1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * linux/kernel/reboot.c 4 * 5 * Copyright (C) 2013 Linus Torvalds 6 */ 7 8 #define pr_fmt(fmt) "reboot: " fmt 9 10 #include <linux/atomic.h> 11 #include <linux/ctype.h> 12 #include <linux/export.h> 13 #include <linux/kexec.h> 14 #include <linux/kmod.h> 15 #include <linux/kmsg_dump.h> 16 #include <linux/reboot.h> 17 #include <linux/suspend.h> 18 #include <linux/syscalls.h> 19 #include <linux/syscore_ops.h> 20 #include <linux/uaccess.h> 21 22 /* 23 * this indicates whether you can reboot with ctrl-alt-del: the default is yes 24 */ 25 26 static int C_A_D = 1; 27 struct pid *cad_pid; 28 EXPORT_SYMBOL(cad_pid); 29 30 #if defined(CONFIG_ARM) 31 #define DEFAULT_REBOOT_MODE = REBOOT_HARD 32 #else 33 #define DEFAULT_REBOOT_MODE 34 #endif 35 enum reboot_mode reboot_mode DEFAULT_REBOOT_MODE; 36 EXPORT_SYMBOL_GPL(reboot_mode); 37 enum reboot_mode panic_reboot_mode = REBOOT_UNDEFINED; 38 39 /* 40 * This variable is used privately to keep track of whether or not 41 * reboot_type is still set to its default value (i.e., reboot= hasn't 42 * been set on the command line). This is needed so that we can 43 * suppress DMI scanning for reboot quirks. Without it, it's 44 * impossible to override a faulty reboot quirk without recompiling. 45 */ 46 int reboot_default = 1; 47 int reboot_cpu; 48 enum reboot_type reboot_type = BOOT_ACPI; 49 int reboot_force; 50 51 /* 52 * If set, this is used for preparing the system to power off. 53 */ 54 55 void (*pm_power_off_prepare)(void); 56 EXPORT_SYMBOL_GPL(pm_power_off_prepare); 57 58 /** 59 * emergency_restart - reboot the system 60 * 61 * Without shutting down any hardware or taking any locks 62 * reboot the system. This is called when we know we are in 63 * trouble so this is our best effort to reboot. This is 64 * safe to call in interrupt context. 65 */ 66 void emergency_restart(void) 67 { 68 kmsg_dump(KMSG_DUMP_EMERG); 69 machine_emergency_restart(); 70 } 71 EXPORT_SYMBOL_GPL(emergency_restart); 72 73 void kernel_restart_prepare(char *cmd) 74 { 75 blocking_notifier_call_chain(&reboot_notifier_list, SYS_RESTART, cmd); 76 system_state = SYSTEM_RESTART; 77 usermodehelper_disable(); 78 device_shutdown(); 79 } 80 81 /** 82 * register_reboot_notifier - Register function to be called at reboot time 83 * @nb: Info about notifier function to be called 84 * 85 * Registers a function with the list of functions 86 * to be called at reboot time. 87 * 88 * Currently always returns zero, as blocking_notifier_chain_register() 89 * always returns zero. 90 */ 91 int register_reboot_notifier(struct notifier_block *nb) 92 { 93 return blocking_notifier_chain_register(&reboot_notifier_list, nb); 94 } 95 EXPORT_SYMBOL(register_reboot_notifier); 96 97 /** 98 * unregister_reboot_notifier - Unregister previously registered reboot notifier 99 * @nb: Hook to be unregistered 100 * 101 * Unregisters a previously registered reboot 102 * notifier function. 103 * 104 * Returns zero on success, or %-ENOENT on failure. 105 */ 106 int unregister_reboot_notifier(struct notifier_block *nb) 107 { 108 return blocking_notifier_chain_unregister(&reboot_notifier_list, nb); 109 } 110 EXPORT_SYMBOL(unregister_reboot_notifier); 111 112 static void devm_unregister_reboot_notifier(struct device *dev, void *res) 113 { 114 WARN_ON(unregister_reboot_notifier(*(struct notifier_block **)res)); 115 } 116 117 int devm_register_reboot_notifier(struct device *dev, struct notifier_block *nb) 118 { 119 struct notifier_block **rcnb; 120 int ret; 121 122 rcnb = devres_alloc(devm_unregister_reboot_notifier, 123 sizeof(*rcnb), GFP_KERNEL); 124 if (!rcnb) 125 return -ENOMEM; 126 127 ret = register_reboot_notifier(nb); 128 if (!ret) { 129 *rcnb = nb; 130 devres_add(dev, rcnb); 131 } else { 132 devres_free(rcnb); 133 } 134 135 return ret; 136 } 137 EXPORT_SYMBOL(devm_register_reboot_notifier); 138 139 /* 140 * Notifier list for kernel code which wants to be called 141 * to restart the system. 142 */ 143 static ATOMIC_NOTIFIER_HEAD(restart_handler_list); 144 145 /** 146 * register_restart_handler - Register function to be called to reset 147 * the system 148 * @nb: Info about handler function to be called 149 * @nb->priority: Handler priority. Handlers should follow the 150 * following guidelines for setting priorities. 151 * 0: Restart handler of last resort, 152 * with limited restart capabilities 153 * 128: Default restart handler; use if no other 154 * restart handler is expected to be available, 155 * and/or if restart functionality is 156 * sufficient to restart the entire system 157 * 255: Highest priority restart handler, will 158 * preempt all other restart handlers 159 * 160 * Registers a function with code to be called to restart the 161 * system. 162 * 163 * Registered functions will be called from machine_restart as last 164 * step of the restart sequence (if the architecture specific 165 * machine_restart function calls do_kernel_restart - see below 166 * for details). 167 * Registered functions are expected to restart the system immediately. 168 * If more than one function is registered, the restart handler priority 169 * selects which function will be called first. 170 * 171 * Restart handlers are expected to be registered from non-architecture 172 * code, typically from drivers. A typical use case would be a system 173 * where restart functionality is provided through a watchdog. Multiple 174 * restart handlers may exist; for example, one restart handler might 175 * restart the entire system, while another only restarts the CPU. 176 * In such cases, the restart handler which only restarts part of the 177 * hardware is expected to register with low priority to ensure that 178 * it only runs if no other means to restart the system is available. 179 * 180 * Currently always returns zero, as atomic_notifier_chain_register() 181 * always returns zero. 182 */ 183 int register_restart_handler(struct notifier_block *nb) 184 { 185 return atomic_notifier_chain_register(&restart_handler_list, nb); 186 } 187 EXPORT_SYMBOL(register_restart_handler); 188 189 /** 190 * unregister_restart_handler - Unregister previously registered 191 * restart handler 192 * @nb: Hook to be unregistered 193 * 194 * Unregisters a previously registered restart handler function. 195 * 196 * Returns zero on success, or %-ENOENT on failure. 197 */ 198 int unregister_restart_handler(struct notifier_block *nb) 199 { 200 return atomic_notifier_chain_unregister(&restart_handler_list, nb); 201 } 202 EXPORT_SYMBOL(unregister_restart_handler); 203 204 /** 205 * do_kernel_restart - Execute kernel restart handler call chain 206 * 207 * Calls functions registered with register_restart_handler. 208 * 209 * Expected to be called from machine_restart as last step of the restart 210 * sequence. 211 * 212 * Restarts the system immediately if a restart handler function has been 213 * registered. Otherwise does nothing. 214 */ 215 void do_kernel_restart(char *cmd) 216 { 217 atomic_notifier_call_chain(&restart_handler_list, reboot_mode, cmd); 218 } 219 220 void migrate_to_reboot_cpu(void) 221 { 222 /* The boot cpu is always logical cpu 0 */ 223 int cpu = reboot_cpu; 224 225 cpu_hotplug_disable(); 226 227 /* Make certain the cpu I'm about to reboot on is online */ 228 if (!cpu_online(cpu)) 229 cpu = cpumask_first(cpu_online_mask); 230 231 /* Prevent races with other tasks migrating this task */ 232 current->flags |= PF_NO_SETAFFINITY; 233 234 /* Make certain I only run on the appropriate processor */ 235 set_cpus_allowed_ptr(current, cpumask_of(cpu)); 236 } 237 238 /** 239 * kernel_restart - reboot the system 240 * @cmd: pointer to buffer containing command to execute for restart 241 * or %NULL 242 * 243 * Shutdown everything and perform a clean reboot. 244 * This is not safe to call in interrupt context. 245 */ 246 void kernel_restart(char *cmd) 247 { 248 kernel_restart_prepare(cmd); 249 migrate_to_reboot_cpu(); 250 syscore_shutdown(); 251 if (!cmd) 252 pr_emerg("Restarting system\n"); 253 else 254 pr_emerg("Restarting system with command '%s'\n", cmd); 255 kmsg_dump(KMSG_DUMP_SHUTDOWN); 256 machine_restart(cmd); 257 } 258 EXPORT_SYMBOL_GPL(kernel_restart); 259 260 static void kernel_shutdown_prepare(enum system_states state) 261 { 262 blocking_notifier_call_chain(&reboot_notifier_list, 263 (state == SYSTEM_HALT) ? SYS_HALT : SYS_POWER_OFF, NULL); 264 system_state = state; 265 usermodehelper_disable(); 266 device_shutdown(); 267 } 268 /** 269 * kernel_halt - halt the system 270 * 271 * Shutdown everything and perform a clean system halt. 272 */ 273 void kernel_halt(void) 274 { 275 kernel_shutdown_prepare(SYSTEM_HALT); 276 migrate_to_reboot_cpu(); 277 syscore_shutdown(); 278 pr_emerg("System halted\n"); 279 kmsg_dump(KMSG_DUMP_SHUTDOWN); 280 machine_halt(); 281 } 282 EXPORT_SYMBOL_GPL(kernel_halt); 283 284 /** 285 * kernel_power_off - power_off the system 286 * 287 * Shutdown everything and perform a clean system power_off. 288 */ 289 void kernel_power_off(void) 290 { 291 kernel_shutdown_prepare(SYSTEM_POWER_OFF); 292 if (pm_power_off_prepare) 293 pm_power_off_prepare(); 294 migrate_to_reboot_cpu(); 295 syscore_shutdown(); 296 pr_emerg("Power down\n"); 297 kmsg_dump(KMSG_DUMP_SHUTDOWN); 298 machine_power_off(); 299 } 300 EXPORT_SYMBOL_GPL(kernel_power_off); 301 302 DEFINE_MUTEX(system_transition_mutex); 303 304 /* 305 * Reboot system call: for obvious reasons only root may call it, 306 * and even root needs to set up some magic numbers in the registers 307 * so that some mistake won't make this reboot the whole machine. 308 * You can also set the meaning of the ctrl-alt-del-key here. 309 * 310 * reboot doesn't sync: do that yourself before calling this. 311 */ 312 SYSCALL_DEFINE4(reboot, int, magic1, int, magic2, unsigned int, cmd, 313 void __user *, arg) 314 { 315 struct pid_namespace *pid_ns = task_active_pid_ns(current); 316 char buffer[256]; 317 int ret = 0; 318 319 /* We only trust the superuser with rebooting the system. */ 320 if (!ns_capable(pid_ns->user_ns, CAP_SYS_BOOT)) 321 return -EPERM; 322 323 /* For safety, we require "magic" arguments. */ 324 if (magic1 != LINUX_REBOOT_MAGIC1 || 325 (magic2 != LINUX_REBOOT_MAGIC2 && 326 magic2 != LINUX_REBOOT_MAGIC2A && 327 magic2 != LINUX_REBOOT_MAGIC2B && 328 magic2 != LINUX_REBOOT_MAGIC2C)) 329 return -EINVAL; 330 331 /* 332 * If pid namespaces are enabled and the current task is in a child 333 * pid_namespace, the command is handled by reboot_pid_ns() which will 334 * call do_exit(). 335 */ 336 ret = reboot_pid_ns(pid_ns, cmd); 337 if (ret) 338 return ret; 339 340 /* Instead of trying to make the power_off code look like 341 * halt when pm_power_off is not set do it the easy way. 342 */ 343 if ((cmd == LINUX_REBOOT_CMD_POWER_OFF) && !pm_power_off) 344 cmd = LINUX_REBOOT_CMD_HALT; 345 346 mutex_lock(&system_transition_mutex); 347 switch (cmd) { 348 case LINUX_REBOOT_CMD_RESTART: 349 kernel_restart(NULL); 350 break; 351 352 case LINUX_REBOOT_CMD_CAD_ON: 353 C_A_D = 1; 354 break; 355 356 case LINUX_REBOOT_CMD_CAD_OFF: 357 C_A_D = 0; 358 break; 359 360 case LINUX_REBOOT_CMD_HALT: 361 kernel_halt(); 362 do_exit(0); 363 364 case LINUX_REBOOT_CMD_POWER_OFF: 365 kernel_power_off(); 366 do_exit(0); 367 break; 368 369 case LINUX_REBOOT_CMD_RESTART2: 370 ret = strncpy_from_user(&buffer[0], arg, sizeof(buffer) - 1); 371 if (ret < 0) { 372 ret = -EFAULT; 373 break; 374 } 375 buffer[sizeof(buffer) - 1] = '\0'; 376 377 kernel_restart(buffer); 378 break; 379 380 #ifdef CONFIG_KEXEC_CORE 381 case LINUX_REBOOT_CMD_KEXEC: 382 ret = kernel_kexec(); 383 break; 384 #endif 385 386 #ifdef CONFIG_HIBERNATION 387 case LINUX_REBOOT_CMD_SW_SUSPEND: 388 ret = hibernate(); 389 break; 390 #endif 391 392 default: 393 ret = -EINVAL; 394 break; 395 } 396 mutex_unlock(&system_transition_mutex); 397 return ret; 398 } 399 400 static void deferred_cad(struct work_struct *dummy) 401 { 402 kernel_restart(NULL); 403 } 404 405 /* 406 * This function gets called by ctrl-alt-del - ie the keyboard interrupt. 407 * As it's called within an interrupt, it may NOT sync: the only choice 408 * is whether to reboot at once, or just ignore the ctrl-alt-del. 409 */ 410 void ctrl_alt_del(void) 411 { 412 static DECLARE_WORK(cad_work, deferred_cad); 413 414 if (C_A_D) 415 schedule_work(&cad_work); 416 else 417 kill_cad_pid(SIGINT, 1); 418 } 419 420 #define POWEROFF_CMD_PATH_LEN 256 421 static char poweroff_cmd[POWEROFF_CMD_PATH_LEN] = "/sbin/poweroff"; 422 static const char reboot_cmd[] = "/sbin/reboot"; 423 424 static int run_cmd(const char *cmd) 425 { 426 char **argv; 427 static char *envp[] = { 428 "HOME=/", 429 "PATH=/sbin:/bin:/usr/sbin:/usr/bin", 430 NULL 431 }; 432 int ret; 433 argv = argv_split(GFP_KERNEL, cmd, NULL); 434 if (argv) { 435 ret = call_usermodehelper(argv[0], argv, envp, UMH_WAIT_EXEC); 436 argv_free(argv); 437 } else { 438 ret = -ENOMEM; 439 } 440 441 return ret; 442 } 443 444 static int __orderly_reboot(void) 445 { 446 int ret; 447 448 ret = run_cmd(reboot_cmd); 449 450 if (ret) { 451 printk_prefer_direct_enter(); 452 pr_warn("Failed to start orderly reboot: forcing the issue\n"); 453 emergency_sync(); 454 kernel_restart(NULL); 455 printk_prefer_direct_exit(); 456 } 457 458 return ret; 459 } 460 461 static int __orderly_poweroff(bool force) 462 { 463 int ret; 464 465 ret = run_cmd(poweroff_cmd); 466 467 if (ret && force) { 468 printk_prefer_direct_enter(); 469 pr_warn("Failed to start orderly shutdown: forcing the issue\n"); 470 471 /* 472 * I guess this should try to kick off some daemon to sync and 473 * poweroff asap. Or not even bother syncing if we're doing an 474 * emergency shutdown? 475 */ 476 emergency_sync(); 477 kernel_power_off(); 478 printk_prefer_direct_exit(); 479 } 480 481 return ret; 482 } 483 484 static bool poweroff_force; 485 486 static void poweroff_work_func(struct work_struct *work) 487 { 488 __orderly_poweroff(poweroff_force); 489 } 490 491 static DECLARE_WORK(poweroff_work, poweroff_work_func); 492 493 /** 494 * orderly_poweroff - Trigger an orderly system poweroff 495 * @force: force poweroff if command execution fails 496 * 497 * This may be called from any context to trigger a system shutdown. 498 * If the orderly shutdown fails, it will force an immediate shutdown. 499 */ 500 void orderly_poweroff(bool force) 501 { 502 if (force) /* do not override the pending "true" */ 503 poweroff_force = true; 504 schedule_work(&poweroff_work); 505 } 506 EXPORT_SYMBOL_GPL(orderly_poweroff); 507 508 static void reboot_work_func(struct work_struct *work) 509 { 510 __orderly_reboot(); 511 } 512 513 static DECLARE_WORK(reboot_work, reboot_work_func); 514 515 /** 516 * orderly_reboot - Trigger an orderly system reboot 517 * 518 * This may be called from any context to trigger a system reboot. 519 * If the orderly reboot fails, it will force an immediate reboot. 520 */ 521 void orderly_reboot(void) 522 { 523 schedule_work(&reboot_work); 524 } 525 EXPORT_SYMBOL_GPL(orderly_reboot); 526 527 /** 528 * hw_failure_emergency_poweroff_func - emergency poweroff work after a known delay 529 * @work: work_struct associated with the emergency poweroff function 530 * 531 * This function is called in very critical situations to force 532 * a kernel poweroff after a configurable timeout value. 533 */ 534 static void hw_failure_emergency_poweroff_func(struct work_struct *work) 535 { 536 printk_prefer_direct_enter(); 537 538 /* 539 * We have reached here after the emergency shutdown waiting period has 540 * expired. This means orderly_poweroff has not been able to shut off 541 * the system for some reason. 542 * 543 * Try to shut down the system immediately using kernel_power_off 544 * if populated 545 */ 546 pr_emerg("Hardware protection timed-out. Trying forced poweroff\n"); 547 kernel_power_off(); 548 549 /* 550 * Worst of the worst case trigger emergency restart 551 */ 552 pr_emerg("Hardware protection shutdown failed. Trying emergency restart\n"); 553 emergency_restart(); 554 555 printk_prefer_direct_exit(); 556 } 557 558 static DECLARE_DELAYED_WORK(hw_failure_emergency_poweroff_work, 559 hw_failure_emergency_poweroff_func); 560 561 /** 562 * hw_failure_emergency_poweroff - Trigger an emergency system poweroff 563 * 564 * This may be called from any critical situation to trigger a system shutdown 565 * after a given period of time. If time is negative this is not scheduled. 566 */ 567 static void hw_failure_emergency_poweroff(int poweroff_delay_ms) 568 { 569 if (poweroff_delay_ms <= 0) 570 return; 571 schedule_delayed_work(&hw_failure_emergency_poweroff_work, 572 msecs_to_jiffies(poweroff_delay_ms)); 573 } 574 575 /** 576 * hw_protection_shutdown - Trigger an emergency system poweroff 577 * 578 * @reason: Reason of emergency shutdown to be printed. 579 * @ms_until_forced: Time to wait for orderly shutdown before tiggering a 580 * forced shudown. Negative value disables the forced 581 * shutdown. 582 * 583 * Initiate an emergency system shutdown in order to protect hardware from 584 * further damage. Usage examples include a thermal protection or a voltage or 585 * current regulator failures. 586 * NOTE: The request is ignored if protection shutdown is already pending even 587 * if the previous request has given a large timeout for forced shutdown. 588 * Can be called from any context. 589 */ 590 void hw_protection_shutdown(const char *reason, int ms_until_forced) 591 { 592 static atomic_t allow_proceed = ATOMIC_INIT(1); 593 594 printk_prefer_direct_enter(); 595 596 pr_emerg("HARDWARE PROTECTION shutdown (%s)\n", reason); 597 598 /* Shutdown should be initiated only once. */ 599 if (!atomic_dec_and_test(&allow_proceed)) 600 goto out; 601 602 /* 603 * Queue a backup emergency shutdown in the event of 604 * orderly_poweroff failure 605 */ 606 hw_failure_emergency_poweroff(ms_until_forced); 607 orderly_poweroff(true); 608 out: 609 printk_prefer_direct_exit(); 610 } 611 EXPORT_SYMBOL_GPL(hw_protection_shutdown); 612 613 static int __init reboot_setup(char *str) 614 { 615 for (;;) { 616 enum reboot_mode *mode; 617 618 /* 619 * Having anything passed on the command line via 620 * reboot= will cause us to disable DMI checking 621 * below. 622 */ 623 reboot_default = 0; 624 625 if (!strncmp(str, "panic_", 6)) { 626 mode = &panic_reboot_mode; 627 str += 6; 628 } else { 629 mode = &reboot_mode; 630 } 631 632 switch (*str) { 633 case 'w': 634 *mode = REBOOT_WARM; 635 break; 636 637 case 'c': 638 *mode = REBOOT_COLD; 639 break; 640 641 case 'h': 642 *mode = REBOOT_HARD; 643 break; 644 645 case 's': 646 /* 647 * reboot_cpu is s[mp]#### with #### being the processor 648 * to be used for rebooting. Skip 's' or 'smp' prefix. 649 */ 650 str += str[1] == 'm' && str[2] == 'p' ? 3 : 1; 651 652 if (isdigit(str[0])) { 653 int cpu = simple_strtoul(str, NULL, 0); 654 655 if (cpu >= num_possible_cpus()) { 656 pr_err("Ignoring the CPU number in reboot= option. " 657 "CPU %d exceeds possible cpu number %d\n", 658 cpu, num_possible_cpus()); 659 break; 660 } 661 reboot_cpu = cpu; 662 } else 663 *mode = REBOOT_SOFT; 664 break; 665 666 case 'g': 667 *mode = REBOOT_GPIO; 668 break; 669 670 case 'b': 671 case 'a': 672 case 'k': 673 case 't': 674 case 'e': 675 case 'p': 676 reboot_type = *str; 677 break; 678 679 case 'f': 680 reboot_force = 1; 681 break; 682 } 683 684 str = strchr(str, ','); 685 if (str) 686 str++; 687 else 688 break; 689 } 690 return 1; 691 } 692 __setup("reboot=", reboot_setup); 693 694 #ifdef CONFIG_SYSFS 695 696 #define REBOOT_COLD_STR "cold" 697 #define REBOOT_WARM_STR "warm" 698 #define REBOOT_HARD_STR "hard" 699 #define REBOOT_SOFT_STR "soft" 700 #define REBOOT_GPIO_STR "gpio" 701 #define REBOOT_UNDEFINED_STR "undefined" 702 703 #define BOOT_TRIPLE_STR "triple" 704 #define BOOT_KBD_STR "kbd" 705 #define BOOT_BIOS_STR "bios" 706 #define BOOT_ACPI_STR "acpi" 707 #define BOOT_EFI_STR "efi" 708 #define BOOT_PCI_STR "pci" 709 710 static ssize_t mode_show(struct kobject *kobj, struct kobj_attribute *attr, char *buf) 711 { 712 const char *val; 713 714 switch (reboot_mode) { 715 case REBOOT_COLD: 716 val = REBOOT_COLD_STR; 717 break; 718 case REBOOT_WARM: 719 val = REBOOT_WARM_STR; 720 break; 721 case REBOOT_HARD: 722 val = REBOOT_HARD_STR; 723 break; 724 case REBOOT_SOFT: 725 val = REBOOT_SOFT_STR; 726 break; 727 case REBOOT_GPIO: 728 val = REBOOT_GPIO_STR; 729 break; 730 default: 731 val = REBOOT_UNDEFINED_STR; 732 } 733 734 return sprintf(buf, "%s\n", val); 735 } 736 static ssize_t mode_store(struct kobject *kobj, struct kobj_attribute *attr, 737 const char *buf, size_t count) 738 { 739 if (!capable(CAP_SYS_BOOT)) 740 return -EPERM; 741 742 if (!strncmp(buf, REBOOT_COLD_STR, strlen(REBOOT_COLD_STR))) 743 reboot_mode = REBOOT_COLD; 744 else if (!strncmp(buf, REBOOT_WARM_STR, strlen(REBOOT_WARM_STR))) 745 reboot_mode = REBOOT_WARM; 746 else if (!strncmp(buf, REBOOT_HARD_STR, strlen(REBOOT_HARD_STR))) 747 reboot_mode = REBOOT_HARD; 748 else if (!strncmp(buf, REBOOT_SOFT_STR, strlen(REBOOT_SOFT_STR))) 749 reboot_mode = REBOOT_SOFT; 750 else if (!strncmp(buf, REBOOT_GPIO_STR, strlen(REBOOT_GPIO_STR))) 751 reboot_mode = REBOOT_GPIO; 752 else 753 return -EINVAL; 754 755 reboot_default = 0; 756 757 return count; 758 } 759 static struct kobj_attribute reboot_mode_attr = __ATTR_RW(mode); 760 761 #ifdef CONFIG_X86 762 static ssize_t force_show(struct kobject *kobj, struct kobj_attribute *attr, char *buf) 763 { 764 return sprintf(buf, "%d\n", reboot_force); 765 } 766 static ssize_t force_store(struct kobject *kobj, struct kobj_attribute *attr, 767 const char *buf, size_t count) 768 { 769 bool res; 770 771 if (!capable(CAP_SYS_BOOT)) 772 return -EPERM; 773 774 if (kstrtobool(buf, &res)) 775 return -EINVAL; 776 777 reboot_default = 0; 778 reboot_force = res; 779 780 return count; 781 } 782 static struct kobj_attribute reboot_force_attr = __ATTR_RW(force); 783 784 static ssize_t type_show(struct kobject *kobj, struct kobj_attribute *attr, char *buf) 785 { 786 const char *val; 787 788 switch (reboot_type) { 789 case BOOT_TRIPLE: 790 val = BOOT_TRIPLE_STR; 791 break; 792 case BOOT_KBD: 793 val = BOOT_KBD_STR; 794 break; 795 case BOOT_BIOS: 796 val = BOOT_BIOS_STR; 797 break; 798 case BOOT_ACPI: 799 val = BOOT_ACPI_STR; 800 break; 801 case BOOT_EFI: 802 val = BOOT_EFI_STR; 803 break; 804 case BOOT_CF9_FORCE: 805 val = BOOT_PCI_STR; 806 break; 807 default: 808 val = REBOOT_UNDEFINED_STR; 809 } 810 811 return sprintf(buf, "%s\n", val); 812 } 813 static ssize_t type_store(struct kobject *kobj, struct kobj_attribute *attr, 814 const char *buf, size_t count) 815 { 816 if (!capable(CAP_SYS_BOOT)) 817 return -EPERM; 818 819 if (!strncmp(buf, BOOT_TRIPLE_STR, strlen(BOOT_TRIPLE_STR))) 820 reboot_type = BOOT_TRIPLE; 821 else if (!strncmp(buf, BOOT_KBD_STR, strlen(BOOT_KBD_STR))) 822 reboot_type = BOOT_KBD; 823 else if (!strncmp(buf, BOOT_BIOS_STR, strlen(BOOT_BIOS_STR))) 824 reboot_type = BOOT_BIOS; 825 else if (!strncmp(buf, BOOT_ACPI_STR, strlen(BOOT_ACPI_STR))) 826 reboot_type = BOOT_ACPI; 827 else if (!strncmp(buf, BOOT_EFI_STR, strlen(BOOT_EFI_STR))) 828 reboot_type = BOOT_EFI; 829 else if (!strncmp(buf, BOOT_PCI_STR, strlen(BOOT_PCI_STR))) 830 reboot_type = BOOT_CF9_FORCE; 831 else 832 return -EINVAL; 833 834 reboot_default = 0; 835 836 return count; 837 } 838 static struct kobj_attribute reboot_type_attr = __ATTR_RW(type); 839 #endif 840 841 #ifdef CONFIG_SMP 842 static ssize_t cpu_show(struct kobject *kobj, struct kobj_attribute *attr, char *buf) 843 { 844 return sprintf(buf, "%d\n", reboot_cpu); 845 } 846 static ssize_t cpu_store(struct kobject *kobj, struct kobj_attribute *attr, 847 const char *buf, size_t count) 848 { 849 unsigned int cpunum; 850 int rc; 851 852 if (!capable(CAP_SYS_BOOT)) 853 return -EPERM; 854 855 rc = kstrtouint(buf, 0, &cpunum); 856 857 if (rc) 858 return rc; 859 860 if (cpunum >= num_possible_cpus()) 861 return -ERANGE; 862 863 reboot_default = 0; 864 reboot_cpu = cpunum; 865 866 return count; 867 } 868 static struct kobj_attribute reboot_cpu_attr = __ATTR_RW(cpu); 869 #endif 870 871 static struct attribute *reboot_attrs[] = { 872 &reboot_mode_attr.attr, 873 #ifdef CONFIG_X86 874 &reboot_force_attr.attr, 875 &reboot_type_attr.attr, 876 #endif 877 #ifdef CONFIG_SMP 878 &reboot_cpu_attr.attr, 879 #endif 880 NULL, 881 }; 882 883 #ifdef CONFIG_SYSCTL 884 static struct ctl_table kern_reboot_table[] = { 885 { 886 .procname = "poweroff_cmd", 887 .data = &poweroff_cmd, 888 .maxlen = POWEROFF_CMD_PATH_LEN, 889 .mode = 0644, 890 .proc_handler = proc_dostring, 891 }, 892 { 893 .procname = "ctrl-alt-del", 894 .data = &C_A_D, 895 .maxlen = sizeof(int), 896 .mode = 0644, 897 .proc_handler = proc_dointvec, 898 }, 899 { } 900 }; 901 902 static void __init kernel_reboot_sysctls_init(void) 903 { 904 register_sysctl_init("kernel", kern_reboot_table); 905 } 906 #else 907 #define kernel_reboot_sysctls_init() do { } while (0) 908 #endif /* CONFIG_SYSCTL */ 909 910 static const struct attribute_group reboot_attr_group = { 911 .attrs = reboot_attrs, 912 }; 913 914 static int __init reboot_ksysfs_init(void) 915 { 916 struct kobject *reboot_kobj; 917 int ret; 918 919 reboot_kobj = kobject_create_and_add("reboot", kernel_kobj); 920 if (!reboot_kobj) 921 return -ENOMEM; 922 923 ret = sysfs_create_group(reboot_kobj, &reboot_attr_group); 924 if (ret) { 925 kobject_put(reboot_kobj); 926 return ret; 927 } 928 929 kernel_reboot_sysctls_init(); 930 931 return 0; 932 } 933 late_initcall(reboot_ksysfs_init); 934 935 #endif 936