]> git.proxmox.com Git - mirror_qemu.git/blame - block.c
util: aio-posix: fix a typo
[mirror_qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
e688df6b 24
d38ea87a 25#include "qemu/osdep.h"
0ab8ed18 26#include "block/trace.h"
737e150e
PB
27#include "block/block_int.h"
28#include "block/blockjob.h"
cd7fca95 29#include "block/nbd.h"
609f45ea 30#include "block/qdict.h"
d49b6836 31#include "qemu/error-report.h"
88d88798 32#include "module_block.h"
1de7afc9 33#include "qemu/module.h"
e688df6b 34#include "qapi/error.h"
452fcdbc 35#include "qapi/qmp/qdict.h"
7b1b5d19 36#include "qapi/qmp/qjson.h"
e59a0cf1 37#include "qapi/qmp/qnull.h"
fc81fa1e 38#include "qapi/qmp/qstring.h"
e1d74bc6
KW
39#include "qapi/qobject-output-visitor.h"
40#include "qapi/qapi-visit-block-core.h"
bfb197e0 41#include "sysemu/block-backend.h"
9c17d615 42#include "sysemu/sysemu.h"
1de7afc9 43#include "qemu/notify.h"
922a01a0 44#include "qemu/option.h"
10817bf0 45#include "qemu/coroutine.h"
c13163fb 46#include "block/qapi.h"
1de7afc9 47#include "qemu/timer.h"
f348b6d1
VB
48#include "qemu/cutils.h"
49#include "qemu/id.h"
fc01f7e7 50
71e72a19 51#ifdef CONFIG_BSD
7674e7bf 52#include <sys/ioctl.h>
72cf2d4f 53#include <sys/queue.h>
c5e97233 54#ifndef __DragonFly__
7674e7bf
FB
55#include <sys/disk.h>
56#endif
c5e97233 57#endif
7674e7bf 58
49dc768d
AL
59#ifdef _WIN32
60#include <windows.h>
61#endif
62
1c9805a3
SH
63#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
64
dc364f4c
BC
65static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
66 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
67
2c1d04e0
HR
68static QTAILQ_HEAD(, BlockDriverState) all_bdrv_states =
69 QTAILQ_HEAD_INITIALIZER(all_bdrv_states);
70
8a22f02a
SH
71static QLIST_HEAD(, BlockDriver) bdrv_drivers =
72 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 73
5b363937
HR
74static BlockDriverState *bdrv_open_inherit(const char *filename,
75 const char *reference,
76 QDict *options, int flags,
77 BlockDriverState *parent,
78 const BdrvChildRole *child_role,
79 Error **errp);
f3930ed0 80
eb852011
MA
81/* If non-zero, use only whitelisted block drivers */
82static int use_bdrv_whitelist;
83
9e0b22f4
SH
84#ifdef _WIN32
85static int is_windows_drive_prefix(const char *filename)
86{
87 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
88 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
89 filename[1] == ':');
90}
91
92int is_windows_drive(const char *filename)
93{
94 if (is_windows_drive_prefix(filename) &&
95 filename[2] == '\0')
96 return 1;
97 if (strstart(filename, "\\\\.\\", NULL) ||
98 strstart(filename, "//./", NULL))
99 return 1;
100 return 0;
101}
102#endif
103
339064d5
KW
104size_t bdrv_opt_mem_align(BlockDriverState *bs)
105{
106 if (!bs || !bs->drv) {
459b4e66
DL
107 /* page size or 4k (hdd sector size) should be on the safe side */
108 return MAX(4096, getpagesize());
339064d5
KW
109 }
110
111 return bs->bl.opt_mem_alignment;
112}
113
4196d2f0
DL
114size_t bdrv_min_mem_align(BlockDriverState *bs)
115{
116 if (!bs || !bs->drv) {
459b4e66
DL
117 /* page size or 4k (hdd sector size) should be on the safe side */
118 return MAX(4096, getpagesize());
4196d2f0
DL
119 }
120
121 return bs->bl.min_mem_alignment;
122}
123
9e0b22f4 124/* check if the path starts with "<protocol>:" */
5c98415b 125int path_has_protocol(const char *path)
9e0b22f4 126{
947995c0
PB
127 const char *p;
128
9e0b22f4
SH
129#ifdef _WIN32
130 if (is_windows_drive(path) ||
131 is_windows_drive_prefix(path)) {
132 return 0;
133 }
947995c0
PB
134 p = path + strcspn(path, ":/\\");
135#else
136 p = path + strcspn(path, ":/");
9e0b22f4
SH
137#endif
138
947995c0 139 return *p == ':';
9e0b22f4
SH
140}
141
83f64091 142int path_is_absolute(const char *path)
3b0d4f61 143{
21664424
FB
144#ifdef _WIN32
145 /* specific case for names like: "\\.\d:" */
f53f4da9 146 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 147 return 1;
f53f4da9
PB
148 }
149 return (*path == '/' || *path == '\\');
3b9f94e1 150#else
f53f4da9 151 return (*path == '/');
3b9f94e1 152#endif
3b0d4f61
FB
153}
154
83f64091
FB
155/* if filename is absolute, just copy it to dest. Otherwise, build a
156 path to it by considering it is relative to base_path. URL are
157 supported. */
158void path_combine(char *dest, int dest_size,
159 const char *base_path,
160 const char *filename)
3b0d4f61 161{
83f64091
FB
162 const char *p, *p1;
163 int len;
164
165 if (dest_size <= 0)
166 return;
167 if (path_is_absolute(filename)) {
168 pstrcpy(dest, dest_size, filename);
169 } else {
0d54a6fe
HR
170 const char *protocol_stripped = NULL;
171
172 if (path_has_protocol(base_path)) {
173 protocol_stripped = strchr(base_path, ':');
174 if (protocol_stripped) {
175 protocol_stripped++;
176 }
177 }
178 p = protocol_stripped ?: base_path;
179
3b9f94e1
FB
180 p1 = strrchr(base_path, '/');
181#ifdef _WIN32
182 {
183 const char *p2;
184 p2 = strrchr(base_path, '\\');
185 if (!p1 || p2 > p1)
186 p1 = p2;
187 }
188#endif
83f64091
FB
189 if (p1)
190 p1++;
191 else
192 p1 = base_path;
193 if (p1 > p)
194 p = p1;
195 len = p - base_path;
196 if (len > dest_size - 1)
197 len = dest_size - 1;
198 memcpy(dest, base_path, len);
199 dest[len] = '\0';
200 pstrcat(dest, dest_size, filename);
3b0d4f61 201 }
3b0d4f61
FB
202}
203
03c320d8
HR
204/*
205 * Helper function for bdrv_parse_filename() implementations to remove optional
206 * protocol prefixes (especially "file:") from a filename and for putting the
207 * stripped filename into the options QDict if there is such a prefix.
208 */
209void bdrv_parse_filename_strip_prefix(const char *filename, const char *prefix,
210 QDict *options)
211{
212 if (strstart(filename, prefix, &filename)) {
213 /* Stripping the explicit protocol prefix may result in a protocol
214 * prefix being (wrongly) detected (if the filename contains a colon) */
215 if (path_has_protocol(filename)) {
216 QString *fat_filename;
217
218 /* This means there is some colon before the first slash; therefore,
219 * this cannot be an absolute path */
220 assert(!path_is_absolute(filename));
221
222 /* And we can thus fix the protocol detection issue by prefixing it
223 * by "./" */
224 fat_filename = qstring_from_str("./");
225 qstring_append(fat_filename, filename);
226
227 assert(!path_has_protocol(qstring_get_str(fat_filename)));
228
229 qdict_put(options, "filename", fat_filename);
230 } else {
231 /* If no protocol prefix was detected, we can use the shortened
232 * filename as-is */
233 qdict_put_str(options, "filename", filename);
234 }
235 }
236}
237
238
9c5e6594
KW
239/* Returns whether the image file is opened as read-only. Note that this can
240 * return false and writing to the image file is still not possible because the
241 * image is inactivated. */
93ed524e
JC
242bool bdrv_is_read_only(BlockDriverState *bs)
243{
244 return bs->read_only;
245}
246
54a32bfe
KW
247int bdrv_can_set_read_only(BlockDriverState *bs, bool read_only,
248 bool ignore_allow_rdw, Error **errp)
fe5241bf 249{
e2b8247a
JC
250 /* Do not set read_only if copy_on_read is enabled */
251 if (bs->copy_on_read && read_only) {
252 error_setg(errp, "Can't set node '%s' to r/o with copy-on-read enabled",
253 bdrv_get_device_or_node_name(bs));
254 return -EINVAL;
255 }
256
d6fcdf06 257 /* Do not clear read_only if it is prohibited */
54a32bfe
KW
258 if (!read_only && !(bs->open_flags & BDRV_O_ALLOW_RDWR) &&
259 !ignore_allow_rdw)
260 {
d6fcdf06
JC
261 error_setg(errp, "Node '%s' is read only",
262 bdrv_get_device_or_node_name(bs));
263 return -EPERM;
264 }
265
45803a03
JC
266 return 0;
267}
268
398e6ad0
KW
269/* TODO Remove (deprecated since 2.11)
270 * Block drivers are not supposed to automatically change bs->read_only.
271 * Instead, they should just check whether they can provide what the user
272 * explicitly requested and error out if read-write is requested, but they can
273 * only provide read-only access. */
45803a03
JC
274int bdrv_set_read_only(BlockDriverState *bs, bool read_only, Error **errp)
275{
276 int ret = 0;
277
54a32bfe 278 ret = bdrv_can_set_read_only(bs, read_only, false, errp);
45803a03
JC
279 if (ret < 0) {
280 return ret;
281 }
282
fe5241bf 283 bs->read_only = read_only;
e2b8247a 284 return 0;
fe5241bf
JC
285}
286
0a82855a
HR
287void bdrv_get_full_backing_filename_from_filename(const char *backed,
288 const char *backing,
9f07429e
HR
289 char *dest, size_t sz,
290 Error **errp)
dc5a1371 291{
9f07429e
HR
292 if (backing[0] == '\0' || path_has_protocol(backing) ||
293 path_is_absolute(backing))
294 {
0a82855a 295 pstrcpy(dest, sz, backing);
9f07429e
HR
296 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
297 error_setg(errp, "Cannot use relative backing file names for '%s'",
298 backed);
dc5a1371 299 } else {
0a82855a 300 path_combine(dest, sz, backed, backing);
dc5a1371
PB
301 }
302}
303
9f07429e
HR
304void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
305 Error **errp)
0a82855a 306{
9f07429e
HR
307 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
308
309 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
310 dest, sz, errp);
0a82855a
HR
311}
312
0eb7217e
SH
313void bdrv_register(BlockDriver *bdrv)
314{
8a22f02a 315 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 316}
b338082b 317
e4e9986b
MA
318BlockDriverState *bdrv_new(void)
319{
320 BlockDriverState *bs;
321 int i;
322
5839e53b 323 bs = g_new0(BlockDriverState, 1);
e4654d2d 324 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
325 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
326 QLIST_INIT(&bs->op_blockers[i]);
327 }
d616b224 328 notifier_with_return_list_init(&bs->before_write_notifiers);
3783fa3d 329 qemu_co_mutex_init(&bs->reqs_lock);
2119882c 330 qemu_mutex_init(&bs->dirty_bitmap_mutex);
9fcb0251 331 bs->refcnt = 1;
dcd04228 332 bs->aio_context = qemu_get_aio_context();
d7d512f6 333
3ff2f67a
EY
334 qemu_co_queue_init(&bs->flush_queue);
335
0f12264e
KW
336 for (i = 0; i < bdrv_drain_all_count; i++) {
337 bdrv_drained_begin(bs);
338 }
339
2c1d04e0
HR
340 QTAILQ_INSERT_TAIL(&all_bdrv_states, bs, bs_list);
341
b338082b
FB
342 return bs;
343}
344
88d88798 345static BlockDriver *bdrv_do_find_format(const char *format_name)
ea2384d3
FB
346{
347 BlockDriver *drv1;
88d88798 348
8a22f02a
SH
349 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
350 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 351 return drv1;
8a22f02a 352 }
ea2384d3 353 }
88d88798 354
ea2384d3
FB
355 return NULL;
356}
357
88d88798
MM
358BlockDriver *bdrv_find_format(const char *format_name)
359{
360 BlockDriver *drv1;
361 int i;
362
363 drv1 = bdrv_do_find_format(format_name);
364 if (drv1) {
365 return drv1;
366 }
367
368 /* The driver isn't registered, maybe we need to load a module */
369 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); ++i) {
370 if (!strcmp(block_driver_modules[i].format_name, format_name)) {
371 block_module_load_one(block_driver_modules[i].library_name);
372 break;
373 }
374 }
375
376 return bdrv_do_find_format(format_name);
377}
378
e8eb8637 379int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 380{
b64ec4e4
FZ
381 static const char *whitelist_rw[] = {
382 CONFIG_BDRV_RW_WHITELIST
383 };
384 static const char *whitelist_ro[] = {
385 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
386 };
387 const char **p;
388
b64ec4e4 389 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 390 return 1; /* no whitelist, anything goes */
b64ec4e4 391 }
eb852011 392
b64ec4e4 393 for (p = whitelist_rw; *p; p++) {
eb852011
MA
394 if (!strcmp(drv->format_name, *p)) {
395 return 1;
396 }
397 }
b64ec4e4
FZ
398 if (read_only) {
399 for (p = whitelist_ro; *p; p++) {
400 if (!strcmp(drv->format_name, *p)) {
401 return 1;
402 }
403 }
404 }
eb852011
MA
405 return 0;
406}
407
e6ff69bf
DB
408bool bdrv_uses_whitelist(void)
409{
410 return use_bdrv_whitelist;
411}
412
5b7e1542
ZYW
413typedef struct CreateCo {
414 BlockDriver *drv;
415 char *filename;
83d0521a 416 QemuOpts *opts;
5b7e1542 417 int ret;
cc84d90f 418 Error *err;
5b7e1542
ZYW
419} CreateCo;
420
421static void coroutine_fn bdrv_create_co_entry(void *opaque)
422{
cc84d90f
HR
423 Error *local_err = NULL;
424 int ret;
425
5b7e1542
ZYW
426 CreateCo *cco = opaque;
427 assert(cco->drv);
428
efc75e2a 429 ret = cco->drv->bdrv_co_create_opts(cco->filename, cco->opts, &local_err);
621ff94d 430 error_propagate(&cco->err, local_err);
cc84d90f 431 cco->ret = ret;
5b7e1542
ZYW
432}
433
0e7e1989 434int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 435 QemuOpts *opts, Error **errp)
ea2384d3 436{
5b7e1542
ZYW
437 int ret;
438
439 Coroutine *co;
440 CreateCo cco = {
441 .drv = drv,
442 .filename = g_strdup(filename),
83d0521a 443 .opts = opts,
5b7e1542 444 .ret = NOT_DONE,
cc84d90f 445 .err = NULL,
5b7e1542
ZYW
446 };
447
efc75e2a 448 if (!drv->bdrv_co_create_opts) {
cc84d90f 449 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
450 ret = -ENOTSUP;
451 goto out;
5b7e1542
ZYW
452 }
453
454 if (qemu_in_coroutine()) {
455 /* Fast-path if already in coroutine context */
456 bdrv_create_co_entry(&cco);
457 } else {
0b8b8753
PB
458 co = qemu_coroutine_create(bdrv_create_co_entry, &cco);
459 qemu_coroutine_enter(co);
5b7e1542 460 while (cco.ret == NOT_DONE) {
b47ec2c4 461 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
462 }
463 }
464
465 ret = cco.ret;
cc84d90f 466 if (ret < 0) {
84d18f06 467 if (cco.err) {
cc84d90f
HR
468 error_propagate(errp, cco.err);
469 } else {
470 error_setg_errno(errp, -ret, "Could not create image");
471 }
472 }
0e7e1989 473
80168bff
LC
474out:
475 g_free(cco.filename);
5b7e1542 476 return ret;
ea2384d3
FB
477}
478
c282e1fd 479int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
480{
481 BlockDriver *drv;
cc84d90f
HR
482 Error *local_err = NULL;
483 int ret;
84a12e66 484
b65a5e12 485 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 486 if (drv == NULL) {
16905d71 487 return -ENOENT;
84a12e66
CH
488 }
489
c282e1fd 490 ret = bdrv_create(drv, filename, opts, &local_err);
621ff94d 491 error_propagate(errp, local_err);
cc84d90f 492 return ret;
84a12e66
CH
493}
494
892b7de8
ET
495/**
496 * Try to get @bs's logical and physical block size.
497 * On success, store them in @bsz struct and return 0.
498 * On failure return -errno.
499 * @bs must not be empty.
500 */
501int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
502{
503 BlockDriver *drv = bs->drv;
504
505 if (drv && drv->bdrv_probe_blocksizes) {
506 return drv->bdrv_probe_blocksizes(bs, bsz);
5a612c00
MP
507 } else if (drv && drv->is_filter && bs->file) {
508 return bdrv_probe_blocksizes(bs->file->bs, bsz);
892b7de8
ET
509 }
510
511 return -ENOTSUP;
512}
513
514/**
515 * Try to get @bs's geometry (cyls, heads, sectors).
516 * On success, store them in @geo struct and return 0.
517 * On failure return -errno.
518 * @bs must not be empty.
519 */
520int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
521{
522 BlockDriver *drv = bs->drv;
523
524 if (drv && drv->bdrv_probe_geometry) {
525 return drv->bdrv_probe_geometry(bs, geo);
5a612c00
MP
526 } else if (drv && drv->is_filter && bs->file) {
527 return bdrv_probe_geometry(bs->file->bs, geo);
892b7de8
ET
528 }
529
530 return -ENOTSUP;
531}
532
eba25057
JM
533/*
534 * Create a uniquely-named empty temporary file.
535 * Return 0 upon success, otherwise a negative errno value.
536 */
537int get_tmp_filename(char *filename, int size)
d5249393 538{
eba25057 539#ifdef _WIN32
3b9f94e1 540 char temp_dir[MAX_PATH];
eba25057
JM
541 /* GetTempFileName requires that its output buffer (4th param)
542 have length MAX_PATH or greater. */
543 assert(size >= MAX_PATH);
544 return (GetTempPath(MAX_PATH, temp_dir)
545 && GetTempFileName(temp_dir, "qem", 0, filename)
546 ? 0 : -GetLastError());
d5249393 547#else
67b915a5 548 int fd;
7ccfb2eb 549 const char *tmpdir;
0badc1ee 550 tmpdir = getenv("TMPDIR");
69bef793
AS
551 if (!tmpdir) {
552 tmpdir = "/var/tmp";
553 }
eba25057
JM
554 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
555 return -EOVERFLOW;
556 }
ea2384d3 557 fd = mkstemp(filename);
fe235a06
DH
558 if (fd < 0) {
559 return -errno;
560 }
561 if (close(fd) != 0) {
562 unlink(filename);
eba25057
JM
563 return -errno;
564 }
565 return 0;
d5249393 566#endif
eba25057 567}
fc01f7e7 568
84a12e66
CH
569/*
570 * Detect host devices. By convention, /dev/cdrom[N] is always
571 * recognized as a host CDROM.
572 */
573static BlockDriver *find_hdev_driver(const char *filename)
574{
575 int score_max = 0, score;
576 BlockDriver *drv = NULL, *d;
577
578 QLIST_FOREACH(d, &bdrv_drivers, list) {
579 if (d->bdrv_probe_device) {
580 score = d->bdrv_probe_device(filename);
581 if (score > score_max) {
582 score_max = score;
583 drv = d;
584 }
585 }
586 }
587
588 return drv;
589}
590
88d88798
MM
591static BlockDriver *bdrv_do_find_protocol(const char *protocol)
592{
593 BlockDriver *drv1;
594
595 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
596 if (drv1->protocol_name && !strcmp(drv1->protocol_name, protocol)) {
597 return drv1;
598 }
599 }
600
601 return NULL;
602}
603
98289620 604BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
605 bool allow_protocol_prefix,
606 Error **errp)
83f64091
FB
607{
608 BlockDriver *drv1;
609 char protocol[128];
1cec71e3 610 int len;
83f64091 611 const char *p;
88d88798 612 int i;
19cb3738 613
66f82cee
KW
614 /* TODO Drivers without bdrv_file_open must be specified explicitly */
615
39508e7a
CH
616 /*
617 * XXX(hch): we really should not let host device detection
618 * override an explicit protocol specification, but moving this
619 * later breaks access to device names with colons in them.
620 * Thanks to the brain-dead persistent naming schemes on udev-
621 * based Linux systems those actually are quite common.
622 */
623 drv1 = find_hdev_driver(filename);
624 if (drv1) {
625 return drv1;
626 }
627
98289620 628 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 629 return &bdrv_file;
84a12e66 630 }
98289620 631
9e0b22f4
SH
632 p = strchr(filename, ':');
633 assert(p != NULL);
1cec71e3
AL
634 len = p - filename;
635 if (len > sizeof(protocol) - 1)
636 len = sizeof(protocol) - 1;
637 memcpy(protocol, filename, len);
638 protocol[len] = '\0';
88d88798
MM
639
640 drv1 = bdrv_do_find_protocol(protocol);
641 if (drv1) {
642 return drv1;
643 }
644
645 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); ++i) {
646 if (block_driver_modules[i].protocol_name &&
647 !strcmp(block_driver_modules[i].protocol_name, protocol)) {
648 block_module_load_one(block_driver_modules[i].library_name);
649 break;
8a22f02a 650 }
83f64091 651 }
b65a5e12 652
88d88798
MM
653 drv1 = bdrv_do_find_protocol(protocol);
654 if (!drv1) {
655 error_setg(errp, "Unknown protocol '%s'", protocol);
656 }
657 return drv1;
83f64091
FB
658}
659
c6684249
MA
660/*
661 * Guess image format by probing its contents.
662 * This is not a good idea when your image is raw (CVE-2008-2004), but
663 * we do it anyway for backward compatibility.
664 *
665 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
666 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
667 * but can be smaller if the image file is smaller)
c6684249
MA
668 * @filename is its filename.
669 *
670 * For all block drivers, call the bdrv_probe() method to get its
671 * probing score.
672 * Return the first block driver with the highest probing score.
673 */
38f3ef57
KW
674BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
675 const char *filename)
c6684249
MA
676{
677 int score_max = 0, score;
678 BlockDriver *drv = NULL, *d;
679
680 QLIST_FOREACH(d, &bdrv_drivers, list) {
681 if (d->bdrv_probe) {
682 score = d->bdrv_probe(buf, buf_size, filename);
683 if (score > score_max) {
684 score_max = score;
685 drv = d;
686 }
687 }
688 }
689
690 return drv;
691}
692
5696c6e3 693static int find_image_format(BlockBackend *file, const char *filename,
34b5d2c6 694 BlockDriver **pdrv, Error **errp)
f3a5d3f8 695{
c6684249 696 BlockDriver *drv;
7cddd372 697 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 698 int ret = 0;
f8ea0b00 699
08a00559 700 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
5696c6e3 701 if (blk_is_sg(file) || !blk_is_inserted(file) || blk_getlength(file) == 0) {
ef810437 702 *pdrv = &bdrv_raw;
c98ac35d 703 return ret;
1a396859 704 }
f8ea0b00 705
5696c6e3 706 ret = blk_pread(file, 0, buf, sizeof(buf));
83f64091 707 if (ret < 0) {
34b5d2c6
HR
708 error_setg_errno(errp, -ret, "Could not read image for determining its "
709 "format");
c98ac35d
SW
710 *pdrv = NULL;
711 return ret;
83f64091
FB
712 }
713
c6684249 714 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 715 if (!drv) {
34b5d2c6
HR
716 error_setg(errp, "Could not determine image format: No compatible "
717 "driver found");
c98ac35d
SW
718 ret = -ENOENT;
719 }
720 *pdrv = drv;
721 return ret;
ea2384d3
FB
722}
723
51762288
SH
724/**
725 * Set the current 'total_sectors' value
65a9bb25 726 * Return 0 on success, -errno on error.
51762288 727 */
3d9f2d2a 728int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
51762288
SH
729{
730 BlockDriver *drv = bs->drv;
731
d470ad42
HR
732 if (!drv) {
733 return -ENOMEDIUM;
734 }
735
396759ad 736 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 737 if (bdrv_is_sg(bs))
396759ad
NB
738 return 0;
739
51762288
SH
740 /* query actual device if possible, otherwise just trust the hint */
741 if (drv->bdrv_getlength) {
742 int64_t length = drv->bdrv_getlength(bs);
743 if (length < 0) {
744 return length;
745 }
7e382003 746 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
747 }
748
749 bs->total_sectors = hint;
750 return 0;
751}
752
cddff5ba
KW
753/**
754 * Combines a QDict of new block driver @options with any missing options taken
755 * from @old_options, so that leaving out an option defaults to its old value.
756 */
757static void bdrv_join_options(BlockDriverState *bs, QDict *options,
758 QDict *old_options)
759{
760 if (bs->drv && bs->drv->bdrv_join_options) {
761 bs->drv->bdrv_join_options(options, old_options);
762 } else {
763 qdict_join(options, old_options, false);
764 }
765}
766
543770bd
AG
767static BlockdevDetectZeroesOptions bdrv_parse_detect_zeroes(QemuOpts *opts,
768 int open_flags,
769 Error **errp)
770{
771 Error *local_err = NULL;
772 char *value = qemu_opt_get_del(opts, "detect-zeroes");
773 BlockdevDetectZeroesOptions detect_zeroes =
774 qapi_enum_parse(&BlockdevDetectZeroesOptions_lookup, value,
775 BLOCKDEV_DETECT_ZEROES_OPTIONS_OFF, &local_err);
776 g_free(value);
777 if (local_err) {
778 error_propagate(errp, local_err);
779 return detect_zeroes;
780 }
781
782 if (detect_zeroes == BLOCKDEV_DETECT_ZEROES_OPTIONS_UNMAP &&
783 !(open_flags & BDRV_O_UNMAP))
784 {
785 error_setg(errp, "setting detect-zeroes to unmap is not allowed "
786 "without setting discard operation to unmap");
787 }
788
789 return detect_zeroes;
790}
791
9e8f1835
PB
792/**
793 * Set open flags for a given discard mode
794 *
795 * Return 0 on success, -1 if the discard mode was invalid.
796 */
797int bdrv_parse_discard_flags(const char *mode, int *flags)
798{
799 *flags &= ~BDRV_O_UNMAP;
800
801 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
802 /* do nothing */
803 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
804 *flags |= BDRV_O_UNMAP;
805 } else {
806 return -1;
807 }
808
809 return 0;
810}
811
c3993cdc
SH
812/**
813 * Set open flags for a given cache mode
814 *
815 * Return 0 on success, -1 if the cache mode was invalid.
816 */
53e8ae01 817int bdrv_parse_cache_mode(const char *mode, int *flags, bool *writethrough)
c3993cdc
SH
818{
819 *flags &= ~BDRV_O_CACHE_MASK;
820
821 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
53e8ae01
KW
822 *writethrough = false;
823 *flags |= BDRV_O_NOCACHE;
92196b2f 824 } else if (!strcmp(mode, "directsync")) {
53e8ae01 825 *writethrough = true;
92196b2f 826 *flags |= BDRV_O_NOCACHE;
c3993cdc 827 } else if (!strcmp(mode, "writeback")) {
53e8ae01 828 *writethrough = false;
c3993cdc 829 } else if (!strcmp(mode, "unsafe")) {
53e8ae01 830 *writethrough = false;
c3993cdc
SH
831 *flags |= BDRV_O_NO_FLUSH;
832 } else if (!strcmp(mode, "writethrough")) {
53e8ae01 833 *writethrough = true;
c3993cdc
SH
834 } else {
835 return -1;
836 }
837
838 return 0;
839}
840
b5411555
KW
841static char *bdrv_child_get_parent_desc(BdrvChild *c)
842{
843 BlockDriverState *parent = c->opaque;
844 return g_strdup(bdrv_get_device_or_node_name(parent));
845}
846
20018e12
KW
847static void bdrv_child_cb_drained_begin(BdrvChild *child)
848{
849 BlockDriverState *bs = child->opaque;
6cd5c9d7 850 bdrv_do_drained_begin_quiesce(bs, NULL, false);
20018e12
KW
851}
852
89bd0305
KW
853static bool bdrv_child_cb_drained_poll(BdrvChild *child)
854{
855 BlockDriverState *bs = child->opaque;
6cd5c9d7 856 return bdrv_drain_poll(bs, false, NULL, false);
89bd0305
KW
857}
858
20018e12
KW
859static void bdrv_child_cb_drained_end(BdrvChild *child)
860{
861 BlockDriverState *bs = child->opaque;
862 bdrv_drained_end(bs);
863}
864
d736f119
KW
865static void bdrv_child_cb_attach(BdrvChild *child)
866{
867 BlockDriverState *bs = child->opaque;
868 bdrv_apply_subtree_drain(child, bs);
869}
870
871static void bdrv_child_cb_detach(BdrvChild *child)
872{
873 BlockDriverState *bs = child->opaque;
874 bdrv_unapply_subtree_drain(child, bs);
875}
876
38701b6a
KW
877static int bdrv_child_cb_inactivate(BdrvChild *child)
878{
879 BlockDriverState *bs = child->opaque;
880 assert(bs->open_flags & BDRV_O_INACTIVE);
881 return 0;
882}
883
b1e6fc08 884/*
73176bee
KW
885 * Returns the options and flags that a temporary snapshot should get, based on
886 * the originally requested flags (the originally requested image will have
887 * flags like a backing file)
b1e6fc08 888 */
73176bee
KW
889static void bdrv_temp_snapshot_options(int *child_flags, QDict *child_options,
890 int parent_flags, QDict *parent_options)
b1e6fc08 891{
73176bee
KW
892 *child_flags = (parent_flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
893
894 /* For temporary files, unconditional cache=unsafe is fine */
73176bee
KW
895 qdict_set_default_str(child_options, BDRV_OPT_CACHE_DIRECT, "off");
896 qdict_set_default_str(child_options, BDRV_OPT_CACHE_NO_FLUSH, "on");
41869044 897
f87a0e29
AG
898 /* Copy the read-only option from the parent */
899 qdict_copy_default(child_options, parent_options, BDRV_OPT_READ_ONLY);
900
41869044
KW
901 /* aio=native doesn't work for cache.direct=off, so disable it for the
902 * temporary snapshot */
903 *child_flags &= ~BDRV_O_NATIVE_AIO;
b1e6fc08
KW
904}
905
0b50cc88 906/*
8e2160e2
KW
907 * Returns the options and flags that bs->file should get if a protocol driver
908 * is expected, based on the given options and flags for the parent BDS
0b50cc88 909 */
8e2160e2
KW
910static void bdrv_inherited_options(int *child_flags, QDict *child_options,
911 int parent_flags, QDict *parent_options)
0b50cc88 912{
8e2160e2
KW
913 int flags = parent_flags;
914
0b50cc88
KW
915 /* Enable protocol handling, disable format probing for bs->file */
916 flags |= BDRV_O_PROTOCOL;
917
91a097e7
KW
918 /* If the cache mode isn't explicitly set, inherit direct and no-flush from
919 * the parent. */
920 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
921 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
5a9347c6 922 qdict_copy_default(child_options, parent_options, BDRV_OPT_FORCE_SHARE);
91a097e7 923
f87a0e29
AG
924 /* Inherit the read-only option from the parent if it's not set */
925 qdict_copy_default(child_options, parent_options, BDRV_OPT_READ_ONLY);
926
0b50cc88 927 /* Our block drivers take care to send flushes and respect unmap policy,
91a097e7
KW
928 * so we can default to enable both on lower layers regardless of the
929 * corresponding parent options. */
818584a4 930 qdict_set_default_str(child_options, BDRV_OPT_DISCARD, "unmap");
0b50cc88 931
0b50cc88 932 /* Clear flags that only apply to the top layer */
abb06c5a
DB
933 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ |
934 BDRV_O_NO_IO);
0b50cc88 935
8e2160e2 936 *child_flags = flags;
0b50cc88
KW
937}
938
f3930ed0 939const BdrvChildRole child_file = {
6cd5c9d7 940 .parent_is_bds = true,
b5411555 941 .get_parent_desc = bdrv_child_get_parent_desc,
8e2160e2 942 .inherit_options = bdrv_inherited_options,
20018e12 943 .drained_begin = bdrv_child_cb_drained_begin,
89bd0305 944 .drained_poll = bdrv_child_cb_drained_poll,
20018e12 945 .drained_end = bdrv_child_cb_drained_end,
d736f119
KW
946 .attach = bdrv_child_cb_attach,
947 .detach = bdrv_child_cb_detach,
38701b6a 948 .inactivate = bdrv_child_cb_inactivate,
f3930ed0
KW
949};
950
951/*
8e2160e2
KW
952 * Returns the options and flags that bs->file should get if the use of formats
953 * (and not only protocols) is permitted for it, based on the given options and
954 * flags for the parent BDS
f3930ed0 955 */
8e2160e2
KW
956static void bdrv_inherited_fmt_options(int *child_flags, QDict *child_options,
957 int parent_flags, QDict *parent_options)
f3930ed0 958{
8e2160e2
KW
959 child_file.inherit_options(child_flags, child_options,
960 parent_flags, parent_options);
961
abb06c5a 962 *child_flags &= ~(BDRV_O_PROTOCOL | BDRV_O_NO_IO);
f3930ed0
KW
963}
964
965const BdrvChildRole child_format = {
6cd5c9d7 966 .parent_is_bds = true,
b5411555 967 .get_parent_desc = bdrv_child_get_parent_desc,
8e2160e2 968 .inherit_options = bdrv_inherited_fmt_options,
20018e12 969 .drained_begin = bdrv_child_cb_drained_begin,
89bd0305 970 .drained_poll = bdrv_child_cb_drained_poll,
20018e12 971 .drained_end = bdrv_child_cb_drained_end,
d736f119
KW
972 .attach = bdrv_child_cb_attach,
973 .detach = bdrv_child_cb_detach,
38701b6a 974 .inactivate = bdrv_child_cb_inactivate,
f3930ed0
KW
975};
976
db95dbba
KW
977static void bdrv_backing_attach(BdrvChild *c)
978{
979 BlockDriverState *parent = c->opaque;
980 BlockDriverState *backing_hd = c->bs;
981
982 assert(!parent->backing_blocker);
983 error_setg(&parent->backing_blocker,
984 "node is used as backing hd of '%s'",
985 bdrv_get_device_or_node_name(parent));
986
987 parent->open_flags &= ~BDRV_O_NO_BACKING;
988 pstrcpy(parent->backing_file, sizeof(parent->backing_file),
989 backing_hd->filename);
990 pstrcpy(parent->backing_format, sizeof(parent->backing_format),
991 backing_hd->drv ? backing_hd->drv->format_name : "");
992
993 bdrv_op_block_all(backing_hd, parent->backing_blocker);
994 /* Otherwise we won't be able to commit or stream */
995 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
996 parent->backing_blocker);
997 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_STREAM,
998 parent->backing_blocker);
999 /*
1000 * We do backup in 3 ways:
1001 * 1. drive backup
1002 * The target bs is new opened, and the source is top BDS
1003 * 2. blockdev backup
1004 * Both the source and the target are top BDSes.
1005 * 3. internal backup(used for block replication)
1006 * Both the source and the target are backing file
1007 *
1008 * In case 1 and 2, neither the source nor the target is the backing file.
1009 * In case 3, we will block the top BDS, so there is only one block job
1010 * for the top BDS and its backing chain.
1011 */
1012 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_BACKUP_SOURCE,
1013 parent->backing_blocker);
1014 bdrv_op_unblock(backing_hd, BLOCK_OP_TYPE_BACKUP_TARGET,
1015 parent->backing_blocker);
d736f119
KW
1016
1017 bdrv_child_cb_attach(c);
db95dbba
KW
1018}
1019
1020static void bdrv_backing_detach(BdrvChild *c)
1021{
1022 BlockDriverState *parent = c->opaque;
1023
1024 assert(parent->backing_blocker);
1025 bdrv_op_unblock_all(c->bs, parent->backing_blocker);
1026 error_free(parent->backing_blocker);
1027 parent->backing_blocker = NULL;
d736f119
KW
1028
1029 bdrv_child_cb_detach(c);
db95dbba
KW
1030}
1031
317fc44e 1032/*
8e2160e2
KW
1033 * Returns the options and flags that bs->backing should get, based on the
1034 * given options and flags for the parent BDS
317fc44e 1035 */
8e2160e2
KW
1036static void bdrv_backing_options(int *child_flags, QDict *child_options,
1037 int parent_flags, QDict *parent_options)
317fc44e 1038{
8e2160e2
KW
1039 int flags = parent_flags;
1040
b8816a43
KW
1041 /* The cache mode is inherited unmodified for backing files; except WCE,
1042 * which is only applied on the top level (BlockBackend) */
91a097e7
KW
1043 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_DIRECT);
1044 qdict_copy_default(child_options, parent_options, BDRV_OPT_CACHE_NO_FLUSH);
5a9347c6 1045 qdict_copy_default(child_options, parent_options, BDRV_OPT_FORCE_SHARE);
91a097e7 1046
317fc44e 1047 /* backing files always opened read-only */
f87a0e29
AG
1048 qdict_set_default_str(child_options, BDRV_OPT_READ_ONLY, "on");
1049 flags &= ~BDRV_O_COPY_ON_READ;
317fc44e
KW
1050
1051 /* snapshot=on is handled on the top layer */
8bfea15d 1052 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e 1053
8e2160e2 1054 *child_flags = flags;
317fc44e
KW
1055}
1056
6858eba0
KW
1057static int bdrv_backing_update_filename(BdrvChild *c, BlockDriverState *base,
1058 const char *filename, Error **errp)
1059{
1060 BlockDriverState *parent = c->opaque;
61f09cea 1061 int orig_flags = bdrv_get_flags(parent);
6858eba0
KW
1062 int ret;
1063
61f09cea
KW
1064 if (!(orig_flags & BDRV_O_RDWR)) {
1065 ret = bdrv_reopen(parent, orig_flags | BDRV_O_RDWR, errp);
1066 if (ret < 0) {
1067 return ret;
1068 }
1069 }
1070
6858eba0
KW
1071 ret = bdrv_change_backing_file(parent, filename,
1072 base->drv ? base->drv->format_name : "");
1073 if (ret < 0) {
64730694 1074 error_setg_errno(errp, -ret, "Could not update backing file link");
6858eba0
KW
1075 }
1076
61f09cea
KW
1077 if (!(orig_flags & BDRV_O_RDWR)) {
1078 bdrv_reopen(parent, orig_flags, NULL);
1079 }
1080
6858eba0
KW
1081 return ret;
1082}
1083
91ef3825 1084const BdrvChildRole child_backing = {
6cd5c9d7 1085 .parent_is_bds = true,
b5411555 1086 .get_parent_desc = bdrv_child_get_parent_desc,
db95dbba
KW
1087 .attach = bdrv_backing_attach,
1088 .detach = bdrv_backing_detach,
8e2160e2 1089 .inherit_options = bdrv_backing_options,
20018e12 1090 .drained_begin = bdrv_child_cb_drained_begin,
89bd0305 1091 .drained_poll = bdrv_child_cb_drained_poll,
20018e12 1092 .drained_end = bdrv_child_cb_drained_end,
38701b6a 1093 .inactivate = bdrv_child_cb_inactivate,
6858eba0 1094 .update_filename = bdrv_backing_update_filename,
f3930ed0
KW
1095};
1096
7b272452
KW
1097static int bdrv_open_flags(BlockDriverState *bs, int flags)
1098{
61de4c68 1099 int open_flags = flags;
7b272452
KW
1100
1101 /*
1102 * Clear flags that are internal to the block layer before opening the
1103 * image.
1104 */
20cca275 1105 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
1106
1107 /*
1108 * Snapshots should be writable.
1109 */
8bfea15d 1110 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
1111 open_flags |= BDRV_O_RDWR;
1112 }
1113
1114 return open_flags;
1115}
1116
91a097e7
KW
1117static void update_flags_from_options(int *flags, QemuOpts *opts)
1118{
1119 *flags &= ~BDRV_O_CACHE_MASK;
1120
91a097e7 1121 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_NO_FLUSH));
57f9db9a 1122 if (qemu_opt_get_bool_del(opts, BDRV_OPT_CACHE_NO_FLUSH, false)) {
91a097e7
KW
1123 *flags |= BDRV_O_NO_FLUSH;
1124 }
1125
1126 assert(qemu_opt_find(opts, BDRV_OPT_CACHE_DIRECT));
57f9db9a 1127 if (qemu_opt_get_bool_del(opts, BDRV_OPT_CACHE_DIRECT, false)) {
91a097e7
KW
1128 *flags |= BDRV_O_NOCACHE;
1129 }
f87a0e29
AG
1130
1131 *flags &= ~BDRV_O_RDWR;
1132
1133 assert(qemu_opt_find(opts, BDRV_OPT_READ_ONLY));
57f9db9a 1134 if (!qemu_opt_get_bool_del(opts, BDRV_OPT_READ_ONLY, false)) {
f87a0e29
AG
1135 *flags |= BDRV_O_RDWR;
1136 }
1137
91a097e7
KW
1138}
1139
1140static void update_options_from_flags(QDict *options, int flags)
1141{
91a097e7 1142 if (!qdict_haskey(options, BDRV_OPT_CACHE_DIRECT)) {
46f5ac20 1143 qdict_put_bool(options, BDRV_OPT_CACHE_DIRECT, flags & BDRV_O_NOCACHE);
91a097e7
KW
1144 }
1145 if (!qdict_haskey(options, BDRV_OPT_CACHE_NO_FLUSH)) {
46f5ac20
EB
1146 qdict_put_bool(options, BDRV_OPT_CACHE_NO_FLUSH,
1147 flags & BDRV_O_NO_FLUSH);
91a097e7 1148 }
f87a0e29 1149 if (!qdict_haskey(options, BDRV_OPT_READ_ONLY)) {
46f5ac20 1150 qdict_put_bool(options, BDRV_OPT_READ_ONLY, !(flags & BDRV_O_RDWR));
f87a0e29 1151 }
91a097e7
KW
1152}
1153
636ea370
KW
1154static void bdrv_assign_node_name(BlockDriverState *bs,
1155 const char *node_name,
1156 Error **errp)
6913c0c2 1157{
15489c76 1158 char *gen_node_name = NULL;
6913c0c2 1159
15489c76
JC
1160 if (!node_name) {
1161 node_name = gen_node_name = id_generate(ID_BLOCK);
1162 } else if (!id_wellformed(node_name)) {
1163 /*
1164 * Check for empty string or invalid characters, but not if it is
1165 * generated (generated names use characters not available to the user)
1166 */
9aebf3b8 1167 error_setg(errp, "Invalid node name");
636ea370 1168 return;
6913c0c2
BC
1169 }
1170
0c5e94ee 1171 /* takes care of avoiding namespaces collisions */
7f06d47e 1172 if (blk_by_name(node_name)) {
0c5e94ee
BC
1173 error_setg(errp, "node-name=%s is conflicting with a device id",
1174 node_name);
15489c76 1175 goto out;
0c5e94ee
BC
1176 }
1177
6913c0c2
BC
1178 /* takes care of avoiding duplicates node names */
1179 if (bdrv_find_node(node_name)) {
1180 error_setg(errp, "Duplicate node name");
15489c76 1181 goto out;
6913c0c2
BC
1182 }
1183
824808dd
KW
1184 /* Make sure that the node name isn't truncated */
1185 if (strlen(node_name) >= sizeof(bs->node_name)) {
1186 error_setg(errp, "Node name too long");
1187 goto out;
1188 }
1189
6913c0c2
BC
1190 /* copy node name into the bs and insert it into the graph list */
1191 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
1192 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
15489c76
JC
1193out:
1194 g_free(gen_node_name);
6913c0c2
BC
1195}
1196
01a56501
KW
1197static int bdrv_open_driver(BlockDriverState *bs, BlockDriver *drv,
1198 const char *node_name, QDict *options,
1199 int open_flags, Error **errp)
1200{
1201 Error *local_err = NULL;
0f12264e 1202 int i, ret;
01a56501
KW
1203
1204 bdrv_assign_node_name(bs, node_name, &local_err);
1205 if (local_err) {
1206 error_propagate(errp, local_err);
1207 return -EINVAL;
1208 }
1209
1210 bs->drv = drv;
680c7f96 1211 bs->read_only = !(bs->open_flags & BDRV_O_RDWR);
01a56501
KW
1212 bs->opaque = g_malloc0(drv->instance_size);
1213
1214 if (drv->bdrv_file_open) {
1215 assert(!drv->bdrv_needs_filename || bs->filename[0]);
1216 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
680c7f96 1217 } else if (drv->bdrv_open) {
01a56501 1218 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
680c7f96
KW
1219 } else {
1220 ret = 0;
01a56501
KW
1221 }
1222
1223 if (ret < 0) {
1224 if (local_err) {
1225 error_propagate(errp, local_err);
1226 } else if (bs->filename[0]) {
1227 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
1228 } else {
1229 error_setg_errno(errp, -ret, "Could not open image");
1230 }
180ca19a 1231 goto open_failed;
01a56501
KW
1232 }
1233
1234 ret = refresh_total_sectors(bs, bs->total_sectors);
1235 if (ret < 0) {
1236 error_setg_errno(errp, -ret, "Could not refresh total sector count");
180ca19a 1237 return ret;
01a56501
KW
1238 }
1239
1240 bdrv_refresh_limits(bs, &local_err);
1241 if (local_err) {
1242 error_propagate(errp, local_err);
180ca19a 1243 return -EINVAL;
01a56501
KW
1244 }
1245
1246 assert(bdrv_opt_mem_align(bs) != 0);
1247 assert(bdrv_min_mem_align(bs) != 0);
1248 assert(is_power_of_2(bs->bl.request_alignment));
1249
0f12264e
KW
1250 for (i = 0; i < bs->quiesce_counter; i++) {
1251 if (drv->bdrv_co_drain_begin) {
1252 drv->bdrv_co_drain_begin(bs);
1253 }
1254 }
1255
01a56501 1256 return 0;
180ca19a
MP
1257open_failed:
1258 bs->drv = NULL;
1259 if (bs->file != NULL) {
1260 bdrv_unref_child(bs, bs->file);
1261 bs->file = NULL;
1262 }
01a56501
KW
1263 g_free(bs->opaque);
1264 bs->opaque = NULL;
01a56501
KW
1265 return ret;
1266}
1267
680c7f96
KW
1268BlockDriverState *bdrv_new_open_driver(BlockDriver *drv, const char *node_name,
1269 int flags, Error **errp)
1270{
1271 BlockDriverState *bs;
1272 int ret;
1273
1274 bs = bdrv_new();
1275 bs->open_flags = flags;
1276 bs->explicit_options = qdict_new();
1277 bs->options = qdict_new();
1278 bs->opaque = NULL;
1279
1280 update_options_from_flags(bs->options, flags);
1281
1282 ret = bdrv_open_driver(bs, drv, node_name, bs->options, flags, errp);
1283 if (ret < 0) {
cb3e7f08 1284 qobject_unref(bs->explicit_options);
180ca19a 1285 bs->explicit_options = NULL;
cb3e7f08 1286 qobject_unref(bs->options);
180ca19a 1287 bs->options = NULL;
680c7f96
KW
1288 bdrv_unref(bs);
1289 return NULL;
1290 }
1291
1292 return bs;
1293}
1294
c5f3014b 1295QemuOptsList bdrv_runtime_opts = {
18edf289
KW
1296 .name = "bdrv_common",
1297 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
1298 .desc = {
1299 {
1300 .name = "node-name",
1301 .type = QEMU_OPT_STRING,
1302 .help = "Node name of the block device node",
1303 },
62392ebb
KW
1304 {
1305 .name = "driver",
1306 .type = QEMU_OPT_STRING,
1307 .help = "Block driver to use for the node",
1308 },
91a097e7
KW
1309 {
1310 .name = BDRV_OPT_CACHE_DIRECT,
1311 .type = QEMU_OPT_BOOL,
1312 .help = "Bypass software writeback cache on the host",
1313 },
1314 {
1315 .name = BDRV_OPT_CACHE_NO_FLUSH,
1316 .type = QEMU_OPT_BOOL,
1317 .help = "Ignore flush requests",
1318 },
f87a0e29
AG
1319 {
1320 .name = BDRV_OPT_READ_ONLY,
1321 .type = QEMU_OPT_BOOL,
1322 .help = "Node is opened in read-only mode",
1323 },
692e01a2
KW
1324 {
1325 .name = "detect-zeroes",
1326 .type = QEMU_OPT_STRING,
1327 .help = "try to optimize zero writes (off, on, unmap)",
1328 },
818584a4
KW
1329 {
1330 .name = "discard",
1331 .type = QEMU_OPT_STRING,
1332 .help = "discard operation (ignore/off, unmap/on)",
1333 },
5a9347c6
FZ
1334 {
1335 .name = BDRV_OPT_FORCE_SHARE,
1336 .type = QEMU_OPT_BOOL,
1337 .help = "always accept other writers (default: off)",
1338 },
18edf289
KW
1339 { /* end of list */ }
1340 },
1341};
1342
57915332
KW
1343/*
1344 * Common part for opening disk images and files
b6ad491a
KW
1345 *
1346 * Removes all processed options from *options.
57915332 1347 */
5696c6e3 1348static int bdrv_open_common(BlockDriverState *bs, BlockBackend *file,
82dc8b41 1349 QDict *options, Error **errp)
57915332
KW
1350{
1351 int ret, open_flags;
035fccdf 1352 const char *filename;
62392ebb 1353 const char *driver_name = NULL;
6913c0c2 1354 const char *node_name = NULL;
818584a4 1355 const char *discard;
18edf289 1356 QemuOpts *opts;
62392ebb 1357 BlockDriver *drv;
34b5d2c6 1358 Error *local_err = NULL;
57915332 1359
6405875c 1360 assert(bs->file == NULL);
707ff828 1361 assert(options != NULL && bs->options != options);
57915332 1362
62392ebb
KW
1363 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
1364 qemu_opts_absorb_qdict(opts, options, &local_err);
1365 if (local_err) {
1366 error_propagate(errp, local_err);
1367 ret = -EINVAL;
1368 goto fail_opts;
1369 }
1370
9b7e8691
AG
1371 update_flags_from_options(&bs->open_flags, opts);
1372
62392ebb
KW
1373 driver_name = qemu_opt_get(opts, "driver");
1374 drv = bdrv_find_format(driver_name);
1375 assert(drv != NULL);
1376
5a9347c6
FZ
1377 bs->force_share = qemu_opt_get_bool(opts, BDRV_OPT_FORCE_SHARE, false);
1378
1379 if (bs->force_share && (bs->open_flags & BDRV_O_RDWR)) {
1380 error_setg(errp,
1381 BDRV_OPT_FORCE_SHARE
1382 "=on can only be used with read-only images");
1383 ret = -EINVAL;
1384 goto fail_opts;
1385 }
1386
45673671 1387 if (file != NULL) {
5696c6e3 1388 filename = blk_bs(file)->filename;
45673671 1389 } else {
129c7d1c
MA
1390 /*
1391 * Caution: while qdict_get_try_str() is fine, getting
1392 * non-string types would require more care. When @options
1393 * come from -blockdev or blockdev_add, its members are typed
1394 * according to the QAPI schema, but when they come from
1395 * -drive, they're all QString.
1396 */
45673671
KW
1397 filename = qdict_get_try_str(options, "filename");
1398 }
1399
4a008240 1400 if (drv->bdrv_needs_filename && (!filename || !filename[0])) {
765003db
KW
1401 error_setg(errp, "The '%s' block driver requires a file name",
1402 drv->format_name);
18edf289
KW
1403 ret = -EINVAL;
1404 goto fail_opts;
6913c0c2 1405 }
6913c0c2 1406
82dc8b41
KW
1407 trace_bdrv_open_common(bs, filename ?: "", bs->open_flags,
1408 drv->format_name);
62392ebb 1409
82dc8b41 1410 bs->read_only = !(bs->open_flags & BDRV_O_RDWR);
b64ec4e4
FZ
1411
1412 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
1413 error_setg(errp,
1414 !bs->read_only && bdrv_is_whitelisted(drv, true)
1415 ? "Driver '%s' can only be used for read-only devices"
1416 : "Driver '%s' is not whitelisted",
1417 drv->format_name);
18edf289
KW
1418 ret = -ENOTSUP;
1419 goto fail_opts;
b64ec4e4 1420 }
57915332 1421
d3faa13e
PB
1422 /* bdrv_new() and bdrv_close() make it so */
1423 assert(atomic_read(&bs->copy_on_read) == 0);
1424
82dc8b41 1425 if (bs->open_flags & BDRV_O_COPY_ON_READ) {
0ebd24e0
KW
1426 if (!bs->read_only) {
1427 bdrv_enable_copy_on_read(bs);
1428 } else {
1429 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
1430 ret = -EINVAL;
1431 goto fail_opts;
0ebd24e0 1432 }
53fec9d3
SH
1433 }
1434
818584a4
KW
1435 discard = qemu_opt_get(opts, "discard");
1436 if (discard != NULL) {
1437 if (bdrv_parse_discard_flags(discard, &bs->open_flags) != 0) {
1438 error_setg(errp, "Invalid discard option");
1439 ret = -EINVAL;
1440 goto fail_opts;
1441 }
1442 }
1443
543770bd
AG
1444 bs->detect_zeroes =
1445 bdrv_parse_detect_zeroes(opts, bs->open_flags, &local_err);
1446 if (local_err) {
1447 error_propagate(errp, local_err);
1448 ret = -EINVAL;
1449 goto fail_opts;
692e01a2
KW
1450 }
1451
c2ad1b0c
KW
1452 if (filename != NULL) {
1453 pstrcpy(bs->filename, sizeof(bs->filename), filename);
1454 } else {
1455 bs->filename[0] = '\0';
1456 }
91af7014 1457 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 1458
66f82cee 1459 /* Open the image, either directly or using a protocol */
82dc8b41 1460 open_flags = bdrv_open_flags(bs, bs->open_flags);
01a56501 1461 node_name = qemu_opt_get(opts, "node-name");
57915332 1462
01a56501
KW
1463 assert(!drv->bdrv_file_open || file == NULL);
1464 ret = bdrv_open_driver(bs, drv, node_name, options, open_flags, errp);
51762288 1465 if (ret < 0) {
01a56501 1466 goto fail_opts;
3baca891
KW
1467 }
1468
18edf289 1469 qemu_opts_del(opts);
57915332
KW
1470 return 0;
1471
18edf289
KW
1472fail_opts:
1473 qemu_opts_del(opts);
57915332
KW
1474 return ret;
1475}
1476
5e5c4f63
KW
1477static QDict *parse_json_filename(const char *filename, Error **errp)
1478{
1479 QObject *options_obj;
1480 QDict *options;
1481 int ret;
1482
1483 ret = strstart(filename, "json:", &filename);
1484 assert(ret);
1485
5577fff7 1486 options_obj = qobject_from_json(filename, errp);
5e5c4f63 1487 if (!options_obj) {
5577fff7 1488 error_prepend(errp, "Could not parse the JSON options: ");
5e5c4f63
KW
1489 return NULL;
1490 }
1491
7dc847eb 1492 options = qobject_to(QDict, options_obj);
ca6b6e1e 1493 if (!options) {
cb3e7f08 1494 qobject_unref(options_obj);
5e5c4f63
KW
1495 error_setg(errp, "Invalid JSON object given");
1496 return NULL;
1497 }
1498
5e5c4f63
KW
1499 qdict_flatten(options);
1500
1501 return options;
1502}
1503
de3b53f0
KW
1504static void parse_json_protocol(QDict *options, const char **pfilename,
1505 Error **errp)
1506{
1507 QDict *json_options;
1508 Error *local_err = NULL;
1509
1510 /* Parse json: pseudo-protocol */
1511 if (!*pfilename || !g_str_has_prefix(*pfilename, "json:")) {
1512 return;
1513 }
1514
1515 json_options = parse_json_filename(*pfilename, &local_err);
1516 if (local_err) {
1517 error_propagate(errp, local_err);
1518 return;
1519 }
1520
1521 /* Options given in the filename have lower priority than options
1522 * specified directly */
1523 qdict_join(options, json_options, false);
cb3e7f08 1524 qobject_unref(json_options);
de3b53f0
KW
1525 *pfilename = NULL;
1526}
1527
b6ce07aa 1528/*
f54120ff
KW
1529 * Fills in default options for opening images and converts the legacy
1530 * filename/flags pair to option QDict entries.
53a29513
HR
1531 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
1532 * block driver has been specified explicitly.
b6ce07aa 1533 */
de3b53f0 1534static int bdrv_fill_options(QDict **options, const char *filename,
053e1578 1535 int *flags, Error **errp)
ea2384d3 1536{
c2ad1b0c 1537 const char *drvname;
53a29513 1538 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 1539 bool parse_filename = false;
053e1578 1540 BlockDriver *drv = NULL;
34b5d2c6 1541 Error *local_err = NULL;
83f64091 1542
129c7d1c
MA
1543 /*
1544 * Caution: while qdict_get_try_str() is fine, getting non-string
1545 * types would require more care. When @options come from
1546 * -blockdev or blockdev_add, its members are typed according to
1547 * the QAPI schema, but when they come from -drive, they're all
1548 * QString.
1549 */
53a29513 1550 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1551 if (drvname) {
1552 drv = bdrv_find_format(drvname);
1553 if (!drv) {
1554 error_setg(errp, "Unknown driver '%s'", drvname);
1555 return -ENOENT;
1556 }
1557 /* If the user has explicitly specified the driver, this choice should
1558 * override the BDRV_O_PROTOCOL flag */
1559 protocol = drv->bdrv_file_open;
53a29513
HR
1560 }
1561
1562 if (protocol) {
1563 *flags |= BDRV_O_PROTOCOL;
1564 } else {
1565 *flags &= ~BDRV_O_PROTOCOL;
1566 }
1567
91a097e7
KW
1568 /* Translate cache options from flags into options */
1569 update_options_from_flags(*options, *flags);
1570
035fccdf 1571 /* Fetch the file name from the options QDict if necessary */
17b005f1 1572 if (protocol && filename) {
f54120ff 1573 if (!qdict_haskey(*options, "filename")) {
46f5ac20 1574 qdict_put_str(*options, "filename", filename);
f54120ff
KW
1575 parse_filename = true;
1576 } else {
1577 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1578 "the same time");
1579 return -EINVAL;
1580 }
035fccdf
KW
1581 }
1582
c2ad1b0c 1583 /* Find the right block driver */
129c7d1c 1584 /* See cautionary note on accessing @options above */
f54120ff 1585 filename = qdict_get_try_str(*options, "filename");
f54120ff 1586
053e1578
HR
1587 if (!drvname && protocol) {
1588 if (filename) {
1589 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1590 if (!drv) {
053e1578 1591 return -EINVAL;
17b005f1 1592 }
053e1578
HR
1593
1594 drvname = drv->format_name;
46f5ac20 1595 qdict_put_str(*options, "driver", drvname);
053e1578
HR
1596 } else {
1597 error_setg(errp, "Must specify either driver or file");
1598 return -EINVAL;
98289620 1599 }
c2ad1b0c
KW
1600 }
1601
17b005f1 1602 assert(drv || !protocol);
c2ad1b0c 1603
f54120ff 1604 /* Driver-specific filename parsing */
17b005f1 1605 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1606 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1607 if (local_err) {
34b5d2c6 1608 error_propagate(errp, local_err);
f54120ff 1609 return -EINVAL;
6963a30d 1610 }
cd5d031e
HR
1611
1612 if (!drv->bdrv_needs_filename) {
1613 qdict_del(*options, "filename");
cd5d031e 1614 }
6963a30d
KW
1615 }
1616
f54120ff
KW
1617 return 0;
1618}
1619
3121fb45
KW
1620static int bdrv_child_check_perm(BdrvChild *c, BlockReopenQueue *q,
1621 uint64_t perm, uint64_t shared,
c1cef672
FZ
1622 GSList *ignore_children, Error **errp);
1623static void bdrv_child_abort_perm_update(BdrvChild *c);
1624static void bdrv_child_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared);
1625
148eb13c
KW
1626typedef struct BlockReopenQueueEntry {
1627 bool prepared;
1628 BDRVReopenState state;
1629 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
1630} BlockReopenQueueEntry;
1631
1632/*
1633 * Return the flags that @bs will have after the reopens in @q have
1634 * successfully completed. If @q is NULL (or @bs is not contained in @q),
1635 * return the current flags.
1636 */
1637static int bdrv_reopen_get_flags(BlockReopenQueue *q, BlockDriverState *bs)
1638{
1639 BlockReopenQueueEntry *entry;
1640
1641 if (q != NULL) {
1642 QSIMPLEQ_FOREACH(entry, q, entry) {
1643 if (entry->state.bs == bs) {
1644 return entry->state.flags;
1645 }
1646 }
1647 }
1648
1649 return bs->open_flags;
1650}
1651
1652/* Returns whether the image file can be written to after the reopen queue @q
1653 * has been successfully applied, or right now if @q is NULL. */
cc022140
HR
1654static bool bdrv_is_writable_after_reopen(BlockDriverState *bs,
1655 BlockReopenQueue *q)
148eb13c
KW
1656{
1657 int flags = bdrv_reopen_get_flags(q, bs);
1658
1659 return (flags & (BDRV_O_RDWR | BDRV_O_INACTIVE)) == BDRV_O_RDWR;
1660}
1661
cc022140
HR
1662/*
1663 * Return whether the BDS can be written to. This is not necessarily
1664 * the same as !bdrv_is_read_only(bs), as inactivated images may not
1665 * be written to but do not count as read-only images.
1666 */
1667bool bdrv_is_writable(BlockDriverState *bs)
1668{
1669 return bdrv_is_writable_after_reopen(bs, NULL);
1670}
1671
ffd1a5a2 1672static void bdrv_child_perm(BlockDriverState *bs, BlockDriverState *child_bs,
e0995dc3
KW
1673 BdrvChild *c, const BdrvChildRole *role,
1674 BlockReopenQueue *reopen_queue,
ffd1a5a2
FZ
1675 uint64_t parent_perm, uint64_t parent_shared,
1676 uint64_t *nperm, uint64_t *nshared)
1677{
1678 if (bs->drv && bs->drv->bdrv_child_perm) {
e0995dc3 1679 bs->drv->bdrv_child_perm(bs, c, role, reopen_queue,
ffd1a5a2
FZ
1680 parent_perm, parent_shared,
1681 nperm, nshared);
1682 }
e0995dc3 1683 /* TODO Take force_share from reopen_queue */
ffd1a5a2
FZ
1684 if (child_bs && child_bs->force_share) {
1685 *nshared = BLK_PERM_ALL;
1686 }
1687}
1688
33a610c3
KW
1689/*
1690 * Check whether permissions on this node can be changed in a way that
1691 * @cumulative_perms and @cumulative_shared_perms are the new cumulative
1692 * permissions of all its parents. This involves checking whether all necessary
1693 * permission changes to child nodes can be performed.
1694 *
1695 * A call to this function must always be followed by a call to bdrv_set_perm()
1696 * or bdrv_abort_perm_update().
1697 */
3121fb45
KW
1698static int bdrv_check_perm(BlockDriverState *bs, BlockReopenQueue *q,
1699 uint64_t cumulative_perms,
46181129
KW
1700 uint64_t cumulative_shared_perms,
1701 GSList *ignore_children, Error **errp)
33a610c3
KW
1702{
1703 BlockDriver *drv = bs->drv;
1704 BdrvChild *c;
1705 int ret;
1706
1707 /* Write permissions never work with read-only images */
1708 if ((cumulative_perms & (BLK_PERM_WRITE | BLK_PERM_WRITE_UNCHANGED)) &&
cc022140 1709 !bdrv_is_writable_after_reopen(bs, q))
33a610c3
KW
1710 {
1711 error_setg(errp, "Block node is read-only");
1712 return -EPERM;
1713 }
1714
1715 /* Check this node */
1716 if (!drv) {
1717 return 0;
1718 }
1719
1720 if (drv->bdrv_check_perm) {
1721 return drv->bdrv_check_perm(bs, cumulative_perms,
1722 cumulative_shared_perms, errp);
1723 }
1724
78e421c9 1725 /* Drivers that never have children can omit .bdrv_child_perm() */
33a610c3 1726 if (!drv->bdrv_child_perm) {
78e421c9 1727 assert(QLIST_EMPTY(&bs->children));
33a610c3
KW
1728 return 0;
1729 }
1730
1731 /* Check all children */
1732 QLIST_FOREACH(c, &bs->children, next) {
1733 uint64_t cur_perm, cur_shared;
3121fb45 1734 bdrv_child_perm(bs, c->bs, c, c->role, q,
ffd1a5a2
FZ
1735 cumulative_perms, cumulative_shared_perms,
1736 &cur_perm, &cur_shared);
3121fb45
KW
1737 ret = bdrv_child_check_perm(c, q, cur_perm, cur_shared,
1738 ignore_children, errp);
33a610c3
KW
1739 if (ret < 0) {
1740 return ret;
1741 }
1742 }
1743
1744 return 0;
1745}
1746
1747/*
1748 * Notifies drivers that after a previous bdrv_check_perm() call, the
1749 * permission update is not performed and any preparations made for it (e.g.
1750 * taken file locks) need to be undone.
1751 *
1752 * This function recursively notifies all child nodes.
1753 */
1754static void bdrv_abort_perm_update(BlockDriverState *bs)
1755{
1756 BlockDriver *drv = bs->drv;
1757 BdrvChild *c;
1758
1759 if (!drv) {
1760 return;
1761 }
1762
1763 if (drv->bdrv_abort_perm_update) {
1764 drv->bdrv_abort_perm_update(bs);
1765 }
1766
1767 QLIST_FOREACH(c, &bs->children, next) {
1768 bdrv_child_abort_perm_update(c);
1769 }
1770}
1771
1772static void bdrv_set_perm(BlockDriverState *bs, uint64_t cumulative_perms,
1773 uint64_t cumulative_shared_perms)
1774{
1775 BlockDriver *drv = bs->drv;
1776 BdrvChild *c;
1777
1778 if (!drv) {
1779 return;
1780 }
1781
1782 /* Update this node */
1783 if (drv->bdrv_set_perm) {
1784 drv->bdrv_set_perm(bs, cumulative_perms, cumulative_shared_perms);
1785 }
1786
78e421c9 1787 /* Drivers that never have children can omit .bdrv_child_perm() */
33a610c3 1788 if (!drv->bdrv_child_perm) {
78e421c9 1789 assert(QLIST_EMPTY(&bs->children));
33a610c3
KW
1790 return;
1791 }
1792
1793 /* Update all children */
1794 QLIST_FOREACH(c, &bs->children, next) {
1795 uint64_t cur_perm, cur_shared;
e0995dc3 1796 bdrv_child_perm(bs, c->bs, c, c->role, NULL,
ffd1a5a2
FZ
1797 cumulative_perms, cumulative_shared_perms,
1798 &cur_perm, &cur_shared);
33a610c3
KW
1799 bdrv_child_set_perm(c, cur_perm, cur_shared);
1800 }
1801}
1802
1803static void bdrv_get_cumulative_perm(BlockDriverState *bs, uint64_t *perm,
1804 uint64_t *shared_perm)
1805{
1806 BdrvChild *c;
1807 uint64_t cumulative_perms = 0;
1808 uint64_t cumulative_shared_perms = BLK_PERM_ALL;
1809
1810 QLIST_FOREACH(c, &bs->parents, next_parent) {
1811 cumulative_perms |= c->perm;
1812 cumulative_shared_perms &= c->shared_perm;
1813 }
1814
1815 *perm = cumulative_perms;
1816 *shared_perm = cumulative_shared_perms;
1817}
1818
d083319f
KW
1819static char *bdrv_child_user_desc(BdrvChild *c)
1820{
1821 if (c->role->get_parent_desc) {
1822 return c->role->get_parent_desc(c);
1823 }
1824
1825 return g_strdup("another user");
1826}
1827
5176196c 1828char *bdrv_perm_names(uint64_t perm)
d083319f
KW
1829{
1830 struct perm_name {
1831 uint64_t perm;
1832 const char *name;
1833 } permissions[] = {
1834 { BLK_PERM_CONSISTENT_READ, "consistent read" },
1835 { BLK_PERM_WRITE, "write" },
1836 { BLK_PERM_WRITE_UNCHANGED, "write unchanged" },
1837 { BLK_PERM_RESIZE, "resize" },
1838 { BLK_PERM_GRAPH_MOD, "change children" },
1839 { 0, NULL }
1840 };
1841
1842 char *result = g_strdup("");
1843 struct perm_name *p;
1844
1845 for (p = permissions; p->name; p++) {
1846 if (perm & p->perm) {
1847 char *old = result;
1848 result = g_strdup_printf("%s%s%s", old, *old ? ", " : "", p->name);
1849 g_free(old);
1850 }
1851 }
1852
1853 return result;
1854}
1855
33a610c3
KW
1856/*
1857 * Checks whether a new reference to @bs can be added if the new user requires
46181129
KW
1858 * @new_used_perm/@new_shared_perm as its permissions. If @ignore_children is
1859 * set, the BdrvChild objects in this list are ignored in the calculations;
1860 * this allows checking permission updates for an existing reference.
33a610c3
KW
1861 *
1862 * Needs to be followed by a call to either bdrv_set_perm() or
1863 * bdrv_abort_perm_update(). */
3121fb45
KW
1864static int bdrv_check_update_perm(BlockDriverState *bs, BlockReopenQueue *q,
1865 uint64_t new_used_perm,
d5e6f437 1866 uint64_t new_shared_perm,
46181129 1867 GSList *ignore_children, Error **errp)
d5e6f437
KW
1868{
1869 BdrvChild *c;
33a610c3
KW
1870 uint64_t cumulative_perms = new_used_perm;
1871 uint64_t cumulative_shared_perms = new_shared_perm;
d5e6f437
KW
1872
1873 /* There is no reason why anyone couldn't tolerate write_unchanged */
1874 assert(new_shared_perm & BLK_PERM_WRITE_UNCHANGED);
1875
1876 QLIST_FOREACH(c, &bs->parents, next_parent) {
46181129 1877 if (g_slist_find(ignore_children, c)) {
d5e6f437
KW
1878 continue;
1879 }
1880
d083319f
KW
1881 if ((new_used_perm & c->shared_perm) != new_used_perm) {
1882 char *user = bdrv_child_user_desc(c);
1883 char *perm_names = bdrv_perm_names(new_used_perm & ~c->shared_perm);
1884 error_setg(errp, "Conflicts with use by %s as '%s', which does not "
1885 "allow '%s' on %s",
1886 user, c->name, perm_names, bdrv_get_node_name(c->bs));
1887 g_free(user);
1888 g_free(perm_names);
1889 return -EPERM;
1890 }
1891
1892 if ((c->perm & new_shared_perm) != c->perm) {
1893 char *user = bdrv_child_user_desc(c);
1894 char *perm_names = bdrv_perm_names(c->perm & ~new_shared_perm);
1895 error_setg(errp, "Conflicts with use by %s as '%s', which uses "
1896 "'%s' on %s",
1897 user, c->name, perm_names, bdrv_get_node_name(c->bs));
1898 g_free(user);
1899 g_free(perm_names);
d5e6f437
KW
1900 return -EPERM;
1901 }
33a610c3
KW
1902
1903 cumulative_perms |= c->perm;
1904 cumulative_shared_perms &= c->shared_perm;
d5e6f437
KW
1905 }
1906
3121fb45 1907 return bdrv_check_perm(bs, q, cumulative_perms, cumulative_shared_perms,
46181129 1908 ignore_children, errp);
33a610c3
KW
1909}
1910
1911/* Needs to be followed by a call to either bdrv_child_set_perm() or
1912 * bdrv_child_abort_perm_update(). */
3121fb45
KW
1913static int bdrv_child_check_perm(BdrvChild *c, BlockReopenQueue *q,
1914 uint64_t perm, uint64_t shared,
c1cef672 1915 GSList *ignore_children, Error **errp)
33a610c3 1916{
46181129
KW
1917 int ret;
1918
1919 ignore_children = g_slist_prepend(g_slist_copy(ignore_children), c);
3121fb45 1920 ret = bdrv_check_update_perm(c->bs, q, perm, shared, ignore_children, errp);
46181129
KW
1921 g_slist_free(ignore_children);
1922
1923 return ret;
33a610c3
KW
1924}
1925
c1cef672 1926static void bdrv_child_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared)
33a610c3
KW
1927{
1928 uint64_t cumulative_perms, cumulative_shared_perms;
1929
1930 c->perm = perm;
1931 c->shared_perm = shared;
1932
1933 bdrv_get_cumulative_perm(c->bs, &cumulative_perms,
1934 &cumulative_shared_perms);
1935 bdrv_set_perm(c->bs, cumulative_perms, cumulative_shared_perms);
1936}
1937
c1cef672 1938static void bdrv_child_abort_perm_update(BdrvChild *c)
33a610c3
KW
1939{
1940 bdrv_abort_perm_update(c->bs);
1941}
1942
1943int bdrv_child_try_set_perm(BdrvChild *c, uint64_t perm, uint64_t shared,
1944 Error **errp)
1945{
1946 int ret;
1947
3121fb45 1948 ret = bdrv_child_check_perm(c, NULL, perm, shared, NULL, errp);
33a610c3
KW
1949 if (ret < 0) {
1950 bdrv_child_abort_perm_update(c);
1951 return ret;
1952 }
1953
1954 bdrv_child_set_perm(c, perm, shared);
1955
d5e6f437
KW
1956 return 0;
1957}
1958
6a1b9ee1
KW
1959void bdrv_filter_default_perms(BlockDriverState *bs, BdrvChild *c,
1960 const BdrvChildRole *role,
e0995dc3 1961 BlockReopenQueue *reopen_queue,
6a1b9ee1
KW
1962 uint64_t perm, uint64_t shared,
1963 uint64_t *nperm, uint64_t *nshared)
1964{
1965 if (c == NULL) {
1966 *nperm = perm & DEFAULT_PERM_PASSTHROUGH;
1967 *nshared = (shared & DEFAULT_PERM_PASSTHROUGH) | DEFAULT_PERM_UNCHANGED;
1968 return;
1969 }
1970
1971 *nperm = (perm & DEFAULT_PERM_PASSTHROUGH) |
1972 (c->perm & DEFAULT_PERM_UNCHANGED);
1973 *nshared = (shared & DEFAULT_PERM_PASSTHROUGH) |
1974 (c->shared_perm & DEFAULT_PERM_UNCHANGED);
1975}
1976
6b1a044a
KW
1977void bdrv_format_default_perms(BlockDriverState *bs, BdrvChild *c,
1978 const BdrvChildRole *role,
e0995dc3 1979 BlockReopenQueue *reopen_queue,
6b1a044a
KW
1980 uint64_t perm, uint64_t shared,
1981 uint64_t *nperm, uint64_t *nshared)
1982{
1983 bool backing = (role == &child_backing);
1984 assert(role == &child_backing || role == &child_file);
1985
1986 if (!backing) {
5fbfabd3
KW
1987 int flags = bdrv_reopen_get_flags(reopen_queue, bs);
1988
6b1a044a
KW
1989 /* Apart from the modifications below, the same permissions are
1990 * forwarded and left alone as for filters */
e0995dc3
KW
1991 bdrv_filter_default_perms(bs, c, role, reopen_queue, perm, shared,
1992 &perm, &shared);
6b1a044a
KW
1993
1994 /* Format drivers may touch metadata even if the guest doesn't write */
cc022140 1995 if (bdrv_is_writable_after_reopen(bs, reopen_queue)) {
6b1a044a
KW
1996 perm |= BLK_PERM_WRITE | BLK_PERM_RESIZE;
1997 }
1998
1999 /* bs->file always needs to be consistent because of the metadata. We
2000 * can never allow other users to resize or write to it. */
5fbfabd3
KW
2001 if (!(flags & BDRV_O_NO_IO)) {
2002 perm |= BLK_PERM_CONSISTENT_READ;
2003 }
6b1a044a
KW
2004 shared &= ~(BLK_PERM_WRITE | BLK_PERM_RESIZE);
2005 } else {
2006 /* We want consistent read from backing files if the parent needs it.
2007 * No other operations are performed on backing files. */
2008 perm &= BLK_PERM_CONSISTENT_READ;
2009
2010 /* If the parent can deal with changing data, we're okay with a
2011 * writable and resizable backing file. */
2012 /* TODO Require !(perm & BLK_PERM_CONSISTENT_READ), too? */
2013 if (shared & BLK_PERM_WRITE) {
2014 shared = BLK_PERM_WRITE | BLK_PERM_RESIZE;
2015 } else {
2016 shared = 0;
2017 }
2018
2019 shared |= BLK_PERM_CONSISTENT_READ | BLK_PERM_GRAPH_MOD |
2020 BLK_PERM_WRITE_UNCHANGED;
2021 }
2022
9c5e6594
KW
2023 if (bs->open_flags & BDRV_O_INACTIVE) {
2024 shared |= BLK_PERM_WRITE | BLK_PERM_RESIZE;
2025 }
2026
6b1a044a
KW
2027 *nperm = perm;
2028 *nshared = shared;
2029}
2030
8ee03995
KW
2031static void bdrv_replace_child_noperm(BdrvChild *child,
2032 BlockDriverState *new_bs)
e9740bc6
KW
2033{
2034 BlockDriverState *old_bs = child->bs;
0152bf40 2035 int i;
e9740bc6 2036
bb2614e9
FZ
2037 if (old_bs && new_bs) {
2038 assert(bdrv_get_aio_context(old_bs) == bdrv_get_aio_context(new_bs));
2039 }
e9740bc6 2040 if (old_bs) {
d736f119
KW
2041 /* Detach first so that the recursive drain sections coming from @child
2042 * are already gone and we only end the drain sections that came from
2043 * elsewhere. */
2044 if (child->role->detach) {
2045 child->role->detach(child);
2046 }
36fe1331 2047 if (old_bs->quiesce_counter && child->role->drained_end) {
0f12264e
KW
2048 int num = old_bs->quiesce_counter;
2049 if (child->role->parent_is_bds) {
2050 num -= bdrv_drain_all_count;
2051 }
2052 assert(num >= 0);
2053 for (i = 0; i < num; i++) {
0152bf40
KW
2054 child->role->drained_end(child);
2055 }
36fe1331 2056 }
e9740bc6
KW
2057 QLIST_REMOVE(child, next_parent);
2058 }
36fe1331
KW
2059
2060 child->bs = new_bs;
2061
e9740bc6
KW
2062 if (new_bs) {
2063 QLIST_INSERT_HEAD(&new_bs->parents, child, next_parent);
36fe1331 2064 if (new_bs->quiesce_counter && child->role->drained_begin) {
0f12264e
KW
2065 int num = new_bs->quiesce_counter;
2066 if (child->role->parent_is_bds) {
2067 num -= bdrv_drain_all_count;
2068 }
2069 assert(num >= 0);
2070 for (i = 0; i < num; i++) {
4be6a6d1 2071 bdrv_parent_drained_begin_single(child, true);
0152bf40 2072 }
36fe1331 2073 }
33a610c3 2074
d736f119
KW
2075 /* Attach only after starting new drained sections, so that recursive
2076 * drain sections coming from @child don't get an extra .drained_begin
2077 * callback. */
8ee03995
KW
2078 if (child->role->attach) {
2079 child->role->attach(child);
2080 }
2081 }
2082}
33a610c3 2083
466787fb
KW
2084/*
2085 * Updates @child to change its reference to point to @new_bs, including
2086 * checking and applying the necessary permisson updates both to the old node
2087 * and to @new_bs.
2088 *
2089 * NULL is passed as @new_bs for removing the reference before freeing @child.
2090 *
2091 * If @new_bs is not NULL, bdrv_check_perm() must be called beforehand, as this
2092 * function uses bdrv_set_perm() to update the permissions according to the new
2093 * reference that @new_bs gets.
2094 */
2095static void bdrv_replace_child(BdrvChild *child, BlockDriverState *new_bs)
8ee03995
KW
2096{
2097 BlockDriverState *old_bs = child->bs;
2098 uint64_t perm, shared_perm;
2099
8aecf1d1
KW
2100 bdrv_replace_child_noperm(child, new_bs);
2101
8ee03995 2102 if (old_bs) {
33a610c3
KW
2103 /* Update permissions for old node. This is guaranteed to succeed
2104 * because we're just taking a parent away, so we're loosening
2105 * restrictions. */
2106 bdrv_get_cumulative_perm(old_bs, &perm, &shared_perm);
3121fb45 2107 bdrv_check_perm(old_bs, NULL, perm, shared_perm, NULL, &error_abort);
33a610c3 2108 bdrv_set_perm(old_bs, perm, shared_perm);
e9740bc6 2109 }
36fe1331 2110
e9740bc6 2111 if (new_bs) {
33a610c3 2112 bdrv_get_cumulative_perm(new_bs, &perm, &shared_perm);
33a610c3 2113 bdrv_set_perm(new_bs, perm, shared_perm);
e9740bc6 2114 }
e9740bc6
KW
2115}
2116
f21d96d0
KW
2117BdrvChild *bdrv_root_attach_child(BlockDriverState *child_bs,
2118 const char *child_name,
36fe1331 2119 const BdrvChildRole *child_role,
d5e6f437
KW
2120 uint64_t perm, uint64_t shared_perm,
2121 void *opaque, Error **errp)
df581792 2122{
d5e6f437
KW
2123 BdrvChild *child;
2124 int ret;
2125
3121fb45 2126 ret = bdrv_check_update_perm(child_bs, NULL, perm, shared_perm, NULL, errp);
d5e6f437 2127 if (ret < 0) {
33a610c3 2128 bdrv_abort_perm_update(child_bs);
d5e6f437
KW
2129 return NULL;
2130 }
2131
2132 child = g_new(BdrvChild, 1);
df581792 2133 *child = (BdrvChild) {
d5e6f437
KW
2134 .bs = NULL,
2135 .name = g_strdup(child_name),
2136 .role = child_role,
2137 .perm = perm,
2138 .shared_perm = shared_perm,
2139 .opaque = opaque,
df581792
KW
2140 };
2141
33a610c3 2142 /* This performs the matching bdrv_set_perm() for the above check. */
466787fb 2143 bdrv_replace_child(child, child_bs);
b4b059f6
KW
2144
2145 return child;
df581792
KW
2146}
2147
98292c61
WC
2148BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
2149 BlockDriverState *child_bs,
2150 const char *child_name,
8b2ff529
KW
2151 const BdrvChildRole *child_role,
2152 Error **errp)
f21d96d0 2153{
d5e6f437 2154 BdrvChild *child;
f68c598b
KW
2155 uint64_t perm, shared_perm;
2156
2157 bdrv_get_cumulative_perm(parent_bs, &perm, &shared_perm);
2158
2159 assert(parent_bs->drv);
bb2614e9 2160 assert(bdrv_get_aio_context(parent_bs) == bdrv_get_aio_context(child_bs));
e0995dc3 2161 bdrv_child_perm(parent_bs, child_bs, NULL, child_role, NULL,
ffd1a5a2 2162 perm, shared_perm, &perm, &shared_perm);
d5e6f437 2163
d5e6f437 2164 child = bdrv_root_attach_child(child_bs, child_name, child_role,
f68c598b 2165 perm, shared_perm, parent_bs, errp);
d5e6f437
KW
2166 if (child == NULL) {
2167 return NULL;
2168 }
2169
f21d96d0
KW
2170 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
2171 return child;
2172}
2173
3f09bfbc 2174static void bdrv_detach_child(BdrvChild *child)
33a60407 2175{
f21d96d0
KW
2176 if (child->next.le_prev) {
2177 QLIST_REMOVE(child, next);
2178 child->next.le_prev = NULL;
2179 }
e9740bc6 2180
466787fb 2181 bdrv_replace_child(child, NULL);
e9740bc6 2182
260fecf1 2183 g_free(child->name);
33a60407
KW
2184 g_free(child);
2185}
2186
f21d96d0 2187void bdrv_root_unref_child(BdrvChild *child)
33a60407 2188{
779020cb
KW
2189 BlockDriverState *child_bs;
2190
f21d96d0
KW
2191 child_bs = child->bs;
2192 bdrv_detach_child(child);
2193 bdrv_unref(child_bs);
2194}
2195
2196void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
2197{
779020cb
KW
2198 if (child == NULL) {
2199 return;
2200 }
33a60407
KW
2201
2202 if (child->bs->inherits_from == parent) {
4e4bf5c4
KW
2203 BdrvChild *c;
2204
2205 /* Remove inherits_from only when the last reference between parent and
2206 * child->bs goes away. */
2207 QLIST_FOREACH(c, &parent->children, next) {
2208 if (c != child && c->bs == child->bs) {
2209 break;
2210 }
2211 }
2212 if (c == NULL) {
2213 child->bs->inherits_from = NULL;
2214 }
33a60407
KW
2215 }
2216
f21d96d0 2217 bdrv_root_unref_child(child);
33a60407
KW
2218}
2219
5c8cab48
KW
2220
2221static void bdrv_parent_cb_change_media(BlockDriverState *bs, bool load)
2222{
2223 BdrvChild *c;
2224 QLIST_FOREACH(c, &bs->parents, next_parent) {
2225 if (c->role->change_media) {
2226 c->role->change_media(c, load);
2227 }
2228 }
2229}
2230
5db15a57
KW
2231/*
2232 * Sets the backing file link of a BDS. A new reference is created; callers
2233 * which don't need their own reference any more must call bdrv_unref().
2234 */
12fa4af6
KW
2235void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd,
2236 Error **errp)
8d24cce1 2237{
5db15a57
KW
2238 if (backing_hd) {
2239 bdrv_ref(backing_hd);
2240 }
8d24cce1 2241
760e0063 2242 if (bs->backing) {
5db15a57 2243 bdrv_unref_child(bs, bs->backing);
826b6ca0
FZ
2244 }
2245
8d24cce1 2246 if (!backing_hd) {
760e0063 2247 bs->backing = NULL;
8d24cce1
FZ
2248 goto out;
2249 }
12fa4af6 2250
8b2ff529 2251 bs->backing = bdrv_attach_child(bs, backing_hd, "backing", &child_backing,
12fa4af6
KW
2252 errp);
2253 if (!bs->backing) {
2254 bdrv_unref(backing_hd);
2255 }
826b6ca0 2256
9e7e940c
KW
2257 bdrv_refresh_filename(bs);
2258
8d24cce1 2259out:
3baca891 2260 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
2261}
2262
31ca6d07
KW
2263/*
2264 * Opens the backing file for a BlockDriverState if not yet open
2265 *
d9b7b057
KW
2266 * bdref_key specifies the key for the image's BlockdevRef in the options QDict.
2267 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
2268 * itself, all options starting with "${bdref_key}." are considered part of the
2269 * BlockdevRef.
2270 *
2271 * TODO Can this be unified with bdrv_open_image()?
31ca6d07 2272 */
d9b7b057
KW
2273int bdrv_open_backing_file(BlockDriverState *bs, QDict *parent_options,
2274 const char *bdref_key, Error **errp)
9156df12 2275{
1ba4b6a5 2276 char *backing_filename = g_malloc0(PATH_MAX);
d9b7b057
KW
2277 char *bdref_key_dot;
2278 const char *reference = NULL;
317fc44e 2279 int ret = 0;
8d24cce1 2280 BlockDriverState *backing_hd;
d9b7b057
KW
2281 QDict *options;
2282 QDict *tmp_parent_options = NULL;
34b5d2c6 2283 Error *local_err = NULL;
9156df12 2284
760e0063 2285 if (bs->backing != NULL) {
1ba4b6a5 2286 goto free_exit;
9156df12
PB
2287 }
2288
31ca6d07 2289 /* NULL means an empty set of options */
d9b7b057
KW
2290 if (parent_options == NULL) {
2291 tmp_parent_options = qdict_new();
2292 parent_options = tmp_parent_options;
31ca6d07
KW
2293 }
2294
9156df12 2295 bs->open_flags &= ~BDRV_O_NO_BACKING;
d9b7b057
KW
2296
2297 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
2298 qdict_extract_subqdict(parent_options, &options, bdref_key_dot);
2299 g_free(bdref_key_dot);
2300
129c7d1c
MA
2301 /*
2302 * Caution: while qdict_get_try_str() is fine, getting non-string
2303 * types would require more care. When @parent_options come from
2304 * -blockdev or blockdev_add, its members are typed according to
2305 * the QAPI schema, but when they come from -drive, they're all
2306 * QString.
2307 */
d9b7b057
KW
2308 reference = qdict_get_try_str(parent_options, bdref_key);
2309 if (reference || qdict_haskey(options, "file.filename")) {
1cb6f506
KW
2310 backing_filename[0] = '\0';
2311 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
cb3e7f08 2312 qobject_unref(options);
1ba4b6a5 2313 goto free_exit;
dbecebdd 2314 } else {
9f07429e
HR
2315 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
2316 &local_err);
2317 if (local_err) {
2318 ret = -EINVAL;
2319 error_propagate(errp, local_err);
cb3e7f08 2320 qobject_unref(options);
9f07429e
HR
2321 goto free_exit;
2322 }
9156df12
PB
2323 }
2324
8ee79e70
KW
2325 if (!bs->drv || !bs->drv->supports_backing) {
2326 ret = -EINVAL;
2327 error_setg(errp, "Driver doesn't support backing files");
cb3e7f08 2328 qobject_unref(options);
8ee79e70
KW
2329 goto free_exit;
2330 }
2331
6bff597b
PK
2332 if (!reference &&
2333 bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
46f5ac20 2334 qdict_put_str(options, "driver", bs->backing_format);
9156df12
PB
2335 }
2336
5b363937
HR
2337 backing_hd = bdrv_open_inherit(*backing_filename ? backing_filename : NULL,
2338 reference, options, 0, bs, &child_backing,
2339 errp);
2340 if (!backing_hd) {
9156df12 2341 bs->open_flags |= BDRV_O_NO_BACKING;
e43bfd9c 2342 error_prepend(errp, "Could not open backing file: ");
5b363937 2343 ret = -EINVAL;
1ba4b6a5 2344 goto free_exit;
9156df12 2345 }
5ce6bfe2 2346 bdrv_set_aio_context(backing_hd, bdrv_get_aio_context(bs));
df581792 2347
5db15a57
KW
2348 /* Hook up the backing file link; drop our reference, bs owns the
2349 * backing_hd reference now */
12fa4af6 2350 bdrv_set_backing_hd(bs, backing_hd, &local_err);
5db15a57 2351 bdrv_unref(backing_hd);
12fa4af6 2352 if (local_err) {
8cd1a3e4 2353 error_propagate(errp, local_err);
12fa4af6
KW
2354 ret = -EINVAL;
2355 goto free_exit;
2356 }
d80ac658 2357
d9b7b057
KW
2358 qdict_del(parent_options, bdref_key);
2359
1ba4b6a5
BC
2360free_exit:
2361 g_free(backing_filename);
cb3e7f08 2362 qobject_unref(tmp_parent_options);
1ba4b6a5 2363 return ret;
9156df12
PB
2364}
2365
2d6b86af
KW
2366static BlockDriverState *
2367bdrv_open_child_bs(const char *filename, QDict *options, const char *bdref_key,
2368 BlockDriverState *parent, const BdrvChildRole *child_role,
2369 bool allow_none, Error **errp)
da557aac 2370{
2d6b86af 2371 BlockDriverState *bs = NULL;
da557aac 2372 QDict *image_options;
da557aac
HR
2373 char *bdref_key_dot;
2374 const char *reference;
2375
df581792 2376 assert(child_role != NULL);
f67503e5 2377
da557aac
HR
2378 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
2379 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
2380 g_free(bdref_key_dot);
2381
129c7d1c
MA
2382 /*
2383 * Caution: while qdict_get_try_str() is fine, getting non-string
2384 * types would require more care. When @options come from
2385 * -blockdev or blockdev_add, its members are typed according to
2386 * the QAPI schema, but when they come from -drive, they're all
2387 * QString.
2388 */
da557aac
HR
2389 reference = qdict_get_try_str(options, bdref_key);
2390 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 2391 if (!allow_none) {
da557aac
HR
2392 error_setg(errp, "A block device must be specified for \"%s\"",
2393 bdref_key);
da557aac 2394 }
cb3e7f08 2395 qobject_unref(image_options);
da557aac
HR
2396 goto done;
2397 }
2398
5b363937
HR
2399 bs = bdrv_open_inherit(filename, reference, image_options, 0,
2400 parent, child_role, errp);
2401 if (!bs) {
df581792
KW
2402 goto done;
2403 }
2404
da557aac
HR
2405done:
2406 qdict_del(options, bdref_key);
2d6b86af
KW
2407 return bs;
2408}
2409
2410/*
2411 * Opens a disk image whose options are given as BlockdevRef in another block
2412 * device's options.
2413 *
2414 * If allow_none is true, no image will be opened if filename is false and no
2415 * BlockdevRef is given. NULL will be returned, but errp remains unset.
2416 *
2417 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
2418 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
2419 * itself, all options starting with "${bdref_key}." are considered part of the
2420 * BlockdevRef.
2421 *
2422 * The BlockdevRef will be removed from the options QDict.
2423 */
2424BdrvChild *bdrv_open_child(const char *filename,
2425 QDict *options, const char *bdref_key,
2426 BlockDriverState *parent,
2427 const BdrvChildRole *child_role,
2428 bool allow_none, Error **errp)
2429{
8b2ff529 2430 BdrvChild *c;
2d6b86af
KW
2431 BlockDriverState *bs;
2432
2433 bs = bdrv_open_child_bs(filename, options, bdref_key, parent, child_role,
2434 allow_none, errp);
2435 if (bs == NULL) {
2436 return NULL;
2437 }
2438
8b2ff529
KW
2439 c = bdrv_attach_child(parent, bs, bdref_key, child_role, errp);
2440 if (!c) {
2441 bdrv_unref(bs);
2442 return NULL;
2443 }
2444
2445 return c;
b4b059f6
KW
2446}
2447
e1d74bc6
KW
2448/* TODO Future callers may need to specify parent/child_role in order for
2449 * option inheritance to work. Existing callers use it for the root node. */
2450BlockDriverState *bdrv_open_blockdev_ref(BlockdevRef *ref, Error **errp)
2451{
2452 BlockDriverState *bs = NULL;
2453 Error *local_err = NULL;
2454 QObject *obj = NULL;
2455 QDict *qdict = NULL;
2456 const char *reference = NULL;
2457 Visitor *v = NULL;
2458
2459 if (ref->type == QTYPE_QSTRING) {
2460 reference = ref->u.reference;
2461 } else {
2462 BlockdevOptions *options = &ref->u.definition;
2463 assert(ref->type == QTYPE_QDICT);
2464
2465 v = qobject_output_visitor_new(&obj);
2466 visit_type_BlockdevOptions(v, NULL, &options, &local_err);
2467 if (local_err) {
2468 error_propagate(errp, local_err);
2469 goto fail;
2470 }
2471 visit_complete(v, &obj);
2472
7dc847eb 2473 qdict = qobject_to(QDict, obj);
e1d74bc6
KW
2474 qdict_flatten(qdict);
2475
2476 /* bdrv_open_inherit() defaults to the values in bdrv_flags (for
2477 * compatibility with other callers) rather than what we want as the
2478 * real defaults. Apply the defaults here instead. */
2479 qdict_set_default_str(qdict, BDRV_OPT_CACHE_DIRECT, "off");
2480 qdict_set_default_str(qdict, BDRV_OPT_CACHE_NO_FLUSH, "off");
2481 qdict_set_default_str(qdict, BDRV_OPT_READ_ONLY, "off");
2482 }
2483
2484 bs = bdrv_open_inherit(NULL, reference, qdict, 0, NULL, NULL, errp);
2485 obj = NULL;
2486
2487fail:
cb3e7f08 2488 qobject_unref(obj);
e1d74bc6
KW
2489 visit_free(v);
2490 return bs;
2491}
2492
66836189
HR
2493static BlockDriverState *bdrv_append_temp_snapshot(BlockDriverState *bs,
2494 int flags,
2495 QDict *snapshot_options,
2496 Error **errp)
b998875d
KW
2497{
2498 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 2499 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 2500 int64_t total_size;
83d0521a 2501 QemuOpts *opts = NULL;
ff6ed714 2502 BlockDriverState *bs_snapshot = NULL;
b2c2832c 2503 Error *local_err = NULL;
b998875d
KW
2504 int ret;
2505
2506 /* if snapshot, we create a temporary backing file and open it
2507 instead of opening 'filename' directly */
2508
2509 /* Get the required size from the image */
f187743a
KW
2510 total_size = bdrv_getlength(bs);
2511 if (total_size < 0) {
2512 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 2513 goto out;
f187743a 2514 }
b998875d
KW
2515
2516 /* Create the temporary image */
1ba4b6a5 2517 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
2518 if (ret < 0) {
2519 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 2520 goto out;
b998875d
KW
2521 }
2522
ef810437 2523 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 2524 &error_abort);
39101f25 2525 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
e43bfd9c 2526 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, errp);
83d0521a 2527 qemu_opts_del(opts);
b998875d 2528 if (ret < 0) {
e43bfd9c
MA
2529 error_prepend(errp, "Could not create temporary overlay '%s': ",
2530 tmp_filename);
1ba4b6a5 2531 goto out;
b998875d
KW
2532 }
2533
73176bee 2534 /* Prepare options QDict for the temporary file */
46f5ac20
EB
2535 qdict_put_str(snapshot_options, "file.driver", "file");
2536 qdict_put_str(snapshot_options, "file.filename", tmp_filename);
2537 qdict_put_str(snapshot_options, "driver", "qcow2");
b998875d 2538
5b363937 2539 bs_snapshot = bdrv_open(NULL, NULL, snapshot_options, flags, errp);
73176bee 2540 snapshot_options = NULL;
5b363937 2541 if (!bs_snapshot) {
1ba4b6a5 2542 goto out;
b998875d
KW
2543 }
2544
ff6ed714
EB
2545 /* bdrv_append() consumes a strong reference to bs_snapshot
2546 * (i.e. it will call bdrv_unref() on it) even on error, so in
2547 * order to be able to return one, we have to increase
2548 * bs_snapshot's refcount here */
66836189 2549 bdrv_ref(bs_snapshot);
b2c2832c
KW
2550 bdrv_append(bs_snapshot, bs, &local_err);
2551 if (local_err) {
2552 error_propagate(errp, local_err);
ff6ed714 2553 bs_snapshot = NULL;
b2c2832c
KW
2554 goto out;
2555 }
1ba4b6a5
BC
2556
2557out:
cb3e7f08 2558 qobject_unref(snapshot_options);
1ba4b6a5 2559 g_free(tmp_filename);
ff6ed714 2560 return bs_snapshot;
b998875d
KW
2561}
2562
b6ce07aa
KW
2563/*
2564 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
2565 *
2566 * options is a QDict of options to pass to the block drivers, or NULL for an
2567 * empty set of options. The reference to the QDict belongs to the block layer
2568 * after the call (even on failure), so if the caller intends to reuse the
cb3e7f08 2569 * dictionary, it needs to use qobject_ref() before calling bdrv_open.
f67503e5
HR
2570 *
2571 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
2572 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
2573 *
2574 * The reference parameter may be used to specify an existing block device which
2575 * should be opened. If specified, neither options nor a filename may be given,
2576 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 2577 */
5b363937
HR
2578static BlockDriverState *bdrv_open_inherit(const char *filename,
2579 const char *reference,
2580 QDict *options, int flags,
2581 BlockDriverState *parent,
2582 const BdrvChildRole *child_role,
2583 Error **errp)
ea2384d3 2584{
b6ce07aa 2585 int ret;
5696c6e3 2586 BlockBackend *file = NULL;
9a4f4c31 2587 BlockDriverState *bs;
ce343771 2588 BlockDriver *drv = NULL;
2f624b80 2589 BdrvChild *child;
74fe54f2 2590 const char *drvname;
3e8c2e57 2591 const char *backing;
34b5d2c6 2592 Error *local_err = NULL;
73176bee 2593 QDict *snapshot_options = NULL;
b1e6fc08 2594 int snapshot_flags = 0;
712e7874 2595
f3930ed0
KW
2596 assert(!child_role || !flags);
2597 assert(!child_role == !parent);
f67503e5 2598
ddf5636d
HR
2599 if (reference) {
2600 bool options_non_empty = options ? qdict_size(options) : false;
cb3e7f08 2601 qobject_unref(options);
ddf5636d 2602
ddf5636d
HR
2603 if (filename || options_non_empty) {
2604 error_setg(errp, "Cannot reference an existing block device with "
2605 "additional options or a new filename");
5b363937 2606 return NULL;
ddf5636d
HR
2607 }
2608
2609 bs = bdrv_lookup_bs(reference, reference, errp);
2610 if (!bs) {
5b363937 2611 return NULL;
ddf5636d 2612 }
76b22320 2613
ddf5636d 2614 bdrv_ref(bs);
5b363937 2615 return bs;
ddf5636d
HR
2616 }
2617
5b363937 2618 bs = bdrv_new();
f67503e5 2619
de9c0cec
KW
2620 /* NULL means an empty set of options */
2621 if (options == NULL) {
2622 options = qdict_new();
2623 }
2624
145f598e 2625 /* json: syntax counts as explicit options, as if in the QDict */
de3b53f0
KW
2626 parse_json_protocol(options, &filename, &local_err);
2627 if (local_err) {
de3b53f0
KW
2628 goto fail;
2629 }
2630
145f598e
KW
2631 bs->explicit_options = qdict_clone_shallow(options);
2632
f3930ed0 2633 if (child_role) {
bddcec37 2634 bs->inherits_from = parent;
8e2160e2
KW
2635 child_role->inherit_options(&flags, options,
2636 parent->open_flags, parent->options);
f3930ed0
KW
2637 }
2638
de3b53f0 2639 ret = bdrv_fill_options(&options, filename, &flags, &local_err);
462f5bcf
KW
2640 if (local_err) {
2641 goto fail;
2642 }
2643
129c7d1c
MA
2644 /*
2645 * Set the BDRV_O_RDWR and BDRV_O_ALLOW_RDWR flags.
2646 * Caution: getting a boolean member of @options requires care.
2647 * When @options come from -blockdev or blockdev_add, members are
2648 * typed according to the QAPI schema, but when they come from
2649 * -drive, they're all QString.
2650 */
f87a0e29
AG
2651 if (g_strcmp0(qdict_get_try_str(options, BDRV_OPT_READ_ONLY), "on") &&
2652 !qdict_get_try_bool(options, BDRV_OPT_READ_ONLY, false)) {
2653 flags |= (BDRV_O_RDWR | BDRV_O_ALLOW_RDWR);
2654 } else {
2655 flags &= ~BDRV_O_RDWR;
14499ea5
AG
2656 }
2657
2658 if (flags & BDRV_O_SNAPSHOT) {
2659 snapshot_options = qdict_new();
2660 bdrv_temp_snapshot_options(&snapshot_flags, snapshot_options,
2661 flags, options);
f87a0e29
AG
2662 /* Let bdrv_backing_options() override "read-only" */
2663 qdict_del(options, BDRV_OPT_READ_ONLY);
14499ea5
AG
2664 bdrv_backing_options(&flags, options, flags, options);
2665 }
2666
62392ebb
KW
2667 bs->open_flags = flags;
2668 bs->options = options;
2669 options = qdict_clone_shallow(options);
2670
76c591b0 2671 /* Find the right image format driver */
129c7d1c 2672 /* See cautionary note on accessing @options above */
76c591b0
KW
2673 drvname = qdict_get_try_str(options, "driver");
2674 if (drvname) {
2675 drv = bdrv_find_format(drvname);
76c591b0
KW
2676 if (!drv) {
2677 error_setg(errp, "Unknown driver: '%s'", drvname);
76c591b0
KW
2678 goto fail;
2679 }
2680 }
2681
2682 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 2683
129c7d1c 2684 /* See cautionary note on accessing @options above */
3e8c2e57 2685 backing = qdict_get_try_str(options, "backing");
e59a0cf1
HR
2686 if (qobject_to(QNull, qdict_get(options, "backing")) != NULL ||
2687 (backing && *backing == '\0'))
2688 {
4f7be280
HR
2689 if (backing) {
2690 warn_report("Use of \"backing\": \"\" is deprecated; "
2691 "use \"backing\": null instead");
2692 }
3e8c2e57
AG
2693 flags |= BDRV_O_NO_BACKING;
2694 qdict_del(options, "backing");
2695 }
2696
5696c6e3 2697 /* Open image file without format layer. This BlockBackend is only used for
4e4bf5c4
KW
2698 * probing, the block drivers will do their own bdrv_open_child() for the
2699 * same BDS, which is why we put the node name back into options. */
f4788adc 2700 if ((flags & BDRV_O_PROTOCOL) == 0) {
5696c6e3
KW
2701 BlockDriverState *file_bs;
2702
2703 file_bs = bdrv_open_child_bs(filename, options, "file", bs,
2704 &child_file, true, &local_err);
1fdd6933 2705 if (local_err) {
f4788adc
KW
2706 goto fail;
2707 }
5696c6e3 2708 if (file_bs != NULL) {
dacaa162
KW
2709 /* Not requesting BLK_PERM_CONSISTENT_READ because we're only
2710 * looking at the header to guess the image format. This works even
2711 * in cases where a guest would not see a consistent state. */
2712 file = blk_new(0, BLK_PERM_ALL);
d7086422 2713 blk_insert_bs(file, file_bs, &local_err);
5696c6e3 2714 bdrv_unref(file_bs);
d7086422
KW
2715 if (local_err) {
2716 goto fail;
2717 }
5696c6e3 2718
46f5ac20 2719 qdict_put_str(options, "file", bdrv_get_node_name(file_bs));
4e4bf5c4 2720 }
f500a6d3
KW
2721 }
2722
76c591b0 2723 /* Image format probing */
38f3ef57 2724 bs->probed = !drv;
76c591b0 2725 if (!drv && file) {
cf2ab8fc 2726 ret = find_image_format(file, filename, &drv, &local_err);
17b005f1 2727 if (ret < 0) {
8bfea15d 2728 goto fail;
2a05cbe4 2729 }
62392ebb
KW
2730 /*
2731 * This option update would logically belong in bdrv_fill_options(),
2732 * but we first need to open bs->file for the probing to work, while
2733 * opening bs->file already requires the (mostly) final set of options
2734 * so that cache mode etc. can be inherited.
2735 *
2736 * Adding the driver later is somewhat ugly, but it's not an option
2737 * that would ever be inherited, so it's correct. We just need to make
2738 * sure to update both bs->options (which has the full effective
2739 * options for bs) and options (which has file.* already removed).
2740 */
46f5ac20
EB
2741 qdict_put_str(bs->options, "driver", drv->format_name);
2742 qdict_put_str(options, "driver", drv->format_name);
76c591b0 2743 } else if (!drv) {
17b005f1 2744 error_setg(errp, "Must specify either driver or file");
8bfea15d 2745 goto fail;
ea2384d3 2746 }
b6ce07aa 2747
53a29513
HR
2748 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
2749 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
2750 /* file must be NULL if a protocol BDS is about to be created
2751 * (the inverse results in an error message from bdrv_open_common()) */
2752 assert(!(flags & BDRV_O_PROTOCOL) || !file);
2753
b6ce07aa 2754 /* Open the image */
82dc8b41 2755 ret = bdrv_open_common(bs, file, options, &local_err);
b6ce07aa 2756 if (ret < 0) {
8bfea15d 2757 goto fail;
6987307c
CH
2758 }
2759
4e4bf5c4 2760 if (file) {
5696c6e3 2761 blk_unref(file);
f500a6d3
KW
2762 file = NULL;
2763 }
2764
b6ce07aa 2765 /* If there is a backing file, use it */
9156df12 2766 if ((flags & BDRV_O_NO_BACKING) == 0) {
d9b7b057 2767 ret = bdrv_open_backing_file(bs, options, "backing", &local_err);
b6ce07aa 2768 if (ret < 0) {
b6ad491a 2769 goto close_and_fail;
b6ce07aa 2770 }
b6ce07aa
KW
2771 }
2772
50196d7a
AG
2773 /* Remove all children options and references
2774 * from bs->options and bs->explicit_options */
2f624b80
AG
2775 QLIST_FOREACH(child, &bs->children, next) {
2776 char *child_key_dot;
2777 child_key_dot = g_strdup_printf("%s.", child->name);
2778 qdict_extract_subqdict(bs->explicit_options, NULL, child_key_dot);
2779 qdict_extract_subqdict(bs->options, NULL, child_key_dot);
50196d7a
AG
2780 qdict_del(bs->explicit_options, child->name);
2781 qdict_del(bs->options, child->name);
2f624b80
AG
2782 g_free(child_key_dot);
2783 }
2784
91af7014
HR
2785 bdrv_refresh_filename(bs);
2786
b6ad491a 2787 /* Check if any unknown options were used */
7ad2757f 2788 if (qdict_size(options) != 0) {
b6ad491a 2789 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
2790 if (flags & BDRV_O_PROTOCOL) {
2791 error_setg(errp, "Block protocol '%s' doesn't support the option "
2792 "'%s'", drv->format_name, entry->key);
2793 } else {
d0e46a55
HR
2794 error_setg(errp,
2795 "Block format '%s' does not support the option '%s'",
2796 drv->format_name, entry->key);
5acd9d81 2797 }
b6ad491a 2798
b6ad491a
KW
2799 goto close_and_fail;
2800 }
b6ad491a 2801
c01c214b 2802 bdrv_parent_cb_change_media(bs, true);
b6ce07aa 2803
cb3e7f08 2804 qobject_unref(options);
8961be33 2805 options = NULL;
dd62f1ca
KW
2806
2807 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
2808 * temporary snapshot afterwards. */
2809 if (snapshot_flags) {
66836189
HR
2810 BlockDriverState *snapshot_bs;
2811 snapshot_bs = bdrv_append_temp_snapshot(bs, snapshot_flags,
2812 snapshot_options, &local_err);
73176bee 2813 snapshot_options = NULL;
dd62f1ca
KW
2814 if (local_err) {
2815 goto close_and_fail;
2816 }
5b363937
HR
2817 /* We are not going to return bs but the overlay on top of it
2818 * (snapshot_bs); thus, we have to drop the strong reference to bs
2819 * (which we obtained by calling bdrv_new()). bs will not be deleted,
2820 * though, because the overlay still has a reference to it. */
2821 bdrv_unref(bs);
2822 bs = snapshot_bs;
dd62f1ca
KW
2823 }
2824
5b363937 2825 return bs;
b6ce07aa 2826
8bfea15d 2827fail:
5696c6e3 2828 blk_unref(file);
cb3e7f08
MAL
2829 qobject_unref(snapshot_options);
2830 qobject_unref(bs->explicit_options);
2831 qobject_unref(bs->options);
2832 qobject_unref(options);
de9c0cec 2833 bs->options = NULL;
998cbd6a 2834 bs->explicit_options = NULL;
5b363937 2835 bdrv_unref(bs);
621ff94d 2836 error_propagate(errp, local_err);
5b363937 2837 return NULL;
de9c0cec 2838
b6ad491a 2839close_and_fail:
5b363937 2840 bdrv_unref(bs);
cb3e7f08
MAL
2841 qobject_unref(snapshot_options);
2842 qobject_unref(options);
621ff94d 2843 error_propagate(errp, local_err);
5b363937 2844 return NULL;
b6ce07aa
KW
2845}
2846
5b363937
HR
2847BlockDriverState *bdrv_open(const char *filename, const char *reference,
2848 QDict *options, int flags, Error **errp)
f3930ed0 2849{
5b363937 2850 return bdrv_open_inherit(filename, reference, options, flags, NULL,
ce343771 2851 NULL, errp);
f3930ed0
KW
2852}
2853
e971aa12
JC
2854/*
2855 * Adds a BlockDriverState to a simple queue for an atomic, transactional
2856 * reopen of multiple devices.
2857 *
2858 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
2859 * already performed, or alternatively may be NULL a new BlockReopenQueue will
2860 * be created and initialized. This newly created BlockReopenQueue should be
2861 * passed back in for subsequent calls that are intended to be of the same
2862 * atomic 'set'.
2863 *
2864 * bs is the BlockDriverState to add to the reopen queue.
2865 *
4d2cb092
KW
2866 * options contains the changed options for the associated bs
2867 * (the BlockReopenQueue takes ownership)
2868 *
e971aa12
JC
2869 * flags contains the open flags for the associated bs
2870 *
2871 * returns a pointer to bs_queue, which is either the newly allocated
2872 * bs_queue, or the existing bs_queue being used.
2873 *
1a63a907 2874 * bs must be drained between bdrv_reopen_queue() and bdrv_reopen_multiple().
e971aa12 2875 */
28518102
KW
2876static BlockReopenQueue *bdrv_reopen_queue_child(BlockReopenQueue *bs_queue,
2877 BlockDriverState *bs,
2878 QDict *options,
2879 int flags,
2880 const BdrvChildRole *role,
2881 QDict *parent_options,
2882 int parent_flags)
e971aa12
JC
2883{
2884 assert(bs != NULL);
2885
2886 BlockReopenQueueEntry *bs_entry;
67251a31 2887 BdrvChild *child;
145f598e 2888 QDict *old_options, *explicit_options;
67251a31 2889
1a63a907
KW
2890 /* Make sure that the caller remembered to use a drained section. This is
2891 * important to avoid graph changes between the recursive queuing here and
2892 * bdrv_reopen_multiple(). */
2893 assert(bs->quiesce_counter > 0);
2894
e971aa12
JC
2895 if (bs_queue == NULL) {
2896 bs_queue = g_new0(BlockReopenQueue, 1);
2897 QSIMPLEQ_INIT(bs_queue);
2898 }
2899
4d2cb092
KW
2900 if (!options) {
2901 options = qdict_new();
2902 }
2903
5b7ba05f
AG
2904 /* Check if this BlockDriverState is already in the queue */
2905 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
2906 if (bs == bs_entry->state.bs) {
2907 break;
2908 }
2909 }
2910
28518102
KW
2911 /*
2912 * Precedence of options:
2913 * 1. Explicitly passed in options (highest)
91a097e7 2914 * 2. Set in flags (only for top level)
145f598e 2915 * 3. Retained from explicitly set options of bs
8e2160e2 2916 * 4. Inherited from parent node
28518102
KW
2917 * 5. Retained from effective options of bs
2918 */
2919
91a097e7
KW
2920 if (!parent_options) {
2921 /*
2922 * Any setting represented by flags is always updated. If the
2923 * corresponding QDict option is set, it takes precedence. Otherwise
2924 * the flag is translated into a QDict option. The old setting of bs is
2925 * not considered.
2926 */
2927 update_options_from_flags(options, flags);
2928 }
2929
145f598e 2930 /* Old explicitly set values (don't overwrite by inherited value) */
5b7ba05f
AG
2931 if (bs_entry) {
2932 old_options = qdict_clone_shallow(bs_entry->state.explicit_options);
2933 } else {
2934 old_options = qdict_clone_shallow(bs->explicit_options);
2935 }
145f598e 2936 bdrv_join_options(bs, options, old_options);
cb3e7f08 2937 qobject_unref(old_options);
145f598e
KW
2938
2939 explicit_options = qdict_clone_shallow(options);
2940
28518102
KW
2941 /* Inherit from parent node */
2942 if (parent_options) {
1a529736
FZ
2943 QemuOpts *opts;
2944 QDict *options_copy;
28518102 2945 assert(!flags);
8e2160e2 2946 role->inherit_options(&flags, options, parent_flags, parent_options);
1a529736
FZ
2947 options_copy = qdict_clone_shallow(options);
2948 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
2949 qemu_opts_absorb_qdict(opts, options_copy, NULL);
2950 update_flags_from_options(&flags, opts);
2951 qemu_opts_del(opts);
cb3e7f08 2952 qobject_unref(options_copy);
28518102
KW
2953 }
2954
2955 /* Old values are used for options that aren't set yet */
4d2cb092 2956 old_options = qdict_clone_shallow(bs->options);
cddff5ba 2957 bdrv_join_options(bs, options, old_options);
cb3e7f08 2958 qobject_unref(old_options);
4d2cb092 2959
fd452021 2960 /* bdrv_open_inherit() sets and clears some additional flags internally */
f1f25a2e 2961 flags &= ~BDRV_O_PROTOCOL;
fd452021
KW
2962 if (flags & BDRV_O_RDWR) {
2963 flags |= BDRV_O_ALLOW_RDWR;
2964 }
f1f25a2e 2965
1857c97b
KW
2966 if (!bs_entry) {
2967 bs_entry = g_new0(BlockReopenQueueEntry, 1);
2968 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
2969 } else {
cb3e7f08
MAL
2970 qobject_unref(bs_entry->state.options);
2971 qobject_unref(bs_entry->state.explicit_options);
1857c97b
KW
2972 }
2973
2974 bs_entry->state.bs = bs;
2975 bs_entry->state.options = options;
2976 bs_entry->state.explicit_options = explicit_options;
2977 bs_entry->state.flags = flags;
2978
30450259
KW
2979 /* This needs to be overwritten in bdrv_reopen_prepare() */
2980 bs_entry->state.perm = UINT64_MAX;
2981 bs_entry->state.shared_perm = 0;
2982
67251a31 2983 QLIST_FOREACH(child, &bs->children, next) {
4c9dfe5d
KW
2984 QDict *new_child_options;
2985 char *child_key_dot;
67251a31 2986
4c9dfe5d
KW
2987 /* reopen can only change the options of block devices that were
2988 * implicitly created and inherited options. For other (referenced)
2989 * block devices, a syntax like "backing.foo" results in an error. */
67251a31
KW
2990 if (child->bs->inherits_from != bs) {
2991 continue;
2992 }
2993
4c9dfe5d 2994 child_key_dot = g_strdup_printf("%s.", child->name);
2f624b80 2995 qdict_extract_subqdict(explicit_options, NULL, child_key_dot);
4c9dfe5d
KW
2996 qdict_extract_subqdict(options, &new_child_options, child_key_dot);
2997 g_free(child_key_dot);
2998
28518102
KW
2999 bdrv_reopen_queue_child(bs_queue, child->bs, new_child_options, 0,
3000 child->role, options, flags);
e971aa12
JC
3001 }
3002
e971aa12
JC
3003 return bs_queue;
3004}
3005
28518102
KW
3006BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
3007 BlockDriverState *bs,
3008 QDict *options, int flags)
3009{
3010 return bdrv_reopen_queue_child(bs_queue, bs, options, flags,
3011 NULL, NULL, 0);
3012}
3013
e971aa12
JC
3014/*
3015 * Reopen multiple BlockDriverStates atomically & transactionally.
3016 *
3017 * The queue passed in (bs_queue) must have been built up previous
3018 * via bdrv_reopen_queue().
3019 *
3020 * Reopens all BDS specified in the queue, with the appropriate
3021 * flags. All devices are prepared for reopen, and failure of any
50d6a8a3 3022 * device will cause all device changes to be abandoned, and intermediate
e971aa12
JC
3023 * data cleaned up.
3024 *
3025 * If all devices prepare successfully, then the changes are committed
3026 * to all devices.
3027 *
1a63a907
KW
3028 * All affected nodes must be drained between bdrv_reopen_queue() and
3029 * bdrv_reopen_multiple().
e971aa12 3030 */
720150f3 3031int bdrv_reopen_multiple(AioContext *ctx, BlockReopenQueue *bs_queue, Error **errp)
e971aa12
JC
3032{
3033 int ret = -1;
3034 BlockReopenQueueEntry *bs_entry, *next;
3035 Error *local_err = NULL;
3036
3037 assert(bs_queue != NULL);
3038
e971aa12 3039 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1a63a907 3040 assert(bs_entry->state.bs->quiesce_counter > 0);
e971aa12
JC
3041 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
3042 error_propagate(errp, local_err);
3043 goto cleanup;
3044 }
3045 bs_entry->prepared = true;
3046 }
3047
3048 /* If we reach this point, we have success and just need to apply the
3049 * changes
3050 */
3051 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
3052 bdrv_reopen_commit(&bs_entry->state);
3053 }
3054
3055 ret = 0;
3056
3057cleanup:
3058 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
1bab38e7
AG
3059 if (ret) {
3060 if (bs_entry->prepared) {
3061 bdrv_reopen_abort(&bs_entry->state);
3062 }
cb3e7f08 3063 qobject_unref(bs_entry->state.explicit_options);
4c8350fe 3064 qobject_unref(bs_entry->state.options);
e971aa12
JC
3065 }
3066 g_free(bs_entry);
3067 }
3068 g_free(bs_queue);
40840e41 3069
e971aa12
JC
3070 return ret;
3071}
3072
3073
3074/* Reopen a single BlockDriverState with the specified flags. */
3075int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
3076{
3077 int ret = -1;
3078 Error *local_err = NULL;
1a63a907 3079 BlockReopenQueue *queue;
e971aa12 3080
1a63a907
KW
3081 bdrv_subtree_drained_begin(bs);
3082
3083 queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
720150f3 3084 ret = bdrv_reopen_multiple(bdrv_get_aio_context(bs), queue, &local_err);
e971aa12
JC
3085 if (local_err != NULL) {
3086 error_propagate(errp, local_err);
3087 }
1a63a907
KW
3088
3089 bdrv_subtree_drained_end(bs);
3090
e971aa12
JC
3091 return ret;
3092}
3093
30450259
KW
3094static BlockReopenQueueEntry *find_parent_in_reopen_queue(BlockReopenQueue *q,
3095 BdrvChild *c)
3096{
3097 BlockReopenQueueEntry *entry;
3098
3099 QSIMPLEQ_FOREACH(entry, q, entry) {
3100 BlockDriverState *bs = entry->state.bs;
3101 BdrvChild *child;
3102
3103 QLIST_FOREACH(child, &bs->children, next) {
3104 if (child == c) {
3105 return entry;
3106 }
3107 }
3108 }
3109
3110 return NULL;
3111}
3112
3113static void bdrv_reopen_perm(BlockReopenQueue *q, BlockDriverState *bs,
3114 uint64_t *perm, uint64_t *shared)
3115{
3116 BdrvChild *c;
3117 BlockReopenQueueEntry *parent;
3118 uint64_t cumulative_perms = 0;
3119 uint64_t cumulative_shared_perms = BLK_PERM_ALL;
3120
3121 QLIST_FOREACH(c, &bs->parents, next_parent) {
3122 parent = find_parent_in_reopen_queue(q, c);
3123 if (!parent) {
3124 cumulative_perms |= c->perm;
3125 cumulative_shared_perms &= c->shared_perm;
3126 } else {
3127 uint64_t nperm, nshared;
3128
3129 bdrv_child_perm(parent->state.bs, bs, c, c->role, q,
3130 parent->state.perm, parent->state.shared_perm,
3131 &nperm, &nshared);
3132
3133 cumulative_perms |= nperm;
3134 cumulative_shared_perms &= nshared;
3135 }
3136 }
3137 *perm = cumulative_perms;
3138 *shared = cumulative_shared_perms;
3139}
e971aa12
JC
3140
3141/*
3142 * Prepares a BlockDriverState for reopen. All changes are staged in the
3143 * 'opaque' field of the BDRVReopenState, which is used and allocated by
3144 * the block driver layer .bdrv_reopen_prepare()
3145 *
3146 * bs is the BlockDriverState to reopen
3147 * flags are the new open flags
3148 * queue is the reopen queue
3149 *
3150 * Returns 0 on success, non-zero on error. On error errp will be set
3151 * as well.
3152 *
3153 * On failure, bdrv_reopen_abort() will be called to clean up any data.
3154 * It is the responsibility of the caller to then call the abort() or
3155 * commit() for any other BDS that have been left in a prepare() state
3156 *
3157 */
3158int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
3159 Error **errp)
3160{
3161 int ret = -1;
3162 Error *local_err = NULL;
3163 BlockDriver *drv;
ccf9dc07 3164 QemuOpts *opts;
4c8350fe 3165 QDict *orig_reopen_opts;
593b3071 3166 char *discard = NULL;
3d8ce171 3167 bool read_only;
e971aa12
JC
3168
3169 assert(reopen_state != NULL);
3170 assert(reopen_state->bs->drv != NULL);
3171 drv = reopen_state->bs->drv;
3172
4c8350fe
AG
3173 /* This function and each driver's bdrv_reopen_prepare() remove
3174 * entries from reopen_state->options as they are processed, so
3175 * we need to make a copy of the original QDict. */
3176 orig_reopen_opts = qdict_clone_shallow(reopen_state->options);
3177
ccf9dc07
KW
3178 /* Process generic block layer options */
3179 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
3180 qemu_opts_absorb_qdict(opts, reopen_state->options, &local_err);
3181 if (local_err) {
3182 error_propagate(errp, local_err);
3183 ret = -EINVAL;
3184 goto error;
3185 }
3186
91a097e7
KW
3187 update_flags_from_options(&reopen_state->flags, opts);
3188
593b3071
AG
3189 discard = qemu_opt_get_del(opts, "discard");
3190 if (discard != NULL) {
3191 if (bdrv_parse_discard_flags(discard, &reopen_state->flags) != 0) {
3192 error_setg(errp, "Invalid discard option");
3193 ret = -EINVAL;
3194 goto error;
3195 }
3196 }
3197
543770bd
AG
3198 reopen_state->detect_zeroes =
3199 bdrv_parse_detect_zeroes(opts, reopen_state->flags, &local_err);
3200 if (local_err) {
3201 error_propagate(errp, local_err);
3202 ret = -EINVAL;
3203 goto error;
3204 }
3205
57f9db9a
AG
3206 /* All other options (including node-name and driver) must be unchanged.
3207 * Put them back into the QDict, so that they are checked at the end
3208 * of this function. */
3209 qemu_opts_to_qdict(opts, reopen_state->options);
ccf9dc07 3210
3d8ce171
JC
3211 /* If we are to stay read-only, do not allow permission change
3212 * to r/w. Attempting to set to r/w may fail if either BDRV_O_ALLOW_RDWR is
3213 * not set, or if the BDS still has copy_on_read enabled */
3214 read_only = !(reopen_state->flags & BDRV_O_RDWR);
54a32bfe 3215 ret = bdrv_can_set_read_only(reopen_state->bs, read_only, true, &local_err);
3d8ce171
JC
3216 if (local_err) {
3217 error_propagate(errp, local_err);
e971aa12
JC
3218 goto error;
3219 }
3220
30450259
KW
3221 /* Calculate required permissions after reopening */
3222 bdrv_reopen_perm(queue, reopen_state->bs,
3223 &reopen_state->perm, &reopen_state->shared_perm);
e971aa12
JC
3224
3225 ret = bdrv_flush(reopen_state->bs);
3226 if (ret) {
455b0fde 3227 error_setg_errno(errp, -ret, "Error flushing drive");
e971aa12
JC
3228 goto error;
3229 }
3230
3231 if (drv->bdrv_reopen_prepare) {
3232 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
3233 if (ret) {
3234 if (local_err != NULL) {
3235 error_propagate(errp, local_err);
3236 } else {
d8b6895f
LC
3237 error_setg(errp, "failed while preparing to reopen image '%s'",
3238 reopen_state->bs->filename);
e971aa12
JC
3239 }
3240 goto error;
3241 }
3242 } else {
3243 /* It is currently mandatory to have a bdrv_reopen_prepare()
3244 * handler for each supported drv. */
81e5f78a
AG
3245 error_setg(errp, "Block format '%s' used by node '%s' "
3246 "does not support reopening files", drv->format_name,
3247 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
3248 ret = -1;
3249 goto error;
3250 }
3251
4d2cb092
KW
3252 /* Options that are not handled are only okay if they are unchanged
3253 * compared to the old state. It is expected that some options are only
3254 * used for the initial open, but not reopen (e.g. filename) */
3255 if (qdict_size(reopen_state->options)) {
3256 const QDictEntry *entry = qdict_first(reopen_state->options);
3257
3258 do {
54fd1b0d
HR
3259 QObject *new = entry->value;
3260 QObject *old = qdict_get(reopen_state->bs->options, entry->key);
3261
db905283
AG
3262 /* Allow child references (child_name=node_name) as long as they
3263 * point to the current child (i.e. everything stays the same). */
3264 if (qobject_type(new) == QTYPE_QSTRING) {
3265 BdrvChild *child;
3266 QLIST_FOREACH(child, &reopen_state->bs->children, next) {
3267 if (!strcmp(child->name, entry->key)) {
3268 break;
3269 }
3270 }
3271
3272 if (child) {
3273 const char *str = qobject_get_try_str(new);
3274 if (!strcmp(child->bs->node_name, str)) {
3275 continue; /* Found child with this name, skip option */
3276 }
3277 }
3278 }
3279
129c7d1c 3280 /*
54fd1b0d
HR
3281 * TODO: When using -drive to specify blockdev options, all values
3282 * will be strings; however, when using -blockdev, blockdev-add or
3283 * filenames using the json:{} pseudo-protocol, they will be
3284 * correctly typed.
3285 * In contrast, reopening options are (currently) always strings
3286 * (because you can only specify them through qemu-io; all other
3287 * callers do not specify any options).
3288 * Therefore, when using anything other than -drive to create a BDS,
3289 * this cannot detect non-string options as unchanged, because
3290 * qobject_is_equal() always returns false for objects of different
3291 * type. In the future, this should be remedied by correctly typing
3292 * all options. For now, this is not too big of an issue because
3293 * the user can simply omit options which cannot be changed anyway,
3294 * so they will stay unchanged.
129c7d1c 3295 */
54fd1b0d 3296 if (!qobject_is_equal(new, old)) {
4d2cb092
KW
3297 error_setg(errp, "Cannot change the option '%s'", entry->key);
3298 ret = -EINVAL;
3299 goto error;
3300 }
3301 } while ((entry = qdict_next(reopen_state->options, entry)));
3302 }
3303
30450259
KW
3304 ret = bdrv_check_perm(reopen_state->bs, queue, reopen_state->perm,
3305 reopen_state->shared_perm, NULL, errp);
3306 if (ret < 0) {
3307 goto error;
3308 }
3309
e971aa12
JC
3310 ret = 0;
3311
4c8350fe
AG
3312 /* Restore the original reopen_state->options QDict */
3313 qobject_unref(reopen_state->options);
3314 reopen_state->options = qobject_ref(orig_reopen_opts);
3315
e971aa12 3316error:
ccf9dc07 3317 qemu_opts_del(opts);
4c8350fe 3318 qobject_unref(orig_reopen_opts);
593b3071 3319 g_free(discard);
e971aa12
JC
3320 return ret;
3321}
3322
3323/*
3324 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
3325 * makes them final by swapping the staging BlockDriverState contents into
3326 * the active BlockDriverState contents.
3327 */
3328void bdrv_reopen_commit(BDRVReopenState *reopen_state)
3329{
3330 BlockDriver *drv;
50bf65ba 3331 BlockDriverState *bs;
50196d7a 3332 BdrvChild *child;
cb9ff6c2 3333 bool old_can_write, new_can_write;
e971aa12
JC
3334
3335 assert(reopen_state != NULL);
50bf65ba
VSO
3336 bs = reopen_state->bs;
3337 drv = bs->drv;
e971aa12
JC
3338 assert(drv != NULL);
3339
cb9ff6c2
VSO
3340 old_can_write =
3341 !bdrv_is_read_only(bs) && !(bdrv_get_flags(bs) & BDRV_O_INACTIVE);
3342
e971aa12
JC
3343 /* If there are any driver level actions to take */
3344 if (drv->bdrv_reopen_commit) {
3345 drv->bdrv_reopen_commit(reopen_state);
3346 }
3347
3348 /* set BDS specific flags now */
cb3e7f08 3349 qobject_unref(bs->explicit_options);
4c8350fe 3350 qobject_unref(bs->options);
145f598e 3351
50bf65ba 3352 bs->explicit_options = reopen_state->explicit_options;
4c8350fe 3353 bs->options = reopen_state->options;
50bf65ba
VSO
3354 bs->open_flags = reopen_state->flags;
3355 bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
543770bd 3356 bs->detect_zeroes = reopen_state->detect_zeroes;
355ef4ac 3357
50196d7a
AG
3358 /* Remove child references from bs->options and bs->explicit_options.
3359 * Child options were already removed in bdrv_reopen_queue_child() */
3360 QLIST_FOREACH(child, &bs->children, next) {
3361 qdict_del(bs->explicit_options, child->name);
3362 qdict_del(bs->options, child->name);
3363 }
3364
50bf65ba 3365 bdrv_refresh_limits(bs, NULL);
cb9ff6c2 3366
30450259
KW
3367 bdrv_set_perm(reopen_state->bs, reopen_state->perm,
3368 reopen_state->shared_perm);
3369
cb9ff6c2
VSO
3370 new_can_write =
3371 !bdrv_is_read_only(bs) && !(bdrv_get_flags(bs) & BDRV_O_INACTIVE);
3372 if (!old_can_write && new_can_write && drv->bdrv_reopen_bitmaps_rw) {
3373 Error *local_err = NULL;
3374 if (drv->bdrv_reopen_bitmaps_rw(bs, &local_err) < 0) {
3375 /* This is not fatal, bitmaps just left read-only, so all following
3376 * writes will fail. User can remove read-only bitmaps to unblock
3377 * writes.
3378 */
3379 error_reportf_err(local_err,
3380 "%s: Failed to make dirty bitmaps writable: ",
3381 bdrv_get_node_name(bs));
3382 }
3383 }
e971aa12
JC
3384}
3385
3386/*
3387 * Abort the reopen, and delete and free the staged changes in
3388 * reopen_state
3389 */
3390void bdrv_reopen_abort(BDRVReopenState *reopen_state)
3391{
3392 BlockDriver *drv;
3393
3394 assert(reopen_state != NULL);
3395 drv = reopen_state->bs->drv;
3396 assert(drv != NULL);
3397
3398 if (drv->bdrv_reopen_abort) {
3399 drv->bdrv_reopen_abort(reopen_state);
3400 }
145f598e 3401
30450259 3402 bdrv_abort_perm_update(reopen_state->bs);
e971aa12
JC
3403}
3404
3405
64dff520 3406static void bdrv_close(BlockDriverState *bs)
fc01f7e7 3407{
33384421 3408 BdrvAioNotifier *ban, *ban_next;
50a3efb0 3409 BdrvChild *child, *next;
33384421 3410
ca9bd24c 3411 assert(!bs->job);
30f55fb8 3412 assert(!bs->refcnt);
99b7e775 3413
fc27291d 3414 bdrv_drained_begin(bs); /* complete I/O */
58fda173 3415 bdrv_flush(bs);
53ec73e2 3416 bdrv_drain(bs); /* in case flush left pending I/O */
fc27291d 3417
3cbc002c 3418 if (bs->drv) {
3c005293
VSO
3419 if (bs->drv->bdrv_close) {
3420 bs->drv->bdrv_close(bs);
3421 }
9a4f4c31 3422 bs->drv = NULL;
50a3efb0 3423 }
9a7dedbc 3424
50a3efb0 3425 bdrv_set_backing_hd(bs, NULL, &error_abort);
9a7dedbc 3426
50a3efb0
AG
3427 if (bs->file != NULL) {
3428 bdrv_unref_child(bs, bs->file);
3429 bs->file = NULL;
3430 }
9a4f4c31 3431
50a3efb0
AG
3432 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
3433 /* TODO Remove bdrv_unref() from drivers' close function and use
3434 * bdrv_unref_child() here */
3435 if (child->bs->inherits_from == bs) {
3436 child->bs->inherits_from = NULL;
6e93e7c4 3437 }
50a3efb0 3438 bdrv_detach_child(child);
b338082b 3439 }
98f90dba 3440
50a3efb0
AG
3441 g_free(bs->opaque);
3442 bs->opaque = NULL;
3443 atomic_set(&bs->copy_on_read, 0);
3444 bs->backing_file[0] = '\0';
3445 bs->backing_format[0] = '\0';
3446 bs->total_sectors = 0;
3447 bs->encrypted = false;
3448 bs->sg = false;
cb3e7f08
MAL
3449 qobject_unref(bs->options);
3450 qobject_unref(bs->explicit_options);
50a3efb0
AG
3451 bs->options = NULL;
3452 bs->explicit_options = NULL;
cb3e7f08 3453 qobject_unref(bs->full_open_options);
50a3efb0
AG
3454 bs->full_open_options = NULL;
3455
cca43ae1
VSO
3456 bdrv_release_named_dirty_bitmaps(bs);
3457 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
3458
33384421
HR
3459 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
3460 g_free(ban);
3461 }
3462 QLIST_INIT(&bs->aio_notifiers);
fc27291d 3463 bdrv_drained_end(bs);
b338082b
FB
3464}
3465
2bc93fed
MK
3466void bdrv_close_all(void)
3467{
b3b5299d 3468 assert(job_next(NULL) == NULL);
cd7fca95 3469 nbd_export_close_all();
ca9bd24c
HR
3470
3471 /* Drop references from requests still in flight, such as canceled block
3472 * jobs whose AIO context has not been polled yet */
3473 bdrv_drain_all();
2bc93fed 3474
ca9bd24c
HR
3475 blk_remove_all_bs();
3476 blockdev_close_all_bdrv_states();
ed78cda3 3477
a1a2af07 3478 assert(QTAILQ_EMPTY(&all_bdrv_states));
2bc93fed
MK
3479}
3480
d0ac0380
KW
3481static bool should_update_child(BdrvChild *c, BlockDriverState *to)
3482{
3483 BdrvChild *to_c;
3484
3485 if (c->role->stay_at_node) {
3486 return false;
3487 }
3488
ec9f10fe
HR
3489 /* If the child @c belongs to the BDS @to, replacing the current
3490 * c->bs by @to would mean to create a loop.
3491 *
3492 * Such a case occurs when appending a BDS to a backing chain.
3493 * For instance, imagine the following chain:
3494 *
3495 * guest device -> node A -> further backing chain...
3496 *
3497 * Now we create a new BDS B which we want to put on top of this
3498 * chain, so we first attach A as its backing node:
3499 *
3500 * node B
3501 * |
3502 * v
3503 * guest device -> node A -> further backing chain...
3504 *
3505 * Finally we want to replace A by B. When doing that, we want to
3506 * replace all pointers to A by pointers to B -- except for the
3507 * pointer from B because (1) that would create a loop, and (2)
3508 * that pointer should simply stay intact:
3509 *
3510 * guest device -> node B
3511 * |
3512 * v
3513 * node A -> further backing chain...
3514 *
3515 * In general, when replacing a node A (c->bs) by a node B (@to),
3516 * if A is a child of B, that means we cannot replace A by B there
3517 * because that would create a loop. Silently detaching A from B
3518 * is also not really an option. So overall just leaving A in
3519 * place there is the most sensible choice. */
3520 QLIST_FOREACH(to_c, &to->children, next) {
3521 if (to_c == c) {
d0ac0380
KW
3522 return false;
3523 }
3524 }
3525
3526 return true;
3527}
3528
5fe31c25
KW
3529void bdrv_replace_node(BlockDriverState *from, BlockDriverState *to,
3530 Error **errp)
dd62f1ca 3531{
d0ac0380 3532 BdrvChild *c, *next;
234ac1a9
KW
3533 GSList *list = NULL, *p;
3534 uint64_t old_perm, old_shared;
3535 uint64_t perm = 0, shared = BLK_PERM_ALL;
3536 int ret;
3537
5fe31c25
KW
3538 assert(!atomic_read(&from->in_flight));
3539 assert(!atomic_read(&to->in_flight));
dd62f1ca 3540
234ac1a9
KW
3541 /* Make sure that @from doesn't go away until we have successfully attached
3542 * all of its parents to @to. */
3543 bdrv_ref(from);
dd62f1ca 3544
234ac1a9 3545 /* Put all parents into @list and calculate their cumulative permissions */
dd62f1ca 3546 QLIST_FOREACH_SAFE(c, &from->parents, next_parent, next) {
ec9f10fe 3547 assert(c->bs == from);
d0ac0380 3548 if (!should_update_child(c, to)) {
26de9438
KW
3549 continue;
3550 }
234ac1a9
KW
3551 list = g_slist_prepend(list, c);
3552 perm |= c->perm;
3553 shared &= c->shared_perm;
3554 }
3555
3556 /* Check whether the required permissions can be granted on @to, ignoring
3557 * all BdrvChild in @list so that they can't block themselves. */
3121fb45 3558 ret = bdrv_check_update_perm(to, NULL, perm, shared, list, errp);
234ac1a9
KW
3559 if (ret < 0) {
3560 bdrv_abort_perm_update(to);
3561 goto out;
3562 }
3563
3564 /* Now actually perform the change. We performed the permission check for
3565 * all elements of @list at once, so set the permissions all at once at the
3566 * very end. */
3567 for (p = list; p != NULL; p = p->next) {
3568 c = p->data;
9bd910e2 3569
dd62f1ca 3570 bdrv_ref(to);
234ac1a9 3571 bdrv_replace_child_noperm(c, to);
dd62f1ca
KW
3572 bdrv_unref(from);
3573 }
234ac1a9
KW
3574
3575 bdrv_get_cumulative_perm(to, &old_perm, &old_shared);
3576 bdrv_set_perm(to, old_perm | perm, old_shared | shared);
3577
3578out:
3579 g_slist_free(list);
3580 bdrv_unref(from);
dd62f1ca
KW
3581}
3582
4ddc07ca
PB
3583/*
3584 * Add new bs contents at the top of an image chain while the chain is
3585 * live, while keeping required fields on the top layer.
3586 *
3587 * This will modify the BlockDriverState fields, and swap contents
3588 * between bs_new and bs_top. Both bs_new and bs_top are modified.
3589 *
bfb197e0 3590 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
3591 *
3592 * This function does not create any image files.
dd62f1ca
KW
3593 *
3594 * bdrv_append() takes ownership of a bs_new reference and unrefs it because
3595 * that's what the callers commonly need. bs_new will be referenced by the old
3596 * parents of bs_top after bdrv_append() returns. If the caller needs to keep a
3597 * reference of its own, it must call bdrv_ref().
4ddc07ca 3598 */
b2c2832c
KW
3599void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top,
3600 Error **errp)
4ddc07ca 3601{
b2c2832c
KW
3602 Error *local_err = NULL;
3603
b2c2832c
KW
3604 bdrv_set_backing_hd(bs_new, bs_top, &local_err);
3605 if (local_err) {
3606 error_propagate(errp, local_err);
3607 goto out;
3608 }
dd62f1ca 3609
5fe31c25 3610 bdrv_replace_node(bs_top, bs_new, &local_err);
234ac1a9
KW
3611 if (local_err) {
3612 error_propagate(errp, local_err);
3613 bdrv_set_backing_hd(bs_new, NULL, &error_abort);
3614 goto out;
3615 }
4ddc07ca 3616
dd62f1ca
KW
3617 /* bs_new is now referenced by its new parents, we don't need the
3618 * additional reference any more. */
b2c2832c 3619out:
dd62f1ca 3620 bdrv_unref(bs_new);
8802d1fd
JC
3621}
3622
4f6fd349 3623static void bdrv_delete(BlockDriverState *bs)
b338082b 3624{
3e914655 3625 assert(!bs->job);
3718d8ab 3626 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 3627 assert(!bs->refcnt);
18846dee 3628
e1b5c52e
SH
3629 bdrv_close(bs);
3630
1b7bdbc1 3631 /* remove from list, if necessary */
63eaaae0
KW
3632 if (bs->node_name[0] != '\0') {
3633 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
3634 }
2c1d04e0
HR
3635 QTAILQ_REMOVE(&all_bdrv_states, bs, bs_list);
3636
7267c094 3637 g_free(bs);
fc01f7e7
FB
3638}
3639
e97fc193
AL
3640/*
3641 * Run consistency checks on an image
3642 *
e076f338 3643 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 3644 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 3645 * check are stored in res.
e97fc193 3646 */
2fd61638
PB
3647static int coroutine_fn bdrv_co_check(BlockDriverState *bs,
3648 BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 3649{
908bcd54
HR
3650 if (bs->drv == NULL) {
3651 return -ENOMEDIUM;
3652 }
2fd61638 3653 if (bs->drv->bdrv_co_check == NULL) {
e97fc193
AL
3654 return -ENOTSUP;
3655 }
3656
e076f338 3657 memset(res, 0, sizeof(*res));
2fd61638
PB
3658 return bs->drv->bdrv_co_check(bs, res, fix);
3659}
3660
3661typedef struct CheckCo {
3662 BlockDriverState *bs;
3663 BdrvCheckResult *res;
3664 BdrvCheckMode fix;
3665 int ret;
3666} CheckCo;
3667
3668static void bdrv_check_co_entry(void *opaque)
3669{
3670 CheckCo *cco = opaque;
3671 cco->ret = bdrv_co_check(cco->bs, cco->res, cco->fix);
3672}
3673
3674int bdrv_check(BlockDriverState *bs,
3675 BdrvCheckResult *res, BdrvCheckMode fix)
3676{
3677 Coroutine *co;
3678 CheckCo cco = {
3679 .bs = bs,
3680 .res = res,
3681 .ret = -EINPROGRESS,
3682 .fix = fix,
3683 };
3684
3685 if (qemu_in_coroutine()) {
3686 /* Fast-path if already in coroutine context */
3687 bdrv_check_co_entry(&cco);
3688 } else {
3689 co = qemu_coroutine_create(bdrv_check_co_entry, &cco);
3690 qemu_coroutine_enter(co);
3691 BDRV_POLL_WHILE(bs, cco.ret == -EINPROGRESS);
3692 }
3693
3694 return cco.ret;
e97fc193
AL
3695}
3696
756e6736
KW
3697/*
3698 * Return values:
3699 * 0 - success
3700 * -EINVAL - backing format specified, but no file
3701 * -ENOSPC - can't update the backing file because no space is left in the
3702 * image file header
3703 * -ENOTSUP - format driver doesn't support changing the backing file
3704 */
3705int bdrv_change_backing_file(BlockDriverState *bs,
3706 const char *backing_file, const char *backing_fmt)
3707{
3708 BlockDriver *drv = bs->drv;
469ef350 3709 int ret;
756e6736 3710
d470ad42
HR
3711 if (!drv) {
3712 return -ENOMEDIUM;
3713 }
3714
5f377794
PB
3715 /* Backing file format doesn't make sense without a backing file */
3716 if (backing_fmt && !backing_file) {
3717 return -EINVAL;
3718 }
3719
756e6736 3720 if (drv->bdrv_change_backing_file != NULL) {
469ef350 3721 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 3722 } else {
469ef350 3723 ret = -ENOTSUP;
756e6736 3724 }
469ef350
PB
3725
3726 if (ret == 0) {
3727 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
3728 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
3729 }
3730 return ret;
756e6736
KW
3731}
3732
6ebdcee2
JC
3733/*
3734 * Finds the image layer in the chain that has 'bs' as its backing file.
3735 *
3736 * active is the current topmost image.
3737 *
3738 * Returns NULL if bs is not found in active's image chain,
3739 * or if active == bs.
4caf0fcd
JC
3740 *
3741 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
3742 */
3743BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
3744 BlockDriverState *bs)
3745{
760e0063
KW
3746 while (active && bs != backing_bs(active)) {
3747 active = backing_bs(active);
6ebdcee2
JC
3748 }
3749
4caf0fcd
JC
3750 return active;
3751}
6ebdcee2 3752
4caf0fcd
JC
3753/* Given a BDS, searches for the base layer. */
3754BlockDriverState *bdrv_find_base(BlockDriverState *bs)
3755{
3756 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
3757}
3758
6ebdcee2
JC
3759/*
3760 * Drops images above 'base' up to and including 'top', and sets the image
3761 * above 'top' to have base as its backing file.
3762 *
3763 * Requires that the overlay to 'top' is opened r/w, so that the backing file
3764 * information in 'bs' can be properly updated.
3765 *
3766 * E.g., this will convert the following chain:
3767 * bottom <- base <- intermediate <- top <- active
3768 *
3769 * to
3770 *
3771 * bottom <- base <- active
3772 *
3773 * It is allowed for bottom==base, in which case it converts:
3774 *
3775 * base <- intermediate <- top <- active
3776 *
3777 * to
3778 *
3779 * base <- active
3780 *
54e26900
JC
3781 * If backing_file_str is non-NULL, it will be used when modifying top's
3782 * overlay image metadata.
3783 *
6ebdcee2
JC
3784 * Error conditions:
3785 * if active == top, that is considered an error
3786 *
3787 */
bde70715
KW
3788int bdrv_drop_intermediate(BlockDriverState *top, BlockDriverState *base,
3789 const char *backing_file_str)
6ebdcee2 3790{
61f09cea 3791 BdrvChild *c, *next;
12fa4af6 3792 Error *local_err = NULL;
6ebdcee2
JC
3793 int ret = -EIO;
3794
6858eba0
KW
3795 bdrv_ref(top);
3796
6ebdcee2
JC
3797 if (!top->drv || !base->drv) {
3798 goto exit;
3799 }
3800
5db15a57
KW
3801 /* Make sure that base is in the backing chain of top */
3802 if (!bdrv_chain_contains(top, base)) {
6ebdcee2
JC
3803 goto exit;
3804 }
3805
3806 /* success - we can delete the intermediate states, and link top->base */
bde70715
KW
3807 /* TODO Check graph modification op blockers (BLK_PERM_GRAPH_MOD) once
3808 * we've figured out how they should work. */
61f09cea
KW
3809 backing_file_str = backing_file_str ? backing_file_str : base->filename;
3810
3811 QLIST_FOREACH_SAFE(c, &top->parents, next_parent, next) {
3812 /* Check whether we are allowed to switch c from top to base */
3813 GSList *ignore_children = g_slist_prepend(NULL, c);
3814 bdrv_check_update_perm(base, NULL, c->perm, c->shared_perm,
3815 ignore_children, &local_err);
2c860e79 3816 g_slist_free(ignore_children);
61f09cea
KW
3817 if (local_err) {
3818 ret = -EPERM;
3819 error_report_err(local_err);
6858eba0
KW
3820 goto exit;
3821 }
12fa4af6 3822
61f09cea
KW
3823 /* If so, update the backing file path in the image file */
3824 if (c->role->update_filename) {
3825 ret = c->role->update_filename(c, base, backing_file_str,
3826 &local_err);
3827 if (ret < 0) {
3828 bdrv_abort_perm_update(base);
3829 error_report_err(local_err);
3830 goto exit;
3831 }
3832 }
3833
3834 /* Do the actual switch in the in-memory graph.
3835 * Completes bdrv_check_update_perm() transaction internally. */
3836 bdrv_ref(base);
3837 bdrv_replace_child(c, base);
3838 bdrv_unref(top);
12fa4af6 3839 }
6ebdcee2 3840
6ebdcee2 3841 ret = 0;
6ebdcee2 3842exit:
6858eba0 3843 bdrv_unref(top);
6ebdcee2
JC
3844 return ret;
3845}
3846
61007b31
SH
3847/**
3848 * Length of a allocated file in bytes. Sparse files are counted by actual
3849 * allocated space. Return < 0 if error or unknown.
3850 */
3851int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 3852{
61007b31
SH
3853 BlockDriver *drv = bs->drv;
3854 if (!drv) {
3855 return -ENOMEDIUM;
8f4754ed 3856 }
61007b31
SH
3857 if (drv->bdrv_get_allocated_file_size) {
3858 return drv->bdrv_get_allocated_file_size(bs);
3859 }
3860 if (bs->file) {
9a4f4c31 3861 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 3862 }
61007b31 3863 return -ENOTSUP;
1c9805a3 3864}
e7a8a783 3865
90880ff1
SH
3866/*
3867 * bdrv_measure:
3868 * @drv: Format driver
3869 * @opts: Creation options for new image
3870 * @in_bs: Existing image containing data for new image (may be NULL)
3871 * @errp: Error object
3872 * Returns: A #BlockMeasureInfo (free using qapi_free_BlockMeasureInfo())
3873 * or NULL on error
3874 *
3875 * Calculate file size required to create a new image.
3876 *
3877 * If @in_bs is given then space for allocated clusters and zero clusters
3878 * from that image are included in the calculation. If @opts contains a
3879 * backing file that is shared by @in_bs then backing clusters may be omitted
3880 * from the calculation.
3881 *
3882 * If @in_bs is NULL then the calculation includes no allocated clusters
3883 * unless a preallocation option is given in @opts.
3884 *
3885 * Note that @in_bs may use a different BlockDriver from @drv.
3886 *
3887 * If an error occurs the @errp pointer is set.
3888 */
3889BlockMeasureInfo *bdrv_measure(BlockDriver *drv, QemuOpts *opts,
3890 BlockDriverState *in_bs, Error **errp)
3891{
3892 if (!drv->bdrv_measure) {
3893 error_setg(errp, "Block driver '%s' does not support size measurement",
3894 drv->format_name);
3895 return NULL;
3896 }
3897
3898 return drv->bdrv_measure(opts, in_bs, errp);
3899}
3900
61007b31
SH
3901/**
3902 * Return number of sectors on success, -errno on error.
1c9805a3 3903 */
61007b31 3904int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 3905{
61007b31 3906 BlockDriver *drv = bs->drv;
498e386c 3907
61007b31
SH
3908 if (!drv)
3909 return -ENOMEDIUM;
2572b37a 3910
61007b31
SH
3911 if (drv->has_variable_length) {
3912 int ret = refresh_total_sectors(bs, bs->total_sectors);
3913 if (ret < 0) {
3914 return ret;
1c9805a3
SH
3915 }
3916 }
61007b31 3917 return bs->total_sectors;
1c9805a3 3918}
b338082b 3919
61007b31
SH
3920/**
3921 * Return length in bytes on success, -errno on error.
3922 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 3923 */
61007b31 3924int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 3925{
61007b31 3926 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 3927
4a9c9ea0 3928 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 3929 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
3930}
3931
61007b31
SH
3932/* return 0 as number of sectors if no device present or error */
3933void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 3934{
61007b31 3935 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 3936
61007b31 3937 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
3938}
3939
54115412 3940bool bdrv_is_sg(BlockDriverState *bs)
f08145fe 3941{
61007b31 3942 return bs->sg;
f08145fe
KW
3943}
3944
54115412 3945bool bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 3946{
760e0063 3947 if (bs->backing && bs->backing->bs->encrypted) {
54115412 3948 return true;
760e0063 3949 }
61007b31 3950 return bs->encrypted;
fc3959e4
FZ
3951}
3952
61007b31 3953const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 3954{
61007b31 3955 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
3956}
3957
61007b31 3958static int qsort_strcmp(const void *a, const void *b)
40b4f539 3959{
ceff5bd7 3960 return strcmp(*(char *const *)a, *(char *const *)b);
40b4f539
KW
3961}
3962
61007b31
SH
3963void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
3964 void *opaque)
40b4f539 3965{
61007b31
SH
3966 BlockDriver *drv;
3967 int count = 0;
3968 int i;
3969 const char **formats = NULL;
40b4f539 3970
61007b31
SH
3971 QLIST_FOREACH(drv, &bdrv_drivers, list) {
3972 if (drv->format_name) {
3973 bool found = false;
3974 int i = count;
3975 while (formats && i && !found) {
3976 found = !strcmp(formats[--i], drv->format_name);
3977 }
e2a305fb 3978
61007b31
SH
3979 if (!found) {
3980 formats = g_renew(const char *, formats, count + 1);
3981 formats[count++] = drv->format_name;
3982 }
6c5a42ac 3983 }
61007b31 3984 }
6c5a42ac 3985
eb0df69f
HR
3986 for (i = 0; i < (int)ARRAY_SIZE(block_driver_modules); i++) {
3987 const char *format_name = block_driver_modules[i].format_name;
3988
3989 if (format_name) {
3990 bool found = false;
3991 int j = count;
3992
3993 while (formats && j && !found) {
3994 found = !strcmp(formats[--j], format_name);
3995 }
3996
3997 if (!found) {
3998 formats = g_renew(const char *, formats, count + 1);
3999 formats[count++] = format_name;
4000 }
4001 }
4002 }
4003
61007b31 4004 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 4005
61007b31
SH
4006 for (i = 0; i < count; i++) {
4007 it(opaque, formats[i]);
4008 }
40b4f539 4009
61007b31
SH
4010 g_free(formats);
4011}
40b4f539 4012
61007b31
SH
4013/* This function is to find a node in the bs graph */
4014BlockDriverState *bdrv_find_node(const char *node_name)
4015{
4016 BlockDriverState *bs;
391827eb 4017
61007b31 4018 assert(node_name);
40b4f539 4019
61007b31
SH
4020 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
4021 if (!strcmp(node_name, bs->node_name)) {
4022 return bs;
40b4f539
KW
4023 }
4024 }
61007b31 4025 return NULL;
40b4f539
KW
4026}
4027
61007b31
SH
4028/* Put this QMP function here so it can access the static graph_bdrv_states. */
4029BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 4030{
61007b31
SH
4031 BlockDeviceInfoList *list, *entry;
4032 BlockDriverState *bs;
40b4f539 4033
61007b31
SH
4034 list = NULL;
4035 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
c83f9fba 4036 BlockDeviceInfo *info = bdrv_block_device_info(NULL, bs, errp);
61007b31
SH
4037 if (!info) {
4038 qapi_free_BlockDeviceInfoList(list);
4039 return NULL;
301db7c2 4040 }
61007b31
SH
4041 entry = g_malloc0(sizeof(*entry));
4042 entry->value = info;
4043 entry->next = list;
4044 list = entry;
301db7c2
RH
4045 }
4046
61007b31
SH
4047 return list;
4048}
40b4f539 4049
61007b31
SH
4050BlockDriverState *bdrv_lookup_bs(const char *device,
4051 const char *node_name,
4052 Error **errp)
4053{
4054 BlockBackend *blk;
4055 BlockDriverState *bs;
40b4f539 4056
61007b31
SH
4057 if (device) {
4058 blk = blk_by_name(device);
40b4f539 4059
61007b31 4060 if (blk) {
9f4ed6fb
AG
4061 bs = blk_bs(blk);
4062 if (!bs) {
5433c24f 4063 error_setg(errp, "Device '%s' has no medium", device);
5433c24f
HR
4064 }
4065
9f4ed6fb 4066 return bs;
61007b31
SH
4067 }
4068 }
40b4f539 4069
61007b31
SH
4070 if (node_name) {
4071 bs = bdrv_find_node(node_name);
6d519a5f 4072
61007b31
SH
4073 if (bs) {
4074 return bs;
4075 }
40b4f539
KW
4076 }
4077
61007b31
SH
4078 error_setg(errp, "Cannot find device=%s nor node_name=%s",
4079 device ? device : "",
4080 node_name ? node_name : "");
4081 return NULL;
40b4f539
KW
4082}
4083
61007b31
SH
4084/* If 'base' is in the same chain as 'top', return true. Otherwise,
4085 * return false. If either argument is NULL, return false. */
4086bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 4087{
61007b31 4088 while (top && top != base) {
760e0063 4089 top = backing_bs(top);
02c50efe 4090 }
61007b31
SH
4091
4092 return top != NULL;
02c50efe
FZ
4093}
4094
61007b31 4095BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 4096{
61007b31
SH
4097 if (!bs) {
4098 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 4099 }
61007b31 4100 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
4101}
4102
0f12264e
KW
4103BlockDriverState *bdrv_next_all_states(BlockDriverState *bs)
4104{
4105 if (!bs) {
4106 return QTAILQ_FIRST(&all_bdrv_states);
4107 }
4108 return QTAILQ_NEXT(bs, bs_list);
4109}
4110
61007b31 4111const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 4112{
61007b31 4113 return bs->node_name;
beac80cd
FB
4114}
4115
1f0c461b 4116const char *bdrv_get_parent_name(const BlockDriverState *bs)
4c265bf9
KW
4117{
4118 BdrvChild *c;
4119 const char *name;
4120
4121 /* If multiple parents have a name, just pick the first one. */
4122 QLIST_FOREACH(c, &bs->parents, next_parent) {
4123 if (c->role->get_name) {
4124 name = c->role->get_name(c);
4125 if (name && *name) {
4126 return name;
4127 }
4128 }
4129 }
4130
4131 return NULL;
4132}
4133
61007b31
SH
4134/* TODO check what callers really want: bs->node_name or blk_name() */
4135const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 4136{
4c265bf9 4137 return bdrv_get_parent_name(bs) ?: "";
f141eafe 4138}
83f64091 4139
61007b31
SH
4140/* This can be used to identify nodes that might not have a device
4141 * name associated. Since node and device names live in the same
4142 * namespace, the result is unambiguous. The exception is if both are
4143 * absent, then this returns an empty (non-null) string. */
4144const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 4145{
4c265bf9 4146 return bdrv_get_parent_name(bs) ?: bs->node_name;
beac80cd 4147}
beac80cd 4148
61007b31 4149int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 4150{
61007b31 4151 return bs->open_flags;
0b5a2445
PB
4152}
4153
61007b31 4154int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 4155{
61007b31 4156 return 1;
0b5a2445
PB
4157}
4158
61007b31 4159int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 4160{
d470ad42
HR
4161 if (!bs->drv) {
4162 return 0;
4163 }
0b5a2445 4164
61007b31
SH
4165 /* If BS is a copy on write image, it is initialized to
4166 the contents of the base image, which may not be zeroes. */
760e0063 4167 if (bs->backing) {
61007b31
SH
4168 return 0;
4169 }
4170 if (bs->drv->bdrv_has_zero_init) {
4171 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 4172 }
5a612c00
MP
4173 if (bs->file && bs->drv->is_filter) {
4174 return bdrv_has_zero_init(bs->file->bs);
4175 }
61007b31
SH
4176
4177 /* safe default */
4178 return 0;
68485420
KW
4179}
4180
61007b31 4181bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 4182{
61007b31 4183 BlockDriverInfo bdi;
b2a61371 4184
760e0063 4185 if (bs->backing) {
61007b31
SH
4186 return false;
4187 }
4188
4189 if (bdrv_get_info(bs, &bdi) == 0) {
4190 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
4191 }
4192
61007b31 4193 return false;
b2a61371
SH
4194}
4195
61007b31 4196bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 4197{
2f0342ef 4198 if (!(bs->open_flags & BDRV_O_UNMAP)) {
61007b31
SH
4199 return false;
4200 }
68485420 4201
e24d813b 4202 return bs->supported_zero_flags & BDRV_REQ_MAY_UNMAP;
68485420
KW
4203}
4204
61007b31 4205const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 4206{
760e0063 4207 if (bs->backing && bs->backing->bs->encrypted)
61007b31
SH
4208 return bs->backing_file;
4209 else if (bs->encrypted)
4210 return bs->filename;
4211 else
4212 return NULL;
b2e12bc6
CH
4213}
4214
61007b31
SH
4215void bdrv_get_backing_filename(BlockDriverState *bs,
4216 char *filename, int filename_size)
016f5cf6 4217{
61007b31
SH
4218 pstrcpy(filename, filename_size, bs->backing_file);
4219}
d318aea9 4220
61007b31
SH
4221int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
4222{
4223 BlockDriver *drv = bs->drv;
5a612c00
MP
4224 /* if bs->drv == NULL, bs is closed, so there's nothing to do here */
4225 if (!drv) {
61007b31 4226 return -ENOMEDIUM;
5a612c00
MP
4227 }
4228 if (!drv->bdrv_get_info) {
4229 if (bs->file && drv->is_filter) {
4230 return bdrv_get_info(bs->file->bs, bdi);
4231 }
61007b31 4232 return -ENOTSUP;
5a612c00 4233 }
61007b31
SH
4234 memset(bdi, 0, sizeof(*bdi));
4235 return drv->bdrv_get_info(bs, bdi);
4236}
016f5cf6 4237
61007b31
SH
4238ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
4239{
4240 BlockDriver *drv = bs->drv;
4241 if (drv && drv->bdrv_get_specific_info) {
4242 return drv->bdrv_get_specific_info(bs);
4243 }
4244 return NULL;
016f5cf6
AG
4245}
4246
a31939e6 4247void bdrv_debug_event(BlockDriverState *bs, BlkdebugEvent event)
4265d620 4248{
61007b31
SH
4249 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
4250 return;
4251 }
4265d620 4252
61007b31 4253 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
4254}
4255
61007b31
SH
4256int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
4257 const char *tag)
4265d620 4258{
61007b31 4259 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 4260 bs = bs->file ? bs->file->bs : NULL;
61007b31 4261 }
4265d620 4262
61007b31
SH
4263 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
4264 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
4265 }
4265d620 4266
61007b31 4267 return -ENOTSUP;
4265d620
PB
4268}
4269
61007b31 4270int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 4271{
61007b31 4272 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 4273 bs = bs->file ? bs->file->bs : NULL;
61007b31 4274 }
ce1a14dc 4275
61007b31
SH
4276 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
4277 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
4278 }
4279
4280 return -ENOTSUP;
eb852011
MA
4281}
4282
61007b31 4283int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 4284{
61007b31 4285 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 4286 bs = bs->file ? bs->file->bs : NULL;
61007b31 4287 }
ce1a14dc 4288
61007b31
SH
4289 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
4290 return bs->drv->bdrv_debug_resume(bs, tag);
4291 }
ce1a14dc 4292
61007b31 4293 return -ENOTSUP;
f197fe2b
FZ
4294}
4295
61007b31 4296bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 4297{
61007b31 4298 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 4299 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 4300 }
19cb3738 4301
61007b31
SH
4302 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
4303 return bs->drv->bdrv_debug_is_suspended(bs, tag);
4304 }
f9f05dc5 4305
61007b31
SH
4306 return false;
4307}
f9f05dc5 4308
61007b31
SH
4309/* backing_file can either be relative, or absolute, or a protocol. If it is
4310 * relative, it must be relative to the chain. So, passing in bs->filename
4311 * from a BDS as backing_file should not be done, as that may be relative to
4312 * the CWD rather than the chain. */
4313BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
4314 const char *backing_file)
f9f05dc5 4315{
61007b31
SH
4316 char *filename_full = NULL;
4317 char *backing_file_full = NULL;
4318 char *filename_tmp = NULL;
4319 int is_protocol = 0;
4320 BlockDriverState *curr_bs = NULL;
4321 BlockDriverState *retval = NULL;
418661e0 4322 Error *local_error = NULL;
f9f05dc5 4323
61007b31
SH
4324 if (!bs || !bs->drv || !backing_file) {
4325 return NULL;
f9f05dc5
KW
4326 }
4327
61007b31
SH
4328 filename_full = g_malloc(PATH_MAX);
4329 backing_file_full = g_malloc(PATH_MAX);
4330 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 4331
61007b31 4332 is_protocol = path_has_protocol(backing_file);
f9f05dc5 4333
760e0063 4334 for (curr_bs = bs; curr_bs->backing; curr_bs = curr_bs->backing->bs) {
f9f05dc5 4335
61007b31
SH
4336 /* If either of the filename paths is actually a protocol, then
4337 * compare unmodified paths; otherwise make paths relative */
4338 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
4339 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
760e0063 4340 retval = curr_bs->backing->bs;
61007b31
SH
4341 break;
4342 }
418661e0
JC
4343 /* Also check against the full backing filename for the image */
4344 bdrv_get_full_backing_filename(curr_bs, backing_file_full, PATH_MAX,
4345 &local_error);
4346 if (local_error == NULL) {
4347 if (strcmp(backing_file, backing_file_full) == 0) {
4348 retval = curr_bs->backing->bs;
4349 break;
4350 }
4351 } else {
4352 error_free(local_error);
4353 local_error = NULL;
4354 }
61007b31
SH
4355 } else {
4356 /* If not an absolute filename path, make it relative to the current
4357 * image's filename path */
4358 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
4359 backing_file);
f9f05dc5 4360
61007b31
SH
4361 /* We are going to compare absolute pathnames */
4362 if (!realpath(filename_tmp, filename_full)) {
4363 continue;
4364 }
07f07615 4365
61007b31
SH
4366 /* We need to make sure the backing filename we are comparing against
4367 * is relative to the current image filename (or absolute) */
4368 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
4369 curr_bs->backing_file);
07f07615 4370
61007b31
SH
4371 if (!realpath(filename_tmp, backing_file_full)) {
4372 continue;
4373 }
eb489bb1 4374
61007b31 4375 if (strcmp(backing_file_full, filename_full) == 0) {
760e0063 4376 retval = curr_bs->backing->bs;
61007b31
SH
4377 break;
4378 }
4379 }
eb489bb1
KW
4380 }
4381
61007b31
SH
4382 g_free(filename_full);
4383 g_free(backing_file_full);
4384 g_free(filename_tmp);
4385 return retval;
4386}
4387
61007b31
SH
4388void bdrv_init(void)
4389{
4390 module_call_init(MODULE_INIT_BLOCK);
4391}
29cdb251 4392
61007b31
SH
4393void bdrv_init_with_whitelist(void)
4394{
4395 use_bdrv_whitelist = 1;
4396 bdrv_init();
07f07615
PB
4397}
4398
2b148f39
PB
4399static void coroutine_fn bdrv_co_invalidate_cache(BlockDriverState *bs,
4400 Error **errp)
0f15423c 4401{
4417ab7a 4402 BdrvChild *child, *parent;
9c5e6594 4403 uint64_t perm, shared_perm;
5a8a30db
KW
4404 Error *local_err = NULL;
4405 int ret;
4406
3456a8d1
KW
4407 if (!bs->drv) {
4408 return;
4409 }
4410
04c01a5c 4411 if (!(bs->open_flags & BDRV_O_INACTIVE)) {
7ea2d269
AK
4412 return;
4413 }
7ea2d269 4414
16e977d5 4415 QLIST_FOREACH(child, &bs->children, next) {
2b148f39 4416 bdrv_co_invalidate_cache(child->bs, &local_err);
0d1c5c91 4417 if (local_err) {
0d1c5c91
FZ
4418 error_propagate(errp, local_err);
4419 return;
4420 }
5a8a30db 4421 }
0d1c5c91 4422
dafe0960
KW
4423 /*
4424 * Update permissions, they may differ for inactive nodes.
4425 *
4426 * Note that the required permissions of inactive images are always a
4427 * subset of the permissions required after activating the image. This
4428 * allows us to just get the permissions upfront without restricting
4429 * drv->bdrv_invalidate_cache().
4430 *
4431 * It also means that in error cases, we don't have to try and revert to
4432 * the old permissions (which is an operation that could fail, too). We can
4433 * just keep the extended permissions for the next time that an activation
4434 * of the image is tried.
4435 */
16e977d5 4436 bs->open_flags &= ~BDRV_O_INACTIVE;
dafe0960
KW
4437 bdrv_get_cumulative_perm(bs, &perm, &shared_perm);
4438 ret = bdrv_check_perm(bs, NULL, perm, shared_perm, NULL, &local_err);
4439 if (ret < 0) {
4440 bs->open_flags |= BDRV_O_INACTIVE;
4441 error_propagate(errp, local_err);
4442 return;
4443 }
4444 bdrv_set_perm(bs, perm, shared_perm);
4445
2b148f39
PB
4446 if (bs->drv->bdrv_co_invalidate_cache) {
4447 bs->drv->bdrv_co_invalidate_cache(bs, &local_err);
0d1c5c91
FZ
4448 if (local_err) {
4449 bs->open_flags |= BDRV_O_INACTIVE;
4450 error_propagate(errp, local_err);
4451 return;
4452 }
0f15423c 4453 }
3456a8d1 4454
5a8a30db
KW
4455 ret = refresh_total_sectors(bs, bs->total_sectors);
4456 if (ret < 0) {
04c01a5c 4457 bs->open_flags |= BDRV_O_INACTIVE;
5a8a30db
KW
4458 error_setg_errno(errp, -ret, "Could not refresh total sector count");
4459 return;
4460 }
4417ab7a
KW
4461
4462 QLIST_FOREACH(parent, &bs->parents, next_parent) {
4463 if (parent->role->activate) {
4464 parent->role->activate(parent, &local_err);
4465 if (local_err) {
4466 error_propagate(errp, local_err);
4467 return;
4468 }
4469 }
4470 }
0f15423c
AL
4471}
4472
2b148f39
PB
4473typedef struct InvalidateCacheCo {
4474 BlockDriverState *bs;
4475 Error **errp;
4476 bool done;
4477} InvalidateCacheCo;
4478
4479static void coroutine_fn bdrv_invalidate_cache_co_entry(void *opaque)
4480{
4481 InvalidateCacheCo *ico = opaque;
4482 bdrv_co_invalidate_cache(ico->bs, ico->errp);
4483 ico->done = true;
4484}
4485
4486void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
4487{
4488 Coroutine *co;
4489 InvalidateCacheCo ico = {
4490 .bs = bs,
4491 .done = false,
4492 .errp = errp
4493 };
4494
4495 if (qemu_in_coroutine()) {
4496 /* Fast-path if already in coroutine context */
4497 bdrv_invalidate_cache_co_entry(&ico);
4498 } else {
4499 co = qemu_coroutine_create(bdrv_invalidate_cache_co_entry, &ico);
4500 qemu_coroutine_enter(co);
4501 BDRV_POLL_WHILE(bs, !ico.done);
4502 }
4503}
4504
5a8a30db 4505void bdrv_invalidate_cache_all(Error **errp)
0f15423c 4506{
7c8eece4 4507 BlockDriverState *bs;
5a8a30db 4508 Error *local_err = NULL;
88be7b4b 4509 BdrvNextIterator it;
0f15423c 4510
88be7b4b 4511 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
ed78cda3
SH
4512 AioContext *aio_context = bdrv_get_aio_context(bs);
4513
4514 aio_context_acquire(aio_context);
5a8a30db 4515 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 4516 aio_context_release(aio_context);
5a8a30db
KW
4517 if (local_err) {
4518 error_propagate(errp, local_err);
5e003f17 4519 bdrv_next_cleanup(&it);
5a8a30db
KW
4520 return;
4521 }
0f15423c
AL
4522 }
4523}
4524
aad0b7a0
FZ
4525static int bdrv_inactivate_recurse(BlockDriverState *bs,
4526 bool setting_flag)
76b1c7fe 4527{
cfa1a572 4528 BdrvChild *child, *parent;
76b1c7fe
KW
4529 int ret;
4530
d470ad42
HR
4531 if (!bs->drv) {
4532 return -ENOMEDIUM;
4533 }
4534
aad0b7a0 4535 if (!setting_flag && bs->drv->bdrv_inactivate) {
76b1c7fe
KW
4536 ret = bs->drv->bdrv_inactivate(bs);
4537 if (ret < 0) {
4538 return ret;
4539 }
4540 }
4541
7d5b5261 4542 if (setting_flag && !(bs->open_flags & BDRV_O_INACTIVE)) {
9c5e6594
KW
4543 uint64_t perm, shared_perm;
4544
cfa1a572
KW
4545 QLIST_FOREACH(parent, &bs->parents, next_parent) {
4546 if (parent->role->inactivate) {
4547 ret = parent->role->inactivate(parent);
4548 if (ret < 0) {
cfa1a572
KW
4549 return ret;
4550 }
4551 }
4552 }
9c5e6594 4553
7d5b5261
SH
4554 bs->open_flags |= BDRV_O_INACTIVE;
4555
9c5e6594
KW
4556 /* Update permissions, they may differ for inactive nodes */
4557 bdrv_get_cumulative_perm(bs, &perm, &shared_perm);
3121fb45 4558 bdrv_check_perm(bs, NULL, perm, shared_perm, NULL, &error_abort);
9c5e6594 4559 bdrv_set_perm(bs, perm, shared_perm);
aad0b7a0 4560 }
38701b6a
KW
4561
4562 QLIST_FOREACH(child, &bs->children, next) {
4563 ret = bdrv_inactivate_recurse(child->bs, setting_flag);
4564 if (ret < 0) {
4565 return ret;
4566 }
4567 }
4568
615b5dcf
VSO
4569 /* At this point persistent bitmaps should be already stored by the format
4570 * driver */
4571 bdrv_release_persistent_dirty_bitmaps(bs);
4572
76b1c7fe
KW
4573 return 0;
4574}
4575
4576int bdrv_inactivate_all(void)
4577{
79720af6 4578 BlockDriverState *bs = NULL;
88be7b4b 4579 BdrvNextIterator it;
aad0b7a0
FZ
4580 int ret = 0;
4581 int pass;
bd6458e4 4582 GSList *aio_ctxs = NULL, *ctx;
76b1c7fe 4583
88be7b4b 4584 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
bd6458e4
PB
4585 AioContext *aio_context = bdrv_get_aio_context(bs);
4586
4587 if (!g_slist_find(aio_ctxs, aio_context)) {
4588 aio_ctxs = g_slist_prepend(aio_ctxs, aio_context);
4589 aio_context_acquire(aio_context);
4590 }
aad0b7a0 4591 }
76b1c7fe 4592
aad0b7a0
FZ
4593 /* We do two passes of inactivation. The first pass calls to drivers'
4594 * .bdrv_inactivate callbacks recursively so all cache is flushed to disk;
4595 * the second pass sets the BDRV_O_INACTIVE flag so that no further write
4596 * is allowed. */
4597 for (pass = 0; pass < 2; pass++) {
88be7b4b 4598 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
aad0b7a0
FZ
4599 ret = bdrv_inactivate_recurse(bs, pass);
4600 if (ret < 0) {
5e003f17 4601 bdrv_next_cleanup(&it);
aad0b7a0
FZ
4602 goto out;
4603 }
76b1c7fe
KW
4604 }
4605 }
4606
aad0b7a0 4607out:
bd6458e4
PB
4608 for (ctx = aio_ctxs; ctx != NULL; ctx = ctx->next) {
4609 AioContext *aio_context = ctx->data;
4610 aio_context_release(aio_context);
aad0b7a0 4611 }
bd6458e4 4612 g_slist_free(aio_ctxs);
aad0b7a0
FZ
4613
4614 return ret;
76b1c7fe
KW
4615}
4616
19cb3738
FB
4617/**************************************************************/
4618/* removable device support */
4619
4620/**
4621 * Return TRUE if the media is present
4622 */
e031f750 4623bool bdrv_is_inserted(BlockDriverState *bs)
19cb3738
FB
4624{
4625 BlockDriver *drv = bs->drv;
28d7a789 4626 BdrvChild *child;
a1aff5bf 4627
e031f750
HR
4628 if (!drv) {
4629 return false;
4630 }
28d7a789
HR
4631 if (drv->bdrv_is_inserted) {
4632 return drv->bdrv_is_inserted(bs);
4633 }
4634 QLIST_FOREACH(child, &bs->children, next) {
4635 if (!bdrv_is_inserted(child->bs)) {
4636 return false;
4637 }
e031f750 4638 }
28d7a789 4639 return true;
19cb3738
FB
4640}
4641
19cb3738
FB
4642/**
4643 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
4644 */
f36f3949 4645void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
4646{
4647 BlockDriver *drv = bs->drv;
19cb3738 4648
822e1cd1
MA
4649 if (drv && drv->bdrv_eject) {
4650 drv->bdrv_eject(bs, eject_flag);
19cb3738
FB
4651 }
4652}
4653
19cb3738
FB
4654/**
4655 * Lock or unlock the media (if it is locked, the user won't be able
4656 * to eject it manually).
4657 */
025e849a 4658void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
4659{
4660 BlockDriver *drv = bs->drv;
4661
025e849a 4662 trace_bdrv_lock_medium(bs, locked);
b8c6d095 4663
025e849a
MA
4664 if (drv && drv->bdrv_lock_medium) {
4665 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
4666 }
4667}
985a03b0 4668
9fcb0251
FZ
4669/* Get a reference to bs */
4670void bdrv_ref(BlockDriverState *bs)
4671{
4672 bs->refcnt++;
4673}
4674
4675/* Release a previously grabbed reference to bs.
4676 * If after releasing, reference count is zero, the BlockDriverState is
4677 * deleted. */
4678void bdrv_unref(BlockDriverState *bs)
4679{
9a4d5ca6
JC
4680 if (!bs) {
4681 return;
4682 }
9fcb0251
FZ
4683 assert(bs->refcnt > 0);
4684 if (--bs->refcnt == 0) {
4685 bdrv_delete(bs);
4686 }
4687}
4688
fbe40ff7
FZ
4689struct BdrvOpBlocker {
4690 Error *reason;
4691 QLIST_ENTRY(BdrvOpBlocker) list;
4692};
4693
4694bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
4695{
4696 BdrvOpBlocker *blocker;
4697 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4698 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
4699 blocker = QLIST_FIRST(&bs->op_blockers[op]);
4b576648
MA
4700 error_propagate_prepend(errp, error_copy(blocker->reason),
4701 "Node '%s' is busy: ",
4702 bdrv_get_device_or_node_name(bs));
fbe40ff7
FZ
4703 return true;
4704 }
4705 return false;
4706}
4707
4708void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
4709{
4710 BdrvOpBlocker *blocker;
4711 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4712
5839e53b 4713 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
4714 blocker->reason = reason;
4715 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
4716}
4717
4718void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
4719{
4720 BdrvOpBlocker *blocker, *next;
4721 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
4722 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
4723 if (blocker->reason == reason) {
4724 QLIST_REMOVE(blocker, list);
4725 g_free(blocker);
4726 }
4727 }
4728}
4729
4730void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
4731{
4732 int i;
4733 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4734 bdrv_op_block(bs, i, reason);
4735 }
4736}
4737
4738void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
4739{
4740 int i;
4741 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4742 bdrv_op_unblock(bs, i, reason);
4743 }
4744}
4745
4746bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
4747{
4748 int i;
4749
4750 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
4751 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
4752 return false;
4753 }
4754 }
4755 return true;
4756}
4757
d92ada22
LC
4758void bdrv_img_create(const char *filename, const char *fmt,
4759 const char *base_filename, const char *base_fmt,
9217283d
FZ
4760 char *options, uint64_t img_size, int flags, bool quiet,
4761 Error **errp)
f88e1a42 4762{
83d0521a
CL
4763 QemuOptsList *create_opts = NULL;
4764 QemuOpts *opts = NULL;
4765 const char *backing_fmt, *backing_file;
4766 int64_t size;
f88e1a42 4767 BlockDriver *drv, *proto_drv;
cc84d90f 4768 Error *local_err = NULL;
f88e1a42
JS
4769 int ret = 0;
4770
4771 /* Find driver and parse its options */
4772 drv = bdrv_find_format(fmt);
4773 if (!drv) {
71c79813 4774 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 4775 return;
f88e1a42
JS
4776 }
4777
b65a5e12 4778 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 4779 if (!proto_drv) {
d92ada22 4780 return;
f88e1a42
JS
4781 }
4782
c6149724
HR
4783 if (!drv->create_opts) {
4784 error_setg(errp, "Format driver '%s' does not support image creation",
4785 drv->format_name);
4786 return;
4787 }
4788
4789 if (!proto_drv->create_opts) {
4790 error_setg(errp, "Protocol driver '%s' does not support image creation",
4791 proto_drv->format_name);
4792 return;
4793 }
4794
c282e1fd
CL
4795 create_opts = qemu_opts_append(create_opts, drv->create_opts);
4796 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
4797
4798 /* Create parameter list with default values */
83d0521a 4799 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 4800 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
4801
4802 /* Parse -o options */
4803 if (options) {
dc523cd3
MA
4804 qemu_opts_do_parse(opts, options, NULL, &local_err);
4805 if (local_err) {
f88e1a42
JS
4806 goto out;
4807 }
4808 }
4809
4810 if (base_filename) {
f43e47db 4811 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 4812 if (local_err) {
71c79813
LC
4813 error_setg(errp, "Backing file not supported for file format '%s'",
4814 fmt);
f88e1a42
JS
4815 goto out;
4816 }
4817 }
4818
4819 if (base_fmt) {
f43e47db 4820 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 4821 if (local_err) {
71c79813
LC
4822 error_setg(errp, "Backing file format not supported for file "
4823 "format '%s'", fmt);
f88e1a42
JS
4824 goto out;
4825 }
4826 }
4827
83d0521a
CL
4828 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
4829 if (backing_file) {
4830 if (!strcmp(filename, backing_file)) {
71c79813
LC
4831 error_setg(errp, "Error: Trying to create an image with the "
4832 "same filename as the backing file");
792da93a
JS
4833 goto out;
4834 }
4835 }
4836
83d0521a 4837 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42 4838
6e6e55f5
JS
4839 /* The size for the image must always be specified, unless we have a backing
4840 * file and we have not been forbidden from opening it. */
a8b42a1c 4841 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, img_size);
6e6e55f5
JS
4842 if (backing_file && !(flags & BDRV_O_NO_BACKING)) {
4843 BlockDriverState *bs;
4844 char *full_backing = g_new0(char, PATH_MAX);
4845 int back_flags;
4846 QDict *backing_options = NULL;
4847
4848 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
4849 full_backing, PATH_MAX,
4850 &local_err);
4851 if (local_err) {
4852 g_free(full_backing);
4853 goto out;
4854 }
29168018 4855
6e6e55f5
JS
4856 /* backing files always opened read-only */
4857 back_flags = flags;
4858 back_flags &= ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 4859
cc954f01 4860 backing_options = qdict_new();
6e6e55f5 4861 if (backing_fmt) {
6e6e55f5
JS
4862 qdict_put_str(backing_options, "driver", backing_fmt);
4863 }
cc954f01 4864 qdict_put_bool(backing_options, BDRV_OPT_FORCE_SHARE, true);
e6641719 4865
6e6e55f5
JS
4866 bs = bdrv_open(full_backing, NULL, backing_options, back_flags,
4867 &local_err);
4868 g_free(full_backing);
4869 if (!bs && size != -1) {
4870 /* Couldn't open BS, but we have a size, so it's nonfatal */
4871 warn_reportf_err(local_err,
4872 "Could not verify backing image. "
4873 "This may become an error in future versions.\n");
4874 local_err = NULL;
4875 } else if (!bs) {
4876 /* Couldn't open bs, do not have size */
4877 error_append_hint(&local_err,
4878 "Could not open backing image to determine size.\n");
4879 goto out;
4880 } else {
4881 if (size == -1) {
4882 /* Opened BS, have no size */
4883 size = bdrv_getlength(bs);
4884 if (size < 0) {
4885 error_setg_errno(errp, -size, "Could not get size of '%s'",
4886 backing_file);
4887 bdrv_unref(bs);
4888 goto out;
4889 }
4890 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
52bf1e72 4891 }
66f6b814 4892 bdrv_unref(bs);
f88e1a42 4893 }
6e6e55f5
JS
4894 } /* (backing_file && !(flags & BDRV_O_NO_BACKING)) */
4895
4896 if (size == -1) {
4897 error_setg(errp, "Image creation needs a size parameter");
4898 goto out;
f88e1a42
JS
4899 }
4900
f382d43a 4901 if (!quiet) {
fe646693 4902 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 4903 qemu_opts_print(opts, " ");
f382d43a
MR
4904 puts("");
4905 }
83d0521a 4906
c282e1fd 4907 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 4908
cc84d90f
HR
4909 if (ret == -EFBIG) {
4910 /* This is generally a better message than whatever the driver would
4911 * deliver (especially because of the cluster_size_hint), since that
4912 * is most probably not much different from "image too large". */
4913 const char *cluster_size_hint = "";
83d0521a 4914 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 4915 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 4916 }
cc84d90f
HR
4917 error_setg(errp, "The image size is too large for file format '%s'"
4918 "%s", fmt, cluster_size_hint);
4919 error_free(local_err);
4920 local_err = NULL;
f88e1a42
JS
4921 }
4922
4923out:
83d0521a
CL
4924 qemu_opts_del(opts);
4925 qemu_opts_free(create_opts);
621ff94d 4926 error_propagate(errp, local_err);
f88e1a42 4927}
85d126f3
SH
4928
4929AioContext *bdrv_get_aio_context(BlockDriverState *bs)
4930{
33f2a757 4931 return bs ? bs->aio_context : qemu_get_aio_context();
dcd04228
SH
4932}
4933
052a7572
FZ
4934void bdrv_coroutine_enter(BlockDriverState *bs, Coroutine *co)
4935{
4936 aio_co_enter(bdrv_get_aio_context(bs), co);
4937}
4938
e8a095da
SH
4939static void bdrv_do_remove_aio_context_notifier(BdrvAioNotifier *ban)
4940{
4941 QLIST_REMOVE(ban, list);
4942 g_free(ban);
4943}
4944
dcd04228
SH
4945void bdrv_detach_aio_context(BlockDriverState *bs)
4946{
e8a095da 4947 BdrvAioNotifier *baf, *baf_tmp;
b97511c7 4948 BdrvChild *child;
33384421 4949
dcd04228
SH
4950 if (!bs->drv) {
4951 return;
4952 }
4953
e8a095da
SH
4954 assert(!bs->walking_aio_notifiers);
4955 bs->walking_aio_notifiers = true;
4956 QLIST_FOREACH_SAFE(baf, &bs->aio_notifiers, list, baf_tmp) {
4957 if (baf->deleted) {
4958 bdrv_do_remove_aio_context_notifier(baf);
4959 } else {
4960 baf->detach_aio_context(baf->opaque);
4961 }
33384421 4962 }
e8a095da
SH
4963 /* Never mind iterating again to check for ->deleted. bdrv_close() will
4964 * remove remaining aio notifiers if we aren't called again.
4965 */
4966 bs->walking_aio_notifiers = false;
33384421 4967
dcd04228
SH
4968 if (bs->drv->bdrv_detach_aio_context) {
4969 bs->drv->bdrv_detach_aio_context(bs);
4970 }
b97511c7
HR
4971 QLIST_FOREACH(child, &bs->children, next) {
4972 bdrv_detach_aio_context(child->bs);
dcd04228
SH
4973 }
4974
4975 bs->aio_context = NULL;
4976}
4977
4978void bdrv_attach_aio_context(BlockDriverState *bs,
4979 AioContext *new_context)
4980{
e8a095da 4981 BdrvAioNotifier *ban, *ban_tmp;
b97511c7 4982 BdrvChild *child;
33384421 4983
dcd04228
SH
4984 if (!bs->drv) {
4985 return;
4986 }
4987
4988 bs->aio_context = new_context;
4989
b97511c7
HR
4990 QLIST_FOREACH(child, &bs->children, next) {
4991 bdrv_attach_aio_context(child->bs, new_context);
dcd04228
SH
4992 }
4993 if (bs->drv->bdrv_attach_aio_context) {
4994 bs->drv->bdrv_attach_aio_context(bs, new_context);
4995 }
33384421 4996
e8a095da
SH
4997 assert(!bs->walking_aio_notifiers);
4998 bs->walking_aio_notifiers = true;
4999 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_tmp) {
5000 if (ban->deleted) {
5001 bdrv_do_remove_aio_context_notifier(ban);
5002 } else {
5003 ban->attached_aio_context(new_context, ban->opaque);
5004 }
33384421 5005 }
e8a095da 5006 bs->walking_aio_notifiers = false;
dcd04228
SH
5007}
5008
5009void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
5010{
aabf5910 5011 AioContext *ctx = bdrv_get_aio_context(bs);
c2b6428d 5012
aabf5910 5013 aio_disable_external(ctx);
6cd5c9d7 5014 bdrv_parent_drained_begin(bs, NULL, false);
53ec73e2 5015 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228 5016
c2b6428d
PB
5017 while (aio_poll(ctx, false)) {
5018 /* wait for all bottom halves to execute */
5019 }
5020
dcd04228
SH
5021 bdrv_detach_aio_context(bs);
5022
5023 /* This function executes in the old AioContext so acquire the new one in
5024 * case it runs in a different thread.
5025 */
5026 aio_context_acquire(new_context);
5027 bdrv_attach_aio_context(bs, new_context);
6cd5c9d7 5028 bdrv_parent_drained_end(bs, NULL, false);
aabf5910 5029 aio_enable_external(ctx);
dcd04228 5030 aio_context_release(new_context);
85d126f3 5031}
d616b224 5032
33384421
HR
5033void bdrv_add_aio_context_notifier(BlockDriverState *bs,
5034 void (*attached_aio_context)(AioContext *new_context, void *opaque),
5035 void (*detach_aio_context)(void *opaque), void *opaque)
5036{
5037 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
5038 *ban = (BdrvAioNotifier){
5039 .attached_aio_context = attached_aio_context,
5040 .detach_aio_context = detach_aio_context,
5041 .opaque = opaque
5042 };
5043
5044 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
5045}
5046
5047void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
5048 void (*attached_aio_context)(AioContext *,
5049 void *),
5050 void (*detach_aio_context)(void *),
5051 void *opaque)
5052{
5053 BdrvAioNotifier *ban, *ban_next;
5054
5055 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
5056 if (ban->attached_aio_context == attached_aio_context &&
5057 ban->detach_aio_context == detach_aio_context &&
e8a095da
SH
5058 ban->opaque == opaque &&
5059 ban->deleted == false)
33384421 5060 {
e8a095da
SH
5061 if (bs->walking_aio_notifiers) {
5062 ban->deleted = true;
5063 } else {
5064 bdrv_do_remove_aio_context_notifier(ban);
5065 }
33384421
HR
5066 return;
5067 }
5068 }
5069
5070 abort();
5071}
5072
77485434 5073int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
d1402b50
HR
5074 BlockDriverAmendStatusCB *status_cb, void *cb_opaque,
5075 Error **errp)
6f176b48 5076{
d470ad42 5077 if (!bs->drv) {
d1402b50 5078 error_setg(errp, "Node is ejected");
d470ad42
HR
5079 return -ENOMEDIUM;
5080 }
c282e1fd 5081 if (!bs->drv->bdrv_amend_options) {
d1402b50
HR
5082 error_setg(errp, "Block driver '%s' does not support option amendment",
5083 bs->drv->format_name);
6f176b48
HR
5084 return -ENOTSUP;
5085 }
d1402b50 5086 return bs->drv->bdrv_amend_options(bs, opts, status_cb, cb_opaque, errp);
6f176b48 5087}
f6186f49 5088
b5042a36
BC
5089/* This function will be called by the bdrv_recurse_is_first_non_filter method
5090 * of block filter and by bdrv_is_first_non_filter.
5091 * It is used to test if the given bs is the candidate or recurse more in the
5092 * node graph.
212a5a8f 5093 */
b5042a36 5094bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 5095 BlockDriverState *candidate)
f6186f49 5096{
b5042a36
BC
5097 /* return false if basic checks fails */
5098 if (!bs || !bs->drv) {
212a5a8f 5099 return false;
f6186f49
BC
5100 }
5101
b5042a36
BC
5102 /* the code reached a non block filter driver -> check if the bs is
5103 * the same as the candidate. It's the recursion termination condition.
5104 */
5105 if (!bs->drv->is_filter) {
5106 return bs == candidate;
212a5a8f 5107 }
b5042a36 5108 /* Down this path the driver is a block filter driver */
212a5a8f 5109
b5042a36
BC
5110 /* If the block filter recursion method is defined use it to recurse down
5111 * the node graph.
5112 */
5113 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 5114 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
5115 }
5116
b5042a36
BC
5117 /* the driver is a block filter but don't allow to recurse -> return false
5118 */
5119 return false;
f6186f49
BC
5120}
5121
212a5a8f
BC
5122/* This function checks if the candidate is the first non filter bs down it's
5123 * bs chain. Since we don't have pointers to parents it explore all bs chains
5124 * from the top. Some filters can choose not to pass down the recursion.
5125 */
5126bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 5127{
7c8eece4 5128 BlockDriverState *bs;
88be7b4b 5129 BdrvNextIterator it;
212a5a8f
BC
5130
5131 /* walk down the bs forest recursively */
88be7b4b 5132 for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
212a5a8f
BC
5133 bool perm;
5134
b5042a36 5135 /* try to recurse in this top level bs */
e6dc8a1f 5136 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
5137
5138 /* candidate is the first non filter */
5139 if (perm) {
5e003f17 5140 bdrv_next_cleanup(&it);
212a5a8f
BC
5141 return true;
5142 }
5143 }
5144
5145 return false;
f6186f49 5146}
09158f00 5147
e12f3784
WC
5148BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
5149 const char *node_name, Error **errp)
09158f00
BC
5150{
5151 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
5152 AioContext *aio_context;
5153
09158f00
BC
5154 if (!to_replace_bs) {
5155 error_setg(errp, "Node name '%s' not found", node_name);
5156 return NULL;
5157 }
5158
5a7e7a0b
SH
5159 aio_context = bdrv_get_aio_context(to_replace_bs);
5160 aio_context_acquire(aio_context);
5161
09158f00 5162 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
5163 to_replace_bs = NULL;
5164 goto out;
09158f00
BC
5165 }
5166
5167 /* We don't want arbitrary node of the BDS chain to be replaced only the top
5168 * most non filter in order to prevent data corruption.
5169 * Another benefit is that this tests exclude backing files which are
5170 * blocked by the backing blockers.
5171 */
e12f3784 5172 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 5173 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
5174 to_replace_bs = NULL;
5175 goto out;
09158f00
BC
5176 }
5177
5a7e7a0b
SH
5178out:
5179 aio_context_release(aio_context);
09158f00
BC
5180 return to_replace_bs;
5181}
448ad91d 5182
91af7014
HR
5183static bool append_open_options(QDict *d, BlockDriverState *bs)
5184{
5185 const QDictEntry *entry;
9e700c1a 5186 QemuOptDesc *desc;
91af7014
HR
5187 bool found_any = false;
5188
5189 for (entry = qdict_first(bs->options); entry;
5190 entry = qdict_next(bs->options, entry))
5191 {
a600aadd 5192 /* Exclude all non-driver-specific options */
9e700c1a
KW
5193 for (desc = bdrv_runtime_opts.desc; desc->name; desc++) {
5194 if (!strcmp(qdict_entry_key(entry), desc->name)) {
5195 break;
5196 }
5197 }
5198 if (desc->name) {
5199 continue;
5200 }
5201
f5a74a5a
MAL
5202 qdict_put_obj(d, qdict_entry_key(entry),
5203 qobject_ref(qdict_entry_value(entry)));
9e700c1a 5204 found_any = true;
91af7014
HR
5205 }
5206
5207 return found_any;
5208}
5209
5210/* Updates the following BDS fields:
5211 * - exact_filename: A filename which may be used for opening a block device
5212 * which (mostly) equals the given BDS (even without any
5213 * other options; so reading and writing must return the same
5214 * results, but caching etc. may be different)
5215 * - full_open_options: Options which, when given when opening a block device
5216 * (without a filename), result in a BDS (mostly)
5217 * equalling the given one
5218 * - filename: If exact_filename is set, it is copied here. Otherwise,
5219 * full_open_options is converted to a JSON object, prefixed with
5220 * "json:" (for use through the JSON pseudo protocol) and put here.
5221 */
5222void bdrv_refresh_filename(BlockDriverState *bs)
5223{
5224 BlockDriver *drv = bs->drv;
5225 QDict *opts;
5226
5227 if (!drv) {
5228 return;
5229 }
5230
5231 /* This BDS's file name will most probably depend on its file's name, so
5232 * refresh that first */
5233 if (bs->file) {
9a4f4c31 5234 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
5235 }
5236
5237 if (drv->bdrv_refresh_filename) {
5238 /* Obsolete information is of no use here, so drop the old file name
5239 * information before refreshing it */
5240 bs->exact_filename[0] = '\0';
5241 if (bs->full_open_options) {
cb3e7f08 5242 qobject_unref(bs->full_open_options);
91af7014
HR
5243 bs->full_open_options = NULL;
5244 }
5245
4cdd01d3
KW
5246 opts = qdict_new();
5247 append_open_options(opts, bs);
5248 drv->bdrv_refresh_filename(bs, opts);
cb3e7f08 5249 qobject_unref(opts);
91af7014
HR
5250 } else if (bs->file) {
5251 /* Try to reconstruct valid information from the underlying file */
5252 bool has_open_options;
5253
5254 bs->exact_filename[0] = '\0';
5255 if (bs->full_open_options) {
cb3e7f08 5256 qobject_unref(bs->full_open_options);
91af7014
HR
5257 bs->full_open_options = NULL;
5258 }
5259
5260 opts = qdict_new();
5261 has_open_options = append_open_options(opts, bs);
5262
5263 /* If no specific options have been given for this BDS, the filename of
5264 * the underlying file should suffice for this one as well */
9a4f4c31
KW
5265 if (bs->file->bs->exact_filename[0] && !has_open_options) {
5266 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
5267 }
5268 /* Reconstructing the full options QDict is simple for most format block
5269 * drivers, as long as the full options are known for the underlying
5270 * file BDS. The full options QDict of that file BDS should somehow
5271 * contain a representation of the filename, therefore the following
5272 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 5273 if (bs->file->bs->full_open_options) {
46f5ac20 5274 qdict_put_str(opts, "driver", drv->format_name);
f5a74a5a
MAL
5275 qdict_put(opts, "file",
5276 qobject_ref(bs->file->bs->full_open_options));
91af7014
HR
5277
5278 bs->full_open_options = opts;
5279 } else {
cb3e7f08 5280 qobject_unref(opts);
91af7014
HR
5281 }
5282 } else if (!bs->full_open_options && qdict_size(bs->options)) {
5283 /* There is no underlying file BDS (at least referenced by BDS.file),
5284 * so the full options QDict should be equal to the options given
5285 * specifically for this block device when it was opened (plus the
5286 * driver specification).
5287 * Because those options don't change, there is no need to update
5288 * full_open_options when it's already set. */
5289
5290 opts = qdict_new();
5291 append_open_options(opts, bs);
46f5ac20 5292 qdict_put_str(opts, "driver", drv->format_name);
91af7014
HR
5293
5294 if (bs->exact_filename[0]) {
5295 /* This may not work for all block protocol drivers (some may
5296 * require this filename to be parsed), but we have to find some
5297 * default solution here, so just include it. If some block driver
5298 * does not support pure options without any filename at all or
5299 * needs some special format of the options QDict, it needs to
5300 * implement the driver-specific bdrv_refresh_filename() function.
5301 */
46f5ac20 5302 qdict_put_str(opts, "filename", bs->exact_filename);
91af7014
HR
5303 }
5304
5305 bs->full_open_options = opts;
5306 }
5307
5308 if (bs->exact_filename[0]) {
5309 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
5310 } else if (bs->full_open_options) {
5311 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
5312 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
5313 qstring_get_str(json));
cb3e7f08 5314 qobject_unref(json);
91af7014
HR
5315 }
5316}
e06018ad
WC
5317
5318/*
5319 * Hot add/remove a BDS's child. So the user can take a child offline when
5320 * it is broken and take a new child online
5321 */
5322void bdrv_add_child(BlockDriverState *parent_bs, BlockDriverState *child_bs,
5323 Error **errp)
5324{
5325
5326 if (!parent_bs->drv || !parent_bs->drv->bdrv_add_child) {
5327 error_setg(errp, "The node %s does not support adding a child",
5328 bdrv_get_device_or_node_name(parent_bs));
5329 return;
5330 }
5331
5332 if (!QLIST_EMPTY(&child_bs->parents)) {
5333 error_setg(errp, "The node %s already has a parent",
5334 child_bs->node_name);
5335 return;
5336 }
5337
5338 parent_bs->drv->bdrv_add_child(parent_bs, child_bs, errp);
5339}
5340
5341void bdrv_del_child(BlockDriverState *parent_bs, BdrvChild *child, Error **errp)
5342{
5343 BdrvChild *tmp;
5344
5345 if (!parent_bs->drv || !parent_bs->drv->bdrv_del_child) {
5346 error_setg(errp, "The node %s does not support removing a child",
5347 bdrv_get_device_or_node_name(parent_bs));
5348 return;
5349 }
5350
5351 QLIST_FOREACH(tmp, &parent_bs->children, next) {
5352 if (tmp == child) {
5353 break;
5354 }
5355 }
5356
5357 if (!tmp) {
5358 error_setg(errp, "The node %s does not have a child named %s",
5359 bdrv_get_device_or_node_name(parent_bs),
5360 bdrv_get_device_or_node_name(child->bs));
5361 return;
5362 }
5363
5364 parent_bs->drv->bdrv_del_child(parent_bs, child, errp);
5365}
67b792f5
VSO
5366
5367bool bdrv_can_store_new_dirty_bitmap(BlockDriverState *bs, const char *name,
5368 uint32_t granularity, Error **errp)
5369{
5370 BlockDriver *drv = bs->drv;
5371
5372 if (!drv) {
5373 error_setg_errno(errp, ENOMEDIUM,
5374 "Can't store persistent bitmaps to %s",
5375 bdrv_get_device_or_node_name(bs));
5376 return false;
5377 }
5378
5379 if (!drv->bdrv_can_store_new_dirty_bitmap) {
5380 error_setg_errno(errp, ENOTSUP,
5381 "Can't store persistent bitmaps to %s",
5382 bdrv_get_device_or_node_name(bs));
5383 return false;
5384 }
5385
5386 return drv->bdrv_can_store_new_dirty_bitmap(bs, name, granularity, errp);
5387}