xv6-cs450/main.c

191 lines
4.4 KiB
C
Raw Normal View History

2006-06-12 17:22:12 +02:00
#include "types.h"
#include "param.h"
#include "mmu.h"
#include "proc.h"
#include "defs.h"
#include "x86.h"
2006-06-15 18:02:20 +02:00
#include "traps.h"
#include "syscall.h"
2006-06-22 22:47:23 +02:00
#include "elf.h"
#include "param.h"
#include "spinlock.h"
2006-06-12 17:22:12 +02:00
2006-06-14 00:08:20 +02:00
extern char edata[], end[];
2006-09-07 16:10:52 +02:00
extern uchar _binary__init_start[], _binary__init_size[];
2006-06-12 17:22:12 +02:00
2006-08-29 21:06:37 +02:00
void process0();
2006-09-08 16:36:44 +02:00
// Bootstrap processor starts running C code here.
2006-07-16 18:03:51 +02:00
// This is called main0 not main so that it can have
// a void return type. Gcc can't handle functions named
// main that don't return int. Really.
void
main0(void)
2006-06-12 17:22:12 +02:00
{
int i;
2007-08-08 11:10:16 +02:00
static int bcpu; // cannot be on stack
2006-06-12 17:22:12 +02:00
struct proc *p;
2006-06-14 00:08:20 +02:00
// clear BSS
memset(edata, 0, end - edata);
2006-08-29 21:06:37 +02:00
// Prevent release() from enabling interrupts.
for(i=0; i<NCPU; i++)
cpus[i].nlock = 1;
2006-07-12 19:00:54 +02:00
mp_init(); // collect info about this machine
bcpu = mp_bcpu();
// switch to bootstrap processor's stack
2007-08-08 11:10:16 +02:00
asm volatile("movl %0, %%esp" : : "r" (cpus[bcpu].mpstack + MPSTACK - 32));
asm volatile("movl %0, %%ebp" : : "r" (cpus[bcpu].mpstack + MPSTACK));
2006-07-12 19:00:54 +02:00
lapic_init(bcpu);
2006-07-12 19:00:54 +02:00
2006-08-29 21:06:37 +02:00
cprintf("\ncpu%d: starting xv6\n\n", cpu());
2006-06-12 17:22:12 +02:00
2006-08-29 21:06:37 +02:00
pinit(); // process table
binit(); // buffer cache
pic_init();
ioapic_init();
2006-06-13 17:50:06 +02:00
kinit(); // physical memory allocator
tvinit(); // trap vectors
2006-08-29 21:06:37 +02:00
idtinit(); // this CPU's interrupt descriptor table
2006-09-06 20:43:45 +02:00
fileinit();
2006-08-29 21:06:37 +02:00
iinit(); // i-node table
// initialize process 0
2006-06-12 17:22:12 +02:00
p = &proc[0];
p->state = RUNNABLE;
2006-08-15 17:54:53 +02:00
p->kstack = kalloc(KSTACKSIZE);
2006-08-29 21:06:37 +02:00
// cause proc[0] to start in kernel at process0
p->jmpbuf.eip = (uint) process0;
p->jmpbuf.esp = (uint) (p->kstack + KSTACKSIZE - 4);
// make sure there's a TSS
setupsegs(0);
2006-06-12 17:22:12 +02:00
// initialize I/O devices, let them enable interrupts
console_init();
2006-09-06 19:27:19 +02:00
ide_init();
2006-08-29 21:06:37 +02:00
// start other CPUs
mp_startthem();
// turn on timer
2006-09-08 17:14:43 +02:00
if(ismp)
lapic_timerinit();
else
pit8253_timerinit();
// enable interrupts on the local APIC
2006-06-28 18:35:03 +02:00
lapic_enableintr();
// enable interrupts on this processor.
cpus[cpu()].nlock--;
sti();
2006-06-16 22:29:25 +02:00
2006-07-11 03:07:40 +02:00
scheduler();
2006-06-12 17:22:12 +02:00
}
2006-06-22 22:47:23 +02:00
// Additional processors start here.
2006-07-16 18:03:51 +02:00
void
mpmain(void)
{
cprintf("cpu%d: starting\n", cpu());
idtinit(); // CPU's idt
2006-07-29 11:35:02 +02:00
if(cpu() == 0)
panic("mpmain on cpu 0");
lapic_init(cpu());
lapic_timerinit();
lapic_enableintr();
// make sure there's a TSS
setupsegs(0);
cpuid(0, 0, 0, 0, 0); // memory barrier
cpus[cpu()].booted = 1;
// Enable interrupts on this processor.
cpus[cpu()].nlock--;
sti();
scheduler();
}
// proc[0] starts here, called by scheduler() in the ordinary way.
void
2007-08-08 11:32:39 +02:00
process0(void)
{
extern struct spinlock proc_table_lock;
2007-08-10 19:17:42 +02:00
struct proc *p0, *p1;
struct trapframe tf;
release(&proc_table_lock);
2007-08-10 19:17:42 +02:00
p0 = &proc[0];
p0->cwd = iget(rootdev, 1);
iunlock(p0->cwd);
// Dummy user memory to make copyproc() happy.
// Must be big enough to hold the init binary and stack.
p0->sz = 2*PAGE;
2006-08-29 21:06:37 +02:00
p0->mem = kalloc(p0->sz);
// Fake a trap frame as if a user process had made a system
// call, so that copyproc will have a place for the new
// process to return to.
p0->tf = &tf;
memset(p0->tf, 0, sizeof(struct trapframe));
2007-08-08 11:02:42 +02:00
p0->tf->es = p0->tf->ds = p0->tf->ss = (SEG_UDATA << 3) | DPL_USER;
p0->tf->cs = (SEG_UCODE << 3) | DPL_USER;
p0->tf->eflags = FL_IF;
p0->tf->esp = p0->sz;
// Push bogus return address, both to cause problems
// if main returns and also because gcc can generate
// function prologs that expect to be able to read the
// return address off the stack without causing a fault.
p0->tf->esp -= 4;
*(uint*)(p0->mem + p0->tf->esp) = 0xefefefef;
2006-08-29 21:06:37 +02:00
p1 = copyproc(p0);
2006-09-06 19:27:19 +02:00
2006-09-07 16:10:52 +02:00
load_icode(p1, _binary__init_start, (uint) _binary__init_size);
p1->state = RUNNABLE;
2007-08-08 10:57:55 +02:00
safestrcpy(p1->name, "init", sizeof p1->name);
proc_wait();
panic("init exited");
}
2006-06-22 22:47:23 +02:00
void
2006-07-20 11:07:53 +02:00
load_icode(struct proc *p, uchar *binary, uint size)
2006-06-22 22:47:23 +02:00
{
2006-06-28 18:35:03 +02:00
int i;
struct elfhdr *elf;
struct proghdr *ph;
2006-06-22 22:47:23 +02:00
elf = (struct elfhdr*) binary;
2006-09-06 19:27:19 +02:00
if(elf->magic != ELF_MAGIC)
2006-06-28 18:35:03 +02:00
panic("load_icode: not an ELF binary");
2006-06-22 22:47:23 +02:00
p->tf->eip = elf->entry;
2006-06-22 22:47:23 +02:00
2006-06-28 18:35:03 +02:00
// Map and load segments as directed.
ph = (struct proghdr*) (binary + elf->phoff);
2006-09-06 19:27:19 +02:00
for(i = 0; i < elf->phnum; i++, ph++) {
if(ph->type != ELF_PROG_LOAD)
2006-06-28 18:35:03 +02:00
continue;
2006-09-06 19:27:19 +02:00
if(ph->va + ph->memsz < ph->va)
2006-09-07 16:10:52 +02:00
panic("load_icode: overflow in proghdr");
2006-09-06 19:27:19 +02:00
if(ph->va + ph->memsz >= p->sz)
2006-09-07 16:10:52 +02:00
panic("load_icode: icode too large");
2006-06-28 18:35:03 +02:00
// Load/clear the segment
memmove(p->mem + ph->va, binary + ph->offset, ph->filesz);
memset(p->mem + ph->va + ph->filesz, 0, ph->memsz - ph->filesz);
2006-06-28 18:35:03 +02:00
}
2006-06-22 22:47:23 +02:00
}