]> git.proxmox.com Git - mirror_qemu.git/blame - block.c
throttle: Add throttle group infrastructure tests
[mirror_qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
3990d09a 24#include "config-host.h"
faf07963 25#include "qemu-common.h"
6d519a5f 26#include "trace.h"
737e150e
PB
27#include "block/block_int.h"
28#include "block/blockjob.h"
1de7afc9 29#include "qemu/module.h"
7b1b5d19 30#include "qapi/qmp/qjson.h"
bfb197e0 31#include "sysemu/block-backend.h"
9c17d615 32#include "sysemu/sysemu.h"
1de7afc9 33#include "qemu/notify.h"
737e150e 34#include "block/coroutine.h"
c13163fb 35#include "block/qapi.h"
b2023818 36#include "qmp-commands.h"
1de7afc9 37#include "qemu/timer.h"
a5ee7bd4 38#include "qapi-event.h"
fc01f7e7 39
71e72a19 40#ifdef CONFIG_BSD
7674e7bf
FB
41#include <sys/types.h>
42#include <sys/stat.h>
43#include <sys/ioctl.h>
72cf2d4f 44#include <sys/queue.h>
c5e97233 45#ifndef __DragonFly__
7674e7bf
FB
46#include <sys/disk.h>
47#endif
c5e97233 48#endif
7674e7bf 49
49dc768d
AL
50#ifdef _WIN32
51#include <windows.h>
52#endif
53
9bd2b08f
JS
54/**
55 * A BdrvDirtyBitmap can be in three possible states:
56 * (1) successor is NULL and disabled is false: full r/w mode
57 * (2) successor is NULL and disabled is true: read only mode ("disabled")
58 * (3) successor is set: frozen mode.
59 * A frozen bitmap cannot be renamed, deleted, anonymized, cleared, set,
60 * or enabled. A frozen bitmap can only abdicate() or reclaim().
61 */
e4654d2d 62struct BdrvDirtyBitmap {
aa0c7ca5
JS
63 HBitmap *bitmap; /* Dirty sector bitmap implementation */
64 BdrvDirtyBitmap *successor; /* Anonymous child; implies frozen status */
65 char *name; /* Optional non-empty unique ID */
66 int64_t size; /* Size of the bitmap (Number of sectors) */
67 bool disabled; /* Bitmap is read-only */
e4654d2d
FZ
68 QLIST_ENTRY(BdrvDirtyBitmap) list;
69};
70
1c9805a3
SH
71#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
72
1b7bdbc1
SH
73static QTAILQ_HEAD(, BlockDriverState) bdrv_states =
74 QTAILQ_HEAD_INITIALIZER(bdrv_states);
7ee930d0 75
dc364f4c
BC
76static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
77 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
78
8a22f02a
SH
79static QLIST_HEAD(, BlockDriver) bdrv_drivers =
80 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 81
ce1ffea8 82static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs);
eb852011
MA
83/* If non-zero, use only whitelisted block drivers */
84static int use_bdrv_whitelist;
85
9e0b22f4
SH
86#ifdef _WIN32
87static int is_windows_drive_prefix(const char *filename)
88{
89 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
90 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
91 filename[1] == ':');
92}
93
94int is_windows_drive(const char *filename)
95{
96 if (is_windows_drive_prefix(filename) &&
97 filename[2] == '\0')
98 return 1;
99 if (strstart(filename, "\\\\.\\", NULL) ||
100 strstart(filename, "//./", NULL))
101 return 1;
102 return 0;
103}
104#endif
105
339064d5
KW
106size_t bdrv_opt_mem_align(BlockDriverState *bs)
107{
108 if (!bs || !bs->drv) {
459b4e66
DL
109 /* page size or 4k (hdd sector size) should be on the safe side */
110 return MAX(4096, getpagesize());
339064d5
KW
111 }
112
113 return bs->bl.opt_mem_alignment;
114}
115
4196d2f0
DL
116size_t bdrv_min_mem_align(BlockDriverState *bs)
117{
118 if (!bs || !bs->drv) {
459b4e66
DL
119 /* page size or 4k (hdd sector size) should be on the safe side */
120 return MAX(4096, getpagesize());
4196d2f0
DL
121 }
122
123 return bs->bl.min_mem_alignment;
124}
125
9e0b22f4 126/* check if the path starts with "<protocol>:" */
5c98415b 127int path_has_protocol(const char *path)
9e0b22f4 128{
947995c0
PB
129 const char *p;
130
9e0b22f4
SH
131#ifdef _WIN32
132 if (is_windows_drive(path) ||
133 is_windows_drive_prefix(path)) {
134 return 0;
135 }
947995c0
PB
136 p = path + strcspn(path, ":/\\");
137#else
138 p = path + strcspn(path, ":/");
9e0b22f4
SH
139#endif
140
947995c0 141 return *p == ':';
9e0b22f4
SH
142}
143
83f64091 144int path_is_absolute(const char *path)
3b0d4f61 145{
21664424
FB
146#ifdef _WIN32
147 /* specific case for names like: "\\.\d:" */
f53f4da9 148 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 149 return 1;
f53f4da9
PB
150 }
151 return (*path == '/' || *path == '\\');
3b9f94e1 152#else
f53f4da9 153 return (*path == '/');
3b9f94e1 154#endif
3b0d4f61
FB
155}
156
83f64091
FB
157/* if filename is absolute, just copy it to dest. Otherwise, build a
158 path to it by considering it is relative to base_path. URL are
159 supported. */
160void path_combine(char *dest, int dest_size,
161 const char *base_path,
162 const char *filename)
3b0d4f61 163{
83f64091
FB
164 const char *p, *p1;
165 int len;
166
167 if (dest_size <= 0)
168 return;
169 if (path_is_absolute(filename)) {
170 pstrcpy(dest, dest_size, filename);
171 } else {
172 p = strchr(base_path, ':');
173 if (p)
174 p++;
175 else
176 p = base_path;
3b9f94e1
FB
177 p1 = strrchr(base_path, '/');
178#ifdef _WIN32
179 {
180 const char *p2;
181 p2 = strrchr(base_path, '\\');
182 if (!p1 || p2 > p1)
183 p1 = p2;
184 }
185#endif
83f64091
FB
186 if (p1)
187 p1++;
188 else
189 p1 = base_path;
190 if (p1 > p)
191 p = p1;
192 len = p - base_path;
193 if (len > dest_size - 1)
194 len = dest_size - 1;
195 memcpy(dest, base_path, len);
196 dest[len] = '\0';
197 pstrcat(dest, dest_size, filename);
3b0d4f61 198 }
3b0d4f61
FB
199}
200
0a82855a
HR
201void bdrv_get_full_backing_filename_from_filename(const char *backed,
202 const char *backing,
9f07429e
HR
203 char *dest, size_t sz,
204 Error **errp)
dc5a1371 205{
9f07429e
HR
206 if (backing[0] == '\0' || path_has_protocol(backing) ||
207 path_is_absolute(backing))
208 {
0a82855a 209 pstrcpy(dest, sz, backing);
9f07429e
HR
210 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
211 error_setg(errp, "Cannot use relative backing file names for '%s'",
212 backed);
dc5a1371 213 } else {
0a82855a 214 path_combine(dest, sz, backed, backing);
dc5a1371
PB
215 }
216}
217
9f07429e
HR
218void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
219 Error **errp)
0a82855a 220{
9f07429e
HR
221 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
222
223 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
224 dest, sz, errp);
0a82855a
HR
225}
226
0eb7217e
SH
227void bdrv_register(BlockDriver *bdrv)
228{
229 bdrv_setup_io_funcs(bdrv);
b2e12bc6 230
8a22f02a 231 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 232}
b338082b 233
7f06d47e 234BlockDriverState *bdrv_new_root(void)
b338082b 235{
7f06d47e 236 BlockDriverState *bs = bdrv_new();
e4e9986b 237
e4e9986b 238 QTAILQ_INSERT_TAIL(&bdrv_states, bs, device_list);
e4e9986b
MA
239 return bs;
240}
241
242BlockDriverState *bdrv_new(void)
243{
244 BlockDriverState *bs;
245 int i;
246
5839e53b 247 bs = g_new0(BlockDriverState, 1);
e4654d2d 248 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
249 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
250 QLIST_INIT(&bs->op_blockers[i]);
251 }
28a7282a 252 bdrv_iostatus_disable(bs);
d7d512f6 253 notifier_list_init(&bs->close_notifiers);
d616b224 254 notifier_with_return_list_init(&bs->before_write_notifiers);
cc0681c4
BC
255 qemu_co_queue_init(&bs->throttled_reqs[0]);
256 qemu_co_queue_init(&bs->throttled_reqs[1]);
9fcb0251 257 bs->refcnt = 1;
dcd04228 258 bs->aio_context = qemu_get_aio_context();
d7d512f6 259
b338082b
FB
260 return bs;
261}
262
d7d512f6
PB
263void bdrv_add_close_notifier(BlockDriverState *bs, Notifier *notify)
264{
265 notifier_list_add(&bs->close_notifiers, notify);
266}
267
ea2384d3
FB
268BlockDriver *bdrv_find_format(const char *format_name)
269{
270 BlockDriver *drv1;
8a22f02a
SH
271 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
272 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 273 return drv1;
8a22f02a 274 }
ea2384d3
FB
275 }
276 return NULL;
277}
278
b64ec4e4 279static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 280{
b64ec4e4
FZ
281 static const char *whitelist_rw[] = {
282 CONFIG_BDRV_RW_WHITELIST
283 };
284 static const char *whitelist_ro[] = {
285 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
286 };
287 const char **p;
288
b64ec4e4 289 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 290 return 1; /* no whitelist, anything goes */
b64ec4e4 291 }
eb852011 292
b64ec4e4 293 for (p = whitelist_rw; *p; p++) {
eb852011
MA
294 if (!strcmp(drv->format_name, *p)) {
295 return 1;
296 }
297 }
b64ec4e4
FZ
298 if (read_only) {
299 for (p = whitelist_ro; *p; p++) {
300 if (!strcmp(drv->format_name, *p)) {
301 return 1;
302 }
303 }
304 }
eb852011
MA
305 return 0;
306}
307
b64ec4e4
FZ
308BlockDriver *bdrv_find_whitelisted_format(const char *format_name,
309 bool read_only)
eb852011
MA
310{
311 BlockDriver *drv = bdrv_find_format(format_name);
b64ec4e4 312 return drv && bdrv_is_whitelisted(drv, read_only) ? drv : NULL;
eb852011
MA
313}
314
5b7e1542
ZYW
315typedef struct CreateCo {
316 BlockDriver *drv;
317 char *filename;
83d0521a 318 QemuOpts *opts;
5b7e1542 319 int ret;
cc84d90f 320 Error *err;
5b7e1542
ZYW
321} CreateCo;
322
323static void coroutine_fn bdrv_create_co_entry(void *opaque)
324{
cc84d90f
HR
325 Error *local_err = NULL;
326 int ret;
327
5b7e1542
ZYW
328 CreateCo *cco = opaque;
329 assert(cco->drv);
330
c282e1fd 331 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
84d18f06 332 if (local_err) {
cc84d90f
HR
333 error_propagate(&cco->err, local_err);
334 }
335 cco->ret = ret;
5b7e1542
ZYW
336}
337
0e7e1989 338int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 339 QemuOpts *opts, Error **errp)
ea2384d3 340{
5b7e1542
ZYW
341 int ret;
342
343 Coroutine *co;
344 CreateCo cco = {
345 .drv = drv,
346 .filename = g_strdup(filename),
83d0521a 347 .opts = opts,
5b7e1542 348 .ret = NOT_DONE,
cc84d90f 349 .err = NULL,
5b7e1542
ZYW
350 };
351
c282e1fd 352 if (!drv->bdrv_create) {
cc84d90f 353 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
354 ret = -ENOTSUP;
355 goto out;
5b7e1542
ZYW
356 }
357
358 if (qemu_in_coroutine()) {
359 /* Fast-path if already in coroutine context */
360 bdrv_create_co_entry(&cco);
361 } else {
362 co = qemu_coroutine_create(bdrv_create_co_entry);
363 qemu_coroutine_enter(co, &cco);
364 while (cco.ret == NOT_DONE) {
b47ec2c4 365 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
366 }
367 }
368
369 ret = cco.ret;
cc84d90f 370 if (ret < 0) {
84d18f06 371 if (cco.err) {
cc84d90f
HR
372 error_propagate(errp, cco.err);
373 } else {
374 error_setg_errno(errp, -ret, "Could not create image");
375 }
376 }
0e7e1989 377
80168bff
LC
378out:
379 g_free(cco.filename);
5b7e1542 380 return ret;
ea2384d3
FB
381}
382
c282e1fd 383int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
384{
385 BlockDriver *drv;
cc84d90f
HR
386 Error *local_err = NULL;
387 int ret;
84a12e66 388
b65a5e12 389 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 390 if (drv == NULL) {
16905d71 391 return -ENOENT;
84a12e66
CH
392 }
393
c282e1fd 394 ret = bdrv_create(drv, filename, opts, &local_err);
84d18f06 395 if (local_err) {
cc84d90f
HR
396 error_propagate(errp, local_err);
397 }
398 return ret;
84a12e66
CH
399}
400
892b7de8
ET
401/**
402 * Try to get @bs's logical and physical block size.
403 * On success, store them in @bsz struct and return 0.
404 * On failure return -errno.
405 * @bs must not be empty.
406 */
407int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
408{
409 BlockDriver *drv = bs->drv;
410
411 if (drv && drv->bdrv_probe_blocksizes) {
412 return drv->bdrv_probe_blocksizes(bs, bsz);
413 }
414
415 return -ENOTSUP;
416}
417
418/**
419 * Try to get @bs's geometry (cyls, heads, sectors).
420 * On success, store them in @geo struct and return 0.
421 * On failure return -errno.
422 * @bs must not be empty.
423 */
424int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
425{
426 BlockDriver *drv = bs->drv;
427
428 if (drv && drv->bdrv_probe_geometry) {
429 return drv->bdrv_probe_geometry(bs, geo);
430 }
431
432 return -ENOTSUP;
433}
434
eba25057
JM
435/*
436 * Create a uniquely-named empty temporary file.
437 * Return 0 upon success, otherwise a negative errno value.
438 */
439int get_tmp_filename(char *filename, int size)
d5249393 440{
eba25057 441#ifdef _WIN32
3b9f94e1 442 char temp_dir[MAX_PATH];
eba25057
JM
443 /* GetTempFileName requires that its output buffer (4th param)
444 have length MAX_PATH or greater. */
445 assert(size >= MAX_PATH);
446 return (GetTempPath(MAX_PATH, temp_dir)
447 && GetTempFileName(temp_dir, "qem", 0, filename)
448 ? 0 : -GetLastError());
d5249393 449#else
67b915a5 450 int fd;
7ccfb2eb 451 const char *tmpdir;
0badc1ee 452 tmpdir = getenv("TMPDIR");
69bef793
AS
453 if (!tmpdir) {
454 tmpdir = "/var/tmp";
455 }
eba25057
JM
456 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
457 return -EOVERFLOW;
458 }
ea2384d3 459 fd = mkstemp(filename);
fe235a06
DH
460 if (fd < 0) {
461 return -errno;
462 }
463 if (close(fd) != 0) {
464 unlink(filename);
eba25057
JM
465 return -errno;
466 }
467 return 0;
d5249393 468#endif
eba25057 469}
fc01f7e7 470
84a12e66
CH
471/*
472 * Detect host devices. By convention, /dev/cdrom[N] is always
473 * recognized as a host CDROM.
474 */
475static BlockDriver *find_hdev_driver(const char *filename)
476{
477 int score_max = 0, score;
478 BlockDriver *drv = NULL, *d;
479
480 QLIST_FOREACH(d, &bdrv_drivers, list) {
481 if (d->bdrv_probe_device) {
482 score = d->bdrv_probe_device(filename);
483 if (score > score_max) {
484 score_max = score;
485 drv = d;
486 }
487 }
488 }
489
490 return drv;
491}
492
98289620 493BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
494 bool allow_protocol_prefix,
495 Error **errp)
83f64091
FB
496{
497 BlockDriver *drv1;
498 char protocol[128];
1cec71e3 499 int len;
83f64091 500 const char *p;
19cb3738 501
66f82cee
KW
502 /* TODO Drivers without bdrv_file_open must be specified explicitly */
503
39508e7a
CH
504 /*
505 * XXX(hch): we really should not let host device detection
506 * override an explicit protocol specification, but moving this
507 * later breaks access to device names with colons in them.
508 * Thanks to the brain-dead persistent naming schemes on udev-
509 * based Linux systems those actually are quite common.
510 */
511 drv1 = find_hdev_driver(filename);
512 if (drv1) {
513 return drv1;
514 }
515
98289620 516 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 517 return &bdrv_file;
84a12e66 518 }
98289620 519
9e0b22f4
SH
520 p = strchr(filename, ':');
521 assert(p != NULL);
1cec71e3
AL
522 len = p - filename;
523 if (len > sizeof(protocol) - 1)
524 len = sizeof(protocol) - 1;
525 memcpy(protocol, filename, len);
526 protocol[len] = '\0';
8a22f02a 527 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
5fafdf24 528 if (drv1->protocol_name &&
8a22f02a 529 !strcmp(drv1->protocol_name, protocol)) {
83f64091 530 return drv1;
8a22f02a 531 }
83f64091 532 }
b65a5e12
HR
533
534 error_setg(errp, "Unknown protocol '%s'", protocol);
83f64091
FB
535 return NULL;
536}
537
c6684249
MA
538/*
539 * Guess image format by probing its contents.
540 * This is not a good idea when your image is raw (CVE-2008-2004), but
541 * we do it anyway for backward compatibility.
542 *
543 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
544 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
545 * but can be smaller if the image file is smaller)
c6684249
MA
546 * @filename is its filename.
547 *
548 * For all block drivers, call the bdrv_probe() method to get its
549 * probing score.
550 * Return the first block driver with the highest probing score.
551 */
38f3ef57
KW
552BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
553 const char *filename)
c6684249
MA
554{
555 int score_max = 0, score;
556 BlockDriver *drv = NULL, *d;
557
558 QLIST_FOREACH(d, &bdrv_drivers, list) {
559 if (d->bdrv_probe) {
560 score = d->bdrv_probe(buf, buf_size, filename);
561 if (score > score_max) {
562 score_max = score;
563 drv = d;
564 }
565 }
566 }
567
568 return drv;
569}
570
f500a6d3 571static int find_image_format(BlockDriverState *bs, const char *filename,
34b5d2c6 572 BlockDriver **pdrv, Error **errp)
f3a5d3f8 573{
c6684249 574 BlockDriver *drv;
7cddd372 575 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 576 int ret = 0;
f8ea0b00 577
08a00559 578 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
8e895599 579 if (bs->sg || !bdrv_is_inserted(bs) || bdrv_getlength(bs) == 0) {
ef810437 580 *pdrv = &bdrv_raw;
c98ac35d 581 return ret;
1a396859 582 }
f8ea0b00 583
83f64091 584 ret = bdrv_pread(bs, 0, buf, sizeof(buf));
83f64091 585 if (ret < 0) {
34b5d2c6
HR
586 error_setg_errno(errp, -ret, "Could not read image for determining its "
587 "format");
c98ac35d
SW
588 *pdrv = NULL;
589 return ret;
83f64091
FB
590 }
591
c6684249 592 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 593 if (!drv) {
34b5d2c6
HR
594 error_setg(errp, "Could not determine image format: No compatible "
595 "driver found");
c98ac35d
SW
596 ret = -ENOENT;
597 }
598 *pdrv = drv;
599 return ret;
ea2384d3
FB
600}
601
51762288
SH
602/**
603 * Set the current 'total_sectors' value
65a9bb25 604 * Return 0 on success, -errno on error.
51762288
SH
605 */
606static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
607{
608 BlockDriver *drv = bs->drv;
609
396759ad
NB
610 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
611 if (bs->sg)
612 return 0;
613
51762288
SH
614 /* query actual device if possible, otherwise just trust the hint */
615 if (drv->bdrv_getlength) {
616 int64_t length = drv->bdrv_getlength(bs);
617 if (length < 0) {
618 return length;
619 }
7e382003 620 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
621 }
622
623 bs->total_sectors = hint;
624 return 0;
625}
626
9e8f1835
PB
627/**
628 * Set open flags for a given discard mode
629 *
630 * Return 0 on success, -1 if the discard mode was invalid.
631 */
632int bdrv_parse_discard_flags(const char *mode, int *flags)
633{
634 *flags &= ~BDRV_O_UNMAP;
635
636 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
637 /* do nothing */
638 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
639 *flags |= BDRV_O_UNMAP;
640 } else {
641 return -1;
642 }
643
644 return 0;
645}
646
c3993cdc
SH
647/**
648 * Set open flags for a given cache mode
649 *
650 * Return 0 on success, -1 if the cache mode was invalid.
651 */
652int bdrv_parse_cache_flags(const char *mode, int *flags)
653{
654 *flags &= ~BDRV_O_CACHE_MASK;
655
656 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
657 *flags |= BDRV_O_NOCACHE | BDRV_O_CACHE_WB;
92196b2f
SH
658 } else if (!strcmp(mode, "directsync")) {
659 *flags |= BDRV_O_NOCACHE;
c3993cdc
SH
660 } else if (!strcmp(mode, "writeback")) {
661 *flags |= BDRV_O_CACHE_WB;
662 } else if (!strcmp(mode, "unsafe")) {
663 *flags |= BDRV_O_CACHE_WB;
664 *flags |= BDRV_O_NO_FLUSH;
665 } else if (!strcmp(mode, "writethrough")) {
666 /* this is the default */
667 } else {
668 return -1;
669 }
670
671 return 0;
672}
673
b1e6fc08
KW
674/*
675 * Returns the flags that a temporary snapshot should get, based on the
676 * originally requested flags (the originally requested image will have flags
677 * like a backing file)
678 */
679static int bdrv_temp_snapshot_flags(int flags)
680{
681 return (flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
682}
683
0b50cc88
KW
684/*
685 * Returns the flags that bs->file should get, based on the given flags for
686 * the parent BDS
687 */
688static int bdrv_inherited_flags(int flags)
689{
690 /* Enable protocol handling, disable format probing for bs->file */
691 flags |= BDRV_O_PROTOCOL;
692
693 /* Our block drivers take care to send flushes and respect unmap policy,
694 * so we can enable both unconditionally on lower layers. */
695 flags |= BDRV_O_CACHE_WB | BDRV_O_UNMAP;
696
0b50cc88 697 /* Clear flags that only apply to the top layer */
5669b44d 698 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ);
0b50cc88
KW
699
700 return flags;
701}
702
317fc44e
KW
703/*
704 * Returns the flags that bs->backing_hd should get, based on the given flags
705 * for the parent BDS
706 */
707static int bdrv_backing_flags(int flags)
708{
709 /* backing files always opened read-only */
710 flags &= ~(BDRV_O_RDWR | BDRV_O_COPY_ON_READ);
711
712 /* snapshot=on is handled on the top layer */
8bfea15d 713 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e
KW
714
715 return flags;
716}
717
7b272452
KW
718static int bdrv_open_flags(BlockDriverState *bs, int flags)
719{
720 int open_flags = flags | BDRV_O_CACHE_WB;
721
722 /*
723 * Clear flags that are internal to the block layer before opening the
724 * image.
725 */
20cca275 726 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
727
728 /*
729 * Snapshots should be writable.
730 */
8bfea15d 731 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
732 open_flags |= BDRV_O_RDWR;
733 }
734
735 return open_flags;
736}
737
636ea370
KW
738static void bdrv_assign_node_name(BlockDriverState *bs,
739 const char *node_name,
740 Error **errp)
6913c0c2
BC
741{
742 if (!node_name) {
636ea370 743 return;
6913c0c2
BC
744 }
745
9aebf3b8 746 /* Check for empty string or invalid characters */
f5bebbbb 747 if (!id_wellformed(node_name)) {
9aebf3b8 748 error_setg(errp, "Invalid node name");
636ea370 749 return;
6913c0c2
BC
750 }
751
0c5e94ee 752 /* takes care of avoiding namespaces collisions */
7f06d47e 753 if (blk_by_name(node_name)) {
0c5e94ee
BC
754 error_setg(errp, "node-name=%s is conflicting with a device id",
755 node_name);
636ea370 756 return;
0c5e94ee
BC
757 }
758
6913c0c2
BC
759 /* takes care of avoiding duplicates node names */
760 if (bdrv_find_node(node_name)) {
761 error_setg(errp, "Duplicate node name");
636ea370 762 return;
6913c0c2
BC
763 }
764
765 /* copy node name into the bs and insert it into the graph list */
766 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
767 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
6913c0c2
BC
768}
769
57915332
KW
770/*
771 * Common part for opening disk images and files
b6ad491a
KW
772 *
773 * Removes all processed options from *options.
57915332 774 */
f500a6d3 775static int bdrv_open_common(BlockDriverState *bs, BlockDriverState *file,
34b5d2c6 776 QDict *options, int flags, BlockDriver *drv, Error **errp)
57915332
KW
777{
778 int ret, open_flags;
035fccdf 779 const char *filename;
6913c0c2 780 const char *node_name = NULL;
34b5d2c6 781 Error *local_err = NULL;
57915332
KW
782
783 assert(drv != NULL);
6405875c 784 assert(bs->file == NULL);
707ff828 785 assert(options != NULL && bs->options != options);
57915332 786
45673671
KW
787 if (file != NULL) {
788 filename = file->filename;
789 } else {
790 filename = qdict_get_try_str(options, "filename");
791 }
792
765003db
KW
793 if (drv->bdrv_needs_filename && !filename) {
794 error_setg(errp, "The '%s' block driver requires a file name",
795 drv->format_name);
796 return -EINVAL;
797 }
798
45673671 799 trace_bdrv_open_common(bs, filename ?: "", flags, drv->format_name);
28dcee10 800
6913c0c2 801 node_name = qdict_get_try_str(options, "node-name");
636ea370 802 bdrv_assign_node_name(bs, node_name, &local_err);
0fb6395c 803 if (local_err) {
636ea370
KW
804 error_propagate(errp, local_err);
805 return -EINVAL;
6913c0c2
BC
806 }
807 qdict_del(options, "node-name");
808
5d186eb0
KW
809 /* bdrv_open() with directly using a protocol as drv. This layer is already
810 * opened, so assign it to bs (while file becomes a closed BlockDriverState)
811 * and return immediately. */
812 if (file != NULL && drv->bdrv_file_open) {
813 bdrv_swap(file, bs);
814 return 0;
815 }
816
57915332 817 bs->open_flags = flags;
1b7fd729 818 bs->guest_block_size = 512;
c25f53b0 819 bs->request_alignment = 512;
0d51b4de 820 bs->zero_beyond_eof = true;
b64ec4e4
FZ
821 open_flags = bdrv_open_flags(bs, flags);
822 bs->read_only = !(open_flags & BDRV_O_RDWR);
823
824 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
825 error_setg(errp,
826 !bs->read_only && bdrv_is_whitelisted(drv, true)
827 ? "Driver '%s' can only be used for read-only devices"
828 : "Driver '%s' is not whitelisted",
829 drv->format_name);
b64ec4e4
FZ
830 return -ENOTSUP;
831 }
57915332 832
53fec9d3 833 assert(bs->copy_on_read == 0); /* bdrv_new() and bdrv_close() make it so */
0ebd24e0
KW
834 if (flags & BDRV_O_COPY_ON_READ) {
835 if (!bs->read_only) {
836 bdrv_enable_copy_on_read(bs);
837 } else {
838 error_setg(errp, "Can't use copy-on-read on read-only device");
839 return -EINVAL;
840 }
53fec9d3
SH
841 }
842
c2ad1b0c
KW
843 if (filename != NULL) {
844 pstrcpy(bs->filename, sizeof(bs->filename), filename);
845 } else {
846 bs->filename[0] = '\0';
847 }
91af7014 848 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 849
57915332 850 bs->drv = drv;
7267c094 851 bs->opaque = g_malloc0(drv->instance_size);
57915332 852
03f541bd 853 bs->enable_write_cache = !!(flags & BDRV_O_CACHE_WB);
e7c63796 854
66f82cee
KW
855 /* Open the image, either directly or using a protocol */
856 if (drv->bdrv_file_open) {
5d186eb0 857 assert(file == NULL);
030be321 858 assert(!drv->bdrv_needs_filename || filename != NULL);
34b5d2c6 859 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
f500a6d3 860 } else {
2af5ef70 861 if (file == NULL) {
34b5d2c6
HR
862 error_setg(errp, "Can't use '%s' as a block driver for the "
863 "protocol level", drv->format_name);
2af5ef70
KW
864 ret = -EINVAL;
865 goto free_and_fail;
866 }
f500a6d3 867 bs->file = file;
34b5d2c6 868 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
66f82cee
KW
869 }
870
57915332 871 if (ret < 0) {
84d18f06 872 if (local_err) {
34b5d2c6 873 error_propagate(errp, local_err);
2fa9aa59
DH
874 } else if (bs->filename[0]) {
875 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
34b5d2c6
HR
876 } else {
877 error_setg_errno(errp, -ret, "Could not open image");
878 }
57915332
KW
879 goto free_and_fail;
880 }
881
a1f688f4
MA
882 if (bs->encrypted) {
883 error_report("Encrypted images are deprecated");
884 error_printf("Support for them will be removed in a future release.\n"
885 "You can use 'qemu-img convert' to convert your image"
886 " to an unencrypted one.\n");
887 }
888
51762288
SH
889 ret = refresh_total_sectors(bs, bs->total_sectors);
890 if (ret < 0) {
34b5d2c6 891 error_setg_errno(errp, -ret, "Could not refresh total sector count");
51762288 892 goto free_and_fail;
57915332 893 }
51762288 894
3baca891
KW
895 bdrv_refresh_limits(bs, &local_err);
896 if (local_err) {
897 error_propagate(errp, local_err);
898 ret = -EINVAL;
899 goto free_and_fail;
900 }
901
c25f53b0 902 assert(bdrv_opt_mem_align(bs) != 0);
4196d2f0 903 assert(bdrv_min_mem_align(bs) != 0);
47ea2de2 904 assert((bs->request_alignment != 0) || bs->sg);
57915332
KW
905 return 0;
906
907free_and_fail:
f500a6d3 908 bs->file = NULL;
7267c094 909 g_free(bs->opaque);
57915332
KW
910 bs->opaque = NULL;
911 bs->drv = NULL;
912 return ret;
913}
914
5e5c4f63
KW
915static QDict *parse_json_filename(const char *filename, Error **errp)
916{
917 QObject *options_obj;
918 QDict *options;
919 int ret;
920
921 ret = strstart(filename, "json:", &filename);
922 assert(ret);
923
924 options_obj = qobject_from_json(filename);
925 if (!options_obj) {
926 error_setg(errp, "Could not parse the JSON options");
927 return NULL;
928 }
929
930 if (qobject_type(options_obj) != QTYPE_QDICT) {
931 qobject_decref(options_obj);
932 error_setg(errp, "Invalid JSON object given");
933 return NULL;
934 }
935
936 options = qobject_to_qdict(options_obj);
937 qdict_flatten(options);
938
939 return options;
940}
941
b6ce07aa 942/*
f54120ff
KW
943 * Fills in default options for opening images and converts the legacy
944 * filename/flags pair to option QDict entries.
b6ce07aa 945 */
5e5c4f63 946static int bdrv_fill_options(QDict **options, const char **pfilename, int flags,
17b005f1 947 BlockDriver *drv, Error **errp)
ea2384d3 948{
5e5c4f63 949 const char *filename = *pfilename;
c2ad1b0c 950 const char *drvname;
462f5bcf 951 bool protocol = flags & BDRV_O_PROTOCOL;
e3fa4bfa 952 bool parse_filename = false;
34b5d2c6 953 Error *local_err = NULL;
83f64091 954
5e5c4f63
KW
955 /* Parse json: pseudo-protocol */
956 if (filename && g_str_has_prefix(filename, "json:")) {
957 QDict *json_options = parse_json_filename(filename, &local_err);
958 if (local_err) {
959 error_propagate(errp, local_err);
960 return -EINVAL;
961 }
962
963 /* Options given in the filename have lower priority than options
964 * specified directly */
965 qdict_join(*options, json_options, false);
966 QDECREF(json_options);
967 *pfilename = filename = NULL;
968 }
969
035fccdf 970 /* Fetch the file name from the options QDict if necessary */
17b005f1 971 if (protocol && filename) {
f54120ff
KW
972 if (!qdict_haskey(*options, "filename")) {
973 qdict_put(*options, "filename", qstring_from_str(filename));
974 parse_filename = true;
975 } else {
976 error_setg(errp, "Can't specify 'file' and 'filename' options at "
977 "the same time");
978 return -EINVAL;
979 }
035fccdf
KW
980 }
981
c2ad1b0c 982 /* Find the right block driver */
f54120ff 983 filename = qdict_get_try_str(*options, "filename");
5acd9d81 984 drvname = qdict_get_try_str(*options, "driver");
f54120ff 985
17b005f1
KW
986 if (drv) {
987 if (drvname) {
988 error_setg(errp, "Driver specified twice");
989 return -EINVAL;
990 }
991 drvname = drv->format_name;
992 qdict_put(*options, "driver", qstring_from_str(drvname));
993 } else {
994 if (!drvname && protocol) {
995 if (filename) {
b65a5e12 996 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 997 if (!drv) {
17b005f1
KW
998 return -EINVAL;
999 }
1000
1001 drvname = drv->format_name;
1002 qdict_put(*options, "driver", qstring_from_str(drvname));
1003 } else {
1004 error_setg(errp, "Must specify either driver or file");
f54120ff
KW
1005 return -EINVAL;
1006 }
17b005f1
KW
1007 } else if (drvname) {
1008 drv = bdrv_find_format(drvname);
1009 if (!drv) {
1010 error_setg(errp, "Unknown driver '%s'", drvname);
1011 return -ENOENT;
1012 }
98289620 1013 }
c2ad1b0c
KW
1014 }
1015
17b005f1 1016 assert(drv || !protocol);
c2ad1b0c 1017
f54120ff 1018 /* Driver-specific filename parsing */
17b005f1 1019 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1020 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1021 if (local_err) {
34b5d2c6 1022 error_propagate(errp, local_err);
f54120ff 1023 return -EINVAL;
6963a30d 1024 }
cd5d031e
HR
1025
1026 if (!drv->bdrv_needs_filename) {
1027 qdict_del(*options, "filename");
cd5d031e 1028 }
6963a30d
KW
1029 }
1030
f54120ff
KW
1031 return 0;
1032}
1033
8d24cce1
FZ
1034void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd)
1035{
1036
826b6ca0
FZ
1037 if (bs->backing_hd) {
1038 assert(bs->backing_blocker);
1039 bdrv_op_unblock_all(bs->backing_hd, bs->backing_blocker);
1040 } else if (backing_hd) {
1041 error_setg(&bs->backing_blocker,
81e5f78a
AG
1042 "node is used as backing hd of '%s'",
1043 bdrv_get_device_or_node_name(bs));
826b6ca0
FZ
1044 }
1045
8d24cce1
FZ
1046 bs->backing_hd = backing_hd;
1047 if (!backing_hd) {
826b6ca0
FZ
1048 error_free(bs->backing_blocker);
1049 bs->backing_blocker = NULL;
8d24cce1
FZ
1050 goto out;
1051 }
1052 bs->open_flags &= ~BDRV_O_NO_BACKING;
1053 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_hd->filename);
1054 pstrcpy(bs->backing_format, sizeof(bs->backing_format),
1055 backing_hd->drv ? backing_hd->drv->format_name : "");
826b6ca0
FZ
1056
1057 bdrv_op_block_all(bs->backing_hd, bs->backing_blocker);
1058 /* Otherwise we won't be able to commit due to check in bdrv_commit */
bb00021d 1059 bdrv_op_unblock(bs->backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
826b6ca0 1060 bs->backing_blocker);
8d24cce1 1061out:
3baca891 1062 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
1063}
1064
31ca6d07
KW
1065/*
1066 * Opens the backing file for a BlockDriverState if not yet open
1067 *
1068 * options is a QDict of options to pass to the block drivers, or NULL for an
1069 * empty set of options. The reference to the QDict is transferred to this
1070 * function (even on failure), so if the caller intends to reuse the dictionary,
1071 * it needs to use QINCREF() before calling bdrv_file_open.
1072 */
34b5d2c6 1073int bdrv_open_backing_file(BlockDriverState *bs, QDict *options, Error **errp)
9156df12 1074{
1ba4b6a5 1075 char *backing_filename = g_malloc0(PATH_MAX);
317fc44e 1076 int ret = 0;
8d24cce1 1077 BlockDriverState *backing_hd;
34b5d2c6 1078 Error *local_err = NULL;
9156df12
PB
1079
1080 if (bs->backing_hd != NULL) {
31ca6d07 1081 QDECREF(options);
1ba4b6a5 1082 goto free_exit;
9156df12
PB
1083 }
1084
31ca6d07
KW
1085 /* NULL means an empty set of options */
1086 if (options == NULL) {
1087 options = qdict_new();
1088 }
1089
9156df12 1090 bs->open_flags &= ~BDRV_O_NO_BACKING;
1cb6f506
KW
1091 if (qdict_haskey(options, "file.filename")) {
1092 backing_filename[0] = '\0';
1093 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 1094 QDECREF(options);
1ba4b6a5 1095 goto free_exit;
dbecebdd 1096 } else {
9f07429e
HR
1097 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
1098 &local_err);
1099 if (local_err) {
1100 ret = -EINVAL;
1101 error_propagate(errp, local_err);
1102 QDECREF(options);
1103 goto free_exit;
1104 }
9156df12
PB
1105 }
1106
8ee79e70
KW
1107 if (!bs->drv || !bs->drv->supports_backing) {
1108 ret = -EINVAL;
1109 error_setg(errp, "Driver doesn't support backing files");
1110 QDECREF(options);
1111 goto free_exit;
1112 }
1113
e4e9986b 1114 backing_hd = bdrv_new();
8d24cce1 1115
c5f6e493
KW
1116 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
1117 qdict_put(options, "driver", qstring_from_str(bs->backing_format));
9156df12
PB
1118 }
1119
f67503e5 1120 assert(bs->backing_hd == NULL);
8d24cce1 1121 ret = bdrv_open(&backing_hd,
ddf5636d 1122 *backing_filename ? backing_filename : NULL, NULL, options,
c5f6e493 1123 bdrv_backing_flags(bs->open_flags), NULL, &local_err);
9156df12 1124 if (ret < 0) {
8d24cce1
FZ
1125 bdrv_unref(backing_hd);
1126 backing_hd = NULL;
9156df12 1127 bs->open_flags |= BDRV_O_NO_BACKING;
b04b6b6e
FZ
1128 error_setg(errp, "Could not open backing file: %s",
1129 error_get_pretty(local_err));
1130 error_free(local_err);
1ba4b6a5 1131 goto free_exit;
9156df12 1132 }
8d24cce1 1133 bdrv_set_backing_hd(bs, backing_hd);
d80ac658 1134
1ba4b6a5
BC
1135free_exit:
1136 g_free(backing_filename);
1137 return ret;
9156df12
PB
1138}
1139
da557aac
HR
1140/*
1141 * Opens a disk image whose options are given as BlockdevRef in another block
1142 * device's options.
1143 *
da557aac
HR
1144 * If allow_none is true, no image will be opened if filename is false and no
1145 * BlockdevRef is given. *pbs will remain unchanged and 0 will be returned.
1146 *
1147 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
1148 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1149 * itself, all options starting with "${bdref_key}." are considered part of the
1150 * BlockdevRef.
1151 *
1152 * The BlockdevRef will be removed from the options QDict.
f67503e5
HR
1153 *
1154 * To conform with the behavior of bdrv_open(), *pbs has to be NULL.
da557aac
HR
1155 */
1156int bdrv_open_image(BlockDriverState **pbs, const char *filename,
1157 QDict *options, const char *bdref_key, int flags,
f7d9fd8c 1158 bool allow_none, Error **errp)
da557aac
HR
1159{
1160 QDict *image_options;
1161 int ret;
1162 char *bdref_key_dot;
1163 const char *reference;
1164
f67503e5
HR
1165 assert(pbs);
1166 assert(*pbs == NULL);
1167
da557aac
HR
1168 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1169 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
1170 g_free(bdref_key_dot);
1171
1172 reference = qdict_get_try_str(options, bdref_key);
1173 if (!filename && !reference && !qdict_size(image_options)) {
1174 if (allow_none) {
1175 ret = 0;
1176 } else {
1177 error_setg(errp, "A block device must be specified for \"%s\"",
1178 bdref_key);
1179 ret = -EINVAL;
1180 }
b20e61e0 1181 QDECREF(image_options);
da557aac
HR
1182 goto done;
1183 }
1184
f7d9fd8c 1185 ret = bdrv_open(pbs, filename, reference, image_options, flags, NULL, errp);
da557aac
HR
1186
1187done:
1188 qdict_del(options, bdref_key);
1189 return ret;
1190}
1191
6b8aeca5 1192int bdrv_append_temp_snapshot(BlockDriverState *bs, int flags, Error **errp)
b998875d
KW
1193{
1194 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 1195 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 1196 int64_t total_size;
83d0521a 1197 QemuOpts *opts = NULL;
b998875d
KW
1198 QDict *snapshot_options;
1199 BlockDriverState *bs_snapshot;
1200 Error *local_err;
1201 int ret;
1202
1203 /* if snapshot, we create a temporary backing file and open it
1204 instead of opening 'filename' directly */
1205
1206 /* Get the required size from the image */
f187743a
KW
1207 total_size = bdrv_getlength(bs);
1208 if (total_size < 0) {
6b8aeca5 1209 ret = total_size;
f187743a 1210 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 1211 goto out;
f187743a 1212 }
b998875d
KW
1213
1214 /* Create the temporary image */
1ba4b6a5 1215 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
1216 if (ret < 0) {
1217 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 1218 goto out;
b998875d
KW
1219 }
1220
ef810437 1221 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 1222 &error_abort);
39101f25 1223 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
ef810437 1224 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, &local_err);
83d0521a 1225 qemu_opts_del(opts);
b998875d
KW
1226 if (ret < 0) {
1227 error_setg_errno(errp, -ret, "Could not create temporary overlay "
1228 "'%s': %s", tmp_filename,
1229 error_get_pretty(local_err));
1230 error_free(local_err);
1ba4b6a5 1231 goto out;
b998875d
KW
1232 }
1233
1234 /* Prepare a new options QDict for the temporary file */
1235 snapshot_options = qdict_new();
1236 qdict_put(snapshot_options, "file.driver",
1237 qstring_from_str("file"));
1238 qdict_put(snapshot_options, "file.filename",
1239 qstring_from_str(tmp_filename));
1240
e4e9986b 1241 bs_snapshot = bdrv_new();
b998875d
KW
1242
1243 ret = bdrv_open(&bs_snapshot, NULL, NULL, snapshot_options,
ef810437 1244 flags, &bdrv_qcow2, &local_err);
b998875d
KW
1245 if (ret < 0) {
1246 error_propagate(errp, local_err);
1ba4b6a5 1247 goto out;
b998875d
KW
1248 }
1249
1250 bdrv_append(bs_snapshot, bs);
1ba4b6a5
BC
1251
1252out:
1253 g_free(tmp_filename);
6b8aeca5 1254 return ret;
b998875d
KW
1255}
1256
b6ce07aa
KW
1257/*
1258 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
1259 *
1260 * options is a QDict of options to pass to the block drivers, or NULL for an
1261 * empty set of options. The reference to the QDict belongs to the block layer
1262 * after the call (even on failure), so if the caller intends to reuse the
1263 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
1264 *
1265 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
1266 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
1267 *
1268 * The reference parameter may be used to specify an existing block device which
1269 * should be opened. If specified, neither options nor a filename may be given,
1270 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 1271 */
ddf5636d
HR
1272int bdrv_open(BlockDriverState **pbs, const char *filename,
1273 const char *reference, QDict *options, int flags,
1274 BlockDriver *drv, Error **errp)
ea2384d3 1275{
b6ce07aa 1276 int ret;
f67503e5 1277 BlockDriverState *file = NULL, *bs;
74fe54f2 1278 const char *drvname;
34b5d2c6 1279 Error *local_err = NULL;
b1e6fc08 1280 int snapshot_flags = 0;
712e7874 1281
f67503e5
HR
1282 assert(pbs);
1283
ddf5636d
HR
1284 if (reference) {
1285 bool options_non_empty = options ? qdict_size(options) : false;
1286 QDECREF(options);
1287
1288 if (*pbs) {
1289 error_setg(errp, "Cannot reuse an existing BDS when referencing "
1290 "another block device");
1291 return -EINVAL;
1292 }
1293
1294 if (filename || options_non_empty) {
1295 error_setg(errp, "Cannot reference an existing block device with "
1296 "additional options or a new filename");
1297 return -EINVAL;
1298 }
1299
1300 bs = bdrv_lookup_bs(reference, reference, errp);
1301 if (!bs) {
1302 return -ENODEV;
1303 }
1304 bdrv_ref(bs);
1305 *pbs = bs;
1306 return 0;
1307 }
1308
f67503e5
HR
1309 if (*pbs) {
1310 bs = *pbs;
1311 } else {
e4e9986b 1312 bs = bdrv_new();
f67503e5
HR
1313 }
1314
de9c0cec
KW
1315 /* NULL means an empty set of options */
1316 if (options == NULL) {
1317 options = qdict_new();
1318 }
1319
17b005f1 1320 ret = bdrv_fill_options(&options, &filename, flags, drv, &local_err);
462f5bcf
KW
1321 if (local_err) {
1322 goto fail;
1323 }
1324
76c591b0
KW
1325 /* Find the right image format driver */
1326 drv = NULL;
1327 drvname = qdict_get_try_str(options, "driver");
1328 if (drvname) {
1329 drv = bdrv_find_format(drvname);
1330 qdict_del(options, "driver");
1331 if (!drv) {
1332 error_setg(errp, "Unknown driver: '%s'", drvname);
1333 ret = -EINVAL;
1334 goto fail;
1335 }
1336 }
1337
1338 assert(drvname || !(flags & BDRV_O_PROTOCOL));
1339 if (drv && !drv->bdrv_file_open) {
1340 /* If the user explicitly wants a format driver here, we'll need to add
1341 * another layer for the protocol in bs->file */
1342 flags &= ~BDRV_O_PROTOCOL;
1343 }
1344
de9c0cec 1345 bs->options = options;
b6ad491a 1346 options = qdict_clone_shallow(options);
de9c0cec 1347
f500a6d3 1348 /* Open image file without format layer */
f4788adc
KW
1349 if ((flags & BDRV_O_PROTOCOL) == 0) {
1350 if (flags & BDRV_O_RDWR) {
1351 flags |= BDRV_O_ALLOW_RDWR;
1352 }
1353 if (flags & BDRV_O_SNAPSHOT) {
1354 snapshot_flags = bdrv_temp_snapshot_flags(flags);
1355 flags = bdrv_backing_flags(flags);
1356 }
f500a6d3 1357
f4788adc
KW
1358 assert(file == NULL);
1359 ret = bdrv_open_image(&file, filename, options, "file",
1360 bdrv_inherited_flags(flags),
1361 true, &local_err);
1362 if (ret < 0) {
1363 goto fail;
1364 }
f500a6d3
KW
1365 }
1366
76c591b0 1367 /* Image format probing */
38f3ef57 1368 bs->probed = !drv;
76c591b0 1369 if (!drv && file) {
17b005f1
KW
1370 ret = find_image_format(file, filename, &drv, &local_err);
1371 if (ret < 0) {
8bfea15d 1372 goto fail;
2a05cbe4 1373 }
76c591b0 1374 } else if (!drv) {
17b005f1
KW
1375 error_setg(errp, "Must specify either driver or file");
1376 ret = -EINVAL;
8bfea15d 1377 goto fail;
ea2384d3 1378 }
b6ce07aa
KW
1379
1380 /* Open the image */
34b5d2c6 1381 ret = bdrv_open_common(bs, file, options, flags, drv, &local_err);
b6ce07aa 1382 if (ret < 0) {
8bfea15d 1383 goto fail;
6987307c
CH
1384 }
1385
2a05cbe4 1386 if (file && (bs->file != file)) {
4f6fd349 1387 bdrv_unref(file);
f500a6d3
KW
1388 file = NULL;
1389 }
1390
b6ce07aa 1391 /* If there is a backing file, use it */
9156df12 1392 if ((flags & BDRV_O_NO_BACKING) == 0) {
31ca6d07
KW
1393 QDict *backing_options;
1394
5726d872 1395 qdict_extract_subqdict(options, &backing_options, "backing.");
34b5d2c6 1396 ret = bdrv_open_backing_file(bs, backing_options, &local_err);
b6ce07aa 1397 if (ret < 0) {
b6ad491a 1398 goto close_and_fail;
b6ce07aa 1399 }
b6ce07aa
KW
1400 }
1401
91af7014
HR
1402 bdrv_refresh_filename(bs);
1403
b998875d
KW
1404 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
1405 * temporary snapshot afterwards. */
b1e6fc08 1406 if (snapshot_flags) {
6b8aeca5 1407 ret = bdrv_append_temp_snapshot(bs, snapshot_flags, &local_err);
b998875d 1408 if (local_err) {
b998875d
KW
1409 goto close_and_fail;
1410 }
1411 }
1412
b6ad491a 1413 /* Check if any unknown options were used */
5acd9d81 1414 if (options && (qdict_size(options) != 0)) {
b6ad491a 1415 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
1416 if (flags & BDRV_O_PROTOCOL) {
1417 error_setg(errp, "Block protocol '%s' doesn't support the option "
1418 "'%s'", drv->format_name, entry->key);
1419 } else {
1420 error_setg(errp, "Block format '%s' used by device '%s' doesn't "
1421 "support the option '%s'", drv->format_name,
bfb197e0 1422 bdrv_get_device_name(bs), entry->key);
5acd9d81 1423 }
b6ad491a
KW
1424
1425 ret = -EINVAL;
1426 goto close_and_fail;
1427 }
b6ad491a 1428
b6ce07aa 1429 if (!bdrv_key_required(bs)) {
a7f53e26
MA
1430 if (bs->blk) {
1431 blk_dev_change_media_cb(bs->blk, true);
1432 }
c3adb58f
MA
1433 } else if (!runstate_check(RUN_STATE_PRELAUNCH)
1434 && !runstate_check(RUN_STATE_INMIGRATE)
1435 && !runstate_check(RUN_STATE_PAUSED)) { /* HACK */
1436 error_setg(errp,
1437 "Guest must be stopped for opening of encrypted image");
1438 ret = -EBUSY;
1439 goto close_and_fail;
b6ce07aa
KW
1440 }
1441
c3adb58f 1442 QDECREF(options);
f67503e5 1443 *pbs = bs;
b6ce07aa
KW
1444 return 0;
1445
8bfea15d 1446fail:
f500a6d3 1447 if (file != NULL) {
4f6fd349 1448 bdrv_unref(file);
f500a6d3 1449 }
de9c0cec 1450 QDECREF(bs->options);
b6ad491a 1451 QDECREF(options);
de9c0cec 1452 bs->options = NULL;
f67503e5
HR
1453 if (!*pbs) {
1454 /* If *pbs is NULL, a new BDS has been created in this function and
1455 needs to be freed now. Otherwise, it does not need to be closed,
1456 since it has not really been opened yet. */
1457 bdrv_unref(bs);
1458 }
84d18f06 1459 if (local_err) {
34b5d2c6
HR
1460 error_propagate(errp, local_err);
1461 }
b6ad491a 1462 return ret;
de9c0cec 1463
b6ad491a 1464close_and_fail:
f67503e5
HR
1465 /* See fail path, but now the BDS has to be always closed */
1466 if (*pbs) {
1467 bdrv_close(bs);
1468 } else {
1469 bdrv_unref(bs);
1470 }
b6ad491a 1471 QDECREF(options);
84d18f06 1472 if (local_err) {
34b5d2c6
HR
1473 error_propagate(errp, local_err);
1474 }
b6ce07aa
KW
1475 return ret;
1476}
1477
e971aa12
JC
1478typedef struct BlockReopenQueueEntry {
1479 bool prepared;
1480 BDRVReopenState state;
1481 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
1482} BlockReopenQueueEntry;
1483
1484/*
1485 * Adds a BlockDriverState to a simple queue for an atomic, transactional
1486 * reopen of multiple devices.
1487 *
1488 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
1489 * already performed, or alternatively may be NULL a new BlockReopenQueue will
1490 * be created and initialized. This newly created BlockReopenQueue should be
1491 * passed back in for subsequent calls that are intended to be of the same
1492 * atomic 'set'.
1493 *
1494 * bs is the BlockDriverState to add to the reopen queue.
1495 *
1496 * flags contains the open flags for the associated bs
1497 *
1498 * returns a pointer to bs_queue, which is either the newly allocated
1499 * bs_queue, or the existing bs_queue being used.
1500 *
1501 */
1502BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
1503 BlockDriverState *bs, int flags)
1504{
1505 assert(bs != NULL);
1506
1507 BlockReopenQueueEntry *bs_entry;
1508 if (bs_queue == NULL) {
1509 bs_queue = g_new0(BlockReopenQueue, 1);
1510 QSIMPLEQ_INIT(bs_queue);
1511 }
1512
f1f25a2e
KW
1513 /* bdrv_open() masks this flag out */
1514 flags &= ~BDRV_O_PROTOCOL;
1515
e971aa12 1516 if (bs->file) {
f1f25a2e 1517 bdrv_reopen_queue(bs_queue, bs->file, bdrv_inherited_flags(flags));
e971aa12
JC
1518 }
1519
1520 bs_entry = g_new0(BlockReopenQueueEntry, 1);
1521 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
1522
1523 bs_entry->state.bs = bs;
1524 bs_entry->state.flags = flags;
1525
1526 return bs_queue;
1527}
1528
1529/*
1530 * Reopen multiple BlockDriverStates atomically & transactionally.
1531 *
1532 * The queue passed in (bs_queue) must have been built up previous
1533 * via bdrv_reopen_queue().
1534 *
1535 * Reopens all BDS specified in the queue, with the appropriate
1536 * flags. All devices are prepared for reopen, and failure of any
1537 * device will cause all device changes to be abandonded, and intermediate
1538 * data cleaned up.
1539 *
1540 * If all devices prepare successfully, then the changes are committed
1541 * to all devices.
1542 *
1543 */
1544int bdrv_reopen_multiple(BlockReopenQueue *bs_queue, Error **errp)
1545{
1546 int ret = -1;
1547 BlockReopenQueueEntry *bs_entry, *next;
1548 Error *local_err = NULL;
1549
1550 assert(bs_queue != NULL);
1551
1552 bdrv_drain_all();
1553
1554 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1555 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
1556 error_propagate(errp, local_err);
1557 goto cleanup;
1558 }
1559 bs_entry->prepared = true;
1560 }
1561
1562 /* If we reach this point, we have success and just need to apply the
1563 * changes
1564 */
1565 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1566 bdrv_reopen_commit(&bs_entry->state);
1567 }
1568
1569 ret = 0;
1570
1571cleanup:
1572 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
1573 if (ret && bs_entry->prepared) {
1574 bdrv_reopen_abort(&bs_entry->state);
1575 }
1576 g_free(bs_entry);
1577 }
1578 g_free(bs_queue);
1579 return ret;
1580}
1581
1582
1583/* Reopen a single BlockDriverState with the specified flags. */
1584int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
1585{
1586 int ret = -1;
1587 Error *local_err = NULL;
1588 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, bdrv_flags);
1589
1590 ret = bdrv_reopen_multiple(queue, &local_err);
1591 if (local_err != NULL) {
1592 error_propagate(errp, local_err);
1593 }
1594 return ret;
1595}
1596
1597
1598/*
1599 * Prepares a BlockDriverState for reopen. All changes are staged in the
1600 * 'opaque' field of the BDRVReopenState, which is used and allocated by
1601 * the block driver layer .bdrv_reopen_prepare()
1602 *
1603 * bs is the BlockDriverState to reopen
1604 * flags are the new open flags
1605 * queue is the reopen queue
1606 *
1607 * Returns 0 on success, non-zero on error. On error errp will be set
1608 * as well.
1609 *
1610 * On failure, bdrv_reopen_abort() will be called to clean up any data.
1611 * It is the responsibility of the caller to then call the abort() or
1612 * commit() for any other BDS that have been left in a prepare() state
1613 *
1614 */
1615int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
1616 Error **errp)
1617{
1618 int ret = -1;
1619 Error *local_err = NULL;
1620 BlockDriver *drv;
1621
1622 assert(reopen_state != NULL);
1623 assert(reopen_state->bs->drv != NULL);
1624 drv = reopen_state->bs->drv;
1625
1626 /* if we are to stay read-only, do not allow permission change
1627 * to r/w */
1628 if (!(reopen_state->bs->open_flags & BDRV_O_ALLOW_RDWR) &&
1629 reopen_state->flags & BDRV_O_RDWR) {
81e5f78a
AG
1630 error_setg(errp, "Node '%s' is read only",
1631 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
1632 goto error;
1633 }
1634
1635
1636 ret = bdrv_flush(reopen_state->bs);
1637 if (ret) {
1638 error_set(errp, ERROR_CLASS_GENERIC_ERROR, "Error (%s) flushing drive",
1639 strerror(-ret));
1640 goto error;
1641 }
1642
1643 if (drv->bdrv_reopen_prepare) {
1644 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
1645 if (ret) {
1646 if (local_err != NULL) {
1647 error_propagate(errp, local_err);
1648 } else {
d8b6895f
LC
1649 error_setg(errp, "failed while preparing to reopen image '%s'",
1650 reopen_state->bs->filename);
e971aa12
JC
1651 }
1652 goto error;
1653 }
1654 } else {
1655 /* It is currently mandatory to have a bdrv_reopen_prepare()
1656 * handler for each supported drv. */
81e5f78a
AG
1657 error_setg(errp, "Block format '%s' used by node '%s' "
1658 "does not support reopening files", drv->format_name,
1659 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
1660 ret = -1;
1661 goto error;
1662 }
1663
1664 ret = 0;
1665
1666error:
1667 return ret;
1668}
1669
1670/*
1671 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
1672 * makes them final by swapping the staging BlockDriverState contents into
1673 * the active BlockDriverState contents.
1674 */
1675void bdrv_reopen_commit(BDRVReopenState *reopen_state)
1676{
1677 BlockDriver *drv;
1678
1679 assert(reopen_state != NULL);
1680 drv = reopen_state->bs->drv;
1681 assert(drv != NULL);
1682
1683 /* If there are any driver level actions to take */
1684 if (drv->bdrv_reopen_commit) {
1685 drv->bdrv_reopen_commit(reopen_state);
1686 }
1687
1688 /* set BDS specific flags now */
1689 reopen_state->bs->open_flags = reopen_state->flags;
1690 reopen_state->bs->enable_write_cache = !!(reopen_state->flags &
1691 BDRV_O_CACHE_WB);
1692 reopen_state->bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 1693
3baca891 1694 bdrv_refresh_limits(reopen_state->bs, NULL);
e971aa12
JC
1695}
1696
1697/*
1698 * Abort the reopen, and delete and free the staged changes in
1699 * reopen_state
1700 */
1701void bdrv_reopen_abort(BDRVReopenState *reopen_state)
1702{
1703 BlockDriver *drv;
1704
1705 assert(reopen_state != NULL);
1706 drv = reopen_state->bs->drv;
1707 assert(drv != NULL);
1708
1709 if (drv->bdrv_reopen_abort) {
1710 drv->bdrv_reopen_abort(reopen_state);
1711 }
1712}
1713
1714
fc01f7e7
FB
1715void bdrv_close(BlockDriverState *bs)
1716{
33384421
HR
1717 BdrvAioNotifier *ban, *ban_next;
1718
3cbc002c
PB
1719 if (bs->job) {
1720 block_job_cancel_sync(bs->job);
1721 }
58fda173
SH
1722 bdrv_drain_all(); /* complete I/O */
1723 bdrv_flush(bs);
1724 bdrv_drain_all(); /* in case flush left pending I/O */
d7d512f6 1725 notifier_list_notify(&bs->close_notifiers, bs);
7094f12f 1726
3cbc002c 1727 if (bs->drv) {
557df6ac 1728 if (bs->backing_hd) {
826b6ca0
FZ
1729 BlockDriverState *backing_hd = bs->backing_hd;
1730 bdrv_set_backing_hd(bs, NULL);
1731 bdrv_unref(backing_hd);
557df6ac 1732 }
ea2384d3 1733 bs->drv->bdrv_close(bs);
7267c094 1734 g_free(bs->opaque);
ea2384d3
FB
1735 bs->opaque = NULL;
1736 bs->drv = NULL;
53fec9d3 1737 bs->copy_on_read = 0;
a275fa42
PB
1738 bs->backing_file[0] = '\0';
1739 bs->backing_format[0] = '\0';
6405875c
PB
1740 bs->total_sectors = 0;
1741 bs->encrypted = 0;
1742 bs->valid_key = 0;
1743 bs->sg = 0;
0d51b4de 1744 bs->zero_beyond_eof = false;
de9c0cec
KW
1745 QDECREF(bs->options);
1746 bs->options = NULL;
91af7014
HR
1747 QDECREF(bs->full_open_options);
1748 bs->full_open_options = NULL;
b338082b 1749
66f82cee 1750 if (bs->file != NULL) {
4f6fd349 1751 bdrv_unref(bs->file);
0ac9377d 1752 bs->file = NULL;
66f82cee 1753 }
b338082b 1754 }
98f90dba 1755
a7f53e26
MA
1756 if (bs->blk) {
1757 blk_dev_change_media_cb(bs->blk, false);
1758 }
9ca11154 1759
98f90dba
ZYW
1760 /*throttling disk I/O limits*/
1761 if (bs->io_limits_enabled) {
1762 bdrv_io_limits_disable(bs);
1763 }
33384421
HR
1764
1765 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
1766 g_free(ban);
1767 }
1768 QLIST_INIT(&bs->aio_notifiers);
b338082b
FB
1769}
1770
2bc93fed
MK
1771void bdrv_close_all(void)
1772{
1773 BlockDriverState *bs;
1774
dc364f4c 1775 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
1776 AioContext *aio_context = bdrv_get_aio_context(bs);
1777
1778 aio_context_acquire(aio_context);
2bc93fed 1779 bdrv_close(bs);
ed78cda3 1780 aio_context_release(aio_context);
2bc93fed
MK
1781 }
1782}
1783
dc364f4c
BC
1784/* make a BlockDriverState anonymous by removing from bdrv_state and
1785 * graph_bdrv_state list.
d22b2f41
RH
1786 Also, NULL terminate the device_name to prevent double remove */
1787void bdrv_make_anon(BlockDriverState *bs)
1788{
bfb197e0
MA
1789 /*
1790 * Take care to remove bs from bdrv_states only when it's actually
1791 * in it. Note that bs->device_list.tqe_prev is initially null,
1792 * and gets set to non-null by QTAILQ_INSERT_TAIL(). Establish
1793 * the useful invariant "bs in bdrv_states iff bs->tqe_prev" by
1794 * resetting it to null on remove.
1795 */
1796 if (bs->device_list.tqe_prev) {
dc364f4c 1797 QTAILQ_REMOVE(&bdrv_states, bs, device_list);
bfb197e0 1798 bs->device_list.tqe_prev = NULL;
d22b2f41 1799 }
dc364f4c
BC
1800 if (bs->node_name[0] != '\0') {
1801 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
1802 }
1803 bs->node_name[0] = '\0';
d22b2f41
RH
1804}
1805
e023b2e2
PB
1806static void bdrv_rebind(BlockDriverState *bs)
1807{
1808 if (bs->drv && bs->drv->bdrv_rebind) {
1809 bs->drv->bdrv_rebind(bs);
1810 }
1811}
1812
4ddc07ca
PB
1813static void bdrv_move_feature_fields(BlockDriverState *bs_dest,
1814 BlockDriverState *bs_src)
8802d1fd 1815{
4ddc07ca 1816 /* move some fields that need to stay attached to the device */
8802d1fd
JC
1817
1818 /* dev info */
1b7fd729 1819 bs_dest->guest_block_size = bs_src->guest_block_size;
4ddc07ca 1820 bs_dest->copy_on_read = bs_src->copy_on_read;
8802d1fd 1821
4ddc07ca 1822 bs_dest->enable_write_cache = bs_src->enable_write_cache;
c4a248a1 1823
cc0681c4
BC
1824 /* i/o throttled req */
1825 memcpy(&bs_dest->throttle_state,
1826 &bs_src->throttle_state,
1827 sizeof(ThrottleState));
0e5b0a2d
BC
1828 memcpy(&bs_dest->throttle_timers,
1829 &bs_src->throttle_timers,
1830 sizeof(ThrottleTimers));
cc0681c4
BC
1831 bs_dest->throttled_reqs[0] = bs_src->throttled_reqs[0];
1832 bs_dest->throttled_reqs[1] = bs_src->throttled_reqs[1];
4ddc07ca 1833 bs_dest->io_limits_enabled = bs_src->io_limits_enabled;
8802d1fd 1834
8802d1fd 1835 /* r/w error */
4ddc07ca
PB
1836 bs_dest->on_read_error = bs_src->on_read_error;
1837 bs_dest->on_write_error = bs_src->on_write_error;
8802d1fd
JC
1838
1839 /* i/o status */
4ddc07ca
PB
1840 bs_dest->iostatus_enabled = bs_src->iostatus_enabled;
1841 bs_dest->iostatus = bs_src->iostatus;
8802d1fd 1842
a9fc4408 1843 /* dirty bitmap */
e4654d2d 1844 bs_dest->dirty_bitmaps = bs_src->dirty_bitmaps;
a9fc4408 1845
9fcb0251
FZ
1846 /* reference count */
1847 bs_dest->refcnt = bs_src->refcnt;
1848
a9fc4408 1849 /* job */
4ddc07ca 1850 bs_dest->job = bs_src->job;
a9fc4408 1851
8802d1fd 1852 /* keep the same entry in bdrv_states */
dc364f4c 1853 bs_dest->device_list = bs_src->device_list;
7e7d56d9
MA
1854 bs_dest->blk = bs_src->blk;
1855
fbe40ff7
FZ
1856 memcpy(bs_dest->op_blockers, bs_src->op_blockers,
1857 sizeof(bs_dest->op_blockers));
4ddc07ca 1858}
8802d1fd 1859
4ddc07ca
PB
1860/*
1861 * Swap bs contents for two image chains while they are live,
1862 * while keeping required fields on the BlockDriverState that is
1863 * actually attached to a device.
1864 *
1865 * This will modify the BlockDriverState fields, and swap contents
1866 * between bs_new and bs_old. Both bs_new and bs_old are modified.
1867 *
bfb197e0 1868 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
1869 *
1870 * This function does not create any image files.
1871 */
1872void bdrv_swap(BlockDriverState *bs_new, BlockDriverState *bs_old)
1873{
1874 BlockDriverState tmp;
f6801b83 1875
90ce8a06
BC
1876 /* The code needs to swap the node_name but simply swapping node_list won't
1877 * work so first remove the nodes from the graph list, do the swap then
1878 * insert them back if needed.
1879 */
1880 if (bs_new->node_name[0] != '\0') {
1881 QTAILQ_REMOVE(&graph_bdrv_states, bs_new, node_list);
1882 }
1883 if (bs_old->node_name[0] != '\0') {
1884 QTAILQ_REMOVE(&graph_bdrv_states, bs_old, node_list);
1885 }
1886
bfb197e0 1887 /* bs_new must be unattached and shouldn't have anything fancy enabled */
7e7d56d9 1888 assert(!bs_new->blk);
e4654d2d 1889 assert(QLIST_EMPTY(&bs_new->dirty_bitmaps));
4ddc07ca 1890 assert(bs_new->job == NULL);
4ddc07ca 1891 assert(bs_new->io_limits_enabled == false);
0e5b0a2d 1892 assert(!throttle_timers_are_initialized(&bs_new->throttle_timers));
8802d1fd 1893
4ddc07ca
PB
1894 tmp = *bs_new;
1895 *bs_new = *bs_old;
1896 *bs_old = tmp;
a9fc4408 1897
4ddc07ca
PB
1898 /* there are some fields that should not be swapped, move them back */
1899 bdrv_move_feature_fields(&tmp, bs_old);
1900 bdrv_move_feature_fields(bs_old, bs_new);
1901 bdrv_move_feature_fields(bs_new, &tmp);
8802d1fd 1902
bfb197e0 1903 /* bs_new must remain unattached */
7e7d56d9 1904 assert(!bs_new->blk);
4ddc07ca
PB
1905
1906 /* Check a few fields that should remain attached to the device */
4ddc07ca 1907 assert(bs_new->job == NULL);
4ddc07ca 1908 assert(bs_new->io_limits_enabled == false);
0e5b0a2d 1909 assert(!throttle_timers_are_initialized(&bs_new->throttle_timers));
e023b2e2 1910
90ce8a06
BC
1911 /* insert the nodes back into the graph node list if needed */
1912 if (bs_new->node_name[0] != '\0') {
1913 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs_new, node_list);
1914 }
1915 if (bs_old->node_name[0] != '\0') {
1916 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs_old, node_list);
1917 }
1918
e023b2e2 1919 bdrv_rebind(bs_new);
4ddc07ca
PB
1920 bdrv_rebind(bs_old);
1921}
1922
1923/*
1924 * Add new bs contents at the top of an image chain while the chain is
1925 * live, while keeping required fields on the top layer.
1926 *
1927 * This will modify the BlockDriverState fields, and swap contents
1928 * between bs_new and bs_top. Both bs_new and bs_top are modified.
1929 *
bfb197e0 1930 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
1931 *
1932 * This function does not create any image files.
1933 */
1934void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top)
1935{
1936 bdrv_swap(bs_new, bs_top);
1937
1938 /* The contents of 'tmp' will become bs_top, as we are
1939 * swapping bs_new and bs_top contents. */
8d24cce1 1940 bdrv_set_backing_hd(bs_top, bs_new);
8802d1fd
JC
1941}
1942
4f6fd349 1943static void bdrv_delete(BlockDriverState *bs)
b338082b 1944{
3e914655 1945 assert(!bs->job);
3718d8ab 1946 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 1947 assert(!bs->refcnt);
e4654d2d 1948 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
18846dee 1949
e1b5c52e
SH
1950 bdrv_close(bs);
1951
1b7bdbc1 1952 /* remove from list, if necessary */
d22b2f41 1953 bdrv_make_anon(bs);
34c6f050 1954
7267c094 1955 g_free(bs);
fc01f7e7
FB
1956}
1957
e97fc193
AL
1958/*
1959 * Run consistency checks on an image
1960 *
e076f338 1961 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 1962 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 1963 * check are stored in res.
e97fc193 1964 */
4534ff54 1965int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 1966{
908bcd54
HR
1967 if (bs->drv == NULL) {
1968 return -ENOMEDIUM;
1969 }
e97fc193
AL
1970 if (bs->drv->bdrv_check == NULL) {
1971 return -ENOTSUP;
1972 }
1973
e076f338 1974 memset(res, 0, sizeof(*res));
4534ff54 1975 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
1976}
1977
8a426614
KW
1978#define COMMIT_BUF_SECTORS 2048
1979
33e3963e
FB
1980/* commit COW file into the raw image */
1981int bdrv_commit(BlockDriverState *bs)
1982{
19cb3738 1983 BlockDriver *drv = bs->drv;
72706ea4 1984 int64_t sector, total_sectors, length, backing_length;
8a426614 1985 int n, ro, open_flags;
0bce597d 1986 int ret = 0;
72706ea4 1987 uint8_t *buf = NULL;
33e3963e 1988
19cb3738
FB
1989 if (!drv)
1990 return -ENOMEDIUM;
6bb45158 1991
4dca4b63
NS
1992 if (!bs->backing_hd) {
1993 return -ENOTSUP;
33e3963e
FB
1994 }
1995
bb00021d
FZ
1996 if (bdrv_op_is_blocked(bs, BLOCK_OP_TYPE_COMMIT_SOURCE, NULL) ||
1997 bdrv_op_is_blocked(bs->backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET, NULL)) {
2d3735d3
SH
1998 return -EBUSY;
1999 }
2000
4dca4b63 2001 ro = bs->backing_hd->read_only;
4dca4b63
NS
2002 open_flags = bs->backing_hd->open_flags;
2003
2004 if (ro) {
0bce597d
JC
2005 if (bdrv_reopen(bs->backing_hd, open_flags | BDRV_O_RDWR, NULL)) {
2006 return -EACCES;
4dca4b63 2007 }
ea2384d3 2008 }
33e3963e 2009
72706ea4
JC
2010 length = bdrv_getlength(bs);
2011 if (length < 0) {
2012 ret = length;
2013 goto ro_cleanup;
2014 }
2015
2016 backing_length = bdrv_getlength(bs->backing_hd);
2017 if (backing_length < 0) {
2018 ret = backing_length;
2019 goto ro_cleanup;
2020 }
2021
2022 /* If our top snapshot is larger than the backing file image,
2023 * grow the backing file image if possible. If not possible,
2024 * we must return an error */
2025 if (length > backing_length) {
2026 ret = bdrv_truncate(bs->backing_hd, length);
2027 if (ret < 0) {
2028 goto ro_cleanup;
2029 }
2030 }
2031
2032 total_sectors = length >> BDRV_SECTOR_BITS;
857d4f46
KW
2033
2034 /* qemu_try_blockalign() for bs will choose an alignment that works for
2035 * bs->backing_hd as well, so no need to compare the alignment manually. */
2036 buf = qemu_try_blockalign(bs, COMMIT_BUF_SECTORS * BDRV_SECTOR_SIZE);
2037 if (buf == NULL) {
2038 ret = -ENOMEM;
2039 goto ro_cleanup;
2040 }
8a426614
KW
2041
2042 for (sector = 0; sector < total_sectors; sector += n) {
d663640c
PB
2043 ret = bdrv_is_allocated(bs, sector, COMMIT_BUF_SECTORS, &n);
2044 if (ret < 0) {
2045 goto ro_cleanup;
2046 }
2047 if (ret) {
dabfa6cc
KW
2048 ret = bdrv_read(bs, sector, buf, n);
2049 if (ret < 0) {
8a426614
KW
2050 goto ro_cleanup;
2051 }
2052
dabfa6cc
KW
2053 ret = bdrv_write(bs->backing_hd, sector, buf, n);
2054 if (ret < 0) {
8a426614
KW
2055 goto ro_cleanup;
2056 }
ea2384d3 2057 }
33e3963e 2058 }
95389c86 2059
1d44952f
CH
2060 if (drv->bdrv_make_empty) {
2061 ret = drv->bdrv_make_empty(bs);
dabfa6cc
KW
2062 if (ret < 0) {
2063 goto ro_cleanup;
2064 }
1d44952f
CH
2065 bdrv_flush(bs);
2066 }
95389c86 2067
3f5075ae
CH
2068 /*
2069 * Make sure all data we wrote to the backing device is actually
2070 * stable on disk.
2071 */
dabfa6cc 2072 if (bs->backing_hd) {
3f5075ae 2073 bdrv_flush(bs->backing_hd);
dabfa6cc 2074 }
4dca4b63 2075
dabfa6cc 2076 ret = 0;
4dca4b63 2077ro_cleanup:
857d4f46 2078 qemu_vfree(buf);
4dca4b63
NS
2079
2080 if (ro) {
0bce597d
JC
2081 /* ignoring error return here */
2082 bdrv_reopen(bs->backing_hd, open_flags & ~BDRV_O_RDWR, NULL);
4dca4b63
NS
2083 }
2084
1d44952f 2085 return ret;
33e3963e
FB
2086}
2087
e8877497 2088int bdrv_commit_all(void)
6ab4b5ab
MA
2089{
2090 BlockDriverState *bs;
2091
dc364f4c 2092 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
2093 AioContext *aio_context = bdrv_get_aio_context(bs);
2094
2095 aio_context_acquire(aio_context);
272d2d8e
JC
2096 if (bs->drv && bs->backing_hd) {
2097 int ret = bdrv_commit(bs);
2098 if (ret < 0) {
ed78cda3 2099 aio_context_release(aio_context);
272d2d8e
JC
2100 return ret;
2101 }
e8877497 2102 }
ed78cda3 2103 aio_context_release(aio_context);
6ab4b5ab 2104 }
e8877497 2105 return 0;
6ab4b5ab
MA
2106}
2107
756e6736
KW
2108/*
2109 * Return values:
2110 * 0 - success
2111 * -EINVAL - backing format specified, but no file
2112 * -ENOSPC - can't update the backing file because no space is left in the
2113 * image file header
2114 * -ENOTSUP - format driver doesn't support changing the backing file
2115 */
2116int bdrv_change_backing_file(BlockDriverState *bs,
2117 const char *backing_file, const char *backing_fmt)
2118{
2119 BlockDriver *drv = bs->drv;
469ef350 2120 int ret;
756e6736 2121
5f377794
PB
2122 /* Backing file format doesn't make sense without a backing file */
2123 if (backing_fmt && !backing_file) {
2124 return -EINVAL;
2125 }
2126
756e6736 2127 if (drv->bdrv_change_backing_file != NULL) {
469ef350 2128 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 2129 } else {
469ef350 2130 ret = -ENOTSUP;
756e6736 2131 }
469ef350
PB
2132
2133 if (ret == 0) {
2134 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
2135 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
2136 }
2137 return ret;
756e6736
KW
2138}
2139
6ebdcee2
JC
2140/*
2141 * Finds the image layer in the chain that has 'bs' as its backing file.
2142 *
2143 * active is the current topmost image.
2144 *
2145 * Returns NULL if bs is not found in active's image chain,
2146 * or if active == bs.
4caf0fcd
JC
2147 *
2148 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
2149 */
2150BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
2151 BlockDriverState *bs)
2152{
4caf0fcd
JC
2153 while (active && bs != active->backing_hd) {
2154 active = active->backing_hd;
6ebdcee2
JC
2155 }
2156
4caf0fcd
JC
2157 return active;
2158}
6ebdcee2 2159
4caf0fcd
JC
2160/* Given a BDS, searches for the base layer. */
2161BlockDriverState *bdrv_find_base(BlockDriverState *bs)
2162{
2163 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
2164}
2165
2166typedef struct BlkIntermediateStates {
2167 BlockDriverState *bs;
2168 QSIMPLEQ_ENTRY(BlkIntermediateStates) entry;
2169} BlkIntermediateStates;
2170
2171
2172/*
2173 * Drops images above 'base' up to and including 'top', and sets the image
2174 * above 'top' to have base as its backing file.
2175 *
2176 * Requires that the overlay to 'top' is opened r/w, so that the backing file
2177 * information in 'bs' can be properly updated.
2178 *
2179 * E.g., this will convert the following chain:
2180 * bottom <- base <- intermediate <- top <- active
2181 *
2182 * to
2183 *
2184 * bottom <- base <- active
2185 *
2186 * It is allowed for bottom==base, in which case it converts:
2187 *
2188 * base <- intermediate <- top <- active
2189 *
2190 * to
2191 *
2192 * base <- active
2193 *
54e26900
JC
2194 * If backing_file_str is non-NULL, it will be used when modifying top's
2195 * overlay image metadata.
2196 *
6ebdcee2
JC
2197 * Error conditions:
2198 * if active == top, that is considered an error
2199 *
2200 */
2201int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 2202 BlockDriverState *base, const char *backing_file_str)
6ebdcee2
JC
2203{
2204 BlockDriverState *intermediate;
2205 BlockDriverState *base_bs = NULL;
2206 BlockDriverState *new_top_bs = NULL;
2207 BlkIntermediateStates *intermediate_state, *next;
2208 int ret = -EIO;
2209
2210 QSIMPLEQ_HEAD(states_to_delete, BlkIntermediateStates) states_to_delete;
2211 QSIMPLEQ_INIT(&states_to_delete);
2212
2213 if (!top->drv || !base->drv) {
2214 goto exit;
2215 }
2216
2217 new_top_bs = bdrv_find_overlay(active, top);
2218
2219 if (new_top_bs == NULL) {
2220 /* we could not find the image above 'top', this is an error */
2221 goto exit;
2222 }
2223
2224 /* special case of new_top_bs->backing_hd already pointing to base - nothing
2225 * to do, no intermediate images */
2226 if (new_top_bs->backing_hd == base) {
2227 ret = 0;
2228 goto exit;
2229 }
2230
2231 intermediate = top;
2232
2233 /* now we will go down through the list, and add each BDS we find
2234 * into our deletion queue, until we hit the 'base'
2235 */
2236 while (intermediate) {
5839e53b 2237 intermediate_state = g_new0(BlkIntermediateStates, 1);
6ebdcee2
JC
2238 intermediate_state->bs = intermediate;
2239 QSIMPLEQ_INSERT_TAIL(&states_to_delete, intermediate_state, entry);
2240
2241 if (intermediate->backing_hd == base) {
2242 base_bs = intermediate->backing_hd;
2243 break;
2244 }
2245 intermediate = intermediate->backing_hd;
2246 }
2247 if (base_bs == NULL) {
2248 /* something went wrong, we did not end at the base. safely
2249 * unravel everything, and exit with error */
2250 goto exit;
2251 }
2252
2253 /* success - we can delete the intermediate states, and link top->base */
54e26900
JC
2254 backing_file_str = backing_file_str ? backing_file_str : base_bs->filename;
2255 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
6ebdcee2
JC
2256 base_bs->drv ? base_bs->drv->format_name : "");
2257 if (ret) {
2258 goto exit;
2259 }
920beae1 2260 bdrv_set_backing_hd(new_top_bs, base_bs);
6ebdcee2
JC
2261
2262 QSIMPLEQ_FOREACH_SAFE(intermediate_state, &states_to_delete, entry, next) {
2263 /* so that bdrv_close() does not recursively close the chain */
920beae1 2264 bdrv_set_backing_hd(intermediate_state->bs, NULL);
4f6fd349 2265 bdrv_unref(intermediate_state->bs);
6ebdcee2
JC
2266 }
2267 ret = 0;
2268
2269exit:
2270 QSIMPLEQ_FOREACH_SAFE(intermediate_state, &states_to_delete, entry, next) {
2271 g_free(intermediate_state);
2272 }
2273 return ret;
2274}
2275
61007b31
SH
2276/**
2277 * Truncate file to 'offset' bytes (needed only for file protocols)
2278 */
2279int bdrv_truncate(BlockDriverState *bs, int64_t offset)
71d0770c 2280{
61007b31
SH
2281 BlockDriver *drv = bs->drv;
2282 int ret;
2283 if (!drv)
71d0770c 2284 return -ENOMEDIUM;
61007b31
SH
2285 if (!drv->bdrv_truncate)
2286 return -ENOTSUP;
2287 if (bs->read_only)
2288 return -EACCES;
71d0770c 2289
61007b31
SH
2290 ret = drv->bdrv_truncate(bs, offset);
2291 if (ret == 0) {
2292 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
2293 bdrv_dirty_bitmap_truncate(bs);
2294 if (bs->blk) {
2295 blk_dev_resize_cb(bs->blk);
2296 }
c0191e76 2297 }
61007b31 2298 return ret;
71d0770c
AL
2299}
2300
61007b31
SH
2301/**
2302 * Length of a allocated file in bytes. Sparse files are counted by actual
2303 * allocated space. Return < 0 if error or unknown.
2304 */
2305int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 2306{
61007b31
SH
2307 BlockDriver *drv = bs->drv;
2308 if (!drv) {
2309 return -ENOMEDIUM;
8f4754ed 2310 }
61007b31
SH
2311 if (drv->bdrv_get_allocated_file_size) {
2312 return drv->bdrv_get_allocated_file_size(bs);
2313 }
2314 if (bs->file) {
2315 return bdrv_get_allocated_file_size(bs->file);
1c9805a3 2316 }
61007b31 2317 return -ENOTSUP;
1c9805a3 2318}
e7a8a783 2319
61007b31
SH
2320/**
2321 * Return number of sectors on success, -errno on error.
1c9805a3 2322 */
61007b31 2323int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 2324{
61007b31 2325 BlockDriver *drv = bs->drv;
498e386c 2326
61007b31
SH
2327 if (!drv)
2328 return -ENOMEDIUM;
2572b37a 2329
61007b31
SH
2330 if (drv->has_variable_length) {
2331 int ret = refresh_total_sectors(bs, bs->total_sectors);
2332 if (ret < 0) {
2333 return ret;
1c9805a3
SH
2334 }
2335 }
61007b31 2336 return bs->total_sectors;
1c9805a3 2337}
b338082b 2338
61007b31
SH
2339/**
2340 * Return length in bytes on success, -errno on error.
2341 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 2342 */
61007b31 2343int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 2344{
61007b31 2345 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 2346
4a9c9ea0 2347 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 2348 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
2349}
2350
61007b31
SH
2351/* return 0 as number of sectors if no device present or error */
2352void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 2353{
61007b31 2354 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 2355
61007b31 2356 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
2357}
2358
61007b31
SH
2359void bdrv_set_on_error(BlockDriverState *bs, BlockdevOnError on_read_error,
2360 BlockdevOnError on_write_error)
fc01f7e7 2361{
61007b31
SH
2362 bs->on_read_error = on_read_error;
2363 bs->on_write_error = on_write_error;
83f64091
FB
2364}
2365
61007b31 2366BlockdevOnError bdrv_get_on_error(BlockDriverState *bs, bool is_read)
4105eaaa 2367{
61007b31 2368 return is_read ? bs->on_read_error : bs->on_write_error;
8d3b1a2d
KW
2369}
2370
61007b31 2371BlockErrorAction bdrv_get_error_action(BlockDriverState *bs, bool is_read, int error)
d75cbb5e 2372{
61007b31 2373 BlockdevOnError on_err = is_read ? bs->on_read_error : bs->on_write_error;
9ce10c0b 2374
61007b31
SH
2375 switch (on_err) {
2376 case BLOCKDEV_ON_ERROR_ENOSPC:
2377 return (error == ENOSPC) ?
2378 BLOCK_ERROR_ACTION_STOP : BLOCK_ERROR_ACTION_REPORT;
2379 case BLOCKDEV_ON_ERROR_STOP:
2380 return BLOCK_ERROR_ACTION_STOP;
2381 case BLOCKDEV_ON_ERROR_REPORT:
2382 return BLOCK_ERROR_ACTION_REPORT;
2383 case BLOCKDEV_ON_ERROR_IGNORE:
2384 return BLOCK_ERROR_ACTION_IGNORE;
2385 default:
2386 abort();
d75cbb5e
PL
2387 }
2388}
2389
61007b31
SH
2390static void send_qmp_error_event(BlockDriverState *bs,
2391 BlockErrorAction action,
2392 bool is_read, int error)
83f64091 2393{
61007b31 2394 IoOperationType optype;
a3ef6571 2395
61007b31
SH
2396 optype = is_read ? IO_OPERATION_TYPE_READ : IO_OPERATION_TYPE_WRITE;
2397 qapi_event_send_block_io_error(bdrv_get_device_name(bs), optype, action,
2398 bdrv_iostatus_is_enabled(bs),
2399 error == ENOSPC, strerror(error),
2400 &error_abort);
83f64091
FB
2401}
2402
61007b31
SH
2403/* This is done by device models because, while the block layer knows
2404 * about the error, it does not know whether an operation comes from
2405 * the device or the block layer (from a job, for example).
2406 */
2407void bdrv_error_action(BlockDriverState *bs, BlockErrorAction action,
2408 bool is_read, int error)
83f64091 2409{
61007b31 2410 assert(error >= 0);
83f64091 2411
61007b31
SH
2412 if (action == BLOCK_ERROR_ACTION_STOP) {
2413 /* First set the iostatus, so that "info block" returns an iostatus
2414 * that matches the events raised so far (an additional error iostatus
2415 * is fine, but not a lost one).
2416 */
2417 bdrv_iostatus_set_err(bs, error);
83f64091 2418
61007b31
SH
2419 /* Then raise the request to stop the VM and the event.
2420 * qemu_system_vmstop_request_prepare has two effects. First,
2421 * it ensures that the STOP event always comes after the
2422 * BLOCK_IO_ERROR event. Second, it ensures that even if management
2423 * can observe the STOP event and do a "cont" before the STOP
2424 * event is issued, the VM will not stop. In this case, vm_start()
2425 * also ensures that the STOP/RESUME pair of events is emitted.
2426 */
2427 qemu_system_vmstop_request_prepare();
2428 send_qmp_error_event(bs, action, is_read, error);
2429 qemu_system_vmstop_request(RUN_STATE_IO_ERROR);
2430 } else {
2431 send_qmp_error_event(bs, action, is_read, error);
2432 }
8d3b1a2d
KW
2433}
2434
61007b31 2435int bdrv_is_read_only(BlockDriverState *bs)
8d3b1a2d 2436{
61007b31 2437 return bs->read_only;
83f64091 2438}
83f64091 2439
61007b31 2440int bdrv_is_sg(BlockDriverState *bs)
f08145fe 2441{
61007b31 2442 return bs->sg;
f08145fe
KW
2443}
2444
61007b31 2445int bdrv_enable_write_cache(BlockDriverState *bs)
ab185921 2446{
61007b31 2447 return bs->enable_write_cache;
ab185921
SH
2448}
2449
61007b31 2450void bdrv_set_enable_write_cache(BlockDriverState *bs, bool wce)
da1fa91d 2451{
61007b31 2452 bs->enable_write_cache = wce;
ab185921 2453
61007b31
SH
2454 /* so a reopen() will preserve wce */
2455 if (wce) {
2456 bs->open_flags |= BDRV_O_CACHE_WB;
893a8f62 2457 } else {
61007b31 2458 bs->open_flags &= ~BDRV_O_CACHE_WB;
893a8f62 2459 }
da1fa91d
KW
2460}
2461
61007b31 2462int bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 2463{
61007b31
SH
2464 if (bs->backing_hd && bs->backing_hd->encrypted)
2465 return 1;
2466 return bs->encrypted;
fc3959e4
FZ
2467}
2468
61007b31 2469int bdrv_key_required(BlockDriverState *bs)
fc3959e4 2470{
61007b31
SH
2471 BlockDriverState *backing_hd = bs->backing_hd;
2472
2473 if (backing_hd && backing_hd->encrypted && !backing_hd->valid_key)
2474 return 1;
2475 return (bs->encrypted && !bs->valid_key);
fc3959e4
FZ
2476}
2477
61007b31 2478int bdrv_set_key(BlockDriverState *bs, const char *key)
d0c7f642 2479{
d0c7f642 2480 int ret;
61007b31
SH
2481 if (bs->backing_hd && bs->backing_hd->encrypted) {
2482 ret = bdrv_set_key(bs->backing_hd, key);
2483 if (ret < 0)
2484 return ret;
2485 if (!bs->encrypted)
2486 return 0;
2487 }
2488 if (!bs->encrypted) {
2489 return -EINVAL;
2490 } else if (!bs->drv || !bs->drv->bdrv_set_key) {
d0c7f642
KW
2491 return -ENOMEDIUM;
2492 }
61007b31 2493 ret = bs->drv->bdrv_set_key(bs, key);
b9c64947 2494 if (ret < 0) {
61007b31
SH
2495 bs->valid_key = 0;
2496 } else if (!bs->valid_key) {
2497 bs->valid_key = 1;
2498 if (bs->blk) {
2499 /* call the change callback now, we skipped it on open */
2500 blk_dev_change_media_cb(bs->blk, true);
2501 }
1b0288ae 2502 }
61007b31
SH
2503 return ret;
2504}
f08f2dda 2505
c5fbe571 2506/*
61007b31
SH
2507 * Provide an encryption key for @bs.
2508 * If @key is non-null:
2509 * If @bs is not encrypted, fail.
2510 * Else if the key is invalid, fail.
2511 * Else set @bs's key to @key, replacing the existing key, if any.
2512 * If @key is null:
2513 * If @bs is encrypted and still lacks a key, fail.
2514 * Else do nothing.
2515 * On failure, store an error object through @errp if non-null.
c5fbe571 2516 */
61007b31 2517void bdrv_add_key(BlockDriverState *bs, const char *key, Error **errp)
c5fbe571 2518{
61007b31
SH
2519 if (key) {
2520 if (!bdrv_is_encrypted(bs)) {
2521 error_setg(errp, "Node '%s' is not encrypted",
2522 bdrv_get_device_or_node_name(bs));
2523 } else if (bdrv_set_key(bs, key) < 0) {
2524 error_set(errp, QERR_INVALID_PASSWORD);
4d2855a3
MA
2525 }
2526 } else {
2527 if (bdrv_key_required(bs)) {
b1ca6391
MA
2528 error_set(errp, ERROR_CLASS_DEVICE_ENCRYPTED,
2529 "'%s' (%s) is encrypted",
81e5f78a 2530 bdrv_get_device_or_node_name(bs),
4d2855a3
MA
2531 bdrv_get_encrypted_filename(bs));
2532 }
2533 }
2534}
2535
61007b31 2536const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 2537{
61007b31 2538 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
2539}
2540
61007b31 2541static int qsort_strcmp(const void *a, const void *b)
40b4f539 2542{
61007b31 2543 return strcmp(a, b);
40b4f539
KW
2544}
2545
61007b31
SH
2546void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
2547 void *opaque)
40b4f539 2548{
61007b31
SH
2549 BlockDriver *drv;
2550 int count = 0;
2551 int i;
2552 const char **formats = NULL;
40b4f539 2553
61007b31
SH
2554 QLIST_FOREACH(drv, &bdrv_drivers, list) {
2555 if (drv->format_name) {
2556 bool found = false;
2557 int i = count;
2558 while (formats && i && !found) {
2559 found = !strcmp(formats[--i], drv->format_name);
2560 }
e2a305fb 2561
61007b31
SH
2562 if (!found) {
2563 formats = g_renew(const char *, formats, count + 1);
2564 formats[count++] = drv->format_name;
2565 }
6c5a42ac 2566 }
61007b31 2567 }
6c5a42ac 2568
61007b31 2569 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 2570
61007b31
SH
2571 for (i = 0; i < count; i++) {
2572 it(opaque, formats[i]);
2573 }
40b4f539 2574
61007b31
SH
2575 g_free(formats);
2576}
40b4f539 2577
61007b31
SH
2578/* This function is to find a node in the bs graph */
2579BlockDriverState *bdrv_find_node(const char *node_name)
2580{
2581 BlockDriverState *bs;
391827eb 2582
61007b31 2583 assert(node_name);
40b4f539 2584
61007b31
SH
2585 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2586 if (!strcmp(node_name, bs->node_name)) {
2587 return bs;
40b4f539
KW
2588 }
2589 }
61007b31 2590 return NULL;
40b4f539
KW
2591}
2592
61007b31
SH
2593/* Put this QMP function here so it can access the static graph_bdrv_states. */
2594BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 2595{
61007b31
SH
2596 BlockDeviceInfoList *list, *entry;
2597 BlockDriverState *bs;
40b4f539 2598
61007b31
SH
2599 list = NULL;
2600 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2601 BlockDeviceInfo *info = bdrv_block_device_info(bs, errp);
2602 if (!info) {
2603 qapi_free_BlockDeviceInfoList(list);
2604 return NULL;
301db7c2 2605 }
61007b31
SH
2606 entry = g_malloc0(sizeof(*entry));
2607 entry->value = info;
2608 entry->next = list;
2609 list = entry;
301db7c2
RH
2610 }
2611
61007b31
SH
2612 return list;
2613}
40b4f539 2614
61007b31
SH
2615BlockDriverState *bdrv_lookup_bs(const char *device,
2616 const char *node_name,
2617 Error **errp)
2618{
2619 BlockBackend *blk;
2620 BlockDriverState *bs;
40b4f539 2621
61007b31
SH
2622 if (device) {
2623 blk = blk_by_name(device);
40b4f539 2624
61007b31
SH
2625 if (blk) {
2626 return blk_bs(blk);
2627 }
2628 }
40b4f539 2629
61007b31
SH
2630 if (node_name) {
2631 bs = bdrv_find_node(node_name);
6d519a5f 2632
61007b31
SH
2633 if (bs) {
2634 return bs;
2635 }
40b4f539
KW
2636 }
2637
61007b31
SH
2638 error_setg(errp, "Cannot find device=%s nor node_name=%s",
2639 device ? device : "",
2640 node_name ? node_name : "");
2641 return NULL;
40b4f539
KW
2642}
2643
61007b31
SH
2644/* If 'base' is in the same chain as 'top', return true. Otherwise,
2645 * return false. If either argument is NULL, return false. */
2646bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 2647{
61007b31
SH
2648 while (top && top != base) {
2649 top = top->backing_hd;
02c50efe 2650 }
61007b31
SH
2651
2652 return top != NULL;
02c50efe
FZ
2653}
2654
61007b31 2655BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 2656{
61007b31
SH
2657 if (!bs) {
2658 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 2659 }
61007b31 2660 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
2661}
2662
61007b31 2663BlockDriverState *bdrv_next(BlockDriverState *bs)
83f64091 2664{
61007b31
SH
2665 if (!bs) {
2666 return QTAILQ_FIRST(&bdrv_states);
857d4f46 2667 }
61007b31 2668 return QTAILQ_NEXT(bs, device_list);
83f64091 2669}
beac80cd 2670
61007b31 2671const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 2672{
61007b31 2673 return bs->node_name;
beac80cd
FB
2674}
2675
61007b31
SH
2676/* TODO check what callers really want: bs->node_name or blk_name() */
2677const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 2678{
61007b31 2679 return bs->blk ? blk_name(bs->blk) : "";
f141eafe 2680}
83f64091 2681
61007b31
SH
2682/* This can be used to identify nodes that might not have a device
2683 * name associated. Since node and device names live in the same
2684 * namespace, the result is unambiguous. The exception is if both are
2685 * absent, then this returns an empty (non-null) string. */
2686const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 2687{
61007b31 2688 return bs->blk ? blk_name(bs->blk) : bs->node_name;
beac80cd 2689}
beac80cd 2690
61007b31 2691int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 2692{
61007b31 2693 return bs->open_flags;
0b5a2445
PB
2694}
2695
61007b31 2696int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 2697{
61007b31 2698 return 1;
0b5a2445
PB
2699}
2700
61007b31 2701int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 2702{
61007b31 2703 assert(bs->drv);
0b5a2445 2704
61007b31
SH
2705 /* If BS is a copy on write image, it is initialized to
2706 the contents of the base image, which may not be zeroes. */
2707 if (bs->backing_hd) {
2708 return 0;
2709 }
2710 if (bs->drv->bdrv_has_zero_init) {
2711 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 2712 }
61007b31
SH
2713
2714 /* safe default */
2715 return 0;
68485420
KW
2716}
2717
61007b31 2718bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 2719{
61007b31 2720 BlockDriverInfo bdi;
b2a61371 2721
61007b31
SH
2722 if (bs->backing_hd) {
2723 return false;
2724 }
2725
2726 if (bdrv_get_info(bs, &bdi) == 0) {
2727 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
2728 }
2729
61007b31 2730 return false;
b2a61371
SH
2731}
2732
61007b31 2733bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 2734{
61007b31 2735 BlockDriverInfo bdi;
68485420 2736
61007b31
SH
2737 if (bs->backing_hd || !(bs->open_flags & BDRV_O_UNMAP)) {
2738 return false;
2739 }
68485420 2740
61007b31
SH
2741 if (bdrv_get_info(bs, &bdi) == 0) {
2742 return bdi.can_write_zeroes_with_unmap;
2743 }
68485420 2744
61007b31 2745 return false;
68485420
KW
2746}
2747
61007b31 2748const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 2749{
61007b31
SH
2750 if (bs->backing_hd && bs->backing_hd->encrypted)
2751 return bs->backing_file;
2752 else if (bs->encrypted)
2753 return bs->filename;
2754 else
2755 return NULL;
b2e12bc6
CH
2756}
2757
61007b31
SH
2758void bdrv_get_backing_filename(BlockDriverState *bs,
2759 char *filename, int filename_size)
016f5cf6 2760{
61007b31
SH
2761 pstrcpy(filename, filename_size, bs->backing_file);
2762}
d318aea9 2763
61007b31
SH
2764int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
2765{
2766 BlockDriver *drv = bs->drv;
2767 if (!drv)
2768 return -ENOMEDIUM;
2769 if (!drv->bdrv_get_info)
2770 return -ENOTSUP;
2771 memset(bdi, 0, sizeof(*bdi));
2772 return drv->bdrv_get_info(bs, bdi);
2773}
016f5cf6 2774
61007b31
SH
2775ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
2776{
2777 BlockDriver *drv = bs->drv;
2778 if (drv && drv->bdrv_get_specific_info) {
2779 return drv->bdrv_get_specific_info(bs);
2780 }
2781 return NULL;
016f5cf6
AG
2782}
2783
61007b31 2784void bdrv_debug_event(BlockDriverState *bs, BlkDebugEvent event)
4265d620 2785{
61007b31
SH
2786 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
2787 return;
2788 }
4265d620 2789
61007b31 2790 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
2791}
2792
61007b31
SH
2793int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
2794 const char *tag)
4265d620 2795{
61007b31
SH
2796 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
2797 bs = bs->file;
2798 }
4265d620 2799
61007b31
SH
2800 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
2801 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
2802 }
4265d620 2803
61007b31 2804 return -ENOTSUP;
4265d620
PB
2805}
2806
61007b31 2807int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 2808{
61007b31
SH
2809 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
2810 bs = bs->file;
2811 }
ce1a14dc 2812
61007b31
SH
2813 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
2814 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
2815 }
2816
2817 return -ENOTSUP;
eb852011
MA
2818}
2819
61007b31 2820int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 2821{
61007b31
SH
2822 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
2823 bs = bs->file;
2824 }
ce1a14dc 2825
61007b31
SH
2826 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
2827 return bs->drv->bdrv_debug_resume(bs, tag);
2828 }
ce1a14dc 2829
61007b31 2830 return -ENOTSUP;
f197fe2b
FZ
2831}
2832
61007b31 2833bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 2834{
61007b31
SH
2835 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
2836 bs = bs->file;
f197fe2b 2837 }
19cb3738 2838
61007b31
SH
2839 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
2840 return bs->drv->bdrv_debug_is_suspended(bs, tag);
2841 }
f9f05dc5 2842
61007b31
SH
2843 return false;
2844}
f9f05dc5 2845
61007b31 2846int bdrv_is_snapshot(BlockDriverState *bs)
f9f05dc5 2847{
61007b31 2848 return !!(bs->open_flags & BDRV_O_SNAPSHOT);
f9f05dc5
KW
2849}
2850
61007b31
SH
2851/* backing_file can either be relative, or absolute, or a protocol. If it is
2852 * relative, it must be relative to the chain. So, passing in bs->filename
2853 * from a BDS as backing_file should not be done, as that may be relative to
2854 * the CWD rather than the chain. */
2855BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
2856 const char *backing_file)
f9f05dc5 2857{
61007b31
SH
2858 char *filename_full = NULL;
2859 char *backing_file_full = NULL;
2860 char *filename_tmp = NULL;
2861 int is_protocol = 0;
2862 BlockDriverState *curr_bs = NULL;
2863 BlockDriverState *retval = NULL;
f9f05dc5 2864
61007b31
SH
2865 if (!bs || !bs->drv || !backing_file) {
2866 return NULL;
f9f05dc5
KW
2867 }
2868
61007b31
SH
2869 filename_full = g_malloc(PATH_MAX);
2870 backing_file_full = g_malloc(PATH_MAX);
2871 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 2872
61007b31 2873 is_protocol = path_has_protocol(backing_file);
f9f05dc5 2874
61007b31 2875 for (curr_bs = bs; curr_bs->backing_hd; curr_bs = curr_bs->backing_hd) {
f9f05dc5 2876
61007b31
SH
2877 /* If either of the filename paths is actually a protocol, then
2878 * compare unmodified paths; otherwise make paths relative */
2879 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
2880 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
2881 retval = curr_bs->backing_hd;
2882 break;
2883 }
2884 } else {
2885 /* If not an absolute filename path, make it relative to the current
2886 * image's filename path */
2887 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
2888 backing_file);
f9f05dc5 2889
61007b31
SH
2890 /* We are going to compare absolute pathnames */
2891 if (!realpath(filename_tmp, filename_full)) {
2892 continue;
2893 }
07f07615 2894
61007b31
SH
2895 /* We need to make sure the backing filename we are comparing against
2896 * is relative to the current image filename (or absolute) */
2897 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
2898 curr_bs->backing_file);
07f07615 2899
61007b31
SH
2900 if (!realpath(filename_tmp, backing_file_full)) {
2901 continue;
2902 }
eb489bb1 2903
61007b31
SH
2904 if (strcmp(backing_file_full, filename_full) == 0) {
2905 retval = curr_bs->backing_hd;
2906 break;
2907 }
2908 }
eb489bb1
KW
2909 }
2910
61007b31
SH
2911 g_free(filename_full);
2912 g_free(backing_file_full);
2913 g_free(filename_tmp);
2914 return retval;
2915}
2916
2917int bdrv_get_backing_file_depth(BlockDriverState *bs)
2918{
2919 if (!bs->drv) {
2920 return 0;
eb489bb1
KW
2921 }
2922
61007b31
SH
2923 if (!bs->backing_hd) {
2924 return 0;
ca716364
KW
2925 }
2926
61007b31
SH
2927 return 1 + bdrv_get_backing_file_depth(bs->backing_hd);
2928}
07f07615 2929
61007b31
SH
2930void bdrv_init(void)
2931{
2932 module_call_init(MODULE_INIT_BLOCK);
2933}
29cdb251 2934
61007b31
SH
2935void bdrv_init_with_whitelist(void)
2936{
2937 use_bdrv_whitelist = 1;
2938 bdrv_init();
07f07615
PB
2939}
2940
5a8a30db 2941void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 2942{
5a8a30db
KW
2943 Error *local_err = NULL;
2944 int ret;
2945
3456a8d1
KW
2946 if (!bs->drv) {
2947 return;
2948 }
2949
7ea2d269
AK
2950 if (!(bs->open_flags & BDRV_O_INCOMING)) {
2951 return;
2952 }
2953 bs->open_flags &= ~BDRV_O_INCOMING;
2954
3456a8d1 2955 if (bs->drv->bdrv_invalidate_cache) {
5a8a30db 2956 bs->drv->bdrv_invalidate_cache(bs, &local_err);
3456a8d1 2957 } else if (bs->file) {
5a8a30db
KW
2958 bdrv_invalidate_cache(bs->file, &local_err);
2959 }
2960 if (local_err) {
2961 error_propagate(errp, local_err);
2962 return;
0f15423c 2963 }
3456a8d1 2964
5a8a30db
KW
2965 ret = refresh_total_sectors(bs, bs->total_sectors);
2966 if (ret < 0) {
2967 error_setg_errno(errp, -ret, "Could not refresh total sector count");
2968 return;
2969 }
0f15423c
AL
2970}
2971
5a8a30db 2972void bdrv_invalidate_cache_all(Error **errp)
0f15423c
AL
2973{
2974 BlockDriverState *bs;
5a8a30db 2975 Error *local_err = NULL;
0f15423c 2976
dc364f4c 2977 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
2978 AioContext *aio_context = bdrv_get_aio_context(bs);
2979
2980 aio_context_acquire(aio_context);
5a8a30db 2981 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 2982 aio_context_release(aio_context);
5a8a30db
KW
2983 if (local_err) {
2984 error_propagate(errp, local_err);
2985 return;
2986 }
0f15423c
AL
2987 }
2988}
2989
19cb3738
FB
2990/**************************************************************/
2991/* removable device support */
2992
2993/**
2994 * Return TRUE if the media is present
2995 */
2996int bdrv_is_inserted(BlockDriverState *bs)
2997{
2998 BlockDriver *drv = bs->drv;
a1aff5bf 2999
19cb3738
FB
3000 if (!drv)
3001 return 0;
3002 if (!drv->bdrv_is_inserted)
a1aff5bf
MA
3003 return 1;
3004 return drv->bdrv_is_inserted(bs);
19cb3738
FB
3005}
3006
3007/**
8e49ca46
MA
3008 * Return whether the media changed since the last call to this
3009 * function, or -ENOTSUP if we don't know. Most drivers don't know.
19cb3738
FB
3010 */
3011int bdrv_media_changed(BlockDriverState *bs)
3012{
3013 BlockDriver *drv = bs->drv;
19cb3738 3014
8e49ca46
MA
3015 if (drv && drv->bdrv_media_changed) {
3016 return drv->bdrv_media_changed(bs);
3017 }
3018 return -ENOTSUP;
19cb3738
FB
3019}
3020
3021/**
3022 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
3023 */
f36f3949 3024void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
3025{
3026 BlockDriver *drv = bs->drv;
bfb197e0 3027 const char *device_name;
19cb3738 3028
822e1cd1
MA
3029 if (drv && drv->bdrv_eject) {
3030 drv->bdrv_eject(bs, eject_flag);
19cb3738 3031 }
6f382ed2 3032
bfb197e0
MA
3033 device_name = bdrv_get_device_name(bs);
3034 if (device_name[0] != '\0') {
3035 qapi_event_send_device_tray_moved(device_name,
a5ee7bd4 3036 eject_flag, &error_abort);
6f382ed2 3037 }
19cb3738
FB
3038}
3039
19cb3738
FB
3040/**
3041 * Lock or unlock the media (if it is locked, the user won't be able
3042 * to eject it manually).
3043 */
025e849a 3044void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
3045{
3046 BlockDriver *drv = bs->drv;
3047
025e849a 3048 trace_bdrv_lock_medium(bs, locked);
b8c6d095 3049
025e849a
MA
3050 if (drv && drv->bdrv_lock_medium) {
3051 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
3052 }
3053}
985a03b0 3054
1b7fd729 3055void bdrv_set_guest_block_size(BlockDriverState *bs, int align)
7b6f9300 3056{
1b7fd729 3057 bs->guest_block_size = align;
7b6f9300 3058}
7cd1e32a 3059
0db6e54a
FZ
3060BdrvDirtyBitmap *bdrv_find_dirty_bitmap(BlockDriverState *bs, const char *name)
3061{
3062 BdrvDirtyBitmap *bm;
3063
3064 assert(name);
3065 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
3066 if (bm->name && !strcmp(name, bm->name)) {
3067 return bm;
3068 }
3069 }
3070 return NULL;
3071}
3072
20dca810 3073void bdrv_dirty_bitmap_make_anon(BdrvDirtyBitmap *bitmap)
0db6e54a 3074{
9bd2b08f 3075 assert(!bdrv_dirty_bitmap_frozen(bitmap));
0db6e54a
FZ
3076 g_free(bitmap->name);
3077 bitmap->name = NULL;
3078}
3079
3080BdrvDirtyBitmap *bdrv_create_dirty_bitmap(BlockDriverState *bs,
5fba6c0e 3081 uint32_t granularity,
0db6e54a 3082 const char *name,
b8afb520 3083 Error **errp)
7cd1e32a
LS
3084{
3085 int64_t bitmap_size;
e4654d2d 3086 BdrvDirtyBitmap *bitmap;
5fba6c0e 3087 uint32_t sector_granularity;
a55eb92c 3088
50717e94
PB
3089 assert((granularity & (granularity - 1)) == 0);
3090
0db6e54a
FZ
3091 if (name && bdrv_find_dirty_bitmap(bs, name)) {
3092 error_setg(errp, "Bitmap already exists: %s", name);
3093 return NULL;
3094 }
5fba6c0e
JS
3095 sector_granularity = granularity >> BDRV_SECTOR_BITS;
3096 assert(sector_granularity);
57322b78 3097 bitmap_size = bdrv_nb_sectors(bs);
b8afb520
FZ
3098 if (bitmap_size < 0) {
3099 error_setg_errno(errp, -bitmap_size, "could not get length of device");
3100 errno = -bitmap_size;
3101 return NULL;
3102 }
5839e53b 3103 bitmap = g_new0(BdrvDirtyBitmap, 1);
5fba6c0e 3104 bitmap->bitmap = hbitmap_alloc(bitmap_size, ctz32(sector_granularity));
e74e6b78 3105 bitmap->size = bitmap_size;
0db6e54a 3106 bitmap->name = g_strdup(name);
b8e6fb75 3107 bitmap->disabled = false;
e4654d2d
FZ
3108 QLIST_INSERT_HEAD(&bs->dirty_bitmaps, bitmap, list);
3109 return bitmap;
3110}
3111
9bd2b08f
JS
3112bool bdrv_dirty_bitmap_frozen(BdrvDirtyBitmap *bitmap)
3113{
3114 return bitmap->successor;
3115}
3116
b8e6fb75
JS
3117bool bdrv_dirty_bitmap_enabled(BdrvDirtyBitmap *bitmap)
3118{
9bd2b08f
JS
3119 return !(bitmap->disabled || bitmap->successor);
3120}
3121
9abe3bdc
JS
3122DirtyBitmapStatus bdrv_dirty_bitmap_status(BdrvDirtyBitmap *bitmap)
3123{
3124 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3125 return DIRTY_BITMAP_STATUS_FROZEN;
3126 } else if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3127 return DIRTY_BITMAP_STATUS_DISABLED;
3128 } else {
3129 return DIRTY_BITMAP_STATUS_ACTIVE;
3130 }
3131}
3132
9bd2b08f
JS
3133/**
3134 * Create a successor bitmap destined to replace this bitmap after an operation.
3135 * Requires that the bitmap is not frozen and has no successor.
3136 */
3137int bdrv_dirty_bitmap_create_successor(BlockDriverState *bs,
3138 BdrvDirtyBitmap *bitmap, Error **errp)
3139{
3140 uint64_t granularity;
3141 BdrvDirtyBitmap *child;
3142
3143 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3144 error_setg(errp, "Cannot create a successor for a bitmap that is "
3145 "currently frozen");
3146 return -1;
3147 }
3148 assert(!bitmap->successor);
3149
3150 /* Create an anonymous successor */
3151 granularity = bdrv_dirty_bitmap_granularity(bitmap);
3152 child = bdrv_create_dirty_bitmap(bs, granularity, NULL, errp);
3153 if (!child) {
3154 return -1;
3155 }
3156
3157 /* Successor will be on or off based on our current state. */
3158 child->disabled = bitmap->disabled;
3159
3160 /* Install the successor and freeze the parent */
3161 bitmap->successor = child;
3162 return 0;
3163}
3164
3165/**
3166 * For a bitmap with a successor, yield our name to the successor,
3167 * delete the old bitmap, and return a handle to the new bitmap.
3168 */
3169BdrvDirtyBitmap *bdrv_dirty_bitmap_abdicate(BlockDriverState *bs,
3170 BdrvDirtyBitmap *bitmap,
3171 Error **errp)
3172{
3173 char *name;
3174 BdrvDirtyBitmap *successor = bitmap->successor;
3175
3176 if (successor == NULL) {
3177 error_setg(errp, "Cannot relinquish control if "
3178 "there's no successor present");
3179 return NULL;
3180 }
3181
3182 name = bitmap->name;
3183 bitmap->name = NULL;
3184 successor->name = name;
3185 bitmap->successor = NULL;
3186 bdrv_release_dirty_bitmap(bs, bitmap);
3187
3188 return successor;
3189}
3190
3191/**
3192 * In cases of failure where we can no longer safely delete the parent,
3193 * we may wish to re-join the parent and child/successor.
3194 * The merged parent will be un-frozen, but not explicitly re-enabled.
3195 */
3196BdrvDirtyBitmap *bdrv_reclaim_dirty_bitmap(BlockDriverState *bs,
3197 BdrvDirtyBitmap *parent,
3198 Error **errp)
3199{
3200 BdrvDirtyBitmap *successor = parent->successor;
3201
3202 if (!successor) {
3203 error_setg(errp, "Cannot reclaim a successor when none is present");
3204 return NULL;
3205 }
3206
3207 if (!hbitmap_merge(parent->bitmap, successor->bitmap)) {
3208 error_setg(errp, "Merging of parent and successor bitmap failed");
3209 return NULL;
3210 }
3211 bdrv_release_dirty_bitmap(bs, successor);
3212 parent->successor = NULL;
3213
3214 return parent;
b8e6fb75
JS
3215}
3216
ce1ffea8
JS
3217/**
3218 * Truncates _all_ bitmaps attached to a BDS.
3219 */
3220static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs)
3221{
3222 BdrvDirtyBitmap *bitmap;
3223 uint64_t size = bdrv_nb_sectors(bs);
3224
3225 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
3226 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3227 continue;
3228 }
3229 hbitmap_truncate(bitmap->bitmap, size);
3230 }
3231}
3232
e4654d2d
FZ
3233void bdrv_release_dirty_bitmap(BlockDriverState *bs, BdrvDirtyBitmap *bitmap)
3234{
3235 BdrvDirtyBitmap *bm, *next;
3236 QLIST_FOREACH_SAFE(bm, &bs->dirty_bitmaps, list, next) {
3237 if (bm == bitmap) {
9bd2b08f 3238 assert(!bdrv_dirty_bitmap_frozen(bm));
e4654d2d
FZ
3239 QLIST_REMOVE(bitmap, list);
3240 hbitmap_free(bitmap->bitmap);
0db6e54a 3241 g_free(bitmap->name);
e4654d2d
FZ
3242 g_free(bitmap);
3243 return;
a55eb92c 3244 }
7cd1e32a
LS
3245 }
3246}
3247
b8e6fb75
JS
3248void bdrv_disable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3249{
9bd2b08f 3250 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3251 bitmap->disabled = true;
3252}
3253
3254void bdrv_enable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3255{
9bd2b08f 3256 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3257 bitmap->disabled = false;
3258}
3259
21b56835
FZ
3260BlockDirtyInfoList *bdrv_query_dirty_bitmaps(BlockDriverState *bs)
3261{
3262 BdrvDirtyBitmap *bm;
3263 BlockDirtyInfoList *list = NULL;
3264 BlockDirtyInfoList **plist = &list;
3265
3266 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
5839e53b
MA
3267 BlockDirtyInfo *info = g_new0(BlockDirtyInfo, 1);
3268 BlockDirtyInfoList *entry = g_new0(BlockDirtyInfoList, 1);
20dca810 3269 info->count = bdrv_get_dirty_count(bm);
592fdd02 3270 info->granularity = bdrv_dirty_bitmap_granularity(bm);
0db6e54a
FZ
3271 info->has_name = !!bm->name;
3272 info->name = g_strdup(bm->name);
9abe3bdc 3273 info->status = bdrv_dirty_bitmap_status(bm);
21b56835
FZ
3274 entry->value = info;
3275 *plist = entry;
3276 plist = &entry->next;
3277 }
3278
3279 return list;
3280}
3281
e4654d2d 3282int bdrv_get_dirty(BlockDriverState *bs, BdrvDirtyBitmap *bitmap, int64_t sector)
7cd1e32a 3283{
e4654d2d
FZ
3284 if (bitmap) {
3285 return hbitmap_get(bitmap->bitmap, sector);
7cd1e32a
LS
3286 } else {
3287 return 0;
3288 }
3289}
3290
341ebc2f
JS
3291/**
3292 * Chooses a default granularity based on the existing cluster size,
3293 * but clamped between [4K, 64K]. Defaults to 64K in the case that there
3294 * is no cluster size information available.
3295 */
3296uint32_t bdrv_get_default_bitmap_granularity(BlockDriverState *bs)
3297{
3298 BlockDriverInfo bdi;
3299 uint32_t granularity;
3300
3301 if (bdrv_get_info(bs, &bdi) >= 0 && bdi.cluster_size > 0) {
3302 granularity = MAX(4096, bdi.cluster_size);
3303 granularity = MIN(65536, granularity);
3304 } else {
3305 granularity = 65536;
3306 }
3307
3308 return granularity;
3309}
3310
592fdd02
JS
3311uint32_t bdrv_dirty_bitmap_granularity(BdrvDirtyBitmap *bitmap)
3312{
3313 return BDRV_SECTOR_SIZE << hbitmap_granularity(bitmap->bitmap);
3314}
3315
20dca810 3316void bdrv_dirty_iter_init(BdrvDirtyBitmap *bitmap, HBitmapIter *hbi)
1755da16 3317{
e4654d2d 3318 hbitmap_iter_init(hbi, bitmap->bitmap, 0);
1755da16
PB
3319}
3320
20dca810 3321void bdrv_set_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3322 int64_t cur_sector, int nr_sectors)
3323{
b8e6fb75 3324 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3325 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3326}
3327
20dca810 3328void bdrv_reset_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3329 int64_t cur_sector, int nr_sectors)
3330{
b8e6fb75 3331 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3332 hbitmap_reset(bitmap->bitmap, cur_sector, nr_sectors);
3333}
3334
e74e6b78
JS
3335void bdrv_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3336{
3337 assert(bdrv_dirty_bitmap_enabled(bitmap));
3338 hbitmap_reset(bitmap->bitmap, 0, bitmap->size);
3339}
3340
e0c47b6c
SH
3341void bdrv_set_dirty(BlockDriverState *bs, int64_t cur_sector,
3342 int nr_sectors)
1755da16 3343{
e4654d2d
FZ
3344 BdrvDirtyBitmap *bitmap;
3345 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
b8e6fb75
JS
3346 if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3347 continue;
3348 }
e4654d2d
FZ
3349 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3350 }
1755da16
PB
3351}
3352
e0c47b6c
SH
3353void bdrv_reset_dirty(BlockDriverState *bs, int64_t cur_sector,
3354 int nr_sectors)
7cd1e32a 3355{
e4654d2d
FZ
3356 BdrvDirtyBitmap *bitmap;
3357 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
b8e6fb75
JS
3358 if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3359 continue;
3360 }
e4654d2d
FZ
3361 hbitmap_reset(bitmap->bitmap, cur_sector, nr_sectors);
3362 }
7cd1e32a 3363}
aaa0eb75 3364
d58d8453
JS
3365/**
3366 * Advance an HBitmapIter to an arbitrary offset.
3367 */
3368void bdrv_set_dirty_iter(HBitmapIter *hbi, int64_t offset)
3369{
3370 assert(hbi->hb);
3371 hbitmap_iter_init(hbi, hbi->hb, offset);
3372}
3373
20dca810 3374int64_t bdrv_get_dirty_count(BdrvDirtyBitmap *bitmap)
aaa0eb75 3375{
e4654d2d 3376 return hbitmap_count(bitmap->bitmap);
aaa0eb75 3377}
f88e1a42 3378
9fcb0251
FZ
3379/* Get a reference to bs */
3380void bdrv_ref(BlockDriverState *bs)
3381{
3382 bs->refcnt++;
3383}
3384
3385/* Release a previously grabbed reference to bs.
3386 * If after releasing, reference count is zero, the BlockDriverState is
3387 * deleted. */
3388void bdrv_unref(BlockDriverState *bs)
3389{
9a4d5ca6
JC
3390 if (!bs) {
3391 return;
3392 }
9fcb0251
FZ
3393 assert(bs->refcnt > 0);
3394 if (--bs->refcnt == 0) {
3395 bdrv_delete(bs);
3396 }
3397}
3398
fbe40ff7
FZ
3399struct BdrvOpBlocker {
3400 Error *reason;
3401 QLIST_ENTRY(BdrvOpBlocker) list;
3402};
3403
3404bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
3405{
3406 BdrvOpBlocker *blocker;
3407 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3408 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
3409 blocker = QLIST_FIRST(&bs->op_blockers[op]);
3410 if (errp) {
81e5f78a
AG
3411 error_setg(errp, "Node '%s' is busy: %s",
3412 bdrv_get_device_or_node_name(bs),
bfb197e0 3413 error_get_pretty(blocker->reason));
fbe40ff7
FZ
3414 }
3415 return true;
3416 }
3417 return false;
3418}
3419
3420void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
3421{
3422 BdrvOpBlocker *blocker;
3423 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3424
5839e53b 3425 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
3426 blocker->reason = reason;
3427 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
3428}
3429
3430void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
3431{
3432 BdrvOpBlocker *blocker, *next;
3433 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3434 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
3435 if (blocker->reason == reason) {
3436 QLIST_REMOVE(blocker, list);
3437 g_free(blocker);
3438 }
3439 }
3440}
3441
3442void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
3443{
3444 int i;
3445 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3446 bdrv_op_block(bs, i, reason);
3447 }
3448}
3449
3450void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
3451{
3452 int i;
3453 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3454 bdrv_op_unblock(bs, i, reason);
3455 }
3456}
3457
3458bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
3459{
3460 int i;
3461
3462 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3463 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
3464 return false;
3465 }
3466 }
3467 return true;
3468}
3469
28a7282a
LC
3470void bdrv_iostatus_enable(BlockDriverState *bs)
3471{
d6bf279e 3472 bs->iostatus_enabled = true;
58e21ef5 3473 bs->iostatus = BLOCK_DEVICE_IO_STATUS_OK;
28a7282a
LC
3474}
3475
3476/* The I/O status is only enabled if the drive explicitly
3477 * enables it _and_ the VM is configured to stop on errors */
3478bool bdrv_iostatus_is_enabled(const BlockDriverState *bs)
3479{
d6bf279e 3480 return (bs->iostatus_enabled &&
92aa5c6d
PB
3481 (bs->on_write_error == BLOCKDEV_ON_ERROR_ENOSPC ||
3482 bs->on_write_error == BLOCKDEV_ON_ERROR_STOP ||
3483 bs->on_read_error == BLOCKDEV_ON_ERROR_STOP));
28a7282a
LC
3484}
3485
3486void bdrv_iostatus_disable(BlockDriverState *bs)
3487{
d6bf279e 3488 bs->iostatus_enabled = false;
28a7282a
LC
3489}
3490
3491void bdrv_iostatus_reset(BlockDriverState *bs)
3492{
3493 if (bdrv_iostatus_is_enabled(bs)) {
58e21ef5 3494 bs->iostatus = BLOCK_DEVICE_IO_STATUS_OK;
3bd293c3
PB
3495 if (bs->job) {
3496 block_job_iostatus_reset(bs->job);
3497 }
28a7282a
LC
3498 }
3499}
3500
28a7282a
LC
3501void bdrv_iostatus_set_err(BlockDriverState *bs, int error)
3502{
3e1caa5f
PB
3503 assert(bdrv_iostatus_is_enabled(bs));
3504 if (bs->iostatus == BLOCK_DEVICE_IO_STATUS_OK) {
58e21ef5
LC
3505 bs->iostatus = error == ENOSPC ? BLOCK_DEVICE_IO_STATUS_NOSPACE :
3506 BLOCK_DEVICE_IO_STATUS_FAILED;
28a7282a
LC
3507 }
3508}
3509
d92ada22
LC
3510void bdrv_img_create(const char *filename, const char *fmt,
3511 const char *base_filename, const char *base_fmt,
f382d43a
MR
3512 char *options, uint64_t img_size, int flags,
3513 Error **errp, bool quiet)
f88e1a42 3514{
83d0521a
CL
3515 QemuOptsList *create_opts = NULL;
3516 QemuOpts *opts = NULL;
3517 const char *backing_fmt, *backing_file;
3518 int64_t size;
f88e1a42 3519 BlockDriver *drv, *proto_drv;
96df67d1 3520 BlockDriver *backing_drv = NULL;
cc84d90f 3521 Error *local_err = NULL;
f88e1a42
JS
3522 int ret = 0;
3523
3524 /* Find driver and parse its options */
3525 drv = bdrv_find_format(fmt);
3526 if (!drv) {
71c79813 3527 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 3528 return;
f88e1a42
JS
3529 }
3530
b65a5e12 3531 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 3532 if (!proto_drv) {
d92ada22 3533 return;
f88e1a42
JS
3534 }
3535
c6149724
HR
3536 if (!drv->create_opts) {
3537 error_setg(errp, "Format driver '%s' does not support image creation",
3538 drv->format_name);
3539 return;
3540 }
3541
3542 if (!proto_drv->create_opts) {
3543 error_setg(errp, "Protocol driver '%s' does not support image creation",
3544 proto_drv->format_name);
3545 return;
3546 }
3547
c282e1fd
CL
3548 create_opts = qemu_opts_append(create_opts, drv->create_opts);
3549 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
3550
3551 /* Create parameter list with default values */
83d0521a 3552 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 3553 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
3554
3555 /* Parse -o options */
3556 if (options) {
dc523cd3
MA
3557 qemu_opts_do_parse(opts, options, NULL, &local_err);
3558 if (local_err) {
3559 error_report_err(local_err);
3560 local_err = NULL;
83d0521a 3561 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
3562 goto out;
3563 }
3564 }
3565
3566 if (base_filename) {
f43e47db 3567 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 3568 if (local_err) {
71c79813
LC
3569 error_setg(errp, "Backing file not supported for file format '%s'",
3570 fmt);
f88e1a42
JS
3571 goto out;
3572 }
3573 }
3574
3575 if (base_fmt) {
f43e47db 3576 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 3577 if (local_err) {
71c79813
LC
3578 error_setg(errp, "Backing file format not supported for file "
3579 "format '%s'", fmt);
f88e1a42
JS
3580 goto out;
3581 }
3582 }
3583
83d0521a
CL
3584 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
3585 if (backing_file) {
3586 if (!strcmp(filename, backing_file)) {
71c79813
LC
3587 error_setg(errp, "Error: Trying to create an image with the "
3588 "same filename as the backing file");
792da93a
JS
3589 goto out;
3590 }
3591 }
3592
83d0521a
CL
3593 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
3594 if (backing_fmt) {
3595 backing_drv = bdrv_find_format(backing_fmt);
96df67d1 3596 if (!backing_drv) {
71c79813 3597 error_setg(errp, "Unknown backing file format '%s'",
83d0521a 3598 backing_fmt);
f88e1a42
JS
3599 goto out;
3600 }
3601 }
3602
3603 // The size for the image must always be specified, with one exception:
3604 // If we are using a backing file, we can obtain the size from there
83d0521a
CL
3605 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
3606 if (size == -1) {
3607 if (backing_file) {
66f6b814 3608 BlockDriverState *bs;
29168018 3609 char *full_backing = g_new0(char, PATH_MAX);
52bf1e72 3610 int64_t size;
63090dac
PB
3611 int back_flags;
3612
29168018
HR
3613 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
3614 full_backing, PATH_MAX,
3615 &local_err);
3616 if (local_err) {
3617 g_free(full_backing);
3618 goto out;
3619 }
3620
63090dac
PB
3621 /* backing files always opened read-only */
3622 back_flags =
3623 flags & ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 3624
f67503e5 3625 bs = NULL;
29168018 3626 ret = bdrv_open(&bs, full_backing, NULL, NULL, back_flags,
cc84d90f 3627 backing_drv, &local_err);
29168018 3628 g_free(full_backing);
f88e1a42 3629 if (ret < 0) {
f88e1a42
JS
3630 goto out;
3631 }
52bf1e72
MA
3632 size = bdrv_getlength(bs);
3633 if (size < 0) {
3634 error_setg_errno(errp, -size, "Could not get size of '%s'",
3635 backing_file);
3636 bdrv_unref(bs);
3637 goto out;
3638 }
f88e1a42 3639
39101f25 3640 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
66f6b814
HR
3641
3642 bdrv_unref(bs);
f88e1a42 3643 } else {
71c79813 3644 error_setg(errp, "Image creation needs a size parameter");
f88e1a42
JS
3645 goto out;
3646 }
3647 }
3648
f382d43a 3649 if (!quiet) {
43c5d8f8
FZ
3650 printf("Formatting '%s', fmt=%s", filename, fmt);
3651 qemu_opts_print(opts, " ");
f382d43a
MR
3652 puts("");
3653 }
83d0521a 3654
c282e1fd 3655 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 3656
cc84d90f
HR
3657 if (ret == -EFBIG) {
3658 /* This is generally a better message than whatever the driver would
3659 * deliver (especially because of the cluster_size_hint), since that
3660 * is most probably not much different from "image too large". */
3661 const char *cluster_size_hint = "";
83d0521a 3662 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 3663 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 3664 }
cc84d90f
HR
3665 error_setg(errp, "The image size is too large for file format '%s'"
3666 "%s", fmt, cluster_size_hint);
3667 error_free(local_err);
3668 local_err = NULL;
f88e1a42
JS
3669 }
3670
3671out:
83d0521a
CL
3672 qemu_opts_del(opts);
3673 qemu_opts_free(create_opts);
84d18f06 3674 if (local_err) {
cc84d90f
HR
3675 error_propagate(errp, local_err);
3676 }
f88e1a42 3677}
85d126f3
SH
3678
3679AioContext *bdrv_get_aio_context(BlockDriverState *bs)
3680{
dcd04228
SH
3681 return bs->aio_context;
3682}
3683
3684void bdrv_detach_aio_context(BlockDriverState *bs)
3685{
33384421
HR
3686 BdrvAioNotifier *baf;
3687
dcd04228
SH
3688 if (!bs->drv) {
3689 return;
3690 }
3691
33384421
HR
3692 QLIST_FOREACH(baf, &bs->aio_notifiers, list) {
3693 baf->detach_aio_context(baf->opaque);
3694 }
3695
13af91eb 3696 if (bs->io_limits_enabled) {
0e5b0a2d 3697 throttle_timers_detach_aio_context(&bs->throttle_timers);
13af91eb 3698 }
dcd04228
SH
3699 if (bs->drv->bdrv_detach_aio_context) {
3700 bs->drv->bdrv_detach_aio_context(bs);
3701 }
3702 if (bs->file) {
3703 bdrv_detach_aio_context(bs->file);
3704 }
3705 if (bs->backing_hd) {
3706 bdrv_detach_aio_context(bs->backing_hd);
3707 }
3708
3709 bs->aio_context = NULL;
3710}
3711
3712void bdrv_attach_aio_context(BlockDriverState *bs,
3713 AioContext *new_context)
3714{
33384421
HR
3715 BdrvAioNotifier *ban;
3716
dcd04228
SH
3717 if (!bs->drv) {
3718 return;
3719 }
3720
3721 bs->aio_context = new_context;
3722
3723 if (bs->backing_hd) {
3724 bdrv_attach_aio_context(bs->backing_hd, new_context);
3725 }
3726 if (bs->file) {
3727 bdrv_attach_aio_context(bs->file, new_context);
3728 }
3729 if (bs->drv->bdrv_attach_aio_context) {
3730 bs->drv->bdrv_attach_aio_context(bs, new_context);
3731 }
13af91eb 3732 if (bs->io_limits_enabled) {
0e5b0a2d 3733 throttle_timers_attach_aio_context(&bs->throttle_timers, new_context);
13af91eb 3734 }
33384421
HR
3735
3736 QLIST_FOREACH(ban, &bs->aio_notifiers, list) {
3737 ban->attached_aio_context(new_context, ban->opaque);
3738 }
dcd04228
SH
3739}
3740
3741void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
3742{
3743 bdrv_drain_all(); /* ensure there are no in-flight requests */
3744
3745 bdrv_detach_aio_context(bs);
3746
3747 /* This function executes in the old AioContext so acquire the new one in
3748 * case it runs in a different thread.
3749 */
3750 aio_context_acquire(new_context);
3751 bdrv_attach_aio_context(bs, new_context);
3752 aio_context_release(new_context);
85d126f3 3753}
d616b224 3754
33384421
HR
3755void bdrv_add_aio_context_notifier(BlockDriverState *bs,
3756 void (*attached_aio_context)(AioContext *new_context, void *opaque),
3757 void (*detach_aio_context)(void *opaque), void *opaque)
3758{
3759 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
3760 *ban = (BdrvAioNotifier){
3761 .attached_aio_context = attached_aio_context,
3762 .detach_aio_context = detach_aio_context,
3763 .opaque = opaque
3764 };
3765
3766 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
3767}
3768
3769void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
3770 void (*attached_aio_context)(AioContext *,
3771 void *),
3772 void (*detach_aio_context)(void *),
3773 void *opaque)
3774{
3775 BdrvAioNotifier *ban, *ban_next;
3776
3777 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
3778 if (ban->attached_aio_context == attached_aio_context &&
3779 ban->detach_aio_context == detach_aio_context &&
3780 ban->opaque == opaque)
3781 {
3782 QLIST_REMOVE(ban, list);
3783 g_free(ban);
3784
3785 return;
3786 }
3787 }
3788
3789 abort();
3790}
3791
77485434
HR
3792int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
3793 BlockDriverAmendStatusCB *status_cb)
6f176b48 3794{
c282e1fd 3795 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
3796 return -ENOTSUP;
3797 }
77485434 3798 return bs->drv->bdrv_amend_options(bs, opts, status_cb);
6f176b48 3799}
f6186f49 3800
b5042a36
BC
3801/* This function will be called by the bdrv_recurse_is_first_non_filter method
3802 * of block filter and by bdrv_is_first_non_filter.
3803 * It is used to test if the given bs is the candidate or recurse more in the
3804 * node graph.
212a5a8f 3805 */
b5042a36 3806bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 3807 BlockDriverState *candidate)
f6186f49 3808{
b5042a36
BC
3809 /* return false if basic checks fails */
3810 if (!bs || !bs->drv) {
212a5a8f 3811 return false;
f6186f49
BC
3812 }
3813
b5042a36
BC
3814 /* the code reached a non block filter driver -> check if the bs is
3815 * the same as the candidate. It's the recursion termination condition.
3816 */
3817 if (!bs->drv->is_filter) {
3818 return bs == candidate;
212a5a8f 3819 }
b5042a36 3820 /* Down this path the driver is a block filter driver */
212a5a8f 3821
b5042a36
BC
3822 /* If the block filter recursion method is defined use it to recurse down
3823 * the node graph.
3824 */
3825 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 3826 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
3827 }
3828
b5042a36
BC
3829 /* the driver is a block filter but don't allow to recurse -> return false
3830 */
3831 return false;
f6186f49
BC
3832}
3833
212a5a8f
BC
3834/* This function checks if the candidate is the first non filter bs down it's
3835 * bs chain. Since we don't have pointers to parents it explore all bs chains
3836 * from the top. Some filters can choose not to pass down the recursion.
3837 */
3838bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 3839{
212a5a8f
BC
3840 BlockDriverState *bs;
3841
3842 /* walk down the bs forest recursively */
3843 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
3844 bool perm;
3845
b5042a36 3846 /* try to recurse in this top level bs */
e6dc8a1f 3847 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
3848
3849 /* candidate is the first non filter */
3850 if (perm) {
3851 return true;
3852 }
3853 }
3854
3855 return false;
f6186f49 3856}
09158f00
BC
3857
3858BlockDriverState *check_to_replace_node(const char *node_name, Error **errp)
3859{
3860 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
3861 AioContext *aio_context;
3862
09158f00
BC
3863 if (!to_replace_bs) {
3864 error_setg(errp, "Node name '%s' not found", node_name);
3865 return NULL;
3866 }
3867
5a7e7a0b
SH
3868 aio_context = bdrv_get_aio_context(to_replace_bs);
3869 aio_context_acquire(aio_context);
3870
09158f00 3871 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
3872 to_replace_bs = NULL;
3873 goto out;
09158f00
BC
3874 }
3875
3876 /* We don't want arbitrary node of the BDS chain to be replaced only the top
3877 * most non filter in order to prevent data corruption.
3878 * Another benefit is that this tests exclude backing files which are
3879 * blocked by the backing blockers.
3880 */
3881 if (!bdrv_is_first_non_filter(to_replace_bs)) {
3882 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
3883 to_replace_bs = NULL;
3884 goto out;
09158f00
BC
3885 }
3886
5a7e7a0b
SH
3887out:
3888 aio_context_release(aio_context);
09158f00
BC
3889 return to_replace_bs;
3890}
448ad91d 3891
91af7014
HR
3892static bool append_open_options(QDict *d, BlockDriverState *bs)
3893{
3894 const QDictEntry *entry;
3895 bool found_any = false;
3896
3897 for (entry = qdict_first(bs->options); entry;
3898 entry = qdict_next(bs->options, entry))
3899 {
3900 /* Only take options for this level and exclude all non-driver-specific
3901 * options */
3902 if (!strchr(qdict_entry_key(entry), '.') &&
3903 strcmp(qdict_entry_key(entry), "node-name"))
3904 {
3905 qobject_incref(qdict_entry_value(entry));
3906 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
3907 found_any = true;
3908 }
3909 }
3910
3911 return found_any;
3912}
3913
3914/* Updates the following BDS fields:
3915 * - exact_filename: A filename which may be used for opening a block device
3916 * which (mostly) equals the given BDS (even without any
3917 * other options; so reading and writing must return the same
3918 * results, but caching etc. may be different)
3919 * - full_open_options: Options which, when given when opening a block device
3920 * (without a filename), result in a BDS (mostly)
3921 * equalling the given one
3922 * - filename: If exact_filename is set, it is copied here. Otherwise,
3923 * full_open_options is converted to a JSON object, prefixed with
3924 * "json:" (for use through the JSON pseudo protocol) and put here.
3925 */
3926void bdrv_refresh_filename(BlockDriverState *bs)
3927{
3928 BlockDriver *drv = bs->drv;
3929 QDict *opts;
3930
3931 if (!drv) {
3932 return;
3933 }
3934
3935 /* This BDS's file name will most probably depend on its file's name, so
3936 * refresh that first */
3937 if (bs->file) {
3938 bdrv_refresh_filename(bs->file);
3939 }
3940
3941 if (drv->bdrv_refresh_filename) {
3942 /* Obsolete information is of no use here, so drop the old file name
3943 * information before refreshing it */
3944 bs->exact_filename[0] = '\0';
3945 if (bs->full_open_options) {
3946 QDECREF(bs->full_open_options);
3947 bs->full_open_options = NULL;
3948 }
3949
3950 drv->bdrv_refresh_filename(bs);
3951 } else if (bs->file) {
3952 /* Try to reconstruct valid information from the underlying file */
3953 bool has_open_options;
3954
3955 bs->exact_filename[0] = '\0';
3956 if (bs->full_open_options) {
3957 QDECREF(bs->full_open_options);
3958 bs->full_open_options = NULL;
3959 }
3960
3961 opts = qdict_new();
3962 has_open_options = append_open_options(opts, bs);
3963
3964 /* If no specific options have been given for this BDS, the filename of
3965 * the underlying file should suffice for this one as well */
3966 if (bs->file->exact_filename[0] && !has_open_options) {
3967 strcpy(bs->exact_filename, bs->file->exact_filename);
3968 }
3969 /* Reconstructing the full options QDict is simple for most format block
3970 * drivers, as long as the full options are known for the underlying
3971 * file BDS. The full options QDict of that file BDS should somehow
3972 * contain a representation of the filename, therefore the following
3973 * suffices without querying the (exact_)filename of this BDS. */
3974 if (bs->file->full_open_options) {
3975 qdict_put_obj(opts, "driver",
3976 QOBJECT(qstring_from_str(drv->format_name)));
3977 QINCREF(bs->file->full_open_options);
3978 qdict_put_obj(opts, "file", QOBJECT(bs->file->full_open_options));
3979
3980 bs->full_open_options = opts;
3981 } else {
3982 QDECREF(opts);
3983 }
3984 } else if (!bs->full_open_options && qdict_size(bs->options)) {
3985 /* There is no underlying file BDS (at least referenced by BDS.file),
3986 * so the full options QDict should be equal to the options given
3987 * specifically for this block device when it was opened (plus the
3988 * driver specification).
3989 * Because those options don't change, there is no need to update
3990 * full_open_options when it's already set. */
3991
3992 opts = qdict_new();
3993 append_open_options(opts, bs);
3994 qdict_put_obj(opts, "driver",
3995 QOBJECT(qstring_from_str(drv->format_name)));
3996
3997 if (bs->exact_filename[0]) {
3998 /* This may not work for all block protocol drivers (some may
3999 * require this filename to be parsed), but we have to find some
4000 * default solution here, so just include it. If some block driver
4001 * does not support pure options without any filename at all or
4002 * needs some special format of the options QDict, it needs to
4003 * implement the driver-specific bdrv_refresh_filename() function.
4004 */
4005 qdict_put_obj(opts, "filename",
4006 QOBJECT(qstring_from_str(bs->exact_filename)));
4007 }
4008
4009 bs->full_open_options = opts;
4010 }
4011
4012 if (bs->exact_filename[0]) {
4013 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4014 } else if (bs->full_open_options) {
4015 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4016 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4017 qstring_get_str(json));
4018 QDECREF(json);
4019 }
4020}
5366d0c8
BC
4021
4022/* This accessor function purpose is to allow the device models to access the
4023 * BlockAcctStats structure embedded inside a BlockDriverState without being
4024 * aware of the BlockDriverState structure layout.
4025 * It will go away when the BlockAcctStats structure will be moved inside
4026 * the device models.
4027 */
4028BlockAcctStats *bdrv_get_stats(BlockDriverState *bs)
4029{
4030 return &bs->stats;
4031}