blob: 012dd5797e122fdb32f7bd110567b773fc9a3032 [file] [log] [blame]
Tom Rini10e47792018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0+
Simon Glass7b6a95a2014-04-10 20:01:28 -06002/*
3 * (C) Copyright 2000
4 * Wolfgang Denk, DENX Software Engineering, wd@denx.de.
Simon Glass7b6a95a2014-04-10 20:01:28 -06005 */
6
7#include <common.h>
Jeroen Hofsteef682d8c2014-07-13 22:57:58 +02008#include <autoboot.h>
Simon Glass399ed9a2014-04-10 20:01:30 -06009#include <bootretry.h>
Simon Glass7b6a95a2014-04-10 20:01:28 -060010#include <cli.h>
Simon Glassa73bda42015-11-08 23:47:45 -070011#include <console.h>
Simon Glass7b6a95a2014-04-10 20:01:28 -060012#include <fdtdec.h>
Simon Glass6a2e09f2019-07-20 20:51:16 -060013#include <hash.h>
Simon Glass7b6a95a2014-04-10 20:01:28 -060014#include <menu.h>
15#include <post.h>
Stefan Roese0ed2e462015-05-18 14:08:24 +020016#include <u-boot/sha256.h>
Lukasz Majewski4fc18912018-05-02 16:10:53 +020017#include <bootcount.h>
Simon Glass7b6a95a2014-04-10 20:01:28 -060018
19DECLARE_GLOBAL_DATA_PTR;
20
21#define MAX_DELAY_STOP_STR 32
22
23#ifndef DEBUG_BOOTKEYS
24#define DEBUG_BOOTKEYS 0
25#endif
26#define debug_bootkeys(fmt, args...) \
27 debug_cond(DEBUG_BOOTKEYS, fmt, ##args)
28
Simon Glass5b47e302014-04-10 20:01:35 -060029/* Stored value of bootdelay, used by autoboot_command() */
30static int stored_bootdelay;
31
Simon Glass760d3fb2019-07-20 20:51:15 -060032#ifdef CONFIG_AUTOBOOT_ENCRYPTION
33#define AUTOBOOT_STOP_STR_SHA256 CONFIG_AUTOBOOT_STOP_STR_SHA256
34#else
35#define AUTOBOOT_STOP_STR_SHA256 ""
36#endif
37
Stefan Roese0ed2e462015-05-18 14:08:24 +020038/*
39 * Use a "constant-length" time compare function for this
40 * hash compare:
41 *
42 * https://crackstation.net/hashing-security.htm
Simon Glass7b6a95a2014-04-10 20:01:28 -060043 */
Stefan Roese0ed2e462015-05-18 14:08:24 +020044static int slow_equals(u8 *a, u8 *b, int len)
Simon Glass7b6a95a2014-04-10 20:01:28 -060045{
Stefan Roese0ed2e462015-05-18 14:08:24 +020046 int diff = 0;
47 int i;
48
49 for (i = 0; i < len; i++)
50 diff |= a[i] ^ b[i];
51
52 return diff == 0;
53}
54
Simon Glassa8cab882019-07-20 20:51:17 -060055/**
56 * passwd_abort_sha256() - check for a hashed key sequence to abort booting
57 *
58 * This checks for the user entering a SHA256 hash within a given time.
59 *
60 * @etime: Timeout value ticks (stop when get_ticks() reachs this)
61 * @return 0 if autoboot should continue, 1 if it should stop
62 */
Simon Glass6a2e09f2019-07-20 20:51:16 -060063static int passwd_abort_sha256(uint64_t etime)
Stefan Roese0ed2e462015-05-18 14:08:24 +020064{
Simon Glass64b723f2017-08-03 12:22:12 -060065 const char *sha_env_str = env_get("bootstopkeysha256");
Stefan Roese0ed2e462015-05-18 14:08:24 +020066 u8 sha_env[SHA256_SUM_LEN];
67 u8 sha[SHA256_SUM_LEN];
68 char presskey[MAX_DELAY_STOP_STR];
69 const char *algo_name = "sha256";
70 u_int presskey_len = 0;
Simon Glass7b6a95a2014-04-10 20:01:28 -060071 int abort = 0;
Martin Etnestad055afba2018-01-12 09:04:38 +010072 int size = sizeof(sha);
Stefan Roese0ed2e462015-05-18 14:08:24 +020073 int ret;
74
75 if (sha_env_str == NULL)
Simon Glass760d3fb2019-07-20 20:51:15 -060076 sha_env_str = AUTOBOOT_STOP_STR_SHA256;
Stefan Roese0ed2e462015-05-18 14:08:24 +020077
78 /*
79 * Generate the binary value from the environment hash value
80 * so that we can compare this value with the computed hash
81 * from the user input
82 */
83 ret = hash_parse_string(algo_name, sha_env_str, sha_env);
84 if (ret) {
85 printf("Hash %s not supported!\n", algo_name);
86 return 0;
87 }
88
89 /*
90 * We don't know how long the stop-string is, so we need to
91 * generate the sha256 hash upon each input character and
92 * compare the value with the one saved in the environment
93 */
94 do {
95 if (tstc()) {
96 /* Check for input string overflow */
97 if (presskey_len >= MAX_DELAY_STOP_STR)
98 return 0;
99
100 presskey[presskey_len++] = getc();
101
102 /* Calculate sha256 upon each new char */
103 hash_block(algo_name, (const void *)presskey,
104 presskey_len, sha, &size);
105
106 /* And check if sha matches saved value in env */
107 if (slow_equals(sha, sha_env, SHA256_SUM_LEN))
108 abort = 1;
109 }
110 } while (!abort && get_ticks() <= etime);
111
112 return abort;
113}
Simon Glass6a2e09f2019-07-20 20:51:16 -0600114
Simon Glassa8cab882019-07-20 20:51:17 -0600115/**
116 * passwd_abort_key() - check for a key sequence to aborted booting
117 *
118 * This checks for the user entering a string within a given time.
119 *
120 * @etime: Timeout value ticks (stop when get_ticks() reachs this)
121 * @return 0 if autoboot should continue, 1 if it should stop
122 */
Simon Glass6a2e09f2019-07-20 20:51:16 -0600123static int passwd_abort_key(uint64_t etime)
Stefan Roese0ed2e462015-05-18 14:08:24 +0200124{
125 int abort = 0;
Simon Glass7b6a95a2014-04-10 20:01:28 -0600126 struct {
127 char *str;
128 u_int len;
129 int retry;
130 }
131 delaykey[] = {
Simon Glass64b723f2017-08-03 12:22:12 -0600132 { .str = env_get("bootdelaykey"), .retry = 1 },
133 { .str = env_get("bootstopkey"), .retry = 0 },
Simon Glass7b6a95a2014-04-10 20:01:28 -0600134 };
135
136 char presskey[MAX_DELAY_STOP_STR];
137 u_int presskey_len = 0;
138 u_int presskey_max = 0;
139 u_int i;
140
Simon Glass7b6a95a2014-04-10 20:01:28 -0600141# ifdef CONFIG_AUTOBOOT_DELAY_STR
142 if (delaykey[0].str == NULL)
143 delaykey[0].str = CONFIG_AUTOBOOT_DELAY_STR;
144# endif
Simon Glass7b6a95a2014-04-10 20:01:28 -0600145# ifdef CONFIG_AUTOBOOT_STOP_STR
Stefan Roese0a48c7a2015-05-18 14:08:22 +0200146 if (delaykey[1].str == NULL)
147 delaykey[1].str = CONFIG_AUTOBOOT_STOP_STR;
Simon Glass7b6a95a2014-04-10 20:01:28 -0600148# endif
149
150 for (i = 0; i < sizeof(delaykey) / sizeof(delaykey[0]); i++) {
151 delaykey[i].len = delaykey[i].str == NULL ?
152 0 : strlen(delaykey[i].str);
153 delaykey[i].len = delaykey[i].len > MAX_DELAY_STOP_STR ?
154 MAX_DELAY_STOP_STR : delaykey[i].len;
155
156 presskey_max = presskey_max > delaykey[i].len ?
157 presskey_max : delaykey[i].len;
158
159 debug_bootkeys("%s key:<%s>\n",
160 delaykey[i].retry ? "delay" : "stop",
161 delaykey[i].str ? delaykey[i].str : "NULL");
162 }
163
164 /* In order to keep up with incoming data, check timeout only
165 * when catch up.
166 */
167 do {
168 if (tstc()) {
169 if (presskey_len < presskey_max) {
170 presskey[presskey_len++] = getc();
171 } else {
172 for (i = 0; i < presskey_max - 1; i++)
173 presskey[i] = presskey[i + 1];
174
175 presskey[i] = getc();
176 }
177 }
178
179 for (i = 0; i < sizeof(delaykey) / sizeof(delaykey[0]); i++) {
180 if (delaykey[i].len > 0 &&
181 presskey_len >= delaykey[i].len &&
182 memcmp(presskey + presskey_len -
183 delaykey[i].len, delaykey[i].str,
184 delaykey[i].len) == 0) {
185 debug_bootkeys("got %skey\n",
186 delaykey[i].retry ? "delay" :
187 "stop");
188
Simon Glass7b6a95a2014-04-10 20:01:28 -0600189 /* don't retry auto boot */
190 if (!delaykey[i].retry)
191 bootretry_dont_retry();
Simon Glass7b6a95a2014-04-10 20:01:28 -0600192 abort = 1;
193 }
194 }
195 } while (!abort && get_ticks() <= etime);
196
Stefan Roese0ed2e462015-05-18 14:08:24 +0200197 return abort;
198}
Stefan Roese0ed2e462015-05-18 14:08:24 +0200199
200/***************************************************************************
201 * Watch for 'delay' seconds for autoboot stop or autoboot delay string.
202 * returns: 0 - no key string, allow autoboot 1 - got key string, abort
203 */
Simon Glass6d99d132019-07-20 20:51:19 -0600204static int abortboot_key_sequence(int bootdelay)
Stefan Roese0ed2e462015-05-18 14:08:24 +0200205{
206 int abort;
207 uint64_t etime = endtick(bootdelay);
208
Stefan Roese0ed2e462015-05-18 14:08:24 +0200209# ifdef CONFIG_AUTOBOOT_PROMPT
210 /*
211 * CONFIG_AUTOBOOT_PROMPT includes the %d for all boards.
212 * To print the bootdelay value upon bootup.
213 */
214 printf(CONFIG_AUTOBOOT_PROMPT, bootdelay);
215# endif
216
Simon Glass6a2e09f2019-07-20 20:51:16 -0600217 if (IS_ENABLED(CONFIG_AUTOBOOT_ENCRYPTION))
218 abort = passwd_abort_sha256(etime);
219 else
220 abort = passwd_abort_key(etime);
Simon Glass7b6a95a2014-04-10 20:01:28 -0600221 if (!abort)
222 debug_bootkeys("key timeout\n");
223
Simon Glass7b6a95a2014-04-10 20:01:28 -0600224 return abort;
225}
226
Simon Glass7b6a95a2014-04-10 20:01:28 -0600227#ifdef CONFIG_MENUKEY
228static int menukey;
229#endif
230
Simon Glass6d99d132019-07-20 20:51:19 -0600231static int abortboot_single_key(int bootdelay)
Simon Glass7b6a95a2014-04-10 20:01:28 -0600232{
233 int abort = 0;
234 unsigned long ts;
235
236#ifdef CONFIG_MENUPROMPT
237 printf(CONFIG_MENUPROMPT);
238#else
Masahiro Yamada9a333862016-06-27 16:23:04 +0900239 printf("Hit any key to stop autoboot: %2d ", bootdelay);
Simon Glass7b6a95a2014-04-10 20:01:28 -0600240#endif
241
Simon Glass7b6a95a2014-04-10 20:01:28 -0600242 /*
243 * Check if key already pressed
Simon Glass7b6a95a2014-04-10 20:01:28 -0600244 */
Masahiro Yamada9a333862016-06-27 16:23:04 +0900245 if (tstc()) { /* we got a key press */
246 (void) getc(); /* consume input */
247 puts("\b\b\b 0");
248 abort = 1; /* don't auto boot */
Simon Glass7b6a95a2014-04-10 20:01:28 -0600249 }
Simon Glass7b6a95a2014-04-10 20:01:28 -0600250
251 while ((bootdelay > 0) && (!abort)) {
252 --bootdelay;
253 /* delay 1000 ms */
254 ts = get_timer(0);
255 do {
256 if (tstc()) { /* we got a key press */
257 abort = 1; /* don't auto boot */
258 bootdelay = 0; /* no more delay */
259# ifdef CONFIG_MENUKEY
260 menukey = getc();
261# else
262 (void) getc(); /* consume input */
263# endif
264 break;
265 }
266 udelay(10000);
267 } while (!abort && get_timer(ts) < 1000);
268
269 printf("\b\b\b%2d ", bootdelay);
270 }
271
272 putc('\n');
273
Simon Glass7b6a95a2014-04-10 20:01:28 -0600274 return abort;
275}
Simon Glass7b6a95a2014-04-10 20:01:28 -0600276
277static int abortboot(int bootdelay)
278{
Masahiro Yamada9a333862016-06-27 16:23:04 +0900279 int abort = 0;
Masahiro Yamadad88f8722016-06-27 16:23:03 +0900280
Simon Glass6d99d132019-07-20 20:51:19 -0600281 if (bootdelay >= 0) {
282 if (IS_ENABLED(CONFIG_AUTOBOOT_KEYED))
283 abort = abortboot_key_sequence(bootdelay);
284 else
285 abort = abortboot_single_key(bootdelay);
286 }
Masahiro Yamadad88f8722016-06-27 16:23:03 +0900287
Simon Glass3a315052019-07-20 20:51:18 -0600288 if (IS_ENABLED(CONFIG_SILENT_CONSOLE) && abort)
Masahiro Yamadad88f8722016-06-27 16:23:03 +0900289 gd->flags &= ~GD_FLG_SILENT;
Masahiro Yamadad88f8722016-06-27 16:23:03 +0900290
291 return abort;
Simon Glass7b6a95a2014-04-10 20:01:28 -0600292}
293
Simon Glass7b6a95a2014-04-10 20:01:28 -0600294static void process_fdt_options(const void *blob)
295{
Stefan Roesec9fa9a52016-01-28 17:34:40 +0100296#if defined(CONFIG_OF_CONTROL) && defined(CONFIG_SYS_TEXT_BASE)
Simon Glass7b6a95a2014-04-10 20:01:28 -0600297 ulong addr;
298
299 /* Add an env variable to point to a kernel payload, if available */
300 addr = fdtdec_get_config_int(gd->fdt_blob, "kernel-offset", 0);
301 if (addr)
Simon Glass4d949a22017-08-03 12:22:10 -0600302 env_set_addr("kernaddr", (void *)(CONFIG_SYS_TEXT_BASE + addr));
Simon Glass7b6a95a2014-04-10 20:01:28 -0600303
304 /* Add an env variable to point to a root disk, if available */
305 addr = fdtdec_get_config_int(gd->fdt_blob, "rootdisk-offset", 0);
306 if (addr)
Simon Glass4d949a22017-08-03 12:22:10 -0600307 env_set_addr("rootaddr", (void *)(CONFIG_SYS_TEXT_BASE + addr));
Stefan Roesec9fa9a52016-01-28 17:34:40 +0100308#endif /* CONFIG_OF_CONTROL && CONFIG_SYS_TEXT_BASE */
Simon Glass5b47e302014-04-10 20:01:35 -0600309}
Simon Glass7b6a95a2014-04-10 20:01:28 -0600310
Simon Glass5b47e302014-04-10 20:01:35 -0600311const char *bootdelay_process(void)
Simon Glass7b6a95a2014-04-10 20:01:28 -0600312{
Simon Glass7b6a95a2014-04-10 20:01:28 -0600313 char *s;
314 int bootdelay;
Simon Glass7b6a95a2014-04-10 20:01:28 -0600315
Lukasz Majewski4fc18912018-05-02 16:10:53 +0200316 bootcount_inc();
Simon Glass7b6a95a2014-04-10 20:01:28 -0600317
Simon Glass64b723f2017-08-03 12:22:12 -0600318 s = env_get("bootdelay");
Simon Glass7b6a95a2014-04-10 20:01:28 -0600319 bootdelay = s ? (int)simple_strtol(s, NULL, 10) : CONFIG_BOOTDELAY;
320
321#ifdef CONFIG_OF_CONTROL
322 bootdelay = fdtdec_get_config_int(gd->fdt_blob, "bootdelay",
323 bootdelay);
324#endif
325
326 debug("### main_loop entered: bootdelay=%d\n\n", bootdelay);
327
328#if defined(CONFIG_MENU_SHOW)
329 bootdelay = menu_show(bootdelay);
330#endif
Simon Glass09007c42014-04-10 20:01:31 -0600331 bootretry_init_cmd_timeout();
Simon Glass7b6a95a2014-04-10 20:01:28 -0600332
333#ifdef CONFIG_POST
334 if (gd->flags & GD_FLG_POSTFAIL) {
Simon Glass64b723f2017-08-03 12:22:12 -0600335 s = env_get("failbootcmd");
Simon Glass7b6a95a2014-04-10 20:01:28 -0600336 } else
337#endif /* CONFIG_POST */
Lukasz Majewski4fc18912018-05-02 16:10:53 +0200338 if (bootcount_error())
Simon Glass64b723f2017-08-03 12:22:12 -0600339 s = env_get("altbootcmd");
Lukasz Majewski4fc18912018-05-02 16:10:53 +0200340 else
Simon Glass64b723f2017-08-03 12:22:12 -0600341 s = env_get("bootcmd");
Simon Glass7b6a95a2014-04-10 20:01:28 -0600342
343 process_fdt_options(gd->fdt_blob);
Simon Glass5b47e302014-04-10 20:01:35 -0600344 stored_bootdelay = bootdelay;
Simon Glass7b6a95a2014-04-10 20:01:28 -0600345
Simon Glass5b47e302014-04-10 20:01:35 -0600346 return s;
347}
Simon Glass7b6a95a2014-04-10 20:01:28 -0600348
Simon Glass5b47e302014-04-10 20:01:35 -0600349void autoboot_command(const char *s)
350{
Simon Glass7b6a95a2014-04-10 20:01:28 -0600351 debug("### main_loop: bootcmd=\"%s\"\n", s ? s : "<UNDEFINED>");
352
Simon Glass5b47e302014-04-10 20:01:35 -0600353 if (stored_bootdelay != -1 && s && !abortboot(stored_bootdelay)) {
Simon Glass7b6a95a2014-04-10 20:01:28 -0600354#if defined(CONFIG_AUTOBOOT_KEYED) && !defined(CONFIG_AUTOBOOT_KEYED_CTRLC)
355 int prev = disable_ctrlc(1); /* disable Control C checking */
356#endif
357
358 run_command_list(s, -1, 0);
359
360#if defined(CONFIG_AUTOBOOT_KEYED) && !defined(CONFIG_AUTOBOOT_KEYED_CTRLC)
361 disable_ctrlc(prev); /* restore Control C checking */
362#endif
363 }
364
365#ifdef CONFIG_MENUKEY
366 if (menukey == CONFIG_MENUKEY) {
Simon Glass64b723f2017-08-03 12:22:12 -0600367 s = env_get("menucmd");
Simon Glass7b6a95a2014-04-10 20:01:28 -0600368 if (s)
369 run_command_list(s, -1, 0);
370 }
371#endif /* CONFIG_MENUKEY */
372}