shell_rtt.c 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127
  1. /*
  2. * Copyright (c) 2018 Makaio GmbH
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. */
  6. #include <shell/shell_rtt.h>
  7. #include <init.h>
  8. #include <SEGGER_RTT.h>
  9. #include <logging/log.h>
  10. BUILD_ASSERT(!(IS_ENABLED(CONFIG_LOG_BACKEND_RTT) &&
  11. COND_CODE_0(CONFIG_LOG_BACKEND_RTT_BUFFER, (1), (0))),
  12. "Conflicting log RTT backend enabled on the same channel");
  13. SHELL_RTT_DEFINE(shell_transport_rtt);
  14. SHELL_DEFINE(shell_rtt, CONFIG_SHELL_PROMPT_RTT, &shell_transport_rtt,
  15. CONFIG_SHELL_BACKEND_RTT_LOG_MESSAGE_QUEUE_SIZE,
  16. CONFIG_SHELL_BACKEND_RTT_LOG_MESSAGE_QUEUE_TIMEOUT,
  17. SHELL_FLAG_OLF_CRLF);
  18. LOG_MODULE_REGISTER(shell_rtt, CONFIG_SHELL_RTT_LOG_LEVEL);
  19. static bool rtt_blocking;
  20. static void timer_handler(struct k_timer *timer)
  21. {
  22. const struct shell_rtt *sh_rtt = k_timer_user_data_get(timer);
  23. if (SEGGER_RTT_HasData(0)) {
  24. sh_rtt->handler(SHELL_TRANSPORT_EVT_RX_RDY, sh_rtt->context);
  25. }
  26. }
  27. static int init(const struct shell_transport *transport,
  28. const void *config,
  29. shell_transport_handler_t evt_handler,
  30. void *context)
  31. {
  32. struct shell_rtt *sh_rtt = (struct shell_rtt *)transport->ctx;
  33. sh_rtt->handler = evt_handler;
  34. sh_rtt->context = context;
  35. k_timer_init(&sh_rtt->timer, timer_handler, NULL);
  36. k_timer_user_data_set(&sh_rtt->timer, (void *)sh_rtt);
  37. k_timer_start(&sh_rtt->timer, K_MSEC(CONFIG_SHELL_RTT_RX_POLL_PERIOD),
  38. K_MSEC(CONFIG_SHELL_RTT_RX_POLL_PERIOD));
  39. return 0;
  40. }
  41. static int uninit(const struct shell_transport *transport)
  42. {
  43. struct shell_rtt *sh_rtt = (struct shell_rtt *)transport->ctx;
  44. k_timer_stop(&sh_rtt->timer);
  45. return 0;
  46. }
  47. static int enable(const struct shell_transport *transport, bool blocking)
  48. {
  49. struct shell_rtt *sh_rtt = (struct shell_rtt *)transport->ctx;
  50. if (blocking) {
  51. rtt_blocking = true;
  52. k_timer_stop(&sh_rtt->timer);
  53. }
  54. return 0;
  55. }
  56. static int write(const struct shell_transport *transport,
  57. const void *data, size_t length, size_t *cnt)
  58. {
  59. struct shell_rtt *sh_rtt = (struct shell_rtt *)transport->ctx;
  60. const uint8_t *data8 = (const uint8_t *)data;
  61. if (rtt_blocking) {
  62. *cnt = SEGGER_RTT_WriteNoLock(0, data8, length);
  63. while (SEGGER_RTT_HasDataUp(0)) {
  64. /* empty */
  65. }
  66. } else {
  67. *cnt = SEGGER_RTT_Write(0, data8, length);
  68. }
  69. sh_rtt->handler(SHELL_TRANSPORT_EVT_TX_RDY, sh_rtt->context);
  70. return 0;
  71. }
  72. static int read(const struct shell_transport *transport,
  73. void *data, size_t length, size_t *cnt)
  74. {
  75. *cnt = SEGGER_RTT_Read(0, data, length);
  76. return 0;
  77. }
  78. const struct shell_transport_api shell_rtt_transport_api = {
  79. .init = init,
  80. .uninit = uninit,
  81. .enable = enable,
  82. .write = write,
  83. .read = read
  84. };
  85. static int enable_shell_rtt(const struct device *arg)
  86. {
  87. ARG_UNUSED(arg);
  88. bool log_backend = CONFIG_SHELL_RTT_INIT_LOG_LEVEL > 0;
  89. uint32_t level = (CONFIG_SHELL_RTT_INIT_LOG_LEVEL > LOG_LEVEL_DBG) ?
  90. CONFIG_LOG_MAX_LEVEL : CONFIG_SHELL_RTT_INIT_LOG_LEVEL;
  91. shell_init(&shell_rtt, NULL, true, log_backend, level);
  92. return 0;
  93. }
  94. /* Function is used for testing purposes */
  95. const struct shell *shell_backend_rtt_get_ptr(void)
  96. {
  97. return &shell_rtt;
  98. }
  99. SYS_INIT(enable_shell_rtt, POST_KERNEL, 0);