You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
538 lines
17 KiB
538 lines
17 KiB
/*
|
|
* Copyright (C) 2015 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#if !ADB_HOST
|
|
|
|
#if !defined(__ANDROID_RECOVERY__)
|
|
#define TRACE_TAG JDWP
|
|
|
|
#include "sysdeps.h"
|
|
|
|
#include <errno.h>
|
|
#include <inttypes.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/un.h>
|
|
#include <unistd.h>
|
|
|
|
#include <list>
|
|
#include <memory>
|
|
#include <thread>
|
|
#include <vector>
|
|
|
|
#include <adbconnection/process_info.h>
|
|
#include <adbconnection/server.h>
|
|
#include <android-base/cmsg.h>
|
|
#include <android-base/unique_fd.h>
|
|
|
|
#include "adb.h"
|
|
#include "adb_io.h"
|
|
#include "adb_unique_fd.h"
|
|
#include "adb_utils.h"
|
|
#include "app_processes.pb.h"
|
|
|
|
using android::base::borrowed_fd;
|
|
using android::base::unique_fd;
|
|
|
|
/* here's how these things work.
|
|
|
|
when adbd starts, it creates a unix server socket
|
|
named @jdwp-control (@ is a shortcut for "first byte is zero"
|
|
to use the private namespace instead of the file system)
|
|
|
|
when a new JDWP daemon thread starts in a new VM process, it creates
|
|
a connection to @jdwp-control to announce its availability.
|
|
|
|
|
|
JDWP thread @jdwp-control
|
|
| |
|
|
|-------------------------------> |
|
|
| hello I'm in process <pid> |
|
|
| |
|
|
| |
|
|
|
|
the connection is kept alive. it will be closed automatically if
|
|
the JDWP process terminates (this allows adbd to detect dead
|
|
processes).
|
|
|
|
adbd thus maintains a list of "active" JDWP processes. it can send
|
|
its content to clients through the "device:debug-ports" service,
|
|
or even updates through the "device:track-debug-ports" service.
|
|
|
|
when a debugger wants to connect, it simply runs the command
|
|
equivalent to "adb forward tcp:<hostport> jdwp:<pid>"
|
|
|
|
"jdwp:<pid>" is a new forward destination format used to target
|
|
a given JDWP process on the device. when sutch a request arrives,
|
|
adbd does the following:
|
|
|
|
- first, it calls socketpair() to create a pair of equivalent
|
|
sockets.
|
|
|
|
- it attaches the first socket in the pair to a local socket
|
|
which is itself attached to the transport's remote socket:
|
|
|
|
|
|
- it sends the file descriptor of the second socket directly
|
|
to the JDWP process with the help of sendmsg()
|
|
|
|
|
|
JDWP thread @jdwp-control
|
|
| |
|
|
| <----------------------|
|
|
| OK, try this file descriptor |
|
|
| |
|
|
| |
|
|
|
|
then, the JDWP thread uses this new socket descriptor as its
|
|
pass-through connection to the debugger (and receives the
|
|
JDWP-Handshake message, answers to it, etc...)
|
|
|
|
this gives the following graphics:
|
|
____________________________________
|
|
| |
|
|
| ADB Server (host) |
|
|
| |
|
|
Debugger <---> LocalSocket <----> RemoteSocket |
|
|
| ^^ |
|
|
|___________________________||_______|
|
|
||
|
|
Transport ||
|
|
(TCP for emulator - USB for device) ||
|
|
||
|
|
___________________________||_______
|
|
| || |
|
|
| ADBD (device) || |
|
|
| VV |
|
|
JDWP <======> LocalSocket <----> RemoteSocket |
|
|
| |
|
|
|____________________________________|
|
|
|
|
due to the way adb works, this doesn't need a special socket
|
|
type or fancy handling of socket termination if either the debugger
|
|
or the JDWP process closes the connection.
|
|
|
|
THIS IS THE SIMPLEST IMPLEMENTATION I COULD FIND, IF YOU HAPPEN
|
|
TO HAVE A BETTER IDEA, LET ME KNOW - Digit
|
|
|
|
**********************************************************************/
|
|
|
|
/** JDWP PID List Support Code
|
|
** for each JDWP process, we record its pid and its connected socket
|
|
**/
|
|
|
|
enum class TrackerKind {
|
|
kJdwp,
|
|
kApp,
|
|
};
|
|
|
|
static void jdwp_process_event(int socket, unsigned events, void* _proc);
|
|
static void jdwp_process_list_updated(void);
|
|
static void app_process_list_updated(void);
|
|
|
|
struct JdwpProcess;
|
|
static auto& _jdwp_list = *new std::list<std::unique_ptr<JdwpProcess>>();
|
|
|
|
struct JdwpProcess {
|
|
JdwpProcess(unique_fd socket, ProcessInfo process) {
|
|
CHECK(process.pid != 0);
|
|
|
|
this->socket = socket;
|
|
this->process = process;
|
|
this->fde = fdevent_create(socket.release(), jdwp_process_event, this);
|
|
|
|
if (!this->fde) {
|
|
LOG(FATAL) << "could not create fdevent for new JDWP process";
|
|
}
|
|
}
|
|
|
|
~JdwpProcess() {
|
|
if (this->socket >= 0) {
|
|
adb_shutdown(this->socket);
|
|
this->socket = -1;
|
|
}
|
|
|
|
if (this->fde) {
|
|
fdevent_destroy(this->fde);
|
|
this->fde = nullptr;
|
|
}
|
|
|
|
out_fds.clear();
|
|
}
|
|
|
|
void RemoveFromList() {
|
|
auto pred = [this](const auto& proc) { return proc.get() == this; };
|
|
_jdwp_list.remove_if(pred);
|
|
}
|
|
|
|
borrowed_fd socket = -1;
|
|
ProcessInfo process;
|
|
fdevent* fde = nullptr;
|
|
|
|
std::vector<unique_fd> out_fds;
|
|
};
|
|
|
|
// Populate the list of processes for "track-jdwp" service.
|
|
static size_t jdwp_process_list(char* buffer, size_t bufferlen) {
|
|
std::string temp;
|
|
|
|
for (auto& proc : _jdwp_list) {
|
|
if (!proc->process.debuggable) continue;
|
|
std::string next = std::to_string(proc->process.pid) + "\n";
|
|
if (temp.length() + next.length() > bufferlen) {
|
|
D("truncating JDWP process list (max len = %zu)", bufferlen);
|
|
break;
|
|
}
|
|
temp.append(next);
|
|
}
|
|
|
|
memcpy(buffer, temp.data(), temp.length());
|
|
return temp.length();
|
|
}
|
|
|
|
// Populate the list of processes for "track-app" service.
|
|
// The list is a protobuf message in the binary format for efficiency.
|
|
static size_t app_process_list(char* buffer, size_t bufferlen) {
|
|
adb::proto::AppProcesses output; // result that's guaranteed to fit in the given buffer
|
|
adb::proto::AppProcesses temp; // temporary result that may be longer than the given buffer
|
|
std::string serialized_message;
|
|
|
|
for (auto& proc : _jdwp_list) {
|
|
if (!proc->process.debuggable && !proc->process.profileable) continue;
|
|
auto* entry = temp.add_process();
|
|
entry->set_pid(proc->process.pid);
|
|
entry->set_debuggable(proc->process.debuggable);
|
|
entry->set_profileable(proc->process.profileable);
|
|
entry->set_architecture(proc->process.arch_name, proc->process.arch_name_length);
|
|
temp.SerializeToString(&serialized_message);
|
|
if (serialized_message.size() > bufferlen) {
|
|
D("truncating app process list (max len = %zu)", bufferlen);
|
|
break;
|
|
}
|
|
output = temp;
|
|
}
|
|
output.SerializeToString(&serialized_message);
|
|
memcpy(buffer, serialized_message.data(), serialized_message.length());
|
|
return serialized_message.length();
|
|
}
|
|
|
|
// Populate the list of processes for either "track-jdwp" or "track-app" services,
|
|
// depending on the given kind.
|
|
static size_t process_list(TrackerKind kind, char* buffer, size_t bufferlen) {
|
|
switch (kind) {
|
|
case TrackerKind::kJdwp:
|
|
return jdwp_process_list(buffer, bufferlen);
|
|
case TrackerKind::kApp:
|
|
return app_process_list(buffer, bufferlen);
|
|
}
|
|
}
|
|
|
|
static size_t process_list_msg(TrackerKind kind, char* buffer, size_t bufferlen) {
|
|
// Message is length-prefixed with 4 hex digits in ASCII.
|
|
static constexpr size_t header_len = 4;
|
|
if (bufferlen < header_len) {
|
|
LOG(FATAL) << "invalid JDWP process list buffer size: " << bufferlen;
|
|
}
|
|
|
|
char head[header_len + 1];
|
|
size_t len = process_list(kind, buffer + header_len, bufferlen - header_len);
|
|
snprintf(head, sizeof head, "%04zx", len);
|
|
memcpy(buffer, head, header_len);
|
|
return len + header_len;
|
|
}
|
|
|
|
static void jdwp_process_event(int socket, unsigned events, void* _proc) {
|
|
JdwpProcess* proc = reinterpret_cast<JdwpProcess*>(_proc);
|
|
CHECK_EQ(socket, proc->socket.get());
|
|
|
|
if (events & FDE_READ) {
|
|
// We already have the PID, if we can read from the socket, we've probably hit EOF.
|
|
D("terminating JDWP connection %" PRId64, proc->process.pid);
|
|
goto CloseProcess;
|
|
}
|
|
|
|
if (events & FDE_WRITE) {
|
|
D("trying to send fd to JDWP process (count = %zu)", proc->out_fds.size());
|
|
CHECK(!proc->out_fds.empty());
|
|
|
|
int fd = proc->out_fds.back().get();
|
|
if (android::base::SendFileDescriptors(socket, "", 1, fd) != 1) {
|
|
D("sending new file descriptor to JDWP %" PRId64 " failed: %s", proc->process.pid,
|
|
strerror(errno));
|
|
goto CloseProcess;
|
|
}
|
|
|
|
D("sent file descriptor %d to JDWP process %" PRId64, fd, proc->process.pid);
|
|
|
|
proc->out_fds.pop_back();
|
|
if (proc->out_fds.empty()) {
|
|
fdevent_del(proc->fde, FDE_WRITE);
|
|
}
|
|
}
|
|
|
|
return;
|
|
|
|
CloseProcess:
|
|
bool debuggable = proc->process.debuggable;
|
|
bool profileable = proc->process.profileable;
|
|
proc->RemoveFromList();
|
|
if (debuggable) jdwp_process_list_updated();
|
|
if (debuggable || profileable) app_process_list_updated();
|
|
}
|
|
|
|
unique_fd create_jdwp_connection_fd(int pid) {
|
|
D("looking for pid %d in JDWP process list", pid);
|
|
|
|
for (auto& proc : _jdwp_list) {
|
|
// Don't allow JDWP connection to a non-debuggable process.
|
|
if (!proc->process.debuggable) continue;
|
|
if (proc->process.pid == static_cast<uint64_t>(pid)) {
|
|
int fds[2];
|
|
|
|
if (adb_socketpair(fds) < 0) {
|
|
D("%s: socket pair creation failed: %s", __FUNCTION__, strerror(errno));
|
|
return unique_fd{};
|
|
}
|
|
D("socketpair: (%d,%d)", fds[0], fds[1]);
|
|
|
|
proc->out_fds.emplace_back(fds[1]);
|
|
if (proc->out_fds.size() == 1) {
|
|
fdevent_add(proc->fde, FDE_WRITE);
|
|
}
|
|
|
|
return unique_fd{fds[0]};
|
|
}
|
|
}
|
|
D("search failed !!");
|
|
return unique_fd{};
|
|
}
|
|
|
|
/** "jdwp" local service implementation
|
|
** this simply returns the list of known JDWP process pids
|
|
**/
|
|
|
|
struct JdwpSocket : public asocket {
|
|
bool pass = false;
|
|
};
|
|
|
|
static void jdwp_socket_close(asocket* s) {
|
|
D("LS(%d): closing jdwp socket", s->id);
|
|
|
|
if (s->peer) {
|
|
D("LS(%d) peer->close()ing peer->id=%d peer->fd=%d", s->id, s->peer->id, s->peer->fd);
|
|
s->peer->peer = nullptr;
|
|
s->peer->close(s->peer);
|
|
s->peer = nullptr;
|
|
}
|
|
|
|
remove_socket(s);
|
|
delete s;
|
|
}
|
|
|
|
static int jdwp_socket_enqueue(asocket* s, apacket::payload_type) {
|
|
/* you can't write to this asocket */
|
|
D("LS(%d): JDWP socket received data?", s->id);
|
|
s->peer->close(s->peer);
|
|
return -1;
|
|
}
|
|
|
|
static void jdwp_socket_ready(asocket* s) {
|
|
JdwpSocket* jdwp = (JdwpSocket*)s;
|
|
asocket* peer = jdwp->peer;
|
|
|
|
/* on the first call, send the list of pids,
|
|
* on the second one, close the connection
|
|
*/
|
|
if (!jdwp->pass) {
|
|
apacket::payload_type data;
|
|
data.resize(s->get_max_payload());
|
|
size_t len = jdwp_process_list(&data[0], data.size());
|
|
data.resize(len);
|
|
peer->enqueue(peer, std::move(data));
|
|
jdwp->pass = true;
|
|
} else {
|
|
peer->close(peer);
|
|
}
|
|
}
|
|
|
|
asocket* create_jdwp_service_socket(void) {
|
|
JdwpSocket* s = new JdwpSocket();
|
|
|
|
if (!s) {
|
|
LOG(FATAL) << "failed to allocate JdwpSocket";
|
|
}
|
|
|
|
install_local_socket(s);
|
|
|
|
s->ready = jdwp_socket_ready;
|
|
s->enqueue = jdwp_socket_enqueue;
|
|
s->close = jdwp_socket_close;
|
|
s->pass = false;
|
|
|
|
return s;
|
|
}
|
|
|
|
/** "track-jdwp" local service implementation
|
|
** this periodically sends the list of known JDWP process pids
|
|
** to the client...
|
|
**/
|
|
|
|
struct JdwpTracker : public asocket {
|
|
TrackerKind kind;
|
|
bool need_initial;
|
|
|
|
explicit JdwpTracker(TrackerKind k, bool initial) : kind(k), need_initial(initial) {}
|
|
};
|
|
|
|
static auto& _jdwp_trackers = *new std::vector<std::unique_ptr<JdwpTracker>>();
|
|
|
|
static void process_list_updated(TrackerKind kind) {
|
|
std::string data;
|
|
const int kMaxLength = kind == TrackerKind::kJdwp ? 1024 : 2048;
|
|
data.resize(kMaxLength);
|
|
data.resize(process_list_msg(kind, &data[0], data.size()));
|
|
|
|
for (auto& t : _jdwp_trackers) {
|
|
if (t->kind == kind && t->peer) {
|
|
// The tracker might not have been connected yet.
|
|
apacket::payload_type payload(data.begin(), data.end());
|
|
t->peer->enqueue(t->peer, std::move(payload));
|
|
}
|
|
}
|
|
}
|
|
|
|
static void jdwp_process_list_updated(void) {
|
|
process_list_updated(TrackerKind::kJdwp);
|
|
}
|
|
|
|
static void app_process_list_updated(void) {
|
|
process_list_updated(TrackerKind::kApp);
|
|
}
|
|
|
|
static void jdwp_tracker_close(asocket* s) {
|
|
D("LS(%d): destroying jdwp tracker service", s->id);
|
|
|
|
if (s->peer) {
|
|
D("LS(%d) peer->close()ing peer->id=%d peer->fd=%d", s->id, s->peer->id, s->peer->fd);
|
|
s->peer->peer = nullptr;
|
|
s->peer->close(s->peer);
|
|
s->peer = nullptr;
|
|
}
|
|
|
|
remove_socket(s);
|
|
|
|
auto pred = [s](const auto& tracker) { return tracker.get() == s; };
|
|
_jdwp_trackers.erase(std::remove_if(_jdwp_trackers.begin(), _jdwp_trackers.end(), pred),
|
|
_jdwp_trackers.end());
|
|
}
|
|
|
|
static void jdwp_tracker_ready(asocket* s) {
|
|
JdwpTracker* t = (JdwpTracker*)s;
|
|
|
|
if (t->need_initial) {
|
|
apacket::payload_type data;
|
|
data.resize(s->get_max_payload());
|
|
data.resize(process_list_msg(t->kind, &data[0], data.size()));
|
|
t->need_initial = false;
|
|
s->peer->enqueue(s->peer, std::move(data));
|
|
}
|
|
}
|
|
|
|
static int jdwp_tracker_enqueue(asocket* s, apacket::payload_type) {
|
|
/* you can't write to this socket */
|
|
D("LS(%d): JDWP tracker received data?", s->id);
|
|
s->peer->close(s->peer);
|
|
return -1;
|
|
}
|
|
|
|
static asocket* create_process_tracker_service_socket(TrackerKind kind) {
|
|
auto t = std::make_unique<JdwpTracker>(kind, true);
|
|
if (!t) {
|
|
LOG(FATAL) << "failed to allocate JdwpTracker";
|
|
}
|
|
|
|
memset(t.get(), 0, sizeof(asocket));
|
|
|
|
install_local_socket(t.get());
|
|
D("LS(%d): created new jdwp tracker service", t->id);
|
|
|
|
t->ready = jdwp_tracker_ready;
|
|
t->enqueue = jdwp_tracker_enqueue;
|
|
t->close = jdwp_tracker_close;
|
|
|
|
asocket* result = t.get();
|
|
|
|
_jdwp_trackers.emplace_back(std::move(t));
|
|
|
|
return result;
|
|
}
|
|
|
|
asocket* create_jdwp_tracker_service_socket() {
|
|
return create_process_tracker_service_socket(TrackerKind::kJdwp);
|
|
}
|
|
|
|
asocket* create_app_tracker_service_socket() {
|
|
return create_process_tracker_service_socket(TrackerKind::kApp);
|
|
}
|
|
|
|
int init_jdwp(void) {
|
|
std::thread([]() {
|
|
adb_thread_setname("jdwp control");
|
|
adbconnection_listen([](int fd, ProcessInfo process) {
|
|
LOG(INFO) << "jdwp connection from " << process.pid;
|
|
fdevent_run_on_main_thread([fd, process] {
|
|
unique_fd ufd(fd);
|
|
auto proc = std::make_unique<JdwpProcess>(std::move(ufd), process);
|
|
if (!proc) {
|
|
LOG(FATAL) << "failed to allocate JdwpProcess";
|
|
}
|
|
_jdwp_list.emplace_back(std::move(proc));
|
|
if (process.debuggable) jdwp_process_list_updated();
|
|
if (process.debuggable || process.profileable) app_process_list_updated();
|
|
});
|
|
});
|
|
}).detach();
|
|
return 0;
|
|
}
|
|
|
|
#else // !defined(__ANDROID_RECOVERY)
|
|
#include "adb.h"
|
|
|
|
asocket* create_jdwp_service_socket(void) {
|
|
return nullptr;
|
|
}
|
|
|
|
unique_fd create_jdwp_connection_fd(int pid) {
|
|
return {};
|
|
}
|
|
|
|
asocket* create_app_tracker_service_socket() {
|
|
return nullptr;
|
|
}
|
|
|
|
asocket* create_jdwp_tracker_service_socket() {
|
|
return nullptr;
|
|
}
|
|
|
|
int init_jdwp() {
|
|
return 0;
|
|
}
|
|
|
|
#endif /* defined(__ANDROID_RECOVERY__) */
|
|
#endif /* !ADB_HOST */
|