| /* |
| * Copyright (C) 2007 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #include <assert.h> |
| #include <ctype.h> |
| #include <errno.h> |
| #include <limits.h> |
| #include <stdarg.h> |
| #include <stdint.h> |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <sys/stat.h> |
| #include <sys/types.h> |
| |
| #if !defined(_WIN32) |
| #include <termios.h> |
| #include <unistd.h> |
| #endif |
| |
| #include "sysdeps.h" |
| |
| #define TRACE_TAG TRACE_ADB |
| #include "adb.h" |
| #include "adb_auth.h" |
| #include "adb_client.h" |
| #include "adb_io.h" |
| #include "file_sync_service.h" |
| |
| static int do_cmd(transport_type ttype, const char* serial, const char *cmd, ...); |
| |
| int find_sync_dirs(const char *srcarg, |
| char **android_srcdir_out, char **data_srcdir_out, char **vendor_srcdir_out); |
| int install_app(transport_type transport, const char* serial, int argc, |
| const char** argv); |
| int install_multiple_app(transport_type transport, const char* serial, int argc, |
| const char** argv); |
| int uninstall_app(transport_type transport, const char* serial, int argc, |
| const char** argv); |
| |
| static const char *gProductOutPath = NULL; |
| extern int gListenAll; |
| |
| static char *product_file(const char *extra) |
| { |
| if (gProductOutPath == NULL) { |
| fprintf(stderr, "adb: Product directory not specified; " |
| "use -p or define ANDROID_PRODUCT_OUT\n"); |
| exit(1); |
| } |
| |
| int n = strlen(gProductOutPath) + strlen(extra) + 2; |
| char* x = reinterpret_cast<char*>(malloc(n)); |
| if (x == 0) { |
| fprintf(stderr, "adb: Out of memory (product_file())\n"); |
| exit(1); |
| } |
| |
| snprintf(x, (size_t)n, "%s" OS_PATH_SEPARATOR_STR "%s", gProductOutPath, extra); |
| return x; |
| } |
| |
| void version(FILE * out) { |
| fprintf(out, "Android Debug Bridge version %d.%d.%d\n", |
| ADB_VERSION_MAJOR, ADB_VERSION_MINOR, ADB_SERVER_VERSION); |
| } |
| |
| void help() |
| { |
| version(stderr); |
| |
| fprintf(stderr, |
| "\n" |
| " -a - directs adb to listen on all interfaces for a connection\n" |
| " -d - directs command to the only connected USB device\n" |
| " returns an error if more than one USB device is present.\n" |
| " -e - directs command to the only running emulator.\n" |
| " returns an error if more than one emulator is running.\n" |
| " -s <specific device> - directs command to the device or emulator with the given\n" |
| " serial number or qualifier. Overrides ANDROID_SERIAL\n" |
| " environment variable.\n" |
| " -p <product name or path> - simple product name like 'sooner', or\n" |
| " a relative/absolute path to a product\n" |
| " out directory like 'out/target/product/sooner'.\n" |
| " If -p is not specified, the ANDROID_PRODUCT_OUT\n" |
| " environment variable is used, which must\n" |
| " be an absolute path.\n" |
| " -H - Name of adb server host (default: localhost)\n" |
| " -P - Port of adb server (default: 5037)\n" |
| " devices [-l] - list all connected devices\n" |
| " ('-l' will also list device qualifiers)\n" |
| " connect <host>[:<port>] - connect to a device via TCP/IP\n" |
| " Port 5555 is used by default if no port number is specified.\n" |
| " disconnect [<host>[:<port>]] - disconnect from a TCP/IP device.\n" |
| " Port 5555 is used by default if no port number is specified.\n" |
| " Using this command with no additional arguments\n" |
| " will disconnect from all connected TCP/IP devices.\n" |
| "\n" |
| "device commands:\n" |
| " adb push [-p] <local> <remote>\n" |
| " - copy file/dir to device\n" |
| " ('-p' to display the transfer progress)\n" |
| " adb pull [-p] [-a] <remote> [<local>]\n" |
| " - copy file/dir from device\n" |
| " ('-p' to display the transfer progress)\n" |
| " ('-a' means copy timestamp and mode)\n" |
| " adb sync [ <directory> ] - copy host->device only if changed\n" |
| " (-l means list but don't copy)\n" |
| " (see 'adb help all')\n" |
| " adb shell - run remote shell interactively\n" |
| " adb shell <command> - run remote shell command\n" |
| " adb emu <command> - run emulator console command\n" |
| " adb logcat [ <filter-spec> ] - View device log\n" |
| " adb forward --list - list all forward socket connections.\n" |
| " the format is a list of lines with the following format:\n" |
| " <serial> \" \" <local> \" \" <remote> \"\\n\"\n" |
| " adb forward <local> <remote> - forward socket connections\n" |
| " forward specs are one of: \n" |
| " tcp:<port>\n" |
| " localabstract:<unix domain socket name>\n" |
| " localreserved:<unix domain socket name>\n" |
| " localfilesystem:<unix domain socket name>\n" |
| " dev:<character device name>\n" |
| " jdwp:<process pid> (remote only)\n" |
| " adb forward --no-rebind <local> <remote>\n" |
| " - same as 'adb forward <local> <remote>' but fails\n" |
| " if <local> is already forwarded\n" |
| " adb forward --remove <local> - remove a specific forward socket connection\n" |
| " adb forward --remove-all - remove all forward socket connections\n" |
| " adb reverse --list - list all reverse socket connections from device\n" |
| " adb reverse <remote> <local> - reverse socket connections\n" |
| " reverse specs are one of:\n" |
| " tcp:<port>\n" |
| " localabstract:<unix domain socket name>\n" |
| " localreserved:<unix domain socket name>\n" |
| " localfilesystem:<unix domain socket name>\n" |
| " adb reverse --norebind <remote> <local>\n" |
| " - same as 'adb reverse <remote> <local>' but fails\n" |
| " if <remote> is already reversed.\n" |
| " adb reverse --remove <remote>\n" |
| " - remove a specific reversed socket connection\n" |
| " adb reverse --remove-all - remove all reversed socket connections from device\n" |
| " adb jdwp - list PIDs of processes hosting a JDWP transport\n" |
| " adb install [-lrtsd] <file>\n" |
| " adb install-multiple [-lrtsdp] <file...>\n" |
| " - push this package file to the device and install it\n" |
| " (-l: forward lock application)\n" |
| " (-r: replace existing application)\n" |
| " (-t: allow test packages)\n" |
| " (-s: install application on sdcard)\n" |
| " (-d: allow version code downgrade)\n" |
| " (-p: partial application install)\n" |
| " adb uninstall [-k] <package> - remove this app package from the device\n" |
| " ('-k' means keep the data and cache directories)\n" |
| " adb bugreport - return all information from the device\n" |
| " that should be included in a bug report.\n" |
| "\n" |
| " adb backup [-f <file>] [-apk|-noapk] [-obb|-noobb] [-shared|-noshared] [-all] [-system|-nosystem] [<packages...>]\n" |
| " - write an archive of the device's data to <file>.\n" |
| " If no -f option is supplied then the data is written\n" |
| " to \"backup.ab\" in the current directory.\n" |
| " (-apk|-noapk enable/disable backup of the .apks themselves\n" |
| " in the archive; the default is noapk.)\n" |
| " (-obb|-noobb enable/disable backup of any installed apk expansion\n" |
| " (aka .obb) files associated with each application; the default\n" |
| " is noobb.)\n" |
| " (-shared|-noshared enable/disable backup of the device's\n" |
| " shared storage / SD card contents; the default is noshared.)\n" |
| " (-all means to back up all installed applications)\n" |
| " (-system|-nosystem toggles whether -all automatically includes\n" |
| " system applications; the default is to include system apps)\n" |
| " (<packages...> is the list of applications to be backed up. If\n" |
| " the -all or -shared flags are passed, then the package\n" |
| " list is optional. Applications explicitly given on the\n" |
| " command line will be included even if -nosystem would\n" |
| " ordinarily cause them to be omitted.)\n" |
| "\n" |
| " adb restore <file> - restore device contents from the <file> backup archive\n" |
| "\n" |
| " adb disable-verity - disable dm-verity checking on USERDEBUG builds\n" |
| " adb enable-verity - re-enable dm-verity checking on USERDEBUG builds\n" |
| " adb keygen <file> - generate adb public/private key. The private key is stored in <file>,\n" |
| " and the public key is stored in <file>.pub. Any existing files\n" |
| " are overwritten.\n" |
| " adb help - show this help message\n" |
| " adb version - show version num\n" |
| "\n" |
| "scripting:\n" |
| " adb wait-for-device - block until device is online\n" |
| " adb start-server - ensure that there is a server running\n" |
| " adb kill-server - kill the server if it is running\n" |
| " adb get-state - prints: offline | bootloader | device\n" |
| " adb get-serialno - prints: <serial-number>\n" |
| " adb get-devpath - prints: <device-path>\n" |
| " adb status-window - continuously print device status for a specified device\n" |
| " adb remount - remounts the /system and /vendor (if present) partitions on the device read-write\n" |
| " adb reboot [bootloader|recovery] - reboots the device, optionally into the bootloader or recovery program\n" |
| " adb reboot-bootloader - reboots the device into the bootloader\n" |
| " adb root - restarts the adbd daemon with root permissions\n" |
| " adb unroot - restarts the adbd daemon without root permissions\n" |
| " adb usb - restarts the adbd daemon listening on USB\n" |
| " adb tcpip <port> - restarts the adbd daemon listening on TCP on the specified port\n" |
| "networking:\n" |
| " adb ppp <tty> [parameters] - Run PPP over USB.\n" |
| " Note: you should not automatically start a PPP connection.\n" |
| " <tty> refers to the tty for PPP stream. Eg. dev:/dev/omap_csmi_tty1\n" |
| " [parameters] - Eg. defaultroute debug dump local notty usepeerdns\n" |
| "\n" |
| "adb sync notes: adb sync [ <directory> ]\n" |
| " <localdir> can be interpreted in several ways:\n" |
| "\n" |
| " - If <directory> is not specified, /system, /vendor (if present), and /data partitions will be updated.\n" |
| "\n" |
| " - If it is \"system\", \"vendor\" or \"data\", only the corresponding partition\n" |
| " is updated.\n" |
| "\n" |
| "environmental variables:\n" |
| " ADB_TRACE - Print debug information. A comma separated list of the following values\n" |
| " 1 or all, adb, sockets, packets, rwx, usb, sync, sysdeps, transport, jdwp\n" |
| " ANDROID_SERIAL - The serial number to connect to. -s takes priority over this if given.\n" |
| " ANDROID_LOG_TAGS - When used with the logcat option, only these debug tags are printed.\n" |
| ); |
| } |
| |
| int usage() |
| { |
| help(); |
| return 1; |
| } |
| |
| #if defined(_WIN32) |
| |
| // Windows does not have <termio.h>. |
| static void stdin_raw_init(int fd) { |
| |
| } |
| |
| static void stdin_raw_restore(int fd) { |
| |
| } |
| |
| #else |
| static struct termios tio_save; |
| |
| static void stdin_raw_init(int fd) |
| { |
| struct termios tio; |
| |
| if(tcgetattr(fd, &tio)) return; |
| if(tcgetattr(fd, &tio_save)) return; |
| |
| tio.c_lflag = 0; /* disable CANON, ECHO*, etc */ |
| |
| /* no timeout but request at least one character per read */ |
| tio.c_cc[VTIME] = 0; |
| tio.c_cc[VMIN] = 1; |
| |
| tcsetattr(fd, TCSANOW, &tio); |
| tcflush(fd, TCIFLUSH); |
| } |
| |
| static void stdin_raw_restore(int fd) |
| { |
| tcsetattr(fd, TCSANOW, &tio_save); |
| tcflush(fd, TCIFLUSH); |
| } |
| #endif |
| |
| static void read_and_dump(int fd) |
| { |
| char buf[4096]; |
| int len; |
| |
| while(fd >= 0) { |
| D("read_and_dump(): pre adb_read(fd=%d)\n", fd); |
| len = adb_read(fd, buf, 4096); |
| D("read_and_dump(): post adb_read(fd=%d): len=%d\n", fd, len); |
| if(len == 0) { |
| break; |
| } |
| |
| if(len < 0) { |
| if(errno == EINTR) continue; |
| break; |
| } |
| fwrite(buf, 1, len, stdout); |
| fflush(stdout); |
| } |
| } |
| |
| static void read_status_line(int fd, char* buf, size_t count) |
| { |
| count--; |
| while (count > 0) { |
| int len = adb_read(fd, buf, count); |
| if (len == 0) { |
| break; |
| } else if (len < 0) { |
| if (errno == EINTR) continue; |
| break; |
| } |
| |
| buf += len; |
| count -= len; |
| } |
| *buf = '\0'; |
| } |
| |
| static void copy_to_file(int inFd, int outFd) { |
| const size_t BUFSIZE = 32 * 1024; |
| char* buf = (char*) malloc(BUFSIZE); |
| int len; |
| long total = 0; |
| |
| D("copy_to_file(%d -> %d)\n", inFd, outFd); |
| |
| if (inFd == STDIN_FILENO) { |
| stdin_raw_init(STDIN_FILENO); |
| } |
| |
| for (;;) { |
| if (inFd == STDIN_FILENO) { |
| len = unix_read(inFd, buf, BUFSIZE); |
| } else { |
| len = adb_read(inFd, buf, BUFSIZE); |
| } |
| if (len == 0) { |
| D("copy_to_file() : read 0 bytes; exiting\n"); |
| break; |
| } |
| if (len < 0) { |
| if (errno == EINTR) { |
| D("copy_to_file() : EINTR, retrying\n"); |
| continue; |
| } |
| D("copy_to_file() : error %d\n", errno); |
| break; |
| } |
| if (outFd == STDOUT_FILENO) { |
| fwrite(buf, 1, len, stdout); |
| fflush(stdout); |
| } else { |
| adb_write(outFd, buf, len); |
| } |
| total += len; |
| } |
| |
| if (inFd == STDIN_FILENO) { |
| stdin_raw_restore(STDIN_FILENO); |
| } |
| |
| D("copy_to_file() finished after %lu bytes\n", total); |
| free(buf); |
| } |
| |
| static void *stdin_read_thread(void *x) |
| { |
| int fd, fdi; |
| unsigned char buf[1024]; |
| int r, n; |
| int state = 0; |
| |
| int *fds = (int*) x; |
| fd = fds[0]; |
| fdi = fds[1]; |
| free(fds); |
| |
| for(;;) { |
| /* fdi is really the client's stdin, so use read, not adb_read here */ |
| D("stdin_read_thread(): pre unix_read(fdi=%d,...)\n", fdi); |
| r = unix_read(fdi, buf, 1024); |
| D("stdin_read_thread(): post unix_read(fdi=%d,...)\n", fdi); |
| if(r == 0) break; |
| if(r < 0) { |
| if(errno == EINTR) continue; |
| break; |
| } |
| for(n = 0; n < r; n++){ |
| switch(buf[n]) { |
| case '\n': |
| state = 1; |
| break; |
| case '\r': |
| state = 1; |
| break; |
| case '~': |
| if(state == 1) state++; |
| break; |
| case '.': |
| if(state == 2) { |
| fprintf(stderr,"\n* disconnect *\n"); |
| stdin_raw_restore(fdi); |
| exit(0); |
| } |
| default: |
| state = 0; |
| } |
| } |
| r = adb_write(fd, buf, r); |
| if(r <= 0) { |
| break; |
| } |
| } |
| return 0; |
| } |
| |
| int interactive_shell(void) |
| { |
| adb_thread_t thr; |
| int fdi, fd; |
| |
| fd = adb_connect("shell:"); |
| if(fd < 0) { |
| fprintf(stderr,"error: %s\n", adb_error()); |
| return 1; |
| } |
| fdi = 0; //dup(0); |
| |
| int* fds = reinterpret_cast<int*>(malloc(sizeof(int) * 2)); |
| fds[0] = fd; |
| fds[1] = fdi; |
| |
| stdin_raw_init(fdi); |
| adb_thread_create(&thr, stdin_read_thread, fds); |
| read_and_dump(fd); |
| stdin_raw_restore(fdi); |
| return 0; |
| } |
| |
| |
| static void format_host_command(char* buffer, size_t buflen, const char* command, transport_type ttype, const char* serial) |
| { |
| if (serial) { |
| snprintf(buffer, buflen, "host-serial:%s:%s", serial, command); |
| } else { |
| const char* prefix = "host"; |
| if (ttype == kTransportUsb) |
| prefix = "host-usb"; |
| else if (ttype == kTransportLocal) |
| prefix = "host-local"; |
| |
| snprintf(buffer, buflen, "%s:%s", prefix, command); |
| } |
| } |
| |
| int adb_download_buffer(const char *service, const char *fn, const void* data, int sz, |
| unsigned progress) |
| { |
| char buf[4096]; |
| unsigned total; |
| int fd; |
| |
| sprintf(buf,"%s:%d", service, sz); |
| fd = adb_connect(buf); |
| if(fd < 0) { |
| fprintf(stderr,"error: %s\n", adb_error()); |
| return -1; |
| } |
| |
| int opt = CHUNK_SIZE; |
| opt = adb_setsockopt(fd, SOL_SOCKET, SO_SNDBUF, (const void *) &opt, sizeof(opt)); |
| |
| total = sz; |
| const uint8_t* ptr = reinterpret_cast<const uint8_t*>(data); |
| |
| if(progress) { |
| char *x = strrchr(service, ':'); |
| if(x) service = x + 1; |
| } |
| |
| while(sz > 0) { |
| unsigned xfer = (sz > CHUNK_SIZE) ? CHUNK_SIZE : sz; |
| if(!WriteFdExactly(fd, ptr, xfer)) { |
| adb_status(fd); |
| fprintf(stderr,"* failed to write data '%s' *\n", adb_error()); |
| return -1; |
| } |
| sz -= xfer; |
| ptr += xfer; |
| if(progress) { |
| printf("sending: '%s' %4d%% \r", fn, (int)(100LL - ((100LL * sz) / (total)))); |
| fflush(stdout); |
| } |
| } |
| if(progress) { |
| printf("\n"); |
| } |
| |
| if(!ReadFdExactly(fd, buf, 4)){ |
| fprintf(stderr,"* error reading response *\n"); |
| adb_close(fd); |
| return -1; |
| } |
| if(memcmp(buf, "OKAY", 4)) { |
| buf[4] = 0; |
| fprintf(stderr,"* error response '%s' *\n", buf); |
| adb_close(fd); |
| return -1; |
| } |
| |
| adb_close(fd); |
| return 0; |
| } |
| |
| |
| int adb_download(const char *service, const char *fn, unsigned progress) |
| { |
| void *data; |
| unsigned sz; |
| |
| data = load_file(fn, &sz); |
| if(data == 0) { |
| fprintf(stderr,"* cannot read '%s' *\n", fn); |
| return -1; |
| } |
| |
| int status = adb_download_buffer(service, fn, data, sz, progress); |
| free(data); |
| return status; |
| } |
| |
| #define SIDELOAD_HOST_BLOCK_SIZE (CHUNK_SIZE) |
| |
| /* |
| * The sideload-host protocol serves the data in a file (given on the |
| * command line) to the client, using a simple protocol: |
| * |
| * - The connect message includes the total number of bytes in the |
| * file and a block size chosen by us. |
| * |
| * - The other side sends the desired block number as eight decimal |
| * digits (eg "00000023" for block 23). Blocks are numbered from |
| * zero. |
| * |
| * - We send back the data of the requested block. The last block is |
| * likely to be partial; when the last block is requested we only |
| * send the part of the block that exists, it's not padded up to the |
| * block size. |
| * |
| * - When the other side sends "DONEDONE" instead of a block number, |
| * we hang up. |
| */ |
| int adb_sideload_host(const char* fn) { |
| unsigned sz; |
| size_t xfer = 0; |
| int status; |
| int last_percent = -1; |
| int opt = SIDELOAD_HOST_BLOCK_SIZE; |
| |
| printf("loading: '%s'", fn); |
| fflush(stdout); |
| uint8_t* data = reinterpret_cast<uint8_t*>(load_file(fn, &sz)); |
| if (data == 0) { |
| printf("\n"); |
| fprintf(stderr, "* cannot read '%s' *\n", fn); |
| return -1; |
| } |
| |
| char buf[100]; |
| sprintf(buf, "sideload-host:%d:%d", sz, SIDELOAD_HOST_BLOCK_SIZE); |
| int fd = adb_connect(buf); |
| if (fd < 0) { |
| // Try falling back to the older sideload method. Maybe this |
| // is an older device that doesn't support sideload-host. |
| printf("\n"); |
| status = adb_download_buffer("sideload", fn, data, sz, 1); |
| goto done; |
| } |
| |
| opt = adb_setsockopt(fd, SOL_SOCKET, SO_SNDBUF, (const void *) &opt, sizeof(opt)); |
| |
| for (;;) { |
| if (!ReadFdExactly(fd, buf, 8)) { |
| fprintf(stderr, "* failed to read command: %s\n", adb_error()); |
| status = -1; |
| goto done; |
| } |
| |
| if (strncmp("DONEDONE", buf, 8) == 0) { |
| status = 0; |
| break; |
| } |
| |
| buf[8] = '\0'; |
| int block = strtol(buf, NULL, 10); |
| |
| size_t offset = block * SIDELOAD_HOST_BLOCK_SIZE; |
| if (offset >= sz) { |
| fprintf(stderr, "* attempt to read past end: %s\n", adb_error()); |
| status = -1; |
| goto done; |
| } |
| uint8_t* start = data + offset; |
| size_t offset_end = offset + SIDELOAD_HOST_BLOCK_SIZE; |
| size_t to_write = SIDELOAD_HOST_BLOCK_SIZE; |
| if (offset_end > sz) { |
| to_write = sz - offset; |
| } |
| |
| if(!WriteFdExactly(fd, start, to_write)) { |
| adb_status(fd); |
| fprintf(stderr,"* failed to write data '%s' *\n", adb_error()); |
| status = -1; |
| goto done; |
| } |
| xfer += to_write; |
| |
| // For normal OTA packages, we expect to transfer every byte |
| // twice, plus a bit of overhead (one read during |
| // verification, one read of each byte for installation, plus |
| // extra access to things like the zip central directory). |
| // This estimate of the completion becomes 100% when we've |
| // transferred ~2.13 (=100/47) times the package size. |
| int percent = (int)(xfer * 47LL / (sz ? sz : 1)); |
| if (percent != last_percent) { |
| printf("\rserving: '%s' (~%d%%) ", fn, percent); |
| fflush(stdout); |
| last_percent = percent; |
| } |
| } |
| |
| printf("\rTotal xfer: %.2fx%*s\n", (double)xfer / (sz ? sz : 1), (int)strlen(fn)+10, ""); |
| |
| done: |
| if (fd >= 0) adb_close(fd); |
| free(data); |
| return status; |
| } |
| |
| static void status_window(transport_type ttype, const char* serial) |
| { |
| char command[4096]; |
| char *state = 0; |
| char *laststate = 0; |
| |
| /* silence stderr */ |
| #ifdef _WIN32 |
| /* XXX: TODO */ |
| #else |
| int fd; |
| fd = unix_open("/dev/null", O_WRONLY); |
| dup2(fd, 2); |
| adb_close(fd); |
| #endif |
| |
| format_host_command(command, sizeof command, "get-state", ttype, serial); |
| |
| for(;;) { |
| adb_sleep_ms(250); |
| |
| if(state) { |
| free(state); |
| state = 0; |
| } |
| |
| state = adb_query(command); |
| |
| if(state) { |
| if(laststate && !strcmp(state,laststate)){ |
| continue; |
| } else { |
| if(laststate) free(laststate); |
| laststate = strdup(state); |
| } |
| } |
| |
| printf("%c[2J%c[2H", 27, 27); |
| printf("Android Debug Bridge\n"); |
| printf("State: %s\n", state ? state : "offline"); |
| fflush(stdout); |
| } |
| } |
| |
| static int should_escape(const char c) |
| { |
| return (c == ' ' || c == '\'' || c == '"' || c == '\\' || c == '(' || c == ')'); |
| } |
| |
| /* Duplicate and escape given argument. */ |
| static char *escape_arg(const char *s) |
| { |
| const char *ts; |
| size_t alloc_len; |
| char *ret; |
| char *dest; |
| |
| alloc_len = 0; |
| for (ts = s; *ts != '\0'; ts++) { |
| alloc_len++; |
| if (should_escape(*ts)) { |
| alloc_len++; |
| } |
| } |
| |
| if (alloc_len == 0) { |
| // Preserve empty arguments |
| ret = (char *) malloc(3); |
| ret[0] = '\"'; |
| ret[1] = '\"'; |
| ret[2] = '\0'; |
| return ret; |
| } |
| |
| ret = (char *) malloc(alloc_len + 1); |
| dest = ret; |
| |
| for (ts = s; *ts != '\0'; ts++) { |
| if (should_escape(*ts)) { |
| *dest++ = '\\'; |
| } |
| *dest++ = *ts; |
| } |
| *dest++ = '\0'; |
| |
| return ret; |
| } |
| |
| /** |
| * Run ppp in "notty" mode against a resource listed as the first parameter |
| * eg: |
| * |
| * ppp dev:/dev/omap_csmi_tty0 <ppp options> |
| * |
| */ |
| int ppp(int argc, const char **argv) |
| { |
| #if defined(_WIN32) |
| fprintf(stderr, "error: adb %s not implemented on Win32\n", argv[0]); |
| return -1; |
| #else |
| pid_t pid; |
| int fd; |
| |
| if (argc < 2) { |
| fprintf(stderr, "usage: adb %s <adb service name> [ppp opts]\n", |
| argv[0]); |
| |
| return 1; |
| } |
| |
| const char* adb_service_name = argv[1]; |
| fd = adb_connect(adb_service_name); |
| |
| if(fd < 0) { |
| fprintf(stderr,"Error: Could not open adb service: %s. Error: %s\n", |
| adb_service_name, adb_error()); |
| return 1; |
| } |
| |
| pid = fork(); |
| |
| if (pid < 0) { |
| perror("from fork()"); |
| return 1; |
| } else if (pid == 0) { |
| int err; |
| int i; |
| const char **ppp_args; |
| |
| // copy args |
| ppp_args = (const char **) alloca(sizeof(char *) * argc + 1); |
| ppp_args[0] = "pppd"; |
| for (i = 2 ; i < argc ; i++) { |
| //argv[2] and beyond become ppp_args[1] and beyond |
| ppp_args[i - 1] = argv[i]; |
| } |
| ppp_args[i-1] = NULL; |
| |
| // child side |
| |
| dup2(fd, STDIN_FILENO); |
| dup2(fd, STDOUT_FILENO); |
| adb_close(STDERR_FILENO); |
| adb_close(fd); |
| |
| err = execvp("pppd", (char * const *)ppp_args); |
| |
| if (err < 0) { |
| perror("execing pppd"); |
| } |
| exit(-1); |
| } else { |
| // parent side |
| |
| adb_close(fd); |
| return 0; |
| } |
| #endif /* !defined(_WIN32) */ |
| } |
| |
| static int send_shellcommand(transport_type transport, const char* serial, |
| char* buf) |
| { |
| int fd, ret; |
| |
| for(;;) { |
| fd = adb_connect(buf); |
| if(fd >= 0) |
| break; |
| fprintf(stderr,"- waiting for device -\n"); |
| adb_sleep_ms(1000); |
| do_cmd(transport, serial, "wait-for-device", 0); |
| } |
| |
| read_and_dump(fd); |
| ret = adb_close(fd); |
| if (ret) |
| perror("close"); |
| |
| return ret; |
| } |
| |
| static int logcat(transport_type transport, const char* serial, int argc, |
| const char** argv) |
| { |
| char buf[4096]; |
| |
| char *log_tags; |
| char *quoted; |
| |
| log_tags = getenv("ANDROID_LOG_TAGS"); |
| quoted = escape_arg(log_tags == NULL ? "" : log_tags); |
| snprintf(buf, sizeof(buf), |
| "shell:export ANDROID_LOG_TAGS=\"%s\"; exec logcat", quoted); |
| free(quoted); |
| |
| if (!strcmp(argv[0], "longcat")) { |
| strncat(buf, " -v long", sizeof(buf) - 1); |
| } |
| |
| argc -= 1; |
| argv += 1; |
| while(argc-- > 0) { |
| quoted = escape_arg(*argv++); |
| strncat(buf, " ", sizeof(buf) - 1); |
| strncat(buf, quoted, sizeof(buf) - 1); |
| free(quoted); |
| } |
| |
| send_shellcommand(transport, serial, buf); |
| return 0; |
| } |
| |
| static int mkdirs(const char *path) |
| { |
| int ret; |
| char *x = (char *)path + 1; |
| |
| for(;;) { |
| x = adb_dirstart(x); |
| if(x == 0) return 0; |
| *x = 0; |
| ret = adb_mkdir(path, 0775); |
| *x = OS_PATH_SEPARATOR; |
| if((ret < 0) && (errno != EEXIST)) { |
| return ret; |
| } |
| x++; |
| } |
| return 0; |
| } |
| |
| static int backup(int argc, const char** argv) { |
| char buf[4096]; |
| char default_name[32]; |
| const char* filename = strcpy(default_name, "./backup.ab"); |
| int fd, outFd; |
| int i, j; |
| |
| /* find, extract, and use any -f argument */ |
| for (i = 1; i < argc; i++) { |
| if (!strcmp("-f", argv[i])) { |
| if (i == argc-1) { |
| fprintf(stderr, "adb: -f passed with no filename\n"); |
| return usage(); |
| } |
| filename = argv[i+1]; |
| for (j = i+2; j <= argc; ) { |
| argv[i++] = argv[j++]; |
| } |
| argc -= 2; |
| argv[argc] = NULL; |
| } |
| } |
| |
| /* bare "adb backup" or "adb backup -f filename" are not valid invocations */ |
| if (argc < 2) return usage(); |
| |
| adb_unlink(filename); |
| mkdirs(filename); |
| outFd = adb_creat(filename, 0640); |
| if (outFd < 0) { |
| fprintf(stderr, "adb: unable to open file %s\n", filename); |
| return -1; |
| } |
| |
| snprintf(buf, sizeof(buf), "backup"); |
| for (argc--, argv++; argc; argc--, argv++) { |
| strncat(buf, ":", sizeof(buf) - strlen(buf) - 1); |
| strncat(buf, argv[0], sizeof(buf) - strlen(buf) - 1); |
| } |
| |
| D("backup. filename=%s buf=%s\n", filename, buf); |
| fd = adb_connect(buf); |
| if (fd < 0) { |
| fprintf(stderr, "adb: unable to connect for backup\n"); |
| adb_close(outFd); |
| return -1; |
| } |
| |
| printf("Now unlock your device and confirm the backup operation.\n"); |
| copy_to_file(fd, outFd); |
| |
| adb_close(fd); |
| adb_close(outFd); |
| return 0; |
| } |
| |
| static int restore(int argc, const char** argv) { |
| const char* filename; |
| int fd, tarFd; |
| |
| if (argc != 2) return usage(); |
| |
| filename = argv[1]; |
| tarFd = adb_open(filename, O_RDONLY); |
| if (tarFd < 0) { |
| fprintf(stderr, "adb: unable to open file %s\n", filename); |
| return -1; |
| } |
| |
| fd = adb_connect("restore:"); |
| if (fd < 0) { |
| fprintf(stderr, "adb: unable to connect for restore\n"); |
| adb_close(tarFd); |
| return -1; |
| } |
| |
| printf("Now unlock your device and confirm the restore operation.\n"); |
| copy_to_file(tarFd, fd); |
| |
| adb_close(fd); |
| adb_close(tarFd); |
| return 0; |
| } |
| |
| #define SENTINEL_FILE "config" OS_PATH_SEPARATOR_STR "envsetup.make" |
| static int top_works(const char *top) |
| { |
| if (top != NULL && adb_is_absolute_host_path(top)) { |
| char path_buf[PATH_MAX]; |
| snprintf(path_buf, sizeof(path_buf), |
| "%s" OS_PATH_SEPARATOR_STR SENTINEL_FILE, top); |
| return access(path_buf, F_OK) == 0; |
| } |
| return 0; |
| } |
| |
| static char *find_top_from(const char *indir, char path_buf[PATH_MAX]) |
| { |
| strcpy(path_buf, indir); |
| while (1) { |
| if (top_works(path_buf)) { |
| return path_buf; |
| } |
| char *s = adb_dirstop(path_buf); |
| if (s != NULL) { |
| *s = '\0'; |
| } else { |
| path_buf[0] = '\0'; |
| return NULL; |
| } |
| } |
| } |
| |
| static char *find_top(char path_buf[PATH_MAX]) |
| { |
| char *top = getenv("ANDROID_BUILD_TOP"); |
| if (top != NULL && top[0] != '\0') { |
| if (!top_works(top)) { |
| fprintf(stderr, "adb: bad ANDROID_BUILD_TOP value \"%s\"\n", top); |
| return NULL; |
| } |
| } else { |
| top = getenv("TOP"); |
| if (top != NULL && top[0] != '\0') { |
| if (!top_works(top)) { |
| fprintf(stderr, "adb: bad TOP value \"%s\"\n", top); |
| return NULL; |
| } |
| } else { |
| top = NULL; |
| } |
| } |
| |
| if (top != NULL) { |
| /* The environment pointed to a top directory that works. |
| */ |
| strcpy(path_buf, top); |
| return path_buf; |
| } |
| |
| /* The environment didn't help. Walk up the tree from the CWD |
| * to see if we can find the top. |
| */ |
| char dir[PATH_MAX]; |
| top = find_top_from(getcwd(dir, sizeof(dir)), path_buf); |
| if (top == NULL) { |
| /* If the CWD isn't under a good-looking top, see if the |
| * executable is. |
| */ |
| get_my_path(dir, PATH_MAX); |
| top = find_top_from(dir, path_buf); |
| } |
| return top; |
| } |
| |
| /* <hint> may be: |
| * - A simple product name |
| * e.g., "sooner" |
| TODO: debug? sooner-debug, sooner:debug? |
| * - A relative path from the CWD to the ANDROID_PRODUCT_OUT dir |
| * e.g., "out/target/product/sooner" |
| * - An absolute path to the PRODUCT_OUT dir |
| * e.g., "/src/device/out/target/product/sooner" |
| * |
| * Given <hint>, try to construct an absolute path to the |
| * ANDROID_PRODUCT_OUT dir. |
| */ |
| static const char *find_product_out_path(const char *hint) |
| { |
| static char path_buf[PATH_MAX]; |
| |
| if (hint == NULL || hint[0] == '\0') { |
| return NULL; |
| } |
| |
| /* If it's already absolute, don't bother doing any work. |
| */ |
| if (adb_is_absolute_host_path(hint)) { |
| strcpy(path_buf, hint); |
| return path_buf; |
| } |
| |
| /* If there are any slashes in it, assume it's a relative path; |
| * make it absolute. |
| */ |
| if (adb_dirstart(hint) != NULL) { |
| if (getcwd(path_buf, sizeof(path_buf)) == NULL) { |
| fprintf(stderr, "adb: Couldn't get CWD: %s\n", strerror(errno)); |
| return NULL; |
| } |
| if (strlen(path_buf) + 1 + strlen(hint) >= sizeof(path_buf)) { |
| fprintf(stderr, "adb: Couldn't assemble path\n"); |
| return NULL; |
| } |
| strcat(path_buf, OS_PATH_SEPARATOR_STR); |
| strcat(path_buf, hint); |
| return path_buf; |
| } |
| |
| /* It's a string without any slashes. Try to do something with it. |
| * |
| * Try to find the root of the build tree, and build a PRODUCT_OUT |
| * path from there. |
| */ |
| char top_buf[PATH_MAX]; |
| const char *top = find_top(top_buf); |
| if (top == NULL) { |
| fprintf(stderr, "adb: Couldn't find top of build tree\n"); |
| return NULL; |
| } |
| //TODO: if we have a way to indicate debug, look in out/debug/target/... |
| snprintf(path_buf, sizeof(path_buf), |
| "%s" OS_PATH_SEPARATOR_STR |
| "out" OS_PATH_SEPARATOR_STR |
| "target" OS_PATH_SEPARATOR_STR |
| "product" OS_PATH_SEPARATOR_STR |
| "%s", top_buf, hint); |
| if (access(path_buf, F_OK) < 0) { |
| fprintf(stderr, "adb: Couldn't find a product dir " |
| "based on \"-p %s\"; \"%s\" doesn't exist\n", hint, path_buf); |
| return NULL; |
| } |
| return path_buf; |
| } |
| |
| static void parse_push_pull_args(const char **arg, int narg, char const **path1, |
| char const **path2, int *show_progress, |
| int *copy_attrs) { |
| *show_progress = 0; |
| *copy_attrs = 0; |
| |
| while (narg > 0) { |
| if (!strcmp(*arg, "-p")) { |
| *show_progress = 1; |
| } else if (!strcmp(*arg, "-a")) { |
| *copy_attrs = 1; |
| } else { |
| break; |
| } |
| ++arg; |
| --narg; |
| } |
| |
| if (narg > 0) { |
| *path1 = *arg; |
| ++arg; |
| --narg; |
| } |
| |
| if (narg > 0) { |
| *path2 = *arg; |
| } |
| } |
| |
| int adb_commandline(int argc, const char **argv) |
| { |
| char buf[4096]; |
| int no_daemon = 0; |
| int is_daemon = 0; |
| int is_server = 0; |
| int persist = 0; |
| int r; |
| transport_type ttype = kTransportAny; |
| const char* serial = NULL; |
| const char* server_port_str = NULL; |
| |
| /* If defined, this should be an absolute path to |
| * the directory containing all of the various system images |
| * for a particular product. If not defined, and the adb |
| * command requires this information, then the user must |
| * specify the path using "-p". |
| */ |
| gProductOutPath = getenv("ANDROID_PRODUCT_OUT"); |
| if (gProductOutPath == NULL || gProductOutPath[0] == '\0') { |
| gProductOutPath = NULL; |
| } |
| // TODO: also try TARGET_PRODUCT/TARGET_DEVICE as a hint |
| |
| serial = getenv("ANDROID_SERIAL"); |
| |
| /* Validate and assign the server port */ |
| server_port_str = getenv("ANDROID_ADB_SERVER_PORT"); |
| int server_port = DEFAULT_ADB_PORT; |
| if (server_port_str && strlen(server_port_str) > 0) { |
| server_port = (int) strtol(server_port_str, NULL, 0); |
| if (server_port <= 0 || server_port > 65535) { |
| fprintf(stderr, |
| "adb: Env var ANDROID_ADB_SERVER_PORT must be a positive number less than 65535. Got \"%s\"\n", |
| server_port_str); |
| return usage(); |
| } |
| } |
| |
| /* modifiers and flags */ |
| while (argc > 0) { |
| if (!strcmp(argv[0],"server")) { |
| is_server = 1; |
| } else if (!strcmp(argv[0],"nodaemon")) { |
| no_daemon = 1; |
| } else if (!strcmp(argv[0], "fork-server")) { |
| /* this is a special flag used only when the ADB client launches the ADB Server */ |
| is_daemon = 1; |
| } else if (!strcmp(argv[0],"persist")) { |
| persist = 1; |
| } else if (!strncmp(argv[0], "-p", 2)) { |
| const char *product = NULL; |
| if (argv[0][2] == '\0') { |
| if (argc < 2) return usage(); |
| product = argv[1]; |
| argc--; |
| argv++; |
| } else { |
| product = argv[0] + 2; |
| } |
| gProductOutPath = find_product_out_path(product); |
| if (gProductOutPath == NULL) { |
| fprintf(stderr, "adb: could not resolve \"-p %s\"\n", |
| product); |
| return usage(); |
| } |
| } else if (argv[0][0]=='-' && argv[0][1]=='s') { |
| if (isdigit(argv[0][2])) { |
| serial = argv[0] + 2; |
| } else { |
| if (argc < 2 || argv[0][2] != '\0') return usage(); |
| serial = argv[1]; |
| argc--; |
| argv++; |
| } |
| } else if (!strcmp(argv[0],"-d")) { |
| ttype = kTransportUsb; |
| } else if (!strcmp(argv[0],"-e")) { |
| ttype = kTransportLocal; |
| } else if (!strcmp(argv[0],"-a")) { |
| gListenAll = 1; |
| } else if (!strncmp(argv[0], "-H", 2)) { |
| const char *hostname = NULL; |
| if (argv[0][2] == '\0') { |
| if (argc < 2) return usage(); |
| hostname = argv[1]; |
| argc--; |
| argv++; |
| } else { |
| hostname = argv[0] + 2; |
| } |
| adb_set_tcp_name(hostname); |
| |
| } else if (!strncmp(argv[0], "-P", 2)) { |
| if (argv[0][2] == '\0') { |
| if (argc < 2) return usage(); |
| server_port_str = argv[1]; |
| argc--; |
| argv++; |
| } else { |
| server_port_str = argv[0] + 2; |
| } |
| if (strlen(server_port_str) > 0) { |
| server_port = (int) strtol(server_port_str, NULL, 0); |
| if (server_port <= 0 || server_port > 65535) { |
| fprintf(stderr, |
| "adb: port number must be a positive number less than 65536. Got \"%s\"\n", |
| server_port_str); |
| return usage(); |
| } |
| } else { |
| fprintf(stderr, |
| "adb: port number must be a positive number less than 65536. Got empty string.\n"); |
| return usage(); |
| } |
| } else { |
| /* out of recognized modifiers and flags */ |
| break; |
| } |
| argc--; |
| argv++; |
| } |
| |
| adb_set_transport(ttype, serial); |
| adb_set_tcp_specifics(server_port); |
| |
| if (is_server) { |
| if (no_daemon || is_daemon) { |
| r = adb_main(is_daemon, server_port); |
| } else { |
| r = launch_server(server_port); |
| } |
| if (r) { |
| fprintf(stderr,"* could not start server *\n"); |
| } |
| return r; |
| } |
| |
| if (argc == 0) { |
| return usage(); |
| } |
| |
| /* handle wait-for-* prefix */ |
| if (!strncmp(argv[0], "wait-for-", strlen("wait-for-"))) { |
| const char* service = argv[0]; |
| if (!strncmp(service, "wait-for-device", strlen("wait-for-device"))) { |
| if (ttype == kTransportUsb) { |
| service = "wait-for-usb"; |
| } else if (ttype == kTransportLocal) { |
| service = "wait-for-local"; |
| } else { |
| service = "wait-for-any"; |
| } |
| } |
| |
| format_host_command(buf, sizeof buf, service, ttype, serial); |
| |
| if (adb_command(buf)) { |
| D("failure: %s *\n",adb_error()); |
| fprintf(stderr,"error: %s\n", adb_error()); |
| return 1; |
| } |
| |
| /* Allow a command to be run after wait-for-device, |
| * e.g. 'adb wait-for-device shell'. |
| */ |
| if (argc == 1) { |
| return 0; |
| } |
| |
| /* Fall through */ |
| argc--; |
| argv++; |
| } |
| |
| /* adb_connect() commands */ |
| if (!strcmp(argv[0], "devices")) { |
| char *tmp; |
| const char *listopt; |
| if (argc < 2) |
| listopt = ""; |
| else if (argc == 2 && !strcmp(argv[1], "-l")) |
| listopt = argv[1]; |
| else { |
| fprintf(stderr, "Usage: adb devices [-l]\n"); |
| return 1; |
| } |
| snprintf(buf, sizeof buf, "host:%s%s", argv[0], listopt); |
| tmp = adb_query(buf); |
| if (tmp) { |
| printf("List of devices attached \n"); |
| printf("%s\n", tmp); |
| return 0; |
| } else { |
| return 1; |
| } |
| } |
| else if (!strcmp(argv[0], "connect")) { |
| char *tmp; |
| if (argc != 2) { |
| fprintf(stderr, "Usage: adb connect <host>[:<port>]\n"); |
| return 1; |
| } |
| snprintf(buf, sizeof buf, "host:connect:%s", argv[1]); |
| tmp = adb_query(buf); |
| if (tmp) { |
| printf("%s\n", tmp); |
| return 0; |
| } else { |
| return 1; |
| } |
| } |
| else if (!strcmp(argv[0], "disconnect")) { |
| char *tmp; |
| if (argc > 2) { |
| fprintf(stderr, "Usage: adb disconnect [<host>[:<port>]]\n"); |
| return 1; |
| } |
| if (argc == 2) { |
| snprintf(buf, sizeof buf, "host:disconnect:%s", argv[1]); |
| } else { |
| snprintf(buf, sizeof buf, "host:disconnect:"); |
| } |
| tmp = adb_query(buf); |
| if (tmp) { |
| printf("%s\n", tmp); |
| return 0; |
| } else { |
| return 1; |
| } |
| } |
| else if (!strcmp(argv[0], "emu")) { |
| return adb_send_emulator_command(argc, argv); |
| } |
| else if (!strcmp(argv[0], "shell") || !strcmp(argv[0], "hell")) { |
| int r; |
| int fd; |
| |
| char h = (argv[0][0] == 'h'); |
| |
| if (h) { |
| printf("\x1b[41;33m"); |
| fflush(stdout); |
| } |
| |
| if (argc < 2) { |
| D("starting interactive shell\n"); |
| r = interactive_shell(); |
| if (h) { |
| printf("\x1b[0m"); |
| fflush(stdout); |
| } |
| return r; |
| } |
| |
| snprintf(buf, sizeof(buf), "shell:%s", argv[1]); |
| argc -= 2; |
| argv += 2; |
| while (argc-- > 0) { |
| char *quoted = escape_arg(*argv++); |
| strncat(buf, " ", sizeof(buf) - 1); |
| strncat(buf, quoted, sizeof(buf) - 1); |
| free(quoted); |
| } |
| |
| for(;;) { |
| D("interactive shell loop. buff=%s\n", buf); |
| fd = adb_connect(buf); |
| if (fd >= 0) { |
| D("about to read_and_dump(fd=%d)\n", fd); |
| read_and_dump(fd); |
| D("read_and_dump() done.\n"); |
| adb_close(fd); |
| r = 0; |
| } else { |
| fprintf(stderr,"error: %s\n", adb_error()); |
| r = -1; |
| } |
| |
| if (persist) { |
| fprintf(stderr,"\n- waiting for device -\n"); |
| adb_sleep_ms(1000); |
| do_cmd(ttype, serial, "wait-for-device", 0); |
| } else { |
| if (h) { |
| printf("\x1b[0m"); |
| fflush(stdout); |
| } |
| D("interactive shell loop. return r=%d\n", r); |
| return r; |
| } |
| } |
| } |
| else if (!strcmp(argv[0], "exec-in") || !strcmp(argv[0], "exec-out")) { |
| int exec_in = !strcmp(argv[0], "exec-in"); |
| int fd; |
| |
| snprintf(buf, sizeof buf, "exec:%s", argv[1]); |
| argc -= 2; |
| argv += 2; |
| while (argc-- > 0) { |
| char *quoted = escape_arg(*argv++); |
| strncat(buf, " ", sizeof(buf) - 1); |
| strncat(buf, quoted, sizeof(buf) - 1); |
| free(quoted); |
| } |
| |
| fd = adb_connect(buf); |
| if (fd < 0) { |
| fprintf(stderr, "error: %s\n", adb_error()); |
| return -1; |
| } |
| |
| if (exec_in) { |
| copy_to_file(STDIN_FILENO, fd); |
| } else { |
| copy_to_file(fd, STDOUT_FILENO); |
| } |
| |
| adb_close(fd); |
| return 0; |
| } |
| else if (!strcmp(argv[0], "kill-server")) { |
| int fd; |
| fd = _adb_connect("host:kill"); |
| if (fd == -1) { |
| fprintf(stderr,"* server not running *\n"); |
| return 1; |
| } |
| return 0; |
| } |
| else if (!strcmp(argv[0], "sideload")) { |
| if (argc != 2) return usage(); |
| if (adb_sideload_host(argv[1])) { |
| return 1; |
| } else { |
| return 0; |
| } |
| } |
| else if (!strcmp(argv[0], "remount") || |
| !strcmp(argv[0], "reboot") || |
| !strcmp(argv[0], "reboot-bootloader") || |
| !strcmp(argv[0], "tcpip") || |
| !strcmp(argv[0], "usb") || |
| !strcmp(argv[0], "root") || |
| !strcmp(argv[0], "unroot") || |
| !strcmp(argv[0], "disable-verity") || |
| !strcmp(argv[0], "enable-verity")) { |
| char command[100]; |
| if (!strcmp(argv[0], "reboot-bootloader")) |
| snprintf(command, sizeof(command), "reboot:bootloader"); |
| else if (argc > 1) |
| snprintf(command, sizeof(command), "%s:%s", argv[0], argv[1]); |
| else |
| snprintf(command, sizeof(command), "%s:", argv[0]); |
| int fd = adb_connect(command); |
| if (fd >= 0) { |
| read_and_dump(fd); |
| adb_close(fd); |
| return 0; |
| } |
| fprintf(stderr,"error: %s\n", adb_error()); |
| return 1; |
| } |
| else if (!strcmp(argv[0], "bugreport")) { |
| if (argc != 1) return usage(); |
| do_cmd(ttype, serial, "shell", "bugreport", 0); |
| return 0; |
| } |
| /* adb_command() wrapper commands */ |
| else if (!strcmp(argv[0], "forward") || !strcmp(argv[0], "reverse")) { |
| char host_prefix[64]; |
| char reverse = (char) !strcmp(argv[0], "reverse"); |
| char remove = 0; |
| char remove_all = 0; |
| char list = 0; |
| char no_rebind = 0; |
| |
| // Parse options here. |
| while (argc > 1 && argv[1][0] == '-') { |
| if (!strcmp(argv[1], "--list")) |
| list = 1; |
| else if (!strcmp(argv[1], "--remove")) |
| remove = 1; |
| else if (!strcmp(argv[1], "--remove-all")) |
| remove_all = 1; |
| else if (!strcmp(argv[1], "--no-rebind")) |
| no_rebind = 1; |
| else { |
| return usage(); |
| } |
| argc--; |
| argv++; |
| } |
| |
| // Ensure we can only use one option at a time. |
| if (list + remove + remove_all + no_rebind > 1) { |
| return usage(); |
| } |
| |
| // Determine the <host-prefix> for this command. |
| if (reverse) { |
| snprintf(host_prefix, sizeof host_prefix, "reverse"); |
| } else { |
| if (serial) { |
| snprintf(host_prefix, sizeof host_prefix, "host-serial:%s", |
| serial); |
| } else if (ttype == kTransportUsb) { |
| snprintf(host_prefix, sizeof host_prefix, "host-usb"); |
| } else if (ttype == kTransportLocal) { |
| snprintf(host_prefix, sizeof host_prefix, "host-local"); |
| } else { |
| snprintf(host_prefix, sizeof host_prefix, "host"); |
| } |
| } |
| |
| // Implement forward --list |
| if (list) { |
| if (argc != 1) |
| return usage(); |
| snprintf(buf, sizeof buf, "%s:list-forward", host_prefix); |
| char* forwards = adb_query(buf); |
| if (forwards == NULL) { |
| fprintf(stderr, "error: %s\n", adb_error()); |
| return 1; |
| } |
| printf("%s", forwards); |
| free(forwards); |
| return 0; |
| } |
| |
| // Implement forward --remove-all |
| else if (remove_all) { |
| if (argc != 1) |
| return usage(); |
| snprintf(buf, sizeof buf, "%s:killforward-all", host_prefix); |
| } |
| |
| // Implement forward --remove <local> |
| else if (remove) { |
| if (argc != 2) |
| return usage(); |
| snprintf(buf, sizeof buf, "%s:killforward:%s", host_prefix, argv[1]); |
| } |
| // Or implement one of: |
| // forward <local> <remote> |
| // forward --no-rebind <local> <remote> |
| else |
| { |
| if (argc != 3) |
| return usage(); |
| const char* command = no_rebind ? "forward:norebind" : "forward"; |
| snprintf(buf, sizeof buf, "%s:%s:%s;%s", host_prefix, command, argv[1], argv[2]); |
| } |
| |
| if (adb_command(buf)) { |
| fprintf(stderr,"error: %s\n", adb_error()); |
| return 1; |
| } |
| return 0; |
| } |
| /* do_sync_*() commands */ |
| else if (!strcmp(argv[0], "ls")) { |
| if (argc != 2) return usage(); |
| return do_sync_ls(argv[1]); |
| } |
| else if (!strcmp(argv[0], "push")) { |
| int show_progress = 0; |
| int copy_attrs = 0; // unused |
| const char* lpath = NULL, *rpath = NULL; |
| |
| parse_push_pull_args(&argv[1], argc - 1, &lpath, &rpath, &show_progress, ©_attrs); |
| |
| if ((lpath != NULL) && (rpath != NULL)) { |
| return do_sync_push(lpath, rpath, show_progress); |
| } |
| |
| return usage(); |
| } |
| else if (!strcmp(argv[0], "pull")) { |
| int show_progress = 0; |
| int copy_attrs = 0; |
| const char* rpath = NULL, *lpath = "."; |
| |
| parse_push_pull_args(&argv[1], argc - 1, &rpath, &lpath, &show_progress, ©_attrs); |
| |
| if (rpath != NULL) { |
| return do_sync_pull(rpath, lpath, show_progress, copy_attrs); |
| } |
| |
| return usage(); |
| } |
| else if (!strcmp(argv[0], "install")) { |
| if (argc < 2) return usage(); |
| return install_app(ttype, serial, argc, argv); |
| } |
| else if (!strcmp(argv[0], "install-multiple")) { |
| if (argc < 2) return usage(); |
| return install_multiple_app(ttype, serial, argc, argv); |
| } |
| else if (!strcmp(argv[0], "uninstall")) { |
| if (argc < 2) return usage(); |
| return uninstall_app(ttype, serial, argc, argv); |
| } |
| else if (!strcmp(argv[0], "sync")) { |
| const char* srcarg; |
| char *android_srcpath, *data_srcpath, *vendor_srcpath; |
| int listonly = 0; |
| |
| int ret; |
| if (argc < 2) { |
| /* No local path was specified. */ |
| srcarg = NULL; |
| } else if (argc >= 2 && strcmp(argv[1], "-l") == 0) { |
| listonly = 1; |
| if (argc == 3) { |
| srcarg = argv[2]; |
| } else { |
| srcarg = NULL; |
| } |
| } else if (argc == 2) { |
| /* A local path or "android"/"data" arg was specified. */ |
| srcarg = argv[1]; |
| } else { |
| return usage(); |
| } |
| ret = find_sync_dirs(srcarg, &android_srcpath, &data_srcpath, &vendor_srcpath); |
| if (ret != 0) return usage(); |
| |
| if (android_srcpath != NULL) |
| ret = do_sync_sync(android_srcpath, "/system", listonly); |
| if (ret == 0 && vendor_srcpath != NULL) |
| ret = do_sync_sync(vendor_srcpath, "/vendor", listonly); |
| if (ret == 0 && data_srcpath != NULL) |
| ret = do_sync_sync(data_srcpath, "/data", listonly); |
| |
| free(android_srcpath); |
| free(vendor_srcpath); |
| free(data_srcpath); |
| return ret; |
| } |
| /* passthrough commands */ |
| else if (!strcmp(argv[0],"get-state") || |
| !strcmp(argv[0],"get-serialno") || |
| !strcmp(argv[0],"get-devpath")) |
| { |
| char *tmp; |
| |
| format_host_command(buf, sizeof buf, argv[0], ttype, serial); |
| tmp = adb_query(buf); |
| if (tmp) { |
| printf("%s\n", tmp); |
| return 0; |
| } else { |
| return 1; |
| } |
| } |
| /* other commands */ |
| else if (!strcmp(argv[0],"status-window")) { |
| status_window(ttype, serial); |
| return 0; |
| } |
| else if (!strcmp(argv[0],"logcat") || !strcmp(argv[0],"lolcat") || !strcmp(argv[0],"longcat")) { |
| return logcat(ttype, serial, argc, argv); |
| } |
| else if (!strcmp(argv[0],"ppp")) { |
| return ppp(argc, argv); |
| } |
| else if (!strcmp(argv[0], "start-server")) { |
| return adb_connect("host:start-server"); |
| } |
| else if (!strcmp(argv[0], "backup")) { |
| return backup(argc, argv); |
| } |
| else if (!strcmp(argv[0], "restore")) { |
| return restore(argc, argv); |
| } |
| else if (!strcmp(argv[0], "keygen")) { |
| if (argc < 2) return usage(); |
| return adb_auth_keygen(argv[1]); |
| } |
| else if (!strcmp(argv[0], "jdwp")) { |
| int fd = adb_connect("jdwp"); |
| if (fd >= 0) { |
| read_and_dump(fd); |
| adb_close(fd); |
| return 0; |
| } else { |
| fprintf(stderr, "error: %s\n", adb_error()); |
| return -1; |
| } |
| } |
| /* "adb /?" is a common idiom under Windows */ |
| else if (!strcmp(argv[0], "help") || !strcmp(argv[0], "/?")) { |
| help(); |
| return 0; |
| } |
| else if (!strcmp(argv[0], "version")) { |
| version(stdout); |
| return 0; |
| } |
| |
| usage(); |
| return 1; |
| } |
| |
| #define MAX_ARGV_LENGTH 16 |
| static int do_cmd(transport_type ttype, const char* serial, const char *cmd, ...) |
| { |
| const char *argv[MAX_ARGV_LENGTH]; |
| int argc; |
| va_list ap; |
| |
| va_start(ap, cmd); |
| argc = 0; |
| |
| if (serial) { |
| argv[argc++] = "-s"; |
| argv[argc++] = serial; |
| } else if (ttype == kTransportUsb) { |
| argv[argc++] = "-d"; |
| } else if (ttype == kTransportLocal) { |
| argv[argc++] = "-e"; |
| } |
| |
| argv[argc++] = cmd; |
| while(argc < MAX_ARGV_LENGTH && |
| (argv[argc] = va_arg(ap, char*)) != 0) argc++; |
| assert(argc < MAX_ARGV_LENGTH); |
| va_end(ap); |
| |
| #if 0 |
| int n; |
| fprintf(stderr,"argc = %d\n",argc); |
| for(n = 0; n < argc; n++) { |
| fprintf(stderr,"argv[%d] = \"%s\"\n", n, argv[n]); |
| } |
| #endif |
| |
| return adb_commandline(argc, argv); |
| } |
| |
| int find_sync_dirs(const char *srcarg, |
| char **android_srcdir_out, char **data_srcdir_out, char **vendor_srcdir_out) |
| { |
| char *android_srcdir = NULL, *data_srcdir = NULL, *vendor_srcdir = NULL; |
| struct stat st; |
| |
| if(srcarg == NULL) { |
| android_srcdir = product_file("system"); |
| data_srcdir = product_file("data"); |
| vendor_srcdir = product_file("vendor"); |
| /* Check if vendor partition exists */ |
| if (lstat(vendor_srcdir, &st) || !S_ISDIR(st.st_mode)) |
| vendor_srcdir = NULL; |
| } else { |
| /* srcarg may be "data", "system" or NULL. |
| * if srcarg is NULL, then both data and system are synced |
| */ |
| if(strcmp(srcarg, "system") == 0) { |
| android_srcdir = product_file("system"); |
| } else if(strcmp(srcarg, "data") == 0) { |
| data_srcdir = product_file("data"); |
| } else if(strcmp(srcarg, "vendor") == 0) { |
| vendor_srcdir = product_file("vendor"); |
| } else { |
| /* It's not "system", "vendor", or "data". |
| */ |
| return 1; |
| } |
| } |
| |
| if(android_srcdir_out != NULL) |
| *android_srcdir_out = android_srcdir; |
| else |
| free(android_srcdir); |
| |
| if(vendor_srcdir_out != NULL) |
| *vendor_srcdir_out = vendor_srcdir; |
| else |
| free(vendor_srcdir); |
| |
| if(data_srcdir_out != NULL) |
| *data_srcdir_out = data_srcdir; |
| else |
| free(data_srcdir); |
| return 0; |
| } |
| |
| static int pm_command(transport_type transport, const char* serial, |
| int argc, const char** argv) |
| { |
| char buf[4096]; |
| |
| snprintf(buf, sizeof(buf), "shell:pm"); |
| |
| while(argc-- > 0) { |
| char *quoted = escape_arg(*argv++); |
| strncat(buf, " ", sizeof(buf) - 1); |
| strncat(buf, quoted, sizeof(buf) - 1); |
| free(quoted); |
| } |
| |
| send_shellcommand(transport, serial, buf); |
| return 0; |
| } |
| |
| int uninstall_app(transport_type transport, const char* serial, int argc, |
| const char** argv) |
| { |
| /* if the user choose the -k option, we refuse to do it until devices are |
| out with the option to uninstall the remaining data somehow (adb/ui) */ |
| if (argc == 3 && strcmp(argv[1], "-k") == 0) |
| { |
| printf( |
| "The -k option uninstalls the application while retaining the data/cache.\n" |
| "At the moment, there is no way to remove the remaining data.\n" |
| "You will have to reinstall the application with the same signature, and fully uninstall it.\n" |
| "If you truly wish to continue, execute 'adb shell pm uninstall -k %s'\n", argv[2]); |
| return -1; |
| } |
| |
| /* 'adb uninstall' takes the same arguments as 'pm uninstall' on device */ |
| return pm_command(transport, serial, argc, argv); |
| } |
| |
| static int delete_file(transport_type transport, const char* serial, char* filename) |
| { |
| char buf[4096]; |
| char* quoted; |
| |
| snprintf(buf, sizeof(buf), "shell:rm -f "); |
| quoted = escape_arg(filename); |
| strncat(buf, quoted, sizeof(buf)-1); |
| free(quoted); |
| |
| send_shellcommand(transport, serial, buf); |
| return 0; |
| } |
| |
| static const char* get_basename(const char* filename) |
| { |
| const char* basename = adb_dirstop(filename); |
| if (basename) { |
| basename++; |
| return basename; |
| } else { |
| return filename; |
| } |
| } |
| |
| int install_app(transport_type transport, const char* serial, int argc, |
| const char** argv) |
| { |
| static const char *const DATA_DEST = "/data/local/tmp/%s"; |
| static const char *const SD_DEST = "/sdcard/tmp/%s"; |
| const char* where = DATA_DEST; |
| int i; |
| struct stat sb; |
| |
| for (i = 1; i < argc; i++) { |
| if (!strcmp(argv[i], "-s")) { |
| where = SD_DEST; |
| } |
| } |
| |
| // Find last APK argument. |
| // All other arguments passed through verbatim. |
| int last_apk = -1; |
| for (i = argc - 1; i >= 0; i--) { |
| const char* file = argv[i]; |
| char* dot = strrchr(file, '.'); |
| if (dot && !strcasecmp(dot, ".apk")) { |
| if (stat(file, &sb) == -1 || !S_ISREG(sb.st_mode)) { |
| fprintf(stderr, "Invalid APK file: %s\n", file); |
| return -1; |
| } |
| |
| last_apk = i; |
| break; |
| } |
| } |
| |
| if (last_apk == -1) { |
| fprintf(stderr, "Missing APK file\n"); |
| return -1; |
| } |
| |
| const char* apk_file = argv[last_apk]; |
| char apk_dest[PATH_MAX]; |
| snprintf(apk_dest, sizeof apk_dest, where, get_basename(apk_file)); |
| int err = do_sync_push(apk_file, apk_dest, 0 /* no show progress */); |
| if (err) { |
| goto cleanup_apk; |
| } else { |
| argv[last_apk] = apk_dest; /* destination name, not source location */ |
| } |
| |
| pm_command(transport, serial, argc, argv); |
| |
| cleanup_apk: |
| delete_file(transport, serial, apk_dest); |
| return err; |
| } |
| |
| int install_multiple_app(transport_type transport, const char* serial, int argc, |
| const char** argv) |
| { |
| char buf[1024]; |
| int i; |
| struct stat sb; |
| unsigned long long total_size = 0; |
| |
| // Find all APK arguments starting at end. |
| // All other arguments passed through verbatim. |
| int first_apk = -1; |
| for (i = argc - 1; i >= 0; i--) { |
| const char* file = argv[i]; |
| char* dot = strrchr(file, '.'); |
| if (dot && !strcasecmp(dot, ".apk")) { |
| if (stat(file, &sb) == -1 || !S_ISREG(sb.st_mode)) { |
| fprintf(stderr, "Invalid APK file: %s\n", file); |
| return -1; |
| } |
| |
| total_size += sb.st_size; |
| first_apk = i; |
| } else { |
| break; |
| } |
| } |
| |
| if (first_apk == -1) { |
| fprintf(stderr, "Missing APK file\n"); |
| return 1; |
| } |
| |
| snprintf(buf, sizeof(buf), "exec:pm install-create -S %lld", total_size); |
| for (i = 1; i < first_apk; i++) { |
| char *quoted = escape_arg(argv[i]); |
| strncat(buf, " ", sizeof(buf) - 1); |
| strncat(buf, quoted, sizeof(buf) - 1); |
| free(quoted); |
| } |
| |
| // Create install session |
| int fd = adb_connect(buf); |
| if (fd < 0) { |
| fprintf(stderr, "Connect error for create: %s\n", adb_error()); |
| return -1; |
| } |
| read_status_line(fd, buf, sizeof(buf)); |
| adb_close(fd); |
| |
| int session_id = -1; |
| if (!strncmp("Success", buf, 7)) { |
| char* start = strrchr(buf, '['); |
| char* end = strrchr(buf, ']'); |
| if (start && end) { |
| *end = '\0'; |
| session_id = strtol(start + 1, NULL, 10); |
| } |
| } |
| if (session_id < 0) { |
| fprintf(stderr, "Failed to create session\n"); |
| fputs(buf, stderr); |
| return -1; |
| } |
| |
| // Valid session, now stream the APKs |
| int success = 1; |
| for (i = first_apk; i < argc; i++) { |
| const char* file = argv[i]; |
| if (stat(file, &sb) == -1) { |
| fprintf(stderr, "Failed to stat %s\n", file); |
| success = 0; |
| goto finalize_session; |
| } |
| |
| snprintf(buf, sizeof(buf), "exec:pm install-write -S %lld %d %d_%s -", |
| (long long int) sb.st_size, session_id, i, get_basename(file)); |
| |
| int localFd = adb_open(file, O_RDONLY); |
| if (localFd < 0) { |
| fprintf(stderr, "Failed to open %s: %s\n", file, adb_error()); |
| success = 0; |
| goto finalize_session; |
| } |
| |
| int remoteFd = adb_connect(buf); |
| if (remoteFd < 0) { |
| fprintf(stderr, "Connect error for write: %s\n", adb_error()); |
| adb_close(localFd); |
| success = 0; |
| goto finalize_session; |
| } |
| |
| copy_to_file(localFd, remoteFd); |
| read_status_line(remoteFd, buf, sizeof(buf)); |
| |
| adb_close(localFd); |
| adb_close(remoteFd); |
| |
| if (strncmp("Success", buf, 7)) { |
| fprintf(stderr, "Failed to write %s\n", file); |
| fputs(buf, stderr); |
| success = 0; |
| goto finalize_session; |
| } |
| } |
| |
| finalize_session: |
| // Commit session if we streamed everything okay; otherwise abandon |
| if (success) { |
| snprintf(buf, sizeof(buf), "exec:pm install-commit %d", session_id); |
| } else { |
| snprintf(buf, sizeof(buf), "exec:pm install-abandon %d", session_id); |
| } |
| |
| fd = adb_connect(buf); |
| if (fd < 0) { |
| fprintf(stderr, "Connect error for finalize: %s\n", adb_error()); |
| return -1; |
| } |
| read_status_line(fd, buf, sizeof(buf)); |
| adb_close(fd); |
| |
| if (!strncmp("Success", buf, 7)) { |
| fputs(buf, stderr); |
| return 0; |
| } else { |
| fprintf(stderr, "Failed to finalize session\n"); |
| fputs(buf, stderr); |
| return -1; |
| } |
| } |