Received: by 10.192.165.148 with SMTP id m20csp466545imm; Wed, 9 May 2018 16:20:13 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrY+QgMknOgy0ZG1d7eMPYVJ4mQxbludYNPMzXKhHNo1xGM6NQ1YTJoQD0C/yAW2HD9Y58n X-Received: by 10.98.35.215 with SMTP id q84mr45248805pfj.31.1525908013329; Wed, 09 May 2018 16:20:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525908013; cv=none; d=google.com; s=arc-20160816; b=NJXDrM2YkbzWeVTwayTjtp3aPLrOjW8CzXjIhYj43eLKer5HVYjixdTQ/9IlpHOeAw 77KzzmKsJakoliYaPGqzSV4oH3BVwq8tT8ZmIkH1XMblAK6tKYlksRgf39J/PSCVmnnF kGzt845CHzGDyT0K0Lw587vJ8NzYAgWUgoOddiUi87rtTiR4QiE//lDvff9dVaO+d6or 2VruDj8P6+rhp2yH/5aeKl7Ay/wuhKWvO72JSo/RhBZtv41YH1lsU0tvRRG6VjEM8lvH d7Sd8abtV86UpAbt/BPOqjN19cVY7a6byaOjTodZzAJRqGz6NuBlOY4MDfZmdmKTQVFr HP9w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature :arc-authentication-results; bh=YqbweGF0wvn1Z4SAKNrfAhkoygY4bosf+n3c0X9OEjk=; b=OuMWpSli6PMMW2+FtAy95LN2QTM/oUg5etBqz2v7OXojVkV4B73IQ50h6x1za+SB92 2oy2gZafqozDAI8vf7aPgMiDqo24MiExVFtub2gfO0PuL8wZ9Ga0uqoQyglNYV4/NJ80 mQfNjXUUgfrU1CbC7zdYGEZZMXcPg+2tCB8WJc1XlZ1sWKvl8J3//GrkrlVYrGsj/k/9 VlwHVlGGMywvxwYX1reeb5Dgp4gSM2xzc2691cj267i8dGHItTZ+OVJT4O5OH15SWRaD jEIvcV4J2zMt6QOr0Ko/QCFoN0yh6TuNUIF9y38EJJaICqUzUdsoWcU3Gp2WFWI8JmwR Ir2Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@joelfernandes-org.20150623.gappssmtp.com header.s=20150623 header.b=UGzQgyFJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z5-v6si16040741pln.562.2018.05.09.16.19.58; Wed, 09 May 2018 16:20:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@joelfernandes-org.20150623.gappssmtp.com header.s=20150623 header.b=UGzQgyFJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S966002AbeEIXTs (ORCPT + 99 others); Wed, 9 May 2018 19:19:48 -0400 Received: from mail-pf0-f193.google.com ([209.85.192.193]:42474 "EHLO mail-pf0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965994AbeEIXTo (ORCPT ); Wed, 9 May 2018 19:19:44 -0400 Received: by mail-pf0-f193.google.com with SMTP id p14-v6so109766pfh.9 for ; Wed, 09 May 2018 16:19:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelfernandes-org.20150623.gappssmtp.com; s=20150623; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:content-transfer-encoding:in-reply-to :user-agent; bh=YqbweGF0wvn1Z4SAKNrfAhkoygY4bosf+n3c0X9OEjk=; b=UGzQgyFJuZmDqm1r6TCfU4B/zCSMfurRCqZpf2DxlJW3kNUWS8D1l4D+1dM5u36TIJ sXHu7dTQ57QwP2y/6uDfyvGnT1W3f4kB3+ORlfGd3BalCa73ixttfDvRmBnkV1ZMpAXG SqhGJiIjQDSzGDJZFus+pmOXHsabEyqY5VmJXjqBEjLogC0Z2qDtKgUU2jQfyM869qrs 0I5GmtDqBrPov9UmYdxEw2sV7lYZSZCVTDJ5fC+yG58mQHpl4LyLFoHs5fAbGPFdjUWc djKrxAZ4VE/DDmYX129AC8k7SVRoGz+AyS0mdGWc/g11/FYch+363kmpfOV6icmcTYar FlfQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to:user-agent; bh=YqbweGF0wvn1Z4SAKNrfAhkoygY4bosf+n3c0X9OEjk=; b=uiPgHF5h2Rd0kzx1HY7juhr9N+WbPDTmj7Nj4nvspXbNPJXbFfNdW/iyPoicc3eVvZ HMnNynJgZvA7N3eVw4YZK04BBNiLqnhlmCuynfI4tri4Y3Rpsl0cfgUtsHyKOrCHktWD pXXAeXAFj/Ba7hc59J+nvzYv9Fnw9VRhRgHeJAFWTX5fOaQcq3EjHUrxhn5wdFsgmwhl 4DJbYwBJxQ6meYsLsIVKJTYQf0FV4ImkaNLzPSq+f7y1u+X/sHV86oaTH+AJSNjgniE1 MPGAuQMBQc8y76TP7ch5bJvCddDIxWU+5IUsuyJoQ2P0uCjZxZ++56hAvvg/4r8ZrDa1 8PHw== X-Gm-Message-State: ALQs6tD0JYdRo3LY1EsckMmDVDitWHFpUgRK+ARfhD+eqMSSmvJS5L4G a3j5EIadFt4YYBJB7j/yN0OIyA== X-Received: by 2002:a65:5686:: with SMTP id v6-v6mr35938203pgs.92.1525907983481; Wed, 09 May 2018 16:19:43 -0700 (PDT) Received: from localhost ([2620:0:1000:1600:3122:ea9c:d178:eb]) by smtp.gmail.com with ESMTPSA id 204-v6sm43826759pgf.61.2018.05.09.16.19.42 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Wed, 09 May 2018 16:19:42 -0700 (PDT) Date: Wed, 9 May 2018 16:19:41 -0700 From: Joel Fernandes To: Minchan Kim Cc: LKML , Ganesh Mahendran , Joe Perches , Arve =?iso-8859-1?B?SGr4bm5lduVn?= , Todd Kjos , Greg Kroah-Hartman , Martijn Coenen Subject: Re: [PATCH v6] ANDROID: binder: change down_write to down_read Message-ID: <20180509231941.GA4790@joelaf.mtv.corp.google.com> References: <20180507141537.4855-1-minchan@kernel.org> <20180507172829.GA66161@joelaf.mtv.corp.google.com> <20180508105101.GB8209@rodete-desktop-imager.corp.google.com> <20180508230813.GA102094@joelaf.mtv.corp.google.com> <20180509064023.GD8209@rodete-desktop-imager.corp.google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20180509064023.GD8209@rodete-desktop-imager.corp.google.com> User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, May 09, 2018 at 03:40:23PM +0900, Minchan Kim wrote: > On Tue, May 08, 2018 at 04:08:13PM -0700, Joel Fernandes wrote: > > On Tue, May 08, 2018 at 07:51:01PM +0900, Minchan Kim wrote: > > > On Mon, May 07, 2018 at 10:28:29AM -0700, Joel Fernandes wrote: > > > > On Mon, May 07, 2018 at 11:15:37PM +0900, Minchan Kim wrote: > > > > > binder_update_page_range needs down_write of mmap_sem because > > > > > vm_insert_page need to change vma->vm_flags to VM_MIXEDMAP unless > > > > > it is set. However, when I profile binder working, it seems > > > > > every binder buffers should be mapped in advance by binder_mmap. > > > > > It means we could set VM_MIXEDMAP in binder_mmap time which is > > > > > already hold a mmap_sem as down_write so binder_update_page_range > > > > > doesn't need to hold a mmap_sem as down_write. > > > > > Please use proper API down_read. It would help mmap_sem contention > > > > > problem as well as fixing down_write abuse. > > > > > > > > > > Ganesh Mahendran tested app launching and binder throughput test > > > > > and he said he couldn't find any problem and I did binder latency > > > > > test per Greg KH request(Thanks Martijn to teach me how I can do) > > > > > I cannot find any problem, too. > > > > > > > > > > Cc: Ganesh Mahendran > > > > > Cc: Joe Perches > > > > > Cc: Arve Hj?nnev?g > > > > > Cc: Todd Kjos > > > > > Cc: Greg Kroah-Hartman > > > > > Reviewed-by: Martijn Coenen > > > > > Signed-off-by: Minchan Kim > > > > > --- > > > > > drivers/android/binder.c | 4 +++- > > > > > drivers/android/binder_alloc.c | 6 +++--- > > > > > 2 files changed, 6 insertions(+), 4 deletions(-) > > > > > > > > > > diff --git a/drivers/android/binder.c b/drivers/android/binder.c > > > > > index 4eab5be3d00f..7b8e96f60719 100644 > > > > > --- a/drivers/android/binder.c > > > > > +++ b/drivers/android/binder.c > > > > > @@ -4730,7 +4730,9 @@ static int binder_mmap(struct file *filp, struct vm_area_struct *vma) > > > > > failure_string = "bad vm_flags"; > > > > > goto err_bad_arg; > > > > > } > > > > > - vma->vm_flags = (vma->vm_flags | VM_DONTCOPY) & ~VM_MAYWRITE; > > > > > + vma->vm_flags |= VM_DONTCOPY | VM_MIXEDMAP; > > > > > + vma->vm_flags &= ~VM_MAYWRITE; > > > > > + > > > > > vma->vm_ops = &binder_vm_ops; > > > > > vma->vm_private_data = proc; > > > > > > > > > > diff --git a/drivers/android/binder_alloc.c b/drivers/android/binder_alloc.c > > > > > index 5a426c877dfb..4f382d51def1 100644 > > > > > --- a/drivers/android/binder_alloc.c > > > > > +++ b/drivers/android/binder_alloc.c > > > > > @@ -219,7 +219,7 @@ static int binder_update_page_range(struct binder_alloc *alloc, int allocate, > > > > > mm = alloc->vma_vm_mm; > > > > > > > > > > if (mm) { > > > > > - down_write(&mm->mmap_sem); > > > > > + down_read(&mm->mmap_sem); > > > > > > > > > > > > Nice. Is there a need to hold the reader-lock at all here? Just curious what > > > > else is it protecting (here or in vm_insert_page). > > > > > > It should protect vm_area_struct. IOW, when we try insert page into virtual address area, > > > vma shouldn't be changed(ie, unmap/collapse/split). > > > > When you say unmap, are you talking about pages being unmapped from the VMA > > or something else? > > I mean to destroy vm_area_struct itself as well as unmap pages. > > > > > For the collapse/split part, the binder VMA (vm_area_struct) itself isn't > > changed after the initial mmap (AFAIK) so I don't see a need for protection > > there. > > There is no way to unmap in runtime? What happens if some buggy applications > do unmap by mistake? > Cannot we access those B's vma from A context? > If B process is exiting, the VMA would be gone while A is accessing. If the VMA is gone, then why is it a good idea to map pages into it anyway? About the unmap at runtime part, your commit message was a bit confusing. You said "every binder buffers should be mapped in advance by binder_mmap." but I think the new binder shrinker mechanism doesn't make that true anymore. The unmap by mistake point is a valid one I guess. thanks, - Joel