2009-03-04 04:32:55 +01:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2007 The Android Open Source Project
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2015-09-23 00:52:57 +02:00
|
|
|
#define TRACE_TAG SOCKETS
|
2015-03-19 23:21:08 +01:00
|
|
|
|
|
|
|
#include "sysdeps.h"
|
|
|
|
|
2015-02-25 00:51:19 +01:00
|
|
|
#include <ctype.h>
|
|
|
|
#include <errno.h>
|
2009-03-04 04:32:55 +01:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
2015-02-25 00:51:19 +01:00
|
|
|
#include <unistd.h>
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2015-11-08 03:51:54 +01:00
|
|
|
#include <algorithm>
|
2016-05-18 02:46:27 +02:00
|
|
|
#include <mutex>
|
2016-03-01 17:58:26 +01:00
|
|
|
#include <string>
|
|
|
|
#include <vector>
|
2015-11-08 03:51:54 +01:00
|
|
|
|
2015-02-25 00:51:19 +01:00
|
|
|
#if !ADB_HOST
|
2016-09-24 00:40:03 +02:00
|
|
|
#include <android-base/properties.h>
|
2015-02-25 00:51:19 +01:00
|
|
|
#endif
|
2015-03-19 23:21:08 +01:00
|
|
|
|
|
|
|
#include "adb.h"
|
|
|
|
#include "adb_io.h"
|
2015-02-25 00:51:19 +01:00
|
|
|
#include "transport.h"
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2016-05-18 02:46:27 +02:00
|
|
|
static std::recursive_mutex& local_socket_list_lock = *new std::recursive_mutex();
|
2009-03-04 04:32:55 +01:00
|
|
|
static unsigned local_socket_next_id = 1;
|
|
|
|
|
|
|
|
static asocket local_socket_list = {
|
2016-05-18 01:55:06 +02:00
|
|
|
.next = &local_socket_list, .prev = &local_socket_list,
|
2009-03-04 04:32:55 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
/* the the list of currently closing local sockets.
|
|
|
|
** these have no peer anymore, but still packets to
|
|
|
|
** write to their fd.
|
|
|
|
*/
|
|
|
|
static asocket local_socket_closing_list = {
|
2016-05-18 01:55:06 +02:00
|
|
|
.next = &local_socket_closing_list, .prev = &local_socket_closing_list,
|
2009-03-04 04:32:55 +01:00
|
|
|
};
|
|
|
|
|
2013-12-13 14:09:44 +01:00
|
|
|
// Parse the global list of sockets to find one with id |local_id|.
|
|
|
|
// If |peer_id| is not 0, also check that it is connected to a peer
|
|
|
|
// with id |peer_id|. Returns an asocket handle on success, NULL on failure.
|
2016-05-18 01:55:06 +02:00
|
|
|
asocket* find_local_socket(unsigned local_id, unsigned peer_id) {
|
|
|
|
asocket* s;
|
|
|
|
asocket* result = NULL;
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2016-05-18 02:46:27 +02:00
|
|
|
std::lock_guard<std::recursive_mutex> lock(local_socket_list_lock);
|
2010-06-12 16:40:20 +02:00
|
|
|
for (s = local_socket_list.next; s != &local_socket_list; s = s->next) {
|
2016-05-18 01:55:06 +02:00
|
|
|
if (s->id != local_id) {
|
2013-12-13 14:09:44 +01:00
|
|
|
continue;
|
2016-05-18 01:55:06 +02:00
|
|
|
}
|
2013-12-13 14:09:44 +01:00
|
|
|
if (peer_id == 0 || (s->peer && s->peer->id == peer_id)) {
|
2010-06-12 16:40:20 +02:00
|
|
|
result = s;
|
|
|
|
}
|
2013-12-13 14:09:44 +01:00
|
|
|
break;
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
static void insert_local_socket(asocket* s, asocket* list) {
|
|
|
|
s->next = list;
|
|
|
|
s->prev = s->next->prev;
|
2009-03-04 04:32:55 +01:00
|
|
|
s->prev->next = s;
|
|
|
|
s->next->prev = s;
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
void install_local_socket(asocket* s) {
|
2016-05-18 02:46:27 +02:00
|
|
|
std::lock_guard<std::recursive_mutex> lock(local_socket_list_lock);
|
2009-03-04 04:32:55 +01:00
|
|
|
|
|
|
|
s->id = local_socket_next_id++;
|
2013-12-13 14:09:44 +01:00
|
|
|
|
|
|
|
// Socket ids should never be 0.
|
2016-05-18 01:55:06 +02:00
|
|
|
if (local_socket_next_id == 0) {
|
2016-05-18 02:46:27 +02:00
|
|
|
fatal("local socket id overflow");
|
2016-05-18 01:55:06 +02:00
|
|
|
}
|
2013-12-13 14:09:44 +01:00
|
|
|
|
2009-03-04 04:32:55 +01:00
|
|
|
insert_local_socket(s, &local_socket_list);
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
void remove_socket(asocket* s) {
|
2009-03-04 04:32:55 +01:00
|
|
|
// socket_list_lock should already be held
|
2016-05-18 01:55:06 +02:00
|
|
|
if (s->prev && s->next) {
|
2009-03-04 04:32:55 +01:00
|
|
|
s->prev->next = s->next;
|
|
|
|
s->next->prev = s->prev;
|
|
|
|
s->next = 0;
|
|
|
|
s->prev = 0;
|
|
|
|
s->id = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
void close_all_sockets(atransport* t) {
|
|
|
|
asocket* s;
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
/* this is a little gross, but since s->close() *will* modify
|
|
|
|
** the list out from under you, your options are limited.
|
|
|
|
*/
|
2016-05-18 02:46:27 +02:00
|
|
|
std::lock_guard<std::recursive_mutex> lock(local_socket_list_lock);
|
2009-03-04 04:32:55 +01:00
|
|
|
restart:
|
2016-05-18 01:55:06 +02:00
|
|
|
for (s = local_socket_list.next; s != &local_socket_list; s = s->next) {
|
|
|
|
if (s->transport == t || (s->peer && s->peer->transport == t)) {
|
2016-05-18 19:39:48 +02:00
|
|
|
s->close(s);
|
2009-03-04 04:32:55 +01:00
|
|
|
goto restart;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
static int local_socket_enqueue(asocket* s, apacket* p) {
|
2015-09-03 02:44:28 +02:00
|
|
|
D("LS(%d): enqueue %d", s->id, p->len);
|
2009-03-04 04:32:55 +01:00
|
|
|
|
|
|
|
p->ptr = p->data;
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
/* if there is already data queue'd, we will receive
|
|
|
|
** events when it's time to write. just add this to
|
|
|
|
** the tail
|
|
|
|
*/
|
|
|
|
if (s->pkt_first) {
|
2009-03-04 04:32:55 +01:00
|
|
|
goto enqueue;
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
/* write as much as we can, until we
|
|
|
|
** would block or there is an error/eof
|
|
|
|
*/
|
|
|
|
while (p->len > 0) {
|
2009-03-04 04:32:55 +01:00
|
|
|
int r = adb_write(s->fd, p->ptr, p->len);
|
2016-05-18 01:55:06 +02:00
|
|
|
if (r > 0) {
|
2009-03-04 04:32:55 +01:00
|
|
|
p->len -= r;
|
|
|
|
p->ptr += r;
|
|
|
|
continue;
|
|
|
|
}
|
2016-05-18 01:55:06 +02:00
|
|
|
if ((r == 0) || (errno != EAGAIN)) {
|
|
|
|
D("LS(%d): not ready, errno=%d: %s", s->id, errno, strerror(errno));
|
2015-09-16 01:27:09 +02:00
|
|
|
put_apacket(p);
|
|
|
|
s->has_write_error = true;
|
2009-03-04 04:32:55 +01:00
|
|
|
s->close(s);
|
|
|
|
return 1; /* not ready (error) */
|
|
|
|
} else {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
if (p->len == 0) {
|
2009-03-04 04:32:55 +01:00
|
|
|
put_apacket(p);
|
|
|
|
return 0; /* ready for more data */
|
|
|
|
}
|
|
|
|
|
|
|
|
enqueue:
|
|
|
|
p->next = 0;
|
2016-05-18 01:55:06 +02:00
|
|
|
if (s->pkt_first) {
|
2009-03-04 04:32:55 +01:00
|
|
|
s->pkt_last->next = p;
|
|
|
|
} else {
|
|
|
|
s->pkt_first = p;
|
|
|
|
}
|
|
|
|
s->pkt_last = p;
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
/* make sure we are notified when we can drain the queue */
|
2009-03-04 04:32:55 +01:00
|
|
|
fdevent_add(&s->fde, FDE_WRITE);
|
|
|
|
|
|
|
|
return 1; /* not ready (backlog) */
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
static void local_socket_ready(asocket* s) {
|
2015-02-18 12:53:37 +01:00
|
|
|
/* far side is ready for data, pay attention to
|
|
|
|
readable events */
|
2009-03-04 04:32:55 +01:00
|
|
|
fdevent_add(&s->fde, FDE_READ);
|
|
|
|
}
|
|
|
|
|
|
|
|
// be sure to hold the socket list lock when calling this
|
2016-05-18 01:55:06 +02:00
|
|
|
static void local_socket_destroy(asocket* s) {
|
2009-03-04 04:32:55 +01:00
|
|
|
apacket *p, *n;
|
2012-03-16 22:50:07 +01:00
|
|
|
int exit_on_close = s->exit_on_close;
|
|
|
|
|
2015-09-03 02:44:28 +02:00
|
|
|
D("LS(%d): destroying fde.fd=%d", s->id, s->fde.fd);
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
/* IMPORTANT: the remove closes the fd
|
|
|
|
** that belongs to this socket
|
|
|
|
*/
|
2009-03-04 04:32:55 +01:00
|
|
|
fdevent_remove(&s->fde);
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
/* dispose of any unwritten data */
|
|
|
|
for (p = s->pkt_first; p; p = n) {
|
2015-09-03 02:44:28 +02:00
|
|
|
D("LS(%d): discarding %d bytes", s->id, p->len);
|
2009-03-04 04:32:55 +01:00
|
|
|
n = p->next;
|
|
|
|
put_apacket(p);
|
|
|
|
}
|
|
|
|
remove_socket(s);
|
|
|
|
free(s);
|
2012-03-16 22:50:07 +01:00
|
|
|
|
|
|
|
if (exit_on_close) {
|
2015-09-03 02:44:28 +02:00
|
|
|
D("local_socket_destroy: exiting");
|
2012-03-16 22:50:07 +01:00
|
|
|
exit(1);
|
|
|
|
}
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
|
2016-05-18 02:46:27 +02:00
|
|
|
static void local_socket_close(asocket* s) {
|
|
|
|
D("entered local_socket_close. LS(%d) fd=%d", s->id, s->fd);
|
|
|
|
std::lock_guard<std::recursive_mutex> lock(local_socket_list_lock);
|
2016-05-18 01:55:06 +02:00
|
|
|
if (s->peer) {
|
|
|
|
D("LS(%d): closing peer. peer->id=%d peer->fd=%d", s->id, s->peer->id, s->peer->fd);
|
2013-12-13 14:09:44 +01:00
|
|
|
/* Note: it's important to call shutdown before disconnecting from
|
|
|
|
* the peer, this ensures that remote sockets can still get the id
|
|
|
|
* of the local socket they're connected to, to send a CLOSE()
|
|
|
|
* protocol event. */
|
2016-05-18 01:55:06 +02:00
|
|
|
if (s->peer->shutdown) {
|
|
|
|
s->peer->shutdown(s->peer);
|
|
|
|
}
|
2016-05-18 02:46:27 +02:00
|
|
|
s->peer->peer = nullptr;
|
|
|
|
s->peer->close(s->peer);
|
|
|
|
s->peer = nullptr;
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
/* If we are already closing, or if there are no
|
|
|
|
** pending packets, destroy immediately
|
|
|
|
*/
|
2015-09-16 01:27:09 +02:00
|
|
|
if (s->closing || s->has_write_error || s->pkt_first == NULL) {
|
2016-05-18 01:55:06 +02:00
|
|
|
int id = s->id;
|
2009-03-04 04:32:55 +01:00
|
|
|
local_socket_destroy(s);
|
2015-09-03 02:44:28 +02:00
|
|
|
D("LS(%d): closed", id);
|
2009-03-04 04:32:55 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
/* otherwise, put on the closing list
|
|
|
|
*/
|
2015-09-03 02:44:28 +02:00
|
|
|
D("LS(%d): closing", s->id);
|
2009-03-04 04:32:55 +01:00
|
|
|
s->closing = 1;
|
|
|
|
fdevent_del(&s->fde, FDE_READ);
|
|
|
|
remove_socket(s);
|
2015-09-03 02:44:28 +02:00
|
|
|
D("LS(%d): put on socket_closing_list fd=%d", s->id, s->fd);
|
2009-03-04 04:32:55 +01:00
|
|
|
insert_local_socket(s, &local_socket_closing_list);
|
2015-09-16 01:27:09 +02:00
|
|
|
CHECK_EQ(FDE_WRITE, s->fde.state & FDE_WRITE);
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
static void local_socket_event_func(int fd, unsigned ev, void* _s) {
|
2015-02-26 02:51:28 +01:00
|
|
|
asocket* s = reinterpret_cast<asocket*>(_s);
|
2015-09-03 02:44:28 +02:00
|
|
|
D("LS(%d): event_func(fd=%d(==%d), ev=%04x)", s->id, s->fd, fd, ev);
|
2011-03-16 23:57:42 +01:00
|
|
|
|
2009-03-04 04:32:55 +01:00
|
|
|
/* put the FDE_WRITE processing before the FDE_READ
|
|
|
|
** in order to simplify the code.
|
|
|
|
*/
|
2015-02-26 02:51:28 +01:00
|
|
|
if (ev & FDE_WRITE) {
|
|
|
|
apacket* p;
|
|
|
|
while ((p = s->pkt_first) != nullptr) {
|
|
|
|
while (p->len > 0) {
|
2009-03-04 04:32:55 +01:00
|
|
|
int r = adb_write(fd, p->ptr, p->len);
|
2015-02-26 02:51:28 +01:00
|
|
|
if (r == -1) {
|
2009-03-04 04:32:55 +01:00
|
|
|
/* returning here is ok because FDE_READ will
|
|
|
|
** be processed in the next iteration loop
|
|
|
|
*/
|
2015-02-26 02:51:28 +01:00
|
|
|
if (errno == EAGAIN) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
} else if (r > 0) {
|
|
|
|
p->ptr += r;
|
|
|
|
p->len -= r;
|
|
|
|
continue;
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
2015-02-26 02:51:28 +01:00
|
|
|
|
2015-09-03 02:44:28 +02:00
|
|
|
D(" closing after write because r=%d and errno is %d", r, errno);
|
2015-09-16 01:27:09 +02:00
|
|
|
s->has_write_error = true;
|
2009-03-04 04:32:55 +01:00
|
|
|
s->close(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-02-26 02:51:28 +01:00
|
|
|
if (p->len == 0) {
|
2009-03-04 04:32:55 +01:00
|
|
|
s->pkt_first = p->next;
|
2015-02-26 02:51:28 +01:00
|
|
|
if (s->pkt_first == 0) {
|
|
|
|
s->pkt_last = 0;
|
|
|
|
}
|
2009-03-04 04:32:55 +01:00
|
|
|
put_apacket(p);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-02-26 02:51:28 +01:00
|
|
|
/* if we sent the last packet of a closing socket,
|
|
|
|
** we can now destroy it.
|
|
|
|
*/
|
2009-03-04 04:32:55 +01:00
|
|
|
if (s->closing) {
|
2015-09-03 02:44:28 +02:00
|
|
|
D(" closing because 'closing' is set after write");
|
2009-03-04 04:32:55 +01:00
|
|
|
s->close(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-02-26 02:51:28 +01:00
|
|
|
/* no more packets queued, so we can ignore
|
|
|
|
** writable events again and tell our peer
|
|
|
|
** to resume writing
|
|
|
|
*/
|
2009-03-04 04:32:55 +01:00
|
|
|
fdevent_del(&s->fde, FDE_WRITE);
|
|
|
|
s->peer->ready(s->peer);
|
|
|
|
}
|
|
|
|
|
2015-02-26 02:51:28 +01:00
|
|
|
if (ev & FDE_READ) {
|
2016-05-18 01:55:06 +02:00
|
|
|
apacket* p = get_apacket();
|
|
|
|
unsigned char* x = p->data;
|
2015-07-13 20:12:28 +02:00
|
|
|
const size_t max_payload = s->get_max_payload();
|
|
|
|
size_t avail = max_payload;
|
|
|
|
int r = 0;
|
2009-03-04 04:32:55 +01:00
|
|
|
int is_eof = 0;
|
|
|
|
|
2015-02-26 02:51:28 +01:00
|
|
|
while (avail > 0) {
|
2009-03-04 04:32:55 +01:00
|
|
|
r = adb_read(fd, x, avail);
|
2016-05-18 01:55:06 +02:00
|
|
|
D("LS(%d): post adb_read(fd=%d,...) r=%d (errno=%d) avail=%zu", s->id, s->fd, r,
|
|
|
|
r < 0 ? errno : 0, avail);
|
2015-02-26 02:51:28 +01:00
|
|
|
if (r == -1) {
|
|
|
|
if (errno == EAGAIN) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else if (r > 0) {
|
2009-03-04 04:32:55 +01:00
|
|
|
avail -= r;
|
|
|
|
x += r;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2015-02-26 02:51:28 +01:00
|
|
|
/* r = 0 or unhandled error */
|
2009-03-04 04:32:55 +01:00
|
|
|
is_eof = 1;
|
|
|
|
break;
|
|
|
|
}
|
2016-05-18 01:55:06 +02:00
|
|
|
D("LS(%d): fd=%d post avail loop. r=%d is_eof=%d forced_eof=%d", s->id, s->fd, r, is_eof,
|
|
|
|
s->fde.force_eof);
|
2015-07-13 20:12:28 +02:00
|
|
|
if ((avail == max_payload) || (s->peer == 0)) {
|
2009-03-04 04:32:55 +01:00
|
|
|
put_apacket(p);
|
|
|
|
} else {
|
2015-07-13 20:12:28 +02:00
|
|
|
p->len = max_payload - avail;
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2015-08-26 21:27:40 +02:00
|
|
|
// s->peer->enqueue() may call s->close() and free s,
|
|
|
|
// so save variables for debug printing below.
|
|
|
|
unsigned saved_id = s->id;
|
|
|
|
int saved_fd = s->fd;
|
2009-03-04 04:32:55 +01:00
|
|
|
r = s->peer->enqueue(s->peer, p);
|
2015-09-03 02:44:28 +02:00
|
|
|
D("LS(%u): fd=%d post peer->enqueue(). r=%d", saved_id, saved_fd, r);
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2015-02-26 02:51:28 +01:00
|
|
|
if (r < 0) {
|
2016-05-18 01:55:06 +02:00
|
|
|
/* error return means they closed us as a side-effect
|
|
|
|
** and we must return immediately.
|
|
|
|
**
|
|
|
|
** note that if we still have buffered packets, the
|
|
|
|
** socket will be placed on the closing socket list.
|
|
|
|
** this handler function will be called again
|
|
|
|
** to process FDE_WRITE events.
|
|
|
|
*/
|
2009-03-04 04:32:55 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-02-26 02:51:28 +01:00
|
|
|
if (r > 0) {
|
2016-05-18 01:55:06 +02:00
|
|
|
/* if the remote cannot accept further events,
|
|
|
|
** we disable notification of READs. They'll
|
|
|
|
** be enabled again when we get a call to ready()
|
|
|
|
*/
|
2009-03-04 04:32:55 +01:00
|
|
|
fdevent_del(&s->fde, FDE_READ);
|
|
|
|
}
|
|
|
|
}
|
2011-04-13 07:01:58 +02:00
|
|
|
/* Don't allow a forced eof if data is still there */
|
2015-02-26 02:51:28 +01:00
|
|
|
if ((s->fde.force_eof && !r) || is_eof) {
|
2016-05-18 01:55:06 +02:00
|
|
|
D(" closing because is_eof=%d r=%d s->fde.force_eof=%d", is_eof, r, s->fde.force_eof);
|
2009-03-04 04:32:55 +01:00
|
|
|
s->close(s);
|
2015-09-16 01:27:09 +02:00
|
|
|
return;
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
if (ev & FDE_ERROR) {
|
|
|
|
/* this should be caught be the next read or write
|
|
|
|
** catching it here means we may skip the last few
|
|
|
|
** bytes of readable data.
|
|
|
|
*/
|
2015-09-03 02:44:28 +02:00
|
|
|
D("LS(%d): FDE_ERROR (fd=%d)", s->id, s->fd);
|
2009-03-04 04:32:55 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
asocket* create_local_socket(int fd) {
|
|
|
|
asocket* s = reinterpret_cast<asocket*>(calloc(1, sizeof(asocket)));
|
|
|
|
if (s == NULL) {
|
|
|
|
fatal("cannot allocate socket");
|
|
|
|
}
|
2009-03-04 04:32:55 +01:00
|
|
|
s->fd = fd;
|
|
|
|
s->enqueue = local_socket_enqueue;
|
|
|
|
s->ready = local_socket_ready;
|
2013-12-13 14:09:44 +01:00
|
|
|
s->shutdown = NULL;
|
2009-03-04 04:32:55 +01:00
|
|
|
s->close = local_socket_close;
|
2011-03-16 23:57:42 +01:00
|
|
|
install_local_socket(s);
|
2009-03-04 04:32:55 +01:00
|
|
|
|
|
|
|
fdevent_install(&s->fde, fd, local_socket_event_func, s);
|
2015-09-03 02:44:28 +02:00
|
|
|
D("LS(%d): created (fd=%d)", s->id, s->fd);
|
2009-03-04 04:32:55 +01:00
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
asocket* create_local_service_socket(const char* name, const atransport* transport) {
|
2009-03-04 04:32:55 +01:00
|
|
|
#if !ADB_HOST
|
2016-05-18 01:55:06 +02:00
|
|
|
if (!strcmp(name, "jdwp")) {
|
2009-03-04 04:32:55 +01:00
|
|
|
return create_jdwp_service_socket();
|
|
|
|
}
|
2016-05-18 01:55:06 +02:00
|
|
|
if (!strcmp(name, "track-jdwp")) {
|
2009-03-04 04:32:55 +01:00
|
|
|
return create_jdwp_tracker_service_socket();
|
|
|
|
}
|
|
|
|
#endif
|
2015-08-31 19:42:13 +02:00
|
|
|
int fd = service_to_fd(name, transport);
|
2016-05-18 01:55:06 +02:00
|
|
|
if (fd < 0) {
|
2016-06-15 23:46:56 +02:00
|
|
|
return nullptr;
|
2016-05-18 01:55:06 +02:00
|
|
|
}
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2014-10-06 19:57:20 +02:00
|
|
|
asocket* s = create_local_socket(fd);
|
2015-09-03 02:44:28 +02:00
|
|
|
D("LS(%d): bound to '%s' via %d", s->id, name, fd);
|
2012-03-16 22:50:07 +01:00
|
|
|
|
2012-03-30 22:19:11 +02:00
|
|
|
#if !ADB_HOST
|
2016-09-24 00:40:03 +02:00
|
|
|
bool debuggable = false;
|
2016-05-18 01:55:06 +02:00
|
|
|
if (!strncmp(name, "root:", 5)) {
|
2016-09-24 00:40:03 +02:00
|
|
|
debuggable = android::base::GetBoolProperty("ro.debuggable", false);
|
2016-05-18 01:55:06 +02:00
|
|
|
}
|
2013-05-24 23:40:15 +02:00
|
|
|
|
2016-09-24 00:40:03 +02:00
|
|
|
if ((!strncmp(name, "root:", 5) && getuid() != 0 && debuggable) ||
|
2016-05-18 01:55:06 +02:00
|
|
|
(!strncmp(name, "unroot:", 7) && getuid() == 0) ||
|
|
|
|
!strncmp(name, "usb:", 4) ||
|
|
|
|
!strncmp(name, "tcpip:", 6)) {
|
2015-09-03 02:44:28 +02:00
|
|
|
D("LS(%d): enabling exit_on_close", s->id);
|
2012-03-16 22:50:07 +01:00
|
|
|
s->exit_on_close = 1;
|
|
|
|
}
|
2012-03-30 22:19:11 +02:00
|
|
|
#endif
|
2012-03-16 22:50:07 +01:00
|
|
|
|
2009-03-04 04:32:55 +01:00
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
|
|
|
#if ADB_HOST
|
2016-05-18 01:55:06 +02:00
|
|
|
static asocket* create_host_service_socket(const char* name, const char* serial) {
|
|
|
|
asocket* s;
|
2009-03-04 04:32:55 +01:00
|
|
|
|
|
|
|
s = host_service_to_socket(name, serial);
|
|
|
|
|
|
|
|
if (s != NULL) {
|
2015-09-03 02:44:28 +02:00
|
|
|
D("LS(%d) bound to '%s'", s->id, name);
|
2009-03-04 04:32:55 +01:00
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
|
|
|
return s;
|
|
|
|
}
|
|
|
|
#endif /* ADB_HOST */
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
static int remote_socket_enqueue(asocket* s, apacket* p) {
|
|
|
|
D("entered remote_socket_enqueue RS(%d) WRITE fd=%d peer.fd=%d", s->id, s->fd, s->peer->fd);
|
2009-03-04 04:32:55 +01:00
|
|
|
p->msg.command = A_WRTE;
|
|
|
|
p->msg.arg0 = s->peer->id;
|
|
|
|
p->msg.arg1 = s->id;
|
|
|
|
p->msg.data_length = p->len;
|
|
|
|
send_packet(p, s->transport);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
static void remote_socket_ready(asocket* s) {
|
|
|
|
D("entered remote_socket_ready RS(%d) OKAY fd=%d peer.fd=%d", s->id, s->fd, s->peer->fd);
|
|
|
|
apacket* p = get_apacket();
|
2009-03-04 04:32:55 +01:00
|
|
|
p->msg.command = A_OKAY;
|
|
|
|
p->msg.arg0 = s->peer->id;
|
|
|
|
p->msg.arg1 = s->id;
|
|
|
|
send_packet(p, s->transport);
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
static void remote_socket_shutdown(asocket* s) {
|
|
|
|
D("entered remote_socket_shutdown RS(%d) CLOSE fd=%d peer->fd=%d", s->id, s->fd,
|
|
|
|
s->peer ? s->peer->fd : -1);
|
|
|
|
apacket* p = get_apacket();
|
2009-03-04 04:32:55 +01:00
|
|
|
p->msg.command = A_CLSE;
|
2016-05-18 01:55:06 +02:00
|
|
|
if (s->peer) {
|
2009-03-04 04:32:55 +01:00
|
|
|
p->msg.arg0 = s->peer->id;
|
2013-12-13 14:09:44 +01:00
|
|
|
}
|
|
|
|
p->msg.arg1 = s->id;
|
|
|
|
send_packet(p, s->transport);
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
static void remote_socket_close(asocket* s) {
|
2013-12-13 14:09:44 +01:00
|
|
|
if (s->peer) {
|
2009-03-04 04:32:55 +01:00
|
|
|
s->peer->peer = 0;
|
2016-05-18 01:55:06 +02:00
|
|
|
D("RS(%d) peer->close()ing peer->id=%d peer->fd=%d", s->id, s->peer->id, s->peer->fd);
|
2009-03-04 04:32:55 +01:00
|
|
|
s->peer->close(s->peer);
|
|
|
|
}
|
2016-05-18 01:55:06 +02:00
|
|
|
D("entered remote_socket_close RS(%d) CLOSE fd=%d peer->fd=%d", s->id, s->fd,
|
|
|
|
s->peer ? s->peer->fd : -1);
|
2015-09-03 02:44:28 +02:00
|
|
|
D("RS(%d): closed", s->id);
|
2009-03-04 04:32:55 +01:00
|
|
|
free(s);
|
|
|
|
}
|
|
|
|
|
2015-08-28 03:50:04 +02:00
|
|
|
// Create a remote socket to exchange packets with a remote service through transport
|
|
|
|
// |t|. Where |id| is the socket id of the corresponding service on the other
|
|
|
|
// side of the transport (it is allocated by the remote side and _cannot_ be 0).
|
|
|
|
// Returns a new non-NULL asocket handle.
|
2016-05-18 01:55:06 +02:00
|
|
|
asocket* create_remote_socket(unsigned id, atransport* t) {
|
|
|
|
if (id == 0) {
|
|
|
|
fatal("invalid remote socket id (0)");
|
|
|
|
}
|
2015-08-28 03:50:04 +02:00
|
|
|
asocket* s = reinterpret_cast<asocket*>(calloc(1, sizeof(asocket)));
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
if (s == NULL) {
|
|
|
|
fatal("cannot allocate socket");
|
|
|
|
}
|
2009-03-04 04:32:55 +01:00
|
|
|
s->id = id;
|
|
|
|
s->enqueue = remote_socket_enqueue;
|
|
|
|
s->ready = remote_socket_ready;
|
2013-12-13 14:09:44 +01:00
|
|
|
s->shutdown = remote_socket_shutdown;
|
2009-03-04 04:32:55 +01:00
|
|
|
s->close = remote_socket_close;
|
|
|
|
s->transport = t;
|
|
|
|
|
2015-09-03 02:44:28 +02:00
|
|
|
D("RS(%d): created", s->id);
|
2009-03-04 04:32:55 +01:00
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
void connect_to_remote(asocket* s, const char* destination) {
|
2015-09-03 02:44:28 +02:00
|
|
|
D("Connect_to_remote call RS(%d) fd=%d", s->id, s->fd);
|
2016-05-18 01:55:06 +02:00
|
|
|
apacket* p = get_apacket();
|
2015-07-13 20:12:28 +02:00
|
|
|
size_t len = strlen(destination) + 1;
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
if (len > (s->get_max_payload() - 1)) {
|
2009-03-04 04:32:55 +01:00
|
|
|
fatal("destination oversized");
|
|
|
|
}
|
|
|
|
|
2015-09-03 02:44:28 +02:00
|
|
|
D("LS(%d): connect('%s')", s->id, destination);
|
2009-03-04 04:32:55 +01:00
|
|
|
p->msg.command = A_OPEN;
|
|
|
|
p->msg.arg0 = s->id;
|
|
|
|
p->msg.data_length = len;
|
2016-05-18 01:55:06 +02:00
|
|
|
strcpy((char*)p->data, destination);
|
2009-03-04 04:32:55 +01:00
|
|
|
send_packet(p, s->transport);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* this is used by magic sockets to rig local sockets to
|
|
|
|
send the go-ahead message when they connect */
|
2016-05-18 01:55:06 +02:00
|
|
|
static void local_socket_ready_notify(asocket* s) {
|
2009-03-04 04:32:55 +01:00
|
|
|
s->ready = local_socket_ready;
|
2013-12-13 14:09:44 +01:00
|
|
|
s->shutdown = NULL;
|
2009-03-04 04:32:55 +01:00
|
|
|
s->close = local_socket_close;
|
2015-05-01 02:32:03 +02:00
|
|
|
SendOkay(s->fd);
|
2009-03-04 04:32:55 +01:00
|
|
|
s->ready(s);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* this is used by magic sockets to rig local sockets to
|
|
|
|
send the failure message if they are closed before
|
|
|
|
connected (to avoid closing them without a status message) */
|
2016-05-18 01:55:06 +02:00
|
|
|
static void local_socket_close_notify(asocket* s) {
|
2009-03-04 04:32:55 +01:00
|
|
|
s->ready = local_socket_ready;
|
2013-12-13 14:09:44 +01:00
|
|
|
s->shutdown = NULL;
|
2009-03-04 04:32:55 +01:00
|
|
|
s->close = local_socket_close;
|
2015-05-01 02:32:03 +02:00
|
|
|
SendFail(s->fd, "closed");
|
2009-03-04 04:32:55 +01:00
|
|
|
s->close(s);
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
static unsigned unhex(unsigned char* s, int len) {
|
2009-03-04 04:32:55 +01:00
|
|
|
unsigned n = 0, c;
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
while (len-- > 0) {
|
|
|
|
switch ((c = *s++)) {
|
|
|
|
case '0':
|
|
|
|
case '1':
|
|
|
|
case '2':
|
|
|
|
case '3':
|
|
|
|
case '4':
|
|
|
|
case '5':
|
|
|
|
case '6':
|
|
|
|
case '7':
|
|
|
|
case '8':
|
|
|
|
case '9':
|
|
|
|
c -= '0';
|
|
|
|
break;
|
|
|
|
case 'a':
|
|
|
|
case 'b':
|
|
|
|
case 'c':
|
|
|
|
case 'd':
|
|
|
|
case 'e':
|
|
|
|
case 'f':
|
|
|
|
c = c - 'a' + 10;
|
|
|
|
break;
|
|
|
|
case 'A':
|
|
|
|
case 'B':
|
|
|
|
case 'C':
|
|
|
|
case 'D':
|
|
|
|
case 'E':
|
|
|
|
case 'F':
|
|
|
|
c = c - 'A' + 10;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return 0xffffffff;
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
n = (n << 4) | c;
|
|
|
|
}
|
|
|
|
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
2015-05-01 02:32:03 +02:00
|
|
|
#if ADB_HOST
|
|
|
|
|
2016-03-01 17:58:26 +01:00
|
|
|
namespace internal {
|
|
|
|
|
|
|
|
// Returns the position in |service| following the target serial parameter. Serial format can be
|
|
|
|
// any of:
|
|
|
|
// * [tcp:|udp:]<serial>[:<port>]:<command>
|
|
|
|
// * <prefix>:<serial>:<command>
|
|
|
|
// Where <port> must be a base-10 number and <prefix> may be any of {usb,product,model,device}.
|
|
|
|
//
|
|
|
|
// The returned pointer will point to the ':' just before <command>, or nullptr if not found.
|
2016-03-29 00:32:37 +02:00
|
|
|
char* skip_host_serial(char* service) {
|
2016-03-01 17:58:26 +01:00
|
|
|
static const std::vector<std::string>& prefixes =
|
|
|
|
*(new std::vector<std::string>{"usb:", "product:", "model:", "device:"});
|
|
|
|
|
|
|
|
for (const std::string& prefix : prefixes) {
|
|
|
|
if (!strncmp(service, prefix.c_str(), prefix.length())) {
|
|
|
|
return strchr(service + prefix.length(), ':');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// For fastboot compatibility, ignore protocol prefixes.
|
|
|
|
if (!strncmp(service, "tcp:", 4) || !strncmp(service, "udp:", 4)) {
|
|
|
|
service += 4;
|
2012-05-31 21:04:23 +02:00
|
|
|
}
|
|
|
|
|
2016-09-21 21:08:37 +02:00
|
|
|
// Check for an IPv6 address. `adb connect` creates the serial number from the canonical
|
|
|
|
// network address so it will always have the [] delimiters.
|
|
|
|
if (service[0] == '[') {
|
|
|
|
char* ipv6_end = strchr(service, ']');
|
|
|
|
if (ipv6_end != nullptr) {
|
|
|
|
service = ipv6_end;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// The next colon we find must either begin the port field or the command field.
|
|
|
|
char* colon_ptr = strchr(service, ':');
|
|
|
|
if (!colon_ptr) {
|
2016-03-01 17:58:26 +01:00
|
|
|
// No colon in service string.
|
|
|
|
return nullptr;
|
2011-03-16 09:43:56 +01:00
|
|
|
}
|
2016-03-01 17:58:26 +01:00
|
|
|
|
2016-09-21 21:08:37 +02:00
|
|
|
// If the next field is only decimal digits and ends with another colon, it's a port.
|
|
|
|
char* serial_end = colon_ptr;
|
2011-03-16 09:43:56 +01:00
|
|
|
if (isdigit(serial_end[1])) {
|
|
|
|
serial_end++;
|
2016-03-01 17:58:26 +01:00
|
|
|
while (*serial_end && isdigit(*serial_end)) {
|
2011-03-16 09:43:56 +01:00
|
|
|
serial_end++;
|
|
|
|
}
|
2016-03-01 17:58:26 +01:00
|
|
|
if (*serial_end != ':') {
|
2016-09-21 21:08:37 +02:00
|
|
|
// Something other than "<port>:" was found, this must be the command field instead.
|
|
|
|
serial_end = colon_ptr;
|
2011-03-16 09:43:56 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return serial_end;
|
|
|
|
}
|
|
|
|
|
2016-03-01 17:58:26 +01:00
|
|
|
} // namespace internal
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
#endif // ADB_HOST
|
2015-05-01 02:32:03 +02:00
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
static int smart_socket_enqueue(asocket* s, apacket* p) {
|
2009-03-04 04:32:55 +01:00
|
|
|
unsigned len;
|
|
|
|
#if ADB_HOST
|
2016-05-18 01:55:06 +02:00
|
|
|
char* service = nullptr;
|
2015-10-07 23:55:10 +02:00
|
|
|
char* serial = nullptr;
|
2015-05-05 22:10:43 +02:00
|
|
|
TransportType type = kTransportAny;
|
2009-03-04 04:32:55 +01:00
|
|
|
#endif
|
|
|
|
|
2015-09-03 02:44:28 +02:00
|
|
|
D("SS(%d): enqueue %d", s->id, p->len);
|
2009-03-04 04:32:55 +01:00
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
if (s->pkt_first == 0) {
|
2009-03-04 04:32:55 +01:00
|
|
|
s->pkt_first = p;
|
|
|
|
s->pkt_last = p;
|
|
|
|
} else {
|
2016-05-18 01:55:06 +02:00
|
|
|
if ((s->pkt_first->len + p->len) > s->get_max_payload()) {
|
2015-09-03 02:44:28 +02:00
|
|
|
D("SS(%d): overflow", s->id);
|
2009-03-04 04:32:55 +01:00
|
|
|
put_apacket(p);
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
memcpy(s->pkt_first->data + s->pkt_first->len, p->data, p->len);
|
2009-03-04 04:32:55 +01:00
|
|
|
s->pkt_first->len += p->len;
|
|
|
|
put_apacket(p);
|
|
|
|
|
|
|
|
p = s->pkt_first;
|
|
|
|
}
|
|
|
|
|
2016-01-15 23:35:54 +01:00
|
|
|
/* don't bother if we can't decode the length */
|
2016-05-18 01:55:06 +02:00
|
|
|
if (p->len < 4) {
|
|
|
|
return 0;
|
|
|
|
}
|
2009-03-04 04:32:55 +01:00
|
|
|
|
|
|
|
len = unhex(p->data, 4);
|
2016-01-15 23:35:54 +01:00
|
|
|
if ((len < 1) || (len > MAX_PAYLOAD_V1)) {
|
2015-09-03 02:44:28 +02:00
|
|
|
D("SS(%d): bad size (%d)", s->id, len);
|
2009-03-04 04:32:55 +01:00
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
D("SS(%d): len is %d", s->id, len);
|
2016-01-15 23:35:54 +01:00
|
|
|
/* can't do anything until we have the full header */
|
2016-05-18 01:55:06 +02:00
|
|
|
if ((len + 4) > p->len) {
|
|
|
|
D("SS(%d): waiting for %d more bytes", s->id, len + 4 - p->len);
|
2009-03-04 04:32:55 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
p->data[len + 4] = 0;
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
D("SS(%d): '%s'", s->id, (char*)(p->data + 4));
|
2009-03-04 04:32:55 +01:00
|
|
|
|
|
|
|
#if ADB_HOST
|
2016-05-18 01:55:06 +02:00
|
|
|
service = (char*)p->data + 4;
|
|
|
|
if (!strncmp(service, "host-serial:", strlen("host-serial:"))) {
|
2009-03-04 04:32:55 +01:00
|
|
|
char* serial_end;
|
|
|
|
service += strlen("host-serial:");
|
|
|
|
|
2011-03-16 09:43:56 +01:00
|
|
|
// serial number should follow "host:" and could be a host:port string.
|
2016-03-01 17:58:26 +01:00
|
|
|
serial_end = internal::skip_host_serial(service);
|
2009-03-04 04:32:55 +01:00
|
|
|
if (serial_end) {
|
2016-05-18 01:55:06 +02:00
|
|
|
*serial_end = 0; // terminate string
|
2009-03-04 04:32:55 +01:00
|
|
|
serial = service;
|
|
|
|
service = serial_end + 1;
|
|
|
|
}
|
|
|
|
} else if (!strncmp(service, "host-usb:", strlen("host-usb:"))) {
|
2015-05-05 22:10:43 +02:00
|
|
|
type = kTransportUsb;
|
2009-03-04 04:32:55 +01:00
|
|
|
service += strlen("host-usb:");
|
|
|
|
} else if (!strncmp(service, "host-local:", strlen("host-local:"))) {
|
2015-05-05 22:10:43 +02:00
|
|
|
type = kTransportLocal;
|
2009-03-04 04:32:55 +01:00
|
|
|
service += strlen("host-local:");
|
|
|
|
} else if (!strncmp(service, "host:", strlen("host:"))) {
|
2015-05-05 22:10:43 +02:00
|
|
|
type = kTransportAny;
|
2009-03-04 04:32:55 +01:00
|
|
|
service += strlen("host:");
|
|
|
|
} else {
|
2015-10-07 23:55:10 +02:00
|
|
|
service = nullptr;
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (service) {
|
2016-05-18 01:55:06 +02:00
|
|
|
asocket* s2;
|
|
|
|
|
|
|
|
/* some requests are handled immediately -- in that
|
|
|
|
** case the handle_host_request() routine has sent
|
|
|
|
** the OKAY or FAIL message and all we have to do
|
|
|
|
** is clean up.
|
|
|
|
*/
|
|
|
|
if (handle_host_request(service, type, serial, s->peer->fd, s) == 0) {
|
|
|
|
/* XXX fail message? */
|
|
|
|
D("SS(%d): handled host service '%s'", s->id, service);
|
2009-03-04 04:32:55 +01:00
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
if (!strncmp(service, "transport", strlen("transport"))) {
|
2016-05-18 01:55:06 +02:00
|
|
|
D("SS(%d): okay transport", s->id);
|
2009-03-04 04:32:55 +01:00
|
|
|
p->len = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
/* try to find a local service with this name.
|
|
|
|
** if no such service exists, we'll fail out
|
|
|
|
** and tear down here.
|
|
|
|
*/
|
2009-03-04 04:32:55 +01:00
|
|
|
s2 = create_host_service_socket(service, serial);
|
2016-05-18 01:55:06 +02:00
|
|
|
if (s2 == 0) {
|
|
|
|
D("SS(%d): couldn't create host service '%s'", s->id, service);
|
2015-05-01 02:32:03 +02:00
|
|
|
SendFail(s->peer->fd, "unknown host service");
|
2009-03-04 04:32:55 +01:00
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
/* we've connected to a local host service,
|
|
|
|
** so we make our peer back into a regular
|
|
|
|
** local socket and bind it to the new local
|
|
|
|
** service socket, acknowledge the successful
|
|
|
|
** connection, and close this smart socket now
|
|
|
|
** that its work is done.
|
|
|
|
*/
|
2015-05-01 02:32:03 +02:00
|
|
|
SendOkay(s->peer->fd);
|
2009-03-04 04:32:55 +01:00
|
|
|
|
|
|
|
s->peer->ready = local_socket_ready;
|
2015-10-07 23:55:10 +02:00
|
|
|
s->peer->shutdown = nullptr;
|
2009-03-04 04:32:55 +01:00
|
|
|
s->peer->close = local_socket_close;
|
|
|
|
s->peer->peer = s2;
|
|
|
|
s2->peer = s->peer;
|
|
|
|
s->peer = 0;
|
2016-05-18 01:55:06 +02:00
|
|
|
D("SS(%d): okay", s->id);
|
2009-03-04 04:32:55 +01:00
|
|
|
s->close(s);
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
/* initial state is "ready" */
|
2009-03-04 04:32:55 +01:00
|
|
|
s2->ready(s2);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#else /* !ADB_HOST */
|
2015-10-07 23:55:10 +02:00
|
|
|
if (s->transport == nullptr) {
|
2015-04-17 07:54:44 +02:00
|
|
|
std::string error_msg = "unknown failure";
|
2015-10-07 23:55:10 +02:00
|
|
|
s->transport = acquire_one_transport(kTransportAny, nullptr, nullptr, &error_msg);
|
|
|
|
if (s->transport == nullptr) {
|
2015-05-01 02:32:03 +02:00
|
|
|
SendFail(s->peer->fd, error_msg);
|
2009-03-04 04:32:55 +01:00
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
if (!(s->transport) || (s->transport->connection_state == kCsOffline)) {
|
|
|
|
/* if there's no remote we fail the connection
|
|
|
|
** right here and terminate it
|
|
|
|
*/
|
2015-05-01 02:32:03 +02:00
|
|
|
SendFail(s->peer->fd, "device offline (x)");
|
2009-03-04 04:32:55 +01:00
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
/* instrument our peer to pass the success or fail
|
|
|
|
** message back once it connects or closes, then
|
|
|
|
** detach from it, request the connection, and
|
|
|
|
** tear down
|
|
|
|
*/
|
2009-03-04 04:32:55 +01:00
|
|
|
s->peer->ready = local_socket_ready_notify;
|
2015-10-07 23:55:10 +02:00
|
|
|
s->peer->shutdown = nullptr;
|
2009-03-04 04:32:55 +01:00
|
|
|
s->peer->close = local_socket_close_notify;
|
|
|
|
s->peer->peer = 0;
|
2016-05-18 01:55:06 +02:00
|
|
|
/* give him our transport and upref it */
|
2009-03-04 04:32:55 +01:00
|
|
|
s->peer->transport = s->transport;
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
connect_to_remote(s->peer, (char*)(p->data + 4));
|
2009-03-04 04:32:55 +01:00
|
|
|
s->peer = 0;
|
|
|
|
s->close(s);
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
fail:
|
2016-05-18 01:55:06 +02:00
|
|
|
/* we're going to close our peer as a side-effect, so
|
|
|
|
** return -1 to signal that state to the local socket
|
|
|
|
** who is enqueueing against us
|
|
|
|
*/
|
2009-03-04 04:32:55 +01:00
|
|
|
s->close(s);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
static void smart_socket_ready(asocket* s) {
|
2015-09-03 02:44:28 +02:00
|
|
|
D("SS(%d): ready", s->id);
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
static void smart_socket_close(asocket* s) {
|
2015-09-03 02:44:28 +02:00
|
|
|
D("SS(%d): closed", s->id);
|
2016-05-18 01:55:06 +02:00
|
|
|
if (s->pkt_first) {
|
2009-03-04 04:32:55 +01:00
|
|
|
put_apacket(s->pkt_first);
|
|
|
|
}
|
2016-05-18 01:55:06 +02:00
|
|
|
if (s->peer) {
|
2009-03-04 04:32:55 +01:00
|
|
|
s->peer->peer = 0;
|
|
|
|
s->peer->close(s->peer);
|
2011-05-13 20:24:55 +02:00
|
|
|
s->peer = 0;
|
2009-03-04 04:32:55 +01:00
|
|
|
}
|
|
|
|
free(s);
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
static asocket* create_smart_socket(void) {
|
2015-09-03 02:44:28 +02:00
|
|
|
D("Creating smart socket");
|
2016-05-18 01:55:06 +02:00
|
|
|
asocket* s = reinterpret_cast<asocket*>(calloc(1, sizeof(asocket)));
|
2010-06-11 01:48:19 +02:00
|
|
|
if (s == NULL) fatal("cannot allocate socket");
|
2009-03-04 04:32:55 +01:00
|
|
|
s->enqueue = smart_socket_enqueue;
|
|
|
|
s->ready = smart_socket_ready;
|
2013-12-13 14:09:44 +01:00
|
|
|
s->shutdown = NULL;
|
2009-03-04 04:32:55 +01:00
|
|
|
s->close = smart_socket_close;
|
|
|
|
|
2015-09-03 02:44:28 +02:00
|
|
|
D("SS(%d)", s->id);
|
2009-03-04 04:32:55 +01:00
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
2016-05-18 01:55:06 +02:00
|
|
|
void connect_to_smartsocket(asocket* s) {
|
2015-09-03 02:44:28 +02:00
|
|
|
D("Connecting to smart socket");
|
2016-05-18 01:55:06 +02:00
|
|
|
asocket* ss = create_smart_socket();
|
2009-03-04 04:32:55 +01:00
|
|
|
s->peer = ss;
|
|
|
|
ss->peer = s;
|
|
|
|
s->ready(s);
|
|
|
|
}
|
2015-07-13 20:12:28 +02:00
|
|
|
|
|
|
|
size_t asocket::get_max_payload() const {
|
|
|
|
size_t max_payload = MAX_PAYLOAD;
|
|
|
|
if (transport) {
|
|
|
|
max_payload = std::min(max_payload, transport->get_max_payload());
|
|
|
|
}
|
|
|
|
if (peer && peer->transport) {
|
|
|
|
max_payload = std::min(max_payload, peer->transport->get_max_payload());
|
|
|
|
}
|
|
|
|
return max_payload;
|
|
|
|
}
|