2009-08-05 17:24:29 +02:00
|
|
|
/*
|
2016-07-28 10:54:34 +02:00
|
|
|
* QEMU live migration via socket
|
2009-08-05 17:24:29 +02:00
|
|
|
*
|
2016-04-27 12:05:02 +02:00
|
|
|
* Copyright Red Hat, Inc. 2009-2016
|
2009-08-05 17:24:29 +02:00
|
|
|
*
|
|
|
|
* Authors:
|
|
|
|
* Chris Lalancette <clalance@redhat.com>
|
2016-04-27 12:05:02 +02:00
|
|
|
* Daniel P. Berrange <berrange@redhat.com>
|
2009-08-05 17:24:29 +02:00
|
|
|
*
|
|
|
|
* This work is licensed under the terms of the GNU GPL, version 2. See
|
|
|
|
* the COPYING file in the top-level directory.
|
|
|
|
*
|
2012-01-13 17:44:23 +01:00
|
|
|
* Contributions after 2012-01-13 are licensed under the terms of the
|
|
|
|
* GNU GPL, version 2 or (at your option) any later version.
|
2009-08-05 17:24:29 +02:00
|
|
|
*/
|
|
|
|
|
2016-01-26 19:16:54 +01:00
|
|
|
#include "qemu/osdep.h"
|
2019-02-27 11:51:27 +01:00
|
|
|
#include "qemu/cutils.h"
|
2014-03-19 14:34:28 +01:00
|
|
|
|
|
|
|
#include "qemu/error-report.h"
|
2016-04-27 12:05:02 +02:00
|
|
|
#include "qapi/error.h"
|
2017-04-17 17:07:04 +02:00
|
|
|
#include "channel.h"
|
2017-04-05 17:40:11 +02:00
|
|
|
#include "socket.h"
|
2017-04-24 20:07:27 +02:00
|
|
|
#include "migration.h"
|
2017-04-20 18:52:18 +02:00
|
|
|
#include "qemu-file.h"
|
2016-04-27 12:05:02 +02:00
|
|
|
#include "io/channel-socket.h"
|
2018-03-12 15:17:14 +01:00
|
|
|
#include "io/net-listener.h"
|
2016-04-27 12:05:02 +02:00
|
|
|
#include "trace.h"
|
2022-07-07 20:55:02 +02:00
|
|
|
#include "postcopy-ram.h"
|
2023-03-01 21:18:45 +01:00
|
|
|
#include "options.h"
|
2009-08-05 17:24:29 +02:00
|
|
|
|
2018-02-28 12:05:15 +01:00
|
|
|
struct SocketOutgoingArgs {
|
|
|
|
SocketAddress *saddr;
|
|
|
|
} outgoing_args;
|
|
|
|
|
|
|
|
void socket_send_channel_create(QIOTaskFunc f, void *data)
|
|
|
|
{
|
|
|
|
QIOChannelSocket *sioc = qio_channel_socket_new();
|
|
|
|
qio_channel_socket_connect_async(sioc, outgoing_args.saddr,
|
|
|
|
f, data, NULL, NULL);
|
|
|
|
}
|
|
|
|
|
2022-07-07 20:55:02 +02:00
|
|
|
QIOChannel *socket_send_channel_create_sync(Error **errp)
|
|
|
|
{
|
|
|
|
QIOChannelSocket *sioc = qio_channel_socket_new();
|
|
|
|
|
|
|
|
if (!outgoing_args.saddr) {
|
|
|
|
object_unref(OBJECT(sioc));
|
|
|
|
error_setg(errp, "Initial sock address not set!");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (qio_channel_socket_connect_sync(sioc, outgoing_args.saddr, errp) < 0) {
|
|
|
|
object_unref(OBJECT(sioc));
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return QIO_CHANNEL(sioc);
|
|
|
|
}
|
|
|
|
|
2018-02-28 12:05:15 +01:00
|
|
|
int socket_send_channel_destroy(QIOChannel *send)
|
|
|
|
{
|
|
|
|
/* Remove channel */
|
|
|
|
object_unref(OBJECT(send));
|
|
|
|
if (outgoing_args.saddr) {
|
|
|
|
qapi_free_SocketAddress(outgoing_args.saddr);
|
|
|
|
outgoing_args.saddr = NULL;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
migration: add support for encrypting data with TLS
This extends the migration_set_incoming_channel and
migration_set_outgoing_channel methods so that they
will automatically wrap the QIOChannel in a
QIOChannelTLS instance if TLS credentials are configured
in the migration parameters.
This allows TLS to work for tcp, unix, fd and exec
migration protocols. It does not (currently) work for
RDMA since it does not use these APIs, but it is
unlikely that TLS would be desired with RDMA anyway
since it would degrade the performance to that seen
with TCP defeating the purpose of using RDMA.
On the target host, QEMU would be launched with a set
of TLS credentials for a server endpoint
$ qemu-system-x86_64 -monitor stdio -incoming defer \
-object tls-creds-x509,dir=/home/berrange/security/qemutls,endpoint=server,id=tls0 \
...other args...
To enable incoming TLS migration 2 monitor commands are
then used
(qemu) migrate_set_str_parameter tls-creds tls0
(qemu) migrate_incoming tcp:myhostname:9000
On the source host, QEMU is launched in a similar
manner but using client endpoint credentials
$ qemu-system-x86_64 -monitor stdio \
-object tls-creds-x509,dir=/home/berrange/security/qemutls,endpoint=client,id=tls0 \
...other args...
To enable outgoing TLS migration 2 monitor commands are
then used
(qemu) migrate_set_str_parameter tls-creds tls0
(qemu) migrate tcp:otherhostname:9000
Thanks to earlier improvements to error reporting,
TLS errors can be seen 'info migrate' when doing a
detached migration. For example:
(qemu) info migrate
capabilities: xbzrle: off rdma-pin-all: off auto-converge: off zero-blocks: off compress: off events: off x-postcopy-ram: off
Migration status: failed
total time: 0 milliseconds
error description: TLS handshake failed: The TLS connection was non-properly terminated.
Or
(qemu) info migrate
capabilities: xbzrle: off rdma-pin-all: off auto-converge: off zero-blocks: off compress: off events: off x-postcopy-ram: off
Migration status: failed
total time: 0 milliseconds
error description: Certificate does not match the hostname localhost
Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Message-Id: <1461751518-12128-27-git-send-email-berrange@redhat.com>
Signed-off-by: Amit Shah <amit.shah@redhat.com>
2016-04-27 12:05:16 +02:00
|
|
|
struct SocketConnectData {
|
|
|
|
MigrationState *s;
|
|
|
|
char *hostname;
|
|
|
|
};
|
|
|
|
|
|
|
|
static void socket_connect_data_free(void *opaque)
|
|
|
|
{
|
|
|
|
struct SocketConnectData *data = opaque;
|
|
|
|
if (!data) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
g_free(data->hostname);
|
|
|
|
g_free(data);
|
|
|
|
}
|
|
|
|
|
2016-08-11 16:20:58 +02:00
|
|
|
static void socket_outgoing_migration(QIOTask *task,
|
2016-04-27 12:05:03 +02:00
|
|
|
gpointer opaque)
|
2009-08-05 17:24:29 +02:00
|
|
|
{
|
migration: add support for encrypting data with TLS
This extends the migration_set_incoming_channel and
migration_set_outgoing_channel methods so that they
will automatically wrap the QIOChannel in a
QIOChannelTLS instance if TLS credentials are configured
in the migration parameters.
This allows TLS to work for tcp, unix, fd and exec
migration protocols. It does not (currently) work for
RDMA since it does not use these APIs, but it is
unlikely that TLS would be desired with RDMA anyway
since it would degrade the performance to that seen
with TCP defeating the purpose of using RDMA.
On the target host, QEMU would be launched with a set
of TLS credentials for a server endpoint
$ qemu-system-x86_64 -monitor stdio -incoming defer \
-object tls-creds-x509,dir=/home/berrange/security/qemutls,endpoint=server,id=tls0 \
...other args...
To enable incoming TLS migration 2 monitor commands are
then used
(qemu) migrate_set_str_parameter tls-creds tls0
(qemu) migrate_incoming tcp:myhostname:9000
On the source host, QEMU is launched in a similar
manner but using client endpoint credentials
$ qemu-system-x86_64 -monitor stdio \
-object tls-creds-x509,dir=/home/berrange/security/qemutls,endpoint=client,id=tls0 \
...other args...
To enable outgoing TLS migration 2 monitor commands are
then used
(qemu) migrate_set_str_parameter tls-creds tls0
(qemu) migrate tcp:otherhostname:9000
Thanks to earlier improvements to error reporting,
TLS errors can be seen 'info migrate' when doing a
detached migration. For example:
(qemu) info migrate
capabilities: xbzrle: off rdma-pin-all: off auto-converge: off zero-blocks: off compress: off events: off x-postcopy-ram: off
Migration status: failed
total time: 0 milliseconds
error description: TLS handshake failed: The TLS connection was non-properly terminated.
Or
(qemu) info migrate
capabilities: xbzrle: off rdma-pin-all: off auto-converge: off zero-blocks: off compress: off events: off x-postcopy-ram: off
Migration status: failed
total time: 0 milliseconds
error description: Certificate does not match the hostname localhost
Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Message-Id: <1461751518-12128-27-git-send-email-berrange@redhat.com>
Signed-off-by: Amit Shah <amit.shah@redhat.com>
2016-04-27 12:05:16 +02:00
|
|
|
struct SocketConnectData *data = opaque;
|
2016-08-11 16:20:58 +02:00
|
|
|
QIOChannel *sioc = QIO_CHANNEL(qio_task_get_source(task));
|
|
|
|
Error *err = NULL;
|
2009-08-05 17:24:29 +02:00
|
|
|
|
2016-08-11 16:20:58 +02:00
|
|
|
if (qio_task_propagate_error(task, &err)) {
|
2016-04-27 12:05:03 +02:00
|
|
|
trace_migration_socket_outgoing_error(error_get_pretty(err));
|
2022-05-13 08:28:33 +02:00
|
|
|
goto out;
|
2009-08-05 17:24:29 +02:00
|
|
|
}
|
2022-05-13 08:28:33 +02:00
|
|
|
|
|
|
|
trace_migration_socket_outgoing_connected(data->hostname);
|
|
|
|
|
2023-03-01 22:17:14 +01:00
|
|
|
if (migrate_zero_copy_send() &&
|
2022-05-13 08:28:37 +02:00
|
|
|
!qio_channel_has_feature(sioc, QIO_CHANNEL_FEATURE_WRITE_ZERO_COPY)) {
|
|
|
|
error_setg(&err, "Zero copy send feature not detected in host kernel");
|
2022-05-13 08:28:33 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
2017-12-15 18:16:55 +01:00
|
|
|
migration_channel_connect(data->s, sioc, data->hostname, err);
|
2016-08-11 16:20:58 +02:00
|
|
|
object_unref(OBJECT(sioc));
|
2009-08-05 17:24:29 +02:00
|
|
|
}
|
|
|
|
|
2020-08-06 09:40:29 +02:00
|
|
|
static void
|
|
|
|
socket_start_outgoing_migration_internal(MigrationState *s,
|
|
|
|
SocketAddress *saddr,
|
|
|
|
Error **errp)
|
2009-08-05 17:24:29 +02:00
|
|
|
{
|
2016-04-27 12:05:03 +02:00
|
|
|
QIOChannelSocket *sioc = qio_channel_socket_new();
|
migration: add support for encrypting data with TLS
This extends the migration_set_incoming_channel and
migration_set_outgoing_channel methods so that they
will automatically wrap the QIOChannel in a
QIOChannelTLS instance if TLS credentials are configured
in the migration parameters.
This allows TLS to work for tcp, unix, fd and exec
migration protocols. It does not (currently) work for
RDMA since it does not use these APIs, but it is
unlikely that TLS would be desired with RDMA anyway
since it would degrade the performance to that seen
with TCP defeating the purpose of using RDMA.
On the target host, QEMU would be launched with a set
of TLS credentials for a server endpoint
$ qemu-system-x86_64 -monitor stdio -incoming defer \
-object tls-creds-x509,dir=/home/berrange/security/qemutls,endpoint=server,id=tls0 \
...other args...
To enable incoming TLS migration 2 monitor commands are
then used
(qemu) migrate_set_str_parameter tls-creds tls0
(qemu) migrate_incoming tcp:myhostname:9000
On the source host, QEMU is launched in a similar
manner but using client endpoint credentials
$ qemu-system-x86_64 -monitor stdio \
-object tls-creds-x509,dir=/home/berrange/security/qemutls,endpoint=client,id=tls0 \
...other args...
To enable outgoing TLS migration 2 monitor commands are
then used
(qemu) migrate_set_str_parameter tls-creds tls0
(qemu) migrate tcp:otherhostname:9000
Thanks to earlier improvements to error reporting,
TLS errors can be seen 'info migrate' when doing a
detached migration. For example:
(qemu) info migrate
capabilities: xbzrle: off rdma-pin-all: off auto-converge: off zero-blocks: off compress: off events: off x-postcopy-ram: off
Migration status: failed
total time: 0 milliseconds
error description: TLS handshake failed: The TLS connection was non-properly terminated.
Or
(qemu) info migrate
capabilities: xbzrle: off rdma-pin-all: off auto-converge: off zero-blocks: off compress: off events: off x-postcopy-ram: off
Migration status: failed
total time: 0 milliseconds
error description: Certificate does not match the hostname localhost
Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Message-Id: <1461751518-12128-27-git-send-email-berrange@redhat.com>
Signed-off-by: Amit Shah <amit.shah@redhat.com>
2016-04-27 12:05:16 +02:00
|
|
|
struct SocketConnectData *data = g_new0(struct SocketConnectData, 1);
|
2016-07-28 10:54:34 +02:00
|
|
|
|
migration: add support for encrypting data with TLS
This extends the migration_set_incoming_channel and
migration_set_outgoing_channel methods so that they
will automatically wrap the QIOChannel in a
QIOChannelTLS instance if TLS credentials are configured
in the migration parameters.
This allows TLS to work for tcp, unix, fd and exec
migration protocols. It does not (currently) work for
RDMA since it does not use these APIs, but it is
unlikely that TLS would be desired with RDMA anyway
since it would degrade the performance to that seen
with TCP defeating the purpose of using RDMA.
On the target host, QEMU would be launched with a set
of TLS credentials for a server endpoint
$ qemu-system-x86_64 -monitor stdio -incoming defer \
-object tls-creds-x509,dir=/home/berrange/security/qemutls,endpoint=server,id=tls0 \
...other args...
To enable incoming TLS migration 2 monitor commands are
then used
(qemu) migrate_set_str_parameter tls-creds tls0
(qemu) migrate_incoming tcp:myhostname:9000
On the source host, QEMU is launched in a similar
manner but using client endpoint credentials
$ qemu-system-x86_64 -monitor stdio \
-object tls-creds-x509,dir=/home/berrange/security/qemutls,endpoint=client,id=tls0 \
...other args...
To enable outgoing TLS migration 2 monitor commands are
then used
(qemu) migrate_set_str_parameter tls-creds tls0
(qemu) migrate tcp:otherhostname:9000
Thanks to earlier improvements to error reporting,
TLS errors can be seen 'info migrate' when doing a
detached migration. For example:
(qemu) info migrate
capabilities: xbzrle: off rdma-pin-all: off auto-converge: off zero-blocks: off compress: off events: off x-postcopy-ram: off
Migration status: failed
total time: 0 milliseconds
error description: TLS handshake failed: The TLS connection was non-properly terminated.
Or
(qemu) info migrate
capabilities: xbzrle: off rdma-pin-all: off auto-converge: off zero-blocks: off compress: off events: off x-postcopy-ram: off
Migration status: failed
total time: 0 milliseconds
error description: Certificate does not match the hostname localhost
Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Message-Id: <1461751518-12128-27-git-send-email-berrange@redhat.com>
Signed-off-by: Amit Shah <amit.shah@redhat.com>
2016-04-27 12:05:16 +02:00
|
|
|
data->s = s;
|
2018-02-28 12:05:15 +01:00
|
|
|
|
|
|
|
/* in case previous migration leaked it */
|
|
|
|
qapi_free_SocketAddress(outgoing_args.saddr);
|
|
|
|
outgoing_args.saddr = saddr;
|
|
|
|
|
2017-04-26 09:36:41 +02:00
|
|
|
if (saddr->type == SOCKET_ADDRESS_TYPE_INET) {
|
|
|
|
data->hostname = g_strdup(saddr->u.inet.host);
|
migration: add support for encrypting data with TLS
This extends the migration_set_incoming_channel and
migration_set_outgoing_channel methods so that they
will automatically wrap the QIOChannel in a
QIOChannelTLS instance if TLS credentials are configured
in the migration parameters.
This allows TLS to work for tcp, unix, fd and exec
migration protocols. It does not (currently) work for
RDMA since it does not use these APIs, but it is
unlikely that TLS would be desired with RDMA anyway
since it would degrade the performance to that seen
with TCP defeating the purpose of using RDMA.
On the target host, QEMU would be launched with a set
of TLS credentials for a server endpoint
$ qemu-system-x86_64 -monitor stdio -incoming defer \
-object tls-creds-x509,dir=/home/berrange/security/qemutls,endpoint=server,id=tls0 \
...other args...
To enable incoming TLS migration 2 monitor commands are
then used
(qemu) migrate_set_str_parameter tls-creds tls0
(qemu) migrate_incoming tcp:myhostname:9000
On the source host, QEMU is launched in a similar
manner but using client endpoint credentials
$ qemu-system-x86_64 -monitor stdio \
-object tls-creds-x509,dir=/home/berrange/security/qemutls,endpoint=client,id=tls0 \
...other args...
To enable outgoing TLS migration 2 monitor commands are
then used
(qemu) migrate_set_str_parameter tls-creds tls0
(qemu) migrate tcp:otherhostname:9000
Thanks to earlier improvements to error reporting,
TLS errors can be seen 'info migrate' when doing a
detached migration. For example:
(qemu) info migrate
capabilities: xbzrle: off rdma-pin-all: off auto-converge: off zero-blocks: off compress: off events: off x-postcopy-ram: off
Migration status: failed
total time: 0 milliseconds
error description: TLS handshake failed: The TLS connection was non-properly terminated.
Or
(qemu) info migrate
capabilities: xbzrle: off rdma-pin-all: off auto-converge: off zero-blocks: off compress: off events: off x-postcopy-ram: off
Migration status: failed
total time: 0 milliseconds
error description: Certificate does not match the hostname localhost
Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Message-Id: <1461751518-12128-27-git-send-email-berrange@redhat.com>
Signed-off-by: Amit Shah <amit.shah@redhat.com>
2016-04-27 12:05:16 +02:00
|
|
|
}
|
2016-07-28 10:54:34 +02:00
|
|
|
|
2016-09-30 12:57:14 +02:00
|
|
|
qio_channel_set_name(QIO_CHANNEL(sioc), "migration-socket-outgoing");
|
2016-04-27 12:05:02 +02:00
|
|
|
qio_channel_socket_connect_async(sioc,
|
|
|
|
saddr,
|
2016-04-27 12:05:03 +02:00
|
|
|
socket_outgoing_migration,
|
migration: add support for encrypting data with TLS
This extends the migration_set_incoming_channel and
migration_set_outgoing_channel methods so that they
will automatically wrap the QIOChannel in a
QIOChannelTLS instance if TLS credentials are configured
in the migration parameters.
This allows TLS to work for tcp, unix, fd and exec
migration protocols. It does not (currently) work for
RDMA since it does not use these APIs, but it is
unlikely that TLS would be desired with RDMA anyway
since it would degrade the performance to that seen
with TCP defeating the purpose of using RDMA.
On the target host, QEMU would be launched with a set
of TLS credentials for a server endpoint
$ qemu-system-x86_64 -monitor stdio -incoming defer \
-object tls-creds-x509,dir=/home/berrange/security/qemutls,endpoint=server,id=tls0 \
...other args...
To enable incoming TLS migration 2 monitor commands are
then used
(qemu) migrate_set_str_parameter tls-creds tls0
(qemu) migrate_incoming tcp:myhostname:9000
On the source host, QEMU is launched in a similar
manner but using client endpoint credentials
$ qemu-system-x86_64 -monitor stdio \
-object tls-creds-x509,dir=/home/berrange/security/qemutls,endpoint=client,id=tls0 \
...other args...
To enable outgoing TLS migration 2 monitor commands are
then used
(qemu) migrate_set_str_parameter tls-creds tls0
(qemu) migrate tcp:otherhostname:9000
Thanks to earlier improvements to error reporting,
TLS errors can be seen 'info migrate' when doing a
detached migration. For example:
(qemu) info migrate
capabilities: xbzrle: off rdma-pin-all: off auto-converge: off zero-blocks: off compress: off events: off x-postcopy-ram: off
Migration status: failed
total time: 0 milliseconds
error description: TLS handshake failed: The TLS connection was non-properly terminated.
Or
(qemu) info migrate
capabilities: xbzrle: off rdma-pin-all: off auto-converge: off zero-blocks: off compress: off events: off x-postcopy-ram: off
Migration status: failed
total time: 0 milliseconds
error description: Certificate does not match the hostname localhost
Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Message-Id: <1461751518-12128-27-git-send-email-berrange@redhat.com>
Signed-off-by: Amit Shah <amit.shah@redhat.com>
2016-04-27 12:05:16 +02:00
|
|
|
data,
|
2018-03-05 07:43:23 +01:00
|
|
|
socket_connect_data_free,
|
|
|
|
NULL);
|
2009-08-05 17:24:29 +02:00
|
|
|
}
|
|
|
|
|
2020-08-06 09:40:29 +02:00
|
|
|
void socket_start_outgoing_migration(MigrationState *s,
|
|
|
|
const char *str,
|
|
|
|
Error **errp)
|
2016-04-27 12:05:04 +02:00
|
|
|
{
|
2016-09-13 11:08:41 +02:00
|
|
|
Error *err = NULL;
|
2020-08-06 09:40:29 +02:00
|
|
|
SocketAddress *saddr = socket_parse(str, &err);
|
2016-09-13 11:08:41 +02:00
|
|
|
if (!err) {
|
2020-08-06 09:40:29 +02:00
|
|
|
socket_start_outgoing_migration_internal(s, saddr, &err);
|
2016-09-13 11:08:41 +02:00
|
|
|
}
|
|
|
|
error_propagate(errp, err);
|
2016-04-27 12:05:04 +02:00
|
|
|
}
|
|
|
|
|
2018-03-12 15:17:14 +01:00
|
|
|
static void socket_accept_incoming_migration(QIONetListener *listener,
|
|
|
|
QIOChannelSocket *cioc,
|
|
|
|
gpointer opaque)
|
2009-08-05 17:24:29 +02:00
|
|
|
{
|
2016-04-27 12:05:03 +02:00
|
|
|
trace_migration_socket_incoming_accepted();
|
2016-04-27 12:05:02 +02:00
|
|
|
|
2017-07-24 13:06:25 +02:00
|
|
|
if (migration_has_all_channels()) {
|
2021-04-21 13:28:33 +02:00
|
|
|
error_report("%s: Extra incoming migration connection; ignoring",
|
|
|
|
__func__);
|
|
|
|
return;
|
2017-07-24 13:06:25 +02:00
|
|
|
}
|
2021-04-21 13:28:33 +02:00
|
|
|
|
|
|
|
qio_channel_set_name(QIO_CHANNEL(cioc), "migration-socket-incoming");
|
|
|
|
migration_channel_process_incoming(QIO_CHANNEL(cioc));
|
2009-08-05 17:24:29 +02:00
|
|
|
}
|
|
|
|
|
2021-04-21 13:28:33 +02:00
|
|
|
static void
|
|
|
|
socket_incoming_migration_end(void *opaque)
|
|
|
|
{
|
|
|
|
QIONetListener *listener = opaque;
|
|
|
|
|
|
|
|
qio_net_listener_disconnect(listener);
|
|
|
|
object_unref(OBJECT(listener));
|
|
|
|
}
|
2016-04-27 12:05:02 +02:00
|
|
|
|
2020-08-06 09:40:29 +02:00
|
|
|
static void
|
|
|
|
socket_start_incoming_migration_internal(SocketAddress *saddr,
|
|
|
|
Error **errp)
|
2009-08-05 17:24:29 +02:00
|
|
|
{
|
2018-03-12 15:17:14 +01:00
|
|
|
QIONetListener *listener = qio_net_listener_new();
|
2021-04-21 13:28:33 +02:00
|
|
|
MigrationIncomingState *mis = migration_incoming_get_current();
|
2019-02-27 11:51:27 +01:00
|
|
|
size_t i;
|
2019-08-19 18:14:44 +02:00
|
|
|
int num = 1;
|
2009-08-05 17:24:29 +02:00
|
|
|
|
2018-03-12 15:17:14 +01:00
|
|
|
qio_net_listener_set_name(listener, "migration-socket-listener");
|
2016-09-30 12:57:14 +02:00
|
|
|
|
2023-03-01 22:10:29 +01:00
|
|
|
if (migrate_multifd()) {
|
2019-08-19 18:14:44 +02:00
|
|
|
num = migrate_multifd_channels();
|
2022-07-07 20:55:02 +02:00
|
|
|
} else if (migrate_postcopy_preempt()) {
|
|
|
|
num = RAM_CHANNEL_MAX;
|
2019-08-19 18:14:44 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (qio_net_listener_open_sync(listener, saddr, num, errp) < 0) {
|
2018-03-12 15:17:14 +01:00
|
|
|
object_unref(OBJECT(listener));
|
2012-10-02 18:21:18 +02:00
|
|
|
return;
|
2009-08-05 17:24:29 +02:00
|
|
|
}
|
|
|
|
|
2021-04-21 13:28:33 +02:00
|
|
|
mis->transport_data = listener;
|
|
|
|
mis->transport_cleanup = socket_incoming_migration_end;
|
|
|
|
|
2018-05-02 12:47:17 +02:00
|
|
|
qio_net_listener_set_client_func_full(listener,
|
|
|
|
socket_accept_incoming_migration,
|
|
|
|
NULL, NULL,
|
|
|
|
g_main_context_get_thread_default());
|
2019-02-27 11:51:27 +01:00
|
|
|
|
|
|
|
for (i = 0; i < listener->nsioc; i++) {
|
|
|
|
SocketAddress *address =
|
|
|
|
qio_channel_socket_get_local_address(listener->sioc[i], errp);
|
|
|
|
if (!address) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
migrate_add_address(address);
|
2019-03-12 14:50:50 +01:00
|
|
|
qapi_free_SocketAddress(address);
|
2019-02-27 11:51:27 +01:00
|
|
|
}
|
2009-08-05 17:24:29 +02:00
|
|
|
}
|
2016-04-27 12:05:03 +02:00
|
|
|
|
2020-08-06 09:40:29 +02:00
|
|
|
void socket_start_incoming_migration(const char *str, Error **errp)
|
2016-04-27 12:05:04 +02:00
|
|
|
{
|
2016-09-13 11:08:41 +02:00
|
|
|
Error *err = NULL;
|
2020-08-06 09:40:29 +02:00
|
|
|
SocketAddress *saddr = socket_parse(str, &err);
|
2016-09-13 11:08:41 +02:00
|
|
|
if (!err) {
|
2020-08-06 09:40:29 +02:00
|
|
|
socket_start_incoming_migration_internal(saddr, &err);
|
2016-09-13 11:08:41 +02:00
|
|
|
}
|
2017-10-27 12:23:29 +02:00
|
|
|
qapi_free_SocketAddress(saddr);
|
2016-09-13 11:08:41 +02:00
|
|
|
error_propagate(errp, err);
|
2016-04-27 12:05:04 +02:00
|
|
|
}
|