2365991_en-US

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

2365991_en-US

2365991_en-US

stack pushing and popping for JN5169 exception processing

Hi

Customer met an exception, wanted to analyze the stack content, but cannot find the document for the RISC core of JN5169 , so do not know the sequence to push core registers. 

who can help to provide the sequence to push register  for exception processing?  Customer wants to find the document to describe this. 

Thanks!

Derek  

Priority: Normal - Important but not UrgentProduct JN5189Region: APACTopic: SW Tools (IDE | SDK | MCUXpresso Tool)Type: DocumentationRe: stack pushing and popping for JN5169 exception processing

@hiwave can you let us know the customer name related to this case?

@amigo_li can you help here?

Re: stack pushing and popping for JN5169 exception processing

Hi @hiwave 


If customer enable debug log and when device crashed, it would print message like below:

APP Start: Switch Power Up
APP Start: Watchdog timer has reset device!EPCR = 9dcf2 : EEAR = 9dcf2
Stack dump:
 4007fc4 : 00080fe2
 4007fc8 : 0009cec0
 4007fcc : 1bf887c9
 4007fd0 : 000882c6
 4007fd4 : 00088ef1
 4007fd8 : 00088f37
 4007fdc : 00085df7
 4007fe0 : 00084940
 4007fe4 : 00080fe2
 4007fe8 : 00001a12
 4007fec : 00000000
 4007ff0 : 00000000
 4007ff4 : 0009cbfe
 4007ff8 : 76543210
 4007ffc : fedcba98


Then we can use tool : arm-none-eabi-addr2line -e app.elf 0x00088f37

You can check the source code in AN1189, the stack dump message would be print when there is a watchdog reset.

amigo_li_0-1779158787246.png


Best Regards

Amigo Li



Tags (1)
No ratings
Version history
Last update:
Wednesday
Updated by: