blob: a34938294ecadfcdc6b289a5a55dc691a0d6e359 [file] [log] [blame]
Tom Rini10e47792018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0+
Simon Glassd6d592f2014-04-10 20:01:29 -06002/*
3 * (C) Copyright 2000
4 * Wolfgang Denk, DENX Software Engineering, wd@denx.de.
5 *
6 * Add to readline cmdline-editing by
7 * (C) Copyright 2005
8 * JinHua Luo, GuangDong Linux Center, <luo.jinhua@gd-linux.com>
Simon Glassd6d592f2014-04-10 20:01:29 -06009 */
10
Evgeny Bachinind95e1d12023-03-20 11:23:11 +030011#define pr_fmt(fmt) "cli: %s: " fmt, __func__
12
Simon Glassd6d592f2014-04-10 20:01:29 -060013#include <common.h>
Simon Glass1ea97892020-05-10 11:40:00 -060014#include <bootstage.h>
Simon Glassd6d592f2014-04-10 20:01:29 -060015#include <cli.h>
16#include <cli_hush.h>
Simon Glassadaaa482019-11-14 12:57:43 -070017#include <command.h>
Simon Glassa73bda42015-11-08 23:47:45 -070018#include <console.h>
Simon Glass0af6e2d2019-08-01 09:46:52 -060019#include <env.h>
Simon Glass5b47e302014-04-10 20:01:35 -060020#include <fdtdec.h>
Simon Glassf11478f2019-12-28 10:45:07 -070021#include <hang.h>
Simon Glassd6d592f2014-04-10 20:01:29 -060022#include <malloc.h>
Simon Glass3ba929a2020-10-30 21:38:53 -060023#include <asm/global_data.h>
Simon Glass0034d962021-08-07 07:24:01 -060024#include <dm/ofnode.h>
Evgeny Bachinind95e1d12023-03-20 11:23:11 +030025#include <linux/errno.h>
Simon Glass5b47e302014-04-10 20:01:35 -060026
Simon Glass4ef90b72016-03-19 02:18:38 -060027#ifdef CONFIG_CMDLINE
Francis Laniel5b64c452023-12-22 22:02:35 +010028
29static inline bool use_hush_old(void)
30{
31 return IS_ENABLED(CONFIG_HUSH_SELECTABLE) ?
32 gd->flags & GD_FLG_HUSH_OLD_PARSER :
33 IS_ENABLED(CONFIG_HUSH_OLD_PARSER);
34}
35
Simon Glassd6d592f2014-04-10 20:01:29 -060036/*
37 * Run a command using the selected parser.
38 *
39 * @param cmd Command to run
40 * @param flag Execution flags (CMD_FLAG_...)
Heinrich Schuchardt47b4c022022-01-19 18:05:50 +010041 * Return: 0 on success, or != 0 on error.
Simon Glassd6d592f2014-04-10 20:01:29 -060042 */
43int run_command(const char *cmd, int flag)
44{
Simon Glass7c1d34b2023-02-05 15:40:06 -070045#if !IS_ENABLED(CONFIG_HUSH_PARSER)
Simon Glassd6d592f2014-04-10 20:01:29 -060046 /*
47 * cli_run_command can return 0 or 1 for success, so clean up
48 * its result.
49 */
50 if (cli_simple_run_command(cmd, flag) == -1)
51 return 1;
52
53 return 0;
Francis Laniel5b64c452023-12-22 22:02:35 +010054#else
55 if (use_hush_old()) {
56 int hush_flags = FLAG_PARSE_SEMICOLON | FLAG_EXIT_FROM_LOOP;
Simon Glass94cb9c22014-10-07 13:59:43 -060057
Francis Laniel5b64c452023-12-22 22:02:35 +010058 if (flag & CMD_FLAG_ENV)
59 hush_flags |= FLAG_CONT_ON_NEWLINE;
60 return parse_string_outer(cmd, hush_flags);
61 }
62 /*
63 * Possible values for flags are the following:
64 * FLAG_EXIT_FROM_LOOP: This flags ensures we exit from loop in
65 * parse_and_run_stream() after first iteration while normal
66 * behavior, * i.e. when called from cli_loop(), is to loop
67 * infinitely.
68 * FLAG_PARSE_SEMICOLON: modern Hush parses ';' and does not stop
69 * first time it sees one. So, I think we do not need this flag.
70 * FLAG_REPARSING: For the moment, I do not understand the goal
71 * of this flag.
72 * FLAG_CONT_ON_NEWLINE: This flag seems to be used to continue
73 * parsing even when reading '\n' when coming from
74 * run_command(). In this case, modern Hush reads until it finds
75 * '\0'. So, I think we do not need this flag.
76 */
77 return parse_string_outer_modern(cmd, FLAG_EXIT_FROM_LOOP);
Simon Glassd6d592f2014-04-10 20:01:29 -060078#endif
79}
80
Thomas Betkerbe6346b2014-06-05 20:07:57 +020081/*
82 * Run a command using the selected parser, and check if it is repeatable.
83 *
84 * @param cmd Command to run
85 * @param flag Execution flags (CMD_FLAG_...)
Heinrich Schuchardt47b4c022022-01-19 18:05:50 +010086 * Return: 0 (not repeatable) or 1 (repeatable) on success, -1 on error.
Thomas Betkerbe6346b2014-06-05 20:07:57 +020087 */
88int run_command_repeatable(const char *cmd, int flag)
89{
Masahiro Yamada17a48e42016-06-21 02:11:19 +090090#ifndef CONFIG_HUSH_PARSER
Thomas Betkerbe6346b2014-06-05 20:07:57 +020091 return cli_simple_run_command(cmd, flag);
92#else
Francis Laniel5b64c452023-12-22 22:02:35 +010093 int ret;
94
95 if (use_hush_old()) {
96 ret = parse_string_outer(cmd,
97 FLAG_PARSE_SEMICOLON
98 | FLAG_EXIT_FROM_LOOP);
99 } else {
100 ret = parse_string_outer_modern(cmd,
101 FLAG_PARSE_SEMICOLON
102 | FLAG_EXIT_FROM_LOOP);
103 }
104
Thomas Betkerbe6346b2014-06-05 20:07:57 +0200105 /*
106 * parse_string_outer() returns 1 for failure, so clean up
107 * its result.
108 */
Francis Laniel5b64c452023-12-22 22:02:35 +0100109 if (ret)
Thomas Betkerbe6346b2014-06-05 20:07:57 +0200110 return -1;
111
112 return 0;
113#endif
114}
Sean Anderson41f0a662020-01-10 12:32:19 -0500115#else
116__weak int board_run_command(const char *cmdline)
117{
118 printf("## Commands are disabled. Please enable CONFIG_CMDLINE.\n");
119
120 return 1;
121}
Simon Glass4ef90b72016-03-19 02:18:38 -0600122#endif /* CONFIG_CMDLINE */
Thomas Betkerbe6346b2014-06-05 20:07:57 +0200123
Simon Glassd6d592f2014-04-10 20:01:29 -0600124int run_command_list(const char *cmd, int len, int flag)
125{
126 int need_buff = 1;
127 char *buff = (char *)cmd; /* cast away const */
128 int rcode = 0;
129
130 if (len == -1) {
131 len = strlen(cmd);
Masahiro Yamada17a48e42016-06-21 02:11:19 +0900132#ifdef CONFIG_HUSH_PARSER
Simon Glassd6d592f2014-04-10 20:01:29 -0600133 /* hush will never change our string */
134 need_buff = 0;
135#else
136 /* the built-in parser will change our string if it sees \n */
137 need_buff = strchr(cmd, '\n') != NULL;
138#endif
139 }
140 if (need_buff) {
141 buff = malloc(len + 1);
142 if (!buff)
143 return 1;
144 memcpy(buff, cmd, len);
145 buff[len] = '\0';
146 }
Masahiro Yamada17a48e42016-06-21 02:11:19 +0900147#ifdef CONFIG_HUSH_PARSER
Francis Laniel5b64c452023-12-22 22:02:35 +0100148 if (use_hush_old()) {
149 rcode = parse_string_outer(buff, FLAG_PARSE_SEMICOLON);
150 } else {
151 rcode = parse_string_outer_modern(buff, FLAG_PARSE_SEMICOLON);
152 }
Simon Glassd6d592f2014-04-10 20:01:29 -0600153#else
154 /*
155 * This function will overwrite any \n it sees with a \0, which
156 * is why it can't work with a const char *. Here we are making
157 * using of internal knowledge of this function, to avoid always
158 * doing a malloc() which is actually required only in a case that
159 * is pretty rare.
160 */
Simon Glass4ef90b72016-03-19 02:18:38 -0600161#ifdef CONFIG_CMDLINE
Simon Glassd6d592f2014-04-10 20:01:29 -0600162 rcode = cli_simple_run_command_list(buff, flag);
Simon Glass4ef90b72016-03-19 02:18:38 -0600163#else
164 rcode = board_run_command(buff);
165#endif
Peng Fan63225512015-12-22 17:14:13 +0800166#endif
Simon Glassd6d592f2014-04-10 20:01:29 -0600167 if (need_buff)
168 free(buff);
Simon Glassd6d592f2014-04-10 20:01:29 -0600169
170 return rcode;
171}
172
Simon Glassf3c6a1d2022-07-13 06:06:59 -0600173int run_commandf(const char *fmt, ...)
174{
175 va_list args;
Evgeny Bachinind95e1d12023-03-20 11:23:11 +0300176 int nbytes;
Simon Glassf3c6a1d2022-07-13 06:06:59 -0600177
178 va_start(args, fmt);
Evgeny Bachinind95e1d12023-03-20 11:23:11 +0300179 /*
180 * Limit the console_buffer space being used to CONFIG_SYS_CBSIZE,
181 * because its last byte is used to fit the replacement of \0 by \n\0
182 * in underlying hush parser
183 */
184 nbytes = vsnprintf(console_buffer, CONFIG_SYS_CBSIZE, fmt, args);
Simon Glassf3c6a1d2022-07-13 06:06:59 -0600185 va_end(args);
186
Evgeny Bachinind95e1d12023-03-20 11:23:11 +0300187 if (nbytes < 0) {
188 pr_debug("I/O internal error occurred.\n");
189 return -EIO;
190 } else if (nbytes >= CONFIG_SYS_CBSIZE) {
191 pr_debug("'fmt' size:%d exceeds the limit(%d)\n",
192 nbytes, CONFIG_SYS_CBSIZE);
193 return -ENOSPC;
194 }
195 return run_command(console_buffer, 0);
Simon Glassf3c6a1d2022-07-13 06:06:59 -0600196}
197
Simon Glassd6d592f2014-04-10 20:01:29 -0600198/****************************************************************************/
199
200#if defined(CONFIG_CMD_RUN)
Simon Glassed38aef2020-05-10 11:40:03 -0600201int do_run(struct cmd_tbl *cmdtp, int flag, int argc, char *const argv[])
Simon Glassd6d592f2014-04-10 20:01:29 -0600202{
Marek Vasutfd099322022-12-20 07:25:59 +0100203 int i, ret;
Simon Glassd6d592f2014-04-10 20:01:29 -0600204
205 if (argc < 2)
206 return CMD_RET_USAGE;
207
208 for (i = 1; i < argc; ++i) {
209 char *arg;
210
Simon Glass64b723f2017-08-03 12:22:12 -0600211 arg = env_get(argv[i]);
Simon Glassd6d592f2014-04-10 20:01:29 -0600212 if (arg == NULL) {
213 printf("## Error: \"%s\" not defined\n", argv[i]);
214 return 1;
215 }
216
Marek Vasutfd099322022-12-20 07:25:59 +0100217 ret = run_command(arg, flag | CMD_FLAG_ENV);
218 if (ret)
219 return ret;
Simon Glassd6d592f2014-04-10 20:01:29 -0600220 }
221 return 0;
222}
223#endif
Simon Glass33f79132014-04-10 20:01:34 -0600224
Masahiro Yamada366b24f2015-08-12 07:31:55 +0900225#if CONFIG_IS_ENABLED(OF_CONTROL)
Simon Glass5b47e302014-04-10 20:01:35 -0600226bool cli_process_fdt(const char **cmdp)
227{
228 /* Allow the fdt to override the boot command */
Simon Glass0034d962021-08-07 07:24:01 -0600229 const char *env = ofnode_conf_read_str("bootcmd");
Simon Glass5b47e302014-04-10 20:01:35 -0600230 if (env)
231 *cmdp = env;
232 /*
233 * If the bootsecure option was chosen, use secure_boot_cmd().
234 * Always use 'env' in this case, since bootsecure requres that the
235 * bootcmd was specified in the FDT too.
236 */
Simon Glass0034d962021-08-07 07:24:01 -0600237 return ofnode_conf_read_int("bootsecure", 0);
Simon Glass5b47e302014-04-10 20:01:35 -0600238}
239
240/*
241 * Runs the given boot command securely. Specifically:
242 * - Doesn't run the command with the shell (run_command or parse_string_outer),
243 * since that's a lot of code surface that an attacker might exploit.
244 * Because of this, we don't do any argument parsing--the secure boot command
245 * has to be a full-fledged u-boot command.
246 * - Doesn't check for keypresses before booting, since that could be a
247 * security hole; also disables Ctrl-C.
248 * - Doesn't allow the command to return.
249 *
250 * Upon any failures, this function will drop into an infinite loop after
251 * printing the error message to console.
252 */
253void cli_secure_boot_cmd(const char *cmd)
254{
Simon Glass4ef90b72016-03-19 02:18:38 -0600255#ifdef CONFIG_CMDLINE
Simon Glassed38aef2020-05-10 11:40:03 -0600256 struct cmd_tbl *cmdtp;
Simon Glass4ef90b72016-03-19 02:18:38 -0600257#endif
Simon Glass5b47e302014-04-10 20:01:35 -0600258 int rc;
259
260 if (!cmd) {
261 printf("## Error: Secure boot command not specified\n");
262 goto err;
263 }
264
265 /* Disable Ctrl-C just in case some command is used that checks it. */
266 disable_ctrlc(1);
267
268 /* Find the command directly. */
Simon Glass4ef90b72016-03-19 02:18:38 -0600269#ifdef CONFIG_CMDLINE
Simon Glass5b47e302014-04-10 20:01:35 -0600270 cmdtp = find_cmd(cmd);
271 if (!cmdtp) {
272 printf("## Error: \"%s\" not defined\n", cmd);
273 goto err;
274 }
275
276 /* Run the command, forcing no flags and faking argc and argv. */
277 rc = (cmdtp->cmd)(cmdtp, 0, 1, (char **)&cmd);
278
Simon Glass4ef90b72016-03-19 02:18:38 -0600279#else
280 rc = board_run_command(cmd);
281#endif
282
Simon Glass5b47e302014-04-10 20:01:35 -0600283 /* Shouldn't ever return from boot command. */
284 printf("## Error: \"%s\" returned (code %d)\n", cmd, rc);
285
286err:
287 /*
288 * Not a whole lot to do here. Rebooting won't help much, since we'll
289 * just end up right back here. Just loop.
290 */
291 hang();
292}
Masahiro Yamada366b24f2015-08-12 07:31:55 +0900293#endif /* CONFIG_IS_ENABLED(OF_CONTROL) */
Simon Glass5b47e302014-04-10 20:01:35 -0600294
Simon Glass33f79132014-04-10 20:01:34 -0600295void cli_loop(void)
296{
Heiko Schocher7df72c32019-04-12 12:37:03 +0200297 bootstage_mark(BOOTSTAGE_ID_ENTER_CLI_LOOP);
Francis Laniel3b66e572023-12-22 22:02:32 +0100298#if CONFIG_IS_ENABLED(HUSH_PARSER)
299 if (gd->flags & GD_FLG_HUSH_MODERN_PARSER)
300 parse_and_run_file();
301 else if (gd->flags & GD_FLG_HUSH_OLD_PARSER)
302 parse_file_outer();
303
304 printf("Problem\n");
Simon Glass33f79132014-04-10 20:01:34 -0600305 /* This point is never reached */
306 for (;;);
Stefan Roese824300a2016-04-04 16:32:15 +0200307#elif defined(CONFIG_CMDLINE)
Simon Glass33f79132014-04-10 20:01:34 -0600308 cli_simple_loop();
Simon Glass4ef90b72016-03-19 02:18:38 -0600309#else
310 printf("## U-Boot command line is disabled. Please enable CONFIG_CMDLINE\n");
Masahiro Yamada17a48e42016-06-21 02:11:19 +0900311#endif /*CONFIG_HUSH_PARSER*/
Simon Glass33f79132014-04-10 20:01:34 -0600312}
313
314void cli_init(void)
315{
Masahiro Yamada17a48e42016-06-21 02:11:19 +0900316#ifdef CONFIG_HUSH_PARSER
Francis Laniel3b66e572023-12-22 22:02:32 +0100317 /* This if block is used to initialize hush parser gd flag. */
Francis Lanielefb58002023-12-22 22:02:31 +0100318 if (!(gd->flags & GD_FLG_HUSH_OLD_PARSER)
Francis Laniel3b66e572023-12-22 22:02:32 +0100319 && !(gd->flags & GD_FLG_HUSH_MODERN_PARSER)) {
320 if (CONFIG_IS_ENABLED(HUSH_OLD_PARSER))
321 gd->flags |= GD_FLG_HUSH_OLD_PARSER;
322 else if (CONFIG_IS_ENABLED(HUSH_MODERN_PARSER))
323 gd->flags |= GD_FLG_HUSH_MODERN_PARSER;
324 }
325
326 if (gd->flags & GD_FLG_HUSH_OLD_PARSER) {
327 u_boot_hush_start();
328 } else if (gd->flags & GD_FLG_HUSH_MODERN_PARSER) {
329 u_boot_hush_start_modern();
330 } else {
331 printf("No valid hush parser to use, cli will not initialized!\n");
332 return;
333 }
Simon Glass33f79132014-04-10 20:01:34 -0600334#endif
335
336#if defined(CONFIG_HUSH_INIT_VAR)
337 hush_init_var();
338#endif
339}