source: mainline/kernel/generic/src/proc/task.c@ 88cc71c0

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since 88cc71c0 was 88cc71c0, checked in by Jiri Svoboda <jiri@…>, 7 years ago

Replace as_area_btree with ordered dictionary.

  • Property mode set to 100644
File size: 16.6 KB
RevLine 
[f761f1eb]1/*
[278b4a30]2 * Copyright (c) 2010 Jakub Jermar
[ef1eab7]3 * Copyright (c) 2018 Jiri Svoboda
[f761f1eb]4 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 *
10 * - Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * - Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * - The name of the author may not be used to endorse or promote products
16 * derived from this software without specific prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
19 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
20 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
21 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
22 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
23 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
24 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
25 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
26 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
27 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28 */
29
[174156fd]30/** @addtogroup kernel_generic_proc
[b45c443]31 * @{
32 */
33
[9179d0a]34/**
[b45c443]35 * @file
[5ba201d]36 * @brief Task management.
[9179d0a]37 */
38
[63e27ef]39#include <assert.h>
[f761f1eb]40#include <proc/thread.h>
41#include <proc/task.h>
[20d50a1]42#include <mm/as.h>
[085d973]43#include <mm/slab.h>
[31d8e10]44#include <atomic.h>
[669f3d32]45#include <synch/futex.h>
[f761f1eb]46#include <synch/spinlock.h>
[5573942]47#include <synch/waitq.h>
[f761f1eb]48#include <arch.h>
[05882233]49#include <barrier.h>
[5c9a08b]50#include <adt/list.h>
[ef1eab7]51#include <adt/odict.h>
[3f74275]52#include <cap/cap.h>
[6d9c49a]53#include <ipc/ipc.h>
[c98e6ee]54#include <ipc/ipcrsc.h>
[5d0500c]55#include <ipc/event.h>
[bab75df6]56#include <stdio.h>
[7509ddc]57#include <errno.h>
[b2e121a]58#include <halt.h>
[19f857a]59#include <str.h>
[e3c762cd]60#include <syscall/copy.h>
[95ad426]61#include <macros.h>
[8e5e78f]62
[ef1eab7]63/** Spinlock protecting the @c tasks ordered dictionary. */
[da1bafb]64IRQ_SPINLOCK_INITIALIZE(tasks_lock);
[88169d9]65
[88cc71c0]66/** Ordered dictionary of active tasks by task ID.
67 *
68 * Members are task_t structures.
[88169d9]69 *
[ef1eab7]70 * The task is guaranteed to exist after it was found in the @c tasks
71 * dictionary as long as:
[5ba201d]72 *
[88169d9]73 * @li the tasks_lock is held,
[6f4495f5]74 * @li the task's lock is held when task's lock is acquired before releasing
75 * tasks_lock or
[7bb6b06]76 * @li the task's refcount is greater than 0
[88169d9]77 *
78 */
[ef1eab7]79odict_t tasks;
[88169d9]80
[286e03d]81static task_id_t task_counter = 0;
[70527f1]82
[82d515e9]83static slab_cache_t *task_cache;
[103de761]84
[121966e]85/* Forward declarations. */
86static void task_kill_internal(task_t *);
[b7fd2a0]87static errno_t tsk_constructor(void *, unsigned int);
[ef1eab7]88static size_t tsk_destructor(void *);
89
90static void *tasks_getkey(odlink_t *);
91static int tasks_cmp(void *, void *);
[121966e]92
[da1bafb]93/** Initialize kernel tasks support.
94 *
95 */
[f761f1eb]96void task_init(void)
97{
[43114c5]98 TASK = NULL;
[ef1eab7]99 odict_initialize(&tasks, tasks_getkey, tasks_cmp);
[82d515e9]100 task_cache = slab_cache_create("task_t", sizeof(task_t), 0,
[49115ac]101 tsk_constructor, tsk_destructor, 0);
[b76a2217]102}
103
[da1bafb]104/** Kill all tasks except the current task.
105 *
106 */
[f74bbaf]107void task_done(void)
108{
[da1bafb]109 size_t tasks_left;
[ef1eab7]110 task_t *task;
[2f2beb4]111
[cdc4334]112 if (ipc_box_0) {
113 task_t *task_0 = ipc_box_0->task;
114 ipc_box_0 = NULL;
[2f2beb4]115 /*
116 * The first task is held by kinit(), we need to release it or
117 * it will never finish cleanup.
118 */
119 task_release(task_0);
120 }
[a35b458]121
[da1bafb]122 /* Repeat until there are any tasks except TASK */
123 do {
[121966e]124#ifdef CONFIG_DEBUG
125 printf("Killing tasks... ");
126#endif
[da1bafb]127 irq_spinlock_lock(&tasks_lock, true);
[121966e]128 tasks_left = 0;
[ef1eab7]129
[aab5e46]130 task = task_first();
131 while (task != NULL) {
[ef1eab7]132 if (task != TASK) {
133 tasks_left++;
134#ifdef CONFIG_DEBUG
135 printf("[%" PRIu64 "] ", task->taskid);
136#endif
137 task_kill_internal(task);
138 }
139
[aab5e46]140 task = task_next(task);
[ef1eab7]141 }
142
[da1bafb]143 irq_spinlock_unlock(&tasks_lock, true);
[a35b458]144
[121966e]145 thread_sleep(1);
[a35b458]146
[f74bbaf]147#ifdef CONFIG_DEBUG
[121966e]148 printf("\n");
149#endif
[da1bafb]150 } while (tasks_left > 0);
[f74bbaf]151}
[70527f1]152
[b7fd2a0]153errno_t tsk_constructor(void *obj, unsigned int kmflags)
[59ee56f]154{
[da1bafb]155 task_t *task = (task_t *) obj;
[c46bfbc]156
[b7fd2a0]157 errno_t rc = caps_task_alloc(task);
[c46bfbc]158 if (rc != EOK)
159 return rc;
[a35b458]160
[e3306d04]161 atomic_store(&task->refcount, 0);
162 atomic_store(&task->lifecount, 0);
[a35b458]163
[da1bafb]164 irq_spinlock_initialize(&task->lock, "task_t_lock");
[a35b458]165
[55b77d9]166 list_initialize(&task->threads);
[a35b458]167
[da1bafb]168 ipc_answerbox_init(&task->answerbox, task);
[a35b458]169
[86939b1]170 spinlock_initialize(&task->active_calls_lock, "active_calls_lock");
171 list_initialize(&task->active_calls);
[a35b458]172
[59ee56f]173#ifdef CONFIG_UDEBUG
174 /* Init kbox stuff */
[da1bafb]175 task->kb.thread = NULL;
176 ipc_answerbox_init(&task->kb.box, task);
177 mutex_initialize(&task->kb.cleanup_lock, MUTEX_PASSIVE);
[59ee56f]178#endif
[a35b458]179
[7f11dc6]180 return EOK;
[59ee56f]181}
182
[49115ac]183size_t tsk_destructor(void *obj)
184{
185 task_t *task = (task_t *) obj;
[a35b458]186
[3f74275]187 caps_task_free(task);
[49115ac]188 return 0;
189}
190
[814c4f5]191/** Create new task with no threads.
[70527f1]192 *
[5ba201d]193 * @param as Task's address space.
194 * @param name Symbolic name (a copy is made).
[70527f1]195 *
[5ba201d]196 * @return New task's structure.
[70527f1]197 *
198 */
[a000878c]199task_t *task_create(as_t *as, const char *name)
[f761f1eb]200{
[82d515e9]201 task_t *task = (task_t *) slab_alloc(task_cache, 0);
[6a32cc5f]202 if (task == NULL) {
203 return NULL;
204 }
[a35b458]205
[da1bafb]206 task_create_arch(task);
[a35b458]207
[da1bafb]208 task->as = as;
209 str_cpy(task->name, TASK_NAME_BUFLEN, name);
[a35b458]210
[473d5d2]211 task->container = CONTAINER;
[719a208]212 task->perms = 0;
[da1bafb]213 task->ucycles = 0;
214 task->kcycles = 0;
[7ad17de]215
[3f74275]216 caps_task_init(task);
[e9d15d9]217
[da1bafb]218 task->ipc_info.call_sent = 0;
[be06914]219 task->ipc_info.call_received = 0;
[da1bafb]220 task->ipc_info.answer_sent = 0;
[be06914]221 task->ipc_info.answer_received = 0;
222 task->ipc_info.irq_notif_received = 0;
[da1bafb]223 task->ipc_info.forwarded = 0;
[5d0500c]224
225 event_task_init(task);
[a35b458]226
[c33f39f]227 task->answerbox.active = true;
228
[9a1b20c]229#ifdef CONFIG_UDEBUG
230 /* Init debugging stuff */
[da1bafb]231 udebug_task_init(&task->udebug);
[a35b458]232
[9a1b20c]233 /* Init kbox stuff */
[c33f39f]234 task->kb.box.active = true;
[da1bafb]235 task->kb.finished = false;
[9a1b20c]236#endif
[a35b458]237
[cdc4334]238 if ((ipc_box_0) &&
239 (container_check(ipc_box_0->task->container, task->container))) {
[eadaeae8]240 cap_phone_handle_t phone_handle;
[334c103]241 errno_t rc = phone_alloc(task, true, &phone_handle, NULL);
[09d01f2]242 if (rc != EOK) {
[6a32cc5f]243 task->as = NULL;
244 task_destroy_arch(task);
245 slab_free(task_cache, task);
246 return NULL;
247 }
[a35b458]248
[48bcf49]249 kobject_t *phone_obj = kobject_get(task, phone_handle,
250 KOBJECT_TYPE_PHONE);
[cdc4334]251 (void) ipc_phone_connect(phone_obj->phone, ipc_box_0);
[05ffb41]252 }
[a35b458]253
[669f3d32]254 futex_task_init(task);
[a35b458]255
[6193351]256 /*
257 * Get a reference to the address space.
258 */
[da1bafb]259 as_hold(task->as);
[a35b458]260
[da1bafb]261 irq_spinlock_lock(&tasks_lock, true);
[a35b458]262
[da1bafb]263 task->taskid = ++task_counter;
[ef1eab7]264 odlink_initialize(&task->ltasks);
265 odict_insert(&task->ltasks, &tasks, NULL);
[a35b458]266
[da1bafb]267 irq_spinlock_unlock(&tasks_lock, true);
[a35b458]268
[da1bafb]269 return task;
[f761f1eb]270}
271
[7509ddc]272/** Destroy task.
273 *
[da1bafb]274 * @param task Task to be destroyed.
[5ba201d]275 *
[7509ddc]276 */
[da1bafb]277void task_destroy(task_t *task)
[7509ddc]278{
[ea7890e7]279 /*
280 * Remove the task from the task B+tree.
281 */
[da1bafb]282 irq_spinlock_lock(&tasks_lock, true);
[ef1eab7]283 odict_remove(&task->ltasks);
[da1bafb]284 irq_spinlock_unlock(&tasks_lock, true);
[a35b458]285
[ea7890e7]286 /*
287 * Perform architecture specific task destruction.
288 */
[da1bafb]289 task_destroy_arch(task);
[a35b458]290
[ea7890e7]291 /*
292 * Free up dynamically allocated state.
293 */
[669f3d32]294 futex_task_deinit(task);
[a35b458]295
[ea7890e7]296 /*
297 * Drop our reference to the address space.
298 */
[da1bafb]299 as_release(task->as);
[a35b458]300
[82d515e9]301 slab_free(task_cache, task);
[7509ddc]302}
303
[278b4a30]304/** Hold a reference to a task.
305 *
306 * Holding a reference to a task prevents destruction of that task.
307 *
[da1bafb]308 * @param task Task to be held.
309 *
[278b4a30]310 */
[da1bafb]311void task_hold(task_t *task)
[278b4a30]312{
[da1bafb]313 atomic_inc(&task->refcount);
[278b4a30]314}
315
316/** Release a reference to a task.
317 *
318 * The last one to release a reference to a task destroys the task.
319 *
[da1bafb]320 * @param task Task to be released.
321 *
[278b4a30]322 */
[da1bafb]323void task_release(task_t *task)
[278b4a30]324{
[da1bafb]325 if ((atomic_predec(&task->refcount)) == 0)
326 task_destroy(task);
[278b4a30]327}
328
[dd8d5a7]329#ifdef __32_BITS__
330
331/** Syscall for reading task ID from userspace (32 bits)
[ec55358]332 *
[dd8d5a7]333 * @param uspace_taskid Pointer to user-space buffer
334 * where to store current task ID.
[5ba201d]335 *
336 * @return Zero on success or an error code from @ref errno.h.
[ec55358]337 *
338 */
[b7fd2a0]339sys_errno_t sys_task_get_id(sysarg64_t *uspace_taskid)
[ec55358]340{
341 /*
[814c4f5]342 * No need to acquire lock on TASK because taskid remains constant for
343 * the lifespan of the task.
[ec55358]344 */
[b7fd2a0]345 return (sys_errno_t) copy_to_uspace(uspace_taskid, &TASK->taskid,
[6f4495f5]346 sizeof(TASK->taskid));
[ec55358]347}
348
[dd8d5a7]349#endif /* __32_BITS__ */
350
351#ifdef __64_BITS__
352
353/** Syscall for reading task ID from userspace (64 bits)
354 *
355 * @return Current task ID.
356 *
357 */
358sysarg_t sys_task_get_id(void)
359{
360 /*
361 * No need to acquire lock on TASK because taskid remains constant for
362 * the lifespan of the task.
363 */
364 return TASK->taskid;
365}
366
367#endif /* __64_BITS__ */
368
[bc18d63]369/** Syscall for setting the task name.
370 *
371 * The name simplifies identifying the task in the task list.
372 *
[5ba201d]373 * @param name The new name for the task. (typically the same
374 * as the command used to execute it).
[bc18d63]375 *
376 * @return 0 on success or an error code from @ref errno.h.
[5ba201d]377 *
[bc18d63]378 */
[b7fd2a0]379sys_errno_t sys_task_set_name(const char *uspace_name, size_t name_len)
[bc18d63]380{
381 char namebuf[TASK_NAME_BUFLEN];
[a35b458]382
[bc18d63]383 /* Cap length of name and copy it from userspace. */
384 if (name_len > TASK_NAME_BUFLEN - 1)
385 name_len = TASK_NAME_BUFLEN - 1;
[a35b458]386
[b7fd2a0]387 errno_t rc = copy_from_uspace(namebuf, uspace_name, name_len);
[a53ed3a]388 if (rc != EOK)
[b7fd2a0]389 return (sys_errno_t) rc;
[a35b458]390
[f4b1535]391 namebuf[name_len] = '\0';
[a35b458]392
[577f042a]393 /*
394 * As the task name is referenced also from the
395 * threads, lock the threads' lock for the course
396 * of the update.
397 */
[a35b458]398
[577f042a]399 irq_spinlock_lock(&tasks_lock, true);
400 irq_spinlock_lock(&TASK->lock, false);
401 irq_spinlock_lock(&threads_lock, false);
[a35b458]402
[577f042a]403 /* Set task name */
[f4b1535]404 str_cpy(TASK->name, TASK_NAME_BUFLEN, namebuf);
[a35b458]405
[577f042a]406 irq_spinlock_unlock(&threads_lock, false);
407 irq_spinlock_unlock(&TASK->lock, false);
408 irq_spinlock_unlock(&tasks_lock, true);
[a35b458]409
[bc18d63]410 return EOK;
411}
412
[1e9f8ab]413/** Syscall to forcefully terminate a task
414 *
415 * @param uspace_taskid Pointer to task ID in user space.
416 *
417 * @return 0 on success or an error code from @ref errno.h.
418 *
419 */
[b7fd2a0]420sys_errno_t sys_task_kill(task_id_t *uspace_taskid)
[1e9f8ab]421{
422 task_id_t taskid;
[b7fd2a0]423 errno_t rc = copy_from_uspace(&taskid, uspace_taskid, sizeof(taskid));
[a53ed3a]424 if (rc != EOK)
[b7fd2a0]425 return (sys_errno_t) rc;
[a35b458]426
[b7fd2a0]427 return (sys_errno_t) task_kill(taskid);
[1e9f8ab]428}
429
[9a8d91b]430/** Find task structure corresponding to task ID.
431 *
[814c4f5]432 * The tasks_lock must be already held by the caller of this function and
433 * interrupts must be disabled.
[9a8d91b]434 *
[5ba201d]435 * @param id Task ID.
436 *
[e1b6742]437 * @return Task structure address or NULL if there is no such task ID.
[9a8d91b]438 *
439 */
[5ba201d]440task_t *task_find_by_id(task_id_t id)
441{
[63e27ef]442 assert(interrupts_disabled());
443 assert(irq_spinlock_locked(&tasks_lock));
[1d432f9]444
[ef1eab7]445 odlink_t *odlink = odict_find_eq(&tasks, &id, NULL);
446 if (odlink != NULL)
447 return odict_get_instance(odlink, task_t, ltasks);
[a35b458]448
[b76a2217]449 return NULL;
[9a8d91b]450}
451
[aab5e46]452/** Get count of tasks.
453 *
454 * @return Number of tasks in the system
455 */
456size_t task_count(void)
457{
458 assert(interrupts_disabled());
459 assert(irq_spinlock_locked(&tasks_lock));
460
461 return odict_count(&tasks);
462}
463
464/** Get first task (task with lowest ID).
465 *
466 * @return Pointer to first task or @c NULL if there are none.
467 */
468task_t *task_first(void)
469{
470 odlink_t *odlink;
471
472 assert(interrupts_disabled());
473 assert(irq_spinlock_locked(&tasks_lock));
474
475 odlink = odict_first(&tasks);
476 if (odlink == NULL)
477 return NULL;
478
479 return odict_get_instance(odlink, task_t, ltasks);
480}
481
482/** Get next task (with higher task ID).
483 *
484 * @param cur Current task
485 * @return Pointer to next task or @c NULL if there are no more tasks.
486 */
487task_t *task_next(task_t *cur)
488{
489 odlink_t *odlink;
490
491 assert(interrupts_disabled());
492 assert(irq_spinlock_locked(&tasks_lock));
493
494 odlink = odict_next(&cur->ltasks, &tasks);
495 if (odlink == NULL)
496 return NULL;
497
498 return odict_get_instance(odlink, task_t, ltasks);
499}
500
[0313ff0]501/** Get accounting data of given task.
502 *
[1d432f9]503 * Note that task lock of 'task' must be already held and interrupts must be
[814c4f5]504 * already disabled.
[0313ff0]505 *
[da1bafb]506 * @param task Pointer to the task.
[88dea9d]507 * @param ucycles Out pointer to sum of all user cycles.
508 * @param kcycles Out pointer to sum of all kernel cycles.
[0313ff0]509 *
510 */
[da1bafb]511void task_get_accounting(task_t *task, uint64_t *ucycles, uint64_t *kcycles)
[0313ff0]512{
[63e27ef]513 assert(interrupts_disabled());
514 assert(irq_spinlock_locked(&task->lock));
[1d432f9]515
[a2a00e8]516 /* Accumulated values of task */
[da1bafb]517 uint64_t uret = task->ucycles;
518 uint64_t kret = task->kcycles;
[a35b458]519
[0313ff0]520 /* Current values of threads */
[feeac0d]521 list_foreach(task->threads, th_link, thread_t, thread) {
[da1bafb]522 irq_spinlock_lock(&thread->lock, false);
[a35b458]523
[62b6d17]524 /* Process only counted threads */
[da1bafb]525 if (!thread->uncounted) {
526 if (thread == THREAD) {
[6f4495f5]527 /* Update accounting of current thread */
[a2a00e8]528 thread_update_accounting(false);
[da1bafb]529 }
[a35b458]530
[da1bafb]531 uret += thread->ucycles;
532 kret += thread->kcycles;
[62b6d17]533 }
[a35b458]534
[da1bafb]535 irq_spinlock_unlock(&thread->lock, false);
[0313ff0]536 }
[a35b458]537
[a2a00e8]538 *ucycles = uret;
539 *kcycles = kret;
[0313ff0]540}
541
[da1bafb]542static void task_kill_internal(task_t *task)
[121966e]543{
[df58e44]544 irq_spinlock_lock(&task->lock, false);
545 irq_spinlock_lock(&threads_lock, false);
[a35b458]546
[121966e]547 /*
548 * Interrupt all threads.
549 */
[a35b458]550
[feeac0d]551 list_foreach(task->threads, th_link, thread_t, thread) {
[121966e]552 bool sleeping = false;
[a35b458]553
[da1bafb]554 irq_spinlock_lock(&thread->lock, false);
[a35b458]555
[da1bafb]556 thread->interrupted = true;
557 if (thread->state == Sleeping)
[121966e]558 sleeping = true;
[a35b458]559
[da1bafb]560 irq_spinlock_unlock(&thread->lock, false);
[a35b458]561
[121966e]562 if (sleeping)
[da1bafb]563 waitq_interrupt_sleep(thread);
[121966e]564 }
[a35b458]565
[df58e44]566 irq_spinlock_unlock(&threads_lock, false);
[da1bafb]567 irq_spinlock_unlock(&task->lock, false);
[121966e]568}
569
[7509ddc]570/** Kill task.
[ea7890e7]571 *
572 * This function is idempotent.
573 * It signals all the task's threads to bail it out.
[7509ddc]574 *
[5ba201d]575 * @param id ID of the task to be killed.
576 *
577 * @return Zero on success or an error code from errno.h.
[7509ddc]578 *
579 */
[b7fd2a0]580errno_t task_kill(task_id_t id)
[7509ddc]581{
[9b6aae6]582 if (id == 1)
583 return EPERM;
[a35b458]584
[da1bafb]585 irq_spinlock_lock(&tasks_lock, true);
[a35b458]586
[da1bafb]587 task_t *task = task_find_by_id(id);
588 if (!task) {
589 irq_spinlock_unlock(&tasks_lock, true);
[7509ddc]590 return ENOENT;
591 }
[a35b458]592
[da1bafb]593 task_kill_internal(task);
594 irq_spinlock_unlock(&tasks_lock, true);
[a35b458]595
[da1bafb]596 return EOK;
[7509ddc]597}
598
[5bcf1f9]599/** Kill the currently running task.
600 *
601 * @param notify Send out fault notifications.
602 *
603 * @return Zero on success or an error code from errno.h.
604 *
605 */
606void task_kill_self(bool notify)
607{
608 /*
609 * User space can subscribe for FAULT events to take action
610 * whenever a task faults (to take a dump, run a debugger, etc.).
611 * The notification is always available, but unless udebug is enabled,
612 * that's all you get.
[ae7d03c]613 */
[5bcf1f9]614 if (notify) {
[f9061b4]615 /* Notify the subscriber that a fault occurred. */
616 if (event_notify_3(EVENT_FAULT, false, LOWER32(TASK->taskid),
617 UPPER32(TASK->taskid), (sysarg_t) THREAD) == EOK) {
[5bcf1f9]618#ifdef CONFIG_UDEBUG
619 /* Wait for a debugging session. */
620 udebug_thread_fault();
621#endif
622 }
623 }
[a35b458]624
[5bcf1f9]625 irq_spinlock_lock(&tasks_lock, true);
626 task_kill_internal(TASK);
627 irq_spinlock_unlock(&tasks_lock, true);
[a35b458]628
[5bcf1f9]629 thread_exit();
630}
631
632/** Process syscall to terminate the current task.
633 *
634 * @param notify Send out fault notifications.
635 *
636 */
[b7fd2a0]637sys_errno_t sys_task_exit(sysarg_t notify)
[5bcf1f9]638{
639 task_kill_self(notify);
[a35b458]640
[5bcf1f9]641 /* Unreachable */
642 return EOK;
643}
644
[ef1eab7]645static void task_print(task_t *task, bool additional)
[b76a2217]646{
[da1bafb]647 irq_spinlock_lock(&task->lock, false);
[a35b458]648
[a2a00e8]649 uint64_t ucycles;
650 uint64_t kcycles;
[1ba37fa]651 char usuffix, ksuffix;
[da1bafb]652 task_get_accounting(task, &ucycles, &kcycles);
[e535eeb]653 order_suffix(ucycles, &ucycles, &usuffix);
654 order_suffix(kcycles, &kcycles, &ksuffix);
[a35b458]655
[da1bafb]656#ifdef __32_BITS__
[ef1eab7]657 if (additional)
[077842c]658 printf("%-8" PRIu64 " %9zu", task->taskid,
[036e97c]659 atomic_load(&task->refcount));
[c0f13d2]660 else
661 printf("%-8" PRIu64 " %-14s %-5" PRIu32 " %10p %10p"
662 " %9" PRIu64 "%c %9" PRIu64 "%c\n", task->taskid,
[473d5d2]663 task->name, task->container, task, task->as,
[c0f13d2]664 ucycles, usuffix, kcycles, ksuffix);
[52755f1]665#endif
[a35b458]666
[52755f1]667#ifdef __64_BITS__
[ef1eab7]668 if (additional)
[7e752b2]669 printf("%-8" PRIu64 " %9" PRIu64 "%c %9" PRIu64 "%c "
[077842c]670 "%9zu\n", task->taskid, ucycles, usuffix, kcycles,
[036e97c]671 ksuffix, atomic_load(&task->refcount));
[c0f13d2]672 else
673 printf("%-8" PRIu64 " %-14s %-5" PRIu32 " %18p %18p\n",
[473d5d2]674 task->taskid, task->name, task->container, task, task->as);
[52755f1]675#endif
[a35b458]676
[da1bafb]677 irq_spinlock_unlock(&task->lock, false);
[b76a2217]678}
679
[c0f13d2]680/** Print task list
681 *
682 * @param additional Print additional information.
683 *
684 */
685void task_print_list(bool additional)
[37c57f2]686{
[f74bbaf]687 /* Messing with task structures, avoid deadlock */
[da1bafb]688 irq_spinlock_lock(&tasks_lock, true);
[a35b458]689
[5ba201d]690#ifdef __32_BITS__
[c0f13d2]691 if (additional)
[48dcc69]692 printf("[id ] [threads] [calls] [callee\n");
[c0f13d2]693 else
[473d5d2]694 printf("[id ] [name ] [ctn] [address ] [as ]"
[c0f13d2]695 " [ucycles ] [kcycles ]\n");
[52755f1]696#endif
[a35b458]697
[52755f1]698#ifdef __64_BITS__
[c0f13d2]699 if (additional)
[be06914]700 printf("[id ] [ucycles ] [kcycles ] [threads] [calls]"
[c0f13d2]701 " [callee\n");
702 else
[473d5d2]703 printf("[id ] [name ] [ctn] [address ]"
[c0f13d2]704 " [as ]\n");
[52755f1]705#endif
[a35b458]706
[ef1eab7]707 task_t *task;
708
[aab5e46]709 task = task_first();
710 while (task != NULL) {
[ef1eab7]711 task_print(task, additional);
[aab5e46]712 task = task_next(task);
[ef1eab7]713 }
[a35b458]714
[da1bafb]715 irq_spinlock_unlock(&tasks_lock, true);
[37c57f2]716}
[7509ddc]717
[ef1eab7]718/** Get key function for the @c tasks ordered dictionary.
719 *
720 * @param odlink Link
721 * @return Pointer to task ID cast as 'void *'
722 */
723static void *tasks_getkey(odlink_t *odlink)
724{
725 task_t *task = odict_get_instance(odlink, task_t, ltasks);
726 return (void *) &task->taskid;
727}
728
729/** Key comparison function for the @c tasks ordered dictionary.
730 *
731 * @param a Pointer to thread A ID
732 * @param b Pointer to thread B ID
733 * @return -1, 0, 1 iff ID A is less than, equal to, greater than B
734 */
735static int tasks_cmp(void *a, void *b)
736{
737 task_id_t ida = *(task_id_t *)a;
738 task_id_t idb = *(task_id_t *)b;
739
740 if (ida < idb)
741 return -1;
742 else if (ida == idb)
743 return 0;
744 else
745 return +1;
746}
747
[cc73a8a1]748/** @}
[b45c443]749 */
Note: See TracBrowser for help on using the repository browser.