Cleanup of config/includes.
[openocd.git] / src / server / server.c
1 /***************************************************************************
2 * Copyright (C) 2005 by Dominic Rath *
3 * Dominic.Rath@gmx.de *
4 * *
5 * Copyright (C) 2007-2010 Øyvind Harboe *
6 * oyvind.harboe@zylin.com *
7 * *
8 * Copyright (C) 2008 by Spencer Oliver *
9 * spen@spen-soft.co.uk *
10 * *
11 * This program is free software; you can redistribute it and/or modify *
12 * it under the terms of the GNU General Public License as published by *
13 * the Free Software Foundation; either version 2 of the License, or *
14 * (at your option) any later version. *
15 * *
16 * This program is distributed in the hope that it will be useful, *
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of *
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
19 * GNU General Public License for more details. *
20 * *
21 * You should have received a copy of the GNU General Public License *
22 * along with this program. If not, see <http://www.gnu.org/licenses/>. *
23 ***************************************************************************/
24
25 #ifdef HAVE_CONFIG_H
26 #include "config.h"
27 #endif
28
29 #include "server.h"
30 #include <target/target.h>
31 #include <target/target_request.h>
32 #include <target/openrisc/jsp_server.h>
33 #include "openocd.h"
34 #include "tcl_server.h"
35 #include "telnet_server.h"
36 #include "time_support.h"
37
38 #include <signal.h>
39
40 #ifdef HAVE_NETDB_H
41 #include <netdb.h>
42 #endif
43
44 #ifndef _WIN32
45 #include <netinet/tcp.h>
46 #endif
47
48 static struct service *services;
49
50 enum shutdown_reason {
51 CONTINUE_MAIN_LOOP, /* stay in main event loop */
52 SHUTDOWN_REQUESTED, /* set by shutdown command; exit the event loop and quit the debugger */
53 SHUTDOWN_WITH_ERROR_CODE, /* set by shutdown command; quit with non-zero return code */
54 SHUTDOWN_WITH_SIGNAL_CODE /* set by sig_handler; exec shutdown then exit with signal as return code */
55 };
56 static enum shutdown_reason shutdown_openocd = CONTINUE_MAIN_LOOP;
57
58 /* store received signal to exit application by killing ourselves */
59 static int last_signal;
60
61 /* set the polling period to 100ms */
62 static int polling_period = 100;
63
64 /* address by name on which to listen for incoming TCP/IP connections */
65 static char *bindto_name;
66
67 static int add_connection(struct service *service, struct command_context *cmd_ctx)
68 {
69 socklen_t address_size;
70 struct connection *c, **p;
71 int retval;
72 int flag = 1;
73
74 c = malloc(sizeof(struct connection));
75 c->fd = -1;
76 c->fd_out = -1;
77 memset(&c->sin, 0, sizeof(c->sin));
78 c->cmd_ctx = copy_command_context(cmd_ctx);
79 c->service = service;
80 c->input_pending = false;
81 c->priv = NULL;
82 c->next = NULL;
83
84 if (service->type == CONNECTION_TCP) {
85 address_size = sizeof(c->sin);
86
87 c->fd = accept(service->fd, (struct sockaddr *)&service->sin, &address_size);
88 c->fd_out = c->fd;
89
90 /* This increases performance dramatically for e.g. GDB load which
91 * does not have a sliding window protocol.
92 *
93 * Ignore errors from this fn as it probably just means less performance
94 */
95 setsockopt(c->fd, /* socket affected */
96 IPPROTO_TCP, /* set option at TCP level */
97 TCP_NODELAY, /* name of option */
98 (char *)&flag, /* the cast is historical cruft */
99 sizeof(int)); /* length of option value */
100
101 LOG_INFO("accepting '%s' connection on tcp/%s", service->name, service->port);
102 retval = service->new_connection(c);
103 if (retval != ERROR_OK) {
104 close_socket(c->fd);
105 LOG_ERROR("attempted '%s' connection rejected", service->name);
106 command_done(c->cmd_ctx);
107 free(c);
108 return retval;
109 }
110 } else if (service->type == CONNECTION_STDINOUT) {
111 c->fd = service->fd;
112 c->fd_out = fileno(stdout);
113
114 #ifdef _WIN32
115 /* we are using stdin/out so ignore ctrl-c under windoze */
116 SetConsoleCtrlHandler(NULL, TRUE);
117 #endif
118
119 /* do not check for new connections again on stdin */
120 service->fd = -1;
121
122 LOG_INFO("accepting '%s' connection from pipe", service->name);
123 retval = service->new_connection(c);
124 if (retval != ERROR_OK) {
125 LOG_ERROR("attempted '%s' connection rejected", service->name);
126 command_done(c->cmd_ctx);
127 free(c);
128 return retval;
129 }
130 } else if (service->type == CONNECTION_PIPE) {
131 c->fd = service->fd;
132 /* do not check for new connections again on stdin */
133 service->fd = -1;
134
135 char *out_file = alloc_printf("%so", service->port);
136 c->fd_out = open(out_file, O_WRONLY);
137 free(out_file);
138 if (c->fd_out == -1) {
139 LOG_ERROR("could not open %s", service->port);
140 command_done(c->cmd_ctx);
141 free(c);
142 return ERROR_FAIL;
143 }
144
145 LOG_INFO("accepting '%s' connection from pipe %s", service->name, service->port);
146 retval = service->new_connection(c);
147 if (retval != ERROR_OK) {
148 LOG_ERROR("attempted '%s' connection rejected", service->name);
149 command_done(c->cmd_ctx);
150 free(c);
151 return retval;
152 }
153 }
154
155 /* add to the end of linked list */
156 for (p = &service->connections; *p; p = &(*p)->next)
157 ;
158 *p = c;
159
160 if (service->max_connections != CONNECTION_LIMIT_UNLIMITED)
161 service->max_connections--;
162
163 return ERROR_OK;
164 }
165
166 static int remove_connection(struct service *service, struct connection *connection)
167 {
168 struct connection **p = &service->connections;
169 struct connection *c;
170
171 /* find connection */
172 while ((c = *p)) {
173 if (c->fd == connection->fd) {
174 service->connection_closed(c);
175 if (service->type == CONNECTION_TCP)
176 close_socket(c->fd);
177 else if (service->type == CONNECTION_PIPE) {
178 /* The service will listen to the pipe again */
179 c->service->fd = c->fd;
180 }
181
182 command_done(c->cmd_ctx);
183
184 /* delete connection */
185 *p = c->next;
186 free(c);
187
188 if (service->max_connections != CONNECTION_LIMIT_UNLIMITED)
189 service->max_connections++;
190
191 break;
192 }
193
194 /* redirect p to next list pointer */
195 p = &(*p)->next;
196 }
197
198 return ERROR_OK;
199 }
200
201 static void free_service(struct service *c)
202 {
203 free(c->name);
204 free(c->port);
205 free(c);
206 }
207
208 int add_service(char *name,
209 const char *port,
210 int max_connections,
211 new_connection_handler_t new_connection_handler,
212 input_handler_t input_handler,
213 connection_closed_handler_t connection_closed_handler,
214 void *priv)
215 {
216 struct service *c, **p;
217 struct hostent *hp;
218 int so_reuseaddr_option = 1;
219
220 c = malloc(sizeof(struct service));
221
222 c->name = strdup(name);
223 c->port = strdup(port);
224 c->max_connections = 1; /* Only TCP/IP ports can support more than one connection */
225 c->fd = -1;
226 c->connections = NULL;
227 c->new_connection = new_connection_handler;
228 c->input = input_handler;
229 c->connection_closed = connection_closed_handler;
230 c->priv = priv;
231 c->next = NULL;
232 long portnumber;
233 if (strcmp(c->port, "pipe") == 0)
234 c->type = CONNECTION_STDINOUT;
235 else {
236 char *end;
237 portnumber = strtol(c->port, &end, 0);
238 if (!*end && (parse_long(c->port, &portnumber) == ERROR_OK)) {
239 c->portnumber = portnumber;
240 c->type = CONNECTION_TCP;
241 } else
242 c->type = CONNECTION_PIPE;
243 }
244
245 if (c->type == CONNECTION_TCP) {
246 c->max_connections = max_connections;
247
248 c->fd = socket(AF_INET, SOCK_STREAM, 0);
249 if (c->fd == -1) {
250 LOG_ERROR("error creating socket: %s", strerror(errno));
251 free_service(c);
252 return ERROR_FAIL;
253 }
254
255 setsockopt(c->fd,
256 SOL_SOCKET,
257 SO_REUSEADDR,
258 (void *)&so_reuseaddr_option,
259 sizeof(int));
260
261 socket_nonblock(c->fd);
262
263 memset(&c->sin, 0, sizeof(c->sin));
264 c->sin.sin_family = AF_INET;
265
266 if (bindto_name == NULL)
267 c->sin.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
268 else {
269 hp = gethostbyname(bindto_name);
270 if (hp == NULL) {
271 LOG_ERROR("couldn't resolve bindto address: %s", bindto_name);
272 close_socket(c->fd);
273 free_service(c);
274 return ERROR_FAIL;
275 }
276 memcpy(&c->sin.sin_addr, hp->h_addr_list[0], hp->h_length);
277 }
278 c->sin.sin_port = htons(c->portnumber);
279
280 if (bind(c->fd, (struct sockaddr *)&c->sin, sizeof(c->sin)) == -1) {
281 LOG_ERROR("couldn't bind %s to socket on port %d: %s", name, c->portnumber, strerror(errno));
282 close_socket(c->fd);
283 free_service(c);
284 return ERROR_FAIL;
285 }
286
287 #ifndef _WIN32
288 int segsize = 65536;
289 setsockopt(c->fd, IPPROTO_TCP, TCP_MAXSEG, &segsize, sizeof(int));
290 #endif
291 int window_size = 128 * 1024;
292
293 /* These setsockopt()s must happen before the listen() */
294
295 setsockopt(c->fd, SOL_SOCKET, SO_SNDBUF,
296 (char *)&window_size, sizeof(window_size));
297 setsockopt(c->fd, SOL_SOCKET, SO_RCVBUF,
298 (char *)&window_size, sizeof(window_size));
299
300 if (listen(c->fd, 1) == -1) {
301 LOG_ERROR("couldn't listen on socket: %s", strerror(errno));
302 close_socket(c->fd);
303 free_service(c);
304 return ERROR_FAIL;
305 }
306
307 struct sockaddr_in addr_in;
308 addr_in.sin_port = 0;
309 socklen_t addr_in_size = sizeof(addr_in);
310 if (getsockname(c->fd, (struct sockaddr *)&addr_in, &addr_in_size) == 0)
311 LOG_INFO("Listening on port %hu for %s connections",
312 ntohs(addr_in.sin_port), name);
313 } else if (c->type == CONNECTION_STDINOUT) {
314 c->fd = fileno(stdin);
315
316 #ifdef _WIN32
317 /* for win32 set stdin/stdout to binary mode */
318 if (_setmode(_fileno(stdout), _O_BINARY) < 0)
319 LOG_WARNING("cannot change stdout mode to binary");
320 if (_setmode(_fileno(stdin), _O_BINARY) < 0)
321 LOG_WARNING("cannot change stdin mode to binary");
322 if (_setmode(_fileno(stderr), _O_BINARY) < 0)
323 LOG_WARNING("cannot change stderr mode to binary");
324 #else
325 socket_nonblock(c->fd);
326 #endif
327 } else if (c->type == CONNECTION_PIPE) {
328 #ifdef _WIN32
329 /* we currently do not support named pipes under win32
330 * so exit openocd for now */
331 LOG_ERROR("Named pipes currently not supported under this os");
332 free_service(c);
333 return ERROR_FAIL;
334 #else
335 /* Pipe we're reading from */
336 c->fd = open(c->port, O_RDONLY | O_NONBLOCK);
337 if (c->fd == -1) {
338 LOG_ERROR("could not open %s", c->port);
339 free_service(c);
340 return ERROR_FAIL;
341 }
342 #endif
343 }
344
345 /* add to the end of linked list */
346 for (p = &services; *p; p = &(*p)->next)
347 ;
348 *p = c;
349
350 return ERROR_OK;
351 }
352
353 static void remove_connections(struct service *service)
354 {
355 struct connection *connection;
356
357 connection = service->connections;
358
359 while (connection) {
360 struct connection *tmp;
361
362 tmp = connection->next;
363 remove_connection(service, connection);
364 connection = tmp;
365 }
366 }
367
368 int remove_service(const char *name, const char *port)
369 {
370 struct service *tmp;
371 struct service *prev;
372
373 prev = services;
374
375 for (tmp = services; tmp; prev = tmp, tmp = tmp->next) {
376 if (!strcmp(tmp->name, name) && !strcmp(tmp->port, port)) {
377 remove_connections(tmp);
378
379 if (tmp == services)
380 services = tmp->next;
381 else
382 prev->next = tmp->next;
383
384 if (tmp->type != CONNECTION_STDINOUT)
385 close_socket(tmp->fd);
386
387 free(tmp->priv);
388 free_service(tmp);
389
390 return ERROR_OK;
391 }
392 }
393
394 return ERROR_OK;
395 }
396
397 static int remove_services(void)
398 {
399 struct service *c = services;
400
401 /* loop service */
402 while (c) {
403 struct service *next = c->next;
404
405 remove_connections(c);
406
407 free(c->name);
408
409 if (c->type == CONNECTION_PIPE) {
410 if (c->fd != -1)
411 close(c->fd);
412 }
413 free(c->port);
414 free(c->priv);
415 /* delete service */
416 free(c);
417
418 /* remember the last service for unlinking */
419 c = next;
420 }
421
422 services = NULL;
423
424 return ERROR_OK;
425 }
426
427 int server_loop(struct command_context *command_context)
428 {
429 struct service *service;
430
431 bool poll_ok = true;
432
433 /* used in select() */
434 fd_set read_fds;
435 int fd_max;
436
437 /* used in accept() */
438 int retval;
439
440 #ifndef _WIN32
441 if (signal(SIGPIPE, SIG_IGN) == SIG_ERR)
442 LOG_ERROR("couldn't set SIGPIPE to SIG_IGN");
443 #endif
444
445 while (shutdown_openocd == CONTINUE_MAIN_LOOP) {
446 /* monitor sockets for activity */
447 fd_max = 0;
448 FD_ZERO(&read_fds);
449
450 /* add service and connection fds to read_fds */
451 for (service = services; service; service = service->next) {
452 if (service->fd != -1) {
453 /* listen for new connections */
454 FD_SET(service->fd, &read_fds);
455
456 if (service->fd > fd_max)
457 fd_max = service->fd;
458 }
459
460 if (service->connections) {
461 struct connection *c;
462
463 for (c = service->connections; c; c = c->next) {
464 /* check for activity on the connection */
465 FD_SET(c->fd, &read_fds);
466 if (c->fd > fd_max)
467 fd_max = c->fd;
468 }
469 }
470 }
471
472 struct timeval tv;
473 tv.tv_sec = 0;
474 if (poll_ok) {
475 /* we're just polling this iteration, this is faster on embedded
476 * hosts */
477 tv.tv_usec = 0;
478 retval = socket_select(fd_max + 1, &read_fds, NULL, NULL, &tv);
479 } else {
480 /* Every 100ms, can be changed with "poll_period" command */
481 tv.tv_usec = polling_period * 1000;
482 /* Only while we're sleeping we'll let others run */
483 openocd_sleep_prelude();
484 kept_alive();
485 retval = socket_select(fd_max + 1, &read_fds, NULL, NULL, &tv);
486 openocd_sleep_postlude();
487 }
488
489 if (retval == -1) {
490 #ifdef _WIN32
491
492 errno = WSAGetLastError();
493
494 if (errno == WSAEINTR)
495 FD_ZERO(&read_fds);
496 else {
497 LOG_ERROR("error during select: %s", strerror(errno));
498 return ERROR_FAIL;
499 }
500 #else
501
502 if (errno == EINTR)
503 FD_ZERO(&read_fds);
504 else {
505 LOG_ERROR("error during select: %s", strerror(errno));
506 return ERROR_FAIL;
507 }
508 #endif
509 }
510
511 if (retval == 0) {
512 /* We only execute these callbacks when there was nothing to do or we timed
513 *out */
514 target_call_timer_callbacks();
515 process_jim_events(command_context);
516
517 FD_ZERO(&read_fds); /* eCos leaves read_fds unchanged in this case! */
518
519 /* We timed out/there was nothing to do, timeout rather than poll next time
520 **/
521 poll_ok = false;
522 } else {
523 /* There was something to do, next time we'll just poll */
524 poll_ok = true;
525 }
526
527 /* This is a simple back-off algorithm where we immediately
528 * re-poll if we did something this time around.
529 *
530 * This greatly improves performance of DCC.
531 */
532 poll_ok = poll_ok || target_got_message();
533
534 for (service = services; service; service = service->next) {
535 /* handle new connections on listeners */
536 if ((service->fd != -1)
537 && (FD_ISSET(service->fd, &read_fds))) {
538 if (service->max_connections != 0)
539 add_connection(service, command_context);
540 else {
541 if (service->type == CONNECTION_TCP) {
542 struct sockaddr_in sin;
543 socklen_t address_size = sizeof(sin);
544 int tmp_fd;
545 tmp_fd = accept(service->fd,
546 (struct sockaddr *)&service->sin,
547 &address_size);
548 close_socket(tmp_fd);
549 }
550 LOG_INFO(
551 "rejected '%s' connection, no more connections allowed",
552 service->name);
553 }
554 }
555
556 /* handle activity on connections */
557 if (service->connections) {
558 struct connection *c;
559
560 for (c = service->connections; c; ) {
561 if ((c->fd >= 0 && FD_ISSET(c->fd, &read_fds)) || c->input_pending) {
562 retval = service->input(c);
563 if (retval != ERROR_OK) {
564 struct connection *next = c->next;
565 if (service->type == CONNECTION_PIPE ||
566 service->type == CONNECTION_STDINOUT) {
567 /* if connection uses a pipe then
568 * shutdown openocd on error */
569 shutdown_openocd = SHUTDOWN_REQUESTED;
570 }
571 remove_connection(service, c);
572 LOG_INFO("dropped '%s' connection",
573 service->name);
574 c = next;
575 continue;
576 }
577 }
578 c = c->next;
579 }
580 }
581 }
582
583 #ifdef _WIN32
584 MSG msg;
585 while (PeekMessage(&msg, NULL, 0, 0, PM_REMOVE)) {
586 if (msg.message == WM_QUIT)
587 shutdown_openocd = SHUTDOWN_WITH_SIGNAL_CODE;
588 }
589 #endif
590 }
591
592 /* when quit for signal or CTRL-C, run (eventually user implemented) "shutdown" */
593 if (shutdown_openocd == SHUTDOWN_WITH_SIGNAL_CODE)
594 command_run_line(command_context, "shutdown");
595
596 return shutdown_openocd == SHUTDOWN_WITH_ERROR_CODE ? ERROR_FAIL : ERROR_OK;
597 }
598
599 static void sig_handler(int sig)
600 {
601 /* store only first signal that hits us */
602 if (shutdown_openocd == CONTINUE_MAIN_LOOP) {
603 shutdown_openocd = SHUTDOWN_WITH_SIGNAL_CODE;
604 last_signal = sig;
605 LOG_DEBUG("Terminating on Signal %d", sig);
606 } else
607 LOG_DEBUG("Ignored extra Signal %d", sig);
608 }
609
610
611 #ifdef _WIN32
612 BOOL WINAPI ControlHandler(DWORD dwCtrlType)
613 {
614 shutdown_openocd = SHUTDOWN_WITH_SIGNAL_CODE;
615 return TRUE;
616 }
617 #else
618 static void sigkey_handler(int sig)
619 {
620 /* ignore keystroke generated signals if not in foreground process group */
621
622 if (tcgetpgrp(STDIN_FILENO) > 0)
623 sig_handler(sig);
624 else
625 LOG_DEBUG("Ignored Signal %d", sig);
626 }
627 #endif
628
629
630 int server_host_os_entry(void)
631 {
632 /* this currently only calls WSAStartup on native win32 systems
633 * before any socket operations are performed.
634 * This is an issue if you call init in your config script */
635
636 #ifdef _WIN32
637 WORD wVersionRequested;
638 WSADATA wsaData;
639
640 wVersionRequested = MAKEWORD(2, 2);
641
642 if (WSAStartup(wVersionRequested, &wsaData) != 0) {
643 LOG_ERROR("Failed to Open Winsock");
644 return ERROR_FAIL;
645 }
646 #endif
647 return ERROR_OK;
648 }
649
650 int server_host_os_close(void)
651 {
652 #ifdef _WIN32
653 WSACleanup();
654 #endif
655 return ERROR_OK;
656 }
657
658 int server_preinit(void)
659 {
660 #ifdef _WIN32
661 /* register ctrl-c handler */
662 SetConsoleCtrlHandler(ControlHandler, TRUE);
663
664 signal(SIGBREAK, sig_handler);
665 signal(SIGINT, sig_handler);
666 #else
667 signal(SIGHUP, sig_handler);
668 signal(SIGPIPE, sig_handler);
669 signal(SIGQUIT, sigkey_handler);
670 signal(SIGINT, sigkey_handler);
671 #endif
672 signal(SIGTERM, sig_handler);
673 signal(SIGABRT, sig_handler);
674
675 return ERROR_OK;
676 }
677
678 int server_init(struct command_context *cmd_ctx)
679 {
680 int ret = tcl_init();
681
682 if (ret != ERROR_OK)
683 return ret;
684
685 ret = telnet_init("Open On-Chip Debugger");
686
687 if (ret != ERROR_OK) {
688 remove_services();
689 return ret;
690 }
691
692 return ERROR_OK;
693 }
694
695 int server_quit(void)
696 {
697 remove_services();
698 target_quit();
699
700 #ifdef _WIN32
701 SetConsoleCtrlHandler(ControlHandler, FALSE);
702
703 return ERROR_OK;
704 #endif
705
706 /* return signal number so we can kill ourselves */
707 return last_signal;
708 }
709
710 void server_free(void)
711 {
712 tcl_service_free();
713 telnet_service_free();
714 jsp_service_free();
715
716 free(bindto_name);
717 }
718
719 void exit_on_signal(int sig)
720 {
721 #ifndef _WIN32
722 /* bring back default system handler and kill yourself */
723 signal(sig, SIG_DFL);
724 kill(getpid(), sig);
725 #endif
726 }
727
728 int connection_write(struct connection *connection, const void *data, int len)
729 {
730 if (len == 0) {
731 /* successful no-op. Sockets and pipes behave differently here... */
732 return 0;
733 }
734 if (connection->service->type == CONNECTION_TCP)
735 return write_socket(connection->fd_out, data, len);
736 else
737 return write(connection->fd_out, data, len);
738 }
739
740 int connection_read(struct connection *connection, void *data, int len)
741 {
742 if (connection->service->type == CONNECTION_TCP)
743 return read_socket(connection->fd, data, len);
744 else
745 return read(connection->fd, data, len);
746 }
747
748 /* tell the server we want to shut down */
749 COMMAND_HANDLER(handle_shutdown_command)
750 {
751 LOG_USER("shutdown command invoked");
752
753 shutdown_openocd = SHUTDOWN_REQUESTED;
754
755 if (CMD_ARGC == 1) {
756 if (!strcmp(CMD_ARGV[0], "error")) {
757 shutdown_openocd = SHUTDOWN_WITH_ERROR_CODE;
758 return ERROR_FAIL;
759 }
760 }
761
762 return ERROR_COMMAND_CLOSE_CONNECTION;
763 }
764
765 COMMAND_HANDLER(handle_poll_period_command)
766 {
767 if (CMD_ARGC == 0)
768 LOG_WARNING("You need to set a period value");
769 else
770 COMMAND_PARSE_NUMBER(int, CMD_ARGV[0], polling_period);
771
772 LOG_INFO("set servers polling period to %ums", polling_period);
773
774 return ERROR_OK;
775 }
776
777 COMMAND_HANDLER(handle_bindto_command)
778 {
779 switch (CMD_ARGC) {
780 case 0:
781 command_print(CMD, "bindto name: %s", bindto_name);
782 break;
783 case 1:
784 free(bindto_name);
785 bindto_name = strdup(CMD_ARGV[0]);
786 break;
787 default:
788 return ERROR_COMMAND_SYNTAX_ERROR;
789 }
790 return ERROR_OK;
791 }
792
793 static const struct command_registration server_command_handlers[] = {
794 {
795 .name = "shutdown",
796 .handler = &handle_shutdown_command,
797 .mode = COMMAND_ANY,
798 .usage = "",
799 .help = "shut the server down",
800 },
801 {
802 .name = "poll_period",
803 .handler = &handle_poll_period_command,
804 .mode = COMMAND_ANY,
805 .usage = "",
806 .help = "set the servers polling period",
807 },
808 {
809 .name = "bindto",
810 .handler = &handle_bindto_command,
811 .mode = COMMAND_CONFIG,
812 .usage = "[name]",
813 .help = "Specify address by name on which to listen for "
814 "incoming TCP/IP connections",
815 },
816 COMMAND_REGISTRATION_DONE
817 };
818
819 int server_register_commands(struct command_context *cmd_ctx)
820 {
821 int retval = telnet_register_commands(cmd_ctx);
822 if (ERROR_OK != retval)
823 return retval;
824
825 retval = tcl_register_commands(cmd_ctx);
826 if (ERROR_OK != retval)
827 return retval;
828
829 retval = jsp_register_commands(cmd_ctx);
830 if (ERROR_OK != retval)
831 return retval;
832
833 return register_commands(cmd_ctx, NULL, server_command_handlers);
834 }
835
836 COMMAND_HELPER(server_port_command, unsigned short *out)
837 {
838 switch (CMD_ARGC) {
839 case 0:
840 command_print(CMD, "%d", *out);
841 break;
842 case 1:
843 {
844 uint16_t port;
845 COMMAND_PARSE_NUMBER(u16, CMD_ARGV[0], port);
846 *out = port;
847 break;
848 }
849 default:
850 return ERROR_COMMAND_SYNTAX_ERROR;
851 }
852 return ERROR_OK;
853 }
854
855 COMMAND_HELPER(server_pipe_command, char **out)
856 {
857 switch (CMD_ARGC) {
858 case 0:
859 command_print(CMD, "%s", *out);
860 break;
861 case 1:
862 {
863 if (CMD_CTX->mode == COMMAND_EXEC) {
864 LOG_WARNING("unable to change server port after init");
865 return ERROR_COMMAND_ARGUMENT_INVALID;
866 }
867 free(*out);
868 *out = strdup(CMD_ARGV[0]);
869 break;
870 }
871 default:
872 return ERROR_COMMAND_SYNTAX_ERROR;
873 }
874 return ERROR_OK;
875 }

Linking to existing account procedure

If you already have an account and want to add another login method you MUST first sign in with your existing account and then change URL to read https://review.openocd.org/login/?link to get to this page again but this time it'll work for linking. Thank you.

SSH host keys fingerprints

1024 SHA256:YKx8b7u5ZWdcbp7/4AeXNaqElP49m6QrwfXaqQGJAOk gerrit-code-review@openocd.zylin.com (DSA)
384 SHA256:jHIbSQa4REvwCFG4cq5LBlBLxmxSqelQPem/EXIrxjk gerrit-code-review@openocd.org (ECDSA)
521 SHA256:UAOPYkU9Fjtcao0Ul/Rrlnj/OsQvt+pgdYSZ4jOYdgs gerrit-code-review@openocd.org (ECDSA)
256 SHA256:A13M5QlnozFOvTllybRZH6vm7iSt0XLxbA48yfc2yfY gerrit-code-review@openocd.org (ECDSA)
256 SHA256:spYMBqEYoAOtK7yZBrcwE8ZpYt6b68Cfh9yEVetvbXg gerrit-code-review@openocd.org (ED25519)
+--[ED25519 256]--+
|=..              |
|+o..   .         |
|*.o   . .        |
|+B . . .         |
|Bo. = o S        |
|Oo.+ + =         |
|oB=.* = . o      |
| =+=.+   + E     |
|. .=o   . o      |
+----[SHA256]-----+
2048 SHA256:0Onrb7/PHjpo6iVZ7xQX2riKN83FJ3KGU0TvI0TaFG4 gerrit-code-review@openocd.zylin.com (RSA)