Home | History | Annotate | Download | only in adb
      1 /*
      2  * Copyright (C) 2007 The Android Open Source Project
      3  *
      4  * Licensed under the Apache License, Version 2.0 (the "License");
      5  * you may not use this file except in compliance with the License.
      6  * You may obtain a copy of the License at
      7  *
      8  *      http://www.apache.org/licenses/LICENSE-2.0
      9  *
     10  * Unless required by applicable law or agreed to in writing, software
     11  * distributed under the License is distributed on an "AS IS" BASIS,
     12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     13  * See the License for the specific language governing permissions and
     14  * limitations under the License.
     15  */
     16 
     17 #define TRACE_TAG TRANSPORT
     18 
     19 #include "sysdeps.h"
     20 #include "transport.h"
     21 
     22 #include <ctype.h>
     23 #include <errno.h>
     24 #include <stdio.h>
     25 #include <stdlib.h>
     26 #include <string.h>
     27 #include <unistd.h>
     28 
     29 #include <algorithm>
     30 #include <list>
     31 #include <mutex>
     32 
     33 #include <android-base/logging.h>
     34 #include <android-base/parsenetaddress.h>
     35 #include <android-base/stringprintf.h>
     36 #include <android-base/strings.h>
     37 
     38 #include "adb.h"
     39 #include "adb_auth.h"
     40 #include "adb_trace.h"
     41 #include "adb_utils.h"
     42 #include "diagnose_usb.h"
     43 
     44 static void transport_unref(atransport *t);
     45 
     46 static auto& transport_list = *new std::list<atransport*>();
     47 static auto& pending_list = *new std::list<atransport*>();
     48 
     49 static std::mutex& transport_lock = *new std::mutex();
     50 
     51 const char* const kFeatureShell2 = "shell_v2";
     52 const char* const kFeatureCmd = "cmd";
     53 const char* const kFeatureStat2 = "stat_v2";
     54 const char* const kFeatureLibusb = "libusb";
     55 
     56 static std::string dump_packet(const char* name, const char* func, apacket* p) {
     57     unsigned command = p->msg.command;
     58     int len = p->msg.data_length;
     59     char cmd[9];
     60     char arg0[12], arg1[12];
     61     int n;
     62 
     63     for (n = 0; n < 4; n++) {
     64         int b = (command >> (n * 8)) & 255;
     65         if (b < 32 || b >= 127) break;
     66         cmd[n] = (char)b;
     67     }
     68     if (n == 4) {
     69         cmd[4] = 0;
     70     } else {
     71         /* There is some non-ASCII name in the command, so dump
     72             * the hexadecimal value instead */
     73         snprintf(cmd, sizeof cmd, "%08x", command);
     74     }
     75 
     76     if (p->msg.arg0 < 256U)
     77         snprintf(arg0, sizeof arg0, "%d", p->msg.arg0);
     78     else
     79         snprintf(arg0, sizeof arg0, "0x%x", p->msg.arg0);
     80 
     81     if (p->msg.arg1 < 256U)
     82         snprintf(arg1, sizeof arg1, "%d", p->msg.arg1);
     83     else
     84         snprintf(arg1, sizeof arg1, "0x%x", p->msg.arg1);
     85 
     86     std::string result = android::base::StringPrintf("%s: %s: [%s] arg0=%s arg1=%s (len=%d) ", name,
     87                                                      func, cmd, arg0, arg1, len);
     88     result += dump_hex(p->data, len);
     89     return result;
     90 }
     91 
     92 static int read_packet(int fd, const char* name, apacket** ppacket) {
     93     ATRACE_NAME("read_packet");
     94     char buff[8];
     95     if (!name) {
     96         snprintf(buff, sizeof buff, "fd=%d", fd);
     97         name = buff;
     98     }
     99     char* p = reinterpret_cast<char*>(ppacket); /* really read a packet address */
    100     int len = sizeof(apacket*);
    101     while (len > 0) {
    102         int r = adb_read(fd, p, len);
    103         if (r > 0) {
    104             len -= r;
    105             p += r;
    106         } else {
    107             D("%s: read_packet (fd=%d), error ret=%d: %s", name, fd, r, strerror(errno));
    108             return -1;
    109         }
    110     }
    111 
    112     VLOG(TRANSPORT) << dump_packet(name, "from remote", *ppacket);
    113     return 0;
    114 }
    115 
    116 static int write_packet(int fd, const char* name, apacket** ppacket) {
    117     ATRACE_NAME("write_packet");
    118     char buff[8];
    119     if (!name) {
    120         snprintf(buff, sizeof buff, "fd=%d", fd);
    121         name = buff;
    122     }
    123     VLOG(TRANSPORT) << dump_packet(name, "to remote", *ppacket);
    124     char* p = reinterpret_cast<char*>(ppacket); /* we really write the packet address */
    125     int len = sizeof(apacket*);
    126     while (len > 0) {
    127         int r = adb_write(fd, p, len);
    128         if (r > 0) {
    129             len -= r;
    130             p += r;
    131         } else {
    132             D("%s: write_packet (fd=%d) error ret=%d: %s", name, fd, r, strerror(errno));
    133             return -1;
    134         }
    135     }
    136     return 0;
    137 }
    138 
    139 static void transport_socket_events(int fd, unsigned events, void* _t) {
    140     atransport* t = reinterpret_cast<atransport*>(_t);
    141     D("transport_socket_events(fd=%d, events=%04x,...)", fd, events);
    142     if (events & FDE_READ) {
    143         apacket* p = 0;
    144         if (read_packet(fd, t->serial, &p)) {
    145             D("%s: failed to read packet from transport socket on fd %d", t->serial, fd);
    146         } else {
    147             handle_packet(p, (atransport*)_t);
    148         }
    149     }
    150 }
    151 
    152 void send_packet(apacket* p, atransport* t) {
    153     p->msg.magic = p->msg.command ^ 0xffffffff;
    154     p->msg.data_check = calculate_apacket_checksum(p);
    155 
    156     print_packet("send", p);
    157 
    158     if (t == NULL) {
    159         fatal("Transport is null");
    160     }
    161 
    162     if (write_packet(t->transport_socket, t->serial, &p)) {
    163         fatal_errno("cannot enqueue packet on transport socket");
    164     }
    165 }
    166 
    167 // The transport is opened by transport_register_func before
    168 // the read_transport and write_transport threads are started.
    169 //
    170 // The read_transport thread issues a SYNC(1, token) message to let
    171 // the write_transport thread know to start things up.  In the event
    172 // of transport IO failure, the read_transport thread will post a
    173 // SYNC(0,0) message to ensure shutdown.
    174 //
    175 // The transport will not actually be closed until both threads exit, but the threads
    176 // will kick the transport on their way out to disconnect the underlying device.
    177 //
    178 // read_transport thread reads data from a transport (representing a usb/tcp connection),
    179 // and makes the main thread call handle_packet().
    180 static void read_transport_thread(void* _t) {
    181     atransport* t = reinterpret_cast<atransport*>(_t);
    182     apacket* p;
    183 
    184     adb_thread_setname(
    185         android::base::StringPrintf("<-%s", (t->serial != nullptr ? t->serial : "transport")));
    186     D("%s: starting read_transport thread on fd %d, SYNC online (%d)", t->serial, t->fd,
    187       t->sync_token + 1);
    188     p = get_apacket();
    189     p->msg.command = A_SYNC;
    190     p->msg.arg0 = 1;
    191     p->msg.arg1 = ++(t->sync_token);
    192     p->msg.magic = A_SYNC ^ 0xffffffff;
    193     if (write_packet(t->fd, t->serial, &p)) {
    194         put_apacket(p);
    195         D("%s: failed to write SYNC packet", t->serial);
    196         goto oops;
    197     }
    198 
    199     D("%s: data pump started", t->serial);
    200     for (;;) {
    201         ATRACE_NAME("read_transport loop");
    202         p = get_apacket();
    203 
    204         {
    205             ATRACE_NAME("read_transport read_remote");
    206             if (t->read_from_remote(p, t) != 0) {
    207                 D("%s: remote read failed for transport", t->serial);
    208                 put_apacket(p);
    209                 break;
    210             }
    211         }
    212 
    213         D("%s: received remote packet, sending to transport", t->serial);
    214         if (write_packet(t->fd, t->serial, &p)) {
    215             put_apacket(p);
    216             D("%s: failed to write apacket to transport", t->serial);
    217             goto oops;
    218         }
    219     }
    220 
    221     D("%s: SYNC offline for transport", t->serial);
    222     p = get_apacket();
    223     p->msg.command = A_SYNC;
    224     p->msg.arg0 = 0;
    225     p->msg.arg1 = 0;
    226     p->msg.magic = A_SYNC ^ 0xffffffff;
    227     if (write_packet(t->fd, t->serial, &p)) {
    228         put_apacket(p);
    229         D("%s: failed to write SYNC apacket to transport", t->serial);
    230     }
    231 
    232 oops:
    233     D("%s: read_transport thread is exiting", t->serial);
    234     kick_transport(t);
    235     transport_unref(t);
    236 }
    237 
    238 // write_transport thread gets packets sent by the main thread (through send_packet()),
    239 // and writes to a transport (representing a usb/tcp connection).
    240 static void write_transport_thread(void* _t) {
    241     atransport* t = reinterpret_cast<atransport*>(_t);
    242     apacket* p;
    243     int active = 0;
    244 
    245     adb_thread_setname(
    246         android::base::StringPrintf("->%s", (t->serial != nullptr ? t->serial : "transport")));
    247     D("%s: starting write_transport thread, reading from fd %d", t->serial, t->fd);
    248 
    249     for (;;) {
    250         ATRACE_NAME("write_transport loop");
    251         if (read_packet(t->fd, t->serial, &p)) {
    252             D("%s: failed to read apacket from transport on fd %d", t->serial, t->fd);
    253             break;
    254         }
    255 
    256         if (p->msg.command == A_SYNC) {
    257             if (p->msg.arg0 == 0) {
    258                 D("%s: transport SYNC offline", t->serial);
    259                 put_apacket(p);
    260                 break;
    261             } else {
    262                 if (p->msg.arg1 == t->sync_token) {
    263                     D("%s: transport SYNC online", t->serial);
    264                     active = 1;
    265                 } else {
    266                     D("%s: transport ignoring SYNC %d != %d", t->serial, p->msg.arg1, t->sync_token);
    267                 }
    268             }
    269         } else {
    270             if (active) {
    271                 D("%s: transport got packet, sending to remote", t->serial);
    272                 ATRACE_NAME("write_transport write_remote");
    273                 t->write_to_remote(p, t);
    274             } else {
    275                 D("%s: transport ignoring packet while offline", t->serial);
    276             }
    277         }
    278 
    279         put_apacket(p);
    280     }
    281 
    282     D("%s: write_transport thread is exiting, fd %d", t->serial, t->fd);
    283     kick_transport(t);
    284     transport_unref(t);
    285 }
    286 
    287 void kick_transport(atransport* t) {
    288     std::lock_guard<std::mutex> lock(transport_lock);
    289     // As kick_transport() can be called from threads without guarantee that t is valid,
    290     // check if the transport is in transport_list first.
    291     if (std::find(transport_list.begin(), transport_list.end(), t) != transport_list.end()) {
    292         t->Kick();
    293     }
    294 }
    295 
    296 static int transport_registration_send = -1;
    297 static int transport_registration_recv = -1;
    298 static fdevent transport_registration_fde;
    299 
    300 #if ADB_HOST
    301 
    302 /* this adds support required by the 'track-devices' service.
    303  * this is used to send the content of "list_transport" to any
    304  * number of client connections that want it through a single
    305  * live TCP connection
    306  */
    307 struct device_tracker {
    308     asocket socket;
    309     int update_needed;
    310     device_tracker* next;
    311 };
    312 
    313 /* linked list of all device trackers */
    314 static device_tracker* device_tracker_list;
    315 
    316 static void device_tracker_remove(device_tracker* tracker) {
    317     device_tracker** pnode = &device_tracker_list;
    318     device_tracker* node = *pnode;
    319 
    320     std::lock_guard<std::mutex> lock(transport_lock);
    321     while (node) {
    322         if (node == tracker) {
    323             *pnode = node->next;
    324             break;
    325         }
    326         pnode = &node->next;
    327         node = *pnode;
    328     }
    329 }
    330 
    331 static void device_tracker_close(asocket* socket) {
    332     device_tracker* tracker = (device_tracker*)socket;
    333     asocket* peer = socket->peer;
    334 
    335     D("device tracker %p removed", tracker);
    336     if (peer) {
    337         peer->peer = NULL;
    338         peer->close(peer);
    339     }
    340     device_tracker_remove(tracker);
    341     free(tracker);
    342 }
    343 
    344 static int device_tracker_enqueue(asocket* socket, apacket* p) {
    345     /* you can't read from a device tracker, close immediately */
    346     put_apacket(p);
    347     device_tracker_close(socket);
    348     return -1;
    349 }
    350 
    351 static int device_tracker_send(device_tracker* tracker, const std::string& string) {
    352     apacket* p = get_apacket();
    353     asocket* peer = tracker->socket.peer;
    354 
    355     snprintf(reinterpret_cast<char*>(p->data), 5, "%04x", static_cast<int>(string.size()));
    356     memcpy(&p->data[4], string.data(), string.size());
    357     p->len = 4 + string.size();
    358     return peer->enqueue(peer, p);
    359 }
    360 
    361 static void device_tracker_ready(asocket* socket) {
    362     device_tracker* tracker = reinterpret_cast<device_tracker*>(socket);
    363 
    364     // We want to send the device list when the tracker connects
    365     // for the first time, even if no update occurred.
    366     if (tracker->update_needed > 0) {
    367         tracker->update_needed = 0;
    368 
    369         std::string transports = list_transports(false);
    370         device_tracker_send(tracker, transports);
    371     }
    372 }
    373 
    374 asocket* create_device_tracker(void) {
    375     device_tracker* tracker = reinterpret_cast<device_tracker*>(calloc(1, sizeof(*tracker)));
    376     if (tracker == nullptr) fatal("cannot allocate device tracker");
    377 
    378     D("device tracker %p created", tracker);
    379 
    380     tracker->socket.enqueue = device_tracker_enqueue;
    381     tracker->socket.ready = device_tracker_ready;
    382     tracker->socket.close = device_tracker_close;
    383     tracker->update_needed = 1;
    384 
    385     tracker->next = device_tracker_list;
    386     device_tracker_list = tracker;
    387 
    388     return &tracker->socket;
    389 }
    390 
    391 // Call this function each time the transport list has changed.
    392 void update_transports() {
    393     std::string transports = list_transports(false);
    394 
    395     device_tracker* tracker = device_tracker_list;
    396     while (tracker != nullptr) {
    397         device_tracker* next = tracker->next;
    398         // This may destroy the tracker if the connection is closed.
    399         device_tracker_send(tracker, transports);
    400         tracker = next;
    401     }
    402 }
    403 
    404 #else
    405 
    406 void update_transports() {
    407     // Nothing to do on the device side.
    408 }
    409 
    410 #endif  // ADB_HOST
    411 
    412 struct tmsg {
    413     atransport* transport;
    414     int action;
    415 };
    416 
    417 static int transport_read_action(int fd, struct tmsg* m) {
    418     char* p = (char*)m;
    419     int len = sizeof(*m);
    420     int r;
    421 
    422     while (len > 0) {
    423         r = adb_read(fd, p, len);
    424         if (r > 0) {
    425             len -= r;
    426             p += r;
    427         } else {
    428             D("transport_read_action: on fd %d: %s", fd, strerror(errno));
    429             return -1;
    430         }
    431     }
    432     return 0;
    433 }
    434 
    435 static int transport_write_action(int fd, struct tmsg* m) {
    436     char* p = (char*)m;
    437     int len = sizeof(*m);
    438     int r;
    439 
    440     while (len > 0) {
    441         r = adb_write(fd, p, len);
    442         if (r > 0) {
    443             len -= r;
    444             p += r;
    445         } else {
    446             D("transport_write_action: on fd %d: %s", fd, strerror(errno));
    447             return -1;
    448         }
    449     }
    450     return 0;
    451 }
    452 
    453 static void transport_registration_func(int _fd, unsigned ev, void* data) {
    454     tmsg m;
    455     int s[2];
    456     atransport* t;
    457 
    458     if (!(ev & FDE_READ)) {
    459         return;
    460     }
    461 
    462     if (transport_read_action(_fd, &m)) {
    463         fatal_errno("cannot read transport registration socket");
    464     }
    465 
    466     t = m.transport;
    467 
    468     if (m.action == 0) {
    469         D("transport: %s removing and free'ing %d", t->serial, t->transport_socket);
    470 
    471         /* IMPORTANT: the remove closes one half of the
    472         ** socket pair.  The close closes the other half.
    473         */
    474         fdevent_remove(&(t->transport_fde));
    475         adb_close(t->fd);
    476 
    477         {
    478             std::lock_guard<std::mutex> lock(transport_lock);
    479             transport_list.remove(t);
    480         }
    481 
    482         if (t->product) free(t->product);
    483         if (t->serial) free(t->serial);
    484         if (t->model) free(t->model);
    485         if (t->device) free(t->device);
    486         if (t->devpath) free(t->devpath);
    487 
    488         delete t;
    489 
    490         update_transports();
    491         return;
    492     }
    493 
    494     /* don't create transport threads for inaccessible devices */
    495     if (t->connection_state != kCsNoPerm) {
    496         /* initial references are the two threads */
    497         t->ref_count = 2;
    498 
    499         if (adb_socketpair(s)) {
    500             fatal_errno("cannot open transport socketpair");
    501         }
    502 
    503         D("transport: %s socketpair: (%d,%d) starting", t->serial, s[0], s[1]);
    504 
    505         t->transport_socket = s[0];
    506         t->fd = s[1];
    507 
    508         fdevent_install(&(t->transport_fde), t->transport_socket, transport_socket_events, t);
    509 
    510         fdevent_set(&(t->transport_fde), FDE_READ);
    511 
    512         if (!adb_thread_create(write_transport_thread, t)) {
    513             fatal_errno("cannot create write_transport thread");
    514         }
    515 
    516         if (!adb_thread_create(read_transport_thread, t)) {
    517             fatal_errno("cannot create read_transport thread");
    518         }
    519     }
    520 
    521     {
    522         std::lock_guard<std::mutex> lock(transport_lock);
    523         pending_list.remove(t);
    524         transport_list.push_front(t);
    525     }
    526 
    527     update_transports();
    528 }
    529 
    530 void init_transport_registration(void) {
    531     int s[2];
    532 
    533     if (adb_socketpair(s)) {
    534         fatal_errno("cannot open transport registration socketpair");
    535     }
    536     D("socketpair: (%d,%d)", s[0], s[1]);
    537 
    538     transport_registration_send = s[0];
    539     transport_registration_recv = s[1];
    540 
    541     fdevent_install(&transport_registration_fde, transport_registration_recv,
    542                     transport_registration_func, 0);
    543 
    544     fdevent_set(&transport_registration_fde, FDE_READ);
    545 }
    546 
    547 /* the fdevent select pump is single threaded */
    548 static void register_transport(atransport* transport) {
    549     tmsg m;
    550     m.transport = transport;
    551     m.action = 1;
    552     D("transport: %s registered", transport->serial);
    553     if (transport_write_action(transport_registration_send, &m)) {
    554         fatal_errno("cannot write transport registration socket\n");
    555     }
    556 }
    557 
    558 static void remove_transport(atransport* transport) {
    559     tmsg m;
    560     m.transport = transport;
    561     m.action = 0;
    562     D("transport: %s removed", transport->serial);
    563     if (transport_write_action(transport_registration_send, &m)) {
    564         fatal_errno("cannot write transport registration socket\n");
    565     }
    566 }
    567 
    568 static void transport_unref(atransport* t) {
    569     CHECK(t != nullptr);
    570 
    571     std::lock_guard<std::mutex> lock(transport_lock);
    572     CHECK_GT(t->ref_count, 0u);
    573     t->ref_count--;
    574     if (t->ref_count == 0) {
    575         D("transport: %s unref (kicking and closing)", t->serial);
    576         t->close(t);
    577         remove_transport(t);
    578     } else {
    579         D("transport: %s unref (count=%zu)", t->serial, t->ref_count);
    580     }
    581 }
    582 
    583 static int qual_match(const char* to_test, const char* prefix, const char* qual,
    584                       bool sanitize_qual) {
    585     if (!to_test || !*to_test) /* Return true if both the qual and to_test are null strings. */
    586         return !qual || !*qual;
    587 
    588     if (!qual) return 0;
    589 
    590     if (prefix) {
    591         while (*prefix) {
    592             if (*prefix++ != *to_test++) return 0;
    593         }
    594     }
    595 
    596     while (*qual) {
    597         char ch = *qual++;
    598         if (sanitize_qual && !isalnum(ch)) ch = '_';
    599         if (ch != *to_test++) return 0;
    600     }
    601 
    602     /* Everything matched so far.  Return true if *to_test is a NUL. */
    603     return !*to_test;
    604 }
    605 
    606 atransport* acquire_one_transport(TransportType type, const char* serial, bool* is_ambiguous,
    607                                   std::string* error_out) {
    608     atransport* result = nullptr;
    609 
    610     if (serial) {
    611         *error_out = android::base::StringPrintf("device '%s' not found", serial);
    612     } else if (type == kTransportLocal) {
    613         *error_out = "no emulators found";
    614     } else if (type == kTransportAny) {
    615         *error_out = "no devices/emulators found";
    616     } else {
    617         *error_out = "no devices found";
    618     }
    619 
    620     std::unique_lock<std::mutex> lock(transport_lock);
    621     for (const auto& t : transport_list) {
    622         if (t->connection_state == kCsNoPerm) {
    623 #if ADB_HOST
    624             *error_out = UsbNoPermissionsLongHelpText();
    625 #endif
    626             continue;
    627         }
    628 
    629         // Check for matching serial number.
    630         if (serial) {
    631             if (t->MatchesTarget(serial)) {
    632                 if (result) {
    633                     *error_out = "more than one device";
    634                     if (is_ambiguous) *is_ambiguous = true;
    635                     result = nullptr;
    636                     break;
    637                 }
    638                 result = t;
    639             }
    640         } else {
    641             if (type == kTransportUsb && t->type == kTransportUsb) {
    642                 if (result) {
    643                     *error_out = "more than one device";
    644                     if (is_ambiguous) *is_ambiguous = true;
    645                     result = nullptr;
    646                     break;
    647                 }
    648                 result = t;
    649             } else if (type == kTransportLocal && t->type == kTransportLocal) {
    650                 if (result) {
    651                     *error_out = "more than one emulator";
    652                     if (is_ambiguous) *is_ambiguous = true;
    653                     result = nullptr;
    654                     break;
    655                 }
    656                 result = t;
    657             } else if (type == kTransportAny) {
    658                 if (result) {
    659                     *error_out = "more than one device/emulator";
    660                     if (is_ambiguous) *is_ambiguous = true;
    661                     result = nullptr;
    662                     break;
    663                 }
    664                 result = t;
    665             }
    666         }
    667     }
    668     lock.unlock();
    669 
    670     // Don't return unauthorized devices; the caller can't do anything with them.
    671     if (result && result->connection_state == kCsUnauthorized) {
    672         *error_out = "device unauthorized.\n";
    673         char* ADB_VENDOR_KEYS = getenv("ADB_VENDOR_KEYS");
    674         *error_out += "This adb server's $ADB_VENDOR_KEYS is ";
    675         *error_out += ADB_VENDOR_KEYS ? ADB_VENDOR_KEYS : "not set";
    676         *error_out += "\n";
    677         *error_out += "Try 'adb kill-server' if that seems wrong.\n";
    678         *error_out += "Otherwise check for a confirmation dialog on your device.";
    679         result = nullptr;
    680     }
    681 
    682     // Don't return offline devices; the caller can't do anything with them.
    683     if (result && result->connection_state == kCsOffline) {
    684         *error_out = "device offline";
    685         result = nullptr;
    686     }
    687 
    688     if (result) {
    689         *error_out = "success";
    690     }
    691 
    692     return result;
    693 }
    694 
    695 void atransport::Kick() {
    696     if (!kicked_) {
    697         kicked_ = true;
    698         CHECK(kick_func_ != nullptr);
    699         kick_func_(this);
    700     }
    701 }
    702 
    703 const std::string atransport::connection_state_name() const {
    704     switch (connection_state) {
    705         case kCsOffline:
    706             return "offline";
    707         case kCsBootloader:
    708             return "bootloader";
    709         case kCsDevice:
    710             return "device";
    711         case kCsHost:
    712             return "host";
    713         case kCsRecovery:
    714             return "recovery";
    715         case kCsNoPerm:
    716             return UsbNoPermissionsShortHelpText();
    717         case kCsSideload:
    718             return "sideload";
    719         case kCsUnauthorized:
    720             return "unauthorized";
    721         default:
    722             return "unknown";
    723     }
    724 }
    725 
    726 void atransport::update_version(int version, size_t payload) {
    727     protocol_version = std::min(version, A_VERSION);
    728     max_payload = std::min(payload, MAX_PAYLOAD);
    729 }
    730 
    731 int atransport::get_protocol_version() const {
    732     return protocol_version;
    733 }
    734 
    735 size_t atransport::get_max_payload() const {
    736     return max_payload;
    737 }
    738 
    739 namespace {
    740 
    741 constexpr char kFeatureStringDelimiter = ',';
    742 
    743 }  // namespace
    744 
    745 const FeatureSet& supported_features() {
    746     // Local static allocation to avoid global non-POD variables.
    747     static const FeatureSet* features = new FeatureSet{
    748         kFeatureShell2, kFeatureCmd, kFeatureStat2,
    749         // Increment ADB_SERVER_VERSION whenever the feature list changes to
    750         // make sure that the adb client and server features stay in sync
    751         // (http://b/24370690).
    752     };
    753 
    754     return *features;
    755 }
    756 
    757 std::string FeatureSetToString(const FeatureSet& features) {
    758     return android::base::Join(features, kFeatureStringDelimiter);
    759 }
    760 
    761 FeatureSet StringToFeatureSet(const std::string& features_string) {
    762     if (features_string.empty()) {
    763         return FeatureSet();
    764     }
    765 
    766     auto names = android::base::Split(features_string, {kFeatureStringDelimiter});
    767     return FeatureSet(names.begin(), names.end());
    768 }
    769 
    770 bool CanUseFeature(const FeatureSet& feature_set, const std::string& feature) {
    771     return feature_set.count(feature) > 0 && supported_features().count(feature) > 0;
    772 }
    773 
    774 bool atransport::has_feature(const std::string& feature) const {
    775     return features_.count(feature) > 0;
    776 }
    777 
    778 void atransport::SetFeatures(const std::string& features_string) {
    779     features_ = StringToFeatureSet(features_string);
    780 }
    781 
    782 void atransport::AddDisconnect(adisconnect* disconnect) {
    783     disconnects_.push_back(disconnect);
    784 }
    785 
    786 void atransport::RemoveDisconnect(adisconnect* disconnect) {
    787     disconnects_.remove(disconnect);
    788 }
    789 
    790 void atransport::RunDisconnects() {
    791     for (const auto& disconnect : disconnects_) {
    792         disconnect->func(disconnect->opaque, this);
    793     }
    794     disconnects_.clear();
    795 }
    796 
    797 bool atransport::MatchesTarget(const std::string& target) const {
    798     if (serial) {
    799         if (target == serial) {
    800             return true;
    801         } else if (type == kTransportLocal) {
    802             // Local transports can match [tcp:|udp:]<hostname>[:port].
    803             const char* local_target_ptr = target.c_str();
    804 
    805             // For fastboot compatibility, ignore protocol prefixes.
    806             if (android::base::StartsWith(target, "tcp:") ||
    807                 android::base::StartsWith(target, "udp:")) {
    808                 local_target_ptr += 4;
    809             }
    810 
    811             // Parse our |serial| and the given |target| to check if the hostnames and ports match.
    812             std::string serial_host, error;
    813             int serial_port = -1;
    814             if (android::base::ParseNetAddress(serial, &serial_host, &serial_port, nullptr, &error)) {
    815                 // |target| may omit the port to default to ours.
    816                 std::string target_host;
    817                 int target_port = serial_port;
    818                 if (android::base::ParseNetAddress(local_target_ptr, &target_host, &target_port,
    819                                                    nullptr, &error) &&
    820                     serial_host == target_host && serial_port == target_port) {
    821                     return true;
    822                 }
    823             }
    824         }
    825     }
    826 
    827     return (devpath && target == devpath) ||
    828            qual_match(target.c_str(), "product:", product, false) ||
    829            qual_match(target.c_str(), "model:", model, true) ||
    830            qual_match(target.c_str(), "device:", device, false);
    831 }
    832 
    833 #if ADB_HOST
    834 
    835 static void append_transport_info(std::string* result, const char* key, const char* value,
    836                                   bool sanitize) {
    837     if (value == nullptr || *value == '\0') {
    838         return;
    839     }
    840 
    841     *result += ' ';
    842     *result += key;
    843 
    844     for (const char* p = value; *p; ++p) {
    845         result->push_back((!sanitize || isalnum(*p)) ? *p : '_');
    846     }
    847 }
    848 
    849 static void append_transport(const atransport* t, std::string* result, bool long_listing) {
    850     const char* serial = t->serial;
    851     if (!serial || !serial[0]) {
    852         serial = "(no serial number)";
    853     }
    854 
    855     if (!long_listing) {
    856         *result += serial;
    857         *result += '\t';
    858         *result += t->connection_state_name();
    859     } else {
    860         android::base::StringAppendF(result, "%-22s %s", serial, t->connection_state_name().c_str());
    861 
    862         append_transport_info(result, "", t->devpath, false);
    863         append_transport_info(result, "product:", t->product, false);
    864         append_transport_info(result, "model:", t->model, true);
    865         append_transport_info(result, "device:", t->device, false);
    866     }
    867     *result += '\n';
    868 }
    869 
    870 std::string list_transports(bool long_listing) {
    871     std::string result;
    872 
    873     std::lock_guard<std::mutex> lock(transport_lock);
    874     for (const auto& t : transport_list) {
    875         append_transport(t, &result, long_listing);
    876     }
    877     return result;
    878 }
    879 
    880 void close_usb_devices(std::function<bool(const atransport*)> predicate) {
    881     std::lock_guard<std::mutex> lock(transport_lock);
    882     for (auto& t : transport_list) {
    883         if (predicate(t)) {
    884             t->Kick();
    885         }
    886     }
    887 }
    888 
    889 /* hack for osx */
    890 void close_usb_devices() {
    891     close_usb_devices([](const atransport*) { return true; });
    892 }
    893 #endif  // ADB_HOST
    894 
    895 int register_socket_transport(int s, const char* serial, int port, int local) {
    896     atransport* t = new atransport();
    897 
    898     if (!serial) {
    899         char buf[32];
    900         snprintf(buf, sizeof(buf), "T-%p", t);
    901         serial = buf;
    902     }
    903 
    904     D("transport: %s init'ing for socket %d, on port %d", serial, s, port);
    905     if (init_socket_transport(t, s, port, local) < 0) {
    906         delete t;
    907         return -1;
    908     }
    909 
    910     std::unique_lock<std::mutex> lock(transport_lock);
    911     for (const auto& transport : pending_list) {
    912         if (transport->serial && strcmp(serial, transport->serial) == 0) {
    913             VLOG(TRANSPORT) << "socket transport " << transport->serial
    914                             << " is already in pending_list and fails to register";
    915             delete t;
    916             return -1;
    917         }
    918     }
    919 
    920     for (const auto& transport : transport_list) {
    921         if (transport->serial && strcmp(serial, transport->serial) == 0) {
    922             VLOG(TRANSPORT) << "socket transport " << transport->serial
    923                             << " is already in transport_list and fails to register";
    924             delete t;
    925             return -1;
    926         }
    927     }
    928 
    929     pending_list.push_front(t);
    930     t->serial = strdup(serial);
    931 
    932     lock.unlock();
    933 
    934     register_transport(t);
    935     return 0;
    936 }
    937 
    938 #if ADB_HOST
    939 atransport* find_transport(const char* serial) {
    940     atransport* result = nullptr;
    941 
    942     std::lock_guard<std::mutex> lock(transport_lock);
    943     for (auto& t : transport_list) {
    944         if (t->serial && strcmp(serial, t->serial) == 0) {
    945             result = t;
    946             break;
    947         }
    948     }
    949 
    950     return result;
    951 }
    952 
    953 void kick_all_tcp_devices() {
    954     std::lock_guard<std::mutex> lock(transport_lock);
    955     for (auto& t : transport_list) {
    956         if (t->IsTcpDevice()) {
    957             // Kicking breaks the read_transport thread of this transport out of any read, then
    958             // the read_transport thread will notify the main thread to make this transport
    959             // offline. Then the main thread will notify the write_transport thread to exit.
    960             // Finally, this transport will be closed and freed in the main thread.
    961             t->Kick();
    962         }
    963     }
    964 }
    965 
    966 #endif
    967 
    968 void register_usb_transport(usb_handle* usb, const char* serial, const char* devpath,
    969                             unsigned writeable) {
    970     atransport* t = new atransport();
    971 
    972     D("transport: %p init'ing for usb_handle %p (sn='%s')", t, usb, serial ? serial : "");
    973     init_usb_transport(t, usb, (writeable ? kCsOffline : kCsNoPerm));
    974     if (serial) {
    975         t->serial = strdup(serial);
    976     }
    977 
    978     if (devpath) {
    979         t->devpath = strdup(devpath);
    980     }
    981 
    982     {
    983         std::lock_guard<std::mutex> lock(transport_lock);
    984         pending_list.push_front(t);
    985     }
    986 
    987     register_transport(t);
    988 }
    989 
    990 // This should only be used for transports with connection_state == kCsNoPerm.
    991 void unregister_usb_transport(usb_handle* usb) {
    992     std::lock_guard<std::mutex> lock(transport_lock);
    993     transport_list.remove_if(
    994         [usb](atransport* t) { return t->usb == usb && t->connection_state == kCsNoPerm; });
    995 }
    996 
    997 int check_header(apacket* p, atransport* t) {
    998     if (p->msg.magic != (p->msg.command ^ 0xffffffff)) {
    999         VLOG(RWX) << "check_header(): invalid magic";
   1000         return -1;
   1001     }
   1002 
   1003     if (p->msg.data_length > t->get_max_payload()) {
   1004         VLOG(RWX) << "check_header(): " << p->msg.data_length
   1005                   << " atransport::max_payload = " << t->get_max_payload();
   1006         return -1;
   1007     }
   1008 
   1009     return 0;
   1010 }
   1011 
   1012 int check_data(apacket* p) {
   1013     if (calculate_apacket_checksum(p) != p->msg.data_check) {
   1014         return -1;
   1015     }
   1016     return 0;
   1017 }
   1018 
   1019 #if ADB_HOST
   1020 std::shared_ptr<RSA> atransport::NextKey() {
   1021     if (keys_.empty()) keys_ = adb_auth_get_private_keys();
   1022 
   1023     std::shared_ptr<RSA> result = keys_[0];
   1024     keys_.pop_front();
   1025     return result;
   1026 }
   1027 #endif
   1028