Pigweed’s tracing module provides facilities for applications to trace information about the execution of their application. The module is split into two components:
The facade, provided elsewhere, which is only a macro interface layer
The backend (this module), is one implemention of the low level tracing.
This module is currently in development, and is therefore still undergoing significant changes.
Future work will:
Add a more complete API for how to retrieve data from ring_buffer.
Add a Python library to decode the trace data.
Add examples with sample output (especially for filtering and triggering).
Add tools to retrieve trace data.
Add more sinks, such as RTT.
Add support to more platforms.
Improve the locking behaviour and provide default trace locking implementions.
The tokenized trace backend aims to be a reasonable tradeoff of trace features and event size for most applications. It works by encoding all compile time data for a trace event into a tokenized number. This provides a good amount of compression, while maintaining the full trace feature set.
In addition the tokenized trace backend adds flexibility through callbacks, which allows the application to do things such as filtering trace_events and triggering tracing to turn on and off. This flexibility can help maximize the effectiveness of a limited trace buffer as well as be a valuable tool while debugging.
Most of this module is compatible with C and C++, the only exception to this is
RegisterCallbackWhenCreated helper class.
All code should use the trace API facade directly. This backend fully implements all features of the tracing facade.
Event Callbacks & Data Sinks#
The tokenized trace module adds both event callbacks and data sinks which provide hooks into tracing.
The event callbacks are called when trace events occur, with the trace event
data, before the event is encoded or sent to the sinks. The callbacks may
modify the run-time fields of the trace event, i.e.
data_size. Using the return flags, these callbacks can
be used to adjust the trace behaviour at runtime in response to specific events.
If requested (using
called_on_every_event) the callback will be called on
every trace event regardless if tracing is currently enabled or not. Using this,
the application can trigger tracing on or off when specific traces or patterns
of traces are observed, or can selectively filter traces to preserve the trace
The event callback is called in the context of the traced task. It must be ISR-safe to support tracing within ISRs. It must be lightweight to prevent performance issues in the trace tasks.
The return flags
pw_trace_TraceEventReturnFlags support the following
PW_TRACE_EVENT_RETURN_FLAGS_SKIP_EVENTcan be set true to skip this sample.
PW_TRACE_EVENT_RETURN_FLAGS_DISABLE_AFTER_PROCESSINGcan be set true to disable tracing after this sample.
pw_trace_TraceEventReturnFlags pw_trace_EventCallback(void *user_data, pw_trace_tokenized_TraceEvent *event)#
- pw_Status pw_trace_RegisterEventCallback(
- pw_trace_EventCallback callback,
- pw_trace_EventCallbackFlags flags,
- void *user_data,
- pw_trace_EventCallbackHandle *handle,
pw_Status pw_trace_UnregisterEventCallback(pw_trace_EventCallbackHandle handle)#
The data sinks are called only for trace events which get processed (tracing
is enabled, and the sample not skipped). The sink callback is called with the
encoded bytes of the trace event, which can be used by the application to
connect different data sinks. The callback is broken into three callbacks
Start is called with the size of the block,
before any bytes are emitted and can be used if needed to allocate space.
AddBytes is then called multiple times with chunks of bytes. Finally
is called to allow any cleanup to be done by the sink if neccessary. Not all
callbacks are required, it is acceptible to provide nullptr for any callbacks
which you don’t require.
void pw_trace_SinkStartBlock(void *user_data, size_t size)#
void pw_trace_SinkAddBytes(void *user_data, const void *bytes, size_t size)#
void pw_trace_SinkEndBlock(void *user_data)#
- pw_Status pw_trace_RegisterSink(
- pw_trace_SinkStartBlock start,
- pw_trace_SinkAddBytes add_bytes,
- pw_trace_SinkEndBlock end_block,
- void *user_data,
- pw_trace_SinkHandle *handle,
pw_Status pw_trace_UnregisterSink(pw_trace_SinkHandle handle)#
Some use-cases might involve referencing a specific trace event, for example
to use it as a trigger or filtering. Since the trace events are tokenized, a
macro is provided to generate the token to use as a reference. All the fields
must match exactly to generate the correct trace reference. If the trace does
not have a group, use
PW_TRACE_REF(event_type, module, label, flags, group)#
PW_TRACE_REF_DATA(event_type, module, label, flags, group, type)#
Tracing requires the platform to provide the time source for tracing, this can be done in one of a few ways.
Create a file with the default time functions, and provide as build variable
pw_trace_tokenized_time, which will get pulled in as a dependency.
Provide time functions elsewhere in project, and ensure they are included.
Provide definitions of the following trace time functions.
The optional trace buffer adds a ring buffer which contains the encoded trace data. This is still a work in progress, in particular better methods for retrieving the data still need to be added. Currently there is an accessor for the underlying ring buffer object, but this is a short term solution.
The buffer has two configurable options:
PW_TRACE_BUFFER_SIZE_BYTES: The total size of the ring buffer in bytes.
PW_TRACE_BUFFER_MAX_BLOCK_SIZE_BYTES: The maximum single trace object size. Including the token, time, and any attached data. Any trace object larger then this will be dropped.
The DeringAndViewRawBuffer function can be used to get bulk access of the full deringed prefixed-ring-buffer data. This might be neccessary for large zero-copy bulk transfers. It is the caller’s responsibility to disable tracing during access to the buffer. The data in the block is defined by the prefixed-ring-buffer format without any user-preamble.
The optional trace buffer logging adds support to dump trace buffers to the log. Buffers are converted to base64-encoding then split across log lines. Trace logs are surrounded by ‘begin’ and ‘end’ tags.
Ex. Invoking PW_TRACE_INSTANT with ‘test1’ and ‘test2’, then calling this function would produce this in the output logs:
[TRACE] begin [TRACE] data: BWdDMRoABWj52YMB [TRACE] end
The python decoder can be used to convert the binary trace data into json data which can be viewed in chrome://tracing.
get_trace.py can be used for retrieveing trace data from devices which are
using the trace_rpc_server.
trace_tokenized.py can be used to decode a binary file of trace data.
The examples all use pw_trace sample app to provide the trace data. Details for how to build, run, and decode the traces are included at the top of each example. This is early work, and is provided as an example of how different tracing concepts can look.
The basic example turns on tracing and dumps all trace output to a file provided on the command line.
The trigger example demonstrates how a trace event can be used as a trigger to
start and stop capturing a trace. The examples makes use of
PW_TRACE_REF_DATA to specify a start and stop event for the capture.
This can be useful if the trace buffer is small and you wish to capture a
specific series of events.
The filter example demonstrates how a callback can be used to filter which trace events get processed and saved. In this example all events from the processing task which don’t have traceId equal to 3 are removed. Both the other task traces are not removed. This can be a useful feature while debugging as it limits the amount of events which get stored to the buffer, and only saves the events of interest.
Tokenized trace buffers can be captured to a
pw.trace.SnapshotTraceInfo proto in the
trace_data field. The expected
format is a de-ringed raw tokenized trace buffer, which can be retrieved via
pw_trace_tokenized does not yet have Python tooling integration for
interpretation of serialized snapshots with a populated