server: fix: remove kept_alive() from server loop
[openocd.git] / src / server / server.c
1 /***************************************************************************
2 * Copyright (C) 2005 by Dominic Rath *
3 * Dominic.Rath@gmx.de *
4 * *
5 * Copyright (C) 2007-2010 Øyvind Harboe *
6 * oyvind.harboe@zylin.com *
7 * *
8 * Copyright (C) 2008 by Spencer Oliver *
9 * spen@spen-soft.co.uk *
10 * *
11 * This program is free software; you can redistribute it and/or modify *
12 * it under the terms of the GNU General Public License as published by *
13 * the Free Software Foundation; either version 2 of the License, or *
14 * (at your option) any later version. *
15 * *
16 * This program is distributed in the hope that it will be useful, *
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of *
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
19 * GNU General Public License for more details. *
20 * *
21 * You should have received a copy of the GNU General Public License *
22 * along with this program. If not, see <http://www.gnu.org/licenses/>. *
23 ***************************************************************************/
24
25 #ifdef HAVE_CONFIG_H
26 #include "config.h"
27 #endif
28
29 #include "server.h"
30 #include <helper/time_support.h>
31 #include <target/target.h>
32 #include <target/target_request.h>
33 #include <target/openrisc/jsp_server.h>
34 #include "openocd.h"
35 #include "tcl_server.h"
36 #include "telnet_server.h"
37
38 #include <signal.h>
39
40 #ifdef HAVE_NETDB_H
41 #include <netdb.h>
42 #endif
43
44 #ifndef _WIN32
45 #include <netinet/tcp.h>
46 #endif
47
48 static struct service *services;
49
50 enum shutdown_reason {
51 CONTINUE_MAIN_LOOP, /* stay in main event loop */
52 SHUTDOWN_REQUESTED, /* set by shutdown command; exit the event loop and quit the debugger */
53 SHUTDOWN_WITH_ERROR_CODE, /* set by shutdown command; quit with non-zero return code */
54 SHUTDOWN_WITH_SIGNAL_CODE /* set by sig_handler; exec shutdown then exit with signal as return code */
55 };
56 static enum shutdown_reason shutdown_openocd = CONTINUE_MAIN_LOOP;
57
58 /* store received signal to exit application by killing ourselves */
59 static int last_signal;
60
61 /* set the polling period to 100ms */
62 static int polling_period = 100;
63
64 /* address by name on which to listen for incoming TCP/IP connections */
65 static char *bindto_name;
66
67 static int add_connection(struct service *service, struct command_context *cmd_ctx)
68 {
69 socklen_t address_size;
70 struct connection *c, **p;
71 int retval;
72 int flag = 1;
73
74 c = malloc(sizeof(struct connection));
75 c->fd = -1;
76 c->fd_out = -1;
77 memset(&c->sin, 0, sizeof(c->sin));
78 c->cmd_ctx = copy_command_context(cmd_ctx);
79 c->service = service;
80 c->input_pending = false;
81 c->priv = NULL;
82 c->next = NULL;
83
84 if (service->type == CONNECTION_TCP) {
85 address_size = sizeof(c->sin);
86
87 c->fd = accept(service->fd, (struct sockaddr *)&service->sin, &address_size);
88 c->fd_out = c->fd;
89
90 /* This increases performance dramatically for e.g. GDB load which
91 * does not have a sliding window protocol.
92 *
93 * Ignore errors from this fn as it probably just means less performance
94 */
95 setsockopt(c->fd, /* socket affected */
96 IPPROTO_TCP, /* set option at TCP level */
97 TCP_NODELAY, /* name of option */
98 (char *)&flag, /* the cast is historical cruft */
99 sizeof(int)); /* length of option value */
100
101 LOG_INFO("accepting '%s' connection on tcp/%s", service->name, service->port);
102 retval = service->new_connection(c);
103 if (retval != ERROR_OK) {
104 close_socket(c->fd);
105 LOG_ERROR("attempted '%s' connection rejected", service->name);
106 command_done(c->cmd_ctx);
107 free(c);
108 return retval;
109 }
110 } else if (service->type == CONNECTION_STDINOUT) {
111 c->fd = service->fd;
112 c->fd_out = fileno(stdout);
113
114 #ifdef _WIN32
115 /* we are using stdin/out so ignore ctrl-c under windoze */
116 SetConsoleCtrlHandler(NULL, TRUE);
117 #endif
118
119 /* do not check for new connections again on stdin */
120 service->fd = -1;
121
122 LOG_INFO("accepting '%s' connection from pipe", service->name);
123 retval = service->new_connection(c);
124 if (retval != ERROR_OK) {
125 LOG_ERROR("attempted '%s' connection rejected", service->name);
126 command_done(c->cmd_ctx);
127 free(c);
128 return retval;
129 }
130 } else if (service->type == CONNECTION_PIPE) {
131 c->fd = service->fd;
132 /* do not check for new connections again on stdin */
133 service->fd = -1;
134
135 char *out_file = alloc_printf("%so", service->port);
136 c->fd_out = open(out_file, O_WRONLY);
137 free(out_file);
138 if (c->fd_out == -1) {
139 LOG_ERROR("could not open %s", service->port);
140 command_done(c->cmd_ctx);
141 free(c);
142 return ERROR_FAIL;
143 }
144
145 LOG_INFO("accepting '%s' connection from pipe %s", service->name, service->port);
146 retval = service->new_connection(c);
147 if (retval != ERROR_OK) {
148 LOG_ERROR("attempted '%s' connection rejected", service->name);
149 command_done(c->cmd_ctx);
150 free(c);
151 return retval;
152 }
153 }
154
155 /* add to the end of linked list */
156 for (p = &service->connections; *p; p = &(*p)->next)
157 ;
158 *p = c;
159
160 if (service->max_connections != CONNECTION_LIMIT_UNLIMITED)
161 service->max_connections--;
162
163 return ERROR_OK;
164 }
165
166 static int remove_connection(struct service *service, struct connection *connection)
167 {
168 struct connection **p = &service->connections;
169 struct connection *c;
170
171 /* find connection */
172 while ((c = *p)) {
173 if (c->fd == connection->fd) {
174 service->connection_closed(c);
175 if (service->type == CONNECTION_TCP)
176 close_socket(c->fd);
177 else if (service->type == CONNECTION_PIPE) {
178 /* The service will listen to the pipe again */
179 c->service->fd = c->fd;
180 }
181
182 command_done(c->cmd_ctx);
183
184 /* delete connection */
185 *p = c->next;
186 free(c);
187
188 if (service->max_connections != CONNECTION_LIMIT_UNLIMITED)
189 service->max_connections++;
190
191 break;
192 }
193
194 /* redirect p to next list pointer */
195 p = &(*p)->next;
196 }
197
198 return ERROR_OK;
199 }
200
201 static void free_service(struct service *c)
202 {
203 free(c->name);
204 free(c->port);
205 free(c);
206 }
207
208 int add_service(char *name,
209 const char *port,
210 int max_connections,
211 new_connection_handler_t new_connection_handler,
212 input_handler_t input_handler,
213 connection_closed_handler_t connection_closed_handler,
214 void *priv)
215 {
216 struct service *c, **p;
217 struct hostent *hp;
218 int so_reuseaddr_option = 1;
219
220 c = malloc(sizeof(struct service));
221
222 c->name = strdup(name);
223 c->port = strdup(port);
224 c->max_connections = 1; /* Only TCP/IP ports can support more than one connection */
225 c->fd = -1;
226 c->connections = NULL;
227 c->new_connection = new_connection_handler;
228 c->input = input_handler;
229 c->connection_closed = connection_closed_handler;
230 c->priv = priv;
231 c->next = NULL;
232 long portnumber;
233 if (strcmp(c->port, "pipe") == 0)
234 c->type = CONNECTION_STDINOUT;
235 else {
236 char *end;
237 portnumber = strtol(c->port, &end, 0);
238 if (!*end && (parse_long(c->port, &portnumber) == ERROR_OK)) {
239 c->portnumber = portnumber;
240 c->type = CONNECTION_TCP;
241 } else
242 c->type = CONNECTION_PIPE;
243 }
244
245 if (c->type == CONNECTION_TCP) {
246 c->max_connections = max_connections;
247
248 c->fd = socket(AF_INET, SOCK_STREAM, 0);
249 if (c->fd == -1) {
250 LOG_ERROR("error creating socket: %s", strerror(errno));
251 free_service(c);
252 return ERROR_FAIL;
253 }
254
255 setsockopt(c->fd,
256 SOL_SOCKET,
257 SO_REUSEADDR,
258 (void *)&so_reuseaddr_option,
259 sizeof(int));
260
261 socket_nonblock(c->fd);
262
263 memset(&c->sin, 0, sizeof(c->sin));
264 c->sin.sin_family = AF_INET;
265
266 if (!bindto_name)
267 c->sin.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
268 else {
269 hp = gethostbyname(bindto_name);
270 if (!hp) {
271 LOG_ERROR("couldn't resolve bindto address: %s", bindto_name);
272 close_socket(c->fd);
273 free_service(c);
274 return ERROR_FAIL;
275 }
276 memcpy(&c->sin.sin_addr, hp->h_addr_list[0], hp->h_length);
277 }
278 c->sin.sin_port = htons(c->portnumber);
279
280 if (bind(c->fd, (struct sockaddr *)&c->sin, sizeof(c->sin)) == -1) {
281 LOG_ERROR("couldn't bind %s to socket on port %d: %s", name, c->portnumber, strerror(errno));
282 close_socket(c->fd);
283 free_service(c);
284 return ERROR_FAIL;
285 }
286
287 #ifndef _WIN32
288 int segsize = 65536;
289 setsockopt(c->fd, IPPROTO_TCP, TCP_MAXSEG, &segsize, sizeof(int));
290 #endif
291 int window_size = 128 * 1024;
292
293 /* These setsockopt()s must happen before the listen() */
294
295 setsockopt(c->fd, SOL_SOCKET, SO_SNDBUF,
296 (char *)&window_size, sizeof(window_size));
297 setsockopt(c->fd, SOL_SOCKET, SO_RCVBUF,
298 (char *)&window_size, sizeof(window_size));
299
300 if (listen(c->fd, 1) == -1) {
301 LOG_ERROR("couldn't listen on socket: %s", strerror(errno));
302 close_socket(c->fd);
303 free_service(c);
304 return ERROR_FAIL;
305 }
306
307 struct sockaddr_in addr_in;
308 addr_in.sin_port = 0;
309 socklen_t addr_in_size = sizeof(addr_in);
310 if (getsockname(c->fd, (struct sockaddr *)&addr_in, &addr_in_size) == 0)
311 LOG_INFO("Listening on port %hu for %s connections",
312 ntohs(addr_in.sin_port), name);
313 } else if (c->type == CONNECTION_STDINOUT) {
314 c->fd = fileno(stdin);
315
316 #ifdef _WIN32
317 /* for win32 set stdin/stdout to binary mode */
318 if (_setmode(_fileno(stdout), _O_BINARY) < 0)
319 LOG_WARNING("cannot change stdout mode to binary");
320 if (_setmode(_fileno(stdin), _O_BINARY) < 0)
321 LOG_WARNING("cannot change stdin mode to binary");
322 if (_setmode(_fileno(stderr), _O_BINARY) < 0)
323 LOG_WARNING("cannot change stderr mode to binary");
324 #else
325 socket_nonblock(c->fd);
326 #endif
327 } else if (c->type == CONNECTION_PIPE) {
328 #ifdef _WIN32
329 /* we currently do not support named pipes under win32
330 * so exit openocd for now */
331 LOG_ERROR("Named pipes currently not supported under this os");
332 free_service(c);
333 return ERROR_FAIL;
334 #else
335 /* Pipe we're reading from */
336 c->fd = open(c->port, O_RDONLY | O_NONBLOCK);
337 if (c->fd == -1) {
338 LOG_ERROR("could not open %s", c->port);
339 free_service(c);
340 return ERROR_FAIL;
341 }
342 #endif
343 }
344
345 /* add to the end of linked list */
346 for (p = &services; *p; p = &(*p)->next)
347 ;
348 *p = c;
349
350 return ERROR_OK;
351 }
352
353 static void remove_connections(struct service *service)
354 {
355 struct connection *connection;
356
357 connection = service->connections;
358
359 while (connection) {
360 struct connection *tmp;
361
362 tmp = connection->next;
363 remove_connection(service, connection);
364 connection = tmp;
365 }
366 }
367
368 int remove_service(const char *name, const char *port)
369 {
370 struct service *tmp;
371 struct service *prev;
372
373 prev = services;
374
375 for (tmp = services; tmp; prev = tmp, tmp = tmp->next) {
376 if (!strcmp(tmp->name, name) && !strcmp(tmp->port, port)) {
377 remove_connections(tmp);
378
379 if (tmp == services)
380 services = tmp->next;
381 else
382 prev->next = tmp->next;
383
384 if (tmp->type != CONNECTION_STDINOUT)
385 close_socket(tmp->fd);
386
387 free(tmp->priv);
388 free_service(tmp);
389
390 return ERROR_OK;
391 }
392 }
393
394 return ERROR_OK;
395 }
396
397 static int remove_services(void)
398 {
399 struct service *c = services;
400
401 /* loop service */
402 while (c) {
403 struct service *next = c->next;
404
405 remove_connections(c);
406
407 free(c->name);
408
409 if (c->type == CONNECTION_PIPE) {
410 if (c->fd != -1)
411 close(c->fd);
412 }
413 free(c->port);
414 free(c->priv);
415 /* delete service */
416 free(c);
417
418 /* remember the last service for unlinking */
419 c = next;
420 }
421
422 services = NULL;
423
424 return ERROR_OK;
425 }
426
427 int server_loop(struct command_context *command_context)
428 {
429 struct service *service;
430
431 bool poll_ok = true;
432
433 /* used in select() */
434 fd_set read_fds;
435 int fd_max;
436
437 /* used in accept() */
438 int retval;
439
440 int64_t next_event = timeval_ms() + polling_period;
441
442 #ifndef _WIN32
443 if (signal(SIGPIPE, SIG_IGN) == SIG_ERR)
444 LOG_ERROR("couldn't set SIGPIPE to SIG_IGN");
445 #endif
446
447 while (shutdown_openocd == CONTINUE_MAIN_LOOP) {
448 /* monitor sockets for activity */
449 fd_max = 0;
450 FD_ZERO(&read_fds);
451
452 /* add service and connection fds to read_fds */
453 for (service = services; service; service = service->next) {
454 if (service->fd != -1) {
455 /* listen for new connections */
456 FD_SET(service->fd, &read_fds);
457
458 if (service->fd > fd_max)
459 fd_max = service->fd;
460 }
461
462 if (service->connections) {
463 struct connection *c;
464
465 for (c = service->connections; c; c = c->next) {
466 /* check for activity on the connection */
467 FD_SET(c->fd, &read_fds);
468 if (c->fd > fd_max)
469 fd_max = c->fd;
470 }
471 }
472 }
473
474 struct timeval tv;
475 tv.tv_sec = 0;
476 if (poll_ok) {
477 /* we're just polling this iteration, this is faster on embedded
478 * hosts */
479 tv.tv_usec = 0;
480 retval = socket_select(fd_max + 1, &read_fds, NULL, NULL, &tv);
481 } else {
482 /* Every 100ms, can be changed with "poll_period" command */
483 int timeout_ms = next_event - timeval_ms();
484 if (timeout_ms < 0)
485 timeout_ms = 0;
486 else if (timeout_ms > polling_period)
487 timeout_ms = polling_period;
488 tv.tv_usec = timeout_ms * 1000;
489 /* Only while we're sleeping we'll let others run */
490 retval = socket_select(fd_max + 1, &read_fds, NULL, NULL, &tv);
491 }
492
493 if (retval == -1) {
494 #ifdef _WIN32
495
496 errno = WSAGetLastError();
497
498 if (errno == WSAEINTR)
499 FD_ZERO(&read_fds);
500 else {
501 LOG_ERROR("error during select: %s", strerror(errno));
502 return ERROR_FAIL;
503 }
504 #else
505
506 if (errno == EINTR)
507 FD_ZERO(&read_fds);
508 else {
509 LOG_ERROR("error during select: %s", strerror(errno));
510 return ERROR_FAIL;
511 }
512 #endif
513 }
514
515 if (retval == 0) {
516 /* We only execute these callbacks when there was nothing to do or we timed
517 *out */
518 target_call_timer_callbacks_now();
519 next_event = target_timer_next_event();
520 process_jim_events(command_context);
521
522 FD_ZERO(&read_fds); /* eCos leaves read_fds unchanged in this case! */
523
524 /* We timed out/there was nothing to do, timeout rather than poll next time
525 **/
526 poll_ok = false;
527 } else {
528 /* There was something to do, next time we'll just poll */
529 poll_ok = true;
530 }
531
532 /* This is a simple back-off algorithm where we immediately
533 * re-poll if we did something this time around.
534 *
535 * This greatly improves performance of DCC.
536 */
537 poll_ok = poll_ok || target_got_message();
538
539 for (service = services; service; service = service->next) {
540 /* handle new connections on listeners */
541 if ((service->fd != -1)
542 && (FD_ISSET(service->fd, &read_fds))) {
543 if (service->max_connections != 0)
544 add_connection(service, command_context);
545 else {
546 if (service->type == CONNECTION_TCP) {
547 struct sockaddr_in sin;
548 socklen_t address_size = sizeof(sin);
549 int tmp_fd;
550 tmp_fd = accept(service->fd,
551 (struct sockaddr *)&service->sin,
552 &address_size);
553 close_socket(tmp_fd);
554 }
555 LOG_INFO(
556 "rejected '%s' connection, no more connections allowed",
557 service->name);
558 }
559 }
560
561 /* handle activity on connections */
562 if (service->connections) {
563 struct connection *c;
564
565 for (c = service->connections; c; ) {
566 if ((c->fd >= 0 && FD_ISSET(c->fd, &read_fds)) || c->input_pending) {
567 retval = service->input(c);
568 if (retval != ERROR_OK) {
569 struct connection *next = c->next;
570 if (service->type == CONNECTION_PIPE ||
571 service->type == CONNECTION_STDINOUT) {
572 /* if connection uses a pipe then
573 * shutdown openocd on error */
574 shutdown_openocd = SHUTDOWN_REQUESTED;
575 }
576 remove_connection(service, c);
577 LOG_INFO("dropped '%s' connection",
578 service->name);
579 c = next;
580 continue;
581 }
582 }
583 c = c->next;
584 }
585 }
586 }
587
588 #ifdef _WIN32
589 MSG msg;
590 while (PeekMessage(&msg, NULL, 0, 0, PM_REMOVE)) {
591 if (msg.message == WM_QUIT)
592 shutdown_openocd = SHUTDOWN_WITH_SIGNAL_CODE;
593 }
594 #endif
595 }
596
597 /* when quit for signal or CTRL-C, run (eventually user implemented) "shutdown" */
598 if (shutdown_openocd == SHUTDOWN_WITH_SIGNAL_CODE)
599 command_run_line(command_context, "shutdown");
600
601 return shutdown_openocd == SHUTDOWN_WITH_ERROR_CODE ? ERROR_FAIL : ERROR_OK;
602 }
603
604 static void sig_handler(int sig)
605 {
606 /* store only first signal that hits us */
607 if (shutdown_openocd == CONTINUE_MAIN_LOOP) {
608 shutdown_openocd = SHUTDOWN_WITH_SIGNAL_CODE;
609 last_signal = sig;
610 LOG_DEBUG("Terminating on Signal %d", sig);
611 } else
612 LOG_DEBUG("Ignored extra Signal %d", sig);
613 }
614
615
616 #ifdef _WIN32
617 BOOL WINAPI control_handler(DWORD ctrl_type)
618 {
619 shutdown_openocd = SHUTDOWN_WITH_SIGNAL_CODE;
620 return TRUE;
621 }
622 #else
623 static void sigkey_handler(int sig)
624 {
625 /* ignore keystroke generated signals if not in foreground process group */
626
627 if (tcgetpgrp(STDIN_FILENO) > 0)
628 sig_handler(sig);
629 else
630 LOG_DEBUG("Ignored Signal %d", sig);
631 }
632 #endif
633
634
635 int server_host_os_entry(void)
636 {
637 /* this currently only calls WSAStartup on native win32 systems
638 * before any socket operations are performed.
639 * This is an issue if you call init in your config script */
640
641 #ifdef _WIN32
642 WORD version_requested;
643 WSADATA wsadata;
644
645 version_requested = MAKEWORD(2, 2);
646
647 if (WSAStartup(version_requested, &wsadata) != 0) {
648 LOG_ERROR("Failed to Open Winsock");
649 return ERROR_FAIL;
650 }
651 #endif
652 return ERROR_OK;
653 }
654
655 int server_host_os_close(void)
656 {
657 #ifdef _WIN32
658 WSACleanup();
659 #endif
660 return ERROR_OK;
661 }
662
663 int server_preinit(void)
664 {
665 #ifdef _WIN32
666 /* register ctrl-c handler */
667 SetConsoleCtrlHandler(control_handler, TRUE);
668
669 signal(SIGBREAK, sig_handler);
670 signal(SIGINT, sig_handler);
671 #else
672 signal(SIGHUP, sig_handler);
673 signal(SIGPIPE, sig_handler);
674 signal(SIGQUIT, sigkey_handler);
675 signal(SIGINT, sigkey_handler);
676 #endif
677 signal(SIGTERM, sig_handler);
678 signal(SIGABRT, sig_handler);
679
680 return ERROR_OK;
681 }
682
683 int server_init(struct command_context *cmd_ctx)
684 {
685 int ret = tcl_init();
686
687 if (ret != ERROR_OK)
688 return ret;
689
690 ret = telnet_init("Open On-Chip Debugger");
691
692 if (ret != ERROR_OK) {
693 remove_services();
694 return ret;
695 }
696
697 return ERROR_OK;
698 }
699
700 int server_quit(void)
701 {
702 remove_services();
703 target_quit();
704
705 #ifdef _WIN32
706 SetConsoleCtrlHandler(control_handler, FALSE);
707
708 return ERROR_OK;
709 #endif
710
711 /* return signal number so we can kill ourselves */
712 return last_signal;
713 }
714
715 void server_free(void)
716 {
717 tcl_service_free();
718 telnet_service_free();
719 jsp_service_free();
720
721 free(bindto_name);
722 }
723
724 void exit_on_signal(int sig)
725 {
726 #ifndef _WIN32
727 /* bring back default system handler and kill yourself */
728 signal(sig, SIG_DFL);
729 kill(getpid(), sig);
730 #endif
731 }
732
733 int connection_write(struct connection *connection, const void *data, int len)
734 {
735 if (len == 0) {
736 /* successful no-op. Sockets and pipes behave differently here... */
737 return 0;
738 }
739 if (connection->service->type == CONNECTION_TCP)
740 return write_socket(connection->fd_out, data, len);
741 else
742 return write(connection->fd_out, data, len);
743 }
744
745 int connection_read(struct connection *connection, void *data, int len)
746 {
747 if (connection->service->type == CONNECTION_TCP)
748 return read_socket(connection->fd, data, len);
749 else
750 return read(connection->fd, data, len);
751 }
752
753 /* tell the server we want to shut down */
754 COMMAND_HANDLER(handle_shutdown_command)
755 {
756 LOG_USER("shutdown command invoked");
757
758 shutdown_openocd = SHUTDOWN_REQUESTED;
759
760 if (CMD_ARGC == 1) {
761 if (!strcmp(CMD_ARGV[0], "error")) {
762 shutdown_openocd = SHUTDOWN_WITH_ERROR_CODE;
763 return ERROR_FAIL;
764 }
765 }
766
767 return ERROR_COMMAND_CLOSE_CONNECTION;
768 }
769
770 COMMAND_HANDLER(handle_poll_period_command)
771 {
772 if (CMD_ARGC == 0)
773 LOG_WARNING("You need to set a period value");
774 else
775 COMMAND_PARSE_NUMBER(int, CMD_ARGV[0], polling_period);
776
777 LOG_INFO("set servers polling period to %ums", polling_period);
778
779 return ERROR_OK;
780 }
781
782 COMMAND_HANDLER(handle_bindto_command)
783 {
784 switch (CMD_ARGC) {
785 case 0:
786 command_print(CMD, "bindto name: %s", bindto_name);
787 break;
788 case 1:
789 free(bindto_name);
790 bindto_name = strdup(CMD_ARGV[0]);
791 break;
792 default:
793 return ERROR_COMMAND_SYNTAX_ERROR;
794 }
795 return ERROR_OK;
796 }
797
798 static const struct command_registration server_command_handlers[] = {
799 {
800 .name = "shutdown",
801 .handler = &handle_shutdown_command,
802 .mode = COMMAND_ANY,
803 .usage = "",
804 .help = "shut the server down",
805 },
806 {
807 .name = "poll_period",
808 .handler = &handle_poll_period_command,
809 .mode = COMMAND_ANY,
810 .usage = "",
811 .help = "set the servers polling period",
812 },
813 {
814 .name = "bindto",
815 .handler = &handle_bindto_command,
816 .mode = COMMAND_CONFIG,
817 .usage = "[name]",
818 .help = "Specify address by name on which to listen for "
819 "incoming TCP/IP connections",
820 },
821 COMMAND_REGISTRATION_DONE
822 };
823
824 int server_register_commands(struct command_context *cmd_ctx)
825 {
826 int retval = telnet_register_commands(cmd_ctx);
827 if (retval != ERROR_OK)
828 return retval;
829
830 retval = tcl_register_commands(cmd_ctx);
831 if (retval != ERROR_OK)
832 return retval;
833
834 retval = jsp_register_commands(cmd_ctx);
835 if (retval != ERROR_OK)
836 return retval;
837
838 return register_commands(cmd_ctx, NULL, server_command_handlers);
839 }
840
841 COMMAND_HELPER(server_port_command, unsigned short *out)
842 {
843 switch (CMD_ARGC) {
844 case 0:
845 command_print(CMD, "%d", *out);
846 break;
847 case 1:
848 {
849 uint16_t port;
850 COMMAND_PARSE_NUMBER(u16, CMD_ARGV[0], port);
851 *out = port;
852 break;
853 }
854 default:
855 return ERROR_COMMAND_SYNTAX_ERROR;
856 }
857 return ERROR_OK;
858 }
859
860 COMMAND_HELPER(server_pipe_command, char **out)
861 {
862 switch (CMD_ARGC) {
863 case 0:
864 command_print(CMD, "%s", *out);
865 break;
866 case 1:
867 {
868 if (CMD_CTX->mode == COMMAND_EXEC) {
869 LOG_WARNING("unable to change server port after init");
870 return ERROR_COMMAND_ARGUMENT_INVALID;
871 }
872 free(*out);
873 *out = strdup(CMD_ARGV[0]);
874 break;
875 }
876 default:
877 return ERROR_COMMAND_SYNTAX_ERROR;
878 }
879 return ERROR_OK;
880 }

Linking to existing account procedure

If you already have an account and want to add another login method you MUST first sign in with your existing account and then change URL to read https://review.openocd.org/login/?link to get to this page again but this time it'll work for linking. Thank you.

SSH host keys fingerprints

1024 SHA256:YKx8b7u5ZWdcbp7/4AeXNaqElP49m6QrwfXaqQGJAOk gerrit-code-review@openocd.zylin.com (DSA)
384 SHA256:jHIbSQa4REvwCFG4cq5LBlBLxmxSqelQPem/EXIrxjk gerrit-code-review@openocd.org (ECDSA)
521 SHA256:UAOPYkU9Fjtcao0Ul/Rrlnj/OsQvt+pgdYSZ4jOYdgs gerrit-code-review@openocd.org (ECDSA)
256 SHA256:A13M5QlnozFOvTllybRZH6vm7iSt0XLxbA48yfc2yfY gerrit-code-review@openocd.org (ECDSA)
256 SHA256:spYMBqEYoAOtK7yZBrcwE8ZpYt6b68Cfh9yEVetvbXg gerrit-code-review@openocd.org (ED25519)
+--[ED25519 256]--+
|=..              |
|+o..   .         |
|*.o   . .        |
|+B . . .         |
|Bo. = o S        |
|Oo.+ + =         |
|oB=.* = . o      |
| =+=.+   + E     |
|. .=o   . o      |
+----[SHA256]-----+
2048 SHA256:0Onrb7/PHjpo6iVZ7xQX2riKN83FJ3KGU0TvI0TaFG4 gerrit-code-review@openocd.zylin.com (RSA)