1/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 *      http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <arpa/inet.h>
18#include <errno.h>
19#include <netdb.h>
20#include <netinet/in.h>
21#include <netinet/tcp.h>
22#include <stdio.h>
23#include <stdlib.h>
24#include <string.h>
25#include <sys/socket.h>
26#include <sys/types.h>
27#include <unistd.h>
28
29#include "base/logging.h"
30#include "base/stringprintf.h"
31#include "jdwp/jdwp_priv.h"
32
33namespace art {
34
35namespace JDWP {
36
37static constexpr uint16_t kBasePort = 8000;
38static constexpr uint16_t kMaxPort = 8040;
39
40/*
41 * JDWP network state.
42 *
43 * We only talk to one debugger at a time.
44 */
45struct JdwpSocketState : public JdwpNetStateBase {
46  uint16_t listenPort;
47  int     listenSock;         /* listen for connection from debugger */
48
49  explicit JdwpSocketState(JdwpState* state)
50      : JdwpNetStateBase(state),
51        listenPort(0U),
52        listenSock(-1),
53        remote_port_(0U) {
54  }
55
56  virtual bool Accept();
57  virtual bool Establish(const JdwpOptions*);
58  virtual void Shutdown();
59  virtual bool ProcessIncoming();
60
61 private:
62  in_addr remote_addr_;
63  uint16_t remote_port_;
64};
65
66static JdwpSocketState* SocketStartup(JdwpState* state, uint16_t port, bool probe);
67
68/*
69 * Set up some stuff for transport=dt_socket.
70 */
71bool InitSocketTransport(JdwpState* state, const JdwpOptions* options) {
72  uint16_t port = options->port;
73
74  if (options->server) {
75    if (options->port != 0) {
76      /* try only the specified port */
77      state->netState = SocketStartup(state, port, false);
78    } else {
79      /* scan through a range of ports, binding to the first available */
80      for (port = kBasePort; port <= kMaxPort; port++) {
81        state->netState = SocketStartup(state, port, true);
82        if (state->netState != nullptr) {
83          break;
84        }
85      }
86    }
87    if (state->netState == nullptr) {
88      LOG(ERROR) << "JDWP net startup failed (req port=" << options->port << ")";
89      return false;
90    }
91  } else {
92    state->netState = SocketStartup(state, 0, false);
93  }
94
95  if (options->suspend) {
96    LOG(INFO) << "JDWP will wait for debugger on port " << port;
97  } else {
98    LOG(INFO) << "JDWP will " << (options->server ? "listen" : "connect") << " on port " << port;
99  }
100
101  return true;
102}
103
104/*
105 * Initialize JDWP stuff.
106 *
107 * Allocates a new state structure.  If "port" is non-zero, this also
108 * tries to bind to a listen port.  If "port" is zero, we assume
109 * we're preparing for an outbound connection, and return without binding
110 * to anything.
111 *
112 * This may be called several times if we're probing for a port.
113 *
114 * Returns 0 on success.
115 */
116static JdwpSocketState* SocketStartup(JdwpState* state, uint16_t port, bool probe) {
117  JdwpSocketState* netState = new JdwpSocketState(state);
118  if (port == 0) {
119    return netState;
120  }
121
122  netState->listenSock = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP);
123  if (netState->listenSock < 0) {
124    PLOG(probe ? ERROR : FATAL) << "Socket create failed";
125    goto fail;
126  }
127
128  /* allow immediate re-use */
129  {
130    int one = 1;
131    if (setsockopt(netState->listenSock, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one)) < 0) {
132      PLOG(probe ? ERROR : FATAL) << "setsockopt(SO_REUSEADDR) failed";
133      goto fail;
134    }
135  }
136
137  union {
138    sockaddr_in  addrInet;
139    sockaddr     addrPlain;
140  } addr;
141  addr.addrInet.sin_family = AF_INET;
142  addr.addrInet.sin_port = htons(port);
143  inet_aton("127.0.0.1", &addr.addrInet.sin_addr);
144
145  if (bind(netState->listenSock, &addr.addrPlain, sizeof(addr)) != 0) {
146    PLOG(probe ? ERROR : FATAL) << "Attempt to bind to port " << port << " failed";
147    goto fail;
148  }
149
150  netState->listenPort = port;
151
152  if (listen(netState->listenSock, 5) != 0) {
153    PLOG(probe ? ERROR : FATAL) << "Listen failed";
154    goto fail;
155  }
156
157  return netState;
158
159 fail:
160  netState->Shutdown();
161  delete netState;
162  return nullptr;
163}
164
165/*
166 * Shut down JDWP listener.  Don't free state.
167 *
168 * This may be called from a non-JDWP thread as part of shutting the
169 * JDWP thread down.
170 *
171 * (This is currently called several times during startup as we probe
172 * for an open port.)
173 */
174void JdwpSocketState::Shutdown() {
175  int local_listenSock = this->listenSock;
176  int local_clientSock = this->clientSock;
177
178  /* clear these out so it doesn't wake up and try to reuse them */
179  this->listenSock = this->clientSock = -1;
180
181  /* "shutdown" dislodges blocking read() and accept() calls */
182  if (local_listenSock != -1) {
183    shutdown(local_listenSock, SHUT_RDWR);
184    close(local_listenSock);
185  }
186  if (local_clientSock != -1) {
187    shutdown(local_clientSock, SHUT_RDWR);
188    close(local_clientSock);
189  }
190
191  WakePipe();
192}
193
194/*
195 * Disable the TCP Nagle algorithm, which delays transmission of outbound
196 * packets until the previous transmissions have been acked.  JDWP does a
197 * lot of back-and-forth with small packets, so this may help.
198 */
199static int SetNoDelay(int fd) {
200  int on = 1;
201  int cc = setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &on, sizeof(on));
202  CHECK_EQ(cc, 0);
203  return cc;
204}
205
206/*
207 * Accept a connection.  This will block waiting for somebody to show up.
208 * If that's not desirable, use checkConnection() to make sure something
209 * is pending.
210 */
211bool JdwpSocketState::Accept() {
212  union {
213    sockaddr_in  addrInet;
214    sockaddr     addrPlain;
215  } addr;
216  socklen_t addrlen;
217  int sock;
218
219  if (listenSock < 0) {
220    return false;       /* you're not listening! */
221  }
222
223  CHECK_EQ(clientSock, -1);      /* must not already be talking */
224
225  addrlen = sizeof(addr);
226  do {
227    sock = accept(listenSock, &addr.addrPlain, &addrlen);
228    if (sock < 0 && errno != EINTR) {
229      // When we call shutdown() on the socket, accept() returns with
230      // EINVAL.  Don't gripe about it.
231      if (errno == EINVAL) {
232        if (VLOG_IS_ON(jdwp)) {
233          PLOG(ERROR) << "accept failed";
234        }
235      } else {
236        PLOG(ERROR) << "accept failed";
237        return false;
238      }
239    }
240  } while (sock < 0);
241
242  remote_addr_ = addr.addrInet.sin_addr;
243  remote_port_ = ntohs(addr.addrInet.sin_port);
244  VLOG(jdwp) << "+++ accepted connection from " << inet_ntoa(remote_addr_) << ":" << remote_port_;
245
246  clientSock = sock;
247  SetAwaitingHandshake(true);
248  input_count_ = 0;
249
250  VLOG(jdwp) << "Setting TCP_NODELAY on accepted socket";
251  SetNoDelay(clientSock);
252
253  if (!MakePipe()) {
254    return false;
255  }
256
257  return true;
258}
259
260/*
261 * Create a connection to a waiting debugger.
262 */
263bool JdwpSocketState::Establish(const JdwpOptions* options) {
264  union {
265    sockaddr_in  addrInet;
266    sockaddr     addrPlain;
267  } addr;
268  hostent* pEntry;
269
270  CHECK(!options->server);
271  CHECK(!options->host.empty());
272  CHECK_NE(options->port, 0);
273
274  /*
275   * Start by resolving the host name.
276   */
277#if defined(__linux__)
278  // Initial size of the work buffer used in gethostbyname_r.
279  //
280  // The call to gethostbyname_r below requires a user-allocated buffer,
281  // the size of which depends on the system. The initial implementation
282  // used to use a 128-byte buffer, but that was not enough on some
283  // systems (maybe because of IPv6), causing failures in JDWP host
284  // testing; thus it was increased to 256.
285  //
286  // However, we should not use a fixed size: gethostbyname_r's
287  // documentation states that if the work buffer is too small (i.e. if
288  // gethostbyname_r returns `ERANGE`), then the function should be
289  // called again with a bigger buffer. Which we do now, starting with
290  // an initial 256-byte buffer, and doubling it until gethostbyname_r
291  // accepts this size.
292  static constexpr size_t kInitialAuxBufSize = 256;
293
294  std::vector<char> auxBuf(kInitialAuxBufSize);
295  hostent he;
296  int error;
297  int cc;
298  while ((cc = gethostbyname_r(
299             options->host.c_str(), &he, auxBuf.data(), auxBuf.size(), &pEntry, &error))
300         == ERANGE) {
301    // The work buffer `auxBuf` is too small; enlarge it.
302    auxBuf.resize(auxBuf.size() * 2);
303  }
304  if (cc != 0 || pEntry == nullptr) {
305    LOG(WARNING) << "gethostbyname_r('" << options->host << "') failed: " << hstrerror(error);
306    return false;
307  }
308#else
309  h_errno = 0;
310  pEntry = gethostbyname(options->host.c_str());
311  if (pEntry == nullptr) {
312    PLOG(WARNING) << "gethostbyname('" << options->host << "') failed";
313    return false;
314  }
315#endif
316
317  /* copy it out ASAP to minimize risk of multithreaded annoyances */
318  memcpy(&addr.addrInet.sin_addr, pEntry->h_addr, pEntry->h_length);
319  addr.addrInet.sin_family = pEntry->h_addrtype;
320
321  addr.addrInet.sin_port = htons(options->port);
322
323  LOG(INFO) << "Connecting out to " << inet_ntoa(addr.addrInet.sin_addr) << ":"
324            << ntohs(addr.addrInet.sin_port);
325
326  /*
327   * Create a socket.
328   */
329  clientSock = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP);
330  if (clientSock < 0) {
331    PLOG(ERROR) << "Unable to create socket";
332    return false;
333  }
334
335  /*
336   * Try to connect.
337   */
338  if (connect(clientSock, &addr.addrPlain, sizeof(addr)) != 0) {
339    PLOG(ERROR) << "Unable to connect to " << inet_ntoa(addr.addrInet.sin_addr) << ":"
340                << ntohs(addr.addrInet.sin_port);
341    close(clientSock);
342    clientSock = -1;
343    return false;
344  }
345
346  LOG(INFO) << "Connection established to " << options->host << " ("
347            << inet_ntoa(addr.addrInet.sin_addr) << ":" << ntohs(addr.addrInet.sin_port) << ")";
348  SetAwaitingHandshake(true);
349  input_count_ = 0;
350
351  SetNoDelay(clientSock);
352
353  if (!MakePipe()) {
354    return false;
355  }
356
357  return true;
358}
359
360/*
361 * Process incoming data.  If no data is available, this will block until
362 * some arrives.
363 *
364 * If we get a full packet, handle it.
365 *
366 * To take some of the mystery out of life, we want to reject incoming
367 * connections if we already have a debugger attached.  If we don't, the
368 * debugger will just mysteriously hang until it times out.  We could just
369 * close the listen socket, but there's a good chance we won't be able to
370 * bind to the same port again, which would confuse utilities.
371 *
372 * Returns "false" on error (indicating that the connection has been severed),
373 * "true" if things are still okay.
374 */
375bool JdwpSocketState::ProcessIncoming() {
376  int readCount;
377
378  CHECK_NE(clientSock, -1);
379
380  if (!HaveFullPacket()) {
381    /* read some more, looping until we have data */
382    errno = 0;
383    while (1) {
384      int selCount;
385      fd_set readfds;
386      int maxfd = -1;
387      int fd;
388
389      FD_ZERO(&readfds);
390
391      /* configure fds; note these may get zapped by another thread */
392      fd = listenSock;
393      if (fd >= 0) {
394        FD_SET(fd, &readfds);
395        if (maxfd < fd) {
396          maxfd = fd;
397        }
398      }
399      fd = clientSock;
400      if (fd >= 0) {
401        FD_SET(fd, &readfds);
402        if (maxfd < fd) {
403          maxfd = fd;
404        }
405      }
406      fd = wake_pipe_[0];
407      if (fd >= 0) {
408        FD_SET(fd, &readfds);
409        if (maxfd < fd) {
410          maxfd = fd;
411        }
412      } else {
413        LOG(INFO) << "NOTE: entering select w/o wakepipe";
414      }
415
416      if (maxfd < 0) {
417        VLOG(jdwp) << "+++ all fds are closed";
418        return false;
419      }
420
421      /*
422       * Select blocks until it sees activity on the file descriptors.
423       * Closing the local file descriptor does not count as activity,
424       * so we can't rely on that to wake us up (it works for read()
425       * and accept(), but not select()).
426       *
427       * We can do one of three things: (1) send a signal and catch
428       * EINTR, (2) open an additional fd ("wake pipe") and write to
429       * it when it's time to exit, or (3) time out periodically and
430       * re-issue the select.  We're currently using #2, as it's more
431       * reliable than #1 and generally better than #3.  Wastes two fds.
432       */
433      selCount = select(maxfd + 1, &readfds, nullptr, nullptr, nullptr);
434      if (selCount < 0) {
435        if (errno == EINTR) {
436          continue;
437        }
438        PLOG(ERROR) << "select failed";
439        goto fail;
440      }
441
442      if (wake_pipe_[0] >= 0 && FD_ISSET(wake_pipe_[0], &readfds)) {
443        if (listenSock >= 0) {
444          LOG(ERROR) << "Exit wake set, but not exiting?";
445        } else {
446          VLOG(jdwp) << "Got wake-up signal, bailing out of select";
447        }
448        goto fail;
449      }
450      if (listenSock >= 0 && FD_ISSET(listenSock, &readfds)) {
451        LOG(INFO) << "Ignoring second debugger -- accepting and dropping";
452        union {
453          sockaddr_in   addrInet;
454          sockaddr      addrPlain;
455        } addr;
456        socklen_t addrlen;
457        int tmpSock;
458        tmpSock = accept(listenSock, &addr.addrPlain, &addrlen);
459        if (tmpSock < 0) {
460          LOG(INFO) << "Weird -- accept failed";
461        } else {
462          close(tmpSock);
463        }
464      }
465      if (clientSock >= 0 && FD_ISSET(clientSock, &readfds)) {
466        readCount =
467            read(clientSock, input_buffer_ + input_count_, sizeof(input_buffer_) - input_count_);
468        if (readCount < 0) {
469          /* read failed */
470          if (errno != EINTR) {
471            goto fail;
472          }
473          VLOG(jdwp) << "+++ EINTR hit";
474          return true;
475        } else if (readCount == 0) {
476          /* EOF hit -- far end went away */
477          VLOG(jdwp) << "+++ peer disconnected";
478          goto fail;
479        } else {
480          break;
481        }
482      }
483    }
484
485    input_count_ += readCount;
486    if (!HaveFullPacket()) {
487      return true;        /* still not there yet */
488    }
489  }
490
491  /*
492   * Special-case the initial handshake.  For some bizarre reason we're
493   * expected to emulate bad tty settings by echoing the request back
494   * exactly as it was sent.  Note the handshake is always initiated by
495   * the debugger, no matter who connects to whom.
496   *
497   * Other than this one case, the protocol [claims to be] stateless.
498   */
499  if (IsAwaitingHandshake()) {
500    if (memcmp(input_buffer_, kMagicHandshake, kMagicHandshakeLen) != 0) {
501      LOG(ERROR) << StringPrintf("ERROR: bad handshake '%.14s'", input_buffer_);
502      goto fail;
503    }
504
505    errno = 0;
506    int cc = TEMP_FAILURE_RETRY(write(clientSock, input_buffer_, kMagicHandshakeLen));
507    if (cc != kMagicHandshakeLen) {
508      PLOG(ERROR) << "Failed writing handshake bytes ("
509                  << cc << " of " << kMagicHandshakeLen << ")";
510      goto fail;
511    }
512
513    ConsumeBytes(kMagicHandshakeLen);
514    SetAwaitingHandshake(false);
515    VLOG(jdwp) << "+++ handshake complete";
516    return true;
517  }
518
519  /*
520   * Handle this packet.
521   */
522  return state_->HandlePacket();
523
524 fail:
525  Close();
526  return false;
527}
528
529}  // namespace JDWP
530
531}  // namespace art
532