blob: 15308287b0431ea120f0ba78eb0134912c998f40 [file] [log] [blame]
Dan Albert53a37442015-05-08 16:13:53 -07001/*
2 * Copyright (C) 2015 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Yabin Cui19bec5b2015-09-22 15:52:57 -070017#define TRACE_TAG ADB
Dan Albert53a37442015-05-08 16:13:53 -070018
19#include "sysdeps.h"
20
21#include <signal.h>
22#include <stdio.h>
23#include <stdlib.h>
Josh Gaofdd946b2016-02-04 11:59:12 -080024#include <unistd.h>
Dan Albert53a37442015-05-08 16:13:53 -070025
Josh Gaoe80f47a2016-12-12 18:15:33 -080026#include <thread>
27
David Pursellc573d522016-01-27 08:52:53 -080028#include <android-base/errors.h>
Elliott Hughesf55ead92015-12-04 22:00:26 -080029#include <android-base/file.h>
30#include <android-base/logging.h>
31#include <android-base/stringprintf.h>
Dan Albert53a37442015-05-08 16:13:53 -070032
33#include "adb.h"
34#include "adb_auth.h"
Josh Gao67209db2019-03-14 15:38:02 -070035#include "adb_client.h"
Dan Albert53a37442015-05-08 16:13:53 -070036#include "adb_listeners.h"
Joshua Duongf4ba8d72021-01-13 12:18:15 -080037#include "adb_mdns.h"
Josh Gao1eef4782015-11-20 15:37:31 -080038#include "adb_utils.h"
Joshua Duong290ccb52019-11-20 14:18:43 -080039#include "adb_wifi.h"
Josh Gao6b55e752020-03-27 18:09:56 -070040#include "client/usb.h"
Felipe Leme042c3512016-07-19 17:07:22 -070041#include "commandline.h"
Josh Gaoe80f47a2016-12-12 18:15:33 -080042#include "sysdeps/chrono.h"
Dan Albert53a37442015-05-08 16:13:53 -070043#include "transport.h"
44
Josh Gao67209db2019-03-14 15:38:02 -070045const char** __adb_argv;
46const char** __adb_envp;
47
Elliott Hughescd61ae32017-06-15 08:35:24 -070048static void setup_daemon_logging() {
Spencer Lowfe6ab812015-08-11 16:08:43 -070049 const std::string log_file_path(GetLogFilePath());
Josh Gaof0c44032018-12-12 16:12:28 -080050 int fd = unix_open(log_file_path, O_WRONLY | O_CREAT | O_APPEND, 0640);
Dan Albert53a37442015-05-08 16:13:53 -070051 if (fd == -1) {
Elliott Hughese64126b2018-10-19 13:59:44 -070052 PLOG(FATAL) << "cannot open " << log_file_path;
Dan Albert53a37442015-05-08 16:13:53 -070053 }
Spencer Lowfe6ab812015-08-11 16:08:43 -070054 if (dup2(fd, STDOUT_FILENO) == -1) {
Elliott Hughese64126b2018-10-19 13:59:44 -070055 PLOG(FATAL) << "cannot redirect stdout";
Spencer Lowfe6ab812015-08-11 16:08:43 -070056 }
57 if (dup2(fd, STDERR_FILENO) == -1) {
Elliott Hughese64126b2018-10-19 13:59:44 -070058 PLOG(FATAL) << "cannot redirect stderr";
Spencer Lowfe6ab812015-08-11 16:08:43 -070059 }
Spencer Low4911f4b2015-05-20 23:17:26 -070060 unix_close(fd);
61
Dan Albert53a37442015-05-08 16:13:53 -070062 fprintf(stderr, "--- adb starting (pid %d) ---\n", getpid());
Siva Velusamy878e36b2015-08-18 17:53:16 -070063 LOG(INFO) << adb_version();
Dan Albert53a37442015-05-08 16:13:53 -070064}
65
Josh Gao165460f2017-05-09 13:43:35 -070066void adb_server_cleanup() {
67 // Upon exit, we want to clean up in the following order:
68 // 1. close_smartsockets, so that we don't get any new clients
69 // 2. kick_all_transports, to avoid writing only part of a packet to a transport.
70 // 3. usb_cleanup, to tear down the USB stack.
Joshua Duongf4ba8d72021-01-13 12:18:15 -080071 // 4. mdns_cleanup, to tear down mdns stack.
Josh Gao165460f2017-05-09 13:43:35 -070072 close_smartsockets();
73 kick_all_transports();
74 usb_cleanup();
Joshua Duongf4ba8d72021-01-13 12:18:15 -080075 mdns_cleanup();
Josh Gao165460f2017-05-09 13:43:35 -070076}
77
Josh Gaod64d2ed2018-02-27 16:10:29 -080078static void intentionally_leak() {
79 void* p = ::operator new(1);
George Burgess IVa54dbfd2018-03-01 10:54:21 -080080 // The analyzer is upset about this leaking. NOLINTNEXTLINE
Josh Gaod64d2ed2018-02-27 16:10:29 -080081 LOG(INFO) << "leaking pointer " << p;
82}
83
Vince Harron5703eb32021-11-12 12:40:58 -080084// one_device: if null, server owns all devices, else server owns only
85// device where atransport::MatchesTarget(one_device) is true.
86int adb_server_main(int is_daemon, const std::string& socket_spec, const char* one_device,
87 int ack_reply_fd) {
Dan Albert53a37442015-05-08 16:13:53 -070088#if defined(_WIN32)
Spencer Low2bbb3a92015-08-26 18:46:09 -070089 // adb start-server starts us up with stdout and stderr hooked up to
Elliott Hughes4919c172015-11-18 18:07:48 -080090 // anonymous pipes. When the C Runtime sees this, it makes stderr and
Spencer Low2bbb3a92015-08-26 18:46:09 -070091 // stdout buffered, but to improve the chance that error output is seen,
92 // unbuffer stdout and stderr just like if we were run at the console.
93 // This also keeps stderr unbuffered when it is redirected to adb.log.
94 if (is_daemon) {
Yi Kong86e67182018-07-13 18:15:16 -070095 if (setvbuf(stdout, nullptr, _IONBF, 0) == -1) {
Elliott Hughese64126b2018-10-19 13:59:44 -070096 PLOG(FATAL) << "cannot make stdout unbuffered";
Spencer Low2bbb3a92015-08-26 18:46:09 -070097 }
Yi Kong86e67182018-07-13 18:15:16 -070098 if (setvbuf(stderr, nullptr, _IONBF, 0) == -1) {
Elliott Hughese64126b2018-10-19 13:59:44 -070099 PLOG(FATAL) << "cannot make stderr unbuffered";
Spencer Low2bbb3a92015-08-26 18:46:09 -0700100 }
101 }
102
Spencer Low0d5b2e92018-08-25 23:34:33 -0700103 // TODO: On Ctrl-C, consider trying to kill a starting up adb server (if we're in
104 // launch_server) by calling GenerateConsoleCtrlEvent().
105
106 // On Windows, SIGBREAK is when Ctrl-Break is pressed or the console window is closed. It should
107 // act like Ctrl-C.
108 signal(SIGBREAK, [](int) { raise(SIGINT); });
109#endif
Shaju Mathew705fa1c2022-12-31 19:36:54 -0800110 signal(SIGINT, [](int) { fdevent_run_on_looper([]() { exit(0); }); });
Dan Albert53a37442015-05-08 16:13:53 -0700111
Vince Harron5703eb32021-11-12 12:40:58 -0800112 if (one_device) {
113 transport_set_one_device(one_device);
114 }
115
Josh Gaobea8f3c2020-04-06 12:07:56 -0700116 const char* reject_kill_server = getenv("ADB_REJECT_KILL_SERVER");
117 if (reject_kill_server && strcmp(reject_kill_server, "1") == 0) {
118 adb_set_reject_kill_server(true);
119 }
120
121 const char* leak = getenv("ADB_LEAK");
Josh Gaod64d2ed2018-02-27 16:10:29 -0800122 if (leak && strcmp(leak, "1") == 0) {
123 intentionally_leak();
124 }
125
Josh Gao530b9f12017-05-15 18:26:38 -0700126 if (is_daemon) {
127 close_stdin();
128 setup_daemon_logging();
129 }
130
Josh Gao50576fd2018-02-23 14:00:24 -0800131 atexit(adb_server_cleanup);
Dan Albert53a37442015-05-08 16:13:53 -0700132
Luis Hector Chavez0aeda102018-04-20 10:31:29 -0700133 init_reconnect_handler();
Casey Dahlin3122cdf2016-06-23 14:19:37 -0700134
Josh Gao9aa63fe2018-08-10 14:24:25 -0700135 if (!getenv("ADB_MDNS") || strcmp(getenv("ADB_MDNS"), "0") != 0) {
136 init_mdns_transport_discovery();
137 }
138
139 if (!getenv("ADB_USB") || strcmp(getenv("ADB_USB"), "0") != 0) {
Fabien Sanglard7799b4b2024-07-03 13:58:52 -0700140 if (is_libusb_enabled()) {
Josh Gaof2d6af52021-04-27 20:32:02 -0700141 libusb::usb_init();
142 } else {
143 usb_init();
144 }
Josh Gao9aa63fe2018-08-10 14:24:25 -0700145 } else {
146 adb_notify_device_scan_complete();
147 }
148
149 if (!getenv("ADB_EMU") || strcmp(getenv("ADB_EMU"), "0") != 0) {
Jason Jeremy Iman84613872019-07-19 12:44:39 +0900150 local_init(android::base::StringPrintf("tcp:%d", DEFAULT_ADB_LOCAL_TRANSPORT_PORT));
Josh Gao9aa63fe2018-08-10 14:24:25 -0700151 }
Dan Albert53a37442015-05-08 16:13:53 -0700152
Spencer Low753d4852015-07-30 23:07:55 -0700153 std::string error;
Josh Gaoe80f47a2016-12-12 18:15:33 -0800154
155 auto start = std::chrono::steady_clock::now();
156
157 // If we told a previous adb server to quit because of version mismatch, we can get to this
Daniel Colascione232c39c2019-11-13 17:51:19 -0800158 // point before it's finished exiting. Retry for a while to give it some time. Don't actually
159 // accept any connections until adb_wait_for_device_initialization finishes below.
Fabien Sanglard59aced82024-01-19 15:30:51 -0800160 while (install_listener(socket_spec, kSmartSocketConnectTo, nullptr, INSTALL_LISTENER_DISABLED,
Daniel Colascione232c39c2019-11-13 17:51:19 -0800161 nullptr, &error) != INSTALL_STATUS_OK) {
Josh Gaoe80f47a2016-12-12 18:15:33 -0800162 if (std::chrono::steady_clock::now() - start > 0.5s) {
Elliott Hughese64126b2018-10-19 13:59:44 -0700163 LOG(FATAL) << "could not install *smartsocket* listener: " << error;
Josh Gaoe80f47a2016-12-12 18:15:33 -0800164 }
165
166 std::this_thread::sleep_for(100ms);
Dan Albert53a37442015-05-08 16:13:53 -0700167 }
168
Elliott Hughes801066a2016-06-29 17:42:01 -0700169 adb_auth_init();
170
171 if (is_daemon) {
Josh Gaofdd946b2016-02-04 11:59:12 -0800172#if !defined(_WIN32)
Yabin Cuicf91dbe2016-02-08 22:36:42 -0800173 // Start a new session for the daemon. Do this here instead of after the fork so
174 // that a ctrl-c between the "starting server" and "done starting server" messages
175 // gets a chance to terminate the server.
Tao Wudc046e62016-09-20 17:58:55 -0700176 // setsid will fail with EPERM if it's already been a lead process of new session.
177 // Ignore such error.
178 if (setsid() == -1 && errno != EPERM) {
Elliott Hughese64126b2018-10-19 13:59:44 -0700179 PLOG(FATAL) << "setsid() failed";
Yabin Cuicf91dbe2016-02-08 22:36:42 -0800180 }
Josh Gaofdd946b2016-02-04 11:59:12 -0800181#endif
Daniel Colascione232c39c2019-11-13 17:51:19 -0800182 }
Josh Gaofdd946b2016-02-04 11:59:12 -0800183
Daniel Colascione232c39c2019-11-13 17:51:19 -0800184 // Wait for the USB scan to complete before notifying the parent that we're up.
185 // We need to perform this in a thread, because we would otherwise block the event loop.
186 std::thread notify_thread([ack_reply_fd]() {
187 adb_wait_for_device_initialization();
Elliott Hughes801066a2016-06-29 17:42:01 -0700188
Daniel Colascione232c39c2019-11-13 17:51:19 -0800189 if (ack_reply_fd >= 0) {
Josh Gao1e3bf732017-05-03 22:37:10 -0700190 // Any error output written to stderr now goes to adb.log. We could
191 // keep around a copy of the stderr fd and use that to write any errors
192 // encountered by the following code, but that is probably overkill.
Dan Albert53a37442015-05-08 16:13:53 -0700193#if defined(_WIN32)
Josh Gao1e3bf732017-05-03 22:37:10 -0700194 const HANDLE ack_reply_handle = cast_int_to_handle(ack_reply_fd);
195 const CHAR ack[] = "OK\n";
196 const DWORD bytes_to_write = arraysize(ack) - 1;
197 DWORD written = 0;
198 if (!WriteFile(ack_reply_handle, ack, bytes_to_write, &written, NULL)) {
Elliott Hughese64126b2018-10-19 13:59:44 -0700199 LOG(FATAL) << "cannot write ACK to handle " << ack_reply_handle
200 << android::base::SystemErrorCodeToString(GetLastError());
Josh Gao1e3bf732017-05-03 22:37:10 -0700201 }
202 if (written != bytes_to_write) {
Elliott Hughese64126b2018-10-19 13:59:44 -0700203 LOG(FATAL) << "cannot write " << bytes_to_write << " bytes of ACK: only wrote "
204 << written << " bytes";
Josh Gao1e3bf732017-05-03 22:37:10 -0700205 }
206 CloseHandle(ack_reply_handle);
Spencer Lowb28812f2015-08-08 15:07:07 -0700207#else
Josh Gao1e3bf732017-05-03 22:37:10 -0700208 // TODO(danalbert): Can't use SendOkay because we're sending "OK\n", not
209 // "OKAY".
210 if (!android::base::WriteStringToFd("OK\n", ack_reply_fd)) {
Elliott Hughese64126b2018-10-19 13:59:44 -0700211 PLOG(FATAL) << "error writing ACK to fd " << ack_reply_fd;
Josh Gao1e3bf732017-05-03 22:37:10 -0700212 }
213 unix_close(ack_reply_fd);
Siva Velusamya55dbd82015-08-07 10:10:29 -0700214#endif
Daniel Colascione232c39c2019-11-13 17:51:19 -0800215 }
216 // We don't accept() client connections until this point: this way, clients
217 // can't see wonky state early in startup even if they're connecting directly
218 // to the server instead of going through the adb program.
Shaju Mathew705fa1c2022-12-31 19:36:54 -0800219 fdevent_run_on_looper([] { enable_server_sockets(); });
Daniel Colascione232c39c2019-11-13 17:51:19 -0800220 });
221 notify_thread.detach();
Dan Albert53a37442015-05-08 16:13:53 -0700222
Josh Gao67209db2019-03-14 15:38:02 -0700223#if defined(__linux__)
224 // Write our location to .android/adb.$PORT, so that older clients can exec us.
225 std::string path;
226 if (!android::base::Readlink("/proc/self/exe", &path)) {
227 PLOG(ERROR) << "failed to readlink /proc/self/exe";
228 }
229
230 std::optional<std::string> server_executable_path = adb_get_server_executable_path();
231 if (server_executable_path) {
232 if (!android::base::WriteStringToFile(path, *server_executable_path)) {
233 PLOG(ERROR) << "failed to write server path to " << path;
234 }
235 }
236#endif
237
Yabin Cui815ad882015-09-02 17:44:28 -0700238 D("Event loop starting");
Dan Albert53a37442015-05-08 16:13:53 -0700239 fdevent_loop();
Dan Albert53a37442015-05-08 16:13:53 -0700240 return 0;
241}
242
Josh Gao67209db2019-03-14 15:38:02 -0700243int main(int argc, char* argv[], char* envp[]) {
244 __adb_argv = const_cast<const char**>(argv);
245 __adb_envp = const_cast<const char**>(envp);
Dan Albert08d552b2015-05-21 13:58:50 -0700246 adb_trace_init(argv);
Dan Albert53a37442015-05-08 16:13:53 -0700247 return adb_commandline(argc - 1, const_cast<const char**>(argv + 1));
248}