Received: by 2002:a05:7412:d1aa:b0:fc:a2b0:25d7 with SMTP id ba42csp1398715rdb; Tue, 30 Jan 2024 18:29:56 -0800 (PST) X-Google-Smtp-Source: AGHT+IFcKkJ+zc34UzvH7qKkzV0bQsFTeYG9xrrFqG4Vol2lirMT7bFoIuP042Tplb8fpQeW/X3e X-Received: by 2002:a05:6a20:3d8b:b0:19e:279b:772d with SMTP id s11-20020a056a203d8b00b0019e279b772dmr350824pzi.28.1706668196370; Tue, 30 Jan 2024 18:29:56 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706668196; cv=pass; d=google.com; s=arc-20160816; b=rIq33Sa7NpNyCmeUaVEBKi6AvRByU+EdMlgHCzsk5rFr0/M7wcjby3Kb0k10AsH78L 7FZ9lmO96k21dp3Gi3y2p5c3b6C7hl2IEGMIbtZppAwNRiobAeuoLYiRglOMrV5wk4tG 5RnYI3XYe4j/KjLt1taRGuzAt1lj5vpWB8RdXofBaR7w9ov58GTLZOax4xVi2VQM6LN7 MNMYlsFYDhUhF/B41f0vLvGxeReG/rus1S+/bG5cw76HKJqWKSoZYQxN3E+11tOlTB5F BXAcCxFGm20EeWgd3dP8CKDJUZzUG5HdhVt1q432k1f7IdCL9KzF3j3Xciadn3Q9NjYf bnAQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=6gxggCDnUPNsYQmKqHXn0seDFBP3d7yi9LkljNs6G+o=; fh=xKFJDYFB/yoxFFLOQQ4Cg4pdv/kJjTRBU8BXmo11Gkk=; b=CIV3H+7Q3yRBm2Fnhhoaf01Eq45Sq9LKQLc4ucYPjsya0uq8ZK3kiQo68X8imoGaDS afoyG7EIe2/rVVJOiijO7c4NXJNlsTWtH9lPtsHTvX0p8pNO44ZPxfe0oUpMRvmIAcmM DQguR5sN0xEW634OKoD2cDRQMzoPUVor5qQZjOghp6t1AWIIrSaxY7hqZIJ9n4sVKcc0 u5EF85gh0aN3pKhp/ktqbmU2Soq0X5vvgNm4MZfz2Eptf9D5xKSTv4gC1muczqrwOyG5 KWfd8BUacPE3pvTjqfOfzAeZctwquhKRxYLFblZW0t6Lvy+LjxuVMwrcdL0wOH0fWRJt rDPQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@codeweavers.com header.s=s1 header.b=pPhHWQr6; arc=pass (i=1 spf=pass spfdomain=codeweavers.com dkim=pass dkdomain=codeweavers.com dmarc=pass fromdomain=codeweavers.com); spf=pass (google.com: domain of linux-kernel+bounces-45644-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-45644-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=codeweavers.com X-Forwarded-Encrypted: i=1; AJvYcCXgfkX+cdVITQBF5zjCI0/i1T1S8niH0DBDO/VCAHc+AsUVQFTiSYSDD+V40ttDj3J8K5oTLE2UF3+uZnjZx08qqILxr3BorjNRyRVuLQ== Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id n55-20020a056a000d7700b006dbd0e3c169si8507351pfv.19.2024.01.30.18.29.56 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 30 Jan 2024 18:29:56 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-45644-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@codeweavers.com header.s=s1 header.b=pPhHWQr6; arc=pass (i=1 spf=pass spfdomain=codeweavers.com dkim=pass dkdomain=codeweavers.com dmarc=pass fromdomain=codeweavers.com); spf=pass (google.com: domain of linux-kernel+bounces-45644-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-45644-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=codeweavers.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id EC068287A5A for ; Wed, 31 Jan 2024 02:19:43 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id D6E433A1AE; Wed, 31 Jan 2024 02:16:13 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=codeweavers.com header.i=@codeweavers.com header.b="pPhHWQr6" Received: from mail.codeweavers.com (mail.codeweavers.com [4.36.192.163]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id AAC3A610D; Wed, 31 Jan 2024 02:16:03 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=4.36.192.163 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706667368; cv=none; b=Iv5+XUh59Oj2JjfN/CigIDAmamfS0yavyPyDwAoUMY1Ybr4mR2DLVgX8fuhJxTgT9GQCNShrtCY28YUIecZNZarhh1M6GU0hMHlKloqy3DwTJacrLUt70cTgV0WVwG7o2t1pXl9Vjk27wneGrNdYG0Hha8sf80oxE5uvUeVJUrY= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706667368; c=relaxed/simple; bh=M4cpkX4quEVwwnmq0C8x/sMtuoEkGghGC1T9Fuo8irY=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=VMA14XNSKmplreOiiPHE4qm8sO/6RcDT8W7TVELQOR1fjkjNfJUY926QhYwoOyAP8j+tbUggru4Ftx59PMXtiAuag58o+GfxwlNsx+onyTdDwBwg1BdXXJDbuMACxYXuy3jrL+czAIbpfSZmOP4QvvAgoVIPGPiZ9RecdKLteps= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=codeweavers.com; spf=pass smtp.mailfrom=codeweavers.com; dkim=pass (2048-bit key) header.d=codeweavers.com header.i=@codeweavers.com header.b=pPhHWQr6; arc=none smtp.client-ip=4.36.192.163 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=codeweavers.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=codeweavers.com DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=codeweavers.com; s=s1; h=Message-ID:Date:Subject:Cc:To:From:Sender; bh=6gxggCDnUPNsYQmKqHXn0seDFBP3d7yi9LkljNs6G+o=; b=pPhHWQr6/nAT2mwDb4SZvuet/3 hd+qBirlgfz5YvLXMeEKflk6Z3WP2jwFvbyMwQm6J/XqTWwpiCV2GArlBRjDLOrqB2aqOUd/YDHcP E1yevq72CJgzByYq+yBiOcbK6iWjXuRWQ9UPSTOR3dAMB8WS/GKYFBUYUSCYro6EcinXGpOwSJ7kK HfpT+bH9kaO+D2FakuYy/KoJT2zwDkDcXsjFEVzfzx1Hu0ZPAdhcMx6+5r4iu8xcHtqZkDJn9xLXj eXz0X+r/f/Rd8FtRX5T4Yaj+8fpaaRggQBXBu/FcrTXMAHBwspNLeSEF4i+tcka4u2yF06QQFGpsE /njMNLzQ==; Received: from cw137ip160.mn.codeweavers.com ([10.69.137.160] helo=camazotz.mn.codeweavers.com) by mail.codeweavers.com with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.96) (envelope-from ) id 1rV08n-0038Kv-1p; Tue, 30 Jan 2024 20:15:53 -0600 From: Elizabeth Figura To: Arnd Bergmann , Greg Kroah-Hartman , Jonathan Corbet , Shuah Khan Cc: linux-kernel@vger.kernel.org, linux-api@vger.kernel.org, wine-devel@winehq.org, =?UTF-8?q?Andr=C3=A9=20Almeida?= , Wolfram Sang , Arkadiusz Hiler , Peter Zijlstra , Andy Lutomirski , linux-doc@vger.kernel.org, linux-kselftest@vger.kernel.org, Elizabeth Figura Subject: [RFC PATCH v2 08/29] ntsync: Introduce NTSYNC_IOC_MUTEX_KILL. Date: Tue, 30 Jan 2024 20:13:35 -0600 Message-ID: <20240131021356.10322-9-zfigura@codeweavers.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240131021356.10322-1-zfigura@codeweavers.com> References: <20240131021356.10322-1-zfigura@codeweavers.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit This does not correspond to any NT syscall. Rather, when a thread dies, it should be called by the NT emulator for each mutex. NT mutexes are robust (in the pthread sense). When an NT thread dies, any mutexes it owned are immediately released. Acquisition of those mutexes by other threads will return a special value indicating that the mutex was abandoned, like EOWNERDEAD returned from pthread_mutex_lock(), and EOWNERDEAD is indeed used here for that purpose. Signed-off-by: Elizabeth Figura --- drivers/misc/ntsync.c | 71 +++++++++++++++++++++++++++++++++++-- include/uapi/linux/ntsync.h | 1 + 2 files changed, 70 insertions(+), 2 deletions(-) diff --git a/drivers/misc/ntsync.c b/drivers/misc/ntsync.c index 1770ec4008af..aadf01c65ca0 100644 --- a/drivers/misc/ntsync.c +++ b/drivers/misc/ntsync.c @@ -37,6 +37,7 @@ struct ntsync_obj { struct { __u32 count; __u32 owner; + bool ownerdead; } mutex; } u; @@ -89,6 +90,7 @@ struct ntsync_q { atomic_t signaled; bool all; + bool ownerdead; __u32 count; struct ntsync_q_entry entries[]; }; @@ -164,6 +166,9 @@ static void try_wake_all(struct ntsync_device *dev, struct ntsync_q *q, obj->u.sem.count--; break; case NTSYNC_TYPE_MUTEX: + if (obj->u.mutex.ownerdead) + q->ownerdead = true; + obj->u.mutex.ownerdead = false; obj->u.mutex.count++; obj->u.mutex.owner = q->owner; break; @@ -223,6 +228,9 @@ static void try_wake_any_mutex(struct ntsync_obj *mutex) continue; if (atomic_cmpxchg(&q->signaled, -1, entry->index) == -1) { + if (mutex->u.mutex.ownerdead) + q->ownerdead = true; + mutex->u.mutex.ownerdead = false; mutex->u.mutex.count++; mutex->u.mutex.owner = q->owner; wake_up_process(q->task); @@ -352,6 +360,62 @@ static int ntsync_mutex_unlock(struct ntsync_obj *mutex, void __user *argp) return ret; } +/* + * Actually change the mutex state to mark its owner as dead, + * returning -EPERM if not the owner. + */ +static int kill_mutex_state(struct ntsync_obj *mutex, __u32 owner) +{ + lockdep_assert_held(&mutex->lock); + + if (mutex->u.mutex.owner != owner) + return -EPERM; + + mutex->u.mutex.ownerdead = true; + mutex->u.mutex.owner = 0; + mutex->u.mutex.count = 0; + return 0; +} + +static int ntsync_mutex_kill(struct ntsync_obj *mutex, void __user *argp) +{ + struct ntsync_device *dev = mutex->dev; + __u32 owner; + int ret; + + if (get_user(owner, (__u32 __user *)argp)) + return -EFAULT; + if (!owner) + return -EINVAL; + + if (mutex->type != NTSYNC_TYPE_MUTEX) + return -EINVAL; + + if (atomic_read(&mutex->all_hint) > 0) { + spin_lock(&dev->wait_all_lock); + spin_lock_nest_lock(&mutex->lock, &dev->wait_all_lock); + + ret = kill_mutex_state(mutex, owner); + if (!ret) { + try_wake_all_obj(dev, mutex); + try_wake_any_mutex(mutex); + } + + spin_unlock(&mutex->lock); + spin_unlock(&dev->wait_all_lock); + } else { + spin_lock(&mutex->lock); + + ret = kill_mutex_state(mutex, owner); + if (!ret) + try_wake_any_mutex(mutex); + + spin_unlock(&mutex->lock); + } + + return ret; +} + static int ntsync_obj_release(struct inode *inode, struct file *file) { struct ntsync_obj *obj = file->private_data; @@ -373,6 +437,8 @@ static long ntsync_obj_ioctl(struct file *file, unsigned int cmd, return ntsync_sem_post(obj, argp); case NTSYNC_IOC_MUTEX_UNLOCK: return ntsync_mutex_unlock(obj, argp); + case NTSYNC_IOC_MUTEX_KILL: + return ntsync_mutex_kill(obj, argp); default: return -ENOIOCTLCMD; } @@ -555,6 +621,7 @@ static int setup_wait(struct ntsync_device *dev, q->owner = args->owner; atomic_set(&q->signaled, -1); q->all = all; + q->ownerdead = false; q->count = count; for (i = 0; i < count; i++) { @@ -664,7 +731,7 @@ static int ntsync_wait_any(struct ntsync_device *dev, void __user *argp) struct ntsync_wait_args __user *user_args = argp; /* even if we caught a signal, we need to communicate success */ - ret = 0; + ret = q->ownerdead ? -EOWNERDEAD : 0; if (put_user(signaled, &user_args->index)) ret = -EFAULT; @@ -747,7 +814,7 @@ static int ntsync_wait_all(struct ntsync_device *dev, void __user *argp) struct ntsync_wait_args __user *user_args = argp; /* even if we caught a signal, we need to communicate success */ - ret = 0; + ret = q->ownerdead ? -EOWNERDEAD : 0; if (put_user(signaled, &user_args->index)) ret = -EFAULT; diff --git a/include/uapi/linux/ntsync.h b/include/uapi/linux/ntsync.h index a3f5f4f13798..3861397c6c2f 100644 --- a/include/uapi/linux/ntsync.h +++ b/include/uapi/linux/ntsync.h @@ -40,5 +40,6 @@ struct ntsync_wait_args { #define NTSYNC_IOC_SEM_POST _IOWR('N', 0x81, __u32) #define NTSYNC_IOC_MUTEX_UNLOCK _IOWR('N', 0x85, struct ntsync_mutex_args) +#define NTSYNC_IOC_MUTEX_KILL _IOW ('N', 0x86, __u32) #endif -- 2.43.0