Status Update
Comments
jc...@magicleap.com <jc...@magicleap.com> #2
What do you see when you do: `adb reboot && adb wait-for-device` (this is a commonly used pattern and will continue to be supported - adb will block until the device initializes).
adb usage (for most cases, including `devices`) does *not* require root (root would be needed only when you need to do specialized tasks like push. The behavior of `adb devices` should not be contingent on root.
You might also want to see what gets reported (in response to `adb devices`) after doing `adb unroot`.
If there's still any residual questions, I'll need to look at the host/server logs (and possibly the device logs) - you can attach those to this bug.
jc...@magicleap.com <jc...@magicleap.com> #3
Same behavior is observed after running adb root when root is not already acquired.
note that adb root
re-starts the adbd running on the device. so the common element here -- if you're all talking to the same device(s) -- might be "there's a problem with the usb stack on the devices we're talking to, that means they don't come back when adbd restarts".
en...@google.com <en...@google.com> #4
I have the same issue and I've actually found the problem and have a tested fix.
In usb_linux.cpp, where the following code is:
unsigned char length = bufptr[0];
unsigned char type = bufptr[1];
A corsair usb device results in a type
and length
of both 0, even though all processing in the code is correct. It has several good descriptors, eventually followed by a length and type of 0, before bufptr gets to the full descriptor length. Therefore, this code loops indefinitely, and plugging in new devices is never found.
The fix is simple:
@@ -292,6 +292,9 @@ static void find_usb_device(const std::string& base,
device->iSerialNumber, zero_mask, max_packet_size);
break;
}
+ } else if (length == 0) {
+ D("interface descriptor has wrong size");
+ break;
} else {
bufptr += length;
}
jc...@magicleap.com <jc...@magicleap.com> #5
jc...@magicleap.com <jc...@magicleap.com> #6
df...@magicleap.com <df...@magicleap.com> #8
Thanks for the fix! This is great news.
The fix from type
is explicitly 0. It can still potentially lead to an infinite loop should some device contain a descriptor with a non-zero type
and a zero length
. While this fixes my problem, I'd still be weary of leaving this potential infinite loop in.
Thanks again
en...@google.com <en...@google.com> #9
yeah, i missed that change from ps1 to ps2. i think we should change that back.
df...@magicleap.com <df...@magicleap.com> #10
sh...@google.com <sh...@google.com>
[Deleted User] <[Deleted User]> #11
a zero-length descriptor will always cause this code to go into an infinite loop (because we only handle one type
, and that's above this code --- if we could handle the type, we've already done so). it's never going to be useful for the adb server to hang if something's reporting a bad descriptor, so we should always break.
sh...@google.com <sh...@google.com> #12
Buenas tardes
sh...@google.com <sh...@google.com> #13
sh...@google.com <sh...@google.com> #14
sh...@google.com <sh...@google.com> #15
Marked as fixed
en...@google.com <en...@google.com> #16
fixed
ph...@gmail.com <ph...@gmail.com> #17
sh...@google.com <sh...@google.com> #18
Release Notes:
34.0.0 (February 2023)
adb
Fixed zero length packet sends for macOS [(issuetracker: 208675141)](
Addressed unstable connectivity (MacBook high speed cable): frequent adb disconnects.
Improved error message for adb push with insufficient number of arguments.
fastboot
Improved flashing: `flashall` will now skip reboots to userspace if it can.
Fixed zero length packet sends for macOS [(issuetracker: 208675141)](
Fixed flashing recovery.img resulting in wrong AVB footer.
ju...@gmail.com <ju...@gmail.com> #19
ju...@gmail.com <ju...@gmail.com> #20
sh...@gmail.com <sh...@gmail.com> #21
ka...@gmail.com <ka...@gmail.com> #22
I am not a robot
ju...@gmail.com <ju...@gmail.com> #23
ju...@gmail.com <ju...@gmail.com> #24
ju...@gmail.com <ju...@gmail.com> #25
[Deleted User] <[Deleted User]> #26
Hy
tr...@gmail.com <tr...@gmail.com> #27
xu...@gmail.com <xu...@gmail.com> #28
Google.com
xu...@gmail.com <xu...@gmail.com> #29
google.com
fa...@hotmail.com <fa...@hotmail.com> #30
Good
ju...@gmail.com <ju...@gmail.com> #31
fr...@gmail.com <fr...@gmail.com> #32
ka...@gmail.com <ka...@gmail.com> #33
on
My address country India jila Sultanpur post kamtaganj gram basti paharpur Narsinghpur My name is Arun bihari
fa...@gmail.com <fa...@gmail.com> #34
br...@gmail.com <br...@gmail.com> #35
Enviado desde mi Samsung Mobile de Telcel
-------- Mensaje original --------De: buganizer-system@google.com Fecha: 1/8/23 9:50 p. m. (GMT-06:00) Para: b-system+-1105710592@google.com Cc: brotherskankandpechei@gmail.com Asunto: Re:
Replying to this email means your email address will be shared with the team that works on this product.
Changed
fa...@gmail.com added
Goot
_______________________________
Reference Info: 208675141 Bug in usb_osx.cpp logic for sending Zero Length Packet
component: Android Public Tracker > App Development > SDK > platform tools > adb
status: In Progress (Accepted)
reporter: jc...@magicleap.com
assignee: sh...@google.com
cc: ad...@google.com, en...@google.com, jc...@magicleap.com, and 1 more
type: Bug
access level: Default access
priority: P2
severity: S2
retention: Component default
Generated by Google IssueTracker notification system
You're receiving this email because you are subscribed to updates on Google IssueTracker
Unsubscribe from this issue.
sh...@google.com <sh...@google.com>
on...@gmail.com <on...@gmail.com> #36
ro...@gmail.com <ro...@gmail.com> #37
ro...@gmail.com <ro...@gmail.com> #38
pr...@gmail.com <pr...@gmail.com> #39
da...@gmail.com <da...@gmail.com> #40
af...@gmail.com <af...@gmail.com> #41
7a...@gmail.com <7a...@gmail.com> #42
20240720111212800100166608922333431
sa...@google.com <sa...@google.com>
sa...@google.com <sa...@google.com> #44
Fixed in aosp and will be fixed in adb 36.0.0
Description
maxPacketSize=5120
zero_mask = 5120-1 = 0b1001111111111
usb_write() is called with buffer of length 1024 0x10000000000
The following expression in usb_write() will not properly determine when to send the ZLP.
if(!(len & handle->zero_mask)) {
In some cases, a ZLP will be written when it's not needed (the ZLP is only needed when the amount of data being written is an integer multiple of maxPacketSize, as explained here
In a much more troubling case, a ZLP will NOT be written when it should. Imagine, in the above scenario (maxPacketSize=5120), that usb_write() is called with 5120. The expression !(5120 & 5119) resolves to false, and so a ZLP is not sent, but clearly 5120 is an integer multiple of 5120, and thus a ZLP should be sent. This can absolutely result in buggy behavior. In fact, with Android 10 devices, it can result in adb aborting. How? Well, because a ZLP hasn't been sent, the buffer may be combined with a subsequent write and adbd might receive a combination of two amessages (the final payload portion of one message, and a header (24 bytes) of the next amessage). We are in fact seeing that happen. And because UsbFfsConnection::ProcessRead() in Android 10 has a CHECK_LE() to ensure the final read of an amessage has exactly the expected remaining bytes of the amesssage and not one byte more, then adbd aborts (effectively "crashes").