blob: 9752470873c5de9b814aa39888eb96ca0517e334 [file] [log] [blame]
Tom Rini83d290c2018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0+
Simon Glass66ded172014-04-10 20:01:28 -06002/*
3 * (C) Copyright 2000
4 * Wolfgang Denk, DENX Software Engineering, wd@denx.de.
Simon Glass66ded172014-04-10 20:01:28 -06005 */
6
7#include <common.h>
Jeroen Hofstee39e12302014-07-13 22:57:58 +02008#include <autoboot.h>
Simon Glass0098e172014-04-10 20:01:30 -06009#include <bootretry.h>
Simon Glass66ded172014-04-10 20:01:28 -060010#include <cli.h>
Simon Glass24b852a2015-11-08 23:47:45 -070011#include <console.h>
Simon Glass66ded172014-04-10 20:01:28 -060012#include <fdtdec.h>
Simon Glasse8c78052019-07-20 20:51:16 -060013#include <hash.h>
Simon Glass66ded172014-04-10 20:01:28 -060014#include <menu.h>
15#include <post.h>
Stefan Roese8f0b1e22015-05-18 14:08:24 +020016#include <u-boot/sha256.h>
Lukasz Majewskibc8c4402018-05-02 16:10:53 +020017#include <bootcount.h>
Simon Glass66ded172014-04-10 20:01:28 -060018
19DECLARE_GLOBAL_DATA_PTR;
20
21#define MAX_DELAY_STOP_STR 32
22
23#ifndef DEBUG_BOOTKEYS
24#define DEBUG_BOOTKEYS 0
25#endif
26#define debug_bootkeys(fmt, args...) \
27 debug_cond(DEBUG_BOOTKEYS, fmt, ##args)
28
Simon Glassaffb2152014-04-10 20:01:35 -060029/* Stored value of bootdelay, used by autoboot_command() */
30static int stored_bootdelay;
Simon Glassd915ad22019-07-20 20:51:23 -060031static int menukey;
Simon Glassaffb2152014-04-10 20:01:35 -060032
Simon Glass0c4bd312019-07-20 20:51:15 -060033#ifdef CONFIG_AUTOBOOT_ENCRYPTION
34#define AUTOBOOT_STOP_STR_SHA256 CONFIG_AUTOBOOT_STOP_STR_SHA256
35#else
36#define AUTOBOOT_STOP_STR_SHA256 ""
37#endif
38
Simon Glassd915ad22019-07-20 20:51:23 -060039#ifdef CONFIG_USE_AUTOBOOT_MENUKEY
40#define AUTOBOOT_MENUKEY CONFIG_USE_AUTOBOOT_MENUKEY
41#else
42#define AUTOBOOT_MENUKEY 0
43#endif
44
Stefan Roese8f0b1e22015-05-18 14:08:24 +020045/*
46 * Use a "constant-length" time compare function for this
47 * hash compare:
48 *
49 * https://crackstation.net/hashing-security.htm
Simon Glass66ded172014-04-10 20:01:28 -060050 */
Stefan Roese8f0b1e22015-05-18 14:08:24 +020051static int slow_equals(u8 *a, u8 *b, int len)
52{
53 int diff = 0;
54 int i;
55
56 for (i = 0; i < len; i++)
57 diff |= a[i] ^ b[i];
58
59 return diff == 0;
60}
61
Simon Glass88fa4be2019-07-20 20:51:17 -060062/**
63 * passwd_abort_sha256() - check for a hashed key sequence to abort booting
64 *
65 * This checks for the user entering a SHA256 hash within a given time.
66 *
67 * @etime: Timeout value ticks (stop when get_ticks() reachs this)
68 * @return 0 if autoboot should continue, 1 if it should stop
69 */
Simon Glasse8c78052019-07-20 20:51:16 -060070static int passwd_abort_sha256(uint64_t etime)
Stefan Roese8f0b1e22015-05-18 14:08:24 +020071{
Simon Glass00caae62017-08-03 12:22:12 -060072 const char *sha_env_str = env_get("bootstopkeysha256");
Stefan Roese8f0b1e22015-05-18 14:08:24 +020073 u8 sha_env[SHA256_SUM_LEN];
74 u8 sha[SHA256_SUM_LEN];
75 char presskey[MAX_DELAY_STOP_STR];
76 const char *algo_name = "sha256";
77 u_int presskey_len = 0;
78 int abort = 0;
Martin Etnestad2d06fd82018-01-12 09:04:38 +010079 int size = sizeof(sha);
Stefan Roese8f0b1e22015-05-18 14:08:24 +020080 int ret;
81
82 if (sha_env_str == NULL)
Simon Glass0c4bd312019-07-20 20:51:15 -060083 sha_env_str = AUTOBOOT_STOP_STR_SHA256;
Stefan Roese8f0b1e22015-05-18 14:08:24 +020084
85 /*
86 * Generate the binary value from the environment hash value
87 * so that we can compare this value with the computed hash
88 * from the user input
89 */
90 ret = hash_parse_string(algo_name, sha_env_str, sha_env);
91 if (ret) {
92 printf("Hash %s not supported!\n", algo_name);
93 return 0;
94 }
95
96 /*
97 * We don't know how long the stop-string is, so we need to
98 * generate the sha256 hash upon each input character and
99 * compare the value with the one saved in the environment
100 */
101 do {
102 if (tstc()) {
103 /* Check for input string overflow */
104 if (presskey_len >= MAX_DELAY_STOP_STR)
105 return 0;
106
107 presskey[presskey_len++] = getc();
108
109 /* Calculate sha256 upon each new char */
110 hash_block(algo_name, (const void *)presskey,
111 presskey_len, sha, &size);
112
113 /* And check if sha matches saved value in env */
114 if (slow_equals(sha, sha_env, SHA256_SUM_LEN))
115 abort = 1;
116 }
117 } while (!abort && get_ticks() <= etime);
118
119 return abort;
120}
Simon Glasse8c78052019-07-20 20:51:16 -0600121
Simon Glass88fa4be2019-07-20 20:51:17 -0600122/**
123 * passwd_abort_key() - check for a key sequence to aborted booting
124 *
125 * This checks for the user entering a string within a given time.
126 *
127 * @etime: Timeout value ticks (stop when get_ticks() reachs this)
128 * @return 0 if autoboot should continue, 1 if it should stop
129 */
Simon Glasse8c78052019-07-20 20:51:16 -0600130static int passwd_abort_key(uint64_t etime)
Simon Glass66ded172014-04-10 20:01:28 -0600131{
132 int abort = 0;
Simon Glass66ded172014-04-10 20:01:28 -0600133 struct {
134 char *str;
135 u_int len;
136 int retry;
137 }
138 delaykey[] = {
Simon Glass00caae62017-08-03 12:22:12 -0600139 { .str = env_get("bootdelaykey"), .retry = 1 },
140 { .str = env_get("bootstopkey"), .retry = 0 },
Simon Glass66ded172014-04-10 20:01:28 -0600141 };
142
143 char presskey[MAX_DELAY_STOP_STR];
144 u_int presskey_len = 0;
145 u_int presskey_max = 0;
146 u_int i;
147
Simon Glass66ded172014-04-10 20:01:28 -0600148# ifdef CONFIG_AUTOBOOT_DELAY_STR
149 if (delaykey[0].str == NULL)
150 delaykey[0].str = CONFIG_AUTOBOOT_DELAY_STR;
151# endif
Simon Glass66ded172014-04-10 20:01:28 -0600152# ifdef CONFIG_AUTOBOOT_STOP_STR
Stefan Roese2d908fa2015-05-18 14:08:22 +0200153 if (delaykey[1].str == NULL)
154 delaykey[1].str = CONFIG_AUTOBOOT_STOP_STR;
Simon Glass66ded172014-04-10 20:01:28 -0600155# endif
156
157 for (i = 0; i < sizeof(delaykey) / sizeof(delaykey[0]); i++) {
158 delaykey[i].len = delaykey[i].str == NULL ?
159 0 : strlen(delaykey[i].str);
160 delaykey[i].len = delaykey[i].len > MAX_DELAY_STOP_STR ?
161 MAX_DELAY_STOP_STR : delaykey[i].len;
162
163 presskey_max = presskey_max > delaykey[i].len ?
164 presskey_max : delaykey[i].len;
165
166 debug_bootkeys("%s key:<%s>\n",
167 delaykey[i].retry ? "delay" : "stop",
168 delaykey[i].str ? delaykey[i].str : "NULL");
169 }
170
171 /* In order to keep up with incoming data, check timeout only
172 * when catch up.
173 */
174 do {
175 if (tstc()) {
176 if (presskey_len < presskey_max) {
177 presskey[presskey_len++] = getc();
178 } else {
179 for (i = 0; i < presskey_max - 1; i++)
180 presskey[i] = presskey[i + 1];
181
182 presskey[i] = getc();
183 }
184 }
185
186 for (i = 0; i < sizeof(delaykey) / sizeof(delaykey[0]); i++) {
187 if (delaykey[i].len > 0 &&
188 presskey_len >= delaykey[i].len &&
189 memcmp(presskey + presskey_len -
190 delaykey[i].len, delaykey[i].str,
191 delaykey[i].len) == 0) {
192 debug_bootkeys("got %skey\n",
193 delaykey[i].retry ? "delay" :
194 "stop");
195
Simon Glass66ded172014-04-10 20:01:28 -0600196 /* don't retry auto boot */
197 if (!delaykey[i].retry)
198 bootretry_dont_retry();
Simon Glass66ded172014-04-10 20:01:28 -0600199 abort = 1;
200 }
201 }
202 } while (!abort && get_ticks() <= etime);
203
Stefan Roese8f0b1e22015-05-18 14:08:24 +0200204 return abort;
205}
Stefan Roese8f0b1e22015-05-18 14:08:24 +0200206
207/***************************************************************************
208 * Watch for 'delay' seconds for autoboot stop or autoboot delay string.
209 * returns: 0 - no key string, allow autoboot 1 - got key string, abort
210 */
Simon Glasse79e4b22019-07-20 20:51:19 -0600211static int abortboot_key_sequence(int bootdelay)
Stefan Roese8f0b1e22015-05-18 14:08:24 +0200212{
213 int abort;
214 uint64_t etime = endtick(bootdelay);
215
Stefan Roese8f0b1e22015-05-18 14:08:24 +0200216# ifdef CONFIG_AUTOBOOT_PROMPT
217 /*
218 * CONFIG_AUTOBOOT_PROMPT includes the %d for all boards.
219 * To print the bootdelay value upon bootup.
220 */
221 printf(CONFIG_AUTOBOOT_PROMPT, bootdelay);
222# endif
223
Simon Glasse8c78052019-07-20 20:51:16 -0600224 if (IS_ENABLED(CONFIG_AUTOBOOT_ENCRYPTION))
225 abort = passwd_abort_sha256(etime);
226 else
227 abort = passwd_abort_key(etime);
Simon Glass66ded172014-04-10 20:01:28 -0600228 if (!abort)
229 debug_bootkeys("key timeout\n");
230
Simon Glass66ded172014-04-10 20:01:28 -0600231 return abort;
232}
233
Simon Glasse79e4b22019-07-20 20:51:19 -0600234static int abortboot_single_key(int bootdelay)
Simon Glass66ded172014-04-10 20:01:28 -0600235{
236 int abort = 0;
237 unsigned long ts;
238
Masahiro Yamada46327392016-06-27 16:23:04 +0900239 printf("Hit any key to stop autoboot: %2d ", bootdelay);
Simon Glass66ded172014-04-10 20:01:28 -0600240
Simon Glass66ded172014-04-10 20:01:28 -0600241 /*
242 * Check if key already pressed
Simon Glass66ded172014-04-10 20:01:28 -0600243 */
Masahiro Yamada46327392016-06-27 16:23:04 +0900244 if (tstc()) { /* we got a key press */
245 (void) getc(); /* consume input */
246 puts("\b\b\b 0");
247 abort = 1; /* don't auto boot */
Simon Glass66ded172014-04-10 20:01:28 -0600248 }
Simon Glass66ded172014-04-10 20:01:28 -0600249
250 while ((bootdelay > 0) && (!abort)) {
251 --bootdelay;
252 /* delay 1000 ms */
253 ts = get_timer(0);
254 do {
255 if (tstc()) { /* we got a key press */
Simon Glassd915ad22019-07-20 20:51:23 -0600256 int key;
257
Simon Glass66ded172014-04-10 20:01:28 -0600258 abort = 1; /* don't auto boot */
259 bootdelay = 0; /* no more delay */
Simon Glassd915ad22019-07-20 20:51:23 -0600260 key = getc(); /* consume input */
261 if (IS_ENABLED(CONFIG_USE_AUTOBOOT_MENUKEY))
262 menukey = key;
Simon Glass66ded172014-04-10 20:01:28 -0600263 break;
264 }
265 udelay(10000);
266 } while (!abort && get_timer(ts) < 1000);
267
268 printf("\b\b\b%2d ", bootdelay);
269 }
270
271 putc('\n');
272
Simon Glass66ded172014-04-10 20:01:28 -0600273 return abort;
274}
Simon Glass66ded172014-04-10 20:01:28 -0600275
276static int abortboot(int bootdelay)
277{
Masahiro Yamada46327392016-06-27 16:23:04 +0900278 int abort = 0;
Masahiro Yamada09b9d9e2016-06-27 16:23:03 +0900279
Simon Glasse79e4b22019-07-20 20:51:19 -0600280 if (bootdelay >= 0) {
281 if (IS_ENABLED(CONFIG_AUTOBOOT_KEYED))
282 abort = abortboot_key_sequence(bootdelay);
283 else
284 abort = abortboot_single_key(bootdelay);
285 }
Masahiro Yamada09b9d9e2016-06-27 16:23:03 +0900286
Simon Glass42b4d142019-07-20 20:51:18 -0600287 if (IS_ENABLED(CONFIG_SILENT_CONSOLE) && abort)
Masahiro Yamada09b9d9e2016-06-27 16:23:03 +0900288 gd->flags &= ~GD_FLG_SILENT;
Masahiro Yamada09b9d9e2016-06-27 16:23:03 +0900289
290 return abort;
Simon Glass66ded172014-04-10 20:01:28 -0600291}
292
Simon Glass66ded172014-04-10 20:01:28 -0600293static void process_fdt_options(const void *blob)
294{
Stefan Roese9f736902016-01-28 17:34:40 +0100295#if defined(CONFIG_OF_CONTROL) && defined(CONFIG_SYS_TEXT_BASE)
Simon Glass66ded172014-04-10 20:01:28 -0600296 ulong addr;
297
298 /* Add an env variable to point to a kernel payload, if available */
299 addr = fdtdec_get_config_int(gd->fdt_blob, "kernel-offset", 0);
300 if (addr)
Simon Glass018f5302017-08-03 12:22:10 -0600301 env_set_addr("kernaddr", (void *)(CONFIG_SYS_TEXT_BASE + addr));
Simon Glass66ded172014-04-10 20:01:28 -0600302
303 /* Add an env variable to point to a root disk, if available */
304 addr = fdtdec_get_config_int(gd->fdt_blob, "rootdisk-offset", 0);
305 if (addr)
Simon Glass018f5302017-08-03 12:22:10 -0600306 env_set_addr("rootaddr", (void *)(CONFIG_SYS_TEXT_BASE + addr));
Stefan Roese9f736902016-01-28 17:34:40 +0100307#endif /* CONFIG_OF_CONTROL && CONFIG_SYS_TEXT_BASE */
Simon Glassaffb2152014-04-10 20:01:35 -0600308}
Simon Glass66ded172014-04-10 20:01:28 -0600309
Simon Glassaffb2152014-04-10 20:01:35 -0600310const char *bootdelay_process(void)
Simon Glass66ded172014-04-10 20:01:28 -0600311{
Simon Glass66ded172014-04-10 20:01:28 -0600312 char *s;
313 int bootdelay;
Simon Glass66ded172014-04-10 20:01:28 -0600314
Lukasz Majewskibc8c4402018-05-02 16:10:53 +0200315 bootcount_inc();
Simon Glass66ded172014-04-10 20:01:28 -0600316
Simon Glass00caae62017-08-03 12:22:12 -0600317 s = env_get("bootdelay");
Simon Glass66ded172014-04-10 20:01:28 -0600318 bootdelay = s ? (int)simple_strtol(s, NULL, 10) : CONFIG_BOOTDELAY;
319
320#ifdef CONFIG_OF_CONTROL
321 bootdelay = fdtdec_get_config_int(gd->fdt_blob, "bootdelay",
322 bootdelay);
323#endif
324
325 debug("### main_loop entered: bootdelay=%d\n\n", bootdelay);
326
327#if defined(CONFIG_MENU_SHOW)
328 bootdelay = menu_show(bootdelay);
329#endif
Simon Glassb26440f2014-04-10 20:01:31 -0600330 bootretry_init_cmd_timeout();
Simon Glass66ded172014-04-10 20:01:28 -0600331
332#ifdef CONFIG_POST
333 if (gd->flags & GD_FLG_POSTFAIL) {
Simon Glass00caae62017-08-03 12:22:12 -0600334 s = env_get("failbootcmd");
Simon Glass66ded172014-04-10 20:01:28 -0600335 } else
336#endif /* CONFIG_POST */
Lukasz Majewskibc8c4402018-05-02 16:10:53 +0200337 if (bootcount_error())
Simon Glass00caae62017-08-03 12:22:12 -0600338 s = env_get("altbootcmd");
Lukasz Majewskibc8c4402018-05-02 16:10:53 +0200339 else
Simon Glass00caae62017-08-03 12:22:12 -0600340 s = env_get("bootcmd");
Simon Glass66ded172014-04-10 20:01:28 -0600341
342 process_fdt_options(gd->fdt_blob);
Simon Glassaffb2152014-04-10 20:01:35 -0600343 stored_bootdelay = bootdelay;
Simon Glass66ded172014-04-10 20:01:28 -0600344
Simon Glassaffb2152014-04-10 20:01:35 -0600345 return s;
346}
Simon Glass66ded172014-04-10 20:01:28 -0600347
Simon Glassaffb2152014-04-10 20:01:35 -0600348void autoboot_command(const char *s)
349{
Simon Glass66ded172014-04-10 20:01:28 -0600350 debug("### main_loop: bootcmd=\"%s\"\n", s ? s : "<UNDEFINED>");
351
Simon Glassaffb2152014-04-10 20:01:35 -0600352 if (stored_bootdelay != -1 && s && !abortboot(stored_bootdelay)) {
Simon Glass66ded172014-04-10 20:01:28 -0600353#if defined(CONFIG_AUTOBOOT_KEYED) && !defined(CONFIG_AUTOBOOT_KEYED_CTRLC)
354 int prev = disable_ctrlc(1); /* disable Control C checking */
355#endif
356
357 run_command_list(s, -1, 0);
358
359#if defined(CONFIG_AUTOBOOT_KEYED) && !defined(CONFIG_AUTOBOOT_KEYED_CTRLC)
360 disable_ctrlc(prev); /* restore Control C checking */
361#endif
362 }
363
Simon Glassd915ad22019-07-20 20:51:23 -0600364 if (IS_ENABLED(CONFIG_USE_AUTOBOOT_MENUKEY) &&
365 menukey == AUTOBOOT_MENUKEY) {
Simon Glass00caae62017-08-03 12:22:12 -0600366 s = env_get("menucmd");
Simon Glass66ded172014-04-10 20:01:28 -0600367 if (s)
368 run_command_list(s, -1, 0);
369 }
Simon Glass66ded172014-04-10 20:01:28 -0600370}