anjiahao1 opened a new pull request, #17549:
URL: https://github.com/apache/nuttx/pull/17549

   
   *Note: Please adhere to [Contributing 
Guidelines](https://github.com/apache/nuttx/blob/master/CONTRIBUTING.md).*
   
   ## Summary
   
   This is a debug feature that allows gdb to use the backtrace command to 
trace back from the kernel to the user.
   
   gdb nuttx -ex "add-symbol-file nuttx_user"
   
   ## Impact
   
   nothing, just for debug protect build
   
   ## Testing
   
   armv8m:use ip save pc
   armv7m:use ip save pc, r11 save sp
   
   nsh_main backtrace before:
   ```
   0  nxsem_wait_slow (sem=0x10001e0 <g_uart0port+32>) at 
semaphore/sem_wait.c:202
   1  0x0000882c in nxsem_wait (sem=0x10001e0 <g_uart0port+32>) at 
semaphore/sem_wait.c:270
   2  0x0000e7e2 in uart_read (filep=0x608037d4, buffer=0x60c013eb " 
h\024\300`", buflen=1)
      at serial/serial.c:1203
   3  0x0001aad4 in file_readv_compat (filep=0x608037d4, uio=0x60c01344) at 
vfs/fs_read.c:81
   4  0x0001abae in file_readv (filep=0x608037d4, uio=0x60c01344) at 
vfs/fs_read.c:165
   5  0x0001ac2e in nx_readv (fd=0, iov=0x60c01388, iovcnt=1) at 
vfs/fs_read.c:256
   6  0x0001ac84 in readv (fd=0, iov=0x60c01388, iovcnt=1) at vfs/fs_read.c:318
   7  0x0001acca in read (fd=0, buf=0x60c013eb, nbytes=1) at vfs/fs_read.c:352
   8  0x000100ea in STUB_read (nbr=56, parm1=0, parm2=1623200747, parm3=1) at 
stubs/STUB_read.c:9
   9  0x000014d2 in dispatch_syscall () at armv8-m/arm_svcall.c:82
   ```
   
   nsh_main backtrace after:
   
   ```
   0  nxsem_wait_slow (sem=0x10001f0 <g_uart0port+32>) at 
semaphore/sem_wait.c:202
   1  0x000088c0 in nxsem_wait (sem=0x10001f0 <g_uart0port+32>) at 
semaphore/sem_wait.c:270
   2  0x0000e882 in uart_read (filep=0x6080380c, buffer=0x60c013eb " 
h\024\300`", buflen=1)
      at serial/serial.c:1203
   3  0x0001ab74 in file_readv_compat (filep=0x6080380c, uio=0x60c01344) at 
vfs/fs_read.c:81
   4  0x0001ac4e in file_readv (filep=0x6080380c, uio=0x60c01344) at 
vfs/fs_read.c:165
   5  0x0001acce in nx_readv (fd=0, iov=0x60c01388, iovcnt=1) at 
vfs/fs_read.c:256
   6  0x0001ad24 in readv (fd=0, iov=0x60c01388, iovcnt=1) at vfs/fs_read.c:318
   7  0x0001ad6a in read (fd=0, buf=0x60c013eb, nbytes=1) at vfs/fs_read.c:352
   8  0x0001018a in STUB_read (nbr=56, parm1=0, parm2=1623200747, parm3=1) at 
stubs/STUB_read.c:9
   9  0x00001ece in dispatch_syscall () at armv8-m/arm_dispatch_syscall.S:111
   10 0x2000a874 in read (parm1=0, parm2=0x60c013eb, parm3=1) at 
proxies/PROXY_read.c:9
   11 0x20001152 in readline_getc (vtbl=0x60c01468) at readline_fd.c:73
   12 0x20003994 in readline_common (vtbl=0x60c01468, buf=0x60c017f8 "\n", 
buflen=80)
      at readline_common.c:513
   13 0x200012ec in readline_fd (buf=0x60c017f8 "\n", buflen=80, infd=0, 
outfd=1) at readline_fd.c:236
   14 0x200010a8 in nsh_session (pstate=0x60c01540, login=1, argc=1, 
argv=0x60c00548)
      at nsh_session.c:229
   15 0x20000eb0 in nsh_consolemain (argc=1, argv=0x60c00548) at 
nsh_consolemain.c:75
   16 0x20000e4c in nsh_main (argc=1, argv=0x60c00548) at nsh_main.c:74
   17 0x20000062 in nxtask_startup (entrypt=0x20000e11 <nsh_main>, argc=1, 
argv=0x60c00548)
      at sched/task_startup.c:72
   18 0x00009ac4 in nxtask_start () at task/task_start.c:106
   19 0x60c00548 in ?? ()
   Backtrace stopped: previous frame identical to this frame (corrupt stack?)
   ```
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to