tracing: Automatic syscall tracing
When generating syscall wrappers, call a tracing macro with the id, name, and all parameters of the syscall as params when entering and leaving the syscall. This can be disabled in certain call sites by defining DISABLE_SYSCALL_TRACING which is useful for certain tracing implementations which require syscalls themselves to work. Notably some syscalls *cannot* be automatically traced this way and headers where exclusions are set are in the gen_syscall.py as notracing. Includes a systemview and test format implementation. Tested with systemview, usb, and uart backends with the string formatter using the tracing sample app. Debugging the trace wrapper can be aided by setting the TRACE_DIAGNOSTIC env var and rebuilding from scratch, a warning is issued for every instance a syscall is traced. Automatically generating a name mapping for SYSVIEW_Zephyr.txt is a future item as is documenting how to capture and use the tracing data generated. Signed-off-by: Tom Burdick <thomas.burdick@intel.com>
This commit is contained in:
parent
43fa7ce53f
commit
97dc88bb6d
15 changed files with 533 additions and 172 deletions
|
@ -204,7 +204,7 @@ config TRACING_CMD_BUFFER_SIZE
|
|||
|
||||
menu "Tracing Configuration"
|
||||
|
||||
config SYSCALL_TRACING
|
||||
config TRACING_SYSCALL
|
||||
bool "Enable tracing Syscalls"
|
||||
default y
|
||||
help
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue