f7e7
FB
2206}
2207
e97fc193
AL
2208/*
2209 * Run consistency checks on an image
2210 *
e076f338 2211 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 2212 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 2213 * check are stored in res.
e97fc193 2214 */
4534ff54 2215int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 2216{
908bcd54
HR
2217 if (bs->drv == NULL) {
2218 return -ENOMEDIUM;
2219 }
e97fc193
AL
2220 if (bs->drv->bdrv_check == NULL) {
2221 return -ENOTSUP;
2222 }
2223
e076f338 2224 memset(res, 0, sizeof(*res));
4534ff54 2225 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
2226}
2227
8a426614
KW
2228#define COMMIT_BUF_SECTORS 2048
2229
33e3963e
FB
2230/* commit COW file into the raw image */
2231int bdrv_commit(BlockDriverState *bs)
2232{
19cb3738 2233 BlockDriver *drv = bs->drv;
72706ea4 2234 int64_t sector, total_sectors, length, backing_length;
8a426614 2235 int n, ro, open_flags;
0bce597d 2236 int ret = 0;
72706ea4 2237 uint8_t *buf = NULL;
33e3963e 2238
19cb3738
FB
2239 if (!drv)
2240 return -ENOMEDIUM;
6bb45158 2241
4dca4b63
NS
2242 if (!bs->backing_hd) {
2243 return -ENOTSUP;
33e3963e
FB
2244 }
2245
bb00021d
FZ
2246 if (bdrv_op_is_blocked(bs, BLOCK_OP_TYPE_COMMIT_SOURCE, NULL) ||
2247 bdrv_op_is_blocked(bs->backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET, NULL)) {
2d3735d3
SH
2248 return -EBUSY;
2249 }
2250
4dca4b63 2251 ro = bs->backing_hd->read_only;
4dca4b63
NS
2252 open_flags = bs->backing_hd->open_flags;
2253
2254 if (ro) {
0bce597d
JC
2255 if (bdrv_reopen(bs->backing_hd, open_flags | BDRV_O_RDWR, NULL)) {
2256 return -EACCES;
4dca4b63 2257 }
ea2384d3 2258 }
33e3963e 2259
72706ea4
JC
2260 length = bdrv_getlength(bs);
2261 if (length < 0) {
2262 ret = length;
2263 goto ro_cleanup;
2264 }
2265
2266 backing_length = bdrv_getlength(bs->backing_hd);
2267 if (backing_length < 0) {
2268 ret = backing_length;
2269 goto ro_cleanup;
2270 }
2271
2272 /* If our top snapshot is larger than the backing file image,
2273 * grow the backing file image if possible. If not possible,
2274 * we must return an error */
2275 if (length > backing_length) {
2276 ret = bdrv_truncate(bs->backing_hd, length);
2277 if (ret < 0) {
2278 goto ro_cleanup;
2279 }
2280 }
2281
2282 total_sectors = length >> BDRV_SECTOR_BITS;
857d4f46
KW
2283
2284 /* qemu_try_blockalign() for bs will choose an alignment that works for
2285 * bs->backing_hd as well, so no need to compare the alignment manually. */
2286 buf = qemu_try_blockalign(bs, COMMIT_BUF_SECTORS * BDRV_SECTOR_SIZE);
2287 if (buf == NULL) {
2288 ret = -ENOMEM;
2289 goto ro_cleanup;
2290 }
8a426614
KW
2291
2292 for (sector = 0; sector < total_sectors; sector += n) {
d663640c
PB
2293 ret = bdrv_is_allocated(bs, sector, COMMIT_BUF_SECTORS, &n);
2294 if (ret < 0) {
2295 goto ro_cleanup;
2296 }
2297 if (ret) {
dabfa6cc
KW
2298 ret = bdrv_read(bs, sector, buf, n);
2299 if (ret < 0) {
8a426614
KW
2300 goto ro_cleanup;
2301 }
2302
dabfa6cc
KW
2303 ret = bdrv_write(bs->backing_hd, sector, buf, n);
2304 if (ret < 0) {
8a426614
KW
2305 goto ro_cleanup;
2306 }
ea2384d3 2307 }
33e3963e 2308 }
95389c86 2309
1d44952f
CH
2310 if (drv->bdrv_make_empty) {
2311 ret = drv->bdrv_make_empty(bs);
dabfa6cc
KW
2312 if (ret < 0) {
2313 goto ro_cleanup;
2314 }
1d44952f
CH
2315 bdrv_flush(bs);
2316 }
95389c86 2317
3f5075ae
CH
2318 /*
2319 * Make sure all data we wrote to the backing device is actually
2320 * stable on disk.
2321 */
dabfa6cc 2322 if (bs->backing_hd) {
3f5075ae 2323 bdrv_flush(bs->backing_hd);
dabfa6cc 2324 }
4dca4b63 2325
dabfa6cc 2326 ret = 0;
4dca4b63 2327ro_cleanup:
857d4f46 2328 qemu_vfree(buf);
4dca4b63
NS
2329
2330 if (ro) {
0bce597d
JC
2331 /* ignoring error return here */
2332 bdrv_reopen(bs->backing_hd, open_flags & ~BDRV_O_RDWR, NULL);
4dca4b63
NS
2333 }
2334
1d44952f 2335 return ret;
33e3963e
FB
2336}
2337
e8877497 2338int bdrv_commit_all(void)
6ab4b5ab
MA
2339{
2340 BlockDriverState *bs;
2341
dc364f4c 2342 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
2343 AioContext *aio_context = bdrv_get_aio_context(bs);
2344
2345 aio_context_acquire(aio_context);
272d2d8e
JC
2346 if (bs->drv && bs->backing_hd) {
2347 int ret = bdrv_commit(bs);
2348 if (ret < 0) {
ed78cda3 2349 aio_context_release(aio_context);
272d2d8e
JC
2350 return ret;
2351 }
e8877497 2352 }
ed78cda3 2353 aio_context_release(aio_context);
6ab4b5ab 2354 }
e8877497 2355 return 0;
6ab4b5ab
MA
2356}
2357
756e6736
KW
2358/*
2359 * Return values:
2360 * 0 - success
2361 * -EINVAL - backing format specified, but no file
2362 * -ENOSPC - can't update the backing file because no space is left in the
2363 * image file header
2364 * -ENOTSUP - format driver doesn't support changing the backing file
2365 */
2366int bdrv_change_backing_file(BlockDriverState *bs,
2367 const char *backing_file, const char *backing_fmt)
2368{
2369 BlockDriver *drv = bs->drv;
469ef350 2370 int ret;
756e6736 2371
5f377794
PB
2372 /* Backing file format doesn't make sense without a backing file */
2373 if (backing_fmt && !backing_file) {
2374 return -EINVAL;
2375 }
2376
756e6736 2377 if (drv->bdrv_change_backing_file != NULL) {
469ef350 2378 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 2379 } else {
469ef350 2380 ret = -ENOTSUP;
756e6736 2381 }
469ef350
PB
2382
2383 if (ret == 0) {
2384 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
2385 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
2386 }
2387 return ret;
756e6736
KW
2388}
2389
6ebdcee2
JC
2390/*
2391 * Finds the image layer in the chain that has 'bs' as its backing file.
2392 *
2393 * active is the current topmost image.
2394 *
2395 * Returns NULL if bs is not found in active's image chain,
2396 * or if active == bs.
4caf0fcd
JC
2397 *
2398 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
2399 */
2400BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
2401 BlockDriverState *bs)
2402{
4caf0fcd
JC
2403 while (active && bs != active->backing_hd) {
2404 active = active->backing_hd;
6ebdcee2
JC
2405 }
2406
4caf0fcd
JC
2407 return active;
2408}
6ebdcee2 2409
4caf0fcd
JC
2410/* Given a BDS, searches for the base layer. */
2411BlockDriverState *bdrv_find_base(BlockDriverState *bs)
2412{
2413 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
2414}
2415
2416typedef struct BlkIntermediateStates {
2417 BlockDriverState *bs;
2418 QSIMPLEQ_ENTRY(BlkIntermediateStates) entry;
2419} BlkIntermediateStates;
2420
2421
2422/*
2423 * Drops images above 'base' up to and including 'top', and sets the image
2424 * above 'top' to have base as its backing file.
2425 *
2426 * Requires that the overlay to 'top' is opened r/w, so that the backing file
2427 * information in 'bs' can be properly updated.
2428 *
2429 * E.g., this will convert the following chain:
2430 * bottom <- base <- intermediate <- top <- active
2431 *
2432 * to
2433 *
2434 * bottom <- base <- active
2435 *
2436 * It is allowed for bottom==base, in which case it converts:
2437 *
2438 * base <- intermediate <- top <- active
2439 *
2440 * to
2441 *
2442 * base <- active
2443 *
54e26900
JC
2444 * If backing_file_str is non-NULL, it will be used when modifying top's
2445 * overlay image metadata.
2446 *
6ebdcee2
JC
2447 * Error conditions:
2448 * if active == top, that is considered an error
2449 *
2450 */
2451int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 2452 BlockDriverState *base, const char *backing_file_str)
6ebdcee2
JC
2453{
2454 BlockDriverState *intermediate;
2455 BlockDriverState *base_bs = NULL;
2456 BlockDriverState *new_top_bs = NULL;
2457 BlkIntermediateStates *intermediate_state, *next;
2458 int ret = -EIO;
2459
2460 QSIMPLEQ_HEAD(states_to_delete, BlkIntermediateStates) states_to_delete;
2461 QSIMPLEQ_INIT(&states_to_delete);
2462
2463 if (!top->drv || !base->drv) {
2464 goto exit;
2465 }
2466
2467 new_top_bs = bdrv_find_overlay(active, top);
2468
2469 if (new_top_bs == NULL) {
2470 /* we could not find the image above 'top', this is an error */
2471 goto exit;
2472 }
2473
2474 /* special case of new_top_bs->backing_hd already pointing to base - nothing
2475 * to do, no intermediate images */
2476 if (new_top_bs->backing_hd == base) {
2477 ret = 0;
2478 goto exit;
2479 }
2480
2481 intermediate = top;
2482
2483 /* now we will go down through the list, and add each BDS we find
2484 * into our deletion queue, until we hit the 'base'
2485 */
2486 while (intermediate) {
5839e53b 2487 intermediate_state = g_new0(BlkIntermediateStates, 1);
6ebdcee2
JC
2488 intermediate_state->bs = intermediate;
2489 QSIMPLEQ_INSERT_TAIL(&states_to_delete, intermediate_state, entry);
2490
2491 if (intermediate->backing_hd == base) {
2492 base_bs = intermediate->backing_hd;
2493 break;
2494 }
2495 intermediate = intermediate->backing_hd;
2496 }
2497 if (base_bs == NULL) {
2498 /* something went wrong, we did not end at the base. safely
2499 * unravel everything, and exit with error */
2500 goto exit;
2501 }
2502
2503 /* success - we can delete the intermediate states, and link top->base */
54e26900
JC
2504 backing_file_str = backing_file_str ? backing_file_str : base_bs->filename;
2505 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
6ebdcee2
JC
2506 base_bs->drv ? base_bs->drv->format_name : "");
2507 if (ret) {
2508 goto exit;
2509 }
920beae1 2510 bdrv_set_backing_hd(new_top_bs, base_bs);
6ebdcee2
JC
2511
2512 QSIMPLEQ_FOREACH_SAFE(intermediate_state, &states_to_delete, entry, next) {
2513 /* so that bdrv_close() does not recursively close the chain */
920beae1 2514 bdrv_set_backing_hd(intermediate_state->bs, NULL);
4f6fd349 2515 bdrv_unref(intermediate_state->bs);
6ebdcee2
JC
2516 }
2517 ret = 0;
2518
2519exit:
2520 QSIMPLEQ_FOREACH_SAFE(intermediate_state, &states_to_delete, entry, next) {
2521 g_free(intermediate_state);
2522 }
2523 return ret;
2524}
2525
61007b31
SH
2526/**
2527 * Truncate file to 'offset' bytes (needed only for file protocols)
2528 */
2529int bdrv_truncate(BlockDriverState *bs, int64_t offset)
71d0770c 2530{
61007b31
SH
2531 BlockDriver *drv = bs->drv;
2532 int ret;
2533 if (!drv)
71d0770c 2534 return -ENOMEDIUM;
61007b31
SH
2535 if (!drv->bdrv_truncate)
2536 return -ENOTSUP;
2537 if (bs->read_only)
2538 return -EACCES;
71d0770c 2539
61007b31
SH
2540 ret = drv->bdrv_truncate(bs, offset);
2541 if (ret == 0) {
2542 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
2543 bdrv_dirty_bitmap_truncate(bs);
2544 if (bs->blk) {
2545 blk_dev_resize_cb(bs->blk);
2546 }
c0191e76 2547 }
61007b31 2548 return ret;
71d0770c
AL
2549}
2550
61007b31
SH
2551/**
2552 * Length of a allocated file in bytes. Sparse files are counted by actual
2553 * allocated space. Return < 0 if error or unknown.
2554 */
2555int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 2556{
61007b31
SH
2557 BlockDriver *drv = bs->drv;
2558 if (!drv) {
2559 return -ENOMEDIUM;
8f4754ed 2560 }
61007b31
SH
2561 if (drv->bdrv_get_allocated_file_size) {
2562 return drv->bdrv_get_allocated_file_size(bs);
2563 }
2564 if (bs->file) {
9a4f4c31 2565 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 2566 }
61007b31 2567 return -ENOTSUP;
1c9805a3 2568}
e7a8a783 2569
61007b31
SH
2570/**
2571 * Return number of sectors on success, -errno on error.
1c9805a3 2572 */
61007b31 2573int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 2574{
61007b31 2575 BlockDriver *drv = bs->drv;
498e386c 2576
61007b31
SH
2577 if (!drv)
2578 return -ENOMEDIUM;
2572b37a 2579
61007b31
SH
2580 if (drv->has_variable_length) {
2581 int ret = refresh_total_sectors(bs, bs->total_sectors);
2582 if (ret < 0) {
2583 return ret;
1c9805a3
SH
2584 }
2585 }
61007b31 2586 return bs->total_sectors;
1c9805a3 2587}
b338082b 2588
61007b31
SH
2589/**
2590 * Return length in bytes on success, -errno on error.
2591 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 2592 */
61007b31 2593int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 2594{
61007b31 2595 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 2596
4a9c9ea0 2597 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 2598 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
2599}
2600
61007b31
SH
2601/* return 0 as number of sectors if no device present or error */
2602void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 2603{
61007b31 2604 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 2605
61007b31 2606 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
2607}
2608
61007b31
SH
2609void bdrv_set_on_error(BlockDriverState *bs, BlockdevOnError on_read_error,
2610 BlockdevOnError on_write_error)
fc01f7e7 2611{
61007b31
SH
2612 bs->on_read_error = on_read_error;
2613 bs->on_write_error = on_write_error;
83f64091
FB
2614}
2615
61007b31 2616BlockdevOnError bdrv_get_on_error(BlockDriverState *bs, bool is_read)
4105eaaa 2617{
61007b31 2618 return is_read ? bs->on_read_error : bs->on_write_error;
8d3b1a2d
KW
2619}
2620
61007b31 2621BlockErrorAction bdrv_get_error_action(BlockDriverState *bs, bool is_read, int error)
d75cbb5e 2622{
61007b31 2623 BlockdevOnError on_err = is_read ? bs->on_read_error : bs->on_write_error;
9ce10c0b 2624
61007b31
SH
2625 switch (on_err) {
2626 case BLOCKDEV_ON_ERROR_ENOSPC:
2627 return (error == ENOSPC) ?
2628 BLOCK_ERROR_ACTION_STOP : BLOCK_ERROR_ACTION_REPORT;
2629 case BLOCKDEV_ON_ERROR_STOP:
2630 return BLOCK_ERROR_ACTION_STOP;
2631 case BLOCKDEV_ON_ERROR_REPORT:
2632 return BLOCK_ERROR_ACTION_REPORT;
2633 case BLOCKDEV_ON_ERROR_IGNORE:
2634 return BLOCK_ERROR_ACTION_IGNORE;
2635 default:
2636 abort();
d75cbb5e
PL
2637 }
2638}
2639
61007b31
SH
2640static void send_qmp_error_event(BlockDriverState *bs,
2641 BlockErrorAction action,
2642 bool is_read, int error)
83f64091 2643{
61007b31 2644 IoOperationType optype;
a3ef6571 2645
61007b31
SH
2646 optype = is_read ? IO_OPERATION_TYPE_READ : IO_OPERATION_TYPE_WRITE;
2647 qapi_event_send_block_io_error(bdrv_get_device_name(bs), optype, action,
2648 bdrv_iostatus_is_enabled(bs),
2649 error == ENOSPC, strerror(error),
2650 &error_abort);
83f64091
FB
2651}
2652
61007b31
SH
2653/* This is done by device models because, while the block layer knows
2654 * about the error, it does not know whether an operation comes from
2655 * the device or the block layer (from a job, for example).
2656 */
2657void bdrv_error_action(BlockDriverState *bs, BlockErrorAction action,
2658 bool is_read, int error)
83f64091 2659{
61007b31 2660 assert(error >= 0);
83f64091 2661
61007b31
SH
2662 if (action == BLOCK_ERROR_ACTION_STOP) {
2663 /* First set the iostatus, so that "info block" returns an iostatus
2664 * that matches the events raised so far (an additional error iostatus
2665 * is fine, but not a lost one).
2666 */
2667 bdrv_iostatus_set_err(bs, error);
83f64091 2668
61007b31
SH
2669 /* Then raise the request to stop the VM and the event.
2670 * qemu_system_vmstop_request_prepare has two effects. First,
2671 * it ensures that the STOP event always comes after the
2672 * BLOCK_IO_ERROR event. Second, it ensures that even if management
2673 * can observe the STOP event and do a "cont" before the STOP
2674 * event is issued, the VM will not stop. In this case, vm_start()
2675 * also ensures that the STOP/RESUME pair of events is emitted.
2676 */
2677 qemu_system_vmstop_request_prepare();
2678 send_qmp_error_event(bs, action, is_read, error);
2679 qemu_system_vmstop_request(RUN_STATE_IO_ERROR);
2680 } else {
2681 send_qmp_error_event(bs, action, is_read, error);
2682 }
8d3b1a2d
KW
2683}
2684
61007b31 2685int bdrv_is_read_only(BlockDriverState *bs)
8d3b1a2d 2686{
61007b31 2687 return bs->read_only;
83f64091 2688}
83f64091 2689
61007b31 2690int bdrv_is_sg(BlockDriverState *bs)
f08145fe 2691{
61007b31 2692 return bs->sg;
f08145fe
KW
2693}
2694
61007b31 2695int bdrv_enable_write_cache(BlockDriverState *bs)
ab185921 2696{
61007b31 2697 return bs->enable_write_cache;
ab185921
SH
2698}
2699
61007b31 2700void bdrv_set_enable_write_cache(BlockDriverState *bs, bool wce)
da1fa91d 2701{
61007b31 2702 bs->enable_write_cache = wce;
ab185921 2703
61007b31
SH
2704 /* so a reopen() will preserve wce */
2705 if (wce) {
2706 bs->open_flags |= BDRV_O_CACHE_WB;
893a8f62 2707 } else {
61007b31 2708 bs->open_flags &= ~BDRV_O_CACHE_WB;
893a8f62 2709 }
da1fa91d
KW
2710}
2711
61007b31 2712int bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 2713{
61007b31
SH
2714 if (bs->backing_hd && bs->backing_hd->encrypted)
2715 return 1;
2716 return bs->encrypted;
fc3959e4
FZ
2717}
2718
61007b31 2719int bdrv_key_required(BlockDriverState *bs)
fc3959e4 2720{
61007b31
SH
2721 BlockDriverState *backing_hd = bs->backing_hd;
2722
2723 if (backing_hd && backing_hd->encrypted && !backing_hd->valid_key)
2724 return 1;
2725 return (bs->encrypted && !bs->valid_key);
fc3959e4
FZ
2726}
2727
61007b31 2728int bdrv_set_key(BlockDriverState *bs, const char *key)
d0c7f642 2729{
d0c7f642 2730 int ret;
61007b31
SH
2731 if (bs->backing_hd && bs->backing_hd->encrypted) {
2732 ret = bdrv_set_key(bs->backing_hd, key);
2733 if (ret < 0)
2734 return ret;
2735 if (!bs->encrypted)
2736 return 0;
2737 }
2738 if (!bs->encrypted) {
2739 return -EINVAL;
2740 } else if (!bs->drv || !bs->drv->bdrv_set_key) {
d0c7f642
KW
2741 return -ENOMEDIUM;
2742 }
61007b31 2743 ret = bs->drv->bdrv_set_key(bs, key);
b9c64947 2744 if (ret < 0) {
61007b31
SH
2745 bs->valid_key = 0;
2746 } else if (!bs->valid_key) {
2747 bs->valid_key = 1;
2748 if (bs->blk) {
2749 /* call the change callback now, we skipped it on open */
2750 blk_dev_change_media_cb(bs->blk, true);
2751 }
1b0288ae 2752 }
61007b31
SH
2753 return ret;
2754}
f08f2dda 2755
c5fbe571 2756/*
61007b31
SH
2757 * Provide an encryption key for @bs.
2758 * If @key is non-null:
2759 * If @bs is not encrypted, fail.
2760 * Else if the key is invalid, fail.
2761 * Else set @bs's key to @key, replacing the existing key, if any.
2762 * If @key is null:
2763 * If @bs is encrypted and still lacks a key, fail.
2764 * Else do nothing.
2765 * On failure, store an error object through @errp if non-null.
c5fbe571 2766 */
61007b31 2767void bdrv_add_key(BlockDriverState *bs, const char *key, Error **errp)
c5fbe571 2768{
61007b31
SH
2769 if (key) {
2770 if (!bdrv_is_encrypted(bs)) {
2771 error_setg(errp, "Node '%s' is not encrypted",
2772 bdrv_get_device_or_node_name(bs));
2773 } else if (bdrv_set_key(bs, key) < 0) {
c6bd8c70 2774 error_setg(errp, QERR_INVALID_PASSWORD);
4d2855a3
MA
2775 }
2776 } else {
2777 if (bdrv_key_required(bs)) {
b1ca6391
MA
2778 error_set(errp, ERROR_CLASS_DEVICE_ENCRYPTED,
2779 "'%s' (%s) is encrypted",
81e5f78a 2780 bdrv_get_device_or_node_name(bs),
4d2855a3
MA
2781 bdrv_get_encrypted_filename(bs));
2782 }
2783 }
2784}
2785
61007b31 2786const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 2787{
61007b31 2788 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
2789}
2790
61007b31 2791static int qsort_strcmp(const void *a, const void *b)
40b4f539 2792{
61007b31 2793 return strcmp(a, b);
40b4f539
KW
2794}
2795
61007b31
SH
2796void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
2797 void *opaque)
40b4f539 2798{
61007b31
SH
2799 BlockDriver *drv;
2800 int count = 0;
2801 int i;
2802 const char **formats = NULL;
40b4f539 2803
61007b31
SH
2804 QLIST_FOREACH(drv, &bdrv_drivers, list) {
2805 if (drv->format_name) {
2806 bool found = false;
2807 int i = count;
2808 while (formats && i && !found) {
2809 found = !strcmp(formats[--i], drv->format_name);
2810 }
e2a305fb 2811
61007b31
SH
2812 if (!found) {
2813 formats = g_renew(const char *, formats, count + 1);
2814 formats[count++] = drv->format_name;
2815 }
6c5a42ac 2816 }
61007b31 2817 }
6c5a42ac 2818
61007b31 2819 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 2820
61007b31
SH
2821 for (i = 0; i < count; i++) {
2822 it(opaque, formats[i]);
2823 }
40b4f539 2824
61007b31
SH
2825 g_free(formats);
2826}
40b4f539 2827
61007b31
SH
2828/* This function is to find a node in the bs graph */
2829BlockDriverState *bdrv_find_node(const char *node_name)
2830{
2831 BlockDriverState *bs;
391827eb 2832
61007b31 2833 assert(node_name);
40b4f539 2834
61007b31
SH
2835 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2836 if (!strcmp(node_name, bs->node_name)) {
2837 return bs;
40b4f539
KW
2838 }
2839 }
61007b31 2840 return NULL;
40b4f539
KW
2841}
2842
61007b31
SH
2843/* Put this QMP function here so it can access the static graph_bdrv_states. */
2844BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 2845{
61007b31
SH
2846 BlockDeviceInfoList *list, *entry;
2847 BlockDriverState *bs;
40b4f539 2848
61007b31
SH
2849 list = NULL;
2850 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2851 BlockDeviceInfo *info = bdrv_block_device_info(bs, errp);
2852 if (!info) {
2853 qapi_free_BlockDeviceInfoList(list);
2854 return NULL;
301db7c2 2855 }
61007b31
SH
2856 entry = g_malloc0(sizeof(*entry));
2857 entry->value = info;
2858 entry->next = list;
2859 list = entry;
301db7c2
RH
2860 }
2861
61007b31
SH
2862 return list;
2863}
40b4f539 2864
61007b31
SH
2865BlockDriverState *bdrv_lookup_bs(const char *device,
2866 const char *node_name,
2867 Error **errp)
2868{
2869 BlockBackend *blk;
2870 BlockDriverState *bs;
40b4f539 2871
61007b31
SH
2872 if (device) {
2873 blk = blk_by_name(device);
40b4f539 2874
61007b31
SH
2875 if (blk) {
2876 return blk_bs(blk);
2877 }
2878 }
40b4f539 2879
61007b31
SH
2880 if (node_name) {
2881 bs = bdrv_find_node(node_name);
6d519a5f 2882
61007b31
SH
2883 if (bs) {
2884 return bs;
2885 }
40b4f539
KW
2886 }
2887
61007b31
SH
2888 error_setg(errp, "Cannot find device=%s nor node_name=%s",
2889 device ? device : "",
2890 node_name ? node_name : "");
2891 return NULL;
40b4f539
KW
2892}
2893
61007b31
SH
2894/* If 'base' is in the same chain as 'top', return true. Otherwise,
2895 * return false. If either argument is NULL, return false. */
2896bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 2897{
61007b31
SH
2898 while (top && top != base) {
2899 top = top->backing_hd;
02c50efe 2900 }
61007b31
SH
2901
2902 return top != NULL;
02c50efe
FZ
2903}
2904
61007b31 2905BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 2906{
61007b31
SH
2907 if (!bs) {
2908 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 2909 }
61007b31 2910 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
2911}
2912
61007b31 2913BlockDriverState *bdrv_next(BlockDriverState *bs)
83f64091 2914{
61007b31
SH
2915 if (!bs) {
2916 return QTAILQ_FIRST(&bdrv_states);
857d4f46 2917 }
61007b31 2918 return QTAILQ_NEXT(bs, device_list);
83f64091 2919}
beac80cd 2920
61007b31 2921const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 2922{
61007b31 2923 return bs->node_name;
beac80cd
FB
2924}
2925
61007b31
SH
2926/* TODO check what callers really want: bs->node_name or blk_name() */
2927const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 2928{
61007b31 2929 return bs->blk ? blk_name(bs->blk) : "";
f141eafe 2930}
83f64091 2931
61007b31
SH
2932/* This can be used to identify nodes that might not have a device
2933 * name associated. Since node and device names live in the same
2934 * namespace, the result is unambiguous. The exception is if both are
2935 * absent, then this returns an empty (non-null) string. */
2936const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 2937{
61007b31 2938 return bs->blk ? blk_name(bs->blk) : bs->node_name;
beac80cd 2939}
beac80cd 2940
61007b31 2941int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 2942{
61007b31 2943 return bs->open_flags;
0b5a2445
PB
2944}
2945
61007b31 2946int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 2947{
61007b31 2948 return 1;
0b5a2445
PB
2949}
2950
61007b31 2951int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 2952{
61007b31 2953 assert(bs->drv);
0b5a2445 2954
61007b31
SH
2955 /* If BS is a copy on write image, it is initialized to
2956 the contents of the base image, which may not be zeroes. */
2957 if (bs->backing_hd) {
2958 return 0;
2959 }
2960 if (bs->drv->bdrv_has_zero_init) {
2961 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 2962 }
61007b31
SH
2963
2964 /* safe default */
2965 return 0;
68485420
KW
2966}
2967
61007b31 2968bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 2969{
61007b31 2970 BlockDriverInfo bdi;
b2a61371 2971
61007b31
SH
2972 if (bs->backing_hd) {
2973 return false;
2974 }
2975
2976 if (bdrv_get_info(bs, &bdi) == 0) {
2977 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
2978 }
2979
61007b31 2980 return false;
b2a61371
SH
2981}
2982
61007b31 2983bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 2984{
61007b31 2985 BlockDriverInfo bdi;
68485420 2986
61007b31
SH
2987 if (bs->backing_hd || !(bs->open_flags & BDRV_O_UNMAP)) {
2988 return false;
2989 }
68485420 2990
61007b31
SH
2991 if (bdrv_get_info(bs, &bdi) == 0) {
2992 return bdi.can_write_zeroes_with_unmap;
2993 }
68485420 2994
61007b31 2995 return false;
68485420
KW
2996}
2997
61007b31 2998const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 2999{
61007b31
SH
3000 if (bs->backing_hd && bs->backing_hd->encrypted)
3001 return bs->backing_file;
3002 else if (bs->encrypted)
3003 return bs->filename;
3004 else
3005 return NULL;
b2e12bc6
CH
3006}
3007
61007b31
SH
3008void bdrv_get_backing_filename(BlockDriverState *bs,
3009 char *filename, int filename_size)
016f5cf6 3010{
61007b31
SH
3011 pstrcpy(filename, filename_size, bs->backing_file);
3012}
d318aea9 3013
61007b31
SH
3014int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
3015{
3016 BlockDriver *drv = bs->drv;
3017 if (!drv)
3018 return -ENOMEDIUM;
3019 if (!drv->bdrv_get_info)
3020 return -ENOTSUP;
3021 memset(bdi, 0, sizeof(*bdi));
3022 return drv->bdrv_get_info(bs, bdi);
3023}
016f5cf6 3024
61007b31
SH
3025ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
3026{
3027 BlockDriver *drv = bs->drv;
3028 if (drv && drv->bdrv_get_specific_info) {
3029 return drv->bdrv_get_specific_info(bs);
3030 }
3031 return NULL;
016f5cf6
AG
3032}
3033
61007b31 3034void bdrv_debug_event(BlockDriverState *bs, BlkDebugEvent event)
4265d620 3035{
61007b31
SH
3036 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
3037 return;
3038 }
4265d620 3039
61007b31 3040 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
3041}
3042
61007b31
SH
3043int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
3044 const char *tag)
4265d620 3045{
61007b31 3046 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 3047 bs = bs->file ? bs->file->bs : NULL;
61007b31 3048 }
4265d620 3049
61007b31
SH
3050 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
3051 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
3052 }
4265d620 3053
61007b31 3054 return -ENOTSUP;
4265d620
PB
3055}
3056
61007b31 3057int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 3058{
61007b31 3059 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 3060 bs = bs->file ? bs->file->bs : NULL;
61007b31 3061 }
ce1a14dc 3062
61007b31
SH
3063 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
3064 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
3065 }
3066
3067 return -ENOTSUP;
eb852011
MA
3068}
3069
61007b31 3070int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 3071{
61007b31 3072 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 3073 bs = bs->file ? bs->file->bs : NULL;
61007b31 3074 }
ce1a14dc 3075
61007b31
SH
3076 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
3077 return bs->drv->bdrv_debug_resume(bs, tag);
3078 }
ce1a14dc 3079
61007b31 3080 return -ENOTSUP;
f197fe2b
FZ
3081}
3082
61007b31 3083bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 3084{
61007b31 3085 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 3086 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 3087 }
19cb3738 3088
61007b31
SH
3089 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
3090 return bs->drv->bdrv_debug_is_suspended(bs, tag);
3091 }
f9f05dc5 3092
61007b31
SH
3093 return false;
3094}
f9f05dc5 3095
61007b31 3096int bdrv_is_snapshot(BlockDriverState *bs)
f9f05dc5 3097{
61007b31 3098 return !!(bs->open_flags & BDRV_O_SNAPSHOT);
f9f05dc5
KW
3099}
3100
61007b31
SH
3101/* backing_file can either be relative, or absolute, or a protocol. If it is
3102 * relative, it must be relative to the chain. So, passing in bs->filename
3103 * from a BDS as backing_file should not be done, as that may be relative to
3104 * the CWD rather than the chain. */
3105BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
3106 const char *backing_file)
f9f05dc5 3107{
61007b31
SH
3108 char *filename_full = NULL;
3109 char *backing_file_full = NULL;
3110 char *filename_tmp = NULL;
3111 int is_protocol = 0;
3112 BlockDriverState *curr_bs = NULL;
3113 BlockDriverState *retval = NULL;
f9f05dc5 3114
61007b31
SH
3115 if (!bs || !bs->drv || !backing_file) {
3116 return NULL;
f9f05dc5
KW
3117 }
3118
61007b31
SH
3119 filename_full = g_malloc(PATH_MAX);
3120 backing_file_full = g_malloc(PATH_MAX);
3121 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 3122
61007b31 3123 is_protocol = path_has_protocol(backing_file);
f9f05dc5 3124
61007b31 3125 for (curr_bs = bs; curr_bs->backing_hd; curr_bs = curr_bs->backing_hd) {
f9f05dc5 3126
61007b31
SH
3127 /* If either of the filename paths is actually a protocol, then
3128 * compare unmodified paths; otherwise make paths relative */
3129 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
3130 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
3131 retval = curr_bs->backing_hd;
3132 break;
3133 }
3134 } else {
3135 /* If not an absolute filename path, make it relative to the current
3136 * image's filename path */
3137 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3138 backing_file);
f9f05dc5 3139
61007b31
SH
3140 /* We are going to compare absolute pathnames */
3141 if (!realpath(filename_tmp, filename_full)) {
3142 continue;
3143 }
07f07615 3144
61007b31
SH
3145 /* We need to make sure the backing filename we are comparing against
3146 * is relative to the current image filename (or absolute) */
3147 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3148 curr_bs->backing_file);
07f07615 3149
61007b31
SH
3150 if (!realpath(filename_tmp, backing_file_full)) {
3151 continue;
3152 }
eb489bb1 3153
61007b31
SH
3154 if (strcmp(backing_file_full, filename_full) == 0) {
3155 retval = curr_bs->backing_hd;
3156 break;
3157 }
3158 }
eb489bb1
KW
3159 }
3160
61007b31
SH
3161 g_free(filename_full);
3162 g_free(backing_file_full);
3163 g_free(filename_tmp);
3164 return retval;
3165}
3166
3167int bdrv_get_backing_file_depth(BlockDriverState *bs)
3168{
3169 if (!bs->drv) {
3170 return 0;
eb489bb1
KW
3171 }
3172
61007b31
SH
3173 if (!bs->backing_hd) {
3174 return 0;
ca716364
KW
3175 }
3176
61007b31
SH
3177 return 1 + bdrv_get_backing_file_depth(bs->backing_hd);
3178}
07f07615 3179
61007b31
SH
3180void bdrv_init(void)
3181{
3182 module_call_init(MODULE_INIT_BLOCK);
3183}
29cdb251 3184
61007b31
SH
3185void bdrv_init_with_whitelist(void)
3186{
3187 use_bdrv_whitelist = 1;
3188 bdrv_init();
07f07615
PB
3189}
3190
5a8a30db 3191void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 3192{
5a8a30db
KW
3193 Error *local_err = NULL;
3194 int ret;
3195
3456a8d1
KW
3196 if (!bs->drv) {
3197 return;
3198 }
3199
7ea2d269
AK
3200 if (!(bs->open_flags & BDRV_O_INCOMING)) {
3201 return;
3202 }
3203 bs->open_flags &= ~BDRV_O_INCOMING;
3204
3456a8d1 3205 if (bs->drv->bdrv_invalidate_cache) {
5a8a30db 3206 bs->drv->bdrv_invalidate_cache(bs, &local_err);
3456a8d1 3207 } else if (bs->file) {
9a4f4c31 3208 bdrv_invalidate_cache(bs->file->bs, &local_err);
5a8a30db
KW
3209 }
3210 if (local_err) {
3211 error_propagate(errp, local_err);
3212 return;
0f15423c 3213 }
3456a8d1 3214
5a8a30db
KW
3215 ret = refresh_total_sectors(bs, bs->total_sectors);
3216 if (ret < 0) {
3217 error_setg_errno(errp, -ret, "Could not refresh total sector count");
3218 return;
3219 }
0f15423c
AL
3220}
3221
5a8a30db 3222void bdrv_invalidate_cache_all(Error **errp)
0f15423c
AL
3223{
3224 BlockDriverState *bs;
5a8a30db 3225 Error *local_err = NULL;
0f15423c 3226
dc364f4c 3227 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
3228 AioContext *aio_context = bdrv_get_aio_context(bs);
3229
3230 aio_context_acquire(aio_context);
5a8a30db 3231 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 3232 aio_context_release(aio_context);
5a8a30db
KW
3233 if (local_err) {
3234 error_propagate(errp, local_err);
3235 return;
3236 }
0f15423c
AL
3237 }
3238}
3239
19cb3738
FB
3240/**************************************************************/
3241/* removable device support */
3242
3243/**
3244 * Return TRUE if the media is present
3245 */
3246int bdrv_is_inserted(BlockDriverState *bs)
3247{
3248 BlockDriver *drv = bs->drv;
a1aff5bf 3249
19cb3738
FB
3250 if (!drv)
3251 return 0;
3252 if (!drv->bdrv_is_inserted)
a1aff5bf
MA
3253 return 1;
3254 return drv->bdrv_is_inserted(bs);
19cb3738
FB
3255}
3256
3257/**
8e49ca46
MA
3258 * Return whether the media changed since the last call to this
3259 * function, or -ENOTSUP if we don't know. Most drivers don't know.
19cb3738
FB
3260 */
3261int bdrv_media_changed(BlockDriverState *bs)
3262{
3263 BlockDriver *drv = bs->drv;
19cb3738 3264
8e49ca46
MA
3265 if (drv && drv->bdrv_media_changed) {
3266 return drv->bdrv_media_changed(bs);
3267 }
3268 return -ENOTSUP;
19cb3738
FB
3269}
3270
3271/**
3272 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
3273 */
f36f3949 3274void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
3275{
3276 BlockDriver *drv = bs->drv;
bfb197e0 3277 const char *device_name;
19cb3738 3278
822e1cd1
MA
3279 if (drv && drv->bdrv_eject) {
3280 drv->bdrv_eject(bs, eject_flag);
19cb3738 3281 }
6f382ed2 3282
bfb197e0
MA
3283 device_name = bdrv_get_device_name(bs);
3284 if (device_name[0] != '\0') {
3285 qapi_event_send_device_tray_moved(device_name,
a5ee7bd4 3286 eject_flag, &error_abort);
6f382ed2 3287 }
19cb3738
FB
3288}
3289
19cb3738
FB
3290/**
3291 * Lock or unlock the media (if it is locked, the user won't be able
3292 * to eject it manually).
3293 */
025e849a 3294void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
3295{
3296 BlockDriver *drv = bs->drv;
3297
025e849a 3298 trace_bdrv_lock_medium(bs, locked);
b8c6d095 3299
025e849a
MA
3300 if (drv && drv->bdrv_lock_medium) {
3301 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
3302 }
3303}
985a03b0 3304
1b7fd729 3305void bdrv_set_guest_block_size(BlockDriverState *bs, int align)
7b6f9300 3306{
1b7fd729 3307 bs->guest_block_size = align;
7b6f9300 3308}
7cd1e32a 3309
0db6e54a
FZ
3310BdrvDirtyBitmap *bdrv_find_dirty_bitmap(BlockDriverState *bs, const char *name)
3311{
3312 BdrvDirtyBitmap *bm;
3313
3314 assert(name);
3315 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
3316 if (bm->name && !strcmp(name, bm->name)) {
3317 return bm;
3318 }
3319 }
3320 return NULL;
3321}
3322
20dca810 3323void bdrv_dirty_bitmap_make_anon(BdrvDirtyBitmap *bitmap)
0db6e54a 3324{
9bd2b08f 3325 assert(!bdrv_dirty_bitmap_frozen(bitmap));
0db6e54a
FZ
3326 g_free(bitmap->name);
3327 bitmap->name = NULL;
3328}
3329
3330BdrvDirtyBitmap *bdrv_create_dirty_bitmap(BlockDriverState *bs,
5fba6c0e 3331 uint32_t granularity,
0db6e54a 3332 const char *name,
b8afb520 3333 Error **errp)
7cd1e32a
LS
3334{
3335 int64_t bitmap_size;
e4654d2d 3336 BdrvDirtyBitmap *bitmap;
5fba6c0e 3337 uint32_t sector_granularity;
a55eb92c 3338
50717e94
PB
3339 assert((granularity & (granularity - 1)) == 0);
3340
0db6e54a
FZ
3341 if (name && bdrv_find_dirty_bitmap(bs, name)) {
3342 error_setg(errp, "Bitmap already exists: %s", name);
3343 return NULL;
3344 }
5fba6c0e
JS
3345 sector_granularity = granularity >> BDRV_SECTOR_BITS;
3346 assert(sector_granularity);
57322b78 3347 bitmap_size = bdrv_nb_sectors(bs);
b8afb520
FZ
3348 if (bitmap_size < 0) {
3349 error_setg_errno(errp, -bitmap_size, "could not get length of device");
3350 errno = -bitmap_size;
3351 return NULL;
3352 }
5839e53b 3353 bitmap = g_new0(BdrvDirtyBitmap, 1);
5fba6c0e 3354 bitmap->bitmap = hbitmap_alloc(bitmap_size, ctz32(sector_granularity));
e74e6b78 3355 bitmap->size = bitmap_size;
0db6e54a 3356 bitmap->name = g_strdup(name);
b8e6fb75 3357 bitmap->disabled = false;
e4654d2d
FZ
3358 QLIST_INSERT_HEAD(&bs->dirty_bitmaps, bitmap, list);
3359 return bitmap;
3360}
3361
9bd2b08f
JS
3362bool bdrv_dirty_bitmap_frozen(BdrvDirtyBitmap *bitmap)
3363{
3364 return bitmap->successor;
3365}
3366
b8e6fb75
JS
3367bool bdrv_dirty_bitmap_enabled(BdrvDirtyBitmap *bitmap)
3368{
9bd2b08f
JS
3369 return !(bitmap->disabled || bitmap->successor);
3370}
3371
9abe3bdc
JS
3372DirtyBitmapStatus bdrv_dirty_bitmap_status(BdrvDirtyBitmap *bitmap)
3373{
3374 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3375 return DIRTY_BITMAP_STATUS_FROZEN;
3376 } else if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3377 return DIRTY_BITMAP_STATUS_DISABLED;
3378 } else {
3379 return DIRTY_BITMAP_STATUS_ACTIVE;
3380 }
3381}
3382
9bd2b08f
JS
3383/**
3384 * Create a successor bitmap destined to replace this bitmap after an operation.
3385 * Requires that the bitmap is not frozen and has no successor.
3386 */
3387int bdrv_dirty_bitmap_create_successor(BlockDriverState *bs,
3388 BdrvDirtyBitmap *bitmap, Error **errp)
3389{
3390 uint64_t granularity;
3391 BdrvDirtyBitmap *child;
3392
3393 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3394 error_setg(errp, "Cannot create a successor for a bitmap that is "
3395 "currently frozen");
3396 return -1;
3397 }
3398 assert(!bitmap->successor);
3399
3400 /* Create an anonymous successor */
3401 granularity = bdrv_dirty_bitmap_granularity(bitmap);
3402 child = bdrv_create_dirty_bitmap(bs, granularity, NULL, errp);
3403 if (!child) {
3404 return -1;
3405 }
3406
3407 /* Successor will be on or off based on our current state. */
3408 child->disabled = bitmap->disabled;
3409
3410 /* Install the successor and freeze the parent */
3411 bitmap->successor = child;
3412 return 0;
3413}
3414
3415/**
3416 * For a bitmap with a successor, yield our name to the successor,
3417 * delete the old bitmap, and return a handle to the new bitmap.
3418 */
3419BdrvDirtyBitmap *bdrv_dirty_bitmap_abdicate(BlockDriverState *bs,
3420 BdrvDirtyBitmap *bitmap,
3421 Error **errp)
3422{
3423 char *name;
3424 BdrvDirtyBitmap *successor = bitmap->successor;
3425
3426 if (successor == NULL) {
3427 error_setg(errp, "Cannot relinquish control if "
3428 "there's no successor present");
3429 return NULL;
3430 }
3431
3432 name = bitmap->name;
3433 bitmap->name = NULL;
3434 successor->name = name;
3435 bitmap->successor = NULL;
3436 bdrv_release_dirty_bitmap(bs, bitmap);
3437
3438 return successor;
3439}
3440
3441/**
3442 * In cases of failure where we can no longer safely delete the parent,
3443 * we may wish to re-join the parent and child/successor.
3444 * The merged parent will be un-frozen, but not explicitly re-enabled.
3445 */
3446BdrvDirtyBitmap *bdrv_reclaim_dirty_bitmap(BlockDriverState *bs,
3447 BdrvDirtyBitmap *parent,
3448 Error **errp)
3449{
3450 BdrvDirtyBitmap *successor = parent->successor;
3451
3452 if (!successor) {
3453 error_setg(errp, "Cannot reclaim a successor when none is present");
3454 return NULL;
3455 }
3456
3457 if (!hbitmap_merge(parent->bitmap, successor->bitmap)) {
3458 error_setg(errp, "Merging of parent and successor bitmap failed");
3459 return NULL;
3460 }
3461 bdrv_release_dirty_bitmap(bs, successor);
3462 parent->successor = NULL;
3463
3464 return parent;
b8e6fb75
JS
3465}
3466
ce1ffea8
JS
3467/**
3468 * Truncates _all_ bitmaps attached to a BDS.
3469 */
3470static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs)
3471{
3472 BdrvDirtyBitmap *bitmap;
3473 uint64_t size = bdrv_nb_sectors(bs);
3474
3475 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
06207b0f 3476 assert(!bdrv_dirty_bitmap_frozen(bitmap));
ce1ffea8 3477 hbitmap_truncate(bitmap->bitmap, size);
5270b6a0 3478 bitmap->size = size;
ce1ffea8
JS
3479 }
3480}
3481
e4654d2d
FZ
3482void bdrv_release_dirty_bitmap(BlockDriverState *bs, BdrvDirtyBitmap *bitmap)
3483{
3484 BdrvDirtyBitmap *bm, *next;
3485 QLIST_FOREACH_SAFE(bm, &bs->dirty_bitmaps, list, next) {
3486 if (bm == bitmap) {
9bd2b08f 3487 assert(!bdrv_dirty_bitmap_frozen(bm));
e4654d2d
FZ
3488 QLIST_REMOVE(bitmap, list);
3489 hbitmap_free(bitmap->bitmap);
0db6e54a 3490 g_free(bitmap->name);
e4654d2d
FZ
3491 g_free(bitmap);
3492 return;
a55eb92c 3493 }
7cd1e32a
LS
3494 }
3495}
3496
b8e6fb75
JS
3497void bdrv_disable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3498{
9bd2b08f 3499 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3500 bitmap->disabled = true;
3501}
3502
3503void bdrv_enable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3504{
9bd2b08f 3505 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3506 bitmap->disabled = false;
3507}
3508
21b56835
FZ
3509BlockDirtyInfoList *bdrv_query_dirty_bitmaps(BlockDriverState *bs)
3510{
3511 BdrvDirtyBitmap *bm;
3512 BlockDirtyInfoList *list = NULL;
3513 BlockDirtyInfoList **plist = &list;
3514
3515 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
5839e53b
MA
3516 BlockDirtyInfo *info = g_new0(BlockDirtyInfo, 1);
3517 BlockDirtyInfoList *entry = g_new0(BlockDirtyInfoList, 1);
20dca810 3518 info->count = bdrv_get_dirty_count(bm);
592fdd02 3519 info->granularity = bdrv_dirty_bitmap_granularity(bm);
0db6e54a
FZ
3520 info->has_name = !!bm->name;
3521 info->name = g_strdup(bm->name);
9abe3bdc 3522 info->status = bdrv_dirty_bitmap_status(bm);
21b56835
FZ
3523 entry->value = info;
3524 *plist = entry;
3525 plist = &entry->next;
3526 }
3527
3528 return list;
3529}
3530
e4654d2d 3531int bdrv_get_dirty(BlockDriverState *bs, BdrvDirtyBitmap *bitmap, int64_t sector)
7cd1e32a 3532{
e4654d2d
FZ
3533 if (bitmap) {
3534 return hbitmap_get(bitmap->bitmap, sector);
7cd1e32a
LS
3535 } else {
3536 return 0;
3537 }
3538}
3539
341ebc2f
JS
3540/**
3541 * Chooses a default granularity based on the existing cluster size,
3542 * but clamped between [4K, 64K]. Defaults to 64K in the case that there
3543 * is no cluster size information available.
3544 */
3545uint32_t bdrv_get_default_bitmap_granularity(BlockDriverState *bs)
3546{
3547 BlockDriverInfo bdi;
3548 uint32_t granularity;
3549
3550 if (bdrv_get_info(bs, &bdi) >= 0 && bdi.cluster_size > 0) {
3551 granularity = MAX(4096, bdi.cluster_size);
3552 granularity = MIN(65536, granularity);
3553 } else {
3554 granularity = 65536;
3555 }
3556
3557 return granularity;
3558}
3559
592fdd02
JS
3560uint32_t bdrv_dirty_bitmap_granularity(BdrvDirtyBitmap *bitmap)
3561{
3562 return BDRV_SECTOR_SIZE << hbitmap_granularity(bitmap->bitmap);
3563}
3564
20dca810 3565void bdrv_dirty_iter_init(BdrvDirtyBitmap *bitmap, HBitmapIter *hbi)
1755da16 3566{
e4654d2d 3567 hbitmap_iter_init(hbi, bitmap->bitmap, 0);
1755da16
PB
3568}
3569
20dca810 3570void bdrv_set_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3571 int64_t cur_sector, int nr_sectors)
3572{
b8e6fb75 3573 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3574 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3575}
3576
20dca810 3577void bdrv_reset_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3578 int64_t cur_sector, int nr_sectors)
3579{
b8e6fb75 3580 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3581 hbitmap_reset(bitmap->bitmap, cur_sector, nr_sectors);
3582}
3583
e74e6b78
JS
3584void bdrv_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3585{
3586 assert(bdrv_dirty_bitmap_enabled(bitmap));
c6a8c328 3587 hbitmap_reset_all(bitmap->bitmap);
e74e6b78
JS
3588}
3589
e0c47b6c
SH
3590void bdrv_set_dirty(BlockDriverState *bs, int64_t cur_sector,
3591 int nr_sectors)
1755da16 3592{
e4654d2d
FZ
3593 BdrvDirtyBitmap *bitmap;
3594 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
b8e6fb75
JS
3595 if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3596 continue;
3597 }
e4654d2d
FZ
3598 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3599 }
1755da16
PB
3600}
3601
d58d8453
JS
3602/**
3603 * Advance an HBitmapIter to an arbitrary offset.
3604 */
3605void bdrv_set_dirty_iter(HBitmapIter *hbi, int64_t offset)
3606{
3607 assert(hbi->hb);
3608 hbitmap_iter_init(hbi, hbi->hb, offset);
3609}
3610
20dca810 3611int64_t bdrv_get_dirty_count(BdrvDirtyBitmap *bitmap)
aaa0eb75 3612{
e4654d2d 3613 return hbitmap_count(bitmap->bitmap);
aaa0eb75 3614}
f88e1a42 3615
9fcb0251
FZ
3616/* Get a reference to bs */
3617void bdrv_ref(BlockDriverState *bs)
3618{
3619 bs->refcnt++;
3620}
3621
3622/* Release a previously grabbed reference to bs.
3623 * If after releasing, reference count is zero, the BlockDriverState is
3624 * deleted. */
3625void bdrv_unref(BlockDriverState *bs)
3626{
9a4d5ca6
JC
3627 if (!bs) {
3628 return;
3629 }
9fcb0251
FZ
3630 assert(bs->refcnt > 0);
3631 if (--bs->refcnt == 0) {
3632 bdrv_delete(bs);
3633 }
3634}
3635
fbe40ff7
FZ
3636struct BdrvOpBlocker {
3637 Error *reason;
3638 QLIST_ENTRY(BdrvOpBlocker) list;
3639};
3640
3641bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
3642{
3643 BdrvOpBlocker *blocker;
3644 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3645 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
3646 blocker = QLIST_FIRST(&bs->op_blockers[op]);
3647 if (errp) {
81e5f78a
AG
3648 error_setg(errp, "Node '%s' is busy: %s",
3649 bdrv_get_device_or_node_name(bs),
bfb197e0 3650 error_get_pretty(blocker->reason));
fbe40ff7
FZ
3651 }
3652 return true;
3653 }
3654 return false;
3655}
3656
3657void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
3658{
3659 BdrvOpBlocker *blocker;
3660 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3661
5839e53b 3662 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
3663 blocker->reason = reason;
3664 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
3665}
3666
3667void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
3668{
3669 BdrvOpBlocker *blocker, *next;
3670 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3671 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
3672 if (blocker->reason == reason) {
3673 QLIST_REMOVE(blocker, list);
3674 g_free(blocker);
3675 }
3676 }
3677}
3678
3679void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
3680{
3681 int i;
3682 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3683 bdrv_op_block(bs, i, reason);
3684 }
3685}
3686
3687void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
3688{
3689 int i;
3690 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3691 bdrv_op_unblock(bs, i, reason);
3692 }
3693}
3694
3695bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
3696{
3697 int i;
3698
3699 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3700 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
3701 return false;
3702 }
3703 }
3704 return true;
3705}
3706
28a7282a
LC
3707void bdrv_iostatus_enable(BlockDriverState *bs)
3708{
d6bf279e 3709 bs->iostatus_enabled = true;
58e21ef5 3710 bs->iostatus = BLOCK_DEVICE_IO_STATUS_OK;
28a7282a
LC
3711}
3712
3713/* The I/O status is only enabled if the drive explicitly
3714 * enables it _and_ the VM is configured to stop on errors */
3715bool bdrv_iostatus_is_enabled(const BlockDriverState *bs)
3716{
d6bf279e 3717 return (bs->iostatus_enabled &&
92aa5c6d
PB
3718 (bs->on_write_error == BLOCKDEV_ON_ERROR_ENOSPC ||
3719 bs->on_write_error == BLOCKDEV_ON_ERROR_STOP ||
3720 bs->on_read_error == BLOCKDEV_ON_ERROR_STOP));
28a7282a
LC
3721}
3722
3723void bdrv_iostatus_disable(BlockDriverState *bs)
3724{
d6bf279e 3725 bs->iostatus_enabled = false;
28a7282a
LC
3726}
3727
3728void bdrv_iostatus_reset(BlockDriverState *bs)
3729{
3730 if (bdrv_iostatus_is_enabled(bs)) {
58e21ef5 3731 bs->iostatus = BLOCK_DEVICE_IO_STATUS_OK;
3bd293c3
PB
3732 if (bs->job) {
3733 block_job_iostatus_reset(bs->job);
3734 }
28a7282a
LC
3735 }
3736}
3737
28a7282a
LC
3738void bdrv_iostatus_set_err(BlockDriverState *bs, int error)
3739{
3e1caa5f
PB
3740 assert(bdrv_iostatus_is_enabled(bs));
3741 if (bs->iostatus == BLOCK_DEVICE_IO_STATUS_OK) {
58e21ef5
LC
3742 bs->iostatus = error == ENOSPC ? BLOCK_DEVICE_IO_STATUS_NOSPACE :
3743 BLOCK_DEVICE_IO_STATUS_FAILED;
28a7282a
LC
3744 }
3745}
3746
d92ada22
LC
3747void bdrv_img_create(const char *filename, const char *fmt,
3748 const char *base_filename, const char *base_fmt,
f382d43a
MR
3749 char *options, uint64_t img_size, int flags,
3750 Error **errp, bool quiet)
f88e1a42 3751{
83d0521a
CL
3752 QemuOptsList *create_opts = NULL;
3753 QemuOpts *opts = NULL;
3754 const char *backing_fmt, *backing_file;
3755 int64_t size;
f88e1a42 3756 BlockDriver *drv, *proto_drv;
cc84d90f 3757 Error *local_err = NULL;
f88e1a42
JS
3758 int ret = 0;
3759
3760 /* Find driver and parse its options */
3761 drv = bdrv_find_format(fmt);
3762 if (!drv) {
71c79813 3763 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 3764 return;
f88e1a42
JS
3765 }
3766
b65a5e12 3767 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 3768 if (!proto_drv) {
d92ada22 3769 return;
f88e1a42
JS
3770 }
3771
c6149724
HR
3772 if (!drv->create_opts) {
3773 error_setg(errp, "Format driver '%s' does not support image creation",
3774 drv->format_name);
3775 return;
3776 }
3777
3778 if (!proto_drv->create_opts) {
3779 error_setg(errp, "Protocol driver '%s' does not support image creation",
3780 proto_drv->format_name);
3781 return;
3782 }
3783
c282e1fd
CL
3784 create_opts = qemu_opts_append(create_opts, drv->create_opts);
3785 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
3786
3787 /* Create parameter list with default values */
83d0521a 3788 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 3789 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
3790
3791 /* Parse -o options */
3792 if (options) {
dc523cd3
MA
3793 qemu_opts_do_parse(opts, options, NULL, &local_err);
3794 if (local_err) {
3795 error_report_err(local_err);
3796 local_err = NULL;
83d0521a 3797 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
3798 goto out;
3799 }
3800 }
3801
3802 if (base_filename) {
f43e47db 3803 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 3804 if (local_err) {
71c79813
LC
3805 error_setg(errp, "Backing file not supported for file format '%s'",
3806 fmt);
f88e1a42
JS
3807 goto out;
3808 }
3809 }
3810
3811 if (base_fmt) {
f43e47db 3812 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 3813 if (local_err) {
71c79813
LC
3814 error_setg(errp, "Backing file format not supported for file "
3815 "format '%s'", fmt);
f88e1a42
JS
3816 goto out;
3817 }
3818 }
3819
83d0521a
CL
3820 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
3821 if (backing_file) {
3822 if (!strcmp(filename, backing_file)) {
71c79813
LC
3823 error_setg(errp, "Error: Trying to create an image with the "
3824 "same filename as the backing file");
792da93a
JS
3825 goto out;
3826 }
3827 }
3828
83d0521a 3829 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42
JS
3830
3831 // The size for the image must always be specified, with one exception:
3832 // If we are using a backing file, we can obtain the size from there
83d0521a
CL
3833 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
3834 if (size == -1) {
3835 if (backing_file) {
66f6b814 3836 BlockDriverState *bs;
29168018 3837 char *full_backing = g_new0(char, PATH_MAX);
52bf1e72 3838 int64_t size;
63090dac 3839 int back_flags;
e6641719 3840 QDict *backing_options = NULL;
63090dac 3841
29168018
HR
3842 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
3843 full_backing, PATH_MAX,
3844 &local_err);
3845 if (local_err) {
3846 g_free(full_backing);
3847 goto out;
3848 }
3849
63090dac
PB
3850 /* backing files always opened read-only */
3851 back_flags =
3852 flags & ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 3853
e6641719
HR
3854 if (backing_fmt) {
3855 backing_options = qdict_new();
3856 qdict_put(backing_options, "driver",
3857 qstring_from_str(backing_fmt));
3858 }
3859
f67503e5 3860 bs = NULL;
e6641719 3861 ret = bdrv_open(&bs, full_backing, NULL, backing_options,
6ebf9aa2 3862 back_flags, &local_err);
29168018 3863 g_free(full_backing);
f88e1a42 3864 if (ret < 0) {
f88e1a42
JS
3865 goto out;
3866 }
52bf1e72
MA
3867 size = bdrv_getlength(bs);
3868 if (size < 0) {
3869 error_setg_errno(errp, -size, "Could not get size of '%s'",
3870 backing_file);
3871 bdrv_unref(bs);
3872 goto out;
3873 }
f88e1a42 3874
39101f25 3875 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
66f6b814
HR
3876
3877 bdrv_unref(bs);
f88e1a42 3878 } else {
71c79813 3879 error_setg(errp, "Image creation needs a size parameter");
f88e1a42
JS
3880 goto out;
3881 }
3882 }
3883
f382d43a 3884 if (!quiet) {
fe646693 3885 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 3886 qemu_opts_print(opts, " ");
f382d43a
MR
3887 puts("");
3888 }
83d0521a 3889
c282e1fd 3890 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 3891
cc84d90f
HR
3892 if (ret == -EFBIG) {
3893 /* This is generally a better message than whatever the driver would
3894 * deliver (especially because of the cluster_size_hint), since that
3895 * is most probably not much different from "image too large". */
3896 const char *cluster_size_hint = "";
83d0521a 3897 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 3898 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 3899 }
cc84d90f
HR
3900 error_setg(errp, "The image size is too large for file format '%s'"
3901 "%s", fmt, cluster_size_hint);
3902 error_free(local_err);
3903 local_err = NULL;
f88e1a42
JS
3904 }
3905
3906out:
83d0521a
CL
3907 qemu_opts_del(opts);
3908 qemu_opts_free(create_opts);
84d18f06 3909 if (local_err) {
cc84d90f
HR
3910 error_propagate(errp, local_err);
3911 }
f88e1a42 3912}
85d126f3
SH
3913
3914AioContext *bdrv_get_aio_context(BlockDriverState *bs)
3915{
dcd04228
SH
3916 return bs->aio_context;
3917}
3918
3919void bdrv_detach_aio_context(BlockDriverState *bs)
3920{
33384421
HR
3921 BdrvAioNotifier *baf;
3922
dcd04228
SH
3923 if (!bs->drv) {
3924 return;
3925 }
3926
33384421
HR
3927 QLIST_FOREACH(baf, &bs->aio_notifiers, list) {
3928 baf->detach_aio_context(baf->opaque);
3929 }
3930
13af91eb 3931 if (bs->io_limits_enabled) {
0e5b0a2d 3932 throttle_timers_detach_aio_context(&bs->throttle_timers);
13af91eb 3933 }
dcd04228
SH
3934 if (bs->drv->bdrv_detach_aio_context) {
3935 bs->drv->bdrv_detach_aio_context(bs);
3936 }
3937 if (bs->file) {
9a4f4c31 3938 bdrv_detach_aio_context(bs->file->bs);
dcd04228
SH
3939 }
3940 if (bs->backing_hd) {
3941 bdrv_detach_aio_context(bs->backing_hd);
3942 }
3943
3944 bs->aio_context = NULL;
3945}
3946
3947void bdrv_attach_aio_context(BlockDriverState *bs,
3948 AioContext *new_context)
3949{
33384421
HR
3950 BdrvAioNotifier *ban;
3951
dcd04228
SH
3952 if (!bs->drv) {
3953 return;
3954 }
3955
3956 bs->aio_context = new_context;
3957
3958 if (bs->backing_hd) {
3959 bdrv_attach_aio_context(bs->backing_hd, new_context);
3960 }
3961 if (bs->file) {
9a4f4c31 3962 bdrv_attach_aio_context(bs->file->bs, new_context);
dcd04228
SH
3963 }
3964 if (bs->drv->bdrv_attach_aio_context) {
3965 bs->drv->bdrv_attach_aio_context(bs, new_context);
3966 }
13af91eb 3967 if (bs->io_limits_enabled) {
0e5b0a2d 3968 throttle_timers_attach_aio_context(&bs->throttle_timers, new_context);
13af91eb 3969 }
33384421
HR
3970
3971 QLIST_FOREACH(ban, &bs->aio_notifiers, list) {
3972 ban->attached_aio_context(new_context, ban->opaque);
3973 }
dcd04228
SH
3974}
3975
3976void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
3977{
53ec73e2 3978 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228
SH
3979
3980 bdrv_detach_aio_context(bs);
3981
3982 /* This function executes in the old AioContext so acquire the new one in
3983 * case it runs in a different thread.
3984 */
3985 aio_context_acquire(new_context);
3986 bdrv_attach_aio_context(bs, new_context);
3987 aio_context_release(new_context);
85d126f3 3988}
d616b224 3989
33384421
HR
3990void bdrv_add_aio_context_notifier(BlockDriverState *bs,
3991 void (*attached_aio_context)(AioContext *new_context, void *opaque),
3992 void (*detach_aio_context)(void *opaque), void *opaque)
3993{
3994 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
3995 *ban = (BdrvAioNotifier){
3996 .attached_aio_context = attached_aio_context,
3997 .detach_aio_context = detach_aio_context,
3998 .opaque = opaque
3999 };
4000
4001 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
4002}
4003
4004void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
4005 void (*attached_aio_context)(AioContext *,
4006 void *),
4007 void (*detach_aio_context)(void *),
4008 void *opaque)
4009{
4010 BdrvAioNotifier *ban, *ban_next;
4011
4012 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
4013 if (ban->attached_aio_context == attached_aio_context &&
4014 ban->detach_aio_context == detach_aio_context &&
4015 ban->opaque == opaque)
4016 {
4017 QLIST_REMOVE(ban, list);
4018 g_free(ban);
4019
4020 return;
4021 }
4022 }
4023
4024 abort();
4025}
4026
77485434
HR
4027int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
4028 BlockDriverAmendStatusCB *status_cb)
6f176b48 4029{
c282e1fd 4030 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
4031 return -ENOTSUP;
4032 }
77485434 4033 return bs->drv->bdrv_amend_options(bs, opts, status_cb);
6f176b48 4034}
f6186f49 4035
b5042a36
BC
4036/* This function will be called by the bdrv_recurse_is_first_non_filter method
4037 * of block filter and by bdrv_is_first_non_filter.
4038 * It is used to test if the given bs is the candidate or recurse more in the
4039 * node graph.
212a5a8f 4040 */
b5042a36 4041bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 4042 BlockDriverState *candidate)
f6186f49 4043{
b5042a36
BC
4044 /* return false if basic checks fails */
4045 if (!bs || !bs->drv) {
212a5a8f 4046 return false;
f6186f49
BC
4047 }
4048
b5042a36
BC
4049 /* the code reached a non block filter driver -> check if the bs is
4050 * the same as the candidate. It's the recursion termination condition.
4051 */
4052 if (!bs->drv->is_filter) {
4053 return bs == candidate;
212a5a8f 4054 }
b5042a36 4055 /* Down this path the driver is a block filter driver */
212a5a8f 4056
b5042a36
BC
4057 /* If the block filter recursion method is defined use it to recurse down
4058 * the node graph.
4059 */
4060 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 4061 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
4062 }
4063
b5042a36
BC
4064 /* the driver is a block filter but don't allow to recurse -> return false
4065 */
4066 return false;
f6186f49
BC
4067}
4068
212a5a8f
BC
4069/* This function checks if the candidate is the first non filter bs down it's
4070 * bs chain. Since we don't have pointers to parents it explore all bs chains
4071 * from the top. Some filters can choose not to pass down the recursion.
4072 */
4073bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 4074{
212a5a8f
BC
4075 BlockDriverState *bs;
4076
4077 /* walk down the bs forest recursively */
4078 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
4079 bool perm;
4080
b5042a36 4081 /* try to recurse in this top level bs */
e6dc8a1f 4082 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
4083
4084 /* candidate is the first non filter */
4085 if (perm) {
4086 return true;
4087 }
4088 }
4089
4090 return false;
f6186f49 4091}
09158f00 4092
e12f3784
WC
4093BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
4094 const char *node_name, Error **errp)
09158f00
BC
4095{
4096 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
4097 AioContext *aio_context;
4098
09158f00
BC
4099 if (!to_replace_bs) {
4100 error_setg(errp, "Node name '%s' not found", node_name);
4101 return NULL;
4102 }
4103
5a7e7a0b
SH
4104 aio_context = bdrv_get_aio_context(to_replace_bs);
4105 aio_context_acquire(aio_context);
4106
09158f00 4107 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
4108 to_replace_bs = NULL;
4109 goto out;
09158f00
BC
4110 }
4111
4112 /* We don't want arbitrary node of the BDS chain to be replaced only the top
4113 * most non filter in order to prevent data corruption.
4114 * Another benefit is that this tests exclude backing files which are
4115 * blocked by the backing blockers.
4116 */
e12f3784 4117 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 4118 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
4119 to_replace_bs = NULL;
4120 goto out;
09158f00
BC
4121 }
4122
5a7e7a0b
SH
4123out:
4124 aio_context_release(aio_context);
09158f00
BC
4125 return to_replace_bs;
4126}
448ad91d 4127
91af7014
HR
4128static bool append_open_options(QDict *d, BlockDriverState *bs)
4129{
4130 const QDictEntry *entry;
4131 bool found_any = false;
4132
4133 for (entry = qdict_first(bs->options); entry;
4134 entry = qdict_next(bs->options, entry))
4135 {
4136 /* Only take options for this level and exclude all non-driver-specific
4137 * options */
4138 if (!strchr(qdict_entry_key(entry), '.') &&
4139 strcmp(qdict_entry_key(entry), "node-name"))
4140 {
4141 qobject_incref(qdict_entry_value(entry));
4142 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
4143 found_any = true;
4144 }
4145 }
4146
4147 return found_any;
4148}
4149
4150/* Updates the following BDS fields:
4151 * - exact_filename: A filename which may be used for opening a block device
4152 * which (mostly) equals the given BDS (even without any
4153 * other options; so reading and writing must return the same
4154 * results, but caching etc. may be different)
4155 * - full_open_options: Options which, when given when opening a block device
4156 * (without a filename), result in a BDS (mostly)
4157 * equalling the given one
4158 * - filename: If exact_filename is set, it is copied here. Otherwise,
4159 * full_open_options is converted to a JSON object, prefixed with
4160 * "json:" (for use through the JSON pseudo protocol) and put here.
4161 */
4162void bdrv_refresh_filename(BlockDriverState *bs)
4163{
4164 BlockDriver *drv = bs->drv;
4165 QDict *opts;
4166
4167 if (!drv) {
4168 return;
4169 }
4170
4171 /* This BDS's file name will most probably depend on its file's name, so
4172 * refresh that first */
4173 if (bs->file) {
9a4f4c31 4174 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
4175 }
4176
4177 if (drv->bdrv_refresh_filename) {
4178 /* Obsolete information is of no use here, so drop the old file name
4179 * information before refreshing it */
4180 bs->exact_filename[0] = '\0';
4181 if (bs->full_open_options) {
4182 QDECREF(bs->full_open_options);
4183 bs->full_open_options = NULL;
4184 }
4185
4186 drv->bdrv_refresh_filename(bs);
4187 } else if (bs->file) {
4188 /* Try to reconstruct valid information from the underlying file */
4189 bool has_open_options;
4190
4191 bs->exact_filename[0] = '\0';
4192 if (bs->full_open_options) {
4193 QDECREF(bs->full_open_options);
4194 bs->full_open_options = NULL;
4195 }
4196
4197 opts = qdict_new();
4198 has_open_options = append_open_options(opts, bs);
4199
4200 /* If no specific options have been given for this BDS, the filename of
4201 * the underlying file should suffice for this one as well */
9a4f4c31
KW
4202 if (bs->file->bs->exact_filename[0] && !has_open_options) {
4203 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
4204 }
4205 /* Reconstructing the full options QDict is simple for most format block
4206 * drivers, as long as the full options are known for the underlying
4207 * file BDS. The full options QDict of that file BDS should somehow
4208 * contain a representation of the filename, therefore the following
4209 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 4210 if (bs->file->bs->full_open_options) {
91af7014
HR
4211 qdict_put_obj(opts, "driver",
4212 QOBJECT(qstring_from_str(drv->format_name)));
9a4f4c31
KW
4213 QINCREF(bs->file->bs->full_open_options);
4214 qdict_put_obj(opts, "file",
4215 QOBJECT(bs->file->bs->full_open_options));
91af7014
HR
4216
4217 bs->full_open_options = opts;
4218 } else {
4219 QDECREF(opts);
4220 }
4221 } else if (!bs->full_open_options && qdict_size(bs->options)) {
4222 /* There is no underlying file BDS (at least referenced by BDS.file),
4223 * so the full options QDict should be equal to the options given
4224 * specifically for this block device when it was opened (plus the
4225 * driver specification).
4226 * Because those options don't change, there is no need to update
4227 * full_open_options when it's already set. */
4228
4229 opts = qdict_new();
4230 append_open_options(opts, bs);
4231 qdict_put_obj(opts, "driver",
4232 QOBJECT(qstring_from_str(drv->format_name)));
4233
4234 if (bs->exact_filename[0]) {
4235 /* This may not work for all block protocol drivers (some may
4236 * require this filename to be parsed), but we have to find some
4237 * default solution here, so just include it. If some block driver
4238 * does not support pure options without any filename at all or
4239 * needs some special format of the options QDict, it needs to
4240 * implement the driver-specific bdrv_refresh_filename() function.
4241 */
4242 qdict_put_obj(opts, "filename",
4243 QOBJECT(qstring_from_str(bs->exact_filename)));
4244 }
4245
4246 bs->full_open_options = opts;
4247 }
4248
4249 if (bs->exact_filename[0]) {
4250 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4251 } else if (bs->full_open_options) {
4252 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4253 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4254 qstring_get_str(json));
4255 QDECREF(json);
4256 }
4257}
5366d0c8
BC
4258
4259/* This accessor function purpose is to allow the device models to access the
4260 * BlockAcctStats structure embedded inside a BlockDriverState without being
4261 * aware of the BlockDriverState structure layout.
4262 * It will go away when the BlockAcctStats structure will be moved inside
4263 * the device models.
4264 */
4265BlockAcctStats *bdrv_get_stats(BlockDriverState *bs)
4266{
4267 return &bs->stats;
4268}