blob: 5fe3052b565c84379db2ffda5a712799901a93af [file] [log] [blame]
Doug Zongker9270a202012-01-09 15:16:13 -08001/*
2 * Copyright (C) 2007 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
xunchang95d67322019-04-05 16:16:07 -070017#include "minadbd_services.h"
18
Doug Zongker9270a202012-01-09 15:16:13 -080019#include <errno.h>
Dan Albert8f6eb5c2015-02-24 22:07:18 -080020#include <inttypes.h>
21#include <stdio.h>
22#include <stdlib.h>
23#include <string.h>
24#include <unistd.h>
Doug Zongker9270a202012-01-09 15:16:13 -080025
Josh Gao038c4a12018-07-27 11:18:30 -070026#include <functional>
xunchang5e6832a2019-03-15 16:04:32 -070027#include <memory>
Tao Bao5359d772019-06-04 11:20:00 -070028#include <set>
Ethan Yonkerfefe5912017-09-30 22:22:13 -050029#include <string>
Tao Bao5de19e22019-01-02 09:35:59 -080030#include <string_view>
Ethan Yonkerfefe5912017-09-30 22:22:13 -050031#include <thread>
32
xunchang95d67322019-04-05 16:16:07 -070033#include <android-base/file.h>
34#include <android-base/logging.h>
35#include <android-base/memory.h>
Tao Baoe5c64462019-04-04 18:37:58 -070036#include <android-base/parseint.h>
37#include <android-base/properties.h>
xunchang95d67322019-04-05 16:16:07 -070038#include <android-base/stringprintf.h>
39#include <android-base/strings.h>
40
Doug Zongker9270a202012-01-09 15:16:13 -080041#include "adb.h"
Josh Gao038c4a12018-07-27 11:18:30 -070042#include "adb_unique_fd.h"
Tao Baoe5c64462019-04-04 18:37:58 -070043#include "adb_utils.h"
Dan Albert8f6eb5c2015-02-24 22:07:18 -080044#include "fdevent.h"
45#include "fuse_adb_provider.h"
xunchang5e6832a2019-03-15 16:04:32 -070046#include "fuse_sideload.h"
xunchang95d67322019-04-05 16:16:07 -070047#include "minadbd_types.h"
Josh Gao038c4a12018-07-27 11:18:30 -070048#include "services.h"
Elliott Hughes24eb8a02016-06-15 15:12:17 -070049#include "sysdeps.h"
Doug Zongker9270a202012-01-09 15:16:13 -080050
xunchang95d67322019-04-05 16:16:07 -070051static int minadbd_socket = -1;
Tao Bao378bfbf2019-04-16 14:22:25 -070052static bool rescue_mode = false;
xunchang23f15fc2019-04-17 14:43:58 -070053static std::string sideload_mount_point = FUSE_SIDELOAD_HOST_MOUNTPOINT;
Doug Zongker9270a202012-01-09 15:16:13 -080054
xunchang95d67322019-04-05 16:16:07 -070055void SetMinadbdSocketFd(int socket_fd) {
56 minadbd_socket = socket_fd;
Doug Zongker9270a202012-01-09 15:16:13 -080057}
58
Tao Bao378bfbf2019-04-16 14:22:25 -070059void SetMinadbdRescueMode(bool rescue) {
60 rescue_mode = rescue;
61}
62
xunchang23f15fc2019-04-17 14:43:58 -070063void SetSideloadMountPoint(const std::string& path) {
64 sideload_mount_point = path;
65}
66
Tao Bao7b9b7db2019-04-19 15:22:15 -070067static bool WriteCommandToFd(MinadbdCommand cmd, int fd) {
xunchang95d67322019-04-05 16:16:07 -070068 char message[kMinadbdMessageSize];
69 memcpy(message, kMinadbdCommandPrefix, strlen(kMinadbdStatusPrefix));
70 android::base::put_unaligned(message + strlen(kMinadbdStatusPrefix), cmd);
71
72 if (!android::base::WriteFully(fd, message, kMinadbdMessageSize)) {
73 PLOG(ERROR) << "Failed to write message " << message;
74 return false;
75 }
76 return true;
77}
78
79// Blocks and reads the command status from |fd|. Returns false if the received message has a
80// format error.
81static bool WaitForCommandStatus(int fd, MinadbdCommandStatus* status) {
82 char buffer[kMinadbdMessageSize];
83 if (!android::base::ReadFully(fd, buffer, kMinadbdMessageSize)) {
84 PLOG(ERROR) << "Failed to response status from socket";
85 exit(kMinadbdSocketIOError);
86 }
87
88 std::string message(buffer, buffer + kMinadbdMessageSize);
89 if (!android::base::StartsWith(message, kMinadbdStatusPrefix)) {
90 LOG(ERROR) << "Failed to parse status in " << message;
91 return false;
92 }
93
94 *status = android::base::get_unaligned<MinadbdCommandStatus>(
95 message.substr(strlen(kMinadbdStatusPrefix)).c_str());
96 return true;
97}
98
Tao Baoe5c64462019-04-04 18:37:58 -070099static MinadbdErrorCode RunAdbFuseSideload(int sfd, const std::string& args,
100 MinadbdCommandStatus* status) {
101 auto pieces = android::base::Split(args, ":");
katao77d61732018-09-20 20:34:05 +0800102 int64_t file_size;
103 int block_size;
Tao Baoe5c64462019-04-04 18:37:58 -0700104 if (pieces.size() != 2 || !android::base::ParseInt(pieces[0], &file_size) || file_size <= 0 ||
105 !android::base::ParseInt(pieces[1], &block_size) || block_size <= 0) {
xunchang95d67322019-04-05 16:16:07 -0700106 LOG(ERROR) << "bad sideload-host arguments: " << args;
xunchang5a1916b2019-04-22 12:18:14 -0700107 return kMinadbdHostCommandArgumentError;
katao77d61732018-09-20 20:34:05 +0800108 }
Doug Zongker9270a202012-01-09 15:16:13 -0800109
xunchang95d67322019-04-05 16:16:07 -0700110 LOG(INFO) << "sideload-host file size " << file_size << ", block size " << block_size;
111
Tao Bao7b9b7db2019-04-19 15:22:15 -0700112 if (!WriteCommandToFd(MinadbdCommand::kInstall, minadbd_socket)) {
Tao Baoe5c64462019-04-04 18:37:58 -0700113 return kMinadbdSocketIOError;
xunchang95d67322019-04-05 16:16:07 -0700114 }
Doug Zongker9270a202012-01-09 15:16:13 -0800115
Tao Bao178cdd42019-04-15 12:45:50 -0700116 auto adb_data_reader = std::make_unique<FuseAdbDataProvider>(sfd, file_size, block_size);
xunchang23f15fc2019-04-17 14:43:58 -0700117 if (int result = run_fuse_sideload(std::move(adb_data_reader), sideload_mount_point.c_str());
118 result != 0) {
xunchang95d67322019-04-05 16:16:07 -0700119 LOG(ERROR) << "Failed to start fuse";
Tao Baoe5c64462019-04-04 18:37:58 -0700120 return kMinadbdFuseStartError;
xunchang95d67322019-04-05 16:16:07 -0700121 }
Doug Zongker9270a202012-01-09 15:16:13 -0800122
Tao Baoe5c64462019-04-04 18:37:58 -0700123 if (!WaitForCommandStatus(minadbd_socket, status)) {
124 return kMinadbdMessageFormatError;
125 }
126
xunchang5a1916b2019-04-22 12:18:14 -0700127 // Signal host-side adb to stop. For sideload mode, we always send kMinadbdServicesExitSuccess
Tao Baoe5c64462019-04-04 18:37:58 -0700128 // (i.e. "DONEDONE") regardless of the install result. For rescue mode, we send failure message on
129 // install error.
130 if (!rescue_mode || *status == MinadbdCommandStatus::kSuccess) {
xunchang5a1916b2019-04-22 12:18:14 -0700131 if (!android::base::WriteFully(sfd, kMinadbdServicesExitSuccess,
132 strlen(kMinadbdServicesExitSuccess))) {
Tao Baoe5c64462019-04-04 18:37:58 -0700133 return kMinadbdHostSocketIOError;
134 }
135 } else {
xunchang5a1916b2019-04-22 12:18:14 -0700136 if (!android::base::WriteFully(sfd, kMinadbdServicesExitFailure,
137 strlen(kMinadbdServicesExitFailure))) {
Tao Baoe5c64462019-04-04 18:37:58 -0700138 return kMinadbdHostSocketIOError;
139 }
140 }
141
142 return kMinadbdSuccess;
143}
144
145// Sideload service always exits after serving an install command.
146static void SideloadHostService(unique_fd sfd, const std::string& args) {
xunchang95d67322019-04-05 16:16:07 -0700147 MinadbdCommandStatus status;
Tao Baoe5c64462019-04-04 18:37:58 -0700148 exit(RunAdbFuseSideload(sfd.get(), args, &status));
149}
xunchang95d67322019-04-05 16:16:07 -0700150
Tao Baoe5c64462019-04-04 18:37:58 -0700151// Rescue service waits for the next command after an install command.
152static void RescueInstallHostService(unique_fd sfd, const std::string& args) {
153 MinadbdCommandStatus status;
154 if (auto result = RunAdbFuseSideload(sfd.get(), args, &status); result != kMinadbdSuccess) {
155 exit(result);
156 }
157}
158
Tao Baoe3cc1802019-06-10 12:41:44 -0700159// Answers the query on a given property |prop|, by writing the result to the given |sfd|. The
160// result will be newline-terminated, so nonexistent or nonallowed query will be answered with "\n".
161// If given an empty string, dumps all the supported properties (analogous to `adb shell getprop`)
162// in lines, e.g. "[prop]: [value]".
Tao Baoe5c64462019-04-04 18:37:58 -0700163static void RescueGetpropHostService(unique_fd sfd, const std::string& prop) {
Tao Bao5359d772019-06-04 11:20:00 -0700164 static const std::set<std::string> kGetpropAllowedProps = {
Tao Baoe5c64462019-04-04 18:37:58 -0700165 "ro.build.date.utc",
Tao Bao7a31ab62019-06-03 12:10:54 -0700166 "ro.build.fingerprint",
167 "ro.build.flavor",
168 "ro.build.id",
169 "ro.build.product",
170 "ro.build.tags",
171 "ro.build.version.incremental",
172 "ro.product.device",
173 "ro.product.vendor.device",
Tao Baoe5c64462019-04-04 18:37:58 -0700174 };
Tao Bao5359d772019-06-04 11:20:00 -0700175 std::string result;
176 if (prop.empty()) {
177 for (const auto& key : kGetpropAllowedProps) {
178 auto value = android::base::GetProperty(key, "");
179 if (value.empty()) {
180 continue;
181 }
182 result += "[" + key + "]: [" + value + "]\n";
Ethan Yonkerfefe5912017-09-30 22:22:13 -0500183 }
Tao Baoe3cc1802019-06-10 12:41:44 -0700184 } else if (kGetpropAllowedProps.find(prop) != kGetpropAllowedProps.end()) {
185 result = android::base::GetProperty(prop, "") + "\n";
Tao Bao5359d772019-06-04 11:20:00 -0700186 }
Tao Baoe5c64462019-04-04 18:37:58 -0700187 if (result.empty()) {
Tao Baoe3cc1802019-06-10 12:41:44 -0700188 result = "\n";
Tao Baoe5c64462019-04-04 18:37:58 -0700189 }
190 if (!android::base::WriteFully(sfd, result.data(), result.size())) {
191 exit(kMinadbdHostSocketIOError);
192 }
Ethan Yonkerfefe5912017-09-30 22:22:13 -0500193
Tao Bao0bbb2ed2019-07-08 18:07:22 -0700194 // Send heartbeat signal to keep the rescue service alive.
195 if (!WriteCommandToFd(MinadbdCommand::kNoOp, minadbd_socket)) {
196 exit(kMinadbdSocketIOError);
197 }
198 if (MinadbdCommandStatus status; !WaitForCommandStatus(minadbd_socket, &status)) {
199 exit(kMinadbdMessageFormatError);
200 }
Doug Zongker9270a202012-01-09 15:16:13 -0800201}
Ethan Yonkerfefe5912017-09-30 22:22:13 -0500202
Tao Bao7b9b7db2019-04-19 15:22:15 -0700203// Reboots into the given target. We don't reboot directly from minadbd, but going through recovery
204// instead. This allows recovery to finish all the pending works (clear BCB, save logs etc) before
205// the reboot.
206static void RebootHostService(unique_fd /* sfd */, const std::string& target) {
207 MinadbdCommand command;
208 if (target == "bootloader") {
209 command = MinadbdCommand::kRebootBootloader;
210 } else if (target == "rescue") {
211 command = MinadbdCommand::kRebootRescue;
212 } else if (target == "recovery") {
213 command = MinadbdCommand::kRebootRecovery;
214 } else if (target == "fastboot") {
215 command = MinadbdCommand::kRebootFastboot;
216 } else {
217 command = MinadbdCommand::kRebootAndroid;
218 }
219 if (!WriteCommandToFd(command, minadbd_socket)) {
220 exit(kMinadbdSocketIOError);
221 }
222 MinadbdCommandStatus status;
223 if (!WaitForCommandStatus(minadbd_socket, &status)) {
224 exit(kMinadbdMessageFormatError);
225 }
226}
227
xunchang5a1916b2019-04-22 12:18:14 -0700228static void WipeDeviceService(unique_fd fd, const std::string& args) {
229 auto pieces = android::base::Split(args, ":");
230 if (pieces.size() != 2 || pieces[0] != "userdata") {
231 LOG(ERROR) << "Failed to parse wipe device command arguments " << args;
232 exit(kMinadbdHostCommandArgumentError);
233 }
234
235 size_t message_size;
236 if (!android::base::ParseUint(pieces[1], &message_size) ||
237 message_size < strlen(kMinadbdServicesExitSuccess)) {
238 LOG(ERROR) << "Failed to parse wipe device message size in " << args;
239 exit(kMinadbdHostCommandArgumentError);
240 }
241
242 WriteCommandToFd(MinadbdCommand::kWipeData, minadbd_socket);
243 MinadbdCommandStatus status;
244 if (!WaitForCommandStatus(minadbd_socket, &status)) {
245 exit(kMinadbdMessageFormatError);
246 }
247
248 std::string response = (status == MinadbdCommandStatus::kSuccess) ? kMinadbdServicesExitSuccess
249 : kMinadbdServicesExitFailure;
250 response += std::string(message_size - response.size(), '\0');
251 if (!android::base::WriteFully(fd, response.c_str(), response.size())) {
252 exit(kMinadbdHostSocketIOError);
253 }
Ethan Yonkerfefe5912017-09-30 22:22:13 -0500254}
Doug Zongker9270a202012-01-09 15:16:13 -0800255
Tao Bao5de19e22019-01-02 09:35:59 -0800256unique_fd daemon_service_to_fd(std::string_view name, atransport* /* transport */) {
Tao Bao7b9b7db2019-04-19 15:22:15 -0700257 // Common services that are supported both in sideload and rescue modes.
258 if (ConsumePrefix(&name, "reboot:")) {
259 // "reboot:<target>", where target must be one of the following.
260 std::string args(name);
261 if (args.empty() || args == "bootloader" || args == "rescue" || args == "recovery" ||
262 args == "fastboot") {
263 return create_service_thread("reboot",
264 std::bind(RebootHostService, std::placeholders::_1, args));
265 }
266 return unique_fd{};
Tao Bao99f0d9e2016-10-13 12:46:38 -0700267 }
Tao Bao7b9b7db2019-04-19 15:22:15 -0700268
269 // Rescue-specific services.
Tao Baoe5c64462019-04-04 18:37:58 -0700270 if (rescue_mode) {
271 if (ConsumePrefix(&name, "rescue-install:")) {
272 // rescue-install:<file-size>:<block-size>
273 std::string args(name);
274 return create_service_thread(
275 "rescue-install", std::bind(RescueInstallHostService, std::placeholders::_1, args));
276 } else if (ConsumePrefix(&name, "rescue-getprop:")) {
277 // rescue-getprop:<prop>
278 std::string args(name);
279 return create_service_thread(
280 "rescue-getprop", std::bind(RescueGetpropHostService, std::placeholders::_1, args));
xunchang5a1916b2019-04-22 12:18:14 -0700281 } else if (ConsumePrefix(&name, "rescue-wipe:")) {
282 // rescue-wipe:target:<message-size>
283 std::string args(name);
284 return create_service_thread("rescue-wipe",
285 std::bind(WipeDeviceService, std::placeholders::_1, args));
Tao Baoe5c64462019-04-04 18:37:58 -0700286 }
xunchang5a1916b2019-04-22 12:18:14 -0700287
Tao Baoe5c64462019-04-04 18:37:58 -0700288 return unique_fd{};
Tao Bao99f0d9e2016-10-13 12:46:38 -0700289 }
Tao Baoe5c64462019-04-04 18:37:58 -0700290
Tao Bao7b9b7db2019-04-19 15:22:15 -0700291 // Sideload-specific services.
Tao Bao5de19e22019-01-02 09:35:59 -0800292 if (name.starts_with("sideload:")) {
293 // This exit status causes recovery to print a special error message saying to use a newer adb
294 // (that supports sideload-host).
xunchang95d67322019-04-05 16:16:07 -0700295 exit(kMinadbdAdbVersionError);
Tao Baoe5c64462019-04-04 18:37:58 -0700296 } else if (ConsumePrefix(&name, "sideload-host:")) {
297 // sideload-host:<file-size>:<block-size>
298 std::string args(name);
Josh Gao038c4a12018-07-27 11:18:30 -0700299 return create_service_thread("sideload-host",
Tao Baoe5c64462019-04-04 18:37:58 -0700300 std::bind(SideloadHostService, std::placeholders::_1, args));
Tao Bao99f0d9e2016-10-13 12:46:38 -0700301 }
Josh Gao038c4a12018-07-27 11:18:30 -0700302 return unique_fd{};
Doug Zongker9270a202012-01-09 15:16:13 -0800303}
Ethan Yonker534d4e02016-08-26 10:05:03 -0500304
305#if PLATFORM_SDK_VERSION == 23
306int service_to_fd(const char* name) {
307 atransport transport;
308 return service_to_fd(name, &transport);
309}
310#endif