2012-05-22 10:50:07 +08:00
|
|
|
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
|
|
|
|
|
2016-07-14 08:18:56 +08:00
|
|
|
#include <linux/export.h>
|
2006-12-07 12:40:06 +08:00
|
|
|
#include <linux/reboot.h>
|
2008-01-30 20:32:51 +08:00
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/pm.h>
|
|
|
|
#include <linux/efi.h>
|
2009-08-03 20:47:32 +08:00
|
|
|
#include <linux/dmi.h>
|
2009-10-07 21:09:06 +08:00
|
|
|
#include <linux/sched.h>
|
2009-09-02 09:25:07 +08:00
|
|
|
#include <linux/tboot.h>
|
2011-03-25 22:20:14 +08:00
|
|
|
#include <linux/delay.h>
|
2008-01-30 20:32:51 +08:00
|
|
|
#include <acpi/reboot.h>
|
|
|
|
#include <asm/io.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <asm/apic.h>
|
2014-10-27 16:12:04 +08:00
|
|
|
#include <asm/io_apic.h>
|
2005-09-04 06:56:38 +08:00
|
|
|
#include <asm/desc.h>
|
2008-01-30 20:32:51 +08:00
|
|
|
#include <asm/hpet.h>
|
2008-03-18 07:37:13 +08:00
|
|
|
#include <asm/pgtable.h>
|
2008-04-28 07:15:59 +08:00
|
|
|
#include <asm/proto.h>
|
2007-05-03 01:27:06 +08:00
|
|
|
#include <asm/reboot_fixups.h>
|
2007-05-03 01:27:11 +08:00
|
|
|
#include <asm/reboot.h>
|
2008-12-27 21:02:28 +08:00
|
|
|
#include <asm/pci_x86.h>
|
2008-11-18 05:03:24 +08:00
|
|
|
#include <asm/virtext.h>
|
2009-01-08 00:05:48 +08:00
|
|
|
#include <asm/cpu.h>
|
2011-01-07 05:18:50 +08:00
|
|
|
#include <asm/nmi.h>
|
2012-06-17 12:47:37 +08:00
|
|
|
#include <asm/smp.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2012-06-17 12:47:37 +08:00
|
|
|
#include <linux/ctype.h>
|
|
|
|
#include <linux/mc146818rtc.h>
|
|
|
|
#include <asm/realmode.h>
|
|
|
|
#include <asm/x86_init.h>
|
2014-06-13 19:39:55 +08:00
|
|
|
#include <asm/efi.h>
|
2008-01-30 20:32:51 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* Power off function, if any
|
|
|
|
*/
|
|
|
|
void (*pm_power_off)(void);
|
2005-06-23 15:08:33 +08:00
|
|
|
EXPORT_SYMBOL(pm_power_off);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2008-05-12 21:43:38 +08:00
|
|
|
static const struct desc_ptr no_idt = {};
|
2008-01-30 20:32:51 +08:00
|
|
|
|
2012-02-01 23:06:34 +08:00
|
|
|
/*
|
|
|
|
* This is set if we need to go through the 'emergency' path.
|
2008-11-18 05:03:24 +08:00
|
|
|
* When machine_emergency_restart() is called, we may be on
|
|
|
|
* an inconsistent state and won't be able to do a clean cleanup
|
|
|
|
*/
|
|
|
|
static int reboot_emergency;
|
|
|
|
|
2008-11-12 08:19:48 +08:00
|
|
|
/* This is set by the PCI code if either type 1 or type 2 PCI is detected */
|
|
|
|
bool port_cf9_safe = false;
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* Reboot options and system auto-detection code provided by
|
|
|
|
* Dell Inc. so their systems "just work". :-)
|
|
|
|
*/
|
|
|
|
|
2016-07-14 18:05:56 +08:00
|
|
|
/*
|
|
|
|
* Some machines require the "reboot=a" commandline options
|
|
|
|
*/
|
|
|
|
static int __init set_acpi_reboot(const struct dmi_system_id *d)
|
|
|
|
{
|
|
|
|
if (reboot_type != BOOT_ACPI) {
|
|
|
|
reboot_type = BOOT_ACPI;
|
|
|
|
pr_info("%s series board detected. Selecting %s-method for reboots.\n",
|
|
|
|
d->ident, "ACPI");
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
2011-12-05 21:53:53 +08:00
|
|
|
* Some machines require the "reboot=b" or "reboot=k" commandline options,
|
2008-01-30 20:32:51 +08:00
|
|
|
* this quirk makes that automatic.
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
2007-10-04 03:15:40 +08:00
|
|
|
static int __init set_bios_reboot(const struct dmi_system_id *d)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2008-01-30 20:32:51 +08:00
|
|
|
if (reboot_type != BOOT_BIOS) {
|
|
|
|
reboot_type = BOOT_BIOS;
|
2012-05-22 10:50:07 +08:00
|
|
|
pr_info("%s series board detected. Selecting %s-method for reboots.\n",
|
2013-10-24 15:11:33 +08:00
|
|
|
d->ident, "BIOS");
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-06-17 12:47:37 +08:00
|
|
|
void __noreturn machine_real_restart(unsigned int type)
|
2012-02-01 23:05:00 +08:00
|
|
|
{
|
|
|
|
local_irq_disable();
|
|
|
|
|
2012-02-01 23:06:34 +08:00
|
|
|
/*
|
|
|
|
* Write zero to CMOS register number 0x0f, which the BIOS POST
|
|
|
|
* routine will recognize as telling it to do a proper reboot. (Well
|
|
|
|
* that's what this book in front of me says -- it may only apply to
|
|
|
|
* the Phoenix BIOS though, it's not clear). At the same time,
|
|
|
|
* disable NMIs by setting the top bit in the CMOS address register,
|
|
|
|
* as we're about to do peculiar things to the CPU. I'm not sure if
|
|
|
|
* `outb_p' is needed instead of just `outb'. Use it to be on the
|
|
|
|
* safe side. (Yes, CMOS_WRITE does outb_p's. - Paul G.)
|
2012-02-01 23:05:00 +08:00
|
|
|
*/
|
|
|
|
spin_lock(&rtc_lock);
|
|
|
|
CMOS_WRITE(0x00, 0x8f);
|
|
|
|
spin_unlock(&rtc_lock);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Switch back to the initial page table.
|
|
|
|
*/
|
2012-06-17 12:47:37 +08:00
|
|
|
#ifdef CONFIG_X86_32
|
2012-02-01 23:05:00 +08:00
|
|
|
load_cr3(initial_page_table);
|
2012-06-17 12:47:37 +08:00
|
|
|
#else
|
|
|
|
write_cr3(real_mode_header->trampoline_pgd);
|
|
|
|
#endif
|
2012-02-01 23:05:00 +08:00
|
|
|
|
|
|
|
/* Jump to the identity-mapped low memory code */
|
2012-06-17 12:47:37 +08:00
|
|
|
#ifdef CONFIG_X86_32
|
|
|
|
asm volatile("jmpl *%0" : :
|
|
|
|
"rm" (real_mode_header->machine_real_restart_asm),
|
|
|
|
"a" (type));
|
|
|
|
#else
|
|
|
|
asm volatile("ljmpl *%0" : :
|
|
|
|
"m" (real_mode_header->machine_real_restart_asm),
|
|
|
|
"D" (type));
|
|
|
|
#endif
|
|
|
|
unreachable();
|
2012-02-01 23:05:00 +08:00
|
|
|
}
|
|
|
|
#ifdef CONFIG_APM_MODULE
|
|
|
|
EXPORT_SYMBOL(machine_real_restart);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Some Apple MacBook and MacBookPro's needs reboot=p to be able to reboot
|
|
|
|
*/
|
|
|
|
static int __init set_pci_reboot(const struct dmi_system_id *d)
|
|
|
|
{
|
2014-04-04 14:41:26 +08:00
|
|
|
if (reboot_type != BOOT_CF9_FORCE) {
|
|
|
|
reboot_type = BOOT_CF9_FORCE;
|
2012-05-22 10:50:07 +08:00
|
|
|
pr_info("%s series board detected. Selecting %s-method for reboots.\n",
|
2013-10-24 15:11:33 +08:00
|
|
|
d->ident, "PCI");
|
2012-02-01 23:05:00 +08:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-12-05 21:53:53 +08:00
|
|
|
static int __init set_kbd_reboot(const struct dmi_system_id *d)
|
|
|
|
{
|
|
|
|
if (reboot_type != BOOT_KBD) {
|
|
|
|
reboot_type = BOOT_KBD;
|
2012-05-22 10:50:07 +08:00
|
|
|
pr_info("%s series board detected. Selecting %s-method for reboot.\n",
|
2013-10-24 15:11:33 +08:00
|
|
|
d->ident, "KBD");
|
2011-12-05 21:53:53 +08:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-02-01 23:06:34 +08:00
|
|
|
/*
|
2012-06-17 12:47:37 +08:00
|
|
|
* This is a single dmi_table handling all reboot quirks.
|
2012-02-01 23:05:00 +08:00
|
|
|
*/
|
2005-04-17 06:20:36 +08:00
|
|
|
static struct dmi_system_id __initdata reboot_dmi_table[] = {
|
2013-10-02 04:36:55 +08:00
|
|
|
|
|
|
|
/* Acer */
|
|
|
|
{ /* Handle reboot issue on Acer Aspire one */
|
|
|
|
.callback = set_kbd_reboot,
|
|
|
|
.ident = "Acer Aspire One A110",
|
2007-06-01 15:46:40 +08:00
|
|
|
.matches = {
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Acer"),
|
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "AOA110"),
|
2007-06-01 15:46:40 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
|
|
|
|
/* Apple */
|
|
|
|
{ /* Handle problems with rebooting on Apple MacBook5 */
|
|
|
|
.callback = set_pci_reboot,
|
|
|
|
.ident = "Apple MacBook5",
|
2005-04-17 06:20:36 +08:00
|
|
|
.matches = {
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Apple Inc."),
|
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "MacBook5"),
|
2005-04-17 06:20:36 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on Apple MacBookPro5 */
|
|
|
|
.callback = set_pci_reboot,
|
|
|
|
.ident = "Apple MacBookPro5",
|
2005-04-17 06:20:36 +08:00
|
|
|
.matches = {
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Apple Inc."),
|
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "MacBookPro5"),
|
2005-04-17 06:20:36 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on Apple Macmini3,1 */
|
|
|
|
.callback = set_pci_reboot,
|
|
|
|
.ident = "Apple Macmini3,1",
|
2007-07-21 23:11:11 +08:00
|
|
|
.matches = {
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Apple Inc."),
|
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "Macmini3,1"),
|
2007-07-21 23:11:11 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on the iMac9,1. */
|
|
|
|
.callback = set_pci_reboot,
|
|
|
|
.ident = "Apple iMac9,1",
|
2008-03-05 07:05:41 +08:00
|
|
|
.matches = {
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Apple Inc."),
|
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "iMac9,1"),
|
2008-03-05 07:05:41 +08:00
|
|
|
},
|
|
|
|
},
|
2015-12-19 03:24:06 +08:00
|
|
|
{ /* Handle problems with rebooting on the iMac10,1. */
|
|
|
|
.callback = set_pci_reboot,
|
|
|
|
.ident = "Apple iMac10,1",
|
|
|
|
.matches = {
|
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Apple Inc."),
|
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "iMac10,1"),
|
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
|
2015-03-31 04:44:27 +08:00
|
|
|
/* ASRock */
|
|
|
|
{ /* Handle problems with rebooting on ASRock Q1900DC-ITX */
|
|
|
|
.callback = set_pci_reboot,
|
|
|
|
.ident = "ASRock Q1900DC-ITX",
|
|
|
|
.matches = {
|
|
|
|
DMI_MATCH(DMI_BOARD_VENDOR, "ASRock"),
|
|
|
|
DMI_MATCH(DMI_BOARD_NAME, "Q1900DC-ITX"),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
|
2013-10-02 04:36:55 +08:00
|
|
|
/* ASUS */
|
|
|
|
{ /* Handle problems with rebooting on ASUS P4S800 */
|
2008-03-12 23:27:56 +08:00
|
|
|
.callback = set_bios_reboot,
|
2013-10-02 04:36:55 +08:00
|
|
|
.ident = "ASUS P4S800",
|
2008-03-12 23:27:56 +08:00
|
|
|
.matches = {
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_BOARD_VENDOR, "ASUSTeK Computer INC."),
|
|
|
|
DMI_MATCH(DMI_BOARD_NAME, "P4S800"),
|
2008-03-12 23:27:56 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
|
2014-05-07 15:01:54 +08:00
|
|
|
/* Certec */
|
|
|
|
{ /* Handle problems with rebooting on Certec BPC600 */
|
|
|
|
.callback = set_pci_reboot,
|
|
|
|
.ident = "Certec BPC600",
|
|
|
|
.matches = {
|
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Certec"),
|
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "BPC600"),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
|
2013-10-02 04:36:55 +08:00
|
|
|
/* Dell */
|
|
|
|
{ /* Handle problems with rebooting on Dell DXP061 */
|
2008-11-14 14:55:51 +08:00
|
|
|
.callback = set_bios_reboot,
|
2013-10-02 04:36:55 +08:00
|
|
|
.ident = "Dell DXP061",
|
2008-11-14 14:55:51 +08:00
|
|
|
.matches = {
|
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "Dell DXP061"),
|
2008-11-14 14:55:51 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on Dell E520's */
|
2009-06-05 18:02:38 +08:00
|
|
|
.callback = set_bios_reboot,
|
2013-10-02 04:36:55 +08:00
|
|
|
.ident = "Dell E520",
|
2009-06-05 18:02:38 +08:00
|
|
|
.matches = {
|
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "Dell DM061"),
|
2009-06-05 18:02:38 +08:00
|
|
|
},
|
|
|
|
},
|
2013-11-12 10:33:38 +08:00
|
|
|
{ /* Handle problems with rebooting on the Latitude E5410. */
|
|
|
|
.callback = set_pci_reboot,
|
|
|
|
.ident = "Dell Latitude E5410",
|
2010-01-28 07:29:18 +08:00
|
|
|
.matches = {
|
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
2013-11-12 10:33:38 +08:00
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "Latitude E5410"),
|
2010-01-28 07:29:18 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on the Latitude E5420. */
|
|
|
|
.callback = set_pci_reboot,
|
|
|
|
.ident = "Dell Latitude E5420",
|
2005-04-17 06:20:36 +08:00
|
|
|
.matches = {
|
2010-01-28 07:29:18 +08:00
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "Latitude E5420"),
|
2005-04-17 06:20:36 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on the Latitude E6320. */
|
|
|
|
.callback = set_pci_reboot,
|
|
|
|
.ident = "Dell Latitude E6320",
|
2008-07-17 19:50:15 +08:00
|
|
|
.matches = {
|
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "Latitude E6320"),
|
2008-07-17 19:50:15 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on the Latitude E6420. */
|
|
|
|
.callback = set_pci_reboot,
|
|
|
|
.ident = "Dell Latitude E6420",
|
2010-06-19 21:32:25 +08:00
|
|
|
.matches = {
|
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "Latitude E6420"),
|
2010-06-19 21:32:25 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on Dell Optiplex 330 with 0KP561 */
|
2005-11-30 11:34:35 +08:00
|
|
|
.callback = set_bios_reboot,
|
2013-10-02 04:36:55 +08:00
|
|
|
.ident = "Dell OptiPlex 330",
|
2005-11-30 11:34:35 +08:00
|
|
|
.matches = {
|
2010-06-19 21:32:25 +08:00
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 330"),
|
|
|
|
DMI_MATCH(DMI_BOARD_NAME, "0KP561"),
|
2005-11-30 11:34:35 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on Dell Optiplex 360 with 0T656F */
|
2009-03-05 03:53:00 +08:00
|
|
|
.callback = set_bios_reboot,
|
2013-10-02 04:36:55 +08:00
|
|
|
.ident = "Dell OptiPlex 360",
|
2009-03-05 03:53:00 +08:00
|
|
|
.matches = {
|
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 360"),
|
|
|
|
DMI_MATCH(DMI_BOARD_NAME, "0T656F"),
|
2009-03-05 03:53:00 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on Dell Optiplex 745's SFF */
|
2009-03-27 04:45:28 +08:00
|
|
|
.callback = set_bios_reboot,
|
2013-10-02 04:36:55 +08:00
|
|
|
.ident = "Dell OptiPlex 745",
|
2009-03-27 04:45:28 +08:00
|
|
|
.matches = {
|
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 745"),
|
2009-03-27 04:45:28 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on Dell Optiplex 745's DFF */
|
2009-05-22 11:35:50 +08:00
|
|
|
.callback = set_bios_reboot,
|
2013-10-02 04:36:55 +08:00
|
|
|
.ident = "Dell OptiPlex 745",
|
2009-05-22 11:35:50 +08:00
|
|
|
.matches = {
|
2009-03-27 04:45:28 +08:00
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 745"),
|
|
|
|
DMI_MATCH(DMI_BOARD_NAME, "0MM599"),
|
2009-05-22 11:35:50 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on Dell Optiplex 745 with 0KW626 */
|
2009-12-05 07:42:22 +08:00
|
|
|
.callback = set_bios_reboot,
|
2013-10-02 04:36:55 +08:00
|
|
|
.ident = "Dell OptiPlex 745",
|
2011-07-06 08:56:30 +08:00
|
|
|
.matches = {
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 745"),
|
|
|
|
DMI_MATCH(DMI_BOARD_NAME, "0KW626"),
|
2011-07-06 08:56:30 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on Dell OptiPlex 760 with 0G919G */
|
2009-12-05 07:42:22 +08:00
|
|
|
.callback = set_bios_reboot,
|
2013-10-02 04:36:55 +08:00
|
|
|
.ident = "Dell OptiPlex 760",
|
2009-08-03 20:47:32 +08:00
|
|
|
.matches = {
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 760"),
|
|
|
|
DMI_MATCH(DMI_BOARD_NAME, "0G919G"),
|
2009-08-03 20:47:32 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on the OptiPlex 990. */
|
2009-08-05 00:39:31 +08:00
|
|
|
.callback = set_pci_reboot,
|
2013-10-02 04:36:55 +08:00
|
|
|
.ident = "Dell OptiPlex 990",
|
2009-08-05 00:39:31 +08:00
|
|
|
.matches = {
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 990"),
|
2009-08-05 00:39:31 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on Dell 300's */
|
|
|
|
.callback = set_bios_reboot,
|
|
|
|
.ident = "Dell PowerEdge 300",
|
2009-11-02 18:51:11 +08:00
|
|
|
.matches = {
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Computer Corporation"),
|
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "PowerEdge 300/"),
|
2009-11-02 18:51:11 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on Dell 1300's */
|
|
|
|
.callback = set_bios_reboot,
|
|
|
|
.ident = "Dell PowerEdge 1300",
|
2010-02-17 07:17:29 +08:00
|
|
|
.matches = {
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Computer Corporation"),
|
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "PowerEdge 1300/"),
|
2010-02-17 07:17:29 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on Dell 2400's */
|
|
|
|
.callback = set_bios_reboot,
|
|
|
|
.ident = "Dell PowerEdge 2400",
|
2011-06-28 21:57:31 +08:00
|
|
|
.matches = {
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Computer Corporation"),
|
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "PowerEdge 2400"),
|
2011-06-28 21:57:31 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on the Dell PowerEdge C6100. */
|
2013-10-04 20:16:04 +08:00
|
|
|
.callback = set_pci_reboot,
|
2013-10-02 04:36:55 +08:00
|
|
|
.ident = "Dell PowerEdge C6100",
|
2013-10-04 20:16:04 +08:00
|
|
|
.matches = {
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell"),
|
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "C6100"),
|
2013-10-04 20:16:04 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on the Precision M6600. */
|
2011-05-13 09:04:59 +08:00
|
|
|
.callback = set_pci_reboot,
|
2013-10-02 04:36:55 +08:00
|
|
|
.ident = "Dell Precision M6600",
|
2011-05-13 09:04:59 +08:00
|
|
|
.matches = {
|
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "Precision M6600"),
|
2011-05-13 09:04:59 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on Dell T5400's */
|
|
|
|
.callback = set_bios_reboot,
|
|
|
|
.ident = "Dell Precision T5400",
|
2011-07-22 02:22:21 +08:00
|
|
|
.matches = {
|
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "Precision WorkStation T5400"),
|
2011-07-22 02:22:21 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on Dell T7400's */
|
|
|
|
.callback = set_bios_reboot,
|
|
|
|
.ident = "Dell Precision T7400",
|
2011-11-16 07:19:51 +08:00
|
|
|
.matches = {
|
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "Precision WorkStation T7400"),
|
2011-11-16 07:19:51 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
{ /* Handle problems with rebooting on Dell XPS710 */
|
|
|
|
.callback = set_bios_reboot,
|
|
|
|
.ident = "Dell XPS710",
|
2012-02-20 14:20:06 +08:00
|
|
|
.matches = {
|
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "Dell XPS710"),
|
2012-02-20 14:20:06 +08:00
|
|
|
},
|
|
|
|
},
|
2016-07-14 18:05:56 +08:00
|
|
|
{ /* Handle problems with rebooting on Dell Optiplex 7450 AIO */
|
|
|
|
.callback = set_acpi_reboot,
|
|
|
|
.ident = "Dell OptiPlex 7450 AIO",
|
|
|
|
.matches = {
|
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Dell Inc."),
|
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "OptiPlex 7450 AIO"),
|
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
|
|
|
|
/* Hewlett-Packard */
|
|
|
|
{ /* Handle problems with rebooting on HP laptops */
|
|
|
|
.callback = set_bios_reboot,
|
|
|
|
.ident = "HP Compaq Laptop",
|
2013-09-21 06:59:07 +08:00
|
|
|
.matches = {
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Hewlett-Packard"),
|
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "HP Compaq"),
|
2013-09-21 06:59:07 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
|
|
|
|
/* Sony */
|
|
|
|
{ /* Handle problems with rebooting on Sony VGN-Z540N */
|
|
|
|
.callback = set_bios_reboot,
|
|
|
|
.ident = "Sony VGN-Z540N",
|
2013-09-21 06:59:07 +08:00
|
|
|
.matches = {
|
2013-10-02 04:36:55 +08:00
|
|
|
DMI_MATCH(DMI_SYS_VENDOR, "Sony Corporation"),
|
|
|
|
DMI_MATCH(DMI_PRODUCT_NAME, "VGN-Z540N"),
|
2013-09-21 06:59:07 +08:00
|
|
|
},
|
|
|
|
},
|
2013-10-02 04:36:55 +08:00
|
|
|
|
2009-08-03 20:47:32 +08:00
|
|
|
{ }
|
|
|
|
};
|
|
|
|
|
2012-02-01 23:05:00 +08:00
|
|
|
static int __init reboot_init(void)
|
2009-08-03 20:47:32 +08:00
|
|
|
{
|
2014-06-13 19:39:55 +08:00
|
|
|
int rv;
|
|
|
|
|
2012-02-01 23:06:34 +08:00
|
|
|
/*
|
|
|
|
* Only do the DMI check if reboot_type hasn't been overridden
|
2012-01-30 03:17:22 +08:00
|
|
|
* on the command line
|
|
|
|
*/
|
2014-06-13 19:39:55 +08:00
|
|
|
if (!reboot_default)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The DMI quirks table takes precedence. If no quirks entry
|
|
|
|
* matches and the ACPI Hardware Reduced bit is set, force EFI
|
|
|
|
* reboot.
|
|
|
|
*/
|
|
|
|
rv = dmi_check_system(reboot_dmi_table);
|
|
|
|
|
|
|
|
if (!rv && efi_reboot_required())
|
|
|
|
reboot_type = BOOT_EFI;
|
|
|
|
|
2009-08-03 20:47:32 +08:00
|
|
|
return 0;
|
|
|
|
}
|
2012-02-01 23:05:00 +08:00
|
|
|
core_initcall(reboot_init);
|
2009-08-03 20:47:32 +08:00
|
|
|
|
2008-01-30 20:32:51 +08:00
|
|
|
static inline void kb_wait(void)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
2008-01-30 20:33:25 +08:00
|
|
|
for (i = 0; i < 0x10000; i++) {
|
|
|
|
if ((inb(0x64) & 0x02) == 0)
|
2008-01-30 20:32:51 +08:00
|
|
|
break;
|
2008-01-30 20:33:25 +08:00
|
|
|
udelay(2);
|
|
|
|
}
|
2008-01-30 20:32:51 +08:00
|
|
|
}
|
|
|
|
|
2011-10-01 03:06:21 +08:00
|
|
|
static void vmxoff_nmi(int cpu, struct pt_regs *regs)
|
2008-11-18 05:03:24 +08:00
|
|
|
{
|
|
|
|
cpu_emergency_vmxoff();
|
|
|
|
}
|
|
|
|
|
2012-02-01 23:06:34 +08:00
|
|
|
/* Use NMIs as IPIs to tell all CPUs to disable virtualization */
|
2008-11-18 05:03:24 +08:00
|
|
|
static void emergency_vmx_disable_all(void)
|
|
|
|
{
|
|
|
|
/* Just make sure we won't change CPUs while doing this */
|
|
|
|
local_irq_disable();
|
|
|
|
|
2012-02-01 23:06:34 +08:00
|
|
|
/*
|
|
|
|
* We need to disable VMX on all CPUs before rebooting, otherwise
|
2008-11-18 05:03:24 +08:00
|
|
|
* we risk hanging up the machine, because the CPU ignore INIT
|
|
|
|
* signals when VMX is enabled.
|
|
|
|
*
|
|
|
|
* We can't take any locks and we may be on an inconsistent
|
|
|
|
* state, so we use NMIs as IPIs to tell the other CPUs to disable
|
|
|
|
* VMX and halt.
|
|
|
|
*
|
|
|
|
* For safety, we will avoid running the nmi_shootdown_cpus()
|
|
|
|
* stuff unnecessarily, but we don't have a way to check
|
|
|
|
* if other CPUs have VMX enabled. So we will call it only if the
|
|
|
|
* CPU we are running on has VMX enabled.
|
|
|
|
*
|
|
|
|
* We will miss cases where VMX is not enabled on all CPUs. This
|
|
|
|
* shouldn't do much harm because KVM always enable VMX on all
|
|
|
|
* CPUs anyway. But we can miss it on the small window where KVM
|
|
|
|
* is still enabling VMX.
|
|
|
|
*/
|
|
|
|
if (cpu_has_vmx() && cpu_vmx_enabled()) {
|
2012-02-01 23:06:34 +08:00
|
|
|
/* Disable VMX on this CPU. */
|
2008-11-18 05:03:24 +08:00
|
|
|
cpu_vmxoff();
|
|
|
|
|
|
|
|
/* Halt and disable VMX on the other CPUs */
|
|
|
|
nmi_shootdown_cpus(vmxoff_nmi);
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-03-07 01:29:43 +08:00
|
|
|
void __attribute__((weak)) mach_reboot_fixups(void)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2011-04-05 01:55:05 +08:00
|
|
|
/*
|
2014-04-04 14:41:26 +08:00
|
|
|
* To the best of our knowledge Windows compatible x86 hardware expects
|
|
|
|
* the following on reboot:
|
2011-04-05 01:55:05 +08:00
|
|
|
*
|
|
|
|
* 1) If the FADT has the ACPI reboot register flag set, try it
|
|
|
|
* 2) If still alive, write to the keyboard controller
|
|
|
|
* 3) If still alive, write to the ACPI reboot register again
|
|
|
|
* 4) If still alive, write to the keyboard controller again
|
2014-03-02 18:39:02 +08:00
|
|
|
* 5) If still alive, call the EFI runtime service to reboot
|
2014-04-04 14:41:26 +08:00
|
|
|
* 6) If no EFI runtime service, call the BIOS to do a reboot
|
2011-04-05 01:55:05 +08:00
|
|
|
*
|
2014-04-04 14:41:26 +08:00
|
|
|
* We default to following the same pattern. We also have
|
|
|
|
* two other reboot methods: 'triple fault' and 'PCI', which
|
|
|
|
* can be triggered via the reboot= kernel boot option or
|
|
|
|
* via quirks.
|
|
|
|
*
|
|
|
|
* This means that this function can never return, it can misbehave
|
|
|
|
* by not rebooting properly and hanging.
|
2011-04-05 01:55:05 +08:00
|
|
|
*/
|
2008-02-13 07:37:48 +08:00
|
|
|
static void native_machine_emergency_restart(void)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2008-01-30 20:32:51 +08:00
|
|
|
int i;
|
2011-04-05 01:55:05 +08:00
|
|
|
int attempt = 0;
|
|
|
|
int orig_reboot_type = reboot_type;
|
2013-07-09 07:01:35 +08:00
|
|
|
unsigned short mode;
|
2008-01-30 20:32:51 +08:00
|
|
|
|
2008-11-18 05:03:24 +08:00
|
|
|
if (reboot_emergency)
|
|
|
|
emergency_vmx_disable_all();
|
|
|
|
|
2009-07-01 10:31:02 +08:00
|
|
|
tboot_shutdown(TB_SHUTDOWN_REBOOT);
|
|
|
|
|
2008-01-30 20:32:51 +08:00
|
|
|
/* Tell the BIOS if we want cold or warm reboot */
|
2013-07-09 07:01:35 +08:00
|
|
|
mode = reboot_mode == REBOOT_WARM ? 0x1234 : 0;
|
|
|
|
*((unsigned short *)__va(0x472)) = mode;
|
2008-01-30 20:32:51 +08:00
|
|
|
|
2016-04-26 04:07:00 +08:00
|
|
|
/*
|
|
|
|
* If an EFI capsule has been registered with the firmware then
|
|
|
|
* override the reboot= parameter.
|
|
|
|
*/
|
|
|
|
if (efi_capsule_pending(NULL)) {
|
|
|
|
pr_info("EFI capsule is pending, forcing EFI reboot.\n");
|
|
|
|
reboot_type = BOOT_EFI;
|
|
|
|
}
|
|
|
|
|
2008-01-30 20:32:51 +08:00
|
|
|
for (;;) {
|
|
|
|
/* Could also try the reset bit in the Hammer NB */
|
|
|
|
switch (reboot_type) {
|
2014-04-04 14:41:26 +08:00
|
|
|
case BOOT_ACPI:
|
|
|
|
acpi_reboot();
|
|
|
|
reboot_type = BOOT_KBD;
|
|
|
|
break;
|
|
|
|
|
2008-01-30 20:32:51 +08:00
|
|
|
case BOOT_KBD:
|
2012-02-01 23:06:34 +08:00
|
|
|
mach_reboot_fixups(); /* For board specific fixups */
|
2008-03-07 01:29:43 +08:00
|
|
|
|
2008-01-30 20:32:51 +08:00
|
|
|
for (i = 0; i < 10; i++) {
|
|
|
|
kb_wait();
|
|
|
|
udelay(50);
|
2012-02-01 23:06:34 +08:00
|
|
|
outb(0xfe, 0x64); /* Pulse reset low */
|
2008-01-30 20:32:51 +08:00
|
|
|
udelay(50);
|
|
|
|
}
|
2011-04-05 01:55:05 +08:00
|
|
|
if (attempt == 0 && orig_reboot_type == BOOT_ACPI) {
|
|
|
|
attempt = 1;
|
|
|
|
reboot_type = BOOT_ACPI;
|
|
|
|
} else {
|
2014-03-02 18:39:02 +08:00
|
|
|
reboot_type = BOOT_EFI;
|
2011-04-05 01:55:05 +08:00
|
|
|
}
|
|
|
|
break;
|
2008-01-30 20:32:51 +08:00
|
|
|
|
|
|
|
case BOOT_EFI:
|
2014-06-13 19:22:22 +08:00
|
|
|
efi_reboot(reboot_mode, NULL);
|
2014-04-04 14:41:26 +08:00
|
|
|
reboot_type = BOOT_BIOS;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case BOOT_BIOS:
|
|
|
|
machine_real_restart(MRR_BIOS);
|
|
|
|
|
|
|
|
/* We're probably dead after this, but... */
|
|
|
|
reboot_type = BOOT_CF9_SAFE;
|
2008-11-12 08:19:48 +08:00
|
|
|
break;
|
2008-01-30 20:32:51 +08:00
|
|
|
|
2014-04-04 14:41:26 +08:00
|
|
|
case BOOT_CF9_FORCE:
|
2008-11-12 08:19:48 +08:00
|
|
|
port_cf9_safe = true;
|
2012-02-01 23:06:34 +08:00
|
|
|
/* Fall through */
|
2008-01-30 20:32:51 +08:00
|
|
|
|
2014-04-04 14:41:26 +08:00
|
|
|
case BOOT_CF9_SAFE:
|
2008-11-12 08:19:48 +08:00
|
|
|
if (port_cf9_safe) {
|
2014-04-04 14:41:26 +08:00
|
|
|
u8 reboot_code = reboot_mode == REBOOT_WARM ? 0x06 : 0x0E;
|
2013-08-21 16:13:57 +08:00
|
|
|
u8 cf9 = inb(0xcf9) & ~reboot_code;
|
2008-11-12 08:19:48 +08:00
|
|
|
outb(cf9|2, 0xcf9); /* Request hard reset */
|
|
|
|
udelay(50);
|
2013-08-21 16:13:57 +08:00
|
|
|
/* Actually do the reset */
|
|
|
|
outb(cf9|reboot_code, 0xcf9);
|
2008-11-12 08:19:48 +08:00
|
|
|
udelay(50);
|
|
|
|
}
|
2014-04-04 14:41:26 +08:00
|
|
|
reboot_type = BOOT_TRIPLE;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case BOOT_TRIPLE:
|
|
|
|
load_idt(&no_idt);
|
|
|
|
__asm__ __volatile__("int3");
|
|
|
|
|
|
|
|
/* We're probably dead after this, but... */
|
|
|
|
reboot_type = BOOT_KBD;
|
2008-01-30 20:32:51 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-03-18 03:08:39 +08:00
|
|
|
void native_machine_shutdown(void)
|
2008-01-30 20:32:51 +08:00
|
|
|
{
|
|
|
|
/* Stop the cpus and apics */
|
2013-10-24 09:30:12 +08:00
|
|
|
#ifdef CONFIG_X86_IO_APIC
|
2013-12-05 08:07:49 +08:00
|
|
|
/*
|
|
|
|
* Disabling IO APIC before local APIC is a workaround for
|
|
|
|
* erratum AVR31 in "Intel Atom Processor C2000 Product Family
|
|
|
|
* Specification Update". In this situation, interrupts that target
|
|
|
|
* a Logical Processor whose Local APIC is either in the process of
|
|
|
|
* being hardware disabled or software disabled are neither delivered
|
|
|
|
* nor discarded. When this erratum occurs, the processor may hang.
|
|
|
|
*
|
|
|
|
* Even without the erratum, it still makes sense to quiet IO APIC
|
|
|
|
* before disabling Local APIC.
|
|
|
|
*/
|
2013-10-24 09:30:12 +08:00
|
|
|
disable_IO_APIC();
|
|
|
|
#endif
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
#ifdef CONFIG_SMP
|
2012-02-01 23:06:34 +08:00
|
|
|
/*
|
2013-07-09 07:01:42 +08:00
|
|
|
* Stop all of the others. Also disable the local irq to
|
|
|
|
* not receive the per-cpu timer interrupt which may trigger
|
|
|
|
* scheduler's load balance.
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
2012-05-30 23:15:41 +08:00
|
|
|
local_irq_disable();
|
2010-10-12 05:37:08 +08:00
|
|
|
stop_other_cpus();
|
2008-01-30 20:32:51 +08:00
|
|
|
#endif
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
lapic_shutdown();
|
|
|
|
|
2007-12-04 00:17:10 +08:00
|
|
|
#ifdef CONFIG_HPET_TIMER
|
|
|
|
hpet_disable();
|
|
|
|
#endif
|
2005-06-26 05:57:55 +08:00
|
|
|
|
2008-01-30 20:32:51 +08:00
|
|
|
#ifdef CONFIG_X86_64
|
2009-10-27 15:34:44 +08:00
|
|
|
x86_platform.iommu_shutdown();
|
2008-01-30 20:32:51 +08:00
|
|
|
#endif
|
2007-05-03 01:27:06 +08:00
|
|
|
}
|
|
|
|
|
2008-11-18 05:03:24 +08:00
|
|
|
static void __machine_emergency_restart(int emergency)
|
|
|
|
{
|
|
|
|
reboot_emergency = emergency;
|
|
|
|
machine_ops.emergency_restart();
|
|
|
|
}
|
|
|
|
|
2008-02-13 07:37:48 +08:00
|
|
|
static void native_machine_restart(char *__unused)
|
2005-06-26 05:57:55 +08:00
|
|
|
{
|
2012-05-22 10:50:07 +08:00
|
|
|
pr_notice("machine restart\n");
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2008-01-30 20:32:51 +08:00
|
|
|
if (!reboot_force)
|
|
|
|
machine_shutdown();
|
2008-11-18 05:03:24 +08:00
|
|
|
__machine_emergency_restart(0);
|
2005-07-27 01:41:26 +08:00
|
|
|
}
|
|
|
|
|
2008-02-13 07:37:48 +08:00
|
|
|
static void native_machine_halt(void)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2012-02-01 23:06:34 +08:00
|
|
|
/* Stop other cpus and apics */
|
2008-11-11 21:33:44 +08:00
|
|
|
machine_shutdown();
|
|
|
|
|
2009-07-01 10:31:02 +08:00
|
|
|
tboot_shutdown(TB_SHUTDOWN_HALT);
|
|
|
|
|
2008-11-11 21:33:44 +08:00
|
|
|
stop_this_cpu(NULL);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2008-02-13 07:37:48 +08:00
|
|
|
static void native_machine_power_off(void)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2006-01-12 05:43:12 +08:00
|
|
|
if (pm_power_off) {
|
2008-01-30 20:32:51 +08:00
|
|
|
if (!reboot_force)
|
|
|
|
machine_shutdown();
|
2005-04-17 06:20:36 +08:00
|
|
|
pm_power_off();
|
2006-01-12 05:43:12 +08:00
|
|
|
}
|
2012-02-01 23:06:34 +08:00
|
|
|
/* A fallback in case there is no PM info available */
|
2009-07-01 10:31:02 +08:00
|
|
|
tboot_shutdown(TB_SHUTDOWN_HALT);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2016-08-09 07:29:06 +08:00
|
|
|
struct machine_ops machine_ops __ro_after_init = {
|
2008-02-13 07:37:48 +08:00
|
|
|
.power_off = native_machine_power_off,
|
|
|
|
.shutdown = native_machine_shutdown,
|
|
|
|
.emergency_restart = native_machine_emergency_restart,
|
|
|
|
.restart = native_machine_restart,
|
2008-03-18 03:08:38 +08:00
|
|
|
.halt = native_machine_halt,
|
2015-09-10 06:38:55 +08:00
|
|
|
#ifdef CONFIG_KEXEC_CORE
|
2008-03-18 03:08:38 +08:00
|
|
|
.crash_shutdown = native_machine_crash_shutdown,
|
|
|
|
#endif
|
2007-05-03 01:27:11 +08:00
|
|
|
};
|
2008-02-13 07:37:48 +08:00
|
|
|
|
|
|
|
void machine_power_off(void)
|
|
|
|
{
|
|
|
|
machine_ops.power_off();
|
|
|
|
}
|
|
|
|
|
|
|
|
void machine_shutdown(void)
|
|
|
|
{
|
|
|
|
machine_ops.shutdown();
|
|
|
|
}
|
|
|
|
|
|
|
|
void machine_emergency_restart(void)
|
|
|
|
{
|
2008-11-18 05:03:24 +08:00
|
|
|
__machine_emergency_restart(1);
|
2008-02-13 07:37:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void machine_restart(char *cmd)
|
|
|
|
{
|
|
|
|
machine_ops.restart(cmd);
|
|
|
|
}
|
|
|
|
|
|
|
|
void machine_halt(void)
|
|
|
|
{
|
|
|
|
machine_ops.halt();
|
|
|
|
}
|
|
|
|
|
2015-09-10 06:38:55 +08:00
|
|
|
#ifdef CONFIG_KEXEC_CORE
|
2008-03-18 03:08:38 +08:00
|
|
|
void machine_crash_shutdown(struct pt_regs *regs)
|
|
|
|
{
|
|
|
|
machine_ops.crash_shutdown(regs);
|
|
|
|
}
|
|
|
|
#endif
|
2008-11-12 21:34:42 +08:00
|
|
|
|
|
|
|
|
2008-11-12 21:34:43 +08:00
|
|
|
#if defined(CONFIG_SMP)
|
2008-11-12 21:34:42 +08:00
|
|
|
|
|
|
|
/* This keeps a track of which one is crashing cpu. */
|
|
|
|
static int crashing_cpu;
|
|
|
|
static nmi_shootdown_cb shootdown_callback;
|
|
|
|
|
|
|
|
static atomic_t waiting_for_crash_ipi;
|
panic, x86: Allow CPUs to save registers even if looping in NMI context
Currently, kdump_nmi_shootdown_cpus(), a subroutine of crash_kexec(),
sends an NMI IPI to CPUs which haven't called panic() to stop them,
save their register information and do some cleanups for crash dumping.
However, if such a CPU is infinitely looping in NMI context, we fail to
save its register information into the crash dump.
For example, this can happen when unknown NMIs are broadcast to all
CPUs as follows:
CPU 0 CPU 1
=========================== ==========================
receive an unknown NMI
unknown_nmi_error()
panic() receive an unknown NMI
spin_trylock(&panic_lock) unknown_nmi_error()
crash_kexec() panic()
spin_trylock(&panic_lock)
panic_smp_self_stop()
infinite loop
kdump_nmi_shootdown_cpus()
issue NMI IPI -----------> blocked until IRET
infinite loop...
Here, since CPU 1 is in NMI context, the second NMI from CPU 0 is
blocked until CPU 1 executes IRET. However, CPU 1 never executes IRET,
so the NMI is not handled and the callback function to save registers is
never called.
In practice, this can happen on some servers which broadcast NMIs to all
CPUs when the NMI button is pushed.
To save registers in this case, we need to:
a) Return from NMI handler instead of looping infinitely
or
b) Call the callback function directly from the infinite loop
Inherently, a) is risky because NMI is also used to prevent corrupted
data from being propagated to devices. So, we chose b).
This patch does the following:
1. Move the infinite looping of CPUs which haven't called panic() in NMI
context (actually done by panic_smp_self_stop()) outside of panic() to
enable us to refer pt_regs. Please note that panic_smp_self_stop() is
still used for normal context.
2. Call a callback of kdump_nmi_shootdown_cpus() directly to save
registers and do some cleanups after setting waiting_for_crash_ipi which
is used for counting down the number of CPUs which handled the callback
Signed-off-by: Hidehiro Kawai <hidehiro.kawai.ez@hitachi.com>
Acked-by: Michal Hocko <mhocko@suse.com>
Cc: Aaron Tomlin <atomlin@redhat.com>
Cc: Andrew Morton <akpm@linux-foundation.org>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Baoquan He <bhe@redhat.com>
Cc: Chris Metcalf <cmetcalf@ezchip.com>
Cc: Dave Young <dyoung@redhat.com>
Cc: David Hildenbrand <dahi@linux.vnet.ibm.com>
Cc: Don Zickus <dzickus@redhat.com>
Cc: Eric Biederman <ebiederm@xmission.com>
Cc: Frederic Weisbecker <fweisbec@gmail.com>
Cc: Gobinda Charan Maji <gobinda.cemk07@gmail.com>
Cc: HATAYAMA Daisuke <d.hatayama@jp.fujitsu.com>
Cc: Hidehiro Kawai <hidehiro.kawai.ez@hitachi.com>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Ingo Molnar <mingo@kernel.org>
Cc: Javi Merino <javi.merino@arm.com>
Cc: Jiang Liu <jiang.liu@linux.intel.com>
Cc: Jonathan Corbet <corbet@lwn.net>
Cc: kexec@lists.infradead.org
Cc: linux-doc@vger.kernel.org
Cc: lkml <linux-kernel@vger.kernel.org>
Cc: Masami Hiramatsu <masami.hiramatsu.pt@hitachi.com>
Cc: Michal Nazarewicz <mina86@mina86.com>
Cc: Nicolas Iooss <nicolas.iooss_linux@m4x.org>
Cc: Oleg Nesterov <oleg@redhat.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Prarit Bhargava <prarit@redhat.com>
Cc: Rasmus Villemoes <linux@rasmusvillemoes.dk>
Cc: Seth Jennings <sjenning@redhat.com>
Cc: Stefan Lippers-Hollmann <s.l-h@gmx.de>
Cc: Steven Rostedt <rostedt@goodmis.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Ulrich Obergfell <uobergfe@redhat.com>
Cc: Vitaly Kuznetsov <vkuznets@redhat.com>
Cc: Vivek Goyal <vgoyal@redhat.com>
Cc: Yasuaki Ishimatsu <isimatu.yasuaki@jp.fujitsu.com>
Link: http://lkml.kernel.org/r/20151210014628.25437.75256.stgit@softrs
[ Cleanup comments, fixup formatting. ]
Signed-off-by: Borislav Petkov <bp@suse.de>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
2015-12-14 18:19:10 +08:00
|
|
|
static int crash_ipi_issued;
|
2008-11-12 21:34:42 +08:00
|
|
|
|
2011-10-01 03:06:21 +08:00
|
|
|
static int crash_nmi_callback(unsigned int val, struct pt_regs *regs)
|
2008-11-12 21:34:42 +08:00
|
|
|
{
|
|
|
|
int cpu;
|
|
|
|
|
|
|
|
cpu = raw_smp_processor_id();
|
|
|
|
|
2012-02-01 23:06:34 +08:00
|
|
|
/*
|
|
|
|
* Don't do anything if this handler is invoked on crashing cpu.
|
2008-11-12 21:34:42 +08:00
|
|
|
* Otherwise, system will completely hang. Crashing cpu can get
|
|
|
|
* an NMI if system was initially booted with nmi_watchdog parameter.
|
|
|
|
*/
|
|
|
|
if (cpu == crashing_cpu)
|
2011-10-01 03:06:21 +08:00
|
|
|
return NMI_HANDLED;
|
2008-11-12 21:34:42 +08:00
|
|
|
local_irq_disable();
|
|
|
|
|
2011-10-01 03:06:21 +08:00
|
|
|
shootdown_callback(cpu, regs);
|
2008-11-12 21:34:42 +08:00
|
|
|
|
|
|
|
atomic_dec(&waiting_for_crash_ipi);
|
|
|
|
/* Assume hlt works */
|
|
|
|
halt();
|
|
|
|
for (;;)
|
|
|
|
cpu_relax();
|
|
|
|
|
2011-10-01 03:06:21 +08:00
|
|
|
return NMI_HANDLED;
|
2008-11-12 21:34:42 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void smp_send_nmi_allbutself(void)
|
|
|
|
{
|
2009-01-28 22:42:24 +08:00
|
|
|
apic->send_IPI_allbutself(NMI_VECTOR);
|
2008-11-12 21:34:42 +08:00
|
|
|
}
|
|
|
|
|
2012-02-01 23:06:34 +08:00
|
|
|
/*
|
|
|
|
* Halt all other CPUs, calling the specified function on each of them
|
2008-11-12 21:34:43 +08:00
|
|
|
*
|
|
|
|
* This function can be used to halt all other CPUs on crash
|
|
|
|
* or emergency reboot time. The function passed as parameter
|
|
|
|
* will be called inside a NMI handler on all CPUs.
|
|
|
|
*/
|
2008-11-12 21:34:42 +08:00
|
|
|
void nmi_shootdown_cpus(nmi_shootdown_cb callback)
|
|
|
|
{
|
|
|
|
unsigned long msecs;
|
2008-11-12 21:34:44 +08:00
|
|
|
local_irq_disable();
|
2008-11-12 21:34:42 +08:00
|
|
|
|
2012-02-01 23:06:34 +08:00
|
|
|
/* Make a note of crashing cpu. Will be used in NMI callback. */
|
2008-11-12 21:34:42 +08:00
|
|
|
crashing_cpu = safe_smp_processor_id();
|
|
|
|
|
|
|
|
shootdown_callback = callback;
|
|
|
|
|
|
|
|
atomic_set(&waiting_for_crash_ipi, num_online_cpus() - 1);
|
|
|
|
/* Would it be better to replace the trap vector here? */
|
2011-10-01 03:06:21 +08:00
|
|
|
if (register_nmi_handler(NMI_LOCAL, crash_nmi_callback,
|
|
|
|
NMI_FLAG_FIRST, "crash"))
|
2012-02-01 23:06:34 +08:00
|
|
|
return; /* Return what? */
|
|
|
|
/*
|
|
|
|
* Ensure the new callback function is set before sending
|
2008-11-12 21:34:42 +08:00
|
|
|
* out the NMI
|
|
|
|
*/
|
|
|
|
wmb();
|
|
|
|
|
|
|
|
smp_send_nmi_allbutself();
|
|
|
|
|
panic, x86: Allow CPUs to save registers even if looping in NMI context
Currently, kdump_nmi_shootdown_cpus(), a subroutine of crash_kexec(),
sends an NMI IPI to CPUs which haven't called panic() to stop them,
save their register information and do some cleanups for crash dumping.
However, if such a CPU is infinitely looping in NMI context, we fail to
save its register information into the crash dump.
For example, this can happen when unknown NMIs are broadcast to all
CPUs as follows:
CPU 0 CPU 1
=========================== ==========================
receive an unknown NMI
unknown_nmi_error()
panic() receive an unknown NMI
spin_trylock(&panic_lock) unknown_nmi_error()
crash_kexec() panic()
spin_trylock(&panic_lock)
panic_smp_self_stop()
infinite loop
kdump_nmi_shootdown_cpus()
issue NMI IPI -----------> blocked until IRET
infinite loop...
Here, since CPU 1 is in NMI context, the second NMI from CPU 0 is
blocked until CPU 1 executes IRET. However, CPU 1 never executes IRET,
so the NMI is not handled and the callback function to save registers is
never called.
In practice, this can happen on some servers which broadcast NMIs to all
CPUs when the NMI button is pushed.
To save registers in this case, we need to:
a) Return from NMI handler instead of looping infinitely
or
b) Call the callback function directly from the infinite loop
Inherently, a) is risky because NMI is also used to prevent corrupted
data from being propagated to devices. So, we chose b).
This patch does the following:
1. Move the infinite looping of CPUs which haven't called panic() in NMI
context (actually done by panic_smp_self_stop()) outside of panic() to
enable us to refer pt_regs. Please note that panic_smp_self_stop() is
still used for normal context.
2. Call a callback of kdump_nmi_shootdown_cpus() directly to save
registers and do some cleanups after setting waiting_for_crash_ipi which
is used for counting down the number of CPUs which handled the callback
Signed-off-by: Hidehiro Kawai <hidehiro.kawai.ez@hitachi.com>
Acked-by: Michal Hocko <mhocko@suse.com>
Cc: Aaron Tomlin <atomlin@redhat.com>
Cc: Andrew Morton <akpm@linux-foundation.org>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Baoquan He <bhe@redhat.com>
Cc: Chris Metcalf <cmetcalf@ezchip.com>
Cc: Dave Young <dyoung@redhat.com>
Cc: David Hildenbrand <dahi@linux.vnet.ibm.com>
Cc: Don Zickus <dzickus@redhat.com>
Cc: Eric Biederman <ebiederm@xmission.com>
Cc: Frederic Weisbecker <fweisbec@gmail.com>
Cc: Gobinda Charan Maji <gobinda.cemk07@gmail.com>
Cc: HATAYAMA Daisuke <d.hatayama@jp.fujitsu.com>
Cc: Hidehiro Kawai <hidehiro.kawai.ez@hitachi.com>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Ingo Molnar <mingo@kernel.org>
Cc: Javi Merino <javi.merino@arm.com>
Cc: Jiang Liu <jiang.liu@linux.intel.com>
Cc: Jonathan Corbet <corbet@lwn.net>
Cc: kexec@lists.infradead.org
Cc: linux-doc@vger.kernel.org
Cc: lkml <linux-kernel@vger.kernel.org>
Cc: Masami Hiramatsu <masami.hiramatsu.pt@hitachi.com>
Cc: Michal Nazarewicz <mina86@mina86.com>
Cc: Nicolas Iooss <nicolas.iooss_linux@m4x.org>
Cc: Oleg Nesterov <oleg@redhat.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Prarit Bhargava <prarit@redhat.com>
Cc: Rasmus Villemoes <linux@rasmusvillemoes.dk>
Cc: Seth Jennings <sjenning@redhat.com>
Cc: Stefan Lippers-Hollmann <s.l-h@gmx.de>
Cc: Steven Rostedt <rostedt@goodmis.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Ulrich Obergfell <uobergfe@redhat.com>
Cc: Vitaly Kuznetsov <vkuznets@redhat.com>
Cc: Vivek Goyal <vgoyal@redhat.com>
Cc: Yasuaki Ishimatsu <isimatu.yasuaki@jp.fujitsu.com>
Link: http://lkml.kernel.org/r/20151210014628.25437.75256.stgit@softrs
[ Cleanup comments, fixup formatting. ]
Signed-off-by: Borislav Petkov <bp@suse.de>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
2015-12-14 18:19:10 +08:00
|
|
|
/* Kick CPUs looping in NMI context. */
|
|
|
|
WRITE_ONCE(crash_ipi_issued, 1);
|
|
|
|
|
2008-11-12 21:34:42 +08:00
|
|
|
msecs = 1000; /* Wait at most a second for the other cpus to stop */
|
|
|
|
while ((atomic_read(&waiting_for_crash_ipi) > 0) && msecs) {
|
|
|
|
mdelay(1);
|
|
|
|
msecs--;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Leave the nmi callback set */
|
|
|
|
}
|
panic, x86: Allow CPUs to save registers even if looping in NMI context
Currently, kdump_nmi_shootdown_cpus(), a subroutine of crash_kexec(),
sends an NMI IPI to CPUs which haven't called panic() to stop them,
save their register information and do some cleanups for crash dumping.
However, if such a CPU is infinitely looping in NMI context, we fail to
save its register information into the crash dump.
For example, this can happen when unknown NMIs are broadcast to all
CPUs as follows:
CPU 0 CPU 1
=========================== ==========================
receive an unknown NMI
unknown_nmi_error()
panic() receive an unknown NMI
spin_trylock(&panic_lock) unknown_nmi_error()
crash_kexec() panic()
spin_trylock(&panic_lock)
panic_smp_self_stop()
infinite loop
kdump_nmi_shootdown_cpus()
issue NMI IPI -----------> blocked until IRET
infinite loop...
Here, since CPU 1 is in NMI context, the second NMI from CPU 0 is
blocked until CPU 1 executes IRET. However, CPU 1 never executes IRET,
so the NMI is not handled and the callback function to save registers is
never called.
In practice, this can happen on some servers which broadcast NMIs to all
CPUs when the NMI button is pushed.
To save registers in this case, we need to:
a) Return from NMI handler instead of looping infinitely
or
b) Call the callback function directly from the infinite loop
Inherently, a) is risky because NMI is also used to prevent corrupted
data from being propagated to devices. So, we chose b).
This patch does the following:
1. Move the infinite looping of CPUs which haven't called panic() in NMI
context (actually done by panic_smp_self_stop()) outside of panic() to
enable us to refer pt_regs. Please note that panic_smp_self_stop() is
still used for normal context.
2. Call a callback of kdump_nmi_shootdown_cpus() directly to save
registers and do some cleanups after setting waiting_for_crash_ipi which
is used for counting down the number of CPUs which handled the callback
Signed-off-by: Hidehiro Kawai <hidehiro.kawai.ez@hitachi.com>
Acked-by: Michal Hocko <mhocko@suse.com>
Cc: Aaron Tomlin <atomlin@redhat.com>
Cc: Andrew Morton <akpm@linux-foundation.org>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Baoquan He <bhe@redhat.com>
Cc: Chris Metcalf <cmetcalf@ezchip.com>
Cc: Dave Young <dyoung@redhat.com>
Cc: David Hildenbrand <dahi@linux.vnet.ibm.com>
Cc: Don Zickus <dzickus@redhat.com>
Cc: Eric Biederman <ebiederm@xmission.com>
Cc: Frederic Weisbecker <fweisbec@gmail.com>
Cc: Gobinda Charan Maji <gobinda.cemk07@gmail.com>
Cc: HATAYAMA Daisuke <d.hatayama@jp.fujitsu.com>
Cc: Hidehiro Kawai <hidehiro.kawai.ez@hitachi.com>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Ingo Molnar <mingo@kernel.org>
Cc: Javi Merino <javi.merino@arm.com>
Cc: Jiang Liu <jiang.liu@linux.intel.com>
Cc: Jonathan Corbet <corbet@lwn.net>
Cc: kexec@lists.infradead.org
Cc: linux-doc@vger.kernel.org
Cc: lkml <linux-kernel@vger.kernel.org>
Cc: Masami Hiramatsu <masami.hiramatsu.pt@hitachi.com>
Cc: Michal Nazarewicz <mina86@mina86.com>
Cc: Nicolas Iooss <nicolas.iooss_linux@m4x.org>
Cc: Oleg Nesterov <oleg@redhat.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Prarit Bhargava <prarit@redhat.com>
Cc: Rasmus Villemoes <linux@rasmusvillemoes.dk>
Cc: Seth Jennings <sjenning@redhat.com>
Cc: Stefan Lippers-Hollmann <s.l-h@gmx.de>
Cc: Steven Rostedt <rostedt@goodmis.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Ulrich Obergfell <uobergfe@redhat.com>
Cc: Vitaly Kuznetsov <vkuznets@redhat.com>
Cc: Vivek Goyal <vgoyal@redhat.com>
Cc: Yasuaki Ishimatsu <isimatu.yasuaki@jp.fujitsu.com>
Link: http://lkml.kernel.org/r/20151210014628.25437.75256.stgit@softrs
[ Cleanup comments, fixup formatting. ]
Signed-off-by: Borislav Petkov <bp@suse.de>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
2015-12-14 18:19:10 +08:00
|
|
|
|
2015-12-14 18:19:13 +08:00
|
|
|
/*
|
|
|
|
* Check if the crash dumping IPI got issued and if so, call its callback
|
|
|
|
* directly. This function is used when we have already been in NMI handler.
|
|
|
|
* It doesn't return.
|
|
|
|
*/
|
|
|
|
void run_crash_ipi_callback(struct pt_regs *regs)
|
|
|
|
{
|
|
|
|
if (crash_ipi_issued)
|
|
|
|
crash_nmi_callback(0, regs);
|
|
|
|
}
|
|
|
|
|
panic, x86: Allow CPUs to save registers even if looping in NMI context
Currently, kdump_nmi_shootdown_cpus(), a subroutine of crash_kexec(),
sends an NMI IPI to CPUs which haven't called panic() to stop them,
save their register information and do some cleanups for crash dumping.
However, if such a CPU is infinitely looping in NMI context, we fail to
save its register information into the crash dump.
For example, this can happen when unknown NMIs are broadcast to all
CPUs as follows:
CPU 0 CPU 1
=========================== ==========================
receive an unknown NMI
unknown_nmi_error()
panic() receive an unknown NMI
spin_trylock(&panic_lock) unknown_nmi_error()
crash_kexec() panic()
spin_trylock(&panic_lock)
panic_smp_self_stop()
infinite loop
kdump_nmi_shootdown_cpus()
issue NMI IPI -----------> blocked until IRET
infinite loop...
Here, since CPU 1 is in NMI context, the second NMI from CPU 0 is
blocked until CPU 1 executes IRET. However, CPU 1 never executes IRET,
so the NMI is not handled and the callback function to save registers is
never called.
In practice, this can happen on some servers which broadcast NMIs to all
CPUs when the NMI button is pushed.
To save registers in this case, we need to:
a) Return from NMI handler instead of looping infinitely
or
b) Call the callback function directly from the infinite loop
Inherently, a) is risky because NMI is also used to prevent corrupted
data from being propagated to devices. So, we chose b).
This patch does the following:
1. Move the infinite looping of CPUs which haven't called panic() in NMI
context (actually done by panic_smp_self_stop()) outside of panic() to
enable us to refer pt_regs. Please note that panic_smp_self_stop() is
still used for normal context.
2. Call a callback of kdump_nmi_shootdown_cpus() directly to save
registers and do some cleanups after setting waiting_for_crash_ipi which
is used for counting down the number of CPUs which handled the callback
Signed-off-by: Hidehiro Kawai <hidehiro.kawai.ez@hitachi.com>
Acked-by: Michal Hocko <mhocko@suse.com>
Cc: Aaron Tomlin <atomlin@redhat.com>
Cc: Andrew Morton <akpm@linux-foundation.org>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Baoquan He <bhe@redhat.com>
Cc: Chris Metcalf <cmetcalf@ezchip.com>
Cc: Dave Young <dyoung@redhat.com>
Cc: David Hildenbrand <dahi@linux.vnet.ibm.com>
Cc: Don Zickus <dzickus@redhat.com>
Cc: Eric Biederman <ebiederm@xmission.com>
Cc: Frederic Weisbecker <fweisbec@gmail.com>
Cc: Gobinda Charan Maji <gobinda.cemk07@gmail.com>
Cc: HATAYAMA Daisuke <d.hatayama@jp.fujitsu.com>
Cc: Hidehiro Kawai <hidehiro.kawai.ez@hitachi.com>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Ingo Molnar <mingo@kernel.org>
Cc: Javi Merino <javi.merino@arm.com>
Cc: Jiang Liu <jiang.liu@linux.intel.com>
Cc: Jonathan Corbet <corbet@lwn.net>
Cc: kexec@lists.infradead.org
Cc: linux-doc@vger.kernel.org
Cc: lkml <linux-kernel@vger.kernel.org>
Cc: Masami Hiramatsu <masami.hiramatsu.pt@hitachi.com>
Cc: Michal Nazarewicz <mina86@mina86.com>
Cc: Nicolas Iooss <nicolas.iooss_linux@m4x.org>
Cc: Oleg Nesterov <oleg@redhat.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Prarit Bhargava <prarit@redhat.com>
Cc: Rasmus Villemoes <linux@rasmusvillemoes.dk>
Cc: Seth Jennings <sjenning@redhat.com>
Cc: Stefan Lippers-Hollmann <s.l-h@gmx.de>
Cc: Steven Rostedt <rostedt@goodmis.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Ulrich Obergfell <uobergfe@redhat.com>
Cc: Vitaly Kuznetsov <vkuznets@redhat.com>
Cc: Vivek Goyal <vgoyal@redhat.com>
Cc: Yasuaki Ishimatsu <isimatu.yasuaki@jp.fujitsu.com>
Link: http://lkml.kernel.org/r/20151210014628.25437.75256.stgit@softrs
[ Cleanup comments, fixup formatting. ]
Signed-off-by: Borislav Petkov <bp@suse.de>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
2015-12-14 18:19:10 +08:00
|
|
|
/* Override the weak function in kernel/panic.c */
|
|
|
|
void nmi_panic_self_stop(struct pt_regs *regs)
|
|
|
|
{
|
|
|
|
while (1) {
|
2015-12-14 18:19:13 +08:00
|
|
|
/* If no CPU is preparing crash dump, we simply loop here. */
|
|
|
|
run_crash_ipi_callback(regs);
|
panic, x86: Allow CPUs to save registers even if looping in NMI context
Currently, kdump_nmi_shootdown_cpus(), a subroutine of crash_kexec(),
sends an NMI IPI to CPUs which haven't called panic() to stop them,
save their register information and do some cleanups for crash dumping.
However, if such a CPU is infinitely looping in NMI context, we fail to
save its register information into the crash dump.
For example, this can happen when unknown NMIs are broadcast to all
CPUs as follows:
CPU 0 CPU 1
=========================== ==========================
receive an unknown NMI
unknown_nmi_error()
panic() receive an unknown NMI
spin_trylock(&panic_lock) unknown_nmi_error()
crash_kexec() panic()
spin_trylock(&panic_lock)
panic_smp_self_stop()
infinite loop
kdump_nmi_shootdown_cpus()
issue NMI IPI -----------> blocked until IRET
infinite loop...
Here, since CPU 1 is in NMI context, the second NMI from CPU 0 is
blocked until CPU 1 executes IRET. However, CPU 1 never executes IRET,
so the NMI is not handled and the callback function to save registers is
never called.
In practice, this can happen on some servers which broadcast NMIs to all
CPUs when the NMI button is pushed.
To save registers in this case, we need to:
a) Return from NMI handler instead of looping infinitely
or
b) Call the callback function directly from the infinite loop
Inherently, a) is risky because NMI is also used to prevent corrupted
data from being propagated to devices. So, we chose b).
This patch does the following:
1. Move the infinite looping of CPUs which haven't called panic() in NMI
context (actually done by panic_smp_self_stop()) outside of panic() to
enable us to refer pt_regs. Please note that panic_smp_self_stop() is
still used for normal context.
2. Call a callback of kdump_nmi_shootdown_cpus() directly to save
registers and do some cleanups after setting waiting_for_crash_ipi which
is used for counting down the number of CPUs which handled the callback
Signed-off-by: Hidehiro Kawai <hidehiro.kawai.ez@hitachi.com>
Acked-by: Michal Hocko <mhocko@suse.com>
Cc: Aaron Tomlin <atomlin@redhat.com>
Cc: Andrew Morton <akpm@linux-foundation.org>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Baoquan He <bhe@redhat.com>
Cc: Chris Metcalf <cmetcalf@ezchip.com>
Cc: Dave Young <dyoung@redhat.com>
Cc: David Hildenbrand <dahi@linux.vnet.ibm.com>
Cc: Don Zickus <dzickus@redhat.com>
Cc: Eric Biederman <ebiederm@xmission.com>
Cc: Frederic Weisbecker <fweisbec@gmail.com>
Cc: Gobinda Charan Maji <gobinda.cemk07@gmail.com>
Cc: HATAYAMA Daisuke <d.hatayama@jp.fujitsu.com>
Cc: Hidehiro Kawai <hidehiro.kawai.ez@hitachi.com>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Ingo Molnar <mingo@kernel.org>
Cc: Javi Merino <javi.merino@arm.com>
Cc: Jiang Liu <jiang.liu@linux.intel.com>
Cc: Jonathan Corbet <corbet@lwn.net>
Cc: kexec@lists.infradead.org
Cc: linux-doc@vger.kernel.org
Cc: lkml <linux-kernel@vger.kernel.org>
Cc: Masami Hiramatsu <masami.hiramatsu.pt@hitachi.com>
Cc: Michal Nazarewicz <mina86@mina86.com>
Cc: Nicolas Iooss <nicolas.iooss_linux@m4x.org>
Cc: Oleg Nesterov <oleg@redhat.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Prarit Bhargava <prarit@redhat.com>
Cc: Rasmus Villemoes <linux@rasmusvillemoes.dk>
Cc: Seth Jennings <sjenning@redhat.com>
Cc: Stefan Lippers-Hollmann <s.l-h@gmx.de>
Cc: Steven Rostedt <rostedt@goodmis.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Ulrich Obergfell <uobergfe@redhat.com>
Cc: Vitaly Kuznetsov <vkuznets@redhat.com>
Cc: Vivek Goyal <vgoyal@redhat.com>
Cc: Yasuaki Ishimatsu <isimatu.yasuaki@jp.fujitsu.com>
Link: http://lkml.kernel.org/r/20151210014628.25437.75256.stgit@softrs
[ Cleanup comments, fixup formatting. ]
Signed-off-by: Borislav Petkov <bp@suse.de>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
2015-12-14 18:19:10 +08:00
|
|
|
cpu_relax();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-11-12 21:34:43 +08:00
|
|
|
#else /* !CONFIG_SMP */
|
|
|
|
void nmi_shootdown_cpus(nmi_shootdown_cb callback)
|
|
|
|
{
|
|
|
|
/* No other CPUs to shoot down */
|
|
|
|
}
|
2015-12-14 18:19:13 +08:00
|
|
|
|
|
|
|
void run_crash_ipi_callback(struct pt_regs *regs)
|
|
|
|
{
|
|
|
|
}
|
2008-11-12 21:34:42 +08:00
|
|
|
#endif
|