xref: /freebsd/usr.sbin/bhyve/snapshot.c (revision 4d846d26)
1 /*-
2  * SPDX-License-Identifier: BSD-2-Clause
3  *
4  * Copyright (c) 2016 Flavius Anton
5  * Copyright (c) 2016 Mihai Tiganus
6  * Copyright (c) 2016-2019 Mihai Carabas
7  * Copyright (c) 2017-2019 Darius Mihai
8  * Copyright (c) 2017-2019 Elena Mihailescu
9  * Copyright (c) 2018-2019 Sergiu Weisz
10  * All rights reserved.
11  * The bhyve-snapshot feature was developed under sponsorships
12  * from Matthew Grooms.
13  *
14  * Redistribution and use in source and binary forms, with or without
15  * modification, are permitted provided that the following conditions
16  * are met:
17  * 1. Redistributions of source code must retain the above copyright
18  *    notice, this list of conditions and the following disclaimer.
19  * 2. Redistributions in binary form must reproduce the above copyright
20  *    notice, this list of conditions and the following disclaimer in the
21  *    documentation and/or other materials provided with the distribution.
22  *
23  * THIS SOFTWARE IS PROVIDED BY NETAPP, INC ``AS IS'' AND
24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26  * ARE DISCLAIMED.  IN NO EVENT SHALL NETAPP, INC OR CONTRIBUTORS BE LIABLE
27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  */
35 
36 #include <sys/cdefs.h>
37 __FBSDID("$FreeBSD$");
38 
39 #include <sys/types.h>
40 #ifndef WITHOUT_CAPSICUM
41 #include <sys/capsicum.h>
42 #endif
43 #include <sys/mman.h>
44 #include <sys/socket.h>
45 #include <sys/stat.h>
46 #include <sys/time.h>
47 #include <sys/un.h>
48 
49 #include <machine/atomic.h>
50 #include <machine/segments.h>
51 
52 #ifndef WITHOUT_CAPSICUM
53 #include <capsicum_helpers.h>
54 #endif
55 #include <stdio.h>
56 #include <stdlib.h>
57 #include <string.h>
58 #include <err.h>
59 #include <errno.h>
60 #include <fcntl.h>
61 #include <libgen.h>
62 #include <signal.h>
63 #include <unistd.h>
64 #include <assert.h>
65 #include <errno.h>
66 #include <pthread.h>
67 #include <pthread_np.h>
68 #include <sysexits.h>
69 #include <stdbool.h>
70 #include <sys/ioctl.h>
71 
72 #include <machine/vmm.h>
73 #ifndef WITHOUT_CAPSICUM
74 #include <machine/vmm_dev.h>
75 #endif
76 #include <machine/vmm_snapshot.h>
77 #include <vmmapi.h>
78 
79 #include "bhyverun.h"
80 #include "acpi.h"
81 #include "atkbdc.h"
82 #include "debug.h"
83 #include "inout.h"
84 #include "ipc.h"
85 #include "fwctl.h"
86 #include "ioapic.h"
87 #include "mem.h"
88 #include "mevent.h"
89 #include "mptbl.h"
90 #include "pci_emul.h"
91 #include "pci_irq.h"
92 #include "pci_lpc.h"
93 #include "smbiostbl.h"
94 #include "snapshot.h"
95 #include "xmsr.h"
96 #include "spinup_ap.h"
97 #include "rtc.h"
98 
99 #include <libxo/xo.h>
100 #include <ucl.h>
101 
102 struct spinner_info {
103 	const size_t *crtval;
104 	const size_t maxval;
105 	const size_t total;
106 };
107 
108 extern int guest_ncpus;
109 
110 static struct winsize winsize;
111 static sig_t old_winch_handler;
112 
113 #define	KB		(1024UL)
114 #define	MB		(1024UL * KB)
115 #define	GB		(1024UL * MB)
116 
117 #define	SNAPSHOT_CHUNK	(4 * MB)
118 #define	PROG_BUF_SZ	(8192)
119 
120 #define	SNAPSHOT_BUFFER_SIZE (20 * MB)
121 
122 #define	JSON_STRUCT_ARR_KEY		"structs"
123 #define	JSON_DEV_ARR_KEY		"devices"
124 #define	JSON_BASIC_METADATA_KEY 	"basic metadata"
125 #define	JSON_SNAPSHOT_REQ_KEY		"snapshot_req"
126 #define	JSON_SIZE_KEY			"size"
127 #define	JSON_FILE_OFFSET_KEY		"file_offset"
128 
129 #define	JSON_NCPUS_KEY			"ncpus"
130 #define	JSON_VMNAME_KEY 		"vmname"
131 #define	JSON_MEMSIZE_KEY		"memsize"
132 #define	JSON_MEMFLAGS_KEY		"memflags"
133 
134 #define min(a,b)		\
135 ({				\
136  __typeof__ (a) _a = (a);	\
137  __typeof__ (b) _b = (b); 	\
138  _a < _b ? _a : _b;       	\
139  })
140 
141 static const struct vm_snapshot_dev_info snapshot_devs[] = {
142 	{ "atkbdc",	atkbdc_snapshot,	NULL,		NULL		},
143 	{ "virtio-net",	pci_snapshot,		pci_pause,	pci_resume	},
144 	{ "virtio-blk",	pci_snapshot,		pci_pause,	pci_resume	},
145 	{ "virtio-rnd",	pci_snapshot,		NULL,		NULL		},
146 	{ "lpc",	pci_snapshot,		NULL,		NULL		},
147 	{ "fbuf",	pci_snapshot,		NULL,		NULL		},
148 	{ "xhci",	pci_snapshot,		NULL,		NULL		},
149 	{ "e1000",	pci_snapshot,		NULL,		NULL		},
150 	{ "ahci",	pci_snapshot,		pci_pause,	pci_resume	},
151 	{ "ahci-hd",	pci_snapshot,		pci_pause,	pci_resume	},
152 	{ "ahci-cd",	pci_snapshot,		pci_pause,	pci_resume	},
153 };
154 
155 static const struct vm_snapshot_kern_info snapshot_kern_structs[] = {
156 	{ "vhpet",	STRUCT_VHPET	},
157 	{ "vm",		STRUCT_VM	},
158 	{ "vioapic",	STRUCT_VIOAPIC	},
159 	{ "vlapic",	STRUCT_VLAPIC	},
160 	{ "vmcx",	STRUCT_VMCX	},
161 	{ "vatpit",	STRUCT_VATPIT	},
162 	{ "vatpic",	STRUCT_VATPIC	},
163 	{ "vpmtmr",	STRUCT_VPMTMR	},
164 	{ "vrtc",	STRUCT_VRTC	},
165 };
166 
167 static cpuset_t vcpus_active, vcpus_suspended;
168 static pthread_mutex_t vcpu_lock;
169 static pthread_cond_t vcpus_idle, vcpus_can_run;
170 static bool checkpoint_active;
171 
172 /*
173  * TODO: Harden this function and all of its callers since 'base_str' is a user
174  * provided string.
175  */
176 static char *
177 strcat_extension(const char *base_str, const char *ext)
178 {
179 	char *res;
180 	size_t base_len, ext_len;
181 
182 	base_len = strnlen(base_str, NAME_MAX);
183 	ext_len = strnlen(ext, NAME_MAX);
184 
185 	if (base_len + ext_len > NAME_MAX) {
186 		fprintf(stderr, "Filename exceeds maximum length.\n");
187 		return (NULL);
188 	}
189 
190 	res = malloc(base_len + ext_len + 1);
191 	if (res == NULL) {
192 		perror("Failed to allocate memory.");
193 		return (NULL);
194 	}
195 
196 	memcpy(res, base_str, base_len);
197 	memcpy(res + base_len, ext, ext_len);
198 	res[base_len + ext_len] = 0;
199 
200 	return (res);
201 }
202 
203 void
204 destroy_restore_state(struct restore_state *rstate)
205 {
206 	if (rstate == NULL) {
207 		fprintf(stderr, "Attempting to destroy NULL restore struct.\n");
208 		return;
209 	}
210 
211 	if (rstate->kdata_map != MAP_FAILED)
212 		munmap(rstate->kdata_map, rstate->kdata_len);
213 
214 	if (rstate->kdata_fd > 0)
215 		close(rstate->kdata_fd);
216 	if (rstate->vmmem_fd > 0)
217 		close(rstate->vmmem_fd);
218 
219 	if (rstate->meta_root_obj != NULL)
220 		ucl_object_unref(rstate->meta_root_obj);
221 	if (rstate->meta_parser != NULL)
222 		ucl_parser_free(rstate->meta_parser);
223 }
224 
225 static int
226 load_vmmem_file(const char *filename, struct restore_state *rstate)
227 {
228 	struct stat sb;
229 	int err;
230 
231 	rstate->vmmem_fd = open(filename, O_RDONLY);
232 	if (rstate->vmmem_fd < 0) {
233 		perror("Failed to open restore file");
234 		return (-1);
235 	}
236 
237 	err = fstat(rstate->vmmem_fd, &sb);
238 	if (err < 0) {
239 		perror("Failed to stat restore file");
240 		goto err_load_vmmem;
241 	}
242 
243 	if (sb.st_size == 0) {
244 		fprintf(stderr, "Restore file is empty.\n");
245 		goto err_load_vmmem;
246 	}
247 
248 	rstate->vmmem_len = sb.st_size;
249 
250 	return (0);
251 
252 err_load_vmmem:
253 	if (rstate->vmmem_fd > 0)
254 		close(rstate->vmmem_fd);
255 	return (-1);
256 }
257 
258 static int
259 load_kdata_file(const char *filename, struct restore_state *rstate)
260 {
261 	struct stat sb;
262 	int err;
263 
264 	rstate->kdata_fd = open(filename, O_RDONLY);
265 	if (rstate->kdata_fd < 0) {
266 		perror("Failed to open kernel data file");
267 		return (-1);
268 	}
269 
270 	err = fstat(rstate->kdata_fd, &sb);
271 	if (err < 0) {
272 		perror("Failed to stat kernel data file");
273 		goto err_load_kdata;
274 	}
275 
276 	if (sb.st_size == 0) {
277 		fprintf(stderr, "Kernel data file is empty.\n");
278 		goto err_load_kdata;
279 	}
280 
281 	rstate->kdata_len = sb.st_size;
282 	rstate->kdata_map = mmap(NULL, rstate->kdata_len, PROT_READ,
283 				 MAP_SHARED, rstate->kdata_fd, 0);
284 	if (rstate->kdata_map == MAP_FAILED) {
285 		perror("Failed to map restore file");
286 		goto err_load_kdata;
287 	}
288 
289 	return (0);
290 
291 err_load_kdata:
292 	if (rstate->kdata_fd > 0)
293 		close(rstate->kdata_fd);
294 	return (-1);
295 }
296 
297 static int
298 load_metadata_file(const char *filename, struct restore_state *rstate)
299 {
300 	ucl_object_t *obj;
301 	struct ucl_parser *parser;
302 	int err;
303 
304 	parser = ucl_parser_new(UCL_PARSER_DEFAULT);
305 	if (parser == NULL) {
306 		fprintf(stderr, "Failed to initialize UCL parser.\n");
307 		err = -1;
308 		goto err_load_metadata;
309 	}
310 
311 	err = ucl_parser_add_file(parser, filename);
312 	if (err == 0) {
313 		fprintf(stderr, "Failed to parse metadata file: '%s'\n",
314 			filename);
315 		err = -1;
316 		goto err_load_metadata;
317 	}
318 
319 	obj = ucl_parser_get_object(parser);
320 	if (obj == NULL) {
321 		fprintf(stderr, "Failed to parse object.\n");
322 		err = -1;
323 		goto err_load_metadata;
324 	}
325 
326 	rstate->meta_parser = parser;
327 	rstate->meta_root_obj = (ucl_object_t *)obj;
328 
329 	return (0);
330 
331 err_load_metadata:
332 	if (parser != NULL)
333 		ucl_parser_free(parser);
334 	return (err);
335 }
336 
337 int
338 load_restore_file(const char *filename, struct restore_state *rstate)
339 {
340 	int err = 0;
341 	char *kdata_filename = NULL, *meta_filename = NULL;
342 
343 	assert(filename != NULL);
344 	assert(rstate != NULL);
345 
346 	memset(rstate, 0, sizeof(*rstate));
347 	rstate->kdata_map = MAP_FAILED;
348 
349 	err = load_vmmem_file(filename, rstate);
350 	if (err != 0) {
351 		fprintf(stderr, "Failed to load guest RAM file.\n");
352 		goto err_restore;
353 	}
354 
355 	kdata_filename = strcat_extension(filename, ".kern");
356 	if (kdata_filename == NULL) {
357 		fprintf(stderr, "Failed to construct kernel data filename.\n");
358 		goto err_restore;
359 	}
360 
361 	err = load_kdata_file(kdata_filename, rstate);
362 	if (err != 0) {
363 		fprintf(stderr, "Failed to load guest kernel data file.\n");
364 		goto err_restore;
365 	}
366 
367 	meta_filename = strcat_extension(filename, ".meta");
368 	if (meta_filename == NULL) {
369 		fprintf(stderr, "Failed to construct kernel metadata filename.\n");
370 		goto err_restore;
371 	}
372 
373 	err = load_metadata_file(meta_filename, rstate);
374 	if (err != 0) {
375 		fprintf(stderr, "Failed to load guest metadata file.\n");
376 		goto err_restore;
377 	}
378 
379 	return (0);
380 
381 err_restore:
382 	destroy_restore_state(rstate);
383 	if (kdata_filename != NULL)
384 		free(kdata_filename);
385 	if (meta_filename != NULL)
386 		free(meta_filename);
387 	return (-1);
388 }
389 
390 #define JSON_GET_INT_OR_RETURN(key, obj, result_ptr, ret)			\
391 do {										\
392 	const ucl_object_t *obj__;						\
393 	obj__ = ucl_object_lookup(obj, key);					\
394 	if (obj__ == NULL) {							\
395 		fprintf(stderr, "Missing key: '%s'", key);			\
396 		return (ret);							\
397 	}									\
398 	if (!ucl_object_toint_safe(obj__, result_ptr)) {			\
399 		fprintf(stderr, "Cannot convert '%s' value to int.", key);	\
400 		return (ret);							\
401 	}									\
402 } while(0)
403 
404 #define JSON_GET_STRING_OR_RETURN(key, obj, result_ptr, ret)			\
405 do {										\
406 	const ucl_object_t *obj__;						\
407 	obj__ = ucl_object_lookup(obj, key);					\
408 	if (obj__ == NULL) {							\
409 		fprintf(stderr, "Missing key: '%s'", key);			\
410 		return (ret);							\
411 	}									\
412 	if (!ucl_object_tostring_safe(obj__, result_ptr)) {			\
413 		fprintf(stderr, "Cannot convert '%s' value to string.", key);	\
414 		return (ret);							\
415 	}									\
416 } while(0)
417 
418 static void *
419 lookup_struct(enum snapshot_req struct_id, struct restore_state *rstate,
420 	      size_t *struct_size)
421 {
422 	const ucl_object_t *structs = NULL, *obj = NULL;
423 	ucl_object_iter_t it = NULL;
424 	int64_t snapshot_req, size, file_offset;
425 
426 	structs = ucl_object_lookup(rstate->meta_root_obj, JSON_STRUCT_ARR_KEY);
427 	if (structs == NULL) {
428 		fprintf(stderr, "Failed to find '%s' object.\n",
429 			JSON_STRUCT_ARR_KEY);
430 		return (NULL);
431 	}
432 
433 	if (ucl_object_type(structs) != UCL_ARRAY) {
434 		fprintf(stderr, "Object '%s' is not an array.\n",
435 		JSON_STRUCT_ARR_KEY);
436 		return (NULL);
437 	}
438 
439 	while ((obj = ucl_object_iterate(structs, &it, true)) != NULL) {
440 		snapshot_req = -1;
441 		JSON_GET_INT_OR_RETURN(JSON_SNAPSHOT_REQ_KEY, obj,
442 				       &snapshot_req, NULL);
443 		assert(snapshot_req >= 0);
444 		if ((enum snapshot_req) snapshot_req == struct_id) {
445 			JSON_GET_INT_OR_RETURN(JSON_SIZE_KEY, obj,
446 					       &size, NULL);
447 			assert(size >= 0);
448 
449 			JSON_GET_INT_OR_RETURN(JSON_FILE_OFFSET_KEY, obj,
450 					       &file_offset, NULL);
451 			assert(file_offset >= 0);
452 			assert((uint64_t)file_offset + size <=
453 			    rstate->kdata_len);
454 
455 			*struct_size = (size_t)size;
456 			return ((uint8_t *)rstate->kdata_map + file_offset);
457 		}
458 	}
459 
460 	return (NULL);
461 }
462 
463 static void *
464 lookup_check_dev(const char *dev_name, struct restore_state *rstate,
465 		 const ucl_object_t *obj, size_t *data_size)
466 {
467 	const char *snapshot_req;
468 	int64_t size, file_offset;
469 
470 	snapshot_req = NULL;
471 	JSON_GET_STRING_OR_RETURN(JSON_SNAPSHOT_REQ_KEY, obj,
472 				  &snapshot_req, NULL);
473 	assert(snapshot_req != NULL);
474 	if (!strcmp(snapshot_req, dev_name)) {
475 		JSON_GET_INT_OR_RETURN(JSON_SIZE_KEY, obj,
476 				       &size, NULL);
477 		assert(size >= 0);
478 
479 		JSON_GET_INT_OR_RETURN(JSON_FILE_OFFSET_KEY, obj,
480 				       &file_offset, NULL);
481 		assert(file_offset >= 0);
482 		assert((uint64_t)file_offset + size <= rstate->kdata_len);
483 
484 		*data_size = (size_t)size;
485 		return ((uint8_t *)rstate->kdata_map + file_offset);
486 	}
487 
488 	return (NULL);
489 }
490 
491 static void*
492 lookup_dev(const char *dev_name, struct restore_state *rstate,
493 	   size_t *data_size)
494 {
495 	const ucl_object_t *devs = NULL, *obj = NULL;
496 	ucl_object_iter_t it = NULL;
497 	void *ret;
498 
499 	devs = ucl_object_lookup(rstate->meta_root_obj, JSON_DEV_ARR_KEY);
500 	if (devs == NULL) {
501 		fprintf(stderr, "Failed to find '%s' object.\n",
502 			JSON_DEV_ARR_KEY);
503 		return (NULL);
504 	}
505 
506 	if (ucl_object_type(devs) != UCL_ARRAY) {
507 		fprintf(stderr, "Object '%s' is not an array.\n",
508 			JSON_DEV_ARR_KEY);
509 		return (NULL);
510 	}
511 
512 	while ((obj = ucl_object_iterate(devs, &it, true)) != NULL) {
513 		ret = lookup_check_dev(dev_name, rstate, obj, data_size);
514 		if (ret != NULL)
515 			return (ret);
516 	}
517 
518 	return (NULL);
519 }
520 
521 static const ucl_object_t *
522 lookup_basic_metadata_object(struct restore_state *rstate)
523 {
524 	const ucl_object_t *basic_meta_obj = NULL;
525 
526 	basic_meta_obj = ucl_object_lookup(rstate->meta_root_obj,
527 					   JSON_BASIC_METADATA_KEY);
528 	if (basic_meta_obj == NULL) {
529 		fprintf(stderr, "Failed to find '%s' object.\n",
530 			JSON_BASIC_METADATA_KEY);
531 		return (NULL);
532 	}
533 
534 	if (ucl_object_type(basic_meta_obj) != UCL_OBJECT) {
535 		fprintf(stderr, "Object '%s' is not a JSON object.\n",
536 		JSON_BASIC_METADATA_KEY);
537 		return (NULL);
538 	}
539 
540 	return (basic_meta_obj);
541 }
542 
543 const char *
544 lookup_vmname(struct restore_state *rstate)
545 {
546 	const char *vmname;
547 	const ucl_object_t *obj;
548 
549 	obj = lookup_basic_metadata_object(rstate);
550 	if (obj == NULL)
551 		return (NULL);
552 
553 	JSON_GET_STRING_OR_RETURN(JSON_VMNAME_KEY, obj, &vmname, NULL);
554 	return (vmname);
555 }
556 
557 int
558 lookup_memflags(struct restore_state *rstate)
559 {
560 	int64_t memflags;
561 	const ucl_object_t *obj;
562 
563 	obj = lookup_basic_metadata_object(rstate);
564 	if (obj == NULL)
565 		return (0);
566 
567 	JSON_GET_INT_OR_RETURN(JSON_MEMFLAGS_KEY, obj, &memflags, 0);
568 
569 	return ((int)memflags);
570 }
571 
572 size_t
573 lookup_memsize(struct restore_state *rstate)
574 {
575 	int64_t memsize;
576 	const ucl_object_t *obj;
577 
578 	obj = lookup_basic_metadata_object(rstate);
579 	if (obj == NULL)
580 		return (0);
581 
582 	JSON_GET_INT_OR_RETURN(JSON_MEMSIZE_KEY, obj, &memsize, 0);
583 	if (memsize < 0)
584 		memsize = 0;
585 
586 	return ((size_t)memsize);
587 }
588 
589 
590 int
591 lookup_guest_ncpus(struct restore_state *rstate)
592 {
593 	int64_t ncpus;
594 	const ucl_object_t *obj;
595 
596 	obj = lookup_basic_metadata_object(rstate);
597 	if (obj == NULL)
598 		return (0);
599 
600 	JSON_GET_INT_OR_RETURN(JSON_NCPUS_KEY, obj, &ncpus, 0);
601 	return ((int)ncpus);
602 }
603 
604 static void
605 winch_handler(int signal __unused)
606 {
607 #ifdef TIOCGWINSZ
608 	ioctl(STDOUT_FILENO, TIOCGWINSZ, &winsize);
609 #endif /* TIOCGWINSZ */
610 }
611 
612 static int
613 print_progress(size_t crtval, const size_t maxval)
614 {
615 	size_t rc;
616 	double crtval_gb, maxval_gb;
617 	size_t i, win_width, prog_start, prog_done, prog_end;
618 	int mval_len;
619 
620 	static char prog_buf[PROG_BUF_SZ];
621 	static const size_t len = sizeof(prog_buf);
622 
623 	static size_t div;
624 	static const char *div_str;
625 
626 	static char wip_bar[] = { '/', '-', '\\', '|' };
627 	static int wip_idx = 0;
628 
629 	if (maxval == 0) {
630 		printf("[0B / 0B]\r\n");
631 		return (0);
632 	}
633 
634 	if (crtval > maxval)
635 		crtval = maxval;
636 
637 	if (maxval > 10 * GB) {
638 		div = GB;
639 		div_str = "GiB";
640 	} else if (maxval > 10 * MB) {
641 		div = MB;
642 		div_str = "MiB";
643 	} else {
644 		div = KB;
645 		div_str = "KiB";
646 	}
647 
648 	crtval_gb = (double) crtval / div;
649 	maxval_gb = (double) maxval / div;
650 
651 	rc = snprintf(prog_buf, len, "%.03lf", maxval_gb);
652 	if (rc == len) {
653 		fprintf(stderr, "Maxval too big\n");
654 		return (-1);
655 	}
656 	mval_len = rc;
657 
658 	rc = snprintf(prog_buf, len, "\r[%*.03lf%s / %.03lf%s] |",
659 		mval_len, crtval_gb, div_str, maxval_gb, div_str);
660 
661 	if (rc == len) {
662 		fprintf(stderr, "Buffer too small to print progress\n");
663 		return (-1);
664 	}
665 
666 	win_width = min(winsize.ws_col, len);
667 	prog_start = rc;
668 
669 	if (prog_start < (win_width - 2)) {
670 		prog_end = win_width - prog_start - 2;
671 		prog_done = prog_end * (crtval_gb / maxval_gb);
672 
673 		for (i = prog_start; i < prog_start + prog_done; i++)
674 			prog_buf[i] = '#';
675 
676 		if (crtval != maxval) {
677 			prog_buf[i] = wip_bar[wip_idx];
678 			wip_idx = (wip_idx + 1) % sizeof(wip_bar);
679 			i++;
680 		} else {
681 			prog_buf[i++] = '#';
682 		}
683 
684 		for (; i < win_width - 2; i++)
685 			prog_buf[i] = '_';
686 
687 		prog_buf[win_width - 2] = '|';
688 	}
689 
690 	prog_buf[win_width - 1] = '\0';
691 	write(STDOUT_FILENO, prog_buf, win_width);
692 
693 	return (0);
694 }
695 
696 static void *
697 snapshot_spinner_cb(void *arg)
698 {
699 	int rc;
700 	size_t crtval, maxval, total;
701 	struct spinner_info *si;
702 	struct timespec ts;
703 
704 	si = arg;
705 	if (si == NULL)
706 		pthread_exit(NULL);
707 
708 	ts.tv_sec = 0;
709 	ts.tv_nsec = 50 * 1000 * 1000; /* 50 ms sleep time */
710 
711 	do {
712 		crtval = *si->crtval;
713 		maxval = si->maxval;
714 		total = si->total;
715 
716 		rc = print_progress(crtval, total);
717 		if (rc < 0) {
718 			fprintf(stderr, "Failed to parse progress\n");
719 			break;
720 		}
721 
722 		nanosleep(&ts, NULL);
723 	} while (crtval < maxval);
724 
725 	pthread_exit(NULL);
726 	return NULL;
727 }
728 
729 static int
730 vm_snapshot_mem_part(const int snapfd, const size_t foff, void *src,
731 		     const size_t len, const size_t totalmem, const bool op_wr)
732 {
733 	int rc;
734 	size_t part_done, todo, rem;
735 	ssize_t done;
736 	bool show_progress;
737 	pthread_t spinner_th;
738 	struct spinner_info *si;
739 
740 	if (lseek(snapfd, foff, SEEK_SET) < 0) {
741 		perror("Failed to change file offset");
742 		return (-1);
743 	}
744 
745 	show_progress = false;
746 	if (isatty(STDIN_FILENO) && (winsize.ws_col != 0))
747 		show_progress = true;
748 
749 	part_done = foff;
750 	rem = len;
751 
752 	if (show_progress) {
753 		si = &(struct spinner_info) {
754 			.crtval = &part_done,
755 			.maxval = foff + len,
756 			.total = totalmem
757 		};
758 
759 		rc = pthread_create(&spinner_th, 0, snapshot_spinner_cb, si);
760 		if (rc) {
761 			perror("Unable to create spinner thread");
762 			show_progress = false;
763 		}
764 	}
765 
766 	while (rem > 0) {
767 		if (show_progress)
768 			todo = min(SNAPSHOT_CHUNK, rem);
769 		else
770 			todo = rem;
771 
772 		if (op_wr)
773 			done = write(snapfd, src, todo);
774 		else
775 			done = read(snapfd, src, todo);
776 		if (done < 0) {
777 			perror("Failed to write in file");
778 			return (-1);
779 		}
780 
781 		src = (uint8_t *)src + done;
782 		part_done += done;
783 		rem -= done;
784 	}
785 
786 	if (show_progress) {
787 		rc = pthread_join(spinner_th, NULL);
788 		if (rc)
789 			perror("Unable to end spinner thread");
790 	}
791 
792 	return (0);
793 }
794 
795 static size_t
796 vm_snapshot_mem(struct vmctx *ctx, int snapfd, size_t memsz, const bool op_wr)
797 {
798 	int ret;
799 	size_t lowmem, highmem, totalmem;
800 	char *baseaddr;
801 
802 	ret = vm_get_guestmem_from_ctx(ctx, &baseaddr, &lowmem, &highmem);
803 	if (ret) {
804 		fprintf(stderr, "%s: unable to retrieve guest memory size\r\n",
805 			__func__);
806 		return (0);
807 	}
808 	totalmem = lowmem + highmem;
809 
810 	if ((op_wr == false) && (totalmem != memsz)) {
811 		fprintf(stderr, "%s: mem size mismatch: %ld vs %ld\r\n",
812 			__func__, totalmem, memsz);
813 		return (0);
814 	}
815 
816 	winsize.ws_col = 80;
817 #ifdef TIOCGWINSZ
818 	ioctl(STDOUT_FILENO, TIOCGWINSZ, &winsize);
819 #endif /* TIOCGWINSZ */
820 	old_winch_handler = signal(SIGWINCH, winch_handler);
821 
822 	ret = vm_snapshot_mem_part(snapfd, 0, baseaddr, lowmem,
823 		totalmem, op_wr);
824 	if (ret) {
825 		fprintf(stderr, "%s: Could not %s lowmem\r\n",
826 			__func__, op_wr ? "write" : "read");
827 		totalmem = 0;
828 		goto done;
829 	}
830 
831 	if (highmem == 0)
832 		goto done;
833 
834 	ret = vm_snapshot_mem_part(snapfd, lowmem, baseaddr + 4*GB,
835 		highmem, totalmem, op_wr);
836 	if (ret) {
837 		fprintf(stderr, "%s: Could not %s highmem\r\n",
838 		        __func__, op_wr ? "write" : "read");
839 		totalmem = 0;
840 		goto done;
841 	}
842 
843 done:
844 	printf("\r\n");
845 	signal(SIGWINCH, old_winch_handler);
846 
847 	return (totalmem);
848 }
849 
850 int
851 restore_vm_mem(struct vmctx *ctx, struct restore_state *rstate)
852 {
853 	size_t restored;
854 
855 	restored = vm_snapshot_mem(ctx, rstate->vmmem_fd, rstate->vmmem_len,
856 				   false);
857 
858 	if (restored != rstate->vmmem_len)
859 		return (-1);
860 
861 	return (0);
862 }
863 
864 static int
865 vm_restore_kern_struct(struct vmctx *ctx, struct restore_state *rstate,
866 		       const struct vm_snapshot_kern_info *info)
867 {
868 	void *struct_ptr;
869 	size_t struct_size;
870 	int ret;
871 	struct vm_snapshot_meta *meta;
872 
873 	struct_ptr = lookup_struct(info->req, rstate, &struct_size);
874 	if (struct_ptr == NULL) {
875 		fprintf(stderr, "%s: Failed to lookup struct %s\r\n",
876 			__func__, info->struct_name);
877 		ret = -1;
878 		goto done;
879 	}
880 
881 	if (struct_size == 0) {
882 		fprintf(stderr, "%s: Kernel struct size was 0 for: %s\r\n",
883 			__func__, info->struct_name);
884 		ret = -1;
885 		goto done;
886 	}
887 
888 	meta = &(struct vm_snapshot_meta) {
889 		.dev_name = info->struct_name,
890 		.dev_req  = info->req,
891 
892 		.buffer.buf_start = struct_ptr,
893 		.buffer.buf_size = struct_size,
894 
895 		.buffer.buf = struct_ptr,
896 		.buffer.buf_rem = struct_size,
897 
898 		.op = VM_SNAPSHOT_RESTORE,
899 	};
900 
901 	ret = vm_snapshot_req(ctx, meta);
902 	if (ret != 0) {
903 		fprintf(stderr, "%s: Failed to restore struct: %s\r\n",
904 			__func__, info->struct_name);
905 		goto done;
906 	}
907 
908 done:
909 	return (ret);
910 }
911 
912 int
913 vm_restore_kern_structs(struct vmctx *ctx, struct restore_state *rstate)
914 {
915 	size_t i;
916 	int ret;
917 
918 	for (i = 0; i < nitems(snapshot_kern_structs); i++) {
919 		ret = vm_restore_kern_struct(ctx, rstate,
920 					     &snapshot_kern_structs[i]);
921 		if (ret != 0)
922 			return (ret);
923 	}
924 
925 	return (0);
926 }
927 
928 static int
929 vm_restore_user_dev(struct restore_state *rstate,
930 		    const struct vm_snapshot_dev_info *info)
931 {
932 	void *dev_ptr;
933 	size_t dev_size;
934 	int ret;
935 	struct vm_snapshot_meta *meta;
936 
937 	dev_ptr = lookup_dev(info->dev_name, rstate, &dev_size);
938 	if (dev_ptr == NULL) {
939 		fprintf(stderr, "Failed to lookup dev: %s\r\n", info->dev_name);
940 		fprintf(stderr, "Continuing the restore/migration process\r\n");
941 		return (0);
942 	}
943 
944 	if (dev_size == 0) {
945 		fprintf(stderr, "%s: Device size is 0. "
946 			"Assuming %s is not used\r\n",
947 			__func__, info->dev_name);
948 		return (0);
949 	}
950 
951 	meta = &(struct vm_snapshot_meta) {
952 		.dev_name = info->dev_name,
953 
954 		.buffer.buf_start = dev_ptr,
955 		.buffer.buf_size = dev_size,
956 
957 		.buffer.buf = dev_ptr,
958 		.buffer.buf_rem = dev_size,
959 
960 		.op = VM_SNAPSHOT_RESTORE,
961 	};
962 
963 	ret = (*info->snapshot_cb)(meta);
964 	if (ret != 0) {
965 		fprintf(stderr, "Failed to restore dev: %s\r\n",
966 			info->dev_name);
967 		return (-1);
968 	}
969 
970 	return (0);
971 }
972 
973 
974 int
975 vm_restore_user_devs(struct restore_state *rstate)
976 {
977 	size_t i;
978 	int ret;
979 
980 	for (i = 0; i < nitems(snapshot_devs); i++) {
981 		ret = vm_restore_user_dev(rstate, &snapshot_devs[i]);
982 		if (ret != 0)
983 			return (ret);
984 	}
985 
986 	return 0;
987 }
988 
989 int
990 vm_pause_user_devs(void)
991 {
992 	const struct vm_snapshot_dev_info *info;
993 	size_t i;
994 	int ret;
995 
996 	for (i = 0; i < nitems(snapshot_devs); i++) {
997 		info = &snapshot_devs[i];
998 		if (info->pause_cb == NULL)
999 			continue;
1000 
1001 		ret = info->pause_cb(info->dev_name);
1002 		if (ret != 0)
1003 			return (ret);
1004 	}
1005 
1006 	return (0);
1007 }
1008 
1009 int
1010 vm_resume_user_devs(void)
1011 {
1012 	const struct vm_snapshot_dev_info *info;
1013 	size_t i;
1014 	int ret;
1015 
1016 	for (i = 0; i < nitems(snapshot_devs); i++) {
1017 		info = &snapshot_devs[i];
1018 		if (info->resume_cb == NULL)
1019 			continue;
1020 
1021 		ret = info->resume_cb(info->dev_name);
1022 		if (ret != 0)
1023 			return (ret);
1024 	}
1025 
1026 	return (0);
1027 }
1028 
1029 static int
1030 vm_snapshot_kern_struct(struct vmctx *ctx, int data_fd, xo_handle_t *xop,
1031     const char *array_key, struct vm_snapshot_meta *meta, off_t *offset)
1032 {
1033 	int ret;
1034 	size_t data_size;
1035 	ssize_t write_cnt;
1036 
1037 	ret = vm_snapshot_req(ctx, meta);
1038 	if (ret != 0) {
1039 		fprintf(stderr, "%s: Failed to snapshot struct %s\r\n",
1040 			__func__, meta->dev_name);
1041 		ret = -1;
1042 		goto done;
1043 	}
1044 
1045 	data_size = vm_get_snapshot_size(meta);
1046 
1047 	/* XXX-MJ no handling for short writes. */
1048 	write_cnt = write(data_fd, meta->buffer.buf_start, data_size);
1049 	if (write_cnt < 0 || (size_t)write_cnt != data_size) {
1050 		perror("Failed to write all snapshotted data.");
1051 		ret = -1;
1052 		goto done;
1053 	}
1054 
1055 	/* Write metadata. */
1056 	xo_open_instance_h(xop, array_key);
1057 	xo_emit_h(xop, "{:debug_name/%s}\n", meta->dev_name);
1058 	xo_emit_h(xop, "{:" JSON_SNAPSHOT_REQ_KEY "/%d}\n",
1059 		  meta->dev_req);
1060 	xo_emit_h(xop, "{:" JSON_SIZE_KEY "/%lu}\n", data_size);
1061 	xo_emit_h(xop, "{:" JSON_FILE_OFFSET_KEY "/%lu}\n", *offset);
1062 	xo_close_instance_h(xop, JSON_STRUCT_ARR_KEY);
1063 
1064 	*offset += data_size;
1065 
1066 done:
1067 	return (ret);
1068 }
1069 
1070 static int
1071 vm_snapshot_kern_structs(struct vmctx *ctx, int data_fd, xo_handle_t *xop)
1072 {
1073 	int ret, error;
1074 	size_t buf_size, i, offset;
1075 	char *buffer;
1076 	struct vm_snapshot_meta *meta;
1077 
1078 	error = 0;
1079 	offset = 0;
1080 	buf_size = SNAPSHOT_BUFFER_SIZE;
1081 
1082 	buffer = malloc(SNAPSHOT_BUFFER_SIZE * sizeof(char));
1083 	if (buffer == NULL) {
1084 		error = ENOMEM;
1085 		perror("Failed to allocate memory for snapshot buffer");
1086 		goto err_vm_snapshot_kern_data;
1087 	}
1088 
1089 	meta = &(struct vm_snapshot_meta) {
1090 		.buffer.buf_start = buffer,
1091 		.buffer.buf_size = buf_size,
1092 
1093 		.op = VM_SNAPSHOT_SAVE,
1094 	};
1095 
1096 	xo_open_list_h(xop, JSON_STRUCT_ARR_KEY);
1097 	for (i = 0; i < nitems(snapshot_kern_structs); i++) {
1098 		meta->dev_name = snapshot_kern_structs[i].struct_name;
1099 		meta->dev_req  = snapshot_kern_structs[i].req;
1100 
1101 		memset(meta->buffer.buf_start, 0, meta->buffer.buf_size);
1102 		meta->buffer.buf = meta->buffer.buf_start;
1103 		meta->buffer.buf_rem = meta->buffer.buf_size;
1104 
1105 		ret = vm_snapshot_kern_struct(ctx, data_fd, xop,
1106 		    JSON_DEV_ARR_KEY, meta, &offset);
1107 		if (ret != 0) {
1108 			error = -1;
1109 			goto err_vm_snapshot_kern_data;
1110 		}
1111 	}
1112 	xo_close_list_h(xop, JSON_STRUCT_ARR_KEY);
1113 
1114 err_vm_snapshot_kern_data:
1115 	if (buffer != NULL)
1116 		free(buffer);
1117 	return (error);
1118 }
1119 
1120 static int
1121 vm_snapshot_basic_metadata(struct vmctx *ctx, xo_handle_t *xop, size_t memsz)
1122 {
1123 
1124 	xo_open_container_h(xop, JSON_BASIC_METADATA_KEY);
1125 	xo_emit_h(xop, "{:" JSON_NCPUS_KEY "/%ld}\n", guest_ncpus);
1126 	xo_emit_h(xop, "{:" JSON_VMNAME_KEY "/%s}\n", vm_get_name(ctx));
1127 	xo_emit_h(xop, "{:" JSON_MEMSIZE_KEY "/%lu}\n", memsz);
1128 	xo_emit_h(xop, "{:" JSON_MEMFLAGS_KEY "/%d}\n", vm_get_memflags(ctx));
1129 	xo_close_container_h(xop, JSON_BASIC_METADATA_KEY);
1130 
1131 	return (0);
1132 }
1133 
1134 static int
1135 vm_snapshot_dev_write_data(int data_fd, xo_handle_t *xop, const char *array_key,
1136 			   struct vm_snapshot_meta *meta, off_t *offset)
1137 {
1138 	ssize_t ret;
1139 	size_t data_size;
1140 
1141 	data_size = vm_get_snapshot_size(meta);
1142 
1143 	/* XXX-MJ no handling for short writes. */
1144 	ret = write(data_fd, meta->buffer.buf_start, data_size);
1145 	if (ret < 0 || (size_t)ret != data_size) {
1146 		perror("Failed to write all snapshotted data.");
1147 		return (-1);
1148 	}
1149 
1150 	/* Write metadata. */
1151 	xo_open_instance_h(xop, array_key);
1152 	xo_emit_h(xop, "{:" JSON_SNAPSHOT_REQ_KEY "/%s}\n", meta->dev_name);
1153 	xo_emit_h(xop, "{:" JSON_SIZE_KEY "/%lu}\n", data_size);
1154 	xo_emit_h(xop, "{:" JSON_FILE_OFFSET_KEY "/%lu}\n", *offset);
1155 	xo_close_instance_h(xop, array_key);
1156 
1157 	*offset += data_size;
1158 
1159 	return (0);
1160 }
1161 
1162 static int
1163 vm_snapshot_user_dev(const struct vm_snapshot_dev_info *info,
1164 		     int data_fd, xo_handle_t *xop,
1165 		     struct vm_snapshot_meta *meta, off_t *offset)
1166 {
1167 	int ret;
1168 
1169 	ret = (*info->snapshot_cb)(meta);
1170 	if (ret != 0) {
1171 		fprintf(stderr, "Failed to snapshot %s; ret=%d\r\n",
1172 			meta->dev_name, ret);
1173 		return (ret);
1174 	}
1175 
1176 	ret = vm_snapshot_dev_write_data(data_fd, xop, JSON_DEV_ARR_KEY, meta,
1177 					 offset);
1178 	if (ret != 0)
1179 		return (ret);
1180 
1181 	return (0);
1182 }
1183 
1184 static int
1185 vm_snapshot_user_devs(int data_fd, xo_handle_t *xop)
1186 {
1187 	int ret;
1188 	off_t offset;
1189 	void *buffer;
1190 	size_t buf_size, i;
1191 	struct vm_snapshot_meta *meta;
1192 
1193 	buf_size = SNAPSHOT_BUFFER_SIZE;
1194 
1195 	offset = lseek(data_fd, 0, SEEK_CUR);
1196 	if (offset < 0) {
1197 		perror("Failed to get data file current offset.");
1198 		return (-1);
1199 	}
1200 
1201 	buffer = malloc(buf_size);
1202 	if (buffer == NULL) {
1203 		perror("Failed to allocate memory for snapshot buffer");
1204 		ret = ENOSPC;
1205 		goto snapshot_err;
1206 	}
1207 
1208 	meta = &(struct vm_snapshot_meta) {
1209 		.buffer.buf_start = buffer,
1210 		.buffer.buf_size = buf_size,
1211 
1212 		.op = VM_SNAPSHOT_SAVE,
1213 	};
1214 
1215 	xo_open_list_h(xop, JSON_DEV_ARR_KEY);
1216 
1217 	/* Restore other devices that support this feature */
1218 	for (i = 0; i < nitems(snapshot_devs); i++) {
1219 		meta->dev_name = snapshot_devs[i].dev_name;
1220 
1221 		memset(meta->buffer.buf_start, 0, meta->buffer.buf_size);
1222 		meta->buffer.buf = meta->buffer.buf_start;
1223 		meta->buffer.buf_rem = meta->buffer.buf_size;
1224 
1225 		ret = vm_snapshot_user_dev(&snapshot_devs[i], data_fd, xop,
1226 					   meta, &offset);
1227 		if (ret != 0)
1228 			goto snapshot_err;
1229 	}
1230 
1231 	xo_close_list_h(xop, JSON_DEV_ARR_KEY);
1232 
1233 snapshot_err:
1234 	if (buffer != NULL)
1235 		free(buffer);
1236 	return (ret);
1237 }
1238 
1239 void
1240 checkpoint_cpu_add(int vcpu)
1241 {
1242 
1243 	pthread_mutex_lock(&vcpu_lock);
1244 	CPU_SET(vcpu, &vcpus_active);
1245 
1246 	if (checkpoint_active) {
1247 		CPU_SET(vcpu, &vcpus_suspended);
1248 		while (checkpoint_active)
1249 			pthread_cond_wait(&vcpus_can_run, &vcpu_lock);
1250 		CPU_CLR(vcpu, &vcpus_suspended);
1251 	}
1252 	pthread_mutex_unlock(&vcpu_lock);
1253 }
1254 
1255 /*
1256  * When a vCPU is suspended for any reason, it calls
1257  * checkpoint_cpu_suspend().  This records that the vCPU is idle.
1258  * Before returning from suspension, checkpoint_cpu_resume() is
1259  * called.  In suspend we note that the vCPU is idle.  In resume we
1260  * pause the vCPU thread until the checkpoint is complete.  The reason
1261  * for the two-step process is that vCPUs might already be stopped in
1262  * the debug server when a checkpoint is requested.  This approach
1263  * allows us to account for and handle those vCPUs.
1264  */
1265 void
1266 checkpoint_cpu_suspend(int vcpu)
1267 {
1268 
1269 	pthread_mutex_lock(&vcpu_lock);
1270 	CPU_SET(vcpu, &vcpus_suspended);
1271 	if (checkpoint_active && CPU_CMP(&vcpus_active, &vcpus_suspended) == 0)
1272 		pthread_cond_signal(&vcpus_idle);
1273 	pthread_mutex_unlock(&vcpu_lock);
1274 }
1275 
1276 void
1277 checkpoint_cpu_resume(int vcpu)
1278 {
1279 
1280 	pthread_mutex_lock(&vcpu_lock);
1281 	while (checkpoint_active)
1282 		pthread_cond_wait(&vcpus_can_run, &vcpu_lock);
1283 	CPU_CLR(vcpu, &vcpus_suspended);
1284 	pthread_mutex_unlock(&vcpu_lock);
1285 }
1286 
1287 static void
1288 vm_vcpu_pause(struct vmctx *ctx)
1289 {
1290 
1291 	pthread_mutex_lock(&vcpu_lock);
1292 	checkpoint_active = true;
1293 	vm_suspend_all_cpus(ctx);
1294 	while (CPU_CMP(&vcpus_active, &vcpus_suspended) != 0)
1295 		pthread_cond_wait(&vcpus_idle, &vcpu_lock);
1296 	pthread_mutex_unlock(&vcpu_lock);
1297 }
1298 
1299 static void
1300 vm_vcpu_resume(struct vmctx *ctx)
1301 {
1302 
1303 	pthread_mutex_lock(&vcpu_lock);
1304 	checkpoint_active = false;
1305 	pthread_mutex_unlock(&vcpu_lock);
1306 	vm_resume_all_cpus(ctx);
1307 	pthread_cond_broadcast(&vcpus_can_run);
1308 }
1309 
1310 static int
1311 vm_checkpoint(struct vmctx *ctx, int fddir, const char *checkpoint_file,
1312     bool stop_vm)
1313 {
1314 	int fd_checkpoint = 0, kdata_fd = 0, fd_meta;
1315 	int ret = 0;
1316 	int error = 0;
1317 	size_t memsz;
1318 	xo_handle_t *xop = NULL;
1319 	char *meta_filename = NULL;
1320 	char *kdata_filename = NULL;
1321 	FILE *meta_file = NULL;
1322 
1323 	kdata_filename = strcat_extension(checkpoint_file, ".kern");
1324 	if (kdata_filename == NULL) {
1325 		fprintf(stderr, "Failed to construct kernel data filename.\n");
1326 		return (-1);
1327 	}
1328 
1329 	kdata_fd = openat(fddir, kdata_filename, O_WRONLY | O_CREAT | O_TRUNC, 0700);
1330 	if (kdata_fd < 0) {
1331 		perror("Failed to open kernel data snapshot file.");
1332 		error = -1;
1333 		goto done;
1334 	}
1335 
1336 	fd_checkpoint = openat(fddir, checkpoint_file, O_RDWR | O_CREAT | O_TRUNC, 0700);
1337 
1338 	if (fd_checkpoint < 0) {
1339 		perror("Failed to create checkpoint file");
1340 		error = -1;
1341 		goto done;
1342 	}
1343 
1344 	meta_filename = strcat_extension(checkpoint_file, ".meta");
1345 	if (meta_filename == NULL) {
1346 		fprintf(stderr, "Failed to construct vm metadata filename.\n");
1347 		goto done;
1348 	}
1349 
1350 	fd_meta = openat(fddir, meta_filename, O_WRONLY | O_CREAT | O_TRUNC, 0700);
1351 	if (fd_meta != -1)
1352 		meta_file = fdopen(fd_meta, "w");
1353 	if (meta_file == NULL) {
1354 		perror("Failed to open vm metadata snapshot file.");
1355 		close(fd_meta);
1356 		goto done;
1357 	}
1358 
1359 	xop = xo_create_to_file(meta_file, XO_STYLE_JSON, XOF_PRETTY);
1360 	if (xop == NULL) {
1361 		perror("Failed to get libxo handle on metadata file.");
1362 		goto done;
1363 	}
1364 
1365 	vm_vcpu_pause(ctx);
1366 
1367 	ret = vm_pause_user_devs();
1368 	if (ret != 0) {
1369 		fprintf(stderr, "Could not pause devices\r\n");
1370 		error = ret;
1371 		goto done;
1372 	}
1373 
1374 	memsz = vm_snapshot_mem(ctx, fd_checkpoint, 0, true);
1375 	if (memsz == 0) {
1376 		perror("Could not write guest memory to file");
1377 		error = -1;
1378 		goto done;
1379 	}
1380 
1381 	ret = vm_snapshot_basic_metadata(ctx, xop, memsz);
1382 	if (ret != 0) {
1383 		fprintf(stderr, "Failed to snapshot vm basic metadata.\n");
1384 		error = -1;
1385 		goto done;
1386 	}
1387 
1388 
1389 	ret = vm_snapshot_kern_structs(ctx, kdata_fd, xop);
1390 	if (ret != 0) {
1391 		fprintf(stderr, "Failed to snapshot vm kernel data.\n");
1392 		error = -1;
1393 		goto done;
1394 	}
1395 
1396 	ret = vm_snapshot_user_devs(kdata_fd, xop);
1397 	if (ret != 0) {
1398 		fprintf(stderr, "Failed to snapshot device state.\n");
1399 		error = -1;
1400 		goto done;
1401 	}
1402 
1403 	xo_finish_h(xop);
1404 
1405 	if (stop_vm) {
1406 		vm_destroy(ctx);
1407 		exit(0);
1408 	}
1409 
1410 done:
1411 	ret = vm_resume_user_devs();
1412 	if (ret != 0)
1413 		fprintf(stderr, "Could not resume devices\r\n");
1414 	vm_vcpu_resume(ctx);
1415 	if (fd_checkpoint > 0)
1416 		close(fd_checkpoint);
1417 	if (meta_filename != NULL)
1418 		free(meta_filename);
1419 	if (kdata_filename != NULL)
1420 		free(kdata_filename);
1421 	if (xop != NULL)
1422 		xo_destroy(xop);
1423 	if (meta_file != NULL)
1424 		fclose(meta_file);
1425 	if (kdata_fd > 0)
1426 		close(kdata_fd);
1427 	return (error);
1428 }
1429 
1430 static int
1431 handle_message(struct vmctx *ctx, nvlist_t *nvl)
1432 {
1433 	const char *cmd;
1434 	struct ipc_command **ipc_cmd;
1435 
1436 	if (!nvlist_exists_string(nvl, "cmd"))
1437 		return (EINVAL);
1438 
1439 	cmd = nvlist_get_string(nvl, "cmd");
1440 	IPC_COMMAND_FOREACH(ipc_cmd, ipc_cmd_set) {
1441 		if (strcmp(cmd, (*ipc_cmd)->name) == 0)
1442 			return ((*ipc_cmd)->handler(ctx, nvl));
1443 	}
1444 
1445 	return (EOPNOTSUPP);
1446 }
1447 
1448 /*
1449  * Listen for commands from bhyvectl
1450  */
1451 void *
1452 checkpoint_thread(void *param)
1453 {
1454 	int fd;
1455 	struct checkpoint_thread_info *thread_info;
1456 	nvlist_t *nvl;
1457 
1458 	pthread_set_name_np(pthread_self(), "checkpoint thread");
1459 	thread_info = (struct checkpoint_thread_info *)param;
1460 
1461 	while ((fd = accept(thread_info->socket_fd, NULL, NULL)) != -1) {
1462 		nvl = nvlist_recv(fd, 0);
1463 		if (nvl != NULL)
1464 			handle_message(thread_info->ctx, nvl);
1465 		else
1466 			EPRINTLN("nvlist_recv() failed: %s", strerror(errno));
1467 
1468 		close(fd);
1469 		nvlist_destroy(nvl);
1470 	}
1471 
1472 	return (NULL);
1473 }
1474 
1475 static int
1476 vm_do_checkpoint(struct vmctx *ctx, const nvlist_t *nvl)
1477 {
1478 	int error;
1479 
1480 	if (!nvlist_exists_string(nvl, "filename") ||
1481 	    !nvlist_exists_bool(nvl, "suspend") ||
1482 	    !nvlist_exists_descriptor(nvl, "fddir"))
1483 		error = EINVAL;
1484 	else
1485 		error = vm_checkpoint(ctx,
1486 		    nvlist_get_descriptor(nvl, "fddir"),
1487 		    nvlist_get_string(nvl, "filename"),
1488 		    nvlist_get_bool(nvl, "suspend"));
1489 
1490 	return (error);
1491 }
1492 IPC_COMMAND(ipc_cmd_set, checkpoint, vm_do_checkpoint);
1493 
1494 void
1495 init_snapshot(void)
1496 {
1497 	int err;
1498 
1499 	err = pthread_mutex_init(&vcpu_lock, NULL);
1500 	if (err != 0)
1501 		errc(1, err, "checkpoint mutex init");
1502 	err = pthread_cond_init(&vcpus_idle, NULL);
1503 	if (err != 0)
1504 		errc(1, err, "checkpoint cv init (vcpus_idle)");
1505 	err = pthread_cond_init(&vcpus_can_run, NULL);
1506 	if (err != 0)
1507 		errc(1, err, "checkpoint cv init (vcpus_can_run)");
1508 }
1509 
1510 /*
1511  * Create the listening socket for IPC with bhyvectl
1512  */
1513 int
1514 init_checkpoint_thread(struct vmctx *ctx)
1515 {
1516 	struct checkpoint_thread_info *checkpoint_info = NULL;
1517 	struct sockaddr_un addr;
1518 	int socket_fd;
1519 	pthread_t checkpoint_pthread;
1520 	int err;
1521 #ifndef WITHOUT_CAPSICUM
1522 	cap_rights_t rights;
1523 #endif
1524 
1525 	memset(&addr, 0, sizeof(addr));
1526 
1527 	socket_fd = socket(PF_UNIX, SOCK_STREAM, 0);
1528 	if (socket_fd < 0) {
1529 		EPRINTLN("Socket creation failed: %s", strerror(errno));
1530 		err = -1;
1531 		goto fail;
1532 	}
1533 
1534 	addr.sun_family = AF_UNIX;
1535 
1536 	snprintf(addr.sun_path, sizeof(addr.sun_path), "%s%s",
1537 		 BHYVE_RUN_DIR, vm_get_name(ctx));
1538 	addr.sun_len = SUN_LEN(&addr);
1539 	unlink(addr.sun_path);
1540 
1541 	if (bind(socket_fd, (struct sockaddr *)&addr, addr.sun_len) != 0) {
1542 		EPRINTLN("Failed to bind socket \"%s\": %s\n",
1543 		    addr.sun_path, strerror(errno));
1544 		err = -1;
1545 		goto fail;
1546 	}
1547 
1548 	if (listen(socket_fd, 10) < 0) {
1549 		EPRINTLN("ipc socket listen: %s\n", strerror(errno));
1550 		err = errno;
1551 		goto fail;
1552 	}
1553 
1554 #ifndef WITHOUT_CAPSICUM
1555 	cap_rights_init(&rights, CAP_ACCEPT, CAP_READ, CAP_RECV, CAP_WRITE,
1556 	    CAP_SEND, CAP_GETSOCKOPT);
1557 
1558 	if (caph_rights_limit(socket_fd, &rights) == -1)
1559 		errx(EX_OSERR, "Unable to apply rights for sandbox");
1560 #endif
1561 	checkpoint_info = calloc(1, sizeof(*checkpoint_info));
1562 	checkpoint_info->ctx = ctx;
1563 	checkpoint_info->socket_fd = socket_fd;
1564 
1565 	err = pthread_create(&checkpoint_pthread, NULL, checkpoint_thread,
1566 		checkpoint_info);
1567 	if (err != 0)
1568 		goto fail;
1569 
1570 	return (0);
1571 fail:
1572 	free(checkpoint_info);
1573 	if (socket_fd > 0)
1574 		close(socket_fd);
1575 	unlink(addr.sun_path);
1576 
1577 	return (err);
1578 }
1579 
1580 void
1581 vm_snapshot_buf_err(const char *bufname, const enum vm_snapshot_op op)
1582 {
1583 	const char *__op;
1584 
1585 	if (op == VM_SNAPSHOT_SAVE)
1586 		__op = "save";
1587 	else if (op == VM_SNAPSHOT_RESTORE)
1588 		__op = "restore";
1589 	else
1590 		__op = "unknown";
1591 
1592 	fprintf(stderr, "%s: snapshot-%s failed for %s\r\n",
1593 		__func__, __op, bufname);
1594 }
1595 
1596 int
1597 vm_snapshot_buf(void *data, size_t data_size, struct vm_snapshot_meta *meta)
1598 {
1599 	struct vm_snapshot_buffer *buffer;
1600 	int op;
1601 
1602 	buffer = &meta->buffer;
1603 	op = meta->op;
1604 
1605 	if (buffer->buf_rem < data_size) {
1606 		fprintf(stderr, "%s: buffer too small\r\n", __func__);
1607 		return (E2BIG);
1608 	}
1609 
1610 	if (op == VM_SNAPSHOT_SAVE)
1611 		memcpy(buffer->buf, data, data_size);
1612 	else if (op == VM_SNAPSHOT_RESTORE)
1613 		memcpy(data, buffer->buf, data_size);
1614 	else
1615 		return (EINVAL);
1616 
1617 	buffer->buf += data_size;
1618 	buffer->buf_rem -= data_size;
1619 
1620 	return (0);
1621 }
1622 
1623 size_t
1624 vm_get_snapshot_size(struct vm_snapshot_meta *meta)
1625 {
1626 	size_t length;
1627 	struct vm_snapshot_buffer *buffer;
1628 
1629 	buffer = &meta->buffer;
1630 
1631 	if (buffer->buf_size < buffer->buf_rem) {
1632 		fprintf(stderr, "%s: Invalid buffer: size = %zu, rem = %zu\r\n",
1633 			__func__, buffer->buf_size, buffer->buf_rem);
1634 		length = 0;
1635 	} else {
1636 		length = buffer->buf_size - buffer->buf_rem;
1637 	}
1638 
1639 	return (length);
1640 }
1641 
1642 int
1643 vm_snapshot_guest2host_addr(struct vmctx *ctx, void **addrp, size_t len,
1644     bool restore_null, struct vm_snapshot_meta *meta)
1645 {
1646 	int ret;
1647 	vm_paddr_t gaddr;
1648 
1649 	if (meta->op == VM_SNAPSHOT_SAVE) {
1650 		gaddr = paddr_host2guest(ctx, *addrp);
1651 		if (gaddr == (vm_paddr_t) -1) {
1652 			if (!restore_null ||
1653 			    (restore_null && (*addrp != NULL))) {
1654 				ret = EFAULT;
1655 				goto done;
1656 			}
1657 		}
1658 
1659 		SNAPSHOT_VAR_OR_LEAVE(gaddr, meta, ret, done);
1660 	} else if (meta->op == VM_SNAPSHOT_RESTORE) {
1661 		SNAPSHOT_VAR_OR_LEAVE(gaddr, meta, ret, done);
1662 		if (gaddr == (vm_paddr_t) -1) {
1663 			if (!restore_null) {
1664 				ret = EFAULT;
1665 				goto done;
1666 			}
1667 		}
1668 
1669 		*addrp = paddr_guest2host(ctx, gaddr, len);
1670 	} else {
1671 		ret = EINVAL;
1672 	}
1673 
1674 done:
1675 	return (ret);
1676 }
1677 
1678 int
1679 vm_snapshot_buf_cmp(void *data, size_t data_size, struct vm_snapshot_meta *meta)
1680 {
1681 	struct vm_snapshot_buffer *buffer;
1682 	int op;
1683 	int ret;
1684 
1685 	buffer = &meta->buffer;
1686 	op = meta->op;
1687 
1688 	if (buffer->buf_rem < data_size) {
1689 		fprintf(stderr, "%s: buffer too small\r\n", __func__);
1690 		ret = E2BIG;
1691 		goto done;
1692 	}
1693 
1694 	if (op == VM_SNAPSHOT_SAVE) {
1695 		ret = 0;
1696 		memcpy(buffer->buf, data, data_size);
1697 	} else if (op == VM_SNAPSHOT_RESTORE) {
1698 		ret = memcmp(data, buffer->buf, data_size);
1699 	} else {
1700 		ret = EINVAL;
1701 		goto done;
1702 	}
1703 
1704 	buffer->buf += data_size;
1705 	buffer->buf_rem -= data_size;
1706 
1707 done:
1708 	return (ret);
1709 }
1710