CLI Guide

Table Of Contents
Switch Management Commands 2139
***************************************************
------------ CALL STACK INFO (VERBOSE) ------------
Stack pointer before signal: 0x00000000
Offending instruction at address 0x00000000
tried to access address 0x00000000
CPU's exception-cause code: 0x00000000
Registers (hex) at time of fault:
r01: 00000000 r02: 00000000 r03: 00000000 r04: 00000000
r05: 00000000 r06: 00000000 r07: 00000000 r08: 00000000 r09: 00000000
r10: 00000000 r11: 00000000 r12: 00000000 r13: 00000000 r14: 00000000
r15: 00000000 r16: 00000000 r17: 00000000 r18: 00000000 r19: 00000000
r20: 00000000 r21: 00000000 r22: 00000000 r23: 00000000 r24: 00000000
r25: 00000000 r26: 00000000 r27: 00000000 r28: 00000000 r29: 00000000
r30: 00000000 r31: 00000000
$083da883$ osapiSigTrace + 0x14f
$083c9ac0$ osapiCrashDump + 0x449
$0804b8f6$ sigsegv_handler + 0xa7
$0012e40c$ ?????
$083c73c3$ osapiFree + 0x187
$083c7211$ osapiDebugCorruptHeap + 0x65
$082b05e3$ cliDevShell + 0x2ab
$081ed66c$ commandDevShell + 0x373
$0839db78$ ewsCliExec + 0xbf
$083a0c22$ ewsCliData + 0x3045
$0839b295$ ewaNetTelnetDataInternal + 0x959
$0839a928$ ewaNetTelnetData + 0x30
$083a7b73$ ewsTelnetParse + 0x2b9
$08387592$ ewsParse + 0x162a
$08372fbc$ ewsRun + 0x149
$08395caf$ ewmain + 0x17c
$083996de$ emweb_main + 0x1a3
$083d6f71$ osapi_task_wrapper + 0xa6
$00134e99$ ?????
$0021873e$ ?????
-----------------------------------------
debug dhcp packet
Use the debug dhcp packet command to display debug information about
DHCPv4 client activities and to trace DHCPv4 packets to and from the local
DHCPv4 client. To disable debugging, use the no form of this command.