]> git.proxmox.com Git - mirror_qemu.git/blame - migration/postcopy-ram.c
postcopy: Load huge pages in one go
[mirror_qemu.git] / migration / postcopy-ram.c
CommitLineData
eb59db53
DDAG
1/*
2 * Postcopy migration for RAM
3 *
4 * Copyright 2013-2015 Red Hat, Inc. and/or its affiliates
5 *
6 * Authors:
7 * Dave Gilbert <dgilbert@redhat.com>
8 *
9 * This work is licensed under the terms of the GNU GPL, version 2 or later.
10 * See the COPYING file in the top-level directory.
11 *
12 */
13
14/*
15 * Postcopy is a migration technique where the execution flips from the
16 * source to the destination before all the data has been copied.
17 */
18
1393a485 19#include "qemu/osdep.h"
eb59db53
DDAG
20
21#include "qemu-common.h"
22#include "migration/migration.h"
23#include "migration/postcopy-ram.h"
24#include "sysemu/sysemu.h"
371ff5a3 25#include "sysemu/balloon.h"
eb59db53
DDAG
26#include "qemu/error-report.h"
27#include "trace.h"
28
e0b266f0
DDAG
29/* Arbitrary limit on size of each discard command,
30 * keeps them around ~200 bytes
31 */
32#define MAX_DISCARDS_PER_COMMAND 12
33
34struct PostcopyDiscardState {
35 const char *ramblock_name;
36 uint64_t offset; /* Bitmap entry for the 1st bit of this RAMBlock */
37 uint16_t cur_entry;
38 /*
39 * Start and length of a discard range (bytes)
40 */
41 uint64_t start_list[MAX_DISCARDS_PER_COMMAND];
42 uint64_t length_list[MAX_DISCARDS_PER_COMMAND];
43 unsigned int nsentwords;
44 unsigned int nsentcmds;
45};
46
eb59db53
DDAG
47/* Postcopy needs to detect accesses to pages that haven't yet been copied
48 * across, and efficiently map new pages in, the techniques for doing this
49 * are target OS specific.
50 */
51#if defined(__linux__)
52
c4faeed2 53#include <poll.h>
eb59db53
DDAG
54#include <sys/ioctl.h>
55#include <sys/syscall.h>
eb59db53
DDAG
56#include <asm/types.h> /* for __u64 */
57#endif
58
d8b9d771
MF
59#if defined(__linux__) && defined(__NR_userfaultfd) && defined(CONFIG_EVENTFD)
60#include <sys/eventfd.h>
eb59db53
DDAG
61#include <linux/userfaultfd.h>
62
63static bool ufd_version_check(int ufd)
64{
65 struct uffdio_api api_struct;
66 uint64_t ioctl_mask;
67
68 api_struct.api = UFFD_API;
69 api_struct.features = 0;
70 if (ioctl(ufd, UFFDIO_API, &api_struct)) {
71 error_report("postcopy_ram_supported_by_host: UFFDIO_API failed: %s",
72 strerror(errno));
73 return false;
74 }
75
76 ioctl_mask = (__u64)1 << _UFFDIO_REGISTER |
77 (__u64)1 << _UFFDIO_UNREGISTER;
78 if ((api_struct.ioctls & ioctl_mask) != ioctl_mask) {
79 error_report("Missing userfault features: %" PRIx64,
80 (uint64_t)(~api_struct.ioctls & ioctl_mask));
81 return false;
82 }
83
84 return true;
85}
86
5cf0f48d
DDAG
87/*
88 * Check for things that postcopy won't support; returns 0 if the block
89 * is fine.
90 */
91static int check_range(const char *block_name, void *host_addr,
92 ram_addr_t offset, ram_addr_t length, void *opaque)
93{
94 RAMBlock *rb = qemu_ram_block_by_name(block_name);
95
96 if (qemu_ram_pagesize(rb) > getpagesize()) {
97 error_report("Postcopy doesn't support large page sizes yet (%s)",
98 block_name);
99 return -E2BIG;
100 }
101
102 return 0;
103}
104
58b7c17e
DDAG
105/*
106 * Note: This has the side effect of munlock'ing all of RAM, that's
107 * normally fine since if the postcopy succeeds it gets turned back on at the
108 * end.
109 */
eb59db53
DDAG
110bool postcopy_ram_supported_by_host(void)
111{
112 long pagesize = getpagesize();
113 int ufd = -1;
114 bool ret = false; /* Error unless we change it */
115 void *testarea = NULL;
116 struct uffdio_register reg_struct;
117 struct uffdio_range range_struct;
118 uint64_t feature_mask;
119
120 if ((1ul << qemu_target_page_bits()) > pagesize) {
121 error_report("Target page size bigger than host page size");
122 goto out;
123 }
124
5cf0f48d
DDAG
125 /* Check for anything about the RAMBlocks we don't support */
126 if (qemu_ram_foreach_block(check_range, NULL)) {
127 /* check_range will have printed its own error */
128 goto out;
129 }
130
eb59db53
DDAG
131 ufd = syscall(__NR_userfaultfd, O_CLOEXEC);
132 if (ufd == -1) {
133 error_report("%s: userfaultfd not available: %s", __func__,
134 strerror(errno));
135 goto out;
136 }
137
138 /* Version and features check */
139 if (!ufd_version_check(ufd)) {
140 goto out;
141 }
142
58b7c17e
DDAG
143 /*
144 * userfault and mlock don't go together; we'll put it back later if
145 * it was enabled.
146 */
147 if (munlockall()) {
148 error_report("%s: munlockall: %s", __func__, strerror(errno));
149 return -1;
150 }
151
eb59db53
DDAG
152 /*
153 * We need to check that the ops we need are supported on anon memory
154 * To do that we need to register a chunk and see the flags that
155 * are returned.
156 */
157 testarea = mmap(NULL, pagesize, PROT_READ | PROT_WRITE, MAP_PRIVATE |
158 MAP_ANONYMOUS, -1, 0);
159 if (testarea == MAP_FAILED) {
160 error_report("%s: Failed to map test area: %s", __func__,
161 strerror(errno));
162 goto out;
163 }
164 g_assert(((size_t)testarea & (pagesize-1)) == 0);
165
166 reg_struct.range.start = (uintptr_t)testarea;
167 reg_struct.range.len = pagesize;
168 reg_struct.mode = UFFDIO_REGISTER_MODE_MISSING;
169
170 if (ioctl(ufd, UFFDIO_REGISTER, &reg_struct)) {
171 error_report("%s userfault register: %s", __func__, strerror(errno));
172 goto out;
173 }
174
175 range_struct.start = (uintptr_t)testarea;
176 range_struct.len = pagesize;
177 if (ioctl(ufd, UFFDIO_UNREGISTER, &range_struct)) {
178 error_report("%s userfault unregister: %s", __func__, strerror(errno));
179 goto out;
180 }
181
182 feature_mask = (__u64)1 << _UFFDIO_WAKE |
183 (__u64)1 << _UFFDIO_COPY |
184 (__u64)1 << _UFFDIO_ZEROPAGE;
185 if ((reg_struct.ioctls & feature_mask) != feature_mask) {
186 error_report("Missing userfault map features: %" PRIx64,
187 (uint64_t)(~reg_struct.ioctls & feature_mask));
188 goto out;
189 }
190
191 /* Success! */
192 ret = true;
193out:
194 if (testarea) {
195 munmap(testarea, pagesize);
196 }
197 if (ufd != -1) {
198 close(ufd);
199 }
200 return ret;
201}
202
1caddf8a
DDAG
203/*
204 * Setup an area of RAM so that it *can* be used for postcopy later; this
205 * must be done right at the start prior to pre-copy.
206 * opaque should be the MIS.
207 */
208static int init_range(const char *block_name, void *host_addr,
209 ram_addr_t offset, ram_addr_t length, void *opaque)
210{
211 MigrationIncomingState *mis = opaque;
212
213 trace_postcopy_init_range(block_name, host_addr, offset, length);
214
215 /*
216 * We need the whole of RAM to be truly empty for postcopy, so things
217 * like ROMs and any data tables built during init must be zero'd
218 * - we're going to get the copy from the source anyway.
219 * (Precopy will just overwrite this data, so doesn't need the discard)
220 */
d3a5038c 221 if (ram_discard_range(mis, block_name, 0, length)) {
1caddf8a
DDAG
222 return -1;
223 }
224
225 return 0;
226}
227
228/*
229 * At the end of migration, undo the effects of init_range
230 * opaque should be the MIS.
231 */
232static int cleanup_range(const char *block_name, void *host_addr,
233 ram_addr_t offset, ram_addr_t length, void *opaque)
234{
235 MigrationIncomingState *mis = opaque;
236 struct uffdio_range range_struct;
237 trace_postcopy_cleanup_range(block_name, host_addr, offset, length);
238
239 /*
240 * We turned off hugepage for the precopy stage with postcopy enabled
241 * we can turn it back on now.
242 */
1d741439 243 qemu_madvise(host_addr, length, QEMU_MADV_HUGEPAGE);
1caddf8a
DDAG
244
245 /*
246 * We can also turn off userfault now since we should have all the
247 * pages. It can be useful to leave it on to debug postcopy
248 * if you're not sure it's always getting every page.
249 */
250 range_struct.start = (uintptr_t)host_addr;
251 range_struct.len = length;
252
253 if (ioctl(mis->userfault_fd, UFFDIO_UNREGISTER, &range_struct)) {
254 error_report("%s: userfault unregister %s", __func__, strerror(errno));
255
256 return -1;
257 }
258
259 return 0;
260}
261
262/*
263 * Initialise postcopy-ram, setting the RAM to a state where we can go into
264 * postcopy later; must be called prior to any precopy.
265 * called from arch_init's similarly named ram_postcopy_incoming_init
266 */
267int postcopy_ram_incoming_init(MigrationIncomingState *mis, size_t ram_pages)
268{
269 if (qemu_ram_foreach_block(init_range, mis)) {
270 return -1;
271 }
272
273 return 0;
274}
275
276/*
277 * At the end of a migration where postcopy_ram_incoming_init was called.
278 */
279int postcopy_ram_incoming_cleanup(MigrationIncomingState *mis)
280{
c4faeed2
DDAG
281 trace_postcopy_ram_incoming_cleanup_entry();
282
283 if (mis->have_fault_thread) {
284 uint64_t tmp64;
285
286 if (qemu_ram_foreach_block(cleanup_range, mis)) {
287 return -1;
288 }
289 /*
290 * Tell the fault_thread to exit, it's an eventfd that should
291 * currently be at 0, we're going to increment it to 1
292 */
293 tmp64 = 1;
294 if (write(mis->userfault_quit_fd, &tmp64, 8) == 8) {
295 trace_postcopy_ram_incoming_cleanup_join();
296 qemu_thread_join(&mis->fault_thread);
297 } else {
298 /* Not much we can do here, but may as well report it */
299 error_report("%s: incrementing userfault_quit_fd: %s", __func__,
300 strerror(errno));
301 }
302 trace_postcopy_ram_incoming_cleanup_closeuf();
303 close(mis->userfault_fd);
304 close(mis->userfault_quit_fd);
305 mis->have_fault_thread = false;
1caddf8a
DDAG
306 }
307
371ff5a3
DDAG
308 qemu_balloon_inhibit(false);
309
58b7c17e
DDAG
310 if (enable_mlock) {
311 if (os_mlock() < 0) {
312 error_report("mlock: %s", strerror(errno));
313 /*
314 * It doesn't feel right to fail at this point, we have a valid
315 * VM state.
316 */
317 }
318 }
319
c4faeed2
DDAG
320 postcopy_state_set(POSTCOPY_INCOMING_END);
321 migrate_send_rp_shut(mis, qemu_file_get_error(mis->from_src_file) != 0);
322
696ed9a9 323 if (mis->postcopy_tmp_page) {
df9ff5e1 324 munmap(mis->postcopy_tmp_page, mis->largest_page_size);
696ed9a9
DDAG
325 mis->postcopy_tmp_page = NULL;
326 }
41d84210
DDAG
327 if (mis->postcopy_tmp_zero_page) {
328 munmap(mis->postcopy_tmp_zero_page, mis->largest_page_size);
329 mis->postcopy_tmp_zero_page = NULL;
330 }
c4faeed2 331 trace_postcopy_ram_incoming_cleanup_exit();
1caddf8a
DDAG
332 return 0;
333}
334
f9527107
DDAG
335/*
336 * Disable huge pages on an area
337 */
338static int nhp_range(const char *block_name, void *host_addr,
339 ram_addr_t offset, ram_addr_t length, void *opaque)
340{
341 trace_postcopy_nhp_range(block_name, host_addr, offset, length);
342
343 /*
344 * Before we do discards we need to ensure those discards really
345 * do delete areas of the page, even if THP thinks a hugepage would
346 * be a good idea, so force hugepages off.
347 */
1d741439 348 qemu_madvise(host_addr, length, QEMU_MADV_NOHUGEPAGE);
f9527107
DDAG
349
350 return 0;
351}
352
353/*
354 * Userfault requires us to mark RAM as NOHUGEPAGE prior to discard
355 * however leaving it until after precopy means that most of the precopy
356 * data is still THPd
357 */
358int postcopy_ram_prepare_discard(MigrationIncomingState *mis)
359{
360 if (qemu_ram_foreach_block(nhp_range, mis)) {
361 return -1;
362 }
363
364 postcopy_state_set(POSTCOPY_INCOMING_DISCARD);
365
366 return 0;
367}
368
f0a227ad
DDAG
369/*
370 * Mark the given area of RAM as requiring notification to unwritten areas
371 * Used as a callback on qemu_ram_foreach_block.
372 * host_addr: Base of area to mark
373 * offset: Offset in the whole ram arena
374 * length: Length of the section
375 * opaque: MigrationIncomingState pointer
376 * Returns 0 on success
377 */
378static int ram_block_enable_notify(const char *block_name, void *host_addr,
379 ram_addr_t offset, ram_addr_t length,
380 void *opaque)
381{
382 MigrationIncomingState *mis = opaque;
383 struct uffdio_register reg_struct;
384
385 reg_struct.range.start = (uintptr_t)host_addr;
386 reg_struct.range.len = length;
387 reg_struct.mode = UFFDIO_REGISTER_MODE_MISSING;
388
389 /* Now tell our userfault_fd that it's responsible for this area */
390 if (ioctl(mis->userfault_fd, UFFDIO_REGISTER, &reg_struct)) {
391 error_report("%s userfault register: %s", __func__, strerror(errno));
392 return -1;
393 }
394
395 return 0;
396}
397
398/*
399 * Handle faults detected by the USERFAULT markings
400 */
401static void *postcopy_ram_fault_thread(void *opaque)
402{
403 MigrationIncomingState *mis = opaque;
c4faeed2
DDAG
404 struct uffd_msg msg;
405 int ret;
406 size_t hostpagesize = getpagesize();
407 RAMBlock *rb = NULL;
408 RAMBlock *last_rb = NULL; /* last RAMBlock we sent part of */
f0a227ad 409
c4faeed2 410 trace_postcopy_ram_fault_thread_entry();
f0a227ad 411 qemu_sem_post(&mis->fault_thread_sem);
f0a227ad 412
c4faeed2
DDAG
413 while (true) {
414 ram_addr_t rb_offset;
c4faeed2
DDAG
415 struct pollfd pfd[2];
416
417 /*
418 * We're mainly waiting for the kernel to give us a faulting HVA,
419 * however we can be told to quit via userfault_quit_fd which is
420 * an eventfd
421 */
422 pfd[0].fd = mis->userfault_fd;
423 pfd[0].events = POLLIN;
424 pfd[0].revents = 0;
425 pfd[1].fd = mis->userfault_quit_fd;
426 pfd[1].events = POLLIN; /* Waiting for eventfd to go positive */
427 pfd[1].revents = 0;
428
429 if (poll(pfd, 2, -1 /* Wait forever */) == -1) {
430 error_report("%s: userfault poll: %s", __func__, strerror(errno));
431 break;
432 }
433
434 if (pfd[1].revents) {
435 trace_postcopy_ram_fault_thread_quit();
436 break;
437 }
438
439 ret = read(mis->userfault_fd, &msg, sizeof(msg));
440 if (ret != sizeof(msg)) {
441 if (errno == EAGAIN) {
442 /*
443 * if a wake up happens on the other thread just after
444 * the poll, there is nothing to read.
445 */
446 continue;
447 }
448 if (ret < 0) {
449 error_report("%s: Failed to read full userfault message: %s",
450 __func__, strerror(errno));
451 break;
452 } else {
453 error_report("%s: Read %d bytes from userfaultfd expected %zd",
454 __func__, ret, sizeof(msg));
455 break; /* Lost alignment, don't know what we'd read next */
456 }
457 }
458 if (msg.event != UFFD_EVENT_PAGEFAULT) {
459 error_report("%s: Read unexpected event %ud from userfaultfd",
460 __func__, msg.event);
461 continue; /* It's not a page fault, shouldn't happen */
462 }
463
464 rb = qemu_ram_block_from_host(
465 (void *)(uintptr_t)msg.arg.pagefault.address,
f615f396 466 true, &rb_offset);
c4faeed2
DDAG
467 if (!rb) {
468 error_report("postcopy_ram_fault_thread: Fault outside guest: %"
469 PRIx64, (uint64_t)msg.arg.pagefault.address);
470 break;
471 }
472
473 rb_offset &= ~(hostpagesize - 1);
474 trace_postcopy_ram_fault_thread_request(msg.arg.pagefault.address,
475 qemu_ram_get_idstr(rb),
476 rb_offset);
477
478 /*
479 * Send the request to the source - we want to request one
480 * of our host page sizes (which is >= TPS)
481 */
482 if (rb != last_rb) {
483 last_rb = rb;
484 migrate_send_rp_req_pages(mis, qemu_ram_get_idstr(rb),
485 rb_offset, hostpagesize);
486 } else {
487 /* Save some space */
488 migrate_send_rp_req_pages(mis, NULL,
489 rb_offset, hostpagesize);
490 }
491 }
492 trace_postcopy_ram_fault_thread_exit();
f0a227ad
DDAG
493 return NULL;
494}
495
496int postcopy_ram_enable_notify(MigrationIncomingState *mis)
497{
c4faeed2
DDAG
498 /* Open the fd for the kernel to give us userfaults */
499 mis->userfault_fd = syscall(__NR_userfaultfd, O_CLOEXEC | O_NONBLOCK);
500 if (mis->userfault_fd == -1) {
501 error_report("%s: Failed to open userfault fd: %s", __func__,
502 strerror(errno));
503 return -1;
504 }
505
506 /*
507 * Although the host check already tested the API, we need to
508 * do the check again as an ABI handshake on the new fd.
509 */
510 if (!ufd_version_check(mis->userfault_fd)) {
511 return -1;
512 }
513
514 /* Now an eventfd we use to tell the fault-thread to quit */
515 mis->userfault_quit_fd = eventfd(0, EFD_CLOEXEC);
516 if (mis->userfault_quit_fd == -1) {
517 error_report("%s: Opening userfault_quit_fd: %s", __func__,
518 strerror(errno));
519 close(mis->userfault_fd);
520 return -1;
521 }
522
f0a227ad
DDAG
523 qemu_sem_init(&mis->fault_thread_sem, 0);
524 qemu_thread_create(&mis->fault_thread, "postcopy/fault",
525 postcopy_ram_fault_thread, mis, QEMU_THREAD_JOINABLE);
526 qemu_sem_wait(&mis->fault_thread_sem);
527 qemu_sem_destroy(&mis->fault_thread_sem);
c4faeed2 528 mis->have_fault_thread = true;
f0a227ad
DDAG
529
530 /* Mark so that we get notified of accesses to unwritten areas */
531 if (qemu_ram_foreach_block(ram_block_enable_notify, mis)) {
532 return -1;
533 }
534
371ff5a3
DDAG
535 /*
536 * Ballooning can mark pages as absent while we're postcopying
537 * that would cause false userfaults.
538 */
539 qemu_balloon_inhibit(true);
540
c4faeed2
DDAG
541 trace_postcopy_ram_enable_notify();
542
f0a227ad
DDAG
543 return 0;
544}
545
696ed9a9
DDAG
546/*
547 * Place a host page (from) at (host) atomically
548 * returns 0 on success
549 */
df9ff5e1
DDAG
550int postcopy_place_page(MigrationIncomingState *mis, void *host, void *from,
551 size_t pagesize)
696ed9a9
DDAG
552{
553 struct uffdio_copy copy_struct;
554
555 copy_struct.dst = (uint64_t)(uintptr_t)host;
556 copy_struct.src = (uint64_t)(uintptr_t)from;
df9ff5e1 557 copy_struct.len = pagesize;
696ed9a9
DDAG
558 copy_struct.mode = 0;
559
560 /* copy also acks to the kernel waking the stalled thread up
561 * TODO: We can inhibit that ack and only do it if it was requested
562 * which would be slightly cheaper, but we'd have to be careful
563 * of the order of updating our page state.
564 */
565 if (ioctl(mis->userfault_fd, UFFDIO_COPY, &copy_struct)) {
566 int e = errno;
df9ff5e1
DDAG
567 error_report("%s: %s copy host: %p from: %p (size: %zd)",
568 __func__, strerror(e), host, from, pagesize);
696ed9a9
DDAG
569
570 return -e;
571 }
572
573 trace_postcopy_place_page(host);
574 return 0;
575}
576
577/*
578 * Place a zero page at (host) atomically
579 * returns 0 on success
580 */
df9ff5e1
DDAG
581int postcopy_place_page_zero(MigrationIncomingState *mis, void *host,
582 size_t pagesize)
696ed9a9 583{
df9ff5e1 584 trace_postcopy_place_page_zero(host);
696ed9a9 585
df9ff5e1
DDAG
586 if (pagesize == getpagesize()) {
587 struct uffdio_zeropage zero_struct;
588 zero_struct.range.start = (uint64_t)(uintptr_t)host;
589 zero_struct.range.len = getpagesize();
590 zero_struct.mode = 0;
696ed9a9 591
df9ff5e1
DDAG
592 if (ioctl(mis->userfault_fd, UFFDIO_ZEROPAGE, &zero_struct)) {
593 int e = errno;
594 error_report("%s: %s zero host: %p",
595 __func__, strerror(e), host);
696ed9a9 596
df9ff5e1
DDAG
597 return -e;
598 }
599 } else {
41d84210
DDAG
600 /* The kernel can't use UFFDIO_ZEROPAGE for hugepages */
601 if (!mis->postcopy_tmp_zero_page) {
602 mis->postcopy_tmp_zero_page = mmap(NULL, mis->largest_page_size,
603 PROT_READ | PROT_WRITE,
604 MAP_PRIVATE | MAP_ANONYMOUS,
605 -1, 0);
606 if (mis->postcopy_tmp_zero_page == MAP_FAILED) {
607 int e = errno;
608 mis->postcopy_tmp_zero_page = NULL;
609 error_report("%s: %s mapping large zero page",
610 __func__, strerror(e));
611 return -e;
612 }
613 memset(mis->postcopy_tmp_zero_page, '\0', mis->largest_page_size);
614 }
615 return postcopy_place_page(mis, host, mis->postcopy_tmp_zero_page,
616 pagesize);
696ed9a9
DDAG
617 }
618
696ed9a9
DDAG
619 return 0;
620}
621
622/*
623 * Returns a target page of memory that can be mapped at a later point in time
624 * using postcopy_place_page
625 * The same address is used repeatedly, postcopy_place_page just takes the
626 * backing page away.
627 * Returns: Pointer to allocated page
628 *
629 */
630void *postcopy_get_tmp_page(MigrationIncomingState *mis)
631{
632 if (!mis->postcopy_tmp_page) {
df9ff5e1 633 mis->postcopy_tmp_page = mmap(NULL, mis->largest_page_size,
696ed9a9
DDAG
634 PROT_READ | PROT_WRITE, MAP_PRIVATE |
635 MAP_ANONYMOUS, -1, 0);
0e8b3cdf
EY
636 if (mis->postcopy_tmp_page == MAP_FAILED) {
637 mis->postcopy_tmp_page = NULL;
696ed9a9
DDAG
638 error_report("%s: %s", __func__, strerror(errno));
639 return NULL;
640 }
641 }
642
643 return mis->postcopy_tmp_page;
644}
645
eb59db53
DDAG
646#else
647/* No target OS support, stubs just fail */
648bool postcopy_ram_supported_by_host(void)
649{
650 error_report("%s: No OS support", __func__);
651 return false;
652}
653
1caddf8a
DDAG
654int postcopy_ram_incoming_init(MigrationIncomingState *mis, size_t ram_pages)
655{
656 error_report("postcopy_ram_incoming_init: No OS support");
657 return -1;
658}
659
660int postcopy_ram_incoming_cleanup(MigrationIncomingState *mis)
661{
662 assert(0);
663 return -1;
664}
665
f9527107
DDAG
666int postcopy_ram_prepare_discard(MigrationIncomingState *mis)
667{
668 assert(0);
669 return -1;
670}
671
f0a227ad
DDAG
672int postcopy_ram_enable_notify(MigrationIncomingState *mis)
673{
674 assert(0);
675 return -1;
676}
696ed9a9 677
df9ff5e1
DDAG
678int postcopy_place_page(MigrationIncomingState *mis, void *host, void *from,
679 size_t pagesize)
696ed9a9
DDAG
680{
681 assert(0);
682 return -1;
683}
684
df9ff5e1
DDAG
685int postcopy_place_page_zero(MigrationIncomingState *mis, void *host,
686 size_t pagesize)
696ed9a9
DDAG
687{
688 assert(0);
689 return -1;
690}
691
692void *postcopy_get_tmp_page(MigrationIncomingState *mis)
693{
694 assert(0);
695 return NULL;
696}
697
eb59db53
DDAG
698#endif
699
e0b266f0
DDAG
700/* ------------------------------------------------------------------------- */
701
702/**
703 * postcopy_discard_send_init: Called at the start of each RAMBlock before
704 * asking to discard individual ranges.
705 *
706 * @ms: The current migration state.
707 * @offset: the bitmap offset of the named RAMBlock in the migration
708 * bitmap.
709 * @name: RAMBlock that discards will operate on.
710 *
711 * returns: a new PDS.
712 */
713PostcopyDiscardState *postcopy_discard_send_init(MigrationState *ms,
714 unsigned long offset,
715 const char *name)
716{
717 PostcopyDiscardState *res = g_malloc0(sizeof(PostcopyDiscardState));
718
719 if (res) {
720 res->ramblock_name = name;
721 res->offset = offset;
722 }
723
724 return res;
725}
726
727/**
728 * postcopy_discard_send_range: Called by the bitmap code for each chunk to
729 * discard. May send a discard message, may just leave it queued to
730 * be sent later.
731 *
732 * @ms: Current migration state.
733 * @pds: Structure initialised by postcopy_discard_send_init().
734 * @start,@length: a range of pages in the migration bitmap in the
735 * RAM block passed to postcopy_discard_send_init() (length=1 is one page)
736 */
737void postcopy_discard_send_range(MigrationState *ms, PostcopyDiscardState *pds,
738 unsigned long start, unsigned long length)
739{
740 size_t tp_bits = qemu_target_page_bits();
741 /* Convert to byte offsets within the RAM block */
742 pds->start_list[pds->cur_entry] = (start - pds->offset) << tp_bits;
743 pds->length_list[pds->cur_entry] = length << tp_bits;
744 trace_postcopy_discard_send_range(pds->ramblock_name, start, length);
745 pds->cur_entry++;
746 pds->nsentwords++;
747
748 if (pds->cur_entry == MAX_DISCARDS_PER_COMMAND) {
749 /* Full set, ship it! */
89a02a9f
HZ
750 qemu_savevm_send_postcopy_ram_discard(ms->to_dst_file,
751 pds->ramblock_name,
e0b266f0
DDAG
752 pds->cur_entry,
753 pds->start_list,
754 pds->length_list);
755 pds->nsentcmds++;
756 pds->cur_entry = 0;
757 }
758}
759
760/**
761 * postcopy_discard_send_finish: Called at the end of each RAMBlock by the
762 * bitmap code. Sends any outstanding discard messages, frees the PDS
763 *
764 * @ms: Current migration state.
765 * @pds: Structure initialised by postcopy_discard_send_init().
766 */
767void postcopy_discard_send_finish(MigrationState *ms, PostcopyDiscardState *pds)
768{
769 /* Anything unsent? */
770 if (pds->cur_entry) {
89a02a9f
HZ
771 qemu_savevm_send_postcopy_ram_discard(ms->to_dst_file,
772 pds->ramblock_name,
e0b266f0
DDAG
773 pds->cur_entry,
774 pds->start_list,
775 pds->length_list);
776 pds->nsentcmds++;
777 }
778
779 trace_postcopy_discard_send_finish(pds->ramblock_name, pds->nsentwords,
780 pds->nsentcmds);
781
782 g_free(pds);
783}