markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2019 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
markchien | 503be61 | 2020-04-12 21:41:29 +0800 | [diff] [blame] | 17 | package com.android.networkstack.tethering; |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 18 | |
markchien | 5788f2a | 2020-05-08 18:55:26 +0800 | [diff] [blame] | 19 | import static android.Manifest.permission.ACCESS_NETWORK_STATE; |
| 20 | import static android.Manifest.permission.TETHER_PRIVILEGED; |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 21 | import static android.content.pm.PackageManager.PERMISSION_GRANTED; |
| 22 | import static android.net.TetheringManager.TETHER_ERROR_NO_ACCESS_TETHERING_PERMISSION; |
| 23 | import static android.net.TetheringManager.TETHER_ERROR_NO_CHANGE_TETHERING_PERMISSION; |
| 24 | import static android.net.TetheringManager.TETHER_ERROR_NO_ERROR; |
| 25 | import static android.net.TetheringManager.TETHER_ERROR_UNSUPPORTED; |
markchien | 986750b | 2019-12-06 15:24:53 +0800 | [diff] [blame] | 26 | import static android.net.dhcp.IDhcpServer.STATUS_UNKNOWN_ERROR; |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 27 | |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 28 | import android.app.Service; |
markchien | 3fe660b | 2019-12-05 12:04:59 +0800 | [diff] [blame] | 29 | import android.bluetooth.BluetoothAdapter; |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 30 | import android.content.Context; |
| 31 | import android.content.Intent; |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 32 | import android.net.IIntResultListener; |
| 33 | import android.net.INetworkStackConnector; |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 34 | import android.net.ITetheringConnector; |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 35 | import android.net.ITetheringEventCallback; |
markchien | 87d3f7d | 2020-01-08 20:58:23 +0800 | [diff] [blame] | 36 | import android.net.NetworkCapabilities; |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 37 | import android.net.NetworkRequest; |
Remi NGUYEN VAN | 438018d | 2020-03-18 18:31:39 +0900 | [diff] [blame] | 38 | import android.net.NetworkStack; |
markchien | 0688917 | 2020-01-20 19:31:56 +0800 | [diff] [blame] | 39 | import android.net.TetheringRequestParcel; |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 40 | import android.net.dhcp.DhcpServerCallbacks; |
| 41 | import android.net.dhcp.DhcpServingParamsParcel; |
| 42 | import android.net.ip.IpServer; |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 43 | import android.os.Binder; |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 44 | import android.os.HandlerThread; |
| 45 | import android.os.IBinder; |
| 46 | import android.os.Looper; |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 47 | import android.os.RemoteException; |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 48 | import android.os.ResultReceiver; |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 49 | import android.provider.Settings; |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 50 | import android.util.Log; |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 51 | |
| 52 | import androidx.annotation.NonNull; |
| 53 | import androidx.annotation.Nullable; |
| 54 | |
| 55 | import com.android.internal.annotations.VisibleForTesting; |
| 56 | |
| 57 | import java.io.FileDescriptor; |
| 58 | import java.io.PrintWriter; |
| 59 | |
| 60 | /** |
| 61 | * Android service used to manage tethering. |
| 62 | * |
| 63 | * <p>The service returns a binder for the system server to communicate with the tethering. |
| 64 | */ |
| 65 | public class TetheringService extends Service { |
| 66 | private static final String TAG = TetheringService.class.getSimpleName(); |
| 67 | |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 68 | private TetheringConnector mConnector; |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 69 | |
| 70 | @Override |
| 71 | public void onCreate() { |
markchien | cb8860c | 2020-05-12 00:08:27 +0800 | [diff] [blame] | 72 | final TetheringDependencies deps = makeTetheringDependencies(); |
| 73 | // The Tethering object needs a fully functional context to start, so this can't be done |
| 74 | // in the constructor. |
| 75 | mConnector = new TetheringConnector(makeTethering(deps), TetheringService.this); |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 76 | } |
| 77 | |
| 78 | /** |
| 79 | * Make a reference to Tethering object. |
| 80 | */ |
| 81 | @VisibleForTesting |
| 82 | public Tethering makeTethering(TetheringDependencies deps) { |
markchien | 771c3e9 | 2019-12-07 22:02:28 +0800 | [diff] [blame] | 83 | System.loadLibrary("tetherutilsjni"); |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 84 | return new Tethering(deps); |
| 85 | } |
| 86 | |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 87 | @NonNull |
| 88 | @Override |
| 89 | public IBinder onBind(Intent intent) { |
markchien | cb8860c | 2020-05-12 00:08:27 +0800 | [diff] [blame] | 90 | return mConnector; |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 91 | } |
| 92 | |
| 93 | private static class TetheringConnector extends ITetheringConnector.Stub { |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 94 | private final TetheringService mService; |
| 95 | private final Tethering mTethering; |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 96 | |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 97 | TetheringConnector(Tethering tether, TetheringService service) { |
| 98 | mTethering = tether; |
| 99 | mService = service; |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 100 | } |
| 101 | |
| 102 | @Override |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 103 | public void tether(String iface, String callerPkg, IIntResultListener listener) { |
| 104 | if (checkAndNotifyCommonError(callerPkg, listener)) return; |
| 105 | |
| 106 | try { |
| 107 | listener.onResult(mTethering.tether(iface)); |
| 108 | } catch (RemoteException e) { } |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 109 | } |
| 110 | |
| 111 | @Override |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 112 | public void untether(String iface, String callerPkg, IIntResultListener listener) { |
| 113 | if (checkAndNotifyCommonError(callerPkg, listener)) return; |
| 114 | |
| 115 | try { |
| 116 | listener.onResult(mTethering.untether(iface)); |
| 117 | } catch (RemoteException e) { } |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 118 | } |
| 119 | |
| 120 | @Override |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 121 | public void setUsbTethering(boolean enable, String callerPkg, IIntResultListener listener) { |
| 122 | if (checkAndNotifyCommonError(callerPkg, listener)) return; |
| 123 | |
| 124 | try { |
| 125 | listener.onResult(mTethering.setUsbTethering(enable)); |
| 126 | } catch (RemoteException e) { } |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 127 | } |
| 128 | |
| 129 | @Override |
markchien | 0688917 | 2020-01-20 19:31:56 +0800 | [diff] [blame] | 130 | public void startTethering(TetheringRequestParcel request, String callerPkg, |
| 131 | IIntResultListener listener) { |
markchien | 5788f2a | 2020-05-08 18:55:26 +0800 | [diff] [blame] | 132 | if (checkAndNotifyCommonError(callerPkg, |
| 133 | request.exemptFromEntitlementCheck /* onlyAllowPrivileged */, |
| 134 | listener)) { |
| 135 | return; |
| 136 | } |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 137 | |
markchien | 0688917 | 2020-01-20 19:31:56 +0800 | [diff] [blame] | 138 | mTethering.startTethering(request, listener); |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 139 | } |
| 140 | |
| 141 | @Override |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 142 | public void stopTethering(int type, String callerPkg, IIntResultListener listener) { |
| 143 | if (checkAndNotifyCommonError(callerPkg, listener)) return; |
| 144 | |
| 145 | try { |
| 146 | mTethering.stopTethering(type); |
| 147 | listener.onResult(TETHER_ERROR_NO_ERROR); |
| 148 | } catch (RemoteException e) { } |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 149 | } |
| 150 | |
| 151 | @Override |
| 152 | public void requestLatestTetheringEntitlementResult(int type, ResultReceiver receiver, |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 153 | boolean showEntitlementUi, String callerPkg) { |
| 154 | if (checkAndNotifyCommonError(callerPkg, receiver)) return; |
| 155 | |
| 156 | mTethering.requestLatestTetheringEntitlementResult(type, receiver, showEntitlementUi); |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 157 | } |
| 158 | |
| 159 | @Override |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 160 | public void registerTetheringEventCallback(ITetheringEventCallback callback, |
| 161 | String callerPkg) { |
| 162 | try { |
markchien | 5788f2a | 2020-05-08 18:55:26 +0800 | [diff] [blame] | 163 | if (!hasTetherAccessPermission()) { |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 164 | callback.onCallbackStopped(TETHER_ERROR_NO_ACCESS_TETHERING_PERMISSION); |
| 165 | return; |
| 166 | } |
| 167 | mTethering.registerTetheringEventCallback(callback); |
| 168 | } catch (RemoteException e) { } |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 169 | } |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 170 | |
| 171 | @Override |
| 172 | public void unregisterTetheringEventCallback(ITetheringEventCallback callback, |
| 173 | String callerPkg) { |
| 174 | try { |
markchien | 5788f2a | 2020-05-08 18:55:26 +0800 | [diff] [blame] | 175 | if (!hasTetherAccessPermission()) { |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 176 | callback.onCallbackStopped(TETHER_ERROR_NO_ACCESS_TETHERING_PERMISSION); |
| 177 | return; |
| 178 | } |
| 179 | mTethering.unregisterTetheringEventCallback(callback); |
| 180 | } catch (RemoteException e) { } |
| 181 | } |
| 182 | |
| 183 | @Override |
| 184 | public void stopAllTethering(String callerPkg, IIntResultListener listener) { |
| 185 | if (checkAndNotifyCommonError(callerPkg, listener)) return; |
| 186 | |
| 187 | try { |
| 188 | mTethering.untetherAll(); |
| 189 | listener.onResult(TETHER_ERROR_NO_ERROR); |
| 190 | } catch (RemoteException e) { } |
| 191 | } |
| 192 | |
| 193 | @Override |
| 194 | public void isTetheringSupported(String callerPkg, IIntResultListener listener) { |
| 195 | if (checkAndNotifyCommonError(callerPkg, listener)) return; |
| 196 | |
| 197 | try { |
| 198 | listener.onResult(TETHER_ERROR_NO_ERROR); |
| 199 | } catch (RemoteException e) { } |
| 200 | } |
| 201 | |
| 202 | @Override |
| 203 | protected void dump(@NonNull FileDescriptor fd, @NonNull PrintWriter writer, |
| 204 | @Nullable String[] args) { |
| 205 | mTethering.dump(fd, writer, args); |
| 206 | } |
| 207 | |
| 208 | private boolean checkAndNotifyCommonError(String callerPkg, IIntResultListener listener) { |
markchien | 5788f2a | 2020-05-08 18:55:26 +0800 | [diff] [blame] | 209 | return checkAndNotifyCommonError(callerPkg, false /* onlyAllowPrivileged */, listener); |
| 210 | } |
| 211 | |
| 212 | private boolean checkAndNotifyCommonError(final String callerPkg, |
| 213 | final boolean onlyAllowPrivileged, final IIntResultListener listener) { |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 214 | try { |
markchien | 5788f2a | 2020-05-08 18:55:26 +0800 | [diff] [blame] | 215 | if (!hasTetherChangePermission(callerPkg, onlyAllowPrivileged)) { |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 216 | listener.onResult(TETHER_ERROR_NO_CHANGE_TETHERING_PERMISSION); |
| 217 | return true; |
| 218 | } |
markchien | cb8860c | 2020-05-12 00:08:27 +0800 | [diff] [blame] | 219 | if (!mTethering.isTetheringSupported()) { |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 220 | listener.onResult(TETHER_ERROR_UNSUPPORTED); |
| 221 | return true; |
| 222 | } |
| 223 | } catch (RemoteException e) { |
| 224 | return true; |
| 225 | } |
| 226 | |
| 227 | return false; |
| 228 | } |
| 229 | |
| 230 | private boolean checkAndNotifyCommonError(String callerPkg, ResultReceiver receiver) { |
markchien | 5788f2a | 2020-05-08 18:55:26 +0800 | [diff] [blame] | 231 | if (!hasTetherChangePermission(callerPkg, false /* onlyAllowPrivileged */)) { |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 232 | receiver.send(TETHER_ERROR_NO_CHANGE_TETHERING_PERMISSION, null); |
| 233 | return true; |
| 234 | } |
markchien | cb8860c | 2020-05-12 00:08:27 +0800 | [diff] [blame] | 235 | if (!mTethering.isTetheringSupported()) { |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 236 | receiver.send(TETHER_ERROR_UNSUPPORTED, null); |
| 237 | return true; |
| 238 | } |
| 239 | |
| 240 | return false; |
| 241 | } |
| 242 | |
markchien | 5788f2a | 2020-05-08 18:55:26 +0800 | [diff] [blame] | 243 | private boolean hasTetherPrivilegedPermission() { |
| 244 | return mService.checkCallingOrSelfPermission(TETHER_PRIVILEGED) == PERMISSION_GRANTED; |
| 245 | } |
| 246 | |
| 247 | private boolean hasTetherChangePermission(final String callerPkg, |
| 248 | final boolean onlyAllowPrivileged) { |
| 249 | if (hasTetherPrivilegedPermission()) return true; |
| 250 | |
| 251 | if (onlyAllowPrivileged || mTethering.isTetherProvisioningRequired()) return false; |
| 252 | |
| 253 | int uid = Binder.getCallingUid(); |
| 254 | // If callerPkg's uid is not same as Binder.getCallingUid(), |
| 255 | // checkAndNoteWriteSettingsOperation will return false and the operation will be |
| 256 | // denied. |
| 257 | return Settings.checkAndNoteWriteSettingsOperation(mService, uid, callerPkg, |
| 258 | false /* throwException */); |
| 259 | } |
| 260 | |
| 261 | private boolean hasTetherAccessPermission() { |
| 262 | if (hasTetherPrivilegedPermission()) return true; |
| 263 | |
| 264 | return mService.checkCallingOrSelfPermission( |
| 265 | ACCESS_NETWORK_STATE) == PERMISSION_GRANTED; |
| 266 | } |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 267 | } |
| 268 | |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 269 | /** |
| 270 | * An injection method for testing. |
| 271 | */ |
| 272 | @VisibleForTesting |
markchien | cb8860c | 2020-05-12 00:08:27 +0800 | [diff] [blame] | 273 | public TetheringDependencies makeTetheringDependencies() { |
| 274 | return new TetheringDependencies() { |
| 275 | @Override |
| 276 | public NetworkRequest getDefaultNetworkRequest() { |
| 277 | // TODO: b/147280869, add a proper system API to replace this. |
| 278 | final NetworkRequest trackDefaultRequest = new NetworkRequest.Builder() |
| 279 | .clearCapabilities() |
| 280 | .addCapability(NetworkCapabilities.NET_CAPABILITY_NOT_RESTRICTED) |
| 281 | .addCapability(NetworkCapabilities.NET_CAPABILITY_TRUSTED) |
| 282 | .addCapability(NetworkCapabilities.NET_CAPABILITY_NOT_VPN) |
| 283 | .addCapability(NetworkCapabilities.NET_CAPABILITY_INTERNET) |
| 284 | .build(); |
| 285 | return trackDefaultRequest; |
| 286 | } |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 287 | |
markchien | cb8860c | 2020-05-12 00:08:27 +0800 | [diff] [blame] | 288 | @Override |
| 289 | public Looper getTetheringLooper() { |
| 290 | final HandlerThread tetherThread = new HandlerThread("android.tethering"); |
| 291 | tetherThread.start(); |
| 292 | return tetherThread.getLooper(); |
| 293 | } |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 294 | |
markchien | cb8860c | 2020-05-12 00:08:27 +0800 | [diff] [blame] | 295 | @Override |
| 296 | public Context getContext() { |
| 297 | return TetheringService.this; |
| 298 | } |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 299 | |
markchien | cb8860c | 2020-05-12 00:08:27 +0800 | [diff] [blame] | 300 | @Override |
| 301 | public IpServer.Dependencies getIpServerDependencies() { |
| 302 | return new IpServer.Dependencies() { |
| 303 | @Override |
| 304 | public void makeDhcpServer(String ifName, DhcpServingParamsParcel params, |
| 305 | DhcpServerCallbacks cb) { |
| 306 | try { |
| 307 | final INetworkStackConnector service = getNetworkStackConnector(); |
| 308 | if (service == null) return; |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 309 | |
markchien | cb8860c | 2020-05-12 00:08:27 +0800 | [diff] [blame] | 310 | service.makeDhcpServer(ifName, params, cb); |
| 311 | } catch (RemoteException e) { |
| 312 | Log.e(TAG, "Fail to make dhcp server"); |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 313 | try { |
markchien | cb8860c | 2020-05-12 00:08:27 +0800 | [diff] [blame] | 314 | cb.onDhcpServerCreated(STATUS_UNKNOWN_ERROR, null); |
| 315 | } catch (RemoteException re) { } |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 316 | } |
markchien | 6d06f6d | 2019-12-16 20:15:20 +0800 | [diff] [blame] | 317 | } |
markchien | cb8860c | 2020-05-12 00:08:27 +0800 | [diff] [blame] | 318 | }; |
| 319 | } |
markchien | 3fe660b | 2019-12-05 12:04:59 +0800 | [diff] [blame] | 320 | |
markchien | cb8860c | 2020-05-12 00:08:27 +0800 | [diff] [blame] | 321 | // TODO: replace this by NetworkStackClient#getRemoteConnector after refactoring |
| 322 | // networkStackClient. |
| 323 | static final int NETWORKSTACK_TIMEOUT_MS = 60_000; |
| 324 | private INetworkStackConnector getNetworkStackConnector() { |
| 325 | IBinder connector; |
| 326 | try { |
| 327 | final long before = System.currentTimeMillis(); |
| 328 | while ((connector = NetworkStack.getService()) == null) { |
| 329 | if (System.currentTimeMillis() - before > NETWORKSTACK_TIMEOUT_MS) { |
| 330 | Log.wtf(TAG, "Timeout, fail to get INetworkStackConnector"); |
| 331 | return null; |
| 332 | } |
| 333 | Thread.sleep(200); |
| 334 | } |
| 335 | } catch (InterruptedException e) { |
| 336 | Log.wtf(TAG, "Interrupted, fail to get INetworkStackConnector"); |
| 337 | return null; |
markchien | 3fe660b | 2019-12-05 12:04:59 +0800 | [diff] [blame] | 338 | } |
markchien | cb8860c | 2020-05-12 00:08:27 +0800 | [diff] [blame] | 339 | return INetworkStackConnector.Stub.asInterface(connector); |
| 340 | } |
| 341 | |
| 342 | @Override |
| 343 | public BluetoothAdapter getBluetoothAdapter() { |
| 344 | return BluetoothAdapter.getDefaultAdapter(); |
| 345 | } |
| 346 | }; |
markchien | 0df2ebc4 | 2019-09-30 14:40:57 +0800 | [diff] [blame] | 347 | } |
| 348 | } |