Code: Select all
abort() was called at PC 0x40158ccb on core 0
Backtrace:0x40088eba:0x3ffc5030 0x40089601:0x3ffc5050 0x4008fc62:0x3ffc5070 0x40158ccb:0x3ffc50e0 0x4008c1b5:0x3ffc5110 0x4008c27d:0x3ffc5130 0x4008c585:0x3ffc5150
Code: Select all
abort() was called at PC 0x40158ccb on core 0
Backtrace:0x40088eba:0x3ffc5030 0x40089601:0x3ffc5050 0x4008fc62:0x3ffc5070 0x40158ccb:0x3ffc50e0 0x4008c1b5:0x3ffc5110 0x4008c27d:0x3ffc5130 0x4008c585:0x3ffc5150
Code: Select all
C:\Users\USERNAME\.espressif\tools\xtensa-esp32-elf\esp-2020r3-8.4.0\xtensa-esp32-elf\bin\xtensa-esp32-elf-addr2line.exe -fe C:\MYPROJECT\build\MYELF.elf 0x4000c269:0x3ffb7810 0x400d5327:0x3ffb7830 0x400d59a2:0x3ffb7850 0x400d600f:0x3ffb7b20 0x400d5039:0x3ffb7b40 0x400d3f17:0x3ffb7b80
Very useful, thanks a lot!StridingDragon wrote: ↑Thu Sep 23, 2021 1:51 amThe Espressif tools contain a tool called `xtensa-esp32-elf-addr2line` which will interpret the addresses for you and give you proper information about the source files, lines and function names, etc. You can feed it the entire backtrace and it will display the info for all addresses in one swoop, giving you a pretty good picture of the stack.
Users browsing this forum: Baidu [Spider], Google [Bot] and 113 guests