Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp180696imm; Mon, 14 May 2018 23:28:33 -0700 (PDT) X-Google-Smtp-Source: AB8JxZq4h689lIXSF5jWvaLeUnXFI4DPCSIfWgUEJqvz/PHdskk3DsarWc1ZJ4WZGNjqDUt3l/wT X-Received: by 2002:a17:902:b908:: with SMTP id bf8-v6mr12869535plb.358.1526365713750; Mon, 14 May 2018 23:28:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526365713; cv=none; d=google.com; s=arc-20160816; b=aFF6Q/09GapG8eyBgM4ocJh27RpKos77RYM4VbIVxf6Bd+TNVzPusYgeoraWtsSe5U qw7EDgr16FZdw1jBscaQqWNA3+CvHey+/KdpsZj5uhppC0B/r5QFdbh3ky09OrKSdNAm f6FpfNOpjpnbghHyHQDeV3cJjAg3dSOF0xM70ddCp9VtdDmojUDyeWGjTHpw/ZjKcx1d OcVNIgfZVHXSwsMaKcM1E1CdtJ0EGCLMJZ+zhPtVTAXnU3f2k+3cO83aJu8mV8fQ9jPO LDwlJcpm5vXag2KVbd8PZVkvPCL2levL2aT/skVDs96va4rHq8Ok/cye5nmT7DzeyOg1 a5nA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:date:from:dkim-signature :arc-authentication-results; bh=zphKUf2FW4RAln8KpU6kmkNfe+snNuhKFzd8FNUySWg=; b=vRP8hDQSbNnlq0b8wCEE2xLJL7BddUwihUYbgeB6J+vXdB37kyh/dsZ9rpi2ffDuoU Xt6K1+IV0Tc0acau7tixTePMmHHhTQywH6JAQ9d//lgyY/Y2AmXbI2WfMSFJ+rsTdpT6 Lzo7Gu4SB7IIoq0l12UeoVCgNjCkQiQpTTf0W5YYK7XHgVNoCzSqKt0evaNbbPSjeQkq uzqwAy5jWJLcdKs//kRoe1fNVqYiGufclwCIPDvHSWjS42LsuhGCyqP9+p65HmGOFcJP h8aAfsf2Iae7fz88wYCam0ej2V8i/HOmQqTmTMail8kVXQFX0i1656tq9rvKJ4ZvlpZ7 Wmkw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=bb0T8/BY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y7-v6si10481029plk.473.2018.05.14.23.28.19; Mon, 14 May 2018 23:28:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=bb0T8/BY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752359AbeEOG1l (ORCPT + 99 others); Tue, 15 May 2018 02:27:41 -0400 Received: from mail-pl0-f65.google.com ([209.85.160.65]:38434 "EHLO mail-pl0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752044AbeEOG1j (ORCPT ); Tue, 15 May 2018 02:27:39 -0400 Received: by mail-pl0-f65.google.com with SMTP id c11-v6so8800676plr.5 for ; Mon, 14 May 2018 23:27:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:date:to:cc:subject:message-id:references:mime-version :content-disposition:content-transfer-encoding:in-reply-to :user-agent; bh=zphKUf2FW4RAln8KpU6kmkNfe+snNuhKFzd8FNUySWg=; b=bb0T8/BY+4SCS09tdCDsaCqewGkrWGQbH1ml/adlv9W5OuhMp3/UTJXN3d08Nw6Uc/ liQQutpip7dCsNodqkuUt9A6synOtajuZVE4XLrT6Am6964xVlYCwEdgUjV+PcUS36cf KAbDFR4BicICd0yU3tIGTmMMVeGDtvjvkm8NIbSd8YzAJT8MOQu3q/vYJ6HI//pjWUi/ rwIoC7BNQsoEaxLzU7AD9JYQl1huB2sq1enBjC51CopARMkRvCmQwx2ovLNs8W8ytAOI IviuXNX9e4PGXNI22zkXD1Nypp10PAvIV8xD55FUHhGxDozElBqxh0j76YMuepkcCgTu 0b0Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:date:to:cc:subject:message-id:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to:user-agent; bh=zphKUf2FW4RAln8KpU6kmkNfe+snNuhKFzd8FNUySWg=; b=N2nHhVcdtyTbdrQQxvC17rhpmeqgW7+m8NXypyOGQRAe4clkr1hUdR7ij5GnvtRCyW f2Rgf04lNU2vGN0C+5U4bBQojxzwv6bOjnTlakCRxggD1e8PqPNHDY9lwEiyM18deAYu bpALQGx0bSKV9KMQIpxGFO5QPJMQKnmcV8bWE9qOjedFdVPi68S6wBdjg4s2oKpLYGZG rwORHEFZYlpIEEszKt7G3g9id60nOsqsdMLZx8zv8V2Zp0aMLlIz3w/gbwKYPBO78DzQ GgPx5vsdFqcC8IJKU4gc7Xm0XDxGK9lFQvoyOWfdjutg0fiiMV32SoBr3ffzJMCiC4iM 8jAQ== X-Gm-Message-State: ALKqPwf0ksJ4Qv10WBjsmUTCBfM7Y8DlanIRMUBtqy9mK9QnW7Q+Whcw /v0YiTvRoEvXNRH40JGrh148Auxb X-Received: by 2002:a17:902:264:: with SMTP id 91-v6mr13005465plc.341.1526365658877; Mon, 14 May 2018 23:27:38 -0700 (PDT) Received: from rodete-desktop-imager.corp.google.com ([2401:fa00:d:10:affa:813f:5380:6613]) by smtp.gmail.com with ESMTPSA id k12-v6sm15760096pgq.23.2018.05.14.23.27.35 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Mon, 14 May 2018 23:27:38 -0700 (PDT) From: Minchan Kim X-Google-Original-From: Minchan Kim Date: Tue, 15 May 2018 15:27:32 +0900 To: Joel Fernandes Cc: LKML , Ganesh Mahendran , Joe Perches , Arve =?iso-8859-1?B?SGr4bm5lduVn?= , Todd Kjos , Greg Kroah-Hartman , Martijn Coenen Subject: Re: [PATCH v6] ANDROID: binder: change down_write to down_read Message-ID: <20180515062732.GA183759@rodete-desktop-imager.corp.google.com> References: <20180507141537.4855-1-minchan@kernel.org> <20180507172829.GA66161@joelaf.mtv.corp.google.com> <20180508105101.GB8209@rodete-desktop-imager.corp.google.com> <20180508230813.GA102094@joelaf.mtv.corp.google.com> <20180509064023.GD8209@rodete-desktop-imager.corp.google.com> <20180509231941.GA4790@joelaf.mtv.corp.google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20180509231941.GA4790@joelaf.mtv.corp.google.com> User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Joel, Sorry for the late response. I was off. On Wed, May 09, 2018 at 04:19:41PM -0700, Joel Fernandes wrote: > On Wed, May 09, 2018 at 03:40:23PM +0900, Minchan Kim wrote: > > On Tue, May 08, 2018 at 04:08:13PM -0700, Joel Fernandes wrote: > > > On Tue, May 08, 2018 at 07:51:01PM +0900, Minchan Kim wrote: > > > > On Mon, May 07, 2018 at 10:28:29AM -0700, Joel Fernandes wrote: > > > > > On Mon, May 07, 2018 at 11:15:37PM +0900, Minchan Kim wrote: > > > > > > binder_update_page_range needs down_write of mmap_sem because > > > > > > vm_insert_page need to change vma->vm_flags to VM_MIXEDMAP unless > > > > > > it is set. However, when I profile binder working, it seems > > > > > > every binder buffers should be mapped in advance by binder_mmap. > > > > > > It means we could set VM_MIXEDMAP in binder_mmap time which is > > > > > > already hold a mmap_sem as down_write so binder_update_page_range > > > > > > doesn't need to hold a mmap_sem as down_write. > > > > > > Please use proper API down_read. It would help mmap_sem contention > > > > > > problem as well as fixing down_write abuse. > > > > > > > > > > > > Ganesh Mahendran tested app launching and binder throughput test > > > > > > and he said he couldn't find any problem and I did binder latency > > > > > > test per Greg KH request(Thanks Martijn to teach me how I can do) > > > > > > I cannot find any problem, too. > > > > > > > > > > > > Cc: Ganesh Mahendran > > > > > > Cc: Joe Perches > > > > > > Cc: Arve Hj?nnev?g > > > > > > Cc: Todd Kjos > > > > > > Cc: Greg Kroah-Hartman > > > > > > Reviewed-by: Martijn Coenen > > > > > > Signed-off-by: Minchan Kim > > > > > > --- > > > > > > drivers/android/binder.c | 4 +++- > > > > > > drivers/android/binder_alloc.c | 6 +++--- > > > > > > 2 files changed, 6 insertions(+), 4 deletions(-) > > > > > > > > > > > > diff --git a/drivers/android/binder.c b/drivers/android/binder.c > > > > > > index 4eab5be3d00f..7b8e96f60719 100644 > > > > > > --- a/drivers/android/binder.c > > > > > > +++ b/drivers/android/binder.c > > > > > > @@ -4730,7 +4730,9 @@ static int binder_mmap(struct file *filp, struct vm_area_struct *vma) > > > > > > failure_string = "bad vm_flags"; > > > > > > goto err_bad_arg; > > > > > > } > > > > > > - vma->vm_flags = (vma->vm_flags | VM_DONTCOPY) & ~VM_MAYWRITE; > > > > > > + vma->vm_flags |= VM_DONTCOPY | VM_MIXEDMAP; > > > > > > + vma->vm_flags &= ~VM_MAYWRITE; > > > > > > + > > > > > > vma->vm_ops = &binder_vm_ops; > > > > > > vma->vm_private_data = proc; > > > > > > > > > > > > diff --git a/drivers/android/binder_alloc.c b/drivers/android/binder_alloc.c > > > > > > index 5a426c877dfb..4f382d51def1 100644 > > > > > > --- a/drivers/android/binder_alloc.c > > > > > > +++ b/drivers/android/binder_alloc.c > > > > > > @@ -219,7 +219,7 @@ static int binder_update_page_range(struct binder_alloc *alloc, int allocate, > > > > > > mm = alloc->vma_vm_mm; > > > > > > > > > > > > if (mm) { > > > > > > - down_write(&mm->mmap_sem); > > > > > > + down_read(&mm->mmap_sem); > > > > > > > > > > > > > > > Nice. Is there a need to hold the reader-lock at all here? Just curious what > > > > > else is it protecting (here or in vm_insert_page). > > > > > > > > It should protect vm_area_struct. IOW, when we try insert page into virtual address area, > > > > vma shouldn't be changed(ie, unmap/collapse/split). > > > > > > When you say unmap, are you talking about pages being unmapped from the VMA > > > or something else? > > > > I mean to destroy vm_area_struct itself as well as unmap pages. > > > > > > > > For the collapse/split part, the binder VMA (vm_area_struct) itself isn't > > > changed after the initial mmap (AFAIK) so I don't see a need for protection > > > there. > > > > There is no way to unmap in runtime? What happens if some buggy applications > > do unmap by mistake? > > Cannot we access those B's vma from A context? > > If B process is exiting, the VMA would be gone while A is accessing. > > If the VMA is gone, then why is it a good idea to map pages into it anyway? Hmm, sorry about that. I couldn't understand your point. > > About the unmap at runtime part, your commit message was a bit confusing. You > said "every binder buffers should be mapped in advance by binder_mmap." but I > think the new binder shrinker mechanism doesn't make that true anymore. It's good point. I didn't know know that. When I see binder_vm_fault, it emits SIGBUS. That means shrinker cannot zap pages process is using, I think. IOW, every pages for binder are mapped at mmap time and is never mapped in runtime by page fault. Right? Thanks. > > The unmap by mistake point is a valid one I guess. > > thanks, > > - Joel >