From: "Wang, Jian J" <jian.j.wang@intel.com>
To: "Ni, Ruiyu" <ruiyu.ni@intel.com>,
"edk2-devel@lists.01.org" <edk2-devel@lists.01.org>
Cc: Laszlo Ersek <lersek@redhat.com>,
"Yao, Jiewen" <jiewen.yao@intel.com>,
"Dong, Eric" <eric.dong@intel.com>
Subject: Re: [PATCH 2/2] UefiCpuPkg/CpuDxe: remove all code to flush TLB for APs
Date: Fri, 26 Jan 2018 09:18:29 +0000 [thread overview]
Message-ID: <D827630B58408649ACB04F44C510003624CDF4A8@SHSMSX103.ccr.corp.intel.com> (raw)
In-Reply-To: <418df7fd-dc3c-aa0b-9348-37476cf8dadb@Intel.com>
Right. I'll update the comments.
Regards,
Jian
> -----Original Message-----
> From: Ni, Ruiyu
> Sent: Friday, January 26, 2018 5:14 PM
> To: Wang, Jian J <jian.j.wang@intel.com>; edk2-devel@lists.01.org
> Cc: Laszlo Ersek <lersek@redhat.com>; Yao, Jiewen <jiewen.yao@intel.com>;
> Dong, Eric <eric.dong@intel.com>
> Subject: Re: [edk2] [PATCH 2/2] UefiCpuPkg/CpuDxe: remove all code to flush
> TLB for APs
>
> On 1/26/2018 5:03 PM, Jian J Wang wrote:
> > The reason doing this is that we found that calling StartupAllAps() to
> > flush TLB for all APs in CpuDxe driver after changing page attributes
> > will spend a lot of time to complete. If there are many page attributes
> > update requests, the whole system performance will be slowed down
> > explicitly, including any shell command and UI operation.
> >
> > The solution is removing the flush operation for AP in CpuDxe driver
> > and let AP flush TLB after woken up.
> >
> > Cc: Ruiyu Ni <ruiyu.ni@intel.com>
> > Cc: Jiewen Yao <jiewen.yao@intel.com>
> > Cc: Eric Dong <eric.dong@intel.com>
> > Cc: Laszlo Ersek <lersek@redhat.com>
> > Contributed-under: TianoCore Contribution Agreement 1.1
> > Signed-off-by: Jian J Wang <jian.j.wang@intel.com>
> > ---
> > UefiCpuPkg/CpuDxe/CpuPageTable.c | 85 +++-------------------------------------
> > 1 file changed, 5 insertions(+), 80 deletions(-)
> >
> > diff --git a/UefiCpuPkg/CpuDxe/CpuPageTable.c
> b/UefiCpuPkg/CpuDxe/CpuPageTable.c
> > index a33ac5519e..a5bf0dfe28 100644
> > --- a/UefiCpuPkg/CpuDxe/CpuPageTable.c
> > +++ b/UefiCpuPkg/CpuDxe/CpuPageTable.c
> > @@ -89,70 +89,6 @@ PAGE_ATTRIBUTE_TABLE mPageAttributeTable[] = {
> >
> > PAGE_TABLE_POOL *mPageTablePool = NULL;
> >
> > -/**
> > - Enable write protection function for AP.
> > -
> > - @param[in,out] Buffer The pointer to private data buffer.
> > -**/
> > -VOID
> > -EFIAPI
> > -SyncCpuEnableWriteProtection (
> > - IN OUT VOID *Buffer
> > - )
> > -{
> > - AsmWriteCr0 (AsmReadCr0 () | BIT16);
> > -}
> > -
> > -/**
> > - CpuFlushTlb function for AP.
> > -
> > - @param[in,out] Buffer The pointer to private data buffer.
> > -**/
> > -VOID
> > -EFIAPI
> > -SyncCpuFlushTlb (
> > - IN OUT VOID *Buffer
> > - )
> > -{
> > - CpuFlushTlb();
> > -}
> > -
> > -/**
> > - Sync memory page attributes for AP.
> > -
> > - @param[in] Procedure A pointer to the function to be run on enabled
> APs of
> > - the system.
> > -**/
> > -VOID
> > -SyncMemoryPageAttributesAp (
> > - IN EFI_AP_PROCEDURE Procedure
> > - )
> > -{
> > - EFI_STATUS Status;
> > - EFI_MP_SERVICES_PROTOCOL *MpService;
> > -
> > - Status = gBS->LocateProtocol (
> > - &gEfiMpServiceProtocolGuid,
> > - NULL,
> > - (VOID **)&MpService
> > - );
> > - //
> > - // Synchronize the update with all APs
> > - //
> > - if (!EFI_ERROR (Status)) {
> > - Status = MpService->StartupAllAPs (
> > - MpService, // This
> > - Procedure, // Procedure
> > - FALSE, // SingleThread
> > - NULL, // WaitEvent
> > - 0, // TimeoutInMicrosecsond
> > - NULL, // ProcedureArgument
> > - NULL // FailedCpuList
> > - );
> > - ASSERT (Status == EFI_SUCCESS || Status == EFI_NOT_STARTED || Status
> == EFI_NOT_READY);
> > - }
> > -}
> > -
> > /**
> > Return current paging context.
> >
> > @@ -574,20 +510,6 @@ IsReadOnlyPageWriteProtected (
> > return ((AsmReadCr0 () & BIT16) != 0);
> > }
> >
> > -/**
> > - Disable write protection function for AP.
> > -
> > - @param[in,out] Buffer The pointer to private data buffer.
> > -**/
> > -VOID
> > -EFIAPI
> > -SyncCpuDisableWriteProtection (
> > - IN OUT VOID *Buffer
> > - )
> > -{
> > - AsmWriteCr0 (AsmReadCr0() & ~BIT16);
> > -}
> > -
> > /**
> > Disable Write Protect on pages marked as read-only.
> > **/
> > @@ -835,10 +757,13 @@ AssignMemoryPageAttributes (
> > if (!EFI_ERROR(Status)) {
> > if ((PagingContext == NULL) && IsModified) {
> > //
> > - // Flush TLB as last step
> > + // Flush TLB as last step.
> > + //
> > + // Note: Don't flush TLB for APs here. It will take a lot of time to
> > + // complete, and then slow down boot performance of the whole system
> > + // if page attributes are requested frequently to update.
> > //
>
> Code change looks good. But comments look like we skip the sync due to
> performance. In fact, sync is unnecessary.
> How about comments like below (refine as you need):
> No need to flush TLB for APs here because:
> 1. when APs wake up from hlt, AP initialization code always sets CR3
> 2. when APs wake up from mwait/run loop, patch
> *UefiCpuPkg/MpInitLib: force flushing TLB for AP in mwait loop mode*
> sets CR3.
>
> With the comments refine, Reviewed-by: Ruiyu Ni <ruiyu.ni@intel.com>
>
>
> > CpuFlushTlb();
> > - SyncMemoryPageAttributesAp (SyncCpuFlushTlb);
> > }
> > }
> >
> >
>
>
> --
> Thanks,
> Ray
prev parent reply other threads:[~2018-01-26 9:13 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-01-26 9:03 [PATCH 0/2] Fix bad performance in changing page attributes Jian J Wang
2018-01-26 9:03 ` [PATCH 1/2] UefiCpuPkg/MpInitLib: force flushing TLB for AP in mwait loop mode Jian J Wang
2018-01-26 9:14 ` Ni, Ruiyu
2018-01-26 9:03 ` [PATCH 2/2] UefiCpuPkg/CpuDxe: remove all code to flush TLB for APs Jian J Wang
2018-01-26 9:13 ` Ni, Ruiyu
2018-01-26 9:18 ` Wang, Jian J [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=D827630B58408649ACB04F44C510003624CDF4A8@SHSMSX103.ccr.corp.intel.com \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox