1.. _vhost_user_proto: 2 3=================== 4Vhost-user Protocol 5=================== 6 7.. 8 Copyright 2014 Virtual Open Systems Sarl. 9 Copyright 2019 Intel Corporation 10 Licence: This work is licensed under the terms of the GNU GPL, 11 version 2 or later. See the COPYING file in the top-level 12 directory. 13 14.. contents:: Table of Contents 15 16Introduction 17============ 18 19This protocol is aiming to complement the ``ioctl`` interface used to 20control the vhost implementation in the Linux kernel. It implements 21the control plane needed to establish virtqueue sharing with a user 22space process on the same host. It uses communication over a Unix 23domain socket to share file descriptors in the ancillary data of the 24message. 25 26The protocol defines 2 sides of the communication, *front-end* and 27*back-end*. The *front-end* is the application that shares its virtqueues, in 28our case QEMU. The *back-end* is the consumer of the virtqueues. 29 30In the current implementation QEMU is the *front-end*, and the *back-end* 31is the external process consuming the virtio queues, for example a 32software Ethernet switch running in user space, such as Snabbswitch, 33or a block device back-end processing read & write to a virtual 34disk. In order to facilitate interoperability between various back-end 35implementations, it is recommended to follow the :ref:`Backend program 36conventions <backend_conventions>`. 37 38The *front-end* and *back-end* can be either a client (i.e. connecting) or 39server (listening) in the socket communication. 40 41Support for platforms other than Linux 42-------------------------------------- 43 44While vhost-user was initially developed targeting Linux, nowadays it 45is supported on any platform that provides the following features: 46 47- A way for requesting shared memory represented by a file descriptor 48 so it can be passed over a UNIX domain socket and then mapped by the 49 other process. 50 51- AF_UNIX sockets with SCM_RIGHTS, so QEMU and the other process can 52 exchange messages through it, including ancillary data when needed. 53 54- Either eventfd or pipe/pipe2. On platforms where eventfd is not 55 available, QEMU will automatically fall back to pipe2 or, as a last 56 resort, pipe. Each file descriptor will be used for receiving or 57 sending events by reading or writing (respectively) an 8-byte value 58 to the corresponding it. The 8-value itself has no meaning and 59 should not be interpreted. 60 61Message Specification 62===================== 63 64.. Note:: All numbers are in the machine native byte order. 65 66A vhost-user message consists of 3 header fields and a payload. 67 68+---------+-------+------+---------+ 69| request | flags | size | payload | 70+---------+-------+------+---------+ 71 72Header 73------ 74 75:request: 32-bit type of the request 76 77:flags: 32-bit bit field 78 79- Lower 2 bits are the version (currently 0x01) 80- Bit 2 is the reply flag - needs to be sent on each reply from the back-end 81- Bit 3 is the need_reply flag - see :ref:`REPLY_ACK <reply_ack>` for 82 details. 83 84:size: 32-bit size of the payload 85 86Payload 87------- 88 89Depending on the request type, **payload** can be: 90 91A single 64-bit integer 92^^^^^^^^^^^^^^^^^^^^^^^ 93 94+-----+ 95| u64 | 96+-----+ 97 98:u64: a 64-bit unsigned integer 99 100A vring state description 101^^^^^^^^^^^^^^^^^^^^^^^^^ 102 103+-------+-----+ 104| index | num | 105+-------+-----+ 106 107:index: a 32-bit index 108 109:num: a 32-bit number 110 111A vring address description 112^^^^^^^^^^^^^^^^^^^^^^^^^^^ 113 114+-------+-------+------+------------+------+-----------+-----+ 115| index | flags | size | descriptor | used | available | log | 116+-------+-------+------+------------+------+-----------+-----+ 117 118:index: a 32-bit vring index 119 120:flags: a 32-bit vring flags 121 122:descriptor: a 64-bit ring address of the vring descriptor table 123 124:used: a 64-bit ring address of the vring used ring 125 126:available: a 64-bit ring address of the vring available ring 127 128:log: a 64-bit guest address for logging 129 130Note that a ring address is an IOVA if ``VIRTIO_F_IOMMU_PLATFORM`` has 131been negotiated. Otherwise it is a user address. 132 133Memory regions description 134^^^^^^^^^^^^^^^^^^^^^^^^^^ 135 136+-------------+---------+---------+-----+---------+ 137| num regions | padding | region0 | ... | region7 | 138+-------------+---------+---------+-----+---------+ 139 140:num regions: a 32-bit number of regions 141 142:padding: 32-bit 143 144A region is: 145 146+---------------+------+--------------+-------------+ 147| guest address | size | user address | mmap offset | 148+---------------+------+--------------+-------------+ 149 150:guest address: a 64-bit guest address of the region 151 152:size: a 64-bit size 153 154:user address: a 64-bit user address 155 156:mmap offset: 64-bit offset where region starts in the mapped memory 157 158Single memory region description 159^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 160 161+---------+---------------+------+--------------+-------------+ 162| padding | guest address | size | user address | mmap offset | 163+---------+---------------+------+--------------+-------------+ 164 165:padding: 64-bit 166 167:guest address: a 64-bit guest address of the region 168 169:size: a 64-bit size 170 171:user address: a 64-bit user address 172 173:mmap offset: 64-bit offset where region starts in the mapped memory 174 175Log description 176^^^^^^^^^^^^^^^ 177 178+----------+------------+ 179| log size | log offset | 180+----------+------------+ 181 182:log size: size of area used for logging 183 184:log offset: offset from start of supplied file descriptor where 185 logging starts (i.e. where guest address 0 would be 186 logged) 187 188An IOTLB message 189^^^^^^^^^^^^^^^^ 190 191+------+------+--------------+-------------------+------+ 192| iova | size | user address | permissions flags | type | 193+------+------+--------------+-------------------+------+ 194 195:iova: a 64-bit I/O virtual address programmed by the guest 196 197:size: a 64-bit size 198 199:user address: a 64-bit user address 200 201:permissions flags: an 8-bit value: 202 - 0: No access 203 - 1: Read access 204 - 2: Write access 205 - 3: Read/Write access 206 207:type: an 8-bit IOTLB message type: 208 - 1: IOTLB miss 209 - 2: IOTLB update 210 - 3: IOTLB invalidate 211 - 4: IOTLB access fail 212 213Virtio device config space 214^^^^^^^^^^^^^^^^^^^^^^^^^^ 215 216+--------+------+-------+---------+ 217| offset | size | flags | payload | 218+--------+------+-------+---------+ 219 220:offset: a 32-bit offset of virtio device's configuration space 221 222:size: a 32-bit configuration space access size in bytes 223 224:flags: a 32-bit value: 225 - 0: Vhost front-end messages used for writable fields 226 - 1: Vhost front-end messages used for live migration 227 228:payload: Size bytes array holding the contents of the virtio 229 device's configuration space 230 231Vring area description 232^^^^^^^^^^^^^^^^^^^^^^ 233 234+-----+------+--------+ 235| u64 | size | offset | 236+-----+------+--------+ 237 238:u64: a 64-bit integer contains vring index and flags 239 240:size: a 64-bit size of this area 241 242:offset: a 64-bit offset of this area from the start of the 243 supplied file descriptor 244 245Inflight description 246^^^^^^^^^^^^^^^^^^^^ 247 248+-----------+-------------+------------+------------+ 249| mmap size | mmap offset | num queues | queue size | 250+-----------+-------------+------------+------------+ 251 252:mmap size: a 64-bit size of area to track inflight I/O 253 254:mmap offset: a 64-bit offset of this area from the start 255 of the supplied file descriptor 256 257:num queues: a 16-bit number of virtqueues 258 259:queue size: a 16-bit size of virtqueues 260 261C structure 262----------- 263 264In QEMU the vhost-user message is implemented with the following struct: 265 266.. code:: c 267 268 typedef struct VhostUserMsg { 269 VhostUserRequest request; 270 uint32_t flags; 271 uint32_t size; 272 union { 273 uint64_t u64; 274 struct vhost_vring_state state; 275 struct vhost_vring_addr addr; 276 VhostUserMemory memory; 277 VhostUserLog log; 278 struct vhost_iotlb_msg iotlb; 279 VhostUserConfig config; 280 VhostUserVringArea area; 281 VhostUserInflight inflight; 282 }; 283 } QEMU_PACKED VhostUserMsg; 284 285Communication 286============= 287 288The protocol for vhost-user is based on the existing implementation of 289vhost for the Linux Kernel. Most messages that can be sent via the 290Unix domain socket implementing vhost-user have an equivalent ioctl to 291the kernel implementation. 292 293The communication consists of the *front-end* sending message requests and 294the *back-end* sending message replies. Most of the requests don't require 295replies. Here is a list of the ones that do: 296 297* ``VHOST_USER_GET_FEATURES`` 298* ``VHOST_USER_GET_PROTOCOL_FEATURES`` 299* ``VHOST_USER_GET_VRING_BASE`` 300* ``VHOST_USER_SET_LOG_BASE`` (if ``VHOST_USER_PROTOCOL_F_LOG_SHMFD``) 301* ``VHOST_USER_GET_INFLIGHT_FD`` (if ``VHOST_USER_PROTOCOL_F_INFLIGHT_SHMFD``) 302 303.. seealso:: 304 305 :ref:`REPLY_ACK <reply_ack>` 306 The section on ``REPLY_ACK`` protocol extension. 307 308There are several messages that the front-end sends with file descriptors passed 309in the ancillary data: 310 311* ``VHOST_USER_ADD_MEM_REG`` 312* ``VHOST_USER_SET_MEM_TABLE`` 313* ``VHOST_USER_SET_LOG_BASE`` (if ``VHOST_USER_PROTOCOL_F_LOG_SHMFD``) 314* ``VHOST_USER_SET_LOG_FD`` 315* ``VHOST_USER_SET_VRING_KICK`` 316* ``VHOST_USER_SET_VRING_CALL`` 317* ``VHOST_USER_SET_VRING_ERR`` 318* ``VHOST_USER_SET_BACKEND_REQ_FD`` (previous name ``VHOST_USER_SET_SLAVE_REQ_FD``) 319* ``VHOST_USER_SET_INFLIGHT_FD`` (if ``VHOST_USER_PROTOCOL_F_INFLIGHT_SHMFD``) 320 321If *front-end* is unable to send the full message or receives a wrong 322reply it will close the connection. An optional reconnection mechanism 323can be implemented. 324 325If *back-end* detects some error such as incompatible features, it may also 326close the connection. This should only happen in exceptional circumstances. 327 328Any protocol extensions are gated by protocol feature bits, which 329allows full backwards compatibility on both front-end and back-end. As 330older back-ends don't support negotiating protocol features, a feature 331bit was dedicated for this purpose:: 332 333 #define VHOST_USER_F_PROTOCOL_FEATURES 30 334 335Note that VHOST_USER_F_PROTOCOL_FEATURES is the UNUSED (30) feature 336bit defined in `VIRTIO 1.1 6.3 Legacy Interface: Reserved Feature Bits 337<https://docs.oasis-open.org/virtio/virtio/v1.1/cs01/virtio-v1.1-cs01.html#x1-4130003>`_. 338VIRTIO devices do not advertise this feature bit and therefore VIRTIO 339drivers cannot negotiate it. 340 341This reserved feature bit was reused by the vhost-user protocol to add 342vhost-user protocol feature negotiation in a backwards compatible 343fashion. Old vhost-user front-end and back-end implementations continue to 344work even though they are not aware of vhost-user protocol feature 345negotiation. 346 347Ring states 348----------- 349 350Rings can be in one of three states: 351 352* stopped: the back-end must not process the ring at all. 353 354* started but disabled: the back-end must process the ring without 355 causing any side effects. For example, for a networking device, 356 in the disabled state the back-end must not supply any new RX packets, 357 but must process and discard any TX packets. 358 359* started and enabled. 360 361Each ring is initialized in a stopped state. The back-end must start 362ring upon receiving a kick (that is, detecting that file descriptor is 363readable) on the descriptor specified by ``VHOST_USER_SET_VRING_KICK`` 364or receiving the in-band message ``VHOST_USER_VRING_KICK`` if negotiated, 365and stop ring upon receiving ``VHOST_USER_GET_VRING_BASE``. 366 367Rings can be enabled or disabled by ``VHOST_USER_SET_VRING_ENABLE``. 368 369If ``VHOST_USER_F_PROTOCOL_FEATURES`` has not been negotiated, the 370ring starts directly in the enabled state. 371 372If ``VHOST_USER_F_PROTOCOL_FEATURES`` has been negotiated, the ring is 373initialized in a disabled state and is enabled by 374``VHOST_USER_SET_VRING_ENABLE`` with parameter 1. 375 376While processing the rings (whether they are enabled or not), the back-end 377must support changing some configuration aspects on the fly. 378 379Multiple queue support 380---------------------- 381 382Many devices have a fixed number of virtqueues. In this case the front-end 383already knows the number of available virtqueues without communicating with the 384back-end. 385 386Some devices do not have a fixed number of virtqueues. Instead the maximum 387number of virtqueues is chosen by the back-end. The number can depend on host 388resource availability or back-end implementation details. Such devices are called 389multiple queue devices. 390 391Multiple queue support allows the back-end to advertise the maximum number of 392queues. This is treated as a protocol extension, hence the back-end has to 393implement protocol features first. The multiple queues feature is supported 394only when the protocol feature ``VHOST_USER_PROTOCOL_F_MQ`` (bit 0) is set. 395 396The max number of queues the back-end supports can be queried with message 397``VHOST_USER_GET_QUEUE_NUM``. Front-end should stop when the number of requested 398queues is bigger than that. 399 400As all queues share one connection, the front-end uses a unique index for each 401queue in the sent message to identify a specified queue. 402 403The front-end enables queues by sending message ``VHOST_USER_SET_VRING_ENABLE``. 404vhost-user-net has historically automatically enabled the first queue pair. 405 406Back-ends should always implement the ``VHOST_USER_PROTOCOL_F_MQ`` protocol 407feature, even for devices with a fixed number of virtqueues, since it is simple 408to implement and offers a degree of introspection. 409 410Front-ends must not rely on the ``VHOST_USER_PROTOCOL_F_MQ`` protocol feature for 411devices with a fixed number of virtqueues. Only true multiqueue devices 412require this protocol feature. 413 414Migration 415--------- 416 417During live migration, the front-end may need to track the modifications 418the back-end makes to the memory mapped regions. The front-end should mark 419the dirty pages in a log. Once it complies to this logging, it may 420declare the ``VHOST_F_LOG_ALL`` vhost feature. 421 422To start/stop logging of data/used ring writes, the front-end may send 423messages ``VHOST_USER_SET_FEATURES`` with ``VHOST_F_LOG_ALL`` and 424``VHOST_USER_SET_VRING_ADDR`` with ``VHOST_VRING_F_LOG`` in ring's 425flags set to 1/0, respectively. 426 427All the modifications to memory pointed by vring "descriptor" should 428be marked. Modifications to "used" vring should be marked if 429``VHOST_VRING_F_LOG`` is part of ring's flags. 430 431Dirty pages are of size:: 432 433 #define VHOST_LOG_PAGE 0x1000 434 435The log memory fd is provided in the ancillary data of 436``VHOST_USER_SET_LOG_BASE`` message when the back-end has 437``VHOST_USER_PROTOCOL_F_LOG_SHMFD`` protocol feature. 438 439The size of the log is supplied as part of ``VhostUserMsg`` which 440should be large enough to cover all known guest addresses. Log starts 441at the supplied offset in the supplied file descriptor. The log 442covers from address 0 to the maximum of guest regions. In pseudo-code, 443to mark page at ``addr`` as dirty:: 444 445 page = addr / VHOST_LOG_PAGE 446 log[page / 8] |= 1 << page % 8 447 448Where ``addr`` is the guest physical address. 449 450Use atomic operations, as the log may be concurrently manipulated. 451 452Note that when logging modifications to the used ring (when 453``VHOST_VRING_F_LOG`` is set for this ring), ``log_guest_addr`` should 454be used to calculate the log offset: the write to first byte of the 455used ring is logged at this offset from log start. Also note that this 456value might be outside the legal guest physical address range 457(i.e. does not have to be covered by the ``VhostUserMemory`` table), but 458the bit offset of the last byte of the ring must fall within the size 459supplied by ``VhostUserLog``. 460 461``VHOST_USER_SET_LOG_FD`` is an optional message with an eventfd in 462ancillary data, it may be used to inform the front-end that the log has 463been modified. 464 465Once the source has finished migration, rings will be stopped by the 466source. No further update must be done before rings are restarted. 467 468In postcopy migration the back-end is started before all the memory has 469been received from the source host, and care must be taken to avoid 470accessing pages that have yet to be received. The back-end opens a 471'userfault'-fd and registers the memory with it; this fd is then 472passed back over to the front-end. The front-end services requests on the 473userfaultfd for pages that are accessed and when the page is available 474it performs WAKE ioctl's on the userfaultfd to wake the stalled 475back-end. The front-end indicates support for this via the 476``VHOST_USER_PROTOCOL_F_PAGEFAULT`` feature. 477 478Memory access 479------------- 480 481The front-end sends a list of vhost memory regions to the back-end using the 482``VHOST_USER_SET_MEM_TABLE`` message. Each region has two base 483addresses: a guest address and a user address. 484 485Messages contain guest addresses and/or user addresses to reference locations 486within the shared memory. The mapping of these addresses works as follows. 487 488User addresses map to the vhost memory region containing that user address. 489 490When the ``VIRTIO_F_IOMMU_PLATFORM`` feature has not been negotiated: 491 492* Guest addresses map to the vhost memory region containing that guest 493 address. 494 495When the ``VIRTIO_F_IOMMU_PLATFORM`` feature has been negotiated: 496 497* Guest addresses are also called I/O virtual addresses (IOVAs). They are 498 translated to user addresses via the IOTLB. 499 500* The vhost memory region guest address is not used. 501 502IOMMU support 503------------- 504 505When the ``VIRTIO_F_IOMMU_PLATFORM`` feature has been negotiated, the 506front-end sends IOTLB entries update & invalidation by sending 507``VHOST_USER_IOTLB_MSG`` requests to the back-end with a ``struct 508vhost_iotlb_msg`` as payload. For update events, the ``iotlb`` payload 509has to be filled with the update message type (2), the I/O virtual 510address, the size, the user virtual address, and the permissions 511flags. Addresses and size must be within vhost memory regions set via 512the ``VHOST_USER_SET_MEM_TABLE`` request. For invalidation events, the 513``iotlb`` payload has to be filled with the invalidation message type 514(3), the I/O virtual address and the size. On success, the back-end is 515expected to reply with a zero payload, non-zero otherwise. 516 517The back-end relies on the back-end communication channel (see :ref:`Back-end 518communication <backend_communication>` section below) to send IOTLB miss 519and access failure events, by sending ``VHOST_USER_BACKEND_IOTLB_MSG`` 520requests to the front-end with a ``struct vhost_iotlb_msg`` as 521payload. For miss events, the iotlb payload has to be filled with the 522miss message type (1), the I/O virtual address and the permissions 523flags. For access failure event, the iotlb payload has to be filled 524with the access failure message type (4), the I/O virtual address and 525the permissions flags. For synchronization purpose, the back-end may 526rely on the reply-ack feature, so the front-end may send a reply when 527operation is completed if the reply-ack feature is negotiated and 528back-ends requests a reply. For miss events, completed operation means 529either front-end sent an update message containing the IOTLB entry 530containing requested address and permission, or front-end sent nothing if 531the IOTLB miss message is invalid (invalid IOVA or permission). 532 533The front-end isn't expected to take the initiative to send IOTLB update 534messages, as the back-end sends IOTLB miss messages for the guest virtual 535memory areas it needs to access. 536 537.. _backend_communication: 538 539Back-end communication 540---------------------- 541 542An optional communication channel is provided if the back-end declares 543``VHOST_USER_PROTOCOL_F_BACKEND_REQ`` protocol feature, to allow the 544back-end to make requests to the front-end. 545 546The fd is provided via ``VHOST_USER_SET_BACKEND_REQ_FD`` ancillary data. 547 548A back-end may then send ``VHOST_USER_BACKEND_*`` messages to the front-end 549using this fd communication channel. 550 551If ``VHOST_USER_PROTOCOL_F_BACKEND_SEND_FD`` protocol feature is 552negotiated, back-end can send file descriptors (at most 8 descriptors in 553each message) to front-end via ancillary data using this fd communication 554channel. 555 556Inflight I/O tracking 557--------------------- 558 559To support reconnecting after restart or crash, back-end may need to 560resubmit inflight I/Os. If virtqueue is processed in order, we can 561easily achieve that by getting the inflight descriptors from 562descriptor table (split virtqueue) or descriptor ring (packed 563virtqueue). However, it can't work when we process descriptors 564out-of-order because some entries which store the information of 565inflight descriptors in available ring (split virtqueue) or descriptor 566ring (packed virtqueue) might be overridden by new entries. To solve 567this problem, the back-end need to allocate an extra buffer to store this 568information of inflight descriptors and share it with front-end for 569persistent. ``VHOST_USER_GET_INFLIGHT_FD`` and 570``VHOST_USER_SET_INFLIGHT_FD`` are used to transfer this buffer 571between front-end and back-end. And the format of this buffer is described 572below: 573 574+---------------+---------------+-----+---------------+ 575| queue0 region | queue1 region | ... | queueN region | 576+---------------+---------------+-----+---------------+ 577 578N is the number of available virtqueues. The back-end could get it from num 579queues field of ``VhostUserInflight``. 580 581For split virtqueue, queue region can be implemented as: 582 583.. code:: c 584 585 typedef struct DescStateSplit { 586 /* Indicate whether this descriptor is inflight or not. 587 * Only available for head-descriptor. */ 588 uint8_t inflight; 589 590 /* Padding */ 591 uint8_t padding[5]; 592 593 /* Maintain a list for the last batch of used descriptors. 594 * Only available when batching is used for submitting */ 595 uint16_t next; 596 597 /* Used to preserve the order of fetching available descriptors. 598 * Only available for head-descriptor. */ 599 uint64_t counter; 600 } DescStateSplit; 601 602 typedef struct QueueRegionSplit { 603 /* The feature flags of this region. Now it's initialized to 0. */ 604 uint64_t features; 605 606 /* The version of this region. It's 1 currently. 607 * Zero value indicates an uninitialized buffer */ 608 uint16_t version; 609 610 /* The size of DescStateSplit array. It's equal to the virtqueue size. 611 * The back-end could get it from queue size field of VhostUserInflight. */ 612 uint16_t desc_num; 613 614 /* The head of list that track the last batch of used descriptors. */ 615 uint16_t last_batch_head; 616 617 /* Store the idx value of used ring */ 618 uint16_t used_idx; 619 620 /* Used to track the state of each descriptor in descriptor table */ 621 DescStateSplit desc[]; 622 } QueueRegionSplit; 623 624To track inflight I/O, the queue region should be processed as follows: 625 626When receiving available buffers from the driver: 627 628#. Get the next available head-descriptor index from available ring, ``i`` 629 630#. Set ``desc[i].counter`` to the value of global counter 631 632#. Increase global counter by 1 633 634#. Set ``desc[i].inflight`` to 1 635 636When supplying used buffers to the driver: 637 6381. Get corresponding used head-descriptor index, i 639 6402. Set ``desc[i].next`` to ``last_batch_head`` 641 6423. Set ``last_batch_head`` to ``i`` 643 644#. Steps 1,2,3 may be performed repeatedly if batching is possible 645 646#. Increase the ``idx`` value of used ring by the size of the batch 647 648#. Set the ``inflight`` field of each ``DescStateSplit`` entry in the batch to 0 649 650#. Set ``used_idx`` to the ``idx`` value of used ring 651 652When reconnecting: 653 654#. If the value of ``used_idx`` does not match the ``idx`` value of 655 used ring (means the inflight field of ``DescStateSplit`` entries in 656 last batch may be incorrect), 657 658 a. Subtract the value of ``used_idx`` from the ``idx`` value of 659 used ring to get last batch size of ``DescStateSplit`` entries 660 661 #. Set the ``inflight`` field of each ``DescStateSplit`` entry to 0 in last batch 662 list which starts from ``last_batch_head`` 663 664 #. Set ``used_idx`` to the ``idx`` value of used ring 665 666#. Resubmit inflight ``DescStateSplit`` entries in order of their 667 counter value 668 669For packed virtqueue, queue region can be implemented as: 670 671.. code:: c 672 673 typedef struct DescStatePacked { 674 /* Indicate whether this descriptor is inflight or not. 675 * Only available for head-descriptor. */ 676 uint8_t inflight; 677 678 /* Padding */ 679 uint8_t padding; 680 681 /* Link to the next free entry */ 682 uint16_t next; 683 684 /* Link to the last entry of descriptor list. 685 * Only available for head-descriptor. */ 686 uint16_t last; 687 688 /* The length of descriptor list. 689 * Only available for head-descriptor. */ 690 uint16_t num; 691 692 /* Used to preserve the order of fetching available descriptors. 693 * Only available for head-descriptor. */ 694 uint64_t counter; 695 696 /* The buffer id */ 697 uint16_t id; 698 699 /* The descriptor flags */ 700 uint16_t flags; 701 702 /* The buffer length */ 703 uint32_t len; 704 705 /* The buffer address */ 706 uint64_t addr; 707 } DescStatePacked; 708 709 typedef struct QueueRegionPacked { 710 /* The feature flags of this region. Now it's initialized to 0. */ 711 uint64_t features; 712 713 /* The version of this region. It's 1 currently. 714 * Zero value indicates an uninitialized buffer */ 715 uint16_t version; 716 717 /* The size of DescStatePacked array. It's equal to the virtqueue size. 718 * The back-end could get it from queue size field of VhostUserInflight. */ 719 uint16_t desc_num; 720 721 /* The head of free DescStatePacked entry list */ 722 uint16_t free_head; 723 724 /* The old head of free DescStatePacked entry list */ 725 uint16_t old_free_head; 726 727 /* The used index of descriptor ring */ 728 uint16_t used_idx; 729 730 /* The old used index of descriptor ring */ 731 uint16_t old_used_idx; 732 733 /* Device ring wrap counter */ 734 uint8_t used_wrap_counter; 735 736 /* The old device ring wrap counter */ 737 uint8_t old_used_wrap_counter; 738 739 /* Padding */ 740 uint8_t padding[7]; 741 742 /* Used to track the state of each descriptor fetched from descriptor ring */ 743 DescStatePacked desc[]; 744 } QueueRegionPacked; 745 746To track inflight I/O, the queue region should be processed as follows: 747 748When receiving available buffers from the driver: 749 750#. Get the next available descriptor entry from descriptor ring, ``d`` 751 752#. If ``d`` is head descriptor, 753 754 a. Set ``desc[old_free_head].num`` to 0 755 756 #. Set ``desc[old_free_head].counter`` to the value of global counter 757 758 #. Increase global counter by 1 759 760 #. Set ``desc[old_free_head].inflight`` to 1 761 762#. If ``d`` is last descriptor, set ``desc[old_free_head].last`` to 763 ``free_head`` 764 765#. Increase ``desc[old_free_head].num`` by 1 766 767#. Set ``desc[free_head].addr``, ``desc[free_head].len``, 768 ``desc[free_head].flags``, ``desc[free_head].id`` to ``d.addr``, 769 ``d.len``, ``d.flags``, ``d.id`` 770 771#. Set ``free_head`` to ``desc[free_head].next`` 772 773#. If ``d`` is last descriptor, set ``old_free_head`` to ``free_head`` 774 775When supplying used buffers to the driver: 776 7771. Get corresponding used head-descriptor entry from descriptor ring, 778 ``d`` 779 7802. Get corresponding ``DescStatePacked`` entry, ``e`` 781 7823. Set ``desc[e.last].next`` to ``free_head`` 783 7844. Set ``free_head`` to the index of ``e`` 785 786#. Steps 1,2,3,4 may be performed repeatedly if batching is possible 787 788#. Increase ``used_idx`` by the size of the batch and update 789 ``used_wrap_counter`` if needed 790 791#. Update ``d.flags`` 792 793#. Set the ``inflight`` field of each head ``DescStatePacked`` entry 794 in the batch to 0 795 796#. Set ``old_free_head``, ``old_used_idx``, ``old_used_wrap_counter`` 797 to ``free_head``, ``used_idx``, ``used_wrap_counter`` 798 799When reconnecting: 800 801#. If ``used_idx`` does not match ``old_used_idx`` (means the 802 ``inflight`` field of ``DescStatePacked`` entries in last batch may 803 be incorrect), 804 805 a. Get the next descriptor ring entry through ``old_used_idx``, ``d`` 806 807 #. Use ``old_used_wrap_counter`` to calculate the available flags 808 809 #. If ``d.flags`` is not equal to the calculated flags value (means 810 back-end has submitted the buffer to guest driver before crash, so 811 it has to commit the in-progres update), set ``old_free_head``, 812 ``old_used_idx``, ``old_used_wrap_counter`` to ``free_head``, 813 ``used_idx``, ``used_wrap_counter`` 814 815#. Set ``free_head``, ``used_idx``, ``used_wrap_counter`` to 816 ``old_free_head``, ``old_used_idx``, ``old_used_wrap_counter`` 817 (roll back any in-progress update) 818 819#. Set the ``inflight`` field of each ``DescStatePacked`` entry in 820 free list to 0 821 822#. Resubmit inflight ``DescStatePacked`` entries in order of their 823 counter value 824 825In-band notifications 826--------------------- 827 828In some limited situations (e.g. for simulation) it is desirable to 829have the kick, call and error (if used) signals done via in-band 830messages instead of asynchronous eventfd notifications. This can be 831done by negotiating the ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS`` 832protocol feature. 833 834Note that due to the fact that too many messages on the sockets can 835cause the sending application(s) to block, it is not advised to use 836this feature unless absolutely necessary. It is also considered an 837error to negotiate this feature without also negotiating 838``VHOST_USER_PROTOCOL_F_BACKEND_REQ`` and ``VHOST_USER_PROTOCOL_F_REPLY_ACK``, 839the former is necessary for getting a message channel from the back-end 840to the front-end, while the latter needs to be used with the in-band 841notification messages to block until they are processed, both to avoid 842blocking later and for proper processing (at least in the simulation 843use case.) As it has no other way of signalling this error, the back-end 844should close the connection as a response to a 845``VHOST_USER_SET_PROTOCOL_FEATURES`` message that sets the in-band 846notifications feature flag without the other two. 847 848Protocol features 849----------------- 850 851.. code:: c 852 853 #define VHOST_USER_PROTOCOL_F_MQ 0 854 #define VHOST_USER_PROTOCOL_F_LOG_SHMFD 1 855 #define VHOST_USER_PROTOCOL_F_RARP 2 856 #define VHOST_USER_PROTOCOL_F_REPLY_ACK 3 857 #define VHOST_USER_PROTOCOL_F_MTU 4 858 #define VHOST_USER_PROTOCOL_F_BACKEND_REQ 5 859 #define VHOST_USER_PROTOCOL_F_CROSS_ENDIAN 6 860 #define VHOST_USER_PROTOCOL_F_CRYPTO_SESSION 7 861 #define VHOST_USER_PROTOCOL_F_PAGEFAULT 8 862 #define VHOST_USER_PROTOCOL_F_CONFIG 9 863 #define VHOST_USER_PROTOCOL_F_BACKEND_SEND_FD 10 864 #define VHOST_USER_PROTOCOL_F_HOST_NOTIFIER 11 865 #define VHOST_USER_PROTOCOL_F_INFLIGHT_SHMFD 12 866 #define VHOST_USER_PROTOCOL_F_RESET_DEVICE 13 867 #define VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS 14 868 #define VHOST_USER_PROTOCOL_F_CONFIGURE_MEM_SLOTS 15 869 #define VHOST_USER_PROTOCOL_F_STATUS 16 870 871Front-end message types 872----------------------- 873 874``VHOST_USER_GET_FEATURES`` 875 :id: 1 876 :equivalent ioctl: ``VHOST_GET_FEATURES`` 877 :request payload: N/A 878 :reply payload: ``u64`` 879 880 Get from the underlying vhost implementation the features bitmask. 881 Feature bit ``VHOST_USER_F_PROTOCOL_FEATURES`` signals back-end support 882 for ``VHOST_USER_GET_PROTOCOL_FEATURES`` and 883 ``VHOST_USER_SET_PROTOCOL_FEATURES``. 884 885``VHOST_USER_SET_FEATURES`` 886 :id: 2 887 :equivalent ioctl: ``VHOST_SET_FEATURES`` 888 :request payload: ``u64`` 889 :reply payload: N/A 890 891 Enable features in the underlying vhost implementation using a 892 bitmask. Feature bit ``VHOST_USER_F_PROTOCOL_FEATURES`` signals 893 back-end support for ``VHOST_USER_GET_PROTOCOL_FEATURES`` and 894 ``VHOST_USER_SET_PROTOCOL_FEATURES``. 895 896``VHOST_USER_GET_PROTOCOL_FEATURES`` 897 :id: 15 898 :equivalent ioctl: ``VHOST_GET_FEATURES`` 899 :request payload: N/A 900 :reply payload: ``u64`` 901 902 Get the protocol feature bitmask from the underlying vhost 903 implementation. Only legal if feature bit 904 ``VHOST_USER_F_PROTOCOL_FEATURES`` is present in 905 ``VHOST_USER_GET_FEATURES``. It does not need to be acknowledged by 906 ``VHOST_USER_SET_FEATURES``. 907 908.. Note:: 909 Back-ends that report ``VHOST_USER_F_PROTOCOL_FEATURES`` must 910 support this message even before ``VHOST_USER_SET_FEATURES`` was 911 called. 912 913``VHOST_USER_SET_PROTOCOL_FEATURES`` 914 :id: 16 915 :equivalent ioctl: ``VHOST_SET_FEATURES`` 916 :request payload: ``u64`` 917 :reply payload: N/A 918 919 Enable protocol features in the underlying vhost implementation. 920 921 Only legal if feature bit ``VHOST_USER_F_PROTOCOL_FEATURES`` is present in 922 ``VHOST_USER_GET_FEATURES``. It does not need to be acknowledged by 923 ``VHOST_USER_SET_FEATURES``. 924 925.. Note:: 926 Back-ends that report ``VHOST_USER_F_PROTOCOL_FEATURES`` must support 927 this message even before ``VHOST_USER_SET_FEATURES`` was called. 928 929``VHOST_USER_SET_OWNER`` 930 :id: 3 931 :equivalent ioctl: ``VHOST_SET_OWNER`` 932 :request payload: N/A 933 :reply payload: N/A 934 935 Issued when a new connection is established. It marks the sender 936 as the front-end that owns of the session. This can be used on the *back-end* 937 as a "session start" flag. 938 939``VHOST_USER_RESET_OWNER`` 940 :id: 4 941 :request payload: N/A 942 :reply payload: N/A 943 944.. admonition:: Deprecated 945 946 This is no longer used. Used to be sent to request disabling all 947 rings, but some back-ends interpreted it to also discard connection 948 state (this interpretation would lead to bugs). It is recommended 949 that back-ends either ignore this message, or use it to disable all 950 rings. 951 952``VHOST_USER_SET_MEM_TABLE`` 953 :id: 5 954 :equivalent ioctl: ``VHOST_SET_MEM_TABLE`` 955 :request payload: memory regions description 956 :reply payload: (postcopy only) memory regions description 957 958 Sets the memory map regions on the back-end so it can translate the 959 vring addresses. In the ancillary data there is an array of file 960 descriptors for each memory mapped region. The size and ordering of 961 the fds matches the number and ordering of memory regions. 962 963 When ``VHOST_USER_POSTCOPY_LISTEN`` has been received, 964 ``SET_MEM_TABLE`` replies with the bases of the memory mapped 965 regions to the front-end. The back-end must have mmap'd the regions but 966 not yet accessed them and should not yet generate a userfault 967 event. 968 969.. Note:: 970 ``NEED_REPLY_MASK`` is not set in this case. QEMU will then 971 reply back to the list of mappings with an empty 972 ``VHOST_USER_SET_MEM_TABLE`` as an acknowledgement; only upon 973 reception of this message may the guest start accessing the memory 974 and generating faults. 975 976``VHOST_USER_SET_LOG_BASE`` 977 :id: 6 978 :equivalent ioctl: ``VHOST_SET_LOG_BASE`` 979 :request payload: u64 980 :reply payload: N/A 981 982 Sets logging shared memory space. 983 984 When the back-end has ``VHOST_USER_PROTOCOL_F_LOG_SHMFD`` protocol feature, 985 the log memory fd is provided in the ancillary data of 986 ``VHOST_USER_SET_LOG_BASE`` message, the size and offset of shared 987 memory area provided in the message. 988 989``VHOST_USER_SET_LOG_FD`` 990 :id: 7 991 :equivalent ioctl: ``VHOST_SET_LOG_FD`` 992 :request payload: N/A 993 :reply payload: N/A 994 995 Sets the logging file descriptor, which is passed as ancillary data. 996 997``VHOST_USER_SET_VRING_NUM`` 998 :id: 8 999 :equivalent ioctl: ``VHOST_SET_VRING_NUM`` 1000 :request payload: vring state description 1001 :reply payload: N/A 1002 1003 Set the size of the queue. 1004 1005``VHOST_USER_SET_VRING_ADDR`` 1006 :id: 9 1007 :equivalent ioctl: ``VHOST_SET_VRING_ADDR`` 1008 :request payload: vring address description 1009 :reply payload: N/A 1010 1011 Sets the addresses of the different aspects of the vring. 1012 1013``VHOST_USER_SET_VRING_BASE`` 1014 :id: 10 1015 :equivalent ioctl: ``VHOST_SET_VRING_BASE`` 1016 :request payload: vring state description 1017 :reply payload: N/A 1018 1019 Sets the base offset in the available vring. 1020 1021``VHOST_USER_GET_VRING_BASE`` 1022 :id: 11 1023 :equivalent ioctl: ``VHOST_USER_GET_VRING_BASE`` 1024 :request payload: vring state description 1025 :reply payload: vring state description 1026 1027 Get the available vring base offset. 1028 1029``VHOST_USER_SET_VRING_KICK`` 1030 :id: 12 1031 :equivalent ioctl: ``VHOST_SET_VRING_KICK`` 1032 :request payload: ``u64`` 1033 :reply payload: N/A 1034 1035 Set the event file descriptor for adding buffers to the vring. It is 1036 passed in the ancillary data. 1037 1038 Bits (0-7) of the payload contain the vring index. Bit 8 is the 1039 invalid FD flag. This flag is set when there is no file descriptor 1040 in the ancillary data. This signals that polling should be used 1041 instead of waiting for the kick. Note that if the protocol feature 1042 ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS`` has been negotiated 1043 this message isn't necessary as the ring is also started on the 1044 ``VHOST_USER_VRING_KICK`` message, it may however still be used to 1045 set an event file descriptor (which will be preferred over the 1046 message) or to enable polling. 1047 1048``VHOST_USER_SET_VRING_CALL`` 1049 :id: 13 1050 :equivalent ioctl: ``VHOST_SET_VRING_CALL`` 1051 :request payload: ``u64`` 1052 :reply payload: N/A 1053 1054 Set the event file descriptor to signal when buffers are used. It is 1055 passed in the ancillary data. 1056 1057 Bits (0-7) of the payload contain the vring index. Bit 8 is the 1058 invalid FD flag. This flag is set when there is no file descriptor 1059 in the ancillary data. This signals that polling will be used 1060 instead of waiting for the call. Note that if the protocol features 1061 ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS`` and 1062 ``VHOST_USER_PROTOCOL_F_BACKEND_REQ`` have been negotiated this message 1063 isn't necessary as the ``VHOST_USER_BACKEND_VRING_CALL`` message can be 1064 used, it may however still be used to set an event file descriptor 1065 or to enable polling. 1066 1067``VHOST_USER_SET_VRING_ERR`` 1068 :id: 14 1069 :equivalent ioctl: ``VHOST_SET_VRING_ERR`` 1070 :request payload: ``u64`` 1071 :reply payload: N/A 1072 1073 Set the event file descriptor to signal when error occurs. It is 1074 passed in the ancillary data. 1075 1076 Bits (0-7) of the payload contain the vring index. Bit 8 is the 1077 invalid FD flag. This flag is set when there is no file descriptor 1078 in the ancillary data. Note that if the protocol features 1079 ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS`` and 1080 ``VHOST_USER_PROTOCOL_F_BACKEND_REQ`` have been negotiated this message 1081 isn't necessary as the ``VHOST_USER_BACKEND_VRING_ERR`` message can be 1082 used, it may however still be used to set an event file descriptor 1083 (which will be preferred over the message). 1084 1085``VHOST_USER_GET_QUEUE_NUM`` 1086 :id: 17 1087 :equivalent ioctl: N/A 1088 :request payload: N/A 1089 :reply payload: u64 1090 1091 Query how many queues the back-end supports. 1092 1093 This request should be sent only when ``VHOST_USER_PROTOCOL_F_MQ`` 1094 is set in queried protocol features by 1095 ``VHOST_USER_GET_PROTOCOL_FEATURES``. 1096 1097``VHOST_USER_SET_VRING_ENABLE`` 1098 :id: 18 1099 :equivalent ioctl: N/A 1100 :request payload: vring state description 1101 :reply payload: N/A 1102 1103 Signal the back-end to enable or disable corresponding vring. 1104 1105 This request should be sent only when 1106 ``VHOST_USER_F_PROTOCOL_FEATURES`` has been negotiated. 1107 1108``VHOST_USER_SEND_RARP`` 1109 :id: 19 1110 :equivalent ioctl: N/A 1111 :request payload: ``u64`` 1112 :reply payload: N/A 1113 1114 Ask vhost user back-end to broadcast a fake RARP to notify the migration 1115 is terminated for guest that does not support GUEST_ANNOUNCE. 1116 1117 Only legal if feature bit ``VHOST_USER_F_PROTOCOL_FEATURES`` is 1118 present in ``VHOST_USER_GET_FEATURES`` and protocol feature bit 1119 ``VHOST_USER_PROTOCOL_F_RARP`` is present in 1120 ``VHOST_USER_GET_PROTOCOL_FEATURES``. The first 6 bytes of the 1121 payload contain the mac address of the guest to allow the vhost user 1122 back-end to construct and broadcast the fake RARP. 1123 1124``VHOST_USER_NET_SET_MTU`` 1125 :id: 20 1126 :equivalent ioctl: N/A 1127 :request payload: ``u64`` 1128 :reply payload: N/A 1129 1130 Set host MTU value exposed to the guest. 1131 1132 This request should be sent only when ``VIRTIO_NET_F_MTU`` feature 1133 has been successfully negotiated, ``VHOST_USER_F_PROTOCOL_FEATURES`` 1134 is present in ``VHOST_USER_GET_FEATURES`` and protocol feature bit 1135 ``VHOST_USER_PROTOCOL_F_NET_MTU`` is present in 1136 ``VHOST_USER_GET_PROTOCOL_FEATURES``. 1137 1138 If ``VHOST_USER_PROTOCOL_F_REPLY_ACK`` is negotiated, the back-end must 1139 respond with zero in case the specified MTU is valid, or non-zero 1140 otherwise. 1141 1142``VHOST_USER_SET_BACKEND_REQ_FD`` (previous name ``VHOST_USER_SET_SLAVE_REQ_FD``) 1143 :id: 21 1144 :equivalent ioctl: N/A 1145 :request payload: N/A 1146 :reply payload: N/A 1147 1148 Set the socket file descriptor for back-end initiated requests. It is passed 1149 in the ancillary data. 1150 1151 This request should be sent only when 1152 ``VHOST_USER_F_PROTOCOL_FEATURES`` has been negotiated, and protocol 1153 feature bit ``VHOST_USER_PROTOCOL_F_BACKEND_REQ`` bit is present in 1154 ``VHOST_USER_GET_PROTOCOL_FEATURES``. If 1155 ``VHOST_USER_PROTOCOL_F_REPLY_ACK`` is negotiated, the back-end must 1156 respond with zero for success, non-zero otherwise. 1157 1158``VHOST_USER_IOTLB_MSG`` 1159 :id: 22 1160 :equivalent ioctl: N/A (equivalent to ``VHOST_IOTLB_MSG`` message type) 1161 :request payload: ``struct vhost_iotlb_msg`` 1162 :reply payload: ``u64`` 1163 1164 Send IOTLB messages with ``struct vhost_iotlb_msg`` as payload. 1165 1166 The front-end sends such requests to update and invalidate entries in the 1167 device IOTLB. The back-end has to acknowledge the request with sending 1168 zero as ``u64`` payload for success, non-zero otherwise. 1169 1170 This request should be send only when ``VIRTIO_F_IOMMU_PLATFORM`` 1171 feature has been successfully negotiated. 1172 1173``VHOST_USER_SET_VRING_ENDIAN`` 1174 :id: 23 1175 :equivalent ioctl: ``VHOST_SET_VRING_ENDIAN`` 1176 :request payload: vring state description 1177 :reply payload: N/A 1178 1179 Set the endianness of a VQ for legacy devices. Little-endian is 1180 indicated with state.num set to 0 and big-endian is indicated with 1181 state.num set to 1. Other values are invalid. 1182 1183 This request should be sent only when 1184 ``VHOST_USER_PROTOCOL_F_CROSS_ENDIAN`` has been negotiated. 1185 Backends that negotiated this feature should handle both 1186 endiannesses and expect this message once (per VQ) during device 1187 configuration (ie. before the front-end starts the VQ). 1188 1189``VHOST_USER_GET_CONFIG`` 1190 :id: 24 1191 :equivalent ioctl: N/A 1192 :request payload: virtio device config space 1193 :reply payload: virtio device config space 1194 1195 When ``VHOST_USER_PROTOCOL_F_CONFIG`` is negotiated, this message is 1196 submitted by the vhost-user front-end to fetch the contents of the 1197 virtio device configuration space, vhost-user back-end's payload size 1198 MUST match the front-end's request, vhost-user back-end uses zero length of 1199 payload to indicate an error to the vhost-user front-end. The vhost-user 1200 front-end may cache the contents to avoid repeated 1201 ``VHOST_USER_GET_CONFIG`` calls. 1202 1203``VHOST_USER_SET_CONFIG`` 1204 :id: 25 1205 :equivalent ioctl: N/A 1206 :request payload: virtio device config space 1207 :reply payload: N/A 1208 1209 When ``VHOST_USER_PROTOCOL_F_CONFIG`` is negotiated, this message is 1210 submitted by the vhost-user front-end when the Guest changes the virtio 1211 device configuration space and also can be used for live migration 1212 on the destination host. The vhost-user back-end must check the flags 1213 field, and back-ends MUST NOT accept SET_CONFIG for read-only 1214 configuration space fields unless the live migration bit is set. 1215 1216``VHOST_USER_CREATE_CRYPTO_SESSION`` 1217 :id: 26 1218 :equivalent ioctl: N/A 1219 :request payload: crypto session description 1220 :reply payload: crypto session description 1221 1222 Create a session for crypto operation. The back-end must return 1223 the session id, 0 or positive for success, negative for failure. 1224 This request should be sent only when 1225 ``VHOST_USER_PROTOCOL_F_CRYPTO_SESSION`` feature has been 1226 successfully negotiated. It's a required feature for crypto 1227 devices. 1228 1229``VHOST_USER_CLOSE_CRYPTO_SESSION`` 1230 :id: 27 1231 :equivalent ioctl: N/A 1232 :request payload: ``u64`` 1233 :reply payload: N/A 1234 1235 Close a session for crypto operation which was previously 1236 created by ``VHOST_USER_CREATE_CRYPTO_SESSION``. 1237 1238 This request should be sent only when 1239 ``VHOST_USER_PROTOCOL_F_CRYPTO_SESSION`` feature has been 1240 successfully negotiated. It's a required feature for crypto 1241 devices. 1242 1243``VHOST_USER_POSTCOPY_ADVISE`` 1244 :id: 28 1245 :request payload: N/A 1246 :reply payload: userfault fd 1247 1248 When ``VHOST_USER_PROTOCOL_F_PAGEFAULT`` is supported, the front-end 1249 advises back-end that a migration with postcopy enabled is underway, 1250 the back-end must open a userfaultfd for later use. Note that at this 1251 stage the migration is still in precopy mode. 1252 1253``VHOST_USER_POSTCOPY_LISTEN`` 1254 :id: 29 1255 :request payload: N/A 1256 :reply payload: N/A 1257 1258 The front-end advises back-end that a transition to postcopy mode has 1259 happened. The back-end must ensure that shared memory is registered 1260 with userfaultfd to cause faulting of non-present pages. 1261 1262 This is always sent sometime after a ``VHOST_USER_POSTCOPY_ADVISE``, 1263 and thus only when ``VHOST_USER_PROTOCOL_F_PAGEFAULT`` is supported. 1264 1265``VHOST_USER_POSTCOPY_END`` 1266 :id: 30 1267 :request payload: N/A 1268 :reply payload: ``u64`` 1269 1270 The front-end advises that postcopy migration has now completed. The back-end 1271 must disable the userfaultfd. The reply is an acknowledgement 1272 only. 1273 1274 When ``VHOST_USER_PROTOCOL_F_PAGEFAULT`` is supported, this message 1275 is sent at the end of the migration, after 1276 ``VHOST_USER_POSTCOPY_LISTEN`` was previously sent. 1277 1278 The value returned is an error indication; 0 is success. 1279 1280``VHOST_USER_GET_INFLIGHT_FD`` 1281 :id: 31 1282 :equivalent ioctl: N/A 1283 :request payload: inflight description 1284 :reply payload: N/A 1285 1286 When ``VHOST_USER_PROTOCOL_F_INFLIGHT_SHMFD`` protocol feature has 1287 been successfully negotiated, this message is submitted by the front-end to 1288 get a shared buffer from back-end. The shared buffer will be used to 1289 track inflight I/O by back-end. QEMU should retrieve a new one when vm 1290 reset. 1291 1292``VHOST_USER_SET_INFLIGHT_FD`` 1293 :id: 32 1294 :equivalent ioctl: N/A 1295 :request payload: inflight description 1296 :reply payload: N/A 1297 1298 When ``VHOST_USER_PROTOCOL_F_INFLIGHT_SHMFD`` protocol feature has 1299 been successfully negotiated, this message is submitted by the front-end to 1300 send the shared inflight buffer back to the back-end so that the back-end 1301 could get inflight I/O after a crash or restart. 1302 1303``VHOST_USER_GPU_SET_SOCKET`` 1304 :id: 33 1305 :equivalent ioctl: N/A 1306 :request payload: N/A 1307 :reply payload: N/A 1308 1309 Sets the GPU protocol socket file descriptor, which is passed as 1310 ancillary data. The GPU protocol is used to inform the front-end of 1311 rendering state and updates. See vhost-user-gpu.rst for details. 1312 1313``VHOST_USER_RESET_DEVICE`` 1314 :id: 34 1315 :equivalent ioctl: N/A 1316 :request payload: N/A 1317 :reply payload: N/A 1318 1319 Ask the vhost user back-end to disable all rings and reset all 1320 internal device state to the initial state, ready to be 1321 reinitialized. The back-end retains ownership of the device 1322 throughout the reset operation. 1323 1324 Only valid if the ``VHOST_USER_PROTOCOL_F_RESET_DEVICE`` protocol 1325 feature is set by the back-end. 1326 1327``VHOST_USER_VRING_KICK`` 1328 :id: 35 1329 :equivalent ioctl: N/A 1330 :request payload: vring state description 1331 :reply payload: N/A 1332 1333 When the ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS`` protocol 1334 feature has been successfully negotiated, this message may be 1335 submitted by the front-end to indicate that a buffer was added to 1336 the vring instead of signalling it using the vring's kick file 1337 descriptor or having the back-end rely on polling. 1338 1339 The state.num field is currently reserved and must be set to 0. 1340 1341``VHOST_USER_GET_MAX_MEM_SLOTS`` 1342 :id: 36 1343 :equivalent ioctl: N/A 1344 :request payload: N/A 1345 :reply payload: u64 1346 1347 When the ``VHOST_USER_PROTOCOL_F_CONFIGURE_MEM_SLOTS`` protocol 1348 feature has been successfully negotiated, this message is submitted 1349 by the front-end to the back-end. The back-end should return the message with a 1350 u64 payload containing the maximum number of memory slots for 1351 QEMU to expose to the guest. The value returned by the back-end 1352 will be capped at the maximum number of ram slots which can be 1353 supported by the target platform. 1354 1355``VHOST_USER_ADD_MEM_REG`` 1356 :id: 37 1357 :equivalent ioctl: N/A 1358 :request payload: N/A 1359 :reply payload: single memory region description 1360 1361 When the ``VHOST_USER_PROTOCOL_F_CONFIGURE_MEM_SLOTS`` protocol 1362 feature has been successfully negotiated, this message is submitted 1363 by the front-end to the back-end. The message payload contains a memory 1364 region descriptor struct, describing a region of guest memory which 1365 the back-end device must map in. When the 1366 ``VHOST_USER_PROTOCOL_F_CONFIGURE_MEM_SLOTS`` protocol feature has 1367 been successfully negotiated, along with the 1368 ``VHOST_USER_REM_MEM_REG`` message, this message is used to set and 1369 update the memory tables of the back-end device. 1370 1371 Exactly one file descriptor from which the memory is mapped is 1372 passed in the ancillary data. 1373 1374 In postcopy mode (see ``VHOST_USER_POSTCOPY_LISTEN``), the back-end 1375 replies with the bases of the memory mapped region to the front-end. 1376 For further details on postcopy, see ``VHOST_USER_SET_MEM_TABLE``. 1377 They apply to ``VHOST_USER_ADD_MEM_REG`` accordingly. 1378 1379``VHOST_USER_REM_MEM_REG`` 1380 :id: 38 1381 :equivalent ioctl: N/A 1382 :request payload: N/A 1383 :reply payload: single memory region description 1384 1385 When the ``VHOST_USER_PROTOCOL_F_CONFIGURE_MEM_SLOTS`` protocol 1386 feature has been successfully negotiated, this message is submitted 1387 by the front-end to the back-end. The message payload contains a memory 1388 region descriptor struct, describing a region of guest memory which 1389 the back-end device must unmap. When the 1390 ``VHOST_USER_PROTOCOL_F_CONFIGURE_MEM_SLOTS`` protocol feature has 1391 been successfully negotiated, along with the 1392 ``VHOST_USER_ADD_MEM_REG`` message, this message is used to set and 1393 update the memory tables of the back-end device. 1394 1395 The memory region to be removed is identified by its guest address, 1396 user address and size. The mmap offset is ignored. 1397 1398 No file descriptors SHOULD be passed in the ancillary data. For 1399 compatibility with existing incorrect implementations, the back-end MAY 1400 accept messages with one file descriptor. If a file descriptor is 1401 passed, the back-end MUST close it without using it otherwise. 1402 1403``VHOST_USER_SET_STATUS`` 1404 :id: 39 1405 :equivalent ioctl: VHOST_VDPA_SET_STATUS 1406 :request payload: ``u64`` 1407 :reply payload: N/A 1408 1409 When the ``VHOST_USER_PROTOCOL_F_STATUS`` protocol feature has been 1410 successfully negotiated, this message is submitted by the front-end to 1411 notify the back-end with updated device status as defined in the Virtio 1412 specification. 1413 1414``VHOST_USER_GET_STATUS`` 1415 :id: 40 1416 :equivalent ioctl: VHOST_VDPA_GET_STATUS 1417 :request payload: N/A 1418 :reply payload: ``u64`` 1419 1420 When the ``VHOST_USER_PROTOCOL_F_STATUS`` protocol feature has been 1421 successfully negotiated, this message is submitted by the front-end to 1422 query the back-end for its device status as defined in the Virtio 1423 specification. 1424 1425 1426Back-end message types 1427---------------------- 1428 1429For this type of message, the request is sent by the back-end and the reply 1430is sent by the front-end. 1431 1432``VHOST_USER_BACKEND_IOTLB_MSG`` (previous name ``VHOST_USER_SLAVE_IOTLB_MSG``) 1433 :id: 1 1434 :equivalent ioctl: N/A (equivalent to ``VHOST_IOTLB_MSG`` message type) 1435 :request payload: ``struct vhost_iotlb_msg`` 1436 :reply payload: N/A 1437 1438 Send IOTLB messages with ``struct vhost_iotlb_msg`` as payload. 1439 The back-end sends such requests to notify of an IOTLB miss, or an IOTLB 1440 access failure. If ``VHOST_USER_PROTOCOL_F_REPLY_ACK`` is 1441 negotiated, and back-end set the ``VHOST_USER_NEED_REPLY`` flag, the front-end 1442 must respond with zero when operation is successfully completed, or 1443 non-zero otherwise. This request should be send only when 1444 ``VIRTIO_F_IOMMU_PLATFORM`` feature has been successfully 1445 negotiated. 1446 1447``VHOST_USER_BACKEND_CONFIG_CHANGE_MSG`` (previous name ``VHOST_USER_SLAVE_CONFIG_CHANGE_MSG``) 1448 :id: 2 1449 :equivalent ioctl: N/A 1450 :request payload: N/A 1451 :reply payload: N/A 1452 1453 When ``VHOST_USER_PROTOCOL_F_CONFIG`` is negotiated, vhost-user 1454 back-end sends such messages to notify that the virtio device's 1455 configuration space has changed, for those host devices which can 1456 support such feature, host driver can send ``VHOST_USER_GET_CONFIG`` 1457 message to the back-end to get the latest content. If 1458 ``VHOST_USER_PROTOCOL_F_REPLY_ACK`` is negotiated, and the back-end sets the 1459 ``VHOST_USER_NEED_REPLY`` flag, the front-end must respond with zero when 1460 operation is successfully completed, or non-zero otherwise. 1461 1462``VHOST_USER_BACKEND_VRING_HOST_NOTIFIER_MSG`` (previous name ``VHOST_USER_SLAVE_VRING_HOST_NOTIFIER_MSG``) 1463 :id: 3 1464 :equivalent ioctl: N/A 1465 :request payload: vring area description 1466 :reply payload: N/A 1467 1468 Sets host notifier for a specified queue. The queue index is 1469 contained in the ``u64`` field of the vring area description. The 1470 host notifier is described by the file descriptor (typically it's a 1471 VFIO device fd) which is passed as ancillary data and the size 1472 (which is mmap size and should be the same as host page size) and 1473 offset (which is mmap offset) carried in the vring area 1474 description. QEMU can mmap the file descriptor based on the size and 1475 offset to get a memory range. Registering a host notifier means 1476 mapping this memory range to the VM as the specified queue's notify 1477 MMIO region. The back-end sends this request to tell QEMU to de-register 1478 the existing notifier if any and register the new notifier if the 1479 request is sent with a file descriptor. 1480 1481 This request should be sent only when 1482 ``VHOST_USER_PROTOCOL_F_HOST_NOTIFIER`` protocol feature has been 1483 successfully negotiated. 1484 1485``VHOST_USER_BACKEND_VRING_CALL`` (previous name ``VHOST_USER_SLAVE_VRING_CALL``) 1486 :id: 4 1487 :equivalent ioctl: N/A 1488 :request payload: vring state description 1489 :reply payload: N/A 1490 1491 When the ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS`` protocol 1492 feature has been successfully negotiated, this message may be 1493 submitted by the back-end to indicate that a buffer was used from 1494 the vring instead of signalling this using the vring's call file 1495 descriptor or having the front-end relying on polling. 1496 1497 The state.num field is currently reserved and must be set to 0. 1498 1499``VHOST_USER_BACKEND_VRING_ERR`` (previous name ``VHOST_USER_SLAVE_VRING_ERR``) 1500 :id: 5 1501 :equivalent ioctl: N/A 1502 :request payload: vring state description 1503 :reply payload: N/A 1504 1505 When the ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS`` protocol 1506 feature has been successfully negotiated, this message may be 1507 submitted by the back-end to indicate that an error occurred on the 1508 specific vring, instead of signalling the error file descriptor 1509 set by the front-end via ``VHOST_USER_SET_VRING_ERR``. 1510 1511 The state.num field is currently reserved and must be set to 0. 1512 1513.. _reply_ack: 1514 1515VHOST_USER_PROTOCOL_F_REPLY_ACK 1516------------------------------- 1517 1518The original vhost-user specification only demands replies for certain 1519commands. This differs from the vhost protocol implementation where 1520commands are sent over an ``ioctl()`` call and block until the back-end 1521has completed. 1522 1523With this protocol extension negotiated, the sender (QEMU) can set the 1524``need_reply`` [Bit 3] flag to any command. This indicates that the 1525back-end MUST respond with a Payload ``VhostUserMsg`` indicating success 1526or failure. The payload should be set to zero on success or non-zero 1527on failure, unless the message already has an explicit reply body. 1528 1529The reply payload gives QEMU a deterministic indication of the result 1530of the command. Today, QEMU is expected to terminate the main vhost-user 1531loop upon receiving such errors. In future, qemu could be taught to be more 1532resilient for selective requests. 1533 1534For the message types that already solicit a reply from the back-end, 1535the presence of ``VHOST_USER_PROTOCOL_F_REPLY_ACK`` or need_reply bit 1536being set brings no behavioural change. (See the Communication_ 1537section for details.) 1538 1539.. _backend_conventions: 1540 1541Backend program conventions 1542=========================== 1543 1544vhost-user back-ends can provide various devices & services and may 1545need to be configured manually depending on the use case. However, it 1546is a good idea to follow the conventions listed here when 1547possible. Users, QEMU or libvirt, can then rely on some common 1548behaviour to avoid heterogeneous configuration and management of the 1549back-end programs and facilitate interoperability. 1550 1551Each back-end installed on a host system should come with at least one 1552JSON file that conforms to the vhost-user.json schema. Each file 1553informs the management applications about the back-end type, and binary 1554location. In addition, it defines rules for management apps for 1555picking the highest priority back-end when multiple match the search 1556criteria (see ``@VhostUserBackend`` documentation in the schema file). 1557 1558If the back-end is not capable of enabling a requested feature on the 1559host (such as 3D acceleration with virgl), or the initialization 1560failed, the back-end should fail to start early and exit with a status 1561!= 0. It may also print a message to stderr for further details. 1562 1563The back-end program must not daemonize itself, but it may be 1564daemonized by the management layer. It may also have a restricted 1565access to the system. 1566 1567File descriptors 0, 1 and 2 will exist, and have regular 1568stdin/stdout/stderr usage (they may have been redirected to /dev/null 1569by the management layer, or to a log handler). 1570 1571The back-end program must end (as quickly and cleanly as possible) when 1572the SIGTERM signal is received. Eventually, it may receive SIGKILL by 1573the management layer after a few seconds. 1574 1575The following command line options have an expected behaviour. They 1576are mandatory, unless explicitly said differently: 1577 1578--socket-path=PATH 1579 1580 This option specify the location of the vhost-user Unix domain socket. 1581 It is incompatible with --fd. 1582 1583--fd=FDNUM 1584 1585 When this argument is given, the back-end program is started with the 1586 vhost-user socket as file descriptor FDNUM. It is incompatible with 1587 --socket-path. 1588 1589--print-capabilities 1590 1591 Output to stdout the back-end capabilities in JSON format, and then 1592 exit successfully. Other options and arguments should be ignored, and 1593 the back-end program should not perform its normal function. The 1594 capabilities can be reported dynamically depending on the host 1595 capabilities. 1596 1597The JSON output is described in the ``vhost-user.json`` schema, by 1598```@VHostUserBackendCapabilities``. Example: 1599 1600.. code:: json 1601 1602 { 1603 "type": "foo", 1604 "features": [ 1605 "feature-a", 1606 "feature-b" 1607 ] 1608 } 1609 1610vhost-user-input 1611---------------- 1612 1613Command line options: 1614 1615--evdev-path=PATH 1616 1617 Specify the linux input device. 1618 1619 (optional) 1620 1621--no-grab 1622 1623 Do no request exclusive access to the input device. 1624 1625 (optional) 1626 1627vhost-user-gpu 1628-------------- 1629 1630Command line options: 1631 1632--render-node=PATH 1633 1634 Specify the GPU DRM render node. 1635 1636 (optional) 1637 1638--virgl 1639 1640 Enable virgl rendering support. 1641 1642 (optional) 1643 1644vhost-user-blk 1645-------------- 1646 1647Command line options: 1648 1649--blk-file=PATH 1650 1651 Specify block device or file path. 1652 1653 (optional) 1654 1655--read-only 1656 1657 Enable read-only. 1658 1659 (optional) 1660