Store the frequency and cputimer used to initialize a periodic systimer.
[dragonfly.git] / sys / kern / init_main.c
CommitLineData
984263bc
MD
1/*
2 * Copyright (c) 1995 Terrence R. Lambert
3 * All rights reserved.
4 *
5 * Copyright (c) 1982, 1986, 1989, 1991, 1992, 1993
6 * The Regents of the University of California. All rights reserved.
7 * (c) UNIX System Laboratories, Inc.
8 * All or some portions of this file are derived from material licensed
9 * to the University of California by American Telephone and Telegraph
10 * Co. or Unix System Laboratories, Inc. and are reproduced herein with
11 * the permission of UNIX System Laboratories, Inc.
12 *
13 * Redistribution and use in source and binary forms, with or without
14 * modification, are permitted provided that the following conditions
15 * are met:
16 * 1. Redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer.
18 * 2. Redistributions in binary form must reproduce the above copyright
19 * notice, this list of conditions and the following disclaimer in the
20 * documentation and/or other materials provided with the distribution.
21 * 3. All advertising materials mentioning features or use of this software
22 * must display the following acknowledgement:
23 * This product includes software developed by the University of
24 * California, Berkeley and its contributors.
25 * 4. Neither the name of the University nor the names of its contributors
26 * may be used to endorse or promote products derived from this software
27 * without specific prior written permission.
28 *
29 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
30 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
31 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
32 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
33 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
34 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
35 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
36 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
37 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
38 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
39 * SUCH DAMAGE.
40 *
41 * @(#)init_main.c 8.9 (Berkeley) 1/21/94
42 * $FreeBSD: src/sys/kern/init_main.c,v 1.134.2.8 2003/06/06 20:21:32 tegge Exp $
e3161323 43 * $DragonFly: src/sys/kern/init_main.c,v 1.76 2007/04/29 18:25:34 dillon Exp $
984263bc
MD
44 */
45
46#include "opt_init_path.h"
47
48#include <sys/param.h>
49#include <sys/file.h>
50#include <sys/filedesc.h>
51#include <sys/kernel.h>
52#include <sys/mount.h>
53#include <sys/sysctl.h>
54#include <sys/proc.h>
55#include <sys/resourcevar.h>
56#include <sys/signalvar.h>
57#include <sys/systm.h>
58#include <sys/vnode.h>
59#include <sys/sysent.h>
60#include <sys/reboot.h>
61#include <sys/sysproto.h>
62#include <sys/vmmeter.h>
63#include <sys/unistd.h>
64#include <sys/malloc.h>
dadab5e9 65#include <sys/file2.h>
f8c3996b 66#include <sys/thread2.h>
e3161323 67#include <sys/sysref2.h>
984263bc
MD
68
69#include <machine/cpu.h>
70
71#include <vm/vm.h>
72#include <vm/vm_param.h>
73#include <sys/lock.h>
74#include <vm/pmap.h>
75#include <vm/vm_map.h>
76#include <sys/user.h>
77#include <sys/copyright.h>
78
984263bc
MD
79/* Components of the first process -- never freed. */
80static struct session session0;
81static struct pgrp pgrp0;
b1b4e5a6 82static struct sigacts sigacts0;
0679adc4 83static struct filedesc filedesc0;
984263bc
MD
84static struct plimit limit0;
85static struct vmspace vmspace0;
b7c628e4
MD
86struct proc *initproc;
87struct proc proc0;
08f2f1bb 88struct lwp lwp0;
b7c628e4 89struct thread thread0;
984263bc
MD
90
91int cmask = CMASK;
92extern struct user *proc0paddr;
93extern int fallback_elf_brand;
94
984263bc
MD
95int boothowto = 0; /* initialized so that it can be patched */
96SYSCTL_INT(_debug, OID_AUTO, boothowto, CTLFLAG_RD, &boothowto, 0, "");
97
98/*
99 * This ensures that there is at least one entry so that the sysinit_set
100 * symbol is not undefined. A sybsystem ID of SI_SUB_DUMMY is never
101 * executed.
102 */
103SYSINIT(placeholder, SI_SUB_DUMMY, SI_ORDER_ANY, NULL, NULL)
104
105/*
106 * The sysinit table itself. Items are checked off as the are run.
107 * If we want to register new sysinit types, add them to newsysinit.
108 */
dc62b251
MD
109SET_DECLARE(sysinit_set, struct sysinit);
110struct sysinit **sysinit, **sysinit_end;
111struct sysinit **newsysinit, **newsysinit_end;
112
984263bc
MD
113
114/*
115 * Merge a new sysinit set into the current set, reallocating it if
116 * necessary. This can only be called after malloc is running.
117 */
118void
dc62b251 119sysinit_add(struct sysinit **set, struct sysinit **set_end)
984263bc
MD
120{
121 struct sysinit **newset;
122 struct sysinit **sipp;
123 struct sysinit **xipp;
dc62b251 124 int count;
984263bc 125
dc62b251 126 count = set_end - set;
984263bc 127 if (newsysinit)
dc62b251 128 count += newsysinit_end - newsysinit;
984263bc 129 else
dc62b251 130 count += sysinit_end - sysinit;
efda3bd0 131 newset = kmalloc(count * sizeof(*sipp), M_TEMP, M_WAITOK);
984263bc
MD
132 if (newset == NULL)
133 panic("cannot malloc for sysinit");
134 xipp = newset;
dc62b251
MD
135 if (newsysinit) {
136 for (sipp = newsysinit; sipp < newsysinit_end; sipp++)
984263bc 137 *xipp++ = *sipp;
dc62b251
MD
138 } else {
139 for (sipp = sysinit; sipp < sysinit_end; sipp++)
984263bc 140 *xipp++ = *sipp;
dc62b251
MD
141 }
142 for (sipp = set; sipp < set_end; sipp++)
984263bc 143 *xipp++ = *sipp;
984263bc 144 if (newsysinit)
efda3bd0 145 kfree(newsysinit, M_TEMP);
984263bc 146 newsysinit = newset;
dc62b251 147 newsysinit_end = newset + count;
984263bc
MD
148}
149
6bf59cd2
MD
150/*
151 * Callbacks from machine-dependant startup code (e.g. init386) to set
152 * up low level entities related to cpu #0's globaldata.
153 *
154 * Called from very low level boot code.
155 */
156void
157mi_proc0init(struct globaldata *gd, struct user *proc0paddr)
158{
159 lwkt_init_thread(&thread0, proc0paddr, LWKT_THREAD_STACK, 0, gd);
160 lwkt_set_comm(&thread0, "thread0");
6bf59cd2 161 LIST_INIT(&proc0.p_lwps);
08f2f1bb
SS
162 LIST_INSERT_HEAD(&proc0.p_lwps, &lwp0, lwp_list);
163 lwp0.lwp_thread = &thread0;
164 lwp0.lwp_proc = &proc0;
6bf59cd2 165 proc0.p_usched = usched_init();
08f2f1bb 166 lwp0.lwp_cpumask = 0xFFFFFFFF;
6bf59cd2
MD
167 varsymset_init(&proc0.p_varsymset, NULL);
168 thread0.td_flags |= TDF_RUNNING;
169 thread0.td_proc = &proc0;
08f2f1bb 170 thread0.td_lwp = &lwp0;
6bf59cd2
MD
171 thread0.td_switch = cpu_heavy_switch; /* YYY eventually LWKT */
172}
173
984263bc
MD
174/*
175 * System startup; initialize the world, create process 0, mount root
176 * filesystem, and fork to create init and pagedaemon. Most of the
177 * hard work is done in the lower-level initialization routines including
178 * startup(), which does memory initialization and autoconfiguration.
179 *
180 * This allows simple addition of new kernel subsystems that require
181 * boot time initialization. It also allows substitution of subsystem
182 * (for instance, a scheduler, kernel profiler, or VM system) by object
183 * module. Finally, it allows for optional "kernel threads".
184 */
185void
186mi_startup(void)
187{
8a8d5d85 188 struct sysinit *sip; /* system initialization*/
17a9f566
MD
189 struct sysinit **sipp; /* system initialization*/
190 struct sysinit **xipp; /* interior loop of sort*/
191 struct sysinit *save; /* bubble*/
984263bc 192
dc62b251
MD
193 if (sysinit == NULL) {
194 sysinit = SET_BEGIN(sysinit_set);
195 sysinit_end = SET_LIMIT(sysinit_set);
196 }
197
984263bc
MD
198restart:
199 /*
200 * Perform a bubble sort of the system initialization objects by
201 * their subsystem (primary key) and order (secondary key).
202 */
dc62b251
MD
203 for (sipp = sysinit; sipp < sysinit_end; sipp++) {
204 for (xipp = sipp + 1; xipp < sysinit_end; xipp++) {
984263bc
MD
205 if ((*sipp)->subsystem < (*xipp)->subsystem ||
206 ((*sipp)->subsystem == (*xipp)->subsystem &&
207 (*sipp)->order <= (*xipp)->order))
208 continue; /* skip*/
209 save = *sipp;
210 *sipp = *xipp;
211 *xipp = save;
212 }
213 }
214
215 /*
216 * Traverse the (now) ordered list of system initialization tasks.
217 * Perform each task, and continue on to the next task.
218 *
219 * The last item on the list is expected to be the scheduler,
220 * which will not return.
221 */
dc62b251
MD
222 for (sipp = sysinit; sipp < sysinit_end; sipp++) {
223 sip = *sipp;
8a8d5d85 224 if (sip->subsystem == SI_SUB_DUMMY)
984263bc
MD
225 continue; /* skip dummy task(s)*/
226
8a8d5d85 227 if (sip->subsystem == SI_SUB_DONE)
984263bc
MD
228 continue;
229
230 /* Call function */
8a8d5d85 231 (*(sip->func))(sip->udata);
984263bc
MD
232
233 /* Check off the one we're just done */
8a8d5d85 234 sip->subsystem = SI_SUB_DONE;
984263bc
MD
235
236 /* Check if we've installed more sysinit items via KLD */
237 if (newsysinit != NULL) {
dc62b251 238 if (sysinit != SET_BEGIN(sysinit_set))
efda3bd0 239 kfree(sysinit, M_TEMP);
984263bc 240 sysinit = newsysinit;
dc62b251 241 sysinit_end = newsysinit_end;
984263bc 242 newsysinit = NULL;
dc62b251 243 newsysinit_end = NULL;
984263bc
MD
244 goto restart;
245 }
246 }
247
248 panic("Shouldn't get here!");
249 /* NOTREACHED*/
250}
251
252
253/*
254 ***************************************************************************
255 ****
256 **** The following SYSINIT's belong elsewhere, but have not yet
257 **** been moved.
258 ****
259 ***************************************************************************
260 */
261static void
262print_caddr_t(void *data __unused)
263{
6ea70f76 264 kprintf("%s", (char *)data);
984263bc
MD
265}
266SYSINIT(announce, SI_SUB_COPYRIGHT, SI_ORDER_FIRST, print_caddr_t, copyright)
267
f8c3996b
MD
268/*
269 * Leave the critical section that protected us from spurious interrupts
270 * so device probes work.
271 */
272static void
273leavecrit(void *dummy __unused)
274{
275 crit_exit();
276 KKASSERT(!IN_CRITICAL_SECT(curthread));
277 if (bootverbose)
6ea70f76 278 kprintf("Leaving critical section, allowing interrupts\n");
f8c3996b
MD
279}
280SYSINIT(leavecrit, SI_SUB_LEAVE_CRIT, SI_ORDER_ANY, leavecrit, NULL)
984263bc
MD
281
282/*
283 ***************************************************************************
284 ****
285 **** The two following SYSINT's are proc0 specific glue code. I am not
286 **** convinced that they can not be safely combined, but their order of
287 **** operation has been maintained as the same as the original init_main.c
288 **** for right now.
289 ****
290 **** These probably belong in init_proc.c or kern_proc.c, since they
291 **** deal with proc0 (the fork template process).
292 ****
293 ***************************************************************************
294 */
295/* ARGSUSED*/
296static void
297proc0_init(void *dummy __unused)
298{
0679adc4 299 struct proc *p;
81eea9f4 300 struct lwp *lp;
984263bc
MD
301
302 p = &proc0;
08f2f1bb 303 lp = &lwp0;
984263bc
MD
304
305 /*
306 * Initialize process and pgrp structures.
307 */
308 procinit();
309
984263bc
MD
310 /*
311 * additional VM structures
312 */
313 vm_init2();
314
315 /*
316 * Create process 0 (the swapper).
317 */
318 LIST_INSERT_HEAD(&allproc, p, p_list);
319 p->p_pgrp = &pgrp0;
320 LIST_INSERT_HEAD(PGRPHASH(0), &pgrp0, pg_hash);
321 LIST_INIT(&pgrp0.pg_members);
322 LIST_INSERT_HEAD(&pgrp0.pg_members, p, p_pglist);
323
324 pgrp0.pg_session = &session0;
325 session0.s_count = 1;
326 session0.s_leader = p;
327
328 p->p_sysent = &aout_sysvec;
329
344ad853 330 p->p_flag = P_SYSTEM;
164b8401
SS
331 p->p_stat = SACTIVE;
332 lp->lwp_stat = LSRUN;
984263bc
MD
333 p->p_nice = NZERO;
334 p->p_rtprio.type = RTP_PRIO_NORMAL;
335 p->p_rtprio.prio = 0;
08f2f1bb 336 lp->lwp_rtprio = p->p_rtprio;
984263bc
MD
337
338 p->p_peers = 0;
339 p->p_leader = p;
340
341 bcopy("swapper", p->p_comm, sizeof ("swapper"));
81eea9f4 342 bcopy("swapper", thread0.td_comm, sizeof ("swapper"));
984263bc
MD
343
344 /* Create credentials. */
984263bc 345 p->p_ucred = crget();
41c20dac 346 p->p_ucred->cr_ruidinfo = uifind(0);
984263bc
MD
347 p->p_ucred->cr_ngroups = 1; /* group 0 */
348 p->p_ucred->cr_uidinfo = uifind(0);
349
350 /* Don't jail it */
41c20dac 351 p->p_ucred->cr_prison = NULL;
984263bc 352
b1b4e5a6
SS
353 /* Create sigacts. */
354 p->p_sigacts = &sigacts0;
355 p->p_sigacts->ps_refcnt = 1;
984263bc
MD
356
357 /* Initialize signal state for process 0. */
c0b8a06d 358 siginit(p);
984263bc
MD
359
360 /* Create the file descriptor table. */
228b401d 361 fdinit_bootstrap(p, &filedesc0, cmask);
984263bc
MD
362
363 /* Create the limits structures. */
c0b8a06d 364 plimit_init0(&limit0);
984263bc 365 p->p_limit = &limit0;
984263bc
MD
366
367 /* Allocate a prototype map so we have something to fork. */
368 pmap_pinit0(vmspace_pmap(&vmspace0));
369 p->p_vmspace = &vmspace0;
e3161323 370 sysref_init(&vmspace0.vm_sysref, &vmspace_sysref_class);
e4846942
MD
371 vm_map_init(&vmspace0.vm_map,
372 round_page(VM_MIN_USER_ADDRESS),
373 trunc_page(VM_MAX_USER_ADDRESS),
374 vmspace_pmap(&vmspace0));
e3161323 375 sysref_activate(&vmspace0.vm_sysref);
984263bc 376
984263bc
MD
377 /*
378 * Charge root for one process.
379 */
41c20dac 380 (void)chgproccnt(p->p_ucred->cr_uidinfo, 1, 0);
984263bc 381
984263bc
MD
382}
383SYSINIT(p0init, SI_SUB_INTRINSIC, SI_ORDER_FIRST, proc0_init, NULL)
384
8fa76237
MD
385static int proc0_post_callback(struct proc *p, void *data __unused);
386
984263bc
MD
387/* ARGSUSED*/
388static void
389proc0_post(void *dummy __unused)
390{
391 struct timespec ts;
984263bc
MD
392
393 /*
394 * Now we can look at the time, having had a chance to verify the
395 * time from the file system. Pretend that proc0 started now.
396 */
8fa76237 397 allproc_scan(proc0_post_callback, NULL);
984263bc
MD
398
399 /*
400 * Give the ``random'' number generator a thump.
401 * XXX: Does read_random() contain enough bits to be used here ?
402 */
403 nanotime(&ts);
cddfb7bb 404 skrandom(ts.tv_sec ^ ts.tv_nsec);
984263bc 405}
8fa76237
MD
406
407static int
408proc0_post_callback(struct proc *p, void *data __unused)
409{
410 microtime(&p->p_start);
411 return(0);
412}
413
984263bc
MD
414SYSINIT(p0post, SI_SUB_INTRINSIC_POST, SI_ORDER_FIRST, proc0_post, NULL)
415
416/*
417 ***************************************************************************
418 ****
419 **** The following SYSINIT's and glue code should be moved to the
420 **** respective files on a per subsystem basis.
421 ****
422 ***************************************************************************
423 */
424
425
426/*
427 ***************************************************************************
428 ****
429 **** The following code probably belongs in another file, like
430 **** kern/init_init.c.
431 ****
432 ***************************************************************************
433 */
434
435/*
436 * List of paths to try when searching for "init".
437 */
438static char init_path[MAXPATHLEN] =
439#ifdef INIT_PATH
440 __XSTRING(INIT_PATH);
441#else
442 "/sbin/init:/sbin/oinit:/sbin/init.bak:/stand/sysinstall";
443#endif
444SYSCTL_STRING(_kern, OID_AUTO, init_path, CTLFLAG_RD, init_path, 0, "");
445
446/*
447 * Start the initial user process; try exec'ing each pathname in init_path.
448 * The program is invoked with one argument containing the boot flags.
8a8d5d85
MD
449 *
450 * The MP lock is held on entry.
984263bc
MD
451 */
452static void
91bd9c1e 453start_init(void *dummy, struct trapframe *frame)
984263bc
MD
454{
455 vm_offset_t addr;
456 struct execve_args args;
457 int options, error;
458 char *var, *path, *next, *s;
459 char *ucp, **uap, *arg0, *arg1;
460 struct proc *p;
553ea3c8 461 struct lwp *lp;
21739618
MD
462 struct mount *mp;
463 struct vnode *vp;
984263bc
MD
464
465 p = curproc;
466
08f2f1bb 467 lp = ONLY_LWP_IN_PROC(p);
553ea3c8 468
984263bc 469 /* Get the vnode for '/'. Set p->p_fd->fd_cdir to reference it. */
861905fb 470 mp = mountlist_boot_getfirst();
21739618 471 if (VFS_ROOT(mp, &vp))
984263bc 472 panic("cannot find root vnode");
28623bf9
MD
473 if (mp->mnt_ncmountpt.ncp == NULL) {
474 cache_allocroot(&mp->mnt_ncmountpt, mp, vp);
475 cache_unlock(&mp->mnt_ncmountpt); /* leave ref intact */
8c361dda 476 }
21739618 477 p->p_fd->fd_cdir = vp;
597aea93 478 vref(p->p_fd->fd_cdir);
21739618 479 p->p_fd->fd_rdir = vp;
597aea93 480 vref(p->p_fd->fd_rdir);
28623bf9 481 vfs_cache_setroot(vp, cache_hold(&mp->mnt_ncmountpt));
a11aaa81 482 vn_unlock(vp); /* leave ref intact */
28623bf9
MD
483 cache_copy(&mp->mnt_ncmountpt, &p->p_fd->fd_ncdir);
484 cache_copy(&mp->mnt_ncmountpt, &p->p_fd->fd_nrdir);
984263bc
MD
485
486 /*
487 * Need just enough stack to hold the faked-up "execve()" arguments.
488 */
489 addr = trunc_page(USRSTACK - PAGE_SIZE);
1b874851
MD
490 error = vm_map_find(&p->p_vmspace->vm_map, NULL, 0, &addr, PAGE_SIZE,
491 FALSE,
492 VM_MAPTYPE_NORMAL,
493 VM_PROT_ALL, VM_PROT_ALL,
494 0);
495 if (error)
984263bc
MD
496 panic("init: couldn't allocate argument space");
497 p->p_vmspace->vm_maxsaddr = (caddr_t)addr;
498 p->p_vmspace->vm_ssize = 1;
499
bc01a404 500 if ((var = kgetenv("init_path")) != NULL) {
984263bc
MD
501 strncpy(init_path, var, sizeof init_path);
502 init_path[sizeof init_path - 1] = 0;
503 }
bc01a404 504 if ((var = kgetenv("kern.fallback_elf_brand")) != NULL)
984263bc
MD
505 fallback_elf_brand = strtol(var, NULL, 0);
506
507 for (path = init_path; *path != '\0'; path = next) {
508 while (*path == ':')
509 path++;
510 if (*path == '\0')
511 break;
512 for (next = path; *next != '\0' && *next != ':'; next++)
513 /* nothing */ ;
514 if (bootverbose)
6ea70f76 515 kprintf("start_init: trying %.*s\n", (int)(next - path),
984263bc
MD
516 path);
517
518 /*
519 * Move out the boot flag argument.
520 */
521 options = 0;
522 ucp = (char *)USRSTACK;
523 (void)subyte(--ucp, 0); /* trailing zero */
524 if (boothowto & RB_SINGLE) {
525 (void)subyte(--ucp, 's');
526 options = 1;
527 }
528#ifdef notyet
529 if (boothowto & RB_FASTBOOT) {
530 (void)subyte(--ucp, 'f');
531 options = 1;
532 }
533#endif
534
535#ifdef BOOTCDROM
536 (void)subyte(--ucp, 'C');
537 options = 1;
538#endif
539 if (options == 0)
540 (void)subyte(--ucp, '-');
541 (void)subyte(--ucp, '-'); /* leading hyphen */
542 arg1 = ucp;
543
544 /*
545 * Move out the file name (also arg 0).
546 */
547 (void)subyte(--ucp, 0);
548 for (s = next - 1; s >= path; s--)
549 (void)subyte(--ucp, *s);
550 arg0 = ucp;
551
552 /*
553 * Move out the arg pointers.
554 */
555 uap = (char **)((intptr_t)ucp & ~(sizeof(intptr_t)-1));
556 (void)suword((caddr_t)--uap, (long)0); /* terminator */
557 (void)suword((caddr_t)--uap, (long)(intptr_t)arg1);
558 (void)suword((caddr_t)--uap, (long)(intptr_t)arg0);
559
560 /*
561 * Point at the arguments.
562 */
563 args.fname = arg0;
564 args.argv = uap;
565 args.envv = NULL;
566
567 /*
568 * Now try to exec the program. If can't for any reason
569 * other than it doesn't exist, complain.
570 *
571 * Otherwise, return via fork_trampoline() all the way
572 * to user mode as init!
a2a5ad0d
MD
573 *
574 * WARNING! We may have been moved to another cpu after
0a3f9b47
MD
575 * acquiring the current user process designation. The
576 * MP lock will migrate with us though so we still have to
577 * release it.
984263bc 578 */
753fd850 579 if ((error = sys_execve(&args)) == 0) {
8a8d5d85 580 rel_mplock();
52eedfb5 581 lp->lwp_proc->p_usched->acquire_curproc(lp);
984263bc 582 return;
8a8d5d85 583 }
984263bc 584 if (error != ENOENT)
6ea70f76 585 kprintf("exec %.*s: error %d\n", (int)(next - path),
984263bc
MD
586 path, error);
587 }
6ea70f76 588 kprintf("init: not found in path %s\n", init_path);
984263bc
MD
589 panic("no init");
590}
591
592/*
593 * Like kthread_create(), but runs in it's own address space.
594 * We do this early to reserve pid 1.
595 *
596 * Note special case - do not make it runnable yet. Other work
597 * in progress will change this more.
598 */
599static void
600create_init(const void *udata __unused)
601{
602 int error;
bb3cd951 603 struct lwp *lp;
984263bc 604
e43a034f 605 crit_enter();
08f2f1bb 606 error = fork1(&lwp0, RFFDG | RFPROC, &initproc);
984263bc 607 if (error)
fc92d4aa 608 panic("cannot fork init: %d", error);
344ad853 609 initproc->p_flag |= P_SYSTEM;
08f2f1bb 610 lp = ONLY_LWP_IN_PROC(initproc);
bb3cd951 611 cpu_set_fork_handler(lp, start_init, NULL);
e43a034f 612 crit_exit();
984263bc
MD
613}
614SYSINIT(init,SI_SUB_CREATE_INIT, SI_ORDER_FIRST, create_init, NULL)
615
616/*
617 * Make it runnable now.
618 */
619static void
620kick_init(const void *udata __unused)
621{
08f2f1bb 622 start_forked_proc(&lwp0, initproc);
984263bc
MD
623}
624SYSINIT(kickinit,SI_SUB_KTHREAD_INIT, SI_ORDER_FIRST, kick_init, NULL)
8ad65e08
MD
625
626/*
627 * Machine independant globaldata initialization
73e4f7b9
MD
628 *
629 * WARNING! Called from early boot, 'mycpu' may not work yet.
8ad65e08
MD
630 */
631void
d0e06f83 632mi_gdinit(struct globaldata *gd, int cpuid)
8ad65e08 633{
85100692 634 TAILQ_INIT(&gd->gd_tdfreeq); /* for pmap_{new,dispose}_thread() */
88c4d2f6 635 TAILQ_INIT(&gd->gd_systimerq);
e3161323 636 gd->gd_sysid_alloc = cpuid; /* prime low bits for cpu lookup */
d0e06f83 637 gd->gd_cpuid = cpuid;
fda1ad89 638 gd->gd_cpumask = (cpumask_t)1 << cpuid;
8ad65e08 639 lwkt_gdinit(gd);
41a01a4d 640 vm_map_entry_reserve_cpu_init(gd);
fc17ad60 641 sleep_gdinit(gd);
8ad65e08
MD
642}
643