xiaoxiang781216 commented on PR #6129: URL: https://github.com/apache/incubator-nuttx/pull/6129#issuecomment-1111147358
> use hardcode to mask high bit 31-30 for A0 ,it work,but gdb just can see the frist call stack,and gdb output `Backtrace stopped: Cannot access memory at address 0x0`  @Ouss4 and @anjiahao1 how about we patch gdb backtrace code to remove the high two bit from frame point? Instead do the trick inside OpenOCD or minidumpsever.py: https://github.com/espressif/openocd-esp32/blob/9d736dcba9aedd75933e873a644112a01e3d7f6c/src/rtos/rtos_freertos_stackings.c#L891 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: [email protected] For queries about this service, please contact Infrastructure at: [email protected]
