xv6-cs450/main.c

186 lines
4.2 KiB
C
Raw Normal View History

2006-06-12 17:22:12 +02:00
#include "types.h"
#include "param.h"
#include "mmu.h"
#include "proc.h"
#include "defs.h"
#include "x86.h"
2006-06-15 18:02:20 +02:00
#include "traps.h"
#include "syscall.h"
2006-06-22 22:47:23 +02:00
#include "elf.h"
#include "param.h"
#include "spinlock.h"
2006-06-12 17:22:12 +02:00
2006-06-14 00:08:20 +02:00
extern char edata[], end[];
extern uchar _binary_init_start[], _binary_init_size[];
2006-06-12 17:22:12 +02:00
void main00();
// CPU 0 starts running C code here.
2006-07-16 18:03:51 +02:00
// This is called main0 not main so that it can have
// a void return type. Gcc can't handle functions named
// main that don't return int. Really.
void
main0(void)
2006-06-12 17:22:12 +02:00
{
int i;
2006-06-12 17:22:12 +02:00
struct proc *p;
lcr4(0); // xxx copy of cpu #
2006-06-14 00:08:20 +02:00
// clear BSS
memset(edata, 0, end - edata);
// switch to cpu0's cpu stack
asm volatile("movl %0, %%esp" : : "r" (cpus[0].mpstack + MPSTACK - 32));
asm volatile("movl %0, %%ebp" : : "r" (cpus[0].mpstack + MPSTACK));
// Make sure interrupts stay disabled on all processors
// until each signals it is ready, by pretending to hold
// an extra lock.
// xxx maybe replace w/ acquire remembering if FL_IF was already clear
for(i=0; i<NCPU; i++){
cpus[i].nlock++;
cpus[i].guard1 = 0xdeadbeef;
cpus[i].guard2 = 0xdeadbeef;
}
2006-07-12 19:00:54 +02:00
mp_init(); // collect info about this machine
lapic_init(mp_bcpu());
cprintf("\n\ncpu%d: booting xv6\n\n", cpu());
2006-06-12 17:22:12 +02:00
pinit();
binit();
pic_init(); // initialize PIC
ioapic_init();
2006-06-13 17:50:06 +02:00
kinit(); // physical memory allocator
tvinit(); // trap vectors
idtinit(); // this CPU's idt register
fd_init();
iinit();
// initialize process 0
2006-06-12 17:22:12 +02:00
p = &proc[0];
p->state = RUNNABLE;
p->sz = 4 * PAGE;
2006-06-12 17:22:12 +02:00
p->mem = kalloc(p->sz);
memset(p->mem, 0, p->sz);
2006-08-15 17:54:53 +02:00
p->kstack = kalloc(KSTACKSIZE);
// cause proc[0] to start in kernel at main00
memset(&p->jmpbuf, 0, sizeof p->jmpbuf);
p->jmpbuf.eip = (uint)main00;
p->jmpbuf.esp = (uint) (p->kstack + KSTACKSIZE - 4);
// make sure there's a TSS
setupsegs(0);
2006-06-12 17:22:12 +02:00
// initialize I/O devices, let them enable interrupts
console_init();
ide_init();
mp_startthem();
// turn on timer and enable interrupts on the local APIC
2006-06-28 18:35:03 +02:00
lapic_timerinit();
lapic_enableintr();
// Enable interrupts on this processor.
cpus[cpu()].nlock--;
sti();
2006-06-16 22:29:25 +02:00
2006-07-11 03:07:40 +02:00
scheduler();
2006-06-12 17:22:12 +02:00
}
2006-06-22 22:47:23 +02:00
// Additional processors start here.
2006-07-16 18:03:51 +02:00
void
mpmain(void)
{
lcr4(1); // xxx copy of cpu #
cprintf("cpu%d: starting\n", cpu());
idtinit(); // CPU's idt
2006-07-29 11:35:02 +02:00
if(cpu() == 0)
panic("mpmain on cpu 0");
lapic_init(cpu());
lapic_timerinit();
lapic_enableintr();
// make sure there's a TSS
setupsegs(0);
cpuid(0, 0, 0, 0, 0); // memory barrier
cpus[cpu()].booted = 1;
// Enable interrupts on this processor.
cpus[cpu()].nlock--;
sti();
scheduler();
}
// proc[0] starts here, called by scheduler() in the ordinary way.
void
main00()
{
struct proc *p0 = &proc[0];
struct proc *p1;
extern struct spinlock proc_table_lock;
struct trapframe tf;
release(&proc_table_lock);
p0->cwd = iget(rootdev, 1);
iunlock(p0->cwd);
// fake a trap frame as if a user process had made a system
// call, so that copyproc will have a place for the new
// process to return to.
p0 = &proc[0];
p0->tf = &tf;
memset(p0->tf, 0, sizeof(struct trapframe));
p0->tf->es = p0->tf->ds = p0->tf->ss = (SEG_UDATA << 3) | 3;
p0->tf->cs = (SEG_UCODE << 3) | 3;
p0->tf->eflags = FL_IF;
p0->tf->esp = p0->sz;
p1 = copyproc(&proc[0]);
load_icode(p1, _binary_init_start, (uint) _binary_init_size);
p1->state = RUNNABLE;
proc_wait();
panic("init exited");
}
2006-06-22 22:47:23 +02:00
void
2006-07-20 11:07:53 +02:00
load_icode(struct proc *p, uchar *binary, uint size)
2006-06-22 22:47:23 +02:00
{
2006-06-28 18:35:03 +02:00
int i;
struct elfhdr *elf;
struct proghdr *ph;
2006-06-22 22:47:23 +02:00
2006-06-28 18:35:03 +02:00
// Check magic number on binary
elf = (struct elfhdr*) binary;
if (elf->magic != ELF_MAGIC)
2006-06-28 18:35:03 +02:00
panic("load_icode: not an ELF binary");
2006-06-22 22:47:23 +02:00
p->tf->eip = elf->entry;
2006-06-22 22:47:23 +02:00
2006-06-28 18:35:03 +02:00
// Map and load segments as directed.
ph = (struct proghdr*) (binary + elf->phoff);
for (i = 0; i < elf->phnum; i++, ph++) {
if (ph->type != ELF_PROG_LOAD)
2006-06-28 18:35:03 +02:00
continue;
if (ph->va + ph->memsz < ph->va)
2006-06-28 18:35:03 +02:00
panic("load_icode: overflow in elf header segment");
if (ph->va + ph->memsz >= p->sz)
2006-06-28 18:35:03 +02:00
panic("load_icode: icode wants to be above UTOP");
// Load/clear the segment
memmove(p->mem + ph->va, binary + ph->offset, ph->filesz);
memset(p->mem + ph->va + ph->filesz, 0, ph->memsz - ph->filesz);
2006-06-28 18:35:03 +02:00
}
2006-06-22 22:47:23 +02:00
}