]> git.proxmox.com Git - qemu.git/blame - qemu-img.c
qapi: modify visitor code generation for list iteration
[qemu.git] / qemu-img.c
CommitLineData
ea2384d3 1/*
fb43f4dd 2 * QEMU disk image utility
5fafdf24 3 *
68d0f70e 4 * Copyright (c) 2003-2008 Fabrice Bellard
5fafdf24 5 *
ea2384d3
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
faf07963 24#include "qemu-common.h"
9ea2ea71 25#include "qemu-option.h"
53f76e58 26#include "qemu-error.h"
f7b4a940 27#include "osdep.h"
dc786bc9 28#include "sysemu.h"
ec36ba14 29#include "block_int.h"
9230eaf6 30#include <stdio.h>
ea2384d3 31
e8445331
FB
32#ifdef _WIN32
33#include <windows.h>
34#endif
35
c227f099 36typedef struct img_cmd_t {
153859be
SB
37 const char *name;
38 int (*handler)(int argc, char **argv);
c227f099 39} img_cmd_t;
153859be 40
137519ce 41/* Default to cache=writeback as data integrity is not important for qemu-tcg. */
adfe078e 42#define BDRV_O_FLAGS BDRV_O_CACHE_WB
661a0f71 43#define BDRV_DEFAULT_CACHE "writeback"
137519ce 44
ea2384d3
FB
45static void format_print(void *opaque, const char *name)
46{
47 printf(" %s", name);
48}
49
d2c639d6 50/* Please keep in synch with qemu-img.texi */
3f379ab1 51static void help(void)
ea2384d3 52{
e00291c0
PB
53 const char *help_msg =
54 "qemu-img version " QEMU_VERSION ", Copyright (c) 2004-2008 Fabrice Bellard\n"
3f020d70 55 "usage: qemu-img command [command options]\n"
56 "QEMU disk image utility\n"
57 "\n"
58 "Command syntax:\n"
153859be
SB
59#define DEF(option, callback, arg_string) \
60 " " arg_string "\n"
61#include "qemu-img-cmds.h"
62#undef DEF
63#undef GEN_DOCS
3f020d70 64 "\n"
65 "Command parameters:\n"
66 " 'filename' is a disk image filename\n"
67 " 'fmt' is the disk image format. It is guessed automatically in most cases\n"
661a0f71 68 " 'cache' is the cache mode used to write the output disk image, the valid\n"
92196b2f
SH
69 " options are: 'none', 'writeback' (default), 'writethrough', 'directsync'\n"
70 " and 'unsafe'\n"
3f020d70 71 " 'size' is the disk image size in bytes. Optional suffixes\n"
72 " 'k' or 'K' (kilobyte, 1024), 'M' (megabyte, 1024k), 'G' (gigabyte, 1024M)\n"
73 " and T (terabyte, 1024G) are supported. 'b' is ignored.\n"
74 " 'output_filename' is the destination disk image filename\n"
75 " 'output_fmt' is the destination format\n"
76 " 'options' is a comma separated list of format specific options in a\n"
77 " name=value format. Use -o ? for an overview of the options supported by the\n"
78 " used format\n"
79 " '-c' indicates that target image must be compressed (qcow format only)\n"
80 " '-u' enables unsafe rebasing. It is assumed that old and new backing file\n"
81 " match exactly. The image doesn't need a working backing file before\n"
82 " rebasing in this case (useful for renaming the backing file)\n"
83 " '-h' with or without a command shows this help and lists the supported formats\n"
6b837bc4 84 " '-p' show progress of command (only certain commands)\n"
a22f123c
KW
85 " '-S' indicates the consecutive number of bytes that must contain only zeros\n"
86 " for qemu-img to create a sparse image during conversion\n"
3f020d70 87 "\n"
88 "Parameters to snapshot subcommand:\n"
89 " 'snapshot' is the name of the snapshot to create, apply or delete\n"
90 " '-a' applies a snapshot (revert disk to saved state)\n"
91 " '-c' creates a snapshot\n"
92 " '-d' deletes a snapshot\n"
e00291c0
PB
93 " '-l' lists all snapshots in the given image\n";
94
95 printf("%s\nSupported formats:", help_msg);
ea2384d3
FB
96 bdrv_iterate_format(format_print, NULL);
97 printf("\n");
98 exit(1);
99}
100
ea2384d3
FB
101#if defined(WIN32)
102/* XXX: put correct support for win32 */
103static int read_password(char *buf, int buf_size)
104{
105 int c, i;
106 printf("Password: ");
107 fflush(stdout);
108 i = 0;
109 for(;;) {
110 c = getchar();
111 if (c == '\n')
112 break;
113 if (i < (buf_size - 1))
114 buf[i++] = c;
115 }
116 buf[i] = '\0';
117 return 0;
118}
119
120#else
121
122#include <termios.h>
123
124static struct termios oldtty;
125
126static void term_exit(void)
127{
128 tcsetattr (0, TCSANOW, &oldtty);
129}
130
131static void term_init(void)
132{
133 struct termios tty;
134
135 tcgetattr (0, &tty);
136 oldtty = tty;
137
138 tty.c_iflag &= ~(IGNBRK|BRKINT|PARMRK|ISTRIP
139 |INLCR|IGNCR|ICRNL|IXON);
140 tty.c_oflag |= OPOST;
141 tty.c_lflag &= ~(ECHO|ECHONL|ICANON|IEXTEN);
142 tty.c_cflag &= ~(CSIZE|PARENB);
143 tty.c_cflag |= CS8;
144 tty.c_cc[VMIN] = 1;
145 tty.c_cc[VTIME] = 0;
3b46e624 146
ea2384d3
FB
147 tcsetattr (0, TCSANOW, &tty);
148
149 atexit(term_exit);
150}
151
3f379ab1 152static int read_password(char *buf, int buf_size)
ea2384d3
FB
153{
154 uint8_t ch;
155 int i, ret;
156
157 printf("password: ");
158 fflush(stdout);
159 term_init();
160 i = 0;
161 for(;;) {
162 ret = read(0, &ch, 1);
163 if (ret == -1) {
164 if (errno == EAGAIN || errno == EINTR) {
165 continue;
166 } else {
167 ret = -1;
168 break;
169 }
170 } else if (ret == 0) {
171 ret = -1;
172 break;
173 } else {
174 if (ch == '\r') {
175 ret = 0;
176 break;
177 }
178 if (i < (buf_size - 1))
179 buf[i++] = ch;
180 }
181 }
182 term_exit();
183 buf[i] = '\0';
184 printf("\n");
185 return ret;
186}
187#endif
188
4ac8aacd
JS
189static int print_block_option_help(const char *filename, const char *fmt)
190{
191 BlockDriver *drv, *proto_drv;
192 QEMUOptionParameter *create_options = NULL;
193
194 /* Find driver and parse its options */
195 drv = bdrv_find_format(fmt);
196 if (!drv) {
15654a6d 197 error_report("Unknown file format '%s'", fmt);
4ac8aacd
JS
198 return 1;
199 }
200
201 proto_drv = bdrv_find_protocol(filename);
202 if (!proto_drv) {
15654a6d 203 error_report("Unknown protocol '%s'", filename);
4ac8aacd
JS
204 return 1;
205 }
206
207 create_options = append_option_parameters(create_options,
208 drv->create_options);
209 create_options = append_option_parameters(create_options,
210 proto_drv->create_options);
211 print_option_help(create_options);
212 free_option_parameters(create_options);
213 return 0;
214}
215
75c23805 216static BlockDriverState *bdrv_new_open(const char *filename,
9bc378c1 217 const char *fmt,
f163d073 218 int flags)
75c23805
FB
219{
220 BlockDriverState *bs;
221 BlockDriver *drv;
222 char password[256];
b9eaf9ec 223 int ret;
75c23805 224
b9eaf9ec 225 bs = bdrv_new("image");
ad717139 226
75c23805
FB
227 if (fmt) {
228 drv = bdrv_find_format(fmt);
c2abccec 229 if (!drv) {
15654a6d 230 error_report("Unknown file format '%s'", fmt);
c2abccec
MK
231 goto fail;
232 }
75c23805
FB
233 } else {
234 drv = NULL;
235 }
b9eaf9ec
KW
236
237 ret = bdrv_open(bs, filename, flags, drv);
238 if (ret < 0) {
239 error_report("Could not open '%s': %s", filename, strerror(-ret));
c2abccec 240 goto fail;
75c23805 241 }
b9eaf9ec 242
75c23805
FB
243 if (bdrv_is_encrypted(bs)) {
244 printf("Disk image '%s' is encrypted.\n", filename);
c2abccec 245 if (read_password(password, sizeof(password)) < 0) {
15654a6d 246 error_report("No password given");
c2abccec
MK
247 goto fail;
248 }
249 if (bdrv_set_key(bs, password) < 0) {
15654a6d 250 error_report("invalid password");
c2abccec
MK
251 goto fail;
252 }
75c23805
FB
253 }
254 return bs;
c2abccec
MK
255fail:
256 if (bs) {
257 bdrv_delete(bs);
258 }
259 return NULL;
75c23805
FB
260}
261
c2abccec 262static int add_old_style_options(const char *fmt, QEMUOptionParameter *list,
eec77d9e
JS
263 const char *base_filename,
264 const char *base_fmt)
efa84d43 265{
efa84d43
KW
266 if (base_filename) {
267 if (set_option_parameter(list, BLOCK_OPT_BACKING_FILE, base_filename)) {
15654a6d
JS
268 error_report("Backing file not supported for file format '%s'",
269 fmt);
c2abccec 270 return -1;
efa84d43
KW
271 }
272 }
273 if (base_fmt) {
274 if (set_option_parameter(list, BLOCK_OPT_BACKING_FMT, base_fmt)) {
15654a6d
JS
275 error_report("Backing file format not supported for file "
276 "format '%s'", fmt);
c2abccec 277 return -1;
efa84d43
KW
278 }
279 }
c2abccec 280 return 0;
efa84d43
KW
281}
282
ea2384d3
FB
283static int img_create(int argc, char **argv)
284{
eec77d9e 285 int c, ret = 0;
1da7cfbd 286 uint64_t img_size = -1;
ea2384d3 287 const char *fmt = "raw";
9230eaf6 288 const char *base_fmt = NULL;
ea2384d3
FB
289 const char *filename;
290 const char *base_filename = NULL;
9ea2ea71 291 char *options = NULL;
3b46e624 292
ea2384d3 293 for(;;) {
9ea2ea71 294 c = getopt(argc, argv, "F:b:f:he6o:");
b8fb60da 295 if (c == -1) {
ea2384d3 296 break;
b8fb60da 297 }
ea2384d3 298 switch(c) {
ef87394c 299 case '?':
ea2384d3
FB
300 case 'h':
301 help();
302 break;
9230eaf6
AL
303 case 'F':
304 base_fmt = optarg;
305 break;
ea2384d3
FB
306 case 'b':
307 base_filename = optarg;
308 break;
309 case 'f':
310 fmt = optarg;
311 break;
312 case 'e':
9d42e15d 313 error_report("option -e is deprecated, please use \'-o "
eec77d9e
JS
314 "encryption\' instead!");
315 return 1;
d8871c5a 316 case '6':
9d42e15d 317 error_report("option -6 is deprecated, please use \'-o "
eec77d9e
JS
318 "compat6\' instead!");
319 return 1;
9ea2ea71
KW
320 case 'o':
321 options = optarg;
322 break;
ea2384d3
FB
323 }
324 }
9230eaf6 325
b50cbabc 326 /* Get the filename */
b8fb60da 327 if (optind >= argc) {
b50cbabc 328 help();
b8fb60da 329 }
b50cbabc
MK
330 filename = argv[optind++];
331
1da7cfbd
JS
332 /* Get image size, if specified */
333 if (optind < argc) {
70b4f4bb 334 int64_t sval;
1da7cfbd
JS
335 sval = strtosz_suffix(argv[optind++], NULL, STRTOSZ_DEFSUFFIX_B);
336 if (sval < 0) {
15654a6d 337 error_report("Invalid image size specified! You may use k, M, G or "
1da7cfbd 338 "T suffixes for ");
15654a6d 339 error_report("kilobytes, megabytes, gigabytes and terabytes.");
1da7cfbd
JS
340 ret = -1;
341 goto out;
342 }
343 img_size = (uint64_t)sval;
344 }
345
4ac8aacd
JS
346 if (options && !strcmp(options, "?")) {
347 ret = print_block_option_help(filename, fmt);
348 goto out;
349 }
350
f88e1a42
JS
351 ret = bdrv_img_create(filename, fmt, base_filename, base_fmt,
352 options, img_size, BDRV_O_FLAGS);
c2abccec
MK
353out:
354 if (ret) {
355 return 1;
356 }
ea2384d3
FB
357 return 0;
358}
359
e076f338
KW
360/*
361 * Checks an image for consistency. Exit codes:
362 *
363 * 0 - Check completed, image is good
364 * 1 - Check not completed because of internal errors
365 * 2 - Check completed, image is corrupted
366 * 3 - Check completed, image has leaked clusters, but is good otherwise
367 */
1585969c
AL
368static int img_check(int argc, char **argv)
369{
370 int c, ret;
371 const char *filename, *fmt;
1585969c 372 BlockDriverState *bs;
e076f338 373 BdrvCheckResult result;
1585969c
AL
374
375 fmt = NULL;
376 for(;;) {
377 c = getopt(argc, argv, "f:h");
b8fb60da 378 if (c == -1) {
1585969c 379 break;
b8fb60da 380 }
1585969c 381 switch(c) {
ef87394c 382 case '?':
1585969c
AL
383 case 'h':
384 help();
385 break;
386 case 'f':
387 fmt = optarg;
388 break;
389 }
390 }
b8fb60da 391 if (optind >= argc) {
1585969c 392 help();
b8fb60da 393 }
1585969c
AL
394 filename = argv[optind++];
395
adfe078e 396 bs = bdrv_new_open(filename, fmt, BDRV_O_FLAGS);
c2abccec
MK
397 if (!bs) {
398 return 1;
399 }
e076f338
KW
400 ret = bdrv_check(bs, &result);
401
402 if (ret == -ENOTSUP) {
15654a6d 403 error_report("This image format does not support checks");
e076f338
KW
404 bdrv_delete(bs);
405 return 1;
406 }
407
408 if (!(result.corruptions || result.leaks || result.check_errors)) {
409 printf("No errors were found on the image.\n");
410 } else {
411 if (result.corruptions) {
412 printf("\n%d errors were found on the image.\n"
413 "Data may be corrupted, or further writes to the image "
414 "may corrupt it.\n",
415 result.corruptions);
416 }
417
418 if (result.leaks) {
419 printf("\n%d leaked clusters were found on the image.\n"
420 "This means waste of disk space, but no harm to data.\n",
421 result.leaks);
422 }
423
424 if (result.check_errors) {
425 printf("\n%d internal errors have occurred during the check.\n",
426 result.check_errors);
1585969c 427 }
1585969c
AL
428 }
429
430 bdrv_delete(bs);
e076f338
KW
431
432 if (ret < 0 || result.check_errors) {
433 printf("\nAn error has occurred during the check: %s\n"
434 "The check is not complete and may have missed error.\n",
435 strerror(-ret));
c2abccec
MK
436 return 1;
437 }
e076f338
KW
438
439 if (result.corruptions) {
440 return 2;
441 } else if (result.leaks) {
442 return 3;
443 } else {
444 return 0;
445 }
1585969c
AL
446}
447
ea2384d3
FB
448static int img_commit(int argc, char **argv)
449{
661a0f71
FS
450 int c, ret, flags;
451 const char *filename, *fmt, *cache;
ea2384d3
FB
452 BlockDriverState *bs;
453
454 fmt = NULL;
661a0f71 455 cache = BDRV_DEFAULT_CACHE;
ea2384d3 456 for(;;) {
661a0f71 457 c = getopt(argc, argv, "f:ht:");
b8fb60da 458 if (c == -1) {
ea2384d3 459 break;
b8fb60da 460 }
ea2384d3 461 switch(c) {
ef87394c 462 case '?':
ea2384d3
FB
463 case 'h':
464 help();
465 break;
466 case 'f':
467 fmt = optarg;
468 break;
661a0f71
FS
469 case 't':
470 cache = optarg;
471 break;
ea2384d3
FB
472 }
473 }
b8fb60da 474 if (optind >= argc) {
ea2384d3 475 help();
b8fb60da 476 }
ea2384d3
FB
477 filename = argv[optind++];
478
661a0f71 479 flags = BDRV_O_RDWR;
c3993cdc 480 ret = bdrv_parse_cache_flags(cache, &flags);
661a0f71
FS
481 if (ret < 0) {
482 error_report("Invalid cache option: %s", cache);
483 return -1;
484 }
485
486 bs = bdrv_new_open(filename, fmt, flags);
c2abccec
MK
487 if (!bs) {
488 return 1;
489 }
ea2384d3
FB
490 ret = bdrv_commit(bs);
491 switch(ret) {
492 case 0:
493 printf("Image committed.\n");
494 break;
495 case -ENOENT:
15654a6d 496 error_report("No disk inserted");
ea2384d3
FB
497 break;
498 case -EACCES:
15654a6d 499 error_report("Image is read-only");
ea2384d3
FB
500 break;
501 case -ENOTSUP:
15654a6d 502 error_report("Image is already committed");
ea2384d3
FB
503 break;
504 default:
15654a6d 505 error_report("Error while committing image");
ea2384d3
FB
506 break;
507 }
508
509 bdrv_delete(bs);
c2abccec
MK
510 if (ret) {
511 return 1;
512 }
ea2384d3
FB
513 return 0;
514}
515
f6a00aa1
DK
516/*
517 * Checks whether the sector is not a zero sector.
518 *
519 * Attention! The len must be a multiple of 4 * sizeof(long) due to
520 * restriction of optimizations in this function.
521 */
ea2384d3
FB
522static int is_not_zero(const uint8_t *sector, int len)
523{
f6a00aa1
DK
524 /*
525 * Use long as the biggest available internal data type that fits into the
526 * CPU register and unroll the loop to smooth out the effect of memory
527 * latency.
528 */
529
ea2384d3 530 int i;
f6a00aa1
DK
531 long d0, d1, d2, d3;
532 const long * const data = (const long *) sector;
533
534 len /= sizeof(long);
535
536 for(i = 0; i < len; i += 4) {
537 d0 = data[i + 0];
538 d1 = data[i + 1];
539 d2 = data[i + 2];
540 d3 = data[i + 3];
541
542 if (d0 || d1 || d2 || d3) {
ea2384d3 543 return 1;
f6a00aa1 544 }
ea2384d3 545 }
f6a00aa1 546
ea2384d3
FB
547 return 0;
548}
549
f58c7b35
TS
550/*
551 * Returns true iff the first sector pointed to by 'buf' contains at least
552 * a non-NUL byte.
553 *
554 * 'pnum' is set to the number of sectors (including and immediately following
555 * the first one) that are known to be in the same allocated/unallocated state.
556 */
ea2384d3
FB
557static int is_allocated_sectors(const uint8_t *buf, int n, int *pnum)
558{
559 int v, i;
560
561 if (n <= 0) {
562 *pnum = 0;
563 return 0;
564 }
565 v = is_not_zero(buf, 512);
566 for(i = 1; i < n; i++) {
567 buf += 512;
568 if (v != is_not_zero(buf, 512))
569 break;
570 }
571 *pnum = i;
572 return v;
573}
574
a22f123c
KW
575/*
576 * Like is_allocated_sectors, but if the buffer starts with a used sector,
577 * up to 'min' consecutive sectors containing zeros are ignored. This avoids
578 * breaking up write requests for only small sparse areas.
579 */
580static int is_allocated_sectors_min(const uint8_t *buf, int n, int *pnum,
581 int min)
582{
583 int ret;
584 int num_checked, num_used;
585
586 if (n < min) {
587 min = n;
588 }
589
590 ret = is_allocated_sectors(buf, n, pnum);
591 if (!ret) {
592 return ret;
593 }
594
595 num_used = *pnum;
596 buf += BDRV_SECTOR_SIZE * *pnum;
597 n -= *pnum;
598 num_checked = num_used;
599
600 while (n > 0) {
601 ret = is_allocated_sectors(buf, n, pnum);
602
603 buf += BDRV_SECTOR_SIZE * *pnum;
604 n -= *pnum;
605 num_checked += *pnum;
606 if (ret) {
607 num_used = num_checked;
608 } else if (*pnum >= min) {
609 break;
610 }
611 }
612
613 *pnum = num_used;
614 return 1;
615}
616
3e85c6fd
KW
617/*
618 * Compares two buffers sector by sector. Returns 0 if the first sector of both
619 * buffers matches, non-zero otherwise.
620 *
621 * pnum is set to the number of sectors (including and immediately following
622 * the first one) that are known to have the same comparison result
623 */
624static int compare_sectors(const uint8_t *buf1, const uint8_t *buf2, int n,
625 int *pnum)
626{
627 int res, i;
628
629 if (n <= 0) {
630 *pnum = 0;
631 return 0;
632 }
633
634 res = !!memcmp(buf1, buf2, 512);
635 for(i = 1; i < n; i++) {
636 buf1 += 512;
637 buf2 += 512;
638
639 if (!!memcmp(buf1, buf2, 512) != res) {
640 break;
641 }
642 }
643
644 *pnum = i;
645 return res;
646}
647
80ee15a6 648#define IO_BUF_SIZE (2 * 1024 * 1024)
ea2384d3
FB
649
650static int img_convert(int argc, char **argv)
651{
eec77d9e 652 int c, ret = 0, n, n1, bs_n, bs_i, compress, cluster_size, cluster_sectors;
661a0f71
FS
653 int progress = 0, flags;
654 const char *fmt, *out_fmt, *cache, *out_baseimg, *out_filename;
b50cbabc 655 BlockDriver *drv, *proto_drv;
c2abccec 656 BlockDriverState **bs = NULL, *out_bs = NULL;
96b8f136
TS
657 int64_t total_sectors, nb_sectors, sector_num, bs_offset;
658 uint64_t bs_sectors;
c2abccec 659 uint8_t * buf = NULL;
ea2384d3 660 const uint8_t *buf1;
faea38e7 661 BlockDriverInfo bdi;
b50cbabc 662 QEMUOptionParameter *param = NULL, *create_options = NULL;
a18953fb 663 QEMUOptionParameter *out_baseimg_param;
efa84d43 664 char *options = NULL;
51ef6727 665 const char *snapshot_name = NULL;
6b837bc4 666 float local_progress;
a22f123c 667 int min_sparse = 8; /* Need at least 4k of zeros for sparse detection */
ea2384d3
FB
668
669 fmt = NULL;
670 out_fmt = "raw";
661a0f71 671 cache = "unsafe";
f58c7b35 672 out_baseimg = NULL;
eec77d9e 673 compress = 0;
ea2384d3 674 for(;;) {
a22f123c 675 c = getopt(argc, argv, "f:O:B:s:hce6o:pS:t:");
b8fb60da 676 if (c == -1) {
ea2384d3 677 break;
b8fb60da 678 }
ea2384d3 679 switch(c) {
ef87394c 680 case '?':
ea2384d3
FB
681 case 'h':
682 help();
683 break;
684 case 'f':
685 fmt = optarg;
686 break;
687 case 'O':
688 out_fmt = optarg;
689 break;
f58c7b35
TS
690 case 'B':
691 out_baseimg = optarg;
692 break;
ea2384d3 693 case 'c':
eec77d9e 694 compress = 1;
ea2384d3
FB
695 break;
696 case 'e':
9d42e15d 697 error_report("option -e is deprecated, please use \'-o "
eec77d9e
JS
698 "encryption\' instead!");
699 return 1;
ec36ba14 700 case '6':
9d42e15d 701 error_report("option -6 is deprecated, please use \'-o "
eec77d9e
JS
702 "compat6\' instead!");
703 return 1;
efa84d43
KW
704 case 'o':
705 options = optarg;
706 break;
51ef6727 707 case 's':
708 snapshot_name = optarg;
709 break;
a22f123c
KW
710 case 'S':
711 {
712 int64_t sval;
713 sval = strtosz_suffix(optarg, NULL, STRTOSZ_DEFSUFFIX_B);
714 if (sval < 0) {
715 error_report("Invalid minimum zero buffer size for sparse output specified");
716 return 1;
717 }
718
719 min_sparse = sval / BDRV_SECTOR_SIZE;
720 break;
721 }
6b837bc4
JS
722 case 'p':
723 progress = 1;
724 break;
661a0f71
FS
725 case 't':
726 cache = optarg;
727 break;
ea2384d3
FB
728 }
729 }
3b46e624 730
926c2d23 731 bs_n = argc - optind - 1;
b8fb60da
JS
732 if (bs_n < 1) {
733 help();
734 }
926c2d23
AZ
735
736 out_filename = argv[argc - 1];
f58c7b35 737
4ac8aacd
JS
738 if (options && !strcmp(options, "?")) {
739 ret = print_block_option_help(out_filename, out_fmt);
740 goto out;
741 }
742
c2abccec 743 if (bs_n > 1 && out_baseimg) {
15654a6d
JS
744 error_report("-B makes no sense when concatenating multiple input "
745 "images");
31ca34b8
JS
746 ret = -1;
747 goto out;
c2abccec 748 }
926c2d23 749
6b837bc4
JS
750 qemu_progress_init(progress, 2.0);
751 qemu_progress_print(0, 100);
752
7267c094 753 bs = g_malloc0(bs_n * sizeof(BlockDriverState *));
926c2d23
AZ
754
755 total_sectors = 0;
756 for (bs_i = 0; bs_i < bs_n; bs_i++) {
adfe078e 757 bs[bs_i] = bdrv_new_open(argv[optind + bs_i], fmt, BDRV_O_FLAGS);
c2abccec 758 if (!bs[bs_i]) {
15654a6d 759 error_report("Could not open '%s'", argv[optind + bs_i]);
c2abccec
MK
760 ret = -1;
761 goto out;
762 }
926c2d23
AZ
763 bdrv_get_geometry(bs[bs_i], &bs_sectors);
764 total_sectors += bs_sectors;
765 }
ea2384d3 766
51ef6727 767 if (snapshot_name != NULL) {
768 if (bs_n > 1) {
6daf194d 769 error_report("No support for concatenating multiple snapshot");
51ef6727 770 ret = -1;
771 goto out;
772 }
773 if (bdrv_snapshot_load_tmp(bs[0], snapshot_name) < 0) {
6daf194d 774 error_report("Failed to load snapshot");
51ef6727 775 ret = -1;
776 goto out;
777 }
778 }
779
efa84d43 780 /* Find driver and parse its options */
ea2384d3 781 drv = bdrv_find_format(out_fmt);
c2abccec 782 if (!drv) {
15654a6d 783 error_report("Unknown file format '%s'", out_fmt);
c2abccec
MK
784 ret = -1;
785 goto out;
786 }
efa84d43 787
b50cbabc 788 proto_drv = bdrv_find_protocol(out_filename);
c2abccec 789 if (!proto_drv) {
15654a6d 790 error_report("Unknown protocol '%s'", out_filename);
c2abccec
MK
791 ret = -1;
792 goto out;
793 }
b50cbabc
MK
794
795 create_options = append_option_parameters(create_options,
796 drv->create_options);
797 create_options = append_option_parameters(create_options,
798 proto_drv->create_options);
db08adf5 799
efa84d43 800 if (options) {
b50cbabc 801 param = parse_option_parameters(options, create_options, param);
efa84d43 802 if (param == NULL) {
15654a6d 803 error_report("Invalid options for file format '%s'.", out_fmt);
c2abccec
MK
804 ret = -1;
805 goto out;
efa84d43
KW
806 }
807 } else {
b50cbabc 808 param = parse_option_parameters("", create_options, param);
efa84d43
KW
809 }
810
811 set_option_parameter_int(param, BLOCK_OPT_SIZE, total_sectors * 512);
eec77d9e 812 ret = add_old_style_options(out_fmt, param, out_baseimg, NULL);
c2abccec
MK
813 if (ret < 0) {
814 goto out;
815 }
efa84d43 816
a18953fb
KW
817 /* Get backing file name if -o backing_file was used */
818 out_baseimg_param = get_option_parameter(param, BLOCK_OPT_BACKING_FILE);
819 if (out_baseimg_param) {
820 out_baseimg = out_baseimg_param->value.s;
821 }
822
efa84d43 823 /* Check if compression is supported */
eec77d9e 824 if (compress) {
efa84d43
KW
825 QEMUOptionParameter *encryption =
826 get_option_parameter(param, BLOCK_OPT_ENCRYPT);
827
828 if (!drv->bdrv_write_compressed) {
15654a6d 829 error_report("Compression not supported for this file format");
c2abccec
MK
830 ret = -1;
831 goto out;
efa84d43
KW
832 }
833
834 if (encryption && encryption->value.n) {
15654a6d
JS
835 error_report("Compression and encryption not supported at "
836 "the same time");
c2abccec
MK
837 ret = -1;
838 goto out;
efa84d43
KW
839 }
840 }
841
842 /* Create the new image */
843 ret = bdrv_create(drv, out_filename, param);
ea2384d3
FB
844 if (ret < 0) {
845 if (ret == -ENOTSUP) {
15654a6d
JS
846 error_report("Formatting not supported for file format '%s'",
847 out_fmt);
6e9ea0c0 848 } else if (ret == -EFBIG) {
15654a6d
JS
849 error_report("The image size is too large for file format '%s'",
850 out_fmt);
ea2384d3 851 } else {
15654a6d
JS
852 error_report("%s: error while converting %s: %s",
853 out_filename, out_fmt, strerror(-ret));
ea2384d3 854 }
c2abccec 855 goto out;
ea2384d3 856 }
3b46e624 857
661a0f71 858 flags = BDRV_O_RDWR;
c3993cdc 859 ret = bdrv_parse_cache_flags(cache, &flags);
661a0f71
FS
860 if (ret < 0) {
861 error_report("Invalid cache option: %s", cache);
862 return -1;
863 }
864
865 out_bs = bdrv_new_open(out_filename, out_fmt, flags);
c2abccec
MK
866 if (!out_bs) {
867 ret = -1;
868 goto out;
869 }
ea2384d3 870
926c2d23
AZ
871 bs_i = 0;
872 bs_offset = 0;
873 bdrv_get_geometry(bs[0], &bs_sectors);
bb1c0597 874 buf = qemu_blockalign(out_bs, IO_BUF_SIZE);
926c2d23 875
eec77d9e 876 if (compress) {
c2abccec
MK
877 ret = bdrv_get_info(out_bs, &bdi);
878 if (ret < 0) {
15654a6d 879 error_report("could not get block driver info");
c2abccec
MK
880 goto out;
881 }
faea38e7 882 cluster_size = bdi.cluster_size;
c2abccec 883 if (cluster_size <= 0 || cluster_size > IO_BUF_SIZE) {
15654a6d 884 error_report("invalid cluster size");
c2abccec
MK
885 ret = -1;
886 goto out;
887 }
ea2384d3
FB
888 cluster_sectors = cluster_size >> 9;
889 sector_num = 0;
6b837bc4
JS
890
891 nb_sectors = total_sectors;
892 local_progress = (float)100 /
4ee96418 893 (nb_sectors / MIN(nb_sectors, cluster_sectors));
6b837bc4 894
ea2384d3 895 for(;;) {
926c2d23
AZ
896 int64_t bs_num;
897 int remainder;
898 uint8_t *buf2;
899
ea2384d3
FB
900 nb_sectors = total_sectors - sector_num;
901 if (nb_sectors <= 0)
902 break;
903 if (nb_sectors >= cluster_sectors)
904 n = cluster_sectors;
905 else
906 n = nb_sectors;
926c2d23
AZ
907
908 bs_num = sector_num - bs_offset;
909 assert (bs_num >= 0);
910 remainder = n;
911 buf2 = buf;
912 while (remainder > 0) {
913 int nlow;
914 while (bs_num == bs_sectors) {
915 bs_i++;
916 assert (bs_i < bs_n);
917 bs_offset += bs_sectors;
918 bdrv_get_geometry(bs[bs_i], &bs_sectors);
919 bs_num = 0;
0bfcd599
BS
920 /* printf("changing part: sector_num=%" PRId64 ", "
921 "bs_i=%d, bs_offset=%" PRId64 ", bs_sectors=%" PRId64
922 "\n", sector_num, bs_i, bs_offset, bs_sectors); */
926c2d23
AZ
923 }
924 assert (bs_num < bs_sectors);
925
926 nlow = (remainder > bs_sectors - bs_num) ? bs_sectors - bs_num : remainder;
927
c2abccec
MK
928 ret = bdrv_read(bs[bs_i], bs_num, buf2, nlow);
929 if (ret < 0) {
3fba9d81
SH
930 error_report("error while reading sector %" PRId64 ": %s",
931 bs_num, strerror(-ret));
c2abccec
MK
932 goto out;
933 }
926c2d23
AZ
934
935 buf2 += nlow * 512;
936 bs_num += nlow;
937
938 remainder -= nlow;
939 }
940 assert (remainder == 0);
941
b8fb60da 942 if (n < cluster_sectors) {
ea2384d3 943 memset(buf + n * 512, 0, cluster_size - n * 512);
b8fb60da 944 }
ea2384d3 945 if (is_not_zero(buf, cluster_size)) {
c2abccec
MK
946 ret = bdrv_write_compressed(out_bs, sector_num, buf,
947 cluster_sectors);
948 if (ret != 0) {
3fba9d81
SH
949 error_report("error while compressing sector %" PRId64
950 ": %s", sector_num, strerror(-ret));
c2abccec
MK
951 goto out;
952 }
ea2384d3
FB
953 }
954 sector_num += n;
6b837bc4 955 qemu_progress_print(local_progress, 100);
ea2384d3 956 }
faea38e7
FB
957 /* signal EOF to align */
958 bdrv_write_compressed(out_bs, 0, NULL, 0);
ea2384d3 959 } else {
f2feebbd
KW
960 int has_zero_init = bdrv_has_zero_init(out_bs);
961
f58c7b35 962 sector_num = 0; // total number of sectors converted so far
6b837bc4
JS
963 nb_sectors = total_sectors - sector_num;
964 local_progress = (float)100 /
4ee96418 965 (nb_sectors / MIN(nb_sectors, IO_BUF_SIZE / 512));
6b837bc4 966
ea2384d3
FB
967 for(;;) {
968 nb_sectors = total_sectors - sector_num;
b8fb60da 969 if (nb_sectors <= 0) {
ea2384d3 970 break;
b8fb60da
JS
971 }
972 if (nb_sectors >= (IO_BUF_SIZE / 512)) {
ea2384d3 973 n = (IO_BUF_SIZE / 512);
b8fb60da 974 } else {
ea2384d3 975 n = nb_sectors;
b8fb60da 976 }
926c2d23
AZ
977
978 while (sector_num - bs_offset >= bs_sectors) {
979 bs_i ++;
980 assert (bs_i < bs_n);
981 bs_offset += bs_sectors;
982 bdrv_get_geometry(bs[bs_i], &bs_sectors);
0bfcd599
BS
983 /* printf("changing part: sector_num=%" PRId64 ", bs_i=%d, "
984 "bs_offset=%" PRId64 ", bs_sectors=%" PRId64 "\n",
926c2d23
AZ
985 sector_num, bs_i, bs_offset, bs_sectors); */
986 }
987
b8fb60da 988 if (n > bs_offset + bs_sectors - sector_num) {
926c2d23 989 n = bs_offset + bs_sectors - sector_num;
b8fb60da 990 }
926c2d23 991
f2feebbd 992 if (has_zero_init) {
d032044f
AS
993 /* If the output image is being created as a copy on write image,
994 assume that sectors which are unallocated in the input image
995 are present in both the output's and input's base images (no
996 need to copy them). */
997 if (out_baseimg) {
998 if (!bdrv_is_allocated(bs[bs_i], sector_num - bs_offset,
999 n, &n1)) {
1000 sector_num += n1;
1001 continue;
1002 }
1003 /* The next 'n1' sectors are allocated in the input image. Copy
1004 only those as they may be followed by unallocated sectors. */
1005 n = n1;
93c65b47 1006 }
93c65b47
AL
1007 } else {
1008 n1 = n;
f58c7b35
TS
1009 }
1010
c2abccec
MK
1011 ret = bdrv_read(bs[bs_i], sector_num - bs_offset, buf, n);
1012 if (ret < 0) {
3fba9d81
SH
1013 error_report("error while reading sector %" PRId64 ": %s",
1014 sector_num - bs_offset, strerror(-ret));
c2abccec
MK
1015 goto out;
1016 }
ea2384d3
FB
1017 /* NOTE: at the same time we convert, we do not write zero
1018 sectors to have a chance to compress the image. Ideally, we
1019 should add a specific call to have the info to go faster */
1020 buf1 = buf;
1021 while (n > 0) {
f58c7b35
TS
1022 /* If the output image is being created as a copy on write image,
1023 copy all sectors even the ones containing only NUL bytes,
93c65b47
AL
1024 because they may differ from the sectors in the base image.
1025
1026 If the output is to a host device, we also write out
1027 sectors that are entirely 0, since whatever data was
1028 already there is garbage, not 0s. */
f2feebbd 1029 if (!has_zero_init || out_baseimg ||
a22f123c 1030 is_allocated_sectors_min(buf1, n, &n1, min_sparse)) {
c2abccec
MK
1031 ret = bdrv_write(out_bs, sector_num, buf1, n1);
1032 if (ret < 0) {
3fba9d81
SH
1033 error_report("error while writing sector %" PRId64
1034 ": %s", sector_num, strerror(-ret));
c2abccec
MK
1035 goto out;
1036 }
ea2384d3
FB
1037 }
1038 sector_num += n1;
1039 n -= n1;
1040 buf1 += n1 * 512;
1041 }
6b837bc4 1042 qemu_progress_print(local_progress, 100);
ea2384d3
FB
1043 }
1044 }
c2abccec 1045out:
6b837bc4 1046 qemu_progress_end();
c2abccec
MK
1047 free_option_parameters(create_options);
1048 free_option_parameters(param);
bb1c0597 1049 qemu_vfree(buf);
c2abccec
MK
1050 if (out_bs) {
1051 bdrv_delete(out_bs);
1052 }
31ca34b8
JS
1053 if (bs) {
1054 for (bs_i = 0; bs_i < bs_n; bs_i++) {
1055 if (bs[bs_i]) {
1056 bdrv_delete(bs[bs_i]);
1057 }
c2abccec 1058 }
7267c094 1059 g_free(bs);
c2abccec 1060 }
c2abccec
MK
1061 if (ret) {
1062 return 1;
1063 }
ea2384d3
FB
1064 return 0;
1065}
1066
57d1a2b6 1067
faea38e7
FB
1068static void dump_snapshots(BlockDriverState *bs)
1069{
1070 QEMUSnapshotInfo *sn_tab, *sn;
1071 int nb_sns, i;
1072 char buf[256];
1073
1074 nb_sns = bdrv_snapshot_list(bs, &sn_tab);
1075 if (nb_sns <= 0)
1076 return;
1077 printf("Snapshot list:\n");
1078 printf("%s\n", bdrv_snapshot_dump(buf, sizeof(buf), NULL));
1079 for(i = 0; i < nb_sns; i++) {
1080 sn = &sn_tab[i];
1081 printf("%s\n", bdrv_snapshot_dump(buf, sizeof(buf), sn));
1082 }
7267c094 1083 g_free(sn_tab);
faea38e7
FB
1084}
1085
ea2384d3
FB
1086static int img_info(int argc, char **argv)
1087{
1088 int c;
1089 const char *filename, *fmt;
ea2384d3
FB
1090 BlockDriverState *bs;
1091 char fmt_name[128], size_buf[128], dsize_buf[128];
96b8f136
TS
1092 uint64_t total_sectors;
1093 int64_t allocated_size;
93b6b2a3
FB
1094 char backing_filename[1024];
1095 char backing_filename2[1024];
faea38e7 1096 BlockDriverInfo bdi;
ea2384d3
FB
1097
1098 fmt = NULL;
1099 for(;;) {
1100 c = getopt(argc, argv, "f:h");
b8fb60da 1101 if (c == -1) {
ea2384d3 1102 break;
b8fb60da 1103 }
ea2384d3 1104 switch(c) {
ef87394c 1105 case '?':
ea2384d3
FB
1106 case 'h':
1107 help();
1108 break;
1109 case 'f':
1110 fmt = optarg;
1111 break;
1112 }
1113 }
b8fb60da 1114 if (optind >= argc) {
ea2384d3 1115 help();
b8fb60da 1116 }
ea2384d3
FB
1117 filename = argv[optind++];
1118
adfe078e 1119 bs = bdrv_new_open(filename, fmt, BDRV_O_FLAGS | BDRV_O_NO_BACKING);
c2abccec
MK
1120 if (!bs) {
1121 return 1;
1122 }
ea2384d3
FB
1123 bdrv_get_format(bs, fmt_name, sizeof(fmt_name));
1124 bdrv_get_geometry(bs, &total_sectors);
1125 get_human_readable_size(size_buf, sizeof(size_buf), total_sectors * 512);
4a1d5e1f 1126 allocated_size = bdrv_get_allocated_file_size(bs);
b8fb60da 1127 if (allocated_size < 0) {
a10ea30b 1128 snprintf(dsize_buf, sizeof(dsize_buf), "unavailable");
b8fb60da 1129 } else {
5fafdf24 1130 get_human_readable_size(dsize_buf, sizeof(dsize_buf),
de167e41 1131 allocated_size);
b8fb60da 1132 }
ea2384d3
FB
1133 printf("image: %s\n"
1134 "file format: %s\n"
ec3757de 1135 "virtual size: %s (%" PRId64 " bytes)\n"
ea2384d3 1136 "disk size: %s\n",
5fafdf24 1137 filename, fmt_name, size_buf,
ec3757de 1138 (total_sectors * 512),
ea2384d3 1139 dsize_buf);
b8fb60da 1140 if (bdrv_is_encrypted(bs)) {
ea2384d3 1141 printf("encrypted: yes\n");
b8fb60da 1142 }
faea38e7 1143 if (bdrv_get_info(bs, &bdi) >= 0) {
b8fb60da 1144 if (bdi.cluster_size != 0) {
faea38e7 1145 printf("cluster_size: %d\n", bdi.cluster_size);
b8fb60da 1146 }
faea38e7 1147 }
93b6b2a3 1148 bdrv_get_backing_filename(bs, backing_filename, sizeof(backing_filename));
faea38e7 1149 if (backing_filename[0] != '\0') {
93b6b2a3
FB
1150 path_combine(backing_filename2, sizeof(backing_filename2),
1151 filename, backing_filename);
5fafdf24 1152 printf("backing file: %s (actual path: %s)\n",
93b6b2a3
FB
1153 backing_filename,
1154 backing_filename2);
faea38e7
FB
1155 }
1156 dump_snapshots(bs);
ea2384d3
FB
1157 bdrv_delete(bs);
1158 return 0;
1159}
1160
f7b4a940
AL
1161#define SNAPSHOT_LIST 1
1162#define SNAPSHOT_CREATE 2
1163#define SNAPSHOT_APPLY 3
1164#define SNAPSHOT_DELETE 4
1165
153859be 1166static int img_snapshot(int argc, char **argv)
f7b4a940
AL
1167{
1168 BlockDriverState *bs;
1169 QEMUSnapshotInfo sn;
1170 char *filename, *snapshot_name = NULL;
c2abccec 1171 int c, ret = 0, bdrv_oflags;
f7b4a940
AL
1172 int action = 0;
1173 qemu_timeval tv;
1174
710da702 1175 bdrv_oflags = BDRV_O_FLAGS | BDRV_O_RDWR;
f7b4a940
AL
1176 /* Parse commandline parameters */
1177 for(;;) {
1178 c = getopt(argc, argv, "la:c:d:h");
b8fb60da 1179 if (c == -1) {
f7b4a940 1180 break;
b8fb60da 1181 }
f7b4a940 1182 switch(c) {
ef87394c 1183 case '?':
f7b4a940
AL
1184 case 'h':
1185 help();
153859be 1186 return 0;
f7b4a940
AL
1187 case 'l':
1188 if (action) {
1189 help();
153859be 1190 return 0;
f7b4a940
AL
1191 }
1192 action = SNAPSHOT_LIST;
f5edb014 1193 bdrv_oflags &= ~BDRV_O_RDWR; /* no need for RW */
f7b4a940
AL
1194 break;
1195 case 'a':
1196 if (action) {
1197 help();
153859be 1198 return 0;
f7b4a940
AL
1199 }
1200 action = SNAPSHOT_APPLY;
1201 snapshot_name = optarg;
1202 break;
1203 case 'c':
1204 if (action) {
1205 help();
153859be 1206 return 0;
f7b4a940
AL
1207 }
1208 action = SNAPSHOT_CREATE;
1209 snapshot_name = optarg;
1210 break;
1211 case 'd':
1212 if (action) {
1213 help();
153859be 1214 return 0;
f7b4a940
AL
1215 }
1216 action = SNAPSHOT_DELETE;
1217 snapshot_name = optarg;
1218 break;
1219 }
1220 }
1221
b8fb60da 1222 if (optind >= argc) {
f7b4a940 1223 help();
b8fb60da 1224 }
f7b4a940
AL
1225 filename = argv[optind++];
1226
1227 /* Open the image */
f163d073 1228 bs = bdrv_new_open(filename, NULL, bdrv_oflags);
c2abccec
MK
1229 if (!bs) {
1230 return 1;
1231 }
f7b4a940
AL
1232
1233 /* Perform the requested action */
1234 switch(action) {
1235 case SNAPSHOT_LIST:
1236 dump_snapshots(bs);
1237 break;
1238
1239 case SNAPSHOT_CREATE:
1240 memset(&sn, 0, sizeof(sn));
1241 pstrcpy(sn.name, sizeof(sn.name), snapshot_name);
1242
1243 qemu_gettimeofday(&tv);
1244 sn.date_sec = tv.tv_sec;
1245 sn.date_nsec = tv.tv_usec * 1000;
1246
1247 ret = bdrv_snapshot_create(bs, &sn);
b8fb60da 1248 if (ret) {
15654a6d 1249 error_report("Could not create snapshot '%s': %d (%s)",
f7b4a940 1250 snapshot_name, ret, strerror(-ret));
b8fb60da 1251 }
f7b4a940
AL
1252 break;
1253
1254 case SNAPSHOT_APPLY:
1255 ret = bdrv_snapshot_goto(bs, snapshot_name);
b8fb60da 1256 if (ret) {
15654a6d 1257 error_report("Could not apply snapshot '%s': %d (%s)",
f7b4a940 1258 snapshot_name, ret, strerror(-ret));
b8fb60da 1259 }
f7b4a940
AL
1260 break;
1261
1262 case SNAPSHOT_DELETE:
1263 ret = bdrv_snapshot_delete(bs, snapshot_name);
b8fb60da 1264 if (ret) {
15654a6d 1265 error_report("Could not delete snapshot '%s': %d (%s)",
f7b4a940 1266 snapshot_name, ret, strerror(-ret));
b8fb60da 1267 }
f7b4a940
AL
1268 break;
1269 }
1270
1271 /* Cleanup */
1272 bdrv_delete(bs);
c2abccec
MK
1273 if (ret) {
1274 return 1;
1275 }
153859be 1276 return 0;
f7b4a940
AL
1277}
1278
3e85c6fd
KW
1279static int img_rebase(int argc, char **argv)
1280{
c2abccec 1281 BlockDriverState *bs, *bs_old_backing = NULL, *bs_new_backing = NULL;
f163d073 1282 BlockDriver *old_backing_drv, *new_backing_drv;
3e85c6fd 1283 char *filename;
661a0f71 1284 const char *fmt, *cache, *out_basefmt, *out_baseimg;
3e85c6fd
KW
1285 int c, flags, ret;
1286 int unsafe = 0;
6b837bc4 1287 int progress = 0;
3e85c6fd
KW
1288
1289 /* Parse commandline parameters */
e53dbee0 1290 fmt = NULL;
661a0f71 1291 cache = BDRV_DEFAULT_CACHE;
3e85c6fd
KW
1292 out_baseimg = NULL;
1293 out_basefmt = NULL;
3e85c6fd 1294 for(;;) {
661a0f71 1295 c = getopt(argc, argv, "uhf:F:b:pt:");
b8fb60da 1296 if (c == -1) {
3e85c6fd 1297 break;
b8fb60da 1298 }
3e85c6fd 1299 switch(c) {
ef87394c 1300 case '?':
3e85c6fd
KW
1301 case 'h':
1302 help();
1303 return 0;
e53dbee0
KW
1304 case 'f':
1305 fmt = optarg;
1306 break;
3e85c6fd
KW
1307 case 'F':
1308 out_basefmt = optarg;
1309 break;
1310 case 'b':
1311 out_baseimg = optarg;
1312 break;
1313 case 'u':
1314 unsafe = 1;
1315 break;
6b837bc4
JS
1316 case 'p':
1317 progress = 1;
1318 break;
661a0f71
FS
1319 case 't':
1320 cache = optarg;
1321 break;
3e85c6fd
KW
1322 }
1323 }
1324
9a9d9dba 1325 if ((optind >= argc) || (!unsafe && !out_baseimg)) {
3e85c6fd 1326 help();
b8fb60da 1327 }
3e85c6fd
KW
1328 filename = argv[optind++];
1329
6b837bc4
JS
1330 qemu_progress_init(progress, 2.0);
1331 qemu_progress_print(0, 100);
1332
661a0f71 1333 flags = BDRV_O_RDWR | (unsafe ? BDRV_O_NO_BACKING : 0);
c3993cdc 1334 ret = bdrv_parse_cache_flags(cache, &flags);
661a0f71
FS
1335 if (ret < 0) {
1336 error_report("Invalid cache option: %s", cache);
1337 return -1;
1338 }
1339
3e85c6fd
KW
1340 /*
1341 * Open the images.
1342 *
1343 * Ignore the old backing file for unsafe rebase in case we want to correct
1344 * the reference to a renamed or moved backing file.
1345 */
f163d073 1346 bs = bdrv_new_open(filename, fmt, flags);
c2abccec
MK
1347 if (!bs) {
1348 return 1;
1349 }
3e85c6fd
KW
1350
1351 /* Find the right drivers for the backing files */
1352 old_backing_drv = NULL;
1353 new_backing_drv = NULL;
1354
1355 if (!unsafe && bs->backing_format[0] != '\0') {
1356 old_backing_drv = bdrv_find_format(bs->backing_format);
1357 if (old_backing_drv == NULL) {
15654a6d 1358 error_report("Invalid format name: '%s'", bs->backing_format);
c2abccec
MK
1359 ret = -1;
1360 goto out;
3e85c6fd
KW
1361 }
1362 }
1363
1364 if (out_basefmt != NULL) {
1365 new_backing_drv = bdrv_find_format(out_basefmt);
1366 if (new_backing_drv == NULL) {
15654a6d 1367 error_report("Invalid format name: '%s'", out_basefmt);
c2abccec
MK
1368 ret = -1;
1369 goto out;
3e85c6fd
KW
1370 }
1371 }
1372
1373 /* For safe rebasing we need to compare old and new backing file */
1374 if (unsafe) {
1375 /* Make the compiler happy */
1376 bs_old_backing = NULL;
1377 bs_new_backing = NULL;
1378 } else {
1379 char backing_name[1024];
1380
1381 bs_old_backing = bdrv_new("old_backing");
1382 bdrv_get_backing_filename(bs, backing_name, sizeof(backing_name));
c2abccec
MK
1383 ret = bdrv_open(bs_old_backing, backing_name, BDRV_O_FLAGS,
1384 old_backing_drv);
1385 if (ret) {
15654a6d 1386 error_report("Could not open old backing file '%s'", backing_name);
c2abccec 1387 goto out;
3e85c6fd
KW
1388 }
1389
1390 bs_new_backing = bdrv_new("new_backing");
cdbae851 1391 ret = bdrv_open(bs_new_backing, out_baseimg, BDRV_O_FLAGS,
c2abccec
MK
1392 new_backing_drv);
1393 if (ret) {
15654a6d 1394 error_report("Could not open new backing file '%s'", out_baseimg);
c2abccec 1395 goto out;
3e85c6fd
KW
1396 }
1397 }
1398
1399 /*
1400 * Check each unallocated cluster in the COW file. If it is unallocated,
1401 * accesses go to the backing file. We must therefore compare this cluster
1402 * in the old and new backing file, and if they differ we need to copy it
1403 * from the old backing file into the COW file.
1404 *
1405 * If qemu-img crashes during this step, no harm is done. The content of
1406 * the image is the same as the original one at any time.
1407 */
1408 if (!unsafe) {
1409 uint64_t num_sectors;
1410 uint64_t sector;
cc60e327 1411 int n;
d6771bfa
T
1412 uint8_t * buf_old;
1413 uint8_t * buf_new;
6b837bc4 1414 float local_progress;
d6771bfa 1415
bb1c0597
KW
1416 buf_old = qemu_blockalign(bs, IO_BUF_SIZE);
1417 buf_new = qemu_blockalign(bs, IO_BUF_SIZE);
3e85c6fd
KW
1418
1419 bdrv_get_geometry(bs, &num_sectors);
1420
6b837bc4 1421 local_progress = (float)100 /
4ee96418 1422 (num_sectors / MIN(num_sectors, IO_BUF_SIZE / 512));
3e85c6fd
KW
1423 for (sector = 0; sector < num_sectors; sector += n) {
1424
1425 /* How many sectors can we handle with the next read? */
1426 if (sector + (IO_BUF_SIZE / 512) <= num_sectors) {
1427 n = (IO_BUF_SIZE / 512);
1428 } else {
1429 n = num_sectors - sector;
1430 }
1431
1432 /* If the cluster is allocated, we don't need to take action */
cc60e327
KW
1433 ret = bdrv_is_allocated(bs, sector, n, &n);
1434 if (ret) {
3e85c6fd
KW
1435 continue;
1436 }
1437
1438 /* Read old and new backing file */
c2abccec
MK
1439 ret = bdrv_read(bs_old_backing, sector, buf_old, n);
1440 if (ret < 0) {
15654a6d 1441 error_report("error while reading from old backing file");
c2abccec 1442 goto out;
3e85c6fd 1443 }
c2abccec
MK
1444 ret = bdrv_read(bs_new_backing, sector, buf_new, n);
1445 if (ret < 0) {
15654a6d 1446 error_report("error while reading from new backing file");
c2abccec 1447 goto out;
3e85c6fd
KW
1448 }
1449
1450 /* If they differ, we need to write to the COW file */
1451 uint64_t written = 0;
1452
1453 while (written < n) {
1454 int pnum;
1455
1456 if (compare_sectors(buf_old + written * 512,
60b1bd4f 1457 buf_new + written * 512, n - written, &pnum))
3e85c6fd
KW
1458 {
1459 ret = bdrv_write(bs, sector + written,
1460 buf_old + written * 512, pnum);
1461 if (ret < 0) {
15654a6d 1462 error_report("Error while writing to COW image: %s",
3e85c6fd 1463 strerror(-ret));
c2abccec 1464 goto out;
3e85c6fd
KW
1465 }
1466 }
1467
1468 written += pnum;
1469 }
6b837bc4 1470 qemu_progress_print(local_progress, 100);
3e85c6fd 1471 }
d6771bfa 1472
bb1c0597
KW
1473 qemu_vfree(buf_old);
1474 qemu_vfree(buf_new);
3e85c6fd
KW
1475 }
1476
1477 /*
1478 * Change the backing file. All clusters that are different from the old
1479 * backing file are overwritten in the COW file now, so the visible content
1480 * doesn't change when we switch the backing file.
1481 */
1482 ret = bdrv_change_backing_file(bs, out_baseimg, out_basefmt);
1483 if (ret == -ENOSPC) {
15654a6d
JS
1484 error_report("Could not change the backing file to '%s': No "
1485 "space left in the file header", out_baseimg);
3e85c6fd 1486 } else if (ret < 0) {
15654a6d 1487 error_report("Could not change the backing file to '%s': %s",
3e85c6fd
KW
1488 out_baseimg, strerror(-ret));
1489 }
1490
6b837bc4 1491 qemu_progress_print(100, 0);
3e85c6fd
KW
1492 /*
1493 * TODO At this point it is possible to check if any clusters that are
1494 * allocated in the COW file are the same in the backing file. If so, they
1495 * could be dropped from the COW file. Don't do this before switching the
1496 * backing file, in case of a crash this would lead to corruption.
1497 */
c2abccec 1498out:
6b837bc4 1499 qemu_progress_end();
3e85c6fd
KW
1500 /* Cleanup */
1501 if (!unsafe) {
eb863add
KW
1502 if (bs_old_backing != NULL) {
1503 bdrv_delete(bs_old_backing);
1504 }
1505 if (bs_new_backing != NULL) {
1506 bdrv_delete(bs_new_backing);
1507 }
3e85c6fd
KW
1508 }
1509
1510 bdrv_delete(bs);
c2abccec
MK
1511 if (ret) {
1512 return 1;
1513 }
3e85c6fd
KW
1514 return 0;
1515}
1516
ae6b0ed6
SH
1517static int img_resize(int argc, char **argv)
1518{
1519 int c, ret, relative;
1520 const char *filename, *fmt, *size;
1521 int64_t n, total_size;
2a81998a 1522 BlockDriverState *bs = NULL;
ae6b0ed6
SH
1523 QEMUOptionParameter *param;
1524 QEMUOptionParameter resize_options[] = {
1525 {
1526 .name = BLOCK_OPT_SIZE,
1527 .type = OPT_SIZE,
1528 .help = "Virtual disk size"
1529 },
1530 { NULL }
1531 };
1532
e80fec7f
KW
1533 /* Remove size from argv manually so that negative numbers are not treated
1534 * as options by getopt. */
1535 if (argc < 3) {
1536 help();
1537 return 1;
1538 }
1539
1540 size = argv[--argc];
1541
1542 /* Parse getopt arguments */
ae6b0ed6
SH
1543 fmt = NULL;
1544 for(;;) {
1545 c = getopt(argc, argv, "f:h");
1546 if (c == -1) {
1547 break;
1548 }
1549 switch(c) {
ef87394c 1550 case '?':
ae6b0ed6
SH
1551 case 'h':
1552 help();
1553 break;
1554 case 'f':
1555 fmt = optarg;
1556 break;
1557 }
1558 }
e80fec7f 1559 if (optind >= argc) {
ae6b0ed6
SH
1560 help();
1561 }
1562 filename = argv[optind++];
ae6b0ed6
SH
1563
1564 /* Choose grow, shrink, or absolute resize mode */
1565 switch (size[0]) {
1566 case '+':
1567 relative = 1;
1568 size++;
1569 break;
1570 case '-':
1571 relative = -1;
1572 size++;
1573 break;
1574 default:
1575 relative = 0;
1576 break;
1577 }
1578
1579 /* Parse size */
1580 param = parse_option_parameters("", resize_options, NULL);
1581 if (set_option_parameter(param, BLOCK_OPT_SIZE, size)) {
1582 /* Error message already printed when size parsing fails */
2a81998a
JS
1583 ret = -1;
1584 goto out;
ae6b0ed6
SH
1585 }
1586 n = get_option_parameter(param, BLOCK_OPT_SIZE)->value.n;
1587 free_option_parameters(param);
1588
1589 bs = bdrv_new_open(filename, fmt, BDRV_O_FLAGS | BDRV_O_RDWR);
c2abccec 1590 if (!bs) {
2a81998a
JS
1591 ret = -1;
1592 goto out;
c2abccec 1593 }
ae6b0ed6
SH
1594
1595 if (relative) {
1596 total_size = bdrv_getlength(bs) + n * relative;
1597 } else {
1598 total_size = n;
1599 }
1600 if (total_size <= 0) {
15654a6d 1601 error_report("New image size must be positive");
c2abccec
MK
1602 ret = -1;
1603 goto out;
ae6b0ed6
SH
1604 }
1605
1606 ret = bdrv_truncate(bs, total_size);
1607 switch (ret) {
1608 case 0:
1609 printf("Image resized.\n");
1610 break;
1611 case -ENOTSUP:
15654a6d 1612 error_report("This image format does not support resize");
ae6b0ed6
SH
1613 break;
1614 case -EACCES:
15654a6d 1615 error_report("Image is read-only");
ae6b0ed6
SH
1616 break;
1617 default:
15654a6d 1618 error_report("Error resizing image (%d)", -ret);
ae6b0ed6
SH
1619 break;
1620 }
c2abccec 1621out:
2a81998a
JS
1622 if (bs) {
1623 bdrv_delete(bs);
1624 }
c2abccec
MK
1625 if (ret) {
1626 return 1;
1627 }
ae6b0ed6
SH
1628 return 0;
1629}
1630
c227f099 1631static const img_cmd_t img_cmds[] = {
153859be
SB
1632#define DEF(option, callback, arg_string) \
1633 { option, callback },
1634#include "qemu-img-cmds.h"
1635#undef DEF
1636#undef GEN_DOCS
1637 { NULL, NULL, },
1638};
1639
ea2384d3
FB
1640int main(int argc, char **argv)
1641{
c227f099 1642 const img_cmd_t *cmd;
153859be 1643 const char *cmdname;
ea2384d3 1644
53f76e58
KW
1645 error_set_progname(argv[0]);
1646
ea2384d3
FB
1647 bdrv_init();
1648 if (argc < 2)
1649 help();
153859be 1650 cmdname = argv[1];
8f9b157e 1651 argc--; argv++;
153859be
SB
1652
1653 /* find the command */
1654 for(cmd = img_cmds; cmd->name != NULL; cmd++) {
1655 if (!strcmp(cmdname, cmd->name)) {
1656 return cmd->handler(argc, argv);
1657 }
ea2384d3 1658 }
153859be
SB
1659
1660 /* not found */
1661 help();
ea2384d3
FB
1662 return 0;
1663}