mbed os with nrf51 internal bandgap enabled to read battery level

Dependents:   BLE_file_test BLE_Blink ExternalEncoder

Committer:
elessair
Date:
Sun Oct 23 15:10:02 2016 +0000
Revision:
0:f269e3021894
Initial commit

Who changed what in which revision?

UserRevisionLine numberNew contents of line
elessair 0:f269e3021894 1 """
elessair 0:f269e3021894 2 mbed SDK
elessair 0:f269e3021894 3 Copyright (c) 2011-2013 ARM Limited
elessair 0:f269e3021894 4
elessair 0:f269e3021894 5 Licensed under the Apache License, Version 2.0 (the "License");
elessair 0:f269e3021894 6 you may not use this file except in compliance with the License.
elessair 0:f269e3021894 7 You may obtain a copy of the License at
elessair 0:f269e3021894 8
elessair 0:f269e3021894 9 http://www.apache.org/licenses/LICENSE-2.0
elessair 0:f269e3021894 10
elessair 0:f269e3021894 11 Unless required by applicable law or agreed to in writing, software
elessair 0:f269e3021894 12 distributed under the License is distributed on an "AS IS" BASIS,
elessair 0:f269e3021894 13 WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
elessair 0:f269e3021894 14 See the License for the specific language governing permissions and
elessair 0:f269e3021894 15 limitations under the License.
elessair 0:f269e3021894 16 """
elessair 0:f269e3021894 17 import re
elessair 0:f269e3021894 18 from os import remove
elessair 0:f269e3021894 19 from os.path import join, splitext, exists
elessair 0:f269e3021894 20
elessair 0:f269e3021894 21 from tools.toolchains import mbedToolchain, TOOLCHAIN_PATHS
elessair 0:f269e3021894 22 from tools.hooks import hook_tool
elessair 0:f269e3021894 23
elessair 0:f269e3021894 24 class IAR(mbedToolchain):
elessair 0:f269e3021894 25 LIBRARY_EXT = '.a'
elessair 0:f269e3021894 26 LINKER_EXT = '.icf'
elessair 0:f269e3021894 27 STD_LIB_NAME = "%s.a"
elessair 0:f269e3021894 28
elessair 0:f269e3021894 29 DIAGNOSTIC_PATTERN = re.compile('"(?P<file>[^"]+)",(?P<line>[\d]+)\s+(?P<severity>Warning|Error)(?P<message>.+)')
elessair 0:f269e3021894 30 INDEX_PATTERN = re.compile('(?P<col>\s*)\^')
elessair 0:f269e3021894 31
elessair 0:f269e3021894 32 @staticmethod
elessair 0:f269e3021894 33 def check_executable():
elessair 0:f269e3021894 34 """Returns True if the executable (arm-none-eabi-gcc) location
elessair 0:f269e3021894 35 specified by the user exists OR the executable can be found on the PATH.
elessair 0:f269e3021894 36 Returns False otherwise."""
elessair 0:f269e3021894 37 return mbedToolchain.generic_check_executable("IAR", 'iccarm', 2, "bin")
elessair 0:f269e3021894 38
elessair 0:f269e3021894 39 def __init__(self, target, notify=None, macros=None,
elessair 0:f269e3021894 40 silent=False, extra_verbose=False, build_profile=None):
elessair 0:f269e3021894 41 mbedToolchain.__init__(self, target, notify, macros, silent,
elessair 0:f269e3021894 42 extra_verbose=extra_verbose,
elessair 0:f269e3021894 43 build_profile=build_profile)
elessair 0:f269e3021894 44 if target.core == "Cortex-M7F" or target.core == "Cortex-M7FD":
elessair 0:f269e3021894 45 cpuchoice = "Cortex-M7"
elessair 0:f269e3021894 46 else:
elessair 0:f269e3021894 47 cpuchoice = target.core
elessair 0:f269e3021894 48
elessair 0:f269e3021894 49 # flags_cmd are used only by our scripts, the project files have them already defined,
elessair 0:f269e3021894 50 # using this flags results in the errors (duplication)
elessair 0:f269e3021894 51 # asm accepts --cpu Core or --fpu FPU, not like c/c++ --cpu=Core
elessair 0:f269e3021894 52 if target.core == "Cortex-M4F":
elessair 0:f269e3021894 53 asm_flags_cmd = [
elessair 0:f269e3021894 54 "--cpu", "Cortex-M4F"
elessair 0:f269e3021894 55 ]
elessair 0:f269e3021894 56 else:
elessair 0:f269e3021894 57 asm_flags_cmd = [
elessair 0:f269e3021894 58 "--cpu", cpuchoice
elessair 0:f269e3021894 59 ]
elessair 0:f269e3021894 60 # custom c flags
elessair 0:f269e3021894 61 if target.core == "Cortex-M4F":
elessair 0:f269e3021894 62 c_flags_cmd = [
elessair 0:f269e3021894 63 "--cpu", "Cortex-M4F",
elessair 0:f269e3021894 64 "--thumb", "--dlib_config", join(TOOLCHAIN_PATHS['IAR'], "inc", "c", "DLib_Config_Full.h")
elessair 0:f269e3021894 65 ]
elessair 0:f269e3021894 66 else:
elessair 0:f269e3021894 67 c_flags_cmd = [
elessair 0:f269e3021894 68 "--cpu", cpuchoice,
elessair 0:f269e3021894 69 "--thumb", "--dlib_config", join(TOOLCHAIN_PATHS['IAR'], "inc", "c", "DLib_Config_Full.h")
elessair 0:f269e3021894 70 ]
elessair 0:f269e3021894 71 # custom c++ cmd flags
elessair 0:f269e3021894 72 cxx_flags_cmd = [
elessair 0:f269e3021894 73 "--c++", "--no_rtti", "--no_exceptions"
elessair 0:f269e3021894 74 ]
elessair 0:f269e3021894 75 if target.core == "Cortex-M7FD":
elessair 0:f269e3021894 76 asm_flags_cmd += ["--fpu", "VFPv5"]
elessair 0:f269e3021894 77 c_flags_cmd.append("--fpu=VFPv5")
elessair 0:f269e3021894 78 elif target.core == "Cortex-M7F":
elessair 0:f269e3021894 79 asm_flags_cmd += ["--fpu", "VFPv5_sp"]
elessair 0:f269e3021894 80 c_flags_cmd.append("--fpu=VFPv5_sp")
elessair 0:f269e3021894 81
elessair 0:f269e3021894 82 IAR_BIN = join(TOOLCHAIN_PATHS['IAR'], "bin")
elessair 0:f269e3021894 83 main_cc = join(IAR_BIN, "iccarm")
elessair 0:f269e3021894 84
elessair 0:f269e3021894 85 self.asm = [join(IAR_BIN, "iasmarm")] + asm_flags_cmd + self.flags["asm"]
elessair 0:f269e3021894 86 self.cc = [main_cc]
elessair 0:f269e3021894 87 self.cppc = [main_cc]
elessair 0:f269e3021894 88 self.cc += self.flags["common"] + c_flags_cmd + self.flags["c"]
elessair 0:f269e3021894 89 self.cppc += self.flags["common"] + c_flags_cmd + cxx_flags_cmd + self.flags["cxx"]
elessair 0:f269e3021894 90 self.ld = [join(IAR_BIN, "ilinkarm")]
elessair 0:f269e3021894 91 self.ar = join(IAR_BIN, "iarchive")
elessair 0:f269e3021894 92 self.elf2bin = join(IAR_BIN, "ielftool")
elessair 0:f269e3021894 93
elessair 0:f269e3021894 94 def parse_dependencies(self, dep_path):
elessair 0:f269e3021894 95 return [(self.CHROOT if self.CHROOT else '')+path.strip() for path in open(dep_path).readlines()
elessair 0:f269e3021894 96 if (path and not path.isspace())]
elessair 0:f269e3021894 97
elessair 0:f269e3021894 98 def parse_output(self, output):
elessair 0:f269e3021894 99 msg = None
elessair 0:f269e3021894 100 for line in output.splitlines():
elessair 0:f269e3021894 101 match = IAR.DIAGNOSTIC_PATTERN.match(line)
elessair 0:f269e3021894 102 if match is not None:
elessair 0:f269e3021894 103 if msg is not None:
elessair 0:f269e3021894 104 self.cc_info(msg)
elessair 0:f269e3021894 105 msg = None
elessair 0:f269e3021894 106 msg = {
elessair 0:f269e3021894 107 'severity': match.group('severity').lower(),
elessair 0:f269e3021894 108 'file': match.group('file'),
elessair 0:f269e3021894 109 'line': match.group('line'),
elessair 0:f269e3021894 110 'col': 0,
elessair 0:f269e3021894 111 'message': match.group('message'),
elessair 0:f269e3021894 112 'text': '',
elessair 0:f269e3021894 113 'target_name': self.target.name,
elessair 0:f269e3021894 114 'toolchain_name': self.name
elessair 0:f269e3021894 115 }
elessair 0:f269e3021894 116 elif msg is not None:
elessair 0:f269e3021894 117 # Determine the warning/error column by calculating the ^ position
elessair 0:f269e3021894 118 match = IAR.INDEX_PATTERN.match(line)
elessair 0:f269e3021894 119 if match is not None:
elessair 0:f269e3021894 120 msg['col'] = len(match.group('col'))
elessair 0:f269e3021894 121 self.cc_info(msg)
elessair 0:f269e3021894 122 msg = None
elessair 0:f269e3021894 123 else:
elessair 0:f269e3021894 124 msg['text'] += line+"\n"
elessair 0:f269e3021894 125
elessair 0:f269e3021894 126 if msg is not None:
elessair 0:f269e3021894 127 self.cc_info(msg)
elessair 0:f269e3021894 128
elessair 0:f269e3021894 129 def get_dep_option(self, object):
elessair 0:f269e3021894 130 base, _ = splitext(object)
elessair 0:f269e3021894 131 dep_path = base + '.d'
elessair 0:f269e3021894 132 return ["--dependencies", dep_path]
elessair 0:f269e3021894 133
elessair 0:f269e3021894 134 def cc_extra(self, object):
elessair 0:f269e3021894 135 base, _ = splitext(object)
elessair 0:f269e3021894 136 return ["-l", base + '.s.txt']
elessair 0:f269e3021894 137
elessair 0:f269e3021894 138 def get_config_option(self, config_header):
elessair 0:f269e3021894 139 return ['--preinclude=' + config_header]
elessair 0:f269e3021894 140
elessair 0:f269e3021894 141 def get_compile_options(self, defines, includes, for_asm=False):
elessair 0:f269e3021894 142 opts = ['-D%s' % d for d in defines]
elessair 0:f269e3021894 143 if self.RESPONSE_FILES:
elessair 0:f269e3021894 144 opts += ['-f', self.get_inc_file(includes)]
elessair 0:f269e3021894 145 else:
elessair 0:f269e3021894 146 opts += ["-I%s" % i for i in includes]
elessair 0:f269e3021894 147
elessair 0:f269e3021894 148 if not for_asm:
elessair 0:f269e3021894 149 config_header = self.get_config_header()
elessair 0:f269e3021894 150 if config_header is not None:
elessair 0:f269e3021894 151 opts = opts + self.get_config_option(config_header)
elessair 0:f269e3021894 152 return opts
elessair 0:f269e3021894 153
elessair 0:f269e3021894 154 @hook_tool
elessair 0:f269e3021894 155 def assemble(self, source, object, includes):
elessair 0:f269e3021894 156 # Build assemble command
elessair 0:f269e3021894 157 cmd = self.asm + self.get_compile_options(self.get_symbols(True), includes, True) + ["-o", object, source]
elessair 0:f269e3021894 158
elessair 0:f269e3021894 159 # Call cmdline hook
elessair 0:f269e3021894 160 cmd = self.hook.get_cmdline_assembler(cmd)
elessair 0:f269e3021894 161
elessair 0:f269e3021894 162 # Return command array, don't execute
elessair 0:f269e3021894 163 return [cmd]
elessair 0:f269e3021894 164
elessair 0:f269e3021894 165 @hook_tool
elessair 0:f269e3021894 166 def compile(self, cc, source, object, includes):
elessair 0:f269e3021894 167 # Build compile command
elessair 0:f269e3021894 168 cmd = cc + self.get_compile_options(self.get_symbols(), includes)
elessair 0:f269e3021894 169
elessair 0:f269e3021894 170 cmd.extend(self.get_dep_option(object))
elessair 0:f269e3021894 171
elessair 0:f269e3021894 172 cmd.extend(self.cc_extra(object))
elessair 0:f269e3021894 173
elessair 0:f269e3021894 174 cmd.extend(["-o", object, source])
elessair 0:f269e3021894 175
elessair 0:f269e3021894 176 # Call cmdline hook
elessair 0:f269e3021894 177 cmd = self.hook.get_cmdline_compiler(cmd)
elessair 0:f269e3021894 178
elessair 0:f269e3021894 179 return [cmd]
elessair 0:f269e3021894 180
elessair 0:f269e3021894 181 def compile_c(self, source, object, includes):
elessair 0:f269e3021894 182 return self.compile(self.cc, source, object, includes)
elessair 0:f269e3021894 183
elessair 0:f269e3021894 184 def compile_cpp(self, source, object, includes):
elessair 0:f269e3021894 185 return self.compile(self.cppc, source, object, includes)
elessair 0:f269e3021894 186
elessair 0:f269e3021894 187 @hook_tool
elessair 0:f269e3021894 188 def link(self, output, objects, libraries, lib_dirs, mem_map):
elessair 0:f269e3021894 189 # Build linker command
elessair 0:f269e3021894 190 map_file = splitext(output)[0] + ".map"
elessair 0:f269e3021894 191 cmd = self.ld + [ "-o", output, "--map=%s" % map_file] + objects + libraries + self.flags['ld']
elessair 0:f269e3021894 192
elessair 0:f269e3021894 193 if mem_map:
elessair 0:f269e3021894 194 cmd.extend(["--config", mem_map])
elessair 0:f269e3021894 195
elessair 0:f269e3021894 196 # Call cmdline hook
elessair 0:f269e3021894 197 cmd = self.hook.get_cmdline_linker(cmd)
elessair 0:f269e3021894 198
elessair 0:f269e3021894 199 if self.RESPONSE_FILES:
elessair 0:f269e3021894 200 # Split link command to linker executable + response file
elessair 0:f269e3021894 201 cmd_linker = cmd[0]
elessair 0:f269e3021894 202 link_files = self.get_link_file(cmd[1:])
elessair 0:f269e3021894 203 cmd = [cmd_linker, '-f', link_files]
elessair 0:f269e3021894 204
elessair 0:f269e3021894 205 # Exec command
elessair 0:f269e3021894 206 self.cc_verbose("Link: %s" % ' '.join(cmd))
elessair 0:f269e3021894 207 self.default_cmd(cmd)
elessair 0:f269e3021894 208
elessair 0:f269e3021894 209 @hook_tool
elessair 0:f269e3021894 210 def archive(self, objects, lib_path):
elessair 0:f269e3021894 211 if self.RESPONSE_FILES:
elessair 0:f269e3021894 212 param = ['-f', self.get_arch_file(objects)]
elessair 0:f269e3021894 213 else:
elessair 0:f269e3021894 214 param = objects
elessair 0:f269e3021894 215
elessair 0:f269e3021894 216 if exists(lib_path):
elessair 0:f269e3021894 217 remove(lib_path)
elessair 0:f269e3021894 218
elessair 0:f269e3021894 219 self.default_cmd([self.ar, lib_path] + param)
elessair 0:f269e3021894 220
elessair 0:f269e3021894 221 @hook_tool
elessair 0:f269e3021894 222 def binary(self, resources, elf, bin):
elessair 0:f269e3021894 223 # Build binary command
elessair 0:f269e3021894 224 cmd = [self.elf2bin, "--bin", elf, bin]
elessair 0:f269e3021894 225
elessair 0:f269e3021894 226 # Call cmdline hook
elessair 0:f269e3021894 227 cmd = self.hook.get_cmdline_binary(cmd)
elessair 0:f269e3021894 228
elessair 0:f269e3021894 229 # Exec command
elessair 0:f269e3021894 230 self.cc_verbose("FromELF: %s" % ' '.join(cmd))
elessair 0:f269e3021894 231 self.default_cmd(cmd)