source: mainline/kernel/generic/src/main/main.c@ 5d67baa

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since 5d67baa was 5d67baa, checked in by Jakub Jermar <jakub@…>, 17 years ago

cstyle fixes

  • Property mode set to 100644
File size: 9.2 KB
RevLine 
[f761f1eb]1/*
[df4ed85]2 * Copyright (c) 2001-2004 Jakub Jermar
[f761f1eb]3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
[8e3bf3e2]29/** @addtogroup main
[b45c443]30 * @{
31 */
32
[9179d0a]33/**
[b45c443]34 * @file
[9179d0a]35 * @brief Main initialization kernel function for all processors.
36 *
37 * During kernel boot, all processors, after architecture dependent
38 * initialization, start executing code found in this file. After
39 * bringing up all subsystems, control is passed to scheduler().
40 *
41 * The bootstrap processor starts executing main_bsp() while
42 * the application processors start executing main_ap().
43 *
44 * @see scheduler()
45 * @see main_bsp()
46 * @see main_ap()
47 */
48
[f761f1eb]49#include <arch/asm.h>
[d5d2a3f]50#include <context.h>
[f761f1eb]51#include <print.h>
[02a99d2]52#include <panic.h>
[940cac0]53#include <debug.h>
[f761f1eb]54#include <config.h>
55#include <time/clock.h>
[b3f8fb7]56#include <time/timeout.h>
[f761f1eb]57#include <proc/scheduler.h>
58#include <proc/thread.h>
59#include <proc/task.h>
[56976a17]60#include <proc/tasklet.h>
[f761f1eb]61#include <main/kinit.h>
[5fe5f1e]62#include <main/version.h>
[f4338d2]63#include <console/kconsole.h>
[5d67baa]64#include <console/console.h>
[f761f1eb]65#include <cpu.h>
[e0cdb7b6]66#include <align.h>
[aace6624]67#include <interrupt.h>
[f761f1eb]68#include <mm/frame.h>
69#include <mm/page.h>
[6d7ffa65]70#include <genarch/mm/page_pt.h>
[169587a]71#include <mm/tlb.h>
[20d50a1]72#include <mm/as.h>
[4e147a6]73#include <mm/slab.h>
[f761f1eb]74#include <synch/waitq.h>
[9aa72b4]75#include <synch/futex.h>
[393f631]76#include <arch/arch.h>
[f761f1eb]77#include <arch.h>
[f2ffad4]78#include <arch/faddr.h>
[6d9c49a]79#include <ipc/ipc.h>
[93165be]80#include <macros.h>
[2810636]81#include <adt/btree.h>
[5fe5f1e]82#include <smp/smp.h>
[f8ddd17]83#include <ddi/ddi.h>
[5d67baa]84
[5fe5f1e]85
[e459f12]86/** Global configuration structure. */
[cc73a8a1]87config_t config;
[e459f12]88
89/** Initial user-space tasks */
90init_t init = {
[6c441cf8]91 .cnt = 0
[e459f12]92};
[5fe5f1e]93
[61e90dd]94/** Boot allocations. */
95ballocs_t ballocs = {
96 .base = NULL,
97 .size = 0
98};
99
[f761f1eb]100context_t ctx;
101
[cc73a8a1]102/*
[880de6e]103 * These 'hardcoded' variables will be intialized by
[dcbc8be]104 * the linker or the low level assembler code with
105 * appropriate sizes and addresses.
[f761f1eb]106 */
[56976a17]107
108/**< Virtual address of where the kernel is loaded. */
109uintptr_t hardcoded_load_address = 0;
110/**< Size of the kernel code in bytes. */
111size_t hardcoded_ktext_size = 0;
112/**< Size of the kernel data in bytes. */
113size_t hardcoded_kdata_size = 0;
114/**< Lowest safe stack virtual address. */
115uintptr_t stack_safe = 0;
[deaa22f]116
[f761f1eb]117void main_bsp(void);
118void main_ap(void);
119
120/*
121 * These two functions prevent stack from underflowing during the
122 * kernel boot phase when SP is set to the very top of the reserved
123 * space. The stack could get corrupted by a fooled compiler-generated
124 * pop sequence otherwise.
125 */
126static void main_bsp_separated_stack(void);
[80d2bdb]127#ifdef CONFIG_SMP
[f761f1eb]128static void main_ap_separated_stack(void);
[80d2bdb]129#endif
[f761f1eb]130
[771cd22]131#define CONFIG_STACK_SIZE ((1 << STACK_FRAMES) * STACK_SIZE)
[b6d4566]132
[7f0837c]133/** Main kernel routine for bootstrap CPU.
[673104e]134 *
[7a4202d]135 * The code here still runs on the boot stack, which knows nothing about
136 * preemption counts. Because of that, this function cannot directly call
137 * functions that disable or enable preemption (e.g. spinlock_lock()). The
138 * primary task of this function is to calculate address of a new stack and
139 * switch to it.
[673104e]140 *
[22f7769]141 * Assuming interrupts_disable().
[673104e]142 *
[f761f1eb]143 */
144void main_bsp(void)
145{
146 config.cpu_count = 1;
147 config.cpu_active = 1;
[d6e8529]148
[aed4eca]149 config.base = hardcoded_load_address;
[f8ddd17]150 config.kernel_size = ALIGN_UP(hardcoded_ktext_size +
[6f4495f5]151 hardcoded_kdata_size, PAGE_SIZE);
[deaa22f]152 config.stack_size = CONFIG_STACK_SIZE;
153
154 /* Initialy the stack is placed just after the kernel */
155 config.stack_base = config.base + config.kernel_size;
[b6b576c]156
[deaa22f]157 /* Avoid placing stack on top of init */
[b6b576c]158 count_t i;
[deaa22f]159 for (i = 0; i < init.cnt; i++) {
[f8ddd17]160 if (PA_overlaps(config.stack_base, config.stack_size,
[6f4495f5]161 init.tasks[i].addr, init.tasks[i].size))
[f8ddd17]162 config.stack_base = ALIGN_UP(init.tasks[i].addr +
[6f4495f5]163 init.tasks[i].size, config.stack_size);
[deaa22f]164 }
[61e90dd]165
166 /* Avoid placing stack on top of boot allocations. */
167 if (ballocs.size) {
[f8ddd17]168 if (PA_overlaps(config.stack_base, config.stack_size,
[6f4495f5]169 ballocs.base, ballocs.size))
[f8ddd17]170 config.stack_base = ALIGN_UP(ballocs.base +
[6f4495f5]171 ballocs.size, PAGE_SIZE);
[61e90dd]172 }
[b6b576c]173
[deaa22f]174 if (config.stack_base < stack_safe)
175 config.stack_base = ALIGN_UP(stack_safe, PAGE_SIZE);
[393f631]176
[be50915]177 context_save(&ctx);
[f8ddd17]178 context_set(&ctx, FADDR(main_bsp_separated_stack), config.stack_base,
[6f4495f5]179 THREAD_STACK_SIZE);
[be50915]180 context_restore(&ctx);
[f761f1eb]181 /* not reached */
182}
183
[673104e]184
[7f0837c]185/** Main kernel routine for bootstrap CPU using new stack.
[673104e]186 *
187 * Second part of main_bsp().
188 *
189 */
[fde6429]190void main_bsp_separated_stack(void)
191{
[7a4202d]192 /* Keep this the first thing. */
193 the_initialize(THE);
194
[b84aaba]195 LOG();
[8f91729]196
[7a4202d]197 version_print();
198
199 LOG("\nconfig.base=%#" PRIp " config.kernel_size=%" PRIs
200 "\nconfig.stack_base=%#" PRIp " config.stack_size=%" PRIs,
201 config.base, config.kernel_size, config.stack_base,
202 config.stack_size);
203
[9aa72b4]204
[ff3b3197]205 /*
206 * kconsole data structures must be initialized very early
207 * because other subsystems will register their respective
208 * commands.
209 */
[b84aaba]210 LOG_EXEC(kconsole_init());
[b6b576c]211
[ef67bab]212 /*
213 * Exception handler initialization, before architecture
[0132630]214 * starts adding its own handlers
[aace6624]215 */
[b84aaba]216 LOG_EXEC(exc_init());
[fc1e4f6]217
218 /*
219 * Memory management subsystems initialization.
[b84aaba]220 */
221 LOG_EXEC(arch_pre_mm_init());
222 LOG_EXEC(frame_init());
[71eef11]223
[b84aaba]224 /* Initialize at least 1 memory segment big enough for slab to work. */
225 LOG_EXEC(slab_cache_init());
226 LOG_EXEC(btree_init());
227 LOG_EXEC(as_init());
228 LOG_EXEC(page_init());
229 LOG_EXEC(tlb_init());
230 LOG_EXEC(ddi_init());
231 LOG_EXEC(tasklet_init());
232 LOG_EXEC(arch_post_mm_init());
233 LOG_EXEC(arch_pre_smp_init());
234 LOG_EXEC(smp_init());
[71eef11]235
[f8ddd17]236 /* Slab must be initialized after we know the number of processors. */
[b84aaba]237 LOG_EXEC(slab_enable_cpucache());
[71eef11]238
[5d67baa]239 printf("Detected %" PRIc " CPU(s), %" PRIu64" MiB free memory\n",
240 config.cpu_count, SIZE2MB(zone_total_size()));
[6f8a426]241
[b84aaba]242 LOG_EXEC(cpu_init());
243
244 LOG_EXEC(calibrate_delay_loop());
245 LOG_EXEC(clock_counter_init());
246 LOG_EXEC(timeout_init());
247 LOG_EXEC(scheduler_init());
248 LOG_EXEC(task_init());
249 LOG_EXEC(thread_init());
250 LOG_EXEC(futex_init());
[6c68b97]251
[c06eb06]252 if (init.cnt > 0) {
[b84aaba]253 count_t i;
[c06eb06]254 for (i = 0; i < init.cnt; i++)
[7a4202d]255 printf("init[%" PRIc "].addr=%#" PRIp ", init[%" PRIc
[5d67baa]256 "].size=%#" PRIs "\n", i, init.tasks[i].addr, i,
257 init.tasks[i].size);
[c06eb06]258 } else
[228b135]259 printf("No init binaries found\n");
[6d9c49a]260
[b84aaba]261 LOG_EXEC(ipc_init());
[82b71ef1]262 LOG_EXEC(klog_init());
[9aa72b4]263
[f761f1eb]264 /*
265 * Create kernel task.
266 */
[b84aaba]267 task_t *kernel = task_create(AS_KERNEL, "kernel");
268 if (!kernel)
269 panic("Can't create kernel task\n");
[6f8a426]270
[f761f1eb]271 /*
272 * Create the first thread.
273 */
[7a4202d]274 thread_t *kinit_thread = thread_create(kinit, NULL, kernel, 0, "kinit",
275 true);
[b84aaba]276 if (!kinit_thread)
277 panic("Can't create kinit thread\n");
278 LOG_EXEC(thread_ready(kinit_thread));
[6f8a426]279
[f761f1eb]280 /*
281 * This call to scheduler() will return to kinit,
282 * starting the thread of kernel threads.
283 */
284 scheduler();
285 /* not reached */
286}
287
[673104e]288
[5f85c91]289#ifdef CONFIG_SMP
[7f0837c]290/** Main kernel routine for application CPUs.
[673104e]291 *
292 * Executed by application processors, temporary stack
[26678e5]293 * is at ctx.sp which was set during BSP boot.
[5fe5f1e]294 * This function passes control directly to
295 * main_ap_separated_stack().
[673104e]296 *
[22f7769]297 * Assuming interrupts_disable()'d.
[673104e]298 *
[f761f1eb]299 */
300void main_ap(void)
301{
302 /*
303 * Incrementing the active CPU counter will guarantee that the
[26678e5]304 * *_init() functions can find out that they need to
305 * do initialization for AP only.
[f761f1eb]306 */
307 config.cpu_active++;
308
[7ce9284]309 /*
310 * The THE structure is well defined because ctx.sp is used as stack.
311 */
312 the_initialize(THE);
[c0b45fa]313
[f07bba5]314 arch_pre_mm_init();
[f761f1eb]315 frame_init();
316 page_init();
[ce031f0]317 tlb_init();
[f07bba5]318 arch_post_mm_init();
[c0b45fa]319
[f761f1eb]320 cpu_init();
321 calibrate_delay_loop();
[26678e5]322 arch_post_cpu_init();
[f761f1eb]323
[7ce9284]324 the_copy(THE, (the_t *) CPU->stack);
[f761f1eb]325
326 /*
327 * If we woke kmp up before we left the kernel stack, we could
328 * collide with another CPU coming up. To prevent this, we
329 * switch to this cpu's private stack prior to waking kmp up.
330 */
[f8ddd17]331 context_set(&CPU->saved_context, FADDR(main_ap_separated_stack),
[6f4495f5]332 (uintptr_t) CPU->stack, CPU_STACK_SIZE);
[be50915]333 context_restore(&CPU->saved_context);
[f761f1eb]334 /* not reached */
335}
336
[673104e]337
[7f0837c]338/** Main kernel routine for application CPUs using new stack.
[673104e]339 *
340 * Second part of main_ap().
341 *
342 */
[f761f1eb]343void main_ap_separated_stack(void)
344{
345 /*
346 * Configure timeouts for this cpu.
347 */
348 timeout_init();
349
350 waitq_wakeup(&ap_completion_wq, WAKEUP_FIRST);
351 scheduler();
352 /* not reached */
353}
[5f85c91]354#endif /* CONFIG_SMP */
[b45c443]355
[8e3bf3e2]356/** @}
[b45c443]357 */
Note: See TracBrowser for help on using the repository browser.