How do I view a backtrace binary file created by "Bug" sampl


#1

I have found the “bug” sample application that uses the “adl_errStartBacktraceAnalysis()” group of functions:
c:\Program Files\Sierra Wireless\Embedded Software\com.wavecom.openat.ide.spm.lib.os.model.6.32.0.03_6.32.0.03\resources\ADL\samples\Bug\

I am able to run it and download a backtrace dump file via XMODEM. How do I view / decode this file?

Thanks in advance,
Pieter

I am using Developer Studio 1.1.2


#2

I don’t know about the Studio, but this is how you do it with TMT:

antronics.co.uk/downloads/OA … _Files.pdf


#3

I believe the backtraces are “encrypted” so you cannot inspect the contents.

I’ve heard that the next release of M2M Studio will contain something like the Target Monitoring Tool to allow you to do backtrace analysis - being released next January-ish.


#4

They aren’t “encrypted” as such.

You inspect the contents by replaying through TMT - see the document linked earlier.


#5

It says “encrypted” in the documentation. I put “encrypted” in quotes to point out that it probably isn’t encryption as we know it :wink:


#6

Which document is that?

(not that I doubt you - just for reference)


#7

Probably course notes, or an old version of the documentation; cannot see any such description in the current user guide. Moot point, anyway.