source: mainline/kernel/generic/src/main/main.c@ 2e4343b

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since 2e4343b was 2e4343b, checked in by Jiří Zárevúcky <zarevucky.jiri@…>, 7 years ago

Fix comments

get_current() refers to out of order local changes.

  • Property mode set to 100644
File size: 9.8 KB
RevLine 
[f761f1eb]1/*
[df4ed85]2 * Copyright (c) 2001-2004 Jakub Jermar
[f761f1eb]3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
[e88eb48]29/** @addtogroup kernel_generic
[b45c443]30 * @{
31 */
32
[9179d0a]33/**
[b45c443]34 * @file
[13a638d]35 * @brief Main initialization kernel function for all processors.
[9179d0a]36 *
37 * During kernel boot, all processors, after architecture dependent
38 * initialization, start executing code found in this file. After
39 * bringing up all subsystems, control is passed to scheduler().
40 *
41 * The bootstrap processor starts executing main_bsp() while
42 * the application processors start executing main_ap().
43 *
44 * @see scheduler()
45 * @see main_bsp()
46 * @see main_ap()
47 */
48
[f761f1eb]49#include <arch/asm.h>
[63e27ef]50#include <debug.h>
[d5d2a3f]51#include <context.h>
[bab75df6]52#include <stdio.h>
[02a99d2]53#include <panic.h>
[63e27ef]54#include <assert.h>
[f761f1eb]55#include <config.h>
56#include <time/clock.h>
[b3f8fb7]57#include <time/timeout.h>
[f761f1eb]58#include <proc/scheduler.h>
59#include <proc/thread.h>
60#include <proc/task.h>
61#include <main/kinit.h>
[5fe5f1e]62#include <main/version.h>
[f4338d2]63#include <console/kconsole.h>
[5d67baa]64#include <console/console.h>
[91db0280]65#include <log.h>
[f761f1eb]66#include <cpu.h>
[e0cdb7b6]67#include <align.h>
[aace6624]68#include <interrupt.h>
[b5746a2]69#include <str.h>
[f761f1eb]70#include <mm/frame.h>
71#include <mm/page.h>
[6d7ffa65]72#include <genarch/mm/page_pt.h>
[622f409]73#include <mm/km.h>
[169587a]74#include <mm/tlb.h>
[20d50a1]75#include <mm/as.h>
[4e147a6]76#include <mm/slab.h>
[8d308b9]77#include <mm/reserve.h>
[f761f1eb]78#include <synch/waitq.h>
[9aa72b4]79#include <synch/futex.h>
[8a64e81e]80#include <synch/workqueue.h>
[2ee1ccc]81#include <smp/smp_call.h>
[393f631]82#include <arch/arch.h>
[f761f1eb]83#include <arch.h>
[f2ffad4]84#include <arch/faddr.h>
[6d9c49a]85#include <ipc/ipc.h>
[93165be]86#include <macros.h>
[2810636]87#include <adt/btree.h>
[5fe5f1e]88#include <smp/smp.h>
[f8ddd17]89#include <ddi/ddi.h>
[4b241f3]90#include <main/main.h>
[13a638d]91#include <ipc/event.h>
[d9fae235]92#include <sysinfo/sysinfo.h>
[9dae191e]93#include <sysinfo/stats.h>
[41deb2a]94#include <lib/ra.h>
[ce732e74]95#include <cap/cap.h>
[5fe5f1e]96
[7c3fb9b]97/*
98 * Ensure [u]int*_t types are of correct size.
[328cc31]99 *
100 * Probably, this is not the best place for such tests
101 * but this file is compiled on all architectures.
102 */
103#define CHECK_INT_TYPE_(signness, size) \
[63e27ef]104 static_assert(sizeof(signness##size##_t) * 8 == size, \
[328cc31]105 #signness #size "_t does not have " #size " bits");
[9e40355e]106
[328cc31]107#define CHECK_INT_TYPE(size) \
[9e40355e]108 CHECK_INT_TYPE_(int, size); \
109 CHECK_INT_TYPE_(uint, size)
[328cc31]110
111CHECK_INT_TYPE(8);
112CHECK_INT_TYPE(16);
113CHECK_INT_TYPE(32);
114CHECK_INT_TYPE(64);
115
[e459f12]116/** Global configuration structure. */
[55896b6]117config_t config = {
118 .identity_configured = false,
[40c8c17]119 .non_identity_configured = false,
120 .physmem_end = 0
[55896b6]121};
[e459f12]122
[3b3faf51]123/** Boot arguments. */
[3bacee1]124char bargs[CONFIG_BOOT_ARGUMENTS_BUFLEN] = { };
[3b3faf51]125
[e459f12]126/** Initial user-space tasks */
127init_t init = {
[6c441cf8]128 .cnt = 0
[e459f12]129};
[5fe5f1e]130
[61e90dd]131/** Boot allocations. */
132ballocs_t ballocs = {
[0b4a67a]133 .base = (uintptr_t) NULL,
[61e90dd]134 .size = 0
135};
136
[f761f1eb]137context_t ctx;
138
[c0855a0]139/** Lowest safe stack virtual address. */
[263bda2]140uintptr_t stack_safe = 0;
[deaa22f]141
[f761f1eb]142/*
143 * These two functions prevent stack from underflowing during the
144 * kernel boot phase when SP is set to the very top of the reserved
145 * space. The stack could get corrupted by a fooled compiler-generated
146 * pop sequence otherwise.
147 */
148static void main_bsp_separated_stack(void);
[263bda2]149
[80d2bdb]150#ifdef CONFIG_SMP
[f761f1eb]151static void main_ap_separated_stack(void);
[80d2bdb]152#endif
[f761f1eb]153
[7f0837c]154/** Main kernel routine for bootstrap CPU.
[673104e]155 *
[7a4202d]156 * The code here still runs on the boot stack, which knows nothing about
157 * preemption counts. Because of that, this function cannot directly call
158 * functions that disable or enable preemption (e.g. spinlock_lock()). The
159 * primary task of this function is to calculate address of a new stack and
160 * switch to it.
[673104e]161 *
[22f7769]162 * Assuming interrupts_disable().
[673104e]163 *
[f761f1eb]164 */
[7a0359b]165NO_TRACE void main_bsp(void)
[f761f1eb]166{
167 config.cpu_count = 1;
168 config.cpu_active = 1;
[a35b458]169
[8a1afd2]170 config.base = (uintptr_t) kernel_load_address;
171
172 config.kernel_size =
173 ALIGN_UP((uintptr_t) kdata_end - config.base, PAGE_SIZE);
[a35b458]174
[d1da1ff2]175 // XXX: All kernel stacks must be aligned to STACK_SIZE,
[2e4343b]176 // see get_stack_base().
[d1da1ff2]177
[d59718e]178 /* Place the stack after the kernel, init and ballocs. */
[d1da1ff2]179 config.stack_base =
180 ALIGN_UP(config.base + config.kernel_size, STACK_SIZE);
[d59718e]181 config.stack_size = STACK_SIZE;
[a35b458]182
[deaa22f]183 /* Avoid placing stack on top of init */
[98000fb]184 size_t i;
[deaa22f]185 for (i = 0; i < init.cnt; i++) {
[d59718e]186 uintptr_t p = init.tasks[i].paddr + init.tasks[i].size;
[d1da1ff2]187 uintptr_t bottom = PA2KA(ALIGN_UP(p, STACK_SIZE));
[d59718e]188
189 if (config.stack_base < bottom)
190 config.stack_base = bottom;
[deaa22f]191 }
[a35b458]192
[61e90dd]193 /* Avoid placing stack on top of boot allocations. */
194 if (ballocs.size) {
[d59718e]195 uintptr_t bottom =
[d1da1ff2]196 ALIGN_UP(ballocs.base + ballocs.size, STACK_SIZE);
[d59718e]197 if (config.stack_base < bottom)
198 config.stack_base = bottom;
[61e90dd]199 }
[a35b458]200
[deaa22f]201 if (config.stack_base < stack_safe)
[d1da1ff2]202 config.stack_base = ALIGN_UP(stack_safe, STACK_SIZE);
[a35b458]203
[be50915]204 context_save(&ctx);
[26aafe8]205 context_set(&ctx, FADDR(main_bsp_separated_stack),
206 config.stack_base, STACK_SIZE);
[be50915]207 context_restore(&ctx);
[f761f1eb]208 /* not reached */
209}
210
[7f0837c]211/** Main kernel routine for bootstrap CPU using new stack.
[673104e]212 *
213 * Second part of main_bsp().
214 *
215 */
[263bda2]216void main_bsp_separated_stack(void)
[fde6429]217{
[7a4202d]218 /* Keep this the first thing. */
[a6e55886]219 current_initialize(CURRENT);
[a35b458]220
[7a4202d]221 version_print();
[a35b458]222
[7e752b2]223 LOG("\nconfig.base=%p config.kernel_size=%zu"
224 "\nconfig.stack_base=%p config.stack_size=%zu",
[1caeb2d]225 (void *) config.base, config.kernel_size,
226 (void *) config.stack_base, config.stack_size);
[a35b458]227
[76fca31]228#ifdef CONFIG_KCONSOLE
[ff3b3197]229 /*
230 * kconsole data structures must be initialized very early
231 * because other subsystems will register their respective
232 * commands.
233 */
[263bda2]234 kconsole_init();
[76fca31]235#endif
[a35b458]236
[ef67bab]237 /*
238 * Exception handler initialization, before architecture
[0132630]239 * starts adding its own handlers
[aace6624]240 */
[263bda2]241 exc_init();
[a35b458]242
[fc1e4f6]243 /*
244 * Memory management subsystems initialization.
[b84aaba]245 */
[36df4109]246 ARCH_OP(pre_mm_init);
[622f409]247 km_identity_init();
[263bda2]248 frame_init();
249 slab_cache_init();
[dabbe28]250 ra_init();
[263bda2]251 sysinfo_init();
252 btree_init();
253 as_init();
254 page_init();
255 tlb_init();
[622f409]256 km_non_identity_init();
[263bda2]257 ddi_init();
[36df4109]258 ARCH_OP(post_mm_init);
[8d308b9]259 reserve_init();
[36df4109]260 ARCH_OP(pre_smp_init);
[263bda2]261 smp_init();
[a35b458]262
[f8ddd17]263 /* Slab must be initialized after we know the number of processors. */
[263bda2]264 slab_enable_cpucache();
[a35b458]265
[933cadf]266 uint64_t size;
267 const char *size_suffix;
268 bin_order_suffix(zones_total_size(), &size, &size_suffix, false);
269 printf("Detected %u CPU(s), %" PRIu64 " %s free memory\n",
270 config.cpu_count, size, size_suffix);
[a35b458]271
[263bda2]272 cpu_init();
273 calibrate_delay_loop();
[36df4109]274 ARCH_OP(post_cpu_init);
[49e6c6b4]275
[2ee1ccc]276 smp_call_init();
[8a64e81e]277 workq_global_init();
[263bda2]278 clock_counter_init();
279 timeout_init();
280 scheduler_init();
[ce732e74]281 caps_init();
[263bda2]282 task_init();
283 thread_init();
284 futex_init();
[3b3faf51]285
286 sysinfo_set_item_data("boot_args", NULL, bargs, str_size(bargs) + 1);
287
[c06eb06]288 if (init.cnt > 0) {
[98000fb]289 size_t i;
[c06eb06]290 for (i = 0; i < init.cnt; i++)
[7e752b2]291 LOG("init[%zu].addr=%p, init[%zu].size=%zu",
[edd7c63c]292 i, (void *) init.tasks[i].paddr, i, init.tasks[i].size);
[c06eb06]293 } else
[ae5aa90]294 printf("No init binaries found.\n");
[a35b458]295
[263bda2]296 ipc_init();
297 event_init();
[6fa9a99d]298 kio_init();
[91db0280]299 log_init();
[263bda2]300 stats_init();
[a35b458]301
[f761f1eb]302 /*
303 * Create kernel task.
304 */
[b84aaba]305 task_t *kernel = task_create(AS_KERNEL, "kernel");
306 if (!kernel)
[f651e80]307 panic("Cannot create kernel task.");
[a35b458]308
[f761f1eb]309 /*
310 * Create the first thread.
311 */
[6eef3c4]312 thread_t *kinit_thread = thread_create(kinit, NULL, kernel,
313 THREAD_FLAG_UNCOUNTED, "kinit");
[b84aaba]314 if (!kinit_thread)
[f651e80]315 panic("Cannot create kinit thread.");
[263bda2]316 thread_ready(kinit_thread);
[a35b458]317
[f761f1eb]318 /*
319 * This call to scheduler() will return to kinit,
320 * starting the thread of kernel threads.
321 */
322 scheduler();
323 /* not reached */
324}
325
[5f85c91]326#ifdef CONFIG_SMP
[263bda2]327
[7f0837c]328/** Main kernel routine for application CPUs.
[673104e]329 *
330 * Executed by application processors, temporary stack
[26678e5]331 * is at ctx.sp which was set during BSP boot.
[5fe5f1e]332 * This function passes control directly to
333 * main_ap_separated_stack().
[673104e]334 *
[22f7769]335 * Assuming interrupts_disable()'d.
[673104e]336 *
[f761f1eb]337 */
338void main_ap(void)
339{
340 /*
341 * Incrementing the active CPU counter will guarantee that the
[26678e5]342 * *_init() functions can find out that they need to
343 * do initialization for AP only.
[f761f1eb]344 */
345 config.cpu_active++;
[a35b458]346
[7ce9284]347 /*
[a6e55886]348 * The CURRENT structure is well defined because ctx.sp is used as stack.
[7ce9284]349 */
[a6e55886]350 current_initialize(CURRENT);
[a35b458]351
[36df4109]352 ARCH_OP(pre_mm_init);
[f761f1eb]353 frame_init();
354 page_init();
[ce031f0]355 tlb_init();
[36df4109]356 ARCH_OP(post_mm_init);
[a35b458]357
[f761f1eb]358 cpu_init();
359 calibrate_delay_loop();
[36df4109]360 ARCH_OP(post_cpu_init);
[a35b458]361
[a6e55886]362 current_copy(CURRENT, (current_t *) CPU->stack);
[a35b458]363
[f761f1eb]364 /*
365 * If we woke kmp up before we left the kernel stack, we could
366 * collide with another CPU coming up. To prevent this, we
367 * switch to this cpu's private stack prior to waking kmp up.
368 */
[b24786a3]369 context_save(&CPU->saved_context);
[f8ddd17]370 context_set(&CPU->saved_context, FADDR(main_ap_separated_stack),
[26aafe8]371 (uintptr_t) CPU->stack, STACK_SIZE);
[be50915]372 context_restore(&CPU->saved_context);
[f761f1eb]373 /* not reached */
374}
375
[7f0837c]376/** Main kernel routine for application CPUs using new stack.
[673104e]377 *
378 * Second part of main_ap().
379 *
380 */
[f761f1eb]381void main_ap_separated_stack(void)
382{
[2ee1ccc]383 smp_call_init();
[a35b458]384
[f761f1eb]385 /*
386 * Configure timeouts for this cpu.
387 */
388 timeout_init();
[a35b458]389
[f761f1eb]390 waitq_wakeup(&ap_completion_wq, WAKEUP_FIRST);
391 scheduler();
392 /* not reached */
393}
[263bda2]394
[5f85c91]395#endif /* CONFIG_SMP */
[b45c443]396
[8e3bf3e2]397/** @}
[b45c443]398 */
Note: See TracBrowser for help on using the repository browser.