blob: 3e87522e5bacdc209fbdc0b5e6da35a1a2b1802b [file] [log] [blame]
The Android Open Source Project9ca14dc2009-03-03 19:32:55 -08001/*
2 * Copyright (C) 2007 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Yabin Cui19bec5b2015-09-22 15:52:57 -070017#define TRACE_TAG TRANSPORT
Dan Albertdb6fe642015-03-19 15:21:08 -070018
Pirama Arumuga Nainar5231aff2018-08-08 10:33:24 -070019#include <memory>
20
Dan Albertdb6fe642015-03-19 15:21:08 -070021#include "sysdeps.h"
22#include "transport.h"
23
The Android Open Source Project9ca14dc2009-03-03 19:32:55 -080024#include <stdio.h>
25#include <stdlib.h>
26#include <string.h>
27
The Android Open Source Project9ca14dc2009-03-03 19:32:55 -080028#include "adb.h"
29
Yabin Cui3cf1b362017-03-10 16:01:01 -080030#if ADB_HOST
31
Josh Gaoa82f2462017-12-06 15:06:14 -080032#if defined(__APPLE__)
33#define CHECK_PACKET_OVERFLOW 0
34#else
35#define CHECK_PACKET_OVERFLOW 1
36#endif
37
Josh Gao3734cf02017-05-02 15:01:09 -070038// Call usb_read using a buffer having a multiple of usb_get_max_packet_size() bytes
Yabin Cui3cf1b362017-03-10 16:01:01 -080039// to avoid overflow. See http://libusb.sourceforge.net/api-1.0/packetoverflow.html.
40static int UsbReadMessage(usb_handle* h, amessage* msg) {
41 D("UsbReadMessage");
Josh Gao3734cf02017-05-02 15:01:09 -070042
Josh Gaoa82f2462017-12-06 15:06:14 -080043#if CHECK_PACKET_OVERFLOW
Josh Gao3734cf02017-05-02 15:01:09 -070044 size_t usb_packet_size = usb_get_max_packet_size(h);
Josh Gaoc4418182017-08-28 14:43:24 -070045 CHECK_GE(usb_packet_size, sizeof(*msg));
46 CHECK_LT(usb_packet_size, 4096ULL);
Josh Gao3734cf02017-05-02 15:01:09 -070047
48 char buffer[4096];
49 int n = usb_read(h, buffer, usb_packet_size);
50 if (n != sizeof(*msg)) {
51 D("usb_read returned unexpected length %d (expected %zu)", n, sizeof(*msg));
52 return -1;
Yabin Cui3cf1b362017-03-10 16:01:01 -080053 }
Josh Gao3734cf02017-05-02 15:01:09 -070054 memcpy(msg, buffer, sizeof(*msg));
Yabin Cui3cf1b362017-03-10 16:01:01 -080055 return n;
Josh Gaoa82f2462017-12-06 15:06:14 -080056#else
57 return usb_read(h, msg, sizeof(*msg));
58#endif
Yabin Cui3cf1b362017-03-10 16:01:01 -080059}
60
Josh Gao3734cf02017-05-02 15:01:09 -070061// Call usb_read using a buffer having a multiple of usb_get_max_packet_size() bytes
Yabin Cui3cf1b362017-03-10 16:01:01 -080062// to avoid overflow. See http://libusb.sourceforge.net/api-1.0/packetoverflow.html.
63static int UsbReadPayload(usb_handle* h, apacket* p) {
Josh Gao3734cf02017-05-02 15:01:09 -070064 D("UsbReadPayload(%d)", p->msg.data_length);
65
Josh Gao839b9322018-02-05 18:49:10 -080066 if (p->msg.data_length > MAX_PAYLOAD) {
Josh Gaob14756a2018-02-02 14:38:04 -080067 return -1;
68 }
69
Josh Gaoa82f2462017-12-06 15:06:14 -080070#if CHECK_PACKET_OVERFLOW
Josh Gao3734cf02017-05-02 15:01:09 -070071 size_t usb_packet_size = usb_get_max_packet_size(h);
Josh Gao3734cf02017-05-02 15:01:09 -070072
73 // Round the data length up to the nearest packet size boundary.
74 // The device won't send a zero packet for packet size aligned payloads,
75 // so don't read any more packets than needed.
76 size_t len = p->msg.data_length;
77 size_t rem_size = len % usb_packet_size;
78 if (rem_size) {
79 len += usb_packet_size - rem_size;
Yabin Cui3cf1b362017-03-10 16:01:01 -080080 }
Josh Gao839b9322018-02-05 18:49:10 -080081
82 p->payload.resize(len);
83 int rc = usb_read(h, &p->payload[0], p->payload.size());
84 if (rc != static_cast<int>(p->msg.data_length)) {
85 return -1;
86 }
87
88 p->payload.resize(rc);
89 return rc;
Josh Gaoa82f2462017-12-06 15:06:14 -080090#else
Josh Gao839b9322018-02-05 18:49:10 -080091 p->payload.resize(p->msg.data_length);
92 return usb_read(h, &p->payload[0], p->payload.size());
Josh Gaoa82f2462017-12-06 15:06:14 -080093#endif
Yabin Cui3cf1b362017-03-10 16:01:01 -080094}
95
Josh Gao395b86a2018-01-28 20:32:46 -080096static int remote_read(apacket* p, usb_handle* usb) {
97 int n = UsbReadMessage(usb, &p->msg);
Yabin Cui3cf1b362017-03-10 16:01:01 -080098 if (n < 0) {
99 D("remote usb: read terminated (message)");
100 return -1;
101 }
Josh Gao395b86a2018-01-28 20:32:46 -0800102 if (static_cast<size_t>(n) != sizeof(p->msg)) {
103 D("remote usb: read received unexpected header length %d", n);
104 return -1;
Yabin Cui3cf1b362017-03-10 16:01:01 -0800105 }
106 if (p->msg.data_length) {
Josh Gao395b86a2018-01-28 20:32:46 -0800107 n = UsbReadPayload(usb, p);
Yabin Cui3cf1b362017-03-10 16:01:01 -0800108 if (n < 0) {
109 D("remote usb: terminated (data)");
110 return -1;
111 }
112 if (static_cast<uint32_t>(n) != p->msg.data_length) {
113 D("remote usb: read payload failed (need %u bytes, give %d bytes), skip it",
114 p->msg.data_length, n);
Josh Gao395b86a2018-01-28 20:32:46 -0800115 return -1;
Yabin Cui3cf1b362017-03-10 16:01:01 -0800116 }
117 }
Yabin Cui3cf1b362017-03-10 16:01:01 -0800118 return 0;
Yabin Cui3cf1b362017-03-10 16:01:01 -0800119}
120
121#else
122
123// On Android devices, we rely on the kernel to provide buffered read.
124// So we can recover automatically from EOVERFLOW.
Josh Gao395b86a2018-01-28 20:32:46 -0800125static int remote_read(apacket* p, usb_handle* usb) {
Jerry Zhang76d17db2018-05-15 16:20:41 -0700126 if (usb_read(usb, &p->msg, sizeof(amessage)) != sizeof(amessage)) {
Josh Gao03eba902017-07-26 11:06:55 -0700127 PLOG(ERROR) << "remote usb: read terminated (message)";
The Android Open Source Project9ca14dc2009-03-03 19:32:55 -0800128 return -1;
129 }
130
Josh Gao67b683a2017-05-16 15:02:45 -0700131 if (p->msg.data_length) {
Josh Gao839b9322018-02-05 18:49:10 -0800132 if (p->msg.data_length > MAX_PAYLOAD) {
Josh Gaob14756a2018-02-02 14:38:04 -0800133 PLOG(ERROR) << "remote usb: read overflow (data length = " << p->msg.data_length << ")";
134 return -1;
135 }
136
Josh Gao839b9322018-02-05 18:49:10 -0800137 p->payload.resize(p->msg.data_length);
Jerry Zhang76d17db2018-05-15 16:20:41 -0700138 if (usb_read(usb, &p->payload[0], p->payload.size())
139 != static_cast<int>(p->payload.size())) {
Josh Gao03eba902017-07-26 11:06:55 -0700140 PLOG(ERROR) << "remote usb: terminated (data)";
The Android Open Source Project9ca14dc2009-03-03 19:32:55 -0800141 return -1;
142 }
143 }
144
The Android Open Source Project9ca14dc2009-03-03 19:32:55 -0800145 return 0;
146}
Yabin Cui3cf1b362017-03-10 16:01:01 -0800147#endif
The Android Open Source Project9ca14dc2009-03-03 19:32:55 -0800148
Josh Gao395b86a2018-01-28 20:32:46 -0800149UsbConnection::~UsbConnection() {
150 usb_close(handle_);
151}
The Android Open Source Project9ca14dc2009-03-03 19:32:55 -0800152
Josh Gao395b86a2018-01-28 20:32:46 -0800153bool UsbConnection::Read(apacket* packet) {
154 int rc = remote_read(packet, handle_);
155 return rc == 0;
156}
157
158bool UsbConnection::Write(apacket* packet) {
Jerry Zhang76d17db2018-05-15 16:20:41 -0700159 int size = packet->msg.data_length;
Josh Gao395b86a2018-01-28 20:32:46 -0800160
Jerry Zhang76d17db2018-05-15 16:20:41 -0700161 if (usb_write(handle_, &packet->msg, sizeof(packet->msg)) != sizeof(packet->msg)) {
Josh Gao03eba902017-07-26 11:06:55 -0700162 PLOG(ERROR) << "remote usb: 1 - write terminated";
Josh Gao395b86a2018-01-28 20:32:46 -0800163 return false;
The Android Open Source Project9ca14dc2009-03-03 19:32:55 -0800164 }
Josh Gao395b86a2018-01-28 20:32:46 -0800165
Jerry Zhang76d17db2018-05-15 16:20:41 -0700166 if (packet->msg.data_length != 0 && usb_write(handle_, packet->payload.data(), size) != size) {
Josh Gao03eba902017-07-26 11:06:55 -0700167 PLOG(ERROR) << "remote usb: 2 - write terminated";
Josh Gao395b86a2018-01-28 20:32:46 -0800168 return false;
The Android Open Source Project9ca14dc2009-03-03 19:32:55 -0800169 }
170
Josh Gao395b86a2018-01-28 20:32:46 -0800171 return true;
The Android Open Source Project9ca14dc2009-03-03 19:32:55 -0800172}
173
Josh Gao3a2172b2019-03-28 15:47:44 -0700174void UsbConnection::Reset() {
175 usb_reset(handle_);
176 usb_kick(handle_);
177}
178
Josh Gao395b86a2018-01-28 20:32:46 -0800179void UsbConnection::Close() {
180 usb_kick(handle_);
The Android Open Source Project9ca14dc2009-03-03 19:32:55 -0800181}
182
Yabin Cui3cf1b362017-03-10 16:01:01 -0800183void init_usb_transport(atransport* t, usb_handle* h) {
Yabin Cui815ad882015-09-02 17:44:28 -0700184 D("transport: usb");
Josh Gaof2a988c2018-03-07 16:51:08 -0800185 auto connection = std::make_unique<UsbConnection>(h);
Luis Hector Chavez3c7881d2018-04-25 08:56:41 -0700186 t->SetConnection(std::make_unique<BlockingConnectionAdapter>(std::move(connection)));
The Android Open Source Project9ca14dc2009-03-03 19:32:55 -0800187 t->type = kTransportUsb;
Josh Gao68f2c382018-12-11 13:11:52 -0800188 t->SetUsbHandle(h);
The Android Open Source Project9ca14dc2009-03-03 19:32:55 -0800189}
190
Josh Gao395b86a2018-01-28 20:32:46 -0800191int is_adb_interface(int usb_class, int usb_subclass, int usb_protocol) {
Elliott Hughes4b8538e2014-11-19 22:07:34 -0800192 return (usb_class == ADB_CLASS && usb_subclass == ADB_SUBCLASS && usb_protocol == ADB_PROTOCOL);
The Android Open Source Project9ca14dc2009-03-03 19:32:55 -0800193}
Josh Gao210b63f2017-02-22 17:07:01 -0800194
195bool should_use_libusb() {
Josh Gao511ff8a2017-12-08 13:05:40 -0800196#if !ADB_HOST
Josh Gao210b63f2017-02-22 17:07:01 -0800197 return false;
198#else
Josh Gao1ca19aa2017-06-26 12:16:30 -0700199 static bool enable = getenv("ADB_LIBUSB") && strcmp(getenv("ADB_LIBUSB"), "1") == 0;
200 return enable;
Josh Gao210b63f2017-02-22 17:07:01 -0800201#endif
202}