• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2007 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #define TRACE_TAG TRANSPORT
18 
19 #include "sysdeps.h"
20 #include "transport.h"
21 
22 #include <ctype.h>
23 #include <errno.h>
24 #include <inttypes.h>
25 #include <stdio.h>
26 #include <stdlib.h>
27 #include <string.h>
28 #include <unistd.h>
29 
30 #include <algorithm>
31 #include <list>
32 #include <mutex>
33 #include <thread>
34 
35 #include <android-base/logging.h>
36 #include <android-base/parsenetaddress.h>
37 #include <android-base/quick_exit.h>
38 #include <android-base/stringprintf.h>
39 #include <android-base/strings.h>
40 #include <android-base/thread_annotations.h>
41 
42 #include "adb.h"
43 #include "adb_auth.h"
44 #include "adb_trace.h"
45 #include "adb_utils.h"
46 #include "diagnose_usb.h"
47 #include "fdevent.h"
48 
49 static void transport_unref(atransport *t);
50 
51 // TODO: unordered_map<TransportId, atransport*>
52 static auto& transport_list = *new std::list<atransport*>();
53 static auto& pending_list = *new std::list<atransport*>();
54 
55 static auto& transport_lock = *new std::recursive_mutex();
56 
57 const char* const kFeatureShell2 = "shell_v2";
58 const char* const kFeatureCmd = "cmd";
59 const char* const kFeatureStat2 = "stat_v2";
60 const char* const kFeatureLibusb = "libusb";
61 const char* const kFeaturePushSync = "push_sync";
62 
NextTransportId()63 TransportId NextTransportId() {
64     static std::atomic<TransportId> next(1);
65     return next++;
66 }
67 
dump_packet(const char * name,const char * func,apacket * p)68 static std::string dump_packet(const char* name, const char* func, apacket* p) {
69     unsigned command = p->msg.command;
70     int len = p->msg.data_length;
71     char cmd[9];
72     char arg0[12], arg1[12];
73     int n;
74 
75     for (n = 0; n < 4; n++) {
76         int b = (command >> (n * 8)) & 255;
77         if (b < 32 || b >= 127) break;
78         cmd[n] = (char)b;
79     }
80     if (n == 4) {
81         cmd[4] = 0;
82     } else {
83         /* There is some non-ASCII name in the command, so dump
84             * the hexadecimal value instead */
85         snprintf(cmd, sizeof cmd, "%08x", command);
86     }
87 
88     if (p->msg.arg0 < 256U)
89         snprintf(arg0, sizeof arg0, "%d", p->msg.arg0);
90     else
91         snprintf(arg0, sizeof arg0, "0x%x", p->msg.arg0);
92 
93     if (p->msg.arg1 < 256U)
94         snprintf(arg1, sizeof arg1, "%d", p->msg.arg1);
95     else
96         snprintf(arg1, sizeof arg1, "0x%x", p->msg.arg1);
97 
98     std::string result = android::base::StringPrintf("%s: %s: [%s] arg0=%s arg1=%s (len=%d) ", name,
99                                                      func, cmd, arg0, arg1, len);
100     result += dump_hex(p->data, len);
101     return result;
102 }
103 
read_packet(int fd,const char * name,apacket ** ppacket)104 static int read_packet(int fd, const char* name, apacket** ppacket) {
105     ATRACE_NAME("read_packet");
106     char buff[8];
107     if (!name) {
108         snprintf(buff, sizeof buff, "fd=%d", fd);
109         name = buff;
110     }
111     char* p = reinterpret_cast<char*>(ppacket); /* really read a packet address */
112     int len = sizeof(apacket*);
113     while (len > 0) {
114         int r = adb_read(fd, p, len);
115         if (r > 0) {
116             len -= r;
117             p += r;
118         } else {
119             D("%s: read_packet (fd=%d), error ret=%d: %s", name, fd, r, strerror(errno));
120             return -1;
121         }
122     }
123 
124     VLOG(TRANSPORT) << dump_packet(name, "from remote", *ppacket);
125     return 0;
126 }
127 
write_packet(int fd,const char * name,apacket ** ppacket)128 static int write_packet(int fd, const char* name, apacket** ppacket) {
129     ATRACE_NAME("write_packet");
130     char buff[8];
131     if (!name) {
132         snprintf(buff, sizeof buff, "fd=%d", fd);
133         name = buff;
134     }
135     VLOG(TRANSPORT) << dump_packet(name, "to remote", *ppacket);
136     char* p = reinterpret_cast<char*>(ppacket); /* we really write the packet address */
137     int len = sizeof(apacket*);
138     while (len > 0) {
139         int r = adb_write(fd, p, len);
140         if (r > 0) {
141             len -= r;
142             p += r;
143         } else {
144             D("%s: write_packet (fd=%d) error ret=%d: %s", name, fd, r, strerror(errno));
145             return -1;
146         }
147     }
148     return 0;
149 }
150 
transport_socket_events(int fd,unsigned events,void * _t)151 static void transport_socket_events(int fd, unsigned events, void* _t) {
152     atransport* t = reinterpret_cast<atransport*>(_t);
153     D("transport_socket_events(fd=%d, events=%04x,...)", fd, events);
154     if (events & FDE_READ) {
155         apacket* p = 0;
156         if (read_packet(fd, t->serial, &p)) {
157             D("%s: failed to read packet from transport socket on fd %d", t->serial, fd);
158         } else {
159             handle_packet(p, (atransport*)_t);
160         }
161     }
162 }
163 
send_packet(apacket * p,atransport * t)164 void send_packet(apacket* p, atransport* t) {
165     p->msg.magic = p->msg.command ^ 0xffffffff;
166     p->msg.data_check = calculate_apacket_checksum(p);
167 
168     print_packet("send", p);
169 
170     if (t == NULL) {
171         fatal("Transport is null");
172     }
173 
174     if (write_packet(t->transport_socket, t->serial, &p)) {
175         fatal_errno("cannot enqueue packet on transport socket");
176     }
177 }
178 
179 // The transport is opened by transport_register_func before
180 // the read_transport and write_transport threads are started.
181 //
182 // The read_transport thread issues a SYNC(1, token) message to let
183 // the write_transport thread know to start things up.  In the event
184 // of transport IO failure, the read_transport thread will post a
185 // SYNC(0,0) message to ensure shutdown.
186 //
187 // The transport will not actually be closed until both threads exit, but the threads
188 // will kick the transport on their way out to disconnect the underlying device.
189 //
190 // read_transport thread reads data from a transport (representing a usb/tcp connection),
191 // and makes the main thread call handle_packet().
read_transport_thread(void * _t)192 static void read_transport_thread(void* _t) {
193     atransport* t = reinterpret_cast<atransport*>(_t);
194     apacket* p;
195 
196     adb_thread_setname(
197         android::base::StringPrintf("<-%s", (t->serial != nullptr ? t->serial : "transport")));
198     D("%s: starting read_transport thread on fd %d, SYNC online (%d)", t->serial, t->fd,
199       t->sync_token + 1);
200     p = get_apacket();
201     p->msg.command = A_SYNC;
202     p->msg.arg0 = 1;
203     p->msg.arg1 = ++(t->sync_token);
204     p->msg.magic = A_SYNC ^ 0xffffffff;
205     if (write_packet(t->fd, t->serial, &p)) {
206         put_apacket(p);
207         D("%s: failed to write SYNC packet", t->serial);
208         goto oops;
209     }
210 
211     D("%s: data pump started", t->serial);
212     for (;;) {
213         ATRACE_NAME("read_transport loop");
214         p = get_apacket();
215 
216         {
217             ATRACE_NAME("read_transport read_remote");
218             if (t->read_from_remote(p, t) != 0) {
219                 D("%s: remote read failed for transport", t->serial);
220                 put_apacket(p);
221                 break;
222             }
223 #if ADB_HOST
224             if (p->msg.command == 0) {
225                 continue;
226             }
227 #endif
228         }
229 
230         D("%s: received remote packet, sending to transport", t->serial);
231         if (write_packet(t->fd, t->serial, &p)) {
232             put_apacket(p);
233             D("%s: failed to write apacket to transport", t->serial);
234             goto oops;
235         }
236     }
237 
238     D("%s: SYNC offline for transport", t->serial);
239     p = get_apacket();
240     p->msg.command = A_SYNC;
241     p->msg.arg0 = 0;
242     p->msg.arg1 = 0;
243     p->msg.magic = A_SYNC ^ 0xffffffff;
244     if (write_packet(t->fd, t->serial, &p)) {
245         put_apacket(p);
246         D("%s: failed to write SYNC apacket to transport", t->serial);
247     }
248 
249 oops:
250     D("%s: read_transport thread is exiting", t->serial);
251     kick_transport(t);
252     transport_unref(t);
253 }
254 
255 // write_transport thread gets packets sent by the main thread (through send_packet()),
256 // and writes to a transport (representing a usb/tcp connection).
write_transport_thread(void * _t)257 static void write_transport_thread(void* _t) {
258     atransport* t = reinterpret_cast<atransport*>(_t);
259     apacket* p;
260     int active = 0;
261 
262     adb_thread_setname(
263         android::base::StringPrintf("->%s", (t->serial != nullptr ? t->serial : "transport")));
264     D("%s: starting write_transport thread, reading from fd %d", t->serial, t->fd);
265 
266     for (;;) {
267         ATRACE_NAME("write_transport loop");
268         if (read_packet(t->fd, t->serial, &p)) {
269             D("%s: failed to read apacket from transport on fd %d", t->serial, t->fd);
270             break;
271         }
272 
273         if (p->msg.command == A_SYNC) {
274             if (p->msg.arg0 == 0) {
275                 D("%s: transport SYNC offline", t->serial);
276                 put_apacket(p);
277                 break;
278             } else {
279                 if (p->msg.arg1 == t->sync_token) {
280                     D("%s: transport SYNC online", t->serial);
281                     active = 1;
282                 } else {
283                     D("%s: transport ignoring SYNC %d != %d", t->serial, p->msg.arg1, t->sync_token);
284                 }
285             }
286         } else {
287             if (active) {
288                 D("%s: transport got packet, sending to remote", t->serial);
289                 ATRACE_NAME("write_transport write_remote");
290                 if (t->Write(p) != 0) {
291                     D("%s: remote write failed for transport", t->serial);
292                     put_apacket(p);
293                     break;
294                 }
295             } else {
296                 D("%s: transport ignoring packet while offline", t->serial);
297             }
298         }
299 
300         put_apacket(p);
301     }
302 
303     D("%s: write_transport thread is exiting, fd %d", t->serial, t->fd);
304     kick_transport(t);
305     transport_unref(t);
306 }
307 
kick_transport(atransport * t)308 void kick_transport(atransport* t) {
309     std::lock_guard<std::recursive_mutex> lock(transport_lock);
310     // As kick_transport() can be called from threads without guarantee that t is valid,
311     // check if the transport is in transport_list first.
312     //
313     // TODO(jmgao): WTF? Is this actually true?
314     if (std::find(transport_list.begin(), transport_list.end(), t) != transport_list.end()) {
315         t->Kick();
316     }
317 }
318 
319 static int transport_registration_send = -1;
320 static int transport_registration_recv = -1;
321 static fdevent transport_registration_fde;
322 
323 #if ADB_HOST
324 
325 /* this adds support required by the 'track-devices' service.
326  * this is used to send the content of "list_transport" to any
327  * number of client connections that want it through a single
328  * live TCP connection
329  */
330 struct device_tracker {
331     asocket socket;
332     int update_needed;
333     device_tracker* next;
334 };
335 
336 /* linked list of all device trackers */
337 static device_tracker* device_tracker_list;
338 
device_tracker_remove(device_tracker * tracker)339 static void device_tracker_remove(device_tracker* tracker) {
340     device_tracker** pnode = &device_tracker_list;
341     device_tracker* node = *pnode;
342 
343     std::lock_guard<std::recursive_mutex> lock(transport_lock);
344     while (node) {
345         if (node == tracker) {
346             *pnode = node->next;
347             break;
348         }
349         pnode = &node->next;
350         node = *pnode;
351     }
352 }
353 
device_tracker_close(asocket * socket)354 static void device_tracker_close(asocket* socket) {
355     device_tracker* tracker = (device_tracker*)socket;
356     asocket* peer = socket->peer;
357 
358     D("device tracker %p removed", tracker);
359     if (peer) {
360         peer->peer = NULL;
361         peer->close(peer);
362     }
363     device_tracker_remove(tracker);
364     free(tracker);
365 }
366 
device_tracker_enqueue(asocket * socket,apacket * p)367 static int device_tracker_enqueue(asocket* socket, apacket* p) {
368     /* you can't read from a device tracker, close immediately */
369     put_apacket(p);
370     device_tracker_close(socket);
371     return -1;
372 }
373 
device_tracker_send(device_tracker * tracker,const std::string & string)374 static int device_tracker_send(device_tracker* tracker, const std::string& string) {
375     apacket* p = get_apacket();
376     asocket* peer = tracker->socket.peer;
377 
378     snprintf(reinterpret_cast<char*>(p->data), 5, "%04x", static_cast<int>(string.size()));
379     memcpy(&p->data[4], string.data(), string.size());
380     p->len = 4 + string.size();
381     return peer->enqueue(peer, p);
382 }
383 
device_tracker_ready(asocket * socket)384 static void device_tracker_ready(asocket* socket) {
385     device_tracker* tracker = reinterpret_cast<device_tracker*>(socket);
386 
387     // We want to send the device list when the tracker connects
388     // for the first time, even if no update occurred.
389     if (tracker->update_needed > 0) {
390         tracker->update_needed = 0;
391 
392         std::string transports = list_transports(false);
393         device_tracker_send(tracker, transports);
394     }
395 }
396 
create_device_tracker(void)397 asocket* create_device_tracker(void) {
398     device_tracker* tracker = reinterpret_cast<device_tracker*>(calloc(1, sizeof(*tracker)));
399     if (tracker == nullptr) fatal("cannot allocate device tracker");
400 
401     D("device tracker %p created", tracker);
402 
403     tracker->socket.enqueue = device_tracker_enqueue;
404     tracker->socket.ready = device_tracker_ready;
405     tracker->socket.close = device_tracker_close;
406     tracker->update_needed = 1;
407 
408     tracker->next = device_tracker_list;
409     device_tracker_list = tracker;
410 
411     return &tracker->socket;
412 }
413 
414 // Check if all of the USB transports are connected.
iterate_transports(std::function<bool (const atransport *)> fn)415 bool iterate_transports(std::function<bool(const atransport*)> fn) {
416     std::lock_guard<std::recursive_mutex> lock(transport_lock);
417     for (const auto& t : transport_list) {
418         if (!fn(t)) {
419             return false;
420         }
421     }
422     for (const auto& t : pending_list) {
423         if (!fn(t)) {
424             return false;
425         }
426     }
427     return true;
428 }
429 
430 // Call this function each time the transport list has changed.
update_transports()431 void update_transports() {
432     update_transport_status();
433 
434     // Notify `adb track-devices` clients.
435     std::string transports = list_transports(false);
436 
437     device_tracker* tracker = device_tracker_list;
438     while (tracker != nullptr) {
439         device_tracker* next = tracker->next;
440         // This may destroy the tracker if the connection is closed.
441         device_tracker_send(tracker, transports);
442         tracker = next;
443     }
444 }
445 
446 #else
447 
update_transports()448 void update_transports() {
449     // Nothing to do on the device side.
450 }
451 
452 #endif  // ADB_HOST
453 
454 struct tmsg {
455     atransport* transport;
456     int action;
457 };
458 
transport_read_action(int fd,struct tmsg * m)459 static int transport_read_action(int fd, struct tmsg* m) {
460     char* p = (char*)m;
461     int len = sizeof(*m);
462     int r;
463 
464     while (len > 0) {
465         r = adb_read(fd, p, len);
466         if (r > 0) {
467             len -= r;
468             p += r;
469         } else {
470             D("transport_read_action: on fd %d: %s", fd, strerror(errno));
471             return -1;
472         }
473     }
474     return 0;
475 }
476 
transport_write_action(int fd,struct tmsg * m)477 static int transport_write_action(int fd, struct tmsg* m) {
478     char* p = (char*)m;
479     int len = sizeof(*m);
480     int r;
481 
482     while (len > 0) {
483         r = adb_write(fd, p, len);
484         if (r > 0) {
485             len -= r;
486             p += r;
487         } else {
488             D("transport_write_action: on fd %d: %s", fd, strerror(errno));
489             return -1;
490         }
491     }
492     return 0;
493 }
494 
transport_registration_func(int _fd,unsigned ev,void * data)495 static void transport_registration_func(int _fd, unsigned ev, void* data) {
496     tmsg m;
497     int s[2];
498     atransport* t;
499 
500     if (!(ev & FDE_READ)) {
501         return;
502     }
503 
504     if (transport_read_action(_fd, &m)) {
505         fatal_errno("cannot read transport registration socket");
506     }
507 
508     t = m.transport;
509 
510     if (m.action == 0) {
511         D("transport: %s removing and free'ing %d", t->serial, t->transport_socket);
512 
513         /* IMPORTANT: the remove closes one half of the
514         ** socket pair.  The close closes the other half.
515         */
516         fdevent_remove(&(t->transport_fde));
517         adb_close(t->fd);
518 
519         {
520             std::lock_guard<std::recursive_mutex> lock(transport_lock);
521             transport_list.remove(t);
522         }
523 
524         if (t->product) free(t->product);
525         if (t->serial) free(t->serial);
526         if (t->model) free(t->model);
527         if (t->device) free(t->device);
528         if (t->devpath) free(t->devpath);
529 
530         delete t;
531 
532         update_transports();
533         return;
534     }
535 
536     /* don't create transport threads for inaccessible devices */
537     if (t->GetConnectionState() != kCsNoPerm) {
538         /* initial references are the two threads */
539         t->ref_count = 2;
540 
541         if (adb_socketpair(s)) {
542             fatal_errno("cannot open transport socketpair");
543         }
544 
545         D("transport: %s socketpair: (%d,%d) starting", t->serial, s[0], s[1]);
546 
547         t->transport_socket = s[0];
548         t->fd = s[1];
549 
550         fdevent_install(&(t->transport_fde), t->transport_socket, transport_socket_events, t);
551 
552         fdevent_set(&(t->transport_fde), FDE_READ);
553 
554         std::thread(write_transport_thread, t).detach();
555         std::thread(read_transport_thread, t).detach();
556     }
557 
558     {
559         std::lock_guard<std::recursive_mutex> lock(transport_lock);
560         pending_list.remove(t);
561         transport_list.push_front(t);
562     }
563 
564     update_transports();
565 }
566 
init_transport_registration(void)567 void init_transport_registration(void) {
568     int s[2];
569 
570     if (adb_socketpair(s)) {
571         fatal_errno("cannot open transport registration socketpair");
572     }
573     D("socketpair: (%d,%d)", s[0], s[1]);
574 
575     transport_registration_send = s[0];
576     transport_registration_recv = s[1];
577 
578     fdevent_install(&transport_registration_fde, transport_registration_recv,
579                     transport_registration_func, 0);
580 
581     fdevent_set(&transport_registration_fde, FDE_READ);
582 }
583 
kick_all_transports()584 void kick_all_transports() {
585     // To avoid only writing part of a packet to a transport after exit, kick all transports.
586     std::lock_guard<std::recursive_mutex> lock(transport_lock);
587     for (auto t : transport_list) {
588         t->Kick();
589     }
590 }
591 
592 /* the fdevent select pump is single threaded */
register_transport(atransport * transport)593 static void register_transport(atransport* transport) {
594     tmsg m;
595     m.transport = transport;
596     m.action = 1;
597     D("transport: %s registered", transport->serial);
598     if (transport_write_action(transport_registration_send, &m)) {
599         fatal_errno("cannot write transport registration socket\n");
600     }
601 }
602 
remove_transport(atransport * transport)603 static void remove_transport(atransport* transport) {
604     tmsg m;
605     m.transport = transport;
606     m.action = 0;
607     D("transport: %s removed", transport->serial);
608     if (transport_write_action(transport_registration_send, &m)) {
609         fatal_errno("cannot write transport registration socket\n");
610     }
611 }
612 
transport_unref(atransport * t)613 static void transport_unref(atransport* t) {
614     CHECK(t != nullptr);
615 
616     std::lock_guard<std::recursive_mutex> lock(transport_lock);
617     CHECK_GT(t->ref_count, 0u);
618     t->ref_count--;
619     if (t->ref_count == 0) {
620         D("transport: %s unref (kicking and closing)", t->serial);
621         t->close(t);
622         remove_transport(t);
623     } else {
624         D("transport: %s unref (count=%zu)", t->serial, t->ref_count);
625     }
626 }
627 
qual_match(const char * to_test,const char * prefix,const char * qual,bool sanitize_qual)628 static int qual_match(const char* to_test, const char* prefix, const char* qual,
629                       bool sanitize_qual) {
630     if (!to_test || !*to_test) /* Return true if both the qual and to_test are null strings. */
631         return !qual || !*qual;
632 
633     if (!qual) return 0;
634 
635     if (prefix) {
636         while (*prefix) {
637             if (*prefix++ != *to_test++) return 0;
638         }
639     }
640 
641     while (*qual) {
642         char ch = *qual++;
643         if (sanitize_qual && !isalnum(ch)) ch = '_';
644         if (ch != *to_test++) return 0;
645     }
646 
647     /* Everything matched so far.  Return true if *to_test is a NUL. */
648     return !*to_test;
649 }
650 
acquire_one_transport(TransportType type,const char * serial,TransportId transport_id,bool * is_ambiguous,std::string * error_out,bool accept_any_state)651 atransport* acquire_one_transport(TransportType type, const char* serial, TransportId transport_id,
652                                   bool* is_ambiguous, std::string* error_out,
653                                   bool accept_any_state) {
654     atransport* result = nullptr;
655 
656     if (transport_id != 0) {
657         *error_out =
658             android::base::StringPrintf("no device with transport id '%" PRIu64 "'", transport_id);
659     } else if (serial) {
660         *error_out = android::base::StringPrintf("device '%s' not found", serial);
661     } else if (type == kTransportLocal) {
662         *error_out = "no emulators found";
663     } else if (type == kTransportAny) {
664         *error_out = "no devices/emulators found";
665     } else {
666         *error_out = "no devices found";
667     }
668 
669     std::unique_lock<std::recursive_mutex> lock(transport_lock);
670     for (const auto& t : transport_list) {
671         if (t->GetConnectionState() == kCsNoPerm) {
672 #if ADB_HOST
673             *error_out = UsbNoPermissionsLongHelpText();
674 #endif
675             continue;
676         }
677 
678         if (transport_id) {
679             if (t->id == transport_id) {
680                 result = t;
681                 break;
682             }
683         } else if (serial) {
684             if (t->MatchesTarget(serial)) {
685                 if (result) {
686                     *error_out = "more than one device";
687                     if (is_ambiguous) *is_ambiguous = true;
688                     result = nullptr;
689                     break;
690                 }
691                 result = t;
692             }
693         } else {
694             if (type == kTransportUsb && t->type == kTransportUsb) {
695                 if (result) {
696                     *error_out = "more than one device";
697                     if (is_ambiguous) *is_ambiguous = true;
698                     result = nullptr;
699                     break;
700                 }
701                 result = t;
702             } else if (type == kTransportLocal && t->type == kTransportLocal) {
703                 if (result) {
704                     *error_out = "more than one emulator";
705                     if (is_ambiguous) *is_ambiguous = true;
706                     result = nullptr;
707                     break;
708                 }
709                 result = t;
710             } else if (type == kTransportAny) {
711                 if (result) {
712                     *error_out = "more than one device/emulator";
713                     if (is_ambiguous) *is_ambiguous = true;
714                     result = nullptr;
715                     break;
716                 }
717                 result = t;
718             }
719         }
720     }
721     lock.unlock();
722 
723     // Don't return unauthorized devices; the caller can't do anything with them.
724     if (result && result->GetConnectionState() == kCsUnauthorized && !accept_any_state) {
725         *error_out = "device unauthorized.\n";
726         char* ADB_VENDOR_KEYS = getenv("ADB_VENDOR_KEYS");
727         *error_out += "This adb server's $ADB_VENDOR_KEYS is ";
728         *error_out += ADB_VENDOR_KEYS ? ADB_VENDOR_KEYS : "not set";
729         *error_out += "\n";
730         *error_out += "Try 'adb kill-server' if that seems wrong.\n";
731         *error_out += "Otherwise check for a confirmation dialog on your device.";
732         result = nullptr;
733     }
734 
735     // Don't return offline devices; the caller can't do anything with them.
736     if (result && result->GetConnectionState() == kCsOffline && !accept_any_state) {
737         *error_out = "device offline";
738         result = nullptr;
739     }
740 
741     if (result) {
742         *error_out = "success";
743     }
744 
745     return result;
746 }
747 
Write(apacket * p)748 int atransport::Write(apacket* p) {
749     return write_func_(p, this);
750 }
751 
Kick()752 void atransport::Kick() {
753     if (!kicked_) {
754         kicked_ = true;
755         CHECK(kick_func_ != nullptr);
756         kick_func_(this);
757     }
758 }
759 
GetConnectionState() const760 ConnectionState atransport::GetConnectionState() const {
761     return connection_state_;
762 }
763 
SetConnectionState(ConnectionState state)764 void atransport::SetConnectionState(ConnectionState state) {
765     check_main_thread();
766     connection_state_ = state;
767 }
768 
connection_state_name() const769 const std::string atransport::connection_state_name() const {
770     ConnectionState state = GetConnectionState();
771     switch (state) {
772         case kCsOffline:
773             return "offline";
774         case kCsBootloader:
775             return "bootloader";
776         case kCsDevice:
777             return "device";
778         case kCsHost:
779             return "host";
780         case kCsRecovery:
781             return "recovery";
782         case kCsNoPerm:
783             return UsbNoPermissionsShortHelpText();
784         case kCsSideload:
785             return "sideload";
786         case kCsUnauthorized:
787             return "unauthorized";
788         default:
789             return "unknown";
790     }
791 }
792 
update_version(int version,size_t payload)793 void atransport::update_version(int version, size_t payload) {
794     protocol_version = std::min(version, A_VERSION);
795     max_payload = std::min(payload, MAX_PAYLOAD);
796 }
797 
get_protocol_version() const798 int atransport::get_protocol_version() const {
799     return protocol_version;
800 }
801 
get_max_payload() const802 size_t atransport::get_max_payload() const {
803     return max_payload;
804 }
805 
806 namespace {
807 
808 constexpr char kFeatureStringDelimiter = ',';
809 
810 }  // namespace
811 
supported_features()812 const FeatureSet& supported_features() {
813     // Local static allocation to avoid global non-POD variables.
814     static const FeatureSet* features = new FeatureSet{
815         kFeatureShell2, kFeatureCmd, kFeatureStat2,
816         // Increment ADB_SERVER_VERSION whenever the feature list changes to
817         // make sure that the adb client and server features stay in sync
818         // (http://b/24370690).
819     };
820 
821     return *features;
822 }
823 
FeatureSetToString(const FeatureSet & features)824 std::string FeatureSetToString(const FeatureSet& features) {
825     return android::base::Join(features, kFeatureStringDelimiter);
826 }
827 
StringToFeatureSet(const std::string & features_string)828 FeatureSet StringToFeatureSet(const std::string& features_string) {
829     if (features_string.empty()) {
830         return FeatureSet();
831     }
832 
833     auto names = android::base::Split(features_string, {kFeatureStringDelimiter});
834     return FeatureSet(names.begin(), names.end());
835 }
836 
CanUseFeature(const FeatureSet & feature_set,const std::string & feature)837 bool CanUseFeature(const FeatureSet& feature_set, const std::string& feature) {
838     return feature_set.count(feature) > 0 && supported_features().count(feature) > 0;
839 }
840 
has_feature(const std::string & feature) const841 bool atransport::has_feature(const std::string& feature) const {
842     return features_.count(feature) > 0;
843 }
844 
SetFeatures(const std::string & features_string)845 void atransport::SetFeatures(const std::string& features_string) {
846     features_ = StringToFeatureSet(features_string);
847 }
848 
AddDisconnect(adisconnect * disconnect)849 void atransport::AddDisconnect(adisconnect* disconnect) {
850     disconnects_.push_back(disconnect);
851 }
852 
RemoveDisconnect(adisconnect * disconnect)853 void atransport::RemoveDisconnect(adisconnect* disconnect) {
854     disconnects_.remove(disconnect);
855 }
856 
RunDisconnects()857 void atransport::RunDisconnects() {
858     for (const auto& disconnect : disconnects_) {
859         disconnect->func(disconnect->opaque, this);
860     }
861     disconnects_.clear();
862 }
863 
MatchesTarget(const std::string & target) const864 bool atransport::MatchesTarget(const std::string& target) const {
865     if (serial) {
866         if (target == serial) {
867             return true;
868         } else if (type == kTransportLocal) {
869             // Local transports can match [tcp:|udp:]<hostname>[:port].
870             const char* local_target_ptr = target.c_str();
871 
872             // For fastboot compatibility, ignore protocol prefixes.
873             if (android::base::StartsWith(target, "tcp:") ||
874                 android::base::StartsWith(target, "udp:")) {
875                 local_target_ptr += 4;
876             }
877 
878             // Parse our |serial| and the given |target| to check if the hostnames and ports match.
879             std::string serial_host, error;
880             int serial_port = -1;
881             if (android::base::ParseNetAddress(serial, &serial_host, &serial_port, nullptr, &error)) {
882                 // |target| may omit the port to default to ours.
883                 std::string target_host;
884                 int target_port = serial_port;
885                 if (android::base::ParseNetAddress(local_target_ptr, &target_host, &target_port,
886                                                    nullptr, &error) &&
887                     serial_host == target_host && serial_port == target_port) {
888                     return true;
889                 }
890             }
891         }
892     }
893 
894     return (devpath && target == devpath) ||
895            qual_match(target.c_str(), "product:", product, false) ||
896            qual_match(target.c_str(), "model:", model, true) ||
897            qual_match(target.c_str(), "device:", device, false);
898 }
899 
900 #if ADB_HOST
901 
902 // We use newline as our delimiter, make sure to never output it.
sanitize(std::string str,bool alphanumeric)903 static std::string sanitize(std::string str, bool alphanumeric) {
904     auto pred = alphanumeric ? [](const char c) { return !isalnum(c); }
905                              : [](const char c) { return c == '\n'; };
906     std::replace_if(str.begin(), str.end(), pred, '_');
907     return str;
908 }
909 
append_transport_info(std::string * result,const char * key,const char * value,bool alphanumeric)910 static void append_transport_info(std::string* result, const char* key, const char* value,
911                                   bool alphanumeric) {
912     if (value == nullptr || *value == '\0') {
913         return;
914     }
915 
916     *result += ' ';
917     *result += key;
918     *result += sanitize(value, alphanumeric);
919 }
920 
append_transport(const atransport * t,std::string * result,bool long_listing)921 static void append_transport(const atransport* t, std::string* result, bool long_listing) {
922     const char* serial = t->serial;
923     if (!serial || !serial[0]) {
924         serial = "(no serial number)";
925     }
926 
927     if (!long_listing) {
928         *result += serial;
929         *result += '\t';
930         *result += t->connection_state_name();
931     } else {
932         android::base::StringAppendF(result, "%-22s %s", serial, t->connection_state_name().c_str());
933 
934         append_transport_info(result, "", t->devpath, false);
935         append_transport_info(result, "product:", t->product, false);
936         append_transport_info(result, "model:", t->model, true);
937         append_transport_info(result, "device:", t->device, false);
938 
939         // Put id at the end, so that anyone parsing the output here can always find it by scanning
940         // backwards from newlines, even with hypothetical devices named 'transport_id:1'.
941         *result += " transport_id:";
942         *result += std::to_string(t->id);
943     }
944     *result += '\n';
945 }
946 
list_transports(bool long_listing)947 std::string list_transports(bool long_listing) {
948     std::string result;
949 
950     std::lock_guard<std::recursive_mutex> lock(transport_lock);
951     for (const auto& t : transport_list) {
952         append_transport(t, &result, long_listing);
953     }
954     return result;
955 }
956 
close_usb_devices(std::function<bool (const atransport *)> predicate)957 void close_usb_devices(std::function<bool(const atransport*)> predicate) {
958     std::lock_guard<std::recursive_mutex> lock(transport_lock);
959     for (auto& t : transport_list) {
960         if (predicate(t)) {
961             t->Kick();
962         }
963     }
964 }
965 
966 /* hack for osx */
close_usb_devices()967 void close_usb_devices() {
968     close_usb_devices([](const atransport*) { return true; });
969 }
970 #endif  // ADB_HOST
971 
register_socket_transport(int s,const char * serial,int port,int local)972 int register_socket_transport(int s, const char* serial, int port, int local) {
973     atransport* t = new atransport();
974 
975     if (!serial) {
976         char buf[32];
977         snprintf(buf, sizeof(buf), "T-%p", t);
978         serial = buf;
979     }
980 
981     D("transport: %s init'ing for socket %d, on port %d", serial, s, port);
982     if (init_socket_transport(t, s, port, local) < 0) {
983         delete t;
984         return -1;
985     }
986 
987     std::unique_lock<std::recursive_mutex> lock(transport_lock);
988     for (const auto& transport : pending_list) {
989         if (transport->serial && strcmp(serial, transport->serial) == 0) {
990             VLOG(TRANSPORT) << "socket transport " << transport->serial
991                             << " is already in pending_list and fails to register";
992             delete t;
993             return -1;
994         }
995     }
996 
997     for (const auto& transport : transport_list) {
998         if (transport->serial && strcmp(serial, transport->serial) == 0) {
999             VLOG(TRANSPORT) << "socket transport " << transport->serial
1000                             << " is already in transport_list and fails to register";
1001             delete t;
1002             return -1;
1003         }
1004     }
1005 
1006     pending_list.push_front(t);
1007     t->serial = strdup(serial);
1008 
1009     lock.unlock();
1010 
1011     register_transport(t);
1012     return 0;
1013 }
1014 
1015 #if ADB_HOST
find_transport(const char * serial)1016 atransport* find_transport(const char* serial) {
1017     atransport* result = nullptr;
1018 
1019     std::lock_guard<std::recursive_mutex> lock(transport_lock);
1020     for (auto& t : transport_list) {
1021         if (t->serial && strcmp(serial, t->serial) == 0) {
1022             result = t;
1023             break;
1024         }
1025     }
1026 
1027     return result;
1028 }
1029 
kick_all_tcp_devices()1030 void kick_all_tcp_devices() {
1031     std::lock_guard<std::recursive_mutex> lock(transport_lock);
1032     for (auto& t : transport_list) {
1033         if (t->IsTcpDevice()) {
1034             // Kicking breaks the read_transport thread of this transport out of any read, then
1035             // the read_transport thread will notify the main thread to make this transport
1036             // offline. Then the main thread will notify the write_transport thread to exit.
1037             // Finally, this transport will be closed and freed in the main thread.
1038             t->Kick();
1039         }
1040     }
1041 }
1042 
1043 #endif
1044 
register_usb_transport(usb_handle * usb,const char * serial,const char * devpath,unsigned writeable)1045 void register_usb_transport(usb_handle* usb, const char* serial, const char* devpath,
1046                             unsigned writeable) {
1047     atransport* t = new atransport((writeable ? kCsOffline : kCsNoPerm));
1048 
1049     D("transport: %p init'ing for usb_handle %p (sn='%s')", t, usb, serial ? serial : "");
1050     init_usb_transport(t, usb);
1051     if (serial) {
1052         t->serial = strdup(serial);
1053     }
1054 
1055     if (devpath) {
1056         t->devpath = strdup(devpath);
1057     }
1058 
1059     {
1060         std::lock_guard<std::recursive_mutex> lock(transport_lock);
1061         pending_list.push_front(t);
1062     }
1063 
1064     register_transport(t);
1065 }
1066 
1067 // This should only be used for transports with connection_state == kCsNoPerm.
unregister_usb_transport(usb_handle * usb)1068 void unregister_usb_transport(usb_handle* usb) {
1069     std::lock_guard<std::recursive_mutex> lock(transport_lock);
1070     transport_list.remove_if(
1071         [usb](atransport* t) { return t->usb == usb && t->GetConnectionState() == kCsNoPerm; });
1072 }
1073 
check_header(apacket * p,atransport * t)1074 bool check_header(apacket* p, atransport* t) {
1075     if (p->msg.magic != (p->msg.command ^ 0xffffffff)) {
1076         VLOG(RWX) << "check_header(): invalid magic command = " << std::hex << p->msg.command
1077                   << ", magic = " << p->msg.magic;
1078         return false;
1079     }
1080 
1081     if (p->msg.data_length > t->get_max_payload()) {
1082         VLOG(RWX) << "check_header(): " << p->msg.data_length
1083                   << " atransport::max_payload = " << t->get_max_payload();
1084         return false;
1085     }
1086 
1087     return true;
1088 }
1089 
check_data(apacket * p)1090 bool check_data(apacket* p) {
1091     return calculate_apacket_checksum(p) == p->msg.data_check;
1092 }
1093 
1094 #if ADB_HOST
NextKey()1095 std::shared_ptr<RSA> atransport::NextKey() {
1096     if (keys_.empty()) keys_ = adb_auth_get_private_keys();
1097 
1098     std::shared_ptr<RSA> result = keys_[0];
1099     keys_.pop_front();
1100     return result;
1101 }
1102 #endif
1103