|  | /* | 
|  | * Copyright (C) 2015 The Android Open Source Project | 
|  | * | 
|  | * Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | * you may not use this file except in compliance with the License. | 
|  | * You may obtain a copy of the License at | 
|  | * | 
|  | *      http://www.apache.org/licenses/LICENSE-2.0 | 
|  | * | 
|  | * Unless required by applicable law or agreed to in writing, software | 
|  | * distributed under the License is distributed on an "AS IS" BASIS, | 
|  | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | * See the License for the specific language governing permissions and | 
|  | * limitations under the License. | 
|  | */ | 
|  |  | 
|  | #if !ADB_HOST | 
|  |  | 
|  | #define TRACE_TAG JDWP | 
|  |  | 
|  | #include "sysdeps.h" | 
|  |  | 
|  | #include <errno.h> | 
|  | #include <stdio.h> | 
|  | #include <stdlib.h> | 
|  | #include <string.h> | 
|  | #include <sys/socket.h> | 
|  | #include <sys/un.h> | 
|  | #include <unistd.h> | 
|  |  | 
|  | #include <list> | 
|  | #include <memory> | 
|  | #include <vector> | 
|  |  | 
|  | #include "adb.h" | 
|  | #include "adb_io.h" | 
|  | #include "adb_unique_fd.h" | 
|  | #include "adb_utils.h" | 
|  |  | 
|  | /* here's how these things work. | 
|  |  | 
|  | when adbd starts, it creates a unix server socket | 
|  | named @jdwp-control (@ is a shortcut for "first byte is zero" | 
|  | to use the private namespace instead of the file system) | 
|  |  | 
|  | when a new JDWP daemon thread starts in a new VM process, it creates | 
|  | a connection to @jdwp-control to announce its availability. | 
|  |  | 
|  |  | 
|  | JDWP thread                             @jdwp-control | 
|  | |                                         | | 
|  | |------------------------------->         | | 
|  | | hello I'm in process <pid>              | | 
|  | |                                         | | 
|  | |                                         | | 
|  |  | 
|  | the connection is kept alive. it will be closed automatically if | 
|  | the JDWP process terminates (this allows adbd to detect dead | 
|  | processes). | 
|  |  | 
|  | adbd thus maintains a list of "active" JDWP processes. it can send | 
|  | its content to clients through the "device:debug-ports" service, | 
|  | or even updates through the "device:track-debug-ports" service. | 
|  |  | 
|  | when a debugger wants to connect, it simply runs the command | 
|  | equivalent to  "adb forward tcp:<hostport> jdwp:<pid>" | 
|  |  | 
|  | "jdwp:<pid>" is a new forward destination format used to target | 
|  | a given JDWP process on the device. when sutch a request arrives, | 
|  | adbd does the following: | 
|  |  | 
|  | - first, it calls socketpair() to create a pair of equivalent | 
|  | sockets. | 
|  |  | 
|  | - it attaches the first socket in the pair to a local socket | 
|  | which is itself attached to the transport's remote socket: | 
|  |  | 
|  |  | 
|  | - it sends the file descriptor of the second socket directly | 
|  | to the JDWP process with the help of sendmsg() | 
|  |  | 
|  |  | 
|  | JDWP thread                             @jdwp-control | 
|  | |                                         | | 
|  | |                  <----------------------| | 
|  | |           OK, try this file descriptor  | | 
|  | |                                         | | 
|  | |                                         | | 
|  |  | 
|  | then, the JDWP thread uses this new socket descriptor as its | 
|  | pass-through connection to the debugger (and receives the | 
|  | JDWP-Handshake message, answers to it, etc...) | 
|  |  | 
|  | this gives the following graphics: | 
|  | ____________________________________ | 
|  | |                                    | | 
|  | |          ADB Server (host)         | | 
|  | |                                    | | 
|  | Debugger <---> LocalSocket <----> RemoteSocket  | | 
|  | |                           ^^       | | 
|  | |___________________________||_______| | 
|  | || | 
|  | Transport || | 
|  | (TCP for emulator - USB for device) || | 
|  | || | 
|  | ___________________________||_______ | 
|  | |                           ||       | | 
|  | |          ADBD  (device)   ||       | | 
|  | |                           VV       | | 
|  | JDWP <======> LocalSocket <----> RemoteSocket  | | 
|  | |                                    | | 
|  | |____________________________________| | 
|  |  | 
|  | due to the way adb works, this doesn't need a special socket | 
|  | type or fancy handling of socket termination if either the debugger | 
|  | or the JDWP process closes the connection. | 
|  |  | 
|  | THIS IS THE SIMPLEST IMPLEMENTATION I COULD FIND, IF YOU HAPPEN | 
|  | TO HAVE A BETTER IDEA, LET ME KNOW - Digit | 
|  |  | 
|  | **********************************************************************/ | 
|  |  | 
|  | /** JDWP PID List Support Code | 
|  | ** for each JDWP process, we record its pid and its connected socket | 
|  | **/ | 
|  |  | 
|  | // PIDs are transmitted as 4 hex digits in ascii. | 
|  | static constexpr size_t PID_LEN = 4; | 
|  |  | 
|  | static void jdwp_process_event(int socket, unsigned events, void* _proc); | 
|  | static void jdwp_process_list_updated(void); | 
|  |  | 
|  | struct JdwpProcess; | 
|  | static std::list<std::unique_ptr<JdwpProcess>> _jdwp_list; | 
|  |  | 
|  | struct JdwpProcess { | 
|  | explicit JdwpProcess(int socket) { | 
|  | this->socket = socket; | 
|  | this->fde = fdevent_create(socket, jdwp_process_event, this); | 
|  |  | 
|  | if (!this->fde) { | 
|  | fatal("could not create fdevent for new JDWP process"); | 
|  | } | 
|  |  | 
|  | this->fde->state |= FDE_DONT_CLOSE; | 
|  |  | 
|  | /* start by waiting for the PID */ | 
|  | fdevent_add(this->fde, FDE_READ); | 
|  | } | 
|  |  | 
|  | ~JdwpProcess() { | 
|  | if (this->socket >= 0) { | 
|  | adb_shutdown(this->socket); | 
|  | adb_close(this->socket); | 
|  | this->socket = -1; | 
|  | } | 
|  |  | 
|  | if (this->fde) { | 
|  | fdevent_destroy(this->fde); | 
|  | this->fde = nullptr; | 
|  | } | 
|  |  | 
|  | out_fds.clear(); | 
|  | } | 
|  |  | 
|  | void RemoveFromList() { | 
|  | if (this->pid >= 0) { | 
|  | D("removing pid %d from jdwp process list", this->pid); | 
|  | } else { | 
|  | D("removing transient JdwpProcess from list"); | 
|  | } | 
|  |  | 
|  | auto pred = [this](const auto& proc) { return proc.get() == this; }; | 
|  | _jdwp_list.remove_if(pred); | 
|  | } | 
|  |  | 
|  | int pid = -1; | 
|  | int socket = -1; | 
|  | fdevent* fde = nullptr; | 
|  |  | 
|  | std::vector<unique_fd> out_fds; | 
|  | char in_buf[PID_LEN + 1]; | 
|  | ssize_t in_len = 0; | 
|  | }; | 
|  |  | 
|  | static size_t jdwp_process_list(char* buffer, size_t bufferlen) { | 
|  | std::string temp; | 
|  |  | 
|  | for (auto& proc : _jdwp_list) { | 
|  | /* skip transient connections */ | 
|  | if (proc->pid < 0) { | 
|  | continue; | 
|  | } | 
|  |  | 
|  | std::string next = std::to_string(proc->pid) + "\n"; | 
|  | if (temp.length() + next.length() > bufferlen) { | 
|  | D("truncating JDWP process list (max len = %zu)", bufferlen); | 
|  | break; | 
|  | } | 
|  | temp.append(next); | 
|  | } | 
|  |  | 
|  | memcpy(buffer, temp.data(), temp.length()); | 
|  | return temp.length(); | 
|  | } | 
|  |  | 
|  | static size_t jdwp_process_list_msg(char* buffer, size_t bufferlen) { | 
|  | // Message is length-prefixed with 4 hex digits in ASCII. | 
|  | static constexpr size_t header_len = 4; | 
|  | if (bufferlen < header_len) { | 
|  | fatal("invalid JDWP process list buffer size: %zu", bufferlen); | 
|  | } | 
|  |  | 
|  | char head[header_len + 1]; | 
|  | size_t len = jdwp_process_list(buffer + header_len, bufferlen - header_len); | 
|  | snprintf(head, sizeof head, "%04zx", len); | 
|  | memcpy(buffer, head, header_len); | 
|  | return len + header_len; | 
|  | } | 
|  |  | 
|  | static void jdwp_process_event(int socket, unsigned events, void* _proc) { | 
|  | JdwpProcess* proc = reinterpret_cast<JdwpProcess*>(_proc); | 
|  |  | 
|  | if (events & FDE_READ) { | 
|  | if (proc->pid < 0) { | 
|  | /* read the PID as a 4-hexchar string */ | 
|  | if (proc->in_len < 0) { | 
|  | fatal("attempting to read JDWP pid again?"); | 
|  | } | 
|  |  | 
|  | char* p = proc->in_buf + proc->in_len; | 
|  | size_t size = PID_LEN - proc->in_len; | 
|  |  | 
|  | ssize_t rc = TEMP_FAILURE_RETRY(recv(socket, p, size, 0)); | 
|  | if (rc < 0) { | 
|  | if (errno == EAGAIN) { | 
|  | return; | 
|  | } | 
|  |  | 
|  | D("failed to read jdwp pid: %s", strerror(errno)); | 
|  | goto CloseProcess; | 
|  | } | 
|  |  | 
|  | proc->in_len += rc; | 
|  | if (proc->in_len != PID_LEN) { | 
|  | return; | 
|  | } | 
|  |  | 
|  | proc->in_buf[PID_LEN] = '\0'; | 
|  | proc->in_len = -1; | 
|  |  | 
|  | if (sscanf(proc->in_buf, "%04x", &proc->pid) != 1) { | 
|  | D("could not decode JDWP %p PID number: '%s'", proc, p); | 
|  | goto CloseProcess; | 
|  | } | 
|  |  | 
|  | /* all is well, keep reading to detect connection closure */ | 
|  | D("Adding pid %d to jdwp process list", proc->pid); | 
|  | jdwp_process_list_updated(); | 
|  | } else { | 
|  | /* the pid was read, if we get there it's probably because the connection | 
|  | * was closed (e.g. the JDWP process exited or crashed) */ | 
|  | char buf[32]; | 
|  |  | 
|  | while (true) { | 
|  | int len = TEMP_FAILURE_RETRY(recv(socket, buf, sizeof(buf), 0)); | 
|  |  | 
|  | if (len == 0) { | 
|  | D("terminating JDWP %d connection: EOF", proc->pid); | 
|  | break; | 
|  | } else if (len < 0) { | 
|  | if (len < 0 && errno == EAGAIN) { | 
|  | return; | 
|  | } | 
|  |  | 
|  | D("terminating JDWP %d connection: EOF", proc->pid); | 
|  | break; | 
|  | } else { | 
|  | D("ignoring unexpected JDWP %d control socket activity (%d bytes)", proc->pid, | 
|  | len); | 
|  | } | 
|  | } | 
|  |  | 
|  | goto CloseProcess; | 
|  | } | 
|  | } | 
|  |  | 
|  | if (events & FDE_WRITE) { | 
|  | D("trying to send fd to JDWP process (count = %zu)", proc->out_fds.size()); | 
|  | if (!proc->out_fds.empty()) { | 
|  | int fd = proc->out_fds.back().get(); | 
|  | struct cmsghdr* cmsg; | 
|  | struct msghdr msg; | 
|  | struct iovec iov; | 
|  | char dummy = '!'; | 
|  | char buffer[sizeof(struct cmsghdr) + sizeof(int)]; | 
|  |  | 
|  | iov.iov_base = &dummy; | 
|  | iov.iov_len = 1; | 
|  | msg.msg_name = NULL; | 
|  | msg.msg_namelen = 0; | 
|  | msg.msg_iov = &iov; | 
|  | msg.msg_iovlen = 1; | 
|  | msg.msg_flags = 0; | 
|  | msg.msg_control = buffer; | 
|  | msg.msg_controllen = sizeof(buffer); | 
|  |  | 
|  | cmsg = CMSG_FIRSTHDR(&msg); | 
|  | cmsg->cmsg_len = msg.msg_controllen; | 
|  | cmsg->cmsg_level = SOL_SOCKET; | 
|  | cmsg->cmsg_type = SCM_RIGHTS; | 
|  | ((int*)CMSG_DATA(cmsg))[0] = fd; | 
|  |  | 
|  | if (!set_file_block_mode(proc->socket, true)) { | 
|  | VLOG(JDWP) << "failed to set blocking mode for fd " << proc->socket; | 
|  | goto CloseProcess; | 
|  | } | 
|  |  | 
|  | int ret = TEMP_FAILURE_RETRY(sendmsg(proc->socket, &msg, 0)); | 
|  | if (ret < 0) { | 
|  | D("sending new file descriptor to JDWP %d failed: %s", proc->pid, strerror(errno)); | 
|  | goto CloseProcess; | 
|  | } | 
|  |  | 
|  | adb_close(fd); | 
|  |  | 
|  | D("sent file descriptor %d to JDWP process %d", fd, proc->pid); | 
|  |  | 
|  | proc->out_fds.pop_back(); | 
|  |  | 
|  | if (!set_file_block_mode(proc->socket, false)) { | 
|  | VLOG(JDWP) << "failed to set non-blocking mode for fd " << proc->socket; | 
|  | goto CloseProcess; | 
|  | } | 
|  |  | 
|  | if (proc->out_fds.empty()) { | 
|  | fdevent_del(proc->fde, FDE_WRITE); | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | return; | 
|  |  | 
|  | CloseProcess: | 
|  | proc->RemoveFromList(); | 
|  | jdwp_process_list_updated(); | 
|  | } | 
|  |  | 
|  | int create_jdwp_connection_fd(int pid) { | 
|  | D("looking for pid %d in JDWP process list", pid); | 
|  |  | 
|  | for (auto& proc : _jdwp_list) { | 
|  | if (proc->pid == pid) { | 
|  | int fds[2]; | 
|  |  | 
|  | if (adb_socketpair(fds) < 0) { | 
|  | D("%s: socket pair creation failed: %s", __FUNCTION__, strerror(errno)); | 
|  | return -1; | 
|  | } | 
|  | D("socketpair: (%d,%d)", fds[0], fds[1]); | 
|  |  | 
|  | proc->out_fds.emplace_back(fds[1]); | 
|  | if (proc->out_fds.size() == 1) { | 
|  | fdevent_add(proc->fde, FDE_WRITE); | 
|  | } | 
|  |  | 
|  | return fds[0]; | 
|  | } | 
|  | } | 
|  | D("search failed !!"); | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | /**  VM DEBUG CONTROL SOCKET | 
|  | ** | 
|  | **  we do implement a custom asocket to receive the data | 
|  | **/ | 
|  |  | 
|  | /* name of the debug control Unix socket */ | 
|  | #define JDWP_CONTROL_NAME "\0jdwp-control" | 
|  | #define JDWP_CONTROL_NAME_LEN (sizeof(JDWP_CONTROL_NAME) - 1) | 
|  |  | 
|  | struct JdwpControl { | 
|  | int listen_socket; | 
|  | fdevent* fde; | 
|  | }; | 
|  |  | 
|  | static JdwpControl _jdwp_control; | 
|  |  | 
|  | static void jdwp_control_event(int s, unsigned events, void* user); | 
|  |  | 
|  | static int jdwp_control_init(JdwpControl* control, const char* sockname, int socknamelen) { | 
|  | sockaddr_un addr; | 
|  | socklen_t addrlen; | 
|  | int s; | 
|  | int maxpath = sizeof(addr.sun_path); | 
|  | int pathlen = socknamelen; | 
|  |  | 
|  | if (pathlen >= maxpath) { | 
|  | D("vm debug control socket name too long (%d extra chars)", pathlen + 1 - maxpath); | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | memset(&addr, 0, sizeof(addr)); | 
|  | addr.sun_family = AF_UNIX; | 
|  | memcpy(addr.sun_path, sockname, socknamelen); | 
|  |  | 
|  | s = socket(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0); | 
|  | if (s < 0) { | 
|  | D("could not create vm debug control socket. %d: %s", errno, strerror(errno)); | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | addrlen = pathlen + sizeof(addr.sun_family); | 
|  |  | 
|  | if (bind(s, reinterpret_cast<sockaddr*>(&addr), addrlen) < 0) { | 
|  | D("could not bind vm debug control socket: %d: %s", errno, strerror(errno)); | 
|  | adb_close(s); | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | if (listen(s, 4) < 0) { | 
|  | D("listen failed in jdwp control socket: %d: %s", errno, strerror(errno)); | 
|  | adb_close(s); | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | control->listen_socket = s; | 
|  |  | 
|  | control->fde = fdevent_create(s, jdwp_control_event, control); | 
|  | if (control->fde == NULL) { | 
|  | D("could not create fdevent for jdwp control socket"); | 
|  | adb_close(s); | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | /* only wait for incoming connections */ | 
|  | fdevent_add(control->fde, FDE_READ); | 
|  |  | 
|  | D("jdwp control socket started (%d)", control->listen_socket); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static void jdwp_control_event(int s, unsigned events, void* _control) { | 
|  | JdwpControl* control = (JdwpControl*)_control; | 
|  |  | 
|  | if (events & FDE_READ) { | 
|  | int s = adb_socket_accept(control->listen_socket, nullptr, nullptr); | 
|  | if (s < 0) { | 
|  | if (errno == ECONNABORTED) { | 
|  | /* oops, the JDWP process died really quick */ | 
|  | D("oops, the JDWP process died really quick"); | 
|  | return; | 
|  | } else { | 
|  | /* the socket is probably closed ? */ | 
|  | D("weird accept() failed on jdwp control socket: %s", strerror(errno)); | 
|  | return; | 
|  | } | 
|  | } | 
|  |  | 
|  | auto proc = std::make_unique<JdwpProcess>(s); | 
|  | if (!proc) { | 
|  | fatal("failed to allocate JdwpProcess"); | 
|  | } | 
|  |  | 
|  | _jdwp_list.emplace_back(std::move(proc)); | 
|  | } | 
|  | } | 
|  |  | 
|  | /** "jdwp" local service implementation | 
|  | ** this simply returns the list of known JDWP process pids | 
|  | **/ | 
|  |  | 
|  | struct JdwpSocket : public asocket { | 
|  | bool pass; | 
|  | }; | 
|  |  | 
|  | static void jdwp_socket_close(asocket* s) { | 
|  | D("LS(%d): closing jdwp socket", s->id); | 
|  |  | 
|  | if (s->peer) { | 
|  | D("LS(%d) peer->close()ing peer->id=%d peer->fd=%d", s->id, s->peer->id, s->peer->fd); | 
|  | s->peer->peer = nullptr; | 
|  | s->peer->close(s->peer); | 
|  | s->peer = nullptr; | 
|  | } | 
|  |  | 
|  | remove_socket(s); | 
|  | free(s); | 
|  | } | 
|  |  | 
|  | static int jdwp_socket_enqueue(asocket* s, apacket* p) { | 
|  | /* you can't write to this asocket */ | 
|  | D("LS(%d): JDWP socket received data?", s->id); | 
|  | put_apacket(p); | 
|  | s->peer->close(s->peer); | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | static void jdwp_socket_ready(asocket* s) { | 
|  | JdwpSocket* jdwp = (JdwpSocket*)s; | 
|  | asocket* peer = jdwp->peer; | 
|  |  | 
|  | /* on the first call, send the list of pids, | 
|  | * on the second one, close the connection | 
|  | */ | 
|  | if (!jdwp->pass) { | 
|  | apacket* p = get_apacket(); | 
|  | p->len = jdwp_process_list((char*)p->data, s->get_max_payload()); | 
|  | peer->enqueue(peer, p); | 
|  | jdwp->pass = true; | 
|  | } else { | 
|  | peer->close(peer); | 
|  | } | 
|  | } | 
|  |  | 
|  | asocket* create_jdwp_service_socket(void) { | 
|  | JdwpSocket* s = reinterpret_cast<JdwpSocket*>(calloc(sizeof(*s), 1)); | 
|  |  | 
|  | if (!s) { | 
|  | fatal("failed to allocate JdwpSocket"); | 
|  | } | 
|  |  | 
|  | install_local_socket(s); | 
|  |  | 
|  | s->ready = jdwp_socket_ready; | 
|  | s->enqueue = jdwp_socket_enqueue; | 
|  | s->close = jdwp_socket_close; | 
|  | s->pass = false; | 
|  |  | 
|  | return s; | 
|  | } | 
|  |  | 
|  | /** "track-jdwp" local service implementation | 
|  | ** this periodically sends the list of known JDWP process pids | 
|  | ** to the client... | 
|  | **/ | 
|  |  | 
|  | struct JdwpTracker : public asocket { | 
|  | bool need_initial; | 
|  | }; | 
|  |  | 
|  | static std::vector<std::unique_ptr<JdwpTracker>> _jdwp_trackers; | 
|  |  | 
|  | static void jdwp_process_list_updated(void) { | 
|  | char buffer[1024]; | 
|  | int len = jdwp_process_list_msg(buffer, sizeof(buffer)); | 
|  |  | 
|  | for (auto& t : _jdwp_trackers) { | 
|  | apacket* p = get_apacket(); | 
|  | memcpy(p->data, buffer, len); | 
|  | p->len = len; | 
|  |  | 
|  | if (t->peer) { | 
|  | // The tracker might not have been connected yet. | 
|  | t->peer->enqueue(t->peer, p); | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | static void jdwp_tracker_close(asocket* s) { | 
|  | D("LS(%d): destroying jdwp tracker service", s->id); | 
|  |  | 
|  | if (s->peer) { | 
|  | D("LS(%d) peer->close()ing peer->id=%d peer->fd=%d", s->id, s->peer->id, s->peer->fd); | 
|  | s->peer->peer = nullptr; | 
|  | s->peer->close(s->peer); | 
|  | s->peer = nullptr; | 
|  | } | 
|  |  | 
|  | remove_socket(s); | 
|  |  | 
|  | auto pred = [s](const auto& tracker) { return tracker.get() == s; }; | 
|  | std::remove_if(_jdwp_trackers.begin(), _jdwp_trackers.end(), pred); | 
|  | } | 
|  |  | 
|  | static void jdwp_tracker_ready(asocket* s) { | 
|  | JdwpTracker* t = (JdwpTracker*)s; | 
|  |  | 
|  | if (t->need_initial) { | 
|  | apacket* p = get_apacket(); | 
|  | t->need_initial = false; | 
|  | p->len = jdwp_process_list_msg((char*)p->data, s->get_max_payload()); | 
|  | s->peer->enqueue(s->peer, p); | 
|  | } | 
|  | } | 
|  |  | 
|  | static int jdwp_tracker_enqueue(asocket* s, apacket* p) { | 
|  | /* you can't write to this socket */ | 
|  | D("LS(%d): JDWP tracker received data?", s->id); | 
|  | put_apacket(p); | 
|  | s->peer->close(s->peer); | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | asocket* create_jdwp_tracker_service_socket(void) { | 
|  | auto t = std::make_unique<JdwpTracker>(); | 
|  | if (!t) { | 
|  | fatal("failed to allocate JdwpTracker"); | 
|  | } | 
|  |  | 
|  | memset(t.get(), 0, sizeof(asocket)); | 
|  |  | 
|  | install_local_socket(t.get()); | 
|  | D("LS(%d): created new jdwp tracker service", t->id); | 
|  |  | 
|  | t->ready = jdwp_tracker_ready; | 
|  | t->enqueue = jdwp_tracker_enqueue; | 
|  | t->close = jdwp_tracker_close; | 
|  | t->need_initial = true; | 
|  |  | 
|  | asocket* result = t.get(); | 
|  |  | 
|  | _jdwp_trackers.emplace_back(std::move(t)); | 
|  |  | 
|  | return result; | 
|  | } | 
|  |  | 
|  | int init_jdwp(void) { | 
|  | return jdwp_control_init(&_jdwp_control, JDWP_CONTROL_NAME, JDWP_CONTROL_NAME_LEN); | 
|  | } | 
|  |  | 
|  | #endif /* !ADB_HOST */ |