services.cpp revision 13a269ea24a98111d2e84a7ffa3c05ab8a4e73a9
1/*
2 * Copyright (C) 2007 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 *      http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#define TRACE_TAG SERVICES
18
19#include "sysdeps.h"
20
21#include <errno.h>
22#include <stddef.h>
23#include <stdio.h>
24#include <stdlib.h>
25#include <string.h>
26
27#ifndef _WIN32
28#include <netdb.h>
29#include <netinet/in.h>
30#include <sys/ioctl.h>
31#include <unistd.h>
32#endif
33
34#include <android-base/file.h>
35#include <android-base/parsenetaddress.h>
36#include <android-base/stringprintf.h>
37#include <android-base/strings.h>
38#include <cutils/sockets.h>
39
40#if !ADB_HOST
41#include <android-base/properties.h>
42#include <bootloader_message/bootloader_message.h>
43#include <cutils/android_reboot.h>
44#include <private/android_logger.h>
45#endif
46
47#include "adb.h"
48#include "adb_io.h"
49#include "adb_utils.h"
50#include "file_sync_service.h"
51#include "remount_service.h"
52#include "services.h"
53#include "shell_service.h"
54#include "socket_spec.h"
55#include "sysdeps.h"
56#include "transport.h"
57
58struct stinfo {
59    void (*func)(int fd, void *cookie);
60    int fd;
61    void *cookie;
62};
63
64static void service_bootstrap_func(void* x) {
65    stinfo* sti = reinterpret_cast<stinfo*>(x);
66    adb_thread_setname(android::base::StringPrintf("service %d", sti->fd));
67    sti->func(sti->fd, sti->cookie);
68    free(sti);
69}
70
71#if !ADB_HOST
72
73void restart_root_service(int fd, void *cookie) {
74    if (getuid() == 0) {
75        WriteFdExactly(fd, "adbd is already running as root\n");
76        adb_close(fd);
77    } else {
78        if (!__android_log_is_debuggable()) {
79            WriteFdExactly(fd, "adbd cannot run as root in production builds\n");
80            adb_close(fd);
81            return;
82        }
83
84        android::base::SetProperty("service.adb.root", "1");
85        WriteFdExactly(fd, "restarting adbd as root\n");
86        adb_close(fd);
87    }
88}
89
90void restart_unroot_service(int fd, void *cookie) {
91    if (getuid() != 0) {
92        WriteFdExactly(fd, "adbd not running as root\n");
93        adb_close(fd);
94    } else {
95        android::base::SetProperty("service.adb.root", "0");
96        WriteFdExactly(fd, "restarting adbd as non root\n");
97        adb_close(fd);
98    }
99}
100
101void restart_tcp_service(int fd, void *cookie) {
102    int port = (int) (uintptr_t) cookie;
103    if (port <= 0) {
104        WriteFdFmt(fd, "invalid port %d\n", port);
105        adb_close(fd);
106        return;
107    }
108
109    android::base::SetProperty("service.adb.tcp.port", android::base::StringPrintf("%d", port));
110    WriteFdFmt(fd, "restarting in TCP mode port: %d\n", port);
111    adb_close(fd);
112}
113
114void restart_usb_service(int fd, void *cookie) {
115    android::base::SetProperty("service.adb.tcp.port", "0");
116    WriteFdExactly(fd, "restarting in USB mode\n");
117    adb_close(fd);
118}
119
120static bool reboot_service_impl(int fd, const char* arg) {
121    const char* reboot_arg = arg;
122    bool auto_reboot = false;
123
124    if (strcmp(reboot_arg, "sideload-auto-reboot") == 0) {
125        auto_reboot = true;
126        reboot_arg = "sideload";
127    }
128
129    // It reboots into sideload mode by setting "--sideload" or "--sideload_auto_reboot"
130    // in the command file.
131    if (strcmp(reboot_arg, "sideload") == 0) {
132        if (getuid() != 0) {
133            WriteFdExactly(fd, "'adb root' is required for 'adb reboot sideload'.\n");
134            return false;
135        }
136
137        const std::vector<std::string> options = {
138            auto_reboot ? "--sideload_auto_reboot" : "--sideload"
139        };
140        std::string err;
141        if (!write_bootloader_message(options, &err)) {
142            D("Failed to set bootloader message: %s", err.c_str());
143            return false;
144        }
145
146        reboot_arg = "recovery";
147    }
148
149    sync();
150
151    std::string reboot_string = android::base::StringPrintf("reboot,%s", reboot_arg);
152    if (!android::base::SetProperty(ANDROID_RB_PROPERTY, reboot_string)) {
153        WriteFdFmt(fd, "reboot (%s) failed\n", reboot_string.c_str());
154        return false;
155    }
156
157    return true;
158}
159
160void reboot_service(int fd, void* arg)
161{
162    if (reboot_service_impl(fd, static_cast<const char*>(arg))) {
163        // Don't return early. Give the reboot command time to take effect
164        // to avoid messing up scripts which do "adb reboot && adb wait-for-device"
165        while (true) {
166            pause();
167        }
168    }
169
170    free(arg);
171    adb_close(fd);
172}
173
174static void reconnect_service(int fd, void* arg) {
175    WriteFdExactly(fd, "done");
176    adb_close(fd);
177    atransport* t = static_cast<atransport*>(arg);
178    kick_transport(t);
179}
180
181int reverse_service(const char* command) {
182    int s[2];
183    if (adb_socketpair(s)) {
184        PLOG(ERROR) << "cannot create service socket pair.";
185        return -1;
186    }
187    VLOG(SERVICES) << "service socketpair: " << s[0] << ", " << s[1];
188    if (handle_forward_request(command, kTransportAny, nullptr, s[1]) < 0) {
189        SendFail(s[1], "not a reverse forwarding command");
190    }
191    adb_close(s[1]);
192    return s[0];
193}
194
195// Shell service string can look like:
196//   shell[,arg1,arg2,...]:[command]
197static int ShellService(const std::string& args, const atransport* transport) {
198    size_t delimiter_index = args.find(':');
199    if (delimiter_index == std::string::npos) {
200        LOG(ERROR) << "No ':' found in shell service arguments: " << args;
201        return -1;
202    }
203
204    const std::string service_args = args.substr(0, delimiter_index);
205    const std::string command = args.substr(delimiter_index + 1);
206
207    // Defaults:
208    //   PTY for interactive, raw for non-interactive.
209    //   No protocol.
210    //   $TERM set to "dumb".
211    SubprocessType type(command.empty() ? SubprocessType::kPty
212                                        : SubprocessType::kRaw);
213    SubprocessProtocol protocol = SubprocessProtocol::kNone;
214    std::string terminal_type = "dumb";
215
216    for (const std::string& arg : android::base::Split(service_args, ",")) {
217        if (arg == kShellServiceArgRaw) {
218            type = SubprocessType::kRaw;
219        } else if (arg == kShellServiceArgPty) {
220            type = SubprocessType::kPty;
221        } else if (arg == kShellServiceArgShellProtocol) {
222            protocol = SubprocessProtocol::kShell;
223        } else if (android::base::StartsWith(arg, "TERM=")) {
224            terminal_type = arg.substr(5);
225        } else if (!arg.empty()) {
226            // This is not an error to allow for future expansion.
227            LOG(WARNING) << "Ignoring unknown shell service argument: " << arg;
228        }
229    }
230
231    return StartSubprocess(command.c_str(), terminal_type.c_str(), type, protocol);
232}
233
234#endif  // !ADB_HOST
235
236static int create_service_thread(void (*func)(int, void *), void *cookie)
237{
238    int s[2];
239    if (adb_socketpair(s)) {
240        printf("cannot create service socket pair\n");
241        return -1;
242    }
243    D("socketpair: (%d,%d)", s[0], s[1]);
244
245#if !ADB_HOST
246    if (func == &file_sync_service) {
247        // Set file sync service socket to maximum size
248        int max_buf = LINUX_MAX_SOCKET_SIZE;
249        adb_setsockopt(s[0], SOL_SOCKET, SO_SNDBUF, &max_buf, sizeof(max_buf));
250        adb_setsockopt(s[1], SOL_SOCKET, SO_SNDBUF, &max_buf, sizeof(max_buf));
251    }
252#endif // !ADB_HOST
253
254    stinfo* sti = reinterpret_cast<stinfo*>(malloc(sizeof(stinfo)));
255    if (sti == nullptr) {
256        fatal("cannot allocate stinfo");
257    }
258    sti->func = func;
259    sti->cookie = cookie;
260    sti->fd = s[1];
261
262    if (!adb_thread_create(service_bootstrap_func, sti)) {
263        free(sti);
264        adb_close(s[0]);
265        adb_close(s[1]);
266        printf("cannot create service thread\n");
267        return -1;
268    }
269
270    D("service thread started, %d:%d",s[0], s[1]);
271    return s[0];
272}
273
274int service_to_fd(const char* name, const atransport* transport) {
275    int ret = -1;
276
277    if (is_socket_spec(name)) {
278        std::string error;
279        ret = socket_spec_connect(name, &error);
280        if (ret < 0) {
281            LOG(ERROR) << "failed to connect to socket '" << name << "': " << error;
282        }
283#if !ADB_HOST
284    } else if(!strncmp("dev:", name, 4)) {
285        ret = unix_open(name + 4, O_RDWR | O_CLOEXEC);
286    } else if(!strncmp(name, "framebuffer:", 12)) {
287        ret = create_service_thread(framebuffer_service, 0);
288    } else if (!strncmp(name, "jdwp:", 5)) {
289        ret = create_jdwp_connection_fd(atoi(name+5));
290    } else if(!strncmp(name, "shell", 5)) {
291        ret = ShellService(name + 5, transport);
292    } else if(!strncmp(name, "exec:", 5)) {
293        ret = StartSubprocess(name + 5, nullptr, SubprocessType::kRaw, SubprocessProtocol::kNone);
294    } else if(!strncmp(name, "sync:", 5)) {
295        ret = create_service_thread(file_sync_service, NULL);
296    } else if(!strncmp(name, "remount:", 8)) {
297        ret = create_service_thread(remount_service, NULL);
298    } else if(!strncmp(name, "reboot:", 7)) {
299        void* arg = strdup(name + 7);
300        if (arg == NULL) return -1;
301        ret = create_service_thread(reboot_service, arg);
302    } else if(!strncmp(name, "root:", 5)) {
303        ret = create_service_thread(restart_root_service, NULL);
304    } else if(!strncmp(name, "unroot:", 7)) {
305        ret = create_service_thread(restart_unroot_service, NULL);
306    } else if(!strncmp(name, "backup:", 7)) {
307        ret = StartSubprocess(android::base::StringPrintf("/system/bin/bu backup %s",
308                                                          (name + 7)).c_str(),
309                              nullptr, SubprocessType::kRaw, SubprocessProtocol::kNone);
310    } else if(!strncmp(name, "restore:", 8)) {
311        ret = StartSubprocess("/system/bin/bu restore", nullptr, SubprocessType::kRaw,
312                              SubprocessProtocol::kNone);
313    } else if(!strncmp(name, "tcpip:", 6)) {
314        int port;
315        if (sscanf(name + 6, "%d", &port) != 1) {
316            return -1;
317        }
318        ret = create_service_thread(restart_tcp_service, (void *) (uintptr_t) port);
319    } else if(!strncmp(name, "usb:", 4)) {
320        ret = create_service_thread(restart_usb_service, NULL);
321    } else if (!strncmp(name, "reverse:", 8)) {
322        ret = reverse_service(name + 8);
323    } else if(!strncmp(name, "disable-verity:", 15)) {
324        ret = create_service_thread(set_verity_enabled_state_service, (void*)0);
325    } else if(!strncmp(name, "enable-verity:", 15)) {
326        ret = create_service_thread(set_verity_enabled_state_service, (void*)1);
327    } else if (!strcmp(name, "reconnect")) {
328        ret = create_service_thread(reconnect_service, const_cast<atransport*>(transport));
329#endif
330    }
331    if (ret >= 0) {
332        close_on_exec(ret);
333    }
334    return ret;
335}
336
337#if ADB_HOST
338struct state_info {
339    TransportType transport_type;
340    std::string serial;
341    ConnectionState state;
342};
343
344static void wait_for_state(int fd, void* data) {
345    std::unique_ptr<state_info> sinfo(reinterpret_cast<state_info*>(data));
346
347    D("wait_for_state %d", sinfo->state);
348
349    while (true) {
350        bool is_ambiguous = false;
351        std::string error = "unknown error";
352        const char* serial = sinfo->serial.length() ? sinfo->serial.c_str() : NULL;
353        atransport* t = acquire_one_transport(sinfo->transport_type, serial, &is_ambiguous, &error);
354        if (t != nullptr && (sinfo->state == kCsAny || sinfo->state == t->connection_state)) {
355            SendOkay(fd);
356            break;
357        } else if (!is_ambiguous) {
358            adb_pollfd pfd = {.fd = fd, .events = POLLIN };
359            int rc = adb_poll(&pfd, 1, 1000);
360            if (rc < 0) {
361                SendFail(fd, error);
362                break;
363            } else if (rc > 0 && (pfd.revents & POLLHUP) != 0) {
364                // The other end of the socket is closed, probably because the other side was
365                // terminated, bail out.
366                break;
367            }
368
369            // Try again...
370        } else {
371            SendFail(fd, error);
372            break;
373        }
374    }
375
376    adb_close(fd);
377    D("wait_for_state is done");
378}
379
380void connect_emulator(const std::string& port_spec, std::string* response) {
381    std::vector<std::string> pieces = android::base::Split(port_spec, ",");
382    if (pieces.size() != 2) {
383        *response = android::base::StringPrintf("unable to parse '%s' as <console port>,<adb port>",
384                                                port_spec.c_str());
385        return;
386    }
387
388    int console_port = strtol(pieces[0].c_str(), NULL, 0);
389    int adb_port = strtol(pieces[1].c_str(), NULL, 0);
390    if (console_port <= 0 || adb_port <= 0) {
391        *response = android::base::StringPrintf("Invalid port numbers: %s", port_spec.c_str());
392        return;
393    }
394
395    // Check if the emulator is already known.
396    // Note: There's a small but harmless race condition here: An emulator not
397    // present just yet could be registered by another invocation right
398    // after doing this check here. However, local_connect protects
399    // against double-registration too. From here, a better error message
400    // can be produced. In the case of the race condition, the very specific
401    // error message won't be shown, but the data doesn't get corrupted.
402    atransport* known_emulator = find_emulator_transport_by_adb_port(adb_port);
403    if (known_emulator != nullptr) {
404        *response = android::base::StringPrintf("Emulator already registered on port %d", adb_port);
405        return;
406    }
407
408    // Check if more emulators can be registered. Similar unproblematic
409    // race condition as above.
410    int candidate_slot = get_available_local_transport_index();
411    if (candidate_slot < 0) {
412        *response = "Cannot accept more emulators";
413        return;
414    }
415
416    // Preconditions met, try to connect to the emulator.
417    std::string error;
418    if (!local_connect_arbitrary_ports(console_port, adb_port, &error)) {
419        *response = android::base::StringPrintf("Connected to emulator on ports %d,%d",
420                                                console_port, adb_port);
421    } else {
422        *response = android::base::StringPrintf("Could not connect to emulator on ports %d,%d: %s",
423                                                console_port, adb_port, error.c_str());
424    }
425}
426
427static void connect_service(int fd, void* data) {
428    char* host = reinterpret_cast<char*>(data);
429    std::string response;
430    if (!strncmp(host, "emu:", 4)) {
431        connect_emulator(host + 4, &response);
432    } else {
433        connect_device(host, &response);
434    }
435    free(host);
436
437    // Send response for emulator and device
438    SendProtocolString(fd, response);
439    adb_close(fd);
440}
441#endif
442
443#if ADB_HOST
444asocket* host_service_to_socket(const char* name, const char* serial) {
445    if (!strcmp(name,"track-devices")) {
446        return create_device_tracker();
447    } else if (android::base::StartsWith(name, "wait-for-")) {
448        name += strlen("wait-for-");
449
450        std::unique_ptr<state_info> sinfo(new state_info);
451        if (sinfo == nullptr) {
452            fprintf(stderr, "couldn't allocate state_info: %s", strerror(errno));
453            return nullptr;
454        }
455
456        if (serial) sinfo->serial = serial;
457
458        if (android::base::StartsWith(name, "local")) {
459            name += strlen("local");
460            sinfo->transport_type = kTransportLocal;
461        } else if (android::base::StartsWith(name, "usb")) {
462            name += strlen("usb");
463            sinfo->transport_type = kTransportUsb;
464        } else if (android::base::StartsWith(name, "any")) {
465            name += strlen("any");
466            sinfo->transport_type = kTransportAny;
467        } else {
468            return nullptr;
469        }
470
471        if (!strcmp(name, "-device")) {
472            sinfo->state = kCsDevice;
473        } else if (!strcmp(name, "-recovery")) {
474            sinfo->state = kCsRecovery;
475        } else if (!strcmp(name, "-sideload")) {
476            sinfo->state = kCsSideload;
477        } else if (!strcmp(name, "-bootloader")) {
478            sinfo->state = kCsBootloader;
479        } else if (!strcmp(name, "-any")) {
480            sinfo->state = kCsAny;
481        } else {
482            return nullptr;
483        }
484
485        int fd = create_service_thread(wait_for_state, sinfo.release());
486        return create_local_socket(fd);
487    } else if (!strncmp(name, "connect:", 8)) {
488        char* host = strdup(name + 8);
489        int fd = create_service_thread(connect_service, host);
490        return create_local_socket(fd);
491    }
492    return NULL;
493}
494#endif /* ADB_HOST */
495