qemu-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Adding a memory alias breaks v-rings


From: geoff
Subject: Adding a memory alias breaks v-rings
Date: Thu, 24 Oct 2019 19:27:30 +1100
User-agent: Roundcube Webmail/1.2.3

Hi All,

I have been working on adding a feature as a proof of concept to improve the performance of applications like Looking Glass by avoiding additional memory copies. My goal is to alias part of the IVSHMEM shared memory over a pointer provided by the guest OS capture API (DXGI Desktop Duplication or NVIDIA Frame Buffer Capture). I have managed to get this working by adding a few additional configuration registers to the IVSHMEM device and enhanced the IVSHMEM windows driver with suitable IOCTLs to set this all up. While this concept is backwards it needs to work this way as we do not have control over the destination buffer allocation by the GPU driver.

This all works, however, it has exposed a bug (or I am doing things improperly) with the way that vhost tracks memory. When calling memory_region_add_subregion_overlap the memory listener in vhost fires triggering vhost_region_add_section. According to the comments this code depends on being called in memory address order, but because I am adding the alias region late, it's out of order, and also splits the upper memory region. This has the effect of corrupting/breaking one or more random vrings, as evidenced by the crash/hang of vhost-net or other virtio devices. The following and errors are also logged regarding section alignment:

qemu-system-x86_64: vhost_region_add_section:Section rounded to 3c0000000 prior to previous 3fc4f9000 qemu-system-x86_64: vhost_region_add_section:Section rounded to 3c0000000 prior to previous 3fc4f9000

Here is the flat view after the alias has been added.

0000000100000000-00000003fc4f8fff (prio 0, ram): mem @0000000080000000 kvm
  00000003fc4f9000-00000003fc4f9fff (prio 1, ram): ivshmem kvm
00000003fc4fa000-000000043fffffff (prio 0, ram): mem @000000037c4fa000 kvm

When the guest doesn't crash out due to the obvious corruption it is possible to verify that the alias is in the right place and fully functional. Unfortunately, I simply do not have enough of a grasp on vhost to understand exactly what is going on and how to correct it.

Getting this feature working is highly desirable as it should be possible to obtain GPU -> GPU memory transfers between guests without requiring workstation/professional graphics cards.

Kind Regards,
Geoffrey McRae



reply via email to

[Prev in Thread] Current Thread [Next in Thread]