Clear the direction flag (CLD) on entry to the kernel, to support future
[dragonfly.git] / sys / kern / init_main.c
CommitLineData
984263bc
MD
1/*
2 * Copyright (c) 1995 Terrence R. Lambert
3 * All rights reserved.
4 *
5 * Copyright (c) 1982, 1986, 1989, 1991, 1992, 1993
6 * The Regents of the University of California. All rights reserved.
7 * (c) UNIX System Laboratories, Inc.
8 * All or some portions of this file are derived from material licensed
9 * to the University of California by American Telephone and Telegraph
10 * Co. or Unix System Laboratories, Inc. and are reproduced herein with
11 * the permission of UNIX System Laboratories, Inc.
12 *
13 * Redistribution and use in source and binary forms, with or without
14 * modification, are permitted provided that the following conditions
15 * are met:
16 * 1. Redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer.
18 * 2. Redistributions in binary form must reproduce the above copyright
19 * notice, this list of conditions and the following disclaimer in the
20 * documentation and/or other materials provided with the distribution.
21 * 3. All advertising materials mentioning features or use of this software
22 * must display the following acknowledgement:
23 * This product includes software developed by the University of
24 * California, Berkeley and its contributors.
25 * 4. Neither the name of the University nor the names of its contributors
26 * may be used to endorse or promote products derived from this software
27 * without specific prior written permission.
28 *
29 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
30 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
31 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
32 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
33 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
34 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
35 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
36 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
37 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
38 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
39 * SUCH DAMAGE.
40 *
41 * @(#)init_main.c 8.9 (Berkeley) 1/21/94
42 * $FreeBSD: src/sys/kern/init_main.c,v 1.134.2.8 2003/06/06 20:21:32 tegge Exp $
978400d3 43 * $DragonFly: src/sys/kern/init_main.c,v 1.84 2008/01/06 16:55:51 swildner Exp $
984263bc
MD
44 */
45
46#include "opt_init_path.h"
47
48#include <sys/param.h>
49#include <sys/file.h>
50#include <sys/filedesc.h>
51#include <sys/kernel.h>
52#include <sys/mount.h>
53#include <sys/sysctl.h>
54#include <sys/proc.h>
55#include <sys/resourcevar.h>
56#include <sys/signalvar.h>
57#include <sys/systm.h>
58#include <sys/vnode.h>
59#include <sys/sysent.h>
60#include <sys/reboot.h>
61#include <sys/sysproto.h>
62#include <sys/vmmeter.h>
63#include <sys/unistd.h>
64#include <sys/malloc.h>
0b692e79 65#include <sys/machintr.h>
dadab5e9 66#include <sys/file2.h>
f8c3996b 67#include <sys/thread2.h>
e3161323 68#include <sys/sysref2.h>
984263bc
MD
69
70#include <machine/cpu.h>
71
72#include <vm/vm.h>
73#include <vm/vm_param.h>
74#include <sys/lock.h>
75#include <vm/pmap.h>
76#include <vm/vm_map.h>
ba39e2e0 77#include <vm/vm_extern.h>
984263bc
MD
78#include <sys/user.h>
79#include <sys/copyright.h>
80
984263bc
MD
81/* Components of the first process -- never freed. */
82static struct session session0;
83static struct pgrp pgrp0;
b1b4e5a6 84static struct sigacts sigacts0;
0679adc4 85static struct filedesc filedesc0;
984263bc
MD
86static struct plimit limit0;
87static struct vmspace vmspace0;
b7c628e4
MD
88struct proc *initproc;
89struct proc proc0;
08f2f1bb 90struct lwp lwp0;
b7c628e4 91struct thread thread0;
984263bc
MD
92
93int cmask = CMASK;
94extern struct user *proc0paddr;
95extern int fallback_elf_brand;
96
984263bc
MD
97int boothowto = 0; /* initialized so that it can be patched */
98SYSCTL_INT(_debug, OID_AUTO, boothowto, CTLFLAG_RD, &boothowto, 0, "");
99
100/*
101 * This ensures that there is at least one entry so that the sysinit_set
ba39e2e0 102 * symbol is not undefined. A sybsystem ID of SI_SPECIAL_DUMMY is never
984263bc
MD
103 * executed.
104 */
ba39e2e0 105SYSINIT(placeholder, SI_SPECIAL_DUMMY, SI_ORDER_ANY, NULL, NULL)
984263bc
MD
106
107/*
108 * The sysinit table itself. Items are checked off as the are run.
109 * If we want to register new sysinit types, add them to newsysinit.
110 */
dc62b251
MD
111SET_DECLARE(sysinit_set, struct sysinit);
112struct sysinit **sysinit, **sysinit_end;
113struct sysinit **newsysinit, **newsysinit_end;
114
984263bc
MD
115
116/*
117 * Merge a new sysinit set into the current set, reallocating it if
118 * necessary. This can only be called after malloc is running.
119 */
120void
dc62b251 121sysinit_add(struct sysinit **set, struct sysinit **set_end)
984263bc
MD
122{
123 struct sysinit **newset;
124 struct sysinit **sipp;
125 struct sysinit **xipp;
dc62b251 126 int count;
984263bc 127
dc62b251 128 count = set_end - set;
984263bc 129 if (newsysinit)
dc62b251 130 count += newsysinit_end - newsysinit;
984263bc 131 else
dc62b251 132 count += sysinit_end - sysinit;
efda3bd0 133 newset = kmalloc(count * sizeof(*sipp), M_TEMP, M_WAITOK);
984263bc 134 xipp = newset;
dc62b251
MD
135 if (newsysinit) {
136 for (sipp = newsysinit; sipp < newsysinit_end; sipp++)
984263bc 137 *xipp++ = *sipp;
dc62b251
MD
138 } else {
139 for (sipp = sysinit; sipp < sysinit_end; sipp++)
984263bc 140 *xipp++ = *sipp;
dc62b251
MD
141 }
142 for (sipp = set; sipp < set_end; sipp++)
984263bc 143 *xipp++ = *sipp;
984263bc 144 if (newsysinit)
efda3bd0 145 kfree(newsysinit, M_TEMP);
984263bc 146 newsysinit = newset;
dc62b251 147 newsysinit_end = newset + count;
984263bc
MD
148}
149
6bf59cd2
MD
150/*
151 * Callbacks from machine-dependant startup code (e.g. init386) to set
152 * up low level entities related to cpu #0's globaldata.
153 *
154 * Called from very low level boot code.
155 */
156void
157mi_proc0init(struct globaldata *gd, struct user *proc0paddr)
158{
159 lwkt_init_thread(&thread0, proc0paddr, LWKT_THREAD_STACK, 0, gd);
160 lwkt_set_comm(&thread0, "thread0");
3e291793
MD
161 RB_INIT(&proc0.p_lwp_tree);
162 proc0.p_lasttid = 0; /* +1 = next TID */
163 lwp_rb_tree_RB_INSERT(&proc0.p_lwp_tree, &lwp0);
08f2f1bb
SS
164 lwp0.lwp_thread = &thread0;
165 lwp0.lwp_proc = &proc0;
6bf59cd2 166 proc0.p_usched = usched_init();
08f2f1bb 167 lwp0.lwp_cpumask = 0xFFFFFFFF;
6bf59cd2
MD
168 varsymset_init(&proc0.p_varsymset, NULL);
169 thread0.td_flags |= TDF_RUNNING;
170 thread0.td_proc = &proc0;
08f2f1bb 171 thread0.td_lwp = &lwp0;
6bf59cd2 172 thread0.td_switch = cpu_heavy_switch; /* YYY eventually LWKT */
6b7dca13 173 lwkt_schedule_self(curthread);
6bf59cd2
MD
174}
175
984263bc
MD
176/*
177 * System startup; initialize the world, create process 0, mount root
178 * filesystem, and fork to create init and pagedaemon. Most of the
179 * hard work is done in the lower-level initialization routines including
180 * startup(), which does memory initialization and autoconfiguration.
181 *
182 * This allows simple addition of new kernel subsystems that require
183 * boot time initialization. It also allows substitution of subsystem
184 * (for instance, a scheduler, kernel profiler, or VM system) by object
185 * module. Finally, it allows for optional "kernel threads".
186 */
187void
188mi_startup(void)
189{
8a8d5d85 190 struct sysinit *sip; /* system initialization*/
17a9f566
MD
191 struct sysinit **sipp; /* system initialization*/
192 struct sysinit **xipp; /* interior loop of sort*/
193 struct sysinit *save; /* bubble*/
984263bc 194
dc62b251
MD
195 if (sysinit == NULL) {
196 sysinit = SET_BEGIN(sysinit_set);
197 sysinit_end = SET_LIMIT(sysinit_set);
198 }
199
984263bc
MD
200restart:
201 /*
202 * Perform a bubble sort of the system initialization objects by
203 * their subsystem (primary key) and order (secondary key).
204 */
dc62b251
MD
205 for (sipp = sysinit; sipp < sysinit_end; sipp++) {
206 for (xipp = sipp + 1; xipp < sysinit_end; xipp++) {
984263bc
MD
207 if ((*sipp)->subsystem < (*xipp)->subsystem ||
208 ((*sipp)->subsystem == (*xipp)->subsystem &&
209 (*sipp)->order <= (*xipp)->order))
210 continue; /* skip*/
211 save = *sipp;
212 *sipp = *xipp;
213 *xipp = save;
214 }
215 }
216
217 /*
218 * Traverse the (now) ordered list of system initialization tasks.
219 * Perform each task, and continue on to the next task.
220 *
221 * The last item on the list is expected to be the scheduler,
222 * which will not return.
223 */
dc62b251
MD
224 for (sipp = sysinit; sipp < sysinit_end; sipp++) {
225 sip = *sipp;
ba39e2e0 226 if (sip->subsystem == SI_SPECIAL_DUMMY)
984263bc
MD
227 continue; /* skip dummy task(s)*/
228
ba39e2e0 229 if (sip->subsystem == SI_SPECIAL_DONE)
984263bc
MD
230 continue;
231
232 /* Call function */
8a8d5d85 233 (*(sip->func))(sip->udata);
984263bc
MD
234
235 /* Check off the one we're just done */
ba39e2e0 236 sip->subsystem = SI_SPECIAL_DONE;
984263bc
MD
237
238 /* Check if we've installed more sysinit items via KLD */
239 if (newsysinit != NULL) {
dc62b251 240 if (sysinit != SET_BEGIN(sysinit_set))
efda3bd0 241 kfree(sysinit, M_TEMP);
984263bc 242 sysinit = newsysinit;
dc62b251 243 sysinit_end = newsysinit_end;
984263bc 244 newsysinit = NULL;
dc62b251 245 newsysinit_end = NULL;
984263bc
MD
246 goto restart;
247 }
248 }
249
250 panic("Shouldn't get here!");
251 /* NOTREACHED*/
252}
253
254
255/*
256 ***************************************************************************
257 ****
258 **** The following SYSINIT's belong elsewhere, but have not yet
259 **** been moved.
260 ****
261 ***************************************************************************
262 */
263static void
264print_caddr_t(void *data __unused)
265{
6ea70f76 266 kprintf("%s", (char *)data);
984263bc 267}
ba39e2e0 268SYSINIT(announce, SI_BOOT1_COPYRIGHT, SI_ORDER_FIRST, print_caddr_t, copyright)
984263bc 269
f8c3996b
MD
270/*
271 * Leave the critical section that protected us from spurious interrupts
272 * so device probes work.
273 */
274static void
275leavecrit(void *dummy __unused)
276{
0b692e79
MD
277 MachIntrABI.finalize();
278 cpu_enable_intr();
279 MachIntrABI.cleanup();
f8c3996b
MD
280 crit_exit();
281 KKASSERT(!IN_CRITICAL_SECT(curthread));
dbcd0c9b 282
f8c3996b 283 if (bootverbose)
6ea70f76 284 kprintf("Leaving critical section, allowing interrupts\n");
f8c3996b 285}
ba39e2e0 286SYSINIT(leavecrit, SI_BOOT2_LEAVE_CRIT, SI_ORDER_ANY, leavecrit, NULL)
984263bc 287
dbcd0c9b
MD
288/*
289 * This is called after the threading system is up and running,
290 * including the softclock, clock interrupts, and SMP.
291 */
292static void
293tsleepworks(void *dummy __unused)
294{
295 tsleep_now_works = 1;
296}
297SYSINIT(tsleepworks, SI_BOOT2_FINISH_SMP, SI_ORDER_SECOND, tsleepworks, NULL)
298
299/*
300 * This is called after devices have configured. Tell the kernel we are
301 * no longer in cold boot.
302 */
303static void
304endofcoldboot(void *dummy __unused)
305{
306 cold = 0;
307}
308SYSINIT(endofcoldboot, SI_SUB_ISWARM, SI_ORDER_ANY, endofcoldboot, NULL)
309
984263bc
MD
310/*
311 ***************************************************************************
312 ****
313 **** The two following SYSINT's are proc0 specific glue code. I am not
314 **** convinced that they can not be safely combined, but their order of
315 **** operation has been maintained as the same as the original init_main.c
316 **** for right now.
317 ****
318 **** These probably belong in init_proc.c or kern_proc.c, since they
319 **** deal with proc0 (the fork template process).
320 ****
321 ***************************************************************************
322 */
323/* ARGSUSED*/
324static void
325proc0_init(void *dummy __unused)
326{
0679adc4 327 struct proc *p;
81eea9f4 328 struct lwp *lp;
984263bc
MD
329
330 p = &proc0;
08f2f1bb 331 lp = &lwp0;
984263bc
MD
332
333 /*
334 * Initialize process and pgrp structures.
335 */
336 procinit();
337
984263bc
MD
338 /*
339 * additional VM structures
340 */
341 vm_init2();
342
343 /*
344 * Create process 0 (the swapper).
345 */
346 LIST_INSERT_HEAD(&allproc, p, p_list);
347 p->p_pgrp = &pgrp0;
348 LIST_INSERT_HEAD(PGRPHASH(0), &pgrp0, pg_hash);
349 LIST_INIT(&pgrp0.pg_members);
350 LIST_INSERT_HEAD(&pgrp0.pg_members, p, p_pglist);
351
352 pgrp0.pg_session = &session0;
353 session0.s_count = 1;
354 session0.s_leader = p;
355
356 p->p_sysent = &aout_sysvec;
357
344ad853 358 p->p_flag = P_SYSTEM;
164b8401
SS
359 p->p_stat = SACTIVE;
360 lp->lwp_stat = LSRUN;
984263bc
MD
361 p->p_nice = NZERO;
362 p->p_rtprio.type = RTP_PRIO_NORMAL;
363 p->p_rtprio.prio = 0;
08f2f1bb 364 lp->lwp_rtprio = p->p_rtprio;
984263bc
MD
365
366 p->p_peers = 0;
367 p->p_leader = p;
368
369 bcopy("swapper", p->p_comm, sizeof ("swapper"));
81eea9f4 370 bcopy("swapper", thread0.td_comm, sizeof ("swapper"));
984263bc
MD
371
372 /* Create credentials. */
984263bc 373 p->p_ucred = crget();
41c20dac 374 p->p_ucred->cr_ruidinfo = uifind(0);
984263bc
MD
375 p->p_ucred->cr_ngroups = 1; /* group 0 */
376 p->p_ucred->cr_uidinfo = uifind(0);
377
378 /* Don't jail it */
41c20dac 379 p->p_ucred->cr_prison = NULL;
984263bc 380
b1b4e5a6
SS
381 /* Create sigacts. */
382 p->p_sigacts = &sigacts0;
383 p->p_sigacts->ps_refcnt = 1;
984263bc
MD
384
385 /* Initialize signal state for process 0. */
c0b8a06d 386 siginit(p);
984263bc
MD
387
388 /* Create the file descriptor table. */
228b401d 389 fdinit_bootstrap(p, &filedesc0, cmask);
984263bc
MD
390
391 /* Create the limits structures. */
c0b8a06d 392 plimit_init0(&limit0);
984263bc 393 p->p_limit = &limit0;
984263bc
MD
394
395 /* Allocate a prototype map so we have something to fork. */
396 pmap_pinit0(vmspace_pmap(&vmspace0));
397 p->p_vmspace = &vmspace0;
287ebb09 398 lp->lwp_vmspace = p->p_vmspace;
e3161323 399 sysref_init(&vmspace0.vm_sysref, &vmspace_sysref_class);
e4846942
MD
400 vm_map_init(&vmspace0.vm_map,
401 round_page(VM_MIN_USER_ADDRESS),
402 trunc_page(VM_MAX_USER_ADDRESS),
403 vmspace_pmap(&vmspace0));
e3161323 404 sysref_activate(&vmspace0.vm_sysref);
984263bc 405
984263bc
MD
406 /*
407 * Charge root for one process.
408 */
41c20dac 409 (void)chgproccnt(p->p_ucred->cr_uidinfo, 1, 0);
ba39e2e0 410 vm_init_limits(p);
984263bc 411}
ba39e2e0 412SYSINIT(p0init, SI_BOOT2_PROC0, SI_ORDER_FIRST, proc0_init, NULL)
984263bc 413
8fa76237
MD
414static int proc0_post_callback(struct proc *p, void *data __unused);
415
984263bc
MD
416/* ARGSUSED*/
417static void
418proc0_post(void *dummy __unused)
419{
420 struct timespec ts;
984263bc
MD
421
422 /*
423 * Now we can look at the time, having had a chance to verify the
424 * time from the file system. Pretend that proc0 started now.
425 */
8fa76237 426 allproc_scan(proc0_post_callback, NULL);
984263bc
MD
427
428 /*
429 * Give the ``random'' number generator a thump.
430 * XXX: Does read_random() contain enough bits to be used here ?
431 */
432 nanotime(&ts);
cddfb7bb 433 skrandom(ts.tv_sec ^ ts.tv_nsec);
984263bc 434}
8fa76237
MD
435
436static int
437proc0_post_callback(struct proc *p, void *data __unused)
438{
439 microtime(&p->p_start);
440 return(0);
441}
442
ba39e2e0 443SYSINIT(p0post, SI_SUB_PROC0_POST, SI_ORDER_FIRST, proc0_post, NULL)
984263bc
MD
444
445/*
446 ***************************************************************************
447 ****
448 **** The following SYSINIT's and glue code should be moved to the
449 **** respective files on a per subsystem basis.
450 ****
451 ***************************************************************************
452 */
453
454
455/*
456 ***************************************************************************
457 ****
458 **** The following code probably belongs in another file, like
459 **** kern/init_init.c.
460 ****
461 ***************************************************************************
462 */
463
464/*
465 * List of paths to try when searching for "init".
466 */
467static char init_path[MAXPATHLEN] =
468#ifdef INIT_PATH
469 __XSTRING(INIT_PATH);
470#else
22628b14 471 "/sbin/init:/sbin/oinit:/sbin/init.bak";
984263bc
MD
472#endif
473SYSCTL_STRING(_kern, OID_AUTO, init_path, CTLFLAG_RD, init_path, 0, "");
474
475/*
476 * Start the initial user process; try exec'ing each pathname in init_path.
477 * The program is invoked with one argument containing the boot flags.
8a8d5d85
MD
478 *
479 * The MP lock is held on entry.
984263bc
MD
480 */
481static void
91bd9c1e 482start_init(void *dummy, struct trapframe *frame)
984263bc
MD
483{
484 vm_offset_t addr;
485 struct execve_args args;
486 int options, error;
487 char *var, *path, *next, *s;
488 char *ucp, **uap, *arg0, *arg1;
489 struct proc *p;
553ea3c8 490 struct lwp *lp;
21739618
MD
491 struct mount *mp;
492 struct vnode *vp;
984263bc
MD
493
494 p = curproc;
495
08f2f1bb 496 lp = ONLY_LWP_IN_PROC(p);
553ea3c8 497
984263bc 498 /* Get the vnode for '/'. Set p->p_fd->fd_cdir to reference it. */
861905fb 499 mp = mountlist_boot_getfirst();
21739618 500 if (VFS_ROOT(mp, &vp))
984263bc 501 panic("cannot find root vnode");
28623bf9
MD
502 if (mp->mnt_ncmountpt.ncp == NULL) {
503 cache_allocroot(&mp->mnt_ncmountpt, mp, vp);
504 cache_unlock(&mp->mnt_ncmountpt); /* leave ref intact */
8c361dda 505 }
21739618 506 p->p_fd->fd_cdir = vp;
597aea93 507 vref(p->p_fd->fd_cdir);
21739618 508 p->p_fd->fd_rdir = vp;
597aea93 509 vref(p->p_fd->fd_rdir);
28623bf9 510 vfs_cache_setroot(vp, cache_hold(&mp->mnt_ncmountpt));
a11aaa81 511 vn_unlock(vp); /* leave ref intact */
28623bf9
MD
512 cache_copy(&mp->mnt_ncmountpt, &p->p_fd->fd_ncdir);
513 cache_copy(&mp->mnt_ncmountpt, &p->p_fd->fd_nrdir);
984263bc
MD
514
515 /*
516 * Need just enough stack to hold the faked-up "execve()" arguments.
517 */
518 addr = trunc_page(USRSTACK - PAGE_SIZE);
1b874851
MD
519 error = vm_map_find(&p->p_vmspace->vm_map, NULL, 0, &addr, PAGE_SIZE,
520 FALSE,
521 VM_MAPTYPE_NORMAL,
522 VM_PROT_ALL, VM_PROT_ALL,
523 0);
524 if (error)
984263bc
MD
525 panic("init: couldn't allocate argument space");
526 p->p_vmspace->vm_maxsaddr = (caddr_t)addr;
527 p->p_vmspace->vm_ssize = 1;
528
bc01a404 529 if ((var = kgetenv("init_path")) != NULL) {
984263bc
MD
530 strncpy(init_path, var, sizeof init_path);
531 init_path[sizeof init_path - 1] = 0;
532 }
bc01a404 533 if ((var = kgetenv("kern.fallback_elf_brand")) != NULL)
984263bc
MD
534 fallback_elf_brand = strtol(var, NULL, 0);
535
536 for (path = init_path; *path != '\0'; path = next) {
537 while (*path == ':')
538 path++;
539 if (*path == '\0')
540 break;
541 for (next = path; *next != '\0' && *next != ':'; next++)
542 /* nothing */ ;
543 if (bootverbose)
6ea70f76 544 kprintf("start_init: trying %.*s\n", (int)(next - path),
984263bc
MD
545 path);
546
547 /*
548 * Move out the boot flag argument.
549 */
550 options = 0;
551 ucp = (char *)USRSTACK;
552 (void)subyte(--ucp, 0); /* trailing zero */
553 if (boothowto & RB_SINGLE) {
554 (void)subyte(--ucp, 's');
555 options = 1;
556 }
557#ifdef notyet
558 if (boothowto & RB_FASTBOOT) {
559 (void)subyte(--ucp, 'f');
560 options = 1;
561 }
562#endif
563
564#ifdef BOOTCDROM
565 (void)subyte(--ucp, 'C');
566 options = 1;
567#endif
568 if (options == 0)
569 (void)subyte(--ucp, '-');
570 (void)subyte(--ucp, '-'); /* leading hyphen */
571 arg1 = ucp;
572
573 /*
574 * Move out the file name (also arg 0).
575 */
576 (void)subyte(--ucp, 0);
577 for (s = next - 1; s >= path; s--)
578 (void)subyte(--ucp, *s);
579 arg0 = ucp;
580
581 /*
582 * Move out the arg pointers.
583 */
584 uap = (char **)((intptr_t)ucp & ~(sizeof(intptr_t)-1));
585 (void)suword((caddr_t)--uap, (long)0); /* terminator */
586 (void)suword((caddr_t)--uap, (long)(intptr_t)arg1);
587 (void)suword((caddr_t)--uap, (long)(intptr_t)arg0);
588
589 /*
590 * Point at the arguments.
591 */
592 args.fname = arg0;
593 args.argv = uap;
594 args.envv = NULL;
595
596 /*
597 * Now try to exec the program. If can't for any reason
598 * other than it doesn't exist, complain.
599 *
600 * Otherwise, return via fork_trampoline() all the way
601 * to user mode as init!
a2a5ad0d
MD
602 *
603 * WARNING! We may have been moved to another cpu after
0a3f9b47
MD
604 * acquiring the current user process designation. The
605 * MP lock will migrate with us though so we still have to
606 * release it.
984263bc 607 */
753fd850 608 if ((error = sys_execve(&args)) == 0) {
8a8d5d85 609 rel_mplock();
52eedfb5 610 lp->lwp_proc->p_usched->acquire_curproc(lp);
984263bc 611 return;
8a8d5d85 612 }
984263bc 613 if (error != ENOENT)
6ea70f76 614 kprintf("exec %.*s: error %d\n", (int)(next - path),
984263bc
MD
615 path, error);
616 }
6ea70f76 617 kprintf("init: not found in path %s\n", init_path);
984263bc
MD
618 panic("no init");
619}
620
621/*
622 * Like kthread_create(), but runs in it's own address space.
623 * We do this early to reserve pid 1.
624 *
625 * Note special case - do not make it runnable yet. Other work
626 * in progress will change this more.
627 */
628static void
629create_init(const void *udata __unused)
630{
631 int error;
bb3cd951 632 struct lwp *lp;
984263bc 633
e43a034f 634 crit_enter();
08f2f1bb 635 error = fork1(&lwp0, RFFDG | RFPROC, &initproc);
984263bc 636 if (error)
fc92d4aa 637 panic("cannot fork init: %d", error);
344ad853 638 initproc->p_flag |= P_SYSTEM;
08f2f1bb 639 lp = ONLY_LWP_IN_PROC(initproc);
bb3cd951 640 cpu_set_fork_handler(lp, start_init, NULL);
e43a034f 641 crit_exit();
984263bc 642}
ba39e2e0 643SYSINIT(init, SI_SUB_CREATE_INIT, SI_ORDER_FIRST, create_init, NULL)
984263bc
MD
644
645/*
646 * Make it runnable now.
647 */
648static void
649kick_init(const void *udata __unused)
650{
08f2f1bb 651 start_forked_proc(&lwp0, initproc);
984263bc 652}
ba39e2e0 653SYSINIT(kickinit, SI_SUB_KTHREAD_INIT, SI_ORDER_FIRST, kick_init, NULL)
8ad65e08
MD
654
655/*
656 * Machine independant globaldata initialization
73e4f7b9
MD
657 *
658 * WARNING! Called from early boot, 'mycpu' may not work yet.
8ad65e08
MD
659 */
660void
d0e06f83 661mi_gdinit(struct globaldata *gd, int cpuid)
8ad65e08 662{
85100692 663 TAILQ_INIT(&gd->gd_tdfreeq); /* for pmap_{new,dispose}_thread() */
88c4d2f6 664 TAILQ_INIT(&gd->gd_systimerq);
e3161323 665 gd->gd_sysid_alloc = cpuid; /* prime low bits for cpu lookup */
d0e06f83 666 gd->gd_cpuid = cpuid;
fda1ad89 667 gd->gd_cpumask = (cpumask_t)1 << cpuid;
8ad65e08 668 lwkt_gdinit(gd);
41a01a4d 669 vm_map_entry_reserve_cpu_init(gd);
fc17ad60 670 sleep_gdinit(gd);
8ad65e08
MD
671}
672