Verbose stack output

This topic describes viewing verbose stack output.

To see more information about stack outputs, do the following:

  1. Display the stack in raw format by typing dw @r1 90 and pressing Enter:
    Note: The address for the stack is in general purpose register 1. The address can be obtained from the output when the display_stack_frames option is set.

    This subcommand displays 0x90 words of the stack in hexadecimal and ASCII. The output should be similar to the following:

    2FF3B1C0: 2FF3B210 2FF3B380 01304364 00000000  /.../....0Cd....
    2FF3B1D0: 2FF3B230 01304754 0023AD5C 22222082  /..0.0GT.#.\"" .
    2FF3B1E0: 00120000 2FF3B400 00000480 0000510C  ..../.........Q.
    2FF3B1F0: 2FF3B260 4A222860 001DCEC8 0000153C  /..`J"(`.......<
    2FF3B200: 00000000 00000000 00000000 01304648  .............0FH
    2FF3B210: 2FF3B2E0 00000003 013040B4 00000000  /........0@.....
    2FF3B220: 00000000 2FF3B380 10002040 2FF3B258  ..../..... @/..X
    2FF3B230: 2FF3B2BC 00000000 001E5968 00000000  /.........Yh....
    2FF3B240: 00000000 002783E8 00485358 007FFFFF  .....'...HSX....
    2FF3B250: 10002040 00000000 64656D6F 6B657874  .. @....demokext
    2FF3B260: 20776173 2063616C 6C656420 666F7220   was called for
    2FF3B270: 636F6E66 69677572 6174696F 6E0A0000  configuration...
    2FF3B280: 00000000 00000000 00001000 2FF3B390  ............/...
    2FF3B290: 2FF3B2E0 00040003 001CE9EC 314C0000  /...........1L..
    2FF3B2A0: 2FF3B2E0 002783E8 2FF3B338 00000000  /....'../..8....
    2FF3B2B0: 00000000 2E746578 74000000 10000100  .....text.......
    2FF3B2C0: 10000100 00000710 00000100 00000000  ................
    2FF3B2D0: 00000000 2FF3B380 00000000 00000000  ..../...........
    2FF3B2E0: 2FF3B370 22334484 001E3BF8 00000000  /..p"3D...;.....
    2FF3B2F0: 00000000 002783E8 00000001 2FF3B338  .....'....../..8
    2FF3B300: E3001E30 00000020 2FF1F9F8 2FF1F9FC  ...0... /.../...
    2FF3B310: 80000000 00000001 2FF1F780 00003D20  ......../.....=
    2FF3B320: 2FF21AE8 00000010 01304748 00000001  /........0GH....
    2FF3B330: 2FF21AE8 00000010 2FF3B320 FFFFFFFF  /......./.. ....
    2FF3B340: 00000001 00000000 00000000 00000000  ................
    2FF3B350: 00000010 00001C08 00000000 00000000  ................
    2FF3B360: 00000031 82222824 00000005 2FF21AF8  ...1."($..../...
    2FF3B370: 2FF3B3C0 002783E8 001E3FAC 2FF22FF8  /....'....?././.
    2FF3B380: 00000002 2FF3B400 F0148912 00000FFE  ..../...........
    2FF3B390: 2FF3B388 0000153C 00000001 20007758  /......<.... .wX
    2FF3B3A0: 00000000 000009B4 00000FFE 00000000  ................
    2FF3B3B0: 00000010 E6001800 04DAE000 00000000  ................
    2FF3B3C0: 2FF21AA0 0002D0B0 000039DC 22222022  /.........9."" "
    2FF3B3D0: 00003E7C 00000000 20009CF8 20009D08  ..>|.... ... ...
    2FF3B3E0: 2000A1D8 00000000 00000000 00000000   ...............
    2FF3B3F0: 00000000 0024FA90 00000000 00000000  .....$..........

    The displayed data can be interpreted using the diagram displayed in the Subroutine Linkage Conventions section of the Assembler Language Reference book.

  2. Clear all breakpoints by typing the following:
    ca
  3. Exit the kernel debugger by typing g on the command line. Upon exiting the debugger, the prompt from the demo program is displayed. The default prompt is ./demo.
  4. Enter a choice of 0 to unload the kernel extension and quit the KDB kernel debugger.