2017-03-07 17:15:19 -05:00
|
|
|
#!/usr/bin/env python
|
|
|
|
#
|
|
|
|
# esp-idf serial output monitor tool. Does some helpful things:
|
|
|
|
# - Looks up hex addresses in ELF file with addr2line
|
|
|
|
# - Reset ESP32 via serial RTS line (Ctrl-T Ctrl-R)
|
2019-06-22 21:54:31 -04:00
|
|
|
# - Run flash build target to rebuild and flash entire project (Ctrl-T Ctrl-F)
|
|
|
|
# - Run app-flash build target to rebuild and flash app only (Ctrl-T Ctrl-A)
|
2017-03-07 17:15:19 -05:00
|
|
|
# - If gdbstub output is detected, gdb is automatically loaded
|
2020-02-06 13:29:50 -05:00
|
|
|
# - If core dump output is detected, it is converted to a human-readable report
|
|
|
|
# by espcoredump.py.
|
2017-03-07 17:15:19 -05:00
|
|
|
#
|
2021-02-01 05:40:03 -05:00
|
|
|
# Copyright 2015-2021 Espressif Systems (Shanghai) CO LTD
|
2017-03-07 17:15:19 -05:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
#
|
|
|
|
# Contains elements taken from miniterm "Very simple serial terminal" which
|
|
|
|
# is part of pySerial. https://github.com/pyserial/pyserial
|
|
|
|
# (C)2002-2015 Chris Liechti <cliechti@gmx.net>
|
|
|
|
#
|
|
|
|
# Originally released under BSD-3-Clause license.
|
|
|
|
#
|
2021-02-01 05:40:03 -05:00
|
|
|
|
2021-01-25 21:49:01 -05:00
|
|
|
from __future__ import division, print_function, unicode_literals
|
|
|
|
|
2017-03-07 17:15:19 -05:00
|
|
|
import argparse
|
|
|
|
import codecs
|
2019-03-04 07:11:57 -05:00
|
|
|
import datetime
|
2017-03-07 17:15:19 -05:00
|
|
|
import os
|
2021-01-25 21:49:01 -05:00
|
|
|
import re
|
|
|
|
import subprocess
|
2021-02-01 05:40:03 -05:00
|
|
|
import threading
|
|
|
|
import time
|
|
|
|
from builtins import bytes, object
|
|
|
|
from typing import BinaryIO, Callable, List, Optional, Union
|
|
|
|
|
|
|
|
import serial.tools.miniterm as miniterm
|
|
|
|
from idf_monitor_base import (COREDUMP_DECODE_DISABLE, COREDUMP_DECODE_INFO, COREDUMP_DONE, COREDUMP_IDLE,
|
|
|
|
COREDUMP_READING, COREDUMP_UART_END, COREDUMP_UART_PROMPT, COREDUMP_UART_START,
|
|
|
|
DEFAULT_PRINT_FILTER, DEFAULT_TOOLCHAIN_PREFIX, MATCH_PCADDR, PANIC_DECODE_BACKTRACE,
|
|
|
|
PANIC_DECODE_DISABLE, PANIC_END, PANIC_IDLE, PANIC_READING, PANIC_STACK_DUMP,
|
|
|
|
PANIC_START)
|
|
|
|
from idf_monitor_base.chip_specific_config import get_chip_config
|
|
|
|
from idf_monitor_base.console_parser import ConsoleParser
|
|
|
|
from idf_monitor_base.console_reader import ConsoleReader
|
|
|
|
from idf_monitor_base.constants import (CMD_APP_FLASH, CMD_ENTER_BOOT, CMD_MAKE, CMD_OUTPUT_TOGGLE, CMD_RESET,
|
|
|
|
CMD_STOP, CMD_TOGGLE_LOGGING, CTRL_H, CTRL_T, TAG_CMD, TAG_KEY, TAG_SERIAL,
|
|
|
|
TAG_SERIAL_FLUSH)
|
|
|
|
from idf_monitor_base.exceptions import SerialStopException
|
|
|
|
from idf_monitor_base.line_matcher import LineMatcher
|
|
|
|
from idf_monitor_base.output_helpers import normal_print, red_print, yellow_print
|
|
|
|
from idf_monitor_base.serial_reader import SerialReader
|
|
|
|
from idf_monitor_base.web_socket_client import WebSocketClient
|
2021-01-25 21:49:01 -05:00
|
|
|
|
2017-03-07 17:15:19 -05:00
|
|
|
try:
|
2021-02-01 05:40:03 -05:00
|
|
|
import queue # noqa
|
2017-03-07 17:15:19 -05:00
|
|
|
except ImportError:
|
2021-02-01 05:40:03 -05:00
|
|
|
import Queue as queue # type: ignore # noqa
|
2021-01-25 21:49:01 -05:00
|
|
|
|
2018-05-04 00:06:15 -04:00
|
|
|
import shlex
|
2017-03-07 17:15:19 -05:00
|
|
|
import sys
|
2021-01-25 21:49:01 -05:00
|
|
|
import tempfile
|
|
|
|
|
|
|
|
import serial
|
|
|
|
import serial.tools.list_ports
|
2021-02-01 05:40:03 -05:00
|
|
|
# Windows console stuff
|
2021-04-15 12:51:25 -04:00
|
|
|
from idf_monitor_base.ansi_color_converter import get_converter
|
2017-03-07 17:15:19 -05:00
|
|
|
|
|
|
|
key_description = miniterm.key_description
|
|
|
|
|
2018-11-20 08:10:35 -05:00
|
|
|
|
2017-03-07 17:15:19 -05:00
|
|
|
class Monitor(object):
|
|
|
|
"""
|
|
|
|
Monitor application main class.
|
|
|
|
|
|
|
|
This was originally derived from miniterm.Miniterm, but it turned out to be easier to write from scratch for this
|
|
|
|
purpose.
|
|
|
|
|
|
|
|
Main difference is that all event processing happens in the main thread, not the worker threads.
|
|
|
|
"""
|
2021-02-01 05:40:03 -05:00
|
|
|
|
2021-01-25 21:49:01 -05:00
|
|
|
def __init__(self, serial_instance, elf_file, print_filter, make='make', encrypted=False,
|
|
|
|
toolchain_prefix=DEFAULT_TOOLCHAIN_PREFIX, eol='CRLF',
|
2020-05-28 08:47:38 -04:00
|
|
|
decode_coredumps=COREDUMP_DECODE_INFO,
|
2020-11-19 21:19:04 -05:00
|
|
|
decode_panic=PANIC_DECODE_DISABLE,
|
2021-02-01 05:40:03 -05:00
|
|
|
target='esp32',
|
|
|
|
websocket_client=None, enable_address_decoding=True):
|
|
|
|
# type: (serial.Serial, str, str, str, bool, str, str, str, str, str, WebSocketClient, bool) -> None
|
2017-03-07 17:15:19 -05:00
|
|
|
super(Monitor, self).__init__()
|
2021-02-01 05:40:03 -05:00
|
|
|
self.event_queue = queue.Queue() # type: queue.Queue
|
|
|
|
self.cmd_queue = queue.Queue() # type: queue.Queue
|
2017-03-07 17:15:19 -05:00
|
|
|
self.console = miniterm.Console()
|
2020-12-28 06:01:14 -05:00
|
|
|
self.enable_address_decoding = enable_address_decoding
|
2021-02-01 05:40:03 -05:00
|
|
|
|
2021-04-15 12:51:25 -04:00
|
|
|
sys.stderr = get_converter(sys.stderr, decode_output=True)
|
|
|
|
self.console.output = get_converter(self.console.output)
|
|
|
|
self.console.byte_output = get_converter(self.console.byte_output)
|
2021-02-01 05:40:03 -05:00
|
|
|
|
|
|
|
socket_mode = serial_instance.port.startswith(
|
|
|
|
'socket://') # testing hook - data from serial can make exit the monitor
|
2017-03-07 17:15:19 -05:00
|
|
|
self.serial = serial_instance
|
2021-02-01 05:40:03 -05:00
|
|
|
|
2019-07-06 00:43:35 -04:00
|
|
|
self.console_parser = ConsoleParser(eol)
|
2021-02-01 05:40:03 -05:00
|
|
|
self.console_reader = ConsoleReader(self.console, self.event_queue, self.cmd_queue, self.console_parser,
|
|
|
|
socket_mode)
|
2017-03-07 17:15:19 -05:00
|
|
|
self.serial_reader = SerialReader(self.serial, self.event_queue)
|
|
|
|
self.elf_file = elf_file
|
2018-05-04 00:06:15 -04:00
|
|
|
if not os.path.exists(make):
|
2021-02-01 05:40:03 -05:00
|
|
|
# allow for possibility the "make" arg is a list of arguments (for idf.py)
|
|
|
|
self.make = shlex.split(make) # type: Union[str, List[str]]
|
2018-05-04 00:06:15 -04:00
|
|
|
else:
|
|
|
|
self.make = make
|
2020-03-23 11:14:34 -04:00
|
|
|
self.encrypted = encrypted
|
2017-05-17 09:12:22 -04:00
|
|
|
self.toolchain_prefix = toolchain_prefix
|
2020-05-28 08:47:38 -04:00
|
|
|
self.websocket_client = websocket_client
|
2020-11-19 21:19:04 -05:00
|
|
|
self.target = target
|
2017-03-17 06:41:18 -04:00
|
|
|
|
2017-03-07 17:15:19 -05:00
|
|
|
# internal state
|
2021-01-25 21:49:01 -05:00
|
|
|
self._last_line_part = b''
|
|
|
|
self._gdb_buffer = b''
|
|
|
|
self._pc_address_buffer = b''
|
2018-05-30 09:35:50 -04:00
|
|
|
self._line_matcher = LineMatcher(print_filter)
|
2021-02-01 05:40:03 -05:00
|
|
|
self._invoke_processing_last_line_timer = None # type: Optional[threading.Timer]
|
2018-05-30 09:35:50 -04:00
|
|
|
self._force_line_print = False
|
2017-11-16 01:39:57 -05:00
|
|
|
self._output_enabled = True
|
2018-06-14 05:56:20 -04:00
|
|
|
self._serial_check_exit = socket_mode
|
2021-02-01 05:40:03 -05:00
|
|
|
self._log_file = None # type: Optional[BinaryIO]
|
2020-02-06 13:29:50 -05:00
|
|
|
self._decode_coredumps = decode_coredumps
|
|
|
|
self._reading_coredump = COREDUMP_IDLE
|
2021-01-25 21:49:01 -05:00
|
|
|
self._coredump_buffer = b''
|
2020-11-19 21:19:04 -05:00
|
|
|
self._decode_panic = decode_panic
|
|
|
|
self._reading_panic = PANIC_IDLE
|
2021-01-25 21:49:01 -05:00
|
|
|
self._panic_buffer = b''
|
2017-03-07 17:15:19 -05:00
|
|
|
|
2018-05-30 09:35:50 -04:00
|
|
|
def invoke_processing_last_line(self):
|
2021-02-01 05:40:03 -05:00
|
|
|
# type: () -> None
|
2018-05-30 09:35:50 -04:00
|
|
|
self.event_queue.put((TAG_SERIAL_FLUSH, b''), False)
|
2017-03-07 17:15:19 -05:00
|
|
|
|
|
|
|
def main_loop(self):
|
2021-02-01 05:40:03 -05:00
|
|
|
# type: () -> None
|
2017-03-07 17:15:19 -05:00
|
|
|
self.console_reader.start()
|
|
|
|
self.serial_reader.start()
|
|
|
|
try:
|
|
|
|
while self.console_reader.alive and self.serial_reader.alive:
|
2019-07-06 00:43:35 -04:00
|
|
|
try:
|
|
|
|
item = self.cmd_queue.get_nowait()
|
|
|
|
except queue.Empty:
|
|
|
|
try:
|
2019-08-15 23:24:57 -04:00
|
|
|
item = self.event_queue.get(True, 0.03)
|
2019-07-06 00:43:35 -04:00
|
|
|
except queue.Empty:
|
|
|
|
continue
|
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
event_tag, data = item
|
2019-07-06 00:43:35 -04:00
|
|
|
if event_tag == TAG_CMD:
|
2021-02-01 05:40:03 -05:00
|
|
|
self.handle_commands(data, self.target)
|
2019-07-06 00:43:35 -04:00
|
|
|
elif event_tag == TAG_KEY:
|
|
|
|
try:
|
|
|
|
self.serial.write(codecs.encode(data))
|
|
|
|
except serial.SerialException:
|
|
|
|
pass # this shouldn't happen, but sometimes port has closed in serial thread
|
|
|
|
except UnicodeEncodeError:
|
|
|
|
pass # this can happen if a non-ascii character was passed, ignoring
|
2017-03-07 17:15:19 -05:00
|
|
|
elif event_tag == TAG_SERIAL:
|
|
|
|
self.handle_serial_input(data)
|
2018-05-30 09:35:50 -04:00
|
|
|
if self._invoke_processing_last_line_timer is not None:
|
|
|
|
self._invoke_processing_last_line_timer.cancel()
|
2018-06-13 01:48:52 -04:00
|
|
|
self._invoke_processing_last_line_timer = threading.Timer(0.1, self.invoke_processing_last_line)
|
2018-05-30 09:35:50 -04:00
|
|
|
self._invoke_processing_last_line_timer.start()
|
2020-12-28 06:01:14 -05:00
|
|
|
# If no further data is received in the next short period
|
2018-05-30 09:35:50 -04:00
|
|
|
# of time then the _invoke_processing_last_line_timer
|
|
|
|
# generates an event which will result in the finishing of
|
|
|
|
# the last line. This is fix for handling lines sent
|
|
|
|
# without EOL.
|
|
|
|
elif event_tag == TAG_SERIAL_FLUSH:
|
|
|
|
self.handle_serial_input(data, finalize_line=True)
|
2017-03-07 17:15:19 -05:00
|
|
|
else:
|
2021-02-01 05:40:03 -05:00
|
|
|
raise RuntimeError('Bad event data %r' % ((event_tag, data),))
|
2018-06-14 05:56:20 -04:00
|
|
|
except SerialStopException:
|
2021-02-01 05:40:03 -05:00
|
|
|
normal_print('Stopping condition has been received\n')
|
2017-03-07 17:15:19 -05:00
|
|
|
finally:
|
|
|
|
try:
|
|
|
|
self.console_reader.stop()
|
|
|
|
self.serial_reader.stop()
|
2019-03-04 07:11:57 -05:00
|
|
|
self.stop_logging()
|
2018-05-30 09:35:50 -04:00
|
|
|
# Cancelling _invoke_processing_last_line_timer is not
|
|
|
|
# important here because receiving empty data doesn't matter.
|
|
|
|
self._invoke_processing_last_line_timer = None
|
2018-11-20 08:10:35 -05:00
|
|
|
except Exception:
|
2017-03-07 17:15:19 -05:00
|
|
|
pass
|
2021-02-01 05:40:03 -05:00
|
|
|
normal_print('\n')
|
2017-03-07 17:15:19 -05:00
|
|
|
|
2018-05-30 09:35:50 -04:00
|
|
|
def handle_serial_input(self, data, finalize_line=False):
|
2021-02-01 05:40:03 -05:00
|
|
|
# type: (bytes, bool) -> None
|
2018-05-30 09:35:50 -04:00
|
|
|
sp = data.split(b'\n')
|
2021-01-25 21:49:01 -05:00
|
|
|
if self._last_line_part != b'':
|
2018-05-30 09:35:50 -04:00
|
|
|
# add unprocessed part from previous "data" to the first line
|
|
|
|
sp[0] = self._last_line_part + sp[0]
|
2021-01-25 21:49:01 -05:00
|
|
|
self._last_line_part = b''
|
|
|
|
if sp[-1] != b'':
|
2018-05-30 09:35:50 -04:00
|
|
|
# last part is not a full line
|
|
|
|
self._last_line_part = sp.pop()
|
|
|
|
for line in sp:
|
2021-01-25 21:49:01 -05:00
|
|
|
if line != b'':
|
2019-07-06 00:43:35 -04:00
|
|
|
if self._serial_check_exit and line == self.console_parser.exit_key.encode('latin-1'):
|
2018-06-14 05:56:20 -04:00
|
|
|
raise SerialStopException()
|
2020-11-19 21:19:04 -05:00
|
|
|
self.check_panic_decode_trigger(line)
|
2020-02-06 13:29:50 -05:00
|
|
|
self.check_coredump_trigger_before_print(line)
|
2021-01-25 21:49:01 -05:00
|
|
|
if self._force_line_print or self._line_matcher.match(line.decode(errors='ignore')):
|
2019-03-04 07:11:57 -05:00
|
|
|
self._print(line + b'\n')
|
2018-05-30 09:35:50 -04:00
|
|
|
self.handle_possible_pc_address_in_line(line)
|
2021-02-01 05:40:03 -05:00
|
|
|
self.check_coredump_trigger_after_print()
|
2018-05-30 09:35:50 -04:00
|
|
|
self.check_gdbstub_trigger(line)
|
|
|
|
self._force_line_print = False
|
|
|
|
# Now we have the last part (incomplete line) in _last_line_part. By
|
|
|
|
# default we don't touch it and just wait for the arrival of the rest
|
|
|
|
# of the line. But after some time when we didn't received it we need
|
|
|
|
# to make a decision.
|
2021-01-25 21:49:01 -05:00
|
|
|
if self._last_line_part != b'':
|
|
|
|
if self._force_line_print or (finalize_line and self._line_matcher.match(self._last_line_part.decode(errors='ignore'))):
|
2018-11-20 08:10:35 -05:00
|
|
|
self._force_line_print = True
|
2019-03-04 07:11:57 -05:00
|
|
|
self._print(self._last_line_part)
|
|
|
|
self.handle_possible_pc_address_in_line(self._last_line_part)
|
2018-05-30 09:35:50 -04:00
|
|
|
self.check_gdbstub_trigger(self._last_line_part)
|
|
|
|
# It is possible that the incomplete line cuts in half the PC
|
|
|
|
# address. A small buffer is kept and will be used the next time
|
|
|
|
# handle_possible_pc_address_in_line is invoked to avoid this problem.
|
|
|
|
# MATCH_PCADDR matches 10 character long addresses. Therefore, we
|
|
|
|
# keep the last 9 characters.
|
|
|
|
self._pc_address_buffer = self._last_line_part[-9:]
|
|
|
|
# GDB sequence can be cut in half also. GDB sequence is 7
|
|
|
|
# characters long, therefore, we save the last 6 characters.
|
|
|
|
self._gdb_buffer = self._last_line_part[-6:]
|
2021-01-25 21:49:01 -05:00
|
|
|
self._last_line_part = b''
|
2018-05-30 09:35:50 -04:00
|
|
|
# else: keeping _last_line_part and it will be processed the next time
|
|
|
|
# handle_serial_input is invoked
|
|
|
|
|
|
|
|
def handle_possible_pc_address_in_line(self, line):
|
2021-02-01 05:40:03 -05:00
|
|
|
# type: (bytes) -> None
|
2018-05-30 09:35:50 -04:00
|
|
|
line = self._pc_address_buffer + line
|
2021-01-25 21:49:01 -05:00
|
|
|
self._pc_address_buffer = b''
|
2020-12-28 06:01:14 -05:00
|
|
|
if self.enable_address_decoding:
|
2021-01-25 21:49:01 -05:00
|
|
|
for m in re.finditer(MATCH_PCADDR, line.decode(errors='ignore')):
|
2020-12-28 06:01:14 -05:00
|
|
|
self.lookup_pc_address(m.group())
|
2017-03-07 17:15:19 -05:00
|
|
|
|
|
|
|
def __enter__(self):
|
2021-02-01 05:40:03 -05:00
|
|
|
# type: () -> None
|
2017-03-07 17:15:19 -05:00
|
|
|
""" Use 'with self' to temporarily disable monitoring behaviour """
|
|
|
|
self.serial_reader.stop()
|
|
|
|
self.console_reader.stop()
|
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
def __exit__(self, *args, **kwargs): # type: ignore
|
2017-03-07 17:15:19 -05:00
|
|
|
""" Use 'with self' to temporarily disable monitoring behaviour """
|
|
|
|
self.console_reader.start()
|
|
|
|
self.serial_reader.start()
|
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
def prompt_next_action(self, reason): # type: (str) -> None
|
2017-03-07 17:15:19 -05:00
|
|
|
self.console.setup() # set up console to trap input characters
|
|
|
|
try:
|
2021-01-25 21:49:01 -05:00
|
|
|
red_print('--- {}'.format(reason))
|
2019-07-06 00:43:35 -04:00
|
|
|
red_print(self.console_parser.get_next_action_text())
|
|
|
|
|
2017-03-17 06:41:18 -04:00
|
|
|
k = CTRL_T # ignore CTRL-T here, so people can muscle-memory Ctrl-T Ctrl-F, etc.
|
|
|
|
while k == CTRL_T:
|
|
|
|
k = self.console.getkey()
|
2017-03-07 17:15:19 -05:00
|
|
|
finally:
|
|
|
|
self.console.cleanup()
|
2019-07-06 00:43:35 -04:00
|
|
|
ret = self.console_parser.parse_next_action_key(k)
|
|
|
|
if ret is not None:
|
|
|
|
cmd = ret[1]
|
|
|
|
if cmd == CMD_STOP:
|
|
|
|
# the stop command should be handled last
|
|
|
|
self.event_queue.put(ret)
|
|
|
|
else:
|
|
|
|
self.cmd_queue.put(ret)
|
2017-03-07 17:15:19 -05:00
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
def run_make(self, target): # type: (str) -> None
|
2017-03-07 17:15:19 -05:00
|
|
|
with self:
|
2018-05-04 00:06:15 -04:00
|
|
|
if isinstance(self.make, list):
|
2018-11-20 08:10:35 -05:00
|
|
|
popen_args = self.make + [target]
|
2018-05-04 00:06:15 -04:00
|
|
|
else:
|
2018-11-20 08:10:35 -05:00
|
|
|
popen_args = [self.make, target]
|
2021-01-25 21:49:01 -05:00
|
|
|
yellow_print('Running %s...' % ' '.join(popen_args))
|
2020-04-06 13:44:23 -04:00
|
|
|
p = subprocess.Popen(popen_args, env=os.environ)
|
2017-03-07 17:15:19 -05:00
|
|
|
try:
|
|
|
|
p.wait()
|
|
|
|
except KeyboardInterrupt:
|
|
|
|
p.wait()
|
|
|
|
if p.returncode != 0:
|
2021-01-25 21:49:01 -05:00
|
|
|
self.prompt_next_action('Build failed')
|
2017-11-16 01:39:57 -05:00
|
|
|
else:
|
|
|
|
self.output_enable(True)
|
2017-03-07 17:15:19 -05:00
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
def lookup_pc_address(self, pc_addr): # type: (str) -> None
|
2021-01-25 21:49:01 -05:00
|
|
|
cmd = ['%saddr2line' % self.toolchain_prefix,
|
|
|
|
'-pfiaC', '-e', self.elf_file, pc_addr]
|
2018-12-01 10:16:49 -05:00
|
|
|
try:
|
2021-01-25 21:49:01 -05:00
|
|
|
translation = subprocess.check_output(cmd, cwd='.')
|
|
|
|
if b'?? ??:0' not in translation:
|
2019-03-04 07:11:57 -05:00
|
|
|
self._print(translation.decode(), console_printer=yellow_print)
|
2018-12-01 10:16:49 -05:00
|
|
|
except OSError as e:
|
2021-01-25 21:49:01 -05:00
|
|
|
red_print('%s: %s' % (' '.join(cmd), e))
|
2017-03-07 17:15:19 -05:00
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
def check_gdbstub_trigger(self, line): # type: (bytes) -> None
|
2018-05-30 09:35:50 -04:00
|
|
|
line = self._gdb_buffer + line
|
2021-01-25 21:49:01 -05:00
|
|
|
self._gdb_buffer = b''
|
|
|
|
m = re.search(b'\\$(T..)#(..)', line) # look for a gdb "reason" for a break
|
2017-03-07 17:15:19 -05:00
|
|
|
if m is not None:
|
|
|
|
try:
|
2018-08-01 05:47:05 -04:00
|
|
|
chsum = sum(ord(bytes([p])) for p in m.group(1)) & 0xFF
|
2017-03-07 17:15:19 -05:00
|
|
|
calc_chsum = int(m.group(2), 16)
|
|
|
|
except ValueError:
|
|
|
|
return # payload wasn't valid hex digits
|
|
|
|
if chsum == calc_chsum:
|
2020-05-28 08:47:38 -04:00
|
|
|
if self.websocket_client:
|
|
|
|
yellow_print('Communicating through WebSocket')
|
|
|
|
self.websocket_client.send({'event': 'gdb_stub',
|
|
|
|
'port': self.serial.port,
|
|
|
|
'prog': self.elf_file})
|
|
|
|
yellow_print('Waiting for debug finished event')
|
|
|
|
self.websocket_client.wait([('event', 'debug_finished')])
|
|
|
|
yellow_print('Communications through WebSocket is finished')
|
|
|
|
else:
|
|
|
|
self.run_gdb()
|
2017-03-07 17:15:19 -05:00
|
|
|
else:
|
2021-01-25 21:49:01 -05:00
|
|
|
red_print('Malformed gdb message... calculated checksum %02x received %02x' % (chsum, calc_chsum))
|
2017-03-07 17:15:19 -05:00
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
def check_coredump_trigger_before_print(self, line): # type: (bytes) -> None
|
2020-02-06 13:29:50 -05:00
|
|
|
if self._decode_coredumps == COREDUMP_DECODE_DISABLE:
|
|
|
|
return
|
|
|
|
|
|
|
|
if COREDUMP_UART_PROMPT in line:
|
2021-01-25 21:49:01 -05:00
|
|
|
yellow_print('Initiating core dump!')
|
2020-02-06 13:29:50 -05:00
|
|
|
self.event_queue.put((TAG_KEY, '\n'))
|
|
|
|
return
|
|
|
|
|
|
|
|
if COREDUMP_UART_START in line:
|
2021-01-25 21:49:01 -05:00
|
|
|
yellow_print('Core dump started (further output muted)')
|
2020-02-06 13:29:50 -05:00
|
|
|
self._reading_coredump = COREDUMP_READING
|
2021-01-25 21:49:01 -05:00
|
|
|
self._coredump_buffer = b''
|
2020-02-06 13:29:50 -05:00
|
|
|
self._output_enabled = False
|
|
|
|
return
|
|
|
|
|
|
|
|
if COREDUMP_UART_END in line:
|
|
|
|
self._reading_coredump = COREDUMP_DONE
|
2021-01-25 21:49:01 -05:00
|
|
|
yellow_print('\nCore dump finished!')
|
2020-02-06 13:29:50 -05:00
|
|
|
self.process_coredump()
|
|
|
|
return
|
|
|
|
|
|
|
|
if self._reading_coredump == COREDUMP_READING:
|
|
|
|
kb = 1024
|
|
|
|
buffer_len_kb = len(self._coredump_buffer) // kb
|
|
|
|
self._coredump_buffer += line.replace(b'\r', b'') + b'\n'
|
|
|
|
new_buffer_len_kb = len(self._coredump_buffer) // kb
|
|
|
|
if new_buffer_len_kb > buffer_len_kb:
|
2021-01-25 21:49:01 -05:00
|
|
|
yellow_print('Received %3d kB...' % (new_buffer_len_kb), newline='\r')
|
2020-02-06 13:29:50 -05:00
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
def check_coredump_trigger_after_print(self): # type: () -> None
|
2020-02-06 13:29:50 -05:00
|
|
|
if self._decode_coredumps == COREDUMP_DECODE_DISABLE:
|
|
|
|
return
|
|
|
|
|
|
|
|
# Re-enable output after the last line of core dump has been consumed
|
|
|
|
if not self._output_enabled and self._reading_coredump == COREDUMP_DONE:
|
|
|
|
self._reading_coredump = COREDUMP_IDLE
|
|
|
|
self._output_enabled = True
|
2021-01-25 21:49:01 -05:00
|
|
|
self._coredump_buffer = b''
|
2020-02-06 13:29:50 -05:00
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
def process_coredump(self): # type: () -> None
|
2020-02-06 13:29:50 -05:00
|
|
|
if self._decode_coredumps != COREDUMP_DECODE_INFO:
|
2021-01-25 21:49:01 -05:00
|
|
|
raise NotImplementedError('process_coredump: %s not implemented' % self._decode_coredumps)
|
2020-02-06 13:29:50 -05:00
|
|
|
|
2021-01-25 21:49:01 -05:00
|
|
|
coredump_script = os.path.join(os.path.dirname(__file__), '..', 'components', 'espcoredump', 'espcoredump.py')
|
2020-02-06 13:29:50 -05:00
|
|
|
coredump_file = None
|
|
|
|
try:
|
|
|
|
# On Windows, the temporary file can't be read unless it is closed.
|
|
|
|
# Set delete=False and delete the file manually later.
|
2021-01-25 21:49:01 -05:00
|
|
|
with tempfile.NamedTemporaryFile(mode='wb', delete=False) as coredump_file:
|
2020-02-06 13:29:50 -05:00
|
|
|
coredump_file.write(self._coredump_buffer)
|
|
|
|
coredump_file.flush()
|
|
|
|
|
2020-05-28 08:47:38 -04:00
|
|
|
if self.websocket_client:
|
|
|
|
self._output_enabled = True
|
|
|
|
yellow_print('Communicating through WebSocket')
|
|
|
|
self.websocket_client.send({'event': 'coredump',
|
|
|
|
'file': coredump_file.name,
|
|
|
|
'prog': self.elf_file})
|
|
|
|
yellow_print('Waiting for debug finished event')
|
|
|
|
self.websocket_client.wait([('event', 'debug_finished')])
|
|
|
|
yellow_print('Communications through WebSocket is finished')
|
|
|
|
else:
|
|
|
|
cmd = [sys.executable,
|
|
|
|
coredump_script,
|
2021-01-25 21:49:01 -05:00
|
|
|
'info_corefile',
|
|
|
|
'--core', coredump_file.name,
|
|
|
|
'--core-format', 'b64',
|
2020-05-28 08:47:38 -04:00
|
|
|
self.elf_file
|
|
|
|
]
|
|
|
|
output = subprocess.check_output(cmd, stderr=subprocess.STDOUT)
|
|
|
|
self._output_enabled = True
|
|
|
|
self._print(output)
|
|
|
|
self._output_enabled = False # Will be reenabled in check_coredump_trigger_after_print
|
2020-02-06 13:29:50 -05:00
|
|
|
except subprocess.CalledProcessError as e:
|
2021-01-25 21:49:01 -05:00
|
|
|
yellow_print('Failed to run espcoredump script: {}\n{}\n\n'.format(e, e.output))
|
2020-02-06 13:29:50 -05:00
|
|
|
self._output_enabled = True
|
|
|
|
self._print(COREDUMP_UART_START + b'\n')
|
|
|
|
self._print(self._coredump_buffer)
|
|
|
|
# end line will be printed in handle_serial_input
|
|
|
|
finally:
|
|
|
|
if coredump_file is not None:
|
|
|
|
try:
|
|
|
|
os.unlink(coredump_file.name)
|
|
|
|
except OSError as e:
|
2021-02-01 05:40:03 -05:00
|
|
|
yellow_print('Couldn\'t remote temporary core dump file ({})'.format(e))
|
2020-02-06 13:29:50 -05:00
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
def check_panic_decode_trigger(self, line): # type: (bytes) -> None
|
2020-11-19 21:19:04 -05:00
|
|
|
if self._decode_panic == PANIC_DECODE_DISABLE:
|
|
|
|
return
|
|
|
|
|
2021-01-25 21:49:01 -05:00
|
|
|
if self._reading_panic == PANIC_IDLE and re.search(PANIC_START, line.decode('ascii', errors='ignore')):
|
2020-11-19 21:19:04 -05:00
|
|
|
self._reading_panic = PANIC_READING
|
2021-01-25 21:49:01 -05:00
|
|
|
yellow_print('Stack dump detected')
|
2020-11-19 21:19:04 -05:00
|
|
|
|
|
|
|
if self._reading_panic == PANIC_READING and PANIC_STACK_DUMP in line:
|
|
|
|
self._output_enabled = False
|
|
|
|
|
|
|
|
if self._reading_panic == PANIC_READING:
|
|
|
|
self._panic_buffer += line.replace(b'\r', b'') + b'\n'
|
|
|
|
|
|
|
|
if self._reading_panic == PANIC_READING and PANIC_END in line:
|
|
|
|
self._reading_panic = PANIC_IDLE
|
|
|
|
self._output_enabled = True
|
|
|
|
self.process_panic_output(self._panic_buffer)
|
2021-01-25 21:49:01 -05:00
|
|
|
self._panic_buffer = b''
|
2020-11-19 21:19:04 -05:00
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
def process_panic_output(self, panic_output): # type: (bytes) -> None
|
2021-01-25 21:49:01 -05:00
|
|
|
panic_output_decode_script = os.path.join(os.path.dirname(__file__), '..', 'tools', 'gdb_panic_server.py')
|
2020-11-19 21:19:04 -05:00
|
|
|
panic_output_file = None
|
|
|
|
try:
|
|
|
|
# On Windows, the temporary file can't be read unless it is closed.
|
|
|
|
# Set delete=False and delete the file manually later.
|
2021-01-25 21:49:01 -05:00
|
|
|
with tempfile.NamedTemporaryFile(mode='wb', delete=False) as panic_output_file:
|
2020-11-19 21:19:04 -05:00
|
|
|
panic_output_file.write(panic_output)
|
|
|
|
panic_output_file.flush()
|
|
|
|
|
2021-01-25 21:49:01 -05:00
|
|
|
cmd = [self.toolchain_prefix + 'gdb',
|
|
|
|
'--batch', '-n',
|
2020-11-19 21:19:04 -05:00
|
|
|
self.elf_file,
|
2021-01-25 21:49:01 -05:00
|
|
|
'-ex', "target remote | \"{python}\" \"{script}\" --target {target} \"{output_file}\""
|
2021-02-01 05:40:03 -05:00
|
|
|
.format(python=sys.executable,
|
|
|
|
script=panic_output_decode_script,
|
|
|
|
target=self.target,
|
|
|
|
output_file=panic_output_file.name),
|
2021-01-25 21:49:01 -05:00
|
|
|
'-ex', 'bt']
|
2020-11-19 21:19:04 -05:00
|
|
|
|
|
|
|
output = subprocess.check_output(cmd, stderr=subprocess.STDOUT)
|
2021-01-25 21:49:01 -05:00
|
|
|
yellow_print('\nBacktrace:\n\n')
|
2020-11-19 21:19:04 -05:00
|
|
|
self._print(output)
|
|
|
|
except subprocess.CalledProcessError as e:
|
2021-01-25 21:49:01 -05:00
|
|
|
yellow_print('Failed to run gdb_panic_server.py script: {}\n{}\n\n'.format(e, e.output))
|
2020-11-19 21:19:04 -05:00
|
|
|
self._print(panic_output)
|
|
|
|
finally:
|
|
|
|
if panic_output_file is not None:
|
|
|
|
try:
|
|
|
|
os.unlink(panic_output_file.name)
|
|
|
|
except OSError as e:
|
2021-02-01 05:40:03 -05:00
|
|
|
yellow_print('Couldn\'t remove temporary panic output file ({})'.format(e))
|
2020-11-19 21:19:04 -05:00
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
def run_gdb(self): # type: () -> None
|
2017-03-07 17:15:19 -05:00
|
|
|
with self: # disable console control
|
2021-02-01 05:40:03 -05:00
|
|
|
normal_print('')
|
2017-03-07 17:15:19 -05:00
|
|
|
try:
|
2021-01-25 21:49:01 -05:00
|
|
|
cmd = ['%sgdb' % self.toolchain_prefix,
|
|
|
|
'-ex', 'set serial baud %d' % self.serial.baudrate,
|
|
|
|
'-ex', 'target remote %s' % self.serial.port,
|
|
|
|
'-ex', 'interrupt', # monitor has already parsed the first 'reason' command, need a second
|
2018-12-01 10:16:49 -05:00
|
|
|
self.elf_file]
|
2021-01-25 21:49:01 -05:00
|
|
|
process = subprocess.Popen(cmd, cwd='.')
|
2018-01-31 20:58:58 -05:00
|
|
|
process.wait()
|
2018-12-01 10:16:49 -05:00
|
|
|
except OSError as e:
|
2021-01-25 21:49:01 -05:00
|
|
|
red_print('%s: %s' % (' '.join(cmd), e))
|
2017-03-07 17:15:19 -05:00
|
|
|
except KeyboardInterrupt:
|
|
|
|
pass # happens on Windows, maybe other OSes
|
2018-01-31 20:58:58 -05:00
|
|
|
finally:
|
|
|
|
try:
|
|
|
|
# on Linux, maybe other OSes, gdb sometimes seems to be alive even after wait() returns...
|
|
|
|
process.terminate()
|
2018-11-20 08:10:35 -05:00
|
|
|
except Exception:
|
2018-01-31 20:58:58 -05:00
|
|
|
pass
|
|
|
|
try:
|
|
|
|
# also on Linux, maybe other OSes, gdb sometimes exits uncleanly and breaks the tty mode
|
2021-01-25 21:49:01 -05:00
|
|
|
subprocess.call(['stty', 'sane'])
|
2018-11-20 08:10:35 -05:00
|
|
|
except Exception:
|
2018-01-31 20:58:58 -05:00
|
|
|
pass # don't care if there's no stty, we tried...
|
2021-01-25 21:49:01 -05:00
|
|
|
self.prompt_next_action('gdb exited')
|
2017-03-07 17:15:19 -05:00
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
def output_enable(self, enable): # type: (bool) -> None
|
2017-11-16 01:39:57 -05:00
|
|
|
self._output_enabled = enable
|
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
def output_toggle(self): # type: () -> None
|
2017-11-16 01:39:57 -05:00
|
|
|
self._output_enabled = not self._output_enabled
|
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
yellow_print('\nToggle output display: {}, Type Ctrl-T Ctrl-Y to show/disable output again.'.format(
|
|
|
|
self._output_enabled))
|
|
|
|
|
|
|
|
def toggle_logging(self): # type: () -> None
|
2019-03-04 07:11:57 -05:00
|
|
|
if self._log_file:
|
|
|
|
self.stop_logging()
|
|
|
|
else:
|
|
|
|
self.start_logging()
|
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
def start_logging(self): # type: () -> None
|
2019-03-04 07:11:57 -05:00
|
|
|
if not self._log_file:
|
2021-02-01 05:40:03 -05:00
|
|
|
name = 'log.{}.{}.txt'.format(os.path.splitext(os.path.basename(self.elf_file))[0],
|
|
|
|
datetime.datetime.now().strftime('%Y%m%d%H%M%S'))
|
2019-03-04 07:11:57 -05:00
|
|
|
try:
|
2021-01-25 21:49:01 -05:00
|
|
|
self._log_file = open(name, 'wb+')
|
|
|
|
yellow_print('\nLogging is enabled into file {}'.format(name))
|
2019-03-04 07:11:57 -05:00
|
|
|
except Exception as e:
|
2021-01-25 21:49:01 -05:00
|
|
|
red_print('\nLog file {} cannot be created: {}'.format(name, e))
|
2019-03-04 07:11:57 -05:00
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
def stop_logging(self): # type: () -> None
|
2019-03-04 07:11:57 -05:00
|
|
|
if self._log_file:
|
|
|
|
try:
|
|
|
|
name = self._log_file.name
|
|
|
|
self._log_file.close()
|
2021-01-25 21:49:01 -05:00
|
|
|
yellow_print('\nLogging is disabled and file {} has been closed'.format(name))
|
2019-03-04 07:11:57 -05:00
|
|
|
except Exception as e:
|
2021-01-25 21:49:01 -05:00
|
|
|
red_print('\nLog file cannot be closed: {}'.format(e))
|
2019-03-04 07:11:57 -05:00
|
|
|
finally:
|
|
|
|
self._log_file = None
|
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
def _print(self, string, console_printer=None): # type: (Union[str, bytes], Optional[Callable]) -> None
|
2019-03-04 07:11:57 -05:00
|
|
|
if console_printer is None:
|
|
|
|
console_printer = self.console.write_bytes
|
|
|
|
if self._output_enabled:
|
|
|
|
console_printer(string)
|
|
|
|
if self._log_file:
|
|
|
|
try:
|
|
|
|
if isinstance(string, type(u'')):
|
|
|
|
string = string.encode()
|
2021-02-01 05:40:03 -05:00
|
|
|
self._log_file.write(string) # type: ignore
|
2019-03-04 07:11:57 -05:00
|
|
|
except Exception as e:
|
2021-01-25 21:49:01 -05:00
|
|
|
red_print('\nCannot write to file: {}'.format(e))
|
2019-03-04 07:11:57 -05:00
|
|
|
# don't fill-up the screen with the previous errors (probably consequent prints would fail also)
|
|
|
|
self.stop_logging()
|
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
def handle_commands(self, cmd, chip): # type: (int, str) -> None
|
|
|
|
config = get_chip_config(chip)
|
|
|
|
reset_delay = config['reset']
|
|
|
|
enter_boot_set = config['enter_boot_set']
|
|
|
|
enter_boot_unset = config['enter_boot_unset']
|
|
|
|
|
|
|
|
high = False
|
|
|
|
low = True
|
|
|
|
|
2019-07-06 00:43:35 -04:00
|
|
|
if cmd == CMD_STOP:
|
|
|
|
self.console_reader.stop()
|
|
|
|
self.serial_reader.stop()
|
|
|
|
elif cmd == CMD_RESET:
|
2021-02-01 05:40:03 -05:00
|
|
|
self.serial.setRTS(low)
|
2020-01-27 04:12:16 -05:00
|
|
|
self.serial.setDTR(self.serial.dtr) # usbser.sys workaround
|
2021-02-01 05:40:03 -05:00
|
|
|
time.sleep(reset_delay)
|
|
|
|
self.serial.setRTS(high)
|
2020-01-27 04:12:16 -05:00
|
|
|
self.serial.setDTR(self.serial.dtr) # usbser.sys workaround
|
2021-02-01 05:40:03 -05:00
|
|
|
self.output_enable(low)
|
2019-07-06 00:43:35 -04:00
|
|
|
elif cmd == CMD_MAKE:
|
2021-01-25 21:49:01 -05:00
|
|
|
self.run_make('encrypted-flash' if self.encrypted else 'flash')
|
2019-07-06 00:43:35 -04:00
|
|
|
elif cmd == CMD_APP_FLASH:
|
2021-01-25 21:49:01 -05:00
|
|
|
self.run_make('encrypted-app-flash' if self.encrypted else 'app-flash')
|
2019-07-06 00:43:35 -04:00
|
|
|
elif cmd == CMD_OUTPUT_TOGGLE:
|
|
|
|
self.output_toggle()
|
|
|
|
elif cmd == CMD_TOGGLE_LOGGING:
|
|
|
|
self.toggle_logging()
|
|
|
|
elif cmd == CMD_ENTER_BOOT:
|
2021-02-01 05:40:03 -05:00
|
|
|
self.serial.setDTR(high) # IO0=HIGH
|
|
|
|
self.serial.setRTS(low) # EN=LOW, chip in reset
|
2020-01-27 04:12:16 -05:00
|
|
|
self.serial.setDTR(self.serial.dtr) # usbser.sys workaround
|
2021-02-01 05:40:03 -05:00
|
|
|
time.sleep(enter_boot_set) # timeouts taken from esptool.py, includes esp32r0 workaround. defaults: 0.1
|
|
|
|
self.serial.setDTR(low) # IO0=LOW
|
|
|
|
self.serial.setRTS(high) # EN=HIGH, chip out of reset
|
2020-01-27 04:12:16 -05:00
|
|
|
self.serial.setDTR(self.serial.dtr) # usbser.sys workaround
|
2021-02-01 05:40:03 -05:00
|
|
|
time.sleep(enter_boot_unset) # timeouts taken from esptool.py, includes esp32r0 workaround. defaults: 0.05
|
|
|
|
self.serial.setDTR(high) # IO0=HIGH, done
|
2019-07-06 00:43:35 -04:00
|
|
|
else:
|
2021-02-01 05:40:03 -05:00
|
|
|
raise RuntimeError('Bad command data %d' % cmd) # type: ignore
|
2019-07-06 00:43:35 -04:00
|
|
|
|
2018-11-20 08:10:35 -05:00
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
def main(): # type: () -> None
|
2021-01-25 21:49:01 -05:00
|
|
|
parser = argparse.ArgumentParser('idf_monitor - a serial output monitor for esp-idf')
|
2017-03-07 17:15:19 -05:00
|
|
|
|
|
|
|
parser.add_argument(
|
|
|
|
'--port', '-p',
|
|
|
|
help='Serial port device',
|
2020-11-26 08:28:18 -05:00
|
|
|
default=os.environ.get('ESPTOOL_PORT', '/dev/ttyUSB0')
|
2017-03-07 17:15:19 -05:00
|
|
|
)
|
|
|
|
|
2020-12-28 06:01:14 -05:00
|
|
|
parser.add_argument(
|
|
|
|
'--disable-address-decoding', '-d',
|
2021-02-01 05:40:03 -05:00
|
|
|
help="Don't print lines about decoded addresses from the application ELF file",
|
2021-01-25 21:49:01 -05:00
|
|
|
action='store_true',
|
|
|
|
default=True if os.environ.get('ESP_MONITOR_DECODE') == 0 else False
|
2020-12-28 06:01:14 -05:00
|
|
|
)
|
|
|
|
|
2017-03-07 17:15:19 -05:00
|
|
|
parser.add_argument(
|
|
|
|
'--baud', '-b',
|
|
|
|
help='Serial port baud rate',
|
|
|
|
type=int,
|
2019-11-05 09:21:28 -05:00
|
|
|
default=os.getenv('IDF_MONITOR_BAUD', os.getenv('MONITORBAUD', 115200)))
|
2017-03-07 17:15:19 -05:00
|
|
|
|
|
|
|
parser.add_argument(
|
|
|
|
'--make', '-m',
|
|
|
|
help='Command to run make',
|
|
|
|
type=str, default='make')
|
|
|
|
|
2020-03-23 11:14:34 -04:00
|
|
|
parser.add_argument(
|
|
|
|
'--encrypted',
|
|
|
|
help='Use encrypted targets while running make',
|
|
|
|
action='store_true')
|
|
|
|
|
2017-03-17 06:41:18 -04:00
|
|
|
parser.add_argument(
|
|
|
|
'--toolchain-prefix',
|
2021-01-25 21:49:01 -05:00
|
|
|
help='Triplet prefix to add before cross-toolchain names',
|
2017-03-17 06:41:18 -04:00
|
|
|
default=DEFAULT_TOOLCHAIN_PREFIX)
|
|
|
|
|
|
|
|
parser.add_argument(
|
2021-01-25 21:49:01 -05:00
|
|
|
'--eol',
|
2017-03-17 06:41:18 -04:00
|
|
|
choices=['CR', 'LF', 'CRLF'],
|
|
|
|
type=lambda c: c.upper(),
|
2021-01-25 21:49:01 -05:00
|
|
|
help='End of line to use when sending to the serial port',
|
2017-08-15 04:47:55 -04:00
|
|
|
default='CR')
|
2017-03-17 06:41:18 -04:00
|
|
|
|
2017-03-07 17:15:19 -05:00
|
|
|
parser.add_argument(
|
|
|
|
'elf_file', help='ELF file of application',
|
2017-06-14 22:18:48 -04:00
|
|
|
type=argparse.FileType('rb'))
|
2017-03-07 17:15:19 -05:00
|
|
|
|
2018-05-30 09:35:50 -04:00
|
|
|
parser.add_argument(
|
|
|
|
'--print_filter',
|
2021-01-25 21:49:01 -05:00
|
|
|
help='Filtering string',
|
2018-05-30 09:35:50 -04:00
|
|
|
default=DEFAULT_PRINT_FILTER)
|
|
|
|
|
2020-02-06 13:29:50 -05:00
|
|
|
parser.add_argument(
|
|
|
|
'--decode-coredumps',
|
|
|
|
choices=[COREDUMP_DECODE_INFO, COREDUMP_DECODE_DISABLE],
|
|
|
|
default=COREDUMP_DECODE_INFO,
|
2021-01-25 21:49:01 -05:00
|
|
|
help='Handling of core dumps found in serial output'
|
2020-02-06 13:29:50 -05:00
|
|
|
)
|
|
|
|
|
2020-11-19 21:19:04 -05:00
|
|
|
parser.add_argument(
|
|
|
|
'--decode-panic',
|
|
|
|
choices=[PANIC_DECODE_BACKTRACE, PANIC_DECODE_DISABLE],
|
|
|
|
default=PANIC_DECODE_DISABLE,
|
2021-01-25 21:49:01 -05:00
|
|
|
help='Handling of panic handler info found in serial output'
|
2020-11-19 21:19:04 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
parser.add_argument(
|
|
|
|
'--target',
|
2021-02-01 05:40:03 -05:00
|
|
|
help='Target name (used when stack dump decoding is enabled)',
|
|
|
|
default=os.environ.get('IDF_TARGET', 'esp32')
|
|
|
|
)
|
|
|
|
|
|
|
|
parser.add_argument(
|
|
|
|
'--revision',
|
|
|
|
help='Revision of the target',
|
|
|
|
type=int,
|
|
|
|
default=0
|
2020-11-19 21:19:04 -05:00
|
|
|
)
|
|
|
|
|
2020-05-28 08:47:38 -04:00
|
|
|
parser.add_argument(
|
|
|
|
'--ws',
|
|
|
|
default=os.environ.get('ESP_IDF_MONITOR_WS', None),
|
2021-01-25 21:49:01 -05:00
|
|
|
help='WebSocket URL for communicating with IDE tools for debugging purposes'
|
2020-05-28 08:47:38 -04:00
|
|
|
)
|
|
|
|
|
2017-03-07 17:15:19 -05:00
|
|
|
args = parser.parse_args()
|
|
|
|
|
2020-02-15 03:53:58 -05:00
|
|
|
# GDB uses CreateFile to open COM port, which requires the COM name to be r'\\.\COMx' if the COM
|
|
|
|
# number is larger than 10
|
2021-01-25 21:49:01 -05:00
|
|
|
if os.name == 'nt' and args.port.startswith('COM'):
|
2020-02-15 03:53:58 -05:00
|
|
|
args.port = args.port.replace('COM', r'\\.\COM')
|
2021-01-25 21:49:01 -05:00
|
|
|
yellow_print('--- WARNING: GDB cannot open serial ports accessed as COMx')
|
|
|
|
yellow_print('--- Using %s instead...' % args.port)
|
|
|
|
elif args.port.startswith('/dev/tty.') and sys.platform == 'darwin':
|
|
|
|
args.port = args.port.replace('/dev/tty.', '/dev/cu.')
|
|
|
|
yellow_print('--- WARNING: Serial ports accessed as /dev/tty.* will hang gdb if launched.')
|
|
|
|
yellow_print('--- Using %s instead...' % args.port)
|
2017-03-17 06:41:18 -04:00
|
|
|
|
2017-03-07 17:15:19 -05:00
|
|
|
serial_instance = serial.serial_for_url(args.port, args.baud,
|
|
|
|
do_not_open=True)
|
|
|
|
serial_instance.dtr = False
|
|
|
|
serial_instance.rts = False
|
|
|
|
args.elf_file.close() # don't need this as a file
|
|
|
|
|
|
|
|
# remove the parallel jobserver arguments from MAKEFLAGS, as any
|
|
|
|
# parent make is only running 1 job (monitor), so we can re-spawn
|
|
|
|
# all of the child makes we need (the -j argument remains part of
|
|
|
|
# MAKEFLAGS)
|
|
|
|
try:
|
2021-01-25 21:49:01 -05:00
|
|
|
makeflags = os.environ['MAKEFLAGS']
|
|
|
|
makeflags = re.sub(r'--jobserver[^ =]*=[0-9,]+ ?', '', makeflags)
|
|
|
|
os.environ['MAKEFLAGS'] = makeflags
|
2017-03-07 17:15:19 -05:00
|
|
|
except KeyError:
|
|
|
|
pass # not running a make jobserver
|
|
|
|
|
2020-04-06 13:44:23 -04:00
|
|
|
# Pass the actual used port to callee of idf_monitor (e.g. make) through `ESPPORT` environment
|
|
|
|
# variable
|
|
|
|
# To make sure the key as well as the value are str type, by the requirements of subprocess
|
2021-01-25 21:49:01 -05:00
|
|
|
espport_key = str('ESPPORT')
|
2020-04-06 13:44:23 -04:00
|
|
|
espport_val = str(args.port)
|
|
|
|
os.environ.update({espport_key: espport_val})
|
|
|
|
|
2020-05-28 08:47:38 -04:00
|
|
|
ws = WebSocketClient(args.ws) if args.ws else None
|
|
|
|
try:
|
|
|
|
monitor = Monitor(serial_instance, args.elf_file.name, args.print_filter, args.make, args.encrypted,
|
|
|
|
args.toolchain_prefix, args.eol,
|
2020-11-19 21:19:04 -05:00
|
|
|
args.decode_coredumps, args.decode_panic, args.target,
|
2020-12-28 06:01:14 -05:00
|
|
|
ws, enable_address_decoding=not args.disable_address_decoding)
|
2020-05-28 08:47:38 -04:00
|
|
|
|
2021-02-01 05:40:03 -05:00
|
|
|
yellow_print('--- idf_monitor on {p.name} {p.baudrate} ---'.format(p=serial_instance))
|
2020-05-28 08:47:38 -04:00
|
|
|
yellow_print('--- Quit: {} | Menu: {} | Help: {} followed by {} ---'.format(
|
|
|
|
key_description(monitor.console_parser.exit_key),
|
|
|
|
key_description(monitor.console_parser.menu_key),
|
|
|
|
key_description(monitor.console_parser.menu_key),
|
|
|
|
key_description(CTRL_H)))
|
|
|
|
if args.print_filter != DEFAULT_PRINT_FILTER:
|
|
|
|
yellow_print('--- Print filter: {} ---'.format(args.print_filter))
|
|
|
|
|
|
|
|
monitor.main_loop()
|
|
|
|
finally:
|
|
|
|
if ws:
|
|
|
|
ws.close()
|
|
|
|
|
|
|
|
|
2021-01-25 21:49:01 -05:00
|
|
|
if __name__ == '__main__':
|
2017-03-07 17:15:19 -05:00
|
|
|
main()
|