From: "Kinney, Michael D" <michael.d.kinney@intel.com>
To: Laszlo Ersek <lersek@redhat.com>,
"Justen, Jordan L" <jordan.l.justen@intel.com>,
"Yao, Jiewen" <jiewen.yao@intel.com>,
edk2-devel-01 <edk2-devel@ml01.01.org>,
"Kinney, Michael D" <michael.d.kinney@intel.com>
Cc: "Ni, Ruiyu" <ruiyu.ni@intel.com>, Andrew Fish <afish@apple.com>,
"Ard Biesheuvel" <ard.biesheuvel@linaro.org>
Subject: Re: memory type information HOB / UEFI memmap defrag
Date: Wed, 22 Feb 2017 03:23:20 +0000 [thread overview]
Message-ID: <E92EE9817A31E24EB0585FDF735412F57D11C6B4@ORSMSX113.amr.corp.intel.com> (raw)
In-Reply-To: <af6337ba-c460-55e9-5fcf-104f261401fd@redhat.com>
Laszlo,
The following PCD controls the reset behavior for this case.
## Indicates if to reset system when memory type information changes.<BR><BR>
# TRUE - Resets system when memory type information changes.<BR>
# FALSE - Does not reset system when memory type information changes.<BR>
# @Prompt Reset on memory type information change.
gEfiMdeModulePkgTokenSpaceGuid.PcdResetOnMemoryTypeInformationChange|TRUE|BOOLEAN|0x00010056
Mike
> -----Original Message-----
> From: edk2-devel [mailto:edk2-devel-bounces@lists.01.org] On Behalf Of Laszlo Ersek
> Sent: Tuesday, February 21, 2017 7:15 PM
> To: Justen, Jordan L <jordan.l.justen@intel.com>; Kinney, Michael D
> <michael.d.kinney@intel.com>; Yao, Jiewen <jiewen.yao@intel.com>; edk2-devel-01
> <edk2-devel@ml01.01.org>
> Cc: Ni, Ruiyu <ruiyu.ni@intel.com>; Andrew Fish <afish@apple.com>; Ard Biesheuvel
> <ard.biesheuvel@linaro.org>
> Subject: Re: [edk2] memory type information HOB / UEFI memmap defrag
>
> Mike,
>
> On 02/22/17 03:54, Jordan Justen wrote:
> > On 2017-02-21 18:46:01, Kinney, Michael D wrote:
> >> Laszlo,
> >>
> >> The only side effect of not producing the HOB when the variable does
> >> not exist is that the first boot of a platform has a fragmented
> >> memory map
>
> We have a permanently fragmented map now :) (Although, I guess it could
> be even worse; the HOB that we produce now likely does help a bit.)
>
> >> and you may get an extra reboot when the variable is set.
>
> I think I could live with that.
>
> In fact, if the reboot is *guaranteed* if the variable does not exist,
> that's likely best, because this way a fragmented memmap is never
> exposed to a guest OS.
>
> >> A fragmented memory map will also be produced if the variable store
> >> contents are corrupt or zeroed.
>
> If that was hidden from the OS by a guaranteed reboot, I think I'd
> welcome that reboot. It's a very infrequent occurrence.
>
> Jordan,
>
> > Would it be possible to inhibit the reboot until we fully support S4?
>
> I'm not very worried about the reboot; using pflash and longer-term
> guests, it should happen very rarely.
>
> For one-off guests though... Hm, I guess it might be somewhat annoying,
> so if we can find a solution for avoiding the reboot even when the
> variable is missing, that would be more elegant.
>
> > I think it'd be fine to have a fragmented map for one boot if it was
> > corrected on future boots of the machine.
>
> Is this a trade-off we can control somehow?
>
> I think you're starting to convince me that it's more user friendly to
> expose a fragmented map *once* than to auto-reboot *once*.
>
> > I think we should consider continuing to produce the HOB in
> > PlatformPei if we can fairly easily reduce the fragmentation on the
> > first boot via the HOB.
>
> Sure, we can bump the values in the HOB; however, the problem is with
> identifying "first boot" (= presence of the variable) in PlatformPei, to
> see if we should produce the default HOB. That opens the same can of
> worms :(
>
> I mean we can install a PPI notify callback for the r/o variable PPI in
> PlatformPei, and then install the HOB in the callback if the variable is
> missing. It's just too much work.
>
> Hm, wait, we already call PeiServicesNotifyPpi() in PlatformPei, for the
> MP Services PPI (which we use to program the Feature Control MSR on all
> VCPUs if instructed so by QEMU). Then I guess I'm out of arguments; we
> should at least try this. Sigh. :)
>
> Do you want to reopen
> <https://bugzilla.tianocore.org/show_bug.cgi?id=386>? I just closed it
> because there didn't seem to be an actual use case for VariablePei, but
> now we may have found one, independently of the original reporter's
> (non-upstream) use case.
>
> Thanks!
> Laszlo
>
> >
> > -Jordan
> >
> >>
> >>> -----Original Message-----
> >>> From: Laszlo Ersek [mailto:lersek@redhat.com]
> >>> Sent: Tuesday, February 21, 2017 6:31 PM
> >>> To: Kinney, Michael D <michael.d.kinney@intel.com>; Justen, Jordan L
> >>> <jordan.l.justen@intel.com>; Yao, Jiewen <jiewen.yao@intel.com>; edk2-devel-01
> <edk2-
> >>> devel@ml01.01.org>
> >>> Cc: Ni, Ruiyu <ruiyu.ni@intel.com>; Andrew Fish <afish@apple.com>; Ard Biesheuvel
> >>> <ard.biesheuvel@linaro.org>
> >>> Subject: Re: [edk2] memory type information HOB / UEFI memmap defrag
> >>>
> >>> On 02/22/17 02:48, Kinney, Michael D wrote:
> >>>> Jordan,
> >>>>
> >>>> The usage of EfiLoaderCode/ EfiBootServicesCode/ EfiBootServicesData
> >>>> may vary from boot to boot, especially if the shell or other applications
> >>>> are run or different OSes are booted. A change in the bin size causes
> >>>> extra variable writes and potentially extra reboots.
> >>>
> >>> As I wrote elsewere, in a few days (or, well, weeks) I would like to
> >>> research the simpler-looking avenue of (a) simply not producing this HOB
> >>> in OVMF's PlatformPei at all, and (b) pulling in VariablePei. As far as
> >>> I understand the code in the DXE IPL PEIM and BDS DXE, this should
> >>> enable those two modules to communicate with each other through the
> >>> variable highlighted by Jordan, and to create the HOB automatically. The
> >>> code seems to track / maintain the maximum memory usage seen during
> >>> previous boots, which I believe is appropriate for OVMF.
> >>>
> >>> If this worked without any more platform cooperation than (a) and (b),
> >>> that would be awesome & my preference.
> >>>
> >>> Thanks!
> >>> Laszlo
> >>>
> >>>>
> >>>> Mike
> >>>>
> >>>>> -----Original Message-----
> >>>>> From: edk2-devel [mailto:edk2-devel-bounces@lists.01.org] On Behalf Of Jordan
> >>> Justen
> >>>>> Sent: Tuesday, February 21, 2017 5:32 PM
> >>>>> To: Yao, Jiewen <jiewen.yao@intel.com>; Laszlo Ersek <lersek@redhat.com>; edk2-
> >>> devel-
> >>>>> 01 <edk2-devel@lists.01.org>
> >>>>> Cc: Ni, Ruiyu <ruiyu.ni@intel.com>; Andrew Fish <afish@apple.com>; Ard
> Biesheuvel
> >>>>> <ard.biesheuvel@linaro.org>
> >>>>> Subject: Re: [edk2] memory type information HOB / UEFI memmap defrag
> >>>>>
> >>>>> On 2017-02-21 16:46:40, Yao, Jiewen wrote:
> >>>>>> HI Laszlo
> >>>>>>
> >>>>>> The purpose of this table to put OS consumed memory together to avoid S4
> resume
> >>>>>> issue. EfiLoaderCode/ EfiBootServicesCode/ EfiBootServicesData are not used by
> >>>>>> OS. There is no need to put them here.
> >>>>>>
> >>>>>> I suggest we remove EfiLoaderCode/ EfiBootServicesCode/ EfiBootServicesData to
> >>>>>> avoid confusing.
> >>>>>>
> >>>>>
> >>>>> Is there any other advantage to removing them?
> >>>>>
> >>>>> I guess it would be easy enough to re-add them, but I don't think we
> >>>>> need to move away from supporting S4. While I agree that S4 should not
> >>>>> be a big priority, I'd prefer that we try to support it at some point.
> >>>>>
> >>>>> -Jordan
> >>>>>
> >>>>>>
> >>>>>>> + { EfiReservedMemoryType, EFI_SIZE_TO_PAGES ((UINTN)SIZE_1KB * 202) },
> >>>>>>> + { EfiLoaderCode, EFI_SIZE_TO_PAGES ((UINTN)SIZE_1KB * 1439) },
> >>>>>>> + { EfiBootServicesCode, EFI_SIZE_TO_PAGES ((UINTN)SIZE_1KB * 5980) },
> >>>>>>> + { EfiBootServicesData, EFI_SIZE_TO_PAGES ((UINTN)SIZE_1KB * 41643) },
> >>>>>>> + { EfiRuntimeServicesCode, EFI_SIZE_TO_PAGES ((UINTN)SIZE_1KB * 1025) },
> >>>>>>> + { EfiRuntimeServicesData, EFI_SIZE_TO_PAGES ((UINTN)SIZE_1KB * 3629) },
> >>>>>>> + { EfiACPIReclaimMemory, EFI_SIZE_TO_PAGES ((UINTN)SIZE_1KB * 36) },
> >>>>>>> + { EfiACPIMemoryNVS, EFI_SIZE_TO_PAGES ((UINTN)SIZE_1KB * 1301) },
> >>>>>>> + { EfiMaxMemoryType, 0 }
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>> Thank you
> >>>>>>
> >>>>>> Yao Jiewen
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>> From: edk2-devel [mailto:edk2-devel-bounces@lists.01.org] On Behalf Of Laszlo
> >>>>>> Ersek
> >>>>>> Sent: Tuesday, February 21, 2017 11:24 PM
> >>>>>> To: edk2-devel-01 <edk2-devel@ml01.01.org>
> >>>>>> Cc: Ni, Ruiyu <ruiyu.ni@intel.com>; Justen, Jordan L
> >>>>>> <jordan.l.justen@intel.com>; Andrew Fish <afish@apple.com>; Ard Biesheuvel
> >>>>>> <ard.biesheuvel@linaro.org>
> >>>>>> Subject: [edk2] memory type information HOB / UEFI memmap defrag
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>> Hi,
> >>>>>>
> >>>>>> the UEFI memmap under OVMF is getting very fragmented, I'm now counting
> >>>>>> ~80 entries in it, under various circumstances.
> >>>>>>
> >>>>>> I recall that a platform's PlatformPei can "prime" the DXE/UEFI memory
> >>>>>> allocation system (not the GCD services) for various memory types, by
> >>>>>> producing a memory type information HOB.
> >>>>>>
> >>>>>> My vague understanding is that BDS will in turn check if the actual
> >>>>>> allocations fit in the allotments from the HOB, and if not, it will try
> >>>>>> to feed back the increased amount to PEI, for the next boot.
> >>>>>>
> >>>>>> As far as I understand, this requires the VariablePei (read only driver)
> >>>>>> for a platform (so that its PlatformPei can read the info from BDS, and
> >>>>>> produce the HOB accordingly). Some questions:
> >>>>>>
> >>>>>> - how big is VariablePei in binary form?
> >>>>>> - does it depend on permanent RAM being installed / discovered?
> >>>>>> - If so, is that dependency implemented with a static DEPEX, or with a
> >>>>>> callback?
> >>>>>>
> >>>>>> Further questions:
> >>>>>> - what is the variable (GUID and Name) that BDS uses for this
> >>>>>> information?
> >>>>>> - What is the format of the variable?
> >>>>>> - Does the logic depend on particular boot modes? OVMF only supports two
> >>>>>> boot modes, BOOT_WITH_FULL_CONFIGURATION and BOOT_ON_S3_RESUME.
> >>>>>>
> >>>>>> In OVMF we currently use a static array for populating the HOB (see
> >>>>>> "mDefaultMemoryTypeInformation" in "PlatformPei/Platform.c"). If making
> >>>>>> it all dynamic is easy, I think I'd like to do it (sometime later).
> >>>>>>
> >>>>>> If, however, it would require us to up-end OVMF's PlatformPei, then I
> >>>>>> think it's not worth it; we can just bump the values in
> >>>>>> "mDefaultMemoryTypeInformation" suitably.
> >>>>>>
> >>>>>> Some examples I consider as up-ending OVMF's PlatformPei:
> >>>>>>
> >>>>>> (1) If VariablePei needs permanent RAM with a hard DEPEX. In OVMF,
> >>>>>> permanent RAM is installed by PlatformPei (thereby potentially
> >>>>>> unblocking VariablePei's dispatch); however, it is also PlatformPei
> >>>>>> that would require the r/o variable service to work, because
> >>>>>> PlatformPei produces the memory type information HOB. So, such a
> >>>>>> DEPEX in VariablePei would require splitting up PlatformPei, which
> >>>>>> makes the dynamism totally not worth it.
> >>>>>>
> >>>>>> *Maybe* we could add a callback for when the variable service PPI is
> >>>>>> installed. Dunno.
> >>>>>>
> >>>>>> (2) Supporting a third boot mode beyond BOOT_WITH_FULL_CONFIGURATION and
> >>>>>> BOOT_ON_S3_RESUME. Not even worth the audit of current boot mode
> >>>>>> checks.
> >>>>>>
> >>>>>> Further remarks:
> >>>>>>
> >>>>>> - OVMF doesn't care about supporting S4 at the moment, and I personally
> >>>>>> have no plans to work on that. (I'm saying this because I vaguely
> >>>>>> recall that the memory type info HOB is related to S4 resume, so an
> >>>>>> argument could perhaps be made, "this could enable S4 for OVMF".
> >>>>>> Personally, I'm not interested. Still carrying the scars of S3.)
> >>>>>>
> >>>>>> - I actually tried to bump the values in "mDefaultMemoryTypeInformation"
> >>>>>> quite a few months back, but the benefits I saw were negligible. I was
> >>>>>> left confused about the memory type info HOB, and that was the reason
> >>>>>> I didn't ultimately post any patch (and why I stopped pursuing this
> >>>>>> question). For reference, this was the patch:
> >>>>>>
> >>>>>>> commit b357e8d88c0304ea2b31aefafe53d06c9769fb78
> >>>>>>> Author: Laszlo Ersek <lersek@redhat.com>
> >>>>>>> Date: Thu Sep 17 16:18:46 2015 +0200
> >>>>>>>
> >>>>>>> OvmfPkg: PlatformPei: decrease memmap fragmentation
> >>>>>>>
> >>>>>>> Inspired by ArmVirtPkg commit c199315 ("ArmVirtPkg: increase memory
> >>>>>>> preallocations to reduce region count"), I checked the number of entries
> >>>>>>> in the UEFI memory map, as dumped by the UEFI shell's MEMMAP command, and
> >>>>>>> by the Linux kernel. The number of entries is quite high, about 50-55.
> >>>>>>>
> >>>>>>> I calculated the new preallocations as follows:
> >>>>>>> - added 15% to each byte count usage reported by the MEMMAP command, for
> >>>>>>> some future-proofing,
> >>>>>>> - expressed the result in kilobytes (both pages and byte counts are hard
> >>>>>>> to read),
> >>>>>>> - just for our information, I calculated the ratio between the new
> >>>>>>> preallocation and the old one.
> >>>>>>>
> >>>>>>> For example, the UEFI shell reported 44 pages (180224 bytes) of reserved
> >>>>>>> memory usage. The new preallocation, expressed in kilobytes, is
> >>>>>>> trunc(180224 * 1.15 / 1024) = 202. This preallocation is approx. 12.62
> >>>>>>> times the previous preallocation (which was 4 pages, ie. 16384 bytes).
> >>>>>>>
> >>>>>>> Here's the full table:
> >>>>>>>
> >>>>>>> memory type pages from bytes from new KB factor of former
> >>>>>>> MEMMAP cmd MEMMAP cmd prealloc prealloc
> >>>>>>> ----------- ---------- ---------- -------- ----------------
> >>>>>>> Reserved 44 180224 202 12.62
> >>>>>>> LoaderCode 313 1282048 1439 n/a
> >>>>>>> BS_Code 1300 5324800 5980 3.89
> >>>>>>> BS_Data 9053 37081088 41643 2.71
> >>>>>>> RT_Code 223 913408 1025 5.33
> >>>>>>> RT_Data 789 3231744 3629 25.20
> >>>>>>> ACPI_Recl 8 32768 36 1.12
> >>>>>>> ACPI_NVS 283 1159168 1301 81.31
> >>>>>>>
> >>>>>>> ... Unfortunately, when the patch is applied, the memory map remains
> >>>>>>> fragmented;
> >>>>>> mostly due to small unused Conventional Memory entries between
> >>>>>>> other types of allocations. The entry count doesn't go below 40.
> >>>>>>>
> >>>>>>> Contributed-under: TianoCore Contribution Agreement 1.0
> >>>>>>> Signed-off-by: Laszlo Ersek <lersek@redhat.com>
> >>>>>>>
> >>>>>>> diff --git a/OvmfPkg/PlatformPei/Platform.c b/OvmfPkg/PlatformPei/Platform.c
> >>>>>>> index a6d961673d3a..38abf3811600 100644
> >>>>>>> --- a/OvmfPkg/PlatformPei/Platform.c
> >>>>>>> +++ b/OvmfPkg/PlatformPei/Platform.c
> >>>>>>> @@ -41,14 +41,15 @@
> >>>>>>> #include "Cmos.h"
> >>>>>>>
> >>>>>>> EFI_MEMORY_TYPE_INFORMATION mDefaultMemoryTypeInformation[] = {
> >>>>>>> - { EfiACPIMemoryNVS, 0x004 },
> >>>>>>> - { EfiACPIReclaimMemory, 0x008 },
> >>>>>>> - { EfiReservedMemoryType, 0x004 },
> >>>>>>> - { EfiRuntimeServicesData, 0x024 },
> >>>>>>> - { EfiRuntimeServicesCode, 0x030 },
> >>>>>>> - { EfiBootServicesCode, 0x180 },
> >>>>>>> - { EfiBootServicesData, 0xF00 },
> >>>>>>> - { EfiMaxMemoryType, 0x000 }
> >>>>>>> + { EfiReservedMemoryType, EFI_SIZE_TO_PAGES ((UINTN)SIZE_1KB * 202) },
> >>>>>>> + { EfiLoaderCode, EFI_SIZE_TO_PAGES ((UINTN)SIZE_1KB * 1439) },
> >>>>>>> + { EfiBootServicesCode, EFI_SIZE_TO_PAGES ((UINTN)SIZE_1KB * 5980) },
> >>>>>>> + { EfiBootServicesData, EFI_SIZE_TO_PAGES ((UINTN)SIZE_1KB * 41643) },
> >>>>>>> + { EfiRuntimeServicesCode, EFI_SIZE_TO_PAGES ((UINTN)SIZE_1KB * 1025) },
> >>>>>>> + { EfiRuntimeServicesData, EFI_SIZE_TO_PAGES ((UINTN)SIZE_1KB * 3629) },
> >>>>>>> + { EfiACPIReclaimMemory, EFI_SIZE_TO_PAGES ((UINTN)SIZE_1KB * 36) },
> >>>>>>> + { EfiACPIMemoryNVS, EFI_SIZE_TO_PAGES ((UINTN)SIZE_1KB * 1301) },
> >>>>>>> + { EfiMaxMemoryType, 0 }
> >>>>>>> };
> >>>>>>>
> >>>>>>>
> >>>>>>
> >>>>>> As you can see in the commit message, at that time the patch only
> >>>>>> managed to decrease the number of memmap entries from ~55 to ~40, which
> >>>>>> I found "meh". I figured I'd ask again, because now I'm seeing about 80
> >>>>>> entries in the memmap. (I wonder if that is related to OVMF's recently
> >>>>>> increased ACPI S3 boot script usage!)
> >>>>>>
> >>>>>> Thanks,
> >>>>>> Laszlo
> >>>>>>
> >>>>>> _______________________________________________
> >>>>>> edk2-devel mailing list
> >>>>>> edk2-devel@lists.01.org
> >>>>>> https://lists.01.org/mailman/listinfo/edk2-devel
> >>>>>>
> >>>>> _______________________________________________
> >>>>> edk2-devel mailing list
> >>>>> edk2-devel@lists.01.org
> >>>>> https://lists.01.org/mailman/listinfo/edk2-devel
> >>
>
> _______________________________________________
> edk2-devel mailing list
> edk2-devel@lists.01.org
> https://lists.01.org/mailman/listinfo/edk2-devel
next prev parent reply other threads:[~2017-02-22 3:23 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-02-21 15:24 memory type information HOB / UEFI memmap defrag Laszlo Ersek
2017-02-21 22:35 ` Jordan Justen
2017-02-21 23:46 ` Laszlo Ersek
2017-02-22 0:46 ` Yao, Jiewen
2017-02-22 1:31 ` Jordan Justen
2017-02-22 1:48 ` Kinney, Michael D
2017-02-22 2:31 ` Laszlo Ersek
2017-02-22 2:46 ` Kinney, Michael D
2017-02-22 2:54 ` Jordan Justen
2017-02-22 3:14 ` Laszlo Ersek
2017-02-22 3:23 ` Kinney, Michael D [this message]
2017-02-22 3:31 ` Laszlo Ersek
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=E92EE9817A31E24EB0585FDF735412F57D11C6B4@ORSMSX113.amr.corp.intel.com \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox