mirror of
https://github.com/meshtastic/meshtastic.git
synced 2024-11-16 02:24:15 -08:00
848 B
848 B
id | title | sidebar_label |
---|---|---|
stacktrace-decode | Decoding Stacktraces | Decoding Stacktraces |
You may encounter a situation where your device crashes and are left with a stacktrace, below are two methods of decoding them.
Manual
:::info
This method uses the symbols of the firmware.elf
file generated from your latest build, you may wish to rebuild to get up-to-date symbols.
:::
First save the backtrace string to a text file:
Backtrace: 0x....
Now run the exception decoder:
bin/exception_decoder.py backtrace.txt
Real Time
In order to decode stack traces in real time, kep the following command (replacing DEVICE_PORT
with your device's port) running in your terminal with the suspect device connected
pio device monitor --port DEVICE_PORT -f esp32_exception_decoder