blob: a7e454d92060e3274b8a07a0111b9a9c8981b49f [file] [log] [blame]
Dan Albertc89e0cc2015-05-08 16:13:53 -07001/*
2 * Copyright (C) 2015 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Yabin Cuiaed3c612015-09-22 15:52:57 -070017#define TRACE_TAG ADB
Dan Albertc89e0cc2015-05-08 16:13:53 -070018
19#include "sysdeps.h"
20
21#include <signal.h>
22#include <stdio.h>
23#include <stdlib.h>
Josh Gaob72b3f82016-02-04 11:59:12 -080024#include <unistd.h>
Dan Albertc89e0cc2015-05-08 16:13:53 -070025
Josh Gaof0f854b2016-12-12 18:15:33 -080026#include <thread>
27
David Pursell5f787ed2016-01-27 08:52:53 -080028#include <android-base/errors.h>
Elliott Hughes4f713192015-12-04 22:00:26 -080029#include <android-base/file.h>
30#include <android-base/logging.h>
31#include <android-base/stringprintf.h>
Dan Albertc89e0cc2015-05-08 16:13:53 -070032
33#include "adb.h"
34#include "adb_auth.h"
35#include "adb_listeners.h"
Josh Gao7d586072015-11-20 15:37:31 -080036#include "adb_utils.h"
Felipe Leme698e0652016-07-19 17:07:22 -070037#include "commandline.h"
Josh Gaof0f854b2016-12-12 18:15:33 -080038#include "sysdeps/chrono.h"
Dan Albertc89e0cc2015-05-08 16:13:53 -070039#include "transport.h"
40
Elliott Hughes6eadee82017-06-15 08:35:24 -070041static void setup_daemon_logging() {
Spencer Low155159c2015-08-11 16:08:43 -070042 const std::string log_file_path(GetLogFilePath());
Elliott Hughes65433da2015-11-18 18:07:48 -080043 int fd = unix_open(log_file_path.c_str(), O_WRONLY | O_CREAT | O_APPEND, 0640);
Dan Albertc89e0cc2015-05-08 16:13:53 -070044 if (fd == -1) {
Spencer Low155159c2015-08-11 16:08:43 -070045 fatal("cannot open '%s': %s", log_file_path.c_str(), strerror(errno));
Dan Albertc89e0cc2015-05-08 16:13:53 -070046 }
Spencer Low155159c2015-08-11 16:08:43 -070047 if (dup2(fd, STDOUT_FILENO) == -1) {
48 fatal("cannot redirect stdout: %s", strerror(errno));
49 }
50 if (dup2(fd, STDERR_FILENO) == -1) {
51 fatal("cannot redirect stderr: %s", strerror(errno));
52 }
Spencer Lowd0f66c32015-05-20 23:17:26 -070053 unix_close(fd);
54
Dan Albertc89e0cc2015-05-08 16:13:53 -070055 fprintf(stderr, "--- adb starting (pid %d) ---\n", getpid());
Siva Velusamy743883b2015-08-18 17:53:16 -070056 LOG(INFO) << adb_version();
Dan Albertc89e0cc2015-05-08 16:13:53 -070057}
58
Josh Gao01b7bc42017-05-09 13:43:35 -070059void adb_server_cleanup() {
60 // Upon exit, we want to clean up in the following order:
61 // 1. close_smartsockets, so that we don't get any new clients
62 // 2. kick_all_transports, to avoid writing only part of a packet to a transport.
63 // 3. usb_cleanup, to tear down the USB stack.
64 close_smartsockets();
65 kick_all_transports();
66 usb_cleanup();
67}
68
Josh Gaoe2176112018-02-27 16:10:29 -080069static void intentionally_leak() {
70 void* p = ::operator new(1);
George Burgess IV657db002018-03-01 10:54:21 -080071 // The analyzer is upset about this leaking. NOLINTNEXTLINE
Josh Gaoe2176112018-02-27 16:10:29 -080072 LOG(INFO) << "leaking pointer " << p;
73}
74
Josh Gao9c869b52016-08-25 16:00:22 -070075int adb_server_main(int is_daemon, const std::string& socket_spec, int ack_reply_fd) {
Dan Albertc89e0cc2015-05-08 16:13:53 -070076#if defined(_WIN32)
Spencer Low2122c7a2015-08-26 18:46:09 -070077 // adb start-server starts us up with stdout and stderr hooked up to
Elliott Hughes65433da2015-11-18 18:07:48 -080078 // anonymous pipes. When the C Runtime sees this, it makes stderr and
Spencer Low2122c7a2015-08-26 18:46:09 -070079 // stdout buffered, but to improve the chance that error output is seen,
80 // unbuffer stdout and stderr just like if we were run at the console.
81 // This also keeps stderr unbuffered when it is redirected to adb.log.
82 if (is_daemon) {
Yi Kongaed415c2018-07-13 18:15:16 -070083 if (setvbuf(stdout, nullptr, _IONBF, 0) == -1) {
Spencer Low2122c7a2015-08-26 18:46:09 -070084 fatal("cannot make stdout unbuffered: %s", strerror(errno));
85 }
Yi Kongaed415c2018-07-13 18:15:16 -070086 if (setvbuf(stderr, nullptr, _IONBF, 0) == -1) {
Spencer Low2122c7a2015-08-26 18:46:09 -070087 fatal("cannot make stderr unbuffered: %s", strerror(errno));
88 }
89 }
90
Spencer Low84fc2712018-08-25 23:34:33 -070091 // TODO: On Ctrl-C, consider trying to kill a starting up adb server (if we're in
92 // launch_server) by calling GenerateConsoleCtrlEvent().
93
94 // On Windows, SIGBREAK is when Ctrl-Break is pressed or the console window is closed. It should
95 // act like Ctrl-C.
96 signal(SIGBREAK, [](int) { raise(SIGINT); });
97#endif
Josh Gao1c70e1b2016-09-28 12:32:45 -070098 signal(SIGINT, [](int) {
Josh Gaod51c6df2018-02-23 14:00:24 -080099 fdevent_run_on_main_thread([]() { exit(0); });
Josh Gao1c70e1b2016-09-28 12:32:45 -0700100 });
Dan Albertc89e0cc2015-05-08 16:13:53 -0700101
Josh Gaoe2176112018-02-27 16:10:29 -0800102 char* leak = getenv("ADB_LEAK");
103 if (leak && strcmp(leak, "1") == 0) {
104 intentionally_leak();
105 }
106
Josh Gao16c5a132017-05-15 18:26:38 -0700107 if (is_daemon) {
108 close_stdin();
109 setup_daemon_logging();
110 }
111
Josh Gaod51c6df2018-02-23 14:00:24 -0800112 atexit(adb_server_cleanup);
Dan Albertc89e0cc2015-05-08 16:13:53 -0700113
Josh Gao01b7bc42017-05-09 13:43:35 -0700114 init_transport_registration();
Luis Hector Chavez454bc7c2018-04-20 10:31:29 -0700115 init_reconnect_handler();
Casey Dahlin13a269e2016-06-23 14:19:37 -0700116
Josh Gao043fbec2018-08-10 14:24:25 -0700117 if (!getenv("ADB_MDNS") || strcmp(getenv("ADB_MDNS"), "0") != 0) {
118 init_mdns_transport_discovery();
119 }
120
121 if (!getenv("ADB_USB") || strcmp(getenv("ADB_USB"), "0") != 0) {
122 usb_init();
123 } else {
124 adb_notify_device_scan_complete();
125 }
126
127 if (!getenv("ADB_EMU") || strcmp(getenv("ADB_EMU"), "0") != 0) {
128 local_init(DEFAULT_ADB_LOCAL_TRANSPORT_PORT);
129 }
Dan Albertc89e0cc2015-05-08 16:13:53 -0700130
Spencer Low5200c662015-07-30 23:07:55 -0700131 std::string error;
Josh Gaof0f854b2016-12-12 18:15:33 -0800132
133 auto start = std::chrono::steady_clock::now();
134
135 // If we told a previous adb server to quit because of version mismatch, we can get to this
136 // point before it's finished exiting. Retry for a while to give it some time.
137 while (install_listener(socket_spec, "*smartsocket*", nullptr, 0, nullptr, &error) !=
138 INSTALL_STATUS_OK) {
139 if (std::chrono::steady_clock::now() - start > 0.5s) {
140 fatal("could not install *smartsocket* listener: %s", error.c_str());
141 }
142
143 std::this_thread::sleep_for(100ms);
Dan Albertc89e0cc2015-05-08 16:13:53 -0700144 }
145
Elliott Hughes0aeb5052016-06-29 17:42:01 -0700146 adb_auth_init();
147
148 if (is_daemon) {
Josh Gaob72b3f82016-02-04 11:59:12 -0800149#if !defined(_WIN32)
Yabin Cui6bf323b2016-02-08 22:36:42 -0800150 // Start a new session for the daemon. Do this here instead of after the fork so
151 // that a ctrl-c between the "starting server" and "done starting server" messages
152 // gets a chance to terminate the server.
Tao Wuc8fab892016-09-20 17:58:55 -0700153 // setsid will fail with EPERM if it's already been a lead process of new session.
154 // Ignore such error.
155 if (setsid() == -1 && errno != EPERM) {
Yabin Cui6bf323b2016-02-08 22:36:42 -0800156 fatal("setsid() failed: %s", strerror(errno));
157 }
Josh Gaob72b3f82016-02-04 11:59:12 -0800158#endif
159
Josh Gaofd713e52017-05-03 22:37:10 -0700160 // Wait for the USB scan to complete before notifying the parent that we're up.
161 // We need to perform this in a thread, because we would otherwise block the event loop.
162 std::thread notify_thread([ack_reply_fd]() {
163 adb_wait_for_device_initialization();
Elliott Hughes0aeb5052016-06-29 17:42:01 -0700164
Josh Gaofd713e52017-05-03 22:37:10 -0700165 // Any error output written to stderr now goes to adb.log. We could
166 // keep around a copy of the stderr fd and use that to write any errors
167 // encountered by the following code, but that is probably overkill.
Dan Albertc89e0cc2015-05-08 16:13:53 -0700168#if defined(_WIN32)
Josh Gaofd713e52017-05-03 22:37:10 -0700169 const HANDLE ack_reply_handle = cast_int_to_handle(ack_reply_fd);
170 const CHAR ack[] = "OK\n";
171 const DWORD bytes_to_write = arraysize(ack) - 1;
172 DWORD written = 0;
173 if (!WriteFile(ack_reply_handle, ack, bytes_to_write, &written, NULL)) {
174 fatal("adb: cannot write ACK to handle 0x%p: %s", ack_reply_handle,
175 android::base::SystemErrorCodeToString(GetLastError()).c_str());
176 }
177 if (written != bytes_to_write) {
178 fatal("adb: cannot write %lu bytes of ACK: only wrote %lu bytes", bytes_to_write,
179 written);
180 }
181 CloseHandle(ack_reply_handle);
Spencer Low5c398d22015-08-08 15:07:07 -0700182#else
Josh Gaofd713e52017-05-03 22:37:10 -0700183 // TODO(danalbert): Can't use SendOkay because we're sending "OK\n", not
184 // "OKAY".
185 if (!android::base::WriteStringToFd("OK\n", ack_reply_fd)) {
186 fatal_errno("error writing ACK to fd %d", ack_reply_fd);
187 }
188 unix_close(ack_reply_fd);
Siva Velusamy9f2d1a92015-08-07 10:10:29 -0700189#endif
Josh Gaofd713e52017-05-03 22:37:10 -0700190 });
191 notify_thread.detach();
Dan Albertc89e0cc2015-05-08 16:13:53 -0700192 }
193
Yabin Cui7a3f8d62015-09-02 17:44:28 -0700194 D("Event loop starting");
Dan Albertc89e0cc2015-05-08 16:13:53 -0700195 fdevent_loop();
196
197 return 0;
198}
199
200int main(int argc, char** argv) {
Dan Albert9313c0d2015-05-21 13:58:50 -0700201 adb_trace_init(argv);
Dan Albertc89e0cc2015-05-08 16:13:53 -0700202 return adb_commandline(argc - 1, const_cast<const char**>(argv + 1));
203}