1=================== 2Vhost-user Protocol 3=================== 4:Copyright: 2014 Virtual Open Systems Sarl. 5:Licence: This work is licensed under the terms of the GNU GPL, 6 version 2 or later. See the COPYING file in the top-level 7 directory. 8 9.. contents:: Table of Contents 10 11Introduction 12============ 13 14This protocol is aiming to complement the ``ioctl`` interface used to 15control the vhost implementation in the Linux kernel. It implements 16the control plane needed to establish virtqueue sharing with a user 17space process on the same host. It uses communication over a Unix 18domain socket to share file descriptors in the ancillary data of the 19message. 20 21The protocol defines 2 sides of the communication, *master* and 22*slave*. *Master* is the application that shares its virtqueues, in 23our case QEMU. *Slave* is the consumer of the virtqueues. 24 25In the current implementation QEMU is the *master*, and the *slave* is 26the external process consuming the virtio queues, for example a 27software Ethernet switch running in user space, such as Snabbswitch, 28or a block device backend processing read & write to a virtual 29disk. In order to facilitate interoperability between various backend 30implementations, it is recommended to follow the :ref:`Backend program 31conventions <backend_conventions>`. 32 33*Master* and *slave* can be either a client (i.e. connecting) or 34server (listening) in the socket communication. 35 36Message Specification 37===================== 38 39.. Note:: All numbers are in the machine native byte order. 40 41A vhost-user message consists of 3 header fields and a payload. 42 43+---------+-------+------+---------+ 44| request | flags | size | payload | 45+---------+-------+------+---------+ 46 47Header 48------ 49 50:request: 32-bit type of the request 51 52:flags: 32-bit bit field 53 54- Lower 2 bits are the version (currently 0x01) 55- Bit 2 is the reply flag - needs to be sent on each reply from the slave 56- Bit 3 is the need_reply flag - see :ref:`REPLY_ACK <reply_ack>` for 57 details. 58 59:size: 32-bit size of the payload 60 61Payload 62------- 63 64Depending on the request type, **payload** can be: 65 66A single 64-bit integer 67^^^^^^^^^^^^^^^^^^^^^^^ 68 69+-----+ 70| u64 | 71+-----+ 72 73:u64: a 64-bit unsigned integer 74 75A vring state description 76^^^^^^^^^^^^^^^^^^^^^^^^^ 77 78+-------+-----+ 79| index | num | 80+-------+-----+ 81 82:index: a 32-bit index 83 84:num: a 32-bit number 85 86A vring address description 87^^^^^^^^^^^^^^^^^^^^^^^^^^^ 88 89+-------+-------+------+------------+------+-----------+-----+ 90| index | flags | size | descriptor | used | available | log | 91+-------+-------+------+------------+------+-----------+-----+ 92 93:index: a 32-bit vring index 94 95:flags: a 32-bit vring flags 96 97:descriptor: a 64-bit ring address of the vring descriptor table 98 99:used: a 64-bit ring address of the vring used ring 100 101:available: a 64-bit ring address of the vring available ring 102 103:log: a 64-bit guest address for logging 104 105Note that a ring address is an IOVA if ``VIRTIO_F_IOMMU_PLATFORM`` has 106been negotiated. Otherwise it is a user address. 107 108Memory regions description 109^^^^^^^^^^^^^^^^^^^^^^^^^^ 110 111+-------------+---------+---------+-----+---------+ 112| num regions | padding | region0 | ... | region7 | 113+-------------+---------+---------+-----+---------+ 114 115:num regions: a 32-bit number of regions 116 117:padding: 32-bit 118 119A region is: 120 121+---------------+------+--------------+-------------+ 122| guest address | size | user address | mmap offset | 123+---------------+------+--------------+-------------+ 124 125:guest address: a 64-bit guest address of the region 126 127:size: a 64-bit size 128 129:user address: a 64-bit user address 130 131:mmap offset: 64-bit offset where region starts in the mapped memory 132 133Log description 134^^^^^^^^^^^^^^^ 135 136+----------+------------+ 137| log size | log offset | 138+----------+------------+ 139 140:log size: size of area used for logging 141 142:log offset: offset from start of supplied file descriptor where 143 logging starts (i.e. where guest address 0 would be 144 logged) 145 146An IOTLB message 147^^^^^^^^^^^^^^^^ 148 149+------+------+--------------+-------------------+------+ 150| iova | size | user address | permissions flags | type | 151+------+------+--------------+-------------------+------+ 152 153:iova: a 64-bit I/O virtual address programmed by the guest 154 155:size: a 64-bit size 156 157:user address: a 64-bit user address 158 159:permissions flags: an 8-bit value: 160 - 0: No access 161 - 1: Read access 162 - 2: Write access 163 - 3: Read/Write access 164 165:type: an 8-bit IOTLB message type: 166 - 1: IOTLB miss 167 - 2: IOTLB update 168 - 3: IOTLB invalidate 169 - 4: IOTLB access fail 170 171Virtio device config space 172^^^^^^^^^^^^^^^^^^^^^^^^^^ 173 174+--------+------+-------+---------+ 175| offset | size | flags | payload | 176+--------+------+-------+---------+ 177 178:offset: a 32-bit offset of virtio device's configuration space 179 180:size: a 32-bit configuration space access size in bytes 181 182:flags: a 32-bit value: 183 - 0: Vhost master messages used for writeable fields 184 - 1: Vhost master messages used for live migration 185 186:payload: Size bytes array holding the contents of the virtio 187 device's configuration space 188 189Vring area description 190^^^^^^^^^^^^^^^^^^^^^^ 191 192+-----+------+--------+ 193| u64 | size | offset | 194+-----+------+--------+ 195 196:u64: a 64-bit integer contains vring index and flags 197 198:size: a 64-bit size of this area 199 200:offset: a 64-bit offset of this area from the start of the 201 supplied file descriptor 202 203Inflight description 204^^^^^^^^^^^^^^^^^^^^ 205 206+-----------+-------------+------------+------------+ 207| mmap size | mmap offset | num queues | queue size | 208+-----------+-------------+------------+------------+ 209 210:mmap size: a 64-bit size of area to track inflight I/O 211 212:mmap offset: a 64-bit offset of this area from the start 213 of the supplied file descriptor 214 215:num queues: a 16-bit number of virtqueues 216 217:queue size: a 16-bit size of virtqueues 218 219C structure 220----------- 221 222In QEMU the vhost-user message is implemented with the following struct: 223 224.. code:: c 225 226 typedef struct VhostUserMsg { 227 VhostUserRequest request; 228 uint32_t flags; 229 uint32_t size; 230 union { 231 uint64_t u64; 232 struct vhost_vring_state state; 233 struct vhost_vring_addr addr; 234 VhostUserMemory memory; 235 VhostUserLog log; 236 struct vhost_iotlb_msg iotlb; 237 VhostUserConfig config; 238 VhostUserVringArea area; 239 VhostUserInflight inflight; 240 }; 241 } QEMU_PACKED VhostUserMsg; 242 243Communication 244============= 245 246The protocol for vhost-user is based on the existing implementation of 247vhost for the Linux Kernel. Most messages that can be sent via the 248Unix domain socket implementing vhost-user have an equivalent ioctl to 249the kernel implementation. 250 251The communication consists of *master* sending message requests and 252*slave* sending message replies. Most of the requests don't require 253replies. Here is a list of the ones that do: 254 255* ``VHOST_USER_GET_FEATURES`` 256* ``VHOST_USER_GET_PROTOCOL_FEATURES`` 257* ``VHOST_USER_GET_VRING_BASE`` 258* ``VHOST_USER_SET_LOG_BASE`` (if ``VHOST_USER_PROTOCOL_F_LOG_SHMFD``) 259* ``VHOST_USER_GET_INFLIGHT_FD`` (if ``VHOST_USER_PROTOCOL_F_INFLIGHT_SHMFD``) 260 261.. seealso:: 262 263 :ref:`REPLY_ACK <reply_ack>` 264 The section on ``REPLY_ACK`` protocol extension. 265 266There are several messages that the master sends with file descriptors passed 267in the ancillary data: 268 269* ``VHOST_USER_SET_MEM_TABLE`` 270* ``VHOST_USER_SET_LOG_BASE`` (if ``VHOST_USER_PROTOCOL_F_LOG_SHMFD``) 271* ``VHOST_USER_SET_LOG_FD`` 272* ``VHOST_USER_SET_VRING_KICK`` 273* ``VHOST_USER_SET_VRING_CALL`` 274* ``VHOST_USER_SET_VRING_ERR`` 275* ``VHOST_USER_SET_SLAVE_REQ_FD`` 276* ``VHOST_USER_SET_INFLIGHT_FD`` (if ``VHOST_USER_PROTOCOL_F_INFLIGHT_SHMFD``) 277 278If *master* is unable to send the full message or receives a wrong 279reply it will close the connection. An optional reconnection mechanism 280can be implemented. 281 282Any protocol extensions are gated by protocol feature bits, which 283allows full backwards compatibility on both master and slave. As 284older slaves don't support negotiating protocol features, a feature 285bit was dedicated for this purpose:: 286 287 #define VHOST_USER_F_PROTOCOL_FEATURES 30 288 289Starting and stopping rings 290--------------------------- 291 292Client must only process each ring when it is started. 293 294Client must only pass data between the ring and the backend, when the 295ring is enabled. 296 297If ring is started but disabled, client must process the ring without 298talking to the backend. 299 300For example, for a networking device, in the disabled state client 301must not supply any new RX packets, but must process and discard any 302TX packets. 303 304If ``VHOST_USER_F_PROTOCOL_FEATURES`` has not been negotiated, the 305ring is initialized in an enabled state. 306 307If ``VHOST_USER_F_PROTOCOL_FEATURES`` has been negotiated, the ring is 308initialized in a disabled state. Client must not pass data to/from the 309backend until ring is enabled by ``VHOST_USER_SET_VRING_ENABLE`` with 310parameter 1, or after it has been disabled by 311``VHOST_USER_SET_VRING_ENABLE`` with parameter 0. 312 313Each ring is initialized in a stopped state, client must not process 314it until ring is started, or after it has been stopped. 315 316Client must start ring upon receiving a kick (that is, detecting that 317file descriptor is readable) on the descriptor specified by 318``VHOST_USER_SET_VRING_KICK``, and stop ring upon receiving 319``VHOST_USER_GET_VRING_BASE``. 320 321While processing the rings (whether they are enabled or not), client 322must support changing some configuration aspects on the fly. 323 324Multiple queue support 325---------------------- 326 327Multiple queue is treated as a protocol extension, hence the slave has 328to implement protocol features first. The multiple queues feature is 329supported only when the protocol feature ``VHOST_USER_PROTOCOL_F_MQ`` 330(bit 0) is set. 331 332The max number of queue pairs the slave supports can be queried with 333message ``VHOST_USER_GET_QUEUE_NUM``. Master should stop when the 334number of requested queues is bigger than that. 335 336As all queues share one connection, the master uses a unique index for each 337queue in the sent message to identify a specified queue. One queue pair 338is enabled initially. More queues are enabled dynamically, by sending 339message ``VHOST_USER_SET_VRING_ENABLE``. 340 341Migration 342--------- 343 344During live migration, the master may need to track the modifications 345the slave makes to the memory mapped regions. The client should mark 346the dirty pages in a log. Once it complies to this logging, it may 347declare the ``VHOST_F_LOG_ALL`` vhost feature. 348 349To start/stop logging of data/used ring writes, server may send 350messages ``VHOST_USER_SET_FEATURES`` with ``VHOST_F_LOG_ALL`` and 351``VHOST_USER_SET_VRING_ADDR`` with ``VHOST_VRING_F_LOG`` in ring's 352flags set to 1/0, respectively. 353 354All the modifications to memory pointed by vring "descriptor" should 355be marked. Modifications to "used" vring should be marked if 356``VHOST_VRING_F_LOG`` is part of ring's flags. 357 358Dirty pages are of size:: 359 360 #define VHOST_LOG_PAGE 0x1000 361 362The log memory fd is provided in the ancillary data of 363``VHOST_USER_SET_LOG_BASE`` message when the slave has 364``VHOST_USER_PROTOCOL_F_LOG_SHMFD`` protocol feature. 365 366The size of the log is supplied as part of ``VhostUserMsg`` which 367should be large enough to cover all known guest addresses. Log starts 368at the supplied offset in the supplied file descriptor. The log 369covers from address 0 to the maximum of guest regions. In pseudo-code, 370to mark page at ``addr`` as dirty:: 371 372 page = addr / VHOST_LOG_PAGE 373 log[page / 8] |= 1 << page % 8 374 375Where ``addr`` is the guest physical address. 376 377Use atomic operations, as the log may be concurrently manipulated. 378 379Note that when logging modifications to the used ring (when 380``VHOST_VRING_F_LOG`` is set for this ring), ``log_guest_addr`` should 381be used to calculate the log offset: the write to first byte of the 382used ring is logged at this offset from log start. Also note that this 383value might be outside the legal guest physical address range 384(i.e. does not have to be covered by the ``VhostUserMemory`` table), but 385the bit offset of the last byte of the ring must fall within the size 386supplied by ``VhostUserLog``. 387 388``VHOST_USER_SET_LOG_FD`` is an optional message with an eventfd in 389ancillary data, it may be used to inform the master that the log has 390been modified. 391 392Once the source has finished migration, rings will be stopped by the 393source. No further update must be done before rings are restarted. 394 395In postcopy migration the slave is started before all the memory has 396been received from the source host, and care must be taken to avoid 397accessing pages that have yet to be received. The slave opens a 398'userfault'-fd and registers the memory with it; this fd is then 399passed back over to the master. The master services requests on the 400userfaultfd for pages that are accessed and when the page is available 401it performs WAKE ioctl's on the userfaultfd to wake the stalled 402slave. The client indicates support for this via the 403``VHOST_USER_PROTOCOL_F_PAGEFAULT`` feature. 404 405Memory access 406------------- 407 408The master sends a list of vhost memory regions to the slave using the 409``VHOST_USER_SET_MEM_TABLE`` message. Each region has two base 410addresses: a guest address and a user address. 411 412Messages contain guest addresses and/or user addresses to reference locations 413within the shared memory. The mapping of these addresses works as follows. 414 415User addresses map to the vhost memory region containing that user address. 416 417When the ``VIRTIO_F_IOMMU_PLATFORM`` feature has not been negotiated: 418 419* Guest addresses map to the vhost memory region containing that guest 420 address. 421 422When the ``VIRTIO_F_IOMMU_PLATFORM`` feature has been negotiated: 423 424* Guest addresses are also called I/O virtual addresses (IOVAs). They are 425 translated to user addresses via the IOTLB. 426 427* The vhost memory region guest address is not used. 428 429IOMMU support 430------------- 431 432When the ``VIRTIO_F_IOMMU_PLATFORM`` feature has been negotiated, the 433master sends IOTLB entries update & invalidation by sending 434``VHOST_USER_IOTLB_MSG`` requests to the slave with a ``struct 435vhost_iotlb_msg`` as payload. For update events, the ``iotlb`` payload 436has to be filled with the update message type (2), the I/O virtual 437address, the size, the user virtual address, and the permissions 438flags. Addresses and size must be within vhost memory regions set via 439the ``VHOST_USER_SET_MEM_TABLE`` request. For invalidation events, the 440``iotlb`` payload has to be filled with the invalidation message type 441(3), the I/O virtual address and the size. On success, the slave is 442expected to reply with a zero payload, non-zero otherwise. 443 444The slave relies on the slave communcation channel (see :ref:`Slave 445communication <slave_communication>` section below) to send IOTLB miss 446and access failure events, by sending ``VHOST_USER_SLAVE_IOTLB_MSG`` 447requests to the master with a ``struct vhost_iotlb_msg`` as 448payload. For miss events, the iotlb payload has to be filled with the 449miss message type (1), the I/O virtual address and the permissions 450flags. For access failure event, the iotlb payload has to be filled 451with the access failure message type (4), the I/O virtual address and 452the permissions flags. For synchronization purpose, the slave may 453rely on the reply-ack feature, so the master may send a reply when 454operation is completed if the reply-ack feature is negotiated and 455slaves requests a reply. For miss events, completed operation means 456either master sent an update message containing the IOTLB entry 457containing requested address and permission, or master sent nothing if 458the IOTLB miss message is invalid (invalid IOVA or permission). 459 460The master isn't expected to take the initiative to send IOTLB update 461messages, as the slave sends IOTLB miss messages for the guest virtual 462memory areas it needs to access. 463 464.. _slave_communication: 465 466Slave communication 467------------------- 468 469An optional communication channel is provided if the slave declares 470``VHOST_USER_PROTOCOL_F_SLAVE_REQ`` protocol feature, to allow the 471slave to make requests to the master. 472 473The fd is provided via ``VHOST_USER_SET_SLAVE_REQ_FD`` ancillary data. 474 475A slave may then send ``VHOST_USER_SLAVE_*`` messages to the master 476using this fd communication channel. 477 478If ``VHOST_USER_PROTOCOL_F_SLAVE_SEND_FD`` protocol feature is 479negotiated, slave can send file descriptors (at most 8 descriptors in 480each message) to master via ancillary data using this fd communication 481channel. 482 483Inflight I/O tracking 484--------------------- 485 486To support reconnecting after restart or crash, slave may need to 487resubmit inflight I/Os. If virtqueue is processed in order, we can 488easily achieve that by getting the inflight descriptors from 489descriptor table (split virtqueue) or descriptor ring (packed 490virtqueue). However, it can't work when we process descriptors 491out-of-order because some entries which store the information of 492inflight descriptors in available ring (split virtqueue) or descriptor 493ring (packed virtqueue) might be overrided by new entries. To solve 494this problem, slave need to allocate an extra buffer to store this 495information of inflight descriptors and share it with master for 496persistent. ``VHOST_USER_GET_INFLIGHT_FD`` and 497``VHOST_USER_SET_INFLIGHT_FD`` are used to transfer this buffer 498between master and slave. And the format of this buffer is described 499below: 500 501+---------------+---------------+-----+---------------+ 502| queue0 region | queue1 region | ... | queueN region | 503+---------------+---------------+-----+---------------+ 504 505N is the number of available virtqueues. Slave could get it from num 506queues field of ``VhostUserInflight``. 507 508For split virtqueue, queue region can be implemented as: 509 510.. code:: c 511 512 typedef struct DescStateSplit { 513 /* Indicate whether this descriptor is inflight or not. 514 * Only available for head-descriptor. */ 515 uint8_t inflight; 516 517 /* Padding */ 518 uint8_t padding[5]; 519 520 /* Maintain a list for the last batch of used descriptors. 521 * Only available when batching is used for submitting */ 522 uint16_t next; 523 524 /* Used to preserve the order of fetching available descriptors. 525 * Only available for head-descriptor. */ 526 uint64_t counter; 527 } DescStateSplit; 528 529 typedef struct QueueRegionSplit { 530 /* The feature flags of this region. Now it's initialized to 0. */ 531 uint64_t features; 532 533 /* The version of this region. It's 1 currently. 534 * Zero value indicates an uninitialized buffer */ 535 uint16_t version; 536 537 /* The size of DescStateSplit array. It's equal to the virtqueue 538 * size. Slave could get it from queue size field of VhostUserInflight. */ 539 uint16_t desc_num; 540 541 /* The head of list that track the last batch of used descriptors. */ 542 uint16_t last_batch_head; 543 544 /* Store the idx value of used ring */ 545 uint16_t used_idx; 546 547 /* Used to track the state of each descriptor in descriptor table */ 548 DescStateSplit desc[0]; 549 } QueueRegionSplit; 550 551To track inflight I/O, the queue region should be processed as follows: 552 553When receiving available buffers from the driver: 554 555#. Get the next available head-descriptor index from available ring, ``i`` 556 557#. Set ``desc[i].counter`` to the value of global counter 558 559#. Increase global counter by 1 560 561#. Set ``desc[i].inflight`` to 1 562 563When supplying used buffers to the driver: 564 5651. Get corresponding used head-descriptor index, i 566 5672. Set ``desc[i].next`` to ``last_batch_head`` 568 5693. Set ``last_batch_head`` to ``i`` 570 571#. Steps 1,2,3 may be performed repeatedly if batching is possible 572 573#. Increase the ``idx`` value of used ring by the size of the batch 574 575#. Set the ``inflight`` field of each ``DescStateSplit`` entry in the batch to 0 576 577#. Set ``used_idx`` to the ``idx`` value of used ring 578 579When reconnecting: 580 581#. If the value of ``used_idx`` does not match the ``idx`` value of 582 used ring (means the inflight field of ``DescStateSplit`` entries in 583 last batch may be incorrect), 584 585 a. Subtract the value of ``used_idx`` from the ``idx`` value of 586 used ring to get last batch size of ``DescStateSplit`` entries 587 588 #. Set the ``inflight`` field of each ``DescStateSplit`` entry to 0 in last batch 589 list which starts from ``last_batch_head`` 590 591 #. Set ``used_idx`` to the ``idx`` value of used ring 592 593#. Resubmit inflight ``DescStateSplit`` entries in order of their 594 counter value 595 596For packed virtqueue, queue region can be implemented as: 597 598.. code:: c 599 600 typedef struct DescStatePacked { 601 /* Indicate whether this descriptor is inflight or not. 602 * Only available for head-descriptor. */ 603 uint8_t inflight; 604 605 /* Padding */ 606 uint8_t padding; 607 608 /* Link to the next free entry */ 609 uint16_t next; 610 611 /* Link to the last entry of descriptor list. 612 * Only available for head-descriptor. */ 613 uint16_t last; 614 615 /* The length of descriptor list. 616 * Only available for head-descriptor. */ 617 uint16_t num; 618 619 /* Used to preserve the order of fetching available descriptors. 620 * Only available for head-descriptor. */ 621 uint64_t counter; 622 623 /* The buffer id */ 624 uint16_t id; 625 626 /* The descriptor flags */ 627 uint16_t flags; 628 629 /* The buffer length */ 630 uint32_t len; 631 632 /* The buffer address */ 633 uint64_t addr; 634 } DescStatePacked; 635 636 typedef struct QueueRegionPacked { 637 /* The feature flags of this region. Now it's initialized to 0. */ 638 uint64_t features; 639 640 /* The version of this region. It's 1 currently. 641 * Zero value indicates an uninitialized buffer */ 642 uint16_t version; 643 644 /* The size of DescStatePacked array. It's equal to the virtqueue 645 * size. Slave could get it from queue size field of VhostUserInflight. */ 646 uint16_t desc_num; 647 648 /* The head of free DescStatePacked entry list */ 649 uint16_t free_head; 650 651 /* The old head of free DescStatePacked entry list */ 652 uint16_t old_free_head; 653 654 /* The used index of descriptor ring */ 655 uint16_t used_idx; 656 657 /* The old used index of descriptor ring */ 658 uint16_t old_used_idx; 659 660 /* Device ring wrap counter */ 661 uint8_t used_wrap_counter; 662 663 /* The old device ring wrap counter */ 664 uint8_t old_used_wrap_counter; 665 666 /* Padding */ 667 uint8_t padding[7]; 668 669 /* Used to track the state of each descriptor fetched from descriptor ring */ 670 DescStatePacked desc[0]; 671 } QueueRegionPacked; 672 673To track inflight I/O, the queue region should be processed as follows: 674 675When receiving available buffers from the driver: 676 677#. Get the next available descriptor entry from descriptor ring, ``d`` 678 679#. If ``d`` is head descriptor, 680 681 a. Set ``desc[old_free_head].num`` to 0 682 683 #. Set ``desc[old_free_head].counter`` to the value of global counter 684 685 #. Increase global counter by 1 686 687 #. Set ``desc[old_free_head].inflight`` to 1 688 689#. If ``d`` is last descriptor, set ``desc[old_free_head].last`` to 690 ``free_head`` 691 692#. Increase ``desc[old_free_head].num`` by 1 693 694#. Set ``desc[free_head].addr``, ``desc[free_head].len``, 695 ``desc[free_head].flags``, ``desc[free_head].id`` to ``d.addr``, 696 ``d.len``, ``d.flags``, ``d.id`` 697 698#. Set ``free_head`` to ``desc[free_head].next`` 699 700#. If ``d`` is last descriptor, set ``old_free_head`` to ``free_head`` 701 702When supplying used buffers to the driver: 703 7041. Get corresponding used head-descriptor entry from descriptor ring, 705 ``d`` 706 7072. Get corresponding ``DescStatePacked`` entry, ``e`` 708 7093. Set ``desc[e.last].next`` to ``free_head`` 710 7114. Set ``free_head`` to the index of ``e`` 712 713#. Steps 1,2,3,4 may be performed repeatedly if batching is possible 714 715#. Increase ``used_idx`` by the size of the batch and update 716 ``used_wrap_counter`` if needed 717 718#. Update ``d.flags`` 719 720#. Set the ``inflight`` field of each head ``DescStatePacked`` entry 721 in the batch to 0 722 723#. Set ``old_free_head``, ``old_used_idx``, ``old_used_wrap_counter`` 724 to ``free_head``, ``used_idx``, ``used_wrap_counter`` 725 726When reconnecting: 727 728#. If ``used_idx`` does not match ``old_used_idx`` (means the 729 ``inflight`` field of ``DescStatePacked`` entries in last batch may 730 be incorrect), 731 732 a. Get the next descriptor ring entry through ``old_used_idx``, ``d`` 733 734 #. Use ``old_used_wrap_counter`` to calculate the available flags 735 736 #. If ``d.flags`` is not equal to the calculated flags value (means 737 slave has submitted the buffer to guest driver before crash, so 738 it has to commit the in-progres update), set ``old_free_head``, 739 ``old_used_idx``, ``old_used_wrap_counter`` to ``free_head``, 740 ``used_idx``, ``used_wrap_counter`` 741 742#. Set ``free_head``, ``used_idx``, ``used_wrap_counter`` to 743 ``old_free_head``, ``old_used_idx``, ``old_used_wrap_counter`` 744 (roll back any in-progress update) 745 746#. Set the ``inflight`` field of each ``DescStatePacked`` entry in 747 free list to 0 748 749#. Resubmit inflight ``DescStatePacked`` entries in order of their 750 counter value 751 752Protocol features 753----------------- 754 755.. code:: c 756 757 #define VHOST_USER_PROTOCOL_F_MQ 0 758 #define VHOST_USER_PROTOCOL_F_LOG_SHMFD 1 759 #define VHOST_USER_PROTOCOL_F_RARP 2 760 #define VHOST_USER_PROTOCOL_F_REPLY_ACK 3 761 #define VHOST_USER_PROTOCOL_F_MTU 4 762 #define VHOST_USER_PROTOCOL_F_SLAVE_REQ 5 763 #define VHOST_USER_PROTOCOL_F_CROSS_ENDIAN 6 764 #define VHOST_USER_PROTOCOL_F_CRYPTO_SESSION 7 765 #define VHOST_USER_PROTOCOL_F_PAGEFAULT 8 766 #define VHOST_USER_PROTOCOL_F_CONFIG 9 767 #define VHOST_USER_PROTOCOL_F_SLAVE_SEND_FD 10 768 #define VHOST_USER_PROTOCOL_F_HOST_NOTIFIER 11 769 #define VHOST_USER_PROTOCOL_F_INFLIGHT_SHMFD 12 770 771Master message types 772-------------------- 773 774``VHOST_USER_GET_FEATURES`` 775 :id: 1 776 :equivalent ioctl: ``VHOST_GET_FEATURES`` 777 :master payload: N/A 778 :slave payload: ``u64`` 779 780 Get from the underlying vhost implementation the features bitmask. 781 Feature bit ``VHOST_USER_F_PROTOCOL_FEATURES`` signals slave support 782 for ``VHOST_USER_GET_PROTOCOL_FEATURES`` and 783 ``VHOST_USER_SET_PROTOCOL_FEATURES``. 784 785``VHOST_USER_SET_FEATURES`` 786 :id: 2 787 :equivalent ioctl: ``VHOST_SET_FEATURES`` 788 :master payload: ``u64`` 789 790 Enable features in the underlying vhost implementation using a 791 bitmask. Feature bit ``VHOST_USER_F_PROTOCOL_FEATURES`` signals 792 slave support for ``VHOST_USER_GET_PROTOCOL_FEATURES`` and 793 ``VHOST_USER_SET_PROTOCOL_FEATURES``. 794 795``VHOST_USER_GET_PROTOCOL_FEATURES`` 796 :id: 15 797 :equivalent ioctl: ``VHOST_GET_FEATURES`` 798 :master payload: N/A 799 :slave payload: ``u64`` 800 801 Get the protocol feature bitmask from the underlying vhost 802 implementation. Only legal if feature bit 803 ``VHOST_USER_F_PROTOCOL_FEATURES`` is present in 804 ``VHOST_USER_GET_FEATURES``. 805 806.. Note:: 807 Slave that reported ``VHOST_USER_F_PROTOCOL_FEATURES`` must 808 support this message even before ``VHOST_USER_SET_FEATURES`` was 809 called. 810 811``VHOST_USER_SET_PROTOCOL_FEATURES`` 812 :id: 16 813 :equivalent ioctl: ``VHOST_SET_FEATURES`` 814 :master payload: ``u64`` 815 816 Enable protocol features in the underlying vhost implementation. 817 818 Only legal if feature bit ``VHOST_USER_F_PROTOCOL_FEATURES`` is present in 819 ``VHOST_USER_GET_FEATURES``. 820 821.. Note:: 822 Slave that reported ``VHOST_USER_F_PROTOCOL_FEATURES`` must support 823 this message even before ``VHOST_USER_SET_FEATURES`` was called. 824 825``VHOST_USER_SET_OWNER`` 826 :id: 3 827 :equivalent ioctl: ``VHOST_SET_OWNER`` 828 :master payload: N/A 829 830 Issued when a new connection is established. It sets the current 831 *master* as an owner of the session. This can be used on the *slave* 832 as a "session start" flag. 833 834``VHOST_USER_RESET_OWNER`` 835 :id: 4 836 :master payload: N/A 837 838.. admonition:: Deprecated 839 840 This is no longer used. Used to be sent to request disabling all 841 rings, but some clients interpreted it to also discard connection 842 state (this interpretation would lead to bugs). It is recommended 843 that clients either ignore this message, or use it to disable all 844 rings. 845 846``VHOST_USER_SET_MEM_TABLE`` 847 :id: 5 848 :equivalent ioctl: ``VHOST_SET_MEM_TABLE`` 849 :master payload: memory regions description 850 :slave payload: (postcopy only) memory regions description 851 852 Sets the memory map regions on the slave so it can translate the 853 vring addresses. In the ancillary data there is an array of file 854 descriptors for each memory mapped region. The size and ordering of 855 the fds matches the number and ordering of memory regions. 856 857 When ``VHOST_USER_POSTCOPY_LISTEN`` has been received, 858 ``SET_MEM_TABLE`` replies with the bases of the memory mapped 859 regions to the master. The slave must have mmap'd the regions but 860 not yet accessed them and should not yet generate a userfault 861 event. 862 863.. Note:: 864 ``NEED_REPLY_MASK`` is not set in this case. QEMU will then 865 reply back to the list of mappings with an empty 866 ``VHOST_USER_SET_MEM_TABLE`` as an acknowledgement; only upon 867 reception of this message may the guest start accessing the memory 868 and generating faults. 869 870``VHOST_USER_SET_LOG_BASE`` 871 :id: 6 872 :equivalent ioctl: ``VHOST_SET_LOG_BASE`` 873 :master payload: u64 874 :slave payload: N/A 875 876 Sets logging shared memory space. 877 878 When slave has ``VHOST_USER_PROTOCOL_F_LOG_SHMFD`` protocol feature, 879 the log memory fd is provided in the ancillary data of 880 ``VHOST_USER_SET_LOG_BASE`` message, the size and offset of shared 881 memory area provided in the message. 882 883``VHOST_USER_SET_LOG_FD`` 884 :id: 7 885 :equivalent ioctl: ``VHOST_SET_LOG_FD`` 886 :master payload: N/A 887 888 Sets the logging file descriptor, which is passed as ancillary data. 889 890``VHOST_USER_SET_VRING_NUM`` 891 :id: 8 892 :equivalent ioctl: ``VHOST_SET_VRING_NUM`` 893 :master payload: vring state description 894 895 Set the size of the queue. 896 897``VHOST_USER_SET_VRING_ADDR`` 898 :id: 9 899 :equivalent ioctl: ``VHOST_SET_VRING_ADDR`` 900 :master payload: vring address description 901 :slave payload: N/A 902 903 Sets the addresses of the different aspects of the vring. 904 905``VHOST_USER_SET_VRING_BASE`` 906 :id: 10 907 :equivalent ioctl: ``VHOST_SET_VRING_BASE`` 908 :master payload: vring state description 909 910 Sets the base offset in the available vring. 911 912``VHOST_USER_GET_VRING_BASE`` 913 :id: 11 914 :equivalent ioctl: ``VHOST_USER_GET_VRING_BASE`` 915 :master payload: vring state description 916 :slave payload: vring state description 917 918 Get the available vring base offset. 919 920``VHOST_USER_SET_VRING_KICK`` 921 :id: 12 922 :equivalent ioctl: ``VHOST_SET_VRING_KICK`` 923 :master payload: ``u64`` 924 925 Set the event file descriptor for adding buffers to the vring. It is 926 passed in the ancillary data. 927 928 Bits (0-7) of the payload contain the vring index. Bit 8 is the 929 invalid FD flag. This flag is set when there is no file descriptor 930 in the ancillary data. This signals that polling should be used 931 instead of waiting for a kick. 932 933``VHOST_USER_SET_VRING_CALL`` 934 :id: 13 935 :equivalent ioctl: ``VHOST_SET_VRING_CALL`` 936 :master payload: ``u64`` 937 938 Set the event file descriptor to signal when buffers are used. It is 939 passed in the ancillary data. 940 941 Bits (0-7) of the payload contain the vring index. Bit 8 is the 942 invalid FD flag. This flag is set when there is no file descriptor 943 in the ancillary data. This signals that polling will be used 944 instead of waiting for the call. 945 946``VHOST_USER_SET_VRING_ERR`` 947 :id: 14 948 :equivalent ioctl: ``VHOST_SET_VRING_ERR`` 949 :master payload: ``u64`` 950 951 Set the event file descriptor to signal when error occurs. It is 952 passed in the ancillary data. 953 954 Bits (0-7) of the payload contain the vring index. Bit 8 is the 955 invalid FD flag. This flag is set when there is no file descriptor 956 in the ancillary data. 957 958``VHOST_USER_GET_QUEUE_NUM`` 959 :id: 17 960 :equivalent ioctl: N/A 961 :master payload: N/A 962 :slave payload: u64 963 964 Query how many queues the backend supports. 965 966 This request should be sent only when ``VHOST_USER_PROTOCOL_F_MQ`` 967 is set in queried protocol features by 968 ``VHOST_USER_GET_PROTOCOL_FEATURES``. 969 970``VHOST_USER_SET_VRING_ENABLE`` 971 :id: 18 972 :equivalent ioctl: N/A 973 :master payload: vring state description 974 975 Signal slave to enable or disable corresponding vring. 976 977 This request should be sent only when 978 ``VHOST_USER_F_PROTOCOL_FEATURES`` has been negotiated. 979 980``VHOST_USER_SEND_RARP`` 981 :id: 19 982 :equivalent ioctl: N/A 983 :master payload: ``u64`` 984 985 Ask vhost user backend to broadcast a fake RARP to notify the migration 986 is terminated for guest that does not support GUEST_ANNOUNCE. 987 988 Only legal if feature bit ``VHOST_USER_F_PROTOCOL_FEATURES`` is 989 present in ``VHOST_USER_GET_FEATURES`` and protocol feature bit 990 ``VHOST_USER_PROTOCOL_F_RARP`` is present in 991 ``VHOST_USER_GET_PROTOCOL_FEATURES``. The first 6 bytes of the 992 payload contain the mac address of the guest to allow the vhost user 993 backend to construct and broadcast the fake RARP. 994 995``VHOST_USER_NET_SET_MTU`` 996 :id: 20 997 :equivalent ioctl: N/A 998 :master payload: ``u64`` 999 1000 Set host MTU value exposed to the guest. 1001 1002 This request should be sent only when ``VIRTIO_NET_F_MTU`` feature 1003 has been successfully negotiated, ``VHOST_USER_F_PROTOCOL_FEATURES`` 1004 is present in ``VHOST_USER_GET_FEATURES`` and protocol feature bit 1005 ``VHOST_USER_PROTOCOL_F_NET_MTU`` is present in 1006 ``VHOST_USER_GET_PROTOCOL_FEATURES``. 1007 1008 If ``VHOST_USER_PROTOCOL_F_REPLY_ACK`` is negotiated, slave must 1009 respond with zero in case the specified MTU is valid, or non-zero 1010 otherwise. 1011 1012``VHOST_USER_SET_SLAVE_REQ_FD`` 1013 :id: 21 1014 :equivalent ioctl: N/A 1015 :master payload: N/A 1016 1017 Set the socket file descriptor for slave initiated requests. It is passed 1018 in the ancillary data. 1019 1020 This request should be sent only when 1021 ``VHOST_USER_F_PROTOCOL_FEATURES`` has been negotiated, and protocol 1022 feature bit ``VHOST_USER_PROTOCOL_F_SLAVE_REQ`` bit is present in 1023 ``VHOST_USER_GET_PROTOCOL_FEATURES``. If 1024 ``VHOST_USER_PROTOCOL_F_REPLY_ACK`` is negotiated, slave must 1025 respond with zero for success, non-zero otherwise. 1026 1027``VHOST_USER_IOTLB_MSG`` 1028 :id: 22 1029 :equivalent ioctl: N/A (equivalent to ``VHOST_IOTLB_MSG`` message type) 1030 :master payload: ``struct vhost_iotlb_msg`` 1031 :slave payload: ``u64`` 1032 1033 Send IOTLB messages with ``struct vhost_iotlb_msg`` as payload. 1034 1035 Master sends such requests to update and invalidate entries in the 1036 device IOTLB. The slave has to acknowledge the request with sending 1037 zero as ``u64`` payload for success, non-zero otherwise. 1038 1039 This request should be send only when ``VIRTIO_F_IOMMU_PLATFORM`` 1040 feature has been successfully negotiated. 1041 1042``VHOST_USER_SET_VRING_ENDIAN`` 1043 :id: 23 1044 :equivalent ioctl: ``VHOST_SET_VRING_ENDIAN`` 1045 :master payload: vring state description 1046 1047 Set the endianness of a VQ for legacy devices. Little-endian is 1048 indicated with state.num set to 0 and big-endian is indicated with 1049 state.num set to 1. Other values are invalid. 1050 1051 This request should be sent only when 1052 ``VHOST_USER_PROTOCOL_F_CROSS_ENDIAN`` has been negotiated. 1053 Backends that negotiated this feature should handle both 1054 endiannesses and expect this message once (per VQ) during device 1055 configuration (ie. before the master starts the VQ). 1056 1057``VHOST_USER_GET_CONFIG`` 1058 :id: 24 1059 :equivalent ioctl: N/A 1060 :master payload: virtio device config space 1061 :slave payload: virtio device config space 1062 1063 When ``VHOST_USER_PROTOCOL_F_CONFIG`` is negotiated, this message is 1064 submitted by the vhost-user master to fetch the contents of the 1065 virtio device configuration space, vhost-user slave's payload size 1066 MUST match master's request, vhost-user slave uses zero length of 1067 payload to indicate an error to vhost-user master. The vhost-user 1068 master may cache the contents to avoid repeated 1069 ``VHOST_USER_GET_CONFIG`` calls. 1070 1071``VHOST_USER_SET_CONFIG`` 1072 :id: 25 1073 :equivalent ioctl: N/A 1074 :master payload: virtio device config space 1075 :slave payload: N/A 1076 1077 When ``VHOST_USER_PROTOCOL_F_CONFIG`` is negotiated, this message is 1078 submitted by the vhost-user master when the Guest changes the virtio 1079 device configuration space and also can be used for live migration 1080 on the destination host. The vhost-user slave must check the flags 1081 field, and slaves MUST NOT accept SET_CONFIG for read-only 1082 configuration space fields unless the live migration bit is set. 1083 1084``VHOST_USER_CREATE_CRYPTO_SESSION`` 1085 :id: 26 1086 :equivalent ioctl: N/A 1087 :master payload: crypto session description 1088 :slave payload: crypto session description 1089 1090 Create a session for crypto operation. The server side must return 1091 the session id, 0 or positive for success, negative for failure. 1092 This request should be sent only when 1093 ``VHOST_USER_PROTOCOL_F_CRYPTO_SESSION`` feature has been 1094 successfully negotiated. It's a required feature for crypto 1095 devices. 1096 1097``VHOST_USER_CLOSE_CRYPTO_SESSION`` 1098 :id: 27 1099 :equivalent ioctl: N/A 1100 :master payload: ``u64`` 1101 1102 Close a session for crypto operation which was previously 1103 created by ``VHOST_USER_CREATE_CRYPTO_SESSION``. 1104 1105 This request should be sent only when 1106 ``VHOST_USER_PROTOCOL_F_CRYPTO_SESSION`` feature has been 1107 successfully negotiated. It's a required feature for crypto 1108 devices. 1109 1110``VHOST_USER_POSTCOPY_ADVISE`` 1111 :id: 28 1112 :master payload: N/A 1113 :slave payload: userfault fd 1114 1115 When ``VHOST_USER_PROTOCOL_F_PAGEFAULT`` is supported, the master 1116 advises slave that a migration with postcopy enabled is underway, 1117 the slave must open a userfaultfd for later use. Note that at this 1118 stage the migration is still in precopy mode. 1119 1120``VHOST_USER_POSTCOPY_LISTEN`` 1121 :id: 29 1122 :master payload: N/A 1123 1124 Master advises slave that a transition to postcopy mode has 1125 happened. The slave must ensure that shared memory is registered 1126 with userfaultfd to cause faulting of non-present pages. 1127 1128 This is always sent sometime after a ``VHOST_USER_POSTCOPY_ADVISE``, 1129 and thus only when ``VHOST_USER_PROTOCOL_F_PAGEFAULT`` is supported. 1130 1131``VHOST_USER_POSTCOPY_END`` 1132 :id: 30 1133 :slave payload: ``u64`` 1134 1135 Master advises that postcopy migration has now completed. The slave 1136 must disable the userfaultfd. The response is an acknowledgement 1137 only. 1138 1139 When ``VHOST_USER_PROTOCOL_F_PAGEFAULT`` is supported, this message 1140 is sent at the end of the migration, after 1141 ``VHOST_USER_POSTCOPY_LISTEN`` was previously sent. 1142 1143 The value returned is an error indication; 0 is success. 1144 1145``VHOST_USER_GET_INFLIGHT_FD`` 1146 :id: 31 1147 :equivalent ioctl: N/A 1148 :master payload: inflight description 1149 1150 When ``VHOST_USER_PROTOCOL_F_INFLIGHT_SHMFD`` protocol feature has 1151 been successfully negotiated, this message is submitted by master to 1152 get a shared buffer from slave. The shared buffer will be used to 1153 track inflight I/O by slave. QEMU should retrieve a new one when vm 1154 reset. 1155 1156``VHOST_USER_SET_INFLIGHT_FD`` 1157 :id: 32 1158 :equivalent ioctl: N/A 1159 :master payload: inflight description 1160 1161 When ``VHOST_USER_PROTOCOL_F_INFLIGHT_SHMFD`` protocol feature has 1162 been successfully negotiated, this message is submitted by master to 1163 send the shared inflight buffer back to slave so that slave could 1164 get inflight I/O after a crash or restart. 1165 1166Slave message types 1167------------------- 1168 1169``VHOST_USER_SLAVE_IOTLB_MSG`` 1170 :id: 1 1171 :equivalent ioctl: N/A (equivalent to ``VHOST_IOTLB_MSG`` message type) 1172 :slave payload: ``struct vhost_iotlb_msg`` 1173 :master payload: N/A 1174 1175 Send IOTLB messages with ``struct vhost_iotlb_msg`` as payload. 1176 Slave sends such requests to notify of an IOTLB miss, or an IOTLB 1177 access failure. If ``VHOST_USER_PROTOCOL_F_REPLY_ACK`` is 1178 negotiated, and slave set the ``VHOST_USER_NEED_REPLY`` flag, master 1179 must respond with zero when operation is successfully completed, or 1180 non-zero otherwise. This request should be send only when 1181 ``VIRTIO_F_IOMMU_PLATFORM`` feature has been successfully 1182 negotiated. 1183 1184``VHOST_USER_SLAVE_CONFIG_CHANGE_MSG`` 1185 :id: 2 1186 :equivalent ioctl: N/A 1187 :slave payload: N/A 1188 :master payload: N/A 1189 1190 When ``VHOST_USER_PROTOCOL_F_CONFIG`` is negotiated, vhost-user 1191 slave sends such messages to notify that the virtio device's 1192 configuration space has changed, for those host devices which can 1193 support such feature, host driver can send ``VHOST_USER_GET_CONFIG`` 1194 message to slave to get the latest content. If 1195 ``VHOST_USER_PROTOCOL_F_REPLY_ACK`` is negotiated, and slave set the 1196 ``VHOST_USER_NEED_REPLY`` flag, master must respond with zero when 1197 operation is successfully completed, or non-zero otherwise. 1198 1199``VHOST_USER_SLAVE_VRING_HOST_NOTIFIER_MSG`` 1200 :id: 3 1201 :equivalent ioctl: N/A 1202 :slave payload: vring area description 1203 :master payload: N/A 1204 1205 Sets host notifier for a specified queue. The queue index is 1206 contained in the ``u64`` field of the vring area description. The 1207 host notifier is described by the file descriptor (typically it's a 1208 VFIO device fd) which is passed as ancillary data and the size 1209 (which is mmap size and should be the same as host page size) and 1210 offset (which is mmap offset) carried in the vring area 1211 description. QEMU can mmap the file descriptor based on the size and 1212 offset to get a memory range. Registering a host notifier means 1213 mapping this memory range to the VM as the specified queue's notify 1214 MMIO region. Slave sends this request to tell QEMU to de-register 1215 the existing notifier if any and register the new notifier if the 1216 request is sent with a file descriptor. 1217 1218 This request should be sent only when 1219 ``VHOST_USER_PROTOCOL_F_HOST_NOTIFIER`` protocol feature has been 1220 successfully negotiated. 1221 1222.. _reply_ack: 1223 1224VHOST_USER_PROTOCOL_F_REPLY_ACK 1225------------------------------- 1226 1227The original vhost-user specification only demands replies for certain 1228commands. This differs from the vhost protocol implementation where 1229commands are sent over an ``ioctl()`` call and block until the client 1230has completed. 1231 1232With this protocol extension negotiated, the sender (QEMU) can set the 1233``need_reply`` [Bit 3] flag to any command. This indicates that the 1234client MUST respond with a Payload ``VhostUserMsg`` indicating success 1235or failure. The payload should be set to zero on success or non-zero 1236on failure, unless the message already has an explicit reply body. 1237 1238The response payload gives QEMU a deterministic indication of the result 1239of the command. Today, QEMU is expected to terminate the main vhost-user 1240loop upon receiving such errors. In future, qemu could be taught to be more 1241resilient for selective requests. 1242 1243For the message types that already solicit a reply from the client, 1244the presence of ``VHOST_USER_PROTOCOL_F_REPLY_ACK`` or need_reply bit 1245being set brings no behavioural change. (See the Communication_ 1246section for details.) 1247 1248.. _backend_conventions: 1249 1250Backend program conventions 1251=========================== 1252 1253vhost-user backends can provide various devices & services and may 1254need to be configured manually depending on the use case. However, it 1255is a good idea to follow the conventions listed here when 1256possible. Users, QEMU or libvirt, can then rely on some common 1257behaviour to avoid heterogenous configuration and management of the 1258backend programs and facilitate interoperability. 1259 1260Each backend installed on a host system should come with at least one 1261JSON file that conforms to the vhost-user.json schema. Each file 1262informs the management applications about the backend type, and binary 1263location. In addition, it defines rules for management apps for 1264picking the highest priority backend when multiple match the search 1265criteria (see ``@VhostUserBackend`` documentation in the schema file). 1266 1267If the backend is not capable of enabling a requested feature on the 1268host (such as 3D acceleration with virgl), or the initialization 1269failed, the backend should fail to start early and exit with a status 1270!= 0. It may also print a message to stderr for further details. 1271 1272The backend program must not daemonize itself, but it may be 1273daemonized by the management layer. It may also have a restricted 1274access to the system. 1275 1276File descriptors 0, 1 and 2 will exist, and have regular 1277stdin/stdout/stderr usage (they may have been redirected to /dev/null 1278by the management layer, or to a log handler). 1279 1280The backend program must end (as quickly and cleanly as possible) when 1281the SIGTERM signal is received. Eventually, it may receive SIGKILL by 1282the management layer after a few seconds. 1283 1284The following command line options have an expected behaviour. They 1285are mandatory, unless explicitly said differently: 1286 1287--socket-path=PATH 1288 1289 This option specify the location of the vhost-user Unix domain socket. 1290 It is incompatible with --fd. 1291 1292--fd=FDNUM 1293 1294 When this argument is given, the backend program is started with the 1295 vhost-user socket as file descriptor FDNUM. It is incompatible with 1296 --socket-path. 1297 1298--print-capabilities 1299 1300 Output to stdout the backend capabilities in JSON format, and then 1301 exit successfully. Other options and arguments should be ignored, and 1302 the backend program should not perform its normal function. The 1303 capabilities can be reported dynamically depending on the host 1304 capabilities. 1305 1306The JSON output is described in the ``vhost-user.json`` schema, by 1307```@VHostUserBackendCapabilities``. Example: 1308 1309.. code:: json 1310 1311 { 1312 "type": "foo", 1313 "features": [ 1314 "feature-a", 1315 "feature-b" 1316 ] 1317 } 1318 1319vhost-user-input 1320---------------- 1321 1322Command line options: 1323 1324--evdev-path=PATH 1325 1326 Specify the linux input device. 1327 1328 (optional) 1329 1330--no-grab 1331 1332 Do no request exclusive access to the input device. 1333 1334 (optional) 1335 1336vhost-user-gpu 1337-------------- 1338 1339Command line options: 1340 1341--render-node=PATH 1342 1343 Specify the GPU DRM render node. 1344 1345 (optional) 1346 1347--virgl 1348 1349 Enable virgl rendering support. 1350 1351 (optional) 1352