xref: /qemu/docs/interop/vhost-user.rst (revision f917eed3)
1===================
2Vhost-user Protocol
3===================
4:Copyright: 2014 Virtual Open Systems Sarl.
5:Copyright: 2019 Intel Corporation
6:Licence: This work is licensed under the terms of the GNU GPL,
7          version 2 or later. See the COPYING file in the top-level
8          directory.
9
10.. contents:: Table of Contents
11
12Introduction
13============
14
15This protocol is aiming to complement the ``ioctl`` interface used to
16control the vhost implementation in the Linux kernel. It implements
17the control plane needed to establish virtqueue sharing with a user
18space process on the same host. It uses communication over a Unix
19domain socket to share file descriptors in the ancillary data of the
20message.
21
22The protocol defines 2 sides of the communication, *master* and
23*slave*. *Master* is the application that shares its virtqueues, in
24our case QEMU. *Slave* is the consumer of the virtqueues.
25
26In the current implementation QEMU is the *master*, and the *slave* is
27the external process consuming the virtio queues, for example a
28software Ethernet switch running in user space, such as Snabbswitch,
29or a block device backend processing read & write to a virtual
30disk. In order to facilitate interoperability between various backend
31implementations, it is recommended to follow the :ref:`Backend program
32conventions <backend_conventions>`.
33
34*Master* and *slave* can be either a client (i.e. connecting) or
35server (listening) in the socket communication.
36
37Message Specification
38=====================
39
40.. Note:: All numbers are in the machine native byte order.
41
42A vhost-user message consists of 3 header fields and a payload.
43
44+---------+-------+------+---------+
45| request | flags | size | payload |
46+---------+-------+------+---------+
47
48Header
49------
50
51:request: 32-bit type of the request
52
53:flags: 32-bit bit field
54
55- Lower 2 bits are the version (currently 0x01)
56- Bit 2 is the reply flag - needs to be sent on each reply from the slave
57- Bit 3 is the need_reply flag - see :ref:`REPLY_ACK <reply_ack>` for
58  details.
59
60:size: 32-bit size of the payload
61
62Payload
63-------
64
65Depending on the request type, **payload** can be:
66
67A single 64-bit integer
68^^^^^^^^^^^^^^^^^^^^^^^
69
70+-----+
71| u64 |
72+-----+
73
74:u64: a 64-bit unsigned integer
75
76A vring state description
77^^^^^^^^^^^^^^^^^^^^^^^^^
78
79+-------+-----+
80| index | num |
81+-------+-----+
82
83:index: a 32-bit index
84
85:num: a 32-bit number
86
87A vring address description
88^^^^^^^^^^^^^^^^^^^^^^^^^^^
89
90+-------+-------+------+------------+------+-----------+-----+
91| index | flags | size | descriptor | used | available | log |
92+-------+-------+------+------------+------+-----------+-----+
93
94:index: a 32-bit vring index
95
96:flags: a 32-bit vring flags
97
98:descriptor: a 64-bit ring address of the vring descriptor table
99
100:used: a 64-bit ring address of the vring used ring
101
102:available: a 64-bit ring address of the vring available ring
103
104:log: a 64-bit guest address for logging
105
106Note that a ring address is an IOVA if ``VIRTIO_F_IOMMU_PLATFORM`` has
107been negotiated. Otherwise it is a user address.
108
109Memory regions description
110^^^^^^^^^^^^^^^^^^^^^^^^^^
111
112+-------------+---------+---------+-----+---------+
113| num regions | padding | region0 | ... | region7 |
114+-------------+---------+---------+-----+---------+
115
116:num regions: a 32-bit number of regions
117
118:padding: 32-bit
119
120A region is:
121
122+---------------+------+--------------+-------------+
123| guest address | size | user address | mmap offset |
124+---------------+------+--------------+-------------+
125
126:guest address: a 64-bit guest address of the region
127
128:size: a 64-bit size
129
130:user address: a 64-bit user address
131
132:mmap offset: 64-bit offset where region starts in the mapped memory
133
134Single memory region description
135^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
136
137+---------+---------------+------+--------------+-------------+
138| padding | guest address | size | user address | mmap offset |
139+---------+---------------+------+--------------+-------------+
140
141:padding: 64-bit
142
143:guest address: a 64-bit guest address of the region
144
145:size: a 64-bit size
146
147:user address: a 64-bit user address
148
149:mmap offset: 64-bit offset where region starts in the mapped memory
150
151Log description
152^^^^^^^^^^^^^^^
153
154+----------+------------+
155| log size | log offset |
156+----------+------------+
157
158:log size: size of area used for logging
159
160:log offset: offset from start of supplied file descriptor where
161             logging starts (i.e. where guest address 0 would be
162             logged)
163
164An IOTLB message
165^^^^^^^^^^^^^^^^
166
167+------+------+--------------+-------------------+------+
168| iova | size | user address | permissions flags | type |
169+------+------+--------------+-------------------+------+
170
171:iova: a 64-bit I/O virtual address programmed by the guest
172
173:size: a 64-bit size
174
175:user address: a 64-bit user address
176
177:permissions flags: an 8-bit value:
178  - 0: No access
179  - 1: Read access
180  - 2: Write access
181  - 3: Read/Write access
182
183:type: an 8-bit IOTLB message type:
184  - 1: IOTLB miss
185  - 2: IOTLB update
186  - 3: IOTLB invalidate
187  - 4: IOTLB access fail
188
189Virtio device config space
190^^^^^^^^^^^^^^^^^^^^^^^^^^
191
192+--------+------+-------+---------+
193| offset | size | flags | payload |
194+--------+------+-------+---------+
195
196:offset: a 32-bit offset of virtio device's configuration space
197
198:size: a 32-bit configuration space access size in bytes
199
200:flags: a 32-bit value:
201  - 0: Vhost master messages used for writeable fields
202  - 1: Vhost master messages used for live migration
203
204:payload: Size bytes array holding the contents of the virtio
205          device's configuration space
206
207Vring area description
208^^^^^^^^^^^^^^^^^^^^^^
209
210+-----+------+--------+
211| u64 | size | offset |
212+-----+------+--------+
213
214:u64: a 64-bit integer contains vring index and flags
215
216:size: a 64-bit size of this area
217
218:offset: a 64-bit offset of this area from the start of the
219         supplied file descriptor
220
221Inflight description
222^^^^^^^^^^^^^^^^^^^^
223
224+-----------+-------------+------------+------------+
225| mmap size | mmap offset | num queues | queue size |
226+-----------+-------------+------------+------------+
227
228:mmap size: a 64-bit size of area to track inflight I/O
229
230:mmap offset: a 64-bit offset of this area from the start
231              of the supplied file descriptor
232
233:num queues: a 16-bit number of virtqueues
234
235:queue size: a 16-bit size of virtqueues
236
237C structure
238-----------
239
240In QEMU the vhost-user message is implemented with the following struct:
241
242.. code:: c
243
244  typedef struct VhostUserMsg {
245      VhostUserRequest request;
246      uint32_t flags;
247      uint32_t size;
248      union {
249          uint64_t u64;
250          struct vhost_vring_state state;
251          struct vhost_vring_addr addr;
252          VhostUserMemory memory;
253          VhostUserLog log;
254          struct vhost_iotlb_msg iotlb;
255          VhostUserConfig config;
256          VhostUserVringArea area;
257          VhostUserInflight inflight;
258      };
259  } QEMU_PACKED VhostUserMsg;
260
261Communication
262=============
263
264The protocol for vhost-user is based on the existing implementation of
265vhost for the Linux Kernel. Most messages that can be sent via the
266Unix domain socket implementing vhost-user have an equivalent ioctl to
267the kernel implementation.
268
269The communication consists of *master* sending message requests and
270*slave* sending message replies. Most of the requests don't require
271replies. Here is a list of the ones that do:
272
273* ``VHOST_USER_GET_FEATURES``
274* ``VHOST_USER_GET_PROTOCOL_FEATURES``
275* ``VHOST_USER_GET_VRING_BASE``
276* ``VHOST_USER_SET_LOG_BASE`` (if ``VHOST_USER_PROTOCOL_F_LOG_SHMFD``)
277* ``VHOST_USER_GET_INFLIGHT_FD`` (if ``VHOST_USER_PROTOCOL_F_INFLIGHT_SHMFD``)
278
279.. seealso::
280
281   :ref:`REPLY_ACK <reply_ack>`
282       The section on ``REPLY_ACK`` protocol extension.
283
284There are several messages that the master sends with file descriptors passed
285in the ancillary data:
286
287* ``VHOST_USER_SET_MEM_TABLE``
288* ``VHOST_USER_SET_LOG_BASE`` (if ``VHOST_USER_PROTOCOL_F_LOG_SHMFD``)
289* ``VHOST_USER_SET_LOG_FD``
290* ``VHOST_USER_SET_VRING_KICK``
291* ``VHOST_USER_SET_VRING_CALL``
292* ``VHOST_USER_SET_VRING_ERR``
293* ``VHOST_USER_SET_SLAVE_REQ_FD``
294* ``VHOST_USER_SET_INFLIGHT_FD`` (if ``VHOST_USER_PROTOCOL_F_INFLIGHT_SHMFD``)
295
296If *master* is unable to send the full message or receives a wrong
297reply it will close the connection. An optional reconnection mechanism
298can be implemented.
299
300If *slave* detects some error such as incompatible features, it may also
301close the connection. This should only happen in exceptional circumstances.
302
303Any protocol extensions are gated by protocol feature bits, which
304allows full backwards compatibility on both master and slave.  As
305older slaves don't support negotiating protocol features, a feature
306bit was dedicated for this purpose::
307
308  #define VHOST_USER_F_PROTOCOL_FEATURES 30
309
310Starting and stopping rings
311---------------------------
312
313Client must only process each ring when it is started.
314
315Client must only pass data between the ring and the backend, when the
316ring is enabled.
317
318If ring is started but disabled, client must process the ring without
319talking to the backend.
320
321For example, for a networking device, in the disabled state client
322must not supply any new RX packets, but must process and discard any
323TX packets.
324
325If ``VHOST_USER_F_PROTOCOL_FEATURES`` has not been negotiated, the
326ring is initialized in an enabled state.
327
328If ``VHOST_USER_F_PROTOCOL_FEATURES`` has been negotiated, the ring is
329initialized in a disabled state. Client must not pass data to/from the
330backend until ring is enabled by ``VHOST_USER_SET_VRING_ENABLE`` with
331parameter 1, or after it has been disabled by
332``VHOST_USER_SET_VRING_ENABLE`` with parameter 0.
333
334Each ring is initialized in a stopped state, client must not process
335it until ring is started, or after it has been stopped.
336
337Client must start ring upon receiving a kick (that is, detecting that
338file descriptor is readable) on the descriptor specified by
339``VHOST_USER_SET_VRING_KICK`` or receiving the in-band message
340``VHOST_USER_VRING_KICK`` if negotiated, and stop ring upon receiving
341``VHOST_USER_GET_VRING_BASE``.
342
343While processing the rings (whether they are enabled or not), client
344must support changing some configuration aspects on the fly.
345
346Multiple queue support
347----------------------
348
349Many devices have a fixed number of virtqueues.  In this case the master
350already knows the number of available virtqueues without communicating with the
351slave.
352
353Some devices do not have a fixed number of virtqueues.  Instead the maximum
354number of virtqueues is chosen by the slave.  The number can depend on host
355resource availability or slave implementation details.  Such devices are called
356multiple queue devices.
357
358Multiple queue support allows the slave to advertise the maximum number of
359queues.  This is treated as a protocol extension, hence the slave has to
360implement protocol features first. The multiple queues feature is supported
361only when the protocol feature ``VHOST_USER_PROTOCOL_F_MQ`` (bit 0) is set.
362
363The max number of queues the slave supports can be queried with message
364``VHOST_USER_GET_QUEUE_NUM``. Master should stop when the number of requested
365queues is bigger than that.
366
367As all queues share one connection, the master uses a unique index for each
368queue in the sent message to identify a specified queue.
369
370The master enables queues by sending message ``VHOST_USER_SET_VRING_ENABLE``.
371vhost-user-net has historically automatically enabled the first queue pair.
372
373Slaves should always implement the ``VHOST_USER_PROTOCOL_F_MQ`` protocol
374feature, even for devices with a fixed number of virtqueues, since it is simple
375to implement and offers a degree of introspection.
376
377Masters must not rely on the ``VHOST_USER_PROTOCOL_F_MQ`` protocol feature for
378devices with a fixed number of virtqueues.  Only true multiqueue devices
379require this protocol feature.
380
381Migration
382---------
383
384During live migration, the master may need to track the modifications
385the slave makes to the memory mapped regions. The client should mark
386the dirty pages in a log. Once it complies to this logging, it may
387declare the ``VHOST_F_LOG_ALL`` vhost feature.
388
389To start/stop logging of data/used ring writes, server may send
390messages ``VHOST_USER_SET_FEATURES`` with ``VHOST_F_LOG_ALL`` and
391``VHOST_USER_SET_VRING_ADDR`` with ``VHOST_VRING_F_LOG`` in ring's
392flags set to 1/0, respectively.
393
394All the modifications to memory pointed by vring "descriptor" should
395be marked. Modifications to "used" vring should be marked if
396``VHOST_VRING_F_LOG`` is part of ring's flags.
397
398Dirty pages are of size::
399
400  #define VHOST_LOG_PAGE 0x1000
401
402The log memory fd is provided in the ancillary data of
403``VHOST_USER_SET_LOG_BASE`` message when the slave has
404``VHOST_USER_PROTOCOL_F_LOG_SHMFD`` protocol feature.
405
406The size of the log is supplied as part of ``VhostUserMsg`` which
407should be large enough to cover all known guest addresses. Log starts
408at the supplied offset in the supplied file descriptor.  The log
409covers from address 0 to the maximum of guest regions. In pseudo-code,
410to mark page at ``addr`` as dirty::
411
412  page = addr / VHOST_LOG_PAGE
413  log[page / 8] |= 1 << page % 8
414
415Where ``addr`` is the guest physical address.
416
417Use atomic operations, as the log may be concurrently manipulated.
418
419Note that when logging modifications to the used ring (when
420``VHOST_VRING_F_LOG`` is set for this ring), ``log_guest_addr`` should
421be used to calculate the log offset: the write to first byte of the
422used ring is logged at this offset from log start. Also note that this
423value might be outside the legal guest physical address range
424(i.e. does not have to be covered by the ``VhostUserMemory`` table), but
425the bit offset of the last byte of the ring must fall within the size
426supplied by ``VhostUserLog``.
427
428``VHOST_USER_SET_LOG_FD`` is an optional message with an eventfd in
429ancillary data, it may be used to inform the master that the log has
430been modified.
431
432Once the source has finished migration, rings will be stopped by the
433source. No further update must be done before rings are restarted.
434
435In postcopy migration the slave is started before all the memory has
436been received from the source host, and care must be taken to avoid
437accessing pages that have yet to be received.  The slave opens a
438'userfault'-fd and registers the memory with it; this fd is then
439passed back over to the master.  The master services requests on the
440userfaultfd for pages that are accessed and when the page is available
441it performs WAKE ioctl's on the userfaultfd to wake the stalled
442slave.  The client indicates support for this via the
443``VHOST_USER_PROTOCOL_F_PAGEFAULT`` feature.
444
445Memory access
446-------------
447
448The master sends a list of vhost memory regions to the slave using the
449``VHOST_USER_SET_MEM_TABLE`` message.  Each region has two base
450addresses: a guest address and a user address.
451
452Messages contain guest addresses and/or user addresses to reference locations
453within the shared memory.  The mapping of these addresses works as follows.
454
455User addresses map to the vhost memory region containing that user address.
456
457When the ``VIRTIO_F_IOMMU_PLATFORM`` feature has not been negotiated:
458
459* Guest addresses map to the vhost memory region containing that guest
460  address.
461
462When the ``VIRTIO_F_IOMMU_PLATFORM`` feature has been negotiated:
463
464* Guest addresses are also called I/O virtual addresses (IOVAs).  They are
465  translated to user addresses via the IOTLB.
466
467* The vhost memory region guest address is not used.
468
469IOMMU support
470-------------
471
472When the ``VIRTIO_F_IOMMU_PLATFORM`` feature has been negotiated, the
473master sends IOTLB entries update & invalidation by sending
474``VHOST_USER_IOTLB_MSG`` requests to the slave with a ``struct
475vhost_iotlb_msg`` as payload. For update events, the ``iotlb`` payload
476has to be filled with the update message type (2), the I/O virtual
477address, the size, the user virtual address, and the permissions
478flags. Addresses and size must be within vhost memory regions set via
479the ``VHOST_USER_SET_MEM_TABLE`` request. For invalidation events, the
480``iotlb`` payload has to be filled with the invalidation message type
481(3), the I/O virtual address and the size. On success, the slave is
482expected to reply with a zero payload, non-zero otherwise.
483
484The slave relies on the slave communication channel (see :ref:`Slave
485communication <slave_communication>` section below) to send IOTLB miss
486and access failure events, by sending ``VHOST_USER_SLAVE_IOTLB_MSG``
487requests to the master with a ``struct vhost_iotlb_msg`` as
488payload. For miss events, the iotlb payload has to be filled with the
489miss message type (1), the I/O virtual address and the permissions
490flags. For access failure event, the iotlb payload has to be filled
491with the access failure message type (4), the I/O virtual address and
492the permissions flags.  For synchronization purpose, the slave may
493rely on the reply-ack feature, so the master may send a reply when
494operation is completed if the reply-ack feature is negotiated and
495slaves requests a reply. For miss events, completed operation means
496either master sent an update message containing the IOTLB entry
497containing requested address and permission, or master sent nothing if
498the IOTLB miss message is invalid (invalid IOVA or permission).
499
500The master isn't expected to take the initiative to send IOTLB update
501messages, as the slave sends IOTLB miss messages for the guest virtual
502memory areas it needs to access.
503
504.. _slave_communication:
505
506Slave communication
507-------------------
508
509An optional communication channel is provided if the slave declares
510``VHOST_USER_PROTOCOL_F_SLAVE_REQ`` protocol feature, to allow the
511slave to make requests to the master.
512
513The fd is provided via ``VHOST_USER_SET_SLAVE_REQ_FD`` ancillary data.
514
515A slave may then send ``VHOST_USER_SLAVE_*`` messages to the master
516using this fd communication channel.
517
518If ``VHOST_USER_PROTOCOL_F_SLAVE_SEND_FD`` protocol feature is
519negotiated, slave can send file descriptors (at most 8 descriptors in
520each message) to master via ancillary data using this fd communication
521channel.
522
523Inflight I/O tracking
524---------------------
525
526To support reconnecting after restart or crash, slave may need to
527resubmit inflight I/Os. If virtqueue is processed in order, we can
528easily achieve that by getting the inflight descriptors from
529descriptor table (split virtqueue) or descriptor ring (packed
530virtqueue). However, it can't work when we process descriptors
531out-of-order because some entries which store the information of
532inflight descriptors in available ring (split virtqueue) or descriptor
533ring (packed virtqueue) might be overridden by new entries. To solve
534this problem, slave need to allocate an extra buffer to store this
535information of inflight descriptors and share it with master for
536persistent. ``VHOST_USER_GET_INFLIGHT_FD`` and
537``VHOST_USER_SET_INFLIGHT_FD`` are used to transfer this buffer
538between master and slave. And the format of this buffer is described
539below:
540
541+---------------+---------------+-----+---------------+
542| queue0 region | queue1 region | ... | queueN region |
543+---------------+---------------+-----+---------------+
544
545N is the number of available virtqueues. Slave could get it from num
546queues field of ``VhostUserInflight``.
547
548For split virtqueue, queue region can be implemented as:
549
550.. code:: c
551
552  typedef struct DescStateSplit {
553      /* Indicate whether this descriptor is inflight or not.
554       * Only available for head-descriptor. */
555      uint8_t inflight;
556
557      /* Padding */
558      uint8_t padding[5];
559
560      /* Maintain a list for the last batch of used descriptors.
561       * Only available when batching is used for submitting */
562      uint16_t next;
563
564      /* Used to preserve the order of fetching available descriptors.
565       * Only available for head-descriptor. */
566      uint64_t counter;
567  } DescStateSplit;
568
569  typedef struct QueueRegionSplit {
570      /* The feature flags of this region. Now it's initialized to 0. */
571      uint64_t features;
572
573      /* The version of this region. It's 1 currently.
574       * Zero value indicates an uninitialized buffer */
575      uint16_t version;
576
577      /* The size of DescStateSplit array. It's equal to the virtqueue
578       * size. Slave could get it from queue size field of VhostUserInflight. */
579      uint16_t desc_num;
580
581      /* The head of list that track the last batch of used descriptors. */
582      uint16_t last_batch_head;
583
584      /* Store the idx value of used ring */
585      uint16_t used_idx;
586
587      /* Used to track the state of each descriptor in descriptor table */
588      DescStateSplit desc[];
589  } QueueRegionSplit;
590
591To track inflight I/O, the queue region should be processed as follows:
592
593When receiving available buffers from the driver:
594
595#. Get the next available head-descriptor index from available ring, ``i``
596
597#. Set ``desc[i].counter`` to the value of global counter
598
599#. Increase global counter by 1
600
601#. Set ``desc[i].inflight`` to 1
602
603When supplying used buffers to the driver:
604
6051. Get corresponding used head-descriptor index, i
606
6072. Set ``desc[i].next`` to ``last_batch_head``
608
6093. Set ``last_batch_head`` to ``i``
610
611#. Steps 1,2,3 may be performed repeatedly if batching is possible
612
613#. Increase the ``idx`` value of used ring by the size of the batch
614
615#. Set the ``inflight`` field of each ``DescStateSplit`` entry in the batch to 0
616
617#. Set ``used_idx`` to the ``idx`` value of used ring
618
619When reconnecting:
620
621#. If the value of ``used_idx`` does not match the ``idx`` value of
622   used ring (means the inflight field of ``DescStateSplit`` entries in
623   last batch may be incorrect),
624
625   a. Subtract the value of ``used_idx`` from the ``idx`` value of
626      used ring to get last batch size of ``DescStateSplit`` entries
627
628   #. Set the ``inflight`` field of each ``DescStateSplit`` entry to 0 in last batch
629      list which starts from ``last_batch_head``
630
631   #. Set ``used_idx`` to the ``idx`` value of used ring
632
633#. Resubmit inflight ``DescStateSplit`` entries in order of their
634   counter value
635
636For packed virtqueue, queue region can be implemented as:
637
638.. code:: c
639
640  typedef struct DescStatePacked {
641      /* Indicate whether this descriptor is inflight or not.
642       * Only available for head-descriptor. */
643      uint8_t inflight;
644
645      /* Padding */
646      uint8_t padding;
647
648      /* Link to the next free entry */
649      uint16_t next;
650
651      /* Link to the last entry of descriptor list.
652       * Only available for head-descriptor. */
653      uint16_t last;
654
655      /* The length of descriptor list.
656       * Only available for head-descriptor. */
657      uint16_t num;
658
659      /* Used to preserve the order of fetching available descriptors.
660       * Only available for head-descriptor. */
661      uint64_t counter;
662
663      /* The buffer id */
664      uint16_t id;
665
666      /* The descriptor flags */
667      uint16_t flags;
668
669      /* The buffer length */
670      uint32_t len;
671
672      /* The buffer address */
673      uint64_t addr;
674  } DescStatePacked;
675
676  typedef struct QueueRegionPacked {
677      /* The feature flags of this region. Now it's initialized to 0. */
678      uint64_t features;
679
680      /* The version of this region. It's 1 currently.
681       * Zero value indicates an uninitialized buffer */
682      uint16_t version;
683
684      /* The size of DescStatePacked array. It's equal to the virtqueue
685       * size. Slave could get it from queue size field of VhostUserInflight. */
686      uint16_t desc_num;
687
688      /* The head of free DescStatePacked entry list */
689      uint16_t free_head;
690
691      /* The old head of free DescStatePacked entry list */
692      uint16_t old_free_head;
693
694      /* The used index of descriptor ring */
695      uint16_t used_idx;
696
697      /* The old used index of descriptor ring */
698      uint16_t old_used_idx;
699
700      /* Device ring wrap counter */
701      uint8_t used_wrap_counter;
702
703      /* The old device ring wrap counter */
704      uint8_t old_used_wrap_counter;
705
706      /* Padding */
707      uint8_t padding[7];
708
709      /* Used to track the state of each descriptor fetched from descriptor ring */
710      DescStatePacked desc[];
711  } QueueRegionPacked;
712
713To track inflight I/O, the queue region should be processed as follows:
714
715When receiving available buffers from the driver:
716
717#. Get the next available descriptor entry from descriptor ring, ``d``
718
719#. If ``d`` is head descriptor,
720
721   a. Set ``desc[old_free_head].num`` to 0
722
723   #. Set ``desc[old_free_head].counter`` to the value of global counter
724
725   #. Increase global counter by 1
726
727   #. Set ``desc[old_free_head].inflight`` to 1
728
729#. If ``d`` is last descriptor, set ``desc[old_free_head].last`` to
730   ``free_head``
731
732#. Increase ``desc[old_free_head].num`` by 1
733
734#. Set ``desc[free_head].addr``, ``desc[free_head].len``,
735   ``desc[free_head].flags``, ``desc[free_head].id`` to ``d.addr``,
736   ``d.len``, ``d.flags``, ``d.id``
737
738#. Set ``free_head`` to ``desc[free_head].next``
739
740#. If ``d`` is last descriptor, set ``old_free_head`` to ``free_head``
741
742When supplying used buffers to the driver:
743
7441. Get corresponding used head-descriptor entry from descriptor ring,
745   ``d``
746
7472. Get corresponding ``DescStatePacked`` entry, ``e``
748
7493. Set ``desc[e.last].next`` to ``free_head``
750
7514. Set ``free_head`` to the index of ``e``
752
753#. Steps 1,2,3,4 may be performed repeatedly if batching is possible
754
755#. Increase ``used_idx`` by the size of the batch and update
756   ``used_wrap_counter`` if needed
757
758#. Update ``d.flags``
759
760#. Set the ``inflight`` field of each head ``DescStatePacked`` entry
761   in the batch to 0
762
763#. Set ``old_free_head``,  ``old_used_idx``, ``old_used_wrap_counter``
764   to ``free_head``, ``used_idx``, ``used_wrap_counter``
765
766When reconnecting:
767
768#. If ``used_idx`` does not match ``old_used_idx`` (means the
769   ``inflight`` field of ``DescStatePacked`` entries in last batch may
770   be incorrect),
771
772   a. Get the next descriptor ring entry through ``old_used_idx``, ``d``
773
774   #. Use ``old_used_wrap_counter`` to calculate the available flags
775
776   #. If ``d.flags`` is not equal to the calculated flags value (means
777      slave has submitted the buffer to guest driver before crash, so
778      it has to commit the in-progres update), set ``old_free_head``,
779      ``old_used_idx``, ``old_used_wrap_counter`` to ``free_head``,
780      ``used_idx``, ``used_wrap_counter``
781
782#. Set ``free_head``, ``used_idx``, ``used_wrap_counter`` to
783   ``old_free_head``, ``old_used_idx``, ``old_used_wrap_counter``
784   (roll back any in-progress update)
785
786#. Set the ``inflight`` field of each ``DescStatePacked`` entry in
787   free list to 0
788
789#. Resubmit inflight ``DescStatePacked`` entries in order of their
790   counter value
791
792In-band notifications
793---------------------
794
795In some limited situations (e.g. for simulation) it is desirable to
796have the kick, call and error (if used) signals done via in-band
797messages instead of asynchronous eventfd notifications. This can be
798done by negotiating the ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS``
799protocol feature.
800
801Note that due to the fact that too many messages on the sockets can
802cause the sending application(s) to block, it is not advised to use
803this feature unless absolutely necessary. It is also considered an
804error to negotiate this feature without also negotiating
805``VHOST_USER_PROTOCOL_F_SLAVE_REQ`` and ``VHOST_USER_PROTOCOL_F_REPLY_ACK``,
806the former is necessary for getting a message channel from the slave
807to the master, while the latter needs to be used with the in-band
808notification messages to block until they are processed, both to avoid
809blocking later and for proper processing (at least in the simulation
810use case.) As it has no other way of signalling this error, the slave
811should close the connection as a response to a
812``VHOST_USER_SET_PROTOCOL_FEATURES`` message that sets the in-band
813notifications feature flag without the other two.
814
815Protocol features
816-----------------
817
818.. code:: c
819
820  #define VHOST_USER_PROTOCOL_F_MQ                    0
821  #define VHOST_USER_PROTOCOL_F_LOG_SHMFD             1
822  #define VHOST_USER_PROTOCOL_F_RARP                  2
823  #define VHOST_USER_PROTOCOL_F_REPLY_ACK             3
824  #define VHOST_USER_PROTOCOL_F_MTU                   4
825  #define VHOST_USER_PROTOCOL_F_SLAVE_REQ             5
826  #define VHOST_USER_PROTOCOL_F_CROSS_ENDIAN          6
827  #define VHOST_USER_PROTOCOL_F_CRYPTO_SESSION        7
828  #define VHOST_USER_PROTOCOL_F_PAGEFAULT             8
829  #define VHOST_USER_PROTOCOL_F_CONFIG                9
830  #define VHOST_USER_PROTOCOL_F_SLAVE_SEND_FD        10
831  #define VHOST_USER_PROTOCOL_F_HOST_NOTIFIER        11
832  #define VHOST_USER_PROTOCOL_F_INFLIGHT_SHMFD       12
833  #define VHOST_USER_PROTOCOL_F_RESET_DEVICE         13
834  #define VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS 14
835  #define VHOST_USER_PROTOCOL_F_CONFIGURE_MEM_SLOTS  15
836  #define VHOST_USER_PROTOCOL_F_STATUS               16
837
838Master message types
839--------------------
840
841``VHOST_USER_GET_FEATURES``
842  :id: 1
843  :equivalent ioctl: ``VHOST_GET_FEATURES``
844  :master payload: N/A
845  :slave payload: ``u64``
846
847  Get from the underlying vhost implementation the features bitmask.
848  Feature bit ``VHOST_USER_F_PROTOCOL_FEATURES`` signals slave support
849  for ``VHOST_USER_GET_PROTOCOL_FEATURES`` and
850  ``VHOST_USER_SET_PROTOCOL_FEATURES``.
851
852``VHOST_USER_SET_FEATURES``
853  :id: 2
854  :equivalent ioctl: ``VHOST_SET_FEATURES``
855  :master payload: ``u64``
856
857  Enable features in the underlying vhost implementation using a
858  bitmask.  Feature bit ``VHOST_USER_F_PROTOCOL_FEATURES`` signals
859  slave support for ``VHOST_USER_GET_PROTOCOL_FEATURES`` and
860  ``VHOST_USER_SET_PROTOCOL_FEATURES``.
861
862``VHOST_USER_GET_PROTOCOL_FEATURES``
863  :id: 15
864  :equivalent ioctl: ``VHOST_GET_FEATURES``
865  :master payload: N/A
866  :slave payload: ``u64``
867
868  Get the protocol feature bitmask from the underlying vhost
869  implementation.  Only legal if feature bit
870  ``VHOST_USER_F_PROTOCOL_FEATURES`` is present in
871  ``VHOST_USER_GET_FEATURES``.
872
873.. Note::
874   Slave that reported ``VHOST_USER_F_PROTOCOL_FEATURES`` must
875   support this message even before ``VHOST_USER_SET_FEATURES`` was
876   called.
877
878``VHOST_USER_SET_PROTOCOL_FEATURES``
879  :id: 16
880  :equivalent ioctl: ``VHOST_SET_FEATURES``
881  :master payload: ``u64``
882
883  Enable protocol features in the underlying vhost implementation.
884
885  Only legal if feature bit ``VHOST_USER_F_PROTOCOL_FEATURES`` is present in
886  ``VHOST_USER_GET_FEATURES``.
887
888.. Note::
889   Slave that reported ``VHOST_USER_F_PROTOCOL_FEATURES`` must support
890   this message even before ``VHOST_USER_SET_FEATURES`` was called.
891
892``VHOST_USER_SET_OWNER``
893  :id: 3
894  :equivalent ioctl: ``VHOST_SET_OWNER``
895  :master payload: N/A
896
897  Issued when a new connection is established. It sets the current
898  *master* as an owner of the session. This can be used on the *slave*
899  as a "session start" flag.
900
901``VHOST_USER_RESET_OWNER``
902  :id: 4
903  :master payload: N/A
904
905.. admonition:: Deprecated
906
907   This is no longer used. Used to be sent to request disabling all
908   rings, but some clients interpreted it to also discard connection
909   state (this interpretation would lead to bugs).  It is recommended
910   that clients either ignore this message, or use it to disable all
911   rings.
912
913``VHOST_USER_SET_MEM_TABLE``
914  :id: 5
915  :equivalent ioctl: ``VHOST_SET_MEM_TABLE``
916  :master payload: memory regions description
917  :slave payload: (postcopy only) memory regions description
918
919  Sets the memory map regions on the slave so it can translate the
920  vring addresses. In the ancillary data there is an array of file
921  descriptors for each memory mapped region. The size and ordering of
922  the fds matches the number and ordering of memory regions.
923
924  When ``VHOST_USER_POSTCOPY_LISTEN`` has been received,
925  ``SET_MEM_TABLE`` replies with the bases of the memory mapped
926  regions to the master.  The slave must have mmap'd the regions but
927  not yet accessed them and should not yet generate a userfault
928  event.
929
930.. Note::
931   ``NEED_REPLY_MASK`` is not set in this case.  QEMU will then
932   reply back to the list of mappings with an empty
933   ``VHOST_USER_SET_MEM_TABLE`` as an acknowledgement; only upon
934   reception of this message may the guest start accessing the memory
935   and generating faults.
936
937``VHOST_USER_SET_LOG_BASE``
938  :id: 6
939  :equivalent ioctl: ``VHOST_SET_LOG_BASE``
940  :master payload: u64
941  :slave payload: N/A
942
943  Sets logging shared memory space.
944
945  When slave has ``VHOST_USER_PROTOCOL_F_LOG_SHMFD`` protocol feature,
946  the log memory fd is provided in the ancillary data of
947  ``VHOST_USER_SET_LOG_BASE`` message, the size and offset of shared
948  memory area provided in the message.
949
950``VHOST_USER_SET_LOG_FD``
951  :id: 7
952  :equivalent ioctl: ``VHOST_SET_LOG_FD``
953  :master payload: N/A
954
955  Sets the logging file descriptor, which is passed as ancillary data.
956
957``VHOST_USER_SET_VRING_NUM``
958  :id: 8
959  :equivalent ioctl: ``VHOST_SET_VRING_NUM``
960  :master payload: vring state description
961
962  Set the size of the queue.
963
964``VHOST_USER_SET_VRING_ADDR``
965  :id: 9
966  :equivalent ioctl: ``VHOST_SET_VRING_ADDR``
967  :master payload: vring address description
968  :slave payload: N/A
969
970  Sets the addresses of the different aspects of the vring.
971
972``VHOST_USER_SET_VRING_BASE``
973  :id: 10
974  :equivalent ioctl: ``VHOST_SET_VRING_BASE``
975  :master payload: vring state description
976
977  Sets the base offset in the available vring.
978
979``VHOST_USER_GET_VRING_BASE``
980  :id: 11
981  :equivalent ioctl: ``VHOST_USER_GET_VRING_BASE``
982  :master payload: vring state description
983  :slave payload: vring state description
984
985  Get the available vring base offset.
986
987``VHOST_USER_SET_VRING_KICK``
988  :id: 12
989  :equivalent ioctl: ``VHOST_SET_VRING_KICK``
990  :master payload: ``u64``
991
992  Set the event file descriptor for adding buffers to the vring. It is
993  passed in the ancillary data.
994
995  Bits (0-7) of the payload contain the vring index. Bit 8 is the
996  invalid FD flag. This flag is set when there is no file descriptor
997  in the ancillary data. This signals that polling should be used
998  instead of waiting for the kick. Note that if the protocol feature
999  ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS`` has been negotiated
1000  this message isn't necessary as the ring is also started on the
1001  ``VHOST_USER_VRING_KICK`` message, it may however still be used to
1002  set an event file descriptor (which will be preferred over the
1003  message) or to enable polling.
1004
1005``VHOST_USER_SET_VRING_CALL``
1006  :id: 13
1007  :equivalent ioctl: ``VHOST_SET_VRING_CALL``
1008  :master payload: ``u64``
1009
1010  Set the event file descriptor to signal when buffers are used. It is
1011  passed in the ancillary data.
1012
1013  Bits (0-7) of the payload contain the vring index. Bit 8 is the
1014  invalid FD flag. This flag is set when there is no file descriptor
1015  in the ancillary data. This signals that polling will be used
1016  instead of waiting for the call. Note that if the protocol features
1017  ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS`` and
1018  ``VHOST_USER_PROTOCOL_F_SLAVE_REQ`` have been negotiated this message
1019  isn't necessary as the ``VHOST_USER_SLAVE_VRING_CALL`` message can be
1020  used, it may however still be used to set an event file descriptor
1021  or to enable polling.
1022
1023``VHOST_USER_SET_VRING_ERR``
1024  :id: 14
1025  :equivalent ioctl: ``VHOST_SET_VRING_ERR``
1026  :master payload: ``u64``
1027
1028  Set the event file descriptor to signal when error occurs. It is
1029  passed in the ancillary data.
1030
1031  Bits (0-7) of the payload contain the vring index. Bit 8 is the
1032  invalid FD flag. This flag is set when there is no file descriptor
1033  in the ancillary data. Note that if the protocol features
1034  ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS`` and
1035  ``VHOST_USER_PROTOCOL_F_SLAVE_REQ`` have been negotiated this message
1036  isn't necessary as the ``VHOST_USER_SLAVE_VRING_ERR`` message can be
1037  used, it may however still be used to set an event file descriptor
1038  (which will be preferred over the message).
1039
1040``VHOST_USER_GET_QUEUE_NUM``
1041  :id: 17
1042  :equivalent ioctl: N/A
1043  :master payload: N/A
1044  :slave payload: u64
1045
1046  Query how many queues the backend supports.
1047
1048  This request should be sent only when ``VHOST_USER_PROTOCOL_F_MQ``
1049  is set in queried protocol features by
1050  ``VHOST_USER_GET_PROTOCOL_FEATURES``.
1051
1052``VHOST_USER_SET_VRING_ENABLE``
1053  :id: 18
1054  :equivalent ioctl: N/A
1055  :master payload: vring state description
1056
1057  Signal slave to enable or disable corresponding vring.
1058
1059  This request should be sent only when
1060  ``VHOST_USER_F_PROTOCOL_FEATURES`` has been negotiated.
1061
1062``VHOST_USER_SEND_RARP``
1063  :id: 19
1064  :equivalent ioctl: N/A
1065  :master payload: ``u64``
1066
1067  Ask vhost user backend to broadcast a fake RARP to notify the migration
1068  is terminated for guest that does not support GUEST_ANNOUNCE.
1069
1070  Only legal if feature bit ``VHOST_USER_F_PROTOCOL_FEATURES`` is
1071  present in ``VHOST_USER_GET_FEATURES`` and protocol feature bit
1072  ``VHOST_USER_PROTOCOL_F_RARP`` is present in
1073  ``VHOST_USER_GET_PROTOCOL_FEATURES``.  The first 6 bytes of the
1074  payload contain the mac address of the guest to allow the vhost user
1075  backend to construct and broadcast the fake RARP.
1076
1077``VHOST_USER_NET_SET_MTU``
1078  :id: 20
1079  :equivalent ioctl: N/A
1080  :master payload: ``u64``
1081
1082  Set host MTU value exposed to the guest.
1083
1084  This request should be sent only when ``VIRTIO_NET_F_MTU`` feature
1085  has been successfully negotiated, ``VHOST_USER_F_PROTOCOL_FEATURES``
1086  is present in ``VHOST_USER_GET_FEATURES`` and protocol feature bit
1087  ``VHOST_USER_PROTOCOL_F_NET_MTU`` is present in
1088  ``VHOST_USER_GET_PROTOCOL_FEATURES``.
1089
1090  If ``VHOST_USER_PROTOCOL_F_REPLY_ACK`` is negotiated, slave must
1091  respond with zero in case the specified MTU is valid, or non-zero
1092  otherwise.
1093
1094``VHOST_USER_SET_SLAVE_REQ_FD``
1095  :id: 21
1096  :equivalent ioctl: N/A
1097  :master payload: N/A
1098
1099  Set the socket file descriptor for slave initiated requests. It is passed
1100  in the ancillary data.
1101
1102  This request should be sent only when
1103  ``VHOST_USER_F_PROTOCOL_FEATURES`` has been negotiated, and protocol
1104  feature bit ``VHOST_USER_PROTOCOL_F_SLAVE_REQ`` bit is present in
1105  ``VHOST_USER_GET_PROTOCOL_FEATURES``.  If
1106  ``VHOST_USER_PROTOCOL_F_REPLY_ACK`` is negotiated, slave must
1107  respond with zero for success, non-zero otherwise.
1108
1109``VHOST_USER_IOTLB_MSG``
1110  :id: 22
1111  :equivalent ioctl: N/A (equivalent to ``VHOST_IOTLB_MSG`` message type)
1112  :master payload: ``struct vhost_iotlb_msg``
1113  :slave payload: ``u64``
1114
1115  Send IOTLB messages with ``struct vhost_iotlb_msg`` as payload.
1116
1117  Master sends such requests to update and invalidate entries in the
1118  device IOTLB. The slave has to acknowledge the request with sending
1119  zero as ``u64`` payload for success, non-zero otherwise.
1120
1121  This request should be send only when ``VIRTIO_F_IOMMU_PLATFORM``
1122  feature has been successfully negotiated.
1123
1124``VHOST_USER_SET_VRING_ENDIAN``
1125  :id: 23
1126  :equivalent ioctl: ``VHOST_SET_VRING_ENDIAN``
1127  :master payload: vring state description
1128
1129  Set the endianness of a VQ for legacy devices. Little-endian is
1130  indicated with state.num set to 0 and big-endian is indicated with
1131  state.num set to 1. Other values are invalid.
1132
1133  This request should be sent only when
1134  ``VHOST_USER_PROTOCOL_F_CROSS_ENDIAN`` has been negotiated.
1135  Backends that negotiated this feature should handle both
1136  endiannesses and expect this message once (per VQ) during device
1137  configuration (ie. before the master starts the VQ).
1138
1139``VHOST_USER_GET_CONFIG``
1140  :id: 24
1141  :equivalent ioctl: N/A
1142  :master payload: virtio device config space
1143  :slave payload: virtio device config space
1144
1145  When ``VHOST_USER_PROTOCOL_F_CONFIG`` is negotiated, this message is
1146  submitted by the vhost-user master to fetch the contents of the
1147  virtio device configuration space, vhost-user slave's payload size
1148  MUST match master's request, vhost-user slave uses zero length of
1149  payload to indicate an error to vhost-user master. The vhost-user
1150  master may cache the contents to avoid repeated
1151  ``VHOST_USER_GET_CONFIG`` calls.
1152
1153``VHOST_USER_SET_CONFIG``
1154  :id: 25
1155  :equivalent ioctl: N/A
1156  :master payload: virtio device config space
1157  :slave payload: N/A
1158
1159  When ``VHOST_USER_PROTOCOL_F_CONFIG`` is negotiated, this message is
1160  submitted by the vhost-user master when the Guest changes the virtio
1161  device configuration space and also can be used for live migration
1162  on the destination host. The vhost-user slave must check the flags
1163  field, and slaves MUST NOT accept SET_CONFIG for read-only
1164  configuration space fields unless the live migration bit is set.
1165
1166``VHOST_USER_CREATE_CRYPTO_SESSION``
1167  :id: 26
1168  :equivalent ioctl: N/A
1169  :master payload: crypto session description
1170  :slave payload: crypto session description
1171
1172  Create a session for crypto operation. The server side must return
1173  the session id, 0 or positive for success, negative for failure.
1174  This request should be sent only when
1175  ``VHOST_USER_PROTOCOL_F_CRYPTO_SESSION`` feature has been
1176  successfully negotiated.  It's a required feature for crypto
1177  devices.
1178
1179``VHOST_USER_CLOSE_CRYPTO_SESSION``
1180  :id: 27
1181  :equivalent ioctl: N/A
1182  :master payload: ``u64``
1183
1184  Close a session for crypto operation which was previously
1185  created by ``VHOST_USER_CREATE_CRYPTO_SESSION``.
1186
1187  This request should be sent only when
1188  ``VHOST_USER_PROTOCOL_F_CRYPTO_SESSION`` feature has been
1189  successfully negotiated.  It's a required feature for crypto
1190  devices.
1191
1192``VHOST_USER_POSTCOPY_ADVISE``
1193  :id: 28
1194  :master payload: N/A
1195  :slave payload: userfault fd
1196
1197  When ``VHOST_USER_PROTOCOL_F_PAGEFAULT`` is supported, the master
1198  advises slave that a migration with postcopy enabled is underway,
1199  the slave must open a userfaultfd for later use.  Note that at this
1200  stage the migration is still in precopy mode.
1201
1202``VHOST_USER_POSTCOPY_LISTEN``
1203  :id: 29
1204  :master payload: N/A
1205
1206  Master advises slave that a transition to postcopy mode has
1207  happened.  The slave must ensure that shared memory is registered
1208  with userfaultfd to cause faulting of non-present pages.
1209
1210  This is always sent sometime after a ``VHOST_USER_POSTCOPY_ADVISE``,
1211  and thus only when ``VHOST_USER_PROTOCOL_F_PAGEFAULT`` is supported.
1212
1213``VHOST_USER_POSTCOPY_END``
1214  :id: 30
1215  :slave payload: ``u64``
1216
1217  Master advises that postcopy migration has now completed.  The slave
1218  must disable the userfaultfd. The response is an acknowledgement
1219  only.
1220
1221  When ``VHOST_USER_PROTOCOL_F_PAGEFAULT`` is supported, this message
1222  is sent at the end of the migration, after
1223  ``VHOST_USER_POSTCOPY_LISTEN`` was previously sent.
1224
1225  The value returned is an error indication; 0 is success.
1226
1227``VHOST_USER_GET_INFLIGHT_FD``
1228  :id: 31
1229  :equivalent ioctl: N/A
1230  :master payload: inflight description
1231
1232  When ``VHOST_USER_PROTOCOL_F_INFLIGHT_SHMFD`` protocol feature has
1233  been successfully negotiated, this message is submitted by master to
1234  get a shared buffer from slave. The shared buffer will be used to
1235  track inflight I/O by slave. QEMU should retrieve a new one when vm
1236  reset.
1237
1238``VHOST_USER_SET_INFLIGHT_FD``
1239  :id: 32
1240  :equivalent ioctl: N/A
1241  :master payload: inflight description
1242
1243  When ``VHOST_USER_PROTOCOL_F_INFLIGHT_SHMFD`` protocol feature has
1244  been successfully negotiated, this message is submitted by master to
1245  send the shared inflight buffer back to slave so that slave could
1246  get inflight I/O after a crash or restart.
1247
1248``VHOST_USER_GPU_SET_SOCKET``
1249  :id: 33
1250  :equivalent ioctl: N/A
1251  :master payload: N/A
1252
1253  Sets the GPU protocol socket file descriptor, which is passed as
1254  ancillary data. The GPU protocol is used to inform the master of
1255  rendering state and updates. See vhost-user-gpu.rst for details.
1256
1257``VHOST_USER_RESET_DEVICE``
1258  :id: 34
1259  :equivalent ioctl: N/A
1260  :master payload: N/A
1261  :slave payload: N/A
1262
1263  Ask the vhost user backend to disable all rings and reset all
1264  internal device state to the initial state, ready to be
1265  reinitialized. The backend retains ownership of the device
1266  throughout the reset operation.
1267
1268  Only valid if the ``VHOST_USER_PROTOCOL_F_RESET_DEVICE`` protocol
1269  feature is set by the backend.
1270
1271``VHOST_USER_VRING_KICK``
1272  :id: 35
1273  :equivalent ioctl: N/A
1274  :slave payload: vring state description
1275  :master payload: N/A
1276
1277  When the ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS`` protocol
1278  feature has been successfully negotiated, this message may be
1279  submitted by the master to indicate that a buffer was added to
1280  the vring instead of signalling it using the vring's kick file
1281  descriptor or having the slave rely on polling.
1282
1283  The state.num field is currently reserved and must be set to 0.
1284
1285``VHOST_USER_GET_MAX_MEM_SLOTS``
1286  :id: 36
1287  :equivalent ioctl: N/A
1288  :slave payload: u64
1289
1290  When the ``VHOST_USER_PROTOCOL_F_CONFIGURE_MEM_SLOTS`` protocol
1291  feature has been successfully negotiated, this message is submitted
1292  by master to the slave. The slave should return the message with a
1293  u64 payload containing the maximum number of memory slots for
1294  QEMU to expose to the guest. The value returned by the backend
1295  will be capped at the maximum number of ram slots which can be
1296  supported by the target platform.
1297
1298``VHOST_USER_ADD_MEM_REG``
1299  :id: 37
1300  :equivalent ioctl: N/A
1301  :slave payload: single memory region description
1302
1303  When the ``VHOST_USER_PROTOCOL_F_CONFIGURE_MEM_SLOTS`` protocol
1304  feature has been successfully negotiated, this message is submitted
1305  by the master to the slave. The message payload contains a memory
1306  region descriptor struct, describing a region of guest memory which
1307  the slave device must map in. When the
1308  ``VHOST_USER_PROTOCOL_F_CONFIGURE_MEM_SLOTS`` protocol feature has
1309  been successfully negotiated, along with the
1310  ``VHOST_USER_REM_MEM_REG`` message, this message is used to set and
1311  update the memory tables of the slave device.
1312
1313``VHOST_USER_REM_MEM_REG``
1314  :id: 38
1315  :equivalent ioctl: N/A
1316  :slave payload: single memory region description
1317
1318  When the ``VHOST_USER_PROTOCOL_F_CONFIGURE_MEM_SLOTS`` protocol
1319  feature has been successfully negotiated, this message is submitted
1320  by the master to the slave. The message payload contains a memory
1321  region descriptor struct, describing a region of guest memory which
1322  the slave device must unmap. When the
1323  ``VHOST_USER_PROTOCOL_F_CONFIGURE_MEM_SLOTS`` protocol feature has
1324  been successfully negotiated, along with the
1325  ``VHOST_USER_ADD_MEM_REG`` message, this message is used to set and
1326  update the memory tables of the slave device.
1327
1328``VHOST_USER_SET_STATUS``
1329  :id: 39
1330  :equivalent ioctl: VHOST_VDPA_SET_STATUS
1331  :slave payload: N/A
1332  :master payload: ``u64``
1333
1334  When the ``VHOST_USER_PROTOCOL_F_STATUS`` protocol feature has been
1335  successfully negotiated, this message is submitted by the master to
1336  notify the backend with updated device status as defined in the Virtio
1337  specification.
1338
1339``VHOST_USER_GET_STATUS``
1340  :id: 40
1341  :equivalent ioctl: VHOST_VDPA_GET_STATUS
1342  :slave payload: ``u64``
1343  :master payload: N/A
1344
1345  When the ``VHOST_USER_PROTOCOL_F_STATUS`` protocol feature has been
1346  successfully negotiated, this message is submitted by the master to
1347  query the backend for its device status as defined in the Virtio
1348  specification.
1349
1350
1351Slave message types
1352-------------------
1353
1354``VHOST_USER_SLAVE_IOTLB_MSG``
1355  :id: 1
1356  :equivalent ioctl: N/A (equivalent to ``VHOST_IOTLB_MSG`` message type)
1357  :slave payload: ``struct vhost_iotlb_msg``
1358  :master payload: N/A
1359
1360  Send IOTLB messages with ``struct vhost_iotlb_msg`` as payload.
1361  Slave sends such requests to notify of an IOTLB miss, or an IOTLB
1362  access failure. If ``VHOST_USER_PROTOCOL_F_REPLY_ACK`` is
1363  negotiated, and slave set the ``VHOST_USER_NEED_REPLY`` flag, master
1364  must respond with zero when operation is successfully completed, or
1365  non-zero otherwise.  This request should be send only when
1366  ``VIRTIO_F_IOMMU_PLATFORM`` feature has been successfully
1367  negotiated.
1368
1369``VHOST_USER_SLAVE_CONFIG_CHANGE_MSG``
1370  :id: 2
1371  :equivalent ioctl: N/A
1372  :slave payload: N/A
1373  :master payload: N/A
1374
1375  When ``VHOST_USER_PROTOCOL_F_CONFIG`` is negotiated, vhost-user
1376  slave sends such messages to notify that the virtio device's
1377  configuration space has changed, for those host devices which can
1378  support such feature, host driver can send ``VHOST_USER_GET_CONFIG``
1379  message to slave to get the latest content. If
1380  ``VHOST_USER_PROTOCOL_F_REPLY_ACK`` is negotiated, and slave set the
1381  ``VHOST_USER_NEED_REPLY`` flag, master must respond with zero when
1382  operation is successfully completed, or non-zero otherwise.
1383
1384``VHOST_USER_SLAVE_VRING_HOST_NOTIFIER_MSG``
1385  :id: 3
1386  :equivalent ioctl: N/A
1387  :slave payload: vring area description
1388  :master payload: N/A
1389
1390  Sets host notifier for a specified queue. The queue index is
1391  contained in the ``u64`` field of the vring area description. The
1392  host notifier is described by the file descriptor (typically it's a
1393  VFIO device fd) which is passed as ancillary data and the size
1394  (which is mmap size and should be the same as host page size) and
1395  offset (which is mmap offset) carried in the vring area
1396  description. QEMU can mmap the file descriptor based on the size and
1397  offset to get a memory range. Registering a host notifier means
1398  mapping this memory range to the VM as the specified queue's notify
1399  MMIO region. Slave sends this request to tell QEMU to de-register
1400  the existing notifier if any and register the new notifier if the
1401  request is sent with a file descriptor.
1402
1403  This request should be sent only when
1404  ``VHOST_USER_PROTOCOL_F_HOST_NOTIFIER`` protocol feature has been
1405  successfully negotiated.
1406
1407``VHOST_USER_SLAVE_VRING_CALL``
1408  :id: 4
1409  :equivalent ioctl: N/A
1410  :slave payload: vring state description
1411  :master payload: N/A
1412
1413  When the ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS`` protocol
1414  feature has been successfully negotiated, this message may be
1415  submitted by the slave to indicate that a buffer was used from
1416  the vring instead of signalling this using the vring's call file
1417  descriptor or having the master relying on polling.
1418
1419  The state.num field is currently reserved and must be set to 0.
1420
1421``VHOST_USER_SLAVE_VRING_ERR``
1422  :id: 5
1423  :equivalent ioctl: N/A
1424  :slave payload: vring state description
1425  :master payload: N/A
1426
1427  When the ``VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS`` protocol
1428  feature has been successfully negotiated, this message may be
1429  submitted by the slave to indicate that an error occurred on the
1430  specific vring, instead of signalling the error file descriptor
1431  set by the master via ``VHOST_USER_SET_VRING_ERR``.
1432
1433  The state.num field is currently reserved and must be set to 0.
1434
1435.. _reply_ack:
1436
1437VHOST_USER_PROTOCOL_F_REPLY_ACK
1438-------------------------------
1439
1440The original vhost-user specification only demands replies for certain
1441commands. This differs from the vhost protocol implementation where
1442commands are sent over an ``ioctl()`` call and block until the client
1443has completed.
1444
1445With this protocol extension negotiated, the sender (QEMU) can set the
1446``need_reply`` [Bit 3] flag to any command. This indicates that the
1447client MUST respond with a Payload ``VhostUserMsg`` indicating success
1448or failure. The payload should be set to zero on success or non-zero
1449on failure, unless the message already has an explicit reply body.
1450
1451The response payload gives QEMU a deterministic indication of the result
1452of the command. Today, QEMU is expected to terminate the main vhost-user
1453loop upon receiving such errors. In future, qemu could be taught to be more
1454resilient for selective requests.
1455
1456For the message types that already solicit a reply from the client,
1457the presence of ``VHOST_USER_PROTOCOL_F_REPLY_ACK`` or need_reply bit
1458being set brings no behavioural change. (See the Communication_
1459section for details.)
1460
1461.. _backend_conventions:
1462
1463Backend program conventions
1464===========================
1465
1466vhost-user backends can provide various devices & services and may
1467need to be configured manually depending on the use case. However, it
1468is a good idea to follow the conventions listed here when
1469possible. Users, QEMU or libvirt, can then rely on some common
1470behaviour to avoid heterogeneous configuration and management of the
1471backend programs and facilitate interoperability.
1472
1473Each backend installed on a host system should come with at least one
1474JSON file that conforms to the vhost-user.json schema. Each file
1475informs the management applications about the backend type, and binary
1476location. In addition, it defines rules for management apps for
1477picking the highest priority backend when multiple match the search
1478criteria (see ``@VhostUserBackend`` documentation in the schema file).
1479
1480If the backend is not capable of enabling a requested feature on the
1481host (such as 3D acceleration with virgl), or the initialization
1482failed, the backend should fail to start early and exit with a status
1483!= 0. It may also print a message to stderr for further details.
1484
1485The backend program must not daemonize itself, but it may be
1486daemonized by the management layer. It may also have a restricted
1487access to the system.
1488
1489File descriptors 0, 1 and 2 will exist, and have regular
1490stdin/stdout/stderr usage (they may have been redirected to /dev/null
1491by the management layer, or to a log handler).
1492
1493The backend program must end (as quickly and cleanly as possible) when
1494the SIGTERM signal is received. Eventually, it may receive SIGKILL by
1495the management layer after a few seconds.
1496
1497The following command line options have an expected behaviour. They
1498are mandatory, unless explicitly said differently:
1499
1500--socket-path=PATH
1501
1502  This option specify the location of the vhost-user Unix domain socket.
1503  It is incompatible with --fd.
1504
1505--fd=FDNUM
1506
1507  When this argument is given, the backend program is started with the
1508  vhost-user socket as file descriptor FDNUM. It is incompatible with
1509  --socket-path.
1510
1511--print-capabilities
1512
1513  Output to stdout the backend capabilities in JSON format, and then
1514  exit successfully. Other options and arguments should be ignored, and
1515  the backend program should not perform its normal function.  The
1516  capabilities can be reported dynamically depending on the host
1517  capabilities.
1518
1519The JSON output is described in the ``vhost-user.json`` schema, by
1520```@VHostUserBackendCapabilities``.  Example:
1521
1522.. code:: json
1523
1524  {
1525    "type": "foo",
1526    "features": [
1527      "feature-a",
1528      "feature-b"
1529    ]
1530  }
1531
1532vhost-user-input
1533----------------
1534
1535Command line options:
1536
1537--evdev-path=PATH
1538
1539  Specify the linux input device.
1540
1541  (optional)
1542
1543--no-grab
1544
1545  Do no request exclusive access to the input device.
1546
1547  (optional)
1548
1549vhost-user-gpu
1550--------------
1551
1552Command line options:
1553
1554--render-node=PATH
1555
1556  Specify the GPU DRM render node.
1557
1558  (optional)
1559
1560--virgl
1561
1562  Enable virgl rendering support.
1563
1564  (optional)
1565
1566vhost-user-blk
1567--------------
1568
1569Command line options:
1570
1571--blk-file=PATH
1572
1573  Specify block device or file path.
1574
1575  (optional)
1576
1577--read-only
1578
1579  Enable read-only.
1580
1581  (optional)
1582