Difference between revisions of "Backtrace"

From SEGGER Wiki
Jump to: navigation, search
Line 2: Line 2:
 
This allows the debugger to display all executed instructions in a list which is comparable to a prolonged and more detailed callstack.
 
This allows the debugger to display all executed instructions in a list which is comparable to a prolonged and more detailed callstack.
 
[[File:ozone-instructiontrace.png | thumb | none | 600px | Instruction Trace window in Ozone showing the backtrace data]]
 
[[File:ozone-instructiontrace.png | thumb | none | 600px | Instruction Trace window in Ozone showing the backtrace data]]
With that information it is possible to exactly follow the execution of the target application prior to the current PC like in a "time-machine".
+
With that information it is possible to exactly follow the execution of the target application prior to the current PC like in a "time-machine". The backtrace data is also linked with the source code (if available) so when highlighting an instruction in the instruction trace window the debugger will display the corresponding source code line.
   
 
Further this information is displayed in a timeline to show the exact call history of the application.
 
Further this information is displayed in a timeline to show the exact call history of the application.

Revision as of 09:48, 22 September 2022

The so called backtrace is a list of all addresses that have been executed on the target device. That list is generated from the incoming instruction trace stream from the device and displayed once the target device is halted. This allows the debugger to display all executed instructions in a list which is comparable to a prolonged and more detailed callstack.

Instruction Trace window in Ozone showing the backtrace data

With that information it is possible to exactly follow the execution of the target application prior to the current PC like in a "time-machine". The backtrace data is also linked with the source code (if available) so when highlighting an instruction in the instruction trace window the debugger will display the corresponding source code line.

Further this information is displayed in a timeline to show the exact call history of the application.

Timeline window in Ozone showing the backtrace data