2017-04-17 17:07:04 +02:00
|
|
|
/*
|
|
|
|
* QEMU live migration channel operations
|
|
|
|
*
|
|
|
|
* Copyright Red Hat, Inc. 2016
|
|
|
|
*
|
|
|
|
* Authors:
|
|
|
|
* Daniel P. Berrange <berrange@redhat.com>
|
|
|
|
*
|
|
|
|
* Contributions after 2012-01-13 are licensed under the terms of the
|
|
|
|
* GNU GPL, version 2 or (at your option) any later version.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "qemu/osdep.h"
|
|
|
|
#include "channel.h"
|
2017-04-05 17:45:16 +02:00
|
|
|
#include "tls.h"
|
2017-04-24 20:07:27 +02:00
|
|
|
#include "migration.h"
|
2022-06-20 13:02:05 +02:00
|
|
|
#include "qemu-file.h"
|
2017-04-17 17:07:04 +02:00
|
|
|
#include "trace.h"
|
|
|
|
#include "qapi/error.h"
|
|
|
|
#include "io/channel-tls.h"
|
2020-12-28 16:08:52 +01:00
|
|
|
#include "io/channel-socket.h"
|
|
|
|
#include "qemu/yank.h"
|
2021-03-23 18:52:42 +01:00
|
|
|
#include "yank_functions.h"
|
2017-04-17 17:07:04 +02:00
|
|
|
|
2017-07-24 12:55:26 +02:00
|
|
|
/**
|
|
|
|
* @migration_channel_process_incoming - Create new incoming migration channel
|
|
|
|
*
|
|
|
|
* Notice that TLS is special. For it we listen in a listener socket,
|
|
|
|
* and then create a new client socket from the TLS library.
|
|
|
|
*
|
|
|
|
* @ioc: Channel to which we are connecting
|
|
|
|
*/
|
2017-04-17 17:15:02 +02:00
|
|
|
void migration_channel_process_incoming(QIOChannel *ioc)
|
2017-04-17 17:07:04 +02:00
|
|
|
{
|
2017-04-17 17:15:02 +02:00
|
|
|
MigrationState *s = migrate_get_current();
|
2019-01-13 15:08:46 +01:00
|
|
|
Error *local_err = NULL;
|
2017-04-17 17:15:02 +02:00
|
|
|
|
2017-04-17 17:07:04 +02:00
|
|
|
trace_migration_set_incoming_channel(
|
|
|
|
ioc, object_get_typename(OBJECT(ioc)));
|
|
|
|
|
2022-07-07 20:55:13 +02:00
|
|
|
if (migrate_channel_requires_tls_upgrade(ioc)) {
|
2017-04-17 17:07:04 +02:00
|
|
|
migration_tls_channel_process_incoming(s, ioc, &local_err);
|
|
|
|
} else {
|
2021-07-22 19:58:39 +02:00
|
|
|
migration_ioc_register_yank(ioc);
|
2019-01-13 15:08:46 +01:00
|
|
|
migration_ioc_process_incoming(ioc, &local_err);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (local_err) {
|
|
|
|
error_report_err(local_err);
|
2017-04-17 17:07:04 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2017-07-24 12:55:26 +02:00
|
|
|
/**
|
|
|
|
* @migration_channel_connect - Create new outgoing migration channel
|
|
|
|
*
|
|
|
|
* @s: Current migration state
|
|
|
|
* @ioc: Channel to which we are connecting
|
|
|
|
* @hostname: Where we want to connect
|
2017-12-15 18:16:55 +01:00
|
|
|
* @error: Error indicating failure to connect, free'd here
|
2017-07-24 12:55:26 +02:00
|
|
|
*/
|
2017-04-17 17:07:04 +02:00
|
|
|
void migration_channel_connect(MigrationState *s,
|
|
|
|
QIOChannel *ioc,
|
2017-12-15 18:16:55 +01:00
|
|
|
const char *hostname,
|
|
|
|
Error *error)
|
2017-04-17 17:07:04 +02:00
|
|
|
{
|
|
|
|
trace_migration_set_outgoing_channel(
|
2017-12-15 18:16:55 +01:00
|
|
|
ioc, object_get_typename(OBJECT(ioc)), hostname, error);
|
2017-04-17 17:07:04 +02:00
|
|
|
|
2017-12-15 18:16:55 +01:00
|
|
|
if (!error) {
|
2022-07-07 20:55:13 +02:00
|
|
|
if (migrate_channel_requires_tls_upgrade(ioc)) {
|
2017-12-15 18:16:55 +01:00
|
|
|
migration_tls_channel_connect(s, ioc, hostname, &error);
|
2018-04-30 20:59:43 +02:00
|
|
|
|
|
|
|
if (!error) {
|
|
|
|
/* tls_channel_connect will call back to this
|
|
|
|
* function after the TLS handshake,
|
|
|
|
* so we mustn't call migrate_fd_connect until then
|
|
|
|
*/
|
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
2017-12-15 18:16:55 +01:00
|
|
|
} else {
|
2022-06-20 13:02:05 +02:00
|
|
|
QEMUFile *f = qemu_file_new_output(ioc);
|
2017-04-17 17:07:04 +02:00
|
|
|
|
2021-07-22 19:58:39 +02:00
|
|
|
migration_ioc_register_yank(ioc);
|
2021-06-01 07:40:31 +02:00
|
|
|
|
2018-05-02 12:47:38 +02:00
|
|
|
qemu_mutex_lock(&s->qemu_file_lock);
|
2017-12-15 18:16:55 +01:00
|
|
|
s->to_dst_file = f;
|
2018-05-02 12:47:38 +02:00
|
|
|
qemu_mutex_unlock(&s->qemu_file_lock);
|
2017-12-15 18:16:55 +01:00
|
|
|
}
|
2017-04-17 17:07:04 +02:00
|
|
|
}
|
2017-12-15 18:16:55 +01:00
|
|
|
migrate_fd_connect(s, error);
|
|
|
|
error_free(error);
|
2017-04-17 17:07:04 +02:00
|
|
|
}
|
2022-12-20 19:44:18 +01:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @migration_channel_read_peek - Peek at migration channel, without
|
|
|
|
* actually removing it from channel buffer.
|
|
|
|
*
|
|
|
|
* @ioc: the channel object
|
|
|
|
* @buf: the memory region to read data into
|
|
|
|
* @buflen: the number of bytes to read in @buf
|
|
|
|
* @errp: pointer to a NULL-initialized error object
|
|
|
|
*
|
|
|
|
* Returns 0 if successful, returns -1 and sets @errp if fails.
|
|
|
|
*/
|
|
|
|
int migration_channel_read_peek(QIOChannel *ioc,
|
|
|
|
const char *buf,
|
|
|
|
const size_t buflen,
|
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
ssize_t len = 0;
|
|
|
|
struct iovec iov = { .iov_base = (char *)buf, .iov_len = buflen };
|
|
|
|
|
|
|
|
while (true) {
|
|
|
|
len = qio_channel_readv_full(ioc, &iov, 1, NULL, NULL,
|
|
|
|
QIO_CHANNEL_READ_FLAG_MSG_PEEK, errp);
|
|
|
|
|
2023-12-31 10:30:14 +01:00
|
|
|
if (len < 0 && len != QIO_CHANNEL_ERR_BLOCK) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (len == 0) {
|
|
|
|
error_setg(errp, "Failed to peek at channel");
|
2022-12-20 19:44:18 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (len == buflen) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* 1ms sleep. */
|
|
|
|
if (qemu_in_coroutine()) {
|
|
|
|
qemu_co_sleep_ns(QEMU_CLOCK_REALTIME, 1000000);
|
|
|
|
} else {
|
|
|
|
g_usleep(1000);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|