1 /***************************************************************************
2 * Copyright (C) 2005 by Dominic Rath *
3 * Dominic.Rath@gmx.de *
5 * This program is free software; you can redistribute it and/or modify *
6 * it under the terms of the GNU General Public License as published by *
7 * the Free Software Foundation; either version 2 of the License, or *
8 * (at your option) any later version. *
10 * This program is distributed in the hope that it will be useful, *
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of *
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
13 * GNU General Public License for more details. *
15 * You should have received a copy of the GNU General Public License *
16 * along with this program; if not, write to the *
17 * Free Software Foundation, Inc., *
18 * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. *
19 ***************************************************************************/
24 #include "replacements.h"
26 #include "gdb_server.h"
30 #include "binarybuffer.h"
32 #include "breakpoints.h"
34 #include "target_request.h"
35 #include "configuration.h"
43 #define _DEBUG_GDB_IO_
46 extern int gdb_error(connection_t
*connection
, int retval
);
47 static unsigned short gdb_port
;
48 static const char *DIGITS
= "0123456789abcdef";
50 static void gdb_log_callback(void *priv
, const char *file
, int line
,
51 const char *function
, const char *string
);
61 /* target behaviour on gdb detach */
62 enum gdb_detach_mode detach_mode
= GDB_DETACH_RESUME
;
64 /* set if we are sending a memory map to gdb
65 * via qXfer:memory-map:read packet */
66 /* enabled by default*/
67 int gdb_use_memory_map
= 1;
68 /* enabled by default*/
69 int gdb_flash_program
= 1;
71 /* if set, data aborts cause an error to be reported in memory read packets
72 * see the code in gdb_read_memory_packet() for further explanations */
73 int gdb_report_data_abort
= 0;
75 int gdb_last_signal(target_t
*target
)
77 switch (target
->debug_reason
)
79 case DBG_REASON_DBGRQ
:
80 return 0x2; /* SIGINT */
81 case DBG_REASON_BREAKPOINT
:
82 case DBG_REASON_WATCHPOINT
:
83 case DBG_REASON_WPTANDBKPT
:
84 return 0x05; /* SIGTRAP */
85 case DBG_REASON_SINGLESTEP
:
86 return 0x05; /* SIGTRAP */
87 case DBG_REASON_NOTHALTED
:
88 return 0x0; /* no signal... shouldn't happen */
90 LOG_USER("undefined debug reason %d - target needs reset", target
->debug_reason
);
95 int check_pending(connection_t
*connection
, int timeout_s
, int *got_data
)
97 /* a non-blocking socket will block if there is 0 bytes available on the socket,
98 * but return with as many bytes as are available immediately
102 gdb_connection_t
*gdb_con
= connection
->priv
;
108 if (gdb_con
->buf_cnt
>0)
115 FD_SET(connection
->fd
, &read_fds
);
117 tv
.tv_sec
= timeout_s
;
119 if (select(connection
->fd
+ 1, &read_fds
, NULL
, NULL
, &tv
) == 0)
121 /* This can typically be because a "monitor" command took too long
122 * before printing any progress messages
126 return ERROR_GDB_TIMEOUT
;
132 *got_data
=FD_ISSET(connection
->fd
, &read_fds
)!=0;
136 int gdb_get_char(connection_t
*connection
, int* next_char
)
138 gdb_connection_t
*gdb_con
= connection
->priv
;
141 #ifdef _DEBUG_GDB_IO_
145 if (gdb_con
->buf_cnt
-- > 0)
147 *next_char
= *(gdb_con
->buf_p
++);
148 if (gdb_con
->buf_cnt
> 0)
149 connection
->input_pending
= 1;
151 connection
->input_pending
= 0;
153 #ifdef _DEBUG_GDB_IO_
154 LOG_DEBUG("returned char '%c' (0x%2.2x)", *next_char
, *next_char
);
162 retval
=check_pending(connection
, 1, NULL
);
163 if (retval
!=ERROR_OK
)
165 gdb_con
->buf_cnt
= read_socket(connection
->fd
, gdb_con
->buffer
, GDB_BUFFER_SIZE
);
166 if (gdb_con
->buf_cnt
> 0)
170 if (gdb_con
->buf_cnt
== 0)
173 return ERROR_SERVER_REMOTE_CLOSED
;
177 errno
= WSAGetLastError();
184 case WSAECONNABORTED
:
186 return ERROR_SERVER_REMOTE_CLOSED
;
189 return ERROR_SERVER_REMOTE_CLOSED
;
191 LOG_ERROR("read: %d", errno
);
202 return ERROR_SERVER_REMOTE_CLOSED
;
205 return ERROR_SERVER_REMOTE_CLOSED
;
207 LOG_ERROR("read: %s", strerror(errno
));
209 return ERROR_SERVER_REMOTE_CLOSED
;
214 #ifdef _DEBUG_GDB_IO_
215 debug_buffer
= malloc(gdb_con
->buf_cnt
+ 1);
216 memcpy(debug_buffer
, gdb_con
->buffer
, gdb_con
->buf_cnt
);
217 debug_buffer
[gdb_con
->buf_cnt
] = 0;
218 LOG_DEBUG("received '%s'", debug_buffer
);
222 gdb_con
->buf_p
= gdb_con
->buffer
;
224 *next_char
= *(gdb_con
->buf_p
++);
225 if (gdb_con
->buf_cnt
> 0)
226 connection
->input_pending
= 1;
228 connection
->input_pending
= 0;
229 #ifdef _DEBUG_GDB_IO_
230 LOG_DEBUG("returned char '%c' (0x%2.2x)", *next_char
, *next_char
);
236 int gdb_putback_char(connection_t
*connection
, int last_char
)
238 gdb_connection_t
*gdb_con
= connection
->priv
;
240 if (gdb_con
->buf_p
> gdb_con
->buffer
)
242 *(--gdb_con
->buf_p
) = last_char
;
247 LOG_ERROR("BUG: couldn't put character back");
253 /* The only way we can detect that the socket is closed is the first time
254 * we write to it, we will fail. Subsequent write operations will
255 * succeed. Shudder! */
256 int gdb_write(connection_t
*connection
, void *data
, int len
)
258 gdb_connection_t
*gdb_con
= connection
->priv
;
260 return ERROR_SERVER_REMOTE_CLOSED
;
262 if (write_socket(connection
->fd
, data
, len
) == len
)
267 return ERROR_SERVER_REMOTE_CLOSED
;
270 int gdb_put_packet_inner(connection_t
*connection
, char *buffer
, int len
)
273 unsigned char my_checksum
= 0;
274 #ifdef _DEBUG_GDB_IO_
279 gdb_connection_t
*gdb_con
= connection
->priv
;
281 for (i
= 0; i
< len
; i
++)
282 my_checksum
+= buffer
[i
];
284 #ifdef _DEBUG_GDB_IO_
286 * At this point we should have nothing in the input queue from GDB,
287 * however sometimes '-' is sent even though we've already received
288 * an ACK (+) for everything we've sent off.
293 if ((retval
=check_pending(connection
, 0, &gotdata
))!=ERROR_OK
)
297 if ((retval
= gdb_get_char(connection
, &reply
)) != ERROR_OK
)
299 LOG_WARNING("Discard unexpected char %c", reply
);
305 #ifdef _DEBUG_GDB_IO_
306 debug_buffer
= malloc(len
+ 1);
307 memcpy(debug_buffer
, buffer
, len
);
308 debug_buffer
[len
] = 0;
309 LOG_DEBUG("sending packet '$%s#%2.2x'", debug_buffer
, my_checksum
);
313 char local_buffer
[1024];
314 local_buffer
[0] = '$';
315 if (len
+4 <= sizeof(local_buffer
))
317 /* performance gain on smaller packets by only a single call to gdb_write() */
318 memcpy(local_buffer
+1, buffer
, len
++);
319 local_buffer
[len
++] = '#';
320 local_buffer
[len
++] = DIGITS
[(my_checksum
>> 4) & 0xf];
321 local_buffer
[len
++] = DIGITS
[my_checksum
& 0xf];
322 gdb_write(connection
, local_buffer
, len
);
326 /* larger packets are transmitted directly from caller supplied buffer
327 by several calls to gdb_write() to avoid dynamic allocation */
328 local_buffer
[1] = '#';
329 local_buffer
[2] = DIGITS
[(my_checksum
>> 4) & 0xf];
330 local_buffer
[3] = DIGITS
[my_checksum
& 0xf];
331 gdb_write(connection
, local_buffer
, 1);
332 gdb_write(connection
, buffer
, len
);
333 gdb_write(connection
, local_buffer
+1, 3);
336 if ((retval
= gdb_get_char(connection
, &reply
)) != ERROR_OK
)
341 else if (reply
== '-')
343 /* Stop sending output packets for now */
344 log_remove_callback(gdb_log_callback
, connection
);
345 LOG_WARNING("negative reply, retrying");
347 else if (reply
== 0x3)
350 if ((retval
= gdb_get_char(connection
, &reply
)) != ERROR_OK
)
354 else if (reply
== '-')
356 /* Stop sending output packets for now */
357 log_remove_callback(gdb_log_callback
, connection
);
358 LOG_WARNING("negative reply, retrying");
362 LOG_ERROR("unknown character 0x%2.2x in reply, dropping connection", reply
);
364 return ERROR_SERVER_REMOTE_CLOSED
;
369 LOG_ERROR("unknown character 0x%2.2x in reply, dropping connection", reply
);
371 return ERROR_SERVER_REMOTE_CLOSED
;
375 return ERROR_SERVER_REMOTE_CLOSED
;
380 int gdb_put_packet(connection_t
*connection
, char *buffer
, int len
)
382 gdb_connection_t
*gdb_con
= connection
->priv
;
384 int retval
= gdb_put_packet_inner(connection
, buffer
, len
);
389 int gdb_get_packet_inner(connection_t
*connection
, char *buffer
, int *len
)
395 unsigned char my_checksum
= 0;
396 gdb_connection_t
*gdb_con
= connection
->priv
;
402 if ((retval
= gdb_get_char(connection
, &character
)) != ERROR_OK
)
405 #ifdef _DEBUG_GDB_IO_
406 LOG_DEBUG("character: '%c'", character
);
414 /* gdb sends a dummy ack '+' at every remote connect - see remote_start_remote (remote.c)
415 * incase anyone tries to debug why they receive this warning every time */
416 LOG_WARNING("acknowledgment received, but no packet pending");
419 LOG_WARNING("negative acknowledgment, but no packet pending");
426 LOG_WARNING("ignoring character 0x%x", character
);
429 } while (character
!= '$');
434 gdb_connection_t
*gdb_con
= connection
->priv
;
437 /* The common case is that we have an entire packet with no escape chars.
438 * We need to leave at least 2 bytes in the buffer to have
439 * gdb_get_char() update various bits and bobs correctly.
441 if ((gdb_con
->buf_cnt
> 2) && ((gdb_con
->buf_cnt
+count
) < *len
))
443 /* The compiler will struggle a bit with constant propagation and
444 * aliasing, so we help it by showing that these values do not
445 * change inside the loop
448 char *buf
= gdb_con
->buf_p
;
449 int run
= gdb_con
->buf_cnt
- 2;
456 if (character
== '#')
458 /* Danger! character can be '#' when esc is
459 * used so we need an explicit boolean for done here.
465 if (character
== '}')
467 /* data transmitted in binary mode (X packet)
468 * uses 0x7d as escape character */
469 my_checksum
+= character
& 0xff;
472 my_checksum
+= character
& 0xff;
473 buffer
[count
++] = (character
^ 0x20) & 0xff;
476 my_checksum
+= character
& 0xff;
477 buffer
[count
++] = character
& 0xff;
481 gdb_con
->buf_cnt
-= i
;
487 LOG_ERROR("packet buffer too small");
488 return ERROR_GDB_BUFFER_TOO_SMALL
;
491 if ((retval
= gdb_get_char(connection
, &character
)) != ERROR_OK
)
494 if (character
== '#')
497 if (character
== '}')
499 /* data transmitted in binary mode (X packet)
500 * uses 0x7d as escape character */
501 my_checksum
+= character
& 0xff;
502 if ((retval
= gdb_get_char(connection
, &character
)) != ERROR_OK
)
504 my_checksum
+= character
& 0xff;
505 buffer
[count
++] = (character
^ 0x20) & 0xff;
509 my_checksum
+= character
& 0xff;
510 buffer
[count
++] = character
& 0xff;
517 if ((retval
= gdb_get_char(connection
, &character
)) != ERROR_OK
)
519 checksum
[0] = character
;
520 if ((retval
= gdb_get_char(connection
, &character
)) != ERROR_OK
)
522 checksum
[1] = character
;
525 if (my_checksum
== strtoul(checksum
, NULL
, 16))
527 gdb_write(connection
, "+", 1);
531 LOG_WARNING("checksum error, requesting retransmission");
532 gdb_write(connection
, "-", 1);
535 return ERROR_SERVER_REMOTE_CLOSED
;
540 int gdb_get_packet(connection_t
*connection
, char *buffer
, int *len
)
542 gdb_connection_t
*gdb_con
= connection
->priv
;
544 int retval
= gdb_get_packet_inner(connection
, buffer
, len
);
549 int gdb_output_con(connection_t
*connection
, const char* line
)
554 bin_size
= strlen(line
);
556 hex_buffer
= malloc(bin_size
*2 + 2);
557 if (hex_buffer
== NULL
)
558 return ERROR_GDB_BUFFER_TOO_SMALL
;
561 for (i
=0; i
<bin_size
; i
++)
562 snprintf(hex_buffer
+ 1 + i
*2, 3, "%2.2x", line
[i
]);
563 hex_buffer
[bin_size
*2+1] = 0;
565 gdb_put_packet(connection
, hex_buffer
, bin_size
*2 + 1);
571 int gdb_output(struct command_context_s
*context
, const char* line
)
573 /* this will be dumped to the log and also sent as an O packet if possible */
574 LOG_USER_N("%s", line
);
578 int gdb_program_handler(struct target_s
*target
, enum target_event event
, void *priv
)
580 struct command_context_s
*cmd_ctx
= priv
;
582 target_invoke_script(cmd_ctx
, target
, "gdb_program");
583 jtag_execute_queue();
588 int gdb_target_callback_event_handler(struct target_s
*target
, enum target_event event
, void *priv
)
590 connection_t
*connection
= priv
;
591 gdb_connection_t
*gdb_connection
= connection
->priv
;
597 case TARGET_EVENT_HALTED
:
598 /* In the GDB protocol when we are stepping or coninuing execution,
599 * we have a lingering reply. Upon receiving a halted event
600 * when we have that lingering packet, we reply to the original
601 * step or continue packet.
603 * Executing monitor commands can bring the target in and
604 * out of the running state so we'll see lots of TARGET_EVENT_XXX
605 * that are to be ignored.
607 if (gdb_connection
->frontend_state
== TARGET_RUNNING
)
609 /* stop forwarding log packets! */
610 log_remove_callback(gdb_log_callback
, connection
);
612 if (gdb_connection
->ctrl_c
)
615 gdb_connection
->ctrl_c
= 0;
619 signal
= gdb_last_signal(target
);
622 snprintf(sig_reply
, 4, "T%2.2x", signal
);
623 gdb_put_packet(connection
, sig_reply
, 3);
624 gdb_connection
->frontend_state
= TARGET_HALTED
;
627 case TARGET_EVENT_GDB_PROGRAM
:
628 gdb_program_handler(target
, event
, connection
->cmd_ctx
);
638 int gdb_new_connection(connection_t
*connection
)
640 gdb_connection_t
*gdb_connection
= malloc(sizeof(gdb_connection_t
));
641 gdb_service_t
*gdb_service
= connection
->service
->priv
;
645 connection
->priv
= gdb_connection
;
647 /* initialize gdb connection information */
648 gdb_connection
->buf_p
= gdb_connection
->buffer
;
649 gdb_connection
->buf_cnt
= 0;
650 gdb_connection
->ctrl_c
= 0;
651 gdb_connection
->frontend_state
= TARGET_HALTED
;
652 gdb_connection
->vflash_image
= NULL
;
653 gdb_connection
->closed
= 0;
654 gdb_connection
->busy
= 0;
656 /* send ACK to GDB for debug request */
657 gdb_write(connection
, "+", 1);
659 /* output goes through gdb connection */
660 command_set_output_handler(connection
->cmd_ctx
, gdb_output
, connection
);
662 /* register callback to be informed about target events */
663 target_register_event_callback(gdb_target_callback_event_handler
, connection
);
665 /* a gdb session just attached, try to put the target in halt mode.
669 * If the halt fails(e.g. target needs a reset, JTAG communication not
670 * working, etc.), then the GDB connect will succeed as
671 * the get_gdb_reg_list() will lie and return a register list with
674 * This allows GDB monitor commands to be run from a GDB init script to
675 * initialize the target
677 * Also, since the halt() is asynchronous target connect will be
678 * instantaneous and thus avoiding annoying timeout problems during
681 target_halt(gdb_service
->target
);
682 /* FIX!!!! could extended-remote work better here?
684 * wait a tiny bit for halted state or we just continue. The
685 * GDB register packet will then contain garbage
687 target_wait_state(gdb_service
->target
, TARGET_HALTED
, 500);
689 /* remove the initial ACK from the incoming buffer */
690 if ((retval
= gdb_get_char(connection
, &initial_ack
)) != ERROR_OK
)
693 /* FIX!!!??? would we actually ever receive a + here???
696 if (initial_ack
!= '+')
697 gdb_putback_char(connection
, initial_ack
);
702 int gdb_connection_closed(connection_t
*connection
)
704 gdb_service_t
*gdb_service
= connection
->service
->priv
;
705 gdb_connection_t
*gdb_connection
= connection
->priv
;
707 /* see if an image built with vFlash commands is left */
708 if (gdb_connection
->vflash_image
)
710 image_close(gdb_connection
->vflash_image
);
711 free(gdb_connection
->vflash_image
);
712 gdb_connection
->vflash_image
= NULL
;
715 /* if this connection registered a debug-message receiver delete it */
716 delete_debug_msg_receiver(connection
->cmd_ctx
, gdb_service
->target
);
718 if (connection
->priv
)
720 free(connection
->priv
);
721 connection
->priv
= NULL
;
725 LOG_ERROR("BUG: connection->priv == NULL");
728 target_unregister_event_callback(gdb_target_callback_event_handler
, connection
);
729 log_remove_callback(gdb_log_callback
, connection
);
734 void gdb_send_error(connection_t
*connection
, u8 the_error
)
737 snprintf(err
, 4, "E%2.2X", the_error
);
738 gdb_put_packet(connection
, err
, 3);
741 int gdb_last_signal_packet(connection_t
*connection
, target_t
*target
, char* packet
, int packet_size
)
746 signal
= gdb_last_signal(target
);
748 snprintf(sig_reply
, 4, "S%2.2x", signal
);
749 gdb_put_packet(connection
, sig_reply
, 3);
754 /* Convert register to string of bits. NB! The # of bits in the
755 * register might be non-divisible by 8(a byte), in which
756 * case an entire byte is shown. */
757 void gdb_str_to_target(target_t
*target
, char *tstr
, reg_t
*reg
)
764 buf_len
= CEIL(reg
->size
, 8);
766 for (i
= 0; i
< buf_len
; i
++)
768 tstr
[i
*2] = DIGITS
[(buf
[i
]>>4) & 0xf];
769 tstr
[i
*2+1] = DIGITS
[buf
[i
]&0xf];
773 void gdb_target_to_str(target_t
*target
, char *tstr
, char *str
)
775 int str_len
= strlen(tstr
);
780 LOG_ERROR("BUG: gdb value with uneven number of characters encountered");
784 for (i
= 0; i
< str_len
; i
+=2)
786 str
[str_len
- i
- 1] = tstr
[i
+ 1];
787 str
[str_len
- i
- 2] = tstr
[i
];
791 int gdb_get_registers_packet(connection_t
*connection
, target_t
*target
, char* packet
, int packet_size
)
796 int reg_packet_size
= 0;
801 #ifdef _DEBUG_GDB_IO_
805 if ((retval
= target
->type
->get_gdb_reg_list(target
, ®_list
, ®_list_size
)) != ERROR_OK
)
807 return gdb_error(connection
, retval
);
810 for (i
= 0; i
< reg_list_size
; i
++)
812 reg_packet_size
+= reg_list
[i
]->size
;
815 reg_packet
= malloc(CEIL(reg_packet_size
, 8) * 2);
816 reg_packet_p
= reg_packet
;
818 for (i
= 0; i
< reg_list_size
; i
++)
820 gdb_str_to_target(target
, reg_packet_p
, reg_list
[i
]);
821 reg_packet_p
+= CEIL(reg_list
[i
]->size
, 8) * 2;
824 #ifdef _DEBUG_GDB_IO_
827 reg_packet_p
= strndup(reg_packet
, CEIL(reg_packet_size
, 8) * 2);
828 LOG_DEBUG("reg_packet: %s", reg_packet_p
);
833 gdb_put_packet(connection
, reg_packet
, CEIL(reg_packet_size
, 8) * 2);
841 int gdb_set_registers_packet(connection_t
*connection
, target_t
*target
, char *packet
, int packet_size
)
849 #ifdef _DEBUG_GDB_IO_
853 /* skip command character */
859 LOG_WARNING("GDB set_registers packet with uneven characters received, dropping connection");
860 return ERROR_SERVER_REMOTE_CLOSED
;
863 if ((retval
= target
->type
->get_gdb_reg_list(target
, ®_list
, ®_list_size
)) != ERROR_OK
)
865 return gdb_error(connection
, retval
);
869 for (i
= 0; i
< reg_list_size
; i
++)
873 reg_arch_type_t
*arch_type
;
875 /* convert from GDB-string (target-endian) to hex-string (big-endian) */
876 hex_buf
= malloc(CEIL(reg_list
[i
]->size
, 8) * 2);
877 gdb_target_to_str(target
, packet_p
, hex_buf
);
879 /* convert hex-string to binary buffer */
880 bin_buf
= malloc(CEIL(reg_list
[i
]->size
, 8));
881 str_to_buf(hex_buf
, CEIL(reg_list
[i
]->size
, 8) * 2, bin_buf
, reg_list
[i
]->size
, 16);
883 /* get register arch_type, and call set method */
884 arch_type
= register_get_arch_type(reg_list
[i
]->arch_type
);
885 if (arch_type
== NULL
)
887 LOG_ERROR("BUG: encountered unregistered arch type");
890 arch_type
->set(reg_list
[i
], bin_buf
);
892 /* advance packet pointer */
893 packet_p
+= (CEIL(reg_list
[i
]->size
, 8) * 2);
899 /* free reg_t *reg_list[] array allocated by get_gdb_reg_list */
902 gdb_put_packet(connection
, "OK", 2);
907 int gdb_get_register_packet(connection_t
*connection
, target_t
*target
, char *packet
, int packet_size
)
910 int reg_num
= strtoul(packet
+ 1, NULL
, 16);
915 #ifdef _DEBUG_GDB_IO_
919 if ((retval
= target
->type
->get_gdb_reg_list(target
, ®_list
, ®_list_size
)) != ERROR_OK
)
921 return gdb_error(connection
, retval
);
924 if (reg_list_size
<= reg_num
)
926 LOG_ERROR("gdb requested a non-existing register");
930 reg_packet
= malloc(CEIL(reg_list
[reg_num
]->size
, 8) * 2);
932 gdb_str_to_target(target
, reg_packet
, reg_list
[reg_num
]);
934 gdb_put_packet(connection
, reg_packet
, CEIL(reg_list
[reg_num
]->size
, 8) * 2);
942 int gdb_set_register_packet(connection_t
*connection
, target_t
*target
, char *packet
, int packet_size
)
947 int reg_num
= strtoul(packet
+ 1, &separator
, 16);
951 reg_arch_type_t
*arch_type
;
955 if ((retval
= target
->type
->get_gdb_reg_list(target
, ®_list
, ®_list_size
)) != ERROR_OK
)
957 return gdb_error(connection
, retval
);
960 if (reg_list_size
< reg_num
)
962 LOG_ERROR("gdb requested a non-existing register");
963 return ERROR_SERVER_REMOTE_CLOSED
;
966 if (*separator
!= '=')
968 LOG_ERROR("GDB 'set register packet', but no '=' following the register number");
969 return ERROR_SERVER_REMOTE_CLOSED
;
972 /* convert from GDB-string (target-endian) to hex-string (big-endian) */
973 hex_buf
= malloc(CEIL(reg_list
[reg_num
]->size
, 8) * 2);
974 gdb_target_to_str(target
, separator
+ 1, hex_buf
);
976 /* convert hex-string to binary buffer */
977 bin_buf
= malloc(CEIL(reg_list
[reg_num
]->size
, 8));
978 str_to_buf(hex_buf
, CEIL(reg_list
[reg_num
]->size
, 8) * 2, bin_buf
, reg_list
[reg_num
]->size
, 16);
980 /* get register arch_type, and call set method */
981 arch_type
= register_get_arch_type(reg_list
[reg_num
]->arch_type
);
982 if (arch_type
== NULL
)
984 LOG_ERROR("BUG: encountered unregistered arch type");
987 arch_type
->set(reg_list
[reg_num
], bin_buf
);
989 gdb_put_packet(connection
, "OK", 2);
998 int gdb_error(connection_t
*connection
, int retval
)
1002 case ERROR_TARGET_DATA_ABORT
:
1003 gdb_send_error(connection
, EIO
);
1005 case ERROR_TARGET_TRANSLATION_FAULT
:
1006 gdb_send_error(connection
, EFAULT
);
1008 case ERROR_TARGET_UNALIGNED_ACCESS
:
1009 gdb_send_error(connection
, EFAULT
);
1011 case ERROR_TARGET_NOT_HALTED
:
1012 gdb_send_error(connection
, EFAULT
);
1015 /* This could be that the target reset itself. */
1016 LOG_ERROR("unexpected error %i", retval
);
1017 gdb_send_error(connection
, EFAULT
);
1024 /* We don't have to worry about the default 2 second timeout for GDB packets,
1025 * because GDB breaks up large memory reads into smaller reads.
1027 * 8191 bytes by the looks of it. Why 8191 bytes instead of 8192?????
1029 int gdb_read_memory_packet(connection_t
*connection
, target_t
*target
, char *packet
, int packet_size
)
1038 int retval
= ERROR_OK
;
1040 /* skip command character */
1043 addr
= strtoul(packet
, &separator
, 16);
1045 if (*separator
!= ',')
1047 LOG_ERROR("incomplete read memory packet received, dropping connection");
1048 return ERROR_SERVER_REMOTE_CLOSED
;
1051 len
= strtoul(separator
+1, NULL
, 16);
1053 buffer
= malloc(len
);
1055 LOG_DEBUG("addr: 0x%8.8x, len: 0x%8.8x", addr
, len
);
1057 retval
= target_read_buffer(target
, addr
, len
, buffer
);
1059 if ((retval
== ERROR_TARGET_DATA_ABORT
) && (!gdb_report_data_abort
))
1061 /* TODO : Here we have to lie and send back all zero's lest stack traces won't work.
1062 * At some point this might be fixed in GDB, in which case this code can be removed.
1064 * OpenOCD developers are acutely aware of this problem, but there is nothing
1065 * gained by involving the user in this problem that hopefully will get resolved
1068 * http://sourceware.org/cgi-bin/gnatsweb.pl?cmd=view%20audit-trail&database=gdb&pr=2395
1070 * For now, the default is to fix up things to make current GDB versions work.
1071 * This can be overwritten using the gdb_report_data_abort <'enable'|'disable'> command.
1073 memset(buffer
, 0, len
);
1077 if (retval
== ERROR_OK
)
1079 hex_buffer
= malloc(len
* 2 + 1);
1082 for (i
= 0; i
< len
; i
++)
1085 hex_buffer
[2 * i
] = DIGITS
[(t
>> 4) & 0xf];
1086 hex_buffer
[2 * i
+ 1] = DIGITS
[t
& 0xf];
1089 gdb_put_packet(connection
, hex_buffer
, len
* 2);
1095 retval
= gdb_error(connection
, retval
);
1103 int gdb_write_memory_packet(connection_t
*connection
, target_t
*target
, char *packet
, int packet_size
)
1114 /* skip command character */
1117 addr
= strtoul(packet
, &separator
, 16);
1119 if (*separator
!= ',')
1121 LOG_ERROR("incomplete write memory packet received, dropping connection");
1122 return ERROR_SERVER_REMOTE_CLOSED
;
1125 len
= strtoul(separator
+1, &separator
, 16);
1127 if (*(separator
++) != ':')
1129 LOG_ERROR("incomplete write memory packet received, dropping connection");
1130 return ERROR_SERVER_REMOTE_CLOSED
;
1133 buffer
= malloc(len
);
1135 LOG_DEBUG("addr: 0x%8.8x, len: 0x%8.8x", addr
, len
);
1137 for (i
=0; i
<len
; i
++)
1140 sscanf(separator
+ 2*i
, "%2x", &tmp
);
1144 retval
= target_write_buffer(target
, addr
, len
, buffer
);
1146 if (retval
== ERROR_OK
)
1148 gdb_put_packet(connection
, "OK", 2);
1152 retval
= gdb_error(connection
, retval
);
1160 int gdb_write_memory_binary_packet(connection_t
*connection
, target_t
*target
, char *packet
, int packet_size
)
1168 /* skip command character */
1171 addr
= strtoul(packet
, &separator
, 16);
1173 if (*separator
!= ',')
1175 LOG_ERROR("incomplete write memory binary packet received, dropping connection");
1176 return ERROR_SERVER_REMOTE_CLOSED
;
1179 len
= strtoul(separator
+1, &separator
, 16);
1181 if (*(separator
++) != ':')
1183 LOG_ERROR("incomplete write memory binary packet received, dropping connection");
1184 return ERROR_SERVER_REMOTE_CLOSED
;
1190 LOG_DEBUG("addr: 0x%8.8x, len: 0x%8.8x", addr
, len
);
1192 retval
= target_write_buffer(target
, addr
, len
, (u8
*)separator
);
1195 if (retval
== ERROR_OK
)
1197 gdb_put_packet(connection
, "OK", 2);
1201 if ((retval
= gdb_error(connection
, retval
)) != ERROR_OK
)
1208 void gdb_step_continue_packet(connection_t
*connection
, target_t
*target
, char *packet
, int packet_size
)
1215 if (packet_size
> 1)
1217 packet
[packet_size
] = 0;
1218 address
= strtoul(packet
+ 1, NULL
, 16);
1225 if (packet
[0] == 'c')
1227 LOG_DEBUG("continue");
1228 target_invoke_script(connection
->cmd_ctx
, target
, "pre_resume");
1229 target_resume(target
, current
, address
, 0, 0); /* resume at current address, don't handle breakpoints, not debugging */
1231 else if (packet
[0] == 's')
1234 target
->type
->step(target
, current
, address
, 0); /* step at current or address, don't handle breakpoints */
1238 int gdb_breakpoint_watchpoint_packet(connection_t
*connection
, target_t
*target
, char *packet
, int packet_size
)
1241 enum breakpoint_type bp_type
= BKPT_SOFT
/* dummy init to avoid warning */;
1242 enum watchpoint_rw wp_type
;
1250 type
= strtoul(packet
+ 1, &separator
, 16);
1252 if (type
== 0) /* memory breakpoint */
1253 bp_type
= BKPT_SOFT
;
1254 else if (type
== 1) /* hardware breakpoint */
1255 bp_type
= BKPT_HARD
;
1256 else if (type
== 2) /* write watchpoint */
1257 wp_type
= WPT_WRITE
;
1258 else if (type
== 3) /* read watchpoint */
1260 else if (type
== 4) /* access watchpoint */
1261 wp_type
= WPT_ACCESS
;
1263 if (*separator
!= ',')
1265 LOG_ERROR("incomplete breakpoint/watchpoint packet received, dropping connection");
1266 return ERROR_SERVER_REMOTE_CLOSED
;
1269 address
= strtoul(separator
+1, &separator
, 16);
1271 if (*separator
!= ',')
1273 LOG_ERROR("incomplete breakpoint/watchpoint packet received, dropping connection");
1274 return ERROR_SERVER_REMOTE_CLOSED
;
1277 size
= strtoul(separator
+1, &separator
, 16);
1283 if (packet
[0] == 'Z')
1285 if ((retval
= breakpoint_add(target
, address
, size
, bp_type
)) != ERROR_OK
)
1287 if ((retval
= gdb_error(connection
, retval
)) != ERROR_OK
)
1292 gdb_put_packet(connection
, "OK", 2);
1297 breakpoint_remove(target
, address
);
1298 gdb_put_packet(connection
, "OK", 2);
1305 if (packet
[0] == 'Z')
1307 if ((retval
= watchpoint_add(target
, address
, size
, type
-2, 0, 0xffffffffu
)) != ERROR_OK
)
1309 if ((retval
= gdb_error(connection
, retval
)) != ERROR_OK
)
1314 gdb_put_packet(connection
, "OK", 2);
1319 watchpoint_remove(target
, address
);
1320 gdb_put_packet(connection
, "OK", 2);
1331 /* print out a string and allocate more space as needed, mainly used for XML at this point */
1332 void xml_printf(int *retval
, char **xml
, int *pos
, int *size
, const char *fmt
, ...)
1334 if (*retval
!= ERROR_OK
)
1342 if ((*xml
== NULL
) || (!first
))
1344 /* start by 0 to exercise all the code paths.
1345 * Need minimum 2 bytes to fit 1 char and 0 terminator. */
1347 *size
= *size
* 2 + 2;
1349 *xml
= realloc(*xml
, *size
);
1354 *retval
= ERROR_SERVER_REMOTE_CLOSED
;
1362 ret
= vsnprintf(*xml
+ *pos
, *size
- *pos
, fmt
, ap
);
1364 if ((ret
> 0) && ((ret
+ 1) < *size
- *pos
))
1369 /* there was just enough or not enough space, allocate more. */
1374 static int decode_xfer_read(char *buf
, char **annex
, int *ofs
, unsigned int *len
)
1378 /* Extract and NUL-terminate the annex. */
1380 while (*buf
&& *buf
!= ':')
1386 /* After the read marker and annex, qXfer looks like a
1387 * traditional 'm' packet. */
1389 *ofs
= strtoul(buf
, &separator
, 16);
1391 if (*separator
!= ',')
1394 *len
= strtoul(separator
+1, NULL
, 16);
1399 int gdb_calc_blocksize(flash_bank_t
*bank
)
1402 int block_size
= 0xffffffff;
1404 /* loop through all sectors and return smallest sector size */
1406 for (i
= 0; i
< bank
->num_sectors
; i
++)
1408 if (bank
->sectors
[i
].size
< block_size
)
1409 block_size
= bank
->sectors
[i
].size
;
1415 static int compare_bank (const void * a
, const void * b
)
1417 flash_bank_t
*b1
, *b2
;
1418 b1
=*((flash_bank_t
**)a
);
1419 b2
=*((flash_bank_t
**)b
);
1421 if (b1
->base
==b2
->base
)
1424 } else if (b1
->base
>b2
->base
)
1433 int gdb_query_packet(connection_t
*connection
, target_t
*target
, char *packet
, int packet_size
)
1435 command_context_t
*cmd_ctx
= connection
->cmd_ctx
;
1437 if (strstr(packet
, "qRcmd,"))
1439 if (packet_size
> 6)
1443 cmd
= malloc((packet_size
- 6)/2 + 1);
1444 for (i
=0; i
< (packet_size
- 6)/2; i
++)
1447 sscanf(packet
+ 6 + 2*i
, "%2x", &tmp
);
1450 cmd
[(packet_size
- 6)/2] = 0x0;
1452 /* We want to print all debug output to GDB connection */
1453 log_add_callback(gdb_log_callback
, connection
);
1454 target_call_timer_callbacks_now();
1455 command_run_line(cmd_ctx
, cmd
);
1456 target_call_timer_callbacks_now();
1457 log_remove_callback(gdb_log_callback
, connection
);
1460 gdb_put_packet(connection
, "OK", 2);
1463 else if (strstr(packet
, "qCRC:"))
1465 if (packet_size
> 5)
1474 /* skip command character */
1477 addr
= strtoul(packet
, &separator
, 16);
1479 if (*separator
!= ',')
1481 LOG_ERROR("incomplete read memory packet received, dropping connection");
1482 return ERROR_SERVER_REMOTE_CLOSED
;
1485 len
= strtoul(separator
+ 1, NULL
, 16);
1487 retval
= target_checksum_memory(target
, addr
, len
, &checksum
);
1489 if (retval
== ERROR_OK
)
1491 snprintf(gdb_reply
, 10, "C%8.8x", checksum
);
1492 gdb_put_packet(connection
, gdb_reply
, 9);
1496 if ((retval
= gdb_error(connection
, retval
)) != ERROR_OK
)
1503 else if (strstr(packet
, "qSupported"))
1505 /* we currently support packet size and qXfer:memory-map:read (if enabled)
1506 * disable qXfer:features:read for the moment */
1507 int retval
= ERROR_OK
;
1508 char *buffer
= NULL
;
1512 xml_printf(&retval
, &buffer
, &pos
, &size
,
1513 "PacketSize=%x;qXfer:memory-map:read%c;qXfer:features:read-",
1514 (GDB_BUFFER_SIZE
- 1), ((gdb_use_memory_map
== 1)&&(flash_get_bank_count()>0)) ? '+' : '-');
1516 if (retval
!= ERROR_OK
)
1518 gdb_send_error(connection
, 01);
1522 gdb_put_packet(connection
, buffer
, strlen(buffer
));
1527 else if (strstr(packet
, "qXfer:memory-map:read::")&&(flash_get_bank_count()>0))
1529 /* We get away with only specifying flash here. Regions that are not
1530 * specified are treated as if we provided no memory map(if not we
1531 * could detect the holes and mark them as RAM).
1532 * Normally we only execute this code once, but no big deal if we
1533 * have to regenerate it a couple of times. */
1539 int retval
= ERROR_OK
;
1546 /* skip command character */
1549 offset
= strtoul(packet
, &separator
, 16);
1550 length
= strtoul(separator
+ 1, &separator
, 16);
1552 xml_printf(&retval
, &xml
, &pos
, &size
, "<memory-map>\n");
1555 sort banks in ascending order, we need to make non-flash memory be ram(or rather
1556 read/write) by default for GDB.
1557 GDB does not have a concept of non-cacheable read/write memory.
1559 flash_bank_t
**banks
=malloc(sizeof(flash_bank_t
*)*flash_get_bank_count());
1562 for (i
=0; i
<flash_get_bank_count(); i
++)
1564 p
= get_flash_bank_by_num(i
);
1568 retval
= ERROR_FAIL
;
1569 gdb_send_error(connection
, retval
);
1575 qsort(banks
, flash_get_bank_count(), sizeof(flash_bank_t
*), compare_bank
);
1578 for (i
=0; i
<flash_get_bank_count(); i
++)
1582 if (ram_start
<p
->base
)
1584 xml_printf(&retval
, &xml
, &pos
, &size
, "<memory type=\"ram\" start=\"0x%x\" length=\"0x%x\"/>\n",
1585 ram_start
, p
->base
-ram_start
);
1588 /* if device has uneven sector sizes, eg. str7, lpc
1589 * we pass the smallest sector size to gdb memory map */
1590 blocksize
= gdb_calc_blocksize(p
);
1592 xml_printf(&retval
, &xml
, &pos
, &size
, "<memory type=\"flash\" start=\"0x%x\" length=\"0x%x\">\n" \
1593 "<property name=\"blocksize\">0x%x</property>\n" \
1595 p
->base
, p
->size
, blocksize
);
1596 ram_start
=p
->base
+p
->size
;
1600 xml_printf(&retval
, &xml
, &pos
, &size
, "<memory type=\"ram\" start=\"0x%x\" length=\"0x%x\"/>\n",
1601 ram_start
, 0-ram_start
);
1604 /* a flash chip could be at the very end of the 32 bit address space, in which case
1605 ram_start will be precisely 0 */
1611 xml_printf(&retval
, &xml
, &pos
, &size
, "</memory-map>\n");
1613 if (retval
!= ERROR_OK
)
1615 gdb_send_error(connection
, retval
);
1619 if (offset
+ length
> pos
)
1621 length
= pos
- offset
;
1624 char *t
= malloc(length
+ 1);
1626 memcpy(t
+ 1, xml
+ offset
, length
);
1627 gdb_put_packet(connection
, t
, length
+ 1);
1633 else if (strstr(packet
, "qXfer:features:read:"))
1638 int retval
= ERROR_OK
;
1641 unsigned int length
;
1644 /* skip command character */
1647 if (decode_xfer_read(packet
, &annex
, &offset
, &length
) < 0)
1649 gdb_send_error(connection
, 01);
1653 if (strcmp(annex
, "target.xml") != 0)
1655 gdb_send_error(connection
, 01);
1659 xml_printf(&retval
, &xml
, &pos
, &size
, \
1660 "l<target version=\"1.0\">\n<architecture>arm</architecture>\n</target>\n");
1662 if (retval
!= ERROR_OK
)
1664 gdb_send_error(connection
, retval
);
1668 gdb_put_packet(connection
, xml
, strlen(xml
));
1674 gdb_put_packet(connection
, "", 0);
1678 int gdb_v_packet(connection_t
*connection
, target_t
*target
, char *packet
, int packet_size
)
1680 gdb_connection_t
*gdb_connection
= connection
->priv
;
1681 gdb_service_t
*gdb_service
= connection
->service
->priv
;
1684 /* if flash programming disabled - send a empty reply */
1686 if (gdb_flash_program
== 0)
1688 gdb_put_packet(connection
, "", 0);
1692 if (strstr(packet
, "vFlashErase:"))
1695 unsigned long length
;
1697 char *parse
= packet
+ 12;
1700 LOG_ERROR("incomplete vFlashErase packet received, dropping connection");
1701 return ERROR_SERVER_REMOTE_CLOSED
;
1704 addr
= strtoul(parse
, &parse
, 16);
1706 if (*(parse
++) != ',' || *parse
== '\0')
1708 LOG_ERROR("incomplete vFlashErase packet received, dropping connection");
1709 return ERROR_SERVER_REMOTE_CLOSED
;
1712 length
= strtoul(parse
, &parse
, 16);
1716 LOG_ERROR("incomplete vFlashErase packet received, dropping connection");
1717 return ERROR_SERVER_REMOTE_CLOSED
;
1720 /* assume all sectors need erasing - stops any problems
1721 * when flash_write is called multiple times */
1724 /* perform any target specific operations before the erase */
1725 target_call_event_callbacks(gdb_service
->target
, TARGET_EVENT_GDB_PROGRAM
);
1728 if ((result
= flash_erase_address_range(gdb_service
->target
, addr
, length
)) != ERROR_OK
)
1730 /* GDB doesn't evaluate the actual error number returned,
1731 * treat a failed erase as an I/O error
1733 gdb_send_error(connection
, EIO
);
1734 LOG_ERROR("flash_erase returned %i", result
);
1737 gdb_put_packet(connection
, "OK", 2);
1742 if (strstr(packet
, "vFlashWrite:"))
1745 unsigned long length
;
1746 char *parse
= packet
+ 12;
1750 LOG_ERROR("incomplete vFlashErase packet received, dropping connection");
1751 return ERROR_SERVER_REMOTE_CLOSED
;
1753 addr
= strtoul(parse
, &parse
, 16);
1754 if (*(parse
++) != ':')
1756 LOG_ERROR("incomplete vFlashErase packet received, dropping connection");
1757 return ERROR_SERVER_REMOTE_CLOSED
;
1759 length
= packet_size
- (parse
- packet
);
1761 /* create a new image if there isn't already one */
1762 if (gdb_connection
->vflash_image
== NULL
)
1764 gdb_connection
->vflash_image
= malloc(sizeof(image_t
));
1765 image_open(gdb_connection
->vflash_image
, "", "build");
1768 /* create new section with content from packet buffer */
1769 image_add_section(gdb_connection
->vflash_image
, addr
, length
, 0x0, (u8
*)parse
);
1771 gdb_put_packet(connection
, "OK", 2);
1776 if (!strcmp(packet
, "vFlashDone"))
1780 /* process the flashing buffer. No need to erase as GDB
1781 * always issues a vFlashErase first. */
1782 if ((result
= flash_write(gdb_service
->target
, gdb_connection
->vflash_image
, &written
, 0)) != ERROR_OK
)
1784 if (result
== ERROR_FLASH_DST_OUT_OF_BANK
)
1785 gdb_put_packet(connection
, "E.memtype", 9);
1787 gdb_send_error(connection
, EIO
);
1791 LOG_DEBUG("wrote %u bytes from vFlash image to flash", written
);
1792 gdb_put_packet(connection
, "OK", 2);
1795 image_close(gdb_connection
->vflash_image
);
1796 free(gdb_connection
->vflash_image
);
1797 gdb_connection
->vflash_image
= NULL
;
1802 gdb_put_packet(connection
, "", 0);
1806 int gdb_detach(connection_t
*connection
, target_t
*target
)
1808 switch( detach_mode
)
1810 case GDB_DETACH_RESUME
:
1811 target_invoke_script(connection
->cmd_ctx
, target
, "pre_resume");
1812 target_resume(target
, 1, 0, 1, 0);
1815 case GDB_DETACH_RESET
:
1816 /* FIX?? make this configurable?? */
1817 target_process_reset(connection
->cmd_ctx
, RESET_HALT
);
1820 case GDB_DETACH_HALT
:
1821 target_halt(target
);
1824 case GDB_DETACH_NOTHING
:
1828 gdb_put_packet(connection
, "OK", 2);
1833 static void gdb_log_callback(void *priv
, const char *file
, int line
,
1834 const char *function
, const char *string
)
1836 connection_t
*connection
= priv
;
1837 gdb_connection_t
*gdb_con
= connection
->priv
;
1841 /* do not reply this using the O packet */
1845 gdb_output_con(connection
, string
);
1848 /* Do not allocate this on the stack */
1849 char gdb_packet_buffer
[GDB_BUFFER_SIZE
];
1851 int gdb_input_inner(connection_t
*connection
)
1853 gdb_service_t
*gdb_service
= connection
->service
->priv
;
1854 target_t
*target
= gdb_service
->target
;
1855 char *packet
=gdb_packet_buffer
;
1858 gdb_connection_t
*gdb_con
= connection
->priv
;
1859 static int extended_protocol
= 0;
1861 /* drain input buffer */
1864 packet_size
= GDB_BUFFER_SIZE
-1;
1865 if ((retval
= gdb_get_packet(connection
, packet
, &packet_size
)) != ERROR_OK
)
1870 /* terminate with zero */
1871 packet
[packet_size
] = 0;
1873 LOG_DEBUG("received packet: '%s'", packet
);
1875 if (packet_size
> 0)
1881 /* Hct... -- set thread
1882 * we don't have threads, send empty reply */
1883 gdb_put_packet(connection
, NULL
, 0);
1886 retval
= gdb_query_packet(connection
, target
, packet
, packet_size
);
1889 retval
= gdb_get_registers_packet(connection
, target
, packet
, packet_size
);
1892 retval
= gdb_set_registers_packet(connection
, target
, packet
, packet_size
);
1895 retval
= gdb_get_register_packet(connection
, target
, packet
, packet_size
);
1898 retval
= gdb_set_register_packet(connection
, target
, packet
, packet_size
);
1901 retval
= gdb_read_memory_packet(connection
, target
, packet
, packet_size
);
1904 retval
= gdb_write_memory_packet(connection
, target
, packet
, packet_size
);
1908 retval
= gdb_breakpoint_watchpoint_packet(connection
, target
, packet
, packet_size
);
1911 gdb_last_signal_packet(connection
, target
, packet
, packet_size
);
1916 if (target
->state
!= TARGET_HALTED
)
1918 /* If the target isn't in the halted state, then we can't
1919 * step/continue. This might be early setup, etc.
1922 snprintf(sig_reply
, 4, "T%2.2x", 2);
1923 gdb_put_packet(connection
, sig_reply
, 3);
1926 /* We're running/stepping, in which case we can
1927 * forward log output until the target is halted
1929 gdb_connection_t
*gdb_con
= connection
->priv
;
1930 gdb_con
->frontend_state
= TARGET_RUNNING
;
1931 log_add_callback(gdb_log_callback
, connection
);
1932 gdb_step_continue_packet(connection
, target
, packet
, packet_size
);
1937 retval
= gdb_v_packet(connection
, target
, packet
, packet_size
);
1940 retval
= gdb_detach(connection
, target
);
1941 extended_protocol
= 0;
1944 if ((retval
= gdb_write_memory_binary_packet(connection
, target
, packet
, packet_size
)) != ERROR_OK
)
1948 if (extended_protocol
!= 0)
1950 gdb_put_packet(connection
, "OK", 2);
1951 return ERROR_SERVER_REMOTE_CLOSED
;
1953 /* handle extended remote protocol */
1954 extended_protocol
= 1;
1955 gdb_put_packet(connection
, "OK", 2);
1958 /* handle extended restart packet */
1959 command_run_linef(connection
->cmd_ctx
, "ocd_gdb_restart %d", get_num_by_target(target
));
1962 /* ignore unkown packets */
1963 LOG_DEBUG("ignoring 0x%2.2x packet", packet
[0]);
1964 gdb_put_packet(connection
, NULL
, 0);
1968 /* if a packet handler returned an error, exit input loop */
1969 if (retval
!= ERROR_OK
)
1973 if (gdb_con
->ctrl_c
)
1975 if (target
->state
== TARGET_RUNNING
)
1977 target_halt(target
);
1978 gdb_con
->ctrl_c
= 0;
1982 } while (gdb_con
->buf_cnt
> 0);
1987 int gdb_input(connection_t
*connection
)
1989 int retval
= gdb_input_inner(connection
);
1990 gdb_connection_t
*gdb_con
= connection
->priv
;
1991 if (retval
== ERROR_SERVER_REMOTE_CLOSED
)
1994 /* logging does not propagate the error, yet can set th gdb_con->closed flag */
1995 if (gdb_con
->closed
)
1996 return ERROR_SERVER_REMOTE_CLOSED
;
1998 /* we'll recover from any other errors(e.g. temporary timeouts, etc.) */
2004 gdb_service_t
*gdb_service
;
2005 target_t
*target
= targets
;
2010 LOG_WARNING("no gdb ports allocated as no target has been specified");
2016 LOG_WARNING("no gdb port specified, using default port 3333");
2022 char service_name
[8];
2024 snprintf(service_name
, 8, "gdb-%2.2i", i
);
2026 gdb_service
= malloc(sizeof(gdb_service_t
));
2027 gdb_service
->target
= target
;
2029 add_service("gdb", CONNECTION_GDB
, gdb_port
+ i
, 1, gdb_new_connection
, gdb_input
, gdb_connection_closed
, gdb_service
);
2031 LOG_DEBUG("gdb service for target %s at port %i", target
->type
->name
, gdb_port
+ i
);
2034 target
= target
->next
;
2040 /* daemon configuration command gdb_port */
2041 int handle_gdb_port_command(struct command_context_s
*cmd_ctx
, char *cmd
, char **args
, int argc
)
2046 /* only if the port wasn't overwritten by cmdline */
2048 gdb_port
= strtoul(args
[0], NULL
, 0);
2053 int handle_gdb_detach_command(struct command_context_s
*cmd_ctx
, char *cmd
, char **args
, int argc
)
2057 if (strcmp(args
[0], "resume") == 0)
2059 detach_mode
= GDB_DETACH_RESUME
;
2062 else if (strcmp(args
[0], "reset") == 0)
2064 detach_mode
= GDB_DETACH_RESET
;
2067 else if (strcmp(args
[0], "halt") == 0)
2069 detach_mode
= GDB_DETACH_HALT
;
2072 else if (strcmp(args
[0], "nothing") == 0)
2074 detach_mode
= GDB_DETACH_NOTHING
;
2079 LOG_WARNING("invalid gdb_detach configuration directive: %s", args
[0]);
2083 int handle_gdb_memory_map_command(struct command_context_s
*cmd_ctx
, char *cmd
, char **args
, int argc
)
2087 if (strcmp(args
[0], "enable") == 0)
2089 gdb_use_memory_map
= 1;
2092 else if (strcmp(args
[0], "disable") == 0)
2094 gdb_use_memory_map
= 0;
2099 LOG_WARNING("invalid gdb_memory_map configuration directive: %s", args
[0]);
2103 int handle_gdb_flash_program_command(struct command_context_s
*cmd_ctx
, char *cmd
, char **args
, int argc
)
2107 if (strcmp(args
[0], "enable") == 0)
2109 gdb_flash_program
= 1;
2112 else if (strcmp(args
[0], "disable") == 0)
2114 gdb_flash_program
= 0;
2119 LOG_WARNING("invalid gdb_memory_map configuration directive: %s", args
[0]);
2123 int handle_gdb_report_data_abort_command(struct command_context_s
*cmd_ctx
, char *cmd
, char **args
, int argc
)
2127 if (strcmp(args
[0], "enable") == 0)
2129 gdb_report_data_abort
= 1;
2132 else if (strcmp(args
[0], "disable") == 0)
2134 gdb_report_data_abort
= 0;
2139 LOG_WARNING("invalid gdb_report_data_abort configuration directive: %s", args
[0]);
2143 int gdb_register_commands(command_context_t
*command_context
)
2145 register_command(command_context
, NULL
, "gdb_port", handle_gdb_port_command
,
2146 COMMAND_CONFIG
, "");
2147 register_command(command_context
, NULL
, "gdb_detach", handle_gdb_detach_command
,
2148 COMMAND_CONFIG
, "");
2149 register_command(command_context
, NULL
, "gdb_memory_map", handle_gdb_memory_map_command
,
2150 COMMAND_CONFIG
, "");
2151 register_command(command_context
, NULL
, "gdb_flash_program", handle_gdb_flash_program_command
,
2152 COMMAND_CONFIG
, "");
2153 register_command(command_context
, NULL
, "gdb_report_data_abort", handle_gdb_report_data_abort_command
,
2154 COMMAND_CONFIG
, "");
Linking to existing account procedure
If you already have an account and want to add another login method
you
MUST first sign in with your existing account and
then change URL to read
https://review.openocd.org/login/?link
to get to this page again but this time it'll work for linking. Thank you.
SSH host keys fingerprints
1024 SHA256:YKx8b7u5ZWdcbp7/4AeXNaqElP49m6QrwfXaqQGJAOk gerrit-code-review@openocd.zylin.com (DSA)
384 SHA256:jHIbSQa4REvwCFG4cq5LBlBLxmxSqelQPem/EXIrxjk gerrit-code-review@openocd.org (ECDSA)
521 SHA256:UAOPYkU9Fjtcao0Ul/Rrlnj/OsQvt+pgdYSZ4jOYdgs gerrit-code-review@openocd.org (ECDSA)
256 SHA256:A13M5QlnozFOvTllybRZH6vm7iSt0XLxbA48yfc2yfY gerrit-code-review@openocd.org (ECDSA)
256 SHA256:spYMBqEYoAOtK7yZBrcwE8ZpYt6b68Cfh9yEVetvbXg gerrit-code-review@openocd.org (ED25519)
+--[ED25519 256]--+
|=.. |
|+o.. . |
|*.o . . |
|+B . . . |
|Bo. = o S |
|Oo.+ + = |
|oB=.* = . o |
| =+=.+ + E |
|. .=o . o |
+----[SHA256]-----+
2048 SHA256:0Onrb7/PHjpo6iVZ7xQX2riKN83FJ3KGU0TvI0TaFG4 gerrit-code-review@openocd.zylin.com (RSA)