Commit 4dbefe64 authored by Josh Boyer's avatar Josh Boyer Committed by Paul Mackerras

[POWERPC] PPC: Fix xmon stack frame address in backtrace

The stack frame address was being printed incorrectly in the backtrace
option of XMON on PPC.  This patch fixes it to print the actual stack
address instead of the address of the local variable that contains it.
Signed-off-by: default avatarJosh Boyer <jdub@us.ibm.com>
Signed-off-by: default avatarPaul Mackerras <paulus@samba.org>
parent 838fdb4d
...@@ -806,7 +806,7 @@ backtrace(struct pt_regs *excp) ...@@ -806,7 +806,7 @@ backtrace(struct pt_regs *excp)
for (; sp != 0; sp = stack[0]) { for (; sp != 0; sp = stack[0]) {
if (mread(sp, stack, sizeof(stack)) != sizeof(stack)) if (mread(sp, stack, sizeof(stack)) != sizeof(stack))
break; break;
printf("[%.8lx] ", stack); printf("[%.8lx] ", stack[0]);
xmon_print_symbol(stack[1], " ", "\n"); xmon_print_symbol(stack[1], " ", "\n");
if (stack[1] == (unsigned) &ret_from_except if (stack[1] == (unsigned) &ret_from_except
|| stack[1] == (unsigned) &ret_from_except_full || stack[1] == (unsigned) &ret_from_except_full
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment