]> git.proxmox.com Git - pve-qemu.git/blob - debian/patches/pve/0027-PVE-Backup-add-vma-backup-format-code.patch
update submodule and patches to 7.1.0
[pve-qemu.git] / debian / patches / pve / 0027-PVE-Backup-add-vma-backup-format-code.patch
1 From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
2 From: Dietmar Maurer <dietmar@proxmox.com>
3 Date: Mon, 6 Apr 2020 12:16:57 +0200
4 Subject: [PATCH] PVE-Backup: add vma backup format code
5
6 Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
7 [FE: create: register all streams before entering coroutines]
8 Signed-off-by: Fabian Ebner <f.ebner@proxmox.com>
9 ---
10 block/meson.build | 2 +
11 meson.build | 5 +
12 vma-reader.c | 859 ++++++++++++++++++++++++++++++++++++++++++++++
13 vma-writer.c | 791 ++++++++++++++++++++++++++++++++++++++++++
14 vma.c | 849 +++++++++++++++++++++++++++++++++++++++++++++
15 vma.h | 150 ++++++++
16 6 files changed, 2656 insertions(+)
17 create mode 100644 vma-reader.c
18 create mode 100644 vma-writer.c
19 create mode 100644 vma.c
20 create mode 100644 vma.h
21
22 diff --git a/block/meson.build b/block/meson.build
23 index ad40c10b6a..3a0b84bc11 100644
24 --- a/block/meson.build
25 +++ b/block/meson.build
26 @@ -46,6 +46,8 @@ block_ss.add(files(
27 'zeroinit.c',
28 ), zstd, zlib, gnutls)
29
30 +block_ss.add(files('../vma-writer.c'), libuuid)
31 +
32 softmmu_ss.add(when: 'CONFIG_TCG', if_true: files('blkreplay.c'))
33
34 if get_option('qcow1').allowed()
35 diff --git a/meson.build b/meson.build
36 index d5230eadd6..ffff66c0cc 100644
37 --- a/meson.build
38 +++ b/meson.build
39 @@ -1462,6 +1462,8 @@ keyutils = dependency('libkeyutils', required: false,
40
41 has_gettid = cc.has_function('gettid')
42
43 +libuuid = cc.find_library('uuid', required: true)
44 +
45 # libselinux
46 selinux = dependency('libselinux',
47 required: get_option('selinux'),
48 @@ -3607,6 +3609,9 @@ if have_tools
49 dependencies: [blockdev, qemuutil, gnutls, selinux],
50 install: true)
51
52 + vma = executable('vma', files('vma.c', 'vma-reader.c') + genh,
53 + dependencies: [authz, block, crypto, io, qom], install: true)
54 +
55 subdir('storage-daemon')
56 subdir('contrib/rdmacm-mux')
57 subdir('contrib/elf2dmp')
58 diff --git a/vma-reader.c b/vma-reader.c
59 new file mode 100644
60 index 0000000000..e65f1e8415
61 --- /dev/null
62 +++ b/vma-reader.c
63 @@ -0,0 +1,859 @@
64 +/*
65 + * VMA: Virtual Machine Archive
66 + *
67 + * Copyright (C) 2012 Proxmox Server Solutions
68 + *
69 + * Authors:
70 + * Dietmar Maurer (dietmar@proxmox.com)
71 + *
72 + * This work is licensed under the terms of the GNU GPL, version 2 or later.
73 + * See the COPYING file in the top-level directory.
74 + *
75 + */
76 +
77 +#include "qemu/osdep.h"
78 +#include <glib.h>
79 +#include <uuid/uuid.h>
80 +
81 +#include "qemu/timer.h"
82 +#include "qemu/ratelimit.h"
83 +#include "vma.h"
84 +#include "block/block.h"
85 +#include "sysemu/block-backend.h"
86 +
87 +static unsigned char zero_vma_block[VMA_BLOCK_SIZE];
88 +
89 +typedef struct VmaRestoreState {
90 + BlockBackend *target;
91 + bool write_zeroes;
92 + unsigned long *bitmap;
93 + int bitmap_size;
94 +} VmaRestoreState;
95 +
96 +struct VmaReader {
97 + int fd;
98 + GChecksum *md5csum;
99 + GHashTable *blob_hash;
100 + unsigned char *head_data;
101 + VmaDeviceInfo devinfo[256];
102 + VmaRestoreState rstate[256];
103 + GList *cdata_list;
104 + guint8 vmstate_stream;
105 + uint32_t vmstate_clusters;
106 + /* to show restore percentage if run with -v */
107 + time_t start_time;
108 + int64_t cluster_count;
109 + int64_t clusters_read;
110 + int64_t zero_cluster_data;
111 + int64_t partial_zero_cluster_data;
112 + int clusters_read_per;
113 +};
114 +
115 +static guint
116 +g_int32_hash(gconstpointer v)
117 +{
118 + return *(const uint32_t *)v;
119 +}
120 +
121 +static gboolean
122 +g_int32_equal(gconstpointer v1, gconstpointer v2)
123 +{
124 + return *((const uint32_t *)v1) == *((const uint32_t *)v2);
125 +}
126 +
127 +static int vma_reader_get_bitmap(VmaRestoreState *rstate, int64_t cluster_num)
128 +{
129 + assert(rstate);
130 + assert(rstate->bitmap);
131 +
132 + unsigned long val, idx, bit;
133 +
134 + idx = cluster_num / BITS_PER_LONG;
135 +
136 + assert(rstate->bitmap_size > idx);
137 +
138 + bit = cluster_num % BITS_PER_LONG;
139 + val = rstate->bitmap[idx];
140 +
141 + return !!(val & (1UL << bit));
142 +}
143 +
144 +static void vma_reader_set_bitmap(VmaRestoreState *rstate, int64_t cluster_num,
145 + int dirty)
146 +{
147 + assert(rstate);
148 + assert(rstate->bitmap);
149 +
150 + unsigned long val, idx, bit;
151 +
152 + idx = cluster_num / BITS_PER_LONG;
153 +
154 + assert(rstate->bitmap_size > idx);
155 +
156 + bit = cluster_num % BITS_PER_LONG;
157 + val = rstate->bitmap[idx];
158 + if (dirty) {
159 + if (!(val & (1UL << bit))) {
160 + val |= 1UL << bit;
161 + }
162 + } else {
163 + if (val & (1UL << bit)) {
164 + val &= ~(1UL << bit);
165 + }
166 + }
167 + rstate->bitmap[idx] = val;
168 +}
169 +
170 +typedef struct VmaBlob {
171 + uint32_t start;
172 + uint32_t len;
173 + void *data;
174 +} VmaBlob;
175 +
176 +static const VmaBlob *get_header_blob(VmaReader *vmar, uint32_t pos)
177 +{
178 + assert(vmar);
179 + assert(vmar->blob_hash);
180 +
181 + return g_hash_table_lookup(vmar->blob_hash, &pos);
182 +}
183 +
184 +static const char *get_header_str(VmaReader *vmar, uint32_t pos)
185 +{
186 + const VmaBlob *blob = get_header_blob(vmar, pos);
187 + if (!blob) {
188 + return NULL;
189 + }
190 + const char *res = (char *)blob->data;
191 + if (res[blob->len-1] != '\0') {
192 + return NULL;
193 + }
194 + return res;
195 +}
196 +
197 +static ssize_t
198 +safe_read(int fd, unsigned char *buf, size_t count)
199 +{
200 + ssize_t n;
201 +
202 + do {
203 + n = read(fd, buf, count);
204 + } while (n < 0 && errno == EINTR);
205 +
206 + return n;
207 +}
208 +
209 +static ssize_t
210 +full_read(int fd, unsigned char *buf, size_t len)
211 +{
212 + ssize_t n;
213 + size_t total;
214 +
215 + total = 0;
216 +
217 + while (len > 0) {
218 + n = safe_read(fd, buf, len);
219 +
220 + if (n == 0) {
221 + return total;
222 + }
223 +
224 + if (n <= 0) {
225 + break;
226 + }
227 +
228 + buf += n;
229 + total += n;
230 + len -= n;
231 + }
232 +
233 + if (len) {
234 + return -1;
235 + }
236 +
237 + return total;
238 +}
239 +
240 +void vma_reader_destroy(VmaReader *vmar)
241 +{
242 + assert(vmar);
243 +
244 + if (vmar->fd >= 0) {
245 + close(vmar->fd);
246 + }
247 +
248 + if (vmar->cdata_list) {
249 + g_list_free(vmar->cdata_list);
250 + }
251 +
252 + int i;
253 + for (i = 1; i < 256; i++) {
254 + if (vmar->rstate[i].bitmap) {
255 + g_free(vmar->rstate[i].bitmap);
256 + }
257 + if (vmar->rstate[i].target) {
258 + blk_unref(vmar->rstate[i].target);
259 + }
260 + }
261 +
262 + if (vmar->md5csum) {
263 + g_checksum_free(vmar->md5csum);
264 + }
265 +
266 + if (vmar->blob_hash) {
267 + g_hash_table_destroy(vmar->blob_hash);
268 + }
269 +
270 + if (vmar->head_data) {
271 + g_free(vmar->head_data);
272 + }
273 +
274 + g_free(vmar);
275 +
276 +};
277 +
278 +static int vma_reader_read_head(VmaReader *vmar, Error **errp)
279 +{
280 + assert(vmar);
281 + assert(errp);
282 + assert(*errp == NULL);
283 +
284 + unsigned char md5sum[16];
285 + int i;
286 + int ret = 0;
287 +
288 + vmar->head_data = g_malloc(sizeof(VmaHeader));
289 +
290 + if (full_read(vmar->fd, vmar->head_data, sizeof(VmaHeader)) !=
291 + sizeof(VmaHeader)) {
292 + error_setg(errp, "can't read vma header - %s",
293 + errno ? g_strerror(errno) : "got EOF");
294 + return -1;
295 + }
296 +
297 + VmaHeader *h = (VmaHeader *)vmar->head_data;
298 +
299 + if (h->magic != VMA_MAGIC) {
300 + error_setg(errp, "not a vma file - wrong magic number");
301 + return -1;
302 + }
303 +
304 + uint32_t header_size = GUINT32_FROM_BE(h->header_size);
305 + int need = header_size - sizeof(VmaHeader);
306 + if (need <= 0) {
307 + error_setg(errp, "wrong vma header size %d", header_size);
308 + return -1;
309 + }
310 +
311 + vmar->head_data = g_realloc(vmar->head_data, header_size);
312 + h = (VmaHeader *)vmar->head_data;
313 +
314 + if (full_read(vmar->fd, vmar->head_data + sizeof(VmaHeader), need) !=
315 + need) {
316 + error_setg(errp, "can't read vma header data - %s",
317 + errno ? g_strerror(errno) : "got EOF");
318 + return -1;
319 + }
320 +
321 + memcpy(md5sum, h->md5sum, 16);
322 + memset(h->md5sum, 0, 16);
323 +
324 + g_checksum_reset(vmar->md5csum);
325 + g_checksum_update(vmar->md5csum, vmar->head_data, header_size);
326 + gsize csize = 16;
327 + g_checksum_get_digest(vmar->md5csum, (guint8 *)(h->md5sum), &csize);
328 +
329 + if (memcmp(md5sum, h->md5sum, 16) != 0) {
330 + error_setg(errp, "wrong vma header chechsum");
331 + return -1;
332 + }
333 +
334 + /* we can modify header data after checksum verify */
335 + h->header_size = header_size;
336 +
337 + h->version = GUINT32_FROM_BE(h->version);
338 + if (h->version != 1) {
339 + error_setg(errp, "wrong vma version %d", h->version);
340 + return -1;
341 + }
342 +
343 + h->ctime = GUINT64_FROM_BE(h->ctime);
344 + h->blob_buffer_offset = GUINT32_FROM_BE(h->blob_buffer_offset);
345 + h->blob_buffer_size = GUINT32_FROM_BE(h->blob_buffer_size);
346 +
347 + uint32_t bstart = h->blob_buffer_offset + 1;
348 + uint32_t bend = h->blob_buffer_offset + h->blob_buffer_size;
349 +
350 + if (bstart <= sizeof(VmaHeader)) {
351 + error_setg(errp, "wrong vma blob buffer offset %d",
352 + h->blob_buffer_offset);
353 + return -1;
354 + }
355 +
356 + if (bend > header_size) {
357 + error_setg(errp, "wrong vma blob buffer size %d/%d",
358 + h->blob_buffer_offset, h->blob_buffer_size);
359 + return -1;
360 + }
361 +
362 + while ((bstart + 2) <= bend) {
363 + uint32_t size = vmar->head_data[bstart] +
364 + (vmar->head_data[bstart+1] << 8);
365 + if ((bstart + size + 2) <= bend) {
366 + VmaBlob *blob = g_new0(VmaBlob, 1);
367 + blob->start = bstart - h->blob_buffer_offset;
368 + blob->len = size;
369 + blob->data = vmar->head_data + bstart + 2;
370 + g_hash_table_insert(vmar->blob_hash, &blob->start, blob);
371 + }
372 + bstart += size + 2;
373 + }
374 +
375 +
376 + int count = 0;
377 + for (i = 1; i < 256; i++) {
378 + VmaDeviceInfoHeader *dih = &h->dev_info[i];
379 + uint32_t devname_ptr = GUINT32_FROM_BE(dih->devname_ptr);
380 + uint64_t size = GUINT64_FROM_BE(dih->size);
381 + const char *devname = get_header_str(vmar, devname_ptr);
382 +
383 + if (size && devname) {
384 + count++;
385 + vmar->devinfo[i].size = size;
386 + vmar->devinfo[i].devname = devname;
387 +
388 + if (strcmp(devname, "vmstate") == 0) {
389 + vmar->vmstate_stream = i;
390 + }
391 + }
392 + }
393 +
394 + for (i = 0; i < VMA_MAX_CONFIGS; i++) {
395 + uint32_t name_ptr = GUINT32_FROM_BE(h->config_names[i]);
396 + uint32_t data_ptr = GUINT32_FROM_BE(h->config_data[i]);
397 +
398 + if (!(name_ptr && data_ptr)) {
399 + continue;
400 + }
401 + const char *name = get_header_str(vmar, name_ptr);
402 + const VmaBlob *blob = get_header_blob(vmar, data_ptr);
403 +
404 + if (!(name && blob)) {
405 + error_setg(errp, "vma contains invalid data pointers");
406 + return -1;
407 + }
408 +
409 + VmaConfigData *cdata = g_new0(VmaConfigData, 1);
410 + cdata->name = name;
411 + cdata->data = blob->data;
412 + cdata->len = blob->len;
413 +
414 + vmar->cdata_list = g_list_append(vmar->cdata_list, cdata);
415 + }
416 +
417 + return ret;
418 +};
419 +
420 +VmaReader *vma_reader_create(const char *filename, Error **errp)
421 +{
422 + assert(filename);
423 + assert(errp);
424 +
425 + VmaReader *vmar = g_new0(VmaReader, 1);
426 +
427 + if (strcmp(filename, "-") == 0) {
428 + vmar->fd = dup(0);
429 + } else {
430 + vmar->fd = open(filename, O_RDONLY);
431 + }
432 +
433 + if (vmar->fd < 0) {
434 + error_setg(errp, "can't open file %s - %s\n", filename,
435 + g_strerror(errno));
436 + goto err;
437 + }
438 +
439 + vmar->md5csum = g_checksum_new(G_CHECKSUM_MD5);
440 + if (!vmar->md5csum) {
441 + error_setg(errp, "can't allocate cmsum\n");
442 + goto err;
443 + }
444 +
445 + vmar->blob_hash = g_hash_table_new_full(g_int32_hash, g_int32_equal,
446 + NULL, g_free);
447 +
448 + if (vma_reader_read_head(vmar, errp) < 0) {
449 + goto err;
450 + }
451 +
452 + return vmar;
453 +
454 +err:
455 + if (vmar) {
456 + vma_reader_destroy(vmar);
457 + }
458 +
459 + return NULL;
460 +}
461 +
462 +VmaHeader *vma_reader_get_header(VmaReader *vmar)
463 +{
464 + assert(vmar);
465 + assert(vmar->head_data);
466 +
467 + return (VmaHeader *)(vmar->head_data);
468 +}
469 +
470 +GList *vma_reader_get_config_data(VmaReader *vmar)
471 +{
472 + assert(vmar);
473 + assert(vmar->head_data);
474 +
475 + return vmar->cdata_list;
476 +}
477 +
478 +VmaDeviceInfo *vma_reader_get_device_info(VmaReader *vmar, guint8 dev_id)
479 +{
480 + assert(vmar);
481 + assert(dev_id);
482 +
483 + if (vmar->devinfo[dev_id].size && vmar->devinfo[dev_id].devname) {
484 + return &vmar->devinfo[dev_id];
485 + }
486 +
487 + return NULL;
488 +}
489 +
490 +static void allocate_rstate(VmaReader *vmar, guint8 dev_id,
491 + BlockBackend *target, bool write_zeroes)
492 +{
493 + assert(vmar);
494 + assert(dev_id);
495 +
496 + vmar->rstate[dev_id].target = target;
497 + vmar->rstate[dev_id].write_zeroes = write_zeroes;
498 +
499 + int64_t size = vmar->devinfo[dev_id].size;
500 +
501 + int64_t bitmap_size = (size/BDRV_SECTOR_SIZE) +
502 + (VMA_CLUSTER_SIZE/BDRV_SECTOR_SIZE) * BITS_PER_LONG - 1;
503 + bitmap_size /= (VMA_CLUSTER_SIZE/BDRV_SECTOR_SIZE) * BITS_PER_LONG;
504 +
505 + vmar->rstate[dev_id].bitmap_size = bitmap_size;
506 + vmar->rstate[dev_id].bitmap = g_new0(unsigned long, bitmap_size);
507 +
508 + vmar->cluster_count += size/VMA_CLUSTER_SIZE;
509 +}
510 +
511 +int vma_reader_register_bs(VmaReader *vmar, guint8 dev_id, BlockBackend *target,
512 + bool write_zeroes, Error **errp)
513 +{
514 + assert(vmar);
515 + assert(target != NULL);
516 + assert(dev_id);
517 + assert(vmar->rstate[dev_id].target == NULL);
518 +
519 + int64_t size = blk_getlength(target);
520 + int64_t size_diff = size - vmar->devinfo[dev_id].size;
521 +
522 + /* storage types can have different size restrictions, so it
523 + * is not always possible to create an image with exact size.
524 + * So we tolerate a size difference up to 4MB.
525 + */
526 + if ((size_diff < 0) || (size_diff > 4*1024*1024)) {
527 + error_setg(errp, "vma_reader_register_bs for stream %s failed - "
528 + "unexpected size %zd != %zd", vmar->devinfo[dev_id].devname,
529 + size, vmar->devinfo[dev_id].size);
530 + return -1;
531 + }
532 +
533 + allocate_rstate(vmar, dev_id, target, write_zeroes);
534 +
535 + return 0;
536 +}
537 +
538 +static ssize_t safe_write(int fd, void *buf, size_t count)
539 +{
540 + ssize_t n;
541 +
542 + do {
543 + n = write(fd, buf, count);
544 + } while (n < 0 && errno == EINTR);
545 +
546 + return n;
547 +}
548 +
549 +static size_t full_write(int fd, void *buf, size_t len)
550 +{
551 + ssize_t n;
552 + size_t total;
553 +
554 + total = 0;
555 +
556 + while (len > 0) {
557 + n = safe_write(fd, buf, len);
558 + if (n < 0) {
559 + return n;
560 + }
561 + buf += n;
562 + total += n;
563 + len -= n;
564 + }
565 +
566 + if (len) {
567 + /* incomplete write ? */
568 + return -1;
569 + }
570 +
571 + return total;
572 +}
573 +
574 +static int restore_write_data(VmaReader *vmar, guint8 dev_id,
575 + BlockBackend *target, int vmstate_fd,
576 + unsigned char *buf, int64_t sector_num,
577 + int nb_sectors, Error **errp)
578 +{
579 + assert(vmar);
580 +
581 + if (dev_id == vmar->vmstate_stream) {
582 + if (vmstate_fd >= 0) {
583 + int len = nb_sectors * BDRV_SECTOR_SIZE;
584 + int res = full_write(vmstate_fd, buf, len);
585 + if (res < 0) {
586 + error_setg(errp, "write vmstate failed %d", res);
587 + return -1;
588 + }
589 + }
590 + } else {
591 + int res = blk_pwrite(target, sector_num * BDRV_SECTOR_SIZE, nb_sectors * BDRV_SECTOR_SIZE, buf, 0);
592 + if (res < 0) {
593 + error_setg(errp, "blk_pwrite to %s failed (%d)",
594 + bdrv_get_device_name(blk_bs(target)), res);
595 + return -1;
596 + }
597 + }
598 + return 0;
599 +}
600 +
601 +static int restore_extent(VmaReader *vmar, unsigned char *buf,
602 + int extent_size, int vmstate_fd,
603 + bool verbose, bool verify, Error **errp)
604 +{
605 + assert(vmar);
606 + assert(buf);
607 +
608 + VmaExtentHeader *ehead = (VmaExtentHeader *)buf;
609 + int start = VMA_EXTENT_HEADER_SIZE;
610 + int i;
611 +
612 + for (i = 0; i < VMA_BLOCKS_PER_EXTENT; i++) {
613 + uint64_t block_info = GUINT64_FROM_BE(ehead->blockinfo[i]);
614 + uint64_t cluster_num = block_info & 0xffffffff;
615 + uint8_t dev_id = (block_info >> 32) & 0xff;
616 + uint16_t mask = block_info >> (32+16);
617 + int64_t max_sector;
618 +
619 + if (!dev_id) {
620 + continue;
621 + }
622 +
623 + VmaRestoreState *rstate = &vmar->rstate[dev_id];
624 + BlockBackend *target = NULL;
625 +
626 + if (dev_id != vmar->vmstate_stream) {
627 + target = rstate->target;
628 + if (!verify && !target) {
629 + error_setg(errp, "got wrong dev id %d", dev_id);
630 + return -1;
631 + }
632 +
633 + if (vma_reader_get_bitmap(rstate, cluster_num)) {
634 + error_setg(errp, "found duplicated cluster %zd for stream %s",
635 + cluster_num, vmar->devinfo[dev_id].devname);
636 + return -1;
637 + }
638 + vma_reader_set_bitmap(rstate, cluster_num, 1);
639 +
640 + max_sector = vmar->devinfo[dev_id].size/BDRV_SECTOR_SIZE;
641 + } else {
642 + max_sector = G_MAXINT64;
643 + if (cluster_num != vmar->vmstate_clusters) {
644 + error_setg(errp, "found out of order vmstate data");
645 + return -1;
646 + }
647 + vmar->vmstate_clusters++;
648 + }
649 +
650 + vmar->clusters_read++;
651 +
652 + if (verbose) {
653 + time_t duration = time(NULL) - vmar->start_time;
654 + int percent = (vmar->clusters_read*100)/vmar->cluster_count;
655 + if (percent != vmar->clusters_read_per) {
656 + printf("progress %d%% (read %zd bytes, duration %zd sec)\n",
657 + percent, vmar->clusters_read*VMA_CLUSTER_SIZE,
658 + duration);
659 + fflush(stdout);
660 + vmar->clusters_read_per = percent;
661 + }
662 + }
663 +
664 + /* try to write whole clusters to speedup restore */
665 + if (mask == 0xffff) {
666 + if ((start + VMA_CLUSTER_SIZE) > extent_size) {
667 + error_setg(errp, "short vma extent - too many blocks");
668 + return -1;
669 + }
670 + int64_t sector_num = (cluster_num * VMA_CLUSTER_SIZE) /
671 + BDRV_SECTOR_SIZE;
672 + int64_t end_sector = sector_num +
673 + VMA_CLUSTER_SIZE/BDRV_SECTOR_SIZE;
674 +
675 + if (end_sector > max_sector) {
676 + end_sector = max_sector;
677 + }
678 +
679 + if (end_sector <= sector_num) {
680 + error_setg(errp, "got wrong block address - write beyond end");
681 + return -1;
682 + }
683 +
684 + if (!verify) {
685 + int nb_sectors = end_sector - sector_num;
686 + if (restore_write_data(vmar, dev_id, target, vmstate_fd,
687 + buf + start, sector_num, nb_sectors,
688 + errp) < 0) {
689 + return -1;
690 + }
691 + }
692 +
693 + start += VMA_CLUSTER_SIZE;
694 + } else {
695 + int j;
696 + int bit = 1;
697 +
698 + for (j = 0; j < 16; j++) {
699 + int64_t sector_num = (cluster_num*VMA_CLUSTER_SIZE +
700 + j*VMA_BLOCK_SIZE)/BDRV_SECTOR_SIZE;
701 +
702 + int64_t end_sector = sector_num +
703 + VMA_BLOCK_SIZE/BDRV_SECTOR_SIZE;
704 + if (end_sector > max_sector) {
705 + end_sector = max_sector;
706 + }
707 +
708 + if (mask & bit) {
709 + if ((start + VMA_BLOCK_SIZE) > extent_size) {
710 + error_setg(errp, "short vma extent - too many blocks");
711 + return -1;
712 + }
713 +
714 + if (end_sector <= sector_num) {
715 + error_setg(errp, "got wrong block address - "
716 + "write beyond end");
717 + return -1;
718 + }
719 +
720 + if (!verify) {
721 + int nb_sectors = end_sector - sector_num;
722 + if (restore_write_data(vmar, dev_id, target, vmstate_fd,
723 + buf + start, sector_num,
724 + nb_sectors, errp) < 0) {
725 + return -1;
726 + }
727 + }
728 +
729 + start += VMA_BLOCK_SIZE;
730 +
731 + } else {
732 +
733 +
734 + if (end_sector > sector_num) {
735 + /* Todo: use bdrv_co_write_zeroes (but that need to
736 + * be run inside coroutine?)
737 + */
738 + int nb_sectors = end_sector - sector_num;
739 + int zero_size = BDRV_SECTOR_SIZE*nb_sectors;
740 + vmar->zero_cluster_data += zero_size;
741 + if (mask != 0) {
742 + vmar->partial_zero_cluster_data += zero_size;
743 + }
744 +
745 + if (rstate->write_zeroes && !verify) {
746 + if (restore_write_data(vmar, dev_id, target, vmstate_fd,
747 + zero_vma_block, sector_num,
748 + nb_sectors, errp) < 0) {
749 + return -1;
750 + }
751 + }
752 + }
753 + }
754 +
755 + bit = bit << 1;
756 + }
757 + }
758 + }
759 +
760 + if (start != extent_size) {
761 + error_setg(errp, "vma extent error - missing blocks");
762 + return -1;
763 + }
764 +
765 + return 0;
766 +}
767 +
768 +static int vma_reader_restore_full(VmaReader *vmar, int vmstate_fd,
769 + bool verbose, bool verify,
770 + Error **errp)
771 +{
772 + assert(vmar);
773 + assert(vmar->head_data);
774 +
775 + int ret = 0;
776 + unsigned char buf[VMA_MAX_EXTENT_SIZE];
777 + int buf_pos = 0;
778 + unsigned char md5sum[16];
779 + VmaHeader *h = (VmaHeader *)vmar->head_data;
780 +
781 + vmar->start_time = time(NULL);
782 +
783 + while (1) {
784 + int bytes = full_read(vmar->fd, buf + buf_pos, sizeof(buf) - buf_pos);
785 + if (bytes < 0) {
786 + error_setg(errp, "read failed - %s", g_strerror(errno));
787 + return -1;
788 + }
789 +
790 + buf_pos += bytes;
791 +
792 + if (!buf_pos) {
793 + break; /* EOF */
794 + }
795 +
796 + if (buf_pos < VMA_EXTENT_HEADER_SIZE) {
797 + error_setg(errp, "read short extent (%d bytes)", buf_pos);
798 + return -1;
799 + }
800 +
801 + VmaExtentHeader *ehead = (VmaExtentHeader *)buf;
802 +
803 + /* extract md5sum */
804 + memcpy(md5sum, ehead->md5sum, sizeof(ehead->md5sum));
805 + memset(ehead->md5sum, 0, sizeof(ehead->md5sum));
806 +
807 + g_checksum_reset(vmar->md5csum);
808 + g_checksum_update(vmar->md5csum, buf, VMA_EXTENT_HEADER_SIZE);
809 + gsize csize = 16;
810 + g_checksum_get_digest(vmar->md5csum, ehead->md5sum, &csize);
811 +
812 + if (memcmp(md5sum, ehead->md5sum, 16) != 0) {
813 + error_setg(errp, "wrong vma extent header chechsum");
814 + return -1;
815 + }
816 +
817 + if (memcmp(h->uuid, ehead->uuid, sizeof(ehead->uuid)) != 0) {
818 + error_setg(errp, "wrong vma extent uuid");
819 + return -1;
820 + }
821 +
822 + if (ehead->magic != VMA_EXTENT_MAGIC || ehead->reserved1 != 0) {
823 + error_setg(errp, "wrong vma extent header magic");
824 + return -1;
825 + }
826 +
827 + int block_count = GUINT16_FROM_BE(ehead->block_count);
828 + int extent_size = VMA_EXTENT_HEADER_SIZE + block_count*VMA_BLOCK_SIZE;
829 +
830 + if (buf_pos < extent_size) {
831 + error_setg(errp, "short vma extent (%d < %d)", buf_pos,
832 + extent_size);
833 + return -1;
834 + }
835 +
836 + if (restore_extent(vmar, buf, extent_size, vmstate_fd, verbose,
837 + verify, errp) < 0) {
838 + return -1;
839 + }
840 +
841 + if (buf_pos > extent_size) {
842 + memmove(buf, buf + extent_size, buf_pos - extent_size);
843 + buf_pos = buf_pos - extent_size;
844 + } else {
845 + buf_pos = 0;
846 + }
847 + }
848 +
849 + bdrv_drain_all();
850 +
851 + int i;
852 + for (i = 1; i < 256; i++) {
853 + VmaRestoreState *rstate = &vmar->rstate[i];
854 + if (!rstate->target) {
855 + continue;
856 + }
857 +
858 + if (blk_flush(rstate->target) < 0) {
859 + error_setg(errp, "vma blk_flush %s failed",
860 + vmar->devinfo[i].devname);
861 + return -1;
862 + }
863 +
864 + if (vmar->devinfo[i].size &&
865 + (strcmp(vmar->devinfo[i].devname, "vmstate") != 0)) {
866 + assert(rstate->bitmap);
867 +
868 + int64_t cluster_num, end;
869 +
870 + end = (vmar->devinfo[i].size + VMA_CLUSTER_SIZE - 1) /
871 + VMA_CLUSTER_SIZE;
872 +
873 + for (cluster_num = 0; cluster_num < end; cluster_num++) {
874 + if (!vma_reader_get_bitmap(rstate, cluster_num)) {
875 + error_setg(errp, "detected missing cluster %zd "
876 + "for stream %s", cluster_num,
877 + vmar->devinfo[i].devname);
878 + return -1;
879 + }
880 + }
881 + }
882 + }
883 +
884 + if (verbose) {
885 + if (vmar->clusters_read) {
886 + printf("total bytes read %zd, sparse bytes %zd (%.3g%%)\n",
887 + vmar->clusters_read*VMA_CLUSTER_SIZE,
888 + vmar->zero_cluster_data,
889 + (double)(100.0*vmar->zero_cluster_data)/
890 + (vmar->clusters_read*VMA_CLUSTER_SIZE));
891 +
892 + int64_t datasize = vmar->clusters_read*VMA_CLUSTER_SIZE-vmar->zero_cluster_data;
893 + if (datasize) { // this does not make sense for empty files
894 + printf("space reduction due to 4K zero blocks %.3g%%\n",
895 + (double)(100.0*vmar->partial_zero_cluster_data) / datasize);
896 + }
897 + } else {
898 + printf("vma archive contains no image data\n");
899 + }
900 + }
901 + return ret;
902 +}
903 +
904 +int vma_reader_restore(VmaReader *vmar, int vmstate_fd, bool verbose,
905 + Error **errp)
906 +{
907 + return vma_reader_restore_full(vmar, vmstate_fd, verbose, false, errp);
908 +}
909 +
910 +int vma_reader_verify(VmaReader *vmar, bool verbose, Error **errp)
911 +{
912 + guint8 dev_id;
913 +
914 + for (dev_id = 1; dev_id < 255; dev_id++) {
915 + if (vma_reader_get_device_info(vmar, dev_id)) {
916 + allocate_rstate(vmar, dev_id, NULL, false);
917 + }
918 + }
919 +
920 + return vma_reader_restore_full(vmar, -1, verbose, true, errp);
921 +}
922 +
923 diff --git a/vma-writer.c b/vma-writer.c
924 new file mode 100644
925 index 0000000000..df4b20793d
926 --- /dev/null
927 +++ b/vma-writer.c
928 @@ -0,0 +1,791 @@
929 +/*
930 + * VMA: Virtual Machine Archive
931 + *
932 + * Copyright (C) 2012 Proxmox Server Solutions
933 + *
934 + * Authors:
935 + * Dietmar Maurer (dietmar@proxmox.com)
936 + *
937 + * This work is licensed under the terms of the GNU GPL, version 2 or later.
938 + * See the COPYING file in the top-level directory.
939 + *
940 + */
941 +
942 +#include "qemu/osdep.h"
943 +#include <glib.h>
944 +#include <uuid/uuid.h>
945 +
946 +#include "vma.h"
947 +#include "block/block.h"
948 +#include "monitor/monitor.h"
949 +#include "qemu/main-loop.h"
950 +#include "qemu/coroutine.h"
951 +#include "qemu/cutils.h"
952 +#include "qemu/memalign.h"
953 +
954 +#define DEBUG_VMA 0
955 +
956 +#define DPRINTF(fmt, ...)\
957 + do { if (DEBUG_VMA) { printf("vma: " fmt, ## __VA_ARGS__); } } while (0)
958 +
959 +#define WRITE_BUFFERS 5
960 +#define HEADER_CLUSTERS 8
961 +#define HEADERBUF_SIZE (VMA_CLUSTER_SIZE*HEADER_CLUSTERS)
962 +
963 +struct VmaWriter {
964 + int fd;
965 + FILE *cmd;
966 + int status;
967 + char errmsg[8192];
968 + uuid_t uuid;
969 + bool header_written;
970 + bool closed;
971 +
972 + /* we always write extents */
973 + unsigned char *outbuf;
974 + int outbuf_pos; /* in bytes */
975 + int outbuf_count; /* in VMA_BLOCKS */
976 + uint64_t outbuf_block_info[VMA_BLOCKS_PER_EXTENT];
977 +
978 + unsigned char *headerbuf;
979 +
980 + GChecksum *md5csum;
981 + CoMutex flush_lock;
982 + Coroutine *co_writer;
983 +
984 + /* drive informations */
985 + VmaStreamInfo stream_info[256];
986 + guint stream_count;
987 +
988 + guint8 vmstate_stream;
989 + uint32_t vmstate_clusters;
990 +
991 + /* header blob table */
992 + char *header_blob_table;
993 + uint32_t header_blob_table_size;
994 + uint32_t header_blob_table_pos;
995 +
996 + /* store for config blobs */
997 + uint32_t config_names[VMA_MAX_CONFIGS]; /* offset into blob_buffer table */
998 + uint32_t config_data[VMA_MAX_CONFIGS]; /* offset into blob_buffer table */
999 + uint32_t config_count;
1000 +};
1001 +
1002 +void vma_writer_set_error(VmaWriter *vmaw, const char *fmt, ...)
1003 +{
1004 + va_list ap;
1005 +
1006 + if (vmaw->status < 0) {
1007 + return;
1008 + }
1009 +
1010 + vmaw->status = -1;
1011 +
1012 + va_start(ap, fmt);
1013 + g_vsnprintf(vmaw->errmsg, sizeof(vmaw->errmsg), fmt, ap);
1014 + va_end(ap);
1015 +
1016 + DPRINTF("vma_writer_set_error: %s\n", vmaw->errmsg);
1017 +}
1018 +
1019 +static uint32_t allocate_header_blob(VmaWriter *vmaw, const char *data,
1020 + size_t len)
1021 +{
1022 + if (len > 65535) {
1023 + return 0;
1024 + }
1025 +
1026 + if (!vmaw->header_blob_table ||
1027 + (vmaw->header_blob_table_size <
1028 + (vmaw->header_blob_table_pos + len + 2))) {
1029 + int newsize = vmaw->header_blob_table_size + ((len + 2 + 511)/512)*512;
1030 +
1031 + vmaw->header_blob_table = g_realloc(vmaw->header_blob_table, newsize);
1032 + memset(vmaw->header_blob_table + vmaw->header_blob_table_size,
1033 + 0, newsize - vmaw->header_blob_table_size);
1034 + vmaw->header_blob_table_size = newsize;
1035 + }
1036 +
1037 + uint32_t cpos = vmaw->header_blob_table_pos;
1038 + vmaw->header_blob_table[cpos] = len & 255;
1039 + vmaw->header_blob_table[cpos+1] = (len >> 8) & 255;
1040 + memcpy(vmaw->header_blob_table + cpos + 2, data, len);
1041 + vmaw->header_blob_table_pos += len + 2;
1042 + return cpos;
1043 +}
1044 +
1045 +static uint32_t allocate_header_string(VmaWriter *vmaw, const char *str)
1046 +{
1047 + assert(vmaw);
1048 +
1049 + size_t len = strlen(str) + 1;
1050 +
1051 + return allocate_header_blob(vmaw, str, len);
1052 +}
1053 +
1054 +int vma_writer_add_config(VmaWriter *vmaw, const char *name, gpointer data,
1055 + gsize len)
1056 +{
1057 + assert(vmaw);
1058 + assert(!vmaw->header_written);
1059 + assert(vmaw->config_count < VMA_MAX_CONFIGS);
1060 + assert(name);
1061 + assert(data);
1062 +
1063 + gchar *basename = g_path_get_basename(name);
1064 + uint32_t name_ptr = allocate_header_string(vmaw, basename);
1065 + g_free(basename);
1066 +
1067 + if (!name_ptr) {
1068 + return -1;
1069 + }
1070 +
1071 + uint32_t data_ptr = allocate_header_blob(vmaw, data, len);
1072 + if (!data_ptr) {
1073 + return -1;
1074 + }
1075 +
1076 + vmaw->config_names[vmaw->config_count] = name_ptr;
1077 + vmaw->config_data[vmaw->config_count] = data_ptr;
1078 +
1079 + vmaw->config_count++;
1080 +
1081 + return 0;
1082 +}
1083 +
1084 +int vma_writer_register_stream(VmaWriter *vmaw, const char *devname,
1085 + size_t size)
1086 +{
1087 + assert(vmaw);
1088 + assert(devname);
1089 + assert(!vmaw->status);
1090 +
1091 + if (vmaw->header_written) {
1092 + vma_writer_set_error(vmaw, "vma_writer_register_stream: header "
1093 + "already written");
1094 + return -1;
1095 + }
1096 +
1097 + guint n = vmaw->stream_count + 1;
1098 +
1099 + /* we can have dev_ids form 1 to 255 (0 reserved)
1100 + * 255(-1) reseverd for safety
1101 + */
1102 + if (n > 254) {
1103 + vma_writer_set_error(vmaw, "vma_writer_register_stream: "
1104 + "too many drives");
1105 + return -1;
1106 + }
1107 +
1108 + if (size <= 0) {
1109 + vma_writer_set_error(vmaw, "vma_writer_register_stream: "
1110 + "got strange size %zd", size);
1111 + return -1;
1112 + }
1113 +
1114 + DPRINTF("vma_writer_register_stream %s %zu %d\n", devname, size, n);
1115 +
1116 + vmaw->stream_info[n].devname = g_strdup(devname);
1117 + vmaw->stream_info[n].size = size;
1118 +
1119 + vmaw->stream_info[n].cluster_count = (size + VMA_CLUSTER_SIZE - 1) /
1120 + VMA_CLUSTER_SIZE;
1121 +
1122 + vmaw->stream_count = n;
1123 +
1124 + if (strcmp(devname, "vmstate") == 0) {
1125 + vmaw->vmstate_stream = n;
1126 + }
1127 +
1128 + return n;
1129 +}
1130 +
1131 +static void coroutine_fn yield_until_fd_writable(int fd)
1132 +{
1133 + assert(qemu_in_coroutine());
1134 + AioContext *ctx = qemu_get_current_aio_context();
1135 + aio_set_fd_handler(ctx, fd, false, NULL, (IOHandler *)qemu_coroutine_enter,
1136 + NULL, NULL, qemu_coroutine_self());
1137 + qemu_coroutine_yield();
1138 + aio_set_fd_handler(ctx, fd, false, NULL, NULL, NULL, NULL, NULL);
1139 +}
1140 +
1141 +static ssize_t coroutine_fn
1142 +vma_queue_write(VmaWriter *vmaw, const void *buf, size_t bytes)
1143 +{
1144 + DPRINTF("vma_queue_write enter %zd\n", bytes);
1145 +
1146 + assert(vmaw);
1147 + assert(buf);
1148 + assert(bytes <= VMA_MAX_EXTENT_SIZE);
1149 +
1150 + size_t done = 0;
1151 + ssize_t ret;
1152 +
1153 + assert(vmaw->co_writer == NULL);
1154 +
1155 + vmaw->co_writer = qemu_coroutine_self();
1156 +
1157 + while (done < bytes) {
1158 + if (vmaw->status < 0) {
1159 + DPRINTF("vma_queue_write detected canceled backup\n");
1160 + done = -1;
1161 + break;
1162 + }
1163 + yield_until_fd_writable(vmaw->fd);
1164 + ret = write(vmaw->fd, buf + done, bytes - done);
1165 + if (ret > 0) {
1166 + done += ret;
1167 + DPRINTF("vma_queue_write written %zd %zd\n", done, ret);
1168 + } else if (ret < 0) {
1169 + if (errno == EAGAIN || errno == EWOULDBLOCK) {
1170 + /* try again */
1171 + } else {
1172 + vma_writer_set_error(vmaw, "vma_queue_write: write error - %s",
1173 + g_strerror(errno));
1174 + done = -1; /* always return failure for partial writes */
1175 + break;
1176 + }
1177 + } else if (ret == 0) {
1178 + /* should not happen - simply try again */
1179 + }
1180 + }
1181 +
1182 + vmaw->co_writer = NULL;
1183 +
1184 + return (done == bytes) ? bytes : -1;
1185 +}
1186 +
1187 +VmaWriter *vma_writer_create(const char *filename, uuid_t uuid, Error **errp)
1188 +{
1189 + const char *p;
1190 +
1191 + assert(sizeof(VmaHeader) == (4096 + 8192));
1192 + assert(G_STRUCT_OFFSET(VmaHeader, config_names) == 2044);
1193 + assert(G_STRUCT_OFFSET(VmaHeader, config_data) == 3068);
1194 + assert(G_STRUCT_OFFSET(VmaHeader, dev_info) == 4096);
1195 + assert(sizeof(VmaExtentHeader) == 512);
1196 +
1197 + VmaWriter *vmaw = g_new0(VmaWriter, 1);
1198 + vmaw->fd = -1;
1199 +
1200 + vmaw->md5csum = g_checksum_new(G_CHECKSUM_MD5);
1201 + if (!vmaw->md5csum) {
1202 + error_setg(errp, "can't allocate cmsum\n");
1203 + goto err;
1204 + }
1205 +
1206 + if (strstart(filename, "exec:", &p)) {
1207 + vmaw->cmd = popen(p, "w");
1208 + if (vmaw->cmd == NULL) {
1209 + error_setg(errp, "can't popen command '%s' - %s\n", p,
1210 + g_strerror(errno));
1211 + goto err;
1212 + }
1213 + vmaw->fd = fileno(vmaw->cmd);
1214 +
1215 + /* try to use O_NONBLOCK */
1216 + fcntl(vmaw->fd, F_SETFL, fcntl(vmaw->fd, F_GETFL)|O_NONBLOCK);
1217 +
1218 + } else {
1219 + struct stat st;
1220 + int oflags;
1221 + const char *tmp_id_str;
1222 +
1223 + if ((stat(filename, &st) == 0) && S_ISFIFO(st.st_mode)) {
1224 + oflags = O_NONBLOCK|O_WRONLY;
1225 + vmaw->fd = qemu_open(filename, oflags, errp);
1226 + } else if (strstart(filename, "/dev/fdset/", &tmp_id_str)) {
1227 + oflags = O_NONBLOCK|O_WRONLY;
1228 + vmaw->fd = qemu_open(filename, oflags, errp);
1229 + } else if (strstart(filename, "/dev/fdname/", &tmp_id_str)) {
1230 + vmaw->fd = monitor_get_fd(monitor_cur(), tmp_id_str, errp);
1231 + if (vmaw->fd < 0) {
1232 + goto err;
1233 + }
1234 + /* try to use O_NONBLOCK */
1235 + fcntl(vmaw->fd, F_SETFL, fcntl(vmaw->fd, F_GETFL)|O_NONBLOCK);
1236 + } else {
1237 + oflags = O_NONBLOCK|O_DIRECT|O_WRONLY|O_EXCL;
1238 + vmaw->fd = qemu_create(filename, oflags, 0644, errp);
1239 + }
1240 +
1241 + if (vmaw->fd < 0) {
1242 + error_setg(errp, "can't open file %s - %s\n", filename,
1243 + g_strerror(errno));
1244 + goto err;
1245 + }
1246 + }
1247 +
1248 + /* we use O_DIRECT, so we need to align IO buffers */
1249 +
1250 + vmaw->outbuf = qemu_memalign(512, VMA_MAX_EXTENT_SIZE);
1251 + vmaw->headerbuf = qemu_memalign(512, HEADERBUF_SIZE);
1252 +
1253 + vmaw->outbuf_count = 0;
1254 + vmaw->outbuf_pos = VMA_EXTENT_HEADER_SIZE;
1255 +
1256 + vmaw->header_blob_table_pos = 1; /* start at pos 1 */
1257 +
1258 + qemu_co_mutex_init(&vmaw->flush_lock);
1259 +
1260 + uuid_copy(vmaw->uuid, uuid);
1261 +
1262 + return vmaw;
1263 +
1264 +err:
1265 + if (vmaw) {
1266 + if (vmaw->cmd) {
1267 + pclose(vmaw->cmd);
1268 + } else if (vmaw->fd >= 0) {
1269 + close(vmaw->fd);
1270 + }
1271 +
1272 + if (vmaw->md5csum) {
1273 + g_checksum_free(vmaw->md5csum);
1274 + }
1275 +
1276 + g_free(vmaw);
1277 + }
1278 +
1279 + return NULL;
1280 +}
1281 +
1282 +static int coroutine_fn vma_write_header(VmaWriter *vmaw)
1283 +{
1284 + assert(vmaw);
1285 + unsigned char *buf = vmaw->headerbuf;
1286 + VmaHeader *head = (VmaHeader *)buf;
1287 +
1288 + int i;
1289 +
1290 + DPRINTF("VMA WRITE HEADER\n");
1291 +
1292 + if (vmaw->status < 0) {
1293 + return vmaw->status;
1294 + }
1295 +
1296 + memset(buf, 0, HEADERBUF_SIZE);
1297 +
1298 + head->magic = VMA_MAGIC;
1299 + head->version = GUINT32_TO_BE(1); /* v1 */
1300 + memcpy(head->uuid, vmaw->uuid, 16);
1301 +
1302 + time_t ctime = time(NULL);
1303 + head->ctime = GUINT64_TO_BE(ctime);
1304 +
1305 + for (i = 0; i < VMA_MAX_CONFIGS; i++) {
1306 + head->config_names[i] = GUINT32_TO_BE(vmaw->config_names[i]);
1307 + head->config_data[i] = GUINT32_TO_BE(vmaw->config_data[i]);
1308 + }
1309 +
1310 + /* 32 bytes per device (12 used currently) = 8192 bytes max */
1311 + for (i = 1; i <= 254; i++) {
1312 + VmaStreamInfo *si = &vmaw->stream_info[i];
1313 + if (si->size) {
1314 + assert(si->devname);
1315 + uint32_t devname_ptr = allocate_header_string(vmaw, si->devname);
1316 + if (!devname_ptr) {
1317 + return -1;
1318 + }
1319 + head->dev_info[i].devname_ptr = GUINT32_TO_BE(devname_ptr);
1320 + head->dev_info[i].size = GUINT64_TO_BE(si->size);
1321 + }
1322 + }
1323 +
1324 + uint32_t header_size = sizeof(VmaHeader) + vmaw->header_blob_table_size;
1325 + head->header_size = GUINT32_TO_BE(header_size);
1326 +
1327 + if (header_size > HEADERBUF_SIZE) {
1328 + return -1; /* just to be sure */
1329 + }
1330 +
1331 + uint32_t blob_buffer_offset = sizeof(VmaHeader);
1332 + memcpy(buf + blob_buffer_offset, vmaw->header_blob_table,
1333 + vmaw->header_blob_table_size);
1334 + head->blob_buffer_offset = GUINT32_TO_BE(blob_buffer_offset);
1335 + head->blob_buffer_size = GUINT32_TO_BE(vmaw->header_blob_table_pos);
1336 +
1337 + g_checksum_reset(vmaw->md5csum);
1338 + g_checksum_update(vmaw->md5csum, (const guchar *)buf, header_size);
1339 + gsize csize = 16;
1340 + g_checksum_get_digest(vmaw->md5csum, (guint8 *)(head->md5sum), &csize);
1341 +
1342 + return vma_queue_write(vmaw, buf, header_size);
1343 +}
1344 +
1345 +static int coroutine_fn vma_writer_flush(VmaWriter *vmaw)
1346 +{
1347 + assert(vmaw);
1348 +
1349 + int ret;
1350 + int i;
1351 +
1352 + if (vmaw->status < 0) {
1353 + return vmaw->status;
1354 + }
1355 +
1356 + if (!vmaw->header_written) {
1357 + vmaw->header_written = true;
1358 + ret = vma_write_header(vmaw);
1359 + if (ret < 0) {
1360 + vma_writer_set_error(vmaw, "vma_writer_flush: write header failed");
1361 + return ret;
1362 + }
1363 + }
1364 +
1365 + DPRINTF("VMA WRITE FLUSH %d %d\n", vmaw->outbuf_count, vmaw->outbuf_pos);
1366 +
1367 +
1368 + VmaExtentHeader *ehead = (VmaExtentHeader *)vmaw->outbuf;
1369 +
1370 + ehead->magic = VMA_EXTENT_MAGIC;
1371 + ehead->reserved1 = 0;
1372 +
1373 + for (i = 0; i < VMA_BLOCKS_PER_EXTENT; i++) {
1374 + ehead->blockinfo[i] = GUINT64_TO_BE(vmaw->outbuf_block_info[i]);
1375 + }
1376 +
1377 + guint16 block_count = (vmaw->outbuf_pos - VMA_EXTENT_HEADER_SIZE) /
1378 + VMA_BLOCK_SIZE;
1379 +
1380 + ehead->block_count = GUINT16_TO_BE(block_count);
1381 +
1382 + memcpy(ehead->uuid, vmaw->uuid, sizeof(ehead->uuid));
1383 + memset(ehead->md5sum, 0, sizeof(ehead->md5sum));
1384 +
1385 + g_checksum_reset(vmaw->md5csum);
1386 + g_checksum_update(vmaw->md5csum, vmaw->outbuf, VMA_EXTENT_HEADER_SIZE);
1387 + gsize csize = 16;
1388 + g_checksum_get_digest(vmaw->md5csum, ehead->md5sum, &csize);
1389 +
1390 + int bytes = vmaw->outbuf_pos;
1391 + ret = vma_queue_write(vmaw, vmaw->outbuf, bytes);
1392 + if (ret != bytes) {
1393 + vma_writer_set_error(vmaw, "vma_writer_flush: failed write");
1394 + }
1395 +
1396 + vmaw->outbuf_count = 0;
1397 + vmaw->outbuf_pos = VMA_EXTENT_HEADER_SIZE;
1398 +
1399 + for (i = 0; i < VMA_BLOCKS_PER_EXTENT; i++) {
1400 + vmaw->outbuf_block_info[i] = 0;
1401 + }
1402 +
1403 + return vmaw->status;
1404 +}
1405 +
1406 +static int vma_count_open_streams(VmaWriter *vmaw)
1407 +{
1408 + g_assert(vmaw != NULL);
1409 +
1410 + int i;
1411 + int open_drives = 0;
1412 + for (i = 0; i <= 255; i++) {
1413 + if (vmaw->stream_info[i].size && !vmaw->stream_info[i].finished) {
1414 + open_drives++;
1415 + }
1416 + }
1417 +
1418 + return open_drives;
1419 +}
1420 +
1421 +
1422 +/**
1423 + * You need to call this if the vma archive does not contain
1424 + * any data stream.
1425 + */
1426 +int coroutine_fn
1427 +vma_writer_flush_output(VmaWriter *vmaw)
1428 +{
1429 + qemu_co_mutex_lock(&vmaw->flush_lock);
1430 + int ret = vma_writer_flush(vmaw);
1431 + qemu_co_mutex_unlock(&vmaw->flush_lock);
1432 + if (ret < 0) {
1433 + vma_writer_set_error(vmaw, "vma_writer_flush_header failed");
1434 + }
1435 + return ret;
1436 +}
1437 +
1438 +/**
1439 + * all jobs should call this when there is no more data
1440 + * Returns: number of remaining stream (0 ==> finished)
1441 + */
1442 +int coroutine_fn
1443 +vma_writer_close_stream(VmaWriter *vmaw, uint8_t dev_id)
1444 +{
1445 + g_assert(vmaw != NULL);
1446 +
1447 + DPRINTF("vma_writer_set_status %d\n", dev_id);
1448 + if (!vmaw->stream_info[dev_id].size) {
1449 + vma_writer_set_error(vmaw, "vma_writer_close_stream: "
1450 + "no such stream %d", dev_id);
1451 + return -1;
1452 + }
1453 + if (vmaw->stream_info[dev_id].finished) {
1454 + vma_writer_set_error(vmaw, "vma_writer_close_stream: "
1455 + "stream already closed %d", dev_id);
1456 + return -1;
1457 + }
1458 +
1459 + vmaw->stream_info[dev_id].finished = true;
1460 +
1461 + int open_drives = vma_count_open_streams(vmaw);
1462 +
1463 + if (open_drives <= 0) {
1464 + DPRINTF("vma_writer_set_status all drives completed\n");
1465 + vma_writer_flush_output(vmaw);
1466 + }
1467 +
1468 + return open_drives;
1469 +}
1470 +
1471 +int vma_writer_get_status(VmaWriter *vmaw, VmaStatus *status)
1472 +{
1473 + int i;
1474 +
1475 + g_assert(vmaw != NULL);
1476 +
1477 + if (status) {
1478 + status->status = vmaw->status;
1479 + g_strlcpy(status->errmsg, vmaw->errmsg, sizeof(status->errmsg));
1480 + for (i = 0; i <= 255; i++) {
1481 + status->stream_info[i] = vmaw->stream_info[i];
1482 + }
1483 +
1484 + uuid_unparse_lower(vmaw->uuid, status->uuid_str);
1485 + }
1486 +
1487 + status->closed = vmaw->closed;
1488 +
1489 + return vmaw->status;
1490 +}
1491 +
1492 +static int vma_writer_get_buffer(VmaWriter *vmaw)
1493 +{
1494 + int ret = 0;
1495 +
1496 + qemu_co_mutex_lock(&vmaw->flush_lock);
1497 +
1498 + /* wait until buffer is available */
1499 + while (vmaw->outbuf_count >= (VMA_BLOCKS_PER_EXTENT - 1)) {
1500 + ret = vma_writer_flush(vmaw);
1501 + if (ret < 0) {
1502 + vma_writer_set_error(vmaw, "vma_writer_get_buffer: flush failed");
1503 + break;
1504 + }
1505 + }
1506 +
1507 + qemu_co_mutex_unlock(&vmaw->flush_lock);
1508 +
1509 + return ret;
1510 +}
1511 +
1512 +
1513 +int64_t coroutine_fn
1514 +vma_writer_write(VmaWriter *vmaw, uint8_t dev_id, int64_t cluster_num,
1515 + const unsigned char *buf, size_t *zero_bytes)
1516 +{
1517 + g_assert(vmaw != NULL);
1518 + g_assert(zero_bytes != NULL);
1519 +
1520 + *zero_bytes = 0;
1521 +
1522 + if (vmaw->status < 0) {
1523 + return vmaw->status;
1524 + }
1525 +
1526 + if (!dev_id || !vmaw->stream_info[dev_id].size) {
1527 + vma_writer_set_error(vmaw, "vma_writer_write: "
1528 + "no such stream %d", dev_id);
1529 + return -1;
1530 + }
1531 +
1532 + if (vmaw->stream_info[dev_id].finished) {
1533 + vma_writer_set_error(vmaw, "vma_writer_write: "
1534 + "stream already closed %d", dev_id);
1535 + return -1;
1536 + }
1537 +
1538 +
1539 + if (cluster_num >= (((uint64_t)1)<<32)) {
1540 + vma_writer_set_error(vmaw, "vma_writer_write: "
1541 + "cluster number out of range");
1542 + return -1;
1543 + }
1544 +
1545 + if (dev_id == vmaw->vmstate_stream) {
1546 + if (cluster_num != vmaw->vmstate_clusters) {
1547 + vma_writer_set_error(vmaw, "vma_writer_write: "
1548 + "non sequential vmstate write");
1549 + }
1550 + vmaw->vmstate_clusters++;
1551 + } else if (cluster_num >= vmaw->stream_info[dev_id].cluster_count) {
1552 + vma_writer_set_error(vmaw, "vma_writer_write: cluster number too big");
1553 + return -1;
1554 + }
1555 +
1556 + /* wait until buffer is available */
1557 + if (vma_writer_get_buffer(vmaw) < 0) {
1558 + vma_writer_set_error(vmaw, "vma_writer_write: "
1559 + "vma_writer_get_buffer failed");
1560 + return -1;
1561 + }
1562 +
1563 + DPRINTF("VMA WRITE %d %zd\n", dev_id, cluster_num);
1564 +
1565 + uint64_t dev_size = vmaw->stream_info[dev_id].size;
1566 + uint16_t mask = 0;
1567 +
1568 + if (buf) {
1569 + int i;
1570 + int bit = 1;
1571 + uint64_t byte_offset = cluster_num * VMA_CLUSTER_SIZE;
1572 + for (i = 0; i < 16; i++) {
1573 + const unsigned char *vmablock = buf + (i*VMA_BLOCK_SIZE);
1574 +
1575 + // Note: If the source is not 64k-aligned, we might reach 4k blocks
1576 + // after the end of the device. Always mark these as zero in the
1577 + // mask, so the restore handles them correctly.
1578 + if (byte_offset < dev_size &&
1579 + !buffer_is_zero(vmablock, VMA_BLOCK_SIZE))
1580 + {
1581 + mask |= bit;
1582 + memcpy(vmaw->outbuf + vmaw->outbuf_pos, vmablock,
1583 + VMA_BLOCK_SIZE);
1584 +
1585 + // prevent memory leakage on unaligned last block
1586 + if (byte_offset + VMA_BLOCK_SIZE > dev_size) {
1587 + uint64_t real_data_in_block = dev_size - byte_offset;
1588 + memset(vmaw->outbuf + vmaw->outbuf_pos + real_data_in_block,
1589 + 0, VMA_BLOCK_SIZE - real_data_in_block);
1590 + }
1591 +
1592 + vmaw->outbuf_pos += VMA_BLOCK_SIZE;
1593 + } else {
1594 + DPRINTF("VMA WRITE %zd ZERO BLOCK %d\n", cluster_num, i);
1595 + vmaw->stream_info[dev_id].zero_bytes += VMA_BLOCK_SIZE;
1596 + *zero_bytes += VMA_BLOCK_SIZE;
1597 + }
1598 +
1599 + byte_offset += VMA_BLOCK_SIZE;
1600 + bit = bit << 1;
1601 + }
1602 + } else {
1603 + DPRINTF("VMA WRITE %zd ZERO CLUSTER\n", cluster_num);
1604 + vmaw->stream_info[dev_id].zero_bytes += VMA_CLUSTER_SIZE;
1605 + *zero_bytes += VMA_CLUSTER_SIZE;
1606 + }
1607 +
1608 + uint64_t block_info = ((uint64_t)mask) << (32+16);
1609 + block_info |= ((uint64_t)dev_id) << 32;
1610 + block_info |= (cluster_num & 0xffffffff);
1611 + vmaw->outbuf_block_info[vmaw->outbuf_count] = block_info;
1612 +
1613 + DPRINTF("VMA WRITE MASK %zd %zx\n", cluster_num, block_info);
1614 +
1615 + vmaw->outbuf_count++;
1616 +
1617 + /** NOTE: We allways write whole clusters, but we correctly set
1618 + * transferred bytes. So transferred == size when when everything
1619 + * went OK.
1620 + */
1621 + size_t transferred = VMA_CLUSTER_SIZE;
1622 +
1623 + if (dev_id != vmaw->vmstate_stream) {
1624 + uint64_t last = (cluster_num + 1) * VMA_CLUSTER_SIZE;
1625 + if (last > dev_size) {
1626 + uint64_t diff = last - dev_size;
1627 + if (diff >= VMA_CLUSTER_SIZE) {
1628 + vma_writer_set_error(vmaw, "vma_writer_write: "
1629 + "read after last cluster");
1630 + return -1;
1631 + }
1632 + transferred -= diff;
1633 + }
1634 + }
1635 +
1636 + vmaw->stream_info[dev_id].transferred += transferred;
1637 +
1638 + return transferred;
1639 +}
1640 +
1641 +void vma_writer_error_propagate(VmaWriter *vmaw, Error **errp)
1642 +{
1643 + if (vmaw->status < 0 && *errp == NULL) {
1644 + error_setg(errp, "%s", vmaw->errmsg);
1645 + }
1646 +}
1647 +
1648 +int vma_writer_close(VmaWriter *vmaw, Error **errp)
1649 +{
1650 + g_assert(vmaw != NULL);
1651 +
1652 + int i;
1653 +
1654 + qemu_co_mutex_lock(&vmaw->flush_lock); // wait for pending writes
1655 +
1656 + assert(vmaw->co_writer == NULL);
1657 +
1658 + if (vmaw->cmd) {
1659 + if (pclose(vmaw->cmd) < 0) {
1660 + vma_writer_set_error(vmaw, "vma_writer_close: "
1661 + "pclose failed - %s", g_strerror(errno));
1662 + }
1663 + } else {
1664 + if (close(vmaw->fd) < 0) {
1665 + vma_writer_set_error(vmaw, "vma_writer_close: "
1666 + "close failed - %s", g_strerror(errno));
1667 + }
1668 + }
1669 +
1670 + for (i = 0; i <= 255; i++) {
1671 + VmaStreamInfo *si = &vmaw->stream_info[i];
1672 + if (si->size) {
1673 + if (!si->finished) {
1674 + vma_writer_set_error(vmaw, "vma_writer_close: "
1675 + "detected open stream '%s'", si->devname);
1676 + } else if ((si->transferred != si->size) &&
1677 + (i != vmaw->vmstate_stream)) {
1678 + vma_writer_set_error(vmaw, "vma_writer_close: "
1679 + "incomplete stream '%s' (%zd != %zd)",
1680 + si->devname, si->transferred, si->size);
1681 + }
1682 + }
1683 + }
1684 +
1685 + for (i = 0; i <= 255; i++) {
1686 + vmaw->stream_info[i].finished = 1; /* mark as closed */
1687 + }
1688 +
1689 + vmaw->closed = 1;
1690 +
1691 + if (vmaw->status < 0 && *errp == NULL) {
1692 + error_setg(errp, "%s", vmaw->errmsg);
1693 + }
1694 +
1695 + qemu_co_mutex_unlock(&vmaw->flush_lock);
1696 +
1697 + return vmaw->status;
1698 +}
1699 +
1700 +void vma_writer_destroy(VmaWriter *vmaw)
1701 +{
1702 + assert(vmaw);
1703 +
1704 + int i;
1705 +
1706 + for (i = 0; i <= 255; i++) {
1707 + if (vmaw->stream_info[i].devname) {
1708 + g_free(vmaw->stream_info[i].devname);
1709 + }
1710 + }
1711 +
1712 + if (vmaw->md5csum) {
1713 + g_checksum_free(vmaw->md5csum);
1714 + }
1715 +
1716 + qemu_vfree(vmaw->headerbuf);
1717 + qemu_vfree(vmaw->outbuf);
1718 + g_free(vmaw);
1719 +}
1720 diff --git a/vma.c b/vma.c
1721 new file mode 100644
1722 index 0000000000..e8dffb43e0
1723 --- /dev/null
1724 +++ b/vma.c
1725 @@ -0,0 +1,849 @@
1726 +/*
1727 + * VMA: Virtual Machine Archive
1728 + *
1729 + * Copyright (C) 2012-2013 Proxmox Server Solutions
1730 + *
1731 + * Authors:
1732 + * Dietmar Maurer (dietmar@proxmox.com)
1733 + *
1734 + * This work is licensed under the terms of the GNU GPL, version 2 or later.
1735 + * See the COPYING file in the top-level directory.
1736 + *
1737 + */
1738 +
1739 +#include "qemu/osdep.h"
1740 +#include <glib.h>
1741 +
1742 +#include "vma.h"
1743 +#include "qemu/module.h"
1744 +#include "qemu/error-report.h"
1745 +#include "qemu/main-loop.h"
1746 +#include "qemu/cutils.h"
1747 +#include "qemu/memalign.h"
1748 +#include "qapi/qmp/qdict.h"
1749 +#include "sysemu/block-backend.h"
1750 +
1751 +static void help(void)
1752 +{
1753 + const char *help_msg =
1754 + "usage: vma command [command options]\n"
1755 + "\n"
1756 + "vma list <filename>\n"
1757 + "vma config <filename> [-c config]\n"
1758 + "vma create <filename> [-c config] pathname ...\n"
1759 + "vma extract <filename> [-r <fifo>] <targetdir>\n"
1760 + "vma verify <filename> [-v]\n"
1761 + ;
1762 +
1763 + printf("%s", help_msg);
1764 + exit(1);
1765 +}
1766 +
1767 +static const char *extract_devname(const char *path, char **devname, int index)
1768 +{
1769 + assert(path);
1770 +
1771 + const char *sep = strchr(path, '=');
1772 +
1773 + if (sep) {
1774 + *devname = g_strndup(path, sep - path);
1775 + path = sep + 1;
1776 + } else {
1777 + if (index >= 0) {
1778 + *devname = g_strdup_printf("disk%d", index);
1779 + } else {
1780 + *devname = NULL;
1781 + }
1782 + }
1783 +
1784 + return path;
1785 +}
1786 +
1787 +static void print_content(VmaReader *vmar)
1788 +{
1789 + assert(vmar);
1790 +
1791 + VmaHeader *head = vma_reader_get_header(vmar);
1792 +
1793 + GList *l = vma_reader_get_config_data(vmar);
1794 + while (l && l->data) {
1795 + VmaConfigData *cdata = (VmaConfigData *)l->data;
1796 + l = g_list_next(l);
1797 + printf("CFG: size: %d name: %s\n", cdata->len, cdata->name);
1798 + }
1799 +
1800 + int i;
1801 + VmaDeviceInfo *di;
1802 + for (i = 1; i < 255; i++) {
1803 + di = vma_reader_get_device_info(vmar, i);
1804 + if (di) {
1805 + if (strcmp(di->devname, "vmstate") == 0) {
1806 + printf("VMSTATE: dev_id=%d memory: %zd\n", i, di->size);
1807 + } else {
1808 + printf("DEV: dev_id=%d size: %zd devname: %s\n",
1809 + i, di->size, di->devname);
1810 + }
1811 + }
1812 + }
1813 + /* ctime is the last entry we print */
1814 + printf("CTIME: %s", ctime(&head->ctime));
1815 + fflush(stdout);
1816 +}
1817 +
1818 +static int list_content(int argc, char **argv)
1819 +{
1820 + int c, ret = 0;
1821 + const char *filename;
1822 +
1823 + for (;;) {
1824 + c = getopt(argc, argv, "h");
1825 + if (c == -1) {
1826 + break;
1827 + }
1828 + switch (c) {
1829 + case '?':
1830 + case 'h':
1831 + help();
1832 + break;
1833 + default:
1834 + g_assert_not_reached();
1835 + }
1836 + }
1837 +
1838 + /* Get the filename */
1839 + if ((optind + 1) != argc) {
1840 + help();
1841 + }
1842 + filename = argv[optind++];
1843 +
1844 + Error *errp = NULL;
1845 + VmaReader *vmar = vma_reader_create(filename, &errp);
1846 +
1847 + if (!vmar) {
1848 + g_error("%s", error_get_pretty(errp));
1849 + }
1850 +
1851 + print_content(vmar);
1852 +
1853 + vma_reader_destroy(vmar);
1854 +
1855 + return ret;
1856 +}
1857 +
1858 +typedef struct RestoreMap {
1859 + char *devname;
1860 + char *path;
1861 + char *format;
1862 + uint64_t throttling_bps;
1863 + char *throttling_group;
1864 + char *cache;
1865 + bool write_zero;
1866 +} RestoreMap;
1867 +
1868 +static bool try_parse_option(char **line, const char *optname, char **out, const char *inbuf) {
1869 + size_t optlen = strlen(optname);
1870 + if (strncmp(*line, optname, optlen) != 0 || (*line)[optlen] != '=') {
1871 + return false;
1872 + }
1873 + if (*out) {
1874 + g_error("read map failed - duplicate value for option '%s'", optname);
1875 + }
1876 + char *value = (*line) + optlen + 1; /* including a '=' */
1877 + char *colon = strchr(value, ':');
1878 + if (!colon) {
1879 + g_error("read map failed - option '%s' not terminated ('%s')",
1880 + optname, inbuf);
1881 + }
1882 + *line = colon+1;
1883 + *out = g_strndup(value, colon - value);
1884 + return true;
1885 +}
1886 +
1887 +static uint64_t verify_u64(const char *text) {
1888 + uint64_t value;
1889 + const char *endptr = NULL;
1890 + if (qemu_strtou64(text, &endptr, 0, &value) != 0 || !endptr || *endptr) {
1891 + g_error("read map failed - not a number: %s", text);
1892 + }
1893 + return value;
1894 +}
1895 +
1896 +static int extract_content(int argc, char **argv)
1897 +{
1898 + int c, ret = 0;
1899 + int verbose = 0;
1900 + const char *filename;
1901 + const char *dirname;
1902 + const char *readmap = NULL;
1903 +
1904 + for (;;) {
1905 + c = getopt(argc, argv, "hvr:");
1906 + if (c == -1) {
1907 + break;
1908 + }
1909 + switch (c) {
1910 + case '?':
1911 + case 'h':
1912 + help();
1913 + break;
1914 + case 'r':
1915 + readmap = optarg;
1916 + break;
1917 + case 'v':
1918 + verbose = 1;
1919 + break;
1920 + default:
1921 + help();
1922 + }
1923 + }
1924 +
1925 + /* Get the filename */
1926 + if ((optind + 2) != argc) {
1927 + help();
1928 + }
1929 + filename = argv[optind++];
1930 + dirname = argv[optind++];
1931 +
1932 + Error *errp = NULL;
1933 + VmaReader *vmar = vma_reader_create(filename, &errp);
1934 +
1935 + if (!vmar) {
1936 + g_error("%s", error_get_pretty(errp));
1937 + }
1938 +
1939 + if (mkdir(dirname, 0777) < 0) {
1940 + g_error("unable to create target directory %s - %s",
1941 + dirname, g_strerror(errno));
1942 + }
1943 +
1944 + GList *l = vma_reader_get_config_data(vmar);
1945 + while (l && l->data) {
1946 + VmaConfigData *cdata = (VmaConfigData *)l->data;
1947 + l = g_list_next(l);
1948 + char *cfgfn = g_strdup_printf("%s/%s", dirname, cdata->name);
1949 + GError *err = NULL;
1950 + if (!g_file_set_contents(cfgfn, (gchar *)cdata->data, cdata->len,
1951 + &err)) {
1952 + g_error("unable to write file: %s", err->message);
1953 + }
1954 + }
1955 +
1956 + GHashTable *devmap = g_hash_table_new(g_str_hash, g_str_equal);
1957 +
1958 + if (readmap) {
1959 + print_content(vmar);
1960 +
1961 + FILE *map = fopen(readmap, "r");
1962 + if (!map) {
1963 + g_error("unable to open fifo %s - %s", readmap, g_strerror(errno));
1964 + }
1965 +
1966 + while (1) {
1967 + char inbuf[8192];
1968 + char *line = fgets(inbuf, sizeof(inbuf), map);
1969 + char *format = NULL;
1970 + char *bps = NULL;
1971 + char *group = NULL;
1972 + char *cache = NULL;
1973 + if (!line || line[0] == '\0' || !strcmp(line, "done\n")) {
1974 + break;
1975 + }
1976 + int len = strlen(line);
1977 + if (line[len - 1] == '\n') {
1978 + line[len - 1] = '\0';
1979 + if (len == 1) {
1980 + break;
1981 + }
1982 + }
1983 +
1984 + while (1) {
1985 + if (!try_parse_option(&line, "format", &format, inbuf) &&
1986 + !try_parse_option(&line, "throttling.bps", &bps, inbuf) &&
1987 + !try_parse_option(&line, "throttling.group", &group, inbuf) &&
1988 + !try_parse_option(&line, "cache", &cache, inbuf))
1989 + {
1990 + break;
1991 + }
1992 + }
1993 +
1994 + uint64_t bps_value = 0;
1995 + if (bps) {
1996 + bps_value = verify_u64(bps);
1997 + g_free(bps);
1998 + }
1999 +
2000 + const char *path;
2001 + bool write_zero;
2002 + if (line[0] == '0' && line[1] == ':') {
2003 + path = line + 2;
2004 + write_zero = false;
2005 + } else if (line[0] == '1' && line[1] == ':') {
2006 + path = line + 2;
2007 + write_zero = true;
2008 + } else {
2009 + g_error("read map failed - parse error ('%s')", inbuf);
2010 + }
2011 +
2012 + char *devname = NULL;
2013 + path = extract_devname(path, &devname, -1);
2014 + if (!devname) {
2015 + g_error("read map failed - no dev name specified ('%s')",
2016 + inbuf);
2017 + }
2018 +
2019 + RestoreMap *map = g_new0(RestoreMap, 1);
2020 + map->devname = g_strdup(devname);
2021 + map->path = g_strdup(path);
2022 + map->format = format;
2023 + map->throttling_bps = bps_value;
2024 + map->throttling_group = group;
2025 + map->cache = cache;
2026 + map->write_zero = write_zero;
2027 +
2028 + g_hash_table_insert(devmap, map->devname, map);
2029 +
2030 + };
2031 + }
2032 +
2033 + int i;
2034 + int vmstate_fd = -1;
2035 + guint8 vmstate_stream = 0;
2036 +
2037 + for (i = 1; i < 255; i++) {
2038 + VmaDeviceInfo *di = vma_reader_get_device_info(vmar, i);
2039 + if (di && (strcmp(di->devname, "vmstate") == 0)) {
2040 + vmstate_stream = i;
2041 + char *statefn = g_strdup_printf("%s/vmstate.bin", dirname);
2042 + vmstate_fd = open(statefn, O_WRONLY|O_CREAT|O_EXCL, 0644);
2043 + if (vmstate_fd < 0) {
2044 + g_error("create vmstate file '%s' failed - %s", statefn,
2045 + g_strerror(errno));
2046 + }
2047 + g_free(statefn);
2048 + } else if (di) {
2049 + char *devfn = NULL;
2050 + const char *format = NULL;
2051 + uint64_t throttling_bps = 0;
2052 + const char *throttling_group = NULL;
2053 + const char *cache = NULL;
2054 + int flags = BDRV_O_RDWR;
2055 + bool write_zero = true;
2056 +
2057 + BlockBackend *blk = NULL;
2058 +
2059 + if (readmap) {
2060 + RestoreMap *map;
2061 + map = (RestoreMap *)g_hash_table_lookup(devmap, di->devname);
2062 + if (map == NULL) {
2063 + g_error("no device name mapping for %s", di->devname);
2064 + }
2065 + devfn = map->path;
2066 + format = map->format;
2067 + throttling_bps = map->throttling_bps;
2068 + throttling_group = map->throttling_group;
2069 + cache = map->cache;
2070 + write_zero = map->write_zero;
2071 + } else {
2072 + devfn = g_strdup_printf("%s/tmp-disk-%s.raw",
2073 + dirname, di->devname);
2074 + printf("DEVINFO %s %zd\n", devfn, di->size);
2075 +
2076 + bdrv_img_create(devfn, "raw", NULL, NULL, NULL, di->size,
2077 + flags, true, &errp);
2078 + if (errp) {
2079 + g_error("can't create file %s: %s", devfn,
2080 + error_get_pretty(errp));
2081 + }
2082 +
2083 + /* Note: we created an empty file above, so there is no
2084 + * need to write zeroes (so we generate a sparse file)
2085 + */
2086 + write_zero = false;
2087 + }
2088 +
2089 + size_t devlen = strlen(devfn);
2090 + QDict *options = NULL;
2091 + bool writethrough;
2092 + if (format) {
2093 + /* explicit format from commandline */
2094 + options = qdict_new();
2095 + qdict_put_str(options, "driver", format);
2096 + } else if ((devlen > 4 && strcmp(devfn+devlen-4, ".raw") == 0) ||
2097 + strncmp(devfn, "/dev/", 5) == 0)
2098 + {
2099 + /* This part is now deprecated for PVE as well (just as qemu
2100 + * deprecated not specifying an explicit raw format, too.
2101 + */
2102 + /* explicit raw format */
2103 + options = qdict_new();
2104 + qdict_put_str(options, "driver", "raw");
2105 + }
2106 + if (cache && bdrv_parse_cache_mode(cache, &flags, &writethrough)) {
2107 + g_error("invalid cache option: %s\n", cache);
2108 + }
2109 +
2110 + if (errp || !(blk = blk_new_open(devfn, NULL, options, flags, &errp))) {
2111 + g_error("can't open file %s - %s", devfn,
2112 + error_get_pretty(errp));
2113 + }
2114 +
2115 + if (cache) {
2116 + blk_set_enable_write_cache(blk, !writethrough);
2117 + }
2118 +
2119 + if (throttling_group) {
2120 + blk_io_limits_enable(blk, throttling_group);
2121 + }
2122 +
2123 + if (throttling_bps) {
2124 + if (!throttling_group) {
2125 + blk_io_limits_enable(blk, devfn);
2126 + }
2127 +
2128 + ThrottleConfig cfg;
2129 + throttle_config_init(&cfg);
2130 + cfg.buckets[THROTTLE_BPS_WRITE].avg = throttling_bps;
2131 + Error *err = NULL;
2132 + if (!throttle_is_valid(&cfg, &err)) {
2133 + error_report_err(err);
2134 + g_error("failed to apply throttling");
2135 + }
2136 + blk_set_io_limits(blk, &cfg);
2137 + }
2138 +
2139 + if (vma_reader_register_bs(vmar, i, blk, write_zero, &errp) < 0) {
2140 + g_error("%s", error_get_pretty(errp));
2141 + }
2142 +
2143 + if (!readmap) {
2144 + g_free(devfn);
2145 + }
2146 + }
2147 + }
2148 +
2149 + if (vma_reader_restore(vmar, vmstate_fd, verbose, &errp) < 0) {
2150 + g_error("restore failed - %s", error_get_pretty(errp));
2151 + }
2152 +
2153 + if (!readmap) {
2154 + for (i = 1; i < 255; i++) {
2155 + VmaDeviceInfo *di = vma_reader_get_device_info(vmar, i);
2156 + if (di && (i != vmstate_stream)) {
2157 + char *tmpfn = g_strdup_printf("%s/tmp-disk-%s.raw",
2158 + dirname, di->devname);
2159 + char *fn = g_strdup_printf("%s/disk-%s.raw",
2160 + dirname, di->devname);
2161 + if (rename(tmpfn, fn) != 0) {
2162 + g_error("rename %s to %s failed - %s",
2163 + tmpfn, fn, g_strerror(errno));
2164 + }
2165 + }
2166 + }
2167 + }
2168 +
2169 + vma_reader_destroy(vmar);
2170 +
2171 + bdrv_close_all();
2172 +
2173 + return ret;
2174 +}
2175 +
2176 +static int verify_content(int argc, char **argv)
2177 +{
2178 + int c, ret = 0;
2179 + int verbose = 0;
2180 + const char *filename;
2181 +
2182 + for (;;) {
2183 + c = getopt(argc, argv, "hv");
2184 + if (c == -1) {
2185 + break;
2186 + }
2187 + switch (c) {
2188 + case '?':
2189 + case 'h':
2190 + help();
2191 + break;
2192 + case 'v':
2193 + verbose = 1;
2194 + break;
2195 + default:
2196 + help();
2197 + }
2198 + }
2199 +
2200 + /* Get the filename */
2201 + if ((optind + 1) != argc) {
2202 + help();
2203 + }
2204 + filename = argv[optind++];
2205 +
2206 + Error *errp = NULL;
2207 + VmaReader *vmar = vma_reader_create(filename, &errp);
2208 +
2209 + if (!vmar) {
2210 + g_error("%s", error_get_pretty(errp));
2211 + }
2212 +
2213 + if (verbose) {
2214 + print_content(vmar);
2215 + }
2216 +
2217 + if (vma_reader_verify(vmar, verbose, &errp) < 0) {
2218 + g_error("verify failed - %s", error_get_pretty(errp));
2219 + }
2220 +
2221 + vma_reader_destroy(vmar);
2222 +
2223 + bdrv_close_all();
2224 +
2225 + return ret;
2226 +}
2227 +
2228 +typedef struct BackupJob {
2229 + BlockBackend *target;
2230 + int64_t len;
2231 + VmaWriter *vmaw;
2232 + uint8_t dev_id;
2233 +} BackupJob;
2234 +
2235 +#define BACKUP_SECTORS_PER_CLUSTER (VMA_CLUSTER_SIZE / BDRV_SECTOR_SIZE)
2236 +
2237 +static void coroutine_fn backup_run_empty(void *opaque)
2238 +{
2239 + VmaWriter *vmaw = (VmaWriter *)opaque;
2240 +
2241 + vma_writer_flush_output(vmaw);
2242 +
2243 + Error *err = NULL;
2244 + if (vma_writer_close(vmaw, &err) != 0) {
2245 + g_warning("vma_writer_close failed %s", error_get_pretty(err));
2246 + }
2247 +}
2248 +
2249 +static void coroutine_fn backup_run(void *opaque)
2250 +{
2251 + BackupJob *job = (BackupJob *)opaque;
2252 + struct iovec iov;
2253 + QEMUIOVector qiov;
2254 +
2255 + int64_t start, end;
2256 + int ret = 0;
2257 +
2258 + unsigned char *buf = blk_blockalign(job->target, VMA_CLUSTER_SIZE);
2259 +
2260 + start = 0;
2261 + end = DIV_ROUND_UP(job->len / BDRV_SECTOR_SIZE,
2262 + BACKUP_SECTORS_PER_CLUSTER);
2263 +
2264 + for (; start < end; start++) {
2265 + iov.iov_base = buf;
2266 + iov.iov_len = VMA_CLUSTER_SIZE;
2267 + qemu_iovec_init_external(&qiov, &iov, 1);
2268 +
2269 + ret = blk_co_preadv(job->target, start * VMA_CLUSTER_SIZE,
2270 + VMA_CLUSTER_SIZE, &qiov, 0);
2271 + if (ret < 0) {
2272 + vma_writer_set_error(job->vmaw, "read error", -1);
2273 + goto out;
2274 + }
2275 +
2276 + size_t zb = 0;
2277 + if (vma_writer_write(job->vmaw, job->dev_id, start, buf, &zb) < 0) {
2278 + vma_writer_set_error(job->vmaw, "backup_dump_cb vma_writer_write failed", -1);
2279 + goto out;
2280 + }
2281 + }
2282 +
2283 +
2284 +out:
2285 + if (vma_writer_close_stream(job->vmaw, job->dev_id) <= 0) {
2286 + Error *err = NULL;
2287 + if (vma_writer_close(job->vmaw, &err) != 0) {
2288 + g_warning("vma_writer_close failed %s", error_get_pretty(err));
2289 + }
2290 + }
2291 + qemu_vfree(buf);
2292 +}
2293 +
2294 +static int create_archive(int argc, char **argv)
2295 +{
2296 + int i, c;
2297 + int verbose = 0;
2298 + const char *archivename;
2299 + GList *backup_coroutines = NULL;
2300 + GList *config_files = NULL;
2301 +
2302 + for (;;) {
2303 + c = getopt(argc, argv, "hvc:");
2304 + if (c == -1) {
2305 + break;
2306 + }
2307 + switch (c) {
2308 + case '?':
2309 + case 'h':
2310 + help();
2311 + break;
2312 + case 'c':
2313 + config_files = g_list_append(config_files, optarg);
2314 + break;
2315 + case 'v':
2316 + verbose = 1;
2317 + break;
2318 + default:
2319 + g_assert_not_reached();
2320 + }
2321 + }
2322 +
2323 +
2324 + /* make sure we an archive name */
2325 + if ((optind + 1) > argc) {
2326 + help();
2327 + }
2328 +
2329 + archivename = argv[optind++];
2330 +
2331 + uuid_t uuid;
2332 + uuid_generate(uuid);
2333 +
2334 + Error *local_err = NULL;
2335 + VmaWriter *vmaw = vma_writer_create(archivename, uuid, &local_err);
2336 +
2337 + if (vmaw == NULL) {
2338 + g_error("%s", error_get_pretty(local_err));
2339 + }
2340 +
2341 + GList *l = config_files;
2342 + while (l && l->data) {
2343 + char *name = l->data;
2344 + char *cdata = NULL;
2345 + gsize clen = 0;
2346 + GError *err = NULL;
2347 + if (!g_file_get_contents(name, &cdata, &clen, &err)) {
2348 + unlink(archivename);
2349 + g_error("Unable to read file: %s", err->message);
2350 + }
2351 +
2352 + if (vma_writer_add_config(vmaw, name, cdata, clen) != 0) {
2353 + unlink(archivename);
2354 + g_error("Unable to append config data %s (len = %zd)",
2355 + name, clen);
2356 + }
2357 + l = g_list_next(l);
2358 + }
2359 +
2360 + int devcount = 0;
2361 + while (optind < argc) {
2362 + const char *path = argv[optind++];
2363 + char *devname = NULL;
2364 + path = extract_devname(path, &devname, devcount++);
2365 +
2366 + Error *errp = NULL;
2367 + BlockBackend *target;
2368 +
2369 + target = blk_new_open(path, NULL, NULL, 0, &errp);
2370 + if (!target) {
2371 + unlink(archivename);
2372 + g_error("bdrv_open '%s' failed - %s", path, error_get_pretty(errp));
2373 + }
2374 + int64_t size = blk_getlength(target);
2375 + int dev_id = vma_writer_register_stream(vmaw, devname, size);
2376 + if (dev_id <= 0) {
2377 + unlink(archivename);
2378 + g_error("vma_writer_register_stream '%s' failed", devname);
2379 + }
2380 +
2381 + BackupJob *job = g_new0(BackupJob, 1);
2382 + job->len = size;
2383 + job->target = target;
2384 + job->vmaw = vmaw;
2385 + job->dev_id = dev_id;
2386 +
2387 + Coroutine *co = qemu_coroutine_create(backup_run, job);
2388 + // Don't enter coroutine yet, because it might write the header before
2389 + // all streams can be registered.
2390 + backup_coroutines = g_list_append(backup_coroutines, co);
2391 + }
2392 +
2393 + VmaStatus vmastat;
2394 + int percent = 0;
2395 + int last_percent = -1;
2396 +
2397 + if (devcount) {
2398 + GList *entry = backup_coroutines;
2399 + while (entry && entry->data) {
2400 + Coroutine *co = entry->data;
2401 + qemu_coroutine_enter(co);
2402 + entry = g_list_next(entry);
2403 + }
2404 +
2405 + while (1) {
2406 + main_loop_wait(false);
2407 + vma_writer_get_status(vmaw, &vmastat);
2408 +
2409 + if (verbose) {
2410 +
2411 + uint64_t total = 0;
2412 + uint64_t transferred = 0;
2413 + uint64_t zero_bytes = 0;
2414 +
2415 + int i;
2416 + for (i = 0; i < 256; i++) {
2417 + if (vmastat.stream_info[i].size) {
2418 + total += vmastat.stream_info[i].size;
2419 + transferred += vmastat.stream_info[i].transferred;
2420 + zero_bytes += vmastat.stream_info[i].zero_bytes;
2421 + }
2422 + }
2423 + percent = (transferred*100)/total;
2424 + if (percent != last_percent) {
2425 + fprintf(stderr, "progress %d%% %zd/%zd %zd\n", percent,
2426 + transferred, total, zero_bytes);
2427 + fflush(stderr);
2428 +
2429 + last_percent = percent;
2430 + }
2431 + }
2432 +
2433 + if (vmastat.closed) {
2434 + break;
2435 + }
2436 + }
2437 + } else {
2438 + Coroutine *co = qemu_coroutine_create(backup_run_empty, vmaw);
2439 + qemu_coroutine_enter(co);
2440 + while (1) {
2441 + main_loop_wait(false);
2442 + vma_writer_get_status(vmaw, &vmastat);
2443 + if (vmastat.closed) {
2444 + break;
2445 + }
2446 + }
2447 + }
2448 +
2449 + bdrv_drain_all();
2450 +
2451 + vma_writer_get_status(vmaw, &vmastat);
2452 +
2453 + if (verbose) {
2454 + for (i = 0; i < 256; i++) {
2455 + VmaStreamInfo *si = &vmastat.stream_info[i];
2456 + if (si->size) {
2457 + fprintf(stderr, "image %s: size=%zd zeros=%zd saved=%zd\n",
2458 + si->devname, si->size, si->zero_bytes,
2459 + si->size - si->zero_bytes);
2460 + }
2461 + }
2462 + }
2463 +
2464 + if (vmastat.status < 0) {
2465 + unlink(archivename);
2466 + g_error("creating vma archive failed");
2467 + }
2468 +
2469 + g_list_free(backup_coroutines);
2470 + g_list_free(config_files);
2471 + vma_writer_destroy(vmaw);
2472 + return 0;
2473 +}
2474 +
2475 +static int dump_config(int argc, char **argv)
2476 +{
2477 + int c, ret = 0;
2478 + const char *filename;
2479 + const char *config_name = "qemu-server.conf";
2480 +
2481 + for (;;) {
2482 + c = getopt(argc, argv, "hc:");
2483 + if (c == -1) {
2484 + break;
2485 + }
2486 + switch (c) {
2487 + case '?':
2488 + case 'h':
2489 + help();
2490 + break;
2491 + case 'c':
2492 + config_name = optarg;
2493 + break;
2494 + default:
2495 + help();
2496 + }
2497 + }
2498 +
2499 + /* Get the filename */
2500 + if ((optind + 1) != argc) {
2501 + help();
2502 + }
2503 + filename = argv[optind++];
2504 +
2505 + Error *errp = NULL;
2506 + VmaReader *vmar = vma_reader_create(filename, &errp);
2507 +
2508 + if (!vmar) {
2509 + g_error("%s", error_get_pretty(errp));
2510 + }
2511 +
2512 + int found = 0;
2513 + GList *l = vma_reader_get_config_data(vmar);
2514 + while (l && l->data) {
2515 + VmaConfigData *cdata = (VmaConfigData *)l->data;
2516 + l = g_list_next(l);
2517 + if (strcmp(cdata->name, config_name) == 0) {
2518 + found = 1;
2519 + fwrite(cdata->data, cdata->len, 1, stdout);
2520 + break;
2521 + }
2522 + }
2523 +
2524 + vma_reader_destroy(vmar);
2525 +
2526 + bdrv_close_all();
2527 +
2528 + if (!found) {
2529 + fprintf(stderr, "unable to find configuration data '%s'\n", config_name);
2530 + return -1;
2531 + }
2532 +
2533 + return ret;
2534 +}
2535 +
2536 +int main(int argc, char **argv)
2537 +{
2538 + const char *cmdname;
2539 + Error *main_loop_err = NULL;
2540 +
2541 + error_init(argv[0]);
2542 + module_call_init(MODULE_INIT_TRACE);
2543 + qemu_init_exec_dir(argv[0]);
2544 +
2545 + if (qemu_init_main_loop(&main_loop_err)) {
2546 + g_error("%s", error_get_pretty(main_loop_err));
2547 + }
2548 +
2549 + bdrv_init();
2550 + module_call_init(MODULE_INIT_QOM);
2551 +
2552 + if (argc < 2) {
2553 + help();
2554 + }
2555 +
2556 + cmdname = argv[1];
2557 + argc--; argv++;
2558 +
2559 +
2560 + if (!strcmp(cmdname, "list")) {
2561 + return list_content(argc, argv);
2562 + } else if (!strcmp(cmdname, "create")) {
2563 + return create_archive(argc, argv);
2564 + } else if (!strcmp(cmdname, "extract")) {
2565 + return extract_content(argc, argv);
2566 + } else if (!strcmp(cmdname, "verify")) {
2567 + return verify_content(argc, argv);
2568 + } else if (!strcmp(cmdname, "config")) {
2569 + return dump_config(argc, argv);
2570 + }
2571 +
2572 + help();
2573 + return 0;
2574 +}
2575 diff --git a/vma.h b/vma.h
2576 new file mode 100644
2577 index 0000000000..c895c97f6d
2578 --- /dev/null
2579 +++ b/vma.h
2580 @@ -0,0 +1,150 @@
2581 +/*
2582 + * VMA: Virtual Machine Archive
2583 + *
2584 + * Copyright (C) Proxmox Server Solutions
2585 + *
2586 + * Authors:
2587 + * Dietmar Maurer (dietmar@proxmox.com)
2588 + *
2589 + * This work is licensed under the terms of the GNU GPL, version 2 or later.
2590 + * See the COPYING file in the top-level directory.
2591 + *
2592 + */
2593 +
2594 +#ifndef BACKUP_VMA_H
2595 +#define BACKUP_VMA_H
2596 +
2597 +#include <uuid/uuid.h>
2598 +#include "qapi/error.h"
2599 +#include "block/block.h"
2600 +
2601 +#define VMA_BLOCK_BITS 12
2602 +#define VMA_BLOCK_SIZE (1<<VMA_BLOCK_BITS)
2603 +#define VMA_CLUSTER_BITS (VMA_BLOCK_BITS+4)
2604 +#define VMA_CLUSTER_SIZE (1<<VMA_CLUSTER_BITS)
2605 +
2606 +#if VMA_CLUSTER_SIZE != 65536
2607 +#error unexpected cluster size
2608 +#endif
2609 +
2610 +#define VMA_EXTENT_HEADER_SIZE 512
2611 +#define VMA_BLOCKS_PER_EXTENT 59
2612 +#define VMA_MAX_CONFIGS 256
2613 +
2614 +#define VMA_MAX_EXTENT_SIZE \
2615 + (VMA_EXTENT_HEADER_SIZE+VMA_CLUSTER_SIZE*VMA_BLOCKS_PER_EXTENT)
2616 +#if VMA_MAX_EXTENT_SIZE != 3867136
2617 +#error unexpected VMA_EXTENT_SIZE
2618 +#endif
2619 +
2620 +/* File Format Definitions */
2621 +
2622 +#define VMA_MAGIC (GUINT32_TO_BE(('V'<<24)|('M'<<16)|('A'<<8)|0x00))
2623 +#define VMA_EXTENT_MAGIC (GUINT32_TO_BE(('V'<<24)|('M'<<16)|('A'<<8)|'E'))
2624 +
2625 +typedef struct VmaDeviceInfoHeader {
2626 + uint32_t devname_ptr; /* offset into blob_buffer table */
2627 + uint32_t reserved0;
2628 + uint64_t size; /* device size in bytes */
2629 + uint64_t reserved1;
2630 + uint64_t reserved2;
2631 +} VmaDeviceInfoHeader;
2632 +
2633 +typedef struct VmaHeader {
2634 + uint32_t magic;
2635 + uint32_t version;
2636 + unsigned char uuid[16];
2637 + int64_t ctime;
2638 + unsigned char md5sum[16];
2639 +
2640 + uint32_t blob_buffer_offset;
2641 + uint32_t blob_buffer_size;
2642 + uint32_t header_size;
2643 +
2644 + unsigned char reserved[1984];
2645 +
2646 + uint32_t config_names[VMA_MAX_CONFIGS]; /* offset into blob_buffer table */
2647 + uint32_t config_data[VMA_MAX_CONFIGS]; /* offset into blob_buffer table */
2648 +
2649 + uint32_t reserved1;
2650 +
2651 + VmaDeviceInfoHeader dev_info[256];
2652 +} VmaHeader;
2653 +
2654 +typedef struct VmaExtentHeader {
2655 + uint32_t magic;
2656 + uint16_t reserved1;
2657 + uint16_t block_count;
2658 + unsigned char uuid[16];
2659 + unsigned char md5sum[16];
2660 + uint64_t blockinfo[VMA_BLOCKS_PER_EXTENT];
2661 +} VmaExtentHeader;
2662 +
2663 +/* functions/definitions to read/write vma files */
2664 +
2665 +typedef struct VmaReader VmaReader;
2666 +
2667 +typedef struct VmaWriter VmaWriter;
2668 +
2669 +typedef struct VmaConfigData {
2670 + const char *name;
2671 + const void *data;
2672 + uint32_t len;
2673 +} VmaConfigData;
2674 +
2675 +typedef struct VmaStreamInfo {
2676 + uint64_t size;
2677 + uint64_t cluster_count;
2678 + uint64_t transferred;
2679 + uint64_t zero_bytes;
2680 + int finished;
2681 + char *devname;
2682 +} VmaStreamInfo;
2683 +
2684 +typedef struct VmaStatus {
2685 + int status;
2686 + bool closed;
2687 + char errmsg[8192];
2688 + char uuid_str[37];
2689 + VmaStreamInfo stream_info[256];
2690 +} VmaStatus;
2691 +
2692 +typedef struct VmaDeviceInfo {
2693 + uint64_t size; /* device size in bytes */
2694 + const char *devname;
2695 +} VmaDeviceInfo;
2696 +
2697 +VmaWriter *vma_writer_create(const char *filename, uuid_t uuid, Error **errp);
2698 +int vma_writer_close(VmaWriter *vmaw, Error **errp);
2699 +void vma_writer_error_propagate(VmaWriter *vmaw, Error **errp);
2700 +void vma_writer_destroy(VmaWriter *vmaw);
2701 +int vma_writer_add_config(VmaWriter *vmaw, const char *name, gpointer data,
2702 + size_t len);
2703 +int vma_writer_register_stream(VmaWriter *vmaw, const char *devname,
2704 + size_t size);
2705 +
2706 +int64_t coroutine_fn vma_writer_write(VmaWriter *vmaw, uint8_t dev_id,
2707 + int64_t cluster_num,
2708 + const unsigned char *buf,
2709 + size_t *zero_bytes);
2710 +
2711 +int coroutine_fn vma_writer_close_stream(VmaWriter *vmaw, uint8_t dev_id);
2712 +int coroutine_fn vma_writer_flush_output(VmaWriter *vmaw);
2713 +
2714 +int vma_writer_get_status(VmaWriter *vmaw, VmaStatus *status);
2715 +void vma_writer_set_error(VmaWriter *vmaw, const char *fmt, ...);
2716 +
2717 +
2718 +VmaReader *vma_reader_create(const char *filename, Error **errp);
2719 +void vma_reader_destroy(VmaReader *vmar);
2720 +VmaHeader *vma_reader_get_header(VmaReader *vmar);
2721 +GList *vma_reader_get_config_data(VmaReader *vmar);
2722 +VmaDeviceInfo *vma_reader_get_device_info(VmaReader *vmar, guint8 dev_id);
2723 +int vma_reader_register_bs(VmaReader *vmar, guint8 dev_id,
2724 + BlockBackend *target, bool write_zeroes,
2725 + Error **errp);
2726 +int vma_reader_restore(VmaReader *vmar, int vmstate_fd, bool verbose,
2727 + Error **errp);
2728 +int vma_reader_verify(VmaReader *vmar, bool verbose, Error **errp);
2729 +
2730 +#endif /* BACKUP_VMA_H */