idf_monitor.py 34 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868
  1. #!/usr/bin/env python
  2. #
  3. # esp-idf serial output monitor tool. Does some helpful things:
  4. # - Looks up hex addresses in ELF file with addr2line
  5. # - Reset ESP32 via serial RTS line (Ctrl-T Ctrl-R)
  6. # - Run flash build target to rebuild and flash entire project (Ctrl-T Ctrl-F)
  7. # - Run app-flash build target to rebuild and flash app only (Ctrl-T Ctrl-A)
  8. # - If gdbstub output is detected, gdb is automatically loaded
  9. #
  10. # Copyright 2015-2016 Espressif Systems (Shanghai) PTE LTD
  11. #
  12. # Licensed under the Apache License, Version 2.0 (the "License");
  13. # you may not use this file except in compliance with the License.
  14. # You may obtain a copy of the License at
  15. #
  16. # http://www.apache.org/licenses/LICENSE-2.0
  17. #
  18. # Unless required by applicable law or agreed to in writing, software
  19. # distributed under the License is distributed on an "AS IS" BASIS,
  20. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  21. # See the License for the specific language governing permissions and
  22. # limitations under the License.
  23. #
  24. # Contains elements taken from miniterm "Very simple serial terminal" which
  25. # is part of pySerial. https://github.com/pyserial/pyserial
  26. # (C)2002-2015 Chris Liechti <cliechti@gmx.net>
  27. #
  28. # Originally released under BSD-3-Clause license.
  29. #
  30. from __future__ import print_function, division
  31. from __future__ import unicode_literals
  32. from builtins import chr
  33. from builtins import object
  34. from builtins import bytes
  35. import subprocess
  36. import argparse
  37. import codecs
  38. import datetime
  39. import re
  40. import os
  41. try:
  42. import queue
  43. except ImportError:
  44. import Queue as queue
  45. import shlex
  46. import time
  47. import sys
  48. import serial
  49. import serial.tools.miniterm as miniterm
  50. import threading
  51. import ctypes
  52. import types
  53. from distutils.version import StrictVersion
  54. from io import open
  55. key_description = miniterm.key_description
  56. # Control-key characters
  57. CTRL_A = '\x01'
  58. CTRL_B = '\x02'
  59. CTRL_F = '\x06'
  60. CTRL_H = '\x08'
  61. CTRL_R = '\x12'
  62. CTRL_T = '\x14'
  63. CTRL_Y = '\x19'
  64. CTRL_P = '\x10'
  65. CTRL_X = '\x18'
  66. CTRL_L = '\x0c'
  67. CTRL_RBRACKET = '\x1d' # Ctrl+]
  68. # ANSI terminal codes (if changed, regular expressions in LineMatcher need to be udpated)
  69. ANSI_RED = '\033[1;31m'
  70. ANSI_YELLOW = '\033[0;33m'
  71. ANSI_NORMAL = '\033[0m'
  72. def color_print(message, color):
  73. """ Print a message to stderr with colored highlighting """
  74. sys.stderr.write("%s%s%s\n" % (color, message, ANSI_NORMAL))
  75. def yellow_print(message):
  76. color_print(message, ANSI_YELLOW)
  77. def red_print(message):
  78. color_print(message, ANSI_RED)
  79. __version__ = "1.1"
  80. # Tags for tuples in queues
  81. TAG_KEY = 0
  82. TAG_SERIAL = 1
  83. TAG_SERIAL_FLUSH = 2
  84. # regex matches an potential PC value (0x4xxxxxxx)
  85. MATCH_PCADDR = re.compile(r'0x4[0-9a-f]{7}', re.IGNORECASE)
  86. DEFAULT_TOOLCHAIN_PREFIX = "xtensa-esp32-elf-"
  87. DEFAULT_PRINT_FILTER = ""
  88. class StoppableThread(object):
  89. """
  90. Provide a Thread-like class which can be 'cancelled' via a subclass-provided
  91. cancellation method.
  92. Can be started and stopped multiple times.
  93. Isn't an instance of type Thread because Python Thread objects can only be run once
  94. """
  95. def __init__(self):
  96. self._thread = None
  97. @property
  98. def alive(self):
  99. """
  100. Is 'alive' whenever the internal thread object exists
  101. """
  102. return self._thread is not None
  103. def start(self):
  104. if self._thread is None:
  105. self._thread = threading.Thread(target=self._run_outer)
  106. self._thread.start()
  107. def _cancel(self):
  108. pass # override to provide cancellation functionality
  109. def run(self):
  110. pass # override for the main thread behaviour
  111. def _run_outer(self):
  112. try:
  113. self.run()
  114. finally:
  115. self._thread = None
  116. def stop(self):
  117. if self._thread is not None:
  118. old_thread = self._thread
  119. self._thread = None
  120. self._cancel()
  121. old_thread.join()
  122. class ConsoleReader(StoppableThread):
  123. """ Read input keys from the console and push them to the queue,
  124. until stopped.
  125. """
  126. def __init__(self, console, event_queue, test_mode):
  127. super(ConsoleReader, self).__init__()
  128. self.console = console
  129. self.event_queue = event_queue
  130. self.test_mode = test_mode
  131. def run(self):
  132. self.console.setup()
  133. try:
  134. while self.alive:
  135. try:
  136. if os.name == 'nt':
  137. # Windows kludge: because the console.cancel() method doesn't
  138. # seem to work to unblock getkey() on the Windows implementation.
  139. #
  140. # So we only call getkey() if we know there's a key waiting for us.
  141. import msvcrt
  142. while not msvcrt.kbhit() and self.alive:
  143. time.sleep(0.1)
  144. if not self.alive:
  145. break
  146. elif self.test_mode:
  147. # In testing mode the stdin is connected to PTY but is not used for input anything. For PTY
  148. # the canceling by fcntl.ioctl isn't working and would hang in self.console.getkey().
  149. # Therefore, we avoid calling it.
  150. while self.alive:
  151. time.sleep(0.1)
  152. break
  153. c = self.console.getkey()
  154. except KeyboardInterrupt:
  155. c = '\x03'
  156. if c is not None:
  157. self.event_queue.put((TAG_KEY, c), False)
  158. finally:
  159. self.console.cleanup()
  160. def _cancel(self):
  161. if os.name == 'posix' and not self.test_mode:
  162. # this is the way cancel() is implemented in pyserial 3.3 or newer,
  163. # older pyserial (3.1+) has cancellation implemented via 'select',
  164. # which does not work when console sends an escape sequence response
  165. #
  166. # even older pyserial (<3.1) does not have this method
  167. #
  168. # on Windows there is a different (also hacky) fix, applied above.
  169. #
  170. # note that TIOCSTI is not implemented in WSL / bash-on-Windows.
  171. # TODO: introduce some workaround to make it work there.
  172. #
  173. # Note: This would throw exception in testing mode when the stdin is connected to PTY.
  174. import fcntl
  175. import termios
  176. fcntl.ioctl(self.console.fd, termios.TIOCSTI, b'\0')
  177. class SerialReader(StoppableThread):
  178. """ Read serial data from the serial port and push to the
  179. event queue, until stopped.
  180. """
  181. def __init__(self, serial, event_queue):
  182. super(SerialReader, self).__init__()
  183. self.baud = serial.baudrate
  184. self.serial = serial
  185. self.event_queue = event_queue
  186. if not hasattr(self.serial, 'cancel_read'):
  187. # enable timeout for checking alive flag,
  188. # if cancel_read not available
  189. self.serial.timeout = 0.25
  190. def run(self):
  191. if not self.serial.is_open:
  192. self.serial.baudrate = self.baud
  193. self.serial.rts = True # Force an RTS reset on open
  194. self.serial.open()
  195. self.serial.rts = False
  196. self.serial.dtr = self.serial.dtr # usbser.sys workaround
  197. try:
  198. while self.alive:
  199. data = self.serial.read(self.serial.in_waiting or 1)
  200. if len(data):
  201. self.event_queue.put((TAG_SERIAL, data), False)
  202. finally:
  203. self.serial.close()
  204. def _cancel(self):
  205. if hasattr(self.serial, 'cancel_read'):
  206. try:
  207. self.serial.cancel_read()
  208. except Exception:
  209. pass
  210. class LineMatcher(object):
  211. """
  212. Assembles a dictionary of filtering rules based on the --print_filter
  213. argument of idf_monitor. Then later it is used to match lines and
  214. determine whether they should be shown on screen or not.
  215. """
  216. LEVEL_N = 0
  217. LEVEL_E = 1
  218. LEVEL_W = 2
  219. LEVEL_I = 3
  220. LEVEL_D = 4
  221. LEVEL_V = 5
  222. level = {'N': LEVEL_N, 'E': LEVEL_E, 'W': LEVEL_W, 'I': LEVEL_I, 'D': LEVEL_D,
  223. 'V': LEVEL_V, '*': LEVEL_V, '': LEVEL_V}
  224. def __init__(self, print_filter):
  225. self._dict = dict()
  226. self._re = re.compile(r'^(?:\033\[[01];?[0-9]+m?)?([EWIDV]) \([0-9]+\) ([^:]+): ')
  227. items = print_filter.split()
  228. if len(items) == 0:
  229. self._dict["*"] = self.LEVEL_V # default is to print everything
  230. for f in items:
  231. s = f.split(r':')
  232. if len(s) == 1:
  233. # specifying no warning level defaults to verbose level
  234. lev = self.LEVEL_V
  235. elif len(s) == 2:
  236. if len(s[0]) == 0:
  237. raise ValueError('No tag specified in filter ' + f)
  238. try:
  239. lev = self.level[s[1].upper()]
  240. except KeyError:
  241. raise ValueError('Unknown warning level in filter ' + f)
  242. else:
  243. raise ValueError('Missing ":" in filter ' + f)
  244. self._dict[s[0]] = lev
  245. def match(self, line):
  246. try:
  247. m = self._re.search(line)
  248. if m:
  249. lev = self.level[m.group(1)]
  250. if m.group(2) in self._dict:
  251. return self._dict[m.group(2)] >= lev
  252. return self._dict.get("*", self.LEVEL_N) >= lev
  253. except (KeyError, IndexError):
  254. # Regular line written with something else than ESP_LOG*
  255. # or an empty line.
  256. pass
  257. # We need something more than "*.N" for printing.
  258. return self._dict.get("*", self.LEVEL_N) > self.LEVEL_N
  259. class SerialStopException(Exception):
  260. """
  261. This exception is used for stopping the IDF monitor in testing mode.
  262. """
  263. pass
  264. class Monitor(object):
  265. """
  266. Monitor application main class.
  267. This was originally derived from miniterm.Miniterm, but it turned out to be easier to write from scratch for this
  268. purpose.
  269. Main difference is that all event processing happens in the main thread, not the worker threads.
  270. """
  271. def __init__(self, serial_instance, elf_file, print_filter, make="make", encrypted=False,
  272. toolchain_prefix=DEFAULT_TOOLCHAIN_PREFIX, eol="CRLF"):
  273. super(Monitor, self).__init__()
  274. self.event_queue = queue.Queue()
  275. self.console = miniterm.Console()
  276. if os.name == 'nt':
  277. sys.stderr = ANSIColorConverter(sys.stderr, decode_output=True)
  278. self.console.output = ANSIColorConverter(self.console.output)
  279. self.console.byte_output = ANSIColorConverter(self.console.byte_output)
  280. if StrictVersion(serial.VERSION) < StrictVersion('3.3.0'):
  281. # Use Console.getkey implementation from 3.3.0 (to be in sync with the ConsoleReader._cancel patch above)
  282. def getkey_patched(self):
  283. c = self.enc_stdin.read(1)
  284. if c == chr(0x7f):
  285. c = chr(8) # map the BS key (which yields DEL) to backspace
  286. return c
  287. self.console.getkey = types.MethodType(getkey_patched, self.console)
  288. socket_mode = serial_instance.port.startswith("socket://") # testing hook - data from serial can make exit the monitor
  289. self.serial = serial_instance
  290. self.console_reader = ConsoleReader(self.console, self.event_queue, socket_mode)
  291. self.serial_reader = SerialReader(self.serial, self.event_queue)
  292. self.elf_file = elf_file
  293. if not os.path.exists(make):
  294. self.make = shlex.split(make) # allow for possibility the "make" arg is a list of arguments (for idf.py)
  295. else:
  296. self.make = make
  297. self.encrypted = encrypted
  298. self.toolchain_prefix = toolchain_prefix
  299. self.menu_key = CTRL_T
  300. self.exit_key = CTRL_RBRACKET
  301. self.translate_eol = {
  302. "CRLF": lambda c: c.replace("\n", "\r\n"),
  303. "CR": lambda c: c.replace("\n", "\r"),
  304. "LF": lambda c: c.replace("\r", "\n"),
  305. }[eol]
  306. # internal state
  307. self._pressed_menu_key = False
  308. self._last_line_part = b""
  309. self._gdb_buffer = b""
  310. self._pc_address_buffer = b""
  311. self._line_matcher = LineMatcher(print_filter)
  312. self._invoke_processing_last_line_timer = None
  313. self._force_line_print = False
  314. self._output_enabled = True
  315. self._serial_check_exit = socket_mode
  316. self._log_file = None
  317. def invoke_processing_last_line(self):
  318. self.event_queue.put((TAG_SERIAL_FLUSH, b''), False)
  319. def main_loop(self):
  320. self.console_reader.start()
  321. self.serial_reader.start()
  322. try:
  323. while self.console_reader.alive and self.serial_reader.alive:
  324. (event_tag, data) = self.event_queue.get()
  325. if event_tag == TAG_KEY:
  326. self.handle_key(data)
  327. elif event_tag == TAG_SERIAL:
  328. self.handle_serial_input(data)
  329. if self._invoke_processing_last_line_timer is not None:
  330. self._invoke_processing_last_line_timer.cancel()
  331. self._invoke_processing_last_line_timer = threading.Timer(0.1, self.invoke_processing_last_line)
  332. self._invoke_processing_last_line_timer.start()
  333. # If no futher data is received in the next short period
  334. # of time then the _invoke_processing_last_line_timer
  335. # generates an event which will result in the finishing of
  336. # the last line. This is fix for handling lines sent
  337. # without EOL.
  338. elif event_tag == TAG_SERIAL_FLUSH:
  339. self.handle_serial_input(data, finalize_line=True)
  340. else:
  341. raise RuntimeError("Bad event data %r" % ((event_tag,data),))
  342. except SerialStopException:
  343. sys.stderr.write(ANSI_NORMAL + "Stopping condition has been received\n")
  344. finally:
  345. try:
  346. self.console_reader.stop()
  347. self.serial_reader.stop()
  348. self.stop_logging()
  349. # Cancelling _invoke_processing_last_line_timer is not
  350. # important here because receiving empty data doesn't matter.
  351. self._invoke_processing_last_line_timer = None
  352. except Exception:
  353. pass
  354. sys.stderr.write(ANSI_NORMAL + "\n")
  355. def handle_key(self, key):
  356. if self._pressed_menu_key:
  357. self.handle_menu_key(key)
  358. self._pressed_menu_key = False
  359. elif key == self.menu_key:
  360. self._pressed_menu_key = True
  361. elif key == self.exit_key:
  362. self.console_reader.stop()
  363. self.serial_reader.stop()
  364. else:
  365. try:
  366. key = self.translate_eol(key)
  367. self.serial.write(codecs.encode(key))
  368. except serial.SerialException:
  369. pass # this shouldn't happen, but sometimes port has closed in serial thread
  370. except UnicodeEncodeError:
  371. pass # this can happen if a non-ascii character was passed, ignoring
  372. def handle_serial_input(self, data, finalize_line=False):
  373. sp = data.split(b'\n')
  374. if self._last_line_part != b"":
  375. # add unprocessed part from previous "data" to the first line
  376. sp[0] = self._last_line_part + sp[0]
  377. self._last_line_part = b""
  378. if sp[-1] != b"":
  379. # last part is not a full line
  380. self._last_line_part = sp.pop()
  381. for line in sp:
  382. if line != b"":
  383. if self._serial_check_exit and line == self.exit_key.encode('latin-1'):
  384. raise SerialStopException()
  385. if self._force_line_print or self._line_matcher.match(line.decode(errors="ignore")):
  386. self._print(line + b'\n')
  387. self.handle_possible_pc_address_in_line(line)
  388. self.check_gdbstub_trigger(line)
  389. self._force_line_print = False
  390. # Now we have the last part (incomplete line) in _last_line_part. By
  391. # default we don't touch it and just wait for the arrival of the rest
  392. # of the line. But after some time when we didn't received it we need
  393. # to make a decision.
  394. if self._last_line_part != b"":
  395. if self._force_line_print or (finalize_line and self._line_matcher.match(self._last_line_part.decode(errors="ignore"))):
  396. self._force_line_print = True
  397. self._print(self._last_line_part)
  398. self.handle_possible_pc_address_in_line(self._last_line_part)
  399. self.check_gdbstub_trigger(self._last_line_part)
  400. # It is possible that the incomplete line cuts in half the PC
  401. # address. A small buffer is kept and will be used the next time
  402. # handle_possible_pc_address_in_line is invoked to avoid this problem.
  403. # MATCH_PCADDR matches 10 character long addresses. Therefore, we
  404. # keep the last 9 characters.
  405. self._pc_address_buffer = self._last_line_part[-9:]
  406. # GDB sequence can be cut in half also. GDB sequence is 7
  407. # characters long, therefore, we save the last 6 characters.
  408. self._gdb_buffer = self._last_line_part[-6:]
  409. self._last_line_part = b""
  410. # else: keeping _last_line_part and it will be processed the next time
  411. # handle_serial_input is invoked
  412. def handle_possible_pc_address_in_line(self, line):
  413. line = self._pc_address_buffer + line
  414. self._pc_address_buffer = b""
  415. for m in re.finditer(MATCH_PCADDR, line.decode(errors="ignore")):
  416. self.lookup_pc_address(m.group())
  417. def handle_menu_key(self, c):
  418. if c == self.exit_key or c == self.menu_key: # send verbatim
  419. self.serial.write(codecs.encode(c))
  420. elif c in [CTRL_H, 'h', 'H', '?']:
  421. red_print(self.get_help_text())
  422. elif c == CTRL_R: # Reset device via RTS
  423. self.serial.setRTS(True)
  424. self.serial.setDTR(self.serial.dtr) # usbser.sys workaround
  425. time.sleep(0.2)
  426. self.serial.setRTS(False)
  427. self.serial.setDTR(self.serial.dtr) # usbser.sys workaround
  428. self.output_enable(True)
  429. elif c == CTRL_F: # Recompile & upload
  430. self.run_make("encrypted-flash" if self.encrypted else "flash")
  431. elif c in [CTRL_A, 'a', 'A']: # Recompile & upload app only
  432. # "CTRL-A" cannot be captured with the default settings of the Windows command line, therefore, "A" can be used
  433. # instead
  434. self.run_make("encrypted-app-flash" if self.encrypted else "app-flash")
  435. elif c == CTRL_Y: # Toggle output display
  436. self.output_toggle()
  437. elif c == CTRL_L: # Toggle saving output into file
  438. self.toggle_logging()
  439. elif c == CTRL_P:
  440. yellow_print("Pause app (enter bootloader mode), press Ctrl-T Ctrl-R to restart")
  441. # to fast trigger pause without press menu key
  442. self.serial.setDTR(False) # IO0=HIGH
  443. self.serial.setRTS(True) # EN=LOW, chip in reset
  444. self.serial.setDTR(self.serial.dtr) # usbser.sys workaround
  445. time.sleep(1.3) # timeouts taken from esptool.py, includes esp32r0 workaround. defaults: 0.1
  446. self.serial.setDTR(True) # IO0=LOW
  447. self.serial.setRTS(False) # EN=HIGH, chip out of reset
  448. self.serial.setDTR(self.serial.dtr) # usbser.sys workaround
  449. time.sleep(0.45) # timeouts taken from esptool.py, includes esp32r0 workaround. defaults: 0.05
  450. self.serial.setDTR(False) # IO0=HIGH, done
  451. elif c in [CTRL_X, 'x', 'X']: # Exiting from within the menu
  452. self.console_reader.stop()
  453. self.serial_reader.stop()
  454. else:
  455. red_print('--- unknown menu character {} --'.format(key_description(c)))
  456. def get_help_text(self):
  457. return """
  458. --- idf_monitor ({version}) - ESP-IDF monitor tool
  459. --- based on miniterm from pySerial
  460. ---
  461. --- {exit:8} Exit program
  462. --- {menu:8} Menu escape key, followed by:
  463. --- Menu keys:
  464. --- {menu:14} Send the menu character itself to remote
  465. --- {exit:14} Send the exit character itself to remote
  466. --- {reset:14} Reset target board via RTS line
  467. --- {makecmd:14} Build & flash project
  468. --- {appmake:14} Build & flash app only
  469. --- {output:14} Toggle output display
  470. --- {log:14} Toggle saving output into file
  471. --- {pause:14} Reset target into bootloader to pause app via RTS line
  472. --- {menuexit:14} Exit program
  473. """.format(version=__version__,
  474. exit=key_description(self.exit_key),
  475. menu=key_description(self.menu_key),
  476. reset=key_description(CTRL_R),
  477. makecmd=key_description(CTRL_F),
  478. appmake=key_description(CTRL_A) + ' (or A)',
  479. output=key_description(CTRL_Y),
  480. log=key_description(CTRL_L),
  481. pause=key_description(CTRL_P),
  482. menuexit=key_description(CTRL_X) + ' (or X)')
  483. def __enter__(self):
  484. """ Use 'with self' to temporarily disable monitoring behaviour """
  485. self.serial_reader.stop()
  486. self.console_reader.stop()
  487. def __exit__(self, *args, **kwargs):
  488. """ Use 'with self' to temporarily disable monitoring behaviour """
  489. self.console_reader.start()
  490. self.serial_reader.start()
  491. def prompt_next_action(self, reason):
  492. self.console.setup() # set up console to trap input characters
  493. try:
  494. red_print("""
  495. --- {}
  496. --- Press {} to exit monitor.
  497. --- Press {} to build & flash project.
  498. --- Press {} to build & flash app.
  499. --- Press any other key to resume monitor (resets target).""".format(reason,
  500. key_description(self.exit_key),
  501. key_description(CTRL_F),
  502. key_description(CTRL_A)))
  503. k = CTRL_T # ignore CTRL-T here, so people can muscle-memory Ctrl-T Ctrl-F, etc.
  504. while k == CTRL_T:
  505. k = self.console.getkey()
  506. finally:
  507. self.console.cleanup()
  508. if k == self.exit_key:
  509. self.event_queue.put((TAG_KEY, k))
  510. elif k in [CTRL_F, CTRL_A]:
  511. self.event_queue.put((TAG_KEY, self.menu_key))
  512. self.event_queue.put((TAG_KEY, k))
  513. def run_make(self, target):
  514. with self:
  515. if isinstance(self.make, list):
  516. popen_args = self.make + [target]
  517. else:
  518. popen_args = [self.make, target]
  519. yellow_print("Running %s..." % " ".join(popen_args))
  520. p = subprocess.Popen(popen_args)
  521. try:
  522. p.wait()
  523. except KeyboardInterrupt:
  524. p.wait()
  525. if p.returncode != 0:
  526. self.prompt_next_action("Build failed")
  527. else:
  528. self.output_enable(True)
  529. def lookup_pc_address(self, pc_addr):
  530. cmd = ["%saddr2line" % self.toolchain_prefix,
  531. "-pfiaC", "-e", self.elf_file, pc_addr]
  532. try:
  533. translation = subprocess.check_output(cmd, cwd=".")
  534. if b"?? ??:0" not in translation:
  535. self._print(translation.decode(), console_printer=yellow_print)
  536. except OSError as e:
  537. red_print("%s: %s" % (" ".join(cmd), e))
  538. def check_gdbstub_trigger(self, line):
  539. line = self._gdb_buffer + line
  540. self._gdb_buffer = b""
  541. m = re.search(b"\\$(T..)#(..)", line) # look for a gdb "reason" for a break
  542. if m is not None:
  543. try:
  544. chsum = sum(ord(bytes([p])) for p in m.group(1)) & 0xFF
  545. calc_chsum = int(m.group(2), 16)
  546. except ValueError:
  547. return # payload wasn't valid hex digits
  548. if chsum == calc_chsum:
  549. self.run_gdb()
  550. else:
  551. red_print("Malformed gdb message... calculated checksum %02x received %02x" % (chsum, calc_chsum))
  552. def run_gdb(self):
  553. with self: # disable console control
  554. sys.stderr.write(ANSI_NORMAL)
  555. try:
  556. cmd = ["%sgdb" % self.toolchain_prefix,
  557. "-ex", "set serial baud %d" % self.serial.baudrate,
  558. "-ex", "target remote %s" % self.serial.port,
  559. "-ex", "interrupt", # monitor has already parsed the first 'reason' command, need a second
  560. self.elf_file]
  561. process = subprocess.Popen(cmd, cwd=".")
  562. process.wait()
  563. except OSError as e:
  564. red_print("%s: %s" % (" ".join(cmd), e))
  565. except KeyboardInterrupt:
  566. pass # happens on Windows, maybe other OSes
  567. finally:
  568. try:
  569. # on Linux, maybe other OSes, gdb sometimes seems to be alive even after wait() returns...
  570. process.terminate()
  571. except Exception:
  572. pass
  573. try:
  574. # also on Linux, maybe other OSes, gdb sometimes exits uncleanly and breaks the tty mode
  575. subprocess.call(["stty", "sane"])
  576. except Exception:
  577. pass # don't care if there's no stty, we tried...
  578. self.prompt_next_action("gdb exited")
  579. def output_enable(self, enable):
  580. self._output_enabled = enable
  581. def output_toggle(self):
  582. self._output_enabled = not self._output_enabled
  583. yellow_print("\nToggle output display: {}, Type Ctrl-T Ctrl-Y to show/disable output again.".format(self._output_enabled))
  584. def toggle_logging(self):
  585. if self._log_file:
  586. self.stop_logging()
  587. else:
  588. self.start_logging()
  589. def start_logging(self):
  590. if not self._log_file:
  591. try:
  592. name = "log.{}.{}.txt".format(os.path.splitext(os.path.basename(self.elf_file))[0],
  593. datetime.datetime.now().strftime('%Y%m%d%H%M%S'))
  594. self._log_file = open(name, "wb+")
  595. yellow_print("\nLogging is enabled into file {}".format(name))
  596. except Exception as e:
  597. red_print("\nLog file {} cannot be created: {}".format(name, e))
  598. def stop_logging(self):
  599. if self._log_file:
  600. try:
  601. name = self._log_file.name
  602. self._log_file.close()
  603. yellow_print("\nLogging is disabled and file {} has been closed".format(name))
  604. except Exception as e:
  605. red_print("\nLog file cannot be closed: {}".format(e))
  606. finally:
  607. self._log_file = None
  608. def _print(self, string, console_printer=None):
  609. if console_printer is None:
  610. console_printer = self.console.write_bytes
  611. if self._output_enabled:
  612. console_printer(string)
  613. if self._log_file:
  614. try:
  615. if isinstance(string, type(u'')):
  616. string = string.encode()
  617. self._log_file.write(string)
  618. except Exception as e:
  619. red_print("\nCannot write to file: {}".format(e))
  620. # don't fill-up the screen with the previous errors (probably consequent prints would fail also)
  621. self.stop_logging()
  622. def main():
  623. parser = argparse.ArgumentParser("idf_monitor - a serial output monitor for esp-idf")
  624. parser.add_argument(
  625. '--port', '-p',
  626. help='Serial port device',
  627. default=os.environ.get('ESPTOOL_PORT', '/dev/ttyUSB0')
  628. )
  629. parser.add_argument(
  630. '--baud', '-b',
  631. help='Serial port baud rate',
  632. type=int,
  633. default=os.getenv('IDF_MONITOR_BAUD', os.getenv('MONITORBAUD', 115200)))
  634. parser.add_argument(
  635. '--make', '-m',
  636. help='Command to run make',
  637. type=str, default='make')
  638. parser.add_argument(
  639. '--encrypted',
  640. help='Use encrypted targets while running make',
  641. action='store_true')
  642. parser.add_argument(
  643. '--toolchain-prefix',
  644. help="Triplet prefix to add before cross-toolchain names",
  645. default=DEFAULT_TOOLCHAIN_PREFIX)
  646. parser.add_argument(
  647. "--eol",
  648. choices=['CR', 'LF', 'CRLF'],
  649. type=lambda c: c.upper(),
  650. help="End of line to use when sending to the serial port",
  651. default='CR')
  652. parser.add_argument(
  653. 'elf_file', help='ELF file of application',
  654. type=argparse.FileType('rb'))
  655. parser.add_argument(
  656. '--print_filter',
  657. help="Filtering string",
  658. default=DEFAULT_PRINT_FILTER)
  659. args = parser.parse_args()
  660. if args.port.startswith("/dev/tty."):
  661. args.port = args.port.replace("/dev/tty.", "/dev/cu.")
  662. yellow_print("--- WARNING: Serial ports accessed as /dev/tty.* will hang gdb if launched.")
  663. yellow_print("--- Using %s instead..." % args.port)
  664. serial_instance = serial.serial_for_url(args.port, args.baud,
  665. do_not_open=True)
  666. serial_instance.dtr = False
  667. serial_instance.rts = False
  668. args.elf_file.close() # don't need this as a file
  669. # remove the parallel jobserver arguments from MAKEFLAGS, as any
  670. # parent make is only running 1 job (monitor), so we can re-spawn
  671. # all of the child makes we need (the -j argument remains part of
  672. # MAKEFLAGS)
  673. try:
  674. makeflags = os.environ["MAKEFLAGS"]
  675. makeflags = re.sub(r"--jobserver[^ =]*=[0-9,]+ ?", "", makeflags)
  676. os.environ["MAKEFLAGS"] = makeflags
  677. except KeyError:
  678. pass # not running a make jobserver
  679. monitor = Monitor(serial_instance, args.elf_file.name, args.print_filter, args.make, args.encrypted,
  680. args.toolchain_prefix, args.eol)
  681. yellow_print('--- idf_monitor on {p.name} {p.baudrate} ---'.format(
  682. p=serial_instance))
  683. yellow_print('--- Quit: {} | Menu: {} | Help: {} followed by {} ---'.format(
  684. key_description(monitor.exit_key),
  685. key_description(monitor.menu_key),
  686. key_description(monitor.menu_key),
  687. key_description(CTRL_H)))
  688. if args.print_filter != DEFAULT_PRINT_FILTER:
  689. yellow_print('--- Print filter: {} ---'.format(args.print_filter))
  690. monitor.main_loop()
  691. if os.name == 'nt':
  692. # Windows console stuff
  693. STD_OUTPUT_HANDLE = -11
  694. STD_ERROR_HANDLE = -12
  695. # wincon.h values
  696. FOREGROUND_INTENSITY = 8
  697. FOREGROUND_GREY = 7
  698. # matches the ANSI color change sequences that IDF sends
  699. RE_ANSI_COLOR = re.compile(b'\033\\[([01]);3([0-7])m')
  700. # list mapping the 8 ANSI colors (the indexes) to Windows Console colors
  701. ANSI_TO_WINDOWS_COLOR = [0, 4, 2, 6, 1, 5, 3, 7]
  702. GetStdHandle = ctypes.windll.kernel32.GetStdHandle
  703. SetConsoleTextAttribute = ctypes.windll.kernel32.SetConsoleTextAttribute
  704. class ANSIColorConverter(object):
  705. """Class to wrap a file-like output stream, intercept ANSI color codes,
  706. and convert them into calls to Windows SetConsoleTextAttribute.
  707. Doesn't support all ANSI terminal code escape sequences, only the sequences IDF uses.
  708. Ironically, in Windows this console output is normally wrapped by winpty which will then detect the console text
  709. color changes and convert these back to ANSI color codes for MSYS' terminal to display. However this is the
  710. least-bad working solution, as winpty doesn't support any "passthrough" mode for raw output.
  711. """
  712. def __init__(self, output=None, decode_output=False):
  713. self.output = output
  714. self.decode_output = decode_output
  715. self.handle = GetStdHandle(STD_ERROR_HANDLE if self.output == sys.stderr else STD_OUTPUT_HANDLE)
  716. self.matched = b''
  717. def _output_write(self, data):
  718. try:
  719. if self.decode_output:
  720. self.output.write(data.decode())
  721. else:
  722. self.output.write(data)
  723. except IOError:
  724. # Windows 10 bug since the Fall Creators Update, sometimes writing to console randomly throws
  725. # an exception (however, the character is still written to the screen)
  726. # Ref https://github.com/espressif/esp-idf/issues/1136
  727. pass
  728. except UnicodeDecodeError:
  729. # In case of double byte Unicode characters display '?'
  730. self.output.write('?')
  731. def write(self, data):
  732. if isinstance(data, bytes):
  733. data = bytearray(data)
  734. else:
  735. data = bytearray(data, 'utf-8')
  736. for b in data:
  737. b = bytes([b])
  738. length = len(self.matched)
  739. if b == b'\033': # ESC
  740. self.matched = b
  741. elif (length == 1 and b == b'[') or (1 < length < 7):
  742. self.matched += b
  743. if self.matched == ANSI_NORMAL.encode('latin-1'): # reset console
  744. # Flush is required only with Python3 - switching color before it is printed would mess up the console
  745. self.flush()
  746. SetConsoleTextAttribute(self.handle, FOREGROUND_GREY)
  747. self.matched = b''
  748. elif len(self.matched) == 7: # could be an ANSI sequence
  749. m = re.match(RE_ANSI_COLOR, self.matched)
  750. if m is not None:
  751. color = ANSI_TO_WINDOWS_COLOR[int(m.group(2))]
  752. if m.group(1) == b'1':
  753. color |= FOREGROUND_INTENSITY
  754. # Flush is required only with Python3 - switching color before it is printed would mess up the console
  755. self.flush()
  756. SetConsoleTextAttribute(self.handle, color)
  757. else:
  758. self._output_write(self.matched) # not an ANSI color code, display verbatim
  759. self.matched = b''
  760. else:
  761. self._output_write(b)
  762. self.matched = b''
  763. def flush(self):
  764. self.output.flush()
  765. if __name__ == "__main__":
  766. main()