]> git.proxmox.com Git - pve-qemu.git/commitdiff
rebased pve patches
authorWolfgang Bumiller <w.bumiller@proxmox.com>
Mon, 7 Aug 2017 07:10:07 +0000 (09:10 +0200)
committerWolfgang Bumiller <w.bumiller@proxmox.com>
Mon, 7 Aug 2017 08:16:57 +0000 (10:16 +0200)
77 files changed:
debian/patches/pve/0001-fr-ca-keymap-corrections.patch
debian/patches/pve/0002-Adjust-network-script-path-to-etc-kvm.patch
debian/patches/pve/0003-qemu-img-return-success-on-info-without-snapshots.patch [new file with mode: 0644]
debian/patches/pve/0003-vnc-altgr-emulation.patch [deleted file]
debian/patches/pve/0004-qemu-img-return-success-on-info-without-snapshots.patch [deleted file]
debian/patches/pve/0004-use-kvm-by-default.patch [new file with mode: 0644]
debian/patches/pve/0005-use-kvm-by-default.patch [deleted file]
debian/patches/pve/0005-virtio-balloon-fix-query.patch [new file with mode: 0644]
debian/patches/pve/0006-set-the-CPU-model-to-kvm64-32-instead-of-qemu64-32.patch [new file with mode: 0644]
debian/patches/pve/0006-virtio-balloon-fix-query.patch [deleted file]
debian/patches/pve/0007-qapi-modify-query-machines.patch [new file with mode: 0644]
debian/patches/pve/0007-set-the-CPU-model-to-kvm64-32-instead-of-qemu64-32.patch [deleted file]
debian/patches/pve/0008-qapi-modify-query-machines.patch [deleted file]
debian/patches/pve/0008-qapi-modify-spice-query.patch [new file with mode: 0644]
debian/patches/pve/0009-qapi-modify-spice-query.patch [deleted file]
debian/patches/pve/0009-ui-spice-default-to-pve-certs-unless-otherwise-speci.patch [new file with mode: 0644]
debian/patches/pve/0010-internal-snapshot-async.patch [new file with mode: 0644]
debian/patches/pve/0010-ui-spice-default-to-pve-certs-unless-otherwise-speci.patch [deleted file]
debian/patches/pve/0011-convert-savevm-async-to-threads.patch [new file with mode: 0644]
debian/patches/pve/0011-introduce-new-vma-archive-format.patch [deleted file]
debian/patches/pve/0012-qmp-add-get_link_status.patch [new file with mode: 0644]
debian/patches/pve/0012-vma-add-verify-command.patch [deleted file]
debian/patches/pve/0013-smm_available-false.patch [new file with mode: 0644]
debian/patches/pve/0013-vma-add-config-command-to-dump-the-config.patch [deleted file]
debian/patches/pve/0014-backup-modify-job-api.patch [deleted file]
debian/patches/pve/0014-use-whitespace-between-VERSION-and-PKGVERSION.patch [new file with mode: 0644]
debian/patches/pve/0015-backup-add-pve-monitor-commands.patch [deleted file]
debian/patches/pve/0015-vnc-altgr-emulation.patch [new file with mode: 0644]
debian/patches/pve/0016-backup-vma-add-dir-format.patch [deleted file]
debian/patches/pve/0016-vnc-make-x509-imply-tls-again.patch [new file with mode: 0644]
debian/patches/pve/0017-backup-do-not-return-errors-in-dump-callback.patch [deleted file]
debian/patches/pve/0017-vnc-PVE-VNC-authentication.patch [new file with mode: 0644]
debian/patches/pve/0018-backup-vma-correctly-propagate-error.patch [deleted file]
debian/patches/pve/0018-migrate-fix-possible-unitialised-return-value.patch [new file with mode: 0644]
debian/patches/pve/0019-backup-vma-remove-async-queue.patch [deleted file]
debian/patches/pve/0019-block-rbd-disable-rbd_cache_writethrough_until_flush.patch [new file with mode: 0644]
debian/patches/pve/0020-backup-vma-run-flush-inside-coroutine.patch [deleted file]
debian/patches/pve/0020-block-snapshot-qmp_snapshot_drive-add-aiocontext.patch [new file with mode: 0644]
debian/patches/pve/0021-backup-do-not-use-bdrv_drain_all.patch [deleted file]
debian/patches/pve/0021-block-snapshot-qmp_delete_drive_snapshot-add-aiocont.patch [new file with mode: 0644]
debian/patches/pve/0022-glusterfs-no-default-logfile-if-daemonized.patch [new file with mode: 0644]
debian/patches/pve/0022-internal-snapshot-async.patch [deleted file]
debian/patches/pve/0023-backup-vma-allow-empty-backups.patch [deleted file]
debian/patches/pve/0023-glusterfs-allow-partial-reads.patch [new file with mode: 0644]
debian/patches/pve/0024-block-add-the-zeroinit-block-driver-filter.patch [new file with mode: 0644]
debian/patches/pve/0024-qmp-add-get_link_status.patch [deleted file]
debian/patches/pve/0025-qemu-img-dd-add-osize-and-read-from-to-stdin-stdout.patch [new file with mode: 0644]
debian/patches/pve/0025-smm_available-false.patch [deleted file]
debian/patches/pve/0026-backup-modify-job-api.patch [new file with mode: 0644]
debian/patches/pve/0026-use-whitespace-between-VERSION-and-PKGVERSION.patch [deleted file]
debian/patches/pve/0027-backup-introduce-vma-archive-format.patch [new file with mode: 0644]
debian/patches/pve/0027-vma-add-firewall.patch [deleted file]
debian/patches/pve/0028-adding-old-vma-files.patch [new file with mode: 0644]
debian/patches/pve/0028-savevm-async-migration-and-bdrv_open-update.patch [deleted file]
debian/patches/pve/0029-vnc-make-x509-imply-tls-again.patch [deleted file]
debian/patches/pve/0030-PVE-VNC-authentication.patch [deleted file]
debian/patches/pve/0031-vma-writer-don-t-bail-out-on-zero-length-files.patch [deleted file]
debian/patches/pve/0032-vma-better-driver-guessing-for-bdrv_open.patch [deleted file]
debian/patches/pve/0033-block-add-the-zeroinit-block-driver-filter.patch [deleted file]
debian/patches/pve/0034-vma-add-format-option-to-device-mapping.patch [deleted file]
debian/patches/pve/0035-fix-possible-unitialised-return-value.patch [deleted file]
debian/patches/pve/0036-vnc-refactor-to-QIOChannelSocket.patch [deleted file]
debian/patches/pve/0037-vma-use-BlockBackend-on-extract.patch [deleted file]
debian/patches/pve/0038-vma-byte-based-write-calls.patch [deleted file]
debian/patches/pve/0039-rbd-disable-rbd_cache_writethrough_until_flush-with-.patch [deleted file]
debian/patches/pve/0040-enable-cache-unsafe-for-vma-extract_content-and-qmp_.patch [deleted file]
debian/patches/pve/0041-savevm-async-updates.patch [deleted file]
debian/patches/pve/0042-qmp_snapshot_drive-add-aiocontext.patch [deleted file]
debian/patches/pve/0043-vma-sizes-passed-to-blk_co_preadv-should-be-bytes-no.patch [deleted file]
debian/patches/pve/0044-glusterfs-no-default-logfile-if-daemonized.patch [deleted file]
debian/patches/pve/0045-qmp_delete_drive_snapshot-add-aiocontext.patch [deleted file]
debian/patches/pve/0046-convert-savevm-async-to-threads.patch [deleted file]
debian/patches/pve/0047-glusterfs-allow-partial-reads.patch [deleted file]
debian/patches/pve/0048-vma-don-t-use-O_DIRECT-on-pipes.patch [deleted file]
debian/patches/pve/0049-block-zeroinit-request-child-permissions.patch [deleted file]
debian/patches/pve/0050-qemu-img-dd-add-osize-and-read-from-to-stdin-stdout.patch [deleted file]
debian/patches/series

index 04bb94acd7d0ad195a72cd0ca0032292056061bd..6aa4f2c785765deaecc621c9e3fed5bbc43b8334 100644 (file)
@@ -1,7 +1,7 @@
 From 926ac2ae6be8a7971e4c24d45345981e3a62d560 Mon Sep 17 00:00:00 2001
 From: Wolfgang Bumiller <w.bumiller@proxmox.com>
 Date: Wed, 9 Dec 2015 14:15:49 +0100
-Subject: [PATCH 01/49] fr-ca keymap corrections
+Subject: [PATCH 01/28] fr-ca keymap corrections
 
 ---
  pc-bios/keymaps/fr-ca | 9 +++++++++
index 787291fbd610b09408a032bc40b4e5bb26cc4b3e..a42c916034ce905830e42e2f92e3754f25bac6e4 100644 (file)
@@ -1,7 +1,7 @@
 From 65a038b874c5770f48077cf77742ac10bb083922 Mon Sep 17 00:00:00 2001
 From: Wolfgang Bumiller <w.bumiller@proxmox.com>
 Date: Wed, 9 Dec 2015 14:16:49 +0100
-Subject: [PATCH 02/49] Adjust network script path to /etc/kvm/
+Subject: [PATCH 02/28] Adjust network script path to /etc/kvm/
 
 ---
  include/net/net.h | 5 +++--
diff --git a/debian/patches/pve/0003-qemu-img-return-success-on-info-without-snapshots.patch b/debian/patches/pve/0003-qemu-img-return-success-on-info-without-snapshots.patch
new file mode 100644 (file)
index 0000000..2ba022c
--- /dev/null
@@ -0,0 +1,26 @@
+From 034ee9d08002e8e57c4d09e9a9750aad547f65f1 Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Wed, 9 Dec 2015 14:18:46 +0100
+Subject: [PATCH 03/28] qemu-img: return success on info without snapshots
+
+---
+ qemu-img.c | 3 ++-
+ 1 file changed, 2 insertions(+), 1 deletion(-)
+
+diff --git a/qemu-img.c b/qemu-img.c
+index b220cf71d7..4f7f458dd2 100644
+--- a/qemu-img.c
++++ b/qemu-img.c
+@@ -2596,7 +2596,8 @@ static int img_info(int argc, char **argv)
+     list = collect_image_info_list(image_opts, filename, fmt, chain);
+     if (!list) {
+-        return 1;
++      // return success if snapshot does not exists
++        return 0;
+     }
+     switch (output_format) {
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0003-vnc-altgr-emulation.patch b/debian/patches/pve/0003-vnc-altgr-emulation.patch
deleted file mode 100644 (file)
index e593bb8..0000000
+++ /dev/null
@@ -1,65 +0,0 @@
-From 6c2823a8f34f9edd061a8c56af8fa0fb5014c507 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 14:17:38 +0100
-Subject: [PATCH 03/49] vnc: altgr emulation
-
----
- ui/vnc.c | 26 +++++++++++++++++++++++++-
- 1 file changed, 25 insertions(+), 1 deletion(-)
-
-diff --git a/ui/vnc.c b/ui/vnc.c
-index 349cfc9d86..9c8ab42eea 100644
---- a/ui/vnc.c
-+++ b/ui/vnc.c
-@@ -1631,6 +1631,10 @@ static void kbd_leds(void *opaque, int ledstate)
- static void do_key_event(VncState *vs, int down, int keycode, int sym)
- {
-+    int mods =  keycode & 0xf00;
-+
-+    keycode &= SCANCODE_KEYMASK;
-+
-     /* QEMU console switch */
-     switch(keycode) {
-     case 0x2a:                          /* Left Shift */
-@@ -1711,8 +1715,27 @@ static void do_key_event(VncState *vs, int down, int keycode, int sym)
-     }
-     if (qemu_console_is_graphic(NULL)) {
-+
-+      /* our java vnc client never sends ALTGR, so we create
-+         an artificial up/down event */
-+
-+      int emul_altgr = (mods & SCANCODE_ALTGR) &&
-+          !vs->modifiers_state[0xb8];
-+
-+      if (emul_altgr) {
-+            reset_keys(vs);
-+            qemu_input_event_send_key_number(vs->vd->dcl.con, 0xb8, true);
-+            qemu_input_event_send_key_delay(vs->vd->key_delay_ms);
-+      }
-+
-         qemu_input_event_send_key_number(vs->vd->dcl.con, keycode, down);
-         qemu_input_event_send_key_delay(vs->vd->key_delay_ms);
-+
-+      if (emul_altgr) {
-+             qemu_input_event_send_key_number(vs->vd->dcl.con, 0xb8, false);
-+             qemu_input_event_send_key_delay(vs->vd->key_delay_ms);
-+      }
-+
-     } else {
-         bool numlock = vs->modifiers_state[0x45];
-         bool control = (vs->modifiers_state[0x1d] ||
-@@ -1852,7 +1875,8 @@ static void key_event(VncState *vs, int down, uint32_t sym)
-         lsym = lsym - 'A' + 'a';
-     }
--    keycode = keysym2scancode(vs->vd->kbd_layout, lsym & 0xFFFF) & SCANCODE_KEYMASK;
-+    keycode = keysym2scancode(vs->vd->kbd_layout, lsym & 0xFFFF);
-+
-     trace_vnc_key_event_map(down, sym, keycode, code2name(keycode));
-     do_key_event(vs, down, keycode, sym);
- }
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0004-qemu-img-return-success-on-info-without-snapshots.patch b/debian/patches/pve/0004-qemu-img-return-success-on-info-without-snapshots.patch
deleted file mode 100644 (file)
index f0d7da3..0000000
+++ /dev/null
@@ -1,26 +0,0 @@
-From 2d53d7c93802c9c28c5958fae5c71825b1707295 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 14:18:46 +0100
-Subject: [PATCH 04/49] qemu-img: return success on info without snapshots
-
----
- qemu-img.c | 3 ++-
- 1 file changed, 2 insertions(+), 1 deletion(-)
-
-diff --git a/qemu-img.c b/qemu-img.c
-index b220cf71d7..4f7f458dd2 100644
---- a/qemu-img.c
-+++ b/qemu-img.c
-@@ -2596,7 +2596,8 @@ static int img_info(int argc, char **argv)
-     list = collect_image_info_list(image_opts, filename, fmt, chain);
-     if (!list) {
--        return 1;
-+      // return success if snapshot does not exists
-+        return 0;
-     }
-     switch (output_format) {
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0004-use-kvm-by-default.patch b/debian/patches/pve/0004-use-kvm-by-default.patch
new file mode 100644 (file)
index 0000000..92d9ce0
--- /dev/null
@@ -0,0 +1,27 @@
+From 0203288ce982ea135ff82cf4ea6a7868ef053470 Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Wed, 9 Dec 2015 14:27:05 +0100
+Subject: [PATCH 04/28] use kvm by default
+
+---
+ accel.c | 4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+diff --git a/accel.c b/accel.c
+index 664bb88422..ddb23a3f1d 100644
+--- a/accel.c
++++ b/accel.c
+@@ -87,8 +87,8 @@ void configure_accelerator(MachineState *ms)
+     p = qemu_opt_get(qemu_get_machine_opts(), "accel");
+     if (p == NULL) {
+-        /* Use the default "accelerator", tcg */
+-        p = "tcg";
++        /* Use the default "accelerator", kvm */
++        p = "kvm";
+     }
+     while (!accel_initialised && *p != '\0') {
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0005-use-kvm-by-default.patch b/debian/patches/pve/0005-use-kvm-by-default.patch
deleted file mode 100644 (file)
index ca6aae9..0000000
+++ /dev/null
@@ -1,27 +0,0 @@
-From 1a677a89338980c830ba378824996cd53f2ec96b Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 14:27:05 +0100
-Subject: [PATCH 05/49] use kvm by default
-
----
- accel.c | 4 ++--
- 1 file changed, 2 insertions(+), 2 deletions(-)
-
-diff --git a/accel.c b/accel.c
-index 664bb88422..ddb23a3f1d 100644
---- a/accel.c
-+++ b/accel.c
-@@ -87,8 +87,8 @@ void configure_accelerator(MachineState *ms)
-     p = qemu_opt_get(qemu_get_machine_opts(), "accel");
-     if (p == NULL) {
--        /* Use the default "accelerator", tcg */
--        p = "tcg";
-+        /* Use the default "accelerator", kvm */
-+        p = "kvm";
-     }
-     while (!accel_initialised && *p != '\0') {
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0005-virtio-balloon-fix-query.patch b/debian/patches/pve/0005-virtio-balloon-fix-query.patch
new file mode 100644 (file)
index 0000000..13def0d
--- /dev/null
@@ -0,0 +1,137 @@
+From d91355991605106e86f246e0e9091ffc1275b52f Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Wed, 9 Dec 2015 14:27:49 +0100
+Subject: [PATCH 05/28] virtio-balloon: fix query
+
+Actually provide memory information via the query-balloon
+command.
+---
+ hmp.c                      | 30 +++++++++++++++++++++++++++++-
+ hw/virtio/virtio-balloon.c | 33 +++++++++++++++++++++++++++++++--
+ qapi-schema.json           | 23 +++++++++++++++++++++--
+ 3 files changed, 81 insertions(+), 5 deletions(-)
+
+diff --git a/hmp.c b/hmp.c
+index edb8970461..904542d026 100644
+--- a/hmp.c
++++ b/hmp.c
+@@ -723,7 +723,35 @@ void hmp_info_balloon(Monitor *mon, const QDict *qdict)
+         return;
+     }
+-    monitor_printf(mon, "balloon: actual=%" PRId64 "\n", info->actual >> 20);
++    monitor_printf(mon, "balloon: actual=%" PRId64, info->actual >> 20);
++    monitor_printf(mon, " max_mem=%" PRId64, info->max_mem >> 20);
++    if (info->has_total_mem) {
++        monitor_printf(mon, " total_mem=%" PRId64, info->total_mem >> 20);
++    }
++    if (info->has_free_mem) {
++        monitor_printf(mon, " free_mem=%" PRId64, info->free_mem >> 20);
++    }
++
++    if (info->has_mem_swapped_in) {
++        monitor_printf(mon, " mem_swapped_in=%" PRId64, info->mem_swapped_in);
++    }
++    if (info->has_mem_swapped_out) {
++        monitor_printf(mon, " mem_swapped_out=%" PRId64, info->mem_swapped_out);
++    }
++    if (info->has_major_page_faults) {
++        monitor_printf(mon, " major_page_faults=%" PRId64,
++                       info->major_page_faults);
++    }
++    if (info->has_minor_page_faults) {
++        monitor_printf(mon, " minor_page_faults=%" PRId64,
++                       info->minor_page_faults);
++    }
++    if (info->has_last_update) {
++        monitor_printf(mon, " last_update=%" PRId64,
++                       info->last_update);
++    }
++
++    monitor_printf(mon, "\n");
+     qapi_free_BalloonInfo(info);
+ }
+diff --git a/hw/virtio/virtio-balloon.c b/hw/virtio/virtio-balloon.c
+index a705e0ec55..158e13e795 100644
+--- a/hw/virtio/virtio-balloon.c
++++ b/hw/virtio/virtio-balloon.c
+@@ -379,8 +379,37 @@ static uint64_t virtio_balloon_get_features(VirtIODevice *vdev, uint64_t f,
+ static void virtio_balloon_stat(void *opaque, BalloonInfo *info)
+ {
+     VirtIOBalloon *dev = opaque;
+-    info->actual = get_current_ram_size() - ((uint64_t) dev->actual <<
+-                                             VIRTIO_BALLOON_PFN_SHIFT);
++    ram_addr_t ram_size = get_current_ram_size();
++    info->actual = ram_size - ((uint64_t) dev->actual <<
++                               VIRTIO_BALLOON_PFN_SHIFT);
++
++    info->max_mem = ram_size;
++
++    if (!(balloon_stats_enabled(dev) && balloon_stats_supported(dev) &&
++           dev->stats_last_update)) {
++       return;
++    }
++
++    info->last_update = dev->stats_last_update;
++    info->has_last_update = true;
++
++    info->mem_swapped_in = dev->stats[VIRTIO_BALLOON_S_SWAP_IN];
++    info->has_mem_swapped_in = info->mem_swapped_in >= 0 ? true : false;
++
++    info->mem_swapped_out = dev->stats[VIRTIO_BALLOON_S_SWAP_OUT];
++    info->has_mem_swapped_out = info->mem_swapped_out >= 0 ? true : false;
++
++    info->major_page_faults = dev->stats[VIRTIO_BALLOON_S_MAJFLT];
++    info->has_major_page_faults = info->major_page_faults >= 0 ? true : false;
++
++    info->minor_page_faults = dev->stats[VIRTIO_BALLOON_S_MINFLT];
++    info->has_minor_page_faults = info->minor_page_faults >= 0 ? true : false;
++
++    info->free_mem = dev->stats[VIRTIO_BALLOON_S_MEMFREE];
++    info->has_free_mem = info->free_mem >= 0 ? true : false;
++
++    info->total_mem = dev->stats[VIRTIO_BALLOON_S_MEMTOT];
++    info->has_total_mem = info->total_mem >= 0 ? true : false;
+ }
+ static void virtio_balloon_to_target(void *opaque, ram_addr_t target)
+diff --git a/qapi-schema.json b/qapi-schema.json
+index 250e4dc49b..f38b85bf6a 100644
+--- a/qapi-schema.json
++++ b/qapi-schema.json
+@@ -1900,10 +1900,29 @@
+ #
+ # @actual: the number of bytes the balloon currently contains
+ #
+-# Since: 0.14.0
++# @last_update: time when stats got updated from guest
++#
++# @mem_swapped_in: number of pages swapped in within the guest
++# 
++# @mem_swapped_out: number of pages swapped out within the guest
++#
++# @major_page_faults: number of major page faults within the guest
+ #
++# @minor_page_faults: number of minor page faults within the guest
++# 
++# @free_mem: amount of memory (in bytes) free in the guest
++#
++# @total_mem: amount of memory (in bytes) visible to the guest
++#
++# @max_mem: amount of memory (in bytes) assigned to the guest
++# 
++# Since: 0.14.0
+ ##
+-{ 'struct': 'BalloonInfo', 'data': {'actual': 'int' } }
++{ 'struct': 'BalloonInfo',
++  'data': {'actual': 'int', '*last_update': 'int', '*mem_swapped_in': 'int',
++           '*mem_swapped_out': 'int', '*major_page_faults': 'int',
++           '*minor_page_faults': 'int', '*free_mem': 'int',
++           '*total_mem': 'int', 'max_mem': 'int' } }
+ ##
+ # @query-balloon:
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0006-set-the-CPU-model-to-kvm64-32-instead-of-qemu64-32.patch b/debian/patches/pve/0006-set-the-CPU-model-to-kvm64-32-instead-of-qemu64-32.patch
new file mode 100644 (file)
index 0000000..19e0c5a
--- /dev/null
@@ -0,0 +1,28 @@
+From 99d1d87c126c630afed3885a26b5c4c6ca6e050b Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Wed, 9 Dec 2015 14:30:21 +0100
+Subject: [PATCH 06/28] set the CPU model to kvm64/32 instead of qemu64/32
+
+---
+ hw/i386/pc.c | 4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+diff --git a/hw/i386/pc.c b/hw/i386/pc.c
+index d24388e05f..81e91a4897 100644
+--- a/hw/i386/pc.c
++++ b/hw/i386/pc.c
+@@ -1151,9 +1151,9 @@ void pc_cpus_init(PCMachineState *pcms)
+     /* init CPUs */
+     if (machine->cpu_model == NULL) {
+ #ifdef TARGET_X86_64
+-        machine->cpu_model = "qemu64";
++        machine->cpu_model = "kvm64";
+ #else
+-        machine->cpu_model = "qemu32";
++        machine->cpu_model = "kvm32";
+ #endif
+     }
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0006-virtio-balloon-fix-query.patch b/debian/patches/pve/0006-virtio-balloon-fix-query.patch
deleted file mode 100644 (file)
index 4e5dd20..0000000
+++ /dev/null
@@ -1,137 +0,0 @@
-From 1cd097140cab2650415b311bd7549036df6e6978 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 14:27:49 +0100
-Subject: [PATCH 06/49] virtio-balloon: fix query
-
-Actually provide memory information via the query-balloon
-command.
----
- hmp.c                      | 30 +++++++++++++++++++++++++++++-
- hw/virtio/virtio-balloon.c | 33 +++++++++++++++++++++++++++++++--
- qapi-schema.json           | 23 +++++++++++++++++++++--
- 3 files changed, 81 insertions(+), 5 deletions(-)
-
-diff --git a/hmp.c b/hmp.c
-index edb8970461..904542d026 100644
---- a/hmp.c
-+++ b/hmp.c
-@@ -723,7 +723,35 @@ void hmp_info_balloon(Monitor *mon, const QDict *qdict)
-         return;
-     }
--    monitor_printf(mon, "balloon: actual=%" PRId64 "\n", info->actual >> 20);
-+    monitor_printf(mon, "balloon: actual=%" PRId64, info->actual >> 20);
-+    monitor_printf(mon, " max_mem=%" PRId64, info->max_mem >> 20);
-+    if (info->has_total_mem) {
-+        monitor_printf(mon, " total_mem=%" PRId64, info->total_mem >> 20);
-+    }
-+    if (info->has_free_mem) {
-+        monitor_printf(mon, " free_mem=%" PRId64, info->free_mem >> 20);
-+    }
-+
-+    if (info->has_mem_swapped_in) {
-+        monitor_printf(mon, " mem_swapped_in=%" PRId64, info->mem_swapped_in);
-+    }
-+    if (info->has_mem_swapped_out) {
-+        monitor_printf(mon, " mem_swapped_out=%" PRId64, info->mem_swapped_out);
-+    }
-+    if (info->has_major_page_faults) {
-+        monitor_printf(mon, " major_page_faults=%" PRId64,
-+                       info->major_page_faults);
-+    }
-+    if (info->has_minor_page_faults) {
-+        monitor_printf(mon, " minor_page_faults=%" PRId64,
-+                       info->minor_page_faults);
-+    }
-+    if (info->has_last_update) {
-+        monitor_printf(mon, " last_update=%" PRId64,
-+                       info->last_update);
-+    }
-+
-+    monitor_printf(mon, "\n");
-     qapi_free_BalloonInfo(info);
- }
-diff --git a/hw/virtio/virtio-balloon.c b/hw/virtio/virtio-balloon.c
-index a705e0ec55..158e13e795 100644
---- a/hw/virtio/virtio-balloon.c
-+++ b/hw/virtio/virtio-balloon.c
-@@ -379,8 +379,37 @@ static uint64_t virtio_balloon_get_features(VirtIODevice *vdev, uint64_t f,
- static void virtio_balloon_stat(void *opaque, BalloonInfo *info)
- {
-     VirtIOBalloon *dev = opaque;
--    info->actual = get_current_ram_size() - ((uint64_t) dev->actual <<
--                                             VIRTIO_BALLOON_PFN_SHIFT);
-+    ram_addr_t ram_size = get_current_ram_size();
-+    info->actual = ram_size - ((uint64_t) dev->actual <<
-+                               VIRTIO_BALLOON_PFN_SHIFT);
-+
-+    info->max_mem = ram_size;
-+
-+    if (!(balloon_stats_enabled(dev) && balloon_stats_supported(dev) &&
-+           dev->stats_last_update)) {
-+       return;
-+    }
-+
-+    info->last_update = dev->stats_last_update;
-+    info->has_last_update = true;
-+
-+    info->mem_swapped_in = dev->stats[VIRTIO_BALLOON_S_SWAP_IN];
-+    info->has_mem_swapped_in = info->mem_swapped_in >= 0 ? true : false;
-+
-+    info->mem_swapped_out = dev->stats[VIRTIO_BALLOON_S_SWAP_OUT];
-+    info->has_mem_swapped_out = info->mem_swapped_out >= 0 ? true : false;
-+
-+    info->major_page_faults = dev->stats[VIRTIO_BALLOON_S_MAJFLT];
-+    info->has_major_page_faults = info->major_page_faults >= 0 ? true : false;
-+
-+    info->minor_page_faults = dev->stats[VIRTIO_BALLOON_S_MINFLT];
-+    info->has_minor_page_faults = info->minor_page_faults >= 0 ? true : false;
-+
-+    info->free_mem = dev->stats[VIRTIO_BALLOON_S_MEMFREE];
-+    info->has_free_mem = info->free_mem >= 0 ? true : false;
-+
-+    info->total_mem = dev->stats[VIRTIO_BALLOON_S_MEMTOT];
-+    info->has_total_mem = info->total_mem >= 0 ? true : false;
- }
- static void virtio_balloon_to_target(void *opaque, ram_addr_t target)
-diff --git a/qapi-schema.json b/qapi-schema.json
-index 250e4dc49b..f38b85bf6a 100644
---- a/qapi-schema.json
-+++ b/qapi-schema.json
-@@ -1900,10 +1900,29 @@
- #
- # @actual: the number of bytes the balloon currently contains
- #
--# Since: 0.14.0
-+# @last_update: time when stats got updated from guest
-+#
-+# @mem_swapped_in: number of pages swapped in within the guest
-+# 
-+# @mem_swapped_out: number of pages swapped out within the guest
-+#
-+# @major_page_faults: number of major page faults within the guest
- #
-+# @minor_page_faults: number of minor page faults within the guest
-+# 
-+# @free_mem: amount of memory (in bytes) free in the guest
-+#
-+# @total_mem: amount of memory (in bytes) visible to the guest
-+#
-+# @max_mem: amount of memory (in bytes) assigned to the guest
-+# 
-+# Since: 0.14.0
- ##
--{ 'struct': 'BalloonInfo', 'data': {'actual': 'int' } }
-+{ 'struct': 'BalloonInfo',
-+  'data': {'actual': 'int', '*last_update': 'int', '*mem_swapped_in': 'int',
-+           '*mem_swapped_out': 'int', '*major_page_faults': 'int',
-+           '*minor_page_faults': 'int', '*free_mem': 'int',
-+           '*total_mem': 'int', 'max_mem': 'int' } }
- ##
- # @query-balloon:
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0007-qapi-modify-query-machines.patch b/debian/patches/pve/0007-qapi-modify-query-machines.patch
new file mode 100644 (file)
index 0000000..fa51e6f
--- /dev/null
@@ -0,0 +1,52 @@
+From a761848c2ded6eb644c0e0e5d9184f54db59828a Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Wed, 9 Dec 2015 14:31:18 +0100
+Subject: [PATCH 07/28] qapi: modify query machines
+
+provide '*is-current' in MachineInfo struct
+---
+ qapi-schema.json | 4 +++-
+ vl.c             | 5 +++++
+ 2 files changed, 8 insertions(+), 1 deletion(-)
+
+diff --git a/qapi-schema.json b/qapi-schema.json
+index f38b85bf6a..51e150c6c1 100644
+--- a/qapi-schema.json
++++ b/qapi-schema.json
+@@ -4242,6 +4242,8 @@
+ #
+ # @is-default: whether the machine is default
+ #
++# @is-current: whether this machine is currently used
++#
+ # @cpu-max: maximum number of CPUs supported by the machine type
+ #           (since 1.5.0)
+ #
+@@ -4251,7 +4253,7 @@
+ ##
+ { 'struct': 'MachineInfo',
+   'data': { 'name': 'str', '*alias': 'str',
+-            '*is-default': 'bool', 'cpu-max': 'int',
++            '*is-default': 'bool', '*is-current': 'bool', 'cpu-max': 'int',
+             'hotpluggable-cpus': 'bool'} }
+ ##
+diff --git a/vl.c b/vl.c
+index 0b4ed5241c..868c4893df 100644
+--- a/vl.c
++++ b/vl.c
+@@ -1518,6 +1518,11 @@ MachineInfoList *qmp_query_machines(Error **errp)
+         info->cpu_max = !mc->max_cpus ? 1 : mc->max_cpus;
+         info->hotpluggable_cpus = mc->has_hotpluggable_cpus;
++        if (strcmp(mc->name, MACHINE_GET_CLASS(current_machine)->name) == 0) {
++            info->has_is_current = true;
++            info->is_current = true;
++        }
++
+         entry = g_malloc0(sizeof(*entry));
+         entry->value = info;
+         entry->next = mach_list;
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0007-set-the-CPU-model-to-kvm64-32-instead-of-qemu64-32.patch b/debian/patches/pve/0007-set-the-CPU-model-to-kvm64-32-instead-of-qemu64-32.patch
deleted file mode 100644 (file)
index 8eda4dd..0000000
+++ /dev/null
@@ -1,28 +0,0 @@
-From b5dd9f221abd0afd83f05787ca270c3d80959a2e Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 14:30:21 +0100
-Subject: [PATCH 07/49] set the CPU model to kvm64/32 instead of qemu64/32
-
----
- hw/i386/pc.c | 4 ++--
- 1 file changed, 2 insertions(+), 2 deletions(-)
-
-diff --git a/hw/i386/pc.c b/hw/i386/pc.c
-index d24388e05f..81e91a4897 100644
---- a/hw/i386/pc.c
-+++ b/hw/i386/pc.c
-@@ -1151,9 +1151,9 @@ void pc_cpus_init(PCMachineState *pcms)
-     /* init CPUs */
-     if (machine->cpu_model == NULL) {
- #ifdef TARGET_X86_64
--        machine->cpu_model = "qemu64";
-+        machine->cpu_model = "kvm64";
- #else
--        machine->cpu_model = "qemu32";
-+        machine->cpu_model = "kvm32";
- #endif
-     }
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0008-qapi-modify-query-machines.patch b/debian/patches/pve/0008-qapi-modify-query-machines.patch
deleted file mode 100644 (file)
index d9b463f..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-From 95a583f2d001477eca4c74d49be44f00bf9a8440 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 14:31:18 +0100
-Subject: [PATCH 08/49] qapi: modify query machines
-
-provide '*is-current' in MachineInfo struct
----
- qapi-schema.json | 4 +++-
- vl.c             | 5 +++++
- 2 files changed, 8 insertions(+), 1 deletion(-)
-
-diff --git a/qapi-schema.json b/qapi-schema.json
-index f38b85bf6a..51e150c6c1 100644
---- a/qapi-schema.json
-+++ b/qapi-schema.json
-@@ -4242,6 +4242,8 @@
- #
- # @is-default: whether the machine is default
- #
-+# @is-current: whether this machine is currently used
-+#
- # @cpu-max: maximum number of CPUs supported by the machine type
- #           (since 1.5.0)
- #
-@@ -4251,7 +4253,7 @@
- ##
- { 'struct': 'MachineInfo',
-   'data': { 'name': 'str', '*alias': 'str',
--            '*is-default': 'bool', 'cpu-max': 'int',
-+            '*is-default': 'bool', '*is-current': 'bool', 'cpu-max': 'int',
-             'hotpluggable-cpus': 'bool'} }
- ##
-diff --git a/vl.c b/vl.c
-index 0b4ed5241c..868c4893df 100644
---- a/vl.c
-+++ b/vl.c
-@@ -1518,6 +1518,11 @@ MachineInfoList *qmp_query_machines(Error **errp)
-         info->cpu_max = !mc->max_cpus ? 1 : mc->max_cpus;
-         info->hotpluggable_cpus = mc->has_hotpluggable_cpus;
-+        if (strcmp(mc->name, MACHINE_GET_CLASS(current_machine)->name) == 0) {
-+            info->has_is_current = true;
-+            info->is_current = true;
-+        }
-+
-         entry = g_malloc0(sizeof(*entry));
-         entry->value = info;
-         entry->next = mach_list;
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0008-qapi-modify-spice-query.patch b/debian/patches/pve/0008-qapi-modify-spice-query.patch
new file mode 100644 (file)
index 0000000..eb394be
--- /dev/null
@@ -0,0 +1,49 @@
+From 7215cf5a1ef31a3b0470c16d0b2a3585edf5dbc5 Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Wed, 9 Dec 2015 14:32:11 +0100
+Subject: [PATCH 08/28] qapi: modify spice query
+
+Provide the last ticket in the SpiceInfo struct optionally.
+---
+ qapi-schema.json | 3 +++
+ ui/spice-core.c  | 5 +++++
+ 2 files changed, 8 insertions(+)
+
+diff --git a/qapi-schema.json b/qapi-schema.json
+index 51e150c6c1..1b14ff2476 100644
+--- a/qapi-schema.json
++++ b/qapi-schema.json
+@@ -1841,11 +1841,14 @@
+ #
+ # @channels: a list of @SpiceChannel for each active spice channel
+ #
++# @ticket: The last ticket set with set_password
++#
+ # Since: 0.14.0
+ ##
+ { 'struct': 'SpiceInfo',
+   'data': {'enabled': 'bool', 'migrated': 'bool', '*host': 'str', '*port': 'int',
+            '*tls-port': 'int', '*auth': 'str', '*compiled-version': 'str',
++           '*ticket': 'str',
+            'mouse-mode': 'SpiceQueryMouseMode', '*channels': ['SpiceChannel']} }
+ ##
+diff --git a/ui/spice-core.c b/ui/spice-core.c
+index 804abc5c0f..4a417310d3 100644
+--- a/ui/spice-core.c
++++ b/ui/spice-core.c
+@@ -552,6 +552,11 @@ SpiceInfo *qmp_query_spice(Error **errp)
+     micro = SPICE_SERVER_VERSION & 0xff;
+     info->compiled_version = g_strdup_printf("%d.%d.%d", major, minor, micro);
++    if (auth_passwd) {
++        info->has_ticket = true;
++        info->ticket =  g_strdup(auth_passwd);
++    }
++
+     if (port) {
+         info->has_port = true;
+         info->port = port;
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0009-qapi-modify-spice-query.patch b/debian/patches/pve/0009-qapi-modify-spice-query.patch
deleted file mode 100644 (file)
index 1703ae8..0000000
+++ /dev/null
@@ -1,49 +0,0 @@
-From bc5254a21ab6556c000e30fa340d11e0a5bb7dd3 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 14:32:11 +0100
-Subject: [PATCH 09/49] qapi: modify spice query
-
-Provide the last ticket in the SpiceInfo struct optionally.
----
- qapi-schema.json | 3 +++
- ui/spice-core.c  | 5 +++++
- 2 files changed, 8 insertions(+)
-
-diff --git a/qapi-schema.json b/qapi-schema.json
-index 51e150c6c1..1b14ff2476 100644
---- a/qapi-schema.json
-+++ b/qapi-schema.json
-@@ -1841,11 +1841,14 @@
- #
- # @channels: a list of @SpiceChannel for each active spice channel
- #
-+# @ticket: The last ticket set with set_password
-+#
- # Since: 0.14.0
- ##
- { 'struct': 'SpiceInfo',
-   'data': {'enabled': 'bool', 'migrated': 'bool', '*host': 'str', '*port': 'int',
-            '*tls-port': 'int', '*auth': 'str', '*compiled-version': 'str',
-+           '*ticket': 'str',
-            'mouse-mode': 'SpiceQueryMouseMode', '*channels': ['SpiceChannel']} }
- ##
-diff --git a/ui/spice-core.c b/ui/spice-core.c
-index 804abc5c0f..4a417310d3 100644
---- a/ui/spice-core.c
-+++ b/ui/spice-core.c
-@@ -552,6 +552,11 @@ SpiceInfo *qmp_query_spice(Error **errp)
-     micro = SPICE_SERVER_VERSION & 0xff;
-     info->compiled_version = g_strdup_printf("%d.%d.%d", major, minor, micro);
-+    if (auth_passwd) {
-+        info->has_ticket = true;
-+        info->ticket =  g_strdup(auth_passwd);
-+    }
-+
-     if (port) {
-         info->has_port = true;
-         info->port = port;
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0009-ui-spice-default-to-pve-certs-unless-otherwise-speci.patch b/debian/patches/pve/0009-ui-spice-default-to-pve-certs-unless-otherwise-speci.patch
new file mode 100644 (file)
index 0000000..6ec9ed7
--- /dev/null
@@ -0,0 +1,59 @@
+From 3ea2b6f80c46456be2ed339dc2338a61cc7b7bfe Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Wed, 9 Dec 2015 14:33:34 +0100
+Subject: [PATCH 09/28] ui/spice: default to pve certs unless otherwise
+ specified
+
+---
+ ui/spice-core.c | 15 +++++++++------
+ 1 file changed, 9 insertions(+), 6 deletions(-)
+
+diff --git a/ui/spice-core.c b/ui/spice-core.c
+index 4a417310d3..af1dc8c653 100644
+--- a/ui/spice-core.c
++++ b/ui/spice-core.c
+@@ -685,32 +685,35 @@ void qemu_spice_init(void)
+     if (tls_port) {
+         x509_dir = qemu_opt_get(opts, "x509-dir");
+-        if (!x509_dir) {
+-            x509_dir = ".";
+-        }
+         str = qemu_opt_get(opts, "x509-key-file");
+         if (str) {
+             x509_key_file = g_strdup(str);
+-        } else {
++        } else if (x509_dir) {
+             x509_key_file = g_strdup_printf("%s/%s", x509_dir,
+                                             X509_SERVER_KEY_FILE);
++        } else {
++            x509_key_file = g_strdup("/etc/pve/local/pve-ssl.key");
+         }
+         str = qemu_opt_get(opts, "x509-cert-file");
+         if (str) {
+             x509_cert_file = g_strdup(str);
+-        } else {
++        } else if (x509_dir) {
+             x509_cert_file = g_strdup_printf("%s/%s", x509_dir,
+                                              X509_SERVER_CERT_FILE);
++        } else {
++            x509_cert_file = g_strdup("/etc/pve/local/pve-ssl.pem");
+         }
+         str = qemu_opt_get(opts, "x509-cacert-file");
+         if (str) {
+             x509_cacert_file = g_strdup(str);
+-        } else {
++        } else if (x509_dir) {
+             x509_cacert_file = g_strdup_printf("%s/%s", x509_dir,
+                                                X509_CA_CERT_FILE);
++        } else {
++            x509_cacert_file = g_strdup("/etc/pve/pve-root-ca.pem");
+         }
+         x509_key_password = qemu_opt_get(opts, "x509-key-password");
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0010-internal-snapshot-async.patch b/debian/patches/pve/0010-internal-snapshot-async.patch
new file mode 100644 (file)
index 0000000..77a6ec2
--- /dev/null
@@ -0,0 +1,978 @@
+From 1f5a5623052ba8d593e4356f9fda0281e607be76 Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Wed, 9 Dec 2015 16:04:32 +0100
+Subject: [PATCH 10/28] internal snapshot async
+
+---
+ Makefile.objs           |   1 +
+ block.c                 |   2 +-
+ hmp-commands-info.hx    |  13 ++
+ hmp-commands.hx         |  32 +++
+ hmp.c                   |  57 ++++++
+ hmp.h                   |   5 +
+ include/block/block.h   |   1 +
+ include/sysemu/sysemu.h |   5 +-
+ migration/savevm.c      |  12 +-
+ qapi-schema.json        |  68 +++++++
+ qemu-options.hx         |  13 ++
+ savevm-async.c          | 523 ++++++++++++++++++++++++++++++++++++++++++++++++
+ vl.c                    |   8 +
+ 13 files changed, 732 insertions(+), 8 deletions(-)
+ create mode 100644 savevm-async.c
+
+diff --git a/Makefile.objs b/Makefile.objs
+index 6167e7b17d..fbfbbb7f70 100644
+--- a/Makefile.objs
++++ b/Makefile.objs
+@@ -50,6 +50,7 @@ common-obj-$(CONFIG_LINUX) += fsdev/
+ common-obj-y += migration/
+ common-obj-y += page_cache.o #aio.o
++common-obj-y += savevm-async.o
+ common-obj-$(CONFIG_SPICE) += spice-qemu-char.o
+diff --git a/block.c b/block.c
+index 1fbbb8d606..6ea9ed1c62 100644
+--- a/block.c
++++ b/block.c
+@@ -3091,7 +3091,7 @@ out:
+     bdrv_unref(bs_new);
+ }
+-static void bdrv_delete(BlockDriverState *bs)
++void bdrv_delete(BlockDriverState *bs)
+ {
+     assert(!bs->job);
+     assert(bdrv_op_blocker_is_empty(bs));
+diff --git a/hmp-commands-info.hx b/hmp-commands-info.hx
+index a53f105c52..5fc57a2210 100644
+--- a/hmp-commands-info.hx
++++ b/hmp-commands-info.hx
+@@ -560,6 +560,19 @@ Show current migration xbzrle cache size.
+ ETEXI
+     {
++        .name       = "savevm",
++        .args_type  = "",
++        .params     = "",
++        .help       = "show savevm status",
++        .cmd = hmp_info_savevm,
++    },
++
++STEXI
++@item info savevm
++show savevm status
++ETEXI
++
++    {
+         .name       = "balloon",
+         .args_type  = "",
+         .params     = "",
+diff --git a/hmp-commands.hx b/hmp-commands.hx
+index 88192817b2..58940a762b 100644
+--- a/hmp-commands.hx
++++ b/hmp-commands.hx
+@@ -1777,3 +1777,35 @@ ETEXI
+ STEXI
+ @end table
+ ETEXI
++
++    {
++        .name       = "savevm-start",
++        .args_type  = "statefile:s?",
++        .params     = "[statefile]",
++        .help       = "Prepare for snapshot and halt VM. Save VM state to statefile.",
++        .cmd = hmp_savevm_start,
++    },
++
++    {
++        .name       = "snapshot-drive",
++        .args_type  = "device:s,name:s",
++        .params     = "device name",
++        .help       = "Create internal snapshot.",
++        .cmd = hmp_snapshot_drive,
++    },
++
++    {
++        .name       = "delete-drive-snapshot",
++        .args_type  = "device:s,name:s",
++        .params     = "device name",
++        .help       = "Delete internal snapshot.",
++        .cmd = hmp_delete_drive_snapshot,
++    },
++
++    {
++        .name       = "savevm-end",
++        .args_type  = "",
++        .params     = "",
++        .help       = "Resume VM after snaphot.",
++        .cmd = hmp_savevm_end,
++    },
+diff --git a/hmp.c b/hmp.c
+index 904542d026..f725d061e6 100644
+--- a/hmp.c
++++ b/hmp.c
+@@ -2207,6 +2207,63 @@ void hmp_info_memory_devices(Monitor *mon, const QDict *qdict)
+     qapi_free_MemoryDeviceInfoList(info_list);
+ }
++void hmp_savevm_start(Monitor *mon, const QDict *qdict)
++{
++    Error *errp = NULL;
++    const char *statefile = qdict_get_try_str(qdict, "statefile");
++
++    qmp_savevm_start(statefile != NULL, statefile, &errp);
++    hmp_handle_error(mon, &errp);
++}
++
++void hmp_snapshot_drive(Monitor *mon, const QDict *qdict)
++{
++    Error *errp = NULL;
++    const char *name = qdict_get_str(qdict, "name");
++    const char *device = qdict_get_str(qdict, "device");
++
++    qmp_snapshot_drive(device, name, &errp);
++    hmp_handle_error(mon, &errp);
++}
++
++void hmp_delete_drive_snapshot(Monitor *mon, const QDict *qdict)
++{
++    Error *errp = NULL;
++    const char *name = qdict_get_str(qdict, "name");
++    const char *device = qdict_get_str(qdict, "device");
++
++    qmp_delete_drive_snapshot(device, name, &errp);
++    hmp_handle_error(mon, &errp);
++}
++
++void hmp_savevm_end(Monitor *mon, const QDict *qdict)
++{
++    Error *errp = NULL;
++
++    qmp_savevm_end(&errp);
++    hmp_handle_error(mon, &errp);
++}
++
++void hmp_info_savevm(Monitor *mon, const QDict *qdict)
++{
++    SaveVMInfo *info;
++    info = qmp_query_savevm(NULL);
++
++    if (info->has_status) {
++        monitor_printf(mon, "savevm status: %s\n", info->status);
++        monitor_printf(mon, "total time: %" PRIu64 " milliseconds\n",
++                       info->total_time);
++    } else {
++        monitor_printf(mon, "savevm status: not running\n");
++    }
++    if (info->has_bytes) {
++        monitor_printf(mon, "Bytes saved: %"PRIu64"\n", info->bytes);
++    }
++    if (info->has_error) {
++        monitor_printf(mon, "Error: %s\n", info->error);
++    }
++}
++
+ void hmp_info_iothreads(Monitor *mon, const QDict *qdict)
+ {
+     IOThreadInfoList *info_list = qmp_query_iothreads(NULL);
+diff --git a/hmp.h b/hmp.h
+index 799fd371fa..0497afbf65 100644
+--- a/hmp.h
++++ b/hmp.h
+@@ -26,6 +26,7 @@ void hmp_info_status(Monitor *mon, const QDict *qdict);
+ void hmp_info_uuid(Monitor *mon, const QDict *qdict);
+ void hmp_info_chardev(Monitor *mon, const QDict *qdict);
+ void hmp_info_mice(Monitor *mon, const QDict *qdict);
++void hmp_info_savevm(Monitor *mon, const QDict *qdict);
+ void hmp_info_migrate(Monitor *mon, const QDict *qdict);
+ void hmp_info_migrate_capabilities(Monitor *mon, const QDict *qdict);
+ void hmp_info_migrate_parameters(Monitor *mon, const QDict *qdict);
+@@ -92,6 +93,10 @@ void hmp_netdev_add(Monitor *mon, const QDict *qdict);
+ void hmp_netdev_del(Monitor *mon, const QDict *qdict);
+ void hmp_getfd(Monitor *mon, const QDict *qdict);
+ void hmp_closefd(Monitor *mon, const QDict *qdict);
++void hmp_savevm_start(Monitor *mon, const QDict *qdict);
++void hmp_snapshot_drive(Monitor *mon, const QDict *qdict);
++void hmp_delete_drive_snapshot(Monitor *mon, const QDict *qdict);
++void hmp_savevm_end(Monitor *mon, const QDict *qdict);
+ void hmp_sendkey(Monitor *mon, const QDict *qdict);
+ void hmp_screendump(Monitor *mon, const QDict *qdict);
+ void hmp_nbd_server_start(Monitor *mon, const QDict *qdict);
+diff --git a/include/block/block.h b/include/block/block.h
+index 5ddc0cf21b..7eff87c7dd 100644
+--- a/include/block/block.h
++++ b/include/block/block.h
+@@ -295,6 +295,7 @@ BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
+ int bdrv_get_backing_file_depth(BlockDriverState *bs);
+ void bdrv_refresh_filename(BlockDriverState *bs);
+ int bdrv_truncate(BdrvChild *child, int64_t offset);
++void bdrv_delete(BlockDriverState *bs);
+ int64_t bdrv_nb_sectors(BlockDriverState *bs);
+ int64_t bdrv_getlength(BlockDriverState *bs);
+ int64_t bdrv_get_allocated_file_size(BlockDriverState *bs);
+diff --git a/include/sysemu/sysemu.h b/include/sysemu/sysemu.h
+index 576c7ce640..74623de16c 100644
+--- a/include/sysemu/sysemu.h
++++ b/include/sysemu/sysemu.h
+@@ -78,6 +78,7 @@ void qemu_remove_machine_init_done_notifier(Notifier *notify);
+ void hmp_savevm(Monitor *mon, const QDict *qdict);
+ int save_vmstate(Monitor *mon, const char *name);
+ int load_vmstate(const char *name);
++int load_state_from_blockdev(const char *filename);
+ void hmp_delvm(Monitor *mon, const QDict *qdict);
+ void hmp_info_snapshots(Monitor *mon, const QDict *qdict);
+@@ -105,13 +106,13 @@ enum qemu_vm_cmd {
+ #define MAX_VM_CMD_PACKAGED_SIZE (1ul << 24)
+ bool qemu_savevm_state_blocked(Error **errp);
+-void qemu_savevm_state_begin(QEMUFile *f,
++int qemu_savevm_state_begin(QEMUFile *f,
+                              const MigrationParams *params);
+ void qemu_savevm_state_header(QEMUFile *f);
+ int qemu_savevm_state_iterate(QEMUFile *f, bool postcopy);
+ void qemu_savevm_state_cleanup(void);
+ void qemu_savevm_state_complete_postcopy(QEMUFile *f);
+-void qemu_savevm_state_complete_precopy(QEMUFile *f, bool iterable_only);
++int qemu_savevm_state_complete_precopy(QEMUFile *f, bool iterable_only);
+ void qemu_savevm_state_pending(QEMUFile *f, uint64_t max_size,
+                                uint64_t *res_non_postcopiable,
+                                uint64_t *res_postcopiable);
+diff --git a/migration/savevm.c b/migration/savevm.c
+index 3b19a4a274..feb0dc6834 100644
+--- a/migration/savevm.c
++++ b/migration/savevm.c
+@@ -970,11 +970,11 @@ void qemu_savevm_state_header(QEMUFile *f)
+ }
+-void qemu_savevm_state_begin(QEMUFile *f,
++int qemu_savevm_state_begin(QEMUFile *f,
+                              const MigrationParams *params)
+ {
+     SaveStateEntry *se;
+-    int ret;
++    int ret = 0;
+     trace_savevm_state_begin();
+     QTAILQ_FOREACH(se, &savevm_state.handlers, entry) {
+@@ -1002,6 +1002,7 @@ void qemu_savevm_state_begin(QEMUFile *f,
+             break;
+         }
+     }
++    return ret;
+ }
+ /*
+@@ -1105,7 +1106,7 @@ void qemu_savevm_state_complete_postcopy(QEMUFile *f)
+     qemu_fflush(f);
+ }
+-void qemu_savevm_state_complete_precopy(QEMUFile *f, bool iterable_only)
++int qemu_savevm_state_complete_precopy(QEMUFile *f, bool iterable_only)
+ {
+     QJSON *vmdesc;
+     int vmdesc_len;
+@@ -1139,12 +1140,12 @@ void qemu_savevm_state_complete_precopy(QEMUFile *f, bool iterable_only)
+         save_section_footer(f, se);
+         if (ret < 0) {
+             qemu_file_set_error(f, ret);
+-            return;
++            return ret;
+         }
+     }
+     if (iterable_only) {
+-        return;
++        return ret;
+     }
+     vmdesc = qjson_new();
+@@ -1191,6 +1192,7 @@ void qemu_savevm_state_complete_precopy(QEMUFile *f, bool iterable_only)
+     qjson_destroy(vmdesc);
+     qemu_fflush(f);
++    return qemu_file_get_error(f);
+ }
+ /* Give an estimate of the amount left to be transferred,
+diff --git a/qapi-schema.json b/qapi-schema.json
+index 1b14ff2476..361700d37c 100644
+--- a/qapi-schema.json
++++ b/qapi-schema.json
+@@ -723,6 +723,40 @@
+            '*error-desc': 'str'} }
+ ##
++# @SaveVMInfo:
++#
++# Information about current migration process.
++#
++# @status: string describing the current savevm status.
++#          This can be 'active', 'completed', 'failed'.
++#          If this field is not returned, no savevm process
++#          has been initiated
++#
++# @error: string containing error message is status is failed.
++#
++# @total-time: total amount of milliseconds since savevm started.
++#        If savevm has ended, it returns the total save time
++#
++# @bytes: total amount of data transfered
++#
++# Since: 1.3
++##
++{ 'struct': 'SaveVMInfo',
++  'data': {'*status': 'str', '*error': 'str',
++           '*total-time': 'int', '*bytes': 'int'} }
++
++##
++# @query-savevm:
++#
++# Returns information about current savevm process.
++#
++# Returns: @SaveVMInfo
++#
++# Since: 1.3
++##
++{ 'command': 'query-savevm', 'returns': 'SaveVMInfo' }
++
++##
+ # @query-migrate:
+ #
+ # Returns information about current migration process. If migration
+@@ -4735,9 +4769,43 @@
+ #
+ # Since: 1.2.0
+ ##
++
+ { 'command': 'query-target', 'returns': 'TargetInfo' }
+ ##
++# @savevm-start:
++#
++# Prepare for snapshot and halt VM. Save VM state to statefile.
++#
++##
++{ 'command': 'savevm-start', 'data': { '*statefile': 'str' } }
++
++##
++# @snapshot-drive:
++#
++# Create an internal drive snapshot.
++#
++##
++{ 'command': 'snapshot-drive', 'data': { 'device': 'str', 'name': 'str' } }
++
++##
++# @delete-drive-snapshot:
++#
++# Delete a drive snapshot.
++#
++##
++{ 'command': 'delete-drive-snapshot', 'data': { 'device': 'str', 'name': 'str' } }
++
++##
++# @savevm-end:
++#
++# Resume VM after a snapshot.
++#
++##
++{ 'command': 'savevm-end' }
++
++
++##
+ # @QKeyCode:
+ #
+ # An enumeration of key name.
+diff --git a/qemu-options.hx b/qemu-options.hx
+index 99af8edf5f..10f0e81f9b 100644
+--- a/qemu-options.hx
++++ b/qemu-options.hx
+@@ -3396,6 +3396,19 @@ STEXI
+ Start right away with a saved state (@code{loadvm} in monitor)
+ ETEXI
++DEF("loadstate", HAS_ARG, QEMU_OPTION_loadstate, \
++    "-loadstate file\n" \
++    "                start right away with a saved state\n",
++    QEMU_ARCH_ALL)
++STEXI
++@item -loadstate @var{file}
++@findex -loadstate
++Start right away with a saved state. This option does not rollback
++disk state like @code{loadvm}, so user must make sure that disk
++have correct state. @var{file} can be any valid device URL. See the section
++for "Device URL Syntax" for more information.
++ETEXI
++
+ #ifndef _WIN32
+ DEF("daemonize", 0, QEMU_OPTION_daemonize, \
+     "-daemonize      daemonize QEMU after initializing\n", QEMU_ARCH_ALL)
+diff --git a/savevm-async.c b/savevm-async.c
+new file mode 100644
+index 0000000000..2f4766cf6c
+--- /dev/null
++++ b/savevm-async.c
+@@ -0,0 +1,523 @@
++#include "qemu/osdep.h"
++#include "qemu-common.h"
++#include "qapi/qmp/qerror.h"
++#include "qemu/error-report.h"
++#include "sysemu/sysemu.h"
++#include "qmp-commands.h"
++#include "qemu-options.h"
++#include "migration/qemu-file.h"
++#include "qom/qom-qobject.h"
++#include "migration/migration.h"
++#include "block/snapshot.h"
++#include "block/qapi.h"
++#include "block/block.h"
++#include "qemu/timer.h"
++#include "sysemu/block-backend.h"
++#include "qapi/qmp/qstring.h"
++#include "qemu/rcu.h"
++#include "qemu/thread.h"
++#include "qemu/cutils.h"
++
++/* #define DEBUG_SAVEVM_STATE */
++
++#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
++
++#ifdef DEBUG_SAVEVM_STATE
++#define DPRINTF(fmt, ...) \
++    do { printf("savevm-async: " fmt, ## __VA_ARGS__); } while (0)
++#else
++#define DPRINTF(fmt, ...) \
++    do { } while (0)
++#endif
++
++enum {
++    SAVE_STATE_DONE,
++    SAVE_STATE_ERROR,
++    SAVE_STATE_ACTIVE,
++    SAVE_STATE_COMPLETED,
++    SAVE_STATE_CANCELLED
++};
++
++
++static struct SnapshotState {
++    BlockBackend *target;
++    size_t bs_pos;
++    int state;
++    Error *error;
++    Error *blocker;
++    int saved_vm_running;
++    QEMUFile *file;
++    int64_t total_time;
++} snap_state;
++
++SaveVMInfo *qmp_query_savevm(Error **errp)
++{
++    SaveVMInfo *info = g_malloc0(sizeof(*info));
++    struct SnapshotState *s = &snap_state;
++
++    if (s->state != SAVE_STATE_DONE) {
++        info->has_bytes = true;
++        info->bytes = s->bs_pos;
++        switch (s->state) {
++        case SAVE_STATE_ERROR:
++            info->has_status = true;
++            info->status = g_strdup("failed");
++            info->has_total_time = true;
++            info->total_time = s->total_time;
++            if (s->error) {
++                info->has_error = true;
++                info->error = g_strdup(error_get_pretty(s->error));
++            }
++            break;
++        case SAVE_STATE_ACTIVE:
++            info->has_status = true;
++            info->status = g_strdup("active");
++            info->has_total_time = true;
++            info->total_time = qemu_clock_get_ms(QEMU_CLOCK_REALTIME)
++                - s->total_time;
++            break;
++        case SAVE_STATE_COMPLETED:
++            info->has_status = true;
++            info->status = g_strdup("completed");
++            info->has_total_time = true;
++            info->total_time = s->total_time;
++            break;
++        }
++    }
++
++    return info;
++}
++
++static int save_snapshot_cleanup(void)
++{
++    int ret = 0;
++
++    DPRINTF("save_snapshot_cleanup\n");
++
++    snap_state.total_time = qemu_clock_get_ms(QEMU_CLOCK_REALTIME) -
++        snap_state.total_time;
++
++    if (snap_state.file) {
++        ret = qemu_fclose(snap_state.file);
++    }
++
++    if (snap_state.target) {
++        /* try to truncate, but ignore errors (will fail on block devices).
++         * note: bdrv_read() need whole blocks, so we round up
++         */
++        size_t size = (snap_state.bs_pos + BDRV_SECTOR_SIZE) & BDRV_SECTOR_MASK;
++        blk_truncate(snap_state.target, size);
++        blk_op_unblock_all(snap_state.target, snap_state.blocker);
++        error_free(snap_state.blocker);
++        snap_state.blocker = NULL;
++        blk_unref(snap_state.target);
++        snap_state.target = NULL;
++    }
++
++    return ret;
++}
++
++static void save_snapshot_error(const char *fmt, ...)
++{
++    va_list ap;
++    char *msg;
++
++    va_start(ap, fmt);
++    msg = g_strdup_vprintf(fmt, ap);
++    va_end(ap);
++
++    DPRINTF("save_snapshot_error: %s\n", msg);
++
++    if (!snap_state.error) {
++        error_set(&snap_state.error, ERROR_CLASS_GENERIC_ERROR, "%s", msg);
++    }
++
++    g_free (msg);
++
++    snap_state.state = SAVE_STATE_ERROR;
++
++    save_snapshot_cleanup();
++}
++
++static void save_snapshot_completed(void)
++{
++    DPRINTF("save_snapshot_completed\n");
++
++    if (save_snapshot_cleanup() < 0) {
++        snap_state.state = SAVE_STATE_ERROR;
++    } else {
++        snap_state.state = SAVE_STATE_COMPLETED;
++    }
++}
++
++static int block_state_close(void *opaque)
++{
++    snap_state.file = NULL;
++    return blk_flush(snap_state.target);
++}
++
++static ssize_t block_state_writev_buffer(void *opaque, struct iovec *iov,
++                                         int iovcnt, int64_t pos)
++{
++    int ret;
++    QEMUIOVector qiov;
++
++    qemu_iovec_init_external(&qiov, iov, iovcnt);
++    ret = blk_co_pwritev(snap_state.target, pos, qiov.size, &qiov, 0);
++    if (ret < 0) {
++        return ret;
++    }
++    snap_state.bs_pos += qiov.size;
++    return qiov.size;
++}
++
++static int store_and_stop(void) {
++    if (global_state_store()) {
++        save_snapshot_error("Error saving global state");
++        return 1;
++    }
++    if (runstate_is_running()) {
++        vm_stop(RUN_STATE_SAVE_VM);
++    }
++    return 0;
++}
++
++static void process_savevm_co(void *opaque)
++{
++    int ret;
++    int64_t maxlen;
++    MigrationParams params = {
++        .blk = 0,
++        .shared = 0
++    };
++
++    snap_state.state = SAVE_STATE_ACTIVE;
++
++    qemu_mutex_unlock_iothread();
++    qemu_savevm_state_header(snap_state.file);
++    ret = qemu_savevm_state_begin(snap_state.file, &params);
++    qemu_mutex_lock_iothread();
++
++    if (ret < 0) {
++        save_snapshot_error("qemu_savevm_state_begin failed");
++        return;
++    }
++
++    while (snap_state.state == SAVE_STATE_ACTIVE) {
++        uint64_t pending_size, pend_post, pend_nonpost;
++
++        qemu_savevm_state_pending(snap_state.file, 0, &pend_nonpost, &pend_post);
++        pending_size = pend_post + pend_nonpost;
++
++        if (pending_size) {
++                ret = qemu_savevm_state_iterate(snap_state.file, false);
++                if (ret < 0) {
++                    save_snapshot_error("qemu_savevm_state_iterate error %d", ret);
++                    break;
++                }
++                DPRINTF("savevm inerate pending size %lu ret %d\n", pending_size, ret);
++        } else {
++            DPRINTF("done iterating\n");
++            if (store_and_stop())
++                break;
++            DPRINTF("savevm inerate finished\n");
++            qemu_savevm_state_complete_precopy(snap_state.file, false);
++            DPRINTF("save complete\n");
++            save_snapshot_completed();
++            break;
++        }
++
++        /* stop the VM if we get to the end of available space,
++         * or if pending_size is just a few MB
++         */
++        maxlen = blk_getlength(snap_state.target) - 30*1024*1024;
++        if ((pending_size < 100000) ||
++            ((snap_state.bs_pos + pending_size) >= maxlen)) {
++            if (store_and_stop())
++                break;
++        }
++    }
++
++    if(snap_state.state == SAVE_STATE_CANCELLED) {
++        save_snapshot_completed();
++        Error *errp = NULL;
++        qmp_savevm_end(&errp);
++    }
++
++}
++
++static const QEMUFileOps block_file_ops = {
++    .writev_buffer =  block_state_writev_buffer,
++    .close =          block_state_close,
++};
++
++
++void qmp_savevm_start(bool has_statefile, const char *statefile, Error **errp)
++{
++    Error *local_err = NULL;
++
++    int bdrv_oflags = BDRV_O_RDWR | BDRV_O_RESIZE | BDRV_O_NO_FLUSH;
++
++    if (snap_state.state != SAVE_STATE_DONE) {
++        error_set(errp, ERROR_CLASS_GENERIC_ERROR,
++                  "VM snapshot already started\n");
++        return;
++    }
++
++    /* initialize snapshot info */
++    snap_state.saved_vm_running = runstate_is_running();
++    snap_state.bs_pos = 0;
++    snap_state.total_time = qemu_clock_get_ms(QEMU_CLOCK_REALTIME);
++    snap_state.blocker = NULL;
++
++    if (snap_state.error) {
++        error_free(snap_state.error);
++        snap_state.error = NULL;
++    }
++
++    if (!has_statefile) {
++        vm_stop(RUN_STATE_SAVE_VM);
++        snap_state.state = SAVE_STATE_COMPLETED;
++        return;
++    }
++
++    if (qemu_savevm_state_blocked(errp)) {
++        return;
++    }
++
++    /* Open the image */
++    QDict *options = NULL;
++    options = qdict_new();
++    qdict_put(options, "driver", qstring_from_str("raw"));
++    snap_state.target = blk_new_open(statefile, NULL, options, bdrv_oflags, &local_err);
++    if (!snap_state.target) {
++        error_set(errp, ERROR_CLASS_GENERIC_ERROR, "failed to open '%s'", statefile);
++        goto restart;
++    }
++
++    snap_state.file = qemu_fopen_ops(&snap_state, &block_file_ops);
++
++    if (!snap_state.file) {
++        error_set(errp, ERROR_CLASS_GENERIC_ERROR, "failed to open '%s'", statefile);
++        goto restart;
++    }
++
++
++    error_setg(&snap_state.blocker, "block device is in use by savevm");
++    blk_op_block_all(snap_state.target, snap_state.blocker);
++
++    Coroutine *co = qemu_coroutine_create(process_savevm_co, NULL);
++    qemu_coroutine_enter(co);
++
++    return;
++
++restart:
++
++    save_snapshot_error("setup failed");
++
++    if (snap_state.saved_vm_running) {
++        vm_start();
++    }
++}
++
++void qmp_savevm_end(Error **errp)
++{
++    if (snap_state.state == SAVE_STATE_DONE) {
++        error_set(errp, ERROR_CLASS_GENERIC_ERROR,
++                  "VM snapshot not started\n");
++        return;
++    }
++
++    if (snap_state.state == SAVE_STATE_ACTIVE) {
++        snap_state.state = SAVE_STATE_CANCELLED;
++        return;
++    }
++
++    if (snap_state.saved_vm_running) {
++        vm_start();
++    }
++
++    snap_state.state = SAVE_STATE_DONE;
++}
++
++void qmp_snapshot_drive(const char *device, const char *name, Error **errp)
++{
++    BlockBackend *blk;
++    BlockDriverState *bs;
++    QEMUSnapshotInfo sn1, *sn = &sn1;
++    int ret;
++#ifdef _WIN32
++    struct _timeb tb;
++#else
++    struct timeval tv;
++#endif
++
++    if (snap_state.state != SAVE_STATE_COMPLETED) {
++        error_set(errp, ERROR_CLASS_GENERIC_ERROR,
++                  "VM snapshot not ready/started\n");
++        return;
++    }
++
++    blk = blk_by_name(device);
++    if (!blk) {
++        error_set(errp, ERROR_CLASS_DEVICE_NOT_FOUND,
++                  "Device '%s' not found", device);
++        return;
++    }
++
++    bs = blk_bs(blk);
++    if (!bdrv_is_inserted(bs)) {
++        error_setg(errp, QERR_DEVICE_HAS_NO_MEDIUM, device);
++        return;
++    }
++
++    if (bdrv_is_read_only(bs)) {
++        error_setg(errp, "Node '%s' is read only", device);
++        return;
++    }
++
++    if (!bdrv_can_snapshot(bs)) {
++        error_setg(errp, QERR_UNSUPPORTED);
++        return;
++    }
++
++    if (bdrv_snapshot_find(bs, sn, name) >= 0) {
++        error_set(errp, ERROR_CLASS_GENERIC_ERROR,
++                  "snapshot '%s' already exists", name);
++        return;
++    }
++
++    sn = &sn1;
++    memset(sn, 0, sizeof(*sn));
++
++#ifdef _WIN32
++    _ftime(&tb);
++    sn->date_sec = tb.time;
++    sn->date_nsec = tb.millitm * 1000000;
++#else
++    gettimeofday(&tv, NULL);
++    sn->date_sec = tv.tv_sec;
++    sn->date_nsec = tv.tv_usec * 1000;
++#endif
++    sn->vm_clock_nsec = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL);
++
++    pstrcpy(sn->name, sizeof(sn->name), name);
++
++    sn->vm_state_size = 0; /* do not save state */
++
++    ret = bdrv_snapshot_create(bs, sn);
++    if (ret < 0) {
++        error_set(errp, ERROR_CLASS_GENERIC_ERROR,
++                  "Error while creating snapshot on '%s'\n", device);
++        return;
++    }
++}
++
++void qmp_delete_drive_snapshot(const char *device, const char *name,
++                               Error **errp)
++{
++    BlockBackend *blk;
++    BlockDriverState *bs;
++    QEMUSnapshotInfo sn1, *sn = &sn1;
++    Error *local_err = NULL;
++
++    int ret;
++
++    blk = blk_by_name(device);
++    if (!blk) {
++        error_set(errp, ERROR_CLASS_DEVICE_NOT_FOUND,
++                  "Device '%s' not found", device);
++        return;
++    }
++
++    bs = blk_bs(blk);
++    if (bdrv_is_read_only(bs)) {
++        error_setg(errp, "Node '%s' is read only", device);
++        return;
++    }
++
++    if (!bdrv_can_snapshot(bs)) {
++        error_setg(errp, QERR_UNSUPPORTED);
++        return;
++    }
++
++    if (bdrv_snapshot_find(bs, sn, name) < 0) {
++        /* return success if snapshot does not exists */
++        return;
++    }
++
++    ret = bdrv_snapshot_delete(bs, NULL, name, &local_err);
++    if (ret < 0) {
++        error_set(errp, ERROR_CLASS_GENERIC_ERROR,
++                  "Error while deleting snapshot on '%s'\n", device);
++        return;
++    }
++}
++
++static ssize_t loadstate_get_buffer(void *opaque, uint8_t *buf, int64_t pos,
++                                    size_t size)
++{
++    BlockBackend *be = opaque;
++    int64_t maxlen = blk_getlength(be);
++    if (pos > maxlen) {
++        return -EIO;
++    }
++    if ((pos + size) > maxlen) {
++        size = maxlen - pos - 1;
++    }
++    if (size == 0) {
++        return 0;
++    }
++    return blk_pread(be, pos, buf, size);
++}
++
++static const QEMUFileOps loadstate_file_ops = {
++    .get_buffer = loadstate_get_buffer,
++};
++
++int load_state_from_blockdev(const char *filename)
++{
++    BlockBackend *be;
++    Error *local_err = NULL;
++    Error *blocker = NULL;
++
++    QEMUFile *f;
++    int ret = -EINVAL;
++
++    be = blk_new_open(filename, NULL, NULL, 0, &local_err);
++
++    if (!be) {
++        error_report("Could not open VM state file");
++        goto the_end;
++    }
++
++    error_setg(&blocker, "block device is in use by load state");
++    blk_op_block_all(be, blocker);
++
++    /* restore the VM state */
++    f = qemu_fopen_ops(be, &loadstate_file_ops);
++    if (!f) {
++        error_report("Could not open VM state file");
++        goto the_end;
++    }
++
++    qemu_system_reset(VMRESET_SILENT);
++    ret = qemu_loadvm_state(f);
++
++    qemu_fclose(f);
++    migration_incoming_state_destroy();
++    if (ret < 0) {
++        error_report("Error %d while loading VM state", ret);
++        goto the_end;
++    }
++
++    ret = 0;
++
++ the_end:
++    if (be) {
++        blk_op_unblock_all(be, blocker);
++        error_free(blocker);
++        blk_unref(be);
++    }
++    return ret;
++}
+diff --git a/vl.c b/vl.c
+index 868c4893df..19afd47871 100644
+--- a/vl.c
++++ b/vl.c
+@@ -2960,6 +2960,7 @@ int main(int argc, char **argv, char **envp)
+     int optind;
+     const char *optarg;
+     const char *loadvm = NULL;
++    const char *loadstate = NULL;
+     MachineClass *machine_class;
+     const char *cpu_model;
+     const char *vga_model = NULL;
+@@ -3631,6 +3632,9 @@ int main(int argc, char **argv, char **envp)
+             case QEMU_OPTION_loadvm:
+                 loadvm = optarg;
+                 break;
++            case QEMU_OPTION_loadstate:
++                loadstate = optarg;
++                break;
+             case QEMU_OPTION_full_screen:
+                 full_screen = 1;
+                 break;
+@@ -4689,6 +4693,10 @@ int main(int argc, char **argv, char **envp)
+         if (load_vmstate(loadvm) < 0) {
+             autostart = 0;
+         }
++    } else if (loadstate) {
++        if (load_state_from_blockdev(loadstate) < 0) {
++            autostart = 0;
++        }
+     }
+     qdev_prop_check_globals();
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0010-ui-spice-default-to-pve-certs-unless-otherwise-speci.patch b/debian/patches/pve/0010-ui-spice-default-to-pve-certs-unless-otherwise-speci.patch
deleted file mode 100644 (file)
index 6256bf5..0000000
+++ /dev/null
@@ -1,59 +0,0 @@
-From 33d16abdcb9d708b9f63c2a5380e4849b9c34fce Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 14:33:34 +0100
-Subject: [PATCH 10/49] ui/spice: default to pve certs unless otherwise
- specified
-
----
- ui/spice-core.c | 15 +++++++++------
- 1 file changed, 9 insertions(+), 6 deletions(-)
-
-diff --git a/ui/spice-core.c b/ui/spice-core.c
-index 4a417310d3..af1dc8c653 100644
---- a/ui/spice-core.c
-+++ b/ui/spice-core.c
-@@ -685,32 +685,35 @@ void qemu_spice_init(void)
-     if (tls_port) {
-         x509_dir = qemu_opt_get(opts, "x509-dir");
--        if (!x509_dir) {
--            x509_dir = ".";
--        }
-         str = qemu_opt_get(opts, "x509-key-file");
-         if (str) {
-             x509_key_file = g_strdup(str);
--        } else {
-+        } else if (x509_dir) {
-             x509_key_file = g_strdup_printf("%s/%s", x509_dir,
-                                             X509_SERVER_KEY_FILE);
-+        } else {
-+            x509_key_file = g_strdup("/etc/pve/local/pve-ssl.key");
-         }
-         str = qemu_opt_get(opts, "x509-cert-file");
-         if (str) {
-             x509_cert_file = g_strdup(str);
--        } else {
-+        } else if (x509_dir) {
-             x509_cert_file = g_strdup_printf("%s/%s", x509_dir,
-                                              X509_SERVER_CERT_FILE);
-+        } else {
-+            x509_cert_file = g_strdup("/etc/pve/local/pve-ssl.pem");
-         }
-         str = qemu_opt_get(opts, "x509-cacert-file");
-         if (str) {
-             x509_cacert_file = g_strdup(str);
--        } else {
-+        } else if (x509_dir) {
-             x509_cacert_file = g_strdup_printf("%s/%s", x509_dir,
-                                                X509_CA_CERT_FILE);
-+        } else {
-+            x509_cacert_file = g_strdup("/etc/pve/pve-root-ca.pem");
-         }
-         x509_key_password = qemu_opt_get(opts, "x509-key-password");
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0011-convert-savevm-async-to-threads.patch b/debian/patches/pve/0011-convert-savevm-async-to-threads.patch
new file mode 100644 (file)
index 0000000..258f03c
--- /dev/null
@@ -0,0 +1,234 @@
+From 1a92a719b15ed17e57999e009bc0fb4cf94ef468 Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Tue, 8 Nov 2016 11:13:06 +0100
+Subject: [PATCH 11/28] convert savevm-async to threads
+
+---
+ savevm-async.c | 144 +++++++++++++++++++++++++++++++++++----------------------
+ 1 file changed, 88 insertions(+), 56 deletions(-)
+
+diff --git a/savevm-async.c b/savevm-async.c
+index 2f4766cf6c..624e3a34b4 100644
+--- a/savevm-async.c
++++ b/savevm-async.c
+@@ -48,6 +48,8 @@ static struct SnapshotState {
+     int saved_vm_running;
+     QEMUFile *file;
+     int64_t total_time;
++    QEMUBH *cleanup_bh;
++    QemuThread thread;
+ } snap_state;
+ SaveVMInfo *qmp_query_savevm(Error **errp)
+@@ -135,19 +137,6 @@ static void save_snapshot_error(const char *fmt, ...)
+     g_free (msg);
+     snap_state.state = SAVE_STATE_ERROR;
+-
+-    save_snapshot_cleanup();
+-}
+-
+-static void save_snapshot_completed(void)
+-{
+-    DPRINTF("save_snapshot_completed\n");
+-
+-    if (save_snapshot_cleanup() < 0) {
+-        snap_state.state = SAVE_STATE_ERROR;
+-    } else {
+-        snap_state.state = SAVE_STATE_COMPLETED;
+-    }
+ }
+ static int block_state_close(void *opaque)
+@@ -156,51 +145,90 @@ static int block_state_close(void *opaque)
+     return blk_flush(snap_state.target);
+ }
++typedef struct BlkRwCo {
++    int64_t offset;
++    QEMUIOVector *qiov;
++    int ret;
++} BlkRwCo;
++
++static void block_state_write_entry(void *opaque) {
++    BlkRwCo *rwco = opaque;
++    rwco->ret = blk_co_pwritev(snap_state.target, rwco->offset, rwco->qiov->size,
++                               rwco->qiov, 0);
++}
++
+ static ssize_t block_state_writev_buffer(void *opaque, struct iovec *iov,
+                                          int iovcnt, int64_t pos)
+ {
+-    int ret;
+     QEMUIOVector qiov;
++    AioContext *aio_context;
++    Coroutine *co;
++    BlkRwCo rwco;
++
++    assert(pos == snap_state.bs_pos);
++    rwco = (BlkRwCo) {
++        .offset = pos,
++        .qiov = &qiov,
++        .ret = NOT_DONE,
++    };
+     qemu_iovec_init_external(&qiov, iov, iovcnt);
+-    ret = blk_co_pwritev(snap_state.target, pos, qiov.size, &qiov, 0);
+-    if (ret < 0) {
+-        return ret;
++
++    aio_context = blk_get_aio_context(snap_state.target);
++    aio_context_acquire(aio_context);
++    co = qemu_coroutine_create(&block_state_write_entry, &rwco);
++    qemu_coroutine_enter(co);
++    while (rwco.ret == NOT_DONE) {
++        aio_poll(aio_context, true);
+     }
++    aio_context_release(aio_context);
++
+     snap_state.bs_pos += qiov.size;
+     return qiov.size;
+ }
+-static int store_and_stop(void) {
+-    if (global_state_store()) {
+-        save_snapshot_error("Error saving global state");
+-        return 1;
++static void process_savevm_cleanup(void *opaque)
++{
++    int ret;
++    qemu_bh_delete(snap_state.cleanup_bh);
++    snap_state.cleanup_bh = NULL;
++    qemu_mutex_unlock_iothread();
++    qemu_thread_join(&snap_state.thread);
++    qemu_mutex_lock_iothread();
++    ret = save_snapshot_cleanup();
++    if (ret < 0) {
++        save_snapshot_error("save_snapshot_cleanup error %d", ret);
++    } else if (snap_state.state == SAVE_STATE_ACTIVE) {
++        snap_state.state = SAVE_STATE_COMPLETED;
++    } else {
++        save_snapshot_error("process_savevm_cleanup: invalid state: %d",
++                            snap_state.state);
+     }
+-    if (runstate_is_running()) {
+-        vm_stop(RUN_STATE_SAVE_VM);
++    if (snap_state.saved_vm_running) {
++        vm_start();
++        snap_state.saved_vm_running = false;
+     }
+-    return 0;
+ }
+-static void process_savevm_co(void *opaque)
++static void *process_savevm_thread(void *opaque)
+ {
+     int ret;
+     int64_t maxlen;
++
+     MigrationParams params = {
+         .blk = 0,
+         .shared = 0
+     };
+-    snap_state.state = SAVE_STATE_ACTIVE;
++    rcu_register_thread();
+-    qemu_mutex_unlock_iothread();
+     qemu_savevm_state_header(snap_state.file);
+     ret = qemu_savevm_state_begin(snap_state.file, &params);
+-    qemu_mutex_lock_iothread();
+     if (ret < 0) {
+         save_snapshot_error("qemu_savevm_state_begin failed");
+-        return;
++        rcu_unregister_thread();
++        return NULL;
+     }
+     while (snap_state.state == SAVE_STATE_ACTIVE) {
+@@ -209,41 +237,43 @@ static void process_savevm_co(void *opaque)
+         qemu_savevm_state_pending(snap_state.file, 0, &pend_nonpost, &pend_post);
+         pending_size = pend_post + pend_nonpost;
+-        if (pending_size) {
+-                ret = qemu_savevm_state_iterate(snap_state.file, false);
+-                if (ret < 0) {
+-                    save_snapshot_error("qemu_savevm_state_iterate error %d", ret);
+-                    break;
+-                }
+-                DPRINTF("savevm inerate pending size %lu ret %d\n", pending_size, ret);
++        maxlen = blk_getlength(snap_state.target) - 30*1024*1024;
++
++        if (pending_size > 400000 && snap_state.bs_pos + pending_size < maxlen) {
++            qemu_mutex_lock_iothread();
++            ret = qemu_savevm_state_iterate(snap_state.file, false);
++            if (ret < 0) {
++                save_snapshot_error("qemu_savevm_state_iterate error %d", ret);
++                break;
++            }
++            qemu_mutex_unlock_iothread();
++            DPRINTF("savevm inerate pending size %lu ret %d\n", pending_size, ret);
+         } else {
+-            DPRINTF("done iterating\n");
+-            if (store_and_stop())
++            qemu_mutex_lock_iothread();
++            qemu_system_wakeup_request(QEMU_WAKEUP_REASON_OTHER);
++            ret = global_state_store();
++            if (ret) {
++                save_snapshot_error("global_state_store error %d", ret);
+                 break;
++            }
++            ret = vm_stop_force_state(RUN_STATE_FINISH_MIGRATE);
++            if (ret < 0) {
++                save_snapshot_error("vm_stop_force_state error %d", ret);
++                break;
++            }
+             DPRINTF("savevm inerate finished\n");
+             qemu_savevm_state_complete_precopy(snap_state.file, false);
++            qemu_savevm_state_cleanup();
+             DPRINTF("save complete\n");
+-            save_snapshot_completed();
+             break;
+         }
+-
+-        /* stop the VM if we get to the end of available space,
+-         * or if pending_size is just a few MB
+-         */
+-        maxlen = blk_getlength(snap_state.target) - 30*1024*1024;
+-        if ((pending_size < 100000) ||
+-            ((snap_state.bs_pos + pending_size) >= maxlen)) {
+-            if (store_and_stop())
+-                break;
+-        }
+     }
+-    if(snap_state.state == SAVE_STATE_CANCELLED) {
+-        save_snapshot_completed();
+-        Error *errp = NULL;
+-        qmp_savevm_end(&errp);
+-    }
++    qemu_bh_schedule(snap_state.cleanup_bh);
++    qemu_mutex_unlock_iothread();
++    rcu_unregister_thread();
++    return NULL;
+ }
+ static const QEMUFileOps block_file_ops = {
+@@ -306,8 +336,10 @@ void qmp_savevm_start(bool has_statefile, const char *statefile, Error **errp)
+     error_setg(&snap_state.blocker, "block device is in use by savevm");
+     blk_op_block_all(snap_state.target, snap_state.blocker);
+-    Coroutine *co = qemu_coroutine_create(process_savevm_co, NULL);
+-    qemu_coroutine_enter(co);
++    snap_state.state = SAVE_STATE_ACTIVE;
++    snap_state.cleanup_bh = qemu_bh_new(process_savevm_cleanup, &snap_state);
++    qemu_thread_create(&snap_state.thread, "savevm-async", process_savevm_thread,
++                       NULL, QEMU_THREAD_JOINABLE);
+     return;
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0011-introduce-new-vma-archive-format.patch b/debian/patches/pve/0011-introduce-new-vma-archive-format.patch
deleted file mode 100644 (file)
index 2ec06b7..0000000
+++ /dev/null
@@ -1,2480 +0,0 @@
-From df49dfac906aaf99e0c006ce61f8457f031f2f5c Mon Sep 17 00:00:00 2001
-From: Dietmar Maurer <dietmar@proxmox.com>
-Date: Tue, 13 Nov 2012 11:11:38 +0100
-Subject: [PATCH 11/49] introduce new vma archive format
-
-This is a very simple archive format, see docs/specs/vma_spec.txt
-
-Signed-off-by: Dietmar Maurer <dietmar@proxmox.com>
----
- Makefile      |   3 +-
- Makefile.objs |   1 +
- vma-reader.c  | 797 +++++++++++++++++++++++++++++++++++++++++++++++++++++
- vma-writer.c  | 870 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- vma.c         | 586 +++++++++++++++++++++++++++++++++++++++
- vma.h         | 146 ++++++++++
- 6 files changed, 2402 insertions(+), 1 deletion(-)
- create mode 100644 vma-reader.c
- create mode 100644 vma-writer.c
- create mode 100644 vma.c
- create mode 100644 vma.h
-
-diff --git a/Makefile b/Makefile
-index 6c359b2f86..edbc8b50f0 100644
---- a/Makefile
-+++ b/Makefile
-@@ -284,7 +284,7 @@ ifneq ($(wildcard config-host.mak),)
- include $(SRC_PATH)/tests/Makefile.include
- endif
--all: $(DOCS) $(TOOLS) $(HELPERS-y) recurse-all modules
-+all: $(DOCS) $(TOOLS) vma$(EXESUF) $(HELPERS-y) recurse-all modules
- qemu-version.h: FORCE
-       $(call quiet-command, \
-@@ -377,6 +377,7 @@ qemu-img.o: qemu-img-cmds.h
- qemu-img$(EXESUF): qemu-img.o $(block-obj-y) $(crypto-obj-y) $(io-obj-y) $(qom-obj-y) $(COMMON_LDADDS)
- qemu-nbd$(EXESUF): qemu-nbd.o $(block-obj-y) $(crypto-obj-y) $(io-obj-y) $(qom-obj-y) $(COMMON_LDADDS)
- qemu-io$(EXESUF): qemu-io.o $(block-obj-y) $(crypto-obj-y) $(io-obj-y) $(qom-obj-y) $(COMMON_LDADDS)
-+vma$(EXESUF): vma.o vma-reader.o $(block-obj-y) $(crypto-obj-y) $(io-obj-y) $(qom-obj-y) $(COMMON_LDADDS)
- qemu-bridge-helper$(EXESUF): qemu-bridge-helper.o $(COMMON_LDADDS)
-diff --git a/Makefile.objs b/Makefile.objs
-index 6167e7b17d..9b12ee6afa 100644
---- a/Makefile.objs
-+++ b/Makefile.objs
-@@ -14,6 +14,7 @@ block-obj-y += block.o blockjob.o
- block-obj-y += block/
- block-obj-y += qemu-io-cmds.o
- block-obj-$(CONFIG_REPLICATION) += replication.o
-+block-obj-y += vma-writer.o
- block-obj-m = block/
-diff --git a/vma-reader.c b/vma-reader.c
-new file mode 100644
-index 0000000000..51dd8fee0e
---- /dev/null
-+++ b/vma-reader.c
-@@ -0,0 +1,797 @@
-+/*
-+ * VMA: Virtual Machine Archive
-+ *
-+ * Copyright (C) 2012 Proxmox Server Solutions
-+ *
-+ * Authors:
-+ *  Dietmar Maurer (dietmar@proxmox.com)
-+ *
-+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
-+ * See the COPYING file in the top-level directory.
-+ *
-+ */
-+
-+#include "qemu/osdep.h"
-+#include <glib.h>
-+#include <uuid/uuid.h>
-+
-+#include "qemu-common.h"
-+#include "qemu/timer.h"
-+#include "qemu/ratelimit.h"
-+#include "vma.h"
-+#include "block/block.h"
-+#include "sysemu/block-backend.h"
-+
-+static unsigned char zero_vma_block[VMA_BLOCK_SIZE];
-+
-+typedef struct VmaRestoreState {
-+    BlockDriverState *bs;
-+    bool write_zeroes;
-+    unsigned long *bitmap;
-+    int bitmap_size;
-+}  VmaRestoreState;
-+
-+struct VmaReader {
-+    int fd;
-+    GChecksum *md5csum;
-+    GHashTable *blob_hash;
-+    unsigned char *head_data;
-+    VmaDeviceInfo devinfo[256];
-+    VmaRestoreState rstate[256];
-+    GList *cdata_list;
-+    guint8 vmstate_stream;
-+    uint32_t vmstate_clusters;
-+    /* to show restore percentage if run with -v */
-+    time_t start_time;
-+    int64_t cluster_count;
-+    int64_t clusters_read;
-+    int clusters_read_per;
-+};
-+
-+static guint
-+g_int32_hash(gconstpointer v)
-+{
-+    return *(const uint32_t *)v;
-+}
-+
-+static gboolean
-+g_int32_equal(gconstpointer v1, gconstpointer v2)
-+{
-+    return *((const uint32_t *)v1) == *((const uint32_t *)v2);
-+}
-+
-+static int vma_reader_get_bitmap(VmaRestoreState *rstate, int64_t cluster_num)
-+{
-+    assert(rstate);
-+    assert(rstate->bitmap);
-+
-+    unsigned long val, idx, bit;
-+
-+    idx = cluster_num / BITS_PER_LONG;
-+
-+    assert(rstate->bitmap_size > idx);
-+
-+    bit = cluster_num % BITS_PER_LONG;
-+    val = rstate->bitmap[idx];
-+
-+    return !!(val & (1UL << bit));
-+}
-+
-+static void vma_reader_set_bitmap(VmaRestoreState *rstate, int64_t cluster_num,
-+                                  int dirty)
-+{
-+    assert(rstate);
-+    assert(rstate->bitmap);
-+
-+    unsigned long val, idx, bit;
-+
-+    idx = cluster_num / BITS_PER_LONG;
-+
-+    assert(rstate->bitmap_size > idx);
-+
-+    bit = cluster_num % BITS_PER_LONG;
-+    val = rstate->bitmap[idx];
-+    if (dirty) {
-+        if (!(val & (1UL << bit))) {
-+            val |= 1UL << bit;
-+        }
-+    } else {
-+        if (val & (1UL << bit)) {
-+            val &= ~(1UL << bit);
-+        }
-+    }
-+    rstate->bitmap[idx] = val;
-+}
-+
-+typedef struct VmaBlob {
-+    uint32_t start;
-+    uint32_t len;
-+    void *data;
-+} VmaBlob;
-+
-+static const VmaBlob *get_header_blob(VmaReader *vmar, uint32_t pos)
-+{
-+    assert(vmar);
-+    assert(vmar->blob_hash);
-+
-+    return g_hash_table_lookup(vmar->blob_hash, &pos);
-+}
-+
-+static const char *get_header_str(VmaReader *vmar, uint32_t pos)
-+{
-+    const VmaBlob *blob = get_header_blob(vmar, pos);
-+    if (!blob) {
-+        return NULL;
-+    }
-+    const char *res = (char *)blob->data;
-+    if (res[blob->len-1] != '\0') {
-+        return NULL;
-+    }
-+    return res;
-+}
-+
-+static ssize_t
-+safe_read(int fd, unsigned char *buf, size_t count)
-+{
-+    ssize_t n;
-+
-+    do {
-+        n = read(fd, buf, count);
-+    } while (n < 0 && errno == EINTR);
-+
-+    return n;
-+}
-+
-+static ssize_t
-+full_read(int fd, unsigned char *buf, size_t len)
-+{
-+    ssize_t n;
-+    size_t total;
-+
-+    total = 0;
-+
-+    while (len > 0) {
-+        n = safe_read(fd, buf, len);
-+
-+        if (n == 0) {
-+            return total;
-+        }
-+
-+        if (n <= 0) {
-+            break;
-+        }
-+
-+        buf += n;
-+        total += n;
-+        len -= n;
-+    }
-+
-+    if (len) {
-+        return -1;
-+    }
-+
-+    return total;
-+}
-+
-+void vma_reader_destroy(VmaReader *vmar)
-+{
-+    assert(vmar);
-+
-+    if (vmar->fd >= 0) {
-+        close(vmar->fd);
-+    }
-+
-+    if (vmar->cdata_list) {
-+        g_list_free(vmar->cdata_list);
-+    }
-+
-+    int i;
-+    for (i = 1; i < 256; i++) {
-+        if (vmar->rstate[i].bitmap) {
-+            g_free(vmar->rstate[i].bitmap);
-+        }
-+    }
-+
-+    if (vmar->md5csum) {
-+        g_checksum_free(vmar->md5csum);
-+    }
-+
-+    if (vmar->blob_hash) {
-+        g_hash_table_destroy(vmar->blob_hash);
-+    }
-+
-+    if (vmar->head_data) {
-+        g_free(vmar->head_data);
-+    }
-+
-+    g_free(vmar);
-+
-+};
-+
-+static int vma_reader_read_head(VmaReader *vmar, Error **errp)
-+{
-+    assert(vmar);
-+    assert(errp);
-+    assert(*errp == NULL);
-+
-+    unsigned char md5sum[16];
-+    int i;
-+    int ret = 0;
-+
-+    vmar->head_data = g_malloc(sizeof(VmaHeader));
-+
-+    if (full_read(vmar->fd, vmar->head_data, sizeof(VmaHeader)) !=
-+        sizeof(VmaHeader)) {
-+        error_setg(errp, "can't read vma header - %s",
-+                   errno ? g_strerror(errno) : "got EOF");
-+        return -1;
-+    }
-+
-+    VmaHeader *h = (VmaHeader *)vmar->head_data;
-+
-+    if (h->magic != VMA_MAGIC) {
-+        error_setg(errp, "not a vma file - wrong magic number");
-+        return -1;
-+    }
-+
-+    uint32_t header_size = GUINT32_FROM_BE(h->header_size);
-+    int need = header_size - sizeof(VmaHeader);
-+    if (need <= 0) {
-+        error_setg(errp, "wrong vma header size %d", header_size);
-+        return -1;
-+    }
-+
-+    vmar->head_data = g_realloc(vmar->head_data, header_size);
-+    h = (VmaHeader *)vmar->head_data;
-+
-+    if (full_read(vmar->fd, vmar->head_data + sizeof(VmaHeader), need) !=
-+        need) {
-+        error_setg(errp, "can't read vma header data - %s",
-+                   errno ? g_strerror(errno) : "got EOF");
-+        return -1;
-+    }
-+
-+    memcpy(md5sum, h->md5sum, 16);
-+    memset(h->md5sum, 0, 16);
-+
-+    g_checksum_reset(vmar->md5csum);
-+    g_checksum_update(vmar->md5csum, vmar->head_data, header_size);
-+    gsize csize = 16;
-+    g_checksum_get_digest(vmar->md5csum, (guint8 *)(h->md5sum), &csize);
-+
-+    if (memcmp(md5sum, h->md5sum, 16) != 0) {
-+        error_setg(errp, "wrong vma header chechsum");
-+        return -1;
-+    }
-+
-+    /* we can modify header data after checksum verify */
-+    h->header_size = header_size;
-+
-+    h->version = GUINT32_FROM_BE(h->version);
-+    if (h->version != 1) {
-+        error_setg(errp, "wrong vma version %d", h->version);
-+        return -1;
-+    }
-+
-+    h->ctime = GUINT64_FROM_BE(h->ctime);
-+    h->blob_buffer_offset = GUINT32_FROM_BE(h->blob_buffer_offset);
-+    h->blob_buffer_size = GUINT32_FROM_BE(h->blob_buffer_size);
-+
-+    uint32_t bstart = h->blob_buffer_offset + 1;
-+    uint32_t bend = h->blob_buffer_offset + h->blob_buffer_size;
-+
-+    if (bstart <= sizeof(VmaHeader)) {
-+        error_setg(errp, "wrong vma blob buffer offset %d",
-+                   h->blob_buffer_offset);
-+        return -1;
-+    }
-+
-+    if (bend > header_size) {
-+        error_setg(errp, "wrong vma blob buffer size %d/%d",
-+                   h->blob_buffer_offset, h->blob_buffer_size);
-+        return -1;
-+    }
-+
-+    while ((bstart + 2) <= bend) {
-+        uint32_t size = vmar->head_data[bstart] +
-+            (vmar->head_data[bstart+1] << 8);
-+        if ((bstart + size + 2) <= bend) {
-+            VmaBlob *blob = g_new0(VmaBlob, 1);
-+            blob->start = bstart - h->blob_buffer_offset;
-+            blob->len = size;
-+            blob->data = vmar->head_data + bstart + 2;
-+            g_hash_table_insert(vmar->blob_hash, &blob->start, blob);
-+        }
-+        bstart += size + 2;
-+    }
-+
-+
-+    int count = 0;
-+    for (i = 1; i < 256; i++) {
-+        VmaDeviceInfoHeader *dih = &h->dev_info[i];
-+        uint32_t devname_ptr = GUINT32_FROM_BE(dih->devname_ptr);
-+        uint64_t size = GUINT64_FROM_BE(dih->size);
-+        const char *devname =  get_header_str(vmar, devname_ptr);
-+
-+        if (size && devname) {
-+            count++;
-+            vmar->devinfo[i].size = size;
-+            vmar->devinfo[i].devname = devname;
-+
-+            if (strcmp(devname, "vmstate") == 0) {
-+                vmar->vmstate_stream = i;
-+            }
-+        }
-+    }
-+
-+    if (!count) {
-+        error_setg(errp, "vma does not contain data");
-+        return -1;
-+    }
-+
-+    for (i = 0; i < VMA_MAX_CONFIGS; i++) {
-+        uint32_t name_ptr = GUINT32_FROM_BE(h->config_names[i]);
-+        uint32_t data_ptr = GUINT32_FROM_BE(h->config_data[i]);
-+
-+        if (!(name_ptr && data_ptr)) {
-+            continue;
-+        }
-+        const char *name =  get_header_str(vmar, name_ptr);
-+        const VmaBlob *blob = get_header_blob(vmar, data_ptr);
-+
-+        if (!(name && blob)) {
-+            error_setg(errp, "vma contains invalid data pointers");
-+            return -1;
-+        }
-+
-+        VmaConfigData *cdata = g_new0(VmaConfigData, 1);
-+        cdata->name = name;
-+        cdata->data = blob->data;
-+        cdata->len = blob->len;
-+
-+        vmar->cdata_list = g_list_append(vmar->cdata_list, cdata);
-+    }
-+
-+    return ret;
-+};
-+
-+VmaReader *vma_reader_create(const char *filename, Error **errp)
-+{
-+    assert(filename);
-+    assert(errp);
-+
-+    VmaReader *vmar = g_new0(VmaReader, 1);
-+
-+    if (strcmp(filename, "-") == 0) {
-+        vmar->fd = dup(0);
-+    } else {
-+        vmar->fd = open(filename, O_RDONLY);
-+    }
-+
-+    if (vmar->fd < 0) {
-+        error_setg(errp, "can't open file %s - %s\n", filename,
-+                   g_strerror(errno));
-+        goto err;
-+    }
-+
-+    vmar->md5csum = g_checksum_new(G_CHECKSUM_MD5);
-+    if (!vmar->md5csum) {
-+        error_setg(errp, "can't allocate cmsum\n");
-+        goto err;
-+    }
-+
-+    vmar->blob_hash = g_hash_table_new_full(g_int32_hash, g_int32_equal,
-+                                            NULL, g_free);
-+
-+    if (vma_reader_read_head(vmar, errp) < 0) {
-+        goto err;
-+    }
-+
-+    return vmar;
-+
-+err:
-+    if (vmar) {
-+        vma_reader_destroy(vmar);
-+    }
-+
-+    return NULL;
-+}
-+
-+VmaHeader *vma_reader_get_header(VmaReader *vmar)
-+{
-+    assert(vmar);
-+    assert(vmar->head_data);
-+
-+    return (VmaHeader *)(vmar->head_data);
-+}
-+
-+GList *vma_reader_get_config_data(VmaReader *vmar)
-+{
-+    assert(vmar);
-+    assert(vmar->head_data);
-+
-+    return vmar->cdata_list;
-+}
-+
-+VmaDeviceInfo *vma_reader_get_device_info(VmaReader *vmar, guint8 dev_id)
-+{
-+    assert(vmar);
-+    assert(dev_id);
-+
-+    if (vmar->devinfo[dev_id].size && vmar->devinfo[dev_id].devname) {
-+        return &vmar->devinfo[dev_id];
-+    }
-+
-+    return NULL;
-+}
-+
-+int vma_reader_register_bs(VmaReader *vmar, guint8 dev_id, BlockDriverState *bs,
-+                           bool write_zeroes, Error **errp)
-+{
-+    assert(vmar);
-+    assert(bs != NULL);
-+    assert(dev_id);
-+    assert(vmar->rstate[dev_id].bs == NULL);
-+
-+    int64_t size = bdrv_getlength(bs);
-+    int64_t size_diff = size - vmar->devinfo[dev_id].size;
-+
-+    /* storage types can have different size restrictions, so it
-+     * is not always possible to create an image with exact size.
-+     * So we tolerate a size difference up to 4MB.
-+     */
-+    if ((size_diff < 0) || (size_diff > 4*1024*1024)) {
-+        error_setg(errp, "vma_reader_register_bs for stream %s failed - "
-+                   "unexpected size %zd != %zd", vmar->devinfo[dev_id].devname,
-+                   size, vmar->devinfo[dev_id].size);
-+        return -1;
-+    }
-+
-+    vmar->rstate[dev_id].bs = bs;
-+    vmar->rstate[dev_id].write_zeroes = write_zeroes;
-+
-+    int64_t bitmap_size = (size/BDRV_SECTOR_SIZE) +
-+        (VMA_CLUSTER_SIZE/BDRV_SECTOR_SIZE) * BITS_PER_LONG - 1;
-+    bitmap_size /= (VMA_CLUSTER_SIZE/BDRV_SECTOR_SIZE) * BITS_PER_LONG;
-+
-+    vmar->rstate[dev_id].bitmap_size = bitmap_size;
-+    vmar->rstate[dev_id].bitmap = g_new0(unsigned long, bitmap_size);
-+
-+    vmar->cluster_count += size/VMA_CLUSTER_SIZE;
-+
-+    return 0;
-+}
-+
-+static ssize_t safe_write(int fd, void *buf, size_t count)
-+{
-+    ssize_t n;
-+
-+    do {
-+        n = write(fd, buf, count);
-+    } while (n < 0 && errno == EINTR);
-+
-+    return n;
-+}
-+
-+static size_t full_write(int fd, void *buf, size_t len)
-+{
-+    ssize_t n;
-+    size_t total;
-+
-+    total = 0;
-+
-+    while (len > 0) {
-+        n = safe_write(fd, buf, len);
-+        if (n < 0) {
-+            return n;
-+        }
-+        buf += n;
-+        total += n;
-+        len -= n;
-+    }
-+
-+    if (len) {
-+        /* incomplete write ? */
-+        return -1;
-+    }
-+
-+    return total;
-+}
-+
-+static int restore_write_data(VmaReader *vmar, guint8 dev_id,
-+                              BlockDriverState *bs, int vmstate_fd,
-+                              unsigned char *buf, int64_t sector_num,
-+                              int nb_sectors, Error **errp)
-+{
-+    assert(vmar);
-+
-+    if (dev_id == vmar->vmstate_stream) {
-+        if (vmstate_fd >= 0) {
-+            int len = nb_sectors * BDRV_SECTOR_SIZE;
-+            int res = full_write(vmstate_fd, buf, len);
-+            if (res < 0) {
-+                error_setg(errp, "write vmstate failed %d", res);
-+                return -1;
-+            }
-+        }
-+    } else {
-+        int res = bdrv_write(bs, sector_num, buf, nb_sectors);
-+        if (res < 0) {
-+            error_setg(errp, "bdrv_write to %s failed (%d)",
-+                       bdrv_get_device_name(bs), res);
-+            return -1;
-+        }
-+    }
-+    return 0;
-+}
-+static int restore_extent(VmaReader *vmar, unsigned char *buf,
-+                          int extent_size, int vmstate_fd,
-+                          bool verbose, Error **errp)
-+{
-+    assert(vmar);
-+    assert(buf);
-+
-+    VmaExtentHeader *ehead = (VmaExtentHeader *)buf;
-+    int start = VMA_EXTENT_HEADER_SIZE;
-+    int i;
-+
-+    for (i = 0; i < VMA_BLOCKS_PER_EXTENT; i++) {
-+        uint64_t block_info = GUINT64_FROM_BE(ehead->blockinfo[i]);
-+        uint64_t cluster_num = block_info & 0xffffffff;
-+        uint8_t dev_id = (block_info >> 32) & 0xff;
-+        uint16_t mask = block_info >> (32+16);
-+        int64_t max_sector;
-+
-+        if (!dev_id) {
-+            continue;
-+        }
-+
-+        VmaRestoreState *rstate = &vmar->rstate[dev_id];
-+        BlockDriverState *bs = NULL;
-+
-+        if (dev_id != vmar->vmstate_stream) {
-+            bs = rstate->bs;
-+            if (!bs) {
-+                error_setg(errp, "got wrong dev id %d", dev_id);
-+                return -1;
-+            }
-+
-+            if (vma_reader_get_bitmap(rstate, cluster_num)) {
-+                error_setg(errp, "found duplicated cluster %zd for stream %s",
-+                          cluster_num, vmar->devinfo[dev_id].devname);
-+                return -1;
-+            }
-+            vma_reader_set_bitmap(rstate, cluster_num, 1);
-+
-+            max_sector = vmar->devinfo[dev_id].size/BDRV_SECTOR_SIZE;
-+        } else {
-+            max_sector = G_MAXINT64;
-+            if (cluster_num != vmar->vmstate_clusters) {
-+                error_setg(errp, "found out of order vmstate data");
-+                return -1;
-+            }
-+            vmar->vmstate_clusters++;
-+        }
-+
-+        vmar->clusters_read++;
-+
-+        if (verbose) {
-+            time_t duration = time(NULL) - vmar->start_time;
-+            int percent = (vmar->clusters_read*100)/vmar->cluster_count;
-+            if (percent != vmar->clusters_read_per) {
-+                printf("progress %d%% (read %zd bytes, duration %zd sec)\n",
-+                       percent, vmar->clusters_read*VMA_CLUSTER_SIZE,
-+                       duration);
-+                fflush(stdout);
-+                vmar->clusters_read_per = percent;
-+            }
-+        }
-+
-+        /* try to write whole clusters to speedup restore */
-+        if (mask == 0xffff) {
-+            if ((start + VMA_CLUSTER_SIZE) > extent_size) {
-+                error_setg(errp, "short vma extent - too many blocks");
-+                return -1;
-+            }
-+            int64_t sector_num = (cluster_num * VMA_CLUSTER_SIZE) /
-+                BDRV_SECTOR_SIZE;
-+            int64_t end_sector = sector_num +
-+                VMA_CLUSTER_SIZE/BDRV_SECTOR_SIZE;
-+
-+            if (end_sector > max_sector) {
-+                end_sector = max_sector;
-+            }
-+
-+            if (end_sector <= sector_num) {
-+                error_setg(errp, "got wrong block address - write bejond end");
-+                return -1;
-+            }
-+
-+            int nb_sectors = end_sector - sector_num;
-+            if (restore_write_data(vmar, dev_id, bs, vmstate_fd, buf + start,
-+                                   sector_num, nb_sectors, errp) < 0) {
-+                return -1;
-+            }
-+
-+            start += VMA_CLUSTER_SIZE;
-+        } else {
-+            int j;
-+            int bit = 1;
-+
-+            for (j = 0; j < 16; j++) {
-+                int64_t sector_num = (cluster_num*VMA_CLUSTER_SIZE +
-+                                      j*VMA_BLOCK_SIZE)/BDRV_SECTOR_SIZE;
-+
-+                int64_t end_sector = sector_num +
-+                    VMA_BLOCK_SIZE/BDRV_SECTOR_SIZE;
-+                if (end_sector > max_sector) {
-+                    end_sector = max_sector;
-+                }
-+
-+                if (mask & bit) {
-+                    if ((start + VMA_BLOCK_SIZE) > extent_size) {
-+                        error_setg(errp, "short vma extent - too many blocks");
-+                        return -1;
-+                    }
-+
-+                    if (end_sector <= sector_num) {
-+                        error_setg(errp, "got wrong block address - "
-+                                   "write bejond end");
-+                        return -1;
-+                    }
-+
-+                    int nb_sectors = end_sector - sector_num;
-+                    if (restore_write_data(vmar, dev_id, bs, vmstate_fd,
-+                                           buf + start, sector_num,
-+                                           nb_sectors, errp) < 0) {
-+                        return -1;
-+                    }
-+
-+                    start += VMA_BLOCK_SIZE;
-+
-+                } else {
-+
-+                    if (rstate->write_zeroes && (end_sector > sector_num)) {
-+                        /* Todo: use bdrv_co_write_zeroes (but that need to
-+                         * be run inside coroutine?)
-+                         */
-+                        int nb_sectors = end_sector - sector_num;
-+                        if (restore_write_data(vmar, dev_id, bs, vmstate_fd,
-+                                              zero_vma_block, sector_num,
-+                                               nb_sectors, errp) < 0) {
-+                            return -1;
-+                        }
-+                    }
-+                }
-+
-+                bit = bit << 1;
-+            }
-+        }
-+    }
-+
-+    if (start != extent_size) {
-+        error_setg(errp, "vma extent error - missing blocks");
-+        return -1;
-+    }
-+
-+    return 0;
-+}
-+
-+int vma_reader_restore(VmaReader *vmar, int vmstate_fd, bool verbose,
-+                       Error **errp)
-+{
-+    assert(vmar);
-+    assert(vmar->head_data);
-+
-+    int ret = 0;
-+    unsigned char buf[VMA_MAX_EXTENT_SIZE];
-+    int buf_pos = 0;
-+    unsigned char md5sum[16];
-+    VmaHeader *h = (VmaHeader *)vmar->head_data;
-+
-+    vmar->start_time = time(NULL);
-+
-+    while (1) {
-+        int bytes = full_read(vmar->fd, buf + buf_pos, sizeof(buf) - buf_pos);
-+        if (bytes < 0) {
-+            error_setg(errp, "read failed - %s", g_strerror(errno));
-+            return -1;
-+        }
-+
-+        buf_pos += bytes;
-+
-+        if (!buf_pos) {
-+            break; /* EOF */
-+        }
-+
-+        if (buf_pos < VMA_EXTENT_HEADER_SIZE) {
-+            error_setg(errp, "read short extent (%d bytes)", buf_pos);
-+            return -1;
-+        }
-+
-+        VmaExtentHeader *ehead = (VmaExtentHeader *)buf;
-+
-+        /* extract md5sum */
-+        memcpy(md5sum, ehead->md5sum, sizeof(ehead->md5sum));
-+        memset(ehead->md5sum, 0, sizeof(ehead->md5sum));
-+
-+        g_checksum_reset(vmar->md5csum);
-+        g_checksum_update(vmar->md5csum, buf, VMA_EXTENT_HEADER_SIZE);
-+        gsize csize = 16;
-+        g_checksum_get_digest(vmar->md5csum, ehead->md5sum, &csize);
-+
-+        if (memcmp(md5sum, ehead->md5sum, 16) != 0) {
-+            error_setg(errp, "wrong vma extent header chechsum");
-+            return -1;
-+        }
-+
-+        if (memcmp(h->uuid, ehead->uuid, sizeof(ehead->uuid)) != 0) {
-+            error_setg(errp, "wrong vma extent uuid");
-+            return -1;
-+        }
-+
-+        if (ehead->magic != VMA_EXTENT_MAGIC || ehead->reserved1 != 0) {
-+            error_setg(errp, "wrong vma extent header magic");
-+            return -1;
-+        }
-+
-+        int block_count = GUINT16_FROM_BE(ehead->block_count);
-+        int extent_size = VMA_EXTENT_HEADER_SIZE + block_count*VMA_BLOCK_SIZE;
-+
-+        if (buf_pos < extent_size) {
-+            error_setg(errp, "short vma extent (%d < %d)", buf_pos,
-+                       extent_size);
-+            return -1;
-+        }
-+
-+        if (restore_extent(vmar, buf, extent_size, vmstate_fd, verbose,
-+                           errp) < 0) {
-+            return -1;
-+        }
-+
-+        if (buf_pos > extent_size) {
-+            memmove(buf, buf + extent_size, buf_pos - extent_size);
-+            buf_pos = buf_pos - extent_size;
-+        } else {
-+            buf_pos = 0;
-+        }
-+    }
-+
-+    bdrv_drain_all();
-+
-+    int i;
-+    for (i = 1; i < 256; i++) {
-+        VmaRestoreState *rstate = &vmar->rstate[i];
-+        if (!rstate->bs) {
-+            continue;
-+        }
-+
-+        if (bdrv_flush(rstate->bs) < 0) {
-+            error_setg(errp, "vma bdrv_flush %s failed",
-+                       vmar->devinfo[i].devname);
-+            return -1;
-+        }
-+
-+        if (vmar->devinfo[i].size &&
-+            (strcmp(vmar->devinfo[i].devname, "vmstate") != 0)) {
-+            assert(rstate->bitmap);
-+
-+            int64_t cluster_num, end;
-+
-+            end = (vmar->devinfo[i].size + VMA_CLUSTER_SIZE - 1) /
-+                VMA_CLUSTER_SIZE;
-+
-+            for (cluster_num = 0; cluster_num < end; cluster_num++) {
-+                if (!vma_reader_get_bitmap(rstate, cluster_num)) {
-+                    error_setg(errp, "detected missing cluster %zd "
-+                               "for stream %s", cluster_num,
-+                               vmar->devinfo[i].devname);
-+                    return -1;
-+                }
-+            }
-+        }
-+    }
-+
-+    return ret;
-+}
-+
-diff --git a/vma-writer.c b/vma-writer.c
-new file mode 100644
-index 0000000000..b0cf529125
---- /dev/null
-+++ b/vma-writer.c
-@@ -0,0 +1,870 @@
-+/*
-+ * VMA: Virtual Machine Archive
-+ *
-+ * Copyright (C) 2012 Proxmox Server Solutions
-+ *
-+ * Authors:
-+ *  Dietmar Maurer (dietmar@proxmox.com)
-+ *
-+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
-+ * See the COPYING file in the top-level directory.
-+ *
-+ */
-+
-+#include "qemu/osdep.h"
-+#include <glib.h>
-+#include <uuid/uuid.h>
-+
-+#include "vma.h"
-+#include "block/block.h"
-+#include "monitor/monitor.h"
-+#include "qemu/main-loop.h"
-+#include "qemu/coroutine.h"
-+#include "qemu/cutils.h"
-+
-+#define DEBUG_VMA 0
-+
-+#define DPRINTF(fmt, ...)\
-+    do { if (DEBUG_VMA) { printf("vma: " fmt, ## __VA_ARGS__); } } while (0)
-+
-+#define WRITE_BUFFERS 5
-+
-+typedef struct VmaAIOCB VmaAIOCB;
-+struct VmaAIOCB {
-+    unsigned char buffer[VMA_MAX_EXTENT_SIZE];
-+    VmaWriter *vmaw;
-+    size_t bytes;
-+    Coroutine *co;
-+};
-+
-+struct VmaWriter {
-+    int fd;
-+    FILE *cmd;
-+    int status;
-+    char errmsg[8192];
-+    uuid_t uuid;
-+    bool header_written;
-+    bool closed;
-+
-+    /* we always write extents */
-+    unsigned char outbuf[VMA_MAX_EXTENT_SIZE];
-+    int outbuf_pos; /* in bytes */
-+    int outbuf_count; /* in VMA_BLOCKS */
-+    uint64_t outbuf_block_info[VMA_BLOCKS_PER_EXTENT];
-+
-+    VmaAIOCB *aiocbs[WRITE_BUFFERS];
-+    CoQueue wqueue;
-+
-+    GChecksum *md5csum;
-+    CoMutex writer_lock;
-+    CoMutex flush_lock;
-+    Coroutine *co_writer;
-+
-+    /* drive informations */
-+    VmaStreamInfo stream_info[256];
-+    guint stream_count;
-+
-+    guint8 vmstate_stream;
-+    uint32_t vmstate_clusters;
-+
-+    /* header blob table */
-+    char *header_blob_table;
-+    uint32_t header_blob_table_size;
-+    uint32_t header_blob_table_pos;
-+
-+    /* store for config blobs */
-+    uint32_t config_names[VMA_MAX_CONFIGS]; /* offset into blob_buffer table */
-+    uint32_t config_data[VMA_MAX_CONFIGS];  /* offset into blob_buffer table */
-+    uint32_t config_count;
-+};
-+
-+void vma_writer_set_error(VmaWriter *vmaw, const char *fmt, ...)
-+{
-+    va_list ap;
-+
-+    if (vmaw->status < 0) {
-+        return;
-+    }
-+
-+    vmaw->status = -1;
-+
-+    va_start(ap, fmt);
-+    g_vsnprintf(vmaw->errmsg, sizeof(vmaw->errmsg), fmt, ap);
-+    va_end(ap);
-+
-+    DPRINTF("vma_writer_set_error: %s\n", vmaw->errmsg);
-+}
-+
-+static uint32_t allocate_header_blob(VmaWriter *vmaw, const char *data,
-+                                     size_t len)
-+{
-+    if (len > 65535) {
-+        return 0;
-+    }
-+
-+    if (!vmaw->header_blob_table ||
-+        (vmaw->header_blob_table_size <
-+         (vmaw->header_blob_table_pos + len + 2))) {
-+        int newsize = vmaw->header_blob_table_size + ((len + 2 + 511)/512)*512;
-+
-+        vmaw->header_blob_table = g_realloc(vmaw->header_blob_table, newsize);
-+        memset(vmaw->header_blob_table + vmaw->header_blob_table_size,
-+               0, newsize - vmaw->header_blob_table_size);
-+        vmaw->header_blob_table_size = newsize;
-+    }
-+
-+    uint32_t cpos = vmaw->header_blob_table_pos;
-+    vmaw->header_blob_table[cpos] = len & 255;
-+    vmaw->header_blob_table[cpos+1] = (len >> 8) & 255;
-+    memcpy(vmaw->header_blob_table + cpos + 2, data, len);
-+    vmaw->header_blob_table_pos += len + 2;
-+    return cpos;
-+}
-+
-+static uint32_t allocate_header_string(VmaWriter *vmaw, const char *str)
-+{
-+    assert(vmaw);
-+
-+    size_t len = strlen(str) + 1;
-+
-+    return allocate_header_blob(vmaw, str, len);
-+}
-+
-+int vma_writer_add_config(VmaWriter *vmaw, const char *name, gpointer data,
-+                          gsize len)
-+{
-+    assert(vmaw);
-+    assert(!vmaw->header_written);
-+    assert(vmaw->config_count < VMA_MAX_CONFIGS);
-+    assert(name);
-+    assert(data);
-+    assert(len);
-+
-+    gchar *basename = g_path_get_basename(name);
-+    uint32_t name_ptr = allocate_header_string(vmaw, basename);
-+    g_free(basename);
-+
-+    if (!name_ptr) {
-+        return -1;
-+    }
-+
-+    uint32_t data_ptr = allocate_header_blob(vmaw, data, len);
-+    if (!data_ptr) {
-+        return -1;
-+    }
-+
-+    vmaw->config_names[vmaw->config_count] = name_ptr;
-+    vmaw->config_data[vmaw->config_count] = data_ptr;
-+
-+    vmaw->config_count++;
-+
-+    return 0;
-+}
-+
-+int vma_writer_register_stream(VmaWriter *vmaw, const char *devname,
-+                               size_t size)
-+{
-+    assert(vmaw);
-+    assert(devname);
-+    assert(!vmaw->status);
-+
-+    if (vmaw->header_written) {
-+        vma_writer_set_error(vmaw, "vma_writer_register_stream: header "
-+                             "already written");
-+        return -1;
-+    }
-+
-+    guint n = vmaw->stream_count + 1;
-+
-+    /* we can have dev_ids form 1 to 255 (0 reserved)
-+     * 255(-1) reseverd for safety
-+     */
-+    if (n > 254) {
-+        vma_writer_set_error(vmaw, "vma_writer_register_stream: "
-+                             "too many drives");
-+        return -1;
-+    }
-+
-+    if (size <= 0) {
-+        vma_writer_set_error(vmaw, "vma_writer_register_stream: "
-+                             "got strange size %zd", size);
-+        return -1;
-+    }
-+
-+    DPRINTF("vma_writer_register_stream %s %zu %d\n", devname, size, n);
-+
-+    vmaw->stream_info[n].devname = g_strdup(devname);
-+    vmaw->stream_info[n].size = size;
-+
-+    vmaw->stream_info[n].cluster_count = (size + VMA_CLUSTER_SIZE - 1) /
-+        VMA_CLUSTER_SIZE;
-+
-+    vmaw->stream_count = n;
-+
-+    if (strcmp(devname, "vmstate") == 0) {
-+        vmaw->vmstate_stream = n;
-+    }
-+
-+    return n;
-+}
-+
-+static void vma_co_continue_write(void *opaque)
-+{
-+    VmaWriter *vmaw = opaque;
-+
-+    DPRINTF("vma_co_continue_write\n");
-+    qemu_coroutine_enter(vmaw->co_writer);
-+}
-+
-+static ssize_t coroutine_fn
-+vma_co_write(VmaWriter *vmaw, const void *buf, size_t bytes)
-+{
-+    size_t done = 0;
-+    ssize_t ret;
-+
-+    /* atomic writes (we cannot interleave writes) */
-+    qemu_co_mutex_lock(&vmaw->writer_lock);
-+
-+    DPRINTF("vma_co_write enter %zd\n", bytes);
-+
-+    assert(vmaw->co_writer == NULL);
-+
-+    vmaw->co_writer = qemu_coroutine_self();
-+
-+    aio_set_fd_handler(qemu_get_aio_context(), vmaw->fd, false, NULL, vma_co_continue_write, vmaw);
-+
-+    DPRINTF("vma_co_write wait until writable\n");
-+    qemu_coroutine_yield();
-+    DPRINTF("vma_co_write starting %zd\n", bytes);
-+
-+    while (done < bytes) {
-+        ret = write(vmaw->fd, buf + done, bytes - done);
-+        if (ret > 0) {
-+            done += ret;
-+            DPRINTF("vma_co_write written %zd %zd\n", done, ret);
-+        } else if (ret < 0) {
-+            if (errno == EAGAIN || errno == EWOULDBLOCK) {
-+                DPRINTF("vma_co_write yield %zd\n", done);
-+                qemu_coroutine_yield();
-+                DPRINTF("vma_co_write restart %zd\n", done);
-+            } else {
-+                vma_writer_set_error(vmaw, "vma_co_write write error - %s",
-+                                     g_strerror(errno));
-+                done = -1; /* always return failure for partial writes */
-+                break;
-+            }
-+        } else if (ret == 0) {
-+            /* should not happen - simply try again */
-+        }
-+    }
-+
-+    aio_set_fd_handler(qemu_get_aio_context(), vmaw->fd, false, NULL, NULL, NULL);
-+
-+    vmaw->co_writer = NULL;
-+
-+    qemu_co_mutex_unlock(&vmaw->writer_lock);
-+
-+    DPRINTF("vma_co_write leave %zd\n", done);
-+    return done;
-+}
-+
-+static void coroutine_fn vma_co_writer_task(void *opaque)
-+{
-+    VmaAIOCB *cb = opaque;
-+
-+    DPRINTF("vma_co_writer_task start\n");
-+
-+    int64_t done = vma_co_write(cb->vmaw, cb->buffer, cb->bytes);
-+    DPRINTF("vma_co_writer_task write done %zd\n", done);
-+
-+    if (done != cb->bytes) {
-+        DPRINTF("vma_co_writer_task failed write %zd %zd", cb->bytes, done);
-+        vma_writer_set_error(cb->vmaw, "vma_co_writer_task failed write %zd",
-+                             done);
-+    }
-+
-+    cb->bytes = 0;
-+
-+    qemu_co_queue_next(&cb->vmaw->wqueue);
-+
-+    DPRINTF("vma_co_writer_task end\n");
-+}
-+
-+static void coroutine_fn vma_queue_flush(VmaWriter *vmaw)
-+{
-+    DPRINTF("vma_queue_flush enter\n");
-+
-+    assert(vmaw);
-+
-+    while (1) {
-+        int i;
-+        VmaAIOCB *cb = NULL;
-+        for (i = 0; i < WRITE_BUFFERS; i++) {
-+            if (vmaw->aiocbs[i]->bytes) {
-+                cb = vmaw->aiocbs[i];
-+                DPRINTF("FOUND USED AIO BUFFER %d %zd\n", i,
-+                        vmaw->aiocbs[i]->bytes);
-+                break;
-+            }
-+        }
-+        if (!cb) {
-+            break;
-+        }
-+        qemu_co_queue_wait(&vmaw->wqueue);
-+    }
-+
-+    DPRINTF("vma_queue_flush leave\n");
-+}
-+
-+/**
-+ * NOTE: pipe buffer size in only 4096 bytes on linux (see 'ulimit -a')
-+ * So we need to create a coroutione to allow 'parallel' execution.
-+ */
-+static ssize_t coroutine_fn
-+vma_queue_write(VmaWriter *vmaw, const void *buf, size_t bytes)
-+{
-+    DPRINTF("vma_queue_write enter %zd\n", bytes);
-+
-+    assert(vmaw);
-+    assert(buf);
-+    assert(bytes <= VMA_MAX_EXTENT_SIZE);
-+
-+    VmaAIOCB *cb = NULL;
-+    while (!cb) {
-+        int i;
-+        for (i = 0; i < WRITE_BUFFERS; i++) {
-+            if (!vmaw->aiocbs[i]->bytes) {
-+                cb = vmaw->aiocbs[i];
-+                break;
-+            }
-+        }
-+        if (!cb) {
-+            qemu_co_queue_wait(&vmaw->wqueue);
-+        }
-+    }
-+
-+    memcpy(cb->buffer, buf, bytes);
-+    cb->bytes = bytes;
-+    cb->vmaw = vmaw;
-+
-+    DPRINTF("vma_queue_write start %zd\n", bytes);
-+    cb->co = qemu_coroutine_create(vma_co_writer_task);
-+    qemu_coroutine_enter(cb->co, cb);
-+
-+    DPRINTF("vma_queue_write leave\n");
-+
-+    return bytes;
-+}
-+
-+VmaWriter *vma_writer_create(const char *filename, uuid_t uuid, Error **errp)
-+{
-+    const char *p;
-+
-+    assert(sizeof(VmaHeader) == (4096 + 8192));
-+    assert(G_STRUCT_OFFSET(VmaHeader, config_names) == 2044);
-+    assert(G_STRUCT_OFFSET(VmaHeader, config_data) == 3068);
-+    assert(G_STRUCT_OFFSET(VmaHeader, dev_info) == 4096);
-+    assert(sizeof(VmaExtentHeader) == 512);
-+
-+    VmaWriter *vmaw = g_new0(VmaWriter, 1);
-+    vmaw->fd = -1;
-+
-+    vmaw->md5csum = g_checksum_new(G_CHECKSUM_MD5);
-+    if (!vmaw->md5csum) {
-+        error_setg(errp, "can't allocate cmsum\n");
-+        goto err;
-+    }
-+
-+    if (strstart(filename, "exec:", &p)) {
-+        vmaw->cmd = popen(p, "w");
-+        if (vmaw->cmd == NULL) {
-+            error_setg(errp, "can't popen command '%s' - %s\n", p,
-+                       g_strerror(errno));
-+            goto err;
-+        }
-+        vmaw->fd = fileno(vmaw->cmd);
-+
-+        /* try to use O_NONBLOCK and O_DIRECT */
-+        fcntl(vmaw->fd, F_SETFL, fcntl(vmaw->fd, F_GETFL)|O_NONBLOCK);
-+        fcntl(vmaw->fd, F_SETFL, fcntl(vmaw->fd, F_GETFL)|O_DIRECT);
-+
-+    } else {
-+        struct stat st;
-+        int oflags;
-+        const char *tmp_id_str;
-+
-+        if ((stat(filename, &st) == 0) && S_ISFIFO(st.st_mode)) {
-+            oflags = O_NONBLOCK|O_DIRECT|O_WRONLY;
-+            vmaw->fd = qemu_open(filename, oflags, 0644);
-+        } else if (strstart(filename, "/dev/fdset/", &tmp_id_str)) {
-+            oflags = O_NONBLOCK|O_DIRECT|O_WRONLY;
-+            vmaw->fd = qemu_open(filename, oflags, 0644);
-+        } else if (strstart(filename, "/dev/fdname/", &tmp_id_str)) {
-+            vmaw->fd = monitor_get_fd(cur_mon, tmp_id_str, errp);
-+            if (vmaw->fd < 0) {
-+                goto err;
-+            }
-+            /* try to use O_NONBLOCK and O_DIRECT */
-+            fcntl(vmaw->fd, F_SETFL, fcntl(vmaw->fd, F_GETFL)|O_NONBLOCK);
-+            fcntl(vmaw->fd, F_SETFL, fcntl(vmaw->fd, F_GETFL)|O_DIRECT);
-+        } else  {
-+            oflags = O_NONBLOCK|O_DIRECT|O_WRONLY|O_CREAT|O_EXCL;
-+            vmaw->fd = qemu_open(filename, oflags, 0644);
-+        }
-+
-+        if (vmaw->fd < 0) {
-+            error_setg(errp, "can't open file %s - %s\n", filename,
-+                       g_strerror(errno));
-+            goto err;
-+        }
-+    }
-+
-+    /* we use O_DIRECT, so we need to align IO buffers */
-+    int i;
-+    for (i = 0; i < WRITE_BUFFERS; i++) {
-+        vmaw->aiocbs[i] = qemu_memalign(512, sizeof(VmaAIOCB));
-+        memset(vmaw->aiocbs[i], 0, sizeof(VmaAIOCB));
-+    }
-+
-+    vmaw->outbuf_count = 0;
-+    vmaw->outbuf_pos = VMA_EXTENT_HEADER_SIZE;
-+
-+    vmaw->header_blob_table_pos = 1; /* start at pos 1 */
-+
-+    qemu_co_mutex_init(&vmaw->writer_lock);
-+    qemu_co_mutex_init(&vmaw->flush_lock);
-+    qemu_co_queue_init(&vmaw->wqueue);
-+
-+    uuid_copy(vmaw->uuid, uuid);
-+
-+    return vmaw;
-+
-+err:
-+    if (vmaw) {
-+        if (vmaw->cmd) {
-+            pclose(vmaw->cmd);
-+        } else if (vmaw->fd >= 0) {
-+            close(vmaw->fd);
-+        }
-+
-+        if (vmaw->md5csum) {
-+            g_checksum_free(vmaw->md5csum);
-+        }
-+
-+        g_free(vmaw);
-+    }
-+
-+    return NULL;
-+}
-+
-+static int coroutine_fn vma_write_header(VmaWriter *vmaw)
-+{
-+    assert(vmaw);
-+    int header_clusters = 8;
-+    char buf[65536*header_clusters];
-+    VmaHeader *head = (VmaHeader *)buf;
-+
-+    int i;
-+
-+    DPRINTF("VMA WRITE HEADER\n");
-+
-+    if (vmaw->status < 0) {
-+        return vmaw->status;
-+    }
-+
-+    memset(buf, 0, sizeof(buf));
-+
-+    head->magic = VMA_MAGIC;
-+    head->version = GUINT32_TO_BE(1); /* v1 */
-+    memcpy(head->uuid, vmaw->uuid, 16);
-+
-+    time_t ctime = time(NULL);
-+    head->ctime = GUINT64_TO_BE(ctime);
-+
-+    if (!vmaw->stream_count) {
-+        return -1;
-+    }
-+
-+    for (i = 0; i < VMA_MAX_CONFIGS; i++) {
-+        head->config_names[i] = GUINT32_TO_BE(vmaw->config_names[i]);
-+        head->config_data[i] = GUINT32_TO_BE(vmaw->config_data[i]);
-+    }
-+
-+    /* 32 bytes per device (12 used currently) = 8192 bytes max */
-+    for (i = 1; i <= 254; i++) {
-+        VmaStreamInfo *si = &vmaw->stream_info[i];
-+        if (si->size) {
-+            assert(si->devname);
-+            uint32_t devname_ptr = allocate_header_string(vmaw, si->devname);
-+            if (!devname_ptr) {
-+                return -1;
-+            }
-+            head->dev_info[i].devname_ptr = GUINT32_TO_BE(devname_ptr);
-+            head->dev_info[i].size = GUINT64_TO_BE(si->size);
-+        }
-+    }
-+
-+    uint32_t header_size = sizeof(VmaHeader) + vmaw->header_blob_table_size;
-+    head->header_size = GUINT32_TO_BE(header_size);
-+
-+    if (header_size > sizeof(buf)) {
-+        return -1; /* just to be sure */
-+    }
-+
-+    uint32_t blob_buffer_offset = sizeof(VmaHeader);
-+    memcpy(buf + blob_buffer_offset, vmaw->header_blob_table,
-+           vmaw->header_blob_table_size);
-+    head->blob_buffer_offset = GUINT32_TO_BE(blob_buffer_offset);
-+    head->blob_buffer_size = GUINT32_TO_BE(vmaw->header_blob_table_pos);
-+
-+    g_checksum_reset(vmaw->md5csum);
-+    g_checksum_update(vmaw->md5csum, (const guchar *)buf, header_size);
-+    gsize csize = 16;
-+    g_checksum_get_digest(vmaw->md5csum, (guint8 *)(head->md5sum), &csize);
-+
-+    return vma_queue_write(vmaw, buf, header_size);
-+}
-+
-+static int coroutine_fn vma_writer_flush(VmaWriter *vmaw)
-+{
-+    assert(vmaw);
-+
-+    int ret;
-+    int i;
-+
-+    if (vmaw->status < 0) {
-+        return vmaw->status;
-+    }
-+
-+    if (!vmaw->header_written) {
-+        vmaw->header_written = true;
-+        ret = vma_write_header(vmaw);
-+        if (ret < 0) {
-+            vma_writer_set_error(vmaw, "vma_writer_flush: write header failed");
-+            return ret;
-+        }
-+    }
-+
-+    DPRINTF("VMA WRITE FLUSH %d %d\n", vmaw->outbuf_count, vmaw->outbuf_pos);
-+
-+
-+    VmaExtentHeader *ehead = (VmaExtentHeader *)vmaw->outbuf;
-+
-+    ehead->magic = VMA_EXTENT_MAGIC;
-+    ehead->reserved1 = 0;
-+
-+    for (i = 0; i < VMA_BLOCKS_PER_EXTENT; i++) {
-+        ehead->blockinfo[i] = GUINT64_TO_BE(vmaw->outbuf_block_info[i]);
-+    }
-+
-+    guint16 block_count = (vmaw->outbuf_pos - VMA_EXTENT_HEADER_SIZE) /
-+        VMA_BLOCK_SIZE;
-+
-+    ehead->block_count = GUINT16_TO_BE(block_count);
-+
-+    memcpy(ehead->uuid, vmaw->uuid, sizeof(ehead->uuid));
-+    memset(ehead->md5sum, 0, sizeof(ehead->md5sum));
-+
-+    g_checksum_reset(vmaw->md5csum);
-+    g_checksum_update(vmaw->md5csum, vmaw->outbuf, VMA_EXTENT_HEADER_SIZE);
-+    gsize csize = 16;
-+    g_checksum_get_digest(vmaw->md5csum, ehead->md5sum, &csize);
-+
-+    int bytes = vmaw->outbuf_pos;
-+    ret = vma_queue_write(vmaw, vmaw->outbuf, bytes);
-+    if (ret != bytes) {
-+        vma_writer_set_error(vmaw, "vma_writer_flush: failed write");
-+    }
-+
-+    vmaw->outbuf_count = 0;
-+    vmaw->outbuf_pos = VMA_EXTENT_HEADER_SIZE;
-+
-+    for (i = 0; i < VMA_BLOCKS_PER_EXTENT; i++) {
-+        vmaw->outbuf_block_info[i] = 0;
-+    }
-+
-+    return vmaw->status;
-+}
-+
-+static int vma_count_open_streams(VmaWriter *vmaw)
-+{
-+    g_assert(vmaw != NULL);
-+
-+    int i;
-+    int open_drives = 0;
-+    for (i = 0; i <= 255; i++) {
-+        if (vmaw->stream_info[i].size && !vmaw->stream_info[i].finished) {
-+            open_drives++;
-+        }
-+    }
-+
-+    return open_drives;
-+}
-+
-+/**
-+ * all jobs should call this when there is no more data
-+ * Returns: number of remaining stream (0 ==> finished)
-+ */
-+int coroutine_fn
-+vma_writer_close_stream(VmaWriter *vmaw, uint8_t dev_id)
-+{
-+    g_assert(vmaw != NULL);
-+
-+    DPRINTF("vma_writer_set_status %d\n", dev_id);
-+    if (!vmaw->stream_info[dev_id].size) {
-+        vma_writer_set_error(vmaw, "vma_writer_close_stream: "
-+                             "no such stream %d", dev_id);
-+        return -1;
-+    }
-+    if (vmaw->stream_info[dev_id].finished) {
-+        vma_writer_set_error(vmaw, "vma_writer_close_stream: "
-+                             "stream already closed %d", dev_id);
-+        return -1;
-+    }
-+
-+    vmaw->stream_info[dev_id].finished = true;
-+
-+    int open_drives = vma_count_open_streams(vmaw);
-+
-+    if (open_drives <= 0) {
-+        DPRINTF("vma_writer_set_status all drives completed\n");
-+        qemu_co_mutex_lock(&vmaw->flush_lock);
-+        int ret = vma_writer_flush(vmaw);
-+        qemu_co_mutex_unlock(&vmaw->flush_lock);
-+        if (ret < 0) {
-+            vma_writer_set_error(vmaw, "vma_writer_close_stream: flush failed");
-+        }
-+    }
-+
-+    return open_drives;
-+}
-+
-+int vma_writer_get_status(VmaWriter *vmaw, VmaStatus *status)
-+{
-+    int i;
-+
-+    g_assert(vmaw != NULL);
-+
-+    if (status) {
-+        status->status = vmaw->status;
-+        g_strlcpy(status->errmsg, vmaw->errmsg, sizeof(status->errmsg));
-+        for (i = 0; i <= 255; i++) {
-+            status->stream_info[i] = vmaw->stream_info[i];
-+        }
-+
-+        uuid_unparse_lower(vmaw->uuid, status->uuid_str);
-+    }
-+
-+    status->closed = vmaw->closed;
-+
-+    return vmaw->status;
-+}
-+
-+static int vma_writer_get_buffer(VmaWriter *vmaw)
-+{
-+    int ret = 0;
-+
-+    qemu_co_mutex_lock(&vmaw->flush_lock);
-+
-+    /* wait until buffer is available */
-+    while (vmaw->outbuf_count >= (VMA_BLOCKS_PER_EXTENT - 1)) {
-+        ret = vma_writer_flush(vmaw);
-+        if (ret < 0) {
-+            vma_writer_set_error(vmaw, "vma_writer_get_buffer: flush failed");
-+            break;
-+        }
-+    }
-+
-+    qemu_co_mutex_unlock(&vmaw->flush_lock);
-+
-+    return ret;
-+}
-+
-+
-+int64_t coroutine_fn
-+vma_writer_write(VmaWriter *vmaw, uint8_t dev_id, int64_t cluster_num,
-+                 unsigned char *buf, size_t *zero_bytes)
-+{
-+    g_assert(vmaw != NULL);
-+    g_assert(zero_bytes != NULL);
-+
-+    *zero_bytes = 0;
-+
-+    if (vmaw->status < 0) {
-+        return vmaw->status;
-+    }
-+
-+    if (!dev_id || !vmaw->stream_info[dev_id].size) {
-+        vma_writer_set_error(vmaw, "vma_writer_write: "
-+                             "no such stream %d", dev_id);
-+        return -1;
-+    }
-+
-+    if (vmaw->stream_info[dev_id].finished) {
-+        vma_writer_set_error(vmaw, "vma_writer_write: "
-+                             "stream already closed %d", dev_id);
-+        return -1;
-+    }
-+
-+
-+    if (cluster_num >= (((uint64_t)1)<<32)) {
-+        vma_writer_set_error(vmaw, "vma_writer_write: "
-+                             "cluster number out of range");
-+        return -1;
-+    }
-+
-+    if (dev_id == vmaw->vmstate_stream) {
-+        if (cluster_num != vmaw->vmstate_clusters) {
-+            vma_writer_set_error(vmaw, "vma_writer_write: "
-+                                 "non sequential vmstate write");
-+        }
-+        vmaw->vmstate_clusters++;
-+    } else if (cluster_num >= vmaw->stream_info[dev_id].cluster_count) {
-+        vma_writer_set_error(vmaw, "vma_writer_write: cluster number too big");
-+        return -1;
-+    }
-+
-+    /* wait until buffer is available */
-+    if (vma_writer_get_buffer(vmaw) < 0) {
-+        vma_writer_set_error(vmaw, "vma_writer_write: "
-+                             "vma_writer_get_buffer failed");
-+        return -1;
-+    }
-+
-+    DPRINTF("VMA WRITE %d %zd\n", dev_id, cluster_num);
-+
-+    uint16_t mask = 0;
-+
-+    if (buf) {
-+        int i;
-+        int bit = 1;
-+        for (i = 0; i < 16; i++) {
-+            unsigned char *vmablock = buf + (i*VMA_BLOCK_SIZE);
-+            if (!buffer_is_zero(vmablock, VMA_BLOCK_SIZE)) {
-+                mask |= bit;
-+                memcpy(vmaw->outbuf + vmaw->outbuf_pos, vmablock,
-+                       VMA_BLOCK_SIZE);
-+                vmaw->outbuf_pos += VMA_BLOCK_SIZE;
-+            } else {
-+                DPRINTF("VMA WRITE %zd ZERO BLOCK %d\n", cluster_num, i);
-+                vmaw->stream_info[dev_id].zero_bytes += VMA_BLOCK_SIZE;
-+                *zero_bytes += VMA_BLOCK_SIZE;
-+            }
-+
-+            bit = bit << 1;
-+        }
-+    } else {
-+        DPRINTF("VMA WRITE %zd ZERO CLUSTER\n", cluster_num);
-+        vmaw->stream_info[dev_id].zero_bytes += VMA_CLUSTER_SIZE;
-+        *zero_bytes += VMA_CLUSTER_SIZE;
-+    }
-+
-+    uint64_t block_info = ((uint64_t)mask) << (32+16);
-+    block_info |= ((uint64_t)dev_id) << 32;
-+    block_info |= (cluster_num & 0xffffffff);
-+    vmaw->outbuf_block_info[vmaw->outbuf_count] = block_info;
-+
-+    DPRINTF("VMA WRITE MASK %zd %zx\n", cluster_num, block_info);
-+
-+    vmaw->outbuf_count++;
-+
-+    /** NOTE: We allways write whole clusters, but we correctly set
-+     * transferred bytes. So transferred == size when when everything
-+     * went OK.
-+     */
-+    size_t transferred = VMA_CLUSTER_SIZE;
-+
-+    if (dev_id != vmaw->vmstate_stream) {
-+        uint64_t last = (cluster_num + 1) * VMA_CLUSTER_SIZE;
-+        if (last > vmaw->stream_info[dev_id].size) {
-+            uint64_t diff = last - vmaw->stream_info[dev_id].size;
-+            if (diff >= VMA_CLUSTER_SIZE) {
-+                vma_writer_set_error(vmaw, "vma_writer_write: "
-+                                     "read after last cluster");
-+                return -1;
-+            }
-+            transferred -= diff;
-+        }
-+    }
-+
-+    vmaw->stream_info[dev_id].transferred += transferred;
-+
-+    return transferred;
-+}
-+
-+int vma_writer_close(VmaWriter *vmaw, Error **errp)
-+{
-+    g_assert(vmaw != NULL);
-+
-+    int i;
-+
-+    vma_queue_flush(vmaw);
-+
-+    /* this should not happen - just to be sure */
-+    while (!qemu_co_queue_empty(&vmaw->wqueue)) {
-+        DPRINTF("vma_writer_close wait\n");
-+        co_aio_sleep_ns(qemu_get_aio_context(), QEMU_CLOCK_REALTIME, 1000000);
-+    }
-+
-+    if (vmaw->cmd) {
-+        if (pclose(vmaw->cmd) < 0) {
-+            vma_writer_set_error(vmaw, "vma_writer_close: "
-+                                 "pclose failed - %s", g_strerror(errno));
-+        }
-+    } else {
-+        if (close(vmaw->fd) < 0) {
-+            vma_writer_set_error(vmaw, "vma_writer_close: "
-+                                 "close failed - %s", g_strerror(errno));
-+        }
-+    }
-+
-+    for (i = 0; i <= 255; i++) {
-+        VmaStreamInfo *si = &vmaw->stream_info[i];
-+        if (si->size) {
-+            if (!si->finished) {
-+                vma_writer_set_error(vmaw, "vma_writer_close: "
-+                                     "detected open stream '%s'", si->devname);
-+            } else if ((si->transferred != si->size) &&
-+                       (i != vmaw->vmstate_stream)) {
-+                vma_writer_set_error(vmaw, "vma_writer_close: "
-+                                     "incomplete stream '%s' (%zd != %zd)",
-+                                     si->devname, si->transferred, si->size);
-+            }
-+        }
-+    }
-+
-+    for (i = 0; i <= 255; i++) {
-+        vmaw->stream_info[i].finished = 1; /* mark as closed */
-+    }
-+
-+    vmaw->closed = 1;
-+
-+    if (vmaw->status < 0 && *errp == NULL) {
-+        error_setg(errp, "%s", vmaw->errmsg);
-+    }
-+
-+    return vmaw->status;
-+}
-+
-+void vma_writer_destroy(VmaWriter *vmaw)
-+{
-+    assert(vmaw);
-+
-+    int i;
-+
-+    for (i = 0; i <= 255; i++) {
-+        if (vmaw->stream_info[i].devname) {
-+            g_free(vmaw->stream_info[i].devname);
-+        }
-+    }
-+
-+    if (vmaw->md5csum) {
-+        g_checksum_free(vmaw->md5csum);
-+    }
-+
-+    for (i = 0; i < WRITE_BUFFERS; i++) {
-+        free(vmaw->aiocbs[i]);
-+    }
-+
-+    g_free(vmaw);
-+}
-diff --git a/vma.c b/vma.c
-new file mode 100644
-index 0000000000..8732bfa85e
---- /dev/null
-+++ b/vma.c
-@@ -0,0 +1,586 @@
-+/*
-+ * VMA: Virtual Machine Archive
-+ *
-+ * Copyright (C) 2012-2013 Proxmox Server Solutions
-+ *
-+ * Authors:
-+ *  Dietmar Maurer (dietmar@proxmox.com)
-+ *
-+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
-+ * See the COPYING file in the top-level directory.
-+ *
-+ */
-+
-+#include "qemu/osdep.h"
-+#include <glib.h>
-+
-+#include "vma.h"
-+#include "qemu-common.h"
-+#include "qemu/error-report.h"
-+#include "qemu/main-loop.h"
-+#include "qapi/qmp/qstring.h"
-+#include "sysemu/char.h" /* qstring_from_str */
-+
-+static void help(void)
-+{
-+    const char *help_msg =
-+        "usage: vma command [command options]\n"
-+        "\n"
-+        "vma list <filename>\n"
-+        "vma create <filename> [-c config] <archive> pathname ...\n"
-+        "vma extract <filename> [-r <fifo>] <targetdir>\n"
-+        ;
-+
-+    printf("%s", help_msg);
-+    exit(1);
-+}
-+
-+static const char *extract_devname(const char *path, char **devname, int index)
-+{
-+    assert(path);
-+
-+    const char *sep = strchr(path, '=');
-+
-+    if (sep) {
-+        *devname = g_strndup(path, sep - path);
-+        path = sep + 1;
-+    } else {
-+        if (index >= 0) {
-+            *devname = g_strdup_printf("disk%d", index);
-+        } else {
-+            *devname = NULL;
-+        }
-+    }
-+
-+    return path;
-+}
-+
-+static void print_content(VmaReader *vmar)
-+{
-+    assert(vmar);
-+
-+    VmaHeader *head = vma_reader_get_header(vmar);
-+
-+    GList *l = vma_reader_get_config_data(vmar);
-+    while (l && l->data) {
-+        VmaConfigData *cdata = (VmaConfigData *)l->data;
-+        l = g_list_next(l);
-+        printf("CFG: size: %d name: %s\n", cdata->len, cdata->name);
-+    }
-+
-+    int i;
-+    VmaDeviceInfo *di;
-+    for (i = 1; i < 255; i++) {
-+        di = vma_reader_get_device_info(vmar, i);
-+        if (di) {
-+            if (strcmp(di->devname, "vmstate") == 0) {
-+                printf("VMSTATE: dev_id=%d memory: %zd\n", i, di->size);
-+            } else {
-+                printf("DEV: dev_id=%d size: %zd devname: %s\n",
-+                       i, di->size, di->devname);
-+            }
-+        }
-+    }
-+    /* ctime is the last entry we print */
-+    printf("CTIME: %s", ctime(&head->ctime));
-+    fflush(stdout);
-+}
-+
-+static int list_content(int argc, char **argv)
-+{
-+    int c, ret = 0;
-+    const char *filename;
-+
-+    for (;;) {
-+        c = getopt(argc, argv, "h");
-+        if (c == -1) {
-+            break;
-+        }
-+        switch (c) {
-+        case '?':
-+        case 'h':
-+            help();
-+            break;
-+        default:
-+            g_assert_not_reached();
-+        }
-+    }
-+
-+    /* Get the filename */
-+    if ((optind + 1) != argc) {
-+        help();
-+    }
-+    filename = argv[optind++];
-+
-+    Error *errp = NULL;
-+    VmaReader *vmar = vma_reader_create(filename, &errp);
-+
-+    if (!vmar) {
-+        g_error("%s", error_get_pretty(errp));
-+    }
-+
-+    print_content(vmar);
-+
-+    vma_reader_destroy(vmar);
-+
-+    return ret;
-+}
-+
-+typedef struct RestoreMap {
-+    char *devname;
-+    char *path;
-+    bool write_zero;
-+} RestoreMap;
-+
-+static int extract_content(int argc, char **argv)
-+{
-+    int c, ret = 0;
-+    int verbose = 0;
-+    const char *filename;
-+    const char *dirname;
-+    const char *readmap = NULL;
-+
-+    for (;;) {
-+        c = getopt(argc, argv, "hvr:");
-+        if (c == -1) {
-+            break;
-+        }
-+        switch (c) {
-+        case '?':
-+        case 'h':
-+            help();
-+            break;
-+        case 'r':
-+            readmap = optarg;
-+            break;
-+        case 'v':
-+            verbose = 1;
-+            break;
-+        default:
-+            help();
-+        }
-+    }
-+
-+    /* Get the filename */
-+    if ((optind + 2) != argc) {
-+        help();
-+    }
-+    filename = argv[optind++];
-+    dirname = argv[optind++];
-+
-+    Error *errp = NULL;
-+    VmaReader *vmar = vma_reader_create(filename, &errp);
-+
-+    if (!vmar) {
-+        g_error("%s", error_get_pretty(errp));
-+    }
-+
-+    if (mkdir(dirname, 0777) < 0) {
-+        g_error("unable to create target directory %s - %s",
-+                dirname, g_strerror(errno));
-+    }
-+
-+    GList *l = vma_reader_get_config_data(vmar);
-+    while (l && l->data) {
-+        VmaConfigData *cdata = (VmaConfigData *)l->data;
-+        l = g_list_next(l);
-+        char *cfgfn = g_strdup_printf("%s/%s", dirname, cdata->name);
-+        GError *err = NULL;
-+        if (!g_file_set_contents(cfgfn, (gchar *)cdata->data, cdata->len,
-+                                 &err)) {
-+            g_error("unable to write file: %s", err->message);
-+        }
-+    }
-+
-+    GHashTable *devmap = g_hash_table_new(g_str_hash, g_str_equal);
-+
-+    if (readmap) {
-+        print_content(vmar);
-+
-+        FILE *map = fopen(readmap, "r");
-+        if (!map) {
-+            g_error("unable to open fifo %s - %s", readmap, g_strerror(errno));
-+        }
-+
-+        while (1) {
-+            char inbuf[8192];
-+            char *line = fgets(inbuf, sizeof(inbuf), map);
-+            if (!line || line[0] == '\0' || !strcmp(line, "done\n")) {
-+                break;
-+            }
-+            int len = strlen(line);
-+            if (line[len - 1] == '\n') {
-+                line[len - 1] = '\0';
-+                if (len == 1) {
-+                    break;
-+                }
-+            }
-+
-+            const char *path;
-+            bool write_zero;
-+            if (line[0] == '0' && line[1] == ':') {
-+                path = inbuf + 2;
-+                write_zero = false;
-+            } else if (line[0] == '1' && line[1] == ':') {
-+                path = inbuf + 2;
-+                write_zero = true;
-+            } else {
-+                g_error("read map failed - parse error ('%s')", inbuf);
-+            }
-+
-+            char *devname = NULL;
-+            path = extract_devname(path, &devname, -1);
-+            if (!devname) {
-+                g_error("read map failed - no dev name specified ('%s')",
-+                        inbuf);
-+            }
-+
-+            RestoreMap *map = g_new0(RestoreMap, 1);
-+            map->devname = g_strdup(devname);
-+            map->path = g_strdup(path);
-+            map->write_zero = write_zero;
-+
-+            g_hash_table_insert(devmap, map->devname, map);
-+
-+        };
-+    }
-+
-+    int i;
-+    int vmstate_fd = -1;
-+    guint8 vmstate_stream = 0;
-+
-+    for (i = 1; i < 255; i++) {
-+        VmaDeviceInfo *di = vma_reader_get_device_info(vmar, i);
-+        if (di && (strcmp(di->devname, "vmstate") == 0)) {
-+            vmstate_stream = i;
-+            char *statefn = g_strdup_printf("%s/vmstate.bin", dirname);
-+            vmstate_fd = open(statefn, O_WRONLY|O_CREAT|O_EXCL, 0644);
-+            if (vmstate_fd < 0) {
-+                g_error("create vmstate file '%s' failed - %s", statefn,
-+                        g_strerror(errno));
-+            }
-+            g_free(statefn);
-+        } else if (di) {
-+            char *devfn = NULL;
-+            int flags = BDRV_O_RDWR|BDRV_O_CACHE_WB;
-+            bool write_zero = true;
-+
-+            if (readmap) {
-+                RestoreMap *map;
-+                map = (RestoreMap *)g_hash_table_lookup(devmap, di->devname);
-+                if (map == NULL) {
-+                    g_error("no device name mapping for %s", di->devname);
-+                }
-+                devfn = map->path;
-+                write_zero = map->write_zero;
-+            } else {
-+                devfn = g_strdup_printf("%s/tmp-disk-%s.raw",
-+                                        dirname, di->devname);
-+                printf("DEVINFO %s %zd\n", devfn, di->size);
-+
-+                bdrv_img_create(devfn, "raw", NULL, NULL, NULL, di->size,
-+                                flags, &errp, 0);
-+                if (errp) {
-+                    g_error("can't create file %s: %s", devfn,
-+                            error_get_pretty(errp));
-+                }
-+
-+                /* Note: we created an empty file above, so there is no
-+                 * need to write zeroes (so we generate a sparse file)
-+                 */
-+                write_zero = false;
-+            }
-+
-+            BlockDriverState *bs = bdrv_new();
-+            if (errp || bdrv_open(&bs, devfn, NULL, NULL, flags, &errp)) {
-+                g_error("can't open file %s - %s", devfn,
-+                        error_get_pretty(errp));
-+            }
-+            if (vma_reader_register_bs(vmar, i, bs, write_zero, &errp) < 0) {
-+                g_error("%s", error_get_pretty(errp));
-+            }
-+
-+            if (!readmap) {
-+                g_free(devfn);
-+            }
-+        }
-+    }
-+
-+    if (vma_reader_restore(vmar, vmstate_fd, verbose, &errp) < 0) {
-+        g_error("restore failed - %s", error_get_pretty(errp));
-+    }
-+
-+    if (!readmap) {
-+        for (i = 1; i < 255; i++) {
-+            VmaDeviceInfo *di = vma_reader_get_device_info(vmar, i);
-+            if (di && (i != vmstate_stream)) {
-+                char *tmpfn = g_strdup_printf("%s/tmp-disk-%s.raw",
-+                                              dirname, di->devname);
-+                char *fn = g_strdup_printf("%s/disk-%s.raw",
-+                                           dirname, di->devname);
-+                if (rename(tmpfn, fn) != 0) {
-+                    g_error("rename %s to %s failed - %s",
-+                            tmpfn, fn, g_strerror(errno));
-+                }
-+            }
-+        }
-+    }
-+
-+    vma_reader_destroy(vmar);
-+
-+    bdrv_close_all();
-+
-+    return ret;
-+}
-+
-+typedef struct BackupJob {
-+    BlockDriverState *bs;
-+    int64_t len;
-+    VmaWriter *vmaw;
-+    uint8_t dev_id;
-+} BackupJob;
-+
-+#define BACKUP_SECTORS_PER_CLUSTER (VMA_CLUSTER_SIZE / BDRV_SECTOR_SIZE)
-+
-+static void coroutine_fn backup_run(void *opaque)
-+{
-+    BackupJob *job = (BackupJob *)opaque;
-+    struct iovec iov;
-+    QEMUIOVector qiov;
-+
-+    int64_t start, end;
-+    int ret = 0;
-+
-+    unsigned char *buf = qemu_blockalign(job->bs, VMA_CLUSTER_SIZE);
-+
-+    start = 0;
-+    end = DIV_ROUND_UP(job->len / BDRV_SECTOR_SIZE,
-+                       BACKUP_SECTORS_PER_CLUSTER);
-+
-+    for (; start < end; start++) {
-+        iov.iov_base = buf;
-+        iov.iov_len = VMA_CLUSTER_SIZE;
-+        qemu_iovec_init_external(&qiov, &iov, 1);
-+
-+        ret = bdrv_co_readv(job->bs, start * BACKUP_SECTORS_PER_CLUSTER,
-+                            BACKUP_SECTORS_PER_CLUSTER, &qiov);
-+        if (ret < 0) {
-+            vma_writer_set_error(job->vmaw, "read error", -1);
-+            goto out;
-+        }
-+
-+        size_t zb = 0;
-+        if (vma_writer_write(job->vmaw, job->dev_id, start, buf, &zb) < 0) {
-+            vma_writer_set_error(job->vmaw, "backup_dump_cb vma_writer_write failed", -1);
-+            goto out;
-+        }
-+    }
-+
-+
-+out:
-+    if (vma_writer_close_stream(job->vmaw, job->dev_id) <= 0) {
-+        Error *err = NULL;
-+        if (vma_writer_close(job->vmaw, &err) != 0) {
-+            g_warning("vma_writer_close failed %s", error_get_pretty(err));
-+        }
-+    }
-+}
-+
-+static int create_archive(int argc, char **argv)
-+{
-+    int i, c;
-+    int verbose = 0;
-+    const char *archivename;
-+    GList *config_files = NULL;
-+
-+    for (;;) {
-+        c = getopt(argc, argv, "hvc:");
-+        if (c == -1) {
-+            break;
-+        }
-+        switch (c) {
-+        case '?':
-+        case 'h':
-+            help();
-+            break;
-+        case 'c':
-+            config_files = g_list_append(config_files, optarg);
-+            break;
-+        case 'v':
-+            verbose = 1;
-+            break;
-+        default:
-+            g_assert_not_reached();
-+        }
-+    }
-+
-+
-+    /* make sure we have archive name and at least one path */
-+    if ((optind + 2) > argc) {
-+        help();
-+    }
-+
-+    archivename = argv[optind++];
-+
-+    uuid_t uuid;
-+    uuid_generate(uuid);
-+
-+    Error *local_err = NULL;
-+    VmaWriter *vmaw = vma_writer_create(archivename, uuid, &local_err);
-+
-+    if (vmaw == NULL) {
-+        g_error("%s", error_get_pretty(local_err));
-+    }
-+
-+    GList *l = config_files;
-+    while (l && l->data) {
-+        char *name = l->data;
-+        char *cdata = NULL;
-+        gsize clen = 0;
-+        GError *err = NULL;
-+        if (!g_file_get_contents(name, &cdata, &clen, &err)) {
-+            unlink(archivename);
-+            g_error("Unable to read file: %s", err->message);
-+        }
-+
-+        if (vma_writer_add_config(vmaw, name, cdata, clen) != 0) {
-+            unlink(archivename);
-+            g_error("Unable to append config data %s (len = %zd)",
-+                    name, clen);
-+        }
-+        l = g_list_next(l);
-+    }
-+
-+    int ind = 0;
-+    while (optind < argc) {
-+        const char *path = argv[optind++];
-+        char *devname = NULL;
-+        path = extract_devname(path, &devname, ind++);
-+
-+        Error *errp = NULL;
-+        BlockDriverState *bs;
-+
-+        bs = bdrv_open(path, NULL, NULL, 0, &errp);
-+        if (!bs) {
-+            unlink(archivename);
-+            g_error("bdrv_open '%s' failed - %s", path, error_get_pretty(errp));
-+        }
-+        int64_t size = bdrv_getlength(bs);
-+        int dev_id = vma_writer_register_stream(vmaw, devname, size);
-+        if (dev_id <= 0) {
-+            unlink(archivename);
-+            g_error("vma_writer_register_stream '%s' failed", devname);
-+        }
-+
-+        BackupJob *job = g_new0(BackupJob, 1);
-+        job->len = size;
-+        job->bs = bs;
-+        job->vmaw = vmaw;
-+        job->dev_id = dev_id;
-+
-+        Coroutine *co = qemu_coroutine_create(backup_run, job);
-+        qemu_coroutine_enter(co);
-+    }
-+
-+    VmaStatus vmastat;
-+    int percent = 0;
-+    int last_percent = -1;
-+
-+    while (1) {
-+        main_loop_wait(false);
-+        vma_writer_get_status(vmaw, &vmastat);
-+
-+        if (verbose) {
-+
-+            uint64_t total = 0;
-+            uint64_t transferred = 0;
-+            uint64_t zero_bytes = 0;
-+
-+            int i;
-+            for (i = 0; i < 256; i++) {
-+                if (vmastat.stream_info[i].size) {
-+                    total += vmastat.stream_info[i].size;
-+                    transferred += vmastat.stream_info[i].transferred;
-+                    zero_bytes += vmastat.stream_info[i].zero_bytes;
-+                }
-+            }
-+            percent = (transferred*100)/total;
-+            if (percent != last_percent) {
-+                fprintf(stderr, "progress %d%% %zd/%zd %zd\n", percent,
-+                        transferred, total, zero_bytes);
-+                fflush(stderr);
-+
-+                last_percent = percent;
-+            }
-+        }
-+
-+        if (vmastat.closed) {
-+            break;
-+        }
-+    } else {
-+        Coroutine *co = qemu_coroutine_create(backup_run_empty, vmaw);
-+        qemu_coroutine_enter(co);
-+        while (1) {
-+            main_loop_wait(false);
-+            vma_writer_get_status(vmaw, &vmastat);
-+            if (vmastat.closed) {
-+                    break;
-+            }
-+        }
-+    }
-+
-+    bdrv_drain_all();
-+
-+    vma_writer_get_status(vmaw, &vmastat);
-+
-+    if (verbose) {
-+        for (i = 0; i < 256; i++) {
-+            VmaStreamInfo *si = &vmastat.stream_info[i];
-+            if (si->size) {
-+                fprintf(stderr, "image %s: size=%zd zeros=%zd saved=%zd\n",
-+                        si->devname, si->size, si->zero_bytes,
-+                        si->size - si->zero_bytes);
-+            }
-+        }
-+    }
-+
-+    if (vmastat.status < 0) {
-+        unlink(archivename);
-+        g_error("creating vma archive failed");
-+    }
-+
-+    return 0;
-+}
-+
-+int main(int argc, char **argv)
-+{
-+    const char *cmdname;
-+    Error *main_loop_err = NULL;
-+
-+    error_set_progname(argv[0]);
-+
-+    if (qemu_init_main_loop(&main_loop_err)) {
-+        g_error("%s", error_get_pretty(main_loop_err));
-+    }
-+
-+    bdrv_init();
-+
-+    if (argc < 2) {
-+        help();
-+    }
-+
-+    cmdname = argv[1];
-+    argc--; argv++;
-+
-+
-+    if (!strcmp(cmdname, "list")) {
-+        return list_content(argc, argv);
-+    } else if (!strcmp(cmdname, "create")) {
-+        return create_archive(argc, argv);
-+    } else if (!strcmp(cmdname, "extract")) {
-+        return extract_content(argc, argv);
-+    }
-+
-+    help();
-+    return 0;
-+}
-diff --git a/vma.h b/vma.h
-new file mode 100644
-index 0000000000..6625eb95c6
---- /dev/null
-+++ b/vma.h
-@@ -0,0 +1,146 @@
-+/*
-+ * VMA: Virtual Machine Archive
-+ *
-+ * Copyright (C) Proxmox Server Solutions
-+ *
-+ * Authors:
-+ *  Dietmar Maurer (dietmar@proxmox.com)
-+ *
-+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
-+ * See the COPYING file in the top-level directory.
-+ *
-+ */
-+
-+#ifndef BACKUP_VMA_H
-+#define BACKUP_VMA_H
-+
-+#include <uuid/uuid.h>
-+#include "qapi/error.h"
-+#include "block/block.h"
-+
-+#define VMA_BLOCK_BITS 12
-+#define VMA_BLOCK_SIZE (1<<VMA_BLOCK_BITS)
-+#define VMA_CLUSTER_BITS (VMA_BLOCK_BITS+4)
-+#define VMA_CLUSTER_SIZE (1<<VMA_CLUSTER_BITS)
-+
-+#if VMA_CLUSTER_SIZE != 65536
-+#error unexpected cluster size
-+#endif
-+
-+#define VMA_EXTENT_HEADER_SIZE 512
-+#define VMA_BLOCKS_PER_EXTENT 59
-+#define VMA_MAX_CONFIGS 256
-+
-+#define VMA_MAX_EXTENT_SIZE \
-+    (VMA_EXTENT_HEADER_SIZE+VMA_CLUSTER_SIZE*VMA_BLOCKS_PER_EXTENT)
-+#if VMA_MAX_EXTENT_SIZE != 3867136
-+#error unexpected VMA_EXTENT_SIZE
-+#endif
-+
-+/* File Format Definitions */
-+
-+#define VMA_MAGIC (GUINT32_TO_BE(('V'<<24)|('M'<<16)|('A'<<8)|0x00))
-+#define VMA_EXTENT_MAGIC (GUINT32_TO_BE(('V'<<24)|('M'<<16)|('A'<<8)|'E'))
-+
-+typedef struct VmaDeviceInfoHeader {
-+    uint32_t devname_ptr; /* offset into blob_buffer table */
-+    uint32_t reserved0;
-+    uint64_t size; /* device size in bytes */
-+    uint64_t reserved1;
-+    uint64_t reserved2;
-+} VmaDeviceInfoHeader;
-+
-+typedef struct VmaHeader {
-+    uint32_t magic;
-+    uint32_t version;
-+    unsigned char uuid[16];
-+    int64_t ctime;
-+    unsigned char md5sum[16];
-+
-+    uint32_t blob_buffer_offset;
-+    uint32_t blob_buffer_size;
-+    uint32_t header_size;
-+
-+    unsigned char reserved[1984];
-+
-+    uint32_t config_names[VMA_MAX_CONFIGS]; /* offset into blob_buffer table */
-+    uint32_t config_data[VMA_MAX_CONFIGS];  /* offset into blob_buffer table */
-+
-+    uint32_t reserved1;
-+
-+    VmaDeviceInfoHeader dev_info[256];
-+} VmaHeader;
-+
-+typedef struct VmaExtentHeader {
-+    uint32_t magic;
-+    uint16_t reserved1;
-+    uint16_t block_count;
-+    unsigned char uuid[16];
-+    unsigned char md5sum[16];
-+    uint64_t blockinfo[VMA_BLOCKS_PER_EXTENT];
-+} VmaExtentHeader;
-+
-+/* functions/definitions to read/write vma files */
-+
-+typedef struct VmaReader VmaReader;
-+
-+typedef struct VmaWriter VmaWriter;
-+
-+typedef struct VmaConfigData {
-+    const char *name;
-+    const void *data;
-+    uint32_t len;
-+} VmaConfigData;
-+
-+typedef struct VmaStreamInfo {
-+    uint64_t size;
-+    uint64_t cluster_count;
-+    uint64_t transferred;
-+    uint64_t zero_bytes;
-+    int finished;
-+    char *devname;
-+} VmaStreamInfo;
-+
-+typedef struct VmaStatus {
-+    int status;
-+    bool closed;
-+    char errmsg[8192];
-+    char uuid_str[37];
-+    VmaStreamInfo stream_info[256];
-+} VmaStatus;
-+
-+typedef struct VmaDeviceInfo {
-+    uint64_t size; /* device size in bytes */
-+    const char *devname;
-+} VmaDeviceInfo;
-+
-+VmaWriter *vma_writer_create(const char *filename, uuid_t uuid, Error **errp);
-+int vma_writer_close(VmaWriter *vmaw, Error **errp);
-+void vma_writer_destroy(VmaWriter *vmaw);
-+int vma_writer_add_config(VmaWriter *vmaw, const char *name, gpointer data,
-+                          size_t len);
-+int vma_writer_register_stream(VmaWriter *vmaw, const char *devname,
-+                               size_t size);
-+
-+int64_t coroutine_fn vma_writer_write(VmaWriter *vmaw, uint8_t dev_id,
-+                                      int64_t cluster_num, unsigned char *buf,
-+                                      size_t *zero_bytes);
-+
-+int coroutine_fn vma_writer_close_stream(VmaWriter *vmaw, uint8_t dev_id);
-+
-+int vma_writer_get_status(VmaWriter *vmaw, VmaStatus *status);
-+void vma_writer_set_error(VmaWriter *vmaw, const char *fmt, ...);
-+
-+
-+VmaReader *vma_reader_create(const char *filename, Error **errp);
-+void vma_reader_destroy(VmaReader *vmar);
-+VmaHeader *vma_reader_get_header(VmaReader *vmar);
-+GList *vma_reader_get_config_data(VmaReader *vmar);
-+VmaDeviceInfo *vma_reader_get_device_info(VmaReader *vmar, guint8 dev_id);
-+int vma_reader_register_bs(VmaReader *vmar, guint8 dev_id,
-+                           BlockDriverState *bs, bool write_zeroes,
-+                           Error **errp);
-+int vma_reader_restore(VmaReader *vmar, int vmstate_fd, bool verbose,
-+                       Error **errp);
-+
-+#endif /* BACKUP_VMA_H */
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0012-qmp-add-get_link_status.patch b/debian/patches/pve/0012-qmp-add-get_link_status.patch
new file mode 100644 (file)
index 0000000..bba5a93
--- /dev/null
@@ -0,0 +1,85 @@
+From 6c70ffe629c678a110d311fab784d65836a7917e Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Wed, 9 Dec 2015 16:34:41 +0100
+Subject: [PATCH 12/28] qmp: add get_link_status
+
+---
+ net/net.c        | 27 +++++++++++++++++++++++++++
+ qapi-schema.json | 16 ++++++++++++++++
+ 2 files changed, 43 insertions(+)
+
+diff --git a/net/net.c b/net/net.c
+index 0ac3b9e80c..7410c1e5f3 100644
+--- a/net/net.c
++++ b/net/net.c
+@@ -1373,6 +1373,33 @@ void hmp_info_network(Monitor *mon, const QDict *qdict)
+     }
+ }
++int64_t qmp_get_link_status(const char *name, Error **errp)
++{
++    NetClientState *ncs[MAX_QUEUE_NUM];
++    NetClientState *nc;
++    int queues;
++    bool ret;
++
++    queues = qemu_find_net_clients_except(name, ncs,
++                                          NET_CLIENT_DRIVER__MAX,
++                                          MAX_QUEUE_NUM);
++
++    if (queues == 0) {
++        error_set(errp, ERROR_CLASS_DEVICE_NOT_FOUND,
++                  "Device '%s' not found", name);
++        return (int64_t) -1;
++    }
++
++    nc = ncs[0];
++    ret = ncs[0]->link_down;
++
++    if (nc->peer->info->type == NET_CLIENT_DRIVER_NIC) {
++      ret = ncs[0]->peer->link_down;
++    }
++
++    return (int64_t) ret ? 0 : 1;
++}
++
+ void qmp_set_link(const char *name, bool up, Error **errp)
+ {
+     NetClientState *ncs[MAX_QUEUE_NUM];
+diff --git a/qapi-schema.json b/qapi-schema.json
+index 361700d37c..5e82933ca1 100644
+--- a/qapi-schema.json
++++ b/qapi-schema.json
+@@ -56,6 +56,7 @@
+ { 'pragma': {
+     # Commands allowed to return a non-dictionary:
+     'returns-whitelist': [
++        'get_link_status',
+         'human-monitor-command',
+         'qom-get',
+         'query-migrate-cache-size',
+@@ -2537,6 +2538,21 @@
+ { 'command': 'set_link', 'data': {'name': 'str', 'up': 'bool'} }
+ ##
++# @get_link_status:
++#
++# Get the current link state of the nics or nic.
++#
++# @name: name of the nic you get the state of
++#
++# Return: If link is up 1
++#         If link is down 0
++#         If an error occure an empty string.
++#
++# Notes: this is an Proxmox VE extension and not offical part of Qemu.
++##
++{ 'command': 'get_link_status', 'data': {'name': 'str'}, 'returns': 'int'}
++
++##
+ # @balloon:
+ #
+ # Request the balloon driver to change its balloon size.
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0012-vma-add-verify-command.patch b/debian/patches/pve/0012-vma-add-verify-command.patch
deleted file mode 100644 (file)
index 6c853cb..0000000
+++ /dev/null
@@ -1,321 +0,0 @@
-From d4c9597f3064b68853cefca90dd335cd5e5320d0 Mon Sep 17 00:00:00 2001
-From: Dietmar Maurer <dietmar@proxmox.com>
-Date: Mon, 11 Mar 2013 07:07:46 +0100
-Subject: [PATCH 12/49] vma: add verify command
-
-Users wants to verify the archive after backup.
-
-Examples:
-
- # vma verify -v test.vma
-
- # lzop -d -c test.vma.lzo |vma verify -
-
-Signed-off-by: Dietmar Maurer <dietmar@proxmox.com>
----
- vma-reader.c | 121 ++++++++++++++++++++++++++++++++++++++++++++---------------
- vma.c        |  55 +++++++++++++++++++++++++++
- vma.h        |   1 +
- 3 files changed, 147 insertions(+), 30 deletions(-)
-
-diff --git a/vma-reader.c b/vma-reader.c
-index 51dd8fee0e..2aafb26b2a 100644
---- a/vma-reader.c
-+++ b/vma-reader.c
-@@ -45,6 +45,8 @@ struct VmaReader {
-     time_t start_time;
-     int64_t cluster_count;
-     int64_t clusters_read;
-+    int64_t zero_cluster_data;
-+    int64_t partial_zero_cluster_data;
-     int clusters_read_per;
- };
-@@ -425,6 +427,27 @@ VmaDeviceInfo *vma_reader_get_device_info(VmaReader *vmar, guint8 dev_id)
-     return NULL;
- }
-+static void allocate_rstate(VmaReader *vmar,  guint8 dev_id,
-+                            BlockDriverState *bs, bool write_zeroes)
-+{
-+    assert(vmar);
-+    assert(dev_id);
-+
-+    vmar->rstate[dev_id].bs = bs;
-+    vmar->rstate[dev_id].write_zeroes = write_zeroes;
-+
-+    int64_t size = vmar->devinfo[dev_id].size;
-+
-+    int64_t bitmap_size = (size/BDRV_SECTOR_SIZE) +
-+        (VMA_CLUSTER_SIZE/BDRV_SECTOR_SIZE) * BITS_PER_LONG - 1;
-+    bitmap_size /= (VMA_CLUSTER_SIZE/BDRV_SECTOR_SIZE) * BITS_PER_LONG;
-+
-+    vmar->rstate[dev_id].bitmap_size = bitmap_size;
-+    vmar->rstate[dev_id].bitmap = g_new0(unsigned long, bitmap_size);
-+
-+    vmar->cluster_count += size/VMA_CLUSTER_SIZE;
-+}
-+
- int vma_reader_register_bs(VmaReader *vmar, guint8 dev_id, BlockDriverState *bs,
-                            bool write_zeroes, Error **errp)
- {
-@@ -447,17 +470,7 @@ int vma_reader_register_bs(VmaReader *vmar, guint8 dev_id, BlockDriverState *bs,
-         return -1;
-     }
--    vmar->rstate[dev_id].bs = bs;
--    vmar->rstate[dev_id].write_zeroes = write_zeroes;
--
--    int64_t bitmap_size = (size/BDRV_SECTOR_SIZE) +
--        (VMA_CLUSTER_SIZE/BDRV_SECTOR_SIZE) * BITS_PER_LONG - 1;
--    bitmap_size /= (VMA_CLUSTER_SIZE/BDRV_SECTOR_SIZE) * BITS_PER_LONG;
--
--    vmar->rstate[dev_id].bitmap_size = bitmap_size;
--    vmar->rstate[dev_id].bitmap = g_new0(unsigned long, bitmap_size);
--
--    vmar->cluster_count += size/VMA_CLUSTER_SIZE;
-+    allocate_rstate(vmar, dev_id, bs, write_zeroes);
-     return 0;
- }
-@@ -524,9 +537,10 @@ static int restore_write_data(VmaReader *vmar, guint8 dev_id,
-     }
-     return 0;
- }
-+
- static int restore_extent(VmaReader *vmar, unsigned char *buf,
-                           int extent_size, int vmstate_fd,
--                          bool verbose, Error **errp)
-+                          bool verbose, bool verify, Error **errp)
- {
-     assert(vmar);
-     assert(buf);
-@@ -551,7 +565,7 @@ static int restore_extent(VmaReader *vmar, unsigned char *buf,
-         if (dev_id != vmar->vmstate_stream) {
-             bs = rstate->bs;
--            if (!bs) {
-+            if (!verify && !bs) {
-                 error_setg(errp, "got wrong dev id %d", dev_id);
-                 return -1;
-             }
-@@ -607,10 +621,13 @@ static int restore_extent(VmaReader *vmar, unsigned char *buf,
-                 return -1;
-             }
--            int nb_sectors = end_sector - sector_num;
--            if (restore_write_data(vmar, dev_id, bs, vmstate_fd, buf + start,
--                                   sector_num, nb_sectors, errp) < 0) {
--                return -1;
-+            if (!verify) {
-+                int nb_sectors = end_sector - sector_num;
-+                if (restore_write_data(vmar, dev_id, bs, vmstate_fd,
-+                                       buf + start, sector_num, nb_sectors,
-+                                       errp) < 0) {
-+                    return -1;
-+                }
-             }
-             start += VMA_CLUSTER_SIZE;
-@@ -640,26 +657,37 @@ static int restore_extent(VmaReader *vmar, unsigned char *buf,
-                         return -1;
-                     }
--                    int nb_sectors = end_sector - sector_num;
--                    if (restore_write_data(vmar, dev_id, bs, vmstate_fd,
--                                           buf + start, sector_num,
--                                           nb_sectors, errp) < 0) {
--                        return -1;
-+                    if (!verify) {
-+                        int nb_sectors = end_sector - sector_num;
-+                        if (restore_write_data(vmar, dev_id, bs, vmstate_fd,
-+                                               buf + start, sector_num,
-+                                               nb_sectors, errp) < 0) {
-+                            return -1;
-+                        }
-                     }
-                     start += VMA_BLOCK_SIZE;
-                 } else {
--                    if (rstate->write_zeroes && (end_sector > sector_num)) {
-+
-+                    if (end_sector > sector_num) {
-                         /* Todo: use bdrv_co_write_zeroes (but that need to
-                          * be run inside coroutine?)
-                          */
-                         int nb_sectors = end_sector - sector_num;
--                        if (restore_write_data(vmar, dev_id, bs, vmstate_fd,
--                                              zero_vma_block, sector_num,
--                                               nb_sectors, errp) < 0) {
--                            return -1;
-+                        int zero_size = BDRV_SECTOR_SIZE*nb_sectors;
-+                        vmar->zero_cluster_data += zero_size;
-+                        if (mask != 0) {
-+                            vmar->partial_zero_cluster_data += zero_size;
-+                        }
-+
-+                        if (rstate->write_zeroes && !verify) {
-+                            if (restore_write_data(vmar, dev_id, bs, vmstate_fd,
-+                                                   zero_vma_block, sector_num,
-+                                                   nb_sectors, errp) < 0) {
-+                                return -1;
-+                            }
-                         }
-                     }
-                 }
-@@ -677,8 +705,9 @@ static int restore_extent(VmaReader *vmar, unsigned char *buf,
-     return 0;
- }
--int vma_reader_restore(VmaReader *vmar, int vmstate_fd, bool verbose,
--                       Error **errp)
-+static int vma_reader_restore_full(VmaReader *vmar, int vmstate_fd,
-+                                   bool verbose, bool verify,
-+                                   Error **errp)
- {
-     assert(vmar);
-     assert(vmar->head_data);
-@@ -745,7 +774,7 @@ int vma_reader_restore(VmaReader *vmar, int vmstate_fd, bool verbose,
-         }
-         if (restore_extent(vmar, buf, extent_size, vmstate_fd, verbose,
--                           errp) < 0) {
-+                           verify, errp) < 0) {
-             return -1;
-         }
-@@ -792,6 +821,38 @@ int vma_reader_restore(VmaReader *vmar, int vmstate_fd, bool verbose,
-         }
-     }
-+    if (verbose) {
-+        printf("total bytes read %zd, sparse bytes %zd (%.3g%%)\n",
-+               vmar->clusters_read*VMA_CLUSTER_SIZE,
-+               vmar->zero_cluster_data,
-+               (double)(100.0*vmar->zero_cluster_data)/
-+               (vmar->clusters_read*VMA_CLUSTER_SIZE));
-+
-+        int64_t datasize = vmar->clusters_read*VMA_CLUSTER_SIZE-vmar->zero_cluster_data;
-+        if (datasize) { // this does not make sense for empty files
-+            printf("space reduction due to 4K zero blocks %.3g%%\n",
-+                   (double)(100.0*vmar->partial_zero_cluster_data) / datasize);
-+        }
-+    }
-     return ret;
- }
-+int vma_reader_restore(VmaReader *vmar, int vmstate_fd, bool verbose,
-+                       Error **errp)
-+{
-+    return vma_reader_restore_full(vmar, vmstate_fd, verbose, false, errp);
-+}
-+
-+int vma_reader_verify(VmaReader *vmar, bool verbose, Error **errp)
-+{
-+    guint8 dev_id;
-+
-+    for (dev_id = 1; dev_id < 255; dev_id++) {
-+        if (vma_reader_get_device_info(vmar, dev_id)) {
-+            allocate_rstate(vmar, dev_id, NULL, false);
-+        }
-+    }
-+
-+    return vma_reader_restore_full(vmar, -1, verbose, true, errp);
-+}
-+
-diff --git a/vma.c b/vma.c
-index 8732bfa85e..ab7b766014 100644
---- a/vma.c
-+++ b/vma.c
-@@ -29,6 +29,7 @@ static void help(void)
-         "vma list <filename>\n"
-         "vma create <filename> [-c config] <archive> pathname ...\n"
-         "vma extract <filename> [-r <fifo>] <targetdir>\n"
-+        "vma verify <filename> [-v]\n"
-         ;
-     printf("%s", help_msg);
-@@ -333,6 +334,58 @@ static int extract_content(int argc, char **argv)
-     return ret;
- }
-+static int verify_content(int argc, char **argv)
-+{
-+    int c, ret = 0;
-+    int verbose = 0;
-+    const char *filename;
-+
-+    for (;;) {
-+        c = getopt(argc, argv, "hv");
-+        if (c == -1) {
-+            break;
-+        }
-+        switch (c) {
-+        case '?':
-+        case 'h':
-+            help();
-+            break;
-+        case 'v':
-+            verbose = 1;
-+            break;
-+        default:
-+            help();
-+        }
-+    }
-+
-+    /* Get the filename */
-+    if ((optind + 1) != argc) {
-+        help();
-+    }
-+    filename = argv[optind++];
-+
-+    Error *errp = NULL;
-+    VmaReader *vmar = vma_reader_create(filename, &errp);
-+
-+    if (!vmar) {
-+        g_error("%s", error_get_pretty(errp));
-+    }
-+
-+    if (verbose) {
-+        print_content(vmar);
-+    }
-+
-+    if (vma_reader_verify(vmar, verbose, &errp) < 0) {
-+        g_error("verify failed - %s", error_get_pretty(errp));
-+    }
-+
-+    vma_reader_destroy(vmar);
-+
-+    bdrv_close_all();
-+
-+    return ret;
-+}
-+
- typedef struct BackupJob {
-     BlockDriverState *bs;
-     int64_t len;
-@@ -579,6 +632,8 @@ int main(int argc, char **argv)
-         return create_archive(argc, argv);
-     } else if (!strcmp(cmdname, "extract")) {
-         return extract_content(argc, argv);
-+    } else if (!strcmp(cmdname, "verify")) {
-+        return verify_content(argc, argv);
-     }
-     help();
-diff --git a/vma.h b/vma.h
-index 6625eb95c6..9bb6ea4f69 100644
---- a/vma.h
-+++ b/vma.h
-@@ -142,5 +142,6 @@ int vma_reader_register_bs(VmaReader *vmar, guint8 dev_id,
-                            Error **errp);
- int vma_reader_restore(VmaReader *vmar, int vmstate_fd, bool verbose,
-                        Error **errp);
-+int vma_reader_verify(VmaReader *vmar, bool verbose, Error **errp);
- #endif /* BACKUP_VMA_H */
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0013-smm_available-false.patch b/debian/patches/pve/0013-smm_available-false.patch
new file mode 100644 (file)
index 0000000..a4a4599
--- /dev/null
@@ -0,0 +1,26 @@
+From 3afb3d14378cc401e37dafd8437cfc45cce2aaea Mon Sep 17 00:00:00 2001
+From: Alexandre Derumier <aderumier@odiso.com>
+Date: Tue, 29 Sep 2015 15:37:44 +0200
+Subject: [PATCH 13/28] smm_available = false
+
+Signed-off-by: Alexandre Derumier <aderumier@odiso.com>
+---
+ hw/i386/pc.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/hw/i386/pc.c b/hw/i386/pc.c
+index 81e91a4897..4161a45dc0 100644
+--- a/hw/i386/pc.c
++++ b/hw/i386/pc.c
+@@ -2123,7 +2123,7 @@ bool pc_machine_is_smm_enabled(PCMachineState *pcms)
+     if (tcg_enabled() || qtest_enabled()) {
+         smm_available = true;
+     } else if (kvm_enabled()) {
+-        smm_available = kvm_has_smm();
++        smm_available = false;
+     }
+     if (smm_available) {
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0013-vma-add-config-command-to-dump-the-config.patch b/debian/patches/pve/0013-vma-add-config-command-to-dump-the-config.patch
deleted file mode 100644 (file)
index 9dbe832..0000000
+++ /dev/null
@@ -1,101 +0,0 @@
-From 7462043311f01c05c98a1f60f696ac4b465a7f38 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 14:46:49 +0100
-Subject: [PATCH 13/49] vma: add 'config' command to dump the config
-
----
- vma.c | 64 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- 1 file changed, 64 insertions(+)
-
-diff --git a/vma.c b/vma.c
-index ab7b766014..89254070c4 100644
---- a/vma.c
-+++ b/vma.c
-@@ -27,6 +27,7 @@ static void help(void)
-         "usage: vma command [command options]\n"
-         "\n"
-         "vma list <filename>\n"
-+        "vma config <filename> [-c config]\n"
-         "vma create <filename> [-c config] <archive> pathname ...\n"
-         "vma extract <filename> [-r <fifo>] <targetdir>\n"
-         "vma verify <filename> [-v]\n"
-@@ -605,6 +606,67 @@ static int create_archive(int argc, char **argv)
-     return 0;
- }
-+static int dump_config(int argc, char **argv)
-+{
-+    int c, ret = 0;
-+    const char *filename;
-+    const char *config_name = "qemu-server.conf";
-+
-+    for (;;) {
-+        c = getopt(argc, argv, "hc:");
-+        if (c == -1) {
-+            break;
-+        }
-+        switch (c) {
-+        case '?':
-+        case 'h':
-+            help();
-+            break;
-+        case 'c':
-+            config_name = optarg;
-+            break;
-+        default:
-+            help();
-+        }
-+    }
-+
-+    /* Get the filename */
-+    if ((optind + 1) != argc) {
-+        help();
-+    }
-+    filename = argv[optind++];
-+
-+    Error *errp = NULL;
-+    VmaReader *vmar = vma_reader_create(filename, &errp);
-+
-+    if (!vmar) {
-+        g_error("%s", error_get_pretty(errp));
-+    }
-+
-+    int found = 0;
-+    GList *l = vma_reader_get_config_data(vmar);
-+    while (l && l->data) {
-+        VmaConfigData *cdata = (VmaConfigData *)l->data;
-+        l = g_list_next(l);
-+        if (strcmp(cdata->name, config_name) == 0) {
-+            found = 1;
-+            fwrite(cdata->data,  cdata->len, 1, stdout);
-+            break;
-+        }
-+    }
-+
-+    vma_reader_destroy(vmar);
-+
-+    bdrv_close_all();
-+
-+    if (!found) {
-+        fprintf(stderr, "unable to find configuration data '%s'\n", config_name);
-+        return -1;
-+    }
-+
-+    return ret;
-+}
-+
- int main(int argc, char **argv)
- {
-     const char *cmdname;
-@@ -634,6 +696,8 @@ int main(int argc, char **argv)
-         return extract_content(argc, argv);
-     } else if (!strcmp(cmdname, "verify")) {
-         return verify_content(argc, argv);
-+    } else if (!strcmp(cmdname, "config")) {
-+        return dump_config(argc, argv);
-     }
-     help();
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0014-backup-modify-job-api.patch b/debian/patches/pve/0014-backup-modify-job-api.patch
deleted file mode 100644 (file)
index 29d9bab..0000000
+++ /dev/null
@@ -1,292 +0,0 @@
-From 18f7a9b94a81e794c66e6e9d1ca7a9dafb1d17cb Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 15:04:57 +0100
-Subject: [PATCH 14/49] backup: modify job api
-
-Introduces a BackupDump function callback and a pause_count
-for backup_start. For a dump-backup the target parameter
-can now be NULL so access to target needs to be guarded now.
----
- block/backup.c            | 118 +++++++++++++++++++++++++++++-----------------
- block/replication.c       |   3 +-
- blockdev.c                |   4 +-
- include/block/block_int.h |   5 ++
- 4 files changed, 83 insertions(+), 47 deletions(-)
-
-diff --git a/block/backup.c b/block/backup.c
-index a4fb2884f9..fe4ce7f504 100644
---- a/block/backup.c
-+++ b/block/backup.c
-@@ -36,6 +36,7 @@ typedef struct BackupBlockJob {
-     BdrvDirtyBitmap *sync_bitmap;
-     MirrorSyncMode sync_mode;
-     RateLimit limit;
-+    BackupDumpFunc *dump_cb;
-     BlockdevOnError on_source_error;
-     BlockdevOnError on_target_error;
-     CoRwlock flush_rwlock;
-@@ -145,13 +146,24 @@ static int coroutine_fn backup_do_cow(BackupBlockJob *job,
-             goto out;
-         }
-+        int64_t start_sec = start * sectors_per_cluster;
-         if (buffer_is_zero(iov.iov_base, iov.iov_len)) {
--            ret = blk_co_pwrite_zeroes(job->target, start * job->cluster_size,
--                                       bounce_qiov.size, BDRV_REQ_MAY_UNMAP);
-+            if (job->dump_cb) {
-+                ret = job->dump_cb(job->common.opaque, job->target, start_sec, n, NULL);
-+            }
-+            if (job->target) {
-+                ret = blk_co_pwrite_zeroes(job->target, start * job->cluster_size,
-+                                           bounce_qiov.size, BDRV_REQ_MAY_UNMAP);
-+            }
-         } else {
--            ret = blk_co_pwritev(job->target, start * job->cluster_size,
--                                 bounce_qiov.size, &bounce_qiov,
--                                 job->compress ? BDRV_REQ_WRITE_COMPRESSED : 0);
-+            if (job->dump_cb) {
-+                ret = job->dump_cb(job->common.opaque, job->target, start_sec, n, bounce_buffer);
-+            }
-+            if (job->target) {
-+                ret = blk_co_pwritev(job->target, start * job->cluster_size,
-+                                     bounce_qiov.size, &bounce_qiov,
-+                                     job->compress ? BDRV_REQ_WRITE_COMPRESSED : 0);
-+            }
-         }
-         if (ret < 0) {
-             trace_backup_do_cow_write_fail(job, start, ret);
-@@ -246,6 +258,8 @@ static void backup_abort(BlockJob *job)
- static void backup_clean(BlockJob *job)
- {
-     BackupBlockJob *s = container_of(job, BackupBlockJob, common);
-+    if (!s->target)
-+        return;
-     assert(s->target);
-     blk_unref(s->target);
-     s->target = NULL;
-@@ -330,9 +344,11 @@ static BlockErrorAction backup_error_action(BackupBlockJob *job,
-     if (read) {
-         return block_job_error_action(&job->common, job->on_source_error,
-                                       true, error);
--    } else {
-+    } else if (job->target) {
-         return block_job_error_action(&job->common, job->on_target_error,
-                                       false, error);
-+    } else {
-+        return BLOCK_ERROR_ACTION_REPORT;
-     }
- }
-@@ -453,6 +469,7 @@ static void coroutine_fn backup_run(void *opaque)
-     job->done_bitmap = bitmap_new(end);
-+
-     job->before_write.notify = backup_before_write_notify;
-     bdrv_add_before_write_notifier(bs, &job->before_write);
-@@ -557,7 +574,9 @@ BlockJob *backup_job_create(const char *job_id, BlockDriverState *bs,
-                   BlockdevOnError on_source_error,
-                   BlockdevOnError on_target_error,
-                   int creation_flags,
-+                  BackupDumpFunc *dump_cb,
-                   BlockCompletionFunc *cb, void *opaque,
-+                  int pause_count,
-                   BlockJobTxn *txn, Error **errp)
- {
-     int64_t len;
-@@ -566,7 +585,7 @@ BlockJob *backup_job_create(const char *job_id, BlockDriverState *bs,
-     int ret;
-     assert(bs);
--    assert(target);
-+    assert(target || dump_cb);
-     if (bs == target) {
-         error_setg(errp, "Source and target cannot be the same");
-@@ -579,13 +598,13 @@ BlockJob *backup_job_create(const char *job_id, BlockDriverState *bs,
-         return NULL;
-     }
--    if (!bdrv_is_inserted(target)) {
-+    if (target && !bdrv_is_inserted(target)) {
-         error_setg(errp, "Device is not inserted: %s",
-                    bdrv_get_device_name(target));
-         return NULL;
-     }
--    if (compress && target->drv->bdrv_co_pwritev_compressed == NULL) {
-+    if (target && compress && target->drv->bdrv_co_pwritev_compressed == NULL) {
-         error_setg(errp, "Compression is not supported for this drive %s",
-                    bdrv_get_device_name(target));
-         return NULL;
-@@ -595,7 +614,7 @@ BlockJob *backup_job_create(const char *job_id, BlockDriverState *bs,
-         return NULL;
-     }
--    if (bdrv_op_is_blocked(target, BLOCK_OP_TYPE_BACKUP_TARGET, errp)) {
-+    if (target && bdrv_op_is_blocked(target, BLOCK_OP_TYPE_BACKUP_TARGET, errp)) {
-         return NULL;
-     }
-@@ -635,15 +654,18 @@ BlockJob *backup_job_create(const char *job_id, BlockDriverState *bs,
-         goto error;
-     }
--    /* The target must match the source in size, so no resize here either */
--    job->target = blk_new(BLK_PERM_WRITE,
--                          BLK_PERM_CONSISTENT_READ | BLK_PERM_WRITE |
--                          BLK_PERM_WRITE_UNCHANGED | BLK_PERM_GRAPH_MOD);
--    ret = blk_insert_bs(job->target, target, errp);
--    if (ret < 0) {
--        goto error;
-+    if (target) {
-+        /* The target must match the source in size, so no resize here either */
-+        job->target = blk_new(BLK_PERM_WRITE,
-+                              BLK_PERM_CONSISTENT_READ | BLK_PERM_WRITE |
-+                              BLK_PERM_WRITE_UNCHANGED | BLK_PERM_GRAPH_MOD);
-+        ret = blk_insert_bs(job->target, target, errp);
-+        if (ret < 0) {
-+            goto error;
-+        }
-     }
-+    job->dump_cb = dump_cb;
-     job->on_source_error = on_source_error;
-     job->on_target_error = on_target_error;
-     job->sync_mode = sync_mode;
-@@ -651,36 +673,44 @@ BlockJob *backup_job_create(const char *job_id, BlockDriverState *bs,
-                        sync_bitmap : NULL;
-     job->compress = compress;
--    /* If there is no backing file on the target, we cannot rely on COW if our
--     * backup cluster size is smaller than the target cluster size. Even for
--     * targets with a backing file, try to avoid COW if possible. */
--    ret = bdrv_get_info(target, &bdi);
--    if (ret == -ENOTSUP && !target->backing) {
--        /* Cluster size is not defined */
--        error_report("WARNING: The target block device doesn't provide "
--                     "information about the block size and it doesn't have a "
--                     "backing file. The default block size of %u bytes is "
--                     "used. If the actual block size of the target exceeds "
--                     "this default, the backup may be unusable",
--                     BACKUP_CLUSTER_SIZE_DEFAULT);
--        job->cluster_size = BACKUP_CLUSTER_SIZE_DEFAULT;
--    } else if (ret < 0 && !target->backing) {
--        error_setg_errno(errp, -ret,
--            "Couldn't determine the cluster size of the target image, "
--            "which has no backing file");
--        error_append_hint(errp,
--            "Aborting, since this may create an unusable destination image\n");
--        goto error;
--    } else if (ret < 0 && target->backing) {
--        /* Not fatal; just trudge on ahead. */
--        job->cluster_size = BACKUP_CLUSTER_SIZE_DEFAULT;
-+    if (target) {
-+        /* If there is no backing file on the target, we cannot rely on COW if our
-+         * backup cluster size is smaller than the target cluster size. Even for
-+         * targets with a backing file, try to avoid COW if possible. */
-+        ret = bdrv_get_info(target, &bdi);
-+        if (ret == -ENOTSUP && !target->backing) {
-+            /* Cluster size is not defined */
-+            error_report("WARNING: The target block device doesn't provide "
-+                         "information about the block size and it doesn't have a "
-+                         "backing file. The default block size of %u bytes is "
-+                         "used. If the actual block size of the target exceeds "
-+                         "this default, the backup may be unusable",
-+                         BACKUP_CLUSTER_SIZE_DEFAULT);
-+            job->cluster_size = BACKUP_CLUSTER_SIZE_DEFAULT;
-+        } else if (ret < 0 && !target->backing) {
-+            error_setg_errno(errp, -ret,
-+                "Couldn't determine the cluster size of the target image, "
-+                "which has no backing file");
-+            error_append_hint(errp,
-+                "Aborting, since this may create an unusable destination image\n");
-+            goto error;
-+        } else if (ret < 0 && target->backing) {
-+            /* Not fatal; just trudge on ahead. */
-+            job->cluster_size = BACKUP_CLUSTER_SIZE_DEFAULT;
-+        } else {
-+            job->cluster_size = BACKUP_CLUSTER_SIZE_DEFAULT;
-+        }
-     } else {
--        job->cluster_size = MAX(BACKUP_CLUSTER_SIZE_DEFAULT, bdi.cluster_size);
-+        job->cluster_size = BACKUP_CLUSTER_SIZE_DEFAULT;
-     }
--    /* Required permissions are already taken with target's blk_new() */
--    block_job_add_bdrv(&job->common, "target", target, 0, BLK_PERM_ALL,
--                       &error_abort);
-+    if (target) {
-+        /* Required permissions are already taken with target's blk_new() */
-+        block_job_add_bdrv(&job->common, "target", target, 0, BLK_PERM_ALL,
-+                           &error_abort);
-+    } else {
-+        job->common.pause_count = pause_count;
-+    }
-     job->common.len = len;
-     block_job_txn_add_job(txn, &job->common);
-diff --git a/block/replication.c b/block/replication.c
-index bf3c395eb4..60c6524417 100644
---- a/block/replication.c
-+++ b/block/replication.c
-@@ -531,7 +531,8 @@ static void replication_start(ReplicationState *rs, ReplicationMode mode,
-                                 0, MIRROR_SYNC_MODE_NONE, NULL, false,
-                                 BLOCKDEV_ON_ERROR_REPORT,
-                                 BLOCKDEV_ON_ERROR_REPORT, BLOCK_JOB_INTERNAL,
--                                backup_job_completed, bs, NULL, &local_err);
-+                                NULL,
-+                                backup_job_completed, bs, 0, NULL, &local_err);
-         if (local_err) {
-             error_propagate(errp, local_err);
-             backup_job_cleanup(bs);
-diff --git a/blockdev.c b/blockdev.c
-index 4927914ce3..5ddd363a33 100644
---- a/blockdev.c
-+++ b/blockdev.c
-@@ -3273,7 +3273,7 @@ static BlockJob *do_drive_backup(DriveBackup *backup, BlockJobTxn *txn,
-     job = backup_job_create(backup->job_id, bs, target_bs, backup->speed,
-                             backup->sync, bmap, backup->compress,
-                             backup->on_source_error, backup->on_target_error,
--                            BLOCK_JOB_DEFAULT, NULL, NULL, txn, &local_err);
-+                            BLOCK_JOB_DEFAULT, NULL, NULL, NULL, 0, txn, &local_err);
-     bdrv_unref(target_bs);
-     if (local_err != NULL) {
-         error_propagate(errp, local_err);
-@@ -3352,7 +3352,7 @@ BlockJob *do_blockdev_backup(BlockdevBackup *backup, BlockJobTxn *txn,
-     job = backup_job_create(backup->job_id, bs, target_bs, backup->speed,
-                             backup->sync, NULL, backup->compress,
-                             backup->on_source_error, backup->on_target_error,
--                            BLOCK_JOB_DEFAULT, NULL, NULL, txn, &local_err);
-+                            BLOCK_JOB_DEFAULT, NULL, NULL, NULL, 0, txn, &local_err);
-     if (local_err != NULL) {
-         error_propagate(errp, local_err);
-     }
-diff --git a/include/block/block_int.h b/include/block/block_int.h
-index 59400bd848..ec655815ca 100644
---- a/include/block/block_int.h
-+++ b/include/block/block_int.h
-@@ -59,6 +59,9 @@
- #define BLOCK_PROBE_BUF_SIZE        512
-+typedef int BackupDumpFunc(void *opaque, BlockDriverState *bs,
-+                           int64_t sector_num, int n_sectors, unsigned char *buf);
-+
- enum BdrvTrackedRequestType {
-     BDRV_TRACKED_READ,
-     BDRV_TRACKED_WRITE,
-@@ -877,7 +880,9 @@ BlockJob *backup_job_create(const char *job_id, BlockDriverState *bs,
-                             BlockdevOnError on_source_error,
-                             BlockdevOnError on_target_error,
-                             int creation_flags,
-+                            BackupDumpFunc *dump_cb,
-                             BlockCompletionFunc *cb, void *opaque,
-+                            int pause_count,
-                             BlockJobTxn *txn, Error **errp);
- void hmp_drive_add_node(Monitor *mon, const char *optstr);
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0014-use-whitespace-between-VERSION-and-PKGVERSION.patch b/debian/patches/pve/0014-use-whitespace-between-VERSION-and-PKGVERSION.patch
new file mode 100644 (file)
index 0000000..c0e5d67
--- /dev/null
@@ -0,0 +1,27 @@
+From 8f6787a80cafc259d2247a294ea657aee0928488 Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Wed, 9 Dec 2015 16:50:05 +0100
+Subject: [PATCH 14/28] use whitespace between VERSION and PKGVERSION
+
+Our kvm version parser expects a white space or comma after
+the version string, see PVE::QemuServer::kvm_user_version()
+---
+ vl.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/vl.c b/vl.c
+index 19afd47871..d0780a41b4 100644
+--- a/vl.c
++++ b/vl.c
+@@ -1909,7 +1909,7 @@ static void main_loop(void)
+ static void version(void)
+ {
+-    printf("QEMU emulator version " QEMU_VERSION QEMU_PKGVERSION "\n"
++    printf("QEMU emulator version " QEMU_VERSION " " QEMU_PKGVERSION "\n"
+            QEMU_COPYRIGHT "\n");
+ }
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0015-backup-add-pve-monitor-commands.patch b/debian/patches/pve/0015-backup-add-pve-monitor-commands.patch
deleted file mode 100644 (file)
index e1c3cf9..0000000
+++ /dev/null
@@ -1,830 +0,0 @@
-From 4919cc7182665534c0ba82203b10a6ead1d41d03 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 15:20:56 +0100
-Subject: [PATCH 15/49] backup: add pve monitor commands
-
----
- blockdev.c                | 465 ++++++++++++++++++++++++++++++++++++++++++++++
- blockjob.c                |  11 +-
- hmp-commands-info.hx      |  13 ++
- hmp-commands.hx           |  29 +++
- hmp.c                     |  61 ++++++
- hmp.h                     |   3 +
- include/block/block_int.h |   2 +-
- qapi-schema.json          |  90 +++++++++
- 8 files changed, 668 insertions(+), 6 deletions(-)
-
-diff --git a/blockdev.c b/blockdev.c
-index 5ddd363a33..58cf5d3c80 100644
---- a/blockdev.c
-+++ b/blockdev.c
-@@ -35,6 +35,7 @@
- #include "sysemu/blockdev.h"
- #include "hw/block/block.h"
- #include "block/blockjob.h"
-+#include "block/blockjob_int.h"
- #include "block/throttle-groups.h"
- #include "monitor/monitor.h"
- #include "qemu/error-report.h"
-@@ -53,6 +54,7 @@
- #include "qemu/cutils.h"
- #include "qemu/help_option.h"
- #include "qemu/throttle-options.h"
-+#include "vma.h"
- static QTAILQ_HEAD(, BlockDriverState) monitor_bdrv_states =
-     QTAILQ_HEAD_INITIALIZER(monitor_bdrv_states);
-@@ -2956,6 +2958,469 @@ out:
-     aio_context_release(aio_context);
- }
-+void block_job_event_cancelled(BlockJob *job);
-+void block_job_event_completed(BlockJob *job, const char *msg);
-+static void block_job_cb(void *opaque, int ret)
-+{
-+    /* Note that this function may be executed from another AioContext besides
-+     * the QEMU main loop.  If you need to access anything that assumes the
-+     * QEMU global mutex, use a BH or introduce a mutex.
-+     */
-+
-+    BlockDriverState *bs = opaque;
-+    const char *msg = NULL;
-+
-+    assert(bs->job);
-+
-+    if (ret < 0) {
-+        msg = strerror(-ret);
-+    }
-+
-+    if (block_job_is_cancelled(bs->job)) {
-+        block_job_event_cancelled(bs->job);
-+    } else {
-+        block_job_event_completed(bs->job, msg);
-+    }
-+}
-+
-+/* PVE backup related function */
-+
-+static struct PVEBackupState {
-+    Error *error;
-+    bool cancel;
-+    uuid_t uuid;
-+    char uuid_str[37];
-+    int64_t speed;
-+    time_t start_time;
-+    time_t end_time;
-+    char *backup_file;
-+    VmaWriter *vmaw;
-+    GList *di_list;
-+    size_t total;
-+    size_t transferred;
-+    size_t zero_bytes;
-+} backup_state;
-+
-+typedef struct PVEBackupDevInfo {
-+    BlockDriverState *bs;
-+    size_t size;
-+    uint8_t dev_id;
-+    //bool started;
-+    bool completed;
-+} PVEBackupDevInfo;
-+
-+static void pvebackup_run_next_job(void);
-+
-+static int pvebackup_dump_cb(void *opaque, BlockBackend *target,
-+                             int64_t sector_num, int n_sectors,
-+                             unsigned char *buf)
-+{
-+    PVEBackupDevInfo *di = opaque;
-+
-+    if (sector_num & 0x7f) {
-+        if (!backup_state.error) {
-+            error_setg(&backup_state.error,
-+                       "got unaligned write inside backup dump "
-+                       "callback (sector %ld)", sector_num);
-+        }
-+        return -1; // not aligned to cluster size
-+    }
-+
-+    int64_t cluster_num = sector_num >> 7;
-+    int size = n_sectors * BDRV_SECTOR_SIZE;
-+
-+    int ret = -1;
-+
-+    if (backup_state.vmaw) {
-+        size_t zero_bytes = 0;
-+        ret = vma_writer_write(backup_state.vmaw, di->dev_id, cluster_num,
-+                               buf, &zero_bytes);
-+        backup_state.zero_bytes += zero_bytes;
-+    } else {
-+        ret = size;
-+        if (!buf) {
-+            backup_state.zero_bytes += size;
-+        }
-+    }
-+
-+    backup_state.transferred += size;
-+
-+    return ret;
-+}
-+
-+static void pvebackup_cleanup(void)
-+{
-+    backup_state.end_time = time(NULL);
-+
-+    if (backup_state.vmaw) {
-+        Error *local_err = NULL;
-+        vma_writer_close(backup_state.vmaw, &local_err);
-+        error_propagate(&backup_state.error, local_err);
-+        backup_state.vmaw = NULL;
-+    }
-+
-+    if (backup_state.di_list) {
-+        GList *l = backup_state.di_list;
-+        while (l) {
-+            PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
-+            l = g_list_next(l);
-+            g_free(di);
-+        }
-+        g_list_free(backup_state.di_list);
-+        backup_state.di_list = NULL;
-+    }
-+}
-+
-+static void pvebackup_complete_cb(void *opaque, int ret)
-+{
-+    PVEBackupDevInfo *di = opaque;
-+
-+    assert(backup_state.vmaw);
-+
-+    di->completed = true;
-+
-+    if (ret < 0 && !backup_state.error) {
-+        error_setg(&backup_state.error, "job failed with err %d - %s",
-+                   ret, strerror(-ret));
-+    }
-+
-+    BlockDriverState *bs = di->bs;
-+
-+    di->bs = NULL;
-+
-+    vma_writer_close_stream(backup_state.vmaw, di->dev_id);
-+
-+    block_job_cb(bs, ret);
-+
-+    if (!backup_state.cancel) {
-+        pvebackup_run_next_job();
-+    }
-+}
-+
-+static void pvebackup_cancel(void *opaque)
-+{
-+    backup_state.cancel = true;
-+
-+    if (!backup_state.error) {
-+        error_setg(&backup_state.error, "backup cancelled");
-+    }
-+
-+    /* drain all i/o (awake jobs waiting for aio) */
-+    bdrv_drain_all();
-+
-+    GList *l = backup_state.di_list;
-+    while (l) {
-+        PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
-+        l = g_list_next(l);
-+        if (!di->completed && di->bs) {
-+            BlockJob *job = di->bs->job;
-+            if (job) {
-+                if (!di->completed) {
-+                    block_job_cancel_sync(job);
-+                }
-+            }
-+        }
-+    }
-+
-+    pvebackup_cleanup();
-+}
-+
-+void qmp_backup_cancel(Error **errp)
-+{
-+    Coroutine *co = qemu_coroutine_create(pvebackup_cancel, NULL);
-+    qemu_coroutine_enter(co);
-+
-+    while (backup_state.vmaw) {
-+        /* vma writer use main aio context */
-+        aio_poll(qemu_get_aio_context(), true);
-+    }
-+}
-+
-+bool block_job_should_pause(BlockJob *job);
-+static void pvebackup_run_next_job(void)
-+{
-+    GList *l = backup_state.di_list;
-+    while (l) {
-+        PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
-+        l = g_list_next(l);
-+        if (!di->completed && di->bs && di->bs->job) {
-+            BlockJob *job = di->bs->job;
-+            if (block_job_should_pause(job)) {
-+                bool cancel = backup_state.error || backup_state.cancel;
-+                if (cancel) {
-+                    block_job_cancel(job);
-+                } else {
-+                    block_job_resume(job);
-+                }
-+            }
-+            return;
-+        }
-+    }
-+
-+    pvebackup_cleanup();
-+}
-+
-+UuidInfo *qmp_backup(const char *backup_file, bool has_format,
-+                    BackupFormat format,
-+                    bool has_config_file, const char *config_file,
-+                    bool has_devlist, const char *devlist,
-+                    bool has_speed, int64_t speed, Error **errp)
-+{
-+    BlockBackend *blk;
-+    BlockDriverState *bs = NULL;
-+    Error *local_err = NULL;
-+    uuid_t uuid;
-+    VmaWriter *vmaw = NULL;
-+    gchar **devs = NULL;
-+    GList *di_list = NULL;
-+    GList *l;
-+    UuidInfo *uuid_info;
-+
-+    if (backup_state.di_list) {
-+        error_set(errp, ERROR_CLASS_GENERIC_ERROR,
-+                  "previous backup not finished");
-+        return NULL;
-+    }
-+
-+    /* Todo: try to auto-detect format based on file name */
-+    format = has_format ? format : BACKUP_FORMAT_VMA;
-+
-+    if (format != BACKUP_FORMAT_VMA) {
-+        error_set(errp, ERROR_CLASS_GENERIC_ERROR, "unknown backup format");
-+        return NULL;
-+    }
-+
-+    if (has_devlist) {
-+        devs = g_strsplit_set(devlist, ",;:", -1);
-+
-+        gchar **d = devs;
-+        while (d && *d) {
-+            blk = blk_by_name(*d);
-+            if (blk) {
-+                bs = blk_bs(blk);
-+                if (bdrv_is_read_only(bs)) {
-+                    error_setg(errp, "Node '%s' is read only", *d);
-+                    goto err;
-+                }
-+                if (!bdrv_is_inserted(bs)) {
-+                    error_setg(errp, QERR_DEVICE_HAS_NO_MEDIUM, *d);
-+                    goto err;
-+                }
-+                PVEBackupDevInfo *di = g_new0(PVEBackupDevInfo, 1);
-+                di->bs = bs;
-+                di_list = g_list_append(di_list, di);
-+            } else {
-+                error_set(errp, ERROR_CLASS_DEVICE_NOT_FOUND,
-+                          "Device '%s' not found", *d);
-+                goto err;
-+            }
-+            d++;
-+        }
-+
-+    } else {
-+        BdrvNextIterator it;
-+
-+        bs = NULL;
-+        for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
-+            if (!bdrv_is_inserted(bs) || bdrv_is_read_only(bs)) {
-+                continue;
-+            }
-+
-+            PVEBackupDevInfo *di = g_new0(PVEBackupDevInfo, 1);
-+            di->bs = bs;
-+            di_list = g_list_append(di_list, di);
-+        }
-+    }
-+
-+    if (!di_list) {
-+        error_set(errp, ERROR_CLASS_GENERIC_ERROR, "empty device list");
-+        goto err;
-+    }
-+
-+    size_t total = 0;
-+
-+    l = di_list;
-+    while (l) {
-+        PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
-+        l = g_list_next(l);
-+        if (bdrv_op_is_blocked(di->bs, BLOCK_OP_TYPE_BACKUP_SOURCE, errp)) {
-+            goto err;
-+        }
-+
-+        ssize_t size = bdrv_getlength(di->bs);
-+        if (size < 0) {
-+            error_setg_errno(errp, -di->size, "bdrv_getlength failed");
-+            goto err;
-+        }
-+        di->size = size;
-+        total += size;
-+    }
-+
-+    uuid_generate(uuid);
-+
-+    vmaw = vma_writer_create(backup_file, uuid, &local_err);
-+    if (!vmaw) {
-+        if (local_err) {
-+            error_propagate(errp, local_err);
-+        }
-+        goto err;
-+    }
-+
-+    /* register all devices for vma writer */
-+    l = di_list;
-+    while (l) {
-+        PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
-+        l = g_list_next(l);
-+
-+        const char *devname = bdrv_get_device_name(di->bs);
-+        di->dev_id = vma_writer_register_stream(vmaw, devname, di->size);
-+        if (di->dev_id <= 0) {
-+            error_set(errp, ERROR_CLASS_GENERIC_ERROR,
-+                      "register_stream failed");
-+            goto err;
-+        }
-+    }
-+
-+    /* add configuration file to archive */
-+    if (has_config_file) {
-+        char *cdata = NULL;
-+        gsize clen = 0;
-+        GError *err = NULL;
-+        if (!g_file_get_contents(config_file, &cdata, &clen, &err)) {
-+            error_setg(errp, "unable to read file '%s'", config_file);
-+            goto err;
-+        }
-+
-+        const char *basename = g_path_get_basename(config_file);
-+        if (vma_writer_add_config(vmaw, basename, cdata, clen) != 0) {
-+            error_setg(errp, "unable to add config data to vma archive");
-+            g_free(cdata);
-+            goto err;
-+        }
-+        g_free(cdata);
-+    }
-+
-+    /* initialize global backup_state now */
-+
-+    backup_state.cancel = false;
-+
-+    if (backup_state.error) {
-+        error_free(backup_state.error);
-+        backup_state.error = NULL;
-+    }
-+
-+    backup_state.speed = (has_speed && speed > 0) ? speed : 0;
-+
-+    backup_state.start_time = time(NULL);
-+    backup_state.end_time = 0;
-+
-+    if (backup_state.backup_file) {
-+        g_free(backup_state.backup_file);
-+    }
-+    backup_state.backup_file = g_strdup(backup_file);
-+
-+    backup_state.vmaw = vmaw;
-+
-+    uuid_copy(backup_state.uuid, uuid);
-+    uuid_unparse_lower(uuid, backup_state.uuid_str);
-+
-+    backup_state.di_list = di_list;
-+
-+    backup_state.total = total;
-+    backup_state.transferred = 0;
-+    backup_state.zero_bytes = 0;
-+
-+    /* start all jobs (paused state) */
-+    l = di_list;
-+    while (l) {
-+        PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
-+        l = g_list_next(l);
-+
-+        backup_job_create(NULL, di->bs, NULL, speed, MIRROR_SYNC_MODE_FULL, NULL,
-+                          BLOCKDEV_ON_ERROR_REPORT, BLOCKDEV_ON_ERROR_REPORT,
-+                          pvebackup_dump_cb, pvebackup_complete_cb, di,
-+                          1, NULL, &local_err);
-+        if (local_err != NULL) {
-+            error_setg(&backup_state.error, "backup_job_create failed");
-+            pvebackup_cancel(NULL);
-+        }
-+    }
-+
-+    if (!backup_state.error) {
-+        pvebackup_run_next_job(); // run one job
-+    }
-+
-+    uuid_info = g_malloc0(sizeof(*uuid_info));
-+    uuid_info->UUID = g_strdup(backup_state.uuid_str);
-+    return uuid_info;
-+
-+err:
-+
-+    l = di_list;
-+    while (l) {
-+        g_free(l->data);
-+        l = g_list_next(l);
-+    }
-+    g_list_free(di_list);
-+
-+    if (devs) {
-+        g_strfreev(devs);
-+    }
-+
-+    if (vmaw) {
-+        Error *err = NULL;
-+        vma_writer_close(vmaw, &err);
-+        unlink(backup_file);
-+    }
-+
-+    return NULL;
-+}
-+
-+BackupStatus *qmp_query_backup(Error **errp)
-+{
-+    BackupStatus *info = g_malloc0(sizeof(*info));
-+
-+    if (!backup_state.start_time) {
-+        /* not started, return {} */
-+        return info;
-+    }
-+
-+    info->has_status = true;
-+    info->has_start_time = true;
-+    info->start_time = backup_state.start_time;
-+
-+    if (backup_state.backup_file) {
-+        info->has_backup_file = true;
-+        info->backup_file = g_strdup(backup_state.backup_file);
-+    }
-+
-+    info->has_uuid = true;
-+    info->uuid = g_strdup(backup_state.uuid_str);
-+
-+    if (backup_state.end_time) {
-+        if (backup_state.error) {
-+            info->status = g_strdup("error");
-+            info->has_errmsg = true;
-+            info->errmsg = g_strdup(error_get_pretty(backup_state.error));
-+        } else {
-+            info->status = g_strdup("done");
-+        }
-+        info->has_end_time = true;
-+        info->end_time = backup_state.end_time;
-+    } else {
-+        info->status = g_strdup("active");
-+    }
-+
-+    info->has_total = true;
-+    info->total = backup_state.total;
-+    info->has_zero_bytes = true;
-+    info->zero_bytes = backup_state.zero_bytes;
-+    info->has_transferred = true;
-+    info->transferred = backup_state.transferred;
-+
-+    return info;
-+}
-+
- void qmp_block_stream(bool has_job_id, const char *job_id, const char *device,
-                       bool has_base, const char *base,
-                       bool has_base_node, const char *base_node,
-diff --git a/blockjob.c b/blockjob.c
-index 6e489327ff..2162b4d3d8 100644
---- a/blockjob.c
-+++ b/blockjob.c
-@@ -37,8 +37,8 @@
- #include "qemu/timer.h"
- #include "qapi-event.h"
--static void block_job_event_cancelled(BlockJob *job);
--static void block_job_event_completed(BlockJob *job, const char *msg);
-+void block_job_event_cancelled(BlockJob *job);
-+void block_job_event_completed(BlockJob *job, const char *msg);
- /* Transactional group of block jobs */
- struct BlockJobTxn {
-@@ -473,7 +473,8 @@ void block_job_user_pause(BlockJob *job)
-     block_job_pause(job);
- }
--static bool block_job_should_pause(BlockJob *job)
-+bool block_job_should_pause(BlockJob *job);
-+bool block_job_should_pause(BlockJob *job)
- {
-     return job->pause_count > 0;
- }
-@@ -687,7 +688,7 @@ static void block_job_iostatus_set_err(BlockJob *job, int error)
-     }
- }
--static void block_job_event_cancelled(BlockJob *job)
-+void block_job_event_cancelled(BlockJob *job)
- {
-     if (block_job_is_internal(job)) {
-         return;
-@@ -701,7 +702,7 @@ static void block_job_event_cancelled(BlockJob *job)
-                                         &error_abort);
- }
--static void block_job_event_completed(BlockJob *job, const char *msg)
-+void block_job_event_completed(BlockJob *job, const char *msg)
- {
-     if (block_job_is_internal(job)) {
-         return;
-diff --git a/hmp-commands-info.hx b/hmp-commands-info.hx
-index a53f105c52..1a1838099f 100644
---- a/hmp-commands-info.hx
-+++ b/hmp-commands-info.hx
-@@ -487,6 +487,19 @@ STEXI
- Show CPU statistics.
- ETEXI
-+    {
-+        .name       = "backup",
-+        .args_type  = "",
-+        .params     = "",
-+        .help       = "show backup status",
-+        .cmd = hmp_info_backup,
-+    },
-+
-+STEXI
-+@item info backup
-+show backup status
-+ETEXI
-+
- #if defined(CONFIG_SLIRP)
-     {
-         .name       = "usernet",
-diff --git a/hmp-commands.hx b/hmp-commands.hx
-index 88192817b2..aea39d0f45 100644
---- a/hmp-commands.hx
-+++ b/hmp-commands.hx
-@@ -87,6 +87,35 @@ STEXI
- Copy data from a backing file into a block device.
- ETEXI
-+   {
-+        .name       = "backup",
-+        .args_type  = "backupfile:s,speed:o?,devlist:s?",
-+        .params     = "backupfile [speed [devlist]]",
-+        .help       = "create a VM Backup.",
-+        .cmd = hmp_backup,
-+    },
-+
-+STEXI
-+@item backup
-+@findex backup
-+Create a VM backup.
-+ETEXI
-+
-+    {
-+        .name       = "backup_cancel",
-+        .args_type  = "",
-+        .params     = "",
-+        .help       = "cancel the current VM backup",
-+        .cmd = hmp_backup_cancel,
-+    },
-+
-+STEXI
-+@item backup_cancel
-+@findex backup_cancel
-+Cancel the current VM backup.
-+
-+ETEXI
-+
-     {
-         .name       = "block_job_set_speed",
-         .args_type  = "device:B,speed:o",
-diff --git a/hmp.c b/hmp.c
-index 904542d026..c685ba507f 100644
---- a/hmp.c
-+++ b/hmp.c
-@@ -151,6 +151,44 @@ void hmp_info_mice(Monitor *mon, const QDict *qdict)
-     qapi_free_MouseInfoList(mice_list);
- }
-+void hmp_info_backup(Monitor *mon, const QDict *qdict)
-+{
-+    BackupStatus *info;
-+
-+    info = qmp_query_backup(NULL);
-+    if (info->has_status) {
-+        if (info->has_errmsg) {
-+            monitor_printf(mon, "Backup status: %s - %s\n",
-+                           info->status, info->errmsg);
-+        } else {
-+            monitor_printf(mon, "Backup status: %s\n", info->status);
-+        }
-+    }
-+
-+    if (info->has_backup_file) {
-+        monitor_printf(mon, "Start time: %s", ctime(&info->start_time));
-+        if (info->end_time) {
-+            monitor_printf(mon, "End time: %s", ctime(&info->end_time));
-+        }
-+
-+        int per = (info->has_total && info->total &&
-+            info->has_transferred && info->transferred) ?
-+            (info->transferred * 100)/info->total : 0;
-+        int zero_per = (info->has_total && info->total &&
-+                        info->has_zero_bytes && info->zero_bytes) ?
-+            (info->zero_bytes * 100)/info->total : 0;
-+        monitor_printf(mon, "Backup file: %s\n", info->backup_file);
-+        monitor_printf(mon, "Backup uuid: %s\n", info->uuid);
-+        monitor_printf(mon, "Total size: %zd\n", info->total);
-+        monitor_printf(mon, "Transferred bytes: %zd (%d%%)\n",
-+                       info->transferred, per);
-+        monitor_printf(mon, "Zero bytes: %zd (%d%%)\n",
-+                       info->zero_bytes, zero_per);
-+    }
-+
-+    qapi_free_BackupStatus(info);
-+}
-+
- void hmp_info_migrate(Monitor *mon, const QDict *qdict)
- {
-     MigrationInfo *info;
-@@ -1613,6 +1651,29 @@ void hmp_block_stream(Monitor *mon, const QDict *qdict)
-     hmp_handle_error(mon, &error);
- }
-+void hmp_backup_cancel(Monitor *mon, const QDict *qdict)
-+{
-+    Error *error = NULL;
-+
-+    qmp_backup_cancel(&error);
-+
-+    hmp_handle_error(mon, &error);
-+}
-+
-+void hmp_backup(Monitor *mon, const QDict *qdict)
-+{
-+    Error *error = NULL;
-+
-+    const char *backup_file = qdict_get_str(qdict, "backupfile");
-+    const char *devlist = qdict_get_try_str(qdict, "devlist");
-+    int64_t speed = qdict_get_try_int(qdict, "speed", 0);
-+
-+    qmp_backup(backup_file, true, BACKUP_FORMAT_VMA, false, NULL, !!devlist,
-+               devlist, qdict_haskey(qdict, "speed"), speed, &error);
-+
-+    hmp_handle_error(mon, &error);
-+}
-+
- void hmp_block_job_set_speed(Monitor *mon, const QDict *qdict)
- {
-     Error *error = NULL;
-diff --git a/hmp.h b/hmp.h
-index 799fd371fa..17a65b2313 100644
---- a/hmp.h
-+++ b/hmp.h
-@@ -30,6 +30,7 @@ void hmp_info_migrate(Monitor *mon, const QDict *qdict);
- void hmp_info_migrate_capabilities(Monitor *mon, const QDict *qdict);
- void hmp_info_migrate_parameters(Monitor *mon, const QDict *qdict);
- void hmp_info_migrate_cache_size(Monitor *mon, const QDict *qdict);
-+void hmp_info_backup(Monitor *mon, const QDict *qdict);
- void hmp_info_cpus(Monitor *mon, const QDict *qdict);
- void hmp_info_block(Monitor *mon, const QDict *qdict);
- void hmp_info_blockstats(Monitor *mon, const QDict *qdict);
-@@ -79,6 +80,8 @@ void hmp_eject(Monitor *mon, const QDict *qdict);
- void hmp_change(Monitor *mon, const QDict *qdict);
- void hmp_block_set_io_throttle(Monitor *mon, const QDict *qdict);
- void hmp_block_stream(Monitor *mon, const QDict *qdict);
-+void hmp_backup(Monitor *mon, const QDict *qdict);
-+void hmp_backup_cancel(Monitor *mon, const QDict *qdict);
- void hmp_block_job_set_speed(Monitor *mon, const QDict *qdict);
- void hmp_block_job_cancel(Monitor *mon, const QDict *qdict);
- void hmp_block_job_pause(Monitor *mon, const QDict *qdict);
-diff --git a/include/block/block_int.h b/include/block/block_int.h
-index ec655815ca..278da161fb 100644
---- a/include/block/block_int.h
-+++ b/include/block/block_int.h
-@@ -59,7 +59,7 @@
- #define BLOCK_PROBE_BUF_SIZE        512
--typedef int BackupDumpFunc(void *opaque, BlockDriverState *bs,
-+typedef int BackupDumpFunc(void *opaque, BlockBackend *be,
-                            int64_t sector_num, int n_sectors, unsigned char *buf);
- enum BdrvTrackedRequestType {
-diff --git a/qapi-schema.json b/qapi-schema.json
-index 1b14ff2476..12d4d20705 100644
---- a/qapi-schema.json
-+++ b/qapi-schema.json
-@@ -570,6 +570,96 @@
- { 'command': 'query-events', 'returns': ['EventInfo'] }
- ##
-+# @BackupStatus:
-+#
-+# Detailed backup status.
-+#
-+# @status: string describing the current backup status.
-+#          This can be 'active', 'done', 'error'. If this field is not
-+#          returned, no backup process has been initiated
-+#
-+# @errmsg: error message (only returned if status is 'error')
-+#
-+# @total: total amount of bytes involved in the backup process
-+#
-+# @transferred: amount of bytes already backed up.
-+#
-+# @zero-bytes: amount of 'zero' bytes detected.
-+#
-+# @start-time: time (epoch) when backup job started.
-+#
-+# @end-time: time (epoch) when backup job finished.
-+#
-+# @backup-file: backup file name
-+#
-+# @uuid: uuid for this backup job
-+#
-+##
-+{ 'struct': 'BackupStatus',
-+  'data': {'*status': 'str', '*errmsg': 'str', '*total': 'int',
-+           '*transferred': 'int', '*zero-bytes': 'int',
-+           '*start-time': 'int', '*end-time': 'int',
-+           '*backup-file': 'str', '*uuid': 'str' } }
-+
-+##
-+# @BackupFormat:
-+#
-+# An enumeration of supported backup formats.
-+#
-+# @vma: Proxmox vma backup format
-+##
-+{ 'enum': 'BackupFormat',
-+  'data': [ 'vma' ] }
-+
-+##
-+# @backup:
-+#
-+# Starts a VM backup.
-+#
-+# @backup-file: the backup file name
-+#
-+# @format: format of the backup file
-+#
-+# @config-file: a configuration file to include into
-+# the backup archive.
-+#
-+# @speed: the maximum speed, in bytes per second
-+#
-+# @devlist: list of block device names (separated by ',', ';'
-+# or ':'). By default the backup includes all writable block devices.
-+#
-+# Returns: the uuid of the backup job
-+#
-+##
-+{ 'command': 'backup', 'data': { 'backup-file': 'str',
-+                                    '*format': 'BackupFormat',
-+                                    '*config-file': 'str',
-+                                    '*devlist': 'str', '*speed': 'int' },
-+  'returns': 'UuidInfo' }
-+
-+##
-+# @query-backup:
-+#
-+# Returns information about current/last backup task.
-+#
-+# Returns: @BackupStatus
-+#
-+##
-+{ 'command': 'query-backup', 'returns': 'BackupStatus' }
-+
-+##
-+# @backup-cancel:
-+#
-+# Cancel the current executing backup process.
-+#
-+# Returns: nothing on success
-+#
-+# Notes: This command succeeds even if there is no backup process running.
-+#
-+##
-+{ 'command': 'backup-cancel' }
-+
-+##
- # @MigrationStats:
- #
- # Detailed migration status.
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0015-vnc-altgr-emulation.patch b/debian/patches/pve/0015-vnc-altgr-emulation.patch
new file mode 100644 (file)
index 0000000..38ad9b6
--- /dev/null
@@ -0,0 +1,65 @@
+From 8c4c8041d0cb8523af453e1d1a8408215db6964f Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Wed, 9 Dec 2015 14:17:38 +0100
+Subject: [PATCH 15/28] vnc: altgr emulation
+
+---
+ ui/vnc.c | 26 +++++++++++++++++++++++++-
+ 1 file changed, 25 insertions(+), 1 deletion(-)
+
+diff --git a/ui/vnc.c b/ui/vnc.c
+index 349cfc9d86..9c8ab42eea 100644
+--- a/ui/vnc.c
++++ b/ui/vnc.c
+@@ -1631,6 +1631,10 @@ static void kbd_leds(void *opaque, int ledstate)
+ static void do_key_event(VncState *vs, int down, int keycode, int sym)
+ {
++    int mods =  keycode & 0xf00;
++
++    keycode &= SCANCODE_KEYMASK;
++
+     /* QEMU console switch */
+     switch(keycode) {
+     case 0x2a:                          /* Left Shift */
+@@ -1711,8 +1715,27 @@ static void do_key_event(VncState *vs, int down, int keycode, int sym)
+     }
+     if (qemu_console_is_graphic(NULL)) {
++
++      /* our java vnc client never sends ALTGR, so we create
++         an artificial up/down event */
++
++      int emul_altgr = (mods & SCANCODE_ALTGR) &&
++          !vs->modifiers_state[0xb8];
++
++      if (emul_altgr) {
++            reset_keys(vs);
++            qemu_input_event_send_key_number(vs->vd->dcl.con, 0xb8, true);
++            qemu_input_event_send_key_delay(vs->vd->key_delay_ms);
++      }
++
+         qemu_input_event_send_key_number(vs->vd->dcl.con, keycode, down);
+         qemu_input_event_send_key_delay(vs->vd->key_delay_ms);
++
++      if (emul_altgr) {
++             qemu_input_event_send_key_number(vs->vd->dcl.con, 0xb8, false);
++             qemu_input_event_send_key_delay(vs->vd->key_delay_ms);
++      }
++
+     } else {
+         bool numlock = vs->modifiers_state[0x45];
+         bool control = (vs->modifiers_state[0x1d] ||
+@@ -1852,7 +1875,8 @@ static void key_event(VncState *vs, int down, uint32_t sym)
+         lsym = lsym - 'A' + 'a';
+     }
+-    keycode = keysym2scancode(vs->vd->kbd_layout, lsym & 0xFFFF) & SCANCODE_KEYMASK;
++    keycode = keysym2scancode(vs->vd->kbd_layout, lsym & 0xFFFF);
++
+     trace_vnc_key_event_map(down, sym, keycode, code2name(keycode));
+     do_key_event(vs, down, keycode, sym);
+ }
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0016-backup-vma-add-dir-format.patch b/debian/patches/pve/0016-backup-vma-add-dir-format.patch
deleted file mode 100644 (file)
index d036289..0000000
+++ /dev/null
@@ -1,315 +0,0 @@
-From 1fc4d337a3935f0e80a78f8b14bdda839257ded9 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 15:21:54 +0100
-Subject: [PATCH 16/49] backup: vma: add dir format
-
----
- blockdev.c       | 137 ++++++++++++++++++++++++++++++++++++++++---------------
- hmp-commands.hx  |   8 ++--
- hmp.c            |   4 +-
- qapi-schema.json |   2 +-
- vma.c            |   2 +-
- 5 files changed, 111 insertions(+), 42 deletions(-)
-
-diff --git a/blockdev.c b/blockdev.c
-index 58cf5d3c80..87e1d1a99e 100644
---- a/blockdev.c
-+++ b/blockdev.c
-@@ -3007,6 +3007,8 @@ typedef struct PVEBackupDevInfo {
-     uint8_t dev_id;
-     //bool started;
-     bool completed;
-+    char targetfile[PATH_MAX];
-+    BlockDriverState *target;
- } PVEBackupDevInfo;
- static void pvebackup_run_next_job(void);
-@@ -3075,8 +3077,6 @@ static void pvebackup_complete_cb(void *opaque, int ret)
- {
-     PVEBackupDevInfo *di = opaque;
--    assert(backup_state.vmaw);
--
-     di->completed = true;
-     if (ret < 0 && !backup_state.error) {
-@@ -3087,8 +3087,11 @@ static void pvebackup_complete_cb(void *opaque, int ret)
-     BlockDriverState *bs = di->bs;
-     di->bs = NULL;
-+    di->target = NULL;
--    vma_writer_close_stream(backup_state.vmaw, di->dev_id);
-+    if (backup_state.vmaw) {
-+        vma_writer_close_stream(backup_state.vmaw, di->dev_id);
-+    }
-     block_job_cb(bs, ret);
-@@ -3168,6 +3171,7 @@ UuidInfo *qmp_backup(const char *backup_file, bool has_format,
- {
-     BlockBackend *blk;
-     BlockDriverState *bs = NULL;
-+    const char *backup_dir = NULL;
-     Error *local_err = NULL;
-     uuid_t uuid;
-     VmaWriter *vmaw = NULL;
-@@ -3175,6 +3179,7 @@ UuidInfo *qmp_backup(const char *backup_file, bool has_format,
-     GList *di_list = NULL;
-     GList *l;
-     UuidInfo *uuid_info;
-+    BlockJob *job;
-     if (backup_state.di_list) {
-         error_set(errp, ERROR_CLASS_GENERIC_ERROR,
-@@ -3185,11 +3190,6 @@ UuidInfo *qmp_backup(const char *backup_file, bool has_format,
-     /* Todo: try to auto-detect format based on file name */
-     format = has_format ? format : BACKUP_FORMAT_VMA;
--    if (format != BACKUP_FORMAT_VMA) {
--        error_set(errp, ERROR_CLASS_GENERIC_ERROR, "unknown backup format");
--        return NULL;
--    }
--
-     if (has_devlist) {
-         devs = g_strsplit_set(devlist, ",;:", -1);
-@@ -3258,27 +3258,62 @@ UuidInfo *qmp_backup(const char *backup_file, bool has_format,
-     uuid_generate(uuid);
--    vmaw = vma_writer_create(backup_file, uuid, &local_err);
--    if (!vmaw) {
--        if (local_err) {
--            error_propagate(errp, local_err);
-+    if (format == BACKUP_FORMAT_VMA) {
-+        vmaw = vma_writer_create(backup_file, uuid, &local_err);
-+        if (!vmaw) {
-+            if (local_err) {
-+                error_propagate(errp, local_err);
-+            }
-+            goto err;
-         }
--        goto err;
--    }
--    /* register all devices for vma writer */
--    l = di_list;
--    while (l) {
--        PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
--        l = g_list_next(l);
-+        /* register all devices for vma writer */
-+        l = di_list;
-+        while (l) {
-+            PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
-+            l = g_list_next(l);
--        const char *devname = bdrv_get_device_name(di->bs);
--        di->dev_id = vma_writer_register_stream(vmaw, devname, di->size);
--        if (di->dev_id <= 0) {
--            error_set(errp, ERROR_CLASS_GENERIC_ERROR,
--                      "register_stream failed");
-+            const char *devname = bdrv_get_device_name(di->bs);
-+            di->dev_id = vma_writer_register_stream(vmaw, devname, di->size);
-+            if (di->dev_id <= 0) {
-+                error_set(errp, ERROR_CLASS_GENERIC_ERROR,
-+                          "register_stream failed");
-+                goto err;
-+            }
-+        }
-+    } else if (format == BACKUP_FORMAT_DIR) {
-+        if (mkdir(backup_file, 0640) != 0) {
-+            error_setg_errno(errp, errno, "can't create directory '%s'\n",
-+                             backup_file);
-             goto err;
-         }
-+        backup_dir = backup_file;
-+
-+        l = di_list;
-+        while (l) {
-+            PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
-+            l = g_list_next(l);
-+
-+            const char *devname = bdrv_get_device_name(di->bs);
-+            snprintf(di->targetfile, PATH_MAX, "%s/%s.raw", backup_dir, devname);
-+
-+            int flags = BDRV_O_RDWR;
-+            bdrv_img_create(di->targetfile, "raw", NULL, NULL, NULL,
-+                            di->size, flags, &local_err, false);
-+            if (local_err) {
-+                error_propagate(errp, local_err);
-+                goto err;
-+            }
-+
-+            di->target = bdrv_open(di->targetfile, NULL, NULL, flags, &local_err);
-+            if (!di->target) {
-+                error_propagate(errp, local_err);
-+                goto err;
-+            }
-+        }
-+    } else {
-+       error_set(errp, ERROR_CLASS_GENERIC_ERROR, "unknown backup format");
-+       goto err;
-     }
-     /* add configuration file to archive */
-@@ -3291,12 +3326,27 @@ UuidInfo *qmp_backup(const char *backup_file, bool has_format,
-             goto err;
-         }
--        const char *basename = g_path_get_basename(config_file);
--        if (vma_writer_add_config(vmaw, basename, cdata, clen) != 0) {
--            error_setg(errp, "unable to add config data to vma archive");
--            g_free(cdata);
--            goto err;
-+        char *basename = g_path_get_basename(config_file);
-+
-+        if (format == BACKUP_FORMAT_VMA) {
-+            if (vma_writer_add_config(vmaw, basename, cdata, clen) != 0) {
-+                error_setg(errp, "unable to add config data to vma archive");
-+                g_free(cdata);
-+                g_free(basename);
-+                goto err;
-+            }
-+        } else if (format == BACKUP_FORMAT_DIR) {
-+            char config_path[PATH_MAX];
-+            snprintf(config_path, PATH_MAX, "%s/%s", backup_dir, basename);
-+            if (!g_file_set_contents(config_path, cdata, clen, &err)) {
-+                error_setg(errp, "unable to write config file '%s'", config_path);
-+                g_free(cdata);
-+                g_free(basename);
-+                goto err;
-+            }
-         }
-+
-+        g_free(basename);
-         g_free(cdata);
-     }
-@@ -3335,15 +3385,16 @@ UuidInfo *qmp_backup(const char *backup_file, bool has_format,
-     while (l) {
-         PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
-         l = g_list_next(l);
--
--        backup_job_create(NULL, di->bs, NULL, speed, MIRROR_SYNC_MODE_FULL, NULL,
--                          BLOCKDEV_ON_ERROR_REPORT, BLOCKDEV_ON_ERROR_REPORT,
--                          pvebackup_dump_cb, pvebackup_complete_cb, di,
--                          1, NULL, &local_err);
--        if (local_err != NULL) {
-+        job = backup_job_create(NULL, di->bs, di->target, speed, MIRROR_SYNC_MODE_FULL, NULL,
-+                                false, BLOCKDEV_ON_ERROR_REPORT, BLOCKDEV_ON_ERROR_REPORT,
-+                                BLOCK_JOB_DEFAULT,
-+                                pvebackup_dump_cb, pvebackup_complete_cb, di,
-+                                1, NULL, &local_err);
-+        if (!job || local_err != NULL) {
-             error_setg(&backup_state.error, "backup_job_create failed");
-             pvebackup_cancel(NULL);
-         }
-+        block_job_start(job);
-     }
-     if (!backup_state.error) {
-@@ -3352,14 +3403,24 @@ UuidInfo *qmp_backup(const char *backup_file, bool has_format,
-     uuid_info = g_malloc0(sizeof(*uuid_info));
-     uuid_info->UUID = g_strdup(backup_state.uuid_str);
-+
-     return uuid_info;
- err:
-     l = di_list;
-     while (l) {
--        g_free(l->data);
-+        PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
-         l = g_list_next(l);
-+
-+        if (di->target) {
-+            bdrv_unref(di->target);
-+        }
-+
-+        if (di->targetfile[0]) {
-+            unlink(di->targetfile);
-+        }
-+        g_free(di);
-     }
-     g_list_free(di_list);
-@@ -3373,6 +3434,10 @@ err:
-         unlink(backup_file);
-     }
-+    if (backup_dir) {
-+        rmdir(backup_dir);
-+    }
-+
-     return NULL;
- }
-diff --git a/hmp-commands.hx b/hmp-commands.hx
-index aea39d0f45..72882039ee 100644
---- a/hmp-commands.hx
-+++ b/hmp-commands.hx
-@@ -89,9 +89,11 @@ ETEXI
-    {
-         .name       = "backup",
--        .args_type  = "backupfile:s,speed:o?,devlist:s?",
--        .params     = "backupfile [speed [devlist]]",
--        .help       = "create a VM Backup.",
-+        .args_type  = "directory:-d,backupfile:s,speed:o?,devlist:s?",
-+        .params     = "[-d] backupfile [speed [devlist]]",
-+        .help       = "create a VM Backup."
-+                  "\n\t\t\t Use -d to dump data into a directory instead"
-+                  "\n\t\t\t of using VMA format.",
-         .cmd = hmp_backup,
-     },
-diff --git a/hmp.c b/hmp.c
-index c685ba507f..465d7faad0 100644
---- a/hmp.c
-+++ b/hmp.c
-@@ -1664,11 +1664,13 @@ void hmp_backup(Monitor *mon, const QDict *qdict)
- {
-     Error *error = NULL;
-+    int dir = qdict_get_try_bool(qdict, "directory", 0);
-     const char *backup_file = qdict_get_str(qdict, "backupfile");
-     const char *devlist = qdict_get_try_str(qdict, "devlist");
-     int64_t speed = qdict_get_try_int(qdict, "speed", 0);
--    qmp_backup(backup_file, true, BACKUP_FORMAT_VMA, false, NULL, !!devlist,
-+    qmp_backup(backup_file, true, dir ? BACKUP_FORMAT_DIR : BACKUP_FORMAT_VMA,
-+               false, NULL, !!devlist,
-                devlist, qdict_haskey(qdict, "speed"), speed, &error);
-     hmp_handle_error(mon, &error);
-diff --git a/qapi-schema.json b/qapi-schema.json
-index 12d4d20705..edb7c32ac9 100644
---- a/qapi-schema.json
-+++ b/qapi-schema.json
-@@ -609,7 +609,7 @@
- # @vma: Proxmox vma backup format
- ##
- { 'enum': 'BackupFormat',
--  'data': [ 'vma' ] }
-+  'data': [ 'vma', 'dir' ] }
- ##
- # @backup:
-diff --git a/vma.c b/vma.c
-index 89254070c4..1ffaced897 100644
---- a/vma.c
-+++ b/vma.c
-@@ -264,7 +264,7 @@ static int extract_content(int argc, char **argv)
-             g_free(statefn);
-         } else if (di) {
-             char *devfn = NULL;
--            int flags = BDRV_O_RDWR|BDRV_O_CACHE_WB;
-+            int flags = BDRV_O_RDWR;
-             bool write_zero = true;
-             if (readmap) {
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0016-vnc-make-x509-imply-tls-again.patch b/debian/patches/pve/0016-vnc-make-x509-imply-tls-again.patch
new file mode 100644 (file)
index 0000000..52b23f3
--- /dev/null
@@ -0,0 +1,28 @@
+From e90d84abb42bc2befe9a48a9be2873d5dce68236 Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Tue, 12 Jan 2016 09:09:49 +0100
+Subject: [PATCH 16/28] vnc: make x509 imply tls again
+
+---
+ ui/vnc.c | 5 ++---
+ 1 file changed, 2 insertions(+), 3 deletions(-)
+
+diff --git a/ui/vnc.c b/ui/vnc.c
+index 9c8ab42eea..eb9420e830 100644
+--- a/ui/vnc.c
++++ b/ui/vnc.c
+@@ -3881,9 +3881,8 @@ void vnc_display_open(const char *id, Error **errp)
+         const char *path;
+         bool tls = false, x509 = false, x509verify = false;
+         tls  = qemu_opt_get_bool(opts, "tls", false);
+-        if (tls) {
+-            path = qemu_opt_get(opts, "x509");
+-
++        path = qemu_opt_get(opts, "x509");
++        if (tls || path) {
+             if (path) {
+                 x509 = true;
+             } else {
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0017-backup-do-not-return-errors-in-dump-callback.patch b/debian/patches/pve/0017-backup-do-not-return-errors-in-dump-callback.patch
deleted file mode 100644 (file)
index bbe1de9..0000000
+++ /dev/null
@@ -1,77 +0,0 @@
-From c8fdc50eaa27500204364f15de1aac2c0ac07bf8 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 15:22:19 +0100
-Subject: [PATCH 17/49] backup: do not return errors in dump callback
-
----
- blockdev.c | 26 ++++++++++++++++++++------
- 1 file changed, 20 insertions(+), 6 deletions(-)
-
-diff --git a/blockdev.c b/blockdev.c
-index 87e1d1a99e..5017c276e6 100644
---- a/blockdev.c
-+++ b/blockdev.c
-@@ -3019,6 +3019,11 @@ static int pvebackup_dump_cb(void *opaque, BlockBackend *target,
- {
-     PVEBackupDevInfo *di = opaque;
-+    int size = n_sectors * BDRV_SECTOR_SIZE;
-+    if (backup_state.cancel) {
-+        return size; // return success
-+    }
-+
-     if (sector_num & 0x7f) {
-         if (!backup_state.error) {
-             error_setg(&backup_state.error,
-@@ -3029,7 +3034,6 @@ static int pvebackup_dump_cb(void *opaque, BlockBackend *target,
-     }
-     int64_t cluster_num = sector_num >> 7;
--    int size = n_sectors * BDRV_SECTOR_SIZE;
-     int ret = -1;
-@@ -3037,17 +3041,27 @@ static int pvebackup_dump_cb(void *opaque, BlockBackend *target,
-         size_t zero_bytes = 0;
-         ret = vma_writer_write(backup_state.vmaw, di->dev_id, cluster_num,
-                                buf, &zero_bytes);
--        backup_state.zero_bytes += zero_bytes;
-+        if (ret < 0) {
-+            if (!backup_state.error) {
-+                error_setg(&backup_state.error, "vma_writer_write error %d", ret);
-+            }
-+            if (di->bs && di->bs->job) {
-+                block_job_cancel(di->bs->job);
-+            }
-+        } else {
-+            backup_state.zero_bytes += zero_bytes;
-+            backup_state.transferred += size;
-+        }
-     } else {
--        ret = size;
-         if (!buf) {
-             backup_state.zero_bytes += size;
-         }
-+        backup_state.transferred += size;
-     }
--    backup_state.transferred += size;
-+    // Note: always return success, because we want that writes succeed anyways.
--    return ret;
-+    return size;
- }
- static void pvebackup_cleanup(void)
-@@ -3119,7 +3133,7 @@ static void pvebackup_cancel(void *opaque)
-             BlockJob *job = di->bs->job;
-             if (job) {
-                 if (!di->completed) {
--                    block_job_cancel_sync(job);
-+                     block_job_cancel_sync(job);
-                 }
-             }
-         }
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0017-vnc-PVE-VNC-authentication.patch b/debian/patches/pve/0017-vnc-PVE-VNC-authentication.patch
new file mode 100644 (file)
index 0000000..3d39e05
--- /dev/null
@@ -0,0 +1,685 @@
+From e9712692a0a336bf56025e1bc8056636cbd3931e Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Mon, 11 Jan 2016 10:40:31 +0100
+Subject: [PATCH 17/28] vnc: PVE VNC authentication
+
+---
+ crypto/tlscreds.c         |  47 +++++++++++
+ crypto/tlscredspriv.h     |   2 +
+ crypto/tlscredsx509.c     |  13 +--
+ crypto/tlssession.c       |   1 +
+ include/crypto/tlscreds.h |   1 +
+ include/ui/console.h      |   1 +
+ qemu-options.hx           |   3 +
+ ui/vnc-auth-vencrypt.c    | 197 ++++++++++++++++++++++++++++++++++++++--------
+ ui/vnc.c                  | 140 +++++++++++++++++++++++++++++++-
+ ui/vnc.h                  |   4 +
+ vl.c                      |   9 +++
+ 11 files changed, 377 insertions(+), 41 deletions(-)
+
+diff --git a/crypto/tlscreds.c b/crypto/tlscreds.c
+index a8965531b6..e9ae13ce47 100644
+--- a/crypto/tlscreds.c
++++ b/crypto/tlscreds.c
+@@ -158,6 +158,33 @@ qcrypto_tls_creds_prop_get_verify(Object *obj,
+ static void
++qcrypto_tls_creds_prop_set_pve(Object *obj,
++                                 bool value,
++                                 Error **errp G_GNUC_UNUSED)
++{
++    QCryptoTLSCreds *creds = QCRYPTO_TLS_CREDS(obj);
++
++    creds->pve = value;
++}
++
++
++static bool
++qcrypto_tls_creds_prop_get_pve(Object *obj,
++                                  Error **errp G_GNUC_UNUSED)
++{
++    QCryptoTLSCreds *creds = QCRYPTO_TLS_CREDS(obj);
++
++    return creds->pve;
++}
++
++bool qcrypto_tls_creds_is_pve(QCryptoTLSCreds *creds)
++{
++    Error *errp = NULL;
++    return qcrypto_tls_creds_prop_get_pve((Object*)creds, &errp);
++}
++
++
++static void
+ qcrypto_tls_creds_prop_set_dir(Object *obj,
+                                const char *value,
+                                Error **errp G_GNUC_UNUSED)
+@@ -250,6 +277,26 @@ qcrypto_tls_creds_init(Object *obj)
+     QCryptoTLSCreds *creds = QCRYPTO_TLS_CREDS(obj);
+     creds->verifyPeer = true;
++    creds->pve = false;
++
++    object_property_add_bool(obj, "verify-peer",
++                             qcrypto_tls_creds_prop_get_verify,
++                             qcrypto_tls_creds_prop_set_verify,
++                             NULL);
++    object_property_add_bool(obj, "pve",
++                             qcrypto_tls_creds_prop_get_pve,
++                             qcrypto_tls_creds_prop_set_pve,
++                             NULL);
++    object_property_add_str(obj, "dir",
++                            qcrypto_tls_creds_prop_get_dir,
++                            qcrypto_tls_creds_prop_set_dir,
++                            NULL);
++    object_property_add_enum(obj, "endpoint",
++                             "QCryptoTLSCredsEndpoint",
++                             QCryptoTLSCredsEndpoint_lookup,
++                             qcrypto_tls_creds_prop_get_endpoint,
++                             qcrypto_tls_creds_prop_set_endpoint,
++                             NULL);
+ }
+diff --git a/crypto/tlscredspriv.h b/crypto/tlscredspriv.h
+index 13e9b6c0b2..0356acc2c9 100644
+--- a/crypto/tlscredspriv.h
++++ b/crypto/tlscredspriv.h
+@@ -36,6 +36,8 @@ int qcrypto_tls_creds_get_dh_params_file(QCryptoTLSCreds *creds,
+                                          gnutls_dh_params_t *dh_params,
+                                          Error **errp);
++bool qcrypto_tls_creds_is_pve(QCryptoTLSCreds *creds);
++
+ #endif
+ #endif /* QCRYPTO_TLSCREDSPRIV_H */
+diff --git a/crypto/tlscredsx509.c b/crypto/tlscredsx509.c
+index 50eb54f6bb..09f7364001 100644
+--- a/crypto/tlscredsx509.c
++++ b/crypto/tlscredsx509.c
+@@ -555,22 +555,23 @@ qcrypto_tls_creds_x509_load(QCryptoTLSCredsX509 *creds,
+         *key = NULL, *dhparams = NULL;
+     int ret;
+     int rv = -1;
++    bool pve = qcrypto_tls_creds_is_pve(&creds->parent_obj);
+     trace_qcrypto_tls_creds_x509_load(creds,
+             creds->parent_obj.dir ? creds->parent_obj.dir : "<nodir>");
+     if (creds->parent_obj.endpoint == QCRYPTO_TLS_CREDS_ENDPOINT_SERVER) {
+         if (qcrypto_tls_creds_get_path(&creds->parent_obj,
+-                                       QCRYPTO_TLS_CREDS_X509_CA_CERT,
++                                       pve ? "pve-root-ca.pem" : QCRYPTO_TLS_CREDS_X509_CA_CERT,
+                                        true, &cacert, errp) < 0 ||
+             qcrypto_tls_creds_get_path(&creds->parent_obj,
+                                        QCRYPTO_TLS_CREDS_X509_CA_CRL,
+                                        false, &cacrl, errp) < 0 ||
+             qcrypto_tls_creds_get_path(&creds->parent_obj,
+-                                       QCRYPTO_TLS_CREDS_X509_SERVER_CERT,
++                                       pve ? "local/pve-ssl.pem" : QCRYPTO_TLS_CREDS_X509_SERVER_CERT,
+                                        true, &cert, errp) < 0 ||
+             qcrypto_tls_creds_get_path(&creds->parent_obj,
+-                                       QCRYPTO_TLS_CREDS_X509_SERVER_KEY,
++                                       pve ? "local/pve-ssl.key" : QCRYPTO_TLS_CREDS_X509_SERVER_KEY,
+                                        true, &key, errp) < 0 ||
+             qcrypto_tls_creds_get_path(&creds->parent_obj,
+                                        QCRYPTO_TLS_CREDS_DH_PARAMS,
+@@ -579,13 +580,13 @@ qcrypto_tls_creds_x509_load(QCryptoTLSCredsX509 *creds,
+         }
+     } else {
+         if (qcrypto_tls_creds_get_path(&creds->parent_obj,
+-                                       QCRYPTO_TLS_CREDS_X509_CA_CERT,
++                                       pve ? "pve-root-ca.pem" : QCRYPTO_TLS_CREDS_X509_CA_CERT,
+                                        true, &cacert, errp) < 0 ||
+             qcrypto_tls_creds_get_path(&creds->parent_obj,
+-                                       QCRYPTO_TLS_CREDS_X509_CLIENT_CERT,
++                                       pve ? "local/pve-ssl.pem" : QCRYPTO_TLS_CREDS_X509_CLIENT_CERT,
+                                        false, &cert, errp) < 0 ||
+             qcrypto_tls_creds_get_path(&creds->parent_obj,
+-                                       QCRYPTO_TLS_CREDS_X509_CLIENT_KEY,
++                                       pve ? "local/pve-ssl.key" : QCRYPTO_TLS_CREDS_X509_CLIENT_KEY,
+                                        false, &key, errp) < 0) {
+             goto cleanup;
+         }
+diff --git a/crypto/tlssession.c b/crypto/tlssession.c
+index 96a02deb69..c453e29cad 100644
+--- a/crypto/tlssession.c
++++ b/crypto/tlssession.c
+@@ -23,6 +23,7 @@
+ #include "crypto/tlscredsanon.h"
+ #include "crypto/tlscredsx509.h"
+ #include "qapi/error.h"
++#include "crypto/tlscredspriv.h"
+ #include "qemu/acl.h"
+ #include "trace.h"
+diff --git a/include/crypto/tlscreds.h b/include/crypto/tlscreds.h
+index ad47d88be7..f86d379f26 100644
+--- a/include/crypto/tlscreds.h
++++ b/include/crypto/tlscreds.h
+@@ -55,6 +55,7 @@ struct QCryptoTLSCreds {
+ #endif
+     bool verifyPeer;
+     char *priority;
++    bool pve;
+ };
+diff --git a/include/ui/console.h b/include/ui/console.h
+index d759338816..69f010e1db 100644
+--- a/include/ui/console.h
++++ b/include/ui/console.h
+@@ -462,6 +462,7 @@ static inline void cocoa_display_init(DisplayState *ds, int full_screen)
+ #endif
+ /* vnc.c */
++void pve_auth_setup(int vmid);
+ void vnc_display_init(const char *id);
+ void vnc_display_open(const char *id, Error **errp);
+ void vnc_display_add_client(const char *id, int csock, bool skipauth);
+diff --git a/qemu-options.hx b/qemu-options.hx
+index 10f0e81f9b..fbd1a1cecf 100644
+--- a/qemu-options.hx
++++ b/qemu-options.hx
+@@ -513,6 +513,9 @@ STEXI
+ @table @option
+ ETEXI
++DEF("id", HAS_ARG, QEMU_OPTION_id,
++    "-id n         set the VMID\n", QEMU_ARCH_ALL)
++
+ DEF("fda", HAS_ARG, QEMU_OPTION_fda,
+     "-fda/-fdb file  use 'file' as floppy disk 0/1 image\n", QEMU_ARCH_ALL)
+ DEF("fdb", HAS_ARG, QEMU_OPTION_fdb, "", QEMU_ARCH_ALL)
+diff --git a/ui/vnc-auth-vencrypt.c b/ui/vnc-auth-vencrypt.c
+index ffaab57550..594ca737a9 100644
+--- a/ui/vnc-auth-vencrypt.c
++++ b/ui/vnc-auth-vencrypt.c
+@@ -28,6 +28,108 @@
+ #include "vnc.h"
+ #include "qapi/error.h"
+ #include "qemu/main-loop.h"
++#include "io/channel-socket.h"
++
++static int protocol_client_auth_plain(VncState *vs, uint8_t *data, size_t len)
++{
++      Error *err = NULL;
++      char username[256];
++      char passwd[512];
++
++      SocketAddress *clientip = qio_channel_socket_get_remote_address(vs->sioc, &err);
++      if (err) {
++          goto err;
++      }
++
++      if ((len != (vs->username_len + vs->password_len)) ||
++          (vs->username_len >= (sizeof(username)-1)) ||
++          (vs->password_len >= (sizeof(passwd)-1))    ) {
++              error_setg(&err, "Got unexpected data length");
++              goto err;
++      }
++
++      strncpy(username, (char *)data, vs->username_len);
++      username[vs->username_len] = 0;
++      strncpy(passwd, (char *)data + vs->username_len, vs->password_len);
++      passwd[vs->password_len] = 0;
++
++      VNC_DEBUG("AUTH PLAIN username: %s pw: %s\n", username, passwd);
++
++      if (pve_auth_verify(clientip->u.inet.data->host, username, passwd) == 0) {
++              vnc_write_u32(vs, 0); /* Accept auth completion */
++              start_client_init(vs);
++              qapi_free_SocketAddress(clientip);
++              return 0;
++      }
++
++      error_setg(&err, "Authentication failed");
++err:
++       if (err) {
++             const char *err_msg = error_get_pretty(err);
++             VNC_DEBUG("AUTH PLAIN ERROR: %s\n", err_msg);
++             vnc_write_u32(vs, 1); /* Reject auth */
++             if (vs->minor >= 8) {
++                     int elen = strlen(err_msg);
++                     vnc_write_u32(vs, elen);
++                     vnc_write(vs, err_msg, elen);
++             }
++             error_free(err);
++       }
++       vnc_flush(vs);
++       vnc_client_error(vs);
++
++       qapi_free_SocketAddress(clientip);
++
++       return 0;
++
++}
++
++static int protocol_client_auth_plain_start(VncState *vs, uint8_t *data, size_t len)
++{
++      uint32_t ulen = read_u32(data, 0);
++      uint32_t pwlen = read_u32(data, 4);
++      const char *err = NULL;
++
++      VNC_DEBUG("AUTH PLAIN START %u %u\n", ulen, pwlen);
++
++       if (!ulen) {
++             err = "No User name.";
++             goto err;
++       }
++       if (ulen >= 255) {
++             err = "User name too long.";
++             goto err;
++       }
++       if (!pwlen) {
++             err = "Password too short";
++             goto err;
++       }
++       if (pwlen >= 511) {
++             err = "Password too long.";
++             goto err;
++       }
++
++       vs->username_len = ulen;
++       vs->password_len = pwlen;
++
++       vnc_read_when(vs, protocol_client_auth_plain, ulen + pwlen);
++
++       return 0;
++err:
++       if (err) {
++             VNC_DEBUG("AUTH PLAIN ERROR: %s\n", err);
++             vnc_write_u32(vs, 1); /* Reject auth */
++             if (vs->minor >= 8) {
++                     int elen = strlen(err);
++                     vnc_write_u32(vs, elen);
++                     vnc_write(vs, err, elen);
++             }
++       }
++       vnc_flush(vs);
++       vnc_client_error(vs);
++
++       return 0;
++}
+ static void start_auth_vencrypt_subauth(VncState *vs)
+ {
+@@ -39,6 +141,17 @@ static void start_auth_vencrypt_subauth(VncState *vs)
+        start_client_init(vs);
+        break;
++    case VNC_AUTH_VENCRYPT_TLSPLAIN:
++    case VNC_AUTH_VENCRYPT_X509PLAIN:
++       VNC_DEBUG("Start TLS auth PLAIN\n");
++       vnc_read_when(vs, protocol_client_auth_plain_start, 8);
++       break;
++
++    case VNC_AUTH_VENCRYPT_PLAIN:
++       VNC_DEBUG("Start auth PLAIN\n");
++       vnc_read_when(vs, protocol_client_auth_plain_start, 8);
++       break;
++
+     case VNC_AUTH_VENCRYPT_TLSVNC:
+     case VNC_AUTH_VENCRYPT_X509VNC:
+        VNC_DEBUG("Start TLS auth VNC\n");
+@@ -88,45 +201,64 @@ static int protocol_client_vencrypt_auth(VncState *vs, uint8_t *data, size_t len
+ {
+     int auth = read_u32(data, 0);
+-    if (auth != vs->subauth) {
++    if (auth != vs->subauth && auth != VNC_AUTH_VENCRYPT_PLAIN) {
+         VNC_DEBUG("Rejecting auth %d\n", auth);
+         vnc_write_u8(vs, 0); /* Reject auth */
+         vnc_flush(vs);
+         vnc_client_error(vs);
+     } else {
+-        Error *err = NULL;
+-        QIOChannelTLS *tls;
+-        VNC_DEBUG("Accepting auth %d, setting up TLS for handshake\n", auth);
+-        vnc_write_u8(vs, 1); /* Accept auth */
+-        vnc_flush(vs);
+-
+-        if (vs->ioc_tag) {
+-            g_source_remove(vs->ioc_tag);
+-            vs->ioc_tag = 0;
++        if (auth == VNC_AUTH_VENCRYPT_PLAIN) {
++            vs->subauth = auth;
++            start_auth_vencrypt_subauth(vs);
+         }
++        else
++        {
++            Error *err = NULL;
++            QIOChannelTLS *tls;
++            VNC_DEBUG("Accepting auth %d, setting up TLS for handshake\n", auth);
++            vnc_write_u8(vs, 1); /* Accept auth */
++            vnc_flush(vs);
+-        tls = qio_channel_tls_new_server(
+-            vs->ioc,
+-            vs->vd->tlscreds,
+-            vs->vd->tlsaclname,
+-            &err);
+-        if (!tls) {
+-            VNC_DEBUG("Failed to setup TLS %s\n", error_get_pretty(err));
+-            error_free(err);
+-            vnc_client_error(vs);
+-            return 0;
+-        }
++            if (vs->ioc_tag) {
++                g_source_remove(vs->ioc_tag);
++                vs->ioc_tag = 0;
++            }
+-        qio_channel_set_name(QIO_CHANNEL(tls), "vnc-server-tls");
+-        VNC_DEBUG("Start TLS VeNCrypt handshake process\n");
+-        object_unref(OBJECT(vs->ioc));
+-        vs->ioc = QIO_CHANNEL(tls);
+-        vs->tls = qio_channel_tls_get_session(tls);
++            tls = qio_channel_tls_new_server(
++                vs->ioc,
++                vs->vd->tlscreds,
++                vs->vd->tlsaclname,
++                &err);
++            if (!tls) {
++                VNC_DEBUG("Failed to setup TLS %s\n", error_get_pretty(err));
++                error_free(err);
++                vnc_client_error(vs);
++                return 0;
++                vs->tls = qcrypto_tls_session_new(vs->vd->tlscreds,
++                                                  NULL,
++                                                  vs->vd->tlsaclname,
++                                                  QCRYPTO_TLS_CREDS_ENDPOINT_SERVER,
++                                                  &err);
++                if (!vs->tls) {
++                    VNC_DEBUG("Failed to setup TLS %s\n",
++                              error_get_pretty(err));
++                    error_free(err);
++                    vnc_client_error(vs);
++                    return 0;
++                }
++            }
++            qio_channel_set_name(QIO_CHANNEL(tls), "vnc-server-tls");
+-        qio_channel_tls_handshake(tls,
+-                                  vnc_tls_handshake_done,
+-                                  vs,
+-                                  NULL);
++            VNC_DEBUG("Start TLS VeNCrypt handshake process\n");
++            object_unref(OBJECT(vs->ioc));
++            vs->ioc = QIO_CHANNEL(tls);
++            vs->tls = qio_channel_tls_get_session(tls);
++
++            qio_channel_tls_handshake(tls,
++                                      vnc_tls_handshake_done,
++                                      vs,
++                                      NULL);
++        }
+     }
+     return 0;
+ }
+@@ -140,10 +272,11 @@ static int protocol_client_vencrypt_init(VncState *vs, uint8_t *data, size_t len
+         vnc_flush(vs);
+         vnc_client_error(vs);
+     } else {
+-        VNC_DEBUG("Sending allowed auth %d\n", vs->subauth);
++        VNC_DEBUG("Sending allowed auths %d %d\n", vs->subauth, VNC_AUTH_VENCRYPT_PLAIN);
+         vnc_write_u8(vs, 0); /* Accept version */
+-        vnc_write_u8(vs, 1); /* Number of sub-auths */
++        vnc_write_u8(vs, 2); /* Number of sub-auths */
+         vnc_write_u32(vs, vs->subauth); /* The supported auth */
++        vnc_write_u32(vs, VNC_AUTH_VENCRYPT_PLAIN); /* Alternative supported auth */
+         vnc_flush(vs);
+         vnc_read_when(vs, protocol_client_vencrypt_auth, 4);
+     }
+diff --git a/ui/vnc.c b/ui/vnc.c
+index eb9420e830..2710614a72 100644
+--- a/ui/vnc.c
++++ b/ui/vnc.c
+@@ -56,6 +56,125 @@ static const struct timeval VNC_REFRESH_LOSSY = { 2, 0 };
+ #include "vnc_keysym.h"
+ #include "crypto/cipher.h"
++static int pve_vmid = 0;
++
++void pve_auth_setup(int vmid) {
++      pve_vmid = vmid;
++}
++
++static char *
++urlencode(char *buf, const char *value)
++{
++      static const char *hexchar = "0123456789abcdef";
++      char *p = buf;
++      int i;
++      int l = strlen(value);
++      for (i = 0; i < l; i++) {
++              char c = value[i];
++              if (('a' <= c && c <= 'z') ||
++                  ('A' <= c && c <= 'Z') ||
++                  ('0' <= c && c <= '9')) {
++                      *p++ = c;
++              } else if (c == 32) {
++                      *p++ = '+';
++              } else {
++                      *p++ = '%';
++                      *p++ = hexchar[c >> 4];
++                      *p++ = hexchar[c & 15];
++              }
++      }
++      *p = 0;
++
++      return p;
++}
++
++int
++pve_auth_verify(const char *clientip, const char *username, const char *passwd)
++{
++      struct sockaddr_in server;
++
++      int sfd = socket(AF_INET, SOCK_STREAM, 0);
++      if (sfd == -1) {
++              perror("pve_auth_verify: socket failed");
++              return -1;
++      }
++
++      struct hostent *he;
++      if ((he = gethostbyname("localhost")) == NULL) {
++              fprintf(stderr, "pve_auth_verify: error resolving hostname\n");
++              goto err;
++      }
++
++      memcpy(&server.sin_addr, he->h_addr_list[0], he->h_length);
++      server.sin_family = AF_INET;
++      server.sin_port = htons(85);
++
++      if (connect(sfd, (struct sockaddr *)&server, sizeof(server))) {
++              perror("pve_auth_verify: error connecting to server");
++              goto err;
++      }
++
++      char buf[8192];
++      char form[8192];
++
++      char *p = form;
++      p = urlencode(p, "username");
++      *p++ = '=';
++      p = urlencode(p, username);
++
++      *p++ = '&';
++      p = urlencode(p, "password");
++      *p++ = '=';
++      p = urlencode(p, passwd);
++
++      *p++ = '&';
++      p = urlencode(p, "path");
++      *p++ = '=';
++      char authpath[256];
++      sprintf(authpath, "/vms/%d", pve_vmid);
++      p = urlencode(p, authpath);
++
++      *p++ = '&';
++      p = urlencode(p, "privs");
++      *p++ = '=';
++      p = urlencode(p, "VM.Console");
++
++      sprintf(buf, "POST /api2/json/access/ticket HTTP/1.1\n"
++              "Host: localhost:85\n"
++              "Connection: close\n"
++              "PVEClientIP: %s\n"
++              "Content-Type: application/x-www-form-urlencoded\n"
++              "Content-Length: %zd\n\n%s\n", clientip, strlen(form), form);
++      ssize_t len = strlen(buf);
++      ssize_t sb = send(sfd, buf, len, 0);
++      if (sb < 0) {
++              perror("pve_auth_verify: send failed");
++              goto err;
++      }
++      if (sb != len) {
++              fprintf(stderr, "pve_auth_verify: partial send error\n");
++              goto err;
++      }
++
++      len = recv(sfd, buf, sizeof(buf) - 1, 0);
++      if (len < 0) {
++              perror("pve_auth_verify: recv failed");
++              goto err;
++      }
++
++      buf[len] = 0;
++
++      //printf("DATA:%s\n", buf);
++
++      shutdown(sfd, SHUT_RDWR);
++
++      return strncmp(buf, "HTTP/1.1 200 OK", 15);
++
++err:
++      shutdown(sfd, SHUT_RDWR);
++      return -1;
++}
++
+ static QTAILQ_HEAD(, VncDisplay) vnc_displays =
+     QTAILQ_HEAD_INITIALIZER(vnc_displays);
+@@ -3356,10 +3475,16 @@ vnc_display_setup_auth(int *auth,
+         if (password) {
+             if (is_x509) {
+                 VNC_DEBUG("Initializing VNC server with x509 password auth\n");
+-                *subauth = VNC_AUTH_VENCRYPT_X509VNC;
++                if (tlscreds->pve)
++                    *subauth = VNC_AUTH_VENCRYPT_X509PLAIN;
++                else
++                    *subauth = VNC_AUTH_VENCRYPT_X509VNC;
+             } else {
+                 VNC_DEBUG("Initializing VNC server with TLS password auth\n");
+-                *subauth = VNC_AUTH_VENCRYPT_TLSVNC;
++                if (tlscreds->pve)
++                    *subauth = VNC_AUTH_VENCRYPT_TLSPLAIN;
++                else
++                    *subauth = VNC_AUTH_VENCRYPT_TLSVNC;
+             }
+         } else if (sasl) {
+@@ -3393,6 +3518,7 @@ vnc_display_create_creds(bool x509,
+                          bool x509verify,
+                          const char *dir,
+                          const char *id,
++                         bool pve,
+                          Error **errp)
+ {
+     gchar *credsid = g_strdup_printf("tlsvnc%s", id);
+@@ -3408,6 +3534,7 @@ vnc_display_create_creds(bool x509,
+                                       "endpoint", "server",
+                                       "dir", dir,
+                                       "verify-peer", x509verify ? "yes" : "no",
++                                      "pve", pve ? "yes" : "no",
+                                       NULL);
+     } else {
+         creds = object_new_with_props(TYPE_QCRYPTO_TLS_CREDS_ANON,
+@@ -3415,6 +3542,7 @@ vnc_display_create_creds(bool x509,
+                                       credsid,
+                                       &err,
+                                       "endpoint", "server",
++                                      "pve", pve ? "yes" : "no",
+                                       NULL);
+     }
+@@ -3879,12 +4007,17 @@ void vnc_display_open(const char *id, Error **errp)
+         }
+     } else {
+         const char *path;
+-        bool tls = false, x509 = false, x509verify = false;
++        bool tls = false, x509 = false, x509verify = false, pve = false;
+         tls  = qemu_opt_get_bool(opts, "tls", false);
+         path = qemu_opt_get(opts, "x509");
+         if (tls || path) {
+             if (path) {
+                 x509 = true;
++                if (!strcmp(path, "on")) {
++                    /* magic to default to /etc/pve */
++                    path = "/etc/pve";
++                    pve = true;
++                }
+             } else {
+                 path = qemu_opt_get(opts, "x509verify");
+                 if (path) {
+@@ -3896,6 +4029,7 @@ void vnc_display_open(const char *id, Error **errp)
+                                                     x509verify,
+                                                     path,
+                                                     vd->id,
++                                                    pve,
+                                                     errp);
+             if (!vd->tlscreds) {
+                 goto fail;
+diff --git a/ui/vnc.h b/ui/vnc.h
+index 694cf32ca9..78d622ab84 100644
+--- a/ui/vnc.h
++++ b/ui/vnc.h
+@@ -284,6 +284,8 @@ struct VncState
+     int auth;
+     int subauth; /* Used by VeNCrypt */
+     char challenge[VNC_AUTH_CHALLENGE_SIZE];
++    int username_len;
++    int password_len;
+     QCryptoTLSSession *tls; /* Borrowed pointer from channel, don't free */
+ #ifdef CONFIG_VNC_SASL
+     VncStateSASL sasl;
+@@ -577,4 +579,6 @@ int vnc_zrle_send_framebuffer_update(VncState *vs, int x, int y, int w, int h);
+ int vnc_zywrle_send_framebuffer_update(VncState *vs, int x, int y, int w, int h);
+ void vnc_zrle_clear(VncState *vs);
++int pve_auth_verify(const char *clientip, const char *username, const char *passwd);
++
+ #endif /* QEMU_VNC_H */
+diff --git a/vl.c b/vl.c
+index d0780a41b4..2496b066b7 100644
+--- a/vl.c
++++ b/vl.c
+@@ -2947,6 +2947,7 @@ static int qemu_read_default_config_file(void)
+ int main(int argc, char **argv, char **envp)
+ {
+     int i;
++    long int vm_id_long = 0;
+     int snapshot, linux_boot;
+     const char *initrd_filename;
+     const char *kernel_filename, *kernel_cmdline;
+@@ -3774,6 +3775,14 @@ int main(int argc, char **argv, char **envp)
+                     exit(1);
+                 }
+                 break;
++            case QEMU_OPTION_id:
++                vm_id_long = strtol(optarg, (char **) &optarg, 10);
++                if (*optarg != 0 || vm_id_long < 100 || vm_id_long > INT_MAX) {
++                    fprintf(stderr, "Invalid ID\n");
++                    exit(1);
++                }
++                pve_auth_setup(vm_id_long);
++                break;
+             case QEMU_OPTION_vnc:
+                 vnc_parse(optarg, &error_fatal);
+                 break;
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0018-backup-vma-correctly-propagate-error.patch b/debian/patches/pve/0018-backup-vma-correctly-propagate-error.patch
deleted file mode 100644 (file)
index 39fa255..0000000
+++ /dev/null
@@ -1,57 +0,0 @@
-From 95ae3ad5710a4128f27e53d4fd926aa8fe596459 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 15:39:36 +0100
-Subject: [PATCH 18/49] backup: vma: correctly propagate error
-
----
- blockdev.c   | 2 +-
- vma-writer.c | 7 +++++++
- vma.h        | 1 +
- 3 files changed, 9 insertions(+), 1 deletion(-)
-
-diff --git a/blockdev.c b/blockdev.c
-index 5017c276e6..d3aef2cc83 100644
---- a/blockdev.c
-+++ b/blockdev.c
-@@ -3043,7 +3043,7 @@ static int pvebackup_dump_cb(void *opaque, BlockBackend *target,
-                                buf, &zero_bytes);
-         if (ret < 0) {
-             if (!backup_state.error) {
--                error_setg(&backup_state.error, "vma_writer_write error %d", ret);
-+                vma_writer_error_propagate(backup_state.vmaw, &backup_state.error);
-             }
-             if (di->bs && di->bs->job) {
-                 block_job_cancel(di->bs->job);
-diff --git a/vma-writer.c b/vma-writer.c
-index b0cf529125..689e988423 100644
---- a/vma-writer.c
-+++ b/vma-writer.c
-@@ -792,6 +792,13 @@ vma_writer_write(VmaWriter *vmaw, uint8_t dev_id, int64_t cluster_num,
-     return transferred;
- }
-+void vma_writer_error_propagate(VmaWriter *vmaw, Error **errp)
-+{
-+    if (vmaw->status < 0 && *errp == NULL) {
-+        error_setg(errp, "%s", vmaw->errmsg);
-+    }
-+}
-+
- int vma_writer_close(VmaWriter *vmaw, Error **errp)
- {
-     g_assert(vmaw != NULL);
-diff --git a/vma.h b/vma.h
-index 9bb6ea4f69..98377e473e 100644
---- a/vma.h
-+++ b/vma.h
-@@ -116,6 +116,7 @@ typedef struct VmaDeviceInfo {
- VmaWriter *vma_writer_create(const char *filename, uuid_t uuid, Error **errp);
- int vma_writer_close(VmaWriter *vmaw, Error **errp);
-+void vma_writer_error_propagate(VmaWriter *vmaw, Error **errp);
- void vma_writer_destroy(VmaWriter *vmaw);
- int vma_writer_add_config(VmaWriter *vmaw, const char *name, gpointer data,
-                           size_t len);
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0018-migrate-fix-possible-unitialised-return-value.patch b/debian/patches/pve/0018-migrate-fix-possible-unitialised-return-value.patch
new file mode 100644 (file)
index 0000000..2d59f6f
--- /dev/null
@@ -0,0 +1,25 @@
+From 0b8732d8e19f69471e2f9b8c9a654de62482915a Mon Sep 17 00:00:00 2001
+From: Thomas Lamprecht <t.lamprecht@proxmox.com>
+Date: Wed, 6 Apr 2016 16:45:15 +0200
+Subject: [PATCH 18/28] migrate: fix possible unitialised return value
+
+---
+ migration/savevm.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/migration/savevm.c b/migration/savevm.c
+index feb0dc6834..d2615f4620 100644
+--- a/migration/savevm.c
++++ b/migration/savevm.c
+@@ -1111,7 +1111,7 @@ int qemu_savevm_state_complete_precopy(QEMUFile *f, bool iterable_only)
+     QJSON *vmdesc;
+     int vmdesc_len;
+     SaveStateEntry *se;
+-    int ret;
++    int ret = -1;
+     bool in_postcopy = migration_in_postcopy(migrate_get_current());
+     trace_savevm_state_complete_precopy();
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0019-backup-vma-remove-async-queue.patch b/debian/patches/pve/0019-backup-vma-remove-async-queue.patch
deleted file mode 100644 (file)
index 729220a..0000000
+++ /dev/null
@@ -1,317 +0,0 @@
-From 8847efb5dee0b82e397ed7dfb05eec41c28d916d Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 15:40:00 +0100
-Subject: [PATCH 19/49] backup: vma: remove async queue
-
----
- blockdev.c   |   6 ++
- vma-writer.c | 179 +++++++++++------------------------------------------------
- 2 files changed, 38 insertions(+), 147 deletions(-)
-
-diff --git a/blockdev.c b/blockdev.c
-index d3aef2cc83..bad5b2a8b8 100644
---- a/blockdev.c
-+++ b/blockdev.c
-@@ -3122,6 +3122,11 @@ static void pvebackup_cancel(void *opaque)
-         error_setg(&backup_state.error, "backup cancelled");
-     }
-+    if (backup_state.vmaw) {
-+        /* make sure vma writer does not block anymore */
-+        vma_writer_set_error(backup_state.vmaw, "backup cancelled");
-+    }
-+
-     /* drain all i/o (awake jobs waiting for aio) */
-     bdrv_drain_all();
-@@ -3134,6 +3139,7 @@ static void pvebackup_cancel(void *opaque)
-             if (job) {
-                 if (!di->completed) {
-                      block_job_cancel_sync(job);
-+                     bdrv_drain_all(); /* drain all i/o (awake jobs waiting for aio) */
-                 }
-             }
-         }
-diff --git a/vma-writer.c b/vma-writer.c
-index 689e988423..ec8da5378d 100644
---- a/vma-writer.c
-+++ b/vma-writer.c
-@@ -28,14 +28,8 @@
-     do { if (DEBUG_VMA) { printf("vma: " fmt, ## __VA_ARGS__); } } while (0)
- #define WRITE_BUFFERS 5
--
--typedef struct VmaAIOCB VmaAIOCB;
--struct VmaAIOCB {
--    unsigned char buffer[VMA_MAX_EXTENT_SIZE];
--    VmaWriter *vmaw;
--    size_t bytes;
--    Coroutine *co;
--};
-+#define HEADER_CLUSTERS 8
-+#define HEADERBUF_SIZE (VMA_CLUSTER_SIZE*HEADER_CLUSTERS)
- struct VmaWriter {
-     int fd;
-@@ -47,16 +41,14 @@ struct VmaWriter {
-     bool closed;
-     /* we always write extents */
--    unsigned char outbuf[VMA_MAX_EXTENT_SIZE];
-+    unsigned char *outbuf;
-     int outbuf_pos; /* in bytes */
-     int outbuf_count; /* in VMA_BLOCKS */
-     uint64_t outbuf_block_info[VMA_BLOCKS_PER_EXTENT];
--    VmaAIOCB *aiocbs[WRITE_BUFFERS];
--    CoQueue wqueue;
-+    unsigned char *headerbuf;
-     GChecksum *md5csum;
--    CoMutex writer_lock;
-     CoMutex flush_lock;
-     Coroutine *co_writer;
-@@ -217,38 +209,39 @@ static void vma_co_continue_write(void *opaque)
- }
- static ssize_t coroutine_fn
--vma_co_write(VmaWriter *vmaw, const void *buf, size_t bytes)
-+vma_queue_write(VmaWriter *vmaw, const void *buf, size_t bytes)
- {
--    size_t done = 0;
--    ssize_t ret;
-+    DPRINTF("vma_queue_write enter %zd\n", bytes);
--    /* atomic writes (we cannot interleave writes) */
--    qemu_co_mutex_lock(&vmaw->writer_lock);
-+    assert(vmaw);
-+    assert(buf);
-+    assert(bytes <= VMA_MAX_EXTENT_SIZE);
--    DPRINTF("vma_co_write enter %zd\n", bytes);
-+    size_t done = 0;
-+    ssize_t ret;
-     assert(vmaw->co_writer == NULL);
-     vmaw->co_writer = qemu_coroutine_self();
--    aio_set_fd_handler(qemu_get_aio_context(), vmaw->fd, false, NULL, vma_co_continue_write, vmaw);
--
--    DPRINTF("vma_co_write wait until writable\n");
--    qemu_coroutine_yield();
--    DPRINTF("vma_co_write starting %zd\n", bytes);
--
-     while (done < bytes) {
-+        aio_set_fd_handler(qemu_get_aio_context(), vmaw->fd, false, NULL, vma_co_continue_write, NULL, vmaw);
-+        qemu_coroutine_yield();
-+        aio_set_fd_handler(qemu_get_aio_context(), vmaw->fd, false, NULL, NULL, NULL, NULL);
-+        if (vmaw->status < 0) {
-+            DPRINTF("vma_queue_write detected canceled backup\n");
-+            done = -1;
-+            break;
-+        }
-         ret = write(vmaw->fd, buf + done, bytes - done);
-         if (ret > 0) {
-             done += ret;
--            DPRINTF("vma_co_write written %zd %zd\n", done, ret);
-+            DPRINTF("vma_queue_write written %zd %zd\n", done, ret);
-         } else if (ret < 0) {
-             if (errno == EAGAIN || errno == EWOULDBLOCK) {
--                DPRINTF("vma_co_write yield %zd\n", done);
--                qemu_coroutine_yield();
--                DPRINTF("vma_co_write restart %zd\n", done);
--            } else {
--                vma_writer_set_error(vmaw, "vma_co_write write error - %s",
-+                /* try again */
-+           } else {
-+                vma_writer_set_error(vmaw, "vma_queue_write: write error - %s",
-                                      g_strerror(errno));
-                 done = -1; /* always return failure for partial writes */
-                 break;
-@@ -258,102 +251,9 @@ vma_co_write(VmaWriter *vmaw, const void *buf, size_t bytes)
-         }
-     }
--    aio_set_fd_handler(qemu_get_aio_context(), vmaw->fd, false, NULL, NULL, NULL);
--
-     vmaw->co_writer = NULL;
--
--    qemu_co_mutex_unlock(&vmaw->writer_lock);
--
--    DPRINTF("vma_co_write leave %zd\n", done);
--    return done;
--}
--
--static void coroutine_fn vma_co_writer_task(void *opaque)
--{
--    VmaAIOCB *cb = opaque;
--
--    DPRINTF("vma_co_writer_task start\n");
--
--    int64_t done = vma_co_write(cb->vmaw, cb->buffer, cb->bytes);
--    DPRINTF("vma_co_writer_task write done %zd\n", done);
--
--    if (done != cb->bytes) {
--        DPRINTF("vma_co_writer_task failed write %zd %zd", cb->bytes, done);
--        vma_writer_set_error(cb->vmaw, "vma_co_writer_task failed write %zd",
--                             done);
--    }
--
--    cb->bytes = 0;
--
--    qemu_co_queue_next(&cb->vmaw->wqueue);
--
--    DPRINTF("vma_co_writer_task end\n");
--}
--
--static void coroutine_fn vma_queue_flush(VmaWriter *vmaw)
--{
--    DPRINTF("vma_queue_flush enter\n");
--
--    assert(vmaw);
--
--    while (1) {
--        int i;
--        VmaAIOCB *cb = NULL;
--        for (i = 0; i < WRITE_BUFFERS; i++) {
--            if (vmaw->aiocbs[i]->bytes) {
--                cb = vmaw->aiocbs[i];
--                DPRINTF("FOUND USED AIO BUFFER %d %zd\n", i,
--                        vmaw->aiocbs[i]->bytes);
--                break;
--            }
--        }
--        if (!cb) {
--            break;
--        }
--        qemu_co_queue_wait(&vmaw->wqueue);
--    }
--
--    DPRINTF("vma_queue_flush leave\n");
--}
--
--/**
-- * NOTE: pipe buffer size in only 4096 bytes on linux (see 'ulimit -a')
-- * So we need to create a coroutione to allow 'parallel' execution.
-- */
--static ssize_t coroutine_fn
--vma_queue_write(VmaWriter *vmaw, const void *buf, size_t bytes)
--{
--    DPRINTF("vma_queue_write enter %zd\n", bytes);
--
--    assert(vmaw);
--    assert(buf);
--    assert(bytes <= VMA_MAX_EXTENT_SIZE);
--
--    VmaAIOCB *cb = NULL;
--    while (!cb) {
--        int i;
--        for (i = 0; i < WRITE_BUFFERS; i++) {
--            if (!vmaw->aiocbs[i]->bytes) {
--                cb = vmaw->aiocbs[i];
--                break;
--            }
--        }
--        if (!cb) {
--            qemu_co_queue_wait(&vmaw->wqueue);
--        }
--    }
--
--    memcpy(cb->buffer, buf, bytes);
--    cb->bytes = bytes;
--    cb->vmaw = vmaw;
--
--    DPRINTF("vma_queue_write start %zd\n", bytes);
--    cb->co = qemu_coroutine_create(vma_co_writer_task);
--    qemu_coroutine_enter(cb->co, cb);
--
--    DPRINTF("vma_queue_write leave\n");
--
--    return bytes;
-+    
-+    return (done == bytes) ? bytes : -1;
- }
- VmaWriter *vma_writer_create(const char *filename, uuid_t uuid, Error **errp)
-@@ -420,20 +320,16 @@ VmaWriter *vma_writer_create(const char *filename, uuid_t uuid, Error **errp)
-     }
-     /* we use O_DIRECT, so we need to align IO buffers */
--    int i;
--    for (i = 0; i < WRITE_BUFFERS; i++) {
--        vmaw->aiocbs[i] = qemu_memalign(512, sizeof(VmaAIOCB));
--        memset(vmaw->aiocbs[i], 0, sizeof(VmaAIOCB));
--    }
-+
-+    vmaw->outbuf = qemu_memalign(512, VMA_MAX_EXTENT_SIZE);
-+    vmaw->headerbuf = qemu_memalign(512, HEADERBUF_SIZE);
-     vmaw->outbuf_count = 0;
-     vmaw->outbuf_pos = VMA_EXTENT_HEADER_SIZE;
-     vmaw->header_blob_table_pos = 1; /* start at pos 1 */
--    qemu_co_mutex_init(&vmaw->writer_lock);
-     qemu_co_mutex_init(&vmaw->flush_lock);
--    qemu_co_queue_init(&vmaw->wqueue);
-     uuid_copy(vmaw->uuid, uuid);
-@@ -460,8 +356,7 @@ err:
- static int coroutine_fn vma_write_header(VmaWriter *vmaw)
- {
-     assert(vmaw);
--    int header_clusters = 8;
--    char buf[65536*header_clusters];
-+    unsigned char *buf = vmaw->headerbuf;
-     VmaHeader *head = (VmaHeader *)buf;
-     int i;
-@@ -472,7 +367,7 @@ static int coroutine_fn vma_write_header(VmaWriter *vmaw)
-         return vmaw->status;
-     }
--    memset(buf, 0, sizeof(buf));
-+    memset(buf, 0, HEADERBUF_SIZE);
-     head->magic = VMA_MAGIC;
-     head->version = GUINT32_TO_BE(1); /* v1 */
-@@ -507,7 +402,7 @@ static int coroutine_fn vma_write_header(VmaWriter *vmaw)
-     uint32_t header_size = sizeof(VmaHeader) + vmaw->header_blob_table_size;
-     head->header_size = GUINT32_TO_BE(header_size);
--    if (header_size > sizeof(buf)) {
-+    if (header_size > HEADERBUF_SIZE) {
-         return -1; /* just to be sure */
-     }
-@@ -805,13 +700,7 @@ int vma_writer_close(VmaWriter *vmaw, Error **errp)
-     int i;
--    vma_queue_flush(vmaw);
--
--    /* this should not happen - just to be sure */
--    while (!qemu_co_queue_empty(&vmaw->wqueue)) {
--        DPRINTF("vma_writer_close wait\n");
--        co_aio_sleep_ns(qemu_get_aio_context(), QEMU_CLOCK_REALTIME, 1000000);
--    }
-+    assert(vmaw->co_writer == NULL);
-     if (vmaw->cmd) {
-         if (pclose(vmaw->cmd) < 0) {
-@@ -869,9 +758,5 @@ void vma_writer_destroy(VmaWriter *vmaw)
-         g_checksum_free(vmaw->md5csum);
-     }
--    for (i = 0; i < WRITE_BUFFERS; i++) {
--        free(vmaw->aiocbs[i]);
--    }
--
-     g_free(vmaw);
- }
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0019-block-rbd-disable-rbd_cache_writethrough_until_flush.patch b/debian/patches/pve/0019-block-rbd-disable-rbd_cache_writethrough_until_flush.patch
new file mode 100644 (file)
index 0000000..cb98d3b
--- /dev/null
@@ -0,0 +1,29 @@
+From b0603dbd9bd127305472e8162e9b3289b866b824 Mon Sep 17 00:00:00 2001
+From: Alexandre Derumier <aderumier@odiso.com>
+Date: Tue, 26 Jul 2016 16:51:00 +0200
+Subject: [PATCH 19/28] block: rbd: disable rbd_cache_writethrough_until_flush
+ with cache=unsafe
+
+Signed-off-by: Alexandre Derumier <aderumier@odiso.com>
+---
+ block/rbd.c | 4 ++++
+ 1 file changed, 4 insertions(+)
+
+diff --git a/block/rbd.c b/block/rbd.c
+index 1ceeeb5a60..30fe179585 100644
+--- a/block/rbd.c
++++ b/block/rbd.c
+@@ -623,6 +623,10 @@ static int qemu_rbd_open(BlockDriverState *bs, QDict *options, int flags,
+         rados_conf_set(s->cluster, "rbd_cache", "true");
+     }
++    if (flags & BDRV_O_NO_FLUSH) {
++      rados_conf_set(s->cluster, "rbd_cache_writethrough_until_flush", "false");
++    }
++
+     r = rados_connect(s->cluster);
+     if (r < 0) {
+         error_setg_errno(errp, -r, "error connecting");
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0020-backup-vma-run-flush-inside-coroutine.patch b/debian/patches/pve/0020-backup-vma-run-flush-inside-coroutine.patch
deleted file mode 100644 (file)
index 98d1f47..0000000
+++ /dev/null
@@ -1,56 +0,0 @@
-From 7708c32e3a14860c519ab3540a50e24a314bb3fa Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 15:40:42 +0100
-Subject: [PATCH 20/49] backup: vma: run flush inside coroutine
-
----
- blockdev.c   | 10 +++++++++-
- vma-writer.c |  4 ++++
- 2 files changed, 13 insertions(+), 1 deletion(-)
-
-diff --git a/blockdev.c b/blockdev.c
-index bad5b2a8b8..77ee7ff93b 100644
---- a/blockdev.c
-+++ b/blockdev.c
-@@ -3087,6 +3087,13 @@ static void pvebackup_cleanup(void)
-     }
- }
-+static void coroutine_fn backup_close_vma_stream(void *opaque)
-+{
-+    PVEBackupDevInfo *di = opaque;
-+
-+    vma_writer_close_stream(backup_state.vmaw, di->dev_id);
-+}
-+
- static void pvebackup_complete_cb(void *opaque, int ret)
- {
-     PVEBackupDevInfo *di = opaque;
-@@ -3104,7 +3111,8 @@ static void pvebackup_complete_cb(void *opaque, int ret)
-     di->target = NULL;
-     if (backup_state.vmaw) {
--        vma_writer_close_stream(backup_state.vmaw, di->dev_id);
-+        Coroutine *co = qemu_coroutine_create(backup_close_vma_stream, di);
-+        qemu_coroutine_enter(co);
-     }
-     block_job_cb(bs, ret);
-diff --git a/vma-writer.c b/vma-writer.c
-index ec8da5378d..216577a4f7 100644
---- a/vma-writer.c
-+++ b/vma-writer.c
-@@ -700,6 +700,10 @@ int vma_writer_close(VmaWriter *vmaw, Error **errp)
-     int i;
-+    while (vmaw->co_writer) {
-+        aio_poll(qemu_get_aio_context(), true);
-+    }
-+
-     assert(vmaw->co_writer == NULL);
-     if (vmaw->cmd) {
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0020-block-snapshot-qmp_snapshot_drive-add-aiocontext.patch b/debian/patches/pve/0020-block-snapshot-qmp_snapshot_drive-add-aiocontext.patch
new file mode 100644 (file)
index 0000000..21f8470
--- /dev/null
@@ -0,0 +1,65 @@
+From 976296684d224ab866fc8b7ebe0d2de4b5b39170 Mon Sep 17 00:00:00 2001
+From: Alexandre Derumier <aderumier@odiso.com>
+Date: Tue, 13 Sep 2016 01:57:56 +0200
+Subject: [PATCH 20/28] block: snapshot: qmp_snapshot_drive: add aiocontext
+
+Signed-off-by: Alexandre Derumier <aderumier@odiso.com>
+---
+ savevm-async.c | 15 +++++++++++----
+ 1 file changed, 11 insertions(+), 4 deletions(-)
+
+diff --git a/savevm-async.c b/savevm-async.c
+index 624e3a34b4..95995eab31 100644
+--- a/savevm-async.c
++++ b/savevm-async.c
+@@ -377,6 +377,7 @@ void qmp_snapshot_drive(const char *device, const char *name, Error **errp)
+     BlockBackend *blk;
+     BlockDriverState *bs;
+     QEMUSnapshotInfo sn1, *sn = &sn1;
++    AioContext *aio_context;
+     int ret;
+ #ifdef _WIN32
+     struct _timeb tb;
+@@ -403,20 +404,23 @@ void qmp_snapshot_drive(const char *device, const char *name, Error **errp)
+         return;
+     }
++    aio_context = bdrv_get_aio_context(bs);
++    aio_context_acquire(aio_context);
++
+     if (bdrv_is_read_only(bs)) {
+         error_setg(errp, "Node '%s' is read only", device);
+-        return;
++        goto out;
+     }
+     if (!bdrv_can_snapshot(bs)) {
+         error_setg(errp, QERR_UNSUPPORTED);
+-        return;
++        goto out;
+     }
+     if (bdrv_snapshot_find(bs, sn, name) >= 0) {
+         error_set(errp, ERROR_CLASS_GENERIC_ERROR,
+                   "snapshot '%s' already exists", name);
+-        return;
++        goto out;
+     }
+     sn = &sn1;
+@@ -441,8 +445,11 @@ void qmp_snapshot_drive(const char *device, const char *name, Error **errp)
+     if (ret < 0) {
+         error_set(errp, ERROR_CLASS_GENERIC_ERROR,
+                   "Error while creating snapshot on '%s'\n", device);
+-        return;
++        goto out;
+     }
++
++out:
++    aio_context_release(aio_context);
+ }
+ void qmp_delete_drive_snapshot(const char *device, const char *name,
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0021-backup-do-not-use-bdrv_drain_all.patch b/debian/patches/pve/0021-backup-do-not-use-bdrv_drain_all.patch
deleted file mode 100644 (file)
index ebc2d90..0000000
+++ /dev/null
@@ -1,36 +0,0 @@
-From fbb5d5b954df75a366110c2df3bb0685ebfca145 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 15:41:13 +0100
-Subject: [PATCH 21/49] backup: do not use bdrv_drain_all
-
----
- blockdev.c | 6 +-----
- 1 file changed, 1 insertion(+), 5 deletions(-)
-
-diff --git a/blockdev.c b/blockdev.c
-index 77ee7ff93b..2713585051 100644
---- a/blockdev.c
-+++ b/blockdev.c
-@@ -3135,9 +3135,6 @@ static void pvebackup_cancel(void *opaque)
-         vma_writer_set_error(backup_state.vmaw, "backup cancelled");
-     }
--    /* drain all i/o (awake jobs waiting for aio) */
--    bdrv_drain_all();
--
-     GList *l = backup_state.di_list;
-     while (l) {
-         PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
-@@ -3146,8 +3143,7 @@ static void pvebackup_cancel(void *opaque)
-             BlockJob *job = di->bs->job;
-             if (job) {
-                 if (!di->completed) {
--                     block_job_cancel_sync(job);
--                     bdrv_drain_all(); /* drain all i/o (awake jobs waiting for aio) */
-+                    block_job_cancel_sync(job);
-                 }
-             }
-         }
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0021-block-snapshot-qmp_delete_drive_snapshot-add-aiocont.patch b/debian/patches/pve/0021-block-snapshot-qmp_delete_drive_snapshot-add-aiocont.patch
new file mode 100644 (file)
index 0000000..a0167d3
--- /dev/null
@@ -0,0 +1,60 @@
+From 1540187ba7716d502908a1815298d7c3fc8db6a6 Mon Sep 17 00:00:00 2001
+From: Alexandre Derumier <aderumier@odiso.com>
+Date: Mon, 7 Nov 2016 11:47:50 +0100
+Subject: [PATCH 21/28] block: snapshot: qmp_delete_drive_snapshot : add
+ aiocontext
+
+this fix snapshot delete of qcow2 with iothread enabled
+
+Signed-off-by: Alexandre Derumier <aderumier@odiso.com>
+---
+ savevm-async.c | 13 ++++++++++---
+ 1 file changed, 10 insertions(+), 3 deletions(-)
+
+diff --git a/savevm-async.c b/savevm-async.c
+index 95995eab31..9f839faab5 100644
+--- a/savevm-async.c
++++ b/savevm-async.c
+@@ -459,6 +459,7 @@ void qmp_delete_drive_snapshot(const char *device, const char *name,
+     BlockDriverState *bs;
+     QEMUSnapshotInfo sn1, *sn = &sn1;
+     Error *local_err = NULL;
++    AioContext *aio_context;
+     int ret;
+@@ -475,22 +476,28 @@ void qmp_delete_drive_snapshot(const char *device, const char *name,
+         return;
+     }
++    aio_context = bdrv_get_aio_context(bs);
++    aio_context_acquire(aio_context);
++
+     if (!bdrv_can_snapshot(bs)) {
+         error_setg(errp, QERR_UNSUPPORTED);
+-        return;
++        goto out;
+     }
+     if (bdrv_snapshot_find(bs, sn, name) < 0) {
+         /* return success if snapshot does not exists */
+-        return;
++        goto out;
+     }
+     ret = bdrv_snapshot_delete(bs, NULL, name, &local_err);
+     if (ret < 0) {
+         error_set(errp, ERROR_CLASS_GENERIC_ERROR,
+                   "Error while deleting snapshot on '%s'\n", device);
+-        return;
++        goto out;
+     }
++
++out:
++    aio_context_release(aio_context);
+ }
+ static ssize_t loadstate_get_buffer(void *opaque, uint8_t *buf, int64_t pos,
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0022-glusterfs-no-default-logfile-if-daemonized.patch b/debian/patches/pve/0022-glusterfs-no-default-logfile-if-daemonized.patch
new file mode 100644 (file)
index 0000000..ab4e0e8
--- /dev/null
@@ -0,0 +1,52 @@
+From 26129edb715505ae35207eff2477cffec50af13e Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Mon, 24 Oct 2016 09:32:36 +0200
+Subject: [PATCH 22/28] glusterfs: no default logfile if daemonized
+
+---
+ block/gluster.c | 15 +++++++++++----
+ 1 file changed, 11 insertions(+), 4 deletions(-)
+
+diff --git a/block/gluster.c b/block/gluster.c
+index cf29b5f9a4..bc44c50db0 100644
+--- a/block/gluster.c
++++ b/block/gluster.c
+@@ -33,7 +33,7 @@
+ #define GLUSTER_DEBUG_DEFAULT       4
+ #define GLUSTER_DEBUG_MAX           9
+ #define GLUSTER_OPT_LOGFILE         "logfile"
+-#define GLUSTER_LOGFILE_DEFAULT     "-" /* handled in libgfapi as /dev/stderr */
++#define GLUSTER_LOGFILE_DEFAULT     NULL
+ #define GERR_INDEX_HINT "hint: check in 'server' array index '%d'\n"
+@@ -398,6 +398,7 @@ static struct glfs *qemu_gluster_glfs_init(BlockdevOptionsGluster *gconf,
+     int old_errno;
+     SocketAddressFlatList *server;
+     unsigned long long port;
++    const char *logfile;
+     glfs = glfs_find_preopened(gconf->volume);
+     if (glfs) {
+@@ -440,9 +441,15 @@ static struct glfs *qemu_gluster_glfs_init(BlockdevOptionsGluster *gconf,
+         }
+     }
+-    ret = glfs_set_logging(glfs, gconf->logfile, gconf->debug);
+-    if (ret < 0) {
+-        goto out;
++    logfile = gconf->logfile;
++    if (!logfile && !is_daemonized()) {
++        logfile = "-";
++    }
++    if (logfile) {
++        ret = glfs_set_logging(glfs, logfile, gconf->debug);
++        if (ret < 0) {
++            goto out;
++        }
+     }
+     ret = glfs_init(glfs);
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0022-internal-snapshot-async.patch b/debian/patches/pve/0022-internal-snapshot-async.patch
deleted file mode 100644 (file)
index 0ff34e9..0000000
+++ /dev/null
@@ -1,980 +0,0 @@
-From 4599049cf93b3e189caded4f9bf1dd50c257c927 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 16:04:32 +0100
-Subject: [PATCH 22/49] internal snapshot async
-
----
- Makefile.objs           |   1 +
- block.c                 |   2 +-
- hmp-commands-info.hx    |  13 ++
- hmp-commands.hx         |  32 +++
- hmp.c                   |  57 ++++++
- hmp.h                   |   5 +
- include/block/block.h   |   1 +
- include/sysemu/sysemu.h |   5 +-
- migration/savevm.c      |  12 +-
- qapi-schema.json        |  68 +++++++
- qemu-options.hx         |  13 ++
- savevm-async.c          | 525 ++++++++++++++++++++++++++++++++++++++++++++++++
- vl.c                    |   8 +
- 13 files changed, 734 insertions(+), 8 deletions(-)
- create mode 100644 savevm-async.c
-
-diff --git a/Makefile.objs b/Makefile.objs
-index 9b12ee6afa..f5f8dbab3b 100644
---- a/Makefile.objs
-+++ b/Makefile.objs
-@@ -51,6 +51,7 @@ common-obj-$(CONFIG_LINUX) += fsdev/
- common-obj-y += migration/
- common-obj-y += page_cache.o #aio.o
-+common-obj-y += savevm-async.o
- common-obj-$(CONFIG_SPICE) += spice-qemu-char.o
-diff --git a/block.c b/block.c
-index 1fbbb8d606..6ea9ed1c62 100644
---- a/block.c
-+++ b/block.c
-@@ -3091,7 +3091,7 @@ out:
-     bdrv_unref(bs_new);
- }
--static void bdrv_delete(BlockDriverState *bs)
-+void bdrv_delete(BlockDriverState *bs)
- {
-     assert(!bs->job);
-     assert(bdrv_op_blocker_is_empty(bs));
-diff --git a/hmp-commands-info.hx b/hmp-commands-info.hx
-index 1a1838099f..3b5a0f95e4 100644
---- a/hmp-commands-info.hx
-+++ b/hmp-commands-info.hx
-@@ -573,6 +573,19 @@ Show current migration xbzrle cache size.
- ETEXI
-     {
-+        .name       = "savevm",
-+        .args_type  = "",
-+        .params     = "",
-+        .help       = "show savevm status",
-+        .cmd = hmp_info_savevm,
-+    },
-+
-+STEXI
-+@item info savevm
-+show savevm status
-+ETEXI
-+
-+    {
-         .name       = "balloon",
-         .args_type  = "",
-         .params     = "",
-diff --git a/hmp-commands.hx b/hmp-commands.hx
-index 72882039ee..a2867b56f2 100644
---- a/hmp-commands.hx
-+++ b/hmp-commands.hx
-@@ -1808,3 +1808,35 @@ ETEXI
- STEXI
- @end table
- ETEXI
-+
-+    {
-+        .name       = "savevm-start",
-+        .args_type  = "statefile:s?",
-+        .params     = "[statefile]",
-+        .help       = "Prepare for snapshot and halt VM. Save VM state to statefile.",
-+        .cmd = hmp_savevm_start,
-+    },
-+
-+    {
-+        .name       = "snapshot-drive",
-+        .args_type  = "device:s,name:s",
-+        .params     = "device name",
-+        .help       = "Create internal snapshot.",
-+        .cmd = hmp_snapshot_drive,
-+    },
-+
-+    {
-+        .name       = "delete-drive-snapshot",
-+        .args_type  = "device:s,name:s",
-+        .params     = "device name",
-+        .help       = "Delete internal snapshot.",
-+        .cmd = hmp_delete_drive_snapshot,
-+    },
-+
-+    {
-+        .name       = "savevm-end",
-+        .args_type  = "",
-+        .params     = "",
-+        .help       = "Resume VM after snaphot.",
-+        .cmd = hmp_savevm_end,
-+    },
-diff --git a/hmp.c b/hmp.c
-index 465d7faad0..aaf0de1642 100644
---- a/hmp.c
-+++ b/hmp.c
-@@ -2270,6 +2270,63 @@ void hmp_info_memory_devices(Monitor *mon, const QDict *qdict)
-     qapi_free_MemoryDeviceInfoList(info_list);
- }
-+void hmp_savevm_start(Monitor *mon, const QDict *qdict)
-+{
-+    Error *errp = NULL;
-+    const char *statefile = qdict_get_try_str(qdict, "statefile");
-+
-+    qmp_savevm_start(statefile != NULL, statefile, &errp);
-+    hmp_handle_error(mon, &errp);
-+}
-+
-+void hmp_snapshot_drive(Monitor *mon, const QDict *qdict)
-+{
-+    Error *errp = NULL;
-+    const char *name = qdict_get_str(qdict, "name");
-+    const char *device = qdict_get_str(qdict, "device");
-+
-+    qmp_snapshot_drive(device, name, &errp);
-+    hmp_handle_error(mon, &errp);
-+}
-+
-+void hmp_delete_drive_snapshot(Monitor *mon, const QDict *qdict)
-+{
-+    Error *errp = NULL;
-+    const char *name = qdict_get_str(qdict, "name");
-+    const char *device = qdict_get_str(qdict, "device");
-+
-+    qmp_delete_drive_snapshot(device, name, &errp);
-+    hmp_handle_error(mon, &errp);
-+}
-+
-+void hmp_savevm_end(Monitor *mon, const QDict *qdict)
-+{
-+    Error *errp = NULL;
-+
-+    qmp_savevm_end(&errp);
-+    hmp_handle_error(mon, &errp);
-+}
-+
-+void hmp_info_savevm(Monitor *mon, const QDict *qdict)
-+{
-+    SaveVMInfo *info;
-+    info = qmp_query_savevm(NULL);
-+
-+    if (info->has_status) {
-+        monitor_printf(mon, "savevm status: %s\n", info->status);
-+        monitor_printf(mon, "total time: %" PRIu64 " milliseconds\n",
-+                       info->total_time);
-+    } else {
-+        monitor_printf(mon, "savevm status: not running\n");
-+    }
-+    if (info->has_bytes) {
-+        monitor_printf(mon, "Bytes saved: %"PRIu64"\n", info->bytes);
-+    }
-+    if (info->has_error) {
-+        monitor_printf(mon, "Error: %s\n", info->error);
-+    }
-+}
-+
- void hmp_info_iothreads(Monitor *mon, const QDict *qdict)
- {
-     IOThreadInfoList *info_list = qmp_query_iothreads(NULL);
-diff --git a/hmp.h b/hmp.h
-index 17a65b2313..8c1b4846b3 100644
---- a/hmp.h
-+++ b/hmp.h
-@@ -26,6 +26,7 @@ void hmp_info_status(Monitor *mon, const QDict *qdict);
- void hmp_info_uuid(Monitor *mon, const QDict *qdict);
- void hmp_info_chardev(Monitor *mon, const QDict *qdict);
- void hmp_info_mice(Monitor *mon, const QDict *qdict);
-+void hmp_info_savevm(Monitor *mon, const QDict *qdict);
- void hmp_info_migrate(Monitor *mon, const QDict *qdict);
- void hmp_info_migrate_capabilities(Monitor *mon, const QDict *qdict);
- void hmp_info_migrate_parameters(Monitor *mon, const QDict *qdict);
-@@ -95,6 +96,10 @@ void hmp_netdev_add(Monitor *mon, const QDict *qdict);
- void hmp_netdev_del(Monitor *mon, const QDict *qdict);
- void hmp_getfd(Monitor *mon, const QDict *qdict);
- void hmp_closefd(Monitor *mon, const QDict *qdict);
-+void hmp_savevm_start(Monitor *mon, const QDict *qdict);
-+void hmp_snapshot_drive(Monitor *mon, const QDict *qdict);
-+void hmp_delete_drive_snapshot(Monitor *mon, const QDict *qdict);
-+void hmp_savevm_end(Monitor *mon, const QDict *qdict);
- void hmp_sendkey(Monitor *mon, const QDict *qdict);
- void hmp_screendump(Monitor *mon, const QDict *qdict);
- void hmp_nbd_server_start(Monitor *mon, const QDict *qdict);
-diff --git a/include/block/block.h b/include/block/block.h
-index 5ddc0cf21b..7eff87c7dd 100644
---- a/include/block/block.h
-+++ b/include/block/block.h
-@@ -295,6 +295,7 @@ BlockDriverState *bdrv_find_backing_image(BlockDriverState *bs,
- int bdrv_get_backing_file_depth(BlockDriverState *bs);
- void bdrv_refresh_filename(BlockDriverState *bs);
- int bdrv_truncate(BdrvChild *child, int64_t offset);
-+void bdrv_delete(BlockDriverState *bs);
- int64_t bdrv_nb_sectors(BlockDriverState *bs);
- int64_t bdrv_getlength(BlockDriverState *bs);
- int64_t bdrv_get_allocated_file_size(BlockDriverState *bs);
-diff --git a/include/sysemu/sysemu.h b/include/sysemu/sysemu.h
-index 576c7ce640..74623de16c 100644
---- a/include/sysemu/sysemu.h
-+++ b/include/sysemu/sysemu.h
-@@ -78,6 +78,7 @@ void qemu_remove_machine_init_done_notifier(Notifier *notify);
- void hmp_savevm(Monitor *mon, const QDict *qdict);
- int save_vmstate(Monitor *mon, const char *name);
- int load_vmstate(const char *name);
-+int load_state_from_blockdev(const char *filename);
- void hmp_delvm(Monitor *mon, const QDict *qdict);
- void hmp_info_snapshots(Monitor *mon, const QDict *qdict);
-@@ -105,13 +106,13 @@ enum qemu_vm_cmd {
- #define MAX_VM_CMD_PACKAGED_SIZE (1ul << 24)
- bool qemu_savevm_state_blocked(Error **errp);
--void qemu_savevm_state_begin(QEMUFile *f,
-+int qemu_savevm_state_begin(QEMUFile *f,
-                              const MigrationParams *params);
- void qemu_savevm_state_header(QEMUFile *f);
- int qemu_savevm_state_iterate(QEMUFile *f, bool postcopy);
- void qemu_savevm_state_cleanup(void);
- void qemu_savevm_state_complete_postcopy(QEMUFile *f);
--void qemu_savevm_state_complete_precopy(QEMUFile *f, bool iterable_only);
-+int qemu_savevm_state_complete_precopy(QEMUFile *f, bool iterable_only);
- void qemu_savevm_state_pending(QEMUFile *f, uint64_t max_size,
-                                uint64_t *res_non_postcopiable,
-                                uint64_t *res_postcopiable);
-diff --git a/migration/savevm.c b/migration/savevm.c
-index 3b19a4a274..feb0dc6834 100644
---- a/migration/savevm.c
-+++ b/migration/savevm.c
-@@ -970,11 +970,11 @@ void qemu_savevm_state_header(QEMUFile *f)
- }
--void qemu_savevm_state_begin(QEMUFile *f,
-+int qemu_savevm_state_begin(QEMUFile *f,
-                              const MigrationParams *params)
- {
-     SaveStateEntry *se;
--    int ret;
-+    int ret = 0;
-     trace_savevm_state_begin();
-     QTAILQ_FOREACH(se, &savevm_state.handlers, entry) {
-@@ -1002,6 +1002,7 @@ void qemu_savevm_state_begin(QEMUFile *f,
-             break;
-         }
-     }
-+    return ret;
- }
- /*
-@@ -1105,7 +1106,7 @@ void qemu_savevm_state_complete_postcopy(QEMUFile *f)
-     qemu_fflush(f);
- }
--void qemu_savevm_state_complete_precopy(QEMUFile *f, bool iterable_only)
-+int qemu_savevm_state_complete_precopy(QEMUFile *f, bool iterable_only)
- {
-     QJSON *vmdesc;
-     int vmdesc_len;
-@@ -1139,12 +1140,12 @@ void qemu_savevm_state_complete_precopy(QEMUFile *f, bool iterable_only)
-         save_section_footer(f, se);
-         if (ret < 0) {
-             qemu_file_set_error(f, ret);
--            return;
-+            return ret;
-         }
-     }
-     if (iterable_only) {
--        return;
-+        return ret;
-     }
-     vmdesc = qjson_new();
-@@ -1191,6 +1192,7 @@ void qemu_savevm_state_complete_precopy(QEMUFile *f, bool iterable_only)
-     qjson_destroy(vmdesc);
-     qemu_fflush(f);
-+    return qemu_file_get_error(f);
- }
- /* Give an estimate of the amount left to be transferred,
-diff --git a/qapi-schema.json b/qapi-schema.json
-index edb7c32ac9..a25074183c 100644
---- a/qapi-schema.json
-+++ b/qapi-schema.json
-@@ -813,6 +813,40 @@
-            '*error-desc': 'str'} }
- ##
-+# @SaveVMInfo:
-+#
-+# Information about current migration process.
-+#
-+# @status: string describing the current savevm status.
-+#          This can be 'active', 'completed', 'failed'.
-+#          If this field is not returned, no savevm process
-+#          has been initiated
-+#
-+# @error: string containing error message is status is failed.
-+#
-+# @total-time: total amount of milliseconds since savevm started.
-+#        If savevm has ended, it returns the total save time
-+#
-+# @bytes: total amount of data transfered
-+#
-+# Since: 1.3
-+##
-+{ 'struct': 'SaveVMInfo',
-+  'data': {'*status': 'str', '*error': 'str',
-+           '*total-time': 'int', '*bytes': 'int'} }
-+
-+##
-+# @query-savevm:
-+#
-+# Returns information about current savevm process.
-+#
-+# Returns: @SaveVMInfo
-+#
-+# Since: 1.3
-+##
-+{ 'command': 'query-savevm', 'returns': 'SaveVMInfo' }
-+
-+##
- # @query-migrate:
- #
- # Returns information about current migration process. If migration
-@@ -4825,9 +4859,43 @@
- #
- # Since: 1.2.0
- ##
-+
- { 'command': 'query-target', 'returns': 'TargetInfo' }
- ##
-+# @savevm-start:
-+#
-+# Prepare for snapshot and halt VM. Save VM state to statefile.
-+#
-+##
-+{ 'command': 'savevm-start', 'data': { '*statefile': 'str' } }
-+
-+##
-+# @snapshot-drive:
-+#
-+# Create an internal drive snapshot.
-+#
-+##
-+{ 'command': 'snapshot-drive', 'data': { 'device': 'str', 'name': 'str' } }
-+
-+##
-+# @delete-drive-snapshot:
-+#
-+# Delete a drive snapshot.
-+#
-+##
-+{ 'command': 'delete-drive-snapshot', 'data': { 'device': 'str', 'name': 'str' } }
-+
-+##
-+# @savevm-end:
-+#
-+# Resume VM after a snapshot.
-+#
-+##
-+{ 'command': 'savevm-end' }
-+
-+
-+##
- # @QKeyCode:
- #
- # An enumeration of key name.
-diff --git a/qemu-options.hx b/qemu-options.hx
-index 99af8edf5f..10f0e81f9b 100644
---- a/qemu-options.hx
-+++ b/qemu-options.hx
-@@ -3396,6 +3396,19 @@ STEXI
- Start right away with a saved state (@code{loadvm} in monitor)
- ETEXI
-+DEF("loadstate", HAS_ARG, QEMU_OPTION_loadstate, \
-+    "-loadstate file\n" \
-+    "                start right away with a saved state\n",
-+    QEMU_ARCH_ALL)
-+STEXI
-+@item -loadstate @var{file}
-+@findex -loadstate
-+Start right away with a saved state. This option does not rollback
-+disk state like @code{loadvm}, so user must make sure that disk
-+have correct state. @var{file} can be any valid device URL. See the section
-+for "Device URL Syntax" for more information.
-+ETEXI
-+
- #ifndef _WIN32
- DEF("daemonize", 0, QEMU_OPTION_daemonize, \
-     "-daemonize      daemonize QEMU after initializing\n", QEMU_ARCH_ALL)
-diff --git a/savevm-async.c b/savevm-async.c
-new file mode 100644
-index 0000000000..9704a412d9
---- /dev/null
-+++ b/savevm-async.c
-@@ -0,0 +1,525 @@
-+#include "qemu/osdep.h"
-+#include "qemu-common.h"
-+#include "qapi/qmp/qerror.h"
-+#include "qemu/error-report.h"
-+#include "sysemu/sysemu.h"
-+#include "qmp-commands.h"
-+#include "qemu-options.h"
-+#include "migration/qemu-file.h"
-+#include "qom/qom-qobject.h"
-+#include "migration/migration.h"
-+#include "block/snapshot.h"
-+#include "block/qapi.h"
-+#include "block/block.h"
-+#include "qemu/timer.h"
-+#include "sysemu/block-backend.h"
-+#include "qapi/qmp/qstring.h"
-+#include "qemu/rcu.h"
-+#include "qemu/thread.h"
-+#include "qemu/cutils.h"
-+
-+/* #define DEBUG_SAVEVM_STATE */
-+
-+#ifdef DEBUG_SAVEVM_STATE
-+#define DPRINTF(fmt, ...) \
-+    do { printf("savevm-async: " fmt, ## __VA_ARGS__); } while (0)
-+#else
-+#define DPRINTF(fmt, ...) \
-+    do { } while (0)
-+#endif
-+
-+enum {
-+    SAVE_STATE_DONE,
-+    SAVE_STATE_ERROR,
-+    SAVE_STATE_ACTIVE,
-+    SAVE_STATE_COMPLETED,
-+    SAVE_STATE_CANCELLED
-+};
-+
-+
-+static struct SnapshotState {
-+    BlockDriverState *bs;
-+    size_t bs_pos;
-+    int state;
-+    Error *error;
-+    Error *blocker;
-+    int saved_vm_running;
-+    QEMUFile *file;
-+    int64_t total_time;
-+} snap_state;
-+
-+SaveVMInfo *qmp_query_savevm(Error **errp)
-+{
-+    SaveVMInfo *info = g_malloc0(sizeof(*info));
-+    struct SnapshotState *s = &snap_state;
-+
-+    if (s->state != SAVE_STATE_DONE) {
-+        info->has_bytes = true;
-+        info->bytes = s->bs_pos;
-+        switch (s->state) {
-+        case SAVE_STATE_ERROR:
-+            info->has_status = true;
-+            info->status = g_strdup("failed");
-+            info->has_total_time = true;
-+            info->total_time = s->total_time;
-+            if (s->error) {
-+                info->has_error = true;
-+                info->error = g_strdup(error_get_pretty(s->error));
-+            }
-+            break;
-+        case SAVE_STATE_ACTIVE:
-+            info->has_status = true;
-+            info->status = g_strdup("active");
-+            info->has_total_time = true;
-+            info->total_time = qemu_clock_get_ms(QEMU_CLOCK_REALTIME)
-+                - s->total_time;
-+            break;
-+        case SAVE_STATE_COMPLETED:
-+            info->has_status = true;
-+            info->status = g_strdup("completed");
-+            info->has_total_time = true;
-+            info->total_time = s->total_time;
-+            break;
-+        }
-+    }
-+
-+    return info;
-+}
-+
-+static int save_snapshot_cleanup(void)
-+{
-+    int ret = 0;
-+
-+    DPRINTF("save_snapshot_cleanup\n");
-+
-+    snap_state.total_time = qemu_clock_get_ms(QEMU_CLOCK_REALTIME) -
-+        snap_state.total_time;
-+
-+    if (snap_state.file) {
-+        ret = qemu_fclose(snap_state.file);
-+    }
-+
-+    if (snap_state.bs) {
-+        /* try to truncate, but ignore errors (will fail on block devices).
-+         * note: bdrv_read() need whole blocks, so we round up
-+         */
-+        size_t size = (snap_state.bs_pos + BDRV_SECTOR_SIZE) & BDRV_SECTOR_MASK;
-+        bdrv_truncate(snap_state.bs, size);
-+        bdrv_op_unblock_all(snap_state.bs, snap_state.blocker);
-+        error_free(snap_state.blocker);
-+        snap_state.blocker = NULL;
-+        bdrv_unref(snap_state.bs);
-+        snap_state.bs = NULL;
-+    }
-+
-+    return ret;
-+}
-+
-+static void save_snapshot_error(const char *fmt, ...)
-+{
-+    va_list ap;
-+    char *msg;
-+
-+    va_start(ap, fmt);
-+    msg = g_strdup_vprintf(fmt, ap);
-+    va_end(ap);
-+
-+    DPRINTF("save_snapshot_error: %s\n", msg);
-+
-+    if (!snap_state.error) {
-+        error_set(&snap_state.error, ERROR_CLASS_GENERIC_ERROR, "%s", msg);
-+    }
-+
-+    g_free (msg);
-+
-+    snap_state.state = SAVE_STATE_ERROR;
-+
-+    save_snapshot_cleanup();
-+}
-+
-+static void save_snapshot_completed(void)
-+{
-+    DPRINTF("save_snapshot_completed\n");
-+
-+    if (save_snapshot_cleanup() < 0) {
-+        snap_state.state = SAVE_STATE_ERROR;
-+    } else {
-+        snap_state.state = SAVE_STATE_COMPLETED;
-+    }
-+}
-+
-+static int block_state_close(void *opaque)
-+{
-+    snap_state.file = NULL;
-+    return bdrv_flush(snap_state.bs);
-+}
-+
-+static int block_state_put_buffer(void *opaque, const uint8_t *buf,
-+                                  int64_t pos, int size)
-+{
-+    int ret;
-+
-+    assert(pos == snap_state.bs_pos);
-+
-+    if ((ret = bdrv_pwrite(snap_state.bs, snap_state.bs_pos, buf, size)) > 0) {
-+        snap_state.bs_pos += ret;
-+    }
-+
-+    return ret;
-+}
-+
-+static int store_and_stop(void) {
-+    if (global_state_store()) {
-+        save_snapshot_error("Error saving global state");
-+        return 1;
-+    }
-+    if (runstate_is_running()) {
-+        vm_stop(RUN_STATE_SAVE_VM);
-+    }
-+    return 0;
-+}
-+
-+static void process_savevm_co(void *opaque)
-+{
-+    int ret;
-+    int64_t maxlen;
-+    MigrationParams params = {
-+        .blk = 0,
-+        .shared = 0
-+    };
-+
-+    snap_state.state = SAVE_STATE_ACTIVE;
-+
-+    qemu_mutex_unlock_iothread();
-+    qemu_savevm_state_header(snap_state.file);
-+    ret = qemu_savevm_state_begin(snap_state.file, &params);
-+    qemu_mutex_lock_iothread();
-+
-+    if (ret < 0) {
-+        save_snapshot_error("qemu_savevm_state_begin failed");
-+        return;
-+    }
-+
-+    while (snap_state.state == SAVE_STATE_ACTIVE) {
-+        uint64_t pending_size;
-+
-+        pending_size = qemu_savevm_state_pending(snap_state.file, 0);
-+
-+        if (pending_size) {
-+                ret = qemu_savevm_state_iterate(snap_state.file);
-+                if (ret < 0) {
-+                    save_snapshot_error("qemu_savevm_state_iterate error %d", ret);
-+                    break;
-+                }
-+                DPRINTF("savevm inerate pending size %lu ret %d\n", pending_size, ret);
-+        } else {
-+            DPRINTF("done iterating\n");
-+            if (store_and_stop())
-+                break;
-+            DPRINTF("savevm inerate finished\n");
-+            qemu_savevm_state_complete_precopy(snap_state.file);
-+            DPRINTF("save complete\n");
-+            save_snapshot_completed();
-+            break;
-+        }
-+
-+        /* stop the VM if we get to the end of available space,
-+         * or if pending_size is just a few MB
-+         */
-+        maxlen = bdrv_getlength(snap_state.bs) - 30*1024*1024;
-+        if ((pending_size < 100000) ||
-+            ((snap_state.bs_pos + pending_size) >= maxlen)) {
-+            if (store_and_stop())
-+                break;
-+        }
-+    }
-+
-+    if(snap_state.state == SAVE_STATE_CANCELLED) {
-+        save_snapshot_completed();
-+        Error *errp = NULL;
-+        qmp_savevm_end(&errp);
-+    }
-+
-+}
-+
-+static const QEMUFileOps block_file_ops = {
-+    .put_buffer =     block_state_put_buffer,
-+    .close =          block_state_close,
-+};
-+
-+
-+void qmp_savevm_start(bool has_statefile, const char *statefile, Error **errp)
-+{
-+    BlockDriver *drv = NULL;
-+    Error *local_err = NULL;
-+
-+    int bdrv_oflags = BDRV_O_RDWR | BDRV_O_RESIZE;
-+    int ret;
-+
-+    if (snap_state.state != SAVE_STATE_DONE) {
-+        error_set(errp, ERROR_CLASS_GENERIC_ERROR,
-+                  "VM snapshot already started\n");
-+        return;
-+    }
-+
-+    /* initialize snapshot info */
-+    snap_state.saved_vm_running = runstate_is_running();
-+    snap_state.bs_pos = 0;
-+    snap_state.total_time = qemu_clock_get_ms(QEMU_CLOCK_REALTIME);
-+    snap_state.blocker = NULL;
-+
-+    if (snap_state.error) {
-+        error_free(snap_state.error);
-+        snap_state.error = NULL;
-+    }
-+
-+    if (!has_statefile) {
-+        vm_stop(RUN_STATE_SAVE_VM);
-+        snap_state.state = SAVE_STATE_COMPLETED;
-+        return;
-+    }
-+
-+    if (qemu_savevm_state_blocked(errp)) {
-+        return;
-+    }
-+
-+    /* Open the image */
-+    snap_state.bs = bdrv_new();
-+ 
-+    QDict *options = NULL;
-+    options = qdict_new();
-+    qdict_put(options, "driver", qstring_from_str("raw"));
-+    ret = bdrv_open(&snap_state.bs, statefile, NULL, options, bdrv_oflags, drv, &local_err);
-+    if (ret < 0) {
-+        error_set(errp, ERROR_CLASS_GENERIC_ERROR, "failed to open '%s'", statefile);
-+        goto restart;
-+    }
-+
-+    snap_state.file = qemu_fopen_ops(&snap_state, &block_file_ops);
-+
-+    if (!snap_state.file) {
-+        error_set(errp, ERROR_CLASS_GENERIC_ERROR, "failed to open '%s'", statefile);
-+        goto restart;
-+    }
-+
-+
-+    error_setg(&snap_state.blocker, "block device is in use by savevm");
-+    bdrv_op_block_all(snap_state.bs, snap_state.blocker);
-+
-+    Coroutine *co = qemu_coroutine_create(process_savevm_co);
-+    qemu_coroutine_enter(co);
-+
-+    return;
-+
-+restart:
-+
-+    save_snapshot_error("setup failed");
-+
-+    if (snap_state.saved_vm_running) {
-+        vm_start();
-+    }
-+}
-+
-+void qmp_savevm_end(Error **errp)
-+{
-+    if (snap_state.state == SAVE_STATE_DONE) {
-+        error_set(errp, ERROR_CLASS_GENERIC_ERROR,
-+                  "VM snapshot not started\n");
-+        return;
-+    }
-+
-+    if (snap_state.state == SAVE_STATE_ACTIVE) {
-+        snap_state.state = SAVE_STATE_CANCELLED;
-+        return;
-+    }
-+
-+    if (snap_state.saved_vm_running) {
-+        vm_start();
-+    }
-+
-+    snap_state.state = SAVE_STATE_DONE;
-+}
-+
-+void qmp_snapshot_drive(const char *device, const char *name, Error **errp)
-+{
-+    BlockBackend *blk;
-+    BlockDriverState *bs;
-+    QEMUSnapshotInfo sn1, *sn = &sn1;
-+    int ret;
-+#ifdef _WIN32
-+    struct _timeb tb;
-+#else
-+    struct timeval tv;
-+#endif
-+
-+    if (snap_state.state != SAVE_STATE_COMPLETED) {
-+        error_set(errp, ERROR_CLASS_GENERIC_ERROR,
-+                  "VM snapshot not ready/started\n");
-+        return;
-+    }
-+
-+    blk = blk_by_name(device);
-+    if (!blk) {
-+        error_set(errp, ERROR_CLASS_DEVICE_NOT_FOUND,
-+                  "Device '%s' not found", device);
-+        return;
-+    }
-+
-+    bs = blk_bs(blk);
-+    if (!bdrv_is_inserted(bs)) {
-+        error_setg(errp, QERR_DEVICE_HAS_NO_MEDIUM, device);
-+        return;
-+    }
-+
-+    if (bdrv_is_read_only(bs)) {
-+        error_setg(errp, "Node '%s' is read only", device);
-+        return;
-+    }
-+
-+    if (!bdrv_can_snapshot(bs)) {
-+        error_setg(errp, QERR_UNSUPPORTED);
-+        return;
-+    }
-+
-+    if (bdrv_snapshot_find(bs, sn, name) >= 0) {
-+        error_set(errp, ERROR_CLASS_GENERIC_ERROR,
-+                  "snapshot '%s' already exists", name);
-+        return;
-+    }
-+
-+    sn = &sn1;
-+    memset(sn, 0, sizeof(*sn));
-+
-+#ifdef _WIN32
-+    _ftime(&tb);
-+    sn->date_sec = tb.time;
-+    sn->date_nsec = tb.millitm * 1000000;
-+#else
-+    gettimeofday(&tv, NULL);
-+    sn->date_sec = tv.tv_sec;
-+    sn->date_nsec = tv.tv_usec * 1000;
-+#endif
-+    sn->vm_clock_nsec = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL);
-+
-+    pstrcpy(sn->name, sizeof(sn->name), name);
-+
-+    sn->vm_state_size = 0; /* do not save state */
-+
-+    ret = bdrv_snapshot_create(bs, sn);
-+    if (ret < 0) {
-+        error_set(errp, ERROR_CLASS_GENERIC_ERROR,
-+                  "Error while creating snapshot on '%s'\n", device);
-+        return;
-+    }
-+}
-+
-+void qmp_delete_drive_snapshot(const char *device, const char *name,
-+                               Error **errp)
-+{
-+    BlockBackend *blk;
-+    BlockDriverState *bs;
-+    QEMUSnapshotInfo sn1, *sn = &sn1;
-+    Error *local_err = NULL;
-+
-+    int ret;
-+
-+    blk = blk_by_name(device);
-+    if (!blk) {
-+        error_set(errp, ERROR_CLASS_DEVICE_NOT_FOUND,
-+                  "Device '%s' not found", device);
-+        return;
-+    }
-+
-+    bs = blk_bs(blk);
-+    if (bdrv_is_read_only(bs)) {
-+        error_setg(errp, "Node '%s' is read only", device);
-+        return;
-+    }
-+
-+    if (!bdrv_can_snapshot(bs)) {
-+        error_setg(errp, QERR_UNSUPPORTED);
-+        return;
-+    }
-+
-+    if (bdrv_snapshot_find(bs, sn, name) < 0) {
-+        /* return success if snapshot does not exists */
-+        return;
-+    }
-+
-+    ret = bdrv_snapshot_delete(bs, NULL, name, &local_err);
-+    if (ret < 0) {
-+        error_set(errp, ERROR_CLASS_GENERIC_ERROR,
-+                  "Error while deleting snapshot on '%s'\n", device);
-+        return;
-+    }
-+}
-+
-+static int loadstate_get_buffer(void *opaque, uint8_t *buf, int64_t pos,
-+                                int size)
-+{
-+    BlockDriverState *bs = (BlockDriverState *)opaque;
-+    int64_t maxlen = bdrv_getlength(bs);
-+    if (pos > maxlen) {
-+        return -EIO;
-+    }
-+    if ((pos + size) > maxlen) {
-+        size = maxlen - pos - 1;
-+    }
-+    if (size == 0) {
-+        return 0;
-+    }
-+    return bdrv_pread(bs, pos, buf, size);
-+}
-+
-+static const QEMUFileOps loadstate_file_ops = {
-+    .get_buffer = loadstate_get_buffer,
-+};
-+
-+int load_state_from_blockdev(const char *filename)
-+{
-+    BlockDriverState *bs = NULL;
-+    BlockDriver *drv = NULL;
-+    Error *local_err = NULL;
-+    Error *blocker = NULL;
-+
-+    QEMUFile *f;
-+    int ret;
-+
-+    bs = bdrv_new();
-+    ret = bdrv_open(&bs, filename, NULL, NULL, 0, drv, &local_err);
-+    error_setg(&blocker, "block device is in use by load state");
-+    bdrv_op_block_all(bs, blocker);
-+
-+    if (ret < 0) {
-+        error_report("Could not open VM state file");
-+        goto the_end;
-+    }
-+
-+    /* restore the VM state */
-+    f = qemu_fopen_ops(bs, &loadstate_file_ops);
-+    if (!f) {
-+        error_report("Could not open VM state file");
-+        ret = -EINVAL;
-+        goto the_end;
-+    }
-+
-+    qemu_system_reset(VMRESET_SILENT);
-+    ret = qemu_loadvm_state(f);
-+
-+    qemu_fclose(f);
-+    migration_incoming_state_destroy();
-+    if (ret < 0) {
-+        error_report("Error %d while loading VM state", ret);
-+        goto the_end;
-+    }
-+
-+    ret = 0;
-+
-+ the_end:
-+    if (bs) {
-+        bdrv_op_unblock_all(bs, blocker);
-+        error_free(blocker);
-+        bdrv_unref(bs);
-+    }
-+    return ret;
-+}
-diff --git a/vl.c b/vl.c
-index 868c4893df..19afd47871 100644
---- a/vl.c
-+++ b/vl.c
-@@ -2960,6 +2960,7 @@ int main(int argc, char **argv, char **envp)
-     int optind;
-     const char *optarg;
-     const char *loadvm = NULL;
-+    const char *loadstate = NULL;
-     MachineClass *machine_class;
-     const char *cpu_model;
-     const char *vga_model = NULL;
-@@ -3631,6 +3632,9 @@ int main(int argc, char **argv, char **envp)
-             case QEMU_OPTION_loadvm:
-                 loadvm = optarg;
-                 break;
-+            case QEMU_OPTION_loadstate:
-+                loadstate = optarg;
-+                break;
-             case QEMU_OPTION_full_screen:
-                 full_screen = 1;
-                 break;
-@@ -4689,6 +4693,10 @@ int main(int argc, char **argv, char **envp)
-         if (load_vmstate(loadvm) < 0) {
-             autostart = 0;
-         }
-+    } else if (loadstate) {
-+        if (load_state_from_blockdev(loadstate) < 0) {
-+            autostart = 0;
-+        }
-     }
-     qdev_prop_check_globals();
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0023-backup-vma-allow-empty-backups.patch b/debian/patches/pve/0023-backup-vma-allow-empty-backups.patch
deleted file mode 100644 (file)
index 4278794..0000000
+++ /dev/null
@@ -1,256 +0,0 @@
-From 84631ae35b99f60a08a4a02f1596f5c9d17ebff0 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 16:31:51 +0100
-Subject: [PATCH 23/49] backup: vma: allow empty backups
-
----
- vma-reader.c | 29 ++++++++++++-------------
- vma-writer.c | 30 ++++++++++++++++----------
- vma.c        | 70 ++++++++++++++++++++++++++++++++++++------------------------
- vma.h        |  1 +
- 4 files changed, 76 insertions(+), 54 deletions(-)
-
-diff --git a/vma-reader.c b/vma-reader.c
-index 2aafb26b2a..78f1de9499 100644
---- a/vma-reader.c
-+++ b/vma-reader.c
-@@ -326,11 +326,6 @@ static int vma_reader_read_head(VmaReader *vmar, Error **errp)
-         }
-     }
--    if (!count) {
--        error_setg(errp, "vma does not contain data");
--        return -1;
--    }
--
-     for (i = 0; i < VMA_MAX_CONFIGS; i++) {
-         uint32_t name_ptr = GUINT32_FROM_BE(h->config_names[i]);
-         uint32_t data_ptr = GUINT32_FROM_BE(h->config_data[i]);
-@@ -822,16 +817,20 @@ static int vma_reader_restore_full(VmaReader *vmar, int vmstate_fd,
-     }
-     if (verbose) {
--        printf("total bytes read %zd, sparse bytes %zd (%.3g%%)\n",
--               vmar->clusters_read*VMA_CLUSTER_SIZE,
--               vmar->zero_cluster_data,
--               (double)(100.0*vmar->zero_cluster_data)/
--               (vmar->clusters_read*VMA_CLUSTER_SIZE));
--
--        int64_t datasize = vmar->clusters_read*VMA_CLUSTER_SIZE-vmar->zero_cluster_data;
--        if (datasize) { // this does not make sense for empty files
--            printf("space reduction due to 4K zero blocks %.3g%%\n",
--                   (double)(100.0*vmar->partial_zero_cluster_data) / datasize);
-+        if (vmar->clusters_read) {
-+            printf("total bytes read %zd, sparse bytes %zd (%.3g%%)\n",
-+                   vmar->clusters_read*VMA_CLUSTER_SIZE,
-+                   vmar->zero_cluster_data,
-+                   (double)(100.0*vmar->zero_cluster_data)/
-+                   (vmar->clusters_read*VMA_CLUSTER_SIZE));
-+
-+            int64_t datasize = vmar->clusters_read*VMA_CLUSTER_SIZE-vmar->zero_cluster_data;
-+            if (datasize) { // this does not make sense for empty files
-+                printf("space reduction due to 4K zero blocks %.3g%%\n",
-+                       (double)(100.0*vmar->partial_zero_cluster_data) / datasize);
-+            }
-+        } else {
-+            printf("vma archive contains no image data\n");
-         }
-     }
-     return ret;
-diff --git a/vma-writer.c b/vma-writer.c
-index 216577a4f7..0dd668b257 100644
---- a/vma-writer.c
-+++ b/vma-writer.c
-@@ -252,7 +252,7 @@ vma_queue_write(VmaWriter *vmaw, const void *buf, size_t bytes)
-     }
-     vmaw->co_writer = NULL;
--    
-+
-     return (done == bytes) ? bytes : -1;
- }
-@@ -376,10 +376,6 @@ static int coroutine_fn vma_write_header(VmaWriter *vmaw)
-     time_t ctime = time(NULL);
-     head->ctime = GUINT64_TO_BE(ctime);
--    if (!vmaw->stream_count) {
--        return -1;
--    }
--
-     for (i = 0; i < VMA_MAX_CONFIGS; i++) {
-         head->config_names[i] = GUINT32_TO_BE(vmaw->config_names[i]);
-         head->config_data[i] = GUINT32_TO_BE(vmaw->config_data[i]);
-@@ -496,6 +492,23 @@ static int vma_count_open_streams(VmaWriter *vmaw)
-     return open_drives;
- }
-+
-+/**
-+ * You need to call this if the vma archive does not contain
-+ * any data stream.
-+ */
-+int coroutine_fn
-+vma_writer_flush_output(VmaWriter *vmaw)
-+{
-+    qemu_co_mutex_lock(&vmaw->flush_lock);
-+    int ret = vma_writer_flush(vmaw);
-+    qemu_co_mutex_unlock(&vmaw->flush_lock);
-+    if (ret < 0) {
-+        vma_writer_set_error(vmaw, "vma_writer_flush_header failed");
-+    }
-+    return ret;
-+}
-+
- /**
-  * all jobs should call this when there is no more data
-  * Returns: number of remaining stream (0 ==> finished)
-@@ -523,12 +536,7 @@ vma_writer_close_stream(VmaWriter *vmaw, uint8_t dev_id)
-     if (open_drives <= 0) {
-         DPRINTF("vma_writer_set_status all drives completed\n");
--        qemu_co_mutex_lock(&vmaw->flush_lock);
--        int ret = vma_writer_flush(vmaw);
--        qemu_co_mutex_unlock(&vmaw->flush_lock);
--        if (ret < 0) {
--            vma_writer_set_error(vmaw, "vma_writer_close_stream: flush failed");
--        }
-+        vma_writer_flush_output(vmaw);
-     }
-     return open_drives;
-diff --git a/vma.c b/vma.c
-index 1ffaced897..c7c05385f6 100644
---- a/vma.c
-+++ b/vma.c
-@@ -28,7 +28,7 @@ static void help(void)
-         "\n"
-         "vma list <filename>\n"
-         "vma config <filename> [-c config]\n"
--        "vma create <filename> [-c config] <archive> pathname ...\n"
-+        "vma create <filename> [-c config] pathname ...\n"
-         "vma extract <filename> [-r <fifo>] <targetdir>\n"
-         "vma verify <filename> [-v]\n"
-         ;
-@@ -396,6 +396,18 @@ typedef struct BackupJob {
- #define BACKUP_SECTORS_PER_CLUSTER (VMA_CLUSTER_SIZE / BDRV_SECTOR_SIZE)
-+static void coroutine_fn backup_run_empty(void *opaque)
-+{
-+    VmaWriter *vmaw = (VmaWriter *)opaque;
-+
-+    vma_writer_flush_output(vmaw);
-+
-+    Error *err = NULL;
-+    if (vma_writer_close(vmaw, &err) != 0) {
-+        g_warning("vma_writer_close failed %s", error_get_pretty(err));
-+    }
-+}
-+
- static void coroutine_fn backup_run(void *opaque)
- {
-     BackupJob *job = (BackupJob *)opaque;
-@@ -469,8 +481,8 @@ static int create_archive(int argc, char **argv)
-     }
--    /* make sure we have archive name and at least one path */
--    if ((optind + 2) > argc) {
-+    /* make sure we an archive name */
-+    if ((optind + 1) > argc) {
-         help();
-     }
-@@ -505,11 +517,11 @@ static int create_archive(int argc, char **argv)
-         l = g_list_next(l);
-     }
--    int ind = 0;
-+    int devcount = 0;
-     while (optind < argc) {
-         const char *path = argv[optind++];
-         char *devname = NULL;
--        path = extract_devname(path, &devname, ind++);
-+        path = extract_devname(path, &devname, devcount++);
-         Error *errp = NULL;
-         BlockDriverState *bs;
-@@ -540,37 +552,39 @@ static int create_archive(int argc, char **argv)
-     int percent = 0;
-     int last_percent = -1;
--    while (1) {
--        main_loop_wait(false);
--        vma_writer_get_status(vmaw, &vmastat);
-+    if (devcount) {
-+        while (1) {
-+            main_loop_wait(false);
-+            vma_writer_get_status(vmaw, &vmastat);
-+
-+            if (verbose) {
--        if (verbose) {
-+                uint64_t total = 0;
-+                uint64_t transferred = 0;
-+                uint64_t zero_bytes = 0;
--            uint64_t total = 0;
--            uint64_t transferred = 0;
--            uint64_t zero_bytes = 0;
-+                int i;
-+                for (i = 0; i < 256; i++) {
-+                    if (vmastat.stream_info[i].size) {
-+                        total += vmastat.stream_info[i].size;
-+                        transferred += vmastat.stream_info[i].transferred;
-+                        zero_bytes += vmastat.stream_info[i].zero_bytes;
-+                    }
-+                }
-+                percent = (transferred*100)/total;
-+                if (percent != last_percent) {
-+                    fprintf(stderr, "progress %d%% %zd/%zd %zd\n", percent,
-+                            transferred, total, zero_bytes);
-+                    fflush(stderr);
--            int i;
--            for (i = 0; i < 256; i++) {
--                if (vmastat.stream_info[i].size) {
--                    total += vmastat.stream_info[i].size;
--                    transferred += vmastat.stream_info[i].transferred;
--                    zero_bytes += vmastat.stream_info[i].zero_bytes;
-+                    last_percent = percent;
-                 }
-             }
--            percent = (transferred*100)/total;
--            if (percent != last_percent) {
--                fprintf(stderr, "progress %d%% %zd/%zd %zd\n", percent,
--                        transferred, total, zero_bytes);
--                fflush(stderr);
--                last_percent = percent;
-+            if (vmastat.closed) {
-+                break;
-             }
-         }
--
--        if (vmastat.closed) {
--            break;
--        }
-     } else {
-         Coroutine *co = qemu_coroutine_create(backup_run_empty, vmaw);
-         qemu_coroutine_enter(co);
-diff --git a/vma.h b/vma.h
-index 98377e473e..365ceb2bcb 100644
---- a/vma.h
-+++ b/vma.h
-@@ -128,6 +128,7 @@ int64_t coroutine_fn vma_writer_write(VmaWriter *vmaw, uint8_t dev_id,
-                                       size_t *zero_bytes);
- int coroutine_fn vma_writer_close_stream(VmaWriter *vmaw, uint8_t dev_id);
-+int coroutine_fn vma_writer_flush_output(VmaWriter *vmaw);
- int vma_writer_get_status(VmaWriter *vmaw, VmaStatus *status);
- void vma_writer_set_error(VmaWriter *vmaw, const char *fmt, ...);
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0023-glusterfs-allow-partial-reads.patch b/debian/patches/pve/0023-glusterfs-allow-partial-reads.patch
new file mode 100644 (file)
index 0000000..e03ad8f
--- /dev/null
@@ -0,0 +1,78 @@
+From 113e86e08a88805de1fb3aa88327174c8fa1d437 Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Wed, 30 Nov 2016 10:27:47 +0100
+Subject: [PATCH 23/28] glusterfs: allow partial reads
+
+This should deal with qemu bug #1644754 until upstream
+decides which way to go. The general direction seems to be
+away from sector based block APIs and with that in mind, and
+when comparing to other network block backends (eg. nfs)
+treating partial reads as errors doesn't seem to make much
+sense.
+---
+ block/gluster.c | 10 +++++++++-
+ 1 file changed, 9 insertions(+), 1 deletion(-)
+
+diff --git a/block/gluster.c b/block/gluster.c
+index bc44c50db0..4fdf68f1fc 100644
+--- a/block/gluster.c
++++ b/block/gluster.c
+@@ -42,6 +42,7 @@ typedef struct GlusterAIOCB {
+     int ret;
+     Coroutine *coroutine;
+     AioContext *aio_context;
++    bool is_write;
+ } GlusterAIOCB;
+ typedef struct BDRVGlusterState {
+@@ -713,8 +714,10 @@ static void gluster_finish_aiocb(struct glfs_fd *fd, ssize_t ret, void *arg)
+         acb->ret = 0; /* Success */
+     } else if (ret < 0) {
+         acb->ret = -errno; /* Read/Write failed */
++    } else if (acb->is_write) {
++        acb->ret = -EIO; /* Partial write - fail it */
+     } else {
+-        acb->ret = -EIO; /* Partial read/write - fail it */
++        acb->ret = 0; /* Success */
+     }
+     aio_co_schedule(acb->aio_context, acb->coroutine);
+@@ -962,6 +965,7 @@ static coroutine_fn int qemu_gluster_co_pwrite_zeroes(BlockDriverState *bs,
+     acb.ret = 0;
+     acb.coroutine = qemu_coroutine_self();
+     acb.aio_context = bdrv_get_aio_context(bs);
++    acb.is_write = true;
+     ret = glfs_zerofill_async(s->fd, offset, size, gluster_finish_aiocb, &acb);
+     if (ret < 0) {
+@@ -1084,9 +1088,11 @@ static coroutine_fn int qemu_gluster_co_rw(BlockDriverState *bs,
+     acb.aio_context = bdrv_get_aio_context(bs);
+     if (write) {
++        acb.is_write = true;
+         ret = glfs_pwritev_async(s->fd, qiov->iov, qiov->niov, offset, 0,
+                                  gluster_finish_aiocb, &acb);
+     } else {
++        acb.is_write = false;
+         ret = glfs_preadv_async(s->fd, qiov->iov, qiov->niov, offset, 0,
+                                 gluster_finish_aiocb, &acb);
+     }
+@@ -1150,6 +1156,7 @@ static coroutine_fn int qemu_gluster_co_flush_to_disk(BlockDriverState *bs)
+     acb.ret = 0;
+     acb.coroutine = qemu_coroutine_self();
+     acb.aio_context = bdrv_get_aio_context(bs);
++    acb.is_write = true;
+     ret = glfs_fsync_async(s->fd, gluster_finish_aiocb, &acb);
+     if (ret < 0) {
+@@ -1196,6 +1203,7 @@ static coroutine_fn int qemu_gluster_co_pdiscard(BlockDriverState *bs,
+     acb.ret = 0;
+     acb.coroutine = qemu_coroutine_self();
+     acb.aio_context = bdrv_get_aio_context(bs);
++    acb.is_write = true;
+     ret = glfs_discard_async(s->fd, offset, size, gluster_finish_aiocb, &acb);
+     if (ret < 0) {
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0024-block-add-the-zeroinit-block-driver-filter.patch b/debian/patches/pve/0024-block-add-the-zeroinit-block-driver-filter.patch
new file mode 100644 (file)
index 0000000..e692359
--- /dev/null
@@ -0,0 +1,252 @@
+From f5ec823838e35470f0c9ff6bf7968ac02fa08b4d Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Thu, 17 Mar 2016 11:33:37 +0100
+Subject: [PATCH 24/28] block: add the zeroinit block driver filter
+
+---
+ block/Makefile.objs |   1 +
+ block/zeroinit.c    | 220 ++++++++++++++++++++++++++++++++++++++++++++++++++++
+ 2 files changed, 221 insertions(+)
+ create mode 100644 block/zeroinit.c
+
+diff --git a/block/Makefile.objs b/block/Makefile.objs
+index de96f8ee80..8cdac08db5 100644
+--- a/block/Makefile.objs
++++ b/block/Makefile.objs
+@@ -4,6 +4,7 @@ block-obj-y += qed.o qed-gencb.o qed-l2-cache.o qed-table.o qed-cluster.o
+ block-obj-y += qed-check.o
+ block-obj-y += vhdx.o vhdx-endian.o vhdx-log.o
+ block-obj-y += quorum.o
++block-obj-y += zeroinit.o
+ block-obj-y += parallels.o blkdebug.o blkverify.o blkreplay.o
+ block-obj-y += block-backend.o snapshot.o qapi.o
+ block-obj-$(CONFIG_WIN32) += file-win32.o win32-aio.o
+diff --git a/block/zeroinit.c b/block/zeroinit.c
+new file mode 100644
+index 0000000000..a857ec3c62
+--- /dev/null
++++ b/block/zeroinit.c
+@@ -0,0 +1,220 @@
++/*
++ * Filter to fake a zero-initialized block device.
++ *
++ * Copyright (c) 2016 Wolfgang Bumiller <w.bumiller@proxmox.com>
++ * Copyright (c) 2016 Proxmox Server Solutions GmbH
++ *
++ * This work is licensed under the terms of the GNU GPL, version 2 or later.
++ * See the COPYING file in the top-level directory.
++ */
++
++#include "qemu/osdep.h"
++#include "qapi/error.h"
++#include "block/block_int.h"
++#include "qapi/qmp/qdict.h"
++#include "qapi/qmp/qstring.h"
++#include "qemu/cutils.h"
++
++typedef struct {
++    bool has_zero_init;
++    int64_t extents;
++} BDRVZeroinitState;
++
++/* Valid blkverify filenames look like blkverify:path/to/raw_image:path/to/image */
++static void zeroinit_parse_filename(const char *filename, QDict *options,
++                                     Error **errp)
++{
++    QString *raw_path;
++
++    /* Parse the blkverify: prefix */
++    if (!strstart(filename, "zeroinit:", &filename)) {
++        /* There was no prefix; therefore, all options have to be already
++           present in the QDict (except for the filename) */
++        return;
++    }
++
++    raw_path = qstring_from_str(filename);
++    qdict_put(options, "x-next", raw_path);
++}
++
++static QemuOptsList runtime_opts = {
++    .name = "zeroinit",
++    .head = QTAILQ_HEAD_INITIALIZER(runtime_opts.head),
++    .desc = {
++        {
++            .name = "x-next",
++            .type = QEMU_OPT_STRING,
++            .help = "[internal use only, will be removed]",
++        },
++        {
++            .name = "x-zeroinit",
++            .type = QEMU_OPT_BOOL,
++            .help = "set has_initialized_zero flag",
++        },
++        { /* end of list */ }
++    },
++};
++
++static int zeroinit_open(BlockDriverState *bs, QDict *options, int flags,
++                          Error **errp)
++{
++    BDRVZeroinitState *s = bs->opaque;
++    QemuOpts *opts;
++    Error *local_err = NULL;
++    int ret;
++
++    s->extents = 0;
++
++    opts = qemu_opts_create(&runtime_opts, NULL, 0, &error_abort);
++    qemu_opts_absorb_qdict(opts, options, &local_err);
++    if (local_err) {
++        error_propagate(errp, local_err);
++        ret = -EINVAL;
++        goto fail;
++    }
++
++    /* Open the raw file */
++    bs->file = bdrv_open_child(qemu_opt_get(opts, "x-next"), options, "next",
++                               bs, &child_file, false, &local_err);
++    if (local_err) {
++        ret = -EINVAL;
++        error_propagate(errp, local_err);
++        goto fail;
++    }
++
++    /* set the options */
++    s->has_zero_init = qemu_opt_get_bool(opts, "x-zeroinit", true);
++
++    ret = 0;
++fail:
++    if (ret < 0) {
++        bdrv_unref_child(bs, bs->file);
++    }
++    qemu_opts_del(opts);
++    return ret;
++}
++
++static void zeroinit_close(BlockDriverState *bs)
++{
++    BDRVZeroinitState *s = bs->opaque;
++    (void)s;
++}
++
++static int64_t zeroinit_getlength(BlockDriverState *bs)
++{
++    return bdrv_getlength(bs->file->bs);
++}
++
++static BlockAIOCB *zeroinit_aio_readv(BlockDriverState *bs,
++        int64_t sector_num, QEMUIOVector *qiov, int nb_sectors,
++        BlockCompletionFunc *cb, void *opaque)
++{
++    return bdrv_aio_readv(bs->file, sector_num, qiov, nb_sectors,
++                          cb, opaque);
++}
++
++static int coroutine_fn zeroinit_co_pwrite_zeroes(BlockDriverState *bs, int64_t offset,
++                                                 int count, BdrvRequestFlags flags)
++{
++    BDRVZeroinitState *s = bs->opaque;
++    if (offset >= s->extents)
++        return 0;
++    return bdrv_pwrite_zeroes(bs->file, offset, count, flags);
++}
++
++static BlockAIOCB *zeroinit_aio_writev(BlockDriverState *bs,
++        int64_t sector_num, QEMUIOVector *qiov, int nb_sectors,
++        BlockCompletionFunc *cb, void *opaque)
++{
++    BDRVZeroinitState *s = bs->opaque;
++    int64_t extents = (sector_num << BDRV_SECTOR_BITS) + ((nb_sectors + 1) << BDRV_SECTOR_BITS);
++    if (extents > s->extents)
++        s->extents = extents;
++    return bdrv_aio_writev(bs->file, sector_num, qiov, nb_sectors,
++                           cb, opaque);
++}
++
++static BlockAIOCB *zeroinit_aio_flush(BlockDriverState *bs,
++                                       BlockCompletionFunc *cb,
++                                       void *opaque)
++{
++    return bdrv_aio_flush(bs->file->bs, cb, opaque);
++}
++
++static bool zeroinit_recurse_is_first_non_filter(BlockDriverState *bs,
++                                                  BlockDriverState *candidate)
++{
++    return bdrv_recurse_is_first_non_filter(bs->file->bs, candidate);
++}
++
++static coroutine_fn int zeroinit_co_flush(BlockDriverState *bs)
++{
++    return bdrv_co_flush(bs->file->bs);
++}
++
++static int zeroinit_has_zero_init(BlockDriverState *bs)
++{
++    BDRVZeroinitState *s = bs->opaque;
++    return s->has_zero_init;
++}
++
++static int64_t coroutine_fn zeroinit_co_get_block_status(BlockDriverState *bs,
++                                                         int64_t sector_num,
++                                                         int nb_sectors, int *pnum,
++                                                         BlockDriverState **file)
++{
++    return bdrv_get_block_status(bs->file->bs, sector_num, nb_sectors, pnum, file);
++}
++
++static int coroutine_fn zeroinit_co_pdiscard(BlockDriverState *bs,
++                                             int64_t offset, int count)
++{
++    return bdrv_co_pdiscard(bs->file->bs, offset, count);
++}
++
++static int zeroinit_truncate(BlockDriverState *bs, int64_t offset)
++{
++    return bdrv_truncate(bs->file, offset);
++}
++
++static int zeroinit_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
++{
++    return bdrv_get_info(bs->file->bs, bdi);
++}
++
++static BlockDriver bdrv_zeroinit = {
++    .format_name                      = "zeroinit",
++    .protocol_name                    = "zeroinit",
++    .instance_size                    = sizeof(BDRVZeroinitState),
++
++    .bdrv_parse_filename              = zeroinit_parse_filename,
++    .bdrv_file_open                   = zeroinit_open,
++    .bdrv_close                       = zeroinit_close,
++    .bdrv_getlength                   = zeroinit_getlength,
++    .bdrv_child_perm                  = bdrv_filter_default_perms,
++    .bdrv_co_flush_to_disk            = zeroinit_co_flush,
++
++    .bdrv_co_pwrite_zeroes            = zeroinit_co_pwrite_zeroes,
++    .bdrv_aio_writev                  = zeroinit_aio_writev,
++    .bdrv_aio_readv                   = zeroinit_aio_readv,
++    .bdrv_aio_flush                   = zeroinit_aio_flush,
++
++    .is_filter                        = true,
++    .bdrv_recurse_is_first_non_filter = zeroinit_recurse_is_first_non_filter,
++
++    .bdrv_has_zero_init = zeroinit_has_zero_init,
++
++    .bdrv_co_get_block_status = zeroinit_co_get_block_status,
++
++    .bdrv_co_pdiscard = zeroinit_co_pdiscard,
++
++    .bdrv_truncate = zeroinit_truncate,
++    .bdrv_get_info = zeroinit_get_info,
++};
++
++static void bdrv_zeroinit_init(void)
++{
++    bdrv_register(&bdrv_zeroinit);
++}
++
++block_init(bdrv_zeroinit_init);
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0024-qmp-add-get_link_status.patch b/debian/patches/pve/0024-qmp-add-get_link_status.patch
deleted file mode 100644 (file)
index a35fbc8..0000000
+++ /dev/null
@@ -1,85 +0,0 @@
-From d8699dad1b5941aa0a5a9346f13586366f1fb051 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 16:34:41 +0100
-Subject: [PATCH 24/49] qmp: add get_link_status
-
----
- net/net.c        | 27 +++++++++++++++++++++++++++
- qapi-schema.json | 16 ++++++++++++++++
- 2 files changed, 43 insertions(+)
-
-diff --git a/net/net.c b/net/net.c
-index 0ac3b9e80c..7410c1e5f3 100644
---- a/net/net.c
-+++ b/net/net.c
-@@ -1373,6 +1373,33 @@ void hmp_info_network(Monitor *mon, const QDict *qdict)
-     }
- }
-+int64_t qmp_get_link_status(const char *name, Error **errp)
-+{
-+    NetClientState *ncs[MAX_QUEUE_NUM];
-+    NetClientState *nc;
-+    int queues;
-+    bool ret;
-+
-+    queues = qemu_find_net_clients_except(name, ncs,
-+                                          NET_CLIENT_DRIVER__MAX,
-+                                          MAX_QUEUE_NUM);
-+
-+    if (queues == 0) {
-+        error_set(errp, ERROR_CLASS_DEVICE_NOT_FOUND,
-+                  "Device '%s' not found", name);
-+        return (int64_t) -1;
-+    }
-+
-+    nc = ncs[0];
-+    ret = ncs[0]->link_down;
-+
-+    if (nc->peer->info->type == NET_CLIENT_DRIVER_NIC) {
-+      ret = ncs[0]->peer->link_down;
-+    }
-+
-+    return (int64_t) ret ? 0 : 1;
-+}
-+
- void qmp_set_link(const char *name, bool up, Error **errp)
- {
-     NetClientState *ncs[MAX_QUEUE_NUM];
-diff --git a/qapi-schema.json b/qapi-schema.json
-index a25074183c..21f822aada 100644
---- a/qapi-schema.json
-+++ b/qapi-schema.json
-@@ -56,6 +56,7 @@
- { 'pragma': {
-     # Commands allowed to return a non-dictionary:
-     'returns-whitelist': [
-+        'get_link_status',
-         'human-monitor-command',
-         'qom-get',
-         'query-migrate-cache-size',
-@@ -2627,6 +2628,21 @@
- { 'command': 'set_link', 'data': {'name': 'str', 'up': 'bool'} }
- ##
-+# @get_link_status:
-+#
-+# Get the current link state of the nics or nic.
-+#
-+# @name: name of the nic you get the state of
-+#
-+# Return: If link is up 1
-+#         If link is down 0
-+#         If an error occure an empty string.
-+#
-+# Notes: this is an Proxmox VE extension and not offical part of Qemu.
-+##
-+{ 'command': 'get_link_status', 'data': {'name': 'str'}, 'returns': 'int'}
-+
-+##
- # @balloon:
- #
- # Request the balloon driver to change its balloon size.
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0025-qemu-img-dd-add-osize-and-read-from-to-stdin-stdout.patch b/debian/patches/pve/0025-qemu-img-dd-add-osize-and-read-from-to-stdin-stdout.patch
new file mode 100644 (file)
index 0000000..fa22468
--- /dev/null
@@ -0,0 +1,304 @@
+From 3bd6a30a92ecb420bac469ec977fbcc0ad918d1c Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Fri, 23 Jun 2017 12:01:43 +0200
+Subject: [PATCH 25/28] qemu-img dd: add osize and read from/to stdin/stdout
+
+Neither convert nor dd were previously able to write to or
+read from a pipe. Particularly serializing an image file
+into a raw stream or vice versa can be useful, but using
+`qemu-img convert -f qcow2 -O raw foo.qcow2 /dev/stdout` in
+a pipe will fail trying to seek.
+
+While dd and convert have overlapping use cases, `dd` is a
+simple read/write loop while convert is much more
+sophisticated and has ways to dealing with holes and blocks
+of zeroes.
+Since these typically can't be detected in pipes via
+SEEK_DATA/HOLE or skipped while writing, dd seems to be the
+better choice for implementing stdin/stdout streams.
+
+This patch causes "if" and "of" to default to stdin and
+stdout respectively, allowing only the "raw" format to be
+used in these cases.
+Since the input can now be a pipe we have no way of
+detecting the size of the output image to create. Since we
+also want to support images with a size not matching the
+dd command's "bs" parameter (which, together with "count"
+could be used to calculate the desired size, and is already
+used to limit it), the "osize" option is added to explicitly
+override the output file's size.
+
+Signed-off-by: Wolfgang Bumiller <w.bumiller@proxmox.com>
+---
+ qemu-img-cmds.hx |   4 +-
+ qemu-img.c       | 176 +++++++++++++++++++++++++++++++++++--------------------
+ 2 files changed, 115 insertions(+), 65 deletions(-)
+
+diff --git a/qemu-img-cmds.hx b/qemu-img-cmds.hx
+index 8ac78222af..16bee83987 100644
+--- a/qemu-img-cmds.hx
++++ b/qemu-img-cmds.hx
+@@ -46,9 +46,9 @@ STEXI
+ ETEXI
+ DEF("dd", img_dd,
+-    "dd [--image-opts] [-f fmt] [-O output_fmt] [bs=block_size] [count=blocks] [skip=blocks] if=input of=output")
++    "dd [--image-opts] [-f fmt] [-O output_fmt] [bs=block_size] [count=blocks] [skip=blocks] [osize=output_size] [if=input] [of=output]")
+ STEXI
+-@item dd [--image-opts] [-f @var{fmt}] [-O @var{output_fmt}] [bs=@var{block_size}] [count=@var{blocks}] [skip=@var{blocks}] if=@var{input} of=@var{output}
++@item dd [--image-opts] [-f @var{fmt}] [-O @var{output_fmt}] [bs=@var{block_size}] [count=@var{blocks}] [skip=@var{blocks}] [osize=output_size] [if=@var{input}] [of=@var{output}]
+ ETEXI
+ DEF("info", img_info,
+diff --git a/qemu-img.c b/qemu-img.c
+index 4f7f458dd2..b9d1ef7bb8 100644
+--- a/qemu-img.c
++++ b/qemu-img.c
+@@ -4035,10 +4035,12 @@ out:
+ #define C_IF      04
+ #define C_OF      010
+ #define C_SKIP    020
++#define C_OSIZE   040
+ struct DdInfo {
+     unsigned int flags;
+     int64_t count;
++    int64_t osize;
+ };
+ struct DdIo {
+@@ -4117,6 +4119,20 @@ static int img_dd_skip(const char *arg,
+     return 0;
+ }
++static int img_dd_osize(const char *arg,
++                        struct DdIo *in, struct DdIo *out,
++                        struct DdInfo *dd)
++{
++    dd->osize = cvtnum(arg);
++
++    if (dd->osize < 0) {
++        error_report("invalid number: '%s'", arg);
++        return 1;
++    }
++
++    return 0;
++}
++
+ static int img_dd(int argc, char **argv)
+ {
+     int ret = 0;
+@@ -4156,6 +4172,7 @@ static int img_dd(int argc, char **argv)
+         { "if", img_dd_if, C_IF },
+         { "of", img_dd_of, C_OF },
+         { "skip", img_dd_skip, C_SKIP },
++        { "osize", img_dd_osize, C_OSIZE },
+         { NULL, NULL, 0 }
+     };
+     const struct option long_options[] = {
+@@ -4223,84 +4240,106 @@ static int img_dd(int argc, char **argv)
+         arg = NULL;
+     }
+-    if (!(dd.flags & C_IF && dd.flags & C_OF)) {
+-        error_report("Must specify both input and output files");
++    if (!(dd.flags & C_IF) && (!fmt || strcmp(fmt, "raw") != 0)) {
++        error_report("Input format must be raw when readin from stdin");
+         ret = -1;
+         goto out;
+     }
+-    blk1 = img_open(image_opts, in.filename, fmt, 0, false, false);
+-
+-    if (!blk1) {
++    if (!(dd.flags & C_OF) && strcmp(out_fmt, "raw") != 0) {
++        error_report("Output format must be raw when writing to stdout");
+         ret = -1;
+         goto out;
+     }
++    if (dd.flags & C_IF) {
++        blk1 = img_open(image_opts, in.filename, fmt, 0, false, false);
+-    drv = bdrv_find_format(out_fmt);
+-    if (!drv) {
+-        error_report("Unknown file format");
+-        ret = -1;
+-        goto out;
+-    }
+-    proto_drv = bdrv_find_protocol(out.filename, true, &local_err);
+-
+-    if (!proto_drv) {
+-        error_report_err(local_err);
+-        ret = -1;
+-        goto out;
+-    }
+-    if (!drv->create_opts) {
+-        error_report("Format driver '%s' does not support image creation",
+-                     drv->format_name);
+-        ret = -1;
+-        goto out;
+-    }
+-    if (!proto_drv->create_opts) {
+-        error_report("Protocol driver '%s' does not support image creation",
+-                     proto_drv->format_name);
+-        ret = -1;
+-        goto out;
++        if (!blk1) {
++            ret = -1;
++            goto out;
++        }
+     }
+-    create_opts = qemu_opts_append(create_opts, drv->create_opts);
+-    create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
+-
+-    opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
+-    size = blk_getlength(blk1);
+-    if (size < 0) {
+-        error_report("Failed to get size for '%s'", in.filename);
++    if (dd.flags & C_OSIZE) {
++        size = dd.osize;
++    } else if (dd.flags & C_IF) {
++        size = blk_getlength(blk1);
++        if (size < 0) {
++            error_report("Failed to get size for '%s'", in.filename);
++            ret = -1;
++            goto out;
++        }
++    } else if (dd.flags & C_COUNT) {
++        size = dd.count * in.bsz;
++    } else {
++        error_report("Output size must be known when reading from stdin");
+         ret = -1;
+         goto out;
+     }
+-    if (dd.flags & C_COUNT && dd.count <= INT64_MAX / in.bsz &&
++    if (!(dd.flags & C_OSIZE) && dd.flags & C_COUNT && dd.count <= INT64_MAX / in.bsz &&
+         dd.count * in.bsz < size) {
+         size = dd.count * in.bsz;
+     }
+-    /* Overflow means the specified offset is beyond input image's size */
+-    if (dd.flags & C_SKIP && (in.offset > INT64_MAX / in.bsz ||
+-                              size < in.bsz * in.offset)) {
+-        qemu_opt_set_number(opts, BLOCK_OPT_SIZE, 0, &error_abort);
+-    } else {
+-        qemu_opt_set_number(opts, BLOCK_OPT_SIZE,
+-                            size - in.bsz * in.offset, &error_abort);
+-    }
+-    ret = bdrv_create(drv, out.filename, opts, &local_err);
+-    if (ret < 0) {
+-        error_reportf_err(local_err,
+-                          "%s: error while creating output image: ",
+-                          out.filename);
+-        ret = -1;
+-        goto out;
+-    }
++    if (dd.flags & C_OF) {
++        drv = bdrv_find_format(out_fmt);
++        if (!drv) {
++            error_report("Unknown file format");
++            ret = -1;
++            goto out;
++        }
++        proto_drv = bdrv_find_protocol(out.filename, true, &local_err);
++
++        if (!proto_drv) {
++            error_report_err(local_err);
++            ret = -1;
++            goto out;
++        }
++        if (!drv->create_opts) {
++            error_report("Format driver '%s' does not support image creation",
++                         drv->format_name);
++            ret = -1;
++            goto out;
++        }
++        if (!proto_drv->create_opts) {
++            error_report("Protocol driver '%s' does not support image creation",
++                         proto_drv->format_name);
++            ret = -1;
++            goto out;
++        }
++        create_opts = qemu_opts_append(create_opts, drv->create_opts);
++        create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
+-    blk2 = img_open(image_opts, out.filename, out_fmt, BDRV_O_RDWR,
+-                    false, false);
++        opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
+-    if (!blk2) {
+-        ret = -1;
+-        goto out;
++        /* Overflow means the specified offset is beyond input image's size */
++        if (dd.flags & C_OSIZE) {
++            qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
++        } else if (dd.flags & C_SKIP && (in.offset > INT64_MAX / in.bsz ||
++                                         size < in.bsz * in.offset)) {
++            qemu_opt_set_number(opts, BLOCK_OPT_SIZE, 0, &error_abort);
++        } else {
++            qemu_opt_set_number(opts, BLOCK_OPT_SIZE,
++                                size - in.bsz * in.offset, &error_abort);
++        }
++
++        ret = bdrv_create(drv, out.filename, opts, &local_err);
++        if (ret < 0) {
++            error_reportf_err(local_err,
++                              "%s: error while creating output image: ",
++                              out.filename);
++            ret = -1;
++            goto out;
++        }
++
++        blk2 = img_open(image_opts, out.filename, out_fmt, BDRV_O_RDWR,
++                        false, false);
++
++        if (!blk2) {
++            ret = -1;
++            goto out;
++        }
+     }
+     if (dd.flags & C_SKIP && (in.offset > INT64_MAX / in.bsz ||
+@@ -4318,11 +4357,18 @@ static int img_dd(int argc, char **argv)
+     for (out_pos = 0; in_pos < size; block_count++) {
+         int in_ret, out_ret;
++        size_t in_bsz = in_pos + in.bsz > size ? size - in_pos : in.bsz;
+-        if (in_pos + in.bsz > size) {
+-            in_ret = blk_pread(blk1, in_pos, in.buf, size - in_pos);
++        if (blk1) {
++            in_ret = blk_pread(blk1, in_pos, in.buf, in_bsz);
+         } else {
+-            in_ret = blk_pread(blk1, in_pos, in.buf, in.bsz);
++            in_ret = read(STDIN_FILENO, in.buf, in_bsz);
++            if (in_ret == 0) {
++                /* early EOF is considered an error */
++                error_report("Input ended unexpectedly");
++                ret = -1;
++                goto out;
++            }
+         }
+         if (in_ret < 0) {
+             error_report("error while reading from input image file: %s",
+@@ -4332,9 +4378,13 @@ static int img_dd(int argc, char **argv)
+         }
+         in_pos += in_ret;
+-        out_ret = blk_pwrite(blk2, out_pos, in.buf, in_ret, 0);
++        if (blk2) {
++            out_ret = blk_pwrite(blk2, out_pos, in.buf, in_ret, 0);
++        } else {
++            out_ret = write(STDOUT_FILENO, in.buf, in_ret);
++        }
+-        if (out_ret < 0) {
++        if (out_ret != in_ret) {
+             error_report("error while writing to output image file: %s",
+                          strerror(-out_ret));
+             ret = -1;
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0025-smm_available-false.patch b/debian/patches/pve/0025-smm_available-false.patch
deleted file mode 100644 (file)
index 62d4ae1..0000000
+++ /dev/null
@@ -1,26 +0,0 @@
-From 2d50e3a3e1eecb40c4935ee6c5808a823ae79440 Mon Sep 17 00:00:00 2001
-From: Alexandre Derumier <aderumier@odiso.com>
-Date: Tue, 29 Sep 2015 15:37:44 +0200
-Subject: [PATCH 25/49] smm_available = false
-
-Signed-off-by: Alexandre Derumier <aderumier@odiso.com>
----
- hw/i386/pc.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/hw/i386/pc.c b/hw/i386/pc.c
-index 81e91a4897..4161a45dc0 100644
---- a/hw/i386/pc.c
-+++ b/hw/i386/pc.c
-@@ -2123,7 +2123,7 @@ bool pc_machine_is_smm_enabled(PCMachineState *pcms)
-     if (tcg_enabled() || qtest_enabled()) {
-         smm_available = true;
-     } else if (kvm_enabled()) {
--        smm_available = kvm_has_smm();
-+        smm_available = false;
-     }
-     if (smm_available) {
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0026-backup-modify-job-api.patch b/debian/patches/pve/0026-backup-modify-job-api.patch
new file mode 100644 (file)
index 0000000..be0841d
--- /dev/null
@@ -0,0 +1,100 @@
+From 020e2108f7571fac3853c47ba1ea8bafb5eef81e Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Wed, 9 Dec 2015 15:04:57 +0100
+Subject: [PATCH 26/28] backup: modify job api
+
+Introduce a pause_count parameter to start a backup in
+paused mode. This way backups of multiple drives can be
+started up sequentially via the completion callback while
+having been started at the same point in time.
+---
+ block/backup.c            | 2 ++
+ block/replication.c       | 2 +-
+ blockdev.c                | 4 ++--
+ blockjob.c                | 2 +-
+ include/block/block_int.h | 1 +
+ 5 files changed, 7 insertions(+), 4 deletions(-)
+
+diff --git a/block/backup.c b/block/backup.c
+index a4fb2884f9..1ede70c061 100644
+--- a/block/backup.c
++++ b/block/backup.c
+@@ -558,6 +558,7 @@ BlockJob *backup_job_create(const char *job_id, BlockDriverState *bs,
+                   BlockdevOnError on_target_error,
+                   int creation_flags,
+                   BlockCompletionFunc *cb, void *opaque,
++                  int pause_count,
+                   BlockJobTxn *txn, Error **errp)
+ {
+     int64_t len;
+@@ -682,6 +683,7 @@ BlockJob *backup_job_create(const char *job_id, BlockDriverState *bs,
+     block_job_add_bdrv(&job->common, "target", target, 0, BLK_PERM_ALL,
+                        &error_abort);
+     job->common.len = len;
++    job->common.pause_count = pause_count;
+     block_job_txn_add_job(txn, &job->common);
+     return &job->common;
+diff --git a/block/replication.c b/block/replication.c
+index bf3c395eb4..1c41d9e6bf 100644
+--- a/block/replication.c
++++ b/block/replication.c
+@@ -531,7 +531,7 @@ static void replication_start(ReplicationState *rs, ReplicationMode mode,
+                                 0, MIRROR_SYNC_MODE_NONE, NULL, false,
+                                 BLOCKDEV_ON_ERROR_REPORT,
+                                 BLOCKDEV_ON_ERROR_REPORT, BLOCK_JOB_INTERNAL,
+-                                backup_job_completed, bs, NULL, &local_err);
++                                backup_job_completed, bs, 0, NULL, &local_err);
+         if (local_err) {
+             error_propagate(errp, local_err);
+             backup_job_cleanup(bs);
+diff --git a/blockdev.c b/blockdev.c
+index 4927914ce3..ec5e931029 100644
+--- a/blockdev.c
++++ b/blockdev.c
+@@ -3273,7 +3273,7 @@ static BlockJob *do_drive_backup(DriveBackup *backup, BlockJobTxn *txn,
+     job = backup_job_create(backup->job_id, bs, target_bs, backup->speed,
+                             backup->sync, bmap, backup->compress,
+                             backup->on_source_error, backup->on_target_error,
+-                            BLOCK_JOB_DEFAULT, NULL, NULL, txn, &local_err);
++                            BLOCK_JOB_DEFAULT, NULL, NULL, 0, txn, &local_err);
+     bdrv_unref(target_bs);
+     if (local_err != NULL) {
+         error_propagate(errp, local_err);
+@@ -3352,7 +3352,7 @@ BlockJob *do_blockdev_backup(BlockdevBackup *backup, BlockJobTxn *txn,
+     job = backup_job_create(backup->job_id, bs, target_bs, backup->speed,
+                             backup->sync, NULL, backup->compress,
+                             backup->on_source_error, backup->on_target_error,
+-                            BLOCK_JOB_DEFAULT, NULL, NULL, txn, &local_err);
++                            BLOCK_JOB_DEFAULT, NULL, NULL, 0, txn, &local_err);
+     if (local_err != NULL) {
+         error_propagate(errp, local_err);
+     }
+diff --git a/blockjob.c b/blockjob.c
+index 6e489327ff..764d41863e 100644
+--- a/blockjob.c
++++ b/blockjob.c
+@@ -289,7 +289,7 @@ void block_job_start(BlockJob *job)
+     job->co = qemu_coroutine_create(block_job_co_entry, job);
+     job->pause_count--;
+     job->busy = true;
+-    job->paused = false;
++    job->paused = job->pause_count > 0;
+     bdrv_coroutine_enter(blk_bs(job->blk), job->co);
+ }
+diff --git a/include/block/block_int.h b/include/block/block_int.h
+index 59400bd848..2b3ecd0575 100644
+--- a/include/block/block_int.h
++++ b/include/block/block_int.h
+@@ -878,6 +878,7 @@ BlockJob *backup_job_create(const char *job_id, BlockDriverState *bs,
+                             BlockdevOnError on_target_error,
+                             int creation_flags,
+                             BlockCompletionFunc *cb, void *opaque,
++                            int pause_count,
+                             BlockJobTxn *txn, Error **errp);
+ void hmp_drive_add_node(Monitor *mon, const char *optstr);
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0026-use-whitespace-between-VERSION-and-PKGVERSION.patch b/debian/patches/pve/0026-use-whitespace-between-VERSION-and-PKGVERSION.patch
deleted file mode 100644 (file)
index 3d3e100..0000000
+++ /dev/null
@@ -1,27 +0,0 @@
-From 907dfd6792ab3e5030c859e1bd857f0127515e5c Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 16:50:05 +0100
-Subject: [PATCH 26/49] use whitespace between VERSION and PKGVERSION
-
-Our kvm version parser expects a white space or comma after
-the version string, see PVE::QemuServer::kvm_user_version()
----
- vl.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/vl.c b/vl.c
-index 19afd47871..d0780a41b4 100644
---- a/vl.c
-+++ b/vl.c
-@@ -1909,7 +1909,7 @@ static void main_loop(void)
- static void version(void)
- {
--    printf("QEMU emulator version " QEMU_VERSION QEMU_PKGVERSION "\n"
-+    printf("QEMU emulator version " QEMU_VERSION " " QEMU_PKGVERSION "\n"
-            QEMU_COPYRIGHT "\n");
- }
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0027-backup-introduce-vma-archive-format.patch b/debian/patches/pve/0027-backup-introduce-vma-archive-format.patch
new file mode 100644 (file)
index 0000000..041f143
--- /dev/null
@@ -0,0 +1,1400 @@
+From c904f41916fbfa522513267933da3f08ec74215f Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Wed, 2 Aug 2017 13:51:02 +0200
+Subject: [PATCH 27/28] backup: introduce vma archive format
+
+---
+ MAINTAINERS          |   6 +
+ block/Makefile.objs  |   3 +
+ block/vma.c          | 424 +++++++++++++++++++++++++++++++++++++++++++
+ blockdev.c           | 499 +++++++++++++++++++++++++++++++++++++++++++++++++++
+ configure            |  30 ++++
+ hmp-commands-info.hx |  13 ++
+ hmp-commands.hx      |  31 ++++
+ hmp.c                |  63 +++++++
+ hmp.h                |   3 +
+ qapi-schema.json     |  91 ++++++++++
+ qapi/block-core.json |  20 ++-
+ 11 files changed, 1181 insertions(+), 2 deletions(-)
+ create mode 100644 block/vma.c
+
+diff --git a/MAINTAINERS b/MAINTAINERS
+index c60235eaf6..d95f278eb4 100644
+--- a/MAINTAINERS
++++ b/MAINTAINERS
+@@ -1810,6 +1810,12 @@ L: qemu-block@nongnu.org
+ S: Supported
+ F: block/vvfat.c
++VMA
++M: Wolfgang Bumiller <w.bumiller@proxmox.com>.
++L: pve-devel@proxmox.com
++S: Supported
++F: block/vma.c
++
+ Image format fuzzer
+ M: Stefan Hajnoczi <stefanha@redhat.com>
+ L: qemu-block@nongnu.org
+diff --git a/block/Makefile.objs b/block/Makefile.objs
+index 8cdac08db5..6df5567dd3 100644
+--- a/block/Makefile.objs
++++ b/block/Makefile.objs
+@@ -21,6 +21,7 @@ block-obj-$(CONFIG_CURL) += curl.o
+ block-obj-$(CONFIG_RBD) += rbd.o
+ block-obj-$(CONFIG_GLUSTERFS) += gluster.o
+ block-obj-$(CONFIG_LIBSSH2) += ssh.o
++block-obj-$(CONFIG_VMA) += vma.o
+ block-obj-y += accounting.o dirty-bitmap.o
+ block-obj-y += write-threshold.o
+ block-obj-y += backup.o
+@@ -45,3 +46,5 @@ block-obj-$(if $(CONFIG_BZIP2),m,n) += dmg-bz2.o
+ dmg-bz2.o-libs     := $(BZIP2_LIBS)
+ qcow.o-libs        := -lz
+ linux-aio.o-libs   := -laio
++vma.o-cflags       := $(VMA_CFLAGS)
++vma.o-libs         := $(VMA_LIBS)
+diff --git a/block/vma.c b/block/vma.c
+new file mode 100644
+index 0000000000..7151514f94
+--- /dev/null
++++ b/block/vma.c
+@@ -0,0 +1,424 @@
++/*
++ * VMA archive backend for QEMU, container object
++ *
++ * Copyright (C) 2017 Proxmox Server Solutions GmbH
++ *
++ * This work is licensed under the terms of the GNU GPL, version 2 or later.
++ * See the COPYING file in the top-level directory.
++ *
++ */
++#include <vma/vma.h>
++
++#include "qemu/osdep.h"
++#include "qemu/uuid.h"
++#include "qemu-common.h"
++#include "qapi/error.h"
++#include "qapi/qmp/qerror.h"
++#include "qapi/qmp/qstring.h"
++#include "qom/object.h"
++#include "qom/object_interfaces.h"
++#include "block/block_int.h"
++
++/* exported interface */
++void vma_object_add_config_file(Object *obj, const char *name,
++                                const char *contents, size_t len,
++                                Error **errp);
++
++#define TYPE_VMA_OBJECT "vma"
++#define VMA_OBJECT(obj) \
++    OBJECT_CHECK(VMAObjectState, (obj), TYPE_VMA_OBJECT)
++#define VMA_OBJECT_GET_CLASS(obj) \
++    OBJECT_GET_CLASS(VMAObjectClass, (obj), TYPE_VMA_OBJECT)
++
++typedef struct VMAObjectClass {
++    ObjectClass parent_class;
++} VMAObjectClass;
++
++typedef struct VMAObjectState {
++    Object parent;
++
++    char        *filename;
++
++    QemuUUID     uuid;
++    bool         blocked;
++    VMAWriter   *vma;
++    QemuMutex    mutex;
++} VMAObjectState;
++
++static VMAObjectState *vma_by_id(const char *name)
++{
++    Object *container;
++    Object *obj;
++
++    container = object_get_objects_root();
++    obj = object_resolve_path_component(container, name);
++
++    return VMA_OBJECT(obj);
++}
++
++static void vma_object_class_complete(UserCreatable *uc, Error **errp)
++{
++    int rc;
++    VMAObjectState *vo = VMA_OBJECT(uc);
++    VMAObjectClass *voc = VMA_OBJECT_GET_CLASS(uc);
++    (void)!vo;
++    (void)!voc;
++
++    if (!vo->filename) {
++        error_setg(errp, "Parameter 'filename' is required");
++        return;
++    }
++
++    rc = VMAWriter_fopen(vo->filename, &vo->vma);
++    if (rc < 0) {
++        error_setg_errno(errp, -rc, "failed to create VMA archive");
++        return;
++    }
++
++    rc = VMAWriter_set_uuid(vo->vma, vo->uuid.data, sizeof(vo->uuid.data));
++    if (rc < 0) {
++        error_setg_errno(errp, -rc, "failed to set UUID of VMA archive");
++        return;
++    }
++
++    qemu_mutex_init(&vo->mutex);
++}
++
++static bool vma_object_can_be_deleted(UserCreatable *uc, Error **errp)
++{
++    //VMAObjectState *vo = VMA_OBJECT(uc);
++    //if (!vo->vma) {
++    //    return true;
++    //}
++    //return false;
++    return true;
++}
++
++static void vma_object_class_init(ObjectClass *oc, void *data)
++{
++    UserCreatableClass *ucc = USER_CREATABLE_CLASS(oc);
++
++    ucc->can_be_deleted = vma_object_can_be_deleted;
++    ucc->complete = vma_object_class_complete;
++}
++
++static char *vma_object_get_filename(Object *obj, Error **errp)
++{
++    VMAObjectState *vo = VMA_OBJECT(obj);
++
++    return g_strdup(vo->filename);
++}
++
++static void vma_object_set_filename(Object *obj, const char *str, Error **errp)
++{
++    VMAObjectState *vo = VMA_OBJECT(obj);
++
++    if (vo->vma) {
++        error_setg(errp, "filename cannot be changed after creation");
++        return;
++    }
++
++    g_free(vo->filename);
++    vo->filename = g_strdup(str);
++}
++
++static char *vma_object_get_uuid(Object *obj, Error **errp)
++{
++    VMAObjectState *vo = VMA_OBJECT(obj);
++
++    return qemu_uuid_unparse_strdup(&vo->uuid);
++}
++
++static void vma_object_set_uuid(Object *obj, const char *str, Error **errp)
++{
++    VMAObjectState *vo = VMA_OBJECT(obj);
++
++    if (vo->vma) {
++        error_setg(errp, "uuid cannot be changed after creation");
++        return;
++    }
++
++    qemu_uuid_parse(str, &vo->uuid);
++}
++
++static bool vma_object_get_blocked(Object *obj, Error **errp)
++{
++    VMAObjectState *vo = VMA_OBJECT(obj);
++
++    return vo->blocked;
++}
++
++static void vma_object_set_blocked(Object *obj, bool blocked, Error **errp)
++{
++    VMAObjectState *vo = VMA_OBJECT(obj);
++
++    (void)errp;
++
++    vo->blocked = blocked;
++}
++
++void vma_object_add_config_file(Object *obj, const char *name,
++                                const char *contents, size_t len,
++                                Error **errp)
++{
++    int rc;
++    VMAObjectState *vo = VMA_OBJECT(obj);
++
++    if (!vo || !vo->vma) {
++        error_setg(errp, "not a valid vma object to add config files to");
++        return;
++    }
++
++    rc = VMAWriter_addConfigFile(vo->vma, name, contents, len);
++    if (rc < 0) {
++        error_setg_errno(errp, -rc, "failed to add config file to VMA");
++        return;
++    }
++}
++
++static void vma_object_init(Object *obj)
++{
++    VMAObjectState *vo = VMA_OBJECT(obj);
++    (void)!vo;
++
++    object_property_add_str(obj, "filename",
++                            vma_object_get_filename, vma_object_set_filename,
++                            NULL);
++    object_property_add_str(obj, "uuid",
++                            vma_object_get_uuid, vma_object_set_uuid,
++                            NULL);
++    object_property_add_bool(obj, "blocked",
++                            vma_object_get_blocked, vma_object_set_blocked,
++                            NULL);
++}
++
++static void vma_object_finalize(Object *obj)
++{
++    VMAObjectState *vo = VMA_OBJECT(obj);
++    VMAObjectClass *voc = VMA_OBJECT_GET_CLASS(obj);
++    (void)!voc;
++
++    qemu_mutex_destroy(&vo->mutex);
++
++    VMAWriter_destroy(vo->vma, true);
++    g_free(vo->filename);
++}
++
++static const TypeInfo vma_object_info = {
++    .name = TYPE_VMA_OBJECT,
++    .parent = TYPE_OBJECT,
++    .class_size = sizeof(VMAObjectClass),
++    .class_init = vma_object_class_init,
++    .instance_size = sizeof(VMAObjectState),
++    .instance_init = vma_object_init,
++    .instance_finalize = vma_object_finalize,
++    .interfaces = (InterfaceInfo[]) {
++        { TYPE_USER_CREATABLE },
++        { }
++    }
++};
++
++static void register_types(void)
++{
++    type_register_static(&vma_object_info);
++}
++
++type_init(register_types);
++
++typedef struct {
++    VMAObjectState *vma_obj;
++    char           *name;
++    size_t          device_id;
++    uint64_t        byte_size;
++} BDRVVMAState;
++
++static void qemu_vma_parse_filename(const char *filename, QDict *options,
++                                    Error **errp)
++{
++    char *sep;
++
++    sep = strchr(filename, '/');
++    if (!sep || sep == filename) {
++        error_setg(errp, "VMA filename should be <vma-object>/<device-name>");
++        return;
++    }
++
++    qdict_put(options, "vma", qstring_from_substr(filename, 0, sep-filename-1));
++
++    while (*sep && *sep == '/')
++        ++sep;
++    if (!*sep) {
++        error_setg(errp, "missing device name\n");
++        return;
++    }
++
++    qdict_put(options, "name", qstring_from_str(sep));
++}
++
++static QemuOptsList runtime_opts = {
++    .name = "vma-drive",
++    .head = QTAILQ_HEAD_INITIALIZER(runtime_opts.head),
++    .desc = {
++        {
++            .name = "vma",
++            .type = QEMU_OPT_STRING,
++            .help = "VMA Object name",
++        },
++        {
++            .name = "name",
++            .type = QEMU_OPT_STRING,
++            .help = "VMA device name",
++        },
++        {
++            .name = BLOCK_OPT_SIZE,
++            .type = QEMU_OPT_SIZE,
++            .help = "Virtual disk size"
++        },
++        { /* end of list */ }
++    },
++};
++static int qemu_vma_open(BlockDriverState *bs, QDict *options, int flags,
++                         Error **errp)
++{
++    Error *local_err = NULL;
++    BDRVVMAState *s = bs->opaque;
++    QemuOpts *opts;
++    const char *vma_id, *device_name;
++    ssize_t dev_id;
++    int64_t bytes = 0;
++    int ret;
++
++    opts = qemu_opts_create(&runtime_opts, NULL, 0, &error_abort);
++    qemu_opts_absorb_qdict(opts, options, &local_err);
++    if (local_err) {
++        error_propagate(errp, local_err);
++        ret = -EINVAL;
++        goto failed_opts;
++    }
++
++    bytes = ROUND_UP(qemu_opt_get_size_del(opts, BLOCK_OPT_SIZE, 0),
++                     BDRV_SECTOR_SIZE);
++
++    vma_id = qemu_opt_get(opts, "vma");
++    device_name = qemu_opt_get(opts, "name");
++
++    VMAObjectState *vma = vma_by_id(vma_id);
++    if (!vma) {
++        ret = -EINVAL;
++        error_setg(errp, "no such VMA object: %s", vma_id);
++        goto failed_opts;
++    }
++
++    dev_id = VMAWriter_findDevice(vma->vma, device_name);
++    if (dev_id >= 0) {
++        error_setg(errp, "drive already exists in VMA object");
++        ret = -EIO;
++        goto failed_opts;
++    }
++
++    dev_id = VMAWriter_addDevice(vma->vma, device_name, (uint64_t)bytes);
++    if (dev_id < 0) {
++        error_setg_errno(errp, -dev_id, "failed to add VMA device");
++        ret = -EIO;
++        goto failed_opts;
++    }
++
++    object_ref(OBJECT(vma));
++    s->vma_obj = vma;
++    s->name = g_strdup(device_name);
++    s->device_id = (size_t)dev_id;
++    s->byte_size = bytes;
++
++    ret = 0;
++
++failed_opts:
++    qemu_opts_del(opts);
++    return ret;
++}
++
++static void qemu_vma_close(BlockDriverState *bs)
++{
++    BDRVVMAState *s = bs->opaque;
++
++    (void)VMAWriter_finishDevice(s->vma_obj->vma, s->device_id);
++    object_unref(OBJECT(s->vma_obj));
++
++    g_free(s->name);
++}
++
++static int64_t qemu_vma_getlength(BlockDriverState *bs)
++{
++    BDRVVMAState *s = bs->opaque;
++
++    return s->byte_size;
++}
++
++static coroutine_fn int qemu_vma_co_writev(BlockDriverState *bs,
++                                           int64_t sector_num,
++                                           int nb_sectors,
++                                           QEMUIOVector *qiov)
++{
++    size_t i;
++    ssize_t rc;
++    BDRVVMAState *s = bs->opaque;
++    VMAObjectState *vo = s->vma_obj;
++    off_t offset = sector_num * BDRV_SECTOR_SIZE;
++
++    qemu_mutex_lock(&vo->mutex);
++    if (vo->blocked) {
++        return -EPERM;
++    }
++    for (i = 0; i != qiov->niov; ++i) {
++        const struct iovec *v = &qiov->iov[i];
++        size_t blocks = v->iov_len / VMA_BLOCK_SIZE;
++        if (blocks * VMA_BLOCK_SIZE != v->iov_len) {
++            return -EIO;
++        }
++        rc = VMAWriter_writeBlocks(vo->vma, s->device_id,
++                                   v->iov_base, blocks, offset);
++        if (errno) {
++            return -errno;
++        }
++        if (rc != blocks) {
++            return -EIO;
++        }
++        offset += v->iov_len;
++    }
++    qemu_mutex_unlock(&vo->mutex);
++    return 0;
++}
++
++static int qemu_vma_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
++{
++    bdi->cluster_size = VMA_CLUSTER_SIZE;
++    bdi->unallocated_blocks_are_zero = true;
++    bdi->can_write_zeroes_with_unmap = false;
++    return 0;
++}
++
++static BlockDriver bdrv_vma_drive = {
++    .format_name                  = "vma-drive",
++    .instance_size                = sizeof(BDRVVMAState),
++
++#if 0
++    .bdrv_create                  = qemu_vma_create,
++    .create_opts                  = &qemu_vma_create_opts,
++#endif
++
++    .bdrv_parse_filename          = qemu_vma_parse_filename,
++    .bdrv_file_open               = qemu_vma_open,
++
++    .bdrv_close                   = qemu_vma_close,
++    .bdrv_has_zero_init           = bdrv_has_zero_init_1,
++    .bdrv_getlength               = qemu_vma_getlength,
++    .bdrv_get_info                = qemu_vma_get_info,
++
++    .bdrv_co_writev               = qemu_vma_co_writev,
++};
++
++static void bdrv_vma_init(void)
++{
++    bdrv_register(&bdrv_vma_drive);
++}
++
++block_init(bdrv_vma_init);
+diff --git a/blockdev.c b/blockdev.c
+index ec5e931029..981276692a 100644
+--- a/blockdev.c
++++ b/blockdev.c
+@@ -31,10 +31,12 @@
+  */
+ #include "qemu/osdep.h"
++#include "qemu/uuid.h"
+ #include "sysemu/block-backend.h"
+ #include "sysemu/blockdev.h"
+ #include "hw/block/block.h"
+ #include "block/blockjob.h"
++#include "block/blockjob_int.h"
+ #include "block/throttle-groups.h"
+ #include "monitor/monitor.h"
+ #include "qemu/error-report.h"
+@@ -2956,6 +2958,503 @@ out:
+     aio_context_release(aio_context);
+ }
++/* PVE backup related function */
++
++static struct PVEBackupState {
++    Error *error;
++    bool cancel;
++    QemuUUID uuid;
++    char uuid_str[37];
++    int64_t speed;
++    time_t start_time;
++    time_t end_time;
++    char *backup_file;
++    Object *vmaobj;
++    GList *di_list;
++    size_t next_job;
++    size_t total;
++    size_t transferred;
++    size_t zero_bytes;
++} backup_state;
++
++typedef struct PVEBackupDevInfo {
++    BlockDriverState *bs;
++    size_t size;
++    uint8_t dev_id;
++    bool completed;
++    char targetfile[PATH_MAX];
++    BlockDriverState *target;
++} PVEBackupDevInfo;
++
++static void pvebackup_run_next_job(void);
++
++static void pvebackup_cleanup(void)
++{
++    backup_state.end_time = time(NULL);
++
++    if (backup_state.vmaobj) {
++        object_unparent(backup_state.vmaobj);
++        backup_state.vmaobj = NULL;
++    }
++
++    if (backup_state.di_list) {
++        GList *l = backup_state.di_list;
++        while (l) {
++            PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
++            l = g_list_next(l);
++            g_free(di);
++        }
++        g_list_free(backup_state.di_list);
++        backup_state.di_list = NULL;
++    }
++}
++
++static void pvebackup_complete_cb(void *opaque, int ret)
++{
++    PVEBackupDevInfo *di = opaque;
++
++    di->completed = true;
++
++    if (ret < 0 && !backup_state.error) {
++        error_setg(&backup_state.error, "job failed with err %d - %s",
++                   ret, strerror(-ret));
++    }
++
++    di->bs = NULL;
++    di->target = NULL;
++
++    if (backup_state.vmaobj) {
++        object_unparent(backup_state.vmaobj);
++        backup_state.vmaobj = NULL;
++    }
++
++    if (!backup_state.cancel) {
++        pvebackup_run_next_job();
++    }
++}
++
++static void pvebackup_cancel(void *opaque)
++{
++    backup_state.cancel = true;
++
++    if (!backup_state.error) {
++        error_setg(&backup_state.error, "backup cancelled");
++    }
++
++    if (backup_state.vmaobj) {
++        Error *err;
++        /* make sure vma writer does not block anymore */
++        if (!object_set_props(backup_state.vmaobj, &err, "blocked", "yes", NULL)) {
++            if (err) {
++                error_report_err(err);
++            }
++        }
++    }
++
++    GList *l = backup_state.di_list;
++    while (l) {
++        PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
++        l = g_list_next(l);
++        if (!di->completed && di->bs) {
++            BlockJob *job = di->bs->job;
++            if (job) {
++                if (!di->completed) {
++                    block_job_cancel_sync(job);
++                }
++            }
++        }
++    }
++
++    pvebackup_cleanup();
++}
++
++void qmp_backup_cancel(Error **errp)
++{
++    Coroutine *co = qemu_coroutine_create(pvebackup_cancel, NULL);
++    qemu_coroutine_enter(co);
++
++    while (backup_state.vmaobj) {
++        /* FIXME: Find something better for this */
++        aio_poll(qemu_get_aio_context(), true);
++    }
++}
++
++void vma_object_add_config_file(Object *obj, const char *name, 
++                                const char *contents, size_t len,
++                                Error **errp);
++static int config_to_vma(const char *file, BackupFormat format,
++                         Object *vmaobj,
++                         const char *backup_dir,
++                         Error **errp)
++{
++        char *cdata = NULL;
++        gsize clen = 0;
++        GError *err = NULL;
++        if (!g_file_get_contents(file, &cdata, &clen, &err)) {
++            error_setg(errp, "unable to read file '%s'", file);
++            return 1;
++        }
++
++        char *basename = g_path_get_basename(file);
++
++        if (format == BACKUP_FORMAT_VMA) {
++            vma_object_add_config_file(vmaobj, basename, cdata, clen, errp);
++        } else if (format == BACKUP_FORMAT_DIR) {
++            char config_path[PATH_MAX];
++            snprintf(config_path, PATH_MAX, "%s/%s", backup_dir, basename);
++            if (!g_file_set_contents(config_path, cdata, clen, &err)) {
++              error_setg(errp, "unable to write config file '%s'", config_path);
++                g_free(cdata);
++                g_free(basename);
++                return 1;
++            }
++        }
++
++        g_free(basename);
++        g_free(cdata);
++
++        return 0;
++}
++
++static void pvebackup_run_next_job(void)
++{
++    bool cancel = backup_state.error || backup_state.cancel;
++fprintf(stderr, "run next job: %zu\n", backup_state.next_job);
++    GList *next = g_list_nth(backup_state.di_list, backup_state.next_job);
++    while (next) {
++        PVEBackupDevInfo *di = (PVEBackupDevInfo *)next->data;
++        backup_state.next_job++;
++        if (!di->completed && di->bs && di->bs->job) {
++            BlockJob *job = di->bs->job;
++            if (cancel) {
++                block_job_cancel(job);
++            } else {
++                block_job_resume(job);
++            }
++            return;
++        }
++        next = g_list_next(next);
++    }
++    pvebackup_cleanup();
++}
++
++UuidInfo *qmp_backup(const char *backup_file, bool has_format,
++                    BackupFormat format,
++                    bool has_config_file, const char *config_file,
++                    bool has_firewall_file, const char *firewall_file,
++                    bool has_devlist, const char *devlist,
++                    bool has_speed, int64_t speed, Error **errp)
++{
++    BlockBackend *blk;
++    BlockDriverState *bs = NULL;
++    const char *backup_dir = NULL;
++    Error *local_err = NULL;
++    QemuUUID uuid;
++    gchar **devs = NULL;
++    GList *di_list = NULL;
++    GList *l;
++    UuidInfo *uuid_info;
++    BlockJob *job;
++
++    if (backup_state.di_list || backup_state.vmaobj) {
++        error_set(errp, ERROR_CLASS_GENERIC_ERROR,
++                  "previous backup not finished");
++        return NULL;
++    }
++
++    /* Todo: try to auto-detect format based on file name */
++    format = has_format ? format : BACKUP_FORMAT_VMA;
++
++    if (has_devlist) {
++        devs = g_strsplit_set(devlist, ",;:", -1);
++
++        gchar **d = devs;
++        while (d && *d) {
++            blk = blk_by_name(*d);
++            if (blk) {
++                bs = blk_bs(blk);
++                if (bdrv_is_read_only(bs)) {
++                    error_setg(errp, "Node '%s' is read only", *d);
++                    goto err;
++                }
++                if (!bdrv_is_inserted(bs)) {
++                    error_setg(errp, QERR_DEVICE_HAS_NO_MEDIUM, *d);
++                    goto err;
++                }
++                PVEBackupDevInfo *di = g_new0(PVEBackupDevInfo, 1);
++                di->bs = bs;
++                di_list = g_list_append(di_list, di);
++            } else {
++                error_set(errp, ERROR_CLASS_DEVICE_NOT_FOUND,
++                          "Device '%s' not found", *d);
++                goto err;
++            }
++            d++;
++        }
++
++    } else {
++        BdrvNextIterator it;
++
++        bs = NULL;
++        for (bs = bdrv_first(&it); bs; bs = bdrv_next(&it)) {
++            if (!bdrv_is_inserted(bs) || bdrv_is_read_only(bs)) {
++                continue;
++            }
++
++            PVEBackupDevInfo *di = g_new0(PVEBackupDevInfo, 1);
++            di->bs = bs;
++            di_list = g_list_append(di_list, di);
++        }
++    }
++
++    if (!di_list) {
++        error_set(errp, ERROR_CLASS_GENERIC_ERROR, "empty device list");
++        goto err;
++    }
++
++    size_t total = 0;
++
++    l = di_list;
++    while (l) {
++        PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
++        l = g_list_next(l);
++        if (bdrv_op_is_blocked(di->bs, BLOCK_OP_TYPE_BACKUP_SOURCE, errp)) {
++            goto err;
++        }
++
++        ssize_t size = bdrv_getlength(di->bs);
++        if (size < 0) {
++            error_setg_errno(errp, -di->size, "bdrv_getlength failed");
++            goto err;
++        }
++        di->size = size;
++        total += size;
++    }
++
++    qemu_uuid_generate(&uuid);
++
++    if (format == BACKUP_FORMAT_VMA) {
++        char uuidstr[UUID_FMT_LEN+1];
++        qemu_uuid_unparse(&uuid, uuidstr);
++        uuidstr[UUID_FMT_LEN] = 0;
++        backup_state.vmaobj =
++            object_new_with_props("vma", object_get_objects_root(),
++                                  "vma-backup-obj", &local_err,
++                                  "filename", backup_file,
++                                  "uuid", uuidstr,
++                                  NULL);
++        if (!backup_state.vmaobj) {
++            if (local_err) {
++                error_propagate(errp, local_err);
++            }
++            goto err;
++        }
++
++        l = di_list;
++        while (l) {
++            QDict *options = qdict_new();
++
++            PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
++            l = g_list_next(l);
++
++            const char *devname = bdrv_get_device_name(di->bs);
++            snprintf(di->targetfile, PATH_MAX, "vma-backup-obj/%s.raw", devname);
++
++            qdict_put(options, "driver", qstring_from_str("vma-drive"));
++            qdict_put(options, "size", qint_from_int(di->size));
++            di->target = bdrv_open(di->targetfile, NULL, options, BDRV_O_RDWR, &local_err);
++            if (!di->target) {
++                error_propagate(errp, local_err);
++                goto err;
++            }
++        }
++    } else if (format == BACKUP_FORMAT_DIR) {
++        if (mkdir(backup_file, 0640) != 0) {
++            error_setg_errno(errp, errno, "can't create directory '%s'\n",
++                             backup_file);
++            goto err;
++        }
++        backup_dir = backup_file;
++
++        l = di_list;
++        while (l) {
++            PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
++            l = g_list_next(l);
++
++            const char *devname = bdrv_get_device_name(di->bs);
++            snprintf(di->targetfile, PATH_MAX, "%s/%s.raw", backup_dir, devname);
++
++            int flags = BDRV_O_RDWR;
++            bdrv_img_create(di->targetfile, "raw", NULL, NULL, NULL,
++                            di->size, flags, &local_err, false);
++            if (local_err) {
++                error_propagate(errp, local_err);
++                goto err;
++            }
++
++            di->target = bdrv_open(di->targetfile, NULL, NULL, flags, &local_err);
++            if (!di->target) {
++                error_propagate(errp, local_err);
++                goto err;
++            }
++        }
++    } else {
++       error_set(errp, ERROR_CLASS_GENERIC_ERROR, "unknown backup format");
++       goto err;
++    }
++
++    /* add configuration file to archive */
++    if (has_config_file) {
++      if(config_to_vma(config_file, format, backup_state.vmaobj, backup_dir, errp) != 0) {
++        goto err;
++      }
++    }
++
++    /* add firewall file to archive */
++    if (has_firewall_file) {
++      if(config_to_vma(firewall_file, format, backup_state.vmaobj, backup_dir, errp) != 0) {
++        goto err;
++      }
++    }
++    /* initialize global backup_state now */
++
++    backup_state.cancel = false;
++
++    if (backup_state.error) {
++        error_free(backup_state.error);
++        backup_state.error = NULL;
++    }
++
++    backup_state.speed = (has_speed && speed > 0) ? speed : 0;
++
++    backup_state.start_time = time(NULL);
++    backup_state.end_time = 0;
++
++    if (backup_state.backup_file) {
++        g_free(backup_state.backup_file);
++    }
++    backup_state.backup_file = g_strdup(backup_file);
++
++    memcpy(&backup_state.uuid, &uuid, sizeof(uuid));
++    qemu_uuid_unparse(&uuid, backup_state.uuid_str);
++
++    backup_state.di_list = di_list;
++    backup_state.next_job = 0;
++
++    backup_state.total = total;
++    backup_state.transferred = 0;
++    backup_state.zero_bytes = 0;
++
++    /* start all jobs (paused state) */
++    l = di_list;
++    while (l) {
++        PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
++        l = g_list_next(l);
++
++        job = backup_job_create(NULL, di->bs, di->target, speed, MIRROR_SYNC_MODE_FULL, NULL,
++                                false, BLOCKDEV_ON_ERROR_REPORT, BLOCKDEV_ON_ERROR_REPORT,
++                                BLOCK_JOB_DEFAULT,
++                                pvebackup_complete_cb, di, 2, NULL, &local_err);
++        if (di->target) {
++            bdrv_unref(di->target);
++            di->target = NULL;
++        }
++        if (!job || local_err != NULL) {
++            error_setg(&backup_state.error, "backup_job_create failed");
++            pvebackup_cancel(NULL);
++        } else {
++            block_job_start(job);
++        }
++    }
++
++    if (!backup_state.error) {
++        pvebackup_run_next_job(); // run one job
++    }
++
++    uuid_info = g_malloc0(sizeof(*uuid_info));
++    uuid_info->UUID = g_strdup(backup_state.uuid_str);
++
++    return uuid_info;
++
++err:
++
++    l = di_list;
++    while (l) {
++        PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
++        l = g_list_next(l);
++
++        if (di->target) {
++            bdrv_unref(di->target);
++        }
++
++        if (di->targetfile[0]) {
++            unlink(di->targetfile);
++        }
++        g_free(di);
++    }
++    g_list_free(di_list);
++
++    if (devs) {
++        g_strfreev(devs);
++    }
++
++    if (backup_state.vmaobj) {
++        object_unparent(backup_state.vmaobj);
++        backup_state.vmaobj = NULL;
++    }
++
++    if (backup_dir) {
++        rmdir(backup_dir);
++    }
++
++    return NULL;
++}
++
++BackupStatus *qmp_query_backup(Error **errp)
++{
++    BackupStatus *info = g_malloc0(sizeof(*info));
++
++    if (!backup_state.start_time) {
++        /* not started, return {} */
++        return info;
++    }
++
++    info->has_status = true;
++    info->has_start_time = true;
++    info->start_time = backup_state.start_time;
++
++    if (backup_state.backup_file) {
++        info->has_backup_file = true;
++        info->backup_file = g_strdup(backup_state.backup_file);
++    }
++
++    info->has_uuid = true;
++    info->uuid = g_strdup(backup_state.uuid_str);
++
++    if (backup_state.end_time) {
++        if (backup_state.error) {
++            info->status = g_strdup("error");
++            info->has_errmsg = true;
++            info->errmsg = g_strdup(error_get_pretty(backup_state.error));
++        } else {
++            info->status = g_strdup("done");
++        }
++        info->has_end_time = true;
++        info->end_time = backup_state.end_time;
++    } else {
++        info->status = g_strdup("active");
++    }
++
++    info->has_total = true;
++    info->total = backup_state.total;
++    info->has_zero_bytes = true;
++    info->zero_bytes = backup_state.zero_bytes;
++    info->has_transferred = true;
++    info->transferred = backup_state.transferred;
++
++    return info;
++}
++
+ void qmp_block_stream(bool has_job_id, const char *job_id, const char *device,
+                       bool has_base, const char *base,
+                       bool has_base_node, const char *base_node,
+diff --git a/configure b/configure
+index be4d326ae0..841f7a8fae 100755
+--- a/configure
++++ b/configure
+@@ -320,6 +320,7 @@ numa=""
+ tcmalloc="no"
+ jemalloc="no"
+ replication="yes"
++vma=""
+ supported_cpu="no"
+ supported_os="no"
+@@ -1183,6 +1184,10 @@ for opt do
+   ;;
+   --enable-replication) replication="yes"
+   ;;
++  --disable-vma) vma="no"
++  ;;
++  --enable-vma) vma="yes"
++  ;;
+   *)
+       echo "ERROR: unknown option $opt"
+       echo "Try '$0 --help' for more information"
+@@ -1427,6 +1432,7 @@ disabled with --disable-FEATURE, default is enabled if available:
+   xfsctl          xfsctl support
+   qom-cast-debug  cast debugging support
+   tools           build qemu-io, qemu-nbd and qemu-image tools
++  vma             VMA archive backend
+ NOTE: The object files are built at the place where configure is launched
+ EOF
+@@ -3705,6 +3711,23 @@ EOF
+ fi
+ ##########################################
++# vma probe
++if test "$vma" != "no" ; then
++  if $pkg_config --exact-version=0.1.0 vma; then
++    vma="yes"
++    vma_cflags=$($pkg_config --cflags vma)
++    vma_libs=$($pkg_config --libs vma)
++  else
++    if test "$vma" = "yes" ; then
++      feature_not_found "VMA Archive backend support" \
++          "Install libvma devel"
++    fi
++    vma="no"
++  fi
++fi
++
++
++##########################################
+ # signalfd probe
+ signalfd="no"
+ cat > $TMPC << EOF
+@@ -5146,6 +5169,7 @@ echo "tcmalloc support  $tcmalloc"
+ echo "jemalloc support  $jemalloc"
+ echo "avx2 optimization $avx2_opt"
+ echo "replication support $replication"
++echo "VMA support       $vma"
+ if test "$sdl_too_old" = "yes"; then
+ echo "-> Your SDL version is too old - please upgrade to have SDL support"
+@@ -5703,6 +5727,12 @@ if test "$libssh2" = "yes" ; then
+   echo "LIBSSH2_LIBS=$libssh2_libs" >> $config_host_mak
+ fi
++if test "$vma" = "yes" ; then
++  echo "CONFIG_VMA=y" >> $config_host_mak
++  echo "VMA_CFLAGS=$vma_cflags" >> $config_host_mak
++  echo "VMA_LIBS=$vma_libs" >> $config_host_mak
++fi
++
+ # USB host support
+ if test "$libusb" = "yes"; then
+   echo "HOST_USB=libusb legacy" >> $config_host_mak
+diff --git a/hmp-commands-info.hx b/hmp-commands-info.hx
+index 5fc57a2210..3b5a0f95e4 100644
+--- a/hmp-commands-info.hx
++++ b/hmp-commands-info.hx
+@@ -487,6 +487,19 @@ STEXI
+ Show CPU statistics.
+ ETEXI
++    {
++        .name       = "backup",
++        .args_type  = "",
++        .params     = "",
++        .help       = "show backup status",
++        .cmd = hmp_info_backup,
++    },
++
++STEXI
++@item info backup
++show backup status
++ETEXI
++
+ #if defined(CONFIG_SLIRP)
+     {
+         .name       = "usernet",
+diff --git a/hmp-commands.hx b/hmp-commands.hx
+index 58940a762b..a2867b56f2 100644
+--- a/hmp-commands.hx
++++ b/hmp-commands.hx
+@@ -87,6 +87,37 @@ STEXI
+ Copy data from a backing file into a block device.
+ ETEXI
++   {
++        .name       = "backup",
++        .args_type  = "directory:-d,backupfile:s,speed:o?,devlist:s?",
++        .params     = "[-d] backupfile [speed [devlist]]",
++        .help       = "create a VM Backup."
++                  "\n\t\t\t Use -d to dump data into a directory instead"
++                  "\n\t\t\t of using VMA format.",
++        .cmd = hmp_backup,
++    },
++
++STEXI
++@item backup
++@findex backup
++Create a VM backup.
++ETEXI
++
++    {
++        .name       = "backup_cancel",
++        .args_type  = "",
++        .params     = "",
++        .help       = "cancel the current VM backup",
++        .cmd = hmp_backup_cancel,
++    },
++
++STEXI
++@item backup_cancel
++@findex backup_cancel
++Cancel the current VM backup.
++
++ETEXI
++
+     {
+         .name       = "block_job_set_speed",
+         .args_type  = "device:B,speed:o",
+diff --git a/hmp.c b/hmp.c
+index f725d061e6..12f1f46125 100644
+--- a/hmp.c
++++ b/hmp.c
+@@ -151,6 +151,44 @@ void hmp_info_mice(Monitor *mon, const QDict *qdict)
+     qapi_free_MouseInfoList(mice_list);
+ }
++void hmp_info_backup(Monitor *mon, const QDict *qdict)
++{
++    BackupStatus *info;
++
++    info = qmp_query_backup(NULL);
++    if (info->has_status) {
++        if (info->has_errmsg) {
++            monitor_printf(mon, "Backup status: %s - %s\n",
++                           info->status, info->errmsg);
++        } else {
++            monitor_printf(mon, "Backup status: %s\n", info->status);
++        }
++    }
++
++    if (info->has_backup_file) {
++        monitor_printf(mon, "Start time: %s", ctime(&info->start_time));
++        if (info->end_time) {
++            monitor_printf(mon, "End time: %s", ctime(&info->end_time));
++        }
++
++        int per = (info->has_total && info->total &&
++            info->has_transferred && info->transferred) ?
++            (info->transferred * 100)/info->total : 0;
++        int zero_per = (info->has_total && info->total &&
++                        info->has_zero_bytes && info->zero_bytes) ?
++            (info->zero_bytes * 100)/info->total : 0;
++        monitor_printf(mon, "Backup file: %s\n", info->backup_file);
++        monitor_printf(mon, "Backup uuid: %s\n", info->uuid);
++        monitor_printf(mon, "Total size: %zd\n", info->total);
++        monitor_printf(mon, "Transferred bytes: %zd (%d%%)\n",
++                       info->transferred, per);
++        monitor_printf(mon, "Zero bytes: %zd (%d%%)\n",
++                       info->zero_bytes, zero_per);
++    }
++
++    qapi_free_BackupStatus(info);
++}
++
+ void hmp_info_migrate(Monitor *mon, const QDict *qdict)
+ {
+     MigrationInfo *info;
+@@ -1613,6 +1651,31 @@ void hmp_block_stream(Monitor *mon, const QDict *qdict)
+     hmp_handle_error(mon, &error);
+ }
++void hmp_backup_cancel(Monitor *mon, const QDict *qdict)
++{
++    Error *error = NULL;
++
++    qmp_backup_cancel(&error);
++
++    hmp_handle_error(mon, &error);
++}
++
++void hmp_backup(Monitor *mon, const QDict *qdict)
++{
++    Error *error = NULL;
++
++    int dir = qdict_get_try_bool(qdict, "directory", 0);
++    const char *backup_file = qdict_get_str(qdict, "backupfile");
++    const char *devlist = qdict_get_try_str(qdict, "devlist");
++    int64_t speed = qdict_get_try_int(qdict, "speed", 0);
++
++    qmp_backup(backup_file, true, dir ? BACKUP_FORMAT_DIR : BACKUP_FORMAT_VMA,
++               false, NULL, false, NULL, !!devlist,
++               devlist, qdict_haskey(qdict, "speed"), speed, &error);
++
++    hmp_handle_error(mon, &error);
++}
++
+ void hmp_block_job_set_speed(Monitor *mon, const QDict *qdict)
+ {
+     Error *error = NULL;
+diff --git a/hmp.h b/hmp.h
+index 0497afbf65..8c1b4846b3 100644
+--- a/hmp.h
++++ b/hmp.h
+@@ -31,6 +31,7 @@ void hmp_info_migrate(Monitor *mon, const QDict *qdict);
+ void hmp_info_migrate_capabilities(Monitor *mon, const QDict *qdict);
+ void hmp_info_migrate_parameters(Monitor *mon, const QDict *qdict);
+ void hmp_info_migrate_cache_size(Monitor *mon, const QDict *qdict);
++void hmp_info_backup(Monitor *mon, const QDict *qdict);
+ void hmp_info_cpus(Monitor *mon, const QDict *qdict);
+ void hmp_info_block(Monitor *mon, const QDict *qdict);
+ void hmp_info_blockstats(Monitor *mon, const QDict *qdict);
+@@ -80,6 +81,8 @@ void hmp_eject(Monitor *mon, const QDict *qdict);
+ void hmp_change(Monitor *mon, const QDict *qdict);
+ void hmp_block_set_io_throttle(Monitor *mon, const QDict *qdict);
+ void hmp_block_stream(Monitor *mon, const QDict *qdict);
++void hmp_backup(Monitor *mon, const QDict *qdict);
++void hmp_backup_cancel(Monitor *mon, const QDict *qdict);
+ void hmp_block_job_set_speed(Monitor *mon, const QDict *qdict);
+ void hmp_block_job_cancel(Monitor *mon, const QDict *qdict);
+ void hmp_block_job_pause(Monitor *mon, const QDict *qdict);
+diff --git a/qapi-schema.json b/qapi-schema.json
+index 5e82933ca1..b20020a054 100644
+--- a/qapi-schema.json
++++ b/qapi-schema.json
+@@ -571,6 +571,97 @@
+ { 'command': 'query-events', 'returns': ['EventInfo'] }
+ ##
++# @BackupStatus:
++#
++# Detailed backup status.
++#
++# @status: string describing the current backup status.
++#          This can be 'active', 'done', 'error'. If this field is not
++#          returned, no backup process has been initiated
++#
++# @errmsg: error message (only returned if status is 'error')
++#
++# @total: total amount of bytes involved in the backup process
++#
++# @transferred: amount of bytes already backed up.
++#
++# @zero-bytes: amount of 'zero' bytes detected.
++#
++# @start-time: time (epoch) when backup job started.
++#
++# @end-time: time (epoch) when backup job finished.
++#
++# @backup-file: backup file name
++#
++# @uuid: uuid for this backup job
++#
++##
++{ 'struct': 'BackupStatus',
++  'data': {'*status': 'str', '*errmsg': 'str', '*total': 'int',
++           '*transferred': 'int', '*zero-bytes': 'int',
++           '*start-time': 'int', '*end-time': 'int',
++           '*backup-file': 'str', '*uuid': 'str' } }
++
++##
++# @BackupFormat:
++#
++# An enumeration of supported backup formats.
++#
++# @vma: Proxmox vma backup format
++##
++{ 'enum': 'BackupFormat',
++  'data': [ 'vma', 'dir' ] }
++
++##
++# @backup:
++#
++# Starts a VM backup.
++#
++# @backup-file: the backup file name
++#
++# @format: format of the backup file
++#
++# @config-file: a configuration file to include into
++# the backup archive.
++#
++# @speed: the maximum speed, in bytes per second
++#
++# @devlist: list of block device names (separated by ',', ';'
++# or ':'). By default the backup includes all writable block devices.
++#
++# Returns: the uuid of the backup job
++#
++##
++{ 'command': 'backup', 'data': { 'backup-file': 'str',
++                                    '*format': 'BackupFormat',
++                                    '*config-file': 'str',
++                                    '*firewall-file': 'str',
++                                    '*devlist': 'str', '*speed': 'int' },
++  'returns': 'UuidInfo' }
++
++##
++# @query-backup:
++#
++# Returns information about current/last backup task.
++#
++# Returns: @BackupStatus
++#
++##
++{ 'command': 'query-backup', 'returns': 'BackupStatus' }
++
++##
++# @backup-cancel:
++#
++# Cancel the current executing backup process.
++#
++# Returns: nothing on success
++#
++# Notes: This command succeeds even if there is no backup process running.
++#
++##
++{ 'command': 'backup-cancel' }
++
++##
+ # @MigrationStats:
+ #
+ # Detailed migration status.
+diff --git a/qapi/block-core.json b/qapi/block-core.json
+index 033457ce86..891afe5eaa 100644
+--- a/qapi/block-core.json
++++ b/qapi/block-core.json
+@@ -2116,7 +2116,7 @@
+             'host_device', 'http', 'https', 'iscsi', 'luks', 'nbd', 'nfs',
+             'null-aio', 'null-co', 'parallels', 'qcow', 'qcow2', 'qed',
+             'quorum', 'raw', 'rbd', 'replication', 'sheepdog', 'ssh',
+-            'vdi', 'vhdx', 'vmdk', 'vpc', 'vvfat' ] }
++            'vdi', 'vhdx', 'vmdk', 'vpc', 'vvfat', 'vma-drive' ] }
+ ##
+ # @BlockdevOptionsFile:
+@@ -2866,6 +2866,21 @@
+   'data': { '*offset': 'int', '*size': 'int' } }
+ ##
++# @BlockdevOptionsVMADrive:
++#
++# Driver specific block device options for VMA Drives
++#
++# @filename: vma-drive path
++#
++# @size: drive size in bytes
++#
++# Since: 2.9
++##
++{ 'struct': 'BlockdevOptionsVMADrive',
++  'data': { 'filename': 'str',
++            'size': 'int' } }
++
++##
+ # @BlockdevOptions:
+ #
+ # Options for creating a block device.  Many options are available for all
+@@ -2927,7 +2942,8 @@
+       'vhdx':       'BlockdevOptionsGenericFormat',
+       'vmdk':       'BlockdevOptionsGenericCOWFormat',
+       'vpc':        'BlockdevOptionsGenericFormat',
+-      'vvfat':      'BlockdevOptionsVVFAT'
++      'vvfat':      'BlockdevOptionsVVFAT',
++      'vma-drive':  'BlockdevOptionsVMADrive'
+   } }
+ ##
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0027-vma-add-firewall.patch b/debian/patches/pve/0027-vma-add-firewall.patch
deleted file mode 100644 (file)
index d83386d..0000000
+++ /dev/null
@@ -1,144 +0,0 @@
-From 23aa2199f34c16254bd342abbd3ae2b16e4aa64e Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 9 Dec 2015 16:51:23 +0100
-Subject: [PATCH 27/49] vma: add firewall
-
----
- blockdev.c       | 78 ++++++++++++++++++++++++++++++++++----------------------
- hmp.c            |  2 +-
- qapi-schema.json |  1 +
- 3 files changed, 50 insertions(+), 31 deletions(-)
-
-diff --git a/blockdev.c b/blockdev.c
-index 2713585051..43818dade1 100644
---- a/blockdev.c
-+++ b/blockdev.c
-@@ -3163,6 +3163,44 @@ void qmp_backup_cancel(Error **errp)
-     }
- }
-+static int config_to_vma(const char *file, BackupFormat format,
-+                       const char *backup_dir, VmaWriter *vmaw,
-+                       Error **errp)
-+{
-+        char *cdata = NULL;
-+        gsize clen = 0;
-+        GError *err = NULL;
-+        if (!g_file_get_contents(file, &cdata, &clen, &err)) {
-+            error_setg(errp, "unable to read file '%s'", file);
-+            return 1;
-+        }
-+
-+        char *basename = g_path_get_basename(file);
-+
-+        if (format == BACKUP_FORMAT_VMA) {
-+            if (vma_writer_add_config(vmaw, basename, cdata, clen) != 0) {
-+            error_setg(errp, "unable to add %s config data to vma archive", file);
-+                g_free(cdata);
-+                g_free(basename);
-+                return 1;
-+            }
-+        } else if (format == BACKUP_FORMAT_DIR) {
-+            char config_path[PATH_MAX];
-+            snprintf(config_path, PATH_MAX, "%s/%s", backup_dir, basename);
-+            if (!g_file_set_contents(config_path, cdata, clen, &err)) {
-+            error_setg(errp, "unable to write config file '%s'", config_path);
-+                g_free(cdata);
-+                g_free(basename);
-+                return 1;
-+            }
-+        }
-+
-+        g_free(basename);
-+        g_free(cdata);
-+
-+      return 0;
-+}
-+
- bool block_job_should_pause(BlockJob *job);
- static void pvebackup_run_next_job(void)
- {
-@@ -3190,6 +3228,7 @@ static void pvebackup_run_next_job(void)
- UuidInfo *qmp_backup(const char *backup_file, bool has_format,
-                     BackupFormat format,
-                     bool has_config_file, const char *config_file,
-+                  bool has_firewall_file, const char *firewall_file,
-                     bool has_devlist, const char *devlist,
-                     bool has_speed, int64_t speed, Error **errp)
- {
-@@ -3342,38 +3381,17 @@ UuidInfo *qmp_backup(const char *backup_file, bool has_format,
-     /* add configuration file to archive */
-     if (has_config_file) {
--        char *cdata = NULL;
--        gsize clen = 0;
--        GError *err = NULL;
--        if (!g_file_get_contents(config_file, &cdata, &clen, &err)) {
--            error_setg(errp, "unable to read file '%s'", config_file);
--            goto err;
--        }
--
--        char *basename = g_path_get_basename(config_file);
--
--        if (format == BACKUP_FORMAT_VMA) {
--            if (vma_writer_add_config(vmaw, basename, cdata, clen) != 0) {
--                error_setg(errp, "unable to add config data to vma archive");
--                g_free(cdata);
--                g_free(basename);
--                goto err;
--            }
--        } else if (format == BACKUP_FORMAT_DIR) {
--            char config_path[PATH_MAX];
--            snprintf(config_path, PATH_MAX, "%s/%s", backup_dir, basename);
--            if (!g_file_set_contents(config_path, cdata, clen, &err)) {
--                error_setg(errp, "unable to write config file '%s'", config_path);
--                g_free(cdata);
--                g_free(basename);
--                goto err;
--            }
--        }
--
--        g_free(basename);
--        g_free(cdata);
-+      if(config_to_vma(config_file, format, backup_dir, vmaw, errp) != 0) {
-+      goto err;
-+      }
-     }
-+    /* add firewall file to archive */
-+    if (has_firewall_file) {
-+      if(config_to_vma(firewall_file, format, backup_dir, vmaw, errp) != 0) {
-+      goto err;
-+      }
-+    }
-     /* initialize global backup_state now */
-     backup_state.cancel = false;
-diff --git a/hmp.c b/hmp.c
-index aaf0de1642..12f1f46125 100644
---- a/hmp.c
-+++ b/hmp.c
-@@ -1670,7 +1670,7 @@ void hmp_backup(Monitor *mon, const QDict *qdict)
-     int64_t speed = qdict_get_try_int(qdict, "speed", 0);
-     qmp_backup(backup_file, true, dir ? BACKUP_FORMAT_DIR : BACKUP_FORMAT_VMA,
--               false, NULL, !!devlist,
-+               false, NULL, false, NULL, !!devlist,
-                devlist, qdict_haskey(qdict, "speed"), speed, &error);
-     hmp_handle_error(mon, &error);
-diff --git a/qapi-schema.json b/qapi-schema.json
-index 21f822aada..b20020a054 100644
---- a/qapi-schema.json
-+++ b/qapi-schema.json
-@@ -635,6 +635,7 @@
- { 'command': 'backup', 'data': { 'backup-file': 'str',
-                                     '*format': 'BackupFormat',
-                                     '*config-file': 'str',
-+                                    '*firewall-file': 'str',
-                                     '*devlist': 'str', '*speed': 'int' },
-   'returns': 'UuidInfo' }
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0028-adding-old-vma-files.patch b/debian/patches/pve/0028-adding-old-vma-files.patch
new file mode 100644 (file)
index 0000000..be25d37
--- /dev/null
@@ -0,0 +1,3380 @@
+From cf7632dba8a8b7191f5e0c2ba826c6827fecb412 Mon Sep 17 00:00:00 2001
+From: Wolfgang Bumiller <w.bumiller@proxmox.com>
+Date: Mon, 7 Aug 2017 08:51:16 +0200
+Subject: [PATCH 28/28] adding old vma files
+
+---
+ Makefile                  |   3 +-
+ Makefile.objs             |   1 +
+ block/backup.c            | 128 ++++---
+ block/replication.c       |   1 +
+ blockdev.c                | 245 ++++++++-----
+ blockjob.c                |  11 +-
+ include/block/block_int.h |   4 +
+ vma-reader.c              | 857 ++++++++++++++++++++++++++++++++++++++++++++++
+ vma-writer.c              | 771 +++++++++++++++++++++++++++++++++++++++++
+ vma.c                     | 757 ++++++++++++++++++++++++++++++++++++++++
+ vma.h                     | 149 ++++++++
+ 11 files changed, 2794 insertions(+), 133 deletions(-)
+ create mode 100644 vma-reader.c
+ create mode 100644 vma-writer.c
+ create mode 100644 vma.c
+ create mode 100644 vma.h
+
+diff --git a/Makefile b/Makefile
+index 6c359b2f86..edbc8b50f0 100644
+--- a/Makefile
++++ b/Makefile
+@@ -284,7 +284,7 @@ ifneq ($(wildcard config-host.mak),)
+ include $(SRC_PATH)/tests/Makefile.include
+ endif
+-all: $(DOCS) $(TOOLS) $(HELPERS-y) recurse-all modules
++all: $(DOCS) $(TOOLS) vma$(EXESUF) $(HELPERS-y) recurse-all modules
+ qemu-version.h: FORCE
+       $(call quiet-command, \
+@@ -377,6 +377,7 @@ qemu-img.o: qemu-img-cmds.h
+ qemu-img$(EXESUF): qemu-img.o $(block-obj-y) $(crypto-obj-y) $(io-obj-y) $(qom-obj-y) $(COMMON_LDADDS)
+ qemu-nbd$(EXESUF): qemu-nbd.o $(block-obj-y) $(crypto-obj-y) $(io-obj-y) $(qom-obj-y) $(COMMON_LDADDS)
+ qemu-io$(EXESUF): qemu-io.o $(block-obj-y) $(crypto-obj-y) $(io-obj-y) $(qom-obj-y) $(COMMON_LDADDS)
++vma$(EXESUF): vma.o vma-reader.o $(block-obj-y) $(crypto-obj-y) $(io-obj-y) $(qom-obj-y) $(COMMON_LDADDS)
+ qemu-bridge-helper$(EXESUF): qemu-bridge-helper.o $(COMMON_LDADDS)
+diff --git a/Makefile.objs b/Makefile.objs
+index fbfbbb7f70..f5f8dbab3b 100644
+--- a/Makefile.objs
++++ b/Makefile.objs
+@@ -14,6 +14,7 @@ block-obj-y += block.o blockjob.o
+ block-obj-y += block/
+ block-obj-y += qemu-io-cmds.o
+ block-obj-$(CONFIG_REPLICATION) += replication.o
++block-obj-y += vma-writer.o
+ block-obj-m = block/
+diff --git a/block/backup.c b/block/backup.c
+index 1ede70c061..51b5ba6eda 100644
+--- a/block/backup.c
++++ b/block/backup.c
+@@ -36,6 +36,7 @@ typedef struct BackupBlockJob {
+     BdrvDirtyBitmap *sync_bitmap;
+     MirrorSyncMode sync_mode;
+     RateLimit limit;
++    BackupDumpFunc *dump_cb;
+     BlockdevOnError on_source_error;
+     BlockdevOnError on_target_error;
+     CoRwlock flush_rwlock;
+@@ -145,13 +146,24 @@ static int coroutine_fn backup_do_cow(BackupBlockJob *job,
+             goto out;
+         }
++        int64_t start_sec = start * sectors_per_cluster;
+         if (buffer_is_zero(iov.iov_base, iov.iov_len)) {
+-            ret = blk_co_pwrite_zeroes(job->target, start * job->cluster_size,
+-                                       bounce_qiov.size, BDRV_REQ_MAY_UNMAP);
++            if (job->dump_cb) {
++                ret = job->dump_cb(job->common.opaque, job->target, start_sec, n, NULL);
++            }
++            if (job->target) {
++                ret = blk_co_pwrite_zeroes(job->target, start * job->cluster_size,
++                                           bounce_qiov.size, BDRV_REQ_MAY_UNMAP);
++            }
+         } else {
+-            ret = blk_co_pwritev(job->target, start * job->cluster_size,
+-                                 bounce_qiov.size, &bounce_qiov,
+-                                 job->compress ? BDRV_REQ_WRITE_COMPRESSED : 0);
++            if (job->dump_cb) {
++                ret = job->dump_cb(job->common.opaque, job->target, start_sec, n, bounce_buffer);
++            }
++            if (job->target) {
++                ret = blk_co_pwritev(job->target, start * job->cluster_size,
++                                     bounce_qiov.size, &bounce_qiov,
++                                     job->compress ? BDRV_REQ_WRITE_COMPRESSED : 0);
++            }
+         }
+         if (ret < 0) {
+             trace_backup_do_cow_write_fail(job, start, ret);
+@@ -246,6 +258,8 @@ static void backup_abort(BlockJob *job)
+ static void backup_clean(BlockJob *job)
+ {
+     BackupBlockJob *s = container_of(job, BackupBlockJob, common);
++    if (!s->target)
++        return;
+     assert(s->target);
+     blk_unref(s->target);
+     s->target = NULL;
+@@ -330,9 +344,11 @@ static BlockErrorAction backup_error_action(BackupBlockJob *job,
+     if (read) {
+         return block_job_error_action(&job->common, job->on_source_error,
+                                       true, error);
+-    } else {
++    } else if (job->target) {
+         return block_job_error_action(&job->common, job->on_target_error,
+                                       false, error);
++    } else {
++        return BLOCK_ERROR_ACTION_REPORT;
+     }
+ }
+@@ -453,6 +469,7 @@ static void coroutine_fn backup_run(void *opaque)
+     job->done_bitmap = bitmap_new(end);
++
+     job->before_write.notify = backup_before_write_notify;
+     bdrv_add_before_write_notifier(bs, &job->before_write);
+@@ -557,6 +574,7 @@ BlockJob *backup_job_create(const char *job_id, BlockDriverState *bs,
+                   BlockdevOnError on_source_error,
+                   BlockdevOnError on_target_error,
+                   int creation_flags,
++                  BackupDumpFunc *dump_cb,
+                   BlockCompletionFunc *cb, void *opaque,
+                   int pause_count,
+                   BlockJobTxn *txn, Error **errp)
+@@ -567,7 +585,7 @@ BlockJob *backup_job_create(const char *job_id, BlockDriverState *bs,
+     int ret;
+     assert(bs);
+-    assert(target);
++    assert(target || dump_cb);
+     if (bs == target) {
+         error_setg(errp, "Source and target cannot be the same");
+@@ -580,13 +598,13 @@ BlockJob *backup_job_create(const char *job_id, BlockDriverState *bs,
+         return NULL;
+     }
+-    if (!bdrv_is_inserted(target)) {
++    if (target && !bdrv_is_inserted(target)) {
+         error_setg(errp, "Device is not inserted: %s",
+                    bdrv_get_device_name(target));
+         return NULL;
+     }
+-    if (compress && target->drv->bdrv_co_pwritev_compressed == NULL) {
++    if (target && compress && target->drv->bdrv_co_pwritev_compressed == NULL) {
+         error_setg(errp, "Compression is not supported for this drive %s",
+                    bdrv_get_device_name(target));
+         return NULL;
+@@ -596,7 +614,7 @@ BlockJob *backup_job_create(const char *job_id, BlockDriverState *bs,
+         return NULL;
+     }
+-    if (bdrv_op_is_blocked(target, BLOCK_OP_TYPE_BACKUP_TARGET, errp)) {
++    if (target && bdrv_op_is_blocked(target, BLOCK_OP_TYPE_BACKUP_TARGET, errp)) {
+         return NULL;
+     }
+@@ -636,15 +654,18 @@ BlockJob *backup_job_create(const char *job_id, BlockDriverState *bs,
+         goto error;
+     }
+-    /* The target must match the source in size, so no resize here either */
+-    job->target = blk_new(BLK_PERM_WRITE,
+-                          BLK_PERM_CONSISTENT_READ | BLK_PERM_WRITE |
+-                          BLK_PERM_WRITE_UNCHANGED | BLK_PERM_GRAPH_MOD);
+-    ret = blk_insert_bs(job->target, target, errp);
+-    if (ret < 0) {
+-        goto error;
++    if (target) {
++        /* The target must match the source in size, so no resize here either */
++        job->target = blk_new(BLK_PERM_WRITE,
++                              BLK_PERM_CONSISTENT_READ | BLK_PERM_WRITE |
++                              BLK_PERM_WRITE_UNCHANGED | BLK_PERM_GRAPH_MOD);
++        ret = blk_insert_bs(job->target, target, errp);
++        if (ret < 0) {
++            goto error;
++        }
+     }
++    job->dump_cb = dump_cb;
+     job->on_source_error = on_source_error;
+     job->on_target_error = on_target_error;
+     job->sync_mode = sync_mode;
+@@ -652,38 +673,55 @@ BlockJob *backup_job_create(const char *job_id, BlockDriverState *bs,
+                        sync_bitmap : NULL;
+     job->compress = compress;
+-    /* If there is no backing file on the target, we cannot rely on COW if our
+-     * backup cluster size is smaller than the target cluster size. Even for
+-     * targets with a backing file, try to avoid COW if possible. */
+-    ret = bdrv_get_info(target, &bdi);
+-    if (ret == -ENOTSUP && !target->backing) {
+-        /* Cluster size is not defined */
+-        error_report("WARNING: The target block device doesn't provide "
+-                     "information about the block size and it doesn't have a "
+-                     "backing file. The default block size of %u bytes is "
+-                     "used. If the actual block size of the target exceeds "
+-                     "this default, the backup may be unusable",
+-                     BACKUP_CLUSTER_SIZE_DEFAULT);
+-        job->cluster_size = BACKUP_CLUSTER_SIZE_DEFAULT;
+-    } else if (ret < 0 && !target->backing) {
+-        error_setg_errno(errp, -ret,
+-            "Couldn't determine the cluster size of the target image, "
+-            "which has no backing file");
+-        error_append_hint(errp,
+-            "Aborting, since this may create an unusable destination image\n");
+-        goto error;
+-    } else if (ret < 0 && target->backing) {
+-        /* Not fatal; just trudge on ahead. */
+-        job->cluster_size = BACKUP_CLUSTER_SIZE_DEFAULT;
++    if (target) {
++        /* If there is no backing file on the target, we cannot rely on COW if our
++         * backup cluster size is smaller than the target cluster size. Even for
++         * targets with a backing file, try to avoid COW if possible. */
++        ret = bdrv_get_info(target, &bdi);
++        if (ret == -ENOTSUP && !target->backing) {
++            /* Cluster size is not defined */
++            error_report("WARNING: The target block device doesn't provide "
++                         "information about the block size and it doesn't have a "
++                         "backing file. The default block size of %u bytes is "
++                         "used. If the actual block size of the target exceeds "
++                         "this default, the backup may be unusable",
++                         BACKUP_CLUSTER_SIZE_DEFAULT);
++            job->cluster_size = BACKUP_CLUSTER_SIZE_DEFAULT;
++        } else if (ret < 0 && !target->backing) {
++            error_setg_errno(errp, -ret,
++                "Couldn't determine the cluster size of the target image, "
++                "which has no backing file");
++            error_append_hint(errp,
++                "Aborting, since this may create an unusable destination image\n");
++            goto error;
++        } else if (ret < 0 && target->backing) {
++            /* Not fatal; just trudge on ahead. */
++            job->cluster_size = BACKUP_CLUSTER_SIZE_DEFAULT;
++        } else {
++            job->cluster_size = MAX(BACKUP_CLUSTER_SIZE_DEFAULT, bdi.cluster_size);
++        }
+     } else {
+-        job->cluster_size = MAX(BACKUP_CLUSTER_SIZE_DEFAULT, bdi.cluster_size);
++        ret = bdrv_get_info(bs, &bdi);
++        if (ret < 0) {
++            job->cluster_size = BACKUP_CLUSTER_SIZE_DEFAULT;
++        } else {
++            /* round down to nearest BACKUP_CLUSTER_SIZE_DEFAULT */
++            job->cluster_size = (bdi.cluster_size / BACKUP_CLUSTER_SIZE_DEFAULT) * BACKUP_CLUSTER_SIZE_DEFAULT;
++            if (job->cluster_size == 0) {
++                /* but we can't go below it */
++                job->cluster_size = BACKUP_CLUSTER_SIZE_DEFAULT;
++            }
++        }
+     }
+-    /* Required permissions are already taken with target's blk_new() */
+-    block_job_add_bdrv(&job->common, "target", target, 0, BLK_PERM_ALL,
+-                       &error_abort);
++    if (target) {
++        /* Required permissions are already taken with target's blk_new() */
++        block_job_add_bdrv(&job->common, "target", target, 0, BLK_PERM_ALL,
++                           &error_abort);
++    } else {
++        job->common.pause_count = pause_count;
++    }
+     job->common.len = len;
+-    job->common.pause_count = pause_count;
+     block_job_txn_add_job(txn, &job->common);
+     return &job->common;
+diff --git a/block/replication.c b/block/replication.c
+index 1c41d9e6bf..60c6524417 100644
+--- a/block/replication.c
++++ b/block/replication.c
+@@ -531,6 +531,7 @@ static void replication_start(ReplicationState *rs, ReplicationMode mode,
+                                 0, MIRROR_SYNC_MODE_NONE, NULL, false,
+                                 BLOCKDEV_ON_ERROR_REPORT,
+                                 BLOCKDEV_ON_ERROR_REPORT, BLOCK_JOB_INTERNAL,
++                                NULL,
+                                 backup_job_completed, bs, 0, NULL, &local_err);
+         if (local_err) {
+             error_propagate(errp, local_err);
+diff --git a/blockdev.c b/blockdev.c
+index 981276692a..1eeffb0571 100644
+--- a/blockdev.c
++++ b/blockdev.c
+@@ -31,7 +31,6 @@
+  */
+ #include "qemu/osdep.h"
+-#include "qemu/uuid.h"
+ #include "sysemu/block-backend.h"
+ #include "sysemu/blockdev.h"
+ #include "hw/block/block.h"
+@@ -55,6 +54,7 @@
+ #include "qemu/cutils.h"
+ #include "qemu/help_option.h"
+ #include "qemu/throttle-options.h"
++#include "vma.h"
+ static QTAILQ_HEAD(, BlockDriverState) monitor_bdrv_states =
+     QTAILQ_HEAD_INITIALIZER(monitor_bdrv_states);
+@@ -2958,20 +2958,44 @@ out:
+     aio_context_release(aio_context);
+ }
++void block_job_event_cancelled(BlockJob *job);
++void block_job_event_completed(BlockJob *job, const char *msg);
++static void block_job_cb(void *opaque, int ret)
++{
++    /* Note that this function may be executed from another AioContext besides
++     * the QEMU main loop.  If you need to access anything that assumes the
++     * QEMU global mutex, use a BH or introduce a mutex.
++     */
++
++    BlockDriverState *bs = opaque;
++    const char *msg = NULL;
++
++    assert(bs->job);
++
++    if (ret < 0) {
++        msg = strerror(-ret);
++    }
++
++    if (block_job_is_cancelled(bs->job)) {
++        block_job_event_cancelled(bs->job);
++    } else {
++        block_job_event_completed(bs->job, msg);
++    }
++}
++
+ /* PVE backup related function */
+ static struct PVEBackupState {
+     Error *error;
+     bool cancel;
+-    QemuUUID uuid;
++    uuid_t uuid;
+     char uuid_str[37];
+     int64_t speed;
+     time_t start_time;
+     time_t end_time;
+     char *backup_file;
+-    Object *vmaobj;
++    VmaWriter *vmaw;
+     GList *di_list;
+-    size_t next_job;
+     size_t total;
+     size_t transferred;
+     size_t zero_bytes;
+@@ -2981,6 +3005,7 @@ typedef struct PVEBackupDevInfo {
+     BlockDriverState *bs;
+     size_t size;
+     uint8_t dev_id;
++    //bool started;
+     bool completed;
+     char targetfile[PATH_MAX];
+     BlockDriverState *target;
+@@ -2988,13 +3013,74 @@ typedef struct PVEBackupDevInfo {
+ static void pvebackup_run_next_job(void);
++static int pvebackup_dump_cb(void *opaque, BlockBackend *target,
++                             int64_t sector_num, int n_sectors,
++                             unsigned char *buf)
++{
++    PVEBackupDevInfo *di = opaque;
++
++    int size = n_sectors * BDRV_SECTOR_SIZE;
++    if (backup_state.cancel) {
++        return size; // return success
++    }
++
++    if (sector_num & 0x7f) {
++        if (!backup_state.error) {
++            error_setg(&backup_state.error,
++                       "got unaligned write inside backup dump "
++                       "callback (sector %ld)", sector_num);
++        }
++        return -1; // not aligned to cluster size
++    }
++
++    int64_t cluster_num = sector_num >> 7;
++
++    int ret = -1;
++
++    if (backup_state.vmaw) {
++        size_t zero_bytes = 0;
++        n_sectors = n_sectors * BDRV_SECTOR_SIZE / VMA_BLOCK_SIZE;
++        while (n_sectors >= VMA_CLUSTER_BITS) {
++            ret = vma_writer_write(backup_state.vmaw, di->dev_id, cluster_num,
++                                   buf, &zero_bytes);
++            n_sectors -= VMA_CLUSTER_BITS;
++            ++cluster_num;
++            if (buf) {
++                buf += VMA_CLUSTER_SIZE;
++            }
++            if (ret < 0) {
++                if (!backup_state.error) {
++                    vma_writer_error_propagate(backup_state.vmaw, &backup_state.error);
++                }
++                if (di->bs && di->bs->job) {
++                    block_job_cancel(di->bs->job);
++                }
++            } else {
++                backup_state.zero_bytes += zero_bytes;
++                backup_state.transferred += VMA_CLUSTER_SIZE;
++            }
++        }
++    } else {
++        if (!buf) {
++            backup_state.zero_bytes += size;
++        }
++        backup_state.transferred += size;
++    }
++
++    // Note: always return success, because we want that writes succeed anyways.
++
++    return size;
++}
++
+ static void pvebackup_cleanup(void)
+ {
+     backup_state.end_time = time(NULL);
+-    if (backup_state.vmaobj) {
+-        object_unparent(backup_state.vmaobj);
+-        backup_state.vmaobj = NULL;
++    if (backup_state.vmaw) {
++        Error *local_err = NULL;
++        vma_writer_close(backup_state.vmaw, &local_err);
++        error_propagate(&backup_state.error, local_err);
++        backup_state.vmaw = NULL;
+     }
+     if (backup_state.di_list) {
+@@ -3009,6 +3095,13 @@ static void pvebackup_cleanup(void)
+     }
+ }
++static void coroutine_fn backup_close_vma_stream(void *opaque)
++{
++    PVEBackupDevInfo *di = opaque;
++
++    vma_writer_close_stream(backup_state.vmaw, di->dev_id);
++}
++
+ static void pvebackup_complete_cb(void *opaque, int ret)
+ {
+     PVEBackupDevInfo *di = opaque;
+@@ -3020,14 +3113,18 @@ static void pvebackup_complete_cb(void *opaque, int ret)
+                    ret, strerror(-ret));
+     }
++    BlockDriverState *bs = di->bs;
++
+     di->bs = NULL;
+     di->target = NULL;
+-    if (backup_state.vmaobj) {
+-        object_unparent(backup_state.vmaobj);
+-        backup_state.vmaobj = NULL;
++    if (backup_state.vmaw) {
++        Coroutine *co = qemu_coroutine_create(backup_close_vma_stream, di);
++        qemu_coroutine_enter(co);
+     }
++    block_job_cb(bs, ret);
++
+     if (!backup_state.cancel) {
+         pvebackup_run_next_job();
+     }
+@@ -3041,14 +3138,9 @@ static void pvebackup_cancel(void *opaque)
+         error_setg(&backup_state.error, "backup cancelled");
+     }
+-    if (backup_state.vmaobj) {
+-        Error *err;
++    if (backup_state.vmaw) {
+         /* make sure vma writer does not block anymore */
+-        if (!object_set_props(backup_state.vmaobj, &err, "blocked", "yes", NULL)) {
+-            if (err) {
+-                error_report_err(err);
+-            }
+-        }
++        vma_writer_set_error(backup_state.vmaw, "backup cancelled");
+     }
+     GList *l = backup_state.di_list;
+@@ -3073,19 +3165,15 @@ void qmp_backup_cancel(Error **errp)
+     Coroutine *co = qemu_coroutine_create(pvebackup_cancel, NULL);
+     qemu_coroutine_enter(co);
+-    while (backup_state.vmaobj) {
+-        /* FIXME: Find something better for this */
++    while (backup_state.vmaw) {
++        /* vma writer use main aio context */
+         aio_poll(qemu_get_aio_context(), true);
+     }
+ }
+-void vma_object_add_config_file(Object *obj, const char *name, 
+-                                const char *contents, size_t len,
+-                                Error **errp);
+ static int config_to_vma(const char *file, BackupFormat format,
+-                         Object *vmaobj,
+-                         const char *backup_dir,
+-                         Error **errp)
++                       const char *backup_dir, VmaWriter *vmaw,
++                       Error **errp)
+ {
+         char *cdata = NULL;
+         gsize clen = 0;
+@@ -3098,12 +3186,17 @@ static int config_to_vma(const char *file, BackupFormat format,
+         char *basename = g_path_get_basename(file);
+         if (format == BACKUP_FORMAT_VMA) {
+-            vma_object_add_config_file(vmaobj, basename, cdata, clen, errp);
++            if (vma_writer_add_config(vmaw, basename, cdata, clen) != 0) {
++            error_setg(errp, "unable to add %s config data to vma archive", file);
++                g_free(cdata);
++                g_free(basename);
++                return 1;
++            }
+         } else if (format == BACKUP_FORMAT_DIR) {
+             char config_path[PATH_MAX];
+             snprintf(config_path, PATH_MAX, "%s/%s", backup_dir, basename);
+             if (!g_file_set_contents(config_path, cdata, clen, &err)) {
+-              error_setg(errp, "unable to write config file '%s'", config_path);
++            error_setg(errp, "unable to write config file '%s'", config_path);
+                 g_free(cdata);
+                 g_free(basename);
+                 return 1;
+@@ -3113,35 +3206,37 @@ static int config_to_vma(const char *file, BackupFormat format,
+         g_free(basename);
+         g_free(cdata);
+-        return 0;
++      return 0;
+ }
++bool block_job_should_pause(BlockJob *job);
+ static void pvebackup_run_next_job(void)
+ {
+-    bool cancel = backup_state.error || backup_state.cancel;
+-fprintf(stderr, "run next job: %zu\n", backup_state.next_job);
+-    GList *next = g_list_nth(backup_state.di_list, backup_state.next_job);
+-    while (next) {
+-        PVEBackupDevInfo *di = (PVEBackupDevInfo *)next->data;
+-        backup_state.next_job++;
++    GList *l = backup_state.di_list;
++    while (l) {
++        PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
++        l = g_list_next(l);
+         if (!di->completed && di->bs && di->bs->job) {
+             BlockJob *job = di->bs->job;
+-            if (cancel) {
+-                block_job_cancel(job);
+-            } else {
+-                block_job_resume(job);
++            if (block_job_should_pause(job)) {
++                bool cancel = backup_state.error || backup_state.cancel;
++                if (cancel) {
++                    block_job_cancel(job);
++                } else {
++                    block_job_resume(job);
++                }
+             }
+             return;
+         }
+-        next = g_list_next(next);
+     }
++
+     pvebackup_cleanup();
+ }
+ UuidInfo *qmp_backup(const char *backup_file, bool has_format,
+                     BackupFormat format,
+                     bool has_config_file, const char *config_file,
+-                    bool has_firewall_file, const char *firewall_file,
++                  bool has_firewall_file, const char *firewall_file,
+                     bool has_devlist, const char *devlist,
+                     bool has_speed, int64_t speed, Error **errp)
+ {
+@@ -3149,14 +3244,15 @@ UuidInfo *qmp_backup(const char *backup_file, bool has_format,
+     BlockDriverState *bs = NULL;
+     const char *backup_dir = NULL;
+     Error *local_err = NULL;
+-    QemuUUID uuid;
++    uuid_t uuid;
++    VmaWriter *vmaw = NULL;
+     gchar **devs = NULL;
+     GList *di_list = NULL;
+     GList *l;
+     UuidInfo *uuid_info;
+     BlockJob *job;
+-    if (backup_state.di_list || backup_state.vmaobj) {
++    if (backup_state.di_list) {
+         error_set(errp, ERROR_CLASS_GENERIC_ERROR,
+                   "previous backup not finished");
+         return NULL;
+@@ -3231,40 +3327,28 @@ UuidInfo *qmp_backup(const char *backup_file, bool has_format,
+         total += size;
+     }
+-    qemu_uuid_generate(&uuid);
++    uuid_generate(uuid);
+     if (format == BACKUP_FORMAT_VMA) {
+-        char uuidstr[UUID_FMT_LEN+1];
+-        qemu_uuid_unparse(&uuid, uuidstr);
+-        uuidstr[UUID_FMT_LEN] = 0;
+-        backup_state.vmaobj =
+-            object_new_with_props("vma", object_get_objects_root(),
+-                                  "vma-backup-obj", &local_err,
+-                                  "filename", backup_file,
+-                                  "uuid", uuidstr,
+-                                  NULL);
+-        if (!backup_state.vmaobj) {
++        vmaw = vma_writer_create(backup_file, uuid, &local_err);
++        if (!vmaw) {
+             if (local_err) {
+                 error_propagate(errp, local_err);
+             }
+             goto err;
+         }
++        /* register all devices for vma writer */
+         l = di_list;
+         while (l) {
+-            QDict *options = qdict_new();
+-
+             PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
+             l = g_list_next(l);
+             const char *devname = bdrv_get_device_name(di->bs);
+-            snprintf(di->targetfile, PATH_MAX, "vma-backup-obj/%s.raw", devname);
+-
+-            qdict_put(options, "driver", qstring_from_str("vma-drive"));
+-            qdict_put(options, "size", qint_from_int(di->size));
+-            di->target = bdrv_open(di->targetfile, NULL, options, BDRV_O_RDWR, &local_err);
+-            if (!di->target) {
+-                error_propagate(errp, local_err);
++            di->dev_id = vma_writer_register_stream(vmaw, devname, di->size);
++            if (di->dev_id <= 0) {
++                error_set(errp, ERROR_CLASS_GENERIC_ERROR,
++                          "register_stream failed");
+                 goto err;
+             }
+         }
+@@ -3305,15 +3389,15 @@ UuidInfo *qmp_backup(const char *backup_file, bool has_format,
+     /* add configuration file to archive */
+     if (has_config_file) {
+-      if(config_to_vma(config_file, format, backup_state.vmaobj, backup_dir, errp) != 0) {
+-        goto err;
++      if(config_to_vma(config_file, format, backup_dir, vmaw, errp) != 0) {
++      goto err;
+       }
+     }
+     /* add firewall file to archive */
+     if (has_firewall_file) {
+-      if(config_to_vma(firewall_file, format, backup_state.vmaobj, backup_dir, errp) != 0) {
+-        goto err;
++      if(config_to_vma(firewall_file, format, backup_dir, vmaw, errp) != 0) {
++      goto err;
+       }
+     }
+     /* initialize global backup_state now */
+@@ -3335,11 +3419,12 @@ UuidInfo *qmp_backup(const char *backup_file, bool has_format,
+     }
+     backup_state.backup_file = g_strdup(backup_file);
+-    memcpy(&backup_state.uuid, &uuid, sizeof(uuid));
+-    qemu_uuid_unparse(&uuid, backup_state.uuid_str);
++    backup_state.vmaw = vmaw;
++
++    uuid_copy(backup_state.uuid, uuid);
++    uuid_unparse_lower(uuid, backup_state.uuid_str);
+     backup_state.di_list = di_list;
+-    backup_state.next_job = 0;
+     backup_state.total = total;
+     backup_state.transferred = 0;
+@@ -3350,21 +3435,16 @@ UuidInfo *qmp_backup(const char *backup_file, bool has_format,
+     while (l) {
+         PVEBackupDevInfo *di = (PVEBackupDevInfo *)l->data;
+         l = g_list_next(l);
+-
+         job = backup_job_create(NULL, di->bs, di->target, speed, MIRROR_SYNC_MODE_FULL, NULL,
+                                 false, BLOCKDEV_ON_ERROR_REPORT, BLOCKDEV_ON_ERROR_REPORT,
+                                 BLOCK_JOB_DEFAULT,
+-                                pvebackup_complete_cb, di, 2, NULL, &local_err);
+-        if (di->target) {
+-            bdrv_unref(di->target);
+-            di->target = NULL;
+-        }
++                                pvebackup_dump_cb, pvebackup_complete_cb, di,
++                                2, NULL, &local_err);
+         if (!job || local_err != NULL) {
+             error_setg(&backup_state.error, "backup_job_create failed");
+             pvebackup_cancel(NULL);
+-        } else {
+-            block_job_start(job);
+         }
++        block_job_start(job);
+     }
+     if (!backup_state.error) {
+@@ -3398,9 +3478,10 @@ err:
+         g_strfreev(devs);
+     }
+-    if (backup_state.vmaobj) {
+-        object_unparent(backup_state.vmaobj);
+-        backup_state.vmaobj = NULL;
++    if (vmaw) {
++        Error *err = NULL;
++        vma_writer_close(vmaw, &err);
++        unlink(backup_file);
+     }
+     if (backup_dir) {
+@@ -3772,7 +3853,7 @@ static BlockJob *do_drive_backup(DriveBackup *backup, BlockJobTxn *txn,
+     job = backup_job_create(backup->job_id, bs, target_bs, backup->speed,
+                             backup->sync, bmap, backup->compress,
+                             backup->on_source_error, backup->on_target_error,
+-                            BLOCK_JOB_DEFAULT, NULL, NULL, 0, txn, &local_err);
++                            BLOCK_JOB_DEFAULT, NULL, NULL, NULL, 0, txn, &local_err);
+     bdrv_unref(target_bs);
+     if (local_err != NULL) {
+         error_propagate(errp, local_err);
+@@ -3851,7 +3932,7 @@ BlockJob *do_blockdev_backup(BlockdevBackup *backup, BlockJobTxn *txn,
+     job = backup_job_create(backup->job_id, bs, target_bs, backup->speed,
+                             backup->sync, NULL, backup->compress,
+                             backup->on_source_error, backup->on_target_error,
+-                            BLOCK_JOB_DEFAULT, NULL, NULL, 0, txn, &local_err);
++                            BLOCK_JOB_DEFAULT, NULL, NULL, NULL, 0, txn, &local_err);
+     if (local_err != NULL) {
+         error_propagate(errp, local_err);
+     }
+diff --git a/blockjob.c b/blockjob.c
+index 764d41863e..cb3741f6dd 100644
+--- a/blockjob.c
++++ b/blockjob.c
+@@ -37,8 +37,8 @@
+ #include "qemu/timer.h"
+ #include "qapi-event.h"
+-static void block_job_event_cancelled(BlockJob *job);
+-static void block_job_event_completed(BlockJob *job, const char *msg);
++void block_job_event_cancelled(BlockJob *job);
++void block_job_event_completed(BlockJob *job, const char *msg);
+ /* Transactional group of block jobs */
+ struct BlockJobTxn {
+@@ -473,7 +473,8 @@ void block_job_user_pause(BlockJob *job)
+     block_job_pause(job);
+ }
+-static bool block_job_should_pause(BlockJob *job)
++bool block_job_should_pause(BlockJob *job);
++bool block_job_should_pause(BlockJob *job)
+ {
+     return job->pause_count > 0;
+ }
+@@ -687,7 +688,7 @@ static void block_job_iostatus_set_err(BlockJob *job, int error)
+     }
+ }
+-static void block_job_event_cancelled(BlockJob *job)
++void block_job_event_cancelled(BlockJob *job)
+ {
+     if (block_job_is_internal(job)) {
+         return;
+@@ -701,7 +702,7 @@ static void block_job_event_cancelled(BlockJob *job)
+                                         &error_abort);
+ }
+-static void block_job_event_completed(BlockJob *job, const char *msg)
++void block_job_event_completed(BlockJob *job, const char *msg)
+ {
+     if (block_job_is_internal(job)) {
+         return;
+diff --git a/include/block/block_int.h b/include/block/block_int.h
+index 2b3ecd0575..278da161fb 100644
+--- a/include/block/block_int.h
++++ b/include/block/block_int.h
+@@ -59,6 +59,9 @@
+ #define BLOCK_PROBE_BUF_SIZE        512
++typedef int BackupDumpFunc(void *opaque, BlockBackend *be,
++                           int64_t sector_num, int n_sectors, unsigned char *buf);
++
+ enum BdrvTrackedRequestType {
+     BDRV_TRACKED_READ,
+     BDRV_TRACKED_WRITE,
+@@ -877,6 +880,7 @@ BlockJob *backup_job_create(const char *job_id, BlockDriverState *bs,
+                             BlockdevOnError on_source_error,
+                             BlockdevOnError on_target_error,
+                             int creation_flags,
++                            BackupDumpFunc *dump_cb,
+                             BlockCompletionFunc *cb, void *opaque,
+                             int pause_count,
+                             BlockJobTxn *txn, Error **errp);
+diff --git a/vma-reader.c b/vma-reader.c
+new file mode 100644
+index 0000000000..2000889bd3
+--- /dev/null
++++ b/vma-reader.c
+@@ -0,0 +1,857 @@
++/*
++ * VMA: Virtual Machine Archive
++ *
++ * Copyright (C) 2012 Proxmox Server Solutions
++ *
++ * Authors:
++ *  Dietmar Maurer (dietmar@proxmox.com)
++ *
++ * This work is licensed under the terms of the GNU GPL, version 2 or later.
++ * See the COPYING file in the top-level directory.
++ *
++ */
++
++#include "qemu/osdep.h"
++#include <glib.h>
++#include <uuid/uuid.h>
++
++#include "qemu-common.h"
++#include "qemu/timer.h"
++#include "qemu/ratelimit.h"
++#include "vma.h"
++#include "block/block.h"
++#include "sysemu/block-backend.h"
++
++static unsigned char zero_vma_block[VMA_BLOCK_SIZE];
++
++typedef struct VmaRestoreState {
++    BlockBackend *target;
++    bool write_zeroes;
++    unsigned long *bitmap;
++    int bitmap_size;
++}  VmaRestoreState;
++
++struct VmaReader {
++    int fd;
++    GChecksum *md5csum;
++    GHashTable *blob_hash;
++    unsigned char *head_data;
++    VmaDeviceInfo devinfo[256];
++    VmaRestoreState rstate[256];
++    GList *cdata_list;
++    guint8 vmstate_stream;
++    uint32_t vmstate_clusters;
++    /* to show restore percentage if run with -v */
++    time_t start_time;
++    int64_t cluster_count;
++    int64_t clusters_read;
++    int64_t zero_cluster_data;
++    int64_t partial_zero_cluster_data;
++    int clusters_read_per;
++};
++
++static guint
++g_int32_hash(gconstpointer v)
++{
++    return *(const uint32_t *)v;
++}
++
++static gboolean
++g_int32_equal(gconstpointer v1, gconstpointer v2)
++{
++    return *((const uint32_t *)v1) == *((const uint32_t *)v2);
++}
++
++static int vma_reader_get_bitmap(VmaRestoreState *rstate, int64_t cluster_num)
++{
++    assert(rstate);
++    assert(rstate->bitmap);
++
++    unsigned long val, idx, bit;
++
++    idx = cluster_num / BITS_PER_LONG;
++
++    assert(rstate->bitmap_size > idx);
++
++    bit = cluster_num % BITS_PER_LONG;
++    val = rstate->bitmap[idx];
++
++    return !!(val & (1UL << bit));
++}
++
++static void vma_reader_set_bitmap(VmaRestoreState *rstate, int64_t cluster_num,
++                                  int dirty)
++{
++    assert(rstate);
++    assert(rstate->bitmap);
++
++    unsigned long val, idx, bit;
++
++    idx = cluster_num / BITS_PER_LONG;
++
++    assert(rstate->bitmap_size > idx);
++
++    bit = cluster_num % BITS_PER_LONG;
++    val = rstate->bitmap[idx];
++    if (dirty) {
++        if (!(val & (1UL << bit))) {
++            val |= 1UL << bit;
++        }
++    } else {
++        if (val & (1UL << bit)) {
++            val &= ~(1UL << bit);
++        }
++    }
++    rstate->bitmap[idx] = val;
++}
++
++typedef struct VmaBlob {
++    uint32_t start;
++    uint32_t len;
++    void *data;
++} VmaBlob;
++
++static const VmaBlob *get_header_blob(VmaReader *vmar, uint32_t pos)
++{
++    assert(vmar);
++    assert(vmar->blob_hash);
++
++    return g_hash_table_lookup(vmar->blob_hash, &pos);
++}
++
++static const char *get_header_str(VmaReader *vmar, uint32_t pos)
++{
++    const VmaBlob *blob = get_header_blob(vmar, pos);
++    if (!blob) {
++        return NULL;
++    }
++    const char *res = (char *)blob->data;
++    if (res[blob->len-1] != '\0') {
++        return NULL;
++    }
++    return res;
++}
++
++static ssize_t
++safe_read(int fd, unsigned char *buf, size_t count)
++{
++    ssize_t n;
++
++    do {
++        n = read(fd, buf, count);
++    } while (n < 0 && errno == EINTR);
++
++    return n;
++}
++
++static ssize_t
++full_read(int fd, unsigned char *buf, size_t len)
++{
++    ssize_t n;
++    size_t total;
++
++    total = 0;
++
++    while (len > 0) {
++        n = safe_read(fd, buf, len);
++
++        if (n == 0) {
++            return total;
++        }
++
++        if (n <= 0) {
++            break;
++        }
++
++        buf += n;
++        total += n;
++        len -= n;
++    }
++
++    if (len) {
++        return -1;
++    }
++
++    return total;
++}
++
++void vma_reader_destroy(VmaReader *vmar)
++{
++    assert(vmar);
++
++    if (vmar->fd >= 0) {
++        close(vmar->fd);
++    }
++
++    if (vmar->cdata_list) {
++        g_list_free(vmar->cdata_list);
++    }
++
++    int i;
++    for (i = 1; i < 256; i++) {
++        if (vmar->rstate[i].bitmap) {
++            g_free(vmar->rstate[i].bitmap);
++        }
++    }
++
++    if (vmar->md5csum) {
++        g_checksum_free(vmar->md5csum);
++    }
++
++    if (vmar->blob_hash) {
++        g_hash_table_destroy(vmar->blob_hash);
++    }
++
++    if (vmar->head_data) {
++        g_free(vmar->head_data);
++    }
++
++    g_free(vmar);
++
++};
++
++static int vma_reader_read_head(VmaReader *vmar, Error **errp)
++{
++    assert(vmar);
++    assert(errp);
++    assert(*errp == NULL);
++
++    unsigned char md5sum[16];
++    int i;
++    int ret = 0;
++
++    vmar->head_data = g_malloc(sizeof(VmaHeader));
++
++    if (full_read(vmar->fd, vmar->head_data, sizeof(VmaHeader)) !=
++        sizeof(VmaHeader)) {
++        error_setg(errp, "can't read vma header - %s",
++                   errno ? g_strerror(errno) : "got EOF");
++        return -1;
++    }
++
++    VmaHeader *h = (VmaHeader *)vmar->head_data;
++
++    if (h->magic != VMA_MAGIC) {
++        error_setg(errp, "not a vma file - wrong magic number");
++        return -1;
++    }
++
++    uint32_t header_size = GUINT32_FROM_BE(h->header_size);
++    int need = header_size - sizeof(VmaHeader);
++    if (need <= 0) {
++        error_setg(errp, "wrong vma header size %d", header_size);
++        return -1;
++    }
++
++    vmar->head_data = g_realloc(vmar->head_data, header_size);
++    h = (VmaHeader *)vmar->head_data;
++
++    if (full_read(vmar->fd, vmar->head_data + sizeof(VmaHeader), need) !=
++        need) {
++        error_setg(errp, "can't read vma header data - %s",
++                   errno ? g_strerror(errno) : "got EOF");
++        return -1;
++    }
++
++    memcpy(md5sum, h->md5sum, 16);
++    memset(h->md5sum, 0, 16);
++
++    g_checksum_reset(vmar->md5csum);
++    g_checksum_update(vmar->md5csum, vmar->head_data, header_size);
++    gsize csize = 16;
++    g_checksum_get_digest(vmar->md5csum, (guint8 *)(h->md5sum), &csize);
++
++    if (memcmp(md5sum, h->md5sum, 16) != 0) {
++        error_setg(errp, "wrong vma header chechsum");
++        return -1;
++    }
++
++    /* we can modify header data after checksum verify */
++    h->header_size = header_size;
++
++    h->version = GUINT32_FROM_BE(h->version);
++    if (h->version != 1) {
++        error_setg(errp, "wrong vma version %d", h->version);
++        return -1;
++    }
++
++    h->ctime = GUINT64_FROM_BE(h->ctime);
++    h->blob_buffer_offset = GUINT32_FROM_BE(h->blob_buffer_offset);
++    h->blob_buffer_size = GUINT32_FROM_BE(h->blob_buffer_size);
++
++    uint32_t bstart = h->blob_buffer_offset + 1;
++    uint32_t bend = h->blob_buffer_offset + h->blob_buffer_size;
++
++    if (bstart <= sizeof(VmaHeader)) {
++        error_setg(errp, "wrong vma blob buffer offset %d",
++                   h->blob_buffer_offset);
++        return -1;
++    }
++
++    if (bend > header_size) {
++        error_setg(errp, "wrong vma blob buffer size %d/%d",
++                   h->blob_buffer_offset, h->blob_buffer_size);
++        return -1;
++    }
++
++    while ((bstart + 2) <= bend) {
++        uint32_t size = vmar->head_data[bstart] +
++            (vmar->head_data[bstart+1] << 8);
++        if ((bstart + size + 2) <= bend) {
++            VmaBlob *blob = g_new0(VmaBlob, 1);
++            blob->start = bstart - h->blob_buffer_offset;
++            blob->len = size;
++            blob->data = vmar->head_data + bstart + 2;
++            g_hash_table_insert(vmar->blob_hash, &blob->start, blob);
++        }
++        bstart += size + 2;
++    }
++
++
++    int count = 0;
++    for (i = 1; i < 256; i++) {
++        VmaDeviceInfoHeader *dih = &h->dev_info[i];
++        uint32_t devname_ptr = GUINT32_FROM_BE(dih->devname_ptr);
++        uint64_t size = GUINT64_FROM_BE(dih->size);
++        const char *devname =  get_header_str(vmar, devname_ptr);
++
++        if (size && devname) {
++            count++;
++            vmar->devinfo[i].size = size;
++            vmar->devinfo[i].devname = devname;
++
++            if (strcmp(devname, "vmstate") == 0) {
++                vmar->vmstate_stream = i;
++            }
++        }
++    }
++
++    for (i = 0; i < VMA_MAX_CONFIGS; i++) {
++        uint32_t name_ptr = GUINT32_FROM_BE(h->config_names[i]);
++        uint32_t data_ptr = GUINT32_FROM_BE(h->config_data[i]);
++
++        if (!(name_ptr && data_ptr)) {
++            continue;
++        }
++        const char *name =  get_header_str(vmar, name_ptr);
++        const VmaBlob *blob = get_header_blob(vmar, data_ptr);
++
++        if (!(name && blob)) {
++            error_setg(errp, "vma contains invalid data pointers");
++            return -1;
++        }
++
++        VmaConfigData *cdata = g_new0(VmaConfigData, 1);
++        cdata->name = name;
++        cdata->data = blob->data;
++        cdata->len = blob->len;
++
++        vmar->cdata_list = g_list_append(vmar->cdata_list, cdata);
++    }
++
++    return ret;
++};
++
++VmaReader *vma_reader_create(const char *filename, Error **errp)
++{
++    assert(filename);
++    assert(errp);
++
++    VmaReader *vmar = g_new0(VmaReader, 1);
++
++    if (strcmp(filename, "-") == 0) {
++        vmar->fd = dup(0);
++    } else {
++        vmar->fd = open(filename, O_RDONLY);
++    }
++
++    if (vmar->fd < 0) {
++        error_setg(errp, "can't open file %s - %s\n", filename,
++                   g_strerror(errno));
++        goto err;
++    }
++
++    vmar->md5csum = g_checksum_new(G_CHECKSUM_MD5);
++    if (!vmar->md5csum) {
++        error_setg(errp, "can't allocate cmsum\n");
++        goto err;
++    }
++
++    vmar->blob_hash = g_hash_table_new_full(g_int32_hash, g_int32_equal,
++                                            NULL, g_free);
++
++    if (vma_reader_read_head(vmar, errp) < 0) {
++        goto err;
++    }
++
++    return vmar;
++
++err:
++    if (vmar) {
++        vma_reader_destroy(vmar);
++    }
++
++    return NULL;
++}
++
++VmaHeader *vma_reader_get_header(VmaReader *vmar)
++{
++    assert(vmar);
++    assert(vmar->head_data);
++
++    return (VmaHeader *)(vmar->head_data);
++}
++
++GList *vma_reader_get_config_data(VmaReader *vmar)
++{
++    assert(vmar);
++    assert(vmar->head_data);
++
++    return vmar->cdata_list;
++}
++
++VmaDeviceInfo *vma_reader_get_device_info(VmaReader *vmar, guint8 dev_id)
++{
++    assert(vmar);
++    assert(dev_id);
++
++    if (vmar->devinfo[dev_id].size && vmar->devinfo[dev_id].devname) {
++        return &vmar->devinfo[dev_id];
++    }
++
++    return NULL;
++}
++
++static void allocate_rstate(VmaReader *vmar,  guint8 dev_id,
++                            BlockBackend *target, bool write_zeroes)
++{
++    assert(vmar);
++    assert(dev_id);
++
++    vmar->rstate[dev_id].target = target;
++    vmar->rstate[dev_id].write_zeroes = write_zeroes;
++
++    int64_t size = vmar->devinfo[dev_id].size;
++
++    int64_t bitmap_size = (size/BDRV_SECTOR_SIZE) +
++        (VMA_CLUSTER_SIZE/BDRV_SECTOR_SIZE) * BITS_PER_LONG - 1;
++    bitmap_size /= (VMA_CLUSTER_SIZE/BDRV_SECTOR_SIZE) * BITS_PER_LONG;
++
++    vmar->rstate[dev_id].bitmap_size = bitmap_size;
++    vmar->rstate[dev_id].bitmap = g_new0(unsigned long, bitmap_size);
++
++    vmar->cluster_count += size/VMA_CLUSTER_SIZE;
++}
++
++int vma_reader_register_bs(VmaReader *vmar, guint8 dev_id, BlockBackend *target,
++                           bool write_zeroes, Error **errp)
++{
++    assert(vmar);
++    assert(target != NULL);
++    assert(dev_id);
++    assert(vmar->rstate[dev_id].target == NULL);
++
++    int64_t size = blk_getlength(target);
++    int64_t size_diff = size - vmar->devinfo[dev_id].size;
++
++    /* storage types can have different size restrictions, so it
++     * is not always possible to create an image with exact size.
++     * So we tolerate a size difference up to 4MB.
++     */
++    if ((size_diff < 0) || (size_diff > 4*1024*1024)) {
++        error_setg(errp, "vma_reader_register_bs for stream %s failed - "
++                   "unexpected size %zd != %zd", vmar->devinfo[dev_id].devname,
++                   size, vmar->devinfo[dev_id].size);
++        return -1;
++    }
++
++    allocate_rstate(vmar, dev_id, target, write_zeroes);
++
++    return 0;
++}
++
++static ssize_t safe_write(int fd, void *buf, size_t count)
++{
++    ssize_t n;
++
++    do {
++        n = write(fd, buf, count);
++    } while (n < 0 && errno == EINTR);
++
++    return n;
++}
++
++static size_t full_write(int fd, void *buf, size_t len)
++{
++    ssize_t n;
++    size_t total;
++
++    total = 0;
++
++    while (len > 0) {
++        n = safe_write(fd, buf, len);
++        if (n < 0) {
++            return n;
++        }
++        buf += n;
++        total += n;
++        len -= n;
++    }
++
++    if (len) {
++        /* incomplete write ? */
++        return -1;
++    }
++
++    return total;
++}
++
++static int restore_write_data(VmaReader *vmar, guint8 dev_id,
++                              BlockBackend *target, int vmstate_fd,
++                              unsigned char *buf, int64_t sector_num,
++                              int nb_sectors, Error **errp)
++{
++    assert(vmar);
++
++    if (dev_id == vmar->vmstate_stream) {
++        if (vmstate_fd >= 0) {
++            int len = nb_sectors * BDRV_SECTOR_SIZE;
++            int res = full_write(vmstate_fd, buf, len);
++            if (res < 0) {
++                error_setg(errp, "write vmstate failed %d", res);
++                return -1;
++            }
++        }
++    } else {
++        int res = blk_pwrite(target, sector_num * BDRV_SECTOR_SIZE, buf, nb_sectors * BDRV_SECTOR_SIZE, 0);
++        if (res < 0) {
++            error_setg(errp, "blk_pwrite to %s failed (%d)",
++                       bdrv_get_device_name(blk_bs(target)), res);
++            return -1;
++        }
++    }
++    return 0;
++}
++
++static int restore_extent(VmaReader *vmar, unsigned char *buf,
++                          int extent_size, int vmstate_fd,
++                          bool verbose, bool verify, Error **errp)
++{
++    assert(vmar);
++    assert(buf);
++
++    VmaExtentHeader *ehead = (VmaExtentHeader *)buf;
++    int start = VMA_EXTENT_HEADER_SIZE;
++    int i;
++
++    for (i = 0; i < VMA_BLOCKS_PER_EXTENT; i++) {
++        uint64_t block_info = GUINT64_FROM_BE(ehead->blockinfo[i]);
++        uint64_t cluster_num = block_info & 0xffffffff;
++        uint8_t dev_id = (block_info >> 32) & 0xff;
++        uint16_t mask = block_info >> (32+16);
++        int64_t max_sector;
++
++        if (!dev_id) {
++            continue;
++        }
++
++        VmaRestoreState *rstate = &vmar->rstate[dev_id];
++        BlockBackend *target = NULL;
++
++        if (dev_id != vmar->vmstate_stream) {
++            target = rstate->target;
++            if (!verify && !target) {
++                error_setg(errp, "got wrong dev id %d", dev_id);
++                return -1;
++            }
++
++            if (vma_reader_get_bitmap(rstate, cluster_num)) {
++                error_setg(errp, "found duplicated cluster %zd for stream %s",
++                          cluster_num, vmar->devinfo[dev_id].devname);
++                return -1;
++            }
++            vma_reader_set_bitmap(rstate, cluster_num, 1);
++
++            max_sector = vmar->devinfo[dev_id].size/BDRV_SECTOR_SIZE;
++        } else {
++            max_sector = G_MAXINT64;
++            if (cluster_num != vmar->vmstate_clusters) {
++                error_setg(errp, "found out of order vmstate data");
++                return -1;
++            }
++            vmar->vmstate_clusters++;
++        }
++
++        vmar->clusters_read++;
++
++        if (verbose) {
++            time_t duration = time(NULL) - vmar->start_time;
++            int percent = (vmar->clusters_read*100)/vmar->cluster_count;
++            if (percent != vmar->clusters_read_per) {
++                printf("progress %d%% (read %zd bytes, duration %zd sec)\n",
++                       percent, vmar->clusters_read*VMA_CLUSTER_SIZE,
++                       duration);
++                fflush(stdout);
++                vmar->clusters_read_per = percent;
++            }
++        }
++
++        /* try to write whole clusters to speedup restore */
++        if (mask == 0xffff) {
++            if ((start + VMA_CLUSTER_SIZE) > extent_size) {
++                error_setg(errp, "short vma extent - too many blocks");
++                return -1;
++            }
++            int64_t sector_num = (cluster_num * VMA_CLUSTER_SIZE) /
++                BDRV_SECTOR_SIZE;
++            int64_t end_sector = sector_num +
++                VMA_CLUSTER_SIZE/BDRV_SECTOR_SIZE;
++
++            if (end_sector > max_sector) {
++                end_sector = max_sector;
++            }
++
++            if (end_sector <= sector_num) {
++                error_setg(errp, "got wrong block address - write bejond end");
++                return -1;
++            }
++
++            if (!verify) {
++                int nb_sectors = end_sector - sector_num;
++                if (restore_write_data(vmar, dev_id, target, vmstate_fd,
++                                       buf + start, sector_num, nb_sectors,
++                                       errp) < 0) {
++                    return -1;
++                }
++            }
++
++            start += VMA_CLUSTER_SIZE;
++        } else {
++            int j;
++            int bit = 1;
++
++            for (j = 0; j < 16; j++) {
++                int64_t sector_num = (cluster_num*VMA_CLUSTER_SIZE +
++                                      j*VMA_BLOCK_SIZE)/BDRV_SECTOR_SIZE;
++
++                int64_t end_sector = sector_num +
++                    VMA_BLOCK_SIZE/BDRV_SECTOR_SIZE;
++                if (end_sector > max_sector) {
++                    end_sector = max_sector;
++                }
++
++                if (mask & bit) {
++                    if ((start + VMA_BLOCK_SIZE) > extent_size) {
++                        error_setg(errp, "short vma extent - too many blocks");
++                        return -1;
++                    }
++
++                    if (end_sector <= sector_num) {
++                        error_setg(errp, "got wrong block address - "
++                                   "write bejond end");
++                        return -1;
++                    }
++
++                    if (!verify) {
++                        int nb_sectors = end_sector - sector_num;
++                        if (restore_write_data(vmar, dev_id, target, vmstate_fd,
++                                               buf + start, sector_num,
++                                               nb_sectors, errp) < 0) {
++                            return -1;
++                        }
++                    }
++
++                    start += VMA_BLOCK_SIZE;
++
++                } else {
++
++
++                    if (end_sector > sector_num) {
++                        /* Todo: use bdrv_co_write_zeroes (but that need to
++                         * be run inside coroutine?)
++                         */
++                        int nb_sectors = end_sector - sector_num;
++                        int zero_size = BDRV_SECTOR_SIZE*nb_sectors;
++                        vmar->zero_cluster_data += zero_size;
++                        if (mask != 0) {
++                            vmar->partial_zero_cluster_data += zero_size;
++                        }
++
++                        if (rstate->write_zeroes && !verify) {
++                            if (restore_write_data(vmar, dev_id, target, vmstate_fd,
++                                                   zero_vma_block, sector_num,
++                                                   nb_sectors, errp) < 0) {
++                                return -1;
++                            }
++                        }
++                    }
++                }
++
++                bit = bit << 1;
++            }
++        }
++    }
++
++    if (start != extent_size) {
++        error_setg(errp, "vma extent error - missing blocks");
++        return -1;
++    }
++
++    return 0;
++}
++
++static int vma_reader_restore_full(VmaReader *vmar, int vmstate_fd,
++                                   bool verbose, bool verify,
++                                   Error **errp)
++{
++    assert(vmar);
++    assert(vmar->head_data);
++
++    int ret = 0;
++    unsigned char buf[VMA_MAX_EXTENT_SIZE];
++    int buf_pos = 0;
++    unsigned char md5sum[16];
++    VmaHeader *h = (VmaHeader *)vmar->head_data;
++
++    vmar->start_time = time(NULL);
++
++    while (1) {
++        int bytes = full_read(vmar->fd, buf + buf_pos, sizeof(buf) - buf_pos);
++        if (bytes < 0) {
++            error_setg(errp, "read failed - %s", g_strerror(errno));
++            return -1;
++        }
++
++        buf_pos += bytes;
++
++        if (!buf_pos) {
++            break; /* EOF */
++        }
++
++        if (buf_pos < VMA_EXTENT_HEADER_SIZE) {
++            error_setg(errp, "read short extent (%d bytes)", buf_pos);
++            return -1;
++        }
++
++        VmaExtentHeader *ehead = (VmaExtentHeader *)buf;
++
++        /* extract md5sum */
++        memcpy(md5sum, ehead->md5sum, sizeof(ehead->md5sum));
++        memset(ehead->md5sum, 0, sizeof(ehead->md5sum));
++
++        g_checksum_reset(vmar->md5csum);
++        g_checksum_update(vmar->md5csum, buf, VMA_EXTENT_HEADER_SIZE);
++        gsize csize = 16;
++        g_checksum_get_digest(vmar->md5csum, ehead->md5sum, &csize);
++
++        if (memcmp(md5sum, ehead->md5sum, 16) != 0) {
++            error_setg(errp, "wrong vma extent header chechsum");
++            return -1;
++        }
++
++        if (memcmp(h->uuid, ehead->uuid, sizeof(ehead->uuid)) != 0) {
++            error_setg(errp, "wrong vma extent uuid");
++            return -1;
++        }
++
++        if (ehead->magic != VMA_EXTENT_MAGIC || ehead->reserved1 != 0) {
++            error_setg(errp, "wrong vma extent header magic");
++            return -1;
++        }
++
++        int block_count = GUINT16_FROM_BE(ehead->block_count);
++        int extent_size = VMA_EXTENT_HEADER_SIZE + block_count*VMA_BLOCK_SIZE;
++
++        if (buf_pos < extent_size) {
++            error_setg(errp, "short vma extent (%d < %d)", buf_pos,
++                       extent_size);
++            return -1;
++        }
++
++        if (restore_extent(vmar, buf, extent_size, vmstate_fd, verbose,
++                           verify, errp) < 0) {
++            return -1;
++        }
++
++        if (buf_pos > extent_size) {
++            memmove(buf, buf + extent_size, buf_pos - extent_size);
++            buf_pos = buf_pos - extent_size;
++        } else {
++            buf_pos = 0;
++        }
++    }
++
++    bdrv_drain_all();
++
++    int i;
++    for (i = 1; i < 256; i++) {
++        VmaRestoreState *rstate = &vmar->rstate[i];
++        if (!rstate->target) {
++            continue;
++        }
++
++        if (blk_flush(rstate->target) < 0) {
++            error_setg(errp, "vma blk_flush %s failed",
++                       vmar->devinfo[i].devname);
++            return -1;
++        }
++
++        if (vmar->devinfo[i].size &&
++            (strcmp(vmar->devinfo[i].devname, "vmstate") != 0)) {
++            assert(rstate->bitmap);
++
++            int64_t cluster_num, end;
++
++            end = (vmar->devinfo[i].size + VMA_CLUSTER_SIZE - 1) /
++                VMA_CLUSTER_SIZE;
++
++            for (cluster_num = 0; cluster_num < end; cluster_num++) {
++                if (!vma_reader_get_bitmap(rstate, cluster_num)) {
++                    error_setg(errp, "detected missing cluster %zd "
++                               "for stream %s", cluster_num,
++                               vmar->devinfo[i].devname);
++                    return -1;
++                }
++            }
++        }
++    }
++
++    if (verbose) {
++        if (vmar->clusters_read) {
++            printf("total bytes read %zd, sparse bytes %zd (%.3g%%)\n",
++                   vmar->clusters_read*VMA_CLUSTER_SIZE,
++                   vmar->zero_cluster_data,
++                   (double)(100.0*vmar->zero_cluster_data)/
++                   (vmar->clusters_read*VMA_CLUSTER_SIZE));
++
++            int64_t datasize = vmar->clusters_read*VMA_CLUSTER_SIZE-vmar->zero_cluster_data;
++            if (datasize) { // this does not make sense for empty files
++                printf("space reduction due to 4K zero blocks %.3g%%\n",
++                       (double)(100.0*vmar->partial_zero_cluster_data) / datasize);
++            }
++        } else {
++            printf("vma archive contains no image data\n");
++        }
++    }
++    return ret;
++}
++
++int vma_reader_restore(VmaReader *vmar, int vmstate_fd, bool verbose,
++                       Error **errp)
++{
++    return vma_reader_restore_full(vmar, vmstate_fd, verbose, false, errp);
++}
++
++int vma_reader_verify(VmaReader *vmar, bool verbose, Error **errp)
++{
++    guint8 dev_id;
++
++    for (dev_id = 1; dev_id < 255; dev_id++) {
++        if (vma_reader_get_device_info(vmar, dev_id)) {
++            allocate_rstate(vmar, dev_id, NULL, false);
++        }
++    }
++
++    return vma_reader_restore_full(vmar, -1, verbose, true, errp);
++}
++
+diff --git a/vma-writer.c b/vma-writer.c
+new file mode 100644
+index 0000000000..9001cbdd2b
+--- /dev/null
++++ b/vma-writer.c
+@@ -0,0 +1,771 @@
++/*
++ * VMA: Virtual Machine Archive
++ *
++ * Copyright (C) 2012 Proxmox Server Solutions
++ *
++ * Authors:
++ *  Dietmar Maurer (dietmar@proxmox.com)
++ *
++ * This work is licensed under the terms of the GNU GPL, version 2 or later.
++ * See the COPYING file in the top-level directory.
++ *
++ */
++
++#include "qemu/osdep.h"
++#include <glib.h>
++#include <uuid/uuid.h>
++
++#include "vma.h"
++#include "block/block.h"
++#include "monitor/monitor.h"
++#include "qemu/main-loop.h"
++#include "qemu/coroutine.h"
++#include "qemu/cutils.h"
++
++#define DEBUG_VMA 0
++
++#define DPRINTF(fmt, ...)\
++    do { if (DEBUG_VMA) { printf("vma: " fmt, ## __VA_ARGS__); } } while (0)
++
++#define WRITE_BUFFERS 5
++#define HEADER_CLUSTERS 8
++#define HEADERBUF_SIZE (VMA_CLUSTER_SIZE*HEADER_CLUSTERS)
++
++struct VmaWriter {
++    int fd;
++    FILE *cmd;
++    int status;
++    char errmsg[8192];
++    uuid_t uuid;
++    bool header_written;
++    bool closed;
++
++    /* we always write extents */
++    unsigned char *outbuf;
++    int outbuf_pos; /* in bytes */
++    int outbuf_count; /* in VMA_BLOCKS */
++    uint64_t outbuf_block_info[VMA_BLOCKS_PER_EXTENT];
++
++    unsigned char *headerbuf;
++
++    GChecksum *md5csum;
++    CoMutex flush_lock;
++    Coroutine *co_writer;
++
++    /* drive informations */
++    VmaStreamInfo stream_info[256];
++    guint stream_count;
++
++    guint8 vmstate_stream;
++    uint32_t vmstate_clusters;
++
++    /* header blob table */
++    char *header_blob_table;
++    uint32_t header_blob_table_size;
++    uint32_t header_blob_table_pos;
++
++    /* store for config blobs */
++    uint32_t config_names[VMA_MAX_CONFIGS]; /* offset into blob_buffer table */
++    uint32_t config_data[VMA_MAX_CONFIGS];  /* offset into blob_buffer table */
++    uint32_t config_count;
++};
++
++void vma_writer_set_error(VmaWriter *vmaw, const char *fmt, ...)
++{
++    va_list ap;
++
++    if (vmaw->status < 0) {
++        return;
++    }
++
++    vmaw->status = -1;
++
++    va_start(ap, fmt);
++    g_vsnprintf(vmaw->errmsg, sizeof(vmaw->errmsg), fmt, ap);
++    va_end(ap);
++
++    DPRINTF("vma_writer_set_error: %s\n", vmaw->errmsg);
++}
++
++static uint32_t allocate_header_blob(VmaWriter *vmaw, const char *data,
++                                     size_t len)
++{
++    if (len > 65535) {
++        return 0;
++    }
++
++    if (!vmaw->header_blob_table ||
++        (vmaw->header_blob_table_size <
++         (vmaw->header_blob_table_pos + len + 2))) {
++        int newsize = vmaw->header_blob_table_size + ((len + 2 + 511)/512)*512;
++
++        vmaw->header_blob_table = g_realloc(vmaw->header_blob_table, newsize);
++        memset(vmaw->header_blob_table + vmaw->header_blob_table_size,
++               0, newsize - vmaw->header_blob_table_size);
++        vmaw->header_blob_table_size = newsize;
++    }
++
++    uint32_t cpos = vmaw->header_blob_table_pos;
++    vmaw->header_blob_table[cpos] = len & 255;
++    vmaw->header_blob_table[cpos+1] = (len >> 8) & 255;
++    memcpy(vmaw->header_blob_table + cpos + 2, data, len);
++    vmaw->header_blob_table_pos += len + 2;
++    return cpos;
++}
++
++static uint32_t allocate_header_string(VmaWriter *vmaw, const char *str)
++{
++    assert(vmaw);
++
++    size_t len = strlen(str) + 1;
++
++    return allocate_header_blob(vmaw, str, len);
++}
++
++int vma_writer_add_config(VmaWriter *vmaw, const char *name, gpointer data,
++                          gsize len)
++{
++    assert(vmaw);
++    assert(!vmaw->header_written);
++    assert(vmaw->config_count < VMA_MAX_CONFIGS);
++    assert(name);
++    assert(data);
++
++    gchar *basename = g_path_get_basename(name);
++    uint32_t name_ptr = allocate_header_string(vmaw, basename);
++    g_free(basename);
++
++    if (!name_ptr) {
++        return -1;
++    }
++
++    uint32_t data_ptr = allocate_header_blob(vmaw, data, len);
++    if (!data_ptr) {
++        return -1;
++    }
++
++    vmaw->config_names[vmaw->config_count] = name_ptr;
++    vmaw->config_data[vmaw->config_count] = data_ptr;
++
++    vmaw->config_count++;
++
++    return 0;
++}
++
++int vma_writer_register_stream(VmaWriter *vmaw, const char *devname,
++                               size_t size)
++{
++    assert(vmaw);
++    assert(devname);
++    assert(!vmaw->status);
++
++    if (vmaw->header_written) {
++        vma_writer_set_error(vmaw, "vma_writer_register_stream: header "
++                             "already written");
++        return -1;
++    }
++
++    guint n = vmaw->stream_count + 1;
++
++    /* we can have dev_ids form 1 to 255 (0 reserved)
++     * 255(-1) reseverd for safety
++     */
++    if (n > 254) {
++        vma_writer_set_error(vmaw, "vma_writer_register_stream: "
++                             "too many drives");
++        return -1;
++    }
++
++    if (size <= 0) {
++        vma_writer_set_error(vmaw, "vma_writer_register_stream: "
++                             "got strange size %zd", size);
++        return -1;
++    }
++
++    DPRINTF("vma_writer_register_stream %s %zu %d\n", devname, size, n);
++
++    vmaw->stream_info[n].devname = g_strdup(devname);
++    vmaw->stream_info[n].size = size;
++
++    vmaw->stream_info[n].cluster_count = (size + VMA_CLUSTER_SIZE - 1) /
++        VMA_CLUSTER_SIZE;
++
++    vmaw->stream_count = n;
++
++    if (strcmp(devname, "vmstate") == 0) {
++        vmaw->vmstate_stream = n;
++    }
++
++    return n;
++}
++
++static void vma_co_continue_write(void *opaque)
++{
++    VmaWriter *vmaw = opaque;
++
++    DPRINTF("vma_co_continue_write\n");
++    qemu_coroutine_enter(vmaw->co_writer);
++}
++
++static ssize_t coroutine_fn
++vma_queue_write(VmaWriter *vmaw, const void *buf, size_t bytes)
++{
++    DPRINTF("vma_queue_write enter %zd\n", bytes);
++
++    assert(vmaw);
++    assert(buf);
++    assert(bytes <= VMA_MAX_EXTENT_SIZE);
++
++    size_t done = 0;
++    ssize_t ret;
++
++    assert(vmaw->co_writer == NULL);
++
++    vmaw->co_writer = qemu_coroutine_self();
++
++    while (done < bytes) {
++        aio_set_fd_handler(qemu_get_aio_context(), vmaw->fd, false, NULL, vma_co_continue_write, NULL, vmaw);
++        qemu_coroutine_yield();
++        aio_set_fd_handler(qemu_get_aio_context(), vmaw->fd, false, NULL, NULL, NULL, NULL);
++        if (vmaw->status < 0) {
++            DPRINTF("vma_queue_write detected canceled backup\n");
++            done = -1;
++            break;
++        }
++        ret = write(vmaw->fd, buf + done, bytes - done);
++        if (ret > 0) {
++            done += ret;
++            DPRINTF("vma_queue_write written %zd %zd\n", done, ret);
++        } else if (ret < 0) {
++            if (errno == EAGAIN || errno == EWOULDBLOCK) {
++                /* try again */
++           } else {
++                vma_writer_set_error(vmaw, "vma_queue_write: write error - %s",
++                                     g_strerror(errno));
++                done = -1; /* always return failure for partial writes */
++                break;
++            }
++        } else if (ret == 0) {
++            /* should not happen - simply try again */
++        }
++    }
++
++    vmaw->co_writer = NULL;
++
++    return (done == bytes) ? bytes : -1;
++}
++
++VmaWriter *vma_writer_create(const char *filename, uuid_t uuid, Error **errp)
++{
++    const char *p;
++
++    assert(sizeof(VmaHeader) == (4096 + 8192));
++    assert(G_STRUCT_OFFSET(VmaHeader, config_names) == 2044);
++    assert(G_STRUCT_OFFSET(VmaHeader, config_data) == 3068);
++    assert(G_STRUCT_OFFSET(VmaHeader, dev_info) == 4096);
++    assert(sizeof(VmaExtentHeader) == 512);
++
++    VmaWriter *vmaw = g_new0(VmaWriter, 1);
++    vmaw->fd = -1;
++
++    vmaw->md5csum = g_checksum_new(G_CHECKSUM_MD5);
++    if (!vmaw->md5csum) {
++        error_setg(errp, "can't allocate cmsum\n");
++        goto err;
++    }
++
++    if (strstart(filename, "exec:", &p)) {
++        vmaw->cmd = popen(p, "w");
++        if (vmaw->cmd == NULL) {
++            error_setg(errp, "can't popen command '%s' - %s\n", p,
++                       g_strerror(errno));
++            goto err;
++        }
++        vmaw->fd = fileno(vmaw->cmd);
++
++        /* try to use O_NONBLOCK */
++        fcntl(vmaw->fd, F_SETFL, fcntl(vmaw->fd, F_GETFL)|O_NONBLOCK);
++
++    } else {
++        struct stat st;
++        int oflags;
++        const char *tmp_id_str;
++
++        if ((stat(filename, &st) == 0) && S_ISFIFO(st.st_mode)) {
++            oflags = O_NONBLOCK|O_WRONLY;
++            vmaw->fd = qemu_open(filename, oflags, 0644);
++        } else if (strstart(filename, "/dev/fdset/", &tmp_id_str)) {
++            oflags = O_NONBLOCK|O_WRONLY;
++            vmaw->fd = qemu_open(filename, oflags, 0644);
++        } else if (strstart(filename, "/dev/fdname/", &tmp_id_str)) {
++            vmaw->fd = monitor_get_fd(cur_mon, tmp_id_str, errp);
++            if (vmaw->fd < 0) {
++                goto err;
++            }
++            /* try to use O_NONBLOCK */
++            fcntl(vmaw->fd, F_SETFL, fcntl(vmaw->fd, F_GETFL)|O_NONBLOCK);
++        } else  {
++            oflags = O_NONBLOCK|O_DIRECT|O_WRONLY|O_CREAT|O_EXCL;
++            vmaw->fd = qemu_open(filename, oflags, 0644);
++        }
++
++        if (vmaw->fd < 0) {
++            error_setg(errp, "can't open file %s - %s\n", filename,
++                       g_strerror(errno));
++            goto err;
++        }
++    }
++
++    /* we use O_DIRECT, so we need to align IO buffers */
++
++    vmaw->outbuf = qemu_memalign(512, VMA_MAX_EXTENT_SIZE);
++    vmaw->headerbuf = qemu_memalign(512, HEADERBUF_SIZE);
++
++    vmaw->outbuf_count = 0;
++    vmaw->outbuf_pos = VMA_EXTENT_HEADER_SIZE;
++
++    vmaw->header_blob_table_pos = 1; /* start at pos 1 */
++
++    qemu_co_mutex_init(&vmaw->flush_lock);
++
++    uuid_copy(vmaw->uuid, uuid);
++
++    return vmaw;
++
++err:
++    if (vmaw) {
++        if (vmaw->cmd) {
++            pclose(vmaw->cmd);
++        } else if (vmaw->fd >= 0) {
++            close(vmaw->fd);
++        }
++
++        if (vmaw->md5csum) {
++            g_checksum_free(vmaw->md5csum);
++        }
++
++        g_free(vmaw);
++    }
++
++    return NULL;
++}
++
++static int coroutine_fn vma_write_header(VmaWriter *vmaw)
++{
++    assert(vmaw);
++    unsigned char *buf = vmaw->headerbuf;
++    VmaHeader *head = (VmaHeader *)buf;
++
++    int i;
++
++    DPRINTF("VMA WRITE HEADER\n");
++
++    if (vmaw->status < 0) {
++        return vmaw->status;
++    }
++
++    memset(buf, 0, HEADERBUF_SIZE);
++
++    head->magic = VMA_MAGIC;
++    head->version = GUINT32_TO_BE(1); /* v1 */
++    memcpy(head->uuid, vmaw->uuid, 16);
++
++    time_t ctime = time(NULL);
++    head->ctime = GUINT64_TO_BE(ctime);
++
++    for (i = 0; i < VMA_MAX_CONFIGS; i++) {
++        head->config_names[i] = GUINT32_TO_BE(vmaw->config_names[i]);
++        head->config_data[i] = GUINT32_TO_BE(vmaw->config_data[i]);
++    }
++
++    /* 32 bytes per device (12 used currently) = 8192 bytes max */
++    for (i = 1; i <= 254; i++) {
++        VmaStreamInfo *si = &vmaw->stream_info[i];
++        if (si->size) {
++            assert(si->devname);
++            uint32_t devname_ptr = allocate_header_string(vmaw, si->devname);
++            if (!devname_ptr) {
++                return -1;
++            }
++            head->dev_info[i].devname_ptr = GUINT32_TO_BE(devname_ptr);
++            head->dev_info[i].size = GUINT64_TO_BE(si->size);
++        }
++    }
++
++    uint32_t header_size = sizeof(VmaHeader) + vmaw->header_blob_table_size;
++    head->header_size = GUINT32_TO_BE(header_size);
++
++    if (header_size > HEADERBUF_SIZE) {
++        return -1; /* just to be sure */
++    }
++
++    uint32_t blob_buffer_offset = sizeof(VmaHeader);
++    memcpy(buf + blob_buffer_offset, vmaw->header_blob_table,
++           vmaw->header_blob_table_size);
++    head->blob_buffer_offset = GUINT32_TO_BE(blob_buffer_offset);
++    head->blob_buffer_size = GUINT32_TO_BE(vmaw->header_blob_table_pos);
++
++    g_checksum_reset(vmaw->md5csum);
++    g_checksum_update(vmaw->md5csum, (const guchar *)buf, header_size);
++    gsize csize = 16;
++    g_checksum_get_digest(vmaw->md5csum, (guint8 *)(head->md5sum), &csize);
++
++    return vma_queue_write(vmaw, buf, header_size);
++}
++
++static int coroutine_fn vma_writer_flush(VmaWriter *vmaw)
++{
++    assert(vmaw);
++
++    int ret;
++    int i;
++
++    if (vmaw->status < 0) {
++        return vmaw->status;
++    }
++
++    if (!vmaw->header_written) {
++        vmaw->header_written = true;
++        ret = vma_write_header(vmaw);
++        if (ret < 0) {
++            vma_writer_set_error(vmaw, "vma_writer_flush: write header failed");
++            return ret;
++        }
++    }
++
++    DPRINTF("VMA WRITE FLUSH %d %d\n", vmaw->outbuf_count, vmaw->outbuf_pos);
++
++
++    VmaExtentHeader *ehead = (VmaExtentHeader *)vmaw->outbuf;
++
++    ehead->magic = VMA_EXTENT_MAGIC;
++    ehead->reserved1 = 0;
++
++    for (i = 0; i < VMA_BLOCKS_PER_EXTENT; i++) {
++        ehead->blockinfo[i] = GUINT64_TO_BE(vmaw->outbuf_block_info[i]);
++    }
++
++    guint16 block_count = (vmaw->outbuf_pos - VMA_EXTENT_HEADER_SIZE) /
++        VMA_BLOCK_SIZE;
++
++    ehead->block_count = GUINT16_TO_BE(block_count);
++
++    memcpy(ehead->uuid, vmaw->uuid, sizeof(ehead->uuid));
++    memset(ehead->md5sum, 0, sizeof(ehead->md5sum));
++
++    g_checksum_reset(vmaw->md5csum);
++    g_checksum_update(vmaw->md5csum, vmaw->outbuf, VMA_EXTENT_HEADER_SIZE);
++    gsize csize = 16;
++    g_checksum_get_digest(vmaw->md5csum, ehead->md5sum, &csize);
++
++    int bytes = vmaw->outbuf_pos;
++    ret = vma_queue_write(vmaw, vmaw->outbuf, bytes);
++    if (ret != bytes) {
++        vma_writer_set_error(vmaw, "vma_writer_flush: failed write");
++    }
++
++    vmaw->outbuf_count = 0;
++    vmaw->outbuf_pos = VMA_EXTENT_HEADER_SIZE;
++
++    for (i = 0; i < VMA_BLOCKS_PER_EXTENT; i++) {
++        vmaw->outbuf_block_info[i] = 0;
++    }
++
++    return vmaw->status;
++}
++
++static int vma_count_open_streams(VmaWriter *vmaw)
++{
++    g_assert(vmaw != NULL);
++
++    int i;
++    int open_drives = 0;
++    for (i = 0; i <= 255; i++) {
++        if (vmaw->stream_info[i].size && !vmaw->stream_info[i].finished) {
++            open_drives++;
++        }
++    }
++
++    return open_drives;
++}
++
++
++/**
++ * You need to call this if the vma archive does not contain
++ * any data stream.
++ */
++int coroutine_fn
++vma_writer_flush_output(VmaWriter *vmaw)
++{
++    qemu_co_mutex_lock(&vmaw->flush_lock);
++    int ret = vma_writer_flush(vmaw);
++    qemu_co_mutex_unlock(&vmaw->flush_lock);
++    if (ret < 0) {
++        vma_writer_set_error(vmaw, "vma_writer_flush_header failed");
++    }
++    return ret;
++}
++
++/**
++ * all jobs should call this when there is no more data
++ * Returns: number of remaining stream (0 ==> finished)
++ */
++int coroutine_fn
++vma_writer_close_stream(VmaWriter *vmaw, uint8_t dev_id)
++{
++    g_assert(vmaw != NULL);
++
++    DPRINTF("vma_writer_set_status %d\n", dev_id);
++    if (!vmaw->stream_info[dev_id].size) {
++        vma_writer_set_error(vmaw, "vma_writer_close_stream: "
++                             "no such stream %d", dev_id);
++        return -1;
++    }
++    if (vmaw->stream_info[dev_id].finished) {
++        vma_writer_set_error(vmaw, "vma_writer_close_stream: "
++                             "stream already closed %d", dev_id);
++        return -1;
++    }
++
++    vmaw->stream_info[dev_id].finished = true;
++
++    int open_drives = vma_count_open_streams(vmaw);
++
++    if (open_drives <= 0) {
++        DPRINTF("vma_writer_set_status all drives completed\n");
++        vma_writer_flush_output(vmaw);
++    }
++
++    return open_drives;
++}
++
++int vma_writer_get_status(VmaWriter *vmaw, VmaStatus *status)
++{
++    int i;
++
++    g_assert(vmaw != NULL);
++
++    if (status) {
++        status->status = vmaw->status;
++        g_strlcpy(status->errmsg, vmaw->errmsg, sizeof(status->errmsg));
++        for (i = 0; i <= 255; i++) {
++            status->stream_info[i] = vmaw->stream_info[i];
++        }
++
++        uuid_unparse_lower(vmaw->uuid, status->uuid_str);
++    }
++
++    status->closed = vmaw->closed;
++
++    return vmaw->status;
++}
++
++static int vma_writer_get_buffer(VmaWriter *vmaw)
++{
++    int ret = 0;
++
++    qemu_co_mutex_lock(&vmaw->flush_lock);
++
++    /* wait until buffer is available */
++    while (vmaw->outbuf_count >= (VMA_BLOCKS_PER_EXTENT - 1)) {
++        ret = vma_writer_flush(vmaw);
++        if (ret < 0) {
++            vma_writer_set_error(vmaw, "vma_writer_get_buffer: flush failed");
++            break;
++        }
++    }
++
++    qemu_co_mutex_unlock(&vmaw->flush_lock);
++
++    return ret;
++}
++
++
++int64_t coroutine_fn
++vma_writer_write(VmaWriter *vmaw, uint8_t dev_id, int64_t cluster_num,
++                 unsigned char *buf, size_t *zero_bytes)
++{
++    g_assert(vmaw != NULL);
++    g_assert(zero_bytes != NULL);
++
++    *zero_bytes = 0;
++
++    if (vmaw->status < 0) {
++        return vmaw->status;
++    }
++
++    if (!dev_id || !vmaw->stream_info[dev_id].size) {
++        vma_writer_set_error(vmaw, "vma_writer_write: "
++                             "no such stream %d", dev_id);
++        return -1;
++    }
++
++    if (vmaw->stream_info[dev_id].finished) {
++        vma_writer_set_error(vmaw, "vma_writer_write: "
++                             "stream already closed %d", dev_id);
++        return -1;
++    }
++
++
++    if (cluster_num >= (((uint64_t)1)<<32)) {
++        vma_writer_set_error(vmaw, "vma_writer_write: "
++                             "cluster number out of range");
++        return -1;
++    }
++
++    if (dev_id == vmaw->vmstate_stream) {
++        if (cluster_num != vmaw->vmstate_clusters) {
++            vma_writer_set_error(vmaw, "vma_writer_write: "
++                                 "non sequential vmstate write");
++        }
++        vmaw->vmstate_clusters++;
++    } else if (cluster_num >= vmaw->stream_info[dev_id].cluster_count) {
++        vma_writer_set_error(vmaw, "vma_writer_write: cluster number too big");
++        return -1;
++    }
++
++    /* wait until buffer is available */
++    if (vma_writer_get_buffer(vmaw) < 0) {
++        vma_writer_set_error(vmaw, "vma_writer_write: "
++                             "vma_writer_get_buffer failed");
++        return -1;
++    }
++
++    DPRINTF("VMA WRITE %d %zd\n", dev_id, cluster_num);
++
++    uint16_t mask = 0;
++
++    if (buf) {
++        int i;
++        int bit = 1;
++        for (i = 0; i < 16; i++) {
++            unsigned char *vmablock = buf + (i*VMA_BLOCK_SIZE);
++            if (!buffer_is_zero(vmablock, VMA_BLOCK_SIZE)) {
++                mask |= bit;
++                memcpy(vmaw->outbuf + vmaw->outbuf_pos, vmablock,
++                       VMA_BLOCK_SIZE);
++                vmaw->outbuf_pos += VMA_BLOCK_SIZE;
++            } else {
++                DPRINTF("VMA WRITE %zd ZERO BLOCK %d\n", cluster_num, i);
++                vmaw->stream_info[dev_id].zero_bytes += VMA_BLOCK_SIZE;
++                *zero_bytes += VMA_BLOCK_SIZE;
++            }
++
++            bit = bit << 1;
++        }
++    } else {
++        DPRINTF("VMA WRITE %zd ZERO CLUSTER\n", cluster_num);
++        vmaw->stream_info[dev_id].zero_bytes += VMA_CLUSTER_SIZE;
++        *zero_bytes += VMA_CLUSTER_SIZE;
++    }
++
++    uint64_t block_info = ((uint64_t)mask) << (32+16);
++    block_info |= ((uint64_t)dev_id) << 32;
++    block_info |= (cluster_num & 0xffffffff);
++    vmaw->outbuf_block_info[vmaw->outbuf_count] = block_info;
++
++    DPRINTF("VMA WRITE MASK %zd %zx\n", cluster_num, block_info);
++
++    vmaw->outbuf_count++;
++
++    /** NOTE: We allways write whole clusters, but we correctly set
++     * transferred bytes. So transferred == size when when everything
++     * went OK.
++     */
++    size_t transferred = VMA_CLUSTER_SIZE;
++
++    if (dev_id != vmaw->vmstate_stream) {
++        uint64_t last = (cluster_num + 1) * VMA_CLUSTER_SIZE;
++        if (last > vmaw->stream_info[dev_id].size) {
++            uint64_t diff = last - vmaw->stream_info[dev_id].size;
++            if (diff >= VMA_CLUSTER_SIZE) {
++                vma_writer_set_error(vmaw, "vma_writer_write: "
++                                     "read after last cluster");
++                return -1;
++            }
++            transferred -= diff;
++        }
++    }
++
++    vmaw->stream_info[dev_id].transferred += transferred;
++
++    return transferred;
++}
++
++void vma_writer_error_propagate(VmaWriter *vmaw, Error **errp)
++{
++    if (vmaw->status < 0 && *errp == NULL) {
++        error_setg(errp, "%s", vmaw->errmsg);
++    }
++}
++
++int vma_writer_close(VmaWriter *vmaw, Error **errp)
++{
++    g_assert(vmaw != NULL);
++
++    int i;
++
++    while (vmaw->co_writer) {
++        aio_poll(qemu_get_aio_context(), true);
++    }
++
++    assert(vmaw->co_writer == NULL);
++
++    if (vmaw->cmd) {
++        if (pclose(vmaw->cmd) < 0) {
++            vma_writer_set_error(vmaw, "vma_writer_close: "
++                                 "pclose failed - %s", g_strerror(errno));
++        }
++    } else {
++        if (close(vmaw->fd) < 0) {
++            vma_writer_set_error(vmaw, "vma_writer_close: "
++                                 "close failed - %s", g_strerror(errno));
++        }
++    }
++
++    for (i = 0; i <= 255; i++) {
++        VmaStreamInfo *si = &vmaw->stream_info[i];
++        if (si->size) {
++            if (!si->finished) {
++                vma_writer_set_error(vmaw, "vma_writer_close: "
++                                     "detected open stream '%s'", si->devname);
++            } else if ((si->transferred != si->size) &&
++                       (i != vmaw->vmstate_stream)) {
++                vma_writer_set_error(vmaw, "vma_writer_close: "
++                                     "incomplete stream '%s' (%zd != %zd)",
++                                     si->devname, si->transferred, si->size);
++            }
++        }
++    }
++
++    for (i = 0; i <= 255; i++) {
++        vmaw->stream_info[i].finished = 1; /* mark as closed */
++    }
++
++    vmaw->closed = 1;
++
++    if (vmaw->status < 0 && *errp == NULL) {
++        error_setg(errp, "%s", vmaw->errmsg);
++    }
++
++    return vmaw->status;
++}
++
++void vma_writer_destroy(VmaWriter *vmaw)
++{
++    assert(vmaw);
++
++    int i;
++
++    for (i = 0; i <= 255; i++) {
++        if (vmaw->stream_info[i].devname) {
++            g_free(vmaw->stream_info[i].devname);
++        }
++    }
++
++    if (vmaw->md5csum) {
++        g_checksum_free(vmaw->md5csum);
++    }
++
++    g_free(vmaw);
++}
+diff --git a/vma.c b/vma.c
+new file mode 100644
+index 0000000000..04915427c8
+--- /dev/null
++++ b/vma.c
+@@ -0,0 +1,757 @@
++/*
++ * VMA: Virtual Machine Archive
++ *
++ * Copyright (C) 2012-2013 Proxmox Server Solutions
++ *
++ * Authors:
++ *  Dietmar Maurer (dietmar@proxmox.com)
++ *
++ * This work is licensed under the terms of the GNU GPL, version 2 or later.
++ * See the COPYING file in the top-level directory.
++ *
++ */
++
++#include "qemu/osdep.h"
++#include <glib.h>
++
++#include "vma.h"
++#include "qemu-common.h"
++#include "qemu/error-report.h"
++#include "qemu/main-loop.h"
++#include "qapi/qmp/qstring.h"
++#include "sysemu/char.h" /* qstring_from_str */
++#include "sysemu/block-backend.h"
++
++static void help(void)
++{
++    const char *help_msg =
++        "usage: vma command [command options]\n"
++        "\n"
++        "vma list <filename>\n"
++        "vma config <filename> [-c config]\n"
++        "vma create <filename> [-c config] pathname ...\n"
++        "vma extract <filename> [-r <fifo>] <targetdir>\n"
++        "vma verify <filename> [-v]\n"
++        ;
++
++    printf("%s", help_msg);
++    exit(1);
++}
++
++static const char *extract_devname(const char *path, char **devname, int index)
++{
++    assert(path);
++
++    const char *sep = strchr(path, '=');
++
++    if (sep) {
++        *devname = g_strndup(path, sep - path);
++        path = sep + 1;
++    } else {
++        if (index >= 0) {
++            *devname = g_strdup_printf("disk%d", index);
++        } else {
++            *devname = NULL;
++        }
++    }
++
++    return path;
++}
++
++static void print_content(VmaReader *vmar)
++{
++    assert(vmar);
++
++    VmaHeader *head = vma_reader_get_header(vmar);
++
++    GList *l = vma_reader_get_config_data(vmar);
++    while (l && l->data) {
++        VmaConfigData *cdata = (VmaConfigData *)l->data;
++        l = g_list_next(l);
++        printf("CFG: size: %d name: %s\n", cdata->len, cdata->name);
++    }
++
++    int i;
++    VmaDeviceInfo *di;
++    for (i = 1; i < 255; i++) {
++        di = vma_reader_get_device_info(vmar, i);
++        if (di) {
++            if (strcmp(di->devname, "vmstate") == 0) {
++                printf("VMSTATE: dev_id=%d memory: %zd\n", i, di->size);
++            } else {
++                printf("DEV: dev_id=%d size: %zd devname: %s\n",
++                       i, di->size, di->devname);
++            }
++        }
++    }
++    /* ctime is the last entry we print */
++    printf("CTIME: %s", ctime(&head->ctime));
++    fflush(stdout);
++}
++
++static int list_content(int argc, char **argv)
++{
++    int c, ret = 0;
++    const char *filename;
++
++    for (;;) {
++        c = getopt(argc, argv, "h");
++        if (c == -1) {
++            break;
++        }
++        switch (c) {
++        case '?':
++        case 'h':
++            help();
++            break;
++        default:
++            g_assert_not_reached();
++        }
++    }
++
++    /* Get the filename */
++    if ((optind + 1) != argc) {
++        help();
++    }
++    filename = argv[optind++];
++
++    Error *errp = NULL;
++    VmaReader *vmar = vma_reader_create(filename, &errp);
++
++    if (!vmar) {
++        g_error("%s", error_get_pretty(errp));
++    }
++
++    print_content(vmar);
++
++    vma_reader_destroy(vmar);
++
++    return ret;
++}
++
++typedef struct RestoreMap {
++    char *devname;
++    char *path;
++    char *format;
++    bool write_zero;
++} RestoreMap;
++
++static int extract_content(int argc, char **argv)
++{
++    int c, ret = 0;
++    int verbose = 0;
++    const char *filename;
++    const char *dirname;
++    const char *readmap = NULL;
++
++    for (;;) {
++        c = getopt(argc, argv, "hvr:");
++        if (c == -1) {
++            break;
++        }
++        switch (c) {
++        case '?':
++        case 'h':
++            help();
++            break;
++        case 'r':
++            readmap = optarg;
++            break;
++        case 'v':
++            verbose = 1;
++            break;
++        default:
++            help();
++        }
++    }
++
++    /* Get the filename */
++    if ((optind + 2) != argc) {
++        help();
++    }
++    filename = argv[optind++];
++    dirname = argv[optind++];
++
++    Error *errp = NULL;
++    VmaReader *vmar = vma_reader_create(filename, &errp);
++
++    if (!vmar) {
++        g_error("%s", error_get_pretty(errp));
++    }
++
++    if (mkdir(dirname, 0777) < 0) {
++        g_error("unable to create target directory %s - %s",
++                dirname, g_strerror(errno));
++    }
++
++    GList *l = vma_reader_get_config_data(vmar);
++    while (l && l->data) {
++        VmaConfigData *cdata = (VmaConfigData *)l->data;
++        l = g_list_next(l);
++        char *cfgfn = g_strdup_printf("%s/%s", dirname, cdata->name);
++        GError *err = NULL;
++        if (!g_file_set_contents(cfgfn, (gchar *)cdata->data, cdata->len,
++                                 &err)) {
++            g_error("unable to write file: %s", err->message);
++        }
++    }
++
++    GHashTable *devmap = g_hash_table_new(g_str_hash, g_str_equal);
++
++    if (readmap) {
++        print_content(vmar);
++
++        FILE *map = fopen(readmap, "r");
++        if (!map) {
++            g_error("unable to open fifo %s - %s", readmap, g_strerror(errno));
++        }
++
++        while (1) {
++            char inbuf[8192];
++            char *line = fgets(inbuf, sizeof(inbuf), map);
++            if (!line || line[0] == '\0' || !strcmp(line, "done\n")) {
++                break;
++            }
++            int len = strlen(line);
++            if (line[len - 1] == '\n') {
++                line[len - 1] = '\0';
++                if (len == 1) {
++                    break;
++                }
++            }
++
++            char *format = NULL;
++            if (strncmp(line, "format=", sizeof("format=")-1) == 0) {
++                format = line + sizeof("format=")-1;
++                char *colon = strchr(format, ':');
++                if (!colon) {
++                    g_error("read map failed - found only a format ('%s')", inbuf);
++                }
++                format = g_strndup(format, colon - format);
++                line = colon+1;
++            }
++
++            const char *path;
++            bool write_zero;
++            if (line[0] == '0' && line[1] == ':') {
++                path = line + 2;
++                write_zero = false;
++            } else if (line[0] == '1' && line[1] == ':') {
++                path = line + 2;
++                write_zero = true;
++            } else {
++                g_error("read map failed - parse error ('%s')", inbuf);
++            }
++
++            char *devname = NULL;
++            path = extract_devname(path, &devname, -1);
++            if (!devname) {
++                g_error("read map failed - no dev name specified ('%s')",
++                        inbuf);
++            }
++
++            RestoreMap *map = g_new0(RestoreMap, 1);
++            map->devname = g_strdup(devname);
++            map->path = g_strdup(path);
++            map->format = format;
++            map->write_zero = write_zero;
++
++            g_hash_table_insert(devmap, map->devname, map);
++
++        };
++    }
++
++    int i;
++    int vmstate_fd = -1;
++    guint8 vmstate_stream = 0;
++
++    BlockBackend *blk = NULL;
++
++    for (i = 1; i < 255; i++) {
++        VmaDeviceInfo *di = vma_reader_get_device_info(vmar, i);
++        if (di && (strcmp(di->devname, "vmstate") == 0)) {
++            vmstate_stream = i;
++            char *statefn = g_strdup_printf("%s/vmstate.bin", dirname);
++            vmstate_fd = open(statefn, O_WRONLY|O_CREAT|O_EXCL, 0644);
++            if (vmstate_fd < 0) {
++                g_error("create vmstate file '%s' failed - %s", statefn,
++                        g_strerror(errno));
++            }
++            g_free(statefn);
++        } else if (di) {
++            char *devfn = NULL;
++            const char *format = NULL;
++            int flags = BDRV_O_RDWR | BDRV_O_NO_FLUSH;
++            bool write_zero = true;
++
++            if (readmap) {
++                RestoreMap *map;
++                map = (RestoreMap *)g_hash_table_lookup(devmap, di->devname);
++                if (map == NULL) {
++                    g_error("no device name mapping for %s", di->devname);
++                }
++                devfn = map->path;
++                format = map->format;
++                write_zero = map->write_zero;
++            } else {
++                devfn = g_strdup_printf("%s/tmp-disk-%s.raw",
++                                        dirname, di->devname);
++                printf("DEVINFO %s %zd\n", devfn, di->size);
++
++                bdrv_img_create(devfn, "raw", NULL, NULL, NULL, di->size,
++                                flags, &errp, 0);
++                if (errp) {
++                    g_error("can't create file %s: %s", devfn,
++                            error_get_pretty(errp));
++                }
++
++                /* Note: we created an empty file above, so there is no
++                 * need to write zeroes (so we generate a sparse file)
++                 */
++                write_zero = false;
++            }
++
++          size_t devlen = strlen(devfn);
++          QDict *options = NULL;
++            if (format) {
++                /* explicit format from commandline */
++                options = qdict_new();
++                qdict_put(options, "driver", qstring_from_str(format));
++            } else if ((devlen > 4 && strcmp(devfn+devlen-4, ".raw") == 0) ||
++                     strncmp(devfn, "/dev/", 5) == 0)
++          {
++                /* This part is now deprecated for PVE as well (just as qemu
++                 * deprecated not specifying an explicit raw format, too.
++                 */
++              /* explicit raw format */
++              options = qdict_new();
++              qdict_put(options, "driver", qstring_from_str("raw"));
++          }
++
++
++          if (errp || !(blk = blk_new_open(devfn, NULL, options, flags, &errp))) {
++                g_error("can't open file %s - %s", devfn,
++                        error_get_pretty(errp));
++            }
++
++            if (vma_reader_register_bs(vmar, i, blk, write_zero, &errp) < 0) {
++                g_error("%s", error_get_pretty(errp));
++            }
++
++            if (!readmap) {
++                g_free(devfn);
++            }
++        }
++    }
++
++    if (vma_reader_restore(vmar, vmstate_fd, verbose, &errp) < 0) {
++        g_error("restore failed - %s", error_get_pretty(errp));
++    }
++
++    if (!readmap) {
++        for (i = 1; i < 255; i++) {
++            VmaDeviceInfo *di = vma_reader_get_device_info(vmar, i);
++            if (di && (i != vmstate_stream)) {
++                char *tmpfn = g_strdup_printf("%s/tmp-disk-%s.raw",
++                                              dirname, di->devname);
++                char *fn = g_strdup_printf("%s/disk-%s.raw",
++                                           dirname, di->devname);
++                if (rename(tmpfn, fn) != 0) {
++                    g_error("rename %s to %s failed - %s",
++                            tmpfn, fn, g_strerror(errno));
++                }
++            }
++        }
++    }
++
++    vma_reader_destroy(vmar);
++
++    blk_unref(blk);
++
++    bdrv_close_all();
++
++    return ret;
++}
++
++static int verify_content(int argc, char **argv)
++{
++    int c, ret = 0;
++    int verbose = 0;
++    const char *filename;
++
++    for (;;) {
++        c = getopt(argc, argv, "hv");
++        if (c == -1) {
++            break;
++        }
++        switch (c) {
++        case '?':
++        case 'h':
++            help();
++            break;
++        case 'v':
++            verbose = 1;
++            break;
++        default:
++            help();
++        }
++    }
++
++    /* Get the filename */
++    if ((optind + 1) != argc) {
++        help();
++    }
++    filename = argv[optind++];
++
++    Error *errp = NULL;
++    VmaReader *vmar = vma_reader_create(filename, &errp);
++
++    if (!vmar) {
++        g_error("%s", error_get_pretty(errp));
++    }
++
++    if (verbose) {
++        print_content(vmar);
++    }
++
++    if (vma_reader_verify(vmar, verbose, &errp) < 0) {
++        g_error("verify failed - %s", error_get_pretty(errp));
++    }
++
++    vma_reader_destroy(vmar);
++
++    bdrv_close_all();
++
++    return ret;
++}
++
++typedef struct BackupJob {
++    BlockBackend *target;
++    int64_t len;
++    VmaWriter *vmaw;
++    uint8_t dev_id;
++} BackupJob;
++
++#define BACKUP_SECTORS_PER_CLUSTER (VMA_CLUSTER_SIZE / BDRV_SECTOR_SIZE)
++
++static void coroutine_fn backup_run_empty(void *opaque)
++{
++    VmaWriter *vmaw = (VmaWriter *)opaque;
++
++    vma_writer_flush_output(vmaw);
++
++    Error *err = NULL;
++    if (vma_writer_close(vmaw, &err) != 0) {
++        g_warning("vma_writer_close failed %s", error_get_pretty(err));
++    }
++}
++
++static void coroutine_fn backup_run(void *opaque)
++{
++    BackupJob *job = (BackupJob *)opaque;
++    struct iovec iov;
++    QEMUIOVector qiov;
++
++    int64_t start, end;
++    int ret = 0;
++
++    unsigned char *buf = blk_blockalign(job->target, VMA_CLUSTER_SIZE);
++
++    start = 0;
++    end = DIV_ROUND_UP(job->len / BDRV_SECTOR_SIZE,
++                       BACKUP_SECTORS_PER_CLUSTER);
++
++    for (; start < end; start++) {
++        iov.iov_base = buf;
++        iov.iov_len = VMA_CLUSTER_SIZE;
++        qemu_iovec_init_external(&qiov, &iov, 1);
++
++        ret = blk_co_preadv(job->target, start * VMA_CLUSTER_SIZE,
++                            VMA_CLUSTER_SIZE, &qiov, 0);
++        if (ret < 0) {
++            vma_writer_set_error(job->vmaw, "read error", -1);
++            goto out;
++        }
++
++        size_t zb = 0;
++        if (vma_writer_write(job->vmaw, job->dev_id, start, buf, &zb) < 0) {
++            vma_writer_set_error(job->vmaw, "backup_dump_cb vma_writer_write failed", -1);
++            goto out;
++        }
++    }
++
++
++out:
++    if (vma_writer_close_stream(job->vmaw, job->dev_id) <= 0) {
++        Error *err = NULL;
++        if (vma_writer_close(job->vmaw, &err) != 0) {
++            g_warning("vma_writer_close failed %s", error_get_pretty(err));
++        }
++    }
++}
++
++static int create_archive(int argc, char **argv)
++{
++    int i, c;
++    int verbose = 0;
++    const char *archivename;
++    GList *config_files = NULL;
++
++    for (;;) {
++        c = getopt(argc, argv, "hvc:");
++        if (c == -1) {
++            break;
++        }
++        switch (c) {
++        case '?':
++        case 'h':
++            help();
++            break;
++        case 'c':
++            config_files = g_list_append(config_files, optarg);
++            break;
++        case 'v':
++            verbose = 1;
++            break;
++        default:
++            g_assert_not_reached();
++        }
++    }
++
++
++    /* make sure we an archive name */
++    if ((optind + 1) > argc) {
++        help();
++    }
++
++    archivename = argv[optind++];
++
++    uuid_t uuid;
++    uuid_generate(uuid);
++
++    Error *local_err = NULL;
++    VmaWriter *vmaw = vma_writer_create(archivename, uuid, &local_err);
++
++    if (vmaw == NULL) {
++        g_error("%s", error_get_pretty(local_err));
++    }
++
++    GList *l = config_files;
++    while (l && l->data) {
++        char *name = l->data;
++        char *cdata = NULL;
++        gsize clen = 0;
++        GError *err = NULL;
++        if (!g_file_get_contents(name, &cdata, &clen, &err)) {
++            unlink(archivename);
++            g_error("Unable to read file: %s", err->message);
++        }
++
++        if (vma_writer_add_config(vmaw, name, cdata, clen) != 0) {
++            unlink(archivename);
++            g_error("Unable to append config data %s (len = %zd)",
++                    name, clen);
++        }
++        l = g_list_next(l);
++    }
++
++    int devcount = 0;
++    while (optind < argc) {
++        const char *path = argv[optind++];
++        char *devname = NULL;
++        path = extract_devname(path, &devname, devcount++);
++
++        Error *errp = NULL;
++        BlockBackend *target;
++
++        target = blk_new_open(path, NULL, NULL, 0, &errp);
++        if (!target) {
++            unlink(archivename);
++            g_error("bdrv_open '%s' failed - %s", path, error_get_pretty(errp));
++        }
++        int64_t size = blk_getlength(target);
++        int dev_id = vma_writer_register_stream(vmaw, devname, size);
++        if (dev_id <= 0) {
++            unlink(archivename);
++            g_error("vma_writer_register_stream '%s' failed", devname);
++        }
++
++        BackupJob *job = g_new0(BackupJob, 1);
++        job->len = size;
++        job->target = target;
++        job->vmaw = vmaw;
++        job->dev_id = dev_id;
++
++        Coroutine *co = qemu_coroutine_create(backup_run, job);
++        qemu_coroutine_enter(co);
++    }
++
++    VmaStatus vmastat;
++    int percent = 0;
++    int last_percent = -1;
++
++    if (devcount) {
++        while (1) {
++            main_loop_wait(false);
++            vma_writer_get_status(vmaw, &vmastat);
++
++            if (verbose) {
++
++                uint64_t total = 0;
++                uint64_t transferred = 0;
++                uint64_t zero_bytes = 0;
++
++                int i;
++                for (i = 0; i < 256; i++) {
++                    if (vmastat.stream_info[i].size) {
++                        total += vmastat.stream_info[i].size;
++                        transferred += vmastat.stream_info[i].transferred;
++                        zero_bytes += vmastat.stream_info[i].zero_bytes;
++                    }
++                }
++                percent = (transferred*100)/total;
++                if (percent != last_percent) {
++                    fprintf(stderr, "progress %d%% %zd/%zd %zd\n", percent,
++                            transferred, total, zero_bytes);
++                    fflush(stderr);
++
++                    last_percent = percent;
++                }
++            }
++
++            if (vmastat.closed) {
++                break;
++            }
++        }
++    } else {
++        Coroutine *co = qemu_coroutine_create(backup_run_empty, vmaw);
++        qemu_coroutine_enter(co);
++        while (1) {
++            main_loop_wait(false);
++            vma_writer_get_status(vmaw, &vmastat);
++            if (vmastat.closed) {
++                    break;
++            }
++        }
++    }
++
++    bdrv_drain_all();
++
++    vma_writer_get_status(vmaw, &vmastat);
++
++    if (verbose) {
++        for (i = 0; i < 256; i++) {
++            VmaStreamInfo *si = &vmastat.stream_info[i];
++            if (si->size) {
++                fprintf(stderr, "image %s: size=%zd zeros=%zd saved=%zd\n",
++                        si->devname, si->size, si->zero_bytes,
++                        si->size - si->zero_bytes);
++            }
++        }
++    }
++
++    if (vmastat.status < 0) {
++        unlink(archivename);
++        g_error("creating vma archive failed");
++    }
++
++    return 0;
++}
++
++static int dump_config(int argc, char **argv)
++{
++    int c, ret = 0;
++    const char *filename;
++    const char *config_name = "qemu-server.conf";
++
++    for (;;) {
++        c = getopt(argc, argv, "hc:");
++        if (c == -1) {
++            break;
++        }
++        switch (c) {
++        case '?':
++        case 'h':
++            help();
++            break;
++        case 'c':
++            config_name = optarg;
++            break;
++        default:
++            help();
++        }
++    }
++
++    /* Get the filename */
++    if ((optind + 1) != argc) {
++        help();
++    }
++    filename = argv[optind++];
++
++    Error *errp = NULL;
++    VmaReader *vmar = vma_reader_create(filename, &errp);
++
++    if (!vmar) {
++        g_error("%s", error_get_pretty(errp));
++    }
++
++    int found = 0;
++    GList *l = vma_reader_get_config_data(vmar);
++    while (l && l->data) {
++        VmaConfigData *cdata = (VmaConfigData *)l->data;
++        l = g_list_next(l);
++        if (strcmp(cdata->name, config_name) == 0) {
++            found = 1;
++            fwrite(cdata->data,  cdata->len, 1, stdout);
++            break;
++        }
++    }
++
++    vma_reader_destroy(vmar);
++
++    bdrv_close_all();
++
++    if (!found) {
++        fprintf(stderr, "unable to find configuration data '%s'\n", config_name);
++        return -1;
++    }
++
++    return ret;
++}
++
++int main(int argc, char **argv)
++{
++    const char *cmdname;
++    Error *main_loop_err = NULL;
++
++    error_set_progname(argv[0]);
++
++    if (qemu_init_main_loop(&main_loop_err)) {
++        g_error("%s", error_get_pretty(main_loop_err));
++    }
++
++    bdrv_init();
++
++    if (argc < 2) {
++        help();
++    }
++
++    cmdname = argv[1];
++    argc--; argv++;
++
++
++    if (!strcmp(cmdname, "list")) {
++        return list_content(argc, argv);
++    } else if (!strcmp(cmdname, "create")) {
++        return create_archive(argc, argv);
++    } else if (!strcmp(cmdname, "extract")) {
++        return extract_content(argc, argv);
++    } else if (!strcmp(cmdname, "verify")) {
++        return verify_content(argc, argv);
++    } else if (!strcmp(cmdname, "config")) {
++        return dump_config(argc, argv);
++    }
++
++    help();
++    return 0;
++}
+diff --git a/vma.h b/vma.h
+new file mode 100644
+index 0000000000..fa6f4df7e7
+--- /dev/null
++++ b/vma.h
+@@ -0,0 +1,149 @@
++/*
++ * VMA: Virtual Machine Archive
++ *
++ * Copyright (C) Proxmox Server Solutions
++ *
++ * Authors:
++ *  Dietmar Maurer (dietmar@proxmox.com)
++ *
++ * This work is licensed under the terms of the GNU GPL, version 2 or later.
++ * See the COPYING file in the top-level directory.
++ *
++ */
++
++#ifndef BACKUP_VMA_H
++#define BACKUP_VMA_H
++
++#include <uuid/uuid.h>
++#include "qapi/error.h"
++#include "block/block.h"
++
++#define VMA_BLOCK_BITS 12
++#define VMA_BLOCK_SIZE (1<<VMA_BLOCK_BITS)
++#define VMA_CLUSTER_BITS (VMA_BLOCK_BITS+4)
++#define VMA_CLUSTER_SIZE (1<<VMA_CLUSTER_BITS)
++
++#if VMA_CLUSTER_SIZE != 65536
++#error unexpected cluster size
++#endif
++
++#define VMA_EXTENT_HEADER_SIZE 512
++#define VMA_BLOCKS_PER_EXTENT 59
++#define VMA_MAX_CONFIGS 256
++
++#define VMA_MAX_EXTENT_SIZE \
++    (VMA_EXTENT_HEADER_SIZE+VMA_CLUSTER_SIZE*VMA_BLOCKS_PER_EXTENT)
++#if VMA_MAX_EXTENT_SIZE != 3867136
++#error unexpected VMA_EXTENT_SIZE
++#endif
++
++/* File Format Definitions */
++
++#define VMA_MAGIC (GUINT32_TO_BE(('V'<<24)|('M'<<16)|('A'<<8)|0x00))
++#define VMA_EXTENT_MAGIC (GUINT32_TO_BE(('V'<<24)|('M'<<16)|('A'<<8)|'E'))
++
++typedef struct VmaDeviceInfoHeader {
++    uint32_t devname_ptr; /* offset into blob_buffer table */
++    uint32_t reserved0;
++    uint64_t size; /* device size in bytes */
++    uint64_t reserved1;
++    uint64_t reserved2;
++} VmaDeviceInfoHeader;
++
++typedef struct VmaHeader {
++    uint32_t magic;
++    uint32_t version;
++    unsigned char uuid[16];
++    int64_t ctime;
++    unsigned char md5sum[16];
++
++    uint32_t blob_buffer_offset;
++    uint32_t blob_buffer_size;
++    uint32_t header_size;
++
++    unsigned char reserved[1984];
++
++    uint32_t config_names[VMA_MAX_CONFIGS]; /* offset into blob_buffer table */
++    uint32_t config_data[VMA_MAX_CONFIGS];  /* offset into blob_buffer table */
++
++    uint32_t reserved1;
++
++    VmaDeviceInfoHeader dev_info[256];
++} VmaHeader;
++
++typedef struct VmaExtentHeader {
++    uint32_t magic;
++    uint16_t reserved1;
++    uint16_t block_count;
++    unsigned char uuid[16];
++    unsigned char md5sum[16];
++    uint64_t blockinfo[VMA_BLOCKS_PER_EXTENT];
++} VmaExtentHeader;
++
++/* functions/definitions to read/write vma files */
++
++typedef struct VmaReader VmaReader;
++
++typedef struct VmaWriter VmaWriter;
++
++typedef struct VmaConfigData {
++    const char *name;
++    const void *data;
++    uint32_t len;
++} VmaConfigData;
++
++typedef struct VmaStreamInfo {
++    uint64_t size;
++    uint64_t cluster_count;
++    uint64_t transferred;
++    uint64_t zero_bytes;
++    int finished;
++    char *devname;
++} VmaStreamInfo;
++
++typedef struct VmaStatus {
++    int status;
++    bool closed;
++    char errmsg[8192];
++    char uuid_str[37];
++    VmaStreamInfo stream_info[256];
++} VmaStatus;
++
++typedef struct VmaDeviceInfo {
++    uint64_t size; /* device size in bytes */
++    const char *devname;
++} VmaDeviceInfo;
++
++VmaWriter *vma_writer_create(const char *filename, uuid_t uuid, Error **errp);
++int vma_writer_close(VmaWriter *vmaw, Error **errp);
++void vma_writer_error_propagate(VmaWriter *vmaw, Error **errp);
++void vma_writer_destroy(VmaWriter *vmaw);
++int vma_writer_add_config(VmaWriter *vmaw, const char *name, gpointer data,
++                          size_t len);
++int vma_writer_register_stream(VmaWriter *vmaw, const char *devname,
++                               size_t size);
++
++int64_t coroutine_fn vma_writer_write(VmaWriter *vmaw, uint8_t dev_id,
++                                      int64_t cluster_num, unsigned char *buf,
++                                      size_t *zero_bytes);
++
++int coroutine_fn vma_writer_close_stream(VmaWriter *vmaw, uint8_t dev_id);
++int coroutine_fn vma_writer_flush_output(VmaWriter *vmaw);
++
++int vma_writer_get_status(VmaWriter *vmaw, VmaStatus *status);
++void vma_writer_set_error(VmaWriter *vmaw, const char *fmt, ...);
++
++
++VmaReader *vma_reader_create(const char *filename, Error **errp);
++void vma_reader_destroy(VmaReader *vmar);
++VmaHeader *vma_reader_get_header(VmaReader *vmar);
++GList *vma_reader_get_config_data(VmaReader *vmar);
++VmaDeviceInfo *vma_reader_get_device_info(VmaReader *vmar, guint8 dev_id);
++int vma_reader_register_bs(VmaReader *vmar, guint8 dev_id,
++                           BlockBackend *target, bool write_zeroes,
++                           Error **errp);
++int vma_reader_restore(VmaReader *vmar, int vmstate_fd, bool verbose,
++                       Error **errp);
++int vma_reader_verify(VmaReader *vmar, bool verbose, Error **errp);
++
++#endif /* BACKUP_VMA_H */
+-- 
+2.11.0
+
diff --git a/debian/patches/pve/0028-savevm-async-migration-and-bdrv_open-update.patch b/debian/patches/pve/0028-savevm-async-migration-and-bdrv_open-update.patch
deleted file mode 100644 (file)
index 6e859c6..0000000
+++ /dev/null
@@ -1,101 +0,0 @@
-From c9ec344900b5d2459a70dae88a0e1f309f864775 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Thu, 10 Dec 2015 15:14:00 +0100
-Subject: [PATCH 28/49] savevm-async: migration and bdrv_open update
-
----
- savevm-async.c | 25 ++++++++++++-------------
- 1 file changed, 12 insertions(+), 13 deletions(-)
-
-diff --git a/savevm-async.c b/savevm-async.c
-index 9704a412d9..6ac03af9c8 100644
---- a/savevm-async.c
-+++ b/savevm-async.c
-@@ -154,10 +154,10 @@ static int block_state_close(void *opaque)
-     return bdrv_flush(snap_state.bs);
- }
--static int block_state_put_buffer(void *opaque, const uint8_t *buf,
--                                  int64_t pos, int size)
-+static ssize_t block_state_put_buffer(void *opaque, const uint8_t *buf,
-+                                      int64_t pos, size_t size)
- {
--    int ret;
-+    ssize_t ret;
-     assert(pos == snap_state.bs_pos);
-@@ -201,12 +201,13 @@ static void process_savevm_co(void *opaque)
-     }
-     while (snap_state.state == SAVE_STATE_ACTIVE) {
--        uint64_t pending_size;
-+        uint64_t pending_size, pend_post, pend_nonpost;
--        pending_size = qemu_savevm_state_pending(snap_state.file, 0);
-+        qemu_savevm_state_pending(snap_state.file, 0, &pend_nonpost, &pend_post);
-+        pending_size = pend_post + pend_nonpost;
-         if (pending_size) {
--                ret = qemu_savevm_state_iterate(snap_state.file);
-+                ret = qemu_savevm_state_iterate(snap_state.file, false);
-                 if (ret < 0) {
-                     save_snapshot_error("qemu_savevm_state_iterate error %d", ret);
-                     break;
-@@ -217,7 +218,7 @@ static void process_savevm_co(void *opaque)
-             if (store_and_stop())
-                 break;
-             DPRINTF("savevm inerate finished\n");
--            qemu_savevm_state_complete_precopy(snap_state.file);
-+            qemu_savevm_state_complete_precopy(snap_state.file, false);
-             DPRINTF("save complete\n");
-             save_snapshot_completed();
-             break;
-@@ -250,7 +251,6 @@ static const QEMUFileOps block_file_ops = {
- void qmp_savevm_start(bool has_statefile, const char *statefile, Error **errp)
- {
--    BlockDriver *drv = NULL;
-     Error *local_err = NULL;
-     int bdrv_oflags = BDRV_O_RDWR | BDRV_O_RESIZE;
-@@ -289,7 +289,7 @@ void qmp_savevm_start(bool has_statefile, const char *statefile, Error **errp)
-     QDict *options = NULL;
-     options = qdict_new();
-     qdict_put(options, "driver", qstring_from_str("raw"));
--    ret = bdrv_open(&snap_state.bs, statefile, NULL, options, bdrv_oflags, drv, &local_err);
-+    ret = bdrv_open(&snap_state.bs, statefile, NULL, options, bdrv_oflags, &local_err);
-     if (ret < 0) {
-         error_set(errp, ERROR_CLASS_GENERIC_ERROR, "failed to open '%s'", statefile);
-         goto restart;
-@@ -454,8 +454,8 @@ void qmp_delete_drive_snapshot(const char *device, const char *name,
-     }
- }
--static int loadstate_get_buffer(void *opaque, uint8_t *buf, int64_t pos,
--                                int size)
-+static ssize_t loadstate_get_buffer(void *opaque, uint8_t *buf, int64_t pos,
-+                                    size_t size)
- {
-     BlockDriverState *bs = (BlockDriverState *)opaque;
-     int64_t maxlen = bdrv_getlength(bs);
-@@ -478,7 +478,6 @@ static const QEMUFileOps loadstate_file_ops = {
- int load_state_from_blockdev(const char *filename)
- {
-     BlockDriverState *bs = NULL;
--    BlockDriver *drv = NULL;
-     Error *local_err = NULL;
-     Error *blocker = NULL;
-@@ -486,7 +485,7 @@ int load_state_from_blockdev(const char *filename)
-     int ret;
-     bs = bdrv_new();
--    ret = bdrv_open(&bs, filename, NULL, NULL, 0, drv, &local_err);
-+    ret = bdrv_open(&bs, filename, NULL, NULL, 0, &local_err);
-     error_setg(&blocker, "block device is in use by load state");
-     bdrv_op_block_all(bs, blocker);
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0029-vnc-make-x509-imply-tls-again.patch b/debian/patches/pve/0029-vnc-make-x509-imply-tls-again.patch
deleted file mode 100644 (file)
index fd228d1..0000000
+++ /dev/null
@@ -1,28 +0,0 @@
-From d4cccacea777bdf4ce379a0d889acbfd05fcdf05 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Tue, 12 Jan 2016 09:09:49 +0100
-Subject: [PATCH 29/49] vnc: make x509 imply tls again
-
----
- ui/vnc.c | 5 ++---
- 1 file changed, 2 insertions(+), 3 deletions(-)
-
-diff --git a/ui/vnc.c b/ui/vnc.c
-index 9c8ab42eea..eb9420e830 100644
---- a/ui/vnc.c
-+++ b/ui/vnc.c
-@@ -3881,9 +3881,8 @@ void vnc_display_open(const char *id, Error **errp)
-         const char *path;
-         bool tls = false, x509 = false, x509verify = false;
-         tls  = qemu_opt_get_bool(opts, "tls", false);
--        if (tls) {
--            path = qemu_opt_get(opts, "x509");
--
-+        path = qemu_opt_get(opts, "x509");
-+        if (tls || path) {
-             if (path) {
-                 x509 = true;
-             } else {
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0030-PVE-VNC-authentication.patch b/debian/patches/pve/0030-PVE-VNC-authentication.patch
deleted file mode 100644 (file)
index 4bbe6fd..0000000
+++ /dev/null
@@ -1,684 +0,0 @@
-From 503d2744e7e5cfdca939404488ee2b3f43894425 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Mon, 11 Jan 2016 10:40:31 +0100
-Subject: [PATCH 30/49] PVE VNC authentication
-
----
- crypto/tlscreds.c         |  47 +++++++++++
- crypto/tlscredspriv.h     |   2 +
- crypto/tlscredsx509.c     |  13 +--
- crypto/tlssession.c       |   1 +
- include/crypto/tlscreds.h |   1 +
- include/ui/console.h      |   1 +
- qemu-options.hx           |   3 +
- ui/vnc-auth-vencrypt.c    | 196 ++++++++++++++++++++++++++++++++++++++--------
- ui/vnc.c                  | 140 ++++++++++++++++++++++++++++++++-
- ui/vnc.h                  |   4 +
- vl.c                      |   9 +++
- 11 files changed, 376 insertions(+), 41 deletions(-)
-
-diff --git a/crypto/tlscreds.c b/crypto/tlscreds.c
-index a8965531b6..e9ae13ce47 100644
---- a/crypto/tlscreds.c
-+++ b/crypto/tlscreds.c
-@@ -158,6 +158,33 @@ qcrypto_tls_creds_prop_get_verify(Object *obj,
- static void
-+qcrypto_tls_creds_prop_set_pve(Object *obj,
-+                                 bool value,
-+                                 Error **errp G_GNUC_UNUSED)
-+{
-+    QCryptoTLSCreds *creds = QCRYPTO_TLS_CREDS(obj);
-+
-+    creds->pve = value;
-+}
-+
-+
-+static bool
-+qcrypto_tls_creds_prop_get_pve(Object *obj,
-+                                  Error **errp G_GNUC_UNUSED)
-+{
-+    QCryptoTLSCreds *creds = QCRYPTO_TLS_CREDS(obj);
-+
-+    return creds->pve;
-+}
-+
-+bool qcrypto_tls_creds_is_pve(QCryptoTLSCreds *creds)
-+{
-+    Error *errp = NULL;
-+    return qcrypto_tls_creds_prop_get_pve((Object*)creds, &errp);
-+}
-+
-+
-+static void
- qcrypto_tls_creds_prop_set_dir(Object *obj,
-                                const char *value,
-                                Error **errp G_GNUC_UNUSED)
-@@ -250,6 +277,26 @@ qcrypto_tls_creds_init(Object *obj)
-     QCryptoTLSCreds *creds = QCRYPTO_TLS_CREDS(obj);
-     creds->verifyPeer = true;
-+    creds->pve = false;
-+
-+    object_property_add_bool(obj, "verify-peer",
-+                             qcrypto_tls_creds_prop_get_verify,
-+                             qcrypto_tls_creds_prop_set_verify,
-+                             NULL);
-+    object_property_add_bool(obj, "pve",
-+                             qcrypto_tls_creds_prop_get_pve,
-+                             qcrypto_tls_creds_prop_set_pve,
-+                             NULL);
-+    object_property_add_str(obj, "dir",
-+                            qcrypto_tls_creds_prop_get_dir,
-+                            qcrypto_tls_creds_prop_set_dir,
-+                            NULL);
-+    object_property_add_enum(obj, "endpoint",
-+                             "QCryptoTLSCredsEndpoint",
-+                             QCryptoTLSCredsEndpoint_lookup,
-+                             qcrypto_tls_creds_prop_get_endpoint,
-+                             qcrypto_tls_creds_prop_set_endpoint,
-+                             NULL);
- }
-diff --git a/crypto/tlscredspriv.h b/crypto/tlscredspriv.h
-index 13e9b6c0b2..0356acc2c9 100644
---- a/crypto/tlscredspriv.h
-+++ b/crypto/tlscredspriv.h
-@@ -36,6 +36,8 @@ int qcrypto_tls_creds_get_dh_params_file(QCryptoTLSCreds *creds,
-                                          gnutls_dh_params_t *dh_params,
-                                          Error **errp);
-+bool qcrypto_tls_creds_is_pve(QCryptoTLSCreds *creds);
-+
- #endif
- #endif /* QCRYPTO_TLSCREDSPRIV_H */
-diff --git a/crypto/tlscredsx509.c b/crypto/tlscredsx509.c
-index 50eb54f6bb..09f7364001 100644
---- a/crypto/tlscredsx509.c
-+++ b/crypto/tlscredsx509.c
-@@ -555,22 +555,23 @@ qcrypto_tls_creds_x509_load(QCryptoTLSCredsX509 *creds,
-         *key = NULL, *dhparams = NULL;
-     int ret;
-     int rv = -1;
-+    bool pve = qcrypto_tls_creds_is_pve(&creds->parent_obj);
-     trace_qcrypto_tls_creds_x509_load(creds,
-             creds->parent_obj.dir ? creds->parent_obj.dir : "<nodir>");
-     if (creds->parent_obj.endpoint == QCRYPTO_TLS_CREDS_ENDPOINT_SERVER) {
-         if (qcrypto_tls_creds_get_path(&creds->parent_obj,
--                                       QCRYPTO_TLS_CREDS_X509_CA_CERT,
-+                                       pve ? "pve-root-ca.pem" : QCRYPTO_TLS_CREDS_X509_CA_CERT,
-                                        true, &cacert, errp) < 0 ||
-             qcrypto_tls_creds_get_path(&creds->parent_obj,
-                                        QCRYPTO_TLS_CREDS_X509_CA_CRL,
-                                        false, &cacrl, errp) < 0 ||
-             qcrypto_tls_creds_get_path(&creds->parent_obj,
--                                       QCRYPTO_TLS_CREDS_X509_SERVER_CERT,
-+                                       pve ? "local/pve-ssl.pem" : QCRYPTO_TLS_CREDS_X509_SERVER_CERT,
-                                        true, &cert, errp) < 0 ||
-             qcrypto_tls_creds_get_path(&creds->parent_obj,
--                                       QCRYPTO_TLS_CREDS_X509_SERVER_KEY,
-+                                       pve ? "local/pve-ssl.key" : QCRYPTO_TLS_CREDS_X509_SERVER_KEY,
-                                        true, &key, errp) < 0 ||
-             qcrypto_tls_creds_get_path(&creds->parent_obj,
-                                        QCRYPTO_TLS_CREDS_DH_PARAMS,
-@@ -579,13 +580,13 @@ qcrypto_tls_creds_x509_load(QCryptoTLSCredsX509 *creds,
-         }
-     } else {
-         if (qcrypto_tls_creds_get_path(&creds->parent_obj,
--                                       QCRYPTO_TLS_CREDS_X509_CA_CERT,
-+                                       pve ? "pve-root-ca.pem" : QCRYPTO_TLS_CREDS_X509_CA_CERT,
-                                        true, &cacert, errp) < 0 ||
-             qcrypto_tls_creds_get_path(&creds->parent_obj,
--                                       QCRYPTO_TLS_CREDS_X509_CLIENT_CERT,
-+                                       pve ? "local/pve-ssl.pem" : QCRYPTO_TLS_CREDS_X509_CLIENT_CERT,
-                                        false, &cert, errp) < 0 ||
-             qcrypto_tls_creds_get_path(&creds->parent_obj,
--                                       QCRYPTO_TLS_CREDS_X509_CLIENT_KEY,
-+                                       pve ? "local/pve-ssl.key" : QCRYPTO_TLS_CREDS_X509_CLIENT_KEY,
-                                        false, &key, errp) < 0) {
-             goto cleanup;
-         }
-diff --git a/crypto/tlssession.c b/crypto/tlssession.c
-index 96a02deb69..c453e29cad 100644
---- a/crypto/tlssession.c
-+++ b/crypto/tlssession.c
-@@ -23,6 +23,7 @@
- #include "crypto/tlscredsanon.h"
- #include "crypto/tlscredsx509.h"
- #include "qapi/error.h"
-+#include "crypto/tlscredspriv.h"
- #include "qemu/acl.h"
- #include "trace.h"
-diff --git a/include/crypto/tlscreds.h b/include/crypto/tlscreds.h
-index ad47d88be7..f86d379f26 100644
---- a/include/crypto/tlscreds.h
-+++ b/include/crypto/tlscreds.h
-@@ -55,6 +55,7 @@ struct QCryptoTLSCreds {
- #endif
-     bool verifyPeer;
-     char *priority;
-+    bool pve;
- };
-diff --git a/include/ui/console.h b/include/ui/console.h
-index d759338816..69f010e1db 100644
---- a/include/ui/console.h
-+++ b/include/ui/console.h
-@@ -462,6 +462,7 @@ static inline void cocoa_display_init(DisplayState *ds, int full_screen)
- #endif
- /* vnc.c */
-+void pve_auth_setup(int vmid);
- void vnc_display_init(const char *id);
- void vnc_display_open(const char *id, Error **errp);
- void vnc_display_add_client(const char *id, int csock, bool skipauth);
-diff --git a/qemu-options.hx b/qemu-options.hx
-index 10f0e81f9b..fbd1a1cecf 100644
---- a/qemu-options.hx
-+++ b/qemu-options.hx
-@@ -513,6 +513,9 @@ STEXI
- @table @option
- ETEXI
-+DEF("id", HAS_ARG, QEMU_OPTION_id,
-+    "-id n         set the VMID\n", QEMU_ARCH_ALL)
-+
- DEF("fda", HAS_ARG, QEMU_OPTION_fda,
-     "-fda/-fdb file  use 'file' as floppy disk 0/1 image\n", QEMU_ARCH_ALL)
- DEF("fdb", HAS_ARG, QEMU_OPTION_fdb, "", QEMU_ARCH_ALL)
-diff --git a/ui/vnc-auth-vencrypt.c b/ui/vnc-auth-vencrypt.c
-index ffaab57550..de1c1949ba 100644
---- a/ui/vnc-auth-vencrypt.c
-+++ b/ui/vnc-auth-vencrypt.c
-@@ -28,6 +28,107 @@
- #include "vnc.h"
- #include "qapi/error.h"
- #include "qemu/main-loop.h"
-+#include "qemu/sockets.h"
-+
-+static int protocol_client_auth_plain(VncState *vs, uint8_t *data, size_t len)
-+{
-+      const char *err = NULL;
-+      char username[256];
-+      char passwd[512];
-+
-+      char clientip[256];
-+      clientip[0] = 0;
-+      struct sockaddr_in client;
-+      socklen_t addrlen = sizeof(client);
-+      if (getpeername(vs->csock, &client, &addrlen) == 0) {
-+              inet_ntop(client.sin_family, &client.sin_addr,
-+                        clientip, sizeof(clientip));
-+      }
-+
-+      if ((len != (vs->username_len + vs->password_len)) ||
-+          (vs->username_len >= (sizeof(username)-1)) ||
-+          (vs->password_len >= (sizeof(passwd)-1))    ) {
-+              err = "Got unexpected data length";
-+              goto err;
-+      }
-+
-+      strncpy(username, (char *)data, vs->username_len);
-+      username[vs->username_len] = 0;
-+      strncpy(passwd, (char *)data + vs->username_len, vs->password_len);
-+      passwd[vs->password_len] = 0;
-+
-+      VNC_DEBUG("AUTH PLAIN username: %s pw: %s\n", username, passwd);
-+
-+      if (pve_auth_verify(clientip, username, passwd) == 0) {
-+              vnc_write_u32(vs, 0); /* Accept auth completion */
-+              start_client_init(vs);
-+              return 0;
-+      }
-+
-+      err =  "Authentication failed";
-+err:
-+       if (err) {
-+             VNC_DEBUG("AUTH PLAIN ERROR: %s\n", err);
-+             vnc_write_u32(vs, 1); /* Reject auth */
-+             if (vs->minor >= 8) {
-+                     int elen = strlen(err);
-+                     vnc_write_u32(vs, elen);
-+                     vnc_write(vs, err, elen);
-+             }
-+       }
-+       vnc_flush(vs);
-+       vnc_client_error(vs);
-+
-+       return 0;
-+
-+}
-+
-+static int protocol_client_auth_plain_start(VncState *vs, uint8_t *data, size_t len)
-+{
-+      uint32_t ulen = read_u32(data, 0);
-+      uint32_t pwlen = read_u32(data, 4);
-+      const char *err = NULL;
-+
-+      VNC_DEBUG("AUTH PLAIN START %u %u\n", ulen, pwlen);
-+
-+       if (!ulen) {
-+             err = "No User name.";
-+             goto err;
-+       }
-+       if (ulen >= 255) {
-+             err = "User name too long.";
-+             goto err;
-+       }
-+       if (!pwlen) {
-+             err = "Password too short";
-+             goto err;
-+       }
-+       if (pwlen >= 511) {
-+             err = "Password too long.";
-+             goto err;
-+       }
-+
-+       vs->username_len = ulen;
-+       vs->password_len = pwlen;
-+
-+       vnc_read_when(vs, protocol_client_auth_plain, ulen + pwlen);
-+
-+       return 0;
-+err:
-+       if (err) {
-+             VNC_DEBUG("AUTH PLAIN ERROR: %s\n", err);
-+             vnc_write_u32(vs, 1); /* Reject auth */
-+             if (vs->minor >= 8) {
-+                     int elen = strlen(err);
-+                     vnc_write_u32(vs, elen);
-+                     vnc_write(vs, err, elen);
-+             }
-+       }
-+       vnc_flush(vs);
-+       vnc_client_error(vs);
-+
-+       return 0;
-+}
- static void start_auth_vencrypt_subauth(VncState *vs)
- {
-@@ -39,6 +140,17 @@ static void start_auth_vencrypt_subauth(VncState *vs)
-        start_client_init(vs);
-        break;
-+    case VNC_AUTH_VENCRYPT_TLSPLAIN:
-+    case VNC_AUTH_VENCRYPT_X509PLAIN:
-+       VNC_DEBUG("Start TLS auth PLAIN\n");
-+       vnc_read_when(vs, protocol_client_auth_plain_start, 8);
-+       break;
-+
-+    case VNC_AUTH_VENCRYPT_PLAIN:
-+       VNC_DEBUG("Start auth PLAIN\n");
-+       vnc_read_when(vs, protocol_client_auth_plain_start, 8);
-+       break;
-+
-     case VNC_AUTH_VENCRYPT_TLSVNC:
-     case VNC_AUTH_VENCRYPT_X509VNC:
-        VNC_DEBUG("Start TLS auth VNC\n");
-@@ -88,45 +200,64 @@ static int protocol_client_vencrypt_auth(VncState *vs, uint8_t *data, size_t len
- {
-     int auth = read_u32(data, 0);
--    if (auth != vs->subauth) {
-+    if (auth != vs->subauth && auth != VNC_AUTH_VENCRYPT_PLAIN) {
-         VNC_DEBUG("Rejecting auth %d\n", auth);
-         vnc_write_u8(vs, 0); /* Reject auth */
-         vnc_flush(vs);
-         vnc_client_error(vs);
-     } else {
--        Error *err = NULL;
--        QIOChannelTLS *tls;
--        VNC_DEBUG("Accepting auth %d, setting up TLS for handshake\n", auth);
--        vnc_write_u8(vs, 1); /* Accept auth */
--        vnc_flush(vs);
--
--        if (vs->ioc_tag) {
--            g_source_remove(vs->ioc_tag);
--            vs->ioc_tag = 0;
-+        if (auth == VNC_AUTH_VENCRYPT_PLAIN) {
-+            vs->subauth = auth;
-+            start_auth_vencrypt_subauth(vs);
-         }
-+        else
-+        {
-+            Error *err = NULL;
-+            QIOChannelTLS *tls;
-+            VNC_DEBUG("Accepting auth %d, setting up TLS for handshake\n", auth);
-+            vnc_write_u8(vs, 1); /* Accept auth */
-+            vnc_flush(vs);
--        tls = qio_channel_tls_new_server(
--            vs->ioc,
--            vs->vd->tlscreds,
--            vs->vd->tlsaclname,
--            &err);
--        if (!tls) {
--            VNC_DEBUG("Failed to setup TLS %s\n", error_get_pretty(err));
--            error_free(err);
--            vnc_client_error(vs);
--            return 0;
--        }
-+            if (vs->ioc_tag) {
-+                g_source_remove(vs->ioc_tag);
-+                vs->ioc_tag = 0;
-+            }
--        qio_channel_set_name(QIO_CHANNEL(tls), "vnc-server-tls");
--        VNC_DEBUG("Start TLS VeNCrypt handshake process\n");
--        object_unref(OBJECT(vs->ioc));
--        vs->ioc = QIO_CHANNEL(tls);
--        vs->tls = qio_channel_tls_get_session(tls);
-+            tls = qio_channel_tls_new_server(
-+                vs->ioc,
-+                vs->vd->tlscreds,
-+                vs->vd->tlsaclname,
-+                &err);
-+            if (!tls) {
-+                VNC_DEBUG("Failed to setup TLS %s\n", error_get_pretty(err));
-+                error_free(err);
-+                vnc_client_error(vs);
-+                return 0;
-+                vs->tls = qcrypto_tls_session_new(vs->vd->tlscreds,
-+                                                  NULL,
-+                                                  vs->vd->tlsaclname,
-+                                                  QCRYPTO_TLS_CREDS_ENDPOINT_SERVER,
-+                                                  &err);
-+                if (!vs->tls) {
-+                    VNC_DEBUG("Failed to setup TLS %s\n",
-+                              error_get_pretty(err));
-+                    error_free(err);
-+                    vnc_client_error(vs);
-+                    return 0;
-+                }
-+            }
-+            qio_channel_set_name(QIO_CHANNEL(tls), "vnc-server-tls");
--        qio_channel_tls_handshake(tls,
--                                  vnc_tls_handshake_done,
--                                  vs,
--                                  NULL);
-+            VNC_DEBUG("Start TLS VeNCrypt handshake process\n");
-+            object_unref(OBJECT(vs->ioc));
-+            vs->ioc = QIO_CHANNEL(tls);
-+            vs->tls = qio_channel_tls_get_session(tls);
-+
-+            qio_channel_tls_handshake(tls,
-+                                      vnc_tls_handshake_done,
-+                                      vs,
-+                                      NULL);
-+        }
-     }
-     return 0;
- }
-@@ -140,10 +271,11 @@ static int protocol_client_vencrypt_init(VncState *vs, uint8_t *data, size_t len
-         vnc_flush(vs);
-         vnc_client_error(vs);
-     } else {
--        VNC_DEBUG("Sending allowed auth %d\n", vs->subauth);
-+        VNC_DEBUG("Sending allowed auths %d %d\n", vs->subauth, VNC_AUTH_VENCRYPT_PLAIN);
-         vnc_write_u8(vs, 0); /* Accept version */
--        vnc_write_u8(vs, 1); /* Number of sub-auths */
-+        vnc_write_u8(vs, 2); /* Number of sub-auths */
-         vnc_write_u32(vs, vs->subauth); /* The supported auth */
-+        vnc_write_u32(vs, VNC_AUTH_VENCRYPT_PLAIN); /* Alternative supported auth */
-         vnc_flush(vs);
-         vnc_read_when(vs, protocol_client_vencrypt_auth, 4);
-     }
-diff --git a/ui/vnc.c b/ui/vnc.c
-index eb9420e830..2710614a72 100644
---- a/ui/vnc.c
-+++ b/ui/vnc.c
-@@ -56,6 +56,125 @@ static const struct timeval VNC_REFRESH_LOSSY = { 2, 0 };
- #include "vnc_keysym.h"
- #include "crypto/cipher.h"
-+static int pve_vmid = 0;
-+
-+void pve_auth_setup(int vmid) {
-+      pve_vmid = vmid;
-+}
-+
-+static char *
-+urlencode(char *buf, const char *value)
-+{
-+      static const char *hexchar = "0123456789abcdef";
-+      char *p = buf;
-+      int i;
-+      int l = strlen(value);
-+      for (i = 0; i < l; i++) {
-+              char c = value[i];
-+              if (('a' <= c && c <= 'z') ||
-+                  ('A' <= c && c <= 'Z') ||
-+                  ('0' <= c && c <= '9')) {
-+                      *p++ = c;
-+              } else if (c == 32) {
-+                      *p++ = '+';
-+              } else {
-+                      *p++ = '%';
-+                      *p++ = hexchar[c >> 4];
-+                      *p++ = hexchar[c & 15];
-+              }
-+      }
-+      *p = 0;
-+
-+      return p;
-+}
-+
-+int
-+pve_auth_verify(const char *clientip, const char *username, const char *passwd)
-+{
-+      struct sockaddr_in server;
-+
-+      int sfd = socket(AF_INET, SOCK_STREAM, 0);
-+      if (sfd == -1) {
-+              perror("pve_auth_verify: socket failed");
-+              return -1;
-+      }
-+
-+      struct hostent *he;
-+      if ((he = gethostbyname("localhost")) == NULL) {
-+              fprintf(stderr, "pve_auth_verify: error resolving hostname\n");
-+              goto err;
-+      }
-+
-+      memcpy(&server.sin_addr, he->h_addr_list[0], he->h_length);
-+      server.sin_family = AF_INET;
-+      server.sin_port = htons(85);
-+
-+      if (connect(sfd, (struct sockaddr *)&server, sizeof(server))) {
-+              perror("pve_auth_verify: error connecting to server");
-+              goto err;
-+      }
-+
-+      char buf[8192];
-+      char form[8192];
-+
-+      char *p = form;
-+      p = urlencode(p, "username");
-+      *p++ = '=';
-+      p = urlencode(p, username);
-+
-+      *p++ = '&';
-+      p = urlencode(p, "password");
-+      *p++ = '=';
-+      p = urlencode(p, passwd);
-+
-+      *p++ = '&';
-+      p = urlencode(p, "path");
-+      *p++ = '=';
-+      char authpath[256];
-+      sprintf(authpath, "/vms/%d", pve_vmid);
-+      p = urlencode(p, authpath);
-+
-+      *p++ = '&';
-+      p = urlencode(p, "privs");
-+      *p++ = '=';
-+      p = urlencode(p, "VM.Console");
-+
-+      sprintf(buf, "POST /api2/json/access/ticket HTTP/1.1\n"
-+              "Host: localhost:85\n"
-+              "Connection: close\n"
-+              "PVEClientIP: %s\n"
-+              "Content-Type: application/x-www-form-urlencoded\n"
-+              "Content-Length: %zd\n\n%s\n", clientip, strlen(form), form);
-+      ssize_t len = strlen(buf);
-+      ssize_t sb = send(sfd, buf, len, 0);
-+      if (sb < 0) {
-+              perror("pve_auth_verify: send failed");
-+              goto err;
-+      }
-+      if (sb != len) {
-+              fprintf(stderr, "pve_auth_verify: partial send error\n");
-+              goto err;
-+      }
-+
-+      len = recv(sfd, buf, sizeof(buf) - 1, 0);
-+      if (len < 0) {
-+              perror("pve_auth_verify: recv failed");
-+              goto err;
-+      }
-+
-+      buf[len] = 0;
-+
-+      //printf("DATA:%s\n", buf);
-+
-+      shutdown(sfd, SHUT_RDWR);
-+
-+      return strncmp(buf, "HTTP/1.1 200 OK", 15);
-+
-+err:
-+      shutdown(sfd, SHUT_RDWR);
-+      return -1;
-+}
-+
- static QTAILQ_HEAD(, VncDisplay) vnc_displays =
-     QTAILQ_HEAD_INITIALIZER(vnc_displays);
-@@ -3356,10 +3475,16 @@ vnc_display_setup_auth(int *auth,
-         if (password) {
-             if (is_x509) {
-                 VNC_DEBUG("Initializing VNC server with x509 password auth\n");
--                *subauth = VNC_AUTH_VENCRYPT_X509VNC;
-+                if (tlscreds->pve)
-+                    *subauth = VNC_AUTH_VENCRYPT_X509PLAIN;
-+                else
-+                    *subauth = VNC_AUTH_VENCRYPT_X509VNC;
-             } else {
-                 VNC_DEBUG("Initializing VNC server with TLS password auth\n");
--                *subauth = VNC_AUTH_VENCRYPT_TLSVNC;
-+                if (tlscreds->pve)
-+                    *subauth = VNC_AUTH_VENCRYPT_TLSPLAIN;
-+                else
-+                    *subauth = VNC_AUTH_VENCRYPT_TLSVNC;
-             }
-         } else if (sasl) {
-@@ -3393,6 +3518,7 @@ vnc_display_create_creds(bool x509,
-                          bool x509verify,
-                          const char *dir,
-                          const char *id,
-+                         bool pve,
-                          Error **errp)
- {
-     gchar *credsid = g_strdup_printf("tlsvnc%s", id);
-@@ -3408,6 +3534,7 @@ vnc_display_create_creds(bool x509,
-                                       "endpoint", "server",
-                                       "dir", dir,
-                                       "verify-peer", x509verify ? "yes" : "no",
-+                                      "pve", pve ? "yes" : "no",
-                                       NULL);
-     } else {
-         creds = object_new_with_props(TYPE_QCRYPTO_TLS_CREDS_ANON,
-@@ -3415,6 +3542,7 @@ vnc_display_create_creds(bool x509,
-                                       credsid,
-                                       &err,
-                                       "endpoint", "server",
-+                                      "pve", pve ? "yes" : "no",
-                                       NULL);
-     }
-@@ -3879,12 +4007,17 @@ void vnc_display_open(const char *id, Error **errp)
-         }
-     } else {
-         const char *path;
--        bool tls = false, x509 = false, x509verify = false;
-+        bool tls = false, x509 = false, x509verify = false, pve = false;
-         tls  = qemu_opt_get_bool(opts, "tls", false);
-         path = qemu_opt_get(opts, "x509");
-         if (tls || path) {
-             if (path) {
-                 x509 = true;
-+                if (!strcmp(path, "on")) {
-+                    /* magic to default to /etc/pve */
-+                    path = "/etc/pve";
-+                    pve = true;
-+                }
-             } else {
-                 path = qemu_opt_get(opts, "x509verify");
-                 if (path) {
-@@ -3896,6 +4029,7 @@ void vnc_display_open(const char *id, Error **errp)
-                                                     x509verify,
-                                                     path,
-                                                     vd->id,
-+                                                    pve,
-                                                     errp);
-             if (!vd->tlscreds) {
-                 goto fail;
-diff --git a/ui/vnc.h b/ui/vnc.h
-index 694cf32ca9..78d622ab84 100644
---- a/ui/vnc.h
-+++ b/ui/vnc.h
-@@ -284,6 +284,8 @@ struct VncState
-     int auth;
-     int subauth; /* Used by VeNCrypt */
-     char challenge[VNC_AUTH_CHALLENGE_SIZE];
-+    int username_len;
-+    int password_len;
-     QCryptoTLSSession *tls; /* Borrowed pointer from channel, don't free */
- #ifdef CONFIG_VNC_SASL
-     VncStateSASL sasl;
-@@ -577,4 +579,6 @@ int vnc_zrle_send_framebuffer_update(VncState *vs, int x, int y, int w, int h);
- int vnc_zywrle_send_framebuffer_update(VncState *vs, int x, int y, int w, int h);
- void vnc_zrle_clear(VncState *vs);
-+int pve_auth_verify(const char *clientip, const char *username, const char *passwd);
-+
- #endif /* QEMU_VNC_H */
-diff --git a/vl.c b/vl.c
-index d0780a41b4..2496b066b7 100644
---- a/vl.c
-+++ b/vl.c
-@@ -2947,6 +2947,7 @@ static int qemu_read_default_config_file(void)
- int main(int argc, char **argv, char **envp)
- {
-     int i;
-+    long int vm_id_long = 0;
-     int snapshot, linux_boot;
-     const char *initrd_filename;
-     const char *kernel_filename, *kernel_cmdline;
-@@ -3774,6 +3775,14 @@ int main(int argc, char **argv, char **envp)
-                     exit(1);
-                 }
-                 break;
-+            case QEMU_OPTION_id:
-+                vm_id_long = strtol(optarg, (char **) &optarg, 10);
-+                if (*optarg != 0 || vm_id_long < 100 || vm_id_long > INT_MAX) {
-+                    fprintf(stderr, "Invalid ID\n");
-+                    exit(1);
-+                }
-+                pve_auth_setup(vm_id_long);
-+                break;
-             case QEMU_OPTION_vnc:
-                 vnc_parse(optarg, &error_fatal);
-                 break;
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0031-vma-writer-don-t-bail-out-on-zero-length-files.patch b/debian/patches/pve/0031-vma-writer-don-t-bail-out-on-zero-length-files.patch
deleted file mode 100644 (file)
index 5e52165..0000000
+++ /dev/null
@@ -1,24 +0,0 @@
-From d79bc8c38a8672f894ad20ffed3529b66560c818 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Mon, 8 Feb 2016 08:23:34 +0100
-Subject: [PATCH 31/49] vma-writer: don't bail out on zero-length files
-
----
- vma-writer.c | 1 -
- 1 file changed, 1 deletion(-)
-
-diff --git a/vma-writer.c b/vma-writer.c
-index 0dd668b257..70dcca0771 100644
---- a/vma-writer.c
-+++ b/vma-writer.c
-@@ -130,7 +130,6 @@ int vma_writer_add_config(VmaWriter *vmaw, const char *name, gpointer data,
-     assert(vmaw->config_count < VMA_MAX_CONFIGS);
-     assert(name);
-     assert(data);
--    assert(len);
-     gchar *basename = g_path_get_basename(name);
-     uint32_t name_ptr = allocate_header_string(vmaw, basename);
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0032-vma-better-driver-guessing-for-bdrv_open.patch b/debian/patches/pve/0032-vma-better-driver-guessing-for-bdrv_open.patch
deleted file mode 100644 (file)
index 2cb14e1..0000000
+++ /dev/null
@@ -1,42 +0,0 @@
-From 81e295744d016824a5c756bfc954c63f5a249b5f Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Tue, 23 Feb 2016 15:48:41 +0100
-Subject: [PATCH 32/49] vma: better driver guessing for bdrv_open
-
-Only use 'raw' when the file actually ends with .raw and
-no protocol has been specified. With protocol pass the
-BDRV_O_PROTOCOL flag to tell bdrv_fill_options() to take it
-into account.
----
- vma.c | 15 ++++++++++++++-
- 1 file changed, 14 insertions(+), 1 deletion(-)
-
-diff --git a/vma.c b/vma.c
-index c7c05385f6..4903568fb4 100644
---- a/vma.c
-+++ b/vma.c
-@@ -294,7 +294,20 @@ static int extract_content(int argc, char **argv)
-             }
-             BlockDriverState *bs = bdrv_new();
--            if (errp || bdrv_open(&bs, devfn, NULL, NULL, flags, &errp)) {
-+
-+          size_t devlen = strlen(devfn);
-+          bool protocol = path_has_protocol(devfn);
-+          QDict *options = NULL;
-+          if (devlen > 4 && strcmp(devfn+devlen-4, ".raw") == 0 && !protocol) {
-+              /* explicit raw format */
-+              options = qdict_new();
-+              qdict_put(options, "driver", qstring_from_str("raw"));
-+          } else if (protocol) {
-+              /* tell bdrv_open to honor the protocol */
-+              flags |= BDRV_O_PROTOCOL;
-+          }
-+
-+          if (errp || bdrv_open(&bs, devfn, NULL, options, flags, &errp)) {
-                 g_error("can't open file %s - %s", devfn,
-                         error_get_pretty(errp));
-             }
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0033-block-add-the-zeroinit-block-driver-filter.patch b/debian/patches/pve/0033-block-add-the-zeroinit-block-driver-filter.patch
deleted file mode 100644 (file)
index 3171576..0000000
+++ /dev/null
@@ -1,251 +0,0 @@
-From bdaf742bcf995c0c3f73b2e61d34b8a85199f472 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Thu, 17 Mar 2016 11:33:37 +0100
-Subject: [PATCH 33/49] block: add the zeroinit block driver filter
-
----
- block/Makefile.objs |   1 +
- block/zeroinit.c    | 219 ++++++++++++++++++++++++++++++++++++++++++++++++++++
- 2 files changed, 220 insertions(+)
- create mode 100644 block/zeroinit.c
-
-diff --git a/block/Makefile.objs b/block/Makefile.objs
-index de96f8ee80..8cdac08db5 100644
---- a/block/Makefile.objs
-+++ b/block/Makefile.objs
-@@ -4,6 +4,7 @@ block-obj-y += qed.o qed-gencb.o qed-l2-cache.o qed-table.o qed-cluster.o
- block-obj-y += qed-check.o
- block-obj-y += vhdx.o vhdx-endian.o vhdx-log.o
- block-obj-y += quorum.o
-+block-obj-y += zeroinit.o
- block-obj-y += parallels.o blkdebug.o blkverify.o blkreplay.o
- block-obj-y += block-backend.o snapshot.o qapi.o
- block-obj-$(CONFIG_WIN32) += file-win32.o win32-aio.o
-diff --git a/block/zeroinit.c b/block/zeroinit.c
-new file mode 100644
-index 0000000000..0a8c7f9622
---- /dev/null
-+++ b/block/zeroinit.c
-@@ -0,0 +1,219 @@
-+/*
-+ * Filter to fake a zero-initialized block device.
-+ *
-+ * Copyright (c) 2016 Wolfgang Bumiller <w.bumiller@proxmox.com>
-+ * Copyright (c) 2016 Proxmox Server Solutions GmbH
-+ *
-+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
-+ * See the COPYING file in the top-level directory.
-+ */
-+
-+#include "qemu/osdep.h"
-+#include "qapi/error.h"
-+#include "block/block_int.h"
-+#include "qapi/qmp/qdict.h"
-+#include "qapi/qmp/qstring.h"
-+#include "qemu/cutils.h"
-+
-+typedef struct {
-+    bool has_zero_init;
-+    int64_t extents;
-+} BDRVZeroinitState;
-+
-+/* Valid blkverify filenames look like blkverify:path/to/raw_image:path/to/image */
-+static void zeroinit_parse_filename(const char *filename, QDict *options,
-+                                     Error **errp)
-+{
-+    QString *raw_path;
-+
-+    /* Parse the blkverify: prefix */
-+    if (!strstart(filename, "zeroinit:", &filename)) {
-+        /* There was no prefix; therefore, all options have to be already
-+           present in the QDict (except for the filename) */
-+        return;
-+    }
-+
-+    raw_path = qstring_from_str(filename);
-+    qdict_put(options, "x-next", raw_path);
-+}
-+
-+static QemuOptsList runtime_opts = {
-+    .name = "zeroinit",
-+    .head = QTAILQ_HEAD_INITIALIZER(runtime_opts.head),
-+    .desc = {
-+        {
-+            .name = "x-next",
-+            .type = QEMU_OPT_STRING,
-+            .help = "[internal use only, will be removed]",
-+        },
-+        {
-+            .name = "x-zeroinit",
-+            .type = QEMU_OPT_BOOL,
-+            .help = "set has_initialized_zero flag",
-+        },
-+        { /* end of list */ }
-+    },
-+};
-+
-+static int zeroinit_open(BlockDriverState *bs, QDict *options, int flags,
-+                          Error **errp)
-+{
-+    BDRVZeroinitState *s = bs->opaque;
-+    QemuOpts *opts;
-+    Error *local_err = NULL;
-+    int ret;
-+
-+    s->extents = 0;
-+
-+    opts = qemu_opts_create(&runtime_opts, NULL, 0, &error_abort);
-+    qemu_opts_absorb_qdict(opts, options, &local_err);
-+    if (local_err) {
-+        error_propagate(errp, local_err);
-+        ret = -EINVAL;
-+        goto fail;
-+    }
-+
-+    /* Open the raw file */
-+    bs->file = bdrv_open_child(qemu_opt_get(opts, "x-next"), options, "next",
-+                               bs, &child_file, false, &local_err);
-+    if (local_err) {
-+        ret = -EINVAL;
-+        error_propagate(errp, local_err);
-+        goto fail;
-+    }
-+
-+    /* set the options */
-+    s->has_zero_init = qemu_opt_get_bool(opts, "x-zeroinit", true);
-+
-+    ret = 0;
-+fail:
-+    if (ret < 0) {
-+        bdrv_unref_child(bs, bs->file);
-+    }
-+    qemu_opts_del(opts);
-+    return ret;
-+}
-+
-+static void zeroinit_close(BlockDriverState *bs)
-+{
-+    BDRVZeroinitState *s = bs->opaque;
-+    (void)s;
-+}
-+
-+static int64_t zeroinit_getlength(BlockDriverState *bs)
-+{
-+    return bdrv_getlength(bs->file->bs);
-+}
-+
-+static BlockAIOCB *zeroinit_aio_readv(BlockDriverState *bs,
-+        int64_t sector_num, QEMUIOVector *qiov, int nb_sectors,
-+        BlockCompletionFunc *cb, void *opaque)
-+{
-+    return bdrv_aio_readv(bs->file, sector_num, qiov, nb_sectors,
-+                          cb, opaque);
-+}
-+
-+static int coroutine_fn zeroinit_co_pwrite_zeroes(BlockDriverState *bs, int64_t offset,
-+                                                 int count, BdrvRequestFlags flags)
-+{
-+    BDRVZeroinitState *s = bs->opaque;
-+    if (offset >= s->extents)
-+        return 0;
-+    return bdrv_pwrite_zeroes(bs->file, offset, count, flags);
-+}
-+
-+static BlockAIOCB *zeroinit_aio_writev(BlockDriverState *bs,
-+        int64_t sector_num, QEMUIOVector *qiov, int nb_sectors,
-+        BlockCompletionFunc *cb, void *opaque)
-+{
-+    BDRVZeroinitState *s = bs->opaque;
-+    int64_t extents = (sector_num << BDRV_SECTOR_BITS) + ((nb_sectors + 1) << BDRV_SECTOR_BITS);
-+    if (extents > s->extents)
-+        s->extents = extents;
-+    return bdrv_aio_writev(bs->file, sector_num, qiov, nb_sectors,
-+                           cb, opaque);
-+}
-+
-+static BlockAIOCB *zeroinit_aio_flush(BlockDriverState *bs,
-+                                       BlockCompletionFunc *cb,
-+                                       void *opaque)
-+{
-+    return bdrv_aio_flush(bs->file->bs, cb, opaque);
-+}
-+
-+static bool zeroinit_recurse_is_first_non_filter(BlockDriverState *bs,
-+                                                  BlockDriverState *candidate)
-+{
-+    return bdrv_recurse_is_first_non_filter(bs->file->bs, candidate);
-+}
-+
-+static coroutine_fn int zeroinit_co_flush(BlockDriverState *bs)
-+{
-+    return bdrv_co_flush(bs->file->bs);
-+}
-+
-+static int zeroinit_has_zero_init(BlockDriverState *bs)
-+{
-+    BDRVZeroinitState *s = bs->opaque;
-+    return s->has_zero_init;
-+}
-+
-+static int64_t coroutine_fn zeroinit_co_get_block_status(BlockDriverState *bs,
-+                                                         int64_t sector_num,
-+                                                         int nb_sectors, int *pnum,
-+                                                         BlockDriverState **file)
-+{
-+    return bdrv_get_block_status(bs->file->bs, sector_num, nb_sectors, pnum, file);
-+}
-+
-+static int coroutine_fn zeroinit_co_pdiscard(BlockDriverState *bs,
-+                                             int64_t offset, int count)
-+{
-+    return bdrv_co_pdiscard(bs->file->bs, offset, count);
-+}
-+
-+static int zeroinit_truncate(BlockDriverState *bs, int64_t offset)
-+{
-+    return bdrv_truncate(bs->file, offset);
-+}
-+
-+static int zeroinit_get_info(BlockDriverState *bs, BlockDriverInfo *bdi)
-+{
-+    return bdrv_get_info(bs->file->bs, bdi);
-+}
-+
-+static BlockDriver bdrv_zeroinit = {
-+    .format_name                      = "zeroinit",
-+    .protocol_name                    = "zeroinit",
-+    .instance_size                    = sizeof(BDRVZeroinitState),
-+
-+    .bdrv_parse_filename              = zeroinit_parse_filename,
-+    .bdrv_file_open                   = zeroinit_open,
-+    .bdrv_close                       = zeroinit_close,
-+    .bdrv_getlength                   = zeroinit_getlength,
-+    .bdrv_co_flush_to_disk            = zeroinit_co_flush,
-+
-+    .bdrv_co_pwrite_zeroes            = zeroinit_co_pwrite_zeroes,
-+    .bdrv_aio_writev                  = zeroinit_aio_writev,
-+    .bdrv_aio_readv                   = zeroinit_aio_readv,
-+    .bdrv_aio_flush                   = zeroinit_aio_flush,
-+
-+    .is_filter                        = true,
-+    .bdrv_recurse_is_first_non_filter = zeroinit_recurse_is_first_non_filter,
-+
-+    .bdrv_has_zero_init = zeroinit_has_zero_init,
-+
-+    .bdrv_co_get_block_status = zeroinit_co_get_block_status,
-+
-+    .bdrv_co_pdiscard = zeroinit_co_pdiscard,
-+
-+    .bdrv_truncate = zeroinit_truncate,
-+    .bdrv_get_info = zeroinit_get_info,
-+};
-+
-+static void bdrv_zeroinit_init(void)
-+{
-+    bdrv_register(&bdrv_zeroinit);
-+}
-+
-+block_init(bdrv_zeroinit_init);
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0034-vma-add-format-option-to-device-mapping.patch b/debian/patches/pve/0034-vma-add-format-option-to-device-mapping.patch
deleted file mode 100644 (file)
index 2901e0e..0000000
+++ /dev/null
@@ -1,108 +0,0 @@
-From 17e81056ca6835c3b800db8b62f093c7f7571d49 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Tue, 12 Apr 2016 13:49:44 +0200
-Subject: [PATCH 34/49] vma: add format option to device mapping
-
-The BDRV_O_PROTOCOL option breaks non-raw protocol devices,
-so we instead now allow the format to be explicitly
-specified from the outside.
-
-In other words we now too deprecate the automatic guessing
-of raw formats, just like qemu already does, and have to
-silence the warnings by passing the drive mapping.
----
- vma.c | 34 +++++++++++++++++++++++++++-------
- 1 file changed, 27 insertions(+), 7 deletions(-)
-
-diff --git a/vma.c b/vma.c
-index 4903568fb4..f71e5a5933 100644
---- a/vma.c
-+++ b/vma.c
-@@ -131,6 +131,7 @@ static int list_content(int argc, char **argv)
- typedef struct RestoreMap {
-     char *devname;
-     char *path;
-+    char *format;
-     bool write_zero;
- } RestoreMap;
-@@ -218,13 +219,24 @@ static int extract_content(int argc, char **argv)
-                 }
-             }
-+            char *format = NULL;
-+            if (strncmp(line, "format=", sizeof("format=")-1) == 0) {
-+                format = line + sizeof("format=")-1;
-+                char *colon = strchr(format, ':');
-+                if (!colon) {
-+                    g_error("read map failed - found only a format ('%s')", inbuf);
-+                }
-+                format = g_strndup(format, colon - format);
-+                line = colon+1;
-+            }
-+
-             const char *path;
-             bool write_zero;
-             if (line[0] == '0' && line[1] == ':') {
--                path = inbuf + 2;
-+                path = line + 2;
-                 write_zero = false;
-             } else if (line[0] == '1' && line[1] == ':') {
--                path = inbuf + 2;
-+                path = line + 2;
-                 write_zero = true;
-             } else {
-                 g_error("read map failed - parse error ('%s')", inbuf);
-@@ -240,6 +252,7 @@ static int extract_content(int argc, char **argv)
-             RestoreMap *map = g_new0(RestoreMap, 1);
-             map->devname = g_strdup(devname);
-             map->path = g_strdup(path);
-+            map->format = format;
-             map->write_zero = write_zero;
-             g_hash_table_insert(devmap, map->devname, map);
-@@ -264,6 +277,7 @@ static int extract_content(int argc, char **argv)
-             g_free(statefn);
-         } else if (di) {
-             char *devfn = NULL;
-+            const char *format = NULL;
-             int flags = BDRV_O_RDWR;
-             bool write_zero = true;
-@@ -274,6 +288,7 @@ static int extract_content(int argc, char **argv)
-                     g_error("no device name mapping for %s", di->devname);
-                 }
-                 devfn = map->path;
-+                format = map->format;
-                 write_zero = map->write_zero;
-             } else {
-                 devfn = g_strdup_printf("%s/tmp-disk-%s.raw",
-@@ -296,15 +311,20 @@ static int extract_content(int argc, char **argv)
-             BlockDriverState *bs = bdrv_new();
-           size_t devlen = strlen(devfn);
--          bool protocol = path_has_protocol(devfn);
-           QDict *options = NULL;
--          if (devlen > 4 && strcmp(devfn+devlen-4, ".raw") == 0 && !protocol) {
-+            if (format) {
-+                /* explicit format from commandline */
-+                options = qdict_new();
-+                qdict_put(options, "driver", qstring_from_str(format));
-+            } else if ((devlen > 4 && strcmp(devfn+devlen-4, ".raw") == 0) ||
-+                     strncmp(devfn, "/dev/", 5) == 0)
-+          {
-+                /* This part is now deprecated for PVE as well (just as qemu
-+                 * deprecated not specifying an explicit raw format, too.
-+                 */
-               /* explicit raw format */
-               options = qdict_new();
-               qdict_put(options, "driver", qstring_from_str("raw"));
--          } else if (protocol) {
--              /* tell bdrv_open to honor the protocol */
--              flags |= BDRV_O_PROTOCOL;
-           }
-           if (errp || bdrv_open(&bs, devfn, NULL, options, flags, &errp)) {
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0035-fix-possible-unitialised-return-value.patch b/debian/patches/pve/0035-fix-possible-unitialised-return-value.patch
deleted file mode 100644 (file)
index bf6b979..0000000
+++ /dev/null
@@ -1,25 +0,0 @@
-From 2727cb752e676e4ef0b9364036879212210cf641 Mon Sep 17 00:00:00 2001
-From: Thomas Lamprecht <t.lamprecht@proxmox.com>
-Date: Wed, 6 Apr 2016 16:45:15 +0200
-Subject: [PATCH 35/49] fix possible unitialised return value
-
----
- migration/savevm.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/migration/savevm.c b/migration/savevm.c
-index feb0dc6834..d2615f4620 100644
---- a/migration/savevm.c
-+++ b/migration/savevm.c
-@@ -1111,7 +1111,7 @@ int qemu_savevm_state_complete_precopy(QEMUFile *f, bool iterable_only)
-     QJSON *vmdesc;
-     int vmdesc_len;
-     SaveStateEntry *se;
--    int ret;
-+    int ret = -1;
-     bool in_postcopy = migration_in_postcopy(migrate_get_current());
-     trace_savevm_state_complete_precopy();
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0036-vnc-refactor-to-QIOChannelSocket.patch b/debian/patches/pve/0036-vnc-refactor-to-QIOChannelSocket.patch
deleted file mode 100644 (file)
index b9ef476..0000000
+++ /dev/null
@@ -1,87 +0,0 @@
-From dd70c07d8a666f0046a88626249b2567acdc1c26 Mon Sep 17 00:00:00 2001
-From: Thomas Lamprecht <t.lamprecht@proxmox.com>
-Date: Wed, 6 Apr 2016 16:47:54 +0200
-Subject: [PATCH 36/49] vnc: refactor to QIOChannelSocket
-
----
- ui/vnc-auth-vencrypt.c | 31 ++++++++++++++++---------------
- 1 file changed, 16 insertions(+), 15 deletions(-)
-
-diff --git a/ui/vnc-auth-vencrypt.c b/ui/vnc-auth-vencrypt.c
-index de1c1949ba..594ca737a9 100644
---- a/ui/vnc-auth-vencrypt.c
-+++ b/ui/vnc-auth-vencrypt.c
-@@ -28,27 +28,23 @@
- #include "vnc.h"
- #include "qapi/error.h"
- #include "qemu/main-loop.h"
--#include "qemu/sockets.h"
-+#include "io/channel-socket.h"
- static int protocol_client_auth_plain(VncState *vs, uint8_t *data, size_t len)
- {
--      const char *err = NULL;
-+      Error *err = NULL;
-       char username[256];
-       char passwd[512];
--      char clientip[256];
--      clientip[0] = 0;
--      struct sockaddr_in client;
--      socklen_t addrlen = sizeof(client);
--      if (getpeername(vs->csock, &client, &addrlen) == 0) {
--              inet_ntop(client.sin_family, &client.sin_addr,
--                        clientip, sizeof(clientip));
-+      SocketAddress *clientip = qio_channel_socket_get_remote_address(vs->sioc, &err);
-+      if (err) {
-+          goto err;
-       }
-       if ((len != (vs->username_len + vs->password_len)) ||
-           (vs->username_len >= (sizeof(username)-1)) ||
-           (vs->password_len >= (sizeof(passwd)-1))    ) {
--              err = "Got unexpected data length";
-+              error_setg(&err, "Got unexpected data length");
-               goto err;
-       }
-@@ -59,26 +55,31 @@ static int protocol_client_auth_plain(VncState *vs, uint8_t *data, size_t len)
-       VNC_DEBUG("AUTH PLAIN username: %s pw: %s\n", username, passwd);
--      if (pve_auth_verify(clientip, username, passwd) == 0) {
-+      if (pve_auth_verify(clientip->u.inet.data->host, username, passwd) == 0) {
-               vnc_write_u32(vs, 0); /* Accept auth completion */
-               start_client_init(vs);
-+              qapi_free_SocketAddress(clientip);
-               return 0;
-       }
--      err =  "Authentication failed";
-+      error_setg(&err, "Authentication failed");
- err:
-        if (err) {
--             VNC_DEBUG("AUTH PLAIN ERROR: %s\n", err);
-+             const char *err_msg = error_get_pretty(err);
-+             VNC_DEBUG("AUTH PLAIN ERROR: %s\n", err_msg);
-              vnc_write_u32(vs, 1); /* Reject auth */
-              if (vs->minor >= 8) {
--                     int elen = strlen(err);
-+                     int elen = strlen(err_msg);
-                      vnc_write_u32(vs, elen);
--                     vnc_write(vs, err, elen);
-+                     vnc_write(vs, err_msg, elen);
-              }
-+             error_free(err);
-        }
-        vnc_flush(vs);
-        vnc_client_error(vs);
-+       qapi_free_SocketAddress(clientip);
-+
-        return 0;
- }
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0037-vma-use-BlockBackend-on-extract.patch b/debian/patches/pve/0037-vma-use-BlockBackend-on-extract.patch
deleted file mode 100644 (file)
index c6a817b..0000000
+++ /dev/null
@@ -1,75 +0,0 @@
-From ccc8208669d45d5442d5f0739ce1e6a158942ea3 Mon Sep 17 00:00:00 2001
-From: Thomas Lamprecht <t.lamprecht@proxmox.com>
-Date: Fri, 1 Jul 2016 15:47:29 +0200
-Subject: [PATCH 37/49] vma: use BlockBackend on extract
-
-As we else rely on bdrv_close_all() do clean up, which was rewritten
-in ca9bd24cf1d53775169ba9adc17e265554d1afed and fails on "dangling"
-BDS pointers, such a pointer exists with *bs.
-Use the BlockBackend to get our BDS and just unref the BlockBackend
-when done, it handles the rest for us.
-
-The other two calls to bdrv_close_all() happen in verify_content()
-and dump_config(), both do not have a BDS so no need to change here.
----
- vma.c | 13 ++++++++++---
- 1 file changed, 10 insertions(+), 3 deletions(-)
-
-diff --git a/vma.c b/vma.c
-index f71e5a5933..ad51090651 100644
---- a/vma.c
-+++ b/vma.c
-@@ -20,6 +20,7 @@
- #include "qemu/main-loop.h"
- #include "qapi/qmp/qstring.h"
- #include "sysemu/char.h" /* qstring_from_str */
-+#include "sysemu/block-backend.h"
- static void help(void)
- {
-@@ -264,6 +265,8 @@ static int extract_content(int argc, char **argv)
-     int vmstate_fd = -1;
-     guint8 vmstate_stream = 0;
-+    BlockBackend *blk = NULL;
-+
-     for (i = 1; i < 255; i++) {
-         VmaDeviceInfo *di = vma_reader_get_device_info(vmar, i);
-         if (di && (strcmp(di->devname, "vmstate") == 0)) {
-@@ -308,8 +311,6 @@ static int extract_content(int argc, char **argv)
-                 write_zero = false;
-             }
--            BlockDriverState *bs = bdrv_new();
--
-           size_t devlen = strlen(devfn);
-           QDict *options = NULL;
-             if (format) {
-@@ -327,10 +328,14 @@ static int extract_content(int argc, char **argv)
-               qdict_put(options, "driver", qstring_from_str("raw"));
-           }
--          if (errp || bdrv_open(&bs, devfn, NULL, options, flags, &errp)) {
-+
-+          if (errp || !(blk = blk_new_open(devfn, NULL, options, flags, &errp))) {
-                 g_error("can't open file %s - %s", devfn,
-                         error_get_pretty(errp));
-             }
-+
-+          BlockDriverState *bs = blk_bs(blk);
-+
-             if (vma_reader_register_bs(vmar, i, bs, write_zero, &errp) < 0) {
-                 g_error("%s", error_get_pretty(errp));
-             }
-@@ -363,6 +368,8 @@ static int extract_content(int argc, char **argv)
-     vma_reader_destroy(vmar);
-+    blk_unref(blk);
-+
-     bdrv_close_all();
-     return ret;
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0038-vma-byte-based-write-calls.patch b/debian/patches/pve/0038-vma-byte-based-write-calls.patch
deleted file mode 100644 (file)
index 56edb1e..0000000
+++ /dev/null
@@ -1,237 +0,0 @@
-From b6f11a95c56de227d2c66f4049ace7e01369c920 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Fri, 9 Sep 2016 14:51:28 +0200
-Subject: [PATCH 38/49] vma: byte based write calls
-
----
- vma-reader.c | 42 +++++++++++++++++++++---------------------
- vma.c        | 22 ++++++++++------------
- vma.h        |  2 +-
- 3 files changed, 32 insertions(+), 34 deletions(-)
-
-diff --git a/vma-reader.c b/vma-reader.c
-index 78f1de9499..2000889bd3 100644
---- a/vma-reader.c
-+++ b/vma-reader.c
-@@ -25,7 +25,7 @@
- static unsigned char zero_vma_block[VMA_BLOCK_SIZE];
- typedef struct VmaRestoreState {
--    BlockDriverState *bs;
-+    BlockBackend *target;
-     bool write_zeroes;
-     unsigned long *bitmap;
-     int bitmap_size;
-@@ -423,12 +423,12 @@ VmaDeviceInfo *vma_reader_get_device_info(VmaReader *vmar, guint8 dev_id)
- }
- static void allocate_rstate(VmaReader *vmar,  guint8 dev_id,
--                            BlockDriverState *bs, bool write_zeroes)
-+                            BlockBackend *target, bool write_zeroes)
- {
-     assert(vmar);
-     assert(dev_id);
--    vmar->rstate[dev_id].bs = bs;
-+    vmar->rstate[dev_id].target = target;
-     vmar->rstate[dev_id].write_zeroes = write_zeroes;
-     int64_t size = vmar->devinfo[dev_id].size;
-@@ -443,15 +443,15 @@ static void allocate_rstate(VmaReader *vmar,  guint8 dev_id,
-     vmar->cluster_count += size/VMA_CLUSTER_SIZE;
- }
--int vma_reader_register_bs(VmaReader *vmar, guint8 dev_id, BlockDriverState *bs,
-+int vma_reader_register_bs(VmaReader *vmar, guint8 dev_id, BlockBackend *target,
-                            bool write_zeroes, Error **errp)
- {
-     assert(vmar);
--    assert(bs != NULL);
-+    assert(target != NULL);
-     assert(dev_id);
--    assert(vmar->rstate[dev_id].bs == NULL);
-+    assert(vmar->rstate[dev_id].target == NULL);
--    int64_t size = bdrv_getlength(bs);
-+    int64_t size = blk_getlength(target);
-     int64_t size_diff = size - vmar->devinfo[dev_id].size;
-     /* storage types can have different size restrictions, so it
-@@ -465,7 +465,7 @@ int vma_reader_register_bs(VmaReader *vmar, guint8 dev_id, BlockDriverState *bs,
-         return -1;
-     }
--    allocate_rstate(vmar, dev_id, bs, write_zeroes);
-+    allocate_rstate(vmar, dev_id, target, write_zeroes);
-     return 0;
- }
-@@ -507,7 +507,7 @@ static size_t full_write(int fd, void *buf, size_t len)
- }
- static int restore_write_data(VmaReader *vmar, guint8 dev_id,
--                              BlockDriverState *bs, int vmstate_fd,
-+                              BlockBackend *target, int vmstate_fd,
-                               unsigned char *buf, int64_t sector_num,
-                               int nb_sectors, Error **errp)
- {
-@@ -523,10 +523,10 @@ static int restore_write_data(VmaReader *vmar, guint8 dev_id,
-             }
-         }
-     } else {
--        int res = bdrv_write(bs, sector_num, buf, nb_sectors);
-+        int res = blk_pwrite(target, sector_num * BDRV_SECTOR_SIZE, buf, nb_sectors * BDRV_SECTOR_SIZE, 0);
-         if (res < 0) {
--            error_setg(errp, "bdrv_write to %s failed (%d)",
--                       bdrv_get_device_name(bs), res);
-+            error_setg(errp, "blk_pwrite to %s failed (%d)",
-+                       bdrv_get_device_name(blk_bs(target)), res);
-             return -1;
-         }
-     }
-@@ -556,11 +556,11 @@ static int restore_extent(VmaReader *vmar, unsigned char *buf,
-         }
-         VmaRestoreState *rstate = &vmar->rstate[dev_id];
--        BlockDriverState *bs = NULL;
-+        BlockBackend *target = NULL;
-         if (dev_id != vmar->vmstate_stream) {
--            bs = rstate->bs;
--            if (!verify && !bs) {
-+            target = rstate->target;
-+            if (!verify && !target) {
-                 error_setg(errp, "got wrong dev id %d", dev_id);
-                 return -1;
-             }
-@@ -618,7 +618,7 @@ static int restore_extent(VmaReader *vmar, unsigned char *buf,
-             if (!verify) {
-                 int nb_sectors = end_sector - sector_num;
--                if (restore_write_data(vmar, dev_id, bs, vmstate_fd,
-+                if (restore_write_data(vmar, dev_id, target, vmstate_fd,
-                                        buf + start, sector_num, nb_sectors,
-                                        errp) < 0) {
-                     return -1;
-@@ -654,7 +654,7 @@ static int restore_extent(VmaReader *vmar, unsigned char *buf,
-                     if (!verify) {
-                         int nb_sectors = end_sector - sector_num;
--                        if (restore_write_data(vmar, dev_id, bs, vmstate_fd,
-+                        if (restore_write_data(vmar, dev_id, target, vmstate_fd,
-                                                buf + start, sector_num,
-                                                nb_sectors, errp) < 0) {
-                             return -1;
-@@ -678,7 +678,7 @@ static int restore_extent(VmaReader *vmar, unsigned char *buf,
-                         }
-                         if (rstate->write_zeroes && !verify) {
--                            if (restore_write_data(vmar, dev_id, bs, vmstate_fd,
-+                            if (restore_write_data(vmar, dev_id, target, vmstate_fd,
-                                                    zero_vma_block, sector_num,
-                                                    nb_sectors, errp) < 0) {
-                                 return -1;
-@@ -786,12 +786,12 @@ static int vma_reader_restore_full(VmaReader *vmar, int vmstate_fd,
-     int i;
-     for (i = 1; i < 256; i++) {
-         VmaRestoreState *rstate = &vmar->rstate[i];
--        if (!rstate->bs) {
-+        if (!rstate->target) {
-             continue;
-         }
--        if (bdrv_flush(rstate->bs) < 0) {
--            error_setg(errp, "vma bdrv_flush %s failed",
-+        if (blk_flush(rstate->target) < 0) {
-+            error_setg(errp, "vma blk_flush %s failed",
-                        vmar->devinfo[i].devname);
-             return -1;
-         }
-diff --git a/vma.c b/vma.c
-index ad51090651..aafdc2d7f5 100644
---- a/vma.c
-+++ b/vma.c
-@@ -334,9 +334,7 @@ static int extract_content(int argc, char **argv)
-                         error_get_pretty(errp));
-             }
--          BlockDriverState *bs = blk_bs(blk);
--
--            if (vma_reader_register_bs(vmar, i, bs, write_zero, &errp) < 0) {
-+            if (vma_reader_register_bs(vmar, i, blk, write_zero, &errp) < 0) {
-                 g_error("%s", error_get_pretty(errp));
-             }
-@@ -428,7 +426,7 @@ static int verify_content(int argc, char **argv)
- }
- typedef struct BackupJob {
--    BlockDriverState *bs;
-+    BlockBackend *target;
-     int64_t len;
-     VmaWriter *vmaw;
-     uint8_t dev_id;
-@@ -457,7 +455,7 @@ static void coroutine_fn backup_run(void *opaque)
-     int64_t start, end;
-     int ret = 0;
--    unsigned char *buf = qemu_blockalign(job->bs, VMA_CLUSTER_SIZE);
-+    unsigned char *buf = blk_blockalign(job->target, VMA_CLUSTER_SIZE);
-     start = 0;
-     end = DIV_ROUND_UP(job->len / BDRV_SECTOR_SIZE,
-@@ -468,8 +466,8 @@ static void coroutine_fn backup_run(void *opaque)
-         iov.iov_len = VMA_CLUSTER_SIZE;
-         qemu_iovec_init_external(&qiov, &iov, 1);
--        ret = bdrv_co_readv(job->bs, start * BACKUP_SECTORS_PER_CLUSTER,
--                            BACKUP_SECTORS_PER_CLUSTER, &qiov);
-+        ret = blk_co_preadv(job->target, start * BACKUP_SECTORS_PER_CLUSTER,
-+                            BACKUP_SECTORS_PER_CLUSTER, &qiov, 0);
-         if (ret < 0) {
-             vma_writer_set_error(job->vmaw, "read error", -1);
-             goto out;
-@@ -564,14 +562,14 @@ static int create_archive(int argc, char **argv)
-         path = extract_devname(path, &devname, devcount++);
-         Error *errp = NULL;
--        BlockDriverState *bs;
-+        BlockBackend *target;
--        bs = bdrv_open(path, NULL, NULL, 0, &errp);
--        if (!bs) {
-+        target = blk_new_open(path, NULL, NULL, 0, &errp);
-+        if (!target) {
-             unlink(archivename);
-             g_error("bdrv_open '%s' failed - %s", path, error_get_pretty(errp));
-         }
--        int64_t size = bdrv_getlength(bs);
-+        int64_t size = blk_getlength(target);
-         int dev_id = vma_writer_register_stream(vmaw, devname, size);
-         if (dev_id <= 0) {
-             unlink(archivename);
-@@ -580,7 +578,7 @@ static int create_archive(int argc, char **argv)
-         BackupJob *job = g_new0(BackupJob, 1);
-         job->len = size;
--        job->bs = bs;
-+        job->target = target;
-         job->vmaw = vmaw;
-         job->dev_id = dev_id;
-diff --git a/vma.h b/vma.h
-index 365ceb2bcb..fa6f4df7e7 100644
---- a/vma.h
-+++ b/vma.h
-@@ -140,7 +140,7 @@ VmaHeader *vma_reader_get_header(VmaReader *vmar);
- GList *vma_reader_get_config_data(VmaReader *vmar);
- VmaDeviceInfo *vma_reader_get_device_info(VmaReader *vmar, guint8 dev_id);
- int vma_reader_register_bs(VmaReader *vmar, guint8 dev_id,
--                           BlockDriverState *bs, bool write_zeroes,
-+                           BlockBackend *target, bool write_zeroes,
-                            Error **errp);
- int vma_reader_restore(VmaReader *vmar, int vmstate_fd, bool verbose,
-                        Error **errp);
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0039-rbd-disable-rbd_cache_writethrough_until_flush-with-.patch b/debian/patches/pve/0039-rbd-disable-rbd_cache_writethrough_until_flush-with-.patch
deleted file mode 100644 (file)
index e6143a5..0000000
+++ /dev/null
@@ -1,29 +0,0 @@
-From 26fafa2ddc6257bf3aa0ea0e19505e3f0108172d Mon Sep 17 00:00:00 2001
-From: Alexandre Derumier <aderumier@odiso.com>
-Date: Tue, 26 Jul 2016 16:51:00 +0200
-Subject: [PATCH 39/49] rbd: disable rbd_cache_writethrough_until_flush with
- cache=unsafe
-
-Signed-off-by: Alexandre Derumier <aderumier@odiso.com>
----
- block/rbd.c | 4 ++++
- 1 file changed, 4 insertions(+)
-
-diff --git a/block/rbd.c b/block/rbd.c
-index 1ceeeb5a60..30fe179585 100644
---- a/block/rbd.c
-+++ b/block/rbd.c
-@@ -623,6 +623,10 @@ static int qemu_rbd_open(BlockDriverState *bs, QDict *options, int flags,
-         rados_conf_set(s->cluster, "rbd_cache", "true");
-     }
-+    if (flags & BDRV_O_NO_FLUSH) {
-+      rados_conf_set(s->cluster, "rbd_cache_writethrough_until_flush", "false");
-+    }
-+
-     r = rados_connect(s->cluster);
-     if (r < 0) {
-         error_setg_errno(errp, -r, "error connecting");
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0040-enable-cache-unsafe-for-vma-extract_content-and-qmp_.patch b/debian/patches/pve/0040-enable-cache-unsafe-for-vma-extract_content-and-qmp_.patch
deleted file mode 100644 (file)
index 9d69954..0000000
+++ /dev/null
@@ -1,43 +0,0 @@
-From eba97a008e2b0eea7229ba0020b2910f147e545b Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Mon, 1 Aug 2016 10:52:46 +0200
-Subject: [PATCH 40/49] enable cache=unsafe for vma extract_content and
- qmp_savevm_start
-
-We don't send any flush here, so we need to open with cache=unsafe.
-
-Signed-off-by: Alexandre Derumier <aderumier@odiso.com>
----
- savevm-async.c | 2 +-
- vma.c          | 2 +-
- 2 files changed, 2 insertions(+), 2 deletions(-)
-
-diff --git a/savevm-async.c b/savevm-async.c
-index 6ac03af9c8..46c1be7887 100644
---- a/savevm-async.c
-+++ b/savevm-async.c
-@@ -253,7 +253,7 @@ void qmp_savevm_start(bool has_statefile, const char *statefile, Error **errp)
- {
-     Error *local_err = NULL;
--    int bdrv_oflags = BDRV_O_RDWR | BDRV_O_RESIZE;
-+    int bdrv_oflags = BDRV_O_RDWR | BDRV_O_RESIZE | BDRV_O_NO_FLUSH;
-     int ret;
-     if (snap_state.state != SAVE_STATE_DONE) {
-diff --git a/vma.c b/vma.c
-index aafdc2d7f5..4f55799533 100644
---- a/vma.c
-+++ b/vma.c
-@@ -281,7 +281,7 @@ static int extract_content(int argc, char **argv)
-         } else if (di) {
-             char *devfn = NULL;
-             const char *format = NULL;
--            int flags = BDRV_O_RDWR;
-+            int flags = BDRV_O_RDWR | BDRV_O_NO_FLUSH;
-             bool write_zero = true;
-             if (readmap) {
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0041-savevm-async-updates.patch b/debian/patches/pve/0041-savevm-async-updates.patch
deleted file mode 100644 (file)
index 29ebd7c..0000000
+++ /dev/null
@@ -1,215 +0,0 @@
-From 11d6573ad09a304b79c149c4f98e565f789b128d Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Fri, 9 Sep 2016 15:21:19 +0200
-Subject: [PATCH 41/49] savevm-async updates
-
----
- savevm-async.c | 79 +++++++++++++++++++++++++++++-----------------------------
- 1 file changed, 39 insertions(+), 40 deletions(-)
-
-diff --git a/savevm-async.c b/savevm-async.c
-index 46c1be7887..2f4766cf6c 100644
---- a/savevm-async.c
-+++ b/savevm-async.c
-@@ -20,6 +20,8 @@
- /* #define DEBUG_SAVEVM_STATE */
-+#define NOT_DONE 0x7fffffff /* used while emulated sync operation in progress */
-+
- #ifdef DEBUG_SAVEVM_STATE
- #define DPRINTF(fmt, ...) \
-     do { printf("savevm-async: " fmt, ## __VA_ARGS__); } while (0)
-@@ -38,7 +40,7 @@ enum {
- static struct SnapshotState {
--    BlockDriverState *bs;
-+    BlockBackend *target;
-     size_t bs_pos;
-     int state;
-     Error *error;
-@@ -99,17 +101,17 @@ static int save_snapshot_cleanup(void)
-         ret = qemu_fclose(snap_state.file);
-     }
--    if (snap_state.bs) {
-+    if (snap_state.target) {
-         /* try to truncate, but ignore errors (will fail on block devices).
-          * note: bdrv_read() need whole blocks, so we round up
-          */
-         size_t size = (snap_state.bs_pos + BDRV_SECTOR_SIZE) & BDRV_SECTOR_MASK;
--        bdrv_truncate(snap_state.bs, size);
--        bdrv_op_unblock_all(snap_state.bs, snap_state.blocker);
-+        blk_truncate(snap_state.target, size);
-+        blk_op_unblock_all(snap_state.target, snap_state.blocker);
-         error_free(snap_state.blocker);
-         snap_state.blocker = NULL;
--        bdrv_unref(snap_state.bs);
--        snap_state.bs = NULL;
-+        blk_unref(snap_state.target);
-+        snap_state.target = NULL;
-     }
-     return ret;
-@@ -151,21 +153,22 @@ static void save_snapshot_completed(void)
- static int block_state_close(void *opaque)
- {
-     snap_state.file = NULL;
--    return bdrv_flush(snap_state.bs);
-+    return blk_flush(snap_state.target);
- }
--static ssize_t block_state_put_buffer(void *opaque, const uint8_t *buf,
--                                      int64_t pos, size_t size)
-+static ssize_t block_state_writev_buffer(void *opaque, struct iovec *iov,
-+                                         int iovcnt, int64_t pos)
- {
--    ssize_t ret;
--
--    assert(pos == snap_state.bs_pos);
-+    int ret;
-+    QEMUIOVector qiov;
--    if ((ret = bdrv_pwrite(snap_state.bs, snap_state.bs_pos, buf, size)) > 0) {
--        snap_state.bs_pos += ret;
-+    qemu_iovec_init_external(&qiov, iov, iovcnt);
-+    ret = blk_co_pwritev(snap_state.target, pos, qiov.size, &qiov, 0);
-+    if (ret < 0) {
-+        return ret;
-     }
--
--    return ret;
-+    snap_state.bs_pos += qiov.size;
-+    return qiov.size;
- }
- static int store_and_stop(void) {
-@@ -227,7 +230,7 @@ static void process_savevm_co(void *opaque)
-         /* stop the VM if we get to the end of available space,
-          * or if pending_size is just a few MB
-          */
--        maxlen = bdrv_getlength(snap_state.bs) - 30*1024*1024;
-+        maxlen = blk_getlength(snap_state.target) - 30*1024*1024;
-         if ((pending_size < 100000) ||
-             ((snap_state.bs_pos + pending_size) >= maxlen)) {
-             if (store_and_stop())
-@@ -244,7 +247,7 @@ static void process_savevm_co(void *opaque)
- }
- static const QEMUFileOps block_file_ops = {
--    .put_buffer =     block_state_put_buffer,
-+    .writev_buffer =  block_state_writev_buffer,
-     .close =          block_state_close,
- };
-@@ -254,7 +257,6 @@ void qmp_savevm_start(bool has_statefile, const char *statefile, Error **errp)
-     Error *local_err = NULL;
-     int bdrv_oflags = BDRV_O_RDWR | BDRV_O_RESIZE | BDRV_O_NO_FLUSH;
--    int ret;
-     if (snap_state.state != SAVE_STATE_DONE) {
-         error_set(errp, ERROR_CLASS_GENERIC_ERROR,
-@@ -284,13 +286,11 @@ void qmp_savevm_start(bool has_statefile, const char *statefile, Error **errp)
-     }
-     /* Open the image */
--    snap_state.bs = bdrv_new();
-- 
-     QDict *options = NULL;
-     options = qdict_new();
-     qdict_put(options, "driver", qstring_from_str("raw"));
--    ret = bdrv_open(&snap_state.bs, statefile, NULL, options, bdrv_oflags, &local_err);
--    if (ret < 0) {
-+    snap_state.target = blk_new_open(statefile, NULL, options, bdrv_oflags, &local_err);
-+    if (!snap_state.target) {
-         error_set(errp, ERROR_CLASS_GENERIC_ERROR, "failed to open '%s'", statefile);
-         goto restart;
-     }
-@@ -304,9 +304,9 @@ void qmp_savevm_start(bool has_statefile, const char *statefile, Error **errp)
-     error_setg(&snap_state.blocker, "block device is in use by savevm");
--    bdrv_op_block_all(snap_state.bs, snap_state.blocker);
-+    blk_op_block_all(snap_state.target, snap_state.blocker);
--    Coroutine *co = qemu_coroutine_create(process_savevm_co);
-+    Coroutine *co = qemu_coroutine_create(process_savevm_co, NULL);
-     qemu_coroutine_enter(co);
-     return;
-@@ -457,8 +457,8 @@ void qmp_delete_drive_snapshot(const char *device, const char *name,
- static ssize_t loadstate_get_buffer(void *opaque, uint8_t *buf, int64_t pos,
-                                     size_t size)
- {
--    BlockDriverState *bs = (BlockDriverState *)opaque;
--    int64_t maxlen = bdrv_getlength(bs);
-+    BlockBackend *be = opaque;
-+    int64_t maxlen = blk_getlength(be);
-     if (pos > maxlen) {
-         return -EIO;
-     }
-@@ -468,7 +468,7 @@ static ssize_t loadstate_get_buffer(void *opaque, uint8_t *buf, int64_t pos,
-     if (size == 0) {
-         return 0;
-     }
--    return bdrv_pread(bs, pos, buf, size);
-+    return blk_pread(be, pos, buf, size);
- }
- static const QEMUFileOps loadstate_file_ops = {
-@@ -477,28 +477,27 @@ static const QEMUFileOps loadstate_file_ops = {
- int load_state_from_blockdev(const char *filename)
- {
--    BlockDriverState *bs = NULL;
-+    BlockBackend *be;
-     Error *local_err = NULL;
-     Error *blocker = NULL;
-     QEMUFile *f;
--    int ret;
-+    int ret = -EINVAL;
--    bs = bdrv_new();
--    ret = bdrv_open(&bs, filename, NULL, NULL, 0, &local_err);
--    error_setg(&blocker, "block device is in use by load state");
--    bdrv_op_block_all(bs, blocker);
-+    be = blk_new_open(filename, NULL, NULL, 0, &local_err);
--    if (ret < 0) {
-+    if (!be) {
-         error_report("Could not open VM state file");
-         goto the_end;
-     }
-+    error_setg(&blocker, "block device is in use by load state");
-+    blk_op_block_all(be, blocker);
-+
-     /* restore the VM state */
--    f = qemu_fopen_ops(bs, &loadstate_file_ops);
-+    f = qemu_fopen_ops(be, &loadstate_file_ops);
-     if (!f) {
-         error_report("Could not open VM state file");
--        ret = -EINVAL;
-         goto the_end;
-     }
-@@ -515,10 +514,10 @@ int load_state_from_blockdev(const char *filename)
-     ret = 0;
-  the_end:
--    if (bs) {
--        bdrv_op_unblock_all(bs, blocker);
-+    if (be) {
-+        blk_op_unblock_all(be, blocker);
-         error_free(blocker);
--        bdrv_unref(bs);
-+        blk_unref(be);
-     }
-     return ret;
- }
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0042-qmp_snapshot_drive-add-aiocontext.patch b/debian/patches/pve/0042-qmp_snapshot_drive-add-aiocontext.patch
deleted file mode 100644 (file)
index e63fdc2..0000000
+++ /dev/null
@@ -1,65 +0,0 @@
-From 26b8ed17e06e00b287352b95212d46ff4261e70b Mon Sep 17 00:00:00 2001
-From: Alexandre Derumier <aderumier@odiso.com>
-Date: Tue, 13 Sep 2016 01:57:56 +0200
-Subject: [PATCH 42/49] qmp_snapshot_drive: add aiocontext
-
-Signed-off-by: Alexandre Derumier <aderumier@odiso.com>
----
- savevm-async.c | 15 +++++++++++----
- 1 file changed, 11 insertions(+), 4 deletions(-)
-
-diff --git a/savevm-async.c b/savevm-async.c
-index 2f4766cf6c..5913a905d8 100644
---- a/savevm-async.c
-+++ b/savevm-async.c
-@@ -345,6 +345,7 @@ void qmp_snapshot_drive(const char *device, const char *name, Error **errp)
-     BlockBackend *blk;
-     BlockDriverState *bs;
-     QEMUSnapshotInfo sn1, *sn = &sn1;
-+    AioContext *aio_context;
-     int ret;
- #ifdef _WIN32
-     struct _timeb tb;
-@@ -371,20 +372,23 @@ void qmp_snapshot_drive(const char *device, const char *name, Error **errp)
-         return;
-     }
-+    aio_context = bdrv_get_aio_context(bs);
-+    aio_context_acquire(aio_context);
-+
-     if (bdrv_is_read_only(bs)) {
-         error_setg(errp, "Node '%s' is read only", device);
--        return;
-+        goto out;
-     }
-     if (!bdrv_can_snapshot(bs)) {
-         error_setg(errp, QERR_UNSUPPORTED);
--        return;
-+        goto out;
-     }
-     if (bdrv_snapshot_find(bs, sn, name) >= 0) {
-         error_set(errp, ERROR_CLASS_GENERIC_ERROR,
-                   "snapshot '%s' already exists", name);
--        return;
-+        goto out;
-     }
-     sn = &sn1;
-@@ -409,8 +413,11 @@ void qmp_snapshot_drive(const char *device, const char *name, Error **errp)
-     if (ret < 0) {
-         error_set(errp, ERROR_CLASS_GENERIC_ERROR,
-                   "Error while creating snapshot on '%s'\n", device);
--        return;
-+        goto out;
-     }
-+
-+out:
-+    aio_context_release(aio_context);
- }
- void qmp_delete_drive_snapshot(const char *device, const char *name,
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0043-vma-sizes-passed-to-blk_co_preadv-should-be-bytes-no.patch b/debian/patches/pve/0043-vma-sizes-passed-to-blk_co_preadv-should-be-bytes-no.patch
deleted file mode 100644 (file)
index c53e2db..0000000
+++ /dev/null
@@ -1,27 +0,0 @@
-From e74c523db792c8da65faa680ab6898b58b6cb193 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Fri, 21 Oct 2016 09:09:26 +0200
-Subject: [PATCH 43/49] vma: sizes passed to blk_co_preadv should be bytes now
-
----
- vma.c | 4 ++--
- 1 file changed, 2 insertions(+), 2 deletions(-)
-
-diff --git a/vma.c b/vma.c
-index 4f55799533..04915427c8 100644
---- a/vma.c
-+++ b/vma.c
-@@ -466,8 +466,8 @@ static void coroutine_fn backup_run(void *opaque)
-         iov.iov_len = VMA_CLUSTER_SIZE;
-         qemu_iovec_init_external(&qiov, &iov, 1);
--        ret = blk_co_preadv(job->target, start * BACKUP_SECTORS_PER_CLUSTER,
--                            BACKUP_SECTORS_PER_CLUSTER, &qiov, 0);
-+        ret = blk_co_preadv(job->target, start * VMA_CLUSTER_SIZE,
-+                            VMA_CLUSTER_SIZE, &qiov, 0);
-         if (ret < 0) {
-             vma_writer_set_error(job->vmaw, "read error", -1);
-             goto out;
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0044-glusterfs-no-default-logfile-if-daemonized.patch b/debian/patches/pve/0044-glusterfs-no-default-logfile-if-daemonized.patch
deleted file mode 100644 (file)
index 958538f..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-From f6d6cb162d0cdce8b3d83b0af7772fcd63f1dafe Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Mon, 24 Oct 2016 09:32:36 +0200
-Subject: [PATCH 44/49] glusterfs: no default logfile if daemonized
-
----
- block/gluster.c | 15 +++++++++++----
- 1 file changed, 11 insertions(+), 4 deletions(-)
-
-diff --git a/block/gluster.c b/block/gluster.c
-index cf29b5f9a4..bc44c50db0 100644
---- a/block/gluster.c
-+++ b/block/gluster.c
-@@ -33,7 +33,7 @@
- #define GLUSTER_DEBUG_DEFAULT       4
- #define GLUSTER_DEBUG_MAX           9
- #define GLUSTER_OPT_LOGFILE         "logfile"
--#define GLUSTER_LOGFILE_DEFAULT     "-" /* handled in libgfapi as /dev/stderr */
-+#define GLUSTER_LOGFILE_DEFAULT     NULL
- #define GERR_INDEX_HINT "hint: check in 'server' array index '%d'\n"
-@@ -398,6 +398,7 @@ static struct glfs *qemu_gluster_glfs_init(BlockdevOptionsGluster *gconf,
-     int old_errno;
-     SocketAddressFlatList *server;
-     unsigned long long port;
-+    const char *logfile;
-     glfs = glfs_find_preopened(gconf->volume);
-     if (glfs) {
-@@ -440,9 +441,15 @@ static struct glfs *qemu_gluster_glfs_init(BlockdevOptionsGluster *gconf,
-         }
-     }
--    ret = glfs_set_logging(glfs, gconf->logfile, gconf->debug);
--    if (ret < 0) {
--        goto out;
-+    logfile = gconf->logfile;
-+    if (!logfile && !is_daemonized()) {
-+        logfile = "-";
-+    }
-+    if (logfile) {
-+        ret = glfs_set_logging(glfs, logfile, gconf->debug);
-+        if (ret < 0) {
-+            goto out;
-+        }
-     }
-     ret = glfs_init(glfs);
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0045-qmp_delete_drive_snapshot-add-aiocontext.patch b/debian/patches/pve/0045-qmp_delete_drive_snapshot-add-aiocontext.patch
deleted file mode 100644 (file)
index a116368..0000000
+++ /dev/null
@@ -1,59 +0,0 @@
-From fe00763cb7556dfdd8fdf4b6f4cc269c291d6bfa Mon Sep 17 00:00:00 2001
-From: Alexandre Derumier <aderumier@odiso.com>
-Date: Mon, 7 Nov 2016 11:47:50 +0100
-Subject: [PATCH 45/49] qmp_delete_drive_snapshot : add aiocontext
-
-this fix snapshot delete of qcow2 with iothread enabled
-
-Signed-off-by: Alexandre Derumier <aderumier@odiso.com>
----
- savevm-async.c | 13 ++++++++++---
- 1 file changed, 10 insertions(+), 3 deletions(-)
-
-diff --git a/savevm-async.c b/savevm-async.c
-index 5913a905d8..3adf89fdb2 100644
---- a/savevm-async.c
-+++ b/savevm-async.c
-@@ -427,6 +427,7 @@ void qmp_delete_drive_snapshot(const char *device, const char *name,
-     BlockDriverState *bs;
-     QEMUSnapshotInfo sn1, *sn = &sn1;
-     Error *local_err = NULL;
-+    AioContext *aio_context;
-     int ret;
-@@ -443,22 +444,28 @@ void qmp_delete_drive_snapshot(const char *device, const char *name,
-         return;
-     }
-+    aio_context = bdrv_get_aio_context(bs);
-+    aio_context_acquire(aio_context);
-+
-     if (!bdrv_can_snapshot(bs)) {
-         error_setg(errp, QERR_UNSUPPORTED);
--        return;
-+        goto out;
-     }
-     if (bdrv_snapshot_find(bs, sn, name) < 0) {
-         /* return success if snapshot does not exists */
--        return;
-+        goto out;
-     }
-     ret = bdrv_snapshot_delete(bs, NULL, name, &local_err);
-     if (ret < 0) {
-         error_set(errp, ERROR_CLASS_GENERIC_ERROR,
-                   "Error while deleting snapshot on '%s'\n", device);
--        return;
-+        goto out;
-     }
-+
-+out:
-+    aio_context_release(aio_context);
- }
- static ssize_t loadstate_get_buffer(void *opaque, uint8_t *buf, int64_t pos,
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0046-convert-savevm-async-to-threads.patch b/debian/patches/pve/0046-convert-savevm-async-to-threads.patch
deleted file mode 100644 (file)
index ac8389a..0000000
+++ /dev/null
@@ -1,234 +0,0 @@
-From c80c9d6e7365d83bae020de4862cc9825374b88c Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Tue, 8 Nov 2016 11:13:06 +0100
-Subject: [PATCH 46/49] convert savevm-async to threads
-
----
- savevm-async.c | 144 +++++++++++++++++++++++++++++++++++----------------------
- 1 file changed, 88 insertions(+), 56 deletions(-)
-
-diff --git a/savevm-async.c b/savevm-async.c
-index 3adf89fdb2..9f839faab5 100644
---- a/savevm-async.c
-+++ b/savevm-async.c
-@@ -48,6 +48,8 @@ static struct SnapshotState {
-     int saved_vm_running;
-     QEMUFile *file;
-     int64_t total_time;
-+    QEMUBH *cleanup_bh;
-+    QemuThread thread;
- } snap_state;
- SaveVMInfo *qmp_query_savevm(Error **errp)
-@@ -135,19 +137,6 @@ static void save_snapshot_error(const char *fmt, ...)
-     g_free (msg);
-     snap_state.state = SAVE_STATE_ERROR;
--
--    save_snapshot_cleanup();
--}
--
--static void save_snapshot_completed(void)
--{
--    DPRINTF("save_snapshot_completed\n");
--
--    if (save_snapshot_cleanup() < 0) {
--        snap_state.state = SAVE_STATE_ERROR;
--    } else {
--        snap_state.state = SAVE_STATE_COMPLETED;
--    }
- }
- static int block_state_close(void *opaque)
-@@ -156,51 +145,90 @@ static int block_state_close(void *opaque)
-     return blk_flush(snap_state.target);
- }
-+typedef struct BlkRwCo {
-+    int64_t offset;
-+    QEMUIOVector *qiov;
-+    int ret;
-+} BlkRwCo;
-+
-+static void block_state_write_entry(void *opaque) {
-+    BlkRwCo *rwco = opaque;
-+    rwco->ret = blk_co_pwritev(snap_state.target, rwco->offset, rwco->qiov->size,
-+                               rwco->qiov, 0);
-+}
-+
- static ssize_t block_state_writev_buffer(void *opaque, struct iovec *iov,
-                                          int iovcnt, int64_t pos)
- {
--    int ret;
-     QEMUIOVector qiov;
-+    AioContext *aio_context;
-+    Coroutine *co;
-+    BlkRwCo rwco;
-+
-+    assert(pos == snap_state.bs_pos);
-+    rwco = (BlkRwCo) {
-+        .offset = pos,
-+        .qiov = &qiov,
-+        .ret = NOT_DONE,
-+    };
-     qemu_iovec_init_external(&qiov, iov, iovcnt);
--    ret = blk_co_pwritev(snap_state.target, pos, qiov.size, &qiov, 0);
--    if (ret < 0) {
--        return ret;
-+
-+    aio_context = blk_get_aio_context(snap_state.target);
-+    aio_context_acquire(aio_context);
-+    co = qemu_coroutine_create(&block_state_write_entry, &rwco);
-+    qemu_coroutine_enter(co);
-+    while (rwco.ret == NOT_DONE) {
-+        aio_poll(aio_context, true);
-     }
-+    aio_context_release(aio_context);
-+
-     snap_state.bs_pos += qiov.size;
-     return qiov.size;
- }
--static int store_and_stop(void) {
--    if (global_state_store()) {
--        save_snapshot_error("Error saving global state");
--        return 1;
-+static void process_savevm_cleanup(void *opaque)
-+{
-+    int ret;
-+    qemu_bh_delete(snap_state.cleanup_bh);
-+    snap_state.cleanup_bh = NULL;
-+    qemu_mutex_unlock_iothread();
-+    qemu_thread_join(&snap_state.thread);
-+    qemu_mutex_lock_iothread();
-+    ret = save_snapshot_cleanup();
-+    if (ret < 0) {
-+        save_snapshot_error("save_snapshot_cleanup error %d", ret);
-+    } else if (snap_state.state == SAVE_STATE_ACTIVE) {
-+        snap_state.state = SAVE_STATE_COMPLETED;
-+    } else {
-+        save_snapshot_error("process_savevm_cleanup: invalid state: %d",
-+                            snap_state.state);
-     }
--    if (runstate_is_running()) {
--        vm_stop(RUN_STATE_SAVE_VM);
-+    if (snap_state.saved_vm_running) {
-+        vm_start();
-+        snap_state.saved_vm_running = false;
-     }
--    return 0;
- }
--static void process_savevm_co(void *opaque)
-+static void *process_savevm_thread(void *opaque)
- {
-     int ret;
-     int64_t maxlen;
-+
-     MigrationParams params = {
-         .blk = 0,
-         .shared = 0
-     };
--    snap_state.state = SAVE_STATE_ACTIVE;
-+    rcu_register_thread();
--    qemu_mutex_unlock_iothread();
-     qemu_savevm_state_header(snap_state.file);
-     ret = qemu_savevm_state_begin(snap_state.file, &params);
--    qemu_mutex_lock_iothread();
-     if (ret < 0) {
-         save_snapshot_error("qemu_savevm_state_begin failed");
--        return;
-+        rcu_unregister_thread();
-+        return NULL;
-     }
-     while (snap_state.state == SAVE_STATE_ACTIVE) {
-@@ -209,41 +237,43 @@ static void process_savevm_co(void *opaque)
-         qemu_savevm_state_pending(snap_state.file, 0, &pend_nonpost, &pend_post);
-         pending_size = pend_post + pend_nonpost;
--        if (pending_size) {
--                ret = qemu_savevm_state_iterate(snap_state.file, false);
--                if (ret < 0) {
--                    save_snapshot_error("qemu_savevm_state_iterate error %d", ret);
--                    break;
--                }
--                DPRINTF("savevm inerate pending size %lu ret %d\n", pending_size, ret);
-+        maxlen = blk_getlength(snap_state.target) - 30*1024*1024;
-+
-+        if (pending_size > 400000 && snap_state.bs_pos + pending_size < maxlen) {
-+            qemu_mutex_lock_iothread();
-+            ret = qemu_savevm_state_iterate(snap_state.file, false);
-+            if (ret < 0) {
-+                save_snapshot_error("qemu_savevm_state_iterate error %d", ret);
-+                break;
-+            }
-+            qemu_mutex_unlock_iothread();
-+            DPRINTF("savevm inerate pending size %lu ret %d\n", pending_size, ret);
-         } else {
--            DPRINTF("done iterating\n");
--            if (store_and_stop())
-+            qemu_mutex_lock_iothread();
-+            qemu_system_wakeup_request(QEMU_WAKEUP_REASON_OTHER);
-+            ret = global_state_store();
-+            if (ret) {
-+                save_snapshot_error("global_state_store error %d", ret);
-+                break;
-+            }
-+            ret = vm_stop_force_state(RUN_STATE_FINISH_MIGRATE);
-+            if (ret < 0) {
-+                save_snapshot_error("vm_stop_force_state error %d", ret);
-                 break;
-+            }
-             DPRINTF("savevm inerate finished\n");
-             qemu_savevm_state_complete_precopy(snap_state.file, false);
-+            qemu_savevm_state_cleanup();
-             DPRINTF("save complete\n");
--            save_snapshot_completed();
-             break;
-         }
--
--        /* stop the VM if we get to the end of available space,
--         * or if pending_size is just a few MB
--         */
--        maxlen = blk_getlength(snap_state.target) - 30*1024*1024;
--        if ((pending_size < 100000) ||
--            ((snap_state.bs_pos + pending_size) >= maxlen)) {
--            if (store_and_stop())
--                break;
--        }
-     }
--    if(snap_state.state == SAVE_STATE_CANCELLED) {
--        save_snapshot_completed();
--        Error *errp = NULL;
--        qmp_savevm_end(&errp);
--    }
-+    qemu_bh_schedule(snap_state.cleanup_bh);
-+    qemu_mutex_unlock_iothread();
-+    rcu_unregister_thread();
-+    return NULL;
- }
- static const QEMUFileOps block_file_ops = {
-@@ -306,8 +336,10 @@ void qmp_savevm_start(bool has_statefile, const char *statefile, Error **errp)
-     error_setg(&snap_state.blocker, "block device is in use by savevm");
-     blk_op_block_all(snap_state.target, snap_state.blocker);
--    Coroutine *co = qemu_coroutine_create(process_savevm_co, NULL);
--    qemu_coroutine_enter(co);
-+    snap_state.state = SAVE_STATE_ACTIVE;
-+    snap_state.cleanup_bh = qemu_bh_new(process_savevm_cleanup, &snap_state);
-+    qemu_thread_create(&snap_state.thread, "savevm-async", process_savevm_thread,
-+                       NULL, QEMU_THREAD_JOINABLE);
-     return;
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0047-glusterfs-allow-partial-reads.patch b/debian/patches/pve/0047-glusterfs-allow-partial-reads.patch
deleted file mode 100644 (file)
index 3d98e66..0000000
+++ /dev/null
@@ -1,78 +0,0 @@
-From 42c448d4ae35e5531023dff7ed07eb0135b3a2a2 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Wed, 30 Nov 2016 10:27:47 +0100
-Subject: [PATCH 47/49] glusterfs: allow partial reads
-
-This should deal with qemu bug #1644754 until upstream
-decides which way to go. The general direction seems to be
-away from sector based block APIs and with that in mind, and
-when comparing to other network block backends (eg. nfs)
-treating partial reads as errors doesn't seem to make much
-sense.
----
- block/gluster.c | 10 +++++++++-
- 1 file changed, 9 insertions(+), 1 deletion(-)
-
-diff --git a/block/gluster.c b/block/gluster.c
-index bc44c50db0..4fdf68f1fc 100644
---- a/block/gluster.c
-+++ b/block/gluster.c
-@@ -42,6 +42,7 @@ typedef struct GlusterAIOCB {
-     int ret;
-     Coroutine *coroutine;
-     AioContext *aio_context;
-+    bool is_write;
- } GlusterAIOCB;
- typedef struct BDRVGlusterState {
-@@ -713,8 +714,10 @@ static void gluster_finish_aiocb(struct glfs_fd *fd, ssize_t ret, void *arg)
-         acb->ret = 0; /* Success */
-     } else if (ret < 0) {
-         acb->ret = -errno; /* Read/Write failed */
-+    } else if (acb->is_write) {
-+        acb->ret = -EIO; /* Partial write - fail it */
-     } else {
--        acb->ret = -EIO; /* Partial read/write - fail it */
-+        acb->ret = 0; /* Success */
-     }
-     aio_co_schedule(acb->aio_context, acb->coroutine);
-@@ -962,6 +965,7 @@ static coroutine_fn int qemu_gluster_co_pwrite_zeroes(BlockDriverState *bs,
-     acb.ret = 0;
-     acb.coroutine = qemu_coroutine_self();
-     acb.aio_context = bdrv_get_aio_context(bs);
-+    acb.is_write = true;
-     ret = glfs_zerofill_async(s->fd, offset, size, gluster_finish_aiocb, &acb);
-     if (ret < 0) {
-@@ -1084,9 +1088,11 @@ static coroutine_fn int qemu_gluster_co_rw(BlockDriverState *bs,
-     acb.aio_context = bdrv_get_aio_context(bs);
-     if (write) {
-+        acb.is_write = true;
-         ret = glfs_pwritev_async(s->fd, qiov->iov, qiov->niov, offset, 0,
-                                  gluster_finish_aiocb, &acb);
-     } else {
-+        acb.is_write = false;
-         ret = glfs_preadv_async(s->fd, qiov->iov, qiov->niov, offset, 0,
-                                 gluster_finish_aiocb, &acb);
-     }
-@@ -1150,6 +1156,7 @@ static coroutine_fn int qemu_gluster_co_flush_to_disk(BlockDriverState *bs)
-     acb.ret = 0;
-     acb.coroutine = qemu_coroutine_self();
-     acb.aio_context = bdrv_get_aio_context(bs);
-+    acb.is_write = true;
-     ret = glfs_fsync_async(s->fd, gluster_finish_aiocb, &acb);
-     if (ret < 0) {
-@@ -1196,6 +1203,7 @@ static coroutine_fn int qemu_gluster_co_pdiscard(BlockDriverState *bs,
-     acb.ret = 0;
-     acb.coroutine = qemu_coroutine_self();
-     acb.aio_context = bdrv_get_aio_context(bs);
-+    acb.is_write = true;
-     ret = glfs_discard_async(s->fd, offset, size, gluster_finish_aiocb, &acb);
-     if (ret < 0) {
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0048-vma-don-t-use-O_DIRECT-on-pipes.patch b/debian/patches/pve/0048-vma-don-t-use-O_DIRECT-on-pipes.patch
deleted file mode 100644 (file)
index ae652fd..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-From 47d2445ffc83bba6066beb67fa34075d75b5b4c2 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Thu, 30 Mar 2017 16:05:34 +0200
-Subject: [PATCH 48/49] vma: don't use O_DIRECT on pipes
-
-It puts them in packet mode which potentially discards data.
-(since kernel 4.5)
----
- vma-writer.c | 10 ++++------
- 1 file changed, 4 insertions(+), 6 deletions(-)
-
-diff --git a/vma-writer.c b/vma-writer.c
-index 70dcca0771..9001cbdd2b 100644
---- a/vma-writer.c
-+++ b/vma-writer.c
-@@ -283,9 +283,8 @@ VmaWriter *vma_writer_create(const char *filename, uuid_t uuid, Error **errp)
-         }
-         vmaw->fd = fileno(vmaw->cmd);
--        /* try to use O_NONBLOCK and O_DIRECT */
-+        /* try to use O_NONBLOCK */
-         fcntl(vmaw->fd, F_SETFL, fcntl(vmaw->fd, F_GETFL)|O_NONBLOCK);
--        fcntl(vmaw->fd, F_SETFL, fcntl(vmaw->fd, F_GETFL)|O_DIRECT);
-     } else {
-         struct stat st;
-@@ -293,19 +292,18 @@ VmaWriter *vma_writer_create(const char *filename, uuid_t uuid, Error **errp)
-         const char *tmp_id_str;
-         if ((stat(filename, &st) == 0) && S_ISFIFO(st.st_mode)) {
--            oflags = O_NONBLOCK|O_DIRECT|O_WRONLY;
-+            oflags = O_NONBLOCK|O_WRONLY;
-             vmaw->fd = qemu_open(filename, oflags, 0644);
-         } else if (strstart(filename, "/dev/fdset/", &tmp_id_str)) {
--            oflags = O_NONBLOCK|O_DIRECT|O_WRONLY;
-+            oflags = O_NONBLOCK|O_WRONLY;
-             vmaw->fd = qemu_open(filename, oflags, 0644);
-         } else if (strstart(filename, "/dev/fdname/", &tmp_id_str)) {
-             vmaw->fd = monitor_get_fd(cur_mon, tmp_id_str, errp);
-             if (vmaw->fd < 0) {
-                 goto err;
-             }
--            /* try to use O_NONBLOCK and O_DIRECT */
-+            /* try to use O_NONBLOCK */
-             fcntl(vmaw->fd, F_SETFL, fcntl(vmaw->fd, F_GETFL)|O_NONBLOCK);
--            fcntl(vmaw->fd, F_SETFL, fcntl(vmaw->fd, F_GETFL)|O_DIRECT);
-         } else  {
-             oflags = O_NONBLOCK|O_DIRECT|O_WRONLY|O_CREAT|O_EXCL;
-             vmaw->fd = qemu_open(filename, oflags, 0644);
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0049-block-zeroinit-request-child-permissions.patch b/debian/patches/pve/0049-block-zeroinit-request-child-permissions.patch
deleted file mode 100644 (file)
index 2a2e941..0000000
+++ /dev/null
@@ -1,25 +0,0 @@
-From bc3ed255d5a8e9737abe7ba053de2492164f490a Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Fri, 31 Mar 2017 09:27:58 +0200
-Subject: [PATCH 49/49] block: zeroinit: request child permissions
-
-See d7010dfb685
----
- block/zeroinit.c | 1 +
- 1 file changed, 1 insertion(+)
-
-diff --git a/block/zeroinit.c b/block/zeroinit.c
-index 0a8c7f9622..a857ec3c62 100644
---- a/block/zeroinit.c
-+++ b/block/zeroinit.c
-@@ -191,6 +191,7 @@ static BlockDriver bdrv_zeroinit = {
-     .bdrv_file_open                   = zeroinit_open,
-     .bdrv_close                       = zeroinit_close,
-     .bdrv_getlength                   = zeroinit_getlength,
-+    .bdrv_child_perm                  = bdrv_filter_default_perms,
-     .bdrv_co_flush_to_disk            = zeroinit_co_flush,
-     .bdrv_co_pwrite_zeroes            = zeroinit_co_pwrite_zeroes,
--- 
-2.11.0
-
diff --git a/debian/patches/pve/0050-qemu-img-dd-add-osize-and-read-from-to-stdin-stdout.patch b/debian/patches/pve/0050-qemu-img-dd-add-osize-and-read-from-to-stdin-stdout.patch
deleted file mode 100644 (file)
index 2c137f7..0000000
+++ /dev/null
@@ -1,287 +0,0 @@
-From 70bc584282901ee2a8954559393f305377016249 Mon Sep 17 00:00:00 2001
-From: Wolfgang Bumiller <w.bumiller@proxmox.com>
-Date: Fri, 23 Jun 2017 12:01:43 +0200
-Subject: [PATCH 50/50] qemu-img dd: add osize and read from/to stdin/stdout
-
-Neither convert nor dd were previously able to write to or
-read from a pipe. Particularly serializing an image file
-into a raw stream or vice versa can be useful, but using
-`qemu-img convert -f qcow2 -O raw foo.qcow2 /dev/stdout` in
-a pipe will fail trying to seek.
-
-While dd and convert have overlapping use cases, `dd` is a
-simple read/write loop while convert is much more
-sophisticated and has ways to dealing with holes and blocks
-of zeroes.
-Since these typically can't be detected in pipes via
-SEEK_DATA/HOLE or skipped while writing, dd seems to be the
-better choice for implementing stdin/stdout streams.
-
-This patch causes "if" and "of" to default to stdin and
-stdout respectively, allowing only the "raw" format to be
-used in these cases.
-Since the input can now be a pipe we have no way of
-detecting the size of the output image to create. Since we
-also want to support images with a size not matching the
-dd command's "bs" parameter (which, together with "count"
-could be used to calculate the desired size, and is already
-used to limit it), the "osize" option is added to explicitly
-override the output file's size.
-
-Signed-off-by: Wolfgang Bumiller <w.bumiller@proxmox.com>
----
- qemu-img.c | 176 +++++++++++++++++++++++++++++++++++++++----------------------
- 1 file changed, 113 insertions(+), 63 deletions(-)
-
-diff --git a/qemu-img.c b/qemu-img.c
-index 4f7f458dd2..b9d1ef7bb8 100644
---- a/qemu-img.c
-+++ b/qemu-img.c
-@@ -4035,10 +4035,12 @@ out:
- #define C_IF      04
- #define C_OF      010
- #define C_SKIP    020
-+#define C_OSIZE   040
- struct DdInfo {
-     unsigned int flags;
-     int64_t count;
-+    int64_t osize;
- };
- struct DdIo {
-@@ -4117,6 +4119,20 @@ static int img_dd_skip(const char *arg,
-     return 0;
- }
-+static int img_dd_osize(const char *arg,
-+                        struct DdIo *in, struct DdIo *out,
-+                        struct DdInfo *dd)
-+{
-+    dd->osize = cvtnum(arg);
-+
-+    if (dd->osize < 0) {
-+        error_report("invalid number: '%s'", arg);
-+        return 1;
-+    }
-+
-+    return 0;
-+}
-+
- static int img_dd(int argc, char **argv)
- {
-     int ret = 0;
-@@ -4156,6 +4172,7 @@ static int img_dd(int argc, char **argv)
-         { "if", img_dd_if, C_IF },
-         { "of", img_dd_of, C_OF },
-         { "skip", img_dd_skip, C_SKIP },
-+        { "osize", img_dd_osize, C_OSIZE },
-         { NULL, NULL, 0 }
-     };
-     const struct option long_options[] = {
-@@ -4223,84 +4240,106 @@ static int img_dd(int argc, char **argv)
-         arg = NULL;
-     }
--    if (!(dd.flags & C_IF && dd.flags & C_OF)) {
--        error_report("Must specify both input and output files");
-+    if (!(dd.flags & C_IF) && (!fmt || strcmp(fmt, "raw") != 0)) {
-+        error_report("Input format must be raw when readin from stdin");
-         ret = -1;
-         goto out;
-     }
--    blk1 = img_open(image_opts, in.filename, fmt, 0, false, false);
--
--    if (!blk1) {
-+    if (!(dd.flags & C_OF) && strcmp(out_fmt, "raw") != 0) {
-+        error_report("Output format must be raw when writing to stdout");
-         ret = -1;
-         goto out;
-     }
-+    if (dd.flags & C_IF) {
-+        blk1 = img_open(image_opts, in.filename, fmt, 0, false, false);
--    drv = bdrv_find_format(out_fmt);
--    if (!drv) {
--        error_report("Unknown file format");
--        ret = -1;
--        goto out;
--    }
--    proto_drv = bdrv_find_protocol(out.filename, true, &local_err);
--
--    if (!proto_drv) {
--        error_report_err(local_err);
--        ret = -1;
--        goto out;
--    }
--    if (!drv->create_opts) {
--        error_report("Format driver '%s' does not support image creation",
--                     drv->format_name);
--        ret = -1;
--        goto out;
--    }
--    if (!proto_drv->create_opts) {
--        error_report("Protocol driver '%s' does not support image creation",
--                     proto_drv->format_name);
--        ret = -1;
--        goto out;
-+        if (!blk1) {
-+            ret = -1;
-+            goto out;
-+        }
-     }
--    create_opts = qemu_opts_append(create_opts, drv->create_opts);
--    create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
--
--    opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
--    size = blk_getlength(blk1);
--    if (size < 0) {
--        error_report("Failed to get size for '%s'", in.filename);
-+    if (dd.flags & C_OSIZE) {
-+        size = dd.osize;
-+    } else if (dd.flags & C_IF) {
-+        size = blk_getlength(blk1);
-+        if (size < 0) {
-+            error_report("Failed to get size for '%s'", in.filename);
-+            ret = -1;
-+            goto out;
-+        }
-+    } else if (dd.flags & C_COUNT) {
-+        size = dd.count * in.bsz;
-+    } else {
-+        error_report("Output size must be known when reading from stdin");
-         ret = -1;
-         goto out;
-     }
--    if (dd.flags & C_COUNT && dd.count <= INT64_MAX / in.bsz &&
-+    if (!(dd.flags & C_OSIZE) && dd.flags & C_COUNT && dd.count <= INT64_MAX / in.bsz &&
-         dd.count * in.bsz < size) {
-         size = dd.count * in.bsz;
-     }
--    /* Overflow means the specified offset is beyond input image's size */
--    if (dd.flags & C_SKIP && (in.offset > INT64_MAX / in.bsz ||
--                              size < in.bsz * in.offset)) {
--        qemu_opt_set_number(opts, BLOCK_OPT_SIZE, 0, &error_abort);
--    } else {
--        qemu_opt_set_number(opts, BLOCK_OPT_SIZE,
--                            size - in.bsz * in.offset, &error_abort);
--    }
--    ret = bdrv_create(drv, out.filename, opts, &local_err);
--    if (ret < 0) {
--        error_reportf_err(local_err,
--                          "%s: error while creating output image: ",
--                          out.filename);
--        ret = -1;
--        goto out;
--    }
-+    if (dd.flags & C_OF) {
-+        drv = bdrv_find_format(out_fmt);
-+        if (!drv) {
-+            error_report("Unknown file format");
-+            ret = -1;
-+            goto out;
-+        }
-+        proto_drv = bdrv_find_protocol(out.filename, true, &local_err);
-+
-+        if (!proto_drv) {
-+            error_report_err(local_err);
-+            ret = -1;
-+            goto out;
-+        }
-+        if (!drv->create_opts) {
-+            error_report("Format driver '%s' does not support image creation",
-+                         drv->format_name);
-+            ret = -1;
-+            goto out;
-+        }
-+        if (!proto_drv->create_opts) {
-+            error_report("Protocol driver '%s' does not support image creation",
-+                         proto_drv->format_name);
-+            ret = -1;
-+            goto out;
-+        }
-+        create_opts = qemu_opts_append(create_opts, drv->create_opts);
-+        create_opts = qemu_opts_append(create_opts, proto_drv->create_opts);
--    blk2 = img_open(image_opts, out.filename, out_fmt, BDRV_O_RDWR,
--                    false, false);
-+        opts = qemu_opts_create(create_opts, NULL, 0, &error_abort);
--    if (!blk2) {
--        ret = -1;
--        goto out;
-+        /* Overflow means the specified offset is beyond input image's size */
-+        if (dd.flags & C_OSIZE) {
-+            qemu_opt_set_number(opts, BLOCK_OPT_SIZE, size, &error_abort);
-+        } else if (dd.flags & C_SKIP && (in.offset > INT64_MAX / in.bsz ||
-+                                         size < in.bsz * in.offset)) {
-+            qemu_opt_set_number(opts, BLOCK_OPT_SIZE, 0, &error_abort);
-+        } else {
-+            qemu_opt_set_number(opts, BLOCK_OPT_SIZE,
-+                                size - in.bsz * in.offset, &error_abort);
-+        }
-+
-+        ret = bdrv_create(drv, out.filename, opts, &local_err);
-+        if (ret < 0) {
-+            error_reportf_err(local_err,
-+                              "%s: error while creating output image: ",
-+                              out.filename);
-+            ret = -1;
-+            goto out;
-+        }
-+
-+        blk2 = img_open(image_opts, out.filename, out_fmt, BDRV_O_RDWR,
-+                        false, false);
-+
-+        if (!blk2) {
-+            ret = -1;
-+            goto out;
-+        }
-     }
-     if (dd.flags & C_SKIP && (in.offset > INT64_MAX / in.bsz ||
-@@ -4318,11 +4357,18 @@ static int img_dd(int argc, char **argv)
-     for (out_pos = 0; in_pos < size; block_count++) {
-         int in_ret, out_ret;
-+        size_t in_bsz = in_pos + in.bsz > size ? size - in_pos : in.bsz;
--        if (in_pos + in.bsz > size) {
--            in_ret = blk_pread(blk1, in_pos, in.buf, size - in_pos);
-+        if (blk1) {
-+            in_ret = blk_pread(blk1, in_pos, in.buf, in_bsz);
-         } else {
--            in_ret = blk_pread(blk1, in_pos, in.buf, in.bsz);
-+            in_ret = read(STDIN_FILENO, in.buf, in_bsz);
-+            if (in_ret == 0) {
-+                /* early EOF is considered an error */
-+                error_report("Input ended unexpectedly");
-+                ret = -1;
-+                goto out;
-+            }
-         }
-         if (in_ret < 0) {
-             error_report("error while reading from input image file: %s",
-@@ -4332,9 +4378,13 @@ static int img_dd(int argc, char **argv)
-         }
-         in_pos += in_ret;
--        out_ret = blk_pwrite(blk2, out_pos, in.buf, in_ret, 0);
-+        if (blk2) {
-+            out_ret = blk_pwrite(blk2, out_pos, in.buf, in_ret, 0);
-+        } else {
-+            out_ret = write(STDOUT_FILENO, in.buf, in_ret);
-+        }
--        if (out_ret < 0) {
-+        if (out_ret != in_ret) {
-             error_report("error while writing to output image file: %s",
-                          strerror(-out_ret));
-             ret = -1;
--- 
-2.11.0
-
index 0b7f343e4db2712a32909609e339297d6ac8adf4..3cd3e4b5cdad2010a3740abb5c22d67fc8ebeab2 100644 (file)
@@ -1,53 +1,31 @@
 pve/0001-fr-ca-keymap-corrections.patch
 pve/0002-Adjust-network-script-path-to-etc-kvm.patch
-pve/0003-vnc-altgr-emulation.patch
-pve/0004-qemu-img-return-success-on-info-without-snapshots.patch
-pve/0005-use-kvm-by-default.patch
-pve/0006-virtio-balloon-fix-query.patch
-pve/0007-set-the-CPU-model-to-kvm64-32-instead-of-qemu64-32.patch
-pve/0008-qapi-modify-query-machines.patch
-pve/0009-qapi-modify-spice-query.patch
-pve/0010-ui-spice-default-to-pve-certs-unless-otherwise-speci.patch
-pve/0011-introduce-new-vma-archive-format.patch
-pve/0012-vma-add-verify-command.patch
-pve/0013-vma-add-config-command-to-dump-the-config.patch
-pve/0014-backup-modify-job-api.patch
-pve/0015-backup-add-pve-monitor-commands.patch
-pve/0016-backup-vma-add-dir-format.patch
-pve/0017-backup-do-not-return-errors-in-dump-callback.patch
-pve/0018-backup-vma-correctly-propagate-error.patch
-pve/0019-backup-vma-remove-async-queue.patch
-pve/0020-backup-vma-run-flush-inside-coroutine.patch
-pve/0021-backup-do-not-use-bdrv_drain_all.patch
-pve/0022-internal-snapshot-async.patch
-pve/0023-backup-vma-allow-empty-backups.patch
-pve/0024-qmp-add-get_link_status.patch
-pve/0025-smm_available-false.patch
-pve/0026-use-whitespace-between-VERSION-and-PKGVERSION.patch
-pve/0027-vma-add-firewall.patch
-pve/0028-savevm-async-migration-and-bdrv_open-update.patch
-pve/0029-vnc-make-x509-imply-tls-again.patch
-pve/0030-PVE-VNC-authentication.patch
-pve/0031-vma-writer-don-t-bail-out-on-zero-length-files.patch
-pve/0032-vma-better-driver-guessing-for-bdrv_open.patch
-pve/0033-block-add-the-zeroinit-block-driver-filter.patch
-pve/0034-vma-add-format-option-to-device-mapping.patch
-pve/0035-fix-possible-unitialised-return-value.patch
-pve/0036-vnc-refactor-to-QIOChannelSocket.patch
-pve/0037-vma-use-BlockBackend-on-extract.patch
-pve/0038-vma-byte-based-write-calls.patch
-pve/0039-rbd-disable-rbd_cache_writethrough_until_flush-with-.patch
-pve/0040-enable-cache-unsafe-for-vma-extract_content-and-qmp_.patch
-pve/0041-savevm-async-updates.patch
-pve/0042-qmp_snapshot_drive-add-aiocontext.patch
-pve/0043-vma-sizes-passed-to-blk_co_preadv-should-be-bytes-no.patch
-pve/0044-glusterfs-no-default-logfile-if-daemonized.patch
-pve/0045-qmp_delete_drive_snapshot-add-aiocontext.patch
-pve/0046-convert-savevm-async-to-threads.patch
-pve/0047-glusterfs-allow-partial-reads.patch
-pve/0048-vma-don-t-use-O_DIRECT-on-pipes.patch
-pve/0049-block-zeroinit-request-child-permissions.patch
-pve/0050-qemu-img-dd-add-osize-and-read-from-to-stdin-stdout.patch
+pve/0003-qemu-img-return-success-on-info-without-snapshots.patch
+pve/0004-use-kvm-by-default.patch
+pve/0005-virtio-balloon-fix-query.patch
+pve/0006-set-the-CPU-model-to-kvm64-32-instead-of-qemu64-32.patch
+pve/0007-qapi-modify-query-machines.patch
+pve/0008-qapi-modify-spice-query.patch
+pve/0009-ui-spice-default-to-pve-certs-unless-otherwise-speci.patch
+pve/0010-internal-snapshot-async.patch
+pve/0011-convert-savevm-async-to-threads.patch
+pve/0012-qmp-add-get_link_status.patch
+pve/0013-smm_available-false.patch
+pve/0014-use-whitespace-between-VERSION-and-PKGVERSION.patch
+pve/0015-vnc-altgr-emulation.patch
+pve/0016-vnc-make-x509-imply-tls-again.patch
+pve/0017-vnc-PVE-VNC-authentication.patch
+pve/0018-migrate-fix-possible-unitialised-return-value.patch
+pve/0019-block-rbd-disable-rbd_cache_writethrough_until_flush.patch
+pve/0020-block-snapshot-qmp_snapshot_drive-add-aiocontext.patch
+pve/0021-block-snapshot-qmp_delete_drive_snapshot-add-aiocont.patch
+pve/0022-glusterfs-no-default-logfile-if-daemonized.patch
+pve/0023-glusterfs-allow-partial-reads.patch
+pve/0024-block-add-the-zeroinit-block-driver-filter.patch
+pve/0025-qemu-img-dd-add-osize-and-read-from-to-stdin-stdout.patch
+pve/0026-backup-modify-job-api.patch
+pve/0027-backup-introduce-vma-archive-format.patch
+pve/0028-adding-old-vma-files.patch
 extra/0001-Revert-target-i386-disable-LINT0-after-reset.patch
 extra/0002-qemu-img-wait-for-convert-coroutines-to-complete.patch
 extra/0003-block-Do-not-unref-bs-file-on-error-in-BD-s-open.patch