1 /***************************************************************************
2 * Copyright (C) 2005 by Dominic Rath *
3 * Dominic.Rath@gmx.de *
5 * Copyright (C) 2007,2008 Øyvind Harboe *
6 * oyvind.harboe@zylin.com *
8 * This program is free software; you can redistribute it and/or modify *
9 * it under the terms of the GNU General Public License as published by *
10 * the Free Software Foundation; either version 2 of the License, or *
11 * (at your option) any later version. *
13 * This program is distributed in the hope that it will be useful, *
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of *
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
16 * GNU General Public License for more details. *
18 * You should have received a copy of the GNU General Public License *
19 * along with this program; if not, write to the *
20 * Free Software Foundation, Inc., *
21 * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. *
22 ***************************************************************************/
27 #include "replacements.h"
29 #include "gdb_server.h"
33 #include "binarybuffer.h"
35 #include "breakpoints.h"
37 #include "target_request.h"
38 #include "configuration.h"
46 #define _DEBUG_GDB_IO_
49 extern int gdb_error(connection_t
*connection
, int retval
);
50 static unsigned short gdb_port
;
51 static const char *DIGITS
= "0123456789abcdef";
53 static void gdb_log_callback(void *priv
, const char *file
, int line
,
54 const char *function
, const char *string
);
64 /* target behaviour on gdb detach */
65 enum gdb_detach_mode detach_mode
= GDB_DETACH_RESUME
;
67 /* set if we are sending a memory map to gdb
68 * via qXfer:memory-map:read packet */
69 /* enabled by default*/
70 int gdb_use_memory_map
= 1;
71 /* enabled by default*/
72 int gdb_flash_program
= 1;
74 /* if set, data aborts cause an error to be reported in memory read packets
75 * see the code in gdb_read_memory_packet() for further explanations */
76 int gdb_report_data_abort
= 0;
78 int gdb_last_signal(target_t
*target
)
80 switch (target
->debug_reason
)
82 case DBG_REASON_DBGRQ
:
83 return 0x2; /* SIGINT */
84 case DBG_REASON_BREAKPOINT
:
85 case DBG_REASON_WATCHPOINT
:
86 case DBG_REASON_WPTANDBKPT
:
87 return 0x05; /* SIGTRAP */
88 case DBG_REASON_SINGLESTEP
:
89 return 0x05; /* SIGTRAP */
90 case DBG_REASON_NOTHALTED
:
91 return 0x0; /* no signal... shouldn't happen */
93 LOG_USER("undefined debug reason %d - target needs reset", target
->debug_reason
);
98 int check_pending(connection_t
*connection
, int timeout_s
, int *got_data
)
100 /* a non-blocking socket will block if there is 0 bytes available on the socket,
101 * but return with as many bytes as are available immediately
105 gdb_connection_t
*gdb_con
= connection
->priv
;
111 if (gdb_con
->buf_cnt
>0)
118 FD_SET(connection
->fd
, &read_fds
);
120 tv
.tv_sec
= timeout_s
;
122 if (select(connection
->fd
+ 1, &read_fds
, NULL
, NULL
, &tv
) == 0)
124 /* This can typically be because a "monitor" command took too long
125 * before printing any progress messages
129 return ERROR_GDB_TIMEOUT
;
135 *got_data
=FD_ISSET(connection
->fd
, &read_fds
)!=0;
139 int gdb_get_char(connection_t
*connection
, int* next_char
)
141 gdb_connection_t
*gdb_con
= connection
->priv
;
144 #ifdef _DEBUG_GDB_IO_
148 if (gdb_con
->buf_cnt
-- > 0)
150 *next_char
= *(gdb_con
->buf_p
++);
151 if (gdb_con
->buf_cnt
> 0)
152 connection
->input_pending
= 1;
154 connection
->input_pending
= 0;
156 #ifdef _DEBUG_GDB_IO_
157 LOG_DEBUG("returned char '%c' (0x%2.2x)", *next_char
, *next_char
);
165 retval
=check_pending(connection
, 1, NULL
);
166 if (retval
!=ERROR_OK
)
168 gdb_con
->buf_cnt
= read_socket(connection
->fd
, gdb_con
->buffer
, GDB_BUFFER_SIZE
);
169 if (gdb_con
->buf_cnt
> 0)
173 if (gdb_con
->buf_cnt
== 0)
176 return ERROR_SERVER_REMOTE_CLOSED
;
180 errno
= WSAGetLastError();
187 case WSAECONNABORTED
:
189 return ERROR_SERVER_REMOTE_CLOSED
;
192 return ERROR_SERVER_REMOTE_CLOSED
;
194 LOG_ERROR("read: %d", errno
);
205 return ERROR_SERVER_REMOTE_CLOSED
;
208 return ERROR_SERVER_REMOTE_CLOSED
;
210 LOG_ERROR("read: %s", strerror(errno
));
212 return ERROR_SERVER_REMOTE_CLOSED
;
217 #ifdef _DEBUG_GDB_IO_
218 debug_buffer
= malloc(gdb_con
->buf_cnt
+ 1);
219 memcpy(debug_buffer
, gdb_con
->buffer
, gdb_con
->buf_cnt
);
220 debug_buffer
[gdb_con
->buf_cnt
] = 0;
221 LOG_DEBUG("received '%s'", debug_buffer
);
225 gdb_con
->buf_p
= gdb_con
->buffer
;
227 *next_char
= *(gdb_con
->buf_p
++);
228 if (gdb_con
->buf_cnt
> 0)
229 connection
->input_pending
= 1;
231 connection
->input_pending
= 0;
232 #ifdef _DEBUG_GDB_IO_
233 LOG_DEBUG("returned char '%c' (0x%2.2x)", *next_char
, *next_char
);
239 int gdb_putback_char(connection_t
*connection
, int last_char
)
241 gdb_connection_t
*gdb_con
= connection
->priv
;
243 if (gdb_con
->buf_p
> gdb_con
->buffer
)
245 *(--gdb_con
->buf_p
) = last_char
;
250 LOG_ERROR("BUG: couldn't put character back");
256 /* The only way we can detect that the socket is closed is the first time
257 * we write to it, we will fail. Subsequent write operations will
258 * succeed. Shudder! */
259 int gdb_write(connection_t
*connection
, void *data
, int len
)
261 gdb_connection_t
*gdb_con
= connection
->priv
;
263 return ERROR_SERVER_REMOTE_CLOSED
;
265 if (write_socket(connection
->fd
, data
, len
) == len
)
270 return ERROR_SERVER_REMOTE_CLOSED
;
273 int gdb_put_packet_inner(connection_t
*connection
, char *buffer
, int len
)
276 unsigned char my_checksum
= 0;
277 #ifdef _DEBUG_GDB_IO_
282 gdb_connection_t
*gdb_con
= connection
->priv
;
284 for (i
= 0; i
< len
; i
++)
285 my_checksum
+= buffer
[i
];
287 #ifdef _DEBUG_GDB_IO_
289 * At this point we should have nothing in the input queue from GDB,
290 * however sometimes '-' is sent even though we've already received
291 * an ACK (+) for everything we've sent off.
296 if ((retval
=check_pending(connection
, 0, &gotdata
))!=ERROR_OK
)
300 if ((retval
= gdb_get_char(connection
, &reply
)) != ERROR_OK
)
302 LOG_WARNING("Discard unexpected char %c", reply
);
308 #ifdef _DEBUG_GDB_IO_
309 debug_buffer
= malloc(len
+ 1);
310 memcpy(debug_buffer
, buffer
, len
);
311 debug_buffer
[len
] = 0;
312 LOG_DEBUG("sending packet '$%s#%2.2x'", debug_buffer
, my_checksum
);
316 char local_buffer
[1024];
317 local_buffer
[0] = '$';
318 if (len
+4 <= sizeof(local_buffer
))
320 /* performance gain on smaller packets by only a single call to gdb_write() */
321 memcpy(local_buffer
+1, buffer
, len
++);
322 local_buffer
[len
++] = '#';
323 local_buffer
[len
++] = DIGITS
[(my_checksum
>> 4) & 0xf];
324 local_buffer
[len
++] = DIGITS
[my_checksum
& 0xf];
325 gdb_write(connection
, local_buffer
, len
);
329 /* larger packets are transmitted directly from caller supplied buffer
330 by several calls to gdb_write() to avoid dynamic allocation */
331 local_buffer
[1] = '#';
332 local_buffer
[2] = DIGITS
[(my_checksum
>> 4) & 0xf];
333 local_buffer
[3] = DIGITS
[my_checksum
& 0xf];
334 gdb_write(connection
, local_buffer
, 1);
335 gdb_write(connection
, buffer
, len
);
336 gdb_write(connection
, local_buffer
+1, 3);
339 if ((retval
= gdb_get_char(connection
, &reply
)) != ERROR_OK
)
344 else if (reply
== '-')
346 /* Stop sending output packets for now */
347 log_remove_callback(gdb_log_callback
, connection
);
348 LOG_WARNING("negative reply, retrying");
350 else if (reply
== 0x3)
353 if ((retval
= gdb_get_char(connection
, &reply
)) != ERROR_OK
)
357 else if (reply
== '-')
359 /* Stop sending output packets for now */
360 log_remove_callback(gdb_log_callback
, connection
);
361 LOG_WARNING("negative reply, retrying");
365 LOG_ERROR("unknown character 0x%2.2x in reply, dropping connection", reply
);
367 return ERROR_SERVER_REMOTE_CLOSED
;
372 LOG_ERROR("unknown character 0x%2.2x in reply, dropping connection", reply
);
374 return ERROR_SERVER_REMOTE_CLOSED
;
378 return ERROR_SERVER_REMOTE_CLOSED
;
383 int gdb_put_packet(connection_t
*connection
, char *buffer
, int len
)
385 gdb_connection_t
*gdb_con
= connection
->priv
;
387 int retval
= gdb_put_packet_inner(connection
, buffer
, len
);
392 int gdb_get_packet_inner(connection_t
*connection
, char *buffer
, int *len
)
398 unsigned char my_checksum
= 0;
399 gdb_connection_t
*gdb_con
= connection
->priv
;
405 if ((retval
= gdb_get_char(connection
, &character
)) != ERROR_OK
)
408 #ifdef _DEBUG_GDB_IO_
409 LOG_DEBUG("character: '%c'", character
);
417 /* gdb sends a dummy ack '+' at every remote connect - see remote_start_remote (remote.c)
418 * incase anyone tries to debug why they receive this warning every time */
419 LOG_WARNING("acknowledgment received, but no packet pending");
422 LOG_WARNING("negative acknowledgment, but no packet pending");
429 LOG_WARNING("ignoring character 0x%x", character
);
432 } while (character
!= '$');
437 gdb_connection_t
*gdb_con
= connection
->priv
;
440 /* The common case is that we have an entire packet with no escape chars.
441 * We need to leave at least 2 bytes in the buffer to have
442 * gdb_get_char() update various bits and bobs correctly.
444 if ((gdb_con
->buf_cnt
> 2) && ((gdb_con
->buf_cnt
+count
) < *len
))
446 /* The compiler will struggle a bit with constant propagation and
447 * aliasing, so we help it by showing that these values do not
448 * change inside the loop
451 char *buf
= gdb_con
->buf_p
;
452 int run
= gdb_con
->buf_cnt
- 2;
459 if (character
== '#')
461 /* Danger! character can be '#' when esc is
462 * used so we need an explicit boolean for done here.
468 if (character
== '}')
470 /* data transmitted in binary mode (X packet)
471 * uses 0x7d as escape character */
472 my_checksum
+= character
& 0xff;
475 my_checksum
+= character
& 0xff;
476 buffer
[count
++] = (character
^ 0x20) & 0xff;
479 my_checksum
+= character
& 0xff;
480 buffer
[count
++] = character
& 0xff;
484 gdb_con
->buf_cnt
-= i
;
490 LOG_ERROR("packet buffer too small");
491 return ERROR_GDB_BUFFER_TOO_SMALL
;
494 if ((retval
= gdb_get_char(connection
, &character
)) != ERROR_OK
)
497 if (character
== '#')
500 if (character
== '}')
502 /* data transmitted in binary mode (X packet)
503 * uses 0x7d as escape character */
504 my_checksum
+= character
& 0xff;
505 if ((retval
= gdb_get_char(connection
, &character
)) != ERROR_OK
)
507 my_checksum
+= character
& 0xff;
508 buffer
[count
++] = (character
^ 0x20) & 0xff;
512 my_checksum
+= character
& 0xff;
513 buffer
[count
++] = character
& 0xff;
520 if ((retval
= gdb_get_char(connection
, &character
)) != ERROR_OK
)
522 checksum
[0] = character
;
523 if ((retval
= gdb_get_char(connection
, &character
)) != ERROR_OK
)
525 checksum
[1] = character
;
528 if (my_checksum
== strtoul(checksum
, NULL
, 16))
530 gdb_write(connection
, "+", 1);
534 LOG_WARNING("checksum error, requesting retransmission");
535 gdb_write(connection
, "-", 1);
538 return ERROR_SERVER_REMOTE_CLOSED
;
543 int gdb_get_packet(connection_t
*connection
, char *buffer
, int *len
)
545 gdb_connection_t
*gdb_con
= connection
->priv
;
547 int retval
= gdb_get_packet_inner(connection
, buffer
, len
);
552 int gdb_output_con(connection_t
*connection
, const char* line
)
557 bin_size
= strlen(line
);
559 hex_buffer
= malloc(bin_size
*2 + 2);
560 if (hex_buffer
== NULL
)
561 return ERROR_GDB_BUFFER_TOO_SMALL
;
564 for (i
=0; i
<bin_size
; i
++)
565 snprintf(hex_buffer
+ 1 + i
*2, 3, "%2.2x", line
[i
]);
566 hex_buffer
[bin_size
*2+1] = 0;
568 gdb_put_packet(connection
, hex_buffer
, bin_size
*2 + 1);
574 int gdb_output(struct command_context_s
*context
, const char* line
)
576 /* this will be dumped to the log and also sent as an O packet if possible */
577 LOG_USER_N("%s", line
);
581 int gdb_program_handler(struct target_s
*target
, enum target_event event
, void *priv
)
583 struct command_context_s
*cmd_ctx
= priv
;
585 target_invoke_script(cmd_ctx
, target
, "gdb_program");
586 jtag_execute_queue();
591 int gdb_target_callback_event_handler(struct target_s
*target
, enum target_event event
, void *priv
)
593 connection_t
*connection
= priv
;
594 gdb_connection_t
*gdb_connection
= connection
->priv
;
600 case TARGET_EVENT_HALTED
:
601 /* In the GDB protocol when we are stepping or coninuing execution,
602 * we have a lingering reply. Upon receiving a halted event
603 * when we have that lingering packet, we reply to the original
604 * step or continue packet.
606 * Executing monitor commands can bring the target in and
607 * out of the running state so we'll see lots of TARGET_EVENT_XXX
608 * that are to be ignored.
610 if (gdb_connection
->frontend_state
== TARGET_RUNNING
)
612 /* stop forwarding log packets! */
613 log_remove_callback(gdb_log_callback
, connection
);
615 if (gdb_connection
->ctrl_c
)
618 gdb_connection
->ctrl_c
= 0;
622 signal
= gdb_last_signal(target
);
625 snprintf(sig_reply
, 4, "T%2.2x", signal
);
626 gdb_put_packet(connection
, sig_reply
, 3);
627 gdb_connection
->frontend_state
= TARGET_HALTED
;
630 case TARGET_EVENT_GDB_PROGRAM
:
631 gdb_program_handler(target
, event
, connection
->cmd_ctx
);
641 int gdb_new_connection(connection_t
*connection
)
643 gdb_connection_t
*gdb_connection
= malloc(sizeof(gdb_connection_t
));
644 gdb_service_t
*gdb_service
= connection
->service
->priv
;
648 connection
->priv
= gdb_connection
;
650 /* initialize gdb connection information */
651 gdb_connection
->buf_p
= gdb_connection
->buffer
;
652 gdb_connection
->buf_cnt
= 0;
653 gdb_connection
->ctrl_c
= 0;
654 gdb_connection
->frontend_state
= TARGET_HALTED
;
655 gdb_connection
->vflash_image
= NULL
;
656 gdb_connection
->closed
= 0;
657 gdb_connection
->busy
= 0;
659 /* send ACK to GDB for debug request */
660 gdb_write(connection
, "+", 1);
662 /* output goes through gdb connection */
663 command_set_output_handler(connection
->cmd_ctx
, gdb_output
, connection
);
665 /* register callback to be informed about target events */
666 target_register_event_callback(gdb_target_callback_event_handler
, connection
);
668 /* a gdb session just attached, try to put the target in halt mode.
672 * If the halt fails(e.g. target needs a reset, JTAG communication not
673 * working, etc.), then the GDB connect will succeed as
674 * the get_gdb_reg_list() will lie and return a register list with
677 * This allows GDB monitor commands to be run from a GDB init script to
678 * initialize the target
680 * Also, since the halt() is asynchronous target connect will be
681 * instantaneous and thus avoiding annoying timeout problems during
684 target_halt(gdb_service
->target
);
685 /* FIX!!!! could extended-remote work better here?
687 * wait a tiny bit for halted state or we just continue. The
688 * GDB register packet will then contain garbage
690 target_wait_state(gdb_service
->target
, TARGET_HALTED
, 500);
692 /* remove the initial ACK from the incoming buffer */
693 if ((retval
= gdb_get_char(connection
, &initial_ack
)) != ERROR_OK
)
696 /* FIX!!!??? would we actually ever receive a + here???
699 if (initial_ack
!= '+')
700 gdb_putback_char(connection
, initial_ack
);
705 int gdb_connection_closed(connection_t
*connection
)
707 gdb_service_t
*gdb_service
= connection
->service
->priv
;
708 gdb_connection_t
*gdb_connection
= connection
->priv
;
710 /* see if an image built with vFlash commands is left */
711 if (gdb_connection
->vflash_image
)
713 image_close(gdb_connection
->vflash_image
);
714 free(gdb_connection
->vflash_image
);
715 gdb_connection
->vflash_image
= NULL
;
718 /* if this connection registered a debug-message receiver delete it */
719 delete_debug_msg_receiver(connection
->cmd_ctx
, gdb_service
->target
);
721 if (connection
->priv
)
723 free(connection
->priv
);
724 connection
->priv
= NULL
;
728 LOG_ERROR("BUG: connection->priv == NULL");
731 target_unregister_event_callback(gdb_target_callback_event_handler
, connection
);
732 log_remove_callback(gdb_log_callback
, connection
);
737 void gdb_send_error(connection_t
*connection
, u8 the_error
)
740 snprintf(err
, 4, "E%2.2X", the_error
);
741 gdb_put_packet(connection
, err
, 3);
744 int gdb_last_signal_packet(connection_t
*connection
, target_t
*target
, char* packet
, int packet_size
)
749 signal
= gdb_last_signal(target
);
751 snprintf(sig_reply
, 4, "S%2.2x", signal
);
752 gdb_put_packet(connection
, sig_reply
, 3);
757 /* Convert register to string of bits. NB! The # of bits in the
758 * register might be non-divisible by 8(a byte), in which
759 * case an entire byte is shown. */
760 void gdb_str_to_target(target_t
*target
, char *tstr
, reg_t
*reg
)
767 buf_len
= CEIL(reg
->size
, 8);
769 for (i
= 0; i
< buf_len
; i
++)
771 tstr
[i
*2] = DIGITS
[(buf
[i
]>>4) & 0xf];
772 tstr
[i
*2+1] = DIGITS
[buf
[i
]&0xf];
776 void gdb_target_to_str(target_t
*target
, char *tstr
, char *str
)
778 int str_len
= strlen(tstr
);
783 LOG_ERROR("BUG: gdb value with uneven number of characters encountered");
787 for (i
= 0; i
< str_len
; i
+=2)
789 str
[str_len
- i
- 1] = tstr
[i
+ 1];
790 str
[str_len
- i
- 2] = tstr
[i
];
794 int gdb_get_registers_packet(connection_t
*connection
, target_t
*target
, char* packet
, int packet_size
)
799 int reg_packet_size
= 0;
804 #ifdef _DEBUG_GDB_IO_
808 if ((retval
= target
->type
->get_gdb_reg_list(target
, ®_list
, ®_list_size
)) != ERROR_OK
)
810 return gdb_error(connection
, retval
);
813 for (i
= 0; i
< reg_list_size
; i
++)
815 reg_packet_size
+= reg_list
[i
]->size
;
818 reg_packet
= malloc(CEIL(reg_packet_size
, 8) * 2);
819 reg_packet_p
= reg_packet
;
821 for (i
= 0; i
< reg_list_size
; i
++)
823 gdb_str_to_target(target
, reg_packet_p
, reg_list
[i
]);
824 reg_packet_p
+= CEIL(reg_list
[i
]->size
, 8) * 2;
827 #ifdef _DEBUG_GDB_IO_
830 reg_packet_p
= strndup(reg_packet
, CEIL(reg_packet_size
, 8) * 2);
831 LOG_DEBUG("reg_packet: %s", reg_packet_p
);
836 gdb_put_packet(connection
, reg_packet
, CEIL(reg_packet_size
, 8) * 2);
844 int gdb_set_registers_packet(connection_t
*connection
, target_t
*target
, char *packet
, int packet_size
)
852 #ifdef _DEBUG_GDB_IO_
856 /* skip command character */
862 LOG_WARNING("GDB set_registers packet with uneven characters received, dropping connection");
863 return ERROR_SERVER_REMOTE_CLOSED
;
866 if ((retval
= target
->type
->get_gdb_reg_list(target
, ®_list
, ®_list_size
)) != ERROR_OK
)
868 return gdb_error(connection
, retval
);
872 for (i
= 0; i
< reg_list_size
; i
++)
876 reg_arch_type_t
*arch_type
;
878 /* convert from GDB-string (target-endian) to hex-string (big-endian) */
879 hex_buf
= malloc(CEIL(reg_list
[i
]->size
, 8) * 2);
880 gdb_target_to_str(target
, packet_p
, hex_buf
);
882 /* convert hex-string to binary buffer */
883 bin_buf
= malloc(CEIL(reg_list
[i
]->size
, 8));
884 str_to_buf(hex_buf
, CEIL(reg_list
[i
]->size
, 8) * 2, bin_buf
, reg_list
[i
]->size
, 16);
886 /* get register arch_type, and call set method */
887 arch_type
= register_get_arch_type(reg_list
[i
]->arch_type
);
888 if (arch_type
== NULL
)
890 LOG_ERROR("BUG: encountered unregistered arch type");
893 arch_type
->set(reg_list
[i
], bin_buf
);
895 /* advance packet pointer */
896 packet_p
+= (CEIL(reg_list
[i
]->size
, 8) * 2);
902 /* free reg_t *reg_list[] array allocated by get_gdb_reg_list */
905 gdb_put_packet(connection
, "OK", 2);
910 int gdb_get_register_packet(connection_t
*connection
, target_t
*target
, char *packet
, int packet_size
)
913 int reg_num
= strtoul(packet
+ 1, NULL
, 16);
918 #ifdef _DEBUG_GDB_IO_
922 if ((retval
= target
->type
->get_gdb_reg_list(target
, ®_list
, ®_list_size
)) != ERROR_OK
)
924 return gdb_error(connection
, retval
);
927 if (reg_list_size
<= reg_num
)
929 LOG_ERROR("gdb requested a non-existing register");
933 reg_packet
= malloc(CEIL(reg_list
[reg_num
]->size
, 8) * 2);
935 gdb_str_to_target(target
, reg_packet
, reg_list
[reg_num
]);
937 gdb_put_packet(connection
, reg_packet
, CEIL(reg_list
[reg_num
]->size
, 8) * 2);
945 int gdb_set_register_packet(connection_t
*connection
, target_t
*target
, char *packet
, int packet_size
)
950 int reg_num
= strtoul(packet
+ 1, &separator
, 16);
954 reg_arch_type_t
*arch_type
;
958 if ((retval
= target
->type
->get_gdb_reg_list(target
, ®_list
, ®_list_size
)) != ERROR_OK
)
960 return gdb_error(connection
, retval
);
963 if (reg_list_size
< reg_num
)
965 LOG_ERROR("gdb requested a non-existing register");
966 return ERROR_SERVER_REMOTE_CLOSED
;
969 if (*separator
!= '=')
971 LOG_ERROR("GDB 'set register packet', but no '=' following the register number");
972 return ERROR_SERVER_REMOTE_CLOSED
;
975 /* convert from GDB-string (target-endian) to hex-string (big-endian) */
976 hex_buf
= malloc(CEIL(reg_list
[reg_num
]->size
, 8) * 2);
977 gdb_target_to_str(target
, separator
+ 1, hex_buf
);
979 /* convert hex-string to binary buffer */
980 bin_buf
= malloc(CEIL(reg_list
[reg_num
]->size
, 8));
981 str_to_buf(hex_buf
, CEIL(reg_list
[reg_num
]->size
, 8) * 2, bin_buf
, reg_list
[reg_num
]->size
, 16);
983 /* get register arch_type, and call set method */
984 arch_type
= register_get_arch_type(reg_list
[reg_num
]->arch_type
);
985 if (arch_type
== NULL
)
987 LOG_ERROR("BUG: encountered unregistered arch type");
990 arch_type
->set(reg_list
[reg_num
], bin_buf
);
992 gdb_put_packet(connection
, "OK", 2);
1001 int gdb_error(connection_t
*connection
, int retval
)
1005 case ERROR_TARGET_DATA_ABORT
:
1006 gdb_send_error(connection
, EIO
);
1008 case ERROR_TARGET_TRANSLATION_FAULT
:
1009 gdb_send_error(connection
, EFAULT
);
1011 case ERROR_TARGET_UNALIGNED_ACCESS
:
1012 gdb_send_error(connection
, EFAULT
);
1014 case ERROR_TARGET_NOT_HALTED
:
1015 gdb_send_error(connection
, EFAULT
);
1018 /* This could be that the target reset itself. */
1019 LOG_ERROR("unexpected error %i", retval
);
1020 gdb_send_error(connection
, EFAULT
);
1027 /* We don't have to worry about the default 2 second timeout for GDB packets,
1028 * because GDB breaks up large memory reads into smaller reads.
1030 * 8191 bytes by the looks of it. Why 8191 bytes instead of 8192?????
1032 int gdb_read_memory_packet(connection_t
*connection
, target_t
*target
, char *packet
, int packet_size
)
1041 int retval
= ERROR_OK
;
1043 /* skip command character */
1046 addr
= strtoul(packet
, &separator
, 16);
1048 if (*separator
!= ',')
1050 LOG_ERROR("incomplete read memory packet received, dropping connection");
1051 return ERROR_SERVER_REMOTE_CLOSED
;
1054 len
= strtoul(separator
+1, NULL
, 16);
1056 buffer
= malloc(len
);
1058 LOG_DEBUG("addr: 0x%8.8x, len: 0x%8.8x", addr
, len
);
1060 retval
= target_read_buffer(target
, addr
, len
, buffer
);
1062 if ((retval
== ERROR_TARGET_DATA_ABORT
) && (!gdb_report_data_abort
))
1064 /* TODO : Here we have to lie and send back all zero's lest stack traces won't work.
1065 * At some point this might be fixed in GDB, in which case this code can be removed.
1067 * OpenOCD developers are acutely aware of this problem, but there is nothing
1068 * gained by involving the user in this problem that hopefully will get resolved
1071 * http://sourceware.org/cgi-bin/gnatsweb.pl?cmd=view%20audit-trail&database=gdb&pr=2395
1073 * For now, the default is to fix up things to make current GDB versions work.
1074 * This can be overwritten using the gdb_report_data_abort <'enable'|'disable'> command.
1076 memset(buffer
, 0, len
);
1080 if (retval
== ERROR_OK
)
1082 hex_buffer
= malloc(len
* 2 + 1);
1085 for (i
= 0; i
< len
; i
++)
1088 hex_buffer
[2 * i
] = DIGITS
[(t
>> 4) & 0xf];
1089 hex_buffer
[2 * i
+ 1] = DIGITS
[t
& 0xf];
1092 gdb_put_packet(connection
, hex_buffer
, len
* 2);
1098 retval
= gdb_error(connection
, retval
);
1106 int gdb_write_memory_packet(connection_t
*connection
, target_t
*target
, char *packet
, int packet_size
)
1117 /* skip command character */
1120 addr
= strtoul(packet
, &separator
, 16);
1122 if (*separator
!= ',')
1124 LOG_ERROR("incomplete write memory packet received, dropping connection");
1125 return ERROR_SERVER_REMOTE_CLOSED
;
1128 len
= strtoul(separator
+1, &separator
, 16);
1130 if (*(separator
++) != ':')
1132 LOG_ERROR("incomplete write memory packet received, dropping connection");
1133 return ERROR_SERVER_REMOTE_CLOSED
;
1136 buffer
= malloc(len
);
1138 LOG_DEBUG("addr: 0x%8.8x, len: 0x%8.8x", addr
, len
);
1140 for (i
=0; i
<len
; i
++)
1143 sscanf(separator
+ 2*i
, "%2x", &tmp
);
1147 retval
= target_write_buffer(target
, addr
, len
, buffer
);
1149 if (retval
== ERROR_OK
)
1151 gdb_put_packet(connection
, "OK", 2);
1155 retval
= gdb_error(connection
, retval
);
1163 int gdb_write_memory_binary_packet(connection_t
*connection
, target_t
*target
, char *packet
, int packet_size
)
1171 /* skip command character */
1174 addr
= strtoul(packet
, &separator
, 16);
1176 if (*separator
!= ',')
1178 LOG_ERROR("incomplete write memory binary packet received, dropping connection");
1179 return ERROR_SERVER_REMOTE_CLOSED
;
1182 len
= strtoul(separator
+1, &separator
, 16);
1184 if (*(separator
++) != ':')
1186 LOG_ERROR("incomplete write memory binary packet received, dropping connection");
1187 return ERROR_SERVER_REMOTE_CLOSED
;
1193 LOG_DEBUG("addr: 0x%8.8x, len: 0x%8.8x", addr
, len
);
1195 retval
= target_write_buffer(target
, addr
, len
, (u8
*)separator
);
1198 if (retval
== ERROR_OK
)
1200 gdb_put_packet(connection
, "OK", 2);
1204 if ((retval
= gdb_error(connection
, retval
)) != ERROR_OK
)
1211 void gdb_step_continue_packet(connection_t
*connection
, target_t
*target
, char *packet
, int packet_size
)
1218 if (packet_size
> 1)
1220 packet
[packet_size
] = 0;
1221 address
= strtoul(packet
+ 1, NULL
, 16);
1228 if (packet
[0] == 'c')
1230 LOG_DEBUG("continue");
1231 target_invoke_script(connection
->cmd_ctx
, target
, "pre_resume");
1232 target_resume(target
, current
, address
, 0, 0); /* resume at current address, don't handle breakpoints, not debugging */
1234 else if (packet
[0] == 's')
1237 target
->type
->step(target
, current
, address
, 0); /* step at current or address, don't handle breakpoints */
1241 int gdb_breakpoint_watchpoint_packet(connection_t
*connection
, target_t
*target
, char *packet
, int packet_size
)
1244 enum breakpoint_type bp_type
= BKPT_SOFT
/* dummy init to avoid warning */;
1245 enum watchpoint_rw wp_type
;
1253 type
= strtoul(packet
+ 1, &separator
, 16);
1255 if (type
== 0) /* memory breakpoint */
1256 bp_type
= BKPT_SOFT
;
1257 else if (type
== 1) /* hardware breakpoint */
1258 bp_type
= BKPT_HARD
;
1259 else if (type
== 2) /* write watchpoint */
1260 wp_type
= WPT_WRITE
;
1261 else if (type
== 3) /* read watchpoint */
1263 else if (type
== 4) /* access watchpoint */
1264 wp_type
= WPT_ACCESS
;
1266 if (*separator
!= ',')
1268 LOG_ERROR("incomplete breakpoint/watchpoint packet received, dropping connection");
1269 return ERROR_SERVER_REMOTE_CLOSED
;
1272 address
= strtoul(separator
+1, &separator
, 16);
1274 if (*separator
!= ',')
1276 LOG_ERROR("incomplete breakpoint/watchpoint packet received, dropping connection");
1277 return ERROR_SERVER_REMOTE_CLOSED
;
1280 size
= strtoul(separator
+1, &separator
, 16);
1286 if (packet
[0] == 'Z')
1288 if ((retval
= breakpoint_add(target
, address
, size
, bp_type
)) != ERROR_OK
)
1290 if ((retval
= gdb_error(connection
, retval
)) != ERROR_OK
)
1295 gdb_put_packet(connection
, "OK", 2);
1300 breakpoint_remove(target
, address
);
1301 gdb_put_packet(connection
, "OK", 2);
1308 if (packet
[0] == 'Z')
1310 if ((retval
= watchpoint_add(target
, address
, size
, type
-2, 0, 0xffffffffu
)) != ERROR_OK
)
1312 if ((retval
= gdb_error(connection
, retval
)) != ERROR_OK
)
1317 gdb_put_packet(connection
, "OK", 2);
1322 watchpoint_remove(target
, address
);
1323 gdb_put_packet(connection
, "OK", 2);
1334 /* print out a string and allocate more space as needed, mainly used for XML at this point */
1335 void xml_printf(int *retval
, char **xml
, int *pos
, int *size
, const char *fmt
, ...)
1337 if (*retval
!= ERROR_OK
)
1345 if ((*xml
== NULL
) || (!first
))
1347 /* start by 0 to exercise all the code paths.
1348 * Need minimum 2 bytes to fit 1 char and 0 terminator. */
1350 *size
= *size
* 2 + 2;
1352 *xml
= realloc(*xml
, *size
);
1357 *retval
= ERROR_SERVER_REMOTE_CLOSED
;
1365 ret
= vsnprintf(*xml
+ *pos
, *size
- *pos
, fmt
, ap
);
1367 if ((ret
> 0) && ((ret
+ 1) < *size
- *pos
))
1372 /* there was just enough or not enough space, allocate more. */
1377 static int decode_xfer_read(char *buf
, char **annex
, int *ofs
, unsigned int *len
)
1381 /* Extract and NUL-terminate the annex. */
1383 while (*buf
&& *buf
!= ':')
1389 /* After the read marker and annex, qXfer looks like a
1390 * traditional 'm' packet. */
1392 *ofs
= strtoul(buf
, &separator
, 16);
1394 if (*separator
!= ',')
1397 *len
= strtoul(separator
+1, NULL
, 16);
1402 int gdb_calc_blocksize(flash_bank_t
*bank
)
1405 int block_size
= 0xffffffff;
1407 /* loop through all sectors and return smallest sector size */
1409 for (i
= 0; i
< bank
->num_sectors
; i
++)
1411 if (bank
->sectors
[i
].size
< block_size
)
1412 block_size
= bank
->sectors
[i
].size
;
1418 static int compare_bank (const void * a
, const void * b
)
1420 flash_bank_t
*b1
, *b2
;
1421 b1
=*((flash_bank_t
**)a
);
1422 b2
=*((flash_bank_t
**)b
);
1424 if (b1
->base
==b2
->base
)
1427 } else if (b1
->base
>b2
->base
)
1436 int gdb_query_packet(connection_t
*connection
, target_t
*target
, char *packet
, int packet_size
)
1438 command_context_t
*cmd_ctx
= connection
->cmd_ctx
;
1440 if (strstr(packet
, "qRcmd,"))
1442 if (packet_size
> 6)
1446 cmd
= malloc((packet_size
- 6)/2 + 1);
1447 for (i
=0; i
< (packet_size
- 6)/2; i
++)
1450 sscanf(packet
+ 6 + 2*i
, "%2x", &tmp
);
1453 cmd
[(packet_size
- 6)/2] = 0x0;
1455 /* We want to print all debug output to GDB connection */
1456 log_add_callback(gdb_log_callback
, connection
);
1457 target_call_timer_callbacks_now();
1458 command_run_line(cmd_ctx
, cmd
);
1459 target_call_timer_callbacks_now();
1460 log_remove_callback(gdb_log_callback
, connection
);
1463 gdb_put_packet(connection
, "OK", 2);
1466 else if (strstr(packet
, "qCRC:"))
1468 if (packet_size
> 5)
1477 /* skip command character */
1480 addr
= strtoul(packet
, &separator
, 16);
1482 if (*separator
!= ',')
1484 LOG_ERROR("incomplete read memory packet received, dropping connection");
1485 return ERROR_SERVER_REMOTE_CLOSED
;
1488 len
= strtoul(separator
+ 1, NULL
, 16);
1490 retval
= target_checksum_memory(target
, addr
, len
, &checksum
);
1492 if (retval
== ERROR_OK
)
1494 snprintf(gdb_reply
, 10, "C%8.8x", checksum
);
1495 gdb_put_packet(connection
, gdb_reply
, 9);
1499 if ((retval
= gdb_error(connection
, retval
)) != ERROR_OK
)
1506 else if (strstr(packet
, "qSupported"))
1508 /* we currently support packet size and qXfer:memory-map:read (if enabled)
1509 * disable qXfer:features:read for the moment */
1510 int retval
= ERROR_OK
;
1511 char *buffer
= NULL
;
1515 xml_printf(&retval
, &buffer
, &pos
, &size
,
1516 "PacketSize=%x;qXfer:memory-map:read%c;qXfer:features:read-",
1517 (GDB_BUFFER_SIZE
- 1), ((gdb_use_memory_map
== 1)&&(flash_get_bank_count()>0)) ? '+' : '-');
1519 if (retval
!= ERROR_OK
)
1521 gdb_send_error(connection
, 01);
1525 gdb_put_packet(connection
, buffer
, strlen(buffer
));
1530 else if (strstr(packet
, "qXfer:memory-map:read::")&&(flash_get_bank_count()>0))
1532 /* We get away with only specifying flash here. Regions that are not
1533 * specified are treated as if we provided no memory map(if not we
1534 * could detect the holes and mark them as RAM).
1535 * Normally we only execute this code once, but no big deal if we
1536 * have to regenerate it a couple of times. */
1542 int retval
= ERROR_OK
;
1549 /* skip command character */
1552 offset
= strtoul(packet
, &separator
, 16);
1553 length
= strtoul(separator
+ 1, &separator
, 16);
1555 xml_printf(&retval
, &xml
, &pos
, &size
, "<memory-map>\n");
1558 sort banks in ascending order, we need to make non-flash memory be ram(or rather
1559 read/write) by default for GDB.
1560 GDB does not have a concept of non-cacheable read/write memory.
1562 flash_bank_t
**banks
=malloc(sizeof(flash_bank_t
*)*flash_get_bank_count());
1565 for (i
=0; i
<flash_get_bank_count(); i
++)
1567 p
= get_flash_bank_by_num(i
);
1571 retval
= ERROR_FAIL
;
1572 gdb_send_error(connection
, retval
);
1578 qsort(banks
, flash_get_bank_count(), sizeof(flash_bank_t
*), compare_bank
);
1581 for (i
=0; i
<flash_get_bank_count(); i
++)
1585 if (ram_start
<p
->base
)
1587 xml_printf(&retval
, &xml
, &pos
, &size
, "<memory type=\"ram\" start=\"0x%x\" length=\"0x%x\"/>\n",
1588 ram_start
, p
->base
-ram_start
);
1591 /* if device has uneven sector sizes, eg. str7, lpc
1592 * we pass the smallest sector size to gdb memory map */
1593 blocksize
= gdb_calc_blocksize(p
);
1595 xml_printf(&retval
, &xml
, &pos
, &size
, "<memory type=\"flash\" start=\"0x%x\" length=\"0x%x\">\n" \
1596 "<property name=\"blocksize\">0x%x</property>\n" \
1598 p
->base
, p
->size
, blocksize
);
1599 ram_start
=p
->base
+p
->size
;
1603 xml_printf(&retval
, &xml
, &pos
, &size
, "<memory type=\"ram\" start=\"0x%x\" length=\"0x%x\"/>\n",
1604 ram_start
, 0-ram_start
);
1607 /* a flash chip could be at the very end of the 32 bit address space, in which case
1608 ram_start will be precisely 0 */
1614 xml_printf(&retval
, &xml
, &pos
, &size
, "</memory-map>\n");
1616 if (retval
!= ERROR_OK
)
1618 gdb_send_error(connection
, retval
);
1622 if (offset
+ length
> pos
)
1624 length
= pos
- offset
;
1627 char *t
= malloc(length
+ 1);
1629 memcpy(t
+ 1, xml
+ offset
, length
);
1630 gdb_put_packet(connection
, t
, length
+ 1);
1636 else if (strstr(packet
, "qXfer:features:read:"))
1641 int retval
= ERROR_OK
;
1644 unsigned int length
;
1647 /* skip command character */
1650 if (decode_xfer_read(packet
, &annex
, &offset
, &length
) < 0)
1652 gdb_send_error(connection
, 01);
1656 if (strcmp(annex
, "target.xml") != 0)
1658 gdb_send_error(connection
, 01);
1662 xml_printf(&retval
, &xml
, &pos
, &size
, \
1663 "l<target version=\"1.0\">\n<architecture>arm</architecture>\n</target>\n");
1665 if (retval
!= ERROR_OK
)
1667 gdb_send_error(connection
, retval
);
1671 gdb_put_packet(connection
, xml
, strlen(xml
));
1677 gdb_put_packet(connection
, "", 0);
1681 int gdb_v_packet(connection_t
*connection
, target_t
*target
, char *packet
, int packet_size
)
1683 gdb_connection_t
*gdb_connection
= connection
->priv
;
1684 gdb_service_t
*gdb_service
= connection
->service
->priv
;
1687 /* if flash programming disabled - send a empty reply */
1689 if (gdb_flash_program
== 0)
1691 gdb_put_packet(connection
, "", 0);
1695 if (strstr(packet
, "vFlashErase:"))
1698 unsigned long length
;
1700 char *parse
= packet
+ 12;
1703 LOG_ERROR("incomplete vFlashErase packet received, dropping connection");
1704 return ERROR_SERVER_REMOTE_CLOSED
;
1707 addr
= strtoul(parse
, &parse
, 16);
1709 if (*(parse
++) != ',' || *parse
== '\0')
1711 LOG_ERROR("incomplete vFlashErase packet received, dropping connection");
1712 return ERROR_SERVER_REMOTE_CLOSED
;
1715 length
= strtoul(parse
, &parse
, 16);
1719 LOG_ERROR("incomplete vFlashErase packet received, dropping connection");
1720 return ERROR_SERVER_REMOTE_CLOSED
;
1723 /* assume all sectors need erasing - stops any problems
1724 * when flash_write is called multiple times */
1727 /* perform any target specific operations before the erase */
1728 target_call_event_callbacks(gdb_service
->target
, TARGET_EVENT_GDB_PROGRAM
);
1731 if ((result
= flash_erase_address_range(gdb_service
->target
, addr
, length
)) != ERROR_OK
)
1733 /* GDB doesn't evaluate the actual error number returned,
1734 * treat a failed erase as an I/O error
1736 gdb_send_error(connection
, EIO
);
1737 LOG_ERROR("flash_erase returned %i", result
);
1740 gdb_put_packet(connection
, "OK", 2);
1745 if (strstr(packet
, "vFlashWrite:"))
1748 unsigned long length
;
1749 char *parse
= packet
+ 12;
1753 LOG_ERROR("incomplete vFlashErase packet received, dropping connection");
1754 return ERROR_SERVER_REMOTE_CLOSED
;
1756 addr
= strtoul(parse
, &parse
, 16);
1757 if (*(parse
++) != ':')
1759 LOG_ERROR("incomplete vFlashErase packet received, dropping connection");
1760 return ERROR_SERVER_REMOTE_CLOSED
;
1762 length
= packet_size
- (parse
- packet
);
1764 /* create a new image if there isn't already one */
1765 if (gdb_connection
->vflash_image
== NULL
)
1767 gdb_connection
->vflash_image
= malloc(sizeof(image_t
));
1768 image_open(gdb_connection
->vflash_image
, "", "build");
1771 /* create new section with content from packet buffer */
1772 image_add_section(gdb_connection
->vflash_image
, addr
, length
, 0x0, (u8
*)parse
);
1774 gdb_put_packet(connection
, "OK", 2);
1779 if (!strcmp(packet
, "vFlashDone"))
1783 /* process the flashing buffer. No need to erase as GDB
1784 * always issues a vFlashErase first. */
1785 if ((result
= flash_write(gdb_service
->target
, gdb_connection
->vflash_image
, &written
, 0)) != ERROR_OK
)
1787 if (result
== ERROR_FLASH_DST_OUT_OF_BANK
)
1788 gdb_put_packet(connection
, "E.memtype", 9);
1790 gdb_send_error(connection
, EIO
);
1794 LOG_DEBUG("wrote %u bytes from vFlash image to flash", written
);
1795 gdb_put_packet(connection
, "OK", 2);
1798 image_close(gdb_connection
->vflash_image
);
1799 free(gdb_connection
->vflash_image
);
1800 gdb_connection
->vflash_image
= NULL
;
1805 gdb_put_packet(connection
, "", 0);
1809 int gdb_detach(connection_t
*connection
, target_t
*target
)
1811 switch( detach_mode
)
1813 case GDB_DETACH_RESUME
:
1814 target_invoke_script(connection
->cmd_ctx
, target
, "pre_resume");
1815 target_resume(target
, 1, 0, 1, 0);
1818 case GDB_DETACH_RESET
:
1819 /* FIX?? make this configurable?? */
1820 target_process_reset(connection
->cmd_ctx
, RESET_HALT
);
1823 case GDB_DETACH_HALT
:
1824 target_halt(target
);
1827 case GDB_DETACH_NOTHING
:
1831 gdb_put_packet(connection
, "OK", 2);
1836 static void gdb_log_callback(void *priv
, const char *file
, int line
,
1837 const char *function
, const char *string
)
1839 connection_t
*connection
= priv
;
1840 gdb_connection_t
*gdb_con
= connection
->priv
;
1844 /* do not reply this using the O packet */
1848 gdb_output_con(connection
, string
);
1851 /* Do not allocate this on the stack */
1852 char gdb_packet_buffer
[GDB_BUFFER_SIZE
];
1854 int gdb_input_inner(connection_t
*connection
)
1856 gdb_service_t
*gdb_service
= connection
->service
->priv
;
1857 target_t
*target
= gdb_service
->target
;
1858 char *packet
=gdb_packet_buffer
;
1861 gdb_connection_t
*gdb_con
= connection
->priv
;
1862 static int extended_protocol
= 0;
1864 /* drain input buffer */
1867 packet_size
= GDB_BUFFER_SIZE
-1;
1868 if ((retval
= gdb_get_packet(connection
, packet
, &packet_size
)) != ERROR_OK
)
1873 /* terminate with zero */
1874 packet
[packet_size
] = 0;
1876 LOG_DEBUG("received packet: '%s'", packet
);
1878 if (packet_size
> 0)
1884 /* Hct... -- set thread
1885 * we don't have threads, send empty reply */
1886 gdb_put_packet(connection
, NULL
, 0);
1889 retval
= gdb_query_packet(connection
, target
, packet
, packet_size
);
1892 retval
= gdb_get_registers_packet(connection
, target
, packet
, packet_size
);
1895 retval
= gdb_set_registers_packet(connection
, target
, packet
, packet_size
);
1898 retval
= gdb_get_register_packet(connection
, target
, packet
, packet_size
);
1901 retval
= gdb_set_register_packet(connection
, target
, packet
, packet_size
);
1904 retval
= gdb_read_memory_packet(connection
, target
, packet
, packet_size
);
1907 retval
= gdb_write_memory_packet(connection
, target
, packet
, packet_size
);
1911 retval
= gdb_breakpoint_watchpoint_packet(connection
, target
, packet
, packet_size
);
1914 gdb_last_signal_packet(connection
, target
, packet
, packet_size
);
1919 if (target
->state
!= TARGET_HALTED
)
1921 /* If the target isn't in the halted state, then we can't
1922 * step/continue. This might be early setup, etc.
1925 snprintf(sig_reply
, 4, "T%2.2x", 2);
1926 gdb_put_packet(connection
, sig_reply
, 3);
1929 /* We're running/stepping, in which case we can
1930 * forward log output until the target is halted
1932 gdb_connection_t
*gdb_con
= connection
->priv
;
1933 gdb_con
->frontend_state
= TARGET_RUNNING
;
1934 log_add_callback(gdb_log_callback
, connection
);
1935 gdb_step_continue_packet(connection
, target
, packet
, packet_size
);
1940 retval
= gdb_v_packet(connection
, target
, packet
, packet_size
);
1943 retval
= gdb_detach(connection
, target
);
1944 extended_protocol
= 0;
1947 if ((retval
= gdb_write_memory_binary_packet(connection
, target
, packet
, packet_size
)) != ERROR_OK
)
1951 if (extended_protocol
!= 0)
1953 gdb_put_packet(connection
, "OK", 2);
1954 return ERROR_SERVER_REMOTE_CLOSED
;
1956 /* handle extended remote protocol */
1957 extended_protocol
= 1;
1958 gdb_put_packet(connection
, "OK", 2);
1961 /* handle extended restart packet */
1962 command_run_linef(connection
->cmd_ctx
, "ocd_gdb_restart %d", get_num_by_target(target
));
1965 /* ignore unkown packets */
1966 LOG_DEBUG("ignoring 0x%2.2x packet", packet
[0]);
1967 gdb_put_packet(connection
, NULL
, 0);
1971 /* if a packet handler returned an error, exit input loop */
1972 if (retval
!= ERROR_OK
)
1976 if (gdb_con
->ctrl_c
)
1978 if (target
->state
== TARGET_RUNNING
)
1980 target_halt(target
);
1981 gdb_con
->ctrl_c
= 0;
1985 } while (gdb_con
->buf_cnt
> 0);
1990 int gdb_input(connection_t
*connection
)
1992 int retval
= gdb_input_inner(connection
);
1993 gdb_connection_t
*gdb_con
= connection
->priv
;
1994 if (retval
== ERROR_SERVER_REMOTE_CLOSED
)
1997 /* logging does not propagate the error, yet can set th gdb_con->closed flag */
1998 if (gdb_con
->closed
)
1999 return ERROR_SERVER_REMOTE_CLOSED
;
2001 /* we'll recover from any other errors(e.g. temporary timeouts, etc.) */
2007 gdb_service_t
*gdb_service
;
2008 target_t
*target
= targets
;
2013 LOG_WARNING("no gdb ports allocated as no target has been specified");
2019 LOG_WARNING("no gdb port specified, using default port 3333");
2025 char service_name
[8];
2027 snprintf(service_name
, 8, "gdb-%2.2i", i
);
2029 gdb_service
= malloc(sizeof(gdb_service_t
));
2030 gdb_service
->target
= target
;
2032 add_service("gdb", CONNECTION_GDB
, gdb_port
+ i
, 1, gdb_new_connection
, gdb_input
, gdb_connection_closed
, gdb_service
);
2034 LOG_DEBUG("gdb service for target %s at port %i", target
->type
->name
, gdb_port
+ i
);
2037 target
= target
->next
;
2043 /* daemon configuration command gdb_port */
2044 int handle_gdb_port_command(struct command_context_s
*cmd_ctx
, char *cmd
, char **args
, int argc
)
2049 /* only if the port wasn't overwritten by cmdline */
2051 gdb_port
= strtoul(args
[0], NULL
, 0);
2056 int handle_gdb_detach_command(struct command_context_s
*cmd_ctx
, char *cmd
, char **args
, int argc
)
2060 if (strcmp(args
[0], "resume") == 0)
2062 detach_mode
= GDB_DETACH_RESUME
;
2065 else if (strcmp(args
[0], "reset") == 0)
2067 detach_mode
= GDB_DETACH_RESET
;
2070 else if (strcmp(args
[0], "halt") == 0)
2072 detach_mode
= GDB_DETACH_HALT
;
2075 else if (strcmp(args
[0], "nothing") == 0)
2077 detach_mode
= GDB_DETACH_NOTHING
;
2082 LOG_WARNING("invalid gdb_detach configuration directive: %s", args
[0]);
2086 int handle_gdb_memory_map_command(struct command_context_s
*cmd_ctx
, char *cmd
, char **args
, int argc
)
2090 if (strcmp(args
[0], "enable") == 0)
2092 gdb_use_memory_map
= 1;
2095 else if (strcmp(args
[0], "disable") == 0)
2097 gdb_use_memory_map
= 0;
2102 LOG_WARNING("invalid gdb_memory_map configuration directive: %s", args
[0]);
2106 int handle_gdb_flash_program_command(struct command_context_s
*cmd_ctx
, char *cmd
, char **args
, int argc
)
2110 if (strcmp(args
[0], "enable") == 0)
2112 gdb_flash_program
= 1;
2115 else if (strcmp(args
[0], "disable") == 0)
2117 gdb_flash_program
= 0;
2122 LOG_WARNING("invalid gdb_memory_map configuration directive: %s", args
[0]);
2126 int handle_gdb_report_data_abort_command(struct command_context_s
*cmd_ctx
, char *cmd
, char **args
, int argc
)
2130 if (strcmp(args
[0], "enable") == 0)
2132 gdb_report_data_abort
= 1;
2135 else if (strcmp(args
[0], "disable") == 0)
2137 gdb_report_data_abort
= 0;
2142 LOG_WARNING("invalid gdb_report_data_abort configuration directive: %s", args
[0]);
2146 int gdb_register_commands(command_context_t
*command_context
)
2148 register_command(command_context
, NULL
, "gdb_port", handle_gdb_port_command
,
2149 COMMAND_CONFIG
, "");
2150 register_command(command_context
, NULL
, "gdb_detach", handle_gdb_detach_command
,
2151 COMMAND_CONFIG
, "");
2152 register_command(command_context
, NULL
, "gdb_memory_map", handle_gdb_memory_map_command
,
2153 COMMAND_CONFIG
, "");
2154 register_command(command_context
, NULL
, "gdb_flash_program", handle_gdb_flash_program_command
,
2155 COMMAND_CONFIG
, "");
2156 register_command(command_context
, NULL
, "gdb_report_data_abort", handle_gdb_report_data_abort_command
,
2157 COMMAND_CONFIG
, "");
Linking to existing account procedure
If you already have an account and want to add another login method
you
MUST first sign in with your existing account and
then change URL to read
https://review.openocd.org/login/?link
to get to this page again but this time it'll work for linking. Thank you.
SSH host keys fingerprints
1024 SHA256:YKx8b7u5ZWdcbp7/4AeXNaqElP49m6QrwfXaqQGJAOk gerrit-code-review@openocd.zylin.com (DSA)
384 SHA256:jHIbSQa4REvwCFG4cq5LBlBLxmxSqelQPem/EXIrxjk gerrit-code-review@openocd.org (ECDSA)
521 SHA256:UAOPYkU9Fjtcao0Ul/Rrlnj/OsQvt+pgdYSZ4jOYdgs gerrit-code-review@openocd.org (ECDSA)
256 SHA256:A13M5QlnozFOvTllybRZH6vm7iSt0XLxbA48yfc2yfY gerrit-code-review@openocd.org (ECDSA)
256 SHA256:spYMBqEYoAOtK7yZBrcwE8ZpYt6b68Cfh9yEVetvbXg gerrit-code-review@openocd.org (ED25519)
+--[ED25519 256]--+
|=.. |
|+o.. . |
|*.o . . |
|+B . . . |
|Bo. = o S |
|Oo.+ + = |
|oB=.* = . o |
| =+=.+ + E |
|. .=o . o |
+----[SHA256]-----+
2048 SHA256:0Onrb7/PHjpo6iVZ7xQX2riKN83FJ3KGU0TvI0TaFG4 gerrit-code-review@openocd.zylin.com (RSA)