• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1  /*
2   * Copyright (C) 2007 The Android Open Source Project
3   *
4   * Licensed under the Apache License, Version 2.0 (the "License");
5   * you may not use this file except in compliance with the License.
6   * You may obtain a copy of the License at
7   *
8   *      http://www.apache.org/licenses/LICENSE-2.0
9   *
10   * Unless required by applicable law or agreed to in writing, software
11   * distributed under the License is distributed on an "AS IS" BASIS,
12   * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13   * See the License for the specific language governing permissions and
14   * limitations under the License.
15   */
16  
17  #define TRACE_TAG SERVICES
18  
19  #include "sysdeps.h"
20  
21  #include <errno.h>
22  #include <stddef.h>
23  #include <stdio.h>
24  #include <stdlib.h>
25  #include <string.h>
26  
27  #ifndef _WIN32
28  #include <netdb.h>
29  #include <netinet/in.h>
30  #include <sys/ioctl.h>
31  #include <unistd.h>
32  #endif
33  
34  #include <android-base/file.h>
35  #include <android-base/parsenetaddress.h>
36  #include <android-base/stringprintf.h>
37  #include <android-base/strings.h>
38  #include <cutils/sockets.h>
39  
40  #if !ADB_HOST
41  #include "cutils/android_reboot.h"
42  #include "cutils/properties.h"
43  #endif
44  
45  #include "adb.h"
46  #include "adb_io.h"
47  #include "adb_utils.h"
48  #include "file_sync_service.h"
49  #include "remount_service.h"
50  #include "services.h"
51  #include "shell_service.h"
52  #include "sysdeps.h"
53  #include "transport.h"
54  
55  struct stinfo {
56      void (*func)(int fd, void *cookie);
57      int fd;
58      void *cookie;
59  };
60  
service_bootstrap_func(void * x)61  static void service_bootstrap_func(void* x) {
62      stinfo* sti = reinterpret_cast<stinfo*>(x);
63      adb_thread_setname(android::base::StringPrintf("service %d", sti->fd));
64      sti->func(sti->fd, sti->cookie);
65      free(sti);
66  }
67  
68  #if !ADB_HOST
69  
restart_root_service(int fd,void * cookie)70  void restart_root_service(int fd, void *cookie) {
71      if (getuid() == 0) {
72          WriteFdExactly(fd, "adbd is already running as root\n");
73          adb_close(fd);
74      } else {
75          char value[PROPERTY_VALUE_MAX];
76          property_get("ro.debuggable", value, "");
77          if (strcmp(value, "1") != 0) {
78              WriteFdExactly(fd, "adbd cannot run as root in production builds\n");
79              adb_close(fd);
80              return;
81          }
82  
83          property_set("service.adb.root", "1");
84          WriteFdExactly(fd, "restarting adbd as root\n");
85          adb_close(fd);
86      }
87  }
88  
restart_unroot_service(int fd,void * cookie)89  void restart_unroot_service(int fd, void *cookie) {
90      if (getuid() != 0) {
91          WriteFdExactly(fd, "adbd not running as root\n");
92          adb_close(fd);
93      } else {
94          property_set("service.adb.root", "0");
95          WriteFdExactly(fd, "restarting adbd as non root\n");
96          adb_close(fd);
97      }
98  }
99  
restart_tcp_service(int fd,void * cookie)100  void restart_tcp_service(int fd, void *cookie) {
101      int port = (int) (uintptr_t) cookie;
102      if (port <= 0) {
103          WriteFdFmt(fd, "invalid port %d\n", port);
104          adb_close(fd);
105          return;
106      }
107  
108      char value[PROPERTY_VALUE_MAX];
109      snprintf(value, sizeof(value), "%d", port);
110      property_set("service.adb.tcp.port", value);
111      WriteFdFmt(fd, "restarting in TCP mode port: %d\n", port);
112      adb_close(fd);
113  }
114  
restart_usb_service(int fd,void * cookie)115  void restart_usb_service(int fd, void *cookie) {
116      property_set("service.adb.tcp.port", "0");
117      WriteFdExactly(fd, "restarting in USB mode\n");
118      adb_close(fd);
119  }
120  
reboot_service_impl(int fd,const char * arg)121  static bool reboot_service_impl(int fd, const char* arg) {
122      const char* reboot_arg = arg;
123      bool auto_reboot = false;
124  
125      if (strcmp(reboot_arg, "sideload-auto-reboot") == 0) {
126          auto_reboot = true;
127          reboot_arg = "sideload";
128      }
129  
130      // It reboots into sideload mode by setting "--sideload" or "--sideload_auto_reboot"
131      // in the command file.
132      if (strcmp(reboot_arg, "sideload") == 0) {
133          if (getuid() != 0) {
134              WriteFdExactly(fd, "'adb root' is required for 'adb reboot sideload'.\n");
135              return false;
136          }
137  
138          const char* const recovery_dir = "/cache/recovery";
139          const char* const command_file = "/cache/recovery/command";
140          // Ensure /cache/recovery exists.
141          if (adb_mkdir(recovery_dir, 0770) == -1 && errno != EEXIST) {
142              D("Failed to create directory '%s': %s", recovery_dir, strerror(errno));
143              return false;
144          }
145  
146          bool write_status = android::base::WriteStringToFile(
147                  auto_reboot ? "--sideload_auto_reboot" : "--sideload", command_file);
148          if (!write_status) {
149              return false;
150          }
151  
152          reboot_arg = "recovery";
153      }
154  
155      sync();
156  
157      char property_val[PROPERTY_VALUE_MAX];
158      int ret = snprintf(property_val, sizeof(property_val), "reboot,%s", reboot_arg);
159      if (ret >= static_cast<int>(sizeof(property_val))) {
160          WriteFdFmt(fd, "reboot string too long: %d\n", ret);
161          return false;
162      }
163  
164      ret = property_set(ANDROID_RB_PROPERTY, property_val);
165      if (ret < 0) {
166          WriteFdFmt(fd, "reboot failed: %d\n", ret);
167          return false;
168      }
169  
170      return true;
171  }
172  
reboot_service(int fd,void * arg)173  void reboot_service(int fd, void* arg)
174  {
175      if (reboot_service_impl(fd, static_cast<const char*>(arg))) {
176          // Don't return early. Give the reboot command time to take effect
177          // to avoid messing up scripts which do "adb reboot && adb wait-for-device"
178          while (true) {
179              pause();
180          }
181      }
182  
183      free(arg);
184      adb_close(fd);
185  }
186  
reconnect_service(int fd,void * arg)187  static void reconnect_service(int fd, void* arg) {
188      WriteFdExactly(fd, "done");
189      adb_close(fd);
190      atransport* t = static_cast<atransport*>(arg);
191      kick_transport(t);
192  }
193  
reverse_service(const char * command)194  int reverse_service(const char* command) {
195      int s[2];
196      if (adb_socketpair(s)) {
197          PLOG(ERROR) << "cannot create service socket pair.";
198          return -1;
199      }
200      VLOG(SERVICES) << "service socketpair: " << s[0] << ", " << s[1];
201      if (handle_forward_request(command, kTransportAny, nullptr, s[1]) < 0) {
202          SendFail(s[1], "not a reverse forwarding command");
203      }
204      adb_close(s[1]);
205      return s[0];
206  }
207  
208  // Shell service string can look like:
209  //   shell[,arg1,arg2,...]:[command]
ShellService(const std::string & args,const atransport * transport)210  static int ShellService(const std::string& args, const atransport* transport) {
211      size_t delimiter_index = args.find(':');
212      if (delimiter_index == std::string::npos) {
213          LOG(ERROR) << "No ':' found in shell service arguments: " << args;
214          return -1;
215      }
216  
217      const std::string service_args = args.substr(0, delimiter_index);
218      const std::string command = args.substr(delimiter_index + 1);
219  
220      // Defaults:
221      //   PTY for interactive, raw for non-interactive.
222      //   No protocol.
223      //   $TERM set to "dumb".
224      SubprocessType type(command.empty() ? SubprocessType::kPty
225                                          : SubprocessType::kRaw);
226      SubprocessProtocol protocol = SubprocessProtocol::kNone;
227      std::string terminal_type = "dumb";
228  
229      for (const std::string& arg : android::base::Split(service_args, ",")) {
230          if (arg == kShellServiceArgRaw) {
231              type = SubprocessType::kRaw;
232          } else if (arg == kShellServiceArgPty) {
233              type = SubprocessType::kPty;
234          } else if (arg == kShellServiceArgShellProtocol) {
235              protocol = SubprocessProtocol::kShell;
236          } else if (android::base::StartsWith(arg, "TERM=")) {
237              terminal_type = arg.substr(5);
238          } else if (!arg.empty()) {
239              // This is not an error to allow for future expansion.
240              LOG(WARNING) << "Ignoring unknown shell service argument: " << arg;
241          }
242      }
243  
244      return StartSubprocess(command.c_str(), terminal_type.c_str(), type, protocol);
245  }
246  
247  #endif  // !ADB_HOST
248  
create_service_thread(void (* func)(int,void *),void * cookie)249  static int create_service_thread(void (*func)(int, void *), void *cookie)
250  {
251      int s[2];
252      if (adb_socketpair(s)) {
253          printf("cannot create service socket pair\n");
254          return -1;
255      }
256      D("socketpair: (%d,%d)", s[0], s[1]);
257  
258      stinfo* sti = reinterpret_cast<stinfo*>(malloc(sizeof(stinfo)));
259      if (sti == nullptr) {
260          fatal("cannot allocate stinfo");
261      }
262      sti->func = func;
263      sti->cookie = cookie;
264      sti->fd = s[1];
265  
266      if (!adb_thread_create(service_bootstrap_func, sti)) {
267          free(sti);
268          adb_close(s[0]);
269          adb_close(s[1]);
270          printf("cannot create service thread\n");
271          return -1;
272      }
273  
274      D("service thread started, %d:%d",s[0], s[1]);
275      return s[0];
276  }
277  
service_to_fd(const char * name,const atransport * transport)278  int service_to_fd(const char* name, const atransport* transport) {
279      int ret = -1;
280  
281      if(!strncmp(name, "tcp:", 4)) {
282          int port = atoi(name + 4);
283          name = strchr(name + 4, ':');
284          if(name == 0) {
285              std::string error;
286              ret = network_loopback_client(port, SOCK_STREAM, &error);
287              if (ret >= 0)
288                  disable_tcp_nagle(ret);
289          } else {
290  #if ADB_HOST
291              std::string error;
292              ret = network_connect(name + 1, port, SOCK_STREAM, 0, &error);
293  #else
294              return -1;
295  #endif
296          }
297  #if !defined(_WIN32)   /* winsock doesn't implement unix domain sockets */
298      } else if(!strncmp(name, "local:", 6)) {
299          ret = socket_local_client(name + 6,
300                  ANDROID_SOCKET_NAMESPACE_RESERVED, SOCK_STREAM);
301      } else if(!strncmp(name, "localreserved:", 14)) {
302          ret = socket_local_client(name + 14,
303                  ANDROID_SOCKET_NAMESPACE_RESERVED, SOCK_STREAM);
304      } else if(!strncmp(name, "localabstract:", 14)) {
305          ret = socket_local_client(name + 14,
306                  ANDROID_SOCKET_NAMESPACE_ABSTRACT, SOCK_STREAM);
307      } else if(!strncmp(name, "localfilesystem:", 16)) {
308          ret = socket_local_client(name + 16,
309                  ANDROID_SOCKET_NAMESPACE_FILESYSTEM, SOCK_STREAM);
310  #endif
311  #if !ADB_HOST
312      } else if(!strncmp("dev:", name, 4)) {
313          ret = unix_open(name + 4, O_RDWR | O_CLOEXEC);
314      } else if(!strncmp(name, "framebuffer:", 12)) {
315          ret = create_service_thread(framebuffer_service, 0);
316      } else if (!strncmp(name, "jdwp:", 5)) {
317          ret = create_jdwp_connection_fd(atoi(name+5));
318      } else if(!strncmp(name, "shell", 5)) {
319          ret = ShellService(name + 5, transport);
320      } else if(!strncmp(name, "exec:", 5)) {
321          ret = StartSubprocess(name + 5, nullptr, SubprocessType::kRaw, SubprocessProtocol::kNone);
322      } else if(!strncmp(name, "sync:", 5)) {
323          ret = create_service_thread(file_sync_service, NULL);
324      } else if(!strncmp(name, "remount:", 8)) {
325          ret = create_service_thread(remount_service, NULL);
326      } else if(!strncmp(name, "reboot:", 7)) {
327          void* arg = strdup(name + 7);
328          if (arg == NULL) return -1;
329          ret = create_service_thread(reboot_service, arg);
330      } else if(!strncmp(name, "root:", 5)) {
331          ret = create_service_thread(restart_root_service, NULL);
332      } else if(!strncmp(name, "unroot:", 7)) {
333          ret = create_service_thread(restart_unroot_service, NULL);
334      } else if(!strncmp(name, "backup:", 7)) {
335          ret = StartSubprocess(android::base::StringPrintf("/system/bin/bu backup %s",
336                                                            (name + 7)).c_str(),
337                                nullptr, SubprocessType::kRaw, SubprocessProtocol::kNone);
338      } else if(!strncmp(name, "restore:", 8)) {
339          ret = StartSubprocess("/system/bin/bu restore", nullptr, SubprocessType::kRaw,
340                                SubprocessProtocol::kNone);
341      } else if(!strncmp(name, "tcpip:", 6)) {
342          int port;
343          if (sscanf(name + 6, "%d", &port) != 1) {
344              return -1;
345          }
346          ret = create_service_thread(restart_tcp_service, (void *) (uintptr_t) port);
347      } else if(!strncmp(name, "usb:", 4)) {
348          ret = create_service_thread(restart_usb_service, NULL);
349      } else if (!strncmp(name, "reverse:", 8)) {
350          ret = reverse_service(name + 8);
351      } else if(!strncmp(name, "disable-verity:", 15)) {
352          ret = create_service_thread(set_verity_enabled_state_service, (void*)0);
353      } else if(!strncmp(name, "enable-verity:", 15)) {
354          ret = create_service_thread(set_verity_enabled_state_service, (void*)1);
355      } else if (!strcmp(name, "reconnect")) {
356          ret = create_service_thread(reconnect_service, const_cast<atransport*>(transport));
357  #endif
358      }
359      if (ret >= 0) {
360          close_on_exec(ret);
361      }
362      return ret;
363  }
364  
365  #if ADB_HOST
366  struct state_info {
367      TransportType transport_type;
368      std::string serial;
369      ConnectionState state;
370  };
371  
wait_for_state(int fd,void * data)372  static void wait_for_state(int fd, void* data) {
373      std::unique_ptr<state_info> sinfo(reinterpret_cast<state_info*>(data));
374  
375      D("wait_for_state %d", sinfo->state);
376  
377      while (true) {
378          bool is_ambiguous = false;
379          std::string error = "unknown error";
380          const char* serial = sinfo->serial.length() ? sinfo->serial.c_str() : NULL;
381          atransport* t = acquire_one_transport(sinfo->transport_type, serial, &is_ambiguous, &error);
382          if (t != nullptr && (sinfo->state == kCsAny || sinfo->state == t->connection_state)) {
383              SendOkay(fd);
384              break;
385          } else if (!is_ambiguous) {
386              adb_pollfd pfd = {.fd = fd, .events = POLLIN };
387              int rc = adb_poll(&pfd, 1, 1000);
388              if (rc < 0) {
389                  SendFail(fd, error);
390                  break;
391              } else if (rc > 0 && (pfd.revents & POLLHUP) != 0) {
392                  // The other end of the socket is closed, probably because the other side was
393                  // terminated, bail out.
394                  break;
395              }
396  
397              // Try again...
398          } else {
399              SendFail(fd, error);
400              break;
401          }
402      }
403  
404      adb_close(fd);
405      D("wait_for_state is done");
406  }
407  
connect_device(const std::string & address,std::string * response)408  static void connect_device(const std::string& address, std::string* response) {
409      if (address.empty()) {
410          *response = "empty address";
411          return;
412      }
413  
414      std::string serial;
415      std::string host;
416      int port = DEFAULT_ADB_LOCAL_TRANSPORT_PORT;
417      if (!android::base::ParseNetAddress(address, &host, &port, &serial, response)) {
418          return;
419      }
420  
421      std::string error;
422      int fd = network_connect(host.c_str(), port, SOCK_STREAM, 10, &error);
423      if (fd == -1) {
424          *response = android::base::StringPrintf("unable to connect to %s: %s",
425                                                  serial.c_str(), error.c_str());
426          return;
427      }
428  
429      D("client: connected %s remote on fd %d", serial.c_str(), fd);
430      close_on_exec(fd);
431      disable_tcp_nagle(fd);
432  
433      // Send a TCP keepalive ping to the device every second so we can detect disconnects.
434      if (!set_tcp_keepalive(fd, 1)) {
435          D("warning: failed to configure TCP keepalives (%s)", strerror(errno));
436      }
437  
438      int ret = register_socket_transport(fd, serial.c_str(), port, 0);
439      if (ret < 0) {
440          adb_close(fd);
441          *response = android::base::StringPrintf("already connected to %s", serial.c_str());
442      } else {
443          *response = android::base::StringPrintf("connected to %s", serial.c_str());
444      }
445  }
446  
connect_emulator(const std::string & port_spec,std::string * response)447  void connect_emulator(const std::string& port_spec, std::string* response) {
448      std::vector<std::string> pieces = android::base::Split(port_spec, ",");
449      if (pieces.size() != 2) {
450          *response = android::base::StringPrintf("unable to parse '%s' as <console port>,<adb port>",
451                                                  port_spec.c_str());
452          return;
453      }
454  
455      int console_port = strtol(pieces[0].c_str(), NULL, 0);
456      int adb_port = strtol(pieces[1].c_str(), NULL, 0);
457      if (console_port <= 0 || adb_port <= 0) {
458          *response = android::base::StringPrintf("Invalid port numbers: %s", port_spec.c_str());
459          return;
460      }
461  
462      // Check if the emulator is already known.
463      // Note: There's a small but harmless race condition here: An emulator not
464      // present just yet could be registered by another invocation right
465      // after doing this check here. However, local_connect protects
466      // against double-registration too. From here, a better error message
467      // can be produced. In the case of the race condition, the very specific
468      // error message won't be shown, but the data doesn't get corrupted.
469      atransport* known_emulator = find_emulator_transport_by_adb_port(adb_port);
470      if (known_emulator != nullptr) {
471          *response = android::base::StringPrintf("Emulator already registered on port %d", adb_port);
472          return;
473      }
474  
475      // Check if more emulators can be registered. Similar unproblematic
476      // race condition as above.
477      int candidate_slot = get_available_local_transport_index();
478      if (candidate_slot < 0) {
479          *response = "Cannot accept more emulators";
480          return;
481      }
482  
483      // Preconditions met, try to connect to the emulator.
484      std::string error;
485      if (!local_connect_arbitrary_ports(console_port, adb_port, &error)) {
486          *response = android::base::StringPrintf("Connected to emulator on ports %d,%d",
487                                                  console_port, adb_port);
488      } else {
489          *response = android::base::StringPrintf("Could not connect to emulator on ports %d,%d: %s",
490                                                  console_port, adb_port, error.c_str());
491      }
492  }
493  
connect_service(int fd,void * data)494  static void connect_service(int fd, void* data) {
495      char* host = reinterpret_cast<char*>(data);
496      std::string response;
497      if (!strncmp(host, "emu:", 4)) {
498          connect_emulator(host + 4, &response);
499      } else {
500          connect_device(host, &response);
501      }
502      free(host);
503  
504      // Send response for emulator and device
505      SendProtocolString(fd, response);
506      adb_close(fd);
507  }
508  #endif
509  
510  #if ADB_HOST
host_service_to_socket(const char * name,const char * serial)511  asocket* host_service_to_socket(const char* name, const char* serial) {
512      if (!strcmp(name,"track-devices")) {
513          return create_device_tracker();
514      } else if (android::base::StartsWith(name, "wait-for-")) {
515          name += strlen("wait-for-");
516  
517          std::unique_ptr<state_info> sinfo(new state_info);
518          if (sinfo == nullptr) {
519              fprintf(stderr, "couldn't allocate state_info: %s", strerror(errno));
520              return nullptr;
521          }
522  
523          if (serial) sinfo->serial = serial;
524  
525          if (android::base::StartsWith(name, "local")) {
526              name += strlen("local");
527              sinfo->transport_type = kTransportLocal;
528          } else if (android::base::StartsWith(name, "usb")) {
529              name += strlen("usb");
530              sinfo->transport_type = kTransportUsb;
531          } else if (android::base::StartsWith(name, "any")) {
532              name += strlen("any");
533              sinfo->transport_type = kTransportAny;
534          } else {
535              return nullptr;
536          }
537  
538          if (!strcmp(name, "-device")) {
539              sinfo->state = kCsDevice;
540          } else if (!strcmp(name, "-recovery")) {
541              sinfo->state = kCsRecovery;
542          } else if (!strcmp(name, "-sideload")) {
543              sinfo->state = kCsSideload;
544          } else if (!strcmp(name, "-bootloader")) {
545              sinfo->state = kCsBootloader;
546          } else if (!strcmp(name, "-any")) {
547              sinfo->state = kCsAny;
548          } else {
549              return nullptr;
550          }
551  
552          int fd = create_service_thread(wait_for_state, sinfo.release());
553          return create_local_socket(fd);
554      } else if (!strncmp(name, "connect:", 8)) {
555          char* host = strdup(name + 8);
556          int fd = create_service_thread(connect_service, host);
557          return create_local_socket(fd);
558      }
559      return NULL;
560  }
561  #endif /* ADB_HOST */
562