AnsweredAssumed Answered

Support for backtraces in ARM NONE EABI toolchain (bare metal)

Question asked by yabaud on Apr 21, 2015
Latest reply on May 21, 2015 by yabaud

Being able to have access to a (stack) backtrace programatically would be very interesting.

I'm trying to save the program backtrace just after a C++ exception occurs to locate where

the exception happened. Something similar to this:

 

gcc - How can I print stack trace for caught exceptions in C++ & code injection in C++ - Stack Overflow

 

GCC for ARM/Linux toolchain offers "execinfo.h" to read out the backtrace. ASAK this is a Linux-specific

header file, so it's absent in my bare metal tool chain. But is there something similar for the ARM NONE EABI

toolchain to read out a backtrace?

Outcomes