Re: [PATCH] Add migration APIs for libxl driver

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Chunyan Liu wrote:
> Add migration APIs for libxl driver. 
> Implemented in migration version 3. Based on xen 4.1.
>   

I didn't get a chance to test this yet, but have some initial review
comments.

> Signed-off-by: Chunyan Liu <cyliu@xxxxxxxx>
> ---
>  src/libxl/libxl_driver.c |  617 ++++++++++++++++++++++++++++++++++++++++++++++
>  src/libxl/libxl_driver.h |   17 ++-
>  2 files changed, 632 insertions(+), 2 deletions(-)
>
> diff --git a/src/libxl/libxl_driver.c b/src/libxl/libxl_driver.c
> index d5fa64a..4037635 100644
> --- a/src/libxl/libxl_driver.c
> +++ b/src/libxl/libxl_driver.c
> @@ -30,6 +30,12 @@
>  #include <math.h>
>  #include <libxl.h>
>  #include <fcntl.h>
> +#include <stdlib.h>
> +#include <string.h>
> +#include <sys/types.h>
> +#include <sys/socket.h>
> +#include <arpa/inet.h>
> +#include <netdb.h>
>  
>  #include "internal.h"
>  #include "logging.h"
> @@ -60,6 +66,13 @@
>  #define XEN_SCHED_CREDIT_NPARAM   2
>  
>  static libxlDriverPrivatePtr libxl_driver = NULL;
> +static virThread migrate_receive_thread;
>   

This prevents receiving concurrent migrations.

> +
> +typedef struct migrate_receive_args {
> +    virConnectPtr conn;
> +    virDomainObjPtr vm;
> +    int sockfd;
> +} migrate_receive_args;
>   

If there is a future need to extend this structure, will it cause
incompatibility issues between a source with the extensions and a
destination without?  Or vise versa?

>  
>  /* Function declarations */
>  static int
> @@ -1095,6 +1108,17 @@ libxlClose(virConnectPtr conn ATTRIBUTE_UNUSED)
>      return 0;
>  }
>  
> +static int
> +libxlSupportsFeature(virConnectPtr conn ATTRIBUTE_UNUSED, int feature)
> +{
> +    switch (feature) {
> +    case VIR_DRV_FEATURE_MIGRATION_V3:
> +        return 1;
> +    default:
> +        return 0;
> +    }
> +}
> +
>  static const char *
>  libxlGetType(virConnectPtr conn ATTRIBUTE_UNUSED)
>  {
> @@ -3842,12 +3866,600 @@ libxlIsAlive(virConnectPtr conn ATTRIBUTE_UNUSED)
>      return 1;
>  }
>  
> +static int libxlReadFixedMessage(int fd, const void *msg, int msgsz)
> +{
> +    char buf[msgsz];
> +
> +    if (saferead(fd, buf, msgsz) != msgsz || memcmp(buf, msg, msgsz)) {
> +        return -1;
> +    }
> +
> +    return 0;
> +}
> +
> +static int doParseURI(const char *uri, char **p_hostname, int *p_port)
> +{
> +    char *p, *hostname;
> +    char port[16] = "0";
> +
> +    if (strstr (uri, "//")) {   /* Full URI. */
> +        virURIPtr uriptr = virURIParse(uri);
> +        if (!uriptr) {
> +            libxlError(VIR_ERR_INVALID_ARG,
> +                           _("Invalid URI"));
> +            return -1;
> +        }
> +        if (uriptr->scheme && STRCASENEQ(uriptr->scheme, "xlmigr")) {
> +            libxlError(VIR_ERR_INVALID_ARG,
> +                        _("Only xlmigr://"
> +                        " migrations are supported by Xen"));
> +            xmlFreeURI(uriptr);
> +            return -1;
> +        }
>   

This is just tcp migration.  Any reason for requiring the "xlmigr" scheme?

> +        if (!uriptr->server) {
> +            libxlError(VIR_ERR_INVALID_ARG,
> +                          _("A hostname must be"
> +                            " specified in the URI"));
> +            xmlFreeURI(uriptr);
> +            return -1;
> +        }
> +        hostname = strdup(uriptr->server);
>   

I think it would be better to rework this, and other uses of strdup()
and snprintf() in this function, to use virAsprintf().

> +        if (!hostname) {
> +            virReportOOMError();
> +            xmlFreeURI(uriptr);
> +            return -1;
> +        }
> +        if (uriptr->port)
> +            snprintf(port, sizeof(port), "%d", uriptr->port);
> +        xmlFreeURI(uriptr);
> +    }
> +    else if ((p = strrchr(uri, ':')) != NULL) { /* "hostname:port" */
> +        int port_nr, n;
> +
> +        if (virStrToLong_i(p+1, NULL, 10, &port_nr) < 0) {
> +            libxlError(VIR_ERR_INVALID_ARG,
> +                         _("Invalid port number"));
> +            return -1;
> +        }
> +        snprintf(port, sizeof(port), "%d", port_nr);
> +
> +        /* Get the hostname. */
> +        n = p - uri; /* n = Length of hostname in bytes. */
> +        hostname = strdup(uri);
> +        if (!hostname) {
> +            virReportOOMError();
> +            return -1;
> +        }
> +        hostname[n] = '\0';
> +    }
> +    else {/* "hostname" (or IP address) */
> +        hostname = strdup(uri);
> +        if (!hostname) {
> +            virReportOOMError();
> +            return -1;
> +        }
> +    }
> +    *p_hostname = hostname;
> +    *p_port = atoi(port);
> +    return 0;
> +}
> +
> +static bool libxlMigrationFromIsAllowed(libxlDriverPrivatePtr driver, virDomainObjPtr vm)
> +{
> +    /* to be extended */
> +    VIR_DEBUG("driver=%p, vm=%p", driver, vm);
> +    return true;
> +}
> +
> +static bool libxlMigrationToIsAllowed(libxlDriverPrivatePtr driver, virDomainDefPtr def)
> +{
> +    /* to be extended */
> +    VIR_DEBUG("driver=%p, def=%p", driver, def);
> +    return true;
> +}
>   

I think these functions (and their call sites) can be added in a future
patch that provides an implementation.

> +
> +static char *
> +libxlDomainMigrateBegin3(virDomainPtr domain,
> +                          const char *xmlin,
> +                          char **cookieout ATTRIBUTE_UNUSED,
> +                          int *cookieoutlen ATTRIBUTE_UNUSED,
> +                          unsigned long flags,
> +                          const char *dname ATTRIBUTE_UNUSED,
> +                          unsigned long resource ATTRIBUTE_UNUSED)
> +{
> +    libxlDriverPrivatePtr driver = domain->conn->privateData;
> +    virDomainObjPtr vm;
> +    virDomainDefPtr def = NULL;
> +    char *xml = NULL;
> +
> +    virCheckFlags(LIBXL_MIGRATION_FLAGS, NULL);
> +
> +    libxlDriverLock(driver);
> +    vm = virDomainFindByUUID(&driver->domains, domain->uuid);
> +    if (!vm) {
> +        char uuidstr[VIR_UUID_STRING_BUFLEN];
> +        virUUIDFormat(domain->uuid, uuidstr);
> +        libxlError(VIR_ERR_OPERATION_INVALID,
> +                        _("no domain with matching uuid '%s'"), uuidstr);
> +        goto cleanup;
> +    }
> +
> +    if (!virDomainObjIsActive(vm)) {
> +        libxlError(VIR_ERR_OPERATION_INVALID,
> +                         _("domain is not running"));
> +        goto cleanup;
> +    }
> +
> +    if (!libxlMigrationFromIsAllowed(driver, vm)) {
> +        libxlError(VIR_ERR_OPERATION_INVALID,
> +                         _("domain cannot do migration"));
> +        goto cleanup;
> +    }
> +
> +    if (xmlin) {
> +        if (!(def = virDomainDefParseString(driver->caps, xml,
> +                         1 << VIR_DOMAIN_VIRT_XEN,
> +                         VIR_DOMAIN_XML_INACTIVE)))
> +            goto cleanup;
> +
> +        xml = virDomainDefFormat(def, VIR_DOMAIN_XML_SECURE);
>   

Do we need to ensure the name provided in xmlin is the same as def->name?

> +    } else {
> +        xml = virDomainDefFormat(vm->def, VIR_DOMAIN_XML_SECURE);
> +    }
> +
> +cleanup:
> +    if (vm)
> +        virDomainObjUnlock(vm);
> +    libxlDriverUnlock(driver);
> +    return xml;
> +}
> +
> +static void doMigrateReceive(void *opaque)
> +{
> +    migrate_receive_args *data = opaque;
> +    virConnectPtr conn = data->conn;
> +    int sockfd = data->sockfd;
> +    virDomainObjPtr vm = data->vm;
> +    libxlDriverPrivatePtr driver = conn->privateData;
> +    int recv_fd;
> +    struct sockaddr_in new_addr;
> +    socklen_t socklen = sizeof(new_addr);
> +    int len;
> +
> +    do {
> +        recv_fd = accept(sockfd, (struct sockaddr *)&new_addr, &socklen);
> +    } while(recv_fd < 0 && errno == EINTR);
> +
> +    VIR_DEBUG("Accepted migration\n");
>   

This should be moved after checking for a valid recv_fd.

> +    if (recv_fd < 0) {
> +        VIR_DEBUG("Could not accept migration connection\n");
>   

libxlError?

> +        goto cleanup;
> +    }
> +
> +    len = sizeof(migrate_receiver_banner);
> +    if (safewrite(recv_fd, migrate_receiver_banner, len) != len) {
> +        libxlError(VIR_ERR_OPERATION_FAILED,
> +                         _("Failed to write migrate_receiver_banner"));
> +        goto cleanup;
> +    }
> +
> +    if (libxlVmStart(driver, vm, false, recv_fd) < 0) {
> +        libxlError(VIR_ERR_INTERNAL_ERROR,
> +                    _("Failed to restore domain with libxenlight"));
> +        if (!vm->persistent) {
> +            virDomainRemoveInactive(&driver->domains, vm);
> +            vm = NULL;
> +        }
> +        goto cleanup;
> +    }
> +
> +    len = sizeof(migrate_receiver_ready);
> +    if (safewrite(recv_fd, migrate_receiver_ready, len) != len) {
> +        libxlError(VIR_ERR_OPERATION_FAILED,
> +                         _("Failed to write migrate_receiver_ready"));
> +    }
> +
> +cleanup:
> +    if (VIR_CLOSE(recv_fd) < 0)
> +        virReportSystemError(errno, "%s", _("cannot close recv_fd"));
> +    if (VIR_CLOSE(sockfd) < 0)
> +        virReportSystemError(errno, "%s", _("cannot close sockfd"));
> +    if (vm)
> +        virDomainObjUnlock(vm);
> +    VIR_FREE(opaque);
> +    return;
> +}
> +
> +static int doMigrateSend(virDomainPtr dom, unsigned long flags, int sockfd)
> +{
> +    libxlDriverPrivatePtr driver = dom->conn->privateData;
> +    virDomainObjPtr vm;
> +    libxlDomainObjPrivatePtr priv;
> +    libxl_domain_suspend_info suspinfo;
> +    virDomainEventPtr event = NULL;
> +    int live = 0;
> +    int ret = -1;
> +
> +    if (flags & VIR_MIGRATE_LIVE)
> +        live = 1;
> +
> +    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
> +    if (!vm) {
> +        char uuidstr[VIR_UUID_STRING_BUFLEN];
> +        virUUIDFormat(dom->uuid, uuidstr);
> +        libxlError(VIR_ERR_OPERATION_INVALID,
> +                         _("no domain with matching uuid '%s'"), uuidstr);
> +        goto cleanup;
> +    }
> +
> +    priv = vm->privateData;
> +
> +    /* read fixed message from dest (ready to receive) */
> +    if (libxlReadFixedMessage(sockfd, migrate_receiver_banner,
> +                              sizeof(migrate_receiver_banner))) {
> +        goto cleanup;
> +    }
> +
> +    /* send suspend data */
> +    memset(&suspinfo, 0, sizeof(suspinfo));
> +    if (live == 1)
> +        suspinfo.flags |= XL_SUSPEND_LIVE;
> +    if (libxl_domain_suspend(&priv->ctx, &suspinfo, vm->def->id, sockfd) != 0) {
> +        libxlError(VIR_ERR_INTERNAL_ERROR,
> +                    _("Failed to save domain '%d' with libxenlight"),
> +                    vm->def->id);
> +        goto cleanup;
> +    }
> +
> +    /* read fixed message from dest (receive completed) */
> +    if (libxlReadFixedMessage(sockfd, migrate_receiver_ready,
> +                              sizeof(migrate_receiver_ready))) {
> +        /* Src side should be resumed, but for ret < 0, virsh won't call Src side
> +         * Confirm3, handle it here.
> +         */
> +        libxl_domain_resume(&priv->ctx, vm->def->id);
> +        goto cleanup;
> +    }
> +
> +    ret = 0;
> +
> +cleanup:
> +    if (vm)
> +        virDomainObjUnlock(vm);
> +    if (event)
> +        libxlDomainEventQueue(driver, event);
> +    return ret;
> +}
> +
> +static int
> +libxlDomainMigratePrepare3(virConnectPtr dconn,
> +                            const char *cookiein ATTRIBUTE_UNUSED,
> +                            int cookieinlen ATTRIBUTE_UNUSED,
> +                            char **cookieout ATTRIBUTE_UNUSED,
> +                            int *cookieoutlen ATTRIBUTE_UNUSED,
> +                            const char *uri_in,
> +                            char **uri_out,
> +                            unsigned long flags,
> +                            const char *dname,
> +                            unsigned long resource ATTRIBUTE_UNUSED,
> +                            const char *dom_xml)
> +{
> +    libxlDriverPrivatePtr driver = dconn->privateData;
> +    virDomainDefPtr def = NULL;
> +    virDomainObjPtr vm = NULL;
> +    int port = 0;
> +    int sockfd = -1;
> +    struct sockaddr_in addr;
> +    migrate_receive_args *args;
> +    int ret = -1;
> +
> +    virCheckFlags(LIBXL_MIGRATION_FLAGS, -1);
> +
> +    libxlDriverLock(driver);
> +    if (!dom_xml) {
> +        libxlError(VIR_ERR_OPERATION_INVALID,
> +                         _("no domain XML passed"));
> +        goto cleanup;
> +    }
> +
> +    def = virDomainDefParseString(driver->caps, dom_xml,
> +                                 1 << VIR_DOMAIN_VIRT_XEN,
> +                                 VIR_DOMAIN_XML_INACTIVE);
> +
> +    if (!libxlMigrationToIsAllowed(driver, def)) {
> +        libxlError(VIR_ERR_OPERATION_INVALID,
> +                         _("cannot migrate domain to this host"));
> +        goto cleanup;
> +    }
> +
> +    /* Target domain name, maybe renamed. */
> +    if (dname) {
> +        def->name = strdup(dname);
>   

This leaks the original name.

> +        if (def->name == NULL)
> +            goto cleanup;
> +    }
> +
> +    if (virDomainObjIsDuplicate(&driver->domains, def, 1) < 0)
> +        goto cleanup;
> +
> +    if (!(vm = virDomainAssignDef(driver->caps, &driver->domains, def, true)))
> +        goto cleanup;
> +
> +    def = NULL;
> +
> +    /* Create socket connection to receive migration data */
> +    if (!uri_in) {
> +        *uri_out = virGetHostname(dconn);
> +        if (*uri_out == NULL)
> +            goto cleanup;
> +    } else {
> +        char *hostname = NULL;
> +        doParseURI(uri_in, &hostname, &port);
> +        VIR_FREE (hostname);
> +    }
> +
> +    if (port <= 0)
> +        port = DEFAULT_MIGRATION_PORT;
> +
> +    sockfd = socket(AF_INET, SOCK_STREAM, 0);
> +    if (sockfd == -1) {
> +       libxlError(VIR_ERR_OPERATION_INVALID,
> +                        _("Failed to create socket"));
>   

This, and the following errors, could use a little more information. 
E.g. "Failed to create socket for incoming migration".

> +       goto cleanup;
> +    }
> +
> +    memset(&addr, 0, sizeof(addr));
> +    addr.sin_family = AF_INET;
> +    addr.sin_port = htons(port);
> +    addr.sin_addr.s_addr = htonl(INADDR_ANY);
> +
> +    if (bind(sockfd, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
> +        libxlError(VIR_ERR_OPERATION_FAILED,
> +                         _("Bind error"));
> +        goto cleanup;
> +    }
> +
> +    if (listen(sockfd, MAXCONN_NUM) < 0){
> +        libxlError(VIR_ERR_OPERATION_FAILED,
> +                         _("Listen error"));
> +        goto cleanup;
> +    }
> +
> +    if (VIR_ALLOC(args) < 0) {
> +        virReportOOMError();
> +        goto cleanup;
> +    }
> +
> +    args->conn = dconn;
> +    args->vm = vm;
> +    args->sockfd = sockfd;
> +    if (virThreadCreate(&migrate_receive_thread,
> +                        true,
> +                        doMigrateReceive, args) < 0 ) {
> +        virReportSystemError(errno, "%s",
> +                             _("Unable to create migration thread"));
> +        VIR_FREE(args);
> +        goto cleanup;
> +    }
> +
> +    ret = 0;
> +    goto end;
> +
> +cleanup:
> +    if (VIR_CLOSE(sockfd) < 0)
> +        virReportSystemError(errno, "%s", _("cannot close sockfd"));
> +    if (vm)
> +        virDomainObjUnlock(vm);
> +
> +end:
> +    libxlDriverUnlock(driver);
> +    return ret;
> +}
> +
> +static int
> +libxlDomainMigratePerform3(virDomainPtr dom,
> +                            const char *xmlin ATTRIBUTE_UNUSED,
> +                            const char *cookiein ATTRIBUTE_UNUSED,
> +                            int cookieinlen ATTRIBUTE_UNUSED,
> +                            char **cookieout ATTRIBUTE_UNUSED,
> +                            int *cookieoutlen ATTRIBUTE_UNUSED,
> +                            const char *dconnuri ATTRIBUTE_UNUSED,
> +                            const char *uri,
> +                            unsigned long flags,
> +                            const char *dname ATTRIBUTE_UNUSED,
> +                            unsigned long resource ATTRIBUTE_UNUSED)
> +{
> +    libxlDriverPrivatePtr driver = dom->conn->privateData;
> +    char *hostname = NULL;
> +    int port;
> +    char *servname = NULL;
> +    struct addrinfo hints, *res;
> +    int sockfd = -1;
> +    int ret = -1;
> +
> +    virCheckFlags(LIBXL_MIGRATION_FLAGS, -1);
> +
> +    libxlDriverLock(driver);
> +
> +    if (doParseURI(uri, &hostname, &port))
> +        goto cleanup;
> +
> +    VIR_DEBUG("hostname = %s, port = %d", hostname, port);
> +
> +    if (virAsprintf(&servname, "%d", port ? port : DEFAULT_MIGRATION_PORT) < 0) {
> +        virReportOOMError();
> +        goto cleanup;
> +    }
> +
> +    if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0 ){
> +        libxlError(VIR_ERR_OPERATION_FAILED,
> +                         _("Failed to create socket"));
> +        goto cleanup;
> +    }
> +
> +    memset(&hints, 0, sizeof(hints));
> +    hints.ai_family = AF_INET;
> +    hints.ai_socktype = SOCK_STREAM;
> +    if (getaddrinfo(hostname, servname, &hints, &res) || res == NULL) {
> +        libxlError(VIR_ERR_OPERATION_FAILED,
> +                         _("IP address lookup failed"));
> +        goto cleanup;
> +    }
> +
> +    if (connect(sockfd, res->ai_addr, res->ai_addrlen) < 0) {
> +        libxlError(VIR_ERR_OPERATION_FAILED,
> +                         _("Connect error"));
> +        goto cleanup;
> +    }
> +
> +    ret = doMigrateSend(dom, flags, sockfd);
>   

Hmm, the entire driver is locked during the migration.  I just noticed
libxlDomainSave{Flags} also holds the driver lock during save :-(. 
libxlDomainCoreDump drops the lock during the dump and IMO migration
should follow the same pattern.

> +
> +cleanup:
> +    if (VIR_CLOSE(sockfd) < 0)
> +        virReportSystemError(errno, "%s", _("cannot close sockfd"));
> +    VIR_FREE (hostname);
>   

Extra whitespace.

> +    VIR_FREE(servname);
> +    freeaddrinfo(res);
> +    libxlDriverUnlock(driver);
> +    return ret;
> +}
> +
> +static virDomainPtr
> +libxlDomainMigrateFinish3(virConnectPtr dconn,
> +                           const char *dname,
> +                           const char *cookiein ATTRIBUTE_UNUSED,
> +                           int cookieinlen ATTRIBUTE_UNUSED,
> +                           char **cookieout ATTRIBUTE_UNUSED,
> +                           int *cookieoutlen ATTRIBUTE_UNUSED,
> +                           const char *dconnuri ATTRIBUTE_UNUSED,
> +                           const char *uri ATTRIBUTE_UNUSED,
> +                           unsigned long flags,
> +                           int cancelled)
> +{
> +    libxlDriverPrivatePtr driver = dconn->privateData;
> +    virDomainObjPtr vm = NULL;
> +    virDomainPtr dom = NULL;
> +    libxlDomainObjPrivatePtr priv;
> +    virDomainEventPtr event = NULL;
> +    int rc;
> +
> +    virCheckFlags(LIBXL_MIGRATION_FLAGS, NULL);
> +    virThreadJoin(&migrate_receive_thread);
> +
> +    libxlDriverLock(driver);
> +    vm = virDomainFindByName(&driver->domains, dname);
> +    if (!vm)
> +        goto cleanup;
> +
> +    if (!cancelled) {
> +        if (!(flags & VIR_MIGRATE_PAUSED)) {
> +            priv = vm->privateData;
> +            rc = libxl_domain_unpause(&priv->ctx, vm->def->id);
> +            if (rc) {
> +                libxlError(VIR_ERR_OPERATION_FAILED,
> +                           _("Failed to unpause domain"));
> +                goto error;
> +            }
> +
> +            virDomainObjSetState(vm, VIR_DOMAIN_RUNNING, VIR_DOMAIN_RUNNING_BOOTED);
> +            if (virDomainSaveStatus(driver->caps, driver->stateDir, vm) < 0)
> +                goto error;
> +        }
> +
> +        dom = virGetDomain (dconn, vm->def->name, vm->def->uuid);
>   

Extra whitespace.

> +        goto cleanup;
> +    }
> +
> +error:
> +    if (libxlVmReap(driver, vm, 1, VIR_DOMAIN_SHUTOFF_SAVED)) {
> +        libxlError(VIR_ERR_INTERNAL_ERROR,
> +                    _("Failed to destroy domain '%d'"), vm->def->id);
> +        goto cleanup;
> +    }
> +    event = virDomainEventNewFromObj(vm, VIR_DOMAIN_EVENT_STOPPED,
> +                                         VIR_DOMAIN_EVENT_STOPPED_SAVED);
>   

Parameter alignment.

> +    if (!vm->persistent) {
> +        virDomainRemoveInactive(&driver->domains, vm);
> +        vm = NULL;
> +    }
> +
> +cleanup:
> +    if (vm)
> +        virDomainObjUnlock(vm);
> +    if (event)
> +        libxlDomainEventQueue(driver, event);
> +    libxlDriverUnlock(driver);
> +    return dom;
> +}
> +
> +static int
> +libxlDomainMigrateConfirm3(virDomainPtr domain,
> +                            const char *cookiein ATTRIBUTE_UNUSED,
> +                            int cookieinlen ATTRIBUTE_UNUSED,
> +                            unsigned long flags,
> +                            int cancelled)
> +{
> +    libxlDriverPrivatePtr driver = domain->conn->privateData;
> +    virDomainObjPtr vm;
> +    libxlDomainObjPrivatePtr priv;
> +    virDomainEventPtr event = NULL;
> +    int ret = -1;
> +
> +    virCheckFlags(LIBXL_MIGRATION_FLAGS, -1);
> +
> +    libxlDriverLock(driver);
> +    vm = virDomainFindByUUID(&driver->domains, domain->uuid);
> +    if (!vm) {
> +        char uuidstr[VIR_UUID_STRING_BUFLEN];
> +        virUUIDFormat(domain->uuid, uuidstr);
> +        libxlError(VIR_ERR_NO_DOMAIN,
> +                        _("no domain with matching uuid '%s'"), uuidstr);
>   

Parameter alignment.

> +        goto cleanup;
> +    }
> +
> +    if (cancelled) {
> +        priv = vm->privateData;
> +        libxlError(VIR_ERR_INTERNAL_ERROR,
> +                         _("migration failed, try to resume on our end"));
> +        if (!libxl_domain_resume(&priv->ctx, vm->def->id))
> +            ret = 0;
> +
> +        goto cleanup;
> +    }
> +
> +    if (libxlVmReap(driver, vm, 1, VIR_DOMAIN_SHUTOFF_SAVED)) {
> +        libxlError(VIR_ERR_INTERNAL_ERROR,
> +                    _("Failed to destroy domain '%d'"), vm->def->id);
> +        goto cleanup;
> +    }
> +
> +    event = virDomainEventNewFromObj(vm, VIR_DOMAIN_EVENT_STOPPED,
> +                                         VIR_DOMAIN_EVENT_STOPPED_SAVED);
>   

Parameter alignment.

> +
> +    if (flags & VIR_MIGRATE_UNDEFINE_SOURCE)
> +        virDomainDeleteConfig(driver->configDir, driver->autostartDir, vm);
> +
> +    if (!vm->persistent || (flags & VIR_MIGRATE_UNDEFINE_SOURCE)) {
> +        virDomainRemoveInactive(&driver->domains, vm);
> +        vm = NULL;
> +    }
> +
> +    VIR_DEBUG("Migration successful.\n");
> +    ret = 0;
> +
> +cleanup:
> +    if (vm)
> +        virDomainObjUnlock(vm);
> +    libxlDriverUnlock(driver);
> +    return ret;
> +}
>  
>  static virDriver libxlDriver = {
>      .no = VIR_DRV_LIBXL,
>      .name = "xenlight",
>      .open = libxlOpen, /* 0.9.0 */
>      .close = libxlClose, /* 0.9.0 */
> +    .supports_feature = libxlSupportsFeature, /* 0.9.9 */
>      .type = libxlGetType, /* 0.9.0 */
>      .version = libxlGetVersion, /* 0.9.0 */
>      .getHostname = virGetHostname, /* 0.9.0 */
> @@ -3906,6 +4518,11 @@ static virDriver libxlDriver = {
>      .domainGetSchedulerParametersFlags = libxlDomainGetSchedulerParametersFlags, /* 0.9.2 */
>      .domainSetSchedulerParameters = libxlDomainSetSchedulerParameters, /* 0.9.0 */
>      .domainSetSchedulerParametersFlags = libxlDomainSetSchedulerParametersFlags, /* 0.9.2 */
> +    .domainMigrateBegin3 = libxlDomainMigrateBegin3, /* 0.9.9 */
> +    .domainMigratePrepare3 = libxlDomainMigratePrepare3, /* 0.9.0 */
> +    .domainMigratePerform3 = libxlDomainMigratePerform3, /* 0.9.9 */
> +    .domainMigrateFinish3 = libxlDomainMigrateFinish3, /* 0.9.9 */
> +    .domainMigrateConfirm3 = libxlDomainMigrateConfirm3, /* 0.9.9 */
>   

All of the additions will need updated to 0.9.11, or perhaps 0.9.12
depending on when the patch is merged.

Regards,
Jim

>      .nodeGetFreeMemory = libxlNodeGetFreeMemory, /* 0.9.0 */
>      .domainEventRegister = libxlDomainEventRegister, /* 0.9.0 */
>      .domainEventDeregister = libxlDomainEventDeregister, /* 0.9.0 */
> diff --git a/src/libxl/libxl_driver.h b/src/libxl/libxl_driver.h
> index 4632d33..8a5fa6b 100644
> --- a/src/libxl/libxl_driver.h
> +++ b/src/libxl/libxl_driver.h
> @@ -21,9 +21,22 @@
>  /*---------------------------------------------------------------------------*/
>  
>  #ifndef LIBXL_DRIVER_H
> -# define LIBXL_DRIVER_H
> +#define LIBXL_DRIVER_H
>  
> -# include <config.h>
> +#include <config.h>
> +
> +#define LIBXL_MIGRATION_FLAGS                   \
> +    (VIR_MIGRATE_LIVE |                         \
> +     VIR_MIGRATE_UNDEFINE_SOURCE |              \
> +     VIR_MIGRATE_PAUSED)
> +
> +#define DEFAULT_MIGRATION_PORT 8002
> +#define MAXCONN_NUM 10
> +
> +static const char migrate_receiver_banner[]=
> +    "xl migration receiver ready, send binary domain data";
> +static const char migrate_receiver_ready[]=
> +    "domain received, ready to unpause";
>  
>  int libxlRegister(void);
>  
>   

--
libvir-list mailing list
libvir-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/libvir-list


[Index of Archives]     [Virt Tools]     [Libvirt Users]     [Lib OS Info]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [KDE Users]     [Fedora Tools]