meshtastic/docs/developers/firmware/stacktrace-decode.md
2022-03-09 23:10:04 +11:00

848 B

id title sidebar_label
stacktrace-decode Decoding Stacktraces Decoding Stacktraces

You may encounter a situation where your device crashes and are left with a stacktrace, below are two methods of decoding them.

Manual

:::info This method uses the symbols of the firmware.elf file generated from your latest build, you may wish to rebuild to get up-to-date symbols. :::

First save the backtrace string to a text file:

Backtrace: 0x....

Now run the exception decoder:

bin/exception_decoder.py backtrace.txt

Real Time

In order to decode stack traces in real time, kep the following command (replacing DEVICE_PORT with your device's port) running in your terminal with the suspect device connected

pio device monitor --port DEVICE_PORT -f esp32_exception_decoder