mirror of
https://git.suyu.dev/suyu/breakpad.git
synced 2025-12-28 18:25:20 +01:00
Let x86 stackwalker scan stack in cases where program evaluation fails. Original patch by Jeff Muizelaar <jmuizelaar@mozilla.com> with some changes by me. r=mento at http://breakpad.appspot.com/32003/show
git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@409 4c0a9323-5329-0410-9bdc-e9ce6186880e
This commit is contained in:
parent
760d66430e
commit
8d70618ffc
7 changed files with 161 additions and 27 deletions
|
|
@ -160,6 +160,28 @@ static void PrintStack(const CallStack *stack, const string &cpu) {
|
|||
sequence = PrintRegister("edx", frame_x86->context.edx, sequence);
|
||||
sequence = PrintRegister("efl", frame_x86->context.eflags, sequence);
|
||||
}
|
||||
const char *trust_name;
|
||||
switch (frame_x86->trust) {
|
||||
case StackFrameX86::FRAME_TRUST_NONE:
|
||||
trust_name = "unknown";
|
||||
break;
|
||||
case StackFrameX86::FRAME_TRUST_CONTEXT:
|
||||
trust_name = "given as instruction pointer in context";
|
||||
break;
|
||||
case StackFrameX86::FRAME_TRUST_CFI:
|
||||
trust_name = "call frame info";
|
||||
break;
|
||||
case StackFrameX86::FRAME_TRUST_CFI_SCAN:
|
||||
trust_name = "call frame info with scanning";
|
||||
break;
|
||||
case StackFrameX86::FRAME_TRUST_FP:
|
||||
trust_name = "previous frame's frame pointer";
|
||||
break;
|
||||
case StackFrameX86::FRAME_TRUST_SCAN:
|
||||
trust_name = "stack scanning";
|
||||
break;
|
||||
}
|
||||
printf("\n Found by: %s", trust_name);
|
||||
} else if (cpu == "ppc") {
|
||||
const StackFramePPC *frame_ppc =
|
||||
reinterpret_cast<const StackFramePPC*>(frame);
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue