]> git.proxmox.com Git - mirror_qemu.git/blame - block.c
block: Tweak error message related to qemu-img amend
[mirror_qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
d38ea87a 24#include "qemu/osdep.h"
0ab8ed18 25#include "block/trace.h"
737e150e
PB
26#include "block/block_int.h"
27#include "block/blockjob.h"
cd7fca95 28#include "block/nbd.h"
d49b6836 29#include "qemu/error-report.h"
88d88798 30#include "module_block.h"
1de7afc9 31#include "qemu/module.h"
cc7a8ea7 32#include "qapi/qmp/qerror.h"
91a097e7 33#include "qapi/qmp/qbool.h"
7b1b5d19 34#include "qapi/qmp/qjson.h"
bfb197e0 35#include "sysemu/block-backend.h"
9c17d615 36#include "sysemu/sysemu.h"
1de7afc9 37#include "qemu/notify.h"
10817bf0 38#include "qemu/coroutine.h"
c13163fb 39#include "block/qapi.h"
b2023818 40#include "qmp-commands.h"
1de7afc9 41#include "qemu/timer.h"
a5ee7bd4 42#include "qapi-event.h"
f348b6d1
VB
43#include "qemu/cutils.h"
44#include "qemu/id.h"
692e01a2 45#include "qapi/util.h"
fc01f7e7 46
71e72a19 47#ifdef CONFIG_BSD
7674e7bf 48#include <sys/ioctl.h>
72cf2d4f 49#include <sys/queue.h>
c5e97233 50#ifndef __DragonFly__
7674e7bf
FB
51#include <sys/disk.h>
52#endif
c5e97233 53#endif
7674e7bf 54
49dc768d
AL
55#ifdef _WIN32
56#include <windows.h>
57#endif
58
1c9805a3
SH
59#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
60
dc364f4c
BC
61static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
62 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
63
2c1d04e0
HR
64static QTAILQ_HEAD(, BlockDriverState) all_bdrv_states =
65 QTAILQ_HEAD_INITIALIZER(all_bdrv_states);
66
8a22f02a
SH
67static QLIST_HEAD(, BlockDriver) bdrv_drivers =
68 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 69
5b363937
HR
70static BlockDriverState *bdrv_open_inherit(const char *filename,
71 const char *reference,
72 QDict *options, int flags,
73 BlockDriverState *parent,
74 const BdrvChildRole *child_role,
75 Error **errp);
f3930ed0 76
eb852011
MA
77/* If non-zero, use only whitelisted block drivers */
78static int use_bdrv_whitelist;
79
9e0b22f4
SH
80#ifdef _WIN32
81static int is_windows_drive_prefix(const char *filename)
82{
83 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
84 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
85 filename[1] == ':');
86}
87
88int is_windows_drive(const char *filename)
89{
90 if (is_windows_drive_prefix(filename) &&
91 filename[2] == '\0')
92 return 1;
93 if (strstart(filename, "\\\\.\\", NULL) ||
94 strstart(filename, "//./", NULL))
95 return 1;
96 return 0;
97}
98#endif
99
339064d5
KW
100size_t bdrv_opt_mem_align(BlockDriverState *bs)
101{
102 if (!bs || !bs->drv) {
459b4e66
DL
103 /* page size or 4k (hdd sector size) should be on the safe side */
104 return MAX(4096, getpagesize());
339064d5
KW
105 }
106
107 return bs->bl.opt_mem_alignment;
108}
109
4196d2f0
DL
110size_t bdrv_min_mem_align(BlockDriverState *bs)
111{
112 if (!bs || !bs->drv) {
459b4e66
DL
113 /* page size or 4k (hdd sector size) should be on the safe side */
114 return MAX(4096, getpagesize());
4196d2f0
DL
115 }
116
117 return bs->bl.min_mem_alignment;
118}
119
9e0b22f4 120/* check if the path starts with "<protocol>:" */
5c98415b 121int path_has_protocol(const char *path)
9e0b22f4 122{
947995c0
PB
123 const char *p;
124
9e0b22f4
SH
125#ifdef _WIN32
126 if (is_windows_drive(path) ||
127 is_windows_drive_prefix(path)) {
128 return 0;
129 }
947995c0
PB
130 p = path + strcspn(path, ":/\\");
131#else
132 p = path + strcspn(path, ":/");
9e0b22f4
SH
133#endif
134
947995c0 135 return *p == ':';
9e0b22f4
SH
136}
137
83f64091 138int path_is_absolute(const char *path)
3b0d4f61 139{
21664424
FB
140#ifdef _WIN32
141 /* specific case for names like: "\\.\d:" */
f53f4da9 142 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 143 return 1;
f53f4da9
PB
144 }
145 return (*path == '/' || *path == '\\');
3b9f94e1 146#else
f53f4da9 147 return (*path == '/');
3b9f94e1 148#endif
3b0d4f61
FB
149}
150
83f64091
FB
151/* if filename is absolute, just copy it to dest. Otherwise, build a
152 path to it by considering it is relative to base_path. URL are
153 supported. */
154void path_combine(char *dest, int dest_size,
155 const char *base_path,
156 const char *filename)
3b0d4f61 157{
83f64091
FB
158 const char *p, *p1;
159 int len;
160
161 if (dest_size <= 0)
162 return;
163 if (path_is_absolute(filename)) {
164 pstrcpy(dest, dest_size, filename);
165 } else {
166 p = strchr(base_path, ':');
167 if (p)
168 p++;
169 else
170 p = base_path;
3b9f94e1
FB
171 p1 = strrchr(base_path, '/');
172#ifdef _WIN32
173 {
174 const char *p2;
175 p2 = strrchr(base_path, '\\');
176 if (!p1 || p2 > p1)
177 p1 = p2;
178 }
179#endif
83f64091
FB
180 if (p1)
181 p1++;
182 else
183 p1 = base_path;
184 if (p1 > p)
185 p = p1;
186 len = p - base_path;
187 if (len > dest_size - 1)
188 len = dest_size - 1;
189 memcpy(dest, base_path, len);
190 dest[len] = '\0';
191 pstrcat(dest, dest_size, filename);
3b0d4f61 192 }
3b0d4f61
FB
193}
194
9c5e6594
KW
195/* Returns whether the image file is opened as read-only. Note that this can
196 * return false and writing to the image file is still not possible because the
197 * image is inactivated. */
93ed524e
JC
198bool bdrv_is_read_only(BlockDriverState *bs)
199{
200 return bs->read_only;
201}
202
9c5e6594
KW
203/* Returns whether the image file can be written to right now */
204bool bdrv_is_writable(BlockDriverState *bs)
205{
206 return !bdrv_is_read_only(bs) && !(bs->open_flags & BDRV_O_INACTIVE);
207}
208
45803a03 209int bdrv_can_set_read_only(BlockDriverState *bs, bool read_only, Error **errp)
fe5241bf 210{
e2b8247a
JC
211 /* Do not set read_only if copy_on_read is enabled */
212 if (bs->copy_on_read && read_only) {
213 error_setg(errp, "Can't set node '%s' to r/o with copy-on-read enabled",
214 bdrv_get_device_or_node_name(bs));
215 return -EINVAL;
216 }
217
d6fcdf06
JC
218 /* Do not clear read_only if it is prohibited */
219 if (!read_only && !(bs->open_flags & BDRV_O_ALLOW_RDWR)) {
220 error_setg(errp, "Node '%s' is read only",
221 bdrv_get_device_or_node_name(bs));
222 return -EPERM;
223 }
224
45803a03
JC
225 return 0;
226}
227
228int bdrv_set_read_only(BlockDriverState *bs, bool read_only, Error **errp)
229{
230 int ret = 0;
231
232 ret = bdrv_can_set_read_only(bs, read_only, errp);
233 if (ret < 0) {
234 return ret;
235 }
236
fe5241bf 237 bs->read_only = read_only;
e2b8247a 238 return 0;
fe5241bf
JC
239}
240
0a82855a
HR
241void bdrv_get_full_backing_filename_from_filename(const char *backed,
242 const char *backing,
9f07429e
HR
243 char *dest, size_t sz,
244 Error **errp)
dc5a1371 245{
9f07429e
HR
246 if (backing[0] == '\0' || path_has_protocol(backing) ||
247 path_is_absolute(backing))
248 {
0a82855a 249 pstrcpy(dest, sz, backing);
9f07429e
HR
250 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
251 error_setg(errp, "Cannot use relative backing file names for '%s'",
252 backed);
dc5a1371 253 } else {
0a82855a 254 path_combine(dest, sz, backed, backing);
dc5a1371
PB
255 }
256}
257
9f07429e
HR
258void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
259 Error **errp)
0a82855a 260{
9f07429e
HR
261 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
262
263 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
264 dest, sz, errp);
0a82855a
HR
265}
266
0eb7217e
SH
267void bdrv_register(BlockDriver *bdrv)
268{
8a22f02a 269 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 270}
b338082b 271
e4e9986b
MA
272BlockDriverState *bdrv_new(void)
273{
274 BlockDriverState *bs;
275 int i;
276
5839e53b 277 bs = g_new0(BlockDriverState, 1);
e4654d2d 278 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
279 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
280 QLIST_INIT(&bs->op_blockers[i]);
281 }
d616b224 282 notifier_with_return_list_init(&bs->before_write_notifiers);
9fcb0251 283 bs->refcnt = 1;
dcd04228 284 bs->aio_context = qemu_get_aio_context();
d7d512f6 285
3ff2f67a
EY
286 qemu_co_queue_init(&bs->flush_queue);
287
2c1d04e0
HR
288 QTAILQ_INSERT_TAIL(&all_bdrv_states, bs, bs_list);
289
b338082b
FB
290 return bs;
291}
292
88d88798 293static BlockDriver *bdrv_do_find_format(const char *format_name)
ea2384d3
FB
294{
295 BlockDriver *drv1;
88d88798 296
8a22f02a
SH
297 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
298 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 299 return drv1;
8a22f02a 300 }
ea2384d3 301 }
88d88798 302
ea2384d3
FB
303 return NULL;
304}
305
88d88798
MM
306BlockDriver *bdrv_find_format(const char *format_name)
307{
308 BlockDriver *drv1;
309 int i;
310
311 drv1 = bdrv_do_find_format(format_name);
312 if (drv1) {
313 return drv1;
314 }
315
316 /* The driver isn't registered, maybe we need to load a module */
317 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); ++i) {
318 if (!strcmp(block_driver_modules[i].format_name, format_name)) {
319 block_module_load_one(block_driver_modules[i].library_name);
320 break;
321 }
322 }
323
324 return bdrv_do_find_format(format_name);
325}
326
b64ec4e4 327static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 328{
b64ec4e4
FZ
329 static const char *whitelist_rw[] = {
330 CONFIG_BDRV_RW_WHITELIST
331 };
332 static const char *whitelist_ro[] = {
333 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
334 };
335 const char **p;
336
b64ec4e4 337 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 338 return 1; /* no whitelist, anything goes */
b64ec4e4 339 }
eb852011 340
b64ec4e4 341 for (p = whitelist_rw; *p; p++) {
eb852011
MA
342 if (!strcmp(drv->format_name, *p)) {
343 return 1;
344 }
345 }
b64ec4e4
FZ
346 if (read_only) {
347 for (p = whitelist_ro; *p; p++) {
348 if (!strcmp(drv->format_name, *p)) {
349 return 1;
350 }
351 }
352 }
eb852011
MA
353 return 0;
354}
355
e6ff69bf
DB
356bool bdrv_uses_whitelist(void)
357{
358 return use_bdrv_whitelist;
359}
360
5b7e1542
ZYW
361typedef struct CreateCo {
362 BlockDriver *drv;
363 char *filename;
83d0521a 364 QemuOpts *opts;
5b7e1542 365 int ret;
cc84d90f 366 Error *err;
5b7e1542
ZYW
367} CreateCo;
368
369static void coroutine_fn bdrv_create_co_entry(void *opaque)
370{
cc84d90f
HR
371 Error *local_err = NULL;
372 int ret;
373
5b7e1542
ZYW
374 CreateCo *cco = opaque;
375 assert(cco->drv);
376
c282e1fd 377 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
621ff94d 378 error_propagate(&cco->err, local_err);
cc84d90f 379 cco->ret = ret;
5b7e1542
ZYW
380}
381
0e7e1989 382int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 383 QemuOpts *opts, Error **errp)
ea2384d3 384{
5b7e1542
ZYW
385 int ret;
386
387 Coroutine *co;
388 CreateCo cco = {
389 .drv = drv,
390 .filename = g_strdup(filename),
83d0521a 391 .opts = opts,
5b7e1542 392 .ret = NOT_DONE,
cc84d90f 393 .err = NULL,
5b7e1542
ZYW
394 };
395
c282e1fd 396 if (!drv->bdrv_create) {
cc84d90f 397 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
398 ret = -ENOTSUP;
399 goto out;
5b7e1542
ZYW
400 }
401
402 if (qemu_in_coroutine()) {
403 /* Fast-path if already in coroutine context */
404 bdrv_create_co_entry(&cco);
405 } else {
0b8b8753
PB
406 co = qemu_coroutine_create(bdrv_create_co_entry, &cco);
407 qemu_coroutine_enter(co);
5b7e1542 408 while (cco.ret == NOT_DONE) {
b47ec2c4 409 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
410 }
411 }
412
413 ret = cco.ret;
cc84d90f 414 if (ret < 0) {
84d18f06 415 if (cco.err) {
cc84d90f
HR
416 error_propagate(errp, cco.err);
417 } else {
418 error_setg_errno(errp, -ret, "Could not create image");
419 }
420 }
0e7e1989 421
80168bff
LC
422out:
423 g_free(cco.filename);
5b7e1542 424 return ret;
ea2384d3
FB
425}
426
c282e1fd 427int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
428{
429 BlockDriver *drv;
cc84d90f
HR
430 Error *local_err = NULL;
431 int ret;
84a12e66 432
b65a5e12 433 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 434 if (drv == NULL) {
16905d71 435 return -ENOENT;
84a12e66
CH
436 }
437
c282e1fd 438 ret = bdrv_create(drv, filename, opts, &local_err);
621ff94d 439 error_propagate(errp, local_err);
cc84d90f 440 return ret;
84a12e66
CH
441}
442
892b7de8
ET
443/**
444 * Try to get @bs's logical and physical block size.
445 * On success, store them in @bsz struct and return 0.
446 * On failure return -errno.
447 * @bs must not be empty.
448 */
449int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
450{
451 BlockDriver *drv = bs->drv;
452
453 if (drv && drv->bdrv_probe_blocksizes) {
454 return drv->bdrv_probe_blocksizes(bs, bsz);
455 }
456
457 return -ENOTSUP;
458}
459
460/**
461 * Try to get @bs's geometry (cyls, heads, sectors).
462 * On success, store them in @geo struct and return 0.
463 * On failure return -errno.
464 * @bs must not be empty.
465 */
466int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
467{
468 BlockDriver *drv = bs->drv;
469
470 if (drv && drv->bdrv_probe_geometry) {
471 return drv->bdrv_probe_geometry(bs, geo);
472 }
473
474 return -ENOTSUP;
475}
476
eba25057
JM
477/*
478 * Create a uniquely-named empty temporary file.
479 * Return 0 upon success, otherwise a negative errno value.
480 */
481int get_tmp_filename(char *filename, int size)
d5249393 482{
eba25057 483#ifdef _WIN32
3b9f94e1 484 char temp_dir[MAX_PATH];
eba25057
JM
485 /* GetTempFileName requires that its output buffer (4th param)
486 have length MAX_PATH or greater. */
487 assert(size >= MAX_PATH);
488 return (GetTempPath(MAX_PATH, temp_dir)
489 && GetTempFileName(temp_dir, "qem", 0, filename)
490 ? 0 : -GetLastError());
d5249393 491#else
67b915a5 492 int fd;
7ccfb2eb 493 const char *tmpdir;
0badc1ee 494 tmpdir = getenv("TMPDIR");
69bef793
AS
495 if (!tmpdir) {
496 tmpdir = "/var/tmp";
497 }
eba25057
JM
498 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
499 return -EOVERFLOW;
500 }
ea2384d3 501 fd = mkstemp(filename);
fe235a06
DH
502 if (fd < 0) {
503 return -errno;
504 }
505 if (close(fd) != 0) {
506 unlink(filename);
eba25057
JM
507 return -errno;
508 }
509 return 0;
d5249393 510#endif
eba25057 511}
fc01f7e7 512
84a12e66
CH
513/*
514 * Detect host devices. By convention, /dev/cdrom[N] is always
515 * recognized as a host CDROM.
516 */
517static BlockDriver *find_hdev_driver(const char *filename)
518{
519 int score_max = 0, score;
520 BlockDriver *drv = NULL, *d;
521
522 QLIST_FOREACH(d, &bdrv_drivers, list) {
523 if (d->bdrv_probe_device) {
524 score = d->bdrv_probe_device(filename);
525 if (score > score_max) {
526 score_max = score;
527 drv = d;
528 }
529 }
530 }
531
532 return drv;
533}
534
88d88798
MM
535static BlockDriver *bdrv_do_find_protocol(const char *protocol)
536{
537 BlockDriver *drv1;
538
539 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
540 if (drv1->protocol_name && !strcmp(drv1->protocol_name, protocol)) {
541 return drv1;
542 }
543 }
544
545 return NULL;
546}
547
98289620 548BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
549 bool allow_protocol_prefix,
550 Error **errp)
83f64091
FB
551{
552 BlockDriver *drv1;
553 char protocol[128];
1cec71e3 554 int len;
83f64091 555 const char *p;
88d88798 556 int i;
19cb3738 557
66f82cee
KW
558 /* TODO Drivers without bdrv_file_open must be specified explicitly */
559
39508e7a
CH
560 /*
561 * XXX(hch): we really should not let host device detection
562 * override an explicit protocol specification, but moving this
563 * later breaks access to device names with colons in them.
564 * Thanks to the brain-dead persistent naming schemes on udev-
565 * based Linux systems those actually are quite common.
566 */
567 drv1 = find_hdev_driver(filename);
568 if (drv1) {
569 return drv1;
570 }
571
98289620 572 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 573 return &bdrv_file;
84a12e66 574 }
98289620 575
9e0b22f4
SH
576 p = strchr(filename, ':');
577 assert(p != NULL);
1cec71e3
AL
578 len = p - filename;
579 if (len > sizeof(protocol) - 1)
580 len = sizeof(protocol) - 1;
581 memcpy(protocol, filename, len);
582 protocol[len] = '\0';
88d88798
MM
583
584 drv1 = bdrv_do_find_protocol(protocol);
585 if (drv1) {
586 return drv1;
587 }
588
589 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); ++i) {
590 if (block_driver_modules[i].protocol_name &&
591 !strcmp(block_driver_modules[i].protocol_name, protocol)) {
592 block_module_load_one(block_driver_modules[i].library_name);
593 break;
8a22f02a 594 }
83f64091 595 }
b65a5e12 596
88d88798
MM
597 drv1 = bdrv_do_find_protocol(protocol);
598 if (!drv1) {
599 error_setg(errp, "Unknown protocol '%s'", protocol);
600 }
601 return drv1;
83f64091
FB
602}
603
c6684249
MA
604/*
605 * Guess image format by probing its contents.
606 * This is not a good idea when your image is raw (CVE-2008-2004), but
607 * we do it anyway for backward compatibility.
608 *
609 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
610 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
611 * but can be smaller if the image file is smaller)
c6684249
MA
612 * @filename is its filename.
613 *
614 * For all block drivers, call the bdrv_probe() method to get its
615 * probing score.
616 * Return the first block driver with the highest probing score.
617 */
38f3ef57
KW
618BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
619 const char *filename)
c6684249
MA
620{
621 int score_max = 0, score;
622 BlockDriver *drv = NULL, *d;
623
624 QLIST_FOREACH(d, &bdrv_drivers, list) {
625 if (d->bdrv_probe) {
626 score = d->bdrv_probe(buf, buf_size, filename);
627 if (score > score_max) {
628 score_max = score;
629 drv = d;
630 }
631 }
632 }
633
634 return drv;
635}
636
5696c6e3 637static int find_image_format(BlockBackend *file, const char *filename,
34b5d2c6 638 BlockDriver **pdrv, Error **errp)
f3a5d3f8 639{
c6684249 640 BlockDriver *drv;
7cddd372 641 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 642 int ret = 0;
f8ea0b00 643
08a00559 644 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
5696c6e3 645 if (blk_is_sg(file) || !blk_is_inserted(file) || blk_getlength(file) == 0) {
ef810437 646 *pdrv = &bdrv_raw;
c98ac35d 647 return ret;
1a396859 648 }
f8ea0b00 649
5696c6e3 650 ret = blk_pread(file, 0, buf, sizeof(buf));
83f64091 651 if (ret < 0) {
34b5d2c6
HR
652 error_setg_errno(errp, -ret, "Could not read image for determining its "
653 "format");
c98ac35d
SW
654 *pdrv = NULL;
655 return ret;
83f64091
FB
656 }
657
c6684249 658 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 659 if (!drv) {
34b5d2c6
HR
660 error_setg(errp, "Could not determine image format: No compatible "
661 "driver found");
c98ac35d
SW
662 ret = -ENOENT;
663 }
664 *pdrv = drv;
665 return ret;
ea2384d3
FB
666}
667
51762288
SH
668/**
669 * Set the current 'total_sectors' value
65a9bb25 670 * Return 0 on success, -errno on error.
51762288
SH
671 */
672static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
673{
674 BlockDriver *drv = bs->drv;
675
396759ad 676 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 677 if (bdrv_is_sg(bs))
396759ad
NB
678 return 0;
679
51762288
SH
680 /* query actual device if possible, otherwise just trust the hint */
681 if (drv->bdrv_getlength) {
682 int64_t length = drv->bdrv_getlength(bs);
683 if (length < 0) {
684 return length;
685 }
7e382003 686 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
687 }
688
689 bs->total_sectors = hint;
690 return 0;
691}
692
cddff5ba
KW
693/**
694 * Combines a QDict of new block driver @options with any missing options taken
695 * from @old_options, so that leaving out an option defaults to its old value.
696 */
697static void bdrv_join_options(BlockDriverState *bs, QDict *options,
698 QDict *old_options)
699{
700 if (bs->drv && bs->drv->bdrv_join_options) {
701 bs->drv->bdrv_join_options(options, old_options);
702 } else {
703 qdict_join(options, old_options, false);
704 }
705}
706
9e8f1835
PB
707/**
708 * Set open flags for a given discard mode
709 *
710 * Return 0 on success, -1 if the discard mode was invalid.
711 */
712int bdrv_parse_discard_flags(const char *mode, int *flags)
713{
714 *flags &= ~BDRV_O_UNMAP;
715
716 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
717 /* do nothing */
718 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
719 *flags |= BDRV_O_UNMAP;
720 } else {
721 return -1;
722 }
723
724 return 0;
725}
726
c3993cdc
SH
727/**
728 * Set open flags for a given cache mode
729 *
730 * Return 0 on success, -1 if the cache mode was invalid.
731 */
53e8ae01 732int bdrv_parse_cache_mode(const char *mode, int *flags, bool *writethrough)
c3993cdc
SH
733{
734 *flags &= ~BDRV_O_CACHE_MASK;
735
736 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
53e8ae01
KW
737 *writethrough = false;
738 *flags |= BDRV_O_NOCACHE;
92196b2f 739 } else if (!strcmp(mode, "directsync")) {
53e8ae01 740 *writethrough = true;
92196b2f 741 *flags |= BDRV_O_NOCACHE;
c3993cdc 742 } else if (!strcmp(mode, "writeback")) {
53e8ae01 743 *writethrough = false;
c3993cdc 744 } else if (!strcmp(mode, "unsafe")) {
53e8ae01 745 *writethrough = false;
c3993cdc
SH
746 *flags |= BDRV_O_NO_FLUSH;
747 } else if (!strcmp(mode, "writethrough")) {
53e8ae01 748 *writethrough = true;
c3993cdc
SH
749 } else {
750 return -1;
751 }
752
753 return 0;
754}
755
b5411555
KW
756static char *bdrv_child_get_parent_desc(BdrvChild *c)
757{
758 BlockDriverState *parent = c->opaque;
759 return g_strdup(bdrv_get_device_or_node_name(parent));
760}
761
20018e12
KW
762static void bdrv_child_cb_drained_begin(BdrvChild *child)
763{
764 BlockDriverState *bs = child->opaque;
765 bdrv_drained_begin(bs);
766}
767
768static void bdrv_child_cb_drained_end(BdrvChild *child)
769{
770 BlockDriverState *bs = child->opaque;
771 bdrv_drained_end(bs);
772}
773
38701b6a
KW
774static int bdrv_child_cb_inactivate(BdrvChild *child)
775{
776 BlockDriverState *bs = child->opaque;
777 assert(bs->open_flags & BDRV_O_INACTIVE);
778 return 0;
779}
780
b1e6fc08 781/*
73176bee
KW
782 * Returns the options and flags that a temporary snapshot should get, based on
783 * the originally requested flags (the originally requested image will have
784 * flags like a backing file)
b1e6fc08 785 */
73176bee
KW
786static void bdrv_temp_snapshot_options(int *child_flags, QDict *child_options,
787 int parent_flags, QDict *parent_options)
b1e6fc08 788{
73176bee
KW
789 *child_flags = (parent_flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
790
791 /* For temporary files, unconditional cache=unsafe is fine */
73176bee
KW
792 qdict_set_default_str(child_options, BDRV_OPT_CACHE_DIRECT, "off");
793 qdict_set_default_str(child_options, BDRV_OPT_CACHE_NO_FLUSH, "on");
41869044 794
f87a0e29
AG
795 /* Copy the read-only option from the parent */
796 qdict_copy_default(child_options, parent_options, BDRV_OPT_READ_ONLY);
797
41869044
KW
798 /* aio=native doesn't work for cache.direct=off, so disable it for the
799 * temporary snapshot */
800 *child_flags &= ~BDRV_O_NATIVE_AIO;
b1e6fc08
KW
801}
802
0b50cc88 803/*
8e2160e2
KW
804 * Returns the options and flags that bs->file should get if a protocol driver
805 * is expected, based on the given options and flags for the parent BDS
0b50cc88 806 */
8e2160e2
KW
807static void bdrv_inherited_options(int *child_flags, QDict *child_options,
808 int parent_flags, QDict *parent_options)
0b50cc88 809{
8e2160e2
KW
810 int flags = parent_flags;
811
0b50cc88
KW
812 /* Enable protocol handling, disable format probing for bs->file */
813 flags |= BDRV_O_PROTOCOL;
814
91a097e7
KW
815 /* If the cache mode isn't explicitly set, inherit direct and no-flush from
816 * the parent. */
817 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
818 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
5a9347c6 819 qdict_copy_default(child_options, parent_options, BDRV_OPT_FORCE_SHARE);
91a097e7 820
f87a0e29
AG
821 /* Inherit the read-only option from the parent if it's not set */
822 qdict_copy_default(child_options, parent_options, BDRV_OPT_READ_ONLY);
823
0b50cc88 824 /* Our block drivers take care to send flushes and respect unmap policy,
91a097e7
KW
825 * so we can default to enable both on lower layers regardless of the
826 * corresponding parent options. */
818584a4 827 qdict_set_default_str(child_options, BDRV_OPT_DISCARD, "unmap");
0b50cc88 828
0b50cc88 829 /* Clear flags that only apply to the top layer */
abb06c5a
DB
830 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ |
831 BDRV_O_NO_IO);
0b50cc88 832
8e2160e2 833 *child_flags = flags;
0b50cc88
KW
834}
835
f3930ed0 836const BdrvChildRole child_file = {
b5411555 837 .get_parent_desc = bdrv_child_get_parent_desc,
8e2160e2 838 .inherit_options = bdrv_inherited_options,
20018e12
KW
839 .drained_begin = bdrv_child_cb_drained_begin,
840 .drained_end = bdrv_child_cb_drained_end,
38701b6a 841 .inactivate = bdrv_child_cb_inactivate,
f3930ed0
KW
842};
843
844/*
8e2160e2
KW
845 * Returns the options and flags that bs->file should get if the use of formats
846 * (and not only protocols) is permitted for it, based on the given options and
847 * flags for the parent BDS
f3930ed0 848 */
8e2160e2
KW
849static void bdrv_inherited_fmt_options(int *child_flags, QDict *child_options,
850 int parent_flags, QDict *parent_options)
f3930ed0 851{
8e2160e2
KW
852 child_file.inherit_options(child_flags, child_options,
853 parent_flags, parent_options);
854
abb06c5a 855 *child_flags &= ~(BDRV_O_PROTOCOL | BDRV_O_NO_IO);
f3930ed0
KW
856}
857
858const BdrvChildRole child_format = {
b5411555 859 .get_parent_desc = bdrv_child_get_parent_desc,
8e2160e2 860 .inherit_options = bdrv_inherited_fmt_options,
20018e12
KW
861 .drained_begin = bdrv_child_cb_drained_begin,
862 .drained_end = bdrv_child_cb_drained_end,
38701b6a 863 .inactivate = bdrv_child_cb_inactivate,
f3930ed0
KW
864};
865
db95dbba
KW
866static void bdrv_backing_attach(BdrvChild *c)
867{
868 BlockDriverState *parent = c->opaque;
869 BlockDriverState *backing_hd = c->bs;
870
871 assert(!parent->backing_blocker);
872 error_setg(&parent->backing_blocker,
873 "node is used as backing hd of '%s'",
874 bdrv_get_device_or_node_name(parent));
875
876 parent->open_flags &= ~BDRV_O_NO_BACKING;
877 pstrcpy(parent->backing_file, sizeof(parent->backing_file),
878 backing_hd->filename);
879 pstrcpy(parent->backing_format, sizeof(parent->backing_format),
880 backing_hd->drv ? backing_hd->drv->format_name : "");
881
882 bdrv_op_block_all(backing_hd, parent->backing_blocker);
883 /* Otherwise we won't be able to commit or stream */
884 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
885 parent->backing_blocker);
886 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_STREAM,
887 parent->backing_blocker);
888 /*
889 * We do backup in 3 ways:
890 * 1. drive backup
891 * The target bs is new opened, and the source is top BDS
892 * 2. blockdev backup
893 * Both the source and the target are top BDSes.
894 * 3. internal backup(used for block replication)
895 * Both the source and the target are backing file
896 *
897 * In case 1 and 2, neither the source nor the target is the backing file.
898 * In case 3, we will block the top BDS, so there is only one block job
899 * for the top BDS and its backing chain.
900 */
901 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_BACKUP_SOURCE,
902 parent->backing_blocker);
903 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_BACKUP_TARGET,
904 parent->backing_blocker);
905}
906
907static void bdrv_backing_detach(BdrvChild *c)
908{
909 BlockDriverState *parent = c->opaque;
910
911 assert(parent->backing_blocker);
912 bdrv_op_unblock_all(c->bs, parent->backing_blocker);
913 error_free(parent->backing_blocker);
914 parent->backing_blocker = NULL;
915}
916
317fc44e 917/*
8e2160e2
KW
918 * Returns the options and flags that bs->backing should get, based on the
919 * given options and flags for the parent BDS
317fc44e 920 */
8e2160e2
KW
921static void bdrv_backing_options(int *child_flags, QDict *child_options,
922 int parent_flags, QDict *parent_options)
317fc44e 923{
8e2160e2
KW
924 int flags = parent_flags;
925
b8816a43
KW
926 /* The cache mode is inherited unmodified for backing files; except WCE,
927 * which is only applied on the top level (BlockBackend) */
91a097e7
KW
928 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
929 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
5a9347c6 930 qdict_copy_default(child_options, parent_options, BDRV_OPT_FORCE_SHARE);
91a097e7 931
317fc44e 932 /* backing files always opened read-only */
f87a0e29
AG
933 qdict_set_default_str(child_options, BDRV_OPT_READ_ONLY, "on");
934 flags &= ~BDRV_O_COPY_ON_READ;
317fc44e
KW
935
936 /* snapshot=on is handled on the top layer */
8bfea15d 937 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e 938
8e2160e2 939 *child_flags = flags;
317fc44e
KW
940}
941
91ef3825 942const BdrvChildRole child_backing = {
b5411555 943 .get_parent_desc = bdrv_child_get_parent_desc,
db95dbba
KW
944 .attach = bdrv_backing_attach,
945 .detach = bdrv_backing_detach,
8e2160e2 946 .inherit_options = bdrv_backing_options,
20018e12
KW
947 .drained_begin = bdrv_child_cb_drained_begin,
948 .drained_end = bdrv_child_cb_drained_end,
38701b6a 949 .inactivate = bdrv_child_cb_inactivate,
f3930ed0
KW
950};
951
7b272452
KW
952static int bdrv_open_flags(BlockDriverState *bs, int flags)
953{
61de4c68 954 int open_flags = flags;
7b272452
KW
955
956 /*
957 * Clear flags that are internal to the block layer before opening the
958 * image.
959 */
20cca275 960 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
961
962 /*
963 * Snapshots should be writable.
964 */
8bfea15d 965 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
966 open_flags |= BDRV_O_RDWR;
967 }
968
969 return open_flags;
970}
971
91a097e7
KW
972static void update_flags_from_options(int *flags, QemuOpts *opts)
973{
974 *flags &= ~BDRV_O_CACHE_MASK;
975
91a097e7
KW
976 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_NO_FLUSH));
977 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_NO_FLUSH, false)) {
978 *flags |= BDRV_O_NO_FLUSH;
979 }
980
981 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_DIRECT));
982 if (qemu_opt_get_bool(opts, BDRV_OPT_CACHE_DIRECT, false)) {
983 *flags |= BDRV_O_NOCACHE;
984 }
f87a0e29
AG
985
986 *flags &= ~BDRV_O_RDWR;
987
988 assert(qemu_opt_find(opts, BDRV_OPT_READ_ONLY));
989 if (!qemu_opt_get_bool(opts, BDRV_OPT_READ_ONLY, false)) {
990 *flags |= BDRV_O_RDWR;
991 }
992
91a097e7
KW
993}
994
995static void update_options_from_flags(QDict *options, int flags)
996{
91a097e7 997 if (!qdict_haskey(options, BDRV_OPT_CACHE_DIRECT)) {
46f5ac20 998 qdict_put_bool(options, BDRV_OPT_CACHE_DIRECT, flags & BDRV_O_NOCACHE);
91a097e7
KW
999 }
1000 if (!qdict_haskey(options, BDRV_OPT_CACHE_NO_FLUSH)) {
46f5ac20
EB
1001 qdict_put_bool(options, BDRV_OPT_CACHE_NO_FLUSH,
1002 flags & BDRV_O_NO_FLUSH);
91a097e7 1003 }
f87a0e29 1004 if (!qdict_haskey(options, BDRV_OPT_READ_ONLY)) {
46f5ac20 1005 qdict_put_bool(options, BDRV_OPT_READ_ONLY, !(flags & BDRV_O_RDWR));
f87a0e29 1006 }
91a097e7
KW
1007}
1008
636ea370
KW
1009static void bdrv_assign_node_name(BlockDriverState *bs,
1010 const char *node_name,
1011 Error **errp)
6913c0c2 1012{
15489c76 1013 char *gen_node_name = NULL;
6913c0c2 1014
15489c76
JC
1015 if (!node_name) {
1016 node_name = gen_node_name = id_generate(ID_BLOCK);
1017 } else if (!id_wellformed(node_name)) {
1018 /*
1019 * Check for empty string or invalid characters, but not if it is
1020 * generated (generated names use characters not available to the user)
1021 */
9aebf3b8 1022 error_setg(errp, "Invalid node name");
636ea370 1023 return;
6913c0c2
BC
1024 }
1025
0c5e94ee 1026 /* takes care of avoiding namespaces collisions */
7f06d47e 1027 if (blk_by_name(node_name)) {
0c5e94ee
BC
1028 error_setg(errp, "node-name=%s is conflicting with a device id",
1029 node_name);
15489c76 1030 goto out;
0c5e94ee
BC
1031 }
1032
6913c0c2
BC
1033 /* takes care of avoiding duplicates node names */
1034 if (bdrv_find_node(node_name)) {
1035 error_setg(errp, "Duplicate node name");
15489c76 1036 goto out;
6913c0c2
BC
1037 }
1038
1039 /* copy node name into the bs and insert it into the graph list */
1040 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
1041 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
15489c76
JC
1042out:
1043 g_free(gen_node_name);
6913c0c2
BC
1044}
1045
01a56501
KW
1046static int bdrv_open_driver(BlockDriverState *bs, BlockDriver *drv,
1047 const char *node_name, QDict *options,
1048 int open_flags, Error **errp)
1049{
1050 Error *local_err = NULL;
1051 int ret;
1052
1053 bdrv_assign_node_name(bs, node_name, &local_err);
1054 if (local_err) {
1055 error_propagate(errp, local_err);
1056 return -EINVAL;
1057 }
1058
1059 bs->drv = drv;
680c7f96 1060 bs->read_only = !(bs->open_flags & BDRV_O_RDWR);
01a56501
KW
1061 bs->opaque = g_malloc0(drv->instance_size);
1062
1063 if (drv->bdrv_file_open) {
1064 assert(!drv->bdrv_needs_filename || bs->filename[0]);
1065 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
680c7f96 1066 } else if (drv->bdrv_open) {
01a56501 1067 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
680c7f96
KW
1068 } else {
1069 ret = 0;
01a56501
KW
1070 }
1071
1072 if (ret < 0) {
1073 if (local_err) {
1074 error_propagate(errp, local_err);
1075 } else if (bs->filename[0]) {
1076 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
1077 } else {
1078 error_setg_errno(errp, -ret, "Could not open image");
1079 }
1080 goto free_and_fail;
1081 }
1082
1083 ret = refresh_total_sectors(bs, bs->total_sectors);
1084 if (ret < 0) {
1085 error_setg_errno(errp, -ret, "Could not refresh total sector count");
1086 goto free_and_fail;
1087 }
1088
1089 bdrv_refresh_limits(bs, &local_err);
1090 if (local_err) {
1091 error_propagate(errp, local_err);
1092 ret = -EINVAL;
1093 goto free_and_fail;
1094 }
1095
1096 assert(bdrv_opt_mem_align(bs) != 0);
1097 assert(bdrv_min_mem_align(bs) != 0);
1098 assert(is_power_of_2(bs->bl.request_alignment));
1099
1100 return 0;
1101
1102free_and_fail:
1103 /* FIXME Close bs first if already opened*/
1104 g_free(bs->opaque);
1105 bs->opaque = NULL;
1106 bs->drv = NULL;
1107 return ret;
1108}
1109
680c7f96
KW
1110BlockDriverState *bdrv_new_open_driver(BlockDriver *drv, const char *node_name,
1111 int flags, Error **errp)
1112{
1113 BlockDriverState *bs;
1114 int ret;
1115
1116 bs = bdrv_new();
1117 bs->open_flags = flags;
1118 bs->explicit_options = qdict_new();
1119 bs->options = qdict_new();
1120 bs->opaque = NULL;
1121
1122 update_options_from_flags(bs->options, flags);
1123
1124 ret = bdrv_open_driver(bs, drv, node_name, bs->options, flags, errp);
1125 if (ret < 0) {
1126 QDECREF(bs->explicit_options);
1127 QDECREF(bs->options);
1128 bdrv_unref(bs);
1129 return NULL;
1130 }
1131
1132 return bs;
1133}
1134
c5f3014b 1135QemuOptsList bdrv_runtime_opts = {
18edf289
KW
1136 .name = "bdrv_common",
1137 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
1138 .desc = {
1139 {
1140 .name = "node-name",
1141 .type = QEMU_OPT_STRING,
1142 .help = "Node name of the block device node",
1143 },
62392ebb
KW
1144 {
1145 .name = "driver",
1146 .type = QEMU_OPT_STRING,
1147 .help = "Block driver to use for the node",
1148 },
91a097e7
KW
1149 {
1150 .name = BDRV_OPT_CACHE_DIRECT,
1151 .type = QEMU_OPT_BOOL,
1152 .help = "Bypass software writeback cache on the host",
1153 },
1154 {
1155 .name = BDRV_OPT_CACHE_NO_FLUSH,
1156 .type = QEMU_OPT_BOOL,
1157 .help = "Ignore flush requests",
1158 },
f87a0e29
AG
1159 {
1160 .name = BDRV_OPT_READ_ONLY,
1161 .type = QEMU_OPT_BOOL,
1162 .help = "Node is opened in read-only mode",
1163 },
692e01a2
KW
1164 {
1165 .name = "detect-zeroes",
1166 .type = QEMU_OPT_STRING,
1167 .help = "try to optimize zero writes (off, on, unmap)",
1168 },
818584a4
KW
1169 {
1170 .name = "discard",
1171 .type = QEMU_OPT_STRING,
1172 .help = "discard operation (ignore/off, unmap/on)",
1173 },
5a9347c6
FZ
1174 {
1175 .name = BDRV_OPT_FORCE_SHARE,
1176 .type = QEMU_OPT_BOOL,
1177 .help = "always accept other writers (default: off)",
1178 },
18edf289
KW
1179 { /* end of list */ }
1180 },
1181};
1182
57915332
KW
1183/*
1184 * Common part for opening disk images and files
b6ad491a
KW
1185 *
1186 * Removes all processed options from *options.
57915332 1187 */
5696c6e3 1188static int bdrv_open_common(BlockDriverState *bs, BlockBackend *file,
82dc8b41 1189 QDict *options, Error **errp)
57915332
KW
1190{
1191 int ret, open_flags;
035fccdf 1192 const char *filename;
62392ebb 1193 const char *driver_name = NULL;
6913c0c2 1194 const char *node_name = NULL;
818584a4 1195 const char *discard;
692e01a2 1196 const char *detect_zeroes;
18edf289 1197 QemuOpts *opts;
62392ebb 1198 BlockDriver *drv;
34b5d2c6 1199 Error *local_err = NULL;
57915332 1200
6405875c 1201 assert(bs->file == NULL);
707ff828 1202 assert(options != NULL && bs->options != options);
57915332 1203
62392ebb
KW
1204 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
1205 qemu_opts_absorb_qdict(opts, options, &local_err);
1206 if (local_err) {
1207 error_propagate(errp, local_err);
1208 ret = -EINVAL;
1209 goto fail_opts;
1210 }
1211
9b7e8691
AG
1212 update_flags_from_options(&bs->open_flags, opts);
1213
62392ebb
KW
1214 driver_name = qemu_opt_get(opts, "driver");
1215 drv = bdrv_find_format(driver_name);
1216 assert(drv != NULL);
1217
5a9347c6
FZ
1218 bs->force_share = qemu_opt_get_bool(opts, BDRV_OPT_FORCE_SHARE, false);
1219
1220 if (bs->force_share && (bs->open_flags & BDRV_O_RDWR)) {
1221 error_setg(errp,
1222 BDRV_OPT_FORCE_SHARE
1223 "=on can only be used with read-only images");
1224 ret = -EINVAL;
1225 goto fail_opts;
1226 }
1227
45673671 1228 if (file != NULL) {
5696c6e3 1229 filename = blk_bs(file)->filename;
45673671 1230 } else {
129c7d1c
MA
1231 /*
1232 * Caution: while qdict_get_try_str() is fine, getting
1233 * non-string types would require more care. When @options
1234 * come from -blockdev or blockdev_add, its members are typed
1235 * according to the QAPI schema, but when they come from
1236 * -drive, they're all QString.
1237 */
45673671
KW
1238 filename = qdict_get_try_str(options, "filename");
1239 }
1240
4a008240 1241 if (drv->bdrv_needs_filename && (!filename || !filename[0])) {
765003db
KW
1242 error_setg(errp, "The '%s' block driver requires a file name",
1243 drv->format_name);
18edf289
KW
1244 ret = -EINVAL;
1245 goto fail_opts;
6913c0c2 1246 }
6913c0c2 1247
82dc8b41
KW
1248 trace_bdrv_open_common(bs, filename ?: "", bs->open_flags,
1249 drv->format_name);
62392ebb 1250
82dc8b41 1251 bs->read_only = !(bs->open_flags & BDRV_O_RDWR);
b64ec4e4
FZ
1252
1253 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
1254 error_setg(errp,
1255 !bs->read_only && bdrv_is_whitelisted(drv, true)
1256 ? "Driver '%s' can only be used for read-only devices"
1257 : "Driver '%s' is not whitelisted",
1258 drv->format_name);
18edf289
KW
1259 ret = -ENOTSUP;
1260 goto fail_opts;
b64ec4e4 1261 }
57915332 1262
53fec9d3 1263 assert(bs->copy_on_read == 0); /* bdrv_new() and bdrv_close() make it so */
82dc8b41 1264 if (bs->open_flags & BDRV_O_COPY_ON_READ) {
0ebd24e0
KW
1265 if (!bs->read_only) {
1266 bdrv_enable_copy_on_read(bs);
1267 } else {
1268 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
1269 ret = -EINVAL;
1270 goto fail_opts;
0ebd24e0 1271 }
53fec9d3
SH
1272 }
1273
818584a4
KW
1274 discard = qemu_opt_get(opts, "discard");
1275 if (discard != NULL) {
1276 if (bdrv_parse_discard_flags(discard, &bs->open_flags) != 0) {
1277 error_setg(errp, "Invalid discard option");
1278 ret = -EINVAL;
1279 goto fail_opts;
1280 }
1281 }
1282
692e01a2
KW
1283 detect_zeroes = qemu_opt_get(opts, "detect-zeroes");
1284 if (detect_zeroes) {
1285 BlockdevDetectZeroesOptions value =
1286 qapi_enum_parse(BlockdevDetectZeroesOptions_lookup,
1287 detect_zeroes,
1288 BLOCKDEV_DETECT_ZEROES_OPTIONS__MAX,
1289 BLOCKDEV_DETECT_ZEROES_OPTIONS_OFF,
1290 &local_err);
1291 if (local_err) {
1292 error_propagate(errp, local_err);
1293 ret = -EINVAL;
1294 goto fail_opts;
1295 }
1296
1297 if (value == BLOCKDEV_DETECT_ZEROES_OPTIONS_UNMAP &&
1298 !(bs->open_flags & BDRV_O_UNMAP))
1299 {
1300 error_setg(errp, "setting detect-zeroes to unmap is not allowed "
1301 "without setting discard operation to unmap");
1302 ret = -EINVAL;
1303 goto fail_opts;
1304 }
1305
1306 bs->detect_zeroes = value;
1307 }
1308
c2ad1b0c
KW
1309 if (filename != NULL) {
1310 pstrcpy(bs->filename, sizeof(bs->filename), filename);
1311 } else {
1312 bs->filename[0] = '\0';
1313 }
91af7014 1314 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 1315
66f82cee 1316 /* Open the image, either directly or using a protocol */
82dc8b41 1317 open_flags = bdrv_open_flags(bs, bs->open_flags);
01a56501 1318 node_name = qemu_opt_get(opts, "node-name");
57915332 1319
01a56501
KW
1320 assert(!drv->bdrv_file_open || file == NULL);
1321 ret = bdrv_open_driver(bs, drv, node_name, options, open_flags, errp);
51762288 1322 if (ret < 0) {
01a56501 1323 goto fail_opts;
3baca891
KW
1324 }
1325
18edf289 1326 qemu_opts_del(opts);
57915332
KW
1327 return 0;
1328
18edf289
KW
1329fail_opts:
1330 qemu_opts_del(opts);
57915332
KW
1331 return ret;
1332}
1333
5e5c4f63
KW
1334static QDict *parse_json_filename(const char *filename, Error **errp)
1335{
1336 QObject *options_obj;
1337 QDict *options;
1338 int ret;
1339
1340 ret = strstart(filename, "json:", &filename);
1341 assert(ret);
1342
5577fff7 1343 options_obj = qobject_from_json(filename, errp);
5e5c4f63 1344 if (!options_obj) {
5577fff7
MA
1345 /* Work around qobject_from_json() lossage TODO fix that */
1346 if (errp && !*errp) {
1347 error_setg(errp, "Could not parse the JSON options");
1348 return NULL;
1349 }
1350 error_prepend(errp, "Could not parse the JSON options: ");
5e5c4f63
KW
1351 return NULL;
1352 }
1353
ca6b6e1e
MA
1354 options = qobject_to_qdict(options_obj);
1355 if (!options) {
5e5c4f63
KW
1356 qobject_decref(options_obj);
1357 error_setg(errp, "Invalid JSON object given");
1358 return NULL;
1359 }
1360
5e5c4f63
KW
1361 qdict_flatten(options);
1362
1363 return options;
1364}
1365
de3b53f0
KW
1366static void parse_json_protocol(QDict *options, const char **pfilename,
1367 Error **errp)
1368{
1369 QDict *json_options;
1370 Error *local_err = NULL;
1371
1372 /* Parse json: pseudo-protocol */
1373 if (!*pfilename || !g_str_has_prefix(*pfilename, "json:")) {
1374 return;
1375 }
1376
1377 json_options = parse_json_filename(*pfilename, &local_err);
1378 if (local_err) {
1379 error_propagate(errp, local_err);
1380 return;
1381 }
1382
1383 /* Options given in the filename have lower priority than options
1384 * specified directly */
1385 qdict_join(options, json_options, false);
1386 QDECREF(json_options);
1387 *pfilename = NULL;
1388}
1389
b6ce07aa 1390/*
f54120ff
KW
1391 * Fills in default options for opening images and converts the legacy
1392 * filename/flags pair to option QDict entries.
53a29513
HR
1393 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
1394 * block driver has been specified explicitly.
b6ce07aa 1395 */
de3b53f0 1396static int bdrv_fill_options(QDict **options, const char *filename,
053e1578 1397 int *flags, Error **errp)
ea2384d3 1398{
c2ad1b0c 1399 const char *drvname;
53a29513 1400 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 1401 bool parse_filename = false;
053e1578 1402 BlockDriver *drv = NULL;
34b5d2c6 1403 Error *local_err = NULL;
83f64091 1404
129c7d1c
MA
1405 /*
1406 * Caution: while qdict_get_try_str() is fine, getting non-string
1407 * types would require more care. When @options come from
1408 * -blockdev or blockdev_add, its members are typed according to
1409 * the QAPI schema, but when they come from -drive, they're all
1410 * QString.
1411 */
53a29513 1412 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1413 if (drvname) {
1414 drv = bdrv_find_format(drvname);
1415 if (!drv) {
1416 error_setg(errp, "Unknown driver '%s'", drvname);
1417 return -ENOENT;
1418 }
1419 /* If the user has explicitly specified the driver, this choice should
1420 * override the BDRV_O_PROTOCOL flag */
1421 protocol = drv->bdrv_file_open;
53a29513
HR
1422 }
1423
1424 if (protocol) {
1425 *flags |= BDRV_O_PROTOCOL;
1426 } else {
1427 *flags &= ~BDRV_O_PROTOCOL;
1428 }
1429
91a097e7
KW
1430 /* Translate cache options from flags into options */
1431 update_options_from_flags(*options, *flags);
1432
035fccdf 1433 /* Fetch the file name from the options QDict if necessary */
17b005f1 1434 if (protocol && filename) {
f54120ff 1435 if (!qdict_haskey(*options, "filename")) {
46f5ac20 1436 qdict_put_str(*options, "filename", filename);
f54120ff
KW
1437 parse_filename = true;
1438 } else {
1439 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1440 "the same time");
1441 return -EINVAL;
1442 }
035fccdf
KW
1443 }
1444
c2ad1b0c 1445 /* Find the right block driver */
129c7d1c 1446 /* See cautionary note on accessing @options above */
f54120ff 1447 filename = qdict_get_try_str(*options, "filename");
f54120ff 1448
053e1578
HR
1449 if (!drvname && protocol) {
1450 if (filename) {
1451 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1452 if (!drv) {
053e1578 1453 return -EINVAL;
17b005f1 1454 }
053e1578
HR
1455
1456 drvname = drv->format_name;
46f5ac20 1457 qdict_put_str(*options, "driver", drvname);
053e1578
HR
1458 } else {
1459 error_setg(errp, "Must specify either driver or file");
1460 return -EINVAL;
98289620 1461 }
c2ad1b0c
KW
1462 }
1463
17b005f1 1464 assert(drv || !protocol);
c2ad1b0c 1465
f54120ff 1466 /* Driver-specific filename parsing */
17b005f1 1467 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1468 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1469 if (local_err) {
34b5d2c6 1470 error_propagate(errp, local_err);
f54120ff 1471 return -EINVAL;
6963a30d 1472 }
cd5d031e
HR
1473
1474 if (!drv->bdrv_needs_filename) {
1475 qdict_del(*options, "filename");
cd5d031e 1476 }
6963a30d
KW
1477 }
1478
f54120ff
KW
1479 return 0;
1480}
1481
c1cef672
FZ
1482static int bdrv_child_check_perm(BdrvChild *c, uint64_t perm, uint64_t shared,
1483 GSList *ignore_children, Error **errp);
1484static void bdrv_child_abort_perm_update(BdrvChild *c);
1485static void bdrv_child_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared);
1486
ffd1a5a2
FZ
1487static void bdrv_child_perm(BlockDriverState *bs, BlockDriverState *child_bs,
1488 BdrvChild *c,
1489 const BdrvChildRole *role,
1490 uint64_t parent_perm, uint64_t parent_shared,
1491 uint64_t *nperm, uint64_t *nshared)
1492{
1493 if (bs->drv && bs->drv->bdrv_child_perm) {
1494 bs->drv->bdrv_child_perm(bs, c, role,
1495 parent_perm, parent_shared,
1496 nperm, nshared);
1497 }
1498 if (child_bs && child_bs->force_share) {
1499 *nshared = BLK_PERM_ALL;
1500 }
1501}
1502
33a610c3
KW
1503/*
1504 * Check whether permissions on this node can be changed in a way that
1505 * @cumulative_perms and @cumulative_shared_perms are the new cumulative
1506 * permissions of all its parents. This involves checking whether all necessary
1507 * permission changes to child nodes can be performed.
1508 *
1509 * A call to this function must always be followed by a call to bdrv_set_perm()
1510 * or bdrv_abort_perm_update().
1511 */
1512static int bdrv_check_perm(BlockDriverState *bs, uint64_t cumulative_perms,
46181129
KW
1513 uint64_t cumulative_shared_perms,
1514 GSList *ignore_children, Error **errp)
33a610c3
KW
1515{
1516 BlockDriver *drv = bs->drv;
1517 BdrvChild *c;
1518 int ret;
1519
1520 /* Write permissions never work with read-only images */
1521 if ((cumulative_perms & (BLK_PERM_WRITE | BLK_PERM_WRITE_UNCHANGED)) &&
9c5e6594 1522 !bdrv_is_writable(bs))
33a610c3
KW
1523 {
1524 error_setg(errp, "Block node is read-only");
1525 return -EPERM;
1526 }
1527
1528 /* Check this node */
1529 if (!drv) {
1530 return 0;
1531 }
1532
1533 if (drv->bdrv_check_perm) {
1534 return drv->bdrv_check_perm(bs, cumulative_perms,
1535 cumulative_shared_perms, errp);
1536 }
1537
78e421c9 1538 /* Drivers that never have children can omit .bdrv_child_perm() */
33a610c3 1539 if (!drv->bdrv_child_perm) {
78e421c9 1540 assert(QLIST_EMPTY(&bs->children));
33a610c3
KW
1541 return 0;
1542 }
1543
1544 /* Check all children */
1545 QLIST_FOREACH(c, &bs->children, next) {
1546 uint64_t cur_perm, cur_shared;
ffd1a5a2
FZ
1547 bdrv_child_perm(bs, c->bs, c, c->role,
1548 cumulative_perms, cumulative_shared_perms,
1549 &cur_perm, &cur_shared);
46181129
KW
1550 ret = bdrv_child_check_perm(c, cur_perm, cur_shared, ignore_children,
1551 errp);
33a610c3
KW
1552 if (ret < 0) {
1553 return ret;
1554 }
1555 }
1556
1557 return 0;
1558}
1559
1560/*
1561 * Notifies drivers that after a previous bdrv_check_perm() call, the
1562 * permission update is not performed and any preparations made for it (e.g.
1563 * taken file locks) need to be undone.
1564 *
1565 * This function recursively notifies all child nodes.
1566 */
1567static void bdrv_abort_perm_update(BlockDriverState *bs)
1568{
1569 BlockDriver *drv = bs->drv;
1570 BdrvChild *c;
1571
1572 if (!drv) {
1573 return;
1574 }
1575
1576 if (drv->bdrv_abort_perm_update) {
1577 drv->bdrv_abort_perm_update(bs);
1578 }
1579
1580 QLIST_FOREACH(c, &bs->children, next) {
1581 bdrv_child_abort_perm_update(c);
1582 }
1583}
1584
1585static void bdrv_set_perm(BlockDriverState *bs, uint64_t cumulative_perms,
1586 uint64_t cumulative_shared_perms)
1587{
1588 BlockDriver *drv = bs->drv;
1589 BdrvChild *c;
1590
1591 if (!drv) {
1592 return;
1593 }
1594
1595 /* Update this node */
1596 if (drv->bdrv_set_perm) {
1597 drv->bdrv_set_perm(bs, cumulative_perms, cumulative_shared_perms);
1598 }
1599
78e421c9 1600 /* Drivers that never have children can omit .bdrv_child_perm() */
33a610c3 1601 if (!drv->bdrv_child_perm) {
78e421c9 1602 assert(QLIST_EMPTY(&bs->children));
33a610c3
KW
1603 return;
1604 }
1605
1606 /* Update all children */
1607 QLIST_FOREACH(c, &bs->children, next) {
1608 uint64_t cur_perm, cur_shared;
ffd1a5a2
FZ
1609 bdrv_child_perm(bs, c->bs, c, c->role,
1610 cumulative_perms, cumulative_shared_perms,
1611 &cur_perm, &cur_shared);
33a610c3
KW
1612 bdrv_child_set_perm(c, cur_perm, cur_shared);
1613 }
1614}
1615
1616static void bdrv_get_cumulative_perm(BlockDriverState *bs, uint64_t *perm,
1617 uint64_t *shared_perm)
1618{
1619 BdrvChild *c;
1620 uint64_t cumulative_perms = 0;
1621 uint64_t cumulative_shared_perms = BLK_PERM_ALL;
1622
1623 QLIST_FOREACH(c, &bs->parents, next_parent) {
1624 cumulative_perms |= c->perm;
1625 cumulative_shared_perms &= c->shared_perm;
1626 }
1627
1628 *perm = cumulative_perms;
1629 *shared_perm = cumulative_shared_perms;
1630}
1631
d083319f
KW
1632static char *bdrv_child_user_desc(BdrvChild *c)
1633{
1634 if (c->role->get_parent_desc) {
1635 return c->role->get_parent_desc(c);
1636 }
1637
1638 return g_strdup("another user");
1639}
1640
5176196c 1641char *bdrv_perm_names(uint64_t perm)
d083319f
KW
1642{
1643 struct perm_name {
1644 uint64_t perm;
1645 const char *name;
1646 } permissions[] = {
1647 { BLK_PERM_CONSISTENT_READ, "consistent read" },
1648 { BLK_PERM_WRITE, "write" },
1649 { BLK_PERM_WRITE_UNCHANGED, "write unchanged" },
1650 { BLK_PERM_RESIZE, "resize" },
1651 { BLK_PERM_GRAPH_MOD, "change children" },
1652 { 0, NULL }
1653 };
1654
1655 char *result = g_strdup("");
1656 struct perm_name *p;
1657
1658 for (p = permissions; p->name; p++) {
1659 if (perm & p->perm) {
1660 char *old = result;
1661 result = g_strdup_printf("%s%s%s", old, *old ? ", " : "", p->name);
1662 g_free(old);
1663 }
1664 }
1665
1666 return result;
1667}
1668
33a610c3
KW
1669/*
1670 * Checks whether a new reference to @bs can be added if the new user requires
46181129
KW
1671 * @new_used_perm/@new_shared_perm as its permissions. If @ignore_children is
1672 * set, the BdrvChild objects in this list are ignored in the calculations;
1673 * this allows checking permission updates for an existing reference.
33a610c3
KW
1674 *
1675 * Needs to be followed by a call to either bdrv_set_perm() or
1676 * bdrv_abort_perm_update(). */
d5e6f437
KW
1677static int bdrv_check_update_perm(BlockDriverState *bs, uint64_t new_used_perm,
1678 uint64_t new_shared_perm,
46181129 1679 GSList *ignore_children, Error **errp)
d5e6f437
KW
1680{
1681 BdrvChild *c;
33a610c3
KW
1682 uint64_t cumulative_perms = new_used_perm;
1683 uint64_t cumulative_shared_perms = new_shared_perm;
d5e6f437
KW
1684
1685 /* There is no reason why anyone couldn't tolerate write_unchanged */
1686 assert(new_shared_perm & BLK_PERM_WRITE_UNCHANGED);
1687
1688 QLIST_FOREACH(c, &bs->parents, next_parent) {
46181129 1689 if (g_slist_find(ignore_children, c)) {
d5e6f437
KW
1690 continue;
1691 }
1692
d083319f
KW
1693 if ((new_used_perm & c->shared_perm) != new_used_perm) {
1694 char *user = bdrv_child_user_desc(c);
1695 char *perm_names = bdrv_perm_names(new_used_perm & ~c->shared_perm);
1696 error_setg(errp, "Conflicts with use by %s as '%s', which does not "
1697 "allow '%s' on %s",
1698 user, c->name, perm_names, bdrv_get_node_name(c->bs));
1699 g_free(user);
1700 g_free(perm_names);
1701 return -EPERM;
1702 }
1703
1704 if ((c->perm & new_shared_perm) != c->perm) {
1705 char *user = bdrv_child_user_desc(c);
1706 char *perm_names = bdrv_perm_names(c->perm & ~new_shared_perm);
1707 error_setg(errp, "Conflicts with use by %s as '%s', which uses "
1708 "'%s' on %s",
1709 user, c->name, perm_names, bdrv_get_node_name(c->bs));
1710 g_free(user);
1711 g_free(perm_names);
d5e6f437
KW
1712 return -EPERM;
1713 }
33a610c3
KW
1714
1715 cumulative_perms |= c->perm;
1716 cumulative_shared_perms &= c->shared_perm;
d5e6f437
KW
1717 }
1718
46181129
KW
1719 return bdrv_check_perm(bs, cumulative_perms, cumulative_shared_perms,
1720 ignore_children, errp);
33a610c3
KW
1721}
1722
1723/* Needs to be followed by a call to either bdrv_child_set_perm() or
1724 * bdrv_child_abort_perm_update(). */
c1cef672
FZ
1725static int bdrv_child_check_perm(BdrvChild *c, uint64_t perm, uint64_t shared,
1726 GSList *ignore_children, Error **errp)
33a610c3 1727{
46181129
KW
1728 int ret;
1729
1730 ignore_children = g_slist_prepend(g_slist_copy(ignore_children), c);
1731 ret = bdrv_check_update_perm(c->bs, perm, shared, ignore_children, errp);
1732 g_slist_free(ignore_children);
1733
1734 return ret;
33a610c3
KW
1735}
1736
c1cef672 1737static void bdrv_child_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared)
33a610c3
KW
1738{
1739 uint64_t cumulative_perms, cumulative_shared_perms;
1740
1741 c->perm = perm;
1742 c->shared_perm = shared;
1743
1744 bdrv_get_cumulative_perm(c->bs, &cumulative_perms,
1745 &cumulative_shared_perms);
1746 bdrv_set_perm(c->bs, cumulative_perms, cumulative_shared_perms);
1747}
1748
c1cef672 1749static void bdrv_child_abort_perm_update(BdrvChild *c)
33a610c3
KW
1750{
1751 bdrv_abort_perm_update(c->bs);
1752}
1753
1754int bdrv_child_try_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared,
1755 Error **errp)
1756{
1757 int ret;
1758
46181129 1759 ret = bdrv_child_check_perm(c, perm, shared, NULL, errp);
33a610c3
KW
1760 if (ret < 0) {
1761 bdrv_child_abort_perm_update(c);
1762 return ret;
1763 }
1764
1765 bdrv_child_set_perm(c, perm, shared);
1766
d5e6f437
KW
1767 return 0;
1768}
1769
6a1b9ee1
KW
1770#define DEFAULT_PERM_PASSTHROUGH (BLK_PERM_CONSISTENT_READ \
1771 | BLK_PERM_WRITE \
1772 | BLK_PERM_WRITE_UNCHANGED \
1773 | BLK_PERM_RESIZE)
1774#define DEFAULT_PERM_UNCHANGED (BLK_PERM_ALL & ~DEFAULT_PERM_PASSTHROUGH)
1775
1776void bdrv_filter_default_perms(BlockDriverState *bs, BdrvChild *c,
1777 const BdrvChildRole *role,
1778 uint64_t perm, uint64_t shared,
1779 uint64_t *nperm, uint64_t *nshared)
1780{
1781 if (c == NULL) {
1782 *nperm = perm & DEFAULT_PERM_PASSTHROUGH;
1783 *nshared = (shared & DEFAULT_PERM_PASSTHROUGH) | DEFAULT_PERM_UNCHANGED;
1784 return;
1785 }
1786
1787 *nperm = (perm & DEFAULT_PERM_PASSTHROUGH) |
1788 (c->perm & DEFAULT_PERM_UNCHANGED);
1789 *nshared = (shared & DEFAULT_PERM_PASSTHROUGH) |
1790 (c->shared_perm & DEFAULT_PERM_UNCHANGED);
1791}
1792
6b1a044a
KW
1793void bdrv_format_default_perms(BlockDriverState *bs, BdrvChild *c,
1794 const BdrvChildRole *role,
1795 uint64_t perm, uint64_t shared,
1796 uint64_t *nperm, uint64_t *nshared)
1797{
1798 bool backing = (role == &child_backing);
1799 assert(role == &child_backing || role == &child_file);
1800
1801 if (!backing) {
1802 /* Apart from the modifications below, the same permissions are
1803 * forwarded and left alone as for filters */
1804 bdrv_filter_default_perms(bs, c, role, perm, shared, &perm, &shared);
1805
1806 /* Format drivers may touch metadata even if the guest doesn't write */
9c5e6594 1807 if (bdrv_is_writable(bs)) {
6b1a044a
KW
1808 perm |= BLK_PERM_WRITE | BLK_PERM_RESIZE;
1809 }
1810
1811 /* bs->file always needs to be consistent because of the metadata. We
1812 * can never allow other users to resize or write to it. */
1813 perm |= BLK_PERM_CONSISTENT_READ;
1814 shared &= ~(BLK_PERM_WRITE | BLK_PERM_RESIZE);
1815 } else {
1816 /* We want consistent read from backing files if the parent needs it.
1817 * No other operations are performed on backing files. */
1818 perm &= BLK_PERM_CONSISTENT_READ;
1819
1820 /* If the parent can deal with changing data, we're okay with a
1821 * writable and resizable backing file. */
1822 /* TODO Require !(perm & BLK_PERM_CONSISTENT_READ), too? */
1823 if (shared & BLK_PERM_WRITE) {
1824 shared = BLK_PERM_WRITE | BLK_PERM_RESIZE;
1825 } else {
1826 shared = 0;
1827 }
1828
1829 shared |= BLK_PERM_CONSISTENT_READ | BLK_PERM_GRAPH_MOD |
1830 BLK_PERM_WRITE_UNCHANGED;
1831 }
1832
9c5e6594
KW
1833 if (bs->open_flags & BDRV_O_INACTIVE) {
1834 shared |= BLK_PERM_WRITE | BLK_PERM_RESIZE;
1835 }
1836
6b1a044a
KW
1837 *nperm = perm;
1838 *nshared = shared;
1839}
1840
8ee03995
KW
1841static void bdrv_replace_child_noperm(BdrvChild *child,
1842 BlockDriverState *new_bs)
e9740bc6
KW
1843{
1844 BlockDriverState *old_bs = child->bs;
1845
bb2614e9
FZ
1846 if (old_bs && new_bs) {
1847 assert(bdrv_get_aio_context(old_bs) == bdrv_get_aio_context(new_bs));
1848 }
e9740bc6 1849 if (old_bs) {
36fe1331
KW
1850 if (old_bs->quiesce_counter && child->role->drained_end) {
1851 child->role->drained_end(child);
1852 }
db95dbba
KW
1853 if (child->role->detach) {
1854 child->role->detach(child);
1855 }
e9740bc6
KW
1856 QLIST_REMOVE(child, next_parent);
1857 }
36fe1331
KW
1858
1859 child->bs = new_bs;
1860
e9740bc6
KW
1861 if (new_bs) {
1862 QLIST_INSERT_HEAD(&new_bs->parents, child, next_parent);
36fe1331
KW
1863 if (new_bs->quiesce_counter && child->role->drained_begin) {
1864 child->role->drained_begin(child);
1865 }
33a610c3 1866
8ee03995
KW
1867 if (child->role->attach) {
1868 child->role->attach(child);
1869 }
1870 }
1871}
33a610c3 1872
466787fb
KW
1873/*
1874 * Updates @child to change its reference to point to @new_bs, including
1875 * checking and applying the necessary permisson updates both to the old node
1876 * and to @new_bs.
1877 *
1878 * NULL is passed as @new_bs for removing the reference before freeing @child.
1879 *
1880 * If @new_bs is not NULL, bdrv_check_perm() must be called beforehand, as this
1881 * function uses bdrv_set_perm() to update the permissions according to the new
1882 * reference that @new_bs gets.
1883 */
1884static void bdrv_replace_child(BdrvChild *child, BlockDriverState *new_bs)
8ee03995
KW
1885{
1886 BlockDriverState *old_bs = child->bs;
1887 uint64_t perm, shared_perm;
1888
1889 if (old_bs) {
33a610c3
KW
1890 /* Update permissions for old node. This is guaranteed to succeed
1891 * because we're just taking a parent away, so we're loosening
1892 * restrictions. */
1893 bdrv_get_cumulative_perm(old_bs, &perm, &shared_perm);
46181129 1894 bdrv_check_perm(old_bs, perm, shared_perm, NULL, &error_abort);
33a610c3 1895 bdrv_set_perm(old_bs, perm, shared_perm);
e9740bc6 1896 }
36fe1331 1897
8ee03995 1898 bdrv_replace_child_noperm(child, new_bs);
36fe1331 1899
e9740bc6 1900 if (new_bs) {
33a610c3 1901 bdrv_get_cumulative_perm(new_bs, &perm, &shared_perm);
33a610c3 1902 bdrv_set_perm(new_bs, perm, shared_perm);
e9740bc6 1903 }
e9740bc6
KW
1904}
1905
f21d96d0
KW
1906BdrvChild *bdrv_root_attach_child(BlockDriverState *child_bs,
1907 const char *child_name,
36fe1331 1908 const BdrvChildRole *child_role,
d5e6f437
KW
1909 uint64_t perm, uint64_t shared_perm,
1910 void *opaque, Error **errp)
df581792 1911{
d5e6f437
KW
1912 BdrvChild *child;
1913 int ret;
1914
1915 ret = bdrv_check_update_perm(child_bs, perm, shared_perm, NULL, errp);
1916 if (ret < 0) {
33a610c3 1917 bdrv_abort_perm_update(child_bs);
d5e6f437
KW
1918 return NULL;
1919 }
1920
1921 child = g_new(BdrvChild, 1);
df581792 1922 *child = (BdrvChild) {
d5e6f437
KW
1923 .bs = NULL,
1924 .name = g_strdup(child_name),
1925 .role = child_role,
1926 .perm = perm,
1927 .shared_perm = shared_perm,
1928 .opaque = opaque,
df581792
KW
1929 };
1930
33a610c3 1931 /* This performs the matching bdrv_set_perm() for the above check. */
466787fb 1932 bdrv_replace_child(child, child_bs);
b4b059f6
KW
1933
1934 return child;
df581792
KW
1935}
1936
98292c61
WC
1937BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
1938 BlockDriverState *child_bs,
1939 const char *child_name,
8b2ff529
KW
1940 const BdrvChildRole *child_role,
1941 Error **errp)
f21d96d0 1942{
d5e6f437 1943 BdrvChild *child;
f68c598b
KW
1944 uint64_t perm, shared_perm;
1945
1946 bdrv_get_cumulative_perm(parent_bs, &perm, &shared_perm);
1947
1948 assert(parent_bs->drv);
bb2614e9 1949 assert(bdrv_get_aio_context(parent_bs) == bdrv_get_aio_context(child_bs));
ffd1a5a2
FZ
1950 bdrv_child_perm(parent_bs, child_bs, NULL, child_role,
1951 perm, shared_perm, &perm, &shared_perm);
d5e6f437 1952
d5e6f437 1953 child = bdrv_root_attach_child(child_bs, child_name, child_role,
f68c598b 1954 perm, shared_perm, parent_bs, errp);
d5e6f437
KW
1955 if (child == NULL) {
1956 return NULL;
1957 }
1958
f21d96d0
KW
1959 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
1960 return child;
1961}
1962
3f09bfbc 1963static void bdrv_detach_child(BdrvChild *child)
33a60407 1964{
f21d96d0
KW
1965 if (child->next.le_prev) {
1966 QLIST_REMOVE(child, next);
1967 child->next.le_prev = NULL;
1968 }
e9740bc6 1969
466787fb 1970 bdrv_replace_child(child, NULL);
e9740bc6 1971
260fecf1 1972 g_free(child->name);
33a60407
KW
1973 g_free(child);
1974}
1975
f21d96d0 1976void bdrv_root_unref_child(BdrvChild *child)
33a60407 1977{
779020cb
KW
1978 BlockDriverState *child_bs;
1979
f21d96d0
KW
1980 child_bs = child->bs;
1981 bdrv_detach_child(child);
1982 bdrv_unref(child_bs);
1983}
1984
1985void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
1986{
779020cb
KW
1987 if (child == NULL) {
1988 return;
1989 }
33a60407
KW
1990
1991 if (child->bs->inherits_from == parent) {
4e4bf5c4
KW
1992 BdrvChild *c;
1993
1994 /* Remove inherits_from only when the last reference between parent and
1995 * child->bs goes away. */
1996 QLIST_FOREACH(c, &parent->children, next) {
1997 if (c != child && c->bs == child->bs) {
1998 break;
1999 }
2000 }
2001 if (c == NULL) {
2002 child->bs->inherits_from = NULL;
2003 }
33a60407
KW
2004 }
2005
f21d96d0 2006 bdrv_root_unref_child(child);
33a60407
KW
2007}
2008
5c8cab48
KW
2009
2010static void bdrv_parent_cb_change_media(BlockDriverState *bs, bool load)
2011{
2012 BdrvChild *c;
2013 QLIST_FOREACH(c, &bs->parents, next_parent) {
2014 if (c->role->change_media) {
2015 c->role->change_media(c, load);
2016 }
2017 }
2018}
2019
2020static void bdrv_parent_cb_resize(BlockDriverState *bs)
2021{
2022 BdrvChild *c;
2023 QLIST_FOREACH(c, &bs->parents, next_parent) {
2024 if (c->role->resize) {
2025 c->role->resize(c);
2026 }
2027 }
2028}
2029
5db15a57
KW
2030/*
2031 * Sets the backing file link of a BDS. A new reference is created; callers
2032 * which don't need their own reference any more must call bdrv_unref().
2033 */
12fa4af6
KW
2034void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd,
2035 Error **errp)
8d24cce1 2036{
5db15a57
KW
2037 if (backing_hd) {
2038 bdrv_ref(backing_hd);
2039 }
8d24cce1 2040
760e0063 2041 if (bs->backing) {
5db15a57 2042 bdrv_unref_child(bs, bs->backing);
826b6ca0
FZ
2043 }
2044
8d24cce1 2045 if (!backing_hd) {
760e0063 2046 bs->backing = NULL;
8d24cce1
FZ
2047 goto out;
2048 }
12fa4af6 2049
8b2ff529 2050 bs->backing = bdrv_attach_child(bs, backing_hd, "backing", &child_backing,
12fa4af6
KW
2051 errp);
2052 if (!bs->backing) {
2053 bdrv_unref(backing_hd);
2054 }
826b6ca0 2055
9e7e940c
KW
2056 bdrv_refresh_filename(bs);
2057
8d24cce1 2058out:
3baca891 2059 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
2060}
2061
31ca6d07
KW
2062/*
2063 * Opens the backing file for a BlockDriverState if not yet open
2064 *
d9b7b057
KW
2065 * bdref_key specifies the key for the image's BlockdevRef in the options QDict.
2066 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
2067 * itself, all options starting with "${bdref_key}." are considered part of the
2068 * BlockdevRef.
2069 *
2070 * TODO Can this be unified with bdrv_open_image()?
31ca6d07 2071 */
d9b7b057
KW
2072int bdrv_open_backing_file(BlockDriverState *bs, QDict *parent_options,
2073 const char *bdref_key, Error **errp)
9156df12 2074{
1ba4b6a5 2075 char *backing_filename = g_malloc0(PATH_MAX);
d9b7b057
KW
2076 char *bdref_key_dot;
2077 const char *reference = NULL;
317fc44e 2078 int ret = 0;
8d24cce1 2079 BlockDriverState *backing_hd;
d9b7b057
KW
2080 QDict *options;
2081 QDict *tmp_parent_options = NULL;
34b5d2c6 2082 Error *local_err = NULL;
9156df12 2083
760e0063 2084 if (bs->backing != NULL) {
1ba4b6a5 2085 goto free_exit;
9156df12
PB
2086 }
2087
31ca6d07 2088 /* NULL means an empty set of options */
d9b7b057
KW
2089 if (parent_options == NULL) {
2090 tmp_parent_options = qdict_new();
2091 parent_options = tmp_parent_options;
31ca6d07
KW
2092 }
2093
9156df12 2094 bs->open_flags &= ~BDRV_O_NO_BACKING;
d9b7b057
KW
2095
2096 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
2097 qdict_extract_subqdict(parent_options, &options, bdref_key_dot);
2098 g_free(bdref_key_dot);
2099
129c7d1c
MA
2100 /*
2101 * Caution: while qdict_get_try_str() is fine, getting non-string
2102 * types would require more care. When @parent_options come from
2103 * -blockdev or blockdev_add, its members are typed according to
2104 * the QAPI schema, but when they come from -drive, they're all
2105 * QString.
2106 */
d9b7b057
KW
2107 reference = qdict_get_try_str(parent_options, bdref_key);
2108 if (reference || qdict_haskey(options, "file.filename")) {
1cb6f506
KW
2109 backing_filename[0] = '\0';
2110 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 2111 QDECREF(options);
1ba4b6a5 2112 goto free_exit;
dbecebdd 2113 } else {
9f07429e
HR
2114 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
2115 &local_err);
2116 if (local_err) {
2117 ret = -EINVAL;
2118 error_propagate(errp, local_err);
2119 QDECREF(options);
2120 goto free_exit;
2121 }
9156df12
PB
2122 }
2123
8ee79e70
KW
2124 if (!bs->drv || !bs->drv->supports_backing) {
2125 ret = -EINVAL;
2126 error_setg(errp, "Driver doesn't support backing files");
2127 QDECREF(options);
2128 goto free_exit;
2129 }
2130
c5f6e493 2131 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
46f5ac20 2132 qdict_put_str(options, "driver", bs->backing_format);
9156df12
PB
2133 }
2134
5b363937
HR
2135 backing_hd = bdrv_open_inherit(*backing_filename ? backing_filename : NULL,
2136 reference, options, 0, bs, &child_backing,
2137 errp);
2138 if (!backing_hd) {
9156df12 2139 bs->open_flags |= BDRV_O_NO_BACKING;
e43bfd9c 2140 error_prepend(errp, "Could not open backing file: ");
5b363937 2141 ret = -EINVAL;
1ba4b6a5 2142 goto free_exit;
9156df12 2143 }
df581792 2144
5db15a57
KW
2145 /* Hook up the backing file link; drop our reference, bs owns the
2146 * backing_hd reference now */
12fa4af6 2147 bdrv_set_backing_hd(bs, backing_hd, &local_err);
5db15a57 2148 bdrv_unref(backing_hd);
12fa4af6 2149 if (local_err) {
8cd1a3e4 2150 error_propagate(errp, local_err);
12fa4af6
KW
2151 ret = -EINVAL;
2152 goto free_exit;
2153 }
d80ac658 2154
d9b7b057
KW
2155 qdict_del(parent_options, bdref_key);
2156
1ba4b6a5
BC
2157free_exit:
2158 g_free(backing_filename);
d9b7b057 2159 QDECREF(tmp_parent_options);
1ba4b6a5 2160 return ret;
9156df12
PB
2161}
2162
2d6b86af
KW
2163static BlockDriverState *
2164bdrv_open_child_bs(const char *filename, QDict *options, const char *bdref_key,
2165 BlockDriverState *parent, const BdrvChildRole *child_role,
2166 bool allow_none, Error **errp)
da557aac 2167{
2d6b86af 2168 BlockDriverState *bs = NULL;
da557aac 2169 QDict *image_options;
da557aac
HR
2170 char *bdref_key_dot;
2171 const char *reference;
2172
df581792 2173 assert(child_role != NULL);
f67503e5 2174
da557aac
HR
2175 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
2176 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
2177 g_free(bdref_key_dot);
2178
129c7d1c
MA
2179 /*
2180 * Caution: while qdict_get_try_str() is fine, getting non-string
2181 * types would require more care. When @options come from
2182 * -blockdev or blockdev_add, its members are typed according to
2183 * the QAPI schema, but when they come from -drive, they're all
2184 * QString.
2185 */
da557aac
HR
2186 reference = qdict_get_try_str(options, bdref_key);
2187 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 2188 if (!allow_none) {
da557aac
HR
2189 error_setg(errp, "A block device must be specified for \"%s\"",
2190 bdref_key);
da557aac 2191 }
b20e61e0 2192 QDECREF(image_options);
da557aac
HR
2193 goto done;
2194 }
2195
5b363937
HR
2196 bs = bdrv_open_inherit(filename, reference, image_options, 0,
2197 parent, child_role, errp);
2198 if (!bs) {
df581792
KW
2199 goto done;
2200 }
2201
da557aac
HR
2202done:
2203 qdict_del(options, bdref_key);
2d6b86af
KW
2204 return bs;
2205}
2206
2207/*
2208 * Opens a disk image whose options are given as BlockdevRef in another block
2209 * device's options.
2210 *
2211 * If allow_none is true, no image will be opened if filename is false and no
2212 * BlockdevRef is given. NULL will be returned, but errp remains unset.
2213 *
2214 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
2215 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
2216 * itself, all options starting with "${bdref_key}." are considered part of the
2217 * BlockdevRef.
2218 *
2219 * The BlockdevRef will be removed from the options QDict.
2220 */
2221BdrvChild *bdrv_open_child(const char *filename,
2222 QDict *options, const char *bdref_key,
2223 BlockDriverState *parent,
2224 const BdrvChildRole *child_role,
2225 bool allow_none, Error **errp)
2226{
8b2ff529 2227 BdrvChild *c;
2d6b86af
KW
2228 BlockDriverState *bs;
2229
2230 bs = bdrv_open_child_bs(filename, options, bdref_key, parent, child_role,
2231 allow_none, errp);
2232 if (bs == NULL) {
2233 return NULL;
2234 }
2235
8b2ff529
KW
2236 c = bdrv_attach_child(parent, bs, bdref_key, child_role, errp);
2237 if (!c) {
2238 bdrv_unref(bs);
2239 return NULL;
2240 }
2241
2242 return c;
b4b059f6
KW
2243}
2244
66836189
HR
2245static BlockDriverState *bdrv_append_temp_snapshot(BlockDriverState *bs,
2246 int flags,
2247 QDict *snapshot_options,
2248 Error **errp)
b998875d
KW
2249{
2250 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 2251 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 2252 int64_t total_size;
83d0521a 2253 QemuOpts *opts = NULL;
ff6ed714 2254 BlockDriverState *bs_snapshot = NULL;
b2c2832c 2255 Error *local_err = NULL;
b998875d
KW
2256 int ret;
2257
2258 /* if snapshot, we create a temporary backing file and open it
2259 instead of opening 'filename' directly */
2260
2261 /* Get the required size from the image */
f187743a
KW
2262 total_size = bdrv_getlength(bs);
2263 if (total_size < 0) {
2264 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 2265 goto out;
f187743a 2266 }
b998875d
KW
2267
2268 /* Create the temporary image */
1ba4b6a5 2269 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
2270 if (ret < 0) {
2271 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 2272 goto out;
b998875d
KW
2273 }
2274
ef810437 2275 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 2276 &error_abort);
39101f25 2277 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
e43bfd9c 2278 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, errp);
83d0521a 2279 qemu_opts_del(opts);
b998875d 2280 if (ret < 0) {
e43bfd9c
MA
2281 error_prepend(errp, "Could not create temporary overlay '%s': ",
2282 tmp_filename);
1ba4b6a5 2283 goto out;
b998875d
KW
2284 }
2285
73176bee 2286 /* Prepare options QDict for the temporary file */
46f5ac20
EB
2287 qdict_put_str(snapshot_options, "file.driver", "file");
2288 qdict_put_str(snapshot_options, "file.filename", tmp_filename);
2289 qdict_put_str(snapshot_options, "driver", "qcow2");
b998875d 2290
5b363937 2291 bs_snapshot = bdrv_open(NULL, NULL, snapshot_options, flags, errp);
73176bee 2292 snapshot_options = NULL;
5b363937 2293 if (!bs_snapshot) {
1ba4b6a5 2294 goto out;
b998875d
KW
2295 }
2296
ff6ed714
EB
2297 /* bdrv_append() consumes a strong reference to bs_snapshot
2298 * (i.e. it will call bdrv_unref() on it) even on error, so in
2299 * order to be able to return one, we have to increase
2300 * bs_snapshot's refcount here */
66836189 2301 bdrv_ref(bs_snapshot);
b2c2832c
KW
2302 bdrv_append(bs_snapshot, bs, &local_err);
2303 if (local_err) {
2304 error_propagate(errp, local_err);
ff6ed714 2305 bs_snapshot = NULL;
b2c2832c
KW
2306 goto out;
2307 }
1ba4b6a5
BC
2308
2309out:
73176bee 2310 QDECREF(snapshot_options);
1ba4b6a5 2311 g_free(tmp_filename);
ff6ed714 2312 return bs_snapshot;
b998875d
KW
2313}
2314
b6ce07aa
KW
2315/*
2316 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
2317 *
2318 * options is a QDict of options to pass to the block drivers, or NULL for an
2319 * empty set of options. The reference to the QDict belongs to the block layer
2320 * after the call (even on failure), so if the caller intends to reuse the
2321 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
2322 *
2323 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
2324 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
2325 *
2326 * The reference parameter may be used to specify an existing block device which
2327 * should be opened. If specified, neither options nor a filename may be given,
2328 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 2329 */
5b363937
HR
2330static BlockDriverState *bdrv_open_inherit(const char *filename,
2331 const char *reference,
2332 QDict *options, int flags,
2333 BlockDriverState *parent,
2334 const BdrvChildRole *child_role,
2335 Error **errp)
ea2384d3 2336{
b6ce07aa 2337 int ret;
5696c6e3 2338 BlockBackend *file = NULL;
9a4f4c31 2339 BlockDriverState *bs;
ce343771 2340 BlockDriver *drv = NULL;
74fe54f2 2341 const char *drvname;
3e8c2e57 2342 const char *backing;
34b5d2c6 2343 Error *local_err = NULL;
73176bee 2344 QDict *snapshot_options = NULL;
b1e6fc08 2345 int snapshot_flags = 0;
712e7874 2346
f3930ed0
KW
2347 assert(!child_role || !flags);
2348 assert(!child_role == !parent);
f67503e5 2349
ddf5636d
HR
2350 if (reference) {
2351 bool options_non_empty = options ? qdict_size(options) : false;
2352 QDECREF(options);
2353
ddf5636d
HR
2354 if (filename || options_non_empty) {
2355 error_setg(errp, "Cannot reference an existing block device with "
2356 "additional options or a new filename");
5b363937 2357 return NULL;
ddf5636d
HR
2358 }
2359
2360 bs = bdrv_lookup_bs(reference, reference, errp);
2361 if (!bs) {
5b363937 2362 return NULL;
ddf5636d 2363 }
76b22320 2364
ddf5636d 2365 bdrv_ref(bs);
5b363937 2366 return bs;
ddf5636d
HR
2367 }
2368
5b363937 2369 bs = bdrv_new();
f67503e5 2370
de9c0cec
KW
2371 /* NULL means an empty set of options */
2372 if (options == NULL) {
2373 options = qdict_new();
2374 }
2375
145f598e 2376 /* json: syntax counts as explicit options, as if in the QDict */
de3b53f0
KW
2377 parse_json_protocol(options, &filename, &local_err);
2378 if (local_err) {
de3b53f0
KW
2379 goto fail;
2380 }
2381
145f598e
KW
2382 bs->explicit_options = qdict_clone_shallow(options);
2383
f3930ed0 2384 if (child_role) {
bddcec37 2385 bs->inherits_from = parent;
8e2160e2
KW
2386 child_role->inherit_options(&flags, options,
2387 parent->open_flags, parent->options);
f3930ed0
KW
2388 }
2389
de3b53f0 2390 ret = bdrv_fill_options(&options, filename, &flags, &local_err);
462f5bcf
KW
2391 if (local_err) {
2392 goto fail;
2393 }
2394
129c7d1c
MA
2395 /*
2396 * Set the BDRV_O_RDWR and BDRV_O_ALLOW_RDWR flags.
2397 * Caution: getting a boolean member of @options requires care.
2398 * When @options come from -blockdev or blockdev_add, members are
2399 * typed according to the QAPI schema, but when they come from
2400 * -drive, they're all QString.
2401 */
f87a0e29
AG
2402 if (g_strcmp0(qdict_get_try_str(options, BDRV_OPT_READ_ONLY), "on") &&
2403 !qdict_get_try_bool(options, BDRV_OPT_READ_ONLY, false)) {
2404 flags |= (BDRV_O_RDWR | BDRV_O_ALLOW_RDWR);
2405 } else {
2406 flags &= ~BDRV_O_RDWR;
14499ea5
AG
2407 }
2408
2409 if (flags & BDRV_O_SNAPSHOT) {
2410 snapshot_options = qdict_new();
2411 bdrv_temp_snapshot_options(&snapshot_flags, snapshot_options,
2412 flags, options);
f87a0e29
AG
2413 /* Let bdrv_backing_options() override "read-only" */
2414 qdict_del(options, BDRV_OPT_READ_ONLY);
14499ea5
AG
2415 bdrv_backing_options(&flags, options, flags, options);
2416 }
2417
62392ebb
KW
2418 bs->open_flags = flags;
2419 bs->options = options;
2420 options = qdict_clone_shallow(options);
2421
76c591b0 2422 /* Find the right image format driver */
129c7d1c 2423 /* See cautionary note on accessing @options above */
76c591b0
KW
2424 drvname = qdict_get_try_str(options, "driver");
2425 if (drvname) {
2426 drv = bdrv_find_format(drvname);
76c591b0
KW
2427 if (!drv) {
2428 error_setg(errp, "Unknown driver: '%s'", drvname);
76c591b0
KW
2429 goto fail;
2430 }
2431 }
2432
2433 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 2434
129c7d1c 2435 /* See cautionary note on accessing @options above */
3e8c2e57
AG
2436 backing = qdict_get_try_str(options, "backing");
2437 if (backing && *backing == '\0') {
2438 flags |= BDRV_O_NO_BACKING;
2439 qdict_del(options, "backing");
2440 }
2441
5696c6e3 2442 /* Open image file without format layer. This BlockBackend is only used for
4e4bf5c4
KW
2443 * probing, the block drivers will do their own bdrv_open_child() for the
2444 * same BDS, which is why we put the node name back into options. */
f4788adc 2445 if ((flags & BDRV_O_PROTOCOL) == 0) {
5696c6e3
KW
2446 BlockDriverState *file_bs;
2447
2448 file_bs = bdrv_open_child_bs(filename, options, "file", bs,
2449 &child_file, true, &local_err);
1fdd6933 2450 if (local_err) {
f4788adc
KW
2451 goto fail;
2452 }
5696c6e3 2453 if (file_bs != NULL) {
6d0eb64d 2454 file = blk_new(BLK_PERM_CONSISTENT_READ, BLK_PERM_ALL);
d7086422 2455 blk_insert_bs(file, file_bs, &local_err);
5696c6e3 2456 bdrv_unref(file_bs);
d7086422
KW
2457 if (local_err) {
2458 goto fail;
2459 }
5696c6e3 2460
46f5ac20 2461 qdict_put_str(options, "file", bdrv_get_node_name(file_bs));
4e4bf5c4 2462 }
f500a6d3
KW
2463 }
2464
76c591b0 2465 /* Image format probing */
38f3ef57 2466 bs->probed = !drv;
76c591b0 2467 if (!drv && file) {
cf2ab8fc 2468 ret = find_image_format(file, filename, &drv, &local_err);
17b005f1 2469 if (ret < 0) {
8bfea15d 2470 goto fail;
2a05cbe4 2471 }
62392ebb
KW
2472 /*
2473 * This option update would logically belong in bdrv_fill_options(),
2474 * but we first need to open bs->file for the probing to work, while
2475 * opening bs->file already requires the (mostly) final set of options
2476 * so that cache mode etc. can be inherited.
2477 *
2478 * Adding the driver later is somewhat ugly, but it's not an option
2479 * that would ever be inherited, so it's correct. We just need to make
2480 * sure to update both bs->options (which has the full effective
2481 * options for bs) and options (which has file.* already removed).
2482 */
46f5ac20
EB
2483 qdict_put_str(bs->options, "driver", drv->format_name);
2484 qdict_put_str(options, "driver", drv->format_name);
76c591b0 2485 } else if (!drv) {
17b005f1 2486 error_setg(errp, "Must specify either driver or file");
8bfea15d 2487 goto fail;
ea2384d3 2488 }
b6ce07aa 2489
53a29513
HR
2490 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
2491 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
2492 /* file must be NULL if a protocol BDS is about to be created
2493 * (the inverse results in an error message from bdrv_open_common()) */
2494 assert(!(flags & BDRV_O_PROTOCOL) || !file);
2495
b6ce07aa 2496 /* Open the image */
82dc8b41 2497 ret = bdrv_open_common(bs, file, options, &local_err);
b6ce07aa 2498 if (ret < 0) {
8bfea15d 2499 goto fail;
6987307c
CH
2500 }
2501
4e4bf5c4 2502 if (file) {
5696c6e3 2503 blk_unref(file);
f500a6d3
KW
2504 file = NULL;
2505 }
2506
b6ce07aa 2507 /* If there is a backing file, use it */
9156df12 2508 if ((flags & BDRV_O_NO_BACKING) == 0) {
d9b7b057 2509 ret = bdrv_open_backing_file(bs, options, "backing", &local_err);
b6ce07aa 2510 if (ret < 0) {
b6ad491a 2511 goto close_and_fail;
b6ce07aa 2512 }
b6ce07aa
KW
2513 }
2514
91af7014
HR
2515 bdrv_refresh_filename(bs);
2516
b6ad491a 2517 /* Check if any unknown options were used */
7ad2757f 2518 if (qdict_size(options) != 0) {
b6ad491a 2519 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
2520 if (flags & BDRV_O_PROTOCOL) {
2521 error_setg(errp, "Block protocol '%s' doesn't support the option "
2522 "'%s'", drv->format_name, entry->key);
2523 } else {
d0e46a55
HR
2524 error_setg(errp,
2525 "Block format '%s' does not support the option '%s'",
2526 drv->format_name, entry->key);
5acd9d81 2527 }
b6ad491a 2528
b6ad491a
KW
2529 goto close_and_fail;
2530 }
b6ad491a 2531
b6ce07aa 2532 if (!bdrv_key_required(bs)) {
5c8cab48 2533 bdrv_parent_cb_change_media(bs, true);
c3adb58f
MA
2534 } else if (!runstate_check(RUN_STATE_PRELAUNCH)
2535 && !runstate_check(RUN_STATE_INMIGRATE)
2536 && !runstate_check(RUN_STATE_PAUSED)) { /* HACK */
2537 error_setg(errp,
2538 "Guest must be stopped for opening of encrypted image");
c3adb58f 2539 goto close_and_fail;
b6ce07aa
KW
2540 }
2541
c3adb58f 2542 QDECREF(options);
dd62f1ca
KW
2543
2544 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
2545 * temporary snapshot afterwards. */
2546 if (snapshot_flags) {
66836189
HR
2547 BlockDriverState *snapshot_bs;
2548 snapshot_bs = bdrv_append_temp_snapshot(bs, snapshot_flags,
2549 snapshot_options, &local_err);
73176bee 2550 snapshot_options = NULL;
dd62f1ca
KW
2551 if (local_err) {
2552 goto close_and_fail;
2553 }
5b363937
HR
2554 /* We are not going to return bs but the overlay on top of it
2555 * (snapshot_bs); thus, we have to drop the strong reference to bs
2556 * (which we obtained by calling bdrv_new()). bs will not be deleted,
2557 * though, because the overlay still has a reference to it. */
2558 bdrv_unref(bs);
2559 bs = snapshot_bs;
dd62f1ca
KW
2560 }
2561
5b363937 2562 return bs;
b6ce07aa 2563
8bfea15d 2564fail:
5696c6e3 2565 blk_unref(file);
4e4bf5c4
KW
2566 if (bs->file != NULL) {
2567 bdrv_unref_child(bs, bs->file);
f500a6d3 2568 }
73176bee 2569 QDECREF(snapshot_options);
145f598e 2570 QDECREF(bs->explicit_options);
de9c0cec 2571 QDECREF(bs->options);
b6ad491a 2572 QDECREF(options);
de9c0cec 2573 bs->options = NULL;
5b363937 2574 bdrv_unref(bs);
621ff94d 2575 error_propagate(errp, local_err);
5b363937 2576 return NULL;
de9c0cec 2577
b6ad491a 2578close_and_fail:
5b363937 2579 bdrv_unref(bs);
73176bee 2580 QDECREF(snapshot_options);
b6ad491a 2581 QDECREF(options);
621ff94d 2582 error_propagate(errp, local_err);
5b363937 2583 return NULL;
b6ce07aa
KW
2584}
2585
5b363937
HR
2586BlockDriverState *bdrv_open(const char *filename, const char *reference,
2587 QDict *options, int flags, Error **errp)
f3930ed0 2588{
5b363937 2589 return bdrv_open_inherit(filename, reference, options, flags, NULL,
ce343771 2590 NULL, errp);
f3930ed0
KW
2591}
2592
e971aa12
JC
2593typedef struct BlockReopenQueueEntry {
2594 bool prepared;
2595 BDRVReopenState state;
2596 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
2597} BlockReopenQueueEntry;
2598
2599/*
2600 * Adds a BlockDriverState to a simple queue for an atomic, transactional
2601 * reopen of multiple devices.
2602 *
2603 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
2604 * already performed, or alternatively may be NULL a new BlockReopenQueue will
2605 * be created and initialized. This newly created BlockReopenQueue should be
2606 * passed back in for subsequent calls that are intended to be of the same
2607 * atomic 'set'.
2608 *
2609 * bs is the BlockDriverState to add to the reopen queue.
2610 *
4d2cb092
KW
2611 * options contains the changed options for the associated bs
2612 * (the BlockReopenQueue takes ownership)
2613 *
e971aa12
JC
2614 * flags contains the open flags for the associated bs
2615 *
2616 * returns a pointer to bs_queue, which is either the newly allocated
2617 * bs_queue, or the existing bs_queue being used.
2618 *
2619 */
28518102
KW
2620static BlockReopenQueue *bdrv_reopen_queue_child(BlockReopenQueue *bs_queue,
2621 BlockDriverState *bs,
2622 QDict *options,
2623 int flags,
2624 const BdrvChildRole *role,
2625 QDict *parent_options,
2626 int parent_flags)
e971aa12
JC
2627{
2628 assert(bs != NULL);
2629
2630 BlockReopenQueueEntry *bs_entry;
67251a31 2631 BdrvChild *child;
145f598e 2632 QDict *old_options, *explicit_options;
67251a31 2633
e971aa12
JC
2634 if (bs_queue == NULL) {
2635 bs_queue = g_new0(BlockReopenQueue, 1);
2636 QSIMPLEQ_INIT(bs_queue);
2637 }
2638
4d2cb092
KW
2639 if (!options) {
2640 options = qdict_new();
2641 }
2642
5b7ba05f
AG
2643 /* Check if this BlockDriverState is already in the queue */
2644 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
2645 if (bs == bs_entry->state.bs) {
2646 break;
2647 }
2648 }
2649
28518102
KW
2650 /*
2651 * Precedence of options:
2652 * 1. Explicitly passed in options (highest)
91a097e7 2653 * 2. Set in flags (only for top level)
145f598e 2654 * 3. Retained from explicitly set options of bs
8e2160e2 2655 * 4. Inherited from parent node
28518102
KW
2656 * 5. Retained from effective options of bs
2657 */
2658
91a097e7
KW
2659 if (!parent_options) {
2660 /*
2661 * Any setting represented by flags is always updated. If the
2662 * corresponding QDict option is set, it takes precedence. Otherwise
2663 * the flag is translated into a QDict option. The old setting of bs is
2664 * not considered.
2665 */
2666 update_options_from_flags(options, flags);
2667 }
2668
145f598e 2669 /* Old explicitly set values (don't overwrite by inherited value) */
5b7ba05f
AG
2670 if (bs_entry) {
2671 old_options = qdict_clone_shallow(bs_entry->state.explicit_options);
2672 } else {
2673 old_options = qdict_clone_shallow(bs->explicit_options);
2674 }
145f598e
KW
2675 bdrv_join_options(bs, options, old_options);
2676 QDECREF(old_options);
2677
2678 explicit_options = qdict_clone_shallow(options);
2679
28518102
KW
2680 /* Inherit from parent node */
2681 if (parent_options) {
2682 assert(!flags);
8e2160e2 2683 role->inherit_options(&flags, options, parent_flags, parent_options);
28518102
KW
2684 }
2685
2686 /* Old values are used for options that aren't set yet */
4d2cb092 2687 old_options = qdict_clone_shallow(bs->options);
cddff5ba 2688 bdrv_join_options(bs, options, old_options);
4d2cb092
KW
2689 QDECREF(old_options);
2690
f1f25a2e
KW
2691 /* bdrv_open() masks this flag out */
2692 flags &= ~BDRV_O_PROTOCOL;
2693
67251a31 2694 QLIST_FOREACH(child, &bs->children, next) {
4c9dfe5d
KW
2695 QDict *new_child_options;
2696 char *child_key_dot;
67251a31 2697
4c9dfe5d
KW
2698 /* reopen can only change the options of block devices that were
2699 * implicitly created and inherited options. For other (referenced)
2700 * block devices, a syntax like "backing.foo" results in an error. */
67251a31
KW
2701 if (child->bs->inherits_from != bs) {
2702 continue;
2703 }
2704
4c9dfe5d
KW
2705 child_key_dot = g_strdup_printf("%s.", child->name);
2706 qdict_extract_subqdict(options, &new_child_options, child_key_dot);
2707 g_free(child_key_dot);
2708
28518102
KW
2709 bdrv_reopen_queue_child(bs_queue, child->bs, new_child_options, 0,
2710 child->role, options, flags);
e971aa12
JC
2711 }
2712
5b7ba05f
AG
2713 if (!bs_entry) {
2714 bs_entry = g_new0(BlockReopenQueueEntry, 1);
2715 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
2716 } else {
2717 QDECREF(bs_entry->state.options);
2718 QDECREF(bs_entry->state.explicit_options);
2719 }
e971aa12
JC
2720
2721 bs_entry->state.bs = bs;
4d2cb092 2722 bs_entry->state.options = options;
145f598e 2723 bs_entry->state.explicit_options = explicit_options;
e971aa12
JC
2724 bs_entry->state.flags = flags;
2725
2726 return bs_queue;
2727}
2728
28518102
KW
2729BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
2730 BlockDriverState *bs,
2731 QDict *options, int flags)
2732{
2733 return bdrv_reopen_queue_child(bs_queue, bs, options, flags,
2734 NULL, NULL, 0);
2735}
2736
e971aa12
JC
2737/*
2738 * Reopen multiple BlockDriverStates atomically & transactionally.
2739 *
2740 * The queue passed in (bs_queue) must have been built up previous
2741 * via bdrv_reopen_queue().
2742 *
2743 * Reopens all BDS specified in the queue, with the appropriate
2744 * flags. All devices are prepared for reopen, and failure of any
2745 * device will cause all device changes to be abandonded, and intermediate
2746 * data cleaned up.
2747 *
2748 * If all devices prepare successfully, then the changes are committed
2749 * to all devices.
2750 *
2751 */
720150f3 2752int bdrv_reopen_multiple(AioContext *ctx, BlockReopenQueue *bs_queue, Error **errp)
e971aa12
JC
2753{
2754 int ret = -1;
2755 BlockReopenQueueEntry *bs_entry, *next;
2756 Error *local_err = NULL;
2757
2758 assert(bs_queue != NULL);
2759
c9d1a561 2760 aio_context_release(ctx);
40840e41 2761 bdrv_drain_all_begin();
c9d1a561 2762 aio_context_acquire(ctx);
e971aa12
JC
2763
2764 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
2765 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
2766 error_propagate(errp, local_err);
2767 goto cleanup;
2768 }
2769 bs_entry->prepared = true;
2770 }
2771
2772 /* If we reach this point, we have success and just need to apply the
2773 * changes
2774 */
2775 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
2776 bdrv_reopen_commit(&bs_entry->state);
2777 }
2778
2779 ret = 0;
2780
2781cleanup:
2782 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
2783 if (ret && bs_entry->prepared) {
2784 bdrv_reopen_abort(&bs_entry->state);
145f598e
KW
2785 } else if (ret) {
2786 QDECREF(bs_entry->state.explicit_options);
e971aa12 2787 }
4d2cb092 2788 QDECREF(bs_entry->state.options);
e971aa12
JC
2789 g_free(bs_entry);
2790 }
2791 g_free(bs_queue);
40840e41
AG
2792
2793 bdrv_drain_all_end();
2794
e971aa12
JC
2795 return ret;
2796}
2797
2798
2799/* Reopen a single BlockDriverState with the specified flags. */
2800int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
2801{
2802 int ret = -1;
2803 Error *local_err = NULL;
4d2cb092 2804 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12 2805
720150f3 2806 ret = bdrv_reopen_multiple(bdrv_get_aio_context(bs), queue, &local_err);
e971aa12
JC
2807 if (local_err != NULL) {
2808 error_propagate(errp, local_err);
2809 }
2810 return ret;
2811}
2812
2813
2814/*
2815 * Prepares a BlockDriverState for reopen. All changes are staged in the
2816 * 'opaque' field of the BDRVReopenState, which is used and allocated by
2817 * the block driver layer .bdrv_reopen_prepare()
2818 *
2819 * bs is the BlockDriverState to reopen
2820 * flags are the new open flags
2821 * queue is the reopen queue
2822 *
2823 * Returns 0 on success, non-zero on error. On error errp will be set
2824 * as well.
2825 *
2826 * On failure, bdrv_reopen_abort() will be called to clean up any data.
2827 * It is the responsibility of the caller to then call the abort() or
2828 * commit() for any other BDS that have been left in a prepare() state
2829 *
2830 */
2831int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
2832 Error **errp)
2833{
2834 int ret = -1;
2835 Error *local_err = NULL;
2836 BlockDriver *drv;
ccf9dc07
KW
2837 QemuOpts *opts;
2838 const char *value;
3d8ce171 2839 bool read_only;
e971aa12
JC
2840
2841 assert(reopen_state != NULL);
2842 assert(reopen_state->bs->drv != NULL);
2843 drv = reopen_state->bs->drv;
2844
ccf9dc07
KW
2845 /* Process generic block layer options */
2846 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
2847 qemu_opts_absorb_qdict(opts, reopen_state->options, &local_err);
2848 if (local_err) {
2849 error_propagate(errp, local_err);
2850 ret = -EINVAL;
2851 goto error;
2852 }
2853
91a097e7
KW
2854 update_flags_from_options(&reopen_state->flags, opts);
2855
ccf9dc07
KW
2856 /* node-name and driver must be unchanged. Put them back into the QDict, so
2857 * that they are checked at the end of this function. */
2858 value = qemu_opt_get(opts, "node-name");
2859 if (value) {
46f5ac20 2860 qdict_put_str(reopen_state->options, "node-name", value);
ccf9dc07
KW
2861 }
2862
2863 value = qemu_opt_get(opts, "driver");
2864 if (value) {
46f5ac20 2865 qdict_put_str(reopen_state->options, "driver", value);
ccf9dc07
KW
2866 }
2867
3d8ce171
JC
2868 /* If we are to stay read-only, do not allow permission change
2869 * to r/w. Attempting to set to r/w may fail if either BDRV_O_ALLOW_RDWR is
2870 * not set, or if the BDS still has copy_on_read enabled */
2871 read_only = !(reopen_state->flags & BDRV_O_RDWR);
2872 ret = bdrv_can_set_read_only(reopen_state->bs, read_only, &local_err);
2873 if (local_err) {
2874 error_propagate(errp, local_err);
e971aa12
JC
2875 goto error;
2876 }
2877
2878
2879 ret = bdrv_flush(reopen_state->bs);
2880 if (ret) {
455b0fde 2881 error_setg_errno(errp, -ret, "Error flushing drive");
e971aa12
JC
2882 goto error;
2883 }
2884
2885 if (drv->bdrv_reopen_prepare) {
2886 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
2887 if (ret) {
2888 if (local_err != NULL) {
2889 error_propagate(errp, local_err);
2890 } else {
d8b6895f
LC
2891 error_setg(errp, "failed while preparing to reopen image '%s'",
2892 reopen_state->bs->filename);
e971aa12
JC
2893 }
2894 goto error;
2895 }
2896 } else {
2897 /* It is currently mandatory to have a bdrv_reopen_prepare()
2898 * handler for each supported drv. */
81e5f78a
AG
2899 error_setg(errp, "Block format '%s' used by node '%s' "
2900 "does not support reopening files", drv->format_name,
2901 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
2902 ret = -1;
2903 goto error;
2904 }
2905
4d2cb092
KW
2906 /* Options that are not handled are only okay if they are unchanged
2907 * compared to the old state. It is expected that some options are only
2908 * used for the initial open, but not reopen (e.g. filename) */
2909 if (qdict_size(reopen_state->options)) {
2910 const QDictEntry *entry = qdict_first(reopen_state->options);
2911
2912 do {
2913 QString *new_obj = qobject_to_qstring(entry->value);
2914 const char *new = qstring_get_str(new_obj);
129c7d1c
MA
2915 /*
2916 * Caution: while qdict_get_try_str() is fine, getting
2917 * non-string types would require more care. When
2918 * bs->options come from -blockdev or blockdev_add, its
2919 * members are typed according to the QAPI schema, but
2920 * when they come from -drive, they're all QString.
2921 */
4d2cb092
KW
2922 const char *old = qdict_get_try_str(reopen_state->bs->options,
2923 entry->key);
2924
2925 if (!old || strcmp(new, old)) {
2926 error_setg(errp, "Cannot change the option '%s'", entry->key);
2927 ret = -EINVAL;
2928 goto error;
2929 }
2930 } while ((entry = qdict_next(reopen_state->options, entry)));
2931 }
2932
e971aa12
JC
2933 ret = 0;
2934
2935error:
ccf9dc07 2936 qemu_opts_del(opts);
e971aa12
JC
2937 return ret;
2938}
2939
2940/*
2941 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
2942 * makes them final by swapping the staging BlockDriverState contents into
2943 * the active BlockDriverState contents.
2944 */
2945void bdrv_reopen_commit(BDRVReopenState *reopen_state)
2946{
2947 BlockDriver *drv;
2948
2949 assert(reopen_state != NULL);
2950 drv = reopen_state->bs->drv;
2951 assert(drv != NULL);
2952
2953 /* If there are any driver level actions to take */
2954 if (drv->bdrv_reopen_commit) {
2955 drv->bdrv_reopen_commit(reopen_state);
2956 }
2957
2958 /* set BDS specific flags now */
145f598e
KW
2959 QDECREF(reopen_state->bs->explicit_options);
2960
2961 reopen_state->bs->explicit_options = reopen_state->explicit_options;
e971aa12 2962 reopen_state->bs->open_flags = reopen_state->flags;
e971aa12 2963 reopen_state->bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 2964
3baca891 2965 bdrv_refresh_limits(reopen_state->bs, NULL);
e971aa12
JC
2966}
2967
2968/*
2969 * Abort the reopen, and delete and free the staged changes in
2970 * reopen_state
2971 */
2972void bdrv_reopen_abort(BDRVReopenState *reopen_state)
2973{
2974 BlockDriver *drv;
2975
2976 assert(reopen_state != NULL);
2977 drv = reopen_state->bs->drv;
2978 assert(drv != NULL);
2979
2980 if (drv->bdrv_reopen_abort) {
2981 drv->bdrv_reopen_abort(reopen_state);
2982 }
145f598e
KW
2983
2984 QDECREF(reopen_state->explicit_options);
e971aa12
JC
2985}
2986
2987
64dff520 2988static void bdrv_close(BlockDriverState *bs)
fc01f7e7 2989{
33384421
HR
2990 BdrvAioNotifier *ban, *ban_next;
2991
ca9bd24c 2992 assert(!bs->job);
30f55fb8 2993 assert(!bs->refcnt);
99b7e775 2994
fc27291d 2995 bdrv_drained_begin(bs); /* complete I/O */
58fda173 2996 bdrv_flush(bs);
53ec73e2 2997 bdrv_drain(bs); /* in case flush left pending I/O */
fc27291d 2998
c5acdc9a
HR
2999 bdrv_release_named_dirty_bitmaps(bs);
3000 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
3001
3cbc002c 3002 if (bs->drv) {
6e93e7c4
KW
3003 BdrvChild *child, *next;
3004
9a7dedbc 3005 bs->drv->bdrv_close(bs);
9a4f4c31 3006 bs->drv = NULL;
9a7dedbc 3007
12fa4af6 3008 bdrv_set_backing_hd(bs, NULL, &error_abort);
9a7dedbc 3009
9a4f4c31
KW
3010 if (bs->file != NULL) {
3011 bdrv_unref_child(bs, bs->file);
3012 bs->file = NULL;
3013 }
3014
6e93e7c4 3015 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
3016 /* TODO Remove bdrv_unref() from drivers' close function and use
3017 * bdrv_unref_child() here */
bddcec37
KW
3018 if (child->bs->inherits_from == bs) {
3019 child->bs->inherits_from = NULL;
3020 }
33a60407 3021 bdrv_detach_child(child);
6e93e7c4
KW
3022 }
3023
7267c094 3024 g_free(bs->opaque);
ea2384d3 3025 bs->opaque = NULL;
53fec9d3 3026 bs->copy_on_read = 0;
a275fa42
PB
3027 bs->backing_file[0] = '\0';
3028 bs->backing_format[0] = '\0';
6405875c 3029 bs->total_sectors = 0;
54115412
EB
3030 bs->encrypted = false;
3031 bs->valid_key = false;
3032 bs->sg = false;
de9c0cec 3033 QDECREF(bs->options);
145f598e 3034 QDECREF(bs->explicit_options);
de9c0cec 3035 bs->options = NULL;
91af7014
HR
3036 QDECREF(bs->full_open_options);
3037 bs->full_open_options = NULL;
b338082b 3038 }
98f90dba 3039
33384421
HR
3040 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
3041 g_free(ban);
3042 }
3043 QLIST_INIT(&bs->aio_notifiers);
fc27291d 3044 bdrv_drained_end(bs);
b338082b
FB
3045}
3046
2bc93fed
MK
3047void bdrv_close_all(void)
3048{
a1a2af07 3049 block_job_cancel_sync_all();
cd7fca95 3050 nbd_export_close_all();
ca9bd24c
HR
3051
3052 /* Drop references from requests still in flight, such as canceled block
3053 * jobs whose AIO context has not been polled yet */
3054 bdrv_drain_all();
2bc93fed 3055
ca9bd24c
HR
3056 blk_remove_all_bs();
3057 blockdev_close_all_bdrv_states();
ed78cda3 3058
a1a2af07 3059 assert(QTAILQ_EMPTY(&all_bdrv_states));
2bc93fed
MK
3060}
3061
d0ac0380
KW
3062static bool should_update_child(BdrvChild *c, BlockDriverState *to)
3063{
3064 BdrvChild *to_c;
3065
3066 if (c->role->stay_at_node) {
3067 return false;
3068 }
3069
3070 if (c->role == &child_backing) {
3071 /* If @from is a backing file of @to, ignore the child to avoid
3072 * creating a loop. We only want to change the pointer of other
3073 * parents. */
3074 QLIST_FOREACH(to_c, &to->children, next) {
3075 if (to_c == c) {
3076 break;
3077 }
3078 }
3079 if (to_c) {
3080 return false;
3081 }
3082 }
3083
3084 return true;
3085}
3086
5fe31c25
KW
3087void bdrv_replace_node(BlockDriverState *from, BlockDriverState *to,
3088 Error **errp)
dd62f1ca 3089{
d0ac0380 3090 BdrvChild *c, *next;
234ac1a9
KW
3091 GSList *list = NULL, *p;
3092 uint64_t old_perm, old_shared;
3093 uint64_t perm = 0, shared = BLK_PERM_ALL;
3094 int ret;
3095
5fe31c25
KW
3096 assert(!atomic_read(&from->in_flight));
3097 assert(!atomic_read(&to->in_flight));
dd62f1ca 3098
234ac1a9
KW
3099 /* Make sure that @from doesn't go away until we have successfully attached
3100 * all of its parents to @to. */
3101 bdrv_ref(from);
dd62f1ca 3102
234ac1a9 3103 /* Put all parents into @list and calculate their cumulative permissions */
dd62f1ca 3104 QLIST_FOREACH_SAFE(c, &from->parents, next_parent, next) {
d0ac0380 3105 if (!should_update_child(c, to)) {
26de9438
KW
3106 continue;
3107 }
234ac1a9
KW
3108 list = g_slist_prepend(list, c);
3109 perm |= c->perm;
3110 shared &= c->shared_perm;
3111 }
3112
3113 /* Check whether the required permissions can be granted on @to, ignoring
3114 * all BdrvChild in @list so that they can't block themselves. */
3115 ret = bdrv_check_update_perm(to, perm, shared, list, errp);
3116 if (ret < 0) {
3117 bdrv_abort_perm_update(to);
3118 goto out;
3119 }
3120
3121 /* Now actually perform the change. We performed the permission check for
3122 * all elements of @list at once, so set the permissions all at once at the
3123 * very end. */
3124 for (p = list; p != NULL; p = p->next) {
3125 c = p->data;
9bd910e2 3126
dd62f1ca 3127 bdrv_ref(to);
234ac1a9 3128 bdrv_replace_child_noperm(c, to);
dd62f1ca
KW
3129 bdrv_unref(from);
3130 }
234ac1a9
KW
3131
3132 bdrv_get_cumulative_perm(to, &old_perm, &old_shared);
3133 bdrv_set_perm(to, old_perm | perm, old_shared | shared);
3134
3135out:
3136 g_slist_free(list);
3137 bdrv_unref(from);
dd62f1ca
KW
3138}
3139
4ddc07ca
PB
3140/*
3141 * Add new bs contents at the top of an image chain while the chain is
3142 * live, while keeping required fields on the top layer.
3143 *
3144 * This will modify the BlockDriverState fields, and swap contents
3145 * between bs_new and bs_top. Both bs_new and bs_top are modified.
3146 *
bfb197e0 3147 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
3148 *
3149 * This function does not create any image files.
dd62f1ca
KW
3150 *
3151 * bdrv_append() takes ownership of a bs_new reference and unrefs it because
3152 * that's what the callers commonly need. bs_new will be referenced by the old
3153 * parents of bs_top after bdrv_append() returns. If the caller needs to keep a
3154 * reference of its own, it must call bdrv_ref().
4ddc07ca 3155 */
b2c2832c
KW
3156void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top,
3157 Error **errp)
4ddc07ca 3158{
b2c2832c
KW
3159 Error *local_err = NULL;
3160
b2c2832c
KW
3161 bdrv_set_backing_hd(bs_new, bs_top, &local_err);
3162 if (local_err) {
3163 error_propagate(errp, local_err);
3164 goto out;
3165 }
dd62f1ca 3166
5fe31c25 3167 bdrv_replace_node(bs_top, bs_new, &local_err);
234ac1a9
KW
3168 if (local_err) {
3169 error_propagate(errp, local_err);
3170 bdrv_set_backing_hd(bs_new, NULL, &error_abort);
3171 goto out;
3172 }
4ddc07ca 3173
dd62f1ca
KW
3174 /* bs_new is now referenced by its new parents, we don't need the
3175 * additional reference any more. */
b2c2832c 3176out:
dd62f1ca 3177 bdrv_unref(bs_new);
8802d1fd
JC
3178}
3179
4f6fd349 3180static void bdrv_delete(BlockDriverState *bs)
b338082b 3181{
3e914655 3182 assert(!bs->job);
3718d8ab 3183 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 3184 assert(!bs->refcnt);
18846dee 3185
e1b5c52e
SH
3186 bdrv_close(bs);
3187
1b7bdbc1 3188 /* remove from list, if necessary */
63eaaae0
KW
3189 if (bs->node_name[0] != '\0') {
3190 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
3191 }
2c1d04e0
HR
3192 QTAILQ_REMOVE(&all_bdrv_states, bs, bs_list);
3193
7267c094 3194 g_free(bs);
fc01f7e7
FB
3195}
3196
e97fc193
AL
3197/*
3198 * Run consistency checks on an image
3199 *
e076f338 3200 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 3201 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 3202 * check are stored in res.
e97fc193 3203 */
4534ff54 3204int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 3205{
908bcd54
HR
3206 if (bs->drv == NULL) {
3207 return -ENOMEDIUM;
3208 }
e97fc193
AL
3209 if (bs->drv->bdrv_check == NULL) {
3210 return -ENOTSUP;
3211 }
3212
e076f338 3213 memset(res, 0, sizeof(*res));
4534ff54 3214 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
3215}
3216
756e6736
KW
3217/*
3218 * Return values:
3219 * 0 - success
3220 * -EINVAL - backing format specified, but no file
3221 * -ENOSPC - can't update the backing file because no space is left in the
3222 * image file header
3223 * -ENOTSUP - format driver doesn't support changing the backing file
3224 */
3225int bdrv_change_backing_file(BlockDriverState *bs,
3226 const char *backing_file, const char *backing_fmt)
3227{
3228 BlockDriver *drv = bs->drv;
469ef350 3229 int ret;
756e6736 3230
5f377794
PB
3231 /* Backing file format doesn't make sense without a backing file */
3232 if (backing_fmt && !backing_file) {
3233 return -EINVAL;
3234 }
3235
756e6736 3236 if (drv->bdrv_change_backing_file != NULL) {
469ef350 3237 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 3238 } else {
469ef350 3239 ret = -ENOTSUP;
756e6736 3240 }
469ef350
PB
3241
3242 if (ret == 0) {
3243 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
3244 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
3245 }
3246 return ret;
756e6736
KW
3247}
3248
6ebdcee2
JC
3249/*
3250 * Finds the image layer in the chain that has 'bs' as its backing file.
3251 *
3252 * active is the current topmost image.
3253 *
3254 * Returns NULL if bs is not found in active's image chain,
3255 * or if active == bs.
4caf0fcd
JC
3256 *
3257 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
3258 */
3259BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
3260 BlockDriverState *bs)
3261{
760e0063
KW
3262 while (active && bs != backing_bs(active)) {
3263 active = backing_bs(active);
6ebdcee2
JC
3264 }
3265
4caf0fcd
JC
3266 return active;
3267}
6ebdcee2 3268
4caf0fcd
JC
3269/* Given a BDS, searches for the base layer. */
3270BlockDriverState *bdrv_find_base(BlockDriverState *bs)
3271{
3272 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
3273}
3274
6ebdcee2
JC
3275/*
3276 * Drops images above 'base' up to and including 'top', and sets the image
3277 * above 'top' to have base as its backing file.
3278 *
3279 * Requires that the overlay to 'top' is opened r/w, so that the backing file
3280 * information in 'bs' can be properly updated.
3281 *
3282 * E.g., this will convert the following chain:
3283 * bottom <- base <- intermediate <- top <- active
3284 *
3285 * to
3286 *
3287 * bottom <- base <- active
3288 *
3289 * It is allowed for bottom==base, in which case it converts:
3290 *
3291 * base <- intermediate <- top <- active
3292 *
3293 * to
3294 *
3295 * base <- active
3296 *
54e26900
JC
3297 * If backing_file_str is non-NULL, it will be used when modifying top's
3298 * overlay image metadata.
3299 *
6ebdcee2
JC
3300 * Error conditions:
3301 * if active == top, that is considered an error
3302 *
3303 */
3304int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 3305 BlockDriverState *base, const char *backing_file_str)
6ebdcee2 3306{
6ebdcee2 3307 BlockDriverState *new_top_bs = NULL;
12fa4af6 3308 Error *local_err = NULL;
6ebdcee2
JC
3309 int ret = -EIO;
3310
6ebdcee2
JC
3311 if (!top->drv || !base->drv) {
3312 goto exit;
3313 }
3314
3315 new_top_bs = bdrv_find_overlay(active, top);
3316
3317 if (new_top_bs == NULL) {
3318 /* we could not find the image above 'top', this is an error */
3319 goto exit;
3320 }
3321
760e0063 3322 /* special case of new_top_bs->backing->bs already pointing to base - nothing
6ebdcee2 3323 * to do, no intermediate images */
760e0063 3324 if (backing_bs(new_top_bs) == base) {
6ebdcee2
JC
3325 ret = 0;
3326 goto exit;
3327 }
3328
5db15a57
KW
3329 /* Make sure that base is in the backing chain of top */
3330 if (!bdrv_chain_contains(top, base)) {
6ebdcee2
JC
3331 goto exit;
3332 }
3333
3334 /* success - we can delete the intermediate states, and link top->base */
5db15a57 3335 backing_file_str = backing_file_str ? backing_file_str : base->filename;
54e26900 3336 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
5db15a57 3337 base->drv ? base->drv->format_name : "");
6ebdcee2
JC
3338 if (ret) {
3339 goto exit;
3340 }
12fa4af6
KW
3341
3342 bdrv_set_backing_hd(new_top_bs, base, &local_err);
3343 if (local_err) {
3344 ret = -EPERM;
3345 error_report_err(local_err);
3346 goto exit;
3347 }
6ebdcee2 3348
6ebdcee2 3349 ret = 0;
6ebdcee2 3350exit:
6ebdcee2
JC
3351 return ret;
3352}
3353
61007b31
SH
3354/**
3355 * Truncate file to 'offset' bytes (needed only for file protocols)
3356 */
ed3d2ec9 3357int bdrv_truncate(BdrvChild *child, int64_t offset, Error **errp)
71d0770c 3358{
52cdbc58 3359 BlockDriverState *bs = child->bs;
61007b31
SH
3360 BlockDriver *drv = bs->drv;
3361 int ret;
c8f6d58e 3362
362b3786 3363 assert(child->perm & BLK_PERM_RESIZE);
c8f6d58e 3364
ed3d2ec9
HR
3365 if (!drv) {
3366 error_setg(errp, "No medium inserted");
71d0770c 3367 return -ENOMEDIUM;
ed3d2ec9
HR
3368 }
3369 if (!drv->bdrv_truncate) {
3370 error_setg(errp, "Image format driver does not support resize");
61007b31 3371 return -ENOTSUP;
ed3d2ec9
HR
3372 }
3373 if (bs->read_only) {
3374 error_setg(errp, "Image is read-only");
61007b31 3375 return -EACCES;
ed3d2ec9 3376 }
71d0770c 3377
504c205a
DL
3378 assert(!(bs->open_flags & BDRV_O_INACTIVE));
3379
4bff28b8 3380 ret = drv->bdrv_truncate(bs, offset, errp);
61007b31
SH
3381 if (ret == 0) {
3382 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
3383 bdrv_dirty_bitmap_truncate(bs);
5c8cab48 3384 bdrv_parent_cb_resize(bs);
3ff2f67a 3385 ++bs->write_gen;
c0191e76 3386 }
61007b31 3387 return ret;
71d0770c
AL
3388}
3389
61007b31
SH
3390/**
3391 * Length of a allocated file in bytes. Sparse files are counted by actual
3392 * allocated space. Return < 0 if error or unknown.
3393 */
3394int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 3395{
61007b31
SH
3396 BlockDriver *drv = bs->drv;
3397 if (!drv) {
3398 return -ENOMEDIUM;
8f4754ed 3399 }
61007b31
SH
3400 if (drv->bdrv_get_allocated_file_size) {
3401 return drv->bdrv_get_allocated_file_size(bs);
3402 }
3403 if (bs->file) {
9a4f4c31 3404 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 3405 }
61007b31 3406 return -ENOTSUP;
1c9805a3 3407}
e7a8a783 3408
61007b31
SH
3409/**
3410 * Return number of sectors on success, -errno on error.
1c9805a3 3411 */
61007b31 3412int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 3413{
61007b31 3414 BlockDriver *drv = bs->drv;
498e386c 3415
61007b31
SH
3416 if (!drv)
3417 return -ENOMEDIUM;
2572b37a 3418
61007b31
SH
3419 if (drv->has_variable_length) {
3420 int ret = refresh_total_sectors(bs, bs->total_sectors);
3421 if (ret < 0) {
3422 return ret;
1c9805a3
SH
3423 }
3424 }
61007b31 3425 return bs->total_sectors;
1c9805a3 3426}
b338082b 3427
61007b31
SH
3428/**
3429 * Return length in bytes on success, -errno on error.
3430 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 3431 */
61007b31 3432int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 3433{
61007b31 3434 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 3435
4a9c9ea0 3436 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 3437 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
3438}
3439
61007b31
SH
3440/* return 0 as number of sectors if no device present or error */
3441void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 3442{
61007b31 3443 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 3444
61007b31 3445 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
3446}
3447
54115412 3448bool bdrv_is_sg(BlockDriverState *bs)
f08145fe 3449{
61007b31 3450 return bs->sg;
f08145fe
KW
3451}
3452
54115412 3453bool bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 3454{
760e0063 3455 if (bs->backing && bs->backing->bs->encrypted) {
54115412 3456 return true;
760e0063 3457 }
61007b31 3458 return bs->encrypted;
fc3959e4
FZ
3459}
3460
54115412 3461bool bdrv_key_required(BlockDriverState *bs)
fc3959e4 3462{
760e0063 3463 BdrvChild *backing = bs->backing;
61007b31 3464
760e0063 3465 if (backing && backing->bs->encrypted && !backing->bs->valid_key) {
54115412 3466 return true;
760e0063 3467 }
61007b31 3468 return (bs->encrypted && !bs->valid_key);
fc3959e4
FZ
3469}
3470
61007b31 3471int bdrv_set_key(BlockDriverState *bs, const char *key)
d0c7f642 3472{
d0c7f642 3473 int ret;
760e0063
KW
3474 if (bs->backing && bs->backing->bs->encrypted) {
3475 ret = bdrv_set_key(bs->backing->bs, key);
61007b31
SH
3476 if (ret < 0)
3477 return ret;
3478 if (!bs->encrypted)
3479 return 0;
3480 }
3481 if (!bs->encrypted) {
3482 return -EINVAL;
3483 } else if (!bs->drv || !bs->drv->bdrv_set_key) {
d0c7f642
KW
3484 return -ENOMEDIUM;
3485 }
61007b31 3486 ret = bs->drv->bdrv_set_key(bs, key);
b9c64947 3487 if (ret < 0) {
54115412 3488 bs->valid_key = false;
61007b31 3489 } else if (!bs->valid_key) {
5c8cab48 3490 /* call the change callback now, we skipped it on open */
54115412 3491 bs->valid_key = true;
5c8cab48 3492 bdrv_parent_cb_change_media(bs, true);
1b0288ae 3493 }
61007b31
SH
3494 return ret;
3495}
f08f2dda 3496
c5fbe571 3497/*
61007b31
SH
3498 * Provide an encryption key for @bs.
3499 * If @key is non-null:
3500 * If @bs is not encrypted, fail.
3501 * Else if the key is invalid, fail.
3502 * Else set @bs's key to @key, replacing the existing key, if any.
3503 * If @key is null:
3504 * If @bs is encrypted and still lacks a key, fail.
3505 * Else do nothing.
3506 * On failure, store an error object through @errp if non-null.
c5fbe571 3507 */
61007b31 3508void bdrv_add_key(BlockDriverState *bs, const char *key, Error **errp)
c5fbe571 3509{
61007b31
SH
3510 if (key) {
3511 if (!bdrv_is_encrypted(bs)) {
3512 error_setg(errp, "Node '%s' is not encrypted",
3513 bdrv_get_device_or_node_name(bs));
3514 } else if (bdrv_set_key(bs, key) < 0) {
c6bd8c70 3515 error_setg(errp, QERR_INVALID_PASSWORD);
4d2855a3
MA
3516 }
3517 } else {
3518 if (bdrv_key_required(bs)) {
b1ca6391
MA
3519 error_set(errp, ERROR_CLASS_DEVICE_ENCRYPTED,
3520 "'%s' (%s) is encrypted",
81e5f78a 3521 bdrv_get_device_or_node_name(bs),
4d2855a3
MA
3522 bdrv_get_encrypted_filename(bs));
3523 }
3524 }
3525}
3526
61007b31 3527const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 3528{
61007b31 3529 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
3530}
3531
61007b31 3532static int qsort_strcmp(const void *a, const void *b)
40b4f539 3533{
ceff5bd7 3534 return strcmp(*(char *const *)a, *(char *const *)b);
40b4f539
KW
3535}
3536
61007b31
SH
3537void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
3538 void *opaque)
40b4f539 3539{
61007b31
SH
3540 BlockDriver *drv;
3541 int count = 0;
3542 int i;
3543 const char **formats = NULL;
40b4f539 3544
61007b31
SH
3545 QLIST_FOREACH(drv, &bdrv_drivers, list) {
3546 if (drv->format_name) {
3547 bool found = false;
3548 int i = count;
3549 while (formats && i && !found) {
3550 found = !strcmp(formats[--i], drv->format_name);
3551 }
e2a305fb 3552
61007b31
SH
3553 if (!found) {
3554 formats = g_renew(const char *, formats, count + 1);
3555 formats[count++] = drv->format_name;
3556 }
6c5a42ac 3557 }
61007b31 3558 }
6c5a42ac 3559
eb0df69f
HR
3560 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); i++) {
3561 const char *format_name = block_driver_modules[i].format_name;
3562
3563 if (format_name) {
3564 bool found = false;
3565 int j = count;
3566
3567 while (formats && j && !found) {
3568 found = !strcmp(formats[--j], format_name);
3569 }
3570
3571 if (!found) {
3572 formats = g_renew(const char *, formats, count + 1);
3573 formats[count++] = format_name;
3574 }
3575 }
3576 }
3577
61007b31 3578 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 3579
61007b31
SH
3580 for (i = 0; i < count; i++) {
3581 it(opaque, formats[i]);
3582 }
40b4f539 3583
61007b31
SH
3584 g_free(formats);
3585}
40b4f539 3586
61007b31
SH
3587/* This function is to find a node in the bs graph */
3588BlockDriverState *bdrv_find_node(const char *node_name)
3589{
3590 BlockDriverState *bs;
391827eb 3591
61007b31 3592 assert(node_name);
40b4f539 3593
61007b31
SH
3594 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
3595 if (!strcmp(node_name, bs->node_name)) {
3596 return bs;
40b4f539
KW
3597 }
3598 }
61007b31 3599 return NULL;
40b4f539
KW
3600}
3601
61007b31
SH
3602/* Put this QMP function here so it can access the static graph_bdrv_states. */
3603BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 3604{
61007b31
SH
3605 BlockDeviceInfoList *list, *entry;
3606 BlockDriverState *bs;
40b4f539 3607
61007b31
SH
3608 list = NULL;
3609 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
c83f9fba 3610 BlockDeviceInfo *info = bdrv_block_device_info(NULL, bs, errp);
61007b31
SH
3611 if (!info) {
3612 qapi_free_BlockDeviceInfoList(list);
3613 return NULL;
301db7c2 3614 }
61007b31
SH
3615 entry = g_malloc0(sizeof(*entry));
3616 entry->value = info;
3617 entry->next = list;
3618 list = entry;
301db7c2
RH
3619 }
3620
61007b31
SH
3621 return list;
3622}
40b4f539 3623
61007b31
SH
3624BlockDriverState *bdrv_lookup_bs(const char *device,
3625 const char *node_name,
3626 Error **errp)
3627{
3628 BlockBackend *blk;
3629 BlockDriverState *bs;
40b4f539 3630
61007b31
SH
3631 if (device) {
3632 blk = blk_by_name(device);
40b4f539 3633
61007b31 3634 if (blk) {
9f4ed6fb
AG
3635 bs = blk_bs(blk);
3636 if (!bs) {
5433c24f 3637 error_setg(errp, "Device '%s' has no medium", device);
5433c24f
HR
3638 }
3639
9f4ed6fb 3640 return bs;
61007b31
SH
3641 }
3642 }
40b4f539 3643
61007b31
SH
3644 if (node_name) {
3645 bs = bdrv_find_node(node_name);
6d519a5f 3646
61007b31
SH
3647 if (bs) {
3648 return bs;
3649 }
40b4f539
KW
3650 }
3651
61007b31
SH
3652 error_setg(errp, "Cannot find device=%s nor node_name=%s",
3653 device ? device : "",
3654 node_name ? node_name : "");
3655 return NULL;
40b4f539
KW
3656}
3657
61007b31
SH
3658/* If 'base' is in the same chain as 'top', return true. Otherwise,
3659 * return false. If either argument is NULL, return false. */
3660bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 3661{
61007b31 3662 while (top && top != base) {
760e0063 3663 top = backing_bs(top);
02c50efe 3664 }
61007b31
SH
3665
3666 return top != NULL;
02c50efe
FZ
3667}
3668
61007b31 3669BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 3670{
61007b31
SH
3671 if (!bs) {
3672 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 3673 }
61007b31 3674 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
3675}
3676
61007b31 3677const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 3678{
61007b31 3679 return bs->node_name;
beac80cd
FB
3680}
3681
1f0c461b 3682const char *bdrv_get_parent_name(const BlockDriverState *bs)
4c265bf9
KW
3683{
3684 BdrvChild *c;
3685 const char *name;
3686
3687 /* If multiple parents have a name, just pick the first one. */
3688 QLIST_FOREACH(c, &bs->parents, next_parent) {
3689 if (c->role->get_name) {
3690 name = c->role->get_name(c);
3691 if (name && *name) {
3692 return name;
3693 }
3694 }
3695 }
3696
3697 return NULL;
3698}
3699
61007b31
SH
3700/* TODO check what callers really want: bs->node_name or blk_name() */
3701const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 3702{
4c265bf9 3703 return bdrv_get_parent_name(bs) ?: "";
f141eafe 3704}
83f64091 3705
61007b31
SH
3706/* This can be used to identify nodes that might not have a device
3707 * name associated. Since node and device names live in the same
3708 * namespace, the result is unambiguous. The exception is if both are
3709 * absent, then this returns an empty (non-null) string. */
3710const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 3711{
4c265bf9 3712 return bdrv_get_parent_name(bs) ?: bs->node_name;
beac80cd 3713}
beac80cd 3714
61007b31 3715int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 3716{
61007b31 3717 return bs->open_flags;
0b5a2445
PB
3718}
3719
61007b31 3720int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 3721{
61007b31 3722 return 1;
0b5a2445
PB
3723}
3724
61007b31 3725int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 3726{
61007b31 3727 assert(bs->drv);
0b5a2445 3728
61007b31
SH
3729 /* If BS is a copy on write image, it is initialized to
3730 the contents of the base image, which may not be zeroes. */
760e0063 3731 if (bs->backing) {
61007b31
SH
3732 return 0;
3733 }
3734 if (bs->drv->bdrv_has_zero_init) {
3735 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 3736 }
61007b31
SH
3737
3738 /* safe default */
3739 return 0;
68485420
KW
3740}
3741
61007b31 3742bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 3743{
61007b31 3744 BlockDriverInfo bdi;
b2a61371 3745
760e0063 3746 if (bs->backing) {
61007b31
SH
3747 return false;
3748 }
3749
3750 if (bdrv_get_info(bs, &bdi) == 0) {
3751 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
3752 }
3753
61007b31 3754 return false;
b2a61371
SH
3755}
3756
61007b31 3757bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 3758{
61007b31 3759 BlockDriverInfo bdi;
68485420 3760
2f0342ef 3761 if (!(bs->open_flags & BDRV_O_UNMAP)) {
61007b31
SH
3762 return false;
3763 }
68485420 3764
61007b31
SH
3765 if (bdrv_get_info(bs, &bdi) == 0) {
3766 return bdi.can_write_zeroes_with_unmap;
3767 }
68485420 3768
61007b31 3769 return false;
68485420
KW
3770}
3771
61007b31 3772const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 3773{
760e0063 3774 if (bs->backing && bs->backing->bs->encrypted)
61007b31
SH
3775 return bs->backing_file;
3776 else if (bs->encrypted)
3777 return bs->filename;
3778 else
3779 return NULL;
b2e12bc6
CH
3780}
3781
61007b31
SH
3782void bdrv_get_backing_filename(BlockDriverState *bs,
3783 char *filename, int filename_size)
016f5cf6 3784{
61007b31
SH
3785 pstrcpy(filename, filename_size, bs->backing_file);
3786}
d318aea9 3787
61007b31
SH
3788int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
3789{
3790 BlockDriver *drv = bs->drv;
3791 if (!drv)
3792 return -ENOMEDIUM;
3793 if (!drv->bdrv_get_info)
3794 return -ENOTSUP;
3795 memset(bdi, 0, sizeof(*bdi));
3796 return drv->bdrv_get_info(bs, bdi);
3797}
016f5cf6 3798
61007b31
SH
3799ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
3800{
3801 BlockDriver *drv = bs->drv;
3802 if (drv && drv->bdrv_get_specific_info) {
3803 return drv->bdrv_get_specific_info(bs);
3804 }
3805 return NULL;
016f5cf6
AG
3806}
3807
a31939e6 3808void bdrv_debug_event(BlockDriverState *bs, BlkdebugEvent event)
4265d620 3809{
61007b31
SH
3810 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
3811 return;
3812 }
4265d620 3813
61007b31 3814 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
3815}
3816
61007b31
SH
3817int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
3818 const char *tag)
4265d620 3819{
61007b31 3820 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 3821 bs = bs->file ? bs->file->bs : NULL;
61007b31 3822 }
4265d620 3823
61007b31
SH
3824 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
3825 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
3826 }
4265d620 3827
61007b31 3828 return -ENOTSUP;
4265d620
PB
3829}
3830
61007b31 3831int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 3832{
61007b31 3833 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 3834 bs = bs->file ? bs->file->bs : NULL;
61007b31 3835 }
ce1a14dc 3836
61007b31
SH
3837 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
3838 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
3839 }
3840
3841 return -ENOTSUP;
eb852011
MA
3842}
3843
61007b31 3844int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 3845{
61007b31 3846 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 3847 bs = bs->file ? bs->file->bs : NULL;
61007b31 3848 }
ce1a14dc 3849
61007b31
SH
3850 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
3851 return bs->drv->bdrv_debug_resume(bs, tag);
3852 }
ce1a14dc 3853
61007b31 3854 return -ENOTSUP;
f197fe2b
FZ
3855}
3856
61007b31 3857bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 3858{
61007b31 3859 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 3860 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 3861 }
19cb3738 3862
61007b31
SH
3863 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
3864 return bs->drv->bdrv_debug_is_suspended(bs, tag);
3865 }
f9f05dc5 3866
61007b31
SH
3867 return false;
3868}
f9f05dc5 3869
61007b31
SH
3870/* backing_file can either be relative, or absolute, or a protocol. If it is
3871 * relative, it must be relative to the chain. So, passing in bs->filename
3872 * from a BDS as backing_file should not be done, as that may be relative to
3873 * the CWD rather than the chain. */
3874BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
3875 const char *backing_file)
f9f05dc5 3876{
61007b31
SH
3877 char *filename_full = NULL;
3878 char *backing_file_full = NULL;
3879 char *filename_tmp = NULL;
3880 int is_protocol = 0;
3881 BlockDriverState *curr_bs = NULL;
3882 BlockDriverState *retval = NULL;
418661e0 3883 Error *local_error = NULL;
f9f05dc5 3884
61007b31
SH
3885 if (!bs || !bs->drv || !backing_file) {
3886 return NULL;
f9f05dc5
KW
3887 }
3888
61007b31
SH
3889 filename_full = g_malloc(PATH_MAX);
3890 backing_file_full = g_malloc(PATH_MAX);
3891 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 3892
61007b31 3893 is_protocol = path_has_protocol(backing_file);
f9f05dc5 3894
760e0063 3895 for (curr_bs = bs; curr_bs->backing; curr_bs = curr_bs->backing->bs) {
f9f05dc5 3896
61007b31
SH
3897 /* If either of the filename paths is actually a protocol, then
3898 * compare unmodified paths; otherwise make paths relative */
3899 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
3900 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
760e0063 3901 retval = curr_bs->backing->bs;
61007b31
SH
3902 break;
3903 }
418661e0
JC
3904 /* Also check against the full backing filename for the image */
3905 bdrv_get_full_backing_filename(curr_bs, backing_file_full, PATH_MAX,
3906 &local_error);
3907 if (local_error == NULL) {
3908 if (strcmp(backing_file, backing_file_full) == 0) {
3909 retval = curr_bs->backing->bs;
3910 break;
3911 }
3912 } else {
3913 error_free(local_error);
3914 local_error = NULL;
3915 }
61007b31
SH
3916 } else {
3917 /* If not an absolute filename path, make it relative to the current
3918 * image's filename path */
3919 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3920 backing_file);
f9f05dc5 3921
61007b31
SH
3922 /* We are going to compare absolute pathnames */
3923 if (!realpath(filename_tmp, filename_full)) {
3924 continue;
3925 }
07f07615 3926
61007b31
SH
3927 /* We need to make sure the backing filename we are comparing against
3928 * is relative to the current image filename (or absolute) */
3929 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3930 curr_bs->backing_file);
07f07615 3931
61007b31
SH
3932 if (!realpath(filename_tmp, backing_file_full)) {
3933 continue;
3934 }
eb489bb1 3935
61007b31 3936 if (strcmp(backing_file_full, filename_full) == 0) {
760e0063 3937 retval = curr_bs->backing->bs;
61007b31
SH
3938 break;
3939 }
3940 }
eb489bb1
KW
3941 }
3942
61007b31
SH
3943 g_free(filename_full);
3944 g_free(backing_file_full);
3945 g_free(filename_tmp);
3946 return retval;
3947}
3948
3949int bdrv_get_backing_file_depth(BlockDriverState *bs)
3950{
3951 if (!bs->drv) {
3952 return 0;
eb489bb1
KW
3953 }
3954
760e0063 3955 if (!bs->backing) {
61007b31 3956 return 0;
ca716364
KW
3957 }
3958
760e0063 3959 return 1 + bdrv_get_backing_file_depth(bs->backing->bs);
61007b31 3960}
07f07615 3961
61007b31
SH
3962void bdrv_init(void)
3963{
3964 module_call_init(MODULE_INIT_BLOCK);
3965}
29cdb251 3966
61007b31
SH
3967void bdrv_init_with_whitelist(void)
3968{
3969 use_bdrv_whitelist = 1;
3970 bdrv_init();
07f07615
PB
3971}
3972
5a8a30db 3973void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 3974{
4417ab7a 3975 BdrvChild *child, *parent;
9c5e6594 3976 uint64_t perm, shared_perm;
5a8a30db
KW
3977 Error *local_err = NULL;
3978 int ret;
3979
3456a8d1
KW
3980 if (!bs->drv) {
3981 return;
3982 }
3983
04c01a5c 3984 if (!(bs->open_flags & BDRV_O_INACTIVE)) {
7ea2d269
AK
3985 return;
3986 }
7ea2d269 3987
16e977d5
VSO
3988 QLIST_FOREACH(child, &bs->children, next) {
3989 bdrv_invalidate_cache(child->bs, &local_err);
0d1c5c91 3990 if (local_err) {
0d1c5c91
FZ
3991 error_propagate(errp, local_err);
3992 return;
3993 }
5a8a30db 3994 }
0d1c5c91 3995
16e977d5
VSO
3996 bs->open_flags &= ~BDRV_O_INACTIVE;
3997 if (bs->drv->bdrv_invalidate_cache) {
3998 bs->drv->bdrv_invalidate_cache(bs, &local_err);
0d1c5c91
FZ
3999 if (local_err) {
4000 bs->open_flags |= BDRV_O_INACTIVE;
4001 error_propagate(errp, local_err);
4002 return;
4003 }
0f15423c 4004 }
3456a8d1 4005
5a8a30db
KW
4006 ret = refresh_total_sectors(bs, bs->total_sectors);
4007 if (ret < 0) {
04c01a5c 4008 bs->open_flags |= BDRV_O_INACTIVE;
5a8a30db
KW
4009 error_setg_errno(errp, -ret, "Could not refresh total sector count");
4010 return;
4011 }
4417ab7a 4012
9c5e6594
KW
4013 /* Update permissions, they may differ for inactive nodes */
4014 bdrv_get_cumulative_perm(bs, &perm, &shared_perm);
4015 ret = bdrv_check_perm(bs, perm, shared_perm, NULL, &local_err);
4016 if (ret < 0) {
4017 bs->open_flags |= BDRV_O_INACTIVE;
4018 error_propagate(errp, local_err);
4019 return;
4020 }
4021 bdrv_set_perm(bs, perm, shared_perm);
4022
4417ab7a
KW
4023 QLIST_FOREACH(parent, &bs->parents, next_parent) {
4024 if (parent->role->activate) {
4025 parent->role->activate(parent, &local_err);
4026 if (local_err) {
4027 error_propagate(errp, local_err);
4028 return;
4029 }
4030 }
4031 }
0f15423c
AL
4032}
4033
5a8a30db 4034void bdrv_invalidate_cache_all(Error **errp)
0f15423c 4035{
7c8eece4 4036 BlockDriverState *bs;
5a8a30db 4037 Error *local_err = NULL;
88be7b4b 4038 BdrvNextIterator it;
0f15423c 4039
88be7b4b 4040 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
ed78cda3
SH
4041 AioContext *aio_context = bdrv_get_aio_context(bs);
4042
4043 aio_context_acquire(aio_context);
5a8a30db 4044 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 4045 aio_context_release(aio_context);
5a8a30db
KW
4046 if (local_err) {
4047 error_propagate(errp, local_err);
4048 return;
4049 }
0f15423c
AL
4050 }
4051}
4052
aad0b7a0
FZ
4053static int bdrv_inactivate_recurse(BlockDriverState *bs,
4054 bool setting_flag)
76b1c7fe 4055{
cfa1a572 4056 BdrvChild *child, *parent;
76b1c7fe
KW
4057 int ret;
4058
aad0b7a0 4059 if (!setting_flag && bs->drv->bdrv_inactivate) {
76b1c7fe
KW
4060 ret = bs->drv->bdrv_inactivate(bs);
4061 if (ret < 0) {
4062 return ret;
4063 }
4064 }
4065
aad0b7a0 4066 if (setting_flag) {
9c5e6594
KW
4067 uint64_t perm, shared_perm;
4068
aad0b7a0 4069 bs->open_flags |= BDRV_O_INACTIVE;
cfa1a572
KW
4070
4071 QLIST_FOREACH(parent, &bs->parents, next_parent) {
4072 if (parent->role->inactivate) {
4073 ret = parent->role->inactivate(parent);
4074 if (ret < 0) {
4075 bs->open_flags &= ~BDRV_O_INACTIVE;
4076 return ret;
4077 }
4078 }
4079 }
9c5e6594
KW
4080
4081 /* Update permissions, they may differ for inactive nodes */
4082 bdrv_get_cumulative_perm(bs, &perm, &shared_perm);
4083 bdrv_check_perm(bs, perm, shared_perm, NULL, &error_abort);
4084 bdrv_set_perm(bs, perm, shared_perm);
aad0b7a0 4085 }
38701b6a
KW
4086
4087 QLIST_FOREACH(child, &bs->children, next) {
4088 ret = bdrv_inactivate_recurse(child->bs, setting_flag);
4089 if (ret < 0) {
4090 return ret;
4091 }
4092 }
4093
76b1c7fe
KW
4094 return 0;
4095}
4096
4097int bdrv_inactivate_all(void)
4098{
79720af6 4099 BlockDriverState *bs = NULL;
88be7b4b 4100 BdrvNextIterator it;
aad0b7a0
FZ
4101 int ret = 0;
4102 int pass;
76b1c7fe 4103
88be7b4b 4104 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
4105 aio_context_acquire(bdrv_get_aio_context(bs));
4106 }
76b1c7fe 4107
aad0b7a0
FZ
4108 /* We do two passes of inactivation. The first pass calls to drivers'
4109 * .bdrv_inactivate callbacks recursively so all cache is flushed to disk;
4110 * the second pass sets the BDRV_O_INACTIVE flag so that no further write
4111 * is allowed. */
4112 for (pass = 0; pass < 2; pass++) {
88be7b4b 4113 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
4114 ret = bdrv_inactivate_recurse(bs, pass);
4115 if (ret < 0) {
4116 goto out;
4117 }
76b1c7fe
KW
4118 }
4119 }
4120
aad0b7a0 4121out:
88be7b4b 4122 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
4123 aio_context_release(bdrv_get_aio_context(bs));
4124 }
4125
4126 return ret;
76b1c7fe
KW
4127}
4128
19cb3738
FB
4129/**************************************************************/
4130/* removable device support */
4131
4132/**
4133 * Return TRUE if the media is present
4134 */
e031f750 4135bool bdrv_is_inserted(BlockDriverState *bs)
19cb3738
FB
4136{
4137 BlockDriver *drv = bs->drv;
28d7a789 4138 BdrvChild *child;
a1aff5bf 4139
e031f750
HR
4140 if (!drv) {
4141 return false;
4142 }
28d7a789
HR
4143 if (drv->bdrv_is_inserted) {
4144 return drv->bdrv_is_inserted(bs);
4145 }
4146 QLIST_FOREACH(child, &bs->children, next) {
4147 if (!bdrv_is_inserted(child->bs)) {
4148 return false;
4149 }
e031f750 4150 }
28d7a789 4151 return true;
19cb3738
FB
4152}
4153
4154/**
8e49ca46
MA
4155 * Return whether the media changed since the last call to this
4156 * function, or -ENOTSUP if we don't know. Most drivers don't know.
19cb3738
FB
4157 */
4158int bdrv_media_changed(BlockDriverState *bs)
4159{
4160 BlockDriver *drv = bs->drv;
19cb3738 4161
8e49ca46
MA
4162 if (drv && drv->bdrv_media_changed) {
4163 return drv->bdrv_media_changed(bs);
4164 }
4165 return -ENOTSUP;
19cb3738
FB
4166}
4167
4168/**
4169 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
4170 */
f36f3949 4171void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
4172{
4173 BlockDriver *drv = bs->drv;
19cb3738 4174
822e1cd1
MA
4175 if (drv && drv->bdrv_eject) {
4176 drv->bdrv_eject(bs, eject_flag);
19cb3738
FB
4177 }
4178}
4179
19cb3738
FB
4180/**
4181 * Lock or unlock the media (if it is locked, the user won't be able
4182 * to eject it manually).
4183 */
025e849a 4184void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
4185{
4186 BlockDriver *drv = bs->drv;
4187
025e849a 4188 trace_bdrv_lock_medium(bs, locked);
b8c6d095 4189
025e849a
MA
4190 if (drv && drv->bdrv_lock_medium) {
4191 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
4192 }
4193}
985a03b0 4194
9fcb0251
FZ
4195/* Get a reference to bs */
4196void bdrv_ref(BlockDriverState *bs)
4197{
4198 bs->refcnt++;
4199}
4200
4201/* Release a previously grabbed reference to bs.
4202 * If after releasing, reference count is zero, the BlockDriverState is
4203 * deleted. */
4204void bdrv_unref(BlockDriverState *bs)
4205{
9a4d5ca6
JC
4206 if (!bs) {
4207 return;
4208 }
9fcb0251
FZ
4209 assert(bs->refcnt > 0);
4210 if (--bs->refcnt == 0) {
4211 bdrv_delete(bs);
4212 }
4213}
4214
fbe40ff7
FZ
4215struct BdrvOpBlocker {
4216 Error *reason;
4217 QLIST_ENTRY(BdrvOpBlocker) list;
4218};
4219
4220bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
4221{
4222 BdrvOpBlocker *blocker;
4223 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4224 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
4225 blocker = QLIST_FIRST(&bs->op_blockers[op]);
4226 if (errp) {
e43bfd9c
MA
4227 *errp = error_copy(blocker->reason);
4228 error_prepend(errp, "Node '%s' is busy: ",
4229 bdrv_get_device_or_node_name(bs));
fbe40ff7
FZ
4230 }
4231 return true;
4232 }
4233 return false;
4234}
4235
4236void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
4237{
4238 BdrvOpBlocker *blocker;
4239 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4240
5839e53b 4241 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
4242 blocker->reason = reason;
4243 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
4244}
4245
4246void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
4247{
4248 BdrvOpBlocker *blocker, *next;
4249 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4250 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
4251 if (blocker->reason == reason) {
4252 QLIST_REMOVE(blocker, list);
4253 g_free(blocker);
4254 }
4255 }
4256}
4257
4258void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
4259{
4260 int i;
4261 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4262 bdrv_op_block(bs, i, reason);
4263 }
4264}
4265
4266void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
4267{
4268 int i;
4269 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4270 bdrv_op_unblock(bs, i, reason);
4271 }
4272}
4273
4274bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
4275{
4276 int i;
4277
4278 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4279 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
4280 return false;
4281 }
4282 }
4283 return true;
4284}
4285
d92ada22
LC
4286void bdrv_img_create(const char *filename, const char *fmt,
4287 const char *base_filename, const char *base_fmt,
9217283d
FZ
4288 char *options, uint64_t img_size, int flags, bool quiet,
4289 Error **errp)
f88e1a42 4290{
83d0521a
CL
4291 QemuOptsList *create_opts = NULL;
4292 QemuOpts *opts = NULL;
4293 const char *backing_fmt, *backing_file;
4294 int64_t size;
f88e1a42 4295 BlockDriver *drv, *proto_drv;
cc84d90f 4296 Error *local_err = NULL;
f88e1a42
JS
4297 int ret = 0;
4298
4299 /* Find driver and parse its options */
4300 drv = bdrv_find_format(fmt);
4301 if (!drv) {
71c79813 4302 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 4303 return;
f88e1a42
JS
4304 }
4305
b65a5e12 4306 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 4307 if (!proto_drv) {
d92ada22 4308 return;
f88e1a42
JS
4309 }
4310
c6149724
HR
4311 if (!drv->create_opts) {
4312 error_setg(errp, "Format driver '%s' does not support image creation",
4313 drv->format_name);
4314 return;
4315 }
4316
4317 if (!proto_drv->create_opts) {
4318 error_setg(errp, "Protocol driver '%s' does not support image creation",
4319 proto_drv->format_name);
4320 return;
4321 }
4322
c282e1fd
CL
4323 create_opts = qemu_opts_append(create_opts, drv->create_opts);
4324 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
4325
4326 /* Create parameter list with default values */
83d0521a 4327 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 4328 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
4329
4330 /* Parse -o options */
4331 if (options) {
dc523cd3
MA
4332 qemu_opts_do_parse(opts, options, NULL, &local_err);
4333 if (local_err) {
4334 error_report_err(local_err);
4335 local_err = NULL;
83d0521a 4336 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
4337 goto out;
4338 }
4339 }
4340
4341 if (base_filename) {
f43e47db 4342 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 4343 if (local_err) {
71c79813
LC
4344 error_setg(errp, "Backing file not supported for file format '%s'",
4345 fmt);
f88e1a42
JS
4346 goto out;
4347 }
4348 }
4349
4350 if (base_fmt) {
f43e47db 4351 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 4352 if (local_err) {
71c79813
LC
4353 error_setg(errp, "Backing file format not supported for file "
4354 "format '%s'", fmt);
f88e1a42
JS
4355 goto out;
4356 }
4357 }
4358
83d0521a
CL
4359 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
4360 if (backing_file) {
4361 if (!strcmp(filename, backing_file)) {
71c79813
LC
4362 error_setg(errp, "Error: Trying to create an image with the "
4363 "same filename as the backing file");
792da93a
JS
4364 goto out;
4365 }
4366 }
4367
83d0521a 4368 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42
JS
4369
4370 // The size for the image must always be specified, with one exception:
4371 // If we are using a backing file, we can obtain the size from there
83d0521a
CL
4372 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
4373 if (size == -1) {
4374 if (backing_file) {
66f6b814 4375 BlockDriverState *bs;
29168018 4376 char *full_backing = g_new0(char, PATH_MAX);
52bf1e72 4377 int64_t size;
63090dac 4378 int back_flags;
e6641719 4379 QDict *backing_options = NULL;
63090dac 4380
29168018
HR
4381 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
4382 full_backing, PATH_MAX,
4383 &local_err);
4384 if (local_err) {
4385 g_free(full_backing);
4386 goto out;
4387 }
4388
63090dac 4389 /* backing files always opened read-only */
61de4c68 4390 back_flags = flags;
bfd18d1e 4391 back_flags &= ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 4392
e6641719
HR
4393 if (backing_fmt) {
4394 backing_options = qdict_new();
46f5ac20 4395 qdict_put_str(backing_options, "driver", backing_fmt);
e6641719
HR
4396 }
4397
5b363937
HR
4398 bs = bdrv_open(full_backing, NULL, backing_options, back_flags,
4399 &local_err);
29168018 4400 g_free(full_backing);
5b363937 4401 if (!bs) {
f88e1a42
JS
4402 goto out;
4403 }
52bf1e72
MA
4404 size = bdrv_getlength(bs);
4405 if (size < 0) {
4406 error_setg_errno(errp, -size, "Could not get size of '%s'",
4407 backing_file);
4408 bdrv_unref(bs);
4409 goto out;
4410 }
f88e1a42 4411
39101f25 4412 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
66f6b814
HR
4413
4414 bdrv_unref(bs);
f88e1a42 4415 } else {
71c79813 4416 error_setg(errp, "Image creation needs a size parameter");
f88e1a42
JS
4417 goto out;
4418 }
4419 }
4420
f382d43a 4421 if (!quiet) {
fe646693 4422 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 4423 qemu_opts_print(opts, " ");
f382d43a
MR
4424 puts("");
4425 }
83d0521a 4426
c282e1fd 4427 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 4428
cc84d90f
HR
4429 if (ret == -EFBIG) {
4430 /* This is generally a better message than whatever the driver would
4431 * deliver (especially because of the cluster_size_hint), since that
4432 * is most probably not much different from "image too large". */
4433 const char *cluster_size_hint = "";
83d0521a 4434 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 4435 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 4436 }
cc84d90f
HR
4437 error_setg(errp, "The image size is too large for file format '%s'"
4438 "%s", fmt, cluster_size_hint);
4439 error_free(local_err);
4440 local_err = NULL;
f88e1a42
JS
4441 }
4442
4443out:
83d0521a
CL
4444 qemu_opts_del(opts);
4445 qemu_opts_free(create_opts);
621ff94d 4446 error_propagate(errp, local_err);
f88e1a42 4447}
85d126f3
SH
4448
4449AioContext *bdrv_get_aio_context(BlockDriverState *bs)
4450{
dcd04228
SH
4451 return bs->aio_context;
4452}
4453
052a7572
FZ
4454void bdrv_coroutine_enter(BlockDriverState *bs, Coroutine *co)
4455{
4456 aio_co_enter(bdrv_get_aio_context(bs), co);
4457}
4458
e8a095da
SH
4459static void bdrv_do_remove_aio_context_notifier(BdrvAioNotifier *ban)
4460{
4461 QLIST_REMOVE(ban, list);
4462 g_free(ban);
4463}
4464
dcd04228
SH
4465void bdrv_detach_aio_context(BlockDriverState *bs)
4466{
e8a095da 4467 BdrvAioNotifier *baf, *baf_tmp;
b97511c7 4468 BdrvChild *child;
33384421 4469
dcd04228
SH
4470 if (!bs->drv) {
4471 return;
4472 }
4473
e8a095da
SH
4474 assert(!bs->walking_aio_notifiers);
4475 bs->walking_aio_notifiers = true;
4476 QLIST_FOREACH_SAFE(baf, &bs->aio_notifiers, list, baf_tmp) {
4477 if (baf->deleted) {
4478 bdrv_do_remove_aio_context_notifier(baf);
4479 } else {
4480 baf->detach_aio_context(baf->opaque);
4481 }
33384421 4482 }
e8a095da
SH
4483 /* Never mind iterating again to check for ->deleted. bdrv_close() will
4484 * remove remaining aio notifiers if we aren't called again.
4485 */
4486 bs->walking_aio_notifiers = false;
33384421 4487
dcd04228
SH
4488 if (bs->drv->bdrv_detach_aio_context) {
4489 bs->drv->bdrv_detach_aio_context(bs);
4490 }
b97511c7
HR
4491 QLIST_FOREACH(child, &bs->children, next) {
4492 bdrv_detach_aio_context(child->bs);
dcd04228
SH
4493 }
4494
4495 bs->aio_context = NULL;
4496}
4497
4498void bdrv_attach_aio_context(BlockDriverState *bs,
4499 AioContext *new_context)
4500{
e8a095da 4501 BdrvAioNotifier *ban, *ban_tmp;
b97511c7 4502 BdrvChild *child;
33384421 4503
dcd04228
SH
4504 if (!bs->drv) {
4505 return;
4506 }
4507
4508 bs->aio_context = new_context;
4509
b97511c7
HR
4510 QLIST_FOREACH(child, &bs->children, next) {
4511 bdrv_attach_aio_context(child->bs, new_context);
dcd04228
SH
4512 }
4513 if (bs->drv->bdrv_attach_aio_context) {
4514 bs->drv->bdrv_attach_aio_context(bs, new_context);
4515 }
33384421 4516
e8a095da
SH
4517 assert(!bs->walking_aio_notifiers);
4518 bs->walking_aio_notifiers = true;
4519 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_tmp) {
4520 if (ban->deleted) {
4521 bdrv_do_remove_aio_context_notifier(ban);
4522 } else {
4523 ban->attached_aio_context(new_context, ban->opaque);
4524 }
33384421 4525 }
e8a095da 4526 bs->walking_aio_notifiers = false;
dcd04228
SH
4527}
4528
4529void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
4530{
aabf5910 4531 AioContext *ctx = bdrv_get_aio_context(bs);
c2b6428d 4532
aabf5910
FZ
4533 aio_disable_external(ctx);
4534 bdrv_parent_drained_begin(bs);
53ec73e2 4535 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228 4536
c2b6428d
PB
4537 while (aio_poll(ctx, false)) {
4538 /* wait for all bottom halves to execute */
4539 }
4540
dcd04228
SH
4541 bdrv_detach_aio_context(bs);
4542
4543 /* This function executes in the old AioContext so acquire the new one in
4544 * case it runs in a different thread.
4545 */
4546 aio_context_acquire(new_context);
4547 bdrv_attach_aio_context(bs, new_context);
aabf5910
FZ
4548 bdrv_parent_drained_end(bs);
4549 aio_enable_external(ctx);
dcd04228 4550 aio_context_release(new_context);
85d126f3 4551}
d616b224 4552
33384421
HR
4553void bdrv_add_aio_context_notifier(BlockDriverState *bs,
4554 void (*attached_aio_context)(AioContext *new_context, void *opaque),
4555 void (*detach_aio_context)(void *opaque), void *opaque)
4556{
4557 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
4558 *ban = (BdrvAioNotifier){
4559 .attached_aio_context = attached_aio_context,
4560 .detach_aio_context = detach_aio_context,
4561 .opaque = opaque
4562 };
4563
4564 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
4565}
4566
4567void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
4568 void (*attached_aio_context)(AioContext *,
4569 void *),
4570 void (*detach_aio_context)(void *),
4571 void *opaque)
4572{
4573 BdrvAioNotifier *ban, *ban_next;
4574
4575 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
4576 if (ban->attached_aio_context == attached_aio_context &&
4577 ban->detach_aio_context == detach_aio_context &&
e8a095da
SH
4578 ban->opaque == opaque &&
4579 ban->deleted == false)
33384421 4580 {
e8a095da
SH
4581 if (bs->walking_aio_notifiers) {
4582 ban->deleted = true;
4583 } else {
4584 bdrv_do_remove_aio_context_notifier(ban);
4585 }
33384421
HR
4586 return;
4587 }
4588 }
4589
4590 abort();
4591}
4592
77485434 4593int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
8b13976d 4594 BlockDriverAmendStatusCB *status_cb, void *cb_opaque)
6f176b48 4595{
c282e1fd 4596 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
4597 return -ENOTSUP;
4598 }
8b13976d 4599 return bs->drv->bdrv_amend_options(bs, opts, status_cb, cb_opaque);
6f176b48 4600}
f6186f49 4601
b5042a36
BC
4602/* This function will be called by the bdrv_recurse_is_first_non_filter method
4603 * of block filter and by bdrv_is_first_non_filter.
4604 * It is used to test if the given bs is the candidate or recurse more in the
4605 * node graph.
212a5a8f 4606 */
b5042a36 4607bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 4608 BlockDriverState *candidate)
f6186f49 4609{
b5042a36
BC
4610 /* return false if basic checks fails */
4611 if (!bs || !bs->drv) {
212a5a8f 4612 return false;
f6186f49
BC
4613 }
4614
b5042a36
BC
4615 /* the code reached a non block filter driver -> check if the bs is
4616 * the same as the candidate. It's the recursion termination condition.
4617 */
4618 if (!bs->drv->is_filter) {
4619 return bs == candidate;
212a5a8f 4620 }
b5042a36 4621 /* Down this path the driver is a block filter driver */
212a5a8f 4622
b5042a36
BC
4623 /* If the block filter recursion method is defined use it to recurse down
4624 * the node graph.
4625 */
4626 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 4627 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
4628 }
4629
b5042a36
BC
4630 /* the driver is a block filter but don't allow to recurse -> return false
4631 */
4632 return false;
f6186f49
BC
4633}
4634
212a5a8f
BC
4635/* This function checks if the candidate is the first non filter bs down it's
4636 * bs chain. Since we don't have pointers to parents it explore all bs chains
4637 * from the top. Some filters can choose not to pass down the recursion.
4638 */
4639bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 4640{
7c8eece4 4641 BlockDriverState *bs;
88be7b4b 4642 BdrvNextIterator it;
212a5a8f
BC
4643
4644 /* walk down the bs forest recursively */
88be7b4b 4645 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
212a5a8f
BC
4646 bool perm;
4647
b5042a36 4648 /* try to recurse in this top level bs */
e6dc8a1f 4649 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
4650
4651 /* candidate is the first non filter */
4652 if (perm) {
4653 return true;
4654 }
4655 }
4656
4657 return false;
f6186f49 4658}
09158f00 4659
e12f3784
WC
4660BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
4661 const char *node_name, Error **errp)
09158f00
BC
4662{
4663 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
4664 AioContext *aio_context;
4665
09158f00
BC
4666 if (!to_replace_bs) {
4667 error_setg(errp, "Node name '%s' not found", node_name);
4668 return NULL;
4669 }
4670
5a7e7a0b
SH
4671 aio_context = bdrv_get_aio_context(to_replace_bs);
4672 aio_context_acquire(aio_context);
4673
09158f00 4674 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
4675 to_replace_bs = NULL;
4676 goto out;
09158f00
BC
4677 }
4678
4679 /* We don't want arbitrary node of the BDS chain to be replaced only the top
4680 * most non filter in order to prevent data corruption.
4681 * Another benefit is that this tests exclude backing files which are
4682 * blocked by the backing blockers.
4683 */
e12f3784 4684 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 4685 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
4686 to_replace_bs = NULL;
4687 goto out;
09158f00
BC
4688 }
4689
5a7e7a0b
SH
4690out:
4691 aio_context_release(aio_context);
09158f00
BC
4692 return to_replace_bs;
4693}
448ad91d 4694
91af7014
HR
4695static bool append_open_options(QDict *d, BlockDriverState *bs)
4696{
4697 const QDictEntry *entry;
9e700c1a 4698 QemuOptDesc *desc;
260fecf1 4699 BdrvChild *child;
91af7014 4700 bool found_any = false;
260fecf1 4701 const char *p;
91af7014
HR
4702
4703 for (entry = qdict_first(bs->options); entry;
4704 entry = qdict_next(bs->options, entry))
4705 {
260fecf1
KW
4706 /* Exclude options for children */
4707 QLIST_FOREACH(child, &bs->children, next) {
4708 if (strstart(qdict_entry_key(entry), child->name, &p)
4709 && (!*p || *p == '.'))
4710 {
4711 break;
4712 }
4713 }
4714 if (child) {
9e700c1a 4715 continue;
91af7014 4716 }
9e700c1a
KW
4717
4718 /* And exclude all non-driver-specific options */
4719 for (desc = bdrv_runtime_opts.desc; desc->name; desc++) {
4720 if (!strcmp(qdict_entry_key(entry), desc->name)) {
4721 break;
4722 }
4723 }
4724 if (desc->name) {
4725 continue;
4726 }
4727
4728 qobject_incref(qdict_entry_value(entry));
4729 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
4730 found_any = true;
91af7014
HR
4731 }
4732
4733 return found_any;
4734}
4735
4736/* Updates the following BDS fields:
4737 * - exact_filename: A filename which may be used for opening a block device
4738 * which (mostly) equals the given BDS (even without any
4739 * other options; so reading and writing must return the same
4740 * results, but caching etc. may be different)
4741 * - full_open_options: Options which, when given when opening a block device
4742 * (without a filename), result in a BDS (mostly)
4743 * equalling the given one
4744 * - filename: If exact_filename is set, it is copied here. Otherwise,
4745 * full_open_options is converted to a JSON object, prefixed with
4746 * "json:" (for use through the JSON pseudo protocol) and put here.
4747 */
4748void bdrv_refresh_filename(BlockDriverState *bs)
4749{
4750 BlockDriver *drv = bs->drv;
4751 QDict *opts;
4752
4753 if (!drv) {
4754 return;
4755 }
4756
4757 /* This BDS's file name will most probably depend on its file's name, so
4758 * refresh that first */
4759 if (bs->file) {
9a4f4c31 4760 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
4761 }
4762
4763 if (drv->bdrv_refresh_filename) {
4764 /* Obsolete information is of no use here, so drop the old file name
4765 * information before refreshing it */
4766 bs->exact_filename[0] = '\0';
4767 if (bs->full_open_options) {
4768 QDECREF(bs->full_open_options);
4769 bs->full_open_options = NULL;
4770 }
4771
4cdd01d3
KW
4772 opts = qdict_new();
4773 append_open_options(opts, bs);
4774 drv->bdrv_refresh_filename(bs, opts);
4775 QDECREF(opts);
91af7014
HR
4776 } else if (bs->file) {
4777 /* Try to reconstruct valid information from the underlying file */
4778 bool has_open_options;
4779
4780 bs->exact_filename[0] = '\0';
4781 if (bs->full_open_options) {
4782 QDECREF(bs->full_open_options);
4783 bs->full_open_options = NULL;
4784 }
4785
4786 opts = qdict_new();
4787 has_open_options = append_open_options(opts, bs);
4788
4789 /* If no specific options have been given for this BDS, the filename of
4790 * the underlying file should suffice for this one as well */
9a4f4c31
KW
4791 if (bs->file->bs->exact_filename[0] && !has_open_options) {
4792 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
4793 }
4794 /* Reconstructing the full options QDict is simple for most format block
4795 * drivers, as long as the full options are known for the underlying
4796 * file BDS. The full options QDict of that file BDS should somehow
4797 * contain a representation of the filename, therefore the following
4798 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 4799 if (bs->file->bs->full_open_options) {
46f5ac20 4800 qdict_put_str(opts, "driver", drv->format_name);
9a4f4c31 4801 QINCREF(bs->file->bs->full_open_options);
de6e7951 4802 qdict_put(opts, "file", bs->file->bs->full_open_options);
91af7014
HR
4803
4804 bs->full_open_options = opts;
4805 } else {
4806 QDECREF(opts);
4807 }
4808 } else if (!bs->full_open_options && qdict_size(bs->options)) {
4809 /* There is no underlying file BDS (at least referenced by BDS.file),
4810 * so the full options QDict should be equal to the options given
4811 * specifically for this block device when it was opened (plus the
4812 * driver specification).
4813 * Because those options don't change, there is no need to update
4814 * full_open_options when it's already set. */
4815
4816 opts = qdict_new();
4817 append_open_options(opts, bs);
46f5ac20 4818 qdict_put_str(opts, "driver", drv->format_name);
91af7014
HR
4819
4820 if (bs->exact_filename[0]) {
4821 /* This may not work for all block protocol drivers (some may
4822 * require this filename to be parsed), but we have to find some
4823 * default solution here, so just include it. If some block driver
4824 * does not support pure options without any filename at all or
4825 * needs some special format of the options QDict, it needs to
4826 * implement the driver-specific bdrv_refresh_filename() function.
4827 */
46f5ac20 4828 qdict_put_str(opts, "filename", bs->exact_filename);
91af7014
HR
4829 }
4830
4831 bs->full_open_options = opts;
4832 }
4833
4834 if (bs->exact_filename[0]) {
4835 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4836 } else if (bs->full_open_options) {
4837 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4838 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4839 qstring_get_str(json));
4840 QDECREF(json);
4841 }
4842}
e06018ad
WC
4843
4844/*
4845 * Hot add/remove a BDS's child. So the user can take a child offline when
4846 * it is broken and take a new child online
4847 */
4848void bdrv_add_child(BlockDriverState *parent_bs, BlockDriverState *child_bs,
4849 Error **errp)
4850{
4851
4852 if (!parent_bs->drv || !parent_bs->drv->bdrv_add_child) {
4853 error_setg(errp, "The node %s does not support adding a child",
4854 bdrv_get_device_or_node_name(parent_bs));
4855 return;
4856 }
4857
4858 if (!QLIST_EMPTY(&child_bs->parents)) {
4859 error_setg(errp, "The node %s already has a parent",
4860 child_bs->node_name);
4861 return;
4862 }
4863
4864 parent_bs->drv->bdrv_add_child(parent_bs, child_bs, errp);
4865}
4866
4867void bdrv_del_child(BlockDriverState *parent_bs, BdrvChild *child, Error **errp)
4868{
4869 BdrvChild *tmp;
4870
4871 if (!parent_bs->drv || !parent_bs->drv->bdrv_del_child) {
4872 error_setg(errp, "The node %s does not support removing a child",
4873 bdrv_get_device_or_node_name(parent_bs));
4874 return;
4875 }
4876
4877 QLIST_FOREACH(tmp, &parent_bs->children, next) {
4878 if (tmp == child) {
4879 break;
4880 }
4881 }
4882
4883 if (!tmp) {
4884 error_setg(errp, "The node %s does not have a child named %s",
4885 bdrv_get_device_or_node_name(parent_bs),
4886 bdrv_get_device_or_node_name(child->bs));
4887 return;
4888 }
4889
4890 parent_bs->drv->bdrv_del_child(parent_bs, child, errp);
4891}