facab8c5a7
This updates the minimal supported version of CMake to 3.16, which in turn enables us to use more CMake features and have a cleaner build system. This is the version that provides most new features and also the one we use in our latest docker image for CI. |
||
---|---|---|
.. | ||
components/sample | ||
main | ||
CMakeLists.txt | ||
README.md | ||
example_test.py | ||
sdkconfig.ci | ||
sdkconfig.defaults |
README.md
Supported Targets | ESP32 | ESP32-S2 |
---|
Blink Example With Coverage Info (Gcov)
(See the README.md file in the upper level 'examples' directory for more information about examples.)
The following example demonstrates how to compile an ESP-IDF project to generate code coverage data, and how generate a code coverage report using Gcov or Lcov. Refer to the Gcov Guide for more details on the code coverage features supported in ESP-IDF.
This example implements a simple blink application but with code coverage enabled. The example will demonstrate the following features:
- How to compile a project with coverage info enabled.
- Various methods of dumping code coverage data (e.g. Instant Run-Time Dump and Hard-coded Dump).
- How to generate a code coverage report.
How to use example
Hardware Required
To run this example, you need a supported dev board connected to a JTAG adapter, which can come in the following forms:
- ESP-WROVER-KIT which integrates an on-board JTAG adapter. Ensure that the required jumpers to enable JTAG are connected on the WROVER-KIT.
- ESP32 or ESP32-S2 core board (e.g. ESP32-DevKitC, ESP32-S2-Saola-1) can also work as long as you connect it to an external JTAG adapter (e.g. FT2232H, J-LINK).
This example will assume that that an ESP-WROVER-KIT is used.
-
Connect the JTAG interface to ESP32 board, and power up both the JTAG and ESP32. For details about how to set up JTAG interface, please see JTAG Debugging.
-
After connecting JTAG interface, you need to Run OpenOCD.
-
Open a separate terminal window and run telnet by entering the command below. The telnet terminal window is used to feed commands to OpenOCD:
telnet localhost 4444
Configure the project
idf.py menuconfig
The example will enable the following options by default:
- Enable the Application Tracing Module under
Component config -> Application Level Tracing -> Data Destination
by choosingJTAG
. - Enable GCOV to host interface under
Component config -> Application Level Tracing -> GCOV to Host Enable
. - Enable OpenOCD Debug Stubs under
Component config -> ESP System Settings -> OpenOCD debug stubs
Build, Flash, and Run
Build the project and flash it to the board, then run monitor tool to view serial output:
idf.py -p PORT flash monitor
(Replace PORT with the name of the serial port to use.)
(To exit the serial monitor, type Ctrl-]
.)
See the Getting Started Guide for full steps to configure and use ESP-IDF to build projects.
Example Output
1. Hard-coded Dump
The example will initially execute two hard-coded dumps. Therefore, when the application outputs Ready to dump GCOV data...
, users should execute the esp gcov dump
OpenOCD command. The example should output the following:
blink_dummy_func: Counter = 0
some_dummy_func: Counter = 0
Ready to dump GCOV data...
GCOV data have been dumped.
blink_dummy_func: Counter = 1
some_dummy_func: Counter = 2
Ready to dump GCOV data...
GCOV data have been dumped.
2. Instant Run-Time Dump
After the two hard-coded dumps, the example will continue looping through it's main blink function. Users can call esp gcov
OpenOCD command to trigger an instant run-time dump. The output should resemble the following:
blink_dummy_func: Counter = 2
some_dummy_func: Counter = 4
blink_dummy_func: Counter = 3
some_dummy_func: Counter = 6
blink_dummy_func: Counter = 4
some_dummy_func: Counter = 8
blink_dummy_func: Counter = 5
some_dummy_func: Counter = 10
blink_dummy_func: Counter = 6
some_dummy_func: Counter = 12
blink_dummy_func: Counter = 7
some_dummy_func: Counter = 14
blink_dummy_func: Counter = 8
some_dummy_func: Counter = 16
blink_dummy_func: Counter = 9
some_dummy_func: Counter = 18
blink_dummy_func: Counter = 10
some_dummy_func: Counter = 20
...
Generating Gcovr Report
After dumping one or more times, a coverage report can be generated by calling cmake --build build/ --target gcovr-report
. This should result in an HTML code coverage report being generated in the build directory.
To clean Gcov and report related data from the build directory, call cmake --build build/ --target cov-data-clean
The following log should be output when generating the coverage report:
[1/2] Generating coverage report in: /home/user/esp/esp-idf/examples/system/gcov/build/coverage_report
Using gcov: xtensa-esp32-elf-gcov
[2/2] cd /home/user/esp/esp-idf/examples/system/gcov/build && gcovr -r /home/user/esp/esp-idf/examples/system/gcov...a-esp32-elf-gcov -s --html-details /home/user/esp/esp-idf/examples/system/gcov/build/coverage_report/html/index.htm
lines: 100.0% (27 out of 27)
branches: 100.0% (2 out of 2)
Troubleshooting
OpenOCD Out of Sync
If the following log is output when issuing an OpenOCD command via telnet, it could indicate that OpenOCD and the ESP32 are out of sync. This occurs when the ESP32 is externally reset whilst connected to OpenOCD (e.g., by pressing the EN button).
Open On-Chip Debugger
> esp gcov dump
Target halted. PRO_CPU: PC=0x4008AFF4 (active) APP_CPU: PC=0x400E396E
Total trace memory: 16384 bytes
Connect targets...
Target halted. PRO_CPU: PC=0x400D5D74 (active) APP_CPU: PC=0x400E396E
timed out while waiting for target halted / 1 - 2
Failed to wait halt on bp target (-4)!
Failed to halt targets (-4)!
Failed to connect to targets (-4)!
This issue can be resolved in the following ways:
- Reset the board by issuing the
reset
command via telnet - Restart OpenOCD
gcovr not found
gcovr can be installed from the package database of your operating system or directly as a Python package, e.g:
python -m pip install gcovr