]>
Commit | Line | Data |
---|---|---|
457c8996 | 1 | // SPDX-License-Identifier: GPL-2.0-only |
1da177e4 LT |
2 | /* |
3 | * linux/init/main.c | |
4 | * | |
5 | * Copyright (C) 1991, 1992 Linus Torvalds | |
6 | * | |
7 | * GK 2/5/95 - Changed to support mounting root fs via NFS | |
8 | * Added initrd & change_root: Werner Almesberger & Hans Lermen, Feb '96 | |
9 | * Moan early if gcc is old, avoiding bogus kernels - Paul Gortmaker, May '96 | |
dd4d9fec | 10 | * Simplified starting of init: Michael A. Griffith <[email protected]> |
1da177e4 LT |
11 | */ |
12 | ||
ea676e84 AM |
13 | #define DEBUG /* Enable initcall_debug */ |
14 | ||
1da177e4 | 15 | #include <linux/types.h> |
8a293be0 | 16 | #include <linux/extable.h> |
1da177e4 LT |
17 | #include <linux/module.h> |
18 | #include <linux/proc_fs.h> | |
5c2c5c55 | 19 | #include <linux/binfmts.h> |
1da177e4 LT |
20 | #include <linux/kernel.h> |
21 | #include <linux/syscalls.h> | |
9b5609fd | 22 | #include <linux/stackprotector.h> |
1da177e4 LT |
23 | #include <linux/string.h> |
24 | #include <linux/ctype.h> | |
25 | #include <linux/delay.h> | |
1da177e4 LT |
26 | #include <linux/ioport.h> |
27 | #include <linux/init.h> | |
1da177e4 | 28 | #include <linux/initrd.h> |
57c8a661 | 29 | #include <linux/memblock.h> |
4a7a16dc | 30 | #include <linux/acpi.h> |
7684b858 | 31 | #include <linux/bootconfig.h> |
0c688614 | 32 | #include <linux/console.h> |
38b8d208 | 33 | #include <linux/nmi.h> |
1da177e4 LT |
34 | #include <linux/percpu.h> |
35 | #include <linux/kmod.h> | |
db64fe02 | 36 | #include <linux/vmalloc.h> |
1da177e4 | 37 | #include <linux/kernel_stat.h> |
d7cd5611 | 38 | #include <linux/start_kernel.h> |
1da177e4 | 39 | #include <linux/security.h> |
3d442233 | 40 | #include <linux/smp.h> |
1da177e4 LT |
41 | #include <linux/profile.h> |
42 | #include <linux/rcupdate.h> | |
43 | #include <linux/moduleparam.h> | |
44 | #include <linux/kallsyms.h> | |
45 | #include <linux/writeback.h> | |
46 | #include <linux/cpu.h> | |
47 | #include <linux/cpuset.h> | |
ddbcc7e8 | 48 | #include <linux/cgroup.h> |
1da177e4 | 49 | #include <linux/efi.h> |
906568c9 | 50 | #include <linux/tick.h> |
78634061 | 51 | #include <linux/sched/isolation.h> |
6168a702 | 52 | #include <linux/interrupt.h> |
c757249a | 53 | #include <linux/taskstats_kern.h> |
ca74e92b | 54 | #include <linux/delayacct.h> |
1da177e4 | 55 | #include <linux/unistd.h> |
3ea056c5 | 56 | #include <linux/utsname.h> |
1da177e4 LT |
57 | #include <linux/rmap.h> |
58 | #include <linux/mempolicy.h> | |
59 | #include <linux/key.h> | |
b6cd0b77 | 60 | #include <linux/buffer_head.h> |
eefa864b | 61 | #include <linux/page_ext.h> |
9a11b49a | 62 | #include <linux/debug_locks.h> |
3ac7fe5a | 63 | #include <linux/debugobjects.h> |
fbb9ce95 | 64 | #include <linux/lockdep.h> |
3c7b4e6b | 65 | #include <linux/kmemleak.h> |
84d73786 | 66 | #include <linux/pid_namespace.h> |
4c002c97 | 67 | #include <linux/device/driver.h> |
73c27992 | 68 | #include <linux/kthread.h> |
e6fe6649 | 69 | #include <linux/sched.h> |
1777e463 | 70 | #include <linux/sched/init.h> |
a1c9eea9 | 71 | #include <linux/signal.h> |
199f0ca5 | 72 | #include <linux/idr.h> |
0b4b3827 | 73 | #include <linux/kgdb.h> |
68bf21aa | 74 | #include <linux/ftrace.h> |
22a9d645 | 75 | #include <linux/async.h> |
6ae6996a | 76 | #include <linux/sfi.h> |
2b2af54a | 77 | #include <linux/shmem_fs.h> |
5a0e3ad6 | 78 | #include <linux/slab.h> |
24a24bb6 | 79 | #include <linux/perf_event.h> |
a74fb73c | 80 | #include <linux/ptrace.h> |
aa8c6248 | 81 | #include <linux/pti.h> |
bb813f4c TH |
82 | #include <linux/blkdev.h> |
83 | #include <linux/elevator.h> | |
5d2a4e91 | 84 | #include <linux/sched/clock.h> |
29930025 | 85 | #include <linux/sched/task.h> |
68db0cf1 | 86 | #include <linux/sched/task_stack.h> |
65f382fd | 87 | #include <linux/context_tracking.h> |
47d06e53 | 88 | #include <linux/random.h> |
7b0b73d7 | 89 | #include <linux/list.h> |
c9cd2ce2 | 90 | #include <linux/integrity.h> |
e149ed2b | 91 | #include <linux/proc_ns.h> |
0ddab1d2 | 92 | #include <linux/io.h> |
39290b38 | 93 | #include <linux/cache.h> |
2959a5f7 | 94 | #include <linux/rodata_test.h> |
33352244 | 95 | #include <linux/jump_label.h> |
ae67d58d | 96 | #include <linux/mem_encrypt.h> |
1da177e4 LT |
97 | |
98 | #include <asm/io.h> | |
99 | #include <asm/bugs.h> | |
100 | #include <asm/setup.h> | |
a940199f | 101 | #include <asm/sections.h> |
37b73c82 | 102 | #include <asm/cacheflush.h> |
1da177e4 | 103 | |
4ee7c60d SRV |
104 | #define CREATE_TRACE_POINTS |
105 | #include <trace/events/initcall.h> | |
106 | ||
aae5f662 | 107 | static int kernel_init(void *); |
1da177e4 LT |
108 | |
109 | extern void init_IRQ(void); | |
1da177e4 | 110 | extern void radix_tree_init(void); |
1da177e4 | 111 | |
2ce802f6 TH |
112 | /* |
113 | * Debug helper: via this flag we know that we are in 'early bootup code' | |
114 | * where only the boot processor is running with IRQ disabled. This means | |
115 | * two things - IRQ must not be enabled before the flag is cleared and some | |
116 | * operations which are not allowed with IRQ disabled are allowed while the | |
117 | * flag is set. | |
118 | */ | |
119 | bool early_boot_irqs_disabled __read_mostly; | |
120 | ||
a6826048 | 121 | enum system_states system_state __read_mostly; |
1da177e4 LT |
122 | EXPORT_SYMBOL(system_state); |
123 | ||
124 | /* | |
125 | * Boot command-line arguments | |
126 | */ | |
127 | #define MAX_INIT_ARGS CONFIG_INIT_ENV_ARG_LIMIT | |
128 | #define MAX_INIT_ENVS CONFIG_INIT_ENV_ARG_LIMIT | |
129 | ||
130 | extern void time_init(void); | |
131 | /* Default late time init is NULL. archs can override this later. */ | |
d2e3192b | 132 | void (*__initdata late_time_init)(void); |
1da177e4 | 133 | |
30d7e0d4 ABL |
134 | /* Untouched command line saved by arch-specific code. */ |
135 | char __initdata boot_command_line[COMMAND_LINE_SIZE]; | |
136 | /* Untouched saved command line (eg. for /proc) */ | |
137 | char *saved_command_line; | |
138 | /* Command line for parameter parsing */ | |
139 | static char *static_command_line; | |
51887d03 MH |
140 | /* Untouched extra command line */ |
141 | static char *extra_command_line; | |
13199162 MH |
142 | /* Extra init arguments */ |
143 | static char *extra_init_args; | |
1da177e4 | 144 | |
f61872bb SRV |
145 | #ifdef CONFIG_BOOT_CONFIG |
146 | /* Is bootconfig on command line? */ | |
147 | static bool bootconfig_found; | |
148 | static bool initargs_found; | |
149 | #else | |
150 | # define bootconfig_found false | |
151 | # define initargs_found false | |
152 | #endif | |
153 | ||
1da177e4 | 154 | static char *execute_command; |
ffdfc409 | 155 | static char *ramdisk_execute_command; |
1da177e4 | 156 | |
c4b2c0c5 HFS |
157 | /* |
158 | * Used to generate warnings if static_key manipulation functions are used | |
159 | * before jump_label_init is called. | |
160 | */ | |
dd4d9fec | 161 | bool static_key_initialized __read_mostly; |
c4b2c0c5 HFS |
162 | EXPORT_SYMBOL_GPL(static_key_initialized); |
163 | ||
8b3b2955 JB |
164 | /* |
165 | * If set, this is an indication to the drivers that reset the underlying | |
166 | * device before going ahead with the initialization otherwise driver might | |
167 | * rely on the BIOS and skip the reset operation. | |
168 | * | |
169 | * This is useful if kernel is booting in an unreliable environment. | |
fc454fdc | 170 | * For ex. kdump situation where previous kernel has crashed, BIOS has been |
8b3b2955 JB |
171 | * skipped and devices will be in unknown state. |
172 | */ | |
173 | unsigned int reset_devices; | |
174 | EXPORT_SYMBOL(reset_devices); | |
1da177e4 | 175 | |
7e96287d VG |
176 | static int __init set_reset_devices(char *str) |
177 | { | |
178 | reset_devices = 1; | |
179 | return 1; | |
180 | } | |
181 | ||
182 | __setup("reset_devices", set_reset_devices); | |
183 | ||
dd4d9fec FF |
184 | static const char *argv_init[MAX_INIT_ARGS+2] = { "init", NULL, }; |
185 | const char *envp_init[MAX_INIT_ENVS+2] = { "HOME=/", "TERM=linux", NULL, }; | |
1da177e4 LT |
186 | static const char *panic_later, *panic_param; |
187 | ||
914dcaa8 | 188 | extern const struct obs_kernel_param __setup_start[], __setup_end[]; |
1da177e4 | 189 | |
31c025b5 | 190 | static bool __init obsolete_checksetup(char *line) |
1da177e4 | 191 | { |
914dcaa8 | 192 | const struct obs_kernel_param *p; |
31c025b5 | 193 | bool had_early_param = false; |
1da177e4 LT |
194 | |
195 | p = __setup_start; | |
196 | do { | |
197 | int n = strlen(p->str); | |
b1e4d20c | 198 | if (parameqn(line, p->str, n)) { |
1da177e4 | 199 | if (p->early) { |
33df0d19 RR |
200 | /* Already done in parse_early_param? |
201 | * (Needs exact match on param part). | |
202 | * Keep iterating, as we can have early | |
203 | * params and __setups of same names 8( */ | |
1da177e4 | 204 | if (line[n] == '\0' || line[n] == '=') |
31c025b5 | 205 | had_early_param = true; |
1da177e4 | 206 | } else if (!p->setup_func) { |
ea676e84 AM |
207 | pr_warn("Parameter %s is obsolete, ignored\n", |
208 | p->str); | |
31c025b5 | 209 | return true; |
1da177e4 | 210 | } else if (p->setup_func(line + n)) |
31c025b5 | 211 | return true; |
1da177e4 LT |
212 | } |
213 | p++; | |
214 | } while (p < __setup_end); | |
33df0d19 RR |
215 | |
216 | return had_early_param; | |
1da177e4 LT |
217 | } |
218 | ||
219 | /* | |
220 | * This should be approx 2 Bo*oMips to start (note initial shift), and will | |
221 | * still work even if initially too large, it will just take slightly longer | |
222 | */ | |
223 | unsigned long loops_per_jiffy = (1<<12); | |
1da177e4 LT |
224 | EXPORT_SYMBOL(loops_per_jiffy); |
225 | ||
226 | static int __init debug_kernel(char *str) | |
227 | { | |
a8fe19eb | 228 | console_loglevel = CONSOLE_LOGLEVEL_DEBUG; |
f6f21c81 | 229 | return 0; |
1da177e4 LT |
230 | } |
231 | ||
232 | static int __init quiet_kernel(char *str) | |
233 | { | |
a8fe19eb | 234 | console_loglevel = CONSOLE_LOGLEVEL_QUIET; |
f6f21c81 | 235 | return 0; |
1da177e4 LT |
236 | } |
237 | ||
f6f21c81 YL |
238 | early_param("debug", debug_kernel); |
239 | early_param("quiet", quiet_kernel); | |
1da177e4 LT |
240 | |
241 | static int __init loglevel(char *str) | |
242 | { | |
808bf29b AS |
243 | int newlevel; |
244 | ||
245 | /* | |
246 | * Only update loglevel value when a correct setting was passed, | |
247 | * to prevent blind crashes (when loglevel being set to 0) that | |
248 | * are quite hard to debug | |
249 | */ | |
250 | if (get_option(&str, &newlevel)) { | |
251 | console_loglevel = newlevel; | |
252 | return 0; | |
253 | } | |
254 | ||
255 | return -EINVAL; | |
1da177e4 LT |
256 | } |
257 | ||
f6f21c81 | 258 | early_param("loglevel", loglevel); |
1da177e4 | 259 | |
7684b858 | 260 | #ifdef CONFIG_BOOT_CONFIG |
51887d03 MH |
261 | |
262 | char xbc_namebuf[XBC_KEYLEN_MAX] __initdata; | |
263 | ||
264 | #define rest(dst, end) ((end) > (dst) ? (end) - (dst) : 0) | |
265 | ||
266 | static int __init xbc_snprint_cmdline(char *buf, size_t size, | |
267 | struct xbc_node *root) | |
268 | { | |
269 | struct xbc_node *knode, *vnode; | |
270 | char *end = buf + size; | |
51887d03 MH |
271 | const char *val; |
272 | int ret; | |
273 | ||
274 | xbc_node_for_each_key_value(root, knode, val) { | |
275 | ret = xbc_node_compose_key_after(root, knode, | |
276 | xbc_namebuf, XBC_KEYLEN_MAX); | |
277 | if (ret < 0) | |
278 | return ret; | |
279 | ||
280 | vnode = xbc_node_get_child(knode); | |
88b91371 MH |
281 | if (!vnode) { |
282 | ret = snprintf(buf, rest(buf, end), "%s ", xbc_namebuf); | |
283 | if (ret < 0) | |
284 | return ret; | |
285 | buf += ret; | |
51887d03 | 286 | continue; |
88b91371 | 287 | } |
51887d03 | 288 | xbc_array_for_each_value(vnode, val) { |
88b91371 MH |
289 | ret = snprintf(buf, rest(buf, end), "%s=\"%s\" ", |
290 | xbc_namebuf, val); | |
51887d03 MH |
291 | if (ret < 0) |
292 | return ret; | |
293 | buf += ret; | |
51887d03 | 294 | } |
51887d03 MH |
295 | } |
296 | ||
297 | return buf - (end - size); | |
298 | } | |
299 | #undef rest | |
300 | ||
301 | /* Make an extra command line under given key word */ | |
302 | static char * __init xbc_make_cmdline(const char *key) | |
303 | { | |
304 | struct xbc_node *root; | |
305 | char *new_cmdline; | |
306 | int ret, len = 0; | |
307 | ||
308 | root = xbc_find_node(key); | |
309 | if (!root) | |
310 | return NULL; | |
311 | ||
312 | /* Count required buffer size */ | |
313 | len = xbc_snprint_cmdline(NULL, 0, root); | |
314 | if (len <= 0) | |
315 | return NULL; | |
316 | ||
317 | new_cmdline = memblock_alloc(len + 1, SMP_CACHE_BYTES); | |
318 | if (!new_cmdline) { | |
319 | pr_err("Failed to allocate memory for extra kernel cmdline.\n"); | |
320 | return NULL; | |
321 | } | |
322 | ||
323 | ret = xbc_snprint_cmdline(new_cmdline, len + 1, root); | |
324 | if (ret < 0 || ret > len) { | |
325 | pr_err("Failed to print extra kernel cmdline.\n"); | |
326 | return NULL; | |
327 | } | |
328 | ||
329 | return new_cmdline; | |
330 | } | |
331 | ||
08d9e686 | 332 | static u32 boot_config_checksum(unsigned char *p, u32 size) |
7684b858 MH |
333 | { |
334 | u32 ret = 0; | |
335 | ||
336 | while (size--) | |
337 | ret += *p++; | |
338 | ||
339 | return ret; | |
340 | } | |
341 | ||
f61872bb SRV |
342 | static int __init bootconfig_params(char *param, char *val, |
343 | const char *unused, void *arg) | |
344 | { | |
345 | if (strcmp(param, "bootconfig") == 0) { | |
346 | bootconfig_found = true; | |
347 | } else if (strcmp(param, "--") == 0) { | |
348 | initargs_found = true; | |
349 | } | |
350 | return 0; | |
351 | } | |
352 | ||
7495e092 | 353 | static void __init setup_boot_config(const char *cmdline) |
7684b858 | 354 | { |
f61872bb | 355 | static char tmp_cmdline[COMMAND_LINE_SIZE] __initdata; |
89b74cac MH |
356 | const char *msg; |
357 | int pos; | |
7684b858 MH |
358 | u32 size, csum; |
359 | char *data, *copy; | |
360 | u32 *hdr; | |
a0057403 | 361 | int ret; |
7684b858 | 362 | |
f61872bb SRV |
363 | strlcpy(tmp_cmdline, boot_command_line, COMMAND_LINE_SIZE); |
364 | parse_args("bootconfig", tmp_cmdline, NULL, 0, 0, 0, NULL, | |
365 | bootconfig_params); | |
366 | ||
367 | if (!bootconfig_found) | |
7684b858 MH |
368 | return; |
369 | ||
7495e092 SRV |
370 | if (!initrd_end) |
371 | goto not_found; | |
372 | ||
85c46b78 MH |
373 | data = (char *)initrd_end - BOOTCONFIG_MAGIC_LEN; |
374 | if (memcmp(data, BOOTCONFIG_MAGIC, BOOTCONFIG_MAGIC_LEN)) | |
375 | goto not_found; | |
376 | ||
377 | hdr = (u32 *)(data - 8); | |
7684b858 MH |
378 | size = hdr[0]; |
379 | csum = hdr[1]; | |
380 | ||
7495e092 SRV |
381 | if (size >= XBC_DATA_MAX) { |
382 | pr_err("bootconfig size %d greater than max size %d\n", | |
383 | size, XBC_DATA_MAX); | |
7684b858 | 384 | return; |
7495e092 | 385 | } |
7684b858 MH |
386 | |
387 | data = ((void *)hdr) - size; | |
388 | if ((unsigned long)data < initrd_start) | |
7495e092 | 389 | goto not_found; |
7684b858 | 390 | |
7495e092 SRV |
391 | if (boot_config_checksum((unsigned char *)data, size) != csum) { |
392 | pr_err("bootconfig checksum failed\n"); | |
7684b858 | 393 | return; |
7495e092 | 394 | } |
7684b858 MH |
395 | |
396 | copy = memblock_alloc(size + 1, SMP_CACHE_BYTES); | |
397 | if (!copy) { | |
e241d14a | 398 | pr_err("Failed to allocate memory for bootconfig\n"); |
7684b858 MH |
399 | return; |
400 | } | |
401 | ||
402 | memcpy(copy, data, size); | |
403 | copy[size] = '\0'; | |
404 | ||
89b74cac MH |
405 | ret = xbc_init(copy, &msg, &pos); |
406 | if (ret < 0) { | |
407 | if (pos < 0) | |
408 | pr_err("Failed to init bootconfig: %s.\n", msg); | |
409 | else | |
410 | pr_err("Failed to parse bootconfig: %s at %d.\n", | |
411 | msg, pos); | |
412 | } else { | |
a0057403 | 413 | pr_info("Load bootconfig: %d bytes %d nodes\n", size, ret); |
51887d03 MH |
414 | /* keys starting with "kernel." are passed via cmdline */ |
415 | extra_command_line = xbc_make_cmdline("kernel"); | |
13199162 MH |
416 | /* Also, "init." keys are init arguments */ |
417 | extra_init_args = xbc_make_cmdline("init"); | |
51887d03 | 418 | } |
7495e092 SRV |
419 | return; |
420 | not_found: | |
421 | pr_err("'bootconfig' found on command line, but no bootconfig found\n"); | |
7684b858 MH |
422 | } |
423 | #else | |
7495e092 | 424 | #define setup_boot_config(cmdline) do { } while (0) |
d8a953dd MH |
425 | |
426 | static int __init warn_bootconfig(char *str) | |
427 | { | |
428 | pr_warn("WARNING: 'bootconfig' found on the kernel command line but CONFIG_BOOTCONFIG is not set.\n"); | |
429 | return 0; | |
430 | } | |
431 | early_param("bootconfig", warn_bootconfig); | |
432 | ||
7684b858 MH |
433 | #endif |
434 | ||
a99cd112 | 435 | /* Change NUL term back to "=", to make "param" the whole string. */ |
7e2762e1 | 436 | static void __init repair_env_string(char *param, char *val) |
1da177e4 | 437 | { |
1da177e4 LT |
438 | if (val) { |
439 | /* param=val or param="val"? */ | |
440 | if (val == param+strlen(param)+1) | |
441 | val[-1] = '='; | |
442 | else if (val == param+strlen(param)+2) { | |
443 | val[-2] = '='; | |
444 | memmove(val-1, val, strlen(val)+1); | |
1da177e4 LT |
445 | } else |
446 | BUG(); | |
447 | } | |
a99cd112 CM |
448 | } |
449 | ||
51e158c1 | 450 | /* Anything after -- gets handed straight to init. */ |
ecc86170 LR |
451 | static int __init set_init_arg(char *param, char *val, |
452 | const char *unused, void *arg) | |
51e158c1 RR |
453 | { |
454 | unsigned int i; | |
455 | ||
456 | if (panic_later) | |
457 | return 0; | |
458 | ||
7e2762e1 | 459 | repair_env_string(param, val); |
51e158c1 RR |
460 | |
461 | for (i = 0; argv_init[i]; i++) { | |
462 | if (i == MAX_INIT_ARGS) { | |
463 | panic_later = "init"; | |
464 | panic_param = param; | |
465 | return 0; | |
466 | } | |
467 | } | |
468 | argv_init[i] = param; | |
469 | return 0; | |
470 | } | |
471 | ||
a99cd112 CM |
472 | /* |
473 | * Unknown boot options get handed to init, unless they look like | |
474 | * unused parameters (modprobe will find them in /proc/cmdline). | |
475 | */ | |
ecc86170 LR |
476 | static int __init unknown_bootoption(char *param, char *val, |
477 | const char *unused, void *arg) | |
a99cd112 | 478 | { |
283900e8 AS |
479 | size_t len = strlen(param); |
480 | ||
7e2762e1 | 481 | repair_env_string(param, val); |
1da177e4 LT |
482 | |
483 | /* Handle obsolete-style parameters */ | |
484 | if (obsolete_checksetup(param)) | |
485 | return 0; | |
486 | ||
f066a4f6 | 487 | /* Unused module parameter. */ |
283900e8 | 488 | if (strnchr(param, len, '.')) |
1da177e4 | 489 | return 0; |
1da177e4 LT |
490 | |
491 | if (panic_later) | |
492 | return 0; | |
493 | ||
494 | if (val) { | |
495 | /* Environment option */ | |
496 | unsigned int i; | |
497 | for (i = 0; envp_init[i]; i++) { | |
498 | if (i == MAX_INIT_ENVS) { | |
499a4584 | 499 | panic_later = "env"; |
1da177e4 LT |
500 | panic_param = param; |
501 | } | |
283900e8 | 502 | if (!strncmp(param, envp_init[i], len+1)) |
1da177e4 LT |
503 | break; |
504 | } | |
505 | envp_init[i] = param; | |
506 | } else { | |
507 | /* Command line option */ | |
508 | unsigned int i; | |
509 | for (i = 0; argv_init[i]; i++) { | |
510 | if (i == MAX_INIT_ARGS) { | |
499a4584 | 511 | panic_later = "init"; |
1da177e4 LT |
512 | panic_param = param; |
513 | } | |
514 | } | |
515 | argv_init[i] = param; | |
516 | } | |
517 | return 0; | |
518 | } | |
519 | ||
520 | static int __init init_setup(char *str) | |
521 | { | |
522 | unsigned int i; | |
523 | ||
524 | execute_command = str; | |
525 | /* | |
526 | * In case LILO is going to boot us with default command line, | |
527 | * it prepends "auto" before the whole cmdline which makes | |
528 | * the shell think it should execute a script with such name. | |
529 | * So we ignore all arguments entered _before_ init=... [MJ] | |
530 | */ | |
531 | for (i = 1; i < MAX_INIT_ARGS; i++) | |
532 | argv_init[i] = NULL; | |
533 | return 1; | |
534 | } | |
535 | __setup("init=", init_setup); | |
536 | ||
ffdfc409 OJ |
537 | static int __init rdinit_setup(char *str) |
538 | { | |
539 | unsigned int i; | |
540 | ||
541 | ramdisk_execute_command = str; | |
542 | /* See "auto" comment in init_setup */ | |
543 | for (i = 1; i < MAX_INIT_ARGS; i++) | |
544 | argv_init[i] = NULL; | |
545 | return 1; | |
546 | } | |
547 | __setup("rdinit=", rdinit_setup); | |
548 | ||
1da177e4 | 549 | #ifndef CONFIG_SMP |
34db18a0 | 550 | static const unsigned int setup_max_cpus = NR_CPUS; |
e0982e90 | 551 | static inline void setup_nr_cpu_ids(void) { } |
1da177e4 | 552 | static inline void smp_prepare_cpus(unsigned int maxcpus) { } |
1da177e4 LT |
553 | #endif |
554 | ||
30d7e0d4 ABL |
555 | /* |
556 | * We need to store the untouched command line for future reference. | |
557 | * We also need to store the touched command line since the parameter | |
558 | * parsing is performed in place, and we should allow a component to | |
559 | * store reference of name/value for future reference. | |
560 | */ | |
561 | static void __init setup_command_line(char *command_line) | |
562 | { | |
13199162 | 563 | size_t len, xlen = 0, ilen = 0; |
f5c7310a | 564 | |
51887d03 MH |
565 | if (extra_command_line) |
566 | xlen = strlen(extra_command_line); | |
13199162 MH |
567 | if (extra_init_args) |
568 | ilen = strlen(extra_init_args) + 4; /* for " -- " */ | |
f5c7310a | 569 | |
51887d03 | 570 | len = xlen + strlen(boot_command_line) + 1; |
f5c7310a | 571 | |
13199162 | 572 | saved_command_line = memblock_alloc(len + ilen, SMP_CACHE_BYTES); |
f5c7310a | 573 | if (!saved_command_line) |
13199162 | 574 | panic("%s: Failed to allocate %zu bytes\n", __func__, len + ilen); |
f5c7310a MR |
575 | |
576 | static_command_line = memblock_alloc(len, SMP_CACHE_BYTES); | |
577 | if (!static_command_line) | |
578 | panic("%s: Failed to allocate %zu bytes\n", __func__, len); | |
579 | ||
51887d03 MH |
580 | if (xlen) { |
581 | /* | |
582 | * We have to put extra_command_line before boot command | |
583 | * lines because there could be dashes (separator of init | |
584 | * command line) in the command lines. | |
585 | */ | |
586 | strcpy(saved_command_line, extra_command_line); | |
587 | strcpy(static_command_line, extra_command_line); | |
588 | } | |
589 | strcpy(saved_command_line + xlen, boot_command_line); | |
590 | strcpy(static_command_line + xlen, command_line); | |
13199162 MH |
591 | |
592 | if (ilen) { | |
593 | /* | |
594 | * Append supplemental init boot args to saved_command_line | |
595 | * so that user can check what command line options passed | |
596 | * to init. | |
597 | */ | |
598 | len = strlen(saved_command_line); | |
f61872bb SRV |
599 | if (initargs_found) { |
600 | saved_command_line[len++] = ' '; | |
601 | } else { | |
13199162 MH |
602 | strcpy(saved_command_line + len, " -- "); |
603 | len += 4; | |
f61872bb | 604 | } |
13199162 MH |
605 | |
606 | strcpy(saved_command_line + len, extra_init_args); | |
607 | } | |
30d7e0d4 ABL |
608 | } |
609 | ||
1da177e4 LT |
610 | /* |
611 | * We need to finalize in a non-__init function or else race conditions | |
612 | * between the root thread and the init thread may cause start_kernel to | |
613 | * be reaped by free_initmem before the root thread has proceeded to | |
614 | * cpu_idle. | |
615 | * | |
616 | * gcc-3.4 accidentally inlines this function, so use noinline. | |
617 | */ | |
618 | ||
b433c3d4 PZ |
619 | static __initdata DECLARE_COMPLETION(kthreadd_done); |
620 | ||
53c99bd6 | 621 | noinline void __ref rest_init(void) |
1da177e4 | 622 | { |
8fb12156 | 623 | struct task_struct *tsk; |
73c27992 EB |
624 | int pid; |
625 | ||
7db905e6 | 626 | rcu_scheduler_starting(); |
b433c3d4 | 627 | /* |
97158569 | 628 | * We need to spawn init first so that it obtains pid 1, however |
b433c3d4 PZ |
629 | * the init task will end up wanting to create kthreads, which, if |
630 | * we schedule it before we create kthreadd, will OOPS. | |
631 | */ | |
8fb12156 TG |
632 | pid = kernel_thread(kernel_init, NULL, CLONE_FS); |
633 | /* | |
634 | * Pin init on the boot CPU. Task migration is not properly working | |
635 | * until sched_init_smp() has been run. It will set the allowed | |
636 | * CPUs for init to the non isolated CPUs. | |
637 | */ | |
638 | rcu_read_lock(); | |
639 | tsk = find_task_by_pid_ns(pid, &init_pid_ns); | |
640 | set_cpus_allowed_ptr(tsk, cpumask_of(smp_processor_id())); | |
641 | rcu_read_unlock(); | |
642 | ||
1da177e4 | 643 | numa_default_policy(); |
73c27992 | 644 | pid = kernel_thread(kthreadd, NULL, CLONE_FS | CLONE_FILES); |
d11c563d | 645 | rcu_read_lock(); |
5cd20455 | 646 | kthreadd_task = find_task_by_pid_ns(pid, &init_pid_ns); |
d11c563d | 647 | rcu_read_unlock(); |
1c3c5eab TG |
648 | |
649 | /* | |
650 | * Enable might_sleep() and smp_processor_id() checks. | |
c1a280b6 | 651 | * They cannot be enabled earlier because with CONFIG_PREEMPTION=y |
1c3c5eab TG |
652 | * kernel_thread() would trigger might_sleep() splats. With |
653 | * CONFIG_PREEMPT_VOLUNTARY=y the init task might have scheduled | |
654 | * already, but it's stuck on the kthreadd_done completion. | |
655 | */ | |
656 | system_state = SYSTEM_SCHEDULING; | |
657 | ||
b433c3d4 | 658 | complete(&kthreadd_done); |
f340c0d1 IM |
659 | |
660 | /* | |
661 | * The boot idle thread must execute schedule() | |
1df21055 | 662 | * at least once to get things moving: |
f340c0d1 | 663 | */ |
bd2f5536 | 664 | schedule_preempt_disabled(); |
5bfb5d69 | 665 | /* Call into cpu_idle with preempt disabled */ |
a1a04ec3 | 666 | cpu_startup_entry(CPUHP_ONLINE); |
1df21055 | 667 | } |
1da177e4 LT |
668 | |
669 | /* Check for early params. */ | |
ecc86170 LR |
670 | static int __init do_early_param(char *param, char *val, |
671 | const char *unused, void *arg) | |
1da177e4 | 672 | { |
914dcaa8 | 673 | const struct obs_kernel_param *p; |
1da177e4 LT |
674 | |
675 | for (p = __setup_start; p < __setup_end; p++) { | |
b1e4d20c | 676 | if ((p->early && parameq(param, p->str)) || |
18a8bd94 YL |
677 | (strcmp(param, "console") == 0 && |
678 | strcmp(p->str, "earlycon") == 0) | |
679 | ) { | |
1da177e4 | 680 | if (p->setup_func(val) != 0) |
ea676e84 | 681 | pr_warn("Malformed early option '%s'\n", param); |
1da177e4 LT |
682 | } |
683 | } | |
684 | /* We accept everything at this stage. */ | |
685 | return 0; | |
686 | } | |
687 | ||
13977091 MD |
688 | void __init parse_early_options(char *cmdline) |
689 | { | |
ecc86170 LR |
690 | parse_args("early options", cmdline, NULL, 0, 0, 0, NULL, |
691 | do_early_param); | |
13977091 MD |
692 | } |
693 | ||
1da177e4 LT |
694 | /* Arch code calls this early on, or if not, just before other parsing. */ |
695 | void __init parse_early_param(void) | |
696 | { | |
dd4d9fec FF |
697 | static int done __initdata; |
698 | static char tmp_cmdline[COMMAND_LINE_SIZE] __initdata; | |
1da177e4 LT |
699 | |
700 | if (done) | |
701 | return; | |
702 | ||
703 | /* All fall through to do_early_param. */ | |
30d7e0d4 | 704 | strlcpy(tmp_cmdline, boot_command_line, COMMAND_LINE_SIZE); |
13977091 | 705 | parse_early_options(tmp_cmdline); |
1da177e4 LT |
706 | done = 1; |
707 | } | |
708 | ||
e7ff3a47 TG |
709 | void __init __weak arch_post_acpi_subsys_init(void) { } |
710 | ||
839ad62e | 711 | void __init __weak smp_setup_processor_id(void) |
033ab7f8 AM |
712 | { |
713 | } | |
714 | ||
eded09cc | 715 | # if THREAD_SIZE >= PAGE_SIZE |
b235beea | 716 | void __init __weak thread_stack_cache_init(void) |
8c9843e5 BH |
717 | { |
718 | } | |
eded09cc | 719 | #endif |
8c9843e5 | 720 | |
c7753208 TL |
721 | void __init __weak mem_encrypt_init(void) { } |
722 | ||
4fc19708 NA |
723 | void __init __weak poking_init(void) { } |
724 | ||
782de70c | 725 | void __init __weak pgtable_cache_init(void) { } |
caa84136 | 726 | |
4e37958d SRV |
727 | bool initcall_debug; |
728 | core_param(initcall_debug, initcall_debug, bool, 0644); | |
b0dc52f1 SRV |
729 | |
730 | #ifdef TRACEPOINTS_ENABLED | |
4e37958d | 731 | static void __init initcall_debug_enable(void); |
b0dc52f1 SRV |
732 | #else |
733 | static inline void initcall_debug_enable(void) | |
734 | { | |
735 | } | |
736 | #endif | |
4e37958d | 737 | |
23a5c8cb AP |
738 | /* Report memory auto-initialization states for this boot. */ |
739 | static void __init report_meminit(void) | |
740 | { | |
741 | const char *stack; | |
742 | ||
743 | if (IS_ENABLED(CONFIG_INIT_STACK_ALL)) | |
744 | stack = "all"; | |
745 | else if (IS_ENABLED(CONFIG_GCC_PLUGIN_STRUCTLEAK_BYREF_ALL)) | |
746 | stack = "byref_all"; | |
747 | else if (IS_ENABLED(CONFIG_GCC_PLUGIN_STRUCTLEAK_BYREF)) | |
748 | stack = "byref"; | |
749 | else if (IS_ENABLED(CONFIG_GCC_PLUGIN_STRUCTLEAK_USER)) | |
750 | stack = "__user"; | |
751 | else | |
752 | stack = "off"; | |
753 | ||
754 | pr_info("mem auto-init: stack:%s, heap alloc:%s, heap free:%s\n", | |
755 | stack, want_init_on_alloc(GFP_KERNEL) ? "on" : "off", | |
756 | want_init_on_free() ? "on" : "off"); | |
757 | if (want_init_on_free()) | |
758 | pr_info("mem auto-init: clearing system memory may take some time...\n"); | |
759 | } | |
760 | ||
444f478f PE |
761 | /* |
762 | * Set up kernel memory allocators | |
763 | */ | |
764 | static void __init mm_init(void) | |
765 | { | |
eefa864b JK |
766 | /* |
767 | * page_ext requires contiguous pages, | |
768 | * bigger than MAX_ORDER unless SPARSEMEM. | |
769 | */ | |
770 | page_ext_init_flatmem(); | |
8e57f8ac | 771 | init_debug_pagealloc(); |
23a5c8cb | 772 | report_meminit(); |
444f478f PE |
773 | mem_init(); |
774 | kmem_cache_init(); | |
c5665868 | 775 | kmemleak_init(); |
b35f1819 | 776 | pgtable_init(); |
a9ee3a63 | 777 | debug_objects_mem_init(); |
444f478f | 778 | vmalloc_init(); |
0ddab1d2 | 779 | ioremap_huge_init(); |
613e396b TG |
780 | /* Should be run before the first non-init thread is created */ |
781 | init_espfix_bsp(); | |
aa8c6248 TG |
782 | /* Should be run after espfix64 is set up. */ |
783 | pti_init(); | |
444f478f PE |
784 | } |
785 | ||
53c99bd6 MS |
786 | void __init __weak arch_call_rest_init(void) |
787 | { | |
788 | rest_init(); | |
789 | } | |
790 | ||
722a9f92 | 791 | asmlinkage __visible void __init start_kernel(void) |
1da177e4 | 792 | { |
dd4d9fec FF |
793 | char *command_line; |
794 | char *after_dashes; | |
033ab7f8 | 795 | |
d4311ff1 | 796 | set_task_stack_end_magic(&init_task); |
73839c5b | 797 | smp_setup_processor_id(); |
3ac7fe5a | 798 | debug_objects_early_init(); |
42059429 | 799 | |
ddbcc7e8 | 800 | cgroup_init_early(); |
fbb9ce95 IM |
801 | |
802 | local_irq_disable(); | |
2ce802f6 | 803 | early_boot_irqs_disabled = true; |
fbb9ce95 | 804 | |
1b3b3b49 VK |
805 | /* |
806 | * Interrupts are still disabled. Do necessary setups, then | |
807 | * enable them. | |
808 | */ | |
44fd2299 | 809 | boot_cpu_init(); |
1da177e4 | 810 | page_address_init(); |
ea676e84 | 811 | pr_notice("%s", linux_banner); |
e6b1db98 | 812 | early_security_init(); |
1da177e4 | 813 | setup_arch(&command_line); |
7495e092 | 814 | setup_boot_config(command_line); |
30d7e0d4 | 815 | setup_command_line(command_line); |
e0982e90 | 816 | setup_nr_cpu_ids(); |
d6647bdf | 817 | setup_per_cpu_areas(); |
44fd2299 | 818 | smp_prepare_boot_cpu(); /* arch-specific boot-cpu hooks */ |
b5b1404d | 819 | boot_cpu_hotplug_init(); |
1da177e4 | 820 | |
72675e13 | 821 | build_all_zonelists(NULL); |
83b519e8 PE |
822 | page_alloc_init(); |
823 | ||
51887d03 | 824 | pr_notice("Kernel command line: %s\n", saved_command_line); |
6041186a DW |
825 | /* parameters may set static keys */ |
826 | jump_label_init(); | |
83b519e8 | 827 | parse_early_param(); |
51e158c1 RR |
828 | after_dashes = parse_args("Booting kernel", |
829 | static_command_line, __start___param, | |
830 | __stop___param - __start___param, | |
ecc86170 | 831 | -1, -1, NULL, &unknown_bootoption); |
3438cf54 | 832 | if (!IS_ERR_OR_NULL(after_dashes)) |
51e158c1 | 833 | parse_args("Setting init args", after_dashes, NULL, 0, -1, -1, |
ecc86170 | 834 | NULL, set_init_arg); |
13199162 MH |
835 | if (extra_init_args) |
836 | parse_args("Setting extra init args", extra_init_args, | |
837 | NULL, 0, -1, -1, NULL, set_init_arg); | |
97ce2c88 | 838 | |
83b519e8 PE |
839 | /* |
840 | * These use large bootmem allocations and must precede | |
841 | * kmem_cache_init() | |
842 | */ | |
162a7e75 | 843 | setup_log_buf(0); |
83b519e8 PE |
844 | vfs_caches_init_early(); |
845 | sort_main_extable(); | |
846 | trap_init(); | |
444f478f | 847 | mm_init(); |
de03c72c | 848 | |
f631718d SRV |
849 | ftrace_init(); |
850 | ||
e725c731 SRV |
851 | /* trace_printk can be enabled here */ |
852 | early_trace_init(); | |
853 | ||
1da177e4 LT |
854 | /* |
855 | * Set up the scheduler prior starting any interrupts (such as the | |
856 | * timer interrupt). Full topology setup happens at smp_init() | |
857 | * time - but meanwhile we still have a functioning scheduler. | |
858 | */ | |
859 | sched_init(); | |
860 | /* | |
861 | * Disable preemption - early bootup scheduling is extremely | |
862 | * fragile until we cpu_idle() for the first time. | |
863 | */ | |
864 | preempt_disable(); | |
dd4d9fec FF |
865 | if (WARN(!irqs_disabled(), |
866 | "Interrupts were enabled *very* early, fixing it\n")) | |
c4a68306 | 867 | local_irq_disable(); |
0a835c4f | 868 | radix_tree_init(); |
3347fa09 | 869 | |
7d229c66 TS |
870 | /* |
871 | * Set up housekeeping before setting up workqueues to allow the unbound | |
872 | * workqueue to take non-housekeeping into account. | |
873 | */ | |
874 | housekeeping_init(); | |
875 | ||
3347fa09 TH |
876 | /* |
877 | * Allow workqueue creation and work item queueing/cancelling | |
878 | * early. Work item execution depends on kthreads and starts after | |
879 | * workqueue_init(). | |
880 | */ | |
881 | workqueue_init_early(); | |
882 | ||
1da177e4 | 883 | rcu_init(); |
5f893b26 | 884 | |
e725c731 | 885 | /* Trace events are available after this */ |
5f893b26 SRRH |
886 | trace_init(); |
887 | ||
4e37958d SRV |
888 | if (initcall_debug) |
889 | initcall_debug_enable(); | |
890 | ||
65f382fd | 891 | context_tracking_init(); |
0b8f1efa YL |
892 | /* init some links before init_ISA_irqs() */ |
893 | early_irq_init(); | |
1da177e4 | 894 | init_IRQ(); |
ad2b1353 | 895 | tick_init(); |
d6dd50e0 | 896 | rcu_init_nohz(); |
1da177e4 | 897 | init_timers(); |
c0a31329 | 898 | hrtimers_init(); |
1da177e4 | 899 | softirq_init(); |
ad596171 | 900 | timekeeping_init(); |
d5553523 KC |
901 | |
902 | /* | |
903 | * For best initial stack canary entropy, prepare it after: | |
904 | * - setup_arch() for any UEFI RNG entropy and boot cmdline access | |
905 | * - timekeeping_init() for ktime entropy used in rand_initialize() | |
906 | * - rand_initialize() to get any arch-specific entropy like RDRAND | |
907 | * - add_latent_entropy() to get any latent entropy | |
908 | * - adding command line entropy | |
909 | */ | |
910 | rand_initialize(); | |
911 | add_latent_entropy(); | |
912 | add_device_randomness(command_line, strlen(command_line)); | |
913 | boot_init_stack_canary(); | |
914 | ||
88fecaa2 | 915 | time_init(); |
9e630205 | 916 | perf_event_init(); |
93e02814 | 917 | profile_init(); |
d8ad7d11 | 918 | call_function_init(); |
f91eb62f | 919 | WARN(!irqs_disabled(), "Interrupts were enabled early\n"); |
c3bc8fd6 | 920 | |
2ce802f6 | 921 | early_boot_irqs_disabled = false; |
93e02814 | 922 | local_irq_enable(); |
dcce284a | 923 | |
7e85ee0c | 924 | kmem_cache_init_late(); |
1da177e4 LT |
925 | |
926 | /* | |
927 | * HACK ALERT! This is early. We're enabling the console before | |
928 | * we've done PCI setups etc, and console_init() must be aware of | |
929 | * this. But we do want output early, in case something goes wrong. | |
930 | */ | |
931 | console_init(); | |
932 | if (panic_later) | |
499a4584 TH |
933 | panic("Too many boot %s vars at `%s'", panic_later, |
934 | panic_param); | |
fbb9ce95 | 935 | |
c3bc8fd6 | 936 | lockdep_init(); |
fbb9ce95 | 937 | |
9a11b49a IM |
938 | /* |
939 | * Need to run this when irqs are enabled, because it wants | |
940 | * to self-test [hard/soft]-irqs on/off lock inversion bugs | |
941 | * too: | |
942 | */ | |
943 | locking_selftest(); | |
944 | ||
c7753208 TL |
945 | /* |
946 | * This needs to be called before any devices perform DMA | |
947 | * operations that might use the SWIOTLB bounce buffers. It will | |
948 | * mark the bounce buffers as decrypted so that their usage will | |
949 | * not cause "plain-text" data to be decrypted when accessed. | |
950 | */ | |
951 | mem_encrypt_init(); | |
952 | ||
1da177e4 LT |
953 | #ifdef CONFIG_BLK_DEV_INITRD |
954 | if (initrd_start && !initrd_below_start_ok && | |
bd673c7c | 955 | page_to_pfn(virt_to_page((void *)initrd_start)) < min_low_pfn) { |
ea676e84 | 956 | pr_crit("initrd overwritten (0x%08lx < 0x%08lx) - disabling it.\n", |
bd673c7c GU |
957 | page_to_pfn(virt_to_page((void *)initrd_start)), |
958 | min_low_pfn); | |
1da177e4 LT |
959 | initrd_start = 0; |
960 | } | |
961 | #endif | |
e7c8d5c9 | 962 | setup_per_cpu_pageset(); |
1da177e4 | 963 | numa_policy_init(); |
9c71206d | 964 | acpi_early_init(); |
1da177e4 LT |
965 | if (late_time_init) |
966 | late_time_init(); | |
857baa87 | 967 | sched_clock_init(); |
1da177e4 | 968 | calibrate_delay(); |
95846ecf | 969 | pid_idr_init(); |
1da177e4 | 970 | anon_vma_init(); |
11520e5e | 971 | #ifdef CONFIG_X86 |
83e68189 | 972 | if (efi_enabled(EFI_RUNTIME_SERVICES)) |
11520e5e LT |
973 | efi_enter_virtual_mode(); |
974 | #endif | |
b235beea | 975 | thread_stack_cache_init(); |
d84f4f99 | 976 | cred_init(); |
ff691f6e | 977 | fork_init(); |
1da177e4 | 978 | proc_caches_init(); |
3ea056c5 | 979 | uts_ns_init(); |
1da177e4 | 980 | buffer_init(); |
1da177e4 LT |
981 | key_init(); |
982 | security_init(); | |
0b4b3827 | 983 | dbg_late_init(); |
4248b0da | 984 | vfs_caches_init(); |
62906027 | 985 | pagecache_init(); |
1da177e4 | 986 | signals_init(); |
09652320 | 987 | seq_file_init(); |
1da177e4 | 988 | proc_root_init(); |
e149ed2b | 989 | nsfs_init(); |
1da177e4 | 990 | cpuset_init(); |
695df213 | 991 | cgroup_init(); |
c757249a | 992 | taskstats_init_early(); |
ca74e92b | 993 | delayacct_init(); |
1da177e4 | 994 | |
4fc19708 | 995 | poking_init(); |
1da177e4 LT |
996 | check_bugs(); |
997 | ||
b064a8fa | 998 | acpi_subsystem_init(); |
e7ff3a47 | 999 | arch_post_acpi_subsys_init(); |
6ae6996a | 1000 | sfi_init_late(); |
1da177e4 LT |
1001 | |
1002 | /* Do the rest non-__init'ed, we're now alive */ | |
53c99bd6 | 1003 | arch_call_rest_init(); |
1da177e4 LT |
1004 | } |
1005 | ||
b99b87f7 PO |
1006 | /* Call all constructor functions linked into the kernel. */ |
1007 | static void __init do_ctors(void) | |
1008 | { | |
1009 | #ifdef CONFIG_CONSTRUCTORS | |
196a15b4 | 1010 | ctor_fn_t *fn = (ctor_fn_t *) __ctors_start; |
b99b87f7 | 1011 | |
196a15b4 HS |
1012 | for (; fn < (ctor_fn_t *) __ctors_end; fn++) |
1013 | (*fn)(); | |
b99b87f7 PO |
1014 | #endif |
1015 | } | |
1016 | ||
7b0b73d7 PB |
1017 | #ifdef CONFIG_KALLSYMS |
1018 | struct blacklist_entry { | |
1019 | struct list_head next; | |
1020 | char *buf; | |
1021 | }; | |
1022 | ||
1023 | static __initdata_or_module LIST_HEAD(blacklisted_initcalls); | |
1024 | ||
1025 | static int __init initcall_blacklist(char *str) | |
1026 | { | |
1027 | char *str_entry; | |
1028 | struct blacklist_entry *entry; | |
1029 | ||
1030 | /* str argument is a comma-separated list of functions */ | |
1031 | do { | |
1032 | str_entry = strsep(&str, ","); | |
1033 | if (str_entry) { | |
1034 | pr_debug("blacklisting initcall %s\n", str_entry); | |
7e1c4e27 MR |
1035 | entry = memblock_alloc(sizeof(*entry), |
1036 | SMP_CACHE_BYTES); | |
f5c7310a MR |
1037 | if (!entry) |
1038 | panic("%s: Failed to allocate %zu bytes\n", | |
1039 | __func__, sizeof(*entry)); | |
7e1c4e27 MR |
1040 | entry->buf = memblock_alloc(strlen(str_entry) + 1, |
1041 | SMP_CACHE_BYTES); | |
f5c7310a MR |
1042 | if (!entry->buf) |
1043 | panic("%s: Failed to allocate %zu bytes\n", | |
1044 | __func__, strlen(str_entry) + 1); | |
7b0b73d7 PB |
1045 | strcpy(entry->buf, str_entry); |
1046 | list_add(&entry->next, &blacklisted_initcalls); | |
1047 | } | |
1048 | } while (str_entry); | |
1049 | ||
1050 | return 0; | |
1051 | } | |
1052 | ||
1053 | static bool __init_or_module initcall_blacklisted(initcall_t fn) | |
1054 | { | |
7b0b73d7 | 1055 | struct blacklist_entry *entry; |
c8cdd2be | 1056 | char fn_name[KSYM_SYMBOL_LEN]; |
0fd5ed8d | 1057 | unsigned long addr; |
7b0b73d7 | 1058 | |
c8cdd2be | 1059 | if (list_empty(&blacklisted_initcalls)) |
7b0b73d7 PB |
1060 | return false; |
1061 | ||
0fd5ed8d RV |
1062 | addr = (unsigned long) dereference_function_descriptor(fn); |
1063 | sprint_symbol_no_offset(fn_name, addr); | |
c8cdd2be | 1064 | |
841c06d7 PB |
1065 | /* |
1066 | * fn will be "function_name [module_name]" where [module_name] is not | |
1067 | * displayed for built-in init functions. Strip off the [module_name]. | |
1068 | */ | |
1069 | strreplace(fn_name, ' ', '\0'); | |
1070 | ||
e6fd1fb3 | 1071 | list_for_each_entry(entry, &blacklisted_initcalls, next) { |
7b0b73d7 PB |
1072 | if (!strcmp(fn_name, entry->buf)) { |
1073 | pr_debug("initcall %s blacklisted\n", fn_name); | |
7b0b73d7 PB |
1074 | return true; |
1075 | } | |
1076 | } | |
1077 | ||
7b0b73d7 PB |
1078 | return false; |
1079 | } | |
1080 | #else | |
1081 | static int __init initcall_blacklist(char *str) | |
1082 | { | |
1083 | pr_warn("initcall_blacklist requires CONFIG_KALLSYMS\n"); | |
1084 | return 0; | |
1085 | } | |
1086 | ||
1087 | static bool __init_or_module initcall_blacklisted(initcall_t fn) | |
1088 | { | |
1089 | return false; | |
1090 | } | |
1091 | #endif | |
1092 | __setup("initcall_blacklist=", initcall_blacklist); | |
1093 | ||
4e37958d SRV |
1094 | static __init_or_module void |
1095 | trace_initcall_start_cb(void *data, initcall_t fn) | |
1da177e4 | 1096 | { |
4e37958d | 1097 | ktime_t *calltime = (ktime_t *)data; |
1da177e4 | 1098 | |
d75f773c | 1099 | printk(KERN_DEBUG "calling %pS @ %i\n", fn, task_pid_nr(current)); |
4e37958d SRV |
1100 | *calltime = ktime_get(); |
1101 | } | |
1102 | ||
1103 | static __init_or_module void | |
1104 | trace_initcall_finish_cb(void *data, initcall_t fn, int ret) | |
1105 | { | |
1106 | ktime_t *calltime = (ktime_t *)data; | |
1107 | ktime_t delta, rettime; | |
1108 | unsigned long long duration; | |
1109 | ||
22c5c03b | 1110 | rettime = ktime_get(); |
4e37958d | 1111 | delta = ktime_sub(rettime, *calltime); |
22c5c03b | 1112 | duration = (unsigned long long) ktime_to_ns(delta) >> 10; |
d75f773c | 1113 | printk(KERN_DEBUG "initcall %pS returned %d after %lld usecs\n", |
ea676e84 | 1114 | fn, ret, duration); |
4e37958d | 1115 | } |
1da177e4 | 1116 | |
4e37958d SRV |
1117 | static ktime_t initcall_calltime; |
1118 | ||
b0dc52f1 | 1119 | #ifdef TRACEPOINTS_ENABLED |
4e37958d SRV |
1120 | static void __init initcall_debug_enable(void) |
1121 | { | |
1122 | int ret; | |
1123 | ||
1124 | ret = register_trace_initcall_start(trace_initcall_start_cb, | |
1125 | &initcall_calltime); | |
1126 | ret |= register_trace_initcall_finish(trace_initcall_finish_cb, | |
1127 | &initcall_calltime); | |
1128 | WARN(ret, "Failed to register initcall tracepoints\n"); | |
22c5c03b | 1129 | } |
b0dc52f1 SRV |
1130 | # define do_trace_initcall_start trace_initcall_start |
1131 | # define do_trace_initcall_finish trace_initcall_finish | |
1132 | #else | |
1133 | static inline void do_trace_initcall_start(initcall_t fn) | |
1134 | { | |
1135 | if (!initcall_debug) | |
1136 | return; | |
1137 | trace_initcall_start_cb(&initcall_calltime, fn); | |
1138 | } | |
1139 | static inline void do_trace_initcall_finish(initcall_t fn, int ret) | |
1140 | { | |
1141 | if (!initcall_debug) | |
1142 | return; | |
1143 | trace_initcall_finish_cb(&initcall_calltime, fn, ret); | |
1144 | } | |
1145 | #endif /* !TRACEPOINTS_ENABLED */ | |
22c5c03b | 1146 | |
e4461271 | 1147 | int __init_or_module do_one_initcall(initcall_t fn) |
22c5c03b KW |
1148 | { |
1149 | int count = preempt_count(); | |
ff1c8fac | 1150 | char msgbuf[64]; |
4e37958d | 1151 | int ret; |
22c5c03b | 1152 | |
7b0b73d7 PB |
1153 | if (initcall_blacklisted(fn)) |
1154 | return -EPERM; | |
1155 | ||
b0dc52f1 | 1156 | do_trace_initcall_start(fn); |
4e37958d | 1157 | ret = fn(); |
b0dc52f1 | 1158 | do_trace_initcall_finish(fn, ret); |
8f0c45cd | 1159 | |
e0df154f | 1160 | msgbuf[0] = 0; |
e662e1cf | 1161 | |
e0df154f | 1162 | if (preempt_count() != count) { |
bf5d770b | 1163 | sprintf(msgbuf, "preemption imbalance "); |
4a2b4b22 | 1164 | preempt_count_set(count); |
1da177e4 | 1165 | } |
e0df154f | 1166 | if (irqs_disabled()) { |
a76bfd0d | 1167 | strlcat(msgbuf, "disabled interrupts ", sizeof(msgbuf)); |
e0df154f LT |
1168 | local_irq_enable(); |
1169 | } | |
d75f773c | 1170 | WARN(msgbuf[0], "initcall %pS returned with %s\n", fn, msgbuf); |
59f9415f | 1171 | |
38addce8 | 1172 | add_latent_entropy(); |
30dbb20e | 1173 | return ret; |
e0df154f LT |
1174 | } |
1175 | ||
1176 | ||
1b1eeca7 AB |
1177 | extern initcall_entry_t __initcall_start[]; |
1178 | extern initcall_entry_t __initcall0_start[]; | |
1179 | extern initcall_entry_t __initcall1_start[]; | |
1180 | extern initcall_entry_t __initcall2_start[]; | |
1181 | extern initcall_entry_t __initcall3_start[]; | |
1182 | extern initcall_entry_t __initcall4_start[]; | |
1183 | extern initcall_entry_t __initcall5_start[]; | |
1184 | extern initcall_entry_t __initcall6_start[]; | |
1185 | extern initcall_entry_t __initcall7_start[]; | |
1186 | extern initcall_entry_t __initcall_end[]; | |
1187 | ||
1188 | static initcall_entry_t *initcall_levels[] __initdata = { | |
026cee00 PM |
1189 | __initcall0_start, |
1190 | __initcall1_start, | |
1191 | __initcall2_start, | |
1192 | __initcall3_start, | |
1193 | __initcall4_start, | |
1194 | __initcall5_start, | |
1195 | __initcall6_start, | |
1196 | __initcall7_start, | |
1197 | __initcall_end, | |
1198 | }; | |
1199 | ||
96263d28 | 1200 | /* Keep these in sync with initcalls in include/linux/init.h */ |
7c8f7193 | 1201 | static const char *initcall_level_names[] __initdata = { |
a6fb6012 | 1202 | "pure", |
9fb48c74 JC |
1203 | "core", |
1204 | "postcore", | |
1205 | "arch", | |
1206 | "subsys", | |
1207 | "fs", | |
1208 | "device", | |
1209 | "late", | |
026cee00 PM |
1210 | }; |
1211 | ||
7e2762e1 AS |
1212 | static int __init ignore_unknown_bootoption(char *param, char *val, |
1213 | const char *unused, void *arg) | |
1214 | { | |
1215 | return 0; | |
1216 | } | |
1217 | ||
0068c92a | 1218 | static void __init do_initcall_level(int level, char *command_line) |
e0df154f | 1219 | { |
1b1eeca7 | 1220 | initcall_entry_t *fn; |
e0df154f | 1221 | |
026cee00 | 1222 | parse_args(initcall_level_names[level], |
0068c92a | 1223 | command_line, __start___param, |
026cee00 PM |
1224 | __stop___param - __start___param, |
1225 | level, level, | |
7e2762e1 | 1226 | NULL, ignore_unknown_bootoption); |
026cee00 | 1227 | |
4ee7c60d | 1228 | trace_initcall_level(initcall_level_names[level]); |
026cee00 | 1229 | for (fn = initcall_levels[level]; fn < initcall_levels[level+1]; fn++) |
1b1eeca7 | 1230 | do_one_initcall(initcall_from_entry(fn)); |
1da177e4 LT |
1231 | } |
1232 | ||
026cee00 PM |
1233 | static void __init do_initcalls(void) |
1234 | { | |
1235 | int level; | |
0068c92a MH |
1236 | size_t len = strlen(saved_command_line) + 1; |
1237 | char *command_line; | |
1238 | ||
1239 | command_line = kzalloc(len, GFP_KERNEL); | |
1240 | if (!command_line) | |
1241 | panic("%s: Failed to allocate %zu bytes\n", __func__, len); | |
1242 | ||
1243 | for (level = 0; level < ARRAY_SIZE(initcall_levels) - 1; level++) { | |
1244 | /* Parser modifies command_line, restore it each time */ | |
1245 | strcpy(command_line, saved_command_line); | |
1246 | do_initcall_level(level, command_line); | |
1247 | } | |
026cee00 | 1248 | |
0068c92a | 1249 | kfree(command_line); |
026cee00 PM |
1250 | } |
1251 | ||
1da177e4 LT |
1252 | /* |
1253 | * Ok, the machine is now initialized. None of the devices | |
1254 | * have been touched yet, but the CPU subsystem is up and | |
1255 | * running, and memory and process management works. | |
1256 | * | |
1257 | * Now we can finally start doing some real work.. | |
1258 | */ | |
1259 | static void __init do_basic_setup(void) | |
1260 | { | |
759ee091 | 1261 | cpuset_init_smp(); |
1da177e4 | 1262 | driver_init(); |
b04c3afb | 1263 | init_irq_proc(); |
b99b87f7 | 1264 | do_ctors(); |
d5767c53 | 1265 | usermodehelper_enable(); |
b0f84374 | 1266 | do_initcalls(); |
1da177e4 LT |
1267 | } |
1268 | ||
7babe8db | 1269 | static void __init do_pre_smp_initcalls(void) |
c2147a50 | 1270 | { |
1b1eeca7 | 1271 | initcall_entry_t *fn; |
c2147a50 | 1272 | |
4ee7c60d | 1273 | trace_initcall_level("early"); |
026cee00 | 1274 | for (fn = __initcall_start; fn < __initcall0_start; fn++) |
1b1eeca7 | 1275 | do_one_initcall(initcall_from_entry(fn)); |
c2147a50 EGM |
1276 | } |
1277 | ||
a74fb73c | 1278 | static int run_init_process(const char *init_filename) |
1da177e4 | 1279 | { |
b88c50ac AS |
1280 | const char *const *p; |
1281 | ||
1da177e4 | 1282 | argv_init[0] = init_filename; |
3f5c15d8 | 1283 | pr_info("Run %s as init process\n", init_filename); |
b88c50ac AS |
1284 | pr_debug(" with arguments:\n"); |
1285 | for (p = argv_init; *p; p++) | |
1286 | pr_debug(" %s\n", *p); | |
1287 | pr_debug(" with environment:\n"); | |
1288 | for (p = envp_init; *p; p++) | |
1289 | pr_debug(" %s\n", *p); | |
c4ad8f98 | 1290 | return do_execve(getname_kernel(init_filename), |
ae903caa AV |
1291 | (const char __user *const __user *)argv_init, |
1292 | (const char __user *const __user *)envp_init); | |
1da177e4 LT |
1293 | } |
1294 | ||
ba24762b MO |
1295 | static int try_to_run_init_process(const char *init_filename) |
1296 | { | |
1297 | int ret; | |
1298 | ||
1299 | ret = run_init_process(init_filename); | |
1300 | ||
1301 | if (ret && ret != -ENOENT) { | |
1302 | pr_err("Starting init: %s exists but couldn't execute it (error %d)\n", | |
1303 | init_filename, ret); | |
1304 | } | |
1305 | ||
1306 | return ret; | |
1307 | } | |
1308 | ||
f80b0c90 | 1309 | static noinline void __init kernel_init_freeable(void); |
d6b21238 | 1310 | |
0f5bf6d0 | 1311 | #if defined(CONFIG_STRICT_KERNEL_RWX) || defined(CONFIG_STRICT_MODULE_RWX) |
39290b38 | 1312 | bool rodata_enabled __ro_after_init = true; |
d2aa1aca KC |
1313 | static int __init set_debug_rodata(char *str) |
1314 | { | |
1315 | return strtobool(str, &rodata_enabled); | |
1316 | } | |
1317 | __setup("rodata=", set_debug_rodata); | |
39290b38 | 1318 | #endif |
d2aa1aca | 1319 | |
0f5bf6d0 | 1320 | #ifdef CONFIG_STRICT_KERNEL_RWX |
d2aa1aca KC |
1321 | static void mark_readonly(void) |
1322 | { | |
2959a5f7 | 1323 | if (rodata_enabled) { |
ae646f0b | 1324 | /* |
ba180314 PM |
1325 | * load_module() results in W+X mappings, which are cleaned |
1326 | * up with call_rcu(). Let's make sure that queued work is | |
ae646f0b JH |
1327 | * flushed so that we don't hit false positives looking for |
1328 | * insecure pages which are W+X. | |
1329 | */ | |
ba180314 | 1330 | rcu_barrier(); |
d2aa1aca | 1331 | mark_rodata_ro(); |
2959a5f7 JP |
1332 | rodata_test(); |
1333 | } else | |
d2aa1aca KC |
1334 | pr_info("Kernel memory protection disabled.\n"); |
1335 | } | |
f596ded1 CL |
1336 | #elif defined(CONFIG_ARCH_HAS_STRICT_KERNEL_RWX) |
1337 | static inline void mark_readonly(void) | |
1338 | { | |
1339 | pr_warn("Kernel memory protection not selected by kernel config.\n"); | |
1340 | } | |
d2aa1aca KC |
1341 | #else |
1342 | static inline void mark_readonly(void) | |
1343 | { | |
1344 | pr_warn("This architecture does not have kernel memory protection.\n"); | |
1345 | } | |
1346 | #endif | |
1347 | ||
997aef68 MR |
1348 | void __weak free_initmem(void) |
1349 | { | |
f4039999 | 1350 | free_initmem_default(POISON_FREE_INITMEM); |
997aef68 MR |
1351 | } |
1352 | ||
d6b21238 | 1353 | static int __ref kernel_init(void *unused) |
ee5bfa64 | 1354 | { |
ba24762b MO |
1355 | int ret; |
1356 | ||
d6b21238 | 1357 | kernel_init_freeable(); |
22a9d645 AV |
1358 | /* need to finish all async __init code before freeing the memory */ |
1359 | async_synchronize_full(); | |
b80f0f6c | 1360 | ftrace_free_init_mem(); |
ee5bfa64 | 1361 | free_initmem(); |
d2aa1aca | 1362 | mark_readonly(); |
b976690f JR |
1363 | |
1364 | /* | |
1365 | * Kernel mappings are now finalized - update the userspace page-table | |
1366 | * to finalize PTI. | |
1367 | */ | |
1368 | pti_finalize(); | |
1369 | ||
ee5bfa64 VG |
1370 | system_state = SYSTEM_RUNNING; |
1371 | numa_default_policy(); | |
1372 | ||
967dcb8f PM |
1373 | rcu_end_inkernel_boot(); |
1374 | ||
ee5bfa64 | 1375 | if (ramdisk_execute_command) { |
ba24762b MO |
1376 | ret = run_init_process(ramdisk_execute_command); |
1377 | if (!ret) | |
a74fb73c | 1378 | return 0; |
ba24762b MO |
1379 | pr_err("Failed to execute %s (error %d)\n", |
1380 | ramdisk_execute_command, ret); | |
ee5bfa64 VG |
1381 | } |
1382 | ||
1383 | /* | |
1384 | * We try each of these until one succeeds. | |
1385 | * | |
1386 | * The Bourne shell can be used instead of init if we are | |
1387 | * trying to recover a really broken machine. | |
1388 | */ | |
1389 | if (execute_command) { | |
ba24762b MO |
1390 | ret = run_init_process(execute_command); |
1391 | if (!ret) | |
a74fb73c | 1392 | return 0; |
6ef4536e AL |
1393 | panic("Requested init %s failed (error %d).", |
1394 | execute_command, ret); | |
ee5bfa64 | 1395 | } |
ba24762b MO |
1396 | if (!try_to_run_init_process("/sbin/init") || |
1397 | !try_to_run_init_process("/etc/init") || | |
1398 | !try_to_run_init_process("/bin/init") || | |
1399 | !try_to_run_init_process("/bin/sh")) | |
a74fb73c | 1400 | return 0; |
ee5bfa64 | 1401 | |
ba24762b | 1402 | panic("No working init found. Try passing init= option to kernel. " |
8c27ceff | 1403 | "See Linux Documentation/admin-guide/init.rst for guidance."); |
ee5bfa64 VG |
1404 | } |
1405 | ||
b49a733d DB |
1406 | void console_on_rootfs(void) |
1407 | { | |
74f1a299 DB |
1408 | /* Open the /dev/console as stdin, this should never fail */ |
1409 | if (ksys_open((const char __user *) "/dev/console", O_RDWR, 0) < 0) | |
1410 | pr_err("Warning: unable to open an initial console.\n"); | |
b49a733d | 1411 | |
74f1a299 DB |
1412 | /* create stdout/stderr */ |
1413 | (void) ksys_dup(0); | |
1414 | (void) ksys_dup(0); | |
b49a733d DB |
1415 | } |
1416 | ||
f80b0c90 | 1417 | static noinline void __init kernel_init_freeable(void) |
1da177e4 | 1418 | { |
b433c3d4 PZ |
1419 | /* |
1420 | * Wait until kthreadd is all set-up. | |
1421 | */ | |
1422 | wait_for_completion(&kthreadd_done); | |
31a67102 LT |
1423 | |
1424 | /* Now the scheduler is fully set up and can do blocking allocations */ | |
1425 | gfp_allowed_mask = __GFP_BITS_MASK; | |
1426 | ||
58568d2a MX |
1427 | /* |
1428 | * init can allocate pages on any node | |
1429 | */ | |
3c466d46 | 1430 | set_mems_allowed(node_states[N_MEMORY]); |
1da177e4 | 1431 | |
9ec52099 CLG |
1432 | cad_pid = task_pid(current); |
1433 | ||
ca74a6f8 | 1434 | smp_prepare_cpus(setup_max_cpus); |
1da177e4 | 1435 | |
3347fa09 TH |
1436 | workqueue_init(); |
1437 | ||
597b7305 MH |
1438 | init_mm_internals(); |
1439 | ||
1da177e4 | 1440 | do_pre_smp_initcalls(); |
004417a6 | 1441 | lockup_detector_init(); |
1da177e4 | 1442 | |
1da177e4 LT |
1443 | smp_init(); |
1444 | sched_init_smp(); | |
1445 | ||
0e1cc95b | 1446 | page_alloc_init_late(); |
2f1ee091 QC |
1447 | /* Initialize page ext after all struct pages are initialized. */ |
1448 | page_ext_init(); | |
0e1cc95b | 1449 | |
1da177e4 LT |
1450 | do_basic_setup(); |
1451 | ||
b49a733d | 1452 | console_on_rootfs(); |
2bd3a997 | 1453 | |
1da177e4 LT |
1454 | /* |
1455 | * check if there is an early userspace init. If yes, let it do all | |
1456 | * the work | |
1457 | */ | |
ffdfc409 OJ |
1458 | |
1459 | if (!ramdisk_execute_command) | |
1460 | ramdisk_execute_command = "/init"; | |
1461 | ||
cbfe20f5 DB |
1462 | if (ksys_access((const char __user *) |
1463 | ramdisk_execute_command, 0) != 0) { | |
ffdfc409 | 1464 | ramdisk_execute_command = NULL; |
1da177e4 | 1465 | prepare_namespace(); |
ffdfc409 | 1466 | } |
1da177e4 LT |
1467 | |
1468 | /* | |
1469 | * Ok, we have completed the initial bootup, and | |
1470 | * we're essentially up and running. Get rid of the | |
1471 | * initmem segments and start the user-mode stuff.. | |
c9cd2ce2 DK |
1472 | * |
1473 | * rootfs is available now, try loading the public keys | |
1474 | * and default modules | |
1da177e4 | 1475 | */ |
bb813f4c | 1476 | |
c9cd2ce2 | 1477 | integrity_load_keys(); |
1da177e4 | 1478 | } |