1 /*
2 * Copyright (C) 2007 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 #define TRACE_TAG USB
18
19 #include "sysdeps.h"
20
21 #include "client/usb.h"
22
23 #include <ctype.h>
24 #include <dirent.h>
25 #include <errno.h>
26 #include <fcntl.h>
27 #include <linux/usb/ch9.h>
28 #include <linux/usbdevice_fs.h>
29 #include <linux/version.h>
30 #include <stdio.h>
31 #include <stdlib.h>
32 #include <string.h>
33 #include <sys/ioctl.h>
34 #include <sys/time.h>
35 #include <sys/sysmacros.h>
36 #include <sys/types.h>
37 #include <unistd.h>
38
39 #include <chrono>
40 #include <condition_variable>
41 #include <list>
42 #include <mutex>
43 #include <string>
44 #include <string_view>
45 #include <thread>
46
47 #include <android-base/file.h>
48 #include <android-base/stringprintf.h>
49 #include <android-base/strings.h>
50
51 #include "adb.h"
52 #include "transport.h"
53
54 using namespace std::chrono_literals;
55 using namespace std::literals;
56
57 /* usb scan debugging is waaaay too verbose */
58 #define DBGX(x...)
59
60 struct usb_handle {
~usb_handleusb_handle61 ~usb_handle() {
62 if (fd != -1) unix_close(fd);
63 }
64
65 std::string path;
66 int fd = -1;
67 unsigned char ep_in;
68 unsigned char ep_out;
69
70 size_t max_packet_size;
71 unsigned zero_mask;
72 unsigned writeable = 1;
73
74 // The usbdevfs_urb structure ends in a variable length array of
75 // usbdevfs_iso_packet_desc. Since none of the usb calls ever attempt
76 // to fill in those values, ignore this warning.
77 #pragma clang diagnostic push
78 #pragma clang diagnostic ignored "-Wgnu-variable-sized-type-not-at-end"
79 usbdevfs_urb urb_in;
80 usbdevfs_urb urb_out;
81 #pragma clang diagnostic pop
82
83 bool urb_in_busy = false;
84 bool urb_out_busy = false;
85 bool dead = false;
86
87 std::condition_variable cv;
88 std::mutex mutex;
89
90 // for garbage collecting disconnected devices
91 bool mark;
92
93 // ID of thread currently in REAPURB
94 pthread_t reaper_thread = 0;
95 };
96
97 static auto& g_usb_handles_mutex = *new std::mutex();
98 static auto& g_usb_handles = *new std::list<usb_handle*>();
99
is_known_device(std::string_view dev_name)100 static int is_known_device(std::string_view dev_name) {
101 std::lock_guard<std::mutex> lock(g_usb_handles_mutex);
102 for (usb_handle* usb : g_usb_handles) {
103 if (usb->path == dev_name) {
104 // set mark flag to indicate this device is still alive
105 usb->mark = true;
106 return 1;
107 }
108 }
109 return 0;
110 }
111
kick_disconnected_devices()112 static void kick_disconnected_devices() {
113 std::lock_guard<std::mutex> lock(g_usb_handles_mutex);
114 // kick any devices in the device list that were not found in the device scan
115 for (usb_handle* usb : g_usb_handles) {
116 if (!usb->mark) {
117 usb_kick(usb);
118 } else {
119 usb->mark = false;
120 }
121 }
122 }
123
contains_non_digit(const char * name)124 static inline bool contains_non_digit(const char* name) {
125 while (*name) {
126 if (!isdigit(*name++)) return true;
127 }
128 return false;
129 }
130
find_usb_device(const std::string & base,void (* register_device_callback)(const char *,const char *,unsigned char,unsigned char,int,int,unsigned,size_t))131 static void find_usb_device(const std::string& base,
132 void (*register_device_callback)(const char*, const char*,
133 unsigned char, unsigned char, int, int,
134 unsigned, size_t)) {
135 std::unique_ptr<DIR, int(*)(DIR*)> bus_dir(opendir(base.c_str()), closedir);
136 if (!bus_dir) return;
137
138 dirent* de;
139 while ((de = readdir(bus_dir.get())) != nullptr) {
140 if (contains_non_digit(de->d_name)) continue;
141
142 std::string bus_name = base + "/" + de->d_name;
143
144 std::unique_ptr<DIR, int(*)(DIR*)> dev_dir(opendir(bus_name.c_str()), closedir);
145 if (!dev_dir) continue;
146
147 while ((de = readdir(dev_dir.get()))) {
148 unsigned char devdesc[4096];
149 unsigned char* bufptr = devdesc;
150 unsigned char* bufend;
151 struct usb_device_descriptor* device;
152 struct usb_config_descriptor* config;
153 struct usb_interface_descriptor* interface;
154 struct usb_endpoint_descriptor *ep1, *ep2;
155 unsigned zero_mask = 0;
156 size_t max_packet_size = 0;
157
158 if (contains_non_digit(de->d_name)) continue;
159
160 std::string dev_name = bus_name + "/" + de->d_name;
161 if (is_known_device(dev_name)) {
162 continue;
163 }
164
165 int fd = unix_open(dev_name, O_RDONLY | O_CLOEXEC);
166 if (fd == -1) {
167 continue;
168 }
169
170 size_t desclength = unix_read(fd, devdesc, sizeof(devdesc));
171 bufend = bufptr + desclength;
172
173 // should have device and configuration descriptors, and atleast two endpoints
174 if (desclength < USB_DT_DEVICE_SIZE + USB_DT_CONFIG_SIZE) {
175 D("desclength %zu is too small", desclength);
176 unix_close(fd);
177 continue;
178 }
179
180 device = (struct usb_device_descriptor*)bufptr;
181 bufptr += USB_DT_DEVICE_SIZE;
182
183 if((device->bLength != USB_DT_DEVICE_SIZE) || (device->bDescriptorType != USB_DT_DEVICE)) {
184 unix_close(fd);
185 continue;
186 }
187
188 DBGX("[ %s is V:%04x P:%04x ]\n", dev_name.c_str(), device->idVendor,
189 device->idProduct);
190
191 // should have config descriptor next
192 config = (struct usb_config_descriptor *)bufptr;
193 bufptr += USB_DT_CONFIG_SIZE;
194 if (config->bLength != USB_DT_CONFIG_SIZE || config->bDescriptorType != USB_DT_CONFIG) {
195 D("usb_config_descriptor not found");
196 unix_close(fd);
197 continue;
198 }
199
200 // loop through all the descriptors and look for the ADB interface
201 while (bufptr < bufend) {
202 unsigned char length = bufptr[0];
203 unsigned char type = bufptr[1];
204
205 if (type == USB_DT_INTERFACE) {
206 interface = (struct usb_interface_descriptor *)bufptr;
207 bufptr += length;
208
209 if (length != USB_DT_INTERFACE_SIZE) {
210 D("interface descriptor has wrong size");
211 break;
212 }
213
214 DBGX("bInterfaceClass: %d, bInterfaceSubClass: %d,"
215 "bInterfaceProtocol: %d, bNumEndpoints: %d\n",
216 interface->bInterfaceClass, interface->bInterfaceSubClass,
217 interface->bInterfaceProtocol, interface->bNumEndpoints);
218
219 if (interface->bNumEndpoints == 2 &&
220 is_adb_interface(interface->bInterfaceClass, interface->bInterfaceSubClass,
221 interface->bInterfaceProtocol)) {
222 struct stat st;
223 char pathbuf[128];
224 char link[256];
225 char *devpath = nullptr;
226
227 DBGX("looking for bulk endpoints\n");
228 // looks like ADB...
229 ep1 = (struct usb_endpoint_descriptor *)bufptr;
230 bufptr += USB_DT_ENDPOINT_SIZE;
231 // For USB 3.0 SuperSpeed devices, skip potential
232 // USB 3.0 SuperSpeed Endpoint Companion descriptor
233 if (bufptr+2 <= devdesc + desclength &&
234 bufptr[0] == USB_DT_SS_EP_COMP_SIZE &&
235 bufptr[1] == USB_DT_SS_ENDPOINT_COMP) {
236 bufptr += USB_DT_SS_EP_COMP_SIZE;
237 }
238 ep2 = (struct usb_endpoint_descriptor *)bufptr;
239 bufptr += USB_DT_ENDPOINT_SIZE;
240 if (bufptr+2 <= devdesc + desclength &&
241 bufptr[0] == USB_DT_SS_EP_COMP_SIZE &&
242 bufptr[1] == USB_DT_SS_ENDPOINT_COMP) {
243 bufptr += USB_DT_SS_EP_COMP_SIZE;
244 }
245
246 if (bufptr > devdesc + desclength ||
247 ep1->bLength != USB_DT_ENDPOINT_SIZE ||
248 ep1->bDescriptorType != USB_DT_ENDPOINT ||
249 ep2->bLength != USB_DT_ENDPOINT_SIZE ||
250 ep2->bDescriptorType != USB_DT_ENDPOINT) {
251 D("endpoints not found");
252 break;
253 }
254
255 // both endpoints should be bulk
256 if (ep1->bmAttributes != USB_ENDPOINT_XFER_BULK ||
257 ep2->bmAttributes != USB_ENDPOINT_XFER_BULK) {
258 D("bulk endpoints not found");
259 continue;
260 }
261 /* aproto 01 needs 0 termination */
262 if (interface->bInterfaceProtocol == ADB_PROTOCOL) {
263 max_packet_size = ep1->wMaxPacketSize;
264 zero_mask = ep1->wMaxPacketSize - 1;
265 }
266
267 // we have a match. now we just need to figure out which is in and which is out.
268 unsigned char local_ep_in, local_ep_out;
269 if (ep1->bEndpointAddress & USB_ENDPOINT_DIR_MASK) {
270 local_ep_in = ep1->bEndpointAddress;
271 local_ep_out = ep2->bEndpointAddress;
272 } else {
273 local_ep_in = ep2->bEndpointAddress;
274 local_ep_out = ep1->bEndpointAddress;
275 }
276
277 // Determine the device path
278 if (!fstat(fd, &st) && S_ISCHR(st.st_mode)) {
279 snprintf(pathbuf, sizeof(pathbuf), "/sys/dev/char/%d:%d",
280 major(st.st_rdev), minor(st.st_rdev));
281 ssize_t link_len = readlink(pathbuf, link, sizeof(link) - 1);
282 if (link_len > 0) {
283 link[link_len] = '\0';
284 const char* slash = strrchr(link, '/');
285 if (slash) {
286 snprintf(pathbuf, sizeof(pathbuf),
287 "usb:%s", slash + 1);
288 devpath = pathbuf;
289 }
290 }
291 }
292
293 register_device_callback(dev_name.c_str(), devpath, local_ep_in,
294 local_ep_out, interface->bInterfaceNumber,
295 device->iSerialNumber, zero_mask, max_packet_size);
296 break;
297 }
298 } else {
299 bufptr += length;
300 }
301 } // end of while
302
303 unix_close(fd);
304 }
305 }
306 }
307
usb_bulk_write(usb_handle * h,const void * data,int len)308 static int usb_bulk_write(usb_handle* h, const void* data, int len) {
309 std::unique_lock<std::mutex> lock(h->mutex);
310 D("++ usb_bulk_write ++");
311
312 usbdevfs_urb* urb = &h->urb_out;
313 memset(urb, 0, sizeof(*urb));
314 urb->type = USBDEVFS_URB_TYPE_BULK;
315 urb->endpoint = h->ep_out;
316 urb->status = -1;
317 urb->buffer = const_cast<void*>(data);
318 urb->buffer_length = len;
319
320 if (h->dead) {
321 errno = EINVAL;
322 return -1;
323 }
324
325 if (TEMP_FAILURE_RETRY(ioctl(h->fd, USBDEVFS_SUBMITURB, urb)) == -1) {
326 return -1;
327 }
328
329 h->urb_out_busy = true;
330 while (true) {
331 auto now = std::chrono::steady_clock::now();
332 if (h->cv.wait_until(lock, now + 5s) == std::cv_status::timeout || h->dead) {
333 // TODO: call USBDEVFS_DISCARDURB?
334 errno = ETIMEDOUT;
335 return -1;
336 }
337 if (!h->urb_out_busy) {
338 if (urb->status != 0) {
339 errno = -urb->status;
340 return -1;
341 }
342 return urb->actual_length;
343 }
344 }
345 }
346
usb_bulk_read(usb_handle * h,void * data,int len)347 static int usb_bulk_read(usb_handle* h, void* data, int len) {
348 std::unique_lock<std::mutex> lock(h->mutex);
349 D("++ usb_bulk_read ++");
350
351 usbdevfs_urb* urb = &h->urb_in;
352 memset(urb, 0, sizeof(*urb));
353 urb->type = USBDEVFS_URB_TYPE_BULK;
354 urb->endpoint = h->ep_in;
355 urb->status = -1;
356 urb->buffer = data;
357 urb->buffer_length = len;
358
359 if (h->dead) {
360 errno = EINVAL;
361 return -1;
362 }
363
364 if (TEMP_FAILURE_RETRY(ioctl(h->fd, USBDEVFS_SUBMITURB, urb)) == -1) {
365 return -1;
366 }
367
368 h->urb_in_busy = true;
369 while (true) {
370 D("[ reap urb - wait ]");
371 h->reaper_thread = pthread_self();
372 int fd = h->fd;
373 lock.unlock();
374
375 // This ioctl must not have TEMP_FAILURE_RETRY because we send SIGALRM to break out.
376 usbdevfs_urb* out = nullptr;
377 int res = ioctl(fd, USBDEVFS_REAPURB, &out);
378 int saved_errno = errno;
379
380 lock.lock();
381 h->reaper_thread = 0;
382 if (h->dead) {
383 errno = EINVAL;
384 return -1;
385 }
386 if (res < 0) {
387 if (saved_errno == EINTR) {
388 continue;
389 }
390 D("[ reap urb - error ]");
391 errno = saved_errno;
392 return -1;
393 }
394 D("[ urb @%p status = %d, actual = %d ]", out, out->status, out->actual_length);
395
396 if (out == &h->urb_in) {
397 D("[ reap urb - IN complete ]");
398 h->urb_in_busy = false;
399 if (urb->status != 0) {
400 errno = -urb->status;
401 return -1;
402 }
403 return urb->actual_length;
404 }
405 if (out == &h->urb_out) {
406 D("[ reap urb - OUT compelete ]");
407 h->urb_out_busy = false;
408 h->cv.notify_all();
409 }
410 }
411 }
412
usb_write_split(usb_handle * h,unsigned char * data,int len)413 static int usb_write_split(usb_handle* h, unsigned char* data, int len) {
414 for (int i = 0; i < len; i += 16384) {
415 int chunk_size = (i + 16384 > len) ? len - i : 16384;
416 int n = usb_bulk_write(h, data + i, chunk_size);
417 if (n != chunk_size) {
418 D("ERROR: n = %d, errno = %d (%s)", n, errno, strerror(errno));
419 return -1;
420 }
421 }
422
423 return len;
424 }
425
usb_write(usb_handle * h,const void * _data,int len)426 int usb_write(usb_handle* h, const void* _data, int len) {
427 D("++ usb_write ++");
428
429 unsigned char* data = (unsigned char*)_data;
430
431 // The kernel will attempt to allocate a contiguous buffer for each write we submit.
432 // This might fail due to heap fragmentation, so attempt a contiguous write once, and if that
433 // fails, retry after having split the data into 16kB chunks to avoid allocation failure.
434 int n = usb_bulk_write(h, data, len);
435 if (n == -1 && errno == ENOMEM) {
436 n = usb_write_split(h, data, len);
437 }
438
439 if (n == -1) {
440 return -1;
441 }
442
443 if (h->zero_mask && !(len & h->zero_mask)) {
444 // If we need 0-markers and our transfer is an even multiple of the packet size,
445 // then send a zero marker.
446 return usb_bulk_write(h, _data, 0) == 0 ? len : -1;
447 }
448
449 D("-- usb_write --");
450 return len;
451 }
452
usb_read(usb_handle * h,void * _data,int len)453 int usb_read(usb_handle *h, void *_data, int len)
454 {
455 unsigned char *data = (unsigned char*) _data;
456 int n;
457
458 D("++ usb_read ++");
459 int orig_len = len;
460 while (len == orig_len) {
461 int xfer = len;
462
463 D("[ usb read %d fd = %d], path=%s", xfer, h->fd, h->path.c_str());
464 n = usb_bulk_read(h, data, xfer);
465 D("[ usb read %d ] = %d, path=%s", xfer, n, h->path.c_str());
466 if (n <= 0) {
467 if((errno == ETIMEDOUT) && (h->fd != -1)) {
468 D("[ timeout ]");
469 continue;
470 }
471 D("ERROR: n = %d, errno = %d (%s)",
472 n, errno, strerror(errno));
473 return -1;
474 }
475
476 len -= n;
477 data += n;
478 }
479
480 D("-- usb_read --");
481 return orig_len - len;
482 }
483
usb_reset(usb_handle * h)484 void usb_reset(usb_handle* h) {
485 ioctl(h->fd, USBDEVFS_RESET);
486 usb_kick(h);
487 }
488
usb_kick(usb_handle * h)489 void usb_kick(usb_handle* h) {
490 std::lock_guard<std::mutex> lock(h->mutex);
491 D("[ kicking %p (fd = %d) ]", h, h->fd);
492 if (!h->dead) {
493 h->dead = true;
494
495 if (h->writeable) {
496 /* HACK ALERT!
497 ** Sometimes we get stuck in ioctl(USBDEVFS_REAPURB).
498 ** This is a workaround for that problem.
499 */
500 if (h->reaper_thread) {
501 pthread_kill(h->reaper_thread, SIGALRM);
502 }
503
504 /* cancel any pending transactions
505 ** these will quietly fail if the txns are not active,
506 ** but this ensures that a reader blocked on REAPURB
507 ** will get unblocked
508 */
509 ioctl(h->fd, USBDEVFS_DISCARDURB, &h->urb_in);
510 ioctl(h->fd, USBDEVFS_DISCARDURB, &h->urb_out);
511 h->urb_in.status = -ENODEV;
512 h->urb_out.status = -ENODEV;
513 h->urb_in_busy = false;
514 h->urb_out_busy = false;
515 h->cv.notify_all();
516 } else {
517 unregister_usb_transport(h);
518 }
519 }
520 }
521
usb_close(usb_handle * h)522 int usb_close(usb_handle* h) {
523 std::lock_guard<std::mutex> lock(g_usb_handles_mutex);
524 g_usb_handles.remove(h);
525
526 D("-- usb close %p (fd = %d) --", h, h->fd);
527
528 delete h;
529
530 return 0;
531 }
532
usb_get_max_packet_size(usb_handle * h)533 size_t usb_get_max_packet_size(usb_handle* h) {
534 return h->max_packet_size;
535 }
536
register_device(const char * dev_name,const char * dev_path,unsigned char ep_in,unsigned char ep_out,int interface,int serial_index,unsigned zero_mask,size_t max_packet_size)537 static void register_device(const char* dev_name, const char* dev_path, unsigned char ep_in,
538 unsigned char ep_out, int interface, int serial_index,
539 unsigned zero_mask, size_t max_packet_size) {
540 // Read the device's serial number.
541 std::string serial_path =
542 android::base::StringPrintf("/sys/bus/usb/devices/%s/serial", dev_path + 4);
543 std::string serial;
544 if (!android::base::ReadFileToString(serial_path, &serial)) {
545 D("[ usb read %s failed: %s ]", serial_path.c_str(), strerror(errno));
546 // We don't actually want to treat an unknown serial as an error because
547 // devices aren't able to communicate a serial number in early bringup.
548 // http://b/20883914
549 serial = "";
550 }
551 serial = android::base::Trim(serial);
552
553 if (!transport_server_owns_device(dev_path, serial)) {
554 // We aren't allowed to communicate with this device. Don't open this device.
555 return;
556 }
557
558 // Since Linux will not reassign the device ID (and dev_name) as long as the
559 // device is open, we can add to the list here once we open it and remove
560 // from the list when we're finally closed and everything will work out
561 // fine.
562 //
563 // If we have a usb_handle on the list of handles with a matching name, we
564 // have no further work to do.
565 {
566 std::lock_guard<std::mutex> lock(g_usb_handles_mutex);
567 for (usb_handle* usb: g_usb_handles) {
568 if (usb->path == dev_name) {
569 return;
570 }
571 }
572 }
573
574 D("[ usb located new device %s (%d/%d/%d) ]", dev_name, ep_in, ep_out, interface);
575 std::unique_ptr<usb_handle> usb(new usb_handle);
576 usb->path = dev_name;
577 usb->ep_in = ep_in;
578 usb->ep_out = ep_out;
579 usb->zero_mask = zero_mask;
580 usb->max_packet_size = max_packet_size;
581
582 // Initialize mark so we don't get garbage collected after the device scan.
583 usb->mark = true;
584
585 usb->fd = unix_open(usb->path, O_RDWR | O_CLOEXEC);
586 if (usb->fd == -1) {
587 // Opening RW failed, so see if we have RO access.
588 usb->fd = unix_open(usb->path, O_RDONLY | O_CLOEXEC);
589 if (usb->fd == -1) {
590 D("[ usb open %s failed: %s]", usb->path.c_str(), strerror(errno));
591 return;
592 }
593 usb->writeable = 0;
594 }
595
596 D("[ usb opened %s%s, fd=%d]",
597 usb->path.c_str(), (usb->writeable ? "" : " (read-only)"), usb->fd);
598
599 if (usb->writeable) {
600 if (ioctl(usb->fd, USBDEVFS_CLAIMINTERFACE, &interface) != 0) {
601 D("[ usb ioctl(%d, USBDEVFS_CLAIMINTERFACE) failed: %s]", usb->fd, strerror(errno));
602 return;
603 }
604 }
605
606 // Add to the end of the active handles.
607 usb_handle* done_usb = usb.release();
608 {
609 std::lock_guard<std::mutex> lock(g_usb_handles_mutex);
610 g_usb_handles.push_back(done_usb);
611 }
612 register_usb_transport(done_usb, serial.c_str(), dev_path, done_usb->writeable);
613 }
614
device_poll_thread()615 static void device_poll_thread() {
616 adb_thread_setname("device poll");
617 D("Created device thread");
618 while (true) {
619 // TODO: Use inotify.
620 find_usb_device("/dev/bus/usb", register_device);
621 adb_notify_device_scan_complete();
622 kick_disconnected_devices();
623 std::this_thread::sleep_for(1s);
624 }
625 }
626
usb_init()627 void usb_init() {
628 struct sigaction actions;
629 memset(&actions, 0, sizeof(actions));
630 sigemptyset(&actions.sa_mask);
631 actions.sa_flags = 0;
632 actions.sa_handler = [](int) {};
633 sigaction(SIGALRM, &actions, nullptr);
634
635 std::thread(device_poll_thread).detach();
636 }
637
usb_cleanup()638 void usb_cleanup() {}
639