| /* |
| * QEMU System Emulator |
| * |
| * Copyright (c) 2003-2008 Fabrice Bellard |
| * Copyright (c) 2011-2015 Red Hat Inc |
| * |
| * Authors: |
| * Juan Quintela <quintela@redhat.com> |
| * |
| * Permission is hereby granted, free of charge, to any person obtaining a copy |
| * of this software and associated documentation files (the "Software"), to deal |
| * in the Software without restriction, including without limitation the rights |
| * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell |
| * copies of the Software, and to permit persons to whom the Software is |
| * furnished to do so, subject to the following conditions: |
| * |
| * The above copyright notice and this permission notice shall be included in |
| * all copies or substantial portions of the Software. |
| * |
| * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR |
| * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, |
| * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL |
| * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER |
| * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, |
| * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN |
| * THE SOFTWARE. |
| */ |
| |
| #include "qemu/osdep.h" |
| #include "qemu/cutils.h" |
| #include "qemu/bitops.h" |
| #include "qemu/bitmap.h" |
| #include "qemu/madvise.h" |
| #include "qemu/main-loop.h" |
| #include "xbzrle.h" |
| #include "ram.h" |
| #include "migration.h" |
| #include "migration-stats.h" |
| #include "migration/register.h" |
| #include "migration/misc.h" |
| #include "qemu-file.h" |
| #include "postcopy-ram.h" |
| #include "page_cache.h" |
| #include "qemu/error-report.h" |
| #include "qapi/error.h" |
| #include "qapi/qapi-types-migration.h" |
| #include "qapi/qapi-events-migration.h" |
| #include "qapi/qapi-commands-migration.h" |
| #include "qapi/qmp/qerror.h" |
| #include "trace.h" |
| #include "exec/ram_addr.h" |
| #include "exec/target_page.h" |
| #include "qemu/rcu_queue.h" |
| #include "migration/colo.h" |
| #include "sysemu/cpu-throttle.h" |
| #include "savevm.h" |
| #include "qemu/iov.h" |
| #include "multifd.h" |
| #include "sysemu/runstate.h" |
| #include "rdma.h" |
| #include "options.h" |
| #include "sysemu/dirtylimit.h" |
| #include "sysemu/kvm.h" |
| |
| #include "hw/boards.h" /* for machine_dump_guest_core() */ |
| |
| #if defined(__linux__) |
| #include "qemu/userfaultfd.h" |
| #endif /* defined(__linux__) */ |
| |
| /***********************************************************/ |
| /* ram save/restore */ |
| |
| /* |
| * RAM_SAVE_FLAG_ZERO used to be named RAM_SAVE_FLAG_COMPRESS, it |
| * worked for pages that were filled with the same char. We switched |
| * it to only search for the zero value. And to avoid confusion with |
| * RAM_SAVE_FLAG_COMPRESS_PAGE just rename it. |
| * |
| * RAM_SAVE_FLAG_FULL was obsoleted in 2009. |
| * |
| * RAM_SAVE_FLAG_COMPRESS_PAGE (0x100) was removed in QEMU 9.1. |
| */ |
| #define RAM_SAVE_FLAG_FULL 0x01 |
| #define RAM_SAVE_FLAG_ZERO 0x02 |
| #define RAM_SAVE_FLAG_MEM_SIZE 0x04 |
| #define RAM_SAVE_FLAG_PAGE 0x08 |
| #define RAM_SAVE_FLAG_EOS 0x10 |
| #define RAM_SAVE_FLAG_CONTINUE 0x20 |
| #define RAM_SAVE_FLAG_XBZRLE 0x40 |
| /* 0x80 is reserved in rdma.h for RAM_SAVE_FLAG_HOOK */ |
| #define RAM_SAVE_FLAG_MULTIFD_FLUSH 0x200 |
| /* We can't use any flag that is bigger than 0x200 */ |
| |
| /* |
| * mapped-ram migration supports O_DIRECT, so we need to make sure the |
| * userspace buffer, the IO operation size and the file offset are |
| * aligned according to the underlying device's block size. The first |
| * two are already aligned to page size, but we need to add padding to |
| * the file to align the offset. We cannot read the block size |
| * dynamically because the migration file can be moved between |
| * different systems, so use 1M to cover most block sizes and to keep |
| * the file offset aligned at page size as well. |
| */ |
| #define MAPPED_RAM_FILE_OFFSET_ALIGNMENT 0x100000 |
| |
| /* |
| * When doing mapped-ram migration, this is the amount we read from |
| * the pages region in the migration file at a time. |
| */ |
| #define MAPPED_RAM_LOAD_BUF_SIZE 0x100000 |
| |
| XBZRLECacheStats xbzrle_counters; |
| |
| /* used by the search for pages to send */ |
| struct PageSearchStatus { |
| /* The migration channel used for a specific host page */ |
| QEMUFile *pss_channel; |
| /* Last block from where we have sent data */ |
| RAMBlock *last_sent_block; |
| /* Current block being searched */ |
| RAMBlock *block; |
| /* Current page to search from */ |
| unsigned long page; |
| /* Set once we wrap around */ |
| bool complete_round; |
| /* Whether we're sending a host page */ |
| bool host_page_sending; |
| /* The start/end of current host page. Invalid if host_page_sending==false */ |
| unsigned long host_page_start; |
| unsigned long host_page_end; |
| }; |
| typedef struct PageSearchStatus PageSearchStatus; |
| |
| /* struct contains XBZRLE cache and a static page |
| used by the compression */ |
| static struct { |
| /* buffer used for XBZRLE encoding */ |
| uint8_t *encoded_buf; |
| /* buffer for storing page content */ |
| uint8_t *current_buf; |
| /* Cache for XBZRLE, Protected by lock. */ |
| PageCache *cache; |
| QemuMutex lock; |
| /* it will store a page full of zeros */ |
| uint8_t *zero_target_page; |
| /* buffer used for XBZRLE decoding */ |
| uint8_t *decoded_buf; |
| } XBZRLE; |
| |
| static void XBZRLE_cache_lock(void) |
| { |
| if (migrate_xbzrle()) { |
| qemu_mutex_lock(&XBZRLE.lock); |
| } |
| } |
| |
| static void XBZRLE_cache_unlock(void) |
| { |
| if (migrate_xbzrle()) { |
| qemu_mutex_unlock(&XBZRLE.lock); |
| } |
| } |
| |
| /** |
| * xbzrle_cache_resize: resize the xbzrle cache |
| * |
| * This function is called from migrate_params_apply in main |
| * thread, possibly while a migration is in progress. A running |
| * migration may be using the cache and might finish during this call, |
| * hence changes to the cache are protected by XBZRLE.lock(). |
| * |
| * Returns 0 for success or -1 for error |
| * |
| * @new_size: new cache size |
| * @errp: set *errp if the check failed, with reason |
| */ |
| int xbzrle_cache_resize(uint64_t new_size, Error **errp) |
| { |
| PageCache *new_cache; |
| int64_t ret = 0; |
| |
| /* Check for truncation */ |
| if (new_size != (size_t)new_size) { |
| error_setg(errp, QERR_INVALID_PARAMETER_VALUE, "cache size", |
| "exceeding address space"); |
| return -1; |
| } |
| |
| if (new_size == migrate_xbzrle_cache_size()) { |
| /* nothing to do */ |
| return 0; |
| } |
| |
| XBZRLE_cache_lock(); |
| |
| if (XBZRLE.cache != NULL) { |
| new_cache = cache_init(new_size, TARGET_PAGE_SIZE, errp); |
| if (!new_cache) { |
| ret = -1; |
| goto out; |
| } |
| |
| cache_fini(XBZRLE.cache); |
| XBZRLE.cache = new_cache; |
| } |
| out: |
| XBZRLE_cache_unlock(); |
| return ret; |
| } |
| |
| static bool postcopy_preempt_active(void) |
| { |
| return migrate_postcopy_preempt() && migration_in_postcopy(); |
| } |
| |
| bool migrate_ram_is_ignored(RAMBlock *block) |
| { |
| return !qemu_ram_is_migratable(block) || |
| (migrate_ignore_shared() && qemu_ram_is_shared(block) |
| && qemu_ram_is_named_file(block)); |
| } |
| |
| #undef RAMBLOCK_FOREACH |
| |
| int foreach_not_ignored_block(RAMBlockIterFunc func, void *opaque) |
| { |
| RAMBlock *block; |
| int ret = 0; |
| |
| RCU_READ_LOCK_GUARD(); |
| |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| ret = func(block, opaque); |
| if (ret) { |
| break; |
| } |
| } |
| return ret; |
| } |
| |
| static void ramblock_recv_map_init(void) |
| { |
| RAMBlock *rb; |
| |
| RAMBLOCK_FOREACH_NOT_IGNORED(rb) { |
| assert(!rb->receivedmap); |
| rb->receivedmap = bitmap_new(rb->max_length >> qemu_target_page_bits()); |
| } |
| } |
| |
| int ramblock_recv_bitmap_test(RAMBlock *rb, void *host_addr) |
| { |
| return test_bit(ramblock_recv_bitmap_offset(host_addr, rb), |
| rb->receivedmap); |
| } |
| |
| bool ramblock_recv_bitmap_test_byte_offset(RAMBlock *rb, uint64_t byte_offset) |
| { |
| return test_bit(byte_offset >> TARGET_PAGE_BITS, rb->receivedmap); |
| } |
| |
| void ramblock_recv_bitmap_set(RAMBlock *rb, void *host_addr) |
| { |
| set_bit_atomic(ramblock_recv_bitmap_offset(host_addr, rb), rb->receivedmap); |
| } |
| |
| void ramblock_recv_bitmap_set_range(RAMBlock *rb, void *host_addr, |
| size_t nr) |
| { |
| bitmap_set_atomic(rb->receivedmap, |
| ramblock_recv_bitmap_offset(host_addr, rb), |
| nr); |
| } |
| |
| void ramblock_recv_bitmap_set_offset(RAMBlock *rb, uint64_t byte_offset) |
| { |
| set_bit_atomic(byte_offset >> TARGET_PAGE_BITS, rb->receivedmap); |
| } |
| #define RAMBLOCK_RECV_BITMAP_ENDING (0x0123456789abcdefULL) |
| |
| /* |
| * Format: bitmap_size (8 bytes) + whole_bitmap (N bytes). |
| * |
| * Returns >0 if success with sent bytes, or <0 if error. |
| */ |
| int64_t ramblock_recv_bitmap_send(QEMUFile *file, |
| const char *block_name) |
| { |
| RAMBlock *block = qemu_ram_block_by_name(block_name); |
| unsigned long *le_bitmap, nbits; |
| uint64_t size; |
| |
| if (!block) { |
| error_report("%s: invalid block name: %s", __func__, block_name); |
| return -1; |
| } |
| |
| nbits = block->postcopy_length >> TARGET_PAGE_BITS; |
| |
| /* |
| * Make sure the tmp bitmap buffer is big enough, e.g., on 32bit |
| * machines we may need 4 more bytes for padding (see below |
| * comment). So extend it a bit before hand. |
| */ |
| le_bitmap = bitmap_new(nbits + BITS_PER_LONG); |
| |
| /* |
| * Always use little endian when sending the bitmap. This is |
| * required that when source and destination VMs are not using the |
| * same endianness. (Note: big endian won't work.) |
| */ |
| bitmap_to_le(le_bitmap, block->receivedmap, nbits); |
| |
| /* Size of the bitmap, in bytes */ |
| size = DIV_ROUND_UP(nbits, 8); |
| |
| /* |
| * size is always aligned to 8 bytes for 64bit machines, but it |
| * may not be true for 32bit machines. We need this padding to |
| * make sure the migration can survive even between 32bit and |
| * 64bit machines. |
| */ |
| size = ROUND_UP(size, 8); |
| |
| qemu_put_be64(file, size); |
| qemu_put_buffer(file, (const uint8_t *)le_bitmap, size); |
| g_free(le_bitmap); |
| /* |
| * Mark as an end, in case the middle part is screwed up due to |
| * some "mysterious" reason. |
| */ |
| qemu_put_be64(file, RAMBLOCK_RECV_BITMAP_ENDING); |
| int ret = qemu_fflush(file); |
| if (ret) { |
| return ret; |
| } |
| |
| return size + sizeof(size); |
| } |
| |
| /* |
| * An outstanding page request, on the source, having been received |
| * and queued |
| */ |
| struct RAMSrcPageRequest { |
| RAMBlock *rb; |
| hwaddr offset; |
| hwaddr len; |
| |
| QSIMPLEQ_ENTRY(RAMSrcPageRequest) next_req; |
| }; |
| |
| /* State of RAM for migration */ |
| struct RAMState { |
| /* |
| * PageSearchStatus structures for the channels when send pages. |
| * Protected by the bitmap_mutex. |
| */ |
| PageSearchStatus pss[RAM_CHANNEL_MAX]; |
| /* UFFD file descriptor, used in 'write-tracking' migration */ |
| int uffdio_fd; |
| /* total ram size in bytes */ |
| uint64_t ram_bytes_total; |
| /* Last block that we have visited searching for dirty pages */ |
| RAMBlock *last_seen_block; |
| /* Last dirty target page we have sent */ |
| ram_addr_t last_page; |
| /* last ram version we have seen */ |
| uint32_t last_version; |
| /* How many times we have dirty too many pages */ |
| int dirty_rate_high_cnt; |
| /* these variables are used for bitmap sync */ |
| /* last time we did a full bitmap_sync */ |
| int64_t time_last_bitmap_sync; |
| /* bytes transferred at start_time */ |
| uint64_t bytes_xfer_prev; |
| /* number of dirty pages since start_time */ |
| uint64_t num_dirty_pages_period; |
| /* xbzrle misses since the beginning of the period */ |
| uint64_t xbzrle_cache_miss_prev; |
| /* Amount of xbzrle pages since the beginning of the period */ |
| uint64_t xbzrle_pages_prev; |
| /* Amount of xbzrle encoded bytes since the beginning of the period */ |
| uint64_t xbzrle_bytes_prev; |
| /* Are we really using XBZRLE (e.g., after the first round). */ |
| bool xbzrle_started; |
| /* Are we on the last stage of migration */ |
| bool last_stage; |
| |
| /* total handled target pages at the beginning of period */ |
| uint64_t target_page_count_prev; |
| /* total handled target pages since start */ |
| uint64_t target_page_count; |
| /* number of dirty bits in the bitmap */ |
| uint64_t migration_dirty_pages; |
| /* |
| * Protects: |
| * - dirty/clear bitmap |
| * - migration_dirty_pages |
| * - pss structures |
| */ |
| QemuMutex bitmap_mutex; |
| /* The RAMBlock used in the last src_page_requests */ |
| RAMBlock *last_req_rb; |
| /* Queue of outstanding page requests from the destination */ |
| QemuMutex src_page_req_mutex; |
| QSIMPLEQ_HEAD(, RAMSrcPageRequest) src_page_requests; |
| |
| /* |
| * This is only used when postcopy is in recovery phase, to communicate |
| * between the migration thread and the return path thread on dirty |
| * bitmap synchronizations. This field is unused in other stages of |
| * RAM migration. |
| */ |
| unsigned int postcopy_bmap_sync_requested; |
| }; |
| typedef struct RAMState RAMState; |
| |
| static RAMState *ram_state; |
| |
| static NotifierWithReturnList precopy_notifier_list; |
| |
| /* Whether postcopy has queued requests? */ |
| static bool postcopy_has_request(RAMState *rs) |
| { |
| return !QSIMPLEQ_EMPTY_ATOMIC(&rs->src_page_requests); |
| } |
| |
| void precopy_infrastructure_init(void) |
| { |
| notifier_with_return_list_init(&precopy_notifier_list); |
| } |
| |
| void precopy_add_notifier(NotifierWithReturn *n) |
| { |
| notifier_with_return_list_add(&precopy_notifier_list, n); |
| } |
| |
| void precopy_remove_notifier(NotifierWithReturn *n) |
| { |
| notifier_with_return_remove(n); |
| } |
| |
| int precopy_notify(PrecopyNotifyReason reason, Error **errp) |
| { |
| PrecopyNotifyData pnd; |
| pnd.reason = reason; |
| |
| return notifier_with_return_list_notify(&precopy_notifier_list, &pnd, errp); |
| } |
| |
| uint64_t ram_bytes_remaining(void) |
| { |
| return ram_state ? (ram_state->migration_dirty_pages * TARGET_PAGE_SIZE) : |
| 0; |
| } |
| |
| void ram_transferred_add(uint64_t bytes) |
| { |
| if (runstate_is_running()) { |
| stat64_add(&mig_stats.precopy_bytes, bytes); |
| } else if (migration_in_postcopy()) { |
| stat64_add(&mig_stats.postcopy_bytes, bytes); |
| } else { |
| stat64_add(&mig_stats.downtime_bytes, bytes); |
| } |
| } |
| |
| struct MigrationOps { |
| int (*ram_save_target_page)(RAMState *rs, PageSearchStatus *pss); |
| }; |
| typedef struct MigrationOps MigrationOps; |
| |
| MigrationOps *migration_ops; |
| |
| static int ram_save_host_page_urgent(PageSearchStatus *pss); |
| |
| /* NOTE: page is the PFN not real ram_addr_t. */ |
| static void pss_init(PageSearchStatus *pss, RAMBlock *rb, ram_addr_t page) |
| { |
| pss->block = rb; |
| pss->page = page; |
| pss->complete_round = false; |
| } |
| |
| /* |
| * Check whether two PSSs are actively sending the same page. Return true |
| * if it is, false otherwise. |
| */ |
| static bool pss_overlap(PageSearchStatus *pss1, PageSearchStatus *pss2) |
| { |
| return pss1->host_page_sending && pss2->host_page_sending && |
| (pss1->host_page_start == pss2->host_page_start); |
| } |
| |
| /** |
| * save_page_header: write page header to wire |
| * |
| * If this is the 1st block, it also writes the block identification |
| * |
| * Returns the number of bytes written |
| * |
| * @pss: current PSS channel status |
| * @block: block that contains the page we want to send |
| * @offset: offset inside the block for the page |
| * in the lower bits, it contains flags |
| */ |
| static size_t save_page_header(PageSearchStatus *pss, QEMUFile *f, |
| RAMBlock *block, ram_addr_t offset) |
| { |
| size_t size, len; |
| bool same_block = (block == pss->last_sent_block); |
| |
| if (same_block) { |
| offset |= RAM_SAVE_FLAG_CONTINUE; |
| } |
| qemu_put_be64(f, offset); |
| size = 8; |
| |
| if (!same_block) { |
| len = strlen(block->idstr); |
| qemu_put_byte(f, len); |
| qemu_put_buffer(f, (uint8_t *)block->idstr, len); |
| size += 1 + len; |
| pss->last_sent_block = block; |
| } |
| return size; |
| } |
| |
| /** |
| * mig_throttle_guest_down: throttle down the guest |
| * |
| * Reduce amount of guest cpu execution to hopefully slow down memory |
| * writes. If guest dirty memory rate is reduced below the rate at |
| * which we can transfer pages to the destination then we should be |
| * able to complete migration. Some workloads dirty memory way too |
| * fast and will not effectively converge, even with auto-converge. |
| */ |
| static void mig_throttle_guest_down(uint64_t bytes_dirty_period, |
| uint64_t bytes_dirty_threshold) |
| { |
| uint64_t pct_initial = migrate_cpu_throttle_initial(); |
| uint64_t pct_increment = migrate_cpu_throttle_increment(); |
| bool pct_tailslow = migrate_cpu_throttle_tailslow(); |
| int pct_max = migrate_max_cpu_throttle(); |
| |
| uint64_t throttle_now = cpu_throttle_get_percentage(); |
| uint64_t cpu_now, cpu_ideal, throttle_inc; |
| |
| /* We have not started throttling yet. Let's start it. */ |
| if (!cpu_throttle_active()) { |
| cpu_throttle_set(pct_initial); |
| } else { |
| /* Throttling already on, just increase the rate */ |
| if (!pct_tailslow) { |
| throttle_inc = pct_increment; |
| } else { |
| /* Compute the ideal CPU percentage used by Guest, which may |
| * make the dirty rate match the dirty rate threshold. */ |
| cpu_now = 100 - throttle_now; |
| cpu_ideal = cpu_now * (bytes_dirty_threshold * 1.0 / |
| bytes_dirty_period); |
| throttle_inc = MIN(cpu_now - cpu_ideal, pct_increment); |
| } |
| cpu_throttle_set(MIN(throttle_now + throttle_inc, pct_max)); |
| } |
| } |
| |
| void mig_throttle_counter_reset(void) |
| { |
| RAMState *rs = ram_state; |
| |
| rs->time_last_bitmap_sync = qemu_clock_get_ms(QEMU_CLOCK_REALTIME); |
| rs->num_dirty_pages_period = 0; |
| rs->bytes_xfer_prev = migration_transferred_bytes(); |
| } |
| |
| /** |
| * xbzrle_cache_zero_page: insert a zero page in the XBZRLE cache |
| * |
| * @current_addr: address for the zero page |
| * |
| * Update the xbzrle cache to reflect a page that's been sent as all 0. |
| * The important thing is that a stale (not-yet-0'd) page be replaced |
| * by the new data. |
| * As a bonus, if the page wasn't in the cache it gets added so that |
| * when a small write is made into the 0'd page it gets XBZRLE sent. |
| */ |
| static void xbzrle_cache_zero_page(ram_addr_t current_addr) |
| { |
| /* We don't care if this fails to allocate a new cache page |
| * as long as it updated an old one */ |
| cache_insert(XBZRLE.cache, current_addr, XBZRLE.zero_target_page, |
| stat64_get(&mig_stats.dirty_sync_count)); |
| } |
| |
| #define ENCODING_FLAG_XBZRLE 0x1 |
| |
| /** |
| * save_xbzrle_page: compress and send current page |
| * |
| * Returns: 1 means that we wrote the page |
| * 0 means that page is identical to the one already sent |
| * -1 means that xbzrle would be longer than normal |
| * |
| * @rs: current RAM state |
| * @pss: current PSS channel |
| * @current_data: pointer to the address of the page contents |
| * @current_addr: addr of the page |
| * @block: block that contains the page we want to send |
| * @offset: offset inside the block for the page |
| */ |
| static int save_xbzrle_page(RAMState *rs, PageSearchStatus *pss, |
| uint8_t **current_data, ram_addr_t current_addr, |
| RAMBlock *block, ram_addr_t offset) |
| { |
| int encoded_len = 0, bytes_xbzrle; |
| uint8_t *prev_cached_page; |
| QEMUFile *file = pss->pss_channel; |
| uint64_t generation = stat64_get(&mig_stats.dirty_sync_count); |
| |
| if (!cache_is_cached(XBZRLE.cache, current_addr, generation)) { |
| xbzrle_counters.cache_miss++; |
| if (!rs->last_stage) { |
| if (cache_insert(XBZRLE.cache, current_addr, *current_data, |
| generation) == -1) { |
| return -1; |
| } else { |
| /* update *current_data when the page has been |
| inserted into cache */ |
| *current_data = get_cached_data(XBZRLE.cache, current_addr); |
| } |
| } |
| return -1; |
| } |
| |
| /* |
| * Reaching here means the page has hit the xbzrle cache, no matter what |
| * encoding result it is (normal encoding, overflow or skipping the page), |
| * count the page as encoded. This is used to calculate the encoding rate. |
| * |
| * Example: 2 pages (8KB) being encoded, first page encoding generates 2KB, |
| * 2nd page turns out to be skipped (i.e. no new bytes written to the |
| * page), the overall encoding rate will be 8KB / 2KB = 4, which has the |
| * skipped page included. In this way, the encoding rate can tell if the |
| * guest page is good for xbzrle encoding. |
| */ |
| xbzrle_counters.pages++; |
| prev_cached_page = get_cached_data(XBZRLE.cache, current_addr); |
| |
| /* save current buffer into memory */ |
| memcpy(XBZRLE.current_buf, *current_data, TARGET_PAGE_SIZE); |
| |
| /* XBZRLE encoding (if there is no overflow) */ |
| encoded_len = xbzrle_encode_buffer(prev_cached_page, XBZRLE.current_buf, |
| TARGET_PAGE_SIZE, XBZRLE.encoded_buf, |
| TARGET_PAGE_SIZE); |
| |
| /* |
| * Update the cache contents, so that it corresponds to the data |
| * sent, in all cases except where we skip the page. |
| */ |
| if (!rs->last_stage && encoded_len != 0) { |
| memcpy(prev_cached_page, XBZRLE.current_buf, TARGET_PAGE_SIZE); |
| /* |
| * In the case where we couldn't compress, ensure that the caller |
| * sends the data from the cache, since the guest might have |
| * changed the RAM since we copied it. |
| */ |
| *current_data = prev_cached_page; |
| } |
| |
| if (encoded_len == 0) { |
| trace_save_xbzrle_page_skipping(); |
| return 0; |
| } else if (encoded_len == -1) { |
| trace_save_xbzrle_page_overflow(); |
| xbzrle_counters.overflow++; |
| xbzrle_counters.bytes += TARGET_PAGE_SIZE; |
| return -1; |
| } |
| |
| /* Send XBZRLE based compressed page */ |
| bytes_xbzrle = save_page_header(pss, pss->pss_channel, block, |
| offset | RAM_SAVE_FLAG_XBZRLE); |
| qemu_put_byte(file, ENCODING_FLAG_XBZRLE); |
| qemu_put_be16(file, encoded_len); |
| qemu_put_buffer(file, XBZRLE.encoded_buf, encoded_len); |
| bytes_xbzrle += encoded_len + 1 + 2; |
| /* |
| * The xbzrle encoded bytes don't count the 8 byte header with |
| * RAM_SAVE_FLAG_CONTINUE. |
| */ |
| xbzrle_counters.bytes += bytes_xbzrle - 8; |
| ram_transferred_add(bytes_xbzrle); |
| |
| return 1; |
| } |
| |
| /** |
| * pss_find_next_dirty: find the next dirty page of current ramblock |
| * |
| * This function updates pss->page to point to the next dirty page index |
| * within the ramblock to migrate, or the end of ramblock when nothing |
| * found. Note that when pss->host_page_sending==true it means we're |
| * during sending a host page, so we won't look for dirty page that is |
| * outside the host page boundary. |
| * |
| * @pss: the current page search status |
| */ |
| static void pss_find_next_dirty(PageSearchStatus *pss) |
| { |
| RAMBlock *rb = pss->block; |
| unsigned long size = rb->used_length >> TARGET_PAGE_BITS; |
| unsigned long *bitmap = rb->bmap; |
| |
| if (migrate_ram_is_ignored(rb)) { |
| /* Points directly to the end, so we know no dirty page */ |
| pss->page = size; |
| return; |
| } |
| |
| /* |
| * If during sending a host page, only look for dirty pages within the |
| * current host page being send. |
| */ |
| if (pss->host_page_sending) { |
| assert(pss->host_page_end); |
| size = MIN(size, pss->host_page_end); |
| } |
| |
| pss->page = find_next_bit(bitmap, size, pss->page); |
| } |
| |
| static void migration_clear_memory_region_dirty_bitmap(RAMBlock *rb, |
| unsigned long page) |
| { |
| uint8_t shift; |
| hwaddr size, start; |
| |
| if (!rb->clear_bmap || !clear_bmap_test_and_clear(rb, page)) { |
| return; |
| } |
| |
| shift = rb->clear_bmap_shift; |
| /* |
| * CLEAR_BITMAP_SHIFT_MIN should always guarantee this... this |
| * can make things easier sometimes since then start address |
| * of the small chunk will always be 64 pages aligned so the |
| * bitmap will always be aligned to unsigned long. We should |
| * even be able to remove this restriction but I'm simply |
| * keeping it. |
| */ |
| assert(shift >= 6); |
| |
| size = 1ULL << (TARGET_PAGE_BITS + shift); |
| start = QEMU_ALIGN_DOWN((ram_addr_t)page << TARGET_PAGE_BITS, size); |
| trace_migration_bitmap_clear_dirty(rb->idstr, start, size, page); |
| memory_region_clear_dirty_bitmap(rb->mr, start, size); |
| } |
| |
| static void |
| migration_clear_memory_region_dirty_bitmap_range(RAMBlock *rb, |
| unsigned long start, |
| unsigned long npages) |
| { |
| unsigned long i, chunk_pages = 1UL << rb->clear_bmap_shift; |
| unsigned long chunk_start = QEMU_ALIGN_DOWN(start, chunk_pages); |
| unsigned long chunk_end = QEMU_ALIGN_UP(start + npages, chunk_pages); |
| |
| /* |
| * Clear pages from start to start + npages - 1, so the end boundary is |
| * exclusive. |
| */ |
| for (i = chunk_start; i < chunk_end; i += chunk_pages) { |
| migration_clear_memory_region_dirty_bitmap(rb, i); |
| } |
| } |
| |
| /* |
| * colo_bitmap_find_diry:find contiguous dirty pages from start |
| * |
| * Returns the page offset within memory region of the start of the contiguout |
| * dirty page |
| * |
| * @rs: current RAM state |
| * @rb: RAMBlock where to search for dirty pages |
| * @start: page where we start the search |
| * @num: the number of contiguous dirty pages |
| */ |
| static inline |
| unsigned long colo_bitmap_find_dirty(RAMState *rs, RAMBlock *rb, |
| unsigned long start, unsigned long *num) |
| { |
| unsigned long size = rb->used_length >> TARGET_PAGE_BITS; |
| unsigned long *bitmap = rb->bmap; |
| unsigned long first, next; |
| |
| *num = 0; |
| |
| if (migrate_ram_is_ignored(rb)) { |
| return size; |
| } |
| |
| first = find_next_bit(bitmap, size, start); |
| if (first >= size) { |
| return first; |
| } |
| next = find_next_zero_bit(bitmap, size, first + 1); |
| assert(next >= first); |
| *num = next - first; |
| return first; |
| } |
| |
| static inline bool migration_bitmap_clear_dirty(RAMState *rs, |
| RAMBlock *rb, |
| unsigned long page) |
| { |
| bool ret; |
| |
| /* |
| * Clear dirty bitmap if needed. This _must_ be called before we |
| * send any of the page in the chunk because we need to make sure |
| * we can capture further page content changes when we sync dirty |
| * log the next time. So as long as we are going to send any of |
| * the page in the chunk we clear the remote dirty bitmap for all. |
| * Clearing it earlier won't be a problem, but too late will. |
| */ |
| migration_clear_memory_region_dirty_bitmap(rb, page); |
| |
| ret = test_and_clear_bit(page, rb->bmap); |
| if (ret) { |
| rs->migration_dirty_pages--; |
| } |
| |
| return ret; |
| } |
| |
| static void dirty_bitmap_clear_section(MemoryRegionSection *section, |
| void *opaque) |
| { |
| const hwaddr offset = section->offset_within_region; |
| const hwaddr size = int128_get64(section->size); |
| const unsigned long start = offset >> TARGET_PAGE_BITS; |
| const unsigned long npages = size >> TARGET_PAGE_BITS; |
| RAMBlock *rb = section->mr->ram_block; |
| uint64_t *cleared_bits = opaque; |
| |
| /* |
| * We don't grab ram_state->bitmap_mutex because we expect to run |
| * only when starting migration or during postcopy recovery where |
| * we don't have concurrent access. |
| */ |
| if (!migration_in_postcopy() && !migrate_background_snapshot()) { |
| migration_clear_memory_region_dirty_bitmap_range(rb, start, npages); |
| } |
| *cleared_bits += bitmap_count_one_with_offset(rb->bmap, start, npages); |
| bitmap_clear(rb->bmap, start, npages); |
| } |
| |
| /* |
| * Exclude all dirty pages from migration that fall into a discarded range as |
| * managed by a RamDiscardManager responsible for the mapped memory region of |
| * the RAMBlock. Clear the corresponding bits in the dirty bitmaps. |
| * |
| * Discarded pages ("logically unplugged") have undefined content and must |
| * not get migrated, because even reading these pages for migration might |
| * result in undesired behavior. |
| * |
| * Returns the number of cleared bits in the RAMBlock dirty bitmap. |
| * |
| * Note: The result is only stable while migrating (precopy/postcopy). |
| */ |
| static uint64_t ramblock_dirty_bitmap_clear_discarded_pages(RAMBlock *rb) |
| { |
| uint64_t cleared_bits = 0; |
| |
| if (rb->mr && rb->bmap && memory_region_has_ram_discard_manager(rb->mr)) { |
| RamDiscardManager *rdm = memory_region_get_ram_discard_manager(rb->mr); |
| MemoryRegionSection section = { |
| .mr = rb->mr, |
| .offset_within_region = 0, |
| .size = int128_make64(qemu_ram_get_used_length(rb)), |
| }; |
| |
| ram_discard_manager_replay_discarded(rdm, §ion, |
| dirty_bitmap_clear_section, |
| &cleared_bits); |
| } |
| return cleared_bits; |
| } |
| |
| /* |
| * Check if a host-page aligned page falls into a discarded range as managed by |
| * a RamDiscardManager responsible for the mapped memory region of the RAMBlock. |
| * |
| * Note: The result is only stable while migrating (precopy/postcopy). |
| */ |
| bool ramblock_page_is_discarded(RAMBlock *rb, ram_addr_t start) |
| { |
| if (rb->mr && memory_region_has_ram_discard_manager(rb->mr)) { |
| RamDiscardManager *rdm = memory_region_get_ram_discard_manager(rb->mr); |
| MemoryRegionSection section = { |
| .mr = rb->mr, |
| .offset_within_region = start, |
| .size = int128_make64(qemu_ram_pagesize(rb)), |
| }; |
| |
| return !ram_discard_manager_is_populated(rdm, §ion); |
| } |
| return false; |
| } |
| |
| /* Called with RCU critical section */ |
| static void ramblock_sync_dirty_bitmap(RAMState *rs, RAMBlock *rb) |
| { |
| uint64_t new_dirty_pages = |
| cpu_physical_memory_sync_dirty_bitmap(rb, 0, rb->used_length); |
| |
| rs->migration_dirty_pages += new_dirty_pages; |
| rs->num_dirty_pages_period += new_dirty_pages; |
| } |
| |
| /** |
| * ram_pagesize_summary: calculate all the pagesizes of a VM |
| * |
| * Returns a summary bitmap of the page sizes of all RAMBlocks |
| * |
| * For VMs with just normal pages this is equivalent to the host page |
| * size. If it's got some huge pages then it's the OR of all the |
| * different page sizes. |
| */ |
| uint64_t ram_pagesize_summary(void) |
| { |
| RAMBlock *block; |
| uint64_t summary = 0; |
| |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| summary |= block->page_size; |
| } |
| |
| return summary; |
| } |
| |
| uint64_t ram_get_total_transferred_pages(void) |
| { |
| return stat64_get(&mig_stats.normal_pages) + |
| stat64_get(&mig_stats.zero_pages) + |
| xbzrle_counters.pages; |
| } |
| |
| static void migration_update_rates(RAMState *rs, int64_t end_time) |
| { |
| uint64_t page_count = rs->target_page_count - rs->target_page_count_prev; |
| |
| /* calculate period counters */ |
| stat64_set(&mig_stats.dirty_pages_rate, |
| rs->num_dirty_pages_period * 1000 / |
| (end_time - rs->time_last_bitmap_sync)); |
| |
| if (!page_count) { |
| return; |
| } |
| |
| if (migrate_xbzrle()) { |
| double encoded_size, unencoded_size; |
| |
| xbzrle_counters.cache_miss_rate = (double)(xbzrle_counters.cache_miss - |
| rs->xbzrle_cache_miss_prev) / page_count; |
| rs->xbzrle_cache_miss_prev = xbzrle_counters.cache_miss; |
| unencoded_size = (xbzrle_counters.pages - rs->xbzrle_pages_prev) * |
| TARGET_PAGE_SIZE; |
| encoded_size = xbzrle_counters.bytes - rs->xbzrle_bytes_prev; |
| if (xbzrle_counters.pages == rs->xbzrle_pages_prev || !encoded_size) { |
| xbzrle_counters.encoding_rate = 0; |
| } else { |
| xbzrle_counters.encoding_rate = unencoded_size / encoded_size; |
| } |
| rs->xbzrle_pages_prev = xbzrle_counters.pages; |
| rs->xbzrle_bytes_prev = xbzrle_counters.bytes; |
| } |
| } |
| |
| /* |
| * Enable dirty-limit to throttle down the guest |
| */ |
| static void migration_dirty_limit_guest(void) |
| { |
| /* |
| * dirty page rate quota for all vCPUs fetched from |
| * migration parameter 'vcpu_dirty_limit' |
| */ |
| static int64_t quota_dirtyrate; |
| MigrationState *s = migrate_get_current(); |
| |
| /* |
| * If dirty limit already enabled and migration parameter |
| * vcpu-dirty-limit untouched. |
| */ |
| if (dirtylimit_in_service() && |
| quota_dirtyrate == s->parameters.vcpu_dirty_limit) { |
| return; |
| } |
| |
| quota_dirtyrate = s->parameters.vcpu_dirty_limit; |
| |
| /* |
| * Set all vCPU a quota dirtyrate, note that the second |
| * parameter will be ignored if setting all vCPU for the vm |
| */ |
| qmp_set_vcpu_dirty_limit(false, -1, quota_dirtyrate, NULL); |
| trace_migration_dirty_limit_guest(quota_dirtyrate); |
| } |
| |
| static void migration_trigger_throttle(RAMState *rs) |
| { |
| uint64_t threshold = migrate_throttle_trigger_threshold(); |
| uint64_t bytes_xfer_period = |
| migration_transferred_bytes() - rs->bytes_xfer_prev; |
| uint64_t bytes_dirty_period = rs->num_dirty_pages_period * TARGET_PAGE_SIZE; |
| uint64_t bytes_dirty_threshold = bytes_xfer_period * threshold / 100; |
| |
| /* |
| * The following detection logic can be refined later. For now: |
| * Check to see if the ratio between dirtied bytes and the approx. |
| * amount of bytes that just got transferred since the last time |
| * we were in this routine reaches the threshold. If that happens |
| * twice, start or increase throttling. |
| */ |
| if ((bytes_dirty_period > bytes_dirty_threshold) && |
| (++rs->dirty_rate_high_cnt >= 2)) { |
| rs->dirty_rate_high_cnt = 0; |
| if (migrate_auto_converge()) { |
| trace_migration_throttle(); |
| mig_throttle_guest_down(bytes_dirty_period, |
| bytes_dirty_threshold); |
| } else if (migrate_dirty_limit()) { |
| migration_dirty_limit_guest(); |
| } |
| } |
| } |
| |
| static void migration_bitmap_sync(RAMState *rs, bool last_stage) |
| { |
| RAMBlock *block; |
| int64_t end_time; |
| |
| stat64_add(&mig_stats.dirty_sync_count, 1); |
| |
| if (!rs->time_last_bitmap_sync) { |
| rs->time_last_bitmap_sync = qemu_clock_get_ms(QEMU_CLOCK_REALTIME); |
| } |
| |
| trace_migration_bitmap_sync_start(); |
| memory_global_dirty_log_sync(last_stage); |
| |
| WITH_QEMU_LOCK_GUARD(&rs->bitmap_mutex) { |
| WITH_RCU_READ_LOCK_GUARD() { |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| ramblock_sync_dirty_bitmap(rs, block); |
| } |
| stat64_set(&mig_stats.dirty_bytes_last_sync, ram_bytes_remaining()); |
| } |
| } |
| |
| memory_global_after_dirty_log_sync(); |
| trace_migration_bitmap_sync_end(rs->num_dirty_pages_period); |
| |
| end_time = qemu_clock_get_ms(QEMU_CLOCK_REALTIME); |
| |
| /* more than 1 second = 1000 millisecons */ |
| if (end_time > rs->time_last_bitmap_sync + 1000) { |
| migration_trigger_throttle(rs); |
| |
| migration_update_rates(rs, end_time); |
| |
| rs->target_page_count_prev = rs->target_page_count; |
| |
| /* reset period counters */ |
| rs->time_last_bitmap_sync = end_time; |
| rs->num_dirty_pages_period = 0; |
| rs->bytes_xfer_prev = migration_transferred_bytes(); |
| } |
| if (migrate_events()) { |
| uint64_t generation = stat64_get(&mig_stats.dirty_sync_count); |
| qapi_event_send_migration_pass(generation); |
| } |
| } |
| |
| static void migration_bitmap_sync_precopy(RAMState *rs, bool last_stage) |
| { |
| Error *local_err = NULL; |
| |
| /* |
| * The current notifier usage is just an optimization to migration, so we |
| * don't stop the normal migration process in the error case. |
| */ |
| if (precopy_notify(PRECOPY_NOTIFY_BEFORE_BITMAP_SYNC, &local_err)) { |
| error_report_err(local_err); |
| local_err = NULL; |
| } |
| |
| migration_bitmap_sync(rs, last_stage); |
| |
| if (precopy_notify(PRECOPY_NOTIFY_AFTER_BITMAP_SYNC, &local_err)) { |
| error_report_err(local_err); |
| } |
| } |
| |
| void ram_release_page(const char *rbname, uint64_t offset) |
| { |
| if (!migrate_release_ram() || !migration_in_postcopy()) { |
| return; |
| } |
| |
| ram_discard_range(rbname, offset, TARGET_PAGE_SIZE); |
| } |
| |
| /** |
| * save_zero_page: send the zero page to the stream |
| * |
| * Returns the number of pages written. |
| * |
| * @rs: current RAM state |
| * @pss: current PSS channel |
| * @offset: offset inside the block for the page |
| */ |
| static int save_zero_page(RAMState *rs, PageSearchStatus *pss, |
| ram_addr_t offset) |
| { |
| uint8_t *p = pss->block->host + offset; |
| QEMUFile *file = pss->pss_channel; |
| int len = 0; |
| |
| if (migrate_zero_page_detection() == ZERO_PAGE_DETECTION_NONE) { |
| return 0; |
| } |
| |
| if (!buffer_is_zero(p, TARGET_PAGE_SIZE)) { |
| return 0; |
| } |
| |
| stat64_add(&mig_stats.zero_pages, 1); |
| |
| if (migrate_mapped_ram()) { |
| /* zero pages are not transferred with mapped-ram */ |
| clear_bit_atomic(offset >> TARGET_PAGE_BITS, pss->block->file_bmap); |
| return 1; |
| } |
| |
| len += save_page_header(pss, file, pss->block, offset | RAM_SAVE_FLAG_ZERO); |
| qemu_put_byte(file, 0); |
| len += 1; |
| ram_release_page(pss->block->idstr, offset); |
| ram_transferred_add(len); |
| |
| /* |
| * Must let xbzrle know, otherwise a previous (now 0'd) cached |
| * page would be stale. |
| */ |
| if (rs->xbzrle_started) { |
| XBZRLE_cache_lock(); |
| xbzrle_cache_zero_page(pss->block->offset + offset); |
| XBZRLE_cache_unlock(); |
| } |
| |
| return len; |
| } |
| |
| /* |
| * @pages: the number of pages written by the control path, |
| * < 0 - error |
| * > 0 - number of pages written |
| * |
| * Return true if the pages has been saved, otherwise false is returned. |
| */ |
| static bool control_save_page(PageSearchStatus *pss, |
| ram_addr_t offset, int *pages) |
| { |
| int ret; |
| |
| ret = rdma_control_save_page(pss->pss_channel, pss->block->offset, offset, |
| TARGET_PAGE_SIZE); |
| if (ret == RAM_SAVE_CONTROL_NOT_SUPP) { |
| return false; |
| } |
| |
| if (ret == RAM_SAVE_CONTROL_DELAYED) { |
| *pages = 1; |
| return true; |
| } |
| *pages = ret; |
| return true; |
| } |
| |
| /* |
| * directly send the page to the stream |
| * |
| * Returns the number of pages written. |
| * |
| * @pss: current PSS channel |
| * @block: block that contains the page we want to send |
| * @offset: offset inside the block for the page |
| * @buf: the page to be sent |
| * @async: send to page asyncly |
| */ |
| static int save_normal_page(PageSearchStatus *pss, RAMBlock *block, |
| ram_addr_t offset, uint8_t *buf, bool async) |
| { |
| QEMUFile *file = pss->pss_channel; |
| |
| if (migrate_mapped_ram()) { |
| qemu_put_buffer_at(file, buf, TARGET_PAGE_SIZE, |
| block->pages_offset + offset); |
| set_bit(offset >> TARGET_PAGE_BITS, block->file_bmap); |
| } else { |
| ram_transferred_add(save_page_header(pss, pss->pss_channel, block, |
| offset | RAM_SAVE_FLAG_PAGE)); |
| if (async) { |
| qemu_put_buffer_async(file, buf, TARGET_PAGE_SIZE, |
| migrate_release_ram() && |
| migration_in_postcopy()); |
| } else { |
| qemu_put_buffer(file, buf, TARGET_PAGE_SIZE); |
| } |
| } |
| ram_transferred_add(TARGET_PAGE_SIZE); |
| stat64_add(&mig_stats.normal_pages, 1); |
| return 1; |
| } |
| |
| /** |
| * ram_save_page: send the given page to the stream |
| * |
| * Returns the number of pages written. |
| * < 0 - error |
| * >=0 - Number of pages written - this might legally be 0 |
| * if xbzrle noticed the page was the same. |
| * |
| * @rs: current RAM state |
| * @block: block that contains the page we want to send |
| * @offset: offset inside the block for the page |
| */ |
| static int ram_save_page(RAMState *rs, PageSearchStatus *pss) |
| { |
| int pages = -1; |
| uint8_t *p; |
| bool send_async = true; |
| RAMBlock *block = pss->block; |
| ram_addr_t offset = ((ram_addr_t)pss->page) << TARGET_PAGE_BITS; |
| ram_addr_t current_addr = block->offset + offset; |
| |
| p = block->host + offset; |
| trace_ram_save_page(block->idstr, (uint64_t)offset, p); |
| |
| XBZRLE_cache_lock(); |
| if (rs->xbzrle_started && !migration_in_postcopy()) { |
| pages = save_xbzrle_page(rs, pss, &p, current_addr, |
| block, offset); |
| if (!rs->last_stage) { |
| /* Can't send this cached data async, since the cache page |
| * might get updated before it gets to the wire |
| */ |
| send_async = false; |
| } |
| } |
| |
| /* XBZRLE overflow or normal page */ |
| if (pages == -1) { |
| pages = save_normal_page(pss, block, offset, p, send_async); |
| } |
| |
| XBZRLE_cache_unlock(); |
| |
| return pages; |
| } |
| |
| static int ram_save_multifd_page(RAMBlock *block, ram_addr_t offset) |
| { |
| if (!multifd_queue_page(block, offset)) { |
| return -1; |
| } |
| |
| return 1; |
| } |
| |
| |
| #define PAGE_ALL_CLEAN 0 |
| #define PAGE_TRY_AGAIN 1 |
| #define PAGE_DIRTY_FOUND 2 |
| /** |
| * find_dirty_block: find the next dirty page and update any state |
| * associated with the search process. |
| * |
| * Returns: |
| * <0: An error happened |
| * PAGE_ALL_CLEAN: no dirty page found, give up |
| * PAGE_TRY_AGAIN: no dirty page found, retry for next block |
| * PAGE_DIRTY_FOUND: dirty page found |
| * |
| * @rs: current RAM state |
| * @pss: data about the state of the current dirty page scan |
| * @again: set to false if the search has scanned the whole of RAM |
| */ |
| static int find_dirty_block(RAMState *rs, PageSearchStatus *pss) |
| { |
| /* Update pss->page for the next dirty bit in ramblock */ |
| pss_find_next_dirty(pss); |
| |
| if (pss->complete_round && pss->block == rs->last_seen_block && |
| pss->page >= rs->last_page) { |
| /* |
| * We've been once around the RAM and haven't found anything. |
| * Give up. |
| */ |
| return PAGE_ALL_CLEAN; |
| } |
| if (!offset_in_ramblock(pss->block, |
| ((ram_addr_t)pss->page) << TARGET_PAGE_BITS)) { |
| /* Didn't find anything in this RAM Block */ |
| pss->page = 0; |
| pss->block = QLIST_NEXT_RCU(pss->block, next); |
| if (!pss->block) { |
| if (migrate_multifd() && |
| (!migrate_multifd_flush_after_each_section() || |
| migrate_mapped_ram())) { |
| QEMUFile *f = rs->pss[RAM_CHANNEL_PRECOPY].pss_channel; |
| int ret = multifd_send_sync_main(); |
| if (ret < 0) { |
| return ret; |
| } |
| |
| if (!migrate_mapped_ram()) { |
| qemu_put_be64(f, RAM_SAVE_FLAG_MULTIFD_FLUSH); |
| qemu_fflush(f); |
| } |
| } |
| |
| /* Hit the end of the list */ |
| pss->block = QLIST_FIRST_RCU(&ram_list.blocks); |
| /* Flag that we've looped */ |
| pss->complete_round = true; |
| /* After the first round, enable XBZRLE. */ |
| if (migrate_xbzrle()) { |
| rs->xbzrle_started = true; |
| } |
| } |
| /* Didn't find anything this time, but try again on the new block */ |
| return PAGE_TRY_AGAIN; |
| } else { |
| /* We've found something */ |
| return PAGE_DIRTY_FOUND; |
| } |
| } |
| |
| /** |
| * unqueue_page: gets a page of the queue |
| * |
| * Helper for 'get_queued_page' - gets a page off the queue |
| * |
| * Returns the block of the page (or NULL if none available) |
| * |
| * @rs: current RAM state |
| * @offset: used to return the offset within the RAMBlock |
| */ |
| static RAMBlock *unqueue_page(RAMState *rs, ram_addr_t *offset) |
| { |
| struct RAMSrcPageRequest *entry; |
| RAMBlock *block = NULL; |
| |
| if (!postcopy_has_request(rs)) { |
| return NULL; |
| } |
| |
| QEMU_LOCK_GUARD(&rs->src_page_req_mutex); |
| |
| /* |
| * This should _never_ change even after we take the lock, because no one |
| * should be taking anything off the request list other than us. |
| */ |
| assert(postcopy_has_request(rs)); |
| |
| entry = QSIMPLEQ_FIRST(&rs->src_page_requests); |
| block = entry->rb; |
| *offset = entry->offset; |
| |
| if (entry->len > TARGET_PAGE_SIZE) { |
| entry->len -= TARGET_PAGE_SIZE; |
| entry->offset += TARGET_PAGE_SIZE; |
| } else { |
| memory_region_unref(block->mr); |
| QSIMPLEQ_REMOVE_HEAD(&rs->src_page_requests, next_req); |
| g_free(entry); |
| migration_consume_urgent_request(); |
| } |
| |
| return block; |
| } |
| |
| #if defined(__linux__) |
| /** |
| * poll_fault_page: try to get next UFFD write fault page and, if pending fault |
| * is found, return RAM block pointer and page offset |
| * |
| * Returns pointer to the RAMBlock containing faulting page, |
| * NULL if no write faults are pending |
| * |
| * @rs: current RAM state |
| * @offset: page offset from the beginning of the block |
| */ |
| static RAMBlock *poll_fault_page(RAMState *rs, ram_addr_t *offset) |
| { |
| struct uffd_msg uffd_msg; |
| void *page_address; |
| RAMBlock *block; |
| int res; |
| |
| if (!migrate_background_snapshot()) { |
| return NULL; |
| } |
| |
| res = uffd_read_events(rs->uffdio_fd, &uffd_msg, 1); |
| if (res <= 0) { |
| return NULL; |
| } |
| |
| page_address = (void *)(uintptr_t) uffd_msg.arg.pagefault.address; |
| block = qemu_ram_block_from_host(page_address, false, offset); |
| assert(block && (block->flags & RAM_UF_WRITEPROTECT) != 0); |
| return block; |
| } |
| |
| /** |
| * ram_save_release_protection: release UFFD write protection after |
| * a range of pages has been saved |
| * |
| * @rs: current RAM state |
| * @pss: page-search-status structure |
| * @start_page: index of the first page in the range relative to pss->block |
| * |
| * Returns 0 on success, negative value in case of an error |
| */ |
| static int ram_save_release_protection(RAMState *rs, PageSearchStatus *pss, |
| unsigned long start_page) |
| { |
| int res = 0; |
| |
| /* Check if page is from UFFD-managed region. */ |
| if (pss->block->flags & RAM_UF_WRITEPROTECT) { |
| void *page_address = pss->block->host + (start_page << TARGET_PAGE_BITS); |
| uint64_t run_length = (pss->page - start_page) << TARGET_PAGE_BITS; |
| |
| /* Flush async buffers before un-protect. */ |
| qemu_fflush(pss->pss_channel); |
| /* Un-protect memory range. */ |
| res = uffd_change_protection(rs->uffdio_fd, page_address, run_length, |
| false, false); |
| } |
| |
| return res; |
| } |
| |
| /* ram_write_tracking_available: check if kernel supports required UFFD features |
| * |
| * Returns true if supports, false otherwise |
| */ |
| bool ram_write_tracking_available(void) |
| { |
| uint64_t uffd_features; |
| int res; |
| |
| res = uffd_query_features(&uffd_features); |
| return (res == 0 && |
| (uffd_features & UFFD_FEATURE_PAGEFAULT_FLAG_WP) != 0); |
| } |
| |
| /* ram_write_tracking_compatible: check if guest configuration is |
| * compatible with 'write-tracking' |
| * |
| * Returns true if compatible, false otherwise |
| */ |
| bool ram_write_tracking_compatible(void) |
| { |
| const uint64_t uffd_ioctls_mask = BIT(_UFFDIO_WRITEPROTECT); |
| int uffd_fd; |
| RAMBlock *block; |
| bool ret = false; |
| |
| /* Open UFFD file descriptor */ |
| uffd_fd = uffd_create_fd(UFFD_FEATURE_PAGEFAULT_FLAG_WP, false); |
| if (uffd_fd < 0) { |
| return false; |
| } |
| |
| RCU_READ_LOCK_GUARD(); |
| |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| uint64_t uffd_ioctls; |
| |
| /* Nothing to do with read-only and MMIO-writable regions */ |
| if (block->mr->readonly || block->mr->rom_device) { |
| continue; |
| } |
| /* Try to register block memory via UFFD-IO to track writes */ |
| if (uffd_register_memory(uffd_fd, block->host, block->max_length, |
| UFFDIO_REGISTER_MODE_WP, &uffd_ioctls)) { |
| goto out; |
| } |
| if ((uffd_ioctls & uffd_ioctls_mask) != uffd_ioctls_mask) { |
| goto out; |
| } |
| } |
| ret = true; |
| |
| out: |
| uffd_close_fd(uffd_fd); |
| return ret; |
| } |
| |
| static inline void populate_read_range(RAMBlock *block, ram_addr_t offset, |
| ram_addr_t size) |
| { |
| const ram_addr_t end = offset + size; |
| |
| /* |
| * We read one byte of each page; this will preallocate page tables if |
| * required and populate the shared zeropage on MAP_PRIVATE anonymous memory |
| * where no page was populated yet. This might require adaption when |
| * supporting other mappings, like shmem. |
| */ |
| for (; offset < end; offset += block->page_size) { |
| char tmp = *((char *)block->host + offset); |
| |
| /* Don't optimize the read out */ |
| asm volatile("" : "+r" (tmp)); |
| } |
| } |
| |
| static inline int populate_read_section(MemoryRegionSection *section, |
| void *opaque) |
| { |
| const hwaddr size = int128_get64(section->size); |
| hwaddr offset = section->offset_within_region; |
| RAMBlock *block = section->mr->ram_block; |
| |
| populate_read_range(block, offset, size); |
| return 0; |
| } |
| |
| /* |
| * ram_block_populate_read: preallocate page tables and populate pages in the |
| * RAM block by reading a byte of each page. |
| * |
| * Since it's solely used for userfault_fd WP feature, here we just |
| * hardcode page size to qemu_real_host_page_size. |
| * |
| * @block: RAM block to populate |
| */ |
| static void ram_block_populate_read(RAMBlock *rb) |
| { |
| /* |
| * Skip populating all pages that fall into a discarded range as managed by |
| * a RamDiscardManager responsible for the mapped memory region of the |
| * RAMBlock. Such discarded ("logically unplugged") parts of a RAMBlock |
| * must not get populated automatically. We don't have to track |
| * modifications via userfaultfd WP reliably, because these pages will |
| * not be part of the migration stream either way -- see |
| * ramblock_dirty_bitmap_exclude_discarded_pages(). |
| * |
| * Note: The result is only stable while migrating (precopy/postcopy). |
| */ |
| if (rb->mr && memory_region_has_ram_discard_manager(rb->mr)) { |
| RamDiscardManager *rdm = memory_region_get_ram_discard_manager(rb->mr); |
| MemoryRegionSection section = { |
| .mr = rb->mr, |
| .offset_within_region = 0, |
| .size = rb->mr->size, |
| }; |
| |
| ram_discard_manager_replay_populated(rdm, §ion, |
| populate_read_section, NULL); |
| } else { |
| populate_read_range(rb, 0, rb->used_length); |
| } |
| } |
| |
| /* |
| * ram_write_tracking_prepare: prepare for UFFD-WP memory tracking |
| */ |
| void ram_write_tracking_prepare(void) |
| { |
| RAMBlock *block; |
| |
| RCU_READ_LOCK_GUARD(); |
| |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| /* Nothing to do with read-only and MMIO-writable regions */ |
| if (block->mr->readonly || block->mr->rom_device) { |
| continue; |
| } |
| |
| /* |
| * Populate pages of the RAM block before enabling userfault_fd |
| * write protection. |
| * |
| * This stage is required since ioctl(UFFDIO_WRITEPROTECT) with |
| * UFFDIO_WRITEPROTECT_MODE_WP mode setting would silently skip |
| * pages with pte_none() entries in page table. |
| */ |
| ram_block_populate_read(block); |
| } |
| } |
| |
| static inline int uffd_protect_section(MemoryRegionSection *section, |
| void *opaque) |
| { |
| const hwaddr size = int128_get64(section->size); |
| const hwaddr offset = section->offset_within_region; |
| RAMBlock *rb = section->mr->ram_block; |
| int uffd_fd = (uintptr_t)opaque; |
| |
| return uffd_change_protection(uffd_fd, rb->host + offset, size, true, |
| false); |
| } |
| |
| static int ram_block_uffd_protect(RAMBlock *rb, int uffd_fd) |
| { |
| assert(rb->flags & RAM_UF_WRITEPROTECT); |
| |
| /* See ram_block_populate_read() */ |
| if (rb->mr && memory_region_has_ram_discard_manager(rb->mr)) { |
| RamDiscardManager *rdm = memory_region_get_ram_discard_manager(rb->mr); |
| MemoryRegionSection section = { |
| .mr = rb->mr, |
| .offset_within_region = 0, |
| .size = rb->mr->size, |
| }; |
| |
| return ram_discard_manager_replay_populated(rdm, §ion, |
| uffd_protect_section, |
| (void *)(uintptr_t)uffd_fd); |
| } |
| return uffd_change_protection(uffd_fd, rb->host, |
| rb->used_length, true, false); |
| } |
| |
| /* |
| * ram_write_tracking_start: start UFFD-WP memory tracking |
| * |
| * Returns 0 for success or negative value in case of error |
| */ |
| int ram_write_tracking_start(void) |
| { |
| int uffd_fd; |
| RAMState *rs = ram_state; |
| RAMBlock *block; |
| |
| /* Open UFFD file descriptor */ |
| uffd_fd = uffd_create_fd(UFFD_FEATURE_PAGEFAULT_FLAG_WP, true); |
| if (uffd_fd < 0) { |
| return uffd_fd; |
| } |
| rs->uffdio_fd = uffd_fd; |
| |
| RCU_READ_LOCK_GUARD(); |
| |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| /* Nothing to do with read-only and MMIO-writable regions */ |
| if (block->mr->readonly || block->mr->rom_device) { |
| continue; |
| } |
| |
| /* Register block memory with UFFD to track writes */ |
| if (uffd_register_memory(rs->uffdio_fd, block->host, |
| block->max_length, UFFDIO_REGISTER_MODE_WP, NULL)) { |
| goto fail; |
| } |
| block->flags |= RAM_UF_WRITEPROTECT; |
| memory_region_ref(block->mr); |
| |
| /* Apply UFFD write protection to the block memory range */ |
| if (ram_block_uffd_protect(block, uffd_fd)) { |
| goto fail; |
| } |
| |
| trace_ram_write_tracking_ramblock_start(block->idstr, block->page_size, |
| block->host, block->max_length); |
| } |
| |
| return 0; |
| |
| fail: |
| error_report("ram_write_tracking_start() failed: restoring initial memory state"); |
| |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| if ((block->flags & RAM_UF_WRITEPROTECT) == 0) { |
| continue; |
| } |
| uffd_unregister_memory(rs->uffdio_fd, block->host, block->max_length); |
| /* Cleanup flags and remove reference */ |
| block->flags &= ~RAM_UF_WRITEPROTECT; |
| memory_region_unref(block->mr); |
| } |
| |
| uffd_close_fd(uffd_fd); |
| rs->uffdio_fd = -1; |
| return -1; |
| } |
| |
| /** |
| * ram_write_tracking_stop: stop UFFD-WP memory tracking and remove protection |
| */ |
| void ram_write_tracking_stop(void) |
| { |
| RAMState *rs = ram_state; |
| RAMBlock *block; |
| |
| RCU_READ_LOCK_GUARD(); |
| |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| if ((block->flags & RAM_UF_WRITEPROTECT) == 0) { |
| continue; |
| } |
| uffd_unregister_memory(rs->uffdio_fd, block->host, block->max_length); |
| |
| trace_ram_write_tracking_ramblock_stop(block->idstr, block->page_size, |
| block->host, block->max_length); |
| |
| /* Cleanup flags and remove reference */ |
| block->flags &= ~RAM_UF_WRITEPROTECT; |
| memory_region_unref(block->mr); |
| } |
| |
| /* Finally close UFFD file descriptor */ |
| uffd_close_fd(rs->uffdio_fd); |
| rs->uffdio_fd = -1; |
| } |
| |
| #else |
| /* No target OS support, stubs just fail or ignore */ |
| |
| static RAMBlock *poll_fault_page(RAMState *rs, ram_addr_t *offset) |
| { |
| (void) rs; |
| (void) offset; |
| |
| return NULL; |
| } |
| |
| static int ram_save_release_protection(RAMState *rs, PageSearchStatus *pss, |
| unsigned long start_page) |
| { |
| (void) rs; |
| (void) pss; |
| (void) start_page; |
| |
| return 0; |
| } |
| |
| bool ram_write_tracking_available(void) |
| { |
| return false; |
| } |
| |
| bool ram_write_tracking_compatible(void) |
| { |
| assert(0); |
| return false; |
| } |
| |
| int ram_write_tracking_start(void) |
| { |
| assert(0); |
| return -1; |
| } |
| |
| void ram_write_tracking_stop(void) |
| { |
| assert(0); |
| } |
| #endif /* defined(__linux__) */ |
| |
| /** |
| * get_queued_page: unqueue a page from the postcopy requests |
| * |
| * Skips pages that are already sent (!dirty) |
| * |
| * Returns true if a queued page is found |
| * |
| * @rs: current RAM state |
| * @pss: data about the state of the current dirty page scan |
| */ |
| static bool get_queued_page(RAMState *rs, PageSearchStatus *pss) |
| { |
| RAMBlock *block; |
| ram_addr_t offset; |
| bool dirty; |
| |
| do { |
| block = unqueue_page(rs, &offset); |
| /* |
| * We're sending this page, and since it's postcopy nothing else |
| * will dirty it, and we must make sure it doesn't get sent again |
| * even if this queue request was received after the background |
| * search already sent it. |
| */ |
| if (block) { |
| unsigned long page; |
| |
| page = offset >> TARGET_PAGE_BITS; |
| dirty = test_bit(page, block->bmap); |
| if (!dirty) { |
| trace_get_queued_page_not_dirty(block->idstr, (uint64_t)offset, |
| page); |
| } else { |
| trace_get_queued_page(block->idstr, (uint64_t)offset, page); |
| } |
| } |
| |
| } while (block && !dirty); |
| |
| if (!block) { |
| /* |
| * Poll write faults too if background snapshot is enabled; that's |
| * when we have vcpus got blocked by the write protected pages. |
| */ |
| block = poll_fault_page(rs, &offset); |
| } |
| |
| if (block) { |
| /* |
| * We want the background search to continue from the queued page |
| * since the guest is likely to want other pages near to the page |
| * it just requested. |
| */ |
| pss->block = block; |
| pss->page = offset >> TARGET_PAGE_BITS; |
| |
| /* |
| * This unqueued page would break the "one round" check, even is |
| * really rare. |
| */ |
| pss->complete_round = false; |
| } |
| |
| return !!block; |
| } |
| |
| /** |
| * migration_page_queue_free: drop any remaining pages in the ram |
| * request queue |
| * |
| * It should be empty at the end anyway, but in error cases there may |
| * be some left. in case that there is any page left, we drop it. |
| * |
| */ |
| static void migration_page_queue_free(RAMState *rs) |
| { |
| struct RAMSrcPageRequest *mspr, *next_mspr; |
| /* This queue generally should be empty - but in the case of a failed |
| * migration might have some droppings in. |
| */ |
| RCU_READ_LOCK_GUARD(); |
| QSIMPLEQ_FOREACH_SAFE(mspr, &rs->src_page_requests, next_req, next_mspr) { |
| memory_region_unref(mspr->rb->mr); |
| QSIMPLEQ_REMOVE_HEAD(&rs->src_page_requests, next_req); |
| g_free(mspr); |
| } |
| } |
| |
| /** |
| * ram_save_queue_pages: queue the page for transmission |
| * |
| * A request from postcopy destination for example. |
| * |
| * Returns zero on success or negative on error |
| * |
| * @rbname: Name of the RAMBLock of the request. NULL means the |
| * same that last one. |
| * @start: starting address from the start of the RAMBlock |
| * @len: length (in bytes) to send |
| */ |
| int ram_save_queue_pages(const char *rbname, ram_addr_t start, ram_addr_t len, |
| Error **errp) |
| { |
| RAMBlock *ramblock; |
| RAMState *rs = ram_state; |
| |
| stat64_add(&mig_stats.postcopy_requests, 1); |
| RCU_READ_LOCK_GUARD(); |
| |
| if (!rbname) { |
| /* Reuse last RAMBlock */ |
| ramblock = rs->last_req_rb; |
| |
| if (!ramblock) { |
| /* |
| * Shouldn't happen, we can't reuse the last RAMBlock if |
| * it's the 1st request. |
| */ |
| error_setg(errp, "MIG_RP_MSG_REQ_PAGES has no previous block"); |
| return -1; |
| } |
| } else { |
| ramblock = qemu_ram_block_by_name(rbname); |
| |
| if (!ramblock) { |
| /* We shouldn't be asked for a non-existent RAMBlock */ |
| error_setg(errp, "MIG_RP_MSG_REQ_PAGES has no block '%s'", rbname); |
| return -1; |
| } |
| rs->last_req_rb = ramblock; |
| } |
| trace_ram_save_queue_pages(ramblock->idstr, start, len); |
| if (!offset_in_ramblock(ramblock, start + len - 1)) { |
| error_setg(errp, "MIG_RP_MSG_REQ_PAGES request overrun, " |
| "start=" RAM_ADDR_FMT " len=" |
| RAM_ADDR_FMT " blocklen=" RAM_ADDR_FMT, |
| start, len, ramblock->used_length); |
| return -1; |
| } |
| |
| /* |
| * When with postcopy preempt, we send back the page directly in the |
| * rp-return thread. |
| */ |
| if (postcopy_preempt_active()) { |
| ram_addr_t page_start = start >> TARGET_PAGE_BITS; |
| size_t page_size = qemu_ram_pagesize(ramblock); |
| PageSearchStatus *pss = &ram_state->pss[RAM_CHANNEL_POSTCOPY]; |
| int ret = 0; |
| |
| qemu_mutex_lock(&rs->bitmap_mutex); |
| |
| pss_init(pss, ramblock, page_start); |
| /* |
| * Always use the preempt channel, and make sure it's there. It's |
| * safe to access without lock, because when rp-thread is running |
| * we should be the only one who operates on the qemufile |
| */ |
| pss->pss_channel = migrate_get_current()->postcopy_qemufile_src; |
| assert(pss->pss_channel); |
| |
| /* |
| * It must be either one or multiple of host page size. Just |
| * assert; if something wrong we're mostly split brain anyway. |
| */ |
| assert(len % page_size == 0); |
| while (len) { |
| if (ram_save_host_page_urgent(pss)) { |
| error_setg(errp, "ram_save_host_page_urgent() failed: " |
| "ramblock=%s, start_addr=0x"RAM_ADDR_FMT, |
| ramblock->idstr, start); |
| ret = -1; |
| break; |
| } |
| /* |
| * NOTE: after ram_save_host_page_urgent() succeeded, pss->page |
| * will automatically be moved and point to the next host page |
| * we're going to send, so no need to update here. |
| * |
| * Normally QEMU never sends >1 host page in requests, so |
| * logically we don't even need that as the loop should only |
| * run once, but just to be consistent. |
| */ |
| len -= page_size; |
| }; |
| qemu_mutex_unlock(&rs->bitmap_mutex); |
| |
| return ret; |
| } |
| |
| struct RAMSrcPageRequest *new_entry = |
| g_new0(struct RAMSrcPageRequest, 1); |
| new_entry->rb = ramblock; |
| new_entry->offset = start; |
| new_entry->len = len; |
| |
| memory_region_ref(ramblock->mr); |
| qemu_mutex_lock(&rs->src_page_req_mutex); |
| QSIMPLEQ_INSERT_TAIL(&rs->src_page_requests, new_entry, next_req); |
| migration_make_urgent_request(); |
| qemu_mutex_unlock(&rs->src_page_req_mutex); |
| |
| return 0; |
| } |
| |
| /** |
| * ram_save_target_page_legacy: save one target page |
| * |
| * Returns the number of pages written |
| * |
| * @rs: current RAM state |
| * @pss: data about the page we want to send |
| */ |
| static int ram_save_target_page_legacy(RAMState *rs, PageSearchStatus *pss) |
| { |
| ram_addr_t offset = ((ram_addr_t)pss->page) << TARGET_PAGE_BITS; |
| int res; |
| |
| if (control_save_page(pss, offset, &res)) { |
| return res; |
| } |
| |
| if (save_zero_page(rs, pss, offset)) { |
| return 1; |
| } |
| |
| return ram_save_page(rs, pss); |
| } |
| |
| /** |
| * ram_save_target_page_multifd: send one target page to multifd workers |
| * |
| * Returns 1 if the page was queued, -1 otherwise. |
| * |
| * @rs: current RAM state |
| * @pss: data about the page we want to send |
| */ |
| static int ram_save_target_page_multifd(RAMState *rs, PageSearchStatus *pss) |
| { |
| RAMBlock *block = pss->block; |
| ram_addr_t offset = ((ram_addr_t)pss->page) << TARGET_PAGE_BITS; |
| |
| /* |
| * While using multifd live migration, we still need to handle zero |
| * page checking on the migration main thread. |
| */ |
| if (migrate_zero_page_detection() == ZERO_PAGE_DETECTION_LEGACY) { |
| if (save_zero_page(rs, pss, offset)) { |
| return 1; |
| } |
| } |
| |
| return ram_save_multifd_page(block, offset); |
| } |
| |
| /* Should be called before sending a host page */ |
| static void pss_host_page_prepare(PageSearchStatus *pss) |
| { |
| /* How many guest pages are there in one host page? */ |
| size_t guest_pfns = qemu_ram_pagesize(pss->block) >> TARGET_PAGE_BITS; |
| |
| pss->host_page_sending = true; |
| if (guest_pfns <= 1) { |
| /* |
| * This covers both when guest psize == host psize, or when guest |
| * has larger psize than the host (guest_pfns==0). |
| * |
| * For the latter, we always send one whole guest page per |
| * iteration of the host page (example: an Alpha VM on x86 host |
| * will have guest psize 8K while host psize 4K). |
| */ |
| pss->host_page_start = pss->page; |
| pss->host_page_end = pss->page + 1; |
| } else { |
| /* |
| * The host page spans over multiple guest pages, we send them |
| * within the same host page iteration. |
| */ |
| pss->host_page_start = ROUND_DOWN(pss->page, guest_pfns); |
| pss->host_page_end = ROUND_UP(pss->page + 1, guest_pfns); |
| } |
| } |
| |
| /* |
| * Whether the page pointed by PSS is within the host page being sent. |
| * Must be called after a previous pss_host_page_prepare(). |
| */ |
| static bool pss_within_range(PageSearchStatus *pss) |
| { |
| ram_addr_t ram_addr; |
| |
| assert(pss->host_page_sending); |
| |
| /* Over host-page boundary? */ |
| if (pss->page >= pss->host_page_end) { |
| return false; |
| } |
| |
| ram_addr = ((ram_addr_t)pss->page) << TARGET_PAGE_BITS; |
| |
| return offset_in_ramblock(pss->block, ram_addr); |
| } |
| |
| static void pss_host_page_finish(PageSearchStatus *pss) |
| { |
| pss->host_page_sending = false; |
| /* This is not needed, but just to reset it */ |
| pss->host_page_start = pss->host_page_end = 0; |
| } |
| |
| /* |
| * Send an urgent host page specified by `pss'. Need to be called with |
| * bitmap_mutex held. |
| * |
| * Returns 0 if save host page succeeded, false otherwise. |
| */ |
| static int ram_save_host_page_urgent(PageSearchStatus *pss) |
| { |
| bool page_dirty, sent = false; |
| RAMState *rs = ram_state; |
| int ret = 0; |
| |
| trace_postcopy_preempt_send_host_page(pss->block->idstr, pss->page); |
| pss_host_page_prepare(pss); |
| |
| /* |
| * If precopy is sending the same page, let it be done in precopy, or |
| * we could send the same page in two channels and none of them will |
| * receive the whole page. |
| */ |
| if (pss_overlap(pss, &ram_state->pss[RAM_CHANNEL_PRECOPY])) { |
| trace_postcopy_preempt_hit(pss->block->idstr, |
| pss->page << TARGET_PAGE_BITS); |
| return 0; |
| } |
| |
| do { |
| page_dirty = migration_bitmap_clear_dirty(rs, pss->block, pss->page); |
| |
| if (page_dirty) { |
| /* Be strict to return code; it must be 1, or what else? */ |
| if (migration_ops->ram_save_target_page(rs, pss) != 1) { |
| error_report_once("%s: ram_save_target_page failed", __func__); |
| ret = -1; |
| goto out; |
| } |
| sent = true; |
| } |
| pss_find_next_dirty(pss); |
| } while (pss_within_range(pss)); |
| out: |
| pss_host_page_finish(pss); |
| /* For urgent requests, flush immediately if sent */ |
| if (sent) { |
| qemu_fflush(pss->pss_channel); |
| } |
| return ret; |
| } |
| |
| /** |
| * ram_save_host_page: save a whole host page |
| * |
| * Starting at *offset send pages up to the end of the current host |
| * page. It's valid for the initial offset to point into the middle of |
| * a host page in which case the remainder of the hostpage is sent. |
| * Only dirty target pages are sent. Note that the host page size may |
| * be a huge page for this block. |
| * |
| * The saving stops at the boundary of the used_length of the block |
| * if the RAMBlock isn't a multiple of the host page size. |
| * |
| * The caller must be with ram_state.bitmap_mutex held to call this |
| * function. Note that this function can temporarily release the lock, but |
| * when the function is returned it'll make sure the lock is still held. |
| * |
| * Returns the number of pages written or negative on error |
| * |
| * @rs: current RAM state |
| * @pss: data about the page we want to send |
| */ |
| static int ram_save_host_page(RAMState *rs, PageSearchStatus *pss) |
| { |
| bool page_dirty, preempt_active = postcopy_preempt_active(); |
| int tmppages, pages = 0; |
| size_t pagesize_bits = |
| qemu_ram_pagesize(pss->block) >> TARGET_PAGE_BITS; |
| unsigned long start_page = pss->page; |
| int res; |
| |
| if (migrate_ram_is_ignored(pss->block)) { |
| error_report("block %s should not be migrated !", pss->block->idstr); |
| return 0; |
| } |
| |
| /* Update host page boundary information */ |
| pss_host_page_prepare(pss); |
| |
| do { |
| page_dirty = migration_bitmap_clear_dirty(rs, pss->block, pss->page); |
| |
| /* Check the pages is dirty and if it is send it */ |
| if (page_dirty) { |
| /* |
| * Properly yield the lock only in postcopy preempt mode |
| * because both migration thread and rp-return thread can |
| * operate on the bitmaps. |
| */ |
| if (preempt_active) { |
| qemu_mutex_unlock(&rs->bitmap_mutex); |
| } |
| tmppages = migration_ops->ram_save_target_page(rs, pss); |
| if (tmppages >= 0) { |
| pages += tmppages; |
| /* |
| * Allow rate limiting to happen in the middle of huge pages if |
| * something is sent in the current iteration. |
| */ |
| if (pagesize_bits > 1 && tmppages > 0) { |
| migration_rate_limit(); |
| } |
| } |
| if (preempt_active) { |
| qemu_mutex_lock(&rs->bitmap_mutex); |
| } |
| } else { |
| tmppages = 0; |
| } |
| |
| if (tmppages < 0) { |
| pss_host_page_finish(pss); |
| return tmppages; |
| } |
| |
| pss_find_next_dirty(pss); |
| } while (pss_within_range(pss)); |
| |
| pss_host_page_finish(pss); |
| |
| res = ram_save_release_protection(rs, pss, start_page); |
| return (res < 0 ? res : pages); |
| } |
| |
| /** |
| * ram_find_and_save_block: finds a dirty page and sends it to f |
| * |
| * Called within an RCU critical section. |
| * |
| * Returns the number of pages written where zero means no dirty pages, |
| * or negative on error |
| * |
| * @rs: current RAM state |
| * |
| * On systems where host-page-size > target-page-size it will send all the |
| * pages in a host page that are dirty. |
| */ |
| static int ram_find_and_save_block(RAMState *rs) |
| { |
| PageSearchStatus *pss = &rs->pss[RAM_CHANNEL_PRECOPY]; |
| int pages = 0; |
| |
| /* No dirty page as there is zero RAM */ |
| if (!rs->ram_bytes_total) { |
| return pages; |
| } |
| |
| /* |
| * Always keep last_seen_block/last_page valid during this procedure, |
| * because find_dirty_block() relies on these values (e.g., we compare |
| * last_seen_block with pss.block to see whether we searched all the |
| * ramblocks) to detect the completion of migration. Having NULL value |
| * of last_seen_block can conditionally cause below loop to run forever. |
| */ |
| if (!rs->last_seen_block) { |
| rs->last_seen_block = QLIST_FIRST_RCU(&ram_list.blocks); |
| rs->last_page = 0; |
| } |
| |
| pss_init(pss, rs->last_seen_block, rs->last_page); |
| |
| while (true){ |
| if (!get_queued_page(rs, pss)) { |
| /* priority queue empty, so just search for something dirty */ |
| int res = find_dirty_block(rs, pss); |
| if (res != PAGE_DIRTY_FOUND) { |
| if (res == PAGE_ALL_CLEAN) { |
| break; |
| } else if (res == PAGE_TRY_AGAIN) { |
| continue; |
| } else if (res < 0) { |
| pages = res; |
| break; |
| } |
| } |
| } |
| pages = ram_save_host_page(rs, pss); |
| if (pages) { |
| break; |
| } |
| } |
| |
| rs->last_seen_block = pss->block; |
| rs->last_page = pss->page; |
| |
| return pages; |
| } |
| |
| static uint64_t ram_bytes_total_with_ignored(void) |
| { |
| RAMBlock *block; |
| uint64_t total = 0; |
| |
| RCU_READ_LOCK_GUARD(); |
| |
| RAMBLOCK_FOREACH_MIGRATABLE(block) { |
| total += block->used_length; |
| } |
| return total; |
| } |
| |
| uint64_t ram_bytes_total(void) |
| { |
| RAMBlock *block; |
| uint64_t total = 0; |
| |
| RCU_READ_LOCK_GUARD(); |
| |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| total += block->used_length; |
| } |
| return total; |
| } |
| |
| static void xbzrle_load_setup(void) |
| { |
| XBZRLE.decoded_buf = g_malloc(TARGET_PAGE_SIZE); |
| } |
| |
| static void xbzrle_load_cleanup(void) |
| { |
| g_free(XBZRLE.decoded_buf); |
| XBZRLE.decoded_buf = NULL; |
| } |
| |
| static void ram_state_cleanup(RAMState **rsp) |
| { |
| if (*rsp) { |
| migration_page_queue_free(*rsp); |
| qemu_mutex_destroy(&(*rsp)->bitmap_mutex); |
| qemu_mutex_destroy(&(*rsp)->src_page_req_mutex); |
| g_free(*rsp); |
| *rsp = NULL; |
| } |
| } |
| |
| static void xbzrle_cleanup(void) |
| { |
| XBZRLE_cache_lock(); |
| if (XBZRLE.cache) { |
| cache_fini(XBZRLE.cache); |
| g_free(XBZRLE.encoded_buf); |
| g_free(XBZRLE.current_buf); |
| g_free(XBZRLE.zero_target_page); |
| XBZRLE.cache = NULL; |
| XBZRLE.encoded_buf = NULL; |
| XBZRLE.current_buf = NULL; |
| XBZRLE.zero_target_page = NULL; |
| } |
| XBZRLE_cache_unlock(); |
| } |
| |
| static void ram_bitmaps_destroy(void) |
| { |
| RAMBlock *block; |
| |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| g_free(block->clear_bmap); |
| block->clear_bmap = NULL; |
| g_free(block->bmap); |
| block->bmap = NULL; |
| g_free(block->file_bmap); |
| block->file_bmap = NULL; |
| } |
| } |
| |
| static void ram_save_cleanup(void *opaque) |
| { |
| RAMState **rsp = opaque; |
| |
| /* We don't use dirty log with background snapshots */ |
| if (!migrate_background_snapshot()) { |
| /* caller have hold BQL or is in a bh, so there is |
| * no writing race against the migration bitmap |
| */ |
| if (global_dirty_tracking & GLOBAL_DIRTY_MIGRATION) { |
| /* |
| * do not stop dirty log without starting it, since |
| * memory_global_dirty_log_stop will assert that |
| * memory_global_dirty_log_start/stop used in pairs |
| */ |
| memory_global_dirty_log_stop(GLOBAL_DIRTY_MIGRATION); |
| } |
| } |
| |
| ram_bitmaps_destroy(); |
| |
| xbzrle_cleanup(); |
| ram_state_cleanup(rsp); |
| g_free(migration_ops); |
| migration_ops = NULL; |
| } |
| |
| static void ram_state_reset(RAMState *rs) |
| { |
| int i; |
| |
| for (i = 0; i < RAM_CHANNEL_MAX; i++) { |
| rs->pss[i].last_sent_block = NULL; |
| } |
| |
| rs->last_seen_block = NULL; |
| rs->last_page = 0; |
| rs->last_version = ram_list.version; |
| rs->xbzrle_started = false; |
| } |
| |
| #define MAX_WAIT 50 /* ms, half buffered_file limit */ |
| |
| /* **** functions for postcopy ***** */ |
| |
| void ram_postcopy_migrated_memory_release(MigrationState *ms) |
| { |
| struct RAMBlock *block; |
| |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| unsigned long *bitmap = block->bmap; |
| unsigned long range = block->used_length >> TARGET_PAGE_BITS; |
| unsigned long run_start = find_next_zero_bit(bitmap, range, 0); |
| |
| while (run_start < range) { |
| unsigned long run_end = find_next_bit(bitmap, range, run_start + 1); |
| ram_discard_range(block->idstr, |
| ((ram_addr_t)run_start) << TARGET_PAGE_BITS, |
| ((ram_addr_t)(run_end - run_start)) |
| << TARGET_PAGE_BITS); |
| run_start = find_next_zero_bit(bitmap, range, run_end + 1); |
| } |
| } |
| } |
| |
| /** |
| * postcopy_send_discard_bm_ram: discard a RAMBlock |
| * |
| * Callback from postcopy_each_ram_send_discard for each RAMBlock |
| * |
| * @ms: current migration state |
| * @block: RAMBlock to discard |
| */ |
| static void postcopy_send_discard_bm_ram(MigrationState *ms, RAMBlock *block) |
| { |
| unsigned long end = block->used_length >> TARGET_PAGE_BITS; |
| unsigned long current; |
| unsigned long *bitmap = block->bmap; |
| |
| for (current = 0; current < end; ) { |
| unsigned long one = find_next_bit(bitmap, end, current); |
| unsigned long zero, discard_length; |
| |
| if (one >= end) { |
| break; |
| } |
| |
| zero = find_next_zero_bit(bitmap, end, one + 1); |
| |
| if (zero >= end) { |
| discard_length = end - one; |
| } else { |
| discard_length = zero - one; |
| } |
| postcopy_discard_send_range(ms, one, discard_length); |
| current = one + discard_length; |
| } |
| } |
| |
| static void postcopy_chunk_hostpages_pass(MigrationState *ms, RAMBlock *block); |
| |
| /** |
| * postcopy_each_ram_send_discard: discard all RAMBlocks |
| * |
| * Utility for the outgoing postcopy code. |
| * Calls postcopy_send_discard_bm_ram for each RAMBlock |
| * passing it bitmap indexes and name. |
| * (qemu_ram_foreach_block ends up passing unscaled lengths |
| * which would mean postcopy code would have to deal with target page) |
| * |
| * @ms: current migration state |
| */ |
| static void postcopy_each_ram_send_discard(MigrationState *ms) |
| { |
| struct RAMBlock *block; |
| |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| postcopy_discard_send_init(ms, block->idstr); |
| |
| /* |
| * Deal with TPS != HPS and huge pages. It discard any partially sent |
| * host-page size chunks, mark any partially dirty host-page size |
| * chunks as all dirty. In this case the host-page is the host-page |
| * for the particular RAMBlock, i.e. it might be a huge page. |
| */ |
| postcopy_chunk_hostpages_pass(ms, block); |
| |
| /* |
| * Postcopy sends chunks of bitmap over the wire, but it |
| * just needs indexes at this point, avoids it having |
| * target page specific code. |
| */ |
| postcopy_send_discard_bm_ram(ms, block); |
| postcopy_discard_send_finish(ms); |
| } |
| } |
| |
| /** |
| * postcopy_chunk_hostpages_pass: canonicalize bitmap in hostpages |
| * |
| * Helper for postcopy_chunk_hostpages; it's called twice to |
| * canonicalize the two bitmaps, that are similar, but one is |
| * inverted. |
| * |
| * Postcopy requires that all target pages in a hostpage are dirty or |
| * clean, not a mix. This function canonicalizes the bitmaps. |
| * |
| * @ms: current migration state |
| * @block: block that contains the page we want to canonicalize |
| */ |
| static void postcopy_chunk_hostpages_pass(MigrationState *ms, RAMBlock *block) |
| { |
| RAMState *rs = ram_state; |
| unsigned long *bitmap = block->bmap; |
| unsigned int host_ratio = block->page_size / TARGET_PAGE_SIZE; |
| unsigned long pages = block->used_length >> TARGET_PAGE_BITS; |
| unsigned long run_start; |
| |
| if (block->page_size == TARGET_PAGE_SIZE) { |
| /* Easy case - TPS==HPS for a non-huge page RAMBlock */ |
| return; |
| } |
| |
| /* Find a dirty page */ |
| run_start = find_next_bit(bitmap, pages, 0); |
| |
| while (run_start < pages) { |
| |
| /* |
| * If the start of this run of pages is in the middle of a host |
| * page, then we need to fixup this host page. |
| */ |
| if (QEMU_IS_ALIGNED(run_start, host_ratio)) { |
| /* Find the end of this run */ |
| run_start = find_next_zero_bit(bitmap, pages, run_start + 1); |
| /* |
| * If the end isn't at the start of a host page, then the |
| * run doesn't finish at the end of a host page |
| * and we need to discard. |
| */ |
| } |
| |
| if (!QEMU_IS_ALIGNED(run_start, host_ratio)) { |
| unsigned long page; |
| unsigned long fixup_start_addr = QEMU_ALIGN_DOWN(run_start, |
| host_ratio); |
| run_start = QEMU_ALIGN_UP(run_start, host_ratio); |
| |
| /* Clean up the bitmap */ |
| for (page = fixup_start_addr; |
| page < fixup_start_addr + host_ratio; page++) { |
| /* |
| * Remark them as dirty, updating the count for any pages |
| * that weren't previously dirty. |
| */ |
| rs->migration_dirty_pages += !test_and_set_bit(page, bitmap); |
| } |
| } |
| |
| /* Find the next dirty page for the next iteration */ |
| run_start = find_next_bit(bitmap, pages, run_start); |
| } |
| } |
| |
| /** |
| * ram_postcopy_send_discard_bitmap: transmit the discard bitmap |
| * |
| * Transmit the set of pages to be discarded after precopy to the target |
| * these are pages that: |
| * a) Have been previously transmitted but are now dirty again |
| * b) Pages that have never been transmitted, this ensures that |
| * any pages on the destination that have been mapped by background |
| * tasks get discarded (transparent huge pages is the specific concern) |
| * Hopefully this is pretty sparse |
| * |
| * @ms: current migration state |
| */ |
| void ram_postcopy_send_discard_bitmap(MigrationState *ms) |
| { |
| RAMState *rs = ram_state; |
| |
| RCU_READ_LOCK_GUARD(); |
| |
| /* This should be our last sync, the src is now paused */ |
| migration_bitmap_sync(rs, false); |
| |
| /* Easiest way to make sure we don't resume in the middle of a host-page */ |
| rs->pss[RAM_CHANNEL_PRECOPY].last_sent_block = NULL; |
| rs->last_seen_block = NULL; |
| rs->last_page = 0; |
| |
| postcopy_each_ram_send_discard(ms); |
| |
| trace_ram_postcopy_send_discard_bitmap(); |
| } |
| |
| /** |
| * ram_discard_range: discard dirtied pages at the beginning of postcopy |
| * |
| * Returns zero on success |
| * |
| * @rbname: name of the RAMBlock of the request. NULL means the |
| * same that last one. |
| * @start: RAMBlock starting page |
| * @length: RAMBlock size |
| */ |
| int ram_discard_range(const char *rbname, uint64_t start, size_t length) |
| { |
| trace_ram_discard_range(rbname, start, length); |
| |
| RCU_READ_LOCK_GUARD(); |
| RAMBlock *rb = qemu_ram_block_by_name(rbname); |
| |
| if (!rb) { |
| error_report("ram_discard_range: Failed to find block '%s'", rbname); |
| return -1; |
| } |
| |
| /* |
| * On source VM, we don't need to update the received bitmap since |
| * we don't even have one. |
| */ |
| if (rb->receivedmap) { |
| bitmap_clear(rb->receivedmap, start >> qemu_target_page_bits(), |
| length >> qemu_target_page_bits()); |
| } |
| |
| return ram_block_discard_range(rb, start, length); |
| } |
| |
| /* |
| * For every allocation, we will try not to crash the VM if the |
| * allocation failed. |
| */ |
| static bool xbzrle_init(Error **errp) |
| { |
| if (!migrate_xbzrle()) { |
| return true; |
| } |
| |
| XBZRLE_cache_lock(); |
| |
| XBZRLE.zero_target_page = g_try_malloc0(TARGET_PAGE_SIZE); |
| if (!XBZRLE.zero_target_page) { |
| error_setg(errp, "%s: Error allocating zero page", __func__); |
| goto err_out; |
| } |
| |
| XBZRLE.cache = cache_init(migrate_xbzrle_cache_size(), |
| TARGET_PAGE_SIZE, errp); |
| if (!XBZRLE.cache) { |
| goto free_zero_page; |
| } |
| |
| XBZRLE.encoded_buf = g_try_malloc0(TARGET_PAGE_SIZE); |
| if (!XBZRLE.encoded_buf) { |
| error_setg(errp, "%s: Error allocating encoded_buf", __func__); |
| goto free_cache; |
| } |
| |
| XBZRLE.current_buf = g_try_malloc(TARGET_PAGE_SIZE); |
| if (!XBZRLE.current_buf) { |
| error_setg(errp, "%s: Error allocating current_buf", __func__); |
| goto free_encoded_buf; |
| } |
| |
| /* We are all good */ |
| XBZRLE_cache_unlock(); |
| return true; |
| |
| free_encoded_buf: |
| g_free(XBZRLE.encoded_buf); |
| XBZRLE.encoded_buf = NULL; |
| free_cache: |
| cache_fini(XBZRLE.cache); |
| XBZRLE.cache = NULL; |
| free_zero_page: |
| g_free(XBZRLE.zero_target_page); |
| XBZRLE.zero_target_page = NULL; |
| err_out: |
| XBZRLE_cache_unlock(); |
| return false; |
| } |
| |
| static bool ram_state_init(RAMState **rsp, Error **errp) |
| { |
| *rsp = g_try_new0(RAMState, 1); |
| |
| if (!*rsp) { |
| error_setg(errp, "%s: Init ramstate fail", __func__); |
| return false; |
| } |
| |
| qemu_mutex_init(&(*rsp)->bitmap_mutex); |
| qemu_mutex_init(&(*rsp)->src_page_req_mutex); |
| QSIMPLEQ_INIT(&(*rsp)->src_page_requests); |
| (*rsp)->ram_bytes_total = ram_bytes_total(); |
| |
| /* |
| * Count the total number of pages used by ram blocks not including any |
| * gaps due to alignment or unplugs. |
| * This must match with the initial values of dirty bitmap. |
| */ |
| (*rsp)->migration_dirty_pages = (*rsp)->ram_bytes_total >> TARGET_PAGE_BITS; |
| ram_state_reset(*rsp); |
| |
| return true; |
| } |
| |
| static void ram_list_init_bitmaps(void) |
| { |
| MigrationState *ms = migrate_get_current(); |
| RAMBlock *block; |
| unsigned long pages; |
| uint8_t shift; |
| |
| /* Skip setting bitmap if there is no RAM */ |
| if (ram_bytes_total()) { |
| shift = ms->clear_bitmap_shift; |
| if (shift > CLEAR_BITMAP_SHIFT_MAX) { |
| error_report("clear_bitmap_shift (%u) too big, using " |
| "max value (%u)", shift, CLEAR_BITMAP_SHIFT_MAX); |
| shift = CLEAR_BITMAP_SHIFT_MAX; |
| } else if (shift < CLEAR_BITMAP_SHIFT_MIN) { |
| error_report("clear_bitmap_shift (%u) too small, using " |
| "min value (%u)", shift, CLEAR_BITMAP_SHIFT_MIN); |
| shift = CLEAR_BITMAP_SHIFT_MIN; |
| } |
| |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| pages = block->max_length >> TARGET_PAGE_BITS; |
| /* |
| * The initial dirty bitmap for migration must be set with all |
| * ones to make sure we'll migrate every guest RAM page to |
| * destination. |
| * Here we set RAMBlock.bmap all to 1 because when rebegin a |
| * new migration after a failed migration, ram_list. |
| * dirty_memory[DIRTY_MEMORY_MIGRATION] don't include the whole |
| * guest memory. |
| */ |
| block->bmap = bitmap_new(pages); |
| bitmap_set(block->bmap, 0, pages); |
| if (migrate_mapped_ram()) { |
| block->file_bmap = bitmap_new(pages); |
| } |
| block->clear_bmap_shift = shift; |
| block->clear_bmap = bitmap_new(clear_bmap_size(pages, shift)); |
| } |
| } |
| } |
| |
| static void migration_bitmap_clear_discarded_pages(RAMState *rs) |
| { |
| unsigned long pages; |
| RAMBlock *rb; |
| |
| RCU_READ_LOCK_GUARD(); |
| |
| RAMBLOCK_FOREACH_NOT_IGNORED(rb) { |
| pages = ramblock_dirty_bitmap_clear_discarded_pages(rb); |
| rs->migration_dirty_pages -= pages; |
| } |
| } |
| |
| static bool ram_init_bitmaps(RAMState *rs, Error **errp) |
| { |
| bool ret = true; |
| |
| qemu_mutex_lock_ramlist(); |
| |
| WITH_RCU_READ_LOCK_GUARD() { |
| ram_list_init_bitmaps(); |
| /* We don't use dirty log with background snapshots */ |
| if (!migrate_background_snapshot()) { |
| ret = memory_global_dirty_log_start(GLOBAL_DIRTY_MIGRATION, errp); |
| if (!ret) { |
| goto out_unlock; |
| } |
| migration_bitmap_sync_precopy(rs, false); |
| } |
| } |
| out_unlock: |
| qemu_mutex_unlock_ramlist(); |
| |
| if (!ret) { |
| ram_bitmaps_destroy(); |
| return false; |
| } |
| |
| /* |
| * After an eventual first bitmap sync, fixup the initial bitmap |
| * containing all 1s to exclude any discarded pages from migration. |
| */ |
| migration_bitmap_clear_discarded_pages(rs); |
| return true; |
| } |
| |
| static int ram_init_all(RAMState **rsp, Error **errp) |
| { |
| if (!ram_state_init(rsp, errp)) { |
| return -1; |
| } |
| |
| if (!xbzrle_init(errp)) { |
| ram_state_cleanup(rsp); |
| return -1; |
| } |
| |
| if (!ram_init_bitmaps(*rsp, errp)) { |
| return -1; |
| } |
| |
| return 0; |
| } |
| |
| static void ram_state_resume_prepare(RAMState *rs, QEMUFile *out) |
| { |
| RAMBlock *block; |
| uint64_t pages = 0; |
| |
| /* |
| * Postcopy is not using xbzrle/compression, so no need for that. |
| * Also, since source are already halted, we don't need to care |
| * about dirty page logging as well. |
| */ |
| |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| pages += bitmap_count_one(block->bmap, |
| block->used_length >> TARGET_PAGE_BITS); |
| } |
| |
| /* This may not be aligned with current bitmaps. Recalculate. */ |
| rs->migration_dirty_pages = pages; |
| |
| ram_state_reset(rs); |
| |
| /* Update RAMState cache of output QEMUFile */ |
| rs->pss[RAM_CHANNEL_PRECOPY].pss_channel = out; |
| |
| trace_ram_state_resume_prepare(pages); |
| } |
| |
| /* |
| * This function clears bits of the free pages reported by the caller from the |
| * migration dirty bitmap. @addr is the host address corresponding to the |
| * start of the continuous guest free pages, and @len is the total bytes of |
| * those pages. |
| */ |
| void qemu_guest_free_page_hint(void *addr, size_t len) |
| { |
| RAMBlock *block; |
| ram_addr_t offset; |
| size_t used_len, start, npages; |
| |
| /* This function is currently expected to be used during live migration */ |
| if (!migration_is_setup_or_active()) { |
| return; |
| } |
| |
| for (; len > 0; len -= used_len, addr += used_len) { |
| block = qemu_ram_block_from_host(addr, false, &offset); |
| if (unlikely(!block || offset >= block->used_length)) { |
| /* |
| * The implementation might not support RAMBlock resize during |
| * live migration, but it could happen in theory with future |
| * updates. So we add a check here to capture that case. |
| */ |
| error_report_once("%s unexpected error", __func__); |
| return; |
| } |
| |
| if (len <= block->used_length - offset) { |
| used_len = len; |
| } else { |
| used_len = block->used_length - offset; |
| } |
| |
| start = offset >> TARGET_PAGE_BITS; |
| npages = used_len >> TARGET_PAGE_BITS; |
| |
| qemu_mutex_lock(&ram_state->bitmap_mutex); |
| /* |
| * The skipped free pages are equavalent to be sent from clear_bmap's |
| * perspective, so clear the bits from the memory region bitmap which |
| * are initially set. Otherwise those skipped pages will be sent in |
| * the next round after syncing from the memory region bitmap. |
| */ |
| migration_clear_memory_region_dirty_bitmap_range(block, start, npages); |
| ram_state->migration_dirty_pages -= |
| bitmap_count_one_with_offset(block->bmap, start, npages); |
| bitmap_clear(block->bmap, start, npages); |
| qemu_mutex_unlock(&ram_state->bitmap_mutex); |
| } |
| } |
| |
| #define MAPPED_RAM_HDR_VERSION 1 |
| struct MappedRamHeader { |
| uint32_t version; |
| /* |
| * The target's page size, so we know how many pages are in the |
| * bitmap. |
| */ |
| uint64_t page_size; |
| /* |
| * The offset in the migration file where the pages bitmap is |
| * stored. |
| */ |
| uint64_t bitmap_offset; |
| /* |
| * The offset in the migration file where the actual pages (data) |
| * are stored. |
| */ |
| uint64_t pages_offset; |
| } QEMU_PACKED; |
| typedef struct MappedRamHeader MappedRamHeader; |
| |
| static void mapped_ram_setup_ramblock(QEMUFile *file, RAMBlock *block) |
| { |
| g_autofree MappedRamHeader *header = NULL; |
| size_t header_size, bitmap_size; |
| long num_pages; |
| |
| header = g_new0(MappedRamHeader, 1); |
| header_size = sizeof(MappedRamHeader); |
| |
| num_pages = block->used_length >> TARGET_PAGE_BITS; |
| bitmap_size = BITS_TO_LONGS(num_pages) * sizeof(unsigned long); |
| |
| /* |
| * Save the file offsets of where the bitmap and the pages should |
| * go as they are written at the end of migration and during the |
| * iterative phase, respectively. |
| */ |
| block->bitmap_offset = qemu_get_offset(file) + header_size; |
| block->pages_offset = ROUND_UP(block->bitmap_offset + |
| bitmap_size, |
| MAPPED_RAM_FILE_OFFSET_ALIGNMENT); |
| |
| header->version = cpu_to_be32(MAPPED_RAM_HDR_VERSION); |
| header->page_size = cpu_to_be64(TARGET_PAGE_SIZE); |
| header->bitmap_offset = cpu_to_be64(block->bitmap_offset); |
| header->pages_offset = cpu_to_be64(block->pages_offset); |
| |
| qemu_put_buffer(file, (uint8_t *) header, header_size); |
| |
| /* prepare offset for next ramblock */ |
| qemu_set_offset(file, block->pages_offset + block->used_length, SEEK_SET); |
| } |
| |
| static bool mapped_ram_read_header(QEMUFile *file, MappedRamHeader *header, |
| Error **errp) |
| { |
| size_t ret, header_size = sizeof(MappedRamHeader); |
| |
| ret = qemu_get_buffer(file, (uint8_t *)header, header_size); |
| if (ret != header_size) { |
| error_setg(errp, "Could not read whole mapped-ram migration header " |
| "(expected %zd, got %zd bytes)", header_size, ret); |
| return false; |
| } |
| |
| /* migration stream is big-endian */ |
| header->version = be32_to_cpu(header->version); |
| |
| if (header->version > MAPPED_RAM_HDR_VERSION) { |
| error_setg(errp, "Migration mapped-ram capability version not " |
| "supported (expected <= %d, got %d)", MAPPED_RAM_HDR_VERSION, |
| header->version); |
| return false; |
| } |
| |
| header->page_size = be64_to_cpu(header->page_size); |
| header->bitmap_offset = be64_to_cpu(header->bitmap_offset); |
| header->pages_offset = be64_to_cpu(header->pages_offset); |
| |
| return true; |
| } |
| |
| /* |
| * Each of ram_save_setup, ram_save_iterate and ram_save_complete has |
| * long-running RCU critical section. When rcu-reclaims in the code |
| * start to become numerous it will be necessary to reduce the |
| * granularity of these critical sections. |
| */ |
| |
| /** |
| * ram_save_setup: Setup RAM for migration |
| * |
| * Returns zero to indicate success and negative for error |
| * |
| * @f: QEMUFile where to send the data |
| * @opaque: RAMState pointer |
| * @errp: pointer to Error*, to store an error if it happens. |
| */ |
| static int ram_save_setup(QEMUFile *f, void *opaque, Error **errp) |
| { |
| RAMState **rsp = opaque; |
| RAMBlock *block; |
| int ret, max_hg_page_size; |
| |
| /* migration has already setup the bitmap, reuse it. */ |
| if (!migration_in_colo_state()) { |
| if (ram_init_all(rsp, errp) != 0) { |
| return -1; |
| } |
| } |
| (*rsp)->pss[RAM_CHANNEL_PRECOPY].pss_channel = f; |
| |
| /* |
| * ??? Mirrors the previous value of qemu_host_page_size, |
| * but is this really what was intended for the migration? |
| */ |
| max_hg_page_size = MAX(qemu_real_host_page_size(), TARGET_PAGE_SIZE); |
| |
| WITH_RCU_READ_LOCK_GUARD() { |
| qemu_put_be64(f, ram_bytes_total_with_ignored() |
| | RAM_SAVE_FLAG_MEM_SIZE); |
| |
| RAMBLOCK_FOREACH_MIGRATABLE(block) { |
| qemu_put_byte(f, strlen(block->idstr)); |
| qemu_put_buffer(f, (uint8_t *)block->idstr, strlen(block->idstr)); |
| qemu_put_be64(f, block->used_length); |
| if (migrate_postcopy_ram() && |
| block->page_size != max_hg_page_size) { |
| qemu_put_be64(f, block->page_size); |
| } |
| if (migrate_ignore_shared()) { |
| qemu_put_be64(f, block->mr->addr); |
| } |
| |
| if (migrate_mapped_ram()) { |
| mapped_ram_setup_ramblock(f, block); |
| } |
| } |
| } |
| |
| ret = rdma_registration_start(f, RAM_CONTROL_SETUP); |
| if (ret < 0) { |
| error_setg(errp, "%s: failed to start RDMA registration", __func__); |
| qemu_file_set_error(f, ret); |
| return ret; |
| } |
| |
| ret = rdma_registration_stop(f, RAM_CONTROL_SETUP); |
| if (ret < 0) { |
| error_setg(errp, "%s: failed to stop RDMA registration", __func__); |
| qemu_file_set_error(f, ret); |
| return ret; |
| } |
| |
| migration_ops = g_malloc0(sizeof(MigrationOps)); |
| |
| if (migrate_multifd()) { |
| migration_ops->ram_save_target_page = ram_save_target_page_multifd; |
| } else { |
| migration_ops->ram_save_target_page = ram_save_target_page_legacy; |
| } |
| |
| bql_unlock(); |
| ret = multifd_send_sync_main(); |
| bql_lock(); |
| if (ret < 0) { |
| error_setg(errp, "%s: multifd synchronization failed", __func__); |
| return ret; |
| } |
| |
| if (migrate_multifd() && !migrate_multifd_flush_after_each_section() |
| && !migrate_mapped_ram()) { |
| qemu_put_be64(f, RAM_SAVE_FLAG_MULTIFD_FLUSH); |
| } |
| |
| qemu_put_be64(f, RAM_SAVE_FLAG_EOS); |
| ret = qemu_fflush(f); |
| if (ret < 0) { |
| error_setg_errno(errp, -ret, "%s failed", __func__); |
| } |
| return ret; |
| } |
| |
| static void ram_save_file_bmap(QEMUFile *f) |
| { |
| RAMBlock *block; |
| |
| RAMBLOCK_FOREACH_MIGRATABLE(block) { |
| long num_pages = block->used_length >> TARGET_PAGE_BITS; |
| long bitmap_size = BITS_TO_LONGS(num_pages) * sizeof(unsigned long); |
| |
| qemu_put_buffer_at(f, (uint8_t *)block->file_bmap, bitmap_size, |
| block->bitmap_offset); |
| ram_transferred_add(bitmap_size); |
| |
| /* |
| * Free the bitmap here to catch any synchronization issues |
| * with multifd channels. No channels should be sending pages |
| * after we've written the bitmap to file. |
| */ |
| g_free(block->file_bmap); |
| block->file_bmap = NULL; |
| } |
| } |
| |
| void ramblock_set_file_bmap_atomic(RAMBlock *block, ram_addr_t offset, bool set) |
| { |
| if (set) { |
| set_bit_atomic(offset >> TARGET_PAGE_BITS, block->file_bmap); |
| } else { |
| clear_bit_atomic(offset >> TARGET_PAGE_BITS, block->file_bmap); |
| } |
| } |
| |
| /** |
| * ram_save_iterate: iterative stage for migration |
| * |
| * Returns zero to indicate success and negative for error |
| * |
| * @f: QEMUFile where to send the data |
| * @opaque: RAMState pointer |
| */ |
| static int ram_save_iterate(QEMUFile *f, void *opaque) |
| { |
| RAMState **temp = opaque; |
| RAMState *rs = *temp; |
| int ret = 0; |
| int i; |
| int64_t t0; |
| int done = 0; |
| |
| /* |
| * We'll take this lock a little bit long, but it's okay for two reasons. |
| * Firstly, the only possible other thread to take it is who calls |
| * qemu_guest_free_page_hint(), which should be rare; secondly, see |
| * MAX_WAIT (if curious, further see commit 4508bd9ed8053ce) below, which |
| * guarantees that we'll at least released it in a regular basis. |
| */ |
| WITH_QEMU_LOCK_GUARD(&rs->bitmap_mutex) { |
| WITH_RCU_READ_LOCK_GUARD() { |
| if (ram_list.version != rs->last_version) { |
| ram_state_reset(rs); |
| } |
| |
| /* Read version before ram_list.blocks */ |
| smp_rmb(); |
| |
| ret = rdma_registration_start(f, RAM_CONTROL_ROUND); |
| if (ret < 0) { |
| qemu_file_set_error(f, ret); |
| goto out; |
| } |
| |
| t0 = qemu_clock_get_ns(QEMU_CLOCK_REALTIME); |
| i = 0; |
| while ((ret = migration_rate_exceeded(f)) == 0 || |
| postcopy_has_request(rs)) { |
| int pages; |
| |
| if (qemu_file_get_error(f)) { |
| break; |
| } |
| |
| pages = ram_find_and_save_block(rs); |
| /* no more pages to sent */ |
| if (pages == 0) { |
| done = 1; |
| break; |
| } |
| |
| if (pages < 0) { |
| qemu_file_set_error(f, pages); |
| break; |
| } |
| |
| rs->target_page_count += pages; |
| |
| /* |
| * we want to check in the 1st loop, just in case it was the 1st |
| * time and we had to sync the dirty bitmap. |
| * qemu_clock_get_ns() is a bit expensive, so we only check each |
| * some iterations |
| */ |
| if ((i & 63) == 0) { |
| uint64_t t1 = (qemu_clock_get_ns(QEMU_CLOCK_REALTIME) - t0) / |
| 1000000; |
| if (t1 > MAX_WAIT) { |
| trace_ram_save_iterate_big_wait(t1, i); |
| break; |
| } |
| } |
| i++; |
| } |
| } |
| } |
| |
| /* |
| * Must occur before EOS (or any QEMUFile operation) |
| * because of RDMA protocol. |
| */ |
| ret = rdma_registration_stop(f, RAM_CONTROL_ROUND); |
| if (ret < 0) { |
| qemu_file_set_error(f, ret); |
| } |
| |
| out: |
| if (ret >= 0 |
| && migration_is_setup_or_active()) { |
| if (migrate_multifd() && migrate_multifd_flush_after_each_section() && |
| !migrate_mapped_ram()) { |
| ret = multifd_send_sync_main(); |
| if (ret < 0) { |
| return ret; |
| } |
| } |
| |
| qemu_put_be64(f, RAM_SAVE_FLAG_EOS); |
| ram_transferred_add(8); |
| ret = qemu_fflush(f); |
| } |
| if (ret < 0) { |
| return ret; |
| } |
| |
| return done; |
| } |
| |
| /** |
| * ram_save_complete: function called to send the remaining amount of ram |
| * |
| * Returns zero to indicate success or negative on error |
| * |
| * Called with the BQL |
| * |
| * @f: QEMUFile where to send the data |
| * @opaque: RAMState pointer |
| */ |
| static int ram_save_complete(QEMUFile *f, void *opaque) |
| { |
| RAMState **temp = opaque; |
| RAMState *rs = *temp; |
| int ret = 0; |
| |
| rs->last_stage = !migration_in_colo_state(); |
| |
| WITH_RCU_READ_LOCK_GUARD() { |
| if (!migration_in_postcopy()) { |
| migration_bitmap_sync_precopy(rs, true); |
| } |
| |
| ret = rdma_registration_start(f, RAM_CONTROL_FINISH); |
| if (ret < 0) { |
| qemu_file_set_error(f, ret); |
| return ret; |
| } |
| |
| /* try transferring iterative blocks of memory */ |
| |
| /* flush all remaining blocks regardless of rate limiting */ |
| qemu_mutex_lock(&rs->bitmap_mutex); |
| while (true) { |
| int pages; |
| |
| pages = ram_find_and_save_block(rs); |
| /* no more blocks to sent */ |
| if (pages == 0) { |
| break; |
| } |
| if (pages < 0) { |
| qemu_mutex_unlock(&rs->bitmap_mutex); |
| return pages; |
| } |
| } |
| qemu_mutex_unlock(&rs->bitmap_mutex); |
| |
| ret = rdma_registration_stop(f, RAM_CONTROL_FINISH); |
| if (ret < 0) { |
| qemu_file_set_error(f, ret); |
| return ret; |
| } |
| } |
| |
| ret = multifd_send_sync_main(); |
| if (ret < 0) { |
| return ret; |
| } |
| |
| if (migrate_mapped_ram()) { |
| ram_save_file_bmap(f); |
| |
| if (qemu_file_get_error(f)) { |
| Error *local_err = NULL; |
| int err = qemu_file_get_error_obj(f, &local_err); |
| |
| error_reportf_err(local_err, "Failed to write bitmap to file: "); |
| return -err; |
| } |
| } |
| |
| qemu_put_be64(f, RAM_SAVE_FLAG_EOS); |
| return qemu_fflush(f); |
| } |
| |
| static void ram_state_pending_estimate(void *opaque, uint64_t *must_precopy, |
| uint64_t *can_postcopy) |
| { |
| RAMState **temp = opaque; |
| RAMState *rs = *temp; |
| |
| uint64_t remaining_size = rs->migration_dirty_pages * TARGET_PAGE_SIZE; |
| |
| if (migrate_postcopy_ram()) { |
| /* We can do postcopy, and all the data is postcopiable */ |
| *can_postcopy += remaining_size; |
| } else { |
| *must_precopy += remaining_size; |
| } |
| } |
| |
| static void ram_state_pending_exact(void *opaque, uint64_t *must_precopy, |
| uint64_t *can_postcopy) |
| { |
| RAMState **temp = opaque; |
| RAMState *rs = *temp; |
| uint64_t remaining_size; |
| |
| if (!migration_in_postcopy()) { |
| bql_lock(); |
| WITH_RCU_READ_LOCK_GUARD() { |
| migration_bitmap_sync_precopy(rs, false); |
| } |
| bql_unlock(); |
| } |
| |
| remaining_size = rs->migration_dirty_pages * TARGET_PAGE_SIZE; |
| |
| if (migrate_postcopy_ram()) { |
| /* We can do postcopy, and all the data is postcopiable */ |
| *can_postcopy += remaining_size; |
| } else { |
| *must_precopy += remaining_size; |
| } |
| } |
| |
| static int load_xbzrle(QEMUFile *f, ram_addr_t addr, void *host) |
| { |
| unsigned int xh_len; |
| int xh_flags; |
| uint8_t *loaded_data; |
| |
| /* extract RLE header */ |
| xh_flags = qemu_get_byte(f); |
| xh_len = qemu_get_be16(f); |
| |
| if (xh_flags != ENCODING_FLAG_XBZRLE) { |
| error_report("Failed to load XBZRLE page - wrong compression!"); |
| return -1; |
| } |
| |
| if (xh_len > TARGET_PAGE_SIZE) { |
| error_report("Failed to load XBZRLE page - len overflow!"); |
| return -1; |
| } |
| loaded_data = XBZRLE.decoded_buf; |
| /* load data and decode */ |
| /* it can change loaded_data to point to an internal buffer */ |
| qemu_get_buffer_in_place(f, &loaded_data, xh_len); |
| |
| /* decode RLE */ |
| if (xbzrle_decode_buffer(loaded_data, xh_len, host, |
| TARGET_PAGE_SIZE) == -1) { |
| error_report("Failed to load XBZRLE page - decode error!"); |
| return -1; |
| } |
| |
| return 0; |
| } |
| |
| /** |
| * ram_block_from_stream: read a RAMBlock id from the migration stream |
| * |
| * Must be called from within a rcu critical section. |
| * |
| * Returns a pointer from within the RCU-protected ram_list. |
| * |
| * @mis: the migration incoming state pointer |
| * @f: QEMUFile where to read the data from |
| * @flags: Page flags (mostly to see if it's a continuation of previous block) |
| * @channel: the channel we're using |
| */ |
| static inline RAMBlock *ram_block_from_stream(MigrationIncomingState *mis, |
| QEMUFile *f, int flags, |
| int channel) |
| { |
| RAMBlock *block = mis->last_recv_block[channel]; |
| char id[256]; |
| uint8_t len; |
| |
| if (flags & RAM_SAVE_FLAG_CONTINUE) { |
| if (!block) { |
| error_report("Ack, bad migration stream!"); |
| return NULL; |
| } |
| return block; |
| } |
| |
| len = qemu_get_byte(f); |
| qemu_get_buffer(f, (uint8_t *)id, len); |
| id[len] = 0; |
| |
| block = qemu_ram_block_by_name(id); |
| if (!block) { |
| error_report("Can't find block %s", id); |
| return NULL; |
| } |
| |
| if (migrate_ram_is_ignored(block)) { |
| error_report("block %s should not be migrated !", id); |
| return NULL; |
| } |
| |
| mis->last_recv_block[channel] = block; |
| |
| return block; |
| } |
| |
| static inline void *host_from_ram_block_offset(RAMBlock *block, |
| ram_addr_t offset) |
| { |
| if (!offset_in_ramblock(block, offset)) { |
| return NULL; |
| } |
| |
| return block->host + offset; |
| } |
| |
| static void *host_page_from_ram_block_offset(RAMBlock *block, |
| ram_addr_t offset) |
| { |
| /* Note: Explicitly no check against offset_in_ramblock(). */ |
| return (void *)QEMU_ALIGN_DOWN((uintptr_t)(block->host + offset), |
| block->page_size); |
| } |
| |
| static ram_addr_t host_page_offset_from_ram_block_offset(RAMBlock *block, |
| ram_addr_t offset) |
| { |
| return ((uintptr_t)block->host + offset) & (block->page_size - 1); |
| } |
| |
| void colo_record_bitmap(RAMBlock *block, ram_addr_t *normal, uint32_t pages) |
| { |
| qemu_mutex_lock(&ram_state->bitmap_mutex); |
| for (int i = 0; i < pages; i++) { |
| ram_addr_t offset = normal[i]; |
| ram_state->migration_dirty_pages += !test_and_set_bit( |
| offset >> TARGET_PAGE_BITS, |
| block->bmap); |
| } |
| qemu_mutex_unlock(&ram_state->bitmap_mutex); |
| } |
| |
| static inline void *colo_cache_from_block_offset(RAMBlock *block, |
| ram_addr_t offset, bool record_bitmap) |
| { |
| if (!offset_in_ramblock(block, offset)) { |
| return NULL; |
| } |
| if (!block->colo_cache) { |
| error_report("%s: colo_cache is NULL in block :%s", |
| __func__, block->idstr); |
| return NULL; |
| } |
| |
| /* |
| * During colo checkpoint, we need bitmap of these migrated pages. |
| * It help us to decide which pages in ram cache should be flushed |
| * into VM's RAM later. |
| */ |
| if (record_bitmap) { |
| colo_record_bitmap(block, &offset, 1); |
| } |
| return block->colo_cache + offset; |
| } |
| |
| /** |
| * ram_handle_zero: handle the zero page case |
| * |
| * If a page (or a whole RDMA chunk) has been |
| * determined to be zero, then zap it. |
| * |
| * @host: host address for the zero page |
| * @ch: what the page is filled from. We only support zero |
| * @size: size of the zero page |
| */ |
| void ram_handle_zero(void *host, uint64_t size) |
| { |
| if (!buffer_is_zero(host, size)) { |
| memset(host, 0, size); |
| } |
| } |
| |
| static void colo_init_ram_state(void) |
| { |
| Error *local_err = NULL; |
| |
| if (!ram_state_init(&ram_state, &local_err)) { |
| error_report_err(local_err); |
| } |
| } |
| |
| /* |
| * colo cache: this is for secondary VM, we cache the whole |
| * memory of the secondary VM, it is need to hold the global lock |
| * to call this helper. |
| */ |
| int colo_init_ram_cache(void) |
| { |
| RAMBlock *block; |
| |
| WITH_RCU_READ_LOCK_GUARD() { |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| block->colo_cache = qemu_anon_ram_alloc(block->used_length, |
| NULL, false, false); |
| if (!block->colo_cache) { |
| error_report("%s: Can't alloc memory for COLO cache of block %s," |
| "size 0x" RAM_ADDR_FMT, __func__, block->idstr, |
| block->used_length); |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| if (block->colo_cache) { |
| qemu_anon_ram_free(block->colo_cache, block->used_length); |
| block->colo_cache = NULL; |
| } |
| } |
| return -errno; |
| } |
| if (!machine_dump_guest_core(current_machine)) { |
| qemu_madvise(block->colo_cache, block->used_length, |
| QEMU_MADV_DONTDUMP); |
| } |
| } |
| } |
| |
| /* |
| * Record the dirty pages that sent by PVM, we use this dirty bitmap together |
| * with to decide which page in cache should be flushed into SVM's RAM. Here |
| * we use the same name 'ram_bitmap' as for migration. |
| */ |
| if (ram_bytes_total()) { |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| unsigned long pages = block->max_length >> TARGET_PAGE_BITS; |
| block->bmap = bitmap_new(pages); |
| } |
| } |
| |
| colo_init_ram_state(); |
| return 0; |
| } |
| |
| /* TODO: duplicated with ram_init_bitmaps */ |
| void colo_incoming_start_dirty_log(void) |
| { |
| RAMBlock *block = NULL; |
| Error *local_err = NULL; |
| |
| /* For memory_global_dirty_log_start below. */ |
| bql_lock(); |
| qemu_mutex_lock_ramlist(); |
| |
| memory_global_dirty_log_sync(false); |
| WITH_RCU_READ_LOCK_GUARD() { |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| ramblock_sync_dirty_bitmap(ram_state, block); |
| /* Discard this dirty bitmap record */ |
| bitmap_zero(block->bmap, block->max_length >> TARGET_PAGE_BITS); |
| } |
| if (!memory_global_dirty_log_start(GLOBAL_DIRTY_MIGRATION, |
| &local_err)) { |
| error_report_err(local_err); |
| } |
| } |
| ram_state->migration_dirty_pages = 0; |
| qemu_mutex_unlock_ramlist(); |
| bql_unlock(); |
| } |
| |
| /* It is need to hold the global lock to call this helper */ |
| void colo_release_ram_cache(void) |
| { |
| RAMBlock *block; |
| |
| memory_global_dirty_log_stop(GLOBAL_DIRTY_MIGRATION); |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| g_free(block->bmap); |
| block->bmap = NULL; |
| } |
| |
| WITH_RCU_READ_LOCK_GUARD() { |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| if (block->colo_cache) { |
| qemu_anon_ram_free(block->colo_cache, block->used_length); |
| block->colo_cache = NULL; |
| } |
| } |
| } |
| ram_state_cleanup(&ram_state); |
| } |
| |
| /** |
| * ram_load_setup: Setup RAM for migration incoming side |
| * |
| * Returns zero to indicate success and negative for error |
| * |
| * @f: QEMUFile where to receive the data |
| * @opaque: RAMState pointer |
| * @errp: pointer to Error*, to store an error if it happens. |
| */ |
| static int ram_load_setup(QEMUFile *f, void *opaque, Error **errp) |
| { |
| xbzrle_load_setup(); |
| ramblock_recv_map_init(); |
| |
| return 0; |
| } |
| |
| static int ram_load_cleanup(void *opaque) |
| { |
| RAMBlock *rb; |
| |
| RAMBLOCK_FOREACH_NOT_IGNORED(rb) { |
| qemu_ram_block_writeback(rb); |
| } |
| |
| xbzrle_load_cleanup(); |
| |
| RAMBLOCK_FOREACH_NOT_IGNORED(rb) { |
| g_free(rb->receivedmap); |
| rb->receivedmap = NULL; |
| } |
| |
| return 0; |
| } |
| |
| /** |
| * ram_postcopy_incoming_init: allocate postcopy data structures |
| * |
| * Returns 0 for success and negative if there was one error |
| * |
| * @mis: current migration incoming state |
| * |
| * Allocate data structures etc needed by incoming migration with |
| * postcopy-ram. postcopy-ram's similarly names |
| * postcopy_ram_incoming_init does the work. |
| */ |
| int ram_postcopy_incoming_init(MigrationIncomingState *mis) |
| { |
| return postcopy_ram_incoming_init(mis); |
| } |
| |
| /** |
| * ram_load_postcopy: load a page in postcopy case |
| * |
| * Returns 0 for success or -errno in case of error |
| * |
| * Called in postcopy mode by ram_load(). |
| * rcu_read_lock is taken prior to this being called. |
| * |
| * @f: QEMUFile where to send the data |
| * @channel: the channel to use for loading |
| */ |
| int ram_load_postcopy(QEMUFile *f, int channel) |
| { |
| int flags = 0, ret = 0; |
| bool place_needed = false; |
| bool matches_target_page_size = false; |
| MigrationIncomingState *mis = migration_incoming_get_current(); |
| PostcopyTmpPage *tmp_page = &mis->postcopy_tmp_pages[channel]; |
| |
| while (!ret && !(flags & RAM_SAVE_FLAG_EOS)) { |
| ram_addr_t addr; |
| void *page_buffer = NULL; |
| void *place_source = NULL; |
| RAMBlock *block = NULL; |
| uint8_t ch; |
| |
| addr = qemu_get_be64(f); |
| |
| /* |
| * If qemu file error, we should stop here, and then "addr" |
| * may be invalid |
| */ |
| ret = qemu_file_get_error(f); |
| if (ret) { |
| break; |
| } |
| |
| flags = addr & ~TARGET_PAGE_MASK; |
| addr &= TARGET_PAGE_MASK; |
| |
| trace_ram_load_postcopy_loop(channel, (uint64_t)addr, flags); |
| if (flags & (RAM_SAVE_FLAG_ZERO | RAM_SAVE_FLAG_PAGE)) { |
| block = ram_block_from_stream(mis, f, flags, channel); |
| if (!block) { |
| ret = -EINVAL; |
| break; |
| } |
| |
| /* |
| * Relying on used_length is racy and can result in false positives. |
| * We might place pages beyond used_length in case RAM was shrunk |
| * while in postcopy, which is fine - trying to place via |
| * UFFDIO_COPY/UFFDIO_ZEROPAGE will never segfault. |
| */ |
| if (!block->host || addr >= block->postcopy_length) { |
| error_report("Illegal RAM offset " RAM_ADDR_FMT, addr); |
| ret = -EINVAL; |
| break; |
| } |
| tmp_page->target_pages++; |
| matches_target_page_size = block->page_size == TARGET_PAGE_SIZE; |
| /* |
| * Postcopy requires that we place whole host pages atomically; |
| * these may be huge pages for RAMBlocks that are backed by |
| * hugetlbfs. |
| * To make it atomic, the data is read into a temporary page |
| * that's moved into place later. |
| * The migration protocol uses, possibly smaller, target-pages |
| * however the source ensures it always sends all the components |
| * of a host page in one chunk. |
| */ |
| page_buffer = tmp_page->tmp_huge_page + |
| host_page_offset_from_ram_block_offset(block, addr); |
| /* If all TP are zero then we can optimise the place */ |
| if (tmp_page->target_pages == 1) { |
| tmp_page->host_addr = |
| host_page_from_ram_block_offset(block, addr); |
| } else if (tmp_page->host_addr != |
| host_page_from_ram_block_offset(block, addr)) { |
| /* not the 1st TP within the HP */ |
| error_report("Non-same host page detected on channel %d: " |
| "Target host page %p, received host page %p " |
| "(rb %s offset 0x"RAM_ADDR_FMT" target_pages %d)", |
| channel, tmp_page->host_addr, |
| host_page_from_ram_block_offset(block, addr), |
| block->idstr, addr, tmp_page->target_pages); |
| ret = -EINVAL; |
| break; |
| } |
| |
| /* |
| * If it's the last part of a host page then we place the host |
| * page |
| */ |
| if (tmp_page->target_pages == |
| (block->page_size / TARGET_PAGE_SIZE)) { |
| place_needed = true; |
| } |
| place_source = tmp_page->tmp_huge_page; |
| } |
| |
| switch (flags & ~RAM_SAVE_FLAG_CONTINUE) { |
| case RAM_SAVE_FLAG_ZERO: |
| ch = qemu_get_byte(f); |
| if (ch != 0) { |
| error_report("Found a zero page with value %d", ch); |
| ret = -EINVAL; |
| break; |
| } |
| /* |
| * Can skip to set page_buffer when |
| * this is a zero page and (block->page_size == TARGET_PAGE_SIZE). |
| */ |
| if (!matches_target_page_size) { |
| memset(page_buffer, ch, TARGET_PAGE_SIZE); |
| } |
| break; |
| |
| case RAM_SAVE_FLAG_PAGE: |
| tmp_page->all_zero = false; |
| if (!matches_target_page_size) { |
| /* For huge pages, we always use temporary buffer */ |
| qemu_get_buffer(f, page_buffer, TARGET_PAGE_SIZE); |
| } else { |
| /* |
| * For small pages that matches target page size, we |
| * avoid the qemu_file copy. Instead we directly use |
| * the buffer of QEMUFile to place the page. Note: we |
| * cannot do any QEMUFile operation before using that |
| * buffer to make sure the buffer is valid when |
| * placing the page. |
| */ |
| qemu_get_buffer_in_place(f, (uint8_t **)&place_source, |
| TARGET_PAGE_SIZE); |
| } |
| break; |
| case RAM_SAVE_FLAG_MULTIFD_FLUSH: |
| multifd_recv_sync_main(); |
| break; |
| case RAM_SAVE_FLAG_EOS: |
| /* normal exit */ |
| if (migrate_multifd() && |
| migrate_multifd_flush_after_each_section()) { |
| multifd_recv_sync_main(); |
| } |
| break; |
| default: |
| error_report("Unknown combination of migration flags: 0x%x" |
| " (postcopy mode)", flags); |
| ret = -EINVAL; |
| break; |
| } |
| |
| /* Detect for any possible file errors */ |
| if (!ret && qemu_file_get_error(f)) { |
| ret = qemu_file_get_error(f); |
| } |
| |
| if (!ret && place_needed) { |
| if (tmp_page->all_zero) { |
| ret = postcopy_place_page_zero(mis, tmp_page->host_addr, block); |
| } else { |
| ret = postcopy_place_page(mis, tmp_page->host_addr, |
| place_source, block); |
| } |
| place_needed = false; |
| postcopy_temp_page_reset(tmp_page); |
| } |
| } |
| |
| return ret; |
| } |
| |
| static bool postcopy_is_running(void) |
| { |
| PostcopyState ps = postcopy_state_get(); |
| return ps >= POSTCOPY_INCOMING_LISTENING && ps < POSTCOPY_INCOMING_END; |
| } |
| |
| /* |
| * Flush content of RAM cache into SVM's memory. |
| * Only flush the pages that be dirtied by PVM or SVM or both. |
| */ |
| void colo_flush_ram_cache(void) |
| { |
| RAMBlock *block = NULL; |
| void *dst_host; |
| void *src_host; |
| unsigned long offset = 0; |
| |
| memory_global_dirty_log_sync(false); |
| qemu_mutex_lock(&ram_state->bitmap_mutex); |
| WITH_RCU_READ_LOCK_GUARD() { |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| ramblock_sync_dirty_bitmap(ram_state, block); |
| } |
| } |
| |
| trace_colo_flush_ram_cache_begin(ram_state->migration_dirty_pages); |
| WITH_RCU_READ_LOCK_GUARD() { |
| block = QLIST_FIRST_RCU(&ram_list.blocks); |
| |
| while (block) { |
| unsigned long num = 0; |
| |
| offset = colo_bitmap_find_dirty(ram_state, block, offset, &num); |
| if (!offset_in_ramblock(block, |
| ((ram_addr_t)offset) << TARGET_PAGE_BITS)) { |
| offset = 0; |
| num = 0; |
| block = QLIST_NEXT_RCU(block, next); |
| } else { |
| unsigned long i = 0; |
| |
| for (i = 0; i < num; i++) { |
| migration_bitmap_clear_dirty(ram_state, block, offset + i); |
| } |
| dst_host = block->host |
| + (((ram_addr_t)offset) << TARGET_PAGE_BITS); |
| src_host = block->colo_cache |
| + (((ram_addr_t)offset) << TARGET_PAGE_BITS); |
| memcpy(dst_host, src_host, TARGET_PAGE_SIZE * num); |
| offset += num; |
| } |
| } |
| } |
| qemu_mutex_unlock(&ram_state->bitmap_mutex); |
| trace_colo_flush_ram_cache_end(); |
| } |
| |
| static size_t ram_load_multifd_pages(void *host_addr, size_t size, |
| uint64_t offset) |
| { |
| MultiFDRecvData *data = multifd_get_recv_data(); |
| |
| data->opaque = host_addr; |
| data->file_offset = offset; |
| data->size = size; |
| |
| if (!multifd_recv()) { |
| return 0; |
| } |
| |
| return size; |
| } |
| |
| static bool read_ramblock_mapped_ram(QEMUFile *f, RAMBlock *block, |
| long num_pages, unsigned long *bitmap, |
| Error **errp) |
| { |
| ERRP_GUARD(); |
| unsigned long set_bit_idx, clear_bit_idx; |
| ram_addr_t offset; |
| void *host; |
| size_t read, unread, size; |
| |
| for (set_bit_idx = find_first_bit(bitmap, num_pages); |
| set_bit_idx < num_pages; |
| set_bit_idx = find_next_bit(bitmap, num_pages, clear_bit_idx + 1)) { |
| |
| clear_bit_idx = find_next_zero_bit(bitmap, num_pages, set_bit_idx + 1); |
| |
| unread = TARGET_PAGE_SIZE * (clear_bit_idx - set_bit_idx); |
| offset = set_bit_idx << TARGET_PAGE_BITS; |
| |
| while (unread > 0) { |
| host = host_from_ram_block_offset(block, offset); |
| if (!host) { |
| error_setg(errp, "page outside of ramblock %s range", |
| block->idstr); |
| return false; |
| } |
| |
| size = MIN(unread, MAPPED_RAM_LOAD_BUF_SIZE); |
| |
| if (migrate_multifd()) { |
| read = ram_load_multifd_pages(host, size, |
| block->pages_offset + offset); |
| } else { |
| read = qemu_get_buffer_at(f, host, size, |
| block->pages_offset + offset); |
| } |
| |
| if (!read) { |
| goto err; |
| } |
| offset += read; |
| unread -= read; |
| } |
| } |
| |
| return true; |
| |
| err: |
| qemu_file_get_error_obj(f, errp); |
| error_prepend(errp, "(%s) failed to read page " RAM_ADDR_FMT |
| "from file offset %" PRIx64 ": ", block->idstr, offset, |
| block->pages_offset + offset); |
| return false; |
| } |
| |
| static void parse_ramblock_mapped_ram(QEMUFile *f, RAMBlock *block, |
| ram_addr_t length, Error **errp) |
| { |
| g_autofree unsigned long *bitmap = NULL; |
| MappedRamHeader header; |
| size_t bitmap_size; |
| long num_pages; |
| |
| if (!mapped_ram_read_header(f, &header, errp)) { |
| return; |
| } |
| |
| block->pages_offset = header.pages_offset; |
| |
| /* |
| * Check the alignment of the file region that contains pages. We |
| * don't enforce MAPPED_RAM_FILE_OFFSET_ALIGNMENT to allow that |
| * value to change in the future. Do only a sanity check with page |
| * size alignment. |
| */ |
| if (!QEMU_IS_ALIGNED(block->pages_offset, TARGET_PAGE_SIZE)) { |
| error_setg(errp, |
| "Error reading ramblock %s pages, region has bad alignment", |
| block->idstr); |
| return; |
| } |
| |
| num_pages = length / header.page_size; |
| bitmap_size = BITS_TO_LONGS(num_pages) * sizeof(unsigned long); |
| |
| bitmap = g_malloc0(bitmap_size); |
| if (qemu_get_buffer_at(f, (uint8_t *)bitmap, bitmap_size, |
| header.bitmap_offset) != bitmap_size) { |
| error_setg(errp, "Error reading dirty bitmap"); |
| return; |
| } |
| |
| if (!read_ramblock_mapped_ram(f, block, num_pages, bitmap, errp)) { |
| return; |
| } |
| |
| /* Skip pages array */ |
| qemu_set_offset(f, block->pages_offset + length, SEEK_SET); |
| |
| return; |
| } |
| |
| static int parse_ramblock(QEMUFile *f, RAMBlock *block, ram_addr_t length) |
| { |
| int ret = 0; |
| /* ADVISE is earlier, it shows the source has the postcopy capability on */ |
| bool postcopy_advised = migration_incoming_postcopy_advised(); |
| int max_hg_page_size; |
| Error *local_err = NULL; |
| |
| assert(block); |
| |
| if (migrate_mapped_ram()) { |
| parse_ramblock_mapped_ram(f, block, length, &local_err); |
| if (local_err) { |
| error_report_err(local_err); |
| return -EINVAL; |
| } |
| return 0; |
| } |
| |
| if (!qemu_ram_is_migratable(block)) { |
| error_report("block %s should not be migrated !", block->idstr); |
| return -EINVAL; |
| } |
| |
| if (length != block->used_length) { |
| ret = qemu_ram_resize(block, length, &local_err); |
| if (local_err) { |
| error_report_err(local_err); |
| return ret; |
| } |
| } |
| |
| /* |
| * ??? Mirrors the previous value of qemu_host_page_size, |
| * but is this really what was intended for the migration? |
| */ |
| max_hg_page_size = MAX(qemu_real_host_page_size(), TARGET_PAGE_SIZE); |
| |
| /* For postcopy we need to check hugepage sizes match */ |
| if (postcopy_advised && migrate_postcopy_ram() && |
| block->page_size != max_hg_page_size) { |
| uint64_t remote_page_size = qemu_get_be64(f); |
| if (remote_page_size != block->page_size) { |
| error_report("Mismatched RAM page size %s " |
| "(local) %zd != %" PRId64, block->idstr, |
| block->page_size, remote_page_size); |
| return -EINVAL; |
| } |
| } |
| if (migrate_ignore_shared()) { |
| hwaddr addr = qemu_get_be64(f); |
| if (migrate_ram_is_ignored(block) && |
| block->mr->addr != addr) { |
| error_report("Mismatched GPAs for block %s " |
| "%" PRId64 "!= %" PRId64, block->idstr, |
| (uint64_t)addr, (uint64_t)block->mr->addr); |
| return -EINVAL; |
| } |
| } |
| ret = rdma_block_notification_handle(f, block->idstr); |
| if (ret < 0) { |
| qemu_file_set_error(f, ret); |
| } |
| |
| return ret; |
| } |
| |
| static int parse_ramblocks(QEMUFile *f, ram_addr_t total_ram_bytes) |
| { |
| int ret = 0; |
| |
| /* Synchronize RAM block list */ |
| while (!ret && total_ram_bytes) { |
| RAMBlock *block; |
| char id[256]; |
| ram_addr_t length; |
| int len = qemu_get_byte(f); |
| |
| qemu_get_buffer(f, (uint8_t *)id, len); |
| id[len] = 0; |
| length = qemu_get_be64(f); |
| |
| block = qemu_ram_block_by_name(id); |
| if (block) { |
| ret = parse_ramblock(f, block, length); |
| } else { |
| error_report("Unknown ramblock \"%s\", cannot accept " |
| "migration", id); |
| ret = -EINVAL; |
| } |
| total_ram_bytes -= length; |
| } |
| |
| return ret; |
| } |
| |
| /** |
| * ram_load_precopy: load pages in precopy case |
| * |
| * Returns 0 for success or -errno in case of error |
| * |
| * Called in precopy mode by ram_load(). |
| * rcu_read_lock is taken prior to this being called. |
| * |
| * @f: QEMUFile where to send the data |
| */ |
| static int ram_load_precopy(QEMUFile *f) |
| { |
| MigrationIncomingState *mis = migration_incoming_get_current(); |
| int flags = 0, ret = 0, invalid_flags = 0, i = 0; |
| |
| if (migrate_mapped_ram()) { |
| invalid_flags |= (RAM_SAVE_FLAG_HOOK | RAM_SAVE_FLAG_MULTIFD_FLUSH | |
| RAM_SAVE_FLAG_PAGE | RAM_SAVE_FLAG_XBZRLE | |
| RAM_SAVE_FLAG_ZERO); |
| } |
| |
| while (!ret && !(flags & RAM_SAVE_FLAG_EOS)) { |
| ram_addr_t addr; |
| void *host = NULL, *host_bak = NULL; |
| uint8_t ch; |
| |
| /* |
| * Yield periodically to let main loop run, but an iteration of |
| * the main loop is expensive, so do it each some iterations |
| */ |
| if ((i & 32767) == 0 && qemu_in_coroutine()) { |
| aio_co_schedule(qemu_get_current_aio_context(), |
| qemu_coroutine_self()); |
| qemu_coroutine_yield(); |
| } |
| i++; |
| |
| addr = qemu_get_be64(f); |
| ret = qemu_file_get_error(f); |
| if (ret) { |
| error_report("Getting RAM address failed"); |
| break; |
| } |
| |
| flags = addr & ~TARGET_PAGE_MASK; |
| addr &= TARGET_PAGE_MASK; |
| |
| if (flags & invalid_flags) { |
| error_report("Unexpected RAM flags: %d", flags & invalid_flags); |
| |
| ret = -EINVAL; |
| break; |
| } |
| |
| if (flags & (RAM_SAVE_FLAG_ZERO | RAM_SAVE_FLAG_PAGE | |
| RAM_SAVE_FLAG_XBZRLE)) { |
| RAMBlock *block = ram_block_from_stream(mis, f, flags, |
| RAM_CHANNEL_PRECOPY); |
| |
| host = host_from_ram_block_offset(block, addr); |
| /* |
| * After going into COLO stage, we should not load the page |
| * into SVM's memory directly, we put them into colo_cache firstly. |
| * NOTE: We need to keep a copy of SVM's ram in colo_cache. |
| * Previously, we copied all these memory in preparing stage of COLO |
| * while we need to stop VM, which is a time-consuming process. |
| * Here we optimize it by a trick, back-up every page while in |
| * migration process while COLO is enabled, though it affects the |
| * speed of the migration, but it obviously reduce the downtime of |
| * back-up all SVM'S memory in COLO preparing stage. |
| */ |
| if (migration_incoming_colo_enabled()) { |
| if (migration_incoming_in_colo_state()) { |
| /* In COLO stage, put all pages into cache temporarily */ |
| host = colo_cache_from_block_offset(block, addr, true); |
| } else { |
| /* |
| * In migration stage but before COLO stage, |
| * Put all pages into both cache and SVM's memory. |
| */ |
| host_bak = colo_cache_from_block_offset(block, addr, false); |
| } |
| } |
| if (!host) { |
| error_report("Illegal RAM offset " RAM_ADDR_FMT, addr); |
| ret = -EINVAL; |
| break; |
| } |
| if (!migration_incoming_in_colo_state()) { |
| ramblock_recv_bitmap_set(block, host); |
| } |
| |
| trace_ram_load_loop(block->idstr, (uint64_t)addr, flags, host); |
| } |
| |
| switch (flags & ~RAM_SAVE_FLAG_CONTINUE) { |
| case RAM_SAVE_FLAG_MEM_SIZE: |
| ret = parse_ramblocks(f, addr); |
| /* |
| * For mapped-ram migration (to a file) using multifd, we sync |
| * once and for all here to make sure all tasks we queued to |
| * multifd threads are completed, so that all the ramblocks |
| * (including all the guest memory pages within) are fully |
| * loaded after this sync returns. |
| */ |
| if (migrate_mapped_ram()) { |
| multifd_recv_sync_main(); |
| } |
| break; |
| |
| case RAM_SAVE_FLAG_ZERO: |
| ch = qemu_get_byte(f); |
| if (ch != 0) { |
| error_report("Found a zero page with value %d", ch); |
| ret = -EINVAL; |
| break; |
| } |
| ram_handle_zero(host, TARGET_PAGE_SIZE); |
| break; |
| |
| case RAM_SAVE_FLAG_PAGE: |
| qemu_get_buffer(f, host, TARGET_PAGE_SIZE); |
| break; |
| |
| case RAM_SAVE_FLAG_XBZRLE: |
| if (load_xbzrle(f, addr, host) < 0) { |
| error_report("Failed to decompress XBZRLE page at " |
| RAM_ADDR_FMT, addr); |
| ret = -EINVAL; |
| break; |
| } |
| break; |
| case RAM_SAVE_FLAG_MULTIFD_FLUSH: |
| multifd_recv_sync_main(); |
| break; |
| case RAM_SAVE_FLAG_EOS: |
| /* normal exit */ |
| if (migrate_multifd() && |
| migrate_multifd_flush_after_each_section() && |
| /* |
| * Mapped-ram migration flushes once and for all after |
| * parsing ramblocks. Always ignore EOS for it. |
| */ |
| !migrate_mapped_ram()) { |
| multifd_recv_sync_main(); |
| } |
| break; |
| case RAM_SAVE_FLAG_HOOK: |
| ret = rdma_registration_handle(f); |
| if (ret < 0) { |
| qemu_file_set_error(f, ret); |
| } |
| break; |
| default: |
| error_report("Unknown combination of migration flags: 0x%x", flags); |
| ret = -EINVAL; |
| } |
| if (!ret) { |
| ret = qemu_file_get_error(f); |
| } |
| if (!ret && host_bak) { |
| memcpy(host_bak, host, TARGET_PAGE_SIZE); |
| } |
| } |
| |
| return ret; |
| } |
| |
| static int ram_load(QEMUFile *f, void *opaque, int version_id) |
| { |
| int ret = 0; |
| static uint64_t seq_iter; |
| /* |
| * If system is running in postcopy mode, page inserts to host memory must |
| * be atomic |
| */ |
| bool postcopy_running = postcopy_is_running(); |
| |
| seq_iter++; |
| |
| if (version_id != 4) { |
| return -EINVAL; |
| } |
| |
| /* |
| * This RCU critical section can be very long running. |
| * When RCU reclaims in the code start to become numerous, |
| * it will be necessary to reduce the granularity of this |
| * critical section. |
| */ |
| WITH_RCU_READ_LOCK_GUARD() { |
| if (postcopy_running) { |
| /* |
| * Note! Here RAM_CHANNEL_PRECOPY is the precopy channel of |
| * postcopy migration, we have another RAM_CHANNEL_POSTCOPY to |
| * service fast page faults. |
| */ |
| ret = ram_load_postcopy(f, RAM_CHANNEL_PRECOPY); |
| } else { |
| ret = ram_load_precopy(f); |
| } |
| } |
| trace_ram_load_complete(ret, seq_iter); |
| |
| return ret; |
| } |
| |
| static bool ram_has_postcopy(void *opaque) |
| { |
| RAMBlock *rb; |
| RAMBLOCK_FOREACH_NOT_IGNORED(rb) { |
| if (ramblock_is_pmem(rb)) { |
| info_report("Block: %s, host: %p is a nvdimm memory, postcopy" |
| "is not supported now!", rb->idstr, rb->host); |
| return false; |
| } |
| } |
| |
| return migrate_postcopy_ram(); |
| } |
| |
| /* Sync all the dirty bitmap with destination VM. */ |
| static int ram_dirty_bitmap_sync_all(MigrationState *s, RAMState *rs) |
| { |
| RAMBlock *block; |
| QEMUFile *file = s->to_dst_file; |
| |
| trace_ram_dirty_bitmap_sync_start(); |
| |
| qatomic_set(&rs->postcopy_bmap_sync_requested, 0); |
| RAMBLOCK_FOREACH_NOT_IGNORED(block) { |
| qemu_savevm_send_recv_bitmap(file, block->idstr); |
| trace_ram_dirty_bitmap_request(block->idstr); |
| qatomic_inc(&rs->postcopy_bmap_sync_requested); |
| } |
| |
| trace_ram_dirty_bitmap_sync_wait(); |
| |
| /* Wait until all the ramblocks' dirty bitmap synced */ |
| while (qatomic_read(&rs->postcopy_bmap_sync_requested)) { |
| if (migration_rp_wait(s)) { |
| return -1; |
| } |
| } |
| |
| trace_ram_dirty_bitmap_sync_complete(); |
| |
| return 0; |
| } |
| |
| /* |
| * Read the received bitmap, revert it as the initial dirty bitmap. |
| * This is only used when the postcopy migration is paused but wants |
| * to resume from a middle point. |
| * |
| * Returns true if succeeded, false for errors. |
| */ |
| bool ram_dirty_bitmap_reload(MigrationState *s, RAMBlock *block, Error **errp) |
| { |
| /* from_dst_file is always valid because we're within rp_thread */ |
| QEMUFile *file = s->rp_state.from_dst_file; |
| g_autofree unsigned long *le_bitmap = NULL; |
| unsigned long nbits = block->used_length >> TARGET_PAGE_BITS; |
| uint64_t local_size = DIV_ROUND_UP(nbits, 8); |
| uint64_t size, end_mark; |
| RAMState *rs = ram_state; |
| |
| trace_ram_dirty_bitmap_reload_begin(block->idstr); |
| |
| if (s->state != MIGRATION_STATUS_POSTCOPY_RECOVER) { |
| error_setg(errp, "Reload bitmap in incorrect state %s", |
| MigrationStatus_str(s->state)); |
| return false; |
| } |
| |
| /* |
| * Note: see comments in ramblock_recv_bitmap_send() on why we |
| * need the endianness conversion, and the paddings. |
| */ |
| local_size = ROUND_UP(local_size, 8); |
| |
| /* Add paddings */ |
| le_bitmap = bitmap_new(nbits + BITS_PER_LONG); |
| |
| size = qemu_get_be64(file); |
| |
| /* The size of the bitmap should match with our ramblock */ |
| if (size != local_size) { |
| error_setg(errp, "ramblock '%s' bitmap size mismatch (0x%"PRIx64 |
| " != 0x%"PRIx64")", block->idstr, size, local_size); |
| return false; |
| } |
| |
| size = qemu_get_buffer(file, (uint8_t *)le_bitmap, local_size); |
| end_mark = qemu_get_be64(file); |
| |
| if (qemu_file_get_error(file) || size != local_size) { |
| error_setg(errp, "read bitmap failed for ramblock '%s': " |
| "(size 0x%"PRIx64", got: 0x%"PRIx64")", |
| block->idstr, local_size, size); |
| return false; |
| } |
| |
| if (end_mark != RAMBLOCK_RECV_BITMAP_ENDING) { |
| error_setg(errp, "ramblock '%s' end mark incorrect: 0x%"PRIx64, |
| block->idstr, end_mark); |
| return false; |
| } |
| |
| /* |
| * Endianness conversion. We are during postcopy (though paused). |
| * The dirty bitmap won't change. We can directly modify it. |
| */ |
| bitmap_from_le(block->bmap, le_bitmap, nbits); |
| |
| /* |
| * What we received is "received bitmap". Revert it as the initial |
| * dirty bitmap for this ramblock. |
| */ |
| bitmap_complement(block->bmap, block->bmap, nbits); |
| |
| /* Clear dirty bits of discarded ranges that we don't want to migrate. */ |
| ramblock_dirty_bitmap_clear_discarded_pages(block); |
| |
| /* We'll recalculate migration_dirty_pages in ram_state_resume_prepare(). */ |
| trace_ram_dirty_bitmap_reload_complete(block->idstr); |
| |
| qatomic_dec(&rs->postcopy_bmap_sync_requested); |
| |
| /* |
| * We succeeded to sync bitmap for current ramblock. Always kick the |
| * migration thread to check whether all requested bitmaps are |
| * reloaded. NOTE: it's racy to only kick when requested==0, because |
| * we don't know whether the migration thread may still be increasing |
| * it. |
| */ |
| migration_rp_kick(s); |
| |
| return true; |
| } |
| |
| static int ram_resume_prepare(MigrationState *s, void *opaque) |
| { |
| RAMState *rs = *(RAMState **)opaque; |
| int ret; |
| |
| ret = ram_dirty_bitmap_sync_all(s, rs); |
| if (ret) { |
| return ret; |
| } |
| |
| ram_state_resume_prepare(rs, s->to_dst_file); |
| |
| return 0; |
| } |
| |
| void postcopy_preempt_shutdown_file(MigrationState *s) |
| { |
| qemu_put_be64(s->postcopy_qemufile_src, RAM_SAVE_FLAG_EOS); |
| qemu_fflush(s->postcopy_qemufile_src); |
| } |
| |
| static SaveVMHandlers savevm_ram_handlers = { |
| .save_setup = ram_save_setup, |
| .save_live_iterate = ram_save_iterate, |
| .save_live_complete_postcopy = ram_save_complete, |
| .save_live_complete_precopy = ram_save_complete, |
| .has_postcopy = ram_has_postcopy, |
| .state_pending_exact = ram_state_pending_exact, |
| .state_pending_estimate = ram_state_pending_estimate, |
| .load_state = ram_load, |
| .save_cleanup = ram_save_cleanup, |
| .load_setup = ram_load_setup, |
| .load_cleanup = ram_load_cleanup, |
| .resume_prepare = ram_resume_prepare, |
| }; |
| |
| static void ram_mig_ram_block_resized(RAMBlockNotifier *n, void *host, |
| size_t old_size, size_t new_size) |
| { |
| PostcopyState ps = postcopy_state_get(); |
| ram_addr_t offset; |
| RAMBlock *rb = qemu_ram_block_from_host(host, false, &offset); |
| Error *err = NULL; |
| |
| if (!rb) { |
| error_report("RAM block not found"); |
| return; |
| } |
| |
| if (migrate_ram_is_ignored(rb)) { |
| return; |
| } |
| |
| if (!migration_is_idle()) { |
| /* |
| * Precopy code on the source cannot deal with the size of RAM blocks |
| * changing at random points in time - especially after sending the |
| * RAM block sizes in the migration stream, they must no longer change. |
| * Abort and indicate a proper reason. |
| */ |
| error_setg(&err, "RAM block '%s' resized during precopy.", rb->idstr); |
| migration_cancel(err); |
| error_free(err); |
| } |
| |
| switch (ps) { |
| case POSTCOPY_INCOMING_ADVISE: |
| /* |
| * Update what ram_postcopy_incoming_init()->init_range() does at the |
| * time postcopy was advised. Syncing RAM blocks with the source will |
| * result in RAM resizes. |
| */ |
| if (old_size < new_size) { |
| if (ram_discard_range(rb->idstr, old_size, new_size - old_size)) { |
| error_report("RAM block '%s' discard of resized RAM failed", |
| rb->idstr); |
| } |
| } |
| rb->postcopy_length = new_size; |
| break; |
| case POSTCOPY_INCOMING_NONE: |
| case POSTCOPY_INCOMING_RUNNING: |
| case POSTCOPY_INCOMING_END: |
| /* |
| * Once our guest is running, postcopy does no longer care about |
| * resizes. When growing, the new memory was not available on the |
| * source, no handler needed. |
| */ |
| break; |
| default: |
| error_report("RAM block '%s' resized during postcopy state: %d", |
| rb->idstr, ps); |
| exit(-1); |
| } |
| } |
| |
| static RAMBlockNotifier ram_mig_ram_notifier = { |
| .ram_block_resized = ram_mig_ram_block_resized, |
| }; |
| |
| void ram_mig_init(void) |
| { |
| qemu_mutex_init(&XBZRLE.lock); |
| register_savevm_live("ram", 0, 4, &savevm_ram_handlers, &ram_state); |
| ram_block_notifier_add(&ram_mig_ram_notifier); |
| } |