How do i interpret this backtrace message?

pacha14
Posts: 5
Joined: Fri Oct 01, 2021 4:09 am

How do i interpret this backtrace message?

Postby pacha14 » Fri Oct 01, 2021 4:12 am

Code: Select all


Guru Meditation Error: Core  1 panic'ed (LoadProhibited). Exception was unhandled.
Core 1 register dump:
PC      : 0x400d144c  PS      : 0x00060c30  A0      : 0x800d6a20  A1      : 0x3ffb1e60  
A2      : 0x3ffcb13c  A3      : 0x00000000  A4      : 0x3ffd0174  A5      : 0x00000000  
A6      : 0x3f400418  A7      : 0x3ffb1f50  A8      : 0x800d144a  A9      : 0x3ffb1e40  
A10     : 0x3ffb1f50  A11     : 0x3f400426  A12     : 0x3ffb1f44  A13     : 0x3ffd0174  
A14     : 0x000003e7  A15     : 0x00000004  SAR     : 0x00000010  EXCCAUSE: 0x0000001c  
EXCVADDR: 0x00000000  LBEG    : 0x4000c28c  LEND    : 0x4000c296  LCOUNT  : 0x00000000  

ELF file SHA256: 0000000000000000

Backtrace: 0x400d144c:0x3ffb1e60 0x400d6a1d:0x3ffb1fb0 0x4008b1a6:0x3ffb1fd0

I'm unsure of how to interpret this backtrace as it seems like it just contains memory addresses.
Could anyone help me interpret what it's trying to say?

ESP_Minatel
Posts: 364
Joined: Mon Jan 04, 2021 2:06 pm

Re: How do i interpret this backtrace message?

Postby ESP_Minatel » Fri Oct 01, 2021 11:07 am

Hi,

Have you tried espcoredump-py?

ESP_Dazz
Posts: 308
Joined: Fri Jun 02, 2017 6:50 am

Re: How do i interpret this backtrace message?

Postby ESP_Dazz » Fri Oct 01, 2021 2:31 pm

@pacha14

You can run addr2line to decode backtrace addresses:

Code: Select all

xtensa-esp32-elf-addr2line -e path_to_your.elf 0x400d144c:0x3ffb1e60 0x400d6a1d:0x3ffb1fb0 0x4008b1a6:0x3ffb1fd0
See the backtrace documentation for more details

Who is online

Users browsing this forum: No registered users and 82 guests