2009-03-04 04:32:55 +01:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2007 The Android Open Source Project
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2015-09-23 00:52:57 +02:00
|
|
|
#define TRACE_TAG ADB
|
2015-03-19 23:21:08 +01:00
|
|
|
|
|
|
|
#include "sysdeps.h"
|
|
|
|
|
2015-02-25 00:51:19 +01:00
|
|
|
#include <assert.h>
|
|
|
|
#include <ctype.h>
|
2009-03-04 04:32:55 +01:00
|
|
|
#include <errno.h>
|
2015-04-17 23:07:52 +02:00
|
|
|
#include <inttypes.h>
|
2009-03-04 04:32:55 +01:00
|
|
|
#include <limits.h>
|
|
|
|
#include <stdarg.h>
|
2015-02-25 00:51:19 +01:00
|
|
|
#include <stdint.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
2009-03-04 04:32:55 +01:00
|
|
|
#include <sys/stat.h>
|
2015-02-25 00:51:19 +01:00
|
|
|
#include <sys/types.h>
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2015-09-09 02:17:02 +02:00
|
|
|
#include <memory>
|
2015-04-17 19:59:34 +02:00
|
|
|
#include <string>
|
2016-11-15 21:37:32 +01:00
|
|
|
#include <thread>
|
2015-10-31 00:57:19 +01:00
|
|
|
#include <vector>
|
2015-04-17 19:59:34 +02:00
|
|
|
|
2016-05-27 07:43:19 +02:00
|
|
|
#include <android-base/file.h>
|
2015-12-05 07:00:26 +01:00
|
|
|
#include <android-base/logging.h>
|
2016-09-16 22:01:24 +02:00
|
|
|
#include <android-base/parseint.h>
|
2015-12-05 07:00:26 +01:00
|
|
|
#include <android-base/stringprintf.h>
|
|
|
|
#include <android-base/strings.h>
|
2015-04-17 19:59:34 +02:00
|
|
|
|
2014-11-17 23:48:25 +01:00
|
|
|
#if !defined(_WIN32)
|
2015-10-24 00:03:31 +02:00
|
|
|
#include <signal.h>
|
2015-11-04 22:07:47 +01:00
|
|
|
#include <sys/ioctl.h>
|
2009-03-04 04:32:55 +01:00
|
|
|
#include <termios.h>
|
2015-02-25 00:51:19 +01:00
|
|
|
#include <unistd.h>
|
2009-03-04 04:32:55 +01:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#include "adb.h"
|
2014-11-14 00:17:29 +01:00
|
|
|
#include "adb_auth.h"
|
2015-02-25 06:26:58 +01:00
|
|
|
#include "adb_client.h"
|
2018-01-29 17:30:36 +01:00
|
|
|
#include "adb_install.h"
|
2015-02-25 06:26:58 +01:00
|
|
|
#include "adb_io.h"
|
2016-08-31 00:39:25 +02:00
|
|
|
#include "adb_unique_fd.h"
|
2015-04-17 22:57:15 +02:00
|
|
|
#include "adb_utils.h"
|
2016-07-20 02:07:22 +02:00
|
|
|
#include "bugreport.h"
|
2018-07-26 00:55:25 +02:00
|
|
|
#include "client/file_sync_client.h"
|
2016-07-20 02:07:22 +02:00
|
|
|
#include "commandline.h"
|
2018-01-29 17:30:36 +01:00
|
|
|
#include "fastdeploy.h"
|
2015-09-30 22:35:42 +02:00
|
|
|
#include "services.h"
|
2018-07-26 01:07:26 +02:00
|
|
|
#include "shell_protocol.h"
|
2016-11-16 03:55:47 +01:00
|
|
|
#include "sysdeps/chrono.h"
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2012-11-14 19:16:17 +01:00
|
|
|
extern int gListenAll;
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2016-07-26 21:14:39 +02:00
|
|
|
DefaultStandardStreamsCallback DEFAULT_STANDARD_STREAMS_CALLBACK(nullptr, nullptr);
|
|
|
|
|
2018-04-03 19:54:39 +02:00
|
|
|
static std::string product_file(const std::string& file) {
|
2017-05-01 20:04:31 +02:00
|
|
|
const char* ANDROID_PRODUCT_OUT = getenv("ANDROID_PRODUCT_OUT");
|
|
|
|
if (ANDROID_PRODUCT_OUT == nullptr) {
|
2018-10-23 02:02:51 +02:00
|
|
|
error_exit("product directory not specified; set $ANDROID_PRODUCT_OUT");
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
2018-04-03 19:54:39 +02:00
|
|
|
return std::string{ANDROID_PRODUCT_OUT} + OS_PATH_SEPARATOR_STR + file;
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
|
2015-04-17 22:57:15 +02:00
|
|
|
static void help() {
|
2016-09-29 00:25:47 +02:00
|
|
|
fprintf(stdout, "%s\n", adb_version().c_str());
|
2016-07-30 02:57:00 +02:00
|
|
|
// clang-format off
|
2016-09-29 00:25:47 +02:00
|
|
|
fprintf(stdout,
|
|
|
|
"global options:\n"
|
|
|
|
" -a listen on all network interfaces, not just localhost\n"
|
|
|
|
" -d use USB device (error if multiple devices connected)\n"
|
2017-01-14 01:58:25 +01:00
|
|
|
" -e use TCP/IP device (error if multiple TCP/IP devices available)\n"
|
2017-05-01 20:04:31 +02:00
|
|
|
" -s SERIAL use device with given serial (overrides $ANDROID_SERIAL)\n"
|
2017-08-17 01:57:01 +02:00
|
|
|
" -t ID use device with given transport id\n"
|
2016-09-29 00:25:47 +02:00
|
|
|
" -H name of adb server host [default=localhost]\n"
|
|
|
|
" -P port of adb server [default=5037]\n"
|
|
|
|
" -L SOCKET listen on given socket for adb server [default=tcp:localhost:5037]\n"
|
2009-03-04 04:32:55 +01:00
|
|
|
"\n"
|
2016-09-29 00:25:47 +02:00
|
|
|
"general commands:\n"
|
|
|
|
" devices [-l] list connected devices (-l for long output)\n"
|
|
|
|
" help show this help message\n"
|
|
|
|
" version show version num\n"
|
2011-04-21 21:53:28 +02:00
|
|
|
"\n"
|
2016-09-29 00:25:47 +02:00
|
|
|
"networking:\n"
|
|
|
|
" connect HOST[:PORT] connect to a device via TCP/IP [default port=5555]\n"
|
|
|
|
" disconnect [HOST[:PORT]]\n"
|
|
|
|
" disconnect from given TCP/IP device [default port=5555], or all\n"
|
|
|
|
" forward --list list all forward socket connections\n"
|
|
|
|
" forward [--no-rebind] LOCAL REMOTE\n"
|
|
|
|
" forward socket connection using:\n"
|
|
|
|
" tcp:<port> (<local> may be \"tcp:0\" to pick any open port)\n"
|
|
|
|
" localabstract:<unix domain socket name>\n"
|
|
|
|
" localreserved:<unix domain socket name>\n"
|
|
|
|
" localfilesystem:<unix domain socket name>\n"
|
|
|
|
" dev:<character device name>\n"
|
|
|
|
" jdwp:<process pid> (remote only)\n"
|
|
|
|
" forward --remove LOCAL remove specific forward socket connection\n"
|
|
|
|
" forward --remove-all remove all forward socket connections\n"
|
|
|
|
" ppp TTY [PARAMETER...] run PPP over USB\n"
|
|
|
|
" reverse --list list all reverse socket connections from device\n"
|
|
|
|
" reverse [--no-rebind] REMOTE LOCAL\n"
|
|
|
|
" reverse socket connection using:\n"
|
|
|
|
" tcp:<port> (<remote> may be \"tcp:0\" to pick any open port)\n"
|
|
|
|
" localabstract:<unix domain socket name>\n"
|
|
|
|
" localreserved:<unix domain socket name>\n"
|
|
|
|
" localfilesystem:<unix domain socket name>\n"
|
|
|
|
" reverse --remove REMOTE remove specific reverse socket connection\n"
|
|
|
|
" reverse --remove-all remove all reverse socket connections from device\n"
|
2011-05-18 00:52:54 +02:00
|
|
|
"\n"
|
2016-09-29 00:25:47 +02:00
|
|
|
"file transfer:\n"
|
2017-05-19 07:56:48 +02:00
|
|
|
" push [--sync] LOCAL... REMOTE\n"
|
2016-09-29 00:25:47 +02:00
|
|
|
" copy local files/directories to device\n"
|
2017-05-19 07:56:48 +02:00
|
|
|
" --sync: only push files that are newer on the host than the device\n"
|
2016-09-29 00:25:47 +02:00
|
|
|
" pull [-a] REMOTE... LOCAL\n"
|
|
|
|
" copy files/dirs from device\n"
|
|
|
|
" -a: preserve file timestamp and mode\n"
|
2018-08-31 17:10:06 +02:00
|
|
|
" sync [all|data|odm|oem|product_services|product|system|vendor]\n"
|
2017-05-01 20:04:31 +02:00
|
|
|
" sync a local build from $ANDROID_PRODUCT_OUT to the device (default all)\n"
|
2016-09-29 00:25:47 +02:00
|
|
|
" -l: list but don't copy\n"
|
2009-03-04 04:32:55 +01:00
|
|
|
"\n"
|
2016-09-29 00:25:47 +02:00
|
|
|
"shell:\n"
|
|
|
|
" shell [-e ESCAPE] [-n] [-Tt] [-x] [COMMAND...]\n"
|
|
|
|
" run remote shell command (interactive shell if no command given)\n"
|
|
|
|
" -e: choose escape character, or \"none\"; default '~'\n"
|
|
|
|
" -n: don't read from stdin\n"
|
|
|
|
" -T: disable PTY allocation\n"
|
|
|
|
" -t: force PTY allocation\n"
|
|
|
|
" -x: disable remote exit codes and stdout/stderr separation\n"
|
|
|
|
" emu COMMAND run emulator console command\n"
|
2015-06-12 23:26:29 +02:00
|
|
|
"\n"
|
2019-01-11 22:50:05 +01:00
|
|
|
"app installation (see also `adb shell cmd package help`):\n"
|
2018-05-09 03:40:18 +02:00
|
|
|
" install [-lrtsdg] [--instant] PACKAGE\n"
|
2018-10-09 19:45:03 +02:00
|
|
|
" push a single package to the device and install it\n"
|
2018-05-09 03:40:18 +02:00
|
|
|
" install-multiple [-lrtsdpg] [--instant] PACKAGE...\n"
|
2018-10-09 19:45:03 +02:00
|
|
|
" push multiple APKs to the device for a single package and install them\n"
|
|
|
|
" install-multi-package [-lrtsdpg] [--instant] PACKAGE...\n"
|
|
|
|
" push one or more packages to the device and install them atomically\n"
|
2016-09-29 00:25:47 +02:00
|
|
|
" -r: replace existing application\n"
|
|
|
|
" -t: allow test packages\n"
|
|
|
|
" -d: allow version code downgrade (debuggable packages only)\n"
|
|
|
|
" -p: partial application install (install-multiple only)\n"
|
|
|
|
" -g: grant all runtime permissions\n"
|
2018-05-09 03:40:18 +02:00
|
|
|
" --instant: cause the app to be installed as an ephemeral install app\n"
|
2018-01-29 17:30:36 +01:00
|
|
|
" --no-streaming: always push APK to device and invoke Package Manager as separate steps\n"
|
|
|
|
" --streaming: force streaming APK directly into Package Manager\n"
|
2018-12-12 11:40:57 +01:00
|
|
|
" --fastdeploy: use fast deploy\n"
|
|
|
|
" --no-fastdeploy: prevent use of fast deploy\n"
|
2018-01-29 17:30:36 +01:00
|
|
|
" --force-agent: force update of deployment agent when using fast deploy\n"
|
|
|
|
" --date-check-agent: update deployment agent when local version is newer and using fast deploy\n"
|
|
|
|
" --version-check-agent: update deployment agent when local version has different version code and using fast deploy\n"
|
|
|
|
#ifndef _WIN32
|
|
|
|
" --local-agent: locate agent files from local source build (instead of SDK location)\n"
|
|
|
|
#endif
|
|
|
|
//TODO--installlog <filename>
|
2016-09-29 00:25:47 +02:00
|
|
|
" uninstall [-k] PACKAGE\n"
|
|
|
|
" remove this app package from the device\n"
|
|
|
|
" '-k': keep the data and cache directories\n"
|
2009-03-04 04:32:55 +01:00
|
|
|
"\n"
|
2016-09-29 00:25:47 +02:00
|
|
|
"debugging:\n"
|
|
|
|
" bugreport [PATH]\n"
|
|
|
|
" write bugreport to given PATH [default=bugreport.zip];\n"
|
|
|
|
" if PATH is a directory, the bug report is saved in that directory.\n"
|
|
|
|
" devices that don't support zipped bug reports output to stdout.\n"
|
|
|
|
" jdwp list pids of processes hosting a JDWP transport\n"
|
|
|
|
" logcat show device log (logcat --help for more)\n"
|
2009-03-04 04:32:55 +01:00
|
|
|
"\n"
|
2016-09-29 00:25:47 +02:00
|
|
|
"security:\n"
|
|
|
|
" disable-verity disable dm-verity checking on userdebug builds\n"
|
|
|
|
" enable-verity re-enable dm-verity checking on userdebug builds\n"
|
|
|
|
" keygen FILE\n"
|
|
|
|
" generate adb public/private key; private key stored in FILE,\n"
|
|
|
|
"\n"
|
|
|
|
"scripting:\n"
|
|
|
|
" wait-for[-TRANSPORT]-STATE\n"
|
|
|
|
" wait for device to be in the given state\n"
|
2019-04-08 08:24:03 +02:00
|
|
|
" STATE: device, recovery, rescue, sideload, bootloader, or disconnect\n"
|
2019-02-22 23:01:36 +01:00
|
|
|
" TRANSPORT: usb, local, or any [default=any]\n"
|
2016-09-29 00:25:47 +02:00
|
|
|
" get-state print offline | bootloader | device\n"
|
|
|
|
" get-serialno print <serial-number>\n"
|
|
|
|
" get-devpath print <device-path>\n"
|
2018-11-21 22:43:22 +01:00
|
|
|
" remount [-R]\n"
|
|
|
|
" remount partitions read-write. if a reboot is required, -R will\n"
|
|
|
|
" will automatically reboot the device.\n"
|
2016-09-29 00:25:47 +02:00
|
|
|
" reboot [bootloader|recovery|sideload|sideload-auto-reboot]\n"
|
|
|
|
" reboot the device; defaults to booting system image but\n"
|
|
|
|
" supports bootloader and recovery too. sideload reboots\n"
|
|
|
|
" into recovery and automatically starts sideload mode,\n"
|
|
|
|
" sideload-auto-reboot is the same but reboots after sideloading.\n"
|
|
|
|
" sideload OTAPACKAGE sideload the given full OTA package\n"
|
|
|
|
" root restart adbd with root permissions\n"
|
|
|
|
" unroot restart adbd without root permissions\n"
|
2018-10-24 19:38:33 +02:00
|
|
|
" usb restart adbd listening on USB\n"
|
|
|
|
" tcpip PORT restart adbd listening on TCP on PORT\n"
|
2010-02-16 21:18:29 +01:00
|
|
|
"\n"
|
2016-04-05 22:50:44 +02:00
|
|
|
"internal debugging:\n"
|
2016-09-29 00:25:47 +02:00
|
|
|
" start-server ensure that there is a server running\n"
|
|
|
|
" kill-server kill the server if it is running\n"
|
|
|
|
" reconnect kick connection from host side to force reconnect\n"
|
|
|
|
" reconnect device kick connection from device side to force reconnect\n"
|
adb: fix two device offline problems.
When device goes offline, user usually has to manually replug the
usb device. This patch tries to solve two offline situations, all
because when adb on host is killed, the adbd on device is not notified.
1. When adb server is killed while pushing a large file to device,
the device is still reading the unfinished large message. So the
device thinks of the CNXN message as part of the previous unfinished
message, so it doesn't reply and the device is in offline state.
The solution is to add a write_msg_lock in atransport struct. And it
kicks the transport only after sending a whole message. By kicking
all transports before exit, we ensure that we don't write part of
a message to any device. So next time we start adb server, the device
should be waiting for a new message.
2. When adb server is killed while pulling a large file from device,
the device is still trying to send the unfinished large message. So
adb on host usually reads data with EOVERFLOW error. This is because
adb on host is reading less than one packet sent from device.
The solution is to use buffered read on host. The max packet size
of bulk transactions in USB 3.0 is 1024 bytes. By preparing an at least
1024 bytes buffer when reading, EOVERFLOW no longer occurs. And teach
adb host to ignore wrong messages.
To be safe, this patch doesn't change any logic on device.
Bug: http://b/32952319
Test: run python -m unittest -q test_device.DeviceOfflineTest
Test: on linux/mac/windows with bullhead, ryu.
Change-Id: Ib149d30028a62a6f03857b8a95ab5a1d6e9b9c4e
2017-03-11 01:01:01 +01:00
|
|
|
" reconnect offline reset offline/unauthorized devices to force reconnect\n"
|
2016-09-29 00:25:47 +02:00
|
|
|
"\n"
|
2015-06-12 23:26:29 +02:00
|
|
|
"environment variables:\n"
|
2016-09-29 00:25:47 +02:00
|
|
|
" $ADB_TRACE\n"
|
|
|
|
" comma-separated list of debug info to log:\n"
|
|
|
|
" all,adb,sockets,packets,rwx,usb,sync,sysdeps,transport,jdwp\n"
|
|
|
|
" $ADB_VENDOR_KEYS colon-separated list of keys (files or directories)\n"
|
|
|
|
" $ANDROID_SERIAL serial number to connect to (see -s)\n"
|
2019-02-08 17:27:16 +01:00
|
|
|
" $ANDROID_LOG_TAGS tags to be used by logcat (see logcat --help)\n"
|
|
|
|
" $ADB_LOCAL_TRANSPORT_MAX_PORT max emulator scan port (default 5585, 16 emus)\n"
|
|
|
|
);
|
2016-07-30 02:57:00 +02:00
|
|
|
// clang-format on
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
|
2014-11-17 23:48:25 +01:00
|
|
|
#if defined(_WIN32)
|
|
|
|
|
2015-04-17 01:47:02 +02:00
|
|
|
// Implemented in sysdeps_win32.cpp.
|
2015-11-03 20:18:40 +01:00
|
|
|
void stdin_raw_init();
|
|
|
|
void stdin_raw_restore();
|
2014-11-17 23:48:25 +01:00
|
|
|
|
|
|
|
#else
|
2013-03-01 22:16:41 +01:00
|
|
|
static termios g_saved_terminal_state;
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2015-11-03 20:18:40 +01:00
|
|
|
static void stdin_raw_init() {
|
|
|
|
if (tcgetattr(STDIN_FILENO, &g_saved_terminal_state)) return;
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2013-03-01 22:16:41 +01:00
|
|
|
termios tio;
|
2015-11-03 20:18:40 +01:00
|
|
|
if (tcgetattr(STDIN_FILENO, &tio)) return;
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2013-03-01 22:16:41 +01:00
|
|
|
cfmakeraw(&tio);
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2013-03-01 22:16:41 +01:00
|
|
|
// No timeout but request at least one character per read.
|
2009-03-04 04:32:55 +01:00
|
|
|
tio.c_cc[VTIME] = 0;
|
|
|
|
tio.c_cc[VMIN] = 1;
|
|
|
|
|
2015-11-03 20:18:40 +01:00
|
|
|
tcsetattr(STDIN_FILENO, TCSAFLUSH, &tio);
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
|
2015-11-03 20:18:40 +01:00
|
|
|
static void stdin_raw_restore() {
|
|
|
|
tcsetattr(STDIN_FILENO, TCSAFLUSH, &g_saved_terminal_state);
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2015-09-09 02:17:02 +02:00
|
|
|
// Reads from |fd| and prints received data. If |use_shell_protocol| is true
|
|
|
|
// this expects that incoming data will use the shell protocol, in which case
|
|
|
|
// stdout/stderr are routed independently and the remote exit code will be
|
|
|
|
// returned.
|
2016-07-26 21:14:39 +02:00
|
|
|
// if |callback| is non-null, stdout/stderr output will be handled by it.
|
2019-04-25 23:04:57 +02:00
|
|
|
int read_and_dump(borrowed_fd fd, bool use_shell_protocol = false,
|
2016-07-26 21:14:39 +02:00
|
|
|
StandardStreamsCallbackInterface* callback = &DEFAULT_STANDARD_STREAMS_CALLBACK) {
|
2015-09-09 02:17:02 +02:00
|
|
|
int exit_code = 0;
|
2016-06-07 01:05:36 +02:00
|
|
|
if (fd < 0) return exit_code;
|
|
|
|
|
2015-09-09 02:17:02 +02:00
|
|
|
std::unique_ptr<ShellProtocol> protocol;
|
|
|
|
int length = 0;
|
|
|
|
|
|
|
|
char raw_buffer[BUFSIZ];
|
|
|
|
char* buffer_ptr = raw_buffer;
|
|
|
|
if (use_shell_protocol) {
|
2018-03-08 01:51:08 +01:00
|
|
|
protocol = std::make_unique<ShellProtocol>(fd);
|
2015-09-09 02:17:02 +02:00
|
|
|
if (!protocol) {
|
|
|
|
LOG(ERROR) << "failed to allocate memory for ShellProtocol object";
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
buffer_ptr = protocol->data();
|
|
|
|
}
|
|
|
|
|
2016-06-07 01:05:36 +02:00
|
|
|
while (true) {
|
2015-09-09 02:17:02 +02:00
|
|
|
if (use_shell_protocol) {
|
|
|
|
if (!protocol->Read()) {
|
|
|
|
break;
|
|
|
|
}
|
2016-07-26 21:14:39 +02:00
|
|
|
length = protocol->data_length();
|
2015-09-09 02:17:02 +02:00
|
|
|
switch (protocol->id()) {
|
|
|
|
case ShellProtocol::kIdStdout:
|
2016-07-26 21:14:39 +02:00
|
|
|
callback->OnStdout(buffer_ptr, length);
|
2015-09-09 02:17:02 +02:00
|
|
|
break;
|
|
|
|
case ShellProtocol::kIdStderr:
|
2016-07-26 21:14:39 +02:00
|
|
|
callback->OnStderr(buffer_ptr, length);
|
2015-09-09 02:17:02 +02:00
|
|
|
break;
|
|
|
|
case ShellProtocol::kIdExit:
|
2019-03-15 22:49:25 +01:00
|
|
|
// data() returns a char* which doesn't have defined signedness.
|
|
|
|
// Cast to uint8_t to prevent 255 from being sign extended to INT_MIN,
|
|
|
|
// which doesn't get truncated on Windows.
|
|
|
|
exit_code = static_cast<uint8_t>(protocol->data()[0]);
|
2015-09-09 02:17:02 +02:00
|
|
|
continue;
|
|
|
|
default:
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
length = protocol->data_length();
|
|
|
|
} else {
|
2019-04-25 23:04:57 +02:00
|
|
|
D("read_and_dump(): pre adb_read(fd=%d)", fd.get());
|
2015-09-09 02:17:02 +02:00
|
|
|
length = adb_read(fd, raw_buffer, sizeof(raw_buffer));
|
2019-04-25 23:04:57 +02:00
|
|
|
D("read_and_dump(): post adb_read(fd=%d): length=%d", fd.get(), length);
|
2015-09-09 02:17:02 +02:00
|
|
|
if (length <= 0) {
|
|
|
|
break;
|
|
|
|
}
|
2016-07-26 21:14:39 +02:00
|
|
|
callback->OnStdout(buffer_ptr, length);
|
2016-04-02 02:43:27 +02:00
|
|
|
}
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
2015-09-09 02:17:02 +02:00
|
|
|
|
2016-07-26 21:14:39 +02:00
|
|
|
return callback->Done(exit_code);
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
|
2016-07-06 22:22:22 +02:00
|
|
|
static void stdinout_raw_prologue(int inFd, int outFd, int& old_stdin_mode, int& old_stdout_mode) {
|
2014-05-27 03:30:43 +02:00
|
|
|
if (inFd == STDIN_FILENO) {
|
2015-11-03 20:18:40 +01:00
|
|
|
stdin_raw_init();
|
adb: win32: fix exec-in and exec-out to use binary mode
adb exec-in and exec-out are designed to read/write binary data
according to the commit description at:
https://android.googlesource.com/platform/system/core/+/5d9d434%5E!/
On Windows, when adb_read and adb_write are used, they are always in
binary mode (because sysdeps_win32.cpp calls Windows APIs direct). But
unix_read, unix_write, fread, fwrite, read, write use the text
translation mode of the C Runtime file descriptor, which is by default
textmode.
adb exec-in and exec-out use copy_to_file() which uses unix_read() and
fwrite() when reading/writing stdin and stdout, thus, copy_to_file()
should switch to binary mode for those cases (it already uses binary
mode for file descriptors other than stdin and stdout).
copy_to_file() is also called by adb backup, adb restore, and adb
install-multiple, but those do not use stdin or stdout, so those
codepaths should not be affected by this change.
Change-Id: I3446d9b363d20a2c2f6be2b96e55b653d99df2f9
Signed-off-by: Spencer Low <CompareAndSwap@gmail.com>
2015-05-23 01:48:31 +02:00
|
|
|
#ifdef _WIN32
|
|
|
|
old_stdin_mode = _setmode(STDIN_FILENO, _O_BINARY);
|
|
|
|
if (old_stdin_mode == -1) {
|
2018-10-19 22:59:44 +02:00
|
|
|
PLOG(FATAL) << "could not set stdin to binary";
|
adb: win32: fix exec-in and exec-out to use binary mode
adb exec-in and exec-out are designed to read/write binary data
according to the commit description at:
https://android.googlesource.com/platform/system/core/+/5d9d434%5E!/
On Windows, when adb_read and adb_write are used, they are always in
binary mode (because sysdeps_win32.cpp calls Windows APIs direct). But
unix_read, unix_write, fread, fwrite, read, write use the text
translation mode of the C Runtime file descriptor, which is by default
textmode.
adb exec-in and exec-out use copy_to_file() which uses unix_read() and
fwrite() when reading/writing stdin and stdout, thus, copy_to_file()
should switch to binary mode for those cases (it already uses binary
mode for file descriptors other than stdin and stdout).
copy_to_file() is also called by adb backup, adb restore, and adb
install-multiple, but those do not use stdin or stdout, so those
codepaths should not be affected by this change.
Change-Id: I3446d9b363d20a2c2f6be2b96e55b653d99df2f9
Signed-off-by: Spencer Low <CompareAndSwap@gmail.com>
2015-05-23 01:48:31 +02:00
|
|
|
}
|
|
|
|
#endif
|
2014-05-27 03:30:43 +02:00
|
|
|
}
|
2014-11-17 23:48:25 +01:00
|
|
|
|
adb: win32: fix exec-in and exec-out to use binary mode
adb exec-in and exec-out are designed to read/write binary data
according to the commit description at:
https://android.googlesource.com/platform/system/core/+/5d9d434%5E!/
On Windows, when adb_read and adb_write are used, they are always in
binary mode (because sysdeps_win32.cpp calls Windows APIs direct). But
unix_read, unix_write, fread, fwrite, read, write use the text
translation mode of the C Runtime file descriptor, which is by default
textmode.
adb exec-in and exec-out use copy_to_file() which uses unix_read() and
fwrite() when reading/writing stdin and stdout, thus, copy_to_file()
should switch to binary mode for those cases (it already uses binary
mode for file descriptors other than stdin and stdout).
copy_to_file() is also called by adb backup, adb restore, and adb
install-multiple, but those do not use stdin or stdout, so those
codepaths should not be affected by this change.
Change-Id: I3446d9b363d20a2c2f6be2b96e55b653d99df2f9
Signed-off-by: Spencer Low <CompareAndSwap@gmail.com>
2015-05-23 01:48:31 +02:00
|
|
|
#ifdef _WIN32
|
|
|
|
if (outFd == STDOUT_FILENO) {
|
|
|
|
old_stdout_mode = _setmode(STDOUT_FILENO, _O_BINARY);
|
|
|
|
if (old_stdout_mode == -1) {
|
2018-10-19 22:59:44 +02:00
|
|
|
PLOG(FATAL) << "could not set stdout to binary";
|
adb: win32: fix exec-in and exec-out to use binary mode
adb exec-in and exec-out are designed to read/write binary data
according to the commit description at:
https://android.googlesource.com/platform/system/core/+/5d9d434%5E!/
On Windows, when adb_read and adb_write are used, they are always in
binary mode (because sysdeps_win32.cpp calls Windows APIs direct). But
unix_read, unix_write, fread, fwrite, read, write use the text
translation mode of the C Runtime file descriptor, which is by default
textmode.
adb exec-in and exec-out use copy_to_file() which uses unix_read() and
fwrite() when reading/writing stdin and stdout, thus, copy_to_file()
should switch to binary mode for those cases (it already uses binary
mode for file descriptors other than stdin and stdout).
copy_to_file() is also called by adb backup, adb restore, and adb
install-multiple, but those do not use stdin or stdout, so those
codepaths should not be affected by this change.
Change-Id: I3446d9b363d20a2c2f6be2b96e55b653d99df2f9
Signed-off-by: Spencer Low <CompareAndSwap@gmail.com>
2015-05-23 01:48:31 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2016-07-06 22:22:22 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void stdinout_raw_epilogue(int inFd, int outFd, int old_stdin_mode, int old_stdout_mode) {
|
|
|
|
if (inFd == STDIN_FILENO) {
|
|
|
|
stdin_raw_restore();
|
|
|
|
#ifdef _WIN32
|
|
|
|
if (_setmode(STDIN_FILENO, old_stdin_mode) == -1) {
|
2018-10-19 22:59:44 +02:00
|
|
|
PLOG(FATAL) << "could not restore stdin mode";
|
2016-07-06 22:22:22 +02:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef _WIN32
|
|
|
|
if (outFd == STDOUT_FILENO) {
|
|
|
|
if (_setmode(STDOUT_FILENO, old_stdout_mode) == -1) {
|
2018-10-19 22:59:44 +02:00
|
|
|
PLOG(FATAL) << "could not restore stdout mode";
|
2016-07-06 22:22:22 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2018-01-29 17:30:36 +01:00
|
|
|
void copy_to_file(int inFd, int outFd) {
|
2018-09-05 21:13:11 +02:00
|
|
|
std::vector<char> buf(32 * 1024);
|
2016-07-06 22:22:22 +02:00
|
|
|
int len;
|
|
|
|
long total = 0;
|
|
|
|
int old_stdin_mode = -1;
|
|
|
|
int old_stdout_mode = -1;
|
|
|
|
|
|
|
|
D("copy_to_file(%d -> %d)", inFd, outFd);
|
|
|
|
|
|
|
|
stdinout_raw_prologue(inFd, outFd, old_stdin_mode, old_stdout_mode);
|
adb: win32: fix exec-in and exec-out to use binary mode
adb exec-in and exec-out are designed to read/write binary data
according to the commit description at:
https://android.googlesource.com/platform/system/core/+/5d9d434%5E!/
On Windows, when adb_read and adb_write are used, they are always in
binary mode (because sysdeps_win32.cpp calls Windows APIs direct). But
unix_read, unix_write, fread, fwrite, read, write use the text
translation mode of the C Runtime file descriptor, which is by default
textmode.
adb exec-in and exec-out use copy_to_file() which uses unix_read() and
fwrite() when reading/writing stdin and stdout, thus, copy_to_file()
should switch to binary mode for those cases (it already uses binary
mode for file descriptors other than stdin and stdout).
copy_to_file() is also called by adb backup, adb restore, and adb
install-multiple, but those do not use stdin or stdout, so those
codepaths should not be affected by this change.
Change-Id: I3446d9b363d20a2c2f6be2b96e55b653d99df2f9
Signed-off-by: Spencer Low <CompareAndSwap@gmail.com>
2015-05-23 01:48:31 +02:00
|
|
|
|
2015-04-18 02:03:59 +02:00
|
|
|
while (true) {
|
2014-05-27 03:30:43 +02:00
|
|
|
if (inFd == STDIN_FILENO) {
|
2018-09-05 21:13:11 +02:00
|
|
|
len = unix_read(inFd, buf.data(), buf.size());
|
2014-05-27 03:30:43 +02:00
|
|
|
} else {
|
2018-09-05 21:13:11 +02:00
|
|
|
len = adb_read(inFd, buf.data(), buf.size());
|
2014-05-27 03:30:43 +02:00
|
|
|
}
|
2011-04-21 21:53:28 +02:00
|
|
|
if (len == 0) {
|
2015-09-03 02:44:28 +02:00
|
|
|
D("copy_to_file() : read 0 bytes; exiting");
|
2011-04-21 21:53:28 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (len < 0) {
|
2015-09-03 02:44:28 +02:00
|
|
|
D("copy_to_file(): read failed: %s", strerror(errno));
|
2011-04-21 21:53:28 +02:00
|
|
|
break;
|
|
|
|
}
|
2014-05-27 03:30:43 +02:00
|
|
|
if (outFd == STDOUT_FILENO) {
|
2018-07-19 06:18:27 +02:00
|
|
|
fwrite(buf.data(), 1, len, stdout);
|
2014-05-27 03:30:43 +02:00
|
|
|
fflush(stdout);
|
|
|
|
} else {
|
2018-07-19 06:18:27 +02:00
|
|
|
adb_write(outFd, buf.data(), len);
|
2014-05-27 03:30:43 +02:00
|
|
|
}
|
2011-06-02 02:56:23 +02:00
|
|
|
total += len;
|
2011-04-21 21:53:28 +02:00
|
|
|
}
|
2014-11-17 23:48:25 +01:00
|
|
|
|
2016-07-06 22:22:22 +02:00
|
|
|
stdinout_raw_epilogue(inFd, outFd, old_stdin_mode, old_stdout_mode);
|
2014-11-17 23:48:25 +01:00
|
|
|
|
2015-09-03 02:44:28 +02:00
|
|
|
D("copy_to_file() finished after %lu bytes", total);
|
2011-04-21 21:53:28 +02:00
|
|
|
}
|
|
|
|
|
2015-11-03 20:18:40 +01:00
|
|
|
static void send_window_size_change(int fd, std::unique_ptr<ShellProtocol>& shell) {
|
|
|
|
// Old devices can't handle window size changes.
|
|
|
|
if (shell == nullptr) return;
|
|
|
|
|
2015-11-08 02:34:39 +01:00
|
|
|
#if defined(_WIN32)
|
|
|
|
struct winsize {
|
|
|
|
unsigned short ws_row;
|
|
|
|
unsigned short ws_col;
|
|
|
|
unsigned short ws_xpixel;
|
|
|
|
unsigned short ws_ypixel;
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2015-11-03 20:18:40 +01:00
|
|
|
winsize ws;
|
2015-11-08 02:34:39 +01:00
|
|
|
|
|
|
|
#if defined(_WIN32)
|
|
|
|
// If stdout is redirected to a non-console, we won't be able to get the
|
|
|
|
// console size, but that makes sense.
|
|
|
|
const intptr_t intptr_handle = _get_osfhandle(STDOUT_FILENO);
|
|
|
|
if (intptr_handle == -1) return;
|
|
|
|
|
|
|
|
const HANDLE handle = reinterpret_cast<const HANDLE>(intptr_handle);
|
|
|
|
|
|
|
|
CONSOLE_SCREEN_BUFFER_INFO info;
|
|
|
|
memset(&info, 0, sizeof(info));
|
|
|
|
if (!GetConsoleScreenBufferInfo(handle, &info)) return;
|
|
|
|
|
|
|
|
memset(&ws, 0, sizeof(ws));
|
|
|
|
// The number of visible rows, excluding offscreen scroll-back rows which are in info.dwSize.Y.
|
|
|
|
ws.ws_row = info.srWindow.Bottom - info.srWindow.Top + 1;
|
|
|
|
// If the user has disabled "Wrap text output on resize", they can make the screen buffer wider
|
|
|
|
// than the window, in which case we should use the width of the buffer.
|
|
|
|
ws.ws_col = info.dwSize.X;
|
|
|
|
#else
|
2015-11-03 20:18:40 +01:00
|
|
|
if (ioctl(fd, TIOCGWINSZ, &ws) == -1) return;
|
2015-11-08 02:34:39 +01:00
|
|
|
#endif
|
2015-11-03 20:18:40 +01:00
|
|
|
|
|
|
|
// Send the new window size as human-readable ASCII for debugging convenience.
|
|
|
|
size_t l = snprintf(shell->data(), shell->data_capacity(), "%dx%d,%dx%d",
|
|
|
|
ws.ws_row, ws.ws_col, ws.ws_xpixel, ws.ws_ypixel);
|
|
|
|
shell->Write(ShellProtocol::kIdWindowSizeChange, l + 1);
|
|
|
|
}
|
2015-09-09 02:17:02 +02:00
|
|
|
|
|
|
|
// Used to pass multiple values to the stdin read thread.
|
|
|
|
struct StdinReadArgs {
|
|
|
|
int stdin_fd, write_fd;
|
2015-10-07 00:30:03 +02:00
|
|
|
bool raw_stdin;
|
2015-09-09 02:17:02 +02:00
|
|
|
std::unique_ptr<ShellProtocol> protocol;
|
2015-11-04 22:36:32 +01:00
|
|
|
char escape_char;
|
2015-09-09 02:17:02 +02:00
|
|
|
};
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2015-09-09 02:17:02 +02:00
|
|
|
// Loops to read from stdin and push the data to the given FD.
|
|
|
|
// The argument should be a pointer to a StdinReadArgs object. This function
|
|
|
|
// will take ownership of the object and delete it when finished.
|
2016-02-12 23:31:15 +01:00
|
|
|
static void stdin_read_thread_loop(void* x) {
|
2015-09-09 02:17:02 +02:00
|
|
|
std::unique_ptr<StdinReadArgs> args(reinterpret_cast<StdinReadArgs*>(x));
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2015-11-03 20:18:40 +01:00
|
|
|
#if !defined(_WIN32)
|
|
|
|
// Mask SIGTTIN in case we're in a backgrounded process.
|
2015-10-24 00:03:31 +02:00
|
|
|
sigset_t sigset;
|
|
|
|
sigemptyset(&sigset);
|
|
|
|
sigaddset(&sigset, SIGTTIN);
|
|
|
|
pthread_sigmask(SIG_BLOCK, &sigset, nullptr);
|
|
|
|
#endif
|
|
|
|
|
2015-11-08 02:34:39 +01:00
|
|
|
#if defined(_WIN32)
|
|
|
|
// _get_interesting_input_record_uncached() causes unix_read_interruptible()
|
|
|
|
// to return -1 with errno == EINTR if the window size changes.
|
|
|
|
#else
|
2015-11-03 20:18:40 +01:00
|
|
|
// Unblock SIGWINCH for this thread, so our read(2) below will be
|
|
|
|
// interrupted if the window size changes.
|
|
|
|
sigset_t mask;
|
|
|
|
sigemptyset(&mask);
|
|
|
|
sigaddset(&mask, SIGWINCH);
|
|
|
|
pthread_sigmask(SIG_UNBLOCK, &mask, nullptr);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
// Set up the initial window size.
|
|
|
|
send_window_size_change(args->stdin_fd, args->protocol);
|
|
|
|
|
2015-11-04 22:36:32 +01:00
|
|
|
char raw_buffer[BUFSIZ];
|
2015-09-09 02:17:02 +02:00
|
|
|
char* buffer_ptr = raw_buffer;
|
|
|
|
size_t buffer_size = sizeof(raw_buffer);
|
2015-11-03 20:18:40 +01:00
|
|
|
if (args->protocol != nullptr) {
|
2015-09-09 02:17:02 +02:00
|
|
|
buffer_ptr = args->protocol->data();
|
|
|
|
buffer_size = args->protocol->data_capacity();
|
|
|
|
}
|
|
|
|
|
2015-11-04 22:36:32 +01:00
|
|
|
// If we need to parse escape sequences, make life easy.
|
|
|
|
if (args->raw_stdin && args->escape_char != '\0') {
|
|
|
|
buffer_size = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
enum EscapeState { kMidFlow, kStartOfLine, kInEscape };
|
|
|
|
EscapeState state = kStartOfLine;
|
|
|
|
|
2015-08-03 19:38:08 +02:00
|
|
|
while (true) {
|
2015-11-08 02:34:39 +01:00
|
|
|
// Use unix_read_interruptible() rather than adb_read() for stdin.
|
|
|
|
D("stdin_read_thread_loop(): pre unix_read_interruptible(fdi=%d,...)", args->stdin_fd);
|
|
|
|
int r = unix_read_interruptible(args->stdin_fd, buffer_ptr,
|
|
|
|
buffer_size);
|
2015-11-03 20:18:40 +01:00
|
|
|
if (r == -1 && errno == EINTR) {
|
|
|
|
send_window_size_change(args->stdin_fd, args->protocol);
|
|
|
|
continue;
|
|
|
|
}
|
2015-11-08 02:34:39 +01:00
|
|
|
D("stdin_read_thread_loop(): post unix_read_interruptible(fdi=%d,...)", args->stdin_fd);
|
2015-10-07 00:30:03 +02:00
|
|
|
if (r <= 0) {
|
|
|
|
// Only devices using the shell protocol know to close subprocess
|
|
|
|
// stdin. For older devices we want to just leave the connection
|
|
|
|
// open, otherwise an unpredictable amount of return data could
|
|
|
|
// be lost due to the FD closing before all data has been received.
|
|
|
|
if (args->protocol) {
|
|
|
|
args->protocol->Write(ShellProtocol::kIdCloseStdin, 0);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
2015-11-04 22:36:32 +01:00
|
|
|
// If we made stdin raw, check input for escape sequences. In
|
2015-10-07 00:30:03 +02:00
|
|
|
// this situation signals like Ctrl+C are sent remotely rather than
|
|
|
|
// interpreted locally so this provides an emergency out if the remote
|
|
|
|
// process starts ignoring the signal. SSH also does this, see the
|
|
|
|
// "escape characters" section on the ssh man page for more info.
|
2015-11-04 22:36:32 +01:00
|
|
|
if (args->raw_stdin && args->escape_char != '\0') {
|
|
|
|
char ch = buffer_ptr[0];
|
|
|
|
if (ch == args->escape_char) {
|
|
|
|
if (state == kStartOfLine) {
|
|
|
|
state = kInEscape;
|
|
|
|
// Swallow the escape character.
|
|
|
|
continue;
|
|
|
|
} else {
|
|
|
|
state = kMidFlow;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (state == kInEscape) {
|
|
|
|
if (ch == '.') {
|
|
|
|
fprintf(stderr,"\r\n[ disconnected ]\r\n");
|
2015-11-03 20:18:40 +01:00
|
|
|
stdin_raw_restore();
|
2015-10-07 00:30:03 +02:00
|
|
|
exit(0);
|
2015-11-04 22:36:32 +01:00
|
|
|
} else {
|
|
|
|
// We swallowed an escape character that wasn't part of
|
|
|
|
// a valid escape sequence; time to cough it up.
|
|
|
|
buffer_ptr[0] = args->escape_char;
|
|
|
|
buffer_ptr[1] = ch;
|
|
|
|
++r;
|
2015-10-07 00:30:03 +02:00
|
|
|
}
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
2015-11-04 22:36:32 +01:00
|
|
|
state = (ch == '\n' || ch == '\r') ? kStartOfLine : kMidFlow;
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
}
|
2015-09-09 02:17:02 +02:00
|
|
|
if (args->protocol) {
|
|
|
|
if (!args->protocol->Write(ShellProtocol::kIdStdin, r)) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (!WriteFdExactly(args->write_fd, buffer_ptr, r)) {
|
|
|
|
break;
|
|
|
|
}
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
}
|
2015-09-09 02:17:02 +02:00
|
|
|
}
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2015-10-07 00:30:03 +02:00
|
|
|
// Returns a shell service string with the indicated arguments and command.
|
|
|
|
static std::string ShellServiceString(bool use_shell_protocol,
|
|
|
|
const std::string& type_arg,
|
|
|
|
const std::string& command) {
|
|
|
|
std::vector<std::string> args;
|
|
|
|
if (use_shell_protocol) {
|
|
|
|
args.push_back(kShellServiceArgShellProtocol);
|
2015-11-18 21:45:48 +01:00
|
|
|
|
|
|
|
const char* terminal_type = getenv("TERM");
|
|
|
|
if (terminal_type != nullptr) {
|
|
|
|
args.push_back(std::string("TERM=") + terminal_type);
|
|
|
|
}
|
2015-10-07 00:30:03 +02:00
|
|
|
}
|
|
|
|
if (!type_arg.empty()) {
|
|
|
|
args.push_back(type_arg);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Shell service string can look like: shell[,arg1,arg2,...]:[command].
|
|
|
|
return android::base::StringPrintf("shell%s%s:%s",
|
|
|
|
args.empty() ? "" : ",",
|
|
|
|
android::base::Join(args, ',').c_str(),
|
|
|
|
command.c_str());
|
|
|
|
}
|
|
|
|
|
|
|
|
// Connects to a shell on the device and read/writes data.
|
|
|
|
//
|
|
|
|
// Note: currently this function doesn't properly clean up resources; the
|
|
|
|
// FD connected to the adb server is never closed and the stdin read thread
|
|
|
|
// may never exit.
|
|
|
|
//
|
|
|
|
// On success returns the remote exit code if |use_shell_protocol| is true,
|
|
|
|
// 0 otherwise. On failure returns 1.
|
2018-12-12 19:48:50 +01:00
|
|
|
static int RemoteShell(bool use_shell_protocol, const std::string& type_arg, char escape_char,
|
|
|
|
bool empty_command, const std::string& service_string) {
|
2017-06-17 00:34:34 +02:00
|
|
|
// Old devices can't handle a service string that's longer than MAX_PAYLOAD_V1.
|
|
|
|
// Use |use_shell_protocol| to determine whether to allow a command longer than that.
|
|
|
|
if (service_string.size() > MAX_PAYLOAD_V1 && !use_shell_protocol) {
|
|
|
|
fprintf(stderr, "error: shell command too long\n");
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2015-10-07 00:30:03 +02:00
|
|
|
// Make local stdin raw if the device allocates a PTY, which happens if:
|
|
|
|
// 1. We are explicitly asking for a PTY shell, or
|
|
|
|
// 2. We don't specify shell type and are starting an interactive session.
|
2018-12-12 19:48:50 +01:00
|
|
|
bool raw_stdin = (type_arg == kShellServiceArgPty || (type_arg.empty() && empty_command));
|
2015-10-07 00:30:03 +02:00
|
|
|
|
2015-04-29 17:35:59 +02:00
|
|
|
std::string error;
|
2015-09-22 19:43:08 +02:00
|
|
|
int fd = adb_connect(service_string, &error);
|
2015-04-29 17:35:59 +02:00
|
|
|
if (fd < 0) {
|
|
|
|
fprintf(stderr,"error: %s\n", error.c_str());
|
2009-03-04 04:32:55 +01:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2015-09-09 02:17:02 +02:00
|
|
|
StdinReadArgs* args = new StdinReadArgs;
|
|
|
|
if (!args) {
|
|
|
|
LOG(ERROR) << "couldn't allocate StdinReadArgs object";
|
2015-04-22 04:39:52 +02:00
|
|
|
return 1;
|
|
|
|
}
|
2015-10-07 00:30:03 +02:00
|
|
|
args->stdin_fd = STDIN_FILENO;
|
2015-09-09 02:17:02 +02:00
|
|
|
args->write_fd = fd;
|
2015-10-07 00:30:03 +02:00
|
|
|
args->raw_stdin = raw_stdin;
|
2015-11-04 22:36:32 +01:00
|
|
|
args->escape_char = escape_char;
|
2015-09-09 02:17:02 +02:00
|
|
|
if (use_shell_protocol) {
|
2018-03-08 01:51:08 +01:00
|
|
|
args->protocol = std::make_unique<ShellProtocol>(args->write_fd);
|
2015-09-09 02:17:02 +02:00
|
|
|
}
|
2015-04-22 04:39:52 +02:00
|
|
|
|
2015-11-03 20:18:40 +01:00
|
|
|
if (raw_stdin) stdin_raw_init();
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2015-11-03 20:18:40 +01:00
|
|
|
#if !defined(_WIN32)
|
|
|
|
// Ensure our process is notified if the local window size changes.
|
|
|
|
// We use sigaction(2) to ensure that the SA_RESTART flag is not set,
|
|
|
|
// because the whole reason we're sending signals is to unblock the read(2)!
|
|
|
|
// That also means we don't need to do anything in the signal handler:
|
|
|
|
// the side effect of delivering the signal is all we need.
|
|
|
|
struct sigaction sa;
|
|
|
|
memset(&sa, 0, sizeof(sa));
|
|
|
|
sa.sa_handler = [](int) {};
|
|
|
|
sa.sa_flags = 0;
|
|
|
|
sigaction(SIGWINCH, &sa, nullptr);
|
|
|
|
|
|
|
|
// Now block SIGWINCH in this thread (the main thread) and all threads spawned
|
|
|
|
// from it. The stdin read thread will unblock this signal to ensure that it's
|
|
|
|
// the thread that receives the signal.
|
|
|
|
sigset_t mask;
|
|
|
|
sigemptyset(&mask);
|
|
|
|
sigaddset(&mask, SIGWINCH);
|
|
|
|
pthread_sigmask(SIG_BLOCK, &mask, nullptr);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
// TODO: combine read_and_dump with stdin_read_thread to make life simpler?
|
2017-04-13 02:00:49 +02:00
|
|
|
std::thread(stdin_read_thread_loop, args).detach();
|
|
|
|
int exit_code = read_and_dump(fd, use_shell_protocol);
|
2015-05-05 22:41:21 +02:00
|
|
|
|
2015-11-03 20:18:40 +01:00
|
|
|
// TODO: properly exit stdin_read_thread_loop and close |fd|.
|
2015-10-07 00:30:03 +02:00
|
|
|
|
2015-11-03 20:18:40 +01:00
|
|
|
// TODO: we should probably install signal handlers for this.
|
|
|
|
// TODO: can we use atexit? even on Windows?
|
|
|
|
if (raw_stdin) stdin_raw_restore();
|
2015-10-07 00:30:03 +02:00
|
|
|
|
2015-09-09 02:17:02 +02:00
|
|
|
return exit_code;
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
|
2016-02-01 04:12:26 +01:00
|
|
|
static int adb_shell(int argc, const char** argv) {
|
2016-01-22 04:56:50 +01:00
|
|
|
FeatureSet features;
|
2018-10-19 22:59:44 +02:00
|
|
|
std::string error_message;
|
|
|
|
if (!adb_get_feature_set(&features, &error_message)) {
|
|
|
|
fprintf(stderr, "error: %s\n", error_message.c_str());
|
2016-01-22 04:56:50 +01:00
|
|
|
return 1;
|
|
|
|
}
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2016-10-19 23:47:11 +02:00
|
|
|
enum PtyAllocationMode { kPtyAuto, kPtyNo, kPtyYes, kPtyDefinitely };
|
|
|
|
|
|
|
|
// Defaults.
|
|
|
|
char escape_char = '~'; // -e
|
|
|
|
bool use_shell_protocol = CanUseFeature(features, kFeatureShell2); // -x
|
|
|
|
PtyAllocationMode tty = use_shell_protocol ? kPtyAuto : kPtyDefinitely; // -t/-T
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2015-11-03 20:18:40 +01:00
|
|
|
// Parse shell-specific command-line options.
|
2016-10-19 23:47:11 +02:00
|
|
|
argv[0] = "adb shell"; // So getopt(3) error messages start "adb shell".
|
2017-08-18 00:23:08 +02:00
|
|
|
#ifdef _WIN32
|
|
|
|
// fixes "adb shell -l" crash on Windows, b/37284906
|
|
|
|
__argv = const_cast<char**>(argv);
|
|
|
|
#endif
|
2016-10-19 23:47:11 +02:00
|
|
|
optind = 1; // argv[0] is always "shell", so set `optind` appropriately.
|
|
|
|
int opt;
|
|
|
|
while ((opt = getopt(argc, const_cast<char**>(argv), "+e:ntTx")) != -1) {
|
|
|
|
switch (opt) {
|
|
|
|
case 'e':
|
|
|
|
if (!(strlen(optarg) == 1 || strcmp(optarg, "none") == 0)) {
|
2018-10-23 02:02:51 +02:00
|
|
|
error_exit("-e requires a single-character argument or 'none'");
|
2016-10-19 23:47:11 +02:00
|
|
|
}
|
|
|
|
escape_char = (strcmp(optarg, "none") == 0) ? 0 : optarg[0];
|
|
|
|
break;
|
|
|
|
case 'n':
|
|
|
|
close_stdin();
|
|
|
|
break;
|
|
|
|
case 'x':
|
|
|
|
// This option basically asks for historical behavior, so set options that
|
|
|
|
// correspond to the historical defaults. This is slightly weird in that -Tx
|
|
|
|
// is fine (because we'll undo the -T) but -xT isn't, but that does seem to
|
|
|
|
// be our least worst choice...
|
|
|
|
use_shell_protocol = false;
|
|
|
|
tty = kPtyDefinitely;
|
|
|
|
escape_char = '~';
|
|
|
|
break;
|
|
|
|
case 't':
|
|
|
|
// Like ssh, -t arguments are cumulative so that multiple -t's
|
|
|
|
// are needed to force a PTY.
|
|
|
|
tty = (tty >= kPtyYes) ? kPtyDefinitely : kPtyYes;
|
|
|
|
break;
|
|
|
|
case 'T':
|
|
|
|
tty = kPtyNo;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
// getopt(3) already printed an error message for us.
|
2015-11-04 22:36:32 +01:00
|
|
|
return 1;
|
2015-11-03 20:18:40 +01:00
|
|
|
}
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
|
2016-10-19 23:47:11 +02:00
|
|
|
bool is_interactive = (optind == argc);
|
|
|
|
|
|
|
|
std::string shell_type_arg = kShellServiceArgPty;
|
|
|
|
if (tty == kPtyNo) {
|
|
|
|
shell_type_arg = kShellServiceArgRaw;
|
|
|
|
} else if (tty == kPtyAuto) {
|
|
|
|
// If stdin isn't a TTY, default to a raw shell; this lets
|
|
|
|
// things like `adb shell < my_script.sh` work as expected.
|
|
|
|
// Non-interactive shells should also not have a pty.
|
|
|
|
if (!unix_isatty(STDIN_FILENO) || !is_interactive) {
|
|
|
|
shell_type_arg = kShellServiceArgRaw;
|
|
|
|
}
|
|
|
|
} else if (tty == kPtyYes) {
|
|
|
|
// A single -t arg isn't enough to override implicit -T.
|
|
|
|
if (!unix_isatty(STDIN_FILENO)) {
|
|
|
|
fprintf(stderr,
|
|
|
|
"Remote PTY will not be allocated because stdin is not a terminal.\n"
|
|
|
|
"Use multiple -t options to force remote PTY allocation.\n");
|
|
|
|
shell_type_arg = kShellServiceArgRaw;
|
2016-01-28 01:07:52 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-19 23:47:11 +02:00
|
|
|
D("shell -e 0x%x t=%d use_shell_protocol=%s shell_type_arg=%s\n",
|
|
|
|
escape_char, tty,
|
|
|
|
use_shell_protocol ? "true" : "false",
|
|
|
|
(shell_type_arg == kShellServiceArgPty) ? "pty" : "raw");
|
|
|
|
|
|
|
|
// Raw mode is only supported when talking to a new device *and* using the shell protocol.
|
|
|
|
if (!use_shell_protocol) {
|
|
|
|
if (shell_type_arg != kShellServiceArgPty) {
|
|
|
|
fprintf(stderr, "error: %s only supports allocating a pty\n",
|
|
|
|
!CanUseFeature(features, kFeatureShell2) ? "device" : "-x");
|
|
|
|
return 1;
|
2015-11-03 20:18:40 +01:00
|
|
|
} else {
|
2016-10-19 23:47:11 +02:00
|
|
|
// If we're not using the shell protocol, the type argument must be empty.
|
|
|
|
shell_type_arg = "";
|
2015-11-03 20:18:40 +01:00
|
|
|
}
|
|
|
|
}
|
2015-09-22 19:43:08 +02:00
|
|
|
|
2015-11-03 20:18:40 +01:00
|
|
|
std::string command;
|
2016-10-19 23:47:11 +02:00
|
|
|
if (optind < argc) {
|
2015-11-03 20:18:40 +01:00
|
|
|
// We don't escape here, just like ssh(1). http://b/20564385.
|
2016-10-19 23:47:11 +02:00
|
|
|
command = android::base::Join(std::vector<const char*>(argv + optind, argv + argc), ' ');
|
2015-09-15 00:33:50 +02:00
|
|
|
}
|
2015-11-03 20:18:40 +01:00
|
|
|
|
2018-12-12 19:48:50 +01:00
|
|
|
std::string service_string = ShellServiceString(use_shell_protocol, shell_type_arg, command);
|
|
|
|
return RemoteShell(use_shell_protocol, shell_type_arg, escape_char, command.empty(),
|
|
|
|
service_string);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int adb_abb(int argc, const char** argv) {
|
2019-01-17 22:13:56 +01:00
|
|
|
FeatureSet features;
|
|
|
|
std::string error_message;
|
|
|
|
if (!adb_get_feature_set(&features, &error_message)) {
|
|
|
|
fprintf(stderr, "error: %s\n", error_message.c_str());
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!CanUseFeature(features, kFeatureAbb)) {
|
|
|
|
error_exit("abb is not supported by the device");
|
|
|
|
}
|
|
|
|
|
2018-12-12 19:48:50 +01:00
|
|
|
// Defaults.
|
|
|
|
constexpr char escape_char = '~'; // -e
|
|
|
|
constexpr bool use_shell_protocol = true;
|
|
|
|
constexpr auto shell_type_arg = kShellServiceArgRaw;
|
|
|
|
constexpr bool empty_command = false;
|
|
|
|
|
|
|
|
std::string service_string("abb:");
|
|
|
|
for (auto i = optind; i < argc; ++i) {
|
|
|
|
service_string.append(argv[i]);
|
|
|
|
service_string.push_back(ABB_ARG_DELIMETER);
|
|
|
|
}
|
|
|
|
|
|
|
|
D("abb -e 0x%x [%*.s]\n", escape_char, static_cast<int>(service_string.size()),
|
|
|
|
service_string.data());
|
|
|
|
|
|
|
|
return RemoteShell(use_shell_protocol, shell_type_arg, escape_char, empty_command,
|
|
|
|
service_string);
|
2015-09-15 00:33:50 +02:00
|
|
|
}
|
|
|
|
|
2017-05-02 23:31:59 +02:00
|
|
|
static int adb_sideload_legacy(const char* filename, int in_fd, int size) {
|
2015-04-29 17:35:59 +02:00
|
|
|
std::string error;
|
2019-01-24 00:36:42 +01:00
|
|
|
unique_fd out_fd(adb_connect(android::base::StringPrintf("sideload:%d", size), &error));
|
2017-05-02 23:31:59 +02:00
|
|
|
if (out_fd < 0) {
|
|
|
|
fprintf(stderr, "adb: pre-KitKat sideload connection failed: %s\n", error.c_str());
|
2012-01-09 23:54:53 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int opt = CHUNK_SIZE;
|
2017-05-02 23:31:59 +02:00
|
|
|
opt = adb_setsockopt(out_fd, SOL_SOCKET, SO_SNDBUF, &opt, sizeof(opt));
|
|
|
|
|
|
|
|
char buf[CHUNK_SIZE];
|
|
|
|
int total = size;
|
|
|
|
while (size > 0) {
|
|
|
|
unsigned xfer = (size > CHUNK_SIZE) ? CHUNK_SIZE : size;
|
|
|
|
if (!ReadFdExactly(in_fd, buf, xfer)) {
|
|
|
|
fprintf(stderr, "adb: failed to read data from %s: %s\n", filename, strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (!WriteFdExactly(out_fd, buf, xfer)) {
|
2015-04-29 17:35:59 +02:00
|
|
|
std::string error;
|
2017-05-02 23:31:59 +02:00
|
|
|
adb_status(out_fd, &error);
|
|
|
|
fprintf(stderr, "adb: failed to write data: %s\n", error.c_str());
|
2012-01-09 23:54:53 +01:00
|
|
|
return -1;
|
|
|
|
}
|
2017-05-02 23:31:59 +02:00
|
|
|
size -= xfer;
|
|
|
|
printf("sending: '%s' %4d%% \r", filename, (int)(100LL - ((100LL * size) / (total))));
|
2017-03-22 01:14:18 +01:00
|
|
|
fflush(stdout);
|
2012-01-09 23:54:53 +01:00
|
|
|
}
|
2017-03-22 01:14:18 +01:00
|
|
|
printf("\n");
|
2012-01-09 23:54:53 +01:00
|
|
|
|
2017-05-02 23:31:59 +02:00
|
|
|
if (!adb_status(out_fd, &error)) {
|
|
|
|
fprintf(stderr, "adb: error response: %s\n", error.c_str());
|
2012-01-09 23:54:53 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-06-27 00:35:36 +02:00
|
|
|
#define SIDELOAD_HOST_BLOCK_SIZE (CHUNK_SIZE)
|
|
|
|
|
2019-04-08 08:24:03 +02:00
|
|
|
// Connects to the sideload / rescue service on the device (served by minadbd) and sends over the
|
|
|
|
// data in an OTA package.
|
|
|
|
//
|
|
|
|
// It uses a simple protocol as follows.
|
|
|
|
//
|
|
|
|
// - The connect message includes the total number of bytes in the file and a block size chosen by
|
|
|
|
// us.
|
|
|
|
//
|
|
|
|
// - The other side sends the desired block number as eight decimal digits (e.g. "00000023" for
|
|
|
|
// block 23). Blocks are numbered from zero.
|
|
|
|
//
|
|
|
|
// - We send back the data of the requested block. The last block is likely to be partial; when the
|
|
|
|
// last block is requested we only send the part of the block that exists, it's not padded up to
|
|
|
|
// the block size.
|
|
|
|
//
|
|
|
|
// - When the other side sends "DONEDONE" or "FAILFAIL" instead of a block number, we have done all
|
|
|
|
// the data transfer.
|
|
|
|
//
|
|
|
|
static int adb_sideload_install(const char* filename, bool rescue_mode) {
|
2017-04-18 23:34:16 +02:00
|
|
|
// TODO: use a LinePrinter instead...
|
2017-03-22 01:14:18 +01:00
|
|
|
struct stat sb;
|
|
|
|
if (stat(filename, &sb) == -1) {
|
2017-05-02 23:31:59 +02:00
|
|
|
fprintf(stderr, "adb: failed to stat file %s: %s\n", filename, strerror(errno));
|
2017-03-22 01:14:18 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
unique_fd package_fd(adb_open(filename, O_RDONLY));
|
|
|
|
if (package_fd == -1) {
|
2017-05-02 23:31:59 +02:00
|
|
|
fprintf(stderr, "adb: failed to open file %s: %s\n", filename, strerror(errno));
|
2014-06-27 00:35:36 +02:00
|
|
|
return -1;
|
|
|
|
}
|
2016-05-27 07:43:19 +02:00
|
|
|
|
2019-04-08 08:24:03 +02:00
|
|
|
std::string service = android::base::StringPrintf(
|
|
|
|
"%s:%" PRId64 ":%d", rescue_mode ? "rescue-install" : "sideload-host",
|
|
|
|
static_cast<int64_t>(sb.st_size), SIDELOAD_HOST_BLOCK_SIZE);
|
2015-04-29 17:35:59 +02:00
|
|
|
std::string error;
|
2017-03-22 01:14:18 +01:00
|
|
|
unique_fd device_fd(adb_connect(service, &error));
|
|
|
|
if (device_fd < 0) {
|
2017-05-02 23:31:59 +02:00
|
|
|
fprintf(stderr, "adb: sideload connection failed: %s\n", error.c_str());
|
2018-09-20 22:59:49 +02:00
|
|
|
|
2019-04-08 08:24:03 +02:00
|
|
|
if (rescue_mode) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2018-09-20 22:59:49 +02:00
|
|
|
// If this is a small enough package, maybe this is an older device that doesn't
|
|
|
|
// support sideload-host. Try falling back to the older (<= K) sideload method.
|
|
|
|
if (sb.st_size > INT_MAX) {
|
|
|
|
return -1;
|
|
|
|
}
|
2017-05-02 23:31:59 +02:00
|
|
|
fprintf(stderr, "adb: trying pre-KitKat sideload method...\n");
|
2019-04-25 23:04:57 +02:00
|
|
|
return adb_sideload_legacy(filename, package_fd.get(), static_cast<int>(sb.st_size));
|
2014-06-27 00:35:36 +02:00
|
|
|
}
|
|
|
|
|
2016-05-27 07:43:19 +02:00
|
|
|
int opt = SIDELOAD_HOST_BLOCK_SIZE;
|
2017-03-22 01:14:18 +01:00
|
|
|
adb_setsockopt(device_fd, SOL_SOCKET, SO_SNDBUF, &opt, sizeof(opt));
|
|
|
|
|
|
|
|
char buf[SIDELOAD_HOST_BLOCK_SIZE];
|
2014-06-27 00:35:36 +02:00
|
|
|
|
2018-09-20 22:59:49 +02:00
|
|
|
int64_t xfer = 0;
|
2016-05-27 07:43:19 +02:00
|
|
|
int last_percent = -1;
|
2015-04-18 02:03:59 +02:00
|
|
|
while (true) {
|
2017-03-22 01:14:18 +01:00
|
|
|
if (!ReadFdExactly(device_fd, buf, 8)) {
|
2017-05-02 23:31:59 +02:00
|
|
|
fprintf(stderr, "adb: failed to read command: %s\n", strerror(errno));
|
2016-05-27 07:43:19 +02:00
|
|
|
return -1;
|
2014-06-27 00:35:36 +02:00
|
|
|
}
|
2015-04-29 21:28:13 +02:00
|
|
|
buf[8] = '\0';
|
2014-06-27 00:35:36 +02:00
|
|
|
|
2019-04-23 08:14:28 +02:00
|
|
|
if (strcmp(kMinadbdServicesExitSuccess, buf) == 0 ||
|
|
|
|
strcmp(kMinadbdServicesExitFailure, buf) == 0) {
|
2016-05-27 07:43:19 +02:00
|
|
|
printf("\rTotal xfer: %.2fx%*s\n",
|
2017-03-22 01:14:18 +01:00
|
|
|
static_cast<double>(xfer) / (sb.st_size ? sb.st_size : 1),
|
|
|
|
static_cast<int>(strlen(filename) + 10), "");
|
2019-04-23 08:14:28 +02:00
|
|
|
if (strcmp(kMinadbdServicesExitFailure, buf) == 0) {
|
2019-04-08 08:24:03 +02:00
|
|
|
return 1;
|
|
|
|
}
|
2016-05-27 07:43:19 +02:00
|
|
|
return 0;
|
2014-06-27 00:35:36 +02:00
|
|
|
}
|
|
|
|
|
2018-09-20 22:59:49 +02:00
|
|
|
int64_t block = strtoll(buf, nullptr, 10);
|
|
|
|
int64_t offset = block * SIDELOAD_HOST_BLOCK_SIZE;
|
|
|
|
if (offset >= static_cast<int64_t>(sb.st_size)) {
|
|
|
|
fprintf(stderr,
|
|
|
|
"adb: failed to read block %" PRId64 " at offset %" PRId64 ", past end %" PRId64
|
|
|
|
"\n",
|
|
|
|
block, offset, static_cast<int64_t>(sb.st_size));
|
2016-05-27 07:43:19 +02:00
|
|
|
return -1;
|
2014-06-27 00:35:36 +02:00
|
|
|
}
|
2017-03-22 01:14:18 +01:00
|
|
|
|
2014-06-27 00:35:36 +02:00
|
|
|
size_t to_write = SIDELOAD_HOST_BLOCK_SIZE;
|
2018-09-20 22:59:49 +02:00
|
|
|
if ((offset + SIDELOAD_HOST_BLOCK_SIZE) > static_cast<int64_t>(sb.st_size)) {
|
2017-03-22 01:14:18 +01:00
|
|
|
to_write = sb.st_size - offset;
|
2014-06-27 00:35:36 +02:00
|
|
|
}
|
|
|
|
|
2018-09-20 22:59:49 +02:00
|
|
|
if (adb_lseek(package_fd, offset, SEEK_SET) != offset) {
|
2017-05-02 23:31:59 +02:00
|
|
|
fprintf(stderr, "adb: failed to seek to package block: %s\n", strerror(errno));
|
2017-03-22 01:14:18 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (!ReadFdExactly(package_fd, buf, to_write)) {
|
2017-05-02 23:31:59 +02:00
|
|
|
fprintf(stderr, "adb: failed to read package block: %s\n", strerror(errno));
|
2017-03-22 01:14:18 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!WriteFdExactly(device_fd, buf, to_write)) {
|
|
|
|
adb_status(device_fd, &error);
|
2017-05-02 23:31:59 +02:00
|
|
|
fprintf(stderr, "adb: failed to write data '%s' *\n", error.c_str());
|
2016-05-27 07:43:19 +02:00
|
|
|
return -1;
|
2014-06-27 00:35:36 +02:00
|
|
|
}
|
|
|
|
xfer += to_write;
|
|
|
|
|
|
|
|
// For normal OTA packages, we expect to transfer every byte
|
|
|
|
// twice, plus a bit of overhead (one read during
|
|
|
|
// verification, one read of each byte for installation, plus
|
|
|
|
// extra access to things like the zip central directory).
|
|
|
|
// This estimate of the completion becomes 100% when we've
|
|
|
|
// transferred ~2.13 (=100/47) times the package size.
|
2017-03-22 01:14:18 +01:00
|
|
|
int percent = static_cast<int>(xfer * 47LL / (sb.st_size ? sb.st_size : 1));
|
2014-06-27 00:35:36 +02:00
|
|
|
if (percent != last_percent) {
|
2017-03-22 01:14:18 +01:00
|
|
|
printf("\rserving: '%s' (~%d%%) ", filename, percent);
|
2014-06-27 00:35:36 +02:00
|
|
|
fflush(stdout);
|
|
|
|
last_percent = percent;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-23 08:14:28 +02:00
|
|
|
static int adb_wipe_devices() {
|
|
|
|
auto wipe_devices_message_size = strlen(kMinadbdServicesExitSuccess);
|
|
|
|
std::string error;
|
|
|
|
unique_fd fd(adb_connect(
|
|
|
|
android::base::StringPrintf("rescue-wipe:userdata:%zu", wipe_devices_message_size),
|
|
|
|
&error));
|
|
|
|
if (fd < 0) {
|
|
|
|
fprintf(stderr, "adb: wipe device connection failed: %s\n", error.c_str());
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string message(wipe_devices_message_size, '\0');
|
|
|
|
if (!ReadFdExactly(fd, message.data(), wipe_devices_message_size)) {
|
|
|
|
fprintf(stderr, "adb: failed to read wipe result: %s\n", strerror(errno));
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (message == kMinadbdServicesExitSuccess) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (message != kMinadbdServicesExitFailure) {
|
|
|
|
fprintf(stderr, "adb: got unexpected message from rescue wipe %s\n", message.c_str());
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2009-03-04 04:32:55 +01:00
|
|
|
/**
|
|
|
|
* Run ppp in "notty" mode against a resource listed as the first parameter
|
|
|
|
* eg:
|
|
|
|
*
|
|
|
|
* ppp dev:/dev/omap_csmi_tty0 <ppp options>
|
|
|
|
*
|
|
|
|
*/
|
2015-04-17 22:57:15 +02:00
|
|
|
static int ppp(int argc, const char** argv) {
|
2014-11-11 18:24:11 +01:00
|
|
|
#if defined(_WIN32)
|
2018-10-23 02:02:51 +02:00
|
|
|
error_exit("adb %s not implemented on Win32", argv[0]);
|
2018-10-19 22:59:44 +02:00
|
|
|
__builtin_unreachable();
|
2009-03-04 04:32:55 +01:00
|
|
|
#else
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc < 2) error_exit("usage: adb %s <adb service name> [ppp opts]", argv[0]);
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2015-02-26 02:51:28 +01:00
|
|
|
const char* adb_service_name = argv[1];
|
2018-10-19 22:59:44 +02:00
|
|
|
std::string error_message;
|
|
|
|
int fd = adb_connect(adb_service_name, &error_message);
|
2015-04-29 17:35:59 +02:00
|
|
|
if (fd < 0) {
|
2018-10-23 02:02:51 +02:00
|
|
|
error_exit("could not open adb service %s: %s", adb_service_name, error_message.c_str());
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
|
2015-04-29 17:35:59 +02:00
|
|
|
pid_t pid = fork();
|
2018-10-19 22:59:44 +02:00
|
|
|
if (pid == -1) {
|
2018-10-23 02:02:51 +02:00
|
|
|
perror_exit("fork failed");
|
2018-10-19 22:59:44 +02:00
|
|
|
}
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2018-10-19 22:59:44 +02:00
|
|
|
if (pid == 0) {
|
|
|
|
// child side
|
2009-03-04 04:32:55 +01:00
|
|
|
int i;
|
|
|
|
|
|
|
|
// copy args
|
2018-10-19 22:59:44 +02:00
|
|
|
const char** ppp_args = (const char**)alloca(sizeof(char*) * argc + 1);
|
2009-03-04 04:32:55 +01:00
|
|
|
ppp_args[0] = "pppd";
|
|
|
|
for (i = 2 ; i < argc ; i++) {
|
|
|
|
//argv[2] and beyond become ppp_args[1] and beyond
|
|
|
|
ppp_args[i - 1] = argv[i];
|
|
|
|
}
|
2018-07-14 03:15:16 +02:00
|
|
|
ppp_args[i-1] = nullptr;
|
2009-03-04 04:32:55 +01:00
|
|
|
|
|
|
|
dup2(fd, STDIN_FILENO);
|
|
|
|
dup2(fd, STDOUT_FILENO);
|
|
|
|
adb_close(STDERR_FILENO);
|
|
|
|
adb_close(fd);
|
|
|
|
|
2018-10-19 22:59:44 +02:00
|
|
|
execvp("pppd", (char* const*)ppp_args);
|
2018-10-23 02:02:51 +02:00
|
|
|
perror_exit("exec pppd failed");
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
2018-10-19 22:59:44 +02:00
|
|
|
|
|
|
|
// parent side
|
|
|
|
adb_close(fd);
|
|
|
|
return 0;
|
2014-11-11 18:24:11 +01:00
|
|
|
#endif /* !defined(_WIN32) */
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
|
2019-03-11 23:39:44 +01:00
|
|
|
static bool wait_for_device(const char* service,
|
|
|
|
std::optional<std::chrono::milliseconds> timeout = std::nullopt) {
|
2016-04-13 21:14:16 +02:00
|
|
|
std::vector<std::string> components = android::base::Split(service, "-");
|
|
|
|
if (components.size() < 3 || components.size() > 4) {
|
2015-11-27 18:56:48 +01:00
|
|
|
fprintf(stderr, "adb: couldn't parse 'wait-for' command: %s\n", service);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2017-08-17 01:57:01 +02:00
|
|
|
TransportType t;
|
|
|
|
adb_get_transport(&t, nullptr, nullptr);
|
|
|
|
|
2015-05-05 04:29:32 +02:00
|
|
|
// Was the caller vague about what they'd like us to wait for?
|
|
|
|
// If so, check they weren't more specific in their choice of transport type.
|
2016-04-13 21:14:16 +02:00
|
|
|
if (components.size() == 3) {
|
|
|
|
auto it = components.begin() + 2;
|
2015-05-05 04:29:32 +02:00
|
|
|
if (t == kTransportUsb) {
|
2016-04-13 21:14:16 +02:00
|
|
|
components.insert(it, "usb");
|
2015-05-05 04:29:32 +02:00
|
|
|
} else if (t == kTransportLocal) {
|
2016-04-13 21:14:16 +02:00
|
|
|
components.insert(it, "local");
|
2015-05-05 04:29:32 +02:00
|
|
|
} else {
|
2016-04-13 21:14:16 +02:00
|
|
|
components.insert(it, "any");
|
2015-05-05 04:29:32 +02:00
|
|
|
}
|
2016-04-13 21:14:16 +02:00
|
|
|
} else if (components[2] != "any" && components[2] != "local" && components[2] != "usb") {
|
|
|
|
fprintf(stderr, "adb: unknown type %s; expected 'any', 'local', or 'usb'\n",
|
|
|
|
components[2].c_str());
|
|
|
|
return false;
|
2015-05-05 04:29:32 +02:00
|
|
|
}
|
|
|
|
|
2016-04-13 21:18:58 +02:00
|
|
|
if (components[3] != "any" && components[3] != "bootloader" && components[3] != "device" &&
|
2019-04-08 08:24:03 +02:00
|
|
|
components[3] != "recovery" && components[3] != "rescue" && components[3] != "sideload" &&
|
2019-02-22 23:01:36 +01:00
|
|
|
components[3] != "disconnect") {
|
2016-04-13 21:14:16 +02:00
|
|
|
fprintf(stderr,
|
|
|
|
"adb: unknown state %s; "
|
2019-04-08 08:24:03 +02:00
|
|
|
"expected 'any', 'bootloader', 'device', 'recovery', 'rescue', 'sideload', or "
|
|
|
|
"'disconnect'\n",
|
2016-04-13 21:14:16 +02:00
|
|
|
components[3].c_str());
|
2015-11-27 18:56:48 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2017-08-17 01:57:01 +02:00
|
|
|
std::string cmd = format_host_command(android::base::Join(components, "-").c_str());
|
2019-03-11 23:39:44 +01:00
|
|
|
if (timeout) {
|
|
|
|
std::thread([timeout]() {
|
|
|
|
std::this_thread::sleep_for(*timeout);
|
|
|
|
fprintf(stderr, "timeout expired while waiting for device\n");
|
|
|
|
_exit(1);
|
|
|
|
}).detach();
|
|
|
|
}
|
2015-05-30 02:55:19 +02:00
|
|
|
return adb_command(cmd);
|
2015-05-05 04:29:32 +02:00
|
|
|
}
|
|
|
|
|
2016-03-05 00:16:18 +01:00
|
|
|
static bool adb_root(const char* command) {
|
|
|
|
std::string error;
|
|
|
|
|
2019-02-23 00:20:27 +01:00
|
|
|
TransportId transport_id;
|
|
|
|
unique_fd fd(adb_connect(&transport_id, android::base::StringPrintf("%s:", command), &error));
|
2016-05-27 07:43:19 +02:00
|
|
|
if (fd < 0) {
|
2016-03-05 00:16:18 +01:00
|
|
|
fprintf(stderr, "adb: unable to connect for %s: %s\n", command, error.c_str());
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Figure out whether we actually did anything.
|
|
|
|
char buf[256];
|
|
|
|
char* cur = buf;
|
|
|
|
ssize_t bytes_left = sizeof(buf);
|
|
|
|
while (bytes_left > 0) {
|
2016-05-27 07:43:19 +02:00
|
|
|
ssize_t bytes_read = adb_read(fd, cur, bytes_left);
|
2016-03-05 00:16:18 +01:00
|
|
|
if (bytes_read == 0) {
|
|
|
|
break;
|
|
|
|
} else if (bytes_read < 0) {
|
|
|
|
fprintf(stderr, "adb: error while reading for %s: %s\n", command, strerror(errno));
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
cur += bytes_read;
|
|
|
|
bytes_left -= bytes_read;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (bytes_left == 0) {
|
|
|
|
fprintf(stderr, "adb: unexpected output length for %s\n", command);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
fflush(stdout);
|
|
|
|
WriteFdExactly(STDOUT_FILENO, buf, sizeof(buf) - bytes_left);
|
|
|
|
if (cur != buf && strstr(buf, "restarting") == nullptr) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2019-02-23 00:20:27 +01:00
|
|
|
// Wait for the device to go away.
|
2019-03-11 23:39:44 +01:00
|
|
|
TransportType previous_type;
|
|
|
|
const char* previous_serial;
|
|
|
|
TransportId previous_id;
|
|
|
|
adb_get_transport(&previous_type, &previous_serial, &previous_id);
|
|
|
|
|
2019-02-23 00:20:27 +01:00
|
|
|
adb_set_transport(kTransportAny, nullptr, transport_id);
|
|
|
|
wait_for_device("wait-for-disconnect");
|
2019-03-11 23:39:44 +01:00
|
|
|
|
|
|
|
// Wait for the device to come back.
|
|
|
|
// If we were using a specific transport ID, there's nothing we can wait for.
|
|
|
|
if (previous_id == 0) {
|
|
|
|
adb_set_transport(previous_type, previous_serial, 0);
|
2019-05-02 03:51:46 +02:00
|
|
|
wait_for_device("wait-for-device", 6000ms);
|
2019-03-11 23:39:44 +01:00
|
|
|
}
|
|
|
|
|
2016-06-16 23:00:09 +02:00
|
|
|
return true;
|
2016-03-05 00:16:18 +01:00
|
|
|
}
|
|
|
|
|
2017-08-17 01:57:01 +02:00
|
|
|
int send_shell_command(const std::string& command, bool disable_shell_protocol,
|
|
|
|
StandardStreamsCallbackInterface* callback) {
|
2019-01-24 00:36:42 +01:00
|
|
|
unique_fd fd;
|
2015-09-30 22:35:42 +02:00
|
|
|
bool use_shell_protocol = false;
|
|
|
|
|
2015-04-17 19:59:34 +02:00
|
|
|
while (true) {
|
2016-01-22 04:56:50 +01:00
|
|
|
bool attempt_connection = true;
|
|
|
|
|
2016-07-26 21:14:39 +02:00
|
|
|
// Use shell protocol if it's supported and the caller doesn't explicitly
|
|
|
|
// disable it.
|
2016-01-22 04:56:50 +01:00
|
|
|
if (!disable_shell_protocol) {
|
|
|
|
FeatureSet features;
|
2016-02-01 04:12:26 +01:00
|
|
|
std::string error;
|
|
|
|
if (adb_get_feature_set(&features, &error)) {
|
2016-01-22 04:56:50 +01:00
|
|
|
use_shell_protocol = CanUseFeature(features, kFeatureShell2);
|
|
|
|
} else {
|
|
|
|
// Device was unreachable.
|
|
|
|
attempt_connection = false;
|
|
|
|
}
|
2015-04-29 17:35:59 +02:00
|
|
|
}
|
2016-01-22 04:56:50 +01:00
|
|
|
|
|
|
|
if (attempt_connection) {
|
|
|
|
std::string error;
|
|
|
|
std::string service_string = ShellServiceString(use_shell_protocol, "", command);
|
|
|
|
|
2019-01-24 00:36:42 +01:00
|
|
|
fd.reset(adb_connect(service_string, &error));
|
2016-01-22 04:56:50 +01:00
|
|
|
if (fd >= 0) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-07-26 21:14:39 +02:00
|
|
|
fprintf(stderr, "- waiting for device -\n");
|
2017-08-17 01:57:01 +02:00
|
|
|
if (!wait_for_device("wait-for-device")) {
|
2016-02-25 00:16:17 +01:00
|
|
|
return 1;
|
|
|
|
}
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
|
2019-01-24 00:36:42 +01:00
|
|
|
return read_and_dump(fd.get(), use_shell_protocol, callback);
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
|
2017-08-17 01:57:01 +02:00
|
|
|
static int logcat(int argc, const char** argv) {
|
2015-04-17 19:59:34 +02:00
|
|
|
char* log_tags = getenv("ANDROID_LOG_TAGS");
|
|
|
|
std::string quoted = escape_arg(log_tags == nullptr ? "" : log_tags);
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2015-09-30 22:35:42 +02:00
|
|
|
std::string cmd = "export ANDROID_LOG_TAGS=\"" + quoted + "\"; exec logcat";
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2014-06-10 20:31:24 +02:00
|
|
|
if (!strcmp(argv[0], "longcat")) {
|
2015-04-17 19:59:34 +02:00
|
|
|
cmd += " -v long";
|
2011-11-30 22:00:33 +01:00
|
|
|
}
|
|
|
|
|
2015-04-18 05:11:08 +02:00
|
|
|
--argc;
|
|
|
|
++argv;
|
2015-04-17 19:59:34 +02:00
|
|
|
while (argc-- > 0) {
|
2015-04-18 05:11:08 +02:00
|
|
|
cmd += " " + escape_arg(*argv++);
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
|
2018-06-14 19:46:05 +02:00
|
|
|
return send_shell_command(cmd);
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
|
2019-04-25 23:04:57 +02:00
|
|
|
static void write_zeros(int bytes, borrowed_fd fd) {
|
2016-07-06 22:22:22 +02:00
|
|
|
int old_stdin_mode = -1;
|
|
|
|
int old_stdout_mode = -1;
|
2018-07-19 06:18:27 +02:00
|
|
|
std::vector<char> buf(bytes);
|
2016-07-06 22:22:22 +02:00
|
|
|
|
2019-04-25 23:04:57 +02:00
|
|
|
D("write_zeros(%d) -> %d", bytes, fd.get());
|
2016-07-06 22:22:22 +02:00
|
|
|
|
2019-04-25 23:04:57 +02:00
|
|
|
stdinout_raw_prologue(-1, fd.get(), old_stdin_mode, old_stdout_mode);
|
2016-07-06 22:22:22 +02:00
|
|
|
|
|
|
|
if (fd == STDOUT_FILENO) {
|
2018-07-19 06:18:27 +02:00
|
|
|
fwrite(buf.data(), 1, bytes, stdout);
|
2016-07-06 22:22:22 +02:00
|
|
|
fflush(stdout);
|
|
|
|
} else {
|
2018-07-19 06:18:27 +02:00
|
|
|
adb_write(fd, buf.data(), bytes);
|
2016-07-06 22:22:22 +02:00
|
|
|
}
|
|
|
|
|
2019-04-25 23:04:57 +02:00
|
|
|
stdinout_raw_prologue(-1, fd.get(), old_stdin_mode, old_stdout_mode);
|
2016-07-06 22:22:22 +02:00
|
|
|
|
|
|
|
D("write_zeros() finished");
|
|
|
|
}
|
|
|
|
|
2015-02-26 02:51:28 +01:00
|
|
|
static int backup(int argc, const char** argv) {
|
2019-05-09 18:14:05 +02:00
|
|
|
fprintf(stdout, "WARNING: adb backup is deprecated and may be removed in a future release\n");
|
|
|
|
|
2015-08-22 05:31:31 +02:00
|
|
|
const char* filename = "backup.ab";
|
2011-04-21 21:53:28 +02:00
|
|
|
|
2011-06-02 02:56:23 +02:00
|
|
|
/* find, extract, and use any -f argument */
|
2015-04-18 05:11:08 +02:00
|
|
|
for (int i = 1; i < argc; i++) {
|
2011-06-02 02:56:23 +02:00
|
|
|
if (!strcmp("-f", argv[i])) {
|
2018-10-23 02:02:51 +02:00
|
|
|
if (i == argc - 1) error_exit("backup -f passed with no filename");
|
2011-06-02 02:56:23 +02:00
|
|
|
filename = argv[i+1];
|
2015-04-18 05:11:08 +02:00
|
|
|
for (int j = i+2; j <= argc; ) {
|
2011-06-02 02:56:23 +02:00
|
|
|
argv[i++] = argv[j++];
|
|
|
|
}
|
|
|
|
argc -= 2;
|
2018-07-14 03:15:16 +02:00
|
|
|
argv[argc] = nullptr;
|
2011-06-02 02:56:23 +02:00
|
|
|
}
|
2011-04-21 21:53:28 +02:00
|
|
|
}
|
|
|
|
|
2015-11-13 20:04:10 +01:00
|
|
|
// Bare "adb backup" or "adb backup -f filename" are not valid invocations ---
|
|
|
|
// a list of packages is required.
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc < 2) error_exit("backup either needs a list of packages or -all/-shared");
|
2011-08-23 02:12:08 +02:00
|
|
|
|
2011-12-09 04:04:34 +01:00
|
|
|
adb_unlink(filename);
|
2019-01-24 00:36:42 +01:00
|
|
|
unique_fd outFd(adb_creat(filename, 0640));
|
2011-04-21 21:53:28 +02:00
|
|
|
if (outFd < 0) {
|
2015-11-13 20:04:10 +01:00
|
|
|
fprintf(stderr, "adb: backup unable to create file '%s': %s\n", filename, strerror(errno));
|
|
|
|
return EXIT_FAILURE;
|
2011-04-21 21:53:28 +02:00
|
|
|
}
|
|
|
|
|
2015-04-18 05:11:08 +02:00
|
|
|
std::string cmd = "backup:";
|
|
|
|
--argc;
|
|
|
|
++argv;
|
|
|
|
while (argc-- > 0) {
|
|
|
|
cmd += " " + escape_arg(*argv++);
|
2011-04-21 21:53:28 +02:00
|
|
|
}
|
|
|
|
|
2015-09-03 02:44:28 +02:00
|
|
|
D("backup. filename=%s cmd=%s", filename, cmd.c_str());
|
2015-04-29 17:35:59 +02:00
|
|
|
std::string error;
|
2019-01-24 00:36:42 +01:00
|
|
|
unique_fd fd(adb_connect(cmd, &error));
|
2011-04-21 21:53:28 +02:00
|
|
|
if (fd < 0) {
|
2015-04-29 17:35:59 +02:00
|
|
|
fprintf(stderr, "adb: unable to connect for backup: %s\n", error.c_str());
|
2015-11-13 20:04:10 +01:00
|
|
|
return EXIT_FAILURE;
|
2011-04-21 21:53:28 +02:00
|
|
|
}
|
|
|
|
|
2017-04-18 23:34:16 +02:00
|
|
|
fprintf(stdout, "Now unlock your device and confirm the backup operation...\n");
|
2015-11-13 20:04:10 +01:00
|
|
|
fflush(stdout);
|
|
|
|
|
2019-01-24 00:36:42 +01:00
|
|
|
copy_to_file(fd.get(), outFd.get());
|
2015-11-13 20:04:10 +01:00
|
|
|
return EXIT_SUCCESS;
|
2011-04-21 21:53:28 +02:00
|
|
|
}
|
|
|
|
|
2015-02-26 02:51:28 +01:00
|
|
|
static int restore(int argc, const char** argv) {
|
2019-05-09 18:14:05 +02:00
|
|
|
fprintf(stdout, "WARNING: adb restore is deprecated and may be removed in a future release\n");
|
|
|
|
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc != 2) error_exit("restore requires an argument");
|
2011-05-18 00:52:54 +02:00
|
|
|
|
2015-04-29 17:35:59 +02:00
|
|
|
const char* filename = argv[1];
|
2019-01-24 00:36:42 +01:00
|
|
|
unique_fd tarFd(adb_open(filename, O_RDONLY));
|
2011-05-18 00:52:54 +02:00
|
|
|
if (tarFd < 0) {
|
2015-04-29 17:35:59 +02:00
|
|
|
fprintf(stderr, "adb: unable to open file %s: %s\n", filename, strerror(errno));
|
2011-05-18 00:52:54 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-04-29 17:35:59 +02:00
|
|
|
std::string error;
|
2019-01-24 00:36:42 +01:00
|
|
|
unique_fd fd(adb_connect("restore:", &error));
|
2011-05-18 00:52:54 +02:00
|
|
|
if (fd < 0) {
|
2015-04-29 17:35:59 +02:00
|
|
|
fprintf(stderr, "adb: unable to connect for restore: %s\n", error.c_str());
|
2011-05-18 00:52:54 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2017-04-18 23:34:16 +02:00
|
|
|
fprintf(stdout, "Now unlock your device and confirm the restore operation.\n");
|
|
|
|
fflush(stdout);
|
|
|
|
|
2019-01-24 00:36:42 +01:00
|
|
|
copy_to_file(tarFd.get(), fd.get());
|
2011-05-18 00:52:54 +02:00
|
|
|
|
2016-07-06 22:22:22 +02:00
|
|
|
// Provide an in-band EOD marker in case the archive file is malformed
|
2019-01-24 00:36:42 +01:00
|
|
|
write_zeros(512 * 2, fd);
|
2016-07-06 22:22:22 +02:00
|
|
|
|
2016-03-05 00:51:03 +01:00
|
|
|
// Wait until the other side finishes, or it'll get sent SIGHUP.
|
2019-01-24 00:36:42 +01:00
|
|
|
copy_to_file(fd.get(), STDOUT_FILENO);
|
2011-05-18 00:52:54 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-05-19 07:56:48 +02:00
|
|
|
static void parse_push_pull_args(const char** arg, int narg, std::vector<const char*>* srcs,
|
|
|
|
const char** dst, bool* copy_attrs, bool* sync) {
|
2015-10-31 00:57:19 +01:00
|
|
|
*copy_attrs = false;
|
2014-03-12 01:55:59 +01:00
|
|
|
|
2015-10-31 00:57:19 +01:00
|
|
|
srcs->clear();
|
|
|
|
bool ignore_flags = false;
|
2013-04-19 21:41:09 +02:00
|
|
|
while (narg > 0) {
|
2015-10-31 00:57:19 +01:00
|
|
|
if (ignore_flags || *arg[0] != '-') {
|
|
|
|
srcs->push_back(*arg);
|
2013-04-19 21:41:09 +02:00
|
|
|
} else {
|
2015-10-31 00:57:19 +01:00
|
|
|
if (!strcmp(*arg, "-p")) {
|
|
|
|
// Silently ignore for backwards compatibility.
|
|
|
|
} else if (!strcmp(*arg, "-a")) {
|
|
|
|
*copy_attrs = true;
|
2017-05-19 07:56:48 +02:00
|
|
|
} else if (!strcmp(*arg, "--sync")) {
|
|
|
|
if (sync != nullptr) {
|
|
|
|
*sync = true;
|
|
|
|
}
|
2015-10-31 00:57:19 +01:00
|
|
|
} else if (!strcmp(*arg, "--")) {
|
|
|
|
ignore_flags = true;
|
|
|
|
} else {
|
2018-10-23 02:02:51 +02:00
|
|
|
error_exit("unrecognized option '%s'", *arg);
|
2015-10-31 00:57:19 +01:00
|
|
|
}
|
2013-04-19 21:41:09 +02:00
|
|
|
}
|
2014-03-12 01:55:59 +01:00
|
|
|
++arg;
|
|
|
|
--narg;
|
|
|
|
}
|
|
|
|
|
2015-10-31 00:57:19 +01:00
|
|
|
if (srcs->size() > 1) {
|
|
|
|
*dst = srcs->back();
|
|
|
|
srcs->pop_back();
|
2014-03-12 01:55:59 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-14 23:38:02 +01:00
|
|
|
static int adb_connect_command(const std::string& command, TransportId* transport = nullptr) {
|
2015-04-29 17:35:59 +02:00
|
|
|
std::string error;
|
2019-03-14 23:38:02 +01:00
|
|
|
unique_fd fd(adb_connect(transport, command, &error));
|
2015-05-08 08:37:40 +02:00
|
|
|
if (fd < 0) {
|
|
|
|
fprintf(stderr, "error: %s\n", error.c_str());
|
|
|
|
return 1;
|
2015-03-29 20:22:34 +02:00
|
|
|
}
|
2015-05-08 08:37:40 +02:00
|
|
|
read_and_dump(fd);
|
|
|
|
return 0;
|
2015-03-29 20:22:34 +02:00
|
|
|
}
|
|
|
|
|
2018-11-16 23:47:59 +01:00
|
|
|
static int adb_connect_command_bidirectional(const std::string& command) {
|
|
|
|
std::string error;
|
2019-01-24 00:36:42 +01:00
|
|
|
unique_fd fd(adb_connect(command, &error));
|
2018-11-16 23:47:59 +01:00
|
|
|
if (fd < 0) {
|
|
|
|
fprintf(stderr, "error: %s\n", error.c_str());
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static constexpr auto forward = [](int src, int sink, bool exit_on_end) {
|
|
|
|
char buf[4096];
|
|
|
|
while (true) {
|
|
|
|
int rc = adb_read(src, buf, sizeof(buf));
|
|
|
|
if (rc == 0) {
|
|
|
|
if (exit_on_end) {
|
|
|
|
exit(0);
|
|
|
|
} else {
|
|
|
|
adb_shutdown(sink, SHUT_WR);
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
} else if (rc < 0) {
|
|
|
|
perror_exit("read failed");
|
|
|
|
}
|
|
|
|
if (!WriteFdExactly(sink, buf, rc)) {
|
|
|
|
perror_exit("write failed");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-01-24 00:36:42 +01:00
|
|
|
std::thread read(forward, fd.get(), STDOUT_FILENO, true);
|
|
|
|
std::thread write(forward, STDIN_FILENO, fd.get(), false);
|
2018-11-16 23:47:59 +01:00
|
|
|
read.join();
|
|
|
|
write.join();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-04-29 21:28:13 +02:00
|
|
|
static int adb_query_command(const std::string& command) {
|
|
|
|
std::string result;
|
|
|
|
std::string error;
|
|
|
|
if (!adb_query(command, &result, &error)) {
|
|
|
|
fprintf(stderr, "error: %s\n", error.c_str());
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
printf("%s\n", result.c_str());
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-09-08 01:20:13 +02:00
|
|
|
// Disallow stdin, stdout, and stderr.
|
|
|
|
static bool _is_valid_ack_reply_fd(const int ack_reply_fd) {
|
|
|
|
#ifdef _WIN32
|
|
|
|
const HANDLE ack_reply_handle = cast_int_to_handle(ack_reply_fd);
|
|
|
|
return (GetStdHandle(STD_INPUT_HANDLE) != ack_reply_handle) &&
|
|
|
|
(GetStdHandle(STD_OUTPUT_HANDLE) != ack_reply_handle) &&
|
|
|
|
(GetStdHandle(STD_ERROR_HANDLE) != ack_reply_handle);
|
|
|
|
#else
|
|
|
|
return ack_reply_fd > 2;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2016-10-19 23:47:11 +02:00
|
|
|
int adb_commandline(int argc, const char** argv) {
|
2018-08-10 23:23:43 +02:00
|
|
|
bool no_daemon = false;
|
|
|
|
bool is_daemon = false;
|
|
|
|
bool is_server = false;
|
2009-03-04 04:32:55 +01:00
|
|
|
int r;
|
2015-05-05 22:10:43 +02:00
|
|
|
TransportType transport_type = kTransportAny;
|
2015-08-07 19:10:29 +02:00
|
|
|
int ack_reply_fd = -1;
|
|
|
|
|
2015-11-19 03:07:48 +01:00
|
|
|
#if !defined(_WIN32)
|
|
|
|
// We'd rather have EPIPE than SIGPIPE.
|
|
|
|
signal(SIGPIPE, SIG_IGN);
|
|
|
|
#endif
|
|
|
|
|
2016-08-26 01:00:22 +02:00
|
|
|
const char* server_host_str = nullptr;
|
|
|
|
const char* server_port_str = nullptr;
|
|
|
|
const char* server_socket_str = nullptr;
|
2010-04-19 13:21:12 +02:00
|
|
|
|
2015-10-07 23:55:10 +02:00
|
|
|
// We need to check for -d and -e before we look at $ANDROID_SERIAL.
|
|
|
|
const char* serial = nullptr;
|
2017-08-17 01:57:01 +02:00
|
|
|
TransportId transport_id = 0;
|
2015-10-07 23:55:10 +02:00
|
|
|
|
2014-12-06 02:37:24 +01:00
|
|
|
while (argc > 0) {
|
2019-03-14 23:38:02 +01:00
|
|
|
if (!strcmp(argv[0], "server")) {
|
2018-08-10 23:23:43 +02:00
|
|
|
is_server = true;
|
2019-03-14 23:38:02 +01:00
|
|
|
} else if (!strcmp(argv[0], "nodaemon")) {
|
2018-08-10 23:23:43 +02:00
|
|
|
no_daemon = true;
|
2009-03-04 04:32:55 +01:00
|
|
|
} else if (!strcmp(argv[0], "fork-server")) {
|
|
|
|
/* this is a special flag used only when the ADB client launches the ADB Server */
|
2018-08-10 23:23:43 +02:00
|
|
|
is_daemon = true;
|
2015-08-07 19:10:29 +02:00
|
|
|
} else if (!strcmp(argv[0], "--reply-fd")) {
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc < 2) error_exit("--reply-fd requires an argument");
|
2015-08-07 19:10:29 +02:00
|
|
|
const char* reply_fd_str = argv[1];
|
|
|
|
argc--;
|
|
|
|
argv++;
|
|
|
|
ack_reply_fd = strtol(reply_fd_str, nullptr, 10);
|
2015-09-08 01:20:13 +02:00
|
|
|
if (!_is_valid_ack_reply_fd(ack_reply_fd)) {
|
2015-08-07 19:10:29 +02:00
|
|
|
fprintf(stderr, "adb: invalid reply fd \"%s\"\n", reply_fd_str);
|
2017-02-07 01:20:30 +01:00
|
|
|
return 1;
|
2015-08-07 19:10:29 +02:00
|
|
|
}
|
2017-08-17 01:57:01 +02:00
|
|
|
} else if (!strncmp(argv[0], "-s", 2)) {
|
2009-03-04 04:32:55 +01:00
|
|
|
if (isdigit(argv[0][2])) {
|
|
|
|
serial = argv[0] + 2;
|
|
|
|
} else {
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc < 2 || argv[0][2] != '\0') error_exit("-s requires an argument");
|
2009-03-04 04:32:55 +01:00
|
|
|
serial = argv[1];
|
|
|
|
argc--;
|
|
|
|
argv++;
|
|
|
|
}
|
2017-08-17 01:57:01 +02:00
|
|
|
} else if (!strncmp(argv[0], "-t", 2)) {
|
|
|
|
const char* id;
|
|
|
|
if (isdigit(argv[0][2])) {
|
|
|
|
id = argv[0] + 2;
|
|
|
|
} else {
|
|
|
|
id = argv[1];
|
|
|
|
argc--;
|
|
|
|
argv++;
|
|
|
|
}
|
|
|
|
transport_id = strtoll(id, const_cast<char**>(&id), 10);
|
|
|
|
if (*id != '\0') {
|
2018-10-23 02:02:51 +02:00
|
|
|
error_exit("invalid transport id");
|
2017-08-17 01:57:01 +02:00
|
|
|
}
|
2019-03-14 23:38:02 +01:00
|
|
|
} else if (!strcmp(argv[0], "-d")) {
|
2015-05-05 22:10:43 +02:00
|
|
|
transport_type = kTransportUsb;
|
2019-03-14 23:38:02 +01:00
|
|
|
} else if (!strcmp(argv[0], "-e")) {
|
2015-05-05 22:10:43 +02:00
|
|
|
transport_type = kTransportLocal;
|
2019-03-14 23:38:02 +01:00
|
|
|
} else if (!strcmp(argv[0], "-a")) {
|
2012-11-14 19:16:17 +01:00
|
|
|
gListenAll = 1;
|
2014-12-06 02:37:24 +01:00
|
|
|
} else if (!strncmp(argv[0], "-H", 2)) {
|
2012-11-14 19:16:17 +01:00
|
|
|
if (argv[0][2] == '\0') {
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc < 2) error_exit("-H requires an argument");
|
2016-08-26 01:00:22 +02:00
|
|
|
server_host_str = argv[1];
|
2012-11-14 19:16:17 +01:00
|
|
|
argc--;
|
|
|
|
argv++;
|
|
|
|
} else {
|
2016-08-26 01:00:22 +02:00
|
|
|
server_host_str = argv[0] + 2;
|
2012-11-14 19:16:17 +01:00
|
|
|
}
|
2014-12-06 02:37:24 +01:00
|
|
|
} else if (!strncmp(argv[0], "-P", 2)) {
|
2012-11-14 19:16:17 +01:00
|
|
|
if (argv[0][2] == '\0') {
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc < 2) error_exit("-P requires an argument");
|
2012-11-14 19:16:17 +01:00
|
|
|
server_port_str = argv[1];
|
|
|
|
argc--;
|
|
|
|
argv++;
|
|
|
|
} else {
|
|
|
|
server_port_str = argv[0] + 2;
|
|
|
|
}
|
2016-08-26 01:00:22 +02:00
|
|
|
} else if (!strcmp(argv[0], "-L")) {
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc < 2) error_exit("-L requires an argument");
|
2016-08-26 01:00:22 +02:00
|
|
|
server_socket_str = argv[1];
|
|
|
|
argc--;
|
|
|
|
argv++;
|
2009-03-04 04:32:55 +01:00
|
|
|
} else {
|
2016-08-26 01:00:22 +02:00
|
|
|
/* out of recognized modifiers and flags */
|
2009-03-04 04:32:55 +01:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
argc--;
|
|
|
|
argv++;
|
|
|
|
}
|
|
|
|
|
2016-08-26 01:00:22 +02:00
|
|
|
if ((server_host_str || server_port_str) && server_socket_str) {
|
2018-10-23 02:02:51 +02:00
|
|
|
error_exit("-L is incompatible with -H or -P");
|
2016-08-26 01:00:22 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// If -L, -H, or -P are specified, ignore environment variables.
|
|
|
|
// Otherwise, prefer ADB_SERVER_SOCKET over ANDROID_ADB_SERVER_ADDRESS/PORT.
|
2016-09-16 22:01:24 +02:00
|
|
|
if (!server_host_str && !server_port_str && !server_socket_str) {
|
|
|
|
server_socket_str = getenv("ADB_SERVER_SOCKET");
|
2016-08-26 01:00:22 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!server_socket_str) {
|
|
|
|
// tcp:1234 and tcp:localhost:1234 are different with -a, so don't default to localhost
|
|
|
|
server_host_str = server_host_str ? server_host_str : getenv("ANDROID_ADB_SERVER_ADDRESS");
|
|
|
|
|
2016-09-16 22:01:24 +02:00
|
|
|
int server_port = DEFAULT_ADB_PORT;
|
2016-08-26 01:00:22 +02:00
|
|
|
server_port_str = server_port_str ? server_port_str : getenv("ANDROID_ADB_SERVER_PORT");
|
2016-09-16 22:01:24 +02:00
|
|
|
if (server_port_str && strlen(server_port_str) > 0) {
|
|
|
|
if (!android::base::ParseInt(server_port_str, &server_port, 1, 65535)) {
|
2018-10-23 02:02:51 +02:00
|
|
|
error_exit(
|
|
|
|
"$ANDROID_ADB_SERVER_PORT must be a positive number less than 65535: "
|
|
|
|
"got \"%s\"",
|
|
|
|
server_port_str);
|
2016-09-16 22:01:24 +02:00
|
|
|
}
|
|
|
|
}
|
2016-08-26 01:00:22 +02:00
|
|
|
|
|
|
|
int rc;
|
|
|
|
char* temp;
|
|
|
|
if (server_host_str) {
|
2016-09-16 22:01:24 +02:00
|
|
|
rc = asprintf(&temp, "tcp:%s:%d", server_host_str, server_port);
|
2016-08-26 01:00:22 +02:00
|
|
|
} else {
|
2016-09-16 22:01:24 +02:00
|
|
|
rc = asprintf(&temp, "tcp:%d", server_port);
|
2016-08-26 01:00:22 +02:00
|
|
|
}
|
|
|
|
if (rc < 0) {
|
2018-10-19 22:59:44 +02:00
|
|
|
LOG(FATAL) << "failed to allocate server socket specification";
|
2016-08-26 01:00:22 +02:00
|
|
|
}
|
|
|
|
server_socket_str = temp;
|
|
|
|
}
|
|
|
|
|
|
|
|
adb_set_socket_spec(server_socket_str);
|
|
|
|
|
2015-10-07 23:55:10 +02:00
|
|
|
// If none of -d, -e, or -s were specified, try $ANDROID_SERIAL.
|
|
|
|
if (transport_type == kTransportAny && serial == nullptr) {
|
|
|
|
serial = getenv("ANDROID_SERIAL");
|
|
|
|
}
|
|
|
|
|
2017-08-17 01:57:01 +02:00
|
|
|
adb_set_transport(transport_type, serial, transport_id);
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2011-01-31 14:23:56 +01:00
|
|
|
if (is_server) {
|
2009-03-04 04:32:55 +01:00
|
|
|
if (no_daemon || is_daemon) {
|
2015-08-09 00:07:07 +02:00
|
|
|
if (is_daemon && (ack_reply_fd == -1)) {
|
2015-08-07 19:10:29 +02:00
|
|
|
fprintf(stderr, "reply fd for adb server to client communication not specified.\n");
|
2017-02-07 01:20:30 +01:00
|
|
|
return 1;
|
2015-08-07 19:10:29 +02:00
|
|
|
}
|
2016-08-26 01:00:22 +02:00
|
|
|
r = adb_server_main(is_daemon, server_socket_str, ack_reply_fd);
|
2009-03-04 04:32:55 +01:00
|
|
|
} else {
|
2016-08-26 01:00:22 +02:00
|
|
|
r = launch_server(server_socket_str);
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
2014-12-06 02:37:24 +01:00
|
|
|
if (r) {
|
2009-03-04 04:32:55 +01:00
|
|
|
fprintf(stderr,"* could not start server *\n");
|
|
|
|
}
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2014-12-06 02:37:24 +01:00
|
|
|
if (argc == 0) {
|
2017-02-07 01:20:30 +01:00
|
|
|
help();
|
|
|
|
return 1;
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
|
2014-12-06 02:32:46 +01:00
|
|
|
/* handle wait-for-* prefix */
|
|
|
|
if (!strncmp(argv[0], "wait-for-", strlen("wait-for-"))) {
|
2015-02-26 02:51:28 +01:00
|
|
|
const char* service = argv[0];
|
2014-12-06 02:32:46 +01:00
|
|
|
|
2017-08-17 01:57:01 +02:00
|
|
|
if (!wait_for_device(service)) {
|
2014-12-06 02:32:46 +01:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2015-05-05 04:29:32 +02:00
|
|
|
// Allow a command to be run after wait-for-device,
|
|
|
|
// e.g. 'adb wait-for-device shell'.
|
2014-12-06 02:32:46 +01:00
|
|
|
if (argc == 1) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Fall through */
|
|
|
|
argc--;
|
|
|
|
argv++;
|
|
|
|
}
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2014-12-06 02:32:46 +01:00
|
|
|
/* adb_connect() commands */
|
2014-12-06 02:37:24 +01:00
|
|
|
if (!strcmp(argv[0], "devices")) {
|
2015-02-26 02:51:28 +01:00
|
|
|
const char *listopt;
|
2015-04-29 21:28:13 +02:00
|
|
|
if (argc < 2) {
|
2012-04-20 20:21:14 +02:00
|
|
|
listopt = "";
|
2015-04-29 21:28:13 +02:00
|
|
|
} else if (argc == 2 && !strcmp(argv[1], "-l")) {
|
2012-04-20 20:21:14 +02:00
|
|
|
listopt = argv[1];
|
2009-03-04 04:32:55 +01:00
|
|
|
} else {
|
2018-10-23 02:02:51 +02:00
|
|
|
error_exit("adb devices [-l]");
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
2015-04-29 21:28:13 +02:00
|
|
|
|
|
|
|
std::string query = android::base::StringPrintf("host:%s%s", argv[0], listopt);
|
2019-03-14 23:38:02 +01:00
|
|
|
std::string error;
|
|
|
|
if (!adb_check_server_version(&error)) {
|
|
|
|
error_exit("failed to check server version: %s", error.c_str());
|
|
|
|
}
|
2015-04-29 21:28:13 +02:00
|
|
|
printf("List of devices attached\n");
|
|
|
|
return adb_query_command(query);
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
2014-12-06 02:32:46 +01:00
|
|
|
else if (!strcmp(argv[0], "connect")) {
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc != 2) error_exit("usage: adb connect <host>[:<port>]");
|
2015-04-29 21:28:13 +02:00
|
|
|
|
|
|
|
std::string query = android::base::StringPrintf("host:connect:%s", argv[1]);
|
|
|
|
return adb_query_command(query);
|
2010-05-24 16:44:35 +02:00
|
|
|
}
|
2014-12-06 02:32:46 +01:00
|
|
|
else if (!strcmp(argv[0], "disconnect")) {
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc > 2) error_exit("usage: adb disconnect [<host>[:<port>]]");
|
2015-04-29 21:28:13 +02:00
|
|
|
|
|
|
|
std::string query = android::base::StringPrintf("host:disconnect:%s",
|
|
|
|
(argc == 2) ? argv[1] : "");
|
|
|
|
return adb_query_command(query);
|
2018-12-12 19:48:50 +01:00
|
|
|
} else if (!strcmp(argv[0], "abb")) {
|
|
|
|
return adb_abb(argc, argv);
|
|
|
|
} else if (!strcmp(argv[0], "emu")) {
|
2015-05-07 01:13:42 +02:00
|
|
|
return adb_send_emulator_command(argc, argv, serial);
|
2018-12-12 19:48:50 +01:00
|
|
|
} else if (!strcmp(argv[0], "shell")) {
|
2016-02-01 04:12:26 +01:00
|
|
|
return adb_shell(argc, argv);
|
2018-12-12 19:48:50 +01:00
|
|
|
} else if (!strcmp(argv[0], "exec-in") || !strcmp(argv[0], "exec-out")) {
|
2014-05-27 03:30:43 +02:00
|
|
|
int exec_in = !strcmp(argv[0], "exec-in");
|
|
|
|
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc < 2) error_exit("usage: adb %s command", argv[0]);
|
2016-04-14 23:18:04 +02:00
|
|
|
|
2015-04-17 19:59:34 +02:00
|
|
|
std::string cmd = "exec:";
|
|
|
|
cmd += argv[1];
|
2014-05-27 03:30:43 +02:00
|
|
|
argc -= 2;
|
|
|
|
argv += 2;
|
|
|
|
while (argc-- > 0) {
|
2015-04-18 05:11:08 +02:00
|
|
|
cmd += " " + escape_arg(*argv++);
|
2014-05-27 03:30:43 +02:00
|
|
|
}
|
|
|
|
|
2015-04-29 17:35:59 +02:00
|
|
|
std::string error;
|
2019-01-24 00:36:42 +01:00
|
|
|
unique_fd fd(adb_connect(cmd, &error));
|
2014-05-27 03:30:43 +02:00
|
|
|
if (fd < 0) {
|
2015-04-29 17:35:59 +02:00
|
|
|
fprintf(stderr, "error: %s\n", error.c_str());
|
2014-05-27 03:30:43 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (exec_in) {
|
2019-01-24 00:36:42 +01:00
|
|
|
copy_to_file(STDIN_FILENO, fd.get());
|
2014-05-27 03:30:43 +02:00
|
|
|
} else {
|
2019-01-24 00:36:42 +01:00
|
|
|
copy_to_file(fd.get(), STDOUT_FILENO);
|
2014-05-27 03:30:43 +02:00
|
|
|
}
|
|
|
|
return 0;
|
2018-12-12 19:48:50 +01:00
|
|
|
} else if (!strcmp(argv[0], "kill-server")) {
|
2017-05-09 03:37:17 +02:00
|
|
|
return adb_kill_server() ? 0 : 1;
|
2018-12-12 19:48:50 +01:00
|
|
|
} else if (!strcmp(argv[0], "sideload")) {
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc != 2) error_exit("sideload requires an argument");
|
2019-04-08 08:24:03 +02:00
|
|
|
if (adb_sideload_install(argv[1], false /* rescue_mode */)) {
|
2012-01-09 23:54:53 +01:00
|
|
|
return 1;
|
|
|
|
} else {
|
|
|
|
return 0;
|
|
|
|
}
|
2019-04-08 08:24:03 +02:00
|
|
|
} else if (!strcmp(argv[0], "rescue")) {
|
|
|
|
// adb rescue getprop <prop>
|
|
|
|
// adb rescue install <filename>
|
2019-04-23 08:14:28 +02:00
|
|
|
// adb rescue wipe userdata
|
2019-04-08 08:24:03 +02:00
|
|
|
if (argc != 3) error_exit("rescue requires two arguments");
|
|
|
|
if (!strcmp(argv[1], "getprop")) {
|
|
|
|
return adb_connect_command(android::base::StringPrintf("rescue-getprop:%s", argv[2]));
|
|
|
|
} else if (!strcmp(argv[1], "install")) {
|
|
|
|
if (adb_sideload_install(argv[2], true /* rescue_mode */) != 0) {
|
|
|
|
return 1;
|
|
|
|
}
|
2019-04-23 08:14:28 +02:00
|
|
|
} else if (!strcmp(argv[1], "wipe") && !strcmp(argv[2], "userdata")) {
|
|
|
|
return adb_wipe_devices();
|
2019-04-08 08:24:03 +02:00
|
|
|
} else {
|
|
|
|
error_exit("invalid rescue argument");
|
|
|
|
}
|
|
|
|
return 0;
|
2017-08-24 00:42:28 +02:00
|
|
|
} else if (!strcmp(argv[0], "tcpip")) {
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc != 2) error_exit("tcpip requires an argument");
|
2017-08-24 00:42:28 +02:00
|
|
|
int port;
|
|
|
|
if (!android::base::ParseInt(argv[1], &port, 1, 65535)) {
|
2018-10-23 02:02:51 +02:00
|
|
|
error_exit("tcpip: invalid port: %s", argv[1]);
|
2017-08-24 00:42:28 +02:00
|
|
|
}
|
|
|
|
return adb_connect_command(android::base::StringPrintf("tcpip:%d", port));
|
2015-07-22 01:13:40 +02:00
|
|
|
}
|
2018-08-29 19:44:33 +02:00
|
|
|
// clang-format off
|
2014-12-06 02:32:46 +01:00
|
|
|
else if (!strcmp(argv[0], "remount") ||
|
|
|
|
!strcmp(argv[0], "reboot") ||
|
|
|
|
!strcmp(argv[0], "reboot-bootloader") ||
|
2018-08-29 19:44:33 +02:00
|
|
|
!strcmp(argv[0], "reboot-fastboot") ||
|
2014-12-06 02:32:46 +01:00
|
|
|
!strcmp(argv[0], "usb") ||
|
|
|
|
!strcmp(argv[0], "disable-verity") ||
|
|
|
|
!strcmp(argv[0], "enable-verity")) {
|
2018-08-29 19:44:33 +02:00
|
|
|
// clang-format on
|
2015-05-08 08:37:40 +02:00
|
|
|
std::string command;
|
2015-03-29 20:22:34 +02:00
|
|
|
if (!strcmp(argv[0], "reboot-bootloader")) {
|
2015-05-08 08:37:40 +02:00
|
|
|
command = "reboot:bootloader";
|
2018-08-29 19:44:33 +02:00
|
|
|
} else if (!strcmp(argv[0], "reboot-fastboot")) {
|
|
|
|
command = "reboot:fastboot";
|
2015-03-29 20:22:34 +02:00
|
|
|
} else if (argc > 1) {
|
2015-05-08 08:37:40 +02:00
|
|
|
command = android::base::StringPrintf("%s:%s", argv[0], argv[1]);
|
2015-03-29 20:22:34 +02:00
|
|
|
} else {
|
2015-05-08 08:37:40 +02:00
|
|
|
command = android::base::StringPrintf("%s:", argv[0]);
|
2009-03-13 21:04:37 +01:00
|
|
|
}
|
2015-03-29 20:22:34 +02:00
|
|
|
return adb_connect_command(command);
|
2016-03-05 00:16:18 +01:00
|
|
|
} else if (!strcmp(argv[0], "root") || !strcmp(argv[0], "unroot")) {
|
|
|
|
return adb_root(argv[0]) ? 0 : 1;
|
|
|
|
} else if (!strcmp(argv[0], "bugreport")) {
|
2016-07-20 02:07:22 +02:00
|
|
|
Bugreport bugreport;
|
2017-08-17 01:57:01 +02:00
|
|
|
return bugreport.DoIt(argc, argv);
|
2016-04-02 02:43:27 +02:00
|
|
|
} else if (!strcmp(argv[0], "forward") || !strcmp(argv[0], "reverse")) {
|
2015-05-30 02:55:19 +02:00
|
|
|
bool reverse = !strcmp(argv[0], "reverse");
|
|
|
|
--argc;
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc < 1) error_exit("%s requires an argument", argv[0]);
|
2018-08-01 00:36:03 +02:00
|
|
|
++argv;
|
2012-11-14 15:01:55 +01:00
|
|
|
|
|
|
|
// Determine the <host-prefix> for this command.
|
2015-05-30 02:55:19 +02:00
|
|
|
std::string host_prefix;
|
2013-03-21 21:07:42 +01:00
|
|
|
if (reverse) {
|
2015-05-30 02:55:19 +02:00
|
|
|
host_prefix = "reverse";
|
2009-03-04 04:32:55 +01:00
|
|
|
} else {
|
2013-03-21 21:07:42 +01:00
|
|
|
if (serial) {
|
2015-05-30 02:55:19 +02:00
|
|
|
host_prefix = android::base::StringPrintf("host-serial:%s", serial);
|
2015-05-05 22:10:43 +02:00
|
|
|
} else if (transport_type == kTransportUsb) {
|
2015-05-30 02:55:19 +02:00
|
|
|
host_prefix = "host-usb";
|
2015-05-05 22:10:43 +02:00
|
|
|
} else if (transport_type == kTransportLocal) {
|
2015-05-30 02:55:19 +02:00
|
|
|
host_prefix = "host-local";
|
2013-03-21 21:07:42 +01:00
|
|
|
} else {
|
2015-05-30 02:55:19 +02:00
|
|
|
host_prefix = "host";
|
2012-11-14 15:01:55 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-10-19 22:59:44 +02:00
|
|
|
std::string cmd, error_message;
|
2015-05-30 02:55:19 +02:00
|
|
|
if (strcmp(argv[0], "--list") == 0) {
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc != 1) error_exit("--list doesn't take any arguments");
|
2015-05-30 02:55:19 +02:00
|
|
|
return adb_query_command(host_prefix + ":list-forward");
|
|
|
|
} else if (strcmp(argv[0], "--remove-all") == 0) {
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc != 1) error_exit("--remove-all doesn't take any arguments");
|
2015-05-30 02:55:19 +02:00
|
|
|
cmd = host_prefix + ":killforward-all";
|
|
|
|
} else if (strcmp(argv[0], "--remove") == 0) {
|
|
|
|
// forward --remove <local>
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc != 2) error_exit("--remove requires an argument");
|
2015-05-30 02:55:19 +02:00
|
|
|
cmd = host_prefix + ":killforward:" + argv[1];
|
|
|
|
} else if (strcmp(argv[0], "--no-rebind") == 0) {
|
|
|
|
// forward --no-rebind <local> <remote>
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc != 3) error_exit("--no-rebind takes two arguments");
|
2018-10-19 22:59:44 +02:00
|
|
|
if (forward_targets_are_valid(argv[1], argv[2], &error_message)) {
|
2016-04-07 20:25:48 +02:00
|
|
|
cmd = host_prefix + ":forward:norebind:" + argv[1] + ";" + argv[2];
|
|
|
|
}
|
2015-05-30 02:55:19 +02:00
|
|
|
} else {
|
|
|
|
// forward <local> <remote>
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc != 2) error_exit("forward takes two arguments");
|
2018-10-19 22:59:44 +02:00
|
|
|
if (forward_targets_are_valid(argv[0], argv[1], &error_message)) {
|
2016-04-07 20:25:48 +02:00
|
|
|
cmd = host_prefix + ":forward:" + argv[0] + ";" + argv[1];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-10-19 22:59:44 +02:00
|
|
|
if (!error_message.empty()) {
|
2018-10-23 02:02:51 +02:00
|
|
|
error_exit("error: %s", error_message.c_str());
|
2012-11-14 15:01:55 +01:00
|
|
|
}
|
|
|
|
|
2019-01-24 00:36:42 +01:00
|
|
|
unique_fd fd(adb_connect(cmd, &error_message));
|
|
|
|
if (fd < 0 || !adb_status(fd.get(), &error_message)) {
|
2018-10-23 02:02:51 +02:00
|
|
|
error_exit("error: %s", error_message.c_str());
|
2016-04-07 20:25:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Server or device may optionally return a resolved TCP port number.
|
|
|
|
std::string resolved_port;
|
2018-10-19 22:59:44 +02:00
|
|
|
if (ReadProtocolString(fd, &resolved_port, &error_message) && !resolved_port.empty()) {
|
2016-04-07 20:25:48 +02:00
|
|
|
printf("%s\n", resolved_port.c_str());
|
|
|
|
}
|
|
|
|
|
|
|
|
ReadOrderlyShutdown(fd);
|
|
|
|
return 0;
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
/* do_sync_*() commands */
|
2014-12-06 02:32:46 +01:00
|
|
|
else if (!strcmp(argv[0], "ls")) {
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc != 2) error_exit("ls requires an argument");
|
2015-08-03 19:38:08 +02:00
|
|
|
return do_sync_ls(argv[1]) ? 0 : 1;
|
2018-12-12 19:48:50 +01:00
|
|
|
} else if (!strcmp(argv[0], "push")) {
|
2015-10-31 00:57:19 +01:00
|
|
|
bool copy_attrs = false;
|
2017-05-19 07:56:48 +02:00
|
|
|
bool sync = false;
|
2015-10-31 00:57:19 +01:00
|
|
|
std::vector<const char*> srcs;
|
|
|
|
const char* dst = nullptr;
|
2014-03-12 01:55:59 +01:00
|
|
|
|
2017-05-19 07:56:48 +02:00
|
|
|
parse_push_pull_args(&argv[1], argc - 1, &srcs, &dst, ©_attrs, &sync);
|
2018-10-23 02:02:51 +02:00
|
|
|
if (srcs.empty() || !dst) error_exit("push requires an argument");
|
2017-05-19 07:56:48 +02:00
|
|
|
return do_sync_push(srcs, dst, sync) ? 0 : 1;
|
2018-12-12 19:48:50 +01:00
|
|
|
} else if (!strcmp(argv[0], "pull")) {
|
2015-10-31 00:57:19 +01:00
|
|
|
bool copy_attrs = false;
|
|
|
|
std::vector<const char*> srcs;
|
|
|
|
const char* dst = ".";
|
2014-03-12 01:55:59 +01:00
|
|
|
|
2017-05-19 07:56:48 +02:00
|
|
|
parse_push_pull_args(&argv[1], argc - 1, &srcs, &dst, ©_attrs, nullptr);
|
2018-10-23 02:02:51 +02:00
|
|
|
if (srcs.empty()) error_exit("pull requires an argument");
|
2015-10-31 00:57:19 +01:00
|
|
|
return do_sync_pull(srcs, dst, copy_attrs) ? 0 : 1;
|
2018-12-12 19:48:50 +01:00
|
|
|
} else if (!strcmp(argv[0], "install")) {
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc < 2) error_exit("install requires an argument");
|
2017-08-17 01:57:01 +02:00
|
|
|
return install_app(argc, argv);
|
2018-12-12 19:48:50 +01:00
|
|
|
} else if (!strcmp(argv[0], "install-multiple")) {
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc < 2) error_exit("install-multiple requires an argument");
|
2017-08-17 01:57:01 +02:00
|
|
|
return install_multiple_app(argc, argv);
|
2018-10-09 19:45:03 +02:00
|
|
|
} else if (!strcmp(argv[0], "install-multi-package")) {
|
|
|
|
if (argc < 3) error_exit("install-multi-package requires an argument");
|
|
|
|
return install_multi_package(argc, argv);
|
2018-12-12 19:48:50 +01:00
|
|
|
} else if (!strcmp(argv[0], "uninstall")) {
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc < 2) error_exit("uninstall requires an argument");
|
2017-08-17 01:57:01 +02:00
|
|
|
return uninstall_app(argc, argv);
|
2018-12-12 19:48:50 +01:00
|
|
|
} else if (!strcmp(argv[0], "sync")) {
|
2015-04-21 19:17:07 +02:00
|
|
|
std::string src;
|
2015-04-17 22:57:15 +02:00
|
|
|
bool list_only = false;
|
2014-12-06 02:37:24 +01:00
|
|
|
if (argc < 2) {
|
2018-04-03 19:54:39 +02:00
|
|
|
// No partition specified: sync all of them.
|
2010-02-22 15:36:49 +01:00
|
|
|
} else if (argc >= 2 && strcmp(argv[1], "-l") == 0) {
|
2015-04-21 19:17:07 +02:00
|
|
|
list_only = true;
|
2018-04-03 19:54:39 +02:00
|
|
|
if (argc == 3) src = argv[2];
|
2014-12-06 02:37:24 +01:00
|
|
|
} else if (argc == 2) {
|
2015-04-21 19:17:07 +02:00
|
|
|
src = argv[1];
|
2009-03-04 04:32:55 +01:00
|
|
|
} else {
|
2018-10-23 02:02:51 +02:00
|
|
|
error_exit("usage: adb sync [-l] [PARTITION]");
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
2015-04-17 22:57:15 +02:00
|
|
|
|
2018-04-03 19:54:39 +02:00
|
|
|
if (src.empty()) src = "all";
|
2018-08-31 17:10:06 +02:00
|
|
|
std::vector<std::string> partitions{"data", "odm", "oem", "product", "product_services",
|
|
|
|
"system", "vendor"};
|
2018-04-03 19:54:39 +02:00
|
|
|
bool found = false;
|
|
|
|
for (const auto& partition : partitions) {
|
|
|
|
if (src == "all" || src == partition) {
|
|
|
|
std::string src_dir{product_file(partition)};
|
|
|
|
if (!directory_exists(src_dir)) continue;
|
|
|
|
found = true;
|
|
|
|
if (!do_sync_sync(src_dir, "/" + partition, list_only)) return 1;
|
|
|
|
}
|
2015-04-17 22:57:15 +02:00
|
|
|
}
|
2018-10-23 02:02:51 +02:00
|
|
|
if (!found) error_exit("don't know how to sync %s partition", src.c_str());
|
2018-10-19 22:59:44 +02:00
|
|
|
return 0;
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
/* passthrough commands */
|
2018-12-12 19:48:50 +01:00
|
|
|
else if (!strcmp(argv[0], "get-state") || !strcmp(argv[0], "get-serialno") ||
|
|
|
|
!strcmp(argv[0], "get-devpath")) {
|
2017-08-17 01:57:01 +02:00
|
|
|
return adb_query_command(format_host_command(argv[0]));
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
/* other commands */
|
2018-12-12 19:48:50 +01:00
|
|
|
else if (!strcmp(argv[0], "logcat") || !strcmp(argv[0], "lolcat") ||
|
|
|
|
!strcmp(argv[0], "longcat")) {
|
2017-08-17 01:57:01 +02:00
|
|
|
return logcat(argc, argv);
|
2018-12-12 19:48:50 +01:00
|
|
|
} else if (!strcmp(argv[0], "ppp")) {
|
2009-03-04 04:32:55 +01:00
|
|
|
return ppp(argc, argv);
|
2018-12-12 19:48:50 +01:00
|
|
|
} else if (!strcmp(argv[0], "start-server")) {
|
2015-04-29 17:35:59 +02:00
|
|
|
std::string error;
|
2015-08-12 02:05:02 +02:00
|
|
|
const int result = adb_connect("host:start-server", &error);
|
|
|
|
if (result < 0) {
|
|
|
|
fprintf(stderr, "error: %s\n", error.c_str());
|
|
|
|
}
|
|
|
|
return result;
|
2018-12-12 19:48:50 +01:00
|
|
|
} else if (!strcmp(argv[0], "backup")) {
|
2011-04-21 21:53:28 +02:00
|
|
|
return backup(argc, argv);
|
2018-12-12 19:48:50 +01:00
|
|
|
} else if (!strcmp(argv[0], "restore")) {
|
2011-05-18 00:52:54 +02:00
|
|
|
return restore(argc, argv);
|
2018-12-12 19:48:50 +01:00
|
|
|
} else if (!strcmp(argv[0], "keygen")) {
|
2018-10-23 02:02:51 +02:00
|
|
|
if (argc != 2) error_exit("keygen requires an argument");
|
2015-09-23 00:52:57 +02:00
|
|
|
// Always print key generation information for keygen command.
|
|
|
|
adb_trace_enable(AUTH);
|
2014-11-14 00:17:29 +01:00
|
|
|
return adb_auth_keygen(argv[1]);
|
2018-11-16 02:45:46 +01:00
|
|
|
} else if (!strcmp(argv[0], "pubkey")) {
|
|
|
|
if (argc != 2) error_exit("pubkey requires an argument");
|
|
|
|
return adb_auth_pubkey(argv[1]);
|
|
|
|
} else if (!strcmp(argv[0], "jdwp")) {
|
2015-03-29 20:22:34 +02:00
|
|
|
return adb_connect_command("jdwp");
|
2018-11-16 02:45:46 +01:00
|
|
|
} else if (!strcmp(argv[0], "track-jdwp")) {
|
2016-05-14 03:18:23 +02:00
|
|
|
return adb_connect_command("track-jdwp");
|
2018-11-16 02:45:46 +01:00
|
|
|
} else if (!strcmp(argv[0], "track-devices")) {
|
2016-05-14 03:18:23 +02:00
|
|
|
return adb_connect_command("host:track-devices");
|
2018-06-18 23:51:56 +02:00
|
|
|
} else if (!strcmp(argv[0], "raw")) {
|
|
|
|
if (argc != 2) {
|
2018-10-23 02:02:51 +02:00
|
|
|
error_exit("usage: adb raw SERVICE");
|
2018-06-18 23:51:56 +02:00
|
|
|
}
|
2018-11-16 23:47:59 +01:00
|
|
|
return adb_connect_command_bidirectional(argv[1]);
|
2016-05-14 03:18:23 +02:00
|
|
|
}
|
|
|
|
|
2009-03-04 04:32:55 +01:00
|
|
|
/* "adb /?" is a common idiom under Windows */
|
2017-02-07 01:20:30 +01:00
|
|
|
else if (!strcmp(argv[0], "--help") || !strcmp(argv[0], "help") || !strcmp(argv[0], "/?")) {
|
2009-03-04 04:32:55 +01:00
|
|
|
help();
|
|
|
|
return 0;
|
2018-11-16 02:45:46 +01:00
|
|
|
} else if (!strcmp(argv[0], "--version") || !strcmp(argv[0], "version")) {
|
2015-08-12 17:32:10 +02:00
|
|
|
fprintf(stdout, "%s", adb_version().c_str());
|
2009-03-04 04:32:55 +01:00
|
|
|
return 0;
|
2017-02-23 02:07:01 +01:00
|
|
|
} else if (!strcmp(argv[0], "features")) {
|
2015-09-22 19:43:08 +02:00
|
|
|
// Only list the features common to both the adb client and the device.
|
2016-01-22 04:56:50 +01:00
|
|
|
FeatureSet features;
|
2016-02-01 04:12:26 +01:00
|
|
|
std::string error;
|
|
|
|
if (!adb_get_feature_set(&features, &error)) {
|
|
|
|
fprintf(stderr, "error: %s\n", error.c_str());
|
2016-01-22 04:56:50 +01:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2015-09-22 19:43:08 +02:00
|
|
|
for (const std::string& name : features) {
|
2015-09-30 22:35:42 +02:00
|
|
|
if (CanUseFeature(features, name)) {
|
2015-09-22 19:43:08 +02:00
|
|
|
printf("%s\n", name.c_str());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
2017-02-23 02:07:01 +01:00
|
|
|
} else if (!strcmp(argv[0], "host-features")) {
|
|
|
|
return adb_query_command("host:host-features");
|
2016-04-05 22:50:44 +02:00
|
|
|
} else if (!strcmp(argv[0], "reconnect")) {
|
|
|
|
if (argc == 1) {
|
2017-08-17 01:57:01 +02:00
|
|
|
return adb_query_command(format_host_command(argv[0]));
|
2016-10-27 23:01:08 +02:00
|
|
|
} else if (argc == 2) {
|
|
|
|
if (!strcmp(argv[1], "device")) {
|
|
|
|
std::string err;
|
|
|
|
adb_connect("reconnect", &err);
|
|
|
|
return 0;
|
|
|
|
} else if (!strcmp(argv[1], "offline")) {
|
|
|
|
std::string err;
|
|
|
|
return adb_query_command("host:reconnect-offline");
|
|
|
|
} else {
|
2018-10-23 02:02:51 +02:00
|
|
|
error_exit("usage: adb reconnect [device|offline]");
|
2016-10-27 23:01:08 +02:00
|
|
|
}
|
2016-04-05 22:50:44 +02:00
|
|
|
}
|
2015-05-21 03:58:41 +02:00
|
|
|
}
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2018-10-23 02:02:51 +02:00
|
|
|
error_exit("unknown command %s", argv[0]);
|
2018-10-19 22:59:44 +02:00
|
|
|
__builtin_unreachable();
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|