Received: by 10.192.165.148 with SMTP id m20csp4862547imm; Tue, 8 May 2018 16:09:57 -0700 (PDT) X-Google-Smtp-Source: AB8JxZr5LA55wuTbEdhSjyvV/u6u0PFE9jbgh+JuHpoNFqvSEc7dPvrm10UhYUowqnjjtg1xiJwp X-Received: by 10.98.144.86 with SMTP id a83mr31448232pfe.186.1525820997153; Tue, 08 May 2018 16:09:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525820997; cv=none; d=google.com; s=arc-20160816; b=uutXPwqnNT+Bb8Sa80LXVRE+nzpabJMUcdwD8t74MogK9Kv9CoYGiCX3RgqhhQ9Lg5 lpRFUczW0qVR636tANovLAdUCPFNGzKxPgKPD5GTkaeQj51+Pe9CfaeKgPYSXYsl+mTs gb79GEQAqqsqKI7KM/PiesJPLUGx6FjxLXrzwVVBUXeAmxR8JrCQsTUFgLY9sFBWmEfe vn/RdIcQK0CtT2qH2qQ9jA0bgCiPXoP7gS8bTQV2685mGd53q2eVNDTb/9iZXvpXoV1f eVHw/81GniC2xBj2HGhHUp9+02PwsD8uF69AbrZ6TwZoYQ3FT8JEWiLEARc39/DW3Go1 toRQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature :arc-authentication-results; bh=4e1m7bEZTdWTIwkFukaR2xOJrWi3dJevGbhj+sWS/QM=; b=y9E9ALXUNVucXJVFBW4XC0peEvx6Lp9XYPvlqJYAD0DXu1I65Oa05b3MEGjZFCcqmw Ww3VufOIoUauE4gBXPPLSffn2oJUPPXPKl4HWjbCrLXrcMP5TY7vGAxb46pefo/dcfF+ MXxEz+9Ui7Uyyz4Q3M21J8LAdrTNOB6k2x9qzF8QSgyERcptjScX8YVUeyR572WVvQhH sumhiDOOVIY3wVqYrRbNK6a8yW3dSA1OqeXm/+sYdCxdfTgY5w8fYs25p9TjviyUSew0 igcgjM6PUWnWPPEu6/44ULs0IlWvYhh884A19ZAZF/FZi29LZ7fCbK0/Yes0hg55Mywk jA4g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@joelfernandes-org.20150623.gappssmtp.com header.s=20150623 header.b=uuQhuKVi; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o14-v6si16611548pgc.664.2018.05.08.16.09.42; Tue, 08 May 2018 16:09:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@joelfernandes-org.20150623.gappssmtp.com header.s=20150623 header.b=uuQhuKVi; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933060AbeEHXIQ (ORCPT + 99 others); Tue, 8 May 2018 19:08:16 -0400 Received: from mail-pl0-f68.google.com ([209.85.160.68]:34748 "EHLO mail-pl0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932452AbeEHXIP (ORCPT ); Tue, 8 May 2018 19:08:15 -0400 Received: by mail-pl0-f68.google.com with SMTP id ay10-v6so3104554plb.1 for ; Tue, 08 May 2018 16:08:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelfernandes-org.20150623.gappssmtp.com; s=20150623; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:content-transfer-encoding:in-reply-to :user-agent; bh=4e1m7bEZTdWTIwkFukaR2xOJrWi3dJevGbhj+sWS/QM=; b=uuQhuKVi+5PsaSAsTcfOGQkk331sZyktWkzcHZ1sLN1Lg9hxp20eJk9FDc/pbRVzUM Oi0QC9cvooAm1nvCfqsPEdybFEnZVZKpS1bvF6PdMZmKoOumDkFfv4ZQH2xiNXUrE0RP p4RP/c3YLw6bCIm9eWXeQepDEeF5dEYkjW9JudcnU1vh1nsG/AFdtqJDkfBGrEKNjnSE FojhvNS3YjFUG0NsqpT5tRCiecZ2LiIHdzE7dYmKzmXWdNBnk0bdlNog1IQWSV3Yu/0k T7eLnQoCuA8EicjTPQLg0dnHdK3mGHUutNBpg7I0lHxbZOODWbIfMKkBoOgQ0NM8yHea AZXA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to:user-agent; bh=4e1m7bEZTdWTIwkFukaR2xOJrWi3dJevGbhj+sWS/QM=; b=ClcJ2eioT9kmSv5BKk8ChZhBa6DKbl6tWy7O/XsrbmcgxJRSpeNdn3hkG1R8rge8bi oSVtPgHMcacSM7tq97gM9XxoxkBmYKqImPG9f5EyVLZP8vEuCP0QVOEmx7wc6ik34uD1 Yn6J5VsGdvFDa4mR+pQ7bPSibWUpSIqhUKTvqnI9VGXuw9KFWUBcMJEur03XN726VTB3 gZaD5h36z6BBkf2V9ropMO4RoxPbNMB8mElbk1lcD7XcimFt9d7MvdoMdpGI8OANaYeq iuC7eipAGU+/oG8PMeeEHLgYmRAFqMHsZizf9QtfZhBqppaIEe8t4K9TkXDObSY8B75E m8iA== X-Gm-Message-State: ALQs6tDyW5a1e1Zm5yBulTPmgn2avLiDEH4m/LygG1fBOjt5Vc1CWAE8 B8z8UBBCjDRHY1oGqZ9Tz1HUYg== X-Received: by 2002:a17:902:8d81:: with SMTP id v1-v6mr41907174plo.383.1525820894922; Tue, 08 May 2018 16:08:14 -0700 (PDT) Received: from localhost ([2620:0:1000:1600:3122:ea9c:d178:eb]) by smtp.gmail.com with ESMTPSA id m72sm32288420pfk.110.2018.05.08.16.08.14 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 08 May 2018 16:08:14 -0700 (PDT) Date: Tue, 8 May 2018 16:08:13 -0700 From: Joel Fernandes To: Minchan Kim Cc: LKML , Ganesh Mahendran , Joe Perches , Arve =?iso-8859-1?B?SGr4bm5lduVn?= , Todd Kjos , Greg Kroah-Hartman , Martijn Coenen Subject: Re: [PATCH v6] ANDROID: binder: change down_write to down_read Message-ID: <20180508230813.GA102094@joelaf.mtv.corp.google.com> References: <20180507141537.4855-1-minchan@kernel.org> <20180507172829.GA66161@joelaf.mtv.corp.google.com> <20180508105101.GB8209@rodete-desktop-imager.corp.google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20180508105101.GB8209@rodete-desktop-imager.corp.google.com> User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 08, 2018 at 07:51:01PM +0900, Minchan Kim wrote: > On Mon, May 07, 2018 at 10:28:29AM -0700, Joel Fernandes wrote: > > On Mon, May 07, 2018 at 11:15:37PM +0900, Minchan Kim wrote: > > > binder_update_page_range needs down_write of mmap_sem because > > > vm_insert_page need to change vma->vm_flags to VM_MIXEDMAP unless > > > it is set. However, when I profile binder working, it seems > > > every binder buffers should be mapped in advance by binder_mmap. > > > It means we could set VM_MIXEDMAP in binder_mmap time which is > > > already hold a mmap_sem as down_write so binder_update_page_range > > > doesn't need to hold a mmap_sem as down_write. > > > Please use proper API down_read. It would help mmap_sem contention > > > problem as well as fixing down_write abuse. > > > > > > Ganesh Mahendran tested app launching and binder throughput test > > > and he said he couldn't find any problem and I did binder latency > > > test per Greg KH request(Thanks Martijn to teach me how I can do) > > > I cannot find any problem, too. > > > > > > Cc: Ganesh Mahendran > > > Cc: Joe Perches > > > Cc: Arve Hj?nnev?g > > > Cc: Todd Kjos > > > Cc: Greg Kroah-Hartman > > > Reviewed-by: Martijn Coenen > > > Signed-off-by: Minchan Kim > > > --- > > > drivers/android/binder.c | 4 +++- > > > drivers/android/binder_alloc.c | 6 +++--- > > > 2 files changed, 6 insertions(+), 4 deletions(-) > > > > > > diff --git a/drivers/android/binder.c b/drivers/android/binder.c > > > index 4eab5be3d00f..7b8e96f60719 100644 > > > --- a/drivers/android/binder.c > > > +++ b/drivers/android/binder.c > > > @@ -4730,7 +4730,9 @@ static int binder_mmap(struct file *filp, struct vm_area_struct *vma) > > > failure_string = "bad vm_flags"; > > > goto err_bad_arg; > > > } > > > - vma->vm_flags = (vma->vm_flags | VM_DONTCOPY) & ~VM_MAYWRITE; > > > + vma->vm_flags |= VM_DONTCOPY | VM_MIXEDMAP; > > > + vma->vm_flags &= ~VM_MAYWRITE; > > > + > > > vma->vm_ops = &binder_vm_ops; > > > vma->vm_private_data = proc; > > > > > > diff --git a/drivers/android/binder_alloc.c b/drivers/android/binder_alloc.c > > > index 5a426c877dfb..4f382d51def1 100644 > > > --- a/drivers/android/binder_alloc.c > > > +++ b/drivers/android/binder_alloc.c > > > @@ -219,7 +219,7 @@ static int binder_update_page_range(struct binder_alloc *alloc, int allocate, > > > mm = alloc->vma_vm_mm; > > > > > > if (mm) { > > > - down_write(&mm->mmap_sem); > > > + down_read(&mm->mmap_sem); > > > > > > Nice. Is there a need to hold the reader-lock at all here? Just curious what > > else is it protecting (here or in vm_insert_page). > > It should protect vm_area_struct. IOW, when we try insert page into virtual address area, > vma shouldn't be changed(ie, unmap/collapse/split). When you say unmap, are you talking about pages being unmapped from the VMA or something else? For the collapse/split part, the binder VMA (vm_area_struct) itself isn't changed after the initial mmap (AFAIK) so I don't see a need for protection there. Again, I'm not against the patch but thought its good to clarify for myself what the usage of the lock is, here. thanks, - Joel