blob: b8b0e16fae7c53a584d26b2d26af4e586eeb85b2 [file] [log] [blame]
Elliott Hughes872d4ec2011-10-21 17:07:15 -07001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Elliott Hughes872d4ec2011-10-21 17:07:15 -070016
Elliott Hughes07ed66b2012-12-12 18:34:25 -080017#include <arpa/inet.h>
Elliott Hughes872d4ec2011-10-21 17:07:15 -070018#include <errno.h>
Elliott Hughes07ed66b2012-12-12 18:34:25 -080019#include <netdb.h>
Elliott Hughes872d4ec2011-10-21 17:07:15 -070020#include <netinet/in.h>
21#include <netinet/tcp.h>
Elliott Hughes07ed66b2012-12-12 18:34:25 -080022#include <stdio.h>
23#include <stdlib.h>
24#include <string.h>
25#include <sys/socket.h>
26#include <sys/types.h>
27#include <unistd.h>
28
Andreas Gampe46ee31b2016-12-14 10:11:49 -080029#include "android-base/stringprintf.h"
30
Andreas Gampe57943812017-12-06 21:39:13 -080031#include "base/logging.h" // For VLOG.
Elliott Hughes07ed66b2012-12-12 18:34:25 -080032#include "jdwp/jdwp_priv.h"
Elliott Hughes872d4ec2011-10-21 17:07:15 -070033
Elliott Hughes872d4ec2011-10-21 17:07:15 -070034namespace art {
35
36namespace JDWP {
37
Roland Levillain3cbad242016-01-25 19:17:14 +000038static constexpr uint16_t kBasePort = 8000;
39static constexpr uint16_t kMaxPort = 8040;
40
Elliott Hughes872d4ec2011-10-21 17:07:15 -070041/*
42 * JDWP network state.
43 *
44 * We only talk to one debugger at a time.
45 */
Elliott Hughes5d10a872013-04-17 19:26:43 -070046struct JdwpSocketState : public JdwpNetStateBase {
Elliott Hughes74847412012-06-20 18:10:21 -070047 uint16_t listenPort;
48 int listenSock; /* listen for connection from debugger */
Elliott Hughes872d4ec2011-10-21 17:07:15 -070049
Sebastien Hertzaa50d3a2015-08-25 15:25:41 +020050 explicit JdwpSocketState(JdwpState* state)
51 : JdwpNetStateBase(state),
52 listenPort(0U),
53 listenSock(-1),
54 remote_port_(0U) {
Elliott Hughes74847412012-06-20 18:10:21 -070055 }
Elliott Hughes5d10a872013-04-17 19:26:43 -070056
Andreas Gampefa6a1b02018-09-07 08:11:55 -070057 bool Accept() override;
58 bool Establish(const JdwpOptions*) override;
59 void Shutdown() override;
60 bool ProcessIncoming() override;
Elliott Hughes5d10a872013-04-17 19:26:43 -070061
62 private:
63 in_addr remote_addr_;
64 uint16_t remote_port_;
Elliott Hughes872d4ec2011-10-21 17:07:15 -070065};
66
Elliott Hughes5d10a872013-04-17 19:26:43 -070067static JdwpSocketState* SocketStartup(JdwpState* state, uint16_t port, bool probe);
Elliott Hughes872d4ec2011-10-21 17:07:15 -070068
69/*
70 * Set up some stuff for transport=dt_socket.
71 */
Elliott Hughes5d10a872013-04-17 19:26:43 -070072bool InitSocketTransport(JdwpState* state, const JdwpOptions* options) {
Elliott Hughes6d8dd472012-01-17 18:27:41 -080073 uint16_t port = options->port;
Elliott Hughes872d4ec2011-10-21 17:07:15 -070074
Elliott Hughes376a7a02011-10-24 18:35:55 -070075 if (options->server) {
76 if (options->port != 0) {
Elliott Hughes872d4ec2011-10-21 17:07:15 -070077 /* try only the specified port */
Elliott Hughes5d10a872013-04-17 19:26:43 -070078 state->netState = SocketStartup(state, port, false);
Elliott Hughes872d4ec2011-10-21 17:07:15 -070079 } else {
80 /* scan through a range of ports, binding to the first available */
81 for (port = kBasePort; port <= kMaxPort; port++) {
Elliott Hughes5d10a872013-04-17 19:26:43 -070082 state->netState = SocketStartup(state, port, true);
Sebastien Hertz7d955652014-10-22 10:57:10 +020083 if (state->netState != nullptr) {
Elliott Hughes872d4ec2011-10-21 17:07:15 -070084 break;
85 }
86 }
87 }
Sebastien Hertz7d955652014-10-22 10:57:10 +020088 if (state->netState == nullptr) {
Elliott Hughes376a7a02011-10-24 18:35:55 -070089 LOG(ERROR) << "JDWP net startup failed (req port=" << options->port << ")";
Elliott Hughes872d4ec2011-10-21 17:07:15 -070090 return false;
91 }
92 } else {
Elliott Hughes5d10a872013-04-17 19:26:43 -070093 state->netState = SocketStartup(state, 0, false);
Elliott Hughes872d4ec2011-10-21 17:07:15 -070094 }
95
Elliott Hughes376a7a02011-10-24 18:35:55 -070096 if (options->suspend) {
Elliott Hughes872d4ec2011-10-21 17:07:15 -070097 LOG(INFO) << "JDWP will wait for debugger on port " << port;
98 } else {
Elliott Hughes376a7a02011-10-24 18:35:55 -070099 LOG(INFO) << "JDWP will " << (options->server ? "listen" : "connect") << " on port " << port;
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700100 }
101
102 return true;
103}
104
105/*
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700106 * Initialize JDWP stuff.
107 *
Elliott Hughes6d8dd472012-01-17 18:27:41 -0800108 * Allocates a new state structure. If "port" is non-zero, this also
109 * tries to bind to a listen port. If "port" is zero, we assume
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700110 * we're preparing for an outbound connection, and return without binding
111 * to anything.
112 *
113 * This may be called several times if we're probing for a port.
114 *
115 * Returns 0 on success.
116 */
Elliott Hughes5d10a872013-04-17 19:26:43 -0700117static JdwpSocketState* SocketStartup(JdwpState* state, uint16_t port, bool probe) {
118 JdwpSocketState* netState = new JdwpSocketState(state);
Elliott Hughes6d8dd472012-01-17 18:27:41 -0800119 if (port == 0) {
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700120 return netState;
121 }
122
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700123 netState->listenSock = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP);
124 if (netState->listenSock < 0) {
Andreas Gampe3fec9ac2016-09-13 10:47:28 -0700125 PLOG(probe ? ::android::base::ERROR : ::android::base::FATAL) << "Socket create failed";
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700126 goto fail;
127 }
128
129 /* allow immediate re-use */
Elliott Hughes6d8dd472012-01-17 18:27:41 -0800130 {
131 int one = 1;
132 if (setsockopt(netState->listenSock, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one)) < 0) {
Andreas Gampe3fec9ac2016-09-13 10:47:28 -0700133 PLOG(probe ? ::android::base::ERROR : ::android::base::FATAL)
134 << "setsockopt(SO_REUSEADDR) failed";
Elliott Hughes6d8dd472012-01-17 18:27:41 -0800135 goto fail;
136 }
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700137 }
138
139 union {
Elliott Hughes7b9d9962012-04-20 18:48:18 -0700140 sockaddr_in addrInet;
141 sockaddr addrPlain;
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700142 } addr;
143 addr.addrInet.sin_family = AF_INET;
144 addr.addrInet.sin_port = htons(port);
145 inet_aton("127.0.0.1", &addr.addrInet.sin_addr);
146
147 if (bind(netState->listenSock, &addr.addrPlain, sizeof(addr)) != 0) {
Andreas Gampe3fec9ac2016-09-13 10:47:28 -0700148 PLOG(probe ? ::android::base::ERROR : ::android::base::FATAL)
149 << "Attempt to bind to port " << port << " failed";
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700150 goto fail;
151 }
152
153 netState->listenPort = port;
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700154
155 if (listen(netState->listenSock, 5) != 0) {
Andreas Gampe3fec9ac2016-09-13 10:47:28 -0700156 PLOG(probe ? ::android::base::ERROR : ::android::base::FATAL) << "Listen failed";
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700157 goto fail;
158 }
159
160 return netState;
161
Elliott Hughesa21039c2012-06-21 12:09:25 -0700162 fail:
Elliott Hughes5d10a872013-04-17 19:26:43 -0700163 netState->Shutdown();
164 delete netState;
Sebastien Hertz7d955652014-10-22 10:57:10 +0200165 return nullptr;
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700166}
167
168/*
169 * Shut down JDWP listener. Don't free state.
170 *
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700171 * This may be called from a non-JDWP thread as part of shutting the
172 * JDWP thread down.
173 *
174 * (This is currently called several times during startup as we probe
175 * for an open port.)
176 */
Elliott Hughes5d10a872013-04-17 19:26:43 -0700177void JdwpSocketState::Shutdown() {
Andreas Gampe277ccbd2014-11-03 21:36:10 -0800178 int local_listenSock = this->listenSock;
179 int local_clientSock = this->clientSock;
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700180
181 /* clear these out so it doesn't wake up and try to reuse them */
Elliott Hughes5d10a872013-04-17 19:26:43 -0700182 this->listenSock = this->clientSock = -1;
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700183
184 /* "shutdown" dislodges blocking read() and accept() calls */
Andreas Gampe277ccbd2014-11-03 21:36:10 -0800185 if (local_listenSock != -1) {
186 shutdown(local_listenSock, SHUT_RDWR);
187 close(local_listenSock);
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700188 }
Andreas Gampe277ccbd2014-11-03 21:36:10 -0800189 if (local_clientSock != -1) {
190 shutdown(local_clientSock, SHUT_RDWR);
191 close(local_clientSock);
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700192 }
193
Elliott Hughes5d10a872013-04-17 19:26:43 -0700194 WakePipe();
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700195}
196
197/*
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700198 * Disable the TCP Nagle algorithm, which delays transmission of outbound
199 * packets until the previous transmissions have been acked. JDWP does a
200 * lot of back-and-forth with small packets, so this may help.
201 */
Elliott Hughes5d10a872013-04-17 19:26:43 -0700202static int SetNoDelay(int fd) {
Elliott Hughes74847412012-06-20 18:10:21 -0700203 int on = 1;
204 int cc = setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &on, sizeof(on));
205 CHECK_EQ(cc, 0);
206 return cc;
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700207}
208
209/*
210 * Accept a connection. This will block waiting for somebody to show up.
211 * If that's not desirable, use checkConnection() to make sure something
212 * is pending.
213 */
Elliott Hughes5d10a872013-04-17 19:26:43 -0700214bool JdwpSocketState::Accept() {
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700215 union {
Elliott Hughes7b9d9962012-04-20 18:48:18 -0700216 sockaddr_in addrInet;
217 sockaddr addrPlain;
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700218 } addr;
219 socklen_t addrlen;
220 int sock;
221
Elliott Hughes5d10a872013-04-17 19:26:43 -0700222 if (listenSock < 0) {
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700223 return false; /* you're not listening! */
224 }
225
Brian Carlstrom42748892013-07-18 18:04:08 -0700226 CHECK_EQ(clientSock, -1); /* must not already be talking */
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700227
228 addrlen = sizeof(addr);
229 do {
Elliott Hughes5d10a872013-04-17 19:26:43 -0700230 sock = accept(listenSock, &addr.addrPlain, &addrlen);
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700231 if (sock < 0 && errno != EINTR) {
232 // When we call shutdown() on the socket, accept() returns with
233 // EINVAL. Don't gripe about it.
234 if (errno == EINVAL) {
Elliott Hughes4dd9b4d2011-12-12 18:29:24 -0800235 if (VLOG_IS_ON(jdwp)) {
236 PLOG(ERROR) << "accept failed";
237 }
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700238 } else {
239 PLOG(ERROR) << "accept failed";
240 return false;
241 }
242 }
243 } while (sock < 0);
244
Elliott Hughes5d10a872013-04-17 19:26:43 -0700245 remote_addr_ = addr.addrInet.sin_addr;
246 remote_port_ = ntohs(addr.addrInet.sin_port);
247 VLOG(jdwp) << "+++ accepted connection from " << inet_ntoa(remote_addr_) << ":" << remote_port_;
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700248
Elliott Hughes5d10a872013-04-17 19:26:43 -0700249 clientSock = sock;
250 SetAwaitingHandshake(true);
251 input_count_ = 0;
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700252
Elliott Hughes4dd9b4d2011-12-12 18:29:24 -0800253 VLOG(jdwp) << "Setting TCP_NODELAY on accepted socket";
Elliott Hughes5d10a872013-04-17 19:26:43 -0700254 SetNoDelay(clientSock);
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700255
Elliott Hughes5d10a872013-04-17 19:26:43 -0700256 if (!MakePipe()) {
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700257 return false;
258 }
259
260 return true;
261}
262
263/*
264 * Create a connection to a waiting debugger.
265 */
Elliott Hughes5d10a872013-04-17 19:26:43 -0700266bool JdwpSocketState::Establish(const JdwpOptions* options) {
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700267 union {
Elliott Hughes7b9d9962012-04-20 18:48:18 -0700268 sockaddr_in addrInet;
269 sockaddr addrPlain;
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700270 } addr;
Elliott Hughes7b9d9962012-04-20 18:48:18 -0700271 hostent* pEntry;
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700272
Elliott Hughesa21039c2012-06-21 12:09:25 -0700273 CHECK(!options->server);
274 CHECK(!options->host.empty());
275 CHECK_NE(options->port, 0);
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700276
277 /*
278 * Start by resolving the host name.
279 */
Yabin Cuiec17f982014-11-13 10:29:25 -0800280#if defined(__linux__)
Roland Levillaind8175602016-01-26 10:22:14 +0000281 // Initial size of the work buffer used in gethostbyname_r.
282 //
283 // The call to gethostbyname_r below requires a user-allocated buffer,
284 // the size of which depends on the system. The initial implementation
285 // used to use a 128-byte buffer, but that was not enough on some
286 // systems (maybe because of IPv6), causing failures in JDWP host
287 // testing; thus it was increased to 256.
288 //
289 // However, we should not use a fixed size: gethostbyname_r's
290 // documentation states that if the work buffer is too small (i.e. if
291 // gethostbyname_r returns `ERANGE`), then the function should be
292 // called again with a bigger buffer. Which we do now, starting with
293 // an initial 256-byte buffer, and doubling it until gethostbyname_r
294 // accepts this size.
295 static constexpr size_t kInitialAuxBufSize = 256;
296
Roland Levillain3cbad242016-01-25 19:17:14 +0000297 std::vector<char> auxBuf(kInitialAuxBufSize);
Roland Levillaind8175602016-01-26 10:22:14 +0000298 hostent he;
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700299 int error;
Roland Levillain3cbad242016-01-25 19:17:14 +0000300 int cc;
301 while ((cc = gethostbyname_r(
302 options->host.c_str(), &he, auxBuf.data(), auxBuf.size(), &pEntry, &error))
303 == ERANGE) {
304 // The work buffer `auxBuf` is too small; enlarge it.
305 auxBuf.resize(auxBuf.size() * 2);
306 }
307 if (cc != 0 || pEntry == nullptr) {
Elliott Hughesa21039c2012-06-21 12:09:25 -0700308 LOG(WARNING) << "gethostbyname_r('" << options->host << "') failed: " << hstrerror(error);
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700309 return false;
310 }
311#else
312 h_errno = 0;
Elliott Hughesa21039c2012-06-21 12:09:25 -0700313 pEntry = gethostbyname(options->host.c_str());
Sebastien Hertz7d955652014-10-22 10:57:10 +0200314 if (pEntry == nullptr) {
Elliott Hughesa21039c2012-06-21 12:09:25 -0700315 PLOG(WARNING) << "gethostbyname('" << options->host << "') failed";
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700316 return false;
317 }
318#endif
319
320 /* copy it out ASAP to minimize risk of multithreaded annoyances */
321 memcpy(&addr.addrInet.sin_addr, pEntry->h_addr, pEntry->h_length);
322 addr.addrInet.sin_family = pEntry->h_addrtype;
323
Elliott Hughesa21039c2012-06-21 12:09:25 -0700324 addr.addrInet.sin_port = htons(options->port);
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700325
Roland Levillain15f9b272016-01-21 14:01:10 +0000326 LOG(INFO) << "Connecting out to " << inet_ntoa(addr.addrInet.sin_addr) << ":"
327 << ntohs(addr.addrInet.sin_port);
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700328
329 /*
330 * Create a socket.
331 */
Elliott Hughes5d10a872013-04-17 19:26:43 -0700332 clientSock = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP);
333 if (clientSock < 0) {
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700334 PLOG(ERROR) << "Unable to create socket";
335 return false;
336 }
337
338 /*
339 * Try to connect.
340 */
Elliott Hughes5d10a872013-04-17 19:26:43 -0700341 if (connect(clientSock, &addr.addrPlain, sizeof(addr)) != 0) {
Roland Levillain15f9b272016-01-21 14:01:10 +0000342 PLOG(ERROR) << "Unable to connect to " << inet_ntoa(addr.addrInet.sin_addr) << ":"
343 << ntohs(addr.addrInet.sin_port);
Elliott Hughes5d10a872013-04-17 19:26:43 -0700344 close(clientSock);
345 clientSock = -1;
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700346 return false;
347 }
348
Roland Levillain15f9b272016-01-21 14:01:10 +0000349 LOG(INFO) << "Connection established to " << options->host << " ("
350 << inet_ntoa(addr.addrInet.sin_addr) << ":" << ntohs(addr.addrInet.sin_port) << ")";
Elliott Hughes5d10a872013-04-17 19:26:43 -0700351 SetAwaitingHandshake(true);
352 input_count_ = 0;
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700353
Elliott Hughes5d10a872013-04-17 19:26:43 -0700354 SetNoDelay(clientSock);
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700355
Elliott Hughes5d10a872013-04-17 19:26:43 -0700356 if (!MakePipe()) {
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700357 return false;
358 }
359
360 return true;
361}
362
363/*
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700364 * Process incoming data. If no data is available, this will block until
365 * some arrives.
366 *
367 * If we get a full packet, handle it.
368 *
369 * To take some of the mystery out of life, we want to reject incoming
370 * connections if we already have a debugger attached. If we don't, the
371 * debugger will just mysteriously hang until it times out. We could just
372 * close the listen socket, but there's a good chance we won't be able to
373 * bind to the same port again, which would confuse utilities.
374 *
375 * Returns "false" on error (indicating that the connection has been severed),
376 * "true" if things are still okay.
377 */
Elliott Hughes5d10a872013-04-17 19:26:43 -0700378bool JdwpSocketState::ProcessIncoming() {
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700379 int readCount;
380
Brian Carlstrom42748892013-07-18 18:04:08 -0700381 CHECK_NE(clientSock, -1);
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700382
Elliott Hughes5d10a872013-04-17 19:26:43 -0700383 if (!HaveFullPacket()) {
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700384 /* read some more, looping until we have data */
385 errno = 0;
Andreas Gampe8351aac2018-09-10 12:37:49 -0700386 while (true) {
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700387 int selCount;
388 fd_set readfds;
Elliott Hughes5d10a872013-04-17 19:26:43 -0700389 int maxfd = -1;
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700390 int fd;
391
Elliott Hughes5d10a872013-04-17 19:26:43 -0700392 FD_ZERO(&readfds);
393
394 /* configure fds; note these may get zapped by another thread */
395 fd = listenSock;
396 if (fd >= 0) {
397 FD_SET(fd, &readfds);
398 if (maxfd < fd) {
399 maxfd = fd;
400 }
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700401 }
Elliott Hughes5d10a872013-04-17 19:26:43 -0700402 fd = clientSock;
403 if (fd >= 0) {
404 FD_SET(fd, &readfds);
405 if (maxfd < fd) {
406 maxfd = fd;
407 }
408 }
409 fd = wake_pipe_[0];
410 if (fd >= 0) {
411 FD_SET(fd, &readfds);
412 if (maxfd < fd) {
413 maxfd = fd;
414 }
415 } else {
416 LOG(INFO) << "NOTE: entering select w/o wakepipe";
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700417 }
418
419 if (maxfd < 0) {
Elliott Hughes4dd9b4d2011-12-12 18:29:24 -0800420 VLOG(jdwp) << "+++ all fds are closed";
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700421 return false;
422 }
423
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700424 /*
425 * Select blocks until it sees activity on the file descriptors.
426 * Closing the local file descriptor does not count as activity,
427 * so we can't rely on that to wake us up (it works for read()
428 * and accept(), but not select()).
429 *
430 * We can do one of three things: (1) send a signal and catch
Elliott Hughes5d10a872013-04-17 19:26:43 -0700431 * EINTR, (2) open an additional fd ("wake pipe") and write to
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700432 * it when it's time to exit, or (3) time out periodically and
433 * re-issue the select. We're currently using #2, as it's more
434 * reliable than #1 and generally better than #3. Wastes two fds.
435 */
Sebastien Hertz7d955652014-10-22 10:57:10 +0200436 selCount = select(maxfd + 1, &readfds, nullptr, nullptr, nullptr);
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700437 if (selCount < 0) {
438 if (errno == EINTR) {
439 continue;
440 }
441 PLOG(ERROR) << "select failed";
442 goto fail;
443 }
444
Elliott Hughes5d10a872013-04-17 19:26:43 -0700445 if (wake_pipe_[0] >= 0 && FD_ISSET(wake_pipe_[0], &readfds)) {
446 if (listenSock >= 0) {
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700447 LOG(ERROR) << "Exit wake set, but not exiting?";
448 } else {
Brian Carlstrom4d466a82014-05-08 19:05:29 -0700449 VLOG(jdwp) << "Got wake-up signal, bailing out of select";
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700450 }
451 goto fail;
452 }
Elliott Hughes5d10a872013-04-17 19:26:43 -0700453 if (listenSock >= 0 && FD_ISSET(listenSock, &readfds)) {
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700454 LOG(INFO) << "Ignoring second debugger -- accepting and dropping";
455 union {
Elliott Hughes7b9d9962012-04-20 18:48:18 -0700456 sockaddr_in addrInet;
457 sockaddr addrPlain;
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700458 } addr;
459 socklen_t addrlen;
460 int tmpSock;
Elliott Hughes5d10a872013-04-17 19:26:43 -0700461 tmpSock = accept(listenSock, &addr.addrPlain, &addrlen);
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700462 if (tmpSock < 0) {
463 LOG(INFO) << "Weird -- accept failed";
464 } else {
465 close(tmpSock);
466 }
467 }
Elliott Hughes5d10a872013-04-17 19:26:43 -0700468 if (clientSock >= 0 && FD_ISSET(clientSock, &readfds)) {
Roland Levillain15f9b272016-01-21 14:01:10 +0000469 readCount =
470 read(clientSock, input_buffer_ + input_count_, sizeof(input_buffer_) - input_count_);
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700471 if (readCount < 0) {
472 /* read failed */
473 if (errno != EINTR) {
474 goto fail;
475 }
Brian Carlstrom4d466a82014-05-08 19:05:29 -0700476 VLOG(jdwp) << "+++ EINTR hit";
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700477 return true;
478 } else if (readCount == 0) {
479 /* EOF hit -- far end went away */
Elliott Hughes68a5e3c2013-04-17 17:13:35 -0700480 VLOG(jdwp) << "+++ peer disconnected";
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700481 goto fail;
482 } else {
483 break;
484 }
485 }
486 }
487
Elliott Hughes5d10a872013-04-17 19:26:43 -0700488 input_count_ += readCount;
489 if (!HaveFullPacket()) {
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700490 return true; /* still not there yet */
491 }
492 }
493
494 /*
495 * Special-case the initial handshake. For some bizarre reason we're
496 * expected to emulate bad tty settings by echoing the request back
497 * exactly as it was sent. Note the handshake is always initiated by
498 * the debugger, no matter who connects to whom.
499 *
500 * Other than this one case, the protocol [claims to be] stateless.
501 */
Elliott Hughes5d10a872013-04-17 19:26:43 -0700502 if (IsAwaitingHandshake()) {
503 if (memcmp(input_buffer_, kMagicHandshake, kMagicHandshakeLen) != 0) {
Andreas Gampe46ee31b2016-12-14 10:11:49 -0800504 LOG(ERROR) << android::base::StringPrintf("ERROR: bad handshake '%.14s'", input_buffer_);
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700505 goto fail;
506 }
507
508 errno = 0;
Elliott Hughes5d10a872013-04-17 19:26:43 -0700509 int cc = TEMP_FAILURE_RETRY(write(clientSock, input_buffer_, kMagicHandshakeLen));
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700510 if (cc != kMagicHandshakeLen) {
Roland Levillain15f9b272016-01-21 14:01:10 +0000511 PLOG(ERROR) << "Failed writing handshake bytes ("
512 << cc << " of " << kMagicHandshakeLen << ")";
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700513 goto fail;
514 }
515
Elliott Hughes5d10a872013-04-17 19:26:43 -0700516 ConsumeBytes(kMagicHandshakeLen);
517 SetAwaitingHandshake(false);
Elliott Hughes4dd9b4d2011-12-12 18:29:24 -0800518 VLOG(jdwp) << "+++ handshake complete";
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700519 return true;
520 }
521
522 /*
523 * Handle this packet.
524 */
Elliott Hughes5d10a872013-04-17 19:26:43 -0700525 return state_->HandlePacket();
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700526
Elliott Hughesa21039c2012-06-21 12:09:25 -0700527 fail:
Elliott Hughes5d10a872013-04-17 19:26:43 -0700528 Close();
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700529 return false;
530}
531
Elliott Hughes872d4ec2011-10-21 17:07:15 -0700532} // namespace JDWP
533
534} // namespace art