blob: 0a254498d4005697ea2cf7099558c0e27b551308 [file] [log] [blame]
Tom Rini10e47792018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0+
Simon Glass7b6a95a2014-04-10 20:01:28 -06002/*
3 * (C) Copyright 2000
4 * Wolfgang Denk, DENX Software Engineering, wd@denx.de.
Simon Glass7b6a95a2014-04-10 20:01:28 -06005 */
6
Tom Rinidec7ea02024-05-20 13:35:03 -06007#include <config.h>
Jeroen Hofsteef682d8c2014-07-13 22:57:58 +02008#include <autoboot.h>
Simon Glass399ed9a2014-04-10 20:01:30 -06009#include <bootretry.h>
Simon Glass7b6a95a2014-04-10 20:01:28 -060010#include <cli.h>
Simon Glassadaaa482019-11-14 12:57:43 -070011#include <command.h>
Simon Glassa73bda42015-11-08 23:47:45 -070012#include <console.h>
Simon Glass313112a2019-08-01 09:46:46 -060013#include <env.h>
Tom Rinidec7ea02024-05-20 13:35:03 -060014#include <errno.h>
Simon Glass7b6a95a2014-04-10 20:01:28 -060015#include <fdtdec.h>
Simon Glass6a2e09f2019-07-20 20:51:16 -060016#include <hash.h>
Simon Glass0f2af882020-05-10 11:40:05 -060017#include <log.h>
Simon Glass9bc15642020-02-03 07:36:16 -070018#include <malloc.h>
Heiko Schocher2ef3a952019-07-29 07:23:19 +020019#include <memalign.h>
Simon Glass7b6a95a2014-04-10 20:01:28 -060020#include <menu.h>
21#include <post.h>
Simon Glass495a5dc2019-11-14 12:57:30 -070022#include <time.h>
Simon Glass3ba929a2020-10-30 21:38:53 -060023#include <asm/global_data.h>
Simon Glassdbd79542020-05-10 11:40:11 -060024#include <linux/delay.h>
Stefan Roese0ed2e462015-05-18 14:08:24 +020025#include <u-boot/sha256.h>
Lukasz Majewski4fc18912018-05-02 16:10:53 +020026#include <bootcount.h>
Steffen Jaeckel6aa6bfb2021-07-08 15:57:35 +020027#include <crypt.h>
Simon Glass0034d962021-08-07 07:24:01 -060028#include <dm/ofnode.h>
Simon Glass7b6a95a2014-04-10 20:01:28 -060029
30DECLARE_GLOBAL_DATA_PTR;
31
Steffen Jaeckel092c8c62021-07-08 15:57:36 +020032#define DELAY_STOP_STR_MAX_LENGTH 64
Simon Glass7b6a95a2014-04-10 20:01:28 -060033
34#ifndef DEBUG_BOOTKEYS
35#define DEBUG_BOOTKEYS 0
36#endif
37#define debug_bootkeys(fmt, args...) \
38 debug_cond(DEBUG_BOOTKEYS, fmt, ##args)
39
Simon Glass5b47e302014-04-10 20:01:35 -060040/* Stored value of bootdelay, used by autoboot_command() */
41static int stored_bootdelay;
Simon Glass9d983852019-07-20 20:51:23 -060042static int menukey;
Simon Glass5b47e302014-04-10 20:01:35 -060043
Tom Rini0c23c5b2023-01-10 11:19:34 -050044#if defined(CONFIG_AUTOBOOT_STOP_STR_CRYPT)
45#define AUTOBOOT_STOP_STR_CRYPT CONFIG_AUTOBOOT_STOP_STR_CRYPT
46#else
47#define AUTOBOOT_STOP_STR_CRYPT ""
Steffen Jaeckel6aa6bfb2021-07-08 15:57:35 +020048#endif
Tom Rini0c23c5b2023-01-10 11:19:34 -050049#if defined(CONFIG_AUTOBOOT_STOP_STR_SHA256)
50#define AUTOBOOT_STOP_STR_SHA256 CONFIG_AUTOBOOT_STOP_STR_SHA256
51#else
52#define AUTOBOOT_STOP_STR_SHA256 ""
Simon Glass760d3fb2019-07-20 20:51:15 -060053#endif
54
Da Xue3769e552021-06-21 22:39:19 -040055#ifdef CONFIG_AUTOBOOT_USE_MENUKEY
Da Xue4387f2e2021-07-02 12:32:43 -040056#define AUTOBOOT_MENUKEY CONFIG_AUTOBOOT_MENUKEY
Simon Glass9d983852019-07-20 20:51:23 -060057#else
58#define AUTOBOOT_MENUKEY 0
59#endif
60
Steffen Jaeckel6aa6bfb2021-07-08 15:57:35 +020061/**
62 * passwd_abort_crypt() - check for a crypt-style hashed key sequence to abort booting
63 *
64 * This checks for the user entering a password within a given time.
65 *
66 * The entered password is hashed via one of the crypt-style hash methods
67 * and compared to the pre-defined value from either
68 * the environment variable "bootstopkeycrypt"
69 * or
70 * the config value CONFIG_AUTOBOOT_STOP_STR_CRYPT
71 *
Steffen Jaeckel792a13f2021-07-08 15:57:37 +020072 * In case the config value CONFIG_AUTOBOOT_NEVER_TIMEOUT has been enabled
73 * this function never times out if the user presses the <Enter> key
74 * before starting to enter the password.
75 *
Steffen Jaeckel6aa6bfb2021-07-08 15:57:35 +020076 * @etime: Timeout value ticks (stop when get_ticks() reachs this)
Heinrich Schuchardt47b4c022022-01-19 18:05:50 +010077 * Return: 0 if autoboot should continue, 1 if it should stop
Steffen Jaeckel6aa6bfb2021-07-08 15:57:35 +020078 */
79static int passwd_abort_crypt(uint64_t etime)
80{
81 const char *crypt_env_str = env_get("bootstopkeycrypt");
Steffen Jaeckel092c8c62021-07-08 15:57:36 +020082 char presskey[DELAY_STOP_STR_MAX_LENGTH];
Steffen Jaeckel6aa6bfb2021-07-08 15:57:35 +020083 u_int presskey_len = 0;
84 int abort = 0;
Steffen Jaeckel792a13f2021-07-08 15:57:37 +020085 int never_timeout = 0;
Steffen Jaeckel6aa6bfb2021-07-08 15:57:35 +020086 int err;
87
88 if (IS_ENABLED(CONFIG_AUTOBOOT_STOP_STR_ENABLE) && !crypt_env_str)
Tom Rini0c23c5b2023-01-10 11:19:34 -050089 crypt_env_str = AUTOBOOT_STOP_STR_CRYPT;
Steffen Jaeckel6aa6bfb2021-07-08 15:57:35 +020090
91 if (!crypt_env_str)
92 return 0;
93
94 /* We expect the stop-string to be newline-terminated */
95 do {
96 if (tstc()) {
97 /* Check for input string overflow */
98 if (presskey_len >= sizeof(presskey))
99 return 0;
100
101 presskey[presskey_len] = getchar();
102
103 if ((presskey[presskey_len] == '\r') ||
104 (presskey[presskey_len] == '\n')) {
Steffen Jaeckel792a13f2021-07-08 15:57:37 +0200105 if (IS_ENABLED(CONFIG_AUTOBOOT_NEVER_TIMEOUT) &&
106 !presskey_len) {
107 never_timeout = 1;
108 continue;
109 }
Steffen Jaeckel6aa6bfb2021-07-08 15:57:35 +0200110 presskey[presskey_len] = '\0';
111 err = crypt_compare(crypt_env_str, presskey,
112 &abort);
113 if (err)
114 debug_bootkeys(
115 "crypt_compare() failed with: %s\n",
116 errno_str(err));
117 /* you had one chance */
118 break;
119 } else {
120 presskey_len++;
121 }
122 }
Rasmus Villemoesdb794c22022-09-27 11:54:02 +0200123 udelay(10000);
Steffen Jaeckel792a13f2021-07-08 15:57:37 +0200124 } while (never_timeout || get_ticks() <= etime);
Steffen Jaeckel6aa6bfb2021-07-08 15:57:35 +0200125
126 return abort;
127}
128
Stefan Roese0ed2e462015-05-18 14:08:24 +0200129/*
130 * Use a "constant-length" time compare function for this
131 * hash compare:
132 *
133 * https://crackstation.net/hashing-security.htm
Simon Glass7b6a95a2014-04-10 20:01:28 -0600134 */
Stefan Roese0ed2e462015-05-18 14:08:24 +0200135static int slow_equals(u8 *a, u8 *b, int len)
Simon Glass7b6a95a2014-04-10 20:01:28 -0600136{
Stefan Roese0ed2e462015-05-18 14:08:24 +0200137 int diff = 0;
138 int i;
139
140 for (i = 0; i < len; i++)
141 diff |= a[i] ^ b[i];
142
143 return diff == 0;
144}
145
Simon Glassa8cab882019-07-20 20:51:17 -0600146/**
147 * passwd_abort_sha256() - check for a hashed key sequence to abort booting
148 *
149 * This checks for the user entering a SHA256 hash within a given time.
150 *
151 * @etime: Timeout value ticks (stop when get_ticks() reachs this)
Heinrich Schuchardt47b4c022022-01-19 18:05:50 +0100152 * Return: 0 if autoboot should continue, 1 if it should stop
Simon Glassa8cab882019-07-20 20:51:17 -0600153 */
Simon Glass6a2e09f2019-07-20 20:51:16 -0600154static int passwd_abort_sha256(uint64_t etime)
Stefan Roese0ed2e462015-05-18 14:08:24 +0200155{
Simon Glass64b723f2017-08-03 12:22:12 -0600156 const char *sha_env_str = env_get("bootstopkeysha256");
Stefan Roese0ed2e462015-05-18 14:08:24 +0200157 u8 sha_env[SHA256_SUM_LEN];
Heiko Schocher2ef3a952019-07-29 07:23:19 +0200158 u8 *sha;
159 char *presskey;
Joel Peshkin8b7bf532020-11-21 17:18:59 -0800160 char *c;
Stefan Roese0ed2e462015-05-18 14:08:24 +0200161 const char *algo_name = "sha256";
162 u_int presskey_len = 0;
Simon Glass7b6a95a2014-04-10 20:01:28 -0600163 int abort = 0;
Martin Etnestad055afba2018-01-12 09:04:38 +0100164 int size = sizeof(sha);
Stefan Roese0ed2e462015-05-18 14:08:24 +0200165 int ret;
166
167 if (sha_env_str == NULL)
Tom Rini0c23c5b2023-01-10 11:19:34 -0500168 sha_env_str = AUTOBOOT_STOP_STR_SHA256;
Stefan Roese0ed2e462015-05-18 14:08:24 +0200169
Steffen Jaeckel092c8c62021-07-08 15:57:36 +0200170 presskey = malloc_cache_aligned(DELAY_STOP_STR_MAX_LENGTH);
Maks Mishinc5bd2892024-03-01 01:32:11 +0300171 if (!presskey)
172 return -ENOMEM;
173
Joel Peshkin8b7bf532020-11-21 17:18:59 -0800174 c = strstr(sha_env_str, ":");
Steffen Jaeckel092c8c62021-07-08 15:57:36 +0200175 if (c && (c - sha_env_str < DELAY_STOP_STR_MAX_LENGTH)) {
Joel Peshkin8b7bf532020-11-21 17:18:59 -0800176 /* preload presskey with salt */
177 memcpy(presskey, sha_env_str, c - sha_env_str);
178 presskey_len = c - sha_env_str;
179 sha_env_str = c + 1;
180 }
Stefan Roese0ed2e462015-05-18 14:08:24 +0200181 /*
182 * Generate the binary value from the environment hash value
183 * so that we can compare this value with the computed hash
184 * from the user input
185 */
186 ret = hash_parse_string(algo_name, sha_env_str, sha_env);
187 if (ret) {
188 printf("Hash %s not supported!\n", algo_name);
Anton Moryakov7f821742025-02-07 00:55:21 +0300189 free(presskey);
Stefan Roese0ed2e462015-05-18 14:08:24 +0200190 return 0;
191 }
192
Heiko Schocher2ef3a952019-07-29 07:23:19 +0200193 sha = malloc_cache_aligned(SHA256_SUM_LEN);
Anton Moryakov7f821742025-02-07 00:55:21 +0300194 if (!sha) {
195 free(presskey);
196 return -ENOMEM;
197 }
Heiko Schocher2ef3a952019-07-29 07:23:19 +0200198 size = SHA256_SUM_LEN;
Stefan Roese0ed2e462015-05-18 14:08:24 +0200199 /*
200 * We don't know how long the stop-string is, so we need to
201 * generate the sha256 hash upon each input character and
202 * compare the value with the one saved in the environment
203 */
204 do {
205 if (tstc()) {
206 /* Check for input string overflow */
Steffen Jaeckel092c8c62021-07-08 15:57:36 +0200207 if (presskey_len >= DELAY_STOP_STR_MAX_LENGTH) {
Heiko Schocher2ef3a952019-07-29 07:23:19 +0200208 free(presskey);
209 free(sha);
Stefan Roese0ed2e462015-05-18 14:08:24 +0200210 return 0;
Heiko Schocher2ef3a952019-07-29 07:23:19 +0200211 }
Stefan Roese0ed2e462015-05-18 14:08:24 +0200212
Heinrich Schuchardtc4954fb2020-10-07 18:11:48 +0200213 presskey[presskey_len++] = getchar();
Stefan Roese0ed2e462015-05-18 14:08:24 +0200214
215 /* Calculate sha256 upon each new char */
216 hash_block(algo_name, (const void *)presskey,
217 presskey_len, sha, &size);
218
219 /* And check if sha matches saved value in env */
220 if (slow_equals(sha, sha_env, SHA256_SUM_LEN))
221 abort = 1;
222 }
Rasmus Villemoesdb794c22022-09-27 11:54:02 +0200223 udelay(10000);
Stefan Roese0ed2e462015-05-18 14:08:24 +0200224 } while (!abort && get_ticks() <= etime);
225
Heiko Schocher2ef3a952019-07-29 07:23:19 +0200226 free(presskey);
227 free(sha);
Stefan Roese0ed2e462015-05-18 14:08:24 +0200228 return abort;
229}
Simon Glass6a2e09f2019-07-20 20:51:16 -0600230
Simon Glassa8cab882019-07-20 20:51:17 -0600231/**
232 * passwd_abort_key() - check for a key sequence to aborted booting
233 *
234 * This checks for the user entering a string within a given time.
235 *
236 * @etime: Timeout value ticks (stop when get_ticks() reachs this)
Heinrich Schuchardt47b4c022022-01-19 18:05:50 +0100237 * Return: 0 if autoboot should continue, 1 if it should stop
Simon Glassa8cab882019-07-20 20:51:17 -0600238 */
Simon Glass6a2e09f2019-07-20 20:51:16 -0600239static int passwd_abort_key(uint64_t etime)
Stefan Roese0ed2e462015-05-18 14:08:24 +0200240{
241 int abort = 0;
Simon Glass7b6a95a2014-04-10 20:01:28 -0600242 struct {
243 char *str;
244 u_int len;
245 int retry;
246 }
247 delaykey[] = {
Simon Glass64b723f2017-08-03 12:22:12 -0600248 { .str = env_get("bootdelaykey"), .retry = 1 },
249 { .str = env_get("bootstopkey"), .retry = 0 },
Simon Glass7b6a95a2014-04-10 20:01:28 -0600250 };
251
Steffen Jaeckel092c8c62021-07-08 15:57:36 +0200252 char presskey[DELAY_STOP_STR_MAX_LENGTH];
Yuezhang.Mo@sony.comd8eeb0f2021-01-15 03:11:49 +0000253 int presskey_len = 0;
254 int presskey_max = 0;
255 int i;
Simon Glass7b6a95a2014-04-10 20:01:28 -0600256
Simon Glass7b6a95a2014-04-10 20:01:28 -0600257# ifdef CONFIG_AUTOBOOT_DELAY_STR
258 if (delaykey[0].str == NULL)
259 delaykey[0].str = CONFIG_AUTOBOOT_DELAY_STR;
260# endif
Simon Glass7b6a95a2014-04-10 20:01:28 -0600261# ifdef CONFIG_AUTOBOOT_STOP_STR
Stefan Roese0a48c7a2015-05-18 14:08:22 +0200262 if (delaykey[1].str == NULL)
263 delaykey[1].str = CONFIG_AUTOBOOT_STOP_STR;
Simon Glass7b6a95a2014-04-10 20:01:28 -0600264# endif
265
266 for (i = 0; i < sizeof(delaykey) / sizeof(delaykey[0]); i++) {
267 delaykey[i].len = delaykey[i].str == NULL ?
268 0 : strlen(delaykey[i].str);
Steffen Jaeckel092c8c62021-07-08 15:57:36 +0200269 delaykey[i].len = delaykey[i].len > DELAY_STOP_STR_MAX_LENGTH ?
270 DELAY_STOP_STR_MAX_LENGTH : delaykey[i].len;
Simon Glass7b6a95a2014-04-10 20:01:28 -0600271
272 presskey_max = presskey_max > delaykey[i].len ?
273 presskey_max : delaykey[i].len;
274
275 debug_bootkeys("%s key:<%s>\n",
276 delaykey[i].retry ? "delay" : "stop",
277 delaykey[i].str ? delaykey[i].str : "NULL");
278 }
279
280 /* In order to keep up with incoming data, check timeout only
281 * when catch up.
282 */
283 do {
284 if (tstc()) {
285 if (presskey_len < presskey_max) {
Heinrich Schuchardtc4954fb2020-10-07 18:11:48 +0200286 presskey[presskey_len++] = getchar();
Simon Glass7b6a95a2014-04-10 20:01:28 -0600287 } else {
288 for (i = 0; i < presskey_max - 1; i++)
289 presskey[i] = presskey[i + 1];
290
Heinrich Schuchardtc4954fb2020-10-07 18:11:48 +0200291 presskey[i] = getchar();
Simon Glass7b6a95a2014-04-10 20:01:28 -0600292 }
293 }
294
295 for (i = 0; i < sizeof(delaykey) / sizeof(delaykey[0]); i++) {
296 if (delaykey[i].len > 0 &&
297 presskey_len >= delaykey[i].len &&
298 memcmp(presskey + presskey_len -
299 delaykey[i].len, delaykey[i].str,
300 delaykey[i].len) == 0) {
301 debug_bootkeys("got %skey\n",
302 delaykey[i].retry ? "delay" :
303 "stop");
304
Simon Glass7b6a95a2014-04-10 20:01:28 -0600305 /* don't retry auto boot */
306 if (!delaykey[i].retry)
307 bootretry_dont_retry();
Simon Glass7b6a95a2014-04-10 20:01:28 -0600308 abort = 1;
309 }
310 }
Rasmus Villemoesdb794c22022-09-27 11:54:02 +0200311 udelay(10000);
Simon Glass7b6a95a2014-04-10 20:01:28 -0600312 } while (!abort && get_ticks() <= etime);
313
Stefan Roese0ed2e462015-05-18 14:08:24 +0200314 return abort;
315}
Stefan Roese0ed2e462015-05-18 14:08:24 +0200316
Steffen Jaeckeldfc97322021-07-08 15:57:38 +0200317/**
318 * flush_stdin() - drops all pending characters from stdin
319 */
320static void flush_stdin(void)
321{
322 while (tstc())
323 (void)getchar();
324}
325
Steffen Jaeckel28be70d2021-07-08 15:57:39 +0200326/**
327 * fallback_to_sha256() - check whether we should fall back to sha256
328 * password checking
329 *
330 * This checks for the environment variable `bootstopusesha256` in case
331 * sha256-fallback has been enabled via the config setting
332 * `AUTOBOOT_SHA256_FALLBACK`.
333 *
Heinrich Schuchardt47b4c022022-01-19 18:05:50 +0100334 * Return: `false` if we must not fall-back, `true` if plain sha256 should be tried
Steffen Jaeckel28be70d2021-07-08 15:57:39 +0200335 */
336static bool fallback_to_sha256(void)
337{
338 if (IS_ENABLED(CONFIG_AUTOBOOT_SHA256_FALLBACK))
339 return env_get_yesno("bootstopusesha256") == 1;
340 else if (IS_ENABLED(CONFIG_CRYPT_PW))
341 return false;
342 else
343 return true;
344}
345
Stefan Roese0ed2e462015-05-18 14:08:24 +0200346/***************************************************************************
347 * Watch for 'delay' seconds for autoboot stop or autoboot delay string.
348 * returns: 0 - no key string, allow autoboot 1 - got key string, abort
349 */
Simon Glass6d99d132019-07-20 20:51:19 -0600350static int abortboot_key_sequence(int bootdelay)
Stefan Roese0ed2e462015-05-18 14:08:24 +0200351{
352 int abort;
353 uint64_t etime = endtick(bootdelay);
354
Steffen Jaeckeldfc97322021-07-08 15:57:38 +0200355 if (IS_ENABLED(CONFIG_AUTOBOOT_FLUSH_STDIN))
356 flush_stdin();
Stefan Roese0ed2e462015-05-18 14:08:24 +0200357# ifdef CONFIG_AUTOBOOT_PROMPT
358 /*
359 * CONFIG_AUTOBOOT_PROMPT includes the %d for all boards.
360 * To print the bootdelay value upon bootup.
361 */
362 printf(CONFIG_AUTOBOOT_PROMPT, bootdelay);
363# endif
364
Steffen Jaeckel6aa6bfb2021-07-08 15:57:35 +0200365 if (IS_ENABLED(CONFIG_AUTOBOOT_ENCRYPTION)) {
Steffen Jaeckel28be70d2021-07-08 15:57:39 +0200366 if (IS_ENABLED(CONFIG_CRYPT_PW) && !fallback_to_sha256())
Steffen Jaeckel6aa6bfb2021-07-08 15:57:35 +0200367 abort = passwd_abort_crypt(etime);
368 else
369 abort = passwd_abort_sha256(etime);
370 } else {
Simon Glass6a2e09f2019-07-20 20:51:16 -0600371 abort = passwd_abort_key(etime);
Steffen Jaeckel6aa6bfb2021-07-08 15:57:35 +0200372 }
Simon Glass7b6a95a2014-04-10 20:01:28 -0600373 if (!abort)
374 debug_bootkeys("key timeout\n");
375
Simon Glass7b6a95a2014-04-10 20:01:28 -0600376 return abort;
377}
378
Simon Glass6d99d132019-07-20 20:51:19 -0600379static int abortboot_single_key(int bootdelay)
Simon Glass7b6a95a2014-04-10 20:01:28 -0600380{
381 int abort = 0;
382 unsigned long ts;
383
Masahiro Yamada9a333862016-06-27 16:23:04 +0900384 printf("Hit any key to stop autoboot: %2d ", bootdelay);
Simon Glass7b6a95a2014-04-10 20:01:28 -0600385
Simon Glass7b6a95a2014-04-10 20:01:28 -0600386 /*
387 * Check if key already pressed
Simon Glass7b6a95a2014-04-10 20:01:28 -0600388 */
Masahiro Yamada9a333862016-06-27 16:23:04 +0900389 if (tstc()) { /* we got a key press */
Heinrich Schuchardtc4954fb2020-10-07 18:11:48 +0200390 getchar(); /* consume input */
Masahiro Yamada9a333862016-06-27 16:23:04 +0900391 puts("\b\b\b 0");
392 abort = 1; /* don't auto boot */
Simon Glass7b6a95a2014-04-10 20:01:28 -0600393 }
Simon Glass7b6a95a2014-04-10 20:01:28 -0600394
395 while ((bootdelay > 0) && (!abort)) {
396 --bootdelay;
397 /* delay 1000 ms */
398 ts = get_timer(0);
399 do {
400 if (tstc()) { /* we got a key press */
Simon Glass9d983852019-07-20 20:51:23 -0600401 int key;
402
Simon Glass7b6a95a2014-04-10 20:01:28 -0600403 abort = 1; /* don't auto boot */
404 bootdelay = 0; /* no more delay */
Heinrich Schuchardtc4954fb2020-10-07 18:11:48 +0200405 key = getchar();/* consume input */
Da Xue3769e552021-06-21 22:39:19 -0400406 if (IS_ENABLED(CONFIG_AUTOBOOT_USE_MENUKEY))
Simon Glass9d983852019-07-20 20:51:23 -0600407 menukey = key;
Simon Glass7b6a95a2014-04-10 20:01:28 -0600408 break;
409 }
410 udelay(10000);
411 } while (!abort && get_timer(ts) < 1000);
412
413 printf("\b\b\b%2d ", bootdelay);
414 }
415
416 putc('\n');
417
Simon Glass7b6a95a2014-04-10 20:01:28 -0600418 return abort;
419}
Simon Glass7b6a95a2014-04-10 20:01:28 -0600420
421static int abortboot(int bootdelay)
422{
Masahiro Yamada9a333862016-06-27 16:23:04 +0900423 int abort = 0;
Masahiro Yamadad88f8722016-06-27 16:23:03 +0900424
Simon Glass6d99d132019-07-20 20:51:19 -0600425 if (bootdelay >= 0) {
Simon Glassd8c60172021-07-24 15:14:39 -0600426 if (autoboot_keyed())
Simon Glass6d99d132019-07-20 20:51:19 -0600427 abort = abortboot_key_sequence(bootdelay);
428 else
429 abort = abortboot_single_key(bootdelay);
430 }
Masahiro Yamadad88f8722016-06-27 16:23:03 +0900431
Simon Glass3a315052019-07-20 20:51:18 -0600432 if (IS_ENABLED(CONFIG_SILENT_CONSOLE) && abort)
Masahiro Yamadad88f8722016-06-27 16:23:03 +0900433 gd->flags &= ~GD_FLG_SILENT;
Masahiro Yamadad88f8722016-06-27 16:23:03 +0900434
435 return abort;
Simon Glass7b6a95a2014-04-10 20:01:28 -0600436}
437
Shenlin Liangbb0f62a2022-12-02 12:53:48 +0800438static void process_fdt_options(void)
Simon Glass7b6a95a2014-04-10 20:01:28 -0600439{
Simon Glass72cc5382022-10-20 18:22:39 -0600440#ifdef CONFIG_TEXT_BASE
Simon Glass7b6a95a2014-04-10 20:01:28 -0600441 ulong addr;
442
443 /* Add an env variable to point to a kernel payload, if available */
Simon Glass0034d962021-08-07 07:24:01 -0600444 addr = ofnode_conf_read_int("kernel-offset", 0);
Simon Glass7b6a95a2014-04-10 20:01:28 -0600445 if (addr)
Simon Glass72cc5382022-10-20 18:22:39 -0600446 env_set_addr("kernaddr", (void *)(CONFIG_TEXT_BASE + addr));
Simon Glass7b6a95a2014-04-10 20:01:28 -0600447
448 /* Add an env variable to point to a root disk, if available */
Simon Glass0034d962021-08-07 07:24:01 -0600449 addr = ofnode_conf_read_int("rootdisk-offset", 0);
Simon Glass7b6a95a2014-04-10 20:01:28 -0600450 if (addr)
Simon Glass72cc5382022-10-20 18:22:39 -0600451 env_set_addr("rootaddr", (void *)(CONFIG_TEXT_BASE + addr));
452#endif /* CONFIG_TEXT_BASE */
Simon Glass5b47e302014-04-10 20:01:35 -0600453}
Simon Glass7b6a95a2014-04-10 20:01:28 -0600454
Simon Glass5b47e302014-04-10 20:01:35 -0600455const char *bootdelay_process(void)
Simon Glass7b6a95a2014-04-10 20:01:28 -0600456{
Simon Glass7b6a95a2014-04-10 20:01:28 -0600457 char *s;
458 int bootdelay;
Simon Glass7b6a95a2014-04-10 20:01:28 -0600459
Lukasz Majewski4fc18912018-05-02 16:10:53 +0200460 bootcount_inc();
Simon Glass7b6a95a2014-04-10 20:01:28 -0600461
Simon Glass64b723f2017-08-03 12:22:12 -0600462 s = env_get("bootdelay");
Simon Glass7b6a95a2014-04-10 20:01:28 -0600463 bootdelay = s ? (int)simple_strtol(s, NULL, 10) : CONFIG_BOOTDELAY;
464
Simon Glassb8ffa142022-03-11 16:22:38 -0700465 /*
466 * Does it really make sense that the devicetree overrides the user
467 * setting? It is possibly helpful for security since the device tree
468 * may be signed whereas the environment is often loaded from storage.
469 */
Simon Glassb97ace52019-07-20 20:51:27 -0600470 if (IS_ENABLED(CONFIG_OF_CONTROL))
Simon Glass0034d962021-08-07 07:24:01 -0600471 bootdelay = ofnode_conf_read_int("bootdelay", bootdelay);
Simon Glass7b6a95a2014-04-10 20:01:28 -0600472
473 debug("### main_loop entered: bootdelay=%d\n\n", bootdelay);
474
Simon Glassb97ace52019-07-20 20:51:27 -0600475 if (IS_ENABLED(CONFIG_AUTOBOOT_MENU_SHOW))
476 bootdelay = menu_show(bootdelay);
Simon Glass09007c42014-04-10 20:01:31 -0600477 bootretry_init_cmd_timeout();
Simon Glass7b6a95a2014-04-10 20:01:28 -0600478
479#ifdef CONFIG_POST
480 if (gd->flags & GD_FLG_POSTFAIL) {
Simon Glass64b723f2017-08-03 12:22:12 -0600481 s = env_get("failbootcmd");
Simon Glass7b6a95a2014-04-10 20:01:28 -0600482 } else
483#endif /* CONFIG_POST */
Lukasz Majewski4fc18912018-05-02 16:10:53 +0200484 if (bootcount_error())
Simon Glass64b723f2017-08-03 12:22:12 -0600485 s = env_get("altbootcmd");
Lukasz Majewski4fc18912018-05-02 16:10:53 +0200486 else
Simon Glass64b723f2017-08-03 12:22:12 -0600487 s = env_get("bootcmd");
Simon Glass7b6a95a2014-04-10 20:01:28 -0600488
Simon Glassb97ace52019-07-20 20:51:27 -0600489 if (IS_ENABLED(CONFIG_OF_CONTROL))
Shenlin Liangbb0f62a2022-12-02 12:53:48 +0800490 process_fdt_options();
Simon Glass5b47e302014-04-10 20:01:35 -0600491 stored_bootdelay = bootdelay;
Simon Glass7b6a95a2014-04-10 20:01:28 -0600492
Simon Glass5b47e302014-04-10 20:01:35 -0600493 return s;
494}
Simon Glass7b6a95a2014-04-10 20:01:28 -0600495
Simon Glass5b47e302014-04-10 20:01:35 -0600496void autoboot_command(const char *s)
497{
Simon Glass7b6a95a2014-04-10 20:01:28 -0600498 debug("### main_loop: bootcmd=\"%s\"\n", s ? s : "<UNDEFINED>");
499
Heiko Schocher12803652020-10-07 08:06:54 +0200500 if (s && (stored_bootdelay == -2 ||
501 (stored_bootdelay != -1 && !abortboot(stored_bootdelay)))) {
Simon Glass313fcbd2019-07-20 20:51:28 -0600502 bool lock;
503 int prev;
504
Simon Glassd8c60172021-07-24 15:14:39 -0600505 lock = autoboot_keyed() &&
Simon Glass313fcbd2019-07-20 20:51:28 -0600506 !IS_ENABLED(CONFIG_AUTOBOOT_KEYED_CTRLC);
507 if (lock)
508 prev = disable_ctrlc(1); /* disable Ctrl-C checking */
Simon Glass7b6a95a2014-04-10 20:01:28 -0600509
510 run_command_list(s, -1, 0);
511
Simon Glass313fcbd2019-07-20 20:51:28 -0600512 if (lock)
513 disable_ctrlc(prev); /* restore Ctrl-C checking */
Simon Glass7b6a95a2014-04-10 20:01:28 -0600514 }
515
Da Xue3769e552021-06-21 22:39:19 -0400516 if (IS_ENABLED(CONFIG_AUTOBOOT_USE_MENUKEY) &&
Simon Glass9d983852019-07-20 20:51:23 -0600517 menukey == AUTOBOOT_MENUKEY) {
Simon Glass64b723f2017-08-03 12:22:12 -0600518 s = env_get("menucmd");
Simon Glass7b6a95a2014-04-10 20:01:28 -0600519 if (s)
520 run_command_list(s, -1, 0);
521 }
Simon Glassd8c60172021-07-24 15:14:39 -0600522}