8 Copyright 2014 Virtual Open Systems Sarl.
9 Copyright 2019 Intel Corporation
10 Licence: This work is licensed under the terms of the GNU GPL,
11 version 2 or later. See the COPYING file in the top-level
14 .. contents:: Table of Contents
19 This protocol is aiming to complement the ``ioctl`` interface used to
20 control the vhost implementation in the Linux kernel. It implements
21 the control plane needed to establish virtqueue sharing with a user
22 space process on the same host. It uses communication over a Unix
23 domain socket to share file descriptors in the ancillary data of the
26 The protocol defines 2 sides of the communication, *front-end* and
27 *back-end*. The *front-end* is the application that shares its virtqueues, in
28 our case QEMU. The *back-end* is the consumer of the virtqueues.
30 In the current implementation QEMU is the *front-end*, and the *back-end*
31 is the external process consuming the virtio queues, for example a
32 software Ethernet switch running in user space, such as Snabbswitch,
33 or a block device back-end processing read & write to a virtual
34 disk. In order to facilitate interoperability between various back-end
35 implementations, it is recommended to follow the :ref:`Backend program
36 conventions <backend_conventions>`.
38 The *front-end* and *back-end* can be either a client (i.e. connecting) or
39 server (listening) in the socket communication.
41 Support for platforms other than Linux
42 --------------------------------------
44 While vhost-user was initially developed targeting Linux, nowadays it
45 is supported on any platform that provides the following features:
47 - A way for requesting shared memory represented by a file descriptor
48 so it can be passed over a UNIX domain socket and then mapped by the
51 - AF_UNIX sockets with SCM_RIGHTS, so QEMU and the other process can
52 exchange messages through it, including ancillary data when needed.
54 - Either eventfd or pipe/pipe2. On platforms where eventfd is not
55 available, QEMU will automatically fall back to pipe2 or, as a last
56 resort, pipe. Each file descriptor will be used for receiving or
57 sending events by reading or writing (respectively) an 8-byte value
58 to the corresponding it. The 8-value itself has no meaning and
59 should not be interpreted.
64 .. Note:: All numbers are in the machine native byte order.
66 A vhost-user message consists of 3 header fields and a payload.
68 +---------+-------+------+---------+
69 | request | flags | size | payload |
70 +---------+-------+------+---------+
75 :request: 32-bit type of the request
77 :flags: 32-bit bit field
79 - Lower 2 bits are the version (currently 0x01)
80 - Bit 2 is the reply flag - needs to be sent on each reply from the back-end
81 - Bit 3 is the need_reply flag - see :ref:`REPLY_ACK <reply_ack>` for
84 :size: 32-bit size of the payload
89 Depending on the request type, **payload** can be:
91 A single 64-bit integer
92 ^^^^^^^^^^^^^^^^^^^^^^^
98 :u64: a 64-bit unsigned integer
100 A vring state description
101 ^^^^^^^^^^^^^^^^^^^^^^^^^
107 :index: a 32-bit index
109 :num: a 32-bit number
111 A vring address description
112 ^^^^^^^^^^^^^^^^^^^^^^^^^^^
114 +-------+-------+------+------------+------+-----------+-----+
115 | index | flags | size | descriptor | used | available | log |
116 +-------+-------+------+------------+------+-----------+-----+
118 :index: a 32-bit vring index
120 :flags: a 32-bit vring flags
122 :descriptor: a 64-bit ring address of the vring descriptor table
124 :used: a 64-bit ring address of the vring used ring
126 :available: a 64-bit ring address of the vring available ring
128 :log: a 64-bit guest address for logging
130 Note that a ring address is an IOVA if ``VIRTIO_F_IOMMU_PLATFORM`` has
131 been negotiated. Otherwise it is a user address.
133 Memory region description
134 ^^^^^^^^^^^^^^^^^^^^^^^^^
136 +---------------+------+--------------+-------------+
137 | guest address | size | user address | mmap offset |
138 +---------------+------+--------------+-------------+
140 :guest address: a 64-bit guest address of the region
144 :user address: a 64-bit user address
146 :mmap offset: 64-bit offset where region starts in the mapped memory
148 When the ``VHOST_USER_PROTOCOL_F_XEN_MMAP`` protocol feature has been
149 successfully negotiated, the memory region description contains two extra
152 +---------------+------+--------------+-------------+----------------+-------+
153 | guest address | size | user address | mmap offset | xen mmap flags | domid |
154 +---------------+------+--------------+-------------+----------------+-------+
156 :xen mmap flags: 32-bit bit field
158 - Bit 0 is set for Xen foreign memory mapping.
159 - Bit 1 is set for Xen grant memory mapping.
160 - Bit 8 is set if the memory region can not be mapped in advance, and memory
161 areas within this region must be mapped / unmapped only when required by the
162 back-end. The back-end shouldn't try to map the entire region at once, as the
163 front-end may not allow it. The back-end should rather map only the required
164 amount of memory at once and unmap it after it is used.
166 :domid: a 32-bit Xen hypervisor specific domain id.
168 Single memory region description
169 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
177 A region is represented by Memory region description.
179 Multiple Memory regions description
180 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
182 +-------------+---------+---------+-----+---------+
183 | num regions | padding | region0 | ... | region7 |
184 +-------------+---------+---------+-----+---------+
186 :num regions: a 32-bit number of regions
190 A region is represented by Memory region description.
195 +----------+------------+
196 | log size | log offset |
197 +----------+------------+
199 :log size: size of area used for logging
201 :log offset: offset from start of supplied file descriptor where
202 logging starts (i.e. where guest address 0 would be
208 +------+------+--------------+-------------------+------+
209 | iova | size | user address | permissions flags | type |
210 +------+------+--------------+-------------------+------+
212 :iova: a 64-bit I/O virtual address programmed by the guest
216 :user address: a 64-bit user address
218 :permissions flags: an 8-bit value:
222 - 3: Read/Write access
224 :type: an 8-bit IOTLB message type:
227 - 3: IOTLB invalidate
228 - 4: IOTLB access fail
230 Virtio device config space
231 ^^^^^^^^^^^^^^^^^^^^^^^^^^
233 +--------+------+-------+---------+
234 | offset | size | flags | payload |
235 +--------+------+-------+---------+
237 :offset: a 32-bit offset of virtio device's configuration space
239 :size: a 32-bit configuration space access size in bytes
241 :flags: a 32-bit value:
242 - 0: Vhost front-end messages used for writable fields
243 - 1: Vhost front-end messages used for live migration
245 :payload: Size bytes array holding the contents of the virtio
246 device's configuration space
248 Vring area description
249 ^^^^^^^^^^^^^^^^^^^^^^
251 +-----+------+--------+
252 | u64 | size | offset |
253 +-----+------+--------+
255 :u64: a 64-bit integer contains vring index and flags
257 :size: a 64-bit size of this area
259 :offset: a 64-bit offset of this area from the start of the
260 supplied file descriptor
265 +-----------+-------------+------------+------------+
266 | mmap size | mmap offset | num queues | queue size |
267 +-----------+-------------+------------+------------+
269 :mmap size: a 64-bit size of area to track inflight I/O
271 :mmap offset: a 64-bit offset of this area from the start
272 of the supplied file descriptor
274 :num queues: a 16-bit number of virtqueues
276 :queue size: a 16-bit size of virtqueues
281 In QEMU the vhost-user message is implemented with the following struct:
285 typedef struct VhostUserMsg {
286 VhostUserRequest request;
291 struct vhost_vring_state state;
292 struct vhost_vring_addr addr;
293 VhostUserMemory memory;
295 struct vhost_iotlb_msg iotlb;
296 VhostUserConfig config;
297 VhostUserVringArea area;
298 VhostUserInflight inflight;
300 } QEMU_PACKED VhostUserMsg;
305 The protocol for vhost-user is based on the existing implementation of
306 vhost for the Linux Kernel. Most messages that can be sent via the
307 Unix domain socket implementing vhost-user have an equivalent ioctl to
308 the kernel implementation.
310 The communication consists of the *front-end* sending message requests and
311 the *back-end* sending message replies. Most of the requests don't require
312 replies. Here is a list of the ones that do:
314 * ``VHOST_USER_GET_FEATURES``
315 * ``VHOST_USER_GET_PROTOCOL_FEATURES``
316 * ``VHOST_USER_GET_VRING_BASE``
317 * ``VHOST_USER_SET_LOG_BASE`` (if ``VHOST_USER_PROTOCOL_F_LOG_SHMFD``)
318 * ``VHOST_USER_GET_INFLIGHT_FD`` (if ``VHOST_USER_PROTOCOL_F_INFLIGHT_SHMFD``)
322 :ref:`REPLY_ACK <reply_ack>`
323 The section on ``REPLY_ACK`` protocol extension.
325 There are several messages that the front-end sends with file descriptors passed
326 in the ancillary data:
328 * ``VHOST_USER_ADD_MEM_REG``
329 * ``VHOST_USER_SET_MEM_TABLE``
330 * ``VHOST_USER_SET_LOG_BASE`` (if ``VHOST_USER_PROTOCOL_F_LOG_SHMFD``)
331 * ``VHOST_USER_SET_LOG_FD``
332 * ``VHOST_USER_SET_VRING_KICK``
333 * ``VHOST_USER_SET_VRING_CALL``
334 * ``VHOST_USER_SET_VRING_ERR``
335 * ``VHOST_USER_SET_BACKEND_REQ_FD`` (previous name ``VHOST_USER_SET_SLAVE_REQ_FD``)
336 * ``VHOST_USER_SET_INFLIGHT_FD`` (if ``VHOST_USER_PROTOCOL_F_INFLIGHT_SHMFD``)
338 If *front-end* is unable to send the full message or receives a wrong
339 reply it will close the connection. An optional reconnection mechanism
342 If *back-end* detects some error such as incompatible features, it may also
343 close the connection. This should only happen in exceptional circumstances.
345 Any protocol extensions are gated by protocol feature bits, which
346 allows full backwards compatibility on both front-end and back-end. As
347 older back-ends don't support negotiating protocol features, a feature
348 bit was dedicated for this purpose::
350 #define VHOST_USER_F_PROTOCOL_FEATURES 30
352 Note that VHOST_USER_F_PROTOCOL_FEATURES is the UNUSED (30) feature
353 bit defined in `VIRTIO 1.1 6.3 Legacy Interface: Reserved Feature Bits
354 <https://docs.oasis-open.org/virtio/virtio/v1.1/cs01/virtio-v1.1-cs01.html#x1-4130003>`_.
355 VIRTIO devices do not advertise this feature bit and therefore VIRTIO
356 drivers cannot negotiate it.
358 This reserved feature bit was reused by the vhost-user protocol to add
359 vhost-user protocol feature negotiation in a backwards compatible
360 fashion. Old vhost-user front-end and back-end implementations continue to
361 work even though they are not aware of vhost-user protocol feature
367 Rings can be in one of three states:
369 * stopped: the back-end must not process the ring at all.
371 * started but disabled: the back-end must process the ring without
372 causing any side effects. For example, for a networking device,
373 in the disabled state the back-end must not supply any new RX packets,
374 but must process and discard any TX packets.
376 * started and enabled.
378 Each ring is initialized in a stopped state. The back-end must start
379 ring upon receiving a kick (that is, detecting that file descriptor is
380 readable) on the descriptor specified by ``VHOST_USER_SET_VRING_KICK``
381 or receiving the in-band message ``VHOST_USER_VRING_KICK`` if negotiated,
382 and stop ring upon receiving ``VHOST_USER_GET_VRING_BASE``.
384 Rings can be enabled or disabled by ``VHOST_USER_SET_VRING_ENABLE``.
386 If ``VHOST_USER_F_PROTOCOL_FEATURES`` has not been negotiated, the
387 ring starts directly in the enabled state.
389 If ``VHOST_USER_F_PROTOCOL_FEATURES`` has been negotiated, the ring is
390 initialized in a disabled state and is enabled by
391 ``VHOST_USER_SET_VRING_ENABLE`` with parameter 1.
393 While processing the rings (whether they are enabled or not), the back-end
394 must support changing some configuration aspects on the fly.
396 Multiple queue support
397 ----------------------
399 Many devices have a fixed number of virtqueues. In this case the front-end
400 already knows the number of available virtqueues without communicating with the
403 Some devices do not have a fixed number of virtqueues. Instead the maximum
404 number of virtqueues is chosen by the back-end. The number can depend on host
405 resource availability or back-end implementation details. Such devices are called
406 multiple queue devices.
408 Multiple queue support allows the back-end to advertise the maximum number of
409 queues. This is treated as a protocol extension, hence the back-end has to
410 implement protocol features first. The multiple queues feature is supported
411 only when the protocol feature ``VHOST_USER_PROTOCOL_F_MQ`` (bit 0) is set.
413 The max number of queues the back-end supports can be queried with message
414 ``VHOST_USER_GET_QUEUE_NUM``. Front-end should stop when the number of requested
415 queues is bigger than that.
417 As all queues share one connection, the front-end uses a unique index for each
418 queue in the sent message to identify a specified queue.
420 The front-end enables queues by sending message ``VHOST_USER_SET_VRING_ENABLE``.
421 vhost-user-net has historically automatically enabled the first queue pair.
423 Back-ends should always implement the ``VHOST_USER_PROTOCOL_F_MQ`` protocol
424 feature, even for devices with a fixed number of virtqueues, since it is simple
425 to implement and offers a degree of introspection.
427 Front-ends must not rely on the ``VHOST_USER_PROTOCOL_F_MQ`` protocol feature for
428 devices with a fixed number of virtqueues. Only true multiqueue devices
429 require this protocol feature.
434 During live migration, the front-end may need to track the modifications
435 the back-end makes to the memory mapped regions. The front-end should mark
436 the dirty pages in a log. Once it complies to this logging, it may
437 declare the ``VHOST_F_LOG_ALL`` vhost feature.
439 To start/stop logging of data/used ring writes, the front-end may send
440 messages ``VHOST_USER_SET_FEATURES`` with ``VHOST_F_LOG_ALL`` and
441 ``VHOST_USER_SET_VRING_ADDR`` with ``VHOST_VRING_F_LOG`` in ring's
442 flags set to 1/0, respectively.
444 All the modifications to memory pointed by vring "descriptor" should
445 be marked. Modifications to "used" vring should be marked if
446 ``VHOST_VRING_F_LOG`` is part of ring's flags.
448 Dirty pages are of size::
450 #define VHOST_LOG_PAGE 0x1000
452 The log memory fd is provided in the ancillary data of
453 ``VHOST_USER_SET_LOG_BASE`` message when the back-end has
454 ``VHOST_USER_PROTOCOL_F_LOG_SHMFD`` protocol feature.
456 The size of the log is supplied as part of ``VhostUserMsg`` which
457 should be large enough to cover all known guest addresses. Log starts
458 at the supplied offset in the supplied file descriptor. The log
459 covers from address 0 to the maximum of guest regions. In pseudo-code,
460 to mark page at ``addr`` as dirty::
462 page = addr / VHOST_LOG_PAGE
463 log[page / 8] |= 1 << page % 8
465 Where ``addr`` is the guest physical address.
467 Use atomic operations, as the log may be concurrently manipulated.
469 Note that when logging modifications to the used ring (when
470 ``VHOST_VRING_F_LOG`` is set for this ring), ``log_guest_addr`` should
471 be used to calculate the log offset: the write to first byte of the
472 used ring is logged at this offset from log start. Also note that this
473 value might be outside the legal guest physical address range
474 (i.e. does not have to be covered by the ``VhostUserMemory`` table), but
475 the bit offset of the last byte of the ring must fall within the size
476 supplied by ``VhostUserLog``.
478 ``VHOST_USER_SET_LOG_FD`` is an optional message with an eventfd in
479 ancillary data, it may be used to inform the front-end that the log has
482 Once the source has finished migration, rings will be stopped by the
483 source. No further update must be done before rings are restarted.
485 In postcopy migration the back-end is started before all the memory has
486 been received from the source host, and care must be taken to avoid
487 accessing pages that have yet to be received. The back-end opens a
488 'userfault'-fd and registers the memory with it; this fd is then
489 passed back over to the front-end. The front-end services requests on the
490 userfaultfd for pages that are accessed and when the page is available
491 it performs WAKE ioctl's on the userfaultfd to wake the stalled
492 back-end. The front-end indicates support for this via the
493 ``VHOST_USER_PROTOCOL_F_PAGEFAULT`` feature.
498 The front-end sends a list of vhost memory regions to the back-end using the
499 ``VHOST_USER_SET_MEM_TABLE`` message. Each region has two base
500 addresses: a guest address and a user address.
502 Messages contain guest addresses and/or user addresses to reference locations
503 within the shared memory. The mapping of these addresses works as follows.
505 User addresses map to the vhost memory region containing that user address.
507 When the ``VIRTIO_F_IOMMU_PLATFORM`` feature has not been negotiated:
509 * Guest addresses map to the vhost memory region containing that guest
512 When the ``VIRTIO_F_IOMMU_PLATFORM`` feature has been negotiated:
514 * Guest addresses are also called I/O virtual addresses (IOVAs). They are
515 translated to user addresses via the IOTLB.
517 * The vhost memory region guest address is not used.
522 When the ``VIRTIO_F_IOMMU_PLATFORM`` feature has been negotiated, the
523 front-end sends IOTLB entries update & invalidation by sending
524 ``VHOST_USER_IOTLB_MSG`` requests to the back-end with a ``struct
525 vhost_iotlb_msg`` as payload. For update events, the ``iotlb`` payload
526 has to be filled with the update message type (2), the I/O virtual
527 address, the size, the user virtual address, and the permissions
528 flags. Addresses and size must be within vhost memory regions set via
529 the ``VHOST_USER_SET_MEM_TABLE`` request. For invalidation events, the
530 ``iotlb`` payload has to be filled with the invalidation message type
531 (3), the I/O virtual address and the size. On success, the back-end is
532 expected to reply with a zero payload, non-zero otherwise.
534 The back-end relies on the back-end communication channel (see :ref:`Back-end
535 communication <backend_communication>` section below) to send IOTLB miss
536 and access failure events, by sending ``VHOST_USER_BACKEND_IOTLB_MSG``
537 requests to the front-end with a ``struct vhost_iotlb_msg`` as
538 payload. For miss events, the iotlb payload has to be filled with the
539 miss message type (1), the I/O virtual address and the permissions
540 flags. For access failure event, the iotlb payload has to be filled
541 with the access failure message type (4), the I/O virtual address and
542 the permissions flags. For synchronization purpose, the back-end may
543 rely on the reply-ack feature, so the front-end may send a reply when
544 operation is completed if the reply-ack feature is negotiated and
545 back-ends requests a reply. For miss events, completed operation means
546 either front-end sent an update message containing the IOTLB entry
547 containing requested address and permission, or front-end sent nothing if
548 the IOTLB miss message is invalid (invalid IOVA or permission).
550 The front-end isn't expected to take the initiative to send IOTLB update
551 messages, as the back-end sends IOTLB miss messages for the guest virtual
552 memory areas it needs to access.
554 .. _backend_communication:
556 Back-end communication
557 ----------------------
559 An optional communication channel is provided if the back-end declares
560 ``VHOST_USER_PROTOCOL_F_BACKEND_REQ`` protocol feature, to allow the
561 back-end to make requests to the front-end.
563 The fd is provided via ``VHOST_USER_SET_BACKEND_REQ_FD`` ancillary data.
565 A back-end may then send ``VHOST_USER_BACKEND_*`` messages to the front-end
566 using this fd communication channel.
568 If ``VHOST_USER_PROTOCOL_F_BACKEND_SEND_FD`` protocol feature is
569 negotiated, back-end can send file descriptors (at most 8 descriptors in
570 each message) to front-end via ancillary data using this fd communication
573 Inflight I/O tracking
574 ---------------------
576 To support reconnecting after restart or crash, back-end may need to
577 resubmit inflight I/Os. If virtqueue is processed in order, we can
578 easily achieve that by getting the inflight descriptors from
579 descriptor table (split virtqueue) or descriptor ring (packed
580 virtqueue). However, it can't work when we process descriptors
581 out-of-order because some entries which store the information of
582 inflight descriptors in available ring (split virtqueue) or descriptor
583 ring (packed virtqueue) might be overridden by new entries. To solve
584 this problem, the back-end need to allocate an extra buffer to store this
585 information of inflight descriptors and share it with front-end for
586 persistent. ``VHOST_USER_GET_INFLIGHT_FD`` and
587 ``VHOST_USER_SET_INFLIGHT_FD`` are used to transfer this buffer
588 between front-end and back-end. And the format of this buffer is described
591 +---------------+---------------+-----+---------------+
592 | queue0 region | queue1 region | ... | queueN region |
593 +---------------+---------------+-----+---------------+
595 N is the number of available virtqueues. The back-end could get it from num
596 queues field of ``VhostUserInflight``.
598 For split virtqueue, queue region can be implemented as:
602 typedef struct DescStateSplit {
603 /* Indicate whether this descriptor is inflight or not.
604 * Only available for head-descriptor. */
610 /* Maintain a list for the last batch of used descriptors.
611 * Only available when batching is used for submitting */
614 /* Used to preserve the order of fetching available descriptors.
615 * Only available for head-descriptor. */
619 typedef struct QueueRegionSplit {
620 /* The feature flags of this region. Now it's initialized to 0. */
623 /* The version of this region. It's 1 currently.
624 * Zero value indicates an uninitialized buffer */
627 /* The size of DescStateSplit array. It's equal to the virtqueue size.
628 * The back-end could get it from queue size field of VhostUserInflight. */
631 /* The head of list that track the last batch of used descriptors. */
632 uint16_t last_batch_head;
634 /* Store the idx value of used ring */
637 /* Used to track the state of each descriptor in descriptor table */
638 DescStateSplit desc[];
641 To track inflight I/O, the queue region should be processed as follows:
643 When receiving available buffers from the driver:
645 #. Get the next available head-descriptor index from available ring, ``i``
647 #. Set ``desc[i].counter`` to the value of global counter
649 #. Increase global counter by 1
651 #. Set ``desc[i].inflight`` to 1
653 When supplying used buffers to the driver:
655 1. Get corresponding used head-descriptor index, i
657 2. Set ``desc[i].next`` to ``last_batch_head``
659 3. Set ``last_batch_head`` to ``i``
661 #. Steps 1,2,3 may be performed repeatedly if batching is possible
663 #. Increase the ``idx`` value of used ring by the size of the batch
665 #. Set the ``inflight`` field of each ``DescStateSplit`` entry in the batch to 0
667 #. Set ``used_idx`` to the ``idx`` value of used ring
671 #. If the value of ``used_idx`` does not match the ``idx`` value of
672 used ring (means the inflight field of ``DescStateSplit`` entries in
673 last batch may be incorrect),
675 a. Subtract the value of ``used_idx`` from the ``idx`` value of
676 used ring to get last batch size of ``DescStateSplit`` entries
678 #. Set the ``inflight`` field of each ``DescStateSplit`` entry to 0 in last batch
679 list which starts from ``last_batch_head``
681 #. Set ``used_idx`` to the ``idx`` value of used ring
683 #. Resubmit inflight ``DescStateSplit`` entries in order of their
686 For packed virtqueue, queue region can be implemented as:
690 typedef struct DescStatePacked {
691 /* Indicate whether this descriptor is inflight or not.
692 * Only available for head-descriptor. */
698 /* Link to the next free entry */
701 /* Link to the last entry of descriptor list.
702 * Only available for head-descriptor. */
705 /* The length of descriptor list.
706 * Only available for head-descriptor. */
709 /* Used to preserve the order of fetching available descriptors.
710 * Only available for head-descriptor. */
716 /* The descriptor flags */
719 /* The buffer length */
722 /* The buffer address */
726 typedef struct QueueRegionPacked {
727 /* The feature flags of this region. Now it's initialized to 0. */
730 /* The version of this region. It's 1 currently.
731 * Zero value indicates an uninitialized buffer */
734 /* The size of DescStatePacked array. It's equal to the virtqueue size.
735 * The back-end could get it from queue size field of VhostUserInflight. */
738 /* The head of free DescStatePacked entry list */
741 /* The old head of free DescStatePacked entry list */
742 uint16_t old_free_head;
744 /* The used index of descriptor ring */
747 /* The old used index of descriptor ring */
748 uint16_t old_used_idx;
750 /* Device ring wrap counter */
751 uint8_t used_wrap_counter;
753 /* The old device ring wrap counter */
754 uint8_t old_used_wrap_counter;
759 /* Used to track the state of each descriptor fetched from descriptor ring */
760 DescStatePacked desc[];
763 To track inflight I/O, the queue region should be processed as follows:
765 When receiving available buffers from the driver:
767 #. Get the next available descriptor entry from descriptor ring, ``d``
769 #. If ``d`` is head descriptor,
771 a. Set ``desc[old_free_head].num`` to 0
773 #. Set ``desc[old_free_head].counter`` to the value of global counter
775 #. Increase global counter by 1
777 #. Set ``desc[old_free_head].inflight`` to 1
779 #. If ``d`` is last descriptor, set ``desc[old_free_head].last`` to
782 #. Increase ``desc[old_free_head].num`` by 1
784 #. Set ``desc[free_head].addr``, ``desc[free_head].len``,
785 ``desc[free_head].flags``, ``desc[free_head].id`` to ``d.addr``,
786 ``d.len``, ``d.flags``, ``d.id``
788 #. Set ``free_head`` to ``desc[free_head].next``
790 #. If ``d`` is last descriptor, set ``old_free_head`` to ``free_head``
792 When supplying used buffers to the driver:
794 1. Get corresponding used head-descriptor entry from descriptor ring,
797 2. Get corresponding ``DescStatePacked`` entry, ``e``
799 3. Set ``desc[e.last].next`` to ``free_head``
801 4. Set ``free_head`` to the index of ``e``
803 #. Steps 1,2,3,4 may be performed repeatedly if batching is possible
805 #. Increase ``used_idx`` by the size of the batch and update
806 ``used_wrap_counter`` if needed
808 #. Update ``d.flags``
810 #. Set the ``inflight`` field of each head ``DescStatePacked`` entry
813 #. Set ``old_free_head``, ``old_used_idx``, ``old_used_wrap_counter``
814 to ``free_head``, ``used_idx``, ``used_wrap_counter``
818 #. If ``used_idx`` does not match ``old_used_idx`` (means the
819 ``inflight`` field of ``DescStatePacked`` entries in last batch may
822 a. Get the next descriptor ring entry through ``old_used_idx``, ``d``
824 #. Use ``old_used_wrap_counter`` to calculate the available flags
826 #. If ``d.flags`` is not equal to the calculated flags value (means
827 back-end has submitted the buffer to guest driver before crash, so
828 it has to commit the in-progres update), set ``old_free_head``,
829 ``old_used_idx``, ``old_used_wrap_counter`` to ``free_head``,
830 ``used_idx``, ``used_wrap_counter``
832 #. Set ``free_head``, ``used_idx``, ``used_wrap_counter`` to
833 ``old_free_head``, ``old_used_idx``, ``old_used_wrap_counter``
834 (roll back any in-progress update)
836 #. Set the ``inflight`` field of each ``DescStatePacked`` entry in
839 #. Resubmit inflight ``DescStatePacked`` entries in order of their
842 In-band notifications
843 ---------------------
845 In some limited situations (e.g. for simulation) it is desirable to
846 have the kick, call and error (if used) signals done via in-band
847 messages instead of asynchronous eventfd notifications. This can be
848 done by negotiating the ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS``
851 Note that due to the fact that too many messages on the sockets can
852 cause the sending application(s) to block, it is not advised to use
853 this feature unless absolutely necessary. It is also considered an
854 error to negotiate this feature without also negotiating
855 ``VHOST_USER_PROTOCOL_F_BACKEND_REQ`` and ``VHOST_USER_PROTOCOL_F_REPLY_ACK``,
856 the former is necessary for getting a message channel from the back-end
857 to the front-end, while the latter needs to be used with the in-band
858 notification messages to block until they are processed, both to avoid
859 blocking later and for proper processing (at least in the simulation
860 use case.) As it has no other way of signalling this error, the back-end
861 should close the connection as a response to a
862 ``VHOST_USER_SET_PROTOCOL_FEATURES`` message that sets the in-band
863 notifications feature flag without the other two.
870 #define VHOST_USER_PROTOCOL_F_MQ 0
871 #define VHOST_USER_PROTOCOL_F_LOG_SHMFD 1
872 #define VHOST_USER_PROTOCOL_F_RARP 2
873 #define VHOST_USER_PROTOCOL_F_REPLY_ACK 3
874 #define VHOST_USER_PROTOCOL_F_MTU 4
875 #define VHOST_USER_PROTOCOL_F_BACKEND_REQ 5
876 #define VHOST_USER_PROTOCOL_F_CROSS_ENDIAN 6
877 #define VHOST_USER_PROTOCOL_F_CRYPTO_SESSION 7
878 #define VHOST_USER_PROTOCOL_F_PAGEFAULT 8
879 #define VHOST_USER_PROTOCOL_F_CONFIG 9
880 #define VHOST_USER_PROTOCOL_F_BACKEND_SEND_FD 10
881 #define VHOST_USER_PROTOCOL_F_HOST_NOTIFIER 11
882 #define VHOST_USER_PROTOCOL_F_INFLIGHT_SHMFD 12
883 #define VHOST_USER_PROTOCOL_F_RESET_DEVICE 13
884 #define VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS 14
885 #define VHOST_USER_PROTOCOL_F_CONFIGURE_MEM_SLOTS 15
886 #define VHOST_USER_PROTOCOL_F_STATUS 16
887 #define VHOST_USER_PROTOCOL_F_XEN_MMAP 17
889 Front-end message types
890 -----------------------
892 ``VHOST_USER_GET_FEATURES``
894 :equivalent ioctl: ``VHOST_GET_FEATURES``
895 :request payload: N/A
896 :reply payload: ``u64``
898 Get from the underlying vhost implementation the features bitmask.
899 Feature bit ``VHOST_USER_F_PROTOCOL_FEATURES`` signals back-end support
900 for ``VHOST_USER_GET_PROTOCOL_FEATURES`` and
901 ``VHOST_USER_SET_PROTOCOL_FEATURES``.
903 ``VHOST_USER_SET_FEATURES``
905 :equivalent ioctl: ``VHOST_SET_FEATURES``
906 :request payload: ``u64``
909 Enable features in the underlying vhost implementation using a
910 bitmask. Feature bit ``VHOST_USER_F_PROTOCOL_FEATURES`` signals
911 back-end support for ``VHOST_USER_GET_PROTOCOL_FEATURES`` and
912 ``VHOST_USER_SET_PROTOCOL_FEATURES``.
914 ``VHOST_USER_GET_PROTOCOL_FEATURES``
916 :equivalent ioctl: ``VHOST_GET_FEATURES``
917 :request payload: N/A
918 :reply payload: ``u64``
920 Get the protocol feature bitmask from the underlying vhost
921 implementation. Only legal if feature bit
922 ``VHOST_USER_F_PROTOCOL_FEATURES`` is present in
923 ``VHOST_USER_GET_FEATURES``. It does not need to be acknowledged by
924 ``VHOST_USER_SET_FEATURES``.
927 Back-ends that report ``VHOST_USER_F_PROTOCOL_FEATURES`` must
928 support this message even before ``VHOST_USER_SET_FEATURES`` was
931 ``VHOST_USER_SET_PROTOCOL_FEATURES``
933 :equivalent ioctl: ``VHOST_SET_FEATURES``
934 :request payload: ``u64``
937 Enable protocol features in the underlying vhost implementation.
939 Only legal if feature bit ``VHOST_USER_F_PROTOCOL_FEATURES`` is present in
940 ``VHOST_USER_GET_FEATURES``. It does not need to be acknowledged by
941 ``VHOST_USER_SET_FEATURES``.
944 Back-ends that report ``VHOST_USER_F_PROTOCOL_FEATURES`` must support
945 this message even before ``VHOST_USER_SET_FEATURES`` was called.
947 ``VHOST_USER_SET_OWNER``
949 :equivalent ioctl: ``VHOST_SET_OWNER``
950 :request payload: N/A
953 Issued when a new connection is established. It marks the sender
954 as the front-end that owns of the session. This can be used on the *back-end*
955 as a "session start" flag.
957 ``VHOST_USER_RESET_OWNER``
959 :request payload: N/A
962 .. admonition:: Deprecated
964 This is no longer used. Used to be sent to request disabling all
965 rings, but some back-ends interpreted it to also discard connection
966 state (this interpretation would lead to bugs). It is recommended
967 that back-ends either ignore this message, or use it to disable all
970 ``VHOST_USER_SET_MEM_TABLE``
972 :equivalent ioctl: ``VHOST_SET_MEM_TABLE``
973 :request payload: multiple memory regions description
974 :reply payload: (postcopy only) multiple memory regions description
976 Sets the memory map regions on the back-end so it can translate the
977 vring addresses. In the ancillary data there is an array of file
978 descriptors for each memory mapped region. The size and ordering of
979 the fds matches the number and ordering of memory regions.
981 When ``VHOST_USER_POSTCOPY_LISTEN`` has been received,
982 ``SET_MEM_TABLE`` replies with the bases of the memory mapped
983 regions to the front-end. The back-end must have mmap'd the regions but
984 not yet accessed them and should not yet generate a userfault
988 ``NEED_REPLY_MASK`` is not set in this case. QEMU will then
989 reply back to the list of mappings with an empty
990 ``VHOST_USER_SET_MEM_TABLE`` as an acknowledgement; only upon
991 reception of this message may the guest start accessing the memory
992 and generating faults.
994 ``VHOST_USER_SET_LOG_BASE``
996 :equivalent ioctl: ``VHOST_SET_LOG_BASE``
997 :request payload: u64
1000 Sets logging shared memory space.
1002 When the back-end has ``VHOST_USER_PROTOCOL_F_LOG_SHMFD`` protocol feature,
1003 the log memory fd is provided in the ancillary data of
1004 ``VHOST_USER_SET_LOG_BASE`` message, the size and offset of shared
1005 memory area provided in the message.
1007 ``VHOST_USER_SET_LOG_FD``
1009 :equivalent ioctl: ``VHOST_SET_LOG_FD``
1010 :request payload: N/A
1013 Sets the logging file descriptor, which is passed as ancillary data.
1015 ``VHOST_USER_SET_VRING_NUM``
1017 :equivalent ioctl: ``VHOST_SET_VRING_NUM``
1018 :request payload: vring state description
1021 Set the size of the queue.
1023 ``VHOST_USER_SET_VRING_ADDR``
1025 :equivalent ioctl: ``VHOST_SET_VRING_ADDR``
1026 :request payload: vring address description
1029 Sets the addresses of the different aspects of the vring.
1031 ``VHOST_USER_SET_VRING_BASE``
1033 :equivalent ioctl: ``VHOST_SET_VRING_BASE``
1034 :request payload: vring state description
1037 Sets the base offset in the available vring.
1039 ``VHOST_USER_GET_VRING_BASE``
1041 :equivalent ioctl: ``VHOST_USER_GET_VRING_BASE``
1042 :request payload: vring state description
1043 :reply payload: vring state description
1045 Get the available vring base offset.
1047 ``VHOST_USER_SET_VRING_KICK``
1049 :equivalent ioctl: ``VHOST_SET_VRING_KICK``
1050 :request payload: ``u64``
1053 Set the event file descriptor for adding buffers to the vring. It is
1054 passed in the ancillary data.
1056 Bits (0-7) of the payload contain the vring index. Bit 8 is the
1057 invalid FD flag. This flag is set when there is no file descriptor
1058 in the ancillary data. This signals that polling should be used
1059 instead of waiting for the kick. Note that if the protocol feature
1060 ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS`` has been negotiated
1061 this message isn't necessary as the ring is also started on the
1062 ``VHOST_USER_VRING_KICK`` message, it may however still be used to
1063 set an event file descriptor (which will be preferred over the
1064 message) or to enable polling.
1066 ``VHOST_USER_SET_VRING_CALL``
1068 :equivalent ioctl: ``VHOST_SET_VRING_CALL``
1069 :request payload: ``u64``
1072 Set the event file descriptor to signal when buffers are used. It is
1073 passed in the ancillary data.
1075 Bits (0-7) of the payload contain the vring index. Bit 8 is the
1076 invalid FD flag. This flag is set when there is no file descriptor
1077 in the ancillary data. This signals that polling will be used
1078 instead of waiting for the call. Note that if the protocol features
1079 ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS`` and
1080 ``VHOST_USER_PROTOCOL_F_BACKEND_REQ`` have been negotiated this message
1081 isn't necessary as the ``VHOST_USER_BACKEND_VRING_CALL`` message can be
1082 used, it may however still be used to set an event file descriptor
1083 or to enable polling.
1085 ``VHOST_USER_SET_VRING_ERR``
1087 :equivalent ioctl: ``VHOST_SET_VRING_ERR``
1088 :request payload: ``u64``
1091 Set the event file descriptor to signal when error occurs. It is
1092 passed in the ancillary data.
1094 Bits (0-7) of the payload contain the vring index. Bit 8 is the
1095 invalid FD flag. This flag is set when there is no file descriptor
1096 in the ancillary data. Note that if the protocol features
1097 ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS`` and
1098 ``VHOST_USER_PROTOCOL_F_BACKEND_REQ`` have been negotiated this message
1099 isn't necessary as the ``VHOST_USER_BACKEND_VRING_ERR`` message can be
1100 used, it may however still be used to set an event file descriptor
1101 (which will be preferred over the message).
1103 ``VHOST_USER_GET_QUEUE_NUM``
1105 :equivalent ioctl: N/A
1106 :request payload: N/A
1109 Query how many queues the back-end supports.
1111 This request should be sent only when ``VHOST_USER_PROTOCOL_F_MQ``
1112 is set in queried protocol features by
1113 ``VHOST_USER_GET_PROTOCOL_FEATURES``.
1115 ``VHOST_USER_SET_VRING_ENABLE``
1117 :equivalent ioctl: N/A
1118 :request payload: vring state description
1121 Signal the back-end to enable or disable corresponding vring.
1123 This request should be sent only when
1124 ``VHOST_USER_F_PROTOCOL_FEATURES`` has been negotiated.
1126 ``VHOST_USER_SEND_RARP``
1128 :equivalent ioctl: N/A
1129 :request payload: ``u64``
1132 Ask vhost user back-end to broadcast a fake RARP to notify the migration
1133 is terminated for guest that does not support GUEST_ANNOUNCE.
1135 Only legal if feature bit ``VHOST_USER_F_PROTOCOL_FEATURES`` is
1136 present in ``VHOST_USER_GET_FEATURES`` and protocol feature bit
1137 ``VHOST_USER_PROTOCOL_F_RARP`` is present in
1138 ``VHOST_USER_GET_PROTOCOL_FEATURES``. The first 6 bytes of the
1139 payload contain the mac address of the guest to allow the vhost user
1140 back-end to construct and broadcast the fake RARP.
1142 ``VHOST_USER_NET_SET_MTU``
1144 :equivalent ioctl: N/A
1145 :request payload: ``u64``
1148 Set host MTU value exposed to the guest.
1150 This request should be sent only when ``VIRTIO_NET_F_MTU`` feature
1151 has been successfully negotiated, ``VHOST_USER_F_PROTOCOL_FEATURES``
1152 is present in ``VHOST_USER_GET_FEATURES`` and protocol feature bit
1153 ``VHOST_USER_PROTOCOL_F_NET_MTU`` is present in
1154 ``VHOST_USER_GET_PROTOCOL_FEATURES``.
1156 If ``VHOST_USER_PROTOCOL_F_REPLY_ACK`` is negotiated, the back-end must
1157 respond with zero in case the specified MTU is valid, or non-zero
1160 ``VHOST_USER_SET_BACKEND_REQ_FD`` (previous name ``VHOST_USER_SET_SLAVE_REQ_FD``)
1162 :equivalent ioctl: N/A
1163 :request payload: N/A
1166 Set the socket file descriptor for back-end initiated requests. It is passed
1167 in the ancillary data.
1169 This request should be sent only when
1170 ``VHOST_USER_F_PROTOCOL_FEATURES`` has been negotiated, and protocol
1171 feature bit ``VHOST_USER_PROTOCOL_F_BACKEND_REQ`` bit is present in
1172 ``VHOST_USER_GET_PROTOCOL_FEATURES``. If
1173 ``VHOST_USER_PROTOCOL_F_REPLY_ACK`` is negotiated, the back-end must
1174 respond with zero for success, non-zero otherwise.
1176 ``VHOST_USER_IOTLB_MSG``
1178 :equivalent ioctl: N/A (equivalent to ``VHOST_IOTLB_MSG`` message type)
1179 :request payload: ``struct vhost_iotlb_msg``
1180 :reply payload: ``u64``
1182 Send IOTLB messages with ``struct vhost_iotlb_msg`` as payload.
1184 The front-end sends such requests to update and invalidate entries in the
1185 device IOTLB. The back-end has to acknowledge the request with sending
1186 zero as ``u64`` payload for success, non-zero otherwise.
1188 This request should be send only when ``VIRTIO_F_IOMMU_PLATFORM``
1189 feature has been successfully negotiated.
1191 ``VHOST_USER_SET_VRING_ENDIAN``
1193 :equivalent ioctl: ``VHOST_SET_VRING_ENDIAN``
1194 :request payload: vring state description
1197 Set the endianness of a VQ for legacy devices. Little-endian is
1198 indicated with state.num set to 0 and big-endian is indicated with
1199 state.num set to 1. Other values are invalid.
1201 This request should be sent only when
1202 ``VHOST_USER_PROTOCOL_F_CROSS_ENDIAN`` has been negotiated.
1203 Backends that negotiated this feature should handle both
1204 endiannesses and expect this message once (per VQ) during device
1205 configuration (ie. before the front-end starts the VQ).
1207 ``VHOST_USER_GET_CONFIG``
1209 :equivalent ioctl: N/A
1210 :request payload: virtio device config space
1211 :reply payload: virtio device config space
1213 When ``VHOST_USER_PROTOCOL_F_CONFIG`` is negotiated, this message is
1214 submitted by the vhost-user front-end to fetch the contents of the
1215 virtio device configuration space, vhost-user back-end's payload size
1216 MUST match the front-end's request, vhost-user back-end uses zero length of
1217 payload to indicate an error to the vhost-user front-end. The vhost-user
1218 front-end may cache the contents to avoid repeated
1219 ``VHOST_USER_GET_CONFIG`` calls.
1221 ``VHOST_USER_SET_CONFIG``
1223 :equivalent ioctl: N/A
1224 :request payload: virtio device config space
1227 When ``VHOST_USER_PROTOCOL_F_CONFIG`` is negotiated, this message is
1228 submitted by the vhost-user front-end when the Guest changes the virtio
1229 device configuration space and also can be used for live migration
1230 on the destination host. The vhost-user back-end must check the flags
1231 field, and back-ends MUST NOT accept SET_CONFIG for read-only
1232 configuration space fields unless the live migration bit is set.
1234 ``VHOST_USER_CREATE_CRYPTO_SESSION``
1236 :equivalent ioctl: N/A
1237 :request payload: crypto session description
1238 :reply payload: crypto session description
1240 Create a session for crypto operation. The back-end must return
1241 the session id, 0 or positive for success, negative for failure.
1242 This request should be sent only when
1243 ``VHOST_USER_PROTOCOL_F_CRYPTO_SESSION`` feature has been
1244 successfully negotiated. It's a required feature for crypto
1247 ``VHOST_USER_CLOSE_CRYPTO_SESSION``
1249 :equivalent ioctl: N/A
1250 :request payload: ``u64``
1253 Close a session for crypto operation which was previously
1254 created by ``VHOST_USER_CREATE_CRYPTO_SESSION``.
1256 This request should be sent only when
1257 ``VHOST_USER_PROTOCOL_F_CRYPTO_SESSION`` feature has been
1258 successfully negotiated. It's a required feature for crypto
1261 ``VHOST_USER_POSTCOPY_ADVISE``
1263 :request payload: N/A
1264 :reply payload: userfault fd
1266 When ``VHOST_USER_PROTOCOL_F_PAGEFAULT`` is supported, the front-end
1267 advises back-end that a migration with postcopy enabled is underway,
1268 the back-end must open a userfaultfd for later use. Note that at this
1269 stage the migration is still in precopy mode.
1271 ``VHOST_USER_POSTCOPY_LISTEN``
1273 :request payload: N/A
1276 The front-end advises back-end that a transition to postcopy mode has
1277 happened. The back-end must ensure that shared memory is registered
1278 with userfaultfd to cause faulting of non-present pages.
1280 This is always sent sometime after a ``VHOST_USER_POSTCOPY_ADVISE``,
1281 and thus only when ``VHOST_USER_PROTOCOL_F_PAGEFAULT`` is supported.
1283 ``VHOST_USER_POSTCOPY_END``
1285 :request payload: N/A
1286 :reply payload: ``u64``
1288 The front-end advises that postcopy migration has now completed. The back-end
1289 must disable the userfaultfd. The reply is an acknowledgement
1292 When ``VHOST_USER_PROTOCOL_F_PAGEFAULT`` is supported, this message
1293 is sent at the end of the migration, after
1294 ``VHOST_USER_POSTCOPY_LISTEN`` was previously sent.
1296 The value returned is an error indication; 0 is success.
1298 ``VHOST_USER_GET_INFLIGHT_FD``
1300 :equivalent ioctl: N/A
1301 :request payload: inflight description
1304 When ``VHOST_USER_PROTOCOL_F_INFLIGHT_SHMFD`` protocol feature has
1305 been successfully negotiated, this message is submitted by the front-end to
1306 get a shared buffer from back-end. The shared buffer will be used to
1307 track inflight I/O by back-end. QEMU should retrieve a new one when vm
1310 ``VHOST_USER_SET_INFLIGHT_FD``
1312 :equivalent ioctl: N/A
1313 :request payload: inflight description
1316 When ``VHOST_USER_PROTOCOL_F_INFLIGHT_SHMFD`` protocol feature has
1317 been successfully negotiated, this message is submitted by the front-end to
1318 send the shared inflight buffer back to the back-end so that the back-end
1319 could get inflight I/O after a crash or restart.
1321 ``VHOST_USER_GPU_SET_SOCKET``
1323 :equivalent ioctl: N/A
1324 :request payload: N/A
1327 Sets the GPU protocol socket file descriptor, which is passed as
1328 ancillary data. The GPU protocol is used to inform the front-end of
1329 rendering state and updates. See vhost-user-gpu.rst for details.
1331 ``VHOST_USER_RESET_DEVICE``
1333 :equivalent ioctl: N/A
1334 :request payload: N/A
1337 Ask the vhost user back-end to disable all rings and reset all
1338 internal device state to the initial state, ready to be
1339 reinitialized. The back-end retains ownership of the device
1340 throughout the reset operation.
1342 Only valid if the ``VHOST_USER_PROTOCOL_F_RESET_DEVICE`` protocol
1343 feature is set by the back-end.
1345 ``VHOST_USER_VRING_KICK``
1347 :equivalent ioctl: N/A
1348 :request payload: vring state description
1351 When the ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS`` protocol
1352 feature has been successfully negotiated, this message may be
1353 submitted by the front-end to indicate that a buffer was added to
1354 the vring instead of signalling it using the vring's kick file
1355 descriptor or having the back-end rely on polling.
1357 The state.num field is currently reserved and must be set to 0.
1359 ``VHOST_USER_GET_MAX_MEM_SLOTS``
1361 :equivalent ioctl: N/A
1362 :request payload: N/A
1365 When the ``VHOST_USER_PROTOCOL_F_CONFIGURE_MEM_SLOTS`` protocol
1366 feature has been successfully negotiated, this message is submitted
1367 by the front-end to the back-end. The back-end should return the message with a
1368 u64 payload containing the maximum number of memory slots for
1369 QEMU to expose to the guest. The value returned by the back-end
1370 will be capped at the maximum number of ram slots which can be
1371 supported by the target platform.
1373 ``VHOST_USER_ADD_MEM_REG``
1375 :equivalent ioctl: N/A
1376 :request payload: N/A
1377 :reply payload: single memory region description
1379 When the ``VHOST_USER_PROTOCOL_F_CONFIGURE_MEM_SLOTS`` protocol
1380 feature has been successfully negotiated, this message is submitted
1381 by the front-end to the back-end. The message payload contains a memory
1382 region descriptor struct, describing a region of guest memory which
1383 the back-end device must map in. When the
1384 ``VHOST_USER_PROTOCOL_F_CONFIGURE_MEM_SLOTS`` protocol feature has
1385 been successfully negotiated, along with the
1386 ``VHOST_USER_REM_MEM_REG`` message, this message is used to set and
1387 update the memory tables of the back-end device.
1389 Exactly one file descriptor from which the memory is mapped is
1390 passed in the ancillary data.
1392 In postcopy mode (see ``VHOST_USER_POSTCOPY_LISTEN``), the back-end
1393 replies with the bases of the memory mapped region to the front-end.
1394 For further details on postcopy, see ``VHOST_USER_SET_MEM_TABLE``.
1395 They apply to ``VHOST_USER_ADD_MEM_REG`` accordingly.
1397 ``VHOST_USER_REM_MEM_REG``
1399 :equivalent ioctl: N/A
1400 :request payload: N/A
1401 :reply payload: single memory region description
1403 When the ``VHOST_USER_PROTOCOL_F_CONFIGURE_MEM_SLOTS`` protocol
1404 feature has been successfully negotiated, this message is submitted
1405 by the front-end to the back-end. The message payload contains a memory
1406 region descriptor struct, describing a region of guest memory which
1407 the back-end device must unmap. When the
1408 ``VHOST_USER_PROTOCOL_F_CONFIGURE_MEM_SLOTS`` protocol feature has
1409 been successfully negotiated, along with the
1410 ``VHOST_USER_ADD_MEM_REG`` message, this message is used to set and
1411 update the memory tables of the back-end device.
1413 The memory region to be removed is identified by its guest address,
1414 user address and size. The mmap offset is ignored.
1416 No file descriptors SHOULD be passed in the ancillary data. For
1417 compatibility with existing incorrect implementations, the back-end MAY
1418 accept messages with one file descriptor. If a file descriptor is
1419 passed, the back-end MUST close it without using it otherwise.
1421 ``VHOST_USER_SET_STATUS``
1423 :equivalent ioctl: VHOST_VDPA_SET_STATUS
1424 :request payload: ``u64``
1427 When the ``VHOST_USER_PROTOCOL_F_STATUS`` protocol feature has been
1428 successfully negotiated, this message is submitted by the front-end to
1429 notify the back-end with updated device status as defined in the Virtio
1432 ``VHOST_USER_GET_STATUS``
1434 :equivalent ioctl: VHOST_VDPA_GET_STATUS
1435 :request payload: N/A
1436 :reply payload: ``u64``
1438 When the ``VHOST_USER_PROTOCOL_F_STATUS`` protocol feature has been
1439 successfully negotiated, this message is submitted by the front-end to
1440 query the back-end for its device status as defined in the Virtio
1444 Back-end message types
1445 ----------------------
1447 For this type of message, the request is sent by the back-end and the reply
1448 is sent by the front-end.
1450 ``VHOST_USER_BACKEND_IOTLB_MSG`` (previous name ``VHOST_USER_SLAVE_IOTLB_MSG``)
1452 :equivalent ioctl: N/A (equivalent to ``VHOST_IOTLB_MSG`` message type)
1453 :request payload: ``struct vhost_iotlb_msg``
1456 Send IOTLB messages with ``struct vhost_iotlb_msg`` as payload.
1457 The back-end sends such requests to notify of an IOTLB miss, or an IOTLB
1458 access failure. If ``VHOST_USER_PROTOCOL_F_REPLY_ACK`` is
1459 negotiated, and back-end set the ``VHOST_USER_NEED_REPLY`` flag, the front-end
1460 must respond with zero when operation is successfully completed, or
1461 non-zero otherwise. This request should be send only when
1462 ``VIRTIO_F_IOMMU_PLATFORM`` feature has been successfully
1465 ``VHOST_USER_BACKEND_CONFIG_CHANGE_MSG`` (previous name ``VHOST_USER_SLAVE_CONFIG_CHANGE_MSG``)
1467 :equivalent ioctl: N/A
1468 :request payload: N/A
1471 When ``VHOST_USER_PROTOCOL_F_CONFIG`` is negotiated, vhost-user
1472 back-end sends such messages to notify that the virtio device's
1473 configuration space has changed, for those host devices which can
1474 support such feature, host driver can send ``VHOST_USER_GET_CONFIG``
1475 message to the back-end to get the latest content. If
1476 ``VHOST_USER_PROTOCOL_F_REPLY_ACK`` is negotiated, and the back-end sets the
1477 ``VHOST_USER_NEED_REPLY`` flag, the front-end must respond with zero when
1478 operation is successfully completed, or non-zero otherwise.
1480 ``VHOST_USER_BACKEND_VRING_HOST_NOTIFIER_MSG`` (previous name ``VHOST_USER_SLAVE_VRING_HOST_NOTIFIER_MSG``)
1482 :equivalent ioctl: N/A
1483 :request payload: vring area description
1486 Sets host notifier for a specified queue. The queue index is
1487 contained in the ``u64`` field of the vring area description. The
1488 host notifier is described by the file descriptor (typically it's a
1489 VFIO device fd) which is passed as ancillary data and the size
1490 (which is mmap size and should be the same as host page size) and
1491 offset (which is mmap offset) carried in the vring area
1492 description. QEMU can mmap the file descriptor based on the size and
1493 offset to get a memory range. Registering a host notifier means
1494 mapping this memory range to the VM as the specified queue's notify
1495 MMIO region. The back-end sends this request to tell QEMU to de-register
1496 the existing notifier if any and register the new notifier if the
1497 request is sent with a file descriptor.
1499 This request should be sent only when
1500 ``VHOST_USER_PROTOCOL_F_HOST_NOTIFIER`` protocol feature has been
1501 successfully negotiated.
1503 ``VHOST_USER_BACKEND_VRING_CALL`` (previous name ``VHOST_USER_SLAVE_VRING_CALL``)
1505 :equivalent ioctl: N/A
1506 :request payload: vring state description
1509 When the ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS`` protocol
1510 feature has been successfully negotiated, this message may be
1511 submitted by the back-end to indicate that a buffer was used from
1512 the vring instead of signalling this using the vring's call file
1513 descriptor or having the front-end relying on polling.
1515 The state.num field is currently reserved and must be set to 0.
1517 ``VHOST_USER_BACKEND_VRING_ERR`` (previous name ``VHOST_USER_SLAVE_VRING_ERR``)
1519 :equivalent ioctl: N/A
1520 :request payload: vring state description
1523 When the ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS`` protocol
1524 feature has been successfully negotiated, this message may be
1525 submitted by the back-end to indicate that an error occurred on the
1526 specific vring, instead of signalling the error file descriptor
1527 set by the front-end via ``VHOST_USER_SET_VRING_ERR``.
1529 The state.num field is currently reserved and must be set to 0.
1533 VHOST_USER_PROTOCOL_F_REPLY_ACK
1534 -------------------------------
1536 The original vhost-user specification only demands replies for certain
1537 commands. This differs from the vhost protocol implementation where
1538 commands are sent over an ``ioctl()`` call and block until the back-end
1541 With this protocol extension negotiated, the sender (QEMU) can set the
1542 ``need_reply`` [Bit 3] flag to any command. This indicates that the
1543 back-end MUST respond with a Payload ``VhostUserMsg`` indicating success
1544 or failure. The payload should be set to zero on success or non-zero
1545 on failure, unless the message already has an explicit reply body.
1547 The reply payload gives QEMU a deterministic indication of the result
1548 of the command. Today, QEMU is expected to terminate the main vhost-user
1549 loop upon receiving such errors. In future, qemu could be taught to be more
1550 resilient for selective requests.
1552 For the message types that already solicit a reply from the back-end,
1553 the presence of ``VHOST_USER_PROTOCOL_F_REPLY_ACK`` or need_reply bit
1554 being set brings no behavioural change. (See the Communication_
1555 section for details.)
1557 .. _backend_conventions:
1559 Backend program conventions
1560 ===========================
1562 vhost-user back-ends can provide various devices & services and may
1563 need to be configured manually depending on the use case. However, it
1564 is a good idea to follow the conventions listed here when
1565 possible. Users, QEMU or libvirt, can then rely on some common
1566 behaviour to avoid heterogeneous configuration and management of the
1567 back-end programs and facilitate interoperability.
1569 Each back-end installed on a host system should come with at least one
1570 JSON file that conforms to the vhost-user.json schema. Each file
1571 informs the management applications about the back-end type, and binary
1572 location. In addition, it defines rules for management apps for
1573 picking the highest priority back-end when multiple match the search
1574 criteria (see ``@VhostUserBackend`` documentation in the schema file).
1576 If the back-end is not capable of enabling a requested feature on the
1577 host (such as 3D acceleration with virgl), or the initialization
1578 failed, the back-end should fail to start early and exit with a status
1579 != 0. It may also print a message to stderr for further details.
1581 The back-end program must not daemonize itself, but it may be
1582 daemonized by the management layer. It may also have a restricted
1583 access to the system.
1585 File descriptors 0, 1 and 2 will exist, and have regular
1586 stdin/stdout/stderr usage (they may have been redirected to /dev/null
1587 by the management layer, or to a log handler).
1589 The back-end program must end (as quickly and cleanly as possible) when
1590 the SIGTERM signal is received. Eventually, it may receive SIGKILL by
1591 the management layer after a few seconds.
1593 The following command line options have an expected behaviour. They
1594 are mandatory, unless explicitly said differently:
1598 This option specify the location of the vhost-user Unix domain socket.
1599 It is incompatible with --fd.
1603 When this argument is given, the back-end program is started with the
1604 vhost-user socket as file descriptor FDNUM. It is incompatible with
1607 --print-capabilities
1609 Output to stdout the back-end capabilities in JSON format, and then
1610 exit successfully. Other options and arguments should be ignored, and
1611 the back-end program should not perform its normal function. The
1612 capabilities can be reported dynamically depending on the host
1615 The JSON output is described in the ``vhost-user.json`` schema, by
1616 ```@VHostUserBackendCapabilities``. Example:
1631 Command line options:
1635 Specify the linux input device.
1641 Do no request exclusive access to the input device.
1648 Command line options:
1652 Specify the GPU DRM render node.
1658 Enable virgl rendering support.
1665 Command line options:
1669 Specify block device or file path.