]> git.proxmox.com Git - mirror_qemu.git/blame - qemu-img.c
Merge remote-tracking branch 'remotes/afaerber/tags/qom-devices-for-peter' into staging
[mirror_qemu.git] / qemu-img.c
CommitLineData
ea2384d3 1/*
fb43f4dd 2 * QEMU disk image utility
5fafdf24 3 *
68d0f70e 4 * Copyright (c) 2003-2008 Fabrice Bellard
5fafdf24 5 *
ea2384d3
FB
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
12 *
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
15 *
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22 * THE SOFTWARE.
23 */
c054b3fd
BC
24#include "qapi-visit.h"
25#include "qapi/qmp-output-visitor.h"
7b1b5d19 26#include "qapi/qmp/qjson.h"
faf07963 27#include "qemu-common.h"
1de7afc9
PB
28#include "qemu/option.h"
29#include "qemu/error-report.h"
30#include "qemu/osdep.h"
9c17d615 31#include "sysemu/sysemu.h"
737e150e 32#include "block/block_int.h"
f364ec65 33#include "block/qapi.h"
c054b3fd 34#include <getopt.h>
1a443c1b 35#include <glib.h>
e8445331 36
5f6979cb
JC
37#define QEMU_IMG_VERSION "qemu-img version " QEMU_VERSION \
38 ", Copyright (c) 2004-2008 Fabrice Bellard\n"
39
c227f099 40typedef struct img_cmd_t {
153859be
SB
41 const char *name;
42 int (*handler)(int argc, char **argv);
c227f099 43} img_cmd_t;
153859be 44
8599ea4c
FS
45enum {
46 OPTION_OUTPUT = 256,
47 OPTION_BACKING_CHAIN = 257,
48};
49
50typedef enum OutputFormat {
51 OFORMAT_JSON,
52 OFORMAT_HUMAN,
53} OutputFormat;
54
137519ce 55/* Default to cache=writeback as data integrity is not important for qemu-tcg. */
adfe078e 56#define BDRV_O_FLAGS BDRV_O_CACHE_WB
661a0f71 57#define BDRV_DEFAULT_CACHE "writeback"
137519ce 58
1a443c1b 59static gint compare_data(gconstpointer a, gconstpointer b, gpointer user)
ea2384d3 60{
1a443c1b
MD
61 return g_strcmp0(a, b);
62}
63
64static void print_format(gpointer data, gpointer user)
65{
66 printf(" %s", (char *)data);
67}
68
69static void add_format_to_seq(void *opaque, const char *fmt_name)
70{
71 GSequence *seq = opaque;
72
395071a7
MD
73 g_sequence_insert_sorted(seq, (gpointer)fmt_name,
74 compare_data, NULL);
ea2384d3
FB
75}
76
ac1307ab
FZ
77static void QEMU_NORETURN GCC_FMT_ATTR(1, 2) error_exit(const char *fmt, ...)
78{
79 va_list ap;
80
81 error_printf("qemu-img: ");
82
83 va_start(ap, fmt);
84 error_vprintf(fmt, ap);
85 va_end(ap);
86
87 error_printf("\nTry 'qemu-img --help' for more information\n");
88 exit(EXIT_FAILURE);
89}
90
d2c639d6 91/* Please keep in synch with qemu-img.texi */
ac1307ab 92static void QEMU_NORETURN help(void)
ea2384d3 93{
e00291c0 94 const char *help_msg =
5f6979cb 95 QEMU_IMG_VERSION
3f020d70 96 "usage: qemu-img command [command options]\n"
97 "QEMU disk image utility\n"
98 "\n"
99 "Command syntax:\n"
153859be
SB
100#define DEF(option, callback, arg_string) \
101 " " arg_string "\n"
102#include "qemu-img-cmds.h"
103#undef DEF
104#undef GEN_DOCS
3f020d70 105 "\n"
106 "Command parameters:\n"
107 " 'filename' is a disk image filename\n"
108 " 'fmt' is the disk image format. It is guessed automatically in most cases\n"
661a0f71 109 " 'cache' is the cache mode used to write the output disk image, the valid\n"
80ccf93b
LY
110 " options are: 'none', 'writeback' (default, except for convert), 'writethrough',\n"
111 " 'directsync' and 'unsafe' (default for convert)\n"
3f020d70 112 " 'size' is the disk image size in bytes. Optional suffixes\n"
5e00984a
KW
113 " 'k' or 'K' (kilobyte, 1024), 'M' (megabyte, 1024k), 'G' (gigabyte, 1024M),\n"
114 " 'T' (terabyte, 1024G), 'P' (petabyte, 1024T) and 'E' (exabyte, 1024P) are\n"
115 " supported. 'b' is ignored.\n"
3f020d70 116 " 'output_filename' is the destination disk image filename\n"
117 " 'output_fmt' is the destination format\n"
118 " 'options' is a comma separated list of format specific options in a\n"
119 " name=value format. Use -o ? for an overview of the options supported by the\n"
120 " used format\n"
ef80654d
WX
121 " 'snapshot_param' is param used for internal snapshot, format\n"
122 " is 'snapshot.id=[ID],snapshot.name=[NAME]', or\n"
123 " '[ID_OR_NAME]'\n"
124 " 'snapshot_id_or_name' is deprecated, use 'snapshot_param'\n"
125 " instead\n"
3f020d70 126 " '-c' indicates that target image must be compressed (qcow format only)\n"
127 " '-u' enables unsafe rebasing. It is assumed that old and new backing file\n"
128 " match exactly. The image doesn't need a working backing file before\n"
129 " rebasing in this case (useful for renaming the backing file)\n"
130 " '-h' with or without a command shows this help and lists the supported formats\n"
6b837bc4 131 " '-p' show progress of command (only certain commands)\n"
f382d43a 132 " '-q' use Quiet mode - do not print any output (except errors)\n"
11b6699a
PL
133 " '-S' indicates the consecutive number of bytes (defaults to 4k) that must\n"
134 " contain only zeros for qemu-img to create a sparse image during\n"
135 " conversion. If the number of bytes is 0, the source will not be scanned for\n"
136 " unallocated or zero sectors, and the destination image will always be\n"
137 " fully allocated\n"
c054b3fd 138 " '--output' takes the format in which the output must be done (human or json)\n"
b2e10493
AD
139 " '-n' skips the target volume creation (useful if the volume is created\n"
140 " prior to running qemu-img)\n"
3f020d70 141 "\n"
4534ff54
KW
142 "Parameters to check subcommand:\n"
143 " '-r' tries to repair any inconsistencies that are found during the check.\n"
144 " '-r leaks' repairs only cluster leaks, whereas '-r all' fixes all\n"
145 " kinds of errors, with a higher risk of choosing the wrong fix or\n"
0546b8c2 146 " hiding corruption that has already occurred.\n"
4534ff54 147 "\n"
3f020d70 148 "Parameters to snapshot subcommand:\n"
149 " 'snapshot' is the name of the snapshot to create, apply or delete\n"
150 " '-a' applies a snapshot (revert disk to saved state)\n"
151 " '-c' creates a snapshot\n"
152 " '-d' deletes a snapshot\n"
d14ed18c
MR
153 " '-l' lists all snapshots in the given image\n"
154 "\n"
155 "Parameters to compare subcommand:\n"
156 " '-f' first image format\n"
157 " '-F' second image format\n"
158 " '-s' run in Strict mode - fail on different image size or sector allocation\n";
1a443c1b 159 GSequence *seq;
e00291c0
PB
160
161 printf("%s\nSupported formats:", help_msg);
1a443c1b
MD
162 seq = g_sequence_new(NULL);
163 bdrv_iterate_format(add_format_to_seq, seq);
164 g_sequence_foreach(seq, print_format, NULL);
ea2384d3 165 printf("\n");
1a443c1b
MD
166 g_sequence_free(seq);
167
ac1307ab 168 exit(EXIT_SUCCESS);
ea2384d3
FB
169}
170
7c30f657 171static int GCC_FMT_ATTR(2, 3) qprintf(bool quiet, const char *fmt, ...)
f382d43a
MR
172{
173 int ret = 0;
174 if (!quiet) {
175 va_list args;
176 va_start(args, fmt);
177 ret = vprintf(fmt, args);
178 va_end(args);
179 }
180 return ret;
181}
182
ea2384d3
FB
183#if defined(WIN32)
184/* XXX: put correct support for win32 */
185static int read_password(char *buf, int buf_size)
186{
187 int c, i;
188 printf("Password: ");
189 fflush(stdout);
190 i = 0;
191 for(;;) {
192 c = getchar();
193 if (c == '\n')
194 break;
195 if (i < (buf_size - 1))
196 buf[i++] = c;
197 }
198 buf[i] = '\0';
199 return 0;
200}
201
202#else
203
204#include <termios.h>
205
206static struct termios oldtty;
207
208static void term_exit(void)
209{
210 tcsetattr (0, TCSANOW, &oldtty);
211}
212
213static void term_init(void)
214{
215 struct termios tty;
216
217 tcgetattr (0, &tty);
218 oldtty = tty;
219
220 tty.c_iflag &= ~(IGNBRK|BRKINT|PARMRK|ISTRIP
221 |INLCR|IGNCR|ICRNL|IXON);
222 tty.c_oflag |= OPOST;
223 tty.c_lflag &= ~(ECHO|ECHONL|ICANON|IEXTEN);
224 tty.c_cflag &= ~(CSIZE|PARENB);
225 tty.c_cflag |= CS8;
226 tty.c_cc[VMIN] = 1;
227 tty.c_cc[VTIME] = 0;
3b46e624 228
ea2384d3
FB
229 tcsetattr (0, TCSANOW, &tty);
230
231 atexit(term_exit);
232}
233
3f379ab1 234static int read_password(char *buf, int buf_size)
ea2384d3
FB
235{
236 uint8_t ch;
237 int i, ret;
238
239 printf("password: ");
240 fflush(stdout);
241 term_init();
242 i = 0;
243 for(;;) {
244 ret = read(0, &ch, 1);
245 if (ret == -1) {
246 if (errno == EAGAIN || errno == EINTR) {
247 continue;
248 } else {
249 ret = -1;
250 break;
251 }
252 } else if (ret == 0) {
253 ret = -1;
254 break;
255 } else {
256 if (ch == '\r') {
257 ret = 0;
258 break;
259 }
260 if (i < (buf_size - 1))
261 buf[i++] = ch;
262 }
263 }
264 term_exit();
265 buf[i] = '\0';
266 printf("\n");
267 return ret;
268}
269#endif
270
4ac8aacd
JS
271static int print_block_option_help(const char *filename, const char *fmt)
272{
273 BlockDriver *drv, *proto_drv;
274 QEMUOptionParameter *create_options = NULL;
275
276 /* Find driver and parse its options */
277 drv = bdrv_find_format(fmt);
278 if (!drv) {
15654a6d 279 error_report("Unknown file format '%s'", fmt);
4ac8aacd
JS
280 return 1;
281 }
282
4ac8aacd
JS
283 create_options = append_option_parameters(create_options,
284 drv->create_options);
a283cb6e
KW
285
286 if (filename) {
287 proto_drv = bdrv_find_protocol(filename, true);
288 if (!proto_drv) {
289 error_report("Unknown protocol '%s'", filename);
290 return 1;
291 }
292 create_options = append_option_parameters(create_options,
293 proto_drv->create_options);
294 }
295
4ac8aacd
JS
296 print_option_help(create_options);
297 free_option_parameters(create_options);
298 return 0;
299}
300
9ffe3332
KW
301static BlockDriverState *bdrv_new_open(const char *id,
302 const char *filename,
9bc378c1 303 const char *fmt,
f0536bb8 304 int flags,
f382d43a
MR
305 bool require_io,
306 bool quiet)
75c23805
FB
307{
308 BlockDriverState *bs;
309 BlockDriver *drv;
310 char password[256];
34b5d2c6 311 Error *local_err = NULL;
b9eaf9ec 312 int ret;
75c23805 313
9ffe3332 314 bs = bdrv_new(id, &error_abort);
ad717139 315
75c23805
FB
316 if (fmt) {
317 drv = bdrv_find_format(fmt);
c2abccec 318 if (!drv) {
15654a6d 319 error_report("Unknown file format '%s'", fmt);
c2abccec
MK
320 goto fail;
321 }
75c23805
FB
322 } else {
323 drv = NULL;
324 }
b9eaf9ec 325
ddf5636d 326 ret = bdrv_open(&bs, filename, NULL, NULL, flags, drv, &local_err);
b9eaf9ec 327 if (ret < 0) {
34b5d2c6
HR
328 error_report("Could not open '%s': %s", filename,
329 error_get_pretty(local_err));
330 error_free(local_err);
c2abccec 331 goto fail;
75c23805 332 }
b9eaf9ec 333
f0536bb8 334 if (bdrv_is_encrypted(bs) && require_io) {
f382d43a 335 qprintf(quiet, "Disk image '%s' is encrypted.\n", filename);
c2abccec 336 if (read_password(password, sizeof(password)) < 0) {
15654a6d 337 error_report("No password given");
c2abccec
MK
338 goto fail;
339 }
340 if (bdrv_set_key(bs, password) < 0) {
15654a6d 341 error_report("invalid password");
c2abccec
MK
342 goto fail;
343 }
75c23805
FB
344 }
345 return bs;
c2abccec 346fail:
f67503e5 347 bdrv_unref(bs);
c2abccec 348 return NULL;
75c23805
FB
349}
350
c2abccec 351static int add_old_style_options(const char *fmt, QEMUOptionParameter *list,
eec77d9e
JS
352 const char *base_filename,
353 const char *base_fmt)
efa84d43 354{
efa84d43
KW
355 if (base_filename) {
356 if (set_option_parameter(list, BLOCK_OPT_BACKING_FILE, base_filename)) {
15654a6d
JS
357 error_report("Backing file not supported for file format '%s'",
358 fmt);
c2abccec 359 return -1;
efa84d43
KW
360 }
361 }
362 if (base_fmt) {
363 if (set_option_parameter(list, BLOCK_OPT_BACKING_FMT, base_fmt)) {
15654a6d
JS
364 error_report("Backing file format not supported for file "
365 "format '%s'", fmt);
c2abccec 366 return -1;
efa84d43
KW
367 }
368 }
c2abccec 369 return 0;
efa84d43
KW
370}
371
ea2384d3
FB
372static int img_create(int argc, char **argv)
373{
a9300911 374 int c;
1da7cfbd 375 uint64_t img_size = -1;
ea2384d3 376 const char *fmt = "raw";
9230eaf6 377 const char *base_fmt = NULL;
ea2384d3
FB
378 const char *filename;
379 const char *base_filename = NULL;
9ea2ea71 380 char *options = NULL;
9b37525a 381 Error *local_err = NULL;
f382d43a 382 bool quiet = false;
3b46e624 383
ea2384d3 384 for(;;) {
f382d43a 385 c = getopt(argc, argv, "F:b:f:he6o:q");
b8fb60da 386 if (c == -1) {
ea2384d3 387 break;
b8fb60da 388 }
ea2384d3 389 switch(c) {
ef87394c 390 case '?':
ea2384d3
FB
391 case 'h':
392 help();
393 break;
9230eaf6
AL
394 case 'F':
395 base_fmt = optarg;
396 break;
ea2384d3
FB
397 case 'b':
398 base_filename = optarg;
399 break;
400 case 'f':
401 fmt = optarg;
402 break;
403 case 'e':
9d42e15d 404 error_report("option -e is deprecated, please use \'-o "
eec77d9e 405 "encryption\' instead!");
77386bf6 406 goto fail;
d8871c5a 407 case '6':
9d42e15d 408 error_report("option -6 is deprecated, please use \'-o "
eec77d9e 409 "compat6\' instead!");
77386bf6 410 goto fail;
9ea2ea71 411 case 'o':
77386bf6
KW
412 if (!is_valid_option_list(optarg)) {
413 error_report("Invalid option list: %s", optarg);
414 goto fail;
415 }
416 if (!options) {
417 options = g_strdup(optarg);
418 } else {
419 char *old_options = options;
420 options = g_strdup_printf("%s,%s", options, optarg);
421 g_free(old_options);
422 }
9ea2ea71 423 break;
f382d43a
MR
424 case 'q':
425 quiet = true;
426 break;
ea2384d3
FB
427 }
428 }
9230eaf6 429
b50cbabc 430 /* Get the filename */
a283cb6e
KW
431 filename = (optind < argc) ? argv[optind] : NULL;
432 if (options && has_help_option(options)) {
433 g_free(options);
434 return print_block_option_help(filename, fmt);
435 }
436
b8fb60da 437 if (optind >= argc) {
ac1307ab 438 error_exit("Expecting image file name");
b8fb60da 439 }
a283cb6e 440 optind++;
b50cbabc 441
1da7cfbd
JS
442 /* Get image size, if specified */
443 if (optind < argc) {
70b4f4bb 444 int64_t sval;
e36b3695
MA
445 char *end;
446 sval = strtosz_suffix(argv[optind++], &end, STRTOSZ_DEFSUFFIX_B);
447 if (sval < 0 || *end) {
79443397
LG
448 if (sval == -ERANGE) {
449 error_report("Image size must be less than 8 EiB!");
450 } else {
451 error_report("Invalid image size specified! You may use k, M, "
5e00984a
KW
452 "G, T, P or E suffixes for ");
453 error_report("kilobytes, megabytes, gigabytes, terabytes, "
454 "petabytes and exabytes.");
79443397 455 }
77386bf6 456 goto fail;
1da7cfbd
JS
457 }
458 img_size = (uint64_t)sval;
459 }
fc11eb26 460 if (optind != argc) {
ac1307ab 461 error_exit("Unexpected argument: %s", argv[optind]);
fc11eb26 462 }
1da7cfbd 463
9b37525a 464 bdrv_img_create(filename, fmt, base_filename, base_fmt,
f382d43a 465 options, img_size, BDRV_O_FLAGS, &local_err, quiet);
84d18f06 466 if (local_err) {
b70d8c23 467 error_report("%s: %s", filename, error_get_pretty(local_err));
9b37525a 468 error_free(local_err);
77386bf6 469 goto fail;
c2abccec 470 }
a9300911 471
77386bf6 472 g_free(options);
ea2384d3 473 return 0;
77386bf6
KW
474
475fail:
476 g_free(options);
477 return 1;
ea2384d3
FB
478}
479
f382d43a 480static void dump_json_image_check(ImageCheck *check, bool quiet)
8599ea4c 481{
4399c438 482 Error *local_err = NULL;
8599ea4c
FS
483 QString *str;
484 QmpOutputVisitor *ov = qmp_output_visitor_new();
485 QObject *obj;
486 visit_type_ImageCheck(qmp_output_get_visitor(ov),
4399c438 487 &check, NULL, &local_err);
8599ea4c
FS
488 obj = qmp_output_get_qobject(ov);
489 str = qobject_to_json_pretty(obj);
490 assert(str != NULL);
f382d43a 491 qprintf(quiet, "%s\n", qstring_get_str(str));
8599ea4c
FS
492 qobject_decref(obj);
493 qmp_output_visitor_cleanup(ov);
494 QDECREF(str);
495}
496
f382d43a 497static void dump_human_image_check(ImageCheck *check, bool quiet)
8599ea4c
FS
498{
499 if (!(check->corruptions || check->leaks || check->check_errors)) {
f382d43a 500 qprintf(quiet, "No errors were found on the image.\n");
8599ea4c
FS
501 } else {
502 if (check->corruptions) {
f382d43a
MR
503 qprintf(quiet, "\n%" PRId64 " errors were found on the image.\n"
504 "Data may be corrupted, or further writes to the image "
505 "may corrupt it.\n",
506 check->corruptions);
8599ea4c
FS
507 }
508
509 if (check->leaks) {
f382d43a
MR
510 qprintf(quiet,
511 "\n%" PRId64 " leaked clusters were found on the image.\n"
512 "This means waste of disk space, but no harm to data.\n",
513 check->leaks);
8599ea4c
FS
514 }
515
516 if (check->check_errors) {
f382d43a
MR
517 qprintf(quiet,
518 "\n%" PRId64
519 " internal errors have occurred during the check.\n",
520 check->check_errors);
8599ea4c
FS
521 }
522 }
523
524 if (check->total_clusters != 0 && check->allocated_clusters != 0) {
f382d43a
MR
525 qprintf(quiet, "%" PRId64 "/%" PRId64 " = %0.2f%% allocated, "
526 "%0.2f%% fragmented, %0.2f%% compressed clusters\n",
527 check->allocated_clusters, check->total_clusters,
528 check->allocated_clusters * 100.0 / check->total_clusters,
529 check->fragmented_clusters * 100.0 / check->allocated_clusters,
530 check->compressed_clusters * 100.0 /
531 check->allocated_clusters);
8599ea4c
FS
532 }
533
534 if (check->image_end_offset) {
f382d43a
MR
535 qprintf(quiet,
536 "Image end offset: %" PRId64 "\n", check->image_end_offset);
8599ea4c
FS
537 }
538}
539
540static int collect_image_check(BlockDriverState *bs,
541 ImageCheck *check,
542 const char *filename,
543 const char *fmt,
544 int fix)
545{
546 int ret;
547 BdrvCheckResult result;
548
549 ret = bdrv_check(bs, &result, fix);
550 if (ret < 0) {
551 return ret;
552 }
553
554 check->filename = g_strdup(filename);
555 check->format = g_strdup(bdrv_get_format_name(bs));
556 check->check_errors = result.check_errors;
557 check->corruptions = result.corruptions;
558 check->has_corruptions = result.corruptions != 0;
559 check->leaks = result.leaks;
560 check->has_leaks = result.leaks != 0;
561 check->corruptions_fixed = result.corruptions_fixed;
562 check->has_corruptions_fixed = result.corruptions != 0;
563 check->leaks_fixed = result.leaks_fixed;
564 check->has_leaks_fixed = result.leaks != 0;
565 check->image_end_offset = result.image_end_offset;
566 check->has_image_end_offset = result.image_end_offset != 0;
567 check->total_clusters = result.bfi.total_clusters;
568 check->has_total_clusters = result.bfi.total_clusters != 0;
569 check->allocated_clusters = result.bfi.allocated_clusters;
570 check->has_allocated_clusters = result.bfi.allocated_clusters != 0;
571 check->fragmented_clusters = result.bfi.fragmented_clusters;
572 check->has_fragmented_clusters = result.bfi.fragmented_clusters != 0;
e6439d78
SH
573 check->compressed_clusters = result.bfi.compressed_clusters;
574 check->has_compressed_clusters = result.bfi.compressed_clusters != 0;
8599ea4c
FS
575
576 return 0;
577}
578
e076f338
KW
579/*
580 * Checks an image for consistency. Exit codes:
581 *
582 * 0 - Check completed, image is good
583 * 1 - Check not completed because of internal errors
584 * 2 - Check completed, image is corrupted
585 * 3 - Check completed, image has leaked clusters, but is good otherwise
586 */
1585969c
AL
587static int img_check(int argc, char **argv)
588{
589 int c, ret;
8599ea4c
FS
590 OutputFormat output_format = OFORMAT_HUMAN;
591 const char *filename, *fmt, *output;
1585969c 592 BlockDriverState *bs;
4534ff54 593 int fix = 0;
058f8f16 594 int flags = BDRV_O_FLAGS | BDRV_O_CHECK;
8599ea4c 595 ImageCheck *check;
f382d43a 596 bool quiet = false;
1585969c
AL
597
598 fmt = NULL;
8599ea4c 599 output = NULL;
1585969c 600 for(;;) {
8599ea4c
FS
601 int option_index = 0;
602 static const struct option long_options[] = {
603 {"help", no_argument, 0, 'h'},
604 {"format", required_argument, 0, 'f'},
4fd6a984 605 {"repair", required_argument, 0, 'r'},
8599ea4c
FS
606 {"output", required_argument, 0, OPTION_OUTPUT},
607 {0, 0, 0, 0}
608 };
f382d43a 609 c = getopt_long(argc, argv, "f:hr:q",
8599ea4c 610 long_options, &option_index);
b8fb60da 611 if (c == -1) {
1585969c 612 break;
b8fb60da 613 }
1585969c 614 switch(c) {
ef87394c 615 case '?':
1585969c
AL
616 case 'h':
617 help();
618 break;
619 case 'f':
620 fmt = optarg;
621 break;
4534ff54
KW
622 case 'r':
623 flags |= BDRV_O_RDWR;
624
625 if (!strcmp(optarg, "leaks")) {
626 fix = BDRV_FIX_LEAKS;
627 } else if (!strcmp(optarg, "all")) {
628 fix = BDRV_FIX_LEAKS | BDRV_FIX_ERRORS;
629 } else {
ac1307ab
FZ
630 error_exit("Unknown option value for -r "
631 "(expecting 'leaks' or 'all'): %s", optarg);
4534ff54
KW
632 }
633 break;
8599ea4c
FS
634 case OPTION_OUTPUT:
635 output = optarg;
636 break;
f382d43a
MR
637 case 'q':
638 quiet = true;
639 break;
1585969c
AL
640 }
641 }
fc11eb26 642 if (optind != argc - 1) {
ac1307ab 643 error_exit("Expecting one image file name");
b8fb60da 644 }
1585969c
AL
645 filename = argv[optind++];
646
8599ea4c
FS
647 if (output && !strcmp(output, "json")) {
648 output_format = OFORMAT_JSON;
649 } else if (output && !strcmp(output, "human")) {
650 output_format = OFORMAT_HUMAN;
651 } else if (output) {
652 error_report("--output must be used with human or json as argument.");
653 return 1;
654 }
655
9ffe3332 656 bs = bdrv_new_open("image", filename, fmt, flags, true, quiet);
c2abccec
MK
657 if (!bs) {
658 return 1;
659 }
8599ea4c
FS
660
661 check = g_new0(ImageCheck, 1);
662 ret = collect_image_check(bs, check, filename, fmt, fix);
e076f338
KW
663
664 if (ret == -ENOTSUP) {
8599ea4c
FS
665 if (output_format == OFORMAT_HUMAN) {
666 error_report("This image format does not support checks");
667 }
fefddf95 668 ret = 63;
8599ea4c 669 goto fail;
e076f338
KW
670 }
671
8599ea4c
FS
672 if (check->corruptions_fixed || check->leaks_fixed) {
673 int corruptions_fixed, leaks_fixed;
ccf34716 674
8599ea4c
FS
675 leaks_fixed = check->leaks_fixed;
676 corruptions_fixed = check->corruptions_fixed;
e076f338 677
8599ea4c 678 if (output_format == OFORMAT_HUMAN) {
f382d43a
MR
679 qprintf(quiet,
680 "The following inconsistencies were found and repaired:\n\n"
681 " %" PRId64 " leaked clusters\n"
682 " %" PRId64 " corruptions\n\n"
683 "Double checking the fixed image now...\n",
684 check->leaks_fixed,
685 check->corruptions_fixed);
e076f338
KW
686 }
687
8599ea4c 688 ret = collect_image_check(bs, check, filename, fmt, 0);
1585969c 689
8599ea4c
FS
690 check->leaks_fixed = leaks_fixed;
691 check->corruptions_fixed = corruptions_fixed;
f8111c24
DXW
692 }
693
8599ea4c
FS
694 switch (output_format) {
695 case OFORMAT_HUMAN:
f382d43a 696 dump_human_image_check(check, quiet);
8599ea4c
FS
697 break;
698 case OFORMAT_JSON:
f382d43a 699 dump_json_image_check(check, quiet);
8599ea4c 700 break;
c6bb9ad1
FS
701 }
702
8599ea4c
FS
703 if (ret || check->check_errors) {
704 ret = 1;
705 goto fail;
c2abccec 706 }
e076f338 707
8599ea4c
FS
708 if (check->corruptions) {
709 ret = 2;
710 } else if (check->leaks) {
711 ret = 3;
e076f338 712 } else {
8599ea4c 713 ret = 0;
e076f338 714 }
8599ea4c
FS
715
716fail:
717 qapi_free_ImageCheck(check);
4f6fd349 718 bdrv_unref(bs);
8599ea4c
FS
719
720 return ret;
1585969c
AL
721}
722
ea2384d3
FB
723static int img_commit(int argc, char **argv)
724{
661a0f71
FS
725 int c, ret, flags;
726 const char *filename, *fmt, *cache;
ea2384d3 727 BlockDriverState *bs;
f382d43a 728 bool quiet = false;
ea2384d3
FB
729
730 fmt = NULL;
661a0f71 731 cache = BDRV_DEFAULT_CACHE;
ea2384d3 732 for(;;) {
f382d43a 733 c = getopt(argc, argv, "f:ht:q");
b8fb60da 734 if (c == -1) {
ea2384d3 735 break;
b8fb60da 736 }
ea2384d3 737 switch(c) {
ef87394c 738 case '?':
ea2384d3
FB
739 case 'h':
740 help();
741 break;
742 case 'f':
743 fmt = optarg;
744 break;
661a0f71
FS
745 case 't':
746 cache = optarg;
747 break;
f382d43a
MR
748 case 'q':
749 quiet = true;
750 break;
ea2384d3
FB
751 }
752 }
fc11eb26 753 if (optind != argc - 1) {
ac1307ab 754 error_exit("Expecting one image file name");
b8fb60da 755 }
ea2384d3
FB
756 filename = argv[optind++];
757
661a0f71 758 flags = BDRV_O_RDWR;
c3993cdc 759 ret = bdrv_parse_cache_flags(cache, &flags);
661a0f71
FS
760 if (ret < 0) {
761 error_report("Invalid cache option: %s", cache);
762 return -1;
763 }
764
9ffe3332 765 bs = bdrv_new_open("image", filename, fmt, flags, true, quiet);
c2abccec
MK
766 if (!bs) {
767 return 1;
768 }
ea2384d3
FB
769 ret = bdrv_commit(bs);
770 switch(ret) {
771 case 0:
f382d43a 772 qprintf(quiet, "Image committed.\n");
ea2384d3
FB
773 break;
774 case -ENOENT:
15654a6d 775 error_report("No disk inserted");
ea2384d3
FB
776 break;
777 case -EACCES:
15654a6d 778 error_report("Image is read-only");
ea2384d3
FB
779 break;
780 case -ENOTSUP:
15654a6d 781 error_report("Image is already committed");
ea2384d3
FB
782 break;
783 default:
15654a6d 784 error_report("Error while committing image");
ea2384d3
FB
785 break;
786 }
787
4f6fd349 788 bdrv_unref(bs);
c2abccec
MK
789 if (ret) {
790 return 1;
791 }
ea2384d3
FB
792 return 0;
793}
794
f58c7b35
TS
795/*
796 * Returns true iff the first sector pointed to by 'buf' contains at least
797 * a non-NUL byte.
798 *
799 * 'pnum' is set to the number of sectors (including and immediately following
800 * the first one) that are known to be in the same allocated/unallocated state.
801 */
ea2384d3
FB
802static int is_allocated_sectors(const uint8_t *buf, int n, int *pnum)
803{
1a6d39fd
SH
804 bool is_zero;
805 int i;
ea2384d3
FB
806
807 if (n <= 0) {
808 *pnum = 0;
809 return 0;
810 }
1a6d39fd 811 is_zero = buffer_is_zero(buf, 512);
ea2384d3
FB
812 for(i = 1; i < n; i++) {
813 buf += 512;
1a6d39fd 814 if (is_zero != buffer_is_zero(buf, 512)) {
ea2384d3 815 break;
1a6d39fd 816 }
ea2384d3
FB
817 }
818 *pnum = i;
1a6d39fd 819 return !is_zero;
ea2384d3
FB
820}
821
a22f123c
KW
822/*
823 * Like is_allocated_sectors, but if the buffer starts with a used sector,
824 * up to 'min' consecutive sectors containing zeros are ignored. This avoids
825 * breaking up write requests for only small sparse areas.
826 */
827static int is_allocated_sectors_min(const uint8_t *buf, int n, int *pnum,
828 int min)
829{
830 int ret;
831 int num_checked, num_used;
832
833 if (n < min) {
834 min = n;
835 }
836
837 ret = is_allocated_sectors(buf, n, pnum);
838 if (!ret) {
839 return ret;
840 }
841
842 num_used = *pnum;
843 buf += BDRV_SECTOR_SIZE * *pnum;
844 n -= *pnum;
845 num_checked = num_used;
846
847 while (n > 0) {
848 ret = is_allocated_sectors(buf, n, pnum);
849
850 buf += BDRV_SECTOR_SIZE * *pnum;
851 n -= *pnum;
852 num_checked += *pnum;
853 if (ret) {
854 num_used = num_checked;
855 } else if (*pnum >= min) {
856 break;
857 }
858 }
859
860 *pnum = num_used;
861 return 1;
862}
863
3e85c6fd
KW
864/*
865 * Compares two buffers sector by sector. Returns 0 if the first sector of both
866 * buffers matches, non-zero otherwise.
867 *
868 * pnum is set to the number of sectors (including and immediately following
869 * the first one) that are known to have the same comparison result
870 */
871static int compare_sectors(const uint8_t *buf1, const uint8_t *buf2, int n,
872 int *pnum)
873{
874 int res, i;
875
876 if (n <= 0) {
877 *pnum = 0;
878 return 0;
879 }
880
881 res = !!memcmp(buf1, buf2, 512);
882 for(i = 1; i < n; i++) {
883 buf1 += 512;
884 buf2 += 512;
885
886 if (!!memcmp(buf1, buf2, 512) != res) {
887 break;
888 }
889 }
890
891 *pnum = i;
892 return res;
893}
894
80ee15a6 895#define IO_BUF_SIZE (2 * 1024 * 1024)
ea2384d3 896
d14ed18c
MR
897static int64_t sectors_to_bytes(int64_t sectors)
898{
899 return sectors << BDRV_SECTOR_BITS;
900}
901
902static int64_t sectors_to_process(int64_t total, int64_t from)
903{
904 return MIN(total - from, IO_BUF_SIZE >> BDRV_SECTOR_BITS);
905}
906
907/*
908 * Check if passed sectors are empty (not allocated or contain only 0 bytes)
909 *
910 * Returns 0 in case sectors are filled with 0, 1 if sectors contain non-zero
911 * data and negative value on error.
912 *
913 * @param bs: Driver used for accessing file
914 * @param sect_num: Number of first sector to check
915 * @param sect_count: Number of sectors to check
916 * @param filename: Name of disk file we are checking (logging purpose)
917 * @param buffer: Allocated buffer for storing read data
918 * @param quiet: Flag for quiet mode
919 */
920static int check_empty_sectors(BlockDriverState *bs, int64_t sect_num,
921 int sect_count, const char *filename,
922 uint8_t *buffer, bool quiet)
923{
924 int pnum, ret = 0;
925 ret = bdrv_read(bs, sect_num, buffer, sect_count);
926 if (ret < 0) {
927 error_report("Error while reading offset %" PRId64 " of %s: %s",
928 sectors_to_bytes(sect_num), filename, strerror(-ret));
929 return ret;
930 }
931 ret = is_allocated_sectors(buffer, sect_count, &pnum);
932 if (ret || pnum != sect_count) {
933 qprintf(quiet, "Content mismatch at offset %" PRId64 "!\n",
934 sectors_to_bytes(ret ? sect_num : sect_num + pnum));
935 return 1;
936 }
937
938 return 0;
939}
940
941/*
942 * Compares two images. Exit codes:
943 *
944 * 0 - Images are identical
945 * 1 - Images differ
946 * >1 - Error occurred
947 */
948static int img_compare(int argc, char **argv)
949{
950 const char *fmt1 = NULL, *fmt2 = NULL, *filename1, *filename2;
951 BlockDriverState *bs1, *bs2;
952 int64_t total_sectors1, total_sectors2;
953 uint8_t *buf1 = NULL, *buf2 = NULL;
954 int pnum1, pnum2;
955 int allocated1, allocated2;
956 int ret = 0; /* return value - 0 Ident, 1 Different, >1 Error */
957 bool progress = false, quiet = false, strict = false;
958 int64_t total_sectors;
959 int64_t sector_num = 0;
960 int64_t nb_sectors;
961 int c, pnum;
962 uint64_t bs_sectors;
963 uint64_t progress_base;
964
965 for (;;) {
966 c = getopt(argc, argv, "hpf:F:sq");
967 if (c == -1) {
968 break;
969 }
970 switch (c) {
971 case '?':
972 case 'h':
973 help();
974 break;
975 case 'f':
976 fmt1 = optarg;
977 break;
978 case 'F':
979 fmt2 = optarg;
980 break;
981 case 'p':
982 progress = true;
983 break;
984 case 'q':
985 quiet = true;
986 break;
987 case 's':
988 strict = true;
989 break;
990 }
991 }
992
993 /* Progress is not shown in Quiet mode */
994 if (quiet) {
995 progress = false;
996 }
997
998
fc11eb26 999 if (optind != argc - 2) {
ac1307ab 1000 error_exit("Expecting two image file names");
d14ed18c
MR
1001 }
1002 filename1 = argv[optind++];
1003 filename2 = argv[optind++];
1004
1005 /* Initialize before goto out */
1006 qemu_progress_init(progress, 2.0);
1007
9ffe3332 1008 bs1 = bdrv_new_open("image 1", filename1, fmt1, BDRV_O_FLAGS, true, quiet);
d14ed18c
MR
1009 if (!bs1) {
1010 error_report("Can't open file %s", filename1);
1011 ret = 2;
1012 goto out3;
1013 }
1014
9ffe3332 1015 bs2 = bdrv_new_open("image 2", filename2, fmt2, BDRV_O_FLAGS, true, quiet);
d14ed18c
MR
1016 if (!bs2) {
1017 error_report("Can't open file %s", filename2);
1018 ret = 2;
1019 goto out2;
1020 }
1021
1022 buf1 = qemu_blockalign(bs1, IO_BUF_SIZE);
1023 buf2 = qemu_blockalign(bs2, IO_BUF_SIZE);
1024 bdrv_get_geometry(bs1, &bs_sectors);
1025 total_sectors1 = bs_sectors;
1026 bdrv_get_geometry(bs2, &bs_sectors);
1027 total_sectors2 = bs_sectors;
1028 total_sectors = MIN(total_sectors1, total_sectors2);
1029 progress_base = MAX(total_sectors1, total_sectors2);
1030
1031 qemu_progress_print(0, 100);
1032
1033 if (strict && total_sectors1 != total_sectors2) {
1034 ret = 1;
1035 qprintf(quiet, "Strict mode: Image size mismatch!\n");
1036 goto out;
1037 }
1038
1039 for (;;) {
1040 nb_sectors = sectors_to_process(total_sectors, sector_num);
1041 if (nb_sectors <= 0) {
1042 break;
1043 }
1044 allocated1 = bdrv_is_allocated_above(bs1, NULL, sector_num, nb_sectors,
1045 &pnum1);
1046 if (allocated1 < 0) {
1047 ret = 3;
1048 error_report("Sector allocation test failed for %s", filename1);
1049 goto out;
1050 }
1051
1052 allocated2 = bdrv_is_allocated_above(bs2, NULL, sector_num, nb_sectors,
1053 &pnum2);
1054 if (allocated2 < 0) {
1055 ret = 3;
1056 error_report("Sector allocation test failed for %s", filename2);
1057 goto out;
1058 }
1059 nb_sectors = MIN(pnum1, pnum2);
1060
1061 if (allocated1 == allocated2) {
1062 if (allocated1) {
1063 ret = bdrv_read(bs1, sector_num, buf1, nb_sectors);
1064 if (ret < 0) {
1065 error_report("Error while reading offset %" PRId64 " of %s:"
1066 " %s", sectors_to_bytes(sector_num), filename1,
1067 strerror(-ret));
1068 ret = 4;
1069 goto out;
1070 }
1071 ret = bdrv_read(bs2, sector_num, buf2, nb_sectors);
1072 if (ret < 0) {
1073 error_report("Error while reading offset %" PRId64
1074 " of %s: %s", sectors_to_bytes(sector_num),
1075 filename2, strerror(-ret));
1076 ret = 4;
1077 goto out;
1078 }
1079 ret = compare_sectors(buf1, buf2, nb_sectors, &pnum);
1080 if (ret || pnum != nb_sectors) {
d14ed18c
MR
1081 qprintf(quiet, "Content mismatch at offset %" PRId64 "!\n",
1082 sectors_to_bytes(
1083 ret ? sector_num : sector_num + pnum));
36452f12 1084 ret = 1;
d14ed18c
MR
1085 goto out;
1086 }
1087 }
1088 } else {
1089 if (strict) {
1090 ret = 1;
1091 qprintf(quiet, "Strict mode: Offset %" PRId64
1092 " allocation mismatch!\n",
1093 sectors_to_bytes(sector_num));
1094 goto out;
1095 }
1096
1097 if (allocated1) {
1098 ret = check_empty_sectors(bs1, sector_num, nb_sectors,
1099 filename1, buf1, quiet);
1100 } else {
1101 ret = check_empty_sectors(bs2, sector_num, nb_sectors,
1102 filename2, buf1, quiet);
1103 }
1104 if (ret) {
1105 if (ret < 0) {
d14ed18c
MR
1106 error_report("Error while reading offset %" PRId64 ": %s",
1107 sectors_to_bytes(sector_num), strerror(-ret));
36452f12 1108 ret = 4;
d14ed18c
MR
1109 }
1110 goto out;
1111 }
1112 }
1113 sector_num += nb_sectors;
1114 qemu_progress_print(((float) nb_sectors / progress_base)*100, 100);
1115 }
1116
1117 if (total_sectors1 != total_sectors2) {
1118 BlockDriverState *bs_over;
1119 int64_t total_sectors_over;
1120 const char *filename_over;
1121
1122 qprintf(quiet, "Warning: Image size mismatch!\n");
1123 if (total_sectors1 > total_sectors2) {
1124 total_sectors_over = total_sectors1;
1125 bs_over = bs1;
1126 filename_over = filename1;
1127 } else {
1128 total_sectors_over = total_sectors2;
1129 bs_over = bs2;
1130 filename_over = filename2;
1131 }
1132
1133 for (;;) {
1134 nb_sectors = sectors_to_process(total_sectors_over, sector_num);
1135 if (nb_sectors <= 0) {
1136 break;
1137 }
1138 ret = bdrv_is_allocated_above(bs_over, NULL, sector_num,
1139 nb_sectors, &pnum);
1140 if (ret < 0) {
1141 ret = 3;
1142 error_report("Sector allocation test failed for %s",
1143 filename_over);
1144 goto out;
1145
1146 }
1147 nb_sectors = pnum;
1148 if (ret) {
1149 ret = check_empty_sectors(bs_over, sector_num, nb_sectors,
1150 filename_over, buf1, quiet);
1151 if (ret) {
1152 if (ret < 0) {
d14ed18c
MR
1153 error_report("Error while reading offset %" PRId64
1154 " of %s: %s", sectors_to_bytes(sector_num),
1155 filename_over, strerror(-ret));
36452f12 1156 ret = 4;
d14ed18c
MR
1157 }
1158 goto out;
1159 }
1160 }
1161 sector_num += nb_sectors;
1162 qemu_progress_print(((float) nb_sectors / progress_base)*100, 100);
1163 }
1164 }
1165
1166 qprintf(quiet, "Images are identical.\n");
1167 ret = 0;
1168
1169out:
4f6fd349 1170 bdrv_unref(bs2);
d14ed18c
MR
1171 qemu_vfree(buf1);
1172 qemu_vfree(buf2);
1173out2:
4f6fd349 1174 bdrv_unref(bs1);
d14ed18c
MR
1175out3:
1176 qemu_progress_end();
1177 return ret;
1178}
1179
ea2384d3
FB
1180static int img_convert(int argc, char **argv)
1181{
24f833cd 1182 int c, n, n1, bs_n, bs_i, compress, cluster_sectors, skip_create;
13c28af8 1183 int64_t ret = 0;
661a0f71
FS
1184 int progress = 0, flags;
1185 const char *fmt, *out_fmt, *cache, *out_baseimg, *out_filename;
b50cbabc 1186 BlockDriver *drv, *proto_drv;
c2abccec 1187 BlockDriverState **bs = NULL, *out_bs = NULL;
802c3d4c 1188 int64_t total_sectors, nb_sectors, sector_num, bs_offset;
96b8f136 1189 uint64_t bs_sectors;
c2abccec 1190 uint8_t * buf = NULL;
f2521c90 1191 size_t bufsectors = IO_BUF_SIZE / BDRV_SECTOR_SIZE;
ea2384d3 1192 const uint8_t *buf1;
faea38e7 1193 BlockDriverInfo bdi;
b50cbabc 1194 QEMUOptionParameter *param = NULL, *create_options = NULL;
a18953fb 1195 QEMUOptionParameter *out_baseimg_param;
efa84d43 1196 char *options = NULL;
51ef6727 1197 const char *snapshot_name = NULL;
a22f123c 1198 int min_sparse = 8; /* Need at least 4k of zeros for sparse detection */
f382d43a 1199 bool quiet = false;
cc84d90f 1200 Error *local_err = NULL;
ef80654d 1201 QemuOpts *sn_opts = NULL;
ea2384d3
FB
1202
1203 fmt = NULL;
1204 out_fmt = "raw";
661a0f71 1205 cache = "unsafe";
f58c7b35 1206 out_baseimg = NULL;
eec77d9e 1207 compress = 0;
b2e10493 1208 skip_create = 0;
ea2384d3 1209 for(;;) {
ef80654d 1210 c = getopt(argc, argv, "f:O:B:s:hce6o:pS:t:qnl:");
b8fb60da 1211 if (c == -1) {
ea2384d3 1212 break;
b8fb60da 1213 }
ea2384d3 1214 switch(c) {
ef87394c 1215 case '?':
ea2384d3
FB
1216 case 'h':
1217 help();
1218 break;
1219 case 'f':
1220 fmt = optarg;
1221 break;
1222 case 'O':
1223 out_fmt = optarg;
1224 break;
f58c7b35
TS
1225 case 'B':
1226 out_baseimg = optarg;
1227 break;
ea2384d3 1228 case 'c':
eec77d9e 1229 compress = 1;
ea2384d3
FB
1230 break;
1231 case 'e':
9d42e15d 1232 error_report("option -e is deprecated, please use \'-o "
eec77d9e 1233 "encryption\' instead!");
2dc8328b 1234 ret = -1;
64bb01aa 1235 goto fail_getopt;
ec36ba14 1236 case '6':
9d42e15d 1237 error_report("option -6 is deprecated, please use \'-o "
eec77d9e 1238 "compat6\' instead!");
2dc8328b 1239 ret = -1;
64bb01aa 1240 goto fail_getopt;
efa84d43 1241 case 'o':
2dc8328b
KW
1242 if (!is_valid_option_list(optarg)) {
1243 error_report("Invalid option list: %s", optarg);
1244 ret = -1;
64bb01aa 1245 goto fail_getopt;
2dc8328b
KW
1246 }
1247 if (!options) {
1248 options = g_strdup(optarg);
1249 } else {
1250 char *old_options = options;
1251 options = g_strdup_printf("%s,%s", options, optarg);
1252 g_free(old_options);
1253 }
efa84d43 1254 break;
51ef6727 1255 case 's':
1256 snapshot_name = optarg;
1257 break;
ef80654d
WX
1258 case 'l':
1259 if (strstart(optarg, SNAPSHOT_OPT_BASE, NULL)) {
1260 sn_opts = qemu_opts_parse(&internal_snapshot_opts, optarg, 0);
1261 if (!sn_opts) {
1262 error_report("Failed in parsing snapshot param '%s'",
1263 optarg);
2dc8328b 1264 ret = -1;
64bb01aa 1265 goto fail_getopt;
ef80654d
WX
1266 }
1267 } else {
1268 snapshot_name = optarg;
1269 }
1270 break;
a22f123c
KW
1271 case 'S':
1272 {
1273 int64_t sval;
e36b3695
MA
1274 char *end;
1275 sval = strtosz_suffix(optarg, &end, STRTOSZ_DEFSUFFIX_B);
1276 if (sval < 0 || *end) {
a22f123c 1277 error_report("Invalid minimum zero buffer size for sparse output specified");
2dc8328b 1278 ret = -1;
64bb01aa 1279 goto fail_getopt;
a22f123c
KW
1280 }
1281
1282 min_sparse = sval / BDRV_SECTOR_SIZE;
1283 break;
1284 }
6b837bc4
JS
1285 case 'p':
1286 progress = 1;
1287 break;
661a0f71
FS
1288 case 't':
1289 cache = optarg;
1290 break;
f382d43a
MR
1291 case 'q':
1292 quiet = true;
1293 break;
b2e10493
AD
1294 case 'n':
1295 skip_create = 1;
1296 break;
ea2384d3
FB
1297 }
1298 }
3b46e624 1299
64bb01aa 1300 /* Initialize before goto out */
f382d43a
MR
1301 if (quiet) {
1302 progress = 0;
1303 }
64bb01aa
KW
1304 qemu_progress_init(progress, 1.0);
1305
f382d43a 1306
926c2d23 1307 bs_n = argc - optind - 1;
a283cb6e 1308 out_filename = bs_n >= 1 ? argv[argc - 1] : NULL;
f58c7b35 1309
2dc8328b 1310 if (options && has_help_option(options)) {
4ac8aacd
JS
1311 ret = print_block_option_help(out_filename, out_fmt);
1312 goto out;
1313 }
1314
a283cb6e 1315 if (bs_n < 1) {
ac1307ab 1316 error_exit("Must specify image file name");
a283cb6e
KW
1317 }
1318
1319
c2abccec 1320 if (bs_n > 1 && out_baseimg) {
15654a6d
JS
1321 error_report("-B makes no sense when concatenating multiple input "
1322 "images");
31ca34b8
JS
1323 ret = -1;
1324 goto out;
c2abccec 1325 }
f8111c24 1326
6b837bc4
JS
1327 qemu_progress_print(0, 100);
1328
7267c094 1329 bs = g_malloc0(bs_n * sizeof(BlockDriverState *));
926c2d23
AZ
1330
1331 total_sectors = 0;
1332 for (bs_i = 0; bs_i < bs_n; bs_i++) {
9ffe3332
KW
1333 char *id = bs_n > 1 ? g_strdup_printf("source %d", bs_i)
1334 : g_strdup("source");
1335 bs[bs_i] = bdrv_new_open(id, argv[optind + bs_i], fmt, BDRV_O_FLAGS,
1336 true, quiet);
1337 g_free(id);
c2abccec 1338 if (!bs[bs_i]) {
15654a6d 1339 error_report("Could not open '%s'", argv[optind + bs_i]);
c2abccec
MK
1340 ret = -1;
1341 goto out;
1342 }
926c2d23
AZ
1343 bdrv_get_geometry(bs[bs_i], &bs_sectors);
1344 total_sectors += bs_sectors;
1345 }
ea2384d3 1346
ef80654d
WX
1347 if (sn_opts) {
1348 ret = bdrv_snapshot_load_tmp(bs[0],
1349 qemu_opt_get(sn_opts, SNAPSHOT_OPT_ID),
1350 qemu_opt_get(sn_opts, SNAPSHOT_OPT_NAME),
1351 &local_err);
1352 } else if (snapshot_name != NULL) {
51ef6727 1353 if (bs_n > 1) {
6daf194d 1354 error_report("No support for concatenating multiple snapshot");
51ef6727 1355 ret = -1;
1356 goto out;
1357 }
7b4c4781
WX
1358
1359 bdrv_snapshot_load_tmp_by_id_or_name(bs[0], snapshot_name, &local_err);
ef80654d 1360 }
84d18f06 1361 if (local_err) {
ef80654d
WX
1362 error_report("Failed to load snapshot: %s",
1363 error_get_pretty(local_err));
1364 error_free(local_err);
1365 ret = -1;
1366 goto out;
51ef6727 1367 }
1368
efa84d43 1369 /* Find driver and parse its options */
ea2384d3 1370 drv = bdrv_find_format(out_fmt);
c2abccec 1371 if (!drv) {
15654a6d 1372 error_report("Unknown file format '%s'", out_fmt);
c2abccec
MK
1373 ret = -1;
1374 goto out;
1375 }
efa84d43 1376
98289620 1377 proto_drv = bdrv_find_protocol(out_filename, true);
c2abccec 1378 if (!proto_drv) {
15654a6d 1379 error_report("Unknown protocol '%s'", out_filename);
c2abccec
MK
1380 ret = -1;
1381 goto out;
1382 }
b50cbabc
MK
1383
1384 create_options = append_option_parameters(create_options,
1385 drv->create_options);
1386 create_options = append_option_parameters(create_options,
1387 proto_drv->create_options);
db08adf5 1388
efa84d43 1389 if (options) {
b50cbabc 1390 param = parse_option_parameters(options, create_options, param);
efa84d43 1391 if (param == NULL) {
15654a6d 1392 error_report("Invalid options for file format '%s'.", out_fmt);
c2abccec
MK
1393 ret = -1;
1394 goto out;
efa84d43
KW
1395 }
1396 } else {
b50cbabc 1397 param = parse_option_parameters("", create_options, param);
efa84d43
KW
1398 }
1399
1400 set_option_parameter_int(param, BLOCK_OPT_SIZE, total_sectors * 512);
eec77d9e 1401 ret = add_old_style_options(out_fmt, param, out_baseimg, NULL);
c2abccec
MK
1402 if (ret < 0) {
1403 goto out;
1404 }
efa84d43 1405
a18953fb
KW
1406 /* Get backing file name if -o backing_file was used */
1407 out_baseimg_param = get_option_parameter(param, BLOCK_OPT_BACKING_FILE);
1408 if (out_baseimg_param) {
1409 out_baseimg = out_baseimg_param->value.s;
1410 }
1411
efa84d43 1412 /* Check if compression is supported */
eec77d9e 1413 if (compress) {
efa84d43
KW
1414 QEMUOptionParameter *encryption =
1415 get_option_parameter(param, BLOCK_OPT_ENCRYPT);
41521fa4
KW
1416 QEMUOptionParameter *preallocation =
1417 get_option_parameter(param, BLOCK_OPT_PREALLOC);
efa84d43
KW
1418
1419 if (!drv->bdrv_write_compressed) {
15654a6d 1420 error_report("Compression not supported for this file format");
c2abccec
MK
1421 ret = -1;
1422 goto out;
efa84d43
KW
1423 }
1424
1425 if (encryption && encryption->value.n) {
15654a6d
JS
1426 error_report("Compression and encryption not supported at "
1427 "the same time");
c2abccec
MK
1428 ret = -1;
1429 goto out;
efa84d43 1430 }
41521fa4
KW
1431
1432 if (preallocation && preallocation->value.s
1433 && strcmp(preallocation->value.s, "off"))
1434 {
1435 error_report("Compression and preallocation not supported at "
1436 "the same time");
1437 ret = -1;
1438 goto out;
1439 }
efa84d43
KW
1440 }
1441
b2e10493
AD
1442 if (!skip_create) {
1443 /* Create the new image */
cc84d90f 1444 ret = bdrv_create(drv, out_filename, param, &local_err);
b2e10493 1445 if (ret < 0) {
cc84d90f
HR
1446 error_report("%s: error while converting %s: %s",
1447 out_filename, out_fmt, error_get_pretty(local_err));
1448 error_free(local_err);
b2e10493 1449 goto out;
ea2384d3
FB
1450 }
1451 }
3b46e624 1452
5a37b60a 1453 flags = min_sparse ? (BDRV_O_RDWR | BDRV_O_UNMAP) : BDRV_O_RDWR;
c3993cdc 1454 ret = bdrv_parse_cache_flags(cache, &flags);
661a0f71
FS
1455 if (ret < 0) {
1456 error_report("Invalid cache option: %s", cache);
1457 return -1;
1458 }
1459
9ffe3332 1460 out_bs = bdrv_new_open("target", out_filename, out_fmt, flags, true, quiet);
c2abccec
MK
1461 if (!out_bs) {
1462 ret = -1;
1463 goto out;
1464 }
ea2384d3 1465
926c2d23
AZ
1466 bs_i = 0;
1467 bs_offset = 0;
1468 bdrv_get_geometry(bs[0], &bs_sectors);
f2521c90
PL
1469
1470 /* increase bufsectors from the default 4096 (2M) if opt_transfer_length
1471 * or discard_alignment of the out_bs is greater. Limit to 32768 (16MB)
1472 * as maximum. */
1473 bufsectors = MIN(32768,
1474 MAX(bufsectors, MAX(out_bs->bl.opt_transfer_length,
1475 out_bs->bl.discard_alignment))
1476 );
1477
1478 buf = qemu_blockalign(out_bs, bufsectors * BDRV_SECTOR_SIZE);
926c2d23 1479
b2e10493
AD
1480 if (skip_create) {
1481 int64_t output_length = bdrv_getlength(out_bs);
1482 if (output_length < 0) {
1483 error_report("unable to get output image length: %s\n",
1484 strerror(-output_length));
1485 ret = -1;
1486 goto out;
1487 } else if (output_length < total_sectors << BDRV_SECTOR_BITS) {
1488 error_report("output file is smaller than input file");
1489 ret = -1;
1490 goto out;
1491 }
1492 }
1493
24f833cd
PL
1494 cluster_sectors = 0;
1495 ret = bdrv_get_info(out_bs, &bdi);
1496 if (ret < 0) {
1497 if (compress) {
15654a6d 1498 error_report("could not get block driver info");
c2abccec
MK
1499 goto out;
1500 }
24f833cd 1501 } else {
85f49cad 1502 compress = compress || bdi.needs_compressed_writes;
24f833cd
PL
1503 cluster_sectors = bdi.cluster_size / BDRV_SECTOR_SIZE;
1504 }
1505
1506 if (compress) {
1507 if (cluster_sectors <= 0 || cluster_sectors > bufsectors) {
15654a6d 1508 error_report("invalid cluster size");
c2abccec
MK
1509 ret = -1;
1510 goto out;
1511 }
ea2384d3 1512 sector_num = 0;
6b837bc4
JS
1513
1514 nb_sectors = total_sectors;
6b837bc4 1515
ea2384d3 1516 for(;;) {
926c2d23
AZ
1517 int64_t bs_num;
1518 int remainder;
1519 uint8_t *buf2;
1520
ea2384d3
FB
1521 nb_sectors = total_sectors - sector_num;
1522 if (nb_sectors <= 0)
1523 break;
1524 if (nb_sectors >= cluster_sectors)
1525 n = cluster_sectors;
1526 else
1527 n = nb_sectors;
926c2d23
AZ
1528
1529 bs_num = sector_num - bs_offset;
1530 assert (bs_num >= 0);
1531 remainder = n;
1532 buf2 = buf;
1533 while (remainder > 0) {
1534 int nlow;
1535 while (bs_num == bs_sectors) {
1536 bs_i++;
1537 assert (bs_i < bs_n);
1538 bs_offset += bs_sectors;
1539 bdrv_get_geometry(bs[bs_i], &bs_sectors);
1540 bs_num = 0;
0bfcd599
BS
1541 /* printf("changing part: sector_num=%" PRId64 ", "
1542 "bs_i=%d, bs_offset=%" PRId64 ", bs_sectors=%" PRId64
1543 "\n", sector_num, bs_i, bs_offset, bs_sectors); */
926c2d23
AZ
1544 }
1545 assert (bs_num < bs_sectors);
1546
1547 nlow = (remainder > bs_sectors - bs_num) ? bs_sectors - bs_num : remainder;
1548
c2abccec
MK
1549 ret = bdrv_read(bs[bs_i], bs_num, buf2, nlow);
1550 if (ret < 0) {
3fba9d81
SH
1551 error_report("error while reading sector %" PRId64 ": %s",
1552 bs_num, strerror(-ret));
c2abccec
MK
1553 goto out;
1554 }
926c2d23
AZ
1555
1556 buf2 += nlow * 512;
1557 bs_num += nlow;
1558
1559 remainder -= nlow;
1560 }
1561 assert (remainder == 0);
1562
54f106d5
SH
1563 if (!buffer_is_zero(buf, n * BDRV_SECTOR_SIZE)) {
1564 ret = bdrv_write_compressed(out_bs, sector_num, buf, n);
c2abccec 1565 if (ret != 0) {
3fba9d81
SH
1566 error_report("error while compressing sector %" PRId64
1567 ": %s", sector_num, strerror(-ret));
c2abccec
MK
1568 goto out;
1569 }
ea2384d3
FB
1570 }
1571 sector_num += n;
13c28af8 1572 qemu_progress_print(100.0 * sector_num / total_sectors, 0);
ea2384d3 1573 }
faea38e7
FB
1574 /* signal EOF to align */
1575 bdrv_write_compressed(out_bs, 0, NULL, 0);
ea2384d3 1576 } else {
802c3d4c
PL
1577 int64_t sectors_to_read, sectors_read, sector_num_next_status;
1578 bool count_allocated_sectors;
11b6699a 1579 int has_zero_init = min_sparse ? bdrv_has_zero_init(out_bs) : 0;
f2feebbd 1580
5a37b60a
PL
1581 if (!has_zero_init && bdrv_can_write_zeroes_with_unmap(out_bs)) {
1582 ret = bdrv_make_zero(out_bs, BDRV_REQ_MAY_UNMAP);
1583 if (ret < 0) {
1584 goto out;
1585 }
1586 has_zero_init = 1;
1587 }
1588
802c3d4c
PL
1589 sectors_to_read = total_sectors;
1590 count_allocated_sectors = progress && (out_baseimg || has_zero_init);
1591restart:
f58c7b35 1592 sector_num = 0; // total number of sectors converted so far
802c3d4c
PL
1593 sectors_read = 0;
1594 sector_num_next_status = 0;
6b837bc4 1595
ea2384d3
FB
1596 for(;;) {
1597 nb_sectors = total_sectors - sector_num;
b8fb60da 1598 if (nb_sectors <= 0) {
802c3d4c
PL
1599 if (count_allocated_sectors) {
1600 sectors_to_read = sectors_read;
1601 count_allocated_sectors = false;
1602 goto restart;
1603 }
13c28af8 1604 ret = 0;
ea2384d3 1605 break;
b8fb60da 1606 }
926c2d23
AZ
1607
1608 while (sector_num - bs_offset >= bs_sectors) {
1609 bs_i ++;
1610 assert (bs_i < bs_n);
1611 bs_offset += bs_sectors;
1612 bdrv_get_geometry(bs[bs_i], &bs_sectors);
0bfcd599
BS
1613 /* printf("changing part: sector_num=%" PRId64 ", bs_i=%d, "
1614 "bs_offset=%" PRId64 ", bs_sectors=%" PRId64 "\n",
926c2d23
AZ
1615 sector_num, bs_i, bs_offset, bs_sectors); */
1616 }
1617
13c28af8
PL
1618 if ((out_baseimg || has_zero_init) &&
1619 sector_num >= sector_num_next_status) {
1620 n = nb_sectors > INT_MAX ? INT_MAX : nb_sectors;
1621 ret = bdrv_get_block_status(bs[bs_i], sector_num - bs_offset,
1622 n, &n1);
e4a86f88 1623 if (ret < 0) {
13c28af8
PL
1624 error_report("error while reading block status of sector %"
1625 PRId64 ": %s", sector_num - bs_offset,
1626 strerror(-ret));
e4a86f88
PB
1627 goto out;
1628 }
13c28af8
PL
1629 /* If the output image is zero initialized, we are not working
1630 * on a shared base and the input is zero we can skip the next
1631 * n1 sectors */
1632 if (has_zero_init && !out_baseimg && (ret & BDRV_BLOCK_ZERO)) {
e4a86f88
PB
1633 sector_num += n1;
1634 continue;
93c65b47 1635 }
13c28af8
PL
1636 /* If the output image is being created as a copy on write
1637 * image, assume that sectors which are unallocated in the
1638 * input image are present in both the output's and input's
1639 * base images (no need to copy them). */
1640 if (out_baseimg) {
1641 if (!(ret & BDRV_BLOCK_DATA)) {
1642 sector_num += n1;
1643 continue;
1644 }
1645 /* The next 'n1' sectors are allocated in the input image.
1646 * Copy only those as they may be followed by unallocated
1647 * sectors. */
1648 nb_sectors = n1;
1649 }
1650 /* avoid redundant callouts to get_block_status */
1651 sector_num_next_status = sector_num + n1;
f58c7b35
TS
1652 }
1653
f2521c90 1654 n = MIN(nb_sectors, bufsectors);
24f833cd
PL
1655
1656 /* round down request length to an aligned sector, but
1657 * do not bother doing this on short requests. They happen
1658 * when we found an all-zero area, and the next sector to
1659 * write will not be sector_num + n. */
1660 if (cluster_sectors > 0 && n >= cluster_sectors) {
1661 int64_t next_aligned_sector = (sector_num + n);
1662 next_aligned_sector -= next_aligned_sector % cluster_sectors;
1663 if (sector_num + n > next_aligned_sector) {
1664 n = next_aligned_sector - sector_num;
1665 }
1666 }
1667
13c28af8 1668 n = MIN(n, bs_sectors - (sector_num - bs_offset));
13c28af8 1669
802c3d4c
PL
1670 sectors_read += n;
1671 if (count_allocated_sectors) {
1672 sector_num += n;
1673 continue;
1674 }
1675
1676 n1 = n;
c2abccec
MK
1677 ret = bdrv_read(bs[bs_i], sector_num - bs_offset, buf, n);
1678 if (ret < 0) {
3fba9d81
SH
1679 error_report("error while reading sector %" PRId64 ": %s",
1680 sector_num - bs_offset, strerror(-ret));
c2abccec
MK
1681 goto out;
1682 }
ea2384d3
FB
1683 /* NOTE: at the same time we convert, we do not write zero
1684 sectors to have a chance to compress the image. Ideally, we
1685 should add a specific call to have the info to go faster */
1686 buf1 = buf;
1687 while (n > 0) {
11212d8f 1688 if (!has_zero_init ||
a22f123c 1689 is_allocated_sectors_min(buf1, n, &n1, min_sparse)) {
c2abccec
MK
1690 ret = bdrv_write(out_bs, sector_num, buf1, n1);
1691 if (ret < 0) {
3fba9d81
SH
1692 error_report("error while writing sector %" PRId64
1693 ": %s", sector_num, strerror(-ret));
c2abccec
MK
1694 goto out;
1695 }
ea2384d3
FB
1696 }
1697 sector_num += n1;
1698 n -= n1;
1699 buf1 += n1 * 512;
1700 }
802c3d4c 1701 qemu_progress_print(100.0 * sectors_read / sectors_to_read, 0);
ea2384d3
FB
1702 }
1703 }
c2abccec 1704out:
13c28af8
PL
1705 if (!ret) {
1706 qemu_progress_print(100, 0);
1707 }
6b837bc4 1708 qemu_progress_end();
c2abccec
MK
1709 free_option_parameters(create_options);
1710 free_option_parameters(param);
bb1c0597 1711 qemu_vfree(buf);
ef80654d
WX
1712 if (sn_opts) {
1713 qemu_opts_del(sn_opts);
1714 }
c2abccec 1715 if (out_bs) {
4f6fd349 1716 bdrv_unref(out_bs);
c2abccec 1717 }
31ca34b8
JS
1718 if (bs) {
1719 for (bs_i = 0; bs_i < bs_n; bs_i++) {
1720 if (bs[bs_i]) {
4f6fd349 1721 bdrv_unref(bs[bs_i]);
31ca34b8 1722 }
c2abccec 1723 }
7267c094 1724 g_free(bs);
c2abccec 1725 }
64bb01aa
KW
1726fail_getopt:
1727 g_free(options);
1728
c2abccec
MK
1729 if (ret) {
1730 return 1;
1731 }
ea2384d3
FB
1732 return 0;
1733}
1734
57d1a2b6 1735
faea38e7
FB
1736static void dump_snapshots(BlockDriverState *bs)
1737{
1738 QEMUSnapshotInfo *sn_tab, *sn;
1739 int nb_sns, i;
faea38e7
FB
1740
1741 nb_sns = bdrv_snapshot_list(bs, &sn_tab);
1742 if (nb_sns <= 0)
1743 return;
1744 printf("Snapshot list:\n");
5b917044
WX
1745 bdrv_snapshot_dump(fprintf, stdout, NULL);
1746 printf("\n");
faea38e7
FB
1747 for(i = 0; i < nb_sns; i++) {
1748 sn = &sn_tab[i];
5b917044
WX
1749 bdrv_snapshot_dump(fprintf, stdout, sn);
1750 printf("\n");
faea38e7 1751 }
7267c094 1752 g_free(sn_tab);
faea38e7
FB
1753}
1754
9699bf0d
SH
1755static void dump_json_image_info_list(ImageInfoList *list)
1756{
4399c438 1757 Error *local_err = NULL;
9699bf0d
SH
1758 QString *str;
1759 QmpOutputVisitor *ov = qmp_output_visitor_new();
1760 QObject *obj;
1761 visit_type_ImageInfoList(qmp_output_get_visitor(ov),
4399c438 1762 &list, NULL, &local_err);
9699bf0d
SH
1763 obj = qmp_output_get_qobject(ov);
1764 str = qobject_to_json_pretty(obj);
1765 assert(str != NULL);
1766 printf("%s\n", qstring_get_str(str));
1767 qobject_decref(obj);
1768 qmp_output_visitor_cleanup(ov);
1769 QDECREF(str);
1770}
1771
c054b3fd
BC
1772static void dump_json_image_info(ImageInfo *info)
1773{
4399c438 1774 Error *local_err = NULL;
c054b3fd
BC
1775 QString *str;
1776 QmpOutputVisitor *ov = qmp_output_visitor_new();
1777 QObject *obj;
1778 visit_type_ImageInfo(qmp_output_get_visitor(ov),
4399c438 1779 &info, NULL, &local_err);
c054b3fd
BC
1780 obj = qmp_output_get_qobject(ov);
1781 str = qobject_to_json_pretty(obj);
1782 assert(str != NULL);
1783 printf("%s\n", qstring_get_str(str));
1784 qobject_decref(obj);
1785 qmp_output_visitor_cleanup(ov);
1786 QDECREF(str);
1787}
1788
9699bf0d
SH
1789static void dump_human_image_info_list(ImageInfoList *list)
1790{
1791 ImageInfoList *elem;
1792 bool delim = false;
1793
1794 for (elem = list; elem; elem = elem->next) {
1795 if (delim) {
1796 printf("\n");
1797 }
1798 delim = true;
1799
5b917044 1800 bdrv_image_info_dump(fprintf, stdout, elem->value);
9699bf0d
SH
1801 }
1802}
1803
1804static gboolean str_equal_func(gconstpointer a, gconstpointer b)
1805{
1806 return strcmp(a, b) == 0;
1807}
1808
1809/**
1810 * Open an image file chain and return an ImageInfoList
1811 *
1812 * @filename: topmost image filename
1813 * @fmt: topmost image format (may be NULL to autodetect)
1814 * @chain: true - enumerate entire backing file chain
1815 * false - only topmost image file
1816 *
1817 * Returns a list of ImageInfo objects or NULL if there was an error opening an
1818 * image file. If there was an error a message will have been printed to
1819 * stderr.
1820 */
1821static ImageInfoList *collect_image_info_list(const char *filename,
1822 const char *fmt,
1823 bool chain)
1824{
1825 ImageInfoList *head = NULL;
1826 ImageInfoList **last = &head;
1827 GHashTable *filenames;
43526ec8 1828 Error *err = NULL;
9699bf0d
SH
1829
1830 filenames = g_hash_table_new_full(g_str_hash, str_equal_func, NULL, NULL);
1831
1832 while (filename) {
1833 BlockDriverState *bs;
1834 ImageInfo *info;
1835 ImageInfoList *elem;
1836
1837 if (g_hash_table_lookup_extended(filenames, filename, NULL, NULL)) {
1838 error_report("Backing file '%s' creates an infinite loop.",
1839 filename);
1840 goto err;
1841 }
1842 g_hash_table_insert(filenames, (gpointer)filename, NULL);
1843
9ffe3332
KW
1844 bs = bdrv_new_open("image", filename, fmt,
1845 BDRV_O_FLAGS | BDRV_O_NO_BACKING, false, false);
9699bf0d
SH
1846 if (!bs) {
1847 goto err;
1848 }
1849
43526ec8 1850 bdrv_query_image_info(bs, &info, &err);
84d18f06 1851 if (err) {
43526ec8
WX
1852 error_report("%s", error_get_pretty(err));
1853 error_free(err);
bdf866fe 1854 bdrv_unref(bs);
43526ec8 1855 goto err;
fb0ed453 1856 }
9699bf0d
SH
1857
1858 elem = g_new0(ImageInfoList, 1);
1859 elem->value = info;
1860 *last = elem;
1861 last = &elem->next;
1862
4f6fd349 1863 bdrv_unref(bs);
9699bf0d
SH
1864
1865 filename = fmt = NULL;
1866 if (chain) {
1867 if (info->has_full_backing_filename) {
1868 filename = info->full_backing_filename;
1869 } else if (info->has_backing_filename) {
1870 filename = info->backing_filename;
1871 }
1872 if (info->has_backing_filename_format) {
1873 fmt = info->backing_filename_format;
1874 }
1875 }
1876 }
1877 g_hash_table_destroy(filenames);
1878 return head;
1879
1880err:
1881 qapi_free_ImageInfoList(head);
1882 g_hash_table_destroy(filenames);
1883 return NULL;
1884}
1885
c054b3fd
BC
1886static int img_info(int argc, char **argv)
1887{
1888 int c;
1889 OutputFormat output_format = OFORMAT_HUMAN;
9699bf0d 1890 bool chain = false;
c054b3fd 1891 const char *filename, *fmt, *output;
9699bf0d 1892 ImageInfoList *list;
c054b3fd 1893
ea2384d3 1894 fmt = NULL;
c054b3fd 1895 output = NULL;
ea2384d3 1896 for(;;) {
c054b3fd
BC
1897 int option_index = 0;
1898 static const struct option long_options[] = {
1899 {"help", no_argument, 0, 'h'},
1900 {"format", required_argument, 0, 'f'},
1901 {"output", required_argument, 0, OPTION_OUTPUT},
9699bf0d 1902 {"backing-chain", no_argument, 0, OPTION_BACKING_CHAIN},
c054b3fd
BC
1903 {0, 0, 0, 0}
1904 };
1905 c = getopt_long(argc, argv, "f:h",
1906 long_options, &option_index);
b8fb60da 1907 if (c == -1) {
ea2384d3 1908 break;
b8fb60da 1909 }
ea2384d3 1910 switch(c) {
ef87394c 1911 case '?':
ea2384d3
FB
1912 case 'h':
1913 help();
1914 break;
1915 case 'f':
1916 fmt = optarg;
1917 break;
c054b3fd
BC
1918 case OPTION_OUTPUT:
1919 output = optarg;
1920 break;
9699bf0d
SH
1921 case OPTION_BACKING_CHAIN:
1922 chain = true;
1923 break;
ea2384d3
FB
1924 }
1925 }
fc11eb26 1926 if (optind != argc - 1) {
ac1307ab 1927 error_exit("Expecting one image file name");
b8fb60da 1928 }
ea2384d3
FB
1929 filename = argv[optind++];
1930
c054b3fd
BC
1931 if (output && !strcmp(output, "json")) {
1932 output_format = OFORMAT_JSON;
1933 } else if (output && !strcmp(output, "human")) {
1934 output_format = OFORMAT_HUMAN;
1935 } else if (output) {
1936 error_report("--output must be used with human or json as argument.");
c2abccec
MK
1937 return 1;
1938 }
c054b3fd 1939
9699bf0d
SH
1940 list = collect_image_info_list(filename, fmt, chain);
1941 if (!list) {
c2abccec 1942 return 1;
faea38e7 1943 }
c054b3fd 1944
c054b3fd
BC
1945 switch (output_format) {
1946 case OFORMAT_HUMAN:
9699bf0d 1947 dump_human_image_info_list(list);
c054b3fd
BC
1948 break;
1949 case OFORMAT_JSON:
9699bf0d
SH
1950 if (chain) {
1951 dump_json_image_info_list(list);
1952 } else {
1953 dump_json_image_info(list->value);
1954 }
c054b3fd 1955 break;
faea38e7 1956 }
c054b3fd 1957
9699bf0d 1958 qapi_free_ImageInfoList(list);
ea2384d3
FB
1959 return 0;
1960}
1961
4c93a13b
PB
1962
1963typedef struct MapEntry {
1964 int flags;
1965 int depth;
1966 int64_t start;
1967 int64_t length;
1968 int64_t offset;
1969 BlockDriverState *bs;
1970} MapEntry;
1971
1972static void dump_map_entry(OutputFormat output_format, MapEntry *e,
1973 MapEntry *next)
1974{
1975 switch (output_format) {
1976 case OFORMAT_HUMAN:
1977 if ((e->flags & BDRV_BLOCK_DATA) &&
1978 !(e->flags & BDRV_BLOCK_OFFSET_VALID)) {
1979 error_report("File contains external, encrypted or compressed clusters.");
1980 exit(1);
1981 }
1982 if ((e->flags & (BDRV_BLOCK_DATA|BDRV_BLOCK_ZERO)) == BDRV_BLOCK_DATA) {
1983 printf("%#-16"PRIx64"%#-16"PRIx64"%#-16"PRIx64"%s\n",
1984 e->start, e->length, e->offset, e->bs->filename);
1985 }
1986 /* This format ignores the distinction between 0, ZERO and ZERO|DATA.
1987 * Modify the flags here to allow more coalescing.
1988 */
1989 if (next &&
1990 (next->flags & (BDRV_BLOCK_DATA|BDRV_BLOCK_ZERO)) != BDRV_BLOCK_DATA) {
1991 next->flags &= ~BDRV_BLOCK_DATA;
1992 next->flags |= BDRV_BLOCK_ZERO;
1993 }
1994 break;
1995 case OFORMAT_JSON:
1996 printf("%s{ \"start\": %"PRId64", \"length\": %"PRId64", \"depth\": %d,"
1997 " \"zero\": %s, \"data\": %s",
1998 (e->start == 0 ? "[" : ",\n"),
1999 e->start, e->length, e->depth,
2000 (e->flags & BDRV_BLOCK_ZERO) ? "true" : "false",
2001 (e->flags & BDRV_BLOCK_DATA) ? "true" : "false");
2002 if (e->flags & BDRV_BLOCK_OFFSET_VALID) {
c745bfb4 2003 printf(", \"offset\": %"PRId64"", e->offset);
4c93a13b
PB
2004 }
2005 putchar('}');
2006
2007 if (!next) {
2008 printf("]\n");
2009 }
2010 break;
2011 }
2012}
2013
2014static int get_block_status(BlockDriverState *bs, int64_t sector_num,
2015 int nb_sectors, MapEntry *e)
2016{
2017 int64_t ret;
2018 int depth;
2019
2020 /* As an optimization, we could cache the current range of unallocated
2021 * clusters in each file of the chain, and avoid querying the same
2022 * range repeatedly.
2023 */
2024
2025 depth = 0;
2026 for (;;) {
2027 ret = bdrv_get_block_status(bs, sector_num, nb_sectors, &nb_sectors);
2028 if (ret < 0) {
2029 return ret;
2030 }
2031 assert(nb_sectors);
2032 if (ret & (BDRV_BLOCK_ZERO|BDRV_BLOCK_DATA)) {
2033 break;
2034 }
2035 bs = bs->backing_hd;
2036 if (bs == NULL) {
2037 ret = 0;
2038 break;
2039 }
2040
2041 depth++;
2042 }
2043
2044 e->start = sector_num * BDRV_SECTOR_SIZE;
2045 e->length = nb_sectors * BDRV_SECTOR_SIZE;
2046 e->flags = ret & ~BDRV_BLOCK_OFFSET_MASK;
2047 e->offset = ret & BDRV_BLOCK_OFFSET_MASK;
2048 e->depth = depth;
2049 e->bs = bs;
2050 return 0;
2051}
2052
2053static int img_map(int argc, char **argv)
2054{
2055 int c;
2056 OutputFormat output_format = OFORMAT_HUMAN;
2057 BlockDriverState *bs;
2058 const char *filename, *fmt, *output;
2059 int64_t length;
2060 MapEntry curr = { .length = 0 }, next;
2061 int ret = 0;
2062
2063 fmt = NULL;
2064 output = NULL;
2065 for (;;) {
2066 int option_index = 0;
2067 static const struct option long_options[] = {
2068 {"help", no_argument, 0, 'h'},
2069 {"format", required_argument, 0, 'f'},
2070 {"output", required_argument, 0, OPTION_OUTPUT},
2071 {0, 0, 0, 0}
2072 };
2073 c = getopt_long(argc, argv, "f:h",
2074 long_options, &option_index);
2075 if (c == -1) {
2076 break;
2077 }
2078 switch (c) {
2079 case '?':
2080 case 'h':
2081 help();
2082 break;
2083 case 'f':
2084 fmt = optarg;
2085 break;
2086 case OPTION_OUTPUT:
2087 output = optarg;
2088 break;
2089 }
2090 }
ac1307ab
FZ
2091 if (optind != argc - 1) {
2092 error_exit("Expecting one image file name");
4c93a13b 2093 }
ac1307ab 2094 filename = argv[optind];
4c93a13b
PB
2095
2096 if (output && !strcmp(output, "json")) {
2097 output_format = OFORMAT_JSON;
2098 } else if (output && !strcmp(output, "human")) {
2099 output_format = OFORMAT_HUMAN;
2100 } else if (output) {
2101 error_report("--output must be used with human or json as argument.");
2102 return 1;
2103 }
2104
9ffe3332 2105 bs = bdrv_new_open("image", filename, fmt, BDRV_O_FLAGS, true, false);
4c93a13b
PB
2106 if (!bs) {
2107 return 1;
2108 }
2109
2110 if (output_format == OFORMAT_HUMAN) {
2111 printf("%-16s%-16s%-16s%s\n", "Offset", "Length", "Mapped to", "File");
2112 }
2113
2114 length = bdrv_getlength(bs);
2115 while (curr.start + curr.length < length) {
2116 int64_t nsectors_left;
2117 int64_t sector_num;
2118 int n;
2119
2120 sector_num = (curr.start + curr.length) >> BDRV_SECTOR_BITS;
2121
2122 /* Probe up to 1 GiB at a time. */
2123 nsectors_left = DIV_ROUND_UP(length, BDRV_SECTOR_SIZE) - sector_num;
2124 n = MIN(1 << (30 - BDRV_SECTOR_BITS), nsectors_left);
2125 ret = get_block_status(bs, sector_num, n, &next);
2126
2127 if (ret < 0) {
2128 error_report("Could not read file metadata: %s", strerror(-ret));
2129 goto out;
2130 }
2131
2132 if (curr.length != 0 && curr.flags == next.flags &&
2133 curr.depth == next.depth &&
2134 ((curr.flags & BDRV_BLOCK_OFFSET_VALID) == 0 ||
2135 curr.offset + curr.length == next.offset)) {
2136 curr.length += next.length;
2137 continue;
2138 }
2139
2140 if (curr.length > 0) {
2141 dump_map_entry(output_format, &curr, &next);
2142 }
2143 curr = next;
2144 }
2145
2146 dump_map_entry(output_format, &curr, NULL);
2147
2148out:
2149 bdrv_unref(bs);
2150 return ret < 0;
2151}
2152
f7b4a940
AL
2153#define SNAPSHOT_LIST 1
2154#define SNAPSHOT_CREATE 2
2155#define SNAPSHOT_APPLY 3
2156#define SNAPSHOT_DELETE 4
2157
153859be 2158static int img_snapshot(int argc, char **argv)
f7b4a940
AL
2159{
2160 BlockDriverState *bs;
2161 QEMUSnapshotInfo sn;
2162 char *filename, *snapshot_name = NULL;
c2abccec 2163 int c, ret = 0, bdrv_oflags;
f7b4a940
AL
2164 int action = 0;
2165 qemu_timeval tv;
f382d43a 2166 bool quiet = false;
a89d89d3 2167 Error *err = NULL;
f7b4a940 2168
710da702 2169 bdrv_oflags = BDRV_O_FLAGS | BDRV_O_RDWR;
f7b4a940
AL
2170 /* Parse commandline parameters */
2171 for(;;) {
f382d43a 2172 c = getopt(argc, argv, "la:c:d:hq");
b8fb60da 2173 if (c == -1) {
f7b4a940 2174 break;
b8fb60da 2175 }
f7b4a940 2176 switch(c) {
ef87394c 2177 case '?':
f7b4a940
AL
2178 case 'h':
2179 help();
153859be 2180 return 0;
f7b4a940
AL
2181 case 'l':
2182 if (action) {
ac1307ab 2183 error_exit("Cannot mix '-l', '-a', '-c', '-d'");
153859be 2184 return 0;
f7b4a940
AL
2185 }
2186 action = SNAPSHOT_LIST;
f5edb014 2187 bdrv_oflags &= ~BDRV_O_RDWR; /* no need for RW */
f7b4a940
AL
2188 break;
2189 case 'a':
2190 if (action) {
ac1307ab 2191 error_exit("Cannot mix '-l', '-a', '-c', '-d'");
153859be 2192 return 0;
f7b4a940
AL
2193 }
2194 action = SNAPSHOT_APPLY;
2195 snapshot_name = optarg;
2196 break;
2197 case 'c':
2198 if (action) {
ac1307ab 2199 error_exit("Cannot mix '-l', '-a', '-c', '-d'");
153859be 2200 return 0;
f7b4a940
AL
2201 }
2202 action = SNAPSHOT_CREATE;
2203 snapshot_name = optarg;
2204 break;
2205 case 'd':
2206 if (action) {
ac1307ab 2207 error_exit("Cannot mix '-l', '-a', '-c', '-d'");
153859be 2208 return 0;
f7b4a940
AL
2209 }
2210 action = SNAPSHOT_DELETE;
2211 snapshot_name = optarg;
2212 break;
f382d43a
MR
2213 case 'q':
2214 quiet = true;
2215 break;
f7b4a940
AL
2216 }
2217 }
2218
fc11eb26 2219 if (optind != argc - 1) {
ac1307ab 2220 error_exit("Expecting one image file name");
b8fb60da 2221 }
f7b4a940
AL
2222 filename = argv[optind++];
2223
2224 /* Open the image */
9ffe3332 2225 bs = bdrv_new_open("image", filename, NULL, bdrv_oflags, true, quiet);
c2abccec
MK
2226 if (!bs) {
2227 return 1;
2228 }
f7b4a940
AL
2229
2230 /* Perform the requested action */
2231 switch(action) {
2232 case SNAPSHOT_LIST:
2233 dump_snapshots(bs);
2234 break;
2235
2236 case SNAPSHOT_CREATE:
2237 memset(&sn, 0, sizeof(sn));
2238 pstrcpy(sn.name, sizeof(sn.name), snapshot_name);
2239
2240 qemu_gettimeofday(&tv);
2241 sn.date_sec = tv.tv_sec;
2242 sn.date_nsec = tv.tv_usec * 1000;
2243
2244 ret = bdrv_snapshot_create(bs, &sn);
b8fb60da 2245 if (ret) {
15654a6d 2246 error_report("Could not create snapshot '%s': %d (%s)",
f7b4a940 2247 snapshot_name, ret, strerror(-ret));
b8fb60da 2248 }
f7b4a940
AL
2249 break;
2250
2251 case SNAPSHOT_APPLY:
2252 ret = bdrv_snapshot_goto(bs, snapshot_name);
b8fb60da 2253 if (ret) {
15654a6d 2254 error_report("Could not apply snapshot '%s': %d (%s)",
f7b4a940 2255 snapshot_name, ret, strerror(-ret));
b8fb60da 2256 }
f7b4a940
AL
2257 break;
2258
2259 case SNAPSHOT_DELETE:
a89d89d3 2260 bdrv_snapshot_delete_by_id_or_name(bs, snapshot_name, &err);
84d18f06 2261 if (err) {
a89d89d3
WX
2262 error_report("Could not delete snapshot '%s': (%s)",
2263 snapshot_name, error_get_pretty(err));
2264 error_free(err);
2265 ret = 1;
b8fb60da 2266 }
f7b4a940
AL
2267 break;
2268 }
2269
2270 /* Cleanup */
4f6fd349 2271 bdrv_unref(bs);
c2abccec
MK
2272 if (ret) {
2273 return 1;
2274 }
153859be 2275 return 0;
f7b4a940
AL
2276}
2277
3e85c6fd
KW
2278static int img_rebase(int argc, char **argv)
2279{
c2abccec 2280 BlockDriverState *bs, *bs_old_backing = NULL, *bs_new_backing = NULL;
f163d073 2281 BlockDriver *old_backing_drv, *new_backing_drv;
3e85c6fd 2282 char *filename;
661a0f71 2283 const char *fmt, *cache, *out_basefmt, *out_baseimg;
3e85c6fd
KW
2284 int c, flags, ret;
2285 int unsafe = 0;
6b837bc4 2286 int progress = 0;
f382d43a 2287 bool quiet = false;
34b5d2c6 2288 Error *local_err = NULL;
3e85c6fd
KW
2289
2290 /* Parse commandline parameters */
e53dbee0 2291 fmt = NULL;
661a0f71 2292 cache = BDRV_DEFAULT_CACHE;
3e85c6fd
KW
2293 out_baseimg = NULL;
2294 out_basefmt = NULL;
3e85c6fd 2295 for(;;) {
f382d43a 2296 c = getopt(argc, argv, "uhf:F:b:pt:q");
b8fb60da 2297 if (c == -1) {
3e85c6fd 2298 break;
b8fb60da 2299 }
3e85c6fd 2300 switch(c) {
ef87394c 2301 case '?':
3e85c6fd
KW
2302 case 'h':
2303 help();
2304 return 0;
e53dbee0
KW
2305 case 'f':
2306 fmt = optarg;
2307 break;
3e85c6fd
KW
2308 case 'F':
2309 out_basefmt = optarg;
2310 break;
2311 case 'b':
2312 out_baseimg = optarg;
2313 break;
2314 case 'u':
2315 unsafe = 1;
2316 break;
6b837bc4
JS
2317 case 'p':
2318 progress = 1;
2319 break;
661a0f71
FS
2320 case 't':
2321 cache = optarg;
2322 break;
f382d43a
MR
2323 case 'q':
2324 quiet = true;
2325 break;
3e85c6fd
KW
2326 }
2327 }
2328
f382d43a
MR
2329 if (quiet) {
2330 progress = 0;
2331 }
2332
ac1307ab
FZ
2333 if (optind != argc - 1) {
2334 error_exit("Expecting one image file name");
2335 }
2336 if (!unsafe && !out_baseimg) {
2337 error_exit("Must specify backing file (-b) or use unsafe mode (-u)");
b8fb60da 2338 }
3e85c6fd
KW
2339 filename = argv[optind++];
2340
6b837bc4
JS
2341 qemu_progress_init(progress, 2.0);
2342 qemu_progress_print(0, 100);
2343
661a0f71 2344 flags = BDRV_O_RDWR | (unsafe ? BDRV_O_NO_BACKING : 0);
c3993cdc 2345 ret = bdrv_parse_cache_flags(cache, &flags);
661a0f71
FS
2346 if (ret < 0) {
2347 error_report("Invalid cache option: %s", cache);
2348 return -1;
2349 }
2350
3e85c6fd
KW
2351 /*
2352 * Open the images.
2353 *
2354 * Ignore the old backing file for unsafe rebase in case we want to correct
2355 * the reference to a renamed or moved backing file.
2356 */
9ffe3332 2357 bs = bdrv_new_open("image", filename, fmt, flags, true, quiet);
c2abccec
MK
2358 if (!bs) {
2359 return 1;
2360 }
3e85c6fd
KW
2361
2362 /* Find the right drivers for the backing files */
2363 old_backing_drv = NULL;
2364 new_backing_drv = NULL;
2365
2366 if (!unsafe && bs->backing_format[0] != '\0') {
2367 old_backing_drv = bdrv_find_format(bs->backing_format);
2368 if (old_backing_drv == NULL) {
15654a6d 2369 error_report("Invalid format name: '%s'", bs->backing_format);
c2abccec
MK
2370 ret = -1;
2371 goto out;
3e85c6fd
KW
2372 }
2373 }
2374
2375 if (out_basefmt != NULL) {
2376 new_backing_drv = bdrv_find_format(out_basefmt);
2377 if (new_backing_drv == NULL) {
15654a6d 2378 error_report("Invalid format name: '%s'", out_basefmt);
c2abccec
MK
2379 ret = -1;
2380 goto out;
3e85c6fd
KW
2381 }
2382 }
2383
2384 /* For safe rebasing we need to compare old and new backing file */
2385 if (unsafe) {
2386 /* Make the compiler happy */
2387 bs_old_backing = NULL;
2388 bs_new_backing = NULL;
2389 } else {
2390 char backing_name[1024];
2391
98522f63 2392 bs_old_backing = bdrv_new("old_backing", &error_abort);
3e85c6fd 2393 bdrv_get_backing_filename(bs, backing_name, sizeof(backing_name));
ddf5636d 2394 ret = bdrv_open(&bs_old_backing, backing_name, NULL, NULL, BDRV_O_FLAGS,
34b5d2c6 2395 old_backing_drv, &local_err);
c2abccec 2396 if (ret) {
34b5d2c6
HR
2397 error_report("Could not open old backing file '%s': %s",
2398 backing_name, error_get_pretty(local_err));
2399 error_free(local_err);
c2abccec 2400 goto out;
3e85c6fd 2401 }
a616673d 2402 if (out_baseimg[0]) {
98522f63 2403 bs_new_backing = bdrv_new("new_backing", &error_abort);
ddf5636d
HR
2404 ret = bdrv_open(&bs_new_backing, out_baseimg, NULL, NULL,
2405 BDRV_O_FLAGS, new_backing_drv, &local_err);
a616673d 2406 if (ret) {
34b5d2c6
HR
2407 error_report("Could not open new backing file '%s': %s",
2408 out_baseimg, error_get_pretty(local_err));
2409 error_free(local_err);
a616673d
AB
2410 goto out;
2411 }
3e85c6fd
KW
2412 }
2413 }
2414
2415 /*
2416 * Check each unallocated cluster in the COW file. If it is unallocated,
2417 * accesses go to the backing file. We must therefore compare this cluster
2418 * in the old and new backing file, and if they differ we need to copy it
2419 * from the old backing file into the COW file.
2420 *
2421 * If qemu-img crashes during this step, no harm is done. The content of
2422 * the image is the same as the original one at any time.
2423 */
2424 if (!unsafe) {
2425 uint64_t num_sectors;
87a1b3e3 2426 uint64_t old_backing_num_sectors;
a616673d 2427 uint64_t new_backing_num_sectors = 0;
3e85c6fd 2428 uint64_t sector;
cc60e327 2429 int n;
d6771bfa
T
2430 uint8_t * buf_old;
2431 uint8_t * buf_new;
1f710495 2432 float local_progress = 0;
d6771bfa 2433
bb1c0597
KW
2434 buf_old = qemu_blockalign(bs, IO_BUF_SIZE);
2435 buf_new = qemu_blockalign(bs, IO_BUF_SIZE);
3e85c6fd
KW
2436
2437 bdrv_get_geometry(bs, &num_sectors);
87a1b3e3 2438 bdrv_get_geometry(bs_old_backing, &old_backing_num_sectors);
a616673d
AB
2439 if (bs_new_backing) {
2440 bdrv_get_geometry(bs_new_backing, &new_backing_num_sectors);
2441 }
3e85c6fd 2442
1f710495
KW
2443 if (num_sectors != 0) {
2444 local_progress = (float)100 /
2445 (num_sectors / MIN(num_sectors, IO_BUF_SIZE / 512));
2446 }
2447
3e85c6fd
KW
2448 for (sector = 0; sector < num_sectors; sector += n) {
2449
2450 /* How many sectors can we handle with the next read? */
2451 if (sector + (IO_BUF_SIZE / 512) <= num_sectors) {
2452 n = (IO_BUF_SIZE / 512);
2453 } else {
2454 n = num_sectors - sector;
2455 }
2456
2457 /* If the cluster is allocated, we don't need to take action */
cc60e327 2458 ret = bdrv_is_allocated(bs, sector, n, &n);
d663640c
PB
2459 if (ret < 0) {
2460 error_report("error while reading image metadata: %s",
2461 strerror(-ret));
2462 goto out;
2463 }
cc60e327 2464 if (ret) {
3e85c6fd
KW
2465 continue;
2466 }
2467
87a1b3e3
KW
2468 /*
2469 * Read old and new backing file and take into consideration that
2470 * backing files may be smaller than the COW image.
2471 */
2472 if (sector >= old_backing_num_sectors) {
2473 memset(buf_old, 0, n * BDRV_SECTOR_SIZE);
2474 } else {
2475 if (sector + n > old_backing_num_sectors) {
2476 n = old_backing_num_sectors - sector;
2477 }
2478
2479 ret = bdrv_read(bs_old_backing, sector, buf_old, n);
2480 if (ret < 0) {
2481 error_report("error while reading from old backing file");
2482 goto out;
2483 }
3e85c6fd 2484 }
87a1b3e3 2485
a616673d 2486 if (sector >= new_backing_num_sectors || !bs_new_backing) {
87a1b3e3
KW
2487 memset(buf_new, 0, n * BDRV_SECTOR_SIZE);
2488 } else {
2489 if (sector + n > new_backing_num_sectors) {
2490 n = new_backing_num_sectors - sector;
2491 }
2492
2493 ret = bdrv_read(bs_new_backing, sector, buf_new, n);
2494 if (ret < 0) {
2495 error_report("error while reading from new backing file");
2496 goto out;
2497 }
3e85c6fd
KW
2498 }
2499
2500 /* If they differ, we need to write to the COW file */
2501 uint64_t written = 0;
2502
2503 while (written < n) {
2504 int pnum;
2505
2506 if (compare_sectors(buf_old + written * 512,
60b1bd4f 2507 buf_new + written * 512, n - written, &pnum))
3e85c6fd
KW
2508 {
2509 ret = bdrv_write(bs, sector + written,
2510 buf_old + written * 512, pnum);
2511 if (ret < 0) {
15654a6d 2512 error_report("Error while writing to COW image: %s",
3e85c6fd 2513 strerror(-ret));
c2abccec 2514 goto out;
3e85c6fd
KW
2515 }
2516 }
2517
2518 written += pnum;
2519 }
6b837bc4 2520 qemu_progress_print(local_progress, 100);
3e85c6fd 2521 }
d6771bfa 2522
bb1c0597
KW
2523 qemu_vfree(buf_old);
2524 qemu_vfree(buf_new);
3e85c6fd
KW
2525 }
2526
2527 /*
2528 * Change the backing file. All clusters that are different from the old
2529 * backing file are overwritten in the COW file now, so the visible content
2530 * doesn't change when we switch the backing file.
2531 */
a616673d
AB
2532 if (out_baseimg && *out_baseimg) {
2533 ret = bdrv_change_backing_file(bs, out_baseimg, out_basefmt);
2534 } else {
2535 ret = bdrv_change_backing_file(bs, NULL, NULL);
2536 }
2537
3e85c6fd 2538 if (ret == -ENOSPC) {
15654a6d
JS
2539 error_report("Could not change the backing file to '%s': No "
2540 "space left in the file header", out_baseimg);
3e85c6fd 2541 } else if (ret < 0) {
15654a6d 2542 error_report("Could not change the backing file to '%s': %s",
3e85c6fd
KW
2543 out_baseimg, strerror(-ret));
2544 }
2545
6b837bc4 2546 qemu_progress_print(100, 0);
3e85c6fd
KW
2547 /*
2548 * TODO At this point it is possible to check if any clusters that are
2549 * allocated in the COW file are the same in the backing file. If so, they
2550 * could be dropped from the COW file. Don't do this before switching the
2551 * backing file, in case of a crash this would lead to corruption.
2552 */
c2abccec 2553out:
6b837bc4 2554 qemu_progress_end();
3e85c6fd
KW
2555 /* Cleanup */
2556 if (!unsafe) {
eb863add 2557 if (bs_old_backing != NULL) {
4f6fd349 2558 bdrv_unref(bs_old_backing);
eb863add
KW
2559 }
2560 if (bs_new_backing != NULL) {
4f6fd349 2561 bdrv_unref(bs_new_backing);
eb863add 2562 }
3e85c6fd
KW
2563 }
2564
4f6fd349 2565 bdrv_unref(bs);
c2abccec
MK
2566 if (ret) {
2567 return 1;
2568 }
3e85c6fd
KW
2569 return 0;
2570}
2571
ae6b0ed6
SH
2572static int img_resize(int argc, char **argv)
2573{
2574 int c, ret, relative;
2575 const char *filename, *fmt, *size;
2576 int64_t n, total_size;
f382d43a 2577 bool quiet = false;
2a81998a 2578 BlockDriverState *bs = NULL;
20caf0f7
DXW
2579 QemuOpts *param;
2580 static QemuOptsList resize_options = {
2581 .name = "resize_options",
2582 .head = QTAILQ_HEAD_INITIALIZER(resize_options.head),
2583 .desc = {
2584 {
2585 .name = BLOCK_OPT_SIZE,
2586 .type = QEMU_OPT_SIZE,
2587 .help = "Virtual disk size"
2588 }, {
2589 /* end of list */
2590 }
ae6b0ed6 2591 },
ae6b0ed6
SH
2592 };
2593
e80fec7f
KW
2594 /* Remove size from argv manually so that negative numbers are not treated
2595 * as options by getopt. */
2596 if (argc < 3) {
ac1307ab 2597 error_exit("Not enough arguments");
e80fec7f
KW
2598 return 1;
2599 }
2600
2601 size = argv[--argc];
2602
2603 /* Parse getopt arguments */
ae6b0ed6
SH
2604 fmt = NULL;
2605 for(;;) {
f382d43a 2606 c = getopt(argc, argv, "f:hq");
ae6b0ed6
SH
2607 if (c == -1) {
2608 break;
2609 }
2610 switch(c) {
ef87394c 2611 case '?':
ae6b0ed6
SH
2612 case 'h':
2613 help();
2614 break;
2615 case 'f':
2616 fmt = optarg;
2617 break;
f382d43a
MR
2618 case 'q':
2619 quiet = true;
2620 break;
ae6b0ed6
SH
2621 }
2622 }
fc11eb26 2623 if (optind != argc - 1) {
ac1307ab 2624 error_exit("Expecting one image file name");
ae6b0ed6
SH
2625 }
2626 filename = argv[optind++];
ae6b0ed6
SH
2627
2628 /* Choose grow, shrink, or absolute resize mode */
2629 switch (size[0]) {
2630 case '+':
2631 relative = 1;
2632 size++;
2633 break;
2634 case '-':
2635 relative = -1;
2636 size++;
2637 break;
2638 default:
2639 relative = 0;
2640 break;
2641 }
2642
2643 /* Parse size */
87ea75d5 2644 param = qemu_opts_create(&resize_options, NULL, 0, &error_abort);
20caf0f7 2645 if (qemu_opt_set(param, BLOCK_OPT_SIZE, size)) {
ae6b0ed6 2646 /* Error message already printed when size parsing fails */
2a81998a 2647 ret = -1;
20caf0f7 2648 qemu_opts_del(param);
2a81998a 2649 goto out;
ae6b0ed6 2650 }
20caf0f7
DXW
2651 n = qemu_opt_get_size(param, BLOCK_OPT_SIZE, 0);
2652 qemu_opts_del(param);
ae6b0ed6 2653
9ffe3332
KW
2654 bs = bdrv_new_open("image", filename, fmt, BDRV_O_FLAGS | BDRV_O_RDWR,
2655 true, quiet);
c2abccec 2656 if (!bs) {
2a81998a
JS
2657 ret = -1;
2658 goto out;
c2abccec 2659 }
ae6b0ed6
SH
2660
2661 if (relative) {
2662 total_size = bdrv_getlength(bs) + n * relative;
2663 } else {
2664 total_size = n;
2665 }
2666 if (total_size <= 0) {
15654a6d 2667 error_report("New image size must be positive");
c2abccec
MK
2668 ret = -1;
2669 goto out;
ae6b0ed6
SH
2670 }
2671
2672 ret = bdrv_truncate(bs, total_size);
2673 switch (ret) {
2674 case 0:
f382d43a 2675 qprintf(quiet, "Image resized.\n");
ae6b0ed6
SH
2676 break;
2677 case -ENOTSUP:
259b2173 2678 error_report("This image does not support resize");
ae6b0ed6
SH
2679 break;
2680 case -EACCES:
15654a6d 2681 error_report("Image is read-only");
ae6b0ed6
SH
2682 break;
2683 default:
15654a6d 2684 error_report("Error resizing image (%d)", -ret);
ae6b0ed6
SH
2685 break;
2686 }
c2abccec 2687out:
2a81998a 2688 if (bs) {
4f6fd349 2689 bdrv_unref(bs);
2a81998a 2690 }
c2abccec
MK
2691 if (ret) {
2692 return 1;
2693 }
ae6b0ed6
SH
2694 return 0;
2695}
2696
6f176b48
HR
2697static int img_amend(int argc, char **argv)
2698{
2699 int c, ret = 0;
2700 char *options = NULL;
2701 QEMUOptionParameter *create_options = NULL, *options_param = NULL;
2702 const char *fmt = NULL, *filename;
2703 bool quiet = false;
2704 BlockDriverState *bs = NULL;
2705
2706 for (;;) {
2707 c = getopt(argc, argv, "hqf:o:");
2708 if (c == -1) {
2709 break;
2710 }
2711
2712 switch (c) {
2713 case 'h':
2714 case '?':
2715 help();
2716 break;
2717 case 'o':
626f84f3
KW
2718 if (!is_valid_option_list(optarg)) {
2719 error_report("Invalid option list: %s", optarg);
2720 ret = -1;
2721 goto out;
2722 }
2723 if (!options) {
2724 options = g_strdup(optarg);
2725 } else {
2726 char *old_options = options;
2727 options = g_strdup_printf("%s,%s", options, optarg);
2728 g_free(old_options);
2729 }
6f176b48
HR
2730 break;
2731 case 'f':
2732 fmt = optarg;
2733 break;
2734 case 'q':
2735 quiet = true;
2736 break;
2737 }
2738 }
2739
a283cb6e 2740 if (!options) {
ac1307ab 2741 error_exit("Must specify options (-o)");
6f176b48
HR
2742 }
2743
a283cb6e
KW
2744 filename = (optind == argc - 1) ? argv[argc - 1] : NULL;
2745 if (fmt && has_help_option(options)) {
2746 /* If a format is explicitly specified (and possibly no filename is
2747 * given), print option help here */
2748 ret = print_block_option_help(filename, fmt);
2749 goto out;
6f176b48
HR
2750 }
2751
a283cb6e 2752 if (optind != argc - 1) {
ac1307ab 2753 error_exit("Expecting one image file name");
a283cb6e 2754 }
6f176b48 2755
9ffe3332
KW
2756 bs = bdrv_new_open("image", filename, fmt,
2757 BDRV_O_FLAGS | BDRV_O_RDWR, true, quiet);
6f176b48
HR
2758 if (!bs) {
2759 error_report("Could not open image '%s'", filename);
2760 ret = -1;
2761 goto out;
2762 }
2763
2764 fmt = bs->drv->format_name;
2765
626f84f3 2766 if (has_help_option(options)) {
a283cb6e 2767 /* If the format was auto-detected, print option help here */
6f176b48
HR
2768 ret = print_block_option_help(filename, fmt);
2769 goto out;
2770 }
2771
2772 create_options = append_option_parameters(create_options,
2773 bs->drv->create_options);
2774 options_param = parse_option_parameters(options, create_options,
2775 options_param);
2776 if (options_param == NULL) {
2777 error_report("Invalid options for file format '%s'", fmt);
2778 ret = -1;
2779 goto out;
2780 }
2781
2782 ret = bdrv_amend_options(bs, options_param);
2783 if (ret < 0) {
2784 error_report("Error while amending options: %s", strerror(-ret));
2785 goto out;
2786 }
2787
2788out:
2789 if (bs) {
2790 bdrv_unref(bs);
2791 }
2792 free_option_parameters(create_options);
2793 free_option_parameters(options_param);
626f84f3
KW
2794 g_free(options);
2795
6f176b48
HR
2796 if (ret) {
2797 return 1;
2798 }
2799 return 0;
2800}
2801
c227f099 2802static const img_cmd_t img_cmds[] = {
153859be
SB
2803#define DEF(option, callback, arg_string) \
2804 { option, callback },
2805#include "qemu-img-cmds.h"
2806#undef DEF
2807#undef GEN_DOCS
2808 { NULL, NULL, },
2809};
2810
ea2384d3
FB
2811int main(int argc, char **argv)
2812{
c227f099 2813 const img_cmd_t *cmd;
153859be 2814 const char *cmdname;
7db1689c 2815 int c;
7db1689c
JC
2816 static const struct option long_options[] = {
2817 {"help", no_argument, 0, 'h'},
5f6979cb 2818 {"version", no_argument, 0, 'v'},
7db1689c
JC
2819 {0, 0, 0, 0}
2820 };
ea2384d3 2821
526eda14
MK
2822#ifdef CONFIG_POSIX
2823 signal(SIGPIPE, SIG_IGN);
2824#endif
2825
53f76e58 2826 error_set_progname(argv[0]);
10f5bff6 2827 qemu_init_exec_dir(argv[0]);
53f76e58 2828
2592c59a 2829 qemu_init_main_loop();
ea2384d3 2830 bdrv_init();
ac1307ab
FZ
2831 if (argc < 2) {
2832 error_exit("Not enough arguments");
2833 }
153859be 2834 cmdname = argv[1];
153859be
SB
2835
2836 /* find the command */
5f6979cb 2837 for (cmd = img_cmds; cmd->name != NULL; cmd++) {
153859be 2838 if (!strcmp(cmdname, cmd->name)) {
7db1689c 2839 return cmd->handler(argc - 1, argv + 1);
153859be 2840 }
ea2384d3 2841 }
153859be 2842
5f6979cb 2843 c = getopt_long(argc, argv, "h", long_options, NULL);
7db1689c
JC
2844
2845 if (c == 'h') {
2846 help();
2847 }
5f6979cb
JC
2848 if (c == 'v') {
2849 printf(QEMU_IMG_VERSION);
2850 return 0;
2851 }
7db1689c 2852
153859be 2853 /* not found */
ac1307ab 2854 error_exit("Command not found: %s", cmdname);
ea2384d3 2855}