Linux Audio

Check our new training course

Loading...
v6.13.7
  1// SPDX-License-Identifier: GPL-2.0
  2#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
  3
  4#include <linux/export.h>
  5#include <linux/reboot.h>
  6#include <linux/init.h>
  7#include <linux/pm.h>
  8#include <linux/efi.h>
  9#include <linux/dmi.h>
 10#include <linux/sched.h>
 11#include <linux/tboot.h>
 12#include <linux/delay.h>
 13#include <linux/objtool.h>
 14#include <linux/pgtable.h>
 15#include <linux/kexec.h>
 16#include <acpi/reboot.h>
 17#include <asm/io.h>
 18#include <asm/apic.h>
 19#include <asm/io_apic.h>
 20#include <asm/desc.h>
 21#include <asm/hpet.h>
 22#include <asm/proto.h>
 23#include <asm/reboot_fixups.h>
 24#include <asm/reboot.h>
 25#include <asm/pci_x86.h>
 26#include <asm/cpu.h>
 27#include <asm/nmi.h>
 28#include <asm/smp.h>
 29
 30#include <linux/ctype.h>
 31#include <linux/mc146818rtc.h>
 32#include <asm/realmode.h>
 33#include <asm/x86_init.h>
 34#include <asm/efi.h>
 35
 36/*
 37 * Power off function, if any
 38 */
 39void (*pm_power_off)(void);
 40EXPORT_SYMBOL(pm_power_off);
 41
 42/*
 43 * This is set if we need to go through the 'emergency' path.
 44 * When machine_emergency_restart() is called, we may be on
 45 * an inconsistent state and won't be able to do a clean cleanup
 46 */
 47static int reboot_emergency;
 48
 49/* This is set by the PCI code if either type 1 or type 2 PCI is detected */
 50bool port_cf9_safe = false;
 51
 52/*
 53 * Reboot options and system auto-detection code provided by
 54 * Dell Inc. so their systems "just work". :-)
 55 */
 56
 57/*
 58 * Some machines require the "reboot=a" commandline options
 59 */
 60static int __init set_acpi_reboot(const struct dmi_system_id *d)
 61{
 62	if (reboot_type != BOOT_ACPI) {
 63		reboot_type = BOOT_ACPI;
 64		pr_info("%s series board detected. Selecting %s-method for reboots.\n",
 65			d->ident, "ACPI");
 66	}
 67	return 0;
 68}
 69
 70/*
 71 * Some machines require the "reboot=b" or "reboot=k"  commandline options,
 72 * this quirk makes that automatic.
 73 */
 74static int __init set_bios_reboot(const struct dmi_system_id *d)
 75{
 76	if (reboot_type != BOOT_BIOS) {
 77		reboot_type = BOOT_BIOS;
 78		pr_info("%s series board detected. Selecting %s-method for reboots.\n",
 79			d->ident, "BIOS");
 80	}
 81	return 0;
 82}
 83
 84/*
 85 * Some machines don't handle the default ACPI reboot method and
 86 * require the EFI reboot method:
 87 */
 88static int __init set_efi_reboot(const struct dmi_system_id *d)
 89{
 90	if (reboot_type != BOOT_EFI && !efi_runtime_disabled()) {
 91		reboot_type = BOOT_EFI;
 92		pr_info("%s series board detected. Selecting EFI-method for reboot.\n", d->ident);
 93	}
 94	return 0;
 95}
 96
 97void __noreturn machine_real_restart(unsigned int type)
 98{
 99	local_irq_disable();
100
101	/*
102	 * Write zero to CMOS register number 0x0f, which the BIOS POST
103	 * routine will recognize as telling it to do a proper reboot.  (Well
104	 * that's what this book in front of me says -- it may only apply to
105	 * the Phoenix BIOS though, it's not clear).  At the same time,
106	 * disable NMIs by setting the top bit in the CMOS address register,
107	 * as we're about to do peculiar things to the CPU.  I'm not sure if
108	 * `outb_p' is needed instead of just `outb'.  Use it to be on the
109	 * safe side.  (Yes, CMOS_WRITE does outb_p's. -  Paul G.)
110	 */
111	spin_lock(&rtc_lock);
112	CMOS_WRITE(0x00, 0x8f);
113	spin_unlock(&rtc_lock);
114
115	/*
116	 * Switch to the trampoline page table.
117	 */
118	load_trampoline_pgtable();
119
120	/* Jump to the identity-mapped low memory code */
121#ifdef CONFIG_X86_32
122	asm volatile("jmpl *%0" : :
123		     "rm" (real_mode_header->machine_real_restart_asm),
124		     "a" (type));
125#else
126	asm volatile("ljmpl *%0" : :
127		     "m" (real_mode_header->machine_real_restart_asm),
128		     "D" (type));
129#endif
130	unreachable();
131}
132#ifdef CONFIG_APM_MODULE
133EXPORT_SYMBOL(machine_real_restart);
134#endif
135STACK_FRAME_NON_STANDARD(machine_real_restart);
136
137/*
138 * Some Apple MacBook and MacBookPro's needs reboot=p to be able to reboot
139 */
140static int __init set_pci_reboot(const struct dmi_system_id *d)
141{
142	if (reboot_type != BOOT_CF9_FORCE) {
143		reboot_type = BOOT_CF9_FORCE;
144		pr_info("%s series board detected. Selecting %s-method for reboots.\n",
145			d->ident, "PCI");
146	}
147	return 0;
148}
149
150static int __init set_kbd_reboot(const struct dmi_system_id *d)
151{
152	if (reboot_type != BOOT_KBD) {
153		reboot_type = BOOT_KBD;
154		pr_info("%s series board detected. Selecting %s-method for reboot.\n",
155			d->ident, "KBD");
156	}
157	return 0;
158}
159
160/*
161 * This is a single dmi_table handling all reboot quirks.
162 */
163static const struct dmi_system_id reboot_dmi_table[] __initconst = {
164
165	/* Acer */
166	{	/* Handle reboot issue on Acer Aspire one */
167		.callback = set_kbd_reboot,
168		.ident = "Acer Aspire One A110",
169		.matches = {
170			DMI_MATCH(DMI_SYS_VENDOR, "Acer"),
171			DMI_MATCH(DMI_PRODUCT_NAME, "AOA110"),
172		},
173	},
174	{	/* Handle reboot issue on Acer TravelMate X514-51T */
175		.callback = set_efi_reboot,
176		.ident = "Acer TravelMate X514-51T",
177		.matches = {
178			DMI_MATCH(DMI_SYS_VENDOR, "Acer"),
179			DMI_MATCH(DMI_PRODUCT_NAME, "TravelMate X514-51T"),
180		},
181	},
182
183	/* Apple */
184	{	/* Handle problems with rebooting on Apple MacBook5 */
185		.callback = set_pci_reboot,
186		.ident = "Apple MacBook5",
187		.matches = {
188			DMI_MATCH(DMI_SYS_VENDOR, "Apple Inc."),
189			DMI_MATCH(DMI_PRODUCT_NAME, "MacBook5"),
190		},
191	},
192	{	/* Handle problems with rebooting on Apple MacBook6,1 */
193		.callback = set_pci_reboot,
194		.ident = "Apple MacBook6,1",
195		.matches = {
196			DMI_MATCH(DMI_SYS_VENDOR, "Apple Inc."),
197			DMI_MATCH(DMI_PRODUCT_NAME, "MacBook6,1"),
198		},
199	},
200	{	/* Handle problems with rebooting on Apple MacBookPro5 */
201		.callback = set_pci_reboot,
202		.ident = "Apple MacBookPro5",
203		.matches = {
204			DMI_MATCH(DMI_SYS_VENDOR, "Apple Inc."),
205			DMI_MATCH(DMI_PRODUCT_NAME, "MacBookPro5"),
206		},
207	},
208	{	/* Handle problems with rebooting on Apple Macmini3,1 */
209		.callback = set_pci_reboot,
210		.ident = "Apple Macmini3,1",
211		.matches = {
212			DMI_MATCH(DMI_SYS_VENDOR, "Apple Inc."),
213			DMI_MATCH(DMI_PRODUCT_NAME, "Macmini3,1"),
214		},
215	},
216	{	/* Handle problems with rebooting on the iMac9,1. */
217		.callback = set_pci_reboot,
218		.ident = "Apple iMac9,1",
219		.matches = {
220			DMI_MATCH(DMI_SYS_VENDOR, "Apple Inc."),
221			DMI_MATCH(DMI_PRODUCT_NAME, "iMac9,1"),
222		},
223	},
224	{	/* Handle problems with rebooting on the iMac10,1. */
225		.callback = set_pci_reboot,
226		.ident = "Apple iMac10,1",
227		.matches = {
228		    DMI_MATCH(DMI_SYS_VENDOR, "Apple Inc."),
229		    DMI_MATCH(DMI_PRODUCT_NAME, "iMac10,1"),
230		},
231	},
232
233	/* ASRock */
234	{	/* Handle problems with rebooting on ASRock Q1900DC-ITX */
235		.callback = set_pci_reboot,
236		.ident = "ASRock Q1900DC-ITX",
237		.matches = {
238			DMI_MATCH(DMI_BOARD_VENDOR, "ASRock"),
239			DMI_MATCH(DMI_BOARD_NAME, "Q1900DC-ITX"),
240		},
241	},
242
243	/* ASUS */
244	{	/* Handle problems with rebooting on ASUS P4S800 */
245		.callback = set_bios_reboot,
246		.ident = "ASUS P4S800",
247		.matches = {
248			DMI_MATCH(DMI_BOARD_VENDOR, "ASUSTeK Computer INC."),
249			DMI_MATCH(DMI_BOARD_NAME, "P4S800"),
250		},
251	},
252	{	/* Handle problems with rebooting on ASUS EeeBook X205TA */
253		.callback = set_acpi_reboot,
254		.ident = "ASUS EeeBook X205TA",
255		.matches = {
256			DMI_MATCH(DMI_SYS_VENDOR, "ASUSTeK COMPUTER INC."),
257			DMI_MATCH(DMI_PRODUCT_NAME, "X205TA"),
258		},
259	},
260	{	/* Handle problems with rebooting on ASUS EeeBook X205TAW */
261		.callback = set_acpi_reboot,
262		.ident = "ASUS EeeBook X205TAW",
263		.matches = {
264			DMI_MATCH(DMI_SYS_VENDOR, "ASUSTeK COMPUTER INC."),
265			DMI_MATCH(DMI_PRODUCT_NAME, "X205TAW"),
266		},
267	},
268
269	/* Certec */
270	{       /* Handle problems with rebooting on Certec BPC600 */
271		.callback = set_pci_reboot,
272		.ident = "Certec BPC600",
273		.matches = {
274			DMI_MATCH(DMI_SYS_VENDOR, "Certec"),
275			DMI_MATCH(DMI_PRODUCT_NAME, "BPC600"),
276		},
277	},
278
279	/* Dell */
280	{	/* Handle problems with rebooting on Dell DXP061 */
281		.callback = set_bios_reboot,
282		.ident = "Dell DXP061",
283		.matches = {
284			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
285			DMI_MATCH(DMI_PRODUCT_NAME, "Dell DXP061"),
286		},
287	},
288	{	/* Handle problems with rebooting on Dell E520's */
289		.callback = set_bios_reboot,
290		.ident = "Dell E520",
291		.matches = {
292			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
293			DMI_MATCH(DMI_PRODUCT_NAME, "Dell DM061"),
294		},
295	},
296	{	/* Handle problems with rebooting on the Latitude E5410. */
297		.callback = set_pci_reboot,
298		.ident = "Dell Latitude E5410",
299		.matches = {
300			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
301			DMI_MATCH(DMI_PRODUCT_NAME, "Latitude E5410"),
302		},
303	},
304	{	/* Handle problems with rebooting on the Latitude E5420. */
305		.callback = set_pci_reboot,
306		.ident = "Dell Latitude E5420",
307		.matches = {
308			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
309			DMI_MATCH(DMI_PRODUCT_NAME, "Latitude E5420"),
310		},
311	},
312	{	/* Handle problems with rebooting on the Latitude E6320. */
313		.callback = set_pci_reboot,
314		.ident = "Dell Latitude E6320",
315		.matches = {
316			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
317			DMI_MATCH(DMI_PRODUCT_NAME, "Latitude E6320"),
318		},
319	},
320	{	/* Handle problems with rebooting on the Latitude E6420. */
321		.callback = set_pci_reboot,
322		.ident = "Dell Latitude E6420",
323		.matches = {
324			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
325			DMI_MATCH(DMI_PRODUCT_NAME, "Latitude E6420"),
326		},
327	},
328	{	/* Handle problems with rebooting on Dell Optiplex 330 with 0KP561 */
329		.callback = set_bios_reboot,
330		.ident = "Dell OptiPlex 330",
331		.matches = {
332			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
333			DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 330"),
334			DMI_MATCH(DMI_BOARD_NAME, "0KP561"),
335		},
336	},
337	{	/* Handle problems with rebooting on Dell Optiplex 360 with 0T656F */
338		.callback = set_bios_reboot,
339		.ident = "Dell OptiPlex 360",
340		.matches = {
341			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
342			DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 360"),
343			DMI_MATCH(DMI_BOARD_NAME, "0T656F"),
344		},
345	},
346	{	/* Handle problems with rebooting on Dell Optiplex 745's SFF */
347		.callback = set_bios_reboot,
348		.ident = "Dell OptiPlex 745",
349		.matches = {
350			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
351			DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 745"),
352		},
353	},
354	{	/* Handle problems with rebooting on Dell Optiplex 745's DFF */
355		.callback = set_bios_reboot,
356		.ident = "Dell OptiPlex 745",
357		.matches = {
358			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
359			DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 745"),
360			DMI_MATCH(DMI_BOARD_NAME, "0MM599"),
361		},
362	},
363	{	/* Handle problems with rebooting on Dell Optiplex 745 with 0KW626 */
364		.callback = set_bios_reboot,
365		.ident = "Dell OptiPlex 745",
366		.matches = {
367			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
368			DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 745"),
369			DMI_MATCH(DMI_BOARD_NAME, "0KW626"),
370		},
371	},
372	{	/* Handle problems with rebooting on Dell OptiPlex 760 with 0G919G */
373		.callback = set_bios_reboot,
374		.ident = "Dell OptiPlex 760",
375		.matches = {
376			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
377			DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 760"),
378			DMI_MATCH(DMI_BOARD_NAME, "0G919G"),
379		},
380	},
381	{	/* Handle problems with rebooting on the OptiPlex 990. */
382		.callback = set_pci_reboot,
383		.ident = "Dell OptiPlex 990 BIOS A0x",
384		.matches = {
385			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
386			DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 990"),
387			DMI_MATCH(DMI_BIOS_VERSION, "A0"),
388		},
389	},
390	{	/* Handle problems with rebooting on Dell 300's */
391		.callback = set_bios_reboot,
392		.ident = "Dell PowerEdge 300",
393		.matches = {
394			DMI_MATCH(DMI_SYS_VENDOR, "Dell Computer Corporation"),
395			DMI_MATCH(DMI_PRODUCT_NAME, "PowerEdge 300/"),
396		},
397	},
398	{	/* Handle problems with rebooting on Dell 1300's */
399		.callback = set_bios_reboot,
400		.ident = "Dell PowerEdge 1300",
401		.matches = {
402			DMI_MATCH(DMI_SYS_VENDOR, "Dell Computer Corporation"),
403			DMI_MATCH(DMI_PRODUCT_NAME, "PowerEdge 1300/"),
404		},
405	},
406	{	/* Handle problems with rebooting on Dell 2400's */
407		.callback = set_bios_reboot,
408		.ident = "Dell PowerEdge 2400",
409		.matches = {
410			DMI_MATCH(DMI_SYS_VENDOR, "Dell Computer Corporation"),
411			DMI_MATCH(DMI_PRODUCT_NAME, "PowerEdge 2400"),
412		},
413	},
414	{	/* Handle problems with rebooting on the Dell PowerEdge C6100. */
415		.callback = set_pci_reboot,
416		.ident = "Dell PowerEdge C6100",
417		.matches = {
418			DMI_MATCH(DMI_SYS_VENDOR, "Dell"),
419			DMI_MATCH(DMI_PRODUCT_NAME, "C6100"),
420		},
421	},
422	{	/* Handle problems with rebooting on the Precision M6600. */
423		.callback = set_pci_reboot,
424		.ident = "Dell Precision M6600",
425		.matches = {
426			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
427			DMI_MATCH(DMI_PRODUCT_NAME, "Precision M6600"),
428		},
429	},
430	{	/* Handle problems with rebooting on Dell T5400's */
431		.callback = set_bios_reboot,
432		.ident = "Dell Precision T5400",
433		.matches = {
434			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
435			DMI_MATCH(DMI_PRODUCT_NAME, "Precision WorkStation T5400"),
436		},
437	},
438	{	/* Handle problems with rebooting on Dell T7400's */
439		.callback = set_bios_reboot,
440		.ident = "Dell Precision T7400",
441		.matches = {
442			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
443			DMI_MATCH(DMI_PRODUCT_NAME, "Precision WorkStation T7400"),
444		},
445	},
446	{	/* Handle problems with rebooting on Dell XPS710 */
447		.callback = set_bios_reboot,
448		.ident = "Dell XPS710",
449		.matches = {
450			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
451			DMI_MATCH(DMI_PRODUCT_NAME, "Dell XPS710"),
452		},
453	},
454	{	/* Handle problems with rebooting on Dell Optiplex 7450 AIO */
455		.callback = set_acpi_reboot,
456		.ident = "Dell OptiPlex 7450 AIO",
457		.matches = {
458			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
459			DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 7450 AIO"),
460		},
461	},
462
463	/* Hewlett-Packard */
464	{	/* Handle problems with rebooting on HP laptops */
465		.callback = set_bios_reboot,
466		.ident = "HP Compaq Laptop",
467		.matches = {
468			DMI_MATCH(DMI_SYS_VENDOR, "Hewlett-Packard"),
469			DMI_MATCH(DMI_PRODUCT_NAME, "HP Compaq"),
470		},
471	},
472
473	{	/* PCIe Wifi card isn't detected after reboot otherwise */
474		.callback = set_pci_reboot,
475		.ident = "Zotac ZBOX CI327 nano",
476		.matches = {
477			DMI_MATCH(DMI_SYS_VENDOR, "NA"),
478			DMI_MATCH(DMI_PRODUCT_NAME, "ZBOX-CI327NANO-GS-01"),
479		},
480	},
481
482	/* Sony */
483	{	/* Handle problems with rebooting on Sony VGN-Z540N */
484		.callback = set_bios_reboot,
485		.ident = "Sony VGN-Z540N",
486		.matches = {
487			DMI_MATCH(DMI_SYS_VENDOR, "Sony Corporation"),
488			DMI_MATCH(DMI_PRODUCT_NAME, "VGN-Z540N"),
489		},
490	},
491
492	{ }
493};
494
495static int __init reboot_init(void)
496{
497	int rv;
498
499	/*
500	 * Only do the DMI check if reboot_type hasn't been overridden
501	 * on the command line
502	 */
503	if (!reboot_default)
504		return 0;
505
506	/*
507	 * The DMI quirks table takes precedence. If no quirks entry
508	 * matches and the ACPI Hardware Reduced bit is set and EFI
509	 * runtime services are enabled, force EFI reboot.
510	 */
511	rv = dmi_check_system(reboot_dmi_table);
512
513	if (!rv && efi_reboot_required() && !efi_runtime_disabled())
514		reboot_type = BOOT_EFI;
515
516	return 0;
517}
518core_initcall(reboot_init);
519
520static inline void kb_wait(void)
521{
522	int i;
523
524	for (i = 0; i < 0x10000; i++) {
525		if ((inb(0x64) & 0x02) == 0)
526			break;
527		udelay(2);
528	}
529}
530
531static inline void nmi_shootdown_cpus_on_restart(void);
532
533#if IS_ENABLED(CONFIG_KVM_X86)
534/* RCU-protected callback to disable virtualization prior to reboot. */
535static cpu_emergency_virt_cb __rcu *cpu_emergency_virt_callback;
536
537void cpu_emergency_register_virt_callback(cpu_emergency_virt_cb *callback)
538{
539	if (WARN_ON_ONCE(rcu_access_pointer(cpu_emergency_virt_callback)))
540		return;
541
542	rcu_assign_pointer(cpu_emergency_virt_callback, callback);
543}
544EXPORT_SYMBOL_GPL(cpu_emergency_register_virt_callback);
545
546void cpu_emergency_unregister_virt_callback(cpu_emergency_virt_cb *callback)
547{
548	if (WARN_ON_ONCE(rcu_access_pointer(cpu_emergency_virt_callback) != callback))
549		return;
550
551	rcu_assign_pointer(cpu_emergency_virt_callback, NULL);
552	synchronize_rcu();
553}
554EXPORT_SYMBOL_GPL(cpu_emergency_unregister_virt_callback);
555
556/*
557 * Disable virtualization, i.e. VMX or SVM, to ensure INIT is recognized during
558 * reboot.  VMX blocks INIT if the CPU is post-VMXON, and SVM blocks INIT if
559 * GIF=0, i.e. if the crash occurred between CLGI and STGI.
560 */
561void cpu_emergency_disable_virtualization(void)
562{
563	cpu_emergency_virt_cb *callback;
564
565	/*
566	 * IRQs must be disabled as KVM enables virtualization in hardware via
567	 * function call IPIs, i.e. IRQs need to be disabled to guarantee
568	 * virtualization stays disabled.
569	 */
570	lockdep_assert_irqs_disabled();
571
572	rcu_read_lock();
573	callback = rcu_dereference(cpu_emergency_virt_callback);
574	if (callback)
575		callback();
576	rcu_read_unlock();
577}
578
579static void emergency_reboot_disable_virtualization(void)
580{
581	local_irq_disable();
582
583	/*
584	 * Disable virtualization on all CPUs before rebooting to avoid hanging
585	 * the system, as VMX and SVM block INIT when running in the host.
586	 *
587	 * We can't take any locks and we may be on an inconsistent state, so
588	 * use NMIs as IPIs to tell the other CPUs to disable VMX/SVM and halt.
589	 *
590	 * Do the NMI shootdown even if virtualization is off on _this_ CPU, as
591	 * other CPUs may have virtualization enabled.
592	 */
593	if (rcu_access_pointer(cpu_emergency_virt_callback)) {
594		/* Safely force _this_ CPU out of VMX/SVM operation. */
595		cpu_emergency_disable_virtualization();
596
597		/* Disable VMX/SVM and halt on other CPUs. */
598		nmi_shootdown_cpus_on_restart();
599	}
600}
601#else
602static void emergency_reboot_disable_virtualization(void) { }
603#endif /* CONFIG_KVM_X86 */
604
605void __attribute__((weak)) mach_reboot_fixups(void)
606{
607}
608
609/*
610 * To the best of our knowledge Windows compatible x86 hardware expects
611 * the following on reboot:
612 *
613 * 1) If the FADT has the ACPI reboot register flag set, try it
614 * 2) If still alive, write to the keyboard controller
615 * 3) If still alive, write to the ACPI reboot register again
616 * 4) If still alive, write to the keyboard controller again
617 * 5) If still alive, call the EFI runtime service to reboot
618 * 6) If no EFI runtime service, call the BIOS to do a reboot
619 *
620 * We default to following the same pattern. We also have
621 * two other reboot methods: 'triple fault' and 'PCI', which
622 * can be triggered via the reboot= kernel boot option or
623 * via quirks.
624 *
625 * This means that this function can never return, it can misbehave
626 * by not rebooting properly and hanging.
627 */
628static void native_machine_emergency_restart(void)
629{
630	int i;
631	int attempt = 0;
632	int orig_reboot_type = reboot_type;
633	unsigned short mode;
634
635	if (reboot_emergency)
636		emergency_reboot_disable_virtualization();
637
638	tboot_shutdown(TB_SHUTDOWN_REBOOT);
639
640	/* Tell the BIOS if we want cold or warm reboot */
641	mode = reboot_mode == REBOOT_WARM ? 0x1234 : 0;
642	*((unsigned short *)__va(0x472)) = mode;
643
644	/*
645	 * If an EFI capsule has been registered with the firmware then
646	 * override the reboot= parameter.
647	 */
648	if (efi_capsule_pending(NULL)) {
649		pr_info("EFI capsule is pending, forcing EFI reboot.\n");
650		reboot_type = BOOT_EFI;
651	}
652
653	for (;;) {
654		/* Could also try the reset bit in the Hammer NB */
655		switch (reboot_type) {
656		case BOOT_ACPI:
657			acpi_reboot();
658			reboot_type = BOOT_KBD;
659			break;
660
661		case BOOT_KBD:
662			mach_reboot_fixups(); /* For board specific fixups */
663
664			for (i = 0; i < 10; i++) {
665				kb_wait();
666				udelay(50);
667				outb(0xfe, 0x64); /* Pulse reset low */
668				udelay(50);
669			}
670			if (attempt == 0 && orig_reboot_type == BOOT_ACPI) {
671				attempt = 1;
672				reboot_type = BOOT_ACPI;
673			} else {
674				reboot_type = BOOT_EFI;
675			}
676			break;
677
678		case BOOT_EFI:
679			efi_reboot(reboot_mode, NULL);
680			reboot_type = BOOT_BIOS;
681			break;
682
683		case BOOT_BIOS:
684			machine_real_restart(MRR_BIOS);
685
686			/* We're probably dead after this, but... */
687			reboot_type = BOOT_CF9_SAFE;
688			break;
689
690		case BOOT_CF9_FORCE:
691			port_cf9_safe = true;
692			fallthrough;
693
694		case BOOT_CF9_SAFE:
695			if (port_cf9_safe) {
696				u8 reboot_code = reboot_mode == REBOOT_WARM ?  0x06 : 0x0E;
697				u8 cf9 = inb(0xcf9) & ~reboot_code;
698				outb(cf9|2, 0xcf9); /* Request hard reset */
699				udelay(50);
700				/* Actually do the reset */
701				outb(cf9|reboot_code, 0xcf9);
702				udelay(50);
703			}
704			reboot_type = BOOT_TRIPLE;
705			break;
706
707		case BOOT_TRIPLE:
708			idt_invalidate();
709			__asm__ __volatile__("int3");
710
711			/* We're probably dead after this, but... */
712			reboot_type = BOOT_KBD;
713			break;
714		}
715	}
716}
717
718void native_machine_shutdown(void)
719{
720	/*
721	 * Call enc_kexec_begin() while all CPUs are still active and
722	 * interrupts are enabled. This will allow all in-flight memory
723	 * conversions to finish cleanly.
724	 */
725	if (kexec_in_progress)
726		x86_platform.guest.enc_kexec_begin();
727
728	/* Stop the cpus and apics */
729#ifdef CONFIG_X86_IO_APIC
730	/*
731	 * Disabling IO APIC before local APIC is a workaround for
732	 * erratum AVR31 in "Intel Atom Processor C2000 Product Family
733	 * Specification Update". In this situation, interrupts that target
734	 * a Logical Processor whose Local APIC is either in the process of
735	 * being hardware disabled or software disabled are neither delivered
736	 * nor discarded. When this erratum occurs, the processor may hang.
737	 *
738	 * Even without the erratum, it still makes sense to quiet IO APIC
739	 * before disabling Local APIC.
740	 */
741	clear_IO_APIC();
742#endif
743
744#ifdef CONFIG_SMP
745	/*
746	 * Stop all of the others. Also disable the local irq to
747	 * not receive the per-cpu timer interrupt which may trigger
748	 * scheduler's load balance.
749	 */
750	local_irq_disable();
751	stop_other_cpus();
752#endif
753
754	lapic_shutdown();
755	restore_boot_irq_mode();
756
757#ifdef CONFIG_HPET_TIMER
758	hpet_disable();
759#endif
760
761#ifdef CONFIG_X86_64
762	x86_platform.iommu_shutdown();
763#endif
764
765	if (kexec_in_progress)
766		x86_platform.guest.enc_kexec_finish();
767}
768
769static void __machine_emergency_restart(int emergency)
770{
771	reboot_emergency = emergency;
772	machine_ops.emergency_restart();
773}
774
775static void native_machine_restart(char *__unused)
776{
777	pr_notice("machine restart\n");
778
779	if (!reboot_force)
780		machine_shutdown();
781	__machine_emergency_restart(0);
782}
783
784static void native_machine_halt(void)
785{
786	/* Stop other cpus and apics */
787	machine_shutdown();
788
789	tboot_shutdown(TB_SHUTDOWN_HALT);
790
791	stop_this_cpu(NULL);
792}
793
794static void native_machine_power_off(void)
795{
796	if (kernel_can_power_off()) {
797		if (!reboot_force)
798			machine_shutdown();
799		do_kernel_power_off();
800	}
801	/* A fallback in case there is no PM info available */
802	tboot_shutdown(TB_SHUTDOWN_HALT);
803}
804
805struct machine_ops machine_ops __ro_after_init = {
806	.power_off = native_machine_power_off,
807	.shutdown = native_machine_shutdown,
808	.emergency_restart = native_machine_emergency_restart,
809	.restart = native_machine_restart,
810	.halt = native_machine_halt,
811#ifdef CONFIG_CRASH_DUMP
812	.crash_shutdown = native_machine_crash_shutdown,
813#endif
814};
815
816void machine_power_off(void)
817{
818	machine_ops.power_off();
819}
820
821void machine_shutdown(void)
822{
823	machine_ops.shutdown();
824}
825
826void machine_emergency_restart(void)
827{
828	__machine_emergency_restart(1);
829}
830
831void machine_restart(char *cmd)
832{
833	machine_ops.restart(cmd);
834}
835
836void machine_halt(void)
837{
838	machine_ops.halt();
839}
840
841#ifdef CONFIG_CRASH_DUMP
842void machine_crash_shutdown(struct pt_regs *regs)
843{
844	machine_ops.crash_shutdown(regs);
845}
846#endif
847
848/* This is the CPU performing the emergency shutdown work. */
849int crashing_cpu = -1;
850
851#if defined(CONFIG_SMP)
852
853static nmi_shootdown_cb shootdown_callback;
854
855static atomic_t waiting_for_crash_ipi;
856static int crash_ipi_issued;
857
858static int crash_nmi_callback(unsigned int val, struct pt_regs *regs)
859{
860	int cpu;
861
862	cpu = raw_smp_processor_id();
863
864	/*
865	 * Don't do anything if this handler is invoked on crashing cpu.
866	 * Otherwise, system will completely hang. Crashing cpu can get
867	 * an NMI if system was initially booted with nmi_watchdog parameter.
868	 */
869	if (cpu == crashing_cpu)
870		return NMI_HANDLED;
871	local_irq_disable();
872
873	if (shootdown_callback)
874		shootdown_callback(cpu, regs);
875
876	/*
877	 * Prepare the CPU for reboot _after_ invoking the callback so that the
878	 * callback can safely use virtualization instructions, e.g. VMCLEAR.
879	 */
880	cpu_emergency_disable_virtualization();
881
882	atomic_dec(&waiting_for_crash_ipi);
883
884	if (smp_ops.stop_this_cpu) {
885		smp_ops.stop_this_cpu();
886		BUG();
887	}
888
889	/* Assume hlt works */
890	halt();
891	for (;;)
892		cpu_relax();
893
894	return NMI_HANDLED;
895}
896
897/**
898 * nmi_shootdown_cpus - Stop other CPUs via NMI
899 * @callback:	Optional callback to be invoked from the NMI handler
900 *
901 * The NMI handler on the remote CPUs invokes @callback, if not
902 * NULL, first and then disables virtualization to ensure that
903 * INIT is recognized during reboot.
904 *
905 * nmi_shootdown_cpus() can only be invoked once. After the first
906 * invocation all other CPUs are stuck in crash_nmi_callback() and
907 * cannot respond to a second NMI.
908 */
909void nmi_shootdown_cpus(nmi_shootdown_cb callback)
910{
911	unsigned long msecs;
912
913	local_irq_disable();
914
915	/*
916	 * Avoid certain doom if a shootdown already occurred; re-registering
917	 * the NMI handler will cause list corruption, modifying the callback
918	 * will do who knows what, etc...
919	 */
920	if (WARN_ON_ONCE(crash_ipi_issued))
921		return;
922
923	/* Make a note of crashing cpu. Will be used in NMI callback. */
924	crashing_cpu = safe_smp_processor_id();
925
926	shootdown_callback = callback;
927
928	atomic_set(&waiting_for_crash_ipi, num_online_cpus() - 1);
929	/* Would it be better to replace the trap vector here? */
930	if (register_nmi_handler(NMI_LOCAL, crash_nmi_callback,
931				 NMI_FLAG_FIRST, "crash"))
932		return;		/* Return what? */
933	/*
934	 * Ensure the new callback function is set before sending
935	 * out the NMI
936	 */
937	wmb();
938
939	apic_send_IPI_allbutself(NMI_VECTOR);
940
941	/* Kick CPUs looping in NMI context. */
942	WRITE_ONCE(crash_ipi_issued, 1);
943
944	msecs = 1000; /* Wait at most a second for the other cpus to stop */
945	while ((atomic_read(&waiting_for_crash_ipi) > 0) && msecs) {
946		mdelay(1);
947		msecs--;
948	}
949
950	/*
951	 * Leave the nmi callback set, shootdown is a one-time thing.  Clearing
952	 * the callback could result in a NULL pointer dereference if a CPU
953	 * (finally) responds after the timeout expires.
954	 */
955}
956
957static inline void nmi_shootdown_cpus_on_restart(void)
958{
959	if (!crash_ipi_issued)
960		nmi_shootdown_cpus(NULL);
961}
962
963/*
964 * Check if the crash dumping IPI got issued and if so, call its callback
965 * directly. This function is used when we have already been in NMI handler.
966 * It doesn't return.
967 */
968void run_crash_ipi_callback(struct pt_regs *regs)
969{
970	if (crash_ipi_issued)
971		crash_nmi_callback(0, regs);
972}
973
974/* Override the weak function in kernel/panic.c */
975void __noreturn nmi_panic_self_stop(struct pt_regs *regs)
976{
977	while (1) {
978		/* If no CPU is preparing crash dump, we simply loop here. */
979		run_crash_ipi_callback(regs);
980		cpu_relax();
981	}
982}
983
984#else /* !CONFIG_SMP */
985void nmi_shootdown_cpus(nmi_shootdown_cb callback)
986{
987	/* No other CPUs to shoot down */
988}
989
990static inline void nmi_shootdown_cpus_on_restart(void) { }
991
992void run_crash_ipi_callback(struct pt_regs *regs)
993{
994}
995#endif
v6.8
  1// SPDX-License-Identifier: GPL-2.0
  2#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
  3
  4#include <linux/export.h>
  5#include <linux/reboot.h>
  6#include <linux/init.h>
  7#include <linux/pm.h>
  8#include <linux/efi.h>
  9#include <linux/dmi.h>
 10#include <linux/sched.h>
 11#include <linux/tboot.h>
 12#include <linux/delay.h>
 13#include <linux/objtool.h>
 14#include <linux/pgtable.h>
 
 15#include <acpi/reboot.h>
 16#include <asm/io.h>
 17#include <asm/apic.h>
 18#include <asm/io_apic.h>
 19#include <asm/desc.h>
 20#include <asm/hpet.h>
 21#include <asm/proto.h>
 22#include <asm/reboot_fixups.h>
 23#include <asm/reboot.h>
 24#include <asm/pci_x86.h>
 25#include <asm/cpu.h>
 26#include <asm/nmi.h>
 27#include <asm/smp.h>
 28
 29#include <linux/ctype.h>
 30#include <linux/mc146818rtc.h>
 31#include <asm/realmode.h>
 32#include <asm/x86_init.h>
 33#include <asm/efi.h>
 34
 35/*
 36 * Power off function, if any
 37 */
 38void (*pm_power_off)(void);
 39EXPORT_SYMBOL(pm_power_off);
 40
 41/*
 42 * This is set if we need to go through the 'emergency' path.
 43 * When machine_emergency_restart() is called, we may be on
 44 * an inconsistent state and won't be able to do a clean cleanup
 45 */
 46static int reboot_emergency;
 47
 48/* This is set by the PCI code if either type 1 or type 2 PCI is detected */
 49bool port_cf9_safe = false;
 50
 51/*
 52 * Reboot options and system auto-detection code provided by
 53 * Dell Inc. so their systems "just work". :-)
 54 */
 55
 56/*
 57 * Some machines require the "reboot=a" commandline options
 58 */
 59static int __init set_acpi_reboot(const struct dmi_system_id *d)
 60{
 61	if (reboot_type != BOOT_ACPI) {
 62		reboot_type = BOOT_ACPI;
 63		pr_info("%s series board detected. Selecting %s-method for reboots.\n",
 64			d->ident, "ACPI");
 65	}
 66	return 0;
 67}
 68
 69/*
 70 * Some machines require the "reboot=b" or "reboot=k"  commandline options,
 71 * this quirk makes that automatic.
 72 */
 73static int __init set_bios_reboot(const struct dmi_system_id *d)
 74{
 75	if (reboot_type != BOOT_BIOS) {
 76		reboot_type = BOOT_BIOS;
 77		pr_info("%s series board detected. Selecting %s-method for reboots.\n",
 78			d->ident, "BIOS");
 79	}
 80	return 0;
 81}
 82
 83/*
 84 * Some machines don't handle the default ACPI reboot method and
 85 * require the EFI reboot method:
 86 */
 87static int __init set_efi_reboot(const struct dmi_system_id *d)
 88{
 89	if (reboot_type != BOOT_EFI && !efi_runtime_disabled()) {
 90		reboot_type = BOOT_EFI;
 91		pr_info("%s series board detected. Selecting EFI-method for reboot.\n", d->ident);
 92	}
 93	return 0;
 94}
 95
 96void __noreturn machine_real_restart(unsigned int type)
 97{
 98	local_irq_disable();
 99
100	/*
101	 * Write zero to CMOS register number 0x0f, which the BIOS POST
102	 * routine will recognize as telling it to do a proper reboot.  (Well
103	 * that's what this book in front of me says -- it may only apply to
104	 * the Phoenix BIOS though, it's not clear).  At the same time,
105	 * disable NMIs by setting the top bit in the CMOS address register,
106	 * as we're about to do peculiar things to the CPU.  I'm not sure if
107	 * `outb_p' is needed instead of just `outb'.  Use it to be on the
108	 * safe side.  (Yes, CMOS_WRITE does outb_p's. -  Paul G.)
109	 */
110	spin_lock(&rtc_lock);
111	CMOS_WRITE(0x00, 0x8f);
112	spin_unlock(&rtc_lock);
113
114	/*
115	 * Switch to the trampoline page table.
116	 */
117	load_trampoline_pgtable();
118
119	/* Jump to the identity-mapped low memory code */
120#ifdef CONFIG_X86_32
121	asm volatile("jmpl *%0" : :
122		     "rm" (real_mode_header->machine_real_restart_asm),
123		     "a" (type));
124#else
125	asm volatile("ljmpl *%0" : :
126		     "m" (real_mode_header->machine_real_restart_asm),
127		     "D" (type));
128#endif
129	unreachable();
130}
131#ifdef CONFIG_APM_MODULE
132EXPORT_SYMBOL(machine_real_restart);
133#endif
134STACK_FRAME_NON_STANDARD(machine_real_restart);
135
136/*
137 * Some Apple MacBook and MacBookPro's needs reboot=p to be able to reboot
138 */
139static int __init set_pci_reboot(const struct dmi_system_id *d)
140{
141	if (reboot_type != BOOT_CF9_FORCE) {
142		reboot_type = BOOT_CF9_FORCE;
143		pr_info("%s series board detected. Selecting %s-method for reboots.\n",
144			d->ident, "PCI");
145	}
146	return 0;
147}
148
149static int __init set_kbd_reboot(const struct dmi_system_id *d)
150{
151	if (reboot_type != BOOT_KBD) {
152		reboot_type = BOOT_KBD;
153		pr_info("%s series board detected. Selecting %s-method for reboot.\n",
154			d->ident, "KBD");
155	}
156	return 0;
157}
158
159/*
160 * This is a single dmi_table handling all reboot quirks.
161 */
162static const struct dmi_system_id reboot_dmi_table[] __initconst = {
163
164	/* Acer */
165	{	/* Handle reboot issue on Acer Aspire one */
166		.callback = set_kbd_reboot,
167		.ident = "Acer Aspire One A110",
168		.matches = {
169			DMI_MATCH(DMI_SYS_VENDOR, "Acer"),
170			DMI_MATCH(DMI_PRODUCT_NAME, "AOA110"),
171		},
172	},
173	{	/* Handle reboot issue on Acer TravelMate X514-51T */
174		.callback = set_efi_reboot,
175		.ident = "Acer TravelMate X514-51T",
176		.matches = {
177			DMI_MATCH(DMI_SYS_VENDOR, "Acer"),
178			DMI_MATCH(DMI_PRODUCT_NAME, "TravelMate X514-51T"),
179		},
180	},
181
182	/* Apple */
183	{	/* Handle problems with rebooting on Apple MacBook5 */
184		.callback = set_pci_reboot,
185		.ident = "Apple MacBook5",
186		.matches = {
187			DMI_MATCH(DMI_SYS_VENDOR, "Apple Inc."),
188			DMI_MATCH(DMI_PRODUCT_NAME, "MacBook5"),
189		},
190	},
191	{	/* Handle problems with rebooting on Apple MacBook6,1 */
192		.callback = set_pci_reboot,
193		.ident = "Apple MacBook6,1",
194		.matches = {
195			DMI_MATCH(DMI_SYS_VENDOR, "Apple Inc."),
196			DMI_MATCH(DMI_PRODUCT_NAME, "MacBook6,1"),
197		},
198	},
199	{	/* Handle problems with rebooting on Apple MacBookPro5 */
200		.callback = set_pci_reboot,
201		.ident = "Apple MacBookPro5",
202		.matches = {
203			DMI_MATCH(DMI_SYS_VENDOR, "Apple Inc."),
204			DMI_MATCH(DMI_PRODUCT_NAME, "MacBookPro5"),
205		},
206	},
207	{	/* Handle problems with rebooting on Apple Macmini3,1 */
208		.callback = set_pci_reboot,
209		.ident = "Apple Macmini3,1",
210		.matches = {
211			DMI_MATCH(DMI_SYS_VENDOR, "Apple Inc."),
212			DMI_MATCH(DMI_PRODUCT_NAME, "Macmini3,1"),
213		},
214	},
215	{	/* Handle problems with rebooting on the iMac9,1. */
216		.callback = set_pci_reboot,
217		.ident = "Apple iMac9,1",
218		.matches = {
219			DMI_MATCH(DMI_SYS_VENDOR, "Apple Inc."),
220			DMI_MATCH(DMI_PRODUCT_NAME, "iMac9,1"),
221		},
222	},
223	{	/* Handle problems with rebooting on the iMac10,1. */
224		.callback = set_pci_reboot,
225		.ident = "Apple iMac10,1",
226		.matches = {
227		    DMI_MATCH(DMI_SYS_VENDOR, "Apple Inc."),
228		    DMI_MATCH(DMI_PRODUCT_NAME, "iMac10,1"),
229		},
230	},
231
232	/* ASRock */
233	{	/* Handle problems with rebooting on ASRock Q1900DC-ITX */
234		.callback = set_pci_reboot,
235		.ident = "ASRock Q1900DC-ITX",
236		.matches = {
237			DMI_MATCH(DMI_BOARD_VENDOR, "ASRock"),
238			DMI_MATCH(DMI_BOARD_NAME, "Q1900DC-ITX"),
239		},
240	},
241
242	/* ASUS */
243	{	/* Handle problems with rebooting on ASUS P4S800 */
244		.callback = set_bios_reboot,
245		.ident = "ASUS P4S800",
246		.matches = {
247			DMI_MATCH(DMI_BOARD_VENDOR, "ASUSTeK Computer INC."),
248			DMI_MATCH(DMI_BOARD_NAME, "P4S800"),
249		},
250	},
251	{	/* Handle problems with rebooting on ASUS EeeBook X205TA */
252		.callback = set_acpi_reboot,
253		.ident = "ASUS EeeBook X205TA",
254		.matches = {
255			DMI_MATCH(DMI_SYS_VENDOR, "ASUSTeK COMPUTER INC."),
256			DMI_MATCH(DMI_PRODUCT_NAME, "X205TA"),
257		},
258	},
259	{	/* Handle problems with rebooting on ASUS EeeBook X205TAW */
260		.callback = set_acpi_reboot,
261		.ident = "ASUS EeeBook X205TAW",
262		.matches = {
263			DMI_MATCH(DMI_SYS_VENDOR, "ASUSTeK COMPUTER INC."),
264			DMI_MATCH(DMI_PRODUCT_NAME, "X205TAW"),
265		},
266	},
267
268	/* Certec */
269	{       /* Handle problems with rebooting on Certec BPC600 */
270		.callback = set_pci_reboot,
271		.ident = "Certec BPC600",
272		.matches = {
273			DMI_MATCH(DMI_SYS_VENDOR, "Certec"),
274			DMI_MATCH(DMI_PRODUCT_NAME, "BPC600"),
275		},
276	},
277
278	/* Dell */
279	{	/* Handle problems with rebooting on Dell DXP061 */
280		.callback = set_bios_reboot,
281		.ident = "Dell DXP061",
282		.matches = {
283			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
284			DMI_MATCH(DMI_PRODUCT_NAME, "Dell DXP061"),
285		},
286	},
287	{	/* Handle problems with rebooting on Dell E520's */
288		.callback = set_bios_reboot,
289		.ident = "Dell E520",
290		.matches = {
291			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
292			DMI_MATCH(DMI_PRODUCT_NAME, "Dell DM061"),
293		},
294	},
295	{	/* Handle problems with rebooting on the Latitude E5410. */
296		.callback = set_pci_reboot,
297		.ident = "Dell Latitude E5410",
298		.matches = {
299			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
300			DMI_MATCH(DMI_PRODUCT_NAME, "Latitude E5410"),
301		},
302	},
303	{	/* Handle problems with rebooting on the Latitude E5420. */
304		.callback = set_pci_reboot,
305		.ident = "Dell Latitude E5420",
306		.matches = {
307			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
308			DMI_MATCH(DMI_PRODUCT_NAME, "Latitude E5420"),
309		},
310	},
311	{	/* Handle problems with rebooting on the Latitude E6320. */
312		.callback = set_pci_reboot,
313		.ident = "Dell Latitude E6320",
314		.matches = {
315			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
316			DMI_MATCH(DMI_PRODUCT_NAME, "Latitude E6320"),
317		},
318	},
319	{	/* Handle problems with rebooting on the Latitude E6420. */
320		.callback = set_pci_reboot,
321		.ident = "Dell Latitude E6420",
322		.matches = {
323			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
324			DMI_MATCH(DMI_PRODUCT_NAME, "Latitude E6420"),
325		},
326	},
327	{	/* Handle problems with rebooting on Dell Optiplex 330 with 0KP561 */
328		.callback = set_bios_reboot,
329		.ident = "Dell OptiPlex 330",
330		.matches = {
331			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
332			DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 330"),
333			DMI_MATCH(DMI_BOARD_NAME, "0KP561"),
334		},
335	},
336	{	/* Handle problems with rebooting on Dell Optiplex 360 with 0T656F */
337		.callback = set_bios_reboot,
338		.ident = "Dell OptiPlex 360",
339		.matches = {
340			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
341			DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 360"),
342			DMI_MATCH(DMI_BOARD_NAME, "0T656F"),
343		},
344	},
345	{	/* Handle problems with rebooting on Dell Optiplex 745's SFF */
346		.callback = set_bios_reboot,
347		.ident = "Dell OptiPlex 745",
348		.matches = {
349			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
350			DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 745"),
351		},
352	},
353	{	/* Handle problems with rebooting on Dell Optiplex 745's DFF */
354		.callback = set_bios_reboot,
355		.ident = "Dell OptiPlex 745",
356		.matches = {
357			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
358			DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 745"),
359			DMI_MATCH(DMI_BOARD_NAME, "0MM599"),
360		},
361	},
362	{	/* Handle problems with rebooting on Dell Optiplex 745 with 0KW626 */
363		.callback = set_bios_reboot,
364		.ident = "Dell OptiPlex 745",
365		.matches = {
366			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
367			DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 745"),
368			DMI_MATCH(DMI_BOARD_NAME, "0KW626"),
369		},
370	},
371	{	/* Handle problems with rebooting on Dell OptiPlex 760 with 0G919G */
372		.callback = set_bios_reboot,
373		.ident = "Dell OptiPlex 760",
374		.matches = {
375			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
376			DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 760"),
377			DMI_MATCH(DMI_BOARD_NAME, "0G919G"),
378		},
379	},
380	{	/* Handle problems with rebooting on the OptiPlex 990. */
381		.callback = set_pci_reboot,
382		.ident = "Dell OptiPlex 990 BIOS A0x",
383		.matches = {
384			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
385			DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 990"),
386			DMI_MATCH(DMI_BIOS_VERSION, "A0"),
387		},
388	},
389	{	/* Handle problems with rebooting on Dell 300's */
390		.callback = set_bios_reboot,
391		.ident = "Dell PowerEdge 300",
392		.matches = {
393			DMI_MATCH(DMI_SYS_VENDOR, "Dell Computer Corporation"),
394			DMI_MATCH(DMI_PRODUCT_NAME, "PowerEdge 300/"),
395		},
396	},
397	{	/* Handle problems with rebooting on Dell 1300's */
398		.callback = set_bios_reboot,
399		.ident = "Dell PowerEdge 1300",
400		.matches = {
401			DMI_MATCH(DMI_SYS_VENDOR, "Dell Computer Corporation"),
402			DMI_MATCH(DMI_PRODUCT_NAME, "PowerEdge 1300/"),
403		},
404	},
405	{	/* Handle problems with rebooting on Dell 2400's */
406		.callback = set_bios_reboot,
407		.ident = "Dell PowerEdge 2400",
408		.matches = {
409			DMI_MATCH(DMI_SYS_VENDOR, "Dell Computer Corporation"),
410			DMI_MATCH(DMI_PRODUCT_NAME, "PowerEdge 2400"),
411		},
412	},
413	{	/* Handle problems with rebooting on the Dell PowerEdge C6100. */
414		.callback = set_pci_reboot,
415		.ident = "Dell PowerEdge C6100",
416		.matches = {
417			DMI_MATCH(DMI_SYS_VENDOR, "Dell"),
418			DMI_MATCH(DMI_PRODUCT_NAME, "C6100"),
419		},
420	},
421	{	/* Handle problems with rebooting on the Precision M6600. */
422		.callback = set_pci_reboot,
423		.ident = "Dell Precision M6600",
424		.matches = {
425			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
426			DMI_MATCH(DMI_PRODUCT_NAME, "Precision M6600"),
427		},
428	},
429	{	/* Handle problems with rebooting on Dell T5400's */
430		.callback = set_bios_reboot,
431		.ident = "Dell Precision T5400",
432		.matches = {
433			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
434			DMI_MATCH(DMI_PRODUCT_NAME, "Precision WorkStation T5400"),
435		},
436	},
437	{	/* Handle problems with rebooting on Dell T7400's */
438		.callback = set_bios_reboot,
439		.ident = "Dell Precision T7400",
440		.matches = {
441			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
442			DMI_MATCH(DMI_PRODUCT_NAME, "Precision WorkStation T7400"),
443		},
444	},
445	{	/* Handle problems with rebooting on Dell XPS710 */
446		.callback = set_bios_reboot,
447		.ident = "Dell XPS710",
448		.matches = {
449			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
450			DMI_MATCH(DMI_PRODUCT_NAME, "Dell XPS710"),
451		},
452	},
453	{	/* Handle problems with rebooting on Dell Optiplex 7450 AIO */
454		.callback = set_acpi_reboot,
455		.ident = "Dell OptiPlex 7450 AIO",
456		.matches = {
457			DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
458			DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 7450 AIO"),
459		},
460	},
461
462	/* Hewlett-Packard */
463	{	/* Handle problems with rebooting on HP laptops */
464		.callback = set_bios_reboot,
465		.ident = "HP Compaq Laptop",
466		.matches = {
467			DMI_MATCH(DMI_SYS_VENDOR, "Hewlett-Packard"),
468			DMI_MATCH(DMI_PRODUCT_NAME, "HP Compaq"),
469		},
470	},
471
472	{	/* PCIe Wifi card isn't detected after reboot otherwise */
473		.callback = set_pci_reboot,
474		.ident = "Zotac ZBOX CI327 nano",
475		.matches = {
476			DMI_MATCH(DMI_SYS_VENDOR, "NA"),
477			DMI_MATCH(DMI_PRODUCT_NAME, "ZBOX-CI327NANO-GS-01"),
478		},
479	},
480
481	/* Sony */
482	{	/* Handle problems with rebooting on Sony VGN-Z540N */
483		.callback = set_bios_reboot,
484		.ident = "Sony VGN-Z540N",
485		.matches = {
486			DMI_MATCH(DMI_SYS_VENDOR, "Sony Corporation"),
487			DMI_MATCH(DMI_PRODUCT_NAME, "VGN-Z540N"),
488		},
489	},
490
491	{ }
492};
493
494static int __init reboot_init(void)
495{
496	int rv;
497
498	/*
499	 * Only do the DMI check if reboot_type hasn't been overridden
500	 * on the command line
501	 */
502	if (!reboot_default)
503		return 0;
504
505	/*
506	 * The DMI quirks table takes precedence. If no quirks entry
507	 * matches and the ACPI Hardware Reduced bit is set and EFI
508	 * runtime services are enabled, force EFI reboot.
509	 */
510	rv = dmi_check_system(reboot_dmi_table);
511
512	if (!rv && efi_reboot_required() && !efi_runtime_disabled())
513		reboot_type = BOOT_EFI;
514
515	return 0;
516}
517core_initcall(reboot_init);
518
519static inline void kb_wait(void)
520{
521	int i;
522
523	for (i = 0; i < 0x10000; i++) {
524		if ((inb(0x64) & 0x02) == 0)
525			break;
526		udelay(2);
527	}
528}
529
530static inline void nmi_shootdown_cpus_on_restart(void);
531
532#if IS_ENABLED(CONFIG_KVM_INTEL) || IS_ENABLED(CONFIG_KVM_AMD)
533/* RCU-protected callback to disable virtualization prior to reboot. */
534static cpu_emergency_virt_cb __rcu *cpu_emergency_virt_callback;
535
536void cpu_emergency_register_virt_callback(cpu_emergency_virt_cb *callback)
537{
538	if (WARN_ON_ONCE(rcu_access_pointer(cpu_emergency_virt_callback)))
539		return;
540
541	rcu_assign_pointer(cpu_emergency_virt_callback, callback);
542}
543EXPORT_SYMBOL_GPL(cpu_emergency_register_virt_callback);
544
545void cpu_emergency_unregister_virt_callback(cpu_emergency_virt_cb *callback)
546{
547	if (WARN_ON_ONCE(rcu_access_pointer(cpu_emergency_virt_callback) != callback))
548		return;
549
550	rcu_assign_pointer(cpu_emergency_virt_callback, NULL);
551	synchronize_rcu();
552}
553EXPORT_SYMBOL_GPL(cpu_emergency_unregister_virt_callback);
554
555/*
556 * Disable virtualization, i.e. VMX or SVM, to ensure INIT is recognized during
557 * reboot.  VMX blocks INIT if the CPU is post-VMXON, and SVM blocks INIT if
558 * GIF=0, i.e. if the crash occurred between CLGI and STGI.
559 */
560void cpu_emergency_disable_virtualization(void)
561{
562	cpu_emergency_virt_cb *callback;
563
564	/*
565	 * IRQs must be disabled as KVM enables virtualization in hardware via
566	 * function call IPIs, i.e. IRQs need to be disabled to guarantee
567	 * virtualization stays disabled.
568	 */
569	lockdep_assert_irqs_disabled();
570
571	rcu_read_lock();
572	callback = rcu_dereference(cpu_emergency_virt_callback);
573	if (callback)
574		callback();
575	rcu_read_unlock();
576}
577
578static void emergency_reboot_disable_virtualization(void)
579{
580	local_irq_disable();
581
582	/*
583	 * Disable virtualization on all CPUs before rebooting to avoid hanging
584	 * the system, as VMX and SVM block INIT when running in the host.
585	 *
586	 * We can't take any locks and we may be on an inconsistent state, so
587	 * use NMIs as IPIs to tell the other CPUs to disable VMX/SVM and halt.
588	 *
589	 * Do the NMI shootdown even if virtualization is off on _this_ CPU, as
590	 * other CPUs may have virtualization enabled.
591	 */
592	if (rcu_access_pointer(cpu_emergency_virt_callback)) {
593		/* Safely force _this_ CPU out of VMX/SVM operation. */
594		cpu_emergency_disable_virtualization();
595
596		/* Disable VMX/SVM and halt on other CPUs. */
597		nmi_shootdown_cpus_on_restart();
598	}
599}
600#else
601static void emergency_reboot_disable_virtualization(void) { }
602#endif /* CONFIG_KVM_INTEL || CONFIG_KVM_AMD */
603
604void __attribute__((weak)) mach_reboot_fixups(void)
605{
606}
607
608/*
609 * To the best of our knowledge Windows compatible x86 hardware expects
610 * the following on reboot:
611 *
612 * 1) If the FADT has the ACPI reboot register flag set, try it
613 * 2) If still alive, write to the keyboard controller
614 * 3) If still alive, write to the ACPI reboot register again
615 * 4) If still alive, write to the keyboard controller again
616 * 5) If still alive, call the EFI runtime service to reboot
617 * 6) If no EFI runtime service, call the BIOS to do a reboot
618 *
619 * We default to following the same pattern. We also have
620 * two other reboot methods: 'triple fault' and 'PCI', which
621 * can be triggered via the reboot= kernel boot option or
622 * via quirks.
623 *
624 * This means that this function can never return, it can misbehave
625 * by not rebooting properly and hanging.
626 */
627static void native_machine_emergency_restart(void)
628{
629	int i;
630	int attempt = 0;
631	int orig_reboot_type = reboot_type;
632	unsigned short mode;
633
634	if (reboot_emergency)
635		emergency_reboot_disable_virtualization();
636
637	tboot_shutdown(TB_SHUTDOWN_REBOOT);
638
639	/* Tell the BIOS if we want cold or warm reboot */
640	mode = reboot_mode == REBOOT_WARM ? 0x1234 : 0;
641	*((unsigned short *)__va(0x472)) = mode;
642
643	/*
644	 * If an EFI capsule has been registered with the firmware then
645	 * override the reboot= parameter.
646	 */
647	if (efi_capsule_pending(NULL)) {
648		pr_info("EFI capsule is pending, forcing EFI reboot.\n");
649		reboot_type = BOOT_EFI;
650	}
651
652	for (;;) {
653		/* Could also try the reset bit in the Hammer NB */
654		switch (reboot_type) {
655		case BOOT_ACPI:
656			acpi_reboot();
657			reboot_type = BOOT_KBD;
658			break;
659
660		case BOOT_KBD:
661			mach_reboot_fixups(); /* For board specific fixups */
662
663			for (i = 0; i < 10; i++) {
664				kb_wait();
665				udelay(50);
666				outb(0xfe, 0x64); /* Pulse reset low */
667				udelay(50);
668			}
669			if (attempt == 0 && orig_reboot_type == BOOT_ACPI) {
670				attempt = 1;
671				reboot_type = BOOT_ACPI;
672			} else {
673				reboot_type = BOOT_EFI;
674			}
675			break;
676
677		case BOOT_EFI:
678			efi_reboot(reboot_mode, NULL);
679			reboot_type = BOOT_BIOS;
680			break;
681
682		case BOOT_BIOS:
683			machine_real_restart(MRR_BIOS);
684
685			/* We're probably dead after this, but... */
686			reboot_type = BOOT_CF9_SAFE;
687			break;
688
689		case BOOT_CF9_FORCE:
690			port_cf9_safe = true;
691			fallthrough;
692
693		case BOOT_CF9_SAFE:
694			if (port_cf9_safe) {
695				u8 reboot_code = reboot_mode == REBOOT_WARM ?  0x06 : 0x0E;
696				u8 cf9 = inb(0xcf9) & ~reboot_code;
697				outb(cf9|2, 0xcf9); /* Request hard reset */
698				udelay(50);
699				/* Actually do the reset */
700				outb(cf9|reboot_code, 0xcf9);
701				udelay(50);
702			}
703			reboot_type = BOOT_TRIPLE;
704			break;
705
706		case BOOT_TRIPLE:
707			idt_invalidate();
708			__asm__ __volatile__("int3");
709
710			/* We're probably dead after this, but... */
711			reboot_type = BOOT_KBD;
712			break;
713		}
714	}
715}
716
717void native_machine_shutdown(void)
718{
 
 
 
 
 
 
 
 
719	/* Stop the cpus and apics */
720#ifdef CONFIG_X86_IO_APIC
721	/*
722	 * Disabling IO APIC before local APIC is a workaround for
723	 * erratum AVR31 in "Intel Atom Processor C2000 Product Family
724	 * Specification Update". In this situation, interrupts that target
725	 * a Logical Processor whose Local APIC is either in the process of
726	 * being hardware disabled or software disabled are neither delivered
727	 * nor discarded. When this erratum occurs, the processor may hang.
728	 *
729	 * Even without the erratum, it still makes sense to quiet IO APIC
730	 * before disabling Local APIC.
731	 */
732	clear_IO_APIC();
733#endif
734
735#ifdef CONFIG_SMP
736	/*
737	 * Stop all of the others. Also disable the local irq to
738	 * not receive the per-cpu timer interrupt which may trigger
739	 * scheduler's load balance.
740	 */
741	local_irq_disable();
742	stop_other_cpus();
743#endif
744
745	lapic_shutdown();
746	restore_boot_irq_mode();
747
748#ifdef CONFIG_HPET_TIMER
749	hpet_disable();
750#endif
751
752#ifdef CONFIG_X86_64
753	x86_platform.iommu_shutdown();
754#endif
 
 
 
755}
756
757static void __machine_emergency_restart(int emergency)
758{
759	reboot_emergency = emergency;
760	machine_ops.emergency_restart();
761}
762
763static void native_machine_restart(char *__unused)
764{
765	pr_notice("machine restart\n");
766
767	if (!reboot_force)
768		machine_shutdown();
769	__machine_emergency_restart(0);
770}
771
772static void native_machine_halt(void)
773{
774	/* Stop other cpus and apics */
775	machine_shutdown();
776
777	tboot_shutdown(TB_SHUTDOWN_HALT);
778
779	stop_this_cpu(NULL);
780}
781
782static void native_machine_power_off(void)
783{
784	if (kernel_can_power_off()) {
785		if (!reboot_force)
786			machine_shutdown();
787		do_kernel_power_off();
788	}
789	/* A fallback in case there is no PM info available */
790	tboot_shutdown(TB_SHUTDOWN_HALT);
791}
792
793struct machine_ops machine_ops __ro_after_init = {
794	.power_off = native_machine_power_off,
795	.shutdown = native_machine_shutdown,
796	.emergency_restart = native_machine_emergency_restart,
797	.restart = native_machine_restart,
798	.halt = native_machine_halt,
799#ifdef CONFIG_KEXEC_CORE
800	.crash_shutdown = native_machine_crash_shutdown,
801#endif
802};
803
804void machine_power_off(void)
805{
806	machine_ops.power_off();
807}
808
809void machine_shutdown(void)
810{
811	machine_ops.shutdown();
812}
813
814void machine_emergency_restart(void)
815{
816	__machine_emergency_restart(1);
817}
818
819void machine_restart(char *cmd)
820{
821	machine_ops.restart(cmd);
822}
823
824void machine_halt(void)
825{
826	machine_ops.halt();
827}
828
829#ifdef CONFIG_KEXEC_CORE
830void machine_crash_shutdown(struct pt_regs *regs)
831{
832	machine_ops.crash_shutdown(regs);
833}
834#endif
835
836/* This is the CPU performing the emergency shutdown work. */
837int crashing_cpu = -1;
838
839#if defined(CONFIG_SMP)
840
841static nmi_shootdown_cb shootdown_callback;
842
843static atomic_t waiting_for_crash_ipi;
844static int crash_ipi_issued;
845
846static int crash_nmi_callback(unsigned int val, struct pt_regs *regs)
847{
848	int cpu;
849
850	cpu = raw_smp_processor_id();
851
852	/*
853	 * Don't do anything if this handler is invoked on crashing cpu.
854	 * Otherwise, system will completely hang. Crashing cpu can get
855	 * an NMI if system was initially booted with nmi_watchdog parameter.
856	 */
857	if (cpu == crashing_cpu)
858		return NMI_HANDLED;
859	local_irq_disable();
860
861	if (shootdown_callback)
862		shootdown_callback(cpu, regs);
863
864	/*
865	 * Prepare the CPU for reboot _after_ invoking the callback so that the
866	 * callback can safely use virtualization instructions, e.g. VMCLEAR.
867	 */
868	cpu_emergency_disable_virtualization();
869
870	atomic_dec(&waiting_for_crash_ipi);
 
 
 
 
 
 
871	/* Assume hlt works */
872	halt();
873	for (;;)
874		cpu_relax();
875
876	return NMI_HANDLED;
877}
878
879/**
880 * nmi_shootdown_cpus - Stop other CPUs via NMI
881 * @callback:	Optional callback to be invoked from the NMI handler
882 *
883 * The NMI handler on the remote CPUs invokes @callback, if not
884 * NULL, first and then disables virtualization to ensure that
885 * INIT is recognized during reboot.
886 *
887 * nmi_shootdown_cpus() can only be invoked once. After the first
888 * invocation all other CPUs are stuck in crash_nmi_callback() and
889 * cannot respond to a second NMI.
890 */
891void nmi_shootdown_cpus(nmi_shootdown_cb callback)
892{
893	unsigned long msecs;
894
895	local_irq_disable();
896
897	/*
898	 * Avoid certain doom if a shootdown already occurred; re-registering
899	 * the NMI handler will cause list corruption, modifying the callback
900	 * will do who knows what, etc...
901	 */
902	if (WARN_ON_ONCE(crash_ipi_issued))
903		return;
904
905	/* Make a note of crashing cpu. Will be used in NMI callback. */
906	crashing_cpu = safe_smp_processor_id();
907
908	shootdown_callback = callback;
909
910	atomic_set(&waiting_for_crash_ipi, num_online_cpus() - 1);
911	/* Would it be better to replace the trap vector here? */
912	if (register_nmi_handler(NMI_LOCAL, crash_nmi_callback,
913				 NMI_FLAG_FIRST, "crash"))
914		return;		/* Return what? */
915	/*
916	 * Ensure the new callback function is set before sending
917	 * out the NMI
918	 */
919	wmb();
920
921	apic_send_IPI_allbutself(NMI_VECTOR);
922
923	/* Kick CPUs looping in NMI context. */
924	WRITE_ONCE(crash_ipi_issued, 1);
925
926	msecs = 1000; /* Wait at most a second for the other cpus to stop */
927	while ((atomic_read(&waiting_for_crash_ipi) > 0) && msecs) {
928		mdelay(1);
929		msecs--;
930	}
931
932	/*
933	 * Leave the nmi callback set, shootdown is a one-time thing.  Clearing
934	 * the callback could result in a NULL pointer dereference if a CPU
935	 * (finally) responds after the timeout expires.
936	 */
937}
938
939static inline void nmi_shootdown_cpus_on_restart(void)
940{
941	if (!crash_ipi_issued)
942		nmi_shootdown_cpus(NULL);
943}
944
945/*
946 * Check if the crash dumping IPI got issued and if so, call its callback
947 * directly. This function is used when we have already been in NMI handler.
948 * It doesn't return.
949 */
950void run_crash_ipi_callback(struct pt_regs *regs)
951{
952	if (crash_ipi_issued)
953		crash_nmi_callback(0, regs);
954}
955
956/* Override the weak function in kernel/panic.c */
957void __noreturn nmi_panic_self_stop(struct pt_regs *regs)
958{
959	while (1) {
960		/* If no CPU is preparing crash dump, we simply loop here. */
961		run_crash_ipi_callback(regs);
962		cpu_relax();
963	}
964}
965
966#else /* !CONFIG_SMP */
967void nmi_shootdown_cpus(nmi_shootdown_cb callback)
968{
969	/* No other CPUs to shoot down */
970}
971
972static inline void nmi_shootdown_cpus_on_restart(void) { }
973
974void run_crash_ipi_callback(struct pt_regs *regs)
975{
976}
977#endif