Arm Community
Site
Search
User
Site
Search
User
Groups
Arm Research
DesignStart
Education Hub
Graphics and Gaming
High Performance Computing
Innovation
Multimedia
Open Source Software and Platforms
Physical
Processors
Security
System
Software Tools
TrustZone for Armv8-M
中文社区
Blog
Announcements
Artificial Intelligence
Automotive
Healthcare
HPC
Infrastructure
Innovation
Internet of Things
Machine Learning
Mobile
Smart Homes
Wearables
Forums
All developer forums
IP Product forums
Tool & Software forums
Support
Open a support case
Documentation
Downloads
Training
Arm Approved program
Arm Design Reviews
Community Help
More
Cancel
Developer Community
IP Products
Processors
Jump...
Cancel
Processors
Cortex-M / M-Profile forum
How to get Call Stack from stack data.
Blogs
Forums
Videos & Files
Help
Jump...
Cancel
New
State
Not Answered
Replies
4 replies
Subscribers
6 subscribers
Views
5077 views
Users
0 members are here
register
Cortex-M
Debugger
Related
How to get Call Stack from stack data.
Offline
Mountain Mountain
over 7 years ago
Note: This was originally posted on 23rd January 2009 at
http://forums.arm.com
Hi everyone.
Here is a question that puzzled me a long time. if I get stack data(HEX data), anyone konw that how to get call stack from it.
How to know that which is R14.
Parents
0
Offline
Mountain Mountain
over 7 years ago
Note: This was originally posted on 25th March 2009 at
http://forums.arm.com
Thank you for all your reply.
Recently, I am studying a new platform, when system crash, it can output all task stack data and also identify which is R14 in the stack data as the following:
[color="#FF0000"] [0a0243fc/821933fc]=00003320 TCC_Task_Shell() [/color]
[0a0243f8/821933f8]=00000000
[0a0243f4/821933f4]=00000000
[0a0243f0/821933f0]=00000000
[0a0243ec/821933ec]=00000000
[color="#FF0000"] [0a0243e8/821933e8]=0000332f TCC_Task_Shell() call FuncPtr (Thumb BLX R0)[/color] [0a0243e4/821933e4]=00000000
[0a0243e0/821933e0]=00000000
[0a0243dc/821933dc]=00000000
[0a0243d8/821933d8]=813085ec
[0a0243d4/821933d4]=000b4ba8
[0a0243d0/821933d0]=80eb4bd4
[0a0243cc/821933cc]=000b4ba8
[0a0243c8/821933c8]=00000001
[0a0243c4/821933c4]=00000000
[0a0243c0/821933c0]=00000000
[color="#FF0000"][0a0243bc/821933bc]=000000c0 TCT_Control_Interrupts()
[0a0243b8/821933b8]=8110bec7 capi2driverTask_Entry() call(Thumb BL) CAPI2_HandleEvent() [/color] [0a0243b4/821933b4]=81372868
[0a0243b0/821933b0]=00000011
[0a0243ac/821933ac]=00000000
[0a0243a8/821933a8]=81905240
[0a0243a4/821933a4]=81905220
[color="#FF0000"] [0a0243a0/821933a0]=80f7849f CAPI2_HandleEvent() call(Thumb BL) CAPI2_DispatchMsg() [/color] [0a02439c/8219339c]=81372868
and the wonderful comments in the specification:
[color="#FF0000"] Red colored lines are the actual function call traces[/color] The others can be ignored (they are registers/parameters/
local variables pushed into the stack when a function is called)
How to implement it.
Thank you very mcuh
Cancel
Up
0
Down
Reply
Accept answer
Cancel
Reply
0
Offline
Mountain Mountain
over 7 years ago
Note: This was originally posted on 25th March 2009 at
http://forums.arm.com
Thank you for all your reply.
Recently, I am studying a new platform, when system crash, it can output all task stack data and also identify which is R14 in the stack data as the following:
[color="#FF0000"] [0a0243fc/821933fc]=00003320 TCC_Task_Shell() [/color]
[0a0243f8/821933f8]=00000000
[0a0243f4/821933f4]=00000000
[0a0243f0/821933f0]=00000000
[0a0243ec/821933ec]=00000000
[color="#FF0000"] [0a0243e8/821933e8]=0000332f TCC_Task_Shell() call FuncPtr (Thumb BLX R0)[/color] [0a0243e4/821933e4]=00000000
[0a0243e0/821933e0]=00000000
[0a0243dc/821933dc]=00000000
[0a0243d8/821933d8]=813085ec
[0a0243d4/821933d4]=000b4ba8
[0a0243d0/821933d0]=80eb4bd4
[0a0243cc/821933cc]=000b4ba8
[0a0243c8/821933c8]=00000001
[0a0243c4/821933c4]=00000000
[0a0243c0/821933c0]=00000000
[color="#FF0000"][0a0243bc/821933bc]=000000c0 TCT_Control_Interrupts()
[0a0243b8/821933b8]=8110bec7 capi2driverTask_Entry() call(Thumb BL) CAPI2_HandleEvent() [/color] [0a0243b4/821933b4]=81372868
[0a0243b0/821933b0]=00000011
[0a0243ac/821933ac]=00000000
[0a0243a8/821933a8]=81905240
[0a0243a4/821933a4]=81905220
[color="#FF0000"] [0a0243a0/821933a0]=80f7849f CAPI2_HandleEvent() call(Thumb BL) CAPI2_DispatchMsg() [/color] [0a02439c/8219339c]=81372868
and the wonderful comments in the specification:
[color="#FF0000"] Red colored lines are the actual function call traces[/color] The others can be ignored (they are registers/parameters/
local variables pushed into the stack when a function is called)
How to implement it.
Thank you very mcuh
Cancel
Up
0
Down
Reply
Accept answer
Cancel
Children
No data
More questions in this forum
By title
By date
By reply count
By view count
By most asked
By votes
By quality
Descending
Ascending
All recent questions
Unread questions
Questions you've participated in
Questions you've asked
Unanswered questions
Answered questions
Questions with suggested answers
Questions with no replies
Not Answered
Using STM32H7 ETM without external tool
0
CoreSight ETM7
STM32
331
views
0
replies
Started
3 months ago
by
GuillaumeP
Not Answered
How to realise Real-time detection of access of memory beyond the bounds of an allocation block, instead of period detection in Cortex-M4. Please give me any idea.
0
Cortex-M4
1052
views
3
replies
Latest
3 months ago
by
42Bastian Schick
Not Answered
Getting Dummy character while receiving UART data,How to fix it ?
0
732
views
2
replies
Latest
3 months ago
by
Jerome Decamps - 杜尚杰
Not Answered
Timer not working in stm32f401re
0
Keil MDK Cortex-M Edition
STM32
Cortex-M
STM32 F4
618
views
1
reply
Latest
3 months ago
by
42Bastian Schick
Not Answered
Is there an FPGA image for the MPS2+AN521 with an FPU?
0
Cortex-M33
Cortex-M Prototyping System (V2M-MPS2)
343
views
0
replies
Started
3 months ago
by
erickroane
<
>
View all questions in Cortex-M / M-Profile forum