xref: /openbmc/linux/kernel/reboot.c (revision 8bdc2a19)
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  *  linux/kernel/reboot.c
4  *
5  *  Copyright (C) 2013  Linus Torvalds
6  */
7 
8 #define pr_fmt(fmt)	"reboot: " fmt
9 
10 #include <linux/atomic.h>
11 #include <linux/ctype.h>
12 #include <linux/export.h>
13 #include <linux/kexec.h>
14 #include <linux/kmod.h>
15 #include <linux/kmsg_dump.h>
16 #include <linux/reboot.h>
17 #include <linux/suspend.h>
18 #include <linux/syscalls.h>
19 #include <linux/syscore_ops.h>
20 #include <linux/uaccess.h>
21 
22 /*
23  * this indicates whether you can reboot with ctrl-alt-del: the default is yes
24  */
25 
26 static int C_A_D = 1;
27 struct pid *cad_pid;
28 EXPORT_SYMBOL(cad_pid);
29 
30 #if defined(CONFIG_ARM)
31 #define DEFAULT_REBOOT_MODE		= REBOOT_HARD
32 #else
33 #define DEFAULT_REBOOT_MODE
34 #endif
35 enum reboot_mode reboot_mode DEFAULT_REBOOT_MODE;
36 EXPORT_SYMBOL_GPL(reboot_mode);
37 enum reboot_mode panic_reboot_mode = REBOOT_UNDEFINED;
38 
39 /*
40  * This variable is used privately to keep track of whether or not
41  * reboot_type is still set to its default value (i.e., reboot= hasn't
42  * been set on the command line).  This is needed so that we can
43  * suppress DMI scanning for reboot quirks.  Without it, it's
44  * impossible to override a faulty reboot quirk without recompiling.
45  */
46 int reboot_default = 1;
47 int reboot_cpu;
48 enum reboot_type reboot_type = BOOT_ACPI;
49 int reboot_force;
50 
51 /*
52  * If set, this is used for preparing the system to power off.
53  */
54 
55 void (*pm_power_off_prepare)(void);
56 EXPORT_SYMBOL_GPL(pm_power_off_prepare);
57 
58 /**
59  *	emergency_restart - reboot the system
60  *
61  *	Without shutting down any hardware or taking any locks
62  *	reboot the system.  This is called when we know we are in
63  *	trouble so this is our best effort to reboot.  This is
64  *	safe to call in interrupt context.
65  */
66 void emergency_restart(void)
67 {
68 	kmsg_dump(KMSG_DUMP_EMERG);
69 	machine_emergency_restart();
70 }
71 EXPORT_SYMBOL_GPL(emergency_restart);
72 
73 void kernel_restart_prepare(char *cmd)
74 {
75 	blocking_notifier_call_chain(&reboot_notifier_list, SYS_RESTART, cmd);
76 	system_state = SYSTEM_RESTART;
77 	usermodehelper_disable();
78 	device_shutdown();
79 }
80 
81 /**
82  *	register_reboot_notifier - Register function to be called at reboot time
83  *	@nb: Info about notifier function to be called
84  *
85  *	Registers a function with the list of functions
86  *	to be called at reboot time.
87  *
88  *	Currently always returns zero, as blocking_notifier_chain_register()
89  *	always returns zero.
90  */
91 int register_reboot_notifier(struct notifier_block *nb)
92 {
93 	return blocking_notifier_chain_register(&reboot_notifier_list, nb);
94 }
95 EXPORT_SYMBOL(register_reboot_notifier);
96 
97 /**
98  *	unregister_reboot_notifier - Unregister previously registered reboot notifier
99  *	@nb: Hook to be unregistered
100  *
101  *	Unregisters a previously registered reboot
102  *	notifier function.
103  *
104  *	Returns zero on success, or %-ENOENT on failure.
105  */
106 int unregister_reboot_notifier(struct notifier_block *nb)
107 {
108 	return blocking_notifier_chain_unregister(&reboot_notifier_list, nb);
109 }
110 EXPORT_SYMBOL(unregister_reboot_notifier);
111 
112 static void devm_unregister_reboot_notifier(struct device *dev, void *res)
113 {
114 	WARN_ON(unregister_reboot_notifier(*(struct notifier_block **)res));
115 }
116 
117 int devm_register_reboot_notifier(struct device *dev, struct notifier_block *nb)
118 {
119 	struct notifier_block **rcnb;
120 	int ret;
121 
122 	rcnb = devres_alloc(devm_unregister_reboot_notifier,
123 			    sizeof(*rcnb), GFP_KERNEL);
124 	if (!rcnb)
125 		return -ENOMEM;
126 
127 	ret = register_reboot_notifier(nb);
128 	if (!ret) {
129 		*rcnb = nb;
130 		devres_add(dev, rcnb);
131 	} else {
132 		devres_free(rcnb);
133 	}
134 
135 	return ret;
136 }
137 EXPORT_SYMBOL(devm_register_reboot_notifier);
138 
139 /*
140  *	Notifier list for kernel code which wants to be called
141  *	to restart the system.
142  */
143 static ATOMIC_NOTIFIER_HEAD(restart_handler_list);
144 
145 /**
146  *	register_restart_handler - Register function to be called to reset
147  *				   the system
148  *	@nb: Info about handler function to be called
149  *	@nb->priority:	Handler priority. Handlers should follow the
150  *			following guidelines for setting priorities.
151  *			0:	Restart handler of last resort,
152  *				with limited restart capabilities
153  *			128:	Default restart handler; use if no other
154  *				restart handler is expected to be available,
155  *				and/or if restart functionality is
156  *				sufficient to restart the entire system
157  *			255:	Highest priority restart handler, will
158  *				preempt all other restart handlers
159  *
160  *	Registers a function with code to be called to restart the
161  *	system.
162  *
163  *	Registered functions will be called from machine_restart as last
164  *	step of the restart sequence (if the architecture specific
165  *	machine_restart function calls do_kernel_restart - see below
166  *	for details).
167  *	Registered functions are expected to restart the system immediately.
168  *	If more than one function is registered, the restart handler priority
169  *	selects which function will be called first.
170  *
171  *	Restart handlers are expected to be registered from non-architecture
172  *	code, typically from drivers. A typical use case would be a system
173  *	where restart functionality is provided through a watchdog. Multiple
174  *	restart handlers may exist; for example, one restart handler might
175  *	restart the entire system, while another only restarts the CPU.
176  *	In such cases, the restart handler which only restarts part of the
177  *	hardware is expected to register with low priority to ensure that
178  *	it only runs if no other means to restart the system is available.
179  *
180  *	Currently always returns zero, as atomic_notifier_chain_register()
181  *	always returns zero.
182  */
183 int register_restart_handler(struct notifier_block *nb)
184 {
185 	return atomic_notifier_chain_register(&restart_handler_list, nb);
186 }
187 EXPORT_SYMBOL(register_restart_handler);
188 
189 /**
190  *	unregister_restart_handler - Unregister previously registered
191  *				     restart handler
192  *	@nb: Hook to be unregistered
193  *
194  *	Unregisters a previously registered restart handler function.
195  *
196  *	Returns zero on success, or %-ENOENT on failure.
197  */
198 int unregister_restart_handler(struct notifier_block *nb)
199 {
200 	return atomic_notifier_chain_unregister(&restart_handler_list, nb);
201 }
202 EXPORT_SYMBOL(unregister_restart_handler);
203 
204 /**
205  *	do_kernel_restart - Execute kernel restart handler call chain
206  *
207  *	Calls functions registered with register_restart_handler.
208  *
209  *	Expected to be called from machine_restart as last step of the restart
210  *	sequence.
211  *
212  *	Restarts the system immediately if a restart handler function has been
213  *	registered. Otherwise does nothing.
214  */
215 void do_kernel_restart(char *cmd)
216 {
217 	atomic_notifier_call_chain(&restart_handler_list, reboot_mode, cmd);
218 }
219 
220 void migrate_to_reboot_cpu(void)
221 {
222 	/* The boot cpu is always logical cpu 0 */
223 	int cpu = reboot_cpu;
224 
225 	cpu_hotplug_disable();
226 
227 	/* Make certain the cpu I'm about to reboot on is online */
228 	if (!cpu_online(cpu))
229 		cpu = cpumask_first(cpu_online_mask);
230 
231 	/* Prevent races with other tasks migrating this task */
232 	current->flags |= PF_NO_SETAFFINITY;
233 
234 	/* Make certain I only run on the appropriate processor */
235 	set_cpus_allowed_ptr(current, cpumask_of(cpu));
236 }
237 
238 /**
239  *	kernel_restart - reboot the system
240  *	@cmd: pointer to buffer containing command to execute for restart
241  *		or %NULL
242  *
243  *	Shutdown everything and perform a clean reboot.
244  *	This is not safe to call in interrupt context.
245  */
246 void kernel_restart(char *cmd)
247 {
248 	kernel_restart_prepare(cmd);
249 	migrate_to_reboot_cpu();
250 	syscore_shutdown();
251 	if (!cmd)
252 		pr_emerg("Restarting system\n");
253 	else
254 		pr_emerg("Restarting system with command '%s'\n", cmd);
255 	kmsg_dump(KMSG_DUMP_SHUTDOWN);
256 	machine_restart(cmd);
257 }
258 EXPORT_SYMBOL_GPL(kernel_restart);
259 
260 static void kernel_shutdown_prepare(enum system_states state)
261 {
262 	blocking_notifier_call_chain(&reboot_notifier_list,
263 		(state == SYSTEM_HALT) ? SYS_HALT : SYS_POWER_OFF, NULL);
264 	system_state = state;
265 	usermodehelper_disable();
266 	device_shutdown();
267 }
268 /**
269  *	kernel_halt - halt the system
270  *
271  *	Shutdown everything and perform a clean system halt.
272  */
273 void kernel_halt(void)
274 {
275 	kernel_shutdown_prepare(SYSTEM_HALT);
276 	migrate_to_reboot_cpu();
277 	syscore_shutdown();
278 	pr_emerg("System halted\n");
279 	kmsg_dump(KMSG_DUMP_SHUTDOWN);
280 	machine_halt();
281 }
282 EXPORT_SYMBOL_GPL(kernel_halt);
283 
284 /**
285  *	kernel_power_off - power_off the system
286  *
287  *	Shutdown everything and perform a clean system power_off.
288  */
289 void kernel_power_off(void)
290 {
291 	kernel_shutdown_prepare(SYSTEM_POWER_OFF);
292 	if (pm_power_off_prepare)
293 		pm_power_off_prepare();
294 	migrate_to_reboot_cpu();
295 	syscore_shutdown();
296 	pr_emerg("Power down\n");
297 	kmsg_dump(KMSG_DUMP_SHUTDOWN);
298 	machine_power_off();
299 }
300 EXPORT_SYMBOL_GPL(kernel_power_off);
301 
302 DEFINE_MUTEX(system_transition_mutex);
303 
304 /*
305  * Reboot system call: for obvious reasons only root may call it,
306  * and even root needs to set up some magic numbers in the registers
307  * so that some mistake won't make this reboot the whole machine.
308  * You can also set the meaning of the ctrl-alt-del-key here.
309  *
310  * reboot doesn't sync: do that yourself before calling this.
311  */
312 SYSCALL_DEFINE4(reboot, int, magic1, int, magic2, unsigned int, cmd,
313 		void __user *, arg)
314 {
315 	struct pid_namespace *pid_ns = task_active_pid_ns(current);
316 	char buffer[256];
317 	int ret = 0;
318 
319 	/* We only trust the superuser with rebooting the system. */
320 	if (!ns_capable(pid_ns->user_ns, CAP_SYS_BOOT))
321 		return -EPERM;
322 
323 	/* For safety, we require "magic" arguments. */
324 	if (magic1 != LINUX_REBOOT_MAGIC1 ||
325 			(magic2 != LINUX_REBOOT_MAGIC2 &&
326 			magic2 != LINUX_REBOOT_MAGIC2A &&
327 			magic2 != LINUX_REBOOT_MAGIC2B &&
328 			magic2 != LINUX_REBOOT_MAGIC2C))
329 		return -EINVAL;
330 
331 	/*
332 	 * If pid namespaces are enabled and the current task is in a child
333 	 * pid_namespace, the command is handled by reboot_pid_ns() which will
334 	 * call do_exit().
335 	 */
336 	ret = reboot_pid_ns(pid_ns, cmd);
337 	if (ret)
338 		return ret;
339 
340 	/* Instead of trying to make the power_off code look like
341 	 * halt when pm_power_off is not set do it the easy way.
342 	 */
343 	if ((cmd == LINUX_REBOOT_CMD_POWER_OFF) && !pm_power_off)
344 		cmd = LINUX_REBOOT_CMD_HALT;
345 
346 	mutex_lock(&system_transition_mutex);
347 	switch (cmd) {
348 	case LINUX_REBOOT_CMD_RESTART:
349 		kernel_restart(NULL);
350 		break;
351 
352 	case LINUX_REBOOT_CMD_CAD_ON:
353 		C_A_D = 1;
354 		break;
355 
356 	case LINUX_REBOOT_CMD_CAD_OFF:
357 		C_A_D = 0;
358 		break;
359 
360 	case LINUX_REBOOT_CMD_HALT:
361 		kernel_halt();
362 		do_exit(0);
363 
364 	case LINUX_REBOOT_CMD_POWER_OFF:
365 		kernel_power_off();
366 		do_exit(0);
367 		break;
368 
369 	case LINUX_REBOOT_CMD_RESTART2:
370 		ret = strncpy_from_user(&buffer[0], arg, sizeof(buffer) - 1);
371 		if (ret < 0) {
372 			ret = -EFAULT;
373 			break;
374 		}
375 		buffer[sizeof(buffer) - 1] = '\0';
376 
377 		kernel_restart(buffer);
378 		break;
379 
380 #ifdef CONFIG_KEXEC_CORE
381 	case LINUX_REBOOT_CMD_KEXEC:
382 		ret = kernel_kexec();
383 		break;
384 #endif
385 
386 #ifdef CONFIG_HIBERNATION
387 	case LINUX_REBOOT_CMD_SW_SUSPEND:
388 		ret = hibernate();
389 		break;
390 #endif
391 
392 	default:
393 		ret = -EINVAL;
394 		break;
395 	}
396 	mutex_unlock(&system_transition_mutex);
397 	return ret;
398 }
399 
400 static void deferred_cad(struct work_struct *dummy)
401 {
402 	kernel_restart(NULL);
403 }
404 
405 /*
406  * This function gets called by ctrl-alt-del - ie the keyboard interrupt.
407  * As it's called within an interrupt, it may NOT sync: the only choice
408  * is whether to reboot at once, or just ignore the ctrl-alt-del.
409  */
410 void ctrl_alt_del(void)
411 {
412 	static DECLARE_WORK(cad_work, deferred_cad);
413 
414 	if (C_A_D)
415 		schedule_work(&cad_work);
416 	else
417 		kill_cad_pid(SIGINT, 1);
418 }
419 
420 #define POWEROFF_CMD_PATH_LEN  256
421 static char poweroff_cmd[POWEROFF_CMD_PATH_LEN] = "/sbin/poweroff";
422 static const char reboot_cmd[] = "/sbin/reboot";
423 
424 static int run_cmd(const char *cmd)
425 {
426 	char **argv;
427 	static char *envp[] = {
428 		"HOME=/",
429 		"PATH=/sbin:/bin:/usr/sbin:/usr/bin",
430 		NULL
431 	};
432 	int ret;
433 	argv = argv_split(GFP_KERNEL, cmd, NULL);
434 	if (argv) {
435 		ret = call_usermodehelper(argv[0], argv, envp, UMH_WAIT_EXEC);
436 		argv_free(argv);
437 	} else {
438 		ret = -ENOMEM;
439 	}
440 
441 	return ret;
442 }
443 
444 static int __orderly_reboot(void)
445 {
446 	int ret;
447 
448 	ret = run_cmd(reboot_cmd);
449 
450 	if (ret) {
451 		printk_prefer_direct_enter();
452 		pr_warn("Failed to start orderly reboot: forcing the issue\n");
453 		emergency_sync();
454 		kernel_restart(NULL);
455 		printk_prefer_direct_exit();
456 	}
457 
458 	return ret;
459 }
460 
461 static int __orderly_poweroff(bool force)
462 {
463 	int ret;
464 
465 	ret = run_cmd(poweroff_cmd);
466 
467 	if (ret && force) {
468 		printk_prefer_direct_enter();
469 		pr_warn("Failed to start orderly shutdown: forcing the issue\n");
470 
471 		/*
472 		 * I guess this should try to kick off some daemon to sync and
473 		 * poweroff asap.  Or not even bother syncing if we're doing an
474 		 * emergency shutdown?
475 		 */
476 		emergency_sync();
477 		kernel_power_off();
478 		printk_prefer_direct_exit();
479 	}
480 
481 	return ret;
482 }
483 
484 static bool poweroff_force;
485 
486 static void poweroff_work_func(struct work_struct *work)
487 {
488 	__orderly_poweroff(poweroff_force);
489 }
490 
491 static DECLARE_WORK(poweroff_work, poweroff_work_func);
492 
493 /**
494  * orderly_poweroff - Trigger an orderly system poweroff
495  * @force: force poweroff if command execution fails
496  *
497  * This may be called from any context to trigger a system shutdown.
498  * If the orderly shutdown fails, it will force an immediate shutdown.
499  */
500 void orderly_poweroff(bool force)
501 {
502 	if (force) /* do not override the pending "true" */
503 		poweroff_force = true;
504 	schedule_work(&poweroff_work);
505 }
506 EXPORT_SYMBOL_GPL(orderly_poweroff);
507 
508 static void reboot_work_func(struct work_struct *work)
509 {
510 	__orderly_reboot();
511 }
512 
513 static DECLARE_WORK(reboot_work, reboot_work_func);
514 
515 /**
516  * orderly_reboot - Trigger an orderly system reboot
517  *
518  * This may be called from any context to trigger a system reboot.
519  * If the orderly reboot fails, it will force an immediate reboot.
520  */
521 void orderly_reboot(void)
522 {
523 	schedule_work(&reboot_work);
524 }
525 EXPORT_SYMBOL_GPL(orderly_reboot);
526 
527 /**
528  * hw_failure_emergency_poweroff_func - emergency poweroff work after a known delay
529  * @work: work_struct associated with the emergency poweroff function
530  *
531  * This function is called in very critical situations to force
532  * a kernel poweroff after a configurable timeout value.
533  */
534 static void hw_failure_emergency_poweroff_func(struct work_struct *work)
535 {
536 	printk_prefer_direct_enter();
537 
538 	/*
539 	 * We have reached here after the emergency shutdown waiting period has
540 	 * expired. This means orderly_poweroff has not been able to shut off
541 	 * the system for some reason.
542 	 *
543 	 * Try to shut down the system immediately using kernel_power_off
544 	 * if populated
545 	 */
546 	pr_emerg("Hardware protection timed-out. Trying forced poweroff\n");
547 	kernel_power_off();
548 
549 	/*
550 	 * Worst of the worst case trigger emergency restart
551 	 */
552 	pr_emerg("Hardware protection shutdown failed. Trying emergency restart\n");
553 	emergency_restart();
554 
555 	printk_prefer_direct_exit();
556 }
557 
558 static DECLARE_DELAYED_WORK(hw_failure_emergency_poweroff_work,
559 			    hw_failure_emergency_poweroff_func);
560 
561 /**
562  * hw_failure_emergency_poweroff - Trigger an emergency system poweroff
563  *
564  * This may be called from any critical situation to trigger a system shutdown
565  * after a given period of time. If time is negative this is not scheduled.
566  */
567 static void hw_failure_emergency_poweroff(int poweroff_delay_ms)
568 {
569 	if (poweroff_delay_ms <= 0)
570 		return;
571 	schedule_delayed_work(&hw_failure_emergency_poweroff_work,
572 			      msecs_to_jiffies(poweroff_delay_ms));
573 }
574 
575 /**
576  * hw_protection_shutdown - Trigger an emergency system poweroff
577  *
578  * @reason:		Reason of emergency shutdown to be printed.
579  * @ms_until_forced:	Time to wait for orderly shutdown before tiggering a
580  *			forced shudown. Negative value disables the forced
581  *			shutdown.
582  *
583  * Initiate an emergency system shutdown in order to protect hardware from
584  * further damage. Usage examples include a thermal protection or a voltage or
585  * current regulator failures.
586  * NOTE: The request is ignored if protection shutdown is already pending even
587  * if the previous request has given a large timeout for forced shutdown.
588  * Can be called from any context.
589  */
590 void hw_protection_shutdown(const char *reason, int ms_until_forced)
591 {
592 	static atomic_t allow_proceed = ATOMIC_INIT(1);
593 
594 	printk_prefer_direct_enter();
595 
596 	pr_emerg("HARDWARE PROTECTION shutdown (%s)\n", reason);
597 
598 	/* Shutdown should be initiated only once. */
599 	if (!atomic_dec_and_test(&allow_proceed))
600 		goto out;
601 
602 	/*
603 	 * Queue a backup emergency shutdown in the event of
604 	 * orderly_poweroff failure
605 	 */
606 	hw_failure_emergency_poweroff(ms_until_forced);
607 	orderly_poweroff(true);
608 out:
609 	printk_prefer_direct_exit();
610 }
611 EXPORT_SYMBOL_GPL(hw_protection_shutdown);
612 
613 static int __init reboot_setup(char *str)
614 {
615 	for (;;) {
616 		enum reboot_mode *mode;
617 
618 		/*
619 		 * Having anything passed on the command line via
620 		 * reboot= will cause us to disable DMI checking
621 		 * below.
622 		 */
623 		reboot_default = 0;
624 
625 		if (!strncmp(str, "panic_", 6)) {
626 			mode = &panic_reboot_mode;
627 			str += 6;
628 		} else {
629 			mode = &reboot_mode;
630 		}
631 
632 		switch (*str) {
633 		case 'w':
634 			*mode = REBOOT_WARM;
635 			break;
636 
637 		case 'c':
638 			*mode = REBOOT_COLD;
639 			break;
640 
641 		case 'h':
642 			*mode = REBOOT_HARD;
643 			break;
644 
645 		case 's':
646 			/*
647 			 * reboot_cpu is s[mp]#### with #### being the processor
648 			 * to be used for rebooting. Skip 's' or 'smp' prefix.
649 			 */
650 			str += str[1] == 'm' && str[2] == 'p' ? 3 : 1;
651 
652 			if (isdigit(str[0])) {
653 				int cpu = simple_strtoul(str, NULL, 0);
654 
655 				if (cpu >= num_possible_cpus()) {
656 					pr_err("Ignoring the CPU number in reboot= option. "
657 					"CPU %d exceeds possible cpu number %d\n",
658 					cpu, num_possible_cpus());
659 					break;
660 				}
661 				reboot_cpu = cpu;
662 			} else
663 				*mode = REBOOT_SOFT;
664 			break;
665 
666 		case 'g':
667 			*mode = REBOOT_GPIO;
668 			break;
669 
670 		case 'b':
671 		case 'a':
672 		case 'k':
673 		case 't':
674 		case 'e':
675 		case 'p':
676 			reboot_type = *str;
677 			break;
678 
679 		case 'f':
680 			reboot_force = 1;
681 			break;
682 		}
683 
684 		str = strchr(str, ',');
685 		if (str)
686 			str++;
687 		else
688 			break;
689 	}
690 	return 1;
691 }
692 __setup("reboot=", reboot_setup);
693 
694 #ifdef CONFIG_SYSFS
695 
696 #define REBOOT_COLD_STR		"cold"
697 #define REBOOT_WARM_STR		"warm"
698 #define REBOOT_HARD_STR		"hard"
699 #define REBOOT_SOFT_STR		"soft"
700 #define REBOOT_GPIO_STR		"gpio"
701 #define REBOOT_UNDEFINED_STR	"undefined"
702 
703 #define BOOT_TRIPLE_STR		"triple"
704 #define BOOT_KBD_STR		"kbd"
705 #define BOOT_BIOS_STR		"bios"
706 #define BOOT_ACPI_STR		"acpi"
707 #define BOOT_EFI_STR		"efi"
708 #define BOOT_PCI_STR		"pci"
709 
710 static ssize_t mode_show(struct kobject *kobj, struct kobj_attribute *attr, char *buf)
711 {
712 	const char *val;
713 
714 	switch (reboot_mode) {
715 	case REBOOT_COLD:
716 		val = REBOOT_COLD_STR;
717 		break;
718 	case REBOOT_WARM:
719 		val = REBOOT_WARM_STR;
720 		break;
721 	case REBOOT_HARD:
722 		val = REBOOT_HARD_STR;
723 		break;
724 	case REBOOT_SOFT:
725 		val = REBOOT_SOFT_STR;
726 		break;
727 	case REBOOT_GPIO:
728 		val = REBOOT_GPIO_STR;
729 		break;
730 	default:
731 		val = REBOOT_UNDEFINED_STR;
732 	}
733 
734 	return sprintf(buf, "%s\n", val);
735 }
736 static ssize_t mode_store(struct kobject *kobj, struct kobj_attribute *attr,
737 			  const char *buf, size_t count)
738 {
739 	if (!capable(CAP_SYS_BOOT))
740 		return -EPERM;
741 
742 	if (!strncmp(buf, REBOOT_COLD_STR, strlen(REBOOT_COLD_STR)))
743 		reboot_mode = REBOOT_COLD;
744 	else if (!strncmp(buf, REBOOT_WARM_STR, strlen(REBOOT_WARM_STR)))
745 		reboot_mode = REBOOT_WARM;
746 	else if (!strncmp(buf, REBOOT_HARD_STR, strlen(REBOOT_HARD_STR)))
747 		reboot_mode = REBOOT_HARD;
748 	else if (!strncmp(buf, REBOOT_SOFT_STR, strlen(REBOOT_SOFT_STR)))
749 		reboot_mode = REBOOT_SOFT;
750 	else if (!strncmp(buf, REBOOT_GPIO_STR, strlen(REBOOT_GPIO_STR)))
751 		reboot_mode = REBOOT_GPIO;
752 	else
753 		return -EINVAL;
754 
755 	reboot_default = 0;
756 
757 	return count;
758 }
759 static struct kobj_attribute reboot_mode_attr = __ATTR_RW(mode);
760 
761 #ifdef CONFIG_X86
762 static ssize_t force_show(struct kobject *kobj, struct kobj_attribute *attr, char *buf)
763 {
764 	return sprintf(buf, "%d\n", reboot_force);
765 }
766 static ssize_t force_store(struct kobject *kobj, struct kobj_attribute *attr,
767 			  const char *buf, size_t count)
768 {
769 	bool res;
770 
771 	if (!capable(CAP_SYS_BOOT))
772 		return -EPERM;
773 
774 	if (kstrtobool(buf, &res))
775 		return -EINVAL;
776 
777 	reboot_default = 0;
778 	reboot_force = res;
779 
780 	return count;
781 }
782 static struct kobj_attribute reboot_force_attr = __ATTR_RW(force);
783 
784 static ssize_t type_show(struct kobject *kobj, struct kobj_attribute *attr, char *buf)
785 {
786 	const char *val;
787 
788 	switch (reboot_type) {
789 	case BOOT_TRIPLE:
790 		val = BOOT_TRIPLE_STR;
791 		break;
792 	case BOOT_KBD:
793 		val = BOOT_KBD_STR;
794 		break;
795 	case BOOT_BIOS:
796 		val = BOOT_BIOS_STR;
797 		break;
798 	case BOOT_ACPI:
799 		val = BOOT_ACPI_STR;
800 		break;
801 	case BOOT_EFI:
802 		val = BOOT_EFI_STR;
803 		break;
804 	case BOOT_CF9_FORCE:
805 		val = BOOT_PCI_STR;
806 		break;
807 	default:
808 		val = REBOOT_UNDEFINED_STR;
809 	}
810 
811 	return sprintf(buf, "%s\n", val);
812 }
813 static ssize_t type_store(struct kobject *kobj, struct kobj_attribute *attr,
814 			  const char *buf, size_t count)
815 {
816 	if (!capable(CAP_SYS_BOOT))
817 		return -EPERM;
818 
819 	if (!strncmp(buf, BOOT_TRIPLE_STR, strlen(BOOT_TRIPLE_STR)))
820 		reboot_type = BOOT_TRIPLE;
821 	else if (!strncmp(buf, BOOT_KBD_STR, strlen(BOOT_KBD_STR)))
822 		reboot_type = BOOT_KBD;
823 	else if (!strncmp(buf, BOOT_BIOS_STR, strlen(BOOT_BIOS_STR)))
824 		reboot_type = BOOT_BIOS;
825 	else if (!strncmp(buf, BOOT_ACPI_STR, strlen(BOOT_ACPI_STR)))
826 		reboot_type = BOOT_ACPI;
827 	else if (!strncmp(buf, BOOT_EFI_STR, strlen(BOOT_EFI_STR)))
828 		reboot_type = BOOT_EFI;
829 	else if (!strncmp(buf, BOOT_PCI_STR, strlen(BOOT_PCI_STR)))
830 		reboot_type = BOOT_CF9_FORCE;
831 	else
832 		return -EINVAL;
833 
834 	reboot_default = 0;
835 
836 	return count;
837 }
838 static struct kobj_attribute reboot_type_attr = __ATTR_RW(type);
839 #endif
840 
841 #ifdef CONFIG_SMP
842 static ssize_t cpu_show(struct kobject *kobj, struct kobj_attribute *attr, char *buf)
843 {
844 	return sprintf(buf, "%d\n", reboot_cpu);
845 }
846 static ssize_t cpu_store(struct kobject *kobj, struct kobj_attribute *attr,
847 			  const char *buf, size_t count)
848 {
849 	unsigned int cpunum;
850 	int rc;
851 
852 	if (!capable(CAP_SYS_BOOT))
853 		return -EPERM;
854 
855 	rc = kstrtouint(buf, 0, &cpunum);
856 
857 	if (rc)
858 		return rc;
859 
860 	if (cpunum >= num_possible_cpus())
861 		return -ERANGE;
862 
863 	reboot_default = 0;
864 	reboot_cpu = cpunum;
865 
866 	return count;
867 }
868 static struct kobj_attribute reboot_cpu_attr = __ATTR_RW(cpu);
869 #endif
870 
871 static struct attribute *reboot_attrs[] = {
872 	&reboot_mode_attr.attr,
873 #ifdef CONFIG_X86
874 	&reboot_force_attr.attr,
875 	&reboot_type_attr.attr,
876 #endif
877 #ifdef CONFIG_SMP
878 	&reboot_cpu_attr.attr,
879 #endif
880 	NULL,
881 };
882 
883 #ifdef CONFIG_SYSCTL
884 static struct ctl_table kern_reboot_table[] = {
885 	{
886 		.procname       = "poweroff_cmd",
887 		.data           = &poweroff_cmd,
888 		.maxlen         = POWEROFF_CMD_PATH_LEN,
889 		.mode           = 0644,
890 		.proc_handler   = proc_dostring,
891 	},
892 	{
893 		.procname       = "ctrl-alt-del",
894 		.data           = &C_A_D,
895 		.maxlen         = sizeof(int),
896 		.mode           = 0644,
897 		.proc_handler   = proc_dointvec,
898 	},
899 	{ }
900 };
901 
902 static void __init kernel_reboot_sysctls_init(void)
903 {
904 	register_sysctl_init("kernel", kern_reboot_table);
905 }
906 #else
907 #define kernel_reboot_sysctls_init() do { } while (0)
908 #endif /* CONFIG_SYSCTL */
909 
910 static const struct attribute_group reboot_attr_group = {
911 	.attrs = reboot_attrs,
912 };
913 
914 static int __init reboot_ksysfs_init(void)
915 {
916 	struct kobject *reboot_kobj;
917 	int ret;
918 
919 	reboot_kobj = kobject_create_and_add("reboot", kernel_kobj);
920 	if (!reboot_kobj)
921 		return -ENOMEM;
922 
923 	ret = sysfs_create_group(reboot_kobj, &reboot_attr_group);
924 	if (ret) {
925 		kobject_put(reboot_kobj);
926 		return ret;
927 	}
928 
929 	kernel_reboot_sysctls_init();
930 
931 	return 0;
932 }
933 late_initcall(reboot_ksysfs_init);
934 
935 #endif
936