mirror of
https://github.com/esphome/esphome.git
synced 2024-12-23 05:54:56 +01:00
209 lines
7.3 KiB
Python
209 lines
7.3 KiB
Python
import json
|
|
import logging
|
|
import re
|
|
import subprocess
|
|
|
|
from esphomeyaml.core import CORE
|
|
from esphomeyaml.util import run_external_command
|
|
|
|
_LOGGER = logging.getLogger(__name__)
|
|
|
|
|
|
def run_platformio_cli(*args, **kwargs):
|
|
import platformio.__main__
|
|
|
|
cmd = ['platformio'] + list(args)
|
|
return run_external_command(platformio.__main__.main,
|
|
*cmd, **kwargs)
|
|
|
|
|
|
def run_platformio_cli_run(config, verbose, *args, **kwargs):
|
|
command = ['run', '-d', CORE.build_path]
|
|
if verbose:
|
|
command += ['-v']
|
|
command += list(args)
|
|
return run_platformio_cli(*command, **kwargs)
|
|
|
|
|
|
def run_compile(config, verbose):
|
|
return run_platformio_cli_run(config, verbose)
|
|
|
|
|
|
def run_upload(config, verbose, port):
|
|
return run_platformio_cli_run(config, verbose, '-t', 'upload', '--upload-port', port)
|
|
|
|
|
|
def run_idedata(config):
|
|
args = ['-t', 'idedata']
|
|
stdout = run_platformio_cli_run(config, False, *args, capture_stdout=True)
|
|
match = re.search(r'{.*}', stdout)
|
|
if match is None:
|
|
return IDEData(None)
|
|
try:
|
|
return IDEData(json.loads(match.group()))
|
|
except ValueError:
|
|
return IDEData(None)
|
|
|
|
|
|
IDE_DATA = None
|
|
|
|
|
|
def get_idedata(config):
|
|
global IDE_DATA
|
|
|
|
if IDE_DATA is None:
|
|
_LOGGER.info("Need to fetch platformio IDE-data, please stand by")
|
|
IDE_DATA = run_idedata(config)
|
|
return IDE_DATA
|
|
|
|
|
|
# ESP logs stack trace decoder, based on https://github.com/me-no-dev/EspExceptionDecoder
|
|
ESP8266_EXCEPTION_CODES = {
|
|
0: "Illegal instruction",
|
|
1: "SYSCALL instruction",
|
|
2: "InstructionFetchError: Processor internal physical address or data error during "
|
|
"instruction fetch",
|
|
3: "LoadStoreError: Processor internal physical address or data error during load or store",
|
|
4: "Level1Interrupt: Level-1 interrupt as indicated by set level-1 bits in the INTERRUPT "
|
|
"register",
|
|
5: "Alloca: MOVSP instruction, if caller's registers are not in the register file",
|
|
6: "IntegerDivideByZero: QUOS, QUOU, REMS, or REMU divisor operand is zero",
|
|
7: "reserved",
|
|
8: "Privileged: Attempt to execute a privileged operation when CRING ? 0",
|
|
9: "LoadStoreAlignmentCause: Load or store to an unaligned address",
|
|
10: "reserved",
|
|
11: "reserved",
|
|
12: "InstrPIFDataError: PIF data error during instruction fetch",
|
|
13: "LoadStorePIFDataError: Synchronous PIF data error during LoadStore access",
|
|
14: "InstrPIFAddrError: PIF address error during instruction fetch",
|
|
15: "LoadStorePIFAddrError: Synchronous PIF address error during LoadStore access",
|
|
16: "InstTLBMiss: Error during Instruction TLB refill",
|
|
17: "InstTLBMultiHit: Multiple instruction TLB entries matched",
|
|
18: "InstFetchPrivilege: An instruction fetch referenced a virtual address at a ring level "
|
|
"less than CRING",
|
|
19: "reserved",
|
|
20: "InstFetchProhibited: An instruction fetch referenced a page mapped with an attribute "
|
|
"that does not permit instruction fetch",
|
|
21: "reserved",
|
|
22: "reserved",
|
|
23: "reserved",
|
|
24: "LoadStoreTLBMiss: Error during TLB refill for a load or store",
|
|
25: "LoadStoreTLBMultiHit: Multiple TLB entries matched for a load or store",
|
|
26: "LoadStorePrivilege: A load or store referenced a virtual address at a ring level less "
|
|
"than ",
|
|
27: "reserved",
|
|
28: "LoadProhibited: A load referenced a page mapped with an attribute that does not permit "
|
|
"loads",
|
|
29: "StoreProhibited: A store referenced a page mapped with an attribute that does not permit "
|
|
"stores",
|
|
}
|
|
|
|
|
|
def _decode_pc(config, addr):
|
|
idedata = get_idedata(config)
|
|
if not idedata.addr2line_path or not idedata.firmware_elf_path:
|
|
return
|
|
command = [idedata.addr2line_path, '-pfiaC', '-e', idedata.firmware_elf_path, addr]
|
|
try:
|
|
translation = subprocess.check_output(command).strip()
|
|
except Exception: # pylint: disable=broad-except
|
|
return
|
|
|
|
if "?? ??:0" in translation:
|
|
# Nothing useful
|
|
return
|
|
translation = translation.replace(' at ??:?', '').replace(':?', '')
|
|
_LOGGER.warning("Decoded %s", translation)
|
|
|
|
|
|
def _parse_register(config, regex, line):
|
|
match = regex.match(line)
|
|
if match is not None:
|
|
_decode_pc(config, match.group(1))
|
|
|
|
|
|
STACKTRACE_ESP8266_EXCEPTION_TYPE_RE = re.compile(r'Exception \(([0-9]*)\):')
|
|
STACKTRACE_ESP8266_PC_RE = re.compile(r'epc1=0x(4[0-9a-fA-F]{7})')
|
|
STACKTRACE_ESP8266_EXCVADDR_RE = re.compile(r'excvaddr=0x(4[0-9a-fA-F]{7})')
|
|
STACKTRACE_ESP32_PC_RE = re.compile(r'PC\s*:\s*(?:0x)?(4[0-9a-fA-F]{7})')
|
|
STACKTRACE_ESP32_EXCVADDR_RE = re.compile(r'EXCVADDR\s*:\s*(?:0x)?(4[0-9a-fA-F]{7})')
|
|
STACKTRACE_BAD_ALLOC_RE = re.compile(r'^last failed alloc call: (4[0-9a-fA-F]{7})\((\d+)\)$')
|
|
STACKTRACE_ESP32_BACKTRACE_RE = re.compile(r'Backtrace:(?:\s+0x4[0-9a-fA-F]{7}:0x3[0-9a-fA-F]{7})+')
|
|
STACKTRACE_ESP32_BACKTRACE_PC_RE = re.compile(r'4[0-9a-f]{7}')
|
|
STACKTRACE_ESP8266_BACKTRACE_PC_RE = re.compile(r'4[0-9a-f]{7}')
|
|
|
|
|
|
def process_stacktrace(config, line, backtrace_state):
|
|
line = line.strip()
|
|
# ESP8266 Exception type
|
|
match = re.match(STACKTRACE_ESP8266_EXCEPTION_TYPE_RE, line)
|
|
if match is not None:
|
|
code = match.group(1)
|
|
_LOGGER.warning("Exception type: %s", ESP8266_EXCEPTION_CODES.get(code, 'unknown'))
|
|
|
|
# ESP8266 PC/EXCVADDR
|
|
_parse_register(config, STACKTRACE_ESP8266_PC_RE, line)
|
|
_parse_register(config, STACKTRACE_ESP8266_EXCVADDR_RE, line)
|
|
# ESP32 PC/EXCVADDR
|
|
_parse_register(config, STACKTRACE_ESP32_PC_RE, line)
|
|
_parse_register(config, STACKTRACE_ESP32_EXCVADDR_RE, line)
|
|
|
|
# bad alloc
|
|
match = re.match(STACKTRACE_BAD_ALLOC_RE, line)
|
|
if match is not None:
|
|
_LOGGER.warning("Memory allocation of %s bytes failed at %s",
|
|
match.group(2), match.group(1))
|
|
_decode_pc(config, match.group(1))
|
|
|
|
# ESP32 single-line backtrace
|
|
match = re.match(STACKTRACE_ESP32_BACKTRACE_RE, line)
|
|
if match is not None:
|
|
_LOGGER.warning("Found stack trace! Trying to decode it")
|
|
for addr in re.finditer(STACKTRACE_ESP32_BACKTRACE_PC_RE, line):
|
|
_decode_pc(config, addr.group())
|
|
|
|
# ESP8266 multi-line backtrace
|
|
if '>>>stack>>>' in line:
|
|
# Start of backtrace
|
|
backtrace_state = True
|
|
_LOGGER.warning("Found stack trace! Trying to decode it")
|
|
elif '<<<stack<<<' in line:
|
|
# End of backtrace
|
|
backtrace_state = False
|
|
|
|
if backtrace_state:
|
|
for addr in re.finditer(STACKTRACE_ESP8266_BACKTRACE_PC_RE, line):
|
|
_decode_pc(config, addr.group())
|
|
|
|
return backtrace_state
|
|
|
|
|
|
class IDEData(object):
|
|
def __init__(self, raw):
|
|
if not isinstance(raw, dict):
|
|
self.raw = {}
|
|
else:
|
|
self.raw = raw
|
|
|
|
@property
|
|
def firmware_elf_path(self):
|
|
return self.raw.get("prog_path")
|
|
|
|
@property
|
|
def flash_extra_images(self):
|
|
return [
|
|
(x['path'], x['offset']) for x in self.raw.get("flash_extra_images", [])
|
|
]
|
|
|
|
@property
|
|
def cc_path(self):
|
|
# For example /Users/<USER>/.platformio/packages/toolchain-xtensa32/bin/xtensa-esp32-elf-gcc
|
|
return self.raw.get("cc_path")
|
|
|
|
@property
|
|
def addr2line_path(self):
|
|
cc_path = self.cc_path
|
|
if cc_path is None:
|
|
return None
|
|
# replace gcc at end with addr2line
|
|
return cc_path[:-3] + 'addr2line'
|