blob: 60966d6a8016fcfaf5f1c2b4fd82d1eea4cce6d0 [file] [log] [blame]
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -08001/*
2 * Copyright (C) 2007 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Dan Albert33134262015-03-19 15:21:08 -070017#define TRACE_TAG TRACE_ADB
18
19#include "sysdeps.h"
20#include "adb.h"
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080021
Dan Albertea2175a2015-03-08 21:12:08 -070022#include <ctype.h>
23#include <errno.h>
24#include <stdarg.h>
25#include <stddef.h>
26#include <stdint.h>
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080027#include <stdio.h>
28#include <stdlib.h>
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080029#include <string.h>
Mike Lockwood1f546e62009-05-25 18:17:55 -040030#include <sys/time.h>
Dan Albertea2175a2015-03-08 21:12:08 -070031#include <time.h>
32
33#include <string>
Dan Alberte2462192015-03-19 13:25:27 -070034#include <vector>
35#include <unordered_map>
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080036
Dan Albert9313c0d2015-05-21 13:58:50 -070037#include <base/logging.h>
Spencer Lowcf4ff642015-05-11 01:08:48 -070038#include <base/macros.h>
Elliott Hughes7b506092015-04-20 08:09:20 -070039#include <base/stringprintf.h>
Elliott Hughes8d5fa6d2015-04-24 23:02:00 -070040#include <base/strings.h>
Elliott Hughes7b506092015-04-20 08:09:20 -070041
Benoit Gobyd5fcafa2012-04-12 12:23:49 -070042#include "adb_auth.h"
Dan Albertcc731cc2015-02-24 21:26:58 -080043#include "adb_io.h"
Dan Alberte9fca142015-02-18 18:03:26 -080044#include "adb_listeners.h"
Elliott Hughes3d5f60d2015-07-18 12:21:30 -070045#include "adb_utils.h"
Dan Albert76649012015-02-24 15:51:19 -080046#include "transport.h"
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080047
Scott Andersone82c2db2012-05-25 14:10:02 -070048#define ARRAY_SIZE(a) (sizeof(a) / sizeof((a)[0]))
49
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080050#if !ADB_HOST
Nick Kralevich893a4a42013-05-23 09:54:13 -070051#include <cutils/properties.h>
Nick Kraleviche2864bf2013-02-28 14:12:58 -080052#include <sys/capability.h>
Jeff Sharkey885342a2012-08-14 21:00:22 -070053#include <sys/mount.h>
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080054#endif
55
Scott Andersone82c2db2012-05-25 14:10:02 -070056#if !ADB_HOST
Dan Albert9313c0d2015-05-21 13:58:50 -070057const char* adb_device_banner = "device";
58static android::base::LogdLogger gLogdLogger;
Dan Albert1792c232015-05-18 13:06:53 -070059#else
60const char* adb_device_banner = "host";
Scott Andersone82c2db2012-05-25 14:10:02 -070061#endif
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080062
Dan Albert9313c0d2015-05-21 13:58:50 -070063void AdbLogger(android::base::LogId id, android::base::LogSeverity severity,
64 const char* tag, const char* file, unsigned int line,
65 const char* message) {
66 android::base::StderrLogger(id, severity, tag, file, line, message);
67#if !ADB_HOST
68 gLogdLogger(id, severity, tag, file, line, message);
69#endif
70}
71
Elliott Hughes42ae2602015-08-12 08:32:10 -070072std::string adb_version() {
73 // Don't change the format of this --- it's parsed by ddmlib.
74 return android::base::StringPrintf("Android Debug Bridge version %d.%d.%d\n"
75 "Revision %s\n",
76 ADB_VERSION_MAJOR, ADB_VERSION_MINOR, ADB_SERVER_VERSION,
77 ADB_REVISION);
78}
79
Dan Albert9313c0d2015-05-21 13:58:50 -070080void fatal(const char *fmt, ...) {
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080081 va_list ap;
82 va_start(ap, fmt);
83 fprintf(stderr, "error: ");
84 vfprintf(stderr, fmt, ap);
85 fprintf(stderr, "\n");
86 va_end(ap);
87 exit(-1);
88}
89
Dan Albert9313c0d2015-05-21 13:58:50 -070090void fatal_errno(const char* fmt, ...) {
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080091 va_list ap;
92 va_start(ap, fmt);
93 fprintf(stderr, "error: %s: ", strerror(errno));
94 vfprintf(stderr, fmt, ap);
95 fprintf(stderr, "\n");
96 va_end(ap);
97 exit(-1);
98}
99
Dan Albertea2175a2015-03-08 21:12:08 -0700100#if !ADB_HOST
Dan Albert9313c0d2015-05-21 13:58:50 -0700101static std::string get_log_file_name() {
Dan Albertea2175a2015-03-08 21:12:08 -0700102 struct tm now;
103 time_t t;
104 tzset();
105 time(&t);
106 localtime_r(&t, &now);
107
Dan Albert8743ef92015-03-19 22:53:30 -0700108 char timestamp[PATH_MAX];
109 strftime(timestamp, sizeof(timestamp), "%Y-%m-%d-%H-%M-%S", &now);
Dan Albertea2175a2015-03-08 21:12:08 -0700110
Dan Albert9313c0d2015-05-21 13:58:50 -0700111 return android::base::StringPrintf("/data/adb/adb-%s-%d", timestamp,
112 getpid());
113}
114
115void start_device_log(void) {
116 int fd = unix_open(get_log_file_name().c_str(),
117 O_WRONLY | O_CREAT | O_TRUNC | O_CLOEXEC, 0640);
Dan Albertea2175a2015-03-08 21:12:08 -0700118 if (fd == -1) {
119 return;
120 }
121
Dan Albert9313c0d2015-05-21 13:58:50 -0700122 // Redirect stdout and stderr to the log file.
Dan Albertea2175a2015-03-08 21:12:08 -0700123 dup2(fd, STDOUT_FILENO);
124 dup2(fd, STDERR_FILENO);
125 fprintf(stderr, "--- adb starting (pid %d) ---\n", getpid());
Spencer Low6ac5d7d2015-05-22 20:09:06 -0700126 unix_close(fd);
Dan Albertea2175a2015-03-08 21:12:08 -0700127}
128#endif
129
130int adb_trace_mask;
131
132std::string get_trace_setting_from_env() {
133 const char* setting = getenv("ADB_TRACE");
134 if (setting == nullptr) {
135 setting = "";
136 }
137
138 return std::string(setting);
139}
140
141#if !ADB_HOST
142std::string get_trace_setting_from_prop() {
143 char buf[PROPERTY_VALUE_MAX];
144 property_get("persist.adb.trace_mask", buf, "");
145 return std::string(buf);
146}
147#endif
148
149std::string get_trace_setting() {
150#if ADB_HOST
151 return get_trace_setting_from_env();
152#else
153 return get_trace_setting_from_prop();
154#endif
155}
156
Dan Alberte2462192015-03-19 13:25:27 -0700157// Split the space separated list of tags from the trace setting and build the
158// trace mask from it. note that '1' and 'all' are special cases to enable all
159// tracing.
Dan Albertea2175a2015-03-08 21:12:08 -0700160//
161// adb's trace setting comes from the ADB_TRACE environment variable, whereas
162// adbd's comes from the system property persist.adb.trace_mask.
Dan Albert9313c0d2015-05-21 13:58:50 -0700163static void setup_trace_mask() {
Dan Albertea2175a2015-03-08 21:12:08 -0700164 const std::string trace_setting = get_trace_setting();
Yabin Cuic1b1f6f2015-09-15 16:27:09 -0700165 if (trace_setting.empty()) {
166 return;
167 }
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800168
Dan Alberte2462192015-03-19 13:25:27 -0700169 std::unordered_map<std::string, int> trace_flags = {
170 {"1", 0},
171 {"all", 0},
172 {"adb", TRACE_ADB},
173 {"sockets", TRACE_SOCKETS},
174 {"packets", TRACE_PACKETS},
175 {"rwx", TRACE_RWX},
176 {"usb", TRACE_USB},
177 {"sync", TRACE_SYNC},
178 {"sysdeps", TRACE_SYSDEPS},
179 {"transport", TRACE_TRANSPORT},
180 {"jdwp", TRACE_JDWP},
181 {"services", TRACE_SERVICES},
David Pursell80f67022015-08-28 15:08:49 -0700182 {"auth", TRACE_AUTH},
Yabin Cuia1080162015-09-04 16:19:56 -0700183 {"fdevent", TRACE_FDEVENT},
David Pursell80f67022015-08-28 15:08:49 -0700184 {"shell", TRACE_SHELL}};
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800185
Dan Alberte2462192015-03-19 13:25:27 -0700186 std::vector<std::string> elements = android::base::Split(trace_setting, " ");
187 for (const auto& elem : elements) {
188 const auto& flag = trace_flags.find(elem);
189 if (flag == trace_flags.end()) {
Yabin Cuic1b1f6f2015-09-15 16:27:09 -0700190 D("Unknown trace flag: %s", elem.c_str());
Dan Alberte2462192015-03-19 13:25:27 -0700191 continue;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800192 }
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800193
Dan Alberte2462192015-03-19 13:25:27 -0700194 if (flag->second == 0) {
195 // 0 is used for the special values "1" and "all" that enable all
196 // tracing.
197 adb_trace_mask = ~0;
198 return;
199 } else {
200 adb_trace_mask |= 1 << flag->second;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800201 }
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800202 }
Dan Albert9313c0d2015-05-21 13:58:50 -0700203}
Dan Albertea2175a2015-03-08 21:12:08 -0700204
Dan Albert9313c0d2015-05-21 13:58:50 -0700205void adb_trace_init(char** argv) {
Spencer Low74309162015-08-11 15:48:15 -0700206#if !ADB_HOST
Paul Lawrence6f009d92015-06-05 16:00:07 -0700207 // Don't open log file if no tracing, since this will block
208 // the crypto unmount of /data
Spencer Low74309162015-08-11 15:48:15 -0700209 if (!get_trace_setting().empty()) {
210 if (isatty(STDOUT_FILENO) == 0) {
211 start_device_log();
212 }
Dan Albert9313c0d2015-05-21 13:58:50 -0700213 }
Dan Albertea2175a2015-03-08 21:12:08 -0700214#endif
Dan Albert9313c0d2015-05-21 13:58:50 -0700215
216 setup_trace_mask();
217 android::base::InitLogging(argv, AdbLogger);
Elliott Hughes42ae2602015-08-12 08:32:10 -0700218
219 D("%s", adb_version().c_str());
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800220}
221
Dan Albertbac34742015-02-25 17:51:28 -0800222apacket* get_apacket(void)
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800223{
Dan Albertbac34742015-02-25 17:51:28 -0800224 apacket* p = reinterpret_cast<apacket*>(malloc(sizeof(apacket)));
225 if (p == nullptr) {
226 fatal("failed to allocate an apacket");
227 }
228
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800229 memset(p, 0, sizeof(apacket) - MAX_PAYLOAD);
230 return p;
231}
232
233void put_apacket(apacket *p)
234{
235 free(p);
236}
237
Benoit Gobyd5fcafa2012-04-12 12:23:49 -0700238void handle_online(atransport *t)
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800239{
Yabin Cui7a3f8d62015-09-02 17:44:28 -0700240 D("adb: online");
Benoit Gobyd5fcafa2012-04-12 12:23:49 -0700241 t->online = 1;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800242}
243
244void handle_offline(atransport *t)
245{
Yabin Cui7a3f8d62015-09-02 17:44:28 -0700246 D("adb: offline");
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800247 //Close the associated usb
Benoit Gobyd5fcafa2012-04-12 12:23:49 -0700248 t->online = 0;
Yabin Cui34f45c52015-08-26 11:18:42 -0700249
Yabin Cuib3298242015-08-28 15:09:44 -0700250 // This is necessary to avoid a race condition that occurred when a transport closes
Yabin Cui34f45c52015-08-26 11:18:42 -0700251 // while a client socket is still active.
252 close_all_sockets(t);
253
Yabin Cuib3298242015-08-28 15:09:44 -0700254 t->RunDisconnects();
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800255}
256
Benoit Gobyd5fcafa2012-04-12 12:23:49 -0700257#if DEBUG_PACKETS
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800258#define DUMPMAX 32
259void print_packet(const char *label, apacket *p)
260{
261 char *tag;
262 char *x;
263 unsigned count;
264
265 switch(p->msg.command){
266 case A_SYNC: tag = "SYNC"; break;
267 case A_CNXN: tag = "CNXN" ; break;
268 case A_OPEN: tag = "OPEN"; break;
269 case A_OKAY: tag = "OKAY"; break;
270 case A_CLSE: tag = "CLSE"; break;
271 case A_WRTE: tag = "WRTE"; break;
Benoit Gobyd5fcafa2012-04-12 12:23:49 -0700272 case A_AUTH: tag = "AUTH"; break;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800273 default: tag = "????"; break;
274 }
275
276 fprintf(stderr, "%s: %s %08x %08x %04x \"",
277 label, tag, p->msg.arg0, p->msg.arg1, p->msg.data_length);
278 count = p->msg.data_length;
279 x = (char*) p->data;
280 if(count > DUMPMAX) {
281 count = DUMPMAX;
282 tag = "\n";
283 } else {
284 tag = "\"\n";
285 }
286 while(count-- > 0){
287 if((*x >= ' ') && (*x < 127)) {
288 fputc(*x, stderr);
289 } else {
290 fputc('.', stderr);
291 }
292 x++;
293 }
Benoit Gobyd5fcafa2012-04-12 12:23:49 -0700294 fputs(tag, stderr);
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800295}
296#endif
297
298static void send_ready(unsigned local, unsigned remote, atransport *t)
299{
Yabin Cui7a3f8d62015-09-02 17:44:28 -0700300 D("Calling send_ready");
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800301 apacket *p = get_apacket();
302 p->msg.command = A_OKAY;
303 p->msg.arg0 = local;
304 p->msg.arg1 = remote;
305 send_packet(p, t);
306}
307
308static void send_close(unsigned local, unsigned remote, atransport *t)
309{
Yabin Cui7a3f8d62015-09-02 17:44:28 -0700310 D("Calling send_close");
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800311 apacket *p = get_apacket();
312 p->msg.command = A_CLSE;
313 p->msg.arg0 = local;
314 p->msg.arg1 = remote;
315 send_packet(p, t);
316}
317
Dan Albert1792c232015-05-18 13:06:53 -0700318std::string get_connection_string() {
319 std::vector<std::string> connection_properties;
320
321#if !ADB_HOST
322 static const char* cnxn_props[] = {
Scott Andersone82c2db2012-05-25 14:10:02 -0700323 "ro.product.name",
324 "ro.product.model",
325 "ro.product.device",
326 };
Scott Andersone82c2db2012-05-25 14:10:02 -0700327
Dan Albert1792c232015-05-18 13:06:53 -0700328 for (const auto& prop_name : cnxn_props) {
Scott Andersone82c2db2012-05-25 14:10:02 -0700329 char value[PROPERTY_VALUE_MAX];
Dan Albert1792c232015-05-18 13:06:53 -0700330 property_get(prop_name, value, "");
331 connection_properties.push_back(
332 android::base::StringPrintf("%s=%s", prop_name, value));
Scott Andersone82c2db2012-05-25 14:10:02 -0700333 }
Scott Andersone82c2db2012-05-25 14:10:02 -0700334#endif
Dan Albert1792c232015-05-18 13:06:53 -0700335
336 connection_properties.push_back(android::base::StringPrintf(
337 "features=%s", android::base::Join(supported_features(), ',').c_str()));
338
339 return android::base::StringPrintf(
340 "%s::%s", adb_device_banner,
341 android::base::Join(connection_properties, ';').c_str());
Scott Andersone82c2db2012-05-25 14:10:02 -0700342}
343
Dan Albert1792c232015-05-18 13:06:53 -0700344void send_connect(atransport* t) {
Yabin Cui7a3f8d62015-09-02 17:44:28 -0700345 D("Calling send_connect");
Dan Albert1792c232015-05-18 13:06:53 -0700346 apacket* cp = get_apacket();
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800347 cp->msg.command = A_CNXN;
Tamas Berghammer3d2904c2015-07-13 19:12:28 +0100348 cp->msg.arg0 = t->get_protocol_version();
349 cp->msg.arg1 = t->get_max_payload();
Dan Albert1792c232015-05-18 13:06:53 -0700350
351 std::string connection_str = get_connection_string();
352 // Connect and auth packets are limited to MAX_PAYLOAD_V1 because we don't
353 // yet know how much data the other size is willing to accept.
354 if (connection_str.length() > MAX_PAYLOAD_V1) {
355 LOG(FATAL) << "Connection banner is too long (length = "
356 << connection_str.length() << ")";
357 }
358
359 memcpy(cp->data, connection_str.c_str(), connection_str.length());
360 cp->msg.data_length = connection_str.length();
361
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800362 send_packet(cp, t);
Benoit Gobyd5fcafa2012-04-12 12:23:49 -0700363}
364
Elliott Hughes8d5fa6d2015-04-24 23:02:00 -0700365// qual_overwrite is used to overwrite a qualifier string. dst is a
366// pointer to a char pointer. It is assumed that if *dst is non-NULL, it
367// was malloc'ed and needs to freed. *dst will be set to a dup of src.
368// TODO: switch to std::string for these atransport fields instead.
369static void qual_overwrite(char** dst, const std::string& src) {
Scott Andersone82c2db2012-05-25 14:10:02 -0700370 free(*dst);
Elliott Hughes8d5fa6d2015-04-24 23:02:00 -0700371 *dst = strdup(src.c_str());
Scott Andersone82c2db2012-05-25 14:10:02 -0700372}
373
Dan Albert1792c232015-05-18 13:06:53 -0700374void parse_banner(const std::string& banner, atransport* t) {
Yabin Cui7a3f8d62015-09-02 17:44:28 -0700375 D("parse_banner: %s", banner.c_str());
Elliott Hughes8d5fa6d2015-04-24 23:02:00 -0700376
377 // The format is something like:
378 // "device::ro.product.name=x;ro.product.model=y;ro.product.device=z;".
379 std::vector<std::string> pieces = android::base::Split(banner, ":");
380
381 if (pieces.size() > 2) {
382 const std::string& props = pieces[2];
383 for (auto& prop : android::base::Split(props, ";")) {
384 // The list of properties was traditionally ;-terminated rather than ;-separated.
385 if (prop.empty()) continue;
386
387 std::vector<std::string> key_value = android::base::Split(prop, "=");
388 if (key_value.size() != 2) continue;
389
390 const std::string& key = key_value[0];
391 const std::string& value = key_value[1];
392 if (key == "ro.product.name") {
393 qual_overwrite(&t->product, value);
394 } else if (key == "ro.product.model") {
395 qual_overwrite(&t->model, value);
396 } else if (key == "ro.product.device") {
397 qual_overwrite(&t->device, value);
Dan Albert1792c232015-05-18 13:06:53 -0700398 } else if (key == "features") {
399 for (const auto& feature : android::base::Split(value, ",")) {
400 t->add_feature(feature);
401 }
Scott Andersone82c2db2012-05-25 14:10:02 -0700402 }
403 }
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800404 }
405
Elliott Hughes8d5fa6d2015-04-24 23:02:00 -0700406 const std::string& type = pieces[0];
407 if (type == "bootloader") {
Yabin Cui7a3f8d62015-09-02 17:44:28 -0700408 D("setting connection_state to kCsBootloader");
Dan Albertdcd78a12015-05-18 16:43:57 -0700409 t->connection_state = kCsBootloader;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800410 update_transports();
Elliott Hughes8d5fa6d2015-04-24 23:02:00 -0700411 } else if (type == "device") {
Yabin Cui7a3f8d62015-09-02 17:44:28 -0700412 D("setting connection_state to kCsDevice");
Dan Albertdcd78a12015-05-18 16:43:57 -0700413 t->connection_state = kCsDevice;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800414 update_transports();
Elliott Hughes8d5fa6d2015-04-24 23:02:00 -0700415 } else if (type == "recovery") {
Yabin Cui7a3f8d62015-09-02 17:44:28 -0700416 D("setting connection_state to kCsRecovery");
Dan Albertdcd78a12015-05-18 16:43:57 -0700417 t->connection_state = kCsRecovery;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800418 update_transports();
Elliott Hughes8d5fa6d2015-04-24 23:02:00 -0700419 } else if (type == "sideload") {
Yabin Cui7a3f8d62015-09-02 17:44:28 -0700420 D("setting connection_state to kCsSideload");
Dan Albertdcd78a12015-05-18 16:43:57 -0700421 t->connection_state = kCsSideload;
Doug Zongker447f0612012-01-09 14:54:53 -0800422 update_transports();
Elliott Hughes3ce95752015-04-29 22:37:25 -0700423 } else {
Yabin Cui7a3f8d62015-09-02 17:44:28 -0700424 D("setting connection_state to kCsHost");
Dan Albertdcd78a12015-05-18 16:43:57 -0700425 t->connection_state = kCsHost;
Doug Zongker447f0612012-01-09 14:54:53 -0800426 }
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800427}
428
Dan Albert1792c232015-05-18 13:06:53 -0700429static void handle_new_connection(atransport* t, apacket* p) {
430 if (t->connection_state != kCsOffline) {
431 t->connection_state = kCsOffline;
432 handle_offline(t);
433 }
434
435 t->update_version(p->msg.arg0, p->msg.arg1);
436 std::string banner(reinterpret_cast<const char*>(p->data),
437 p->msg.data_length);
438 parse_banner(banner, t);
439
440#if ADB_HOST
441 handle_online(t);
442#else
443 if (!auth_required) {
444 handle_online(t);
445 send_connect(t);
446 } else {
447 send_auth_request(t);
448 }
449#endif
450}
451
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800452void handle_packet(apacket *p, atransport *t)
453{
454 asocket *s;
455
Yabin Cui7a3f8d62015-09-02 17:44:28 -0700456 D("handle_packet() %c%c%c%c", ((char*) (&(p->msg.command)))[0],
Viral Mehta899913f2010-06-16 18:41:28 +0530457 ((char*) (&(p->msg.command)))[1],
458 ((char*) (&(p->msg.command)))[2],
459 ((char*) (&(p->msg.command)))[3]);
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800460 print_packet("recv", p);
461
462 switch(p->msg.command){
463 case A_SYNC:
464 if(p->msg.arg0){
465 send_packet(p, t);
Yabin Cui661327e2015-08-11 13:40:42 -0700466#if ADB_HOST
467 send_connect(t);
468#endif
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800469 } else {
Dan Albertdcd78a12015-05-18 16:43:57 -0700470 t->connection_state = kCsOffline;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800471 handle_offline(t);
472 send_packet(p, t);
473 }
474 return;
475
Dan Albert1792c232015-05-18 13:06:53 -0700476 case A_CNXN: // CONNECT(version, maxdata, "system-id-string")
477 handle_new_connection(t, p);
Benoit Gobyd5fcafa2012-04-12 12:23:49 -0700478 break;
479
480 case A_AUTH:
481 if (p->msg.arg0 == ADB_AUTH_TOKEN) {
Dan Albertdcd78a12015-05-18 16:43:57 -0700482 t->connection_state = kCsUnauthorized;
Benoit Gobyd5fcafa2012-04-12 12:23:49 -0700483 t->key = adb_auth_nextkey(t->key);
484 if (t->key) {
485 send_auth_response(p->data, p->msg.data_length, t);
486 } else {
487 /* No more private keys to try, send the public key */
488 send_auth_publickey(t);
489 }
490 } else if (p->msg.arg0 == ADB_AUTH_SIGNATURE) {
491 if (adb_auth_verify(t->token, p->data, p->msg.data_length)) {
492 adb_auth_verified(t);
493 t->failed_auth_attempts = 0;
494 } else {
495 if (t->failed_auth_attempts++ > 10)
496 adb_sleep_ms(1000);
497 send_auth_request(t);
498 }
499 } else if (p->msg.arg0 == ADB_AUTH_RSAPUBLICKEY) {
500 adb_auth_confirm_key(p->data, p->msg.data_length, t);
501 }
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800502 break;
503
504 case A_OPEN: /* OPEN(local-id, 0, "destination") */
David 'Digit' Turner818d6412013-12-13 14:09:44 +0100505 if (t->online && p->msg.arg0 != 0 && p->msg.arg1 == 0) {
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800506 char *name = (char*) p->data;
507 name[p->msg.data_length > 0 ? p->msg.data_length - 1 : 0] = 0;
David Pursell0955c662015-08-31 10:42:13 -0700508 s = create_local_service_socket(name, t);
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800509 if(s == 0) {
510 send_close(0, p->msg.arg0, t);
511 } else {
512 s->peer = create_remote_socket(p->msg.arg0, t);
513 s->peer->peer = s;
514 send_ready(s->id, s->peer->id, t);
515 s->ready(s);
516 }
517 }
518 break;
519
520 case A_OKAY: /* READY(local-id, remote-id, "") */
David 'Digit' Turner818d6412013-12-13 14:09:44 +0100521 if (t->online && p->msg.arg0 != 0 && p->msg.arg1 != 0) {
522 if((s = find_local_socket(p->msg.arg1, 0))) {
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800523 if(s->peer == 0) {
David 'Digit' Turner818d6412013-12-13 14:09:44 +0100524 /* On first READY message, create the connection. */
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800525 s->peer = create_remote_socket(p->msg.arg0, t);
526 s->peer->peer = s;
David 'Digit' Turner818d6412013-12-13 14:09:44 +0100527 s->ready(s);
528 } else if (s->peer->id == p->msg.arg0) {
529 /* Other READY messages must use the same local-id */
530 s->ready(s);
531 } else {
Yabin Cui7a3f8d62015-09-02 17:44:28 -0700532 D("Invalid A_OKAY(%d,%d), expected A_OKAY(%d,%d) on transport %s",
David 'Digit' Turner818d6412013-12-13 14:09:44 +0100533 p->msg.arg0, p->msg.arg1, s->peer->id, p->msg.arg1, t->serial);
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800534 }
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800535 }
536 }
537 break;
538
David 'Digit' Turner818d6412013-12-13 14:09:44 +0100539 case A_CLSE: /* CLOSE(local-id, remote-id, "") or CLOSE(0, remote-id, "") */
540 if (t->online && p->msg.arg1 != 0) {
541 if((s = find_local_socket(p->msg.arg1, p->msg.arg0))) {
542 /* According to protocol.txt, p->msg.arg0 might be 0 to indicate
543 * a failed OPEN only. However, due to a bug in previous ADB
544 * versions, CLOSE(0, remote-id, "") was also used for normal
545 * CLOSE() operations.
546 *
547 * This is bad because it means a compromised adbd could
548 * send packets to close connections between the host and
549 * other devices. To avoid this, only allow this if the local
550 * socket has a peer on the same transport.
551 */
552 if (p->msg.arg0 == 0 && s->peer && s->peer->transport != t) {
Yabin Cui7a3f8d62015-09-02 17:44:28 -0700553 D("Invalid A_CLSE(0, %u) from transport %s, expected transport %s",
David 'Digit' Turner818d6412013-12-13 14:09:44 +0100554 p->msg.arg1, t->serial, s->peer->transport->serial);
555 } else {
556 s->close(s);
557 }
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800558 }
559 }
560 break;
561
David 'Digit' Turner818d6412013-12-13 14:09:44 +0100562 case A_WRTE: /* WRITE(local-id, remote-id, <data>) */
563 if (t->online && p->msg.arg0 != 0 && p->msg.arg1 != 0) {
564 if((s = find_local_socket(p->msg.arg1, p->msg.arg0))) {
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800565 unsigned rid = p->msg.arg0;
566 p->len = p->msg.data_length;
567
568 if(s->enqueue(s, p) == 0) {
Yabin Cui7a3f8d62015-09-02 17:44:28 -0700569 D("Enqueue the socket");
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800570 send_ready(s->id, rid, t);
571 }
572 return;
573 }
574 }
575 break;
576
577 default:
578 printf("handle_packet: what is %08x?!\n", p->msg.command);
579 }
580
581 put_apacket(p);
582}
583
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800584#if ADB_HOST
JP Abgrall571c1362012-12-06 18:18:12 -0800585
Spencer Low2122c7a2015-08-26 18:46:09 -0700586#ifdef _WIN32
587
Spencer Lowbc36bdb2015-09-16 16:40:06 -0700588// Try to make a handle non-inheritable and if there is an error, don't output
589// any error info, but leave GetLastError() for the caller to read. This is
590// convenient if the caller is expecting that this may fail and they'd like to
591// ignore such a failure.
592static bool _try_make_handle_noninheritable(HANDLE h) {
Spencer Low2122c7a2015-08-26 18:46:09 -0700593 if (h != INVALID_HANDLE_VALUE && h != NULL) {
Spencer Lowbc36bdb2015-09-16 16:40:06 -0700594 return SetHandleInformation(h, HANDLE_FLAG_INHERIT, 0) ? true : false;
595 }
596
597 return true;
598}
599
600// Try to make a handle non-inheritable with the expectation that this should
601// succeed, so if this fails, output error info.
602static bool _make_handle_noninheritable(HANDLE h) {
603 if (!_try_make_handle_noninheritable(h)) {
604 // Show the handle value to give us a clue in case we have problems
605 // with pseudo-handle values.
606 fprintf(stderr, "Cannot make handle 0x%p non-inheritable: %s\n",
607 h, SystemErrorCodeToString(GetLastError()).c_str());
608 return false;
Spencer Low2122c7a2015-08-26 18:46:09 -0700609 }
610
611 return true;
612}
613
614// Create anonymous pipe, preventing inheritance of the read pipe and setting
615// security of the write pipe to sa.
616static bool _create_anonymous_pipe(unique_handle* pipe_read_out,
617 unique_handle* pipe_write_out,
618 SECURITY_ATTRIBUTES* sa) {
619 HANDLE pipe_read_raw = NULL;
620 HANDLE pipe_write_raw = NULL;
621 if (!CreatePipe(&pipe_read_raw, &pipe_write_raw, sa, 0)) {
622 fprintf(stderr, "Cannot create pipe: %s\n",
623 SystemErrorCodeToString(GetLastError()).c_str());
624 return false;
625 }
626
627 unique_handle pipe_read(pipe_read_raw);
628 pipe_read_raw = NULL;
629 unique_handle pipe_write(pipe_write_raw);
630 pipe_write_raw = NULL;
631
632 if (!_make_handle_noninheritable(pipe_read.get())) {
633 return false;
634 }
635
636 *pipe_read_out = std::move(pipe_read);
637 *pipe_write_out = std::move(pipe_write);
638
639 return true;
640}
641
642// Read from a pipe (that we take ownership of) and write what is returned to
643// GetStdHandle(nStdHandle). Return on error or when the pipe is closed.
644static unsigned _redirect_pipe_thread(HANDLE h, DWORD nStdHandle) {
645 // Take ownership of the HANDLE and close when we're done.
646 unique_handle read_pipe(h);
647 const HANDLE write_handle = GetStdHandle(nStdHandle);
648 const char* output_name = nStdHandle == STD_OUTPUT_HANDLE ?
649 "stdout" : "stderr";
650
651 while (true) {
652 char buf[64 * 1024];
653 DWORD bytes_read = 0;
654 if (!ReadFile(read_pipe.get(), buf, sizeof(buf), &bytes_read, NULL)) {
655 const DWORD err = GetLastError();
656 // ERROR_BROKEN_PIPE is expected when the subprocess closes
657 // the other end of the pipe.
658 if (err == ERROR_BROKEN_PIPE) {
659 return EXIT_SUCCESS;
660 } else {
661 fprintf(stderr, "Failed to read from %s: %s\n", output_name,
662 SystemErrorCodeToString(err).c_str());
663 return EXIT_FAILURE;
664 }
665 }
666
667 // Don't try to write if our stdout/stderr was not setup by the
668 // parent process.
669 if (write_handle != NULL && write_handle != INVALID_HANDLE_VALUE) {
670 DWORD bytes_written = 0;
671 if (!WriteFile(write_handle, buf, bytes_read, &bytes_written,
672 NULL)) {
673 fprintf(stderr, "Failed to write to %s: %s\n", output_name,
674 SystemErrorCodeToString(GetLastError()).c_str());
675 return EXIT_FAILURE;
676 }
677
678 if (bytes_written != bytes_read) {
679 fprintf(stderr, "Only wrote %lu of %lu bytes to %s\n",
680 bytes_written, bytes_read, output_name);
681 return EXIT_FAILURE;
682 }
683 }
684 }
685}
686
687static unsigned __stdcall _redirect_stdout_thread(HANDLE h) {
Siva Velusamy49ee7cf2015-08-28 16:37:29 -0700688 adb_thread_setname("stdout redirect");
Spencer Low2122c7a2015-08-26 18:46:09 -0700689 return _redirect_pipe_thread(h, STD_OUTPUT_HANDLE);
690}
691
692static unsigned __stdcall _redirect_stderr_thread(HANDLE h) {
Siva Velusamy49ee7cf2015-08-28 16:37:29 -0700693 adb_thread_setname("stderr redirect");
Spencer Low2122c7a2015-08-26 18:46:09 -0700694 return _redirect_pipe_thread(h, STD_ERROR_HANDLE);
695}
696
697#endif
698
Stefan Hilzingera84a42e2010-04-19 12:21:12 +0100699int launch_server(int server_port)
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800700{
Yabin Cuie77b6a02014-11-11 09:24:11 -0800701#if defined(_WIN32)
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800702 /* we need to start the server in the background */
703 /* we create a PIPE that will be used to wait for the server's "OK" */
704 /* message since the pipe handles must be inheritable, we use a */
705 /* security attribute */
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800706 SECURITY_ATTRIBUTES sa;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800707 sa.nLength = sizeof(sa);
708 sa.lpSecurityDescriptor = NULL;
709 sa.bInheritHandle = TRUE;
710
Spencer Low2122c7a2015-08-26 18:46:09 -0700711 // Redirect stdin to Windows /dev/null. If we instead pass an original
712 // stdin/stdout/stderr handle and it is a console handle, when the adb
713 // server starts up, the C Runtime will see a console handle for a process
714 // that isn't connected to a console and it will configure
715 // stdin/stdout/stderr to be closed. At that point, freopen() could be used
716 // to reopen stderr/out, but it would take more massaging to fixup the file
717 // descriptor number that freopen() uses. It's simplest to avoid all of this
718 // complexity by just redirecting stdin to `nul' and then the C Runtime acts
719 // as expected.
720 unique_handle nul_read(CreateFileW(L"nul", GENERIC_READ,
721 FILE_SHARE_READ | FILE_SHARE_WRITE, &sa, OPEN_EXISTING,
722 FILE_ATTRIBUTE_NORMAL, NULL));
723 if (nul_read.get() == INVALID_HANDLE_VALUE) {
724 fprintf(stderr, "Cannot open 'nul': %s\n",
Spencer Low8df90322015-08-02 18:50:17 -0700725 SystemErrorCodeToString(GetLastError()).c_str());
Spencer Lowd0f66c32015-05-20 23:17:26 -0700726 return -1;
727 }
728
Spencer Low2122c7a2015-08-26 18:46:09 -0700729 // create pipes with non-inheritable read handle, inheritable write handle
730 unique_handle ack_read, ack_write;
731 if (!_create_anonymous_pipe(&ack_read, &ack_write, &sa)) {
Spencer Lowd0f66c32015-05-20 23:17:26 -0700732 return -1;
733 }
Spencer Low2122c7a2015-08-26 18:46:09 -0700734 unique_handle stdout_read, stdout_write;
735 if (!_create_anonymous_pipe(&stdout_read, &stdout_write, &sa)) {
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800736 return -1;
737 }
Spencer Low2122c7a2015-08-26 18:46:09 -0700738 unique_handle stderr_read, stderr_write;
739 if (!_create_anonymous_pipe(&stderr_read, &stderr_write, &sa)) {
740 return -1;
741 }
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800742
Ray Donnelly267aa8b2012-11-29 01:18:50 +0000743 /* Some programs want to launch an adb command and collect its output by
744 * calling CreateProcess with inheritable stdout/stderr handles, then
745 * using read() to get its output. When this happens, the stdout/stderr
746 * handles passed to the adb client process will also be inheritable.
747 * When starting the adb server here, care must be taken to reset them
748 * to non-inheritable.
749 * Otherwise, something bad happens: even if the adb command completes,
750 * the calling process is stuck while read()-ing from the stdout/stderr
751 * descriptors, because they're connected to corresponding handles in the
752 * adb server process (even if the latter never uses/writes to them).
Spencer Low2122c7a2015-08-26 18:46:09 -0700753 * Note that even if we don't pass these handles in the STARTUPINFO struct,
754 * if they're marked inheritable, they're still inherited, requiring us to
755 * deal with this.
756 *
757 * If we're still having problems with inheriting random handles in the
758 * future, consider using PROC_THREAD_ATTRIBUTE_HANDLE_LIST to explicitly
759 * specify which handles should be inherited: http://blogs.msdn.com/b/oldnewthing/archive/2011/12/16/10248328.aspx
Spencer Lowbc36bdb2015-09-16 16:40:06 -0700760 *
761 * Older versions of Windows return console pseudo-handles that cannot be
762 * made non-inheritable, so ignore those failures.
Ray Donnelly267aa8b2012-11-29 01:18:50 +0000763 */
Spencer Lowbc36bdb2015-09-16 16:40:06 -0700764 _try_make_handle_noninheritable(GetStdHandle(STD_INPUT_HANDLE));
765 _try_make_handle_noninheritable(GetStdHandle(STD_OUTPUT_HANDLE));
766 _try_make_handle_noninheritable(GetStdHandle(STD_ERROR_HANDLE));
Ray Donnelly267aa8b2012-11-29 01:18:50 +0000767
Spencer Low2122c7a2015-08-26 18:46:09 -0700768 STARTUPINFOW startup;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800769 ZeroMemory( &startup, sizeof(startup) );
770 startup.cb = sizeof(startup);
Spencer Low2122c7a2015-08-26 18:46:09 -0700771 startup.hStdInput = nul_read.get();
772 startup.hStdOutput = stdout_write.get();
773 startup.hStdError = stderr_write.get();
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800774 startup.dwFlags = STARTF_USESTDHANDLES;
775
Spencer Low2122c7a2015-08-26 18:46:09 -0700776 // Verify that the pipe_write handle value can be passed on the command line
777 // as %d and that the rest of adb code can pass it around in an int.
778 const int ack_write_as_int = cast_handle_to_int(ack_write.get());
779 if (cast_int_to_handle(ack_write_as_int) != ack_write.get()) {
780 // If this fires, either handle values are larger than 32-bits or else
781 // there is a bug in our casting.
782 // https://msdn.microsoft.com/en-us/library/windows/desktop/aa384203%28v=vs.85%29.aspx
783 fprintf(stderr, "Cannot fit pipe handle value into 32-bits: 0x%p\n",
784 ack_write.get());
785 return -1;
786 }
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800787
Spencer Low2122c7a2015-08-26 18:46:09 -0700788 // get path of current program
789 WCHAR program_path[MAX_PATH];
790 const DWORD module_result = GetModuleFileNameW(NULL, program_path,
791 arraysize(program_path));
792 if ((module_result >= arraysize(program_path)) || (module_result == 0)) {
Spencer Lowcf4ff642015-05-11 01:08:48 -0700793 // String truncation or some other error.
Spencer Low2122c7a2015-08-26 18:46:09 -0700794 fprintf(stderr, "Cannot get executable path: %s\n",
Spencer Low8df90322015-08-02 18:50:17 -0700795 SystemErrorCodeToString(GetLastError()).c_str());
Spencer Lowcf4ff642015-05-11 01:08:48 -0700796 return -1;
797 }
Spencer Low5c398d22015-08-08 15:07:07 -0700798
Spencer Low2122c7a2015-08-26 18:46:09 -0700799 WCHAR args[64];
Spencer Lowcf4ff642015-05-11 01:08:48 -0700800 snwprintf(args, arraysize(args),
Spencer Low5c398d22015-08-08 15:07:07 -0700801 L"adb -P %d fork-server server --reply-fd %d", server_port,
Spencer Low2122c7a2015-08-26 18:46:09 -0700802 ack_write_as_int);
803
804 PROCESS_INFORMATION pinfo;
805 ZeroMemory(&pinfo, sizeof(pinfo));
806
807 if (!CreateProcessW(
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800808 program_path, /* program path */
Wenhao Lia09558c2013-11-13 16:23:37 +0800809 args,
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800810 /* the fork-server argument will set the
811 debug = 2 in the child */
812 NULL, /* process handle is not inheritable */
813 NULL, /* thread handle is not inheritable */
814 TRUE, /* yes, inherit some handles */
815 DETACHED_PROCESS, /* the new process doesn't have a console */
816 NULL, /* use parent's environment block */
817 NULL, /* use parent's starting directory */
818 &startup, /* startup info, i.e. std handles */
Spencer Low2122c7a2015-08-26 18:46:09 -0700819 &pinfo )) {
820 fprintf(stderr, "Cannot create process: %s\n",
Spencer Low8df90322015-08-02 18:50:17 -0700821 SystemErrorCodeToString(GetLastError()).c_str());
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800822 return -1;
823 }
824
Spencer Low2122c7a2015-08-26 18:46:09 -0700825 unique_handle process_handle(pinfo.hProcess);
826 pinfo.hProcess = NULL;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800827
Spencer Low2122c7a2015-08-26 18:46:09 -0700828 // Close handles that we no longer need to complete the rest.
829 CloseHandle(pinfo.hThread);
830 pinfo.hThread = NULL;
831
832 nul_read.reset();
833 ack_write.reset();
834 stdout_write.reset();
835 stderr_write.reset();
836
837 // Start threads to read from subprocess stdout/stderr and write to ours
838 // to make subprocess errors easier to diagnose.
839
840 // In the past, reading from a pipe before the child process's C Runtime
841 // started up and called GetFileType() caused a hang: http://blogs.msdn.com/b/oldnewthing/archive/2011/12/02/10243553.aspx#10244216
842 // This is reportedly fixed in Windows Vista: https://support.microsoft.com/en-us/kb/2009703
843 // I was unable to reproduce the problem on Windows XP. It sounds like a
844 // Windows Update may have fixed this: https://www.duckware.com/tech/peeknamedpipe.html
845 unique_handle stdout_thread(reinterpret_cast<HANDLE>(
846 _beginthreadex(NULL, 0, _redirect_stdout_thread, stdout_read.get(),
847 0, NULL)));
848 if (stdout_thread.get() == nullptr) {
849 fprintf(stderr, "Cannot create thread: %s\n", strerror(errno));
850 return -1;
851 }
852 stdout_read.release(); // Transfer ownership to new thread
853
854 unique_handle stderr_thread(reinterpret_cast<HANDLE>(
855 _beginthreadex(NULL, 0, _redirect_stderr_thread, stderr_read.get(),
856 0, NULL)));
857 if (stderr_thread.get() == nullptr) {
858 fprintf(stderr, "Cannot create thread: %s\n", strerror(errno));
859 return -1;
860 }
861 stderr_read.release(); // Transfer ownership to new thread
862
863 bool got_ack = false;
864
865 // Wait for the "OK\n" message, for the pipe to be closed, or other error.
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800866 {
Spencer Low2122c7a2015-08-26 18:46:09 -0700867 char temp[3];
868 DWORD count = 0;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800869
Spencer Low2122c7a2015-08-26 18:46:09 -0700870 if (ReadFile(ack_read.get(), temp, sizeof(temp), &count, NULL)) {
871 const CHAR expected[] = "OK\n";
872 const DWORD expected_length = arraysize(expected) - 1;
873 if (count == expected_length &&
874 memcmp(temp, expected, expected_length) == 0) {
875 got_ack = true;
876 } else {
877 fprintf(stderr, "ADB server didn't ACK\n");
878 }
879 } else {
880 const DWORD err = GetLastError();
881 // If the ACK was not written and the process exited, GetLastError()
882 // is probably ERROR_BROKEN_PIPE, in which case that info is not
883 // useful to the user.
884 fprintf(stderr, "could not read ok from ADB Server%s\n",
885 err == ERROR_BROKEN_PIPE ? "" :
886 android::base::StringPrintf(": %s",
887 SystemErrorCodeToString(err).c_str()).c_str());
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800888 }
Spencer Low2122c7a2015-08-26 18:46:09 -0700889 }
890
891 // Always try to wait a bit for threads reading stdout/stderr to finish.
892 // If the process started ok, it should close the pipes causing the threads
893 // to finish. If the process had an error, it should exit, also causing
894 // the pipes to be closed. In that case we want to read all of the output
895 // and write it out so that the user can diagnose failures.
896 const DWORD thread_timeout_ms = 15 * 1000;
897 const HANDLE threads[] = { stdout_thread.get(), stderr_thread.get() };
898 const DWORD wait_result = WaitForMultipleObjects(arraysize(threads),
899 threads, TRUE, thread_timeout_ms);
900 if (wait_result == WAIT_TIMEOUT) {
901 // Threads did not finish after waiting a little while. Perhaps the
902 // server didn't close pipes, or it is hung.
903 fprintf(stderr, "Timed-out waiting for threads to finish reading from "
904 "ADB Server\n");
905 // Process handles are signaled when the process exits, so if we wait
906 // on the handle for 0 seconds and it returns 'timeout', that means that
907 // the process is still running.
908 if (WaitForSingleObject(process_handle.get(), 0) == WAIT_TIMEOUT) {
909 // We could TerminateProcess(), but that seems somewhat presumptive.
910 fprintf(stderr, "ADB Server is running: process id %lu\n",
911 pinfo.dwProcessId);
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800912 }
Spencer Low2122c7a2015-08-26 18:46:09 -0700913 return -1;
914 }
915
916 if (wait_result != WAIT_OBJECT_0) {
917 fprintf(stderr, "Unexpected result waiting for threads: %lu: %s\n",
918 wait_result, SystemErrorCodeToString(GetLastError()).c_str());
919 return -1;
920 }
921
922 // For now ignore the thread exit codes and assume they worked properly.
923
924 if (!got_ack) {
925 return -1;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800926 }
Yabin Cuie77b6a02014-11-11 09:24:11 -0800927#else /* !defined(_WIN32) */
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800928 char path[PATH_MAX];
929 int fd[2];
930
931 // set up a pipe so the child can tell us when it is ready.
Siva Velusamy9f2d1a92015-08-07 10:10:29 -0700932 // fd[0] will be parent's end, and the child will write on fd[1]
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800933 if (pipe(fd)) {
934 fprintf(stderr, "pipe failed in launch_server, errno: %d\n", errno);
935 return -1;
936 }
Alexey Tarasov31664102009-10-22 02:55:00 +1100937 get_my_path(path, PATH_MAX);
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800938 pid_t pid = fork();
939 if(pid < 0) return -1;
940
941 if (pid == 0) {
942 // child side of the fork
943
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800944 adb_close(fd[0]);
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800945
Matt Gumbeld7b33082012-11-14 10:16:17 -0800946 char str_port[30];
Siva Velusamy9f2d1a92015-08-07 10:10:29 -0700947 snprintf(str_port, sizeof(str_port), "%d", server_port);
948 char reply_fd[30];
949 snprintf(reply_fd, sizeof(reply_fd), "%d", fd[1]);
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800950 // child process
Siva Velusamy9f2d1a92015-08-07 10:10:29 -0700951 int result = execl(path, "adb", "-P", str_port, "fork-server", "server", "--reply-fd", reply_fd, NULL);
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800952 // this should not return
953 fprintf(stderr, "OOPS! execl returned %d, errno: %d\n", result, errno);
954 } else {
955 // parent side of the fork
956
957 char temp[3];
958
959 temp[0] = 'A'; temp[1] = 'B'; temp[2] = 'C';
960 // wait for the "OK\n" message
961 adb_close(fd[1]);
962 int ret = adb_read(fd[0], temp, 3);
JP Abgrall408fa572011-03-16 15:57:42 -0700963 int saved_errno = errno;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800964 adb_close(fd[0]);
965 if (ret < 0) {
JP Abgrall408fa572011-03-16 15:57:42 -0700966 fprintf(stderr, "could not read ok from ADB Server, errno = %d\n", saved_errno);
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800967 return -1;
968 }
969 if (ret != 3 || temp[0] != 'O' || temp[1] != 'K' || temp[2] != '\n') {
970 fprintf(stderr, "ADB server didn't ACK\n" );
971 return -1;
972 }
973
974 setsid();
975 }
Yabin Cuie77b6a02014-11-11 09:24:11 -0800976#endif /* !defined(_WIN32) */
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800977 return 0;
978}
Yabin Cuie77b6a02014-11-11 09:24:11 -0800979#endif /* ADB_HOST */
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800980
David 'Digit' Turner25258692013-03-21 21:07:42 +0100981// Try to handle a network forwarding request.
982// This returns 1 on success, 0 on failure, and -1 to indicate this is not
983// a forwarding-related request.
Elliott Hughesaee80fb2015-05-07 21:38:41 -0700984int handle_forward_request(const char* service, TransportType type, const char* serial, int reply_fd)
David 'Digit' Turner25258692013-03-21 21:07:42 +0100985{
986 if (!strcmp(service, "list-forward")) {
987 // Create the list of forward redirections.
Elliott Hughese67f1f82015-04-30 17:32:03 -0700988 std::string listeners = format_listeners();
David 'Digit' Turner25258692013-03-21 21:07:42 +0100989#if ADB_HOST
Elliott Hughese67f1f82015-04-30 17:32:03 -0700990 SendOkay(reply_fd);
David 'Digit' Turner25258692013-03-21 21:07:42 +0100991#endif
Elliott Hughese67f1f82015-04-30 17:32:03 -0700992 SendProtocolString(reply_fd, listeners);
David 'Digit' Turner25258692013-03-21 21:07:42 +0100993 return 1;
994 }
995
996 if (!strcmp(service, "killforward-all")) {
997 remove_all_listeners();
998#if ADB_HOST
999 /* On the host: 1st OKAY is connect, 2nd OKAY is status */
Elliott Hughese67f1f82015-04-30 17:32:03 -07001000 SendOkay(reply_fd);
David 'Digit' Turner25258692013-03-21 21:07:42 +01001001#endif
Elliott Hughese67f1f82015-04-30 17:32:03 -07001002 SendOkay(reply_fd);
David 'Digit' Turner25258692013-03-21 21:07:42 +01001003 return 1;
1004 }
1005
Elliott Hughes424af022015-05-29 17:55:19 -07001006 if (!strncmp(service, "forward:", 8) || !strncmp(service, "killforward:", 12)) {
1007 // killforward:local
1008 // forward:(norebind:)?local;remote
1009 bool kill_forward = false;
1010 bool no_rebind = false;
1011 if (android::base::StartsWith(service, "killforward:")) {
1012 kill_forward = true;
1013 service += 12;
Spencer Lowa6b340a2015-07-29 17:21:21 -07001014 } else {
1015 service += 8; // skip past "forward:"
Elliott Hughes424af022015-05-29 17:55:19 -07001016 if (android::base::StartsWith(service, "norebind:")) {
1017 no_rebind = true;
1018 service += 9;
1019 }
David 'Digit' Turner25258692013-03-21 21:07:42 +01001020 }
1021
Elliott Hughes424af022015-05-29 17:55:19 -07001022 std::vector<std::string> pieces = android::base::Split(service, ";");
David 'Digit' Turner25258692013-03-21 21:07:42 +01001023
Elliott Hughes424af022015-05-29 17:55:19 -07001024 if (kill_forward) {
1025 // Check killforward: parameter format: '<local>'
1026 if (pieces.size() != 1 || pieces[0].empty()) {
1027 SendFail(reply_fd, android::base::StringPrintf("bad killforward: %s", service));
David 'Digit' Turner25258692013-03-21 21:07:42 +01001028 return 1;
1029 }
1030 } else {
Elliott Hughes424af022015-05-29 17:55:19 -07001031 // Check forward: parameter format: '<local>;<remote>'
1032 if (pieces.size() != 2 || pieces[0].empty() || pieces[1].empty() || pieces[1][0] == '*') {
1033 SendFail(reply_fd, android::base::StringPrintf("bad forward: %s", service));
David 'Digit' Turner25258692013-03-21 21:07:42 +01001034 return 1;
1035 }
1036 }
1037
Elliott Hughes7be29c82015-04-16 22:54:44 -07001038 std::string error_msg;
Elliott Hughes424af022015-05-29 17:55:19 -07001039 atransport* transport = acquire_one_transport(kCsAny, type, serial, &error_msg);
David 'Digit' Turner25258692013-03-21 21:07:42 +01001040 if (!transport) {
Elliott Hughese67f1f82015-04-30 17:32:03 -07001041 SendFail(reply_fd, error_msg);
David 'Digit' Turner25258692013-03-21 21:07:42 +01001042 return 1;
1043 }
1044
Spencer Low5200c662015-07-30 23:07:55 -07001045 std::string error;
Elliott Hughes3bd73c12015-05-05 13:10:43 -07001046 InstallStatus r;
Elliott Hughes424af022015-05-29 17:55:19 -07001047 if (kill_forward) {
1048 r = remove_listener(pieces[0].c_str(), transport);
David 'Digit' Turner25258692013-03-21 21:07:42 +01001049 } else {
Spencer Low5200c662015-07-30 23:07:55 -07001050 r = install_listener(pieces[0], pieces[1].c_str(), transport,
1051 no_rebind, &error);
David 'Digit' Turner25258692013-03-21 21:07:42 +01001052 }
Elliott Hughes7b506092015-04-20 08:09:20 -07001053 if (r == INSTALL_STATUS_OK) {
David 'Digit' Turner25258692013-03-21 21:07:42 +01001054#if ADB_HOST
1055 /* On the host: 1st OKAY is connect, 2nd OKAY is status */
Elliott Hughese67f1f82015-04-30 17:32:03 -07001056 SendOkay(reply_fd);
David 'Digit' Turner25258692013-03-21 21:07:42 +01001057#endif
Elliott Hughese67f1f82015-04-30 17:32:03 -07001058 SendOkay(reply_fd);
David 'Digit' Turner25258692013-03-21 21:07:42 +01001059 return 1;
1060 }
1061
Elliott Hughes7b506092015-04-20 08:09:20 -07001062 std::string message;
1063 switch (r) {
Elliott Hughes424af022015-05-29 17:55:19 -07001064 case INSTALL_STATUS_OK: message = "success (!)"; break;
Elliott Hughes7b506092015-04-20 08:09:20 -07001065 case INSTALL_STATUS_INTERNAL_ERROR: message = "internal error"; break;
1066 case INSTALL_STATUS_CANNOT_BIND:
Spencer Lowbf7c6052015-08-11 16:45:32 -07001067 message = android::base::StringPrintf("cannot bind listener: %s",
Spencer Low5200c662015-07-30 23:07:55 -07001068 error.c_str());
Elliott Hughes7b506092015-04-20 08:09:20 -07001069 break;
1070 case INSTALL_STATUS_CANNOT_REBIND:
Spencer Lowa6b340a2015-07-29 17:21:21 -07001071 message = android::base::StringPrintf("cannot rebind existing socket");
Elliott Hughes7b506092015-04-20 08:09:20 -07001072 break;
Elliott Hughes424af022015-05-29 17:55:19 -07001073 case INSTALL_STATUS_LISTENER_NOT_FOUND:
1074 message = android::base::StringPrintf("listener '%s' not found", service);
1075 break;
David 'Digit' Turner25258692013-03-21 21:07:42 +01001076 }
Elliott Hughese67f1f82015-04-30 17:32:03 -07001077 SendFail(reply_fd, message);
David 'Digit' Turner25258692013-03-21 21:07:42 +01001078 return 1;
1079 }
1080 return 0;
1081}
1082
Elliott Hughese2d36772015-06-23 13:00:32 -07001083#if ADB_HOST
1084static int SendOkay(int fd, const std::string& s) {
1085 SendOkay(fd);
1086 SendProtocolString(fd, s);
1087 return 0;
1088}
1089#endif
1090
Dan Albertc89e0cc2015-05-08 16:13:53 -07001091int handle_host_request(const char* service, TransportType type,
1092 const char* serial, int reply_fd, asocket* s) {
1093 if (strcmp(service, "kill") == 0) {
1094 fprintf(stderr, "adb server killed by remote request\n");
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -08001095 fflush(stdout);
Elliott Hughese67f1f82015-04-30 17:32:03 -07001096 SendOkay(reply_fd);
Spencer Lowf18fc082015-08-11 17:05:02 -07001097
1098 // At least on Windows, if we exit() without shutdown(SD_SEND) or
1099 // closesocket(), the client's next recv() will error-out with
1100 // WSAECONNRESET and they'll never read the OKAY.
1101 adb_shutdown(reply_fd);
1102
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -08001103 exit(0);
1104 }
1105
1106#if ADB_HOST
1107 // "transport:" is used for switching transport with a specified serial number
1108 // "transport-usb:" is used for switching transport to the only USB transport
1109 // "transport-local:" is used for switching transport to the only local transport
1110 // "transport-any:" is used for switching transport to the only transport
1111 if (!strncmp(service, "transport", strlen("transport"))) {
Elliott Hughes3bd73c12015-05-05 13:10:43 -07001112 TransportType type = kTransportAny;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -08001113
1114 if (!strncmp(service, "transport-usb", strlen("transport-usb"))) {
1115 type = kTransportUsb;
1116 } else if (!strncmp(service, "transport-local", strlen("transport-local"))) {
1117 type = kTransportLocal;
1118 } else if (!strncmp(service, "transport-any", strlen("transport-any"))) {
1119 type = kTransportAny;
1120 } else if (!strncmp(service, "transport:", strlen("transport:"))) {
1121 service += strlen("transport:");
Tom Marlin3175c8e2011-07-27 12:56:14 -05001122 serial = service;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -08001123 }
1124
Elliott Hughese2d36772015-06-23 13:00:32 -07001125 std::string error_msg;
1126 atransport* t = acquire_one_transport(kCsAny, type, serial, &error_msg);
1127 if (t != nullptr) {
1128 s->transport = t;
Elliott Hughese67f1f82015-04-30 17:32:03 -07001129 SendOkay(reply_fd);
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -08001130 } else {
Elliott Hughese67f1f82015-04-30 17:32:03 -07001131 SendFail(reply_fd, error_msg);
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -08001132 }
1133 return 1;
1134 }
1135
1136 // return a list of all connected devices
Scott Andersone109d262012-04-20 11:21:14 -07001137 if (!strncmp(service, "devices", 7)) {
Elliott Hughese67f1f82015-04-30 17:32:03 -07001138 bool long_listing = (strcmp(service+7, "-l") == 0);
1139 if (long_listing || service[7] == 0) {
Yabin Cui7a3f8d62015-09-02 17:44:28 -07001140 D("Getting device list...");
Elliott Hughese67f1f82015-04-30 17:32:03 -07001141 std::string device_list = list_transports(long_listing);
Yabin Cui7a3f8d62015-09-02 17:44:28 -07001142 D("Sending device list...");
Elliott Hughese2d36772015-06-23 13:00:32 -07001143 return SendOkay(reply_fd, device_list);
Scott Andersone109d262012-04-20 11:21:14 -07001144 }
Elliott Hughese67f1f82015-04-30 17:32:03 -07001145 return 1;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -08001146 }
1147
Dan Albert90d4b732015-05-20 18:58:41 -07001148 if (!strcmp(service, "features")) {
David Pursell880be432015-09-04 16:40:30 -07001149 std::string error_msg;
1150 atransport* t = acquire_one_transport(kCsAny, type, serial, &error_msg);
1151 if (t != nullptr) {
1152 SendOkay(reply_fd, android::base::Join(t->features(), '\n'));
1153 } else {
1154 SendFail(reply_fd, error_msg);
1155 }
1156 return 0;
1157 }
1158
1159 if (!strncmp(service, "check-feature:", strlen("check-feature:"))) {
1160 std::string error_msg;
1161 atransport* t = acquire_one_transport(kCsAny, type, serial, &error_msg);
1162 if (t && t->CanUseFeature(service + strlen("check-feature:"))) {
1163 // We could potentially extend this to reply with the feature
1164 // version if that becomes necessary.
1165 SendOkay(reply_fd, "1");
1166 } else {
1167 // Empty response means unsupported feature.
1168 SendOkay(reply_fd, "");
1169 }
Dan Albert90d4b732015-05-20 18:58:41 -07001170 return 0;
1171 }
1172
Mike Lockwood74d7ff82009-10-11 23:04:18 -04001173 // remove TCP transport
1174 if (!strncmp(service, "disconnect:", 11)) {
Elliott Hughes3d5f60d2015-07-18 12:21:30 -07001175 const std::string address(service + 11);
1176 if (address.empty()) {
Yabin Cuif4b99282015-08-27 12:03:11 -07001177 kick_all_tcp_devices();
Elliott Hughes3d5f60d2015-07-18 12:21:30 -07001178 return SendOkay(reply_fd, "disconnected everything");
Mike Lockwood74d7ff82009-10-11 23:04:18 -04001179 }
1180
Elliott Hughes3d5f60d2015-07-18 12:21:30 -07001181 std::string serial;
1182 std::string host;
1183 int port = DEFAULT_ADB_LOCAL_TRANSPORT_PORT;
1184 std::string error;
1185 if (!parse_host_and_port(address, &serial, &host, &port, &error)) {
1186 return SendFail(reply_fd, android::base::StringPrintf("couldn't parse '%s': %s",
1187 address.c_str(), error.c_str()));
1188 }
1189 atransport* t = find_transport(serial.c_str());
1190 if (t == nullptr) {
1191 return SendFail(reply_fd, android::base::StringPrintf("no such device '%s'",
1192 serial.c_str()));
1193 }
Yabin Cuif4b99282015-08-27 12:03:11 -07001194 kick_transport(t);
Elliott Hughes3d5f60d2015-07-18 12:21:30 -07001195 return SendOkay(reply_fd, android::base::StringPrintf("disconnected %s", address.c_str()));
Mike Lockwood2f38b692009-08-24 15:58:40 -07001196 }
1197
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -08001198 // returns our value for ADB_SERVER_VERSION
1199 if (!strcmp(service, "version")) {
Elliott Hughese2d36772015-06-23 13:00:32 -07001200 return SendOkay(reply_fd, android::base::StringPrintf("%04x", ADB_SERVER_VERSION));
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -08001201 }
1202
Elliott Hughese2d36772015-06-23 13:00:32 -07001203 // These always report "unknown" rather than the actual error, for scripts.
1204 if (!strcmp(service, "get-serialno")) {
1205 std::string ignored;
1206 atransport* t = acquire_one_transport(kCsAny, type, serial, &ignored);
1207 return SendOkay(reply_fd, (t && t->serial) ? t->serial : "unknown");
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -08001208 }
Elliott Hughese2d36772015-06-23 13:00:32 -07001209 if (!strcmp(service, "get-devpath")) {
1210 std::string ignored;
1211 atransport* t = acquire_one_transport(kCsAny, type, serial, &ignored);
1212 return SendOkay(reply_fd, (t && t->devpath) ? t->devpath : "unknown");
Scott Andersone109d262012-04-20 11:21:14 -07001213 }
Elliott Hughese2d36772015-06-23 13:00:32 -07001214 if (!strcmp(service, "get-state")) {
1215 std::string ignored;
1216 atransport* t = acquire_one_transport(kCsAny, type, serial, &ignored);
1217 return SendOkay(reply_fd, t ? t->connection_state_name() : "unknown");
1218 }
1219
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -08001220 // indicates a new emulator instance has started
Elliott Hughese2d36772015-06-23 13:00:32 -07001221 if (!strncmp(service, "emulator:", 9)) {
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -08001222 int port = atoi(service+9);
1223 local_connect(port);
1224 /* we don't even need to send a reply */
1225 return 0;
1226 }
Simon Yedc22c3c2014-07-14 17:23:06 -07001227#endif // ADB_HOST
1228
Elliott Hughes3bd73c12015-05-05 13:10:43 -07001229 int ret = handle_forward_request(service, type, serial, reply_fd);
Simon Yedc22c3c2014-07-14 17:23:06 -07001230 if (ret >= 0)
1231 return ret - 1;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -08001232 return -1;
1233}