blob: 1c33daf1149a85792f0cd6ceaf35de65140c0112 [file] [log] [blame]
Tom Rini10e47792018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0+
Simon Glassd6d592f2014-04-10 20:01:29 -06002/*
3 * (C) Copyright 2000
4 * Wolfgang Denk, DENX Software Engineering, wd@denx.de.
5 *
6 * Add to readline cmdline-editing by
7 * (C) Copyright 2005
8 * JinHua Luo, GuangDong Linux Center, <luo.jinhua@gd-linux.com>
Simon Glassd6d592f2014-04-10 20:01:29 -06009 */
10
Evgeny Bachinind95e1d12023-03-20 11:23:11 +030011#define pr_fmt(fmt) "cli: %s: " fmt, __func__
12
Simon Glassd6d592f2014-04-10 20:01:29 -060013#include <common.h>
Heinrich Schuchardt127ad5f2024-03-29 17:09:22 +010014#include <ansi.h>
Simon Glass1ea97892020-05-10 11:40:00 -060015#include <bootstage.h>
Simon Glassd6d592f2014-04-10 20:01:29 -060016#include <cli.h>
17#include <cli_hush.h>
Simon Glassadaaa482019-11-14 12:57:43 -070018#include <command.h>
Simon Glassa73bda42015-11-08 23:47:45 -070019#include <console.h>
Simon Glass0af6e2d2019-08-01 09:46:52 -060020#include <env.h>
Simon Glass5b47e302014-04-10 20:01:35 -060021#include <fdtdec.h>
Simon Glassf11478f2019-12-28 10:45:07 -070022#include <hang.h>
Simon Glassd6d592f2014-04-10 20:01:29 -060023#include <malloc.h>
Simon Glass3ba929a2020-10-30 21:38:53 -060024#include <asm/global_data.h>
Simon Glass0034d962021-08-07 07:24:01 -060025#include <dm/ofnode.h>
Evgeny Bachinind95e1d12023-03-20 11:23:11 +030026#include <linux/errno.h>
Simon Glass5b47e302014-04-10 20:01:35 -060027
Simon Glass4ef90b72016-03-19 02:18:38 -060028#ifdef CONFIG_CMDLINE
Francis Laniel5b64c452023-12-22 22:02:35 +010029
30static inline bool use_hush_old(void)
31{
32 return IS_ENABLED(CONFIG_HUSH_SELECTABLE) ?
33 gd->flags & GD_FLG_HUSH_OLD_PARSER :
34 IS_ENABLED(CONFIG_HUSH_OLD_PARSER);
35}
36
Simon Glassd6d592f2014-04-10 20:01:29 -060037/*
38 * Run a command using the selected parser.
39 *
40 * @param cmd Command to run
41 * @param flag Execution flags (CMD_FLAG_...)
Heinrich Schuchardt47b4c022022-01-19 18:05:50 +010042 * Return: 0 on success, or != 0 on error.
Simon Glassd6d592f2014-04-10 20:01:29 -060043 */
44int run_command(const char *cmd, int flag)
45{
Simon Glass7c1d34b2023-02-05 15:40:06 -070046#if !IS_ENABLED(CONFIG_HUSH_PARSER)
Simon Glassd6d592f2014-04-10 20:01:29 -060047 /*
48 * cli_run_command can return 0 or 1 for success, so clean up
49 * its result.
50 */
51 if (cli_simple_run_command(cmd, flag) == -1)
52 return 1;
53
54 return 0;
Francis Laniel5b64c452023-12-22 22:02:35 +010055#else
56 if (use_hush_old()) {
57 int hush_flags = FLAG_PARSE_SEMICOLON | FLAG_EXIT_FROM_LOOP;
Simon Glass94cb9c22014-10-07 13:59:43 -060058
Francis Laniel5b64c452023-12-22 22:02:35 +010059 if (flag & CMD_FLAG_ENV)
60 hush_flags |= FLAG_CONT_ON_NEWLINE;
61 return parse_string_outer(cmd, hush_flags);
62 }
63 /*
64 * Possible values for flags are the following:
65 * FLAG_EXIT_FROM_LOOP: This flags ensures we exit from loop in
66 * parse_and_run_stream() after first iteration while normal
67 * behavior, * i.e. when called from cli_loop(), is to loop
68 * infinitely.
69 * FLAG_PARSE_SEMICOLON: modern Hush parses ';' and does not stop
70 * first time it sees one. So, I think we do not need this flag.
71 * FLAG_REPARSING: For the moment, I do not understand the goal
72 * of this flag.
73 * FLAG_CONT_ON_NEWLINE: This flag seems to be used to continue
74 * parsing even when reading '\n' when coming from
75 * run_command(). In this case, modern Hush reads until it finds
76 * '\0'. So, I think we do not need this flag.
77 */
78 return parse_string_outer_modern(cmd, FLAG_EXIT_FROM_LOOP);
Simon Glassd6d592f2014-04-10 20:01:29 -060079#endif
80}
81
Thomas Betkerbe6346b2014-06-05 20:07:57 +020082/*
83 * Run a command using the selected parser, and check if it is repeatable.
84 *
85 * @param cmd Command to run
86 * @param flag Execution flags (CMD_FLAG_...)
Heinrich Schuchardt47b4c022022-01-19 18:05:50 +010087 * Return: 0 (not repeatable) or 1 (repeatable) on success, -1 on error.
Thomas Betkerbe6346b2014-06-05 20:07:57 +020088 */
89int run_command_repeatable(const char *cmd, int flag)
90{
Masahiro Yamada17a48e42016-06-21 02:11:19 +090091#ifndef CONFIG_HUSH_PARSER
Thomas Betkerbe6346b2014-06-05 20:07:57 +020092 return cli_simple_run_command(cmd, flag);
93#else
Francis Laniel5b64c452023-12-22 22:02:35 +010094 int ret;
95
96 if (use_hush_old()) {
97 ret = parse_string_outer(cmd,
98 FLAG_PARSE_SEMICOLON
99 | FLAG_EXIT_FROM_LOOP);
100 } else {
101 ret = parse_string_outer_modern(cmd,
102 FLAG_PARSE_SEMICOLON
103 | FLAG_EXIT_FROM_LOOP);
104 }
105
Thomas Betkerbe6346b2014-06-05 20:07:57 +0200106 /*
107 * parse_string_outer() returns 1 for failure, so clean up
108 * its result.
109 */
Francis Laniel5b64c452023-12-22 22:02:35 +0100110 if (ret)
Thomas Betkerbe6346b2014-06-05 20:07:57 +0200111 return -1;
112
113 return 0;
114#endif
115}
Sean Anderson41f0a662020-01-10 12:32:19 -0500116#else
117__weak int board_run_command(const char *cmdline)
118{
119 printf("## Commands are disabled. Please enable CONFIG_CMDLINE.\n");
120
121 return 1;
122}
Simon Glass4ef90b72016-03-19 02:18:38 -0600123#endif /* CONFIG_CMDLINE */
Thomas Betkerbe6346b2014-06-05 20:07:57 +0200124
Simon Glassd6d592f2014-04-10 20:01:29 -0600125int run_command_list(const char *cmd, int len, int flag)
126{
127 int need_buff = 1;
128 char *buff = (char *)cmd; /* cast away const */
129 int rcode = 0;
130
131 if (len == -1) {
132 len = strlen(cmd);
Masahiro Yamada17a48e42016-06-21 02:11:19 +0900133#ifdef CONFIG_HUSH_PARSER
Simon Glassd6d592f2014-04-10 20:01:29 -0600134 /* hush will never change our string */
135 need_buff = 0;
136#else
137 /* the built-in parser will change our string if it sees \n */
138 need_buff = strchr(cmd, '\n') != NULL;
139#endif
140 }
141 if (need_buff) {
142 buff = malloc(len + 1);
143 if (!buff)
144 return 1;
145 memcpy(buff, cmd, len);
146 buff[len] = '\0';
147 }
Masahiro Yamada17a48e42016-06-21 02:11:19 +0900148#ifdef CONFIG_HUSH_PARSER
Francis Laniel5b64c452023-12-22 22:02:35 +0100149 if (use_hush_old()) {
150 rcode = parse_string_outer(buff, FLAG_PARSE_SEMICOLON);
151 } else {
152 rcode = parse_string_outer_modern(buff, FLAG_PARSE_SEMICOLON);
153 }
Simon Glassd6d592f2014-04-10 20:01:29 -0600154#else
155 /*
156 * This function will overwrite any \n it sees with a \0, which
157 * is why it can't work with a const char *. Here we are making
158 * using of internal knowledge of this function, to avoid always
159 * doing a malloc() which is actually required only in a case that
160 * is pretty rare.
161 */
Simon Glass4ef90b72016-03-19 02:18:38 -0600162#ifdef CONFIG_CMDLINE
Simon Glassd6d592f2014-04-10 20:01:29 -0600163 rcode = cli_simple_run_command_list(buff, flag);
Simon Glass4ef90b72016-03-19 02:18:38 -0600164#else
165 rcode = board_run_command(buff);
166#endif
Peng Fan63225512015-12-22 17:14:13 +0800167#endif
Simon Glassd6d592f2014-04-10 20:01:29 -0600168 if (need_buff)
169 free(buff);
Simon Glassd6d592f2014-04-10 20:01:29 -0600170
171 return rcode;
172}
173
Simon Glassf3c6a1d2022-07-13 06:06:59 -0600174int run_commandf(const char *fmt, ...)
175{
176 va_list args;
Evgeny Bachinind95e1d12023-03-20 11:23:11 +0300177 int nbytes;
Simon Glassf3c6a1d2022-07-13 06:06:59 -0600178
179 va_start(args, fmt);
Evgeny Bachinind95e1d12023-03-20 11:23:11 +0300180 /*
181 * Limit the console_buffer space being used to CONFIG_SYS_CBSIZE,
182 * because its last byte is used to fit the replacement of \0 by \n\0
183 * in underlying hush parser
184 */
185 nbytes = vsnprintf(console_buffer, CONFIG_SYS_CBSIZE, fmt, args);
Simon Glassf3c6a1d2022-07-13 06:06:59 -0600186 va_end(args);
187
Evgeny Bachinind95e1d12023-03-20 11:23:11 +0300188 if (nbytes < 0) {
189 pr_debug("I/O internal error occurred.\n");
190 return -EIO;
191 } else if (nbytes >= CONFIG_SYS_CBSIZE) {
192 pr_debug("'fmt' size:%d exceeds the limit(%d)\n",
193 nbytes, CONFIG_SYS_CBSIZE);
194 return -ENOSPC;
195 }
196 return run_command(console_buffer, 0);
Simon Glassf3c6a1d2022-07-13 06:06:59 -0600197}
198
Simon Glassd6d592f2014-04-10 20:01:29 -0600199/****************************************************************************/
200
201#if defined(CONFIG_CMD_RUN)
Simon Glassed38aef2020-05-10 11:40:03 -0600202int do_run(struct cmd_tbl *cmdtp, int flag, int argc, char *const argv[])
Simon Glassd6d592f2014-04-10 20:01:29 -0600203{
Marek Vasutfd099322022-12-20 07:25:59 +0100204 int i, ret;
Simon Glassd6d592f2014-04-10 20:01:29 -0600205
206 if (argc < 2)
207 return CMD_RET_USAGE;
208
209 for (i = 1; i < argc; ++i) {
210 char *arg;
211
Simon Glass64b723f2017-08-03 12:22:12 -0600212 arg = env_get(argv[i]);
Simon Glassd6d592f2014-04-10 20:01:29 -0600213 if (arg == NULL) {
214 printf("## Error: \"%s\" not defined\n", argv[i]);
215 return 1;
216 }
217
Marek Vasutfd099322022-12-20 07:25:59 +0100218 ret = run_command(arg, flag | CMD_FLAG_ENV);
219 if (ret)
220 return ret;
Simon Glassd6d592f2014-04-10 20:01:29 -0600221 }
222 return 0;
223}
224#endif
Simon Glass33f79132014-04-10 20:01:34 -0600225
Masahiro Yamada366b24f2015-08-12 07:31:55 +0900226#if CONFIG_IS_ENABLED(OF_CONTROL)
Simon Glass5b47e302014-04-10 20:01:35 -0600227bool cli_process_fdt(const char **cmdp)
228{
229 /* Allow the fdt to override the boot command */
Simon Glass0034d962021-08-07 07:24:01 -0600230 const char *env = ofnode_conf_read_str("bootcmd");
Simon Glass5b47e302014-04-10 20:01:35 -0600231 if (env)
232 *cmdp = env;
233 /*
234 * If the bootsecure option was chosen, use secure_boot_cmd().
235 * Always use 'env' in this case, since bootsecure requres that the
236 * bootcmd was specified in the FDT too.
237 */
Simon Glass0034d962021-08-07 07:24:01 -0600238 return ofnode_conf_read_int("bootsecure", 0);
Simon Glass5b47e302014-04-10 20:01:35 -0600239}
240
241/*
242 * Runs the given boot command securely. Specifically:
243 * - Doesn't run the command with the shell (run_command or parse_string_outer),
244 * since that's a lot of code surface that an attacker might exploit.
245 * Because of this, we don't do any argument parsing--the secure boot command
246 * has to be a full-fledged u-boot command.
247 * - Doesn't check for keypresses before booting, since that could be a
248 * security hole; also disables Ctrl-C.
249 * - Doesn't allow the command to return.
250 *
251 * Upon any failures, this function will drop into an infinite loop after
252 * printing the error message to console.
253 */
254void cli_secure_boot_cmd(const char *cmd)
255{
Simon Glass4ef90b72016-03-19 02:18:38 -0600256#ifdef CONFIG_CMDLINE
Simon Glassed38aef2020-05-10 11:40:03 -0600257 struct cmd_tbl *cmdtp;
Simon Glass4ef90b72016-03-19 02:18:38 -0600258#endif
Simon Glass5b47e302014-04-10 20:01:35 -0600259 int rc;
260
261 if (!cmd) {
262 printf("## Error: Secure boot command not specified\n");
263 goto err;
264 }
265
266 /* Disable Ctrl-C just in case some command is used that checks it. */
267 disable_ctrlc(1);
268
269 /* Find the command directly. */
Simon Glass4ef90b72016-03-19 02:18:38 -0600270#ifdef CONFIG_CMDLINE
Simon Glass5b47e302014-04-10 20:01:35 -0600271 cmdtp = find_cmd(cmd);
272 if (!cmdtp) {
273 printf("## Error: \"%s\" not defined\n", cmd);
274 goto err;
275 }
276
277 /* Run the command, forcing no flags and faking argc and argv. */
278 rc = (cmdtp->cmd)(cmdtp, 0, 1, (char **)&cmd);
279
Simon Glass4ef90b72016-03-19 02:18:38 -0600280#else
281 rc = board_run_command(cmd);
282#endif
283
Simon Glass5b47e302014-04-10 20:01:35 -0600284 /* Shouldn't ever return from boot command. */
285 printf("## Error: \"%s\" returned (code %d)\n", cmd, rc);
286
287err:
288 /*
289 * Not a whole lot to do here. Rebooting won't help much, since we'll
290 * just end up right back here. Just loop.
291 */
292 hang();
293}
Masahiro Yamada366b24f2015-08-12 07:31:55 +0900294#endif /* CONFIG_IS_ENABLED(OF_CONTROL) */
Simon Glass5b47e302014-04-10 20:01:35 -0600295
Simon Glass33f79132014-04-10 20:01:34 -0600296void cli_loop(void)
297{
Heiko Schocher7df72c32019-04-12 12:37:03 +0200298 bootstage_mark(BOOTSTAGE_ID_ENTER_CLI_LOOP);
Francis Laniel3b66e572023-12-22 22:02:32 +0100299#if CONFIG_IS_ENABLED(HUSH_PARSER)
300 if (gd->flags & GD_FLG_HUSH_MODERN_PARSER)
301 parse_and_run_file();
302 else if (gd->flags & GD_FLG_HUSH_OLD_PARSER)
303 parse_file_outer();
304
305 printf("Problem\n");
Simon Glass33f79132014-04-10 20:01:34 -0600306 /* This point is never reached */
307 for (;;);
Stefan Roese824300a2016-04-04 16:32:15 +0200308#elif defined(CONFIG_CMDLINE)
Simon Glass33f79132014-04-10 20:01:34 -0600309 cli_simple_loop();
Simon Glass4ef90b72016-03-19 02:18:38 -0600310#else
311 printf("## U-Boot command line is disabled. Please enable CONFIG_CMDLINE\n");
Masahiro Yamada17a48e42016-06-21 02:11:19 +0900312#endif /*CONFIG_HUSH_PARSER*/
Simon Glass33f79132014-04-10 20:01:34 -0600313}
314
315void cli_init(void)
316{
Masahiro Yamada17a48e42016-06-21 02:11:19 +0900317#ifdef CONFIG_HUSH_PARSER
Francis Laniel3b66e572023-12-22 22:02:32 +0100318 /* This if block is used to initialize hush parser gd flag. */
Francis Lanielefb58002023-12-22 22:02:31 +0100319 if (!(gd->flags & GD_FLG_HUSH_OLD_PARSER)
Francis Laniel3b66e572023-12-22 22:02:32 +0100320 && !(gd->flags & GD_FLG_HUSH_MODERN_PARSER)) {
321 if (CONFIG_IS_ENABLED(HUSH_OLD_PARSER))
322 gd->flags |= GD_FLG_HUSH_OLD_PARSER;
323 else if (CONFIG_IS_ENABLED(HUSH_MODERN_PARSER))
324 gd->flags |= GD_FLG_HUSH_MODERN_PARSER;
325 }
326
327 if (gd->flags & GD_FLG_HUSH_OLD_PARSER) {
328 u_boot_hush_start();
329 } else if (gd->flags & GD_FLG_HUSH_MODERN_PARSER) {
330 u_boot_hush_start_modern();
331 } else {
332 printf("No valid hush parser to use, cli will not initialized!\n");
333 return;
334 }
Simon Glass33f79132014-04-10 20:01:34 -0600335#endif
336
337#if defined(CONFIG_HUSH_INIT_VAR)
338 hush_init_var();
339#endif
Heinrich Schuchardt127ad5f2024-03-29 17:09:22 +0100340
341 if (CONFIG_IS_ENABLED(VIDEO_ANSI))
342 printf(ANSI_CURSOR_SHOW "\n");
Simon Glass33f79132014-04-10 20:01:34 -0600343}