eeaa3d750ecff316041bafb0dfcb416c02948d36
[openocd.git] / src / server / server.c
1 /* SPDX-License-Identifier: GPL-2.0-or-later */
2
3 /***************************************************************************
4 * Copyright (C) 2005 by Dominic Rath *
5 * Dominic.Rath@gmx.de *
6 * *
7 * Copyright (C) 2007-2010 Øyvind Harboe *
8 * oyvind.harboe@zylin.com *
9 * *
10 * Copyright (C) 2008 by Spencer Oliver *
11 * spen@spen-soft.co.uk *
12 ***************************************************************************/
13
14 #ifdef HAVE_CONFIG_H
15 #include "config.h"
16 #endif
17
18 #include "server.h"
19 #include <helper/time_support.h>
20 #include <target/target.h>
21 #include <target/target_request.h>
22 #include <target/openrisc/jsp_server.h>
23 #include "openocd.h"
24 #include "tcl_server.h"
25 #include "telnet_server.h"
26
27 #include <signal.h>
28
29 #ifdef HAVE_NETDB_H
30 #include <netdb.h>
31 #endif
32
33 #ifndef _WIN32
34 #include <netinet/tcp.h>
35 #endif
36
37 static struct service *services;
38
39 enum shutdown_reason {
40 CONTINUE_MAIN_LOOP, /* stay in main event loop */
41 SHUTDOWN_REQUESTED, /* set by shutdown command; exit the event loop and quit the debugger */
42 SHUTDOWN_WITH_ERROR_CODE, /* set by shutdown command; quit with non-zero return code */
43 SHUTDOWN_WITH_SIGNAL_CODE /* set by sig_handler; exec shutdown then exit with signal as return code */
44 };
45 static enum shutdown_reason shutdown_openocd = CONTINUE_MAIN_LOOP;
46
47 /* store received signal to exit application by killing ourselves */
48 static int last_signal;
49
50 /* set the polling period to 100ms */
51 static int polling_period = 100;
52
53 /* address by name on which to listen for incoming TCP/IP connections */
54 static char *bindto_name;
55
56 static int add_connection(struct service *service, struct command_context *cmd_ctx)
57 {
58 socklen_t address_size;
59 struct connection *c, **p;
60 int retval;
61 int flag = 1;
62
63 c = malloc(sizeof(struct connection));
64 c->fd = -1;
65 c->fd_out = -1;
66 memset(&c->sin, 0, sizeof(c->sin));
67 c->cmd_ctx = copy_command_context(cmd_ctx);
68 c->service = service;
69 c->input_pending = false;
70 c->priv = NULL;
71 c->next = NULL;
72
73 if (service->type == CONNECTION_TCP) {
74 address_size = sizeof(c->sin);
75
76 c->fd = accept(service->fd, (struct sockaddr *)&service->sin, &address_size);
77 c->fd_out = c->fd;
78
79 /* This increases performance dramatically for e.g. GDB load which
80 * does not have a sliding window protocol.
81 *
82 * Ignore errors from this fn as it probably just means less performance
83 */
84 setsockopt(c->fd, /* socket affected */
85 IPPROTO_TCP, /* set option at TCP level */
86 TCP_NODELAY, /* name of option */
87 (char *)&flag, /* the cast is historical cruft */
88 sizeof(int)); /* length of option value */
89
90 LOG_INFO("accepting '%s' connection on tcp/%s", service->name, service->port);
91 retval = service->new_connection(c);
92 if (retval != ERROR_OK) {
93 close_socket(c->fd);
94 LOG_ERROR("attempted '%s' connection rejected", service->name);
95 command_done(c->cmd_ctx);
96 free(c);
97 return retval;
98 }
99 } else if (service->type == CONNECTION_STDINOUT) {
100 c->fd = service->fd;
101 c->fd_out = fileno(stdout);
102
103 #ifdef _WIN32
104 /* we are using stdin/out so ignore ctrl-c under windoze */
105 SetConsoleCtrlHandler(NULL, TRUE);
106 #endif
107
108 /* do not check for new connections again on stdin */
109 service->fd = -1;
110
111 LOG_INFO("accepting '%s' connection from pipe", service->name);
112 retval = service->new_connection(c);
113 if (retval != ERROR_OK) {
114 LOG_ERROR("attempted '%s' connection rejected", service->name);
115 command_done(c->cmd_ctx);
116 free(c);
117 return retval;
118 }
119 } else if (service->type == CONNECTION_PIPE) {
120 c->fd = service->fd;
121 /* do not check for new connections again on stdin */
122 service->fd = -1;
123
124 char *out_file = alloc_printf("%so", service->port);
125 c->fd_out = open(out_file, O_WRONLY);
126 free(out_file);
127 if (c->fd_out == -1) {
128 LOG_ERROR("could not open %s", service->port);
129 command_done(c->cmd_ctx);
130 free(c);
131 return ERROR_FAIL;
132 }
133
134 LOG_INFO("accepting '%s' connection from pipe %s", service->name, service->port);
135 retval = service->new_connection(c);
136 if (retval != ERROR_OK) {
137 LOG_ERROR("attempted '%s' connection rejected", service->name);
138 command_done(c->cmd_ctx);
139 free(c);
140 return retval;
141 }
142 }
143
144 /* add to the end of linked list */
145 for (p = &service->connections; *p; p = &(*p)->next)
146 ;
147 *p = c;
148
149 if (service->max_connections != CONNECTION_LIMIT_UNLIMITED)
150 service->max_connections--;
151
152 return ERROR_OK;
153 }
154
155 static int remove_connection(struct service *service, struct connection *connection)
156 {
157 struct connection **p = &service->connections;
158 struct connection *c;
159
160 /* find connection */
161 while ((c = *p)) {
162 if (c->fd == connection->fd) {
163 service->connection_closed(c);
164 if (service->type == CONNECTION_TCP)
165 close_socket(c->fd);
166 else if (service->type == CONNECTION_PIPE) {
167 /* The service will listen to the pipe again */
168 c->service->fd = c->fd;
169 }
170
171 command_done(c->cmd_ctx);
172
173 /* delete connection */
174 *p = c->next;
175 free(c);
176
177 if (service->max_connections != CONNECTION_LIMIT_UNLIMITED)
178 service->max_connections++;
179
180 break;
181 }
182
183 /* redirect p to next list pointer */
184 p = &(*p)->next;
185 }
186
187 return ERROR_OK;
188 }
189
190 static void free_service(struct service *c)
191 {
192 free(c->name);
193 free(c->port);
194 free(c);
195 }
196
197 int add_service(const struct service_driver *driver, const char *port,
198 int max_connections, void *priv)
199 {
200 struct service *c, **p;
201 struct hostent *hp;
202 int so_reuseaddr_option = 1;
203
204 c = malloc(sizeof(struct service));
205
206 c->name = strdup(driver->name);
207 c->port = strdup(port);
208 c->max_connections = 1; /* Only TCP/IP ports can support more than one connection */
209 c->fd = -1;
210 c->connections = NULL;
211 c->new_connection_during_keep_alive = driver->new_connection_during_keep_alive_handler;
212 c->new_connection = driver->new_connection_handler;
213 c->input = driver->input_handler;
214 c->connection_closed = driver->connection_closed_handler;
215 c->keep_client_alive = driver->keep_client_alive_handler;
216 c->priv = priv;
217 c->next = NULL;
218 long portnumber;
219 if (strcmp(c->port, "pipe") == 0)
220 c->type = CONNECTION_STDINOUT;
221 else {
222 char *end;
223 portnumber = strtol(c->port, &end, 0);
224 if (!*end && (parse_long(c->port, &portnumber) == ERROR_OK)) {
225 c->portnumber = portnumber;
226 c->type = CONNECTION_TCP;
227 } else
228 c->type = CONNECTION_PIPE;
229 }
230
231 if (c->type == CONNECTION_TCP) {
232 c->max_connections = max_connections;
233
234 c->fd = socket(AF_INET, SOCK_STREAM, 0);
235 if (c->fd == -1) {
236 LOG_ERROR("error creating socket: %s", strerror(errno));
237 free_service(c);
238 return ERROR_FAIL;
239 }
240
241 setsockopt(c->fd,
242 SOL_SOCKET,
243 SO_REUSEADDR,
244 (void *)&so_reuseaddr_option,
245 sizeof(int));
246
247 socket_nonblock(c->fd);
248
249 memset(&c->sin, 0, sizeof(c->sin));
250 c->sin.sin_family = AF_INET;
251
252 if (!bindto_name)
253 c->sin.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
254 else {
255 hp = gethostbyname(bindto_name);
256 if (!hp) {
257 LOG_ERROR("couldn't resolve bindto address: %s", bindto_name);
258 close_socket(c->fd);
259 free_service(c);
260 return ERROR_FAIL;
261 }
262 memcpy(&c->sin.sin_addr, hp->h_addr_list[0], hp->h_length);
263 }
264 c->sin.sin_port = htons(c->portnumber);
265
266 if (bind(c->fd, (struct sockaddr *)&c->sin, sizeof(c->sin)) == -1) {
267 LOG_ERROR("couldn't bind %s to socket on port %d: %s", c->name, c->portnumber, strerror(errno));
268 close_socket(c->fd);
269 free_service(c);
270 return ERROR_FAIL;
271 }
272
273 #ifndef _WIN32
274 int segsize = 65536;
275 setsockopt(c->fd, IPPROTO_TCP, TCP_MAXSEG, &segsize, sizeof(int));
276 #endif
277 int window_size = 128 * 1024;
278
279 /* These setsockopt()s must happen before the listen() */
280
281 setsockopt(c->fd, SOL_SOCKET, SO_SNDBUF,
282 (char *)&window_size, sizeof(window_size));
283 setsockopt(c->fd, SOL_SOCKET, SO_RCVBUF,
284 (char *)&window_size, sizeof(window_size));
285
286 if (listen(c->fd, 1) == -1) {
287 LOG_ERROR("couldn't listen on socket: %s", strerror(errno));
288 close_socket(c->fd);
289 free_service(c);
290 return ERROR_FAIL;
291 }
292
293 struct sockaddr_in addr_in;
294 addr_in.sin_port = 0;
295 socklen_t addr_in_size = sizeof(addr_in);
296 if (getsockname(c->fd, (struct sockaddr *)&addr_in, &addr_in_size) == 0)
297 LOG_INFO("Listening on port %hu for %s connections",
298 ntohs(addr_in.sin_port), c->name);
299 } else if (c->type == CONNECTION_STDINOUT) {
300 c->fd = fileno(stdin);
301
302 #ifdef _WIN32
303 /* for win32 set stdin/stdout to binary mode */
304 if (_setmode(_fileno(stdout), _O_BINARY) < 0)
305 LOG_WARNING("cannot change stdout mode to binary");
306 if (_setmode(_fileno(stdin), _O_BINARY) < 0)
307 LOG_WARNING("cannot change stdin mode to binary");
308 if (_setmode(_fileno(stderr), _O_BINARY) < 0)
309 LOG_WARNING("cannot change stderr mode to binary");
310 #else
311 socket_nonblock(c->fd);
312 #endif
313 } else if (c->type == CONNECTION_PIPE) {
314 #ifdef _WIN32
315 /* we currently do not support named pipes under win32
316 * so exit openocd for now */
317 LOG_ERROR("Named pipes currently not supported under this os");
318 free_service(c);
319 return ERROR_FAIL;
320 #else
321 /* Pipe we're reading from */
322 c->fd = open(c->port, O_RDONLY | O_NONBLOCK);
323 if (c->fd == -1) {
324 LOG_ERROR("could not open %s", c->port);
325 free_service(c);
326 return ERROR_FAIL;
327 }
328 #endif
329 }
330
331 /* add to the end of linked list */
332 for (p = &services; *p; p = &(*p)->next)
333 ;
334 *p = c;
335
336 return ERROR_OK;
337 }
338
339 static void remove_connections(struct service *service)
340 {
341 struct connection *connection;
342
343 connection = service->connections;
344
345 while (connection) {
346 struct connection *tmp;
347
348 tmp = connection->next;
349 remove_connection(service, connection);
350 connection = tmp;
351 }
352 }
353
354 int remove_service(const char *name, const char *port)
355 {
356 struct service *tmp;
357 struct service *prev;
358
359 prev = services;
360
361 for (tmp = services; tmp; prev = tmp, tmp = tmp->next) {
362 if (!strcmp(tmp->name, name) && !strcmp(tmp->port, port)) {
363 remove_connections(tmp);
364
365 if (tmp == services)
366 services = tmp->next;
367 else
368 prev->next = tmp->next;
369
370 if (tmp->type != CONNECTION_STDINOUT)
371 close_socket(tmp->fd);
372
373 free(tmp->priv);
374 free_service(tmp);
375
376 return ERROR_OK;
377 }
378 }
379
380 return ERROR_OK;
381 }
382
383 static int remove_services(void)
384 {
385 struct service *c = services;
386
387 /* loop service */
388 while (c) {
389 struct service *next = c->next;
390
391 remove_connections(c);
392
393 free(c->name);
394
395 if (c->type == CONNECTION_PIPE) {
396 if (c->fd != -1)
397 close(c->fd);
398 }
399 free(c->port);
400 free(c->priv);
401 /* delete service */
402 free(c);
403
404 /* remember the last service for unlinking */
405 c = next;
406 }
407
408 services = NULL;
409
410 return ERROR_OK;
411 }
412
413 void server_keep_clients_alive(void)
414 {
415 for (struct service *s = services; s; s = s->next)
416 if (s->keep_client_alive)
417 for (struct connection *c = s->connections; c; c = c->next)
418 s->keep_client_alive(c);
419 }
420
421 int server_loop(struct command_context *command_context)
422 {
423 struct service *service;
424
425 bool poll_ok = true;
426
427 /* used in select() */
428 fd_set read_fds;
429 int fd_max;
430
431 /* used in accept() */
432 int retval;
433
434 int64_t next_event = timeval_ms() + polling_period;
435
436 #ifndef _WIN32
437 if (signal(SIGPIPE, SIG_IGN) == SIG_ERR)
438 LOG_ERROR("couldn't set SIGPIPE to SIG_IGN");
439 #endif
440
441 while (shutdown_openocd == CONTINUE_MAIN_LOOP) {
442 /* monitor sockets for activity */
443 fd_max = 0;
444 FD_ZERO(&read_fds);
445
446 /* add service and connection fds to read_fds */
447 for (service = services; service; service = service->next) {
448 if (service->fd != -1) {
449 /* listen for new connections */
450 FD_SET(service->fd, &read_fds);
451
452 if (service->fd > fd_max)
453 fd_max = service->fd;
454 }
455
456 if (service->connections) {
457 struct connection *c;
458
459 for (c = service->connections; c; c = c->next) {
460 /* check for activity on the connection */
461 FD_SET(c->fd, &read_fds);
462 if (c->fd > fd_max)
463 fd_max = c->fd;
464 }
465 }
466 }
467
468 struct timeval tv;
469 tv.tv_sec = 0;
470 if (poll_ok) {
471 /* we're just polling this iteration, this is faster on embedded
472 * hosts */
473 tv.tv_usec = 0;
474 retval = socket_select(fd_max + 1, &read_fds, NULL, NULL, &tv);
475 } else {
476 /* Every 100ms, can be changed with "poll_period" command */
477 int timeout_ms = next_event - timeval_ms();
478 if (timeout_ms < 0)
479 timeout_ms = 0;
480 else if (timeout_ms > polling_period)
481 timeout_ms = polling_period;
482 tv.tv_usec = timeout_ms * 1000;
483 /* Only while we're sleeping we'll let others run */
484 retval = socket_select(fd_max + 1, &read_fds, NULL, NULL, &tv);
485 }
486
487 if (retval == -1) {
488 #ifdef _WIN32
489
490 errno = WSAGetLastError();
491
492 if (errno == WSAEINTR)
493 FD_ZERO(&read_fds);
494 else {
495 LOG_ERROR("error during select: %s", strerror(errno));
496 return ERROR_FAIL;
497 }
498 #else
499
500 if (errno == EINTR)
501 FD_ZERO(&read_fds);
502 else {
503 LOG_ERROR("error during select: %s", strerror(errno));
504 return ERROR_FAIL;
505 }
506 #endif
507 }
508
509 if (retval == 0) {
510 /* We only execute these callbacks when there was nothing to do or we timed
511 *out */
512 target_call_timer_callbacks_now();
513 next_event = target_timer_next_event();
514 process_jim_events(command_context);
515
516 FD_ZERO(&read_fds); /* eCos leaves read_fds unchanged in this case! */
517
518 /* We timed out/there was nothing to do, timeout rather than poll next time
519 **/
520 poll_ok = false;
521 } else {
522 /* There was something to do, next time we'll just poll */
523 poll_ok = true;
524 }
525
526 /* This is a simple back-off algorithm where we immediately
527 * re-poll if we did something this time around.
528 *
529 * This greatly improves performance of DCC.
530 */
531 poll_ok = poll_ok || target_got_message();
532
533 for (service = services; service; service = service->next) {
534 /* handle new connections on listeners */
535 if ((service->fd != -1)
536 && (FD_ISSET(service->fd, &read_fds))) {
537 if (service->max_connections != 0)
538 add_connection(service, command_context);
539 else {
540 if (service->type == CONNECTION_TCP) {
541 struct sockaddr_in sin;
542 socklen_t address_size = sizeof(sin);
543 int tmp_fd;
544 tmp_fd = accept(service->fd,
545 (struct sockaddr *)&service->sin,
546 &address_size);
547 close_socket(tmp_fd);
548 }
549 LOG_INFO(
550 "rejected '%s' connection, no more connections allowed",
551 service->name);
552 }
553 }
554
555 /* handle activity on connections */
556 if (service->connections) {
557 struct connection *c;
558
559 for (c = service->connections; c; ) {
560 if ((c->fd >= 0 && FD_ISSET(c->fd, &read_fds)) || c->input_pending) {
561 retval = service->input(c);
562 if (retval != ERROR_OK) {
563 struct connection *next = c->next;
564 if (service->type == CONNECTION_PIPE ||
565 service->type == CONNECTION_STDINOUT) {
566 /* if connection uses a pipe then
567 * shutdown openocd on error */
568 shutdown_openocd = SHUTDOWN_REQUESTED;
569 }
570 remove_connection(service, c);
571 LOG_INFO("dropped '%s' connection",
572 service->name);
573 c = next;
574 continue;
575 }
576 }
577 c = c->next;
578 }
579 }
580 }
581
582 #ifdef _WIN32
583 MSG msg;
584 while (PeekMessage(&msg, NULL, 0, 0, PM_REMOVE)) {
585 if (msg.message == WM_QUIT)
586 shutdown_openocd = SHUTDOWN_WITH_SIGNAL_CODE;
587 }
588 #endif
589 }
590
591 /* when quit for signal or CTRL-C, run (eventually user implemented) "shutdown" */
592 if (shutdown_openocd == SHUTDOWN_WITH_SIGNAL_CODE)
593 command_run_line(command_context, "shutdown");
594
595 return shutdown_openocd == SHUTDOWN_WITH_ERROR_CODE ? ERROR_FAIL : ERROR_OK;
596 }
597
598 static void sig_handler(int sig)
599 {
600 /* store only first signal that hits us */
601 if (shutdown_openocd == CONTINUE_MAIN_LOOP) {
602 shutdown_openocd = SHUTDOWN_WITH_SIGNAL_CODE;
603 last_signal = sig;
604 LOG_DEBUG("Terminating on Signal %d", sig);
605 } else
606 LOG_DEBUG("Ignored extra Signal %d", sig);
607 }
608
609
610 #ifdef _WIN32
611 BOOL WINAPI control_handler(DWORD ctrl_type)
612 {
613 shutdown_openocd = SHUTDOWN_WITH_SIGNAL_CODE;
614 return TRUE;
615 }
616 #else
617 static void sigkey_handler(int sig)
618 {
619 /* ignore keystroke generated signals if not in foreground process group */
620
621 if (tcgetpgrp(STDIN_FILENO) > 0)
622 sig_handler(sig);
623 else
624 LOG_DEBUG("Ignored Signal %d", sig);
625 }
626 #endif
627
628
629 int server_host_os_entry(void)
630 {
631 /* this currently only calls WSAStartup on native win32 systems
632 * before any socket operations are performed.
633 * This is an issue if you call init in your config script */
634
635 #ifdef _WIN32
636 WORD version_requested;
637 WSADATA wsadata;
638
639 version_requested = MAKEWORD(2, 2);
640
641 if (WSAStartup(version_requested, &wsadata) != 0) {
642 LOG_ERROR("Failed to Open Winsock");
643 return ERROR_FAIL;
644 }
645 #endif
646 return ERROR_OK;
647 }
648
649 int server_host_os_close(void)
650 {
651 #ifdef _WIN32
652 WSACleanup();
653 #endif
654 return ERROR_OK;
655 }
656
657 int server_preinit(void)
658 {
659 #ifdef _WIN32
660 /* register ctrl-c handler */
661 SetConsoleCtrlHandler(control_handler, TRUE);
662
663 signal(SIGBREAK, sig_handler);
664 signal(SIGINT, sig_handler);
665 #else
666 signal(SIGHUP, sig_handler);
667 signal(SIGPIPE, sig_handler);
668 signal(SIGQUIT, sigkey_handler);
669 signal(SIGINT, sigkey_handler);
670 #endif
671 signal(SIGTERM, sig_handler);
672 signal(SIGABRT, sig_handler);
673
674 return ERROR_OK;
675 }
676
677 int server_init(struct command_context *cmd_ctx)
678 {
679 int ret = tcl_init();
680
681 if (ret != ERROR_OK)
682 return ret;
683
684 ret = telnet_init("Open On-Chip Debugger");
685
686 if (ret != ERROR_OK) {
687 remove_services();
688 return ret;
689 }
690
691 return ERROR_OK;
692 }
693
694 int server_quit(void)
695 {
696 remove_services();
697 target_quit();
698
699 #ifdef _WIN32
700 SetConsoleCtrlHandler(control_handler, FALSE);
701
702 return ERROR_OK;
703 #endif
704
705 /* return signal number so we can kill ourselves */
706 return last_signal;
707 }
708
709 void server_free(void)
710 {
711 tcl_service_free();
712 telnet_service_free();
713 jsp_service_free();
714
715 free(bindto_name);
716 }
717
718 void exit_on_signal(int sig)
719 {
720 #ifndef _WIN32
721 /* bring back default system handler and kill yourself */
722 signal(sig, SIG_DFL);
723 kill(getpid(), sig);
724 #endif
725 }
726
727 int connection_write(struct connection *connection, const void *data, int len)
728 {
729 if (len == 0) {
730 /* successful no-op. Sockets and pipes behave differently here... */
731 return 0;
732 }
733 if (connection->service->type == CONNECTION_TCP)
734 return write_socket(connection->fd_out, data, len);
735 else
736 return write(connection->fd_out, data, len);
737 }
738
739 int connection_read(struct connection *connection, void *data, int len)
740 {
741 if (connection->service->type == CONNECTION_TCP)
742 return read_socket(connection->fd, data, len);
743 else
744 return read(connection->fd, data, len);
745 }
746
747 /* tell the server we want to shut down */
748 COMMAND_HANDLER(handle_shutdown_command)
749 {
750 LOG_USER("shutdown command invoked");
751
752 shutdown_openocd = SHUTDOWN_REQUESTED;
753
754 command_run_line(CMD_CTX, "_run_pre_shutdown_commands");
755
756 if (CMD_ARGC == 1) {
757 if (!strcmp(CMD_ARGV[0], "error")) {
758 shutdown_openocd = SHUTDOWN_WITH_ERROR_CODE;
759 return ERROR_FAIL;
760 }
761 }
762
763 return ERROR_COMMAND_CLOSE_CONNECTION;
764 }
765
766 COMMAND_HANDLER(handle_poll_period_command)
767 {
768 if (CMD_ARGC == 0)
769 LOG_WARNING("You need to set a period value");
770 else
771 COMMAND_PARSE_NUMBER(int, CMD_ARGV[0], polling_period);
772
773 LOG_INFO("set servers polling period to %ums", polling_period);
774
775 return ERROR_OK;
776 }
777
778 COMMAND_HANDLER(handle_bindto_command)
779 {
780 switch (CMD_ARGC) {
781 case 0:
782 command_print(CMD, "bindto name: %s", bindto_name);
783 break;
784 case 1:
785 free(bindto_name);
786 bindto_name = strdup(CMD_ARGV[0]);
787 break;
788 default:
789 return ERROR_COMMAND_SYNTAX_ERROR;
790 }
791 return ERROR_OK;
792 }
793
794 static const struct command_registration server_command_handlers[] = {
795 {
796 .name = "shutdown",
797 .handler = &handle_shutdown_command,
798 .mode = COMMAND_ANY,
799 .usage = "",
800 .help = "shut the server down",
801 },
802 {
803 .name = "poll_period",
804 .handler = &handle_poll_period_command,
805 .mode = COMMAND_ANY,
806 .usage = "",
807 .help = "set the servers polling period",
808 },
809 {
810 .name = "bindto",
811 .handler = &handle_bindto_command,
812 .mode = COMMAND_CONFIG,
813 .usage = "[name]",
814 .help = "Specify address by name on which to listen for "
815 "incoming TCP/IP connections",
816 },
817 COMMAND_REGISTRATION_DONE
818 };
819
820 int server_register_commands(struct command_context *cmd_ctx)
821 {
822 int retval = telnet_register_commands(cmd_ctx);
823 if (retval != ERROR_OK)
824 return retval;
825
826 retval = tcl_register_commands(cmd_ctx);
827 if (retval != ERROR_OK)
828 return retval;
829
830 retval = jsp_register_commands(cmd_ctx);
831 if (retval != ERROR_OK)
832 return retval;
833
834 return register_commands(cmd_ctx, NULL, server_command_handlers);
835 }
836
837 COMMAND_HELPER(server_port_command, unsigned short *out)
838 {
839 switch (CMD_ARGC) {
840 case 0:
841 command_print(CMD, "%d", *out);
842 break;
843 case 1:
844 {
845 uint16_t port;
846 COMMAND_PARSE_NUMBER(u16, CMD_ARGV[0], port);
847 *out = port;
848 break;
849 }
850 default:
851 return ERROR_COMMAND_SYNTAX_ERROR;
852 }
853 return ERROR_OK;
854 }
855
856 COMMAND_HELPER(server_pipe_command, char **out)
857 {
858 switch (CMD_ARGC) {
859 case 0:
860 command_print(CMD, "%s", *out);
861 break;
862 case 1:
863 {
864 if (CMD_CTX->mode == COMMAND_EXEC) {
865 LOG_WARNING("unable to change server port after init");
866 return ERROR_COMMAND_ARGUMENT_INVALID;
867 }
868 free(*out);
869 *out = strdup(CMD_ARGV[0]);
870 break;
871 }
872 default:
873 return ERROR_COMMAND_SYNTAX_ERROR;
874 }
875 return ERROR_OK;
876 }

Linking to existing account procedure

If you already have an account and want to add another login method you MUST first sign in with your existing account and then change URL to read https://review.openocd.org/login/?link to get to this page again but this time it'll work for linking. Thank you.

SSH host keys fingerprints

1024 SHA256:YKx8b7u5ZWdcbp7/4AeXNaqElP49m6QrwfXaqQGJAOk gerrit-code-review@openocd.zylin.com (DSA)
384 SHA256:jHIbSQa4REvwCFG4cq5LBlBLxmxSqelQPem/EXIrxjk gerrit-code-review@openocd.org (ECDSA)
521 SHA256:UAOPYkU9Fjtcao0Ul/Rrlnj/OsQvt+pgdYSZ4jOYdgs gerrit-code-review@openocd.org (ECDSA)
256 SHA256:A13M5QlnozFOvTllybRZH6vm7iSt0XLxbA48yfc2yfY gerrit-code-review@openocd.org (ECDSA)
256 SHA256:spYMBqEYoAOtK7yZBrcwE8ZpYt6b68Cfh9yEVetvbXg gerrit-code-review@openocd.org (ED25519)
+--[ED25519 256]--+
|=..              |
|+o..   .         |
|*.o   . .        |
|+B . . .         |
|Bo. = o S        |
|Oo.+ + =         |
|oB=.* = . o      |
| =+=.+   + E     |
|. .=o   . o      |
+----[SHA256]-----+
2048 SHA256:0Onrb7/PHjpo6iVZ7xQX2riKN83FJ3KGU0TvI0TaFG4 gerrit-code-review@openocd.zylin.com (RSA)