Stack traces

gregory.menke at gsfc.nasa.gov gregory.menke at gsfc.nasa.gov
Fri Jul 19 22:45:53 UTC 2002


 > I work on a PowerPC and have my exception handler
 > print a stacktrace very much like the one mentioned
 > by the person using Coldfire.
 > 
 > Since I want to find the reason for the crash, I end
 > up using a disassembled dump of the code anyways
 > and hence I trace back 'manually'. This gives me
 > much more information (along with the register
 > contents that were dumped by the exception handler)
 > than I could get by just having the function names.
 > 
 > Also, I use an exception handler which doesn't kill
 > the system but who tries to just suspend the
 > offending task. Hence, in many cases I have a 'live'
 > system and am still able to get memory dumps etc.
 > 

We regularly use objdumps to trace things.  But, i've found a couple
times that I really could use the actual call tree, as sometimes its
helpful to know where a call tree started from.  Particularly so when
you end up in a generic fatal error and have no idea where things were
when the error happened.  This would be particularly useful for
diagnosing problems during rtems initialization- before the app even
starts up.

I was thinking of function names only as a convienence for the
operator- probably I'll print the various addresses, a few argument
registers and maybe relevant stack frame things.

Our exception handler also has the option of resuming- its mostly up
to the user to either set the vector to a no-op routine or do
something useful rather than a panic.

Gregm




More information about the users mailing list