ima: load x509 certificate from the kernel
[deliverable/linux.git] / init / main.c
CommitLineData
1da177e4
LT
1/*
2 * linux/init/main.c
3 *
4 * Copyright (C) 1991, 1992 Linus Torvalds
5 *
6 * GK 2/5/95 - Changed to support mounting root fs via NFS
7 * Added initrd & change_root: Werner Almesberger & Hans Lermen, Feb '96
8 * Moan early if gcc is old, avoiding bogus kernels - Paul Gortmaker, May '96
9 * Simplified starting of init: Michael A. Griffith <grif@acm.org>
10 */
11
ea676e84
AM
12#define DEBUG /* Enable initcall_debug */
13
1da177e4
LT
14#include <linux/types.h>
15#include <linux/module.h>
16#include <linux/proc_fs.h>
1da177e4
LT
17#include <linux/kernel.h>
18#include <linux/syscalls.h>
9b5609fd 19#include <linux/stackprotector.h>
1da177e4
LT
20#include <linux/string.h>
21#include <linux/ctype.h>
22#include <linux/delay.h>
1da177e4
LT
23#include <linux/ioport.h>
24#include <linux/init.h>
1da177e4 25#include <linux/initrd.h>
1da177e4 26#include <linux/bootmem.h>
4a7a16dc 27#include <linux/acpi.h>
1da177e4 28#include <linux/tty.h>
1da177e4
LT
29#include <linux/percpu.h>
30#include <linux/kmod.h>
db64fe02 31#include <linux/vmalloc.h>
1da177e4 32#include <linux/kernel_stat.h>
d7cd5611 33#include <linux/start_kernel.h>
1da177e4 34#include <linux/security.h>
3d442233 35#include <linux/smp.h>
1da177e4
LT
36#include <linux/profile.h>
37#include <linux/rcupdate.h>
38#include <linux/moduleparam.h>
39#include <linux/kallsyms.h>
40#include <linux/writeback.h>
41#include <linux/cpu.h>
42#include <linux/cpuset.h>
ddbcc7e8 43#include <linux/cgroup.h>
1da177e4 44#include <linux/efi.h>
906568c9 45#include <linux/tick.h>
6168a702 46#include <linux/interrupt.h>
c757249a 47#include <linux/taskstats_kern.h>
ca74e92b 48#include <linux/delayacct.h>
1da177e4
LT
49#include <linux/unistd.h>
50#include <linux/rmap.h>
51#include <linux/mempolicy.h>
52#include <linux/key.h>
b6cd0b77 53#include <linux/buffer_head.h>
94b6da5a 54#include <linux/page_cgroup.h>
9a11b49a 55#include <linux/debug_locks.h>
3ac7fe5a 56#include <linux/debugobjects.h>
fbb9ce95 57#include <linux/lockdep.h>
3c7b4e6b 58#include <linux/kmemleak.h>
84d73786 59#include <linux/pid_namespace.h>
1f21782e 60#include <linux/device.h>
73c27992 61#include <linux/kthread.h>
e6fe6649 62#include <linux/sched.h>
a1c9eea9 63#include <linux/signal.h>
199f0ca5 64#include <linux/idr.h>
0b4b3827 65#include <linux/kgdb.h>
68bf21aa 66#include <linux/ftrace.h>
22a9d645 67#include <linux/async.h>
dfec072e 68#include <linux/kmemcheck.h>
6ae6996a 69#include <linux/sfi.h>
2b2af54a 70#include <linux/shmem_fs.h>
5a0e3ad6 71#include <linux/slab.h>
24a24bb6 72#include <linux/perf_event.h>
4a9d4b02 73#include <linux/file.h>
a74fb73c 74#include <linux/ptrace.h>
bb813f4c
TH
75#include <linux/blkdev.h>
76#include <linux/elevator.h>
38ff87f7 77#include <linux/sched_clock.h>
65f382fd 78#include <linux/context_tracking.h>
47d06e53 79#include <linux/random.h>
7b0b73d7 80#include <linux/list.h>
1da177e4
LT
81
82#include <asm/io.h>
83#include <asm/bugs.h>
84#include <asm/setup.h>
a940199f 85#include <asm/sections.h>
37b73c82 86#include <asm/cacheflush.h>
1da177e4 87
1da177e4
LT
88#ifdef CONFIG_X86_LOCAL_APIC
89#include <asm/smp.h>
90#endif
91
aae5f662 92static int kernel_init(void *);
1da177e4
LT
93
94extern void init_IRQ(void);
1da177e4 95extern void fork_init(unsigned long);
1da177e4 96extern void radix_tree_init(void);
37b73c82
AV
97#ifndef CONFIG_DEBUG_RODATA
98static inline void mark_rodata_ro(void) { }
99#endif
1da177e4 100
2ce802f6
TH
101/*
102 * Debug helper: via this flag we know that we are in 'early bootup code'
103 * where only the boot processor is running with IRQ disabled. This means
104 * two things - IRQ must not be enabled before the flag is cleared and some
105 * operations which are not allowed with IRQ disabled are allowed while the
106 * flag is set.
107 */
108bool early_boot_irqs_disabled __read_mostly;
109
a6826048 110enum system_states system_state __read_mostly;
1da177e4
LT
111EXPORT_SYMBOL(system_state);
112
113/*
114 * Boot command-line arguments
115 */
116#define MAX_INIT_ARGS CONFIG_INIT_ENV_ARG_LIMIT
117#define MAX_INIT_ENVS CONFIG_INIT_ENV_ARG_LIMIT
118
119extern void time_init(void);
120/* Default late time init is NULL. archs can override this later. */
d2e3192b 121void (*__initdata late_time_init)(void);
1da177e4 122
30d7e0d4
ABL
123/* Untouched command line saved by arch-specific code. */
124char __initdata boot_command_line[COMMAND_LINE_SIZE];
125/* Untouched saved command line (eg. for /proc) */
126char *saved_command_line;
127/* Command line for parameter parsing */
128static char *static_command_line;
08746a65
KM
129/* Command line for per-initcall parameter parsing */
130static char *initcall_command_line;
1da177e4
LT
131
132static char *execute_command;
ffdfc409 133static char *ramdisk_execute_command;
1da177e4 134
c4b2c0c5
HFS
135/*
136 * Used to generate warnings if static_key manipulation functions are used
137 * before jump_label_init is called.
138 */
139bool static_key_initialized __read_mostly = false;
140EXPORT_SYMBOL_GPL(static_key_initialized);
141
8b3b2955
JB
142/*
143 * If set, this is an indication to the drivers that reset the underlying
144 * device before going ahead with the initialization otherwise driver might
145 * rely on the BIOS and skip the reset operation.
146 *
147 * This is useful if kernel is booting in an unreliable environment.
148 * For ex. kdump situaiton where previous kernel has crashed, BIOS has been
149 * skipped and devices will be in unknown state.
150 */
151unsigned int reset_devices;
152EXPORT_SYMBOL(reset_devices);
1da177e4 153
7e96287d
VG
154static int __init set_reset_devices(char *str)
155{
156 reset_devices = 1;
157 return 1;
158}
159
160__setup("reset_devices", set_reset_devices);
161
d7627467
DH
162static const char * argv_init[MAX_INIT_ARGS+2] = { "init", NULL, };
163const char * envp_init[MAX_INIT_ENVS+2] = { "HOME=/", "TERM=linux", NULL, };
1da177e4
LT
164static const char *panic_later, *panic_param;
165
914dcaa8 166extern const struct obs_kernel_param __setup_start[], __setup_end[];
1da177e4
LT
167
168static int __init obsolete_checksetup(char *line)
169{
914dcaa8 170 const struct obs_kernel_param *p;
33df0d19 171 int had_early_param = 0;
1da177e4
LT
172
173 p = __setup_start;
174 do {
175 int n = strlen(p->str);
b1e4d20c 176 if (parameqn(line, p->str, n)) {
1da177e4 177 if (p->early) {
33df0d19
RR
178 /* Already done in parse_early_param?
179 * (Needs exact match on param part).
180 * Keep iterating, as we can have early
181 * params and __setups of same names 8( */
1da177e4 182 if (line[n] == '\0' || line[n] == '=')
33df0d19 183 had_early_param = 1;
1da177e4 184 } else if (!p->setup_func) {
ea676e84
AM
185 pr_warn("Parameter %s is obsolete, ignored\n",
186 p->str);
1da177e4
LT
187 return 1;
188 } else if (p->setup_func(line + n))
189 return 1;
190 }
191 p++;
192 } while (p < __setup_end);
33df0d19
RR
193
194 return had_early_param;
1da177e4
LT
195}
196
197/*
198 * This should be approx 2 Bo*oMips to start (note initial shift), and will
199 * still work even if initially too large, it will just take slightly longer
200 */
201unsigned long loops_per_jiffy = (1<<12);
202
203EXPORT_SYMBOL(loops_per_jiffy);
204
205static int __init debug_kernel(char *str)
206{
a8fe19eb 207 console_loglevel = CONSOLE_LOGLEVEL_DEBUG;
f6f21c81 208 return 0;
1da177e4
LT
209}
210
211static int __init quiet_kernel(char *str)
212{
a8fe19eb 213 console_loglevel = CONSOLE_LOGLEVEL_QUIET;
f6f21c81 214 return 0;
1da177e4
LT
215}
216
f6f21c81
YL
217early_param("debug", debug_kernel);
218early_param("quiet", quiet_kernel);
1da177e4
LT
219
220static int __init loglevel(char *str)
221{
808bf29b
AS
222 int newlevel;
223
224 /*
225 * Only update loglevel value when a correct setting was passed,
226 * to prevent blind crashes (when loglevel being set to 0) that
227 * are quite hard to debug
228 */
229 if (get_option(&str, &newlevel)) {
230 console_loglevel = newlevel;
231 return 0;
232 }
233
234 return -EINVAL;
1da177e4
LT
235}
236
f6f21c81 237early_param("loglevel", loglevel);
1da177e4 238
a99cd112 239/* Change NUL term back to "=", to make "param" the whole string. */
eb157427 240static int __init repair_env_string(char *param, char *val, const char *unused)
1da177e4 241{
1da177e4
LT
242 if (val) {
243 /* param=val or param="val"? */
244 if (val == param+strlen(param)+1)
245 val[-1] = '=';
246 else if (val == param+strlen(param)+2) {
247 val[-2] = '=';
248 memmove(val-1, val, strlen(val)+1);
249 val--;
250 } else
251 BUG();
252 }
a99cd112
CM
253 return 0;
254}
255
51e158c1
RR
256/* Anything after -- gets handed straight to init. */
257static int __init set_init_arg(char *param, char *val, const char *unused)
258{
259 unsigned int i;
260
261 if (panic_later)
262 return 0;
263
264 repair_env_string(param, val, unused);
265
266 for (i = 0; argv_init[i]; i++) {
267 if (i == MAX_INIT_ARGS) {
268 panic_later = "init";
269 panic_param = param;
270 return 0;
271 }
272 }
273 argv_init[i] = param;
274 return 0;
275}
276
a99cd112
CM
277/*
278 * Unknown boot options get handed to init, unless they look like
279 * unused parameters (modprobe will find them in /proc/cmdline).
280 */
eb157427 281static int __init unknown_bootoption(char *param, char *val, const char *unused)
a99cd112 282{
eb157427 283 repair_env_string(param, val, unused);
1da177e4
LT
284
285 /* Handle obsolete-style parameters */
286 if (obsolete_checksetup(param))
287 return 0;
288
f066a4f6
RR
289 /* Unused module parameter. */
290 if (strchr(param, '.') && (!val || strchr(param, '.') < val))
1da177e4 291 return 0;
1da177e4
LT
292
293 if (panic_later)
294 return 0;
295
296 if (val) {
297 /* Environment option */
298 unsigned int i;
299 for (i = 0; envp_init[i]; i++) {
300 if (i == MAX_INIT_ENVS) {
499a4584 301 panic_later = "env";
1da177e4
LT
302 panic_param = param;
303 }
304 if (!strncmp(param, envp_init[i], val - param))
305 break;
306 }
307 envp_init[i] = param;
308 } else {
309 /* Command line option */
310 unsigned int i;
311 for (i = 0; argv_init[i]; i++) {
312 if (i == MAX_INIT_ARGS) {
499a4584 313 panic_later = "init";
1da177e4
LT
314 panic_param = param;
315 }
316 }
317 argv_init[i] = param;
318 }
319 return 0;
320}
321
322static int __init init_setup(char *str)
323{
324 unsigned int i;
325
326 execute_command = str;
327 /*
328 * In case LILO is going to boot us with default command line,
329 * it prepends "auto" before the whole cmdline which makes
330 * the shell think it should execute a script with such name.
331 * So we ignore all arguments entered _before_ init=... [MJ]
332 */
333 for (i = 1; i < MAX_INIT_ARGS; i++)
334 argv_init[i] = NULL;
335 return 1;
336}
337__setup("init=", init_setup);
338
ffdfc409
OJ
339static int __init rdinit_setup(char *str)
340{
341 unsigned int i;
342
343 ramdisk_execute_command = str;
344 /* See "auto" comment in init_setup */
345 for (i = 1; i < MAX_INIT_ARGS; i++)
346 argv_init[i] = NULL;
347 return 1;
348}
349__setup("rdinit=", rdinit_setup);
350
1da177e4 351#ifndef CONFIG_SMP
34db18a0 352static const unsigned int setup_max_cpus = NR_CPUS;
1da177e4
LT
353#ifdef CONFIG_X86_LOCAL_APIC
354static void __init smp_init(void)
355{
356 APIC_init_uniprocessor();
357}
358#else
359#define smp_init() do { } while (0)
360#endif
361
e0982e90 362static inline void setup_nr_cpu_ids(void) { }
1da177e4 363static inline void smp_prepare_cpus(unsigned int maxcpus) { }
1da177e4
LT
364#endif
365
30d7e0d4
ABL
366/*
367 * We need to store the untouched command line for future reference.
368 * We also need to store the touched command line since the parameter
369 * parsing is performed in place, and we should allow a component to
370 * store reference of name/value for future reference.
371 */
372static void __init setup_command_line(char *command_line)
373{
098b081b
SS
374 saved_command_line =
375 memblock_virt_alloc(strlen(boot_command_line) + 1, 0);
376 initcall_command_line =
377 memblock_virt_alloc(strlen(boot_command_line) + 1, 0);
378 static_command_line = memblock_virt_alloc(strlen(command_line) + 1, 0);
30d7e0d4
ABL
379 strcpy (saved_command_line, boot_command_line);
380 strcpy (static_command_line, command_line);
381}
382
1da177e4
LT
383/*
384 * We need to finalize in a non-__init function or else race conditions
385 * between the root thread and the init thread may cause start_kernel to
386 * be reaped by free_initmem before the root thread has proceeded to
387 * cpu_idle.
388 *
389 * gcc-3.4 accidentally inlines this function, so use noinline.
390 */
391
b433c3d4
PZ
392static __initdata DECLARE_COMPLETION(kthreadd_done);
393
f99ebf0a 394static noinline void __init_refok rest_init(void)
1da177e4 395{
73c27992
EB
396 int pid;
397
7db905e6 398 rcu_scheduler_starting();
b433c3d4 399 /*
97158569 400 * We need to spawn init first so that it obtains pid 1, however
b433c3d4
PZ
401 * the init task will end up wanting to create kthreads, which, if
402 * we schedule it before we create kthreadd, will OOPS.
403 */
34a1b723 404 kernel_thread(kernel_init, NULL, CLONE_FS);
1da177e4 405 numa_default_policy();
73c27992 406 pid = kernel_thread(kthreadd, NULL, CLONE_FS | CLONE_FILES);
d11c563d 407 rcu_read_lock();
5cd20455 408 kthreadd_task = find_task_by_pid_ns(pid, &init_pid_ns);
d11c563d 409 rcu_read_unlock();
b433c3d4 410 complete(&kthreadd_done);
f340c0d1
IM
411
412 /*
413 * The boot idle thread must execute schedule()
1df21055 414 * at least once to get things moving:
f340c0d1 415 */
1df21055 416 init_idle_bootup_task(current);
bd2f5536 417 schedule_preempt_disabled();
5bfb5d69 418 /* Call into cpu_idle with preempt disabled */
a1a04ec3 419 cpu_startup_entry(CPUHP_ONLINE);
1df21055 420}
1da177e4
LT
421
422/* Check for early params. */
9fb48c74 423static int __init do_early_param(char *param, char *val, const char *unused)
1da177e4 424{
914dcaa8 425 const struct obs_kernel_param *p;
1da177e4
LT
426
427 for (p = __setup_start; p < __setup_end; p++) {
b1e4d20c 428 if ((p->early && parameq(param, p->str)) ||
18a8bd94
YL
429 (strcmp(param, "console") == 0 &&
430 strcmp(p->str, "earlycon") == 0)
431 ) {
1da177e4 432 if (p->setup_func(val) != 0)
ea676e84 433 pr_warn("Malformed early option '%s'\n", param);
1da177e4
LT
434 }
435 }
436 /* We accept everything at this stage. */
437 return 0;
438}
439
13977091
MD
440void __init parse_early_options(char *cmdline)
441{
026cee00 442 parse_args("early options", cmdline, NULL, 0, 0, 0, do_early_param);
13977091
MD
443}
444
1da177e4
LT
445/* Arch code calls this early on, or if not, just before other parsing. */
446void __init parse_early_param(void)
447{
448 static __initdata int done = 0;
449 static __initdata char tmp_cmdline[COMMAND_LINE_SIZE];
450
451 if (done)
452 return;
453
454 /* All fall through to do_early_param. */
30d7e0d4 455 strlcpy(tmp_cmdline, boot_command_line, COMMAND_LINE_SIZE);
13977091 456 parse_early_options(tmp_cmdline);
1da177e4
LT
457 done = 1;
458}
459
460/*
461 * Activate the first processor.
462 */
463
44fd2299
SS
464static void __init boot_cpu_init(void)
465{
466 int cpu = smp_processor_id();
467 /* Mark the boot cpu "present", "online" etc for SMP and UP case */
915441b6 468 set_cpu_online(cpu, true);
933b0618 469 set_cpu_active(cpu, true);
915441b6
RR
470 set_cpu_present(cpu, true);
471 set_cpu_possible(cpu, true);
44fd2299
SS
472}
473
839ad62e 474void __init __weak smp_setup_processor_id(void)
033ab7f8
AM
475{
476}
477
eded09cc 478# if THREAD_SIZE >= PAGE_SIZE
8c9843e5
BH
479void __init __weak thread_info_cache_init(void)
480{
481}
eded09cc 482#endif
8c9843e5 483
444f478f
PE
484/*
485 * Set up kernel memory allocators
486 */
487static void __init mm_init(void)
488{
ca371c0d 489 /*
7fa87ce7
JC
490 * page_cgroup requires contiguous pages,
491 * bigger than MAX_ORDER unless SPARSEMEM.
ca371c0d
KH
492 */
493 page_cgroup_init_flatmem();
444f478f
PE
494 mem_init();
495 kmem_cache_init();
099a19d9 496 percpu_init_late();
b35f1819 497 pgtable_init();
444f478f
PE
498 vmalloc_init();
499}
500
722a9f92 501asmlinkage __visible void __init start_kernel(void)
1da177e4 502{
51e158c1 503 char * command_line, *after_dashes;
914dcaa8 504 extern const struct kernel_param __start___param[], __stop___param[];
033ab7f8 505
fbb9ce95
IM
506 /*
507 * Need to run as early as possible, to initialize the
508 * lockdep hash:
509 */
510 lockdep_init();
73839c5b 511 smp_setup_processor_id();
3ac7fe5a 512 debug_objects_early_init();
42059429
IM
513
514 /*
515 * Set up the the initial canary ASAP:
516 */
517 boot_init_stack_canary();
518
ddbcc7e8 519 cgroup_init_early();
fbb9ce95
IM
520
521 local_irq_disable();
2ce802f6 522 early_boot_irqs_disabled = true;
fbb9ce95 523
1da177e4
LT
524/*
525 * Interrupts are still disabled. Do necessary setups, then
526 * enable them
527 */
44fd2299 528 boot_cpu_init();
1da177e4 529 page_address_init();
ea676e84 530 pr_notice("%s", linux_banner);
1da177e4 531 setup_arch(&command_line);
6345d24d 532 mm_init_cpumask(&init_mm);
30d7e0d4 533 setup_command_line(command_line);
e0982e90 534 setup_nr_cpu_ids();
d6647bdf 535 setup_per_cpu_areas();
44fd2299 536 smp_prepare_boot_cpu(); /* arch-specific boot-cpu hooks */
1da177e4 537
9adb62a5 538 build_all_zonelists(NULL, NULL);
83b519e8
PE
539 page_alloc_init();
540
ea676e84 541 pr_notice("Kernel command line: %s\n", boot_command_line);
83b519e8 542 parse_early_param();
51e158c1
RR
543 after_dashes = parse_args("Booting kernel",
544 static_command_line, __start___param,
545 __stop___param - __start___param,
546 -1, -1, &unknown_bootoption);
547 if (after_dashes)
548 parse_args("Setting init args", after_dashes, NULL, 0, -1, -1,
549 set_init_arg);
97ce2c88
JF
550
551 jump_label_init();
552
83b519e8
PE
553 /*
554 * These use large bootmem allocations and must precede
555 * kmem_cache_init()
556 */
162a7e75 557 setup_log_buf(0);
83b519e8 558 pidhash_init();
83b519e8
PE
559 vfs_caches_init_early();
560 sort_main_extable();
561 trap_init();
444f478f 562 mm_init();
de03c72c 563
1da177e4
LT
564 /*
565 * Set up the scheduler prior starting any interrupts (such as the
566 * timer interrupt). Full topology setup happens at smp_init()
567 * time - but meanwhile we still have a functioning scheduler.
568 */
569 sched_init();
570 /*
571 * Disable preemption - early bootup scheduling is extremely
572 * fragile until we cpu_idle() for the first time.
573 */
574 preempt_disable();
f91eb62f 575 if (WARN(!irqs_disabled(), "Interrupts were enabled *very* early, fixing it\n"))
c4a68306 576 local_irq_disable();
9f58a205 577 idr_init_cache();
1da177e4 578 rcu_init();
d1e43fa5 579 tick_nohz_init();
65f382fd 580 context_tracking_init();
773e3eb7 581 radix_tree_init();
0b8f1efa
YL
582 /* init some links before init_ISA_irqs() */
583 early_irq_init();
1da177e4 584 init_IRQ();
ad2b1353 585 tick_init();
1da177e4 586 init_timers();
c0a31329 587 hrtimers_init();
1da177e4 588 softirq_init();
ad596171 589 timekeeping_init();
88fecaa2 590 time_init();
38ff87f7 591 sched_clock_postinit();
9e630205 592 perf_event_init();
93e02814 593 profile_init();
d8ad7d11 594 call_function_init();
f91eb62f 595 WARN(!irqs_disabled(), "Interrupts were enabled early\n");
2ce802f6 596 early_boot_irqs_disabled = false;
93e02814 597 local_irq_enable();
dcce284a 598
7e85ee0c 599 kmem_cache_init_late();
1da177e4
LT
600
601 /*
602 * HACK ALERT! This is early. We're enabling the console before
603 * we've done PCI setups etc, and console_init() must be aware of
604 * this. But we do want output early, in case something goes wrong.
605 */
606 console_init();
607 if (panic_later)
499a4584
TH
608 panic("Too many boot %s vars at `%s'", panic_later,
609 panic_param);
fbb9ce95
IM
610
611 lockdep_info();
612
9a11b49a
IM
613 /*
614 * Need to run this when irqs are enabled, because it wants
615 * to self-test [hard/soft]-irqs on/off lock inversion bugs
616 * too:
617 */
618 locking_selftest();
619
1da177e4
LT
620#ifdef CONFIG_BLK_DEV_INITRD
621 if (initrd_start && !initrd_below_start_ok &&
bd673c7c 622 page_to_pfn(virt_to_page((void *)initrd_start)) < min_low_pfn) {
ea676e84 623 pr_crit("initrd overwritten (0x%08lx < 0x%08lx) - disabling it.\n",
bd673c7c
GU
624 page_to_pfn(virt_to_page((void *)initrd_start)),
625 min_low_pfn);
1da177e4
LT
626 initrd_start = 0;
627 }
628#endif
94b6da5a 629 page_cgroup_init();
3ac7fe5a 630 debug_objects_mem_init();
9b090f2d 631 kmemleak_init();
e7c8d5c9 632 setup_per_cpu_pageset();
1da177e4
LT
633 numa_policy_init();
634 if (late_time_init)
635 late_time_init();
fa84e9ee 636 sched_clock_init();
1da177e4
LT
637 calibrate_delay();
638 pidmap_init();
1da177e4 639 anon_vma_init();
c4e1acbb 640 acpi_early_init();
11520e5e 641#ifdef CONFIG_X86
83e68189 642 if (efi_enabled(EFI_RUNTIME_SERVICES))
11520e5e 643 efi_enter_virtual_mode();
3891a04a 644#endif
197725de 645#ifdef CONFIG_X86_ESPFIX64
3891a04a
PA
646 /* Should be run before the first non-init thread is created */
647 init_espfix_bsp();
11520e5e 648#endif
8c9843e5 649 thread_info_cache_init();
d84f4f99 650 cred_init();
4481374c 651 fork_init(totalram_pages);
1da177e4
LT
652 proc_caches_init();
653 buffer_init();
1da177e4
LT
654 key_init();
655 security_init();
0b4b3827 656 dbg_late_init();
4481374c 657 vfs_caches_init(totalram_pages);
1da177e4
LT
658 signals_init();
659 /* rootfs populating might need page-writeback */
660 page_writeback_init();
1da177e4 661 proc_root_init();
ddbcc7e8 662 cgroup_init();
1da177e4 663 cpuset_init();
c757249a 664 taskstats_init_early();
ca74e92b 665 delayacct_init();
1da177e4
LT
666
667 check_bugs();
668
6ae6996a 669 sfi_init_late();
1da177e4 670
83e68189 671 if (efi_enabled(EFI_RUNTIME_SERVICES)) {
2223af38 672 efi_late_init();
78510792 673 efi_free_boot_services();
2223af38 674 }
78510792 675
68bf21aa
SR
676 ftrace_init();
677
1da177e4
LT
678 /* Do the rest non-__init'ed, we're now alive */
679 rest_init();
680}
681
b99b87f7
PO
682/* Call all constructor functions linked into the kernel. */
683static void __init do_ctors(void)
684{
685#ifdef CONFIG_CONSTRUCTORS
196a15b4 686 ctor_fn_t *fn = (ctor_fn_t *) __ctors_start;
b99b87f7 687
196a15b4
HS
688 for (; fn < (ctor_fn_t *) __ctors_end; fn++)
689 (*fn)();
b99b87f7
PO
690#endif
691}
692
2329abfa 693bool initcall_debug;
d0ea3d7d 694core_param(initcall_debug, initcall_debug, bool, 0644);
1da177e4 695
7b0b73d7
PB
696#ifdef CONFIG_KALLSYMS
697struct blacklist_entry {
698 struct list_head next;
699 char *buf;
700};
701
702static __initdata_or_module LIST_HEAD(blacklisted_initcalls);
703
704static int __init initcall_blacklist(char *str)
705{
706 char *str_entry;
707 struct blacklist_entry *entry;
708
709 /* str argument is a comma-separated list of functions */
710 do {
711 str_entry = strsep(&str, ",");
712 if (str_entry) {
713 pr_debug("blacklisting initcall %s\n", str_entry);
714 entry = alloc_bootmem(sizeof(*entry));
715 entry->buf = alloc_bootmem(strlen(str_entry) + 1);
716 strcpy(entry->buf, str_entry);
717 list_add(&entry->next, &blacklisted_initcalls);
718 }
719 } while (str_entry);
720
721 return 0;
722}
723
724static bool __init_or_module initcall_blacklisted(initcall_t fn)
725{
726 struct list_head *tmp;
727 struct blacklist_entry *entry;
728 char *fn_name;
729
730 fn_name = kasprintf(GFP_KERNEL, "%pf", fn);
731 if (!fn_name)
732 return false;
733
734 list_for_each(tmp, &blacklisted_initcalls) {
735 entry = list_entry(tmp, struct blacklist_entry, next);
736 if (!strcmp(fn_name, entry->buf)) {
737 pr_debug("initcall %s blacklisted\n", fn_name);
738 kfree(fn_name);
739 return true;
740 }
741 }
742
743 kfree(fn_name);
744 return false;
745}
746#else
747static int __init initcall_blacklist(char *str)
748{
749 pr_warn("initcall_blacklist requires CONFIG_KALLSYMS\n");
750 return 0;
751}
752
753static bool __init_or_module initcall_blacklisted(initcall_t fn)
754{
755 return false;
756}
757#endif
758__setup("initcall_blacklist=", initcall_blacklist);
759
e4461271 760static int __init_or_module do_one_initcall_debug(initcall_t fn)
1da177e4 761{
74239072 762 ktime_t calltime, delta, rettime;
30dbb20e
AW
763 unsigned long long duration;
764 int ret;
1da177e4 765
d62cf815 766 printk(KERN_DEBUG "calling %pF @ %i\n", fn, task_pid_nr(current));
22c5c03b 767 calltime = ktime_get();
30dbb20e 768 ret = fn();
22c5c03b
KW
769 rettime = ktime_get();
770 delta = ktime_sub(rettime, calltime);
771 duration = (unsigned long long) ktime_to_ns(delta) >> 10;
d62cf815 772 printk(KERN_DEBUG "initcall %pF returned %d after %lld usecs\n",
ea676e84 773 fn, ret, duration);
1da177e4 774
22c5c03b
KW
775 return ret;
776}
777
e4461271 778int __init_or_module do_one_initcall(initcall_t fn)
22c5c03b
KW
779{
780 int count = preempt_count();
781 int ret;
ff1c8fac 782 char msgbuf[64];
22c5c03b 783
7b0b73d7
PB
784 if (initcall_blacklisted(fn))
785 return -EPERM;
786
22c5c03b
KW
787 if (initcall_debug)
788 ret = do_one_initcall_debug(fn);
789 else
790 ret = fn();
8f0c45cd 791
e0df154f 792 msgbuf[0] = 0;
e662e1cf 793
e0df154f 794 if (preempt_count() != count) {
bf5d770b 795 sprintf(msgbuf, "preemption imbalance ");
4a2b4b22 796 preempt_count_set(count);
1da177e4 797 }
e0df154f 798 if (irqs_disabled()) {
a76bfd0d 799 strlcat(msgbuf, "disabled interrupts ", sizeof(msgbuf));
e0df154f
LT
800 local_irq_enable();
801 }
f91eb62f 802 WARN(msgbuf[0], "initcall %pF returned with %s\n", fn, msgbuf);
59f9415f 803
30dbb20e 804 return ret;
e0df154f
LT
805}
806
807
026cee00
PM
808extern initcall_t __initcall_start[];
809extern initcall_t __initcall0_start[];
810extern initcall_t __initcall1_start[];
811extern initcall_t __initcall2_start[];
812extern initcall_t __initcall3_start[];
813extern initcall_t __initcall4_start[];
814extern initcall_t __initcall5_start[];
815extern initcall_t __initcall6_start[];
816extern initcall_t __initcall7_start[];
817extern initcall_t __initcall_end[];
818
819static initcall_t *initcall_levels[] __initdata = {
820 __initcall0_start,
821 __initcall1_start,
822 __initcall2_start,
823 __initcall3_start,
824 __initcall4_start,
825 __initcall5_start,
826 __initcall6_start,
827 __initcall7_start,
828 __initcall_end,
829};
830
96263d28 831/* Keep these in sync with initcalls in include/linux/init.h */
026cee00 832static char *initcall_level_names[] __initdata = {
9fb48c74
JC
833 "early",
834 "core",
835 "postcore",
836 "arch",
837 "subsys",
838 "fs",
839 "device",
840 "late",
026cee00
PM
841};
842
026cee00 843static void __init do_initcall_level(int level)
e0df154f 844{
026cee00 845 extern const struct kernel_param __start___param[], __stop___param[];
196a15b4 846 initcall_t *fn;
e0df154f 847
08746a65 848 strcpy(initcall_command_line, saved_command_line);
026cee00 849 parse_args(initcall_level_names[level],
08746a65 850 initcall_command_line, __start___param,
026cee00
PM
851 __stop___param - __start___param,
852 level, level,
eb157427 853 &repair_env_string);
026cee00
PM
854
855 for (fn = initcall_levels[level]; fn < initcall_levels[level+1]; fn++)
196a15b4 856 do_one_initcall(*fn);
1da177e4
LT
857}
858
026cee00
PM
859static void __init do_initcalls(void)
860{
861 int level;
862
19efb72f 863 for (level = 0; level < ARRAY_SIZE(initcall_levels) - 1; level++)
026cee00
PM
864 do_initcall_level(level);
865}
866
1da177e4
LT
867/*
868 * Ok, the machine is now initialized. None of the devices
869 * have been touched yet, but the CPU subsystem is up and
870 * running, and memory and process management works.
871 *
872 * Now we can finally start doing some real work..
873 */
874static void __init do_basic_setup(void)
875{
759ee091 876 cpuset_init_smp();
1da177e4 877 usermodehelper_init();
41ffe5d5 878 shmem_init();
1da177e4 879 driver_init();
b04c3afb 880 init_irq_proc();
b99b87f7 881 do_ctors();
d5767c53 882 usermodehelper_enable();
b0f84374 883 do_initcalls();
47d06e53 884 random_int_secret_init();
1da177e4
LT
885}
886
7babe8db 887static void __init do_pre_smp_initcalls(void)
c2147a50 888{
196a15b4 889 initcall_t *fn;
c2147a50 890
026cee00 891 for (fn = __initcall_start; fn < __initcall0_start; fn++)
196a15b4 892 do_one_initcall(*fn);
c2147a50
EGM
893}
894
bb813f4c
TH
895/*
896 * This function requests modules which should be loaded by default and is
897 * called twice right after initrd is mounted and right before init is
898 * exec'd. If such modules are on either initrd or rootfs, they will be
899 * loaded before control is passed to userland.
900 */
901void __init load_default_modules(void)
902{
903 load_default_elevator_module();
904}
905
a74fb73c 906static int run_init_process(const char *init_filename)
1da177e4
LT
907{
908 argv_init[0] = init_filename;
c4ad8f98 909 return do_execve(getname_kernel(init_filename),
ae903caa
AV
910 (const char __user *const __user *)argv_init,
911 (const char __user *const __user *)envp_init);
1da177e4
LT
912}
913
ba24762b
MO
914static int try_to_run_init_process(const char *init_filename)
915{
916 int ret;
917
918 ret = run_init_process(init_filename);
919
920 if (ret && ret != -ENOENT) {
921 pr_err("Starting init: %s exists but couldn't execute it (error %d)\n",
922 init_filename, ret);
923 }
924
925 return ret;
926}
927
f80b0c90 928static noinline void __init kernel_init_freeable(void);
d6b21238
AV
929
930static int __ref kernel_init(void *unused)
ee5bfa64 931{
ba24762b
MO
932 int ret;
933
d6b21238 934 kernel_init_freeable();
22a9d645
AV
935 /* need to finish all async __init code before freeing the memory */
936 async_synchronize_full();
ee5bfa64 937 free_initmem();
ee5bfa64
VG
938 mark_rodata_ro();
939 system_state = SYSTEM_RUNNING;
940 numa_default_policy();
941
4a9d4b02 942 flush_delayed_fput();
fae5fa44 943
ee5bfa64 944 if (ramdisk_execute_command) {
ba24762b
MO
945 ret = run_init_process(ramdisk_execute_command);
946 if (!ret)
a74fb73c 947 return 0;
ba24762b
MO
948 pr_err("Failed to execute %s (error %d)\n",
949 ramdisk_execute_command, ret);
ee5bfa64
VG
950 }
951
952 /*
953 * We try each of these until one succeeds.
954 *
955 * The Bourne shell can be used instead of init if we are
956 * trying to recover a really broken machine.
957 */
958 if (execute_command) {
ba24762b
MO
959 ret = run_init_process(execute_command);
960 if (!ret)
a74fb73c 961 return 0;
ba24762b
MO
962 pr_err("Failed to execute %s (error %d). Attempting defaults...\n",
963 execute_command, ret);
ee5bfa64 964 }
ba24762b
MO
965 if (!try_to_run_init_process("/sbin/init") ||
966 !try_to_run_init_process("/etc/init") ||
967 !try_to_run_init_process("/bin/init") ||
968 !try_to_run_init_process("/bin/sh"))
a74fb73c 969 return 0;
ee5bfa64 970
ba24762b 971 panic("No working init found. Try passing init= option to kernel. "
9a85b8d6 972 "See Linux Documentation/init.txt for guidance.");
ee5bfa64
VG
973}
974
f80b0c90 975static noinline void __init kernel_init_freeable(void)
1da177e4 976{
b433c3d4
PZ
977 /*
978 * Wait until kthreadd is all set-up.
979 */
980 wait_for_completion(&kthreadd_done);
31a67102
LT
981
982 /* Now the scheduler is fully set up and can do blocking allocations */
983 gfp_allowed_mask = __GFP_BITS_MASK;
984
58568d2a
MX
985 /*
986 * init can allocate pages on any node
987 */
3c466d46 988 set_mems_allowed(node_states[N_MEMORY]);
1da177e4
LT
989 /*
990 * init can run on any cpu.
991 */
1a2142af 992 set_cpus_allowed_ptr(current, cpu_all_mask);
1da177e4 993
9ec52099
CLG
994 cad_pid = task_pid(current);
995
ca74a6f8 996 smp_prepare_cpus(setup_max_cpus);
1da177e4
LT
997
998 do_pre_smp_initcalls();
004417a6 999 lockup_detector_init();
1da177e4 1000
1da177e4
LT
1001 smp_init();
1002 sched_init_smp();
1003
1da177e4
LT
1004 do_basic_setup();
1005
2bd3a997
EB
1006 /* Open the /dev/console on the rootfs, this should never fail */
1007 if (sys_open((const char __user *) "/dev/console", O_RDWR, 0) < 0)
ea676e84 1008 pr_err("Warning: unable to open an initial console.\n");
2bd3a997
EB
1009
1010 (void) sys_dup(0);
1011 (void) sys_dup(0);
1da177e4
LT
1012 /*
1013 * check if there is an early userspace init. If yes, let it do all
1014 * the work
1015 */
ffdfc409
OJ
1016
1017 if (!ramdisk_execute_command)
1018 ramdisk_execute_command = "/init";
1019
1020 if (sys_access((const char __user *) ramdisk_execute_command, 0) != 0) {
1021 ramdisk_execute_command = NULL;
1da177e4 1022 prepare_namespace();
ffdfc409 1023 }
1da177e4
LT
1024
1025 /*
1026 * Ok, we have completed the initial bootup, and
1027 * we're essentially up and running. Get rid of the
1028 * initmem segments and start the user-mode stuff..
1029 */
bb813f4c
TH
1030
1031 /* rootfs is available now, try loading default modules */
1032 load_default_modules();
1da177e4 1033}
This page took 1.038386 seconds and 5 git commands to generate.