bootloader: avoid printing load addresses with '0x'

Since idf_monitor decodes anything that looks like a code address and
starts with 0x, bootloader logs often get annotated with function
names such as WindowOverflow and other random and scary looking things
unrelated to the issue the user is facing. Print the addresses without
0x to avoid confusion by decoded function names. Print hexadecimal
size with 'h' suffix to distinguish it from the decimal value that
follows.
pull/6275/head
Ivan Grokhotkov 2020-12-02 16:33:43 +01:00
rodzic a5fd7878db
commit 89d39308a0
1 zmienionych plików z 1 dodań i 1 usunięć

Wyświetl plik

@ -535,7 +535,7 @@ static esp_err_t process_segment(int index, uint32_t flash_addr, esp_image_segme
do_load = do_load && should_load(load_addr);
if (!silent) {
ESP_LOGI(TAG, "segment %d: paddr=0x%08x vaddr=0x%08x size=0x%05x (%6d) %s",
ESP_LOGI(TAG, "segment %d: paddr=%08x vaddr=%08x size=%05xh (%6d) %s",
index, data_addr, load_addr,
data_len, data_len,
(do_load) ? "load" : (is_mapping) ? "map" : "");