| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364 |
- from __future__ import unicode_literals
- import os
- import re
- import tempfile
- from io import open
- import debug_backend
- import ttfw_idf
- @ttfw_idf.idf_example_test(env_tag='test_jtag_arm')
- def test_examples_sysview_tracing_heap_log(env, extra_data):
- rel_project_path = os.path.join('examples', 'system', 'sysview_tracing_heap_log')
- dut = env.get_dut('sysview_tracing_heap_log', rel_project_path)
- proj_path = os.path.join(dut.app.idf_path, rel_project_path)
- elf_path = os.path.join(dut.app.binary_path, 'sysview_tracing_heap_log.elf')
- def get_temp_file():
- with tempfile.NamedTemporaryFile(delete=False) as f:
- return f.name
- try:
- tempfiles = [get_temp_file(), get_temp_file()]
- with open(os.path.join(proj_path, 'gdbinit')) as f_in, open(tempfiles[0], 'w') as f_out:
- new_content = f_in.read()
- # localhost connection issue occurs in docker unless:
- new_content = new_content.replace(':3333', '127.0.0.1:3333', 1)
- new_content = new_content.replace('file:///tmp/heap_log.svdat', 'file://{}'.format(tempfiles[1]), 1)
- f_out.write(new_content)
- with ttfw_idf.OCDBackend(os.path.join(proj_path, 'openocd.log'), dut.app.target):
- dut.start_app()
- dut.expect('esp_apptrace: Initialized TRAX on CPU0')
- gdb_log = os.path.join(proj_path, 'gdb.log')
- gdb_workdir = os.path.join(proj_path, 'main')
- with ttfw_idf.GDBBackend(gdb_log, elf_path, dut.app.target, tempfiles[0], gdb_workdir) as p:
- for _ in range(2): # There are two breakpoints
- p.gdb.wait_target_state(debug_backend.TARGET_STATE_RUNNING)
- stop_reason = p.gdb.wait_target_state(debug_backend.TARGET_STATE_STOPPED)
- assert stop_reason == debug_backend.TARGET_STOP_REASON_BP, 'STOP reason: {}'.format(stop_reason)
- # dut has been restarted by gdb since the last dut.expect()
- dut.expect('esp_apptrace: Initialized TRAX on CPU0')
- with ttfw_idf.CustomProcess(' '.join([os.path.join(dut.app.idf_path, 'tools/esp_app_trace/sysviewtrace_proc.py'),
- '-p',
- '-b', elf_path,
- tempfiles[1]]),
- logfile='sysviewtrace_proc.log') as sysviewtrace:
- sysviewtrace.pexpect_proc.expect(re.compile(r'Found \d+ leaked bytes in \d+ blocks.'), timeout=120)
- finally:
- for x in tempfiles:
- try:
- os.unlink(x)
- except Exception:
- pass
- if __name__ == '__main__':
- test_examples_sysview_tracing_heap_log()
|