]> git.proxmox.com Git - mirror_qemu.git/blame - block.c
qemu-iotests: Remove cache mode test without medium
[mirror_qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
3990d09a 24#include "config-host.h"
faf07963 25#include "qemu-common.h"
6d519a5f 26#include "trace.h"
737e150e
PB
27#include "block/block_int.h"
28#include "block/blockjob.h"
d49b6836 29#include "qemu/error-report.h"
1de7afc9 30#include "qemu/module.h"
cc7a8ea7 31#include "qapi/qmp/qerror.h"
7b1b5d19 32#include "qapi/qmp/qjson.h"
bfb197e0 33#include "sysemu/block-backend.h"
9c17d615 34#include "sysemu/sysemu.h"
1de7afc9 35#include "qemu/notify.h"
10817bf0 36#include "qemu/coroutine.h"
c13163fb 37#include "block/qapi.h"
b2023818 38#include "qmp-commands.h"
1de7afc9 39#include "qemu/timer.h"
a5ee7bd4 40#include "qapi-event.h"
db628338 41#include "block/throttle-groups.h"
fc01f7e7 42
71e72a19 43#ifdef CONFIG_BSD
7674e7bf
FB
44#include <sys/types.h>
45#include <sys/stat.h>
46#include <sys/ioctl.h>
72cf2d4f 47#include <sys/queue.h>
c5e97233 48#ifndef __DragonFly__
7674e7bf
FB
49#include <sys/disk.h>
50#endif
c5e97233 51#endif
7674e7bf 52
49dc768d
AL
53#ifdef _WIN32
54#include <windows.h>
55#endif
56
9bd2b08f
JS
57/**
58 * A BdrvDirtyBitmap can be in three possible states:
59 * (1) successor is NULL and disabled is false: full r/w mode
60 * (2) successor is NULL and disabled is true: read only mode ("disabled")
61 * (3) successor is set: frozen mode.
62 * A frozen bitmap cannot be renamed, deleted, anonymized, cleared, set,
63 * or enabled. A frozen bitmap can only abdicate() or reclaim().
64 */
e4654d2d 65struct BdrvDirtyBitmap {
aa0c7ca5
JS
66 HBitmap *bitmap; /* Dirty sector bitmap implementation */
67 BdrvDirtyBitmap *successor; /* Anonymous child; implies frozen status */
68 char *name; /* Optional non-empty unique ID */
69 int64_t size; /* Size of the bitmap (Number of sectors) */
70 bool disabled; /* Bitmap is read-only */
e4654d2d
FZ
71 QLIST_ENTRY(BdrvDirtyBitmap) list;
72};
73
1c9805a3
SH
74#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
75
c69a4dd8 76struct BdrvStates bdrv_states = QTAILQ_HEAD_INITIALIZER(bdrv_states);
7ee930d0 77
dc364f4c
BC
78static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
79 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
80
8a22f02a
SH
81static QLIST_HEAD(, BlockDriver) bdrv_drivers =
82 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 83
f3930ed0
KW
84static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
85 const char *reference, QDict *options, int flags,
86 BlockDriverState *parent,
ce343771 87 const BdrvChildRole *child_role, Error **errp);
f3930ed0 88
ce1ffea8 89static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs);
eb852011
MA
90/* If non-zero, use only whitelisted block drivers */
91static int use_bdrv_whitelist;
92
9e0b22f4
SH
93#ifdef _WIN32
94static int is_windows_drive_prefix(const char *filename)
95{
96 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
97 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
98 filename[1] == ':');
99}
100
101int is_windows_drive(const char *filename)
102{
103 if (is_windows_drive_prefix(filename) &&
104 filename[2] == '\0')
105 return 1;
106 if (strstart(filename, "\\\\.\\", NULL) ||
107 strstart(filename, "//./", NULL))
108 return 1;
109 return 0;
110}
111#endif
112
339064d5
KW
113size_t bdrv_opt_mem_align(BlockDriverState *bs)
114{
115 if (!bs || !bs->drv) {
459b4e66
DL
116 /* page size or 4k (hdd sector size) should be on the safe side */
117 return MAX(4096, getpagesize());
339064d5
KW
118 }
119
120 return bs->bl.opt_mem_alignment;
121}
122
4196d2f0
DL
123size_t bdrv_min_mem_align(BlockDriverState *bs)
124{
125 if (!bs || !bs->drv) {
459b4e66
DL
126 /* page size or 4k (hdd sector size) should be on the safe side */
127 return MAX(4096, getpagesize());
4196d2f0
DL
128 }
129
130 return bs->bl.min_mem_alignment;
131}
132
9e0b22f4 133/* check if the path starts with "<protocol>:" */
5c98415b 134int path_has_protocol(const char *path)
9e0b22f4 135{
947995c0
PB
136 const char *p;
137
9e0b22f4
SH
138#ifdef _WIN32
139 if (is_windows_drive(path) ||
140 is_windows_drive_prefix(path)) {
141 return 0;
142 }
947995c0
PB
143 p = path + strcspn(path, ":/\\");
144#else
145 p = path + strcspn(path, ":/");
9e0b22f4
SH
146#endif
147
947995c0 148 return *p == ':';
9e0b22f4
SH
149}
150
83f64091 151int path_is_absolute(const char *path)
3b0d4f61 152{
21664424
FB
153#ifdef _WIN32
154 /* specific case for names like: "\\.\d:" */
f53f4da9 155 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 156 return 1;
f53f4da9
PB
157 }
158 return (*path == '/' || *path == '\\');
3b9f94e1 159#else
f53f4da9 160 return (*path == '/');
3b9f94e1 161#endif
3b0d4f61
FB
162}
163
83f64091
FB
164/* if filename is absolute, just copy it to dest. Otherwise, build a
165 path to it by considering it is relative to base_path. URL are
166 supported. */
167void path_combine(char *dest, int dest_size,
168 const char *base_path,
169 const char *filename)
3b0d4f61 170{
83f64091
FB
171 const char *p, *p1;
172 int len;
173
174 if (dest_size <= 0)
175 return;
176 if (path_is_absolute(filename)) {
177 pstrcpy(dest, dest_size, filename);
178 } else {
179 p = strchr(base_path, ':');
180 if (p)
181 p++;
182 else
183 p = base_path;
3b9f94e1
FB
184 p1 = strrchr(base_path, '/');
185#ifdef _WIN32
186 {
187 const char *p2;
188 p2 = strrchr(base_path, '\\');
189 if (!p1 || p2 > p1)
190 p1 = p2;
191 }
192#endif
83f64091
FB
193 if (p1)
194 p1++;
195 else
196 p1 = base_path;
197 if (p1 > p)
198 p = p1;
199 len = p - base_path;
200 if (len > dest_size - 1)
201 len = dest_size - 1;
202 memcpy(dest, base_path, len);
203 dest[len] = '\0';
204 pstrcat(dest, dest_size, filename);
3b0d4f61 205 }
3b0d4f61
FB
206}
207
0a82855a
HR
208void bdrv_get_full_backing_filename_from_filename(const char *backed,
209 const char *backing,
9f07429e
HR
210 char *dest, size_t sz,
211 Error **errp)
dc5a1371 212{
9f07429e
HR
213 if (backing[0] == '\0' || path_has_protocol(backing) ||
214 path_is_absolute(backing))
215 {
0a82855a 216 pstrcpy(dest, sz, backing);
9f07429e
HR
217 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
218 error_setg(errp, "Cannot use relative backing file names for '%s'",
219 backed);
dc5a1371 220 } else {
0a82855a 221 path_combine(dest, sz, backed, backing);
dc5a1371
PB
222 }
223}
224
9f07429e
HR
225void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
226 Error **errp)
0a82855a 227{
9f07429e
HR
228 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
229
230 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
231 dest, sz, errp);
0a82855a
HR
232}
233
0eb7217e
SH
234void bdrv_register(BlockDriver *bdrv)
235{
236 bdrv_setup_io_funcs(bdrv);
b2e12bc6 237
8a22f02a 238 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 239}
b338082b 240
7f06d47e 241BlockDriverState *bdrv_new_root(void)
b338082b 242{
7f06d47e 243 BlockDriverState *bs = bdrv_new();
e4e9986b 244
e4e9986b 245 QTAILQ_INSERT_TAIL(&bdrv_states, bs, device_list);
e4e9986b
MA
246 return bs;
247}
248
249BlockDriverState *bdrv_new(void)
250{
251 BlockDriverState *bs;
252 int i;
253
5839e53b 254 bs = g_new0(BlockDriverState, 1);
e4654d2d 255 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
256 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
257 QLIST_INIT(&bs->op_blockers[i]);
258 }
d7d512f6 259 notifier_list_init(&bs->close_notifiers);
d616b224 260 notifier_with_return_list_init(&bs->before_write_notifiers);
cc0681c4
BC
261 qemu_co_queue_init(&bs->throttled_reqs[0]);
262 qemu_co_queue_init(&bs->throttled_reqs[1]);
9fcb0251 263 bs->refcnt = 1;
dcd04228 264 bs->aio_context = qemu_get_aio_context();
d7d512f6 265
b338082b
FB
266 return bs;
267}
268
d7d512f6
PB
269void bdrv_add_close_notifier(BlockDriverState *bs, Notifier *notify)
270{
271 notifier_list_add(&bs->close_notifiers, notify);
272}
273
ea2384d3
FB
274BlockDriver *bdrv_find_format(const char *format_name)
275{
276 BlockDriver *drv1;
8a22f02a
SH
277 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
278 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 279 return drv1;
8a22f02a 280 }
ea2384d3
FB
281 }
282 return NULL;
283}
284
b64ec4e4 285static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 286{
b64ec4e4
FZ
287 static const char *whitelist_rw[] = {
288 CONFIG_BDRV_RW_WHITELIST
289 };
290 static const char *whitelist_ro[] = {
291 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
292 };
293 const char **p;
294
b64ec4e4 295 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 296 return 1; /* no whitelist, anything goes */
b64ec4e4 297 }
eb852011 298
b64ec4e4 299 for (p = whitelist_rw; *p; p++) {
eb852011
MA
300 if (!strcmp(drv->format_name, *p)) {
301 return 1;
302 }
303 }
b64ec4e4
FZ
304 if (read_only) {
305 for (p = whitelist_ro; *p; p++) {
306 if (!strcmp(drv->format_name, *p)) {
307 return 1;
308 }
309 }
310 }
eb852011
MA
311 return 0;
312}
313
5b7e1542
ZYW
314typedef struct CreateCo {
315 BlockDriver *drv;
316 char *filename;
83d0521a 317 QemuOpts *opts;
5b7e1542 318 int ret;
cc84d90f 319 Error *err;
5b7e1542
ZYW
320} CreateCo;
321
322static void coroutine_fn bdrv_create_co_entry(void *opaque)
323{
cc84d90f
HR
324 Error *local_err = NULL;
325 int ret;
326
5b7e1542
ZYW
327 CreateCo *cco = opaque;
328 assert(cco->drv);
329
c282e1fd 330 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
84d18f06 331 if (local_err) {
cc84d90f
HR
332 error_propagate(&cco->err, local_err);
333 }
334 cco->ret = ret;
5b7e1542
ZYW
335}
336
0e7e1989 337int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 338 QemuOpts *opts, Error **errp)
ea2384d3 339{
5b7e1542
ZYW
340 int ret;
341
342 Coroutine *co;
343 CreateCo cco = {
344 .drv = drv,
345 .filename = g_strdup(filename),
83d0521a 346 .opts = opts,
5b7e1542 347 .ret = NOT_DONE,
cc84d90f 348 .err = NULL,
5b7e1542
ZYW
349 };
350
c282e1fd 351 if (!drv->bdrv_create) {
cc84d90f 352 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
353 ret = -ENOTSUP;
354 goto out;
5b7e1542
ZYW
355 }
356
357 if (qemu_in_coroutine()) {
358 /* Fast-path if already in coroutine context */
359 bdrv_create_co_entry(&cco);
360 } else {
361 co = qemu_coroutine_create(bdrv_create_co_entry);
362 qemu_coroutine_enter(co, &cco);
363 while (cco.ret == NOT_DONE) {
b47ec2c4 364 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
365 }
366 }
367
368 ret = cco.ret;
cc84d90f 369 if (ret < 0) {
84d18f06 370 if (cco.err) {
cc84d90f
HR
371 error_propagate(errp, cco.err);
372 } else {
373 error_setg_errno(errp, -ret, "Could not create image");
374 }
375 }
0e7e1989 376
80168bff
LC
377out:
378 g_free(cco.filename);
5b7e1542 379 return ret;
ea2384d3
FB
380}
381
c282e1fd 382int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
383{
384 BlockDriver *drv;
cc84d90f
HR
385 Error *local_err = NULL;
386 int ret;
84a12e66 387
b65a5e12 388 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 389 if (drv == NULL) {
16905d71 390 return -ENOENT;
84a12e66
CH
391 }
392
c282e1fd 393 ret = bdrv_create(drv, filename, opts, &local_err);
84d18f06 394 if (local_err) {
cc84d90f
HR
395 error_propagate(errp, local_err);
396 }
397 return ret;
84a12e66
CH
398}
399
892b7de8
ET
400/**
401 * Try to get @bs's logical and physical block size.
402 * On success, store them in @bsz struct and return 0.
403 * On failure return -errno.
404 * @bs must not be empty.
405 */
406int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
407{
408 BlockDriver *drv = bs->drv;
409
410 if (drv && drv->bdrv_probe_blocksizes) {
411 return drv->bdrv_probe_blocksizes(bs, bsz);
412 }
413
414 return -ENOTSUP;
415}
416
417/**
418 * Try to get @bs's geometry (cyls, heads, sectors).
419 * On success, store them in @geo struct and return 0.
420 * On failure return -errno.
421 * @bs must not be empty.
422 */
423int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
424{
425 BlockDriver *drv = bs->drv;
426
427 if (drv && drv->bdrv_probe_geometry) {
428 return drv->bdrv_probe_geometry(bs, geo);
429 }
430
431 return -ENOTSUP;
432}
433
eba25057
JM
434/*
435 * Create a uniquely-named empty temporary file.
436 * Return 0 upon success, otherwise a negative errno value.
437 */
438int get_tmp_filename(char *filename, int size)
d5249393 439{
eba25057 440#ifdef _WIN32
3b9f94e1 441 char temp_dir[MAX_PATH];
eba25057
JM
442 /* GetTempFileName requires that its output buffer (4th param)
443 have length MAX_PATH or greater. */
444 assert(size >= MAX_PATH);
445 return (GetTempPath(MAX_PATH, temp_dir)
446 && GetTempFileName(temp_dir, "qem", 0, filename)
447 ? 0 : -GetLastError());
d5249393 448#else
67b915a5 449 int fd;
7ccfb2eb 450 const char *tmpdir;
0badc1ee 451 tmpdir = getenv("TMPDIR");
69bef793
AS
452 if (!tmpdir) {
453 tmpdir = "/var/tmp";
454 }
eba25057
JM
455 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
456 return -EOVERFLOW;
457 }
ea2384d3 458 fd = mkstemp(filename);
fe235a06
DH
459 if (fd < 0) {
460 return -errno;
461 }
462 if (close(fd) != 0) {
463 unlink(filename);
eba25057
JM
464 return -errno;
465 }
466 return 0;
d5249393 467#endif
eba25057 468}
fc01f7e7 469
84a12e66
CH
470/*
471 * Detect host devices. By convention, /dev/cdrom[N] is always
472 * recognized as a host CDROM.
473 */
474static BlockDriver *find_hdev_driver(const char *filename)
475{
476 int score_max = 0, score;
477 BlockDriver *drv = NULL, *d;
478
479 QLIST_FOREACH(d, &bdrv_drivers, list) {
480 if (d->bdrv_probe_device) {
481 score = d->bdrv_probe_device(filename);
482 if (score > score_max) {
483 score_max = score;
484 drv = d;
485 }
486 }
487 }
488
489 return drv;
490}
491
98289620 492BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
493 bool allow_protocol_prefix,
494 Error **errp)
83f64091
FB
495{
496 BlockDriver *drv1;
497 char protocol[128];
1cec71e3 498 int len;
83f64091 499 const char *p;
19cb3738 500
66f82cee
KW
501 /* TODO Drivers without bdrv_file_open must be specified explicitly */
502
39508e7a
CH
503 /*
504 * XXX(hch): we really should not let host device detection
505 * override an explicit protocol specification, but moving this
506 * later breaks access to device names with colons in them.
507 * Thanks to the brain-dead persistent naming schemes on udev-
508 * based Linux systems those actually are quite common.
509 */
510 drv1 = find_hdev_driver(filename);
511 if (drv1) {
512 return drv1;
513 }
514
98289620 515 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 516 return &bdrv_file;
84a12e66 517 }
98289620 518
9e0b22f4
SH
519 p = strchr(filename, ':');
520 assert(p != NULL);
1cec71e3
AL
521 len = p - filename;
522 if (len > sizeof(protocol) - 1)
523 len = sizeof(protocol) - 1;
524 memcpy(protocol, filename, len);
525 protocol[len] = '\0';
8a22f02a 526 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
5fafdf24 527 if (drv1->protocol_name &&
8a22f02a 528 !strcmp(drv1->protocol_name, protocol)) {
83f64091 529 return drv1;
8a22f02a 530 }
83f64091 531 }
b65a5e12
HR
532
533 error_setg(errp, "Unknown protocol '%s'", protocol);
83f64091
FB
534 return NULL;
535}
536
c6684249
MA
537/*
538 * Guess image format by probing its contents.
539 * This is not a good idea when your image is raw (CVE-2008-2004), but
540 * we do it anyway for backward compatibility.
541 *
542 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
543 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
544 * but can be smaller if the image file is smaller)
c6684249
MA
545 * @filename is its filename.
546 *
547 * For all block drivers, call the bdrv_probe() method to get its
548 * probing score.
549 * Return the first block driver with the highest probing score.
550 */
38f3ef57
KW
551BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
552 const char *filename)
c6684249
MA
553{
554 int score_max = 0, score;
555 BlockDriver *drv = NULL, *d;
556
557 QLIST_FOREACH(d, &bdrv_drivers, list) {
558 if (d->bdrv_probe) {
559 score = d->bdrv_probe(buf, buf_size, filename);
560 if (score > score_max) {
561 score_max = score;
562 drv = d;
563 }
564 }
565 }
566
567 return drv;
568}
569
f500a6d3 570static int find_image_format(BlockDriverState *bs, const char *filename,
34b5d2c6 571 BlockDriver **pdrv, Error **errp)
f3a5d3f8 572{
c6684249 573 BlockDriver *drv;
7cddd372 574 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 575 int ret = 0;
f8ea0b00 576
08a00559 577 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
b192af8a 578 if (bdrv_is_sg(bs) || !bdrv_is_inserted(bs) || bdrv_getlength(bs) == 0) {
ef810437 579 *pdrv = &bdrv_raw;
c98ac35d 580 return ret;
1a396859 581 }
f8ea0b00 582
83f64091 583 ret = bdrv_pread(bs, 0, buf, sizeof(buf));
83f64091 584 if (ret < 0) {
34b5d2c6
HR
585 error_setg_errno(errp, -ret, "Could not read image for determining its "
586 "format");
c98ac35d
SW
587 *pdrv = NULL;
588 return ret;
83f64091
FB
589 }
590
c6684249 591 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 592 if (!drv) {
34b5d2c6
HR
593 error_setg(errp, "Could not determine image format: No compatible "
594 "driver found");
c98ac35d
SW
595 ret = -ENOENT;
596 }
597 *pdrv = drv;
598 return ret;
ea2384d3
FB
599}
600
51762288
SH
601/**
602 * Set the current 'total_sectors' value
65a9bb25 603 * Return 0 on success, -errno on error.
51762288
SH
604 */
605static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
606{
607 BlockDriver *drv = bs->drv;
608
396759ad 609 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 610 if (bdrv_is_sg(bs))
396759ad
NB
611 return 0;
612
51762288
SH
613 /* query actual device if possible, otherwise just trust the hint */
614 if (drv->bdrv_getlength) {
615 int64_t length = drv->bdrv_getlength(bs);
616 if (length < 0) {
617 return length;
618 }
7e382003 619 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
620 }
621
622 bs->total_sectors = hint;
623 return 0;
624}
625
cddff5ba
KW
626/**
627 * Combines a QDict of new block driver @options with any missing options taken
628 * from @old_options, so that leaving out an option defaults to its old value.
629 */
630static void bdrv_join_options(BlockDriverState *bs, QDict *options,
631 QDict *old_options)
632{
633 if (bs->drv && bs->drv->bdrv_join_options) {
634 bs->drv->bdrv_join_options(options, old_options);
635 } else {
636 qdict_join(options, old_options, false);
637 }
638}
639
9e8f1835
PB
640/**
641 * Set open flags for a given discard mode
642 *
643 * Return 0 on success, -1 if the discard mode was invalid.
644 */
645int bdrv_parse_discard_flags(const char *mode, int *flags)
646{
647 *flags &= ~BDRV_O_UNMAP;
648
649 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
650 /* do nothing */
651 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
652 *flags |= BDRV_O_UNMAP;
653 } else {
654 return -1;
655 }
656
657 return 0;
658}
659
c3993cdc
SH
660/**
661 * Set open flags for a given cache mode
662 *
663 * Return 0 on success, -1 if the cache mode was invalid.
664 */
665int bdrv_parse_cache_flags(const char *mode, int *flags)
666{
667 *flags &= ~BDRV_O_CACHE_MASK;
668
669 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
670 *flags |= BDRV_O_NOCACHE | BDRV_O_CACHE_WB;
92196b2f
SH
671 } else if (!strcmp(mode, "directsync")) {
672 *flags |= BDRV_O_NOCACHE;
c3993cdc
SH
673 } else if (!strcmp(mode, "writeback")) {
674 *flags |= BDRV_O_CACHE_WB;
675 } else if (!strcmp(mode, "unsafe")) {
676 *flags |= BDRV_O_CACHE_WB;
677 *flags |= BDRV_O_NO_FLUSH;
678 } else if (!strcmp(mode, "writethrough")) {
679 /* this is the default */
680 } else {
681 return -1;
682 }
683
684 return 0;
685}
686
b1e6fc08
KW
687/*
688 * Returns the flags that a temporary snapshot should get, based on the
689 * originally requested flags (the originally requested image will have flags
690 * like a backing file)
691 */
692static int bdrv_temp_snapshot_flags(int flags)
693{
694 return (flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
695}
696
0b50cc88 697/*
8e2160e2
KW
698 * Returns the options and flags that bs->file should get if a protocol driver
699 * is expected, based on the given options and flags for the parent BDS
0b50cc88 700 */
8e2160e2
KW
701static void bdrv_inherited_options(int *child_flags, QDict *child_options,
702 int parent_flags, QDict *parent_options)
0b50cc88 703{
8e2160e2
KW
704 int flags = parent_flags;
705
0b50cc88
KW
706 /* Enable protocol handling, disable format probing for bs->file */
707 flags |= BDRV_O_PROTOCOL;
708
709 /* Our block drivers take care to send flushes and respect unmap policy,
710 * so we can enable both unconditionally on lower layers. */
711 flags |= BDRV_O_CACHE_WB | BDRV_O_UNMAP;
712
0b50cc88 713 /* Clear flags that only apply to the top layer */
5669b44d 714 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ);
0b50cc88 715
8e2160e2 716 *child_flags = flags;
0b50cc88
KW
717}
718
f3930ed0 719const BdrvChildRole child_file = {
8e2160e2 720 .inherit_options = bdrv_inherited_options,
f3930ed0
KW
721};
722
723/*
8e2160e2
KW
724 * Returns the options and flags that bs->file should get if the use of formats
725 * (and not only protocols) is permitted for it, based on the given options and
726 * flags for the parent BDS
f3930ed0 727 */
8e2160e2
KW
728static void bdrv_inherited_fmt_options(int *child_flags, QDict *child_options,
729 int parent_flags, QDict *parent_options)
f3930ed0 730{
8e2160e2
KW
731 child_file.inherit_options(child_flags, child_options,
732 parent_flags, parent_options);
733
734 *child_flags &= ~BDRV_O_PROTOCOL;
f3930ed0
KW
735}
736
737const BdrvChildRole child_format = {
8e2160e2 738 .inherit_options = bdrv_inherited_fmt_options,
f3930ed0
KW
739};
740
317fc44e 741/*
8e2160e2
KW
742 * Returns the options and flags that bs->backing should get, based on the
743 * given options and flags for the parent BDS
317fc44e 744 */
8e2160e2
KW
745static void bdrv_backing_options(int *child_flags, QDict *child_options,
746 int parent_flags, QDict *parent_options)
317fc44e 747{
8e2160e2
KW
748 int flags = parent_flags;
749
317fc44e
KW
750 /* backing files always opened read-only */
751 flags &= ~(BDRV_O_RDWR | BDRV_O_COPY_ON_READ);
752
753 /* snapshot=on is handled on the top layer */
8bfea15d 754 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e 755
8e2160e2 756 *child_flags = flags;
317fc44e
KW
757}
758
f3930ed0 759static const BdrvChildRole child_backing = {
8e2160e2 760 .inherit_options = bdrv_backing_options,
f3930ed0
KW
761};
762
7b272452
KW
763static int bdrv_open_flags(BlockDriverState *bs, int flags)
764{
765 int open_flags = flags | BDRV_O_CACHE_WB;
766
767 /*
768 * Clear flags that are internal to the block layer before opening the
769 * image.
770 */
20cca275 771 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
772
773 /*
774 * Snapshots should be writable.
775 */
8bfea15d 776 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
777 open_flags |= BDRV_O_RDWR;
778 }
779
780 return open_flags;
781}
782
636ea370
KW
783static void bdrv_assign_node_name(BlockDriverState *bs,
784 const char *node_name,
785 Error **errp)
6913c0c2 786{
15489c76 787 char *gen_node_name = NULL;
6913c0c2 788
15489c76
JC
789 if (!node_name) {
790 node_name = gen_node_name = id_generate(ID_BLOCK);
791 } else if (!id_wellformed(node_name)) {
792 /*
793 * Check for empty string or invalid characters, but not if it is
794 * generated (generated names use characters not available to the user)
795 */
9aebf3b8 796 error_setg(errp, "Invalid node name");
636ea370 797 return;
6913c0c2
BC
798 }
799
0c5e94ee 800 /* takes care of avoiding namespaces collisions */
7f06d47e 801 if (blk_by_name(node_name)) {
0c5e94ee
BC
802 error_setg(errp, "node-name=%s is conflicting with a device id",
803 node_name);
15489c76 804 goto out;
0c5e94ee
BC
805 }
806
6913c0c2
BC
807 /* takes care of avoiding duplicates node names */
808 if (bdrv_find_node(node_name)) {
809 error_setg(errp, "Duplicate node name");
15489c76 810 goto out;
6913c0c2
BC
811 }
812
813 /* copy node name into the bs and insert it into the graph list */
814 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
815 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
15489c76
JC
816out:
817 g_free(gen_node_name);
6913c0c2
BC
818}
819
18edf289
KW
820static QemuOptsList bdrv_runtime_opts = {
821 .name = "bdrv_common",
822 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
823 .desc = {
824 {
825 .name = "node-name",
826 .type = QEMU_OPT_STRING,
827 .help = "Node name of the block device node",
828 },
62392ebb
KW
829 {
830 .name = "driver",
831 .type = QEMU_OPT_STRING,
832 .help = "Block driver to use for the node",
833 },
18edf289
KW
834 { /* end of list */ }
835 },
836};
837
57915332
KW
838/*
839 * Common part for opening disk images and files
b6ad491a
KW
840 *
841 * Removes all processed options from *options.
57915332 842 */
9a4f4c31 843static int bdrv_open_common(BlockDriverState *bs, BdrvChild *file,
62392ebb 844 QDict *options, int flags, Error **errp)
57915332
KW
845{
846 int ret, open_flags;
035fccdf 847 const char *filename;
62392ebb 848 const char *driver_name = NULL;
6913c0c2 849 const char *node_name = NULL;
18edf289 850 QemuOpts *opts;
62392ebb 851 BlockDriver *drv;
34b5d2c6 852 Error *local_err = NULL;
57915332 853
6405875c 854 assert(bs->file == NULL);
707ff828 855 assert(options != NULL && bs->options != options);
57915332 856
62392ebb
KW
857 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
858 qemu_opts_absorb_qdict(opts, options, &local_err);
859 if (local_err) {
860 error_propagate(errp, local_err);
861 ret = -EINVAL;
862 goto fail_opts;
863 }
864
865 driver_name = qemu_opt_get(opts, "driver");
866 drv = bdrv_find_format(driver_name);
867 assert(drv != NULL);
868
45673671 869 if (file != NULL) {
9a4f4c31 870 filename = file->bs->filename;
45673671
KW
871 } else {
872 filename = qdict_get_try_str(options, "filename");
873 }
874
765003db
KW
875 if (drv->bdrv_needs_filename && !filename) {
876 error_setg(errp, "The '%s' block driver requires a file name",
877 drv->format_name);
18edf289
KW
878 ret = -EINVAL;
879 goto fail_opts;
6913c0c2 880 }
6913c0c2 881
62392ebb
KW
882 trace_bdrv_open_common(bs, filename ?: "", flags, drv->format_name);
883
18edf289 884 node_name = qemu_opt_get(opts, "node-name");
636ea370 885 bdrv_assign_node_name(bs, node_name, &local_err);
0fb6395c 886 if (local_err) {
636ea370 887 error_propagate(errp, local_err);
18edf289
KW
888 ret = -EINVAL;
889 goto fail_opts;
5d186eb0
KW
890 }
891
c25f53b0 892 bs->request_alignment = 512;
0d51b4de 893 bs->zero_beyond_eof = true;
b64ec4e4
FZ
894 open_flags = bdrv_open_flags(bs, flags);
895 bs->read_only = !(open_flags & BDRV_O_RDWR);
896
897 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
898 error_setg(errp,
899 !bs->read_only && bdrv_is_whitelisted(drv, true)
900 ? "Driver '%s' can only be used for read-only devices"
901 : "Driver '%s' is not whitelisted",
902 drv->format_name);
18edf289
KW
903 ret = -ENOTSUP;
904 goto fail_opts;
b64ec4e4 905 }
57915332 906
53fec9d3 907 assert(bs->copy_on_read == 0); /* bdrv_new() and bdrv_close() make it so */
0ebd24e0
KW
908 if (flags & BDRV_O_COPY_ON_READ) {
909 if (!bs->read_only) {
910 bdrv_enable_copy_on_read(bs);
911 } else {
912 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
913 ret = -EINVAL;
914 goto fail_opts;
0ebd24e0 915 }
53fec9d3
SH
916 }
917
c2ad1b0c
KW
918 if (filename != NULL) {
919 pstrcpy(bs->filename, sizeof(bs->filename), filename);
920 } else {
921 bs->filename[0] = '\0';
922 }
91af7014 923 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 924
57915332 925 bs->drv = drv;
7267c094 926 bs->opaque = g_malloc0(drv->instance_size);
57915332 927
03f541bd 928 bs->enable_write_cache = !!(flags & BDRV_O_CACHE_WB);
e7c63796 929
66f82cee
KW
930 /* Open the image, either directly or using a protocol */
931 if (drv->bdrv_file_open) {
5d186eb0 932 assert(file == NULL);
030be321 933 assert(!drv->bdrv_needs_filename || filename != NULL);
34b5d2c6 934 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
f500a6d3 935 } else {
2af5ef70 936 if (file == NULL) {
34b5d2c6
HR
937 error_setg(errp, "Can't use '%s' as a block driver for the "
938 "protocol level", drv->format_name);
2af5ef70
KW
939 ret = -EINVAL;
940 goto free_and_fail;
941 }
f500a6d3 942 bs->file = file;
34b5d2c6 943 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
66f82cee
KW
944 }
945
57915332 946 if (ret < 0) {
84d18f06 947 if (local_err) {
34b5d2c6 948 error_propagate(errp, local_err);
2fa9aa59
DH
949 } else if (bs->filename[0]) {
950 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
34b5d2c6
HR
951 } else {
952 error_setg_errno(errp, -ret, "Could not open image");
953 }
57915332
KW
954 goto free_and_fail;
955 }
956
a1f688f4
MA
957 if (bs->encrypted) {
958 error_report("Encrypted images are deprecated");
959 error_printf("Support for them will be removed in a future release.\n"
960 "You can use 'qemu-img convert' to convert your image"
961 " to an unencrypted one.\n");
962 }
963
51762288
SH
964 ret = refresh_total_sectors(bs, bs->total_sectors);
965 if (ret < 0) {
34b5d2c6 966 error_setg_errno(errp, -ret, "Could not refresh total sector count");
51762288 967 goto free_and_fail;
57915332 968 }
51762288 969
3baca891
KW
970 bdrv_refresh_limits(bs, &local_err);
971 if (local_err) {
972 error_propagate(errp, local_err);
973 ret = -EINVAL;
974 goto free_and_fail;
975 }
976
c25f53b0 977 assert(bdrv_opt_mem_align(bs) != 0);
4196d2f0 978 assert(bdrv_min_mem_align(bs) != 0);
b192af8a 979 assert((bs->request_alignment != 0) || bdrv_is_sg(bs));
18edf289
KW
980
981 qemu_opts_del(opts);
57915332
KW
982 return 0;
983
984free_and_fail:
f500a6d3 985 bs->file = NULL;
7267c094 986 g_free(bs->opaque);
57915332
KW
987 bs->opaque = NULL;
988 bs->drv = NULL;
18edf289
KW
989fail_opts:
990 qemu_opts_del(opts);
57915332
KW
991 return ret;
992}
993
5e5c4f63
KW
994static QDict *parse_json_filename(const char *filename, Error **errp)
995{
996 QObject *options_obj;
997 QDict *options;
998 int ret;
999
1000 ret = strstart(filename, "json:", &filename);
1001 assert(ret);
1002
1003 options_obj = qobject_from_json(filename);
1004 if (!options_obj) {
1005 error_setg(errp, "Could not parse the JSON options");
1006 return NULL;
1007 }
1008
1009 if (qobject_type(options_obj) != QTYPE_QDICT) {
1010 qobject_decref(options_obj);
1011 error_setg(errp, "Invalid JSON object given");
1012 return NULL;
1013 }
1014
1015 options = qobject_to_qdict(options_obj);
1016 qdict_flatten(options);
1017
1018 return options;
1019}
1020
de3b53f0
KW
1021static void parse_json_protocol(QDict *options, const char **pfilename,
1022 Error **errp)
1023{
1024 QDict *json_options;
1025 Error *local_err = NULL;
1026
1027 /* Parse json: pseudo-protocol */
1028 if (!*pfilename || !g_str_has_prefix(*pfilename, "json:")) {
1029 return;
1030 }
1031
1032 json_options = parse_json_filename(*pfilename, &local_err);
1033 if (local_err) {
1034 error_propagate(errp, local_err);
1035 return;
1036 }
1037
1038 /* Options given in the filename have lower priority than options
1039 * specified directly */
1040 qdict_join(options, json_options, false);
1041 QDECREF(json_options);
1042 *pfilename = NULL;
1043}
1044
b6ce07aa 1045/*
f54120ff
KW
1046 * Fills in default options for opening images and converts the legacy
1047 * filename/flags pair to option QDict entries.
53a29513
HR
1048 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
1049 * block driver has been specified explicitly.
b6ce07aa 1050 */
de3b53f0 1051static int bdrv_fill_options(QDict **options, const char *filename,
053e1578 1052 int *flags, Error **errp)
ea2384d3 1053{
c2ad1b0c 1054 const char *drvname;
53a29513 1055 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 1056 bool parse_filename = false;
053e1578 1057 BlockDriver *drv = NULL;
34b5d2c6 1058 Error *local_err = NULL;
83f64091 1059
53a29513 1060 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1061 if (drvname) {
1062 drv = bdrv_find_format(drvname);
1063 if (!drv) {
1064 error_setg(errp, "Unknown driver '%s'", drvname);
1065 return -ENOENT;
1066 }
1067 /* If the user has explicitly specified the driver, this choice should
1068 * override the BDRV_O_PROTOCOL flag */
1069 protocol = drv->bdrv_file_open;
53a29513
HR
1070 }
1071
1072 if (protocol) {
1073 *flags |= BDRV_O_PROTOCOL;
1074 } else {
1075 *flags &= ~BDRV_O_PROTOCOL;
1076 }
1077
035fccdf 1078 /* Fetch the file name from the options QDict if necessary */
17b005f1 1079 if (protocol && filename) {
f54120ff
KW
1080 if (!qdict_haskey(*options, "filename")) {
1081 qdict_put(*options, "filename", qstring_from_str(filename));
1082 parse_filename = true;
1083 } else {
1084 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1085 "the same time");
1086 return -EINVAL;
1087 }
035fccdf
KW
1088 }
1089
c2ad1b0c 1090 /* Find the right block driver */
f54120ff 1091 filename = qdict_get_try_str(*options, "filename");
f54120ff 1092
053e1578
HR
1093 if (!drvname && protocol) {
1094 if (filename) {
1095 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1096 if (!drv) {
053e1578 1097 return -EINVAL;
17b005f1 1098 }
053e1578
HR
1099
1100 drvname = drv->format_name;
1101 qdict_put(*options, "driver", qstring_from_str(drvname));
1102 } else {
1103 error_setg(errp, "Must specify either driver or file");
1104 return -EINVAL;
98289620 1105 }
c2ad1b0c
KW
1106 }
1107
17b005f1 1108 assert(drv || !protocol);
c2ad1b0c 1109
f54120ff 1110 /* Driver-specific filename parsing */
17b005f1 1111 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1112 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1113 if (local_err) {
34b5d2c6 1114 error_propagate(errp, local_err);
f54120ff 1115 return -EINVAL;
6963a30d 1116 }
cd5d031e
HR
1117
1118 if (!drv->bdrv_needs_filename) {
1119 qdict_del(*options, "filename");
cd5d031e 1120 }
6963a30d
KW
1121 }
1122
d44f928a
HR
1123 if (runstate_check(RUN_STATE_INMIGRATE)) {
1124 *flags |= BDRV_O_INCOMING;
1125 }
1126
f54120ff
KW
1127 return 0;
1128}
1129
b4b059f6
KW
1130static BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
1131 BlockDriverState *child_bs,
260fecf1 1132 const char *child_name,
b4b059f6 1133 const BdrvChildRole *child_role)
df581792
KW
1134{
1135 BdrvChild *child = g_new(BdrvChild, 1);
1136 *child = (BdrvChild) {
1137 .bs = child_bs,
260fecf1 1138 .name = g_strdup(child_name),
df581792
KW
1139 .role = child_role,
1140 };
1141
1142 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
d42a8a93 1143 QLIST_INSERT_HEAD(&child_bs->parents, child, next_parent);
b4b059f6
KW
1144
1145 return child;
df581792
KW
1146}
1147
3f09bfbc 1148static void bdrv_detach_child(BdrvChild *child)
33a60407
KW
1149{
1150 QLIST_REMOVE(child, next);
d42a8a93 1151 QLIST_REMOVE(child, next_parent);
260fecf1 1152 g_free(child->name);
33a60407
KW
1153 g_free(child);
1154}
1155
1156void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
1157{
779020cb
KW
1158 BlockDriverState *child_bs;
1159
1160 if (child == NULL) {
1161 return;
1162 }
33a60407
KW
1163
1164 if (child->bs->inherits_from == parent) {
1165 child->bs->inherits_from = NULL;
1166 }
1167
779020cb 1168 child_bs = child->bs;
33a60407
KW
1169 bdrv_detach_child(child);
1170 bdrv_unref(child_bs);
1171}
1172
5db15a57
KW
1173/*
1174 * Sets the backing file link of a BDS. A new reference is created; callers
1175 * which don't need their own reference any more must call bdrv_unref().
1176 */
8d24cce1
FZ
1177void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd)
1178{
5db15a57
KW
1179 if (backing_hd) {
1180 bdrv_ref(backing_hd);
1181 }
8d24cce1 1182
760e0063 1183 if (bs->backing) {
826b6ca0 1184 assert(bs->backing_blocker);
760e0063 1185 bdrv_op_unblock_all(bs->backing->bs, bs->backing_blocker);
5db15a57 1186 bdrv_unref_child(bs, bs->backing);
826b6ca0
FZ
1187 } else if (backing_hd) {
1188 error_setg(&bs->backing_blocker,
81e5f78a
AG
1189 "node is used as backing hd of '%s'",
1190 bdrv_get_device_or_node_name(bs));
826b6ca0
FZ
1191 }
1192
8d24cce1 1193 if (!backing_hd) {
826b6ca0
FZ
1194 error_free(bs->backing_blocker);
1195 bs->backing_blocker = NULL;
760e0063 1196 bs->backing = NULL;
8d24cce1
FZ
1197 goto out;
1198 }
260fecf1 1199 bs->backing = bdrv_attach_child(bs, backing_hd, "backing", &child_backing);
8d24cce1
FZ
1200 bs->open_flags &= ~BDRV_O_NO_BACKING;
1201 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_hd->filename);
1202 pstrcpy(bs->backing_format, sizeof(bs->backing_format),
1203 backing_hd->drv ? backing_hd->drv->format_name : "");
826b6ca0 1204
760e0063 1205 bdrv_op_block_all(backing_hd, bs->backing_blocker);
826b6ca0 1206 /* Otherwise we won't be able to commit due to check in bdrv_commit */
760e0063 1207 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
826b6ca0 1208 bs->backing_blocker);
8d24cce1 1209out:
3baca891 1210 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
1211}
1212
31ca6d07
KW
1213/*
1214 * Opens the backing file for a BlockDriverState if not yet open
1215 *
d9b7b057
KW
1216 * bdref_key specifies the key for the image's BlockdevRef in the options QDict.
1217 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1218 * itself, all options starting with "${bdref_key}." are considered part of the
1219 * BlockdevRef.
1220 *
1221 * TODO Can this be unified with bdrv_open_image()?
31ca6d07 1222 */
d9b7b057
KW
1223int bdrv_open_backing_file(BlockDriverState *bs, QDict *parent_options,
1224 const char *bdref_key, Error **errp)
9156df12 1225{
1ba4b6a5 1226 char *backing_filename = g_malloc0(PATH_MAX);
d9b7b057
KW
1227 char *bdref_key_dot;
1228 const char *reference = NULL;
317fc44e 1229 int ret = 0;
8d24cce1 1230 BlockDriverState *backing_hd;
d9b7b057
KW
1231 QDict *options;
1232 QDict *tmp_parent_options = NULL;
34b5d2c6 1233 Error *local_err = NULL;
9156df12 1234
760e0063 1235 if (bs->backing != NULL) {
1ba4b6a5 1236 goto free_exit;
9156df12
PB
1237 }
1238
31ca6d07 1239 /* NULL means an empty set of options */
d9b7b057
KW
1240 if (parent_options == NULL) {
1241 tmp_parent_options = qdict_new();
1242 parent_options = tmp_parent_options;
31ca6d07
KW
1243 }
1244
9156df12 1245 bs->open_flags &= ~BDRV_O_NO_BACKING;
d9b7b057
KW
1246
1247 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1248 qdict_extract_subqdict(parent_options, &options, bdref_key_dot);
1249 g_free(bdref_key_dot);
1250
1251 reference = qdict_get_try_str(parent_options, bdref_key);
1252 if (reference || qdict_haskey(options, "file.filename")) {
1cb6f506
KW
1253 backing_filename[0] = '\0';
1254 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 1255 QDECREF(options);
1ba4b6a5 1256 goto free_exit;
dbecebdd 1257 } else {
9f07429e
HR
1258 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
1259 &local_err);
1260 if (local_err) {
1261 ret = -EINVAL;
1262 error_propagate(errp, local_err);
1263 QDECREF(options);
1264 goto free_exit;
1265 }
9156df12
PB
1266 }
1267
8ee79e70
KW
1268 if (!bs->drv || !bs->drv->supports_backing) {
1269 ret = -EINVAL;
1270 error_setg(errp, "Driver doesn't support backing files");
1271 QDECREF(options);
1272 goto free_exit;
1273 }
1274
c5f6e493
KW
1275 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
1276 qdict_put(options, "driver", qstring_from_str(bs->backing_format));
9156df12
PB
1277 }
1278
d9b7b057 1279 backing_hd = NULL;
f3930ed0
KW
1280 ret = bdrv_open_inherit(&backing_hd,
1281 *backing_filename ? backing_filename : NULL,
d9b7b057
KW
1282 reference, options, 0, bs, &child_backing,
1283 &local_err);
9156df12 1284 if (ret < 0) {
9156df12 1285 bs->open_flags |= BDRV_O_NO_BACKING;
b04b6b6e
FZ
1286 error_setg(errp, "Could not open backing file: %s",
1287 error_get_pretty(local_err));
1288 error_free(local_err);
1ba4b6a5 1289 goto free_exit;
9156df12 1290 }
df581792 1291
5db15a57
KW
1292 /* Hook up the backing file link; drop our reference, bs owns the
1293 * backing_hd reference now */
8d24cce1 1294 bdrv_set_backing_hd(bs, backing_hd);
5db15a57 1295 bdrv_unref(backing_hd);
d80ac658 1296
d9b7b057
KW
1297 qdict_del(parent_options, bdref_key);
1298
1ba4b6a5
BC
1299free_exit:
1300 g_free(backing_filename);
d9b7b057 1301 QDECREF(tmp_parent_options);
1ba4b6a5 1302 return ret;
9156df12
PB
1303}
1304
da557aac
HR
1305/*
1306 * Opens a disk image whose options are given as BlockdevRef in another block
1307 * device's options.
1308 *
da557aac 1309 * If allow_none is true, no image will be opened if filename is false and no
b4b059f6 1310 * BlockdevRef is given. NULL will be returned, but errp remains unset.
da557aac
HR
1311 *
1312 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
1313 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1314 * itself, all options starting with "${bdref_key}." are considered part of the
1315 * BlockdevRef.
1316 *
1317 * The BlockdevRef will be removed from the options QDict.
1318 */
b4b059f6
KW
1319BdrvChild *bdrv_open_child(const char *filename,
1320 QDict *options, const char *bdref_key,
1321 BlockDriverState* parent,
1322 const BdrvChildRole *child_role,
1323 bool allow_none, Error **errp)
da557aac 1324{
b4b059f6
KW
1325 BdrvChild *c = NULL;
1326 BlockDriverState *bs;
da557aac
HR
1327 QDict *image_options;
1328 int ret;
1329 char *bdref_key_dot;
1330 const char *reference;
1331
df581792 1332 assert(child_role != NULL);
f67503e5 1333
da557aac
HR
1334 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1335 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
1336 g_free(bdref_key_dot);
1337
1338 reference = qdict_get_try_str(options, bdref_key);
1339 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 1340 if (!allow_none) {
da557aac
HR
1341 error_setg(errp, "A block device must be specified for \"%s\"",
1342 bdref_key);
da557aac 1343 }
b20e61e0 1344 QDECREF(image_options);
da557aac
HR
1345 goto done;
1346 }
1347
b4b059f6
KW
1348 bs = NULL;
1349 ret = bdrv_open_inherit(&bs, filename, reference, image_options, 0,
ce343771 1350 parent, child_role, errp);
df581792
KW
1351 if (ret < 0) {
1352 goto done;
1353 }
1354
260fecf1 1355 c = bdrv_attach_child(parent, bs, bdref_key, child_role);
da557aac
HR
1356
1357done:
1358 qdict_del(options, bdref_key);
b4b059f6
KW
1359 return c;
1360}
1361
6b8aeca5 1362int bdrv_append_temp_snapshot(BlockDriverState *bs, int flags, Error **errp)
b998875d
KW
1363{
1364 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 1365 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 1366 int64_t total_size;
83d0521a 1367 QemuOpts *opts = NULL;
b998875d
KW
1368 QDict *snapshot_options;
1369 BlockDriverState *bs_snapshot;
c2e0dbbf 1370 Error *local_err = NULL;
b998875d
KW
1371 int ret;
1372
1373 /* if snapshot, we create a temporary backing file and open it
1374 instead of opening 'filename' directly */
1375
1376 /* Get the required size from the image */
f187743a
KW
1377 total_size = bdrv_getlength(bs);
1378 if (total_size < 0) {
6b8aeca5 1379 ret = total_size;
f187743a 1380 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 1381 goto out;
f187743a 1382 }
b998875d
KW
1383
1384 /* Create the temporary image */
1ba4b6a5 1385 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
1386 if (ret < 0) {
1387 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 1388 goto out;
b998875d
KW
1389 }
1390
ef810437 1391 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 1392 &error_abort);
39101f25 1393 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
ef810437 1394 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, &local_err);
83d0521a 1395 qemu_opts_del(opts);
b998875d
KW
1396 if (ret < 0) {
1397 error_setg_errno(errp, -ret, "Could not create temporary overlay "
1398 "'%s': %s", tmp_filename,
1399 error_get_pretty(local_err));
1400 error_free(local_err);
1ba4b6a5 1401 goto out;
b998875d
KW
1402 }
1403
1404 /* Prepare a new options QDict for the temporary file */
1405 snapshot_options = qdict_new();
1406 qdict_put(snapshot_options, "file.driver",
1407 qstring_from_str("file"));
1408 qdict_put(snapshot_options, "file.filename",
1409 qstring_from_str(tmp_filename));
e6641719
HR
1410 qdict_put(snapshot_options, "driver",
1411 qstring_from_str("qcow2"));
b998875d 1412
e4e9986b 1413 bs_snapshot = bdrv_new();
b998875d
KW
1414
1415 ret = bdrv_open(&bs_snapshot, NULL, NULL, snapshot_options,
6ebf9aa2 1416 flags, &local_err);
b998875d
KW
1417 if (ret < 0) {
1418 error_propagate(errp, local_err);
1ba4b6a5 1419 goto out;
b998875d
KW
1420 }
1421
1422 bdrv_append(bs_snapshot, bs);
1ba4b6a5
BC
1423
1424out:
1425 g_free(tmp_filename);
6b8aeca5 1426 return ret;
b998875d
KW
1427}
1428
b6ce07aa
KW
1429/*
1430 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
1431 *
1432 * options is a QDict of options to pass to the block drivers, or NULL for an
1433 * empty set of options. The reference to the QDict belongs to the block layer
1434 * after the call (even on failure), so if the caller intends to reuse the
1435 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
1436 *
1437 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
1438 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
1439 *
1440 * The reference parameter may be used to specify an existing block device which
1441 * should be opened. If specified, neither options nor a filename may be given,
1442 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 1443 */
f3930ed0
KW
1444static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
1445 const char *reference, QDict *options, int flags,
1446 BlockDriverState *parent,
ce343771 1447 const BdrvChildRole *child_role, Error **errp)
ea2384d3 1448{
b6ce07aa 1449 int ret;
9a4f4c31
KW
1450 BdrvChild *file = NULL;
1451 BlockDriverState *bs;
ce343771 1452 BlockDriver *drv = NULL;
74fe54f2 1453 const char *drvname;
3e8c2e57 1454 const char *backing;
34b5d2c6 1455 Error *local_err = NULL;
b1e6fc08 1456 int snapshot_flags = 0;
712e7874 1457
f67503e5 1458 assert(pbs);
f3930ed0
KW
1459 assert(!child_role || !flags);
1460 assert(!child_role == !parent);
f67503e5 1461
ddf5636d
HR
1462 if (reference) {
1463 bool options_non_empty = options ? qdict_size(options) : false;
1464 QDECREF(options);
1465
1466 if (*pbs) {
1467 error_setg(errp, "Cannot reuse an existing BDS when referencing "
1468 "another block device");
1469 return -EINVAL;
1470 }
1471
1472 if (filename || options_non_empty) {
1473 error_setg(errp, "Cannot reference an existing block device with "
1474 "additional options or a new filename");
1475 return -EINVAL;
1476 }
1477
1478 bs = bdrv_lookup_bs(reference, reference, errp);
1479 if (!bs) {
1480 return -ENODEV;
1481 }
1482 bdrv_ref(bs);
1483 *pbs = bs;
1484 return 0;
1485 }
1486
f67503e5
HR
1487 if (*pbs) {
1488 bs = *pbs;
1489 } else {
e4e9986b 1490 bs = bdrv_new();
f67503e5
HR
1491 }
1492
de9c0cec
KW
1493 /* NULL means an empty set of options */
1494 if (options == NULL) {
1495 options = qdict_new();
1496 }
1497
145f598e 1498 /* json: syntax counts as explicit options, as if in the QDict */
de3b53f0
KW
1499 parse_json_protocol(options, &filename, &local_err);
1500 if (local_err) {
1501 ret = -EINVAL;
1502 goto fail;
1503 }
1504
145f598e
KW
1505 bs->explicit_options = qdict_clone_shallow(options);
1506
f3930ed0 1507 if (child_role) {
bddcec37 1508 bs->inherits_from = parent;
8e2160e2
KW
1509 child_role->inherit_options(&flags, options,
1510 parent->open_flags, parent->options);
f3930ed0
KW
1511 }
1512
de3b53f0 1513 ret = bdrv_fill_options(&options, filename, &flags, &local_err);
462f5bcf
KW
1514 if (local_err) {
1515 goto fail;
1516 }
1517
62392ebb
KW
1518 bs->open_flags = flags;
1519 bs->options = options;
1520 options = qdict_clone_shallow(options);
1521
76c591b0 1522 /* Find the right image format driver */
76c591b0
KW
1523 drvname = qdict_get_try_str(options, "driver");
1524 if (drvname) {
1525 drv = bdrv_find_format(drvname);
76c591b0
KW
1526 if (!drv) {
1527 error_setg(errp, "Unknown driver: '%s'", drvname);
1528 ret = -EINVAL;
1529 goto fail;
1530 }
1531 }
1532
1533 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 1534
3e8c2e57
AG
1535 backing = qdict_get_try_str(options, "backing");
1536 if (backing && *backing == '\0') {
1537 flags |= BDRV_O_NO_BACKING;
1538 qdict_del(options, "backing");
1539 }
1540
f500a6d3 1541 /* Open image file without format layer */
f4788adc
KW
1542 if ((flags & BDRV_O_PROTOCOL) == 0) {
1543 if (flags & BDRV_O_RDWR) {
1544 flags |= BDRV_O_ALLOW_RDWR;
1545 }
1546 if (flags & BDRV_O_SNAPSHOT) {
1547 snapshot_flags = bdrv_temp_snapshot_flags(flags);
8e2160e2 1548 bdrv_backing_options(&flags, options, flags, options);
f4788adc 1549 }
f500a6d3 1550
f3930ed0 1551 bs->open_flags = flags;
1fdd6933 1552
9a4f4c31
KW
1553 file = bdrv_open_child(filename, options, "file", bs,
1554 &child_file, true, &local_err);
1fdd6933
KW
1555 if (local_err) {
1556 ret = -EINVAL;
f4788adc
KW
1557 goto fail;
1558 }
f500a6d3
KW
1559 }
1560
76c591b0 1561 /* Image format probing */
38f3ef57 1562 bs->probed = !drv;
76c591b0 1563 if (!drv && file) {
9a4f4c31 1564 ret = find_image_format(file->bs, filename, &drv, &local_err);
17b005f1 1565 if (ret < 0) {
8bfea15d 1566 goto fail;
2a05cbe4 1567 }
62392ebb
KW
1568 /*
1569 * This option update would logically belong in bdrv_fill_options(),
1570 * but we first need to open bs->file for the probing to work, while
1571 * opening bs->file already requires the (mostly) final set of options
1572 * so that cache mode etc. can be inherited.
1573 *
1574 * Adding the driver later is somewhat ugly, but it's not an option
1575 * that would ever be inherited, so it's correct. We just need to make
1576 * sure to update both bs->options (which has the full effective
1577 * options for bs) and options (which has file.* already removed).
1578 */
1579 qdict_put(bs->options, "driver", qstring_from_str(drv->format_name));
1580 qdict_put(options, "driver", qstring_from_str(drv->format_name));
76c591b0 1581 } else if (!drv) {
17b005f1
KW
1582 error_setg(errp, "Must specify either driver or file");
1583 ret = -EINVAL;
8bfea15d 1584 goto fail;
ea2384d3 1585 }
b6ce07aa 1586
53a29513
HR
1587 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
1588 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
1589 /* file must be NULL if a protocol BDS is about to be created
1590 * (the inverse results in an error message from bdrv_open_common()) */
1591 assert(!(flags & BDRV_O_PROTOCOL) || !file);
1592
b6ce07aa 1593 /* Open the image */
62392ebb 1594 ret = bdrv_open_common(bs, file, options, flags, &local_err);
b6ce07aa 1595 if (ret < 0) {
8bfea15d 1596 goto fail;
6987307c
CH
1597 }
1598
2a05cbe4 1599 if (file && (bs->file != file)) {
9a4f4c31 1600 bdrv_unref_child(bs, file);
f500a6d3
KW
1601 file = NULL;
1602 }
1603
b6ce07aa 1604 /* If there is a backing file, use it */
9156df12 1605 if ((flags & BDRV_O_NO_BACKING) == 0) {
d9b7b057 1606 ret = bdrv_open_backing_file(bs, options, "backing", &local_err);
b6ce07aa 1607 if (ret < 0) {
b6ad491a 1608 goto close_and_fail;
b6ce07aa 1609 }
b6ce07aa
KW
1610 }
1611
91af7014
HR
1612 bdrv_refresh_filename(bs);
1613
b6ad491a 1614 /* Check if any unknown options were used */
5acd9d81 1615 if (options && (qdict_size(options) != 0)) {
b6ad491a 1616 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
1617 if (flags & BDRV_O_PROTOCOL) {
1618 error_setg(errp, "Block protocol '%s' doesn't support the option "
1619 "'%s'", drv->format_name, entry->key);
1620 } else {
1621 error_setg(errp, "Block format '%s' used by device '%s' doesn't "
1622 "support the option '%s'", drv->format_name,
bfb197e0 1623 bdrv_get_device_name(bs), entry->key);
5acd9d81 1624 }
b6ad491a
KW
1625
1626 ret = -EINVAL;
1627 goto close_and_fail;
1628 }
b6ad491a 1629
b6ce07aa 1630 if (!bdrv_key_required(bs)) {
a7f53e26
MA
1631 if (bs->blk) {
1632 blk_dev_change_media_cb(bs->blk, true);
1633 }
c3adb58f
MA
1634 } else if (!runstate_check(RUN_STATE_PRELAUNCH)
1635 && !runstate_check(RUN_STATE_INMIGRATE)
1636 && !runstate_check(RUN_STATE_PAUSED)) { /* HACK */
1637 error_setg(errp,
1638 "Guest must be stopped for opening of encrypted image");
1639 ret = -EBUSY;
1640 goto close_and_fail;
b6ce07aa
KW
1641 }
1642
c3adb58f 1643 QDECREF(options);
f67503e5 1644 *pbs = bs;
dd62f1ca
KW
1645
1646 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
1647 * temporary snapshot afterwards. */
1648 if (snapshot_flags) {
1649 ret = bdrv_append_temp_snapshot(bs, snapshot_flags, &local_err);
1650 if (local_err) {
1651 goto close_and_fail;
1652 }
1653 }
1654
b6ce07aa
KW
1655 return 0;
1656
8bfea15d 1657fail:
f500a6d3 1658 if (file != NULL) {
9a4f4c31 1659 bdrv_unref_child(bs, file);
f500a6d3 1660 }
145f598e 1661 QDECREF(bs->explicit_options);
de9c0cec 1662 QDECREF(bs->options);
b6ad491a 1663 QDECREF(options);
de9c0cec 1664 bs->options = NULL;
f67503e5
HR
1665 if (!*pbs) {
1666 /* If *pbs is NULL, a new BDS has been created in this function and
1667 needs to be freed now. Otherwise, it does not need to be closed,
1668 since it has not really been opened yet. */
1669 bdrv_unref(bs);
1670 }
84d18f06 1671 if (local_err) {
34b5d2c6
HR
1672 error_propagate(errp, local_err);
1673 }
b6ad491a 1674 return ret;
de9c0cec 1675
b6ad491a 1676close_and_fail:
f67503e5
HR
1677 /* See fail path, but now the BDS has to be always closed */
1678 if (*pbs) {
1679 bdrv_close(bs);
1680 } else {
1681 bdrv_unref(bs);
1682 }
b6ad491a 1683 QDECREF(options);
84d18f06 1684 if (local_err) {
34b5d2c6
HR
1685 error_propagate(errp, local_err);
1686 }
b6ce07aa
KW
1687 return ret;
1688}
1689
f3930ed0 1690int bdrv_open(BlockDriverState **pbs, const char *filename,
6ebf9aa2 1691 const char *reference, QDict *options, int flags, Error **errp)
f3930ed0
KW
1692{
1693 return bdrv_open_inherit(pbs, filename, reference, options, flags, NULL,
ce343771 1694 NULL, errp);
f3930ed0
KW
1695}
1696
e971aa12
JC
1697typedef struct BlockReopenQueueEntry {
1698 bool prepared;
1699 BDRVReopenState state;
1700 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
1701} BlockReopenQueueEntry;
1702
1703/*
1704 * Adds a BlockDriverState to a simple queue for an atomic, transactional
1705 * reopen of multiple devices.
1706 *
1707 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
1708 * already performed, or alternatively may be NULL a new BlockReopenQueue will
1709 * be created and initialized. This newly created BlockReopenQueue should be
1710 * passed back in for subsequent calls that are intended to be of the same
1711 * atomic 'set'.
1712 *
1713 * bs is the BlockDriverState to add to the reopen queue.
1714 *
4d2cb092
KW
1715 * options contains the changed options for the associated bs
1716 * (the BlockReopenQueue takes ownership)
1717 *
e971aa12
JC
1718 * flags contains the open flags for the associated bs
1719 *
1720 * returns a pointer to bs_queue, which is either the newly allocated
1721 * bs_queue, or the existing bs_queue being used.
1722 *
1723 */
28518102
KW
1724static BlockReopenQueue *bdrv_reopen_queue_child(BlockReopenQueue *bs_queue,
1725 BlockDriverState *bs,
1726 QDict *options,
1727 int flags,
1728 const BdrvChildRole *role,
1729 QDict *parent_options,
1730 int parent_flags)
e971aa12
JC
1731{
1732 assert(bs != NULL);
1733
1734 BlockReopenQueueEntry *bs_entry;
67251a31 1735 BdrvChild *child;
145f598e 1736 QDict *old_options, *explicit_options;
67251a31 1737
e971aa12
JC
1738 if (bs_queue == NULL) {
1739 bs_queue = g_new0(BlockReopenQueue, 1);
1740 QSIMPLEQ_INIT(bs_queue);
1741 }
1742
4d2cb092
KW
1743 if (!options) {
1744 options = qdict_new();
1745 }
1746
28518102
KW
1747 /*
1748 * Precedence of options:
1749 * 1. Explicitly passed in options (highest)
1750 * 2. TODO Set in flags (only for top level)
145f598e 1751 * 3. Retained from explicitly set options of bs
8e2160e2 1752 * 4. Inherited from parent node
28518102
KW
1753 * 5. Retained from effective options of bs
1754 */
1755
145f598e
KW
1756 /* Old explicitly set values (don't overwrite by inherited value) */
1757 old_options = qdict_clone_shallow(bs->explicit_options);
1758 bdrv_join_options(bs, options, old_options);
1759 QDECREF(old_options);
1760
1761 explicit_options = qdict_clone_shallow(options);
1762
28518102
KW
1763 /* Inherit from parent node */
1764 if (parent_options) {
1765 assert(!flags);
8e2160e2 1766 role->inherit_options(&flags, options, parent_flags, parent_options);
28518102
KW
1767 }
1768
1769 /* Old values are used for options that aren't set yet */
4d2cb092 1770 old_options = qdict_clone_shallow(bs->options);
cddff5ba 1771 bdrv_join_options(bs, options, old_options);
4d2cb092
KW
1772 QDECREF(old_options);
1773
f1f25a2e
KW
1774 /* bdrv_open() masks this flag out */
1775 flags &= ~BDRV_O_PROTOCOL;
1776
67251a31 1777 QLIST_FOREACH(child, &bs->children, next) {
4c9dfe5d
KW
1778 QDict *new_child_options;
1779 char *child_key_dot;
67251a31 1780
4c9dfe5d
KW
1781 /* reopen can only change the options of block devices that were
1782 * implicitly created and inherited options. For other (referenced)
1783 * block devices, a syntax like "backing.foo" results in an error. */
67251a31
KW
1784 if (child->bs->inherits_from != bs) {
1785 continue;
1786 }
1787
4c9dfe5d
KW
1788 child_key_dot = g_strdup_printf("%s.", child->name);
1789 qdict_extract_subqdict(options, &new_child_options, child_key_dot);
1790 g_free(child_key_dot);
1791
28518102
KW
1792 bdrv_reopen_queue_child(bs_queue, child->bs, new_child_options, 0,
1793 child->role, options, flags);
e971aa12
JC
1794 }
1795
1796 bs_entry = g_new0(BlockReopenQueueEntry, 1);
1797 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
1798
1799 bs_entry->state.bs = bs;
4d2cb092 1800 bs_entry->state.options = options;
145f598e 1801 bs_entry->state.explicit_options = explicit_options;
e971aa12
JC
1802 bs_entry->state.flags = flags;
1803
1804 return bs_queue;
1805}
1806
28518102
KW
1807BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
1808 BlockDriverState *bs,
1809 QDict *options, int flags)
1810{
1811 return bdrv_reopen_queue_child(bs_queue, bs, options, flags,
1812 NULL, NULL, 0);
1813}
1814
e971aa12
JC
1815/*
1816 * Reopen multiple BlockDriverStates atomically & transactionally.
1817 *
1818 * The queue passed in (bs_queue) must have been built up previous
1819 * via bdrv_reopen_queue().
1820 *
1821 * Reopens all BDS specified in the queue, with the appropriate
1822 * flags. All devices are prepared for reopen, and failure of any
1823 * device will cause all device changes to be abandonded, and intermediate
1824 * data cleaned up.
1825 *
1826 * If all devices prepare successfully, then the changes are committed
1827 * to all devices.
1828 *
1829 */
1830int bdrv_reopen_multiple(BlockReopenQueue *bs_queue, Error **errp)
1831{
1832 int ret = -1;
1833 BlockReopenQueueEntry *bs_entry, *next;
1834 Error *local_err = NULL;
1835
1836 assert(bs_queue != NULL);
1837
1838 bdrv_drain_all();
1839
1840 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1841 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
1842 error_propagate(errp, local_err);
1843 goto cleanup;
1844 }
1845 bs_entry->prepared = true;
1846 }
1847
1848 /* If we reach this point, we have success and just need to apply the
1849 * changes
1850 */
1851 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1852 bdrv_reopen_commit(&bs_entry->state);
1853 }
1854
1855 ret = 0;
1856
1857cleanup:
1858 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
1859 if (ret && bs_entry->prepared) {
1860 bdrv_reopen_abort(&bs_entry->state);
145f598e
KW
1861 } else if (ret) {
1862 QDECREF(bs_entry->state.explicit_options);
e971aa12 1863 }
4d2cb092 1864 QDECREF(bs_entry->state.options);
e971aa12
JC
1865 g_free(bs_entry);
1866 }
1867 g_free(bs_queue);
1868 return ret;
1869}
1870
1871
1872/* Reopen a single BlockDriverState with the specified flags. */
1873int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
1874{
1875 int ret = -1;
1876 Error *local_err = NULL;
4d2cb092 1877 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12
JC
1878
1879 ret = bdrv_reopen_multiple(queue, &local_err);
1880 if (local_err != NULL) {
1881 error_propagate(errp, local_err);
1882 }
1883 return ret;
1884}
1885
1886
1887/*
1888 * Prepares a BlockDriverState for reopen. All changes are staged in the
1889 * 'opaque' field of the BDRVReopenState, which is used and allocated by
1890 * the block driver layer .bdrv_reopen_prepare()
1891 *
1892 * bs is the BlockDriverState to reopen
1893 * flags are the new open flags
1894 * queue is the reopen queue
1895 *
1896 * Returns 0 on success, non-zero on error. On error errp will be set
1897 * as well.
1898 *
1899 * On failure, bdrv_reopen_abort() will be called to clean up any data.
1900 * It is the responsibility of the caller to then call the abort() or
1901 * commit() for any other BDS that have been left in a prepare() state
1902 *
1903 */
1904int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
1905 Error **errp)
1906{
1907 int ret = -1;
1908 Error *local_err = NULL;
1909 BlockDriver *drv;
1910
1911 assert(reopen_state != NULL);
1912 assert(reopen_state->bs->drv != NULL);
1913 drv = reopen_state->bs->drv;
1914
1915 /* if we are to stay read-only, do not allow permission change
1916 * to r/w */
1917 if (!(reopen_state->bs->open_flags & BDRV_O_ALLOW_RDWR) &&
1918 reopen_state->flags & BDRV_O_RDWR) {
81e5f78a
AG
1919 error_setg(errp, "Node '%s' is read only",
1920 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
1921 goto error;
1922 }
1923
1924
1925 ret = bdrv_flush(reopen_state->bs);
1926 if (ret) {
455b0fde 1927 error_setg_errno(errp, -ret, "Error flushing drive");
e971aa12
JC
1928 goto error;
1929 }
1930
1931 if (drv->bdrv_reopen_prepare) {
1932 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
1933 if (ret) {
1934 if (local_err != NULL) {
1935 error_propagate(errp, local_err);
1936 } else {
d8b6895f
LC
1937 error_setg(errp, "failed while preparing to reopen image '%s'",
1938 reopen_state->bs->filename);
e971aa12
JC
1939 }
1940 goto error;
1941 }
1942 } else {
1943 /* It is currently mandatory to have a bdrv_reopen_prepare()
1944 * handler for each supported drv. */
81e5f78a
AG
1945 error_setg(errp, "Block format '%s' used by node '%s' "
1946 "does not support reopening files", drv->format_name,
1947 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
1948 ret = -1;
1949 goto error;
1950 }
1951
4d2cb092
KW
1952 /* Options that are not handled are only okay if they are unchanged
1953 * compared to the old state. It is expected that some options are only
1954 * used for the initial open, but not reopen (e.g. filename) */
1955 if (qdict_size(reopen_state->options)) {
1956 const QDictEntry *entry = qdict_first(reopen_state->options);
1957
1958 do {
1959 QString *new_obj = qobject_to_qstring(entry->value);
1960 const char *new = qstring_get_str(new_obj);
1961 const char *old = qdict_get_try_str(reopen_state->bs->options,
1962 entry->key);
1963
1964 if (!old || strcmp(new, old)) {
1965 error_setg(errp, "Cannot change the option '%s'", entry->key);
1966 ret = -EINVAL;
1967 goto error;
1968 }
1969 } while ((entry = qdict_next(reopen_state->options, entry)));
1970 }
1971
e971aa12
JC
1972 ret = 0;
1973
1974error:
1975 return ret;
1976}
1977
1978/*
1979 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
1980 * makes them final by swapping the staging BlockDriverState contents into
1981 * the active BlockDriverState contents.
1982 */
1983void bdrv_reopen_commit(BDRVReopenState *reopen_state)
1984{
1985 BlockDriver *drv;
1986
1987 assert(reopen_state != NULL);
1988 drv = reopen_state->bs->drv;
1989 assert(drv != NULL);
1990
1991 /* If there are any driver level actions to take */
1992 if (drv->bdrv_reopen_commit) {
1993 drv->bdrv_reopen_commit(reopen_state);
1994 }
1995
1996 /* set BDS specific flags now */
145f598e
KW
1997 QDECREF(reopen_state->bs->explicit_options);
1998
1999 reopen_state->bs->explicit_options = reopen_state->explicit_options;
e971aa12
JC
2000 reopen_state->bs->open_flags = reopen_state->flags;
2001 reopen_state->bs->enable_write_cache = !!(reopen_state->flags &
2002 BDRV_O_CACHE_WB);
2003 reopen_state->bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 2004
3baca891 2005 bdrv_refresh_limits(reopen_state->bs, NULL);
e971aa12
JC
2006}
2007
2008/*
2009 * Abort the reopen, and delete and free the staged changes in
2010 * reopen_state
2011 */
2012void bdrv_reopen_abort(BDRVReopenState *reopen_state)
2013{
2014 BlockDriver *drv;
2015
2016 assert(reopen_state != NULL);
2017 drv = reopen_state->bs->drv;
2018 assert(drv != NULL);
2019
2020 if (drv->bdrv_reopen_abort) {
2021 drv->bdrv_reopen_abort(reopen_state);
2022 }
145f598e
KW
2023
2024 QDECREF(reopen_state->explicit_options);
e971aa12
JC
2025}
2026
2027
fc01f7e7
FB
2028void bdrv_close(BlockDriverState *bs)
2029{
33384421
HR
2030 BdrvAioNotifier *ban, *ban_next;
2031
3cbc002c
PB
2032 if (bs->job) {
2033 block_job_cancel_sync(bs->job);
2034 }
99b7e775
AG
2035
2036 /* Disable I/O limits and drain all pending throttled requests */
a0d64a61 2037 if (bs->throttle_state) {
99b7e775
AG
2038 bdrv_io_limits_disable(bs);
2039 }
2040
53ec73e2 2041 bdrv_drain(bs); /* complete I/O */
58fda173 2042 bdrv_flush(bs);
53ec73e2 2043 bdrv_drain(bs); /* in case flush left pending I/O */
d7d512f6 2044 notifier_list_notify(&bs->close_notifiers, bs);
7094f12f 2045
b4d02820
HR
2046 if (bs->blk) {
2047 blk_dev_change_media_cb(bs->blk, false);
2048 }
2049
3cbc002c 2050 if (bs->drv) {
6e93e7c4
KW
2051 BdrvChild *child, *next;
2052
9a7dedbc 2053 bs->drv->bdrv_close(bs);
9a4f4c31 2054 bs->drv = NULL;
9a7dedbc 2055
5db15a57 2056 bdrv_set_backing_hd(bs, NULL);
9a7dedbc 2057
9a4f4c31
KW
2058 if (bs->file != NULL) {
2059 bdrv_unref_child(bs, bs->file);
2060 bs->file = NULL;
2061 }
2062
6e93e7c4 2063 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
2064 /* TODO Remove bdrv_unref() from drivers' close function and use
2065 * bdrv_unref_child() here */
bddcec37
KW
2066 if (child->bs->inherits_from == bs) {
2067 child->bs->inherits_from = NULL;
2068 }
33a60407 2069 bdrv_detach_child(child);
6e93e7c4
KW
2070 }
2071
7267c094 2072 g_free(bs->opaque);
ea2384d3 2073 bs->opaque = NULL;
53fec9d3 2074 bs->copy_on_read = 0;
a275fa42
PB
2075 bs->backing_file[0] = '\0';
2076 bs->backing_format[0] = '\0';
6405875c
PB
2077 bs->total_sectors = 0;
2078 bs->encrypted = 0;
2079 bs->valid_key = 0;
2080 bs->sg = 0;
0d51b4de 2081 bs->zero_beyond_eof = false;
de9c0cec 2082 QDECREF(bs->options);
145f598e 2083 QDECREF(bs->explicit_options);
de9c0cec 2084 bs->options = NULL;
91af7014
HR
2085 QDECREF(bs->full_open_options);
2086 bs->full_open_options = NULL;
b338082b 2087 }
98f90dba 2088
33384421
HR
2089 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
2090 g_free(ban);
2091 }
2092 QLIST_INIT(&bs->aio_notifiers);
b338082b
FB
2093}
2094
2bc93fed
MK
2095void bdrv_close_all(void)
2096{
2097 BlockDriverState *bs;
2098
dc364f4c 2099 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
2100 AioContext *aio_context = bdrv_get_aio_context(bs);
2101
2102 aio_context_acquire(aio_context);
2bc93fed 2103 bdrv_close(bs);
ed78cda3 2104 aio_context_release(aio_context);
2bc93fed
MK
2105 }
2106}
2107
dc364f4c
BC
2108/* make a BlockDriverState anonymous by removing from bdrv_state and
2109 * graph_bdrv_state list.
d22b2f41
RH
2110 Also, NULL terminate the device_name to prevent double remove */
2111void bdrv_make_anon(BlockDriverState *bs)
2112{
bfb197e0
MA
2113 /*
2114 * Take care to remove bs from bdrv_states only when it's actually
2115 * in it. Note that bs->device_list.tqe_prev is initially null,
2116 * and gets set to non-null by QTAILQ_INSERT_TAIL(). Establish
2117 * the useful invariant "bs in bdrv_states iff bs->tqe_prev" by
2118 * resetting it to null on remove.
2119 */
2120 if (bs->device_list.tqe_prev) {
dc364f4c 2121 QTAILQ_REMOVE(&bdrv_states, bs, device_list);
bfb197e0 2122 bs->device_list.tqe_prev = NULL;
d22b2f41 2123 }
dc364f4c
BC
2124 if (bs->node_name[0] != '\0') {
2125 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
2126 }
2127 bs->node_name[0] = '\0';
d22b2f41
RH
2128}
2129
8e419aef 2130/* Fields that need to stay with the top-level BDS */
4ddc07ca
PB
2131static void bdrv_move_feature_fields(BlockDriverState *bs_dest,
2132 BlockDriverState *bs_src)
8802d1fd 2133{
4ddc07ca 2134 /* move some fields that need to stay attached to the device */
8802d1fd
JC
2135
2136 /* dev info */
4ddc07ca 2137 bs_dest->copy_on_read = bs_src->copy_on_read;
8802d1fd 2138
4ddc07ca 2139 bs_dest->enable_write_cache = bs_src->enable_write_cache;
c4a248a1 2140
a9fc4408 2141 /* dirty bitmap */
e4654d2d 2142 bs_dest->dirty_bitmaps = bs_src->dirty_bitmaps;
063dd40e 2143}
a9fc4408 2144
dd62f1ca
KW
2145static void change_parent_backing_link(BlockDriverState *from,
2146 BlockDriverState *to)
2147{
2148 BdrvChild *c, *next;
2149
2150 QLIST_FOREACH_SAFE(c, &from->parents, next_parent, next) {
2151 assert(c->role != &child_backing);
2152 c->bs = to;
2153 QLIST_REMOVE(c, next_parent);
2154 QLIST_INSERT_HEAD(&to->parents, c, next_parent);
2155 bdrv_ref(to);
2156 bdrv_unref(from);
2157 }
2158 if (from->blk) {
2159 blk_set_bs(from->blk, to);
2160 if (!to->device_list.tqe_prev) {
2161 QTAILQ_INSERT_BEFORE(from, to, device_list);
2162 }
2163 QTAILQ_REMOVE(&bdrv_states, from, device_list);
2164 }
2165}
2166
2167static void swap_feature_fields(BlockDriverState *bs_top,
2168 BlockDriverState *bs_new)
2169{
2170 BlockDriverState tmp;
2171
2172 bdrv_move_feature_fields(&tmp, bs_top);
2173 bdrv_move_feature_fields(bs_top, bs_new);
2174 bdrv_move_feature_fields(bs_new, &tmp);
2175
2176 assert(!bs_new->throttle_state);
2177 if (bs_top->throttle_state) {
2178 assert(bs_top->io_limits_enabled);
2179 bdrv_io_limits_enable(bs_new, throttle_group_get_name(bs_top));
2180 bdrv_io_limits_disable(bs_top);
2181 }
2182}
2183
4ddc07ca
PB
2184/*
2185 * Add new bs contents at the top of an image chain while the chain is
2186 * live, while keeping required fields on the top layer.
2187 *
2188 * This will modify the BlockDriverState fields, and swap contents
2189 * between bs_new and bs_top. Both bs_new and bs_top are modified.
2190 *
bfb197e0 2191 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2192 *
2193 * This function does not create any image files.
dd62f1ca
KW
2194 *
2195 * bdrv_append() takes ownership of a bs_new reference and unrefs it because
2196 * that's what the callers commonly need. bs_new will be referenced by the old
2197 * parents of bs_top after bdrv_append() returns. If the caller needs to keep a
2198 * reference of its own, it must call bdrv_ref().
4ddc07ca
PB
2199 */
2200void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top)
2201{
dd62f1ca
KW
2202 assert(!bdrv_requests_pending(bs_top));
2203 assert(!bdrv_requests_pending(bs_new));
2204
2205 bdrv_ref(bs_top);
2206 change_parent_backing_link(bs_top, bs_new);
2207
2208 /* Some fields always stay on top of the backing file chain */
2209 swap_feature_fields(bs_top, bs_new);
2210
2211 bdrv_set_backing_hd(bs_new, bs_top);
2212 bdrv_unref(bs_top);
4ddc07ca 2213
dd62f1ca
KW
2214 /* bs_new is now referenced by its new parents, we don't need the
2215 * additional reference any more. */
2216 bdrv_unref(bs_new);
8802d1fd
JC
2217}
2218
3f09bfbc
KW
2219void bdrv_replace_in_backing_chain(BlockDriverState *old, BlockDriverState *new)
2220{
2221 assert(!bdrv_requests_pending(old));
2222 assert(!bdrv_requests_pending(new));
2223
2224 bdrv_ref(old);
2225
2226 if (old->blk) {
2227 /* As long as these fields aren't in BlockBackend, but in the top-level
2228 * BlockDriverState, it's not possible for a BDS to have two BBs.
2229 *
2230 * We really want to copy the fields from old to new, but we go for a
2231 * swap instead so that pointers aren't duplicated and cause trouble.
2232 * (Also, bdrv_swap() used to do the same.) */
2233 assert(!new->blk);
2234 swap_feature_fields(old, new);
2235 }
2236 change_parent_backing_link(old, new);
2237
2238 /* Change backing files if a previously independent node is added to the
2239 * chain. For active commit, we replace top by its own (indirect) backing
2240 * file and don't do anything here so we don't build a loop. */
2241 if (new->backing == NULL && !bdrv_chain_contains(backing_bs(old), new)) {
2242 bdrv_set_backing_hd(new, backing_bs(old));
2243 bdrv_set_backing_hd(old, NULL);
2244 }
2245
2246 bdrv_unref(old);
2247}
2248
4f6fd349 2249static void bdrv_delete(BlockDriverState *bs)
b338082b 2250{
3e914655 2251 assert(!bs->job);
3718d8ab 2252 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 2253 assert(!bs->refcnt);
e4654d2d 2254 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
18846dee 2255
e1b5c52e
SH
2256 bdrv_close(bs);
2257
1b7bdbc1 2258 /* remove from list, if necessary */
d22b2f41 2259 bdrv_make_anon(bs);
34c6f050 2260
7267c094 2261 g_free(bs);
fc01f7e7
FB
2262}
2263
e97fc193
AL
2264/*
2265 * Run consistency checks on an image
2266 *
e076f338 2267 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 2268 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 2269 * check are stored in res.
e97fc193 2270 */
4534ff54 2271int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 2272{
908bcd54
HR
2273 if (bs->drv == NULL) {
2274 return -ENOMEDIUM;
2275 }
e97fc193
AL
2276 if (bs->drv->bdrv_check == NULL) {
2277 return -ENOTSUP;
2278 }
2279
e076f338 2280 memset(res, 0, sizeof(*res));
4534ff54 2281 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
2282}
2283
8a426614
KW
2284#define COMMIT_BUF_SECTORS 2048
2285
33e3963e
FB
2286/* commit COW file into the raw image */
2287int bdrv_commit(BlockDriverState *bs)
2288{
19cb3738 2289 BlockDriver *drv = bs->drv;
72706ea4 2290 int64_t sector, total_sectors, length, backing_length;
8a426614 2291 int n, ro, open_flags;
0bce597d 2292 int ret = 0;
72706ea4 2293 uint8_t *buf = NULL;
33e3963e 2294
19cb3738
FB
2295 if (!drv)
2296 return -ENOMEDIUM;
6bb45158 2297
760e0063 2298 if (!bs->backing) {
4dca4b63 2299 return -ENOTSUP;
33e3963e
FB
2300 }
2301
bb00021d 2302 if (bdrv_op_is_blocked(bs, BLOCK_OP_TYPE_COMMIT_SOURCE, NULL) ||
760e0063 2303 bdrv_op_is_blocked(bs->backing->bs, BLOCK_OP_TYPE_COMMIT_TARGET, NULL)) {
2d3735d3
SH
2304 return -EBUSY;
2305 }
2306
760e0063
KW
2307 ro = bs->backing->bs->read_only;
2308 open_flags = bs->backing->bs->open_flags;
4dca4b63
NS
2309
2310 if (ro) {
760e0063 2311 if (bdrv_reopen(bs->backing->bs, open_flags | BDRV_O_RDWR, NULL)) {
0bce597d 2312 return -EACCES;
4dca4b63 2313 }
ea2384d3 2314 }
33e3963e 2315
72706ea4
JC
2316 length = bdrv_getlength(bs);
2317 if (length < 0) {
2318 ret = length;
2319 goto ro_cleanup;
2320 }
2321
760e0063 2322 backing_length = bdrv_getlength(bs->backing->bs);
72706ea4
JC
2323 if (backing_length < 0) {
2324 ret = backing_length;
2325 goto ro_cleanup;
2326 }
2327
2328 /* If our top snapshot is larger than the backing file image,
2329 * grow the backing file image if possible. If not possible,
2330 * we must return an error */
2331 if (length > backing_length) {
760e0063 2332 ret = bdrv_truncate(bs->backing->bs, length);
72706ea4
JC
2333 if (ret < 0) {
2334 goto ro_cleanup;
2335 }
2336 }
2337
2338 total_sectors = length >> BDRV_SECTOR_BITS;
857d4f46
KW
2339
2340 /* qemu_try_blockalign() for bs will choose an alignment that works for
760e0063 2341 * bs->backing->bs as well, so no need to compare the alignment manually. */
857d4f46
KW
2342 buf = qemu_try_blockalign(bs, COMMIT_BUF_SECTORS * BDRV_SECTOR_SIZE);
2343 if (buf == NULL) {
2344 ret = -ENOMEM;
2345 goto ro_cleanup;
2346 }
8a426614
KW
2347
2348 for (sector = 0; sector < total_sectors; sector += n) {
d663640c
PB
2349 ret = bdrv_is_allocated(bs, sector, COMMIT_BUF_SECTORS, &n);
2350 if (ret < 0) {
2351 goto ro_cleanup;
2352 }
2353 if (ret) {
dabfa6cc
KW
2354 ret = bdrv_read(bs, sector, buf, n);
2355 if (ret < 0) {
8a426614
KW
2356 goto ro_cleanup;
2357 }
2358
760e0063 2359 ret = bdrv_write(bs->backing->bs, sector, buf, n);
dabfa6cc 2360 if (ret < 0) {
8a426614
KW
2361 goto ro_cleanup;
2362 }
ea2384d3 2363 }
33e3963e 2364 }
95389c86 2365
1d44952f
CH
2366 if (drv->bdrv_make_empty) {
2367 ret = drv->bdrv_make_empty(bs);
dabfa6cc
KW
2368 if (ret < 0) {
2369 goto ro_cleanup;
2370 }
1d44952f
CH
2371 bdrv_flush(bs);
2372 }
95389c86 2373
3f5075ae
CH
2374 /*
2375 * Make sure all data we wrote to the backing device is actually
2376 * stable on disk.
2377 */
760e0063
KW
2378 if (bs->backing) {
2379 bdrv_flush(bs->backing->bs);
dabfa6cc 2380 }
4dca4b63 2381
dabfa6cc 2382 ret = 0;
4dca4b63 2383ro_cleanup:
857d4f46 2384 qemu_vfree(buf);
4dca4b63
NS
2385
2386 if (ro) {
0bce597d 2387 /* ignoring error return here */
760e0063 2388 bdrv_reopen(bs->backing->bs, open_flags & ~BDRV_O_RDWR, NULL);
4dca4b63
NS
2389 }
2390
1d44952f 2391 return ret;
33e3963e
FB
2392}
2393
e8877497 2394int bdrv_commit_all(void)
6ab4b5ab
MA
2395{
2396 BlockDriverState *bs;
2397
dc364f4c 2398 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
2399 AioContext *aio_context = bdrv_get_aio_context(bs);
2400
2401 aio_context_acquire(aio_context);
760e0063 2402 if (bs->drv && bs->backing) {
272d2d8e
JC
2403 int ret = bdrv_commit(bs);
2404 if (ret < 0) {
ed78cda3 2405 aio_context_release(aio_context);
272d2d8e
JC
2406 return ret;
2407 }
e8877497 2408 }
ed78cda3 2409 aio_context_release(aio_context);
6ab4b5ab 2410 }
e8877497 2411 return 0;
6ab4b5ab
MA
2412}
2413
756e6736
KW
2414/*
2415 * Return values:
2416 * 0 - success
2417 * -EINVAL - backing format specified, but no file
2418 * -ENOSPC - can't update the backing file because no space is left in the
2419 * image file header
2420 * -ENOTSUP - format driver doesn't support changing the backing file
2421 */
2422int bdrv_change_backing_file(BlockDriverState *bs,
2423 const char *backing_file, const char *backing_fmt)
2424{
2425 BlockDriver *drv = bs->drv;
469ef350 2426 int ret;
756e6736 2427
5f377794
PB
2428 /* Backing file format doesn't make sense without a backing file */
2429 if (backing_fmt && !backing_file) {
2430 return -EINVAL;
2431 }
2432
756e6736 2433 if (drv->bdrv_change_backing_file != NULL) {
469ef350 2434 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 2435 } else {
469ef350 2436 ret = -ENOTSUP;
756e6736 2437 }
469ef350
PB
2438
2439 if (ret == 0) {
2440 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
2441 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
2442 }
2443 return ret;
756e6736
KW
2444}
2445
6ebdcee2
JC
2446/*
2447 * Finds the image layer in the chain that has 'bs' as its backing file.
2448 *
2449 * active is the current topmost image.
2450 *
2451 * Returns NULL if bs is not found in active's image chain,
2452 * or if active == bs.
4caf0fcd
JC
2453 *
2454 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
2455 */
2456BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
2457 BlockDriverState *bs)
2458{
760e0063
KW
2459 while (active && bs != backing_bs(active)) {
2460 active = backing_bs(active);
6ebdcee2
JC
2461 }
2462
4caf0fcd
JC
2463 return active;
2464}
6ebdcee2 2465
4caf0fcd
JC
2466/* Given a BDS, searches for the base layer. */
2467BlockDriverState *bdrv_find_base(BlockDriverState *bs)
2468{
2469 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
2470}
2471
6ebdcee2
JC
2472/*
2473 * Drops images above 'base' up to and including 'top', and sets the image
2474 * above 'top' to have base as its backing file.
2475 *
2476 * Requires that the overlay to 'top' is opened r/w, so that the backing file
2477 * information in 'bs' can be properly updated.
2478 *
2479 * E.g., this will convert the following chain:
2480 * bottom <- base <- intermediate <- top <- active
2481 *
2482 * to
2483 *
2484 * bottom <- base <- active
2485 *
2486 * It is allowed for bottom==base, in which case it converts:
2487 *
2488 * base <- intermediate <- top <- active
2489 *
2490 * to
2491 *
2492 * base <- active
2493 *
54e26900
JC
2494 * If backing_file_str is non-NULL, it will be used when modifying top's
2495 * overlay image metadata.
2496 *
6ebdcee2
JC
2497 * Error conditions:
2498 * if active == top, that is considered an error
2499 *
2500 */
2501int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 2502 BlockDriverState *base, const char *backing_file_str)
6ebdcee2 2503{
6ebdcee2 2504 BlockDriverState *new_top_bs = NULL;
6ebdcee2
JC
2505 int ret = -EIO;
2506
6ebdcee2
JC
2507 if (!top->drv || !base->drv) {
2508 goto exit;
2509 }
2510
2511 new_top_bs = bdrv_find_overlay(active, top);
2512
2513 if (new_top_bs == NULL) {
2514 /* we could not find the image above 'top', this is an error */
2515 goto exit;
2516 }
2517
760e0063 2518 /* special case of new_top_bs->backing->bs already pointing to base - nothing
6ebdcee2 2519 * to do, no intermediate images */
760e0063 2520 if (backing_bs(new_top_bs) == base) {
6ebdcee2
JC
2521 ret = 0;
2522 goto exit;
2523 }
2524
5db15a57
KW
2525 /* Make sure that base is in the backing chain of top */
2526 if (!bdrv_chain_contains(top, base)) {
6ebdcee2
JC
2527 goto exit;
2528 }
2529
2530 /* success - we can delete the intermediate states, and link top->base */
5db15a57 2531 backing_file_str = backing_file_str ? backing_file_str : base->filename;
54e26900 2532 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
5db15a57 2533 base->drv ? base->drv->format_name : "");
6ebdcee2
JC
2534 if (ret) {
2535 goto exit;
2536 }
5db15a57 2537 bdrv_set_backing_hd(new_top_bs, base);
6ebdcee2 2538
6ebdcee2 2539 ret = 0;
6ebdcee2 2540exit:
6ebdcee2
JC
2541 return ret;
2542}
2543
61007b31
SH
2544/**
2545 * Truncate file to 'offset' bytes (needed only for file protocols)
2546 */
2547int bdrv_truncate(BlockDriverState *bs, int64_t offset)
71d0770c 2548{
61007b31
SH
2549 BlockDriver *drv = bs->drv;
2550 int ret;
2551 if (!drv)
71d0770c 2552 return -ENOMEDIUM;
61007b31
SH
2553 if (!drv->bdrv_truncate)
2554 return -ENOTSUP;
2555 if (bs->read_only)
2556 return -EACCES;
71d0770c 2557
61007b31
SH
2558 ret = drv->bdrv_truncate(bs, offset);
2559 if (ret == 0) {
2560 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
2561 bdrv_dirty_bitmap_truncate(bs);
2562 if (bs->blk) {
2563 blk_dev_resize_cb(bs->blk);
2564 }
c0191e76 2565 }
61007b31 2566 return ret;
71d0770c
AL
2567}
2568
61007b31
SH
2569/**
2570 * Length of a allocated file in bytes. Sparse files are counted by actual
2571 * allocated space. Return < 0 if error or unknown.
2572 */
2573int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 2574{
61007b31
SH
2575 BlockDriver *drv = bs->drv;
2576 if (!drv) {
2577 return -ENOMEDIUM;
8f4754ed 2578 }
61007b31
SH
2579 if (drv->bdrv_get_allocated_file_size) {
2580 return drv->bdrv_get_allocated_file_size(bs);
2581 }
2582 if (bs->file) {
9a4f4c31 2583 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 2584 }
61007b31 2585 return -ENOTSUP;
1c9805a3 2586}
e7a8a783 2587
61007b31
SH
2588/**
2589 * Return number of sectors on success, -errno on error.
1c9805a3 2590 */
61007b31 2591int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 2592{
61007b31 2593 BlockDriver *drv = bs->drv;
498e386c 2594
61007b31
SH
2595 if (!drv)
2596 return -ENOMEDIUM;
2572b37a 2597
61007b31
SH
2598 if (drv->has_variable_length) {
2599 int ret = refresh_total_sectors(bs, bs->total_sectors);
2600 if (ret < 0) {
2601 return ret;
1c9805a3
SH
2602 }
2603 }
61007b31 2604 return bs->total_sectors;
1c9805a3 2605}
b338082b 2606
61007b31
SH
2607/**
2608 * Return length in bytes on success, -errno on error.
2609 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 2610 */
61007b31 2611int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 2612{
61007b31 2613 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 2614
4a9c9ea0 2615 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 2616 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
2617}
2618
61007b31
SH
2619/* return 0 as number of sectors if no device present or error */
2620void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 2621{
61007b31 2622 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 2623
61007b31 2624 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
2625}
2626
61007b31 2627int bdrv_is_read_only(BlockDriverState *bs)
8d3b1a2d 2628{
61007b31 2629 return bs->read_only;
83f64091 2630}
83f64091 2631
61007b31 2632int bdrv_is_sg(BlockDriverState *bs)
f08145fe 2633{
61007b31 2634 return bs->sg;
f08145fe
KW
2635}
2636
61007b31 2637int bdrv_enable_write_cache(BlockDriverState *bs)
ab185921 2638{
61007b31 2639 return bs->enable_write_cache;
ab185921
SH
2640}
2641
61007b31 2642void bdrv_set_enable_write_cache(BlockDriverState *bs, bool wce)
da1fa91d 2643{
61007b31 2644 bs->enable_write_cache = wce;
ab185921 2645
61007b31
SH
2646 /* so a reopen() will preserve wce */
2647 if (wce) {
2648 bs->open_flags |= BDRV_O_CACHE_WB;
893a8f62 2649 } else {
61007b31 2650 bs->open_flags &= ~BDRV_O_CACHE_WB;
893a8f62 2651 }
da1fa91d
KW
2652}
2653
61007b31 2654int bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 2655{
760e0063 2656 if (bs->backing && bs->backing->bs->encrypted) {
61007b31 2657 return 1;
760e0063 2658 }
61007b31 2659 return bs->encrypted;
fc3959e4
FZ
2660}
2661
61007b31 2662int bdrv_key_required(BlockDriverState *bs)
fc3959e4 2663{
760e0063 2664 BdrvChild *backing = bs->backing;
61007b31 2665
760e0063 2666 if (backing && backing->bs->encrypted && !backing->bs->valid_key) {
61007b31 2667 return 1;
760e0063 2668 }
61007b31 2669 return (bs->encrypted && !bs->valid_key);
fc3959e4
FZ
2670}
2671
61007b31 2672int bdrv_set_key(BlockDriverState *bs, const char *key)
d0c7f642 2673{
d0c7f642 2674 int ret;
760e0063
KW
2675 if (bs->backing && bs->backing->bs->encrypted) {
2676 ret = bdrv_set_key(bs->backing->bs, key);
61007b31
SH
2677 if (ret < 0)
2678 return ret;
2679 if (!bs->encrypted)
2680 return 0;
2681 }
2682 if (!bs->encrypted) {
2683 return -EINVAL;
2684 } else if (!bs->drv || !bs->drv->bdrv_set_key) {
d0c7f642
KW
2685 return -ENOMEDIUM;
2686 }
61007b31 2687 ret = bs->drv->bdrv_set_key(bs, key);
b9c64947 2688 if (ret < 0) {
61007b31
SH
2689 bs->valid_key = 0;
2690 } else if (!bs->valid_key) {
2691 bs->valid_key = 1;
2692 if (bs->blk) {
2693 /* call the change callback now, we skipped it on open */
2694 blk_dev_change_media_cb(bs->blk, true);
2695 }
1b0288ae 2696 }
61007b31
SH
2697 return ret;
2698}
f08f2dda 2699
c5fbe571 2700/*
61007b31
SH
2701 * Provide an encryption key for @bs.
2702 * If @key is non-null:
2703 * If @bs is not encrypted, fail.
2704 * Else if the key is invalid, fail.
2705 * Else set @bs's key to @key, replacing the existing key, if any.
2706 * If @key is null:
2707 * If @bs is encrypted and still lacks a key, fail.
2708 * Else do nothing.
2709 * On failure, store an error object through @errp if non-null.
c5fbe571 2710 */
61007b31 2711void bdrv_add_key(BlockDriverState *bs, const char *key, Error **errp)
c5fbe571 2712{
61007b31
SH
2713 if (key) {
2714 if (!bdrv_is_encrypted(bs)) {
2715 error_setg(errp, "Node '%s' is not encrypted",
2716 bdrv_get_device_or_node_name(bs));
2717 } else if (bdrv_set_key(bs, key) < 0) {
c6bd8c70 2718 error_setg(errp, QERR_INVALID_PASSWORD);
4d2855a3
MA
2719 }
2720 } else {
2721 if (bdrv_key_required(bs)) {
b1ca6391
MA
2722 error_set(errp, ERROR_CLASS_DEVICE_ENCRYPTED,
2723 "'%s' (%s) is encrypted",
81e5f78a 2724 bdrv_get_device_or_node_name(bs),
4d2855a3
MA
2725 bdrv_get_encrypted_filename(bs));
2726 }
2727 }
2728}
2729
61007b31 2730const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 2731{
61007b31 2732 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
2733}
2734
61007b31 2735static int qsort_strcmp(const void *a, const void *b)
40b4f539 2736{
61007b31 2737 return strcmp(a, b);
40b4f539
KW
2738}
2739
61007b31
SH
2740void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
2741 void *opaque)
40b4f539 2742{
61007b31
SH
2743 BlockDriver *drv;
2744 int count = 0;
2745 int i;
2746 const char **formats = NULL;
40b4f539 2747
61007b31
SH
2748 QLIST_FOREACH(drv, &bdrv_drivers, list) {
2749 if (drv->format_name) {
2750 bool found = false;
2751 int i = count;
2752 while (formats && i && !found) {
2753 found = !strcmp(formats[--i], drv->format_name);
2754 }
e2a305fb 2755
61007b31
SH
2756 if (!found) {
2757 formats = g_renew(const char *, formats, count + 1);
2758 formats[count++] = drv->format_name;
2759 }
6c5a42ac 2760 }
61007b31 2761 }
6c5a42ac 2762
61007b31 2763 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 2764
61007b31
SH
2765 for (i = 0; i < count; i++) {
2766 it(opaque, formats[i]);
2767 }
40b4f539 2768
61007b31
SH
2769 g_free(formats);
2770}
40b4f539 2771
61007b31
SH
2772/* This function is to find a node in the bs graph */
2773BlockDriverState *bdrv_find_node(const char *node_name)
2774{
2775 BlockDriverState *bs;
391827eb 2776
61007b31 2777 assert(node_name);
40b4f539 2778
61007b31
SH
2779 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2780 if (!strcmp(node_name, bs->node_name)) {
2781 return bs;
40b4f539
KW
2782 }
2783 }
61007b31 2784 return NULL;
40b4f539
KW
2785}
2786
61007b31
SH
2787/* Put this QMP function here so it can access the static graph_bdrv_states. */
2788BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 2789{
61007b31
SH
2790 BlockDeviceInfoList *list, *entry;
2791 BlockDriverState *bs;
40b4f539 2792
61007b31
SH
2793 list = NULL;
2794 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2795 BlockDeviceInfo *info = bdrv_block_device_info(bs, errp);
2796 if (!info) {
2797 qapi_free_BlockDeviceInfoList(list);
2798 return NULL;
301db7c2 2799 }
61007b31
SH
2800 entry = g_malloc0(sizeof(*entry));
2801 entry->value = info;
2802 entry->next = list;
2803 list = entry;
301db7c2
RH
2804 }
2805
61007b31
SH
2806 return list;
2807}
40b4f539 2808
61007b31
SH
2809BlockDriverState *bdrv_lookup_bs(const char *device,
2810 const char *node_name,
2811 Error **errp)
2812{
2813 BlockBackend *blk;
2814 BlockDriverState *bs;
40b4f539 2815
61007b31
SH
2816 if (device) {
2817 blk = blk_by_name(device);
40b4f539 2818
61007b31 2819 if (blk) {
9f4ed6fb
AG
2820 bs = blk_bs(blk);
2821 if (!bs) {
5433c24f 2822 error_setg(errp, "Device '%s' has no medium", device);
5433c24f
HR
2823 }
2824
9f4ed6fb 2825 return bs;
61007b31
SH
2826 }
2827 }
40b4f539 2828
61007b31
SH
2829 if (node_name) {
2830 bs = bdrv_find_node(node_name);
6d519a5f 2831
61007b31
SH
2832 if (bs) {
2833 return bs;
2834 }
40b4f539
KW
2835 }
2836
61007b31
SH
2837 error_setg(errp, "Cannot find device=%s nor node_name=%s",
2838 device ? device : "",
2839 node_name ? node_name : "");
2840 return NULL;
40b4f539
KW
2841}
2842
61007b31
SH
2843/* If 'base' is in the same chain as 'top', return true. Otherwise,
2844 * return false. If either argument is NULL, return false. */
2845bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 2846{
61007b31 2847 while (top && top != base) {
760e0063 2848 top = backing_bs(top);
02c50efe 2849 }
61007b31
SH
2850
2851 return top != NULL;
02c50efe
FZ
2852}
2853
61007b31 2854BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 2855{
61007b31
SH
2856 if (!bs) {
2857 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 2858 }
61007b31 2859 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
2860}
2861
61007b31 2862BlockDriverState *bdrv_next(BlockDriverState *bs)
83f64091 2863{
61007b31
SH
2864 if (!bs) {
2865 return QTAILQ_FIRST(&bdrv_states);
857d4f46 2866 }
61007b31 2867 return QTAILQ_NEXT(bs, device_list);
83f64091 2868}
beac80cd 2869
61007b31 2870const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 2871{
61007b31 2872 return bs->node_name;
beac80cd
FB
2873}
2874
61007b31
SH
2875/* TODO check what callers really want: bs->node_name or blk_name() */
2876const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 2877{
61007b31 2878 return bs->blk ? blk_name(bs->blk) : "";
f141eafe 2879}
83f64091 2880
61007b31
SH
2881/* This can be used to identify nodes that might not have a device
2882 * name associated. Since node and device names live in the same
2883 * namespace, the result is unambiguous. The exception is if both are
2884 * absent, then this returns an empty (non-null) string. */
2885const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 2886{
61007b31 2887 return bs->blk ? blk_name(bs->blk) : bs->node_name;
beac80cd 2888}
beac80cd 2889
61007b31 2890int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 2891{
61007b31 2892 return bs->open_flags;
0b5a2445
PB
2893}
2894
61007b31 2895int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 2896{
61007b31 2897 return 1;
0b5a2445
PB
2898}
2899
61007b31 2900int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 2901{
61007b31 2902 assert(bs->drv);
0b5a2445 2903
61007b31
SH
2904 /* If BS is a copy on write image, it is initialized to
2905 the contents of the base image, which may not be zeroes. */
760e0063 2906 if (bs->backing) {
61007b31
SH
2907 return 0;
2908 }
2909 if (bs->drv->bdrv_has_zero_init) {
2910 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 2911 }
61007b31
SH
2912
2913 /* safe default */
2914 return 0;
68485420
KW
2915}
2916
61007b31 2917bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 2918{
61007b31 2919 BlockDriverInfo bdi;
b2a61371 2920
760e0063 2921 if (bs->backing) {
61007b31
SH
2922 return false;
2923 }
2924
2925 if (bdrv_get_info(bs, &bdi) == 0) {
2926 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
2927 }
2928
61007b31 2929 return false;
b2a61371
SH
2930}
2931
61007b31 2932bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 2933{
61007b31 2934 BlockDriverInfo bdi;
68485420 2935
760e0063 2936 if (bs->backing || !(bs->open_flags & BDRV_O_UNMAP)) {
61007b31
SH
2937 return false;
2938 }
68485420 2939
61007b31
SH
2940 if (bdrv_get_info(bs, &bdi) == 0) {
2941 return bdi.can_write_zeroes_with_unmap;
2942 }
68485420 2943
61007b31 2944 return false;
68485420
KW
2945}
2946
61007b31 2947const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 2948{
760e0063 2949 if (bs->backing && bs->backing->bs->encrypted)
61007b31
SH
2950 return bs->backing_file;
2951 else if (bs->encrypted)
2952 return bs->filename;
2953 else
2954 return NULL;
b2e12bc6
CH
2955}
2956
61007b31
SH
2957void bdrv_get_backing_filename(BlockDriverState *bs,
2958 char *filename, int filename_size)
016f5cf6 2959{
61007b31
SH
2960 pstrcpy(filename, filename_size, bs->backing_file);
2961}
d318aea9 2962
61007b31
SH
2963int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
2964{
2965 BlockDriver *drv = bs->drv;
2966 if (!drv)
2967 return -ENOMEDIUM;
2968 if (!drv->bdrv_get_info)
2969 return -ENOTSUP;
2970 memset(bdi, 0, sizeof(*bdi));
2971 return drv->bdrv_get_info(bs, bdi);
2972}
016f5cf6 2973
61007b31
SH
2974ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
2975{
2976 BlockDriver *drv = bs->drv;
2977 if (drv && drv->bdrv_get_specific_info) {
2978 return drv->bdrv_get_specific_info(bs);
2979 }
2980 return NULL;
016f5cf6
AG
2981}
2982
a31939e6 2983void bdrv_debug_event(BlockDriverState *bs, BlkdebugEvent event)
4265d620 2984{
61007b31
SH
2985 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
2986 return;
2987 }
4265d620 2988
61007b31 2989 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
2990}
2991
61007b31
SH
2992int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
2993 const char *tag)
4265d620 2994{
61007b31 2995 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 2996 bs = bs->file ? bs->file->bs : NULL;
61007b31 2997 }
4265d620 2998
61007b31
SH
2999 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
3000 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
3001 }
4265d620 3002
61007b31 3003 return -ENOTSUP;
4265d620
PB
3004}
3005
61007b31 3006int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 3007{
61007b31 3008 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 3009 bs = bs->file ? bs->file->bs : NULL;
61007b31 3010 }
ce1a14dc 3011
61007b31
SH
3012 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
3013 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
3014 }
3015
3016 return -ENOTSUP;
eb852011
MA
3017}
3018
61007b31 3019int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 3020{
61007b31 3021 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 3022 bs = bs->file ? bs->file->bs : NULL;
61007b31 3023 }
ce1a14dc 3024
61007b31
SH
3025 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
3026 return bs->drv->bdrv_debug_resume(bs, tag);
3027 }
ce1a14dc 3028
61007b31 3029 return -ENOTSUP;
f197fe2b
FZ
3030}
3031
61007b31 3032bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 3033{
61007b31 3034 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 3035 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 3036 }
19cb3738 3037
61007b31
SH
3038 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
3039 return bs->drv->bdrv_debug_is_suspended(bs, tag);
3040 }
f9f05dc5 3041
61007b31
SH
3042 return false;
3043}
f9f05dc5 3044
61007b31 3045int bdrv_is_snapshot(BlockDriverState *bs)
f9f05dc5 3046{
61007b31 3047 return !!(bs->open_flags & BDRV_O_SNAPSHOT);
f9f05dc5
KW
3048}
3049
61007b31
SH
3050/* backing_file can either be relative, or absolute, or a protocol. If it is
3051 * relative, it must be relative to the chain. So, passing in bs->filename
3052 * from a BDS as backing_file should not be done, as that may be relative to
3053 * the CWD rather than the chain. */
3054BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
3055 const char *backing_file)
f9f05dc5 3056{
61007b31
SH
3057 char *filename_full = NULL;
3058 char *backing_file_full = NULL;
3059 char *filename_tmp = NULL;
3060 int is_protocol = 0;
3061 BlockDriverState *curr_bs = NULL;
3062 BlockDriverState *retval = NULL;
f9f05dc5 3063
61007b31
SH
3064 if (!bs || !bs->drv || !backing_file) {
3065 return NULL;
f9f05dc5
KW
3066 }
3067
61007b31
SH
3068 filename_full = g_malloc(PATH_MAX);
3069 backing_file_full = g_malloc(PATH_MAX);
3070 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 3071
61007b31 3072 is_protocol = path_has_protocol(backing_file);
f9f05dc5 3073
760e0063 3074 for (curr_bs = bs; curr_bs->backing; curr_bs = curr_bs->backing->bs) {
f9f05dc5 3075
61007b31
SH
3076 /* If either of the filename paths is actually a protocol, then
3077 * compare unmodified paths; otherwise make paths relative */
3078 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
3079 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
760e0063 3080 retval = curr_bs->backing->bs;
61007b31
SH
3081 break;
3082 }
3083 } else {
3084 /* If not an absolute filename path, make it relative to the current
3085 * image's filename path */
3086 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3087 backing_file);
f9f05dc5 3088
61007b31
SH
3089 /* We are going to compare absolute pathnames */
3090 if (!realpath(filename_tmp, filename_full)) {
3091 continue;
3092 }
07f07615 3093
61007b31
SH
3094 /* We need to make sure the backing filename we are comparing against
3095 * is relative to the current image filename (or absolute) */
3096 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3097 curr_bs->backing_file);
07f07615 3098
61007b31
SH
3099 if (!realpath(filename_tmp, backing_file_full)) {
3100 continue;
3101 }
eb489bb1 3102
61007b31 3103 if (strcmp(backing_file_full, filename_full) == 0) {
760e0063 3104 retval = curr_bs->backing->bs;
61007b31
SH
3105 break;
3106 }
3107 }
eb489bb1
KW
3108 }
3109
61007b31
SH
3110 g_free(filename_full);
3111 g_free(backing_file_full);
3112 g_free(filename_tmp);
3113 return retval;
3114}
3115
3116int bdrv_get_backing_file_depth(BlockDriverState *bs)
3117{
3118 if (!bs->drv) {
3119 return 0;
eb489bb1
KW
3120 }
3121
760e0063 3122 if (!bs->backing) {
61007b31 3123 return 0;
ca716364
KW
3124 }
3125
760e0063 3126 return 1 + bdrv_get_backing_file_depth(bs->backing->bs);
61007b31 3127}
07f07615 3128
61007b31
SH
3129void bdrv_init(void)
3130{
3131 module_call_init(MODULE_INIT_BLOCK);
3132}
29cdb251 3133
61007b31
SH
3134void bdrv_init_with_whitelist(void)
3135{
3136 use_bdrv_whitelist = 1;
3137 bdrv_init();
07f07615
PB
3138}
3139
5a8a30db 3140void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 3141{
5a8a30db
KW
3142 Error *local_err = NULL;
3143 int ret;
3144
3456a8d1
KW
3145 if (!bs->drv) {
3146 return;
3147 }
3148
7ea2d269
AK
3149 if (!(bs->open_flags & BDRV_O_INCOMING)) {
3150 return;
3151 }
3152 bs->open_flags &= ~BDRV_O_INCOMING;
3153
3456a8d1 3154 if (bs->drv->bdrv_invalidate_cache) {
5a8a30db 3155 bs->drv->bdrv_invalidate_cache(bs, &local_err);
3456a8d1 3156 } else if (bs->file) {
9a4f4c31 3157 bdrv_invalidate_cache(bs->file->bs, &local_err);
5a8a30db
KW
3158 }
3159 if (local_err) {
3160 error_propagate(errp, local_err);
3161 return;
0f15423c 3162 }
3456a8d1 3163
5a8a30db
KW
3164 ret = refresh_total_sectors(bs, bs->total_sectors);
3165 if (ret < 0) {
3166 error_setg_errno(errp, -ret, "Could not refresh total sector count");
3167 return;
3168 }
0f15423c
AL
3169}
3170
5a8a30db 3171void bdrv_invalidate_cache_all(Error **errp)
0f15423c
AL
3172{
3173 BlockDriverState *bs;
5a8a30db 3174 Error *local_err = NULL;
0f15423c 3175
dc364f4c 3176 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
3177 AioContext *aio_context = bdrv_get_aio_context(bs);
3178
3179 aio_context_acquire(aio_context);
5a8a30db 3180 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 3181 aio_context_release(aio_context);
5a8a30db
KW
3182 if (local_err) {
3183 error_propagate(errp, local_err);
3184 return;
3185 }
0f15423c
AL
3186 }
3187}
3188
19cb3738
FB
3189/**************************************************************/
3190/* removable device support */
3191
3192/**
3193 * Return TRUE if the media is present
3194 */
e031f750 3195bool bdrv_is_inserted(BlockDriverState *bs)
19cb3738
FB
3196{
3197 BlockDriver *drv = bs->drv;
28d7a789 3198 BdrvChild *child;
a1aff5bf 3199
e031f750
HR
3200 if (!drv) {
3201 return false;
3202 }
28d7a789
HR
3203 if (drv->bdrv_is_inserted) {
3204 return drv->bdrv_is_inserted(bs);
3205 }
3206 QLIST_FOREACH(child, &bs->children, next) {
3207 if (!bdrv_is_inserted(child->bs)) {
3208 return false;
3209 }
e031f750 3210 }
28d7a789 3211 return true;
19cb3738
FB
3212}
3213
3214/**
8e49ca46
MA
3215 * Return whether the media changed since the last call to this
3216 * function, or -ENOTSUP if we don't know. Most drivers don't know.
19cb3738
FB
3217 */
3218int bdrv_media_changed(BlockDriverState *bs)
3219{
3220 BlockDriver *drv = bs->drv;
19cb3738 3221
8e49ca46
MA
3222 if (drv && drv->bdrv_media_changed) {
3223 return drv->bdrv_media_changed(bs);
3224 }
3225 return -ENOTSUP;
19cb3738
FB
3226}
3227
3228/**
3229 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
3230 */
f36f3949 3231void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
3232{
3233 BlockDriver *drv = bs->drv;
bfb197e0 3234 const char *device_name;
19cb3738 3235
822e1cd1
MA
3236 if (drv && drv->bdrv_eject) {
3237 drv->bdrv_eject(bs, eject_flag);
19cb3738 3238 }
6f382ed2 3239
bfb197e0
MA
3240 device_name = bdrv_get_device_name(bs);
3241 if (device_name[0] != '\0') {
3242 qapi_event_send_device_tray_moved(device_name,
a5ee7bd4 3243 eject_flag, &error_abort);
6f382ed2 3244 }
19cb3738
FB
3245}
3246
19cb3738
FB
3247/**
3248 * Lock or unlock the media (if it is locked, the user won't be able
3249 * to eject it manually).
3250 */
025e849a 3251void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
3252{
3253 BlockDriver *drv = bs->drv;
3254
025e849a 3255 trace_bdrv_lock_medium(bs, locked);
b8c6d095 3256
025e849a
MA
3257 if (drv && drv->bdrv_lock_medium) {
3258 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
3259 }
3260}
985a03b0 3261
0db6e54a
FZ
3262BdrvDirtyBitmap *bdrv_find_dirty_bitmap(BlockDriverState *bs, const char *name)
3263{
3264 BdrvDirtyBitmap *bm;
3265
3266 assert(name);
3267 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
3268 if (bm->name && !strcmp(name, bm->name)) {
3269 return bm;
3270 }
3271 }
3272 return NULL;
3273}
3274
20dca810 3275void bdrv_dirty_bitmap_make_anon(BdrvDirtyBitmap *bitmap)
0db6e54a 3276{
9bd2b08f 3277 assert(!bdrv_dirty_bitmap_frozen(bitmap));
0db6e54a
FZ
3278 g_free(bitmap->name);
3279 bitmap->name = NULL;
3280}
3281
3282BdrvDirtyBitmap *bdrv_create_dirty_bitmap(BlockDriverState *bs,
5fba6c0e 3283 uint32_t granularity,
0db6e54a 3284 const char *name,
b8afb520 3285 Error **errp)
7cd1e32a
LS
3286{
3287 int64_t bitmap_size;
e4654d2d 3288 BdrvDirtyBitmap *bitmap;
5fba6c0e 3289 uint32_t sector_granularity;
a55eb92c 3290
50717e94
PB
3291 assert((granularity & (granularity - 1)) == 0);
3292
0db6e54a
FZ
3293 if (name && bdrv_find_dirty_bitmap(bs, name)) {
3294 error_setg(errp, "Bitmap already exists: %s", name);
3295 return NULL;
3296 }
5fba6c0e
JS
3297 sector_granularity = granularity >> BDRV_SECTOR_BITS;
3298 assert(sector_granularity);
57322b78 3299 bitmap_size = bdrv_nb_sectors(bs);
b8afb520
FZ
3300 if (bitmap_size < 0) {
3301 error_setg_errno(errp, -bitmap_size, "could not get length of device");
3302 errno = -bitmap_size;
3303 return NULL;
3304 }
5839e53b 3305 bitmap = g_new0(BdrvDirtyBitmap, 1);
5fba6c0e 3306 bitmap->bitmap = hbitmap_alloc(bitmap_size, ctz32(sector_granularity));
e74e6b78 3307 bitmap->size = bitmap_size;
0db6e54a 3308 bitmap->name = g_strdup(name);
b8e6fb75 3309 bitmap->disabled = false;
e4654d2d
FZ
3310 QLIST_INSERT_HEAD(&bs->dirty_bitmaps, bitmap, list);
3311 return bitmap;
3312}
3313
9bd2b08f
JS
3314bool bdrv_dirty_bitmap_frozen(BdrvDirtyBitmap *bitmap)
3315{
3316 return bitmap->successor;
3317}
3318
b8e6fb75
JS
3319bool bdrv_dirty_bitmap_enabled(BdrvDirtyBitmap *bitmap)
3320{
9bd2b08f
JS
3321 return !(bitmap->disabled || bitmap->successor);
3322}
3323
9abe3bdc
JS
3324DirtyBitmapStatus bdrv_dirty_bitmap_status(BdrvDirtyBitmap *bitmap)
3325{
3326 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3327 return DIRTY_BITMAP_STATUS_FROZEN;
3328 } else if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3329 return DIRTY_BITMAP_STATUS_DISABLED;
3330 } else {
3331 return DIRTY_BITMAP_STATUS_ACTIVE;
3332 }
3333}
3334
9bd2b08f
JS
3335/**
3336 * Create a successor bitmap destined to replace this bitmap after an operation.
3337 * Requires that the bitmap is not frozen and has no successor.
3338 */
3339int bdrv_dirty_bitmap_create_successor(BlockDriverState *bs,
3340 BdrvDirtyBitmap *bitmap, Error **errp)
3341{
3342 uint64_t granularity;
3343 BdrvDirtyBitmap *child;
3344
3345 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3346 error_setg(errp, "Cannot create a successor for a bitmap that is "
3347 "currently frozen");
3348 return -1;
3349 }
3350 assert(!bitmap->successor);
3351
3352 /* Create an anonymous successor */
3353 granularity = bdrv_dirty_bitmap_granularity(bitmap);
3354 child = bdrv_create_dirty_bitmap(bs, granularity, NULL, errp);
3355 if (!child) {
3356 return -1;
3357 }
3358
3359 /* Successor will be on or off based on our current state. */
3360 child->disabled = bitmap->disabled;
3361
3362 /* Install the successor and freeze the parent */
3363 bitmap->successor = child;
3364 return 0;
3365}
3366
3367/**
3368 * For a bitmap with a successor, yield our name to the successor,
3369 * delete the old bitmap, and return a handle to the new bitmap.
3370 */
3371BdrvDirtyBitmap *bdrv_dirty_bitmap_abdicate(BlockDriverState *bs,
3372 BdrvDirtyBitmap *bitmap,
3373 Error **errp)
3374{
3375 char *name;
3376 BdrvDirtyBitmap *successor = bitmap->successor;
3377
3378 if (successor == NULL) {
3379 error_setg(errp, "Cannot relinquish control if "
3380 "there's no successor present");
3381 return NULL;
3382 }
3383
3384 name = bitmap->name;
3385 bitmap->name = NULL;
3386 successor->name = name;
3387 bitmap->successor = NULL;
3388 bdrv_release_dirty_bitmap(bs, bitmap);
3389
3390 return successor;
3391}
3392
3393/**
3394 * In cases of failure where we can no longer safely delete the parent,
3395 * we may wish to re-join the parent and child/successor.
3396 * The merged parent will be un-frozen, but not explicitly re-enabled.
3397 */
3398BdrvDirtyBitmap *bdrv_reclaim_dirty_bitmap(BlockDriverState *bs,
3399 BdrvDirtyBitmap *parent,
3400 Error **errp)
3401{
3402 BdrvDirtyBitmap *successor = parent->successor;
3403
3404 if (!successor) {
3405 error_setg(errp, "Cannot reclaim a successor when none is present");
3406 return NULL;
3407 }
3408
3409 if (!hbitmap_merge(parent->bitmap, successor->bitmap)) {
3410 error_setg(errp, "Merging of parent and successor bitmap failed");
3411 return NULL;
3412 }
3413 bdrv_release_dirty_bitmap(bs, successor);
3414 parent->successor = NULL;
3415
3416 return parent;
b8e6fb75
JS
3417}
3418
ce1ffea8
JS
3419/**
3420 * Truncates _all_ bitmaps attached to a BDS.
3421 */
3422static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs)
3423{
3424 BdrvDirtyBitmap *bitmap;
3425 uint64_t size = bdrv_nb_sectors(bs);
3426
3427 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
06207b0f 3428 assert(!bdrv_dirty_bitmap_frozen(bitmap));
ce1ffea8 3429 hbitmap_truncate(bitmap->bitmap, size);
5270b6a0 3430 bitmap->size = size;
ce1ffea8
JS
3431 }
3432}
3433
e4654d2d
FZ
3434void bdrv_release_dirty_bitmap(BlockDriverState *bs, BdrvDirtyBitmap *bitmap)
3435{
3436 BdrvDirtyBitmap *bm, *next;
3437 QLIST_FOREACH_SAFE(bm, &bs->dirty_bitmaps, list, next) {
3438 if (bm == bitmap) {
9bd2b08f 3439 assert(!bdrv_dirty_bitmap_frozen(bm));
e4654d2d
FZ
3440 QLIST_REMOVE(bitmap, list);
3441 hbitmap_free(bitmap->bitmap);
0db6e54a 3442 g_free(bitmap->name);
e4654d2d
FZ
3443 g_free(bitmap);
3444 return;
a55eb92c 3445 }
7cd1e32a
LS
3446 }
3447}
3448
b8e6fb75
JS
3449void bdrv_disable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3450{
9bd2b08f 3451 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3452 bitmap->disabled = true;
3453}
3454
3455void bdrv_enable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3456{
9bd2b08f 3457 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3458 bitmap->disabled = false;
3459}
3460
21b56835
FZ
3461BlockDirtyInfoList *bdrv_query_dirty_bitmaps(BlockDriverState *bs)
3462{
3463 BdrvDirtyBitmap *bm;
3464 BlockDirtyInfoList *list = NULL;
3465 BlockDirtyInfoList **plist = &list;
3466
3467 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
5839e53b
MA
3468 BlockDirtyInfo *info = g_new0(BlockDirtyInfo, 1);
3469 BlockDirtyInfoList *entry = g_new0(BlockDirtyInfoList, 1);
20dca810 3470 info->count = bdrv_get_dirty_count(bm);
592fdd02 3471 info->granularity = bdrv_dirty_bitmap_granularity(bm);
0db6e54a
FZ
3472 info->has_name = !!bm->name;
3473 info->name = g_strdup(bm->name);
9abe3bdc 3474 info->status = bdrv_dirty_bitmap_status(bm);
21b56835
FZ
3475 entry->value = info;
3476 *plist = entry;
3477 plist = &entry->next;
3478 }
3479
3480 return list;
3481}
3482
e4654d2d 3483int bdrv_get_dirty(BlockDriverState *bs, BdrvDirtyBitmap *bitmap, int64_t sector)
7cd1e32a 3484{
e4654d2d
FZ
3485 if (bitmap) {
3486 return hbitmap_get(bitmap->bitmap, sector);
7cd1e32a
LS
3487 } else {
3488 return 0;
3489 }
3490}
3491
341ebc2f
JS
3492/**
3493 * Chooses a default granularity based on the existing cluster size,
3494 * but clamped between [4K, 64K]. Defaults to 64K in the case that there
3495 * is no cluster size information available.
3496 */
3497uint32_t bdrv_get_default_bitmap_granularity(BlockDriverState *bs)
3498{
3499 BlockDriverInfo bdi;
3500 uint32_t granularity;
3501
3502 if (bdrv_get_info(bs, &bdi) >= 0 && bdi.cluster_size > 0) {
3503 granularity = MAX(4096, bdi.cluster_size);
3504 granularity = MIN(65536, granularity);
3505 } else {
3506 granularity = 65536;
3507 }
3508
3509 return granularity;
3510}
3511
592fdd02
JS
3512uint32_t bdrv_dirty_bitmap_granularity(BdrvDirtyBitmap *bitmap)
3513{
3514 return BDRV_SECTOR_SIZE << hbitmap_granularity(bitmap->bitmap);
3515}
3516
20dca810 3517void bdrv_dirty_iter_init(BdrvDirtyBitmap *bitmap, HBitmapIter *hbi)
1755da16 3518{
e4654d2d 3519 hbitmap_iter_init(hbi, bitmap->bitmap, 0);
1755da16
PB
3520}
3521
20dca810 3522void bdrv_set_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3523 int64_t cur_sector, int nr_sectors)
3524{
b8e6fb75 3525 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3526 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3527}
3528
20dca810 3529void bdrv_reset_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3530 int64_t cur_sector, int nr_sectors)
3531{
b8e6fb75 3532 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3533 hbitmap_reset(bitmap->bitmap, cur_sector, nr_sectors);
3534}
3535
df9a681d 3536void bdrv_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap, HBitmap **out)
e74e6b78
JS
3537{
3538 assert(bdrv_dirty_bitmap_enabled(bitmap));
df9a681d
FZ
3539 if (!out) {
3540 hbitmap_reset_all(bitmap->bitmap);
3541 } else {
3542 HBitmap *backup = bitmap->bitmap;
3543 bitmap->bitmap = hbitmap_alloc(bitmap->size,
3544 hbitmap_granularity(backup));
3545 *out = backup;
3546 }
3547}
3548
3549void bdrv_undo_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap, HBitmap *in)
3550{
3551 HBitmap *tmp = bitmap->bitmap;
3552 assert(bdrv_dirty_bitmap_enabled(bitmap));
3553 bitmap->bitmap = in;
3554 hbitmap_free(tmp);
e74e6b78
JS
3555}
3556
e0c47b6c
SH
3557void bdrv_set_dirty(BlockDriverState *bs, int64_t cur_sector,
3558 int nr_sectors)
1755da16 3559{
e4654d2d
FZ
3560 BdrvDirtyBitmap *bitmap;
3561 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
b8e6fb75
JS
3562 if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3563 continue;
3564 }
e4654d2d
FZ
3565 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3566 }
1755da16
PB
3567}
3568
d58d8453
JS
3569/**
3570 * Advance an HBitmapIter to an arbitrary offset.
3571 */
3572void bdrv_set_dirty_iter(HBitmapIter *hbi, int64_t offset)
3573{
3574 assert(hbi->hb);
3575 hbitmap_iter_init(hbi, hbi->hb, offset);
3576}
3577
20dca810 3578int64_t bdrv_get_dirty_count(BdrvDirtyBitmap *bitmap)
aaa0eb75 3579{
e4654d2d 3580 return hbitmap_count(bitmap->bitmap);
aaa0eb75 3581}
f88e1a42 3582
9fcb0251
FZ
3583/* Get a reference to bs */
3584void bdrv_ref(BlockDriverState *bs)
3585{
3586 bs->refcnt++;
3587}
3588
3589/* Release a previously grabbed reference to bs.
3590 * If after releasing, reference count is zero, the BlockDriverState is
3591 * deleted. */
3592void bdrv_unref(BlockDriverState *bs)
3593{
9a4d5ca6
JC
3594 if (!bs) {
3595 return;
3596 }
9fcb0251
FZ
3597 assert(bs->refcnt > 0);
3598 if (--bs->refcnt == 0) {
3599 bdrv_delete(bs);
3600 }
3601}
3602
fbe40ff7
FZ
3603struct BdrvOpBlocker {
3604 Error *reason;
3605 QLIST_ENTRY(BdrvOpBlocker) list;
3606};
3607
3608bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
3609{
3610 BdrvOpBlocker *blocker;
3611 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3612 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
3613 blocker = QLIST_FIRST(&bs->op_blockers[op]);
3614 if (errp) {
81e5f78a
AG
3615 error_setg(errp, "Node '%s' is busy: %s",
3616 bdrv_get_device_or_node_name(bs),
bfb197e0 3617 error_get_pretty(blocker->reason));
fbe40ff7
FZ
3618 }
3619 return true;
3620 }
3621 return false;
3622}
3623
3624void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
3625{
3626 BdrvOpBlocker *blocker;
3627 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3628
5839e53b 3629 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
3630 blocker->reason = reason;
3631 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
3632}
3633
3634void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
3635{
3636 BdrvOpBlocker *blocker, *next;
3637 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3638 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
3639 if (blocker->reason == reason) {
3640 QLIST_REMOVE(blocker, list);
3641 g_free(blocker);
3642 }
3643 }
3644}
3645
3646void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
3647{
3648 int i;
3649 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3650 bdrv_op_block(bs, i, reason);
3651 }
3652}
3653
3654void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
3655{
3656 int i;
3657 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3658 bdrv_op_unblock(bs, i, reason);
3659 }
3660}
3661
3662bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
3663{
3664 int i;
3665
3666 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3667 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
3668 return false;
3669 }
3670 }
3671 return true;
3672}
3673
d92ada22
LC
3674void bdrv_img_create(const char *filename, const char *fmt,
3675 const char *base_filename, const char *base_fmt,
f382d43a
MR
3676 char *options, uint64_t img_size, int flags,
3677 Error **errp, bool quiet)
f88e1a42 3678{
83d0521a
CL
3679 QemuOptsList *create_opts = NULL;
3680 QemuOpts *opts = NULL;
3681 const char *backing_fmt, *backing_file;
3682 int64_t size;
f88e1a42 3683 BlockDriver *drv, *proto_drv;
cc84d90f 3684 Error *local_err = NULL;
f88e1a42
JS
3685 int ret = 0;
3686
3687 /* Find driver and parse its options */
3688 drv = bdrv_find_format(fmt);
3689 if (!drv) {
71c79813 3690 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 3691 return;
f88e1a42
JS
3692 }
3693
b65a5e12 3694 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 3695 if (!proto_drv) {
d92ada22 3696 return;
f88e1a42
JS
3697 }
3698
c6149724
HR
3699 if (!drv->create_opts) {
3700 error_setg(errp, "Format driver '%s' does not support image creation",
3701 drv->format_name);
3702 return;
3703 }
3704
3705 if (!proto_drv->create_opts) {
3706 error_setg(errp, "Protocol driver '%s' does not support image creation",
3707 proto_drv->format_name);
3708 return;
3709 }
3710
c282e1fd
CL
3711 create_opts = qemu_opts_append(create_opts, drv->create_opts);
3712 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
3713
3714 /* Create parameter list with default values */
83d0521a 3715 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 3716 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
3717
3718 /* Parse -o options */
3719 if (options) {
dc523cd3
MA
3720 qemu_opts_do_parse(opts, options, NULL, &local_err);
3721 if (local_err) {
3722 error_report_err(local_err);
3723 local_err = NULL;
83d0521a 3724 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
3725 goto out;
3726 }
3727 }
3728
3729 if (base_filename) {
f43e47db 3730 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 3731 if (local_err) {
71c79813
LC
3732 error_setg(errp, "Backing file not supported for file format '%s'",
3733 fmt);
f88e1a42
JS
3734 goto out;
3735 }
3736 }
3737
3738 if (base_fmt) {
f43e47db 3739 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 3740 if (local_err) {
71c79813
LC
3741 error_setg(errp, "Backing file format not supported for file "
3742 "format '%s'", fmt);
f88e1a42
JS
3743 goto out;
3744 }
3745 }
3746
83d0521a
CL
3747 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
3748 if (backing_file) {
3749 if (!strcmp(filename, backing_file)) {
71c79813
LC
3750 error_setg(errp, "Error: Trying to create an image with the "
3751 "same filename as the backing file");
792da93a
JS
3752 goto out;
3753 }
3754 }
3755
83d0521a 3756 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42
JS
3757
3758 // The size for the image must always be specified, with one exception:
3759 // If we are using a backing file, we can obtain the size from there
83d0521a
CL
3760 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
3761 if (size == -1) {
3762 if (backing_file) {
66f6b814 3763 BlockDriverState *bs;
29168018 3764 char *full_backing = g_new0(char, PATH_MAX);
52bf1e72 3765 int64_t size;
63090dac 3766 int back_flags;
e6641719 3767 QDict *backing_options = NULL;
63090dac 3768
29168018
HR
3769 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
3770 full_backing, PATH_MAX,
3771 &local_err);
3772 if (local_err) {
3773 g_free(full_backing);
3774 goto out;
3775 }
3776
63090dac
PB
3777 /* backing files always opened read-only */
3778 back_flags =
3779 flags & ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 3780
e6641719
HR
3781 if (backing_fmt) {
3782 backing_options = qdict_new();
3783 qdict_put(backing_options, "driver",
3784 qstring_from_str(backing_fmt));
3785 }
3786
f67503e5 3787 bs = NULL;
e6641719 3788 ret = bdrv_open(&bs, full_backing, NULL, backing_options,
6ebf9aa2 3789 back_flags, &local_err);
29168018 3790 g_free(full_backing);
f88e1a42 3791 if (ret < 0) {
f88e1a42
JS
3792 goto out;
3793 }
52bf1e72
MA
3794 size = bdrv_getlength(bs);
3795 if (size < 0) {
3796 error_setg_errno(errp, -size, "Could not get size of '%s'",
3797 backing_file);
3798 bdrv_unref(bs);
3799 goto out;
3800 }
f88e1a42 3801
39101f25 3802 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
66f6b814
HR
3803
3804 bdrv_unref(bs);
f88e1a42 3805 } else {
71c79813 3806 error_setg(errp, "Image creation needs a size parameter");
f88e1a42
JS
3807 goto out;
3808 }
3809 }
3810
f382d43a 3811 if (!quiet) {
fe646693 3812 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 3813 qemu_opts_print(opts, " ");
f382d43a
MR
3814 puts("");
3815 }
83d0521a 3816
c282e1fd 3817 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 3818
cc84d90f
HR
3819 if (ret == -EFBIG) {
3820 /* This is generally a better message than whatever the driver would
3821 * deliver (especially because of the cluster_size_hint), since that
3822 * is most probably not much different from "image too large". */
3823 const char *cluster_size_hint = "";
83d0521a 3824 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 3825 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 3826 }
cc84d90f
HR
3827 error_setg(errp, "The image size is too large for file format '%s'"
3828 "%s", fmt, cluster_size_hint);
3829 error_free(local_err);
3830 local_err = NULL;
f88e1a42
JS
3831 }
3832
3833out:
83d0521a
CL
3834 qemu_opts_del(opts);
3835 qemu_opts_free(create_opts);
84d18f06 3836 if (local_err) {
cc84d90f
HR
3837 error_propagate(errp, local_err);
3838 }
f88e1a42 3839}
85d126f3
SH
3840
3841AioContext *bdrv_get_aio_context(BlockDriverState *bs)
3842{
dcd04228
SH
3843 return bs->aio_context;
3844}
3845
3846void bdrv_detach_aio_context(BlockDriverState *bs)
3847{
33384421
HR
3848 BdrvAioNotifier *baf;
3849
dcd04228
SH
3850 if (!bs->drv) {
3851 return;
3852 }
3853
33384421
HR
3854 QLIST_FOREACH(baf, &bs->aio_notifiers, list) {
3855 baf->detach_aio_context(baf->opaque);
3856 }
3857
a0d64a61 3858 if (bs->throttle_state) {
0e5b0a2d 3859 throttle_timers_detach_aio_context(&bs->throttle_timers);
13af91eb 3860 }
dcd04228
SH
3861 if (bs->drv->bdrv_detach_aio_context) {
3862 bs->drv->bdrv_detach_aio_context(bs);
3863 }
3864 if (bs->file) {
9a4f4c31 3865 bdrv_detach_aio_context(bs->file->bs);
dcd04228 3866 }
760e0063
KW
3867 if (bs->backing) {
3868 bdrv_detach_aio_context(bs->backing->bs);
dcd04228
SH
3869 }
3870
3871 bs->aio_context = NULL;
3872}
3873
3874void bdrv_attach_aio_context(BlockDriverState *bs,
3875 AioContext *new_context)
3876{
33384421
HR
3877 BdrvAioNotifier *ban;
3878
dcd04228
SH
3879 if (!bs->drv) {
3880 return;
3881 }
3882
3883 bs->aio_context = new_context;
3884
760e0063
KW
3885 if (bs->backing) {
3886 bdrv_attach_aio_context(bs->backing->bs, new_context);
dcd04228
SH
3887 }
3888 if (bs->file) {
9a4f4c31 3889 bdrv_attach_aio_context(bs->file->bs, new_context);
dcd04228
SH
3890 }
3891 if (bs->drv->bdrv_attach_aio_context) {
3892 bs->drv->bdrv_attach_aio_context(bs, new_context);
3893 }
a0d64a61 3894 if (bs->throttle_state) {
0e5b0a2d 3895 throttle_timers_attach_aio_context(&bs->throttle_timers, new_context);
13af91eb 3896 }
33384421
HR
3897
3898 QLIST_FOREACH(ban, &bs->aio_notifiers, list) {
3899 ban->attached_aio_context(new_context, ban->opaque);
3900 }
dcd04228
SH
3901}
3902
3903void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
3904{
53ec73e2 3905 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228
SH
3906
3907 bdrv_detach_aio_context(bs);
3908
3909 /* This function executes in the old AioContext so acquire the new one in
3910 * case it runs in a different thread.
3911 */
3912 aio_context_acquire(new_context);
3913 bdrv_attach_aio_context(bs, new_context);
3914 aio_context_release(new_context);
85d126f3 3915}
d616b224 3916
33384421
HR
3917void bdrv_add_aio_context_notifier(BlockDriverState *bs,
3918 void (*attached_aio_context)(AioContext *new_context, void *opaque),
3919 void (*detach_aio_context)(void *opaque), void *opaque)
3920{
3921 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
3922 *ban = (BdrvAioNotifier){
3923 .attached_aio_context = attached_aio_context,
3924 .detach_aio_context = detach_aio_context,
3925 .opaque = opaque
3926 };
3927
3928 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
3929}
3930
3931void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
3932 void (*attached_aio_context)(AioContext *,
3933 void *),
3934 void (*detach_aio_context)(void *),
3935 void *opaque)
3936{
3937 BdrvAioNotifier *ban, *ban_next;
3938
3939 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
3940 if (ban->attached_aio_context == attached_aio_context &&
3941 ban->detach_aio_context == detach_aio_context &&
3942 ban->opaque == opaque)
3943 {
3944 QLIST_REMOVE(ban, list);
3945 g_free(ban);
3946
3947 return;
3948 }
3949 }
3950
3951 abort();
3952}
3953
77485434
HR
3954int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
3955 BlockDriverAmendStatusCB *status_cb)
6f176b48 3956{
c282e1fd 3957 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
3958 return -ENOTSUP;
3959 }
77485434 3960 return bs->drv->bdrv_amend_options(bs, opts, status_cb);
6f176b48 3961}
f6186f49 3962
b5042a36
BC
3963/* This function will be called by the bdrv_recurse_is_first_non_filter method
3964 * of block filter and by bdrv_is_first_non_filter.
3965 * It is used to test if the given bs is the candidate or recurse more in the
3966 * node graph.
212a5a8f 3967 */
b5042a36 3968bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 3969 BlockDriverState *candidate)
f6186f49 3970{
b5042a36
BC
3971 /* return false if basic checks fails */
3972 if (!bs || !bs->drv) {
212a5a8f 3973 return false;
f6186f49
BC
3974 }
3975
b5042a36
BC
3976 /* the code reached a non block filter driver -> check if the bs is
3977 * the same as the candidate. It's the recursion termination condition.
3978 */
3979 if (!bs->drv->is_filter) {
3980 return bs == candidate;
212a5a8f 3981 }
b5042a36 3982 /* Down this path the driver is a block filter driver */
212a5a8f 3983
b5042a36
BC
3984 /* If the block filter recursion method is defined use it to recurse down
3985 * the node graph.
3986 */
3987 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 3988 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
3989 }
3990
b5042a36
BC
3991 /* the driver is a block filter but don't allow to recurse -> return false
3992 */
3993 return false;
f6186f49
BC
3994}
3995
212a5a8f
BC
3996/* This function checks if the candidate is the first non filter bs down it's
3997 * bs chain. Since we don't have pointers to parents it explore all bs chains
3998 * from the top. Some filters can choose not to pass down the recursion.
3999 */
4000bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 4001{
212a5a8f
BC
4002 BlockDriverState *bs;
4003
4004 /* walk down the bs forest recursively */
4005 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
4006 bool perm;
4007
b5042a36 4008 /* try to recurse in this top level bs */
e6dc8a1f 4009 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
4010
4011 /* candidate is the first non filter */
4012 if (perm) {
4013 return true;
4014 }
4015 }
4016
4017 return false;
f6186f49 4018}
09158f00 4019
e12f3784
WC
4020BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
4021 const char *node_name, Error **errp)
09158f00
BC
4022{
4023 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
4024 AioContext *aio_context;
4025
09158f00
BC
4026 if (!to_replace_bs) {
4027 error_setg(errp, "Node name '%s' not found", node_name);
4028 return NULL;
4029 }
4030
5a7e7a0b
SH
4031 aio_context = bdrv_get_aio_context(to_replace_bs);
4032 aio_context_acquire(aio_context);
4033
09158f00 4034 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
4035 to_replace_bs = NULL;
4036 goto out;
09158f00
BC
4037 }
4038
4039 /* We don't want arbitrary node of the BDS chain to be replaced only the top
4040 * most non filter in order to prevent data corruption.
4041 * Another benefit is that this tests exclude backing files which are
4042 * blocked by the backing blockers.
4043 */
e12f3784 4044 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 4045 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
4046 to_replace_bs = NULL;
4047 goto out;
09158f00
BC
4048 }
4049
5a7e7a0b
SH
4050out:
4051 aio_context_release(aio_context);
09158f00
BC
4052 return to_replace_bs;
4053}
448ad91d 4054
91af7014
HR
4055static bool append_open_options(QDict *d, BlockDriverState *bs)
4056{
4057 const QDictEntry *entry;
9e700c1a 4058 QemuOptDesc *desc;
260fecf1 4059 BdrvChild *child;
91af7014 4060 bool found_any = false;
260fecf1 4061 const char *p;
91af7014
HR
4062
4063 for (entry = qdict_first(bs->options); entry;
4064 entry = qdict_next(bs->options, entry))
4065 {
260fecf1
KW
4066 /* Exclude options for children */
4067 QLIST_FOREACH(child, &bs->children, next) {
4068 if (strstart(qdict_entry_key(entry), child->name, &p)
4069 && (!*p || *p == '.'))
4070 {
4071 break;
4072 }
4073 }
4074 if (child) {
9e700c1a 4075 continue;
91af7014 4076 }
9e700c1a
KW
4077
4078 /* And exclude all non-driver-specific options */
4079 for (desc = bdrv_runtime_opts.desc; desc->name; desc++) {
4080 if (!strcmp(qdict_entry_key(entry), desc->name)) {
4081 break;
4082 }
4083 }
4084 if (desc->name) {
4085 continue;
4086 }
4087
4088 qobject_incref(qdict_entry_value(entry));
4089 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
4090 found_any = true;
91af7014
HR
4091 }
4092
4093 return found_any;
4094}
4095
4096/* Updates the following BDS fields:
4097 * - exact_filename: A filename which may be used for opening a block device
4098 * which (mostly) equals the given BDS (even without any
4099 * other options; so reading and writing must return the same
4100 * results, but caching etc. may be different)
4101 * - full_open_options: Options which, when given when opening a block device
4102 * (without a filename), result in a BDS (mostly)
4103 * equalling the given one
4104 * - filename: If exact_filename is set, it is copied here. Otherwise,
4105 * full_open_options is converted to a JSON object, prefixed with
4106 * "json:" (for use through the JSON pseudo protocol) and put here.
4107 */
4108void bdrv_refresh_filename(BlockDriverState *bs)
4109{
4110 BlockDriver *drv = bs->drv;
4111 QDict *opts;
4112
4113 if (!drv) {
4114 return;
4115 }
4116
4117 /* This BDS's file name will most probably depend on its file's name, so
4118 * refresh that first */
4119 if (bs->file) {
9a4f4c31 4120 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
4121 }
4122
4123 if (drv->bdrv_refresh_filename) {
4124 /* Obsolete information is of no use here, so drop the old file name
4125 * information before refreshing it */
4126 bs->exact_filename[0] = '\0';
4127 if (bs->full_open_options) {
4128 QDECREF(bs->full_open_options);
4129 bs->full_open_options = NULL;
4130 }
4131
4cdd01d3
KW
4132 opts = qdict_new();
4133 append_open_options(opts, bs);
4134 drv->bdrv_refresh_filename(bs, opts);
4135 QDECREF(opts);
91af7014
HR
4136 } else if (bs->file) {
4137 /* Try to reconstruct valid information from the underlying file */
4138 bool has_open_options;
4139
4140 bs->exact_filename[0] = '\0';
4141 if (bs->full_open_options) {
4142 QDECREF(bs->full_open_options);
4143 bs->full_open_options = NULL;
4144 }
4145
4146 opts = qdict_new();
4147 has_open_options = append_open_options(opts, bs);
4148
4149 /* If no specific options have been given for this BDS, the filename of
4150 * the underlying file should suffice for this one as well */
9a4f4c31
KW
4151 if (bs->file->bs->exact_filename[0] && !has_open_options) {
4152 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
4153 }
4154 /* Reconstructing the full options QDict is simple for most format block
4155 * drivers, as long as the full options are known for the underlying
4156 * file BDS. The full options QDict of that file BDS should somehow
4157 * contain a representation of the filename, therefore the following
4158 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 4159 if (bs->file->bs->full_open_options) {
91af7014
HR
4160 qdict_put_obj(opts, "driver",
4161 QOBJECT(qstring_from_str(drv->format_name)));
9a4f4c31
KW
4162 QINCREF(bs->file->bs->full_open_options);
4163 qdict_put_obj(opts, "file",
4164 QOBJECT(bs->file->bs->full_open_options));
91af7014
HR
4165
4166 bs->full_open_options = opts;
4167 } else {
4168 QDECREF(opts);
4169 }
4170 } else if (!bs->full_open_options && qdict_size(bs->options)) {
4171 /* There is no underlying file BDS (at least referenced by BDS.file),
4172 * so the full options QDict should be equal to the options given
4173 * specifically for this block device when it was opened (plus the
4174 * driver specification).
4175 * Because those options don't change, there is no need to update
4176 * full_open_options when it's already set. */
4177
4178 opts = qdict_new();
4179 append_open_options(opts, bs);
4180 qdict_put_obj(opts, "driver",
4181 QOBJECT(qstring_from_str(drv->format_name)));
4182
4183 if (bs->exact_filename[0]) {
4184 /* This may not work for all block protocol drivers (some may
4185 * require this filename to be parsed), but we have to find some
4186 * default solution here, so just include it. If some block driver
4187 * does not support pure options without any filename at all or
4188 * needs some special format of the options QDict, it needs to
4189 * implement the driver-specific bdrv_refresh_filename() function.
4190 */
4191 qdict_put_obj(opts, "filename",
4192 QOBJECT(qstring_from_str(bs->exact_filename)));
4193 }
4194
4195 bs->full_open_options = opts;
4196 }
4197
4198 if (bs->exact_filename[0]) {
4199 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4200 } else if (bs->full_open_options) {
4201 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4202 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4203 qstring_get_str(json));
4204 QDECREF(json);
4205 }
4206}