]> git.proxmox.com Git - mirror_qemu.git/blame - block.c
block: Remove bdrv_open_image()
[mirror_qemu.git] / block.c
CommitLineData
fc01f7e7
FB
1/*
2 * QEMU System Emulator block driver
5fafdf24 3 *
fc01f7e7 4 * Copyright (c) 2003 Fabrice Bellard
5fafdf24 5 *
fc01f7e7
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
3990d09a 24#include "config-host.h"
faf07963 25#include "qemu-common.h"
6d519a5f 26#include "trace.h"
737e150e
PB
27#include "block/block_int.h"
28#include "block/blockjob.h"
d49b6836 29#include "qemu/error-report.h"
1de7afc9 30#include "qemu/module.h"
cc7a8ea7 31#include "qapi/qmp/qerror.h"
7b1b5d19 32#include "qapi/qmp/qjson.h"
bfb197e0 33#include "sysemu/block-backend.h"
9c17d615 34#include "sysemu/sysemu.h"
1de7afc9 35#include "qemu/notify.h"
737e150e 36#include "block/coroutine.h"
c13163fb 37#include "block/qapi.h"
b2023818 38#include "qmp-commands.h"
1de7afc9 39#include "qemu/timer.h"
a5ee7bd4 40#include "qapi-event.h"
db628338 41#include "block/throttle-groups.h"
fc01f7e7 42
71e72a19 43#ifdef CONFIG_BSD
7674e7bf
FB
44#include <sys/types.h>
45#include <sys/stat.h>
46#include <sys/ioctl.h>
72cf2d4f 47#include <sys/queue.h>
c5e97233 48#ifndef __DragonFly__
7674e7bf
FB
49#include <sys/disk.h>
50#endif
c5e97233 51#endif
7674e7bf 52
49dc768d
AL
53#ifdef _WIN32
54#include <windows.h>
55#endif
56
9bd2b08f
JS
57/**
58 * A BdrvDirtyBitmap can be in three possible states:
59 * (1) successor is NULL and disabled is false: full r/w mode
60 * (2) successor is NULL and disabled is true: read only mode ("disabled")
61 * (3) successor is set: frozen mode.
62 * A frozen bitmap cannot be renamed, deleted, anonymized, cleared, set,
63 * or enabled. A frozen bitmap can only abdicate() or reclaim().
64 */
e4654d2d 65struct BdrvDirtyBitmap {
aa0c7ca5
JS
66 HBitmap *bitmap; /* Dirty sector bitmap implementation */
67 BdrvDirtyBitmap *successor; /* Anonymous child; implies frozen status */
68 char *name; /* Optional non-empty unique ID */
69 int64_t size; /* Size of the bitmap (Number of sectors) */
70 bool disabled; /* Bitmap is read-only */
e4654d2d
FZ
71 QLIST_ENTRY(BdrvDirtyBitmap) list;
72};
73
1c9805a3
SH
74#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
75
1b7bdbc1
SH
76static QTAILQ_HEAD(, BlockDriverState) bdrv_states =
77 QTAILQ_HEAD_INITIALIZER(bdrv_states);
7ee930d0 78
dc364f4c
BC
79static QTAILQ_HEAD(, BlockDriverState) graph_bdrv_states =
80 QTAILQ_HEAD_INITIALIZER(graph_bdrv_states);
81
8a22f02a
SH
82static QLIST_HEAD(, BlockDriver) bdrv_drivers =
83 QLIST_HEAD_INITIALIZER(bdrv_drivers);
ea2384d3 84
f3930ed0
KW
85static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
86 const char *reference, QDict *options, int flags,
87 BlockDriverState *parent,
ce343771 88 const BdrvChildRole *child_role, Error **errp);
f3930ed0 89
ce1ffea8 90static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs);
eb852011
MA
91/* If non-zero, use only whitelisted block drivers */
92static int use_bdrv_whitelist;
93
9e0b22f4
SH
94#ifdef _WIN32
95static int is_windows_drive_prefix(const char *filename)
96{
97 return (((filename[0] >= 'a' && filename[0] <= 'z') ||
98 (filename[0] >= 'A' && filename[0] <= 'Z')) &&
99 filename[1] == ':');
100}
101
102int is_windows_drive(const char *filename)
103{
104 if (is_windows_drive_prefix(filename) &&
105 filename[2] == '\0')
106 return 1;
107 if (strstart(filename, "\\\\.\\", NULL) ||
108 strstart(filename, "//./", NULL))
109 return 1;
110 return 0;
111}
112#endif
113
339064d5
KW
114size_t bdrv_opt_mem_align(BlockDriverState *bs)
115{
116 if (!bs || !bs->drv) {
459b4e66
DL
117 /* page size or 4k (hdd sector size) should be on the safe side */
118 return MAX(4096, getpagesize());
339064d5
KW
119 }
120
121 return bs->bl.opt_mem_alignment;
122}
123
4196d2f0
DL
124size_t bdrv_min_mem_align(BlockDriverState *bs)
125{
126 if (!bs || !bs->drv) {
459b4e66
DL
127 /* page size or 4k (hdd sector size) should be on the safe side */
128 return MAX(4096, getpagesize());
4196d2f0
DL
129 }
130
131 return bs->bl.min_mem_alignment;
132}
133
9e0b22f4 134/* check if the path starts with "<protocol>:" */
5c98415b 135int path_has_protocol(const char *path)
9e0b22f4 136{
947995c0
PB
137 const char *p;
138
9e0b22f4
SH
139#ifdef _WIN32
140 if (is_windows_drive(path) ||
141 is_windows_drive_prefix(path)) {
142 return 0;
143 }
947995c0
PB
144 p = path + strcspn(path, ":/\\");
145#else
146 p = path + strcspn(path, ":/");
9e0b22f4
SH
147#endif
148
947995c0 149 return *p == ':';
9e0b22f4
SH
150}
151
83f64091 152int path_is_absolute(const char *path)
3b0d4f61 153{
21664424
FB
154#ifdef _WIN32
155 /* specific case for names like: "\\.\d:" */
f53f4da9 156 if (is_windows_drive(path) || is_windows_drive_prefix(path)) {
21664424 157 return 1;
f53f4da9
PB
158 }
159 return (*path == '/' || *path == '\\');
3b9f94e1 160#else
f53f4da9 161 return (*path == '/');
3b9f94e1 162#endif
3b0d4f61
FB
163}
164
83f64091
FB
165/* if filename is absolute, just copy it to dest. Otherwise, build a
166 path to it by considering it is relative to base_path. URL are
167 supported. */
168void path_combine(char *dest, int dest_size,
169 const char *base_path,
170 const char *filename)
3b0d4f61 171{
83f64091
FB
172 const char *p, *p1;
173 int len;
174
175 if (dest_size <= 0)
176 return;
177 if (path_is_absolute(filename)) {
178 pstrcpy(dest, dest_size, filename);
179 } else {
180 p = strchr(base_path, ':');
181 if (p)
182 p++;
183 else
184 p = base_path;
3b9f94e1
FB
185 p1 = strrchr(base_path, '/');
186#ifdef _WIN32
187 {
188 const char *p2;
189 p2 = strrchr(base_path, '\\');
190 if (!p1 || p2 > p1)
191 p1 = p2;
192 }
193#endif
83f64091
FB
194 if (p1)
195 p1++;
196 else
197 p1 = base_path;
198 if (p1 > p)
199 p = p1;
200 len = p - base_path;
201 if (len > dest_size - 1)
202 len = dest_size - 1;
203 memcpy(dest, base_path, len);
204 dest[len] = '\0';
205 pstrcat(dest, dest_size, filename);
3b0d4f61 206 }
3b0d4f61
FB
207}
208
0a82855a
HR
209void bdrv_get_full_backing_filename_from_filename(const char *backed,
210 const char *backing,
9f07429e
HR
211 char *dest, size_t sz,
212 Error **errp)
dc5a1371 213{
9f07429e
HR
214 if (backing[0] == '\0' || path_has_protocol(backing) ||
215 path_is_absolute(backing))
216 {
0a82855a 217 pstrcpy(dest, sz, backing);
9f07429e
HR
218 } else if (backed[0] == '\0' || strstart(backed, "json:", NULL)) {
219 error_setg(errp, "Cannot use relative backing file names for '%s'",
220 backed);
dc5a1371 221 } else {
0a82855a 222 path_combine(dest, sz, backed, backing);
dc5a1371
PB
223 }
224}
225
9f07429e
HR
226void bdrv_get_full_backing_filename(BlockDriverState *bs, char *dest, size_t sz,
227 Error **errp)
0a82855a 228{
9f07429e
HR
229 char *backed = bs->exact_filename[0] ? bs->exact_filename : bs->filename;
230
231 bdrv_get_full_backing_filename_from_filename(backed, bs->backing_file,
232 dest, sz, errp);
0a82855a
HR
233}
234
0eb7217e
SH
235void bdrv_register(BlockDriver *bdrv)
236{
237 bdrv_setup_io_funcs(bdrv);
b2e12bc6 238
8a22f02a 239 QLIST_INSERT_HEAD(&bdrv_drivers, bdrv, list);
ea2384d3 240}
b338082b 241
7f06d47e 242BlockDriverState *bdrv_new_root(void)
b338082b 243{
7f06d47e 244 BlockDriverState *bs = bdrv_new();
e4e9986b 245
e4e9986b 246 QTAILQ_INSERT_TAIL(&bdrv_states, bs, device_list);
e4e9986b
MA
247 return bs;
248}
249
250BlockDriverState *bdrv_new(void)
251{
252 BlockDriverState *bs;
253 int i;
254
5839e53b 255 bs = g_new0(BlockDriverState, 1);
e4654d2d 256 QLIST_INIT(&bs->dirty_bitmaps);
fbe40ff7
FZ
257 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
258 QLIST_INIT(&bs->op_blockers[i]);
259 }
28a7282a 260 bdrv_iostatus_disable(bs);
d7d512f6 261 notifier_list_init(&bs->close_notifiers);
d616b224 262 notifier_with_return_list_init(&bs->before_write_notifiers);
cc0681c4
BC
263 qemu_co_queue_init(&bs->throttled_reqs[0]);
264 qemu_co_queue_init(&bs->throttled_reqs[1]);
9fcb0251 265 bs->refcnt = 1;
dcd04228 266 bs->aio_context = qemu_get_aio_context();
d7d512f6 267
b338082b
FB
268 return bs;
269}
270
d7d512f6
PB
271void bdrv_add_close_notifier(BlockDriverState *bs, Notifier *notify)
272{
273 notifier_list_add(&bs->close_notifiers, notify);
274}
275
ea2384d3
FB
276BlockDriver *bdrv_find_format(const char *format_name)
277{
278 BlockDriver *drv1;
8a22f02a
SH
279 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
280 if (!strcmp(drv1->format_name, format_name)) {
ea2384d3 281 return drv1;
8a22f02a 282 }
ea2384d3
FB
283 }
284 return NULL;
285}
286
b64ec4e4 287static int bdrv_is_whitelisted(BlockDriver *drv, bool read_only)
eb852011 288{
b64ec4e4
FZ
289 static const char *whitelist_rw[] = {
290 CONFIG_BDRV_RW_WHITELIST
291 };
292 static const char *whitelist_ro[] = {
293 CONFIG_BDRV_RO_WHITELIST
eb852011
MA
294 };
295 const char **p;
296
b64ec4e4 297 if (!whitelist_rw[0] && !whitelist_ro[0]) {
eb852011 298 return 1; /* no whitelist, anything goes */
b64ec4e4 299 }
eb852011 300
b64ec4e4 301 for (p = whitelist_rw; *p; p++) {
eb852011
MA
302 if (!strcmp(drv->format_name, *p)) {
303 return 1;
304 }
305 }
b64ec4e4
FZ
306 if (read_only) {
307 for (p = whitelist_ro; *p; p++) {
308 if (!strcmp(drv->format_name, *p)) {
309 return 1;
310 }
311 }
312 }
eb852011
MA
313 return 0;
314}
315
5b7e1542
ZYW
316typedef struct CreateCo {
317 BlockDriver *drv;
318 char *filename;
83d0521a 319 QemuOpts *opts;
5b7e1542 320 int ret;
cc84d90f 321 Error *err;
5b7e1542
ZYW
322} CreateCo;
323
324static void coroutine_fn bdrv_create_co_entry(void *opaque)
325{
cc84d90f
HR
326 Error *local_err = NULL;
327 int ret;
328
5b7e1542
ZYW
329 CreateCo *cco = opaque;
330 assert(cco->drv);
331
c282e1fd 332 ret = cco->drv->bdrv_create(cco->filename, cco->opts, &local_err);
84d18f06 333 if (local_err) {
cc84d90f
HR
334 error_propagate(&cco->err, local_err);
335 }
336 cco->ret = ret;
5b7e1542
ZYW
337}
338
0e7e1989 339int bdrv_create(BlockDriver *drv, const char* filename,
83d0521a 340 QemuOpts *opts, Error **errp)
ea2384d3 341{
5b7e1542
ZYW
342 int ret;
343
344 Coroutine *co;
345 CreateCo cco = {
346 .drv = drv,
347 .filename = g_strdup(filename),
83d0521a 348 .opts = opts,
5b7e1542 349 .ret = NOT_DONE,
cc84d90f 350 .err = NULL,
5b7e1542
ZYW
351 };
352
c282e1fd 353 if (!drv->bdrv_create) {
cc84d90f 354 error_setg(errp, "Driver '%s' does not support image creation", drv->format_name);
80168bff
LC
355 ret = -ENOTSUP;
356 goto out;
5b7e1542
ZYW
357 }
358
359 if (qemu_in_coroutine()) {
360 /* Fast-path if already in coroutine context */
361 bdrv_create_co_entry(&cco);
362 } else {
363 co = qemu_coroutine_create(bdrv_create_co_entry);
364 qemu_coroutine_enter(co, &cco);
365 while (cco.ret == NOT_DONE) {
b47ec2c4 366 aio_poll(qemu_get_aio_context(), true);
5b7e1542
ZYW
367 }
368 }
369
370 ret = cco.ret;
cc84d90f 371 if (ret < 0) {
84d18f06 372 if (cco.err) {
cc84d90f
HR
373 error_propagate(errp, cco.err);
374 } else {
375 error_setg_errno(errp, -ret, "Could not create image");
376 }
377 }
0e7e1989 378
80168bff
LC
379out:
380 g_free(cco.filename);
5b7e1542 381 return ret;
ea2384d3
FB
382}
383
c282e1fd 384int bdrv_create_file(const char *filename, QemuOpts *opts, Error **errp)
84a12e66
CH
385{
386 BlockDriver *drv;
cc84d90f
HR
387 Error *local_err = NULL;
388 int ret;
84a12e66 389
b65a5e12 390 drv = bdrv_find_protocol(filename, true, errp);
84a12e66 391 if (drv == NULL) {
16905d71 392 return -ENOENT;
84a12e66
CH
393 }
394
c282e1fd 395 ret = bdrv_create(drv, filename, opts, &local_err);
84d18f06 396 if (local_err) {
cc84d90f
HR
397 error_propagate(errp, local_err);
398 }
399 return ret;
84a12e66
CH
400}
401
892b7de8
ET
402/**
403 * Try to get @bs's logical and physical block size.
404 * On success, store them in @bsz struct and return 0.
405 * On failure return -errno.
406 * @bs must not be empty.
407 */
408int bdrv_probe_blocksizes(BlockDriverState *bs, BlockSizes *bsz)
409{
410 BlockDriver *drv = bs->drv;
411
412 if (drv && drv->bdrv_probe_blocksizes) {
413 return drv->bdrv_probe_blocksizes(bs, bsz);
414 }
415
416 return -ENOTSUP;
417}
418
419/**
420 * Try to get @bs's geometry (cyls, heads, sectors).
421 * On success, store them in @geo struct and return 0.
422 * On failure return -errno.
423 * @bs must not be empty.
424 */
425int bdrv_probe_geometry(BlockDriverState *bs, HDGeometry *geo)
426{
427 BlockDriver *drv = bs->drv;
428
429 if (drv && drv->bdrv_probe_geometry) {
430 return drv->bdrv_probe_geometry(bs, geo);
431 }
432
433 return -ENOTSUP;
434}
435
eba25057
JM
436/*
437 * Create a uniquely-named empty temporary file.
438 * Return 0 upon success, otherwise a negative errno value.
439 */
440int get_tmp_filename(char *filename, int size)
d5249393 441{
eba25057 442#ifdef _WIN32
3b9f94e1 443 char temp_dir[MAX_PATH];
eba25057
JM
444 /* GetTempFileName requires that its output buffer (4th param)
445 have length MAX_PATH or greater. */
446 assert(size >= MAX_PATH);
447 return (GetTempPath(MAX_PATH, temp_dir)
448 && GetTempFileName(temp_dir, "qem", 0, filename)
449 ? 0 : -GetLastError());
d5249393 450#else
67b915a5 451 int fd;
7ccfb2eb 452 const char *tmpdir;
0badc1ee 453 tmpdir = getenv("TMPDIR");
69bef793
AS
454 if (!tmpdir) {
455 tmpdir = "/var/tmp";
456 }
eba25057
JM
457 if (snprintf(filename, size, "%s/vl.XXXXXX", tmpdir) >= size) {
458 return -EOVERFLOW;
459 }
ea2384d3 460 fd = mkstemp(filename);
fe235a06
DH
461 if (fd < 0) {
462 return -errno;
463 }
464 if (close(fd) != 0) {
465 unlink(filename);
eba25057
JM
466 return -errno;
467 }
468 return 0;
d5249393 469#endif
eba25057 470}
fc01f7e7 471
84a12e66
CH
472/*
473 * Detect host devices. By convention, /dev/cdrom[N] is always
474 * recognized as a host CDROM.
475 */
476static BlockDriver *find_hdev_driver(const char *filename)
477{
478 int score_max = 0, score;
479 BlockDriver *drv = NULL, *d;
480
481 QLIST_FOREACH(d, &bdrv_drivers, list) {
482 if (d->bdrv_probe_device) {
483 score = d->bdrv_probe_device(filename);
484 if (score > score_max) {
485 score_max = score;
486 drv = d;
487 }
488 }
489 }
490
491 return drv;
492}
493
98289620 494BlockDriver *bdrv_find_protocol(const char *filename,
b65a5e12
HR
495 bool allow_protocol_prefix,
496 Error **errp)
83f64091
FB
497{
498 BlockDriver *drv1;
499 char protocol[128];
1cec71e3 500 int len;
83f64091 501 const char *p;
19cb3738 502
66f82cee
KW
503 /* TODO Drivers without bdrv_file_open must be specified explicitly */
504
39508e7a
CH
505 /*
506 * XXX(hch): we really should not let host device detection
507 * override an explicit protocol specification, but moving this
508 * later breaks access to device names with colons in them.
509 * Thanks to the brain-dead persistent naming schemes on udev-
510 * based Linux systems those actually are quite common.
511 */
512 drv1 = find_hdev_driver(filename);
513 if (drv1) {
514 return drv1;
515 }
516
98289620 517 if (!path_has_protocol(filename) || !allow_protocol_prefix) {
ef810437 518 return &bdrv_file;
84a12e66 519 }
98289620 520
9e0b22f4
SH
521 p = strchr(filename, ':');
522 assert(p != NULL);
1cec71e3
AL
523 len = p - filename;
524 if (len > sizeof(protocol) - 1)
525 len = sizeof(protocol) - 1;
526 memcpy(protocol, filename, len);
527 protocol[len] = '\0';
8a22f02a 528 QLIST_FOREACH(drv1, &bdrv_drivers, list) {
5fafdf24 529 if (drv1->protocol_name &&
8a22f02a 530 !strcmp(drv1->protocol_name, protocol)) {
83f64091 531 return drv1;
8a22f02a 532 }
83f64091 533 }
b65a5e12
HR
534
535 error_setg(errp, "Unknown protocol '%s'", protocol);
83f64091
FB
536 return NULL;
537}
538
c6684249
MA
539/*
540 * Guess image format by probing its contents.
541 * This is not a good idea when your image is raw (CVE-2008-2004), but
542 * we do it anyway for backward compatibility.
543 *
544 * @buf contains the image's first @buf_size bytes.
7cddd372
KW
545 * @buf_size is the buffer size in bytes (generally BLOCK_PROBE_BUF_SIZE,
546 * but can be smaller if the image file is smaller)
c6684249
MA
547 * @filename is its filename.
548 *
549 * For all block drivers, call the bdrv_probe() method to get its
550 * probing score.
551 * Return the first block driver with the highest probing score.
552 */
38f3ef57
KW
553BlockDriver *bdrv_probe_all(const uint8_t *buf, int buf_size,
554 const char *filename)
c6684249
MA
555{
556 int score_max = 0, score;
557 BlockDriver *drv = NULL, *d;
558
559 QLIST_FOREACH(d, &bdrv_drivers, list) {
560 if (d->bdrv_probe) {
561 score = d->bdrv_probe(buf, buf_size, filename);
562 if (score > score_max) {
563 score_max = score;
564 drv = d;
565 }
566 }
567 }
568
569 return drv;
570}
571
f500a6d3 572static int find_image_format(BlockDriverState *bs, const char *filename,
34b5d2c6 573 BlockDriver **pdrv, Error **errp)
f3a5d3f8 574{
c6684249 575 BlockDriver *drv;
7cddd372 576 uint8_t buf[BLOCK_PROBE_BUF_SIZE];
f500a6d3 577 int ret = 0;
f8ea0b00 578
08a00559 579 /* Return the raw BlockDriver * to scsi-generic devices or empty drives */
b192af8a 580 if (bdrv_is_sg(bs) || !bdrv_is_inserted(bs) || bdrv_getlength(bs) == 0) {
ef810437 581 *pdrv = &bdrv_raw;
c98ac35d 582 return ret;
1a396859 583 }
f8ea0b00 584
83f64091 585 ret = bdrv_pread(bs, 0, buf, sizeof(buf));
83f64091 586 if (ret < 0) {
34b5d2c6
HR
587 error_setg_errno(errp, -ret, "Could not read image for determining its "
588 "format");
c98ac35d
SW
589 *pdrv = NULL;
590 return ret;
83f64091
FB
591 }
592
c6684249 593 drv = bdrv_probe_all(buf, ret, filename);
c98ac35d 594 if (!drv) {
34b5d2c6
HR
595 error_setg(errp, "Could not determine image format: No compatible "
596 "driver found");
c98ac35d
SW
597 ret = -ENOENT;
598 }
599 *pdrv = drv;
600 return ret;
ea2384d3
FB
601}
602
51762288
SH
603/**
604 * Set the current 'total_sectors' value
65a9bb25 605 * Return 0 on success, -errno on error.
51762288
SH
606 */
607static int refresh_total_sectors(BlockDriverState *bs, int64_t hint)
608{
609 BlockDriver *drv = bs->drv;
610
396759ad 611 /* Do not attempt drv->bdrv_getlength() on scsi-generic devices */
b192af8a 612 if (bdrv_is_sg(bs))
396759ad
NB
613 return 0;
614
51762288
SH
615 /* query actual device if possible, otherwise just trust the hint */
616 if (drv->bdrv_getlength) {
617 int64_t length = drv->bdrv_getlength(bs);
618 if (length < 0) {
619 return length;
620 }
7e382003 621 hint = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE);
51762288
SH
622 }
623
624 bs->total_sectors = hint;
625 return 0;
626}
627
9e8f1835
PB
628/**
629 * Set open flags for a given discard mode
630 *
631 * Return 0 on success, -1 if the discard mode was invalid.
632 */
633int bdrv_parse_discard_flags(const char *mode, int *flags)
634{
635 *flags &= ~BDRV_O_UNMAP;
636
637 if (!strcmp(mode, "off") || !strcmp(mode, "ignore")) {
638 /* do nothing */
639 } else if (!strcmp(mode, "on") || !strcmp(mode, "unmap")) {
640 *flags |= BDRV_O_UNMAP;
641 } else {
642 return -1;
643 }
644
645 return 0;
646}
647
c3993cdc
SH
648/**
649 * Set open flags for a given cache mode
650 *
651 * Return 0 on success, -1 if the cache mode was invalid.
652 */
653int bdrv_parse_cache_flags(const char *mode, int *flags)
654{
655 *flags &= ~BDRV_O_CACHE_MASK;
656
657 if (!strcmp(mode, "off") || !strcmp(mode, "none")) {
658 *flags |= BDRV_O_NOCACHE | BDRV_O_CACHE_WB;
92196b2f
SH
659 } else if (!strcmp(mode, "directsync")) {
660 *flags |= BDRV_O_NOCACHE;
c3993cdc
SH
661 } else if (!strcmp(mode, "writeback")) {
662 *flags |= BDRV_O_CACHE_WB;
663 } else if (!strcmp(mode, "unsafe")) {
664 *flags |= BDRV_O_CACHE_WB;
665 *flags |= BDRV_O_NO_FLUSH;
666 } else if (!strcmp(mode, "writethrough")) {
667 /* this is the default */
668 } else {
669 return -1;
670 }
671
672 return 0;
673}
674
b1e6fc08
KW
675/*
676 * Returns the flags that a temporary snapshot should get, based on the
677 * originally requested flags (the originally requested image will have flags
678 * like a backing file)
679 */
680static int bdrv_temp_snapshot_flags(int flags)
681{
682 return (flags & ~BDRV_O_SNAPSHOT) | BDRV_O_TEMPORARY;
683}
684
0b50cc88 685/*
f3930ed0
KW
686 * Returns the flags that bs->file should get if a protocol driver is expected,
687 * based on the given flags for the parent BDS
0b50cc88
KW
688 */
689static int bdrv_inherited_flags(int flags)
690{
691 /* Enable protocol handling, disable format probing for bs->file */
692 flags |= BDRV_O_PROTOCOL;
693
694 /* Our block drivers take care to send flushes and respect unmap policy,
695 * so we can enable both unconditionally on lower layers. */
696 flags |= BDRV_O_CACHE_WB | BDRV_O_UNMAP;
697
0b50cc88 698 /* Clear flags that only apply to the top layer */
5669b44d 699 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_COPY_ON_READ);
0b50cc88
KW
700
701 return flags;
702}
703
f3930ed0
KW
704const BdrvChildRole child_file = {
705 .inherit_flags = bdrv_inherited_flags,
706};
707
708/*
709 * Returns the flags that bs->file should get if the use of formats (and not
710 * only protocols) is permitted for it, based on the given flags for the parent
711 * BDS
712 */
713static int bdrv_inherited_fmt_flags(int parent_flags)
714{
715 int flags = child_file.inherit_flags(parent_flags);
716 return flags & ~BDRV_O_PROTOCOL;
717}
718
719const BdrvChildRole child_format = {
720 .inherit_flags = bdrv_inherited_fmt_flags,
721};
722
317fc44e
KW
723/*
724 * Returns the flags that bs->backing_hd should get, based on the given flags
725 * for the parent BDS
726 */
727static int bdrv_backing_flags(int flags)
728{
729 /* backing files always opened read-only */
730 flags &= ~(BDRV_O_RDWR | BDRV_O_COPY_ON_READ);
731
732 /* snapshot=on is handled on the top layer */
8bfea15d 733 flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_TEMPORARY);
317fc44e
KW
734
735 return flags;
736}
737
f3930ed0
KW
738static const BdrvChildRole child_backing = {
739 .inherit_flags = bdrv_backing_flags,
740};
741
7b272452
KW
742static int bdrv_open_flags(BlockDriverState *bs, int flags)
743{
744 int open_flags = flags | BDRV_O_CACHE_WB;
745
746 /*
747 * Clear flags that are internal to the block layer before opening the
748 * image.
749 */
20cca275 750 open_flags &= ~(BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING | BDRV_O_PROTOCOL);
7b272452
KW
751
752 /*
753 * Snapshots should be writable.
754 */
8bfea15d 755 if (flags & BDRV_O_TEMPORARY) {
7b272452
KW
756 open_flags |= BDRV_O_RDWR;
757 }
758
759 return open_flags;
760}
761
636ea370
KW
762static void bdrv_assign_node_name(BlockDriverState *bs,
763 const char *node_name,
764 Error **errp)
6913c0c2
BC
765{
766 if (!node_name) {
636ea370 767 return;
6913c0c2
BC
768 }
769
9aebf3b8 770 /* Check for empty string or invalid characters */
f5bebbbb 771 if (!id_wellformed(node_name)) {
9aebf3b8 772 error_setg(errp, "Invalid node name");
636ea370 773 return;
6913c0c2
BC
774 }
775
0c5e94ee 776 /* takes care of avoiding namespaces collisions */
7f06d47e 777 if (blk_by_name(node_name)) {
0c5e94ee
BC
778 error_setg(errp, "node-name=%s is conflicting with a device id",
779 node_name);
636ea370 780 return;
0c5e94ee
BC
781 }
782
6913c0c2
BC
783 /* takes care of avoiding duplicates node names */
784 if (bdrv_find_node(node_name)) {
785 error_setg(errp, "Duplicate node name");
636ea370 786 return;
6913c0c2
BC
787 }
788
789 /* copy node name into the bs and insert it into the graph list */
790 pstrcpy(bs->node_name, sizeof(bs->node_name), node_name);
791 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs, node_list);
6913c0c2
BC
792}
793
18edf289
KW
794static QemuOptsList bdrv_runtime_opts = {
795 .name = "bdrv_common",
796 .head = QTAILQ_HEAD_INITIALIZER(bdrv_runtime_opts.head),
797 .desc = {
798 {
799 .name = "node-name",
800 .type = QEMU_OPT_STRING,
801 .help = "Node name of the block device node",
802 },
803 { /* end of list */ }
804 },
805};
806
57915332
KW
807/*
808 * Common part for opening disk images and files
b6ad491a
KW
809 *
810 * Removes all processed options from *options.
57915332 811 */
9a4f4c31 812static int bdrv_open_common(BlockDriverState *bs, BdrvChild *file,
34b5d2c6 813 QDict *options, int flags, BlockDriver *drv, Error **errp)
57915332
KW
814{
815 int ret, open_flags;
035fccdf 816 const char *filename;
6913c0c2 817 const char *node_name = NULL;
18edf289 818 QemuOpts *opts;
34b5d2c6 819 Error *local_err = NULL;
57915332
KW
820
821 assert(drv != NULL);
6405875c 822 assert(bs->file == NULL);
707ff828 823 assert(options != NULL && bs->options != options);
57915332 824
45673671 825 if (file != NULL) {
9a4f4c31 826 filename = file->bs->filename;
45673671
KW
827 } else {
828 filename = qdict_get_try_str(options, "filename");
829 }
830
765003db
KW
831 if (drv->bdrv_needs_filename && !filename) {
832 error_setg(errp, "The '%s' block driver requires a file name",
833 drv->format_name);
834 return -EINVAL;
835 }
836
45673671 837 trace_bdrv_open_common(bs, filename ?: "", flags, drv->format_name);
28dcee10 838
18edf289
KW
839 opts = qemu_opts_create(&bdrv_runtime_opts, NULL, 0, &error_abort);
840 qemu_opts_absorb_qdict(opts, options, &local_err);
0fb6395c 841 if (local_err) {
636ea370 842 error_propagate(errp, local_err);
18edf289
KW
843 ret = -EINVAL;
844 goto fail_opts;
6913c0c2 845 }
6913c0c2 846
18edf289 847 node_name = qemu_opt_get(opts, "node-name");
636ea370 848 bdrv_assign_node_name(bs, node_name, &local_err);
0fb6395c 849 if (local_err) {
636ea370 850 error_propagate(errp, local_err);
18edf289
KW
851 ret = -EINVAL;
852 goto fail_opts;
5d186eb0
KW
853 }
854
1b7fd729 855 bs->guest_block_size = 512;
c25f53b0 856 bs->request_alignment = 512;
0d51b4de 857 bs->zero_beyond_eof = true;
b64ec4e4
FZ
858 open_flags = bdrv_open_flags(bs, flags);
859 bs->read_only = !(open_flags & BDRV_O_RDWR);
860
861 if (use_bdrv_whitelist && !bdrv_is_whitelisted(drv, bs->read_only)) {
8f94a6e4
KW
862 error_setg(errp,
863 !bs->read_only && bdrv_is_whitelisted(drv, true)
864 ? "Driver '%s' can only be used for read-only devices"
865 : "Driver '%s' is not whitelisted",
866 drv->format_name);
18edf289
KW
867 ret = -ENOTSUP;
868 goto fail_opts;
b64ec4e4 869 }
57915332 870
53fec9d3 871 assert(bs->copy_on_read == 0); /* bdrv_new() and bdrv_close() make it so */
0ebd24e0
KW
872 if (flags & BDRV_O_COPY_ON_READ) {
873 if (!bs->read_only) {
874 bdrv_enable_copy_on_read(bs);
875 } else {
876 error_setg(errp, "Can't use copy-on-read on read-only device");
18edf289
KW
877 ret = -EINVAL;
878 goto fail_opts;
0ebd24e0 879 }
53fec9d3
SH
880 }
881
c2ad1b0c
KW
882 if (filename != NULL) {
883 pstrcpy(bs->filename, sizeof(bs->filename), filename);
884 } else {
885 bs->filename[0] = '\0';
886 }
91af7014 887 pstrcpy(bs->exact_filename, sizeof(bs->exact_filename), bs->filename);
57915332 888
57915332 889 bs->drv = drv;
7267c094 890 bs->opaque = g_malloc0(drv->instance_size);
57915332 891
03f541bd 892 bs->enable_write_cache = !!(flags & BDRV_O_CACHE_WB);
e7c63796 893
66f82cee
KW
894 /* Open the image, either directly or using a protocol */
895 if (drv->bdrv_file_open) {
5d186eb0 896 assert(file == NULL);
030be321 897 assert(!drv->bdrv_needs_filename || filename != NULL);
34b5d2c6 898 ret = drv->bdrv_file_open(bs, options, open_flags, &local_err);
f500a6d3 899 } else {
2af5ef70 900 if (file == NULL) {
34b5d2c6
HR
901 error_setg(errp, "Can't use '%s' as a block driver for the "
902 "protocol level", drv->format_name);
2af5ef70
KW
903 ret = -EINVAL;
904 goto free_and_fail;
905 }
f500a6d3 906 bs->file = file;
34b5d2c6 907 ret = drv->bdrv_open(bs, options, open_flags, &local_err);
66f82cee
KW
908 }
909
57915332 910 if (ret < 0) {
84d18f06 911 if (local_err) {
34b5d2c6 912 error_propagate(errp, local_err);
2fa9aa59
DH
913 } else if (bs->filename[0]) {
914 error_setg_errno(errp, -ret, "Could not open '%s'", bs->filename);
34b5d2c6
HR
915 } else {
916 error_setg_errno(errp, -ret, "Could not open image");
917 }
57915332
KW
918 goto free_and_fail;
919 }
920
a1f688f4
MA
921 if (bs->encrypted) {
922 error_report("Encrypted images are deprecated");
923 error_printf("Support for them will be removed in a future release.\n"
924 "You can use 'qemu-img convert' to convert your image"
925 " to an unencrypted one.\n");
926 }
927
51762288
SH
928 ret = refresh_total_sectors(bs, bs->total_sectors);
929 if (ret < 0) {
34b5d2c6 930 error_setg_errno(errp, -ret, "Could not refresh total sector count");
51762288 931 goto free_and_fail;
57915332 932 }
51762288 933
3baca891
KW
934 bdrv_refresh_limits(bs, &local_err);
935 if (local_err) {
936 error_propagate(errp, local_err);
937 ret = -EINVAL;
938 goto free_and_fail;
939 }
940
c25f53b0 941 assert(bdrv_opt_mem_align(bs) != 0);
4196d2f0 942 assert(bdrv_min_mem_align(bs) != 0);
b192af8a 943 assert((bs->request_alignment != 0) || bdrv_is_sg(bs));
18edf289
KW
944
945 qemu_opts_del(opts);
57915332
KW
946 return 0;
947
948free_and_fail:
f500a6d3 949 bs->file = NULL;
7267c094 950 g_free(bs->opaque);
57915332
KW
951 bs->opaque = NULL;
952 bs->drv = NULL;
18edf289
KW
953fail_opts:
954 qemu_opts_del(opts);
57915332
KW
955 return ret;
956}
957
5e5c4f63
KW
958static QDict *parse_json_filename(const char *filename, Error **errp)
959{
960 QObject *options_obj;
961 QDict *options;
962 int ret;
963
964 ret = strstart(filename, "json:", &filename);
965 assert(ret);
966
967 options_obj = qobject_from_json(filename);
968 if (!options_obj) {
969 error_setg(errp, "Could not parse the JSON options");
970 return NULL;
971 }
972
973 if (qobject_type(options_obj) != QTYPE_QDICT) {
974 qobject_decref(options_obj);
975 error_setg(errp, "Invalid JSON object given");
976 return NULL;
977 }
978
979 options = qobject_to_qdict(options_obj);
980 qdict_flatten(options);
981
982 return options;
983}
984
b6ce07aa 985/*
f54120ff
KW
986 * Fills in default options for opening images and converts the legacy
987 * filename/flags pair to option QDict entries.
53a29513
HR
988 * The BDRV_O_PROTOCOL flag in *flags will be set or cleared accordingly if a
989 * block driver has been specified explicitly.
b6ce07aa 990 */
53a29513 991static int bdrv_fill_options(QDict **options, const char **pfilename,
053e1578 992 int *flags, Error **errp)
ea2384d3 993{
5e5c4f63 994 const char *filename = *pfilename;
c2ad1b0c 995 const char *drvname;
53a29513 996 bool protocol = *flags & BDRV_O_PROTOCOL;
e3fa4bfa 997 bool parse_filename = false;
053e1578 998 BlockDriver *drv = NULL;
34b5d2c6 999 Error *local_err = NULL;
83f64091 1000
5e5c4f63
KW
1001 /* Parse json: pseudo-protocol */
1002 if (filename && g_str_has_prefix(filename, "json:")) {
1003 QDict *json_options = parse_json_filename(filename, &local_err);
1004 if (local_err) {
1005 error_propagate(errp, local_err);
1006 return -EINVAL;
1007 }
1008
1009 /* Options given in the filename have lower priority than options
1010 * specified directly */
1011 qdict_join(*options, json_options, false);
1012 QDECREF(json_options);
1013 *pfilename = filename = NULL;
1014 }
1015
53a29513 1016 drvname = qdict_get_try_str(*options, "driver");
053e1578
HR
1017 if (drvname) {
1018 drv = bdrv_find_format(drvname);
1019 if (!drv) {
1020 error_setg(errp, "Unknown driver '%s'", drvname);
1021 return -ENOENT;
1022 }
1023 /* If the user has explicitly specified the driver, this choice should
1024 * override the BDRV_O_PROTOCOL flag */
1025 protocol = drv->bdrv_file_open;
53a29513
HR
1026 }
1027
1028 if (protocol) {
1029 *flags |= BDRV_O_PROTOCOL;
1030 } else {
1031 *flags &= ~BDRV_O_PROTOCOL;
1032 }
1033
035fccdf 1034 /* Fetch the file name from the options QDict if necessary */
17b005f1 1035 if (protocol && filename) {
f54120ff
KW
1036 if (!qdict_haskey(*options, "filename")) {
1037 qdict_put(*options, "filename", qstring_from_str(filename));
1038 parse_filename = true;
1039 } else {
1040 error_setg(errp, "Can't specify 'file' and 'filename' options at "
1041 "the same time");
1042 return -EINVAL;
1043 }
035fccdf
KW
1044 }
1045
c2ad1b0c 1046 /* Find the right block driver */
f54120ff 1047 filename = qdict_get_try_str(*options, "filename");
f54120ff 1048
053e1578
HR
1049 if (!drvname && protocol) {
1050 if (filename) {
1051 drv = bdrv_find_protocol(filename, parse_filename, errp);
17b005f1 1052 if (!drv) {
053e1578 1053 return -EINVAL;
17b005f1 1054 }
053e1578
HR
1055
1056 drvname = drv->format_name;
1057 qdict_put(*options, "driver", qstring_from_str(drvname));
1058 } else {
1059 error_setg(errp, "Must specify either driver or file");
1060 return -EINVAL;
98289620 1061 }
c2ad1b0c
KW
1062 }
1063
17b005f1 1064 assert(drv || !protocol);
c2ad1b0c 1065
f54120ff 1066 /* Driver-specific filename parsing */
17b005f1 1067 if (drv && drv->bdrv_parse_filename && parse_filename) {
5acd9d81 1068 drv->bdrv_parse_filename(filename, *options, &local_err);
84d18f06 1069 if (local_err) {
34b5d2c6 1070 error_propagate(errp, local_err);
f54120ff 1071 return -EINVAL;
6963a30d 1072 }
cd5d031e
HR
1073
1074 if (!drv->bdrv_needs_filename) {
1075 qdict_del(*options, "filename");
cd5d031e 1076 }
6963a30d
KW
1077 }
1078
f54120ff
KW
1079 return 0;
1080}
1081
b4b059f6
KW
1082static BdrvChild *bdrv_attach_child(BlockDriverState *parent_bs,
1083 BlockDriverState *child_bs,
1084 const BdrvChildRole *child_role)
df581792
KW
1085{
1086 BdrvChild *child = g_new(BdrvChild, 1);
1087 *child = (BdrvChild) {
1088 .bs = child_bs,
1089 .role = child_role,
1090 };
1091
1092 QLIST_INSERT_HEAD(&parent_bs->children, child, next);
b4b059f6
KW
1093
1094 return child;
df581792
KW
1095}
1096
33a60407
KW
1097static void bdrv_detach_child(BdrvChild *child)
1098{
1099 QLIST_REMOVE(child, next);
1100 g_free(child);
1101}
1102
1103void bdrv_unref_child(BlockDriverState *parent, BdrvChild *child)
1104{
1105 BlockDriverState *child_bs = child->bs;
1106
1107 if (child->bs->inherits_from == parent) {
1108 child->bs->inherits_from = NULL;
1109 }
1110
1111 bdrv_detach_child(child);
1112 bdrv_unref(child_bs);
1113}
1114
8d24cce1
FZ
1115void bdrv_set_backing_hd(BlockDriverState *bs, BlockDriverState *backing_hd)
1116{
1117
826b6ca0
FZ
1118 if (bs->backing_hd) {
1119 assert(bs->backing_blocker);
1120 bdrv_op_unblock_all(bs->backing_hd, bs->backing_blocker);
80a1e130 1121 bdrv_detach_child(bs->backing_child);
826b6ca0
FZ
1122 } else if (backing_hd) {
1123 error_setg(&bs->backing_blocker,
81e5f78a
AG
1124 "node is used as backing hd of '%s'",
1125 bdrv_get_device_or_node_name(bs));
826b6ca0
FZ
1126 }
1127
8d24cce1
FZ
1128 bs->backing_hd = backing_hd;
1129 if (!backing_hd) {
826b6ca0
FZ
1130 error_free(bs->backing_blocker);
1131 bs->backing_blocker = NULL;
80a1e130 1132 bs->backing_child = NULL;
8d24cce1
FZ
1133 goto out;
1134 }
80a1e130 1135 bs->backing_child = bdrv_attach_child(bs, backing_hd, &child_backing);
8d24cce1
FZ
1136 bs->open_flags &= ~BDRV_O_NO_BACKING;
1137 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_hd->filename);
1138 pstrcpy(bs->backing_format, sizeof(bs->backing_format),
1139 backing_hd->drv ? backing_hd->drv->format_name : "");
826b6ca0
FZ
1140
1141 bdrv_op_block_all(bs->backing_hd, bs->backing_blocker);
1142 /* Otherwise we won't be able to commit due to check in bdrv_commit */
bb00021d 1143 bdrv_op_unblock(bs->backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET,
826b6ca0 1144 bs->backing_blocker);
8d24cce1 1145out:
3baca891 1146 bdrv_refresh_limits(bs, NULL);
8d24cce1
FZ
1147}
1148
31ca6d07
KW
1149/*
1150 * Opens the backing file for a BlockDriverState if not yet open
1151 *
1152 * options is a QDict of options to pass to the block drivers, or NULL for an
1153 * empty set of options. The reference to the QDict is transferred to this
1154 * function (even on failure), so if the caller intends to reuse the dictionary,
1155 * it needs to use QINCREF() before calling bdrv_file_open.
1156 */
34b5d2c6 1157int bdrv_open_backing_file(BlockDriverState *bs, QDict *options, Error **errp)
9156df12 1158{
1ba4b6a5 1159 char *backing_filename = g_malloc0(PATH_MAX);
317fc44e 1160 int ret = 0;
8d24cce1 1161 BlockDriverState *backing_hd;
34b5d2c6 1162 Error *local_err = NULL;
9156df12
PB
1163
1164 if (bs->backing_hd != NULL) {
31ca6d07 1165 QDECREF(options);
1ba4b6a5 1166 goto free_exit;
9156df12
PB
1167 }
1168
31ca6d07
KW
1169 /* NULL means an empty set of options */
1170 if (options == NULL) {
1171 options = qdict_new();
1172 }
1173
9156df12 1174 bs->open_flags &= ~BDRV_O_NO_BACKING;
1cb6f506
KW
1175 if (qdict_haskey(options, "file.filename")) {
1176 backing_filename[0] = '\0';
1177 } else if (bs->backing_file[0] == '\0' && qdict_size(options) == 0) {
31ca6d07 1178 QDECREF(options);
1ba4b6a5 1179 goto free_exit;
dbecebdd 1180 } else {
9f07429e
HR
1181 bdrv_get_full_backing_filename(bs, backing_filename, PATH_MAX,
1182 &local_err);
1183 if (local_err) {
1184 ret = -EINVAL;
1185 error_propagate(errp, local_err);
1186 QDECREF(options);
1187 goto free_exit;
1188 }
9156df12
PB
1189 }
1190
8ee79e70
KW
1191 if (!bs->drv || !bs->drv->supports_backing) {
1192 ret = -EINVAL;
1193 error_setg(errp, "Driver doesn't support backing files");
1194 QDECREF(options);
1195 goto free_exit;
1196 }
1197
e4e9986b 1198 backing_hd = bdrv_new();
8d24cce1 1199
c5f6e493
KW
1200 if (bs->backing_format[0] != '\0' && !qdict_haskey(options, "driver")) {
1201 qdict_put(options, "driver", qstring_from_str(bs->backing_format));
9156df12
PB
1202 }
1203
f67503e5 1204 assert(bs->backing_hd == NULL);
f3930ed0
KW
1205 ret = bdrv_open_inherit(&backing_hd,
1206 *backing_filename ? backing_filename : NULL,
ce343771 1207 NULL, options, 0, bs, &child_backing, &local_err);
9156df12 1208 if (ret < 0) {
8d24cce1
FZ
1209 bdrv_unref(backing_hd);
1210 backing_hd = NULL;
9156df12 1211 bs->open_flags |= BDRV_O_NO_BACKING;
b04b6b6e
FZ
1212 error_setg(errp, "Could not open backing file: %s",
1213 error_get_pretty(local_err));
1214 error_free(local_err);
1ba4b6a5 1215 goto free_exit;
9156df12 1216 }
df581792 1217
8d24cce1 1218 bdrv_set_backing_hd(bs, backing_hd);
d80ac658 1219
1ba4b6a5
BC
1220free_exit:
1221 g_free(backing_filename);
1222 return ret;
9156df12
PB
1223}
1224
da557aac
HR
1225/*
1226 * Opens a disk image whose options are given as BlockdevRef in another block
1227 * device's options.
1228 *
da557aac 1229 * If allow_none is true, no image will be opened if filename is false and no
b4b059f6 1230 * BlockdevRef is given. NULL will be returned, but errp remains unset.
da557aac
HR
1231 *
1232 * bdrev_key specifies the key for the image's BlockdevRef in the options QDict.
1233 * That QDict has to be flattened; therefore, if the BlockdevRef is a QDict
1234 * itself, all options starting with "${bdref_key}." are considered part of the
1235 * BlockdevRef.
1236 *
1237 * The BlockdevRef will be removed from the options QDict.
1238 */
b4b059f6
KW
1239BdrvChild *bdrv_open_child(const char *filename,
1240 QDict *options, const char *bdref_key,
1241 BlockDriverState* parent,
1242 const BdrvChildRole *child_role,
1243 bool allow_none, Error **errp)
da557aac 1244{
b4b059f6
KW
1245 BdrvChild *c = NULL;
1246 BlockDriverState *bs;
da557aac
HR
1247 QDict *image_options;
1248 int ret;
1249 char *bdref_key_dot;
1250 const char *reference;
1251
df581792 1252 assert(child_role != NULL);
f67503e5 1253
da557aac
HR
1254 bdref_key_dot = g_strdup_printf("%s.", bdref_key);
1255 qdict_extract_subqdict(options, &image_options, bdref_key_dot);
1256 g_free(bdref_key_dot);
1257
1258 reference = qdict_get_try_str(options, bdref_key);
1259 if (!filename && !reference && !qdict_size(image_options)) {
b4b059f6 1260 if (!allow_none) {
da557aac
HR
1261 error_setg(errp, "A block device must be specified for \"%s\"",
1262 bdref_key);
da557aac 1263 }
b20e61e0 1264 QDECREF(image_options);
da557aac
HR
1265 goto done;
1266 }
1267
b4b059f6
KW
1268 bs = NULL;
1269 ret = bdrv_open_inherit(&bs, filename, reference, image_options, 0,
ce343771 1270 parent, child_role, errp);
df581792
KW
1271 if (ret < 0) {
1272 goto done;
1273 }
1274
b4b059f6 1275 c = bdrv_attach_child(parent, bs, child_role);
da557aac
HR
1276
1277done:
1278 qdict_del(options, bdref_key);
b4b059f6
KW
1279 return c;
1280}
1281
6b8aeca5 1282int bdrv_append_temp_snapshot(BlockDriverState *bs, int flags, Error **errp)
b998875d
KW
1283{
1284 /* TODO: extra byte is a hack to ensure MAX_PATH space on Windows. */
1ba4b6a5 1285 char *tmp_filename = g_malloc0(PATH_MAX + 1);
b998875d 1286 int64_t total_size;
83d0521a 1287 QemuOpts *opts = NULL;
b998875d
KW
1288 QDict *snapshot_options;
1289 BlockDriverState *bs_snapshot;
c2e0dbbf 1290 Error *local_err = NULL;
b998875d
KW
1291 int ret;
1292
1293 /* if snapshot, we create a temporary backing file and open it
1294 instead of opening 'filename' directly */
1295
1296 /* Get the required size from the image */
f187743a
KW
1297 total_size = bdrv_getlength(bs);
1298 if (total_size < 0) {
6b8aeca5 1299 ret = total_size;
f187743a 1300 error_setg_errno(errp, -total_size, "Could not get image size");
1ba4b6a5 1301 goto out;
f187743a 1302 }
b998875d
KW
1303
1304 /* Create the temporary image */
1ba4b6a5 1305 ret = get_tmp_filename(tmp_filename, PATH_MAX + 1);
b998875d
KW
1306 if (ret < 0) {
1307 error_setg_errno(errp, -ret, "Could not get temporary filename");
1ba4b6a5 1308 goto out;
b998875d
KW
1309 }
1310
ef810437 1311 opts = qemu_opts_create(bdrv_qcow2.create_opts, NULL, 0,
c282e1fd 1312 &error_abort);
39101f25 1313 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, total_size, &error_abort);
ef810437 1314 ret = bdrv_create(&bdrv_qcow2, tmp_filename, opts, &local_err);
83d0521a 1315 qemu_opts_del(opts);
b998875d
KW
1316 if (ret < 0) {
1317 error_setg_errno(errp, -ret, "Could not create temporary overlay "
1318 "'%s': %s", tmp_filename,
1319 error_get_pretty(local_err));
1320 error_free(local_err);
1ba4b6a5 1321 goto out;
b998875d
KW
1322 }
1323
1324 /* Prepare a new options QDict for the temporary file */
1325 snapshot_options = qdict_new();
1326 qdict_put(snapshot_options, "file.driver",
1327 qstring_from_str("file"));
1328 qdict_put(snapshot_options, "file.filename",
1329 qstring_from_str(tmp_filename));
e6641719
HR
1330 qdict_put(snapshot_options, "driver",
1331 qstring_from_str("qcow2"));
b998875d 1332
e4e9986b 1333 bs_snapshot = bdrv_new();
b998875d
KW
1334
1335 ret = bdrv_open(&bs_snapshot, NULL, NULL, snapshot_options,
6ebf9aa2 1336 flags, &local_err);
b998875d
KW
1337 if (ret < 0) {
1338 error_propagate(errp, local_err);
1ba4b6a5 1339 goto out;
b998875d
KW
1340 }
1341
1342 bdrv_append(bs_snapshot, bs);
1ba4b6a5
BC
1343
1344out:
1345 g_free(tmp_filename);
6b8aeca5 1346 return ret;
b998875d
KW
1347}
1348
b6ce07aa
KW
1349/*
1350 * Opens a disk image (raw, qcow2, vmdk, ...)
de9c0cec
KW
1351 *
1352 * options is a QDict of options to pass to the block drivers, or NULL for an
1353 * empty set of options. The reference to the QDict belongs to the block layer
1354 * after the call (even on failure), so if the caller intends to reuse the
1355 * dictionary, it needs to use QINCREF() before calling bdrv_open.
f67503e5
HR
1356 *
1357 * If *pbs is NULL, a new BDS will be created with a pointer to it stored there.
1358 * If it is not NULL, the referenced BDS will be reused.
ddf5636d
HR
1359 *
1360 * The reference parameter may be used to specify an existing block device which
1361 * should be opened. If specified, neither options nor a filename may be given,
1362 * nor can an existing BDS be reused (that is, *pbs has to be NULL).
b6ce07aa 1363 */
f3930ed0
KW
1364static int bdrv_open_inherit(BlockDriverState **pbs, const char *filename,
1365 const char *reference, QDict *options, int flags,
1366 BlockDriverState *parent,
ce343771 1367 const BdrvChildRole *child_role, Error **errp)
ea2384d3 1368{
b6ce07aa 1369 int ret;
9a4f4c31
KW
1370 BdrvChild *file = NULL;
1371 BlockDriverState *bs;
ce343771 1372 BlockDriver *drv = NULL;
74fe54f2 1373 const char *drvname;
34b5d2c6 1374 Error *local_err = NULL;
b1e6fc08 1375 int snapshot_flags = 0;
712e7874 1376
f67503e5 1377 assert(pbs);
f3930ed0
KW
1378 assert(!child_role || !flags);
1379 assert(!child_role == !parent);
f67503e5 1380
ddf5636d
HR
1381 if (reference) {
1382 bool options_non_empty = options ? qdict_size(options) : false;
1383 QDECREF(options);
1384
1385 if (*pbs) {
1386 error_setg(errp, "Cannot reuse an existing BDS when referencing "
1387 "another block device");
1388 return -EINVAL;
1389 }
1390
1391 if (filename || options_non_empty) {
1392 error_setg(errp, "Cannot reference an existing block device with "
1393 "additional options or a new filename");
1394 return -EINVAL;
1395 }
1396
1397 bs = bdrv_lookup_bs(reference, reference, errp);
1398 if (!bs) {
1399 return -ENODEV;
1400 }
1401 bdrv_ref(bs);
1402 *pbs = bs;
1403 return 0;
1404 }
1405
f67503e5
HR
1406 if (*pbs) {
1407 bs = *pbs;
1408 } else {
e4e9986b 1409 bs = bdrv_new();
f67503e5
HR
1410 }
1411
de9c0cec
KW
1412 /* NULL means an empty set of options */
1413 if (options == NULL) {
1414 options = qdict_new();
1415 }
1416
f3930ed0 1417 if (child_role) {
bddcec37 1418 bs->inherits_from = parent;
f3930ed0
KW
1419 flags = child_role->inherit_flags(parent->open_flags);
1420 }
1421
053e1578 1422 ret = bdrv_fill_options(&options, &filename, &flags, &local_err);
462f5bcf
KW
1423 if (local_err) {
1424 goto fail;
1425 }
1426
76c591b0 1427 /* Find the right image format driver */
76c591b0
KW
1428 drvname = qdict_get_try_str(options, "driver");
1429 if (drvname) {
1430 drv = bdrv_find_format(drvname);
1431 qdict_del(options, "driver");
1432 if (!drv) {
1433 error_setg(errp, "Unknown driver: '%s'", drvname);
1434 ret = -EINVAL;
1435 goto fail;
1436 }
1437 }
1438
1439 assert(drvname || !(flags & BDRV_O_PROTOCOL));
76c591b0 1440
f3930ed0 1441 bs->open_flags = flags;
de9c0cec 1442 bs->options = options;
b6ad491a 1443 options = qdict_clone_shallow(options);
de9c0cec 1444
f500a6d3 1445 /* Open image file without format layer */
f4788adc
KW
1446 if ((flags & BDRV_O_PROTOCOL) == 0) {
1447 if (flags & BDRV_O_RDWR) {
1448 flags |= BDRV_O_ALLOW_RDWR;
1449 }
1450 if (flags & BDRV_O_SNAPSHOT) {
1451 snapshot_flags = bdrv_temp_snapshot_flags(flags);
1452 flags = bdrv_backing_flags(flags);
1453 }
f500a6d3 1454
f3930ed0 1455 bs->open_flags = flags;
1fdd6933 1456
9a4f4c31
KW
1457 file = bdrv_open_child(filename, options, "file", bs,
1458 &child_file, true, &local_err);
1fdd6933
KW
1459 if (local_err) {
1460 ret = -EINVAL;
f4788adc
KW
1461 goto fail;
1462 }
f500a6d3
KW
1463 }
1464
76c591b0 1465 /* Image format probing */
38f3ef57 1466 bs->probed = !drv;
76c591b0 1467 if (!drv && file) {
9a4f4c31 1468 ret = find_image_format(file->bs, filename, &drv, &local_err);
17b005f1 1469 if (ret < 0) {
8bfea15d 1470 goto fail;
2a05cbe4 1471 }
76c591b0 1472 } else if (!drv) {
17b005f1
KW
1473 error_setg(errp, "Must specify either driver or file");
1474 ret = -EINVAL;
8bfea15d 1475 goto fail;
ea2384d3 1476 }
b6ce07aa 1477
53a29513
HR
1478 /* BDRV_O_PROTOCOL must be set iff a protocol BDS is about to be created */
1479 assert(!!(flags & BDRV_O_PROTOCOL) == !!drv->bdrv_file_open);
1480 /* file must be NULL if a protocol BDS is about to be created
1481 * (the inverse results in an error message from bdrv_open_common()) */
1482 assert(!(flags & BDRV_O_PROTOCOL) || !file);
1483
b6ce07aa 1484 /* Open the image */
34b5d2c6 1485 ret = bdrv_open_common(bs, file, options, flags, drv, &local_err);
b6ce07aa 1486 if (ret < 0) {
8bfea15d 1487 goto fail;
6987307c
CH
1488 }
1489
2a05cbe4 1490 if (file && (bs->file != file)) {
9a4f4c31 1491 bdrv_unref_child(bs, file);
f500a6d3
KW
1492 file = NULL;
1493 }
1494
b6ce07aa 1495 /* If there is a backing file, use it */
9156df12 1496 if ((flags & BDRV_O_NO_BACKING) == 0) {
31ca6d07
KW
1497 QDict *backing_options;
1498
5726d872 1499 qdict_extract_subqdict(options, &backing_options, "backing.");
34b5d2c6 1500 ret = bdrv_open_backing_file(bs, backing_options, &local_err);
b6ce07aa 1501 if (ret < 0) {
b6ad491a 1502 goto close_and_fail;
b6ce07aa 1503 }
b6ce07aa
KW
1504 }
1505
91af7014
HR
1506 bdrv_refresh_filename(bs);
1507
b998875d
KW
1508 /* For snapshot=on, create a temporary qcow2 overlay. bs points to the
1509 * temporary snapshot afterwards. */
b1e6fc08 1510 if (snapshot_flags) {
6b8aeca5 1511 ret = bdrv_append_temp_snapshot(bs, snapshot_flags, &local_err);
b998875d 1512 if (local_err) {
b998875d
KW
1513 goto close_and_fail;
1514 }
1515 }
1516
b6ad491a 1517 /* Check if any unknown options were used */
5acd9d81 1518 if (options && (qdict_size(options) != 0)) {
b6ad491a 1519 const QDictEntry *entry = qdict_first(options);
5acd9d81
HR
1520 if (flags & BDRV_O_PROTOCOL) {
1521 error_setg(errp, "Block protocol '%s' doesn't support the option "
1522 "'%s'", drv->format_name, entry->key);
1523 } else {
1524 error_setg(errp, "Block format '%s' used by device '%s' doesn't "
1525 "support the option '%s'", drv->format_name,
bfb197e0 1526 bdrv_get_device_name(bs), entry->key);
5acd9d81 1527 }
b6ad491a
KW
1528
1529 ret = -EINVAL;
1530 goto close_and_fail;
1531 }
b6ad491a 1532
b6ce07aa 1533 if (!bdrv_key_required(bs)) {
a7f53e26
MA
1534 if (bs->blk) {
1535 blk_dev_change_media_cb(bs->blk, true);
1536 }
c3adb58f
MA
1537 } else if (!runstate_check(RUN_STATE_PRELAUNCH)
1538 && !runstate_check(RUN_STATE_INMIGRATE)
1539 && !runstate_check(RUN_STATE_PAUSED)) { /* HACK */
1540 error_setg(errp,
1541 "Guest must be stopped for opening of encrypted image");
1542 ret = -EBUSY;
1543 goto close_and_fail;
b6ce07aa
KW
1544 }
1545
c3adb58f 1546 QDECREF(options);
f67503e5 1547 *pbs = bs;
b6ce07aa
KW
1548 return 0;
1549
8bfea15d 1550fail:
f500a6d3 1551 if (file != NULL) {
9a4f4c31 1552 bdrv_unref_child(bs, file);
f500a6d3 1553 }
de9c0cec 1554 QDECREF(bs->options);
b6ad491a 1555 QDECREF(options);
de9c0cec 1556 bs->options = NULL;
f67503e5
HR
1557 if (!*pbs) {
1558 /* If *pbs is NULL, a new BDS has been created in this function and
1559 needs to be freed now. Otherwise, it does not need to be closed,
1560 since it has not really been opened yet. */
1561 bdrv_unref(bs);
1562 }
84d18f06 1563 if (local_err) {
34b5d2c6
HR
1564 error_propagate(errp, local_err);
1565 }
b6ad491a 1566 return ret;
de9c0cec 1567
b6ad491a 1568close_and_fail:
f67503e5
HR
1569 /* See fail path, but now the BDS has to be always closed */
1570 if (*pbs) {
1571 bdrv_close(bs);
1572 } else {
1573 bdrv_unref(bs);
1574 }
b6ad491a 1575 QDECREF(options);
84d18f06 1576 if (local_err) {
34b5d2c6
HR
1577 error_propagate(errp, local_err);
1578 }
b6ce07aa
KW
1579 return ret;
1580}
1581
f3930ed0 1582int bdrv_open(BlockDriverState **pbs, const char *filename,
6ebf9aa2 1583 const char *reference, QDict *options, int flags, Error **errp)
f3930ed0
KW
1584{
1585 return bdrv_open_inherit(pbs, filename, reference, options, flags, NULL,
ce343771 1586 NULL, errp);
f3930ed0
KW
1587}
1588
e971aa12
JC
1589typedef struct BlockReopenQueueEntry {
1590 bool prepared;
1591 BDRVReopenState state;
1592 QSIMPLEQ_ENTRY(BlockReopenQueueEntry) entry;
1593} BlockReopenQueueEntry;
1594
1595/*
1596 * Adds a BlockDriverState to a simple queue for an atomic, transactional
1597 * reopen of multiple devices.
1598 *
1599 * bs_queue can either be an existing BlockReopenQueue that has had QSIMPLE_INIT
1600 * already performed, or alternatively may be NULL a new BlockReopenQueue will
1601 * be created and initialized. This newly created BlockReopenQueue should be
1602 * passed back in for subsequent calls that are intended to be of the same
1603 * atomic 'set'.
1604 *
1605 * bs is the BlockDriverState to add to the reopen queue.
1606 *
4d2cb092
KW
1607 * options contains the changed options for the associated bs
1608 * (the BlockReopenQueue takes ownership)
1609 *
e971aa12
JC
1610 * flags contains the open flags for the associated bs
1611 *
1612 * returns a pointer to bs_queue, which is either the newly allocated
1613 * bs_queue, or the existing bs_queue being used.
1614 *
1615 */
1616BlockReopenQueue *bdrv_reopen_queue(BlockReopenQueue *bs_queue,
4d2cb092
KW
1617 BlockDriverState *bs,
1618 QDict *options, int flags)
e971aa12
JC
1619{
1620 assert(bs != NULL);
1621
1622 BlockReopenQueueEntry *bs_entry;
67251a31 1623 BdrvChild *child;
4d2cb092 1624 QDict *old_options;
67251a31 1625
e971aa12
JC
1626 if (bs_queue == NULL) {
1627 bs_queue = g_new0(BlockReopenQueue, 1);
1628 QSIMPLEQ_INIT(bs_queue);
1629 }
1630
4d2cb092
KW
1631 if (!options) {
1632 options = qdict_new();
1633 }
1634
1635 old_options = qdict_clone_shallow(bs->options);
1636 qdict_join(options, old_options, false);
1637 QDECREF(old_options);
1638
f1f25a2e
KW
1639 /* bdrv_open() masks this flag out */
1640 flags &= ~BDRV_O_PROTOCOL;
1641
67251a31
KW
1642 QLIST_FOREACH(child, &bs->children, next) {
1643 int child_flags;
1644
1645 if (child->bs->inherits_from != bs) {
1646 continue;
1647 }
1648
1649 child_flags = child->role->inherit_flags(flags);
4d2cb092
KW
1650 /* TODO Pass down child flags (backing.*, extents.*, ...) */
1651 bdrv_reopen_queue(bs_queue, child->bs, NULL, child_flags);
e971aa12
JC
1652 }
1653
1654 bs_entry = g_new0(BlockReopenQueueEntry, 1);
1655 QSIMPLEQ_INSERT_TAIL(bs_queue, bs_entry, entry);
1656
1657 bs_entry->state.bs = bs;
4d2cb092 1658 bs_entry->state.options = options;
e971aa12
JC
1659 bs_entry->state.flags = flags;
1660
1661 return bs_queue;
1662}
1663
1664/*
1665 * Reopen multiple BlockDriverStates atomically & transactionally.
1666 *
1667 * The queue passed in (bs_queue) must have been built up previous
1668 * via bdrv_reopen_queue().
1669 *
1670 * Reopens all BDS specified in the queue, with the appropriate
1671 * flags. All devices are prepared for reopen, and failure of any
1672 * device will cause all device changes to be abandonded, and intermediate
1673 * data cleaned up.
1674 *
1675 * If all devices prepare successfully, then the changes are committed
1676 * to all devices.
1677 *
1678 */
1679int bdrv_reopen_multiple(BlockReopenQueue *bs_queue, Error **errp)
1680{
1681 int ret = -1;
1682 BlockReopenQueueEntry *bs_entry, *next;
1683 Error *local_err = NULL;
1684
1685 assert(bs_queue != NULL);
1686
1687 bdrv_drain_all();
1688
1689 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1690 if (bdrv_reopen_prepare(&bs_entry->state, bs_queue, &local_err)) {
1691 error_propagate(errp, local_err);
1692 goto cleanup;
1693 }
1694 bs_entry->prepared = true;
1695 }
1696
1697 /* If we reach this point, we have success and just need to apply the
1698 * changes
1699 */
1700 QSIMPLEQ_FOREACH(bs_entry, bs_queue, entry) {
1701 bdrv_reopen_commit(&bs_entry->state);
1702 }
1703
1704 ret = 0;
1705
1706cleanup:
1707 QSIMPLEQ_FOREACH_SAFE(bs_entry, bs_queue, entry, next) {
1708 if (ret && bs_entry->prepared) {
1709 bdrv_reopen_abort(&bs_entry->state);
1710 }
4d2cb092 1711 QDECREF(bs_entry->state.options);
e971aa12
JC
1712 g_free(bs_entry);
1713 }
1714 g_free(bs_queue);
1715 return ret;
1716}
1717
1718
1719/* Reopen a single BlockDriverState with the specified flags. */
1720int bdrv_reopen(BlockDriverState *bs, int bdrv_flags, Error **errp)
1721{
1722 int ret = -1;
1723 Error *local_err = NULL;
4d2cb092 1724 BlockReopenQueue *queue = bdrv_reopen_queue(NULL, bs, NULL, bdrv_flags);
e971aa12
JC
1725
1726 ret = bdrv_reopen_multiple(queue, &local_err);
1727 if (local_err != NULL) {
1728 error_propagate(errp, local_err);
1729 }
1730 return ret;
1731}
1732
1733
1734/*
1735 * Prepares a BlockDriverState for reopen. All changes are staged in the
1736 * 'opaque' field of the BDRVReopenState, which is used and allocated by
1737 * the block driver layer .bdrv_reopen_prepare()
1738 *
1739 * bs is the BlockDriverState to reopen
1740 * flags are the new open flags
1741 * queue is the reopen queue
1742 *
1743 * Returns 0 on success, non-zero on error. On error errp will be set
1744 * as well.
1745 *
1746 * On failure, bdrv_reopen_abort() will be called to clean up any data.
1747 * It is the responsibility of the caller to then call the abort() or
1748 * commit() for any other BDS that have been left in a prepare() state
1749 *
1750 */
1751int bdrv_reopen_prepare(BDRVReopenState *reopen_state, BlockReopenQueue *queue,
1752 Error **errp)
1753{
1754 int ret = -1;
1755 Error *local_err = NULL;
1756 BlockDriver *drv;
1757
1758 assert(reopen_state != NULL);
1759 assert(reopen_state->bs->drv != NULL);
1760 drv = reopen_state->bs->drv;
1761
1762 /* if we are to stay read-only, do not allow permission change
1763 * to r/w */
1764 if (!(reopen_state->bs->open_flags & BDRV_O_ALLOW_RDWR) &&
1765 reopen_state->flags & BDRV_O_RDWR) {
81e5f78a
AG
1766 error_setg(errp, "Node '%s' is read only",
1767 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
1768 goto error;
1769 }
1770
1771
1772 ret = bdrv_flush(reopen_state->bs);
1773 if (ret) {
1774 error_set(errp, ERROR_CLASS_GENERIC_ERROR, "Error (%s) flushing drive",
1775 strerror(-ret));
1776 goto error;
1777 }
1778
1779 if (drv->bdrv_reopen_prepare) {
1780 ret = drv->bdrv_reopen_prepare(reopen_state, queue, &local_err);
1781 if (ret) {
1782 if (local_err != NULL) {
1783 error_propagate(errp, local_err);
1784 } else {
d8b6895f
LC
1785 error_setg(errp, "failed while preparing to reopen image '%s'",
1786 reopen_state->bs->filename);
e971aa12
JC
1787 }
1788 goto error;
1789 }
1790 } else {
1791 /* It is currently mandatory to have a bdrv_reopen_prepare()
1792 * handler for each supported drv. */
81e5f78a
AG
1793 error_setg(errp, "Block format '%s' used by node '%s' "
1794 "does not support reopening files", drv->format_name,
1795 bdrv_get_device_or_node_name(reopen_state->bs));
e971aa12
JC
1796 ret = -1;
1797 goto error;
1798 }
1799
4d2cb092
KW
1800 /* Options that are not handled are only okay if they are unchanged
1801 * compared to the old state. It is expected that some options are only
1802 * used for the initial open, but not reopen (e.g. filename) */
1803 if (qdict_size(reopen_state->options)) {
1804 const QDictEntry *entry = qdict_first(reopen_state->options);
1805
1806 do {
1807 QString *new_obj = qobject_to_qstring(entry->value);
1808 const char *new = qstring_get_str(new_obj);
1809 const char *old = qdict_get_try_str(reopen_state->bs->options,
1810 entry->key);
1811
1812 if (!old || strcmp(new, old)) {
1813 error_setg(errp, "Cannot change the option '%s'", entry->key);
1814 ret = -EINVAL;
1815 goto error;
1816 }
1817 } while ((entry = qdict_next(reopen_state->options, entry)));
1818 }
1819
e971aa12
JC
1820 ret = 0;
1821
1822error:
1823 return ret;
1824}
1825
1826/*
1827 * Takes the staged changes for the reopen from bdrv_reopen_prepare(), and
1828 * makes them final by swapping the staging BlockDriverState contents into
1829 * the active BlockDriverState contents.
1830 */
1831void bdrv_reopen_commit(BDRVReopenState *reopen_state)
1832{
1833 BlockDriver *drv;
1834
1835 assert(reopen_state != NULL);
1836 drv = reopen_state->bs->drv;
1837 assert(drv != NULL);
1838
1839 /* If there are any driver level actions to take */
1840 if (drv->bdrv_reopen_commit) {
1841 drv->bdrv_reopen_commit(reopen_state);
1842 }
1843
1844 /* set BDS specific flags now */
1845 reopen_state->bs->open_flags = reopen_state->flags;
1846 reopen_state->bs->enable_write_cache = !!(reopen_state->flags &
1847 BDRV_O_CACHE_WB);
1848 reopen_state->bs->read_only = !(reopen_state->flags & BDRV_O_RDWR);
355ef4ac 1849
3baca891 1850 bdrv_refresh_limits(reopen_state->bs, NULL);
e971aa12
JC
1851}
1852
1853/*
1854 * Abort the reopen, and delete and free the staged changes in
1855 * reopen_state
1856 */
1857void bdrv_reopen_abort(BDRVReopenState *reopen_state)
1858{
1859 BlockDriver *drv;
1860
1861 assert(reopen_state != NULL);
1862 drv = reopen_state->bs->drv;
1863 assert(drv != NULL);
1864
1865 if (drv->bdrv_reopen_abort) {
1866 drv->bdrv_reopen_abort(reopen_state);
1867 }
1868}
1869
1870
fc01f7e7
FB
1871void bdrv_close(BlockDriverState *bs)
1872{
33384421
HR
1873 BdrvAioNotifier *ban, *ban_next;
1874
3cbc002c
PB
1875 if (bs->job) {
1876 block_job_cancel_sync(bs->job);
1877 }
99b7e775
AG
1878
1879 /* Disable I/O limits and drain all pending throttled requests */
1880 if (bs->io_limits_enabled) {
1881 bdrv_io_limits_disable(bs);
1882 }
1883
53ec73e2 1884 bdrv_drain(bs); /* complete I/O */
58fda173 1885 bdrv_flush(bs);
53ec73e2 1886 bdrv_drain(bs); /* in case flush left pending I/O */
d7d512f6 1887 notifier_list_notify(&bs->close_notifiers, bs);
7094f12f 1888
3cbc002c 1889 if (bs->drv) {
6e93e7c4
KW
1890 BdrvChild *child, *next;
1891
9a7dedbc 1892 bs->drv->bdrv_close(bs);
9a4f4c31 1893 bs->drv = NULL;
9a7dedbc
KW
1894
1895 if (bs->backing_hd) {
1896 BlockDriverState *backing_hd = bs->backing_hd;
1897 bdrv_set_backing_hd(bs, NULL);
1898 bdrv_unref(backing_hd);
1899 }
1900
9a4f4c31
KW
1901 if (bs->file != NULL) {
1902 bdrv_unref_child(bs, bs->file);
1903 bs->file = NULL;
1904 }
1905
6e93e7c4 1906 QLIST_FOREACH_SAFE(child, &bs->children, next, next) {
33a60407
KW
1907 /* TODO Remove bdrv_unref() from drivers' close function and use
1908 * bdrv_unref_child() here */
bddcec37
KW
1909 if (child->bs->inherits_from == bs) {
1910 child->bs->inherits_from = NULL;
1911 }
33a60407 1912 bdrv_detach_child(child);
6e93e7c4
KW
1913 }
1914
7267c094 1915 g_free(bs->opaque);
ea2384d3 1916 bs->opaque = NULL;
53fec9d3 1917 bs->copy_on_read = 0;
a275fa42
PB
1918 bs->backing_file[0] = '\0';
1919 bs->backing_format[0] = '\0';
6405875c
PB
1920 bs->total_sectors = 0;
1921 bs->encrypted = 0;
1922 bs->valid_key = 0;
1923 bs->sg = 0;
0d51b4de 1924 bs->zero_beyond_eof = false;
de9c0cec
KW
1925 QDECREF(bs->options);
1926 bs->options = NULL;
91af7014
HR
1927 QDECREF(bs->full_open_options);
1928 bs->full_open_options = NULL;
b338082b 1929 }
98f90dba 1930
a7f53e26
MA
1931 if (bs->blk) {
1932 blk_dev_change_media_cb(bs->blk, false);
1933 }
9ca11154 1934
33384421
HR
1935 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
1936 g_free(ban);
1937 }
1938 QLIST_INIT(&bs->aio_notifiers);
b338082b
FB
1939}
1940
2bc93fed
MK
1941void bdrv_close_all(void)
1942{
1943 BlockDriverState *bs;
1944
dc364f4c 1945 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
1946 AioContext *aio_context = bdrv_get_aio_context(bs);
1947
1948 aio_context_acquire(aio_context);
2bc93fed 1949 bdrv_close(bs);
ed78cda3 1950 aio_context_release(aio_context);
2bc93fed
MK
1951 }
1952}
1953
dc364f4c
BC
1954/* make a BlockDriverState anonymous by removing from bdrv_state and
1955 * graph_bdrv_state list.
d22b2f41
RH
1956 Also, NULL terminate the device_name to prevent double remove */
1957void bdrv_make_anon(BlockDriverState *bs)
1958{
bfb197e0
MA
1959 /*
1960 * Take care to remove bs from bdrv_states only when it's actually
1961 * in it. Note that bs->device_list.tqe_prev is initially null,
1962 * and gets set to non-null by QTAILQ_INSERT_TAIL(). Establish
1963 * the useful invariant "bs in bdrv_states iff bs->tqe_prev" by
1964 * resetting it to null on remove.
1965 */
1966 if (bs->device_list.tqe_prev) {
dc364f4c 1967 QTAILQ_REMOVE(&bdrv_states, bs, device_list);
bfb197e0 1968 bs->device_list.tqe_prev = NULL;
d22b2f41 1969 }
dc364f4c
BC
1970 if (bs->node_name[0] != '\0') {
1971 QTAILQ_REMOVE(&graph_bdrv_states, bs, node_list);
1972 }
1973 bs->node_name[0] = '\0';
d22b2f41
RH
1974}
1975
e023b2e2
PB
1976static void bdrv_rebind(BlockDriverState *bs)
1977{
1978 if (bs->drv && bs->drv->bdrv_rebind) {
1979 bs->drv->bdrv_rebind(bs);
1980 }
1981}
1982
4ddc07ca
PB
1983static void bdrv_move_feature_fields(BlockDriverState *bs_dest,
1984 BlockDriverState *bs_src)
8802d1fd 1985{
4ddc07ca 1986 /* move some fields that need to stay attached to the device */
8802d1fd
JC
1987
1988 /* dev info */
1b7fd729 1989 bs_dest->guest_block_size = bs_src->guest_block_size;
4ddc07ca 1990 bs_dest->copy_on_read = bs_src->copy_on_read;
8802d1fd 1991
4ddc07ca 1992 bs_dest->enable_write_cache = bs_src->enable_write_cache;
c4a248a1 1993
cc0681c4 1994 /* i/o throttled req */
76f4afb4
AG
1995 bs_dest->throttle_state = bs_src->throttle_state,
1996 bs_dest->io_limits_enabled = bs_src->io_limits_enabled;
1997 bs_dest->pending_reqs[0] = bs_src->pending_reqs[0];
1998 bs_dest->pending_reqs[1] = bs_src->pending_reqs[1];
1999 bs_dest->throttled_reqs[0] = bs_src->throttled_reqs[0];
2000 bs_dest->throttled_reqs[1] = bs_src->throttled_reqs[1];
2001 memcpy(&bs_dest->round_robin,
2002 &bs_src->round_robin,
2003 sizeof(bs_dest->round_robin));
0e5b0a2d
BC
2004 memcpy(&bs_dest->throttle_timers,
2005 &bs_src->throttle_timers,
2006 sizeof(ThrottleTimers));
8802d1fd 2007
8802d1fd 2008 /* r/w error */
4ddc07ca
PB
2009 bs_dest->on_read_error = bs_src->on_read_error;
2010 bs_dest->on_write_error = bs_src->on_write_error;
8802d1fd
JC
2011
2012 /* i/o status */
4ddc07ca
PB
2013 bs_dest->iostatus_enabled = bs_src->iostatus_enabled;
2014 bs_dest->iostatus = bs_src->iostatus;
8802d1fd 2015
a9fc4408 2016 /* dirty bitmap */
e4654d2d 2017 bs_dest->dirty_bitmaps = bs_src->dirty_bitmaps;
a9fc4408 2018
9fcb0251
FZ
2019 /* reference count */
2020 bs_dest->refcnt = bs_src->refcnt;
2021
a9fc4408 2022 /* job */
4ddc07ca 2023 bs_dest->job = bs_src->job;
a9fc4408 2024
8802d1fd 2025 /* keep the same entry in bdrv_states */
dc364f4c 2026 bs_dest->device_list = bs_src->device_list;
7e7d56d9
MA
2027 bs_dest->blk = bs_src->blk;
2028
fbe40ff7
FZ
2029 memcpy(bs_dest->op_blockers, bs_src->op_blockers,
2030 sizeof(bs_dest->op_blockers));
4ddc07ca 2031}
8802d1fd 2032
4ddc07ca
PB
2033/*
2034 * Swap bs contents for two image chains while they are live,
2035 * while keeping required fields on the BlockDriverState that is
2036 * actually attached to a device.
2037 *
2038 * This will modify the BlockDriverState fields, and swap contents
2039 * between bs_new and bs_old. Both bs_new and bs_old are modified.
2040 *
bfb197e0 2041 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2042 *
2043 * This function does not create any image files.
2044 */
2045void bdrv_swap(BlockDriverState *bs_new, BlockDriverState *bs_old)
2046{
2047 BlockDriverState tmp;
bddcec37 2048 BdrvChild *child;
f6801b83 2049
6ee4ce1e
KW
2050 bdrv_drain(bs_new);
2051 bdrv_drain(bs_old);
f6801b83 2052
90ce8a06
BC
2053 /* The code needs to swap the node_name but simply swapping node_list won't
2054 * work so first remove the nodes from the graph list, do the swap then
2055 * insert them back if needed.
2056 */
2057 if (bs_new->node_name[0] != '\0') {
2058 QTAILQ_REMOVE(&graph_bdrv_states, bs_new, node_list);
2059 }
2060 if (bs_old->node_name[0] != '\0') {
2061 QTAILQ_REMOVE(&graph_bdrv_states, bs_old, node_list);
2062 }
2063
db628338
AG
2064 /* If the BlockDriverState is part of a throttling group acquire
2065 * its lock since we're going to mess with the protected fields.
2066 * Otherwise there's no need to worry since no one else can touch
2067 * them. */
2068 if (bs_old->throttle_state) {
2069 throttle_group_lock(bs_old);
2070 }
2071
bfb197e0 2072 /* bs_new must be unattached and shouldn't have anything fancy enabled */
7e7d56d9 2073 assert(!bs_new->blk);
e4654d2d 2074 assert(QLIST_EMPTY(&bs_new->dirty_bitmaps));
4ddc07ca 2075 assert(bs_new->job == NULL);
4ddc07ca 2076 assert(bs_new->io_limits_enabled == false);
db628338 2077 assert(bs_new->throttle_state == NULL);
0e5b0a2d 2078 assert(!throttle_timers_are_initialized(&bs_new->throttle_timers));
8802d1fd 2079
4ddc07ca
PB
2080 tmp = *bs_new;
2081 *bs_new = *bs_old;
2082 *bs_old = tmp;
a9fc4408 2083
4ddc07ca
PB
2084 /* there are some fields that should not be swapped, move them back */
2085 bdrv_move_feature_fields(&tmp, bs_old);
2086 bdrv_move_feature_fields(bs_old, bs_new);
2087 bdrv_move_feature_fields(bs_new, &tmp);
8802d1fd 2088
bfb197e0 2089 /* bs_new must remain unattached */
7e7d56d9 2090 assert(!bs_new->blk);
4ddc07ca
PB
2091
2092 /* Check a few fields that should remain attached to the device */
4ddc07ca 2093 assert(bs_new->job == NULL);
4ddc07ca 2094 assert(bs_new->io_limits_enabled == false);
db628338 2095 assert(bs_new->throttle_state == NULL);
0e5b0a2d 2096 assert(!throttle_timers_are_initialized(&bs_new->throttle_timers));
e023b2e2 2097
db628338
AG
2098 /* Release the ThrottleGroup lock */
2099 if (bs_old->throttle_state) {
2100 throttle_group_unlock(bs_old);
2101 }
2102
90ce8a06
BC
2103 /* insert the nodes back into the graph node list if needed */
2104 if (bs_new->node_name[0] != '\0') {
2105 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs_new, node_list);
2106 }
2107 if (bs_old->node_name[0] != '\0') {
2108 QTAILQ_INSERT_TAIL(&graph_bdrv_states, bs_old, node_list);
2109 }
2110
6e93e7c4
KW
2111 /*
2112 * Update lh_first.le_prev for non-empty lists.
2113 *
2114 * The head of the op blocker list doesn't change because it is moved back
2115 * in bdrv_move_feature_fields().
2116 */
6ee4ce1e
KW
2117 assert(QLIST_EMPTY(&bs_old->tracked_requests));
2118 assert(QLIST_EMPTY(&bs_new->tracked_requests));
2119
6e93e7c4
KW
2120 QLIST_FIX_HEAD_PTR(&bs_new->children, next);
2121 QLIST_FIX_HEAD_PTR(&bs_old->children, next);
2122
bddcec37
KW
2123 /* Update references in bs->opaque and children */
2124 QLIST_FOREACH(child, &bs_old->children, next) {
2125 if (child->bs->inherits_from == bs_new) {
2126 child->bs->inherits_from = bs_old;
2127 }
2128 }
2129 QLIST_FOREACH(child, &bs_new->children, next) {
2130 if (child->bs->inherits_from == bs_old) {
2131 child->bs->inherits_from = bs_new;
2132 }
2133 }
2134
e023b2e2 2135 bdrv_rebind(bs_new);
4ddc07ca
PB
2136 bdrv_rebind(bs_old);
2137}
2138
2139/*
2140 * Add new bs contents at the top of an image chain while the chain is
2141 * live, while keeping required fields on the top layer.
2142 *
2143 * This will modify the BlockDriverState fields, and swap contents
2144 * between bs_new and bs_top. Both bs_new and bs_top are modified.
2145 *
bfb197e0 2146 * bs_new must not be attached to a BlockBackend.
4ddc07ca
PB
2147 *
2148 * This function does not create any image files.
2149 */
2150void bdrv_append(BlockDriverState *bs_new, BlockDriverState *bs_top)
2151{
2152 bdrv_swap(bs_new, bs_top);
2153
2154 /* The contents of 'tmp' will become bs_top, as we are
2155 * swapping bs_new and bs_top contents. */
8d24cce1 2156 bdrv_set_backing_hd(bs_top, bs_new);
8802d1fd
JC
2157}
2158
4f6fd349 2159static void bdrv_delete(BlockDriverState *bs)
b338082b 2160{
3e914655 2161 assert(!bs->job);
3718d8ab 2162 assert(bdrv_op_blocker_is_empty(bs));
4f6fd349 2163 assert(!bs->refcnt);
e4654d2d 2164 assert(QLIST_EMPTY(&bs->dirty_bitmaps));
18846dee 2165
e1b5c52e
SH
2166 bdrv_close(bs);
2167
1b7bdbc1 2168 /* remove from list, if necessary */
d22b2f41 2169 bdrv_make_anon(bs);
34c6f050 2170
7267c094 2171 g_free(bs);
fc01f7e7
FB
2172}
2173
e97fc193
AL
2174/*
2175 * Run consistency checks on an image
2176 *
e076f338 2177 * Returns 0 if the check could be completed (it doesn't mean that the image is
a1c7273b 2178 * free of errors) or -errno when an internal error occurred. The results of the
e076f338 2179 * check are stored in res.
e97fc193 2180 */
4534ff54 2181int bdrv_check(BlockDriverState *bs, BdrvCheckResult *res, BdrvCheckMode fix)
e97fc193 2182{
908bcd54
HR
2183 if (bs->drv == NULL) {
2184 return -ENOMEDIUM;
2185 }
e97fc193
AL
2186 if (bs->drv->bdrv_check == NULL) {
2187 return -ENOTSUP;
2188 }
2189
e076f338 2190 memset(res, 0, sizeof(*res));
4534ff54 2191 return bs->drv->bdrv_check(bs, res, fix);
e97fc193
AL
2192}
2193
8a426614
KW
2194#define COMMIT_BUF_SECTORS 2048
2195
33e3963e
FB
2196/* commit COW file into the raw image */
2197int bdrv_commit(BlockDriverState *bs)
2198{
19cb3738 2199 BlockDriver *drv = bs->drv;
72706ea4 2200 int64_t sector, total_sectors, length, backing_length;
8a426614 2201 int n, ro, open_flags;
0bce597d 2202 int ret = 0;
72706ea4 2203 uint8_t *buf = NULL;
33e3963e 2204
19cb3738
FB
2205 if (!drv)
2206 return -ENOMEDIUM;
6bb45158 2207
4dca4b63
NS
2208 if (!bs->backing_hd) {
2209 return -ENOTSUP;
33e3963e
FB
2210 }
2211
bb00021d
FZ
2212 if (bdrv_op_is_blocked(bs, BLOCK_OP_TYPE_COMMIT_SOURCE, NULL) ||
2213 bdrv_op_is_blocked(bs->backing_hd, BLOCK_OP_TYPE_COMMIT_TARGET, NULL)) {
2d3735d3
SH
2214 return -EBUSY;
2215 }
2216
4dca4b63 2217 ro = bs->backing_hd->read_only;
4dca4b63
NS
2218 open_flags = bs->backing_hd->open_flags;
2219
2220 if (ro) {
0bce597d
JC
2221 if (bdrv_reopen(bs->backing_hd, open_flags | BDRV_O_RDWR, NULL)) {
2222 return -EACCES;
4dca4b63 2223 }
ea2384d3 2224 }
33e3963e 2225
72706ea4
JC
2226 length = bdrv_getlength(bs);
2227 if (length < 0) {
2228 ret = length;
2229 goto ro_cleanup;
2230 }
2231
2232 backing_length = bdrv_getlength(bs->backing_hd);
2233 if (backing_length < 0) {
2234 ret = backing_length;
2235 goto ro_cleanup;
2236 }
2237
2238 /* If our top snapshot is larger than the backing file image,
2239 * grow the backing file image if possible. If not possible,
2240 * we must return an error */
2241 if (length > backing_length) {
2242 ret = bdrv_truncate(bs->backing_hd, length);
2243 if (ret < 0) {
2244 goto ro_cleanup;
2245 }
2246 }
2247
2248 total_sectors = length >> BDRV_SECTOR_BITS;
857d4f46
KW
2249
2250 /* qemu_try_blockalign() for bs will choose an alignment that works for
2251 * bs->backing_hd as well, so no need to compare the alignment manually. */
2252 buf = qemu_try_blockalign(bs, COMMIT_BUF_SECTORS * BDRV_SECTOR_SIZE);
2253 if (buf == NULL) {
2254 ret = -ENOMEM;
2255 goto ro_cleanup;
2256 }
8a426614
KW
2257
2258 for (sector = 0; sector < total_sectors; sector += n) {
d663640c
PB
2259 ret = bdrv_is_allocated(bs, sector, COMMIT_BUF_SECTORS, &n);
2260 if (ret < 0) {
2261 goto ro_cleanup;
2262 }
2263 if (ret) {
dabfa6cc
KW
2264 ret = bdrv_read(bs, sector, buf, n);
2265 if (ret < 0) {
8a426614
KW
2266 goto ro_cleanup;
2267 }
2268
dabfa6cc
KW
2269 ret = bdrv_write(bs->backing_hd, sector, buf, n);
2270 if (ret < 0) {
8a426614
KW
2271 goto ro_cleanup;
2272 }
ea2384d3 2273 }
33e3963e 2274 }
95389c86 2275
1d44952f
CH
2276 if (drv->bdrv_make_empty) {
2277 ret = drv->bdrv_make_empty(bs);
dabfa6cc
KW
2278 if (ret < 0) {
2279 goto ro_cleanup;
2280 }
1d44952f
CH
2281 bdrv_flush(bs);
2282 }
95389c86 2283
3f5075ae
CH
2284 /*
2285 * Make sure all data we wrote to the backing device is actually
2286 * stable on disk.
2287 */
dabfa6cc 2288 if (bs->backing_hd) {
3f5075ae 2289 bdrv_flush(bs->backing_hd);
dabfa6cc 2290 }
4dca4b63 2291
dabfa6cc 2292 ret = 0;
4dca4b63 2293ro_cleanup:
857d4f46 2294 qemu_vfree(buf);
4dca4b63
NS
2295
2296 if (ro) {
0bce597d
JC
2297 /* ignoring error return here */
2298 bdrv_reopen(bs->backing_hd, open_flags & ~BDRV_O_RDWR, NULL);
4dca4b63
NS
2299 }
2300
1d44952f 2301 return ret;
33e3963e
FB
2302}
2303
e8877497 2304int bdrv_commit_all(void)
6ab4b5ab
MA
2305{
2306 BlockDriverState *bs;
2307
dc364f4c 2308 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
2309 AioContext *aio_context = bdrv_get_aio_context(bs);
2310
2311 aio_context_acquire(aio_context);
272d2d8e
JC
2312 if (bs->drv && bs->backing_hd) {
2313 int ret = bdrv_commit(bs);
2314 if (ret < 0) {
ed78cda3 2315 aio_context_release(aio_context);
272d2d8e
JC
2316 return ret;
2317 }
e8877497 2318 }
ed78cda3 2319 aio_context_release(aio_context);
6ab4b5ab 2320 }
e8877497 2321 return 0;
6ab4b5ab
MA
2322}
2323
756e6736
KW
2324/*
2325 * Return values:
2326 * 0 - success
2327 * -EINVAL - backing format specified, but no file
2328 * -ENOSPC - can't update the backing file because no space is left in the
2329 * image file header
2330 * -ENOTSUP - format driver doesn't support changing the backing file
2331 */
2332int bdrv_change_backing_file(BlockDriverState *bs,
2333 const char *backing_file, const char *backing_fmt)
2334{
2335 BlockDriver *drv = bs->drv;
469ef350 2336 int ret;
756e6736 2337
5f377794
PB
2338 /* Backing file format doesn't make sense without a backing file */
2339 if (backing_fmt && !backing_file) {
2340 return -EINVAL;
2341 }
2342
756e6736 2343 if (drv->bdrv_change_backing_file != NULL) {
469ef350 2344 ret = drv->bdrv_change_backing_file(bs, backing_file, backing_fmt);
756e6736 2345 } else {
469ef350 2346 ret = -ENOTSUP;
756e6736 2347 }
469ef350
PB
2348
2349 if (ret == 0) {
2350 pstrcpy(bs->backing_file, sizeof(bs->backing_file), backing_file ?: "");
2351 pstrcpy(bs->backing_format, sizeof(bs->backing_format), backing_fmt ?: "");
2352 }
2353 return ret;
756e6736
KW
2354}
2355
6ebdcee2
JC
2356/*
2357 * Finds the image layer in the chain that has 'bs' as its backing file.
2358 *
2359 * active is the current topmost image.
2360 *
2361 * Returns NULL if bs is not found in active's image chain,
2362 * or if active == bs.
4caf0fcd
JC
2363 *
2364 * Returns the bottommost base image if bs == NULL.
6ebdcee2
JC
2365 */
2366BlockDriverState *bdrv_find_overlay(BlockDriverState *active,
2367 BlockDriverState *bs)
2368{
4caf0fcd
JC
2369 while (active && bs != active->backing_hd) {
2370 active = active->backing_hd;
6ebdcee2
JC
2371 }
2372
4caf0fcd
JC
2373 return active;
2374}
6ebdcee2 2375
4caf0fcd
JC
2376/* Given a BDS, searches for the base layer. */
2377BlockDriverState *bdrv_find_base(BlockDriverState *bs)
2378{
2379 return bdrv_find_overlay(bs, NULL);
6ebdcee2
JC
2380}
2381
2382typedef struct BlkIntermediateStates {
2383 BlockDriverState *bs;
2384 QSIMPLEQ_ENTRY(BlkIntermediateStates) entry;
2385} BlkIntermediateStates;
2386
2387
2388/*
2389 * Drops images above 'base' up to and including 'top', and sets the image
2390 * above 'top' to have base as its backing file.
2391 *
2392 * Requires that the overlay to 'top' is opened r/w, so that the backing file
2393 * information in 'bs' can be properly updated.
2394 *
2395 * E.g., this will convert the following chain:
2396 * bottom <- base <- intermediate <- top <- active
2397 *
2398 * to
2399 *
2400 * bottom <- base <- active
2401 *
2402 * It is allowed for bottom==base, in which case it converts:
2403 *
2404 * base <- intermediate <- top <- active
2405 *
2406 * to
2407 *
2408 * base <- active
2409 *
54e26900
JC
2410 * If backing_file_str is non-NULL, it will be used when modifying top's
2411 * overlay image metadata.
2412 *
6ebdcee2
JC
2413 * Error conditions:
2414 * if active == top, that is considered an error
2415 *
2416 */
2417int bdrv_drop_intermediate(BlockDriverState *active, BlockDriverState *top,
54e26900 2418 BlockDriverState *base, const char *backing_file_str)
6ebdcee2
JC
2419{
2420 BlockDriverState *intermediate;
2421 BlockDriverState *base_bs = NULL;
2422 BlockDriverState *new_top_bs = NULL;
2423 BlkIntermediateStates *intermediate_state, *next;
2424 int ret = -EIO;
2425
2426 QSIMPLEQ_HEAD(states_to_delete, BlkIntermediateStates) states_to_delete;
2427 QSIMPLEQ_INIT(&states_to_delete);
2428
2429 if (!top->drv || !base->drv) {
2430 goto exit;
2431 }
2432
2433 new_top_bs = bdrv_find_overlay(active, top);
2434
2435 if (new_top_bs == NULL) {
2436 /* we could not find the image above 'top', this is an error */
2437 goto exit;
2438 }
2439
2440 /* special case of new_top_bs->backing_hd already pointing to base - nothing
2441 * to do, no intermediate images */
2442 if (new_top_bs->backing_hd == base) {
2443 ret = 0;
2444 goto exit;
2445 }
2446
2447 intermediate = top;
2448
2449 /* now we will go down through the list, and add each BDS we find
2450 * into our deletion queue, until we hit the 'base'
2451 */
2452 while (intermediate) {
5839e53b 2453 intermediate_state = g_new0(BlkIntermediateStates, 1);
6ebdcee2
JC
2454 intermediate_state->bs = intermediate;
2455 QSIMPLEQ_INSERT_TAIL(&states_to_delete, intermediate_state, entry);
2456
2457 if (intermediate->backing_hd == base) {
2458 base_bs = intermediate->backing_hd;
2459 break;
2460 }
2461 intermediate = intermediate->backing_hd;
2462 }
2463 if (base_bs == NULL) {
2464 /* something went wrong, we did not end at the base. safely
2465 * unravel everything, and exit with error */
2466 goto exit;
2467 }
2468
2469 /* success - we can delete the intermediate states, and link top->base */
54e26900
JC
2470 backing_file_str = backing_file_str ? backing_file_str : base_bs->filename;
2471 ret = bdrv_change_backing_file(new_top_bs, backing_file_str,
6ebdcee2
JC
2472 base_bs->drv ? base_bs->drv->format_name : "");
2473 if (ret) {
2474 goto exit;
2475 }
920beae1 2476 bdrv_set_backing_hd(new_top_bs, base_bs);
6ebdcee2
JC
2477
2478 QSIMPLEQ_FOREACH_SAFE(intermediate_state, &states_to_delete, entry, next) {
2479 /* so that bdrv_close() does not recursively close the chain */
920beae1 2480 bdrv_set_backing_hd(intermediate_state->bs, NULL);
4f6fd349 2481 bdrv_unref(intermediate_state->bs);
6ebdcee2
JC
2482 }
2483 ret = 0;
2484
2485exit:
2486 QSIMPLEQ_FOREACH_SAFE(intermediate_state, &states_to_delete, entry, next) {
2487 g_free(intermediate_state);
2488 }
2489 return ret;
2490}
2491
61007b31
SH
2492/**
2493 * Truncate file to 'offset' bytes (needed only for file protocols)
2494 */
2495int bdrv_truncate(BlockDriverState *bs, int64_t offset)
71d0770c 2496{
61007b31
SH
2497 BlockDriver *drv = bs->drv;
2498 int ret;
2499 if (!drv)
71d0770c 2500 return -ENOMEDIUM;
61007b31
SH
2501 if (!drv->bdrv_truncate)
2502 return -ENOTSUP;
2503 if (bs->read_only)
2504 return -EACCES;
71d0770c 2505
61007b31
SH
2506 ret = drv->bdrv_truncate(bs, offset);
2507 if (ret == 0) {
2508 ret = refresh_total_sectors(bs, offset >> BDRV_SECTOR_BITS);
2509 bdrv_dirty_bitmap_truncate(bs);
2510 if (bs->blk) {
2511 blk_dev_resize_cb(bs->blk);
2512 }
c0191e76 2513 }
61007b31 2514 return ret;
71d0770c
AL
2515}
2516
61007b31
SH
2517/**
2518 * Length of a allocated file in bytes. Sparse files are counted by actual
2519 * allocated space. Return < 0 if error or unknown.
2520 */
2521int64_t bdrv_get_allocated_file_size(BlockDriverState *bs)
71d0770c 2522{
61007b31
SH
2523 BlockDriver *drv = bs->drv;
2524 if (!drv) {
2525 return -ENOMEDIUM;
8f4754ed 2526 }
61007b31
SH
2527 if (drv->bdrv_get_allocated_file_size) {
2528 return drv->bdrv_get_allocated_file_size(bs);
2529 }
2530 if (bs->file) {
9a4f4c31 2531 return bdrv_get_allocated_file_size(bs->file->bs);
1c9805a3 2532 }
61007b31 2533 return -ENOTSUP;
1c9805a3 2534}
e7a8a783 2535
61007b31
SH
2536/**
2537 * Return number of sectors on success, -errno on error.
1c9805a3 2538 */
61007b31 2539int64_t bdrv_nb_sectors(BlockDriverState *bs)
1c9805a3 2540{
61007b31 2541 BlockDriver *drv = bs->drv;
498e386c 2542
61007b31
SH
2543 if (!drv)
2544 return -ENOMEDIUM;
2572b37a 2545
61007b31
SH
2546 if (drv->has_variable_length) {
2547 int ret = refresh_total_sectors(bs, bs->total_sectors);
2548 if (ret < 0) {
2549 return ret;
1c9805a3
SH
2550 }
2551 }
61007b31 2552 return bs->total_sectors;
1c9805a3 2553}
b338082b 2554
61007b31
SH
2555/**
2556 * Return length in bytes on success, -errno on error.
2557 * The length is always a multiple of BDRV_SECTOR_SIZE.
8d3b1a2d 2558 */
61007b31 2559int64_t bdrv_getlength(BlockDriverState *bs)
8d3b1a2d 2560{
61007b31 2561 int64_t ret = bdrv_nb_sectors(bs);
8d3b1a2d 2562
4a9c9ea0 2563 ret = ret > INT64_MAX / BDRV_SECTOR_SIZE ? -EFBIG : ret;
61007b31 2564 return ret < 0 ? ret : ret * BDRV_SECTOR_SIZE;
fc01f7e7
FB
2565}
2566
61007b31
SH
2567/* return 0 as number of sectors if no device present or error */
2568void bdrv_get_geometry(BlockDriverState *bs, uint64_t *nb_sectors_ptr)
07d27a44 2569{
61007b31 2570 int64_t nb_sectors = bdrv_nb_sectors(bs);
07d27a44 2571
61007b31 2572 *nb_sectors_ptr = nb_sectors < 0 ? 0 : nb_sectors;
07d27a44
MA
2573}
2574
61007b31
SH
2575void bdrv_set_on_error(BlockDriverState *bs, BlockdevOnError on_read_error,
2576 BlockdevOnError on_write_error)
fc01f7e7 2577{
61007b31
SH
2578 bs->on_read_error = on_read_error;
2579 bs->on_write_error = on_write_error;
83f64091
FB
2580}
2581
61007b31 2582BlockdevOnError bdrv_get_on_error(BlockDriverState *bs, bool is_read)
4105eaaa 2583{
61007b31 2584 return is_read ? bs->on_read_error : bs->on_write_error;
8d3b1a2d
KW
2585}
2586
61007b31 2587BlockErrorAction bdrv_get_error_action(BlockDriverState *bs, bool is_read, int error)
d75cbb5e 2588{
61007b31 2589 BlockdevOnError on_err = is_read ? bs->on_read_error : bs->on_write_error;
9ce10c0b 2590
61007b31
SH
2591 switch (on_err) {
2592 case BLOCKDEV_ON_ERROR_ENOSPC:
2593 return (error == ENOSPC) ?
2594 BLOCK_ERROR_ACTION_STOP : BLOCK_ERROR_ACTION_REPORT;
2595 case BLOCKDEV_ON_ERROR_STOP:
2596 return BLOCK_ERROR_ACTION_STOP;
2597 case BLOCKDEV_ON_ERROR_REPORT:
2598 return BLOCK_ERROR_ACTION_REPORT;
2599 case BLOCKDEV_ON_ERROR_IGNORE:
2600 return BLOCK_ERROR_ACTION_IGNORE;
2601 default:
2602 abort();
d75cbb5e
PL
2603 }
2604}
2605
61007b31
SH
2606static void send_qmp_error_event(BlockDriverState *bs,
2607 BlockErrorAction action,
2608 bool is_read, int error)
83f64091 2609{
61007b31 2610 IoOperationType optype;
a3ef6571 2611
61007b31
SH
2612 optype = is_read ? IO_OPERATION_TYPE_READ : IO_OPERATION_TYPE_WRITE;
2613 qapi_event_send_block_io_error(bdrv_get_device_name(bs), optype, action,
2614 bdrv_iostatus_is_enabled(bs),
2615 error == ENOSPC, strerror(error),
2616 &error_abort);
83f64091
FB
2617}
2618
61007b31
SH
2619/* This is done by device models because, while the block layer knows
2620 * about the error, it does not know whether an operation comes from
2621 * the device or the block layer (from a job, for example).
2622 */
2623void bdrv_error_action(BlockDriverState *bs, BlockErrorAction action,
2624 bool is_read, int error)
83f64091 2625{
61007b31 2626 assert(error >= 0);
83f64091 2627
61007b31
SH
2628 if (action == BLOCK_ERROR_ACTION_STOP) {
2629 /* First set the iostatus, so that "info block" returns an iostatus
2630 * that matches the events raised so far (an additional error iostatus
2631 * is fine, but not a lost one).
2632 */
2633 bdrv_iostatus_set_err(bs, error);
83f64091 2634
61007b31
SH
2635 /* Then raise the request to stop the VM and the event.
2636 * qemu_system_vmstop_request_prepare has two effects. First,
2637 * it ensures that the STOP event always comes after the
2638 * BLOCK_IO_ERROR event. Second, it ensures that even if management
2639 * can observe the STOP event and do a "cont" before the STOP
2640 * event is issued, the VM will not stop. In this case, vm_start()
2641 * also ensures that the STOP/RESUME pair of events is emitted.
2642 */
2643 qemu_system_vmstop_request_prepare();
2644 send_qmp_error_event(bs, action, is_read, error);
2645 qemu_system_vmstop_request(RUN_STATE_IO_ERROR);
2646 } else {
2647 send_qmp_error_event(bs, action, is_read, error);
2648 }
8d3b1a2d
KW
2649}
2650
61007b31 2651int bdrv_is_read_only(BlockDriverState *bs)
8d3b1a2d 2652{
61007b31 2653 return bs->read_only;
83f64091 2654}
83f64091 2655
61007b31 2656int bdrv_is_sg(BlockDriverState *bs)
f08145fe 2657{
61007b31 2658 return bs->sg;
f08145fe
KW
2659}
2660
61007b31 2661int bdrv_enable_write_cache(BlockDriverState *bs)
ab185921 2662{
61007b31 2663 return bs->enable_write_cache;
ab185921
SH
2664}
2665
61007b31 2666void bdrv_set_enable_write_cache(BlockDriverState *bs, bool wce)
da1fa91d 2667{
61007b31 2668 bs->enable_write_cache = wce;
ab185921 2669
61007b31
SH
2670 /* so a reopen() will preserve wce */
2671 if (wce) {
2672 bs->open_flags |= BDRV_O_CACHE_WB;
893a8f62 2673 } else {
61007b31 2674 bs->open_flags &= ~BDRV_O_CACHE_WB;
893a8f62 2675 }
da1fa91d
KW
2676}
2677
61007b31 2678int bdrv_is_encrypted(BlockDriverState *bs)
fc3959e4 2679{
61007b31
SH
2680 if (bs->backing_hd && bs->backing_hd->encrypted)
2681 return 1;
2682 return bs->encrypted;
fc3959e4
FZ
2683}
2684
61007b31 2685int bdrv_key_required(BlockDriverState *bs)
fc3959e4 2686{
61007b31
SH
2687 BlockDriverState *backing_hd = bs->backing_hd;
2688
2689 if (backing_hd && backing_hd->encrypted && !backing_hd->valid_key)
2690 return 1;
2691 return (bs->encrypted && !bs->valid_key);
fc3959e4
FZ
2692}
2693
61007b31 2694int bdrv_set_key(BlockDriverState *bs, const char *key)
d0c7f642 2695{
d0c7f642 2696 int ret;
61007b31
SH
2697 if (bs->backing_hd && bs->backing_hd->encrypted) {
2698 ret = bdrv_set_key(bs->backing_hd, key);
2699 if (ret < 0)
2700 return ret;
2701 if (!bs->encrypted)
2702 return 0;
2703 }
2704 if (!bs->encrypted) {
2705 return -EINVAL;
2706 } else if (!bs->drv || !bs->drv->bdrv_set_key) {
d0c7f642
KW
2707 return -ENOMEDIUM;
2708 }
61007b31 2709 ret = bs->drv->bdrv_set_key(bs, key);
b9c64947 2710 if (ret < 0) {
61007b31
SH
2711 bs->valid_key = 0;
2712 } else if (!bs->valid_key) {
2713 bs->valid_key = 1;
2714 if (bs->blk) {
2715 /* call the change callback now, we skipped it on open */
2716 blk_dev_change_media_cb(bs->blk, true);
2717 }
1b0288ae 2718 }
61007b31
SH
2719 return ret;
2720}
f08f2dda 2721
c5fbe571 2722/*
61007b31
SH
2723 * Provide an encryption key for @bs.
2724 * If @key is non-null:
2725 * If @bs is not encrypted, fail.
2726 * Else if the key is invalid, fail.
2727 * Else set @bs's key to @key, replacing the existing key, if any.
2728 * If @key is null:
2729 * If @bs is encrypted and still lacks a key, fail.
2730 * Else do nothing.
2731 * On failure, store an error object through @errp if non-null.
c5fbe571 2732 */
61007b31 2733void bdrv_add_key(BlockDriverState *bs, const char *key, Error **errp)
c5fbe571 2734{
61007b31
SH
2735 if (key) {
2736 if (!bdrv_is_encrypted(bs)) {
2737 error_setg(errp, "Node '%s' is not encrypted",
2738 bdrv_get_device_or_node_name(bs));
2739 } else if (bdrv_set_key(bs, key) < 0) {
c6bd8c70 2740 error_setg(errp, QERR_INVALID_PASSWORD);
4d2855a3
MA
2741 }
2742 } else {
2743 if (bdrv_key_required(bs)) {
b1ca6391
MA
2744 error_set(errp, ERROR_CLASS_DEVICE_ENCRYPTED,
2745 "'%s' (%s) is encrypted",
81e5f78a 2746 bdrv_get_device_or_node_name(bs),
4d2855a3
MA
2747 bdrv_get_encrypted_filename(bs));
2748 }
2749 }
2750}
2751
61007b31 2752const char *bdrv_get_format_name(BlockDriverState *bs)
40b4f539 2753{
61007b31 2754 return bs->drv ? bs->drv->format_name : NULL;
40b4f539
KW
2755}
2756
61007b31 2757static int qsort_strcmp(const void *a, const void *b)
40b4f539 2758{
61007b31 2759 return strcmp(a, b);
40b4f539
KW
2760}
2761
61007b31
SH
2762void bdrv_iterate_format(void (*it)(void *opaque, const char *name),
2763 void *opaque)
40b4f539 2764{
61007b31
SH
2765 BlockDriver *drv;
2766 int count = 0;
2767 int i;
2768 const char **formats = NULL;
40b4f539 2769
61007b31
SH
2770 QLIST_FOREACH(drv, &bdrv_drivers, list) {
2771 if (drv->format_name) {
2772 bool found = false;
2773 int i = count;
2774 while (formats && i && !found) {
2775 found = !strcmp(formats[--i], drv->format_name);
2776 }
e2a305fb 2777
61007b31
SH
2778 if (!found) {
2779 formats = g_renew(const char *, formats, count + 1);
2780 formats[count++] = drv->format_name;
2781 }
6c5a42ac 2782 }
61007b31 2783 }
6c5a42ac 2784
61007b31 2785 qsort(formats, count, sizeof(formats[0]), qsort_strcmp);
40b4f539 2786
61007b31
SH
2787 for (i = 0; i < count; i++) {
2788 it(opaque, formats[i]);
2789 }
40b4f539 2790
61007b31
SH
2791 g_free(formats);
2792}
40b4f539 2793
61007b31
SH
2794/* This function is to find a node in the bs graph */
2795BlockDriverState *bdrv_find_node(const char *node_name)
2796{
2797 BlockDriverState *bs;
391827eb 2798
61007b31 2799 assert(node_name);
40b4f539 2800
61007b31
SH
2801 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2802 if (!strcmp(node_name, bs->node_name)) {
2803 return bs;
40b4f539
KW
2804 }
2805 }
61007b31 2806 return NULL;
40b4f539
KW
2807}
2808
61007b31
SH
2809/* Put this QMP function here so it can access the static graph_bdrv_states. */
2810BlockDeviceInfoList *bdrv_named_nodes_list(Error **errp)
40b4f539 2811{
61007b31
SH
2812 BlockDeviceInfoList *list, *entry;
2813 BlockDriverState *bs;
40b4f539 2814
61007b31
SH
2815 list = NULL;
2816 QTAILQ_FOREACH(bs, &graph_bdrv_states, node_list) {
2817 BlockDeviceInfo *info = bdrv_block_device_info(bs, errp);
2818 if (!info) {
2819 qapi_free_BlockDeviceInfoList(list);
2820 return NULL;
301db7c2 2821 }
61007b31
SH
2822 entry = g_malloc0(sizeof(*entry));
2823 entry->value = info;
2824 entry->next = list;
2825 list = entry;
301db7c2
RH
2826 }
2827
61007b31
SH
2828 return list;
2829}
40b4f539 2830
61007b31
SH
2831BlockDriverState *bdrv_lookup_bs(const char *device,
2832 const char *node_name,
2833 Error **errp)
2834{
2835 BlockBackend *blk;
2836 BlockDriverState *bs;
40b4f539 2837
61007b31
SH
2838 if (device) {
2839 blk = blk_by_name(device);
40b4f539 2840
61007b31
SH
2841 if (blk) {
2842 return blk_bs(blk);
2843 }
2844 }
40b4f539 2845
61007b31
SH
2846 if (node_name) {
2847 bs = bdrv_find_node(node_name);
6d519a5f 2848
61007b31
SH
2849 if (bs) {
2850 return bs;
2851 }
40b4f539
KW
2852 }
2853
61007b31
SH
2854 error_setg(errp, "Cannot find device=%s nor node_name=%s",
2855 device ? device : "",
2856 node_name ? node_name : "");
2857 return NULL;
40b4f539
KW
2858}
2859
61007b31
SH
2860/* If 'base' is in the same chain as 'top', return true. Otherwise,
2861 * return false. If either argument is NULL, return false. */
2862bool bdrv_chain_contains(BlockDriverState *top, BlockDriverState *base)
83f64091 2863{
61007b31
SH
2864 while (top && top != base) {
2865 top = top->backing_hd;
02c50efe 2866 }
61007b31
SH
2867
2868 return top != NULL;
02c50efe
FZ
2869}
2870
61007b31 2871BlockDriverState *bdrv_next_node(BlockDriverState *bs)
02c50efe 2872{
61007b31
SH
2873 if (!bs) {
2874 return QTAILQ_FIRST(&graph_bdrv_states);
02c50efe 2875 }
61007b31 2876 return QTAILQ_NEXT(bs, node_list);
83f64091
FB
2877}
2878
61007b31 2879BlockDriverState *bdrv_next(BlockDriverState *bs)
83f64091 2880{
61007b31
SH
2881 if (!bs) {
2882 return QTAILQ_FIRST(&bdrv_states);
857d4f46 2883 }
61007b31 2884 return QTAILQ_NEXT(bs, device_list);
83f64091 2885}
beac80cd 2886
61007b31 2887const char *bdrv_get_node_name(const BlockDriverState *bs)
83f64091 2888{
61007b31 2889 return bs->node_name;
beac80cd
FB
2890}
2891
61007b31
SH
2892/* TODO check what callers really want: bs->node_name or blk_name() */
2893const char *bdrv_get_device_name(const BlockDriverState *bs)
beac80cd 2894{
61007b31 2895 return bs->blk ? blk_name(bs->blk) : "";
f141eafe 2896}
83f64091 2897
61007b31
SH
2898/* This can be used to identify nodes that might not have a device
2899 * name associated. Since node and device names live in the same
2900 * namespace, the result is unambiguous. The exception is if both are
2901 * absent, then this returns an empty (non-null) string. */
2902const char *bdrv_get_device_or_node_name(const BlockDriverState *bs)
f141eafe 2903{
61007b31 2904 return bs->blk ? blk_name(bs->blk) : bs->node_name;
beac80cd 2905}
beac80cd 2906
61007b31 2907int bdrv_get_flags(BlockDriverState *bs)
0b5a2445 2908{
61007b31 2909 return bs->open_flags;
0b5a2445
PB
2910}
2911
61007b31 2912int bdrv_has_zero_init_1(BlockDriverState *bs)
68485420 2913{
61007b31 2914 return 1;
0b5a2445
PB
2915}
2916
61007b31 2917int bdrv_has_zero_init(BlockDriverState *bs)
0b5a2445 2918{
61007b31 2919 assert(bs->drv);
0b5a2445 2920
61007b31
SH
2921 /* If BS is a copy on write image, it is initialized to
2922 the contents of the base image, which may not be zeroes. */
2923 if (bs->backing_hd) {
2924 return 0;
2925 }
2926 if (bs->drv->bdrv_has_zero_init) {
2927 return bs->drv->bdrv_has_zero_init(bs);
0b5a2445 2928 }
61007b31
SH
2929
2930 /* safe default */
2931 return 0;
68485420
KW
2932}
2933
61007b31 2934bool bdrv_unallocated_blocks_are_zero(BlockDriverState *bs)
b2a61371 2935{
61007b31 2936 BlockDriverInfo bdi;
b2a61371 2937
61007b31
SH
2938 if (bs->backing_hd) {
2939 return false;
2940 }
2941
2942 if (bdrv_get_info(bs, &bdi) == 0) {
2943 return bdi.unallocated_blocks_are_zero;
b2a61371
SH
2944 }
2945
61007b31 2946 return false;
b2a61371
SH
2947}
2948
61007b31 2949bool bdrv_can_write_zeroes_with_unmap(BlockDriverState *bs)
68485420 2950{
61007b31 2951 BlockDriverInfo bdi;
68485420 2952
61007b31
SH
2953 if (bs->backing_hd || !(bs->open_flags & BDRV_O_UNMAP)) {
2954 return false;
2955 }
68485420 2956
61007b31
SH
2957 if (bdrv_get_info(bs, &bdi) == 0) {
2958 return bdi.can_write_zeroes_with_unmap;
2959 }
68485420 2960
61007b31 2961 return false;
68485420
KW
2962}
2963
61007b31 2964const char *bdrv_get_encrypted_filename(BlockDriverState *bs)
b2e12bc6 2965{
61007b31
SH
2966 if (bs->backing_hd && bs->backing_hd->encrypted)
2967 return bs->backing_file;
2968 else if (bs->encrypted)
2969 return bs->filename;
2970 else
2971 return NULL;
b2e12bc6
CH
2972}
2973
61007b31
SH
2974void bdrv_get_backing_filename(BlockDriverState *bs,
2975 char *filename, int filename_size)
016f5cf6 2976{
61007b31
SH
2977 pstrcpy(filename, filename_size, bs->backing_file);
2978}
d318aea9 2979
61007b31
SH
2980int bdrv_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
2981{
2982 BlockDriver *drv = bs->drv;
2983 if (!drv)
2984 return -ENOMEDIUM;
2985 if (!drv->bdrv_get_info)
2986 return -ENOTSUP;
2987 memset(bdi, 0, sizeof(*bdi));
2988 return drv->bdrv_get_info(bs, bdi);
2989}
016f5cf6 2990
61007b31
SH
2991ImageInfoSpecific *bdrv_get_specific_info(BlockDriverState *bs)
2992{
2993 BlockDriver *drv = bs->drv;
2994 if (drv && drv->bdrv_get_specific_info) {
2995 return drv->bdrv_get_specific_info(bs);
2996 }
2997 return NULL;
016f5cf6
AG
2998}
2999
61007b31 3000void bdrv_debug_event(BlockDriverState *bs, BlkDebugEvent event)
4265d620 3001{
61007b31
SH
3002 if (!bs || !bs->drv || !bs->drv->bdrv_debug_event) {
3003 return;
3004 }
4265d620 3005
61007b31 3006 bs->drv->bdrv_debug_event(bs, event);
4265d620
PB
3007}
3008
61007b31
SH
3009int bdrv_debug_breakpoint(BlockDriverState *bs, const char *event,
3010 const char *tag)
4265d620 3011{
61007b31 3012 while (bs && bs->drv && !bs->drv->bdrv_debug_breakpoint) {
9a4f4c31 3013 bs = bs->file ? bs->file->bs : NULL;
61007b31 3014 }
4265d620 3015
61007b31
SH
3016 if (bs && bs->drv && bs->drv->bdrv_debug_breakpoint) {
3017 return bs->drv->bdrv_debug_breakpoint(bs, event, tag);
3018 }
4265d620 3019
61007b31 3020 return -ENOTSUP;
4265d620
PB
3021}
3022
61007b31 3023int bdrv_debug_remove_breakpoint(BlockDriverState *bs, const char *tag)
ea2384d3 3024{
61007b31 3025 while (bs && bs->drv && !bs->drv->bdrv_debug_remove_breakpoint) {
9a4f4c31 3026 bs = bs->file ? bs->file->bs : NULL;
61007b31 3027 }
ce1a14dc 3028
61007b31
SH
3029 if (bs && bs->drv && bs->drv->bdrv_debug_remove_breakpoint) {
3030 return bs->drv->bdrv_debug_remove_breakpoint(bs, tag);
3031 }
3032
3033 return -ENOTSUP;
eb852011
MA
3034}
3035
61007b31 3036int bdrv_debug_resume(BlockDriverState *bs, const char *tag)
ce1a14dc 3037{
61007b31 3038 while (bs && (!bs->drv || !bs->drv->bdrv_debug_resume)) {
9a4f4c31 3039 bs = bs->file ? bs->file->bs : NULL;
61007b31 3040 }
ce1a14dc 3041
61007b31
SH
3042 if (bs && bs->drv && bs->drv->bdrv_debug_resume) {
3043 return bs->drv->bdrv_debug_resume(bs, tag);
3044 }
ce1a14dc 3045
61007b31 3046 return -ENOTSUP;
f197fe2b
FZ
3047}
3048
61007b31 3049bool bdrv_debug_is_suspended(BlockDriverState *bs, const char *tag)
ce1a14dc 3050{
61007b31 3051 while (bs && bs->drv && !bs->drv->bdrv_debug_is_suspended) {
9a4f4c31 3052 bs = bs->file ? bs->file->bs : NULL;
f197fe2b 3053 }
19cb3738 3054
61007b31
SH
3055 if (bs && bs->drv && bs->drv->bdrv_debug_is_suspended) {
3056 return bs->drv->bdrv_debug_is_suspended(bs, tag);
3057 }
f9f05dc5 3058
61007b31
SH
3059 return false;
3060}
f9f05dc5 3061
61007b31 3062int bdrv_is_snapshot(BlockDriverState *bs)
f9f05dc5 3063{
61007b31 3064 return !!(bs->open_flags & BDRV_O_SNAPSHOT);
f9f05dc5
KW
3065}
3066
61007b31
SH
3067/* backing_file can either be relative, or absolute, or a protocol. If it is
3068 * relative, it must be relative to the chain. So, passing in bs->filename
3069 * from a BDS as backing_file should not be done, as that may be relative to
3070 * the CWD rather than the chain. */
3071BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
3072 const char *backing_file)
f9f05dc5 3073{
61007b31
SH
3074 char *filename_full = NULL;
3075 char *backing_file_full = NULL;
3076 char *filename_tmp = NULL;
3077 int is_protocol = 0;
3078 BlockDriverState *curr_bs = NULL;
3079 BlockDriverState *retval = NULL;
f9f05dc5 3080
61007b31
SH
3081 if (!bs || !bs->drv || !backing_file) {
3082 return NULL;
f9f05dc5
KW
3083 }
3084
61007b31
SH
3085 filename_full = g_malloc(PATH_MAX);
3086 backing_file_full = g_malloc(PATH_MAX);
3087 filename_tmp = g_malloc(PATH_MAX);
f9f05dc5 3088
61007b31 3089 is_protocol = path_has_protocol(backing_file);
f9f05dc5 3090
61007b31 3091 for (curr_bs = bs; curr_bs->backing_hd; curr_bs = curr_bs->backing_hd) {
f9f05dc5 3092
61007b31
SH
3093 /* If either of the filename paths is actually a protocol, then
3094 * compare unmodified paths; otherwise make paths relative */
3095 if (is_protocol || path_has_protocol(curr_bs->backing_file)) {
3096 if (strcmp(backing_file, curr_bs->backing_file) == 0) {
3097 retval = curr_bs->backing_hd;
3098 break;
3099 }
3100 } else {
3101 /* If not an absolute filename path, make it relative to the current
3102 * image's filename path */
3103 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3104 backing_file);
f9f05dc5 3105
61007b31
SH
3106 /* We are going to compare absolute pathnames */
3107 if (!realpath(filename_tmp, filename_full)) {
3108 continue;
3109 }
07f07615 3110
61007b31
SH
3111 /* We need to make sure the backing filename we are comparing against
3112 * is relative to the current image filename (or absolute) */
3113 path_combine(filename_tmp, PATH_MAX, curr_bs->filename,
3114 curr_bs->backing_file);
07f07615 3115
61007b31
SH
3116 if (!realpath(filename_tmp, backing_file_full)) {
3117 continue;
3118 }
eb489bb1 3119
61007b31
SH
3120 if (strcmp(backing_file_full, filename_full) == 0) {
3121 retval = curr_bs->backing_hd;
3122 break;
3123 }
3124 }
eb489bb1
KW
3125 }
3126
61007b31
SH
3127 g_free(filename_full);
3128 g_free(backing_file_full);
3129 g_free(filename_tmp);
3130 return retval;
3131}
3132
3133int bdrv_get_backing_file_depth(BlockDriverState *bs)
3134{
3135 if (!bs->drv) {
3136 return 0;
eb489bb1
KW
3137 }
3138
61007b31
SH
3139 if (!bs->backing_hd) {
3140 return 0;
ca716364
KW
3141 }
3142
61007b31
SH
3143 return 1 + bdrv_get_backing_file_depth(bs->backing_hd);
3144}
07f07615 3145
61007b31
SH
3146void bdrv_init(void)
3147{
3148 module_call_init(MODULE_INIT_BLOCK);
3149}
29cdb251 3150
61007b31
SH
3151void bdrv_init_with_whitelist(void)
3152{
3153 use_bdrv_whitelist = 1;
3154 bdrv_init();
07f07615
PB
3155}
3156
5a8a30db 3157void bdrv_invalidate_cache(BlockDriverState *bs, Error **errp)
0f15423c 3158{
5a8a30db
KW
3159 Error *local_err = NULL;
3160 int ret;
3161
3456a8d1
KW
3162 if (!bs->drv) {
3163 return;
3164 }
3165
7ea2d269
AK
3166 if (!(bs->open_flags & BDRV_O_INCOMING)) {
3167 return;
3168 }
3169 bs->open_flags &= ~BDRV_O_INCOMING;
3170
3456a8d1 3171 if (bs->drv->bdrv_invalidate_cache) {
5a8a30db 3172 bs->drv->bdrv_invalidate_cache(bs, &local_err);
3456a8d1 3173 } else if (bs->file) {
9a4f4c31 3174 bdrv_invalidate_cache(bs->file->bs, &local_err);
5a8a30db
KW
3175 }
3176 if (local_err) {
3177 error_propagate(errp, local_err);
3178 return;
0f15423c 3179 }
3456a8d1 3180
5a8a30db
KW
3181 ret = refresh_total_sectors(bs, bs->total_sectors);
3182 if (ret < 0) {
3183 error_setg_errno(errp, -ret, "Could not refresh total sector count");
3184 return;
3185 }
0f15423c
AL
3186}
3187
5a8a30db 3188void bdrv_invalidate_cache_all(Error **errp)
0f15423c
AL
3189{
3190 BlockDriverState *bs;
5a8a30db 3191 Error *local_err = NULL;
0f15423c 3192
dc364f4c 3193 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
ed78cda3
SH
3194 AioContext *aio_context = bdrv_get_aio_context(bs);
3195
3196 aio_context_acquire(aio_context);
5a8a30db 3197 bdrv_invalidate_cache(bs, &local_err);
ed78cda3 3198 aio_context_release(aio_context);
5a8a30db
KW
3199 if (local_err) {
3200 error_propagate(errp, local_err);
3201 return;
3202 }
0f15423c
AL
3203 }
3204}
3205
19cb3738
FB
3206/**************************************************************/
3207/* removable device support */
3208
3209/**
3210 * Return TRUE if the media is present
3211 */
3212int bdrv_is_inserted(BlockDriverState *bs)
3213{
3214 BlockDriver *drv = bs->drv;
a1aff5bf 3215
19cb3738
FB
3216 if (!drv)
3217 return 0;
3218 if (!drv->bdrv_is_inserted)
a1aff5bf
MA
3219 return 1;
3220 return drv->bdrv_is_inserted(bs);
19cb3738
FB
3221}
3222
3223/**
8e49ca46
MA
3224 * Return whether the media changed since the last call to this
3225 * function, or -ENOTSUP if we don't know. Most drivers don't know.
19cb3738
FB
3226 */
3227int bdrv_media_changed(BlockDriverState *bs)
3228{
3229 BlockDriver *drv = bs->drv;
19cb3738 3230
8e49ca46
MA
3231 if (drv && drv->bdrv_media_changed) {
3232 return drv->bdrv_media_changed(bs);
3233 }
3234 return -ENOTSUP;
19cb3738
FB
3235}
3236
3237/**
3238 * If eject_flag is TRUE, eject the media. Otherwise, close the tray
3239 */
f36f3949 3240void bdrv_eject(BlockDriverState *bs, bool eject_flag)
19cb3738
FB
3241{
3242 BlockDriver *drv = bs->drv;
bfb197e0 3243 const char *device_name;
19cb3738 3244
822e1cd1
MA
3245 if (drv && drv->bdrv_eject) {
3246 drv->bdrv_eject(bs, eject_flag);
19cb3738 3247 }
6f382ed2 3248
bfb197e0
MA
3249 device_name = bdrv_get_device_name(bs);
3250 if (device_name[0] != '\0') {
3251 qapi_event_send_device_tray_moved(device_name,
a5ee7bd4 3252 eject_flag, &error_abort);
6f382ed2 3253 }
19cb3738
FB
3254}
3255
19cb3738
FB
3256/**
3257 * Lock or unlock the media (if it is locked, the user won't be able
3258 * to eject it manually).
3259 */
025e849a 3260void bdrv_lock_medium(BlockDriverState *bs, bool locked)
19cb3738
FB
3261{
3262 BlockDriver *drv = bs->drv;
3263
025e849a 3264 trace_bdrv_lock_medium(bs, locked);
b8c6d095 3265
025e849a
MA
3266 if (drv && drv->bdrv_lock_medium) {
3267 drv->bdrv_lock_medium(bs, locked);
19cb3738
FB
3268 }
3269}
985a03b0 3270
1b7fd729 3271void bdrv_set_guest_block_size(BlockDriverState *bs, int align)
7b6f9300 3272{
1b7fd729 3273 bs->guest_block_size = align;
7b6f9300 3274}
7cd1e32a 3275
0db6e54a
FZ
3276BdrvDirtyBitmap *bdrv_find_dirty_bitmap(BlockDriverState *bs, const char *name)
3277{
3278 BdrvDirtyBitmap *bm;
3279
3280 assert(name);
3281 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
3282 if (bm->name && !strcmp(name, bm->name)) {
3283 return bm;
3284 }
3285 }
3286 return NULL;
3287}
3288
20dca810 3289void bdrv_dirty_bitmap_make_anon(BdrvDirtyBitmap *bitmap)
0db6e54a 3290{
9bd2b08f 3291 assert(!bdrv_dirty_bitmap_frozen(bitmap));
0db6e54a
FZ
3292 g_free(bitmap->name);
3293 bitmap->name = NULL;
3294}
3295
3296BdrvDirtyBitmap *bdrv_create_dirty_bitmap(BlockDriverState *bs,
5fba6c0e 3297 uint32_t granularity,
0db6e54a 3298 const char *name,
b8afb520 3299 Error **errp)
7cd1e32a
LS
3300{
3301 int64_t bitmap_size;
e4654d2d 3302 BdrvDirtyBitmap *bitmap;
5fba6c0e 3303 uint32_t sector_granularity;
a55eb92c 3304
50717e94
PB
3305 assert((granularity & (granularity - 1)) == 0);
3306
0db6e54a
FZ
3307 if (name && bdrv_find_dirty_bitmap(bs, name)) {
3308 error_setg(errp, "Bitmap already exists: %s", name);
3309 return NULL;
3310 }
5fba6c0e
JS
3311 sector_granularity = granularity >> BDRV_SECTOR_BITS;
3312 assert(sector_granularity);
57322b78 3313 bitmap_size = bdrv_nb_sectors(bs);
b8afb520
FZ
3314 if (bitmap_size < 0) {
3315 error_setg_errno(errp, -bitmap_size, "could not get length of device");
3316 errno = -bitmap_size;
3317 return NULL;
3318 }
5839e53b 3319 bitmap = g_new0(BdrvDirtyBitmap, 1);
5fba6c0e 3320 bitmap->bitmap = hbitmap_alloc(bitmap_size, ctz32(sector_granularity));
e74e6b78 3321 bitmap->size = bitmap_size;
0db6e54a 3322 bitmap->name = g_strdup(name);
b8e6fb75 3323 bitmap->disabled = false;
e4654d2d
FZ
3324 QLIST_INSERT_HEAD(&bs->dirty_bitmaps, bitmap, list);
3325 return bitmap;
3326}
3327
9bd2b08f
JS
3328bool bdrv_dirty_bitmap_frozen(BdrvDirtyBitmap *bitmap)
3329{
3330 return bitmap->successor;
3331}
3332
b8e6fb75
JS
3333bool bdrv_dirty_bitmap_enabled(BdrvDirtyBitmap *bitmap)
3334{
9bd2b08f
JS
3335 return !(bitmap->disabled || bitmap->successor);
3336}
3337
9abe3bdc
JS
3338DirtyBitmapStatus bdrv_dirty_bitmap_status(BdrvDirtyBitmap *bitmap)
3339{
3340 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3341 return DIRTY_BITMAP_STATUS_FROZEN;
3342 } else if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3343 return DIRTY_BITMAP_STATUS_DISABLED;
3344 } else {
3345 return DIRTY_BITMAP_STATUS_ACTIVE;
3346 }
3347}
3348
9bd2b08f
JS
3349/**
3350 * Create a successor bitmap destined to replace this bitmap after an operation.
3351 * Requires that the bitmap is not frozen and has no successor.
3352 */
3353int bdrv_dirty_bitmap_create_successor(BlockDriverState *bs,
3354 BdrvDirtyBitmap *bitmap, Error **errp)
3355{
3356 uint64_t granularity;
3357 BdrvDirtyBitmap *child;
3358
3359 if (bdrv_dirty_bitmap_frozen(bitmap)) {
3360 error_setg(errp, "Cannot create a successor for a bitmap that is "
3361 "currently frozen");
3362 return -1;
3363 }
3364 assert(!bitmap->successor);
3365
3366 /* Create an anonymous successor */
3367 granularity = bdrv_dirty_bitmap_granularity(bitmap);
3368 child = bdrv_create_dirty_bitmap(bs, granularity, NULL, errp);
3369 if (!child) {
3370 return -1;
3371 }
3372
3373 /* Successor will be on or off based on our current state. */
3374 child->disabled = bitmap->disabled;
3375
3376 /* Install the successor and freeze the parent */
3377 bitmap->successor = child;
3378 return 0;
3379}
3380
3381/**
3382 * For a bitmap with a successor, yield our name to the successor,
3383 * delete the old bitmap, and return a handle to the new bitmap.
3384 */
3385BdrvDirtyBitmap *bdrv_dirty_bitmap_abdicate(BlockDriverState *bs,
3386 BdrvDirtyBitmap *bitmap,
3387 Error **errp)
3388{
3389 char *name;
3390 BdrvDirtyBitmap *successor = bitmap->successor;
3391
3392 if (successor == NULL) {
3393 error_setg(errp, "Cannot relinquish control if "
3394 "there's no successor present");
3395 return NULL;
3396 }
3397
3398 name = bitmap->name;
3399 bitmap->name = NULL;
3400 successor->name = name;
3401 bitmap->successor = NULL;
3402 bdrv_release_dirty_bitmap(bs, bitmap);
3403
3404 return successor;
3405}
3406
3407/**
3408 * In cases of failure where we can no longer safely delete the parent,
3409 * we may wish to re-join the parent and child/successor.
3410 * The merged parent will be un-frozen, but not explicitly re-enabled.
3411 */
3412BdrvDirtyBitmap *bdrv_reclaim_dirty_bitmap(BlockDriverState *bs,
3413 BdrvDirtyBitmap *parent,
3414 Error **errp)
3415{
3416 BdrvDirtyBitmap *successor = parent->successor;
3417
3418 if (!successor) {
3419 error_setg(errp, "Cannot reclaim a successor when none is present");
3420 return NULL;
3421 }
3422
3423 if (!hbitmap_merge(parent->bitmap, successor->bitmap)) {
3424 error_setg(errp, "Merging of parent and successor bitmap failed");
3425 return NULL;
3426 }
3427 bdrv_release_dirty_bitmap(bs, successor);
3428 parent->successor = NULL;
3429
3430 return parent;
b8e6fb75
JS
3431}
3432
ce1ffea8
JS
3433/**
3434 * Truncates _all_ bitmaps attached to a BDS.
3435 */
3436static void bdrv_dirty_bitmap_truncate(BlockDriverState *bs)
3437{
3438 BdrvDirtyBitmap *bitmap;
3439 uint64_t size = bdrv_nb_sectors(bs);
3440
3441 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
06207b0f 3442 assert(!bdrv_dirty_bitmap_frozen(bitmap));
ce1ffea8 3443 hbitmap_truncate(bitmap->bitmap, size);
5270b6a0 3444 bitmap->size = size;
ce1ffea8
JS
3445 }
3446}
3447
e4654d2d
FZ
3448void bdrv_release_dirty_bitmap(BlockDriverState *bs, BdrvDirtyBitmap *bitmap)
3449{
3450 BdrvDirtyBitmap *bm, *next;
3451 QLIST_FOREACH_SAFE(bm, &bs->dirty_bitmaps, list, next) {
3452 if (bm == bitmap) {
9bd2b08f 3453 assert(!bdrv_dirty_bitmap_frozen(bm));
e4654d2d
FZ
3454 QLIST_REMOVE(bitmap, list);
3455 hbitmap_free(bitmap->bitmap);
0db6e54a 3456 g_free(bitmap->name);
e4654d2d
FZ
3457 g_free(bitmap);
3458 return;
a55eb92c 3459 }
7cd1e32a
LS
3460 }
3461}
3462
b8e6fb75
JS
3463void bdrv_disable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3464{
9bd2b08f 3465 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3466 bitmap->disabled = true;
3467}
3468
3469void bdrv_enable_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3470{
9bd2b08f 3471 assert(!bdrv_dirty_bitmap_frozen(bitmap));
b8e6fb75
JS
3472 bitmap->disabled = false;
3473}
3474
21b56835
FZ
3475BlockDirtyInfoList *bdrv_query_dirty_bitmaps(BlockDriverState *bs)
3476{
3477 BdrvDirtyBitmap *bm;
3478 BlockDirtyInfoList *list = NULL;
3479 BlockDirtyInfoList **plist = &list;
3480
3481 QLIST_FOREACH(bm, &bs->dirty_bitmaps, list) {
5839e53b
MA
3482 BlockDirtyInfo *info = g_new0(BlockDirtyInfo, 1);
3483 BlockDirtyInfoList *entry = g_new0(BlockDirtyInfoList, 1);
20dca810 3484 info->count = bdrv_get_dirty_count(bm);
592fdd02 3485 info->granularity = bdrv_dirty_bitmap_granularity(bm);
0db6e54a
FZ
3486 info->has_name = !!bm->name;
3487 info->name = g_strdup(bm->name);
9abe3bdc 3488 info->status = bdrv_dirty_bitmap_status(bm);
21b56835
FZ
3489 entry->value = info;
3490 *plist = entry;
3491 plist = &entry->next;
3492 }
3493
3494 return list;
3495}
3496
e4654d2d 3497int bdrv_get_dirty(BlockDriverState *bs, BdrvDirtyBitmap *bitmap, int64_t sector)
7cd1e32a 3498{
e4654d2d
FZ
3499 if (bitmap) {
3500 return hbitmap_get(bitmap->bitmap, sector);
7cd1e32a
LS
3501 } else {
3502 return 0;
3503 }
3504}
3505
341ebc2f
JS
3506/**
3507 * Chooses a default granularity based on the existing cluster size,
3508 * but clamped between [4K, 64K]. Defaults to 64K in the case that there
3509 * is no cluster size information available.
3510 */
3511uint32_t bdrv_get_default_bitmap_granularity(BlockDriverState *bs)
3512{
3513 BlockDriverInfo bdi;
3514 uint32_t granularity;
3515
3516 if (bdrv_get_info(bs, &bdi) >= 0 && bdi.cluster_size > 0) {
3517 granularity = MAX(4096, bdi.cluster_size);
3518 granularity = MIN(65536, granularity);
3519 } else {
3520 granularity = 65536;
3521 }
3522
3523 return granularity;
3524}
3525
592fdd02
JS
3526uint32_t bdrv_dirty_bitmap_granularity(BdrvDirtyBitmap *bitmap)
3527{
3528 return BDRV_SECTOR_SIZE << hbitmap_granularity(bitmap->bitmap);
3529}
3530
20dca810 3531void bdrv_dirty_iter_init(BdrvDirtyBitmap *bitmap, HBitmapIter *hbi)
1755da16 3532{
e4654d2d 3533 hbitmap_iter_init(hbi, bitmap->bitmap, 0);
1755da16
PB
3534}
3535
20dca810 3536void bdrv_set_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3537 int64_t cur_sector, int nr_sectors)
3538{
b8e6fb75 3539 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3540 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3541}
3542
20dca810 3543void bdrv_reset_dirty_bitmap(BdrvDirtyBitmap *bitmap,
c4237dfa
VSO
3544 int64_t cur_sector, int nr_sectors)
3545{
b8e6fb75 3546 assert(bdrv_dirty_bitmap_enabled(bitmap));
c4237dfa
VSO
3547 hbitmap_reset(bitmap->bitmap, cur_sector, nr_sectors);
3548}
3549
e74e6b78
JS
3550void bdrv_clear_dirty_bitmap(BdrvDirtyBitmap *bitmap)
3551{
3552 assert(bdrv_dirty_bitmap_enabled(bitmap));
c6a8c328 3553 hbitmap_reset_all(bitmap->bitmap);
e74e6b78
JS
3554}
3555
e0c47b6c
SH
3556void bdrv_set_dirty(BlockDriverState *bs, int64_t cur_sector,
3557 int nr_sectors)
1755da16 3558{
e4654d2d
FZ
3559 BdrvDirtyBitmap *bitmap;
3560 QLIST_FOREACH(bitmap, &bs->dirty_bitmaps, list) {
b8e6fb75
JS
3561 if (!bdrv_dirty_bitmap_enabled(bitmap)) {
3562 continue;
3563 }
e4654d2d
FZ
3564 hbitmap_set(bitmap->bitmap, cur_sector, nr_sectors);
3565 }
1755da16
PB
3566}
3567
d58d8453
JS
3568/**
3569 * Advance an HBitmapIter to an arbitrary offset.
3570 */
3571void bdrv_set_dirty_iter(HBitmapIter *hbi, int64_t offset)
3572{
3573 assert(hbi->hb);
3574 hbitmap_iter_init(hbi, hbi->hb, offset);
3575}
3576
20dca810 3577int64_t bdrv_get_dirty_count(BdrvDirtyBitmap *bitmap)
aaa0eb75 3578{
e4654d2d 3579 return hbitmap_count(bitmap->bitmap);
aaa0eb75 3580}
f88e1a42 3581
9fcb0251
FZ
3582/* Get a reference to bs */
3583void bdrv_ref(BlockDriverState *bs)
3584{
3585 bs->refcnt++;
3586}
3587
3588/* Release a previously grabbed reference to bs.
3589 * If after releasing, reference count is zero, the BlockDriverState is
3590 * deleted. */
3591void bdrv_unref(BlockDriverState *bs)
3592{
9a4d5ca6
JC
3593 if (!bs) {
3594 return;
3595 }
9fcb0251
FZ
3596 assert(bs->refcnt > 0);
3597 if (--bs->refcnt == 0) {
3598 bdrv_delete(bs);
3599 }
3600}
3601
fbe40ff7
FZ
3602struct BdrvOpBlocker {
3603 Error *reason;
3604 QLIST_ENTRY(BdrvOpBlocker) list;
3605};
3606
3607bool bdrv_op_is_blocked(BlockDriverState *bs, BlockOpType op, Error **errp)
3608{
3609 BdrvOpBlocker *blocker;
3610 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3611 if (!QLIST_EMPTY(&bs->op_blockers[op])) {
3612 blocker = QLIST_FIRST(&bs->op_blockers[op]);
3613 if (errp) {
81e5f78a
AG
3614 error_setg(errp, "Node '%s' is busy: %s",
3615 bdrv_get_device_or_node_name(bs),
bfb197e0 3616 error_get_pretty(blocker->reason));
fbe40ff7
FZ
3617 }
3618 return true;
3619 }
3620 return false;
3621}
3622
3623void bdrv_op_block(BlockDriverState *bs, BlockOpType op, Error *reason)
3624{
3625 BdrvOpBlocker *blocker;
3626 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3627
5839e53b 3628 blocker = g_new0(BdrvOpBlocker, 1);
fbe40ff7
FZ
3629 blocker->reason = reason;
3630 QLIST_INSERT_HEAD(&bs->op_blockers[op], blocker, list);
3631}
3632
3633void bdrv_op_unblock(BlockDriverState *bs, BlockOpType op, Error *reason)
3634{
3635 BdrvOpBlocker *blocker, *next;
3636 assert((int) op >= 0 && op < BLOCK_OP_TYPE_MAX);
3637 QLIST_FOREACH_SAFE(blocker, &bs->op_blockers[op], list, next) {
3638 if (blocker->reason == reason) {
3639 QLIST_REMOVE(blocker, list);
3640 g_free(blocker);
3641 }
3642 }
3643}
3644
3645void bdrv_op_block_all(BlockDriverState *bs, Error *reason)
3646{
3647 int i;
3648 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3649 bdrv_op_block(bs, i, reason);
3650 }
3651}
3652
3653void bdrv_op_unblock_all(BlockDriverState *bs, Error *reason)
3654{
3655 int i;
3656 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3657 bdrv_op_unblock(bs, i, reason);
3658 }
3659}
3660
3661bool bdrv_op_blocker_is_empty(BlockDriverState *bs)
3662{
3663 int i;
3664
3665 for (i = 0; i < BLOCK_OP_TYPE_MAX; i++) {
3666 if (!QLIST_EMPTY(&bs->op_blockers[i])) {
3667 return false;
3668 }
3669 }
3670 return true;
3671}
3672
28a7282a
LC
3673void bdrv_iostatus_enable(BlockDriverState *bs)
3674{
d6bf279e 3675 bs->iostatus_enabled = true;
58e21ef5 3676 bs->iostatus = BLOCK_DEVICE_IO_STATUS_OK;
28a7282a
LC
3677}
3678
3679/* The I/O status is only enabled if the drive explicitly
3680 * enables it _and_ the VM is configured to stop on errors */
3681bool bdrv_iostatus_is_enabled(const BlockDriverState *bs)
3682{
d6bf279e 3683 return (bs->iostatus_enabled &&
92aa5c6d
PB
3684 (bs->on_write_error == BLOCKDEV_ON_ERROR_ENOSPC ||
3685 bs->on_write_error == BLOCKDEV_ON_ERROR_STOP ||
3686 bs->on_read_error == BLOCKDEV_ON_ERROR_STOP));
28a7282a
LC
3687}
3688
3689void bdrv_iostatus_disable(BlockDriverState *bs)
3690{
d6bf279e 3691 bs->iostatus_enabled = false;
28a7282a
LC
3692}
3693
3694void bdrv_iostatus_reset(BlockDriverState *bs)
3695{
3696 if (bdrv_iostatus_is_enabled(bs)) {
58e21ef5 3697 bs->iostatus = BLOCK_DEVICE_IO_STATUS_OK;
3bd293c3
PB
3698 if (bs->job) {
3699 block_job_iostatus_reset(bs->job);
3700 }
28a7282a
LC
3701 }
3702}
3703
28a7282a
LC
3704void bdrv_iostatus_set_err(BlockDriverState *bs, int error)
3705{
3e1caa5f
PB
3706 assert(bdrv_iostatus_is_enabled(bs));
3707 if (bs->iostatus == BLOCK_DEVICE_IO_STATUS_OK) {
58e21ef5
LC
3708 bs->iostatus = error == ENOSPC ? BLOCK_DEVICE_IO_STATUS_NOSPACE :
3709 BLOCK_DEVICE_IO_STATUS_FAILED;
28a7282a
LC
3710 }
3711}
3712
d92ada22
LC
3713void bdrv_img_create(const char *filename, const char *fmt,
3714 const char *base_filename, const char *base_fmt,
f382d43a
MR
3715 char *options, uint64_t img_size, int flags,
3716 Error **errp, bool quiet)
f88e1a42 3717{
83d0521a
CL
3718 QemuOptsList *create_opts = NULL;
3719 QemuOpts *opts = NULL;
3720 const char *backing_fmt, *backing_file;
3721 int64_t size;
f88e1a42 3722 BlockDriver *drv, *proto_drv;
cc84d90f 3723 Error *local_err = NULL;
f88e1a42
JS
3724 int ret = 0;
3725
3726 /* Find driver and parse its options */
3727 drv = bdrv_find_format(fmt);
3728 if (!drv) {
71c79813 3729 error_setg(errp, "Unknown file format '%s'", fmt);
d92ada22 3730 return;
f88e1a42
JS
3731 }
3732
b65a5e12 3733 proto_drv = bdrv_find_protocol(filename, true, errp);
f88e1a42 3734 if (!proto_drv) {
d92ada22 3735 return;
f88e1a42
JS
3736 }
3737
c6149724
HR
3738 if (!drv->create_opts) {
3739 error_setg(errp, "Format driver '%s' does not support image creation",
3740 drv->format_name);
3741 return;
3742 }
3743
3744 if (!proto_drv->create_opts) {
3745 error_setg(errp, "Protocol driver '%s' does not support image creation",
3746 proto_drv->format_name);
3747 return;
3748 }
3749
c282e1fd
CL
3750 create_opts = qemu_opts_append(create_opts, drv->create_opts);
3751 create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
f88e1a42
JS
3752
3753 /* Create parameter list with default values */
83d0521a 3754 opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
39101f25 3755 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, img_size, &error_abort);
f88e1a42
JS
3756
3757 /* Parse -o options */
3758 if (options) {
dc523cd3
MA
3759 qemu_opts_do_parse(opts, options, NULL, &local_err);
3760 if (local_err) {
3761 error_report_err(local_err);
3762 local_err = NULL;
83d0521a 3763 error_setg(errp, "Invalid options for file format '%s'", fmt);
f88e1a42
JS
3764 goto out;
3765 }
3766 }
3767
3768 if (base_filename) {
f43e47db 3769 qemu_opt_set(opts, BLOCK_OPT_BACKING_FILE, base_filename, &local_err);
6be4194b 3770 if (local_err) {
71c79813
LC
3771 error_setg(errp, "Backing file not supported for file format '%s'",
3772 fmt);
f88e1a42
JS
3773 goto out;
3774 }
3775 }
3776
3777 if (base_fmt) {
f43e47db 3778 qemu_opt_set(opts, BLOCK_OPT_BACKING_FMT, base_fmt, &local_err);
6be4194b 3779 if (local_err) {
71c79813
LC
3780 error_setg(errp, "Backing file format not supported for file "
3781 "format '%s'", fmt);
f88e1a42
JS
3782 goto out;
3783 }
3784 }
3785
83d0521a
CL
3786 backing_file = qemu_opt_get(opts, BLOCK_OPT_BACKING_FILE);
3787 if (backing_file) {
3788 if (!strcmp(filename, backing_file)) {
71c79813
LC
3789 error_setg(errp, "Error: Trying to create an image with the "
3790 "same filename as the backing file");
792da93a
JS
3791 goto out;
3792 }
3793 }
3794
83d0521a 3795 backing_fmt = qemu_opt_get(opts, BLOCK_OPT_BACKING_FMT);
f88e1a42
JS
3796
3797 // The size for the image must always be specified, with one exception:
3798 // If we are using a backing file, we can obtain the size from there
83d0521a
CL
3799 size = qemu_opt_get_size(opts, BLOCK_OPT_SIZE, 0);
3800 if (size == -1) {
3801 if (backing_file) {
66f6b814 3802 BlockDriverState *bs;
29168018 3803 char *full_backing = g_new0(char, PATH_MAX);
52bf1e72 3804 int64_t size;
63090dac 3805 int back_flags;
e6641719 3806 QDict *backing_options = NULL;
63090dac 3807
29168018
HR
3808 bdrv_get_full_backing_filename_from_filename(filename, backing_file,
3809 full_backing, PATH_MAX,
3810 &local_err);
3811 if (local_err) {
3812 g_free(full_backing);
3813 goto out;
3814 }
3815
63090dac
PB
3816 /* backing files always opened read-only */
3817 back_flags =
3818 flags & ~(BDRV_O_RDWR | BDRV_O_SNAPSHOT | BDRV_O_NO_BACKING);
f88e1a42 3819
e6641719
HR
3820 if (backing_fmt) {
3821 backing_options = qdict_new();
3822 qdict_put(backing_options, "driver",
3823 qstring_from_str(backing_fmt));
3824 }
3825
f67503e5 3826 bs = NULL;
e6641719 3827 ret = bdrv_open(&bs, full_backing, NULL, backing_options,
6ebf9aa2 3828 back_flags, &local_err);
29168018 3829 g_free(full_backing);
f88e1a42 3830 if (ret < 0) {
f88e1a42
JS
3831 goto out;
3832 }
52bf1e72
MA
3833 size = bdrv_getlength(bs);
3834 if (size < 0) {
3835 error_setg_errno(errp, -size, "Could not get size of '%s'",
3836 backing_file);
3837 bdrv_unref(bs);
3838 goto out;
3839 }
f88e1a42 3840
39101f25 3841 qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
66f6b814
HR
3842
3843 bdrv_unref(bs);
f88e1a42 3844 } else {
71c79813 3845 error_setg(errp, "Image creation needs a size parameter");
f88e1a42
JS
3846 goto out;
3847 }
3848 }
3849
f382d43a 3850 if (!quiet) {
fe646693 3851 printf("Formatting '%s', fmt=%s ", filename, fmt);
43c5d8f8 3852 qemu_opts_print(opts, " ");
f382d43a
MR
3853 puts("");
3854 }
83d0521a 3855
c282e1fd 3856 ret = bdrv_create(drv, filename, opts, &local_err);
83d0521a 3857
cc84d90f
HR
3858 if (ret == -EFBIG) {
3859 /* This is generally a better message than whatever the driver would
3860 * deliver (especially because of the cluster_size_hint), since that
3861 * is most probably not much different from "image too large". */
3862 const char *cluster_size_hint = "";
83d0521a 3863 if (qemu_opt_get_size(opts, BLOCK_OPT_CLUSTER_SIZE, 0)) {
cc84d90f 3864 cluster_size_hint = " (try using a larger cluster size)";
f88e1a42 3865 }
cc84d90f
HR
3866 error_setg(errp, "The image size is too large for file format '%s'"
3867 "%s", fmt, cluster_size_hint);
3868 error_free(local_err);
3869 local_err = NULL;
f88e1a42
JS
3870 }
3871
3872out:
83d0521a
CL
3873 qemu_opts_del(opts);
3874 qemu_opts_free(create_opts);
84d18f06 3875 if (local_err) {
cc84d90f
HR
3876 error_propagate(errp, local_err);
3877 }
f88e1a42 3878}
85d126f3
SH
3879
3880AioContext *bdrv_get_aio_context(BlockDriverState *bs)
3881{
dcd04228
SH
3882 return bs->aio_context;
3883}
3884
3885void bdrv_detach_aio_context(BlockDriverState *bs)
3886{
33384421
HR
3887 BdrvAioNotifier *baf;
3888
dcd04228
SH
3889 if (!bs->drv) {
3890 return;
3891 }
3892
33384421
HR
3893 QLIST_FOREACH(baf, &bs->aio_notifiers, list) {
3894 baf->detach_aio_context(baf->opaque);
3895 }
3896
13af91eb 3897 if (bs->io_limits_enabled) {
0e5b0a2d 3898 throttle_timers_detach_aio_context(&bs->throttle_timers);
13af91eb 3899 }
dcd04228
SH
3900 if (bs->drv->bdrv_detach_aio_context) {
3901 bs->drv->bdrv_detach_aio_context(bs);
3902 }
3903 if (bs->file) {
9a4f4c31 3904 bdrv_detach_aio_context(bs->file->bs);
dcd04228
SH
3905 }
3906 if (bs->backing_hd) {
3907 bdrv_detach_aio_context(bs->backing_hd);
3908 }
3909
3910 bs->aio_context = NULL;
3911}
3912
3913void bdrv_attach_aio_context(BlockDriverState *bs,
3914 AioContext *new_context)
3915{
33384421
HR
3916 BdrvAioNotifier *ban;
3917
dcd04228
SH
3918 if (!bs->drv) {
3919 return;
3920 }
3921
3922 bs->aio_context = new_context;
3923
3924 if (bs->backing_hd) {
3925 bdrv_attach_aio_context(bs->backing_hd, new_context);
3926 }
3927 if (bs->file) {
9a4f4c31 3928 bdrv_attach_aio_context(bs->file->bs, new_context);
dcd04228
SH
3929 }
3930 if (bs->drv->bdrv_attach_aio_context) {
3931 bs->drv->bdrv_attach_aio_context(bs, new_context);
3932 }
13af91eb 3933 if (bs->io_limits_enabled) {
0e5b0a2d 3934 throttle_timers_attach_aio_context(&bs->throttle_timers, new_context);
13af91eb 3935 }
33384421
HR
3936
3937 QLIST_FOREACH(ban, &bs->aio_notifiers, list) {
3938 ban->attached_aio_context(new_context, ban->opaque);
3939 }
dcd04228
SH
3940}
3941
3942void bdrv_set_aio_context(BlockDriverState *bs, AioContext *new_context)
3943{
53ec73e2 3944 bdrv_drain(bs); /* ensure there are no in-flight requests */
dcd04228
SH
3945
3946 bdrv_detach_aio_context(bs);
3947
3948 /* This function executes in the old AioContext so acquire the new one in
3949 * case it runs in a different thread.
3950 */
3951 aio_context_acquire(new_context);
3952 bdrv_attach_aio_context(bs, new_context);
3953 aio_context_release(new_context);
85d126f3 3954}
d616b224 3955
33384421
HR
3956void bdrv_add_aio_context_notifier(BlockDriverState *bs,
3957 void (*attached_aio_context)(AioContext *new_context, void *opaque),
3958 void (*detach_aio_context)(void *opaque), void *opaque)
3959{
3960 BdrvAioNotifier *ban = g_new(BdrvAioNotifier, 1);
3961 *ban = (BdrvAioNotifier){
3962 .attached_aio_context = attached_aio_context,
3963 .detach_aio_context = detach_aio_context,
3964 .opaque = opaque
3965 };
3966
3967 QLIST_INSERT_HEAD(&bs->aio_notifiers, ban, list);
3968}
3969
3970void bdrv_remove_aio_context_notifier(BlockDriverState *bs,
3971 void (*attached_aio_context)(AioContext *,
3972 void *),
3973 void (*detach_aio_context)(void *),
3974 void *opaque)
3975{
3976 BdrvAioNotifier *ban, *ban_next;
3977
3978 QLIST_FOREACH_SAFE(ban, &bs->aio_notifiers, list, ban_next) {
3979 if (ban->attached_aio_context == attached_aio_context &&
3980 ban->detach_aio_context == detach_aio_context &&
3981 ban->opaque == opaque)
3982 {
3983 QLIST_REMOVE(ban, list);
3984 g_free(ban);
3985
3986 return;
3987 }
3988 }
3989
3990 abort();
3991}
3992
77485434
HR
3993int bdrv_amend_options(BlockDriverState *bs, QemuOpts *opts,
3994 BlockDriverAmendStatusCB *status_cb)
6f176b48 3995{
c282e1fd 3996 if (!bs->drv->bdrv_amend_options) {
6f176b48
HR
3997 return -ENOTSUP;
3998 }
77485434 3999 return bs->drv->bdrv_amend_options(bs, opts, status_cb);
6f176b48 4000}
f6186f49 4001
b5042a36
BC
4002/* This function will be called by the bdrv_recurse_is_first_non_filter method
4003 * of block filter and by bdrv_is_first_non_filter.
4004 * It is used to test if the given bs is the candidate or recurse more in the
4005 * node graph.
212a5a8f 4006 */
b5042a36 4007bool bdrv_recurse_is_first_non_filter(BlockDriverState *bs,
212a5a8f 4008 BlockDriverState *candidate)
f6186f49 4009{
b5042a36
BC
4010 /* return false if basic checks fails */
4011 if (!bs || !bs->drv) {
212a5a8f 4012 return false;
f6186f49
BC
4013 }
4014
b5042a36
BC
4015 /* the code reached a non block filter driver -> check if the bs is
4016 * the same as the candidate. It's the recursion termination condition.
4017 */
4018 if (!bs->drv->is_filter) {
4019 return bs == candidate;
212a5a8f 4020 }
b5042a36 4021 /* Down this path the driver is a block filter driver */
212a5a8f 4022
b5042a36
BC
4023 /* If the block filter recursion method is defined use it to recurse down
4024 * the node graph.
4025 */
4026 if (bs->drv->bdrv_recurse_is_first_non_filter) {
212a5a8f 4027 return bs->drv->bdrv_recurse_is_first_non_filter(bs, candidate);
f6186f49
BC
4028 }
4029
b5042a36
BC
4030 /* the driver is a block filter but don't allow to recurse -> return false
4031 */
4032 return false;
f6186f49
BC
4033}
4034
212a5a8f
BC
4035/* This function checks if the candidate is the first non filter bs down it's
4036 * bs chain. Since we don't have pointers to parents it explore all bs chains
4037 * from the top. Some filters can choose not to pass down the recursion.
4038 */
4039bool bdrv_is_first_non_filter(BlockDriverState *candidate)
f6186f49 4040{
212a5a8f
BC
4041 BlockDriverState *bs;
4042
4043 /* walk down the bs forest recursively */
4044 QTAILQ_FOREACH(bs, &bdrv_states, device_list) {
4045 bool perm;
4046
b5042a36 4047 /* try to recurse in this top level bs */
e6dc8a1f 4048 perm = bdrv_recurse_is_first_non_filter(bs, candidate);
212a5a8f
BC
4049
4050 /* candidate is the first non filter */
4051 if (perm) {
4052 return true;
4053 }
4054 }
4055
4056 return false;
f6186f49 4057}
09158f00 4058
e12f3784
WC
4059BlockDriverState *check_to_replace_node(BlockDriverState *parent_bs,
4060 const char *node_name, Error **errp)
09158f00
BC
4061{
4062 BlockDriverState *to_replace_bs = bdrv_find_node(node_name);
5a7e7a0b
SH
4063 AioContext *aio_context;
4064
09158f00
BC
4065 if (!to_replace_bs) {
4066 error_setg(errp, "Node name '%s' not found", node_name);
4067 return NULL;
4068 }
4069
5a7e7a0b
SH
4070 aio_context = bdrv_get_aio_context(to_replace_bs);
4071 aio_context_acquire(aio_context);
4072
09158f00 4073 if (bdrv_op_is_blocked(to_replace_bs, BLOCK_OP_TYPE_REPLACE, errp)) {
5a7e7a0b
SH
4074 to_replace_bs = NULL;
4075 goto out;
09158f00
BC
4076 }
4077
4078 /* We don't want arbitrary node of the BDS chain to be replaced only the top
4079 * most non filter in order to prevent data corruption.
4080 * Another benefit is that this tests exclude backing files which are
4081 * blocked by the backing blockers.
4082 */
e12f3784 4083 if (!bdrv_recurse_is_first_non_filter(parent_bs, to_replace_bs)) {
09158f00 4084 error_setg(errp, "Only top most non filter can be replaced");
5a7e7a0b
SH
4085 to_replace_bs = NULL;
4086 goto out;
09158f00
BC
4087 }
4088
5a7e7a0b
SH
4089out:
4090 aio_context_release(aio_context);
09158f00
BC
4091 return to_replace_bs;
4092}
448ad91d 4093
91af7014
HR
4094static bool append_open_options(QDict *d, BlockDriverState *bs)
4095{
4096 const QDictEntry *entry;
4097 bool found_any = false;
4098
4099 for (entry = qdict_first(bs->options); entry;
4100 entry = qdict_next(bs->options, entry))
4101 {
4102 /* Only take options for this level and exclude all non-driver-specific
4103 * options */
4104 if (!strchr(qdict_entry_key(entry), '.') &&
4105 strcmp(qdict_entry_key(entry), "node-name"))
4106 {
4107 qobject_incref(qdict_entry_value(entry));
4108 qdict_put_obj(d, qdict_entry_key(entry), qdict_entry_value(entry));
4109 found_any = true;
4110 }
4111 }
4112
4113 return found_any;
4114}
4115
4116/* Updates the following BDS fields:
4117 * - exact_filename: A filename which may be used for opening a block device
4118 * which (mostly) equals the given BDS (even without any
4119 * other options; so reading and writing must return the same
4120 * results, but caching etc. may be different)
4121 * - full_open_options: Options which, when given when opening a block device
4122 * (without a filename), result in a BDS (mostly)
4123 * equalling the given one
4124 * - filename: If exact_filename is set, it is copied here. Otherwise,
4125 * full_open_options is converted to a JSON object, prefixed with
4126 * "json:" (for use through the JSON pseudo protocol) and put here.
4127 */
4128void bdrv_refresh_filename(BlockDriverState *bs)
4129{
4130 BlockDriver *drv = bs->drv;
4131 QDict *opts;
4132
4133 if (!drv) {
4134 return;
4135 }
4136
4137 /* This BDS's file name will most probably depend on its file's name, so
4138 * refresh that first */
4139 if (bs->file) {
9a4f4c31 4140 bdrv_refresh_filename(bs->file->bs);
91af7014
HR
4141 }
4142
4143 if (drv->bdrv_refresh_filename) {
4144 /* Obsolete information is of no use here, so drop the old file name
4145 * information before refreshing it */
4146 bs->exact_filename[0] = '\0';
4147 if (bs->full_open_options) {
4148 QDECREF(bs->full_open_options);
4149 bs->full_open_options = NULL;
4150 }
4151
4152 drv->bdrv_refresh_filename(bs);
4153 } else if (bs->file) {
4154 /* Try to reconstruct valid information from the underlying file */
4155 bool has_open_options;
4156
4157 bs->exact_filename[0] = '\0';
4158 if (bs->full_open_options) {
4159 QDECREF(bs->full_open_options);
4160 bs->full_open_options = NULL;
4161 }
4162
4163 opts = qdict_new();
4164 has_open_options = append_open_options(opts, bs);
4165
4166 /* If no specific options have been given for this BDS, the filename of
4167 * the underlying file should suffice for this one as well */
9a4f4c31
KW
4168 if (bs->file->bs->exact_filename[0] && !has_open_options) {
4169 strcpy(bs->exact_filename, bs->file->bs->exact_filename);
91af7014
HR
4170 }
4171 /* Reconstructing the full options QDict is simple for most format block
4172 * drivers, as long as the full options are known for the underlying
4173 * file BDS. The full options QDict of that file BDS should somehow
4174 * contain a representation of the filename, therefore the following
4175 * suffices without querying the (exact_)filename of this BDS. */
9a4f4c31 4176 if (bs->file->bs->full_open_options) {
91af7014
HR
4177 qdict_put_obj(opts, "driver",
4178 QOBJECT(qstring_from_str(drv->format_name)));
9a4f4c31
KW
4179 QINCREF(bs->file->bs->full_open_options);
4180 qdict_put_obj(opts, "file",
4181 QOBJECT(bs->file->bs->full_open_options));
91af7014
HR
4182
4183 bs->full_open_options = opts;
4184 } else {
4185 QDECREF(opts);
4186 }
4187 } else if (!bs->full_open_options && qdict_size(bs->options)) {
4188 /* There is no underlying file BDS (at least referenced by BDS.file),
4189 * so the full options QDict should be equal to the options given
4190 * specifically for this block device when it was opened (plus the
4191 * driver specification).
4192 * Because those options don't change, there is no need to update
4193 * full_open_options when it's already set. */
4194
4195 opts = qdict_new();
4196 append_open_options(opts, bs);
4197 qdict_put_obj(opts, "driver",
4198 QOBJECT(qstring_from_str(drv->format_name)));
4199
4200 if (bs->exact_filename[0]) {
4201 /* This may not work for all block protocol drivers (some may
4202 * require this filename to be parsed), but we have to find some
4203 * default solution here, so just include it. If some block driver
4204 * does not support pure options without any filename at all or
4205 * needs some special format of the options QDict, it needs to
4206 * implement the driver-specific bdrv_refresh_filename() function.
4207 */
4208 qdict_put_obj(opts, "filename",
4209 QOBJECT(qstring_from_str(bs->exact_filename)));
4210 }
4211
4212 bs->full_open_options = opts;
4213 }
4214
4215 if (bs->exact_filename[0]) {
4216 pstrcpy(bs->filename, sizeof(bs->filename), bs->exact_filename);
4217 } else if (bs->full_open_options) {
4218 QString *json = qobject_to_json(QOBJECT(bs->full_open_options));
4219 snprintf(bs->filename, sizeof(bs->filename), "json:%s",
4220 qstring_get_str(json));
4221 QDECREF(json);
4222 }
4223}
5366d0c8
BC
4224
4225/* This accessor function purpose is to allow the device models to access the
4226 * BlockAcctStats structure embedded inside a BlockDriverState without being
4227 * aware of the BlockDriverState structure layout.
4228 * It will go away when the BlockAcctStats structure will be moved inside
4229 * the device models.
4230 */
4231BlockAcctStats *bdrv_get_stats(BlockDriverState *bs)
4232{
4233 return &bs->stats;
4234}