538 lines
		
	
	
		
			17 KiB
		
	
	
	
		
			C++
		
	
	
	
			
		
		
	
	
			538 lines
		
	
	
		
			17 KiB
		
	
	
	
		
			C++
		
	
	
	
| /*
 | |
|  * Copyright (C) 2015 The Android Open Source Project
 | |
|  *
 | |
|  * Licensed under the Apache License, Version 2.0 (the "License");
 | |
|  * you may not use this file except in compliance with the License.
 | |
|  * You may obtain a copy of the License at
 | |
|  *
 | |
|  *      http://www.apache.org/licenses/LICENSE-2.0
 | |
|  *
 | |
|  * Unless required by applicable law or agreed to in writing, software
 | |
|  * distributed under the License is distributed on an "AS IS" BASIS,
 | |
|  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|  * See the License for the specific language governing permissions and
 | |
|  * limitations under the License.
 | |
|  */
 | |
| 
 | |
| #if !ADB_HOST
 | |
| 
 | |
| #if !defined(__ANDROID_RECOVERY__)
 | |
| #define TRACE_TAG JDWP
 | |
| 
 | |
| #include "sysdeps.h"
 | |
| 
 | |
| #include <errno.h>
 | |
| #include <inttypes.h>
 | |
| #include <stdio.h>
 | |
| #include <stdlib.h>
 | |
| #include <string.h>
 | |
| #include <sys/socket.h>
 | |
| #include <sys/un.h>
 | |
| #include <unistd.h>
 | |
| 
 | |
| #include <list>
 | |
| #include <memory>
 | |
| #include <thread>
 | |
| #include <vector>
 | |
| 
 | |
| #include <adbconnection/process_info.h>
 | |
| #include <adbconnection/server.h>
 | |
| #include <android-base/cmsg.h>
 | |
| #include <android-base/unique_fd.h>
 | |
| 
 | |
| #include "adb.h"
 | |
| #include "adb_io.h"
 | |
| #include "adb_unique_fd.h"
 | |
| #include "adb_utils.h"
 | |
| #include "app_processes.pb.h"
 | |
| 
 | |
| using android::base::borrowed_fd;
 | |
| using android::base::unique_fd;
 | |
| 
 | |
| /* here's how these things work.
 | |
| 
 | |
|    when adbd starts, it creates a unix server socket
 | |
|    named @jdwp-control (@ is a shortcut for "first byte is zero"
 | |
|    to use the private namespace instead of the file system)
 | |
| 
 | |
|    when a new JDWP daemon thread starts in a new VM process, it creates
 | |
|    a connection to @jdwp-control to announce its availability.
 | |
| 
 | |
| 
 | |
|      JDWP thread                             @jdwp-control
 | |
|          |                                         |
 | |
|          |------------------------------->         |
 | |
|          | hello I'm in process <pid>              |
 | |
|          |                                         |
 | |
|          |                                         |
 | |
| 
 | |
|     the connection is kept alive. it will be closed automatically if
 | |
|     the JDWP process terminates (this allows adbd to detect dead
 | |
|     processes).
 | |
| 
 | |
|     adbd thus maintains a list of "active" JDWP processes. it can send
 | |
|     its content to clients through the "device:debug-ports" service,
 | |
|     or even updates through the "device:track-debug-ports" service.
 | |
| 
 | |
|     when a debugger wants to connect, it simply runs the command
 | |
|     equivalent to  "adb forward tcp:<hostport> jdwp:<pid>"
 | |
| 
 | |
|     "jdwp:<pid>" is a new forward destination format used to target
 | |
|     a given JDWP process on the device. when sutch a request arrives,
 | |
|     adbd does the following:
 | |
| 
 | |
|       - first, it calls socketpair() to create a pair of equivalent
 | |
|         sockets.
 | |
| 
 | |
|       - it attaches the first socket in the pair to a local socket
 | |
|         which is itself attached to the transport's remote socket:
 | |
| 
 | |
| 
 | |
|       - it sends the file descriptor of the second socket directly
 | |
|         to the JDWP process with the help of sendmsg()
 | |
| 
 | |
| 
 | |
|      JDWP thread                             @jdwp-control
 | |
|          |                                         |
 | |
|          |                  <----------------------|
 | |
|          |           OK, try this file descriptor  |
 | |
|          |                                         |
 | |
|          |                                         |
 | |
| 
 | |
|    then, the JDWP thread uses this new socket descriptor as its
 | |
|    pass-through connection to the debugger (and receives the
 | |
|    JDWP-Handshake message, answers to it, etc...)
 | |
| 
 | |
|    this gives the following graphics:
 | |
|                     ____________________________________
 | |
|                    |                                    |
 | |
|                    |          ADB Server (host)         |
 | |
|                    |                                    |
 | |
|         Debugger <---> LocalSocket <----> RemoteSocket  |
 | |
|                    |                           ^^       |
 | |
|                    |___________________________||_______|
 | |
|                                                ||
 | |
|                                      Transport ||
 | |
|            (TCP for emulator - USB for device) ||
 | |
|                                                ||
 | |
|                     ___________________________||_______
 | |
|                    |                           ||       |
 | |
|                    |          ADBD  (device)   ||       |
 | |
|                    |                           VV       |
 | |
|          JDWP <======> LocalSocket <----> RemoteSocket  |
 | |
|                    |                                    |
 | |
|                    |____________________________________|
 | |
| 
 | |
|     due to the way adb works, this doesn't need a special socket
 | |
|     type or fancy handling of socket termination if either the debugger
 | |
|     or the JDWP process closes the connection.
 | |
| 
 | |
|     THIS IS THE SIMPLEST IMPLEMENTATION I COULD FIND, IF YOU HAPPEN
 | |
|     TO HAVE A BETTER IDEA, LET ME KNOW - Digit
 | |
| 
 | |
| **********************************************************************/
 | |
| 
 | |
| /** JDWP PID List Support Code
 | |
|  ** for each JDWP process, we record its pid and its connected socket
 | |
|  **/
 | |
| 
 | |
| enum class TrackerKind {
 | |
|     kJdwp,
 | |
|     kApp,
 | |
| };
 | |
| 
 | |
| static void jdwp_process_event(int socket, unsigned events, void* _proc);
 | |
| static void jdwp_process_list_updated(void);
 | |
| static void app_process_list_updated(void);
 | |
| 
 | |
| struct JdwpProcess;
 | |
| static auto& _jdwp_list = *new std::list<std::unique_ptr<JdwpProcess>>();
 | |
| 
 | |
| struct JdwpProcess {
 | |
|     JdwpProcess(unique_fd socket, ProcessInfo process) {
 | |
|         CHECK(process.pid != 0);
 | |
| 
 | |
|         this->socket = socket;
 | |
|         this->process = process;
 | |
|         this->fde = fdevent_create(socket.release(), jdwp_process_event, this);
 | |
| 
 | |
|         if (!this->fde) {
 | |
|             LOG(FATAL) << "could not create fdevent for new JDWP process";
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     ~JdwpProcess() {
 | |
|         if (this->socket >= 0) {
 | |
|             adb_shutdown(this->socket);
 | |
|             this->socket = -1;
 | |
|         }
 | |
| 
 | |
|         if (this->fde) {
 | |
|             fdevent_destroy(this->fde);
 | |
|             this->fde = nullptr;
 | |
|         }
 | |
| 
 | |
|         out_fds.clear();
 | |
|     }
 | |
| 
 | |
|     void RemoveFromList() {
 | |
|         auto pred = [this](const auto& proc) { return proc.get() == this; };
 | |
|         _jdwp_list.remove_if(pred);
 | |
|     }
 | |
| 
 | |
|     borrowed_fd socket = -1;
 | |
|     ProcessInfo process;
 | |
|     fdevent* fde = nullptr;
 | |
| 
 | |
|     std::vector<unique_fd> out_fds;
 | |
| };
 | |
| 
 | |
| // Populate the list of processes for "track-jdwp" service.
 | |
| static size_t jdwp_process_list(char* buffer, size_t bufferlen) {
 | |
|     std::string temp;
 | |
| 
 | |
|     for (auto& proc : _jdwp_list) {
 | |
|         if (!proc->process.debuggable) continue;
 | |
|         std::string next = std::to_string(proc->process.pid) + "\n";
 | |
|         if (temp.length() + next.length() > bufferlen) {
 | |
|             D("truncating JDWP process list (max len = %zu)", bufferlen);
 | |
|             break;
 | |
|         }
 | |
|         temp.append(next);
 | |
|     }
 | |
| 
 | |
|     memcpy(buffer, temp.data(), temp.length());
 | |
|     return temp.length();
 | |
| }
 | |
| 
 | |
| // Populate the list of processes for "track-app" service.
 | |
| // The list is a protobuf message in the binary format for efficiency.
 | |
| static size_t app_process_list(char* buffer, size_t bufferlen) {
 | |
|     adb::proto::AppProcesses output;  // result that's guaranteed to fit in the given buffer
 | |
|     adb::proto::AppProcesses temp;    // temporary result that may be longer than the given buffer
 | |
|     std::string serialized_message;
 | |
| 
 | |
|     for (auto& proc : _jdwp_list) {
 | |
|         if (!proc->process.debuggable && !proc->process.profileable) continue;
 | |
|         auto* entry = temp.add_process();
 | |
|         entry->set_pid(proc->process.pid);
 | |
|         entry->set_debuggable(proc->process.debuggable);
 | |
|         entry->set_profileable(proc->process.profileable);
 | |
|         entry->set_architecture(proc->process.arch_name, proc->process.arch_name_length);
 | |
|         temp.SerializeToString(&serialized_message);
 | |
|         if (serialized_message.size() > bufferlen) {
 | |
|             D("truncating app process list (max len = %zu)", bufferlen);
 | |
|             break;
 | |
|         }
 | |
|         output = temp;
 | |
|     }
 | |
|     output.SerializeToString(&serialized_message);
 | |
|     memcpy(buffer, serialized_message.data(), serialized_message.length());
 | |
|     return serialized_message.length();
 | |
| }
 | |
| 
 | |
| // Populate the list of processes for either "track-jdwp" or "track-app" services,
 | |
| // depending on the given kind.
 | |
| static size_t process_list(TrackerKind kind, char* buffer, size_t bufferlen) {
 | |
|     switch (kind) {
 | |
|         case TrackerKind::kJdwp:
 | |
|             return jdwp_process_list(buffer, bufferlen);
 | |
|         case TrackerKind::kApp:
 | |
|             return app_process_list(buffer, bufferlen);
 | |
|     }
 | |
| }
 | |
| 
 | |
| static size_t process_list_msg(TrackerKind kind, char* buffer, size_t bufferlen) {
 | |
|     // Message is length-prefixed with 4 hex digits in ASCII.
 | |
|     static constexpr size_t header_len = 4;
 | |
|     if (bufferlen < header_len) {
 | |
|         LOG(FATAL) << "invalid JDWP process list buffer size: " << bufferlen;
 | |
|     }
 | |
| 
 | |
|     char head[header_len + 1];
 | |
|     size_t len = process_list(kind, buffer + header_len, bufferlen - header_len);
 | |
|     snprintf(head, sizeof head, "%04zx", len);
 | |
|     memcpy(buffer, head, header_len);
 | |
|     return len + header_len;
 | |
| }
 | |
| 
 | |
| static void jdwp_process_event(int socket, unsigned events, void* _proc) {
 | |
|     JdwpProcess* proc = reinterpret_cast<JdwpProcess*>(_proc);
 | |
|     CHECK_EQ(socket, proc->socket.get());
 | |
| 
 | |
|     if (events & FDE_READ) {
 | |
|         // We already have the PID, if we can read from the socket, we've probably hit EOF.
 | |
|         D("terminating JDWP connection %" PRId64, proc->process.pid);
 | |
|         goto CloseProcess;
 | |
|     }
 | |
| 
 | |
|     if (events & FDE_WRITE) {
 | |
|         D("trying to send fd to JDWP process (count = %zu)", proc->out_fds.size());
 | |
|         CHECK(!proc->out_fds.empty());
 | |
| 
 | |
|         int fd = proc->out_fds.back().get();
 | |
|         if (android::base::SendFileDescriptors(socket, "", 1, fd) != 1) {
 | |
|             D("sending new file descriptor to JDWP %" PRId64 " failed: %s", proc->process.pid,
 | |
|               strerror(errno));
 | |
|             goto CloseProcess;
 | |
|         }
 | |
| 
 | |
|         D("sent file descriptor %d to JDWP process %" PRId64, fd, proc->process.pid);
 | |
| 
 | |
|         proc->out_fds.pop_back();
 | |
|         if (proc->out_fds.empty()) {
 | |
|             fdevent_del(proc->fde, FDE_WRITE);
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     return;
 | |
| 
 | |
| CloseProcess:
 | |
|     bool debuggable = proc->process.debuggable;
 | |
|     bool profileable = proc->process.profileable;
 | |
|     proc->RemoveFromList();
 | |
|     if (debuggable) jdwp_process_list_updated();
 | |
|     if (debuggable || profileable) app_process_list_updated();
 | |
| }
 | |
| 
 | |
| unique_fd create_jdwp_connection_fd(int pid) {
 | |
|     D("looking for pid %d in JDWP process list", pid);
 | |
| 
 | |
|     for (auto& proc : _jdwp_list) {
 | |
|         // Don't allow JDWP connection to a non-debuggable process.
 | |
|         if (!proc->process.debuggable) continue;
 | |
|         if (proc->process.pid == static_cast<uint64_t>(pid)) {
 | |
|             int fds[2];
 | |
| 
 | |
|             if (adb_socketpair(fds) < 0) {
 | |
|                 D("%s: socket pair creation failed: %s", __FUNCTION__, strerror(errno));
 | |
|                 return unique_fd{};
 | |
|             }
 | |
|             D("socketpair: (%d,%d)", fds[0], fds[1]);
 | |
| 
 | |
|             proc->out_fds.emplace_back(fds[1]);
 | |
|             if (proc->out_fds.size() == 1) {
 | |
|                 fdevent_add(proc->fde, FDE_WRITE);
 | |
|             }
 | |
| 
 | |
|             return unique_fd{fds[0]};
 | |
|         }
 | |
|     }
 | |
|     D("search failed !!");
 | |
|     return unique_fd{};
 | |
| }
 | |
| 
 | |
| /** "jdwp" local service implementation
 | |
|  ** this simply returns the list of known JDWP process pids
 | |
|  **/
 | |
| 
 | |
| struct JdwpSocket : public asocket {
 | |
|     bool pass = false;
 | |
| };
 | |
| 
 | |
| static void jdwp_socket_close(asocket* s) {
 | |
|     D("LS(%d): closing jdwp socket", s->id);
 | |
| 
 | |
|     if (s->peer) {
 | |
|         D("LS(%d) peer->close()ing peer->id=%d peer->fd=%d", s->id, s->peer->id, s->peer->fd);
 | |
|         s->peer->peer = nullptr;
 | |
|         s->peer->close(s->peer);
 | |
|         s->peer = nullptr;
 | |
|     }
 | |
| 
 | |
|     remove_socket(s);
 | |
|     delete s;
 | |
| }
 | |
| 
 | |
| static int jdwp_socket_enqueue(asocket* s, apacket::payload_type) {
 | |
|     /* you can't write to this asocket */
 | |
|     D("LS(%d): JDWP socket received data?", s->id);
 | |
|     s->peer->close(s->peer);
 | |
|     return -1;
 | |
| }
 | |
| 
 | |
| static void jdwp_socket_ready(asocket* s) {
 | |
|     JdwpSocket* jdwp = (JdwpSocket*)s;
 | |
|     asocket* peer = jdwp->peer;
 | |
| 
 | |
|     /* on the first call, send the list of pids,
 | |
|      * on the second one, close the connection
 | |
|      */
 | |
|     if (!jdwp->pass) {
 | |
|         apacket::payload_type data;
 | |
|         data.resize(s->get_max_payload());
 | |
|         size_t len = jdwp_process_list(&data[0], data.size());
 | |
|         data.resize(len);
 | |
|         peer->enqueue(peer, std::move(data));
 | |
|         jdwp->pass = true;
 | |
|     } else {
 | |
|         peer->close(peer);
 | |
|     }
 | |
| }
 | |
| 
 | |
| asocket* create_jdwp_service_socket(void) {
 | |
|     JdwpSocket* s = new JdwpSocket();
 | |
| 
 | |
|     if (!s) {
 | |
|         LOG(FATAL) << "failed to allocate JdwpSocket";
 | |
|     }
 | |
| 
 | |
|     install_local_socket(s);
 | |
| 
 | |
|     s->ready = jdwp_socket_ready;
 | |
|     s->enqueue = jdwp_socket_enqueue;
 | |
|     s->close = jdwp_socket_close;
 | |
|     s->pass = false;
 | |
| 
 | |
|     return s;
 | |
| }
 | |
| 
 | |
| /** "track-jdwp" local service implementation
 | |
|  ** this periodically sends the list of known JDWP process pids
 | |
|  ** to the client...
 | |
|  **/
 | |
| 
 | |
| struct JdwpTracker : public asocket {
 | |
|     TrackerKind kind;
 | |
|     bool need_initial;
 | |
| 
 | |
|     explicit JdwpTracker(TrackerKind k, bool initial) : kind(k), need_initial(initial) {}
 | |
| };
 | |
| 
 | |
| static auto& _jdwp_trackers = *new std::vector<std::unique_ptr<JdwpTracker>>();
 | |
| 
 | |
| static void process_list_updated(TrackerKind kind) {
 | |
|     std::string data;
 | |
|     const int kMaxLength = kind == TrackerKind::kJdwp ? 1024 : 2048;
 | |
|     data.resize(kMaxLength);
 | |
|     data.resize(process_list_msg(kind, &data[0], data.size()));
 | |
| 
 | |
|     for (auto& t : _jdwp_trackers) {
 | |
|         if (t->kind == kind && t->peer) {
 | |
|             // The tracker might not have been connected yet.
 | |
|             apacket::payload_type payload(data.begin(), data.end());
 | |
|             t->peer->enqueue(t->peer, std::move(payload));
 | |
|         }
 | |
|     }
 | |
| }
 | |
| 
 | |
| static void jdwp_process_list_updated(void) {
 | |
|     process_list_updated(TrackerKind::kJdwp);
 | |
| }
 | |
| 
 | |
| static void app_process_list_updated(void) {
 | |
|     process_list_updated(TrackerKind::kApp);
 | |
| }
 | |
| 
 | |
| static void jdwp_tracker_close(asocket* s) {
 | |
|     D("LS(%d): destroying jdwp tracker service", s->id);
 | |
| 
 | |
|     if (s->peer) {
 | |
|         D("LS(%d) peer->close()ing peer->id=%d peer->fd=%d", s->id, s->peer->id, s->peer->fd);
 | |
|         s->peer->peer = nullptr;
 | |
|         s->peer->close(s->peer);
 | |
|         s->peer = nullptr;
 | |
|     }
 | |
| 
 | |
|     remove_socket(s);
 | |
| 
 | |
|     auto pred = [s](const auto& tracker) { return tracker.get() == s; };
 | |
|     _jdwp_trackers.erase(std::remove_if(_jdwp_trackers.begin(), _jdwp_trackers.end(), pred),
 | |
|                          _jdwp_trackers.end());
 | |
| }
 | |
| 
 | |
| static void jdwp_tracker_ready(asocket* s) {
 | |
|     JdwpTracker* t = (JdwpTracker*)s;
 | |
| 
 | |
|     if (t->need_initial) {
 | |
|         apacket::payload_type data;
 | |
|         data.resize(s->get_max_payload());
 | |
|         data.resize(process_list_msg(t->kind, &data[0], data.size()));
 | |
|         t->need_initial = false;
 | |
|         s->peer->enqueue(s->peer, std::move(data));
 | |
|     }
 | |
| }
 | |
| 
 | |
| static int jdwp_tracker_enqueue(asocket* s, apacket::payload_type) {
 | |
|     /* you can't write to this socket */
 | |
|     D("LS(%d): JDWP tracker received data?", s->id);
 | |
|     s->peer->close(s->peer);
 | |
|     return -1;
 | |
| }
 | |
| 
 | |
| static asocket* create_process_tracker_service_socket(TrackerKind kind) {
 | |
|     auto t = std::make_unique<JdwpTracker>(kind, true);
 | |
|     if (!t) {
 | |
|         LOG(FATAL) << "failed to allocate JdwpTracker";
 | |
|     }
 | |
| 
 | |
|     memset(t.get(), 0, sizeof(asocket));
 | |
| 
 | |
|     install_local_socket(t.get());
 | |
|     D("LS(%d): created new jdwp tracker service", t->id);
 | |
| 
 | |
|     t->ready = jdwp_tracker_ready;
 | |
|     t->enqueue = jdwp_tracker_enqueue;
 | |
|     t->close = jdwp_tracker_close;
 | |
| 
 | |
|     asocket* result = t.get();
 | |
| 
 | |
|     _jdwp_trackers.emplace_back(std::move(t));
 | |
| 
 | |
|     return result;
 | |
| }
 | |
| 
 | |
| asocket* create_jdwp_tracker_service_socket() {
 | |
|     return create_process_tracker_service_socket(TrackerKind::kJdwp);
 | |
| }
 | |
| 
 | |
| asocket* create_app_tracker_service_socket() {
 | |
|     return create_process_tracker_service_socket(TrackerKind::kApp);
 | |
| }
 | |
| 
 | |
| int init_jdwp(void) {
 | |
|     std::thread([]() {
 | |
|         adb_thread_setname("jdwp control");
 | |
|         adbconnection_listen([](int fd, ProcessInfo process) {
 | |
|             LOG(INFO) << "jdwp connection from " << process.pid;
 | |
|             fdevent_run_on_main_thread([fd, process] {
 | |
|                 unique_fd ufd(fd);
 | |
|                 auto proc = std::make_unique<JdwpProcess>(std::move(ufd), process);
 | |
|                 if (!proc) {
 | |
|                     LOG(FATAL) << "failed to allocate JdwpProcess";
 | |
|                 }
 | |
|                 _jdwp_list.emplace_back(std::move(proc));
 | |
|                 if (process.debuggable) jdwp_process_list_updated();
 | |
|                 if (process.debuggable || process.profileable) app_process_list_updated();
 | |
|             });
 | |
|         });
 | |
|     }).detach();
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| #else  // !defined(__ANDROID_RECOVERY)
 | |
| #include "adb.h"
 | |
| 
 | |
| asocket* create_jdwp_service_socket(void) {
 | |
|     return nullptr;
 | |
| }
 | |
| 
 | |
| unique_fd create_jdwp_connection_fd(int pid) {
 | |
|     return {};
 | |
| }
 | |
| 
 | |
| asocket* create_app_tracker_service_socket() {
 | |
|     return nullptr;
 | |
| }
 | |
| 
 | |
| asocket* create_jdwp_tracker_service_socket() {
 | |
|     return nullptr;
 | |
| }
 | |
| 
 | |
| int init_jdwp() {
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| #endif /* defined(__ANDROID_RECOVERY__) */
 | |
| #endif /* !ADB_HOST */
 |