blob: a34938294ecadfcdc6b289a5a55dc691a0d6e359 [file] [log] [blame]
Tom Rini83d290c2018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0+
Simon Glass30354972014-04-10 20:01:29 -06002/*
3 * (C) Copyright 2000
4 * Wolfgang Denk, DENX Software Engineering, wd@denx.de.
5 *
6 * Add to readline cmdline-editing by
7 * (C) Copyright 2005
8 * JinHua Luo, GuangDong Linux Center, <luo.jinhua@gd-linux.com>
Simon Glass30354972014-04-10 20:01:29 -06009 */
10
Evgeny Bachinin26f923c2023-03-20 11:23:11 +030011#define pr_fmt(fmt) "cli: %s: " fmt, __func__
12
Simon Glass30354972014-04-10 20:01:29 -060013#include <common.h>
Simon Glass52f24232020-05-10 11:40:00 -060014#include <bootstage.h>
Simon Glass30354972014-04-10 20:01:29 -060015#include <cli.h>
16#include <cli_hush.h>
Simon Glass288b29e2019-11-14 12:57:43 -070017#include <command.h>
Simon Glass24b852a2015-11-08 23:47:45 -070018#include <console.h>
Simon Glass7b51b572019-08-01 09:46:52 -060019#include <env.h>
Simon Glassaffb2152014-04-10 20:01:35 -060020#include <fdtdec.h>
Simon Glassdb41d652019-12-28 10:45:07 -070021#include <hang.h>
Simon Glass30354972014-04-10 20:01:29 -060022#include <malloc.h>
Simon Glass401d1c42020-10-30 21:38:53 -060023#include <asm/global_data.h>
Simon Glass7de8bd02021-08-07 07:24:01 -060024#include <dm/ofnode.h>
Evgeny Bachinin26f923c2023-03-20 11:23:11 +030025#include <linux/errno.h>
Simon Glassaffb2152014-04-10 20:01:35 -060026
Simon Glassf8bb6962016-03-19 02:18:38 -060027#ifdef CONFIG_CMDLINE
Francis Laniel3ea3c572023-12-22 22:02:35 +010028
29static inline bool use_hush_old(void)
30{
31 return IS_ENABLED(CONFIG_HUSH_SELECTABLE) ?
32 gd->flags & GD_FLG_HUSH_OLD_PARSER :
33 IS_ENABLED(CONFIG_HUSH_OLD_PARSER);
34}
35
Simon Glass30354972014-04-10 20:01:29 -060036/*
37 * Run a command using the selected parser.
38 *
39 * @param cmd Command to run
40 * @param flag Execution flags (CMD_FLAG_...)
Heinrich Schuchardt185f8122022-01-19 18:05:50 +010041 * Return: 0 on success, or != 0 on error.
Simon Glass30354972014-04-10 20:01:29 -060042 */
43int run_command(const char *cmd, int flag)
44{
Simon Glassb84d23d2023-02-05 15:40:06 -070045#if !IS_ENABLED(CONFIG_HUSH_PARSER)
Simon Glass30354972014-04-10 20:01:29 -060046 /*
47 * cli_run_command can return 0 or 1 for success, so clean up
48 * its result.
49 */
50 if (cli_simple_run_command(cmd, flag) == -1)
51 return 1;
52
53 return 0;
Francis Laniel3ea3c572023-12-22 22:02:35 +010054#else
55 if (use_hush_old()) {
56 int hush_flags = FLAG_PARSE_SEMICOLON | FLAG_EXIT_FROM_LOOP;
Simon Glass87b63982014-10-07 13:59:43 -060057
Francis Laniel3ea3c572023-12-22 22:02:35 +010058 if (flag & CMD_FLAG_ENV)
59 hush_flags |= FLAG_CONT_ON_NEWLINE;
60 return parse_string_outer(cmd, hush_flags);
61 }
62 /*
63 * Possible values for flags are the following:
64 * FLAG_EXIT_FROM_LOOP: This flags ensures we exit from loop in
65 * parse_and_run_stream() after first iteration while normal
66 * behavior, * i.e. when called from cli_loop(), is to loop
67 * infinitely.
68 * FLAG_PARSE_SEMICOLON: modern Hush parses ';' and does not stop
69 * first time it sees one. So, I think we do not need this flag.
70 * FLAG_REPARSING: For the moment, I do not understand the goal
71 * of this flag.
72 * FLAG_CONT_ON_NEWLINE: This flag seems to be used to continue
73 * parsing even when reading '\n' when coming from
74 * run_command(). In this case, modern Hush reads until it finds
75 * '\0'. So, I think we do not need this flag.
76 */
77 return parse_string_outer_modern(cmd, FLAG_EXIT_FROM_LOOP);
Simon Glass30354972014-04-10 20:01:29 -060078#endif
79}
80
Thomas Betker1d43bfd2014-06-05 20:07:57 +020081/*
82 * Run a command using the selected parser, and check if it is repeatable.
83 *
84 * @param cmd Command to run
85 * @param flag Execution flags (CMD_FLAG_...)
Heinrich Schuchardt185f8122022-01-19 18:05:50 +010086 * Return: 0 (not repeatable) or 1 (repeatable) on success, -1 on error.
Thomas Betker1d43bfd2014-06-05 20:07:57 +020087 */
88int run_command_repeatable(const char *cmd, int flag)
89{
Masahiro Yamadaf1f9d4f2016-06-21 02:11:19 +090090#ifndef CONFIG_HUSH_PARSER
Thomas Betker1d43bfd2014-06-05 20:07:57 +020091 return cli_simple_run_command(cmd, flag);
92#else
Francis Laniel3ea3c572023-12-22 22:02:35 +010093 int ret;
94
95 if (use_hush_old()) {
96 ret = parse_string_outer(cmd,
97 FLAG_PARSE_SEMICOLON
98 | FLAG_EXIT_FROM_LOOP);
99 } else {
100 ret = parse_string_outer_modern(cmd,
101 FLAG_PARSE_SEMICOLON
102 | FLAG_EXIT_FROM_LOOP);
103 }
104
Thomas Betker1d43bfd2014-06-05 20:07:57 +0200105 /*
106 * parse_string_outer() returns 1 for failure, so clean up
107 * its result.
108 */
Francis Laniel3ea3c572023-12-22 22:02:35 +0100109 if (ret)
Thomas Betker1d43bfd2014-06-05 20:07:57 +0200110 return -1;
111
112 return 0;
113#endif
114}
Sean Anderson19464f42020-01-10 12:32:19 -0500115#else
116__weak int board_run_command(const char *cmdline)
117{
118 printf("## Commands are disabled. Please enable CONFIG_CMDLINE.\n");
119
120 return 1;
121}
Simon Glassf8bb6962016-03-19 02:18:38 -0600122#endif /* CONFIG_CMDLINE */
Thomas Betker1d43bfd2014-06-05 20:07:57 +0200123
Simon Glass30354972014-04-10 20:01:29 -0600124int run_command_list(const char *cmd, int len, int flag)
125{
126 int need_buff = 1;
127 char *buff = (char *)cmd; /* cast away const */
128 int rcode = 0;
129
130 if (len == -1) {
131 len = strlen(cmd);
Masahiro Yamadaf1f9d4f2016-06-21 02:11:19 +0900132#ifdef CONFIG_HUSH_PARSER
Simon Glass30354972014-04-10 20:01:29 -0600133 /* hush will never change our string */
134 need_buff = 0;
135#else
136 /* the built-in parser will change our string if it sees \n */
137 need_buff = strchr(cmd, '\n') != NULL;
138#endif
139 }
140 if (need_buff) {
141 buff = malloc(len + 1);
142 if (!buff)
143 return 1;
144 memcpy(buff, cmd, len);
145 buff[len] = '\0';
146 }
Masahiro Yamadaf1f9d4f2016-06-21 02:11:19 +0900147#ifdef CONFIG_HUSH_PARSER
Francis Laniel3ea3c572023-12-22 22:02:35 +0100148 if (use_hush_old()) {
149 rcode = parse_string_outer(buff, FLAG_PARSE_SEMICOLON);
150 } else {
151 rcode = parse_string_outer_modern(buff, FLAG_PARSE_SEMICOLON);
152 }
Simon Glass30354972014-04-10 20:01:29 -0600153#else
154 /*
155 * This function will overwrite any \n it sees with a \0, which
156 * is why it can't work with a const char *. Here we are making
157 * using of internal knowledge of this function, to avoid always
158 * doing a malloc() which is actually required only in a case that
159 * is pretty rare.
160 */
Simon Glassf8bb6962016-03-19 02:18:38 -0600161#ifdef CONFIG_CMDLINE
Simon Glass30354972014-04-10 20:01:29 -0600162 rcode = cli_simple_run_command_list(buff, flag);
Simon Glassf8bb6962016-03-19 02:18:38 -0600163#else
164 rcode = board_run_command(buff);
165#endif
Peng Fan09a78862015-12-22 17:14:13 +0800166#endif
Simon Glass30354972014-04-10 20:01:29 -0600167 if (need_buff)
168 free(buff);
Simon Glass30354972014-04-10 20:01:29 -0600169
170 return rcode;
171}
172
Simon Glass74724482022-07-13 06:06:59 -0600173int run_commandf(const char *fmt, ...)
174{
175 va_list args;
Evgeny Bachinin26f923c2023-03-20 11:23:11 +0300176 int nbytes;
Simon Glass74724482022-07-13 06:06:59 -0600177
178 va_start(args, fmt);
Evgeny Bachinin26f923c2023-03-20 11:23:11 +0300179 /*
180 * Limit the console_buffer space being used to CONFIG_SYS_CBSIZE,
181 * because its last byte is used to fit the replacement of \0 by \n\0
182 * in underlying hush parser
183 */
184 nbytes = vsnprintf(console_buffer, CONFIG_SYS_CBSIZE, fmt, args);
Simon Glass74724482022-07-13 06:06:59 -0600185 va_end(args);
186
Evgeny Bachinin26f923c2023-03-20 11:23:11 +0300187 if (nbytes < 0) {
188 pr_debug("I/O internal error occurred.\n");
189 return -EIO;
190 } else if (nbytes >= CONFIG_SYS_CBSIZE) {
191 pr_debug("'fmt' size:%d exceeds the limit(%d)\n",
192 nbytes, CONFIG_SYS_CBSIZE);
193 return -ENOSPC;
194 }
195 return run_command(console_buffer, 0);
Simon Glass74724482022-07-13 06:06:59 -0600196}
197
Simon Glass30354972014-04-10 20:01:29 -0600198/****************************************************************************/
199
200#if defined(CONFIG_CMD_RUN)
Simon Glass09140112020-05-10 11:40:03 -0600201int do_run(struct cmd_tbl *cmdtp, int flag, int argc, char *const argv[])
Simon Glass30354972014-04-10 20:01:29 -0600202{
Marek Vasut721307e2022-12-20 07:25:59 +0100203 int i, ret;
Simon Glass30354972014-04-10 20:01:29 -0600204
205 if (argc < 2)
206 return CMD_RET_USAGE;
207
208 for (i = 1; i < argc; ++i) {
209 char *arg;
210
Simon Glass00caae62017-08-03 12:22:12 -0600211 arg = env_get(argv[i]);
Simon Glass30354972014-04-10 20:01:29 -0600212 if (arg == NULL) {
213 printf("## Error: \"%s\" not defined\n", argv[i]);
214 return 1;
215 }
216
Marek Vasut721307e2022-12-20 07:25:59 +0100217 ret = run_command(arg, flag | CMD_FLAG_ENV);
218 if (ret)
219 return ret;
Simon Glass30354972014-04-10 20:01:29 -0600220 }
221 return 0;
222}
223#endif
Simon Glassc1bb2cd2014-04-10 20:01:34 -0600224
Masahiro Yamada0f925822015-08-12 07:31:55 +0900225#if CONFIG_IS_ENABLED(OF_CONTROL)
Simon Glassaffb2152014-04-10 20:01:35 -0600226bool cli_process_fdt(const char **cmdp)
227{
228 /* Allow the fdt to override the boot command */
Simon Glass7de8bd02021-08-07 07:24:01 -0600229 const char *env = ofnode_conf_read_str("bootcmd");
Simon Glassaffb2152014-04-10 20:01:35 -0600230 if (env)
231 *cmdp = env;
232 /*
233 * If the bootsecure option was chosen, use secure_boot_cmd().
234 * Always use 'env' in this case, since bootsecure requres that the
235 * bootcmd was specified in the FDT too.
236 */
Simon Glass7de8bd02021-08-07 07:24:01 -0600237 return ofnode_conf_read_int("bootsecure", 0);
Simon Glassaffb2152014-04-10 20:01:35 -0600238}
239
240/*
241 * Runs the given boot command securely. Specifically:
242 * - Doesn't run the command with the shell (run_command or parse_string_outer),
243 * since that's a lot of code surface that an attacker might exploit.
244 * Because of this, we don't do any argument parsing--the secure boot command
245 * has to be a full-fledged u-boot command.
246 * - Doesn't check for keypresses before booting, since that could be a
247 * security hole; also disables Ctrl-C.
248 * - Doesn't allow the command to return.
249 *
250 * Upon any failures, this function will drop into an infinite loop after
251 * printing the error message to console.
252 */
253void cli_secure_boot_cmd(const char *cmd)
254{
Simon Glassf8bb6962016-03-19 02:18:38 -0600255#ifdef CONFIG_CMDLINE
Simon Glass09140112020-05-10 11:40:03 -0600256 struct cmd_tbl *cmdtp;
Simon Glassf8bb6962016-03-19 02:18:38 -0600257#endif
Simon Glassaffb2152014-04-10 20:01:35 -0600258 int rc;
259
260 if (!cmd) {
261 printf("## Error: Secure boot command not specified\n");
262 goto err;
263 }
264
265 /* Disable Ctrl-C just in case some command is used that checks it. */
266 disable_ctrlc(1);
267
268 /* Find the command directly. */
Simon Glassf8bb6962016-03-19 02:18:38 -0600269#ifdef CONFIG_CMDLINE
Simon Glassaffb2152014-04-10 20:01:35 -0600270 cmdtp = find_cmd(cmd);
271 if (!cmdtp) {
272 printf("## Error: \"%s\" not defined\n", cmd);
273 goto err;
274 }
275
276 /* Run the command, forcing no flags and faking argc and argv. */
277 rc = (cmdtp->cmd)(cmdtp, 0, 1, (char **)&cmd);
278
Simon Glassf8bb6962016-03-19 02:18:38 -0600279#else
280 rc = board_run_command(cmd);
281#endif
282
Simon Glassaffb2152014-04-10 20:01:35 -0600283 /* Shouldn't ever return from boot command. */
284 printf("## Error: \"%s\" returned (code %d)\n", cmd, rc);
285
286err:
287 /*
288 * Not a whole lot to do here. Rebooting won't help much, since we'll
289 * just end up right back here. Just loop.
290 */
291 hang();
292}
Masahiro Yamada0f925822015-08-12 07:31:55 +0900293#endif /* CONFIG_IS_ENABLED(OF_CONTROL) */
Simon Glassaffb2152014-04-10 20:01:35 -0600294
Simon Glassc1bb2cd2014-04-10 20:01:34 -0600295void cli_loop(void)
296{
Heiko Schocherb07cc482019-04-12 12:37:03 +0200297 bootstage_mark(BOOTSTAGE_ID_ENTER_CLI_LOOP);
Francis Laniel9a068372023-12-22 22:02:32 +0100298#if CONFIG_IS_ENABLED(HUSH_PARSER)
299 if (gd->flags & GD_FLG_HUSH_MODERN_PARSER)
300 parse_and_run_file();
301 else if (gd->flags & GD_FLG_HUSH_OLD_PARSER)
302 parse_file_outer();
303
304 printf("Problem\n");
Simon Glassc1bb2cd2014-04-10 20:01:34 -0600305 /* This point is never reached */
306 for (;;);
Stefan Roese30eae262016-04-04 16:32:15 +0200307#elif defined(CONFIG_CMDLINE)
Simon Glassc1bb2cd2014-04-10 20:01:34 -0600308 cli_simple_loop();
Simon Glassf8bb6962016-03-19 02:18:38 -0600309#else
310 printf("## U-Boot command line is disabled. Please enable CONFIG_CMDLINE\n");
Masahiro Yamadaf1f9d4f2016-06-21 02:11:19 +0900311#endif /*CONFIG_HUSH_PARSER*/
Simon Glassc1bb2cd2014-04-10 20:01:34 -0600312}
313
314void cli_init(void)
315{
Masahiro Yamadaf1f9d4f2016-06-21 02:11:19 +0900316#ifdef CONFIG_HUSH_PARSER
Francis Laniel9a068372023-12-22 22:02:32 +0100317 /* This if block is used to initialize hush parser gd flag. */
Francis Laniel6bb39f52023-12-22 22:02:31 +0100318 if (!(gd->flags & GD_FLG_HUSH_OLD_PARSER)
Francis Laniel9a068372023-12-22 22:02:32 +0100319 && !(gd->flags & GD_FLG_HUSH_MODERN_PARSER)) {
320 if (CONFIG_IS_ENABLED(HUSH_OLD_PARSER))
321 gd->flags |= GD_FLG_HUSH_OLD_PARSER;
322 else if (CONFIG_IS_ENABLED(HUSH_MODERN_PARSER))
323 gd->flags |= GD_FLG_HUSH_MODERN_PARSER;
324 }
325
326 if (gd->flags & GD_FLG_HUSH_OLD_PARSER) {
327 u_boot_hush_start();
328 } else if (gd->flags & GD_FLG_HUSH_MODERN_PARSER) {
329 u_boot_hush_start_modern();
330 } else {
331 printf("No valid hush parser to use, cli will not initialized!\n");
332 return;
333 }
Simon Glassc1bb2cd2014-04-10 20:01:34 -0600334#endif
335
336#if defined(CONFIG_HUSH_INIT_VAR)
337 hush_init_var();
338#endif
339}