thread.c 29 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132
  1. /*
  2. * Copyright (c) 2010-2014 Wind River Systems, Inc.
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. */
  6. /**
  7. * @file
  8. * @brief Kernel thread support
  9. *
  10. * This module provides general purpose thread support.
  11. */
  12. #include <kernel.h>
  13. #include <spinlock.h>
  14. #include <sys/math_extras.h>
  15. #include <sys_clock.h>
  16. #include <ksched.h>
  17. #include <wait_q.h>
  18. #include <syscall_handler.h>
  19. #include <kernel_internal.h>
  20. #include <kswap.h>
  21. #include <init.h>
  22. #include <tracing/tracing.h>
  23. #include <string.h>
  24. #include <stdbool.h>
  25. #include <irq_offload.h>
  26. #include <sys/check.h>
  27. #include <random/rand32.h>
  28. #include <sys/atomic.h>
  29. #include <logging/log.h>
  30. LOG_MODULE_DECLARE(os, CONFIG_KERNEL_LOG_LEVEL);
  31. #ifdef CONFIG_THREAD_RUNTIME_STATS
  32. k_thread_runtime_stats_t threads_runtime_stats;
  33. #endif
  34. #ifdef CONFIG_THREAD_MONITOR
  35. /* This lock protects the linked list of active threads; i.e. the
  36. * initial _kernel.threads pointer and the linked list made up of
  37. * thread->next_thread (until NULL)
  38. */
  39. static struct k_spinlock z_thread_monitor_lock;
  40. #endif /* CONFIG_THREAD_MONITOR */
  41. #define _FOREACH_STATIC_THREAD(thread_data) \
  42. STRUCT_SECTION_FOREACH(_static_thread_data, thread_data)
  43. void k_thread_foreach(k_thread_user_cb_t user_cb, void *user_data)
  44. {
  45. #if defined(CONFIG_THREAD_MONITOR)
  46. struct k_thread *thread;
  47. k_spinlock_key_t key;
  48. __ASSERT(user_cb != NULL, "user_cb can not be NULL");
  49. /*
  50. * Lock is needed to make sure that the _kernel.threads is not being
  51. * modified by the user_cb either directly or indirectly.
  52. * The indirect ways are through calling k_thread_create and
  53. * k_thread_abort from user_cb.
  54. */
  55. key = k_spin_lock(&z_thread_monitor_lock);
  56. SYS_PORT_TRACING_FUNC_ENTER(k_thread, foreach);
  57. for (thread = _kernel.threads; thread; thread = thread->next_thread) {
  58. user_cb(thread, user_data);
  59. }
  60. SYS_PORT_TRACING_FUNC_EXIT(k_thread, foreach);
  61. k_spin_unlock(&z_thread_monitor_lock, key);
  62. #endif
  63. }
  64. void k_thread_foreach_unlocked(k_thread_user_cb_t user_cb, void *user_data)
  65. {
  66. #if defined(CONFIG_THREAD_MONITOR)
  67. struct k_thread *thread;
  68. k_spinlock_key_t key;
  69. __ASSERT(user_cb != NULL, "user_cb can not be NULL");
  70. key = k_spin_lock(&z_thread_monitor_lock);
  71. SYS_PORT_TRACING_FUNC_ENTER(k_thread, foreach_unlocked);
  72. for (thread = _kernel.threads; thread; thread = thread->next_thread) {
  73. k_spin_unlock(&z_thread_monitor_lock, key);
  74. user_cb(thread, user_data);
  75. key = k_spin_lock(&z_thread_monitor_lock);
  76. }
  77. SYS_PORT_TRACING_FUNC_EXIT(k_thread, foreach_unlocked);
  78. k_spin_unlock(&z_thread_monitor_lock, key);
  79. #endif
  80. }
  81. bool k_is_in_isr(void)
  82. {
  83. return arch_is_in_isr();
  84. }
  85. /*
  86. * This function tags the current thread as essential to system operation.
  87. * Exceptions raised by this thread will be treated as a fatal system error.
  88. */
  89. void z_thread_essential_set(void)
  90. {
  91. _current->base.user_options |= K_ESSENTIAL;
  92. }
  93. /*
  94. * This function tags the current thread as not essential to system operation.
  95. * Exceptions raised by this thread may be recoverable.
  96. * (This is the default tag for a thread.)
  97. */
  98. void z_thread_essential_clear(void)
  99. {
  100. _current->base.user_options &= ~K_ESSENTIAL;
  101. }
  102. /*
  103. * This routine indicates if the current thread is an essential system thread.
  104. *
  105. * Returns true if current thread is essential, false if it is not.
  106. */
  107. bool z_is_thread_essential(void)
  108. {
  109. return (_current->base.user_options & K_ESSENTIAL) == K_ESSENTIAL;
  110. }
  111. #ifdef CONFIG_THREAD_CUSTOM_DATA
  112. void z_impl_k_thread_custom_data_set(void *value)
  113. {
  114. _current->custom_data = value;
  115. }
  116. #ifdef CONFIG_USERSPACE
  117. static inline void z_vrfy_k_thread_custom_data_set(void *data)
  118. {
  119. z_impl_k_thread_custom_data_set(data);
  120. }
  121. #include <syscalls/k_thread_custom_data_set_mrsh.c>
  122. #endif
  123. void *z_impl_k_thread_custom_data_get(void)
  124. {
  125. return _current->custom_data;
  126. }
  127. #ifdef CONFIG_USERSPACE
  128. static inline void *z_vrfy_k_thread_custom_data_get(void)
  129. {
  130. return z_impl_k_thread_custom_data_get();
  131. }
  132. #include <syscalls/k_thread_custom_data_get_mrsh.c>
  133. #endif /* CONFIG_USERSPACE */
  134. #endif /* CONFIG_THREAD_CUSTOM_DATA */
  135. #if defined(CONFIG_THREAD_MONITOR)
  136. /*
  137. * Remove a thread from the kernel's list of active threads.
  138. */
  139. void z_thread_monitor_exit(struct k_thread *thread)
  140. {
  141. k_spinlock_key_t key = k_spin_lock(&z_thread_monitor_lock);
  142. if (thread == _kernel.threads) {
  143. _kernel.threads = _kernel.threads->next_thread;
  144. } else {
  145. struct k_thread *prev_thread;
  146. prev_thread = _kernel.threads;
  147. while ((prev_thread != NULL) &&
  148. (thread != prev_thread->next_thread)) {
  149. prev_thread = prev_thread->next_thread;
  150. }
  151. if (prev_thread != NULL) {
  152. prev_thread->next_thread = thread->next_thread;
  153. }
  154. }
  155. k_spin_unlock(&z_thread_monitor_lock, key);
  156. }
  157. #endif
  158. int z_impl_k_thread_name_set(struct k_thread *thread, const char *value)
  159. {
  160. #ifdef CONFIG_THREAD_NAME
  161. if (thread == NULL) {
  162. thread = _current;
  163. }
  164. strncpy(thread->name, value, CONFIG_THREAD_MAX_NAME_LEN);
  165. thread->name[CONFIG_THREAD_MAX_NAME_LEN - 1] = '\0';
  166. SYS_PORT_TRACING_OBJ_FUNC(k_thread, name_set, thread, 0);
  167. return 0;
  168. #else
  169. ARG_UNUSED(thread);
  170. ARG_UNUSED(value);
  171. SYS_PORT_TRACING_OBJ_FUNC(k_thread, name_set, thread, -ENOSYS);
  172. return -ENOSYS;
  173. #endif /* CONFIG_THREAD_NAME */
  174. }
  175. #ifdef CONFIG_USERSPACE
  176. static inline int z_vrfy_k_thread_name_set(struct k_thread *thread, const char *str)
  177. {
  178. #ifdef CONFIG_THREAD_NAME
  179. char name[CONFIG_THREAD_MAX_NAME_LEN];
  180. if (thread != NULL) {
  181. if (Z_SYSCALL_OBJ(thread, K_OBJ_THREAD) != 0) {
  182. return -EINVAL;
  183. }
  184. }
  185. /* In theory we could copy directly into thread->name, but
  186. * the current z_vrfy / z_impl split does not provide a
  187. * means of doing so.
  188. */
  189. if (z_user_string_copy(name, (char *)str, sizeof(name)) != 0) {
  190. return -EFAULT;
  191. }
  192. return z_impl_k_thread_name_set(thread, name);
  193. #else
  194. return -ENOSYS;
  195. #endif /* CONFIG_THREAD_NAME */
  196. }
  197. #include <syscalls/k_thread_name_set_mrsh.c>
  198. #endif /* CONFIG_USERSPACE */
  199. const char *k_thread_name_get(struct k_thread *thread)
  200. {
  201. #ifdef CONFIG_THREAD_NAME
  202. return (const char *)thread->name;
  203. #else
  204. ARG_UNUSED(thread);
  205. return NULL;
  206. #endif /* CONFIG_THREAD_NAME */
  207. }
  208. int z_impl_k_thread_name_copy(k_tid_t thread, char *buf, size_t size)
  209. {
  210. #ifdef CONFIG_THREAD_NAME
  211. strncpy(buf, thread->name, size);
  212. return 0;
  213. #else
  214. ARG_UNUSED(thread);
  215. ARG_UNUSED(buf);
  216. ARG_UNUSED(size);
  217. return -ENOSYS;
  218. #endif /* CONFIG_THREAD_NAME */
  219. }
  220. const char *k_thread_state_str(k_tid_t thread_id)
  221. {
  222. switch (thread_id->base.thread_state) {
  223. case 0:
  224. return "";
  225. case _THREAD_DUMMY:
  226. return "dummy";
  227. case _THREAD_PENDING:
  228. return "pending";
  229. case _THREAD_PRESTART:
  230. return "prestart";
  231. case _THREAD_DEAD:
  232. return "dead";
  233. case _THREAD_SUSPENDED:
  234. return "suspended";
  235. case _THREAD_ABORTING:
  236. return "aborting";
  237. case _THREAD_QUEUED:
  238. return "queued";
  239. default:
  240. /* Add a break, some day when another case gets added at the end,
  241. * this bit of defensive programming will be useful
  242. */
  243. break;
  244. }
  245. return "unknown";
  246. }
  247. #ifdef CONFIG_USERSPACE
  248. static inline int z_vrfy_k_thread_name_copy(k_tid_t thread,
  249. char *buf, size_t size)
  250. {
  251. #ifdef CONFIG_THREAD_NAME
  252. size_t len;
  253. struct z_object *ko = z_object_find(thread);
  254. /* Special case: we allow reading the names of initialized threads
  255. * even if we don't have permission on them
  256. */
  257. if (thread == NULL || ko->type != K_OBJ_THREAD ||
  258. (ko->flags & K_OBJ_FLAG_INITIALIZED) == 0) {
  259. return -EINVAL;
  260. }
  261. if (Z_SYSCALL_MEMORY_WRITE(buf, size) != 0) {
  262. return -EFAULT;
  263. }
  264. len = strlen(thread->name);
  265. if (len + 1 > size) {
  266. return -ENOSPC;
  267. }
  268. return z_user_to_copy((void *)buf, thread->name, len + 1);
  269. #else
  270. ARG_UNUSED(thread);
  271. ARG_UNUSED(buf);
  272. ARG_UNUSED(size);
  273. return -ENOSYS;
  274. #endif /* CONFIG_THREAD_NAME */
  275. }
  276. #include <syscalls/k_thread_name_copy_mrsh.c>
  277. #endif /* CONFIG_USERSPACE */
  278. #ifdef CONFIG_MULTITHREADING
  279. #ifdef CONFIG_STACK_SENTINEL
  280. /* Check that the stack sentinel is still present
  281. *
  282. * The stack sentinel feature writes a magic value to the lowest 4 bytes of
  283. * the thread's stack when the thread is initialized. This value gets checked
  284. * in a few places:
  285. *
  286. * 1) In k_yield() if the current thread is not swapped out
  287. * 2) After servicing a non-nested interrupt
  288. * 3) In z_swap(), check the sentinel in the outgoing thread
  289. *
  290. * Item 2 requires support in arch/ code.
  291. *
  292. * If the check fails, the thread will be terminated appropriately through
  293. * the system fatal error handler.
  294. */
  295. void z_check_stack_sentinel(void)
  296. {
  297. uint32_t *stack;
  298. if ((_current->base.thread_state & _THREAD_DUMMY) != 0) {
  299. return;
  300. }
  301. stack = (uint32_t *)_current->stack_info.start;
  302. if (*stack != STACK_SENTINEL) {
  303. /* Restore it so further checks don't trigger this same error */
  304. *stack = STACK_SENTINEL;
  305. z_except_reason(K_ERR_STACK_CHK_FAIL);
  306. }
  307. }
  308. #endif /* CONFIG_STACK_SENTINEL */
  309. void z_impl_k_thread_start(struct k_thread *thread)
  310. {
  311. SYS_PORT_TRACING_OBJ_FUNC(k_thread, start, thread);
  312. z_sched_start(thread);
  313. }
  314. #ifdef CONFIG_USERSPACE
  315. static inline void z_vrfy_k_thread_start(struct k_thread *thread)
  316. {
  317. Z_OOPS(Z_SYSCALL_OBJ(thread, K_OBJ_THREAD));
  318. return z_impl_k_thread_start(thread);
  319. }
  320. #include <syscalls/k_thread_start_mrsh.c>
  321. #endif
  322. #endif
  323. #ifdef CONFIG_MULTITHREADING
  324. static void schedule_new_thread(struct k_thread *thread, k_timeout_t delay)
  325. {
  326. #ifdef CONFIG_SYS_CLOCK_EXISTS
  327. if (K_TIMEOUT_EQ(delay, K_NO_WAIT)) {
  328. k_thread_start(thread);
  329. } else {
  330. z_add_thread_timeout(thread, delay);
  331. }
  332. #else
  333. ARG_UNUSED(delay);
  334. k_thread_start(thread);
  335. #endif
  336. }
  337. #endif
  338. #if CONFIG_STACK_POINTER_RANDOM
  339. int z_stack_adjust_initialized;
  340. static size_t random_offset(size_t stack_size)
  341. {
  342. size_t random_val;
  343. if (!z_stack_adjust_initialized) {
  344. z_early_boot_rand_get((uint8_t *)&random_val, sizeof(random_val));
  345. } else {
  346. sys_rand_get((uint8_t *)&random_val, sizeof(random_val));
  347. }
  348. /* Don't need to worry about alignment of the size here,
  349. * arch_new_thread() is required to do it.
  350. *
  351. * FIXME: Not the best way to get a random number in a range.
  352. * See #6493
  353. */
  354. const size_t fuzz = random_val % CONFIG_STACK_POINTER_RANDOM;
  355. if (unlikely(fuzz * 2 > stack_size)) {
  356. return 0;
  357. }
  358. return fuzz;
  359. }
  360. #if defined(CONFIG_STACK_GROWS_UP)
  361. /* This is so rare not bothering for now */
  362. #error "Stack pointer randomization not implemented for upward growing stacks"
  363. #endif /* CONFIG_STACK_GROWS_UP */
  364. #endif /* CONFIG_STACK_POINTER_RANDOM */
  365. static char *setup_thread_stack(struct k_thread *new_thread,
  366. k_thread_stack_t *stack, size_t stack_size)
  367. {
  368. size_t stack_obj_size, stack_buf_size;
  369. char *stack_ptr, *stack_buf_start;
  370. size_t delta = 0;
  371. #ifdef CONFIG_USERSPACE
  372. if (z_stack_is_user_capable(stack)) {
  373. stack_obj_size = Z_THREAD_STACK_SIZE_ADJUST(stack_size);
  374. stack_buf_start = Z_THREAD_STACK_BUFFER(stack);
  375. stack_buf_size = stack_obj_size - K_THREAD_STACK_RESERVED;
  376. } else
  377. #endif
  378. {
  379. /* Object cannot host a user mode thread */
  380. stack_obj_size = Z_KERNEL_STACK_SIZE_ADJUST(stack_size);
  381. stack_buf_start = Z_KERNEL_STACK_BUFFER(stack);
  382. stack_buf_size = stack_obj_size - K_KERNEL_STACK_RESERVED;
  383. }
  384. /* Initial stack pointer at the high end of the stack object, may
  385. * be reduced later in this function by TLS or random offset
  386. */
  387. stack_ptr = (char *)stack + stack_obj_size;
  388. LOG_DBG("stack %p for thread %p: obj_size=%zu buf_start=%p "
  389. " buf_size %zu stack_ptr=%p",
  390. stack, new_thread, stack_obj_size, stack_buf_start,
  391. stack_buf_size, stack_ptr);
  392. #ifdef CONFIG_INIT_STACKS
  393. memset(stack_buf_start, 0xaa, stack_buf_size);
  394. #endif
  395. #ifdef CONFIG_STACK_SENTINEL
  396. /* Put the stack sentinel at the lowest 4 bytes of the stack area.
  397. * We periodically check that it's still present and kill the thread
  398. * if it isn't.
  399. */
  400. *((uint32_t *)stack_buf_start) = STACK_SENTINEL;
  401. #endif /* CONFIG_STACK_SENTINEL */
  402. #ifdef CONFIG_THREAD_LOCAL_STORAGE
  403. /* TLS is always last within the stack buffer */
  404. delta += arch_tls_stack_setup(new_thread, stack_ptr);
  405. #endif /* CONFIG_THREAD_LOCAL_STORAGE */
  406. #ifdef CONFIG_THREAD_USERSPACE_LOCAL_DATA
  407. size_t tls_size = sizeof(struct _thread_userspace_local_data);
  408. /* reserve space on highest memory of stack buffer for local data */
  409. delta += tls_size;
  410. new_thread->userspace_local_data =
  411. (struct _thread_userspace_local_data *)(stack_ptr - delta);
  412. #endif
  413. #if CONFIG_STACK_POINTER_RANDOM
  414. delta += random_offset(stack_buf_size);
  415. #endif
  416. delta = ROUND_UP(delta, ARCH_STACK_PTR_ALIGN);
  417. #ifdef CONFIG_THREAD_STACK_INFO
  418. /* Initial values. Arches which implement MPU guards that "borrow"
  419. * memory from the stack buffer (not tracked in K_THREAD_STACK_RESERVED)
  420. * will need to appropriately update this.
  421. *
  422. * The bounds tracked here correspond to the area of the stack object
  423. * that the thread can access, which includes TLS.
  424. */
  425. new_thread->stack_info.start = (uintptr_t)stack_buf_start;
  426. new_thread->stack_info.size = stack_buf_size;
  427. new_thread->stack_info.delta = delta;
  428. #endif
  429. stack_ptr -= delta;
  430. return stack_ptr;
  431. }
  432. #define THREAD_COOKIE 0x1337C0D3
  433. /*
  434. * The provided stack_size value is presumed to be either the result of
  435. * K_THREAD_STACK_SIZEOF(stack), or the size value passed to the instance
  436. * of K_THREAD_STACK_DEFINE() which defined 'stack'.
  437. */
  438. char *z_setup_new_thread(struct k_thread *new_thread,
  439. k_thread_stack_t *stack, size_t stack_size,
  440. k_thread_entry_t entry,
  441. void *p1, void *p2, void *p3,
  442. int prio, uint32_t options, const char *name)
  443. {
  444. char *stack_ptr;
  445. Z_ASSERT_VALID_PRIO(prio, entry);
  446. #ifdef CONFIG_USERSPACE
  447. __ASSERT((options & K_USER) == 0U || z_stack_is_user_capable(stack),
  448. "user thread %p with kernel-only stack %p",
  449. new_thread, stack);
  450. z_object_init(new_thread);
  451. z_object_init(stack);
  452. new_thread->stack_obj = stack;
  453. new_thread->syscall_frame = NULL;
  454. /* Any given thread has access to itself */
  455. k_object_access_grant(new_thread, new_thread);
  456. #endif
  457. z_waitq_init(&new_thread->join_queue);
  458. /* Initialize various struct k_thread members */
  459. z_init_thread_base(&new_thread->base, prio, _THREAD_PRESTART, options);
  460. stack_ptr = setup_thread_stack(new_thread, stack, stack_size);
  461. #ifdef CONFIG_KERNEL_COHERENCE
  462. /* Check that the thread object is safe, but that the stack is
  463. * still cached!
  464. */
  465. __ASSERT_NO_MSG(arch_mem_coherent(new_thread));
  466. __ASSERT_NO_MSG(!arch_mem_coherent(stack));
  467. #endif
  468. arch_new_thread(new_thread, stack, stack_ptr, entry, p1, p2, p3);
  469. /* static threads overwrite it afterwards with real value */
  470. new_thread->init_data = NULL;
  471. #ifdef CONFIG_USE_SWITCH
  472. /* switch_handle must be non-null except when inside z_swap()
  473. * for synchronization reasons. Historically some notional
  474. * USE_SWITCH architectures have actually ignored the field
  475. */
  476. __ASSERT(new_thread->switch_handle != NULL,
  477. "arch layer failed to initialize switch_handle");
  478. #endif
  479. #ifdef CONFIG_THREAD_CUSTOM_DATA
  480. /* Initialize custom data field (value is opaque to kernel) */
  481. new_thread->custom_data = NULL;
  482. #endif
  483. #ifdef CONFIG_THREAD_MONITOR
  484. new_thread->entry.pEntry = entry;
  485. new_thread->entry.parameter1 = p1;
  486. new_thread->entry.parameter2 = p2;
  487. new_thread->entry.parameter3 = p3;
  488. k_spinlock_key_t key = k_spin_lock(&z_thread_monitor_lock);
  489. new_thread->next_thread = _kernel.threads;
  490. _kernel.threads = new_thread;
  491. k_spin_unlock(&z_thread_monitor_lock, key);
  492. #endif
  493. #ifdef CONFIG_THREAD_NAME
  494. if (name != NULL) {
  495. strncpy(new_thread->name, name,
  496. CONFIG_THREAD_MAX_NAME_LEN - 1);
  497. /* Ensure NULL termination, truncate if longer */
  498. new_thread->name[CONFIG_THREAD_MAX_NAME_LEN - 1] = '\0';
  499. } else {
  500. new_thread->name[0] = '\0';
  501. }
  502. #endif
  503. #ifdef CONFIG_SCHED_CPU_MASK
  504. new_thread->base.cpu_mask = -1;
  505. #endif
  506. #ifdef CONFIG_ARCH_HAS_CUSTOM_SWAP_TO_MAIN
  507. /* _current may be null if the dummy thread is not used */
  508. if (!_current) {
  509. new_thread->resource_pool = NULL;
  510. return stack_ptr;
  511. }
  512. #endif
  513. #ifdef CONFIG_THREAD_TIMER
  514. sys_dlist_init(&new_thread->thread_timer_q);
  515. #endif
  516. #ifdef CONFIG_USERSPACE
  517. z_mem_domain_init_thread(new_thread);
  518. if ((options & K_INHERIT_PERMS) != 0U) {
  519. z_thread_perms_inherit(_current, new_thread);
  520. }
  521. #endif
  522. #ifdef CONFIG_SCHED_DEADLINE
  523. new_thread->base.prio_deadline = 0;
  524. #endif
  525. new_thread->resource_pool = _current->resource_pool;
  526. SYS_PORT_TRACING_OBJ_FUNC(k_thread, create, new_thread);
  527. #ifdef CONFIG_THREAD_RUNTIME_STATS
  528. memset(&new_thread->rt_stats, 0, sizeof(new_thread->rt_stats));
  529. #endif
  530. return stack_ptr;
  531. }
  532. #ifdef CONFIG_MULTITHREADING
  533. k_tid_t z_impl_k_thread_create(struct k_thread *new_thread,
  534. k_thread_stack_t *stack,
  535. size_t stack_size, k_thread_entry_t entry,
  536. void *p1, void *p2, void *p3,
  537. int prio, uint32_t options, k_timeout_t delay)
  538. {
  539. __ASSERT(!arch_is_in_isr(), "Threads may not be created in ISRs");
  540. z_setup_new_thread(new_thread, stack, stack_size, entry, p1, p2, p3,
  541. prio, options, NULL);
  542. if (!K_TIMEOUT_EQ(delay, K_FOREVER)) {
  543. schedule_new_thread(new_thread, delay);
  544. }
  545. return new_thread;
  546. }
  547. #ifdef CONFIG_USERSPACE
  548. bool z_stack_is_user_capable(k_thread_stack_t *stack)
  549. {
  550. return z_object_find(stack) != NULL;
  551. }
  552. k_tid_t z_vrfy_k_thread_create(struct k_thread *new_thread,
  553. k_thread_stack_t *stack,
  554. size_t stack_size, k_thread_entry_t entry,
  555. void *p1, void *p2, void *p3,
  556. int prio, uint32_t options, k_timeout_t delay)
  557. {
  558. size_t total_size, stack_obj_size;
  559. struct z_object *stack_object;
  560. /* The thread and stack objects *must* be in an uninitialized state */
  561. Z_OOPS(Z_SYSCALL_OBJ_NEVER_INIT(new_thread, K_OBJ_THREAD));
  562. /* No need to check z_stack_is_user_capable(), it won't be in the
  563. * object table if it isn't
  564. */
  565. stack_object = z_object_find(stack);
  566. Z_OOPS(Z_SYSCALL_VERIFY_MSG(z_obj_validation_check(stack_object, stack,
  567. K_OBJ_THREAD_STACK_ELEMENT,
  568. _OBJ_INIT_FALSE) == 0,
  569. "bad stack object"));
  570. /* Verify that the stack size passed in is OK by computing the total
  571. * size and comparing it with the size value in the object metadata
  572. */
  573. Z_OOPS(Z_SYSCALL_VERIFY_MSG(!size_add_overflow(K_THREAD_STACK_RESERVED,
  574. stack_size, &total_size),
  575. "stack size overflow (%zu+%zu)",
  576. stack_size,
  577. K_THREAD_STACK_RESERVED));
  578. /* Testing less-than-or-equal since additional room may have been
  579. * allocated for alignment constraints
  580. */
  581. #ifdef CONFIG_GEN_PRIV_STACKS
  582. stack_obj_size = stack_object->data.stack_data->size;
  583. #else
  584. stack_obj_size = stack_object->data.stack_size;
  585. #endif
  586. Z_OOPS(Z_SYSCALL_VERIFY_MSG(total_size <= stack_obj_size,
  587. "stack size %zu is too big, max is %zu",
  588. total_size, stack_obj_size));
  589. /* User threads may only create other user threads and they can't
  590. * be marked as essential
  591. */
  592. Z_OOPS(Z_SYSCALL_VERIFY(options & K_USER));
  593. Z_OOPS(Z_SYSCALL_VERIFY(!(options & K_ESSENTIAL)));
  594. /* Check validity of prio argument; must be the same or worse priority
  595. * than the caller
  596. */
  597. Z_OOPS(Z_SYSCALL_VERIFY(_is_valid_prio(prio, NULL)));
  598. Z_OOPS(Z_SYSCALL_VERIFY(z_is_prio_lower_or_equal(prio,
  599. _current->base.prio)));
  600. z_setup_new_thread(new_thread, stack, stack_size,
  601. entry, p1, p2, p3, prio, options, NULL);
  602. if (!K_TIMEOUT_EQ(delay, K_FOREVER)) {
  603. schedule_new_thread(new_thread, delay);
  604. }
  605. return new_thread;
  606. }
  607. #include <syscalls/k_thread_create_mrsh.c>
  608. #endif /* CONFIG_USERSPACE */
  609. #endif /* CONFIG_MULTITHREADING */
  610. #ifdef CONFIG_MULTITHREADING
  611. #ifdef CONFIG_USERSPACE
  612. static void grant_static_access(void)
  613. {
  614. STRUCT_SECTION_FOREACH(z_object_assignment, pos) {
  615. for (int i = 0; pos->objects[i] != NULL; i++) {
  616. k_object_access_grant(pos->objects[i],
  617. pos->thread);
  618. }
  619. }
  620. }
  621. #endif /* CONFIG_USERSPACE */
  622. void z_init_static_threads(void)
  623. {
  624. _FOREACH_STATIC_THREAD(thread_data) {
  625. z_setup_new_thread(
  626. thread_data->init_thread,
  627. thread_data->init_stack,
  628. thread_data->init_stack_size,
  629. thread_data->init_entry,
  630. thread_data->init_p1,
  631. thread_data->init_p2,
  632. thread_data->init_p3,
  633. thread_data->init_prio,
  634. thread_data->init_options,
  635. thread_data->init_name);
  636. thread_data->init_thread->init_data = thread_data;
  637. }
  638. #ifdef CONFIG_USERSPACE
  639. grant_static_access();
  640. #endif
  641. /*
  642. * Non-legacy static threads may be started immediately or
  643. * after a previously specified delay. Even though the
  644. * scheduler is locked, ticks can still be delivered and
  645. * processed. Take a sched lock to prevent them from running
  646. * until they are all started.
  647. *
  648. * Note that static threads defined using the legacy API have a
  649. * delay of K_FOREVER.
  650. */
  651. k_sched_lock();
  652. _FOREACH_STATIC_THREAD(thread_data) {
  653. if (thread_data->init_delay != K_TICKS_FOREVER) {
  654. schedule_new_thread(thread_data->init_thread,
  655. K_MSEC(thread_data->init_delay));
  656. }
  657. }
  658. k_sched_unlock();
  659. }
  660. #endif
  661. void z_init_thread_base(struct _thread_base *thread_base, int priority,
  662. uint32_t initial_state, unsigned int options)
  663. {
  664. /* k_q_node is initialized upon first insertion in a list */
  665. thread_base->pended_on = NULL;
  666. thread_base->user_options = (uint8_t)options;
  667. thread_base->thread_state = (uint8_t)initial_state;
  668. thread_base->prio = priority;
  669. thread_base->sched_locked = 0U;
  670. #ifdef CONFIG_SMP
  671. thread_base->is_idle = 0;
  672. #endif
  673. /* swap_data does not need to be initialized */
  674. z_init_thread_timeout(thread_base);
  675. }
  676. FUNC_NORETURN void k_thread_user_mode_enter(k_thread_entry_t entry,
  677. void *p1, void *p2, void *p3)
  678. {
  679. SYS_PORT_TRACING_FUNC(k_thread, user_mode_enter);
  680. _current->base.user_options |= K_USER;
  681. z_thread_essential_clear();
  682. #ifdef CONFIG_THREAD_MONITOR
  683. _current->entry.pEntry = entry;
  684. _current->entry.parameter1 = p1;
  685. _current->entry.parameter2 = p2;
  686. _current->entry.parameter3 = p3;
  687. #endif
  688. #ifdef CONFIG_USERSPACE
  689. __ASSERT(z_stack_is_user_capable(_current->stack_obj),
  690. "dropping to user mode with kernel-only stack object");
  691. #ifdef CONFIG_THREAD_USERSPACE_LOCAL_DATA
  692. memset(_current->userspace_local_data, 0,
  693. sizeof(struct _thread_userspace_local_data));
  694. #endif
  695. #ifdef CONFIG_THREAD_LOCAL_STORAGE
  696. arch_tls_stack_setup(_current,
  697. (char *)(_current->stack_info.start +
  698. _current->stack_info.size));
  699. #endif
  700. arch_user_mode_enter(entry, p1, p2, p3);
  701. #else
  702. /* XXX In this case we do not reset the stack */
  703. z_thread_entry(entry, p1, p2, p3);
  704. #endif
  705. }
  706. /* These spinlock assertion predicates are defined here because having
  707. * them in spinlock.h is a giant header ordering headache.
  708. */
  709. #ifdef CONFIG_SPIN_VALIDATE
  710. bool z_spin_lock_valid(struct k_spinlock *l)
  711. {
  712. uintptr_t thread_cpu = l->thread_cpu;
  713. if (thread_cpu != 0U) {
  714. if ((thread_cpu & 3U) == _current_cpu->id) {
  715. return false;
  716. }
  717. }
  718. return true;
  719. }
  720. bool z_spin_unlock_valid(struct k_spinlock *l)
  721. {
  722. if (l->thread_cpu != (_current_cpu->id | (uintptr_t)_current)) {
  723. return false;
  724. }
  725. l->thread_cpu = 0;
  726. return true;
  727. }
  728. void z_spin_lock_set_owner(struct k_spinlock *l)
  729. {
  730. l->thread_cpu = _current_cpu->id | (uintptr_t)_current;
  731. }
  732. #ifdef CONFIG_KERNEL_COHERENCE
  733. bool z_spin_lock_mem_coherent(struct k_spinlock *l)
  734. {
  735. return arch_mem_coherent((void *)l);
  736. }
  737. #endif /* CONFIG_KERNEL_COHERENCE */
  738. #endif /* CONFIG_SPIN_VALIDATE */
  739. int z_impl_k_float_disable(struct k_thread *thread)
  740. {
  741. #if defined(CONFIG_FPU) && defined(CONFIG_FPU_SHARING)
  742. return arch_float_disable(thread);
  743. #else
  744. return -ENOTSUP;
  745. #endif /* CONFIG_FPU && CONFIG_FPU_SHARING */
  746. }
  747. int z_impl_k_float_enable(struct k_thread *thread, unsigned int options)
  748. {
  749. #if defined(CONFIG_FPU) && defined(CONFIG_FPU_SHARING)
  750. return arch_float_enable(thread, options);
  751. #else
  752. return -ENOTSUP;
  753. #endif /* CONFIG_FPU && CONFIG_FPU_SHARING */
  754. }
  755. #ifdef CONFIG_USERSPACE
  756. static inline int z_vrfy_k_float_disable(struct k_thread *thread)
  757. {
  758. Z_OOPS(Z_SYSCALL_OBJ(thread, K_OBJ_THREAD));
  759. return z_impl_k_float_disable(thread);
  760. }
  761. #include <syscalls/k_float_disable_mrsh.c>
  762. #endif /* CONFIG_USERSPACE */
  763. #ifdef CONFIG_IRQ_OFFLOAD
  764. /* Make offload_sem visible outside under testing, in order to release
  765. * it outside when error happened.
  766. */
  767. K_SEM_DEFINE(offload_sem, 1, 1);
  768. void irq_offload(irq_offload_routine_t routine, const void *parameter)
  769. {
  770. k_sem_take(&offload_sem, K_FOREVER);
  771. arch_irq_offload(routine, parameter);
  772. k_sem_give(&offload_sem);
  773. }
  774. #endif
  775. #if defined(CONFIG_INIT_STACKS) && defined(CONFIG_THREAD_STACK_INFO)
  776. #ifdef CONFIG_STACK_GROWS_UP
  777. #error "Unsupported configuration for stack analysis"
  778. #endif
  779. int z_impl_k_thread_stack_space_get(const struct k_thread *thread,
  780. size_t *unused_ptr)
  781. {
  782. const uint8_t *start = (uint8_t *)thread->stack_info.start;
  783. size_t size = thread->stack_info.size;
  784. size_t unused = 0;
  785. const uint8_t *checked_stack = start;
  786. /* Take the address of any local variable as a shallow bound for the
  787. * stack pointer. Addresses above it are guaranteed to be
  788. * accessible.
  789. */
  790. const uint8_t *stack_pointer = (const uint8_t *)&start;
  791. /* If we are currently running on the stack being analyzed, some
  792. * memory management hardware will generate an exception if we
  793. * read unused stack memory.
  794. *
  795. * This never happens when invoked from user mode, as user mode
  796. * will always run this function on the privilege elevation stack.
  797. */
  798. if ((stack_pointer > start) && (stack_pointer <= (start + size)) &&
  799. IS_ENABLED(CONFIG_NO_UNUSED_STACK_INSPECTION)) {
  800. /* TODO: We could add an arch_ API call to temporarily
  801. * disable the stack checking in the CPU, but this would
  802. * need to be properly managed wrt context switches/interrupts
  803. */
  804. return -ENOTSUP;
  805. }
  806. if (IS_ENABLED(CONFIG_STACK_SENTINEL)) {
  807. /* First 4 bytes of the stack buffer reserved for the
  808. * sentinel value, it won't be 0xAAAAAAAA for thread
  809. * stacks.
  810. *
  811. * FIXME: thread->stack_info.start ought to reflect
  812. * this!
  813. */
  814. checked_stack += 4;
  815. size -= 4;
  816. }
  817. for (size_t i = 0; i < size; i++) {
  818. if ((checked_stack[i]) == 0xaaU) {
  819. unused++;
  820. } else {
  821. break;
  822. }
  823. }
  824. *unused_ptr = unused;
  825. return 0;
  826. }
  827. #ifdef CONFIG_USERSPACE
  828. int z_vrfy_k_thread_stack_space_get(const struct k_thread *thread,
  829. size_t *unused_ptr)
  830. {
  831. size_t unused;
  832. int ret;
  833. ret = Z_SYSCALL_OBJ(thread, K_OBJ_THREAD);
  834. CHECKIF(ret != 0) {
  835. return ret;
  836. }
  837. ret = z_impl_k_thread_stack_space_get(thread, &unused);
  838. CHECKIF(ret != 0) {
  839. return ret;
  840. }
  841. ret = z_user_to_copy(unused_ptr, &unused, sizeof(size_t));
  842. CHECKIF(ret != 0) {
  843. return ret;
  844. }
  845. return 0;
  846. }
  847. #include <syscalls/k_thread_stack_space_get_mrsh.c>
  848. #endif /* CONFIG_USERSPACE */
  849. #endif /* CONFIG_INIT_STACKS && CONFIG_THREAD_STACK_INFO */
  850. #ifdef CONFIG_USERSPACE
  851. static inline k_ticks_t z_vrfy_k_thread_timeout_remaining_ticks(
  852. const struct k_thread *t)
  853. {
  854. Z_OOPS(Z_SYSCALL_OBJ(t, K_OBJ_THREAD));
  855. return z_impl_k_thread_timeout_remaining_ticks(t);
  856. }
  857. #include <syscalls/k_thread_timeout_remaining_ticks_mrsh.c>
  858. static inline k_ticks_t z_vrfy_k_thread_timeout_expires_ticks(
  859. const struct k_thread *t)
  860. {
  861. Z_OOPS(Z_SYSCALL_OBJ(t, K_OBJ_THREAD));
  862. return z_impl_k_thread_timeout_expires_ticks(t);
  863. }
  864. #include <syscalls/k_thread_timeout_expires_ticks_mrsh.c>
  865. #endif
  866. #ifdef CONFIG_INSTRUMENT_THREAD_SWITCHING
  867. void z_thread_mark_switched_in(void)
  868. {
  869. #ifdef CONFIG_TRACING
  870. SYS_PORT_TRACING_FUNC(k_thread, switched_in);
  871. #endif
  872. #ifdef CONFIG_THREAD_RUNTIME_STATS
  873. struct k_thread *thread;
  874. thread = k_current_get();
  875. #ifdef CONFIG_THREAD_RUNTIME_STATS_USE_TIMING_FUNCTIONS
  876. thread->rt_stats.last_switched_in = timing_counter_get();
  877. #else
  878. thread->rt_stats.last_switched_in = k_cycle_get_32();
  879. #endif /* CONFIG_THREAD_RUNTIME_STATS_USE_TIMING_FUNCTIONS */
  880. #endif /* CONFIG_THREAD_RUNTIME_STATS */
  881. }
  882. void z_thread_mark_switched_out(void)
  883. {
  884. #ifdef CONFIG_THREAD_RUNTIME_STATS
  885. #ifdef CONFIG_THREAD_RUNTIME_STATS_USE_TIMING_FUNCTIONS
  886. timing_t now;
  887. #else
  888. uint32_t now;
  889. uint32_t diff_us;
  890. #endif /* CONFIG_THREAD_RUNTIME_STATS_USE_TIMING_FUNCTIONS */
  891. uint64_t diff;
  892. struct k_thread *thread;
  893. thread = k_current_get();
  894. if (unlikely(thread->rt_stats.last_switched_in == 0)) {
  895. /* Has not run before */
  896. return;
  897. }
  898. if (unlikely(thread->base.thread_state == _THREAD_DUMMY)) {
  899. /* dummy thread has no stat struct */
  900. return;
  901. }
  902. #ifdef CONFIG_THREAD_RUNTIME_STATS_USE_TIMING_FUNCTIONS
  903. now = timing_counter_get();
  904. diff = timing_cycles_get(&thread->rt_stats.last_switched_in, &now);
  905. #else
  906. now = k_cycle_get_32();
  907. diff = (uint64_t)(now - thread->rt_stats.last_switched_in);
  908. thread->rt_stats.last_switched_in = 0;
  909. diff_us = SYS_CLOCK_HW_CYCLES_TO_NS_AVG(diff, 1000);
  910. if ((diff_us > (1000*10)) && (thread->base.prio < K_LOWEST_THREAD_PRIO)) {
  911. /* Run time large than 10ms */
  912. printk("\nThread %p %-10s run time %d ms\n", thread, k_thread_name_get(thread), (diff_us/1000));
  913. }
  914. #endif /* CONFIG_THREAD_RUNTIME_STATS_USE_TIMING_FUNCTIONS */
  915. thread->rt_stats.stats.execution_cycles += diff;
  916. threads_runtime_stats.execution_cycles += diff;
  917. #endif /* CONFIG_THREAD_RUNTIME_STATS */
  918. #ifdef CONFIG_TRACING
  919. SYS_PORT_TRACING_FUNC(k_thread, switched_out);
  920. #endif
  921. }
  922. #ifdef CONFIG_THREAD_RUNTIME_STATS
  923. int k_thread_runtime_stats_get(k_tid_t thread,
  924. k_thread_runtime_stats_t *stats)
  925. {
  926. if ((thread == NULL) || (stats == NULL)) {
  927. return -EINVAL;
  928. }
  929. (void)memcpy(stats, &thread->rt_stats.stats,
  930. sizeof(thread->rt_stats.stats));
  931. return 0;
  932. }
  933. int k_thread_runtime_stats_all_get(k_thread_runtime_stats_t *stats)
  934. {
  935. if (stats == NULL) {
  936. return -EINVAL;
  937. }
  938. (void)memcpy(stats, &threads_runtime_stats,
  939. sizeof(threads_runtime_stats));
  940. return 0;
  941. }
  942. void k_thread_runtime_clear(void)
  943. {
  944. struct k_thread *thread_list = NULL;
  945. unsigned int key;
  946. key = irq_lock();
  947. thread_list = (struct k_thread *)(_kernel.threads);
  948. while (thread_list != NULL) {
  949. if (thread_list == k_current_get()){
  950. #ifdef CONFIG_THREAD_RUNTIME_STATS_USE_TIMING_FUNCTIONS
  951. thread_list->rt_stats.last_switched_in = timing_counter_get();
  952. #else
  953. thread_list->rt_stats.last_switched_in = k_cycle_get_32();
  954. #endif /* CONFIG_THREAD_RUNTIME_STATS_USE_TIMING_FUNCTIONS */
  955. }
  956. /* clear old cycles counter */
  957. thread_list->rt_stats.stats.execution_cycles = 0;
  958. thread_list = (struct k_thread *)thread_list->next_thread;
  959. }
  960. threads_runtime_stats.execution_cycles = 0;
  961. irq_unlock(key);
  962. }
  963. #endif /* CONFIG_THREAD_RUNTIME_STATS */
  964. #endif /* CONFIG_INSTRUMENT_THREAD_SWITCHING */