xv6-65oo2/main.c

183 lines
4 KiB
C
Raw Normal View History

2006-06-12 15:22:12 +00:00
#include "types.h"
#include "param.h"
#include "mmu.h"
#include "proc.h"
#include "defs.h"
#include "x86.h"
2006-06-15 16:02:20 +00:00
#include "traps.h"
#include "syscall.h"
2006-06-22 20:47:23 +00:00
#include "elf.h"
#include "param.h"
#include "spinlock.h"
2006-06-12 15:22:12 +00:00
2006-06-13 22:08:20 +00:00
extern char edata[], end[];
2006-09-07 14:10:52 +00:00
extern uchar _binary__init_start[], _binary__init_size[];
2006-06-12 15:22:12 +00:00
2006-08-29 19:06:37 +00:00
void process0();
2006-09-08 14:36:44 +00:00
// Bootstrap processor starts running C code here.
2006-07-16 16:03:51 +00:00
// This is called main0 not main so that it can have
// a void return type. Gcc can't handle functions named
// main that don't return int. Really.
void
main0(void)
2006-06-12 15:22:12 +00:00
{
int i;
int bcpu;
2006-06-12 15:22:12 +00:00
struct proc *p;
2006-06-13 22:08:20 +00:00
// clear BSS
memset(edata, 0, end - edata);
2006-08-29 19:06:37 +00:00
// Prevent release() from enabling interrupts.
for(i=0; i<NCPU; i++)
cpus[i].nlock = 1;
2006-07-12 17:00:54 +00:00
mp_init(); // collect info about this machine
bcpu = mp_bcpu();
// switch to bootstrap processor's stack
asm volatile("movl %0, %%esp" : : "r" (cpus[0].mpstack + MPSTACK - 32));
asm volatile("movl %0, %%ebp" : : "r" (cpus[0].mpstack + MPSTACK));
2006-07-12 17:00:54 +00:00
lapic_init(bcpu);
2006-07-12 17:00:54 +00:00
2006-08-29 19:06:37 +00:00
cprintf("\ncpu%d: starting xv6\n\n", cpu());
2006-06-12 15:22:12 +00:00
2006-08-29 19:06:37 +00:00
pinit(); // process table
binit(); // buffer cache
pic_init();
ioapic_init();
2006-06-13 15:50:06 +00:00
kinit(); // physical memory allocator
tvinit(); // trap vectors
2006-08-29 19:06:37 +00:00
idtinit(); // this CPU's interrupt descriptor table
2006-09-06 18:43:45 +00:00
fileinit();
2006-08-29 19:06:37 +00:00
iinit(); // i-node table
// initialize process 0
2006-06-12 15:22:12 +00:00
p = &proc[0];
p->state = RUNNABLE;
2006-08-15 15:54:53 +00:00
p->kstack = kalloc(KSTACKSIZE);
2006-08-29 19:06:37 +00:00
// cause proc[0] to start in kernel at process0
p->jmpbuf.eip = (uint) process0;
p->jmpbuf.esp = (uint) (p->kstack + KSTACKSIZE - 4);
// make sure there's a TSS
setupsegs(0);
2006-06-12 15:22:12 +00:00
// initialize I/O devices, let them enable interrupts
console_init();
2006-09-06 17:27:19 +00:00
ide_init();
2006-08-29 19:06:37 +00:00
// start other CPUs
mp_startthem();
// turn on timer
2006-09-08 15:14:43 +00:00
if(ismp)
lapic_timerinit();
else
pit8253_timerinit();
// enable interrupts on the local APIC
2006-06-28 16:35:03 +00:00
lapic_enableintr();
// enable interrupts on this processor.
cpus[cpu()].nlock--;
sti();
2006-06-16 20:29:25 +00:00
2006-07-11 01:07:40 +00:00
scheduler();
2006-06-12 15:22:12 +00:00
}
2006-06-22 20:47:23 +00:00
// Additional processors start here.
2006-07-16 16:03:51 +00:00
void
mpmain(void)
{
cprintf("cpu%d: starting\n", cpu());
idtinit(); // CPU's idt
2006-07-29 09:35:02 +00:00
if(cpu() == 0)
panic("mpmain on cpu 0");
lapic_init(cpu());
lapic_timerinit();
lapic_enableintr();
// make sure there's a TSS
setupsegs(0);
cpuid(0, 0, 0, 0, 0); // memory barrier
cpus[cpu()].booted = 1;
// Enable interrupts on this processor.
cpus[cpu()].nlock--;
sti();
scheduler();
}
// proc[0] starts here, called by scheduler() in the ordinary way.
void
2006-08-29 19:06:37 +00:00
process0()
{
struct proc *p0 = &proc[0];
struct proc *p1;
extern struct spinlock proc_table_lock;
struct trapframe tf;
release(&proc_table_lock);
p0->cwd = iget(rootdev, 1);
iunlock(p0->cwd);
2006-09-08 15:14:43 +00:00
// dummy user memory to make copyproc() happy.
// must be big enough to hold the init binary.
2006-09-08 15:09:48 +00:00
p0->sz = PAGE;
2006-08-29 19:06:37 +00:00
p0->mem = kalloc(p0->sz);
// fake a trap frame as if a user process had made a system
// call, so that copyproc will have a place for the new
// process to return to.
p0->tf = &tf;
memset(p0->tf, 0, sizeof(struct trapframe));
p0->tf->es = p0->tf->ds = p0->tf->ss = (SEG_UDATA << 3) | 3;
p0->tf->cs = (SEG_UCODE << 3) | 3;
p0->tf->eflags = FL_IF;
p0->tf->esp = p0->sz;
2006-08-29 19:06:37 +00:00
p1 = copyproc(p0);
2006-09-06 17:27:19 +00:00
2006-09-07 14:10:52 +00:00
load_icode(p1, _binary__init_start, (uint) _binary__init_size);
p1->state = RUNNABLE;
proc_wait();
panic("init exited");
}
2006-06-22 20:47:23 +00:00
void
2006-07-20 09:07:53 +00:00
load_icode(struct proc *p, uchar *binary, uint size)
2006-06-22 20:47:23 +00:00
{
2006-06-28 16:35:03 +00:00
int i;
struct elfhdr *elf;
struct proghdr *ph;
2006-06-22 20:47:23 +00:00
elf = (struct elfhdr*) binary;
2006-09-06 17:27:19 +00:00
if(elf->magic != ELF_MAGIC)
2006-06-28 16:35:03 +00:00
panic("load_icode: not an ELF binary");
2006-06-22 20:47:23 +00:00
p->tf->eip = elf->entry;
2006-06-22 20:47:23 +00:00
2006-06-28 16:35:03 +00:00
// Map and load segments as directed.
ph = (struct proghdr*) (binary + elf->phoff);
2006-09-06 17:27:19 +00:00
for(i = 0; i < elf->phnum; i++, ph++) {
if(ph->type != ELF_PROG_LOAD)
2006-06-28 16:35:03 +00:00
continue;
2006-09-06 17:27:19 +00:00
if(ph->va + ph->memsz < ph->va)
2006-09-07 14:10:52 +00:00
panic("load_icode: overflow in proghdr");
2006-09-06 17:27:19 +00:00
if(ph->va + ph->memsz >= p->sz)
2006-09-07 14:10:52 +00:00
panic("load_icode: icode too large");
2006-06-28 16:35:03 +00:00
// Load/clear the segment
memmove(p->mem + ph->va, binary + ph->offset, ph->filesz);
memset(p->mem + ph->va + ph->filesz, 0, ph->memsz - ph->filesz);
2006-06-28 16:35:03 +00:00
}
2006-06-22 20:47:23 +00:00
}