EST's module was being installed before the module list got initialized,
[dragonfly.git] / sys / kern / init_main.c
CommitLineData
984263bc
MD
1/*
2 * Copyright (c) 1995 Terrence R. Lambert
3 * All rights reserved.
4 *
5 * Copyright (c) 1982, 1986, 1989, 1991, 1992, 1993
6 * The Regents of the University of California. All rights reserved.
7 * (c) UNIX System Laboratories, Inc.
8 * All or some portions of this file are derived from material licensed
9 * to the University of California by American Telephone and Telegraph
10 * Co. or Unix System Laboratories, Inc. and are reproduced herein with
11 * the permission of UNIX System Laboratories, Inc.
12 *
13 * Redistribution and use in source and binary forms, with or without
14 * modification, are permitted provided that the following conditions
15 * are met:
16 * 1. Redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer.
18 * 2. Redistributions in binary form must reproduce the above copyright
19 * notice, this list of conditions and the following disclaimer in the
20 * documentation and/or other materials provided with the distribution.
21 * 3. All advertising materials mentioning features or use of this software
22 * must display the following acknowledgement:
23 * This product includes software developed by the University of
24 * California, Berkeley and its contributors.
25 * 4. Neither the name of the University nor the names of its contributors
26 * may be used to endorse or promote products derived from this software
27 * without specific prior written permission.
28 *
29 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
30 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
31 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
32 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
33 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
34 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
35 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
36 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
37 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
38 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
39 * SUCH DAMAGE.
40 *
41 * @(#)init_main.c 8.9 (Berkeley) 1/21/94
42 * $FreeBSD: src/sys/kern/init_main.c,v 1.134.2.8 2003/06/06 20:21:32 tegge Exp $
ba39e2e0 43 * $DragonFly: src/sys/kern/init_main.c,v 1.77 2007/04/30 07:18:53 dillon Exp $
984263bc
MD
44 */
45
46#include "opt_init_path.h"
47
48#include <sys/param.h>
49#include <sys/file.h>
50#include <sys/filedesc.h>
51#include <sys/kernel.h>
52#include <sys/mount.h>
53#include <sys/sysctl.h>
54#include <sys/proc.h>
55#include <sys/resourcevar.h>
56#include <sys/signalvar.h>
57#include <sys/systm.h>
58#include <sys/vnode.h>
59#include <sys/sysent.h>
60#include <sys/reboot.h>
61#include <sys/sysproto.h>
62#include <sys/vmmeter.h>
63#include <sys/unistd.h>
64#include <sys/malloc.h>
dadab5e9 65#include <sys/file2.h>
f8c3996b 66#include <sys/thread2.h>
e3161323 67#include <sys/sysref2.h>
984263bc
MD
68
69#include <machine/cpu.h>
70
71#include <vm/vm.h>
72#include <vm/vm_param.h>
73#include <sys/lock.h>
74#include <vm/pmap.h>
75#include <vm/vm_map.h>
ba39e2e0 76#include <vm/vm_extern.h>
984263bc
MD
77#include <sys/user.h>
78#include <sys/copyright.h>
79
984263bc
MD
80/* Components of the first process -- never freed. */
81static struct session session0;
82static struct pgrp pgrp0;
b1b4e5a6 83static struct sigacts sigacts0;
0679adc4 84static struct filedesc filedesc0;
984263bc
MD
85static struct plimit limit0;
86static struct vmspace vmspace0;
b7c628e4
MD
87struct proc *initproc;
88struct proc proc0;
08f2f1bb 89struct lwp lwp0;
b7c628e4 90struct thread thread0;
984263bc
MD
91
92int cmask = CMASK;
93extern struct user *proc0paddr;
94extern int fallback_elf_brand;
95
984263bc
MD
96int boothowto = 0; /* initialized so that it can be patched */
97SYSCTL_INT(_debug, OID_AUTO, boothowto, CTLFLAG_RD, &boothowto, 0, "");
98
99/*
100 * This ensures that there is at least one entry so that the sysinit_set
ba39e2e0 101 * symbol is not undefined. A sybsystem ID of SI_SPECIAL_DUMMY is never
984263bc
MD
102 * executed.
103 */
ba39e2e0 104SYSINIT(placeholder, SI_SPECIAL_DUMMY, SI_ORDER_ANY, NULL, NULL)
984263bc
MD
105
106/*
107 * The sysinit table itself. Items are checked off as the are run.
108 * If we want to register new sysinit types, add them to newsysinit.
109 */
dc62b251
MD
110SET_DECLARE(sysinit_set, struct sysinit);
111struct sysinit **sysinit, **sysinit_end;
112struct sysinit **newsysinit, **newsysinit_end;
113
984263bc
MD
114
115/*
116 * Merge a new sysinit set into the current set, reallocating it if
117 * necessary. This can only be called after malloc is running.
118 */
119void
dc62b251 120sysinit_add(struct sysinit **set, struct sysinit **set_end)
984263bc
MD
121{
122 struct sysinit **newset;
123 struct sysinit **sipp;
124 struct sysinit **xipp;
dc62b251 125 int count;
984263bc 126
dc62b251 127 count = set_end - set;
984263bc 128 if (newsysinit)
dc62b251 129 count += newsysinit_end - newsysinit;
984263bc 130 else
dc62b251 131 count += sysinit_end - sysinit;
efda3bd0 132 newset = kmalloc(count * sizeof(*sipp), M_TEMP, M_WAITOK);
984263bc
MD
133 if (newset == NULL)
134 panic("cannot malloc for sysinit");
135 xipp = newset;
dc62b251
MD
136 if (newsysinit) {
137 for (sipp = newsysinit; sipp < newsysinit_end; sipp++)
984263bc 138 *xipp++ = *sipp;
dc62b251
MD
139 } else {
140 for (sipp = sysinit; sipp < sysinit_end; sipp++)
984263bc 141 *xipp++ = *sipp;
dc62b251
MD
142 }
143 for (sipp = set; sipp < set_end; sipp++)
984263bc 144 *xipp++ = *sipp;
984263bc 145 if (newsysinit)
efda3bd0 146 kfree(newsysinit, M_TEMP);
984263bc 147 newsysinit = newset;
dc62b251 148 newsysinit_end = newset + count;
984263bc
MD
149}
150
6bf59cd2
MD
151/*
152 * Callbacks from machine-dependant startup code (e.g. init386) to set
153 * up low level entities related to cpu #0's globaldata.
154 *
155 * Called from very low level boot code.
156 */
157void
158mi_proc0init(struct globaldata *gd, struct user *proc0paddr)
159{
160 lwkt_init_thread(&thread0, proc0paddr, LWKT_THREAD_STACK, 0, gd);
161 lwkt_set_comm(&thread0, "thread0");
6bf59cd2 162 LIST_INIT(&proc0.p_lwps);
08f2f1bb
SS
163 LIST_INSERT_HEAD(&proc0.p_lwps, &lwp0, lwp_list);
164 lwp0.lwp_thread = &thread0;
165 lwp0.lwp_proc = &proc0;
6bf59cd2 166 proc0.p_usched = usched_init();
08f2f1bb 167 lwp0.lwp_cpumask = 0xFFFFFFFF;
6bf59cd2
MD
168 varsymset_init(&proc0.p_varsymset, NULL);
169 thread0.td_flags |= TDF_RUNNING;
170 thread0.td_proc = &proc0;
08f2f1bb 171 thread0.td_lwp = &lwp0;
6bf59cd2
MD
172 thread0.td_switch = cpu_heavy_switch; /* YYY eventually LWKT */
173}
174
984263bc
MD
175/*
176 * System startup; initialize the world, create process 0, mount root
177 * filesystem, and fork to create init and pagedaemon. Most of the
178 * hard work is done in the lower-level initialization routines including
179 * startup(), which does memory initialization and autoconfiguration.
180 *
181 * This allows simple addition of new kernel subsystems that require
182 * boot time initialization. It also allows substitution of subsystem
183 * (for instance, a scheduler, kernel profiler, or VM system) by object
184 * module. Finally, it allows for optional "kernel threads".
185 */
186void
187mi_startup(void)
188{
8a8d5d85 189 struct sysinit *sip; /* system initialization*/
17a9f566
MD
190 struct sysinit **sipp; /* system initialization*/
191 struct sysinit **xipp; /* interior loop of sort*/
192 struct sysinit *save; /* bubble*/
984263bc 193
dc62b251
MD
194 if (sysinit == NULL) {
195 sysinit = SET_BEGIN(sysinit_set);
196 sysinit_end = SET_LIMIT(sysinit_set);
197 }
198
984263bc
MD
199restart:
200 /*
201 * Perform a bubble sort of the system initialization objects by
202 * their subsystem (primary key) and order (secondary key).
203 */
dc62b251
MD
204 for (sipp = sysinit; sipp < sysinit_end; sipp++) {
205 for (xipp = sipp + 1; xipp < sysinit_end; xipp++) {
984263bc
MD
206 if ((*sipp)->subsystem < (*xipp)->subsystem ||
207 ((*sipp)->subsystem == (*xipp)->subsystem &&
208 (*sipp)->order <= (*xipp)->order))
209 continue; /* skip*/
210 save = *sipp;
211 *sipp = *xipp;
212 *xipp = save;
213 }
214 }
215
216 /*
217 * Traverse the (now) ordered list of system initialization tasks.
218 * Perform each task, and continue on to the next task.
219 *
220 * The last item on the list is expected to be the scheduler,
221 * which will not return.
222 */
dc62b251
MD
223 for (sipp = sysinit; sipp < sysinit_end; sipp++) {
224 sip = *sipp;
ba39e2e0 225 if (sip->subsystem == SI_SPECIAL_DUMMY)
984263bc
MD
226 continue; /* skip dummy task(s)*/
227
ba39e2e0 228 if (sip->subsystem == SI_SPECIAL_DONE)
984263bc
MD
229 continue;
230
231 /* Call function */
8a8d5d85 232 (*(sip->func))(sip->udata);
984263bc
MD
233
234 /* Check off the one we're just done */
ba39e2e0 235 sip->subsystem = SI_SPECIAL_DONE;
984263bc
MD
236
237 /* Check if we've installed more sysinit items via KLD */
238 if (newsysinit != NULL) {
dc62b251 239 if (sysinit != SET_BEGIN(sysinit_set))
efda3bd0 240 kfree(sysinit, M_TEMP);
984263bc 241 sysinit = newsysinit;
dc62b251 242 sysinit_end = newsysinit_end;
984263bc 243 newsysinit = NULL;
dc62b251 244 newsysinit_end = NULL;
984263bc
MD
245 goto restart;
246 }
247 }
248
249 panic("Shouldn't get here!");
250 /* NOTREACHED*/
251}
252
253
254/*
255 ***************************************************************************
256 ****
257 **** The following SYSINIT's belong elsewhere, but have not yet
258 **** been moved.
259 ****
260 ***************************************************************************
261 */
262static void
263print_caddr_t(void *data __unused)
264{
6ea70f76 265 kprintf("%s", (char *)data);
984263bc 266}
ba39e2e0 267SYSINIT(announce, SI_BOOT1_COPYRIGHT, SI_ORDER_FIRST, print_caddr_t, copyright)
984263bc 268
f8c3996b
MD
269/*
270 * Leave the critical section that protected us from spurious interrupts
271 * so device probes work.
272 */
273static void
274leavecrit(void *dummy __unused)
275{
276 crit_exit();
277 KKASSERT(!IN_CRITICAL_SECT(curthread));
278 if (bootverbose)
6ea70f76 279 kprintf("Leaving critical section, allowing interrupts\n");
f8c3996b 280}
ba39e2e0 281SYSINIT(leavecrit, SI_BOOT2_LEAVE_CRIT, SI_ORDER_ANY, leavecrit, NULL)
984263bc
MD
282
283/*
284 ***************************************************************************
285 ****
286 **** The two following SYSINT's are proc0 specific glue code. I am not
287 **** convinced that they can not be safely combined, but their order of
288 **** operation has been maintained as the same as the original init_main.c
289 **** for right now.
290 ****
291 **** These probably belong in init_proc.c or kern_proc.c, since they
292 **** deal with proc0 (the fork template process).
293 ****
294 ***************************************************************************
295 */
296/* ARGSUSED*/
297static void
298proc0_init(void *dummy __unused)
299{
0679adc4 300 struct proc *p;
81eea9f4 301 struct lwp *lp;
984263bc
MD
302
303 p = &proc0;
08f2f1bb 304 lp = &lwp0;
984263bc
MD
305
306 /*
307 * Initialize process and pgrp structures.
308 */
309 procinit();
310
984263bc
MD
311 /*
312 * additional VM structures
313 */
314 vm_init2();
315
316 /*
317 * Create process 0 (the swapper).
318 */
319 LIST_INSERT_HEAD(&allproc, p, p_list);
320 p->p_pgrp = &pgrp0;
321 LIST_INSERT_HEAD(PGRPHASH(0), &pgrp0, pg_hash);
322 LIST_INIT(&pgrp0.pg_members);
323 LIST_INSERT_HEAD(&pgrp0.pg_members, p, p_pglist);
324
325 pgrp0.pg_session = &session0;
326 session0.s_count = 1;
327 session0.s_leader = p;
328
329 p->p_sysent = &aout_sysvec;
330
344ad853 331 p->p_flag = P_SYSTEM;
164b8401
SS
332 p->p_stat = SACTIVE;
333 lp->lwp_stat = LSRUN;
984263bc
MD
334 p->p_nice = NZERO;
335 p->p_rtprio.type = RTP_PRIO_NORMAL;
336 p->p_rtprio.prio = 0;
08f2f1bb 337 lp->lwp_rtprio = p->p_rtprio;
984263bc
MD
338
339 p->p_peers = 0;
340 p->p_leader = p;
341
342 bcopy("swapper", p->p_comm, sizeof ("swapper"));
81eea9f4 343 bcopy("swapper", thread0.td_comm, sizeof ("swapper"));
984263bc
MD
344
345 /* Create credentials. */
984263bc 346 p->p_ucred = crget();
41c20dac 347 p->p_ucred->cr_ruidinfo = uifind(0);
984263bc
MD
348 p->p_ucred->cr_ngroups = 1; /* group 0 */
349 p->p_ucred->cr_uidinfo = uifind(0);
350
351 /* Don't jail it */
41c20dac 352 p->p_ucred->cr_prison = NULL;
984263bc 353
b1b4e5a6
SS
354 /* Create sigacts. */
355 p->p_sigacts = &sigacts0;
356 p->p_sigacts->ps_refcnt = 1;
984263bc
MD
357
358 /* Initialize signal state for process 0. */
c0b8a06d 359 siginit(p);
984263bc
MD
360
361 /* Create the file descriptor table. */
228b401d 362 fdinit_bootstrap(p, &filedesc0, cmask);
984263bc
MD
363
364 /* Create the limits structures. */
c0b8a06d 365 plimit_init0(&limit0);
984263bc 366 p->p_limit = &limit0;
984263bc
MD
367
368 /* Allocate a prototype map so we have something to fork. */
369 pmap_pinit0(vmspace_pmap(&vmspace0));
370 p->p_vmspace = &vmspace0;
e3161323 371 sysref_init(&vmspace0.vm_sysref, &vmspace_sysref_class);
e4846942
MD
372 vm_map_init(&vmspace0.vm_map,
373 round_page(VM_MIN_USER_ADDRESS),
374 trunc_page(VM_MAX_USER_ADDRESS),
375 vmspace_pmap(&vmspace0));
e3161323 376 sysref_activate(&vmspace0.vm_sysref);
984263bc 377
984263bc
MD
378 /*
379 * Charge root for one process.
380 */
41c20dac 381 (void)chgproccnt(p->p_ucred->cr_uidinfo, 1, 0);
ba39e2e0 382 vm_init_limits(p);
984263bc 383}
ba39e2e0 384SYSINIT(p0init, SI_BOOT2_PROC0, SI_ORDER_FIRST, proc0_init, NULL)
984263bc 385
8fa76237
MD
386static int proc0_post_callback(struct proc *p, void *data __unused);
387
984263bc
MD
388/* ARGSUSED*/
389static void
390proc0_post(void *dummy __unused)
391{
392 struct timespec ts;
984263bc
MD
393
394 /*
395 * Now we can look at the time, having had a chance to verify the
396 * time from the file system. Pretend that proc0 started now.
397 */
8fa76237 398 allproc_scan(proc0_post_callback, NULL);
984263bc
MD
399
400 /*
401 * Give the ``random'' number generator a thump.
402 * XXX: Does read_random() contain enough bits to be used here ?
403 */
404 nanotime(&ts);
cddfb7bb 405 skrandom(ts.tv_sec ^ ts.tv_nsec);
984263bc 406}
8fa76237
MD
407
408static int
409proc0_post_callback(struct proc *p, void *data __unused)
410{
411 microtime(&p->p_start);
412 return(0);
413}
414
ba39e2e0 415SYSINIT(p0post, SI_SUB_PROC0_POST, SI_ORDER_FIRST, proc0_post, NULL)
984263bc
MD
416
417/*
418 ***************************************************************************
419 ****
420 **** The following SYSINIT's and glue code should be moved to the
421 **** respective files on a per subsystem basis.
422 ****
423 ***************************************************************************
424 */
425
426
427/*
428 ***************************************************************************
429 ****
430 **** The following code probably belongs in another file, like
431 **** kern/init_init.c.
432 ****
433 ***************************************************************************
434 */
435
436/*
437 * List of paths to try when searching for "init".
438 */
439static char init_path[MAXPATHLEN] =
440#ifdef INIT_PATH
441 __XSTRING(INIT_PATH);
442#else
443 "/sbin/init:/sbin/oinit:/sbin/init.bak:/stand/sysinstall";
444#endif
445SYSCTL_STRING(_kern, OID_AUTO, init_path, CTLFLAG_RD, init_path, 0, "");
446
447/*
448 * Start the initial user process; try exec'ing each pathname in init_path.
449 * The program is invoked with one argument containing the boot flags.
8a8d5d85
MD
450 *
451 * The MP lock is held on entry.
984263bc
MD
452 */
453static void
91bd9c1e 454start_init(void *dummy, struct trapframe *frame)
984263bc
MD
455{
456 vm_offset_t addr;
457 struct execve_args args;
458 int options, error;
459 char *var, *path, *next, *s;
460 char *ucp, **uap, *arg0, *arg1;
461 struct proc *p;
553ea3c8 462 struct lwp *lp;
21739618
MD
463 struct mount *mp;
464 struct vnode *vp;
984263bc
MD
465
466 p = curproc;
467
08f2f1bb 468 lp = ONLY_LWP_IN_PROC(p);
553ea3c8 469
984263bc 470 /* Get the vnode for '/'. Set p->p_fd->fd_cdir to reference it. */
861905fb 471 mp = mountlist_boot_getfirst();
21739618 472 if (VFS_ROOT(mp, &vp))
984263bc 473 panic("cannot find root vnode");
28623bf9
MD
474 if (mp->mnt_ncmountpt.ncp == NULL) {
475 cache_allocroot(&mp->mnt_ncmountpt, mp, vp);
476 cache_unlock(&mp->mnt_ncmountpt); /* leave ref intact */
8c361dda 477 }
21739618 478 p->p_fd->fd_cdir = vp;
597aea93 479 vref(p->p_fd->fd_cdir);
21739618 480 p->p_fd->fd_rdir = vp;
597aea93 481 vref(p->p_fd->fd_rdir);
28623bf9 482 vfs_cache_setroot(vp, cache_hold(&mp->mnt_ncmountpt));
a11aaa81 483 vn_unlock(vp); /* leave ref intact */
28623bf9
MD
484 cache_copy(&mp->mnt_ncmountpt, &p->p_fd->fd_ncdir);
485 cache_copy(&mp->mnt_ncmountpt, &p->p_fd->fd_nrdir);
984263bc
MD
486
487 /*
488 * Need just enough stack to hold the faked-up "execve()" arguments.
489 */
490 addr = trunc_page(USRSTACK - PAGE_SIZE);
1b874851
MD
491 error = vm_map_find(&p->p_vmspace->vm_map, NULL, 0, &addr, PAGE_SIZE,
492 FALSE,
493 VM_MAPTYPE_NORMAL,
494 VM_PROT_ALL, VM_PROT_ALL,
495 0);
496 if (error)
984263bc
MD
497 panic("init: couldn't allocate argument space");
498 p->p_vmspace->vm_maxsaddr = (caddr_t)addr;
499 p->p_vmspace->vm_ssize = 1;
500
bc01a404 501 if ((var = kgetenv("init_path")) != NULL) {
984263bc
MD
502 strncpy(init_path, var, sizeof init_path);
503 init_path[sizeof init_path - 1] = 0;
504 }
bc01a404 505 if ((var = kgetenv("kern.fallback_elf_brand")) != NULL)
984263bc
MD
506 fallback_elf_brand = strtol(var, NULL, 0);
507
508 for (path = init_path; *path != '\0'; path = next) {
509 while (*path == ':')
510 path++;
511 if (*path == '\0')
512 break;
513 for (next = path; *next != '\0' && *next != ':'; next++)
514 /* nothing */ ;
515 if (bootverbose)
6ea70f76 516 kprintf("start_init: trying %.*s\n", (int)(next - path),
984263bc
MD
517 path);
518
519 /*
520 * Move out the boot flag argument.
521 */
522 options = 0;
523 ucp = (char *)USRSTACK;
524 (void)subyte(--ucp, 0); /* trailing zero */
525 if (boothowto & RB_SINGLE) {
526 (void)subyte(--ucp, 's');
527 options = 1;
528 }
529#ifdef notyet
530 if (boothowto & RB_FASTBOOT) {
531 (void)subyte(--ucp, 'f');
532 options = 1;
533 }
534#endif
535
536#ifdef BOOTCDROM
537 (void)subyte(--ucp, 'C');
538 options = 1;
539#endif
540 if (options == 0)
541 (void)subyte(--ucp, '-');
542 (void)subyte(--ucp, '-'); /* leading hyphen */
543 arg1 = ucp;
544
545 /*
546 * Move out the file name (also arg 0).
547 */
548 (void)subyte(--ucp, 0);
549 for (s = next - 1; s >= path; s--)
550 (void)subyte(--ucp, *s);
551 arg0 = ucp;
552
553 /*
554 * Move out the arg pointers.
555 */
556 uap = (char **)((intptr_t)ucp & ~(sizeof(intptr_t)-1));
557 (void)suword((caddr_t)--uap, (long)0); /* terminator */
558 (void)suword((caddr_t)--uap, (long)(intptr_t)arg1);
559 (void)suword((caddr_t)--uap, (long)(intptr_t)arg0);
560
561 /*
562 * Point at the arguments.
563 */
564 args.fname = arg0;
565 args.argv = uap;
566 args.envv = NULL;
567
568 /*
569 * Now try to exec the program. If can't for any reason
570 * other than it doesn't exist, complain.
571 *
572 * Otherwise, return via fork_trampoline() all the way
573 * to user mode as init!
a2a5ad0d
MD
574 *
575 * WARNING! We may have been moved to another cpu after
0a3f9b47
MD
576 * acquiring the current user process designation. The
577 * MP lock will migrate with us though so we still have to
578 * release it.
984263bc 579 */
753fd850 580 if ((error = sys_execve(&args)) == 0) {
8a8d5d85 581 rel_mplock();
52eedfb5 582 lp->lwp_proc->p_usched->acquire_curproc(lp);
984263bc 583 return;
8a8d5d85 584 }
984263bc 585 if (error != ENOENT)
6ea70f76 586 kprintf("exec %.*s: error %d\n", (int)(next - path),
984263bc
MD
587 path, error);
588 }
6ea70f76 589 kprintf("init: not found in path %s\n", init_path);
984263bc
MD
590 panic("no init");
591}
592
593/*
594 * Like kthread_create(), but runs in it's own address space.
595 * We do this early to reserve pid 1.
596 *
597 * Note special case - do not make it runnable yet. Other work
598 * in progress will change this more.
599 */
600static void
601create_init(const void *udata __unused)
602{
603 int error;
bb3cd951 604 struct lwp *lp;
984263bc 605
e43a034f 606 crit_enter();
08f2f1bb 607 error = fork1(&lwp0, RFFDG | RFPROC, &initproc);
984263bc 608 if (error)
fc92d4aa 609 panic("cannot fork init: %d", error);
344ad853 610 initproc->p_flag |= P_SYSTEM;
08f2f1bb 611 lp = ONLY_LWP_IN_PROC(initproc);
bb3cd951 612 cpu_set_fork_handler(lp, start_init, NULL);
e43a034f 613 crit_exit();
984263bc 614}
ba39e2e0 615SYSINIT(init, SI_SUB_CREATE_INIT, SI_ORDER_FIRST, create_init, NULL)
984263bc
MD
616
617/*
618 * Make it runnable now.
619 */
620static void
621kick_init(const void *udata __unused)
622{
08f2f1bb 623 start_forked_proc(&lwp0, initproc);
984263bc 624}
ba39e2e0 625SYSINIT(kickinit, SI_SUB_KTHREAD_INIT, SI_ORDER_FIRST, kick_init, NULL)
8ad65e08
MD
626
627/*
628 * Machine independant globaldata initialization
73e4f7b9
MD
629 *
630 * WARNING! Called from early boot, 'mycpu' may not work yet.
8ad65e08
MD
631 */
632void
d0e06f83 633mi_gdinit(struct globaldata *gd, int cpuid)
8ad65e08 634{
85100692 635 TAILQ_INIT(&gd->gd_tdfreeq); /* for pmap_{new,dispose}_thread() */
88c4d2f6 636 TAILQ_INIT(&gd->gd_systimerq);
e3161323 637 gd->gd_sysid_alloc = cpuid; /* prime low bits for cpu lookup */
d0e06f83 638 gd->gd_cpuid = cpuid;
fda1ad89 639 gd->gd_cpumask = (cpumask_t)1 << cpuid;
8ad65e08 640 lwkt_gdinit(gd);
41a01a4d 641 vm_map_entry_reserve_cpu_init(gd);
fc17ad60 642 sleep_gdinit(gd);
8ad65e08
MD
643}
644