From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from ma1-aaemail-dr-lapp01.apple.com (ma1-aaemail-dr-lapp01.apple.com [17.171.2.60]) by mx.groups.io with SMTP id smtpd.web10.25888.1590377462628023747 for ; Sun, 24 May 2020 20:31:03 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@apple.com header.s=20180706 header.b=LmeyNtA2; spf=pass (domain: apple.com, ip: 17.171.2.60, mailfrom: afish@apple.com) Received: from pps.filterd (ma1-aaemail-dr-lapp01.apple.com [127.0.0.1]) by ma1-aaemail-dr-lapp01.apple.com (8.16.0.42/8.16.0.42) with SMTP id 04P3Tenr025146 for ; Sun, 24 May 2020 20:31:01 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=from : content-type : mime-version : subject : message-id : date : to; s=20180706; bh=4D6WAX50xc+8sPVWclYfn8DJcdLQfejKM7JqusXErJI=; b=LmeyNtA268zOXeCEFaoPGkPjBExafL2LYL4hyYMelMrObzwwlHlfIdjlkFKiD5zSfqLp OcnazFPnTPuJAPJy/eNC2B47nw5y1AssYg1zJA6orCdN1hfY37pi7AGKorQrHsBN4SML feM+r/qb3cFndWEemrmAEQ685EHvRmsYrY7lS41K73MU2+7xVFswM9++CUsPcUm7OdoN 0ymfo8GguzHPmcOlsi2/gYosn5kokXLc5wmYDy4XV1vBwfqlQ/RVvfWB5sioSme5Z/+y 0zFeIljAzaYQ2XKHBsgcZG2ZStT+eQgibSh8gUmoWI9llWKgP5PhHdd5Iez0k6ZC/JHe lQ== Received: from rn-mailsvcp-mta-lapp04.rno.apple.com (rn-mailsvcp-mta-lapp04.rno.apple.com [10.225.203.152]) by ma1-aaemail-dr-lapp01.apple.com with ESMTP id 3172g1rfyg-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO) for ; Sun, 24 May 2020 20:31:00 -0700 Received: from rn-mailsvcp-mmp-lapp04.rno.apple.com (rn-mailsvcp-mmp-lapp04.rno.apple.com [17.179.253.17]) by rn-mailsvcp-mta-lapp04.rno.apple.com (Oracle Communications Messaging Server 8.1.0.5.20200312 64bit (built Mar 12 2020)) with ESMTPS id <0QAV00DHQB3NUS00@rn-mailsvcp-mta-lapp04.rno.apple.com> for devel@edk2.groups.io; Sun, 24 May 2020 20:30:59 -0700 (PDT) Received: from process_milters-daemon.rn-mailsvcp-mmp-lapp04.rno.apple.com by rn-mailsvcp-mmp-lapp04.rno.apple.com (Oracle Communications Messaging Server 8.1.0.5.20200312 64bit (built Mar 12 2020)) id <0QAV00V00AUH0W00@rn-mailsvcp-mmp-lapp04.rno.apple.com> for devel@edk2.groups.io; Sun, 24 May 2020 20:30:59 -0700 (PDT) X-Va-A: X-Va-T-CD: e0acb9dc03d22e4581b62f3d752335f3 X-Va-E-CD: a8ddc0bda1bf675e24b20d96c2d8fa22 X-Va-R-CD: 4be4987ce0ff647993f9de8ce0f7906d X-Va-CD: 0 X-Va-ID: bfdd0a17-8401-49ac-a1ec-77ba9d720def X-V-A: X-V-T-CD: e0acb9dc03d22e4581b62f3d752335f3 X-V-E-CD: a8ddc0bda1bf675e24b20d96c2d8fa22 X-V-R-CD: 4be4987ce0ff647993f9de8ce0f7906d X-V-CD: 0 X-V-ID: 497d9e7c-ad3d-4a67-baf7-4d57db682280 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.216,18.0.676 definitions=2020-05-24_11:2020-05-22,2020-05-24 signatures=0 Received: from [17.235.51.71] (unknown [17.235.51.71]) by rn-mailsvcp-mmp-lapp04.rno.apple.com (Oracle Communications Messaging Server 8.1.0.5.20200312 64bit (built Mar 12 2020)) with ESMTPSA id <0QAV00BKUB3M6Q00@rn-mailsvcp-mmp-lapp04.rno.apple.com> for devel@edk2.groups.io; Sun, 24 May 2020 20:30:59 -0700 (PDT) From: "Andrew Fish" MIME-version: 1.0 (Mac OS X Mail 13.0 \(3594.4.17\)) Subject: OVMF gdb seems to require "stone knives and bearskins" to debug code? Message-id: <50EEBF6E-8BB1-461D-B252-D37D2990957D@apple.com> Date: Sun, 24 May 2020 20:30:58 -0700 To: edk2-devel-groups-io X-Mailer: Apple Mail (2.3594.4.17) X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.216,18.0.676 definitions=2020-05-24_11:2020-05-22,2020-05-24 signatures=0 Content-type: multipart/alternative; boundary="Apple-Mail=_B0ADF4CB-A1EE-463D-BA27-C0CA223D50FF" --Apple-Mail=_B0ADF4CB-A1EE-463D-BA27-C0CA223D50FF Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=us-ascii The full Star Trek quote from Spock is: " I am endeavoring, ma'am, to = construct a mnemonic memory circuit using stone knives and bearskins.", = but I ran across this [1], and it felt like "stone knives and = bearskins." vs my experience with lldb debugging EFI.=20 So a few questions: 1) Is this Wiki [1] actually up to date?=20 2) Do we have a location to add debugger scripts to the edk2? If not = what location should we chose? 3) Is anyone interested in writing gdb scripts to do better? I've got no clue about writing gdb Python and I don't even have gdb = installed on my system, but due to an accident of history I ended up = owning my teams lldb Python debugger scripts so I know how lldb works in = great detail. My expectation would be you have a standard way to to = invoke the debugger and you get a symbolicated stack frame for free [2].=20= I could open source an lldb symbolication Python script and I'm happy to = explain the common logic to some one to make it easier to port this = lldb command [3] to gdb. The command can load symbols for any address = that is located in a loaded PE/COFF image, and when you import the = command into lldb it symbolicates the current frame.=20 [1] = https://github.com/tianocore/tianocore.github.io/wiki/How-to-debug-OVMF-wi= th-QEMU-using-GDB=20 [2] OVMF lldb attach: $ lldb -o "settings set = plugin.process.gdb-remote.target-definition-file = x86_64_target_definition.py" -o "gdb-remote 9000" -o "command script = import efi_symbolicate.py" ... The "efi_symbols" command has been installed, type "help efi_symbols" = for detailed help. = ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ............................................................. Symbols Loaded for mach-O UUID 0AEF5192-F2D6-32D6-B739-54752B2D6B42 @ = 0xfffcc094 = /Volumes/Case/edk2-github/Build/OvmfX64/DEBUG_XCODE5/X64/OvmfPkg/Sec/SecMa= in/DEBUG/SecMain.dll Symbols Loaded for mach-O UUID 7686209C-91AF-3D52-952C-BB2068CA682E @ = 0x64e3000 = /Volumes/Case/edk2-github/Build/OvmfX64/DEBUG_XCODE5/X64/ShellPkg/Applicat= ion/Shell/Shell/DEBUG/Shell.dll Symbols Loaded for mach-O UUID FE5F915E-F2BF-3E7A-AE4D-7722043096CA @ = 0x7eac000 = /Volumes/Case/edk2-github/Build/OvmfX64/DEBUG_XCODE5/X64/MdeModulePkg/Core= /Dxe/DxeMain/DEBUG/DxeCore.dll PE/COFF Image not found. Can not load EFI Symbols Symbols Loaded for mach-O UUID 86957245-00DA-3D0A-8060-295EAEB4A336 @ = 0x7087000 = /Volumes/Case/edk2-github/Build/OvmfX64/DEBUG_XCODE5/X64/MdeModulePkg/Univ= ersal/BdsDxe/BdsDxe/DEBUG/BdsDxe.dll Symbols already loaded for mach-O UUID = FE5F915E-F2BF-3E7A-AE4D-7722043096CA DxeCore PE/COFF Image not found. Can not load EFI Symbols Symbols already loaded for mach-O UUID = FE5F915E-F2BF-3E7A-AE4D-7722043096CA DxeCore PE/COFF Image not found. Can not load EFI Symbols Symbols already loaded for mach-O UUID = 7686209C-91AF-3D52-952C-BB2068CA682E Shell Symbols Loaded for mach-O UUID 8000874A-80F4-37E3-9702-CB9A686F2260 @ = 0x7167000 = /Volumes/Case/edk2-github/Build/OvmfX64/DEBUG_XCODE5/X64/UefiCpuPkg/CpuDxe= /CpuDxe/DEBUG/CpuDxe.dll Symbols Loaded for mach-O UUID 89AB51B5-EB01-32B0-AA0A-5113E9882A82 @ = 0x7ee3000 = /Volumes/Case/edk2-github/Build/OvmfX64/DEBUG_XCODE5/X64/MdeModulePkg/Core= /DxeIplPeim/DxeIpl/DEBUG/DxeIpl.dll PE/COFF Image not found. Can not load EFI Symbols Symbols already loaded for mach-O UUID = 86957245-00DA-3D0A-8060-295EAEB4A336 BdsDxe Symbols already loaded for mach-O UUID = FE5F915E-F2BF-3E7A-AE4D-7722043096CA DxeCore Symbols already loaded for mach-O UUID = 89AB51B5-EB01-32B0-AA0A-5113E9882A82 DxeIpl Symbols already loaded for mach-O UUID = 0AEF5192-F2D6-32D6-B739-54752B2D6B42 SecMain Symbols already loaded for mach-O UUID = FE5F915E-F2BF-3E7A-AE4D-7722043096CA DxeCore Symbols Loaded for mach-O UUID 5FDE6480-128B-3D18-9901-391924F9E54E @ = 0x7ee8000 = /Volumes/Case/edk2-github/Build/OvmfX64/DEBUG_XCODE5/X64/MdeModulePkg/Core= /Pei/PeiMain/DEBUG/PeiCore.dll PE/COFF Image not found. Can not load EFI Symbols Symbols already loaded for mach-O UUID = FE5F915E-F2BF-3E7A-AE4D-7722043096CA DxeCore Symbols already loaded for mach-O UUID = 7686209C-91AF-3D52-952C-BB2068CA682E Shell Symbols already loaded for mach-O UUID = 0AEF5192-F2D6-32D6-B739-54752B2D6B42 SecMain Symbols already loaded for mach-O UUID = 89AB51B5-EB01-32B0-AA0A-5113E9882A82 DxeIpl Symbols already loaded for mach-O UUID = 86957245-00DA-3D0A-8060-295EAEB4A336 BdsDxe Symbols already loaded for mach-O UUID = 7686209C-91AF-3D52-952C-BB2068CA682E Shell Symbols already loaded for mach-O UUID = FE5F915E-F2BF-3E7A-AE4D-7722043096CA DxeCore Symbols already loaded for mach-O UUID = FE5F915E-F2BF-3E7A-AE4D-7722043096CA DxeCore (lldb) bt * thread #1, stop reason =3D signal SIGTRAP * #0: 0x000000000716796f CpuDxe.dll`CpuSleep + 1 #1: 0x0000000007ebae33 DxeCore.dll`CoreRestoreTpl [inlined] = CoreDispatchEventNotifies(Priority=3D) + 192 at = /Volumes/Case/edk2-github/MdeModulePkg/Core/Dxe/Event/Event.c:194 #2: 0x0000000007ebad73 DxeCore.dll`CoreRestoreTpl(NewTpl=3D4) + 290 = at /Volumes/Case/edk2-github/MdeModulePkg/Core/Dxe/Event/Tpl.c:131 #3: 0x0000000007ebb5f5 = DxeCore.dll`CoreSignalEvent(UserEvent=3D) + 111 at = /Volumes/Case/edk2-github/MdeModulePkg/Core/Dxe/Event/Event.c:566 #4: 0x0000000007ebb71b = DxeCore.dll`CoreWaitForEvent(NumberOfEvents=3D1, = UserEvents=3D0x0000000007016f08, UserIndex=3D0x0000000007eab840) + 94 at = /Volumes/Case/edk2-github/MdeModulePkg/Core/Dxe/Event/Event.c:707 #5: 0x00000000064ebf0e = Shell.dll`FileInterfaceStdInRead(This=3D, = BufferSize=3D0x0000000007eab998, Buffer=3D) + 310 at = /Volumes/Case/edk2-github/ShellPkg/Application/Shell/FileHandleWrappers.c:= 532 #6: 0x00000000065071ce Shell.dll`_ModuleEntryPoint [inlined] = DoShellPrompt + 267 at = /Volumes/Case/edk2-github/ShellPkg/Application/Shell/Shell.c:1346 #7: 0x00000000065070c3 Shell.dll`_ModuleEntryPoint [inlined] = UefiMain(ImageHandle=3D, SystemTable=3D) + = 5536 at /Volumes/Case/edk2-github/ShellPkg/Application/Shell/Shell.c:621 #8: 0x0000000006505b23 Shell.dll`_ModuleEntryPoint [inlined] = ProcessModuleEntryPointList(ImageHandle=3D, = SystemTable=3D) at = /Volumes/Case/edk2-github/Build/OvmfX64/DEBUG_XCODE5/X64/ShellPkg/Applicat= ion/Shell/Shell/DEBUG/AutoGen.c:1000 #9: 0x0000000006505b23 = Shell.dll`_ModuleEntryPoint(ImageHandle=3D0x0000000006d1bf18, = SystemTable=3D) + 8668 at = /Volumes/Case/edk2-github/MdePkg/Library/UefiApplicationEntryPoint/Applica= tionEntryPoint.c:59 #10: 0x0000000007eb08e7 = DxeCore.dll`CoreStartImage(ImageHandle=3D0x0000000006d1bf18, = ExitDataSize=3D0x00000000067987f0, ExitData=3D0x00000000067987e8) + 311 = at /Volumes/Case/edk2-github/MdeModulePkg/Core/Dxe/Image/Image.c:1654 #11: 0x0000000007090005 = BdsDxe.dll`EfiBootManagerBoot(BootOption=3D0x00000000067987a0) + 1758 at = /Volumes/Case/edk2-github/MdeModulePkg/Library/UefiBootManagerLib/BmBoot.c= :1982 #12: 0x0000000007088fb4 BdsDxe.dll`BdsEntry [inlined] = BootBootOptions(BootOptions=3D0x0000000006798698, BootOptionCount=3D4, = BootManagerMenu=3D0x0000000007eabc78) + 47 at = /Volumes/Case/edk2-github/MdeModulePkg/Universal/BdsDxe/BdsEntry.c:408 #13: 0x0000000007088f85 BdsDxe.dll`BdsEntry(This=3D) + = 5252 at = /Volumes/Case/edk2-github/MdeModulePkg/Universal/BdsDxe/BdsEntry.c:1062 #14: 0x0000000007ebfa3b DxeCore.dll`DxeMain(HobStart=3D) = + 7725 at = /Volumes/Case/edk2-github/MdeModulePkg/Core/Dxe/DxeMain/DxeMain.c:543 #15: 0x0000000007ec146a DxeCore.dll`_ModuleEntryPoint [inlined] = ProcessModuleEntryPointList(HobStart=3D) + 20 at = /Volumes/Case/edk2-github/Build/OvmfX64/DEBUG_XCODE5/X64/MdeModulePkg/Core= /Dxe/DxeMain/DEBUG/AutoGen.c:462 #16: 0x0000000007ec1465 = DxeCore.dll`_ModuleEntryPoint(HobStart=3D) + 15 at = /Volumes/Case/edk2-github/MdePkg/Library/DxeCoreEntryPoint/DxeCoreEntryPoi= nt.c:48 #17: 0x0000000007ee3617 DxeIpl.dll`InternalSwitchStack + 15 #18: 0x0000000007ee4970 DxeIpl.dll`DxeLoadCore [inlined] = HandOffToDxeCore(HobList=3DEFI_PEI_HOB_POINTERS @ 0x0000000003f54900) + = 4152 at = /Volumes/Case/edk2-github/MdeModulePkg/Core/DxeIplPeim/X64/DxeLoadFunc.c:1= 17 #19: 0x0000000007ee3fcd DxeIpl.dll`DxeLoadCore(This=3D, = PeiServices=3D, HobList=3DEFI_PEI_HOB_POINTERS @ = 0x0000000003f54900) + 1685 at = /Volumes/Case/edk2-github/MdeModulePkg/Core/DxeIplPeim/DxeLoad.c:449 #20: 0x0000000007ee982a = PeiCore.dll`PeiCore(SecCoreDataPtr=3D, = PpiList=3D0x0000000000000000, Data=3D) + 732 at = /Volumes/Case/edk2-github/MdeModulePkg/Core/Pei/PeiMain/PeiMain.c:494 #21: 0x0000000000821d3e #22: 0x000000000082674e #23: 0x0000000000827067 #24: 0x0000000000821869 #25: 0x0000000000828dd1 #26: 0x00000000fffcd5b7 SecMain.dll`SecCoreStartupWithStack = [inlined] SecStartupPhase2(Context=3D) + 49 at = /Volumes/Case/edk2-github/OvmfPkg/Sec/SecMain.c:858 #27: 0x00000000fffcd586 SecMain.dll`SecCoreStartupWithStack = [inlined] InitializeDebugAgent(InitFlag=3D, = Context=3D) at = /Volumes/Case/edk2-github/MdeModulePkg/Library/DebugAgentLibNull/DebugAgen= tLibNull.c:42 #28: 0x00000000fffcd586 = SecMain.dll`SecCoreStartupWithStack(BootFv=3D, = TopOfCurrentStack=3D) + 421 at = /Volumes/Case/edk2-github/OvmfPkg/Sec/SecMain.c:821 #29: 0x00000000fffcc301 SecMain.dll`_ModuleEntryPoint + 45 [3] (lldb) efi_symbols -h Usage: efi_symbols [options] Stand alone script that can load EFI PE/COFF and TE image symbols. Options: -p, --pc Load symbols for pc -f, --frame Load symbols for current stack frame -a ADDRESS, --address=3DADDRESS Load symbols for image at address -r RANGE, --range=3DRANGE How far to search backward for start of PE/COFF = Image -t, --terse Only display filenames not paths -h, --help Show help for the command Thanks, Andrew Fish --Apple-Mail=_B0ADF4CB-A1EE-463D-BA27-C0CA223D50FF Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=us-ascii The = full Star Trek quote from Spock is:  " I am endeavoring, = ma'am, to construct a mnemonic memory circuit using stone knives and = bearskins.", but I ran across this [1], and it felt like "stone knives = and bearskins." vs my experience with lldb debugging EFI. 

So a few = questions:
1) Is this Wiki [1]  actually up to = date? 
2) Do we have a location to add = debugger scripts to the edk2? If not what location should we = chose?
3) Is anyone interested in writing gdb = scripts to do better?

I've got no clue about writing gdb Python and I don't even = have gdb installed on my system, but due to an accident of history I = ended up owning my teams lldb Python debugger scripts so I know how lldb = works in great detail. My expectation would be you have a standard way = to to invoke the debugger and you get a symbolicated stack frame for = free [2]. 

I could open source an lldb symbolication Python script and = I'm happy to explain the common logic to some one to make it easier to = port this  lldb command [3] to gdb. The command can load symbols = for any address that is located in a loaded PE/COFF image, and when you = import the command into lldb it symbolicates the current = frame. 


[2] OVMF lldb attach: =  $ lldb -o "settings set = plugin.process.gdb-remote.target-definition-file = x86_64_target_definition.py" -o "gdb-remote 9000" -o "command script = import efi_symbolicate.py"
...

The = "efi_symbols" command has been installed, type "help efi_symbols" for = detailed help.
...............................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ..........................................................................= ........................................................................
Symbols Loaded for mach-O UUID = 0AEF5192-F2D6-32D6-B739-54752B2D6B42 @ 0xfffcc094 = /Volumes/Case/edk2-github/Build/OvmfX64/DEBUG_XCODE5/X64/OvmfPkg/Sec/SecMa= in/DEBUG/SecMain.dll
Symbols = Loaded for mach-O UUID 7686209C-91AF-3D52-952C-BB2068CA682E @ 0x64e3000 = /Volumes/Case/edk2-github/Build/OvmfX64/DEBUG_XCODE5/X64/ShellPkg/Applicat= ion/Shell/Shell/DEBUG/Shell.dll
Symbols = Loaded for mach-O UUID FE5F915E-F2BF-3E7A-AE4D-7722043096CA @ 0x7eac000 = /Volumes/Case/edk2-github/Build/OvmfX64/DEBUG_XCODE5/X64/MdeModulePkg/Core= /Dxe/DxeMain/DEBUG/DxeCore.dll
PE/COFF = Image not found. Can not load EFI Symbols
Symbols Loaded for mach-O UUID = 86957245-00DA-3D0A-8060-295EAEB4A336 @ 0x7087000 = /Volumes/Case/edk2-github/Build/OvmfX64/DEBUG_XCODE5/X64/MdeModulePkg/Univ= ersal/BdsDxe/BdsDxe/DEBUG/BdsDxe.dll
Symbols = already loaded for mach-O UUID FE5F915E-F2BF-3E7A-AE4D-7722043096CA = DxeCore
PE/COFF Image not found. Can not load = EFI Symbols
Symbols already loaded for mach-O UUID = FE5F915E-F2BF-3E7A-AE4D-7722043096CA DxeCore
PE/COFF Image not found. Can not load EFI = Symbols
Symbols already loaded for mach-O UUID = 7686209C-91AF-3D52-952C-BB2068CA682E Shell
Symbols Loaded for mach-O UUID = 8000874A-80F4-37E3-9702-CB9A686F2260 @ 0x7167000 = /Volumes/Case/edk2-github/Build/OvmfX64/DEBUG_XCODE5/X64/UefiCpuPkg/CpuDxe= /CpuDxe/DEBUG/CpuDxe.dll
Symbols = Loaded for mach-O UUID 89AB51B5-EB01-32B0-AA0A-5113E9882A82 @ 0x7ee3000 = /Volumes/Case/edk2-github/Build/OvmfX64/DEBUG_XCODE5/X64/MdeModulePkg/Core= /DxeIplPeim/DxeIpl/DEBUG/DxeIpl.dll
PE/COFF = Image not found. Can not load EFI Symbols
Symbols already loaded for mach-O UUID = 86957245-00DA-3D0A-8060-295EAEB4A336 BdsDxe
Symbols already loaded for mach-O UUID = FE5F915E-F2BF-3E7A-AE4D-7722043096CA DxeCore
Symbols already loaded for mach-O UUID = 89AB51B5-EB01-32B0-AA0A-5113E9882A82 DxeIpl
Symbols already loaded for mach-O UUID = 0AEF5192-F2D6-32D6-B739-54752B2D6B42 SecMain
Symbols already loaded for mach-O UUID = FE5F915E-F2BF-3E7A-AE4D-7722043096CA DxeCore
Symbols Loaded for mach-O UUID = 5FDE6480-128B-3D18-9901-391924F9E54E @ 0x7ee8000 = /Volumes/Case/edk2-github/Build/OvmfX64/DEBUG_XCODE5/X64/MdeModulePkg/Core= /Pei/PeiMain/DEBUG/PeiCore.dll
PE/COFF = Image not found. Can not load EFI Symbols
Symbols already loaded for mach-O UUID = FE5F915E-F2BF-3E7A-AE4D-7722043096CA DxeCore
Symbols already loaded for mach-O UUID = 7686209C-91AF-3D52-952C-BB2068CA682E Shell
Symbols already loaded for mach-O UUID = 0AEF5192-F2D6-32D6-B739-54752B2D6B42 SecMain
Symbols already loaded for mach-O UUID = 89AB51B5-EB01-32B0-AA0A-5113E9882A82 DxeIpl
Symbols already loaded for mach-O UUID = 86957245-00DA-3D0A-8060-295EAEB4A336 BdsDxe
Symbols already loaded for mach-O UUID = 7686209C-91AF-3D52-952C-BB2068CA682E Shell
Symbols already loaded for mach-O UUID = FE5F915E-F2BF-3E7A-AE4D-7722043096CA DxeCore
Symbols already loaded for mach-O UUID = FE5F915E-F2BF-3E7A-AE4D-7722043096CA DxeCore
(lldb) bt
* thread #1, stop reason =3D signal SIGTRAP
  = * #0: 0x000000000716796f CpuDxe.dll`CpuSleep + 1
    #1: 0x0000000007ebae33 = DxeCore.dll`CoreRestoreTpl [inlined] = CoreDispatchEventNotifies(Priority=3D<unavailable>) + 192 at = /Volumes/Case/edk2-github/MdeModulePkg/Core/Dxe/Event/Event.c:194
    #2: 0x0000000007ebad73 = DxeCore.dll`CoreRestoreTpl(NewTpl=3D4) + 290 at = /Volumes/Case/edk2-github/MdeModulePkg/Core/Dxe/Event/Tpl.c:131
    #3: 0x0000000007ebb5f5 = DxeCore.dll`CoreSignalEvent(UserEvent=3D<unavailable>) + 111 at = /Volumes/Case/edk2-github/MdeModulePkg/Core/Dxe/Event/Event.c:566
    #4: 0x0000000007ebb71b = DxeCore.dll`CoreWaitForEvent(NumberOfEvents=3D1, = UserEvents=3D0x0000000007016f08, UserIndex=3D0x0000000007eab840) + 94 at = /Volumes/Case/edk2-github/MdeModulePkg/Core/Dxe/Event/Event.c:707
    #5: 0x00000000064ebf0e = Shell.dll`FileInterfaceStdInRead(This=3D<unavailable>, = BufferSize=3D0x0000000007eab998, Buffer=3D<unavailable>) + 310 at = /Volumes/Case/edk2-github/ShellPkg/Application/Shell/FileHandleWrappers.c:= 532
    #6: 0x00000000065071ce = Shell.dll`_ModuleEntryPoint [inlined] DoShellPrompt + 267 at = /Volumes/Case/edk2-github/ShellPkg/Application/Shell/Shell.c:1346
    #7: 0x00000000065070c3 = Shell.dll`_ModuleEntryPoint [inlined] = UefiMain(ImageHandle=3D<unavailable>, = SystemTable=3D<unavailable>) + 5536 at = /Volumes/Case/edk2-github/ShellPkg/Application/Shell/Shell.c:621
    #8: 0x0000000006505b23 = Shell.dll`_ModuleEntryPoint [inlined] = ProcessModuleEntryPointList(ImageHandle=3D<unavailable>, = SystemTable=3D<unavailable>) at = /Volumes/Case/edk2-github/Build/OvmfX64/DEBUG_XCODE5/X64/ShellPkg/Applicat= ion/Shell/Shell/DEBUG/AutoGen.c:1000
  =   #9: 0x0000000006505b23 = Shell.dll`_ModuleEntryPoint(ImageHandle=3D0x0000000006d1bf18, = SystemTable=3D<unavailable>) + 8668 at = /Volumes/Case/edk2-github/MdePkg/Library/UefiApplicationEntryPoint/Applica= tionEntryPoint.c:59
    #10: 0x0000000007eb08e7 = DxeCore.dll`CoreStartImage(ImageHandle=3D0x0000000006d1bf18, = ExitDataSize=3D0x00000000067987f0, ExitData=3D0x00000000067987e8) + 311 = at = /Volumes/Case/edk2-github/MdeModulePkg/Core/Dxe/Image/Image.c:1654<= /div>
    #11: 0x0000000007090005 = BdsDxe.dll`EfiBootManagerBoot(BootOption=3D0x00000000067987a0) + 1758 at = /Volumes/Case/edk2-github/MdeModulePkg/Library/UefiBootManagerLib/BmBoot.c= :1982
    #12: 0x0000000007088fb4 = BdsDxe.dll`BdsEntry [inlined] = BootBootOptions(BootOptions=3D0x0000000006798698, BootOptionCount=3D4, = BootManagerMenu=3D0x0000000007eabc78) + 47 at = /Volumes/Case/edk2-github/MdeModulePkg/Universal/BdsDxe/BdsEntry.c:408
    #13: 0x0000000007088f85 = BdsDxe.dll`BdsEntry(This=3D<unavailable>) + 5252 at = /Volumes/Case/edk2-github/MdeModulePkg/Universal/BdsDxe/BdsEntry.c:1062
    #14: 0x0000000007ebfa3b = DxeCore.dll`DxeMain(HobStart=3D<unavailable>) + 7725 at = /Volumes/Case/edk2-github/MdeModulePkg/Core/Dxe/DxeMain/DxeMain.c:543
    #15: 0x0000000007ec146a = DxeCore.dll`_ModuleEntryPoint [inlined] = ProcessModuleEntryPointList(HobStart=3D<unavailable>) + 20 at = /Volumes/Case/edk2-github/Build/OvmfX64/DEBUG_XCODE5/X64/MdeModulePkg/Core= /Dxe/DxeMain/DEBUG/AutoGen.c:462
  =   #16: 0x0000000007ec1465 = DxeCore.dll`_ModuleEntryPoint(HobStart=3D<unavailable>) + 15 at = /Volumes/Case/edk2-github/MdePkg/Library/DxeCoreEntryPoint/DxeCoreEntryPoi= nt.c:48
    #17: 0x0000000007ee3617 = DxeIpl.dll`InternalSwitchStack + 15
  =   #18: 0x0000000007ee4970 DxeIpl.dll`DxeLoadCore [inlined] = HandOffToDxeCore(HobList=3DEFI_PEI_HOB_POINTERS @ 0x0000000003f54900) + = 4152 at = /Volumes/Case/edk2-github/MdeModulePkg/Core/DxeIplPeim/X64/DxeLoadFunc.c:1= 17
    #19: 0x0000000007ee3fcd = DxeIpl.dll`DxeLoadCore(This=3D<unavailable>, = PeiServices=3D<unavailable>, HobList=3DEFI_PEI_HOB_POINTERS @ = 0x0000000003f54900) + 1685 at = /Volumes/Case/edk2-github/MdeModulePkg/Core/DxeIplPeim/DxeLoad.c:449
    #20: 0x0000000007ee982a = PeiCore.dll`PeiCore(SecCoreDataPtr=3D<unavailable>, = PpiList=3D0x0000000000000000, Data=3D<unavailable>) + 732 at = /Volumes/Case/edk2-github/MdeModulePkg/Core/Pei/PeiMain/PeiMain.c:494
    #21: 0x0000000000821d3e
    #22: 0x000000000082674e
    #23: 0x0000000000827067
    #24: 0x0000000000821869
    #25: 0x0000000000828dd1
    #26: 0x00000000fffcd5b7 = SecMain.dll`SecCoreStartupWithStack [inlined] = SecStartupPhase2(Context=3D<unavailable>) + 49 at = /Volumes/Case/edk2-github/OvmfPkg/Sec/SecMain.c:858
    #27: 0x00000000fffcd586 = SecMain.dll`SecCoreStartupWithStack [inlined] = InitializeDebugAgent(InitFlag=3D<unavailable>, = Context=3D<unavailable>) at = /Volumes/Case/edk2-github/MdeModulePkg/Library/DebugAgentLibNull/DebugAgen= tLibNull.c:42
    #28: 0x00000000fffcd586 = SecMain.dll`SecCoreStartupWithStack(BootFv=3D<unavailable>, = TopOfCurrentStack=3D<unavailable>) + 421 at = /Volumes/Case/edk2-github/OvmfPkg/Sec/SecMain.c:821
    #29: 0x00000000fffcc301 = SecMain.dll`_ModuleEntryPoint + 45

[3] (lldb) = efi_symbols -h
Usage: = efi_symbols [options]

Stand = alone script that can load EFI PE/COFF and TE image = symbols.

Options:
  -p, --pc      =         Load symbols for pc
  -f, --frame           Load = symbols for current stack frame
  = -a ADDRESS, --address=3DADDRESS
  =                     =   Load symbols for image at address
  = -r RANGE, --range=3DRANGE
  =                     =   How far to search backward for start of PE/COFF = Image
  -t, --terse       =     Only display filenames not paths
  -h, --help            = Show help for the command

Thanks,

Andrew = Fish


= --Apple-Mail=_B0ADF4CB-A1EE-463D-BA27-C0CA223D50FF--