123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889 |
- /*
- * Copyright (C) 2013 Felix Fietkau <nbd@openwrt.org>
- * Copyright (C) 2013 John Crispin <blogic@openwrt.org>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU Lesser General Public License version 2.1
- * as published by the Free Software Foundation
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- */
- #include <sys/utsname.h>
- #ifdef linux
- #include <sys/sysinfo.h>
- #endif
- #include <sys/ioctl.h>
- #include <sys/types.h>
- #include <sys/reboot.h>
- #include <sys/stat.h>
- #include <sys/statvfs.h>
- #include <fcntl.h>
- #include <signal.h>
- #include <unistd.h>
- #include <stdlib.h>
- #include <json-c/json_tokener.h>
- #include <libubox/blobmsg_json.h>
- #include <libubox/uloop.h>
- #include "procd.h"
- #include "sysupgrade.h"
- #include "watchdog.h"
- #include "service/service.h"
- static struct blob_buf b;
- static int notify;
- static struct ubus_context *_ctx;
- static int initramfs;
- enum vjson_state {
- VJSON_ERROR,
- VJSON_CONTINUE,
- VJSON_SUCCESS,
- };
- static const char *system_rootfs_type(void) {
- const char proc_mounts[] = "/proc/self/mounts";
- static char fstype[16] = { 0 };
- char *mountstr = NULL, *mp = "/", *pos, *tmp;
- FILE *mounts;
- size_t len = 0;
- bool found = false;
- if (initramfs)
- return "initramfs";
- if (fstype[0])
- return fstype;
- mounts = fopen(proc_mounts, "r");
- if (!mounts)
- return NULL;
- while (getline(&mountstr, &len, mounts) != -1) {
- pos = strchr(mountstr, ' ');
- if (!pos)
- continue;
- tmp = pos + 1;
- pos = strchr(tmp, ' ');
- if (!pos)
- continue;
- *pos = '\0';
- if (strcmp(tmp, mp))
- continue;
- tmp = pos + 1;
- pos = strchr(tmp, ' ');
- if (!pos)
- continue;
- *pos = '\0';
- if (!strcmp(tmp, "overlay")) {
- /*
- * there is no point in parsing overlay option string for
- * lowerdir, as that can point to "/" being a previous
- * overlay mount (after firstboot or sysuprade config
- * restore). Hence just assume the lowerdir is "/rom" and
- * restart searching for that instead if that's not
- * already the case.
- */
- if (!strcmp(mp, "/rom"))
- break;
- mp = "/rom";
- fseek(mounts, 0, SEEK_SET);
- continue;
- }
- found = true;
- break;
- }
- if (found)
- strncpy(fstype, tmp, sizeof(fstype) - 1);
- fstype[sizeof(fstype) - 1]= '\0';
- free(mountstr);
- fclose(mounts);
- if (found)
- return fstype;
- else
- return NULL;
- }
- static int system_board(struct ubus_context *ctx, struct ubus_object *obj,
- struct ubus_request_data *req, const char *method,
- struct blob_attr *msg)
- {
- void *c;
- char line[256];
- char *key, *val, *next;
- const char *rootfs_type = system_rootfs_type();
- struct utsname utsname;
- FILE *f;
- blob_buf_init(&b, 0);
- if (uname(&utsname) >= 0)
- {
- blobmsg_add_string(&b, "kernel", utsname.release);
- blobmsg_add_string(&b, "hostname", utsname.nodename);
- }
- if ((f = fopen("/proc/cpuinfo", "r")) != NULL)
- {
- while(fgets(line, sizeof(line), f))
- {
- key = strtok(line, "\t:");
- val = strtok(NULL, "\t\n");
- if (!key || !val)
- continue;
- #ifdef __aarch64__
- if (!strcasecmp(key, "CPU revision")) {
- snprintf(line, sizeof(line), "ARMv8 Processor rev %lu", strtoul(val + 2, NULL, 16));
- blobmsg_add_string(&b, "system", line);
- break;
- }
- #elif __riscv
- if (!strcasecmp(key, "isa")) {
- snprintf(line, sizeof(line), "RISC-V (%s)", val + 2);
- blobmsg_add_string(&b, "system", line);
- break;
- }
- #else
- if (!strcasecmp(key, "system type") ||
- !strcasecmp(key, "processor") ||
- !strcasecmp(key, "cpu") ||
- !strcasecmp(key, "model name"))
- {
- strtoul(val + 2, &key, 0);
- if (key == (val + 2) || *key != 0)
- {
- blobmsg_add_string(&b, "system", val + 2);
- break;
- }
- }
- #endif
- }
- fclose(f);
- }
- if ((f = fopen("/tmp/sysinfo/model", "r")) != NULL ||
- (f = fopen("/proc/device-tree/model", "r")) != NULL)
- {
- if (fgets(line, sizeof(line), f))
- {
- val = strtok(line, "\t\n");
- if (val)
- blobmsg_add_string(&b, "model", val);
- }
- fclose(f);
- }
- else if ((f = fopen("/proc/cpuinfo", "r")) != NULL)
- {
- while(fgets(line, sizeof(line), f))
- {
- key = strtok(line, "\t:");
- val = strtok(NULL, "\t\n");
- if (!key || !val)
- continue;
- if (!strcasecmp(key, "machine") ||
- !strcasecmp(key, "hardware"))
- {
- blobmsg_add_string(&b, "model", val + 2);
- break;
- }
- }
- fclose(f);
- }
- if ((f = fopen("/tmp/sysinfo/board_name", "r")) != NULL)
- {
- if (fgets(line, sizeof(line), f))
- {
- val = strtok(line, "\t\n");
- if (val)
- blobmsg_add_string(&b, "board_name", val);
- }
- fclose(f);
- }
- else if ((f = fopen("/proc/device-tree/compatible", "r")) != NULL)
- {
- if (fgets(line, sizeof(line), f))
- {
- val = strtok(line, "\t\n");
- if (val)
- {
- next = val;
- while ((next = strchr(next, ',')) != NULL)
- {
- *next = '-';
- next++;
- }
- blobmsg_add_string(&b, "board_name", val);
- }
- }
- fclose(f);
- }
- if (rootfs_type)
- blobmsg_add_string(&b, "rootfs_type", rootfs_type);
- if ((f = fopen("/usr/lib/os-release", "r")) != NULL)
- {
- c = blobmsg_open_table(&b, "release");
- while (fgets(line, sizeof(line), f))
- {
- char *dest;
- char ch;
- key = line;
- val = strchr(line, '=');
- if (!val)
- continue;
- *(val++) = 0;
- if (!strcasecmp(key, "NAME"))
- key = "distribution";
- else if (!strcasecmp(key, "VERSION"))
- key = "version";
- else if (!strcasecmp(key, "BUILD_ID"))
- key = "revision";
- else if (!strcasecmp(key, "VERSION_CODENAME"))
- key = "codename";
- else if (!strcasecmp(key, "OPENWRT_BOARD"))
- key = "target";
- else if (!strcasecmp(key, "OPENWRT_RELEASE"))
- key = "description";
- else if (!strcasecmp(key, "OPENWRT_BUILD_DATE"))
- key = "builddate";
- else
- continue;
- dest = blobmsg_alloc_string_buffer(&b, key, strlen(val));
- if (!dest) {
- ERROR("Failed to allocate blob.\n");
- continue;
- }
- while (val && (ch = *(val++)) != 0) {
- switch (ch) {
- case '\'':
- case '"':
- next = strchr(val, ch);
- if (next)
- *next = 0;
- strcpy(dest, val);
- if (next)
- val = next + 1;
- dest += strlen(dest);
- break;
- case '\\':
- *(dest++) = *(val++);
- break;
- }
- }
- blobmsg_add_string_buffer(&b);
- }
- blobmsg_close_array(&b, c);
- fclose(f);
- }
- ubus_send_reply(ctx, req, b.head);
- return UBUS_STATUS_OK;
- }
- static unsigned long
- kscale(unsigned long b, unsigned long bs)
- {
- return (b * (unsigned long long) bs + 1024/2) / 1024;
- }
- static int system_info(struct ubus_context *ctx, struct ubus_object *obj,
- struct ubus_request_data *req, const char *method,
- struct blob_attr *msg)
- {
- time_t now;
- struct tm *tm;
- #ifdef linux
- struct sysinfo info;
- void *c;
- char line[256];
- char *key, *val;
- unsigned long long available, cached;
- FILE *f;
- int i;
- struct statvfs s;
- const char *fslist[] = {
- "/", "root",
- "/tmp", "tmp",
- };
- if (sysinfo(&info))
- return UBUS_STATUS_UNKNOWN_ERROR;
- if ((f = fopen("/proc/meminfo", "r")) == NULL)
- return UBUS_STATUS_UNKNOWN_ERROR;
- /* if linux < 3.14 MemAvailable is not in meminfo */
- available = 0;
- cached = 0;
- while (fgets(line, sizeof(line), f))
- {
- key = strtok(line, " :");
- val = strtok(NULL, " ");
- if (!key || !val)
- continue;
- if (!strcasecmp(key, "MemAvailable"))
- available = 1024 * atoll(val);
- else if (!strcasecmp(key, "Cached"))
- cached = 1024 * atoll(val);
- }
- fclose(f);
- #endif
- now = time(NULL);
- if (!(tm = localtime(&now)))
- return UBUS_STATUS_UNKNOWN_ERROR;
- blob_buf_init(&b, 0);
- blobmsg_add_u32(&b, "localtime", now + tm->tm_gmtoff);
- #ifdef linux
- blobmsg_add_u32(&b, "uptime", info.uptime);
- c = blobmsg_open_array(&b, "load");
- blobmsg_add_u32(&b, NULL, info.loads[0]);
- blobmsg_add_u32(&b, NULL, info.loads[1]);
- blobmsg_add_u32(&b, NULL, info.loads[2]);
- blobmsg_close_array(&b, c);
- c = blobmsg_open_table(&b, "memory");
- blobmsg_add_u64(&b, "total",
- (uint64_t)info.mem_unit * (uint64_t)info.totalram);
- blobmsg_add_u64(&b, "free",
- (uint64_t)info.mem_unit * (uint64_t)info.freeram);
- blobmsg_add_u64(&b, "shared",
- (uint64_t)info.mem_unit * (uint64_t)info.sharedram);
- blobmsg_add_u64(&b, "buffered",
- (uint64_t)info.mem_unit * (uint64_t)info.bufferram);
- blobmsg_add_u64(&b, "available", available);
- blobmsg_add_u64(&b, "cached", cached);
- blobmsg_close_table(&b, c);
- for (i = 0; i < sizeof(fslist) / sizeof(fslist[0]); i += 2) {
- if (statvfs(fslist[i], &s))
- continue;
- c = blobmsg_open_table(&b, fslist[i+1]);
- if (!s.f_frsize)
- s.f_frsize = s.f_bsize;
- blobmsg_add_u64(&b, "total", kscale(s.f_blocks, s.f_frsize));
- blobmsg_add_u64(&b, "free", kscale(s.f_bfree, s.f_frsize));
- blobmsg_add_u64(&b, "used", kscale(s.f_blocks - s.f_bfree, s.f_frsize));
- blobmsg_add_u64(&b, "avail", kscale(s.f_bavail, s.f_frsize));
- blobmsg_close_table(&b, c);
- }
- c = blobmsg_open_table(&b, "swap");
- blobmsg_add_u64(&b, "total",
- (uint64_t)info.mem_unit * (uint64_t)info.totalswap);
- blobmsg_add_u64(&b, "free",
- (uint64_t)info.mem_unit * (uint64_t)info.freeswap);
- blobmsg_close_table(&b, c);
- #endif
- ubus_send_reply(ctx, req, b.head);
- return UBUS_STATUS_OK;
- }
- static int system_reboot(struct ubus_context *ctx, struct ubus_object *obj,
- struct ubus_request_data *req, const char *method,
- struct blob_attr *msg)
- {
- procd_shutdown(RB_AUTOBOOT);
- return 0;
- }
- enum {
- WDT_FREQUENCY,
- WDT_TIMEOUT,
- WDT_MAGICCLOSE,
- WDT_STOP,
- __WDT_MAX
- };
- static const struct blobmsg_policy watchdog_policy[__WDT_MAX] = {
- [WDT_FREQUENCY] = { .name = "frequency", .type = BLOBMSG_TYPE_INT32 },
- [WDT_TIMEOUT] = { .name = "timeout", .type = BLOBMSG_TYPE_INT32 },
- [WDT_MAGICCLOSE] = { .name = "magicclose", .type = BLOBMSG_TYPE_BOOL },
- [WDT_STOP] = { .name = "stop", .type = BLOBMSG_TYPE_BOOL },
- };
- static int watchdog_set(struct ubus_context *ctx, struct ubus_object *obj,
- struct ubus_request_data *req, const char *method,
- struct blob_attr *msg)
- {
- struct blob_attr *tb[__WDT_MAX];
- const char *status;
- if (!msg)
- return UBUS_STATUS_INVALID_ARGUMENT;
- blobmsg_parse(watchdog_policy, __WDT_MAX, tb, blob_data(msg), blob_len(msg));
- if (tb[WDT_FREQUENCY]) {
- unsigned int timeout = tb[WDT_TIMEOUT] ? blobmsg_get_u32(tb[WDT_TIMEOUT]) :
- watchdog_timeout(0);
- unsigned int freq = blobmsg_get_u32(tb[WDT_FREQUENCY]);
- if (freq) {
- if (freq > timeout / 2)
- freq = timeout / 2;
- watchdog_frequency(freq);
- }
- }
- if (tb[WDT_TIMEOUT]) {
- unsigned int timeout = blobmsg_get_u32(tb[WDT_TIMEOUT]);
- unsigned int frequency = watchdog_frequency(0);
- if (timeout <= frequency)
- timeout = frequency * 2;
- watchdog_timeout(timeout);
- }
- if (tb[WDT_MAGICCLOSE])
- watchdog_set_magicclose(blobmsg_get_bool(tb[WDT_MAGICCLOSE]));
- if (tb[WDT_STOP])
- watchdog_set_stopped(blobmsg_get_bool(tb[WDT_STOP]));
- if (watchdog_fd() == NULL)
- status = "offline";
- else if (watchdog_get_stopped())
- status = "stopped";
- else
- status = "running";
- blob_buf_init(&b, 0);
- blobmsg_add_string(&b, "status", status);
- blobmsg_add_u32(&b, "timeout", watchdog_timeout(0));
- blobmsg_add_u32(&b, "frequency", watchdog_frequency(0));
- blobmsg_add_u8(&b, "magicclose", watchdog_get_magicclose());
- ubus_send_reply(ctx, req, b.head);
- return 0;
- }
- enum {
- SIGNAL_PID,
- SIGNAL_NUM,
- __SIGNAL_MAX
- };
- static const struct blobmsg_policy signal_policy[__SIGNAL_MAX] = {
- [SIGNAL_PID] = { .name = "pid", .type = BLOBMSG_TYPE_INT32 },
- [SIGNAL_NUM] = { .name = "signum", .type = BLOBMSG_TYPE_INT32 },
- };
- static int proc_signal(struct ubus_context *ctx, struct ubus_object *obj,
- struct ubus_request_data *req, const char *method,
- struct blob_attr *msg)
- {
- struct blob_attr *tb[__SIGNAL_MAX];
- if (!msg)
- return UBUS_STATUS_INVALID_ARGUMENT;
- blobmsg_parse(signal_policy, __SIGNAL_MAX, tb, blob_data(msg), blob_len(msg));
- if (!tb[SIGNAL_PID || !tb[SIGNAL_NUM]])
- return UBUS_STATUS_INVALID_ARGUMENT;
- kill(blobmsg_get_u32(tb[SIGNAL_PID]), blobmsg_get_u32(tb[SIGNAL_NUM]));
- return 0;
- }
- __attribute__((format (printf, 2, 3)))
- static enum vjson_state vjson_error(char **b, const char *fmt, ...)
- {
- static char buf[256] = { 0 };
- const char *pfx = "Firmware image couldn't be validated: ";
- va_list va;
- int r;
- r = snprintf(buf, sizeof(buf), "%s", pfx);
- if (r < 0) {
- *b = "vjson_error() snprintf failed";
- return VJSON_ERROR;
- }
- va_start(va, fmt);
- r = vsnprintf(buf+r, sizeof(buf)-r, fmt, va);
- if (r < 0) {
- *b = "vjson_error() vsnprintf failed";
- return VJSON_ERROR;
- }
- va_end(va);
- *b = buf;
- return VJSON_ERROR;
- }
- static enum vjson_state vjson_parse_token(json_tokener *tok, char *buf, ssize_t len, char **err)
- {
- json_object *jsobj = NULL;
- jsobj = json_tokener_parse_ex(tok, buf, len);
- if (json_tokener_get_error(tok) == json_tokener_continue)
- return VJSON_CONTINUE;
- if (json_tokener_get_error(tok) == json_tokener_success) {
- if (json_object_get_type(jsobj) != json_type_object) {
- json_object_put(jsobj);
- return vjson_error(err, "result is not an JSON object");
- }
- blobmsg_add_object(&b, jsobj);
- json_object_put(jsobj);
- return VJSON_SUCCESS;
- }
- return vjson_error(err, "failed to parse JSON: %s (%d)",
- json_tokener_error_desc(json_tokener_get_error(tok)),
- json_tokener_get_error(tok));
- }
- static enum vjson_state vjson_parse(int fd, char **err)
- {
- enum vjson_state r = VJSON_ERROR;
- size_t read_count = 0;
- char buf[64] = { 0 };
- json_tokener *tok;
- ssize_t len;
- int _errno;
- tok = json_tokener_new();
- if (!tok)
- return vjson_error(err, "json_tokener_new() failed");
- vjson_error(err, "incomplete JSON input");
- while ((len = read(fd, buf, sizeof(buf)))) {
- if (len < 0 && errno == EINTR)
- continue;
- if (len < 0) {
- _errno = errno;
- json_tokener_free(tok);
- return vjson_error(err, "read() failed: %s (%d)",
- strerror(_errno), _errno);
- }
- read_count += len;
- r = vjson_parse_token(tok, buf, len, err);
- if (r != VJSON_CONTINUE)
- break;
- memset(buf, 0, sizeof(buf));
- }
- if (read_count == 0)
- vjson_error(err, "no JSON input");
- json_tokener_free(tok);
- return r;
- }
- /**
- * validate_firmware_image_call - perform validation & store result in global b
- *
- * @file: firmware image path
- */
- static enum vjson_state validate_firmware_image_call(const char *file, char **err)
- {
- const char *path = "/usr/libexec/validate_firmware_image";
- enum vjson_state ret = VJSON_ERROR;
- int _errno;
- int fds[2];
- int fd;
- blob_buf_init(&b, 0);
- vjson_error(err, "unhandled error");
- if (pipe(fds)) {
- _errno = errno;
- return vjson_error(err, "pipe() failed: %s (%d)",
- strerror(_errno), _errno);
- }
- switch (fork()) {
- case -1:
- _errno = errno;
- close(fds[0]);
- close(fds[1]);
- return vjson_error(err, "fork() failed: %s (%d)",
- strerror(_errno), _errno);
- case 0:
- /* Set stdin & stderr to /dev/null */
- fd = open("/dev/null", O_RDWR);
- if (fd >= 0) {
- dup2(fd, 0);
- dup2(fd, 2);
- close(fd);
- }
- /* Set stdout to the shared pipe */
- dup2(fds[1], 1);
- close(fds[0]);
- close(fds[1]);
- execl(path, path, file, NULL);
- exit(errno);
- }
- /* Parent process */
- close(fds[1]);
- ret = vjson_parse(fds[0], err);
- close(fds[0]);
- return ret;
- }
- enum {
- VALIDATE_FIRMWARE_IMAGE_PATH,
- __VALIDATE_FIRMWARE_IMAGE_MAX,
- };
- static const struct blobmsg_policy validate_firmware_image_policy[__VALIDATE_FIRMWARE_IMAGE_MAX] = {
- [VALIDATE_FIRMWARE_IMAGE_PATH] = { .name = "path", .type = BLOBMSG_TYPE_STRING },
- };
- static int validate_firmware_image(struct ubus_context *ctx,
- struct ubus_object *obj,
- struct ubus_request_data *req,
- const char *method, struct blob_attr *msg)
- {
- struct blob_attr *tb[__VALIDATE_FIRMWARE_IMAGE_MAX];
- enum vjson_state ret = VJSON_ERROR;
- char *err;
- if (!msg)
- return UBUS_STATUS_INVALID_ARGUMENT;
- blobmsg_parse(validate_firmware_image_policy, __VALIDATE_FIRMWARE_IMAGE_MAX, tb, blob_data(msg), blob_len(msg));
- if (!tb[VALIDATE_FIRMWARE_IMAGE_PATH])
- return UBUS_STATUS_INVALID_ARGUMENT;
- ret = validate_firmware_image_call(blobmsg_get_string(tb[VALIDATE_FIRMWARE_IMAGE_PATH]), &err);
- if (ret != VJSON_SUCCESS)
- return UBUS_STATUS_UNKNOWN_ERROR;
- ubus_send_reply(ctx, req, b.head);
- return UBUS_STATUS_OK;
- }
- enum {
- SYSUPGRADE_PATH,
- SYSUPGRADE_FORCE,
- SYSUPGRADE_BACKUP,
- SYSUPGRADE_PREFIX,
- SYSUPGRADE_COMMAND,
- SYSUPGRADE_OPTIONS,
- __SYSUPGRADE_MAX
- };
- static const struct blobmsg_policy sysupgrade_policy[__SYSUPGRADE_MAX] = {
- [SYSUPGRADE_PATH] = { .name = "path", .type = BLOBMSG_TYPE_STRING },
- [SYSUPGRADE_FORCE] = { .name = "force", .type = BLOBMSG_TYPE_BOOL },
- [SYSUPGRADE_BACKUP] = { .name = "backup", .type = BLOBMSG_TYPE_STRING },
- [SYSUPGRADE_PREFIX] = { .name = "prefix", .type = BLOBMSG_TYPE_STRING },
- [SYSUPGRADE_COMMAND] = { .name = "command", .type = BLOBMSG_TYPE_STRING },
- [SYSUPGRADE_OPTIONS] = { .name = "options", .type = BLOBMSG_TYPE_TABLE },
- };
- static void sysupgrade_error(struct ubus_context *ctx,
- struct ubus_request_data *req,
- const char *message)
- {
- void *c;
- blob_buf_init(&b, 0);
- c = blobmsg_open_table(&b, "error");
- blobmsg_add_string(&b, "message", message);
- blobmsg_close_table(&b, c);
- ubus_send_reply(ctx, req, b.head);
- }
- static int sysupgrade(struct ubus_context *ctx, struct ubus_object *obj,
- struct ubus_request_data *req, const char *method,
- struct blob_attr *msg)
- {
- enum {
- VALIDATION_VALID,
- VALIDATION_FORCEABLE,
- VALIDATION_ALLOW_BACKUP,
- __VALIDATION_MAX
- };
- static const struct blobmsg_policy validation_policy[__VALIDATION_MAX] = {
- [VALIDATION_VALID] = { .name = "valid", .type = BLOBMSG_TYPE_BOOL },
- [VALIDATION_FORCEABLE] = { .name = "forceable", .type = BLOBMSG_TYPE_BOOL },
- [VALIDATION_ALLOW_BACKUP] = { .name = "allow_backup", .type = BLOBMSG_TYPE_BOOL },
- };
- struct blob_attr *validation[__VALIDATION_MAX];
- struct blob_attr *tb[__SYSUPGRADE_MAX];
- bool valid, forceable, allow_backup;
- enum vjson_state ret = VJSON_ERROR;
- char *err;
- if (!msg)
- return UBUS_STATUS_INVALID_ARGUMENT;
- blobmsg_parse(sysupgrade_policy, __SYSUPGRADE_MAX, tb, blob_data(msg), blob_len(msg));
- if (!tb[SYSUPGRADE_PATH] || !tb[SYSUPGRADE_PREFIX])
- return UBUS_STATUS_INVALID_ARGUMENT;
- ret = validate_firmware_image_call(blobmsg_get_string(tb[SYSUPGRADE_PATH]), &err);
- if (ret != VJSON_SUCCESS) {
- sysupgrade_error(ctx, req, err);
- return UBUS_STATUS_UNKNOWN_ERROR;
- }
- blobmsg_parse(validation_policy, __VALIDATION_MAX, validation, blob_data(b.head), blob_len(b.head));
- if (!validation[VALIDATION_VALID] || !validation[VALIDATION_FORCEABLE] ||
- !validation[VALIDATION_ALLOW_BACKUP]) {
- sysupgrade_error(ctx, req, "Validation script provided invalid input");
- return UBUS_STATUS_INVALID_ARGUMENT;
- }
- valid = validation[VALIDATION_VALID] && blobmsg_get_bool(validation[VALIDATION_VALID]);
- forceable = validation[VALIDATION_FORCEABLE] && blobmsg_get_bool(validation[VALIDATION_FORCEABLE]);
- allow_backup = validation[VALIDATION_ALLOW_BACKUP] && blobmsg_get_bool(validation[VALIDATION_ALLOW_BACKUP]);
- if (!valid) {
- if (!forceable) {
- sysupgrade_error(ctx, req, "Firmware image is broken and cannot be installed");
- return UBUS_STATUS_NOT_SUPPORTED;
- } else if (!tb[SYSUPGRADE_FORCE] || !blobmsg_get_bool(tb[SYSUPGRADE_FORCE])) {
- sysupgrade_error(ctx, req, "Firmware image is invalid");
- return UBUS_STATUS_NOT_SUPPORTED;
- }
- } else if (!allow_backup && tb[SYSUPGRADE_BACKUP]) {
- sysupgrade_error(ctx, req, "Firmware image doesn't allow preserving a backup");
- return UBUS_STATUS_NOT_SUPPORTED;
- }
- service_stop_all();
- sysupgrade_exec_upgraded(blobmsg_get_string(tb[SYSUPGRADE_PREFIX]),
- blobmsg_get_string(tb[SYSUPGRADE_PATH]),
- tb[SYSUPGRADE_BACKUP] ? blobmsg_get_string(tb[SYSUPGRADE_BACKUP]) : NULL,
- tb[SYSUPGRADE_COMMAND] ? blobmsg_get_string(tb[SYSUPGRADE_COMMAND]) : NULL,
- tb[SYSUPGRADE_OPTIONS]);
- /* sysupgrade_exec_upgraded() will never return unless something has gone wrong */
- return UBUS_STATUS_UNKNOWN_ERROR;
- }
- static void
- procd_subscribe_cb(struct ubus_context *ctx, struct ubus_object *obj)
- {
- notify = obj->has_subscribers;
- }
- static const struct ubus_method system_methods[] = {
- UBUS_METHOD_NOARG("board", system_board),
- UBUS_METHOD_NOARG("info", system_info),
- UBUS_METHOD_NOARG("reboot", system_reboot),
- UBUS_METHOD("watchdog", watchdog_set, watchdog_policy),
- UBUS_METHOD("signal", proc_signal, signal_policy),
- UBUS_METHOD("validate_firmware_image", validate_firmware_image, validate_firmware_image_policy),
- UBUS_METHOD("sysupgrade", sysupgrade, sysupgrade_policy),
- };
- static struct ubus_object_type system_object_type =
- UBUS_OBJECT_TYPE("system", system_methods);
- static struct ubus_object system_object = {
- .name = "system",
- .type = &system_object_type,
- .methods = system_methods,
- .n_methods = ARRAY_SIZE(system_methods),
- .subscribe_cb = procd_subscribe_cb,
- };
- void
- procd_bcast_event(char *event, struct blob_attr *msg)
- {
- int ret;
- if (!notify)
- return;
- ret = ubus_notify(_ctx, &system_object, event, msg, -1);
- if (ret)
- fprintf(stderr, "Failed to notify log: %s\n", ubus_strerror(ret));
- }
- void ubus_init_system(struct ubus_context *ctx)
- {
- int ret;
- _ctx = ctx;
- initramfs = !!getenv("INITRAMFS");
- if (initramfs)
- unsetenv("INITRAMFS");
- ret = ubus_add_object(ctx, &system_object);
- if (ret)
- ERROR("Failed to add object: %s\n", ubus_strerror(ret));
- }
|