public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Vitaly Cheptsov" <cheptsov@ispras.ru>
To: Andrew Fish <afish@apple.com>
Cc: devel@edk2.groups.io, "Gao, Liming" <liming.gao@intel.com>,
	"Marvin Häuser" <mhaeuser@outlook.de>
Subject: Re: [edk2-devel] CLANGPDB binary debugging
Date: Sat, 21 Mar 2020 21:36:18 +0300	[thread overview]
Message-ID: <5C8DD065-0140-428B-A146-999A5694BC99@ispras.ru> (raw)
In-Reply-To: <63396616-D8CF-4135-B967-772C1E6136BD@apple.com>


[-- Attachment #1.1: Type: text/plain, Size: 21635 bytes --]

Andrew,

Thanks once again, but unfortunately it is not that simple. Below I answered inline explaining the particular issues, which mostly seem to be specific to CLANGPDB. LLVM stack emits PDB debug files, and even though LLDB does support them to some level, it is unlikely that this will be working well enough soon. We should really stick to more or less native debug formats, ideally those that have proper open specifications, on all platforms, and for Unix that’s DWARF.

I am pretty sure LLVM can be taught to emit DWARF debug information even for PE files. Perhaps we can either make some option or provide a separate toolchain for this? Another way would be recovering CLANGELF as originally suggested.

> You can teach lldb about types. There is some example code here: https://github.com/tianocore/edk2/blob/master/EmulatorPkg/Unix/lldbefi.py <https://github.com/tianocore/edk2/blob/master/EmulatorPkg/Unix/lldbefi.py>
This code works just fine with LLDB and DWARF (e.g. XCODE5), though I have not yet completed these changes for my scripts for LLDB, only for GDB. However, with CLANGPDB generated files it is not functional. The reason for this is because LLDB is unaware of the underlying type, i.e. it does not know what is EFI_STATUS or UINT32. I can implement pretty-printing when LLDB knows about a typedef, but it is not possible to do this when the debug information is already gone or not parsed:

(lldb) p Status
(unsigned long long) $1 = 0
(lldb) p &Status
(unsigned long long *) $2 = 0x000000007fe19ad8
(lldb) p (EFI_STATUS)Status
error: use of undeclared identifier 'EFI_STATUS'

Just in case I tried using exactly your code, and other stuff like source level debugging works just fine and symbolication works fine, so it should be some bug with PDB in particular.

> That is strange as globals usually work best? The common issue I've seen is getting the slide wrong. The EFI modules are linked at a value near zero and relocated into memory, so the slide represents that adjustment.
> 
> You can use `image dump sections` and ` image dump symtab` to see lldb's view of symbols. More info here [1].

Yes, this one is a bit complicated, once again due to PDB most likely. It knows about global symbols, but does not list them in symtab:

(lldb) image dump symtab
Dumping symbol table for 91 modules.
Symtab, file = GdbSyms/Bin/X64_CLANGPDB/GdbSyms.dll, num_symbols = 0
Symtab, file = /Users/user/Documents/UefiWorkspace/Build/OvmfX64/NOOPT_CLANGPDB/X64/MdeModulePkg/Core/Dxe/DxeMain/DEBUG/DxeCore.dll, num_symbols = 0
Symtab, file = /Users/user/Documents/UefiWorkspace/Build/OvmfX64/NOOPT_CLANGPDB/X64/MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe/DEBUG/DevicePathDxe.dll, num_symbols = 0
…

The slides are correct, but there are two nuances that collide with it.

1. There are multiple instances of the globals with the same name (e.g. gBS), but for some reason LLDB always tries to print the globals from the first module. This happens even when I am source-level debugging, and I see a gBS symbol from another module (e.g. DxeCore) used right at the same line. With GDB the closest symbol is used, but with LLDB it is always coming from the first module. I tried checking expr help to find whether I can pass it a module explicitly, but also failed.

2.  To be able to get EFI types to locate the EFI_SYSTEM_TABLE_POINTER I add a dummy GdbSyms image, which is not loaded to the firmware. So basically I cannot slide what is not in the memory, and this is also my first image. I tried deleting it anyhow, but it failed for me.

(lldb) image dump sections
Dumping sections for 91 modules.
Sections for 'GdbSyms/Bin/X64_CLANGPDB/GdbSyms.dll' (x86_64):
  SectID     Type             Load Address                             Perm File Off.  File Size  Flags      Section Name
  ---------- ---------------- ---------------------------------------  ---- ---------- ---------- ---------- ----------------------------
  0xffffffffffffffff container        [0x0000000000000000-0x0000000000006ec0)* ---  0x00000000 0x00000000 0x00000000 GdbSyms.dll.
  0x00000001 code             [0x0000000000000220-0x0000000000005bd6)* ---  0x00000220 0x000059c0 0x60000020 GdbSyms.dll...text
  0x00000002 data             [0x0000000000005be0-0x0000000000006d79)* ---  0x00005be0 0x000011a0 0x40000040 GdbSyms.dll...rdata
  0x00000003 data             [0x0000000000006d80-0x0000000000006e30)* ---  0x00006d80 0x00000060 0xc0000040 GdbSyms.dll...data
  0x00000004 regular          [0x0000000000006e40-0x0000000000006ea4)* ---  0x00006de0 0x00000080 0x42000040 GdbSyms.dll...reloc
Sections for '/Users/user/Documents/UefiWorkspace/Build/OvmfX64/NOOPT_CLANGPDB/X64/MdeModulePkg/Core/Dxe/DxeMain/DEBUG/DxeCore.dll' (x86_64):
  SectID     Type             Load Address                             Perm File Off.  File Size  Flags      Section Name
  ---------- ---------------- ---------------------------------------  ---- ---------- ---------- ---------- ----------------------------
  0xffffffffffffffff container        [0x0000000000000000-0x00000000000523a0)* ---  0x00000000 0x00000000 0x00000000 DxeCore.dll.
  0x00000001 code             [0x000000007fe1b220-0x000000007fe61e34)  ---  0x00000220 0x00046c20 0x60000020 DxeCore.dll...text
  0x00000002 data             [0x000000007fe61e40-0x000000007fe68065)  ---  0x00046e40 0x00006240 0x40000040 DxeCore.dll...rdata
  0x00000003 data             [0x000000007fe68080-0x000000007fe6d160)  ---  0x0004d080 0x000018a0 0xc0000040 DxeCore.dll...data
  0x00000004 regular          [0x000000007fe6d160-0x000000007fe6d398)  ---  0x0004e920 0x00000240 0x42000040 DxeCore.dll...reloc
Sections for '/Users/user/Documents/UefiWorkspace/Build/OvmfX64/NOOPT_CLANGPDB/X64/MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe/DEBUG/DevicePathDxe.dll' (x86_64):
  SectID     Type             Load Address                             Perm File Off.  File Size  Flags      Section Name
  ---------- ---------------- ---------------------------------------  ---- ---------- ---------- ---------- ----------------------------
  0xffffffffffffffff container        [0x0000000000000000-0x0000000000014420)* ---  0x00000000 0x00000000 0x00000000 DevicePathDxe.dll.
  0x00000001 code             [0x000000007f986220-0x000000007f996cc6)  ---  0x00000220 0x00010ac0 0x60000020 DevicePathDxe.dll...text
  0x00000002 data             [0x000000007f996ce0-0x000000007f999b04)  ---  0x00010ce0 0x00002e40 0x40000040 DevicePathDxe.dll...rdata
  0x00000003 data             [0x000000007f999b20-0x000000007f99a1a2)  ---  0x00013b20 0x00000660 0xc0000040 DevicePathDxe.dll...data
  0x00000004 regular          [0x000000007f99a1c0-0x000000007f99a404)  ---  0x00014180 0x00000260 0x42000040 DevicePathDxe.dll…reloc
…

So, all in all, unique global variables work, but there is no way to access duplicating variables. They either resolve to GdbSyms or just cause a crash:

(lldb) p mDebugInfoTableHeader
(EFI_DEBUG_IMAGE_INFO_TABLE_HEADER) $0 = {
  UpdateStatus = 2
  TableSize = 92
  EfiDebugImageInfoTable = 0x000000007f814018
}
(lldb) p gBS
error: Couldn't materialize: couldn't get the value of variable ::gBS: read memory from 0x6df8 failed
error: errored out in DoExecute, couldn't PrepareToExecuteJITExpression
(lldb) p gEfiGlobalVariableGuid
0  libLLVM.dylib            0x000000010e52ee68 llvm::sys::PrintStackTrace(llvm::raw_ostream&) + 40
1  libLLVM.dylib            0x000000010e52f262 SignalHandler(int) + 188
2  libsystem_platform.dylib 0x00007fff6ca5642d _sigtramp + 29
...

> You can tell lldb to use the older Python like this (from the Terminal.app):
> $ defaults write com.apple.dt.lldb DefaultPythonVersion 2

Thanks, that helped quite a bit, but for some reason Xcode version still crashes more for me. I attached a couple of stack traces if you feel like having a look, but once again it seems that it is all about the PDB plugin.

> For the macOS API clang emits frame pointers, so you can walk the stack without symbols. You could try adding the compiler flag to emit the frame pointers.

I am pretty sure stack frames are not disabled with UEFI, as sometimes backtracing works just fine. To me it looks like debug information parsing randomly breaks in LLDB, and once it happens it forgets about other images:

(lldb) b CoreLocateHandleBuffer
Breakpoint 2: where = DxeCore.dll`CoreLocateHandleBuffer + 31 at Locate.c:649, address = 0x000000007fe36e4f
(lldb) c
Process 1 resuming
Process 1 stopped
* thread #1, stop reason = breakpoint 2.1
    frame #0: 0x000000007fe36e4f DxeCore.dll`CoreLocateHandleBuffer(SearchType=ByProtocol, Protocol=0x000000007f978160, SearchKey=0x0000000000000000, NumberHandles=0x000000007fe19fd8, Buffer=0x000000007fe19fc0) at Locate.c:649
   646 	  EFI_STATUS          Status;
   647 	  UINTN               BufferSize;
   648
-> 649 	  if (NumberHandles == NULL) {
   650 	    return EFI_INVALID_PARAMETER;
   651 	  }
   652
(lldb) bt
* thread #1, stop reason = breakpoint 2.1
  * frame #0: 0x000000007fe36e4f DxeCore.dll`CoreLocateHandleBuffer(SearchType=ByProtocol, Protocol=0x000000007f978160, SearchKey=0x0000000000000000, NumberHandles=0x000000007fe19fd8, Buffer=0x000000007fe19fc0) at Locate.c:649
    frame #1: 0x000000007fe36816 DxeCore.dll`CoreLocateDevicePath(Protocol=0x000000007f978160, DevicePath=0x000000007fe1a060, Device=0x000000007fe1a068) at Locate.c:466
    frame #2: 0x000000007f97479a SecurityStubDxe.dll

———

(lldb) b CopyMem
Breakpoint 3: 70 locations.
(lldb) c
Process 1 resuming
Process 1 stopped
* thread #1, stop reason = breakpoint 2.53 3.53
    frame #0: 0x000000007e5c13b3 MnpDxe.dll`CopyMem(DestinationBuffer=0x000000007fe19b50, SourceBuffer=0x000000007e2aa470, Length=656) at CopyMemWrapper.c:47
   44  	  IN UINTN       Length
   45  	  )
   46  	{
-> 47  	  if (Length == 0) {
   48  	    return DestinationBuffer;
   49  	  }
   50  	  ASSERT ((Length - 1) <= (MAX_ADDRESS - (UINTN)DestinationBuffer));
(lldb) bt
* thread #1, stop reason = breakpoint 2.53 3.53
  * frame #0: 0x000000007e5c13b3 MnpDxe.dll`CopyMem(DestinationBuffer=0x000000007fe19b50, SourceBuffer=0x000000007e2aa470, Length=656) at CopyMemWrapper.c:47
(lldb) finish
error: Could not create return address breakpoint.
(lldb) n
Process 1 stopped
* thread #1, stop reason = step over
    frame #0: 0x000000007e5c13ce MnpDxe.dll`CopyMem(DestinationBuffer=0x000000007fe19b50, SourceBuffer=0x000000007e2aa470, Length=656) at CopyMemWrapper.c:50
   47  	  if (Length == 0) {
   48  	    return DestinationBuffer;
   49  	  }
-> 50  	  ASSERT ((Length - 1) <= (MAX_ADDRESS - (UINTN)DestinationBuffer));
   51  	  ASSERT ((Length - 1) <= (MAX_ADDRESS - (UINTN)SourceBuffer));
   52
   53  	  if (DestinationBuffer == SourceBuffer) {
(lldb)
...
Process 1 stopped
* thread #1, stop reason = step over
    frame #0: 0x000000007e5c14b4 MnpDxe.dll`CopyMem(DestinationBuffer=0x000000007fe19b50, SourceBuffer=0x000000007e2aa470, Length=656) at CopyMemWrapper.c:57
   54  	    return DestinationBuffer;
   55  	  }
   56  	  return InternalMemCopyMem (DestinationBuffer, SourceBuffer, Length);
-> 57  	}
(lldb)
Process 1 stopped
* thread #1, stop reason = step over
    frame #0: 0x000000007e5c726e MnpDxe.dll
->  0x7e5c726e: mov    rax, qword ptr [rsp + 0x60]
    0x7e5c7273: cmp    byte ptr [rax + 0x68], 0x0
    0x7e5c7277: jne    0x7e5c7291
    0x7e5c727d: movabs rax, -0x7fffffffffffffed
(lldb) bt
* thread #1, stop reason = step over
  * frame #0: 0x000000007e5c726e MnpDxe.dll

———

(lldb) c
Process 1 resuming
Process 1 stopped
* thread #1, stop reason = signal SIGINT
    frame #0: 0x000000007fe4d72e DxeCore.dll
->  0x7fe4d72e: cmp    al, 0x0
    0x7fe4d730: je     0x7fe4d765
    0x7fe4d736: mov    rcx, qword ptr [rsp + 0x20]
    0x7fe4d73b: call   0x7fe4c4b0
(lldb) bt
* thread #1, stop reason = signal SIGINT
  * frame #0: 0x000000007fe4d72e DxeCore.dll

> On macOS the Mach-O and dSYM have a UUID (dwarfdump -u) that is indexed by Spotlight (mdfind "com_apple_xcode_dsym_uuids == *") [2]
> This should be the UUID in the debug directory entry and you can use that to lookup the symbols like this:
> 
> module = target.AddModule (None, None, uuid)
> SBError = target.SetModuleLoadAddress (module, LoadAddress + TeAdjust)
> 
> Also lldb has built in help for commands, but it is kind of terse since it is autogenerated from the C++ swig.
> (lldb) script help (lldb.target.AddModule)
> Help on method AddModule in module lldb:
> 
> AddModule(self, *args) method of lldb.SBTarget instance
>     AddModule(SBTarget self, SBModule module) -> bool
>     AddModule(SBTarget self, char const * path, char const * triple, char const * uuid) -> SBModule
>     AddModule(SBTarget self, char const * path, char const * triple, char const * uuid_cstr, char const * symfile) -> SBModule
>     AddModule(SBTarget self, SBModuleSpec module_spec) -> SBModule
> 
> The minimum  you need to symbolicate a frame is uuid, LoadAddress, and PC.
> 
> [1] http://lldb.llvm.org/use/map.html <http://lldb.llvm.org/use/map.html>
> [2] http://lldb.llvm.org/use/symbols.html <http://lldb.llvm.org/use/symbols.html>
Thanks for the links again. Yes, I am using some of these, and in fact for GDB that’s pretty much what I did when I worked with XCODE5. It is very likely that when I get to complete LLDB support for XCODE5 it will work quite fine too. But I am already happy with XCODE5 here, and making it even better will only help myself, but not other people with e.g. Linux or people that want me to use the same compiler with them.

Best regards,
Vitaly



> 21 марта 2020 г., в 20:13, Andrew Fish <afish@apple.com> написал(а):
> 
> 
> 
>> On Mar 21, 2020, at 3:28 AM, Vitaly Cheptsov <cheptsov@ispras.ru <mailto:cheptsov@ispras.ru>> wrote:
>> 
>> Hello,
>> 
>> Andrey, thanks for the hint, it was very helpful. I rewrote the GDB scripts to work with LLDB[1] and was able to debug OVMF built with CLANGPDB. While it is still quite dirty, at the very least it works.
>> 
>> Unfortunately the experience was close to terrible. I may certainly do something wrong, but it is clear that PDB and LLDB do not support each other well enough. After spending several hours on playing with the tools my conclusion is that LLDB is simply not suited for UEFI PDB debugging, and we really want DWARF  as there is no other opensource debugger that supports PDB on macOS and Linux
>> 
>> In case somebody knows workarounds here are the issues I faced:
>> 
>> 1. All integer alias typedefs are discarded in favour of underlying types. This way EFI_STATUS and EFI_TPL become unsigned long long, CHAR8 becomes char, and CHAR16 becomes unsigned short. It does not look like LLDB has the original types anywhere at all, and it also does not have them registered.
>> 
>>     frame #0: 0x000000007fe242aa DxeCore.dll`CoreAllocatePoolPagesI(PoolType=EfiBootServicesData, NoPages=1, Granularity=4096, NeedGuard='\0') at Pool.c:322
>>    319 	    return NULL;
>>    320 	  }
>>    321
>> -> 322 	  Buffer = CoreAllocatePoolPages (PoolType, NoPages, Granularity, NeedGuard);
>>    323 	  CoreReleaseMemoryLock ();
>>    324
>>    325 	  if (Buffer != NULL) {
>> (lldb) p Status
>> (unsigned long long) $3 = 0
>> 
>> Structures work more or less fine, but for simpler types like strings we are out of even potential pretty-printing.
>> 
> 
> Vitaly,
> 
> You can teach lldb about types. There is some example code here: https://github.com/tianocore/edk2/blob/master/EmulatorPkg/Unix/lldbefi.py <https://github.com/tianocore/edk2/blob/master/EmulatorPkg/Unix/lldbefi.py>
>> 2. Global variables are not accessible. I am not sure what happens, but they either seem to not relocate or conflict with the other names:
>> 
>> (lldb) p gST
>> error: Couldn't materialize: couldn't get the value of variable ::gST: read memory from 0x6e18 failed
>> error: errored out in DoExecute, couldn't PrepareToExecuteJITExpression
>> (lldb) p &gST
>> error: Couldn't materialize: couldn't get the value of variable ::gST: read memory from 0x6e18 failed
>> error: errored out in DoExecute, couldn't PrepareToExecuteJITExpression
>> 
> 
> That is strange as globals usually work best? The common issue I've seen is getting the slide wrong. The EFI modules are linked at a value near zero and relocated into memory, so the slide represents that adjustment.
> 
> You can use `image dump sections` and ` image dump symtab` to see lldb's view of symbols. More info here [1].
> 
>> 3. Quite a number of crashes.
>> 
>> In most cases autocompletion by tab press causes a crash. E.g.
>> 
>> b I<TAB>
>> 
>> So will do printing of a GUID, e.g. p gEfiGlobalVariableGuid.
>> 
>> This may have to do with Python compatibility as Xcode 11 LLDB that uses Python 3 generally crashes more often than MacPorts LLDB 9.0. Surprisingly structures work more or less fine.
>> 
> 
> You can tell lldb to use the older Python like this (from the Terminal.app):
> $ defaults write com.apple.dt.lldb DefaultPythonVersion 2
> 
>> 4. Ctrl+C does not produce a valid backtrace. When I break with a breakpoint, I see a proper stacktrace with more than one entry, with function prototypes and values. When I break with Ctrl+C I only see some weird backtrace with most of the entries missing regardless of frame position:
>> 
>> (lldb) bt
>> * thread #1, stop reason = signal SIGTRAP
>>   * frame #0: 0x000000007fe4c5f3 DxeCore.dll
>> 
>> Probably more and all the unintuitive stuff like the lack of more functional TUI, but it is hard to remember all the trials.
>> 
> 
> For the macOS API clang emits frame pointers, so you can walk the stack without symbols. You could try adding the compiler flag to emit the frame pointers.
> 
> 
>> [1] https://github.com/acidanthera/OpenCorePkg/blob/master/Debug/Scripts/lldb_uefi.py <https://github.com/acidanthera/OpenCorePkg/blob/master/Debug/Scripts/lldb_uefi.py>
>> 
> 
> On macOS the Mach-O and dSYM have a UUID (dwarfdump -u) that is indexed by Spotlight (mdfind "com_apple_xcode_dsym_uuids == *") [2]
> This should be the UUID in the debug directory entry and you can use that to lookup the symbols like this:
> 
> module = target.AddModule (None, None, uuid)
> SBError = target.SetModuleLoadAddress (module, LoadAddress + TeAdjust)
> 
> Also lldb has built in help for commands, but it is kind of terse since it is autogenerated from the C++ swig.
> (lldb) script help (lldb.target.AddModule)
> Help on method AddModule in module lldb:
> 
> AddModule(self, *args) method of lldb.SBTarget instance
>     AddModule(SBTarget self, SBModule module) -> bool
>     AddModule(SBTarget self, char const * path, char const * triple, char const * uuid) -> SBModule
>     AddModule(SBTarget self, char const * path, char const * triple, char const * uuid_cstr, char const * symfile) -> SBModule
>     AddModule(SBTarget self, SBModuleSpec module_spec) -> SBModule
> 
> The minimum  you need to symbolicate a frame is uuid, LoadAddress, and PC.
> 
> [1] http://lldb.llvm.org/use/map.html <http://lldb.llvm.org/use/map.html>
> [2] http://lldb.llvm.org/use/symbols.html <http://lldb.llvm.org/use/symbols.html>
> 
> Thanks,
> 
> Andrew Fish
> 
> 
>> Best wishes,
>> Vitaly
>> 
>>> 20 марта 2020 г., в 22:14, Andrew Fish <afish@apple.com <mailto:afish@apple.com>> написал(а):
>>> 
>>> 
>>> 
>>>> On Mar 20, 2020, at 8:13 AM, Vitaly Cheptsov <cheptsov@ispras.ru <mailto:cheptsov@ispras.ru>> wrote:
>>>> 
>>>> Hello,
>>>> 
>>>> We noticed that the original bugzilla, which intended to add new LLVM toolchain support[1], also wanted to bring ELF format support with DWARF debugging information. For some reason this did not make its way into EDK II, and we are currently wondering, how can one debug binaries built with LLVM 9.0.
>>>> 
>>>> For macOS and XCODE5 toolchain we use GDB scripts based on Andrei Warkentin’s work, which allow us to integrate with QEMU and VMware[2]. It is likely that they should work with little to no work on Linux with CLANG38/GCC5 with GDB once again. However, CLANGPDB apparently is using PDB debugging information, which I believe is not handled with GDB.
>>>> 
>>>> Could you please provide the details on the matter and let us know about the recommended route?
>>>> — Is dropping CLANGELF just a temporary measure and it should be resubmitted again?
>>>> — Should LLDB, which seems to be aware of PDB, be used instead of GDB, when building with CLANGPDB? If so, did anybody try that?
>>>> 
>>> 
>>> Vitaly,
>>> 
>>> I've not tried the CLANGPDB path, but if you want to connect lldb to QEMU you need to set  plugin.process.gdb-remote.target-definition-file [1] to [2].
>>> 
>>> [1]  lldb -o "settings set plugin.process.gdb-remote.target-definition-file x86_64_target_definition.py" -o "gdb-remote 9000"
>>> [2] https://github.com/llvm-mirror/lldb/blob/master/examples/python/x86_64_target_definition.py <https://github.com/llvm-mirror/lldb/blob/master/examples/python/x86_64_target_definition.py>
>>> 
>>> Thanks,
>>> 
>>> Andrew Fish
>>> 
>>>> Thanks!
>>>> 
>>>> Best regards,
>>>> Vitaly
>>>> 
>>>> [1] https://bugzilla.tianocore.org/show_bug.cgi?id=1603 <https://bugzilla.tianocore.org/show_bug.cgi?id=1603>
>>>> [2] https://github.com/acidanthera/OpenCorePkg/blob/master/Debug/Scripts/gdb_uefi.py <https://github.com/acidanthera/OpenCorePkg/blob/master/Debug/Scripts/gdb_uefi.py>
>>>> 
>> 
>> 


[-- Attachment #1.2.1: Type: text/html, Size: 70592 bytes --]

[-- Attachment #1.2.2: crashes.txt --]
[-- Type: text/plain, Size: 14456 bytes --]

E.g. this is what happens when I type «b In<TAB>». I cannot reproduce it with stock LLDB.

(lldb) b In0  lldb                     0x0000000102638705 llvm::sys::PrintStackTrace(llvm::raw_ostream&) + 37
1  lldb                     0x0000000102637d77 llvm::sys::RunSignalHandlers() + 39
2  lldb                     0x0000000102638d58 SignalHandler(int) + 264
3  libsystem_platform.dylib 0x00007fff6ca5642d _sigtramp + 29
4  libsystem_platform.dylib 000000000000000000 _sigtramp + 2472188912
5  LLDB                     0x0000000102dbf200 llvm::BinaryStreamReader::BinaryStreamReader(llvm::BinaryStream&) + 32
6  LLDB                     0x00000001030ba527 llvm::pdb::ModuleDebugStreamRef::reload() + 39
7  LLDB                     0x0000000102d589ff lldb_private::npdb::CompileUnitIndex::GetOrCreateCompiland(unsigned short) + 319
8  LLDB                     0x0000000102d72077 lldb_private::npdb::SymbolFileNativePDB::ParseCompileUnitAtIndex(unsigned int) + 119
9  LLDB                     0x00000001029cf71d lldb_private::SymbolVendor::GetCompileUnitAtIndex(unsigned long) + 221
10 LLDB                     0x000000010288659a lldb_private::Module::GetCompileUnitAtIndex(unsigned long) + 106
11 LLDB                     0x000000010289fb10 lldb_private::SearchFilter::DoCUIteration(std::__1::shared_ptr<lldb_private::Module> const&, lldb_private::SymbolContext const&, lldb_private::Searcher&) + 208
12 LLDB                     0x000000010289f7b3 lldb_private::SearchFilter::DoModuleIteration(lldb_private::SymbolContext const&, lldb_private::Searcher&) + 419
13 LLDB                     0x000000010289f5f4 lldb_private::SearchFilter::Search(lldb_private::Searcher&) + 180
14 LLDB                     0x0000000102e5563d lldb_private::CommandCompletions::SourceFileCompleter::DoCompletion(lldb_private::SearchFilter*) + 29
15 LLDB                     0x0000000102e54c28 lldb_private::CommandCompletions::SourceFiles(lldb_private::CommandInterpreter&, lldb_private::CompletionRequest&, lldb_private::SearchFilter*) + 200
16 LLDB                     0x0000000102e555ed lldb_private::CommandCompletions::InvokeCommonCompletionCallbacks(lldb_private::CommandInterpreter&, unsigned int, lldb_private::CompletionRequest&, lldb_private::SearchFilter*) + 93
17 LLDB                     0x000000010293b331 lldb_private::CommandObjectRegexCommand::HandleCompletion(lldb_private::CompletionRequest&) + 33
18 LLDB                     0x00000001029310e8 lldb_private::CommandInterpreter::HandleCompletionMatches(lldb_private::CompletionRequest&) + 424
19 LLDB                     0x000000010293135d lldb_private::CommandInterpreter::HandleCompletion(char const*, char const*, char const*, int, int, lldb_private::StringList&, lldb_private::StringList&) + 349
20 LLDB                     0x0000000102871eaa lldb_private::IOHandlerDelegate::IOHandlerComplete(lldb_private::IOHandler&, char const*, char const*, char const*, int, int, lldb_private::StringList&, lldb_private::StringList&) + 90
21 LLDB                     0x0000000102872547 lldb_private::IOHandlerEditline::AutoCompleteCallback(char const*, char const*, char const*, int, int, lldb_private::StringList&, lldb_private::StringList&, void*) + 55
22 LLDB                     0x00000001029155fe lldb_private::Editline::TabCommand(int) + 110
23 LLDB                     0x0000000102917931 lldb_private::Editline::ConfigureEditor(bool)::$_13::__invoke(editline*, int) + 33
24 libedit.3.dylib          0x00007fff6a3fc7db el_wgets + 484
25 libedit.3.dylib          0x00007fff6a4078bb el_gets + 37
26 LLDB                     0x0000000102916df7 lldb_private::Editline::GetLine(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >&, bool&) + 439
27 LLDB                     0x00000001028727bc lldb_private::IOHandlerEditline::GetLine(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >&, bool&) + 60
28 LLDB                     0x0000000102872f3e lldb_private::IOHandlerEditline::Run() + 190
29 LLDB                     0x000000010285a3cb lldb_private::Debugger::ExecuteIOHandlers() + 123
30 LLDB                     0x000000010293589c lldb_private::CommandInterpreter::RunCommandInterpreter(bool, bool, lldb_private::CommandInterpreterRunOptions&) + 156
31 LLDB                     0x00000001026deb91 lldb::SBDebugger::RunCommandInterpreter(bool, bool) + 209
32 lldb                     0x0000000102623665 Driver::MainLoop() + 2853
33 lldb                     0x00000001026245d2 main + 1634
34 libdyld.dylib            0x00007fff6c85d7fd start + 1
35 libdyld.dylib            0x000000000000000f start + 2474256403
Stack dump:
0.  Program arguments: /Applications/Xcode.app/Contents/Developer/usr/bin/lldb -o settings set plugin.process.gdb-remote.target-definition-file Scripts/x86_64_target_definition.py -o gdb-remote 8864 -o target modules add -s GdbSyms/Bin/X64_CLANGPDB/GdbSyms.pdb GdbSyms/Bin/X64_CLANGPDB/GdbSyms.dll -o command script import Scripts/lldb_uefi.py -o command script add -c lldb_uefi.ReloadUefi reload-uefi -o reload-uefi -o b DebugBreak 
./maclldb.tool: line 33: 37553 Segmentation fault: 11  "$LLDB" -o "settings set plugin.process.gdb-remote.target-definition-file Scripts/x86_64_target_definition.py" -o "gdb-remote $LLDB_PORT" -o "target modules add -s GdbSyms/Bin/X64_CLANGPDB/GdbSyms.pdb GdbSyms/Bin/X64_CLANGPDB/GdbSyms.dll" -o "command script import Scripts/lldb_uefi.py" -o "command script add -c lldb_uefi.ReloadUefi reload-uefi" -o "reload-uefi" -o "b DebugBreak"

This I cannot reproduce with stock GDB either:
(lldb) p mDebugInfoTableHeader
0  lldb                     0x0000000102e13705 llvm::sys::PrintStackTrace(llvm::raw_ostream&) + 37
1  lldb                     0x0000000102e12d77 llvm::sys::RunSignalHandlers() + 39
2  lldb                     0x0000000102e13d58 SignalHandler(int) + 264
3  libsystem_platform.dylib 0x00007fff6ca5642d _sigtramp + 29
4  libsystem_platform.dylib 0xaae108ecfd74df7c _sigtramp + 2429516652
5  LLDB                     0x000000010359e200 llvm::BinaryStreamReader::BinaryStreamReader(llvm::BinaryStream&) + 32
6  LLDB                     0x0000000103899527 llvm::pdb::ModuleDebugStreamRef::reload() + 39
7  LLDB                     0x00000001035379ff lldb_private::npdb::CompileUnitIndex::GetOrCreateCompiland(unsigned short) + 319
8  LLDB                     0x0000000103540a77 lldb_private::npdb::PdbAstBuilder::ParseAllNamespacesPlusChildrenOf(llvm::Optional<llvm::StringRef>) + 663
9  LLDB                     0x00000001035414e2 lldb_private::npdb::PdbAstBuilder::ParseDeclsForContext(clang::DeclContext&) + 82
10 LLDB                     0x0000000103550fef lldb_private::npdb::SymbolFileNativePDB::ParseDeclsForContext(lldb_private::CompilerDeclContext) + 63
11 LLDB                     0x000000010315604c lldb_private::ClangASTContext::DeclContextFindDeclByName(void*, lldb_private::ConstString, bool) + 668
12 LLDB                     0x00000001031627b9 lldb_private::CompilerDeclContext::FindDeclByName(lldb_private::ConstString, bool) + 57
13 LLDB                     0x00000001032f1b76 lldb_private::ClangExpressionDeclMap::FindExternalVisibleDecls(lldb_private::NameSearchContext&, std::__1::shared_ptr<lldb_private::Module>, lldb_private::CompilerDeclContext&, unsigned int) + 1014
14 LLDB                     0x00000001032f1334 lldb_private::ClangExpressionDeclMap::FindExternalVisibleDecls(lldb_private::NameSearchContext&) + 628
15 LLDB                     0x00000001032e63b6 lldb_private::ClangASTSource::FindExternalVisibleDeclsByName(clang::DeclContext const*, clang::DeclarationName) + 1174
16 LLDB                     0x000000010635e802 clang::DeclContext::lookup(clang::DeclarationName) const + 754
17 LLDB                     0x0000000105ff1f66 LookupDirect(clang::Sema&, clang::LookupResult&, clang::DeclContext const*) + 86
18 LLDB                     0x0000000105fee3e9 clang::Sema::CppLookupName(clang::LookupResult&, clang::Scope*) + 3257
19 LLDB                     0x0000000105ff1795 clang::Sema::LookupName(clang::LookupResult&, clang::Scope*, bool) + 725
20 LLDB                     0x0000000105d66a63 clang::Sema::ClassifyName(clang::Scope*, clang::CXXScopeSpec&, clang::IdentifierInfo*&, clang::SourceLocation, clang::Token const&, bool, std::__1::unique_ptr<clang::CorrectionCandidateCallback, std::__1::default_delete<clang::CorrectionCandidateCallback> >) + 419
21 LLDB                     0x0000000105b0ac14 clang::Parser::TryAnnotateName(bool, std::__1::unique_ptr<clang::CorrectionCandidateCallback, std::__1::default_delete<clang::CorrectionCandidateCallback> >) + 484
22 LLDB                     0x0000000105aeb55a clang::Parser::ParseStatementOrDeclarationAfterAttributes(llvm::SmallVector<clang::Stmt*, 32u>&, clang::Parser::AllowedConstructsKind, clang::SourceLocation*, clang::Parser::ParsedAttributesWithRange&) + 394
23 LLDB                     0x0000000105aeb279 clang::Parser::ParseStatementOrDeclaration(llvm::SmallVector<clang::Stmt*, 32u>&, clang::Parser::AllowedConstructsKind, clang::SourceLocation*) + 201
24 LLDB                     0x0000000105af263c clang::Parser::ParseCompoundStatementBody(bool) + 1644
25 LLDB                     0x0000000105af3131 clang::Parser::ParseFunctionStatementBody(clang::Decl*, clang::Parser::ParseScope&) + 161
26 LLDB                     0x0000000105b09780 clang::Parser::ParseFunctionDefinition(clang::ParsingDeclarator&, clang::Parser::ParsedTemplateInfo const&, clang::Parser::LateParsedAttrList*) + 2608
27 LLDB                     0x0000000105a84045 clang::Parser::ParseDeclGroup(clang::ParsingDeclSpec&, clang::DeclaratorContext, clang::SourceLocation*, clang::Parser::ForRangeInit*) + 1781
28 LLDB                     0x0000000105b08a37 clang::Parser::ParseDeclOrFunctionDefInternal(clang::Parser::ParsedAttributesWithRange&, clang::ParsingDeclSpec&, clang::AccessSpecifier) + 695
29 LLDB                     0x0000000105b084e3 clang::Parser::ParseDeclarationOrFunctionDefinition(clang::Parser::ParsedAttributesWithRange&, clang::ParsingDeclSpec*, clang::AccessSpecifier) + 339
30 LLDB                     0x0000000105b06c57 clang::Parser::ParseExternalDeclaration(clang::Parser::ParsedAttributesWithRange&, clang::ParsingDeclSpec*) + 2535
31 LLDB                     0x0000000105b05d97 clang::Parser::ParseTopLevelDecl(clang::OpaquePtr<clang::DeclGroupRef>&) + 679
32 LLDB                     0x0000000105a71855 clang::ParseAST(clang::Sema&, bool, bool) + 453
33 LLDB                     0x0000000105a71672 clang::ParseAST(clang::Preprocessor&, clang::ASTConsumer*, clang::ASTContext&, bool, clang::TranslationUnitKind, clang::CodeCompleteConsumer*, bool) + 194
34 LLDB                     0x00000001033094a1 lldb_private::ClangExpressionParser::ParseInternal(lldb_private::DiagnosticManager&, clang::CodeCompleteConsumer*, unsigned int, unsigned int) + 1729
35 LLDB                     0x0000000103315793 lldb_private::ClangUserExpression::Parse(lldb_private::DiagnosticManager&, lldb_private::ExecutionContext&, lldb_private::ExecutionPolicy, bool, bool) + 499
36 LLDB                     0x00000001030deaf5 lldb_private::UserExpression::Evaluate(lldb_private::ExecutionContext&, lldb_private::EvaluateExpressionOptions const&, llvm::StringRef, llvm::StringRef, lldb_private::SharingPtr<lldb_private::ValueObject>&, lldb_private::Status&, unsigned int, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >*, std::__1::shared_ptr<lldb_private::Module>*) + 1701
37 LLDB                     0x0000000103241542 lldb_private::Target::EvaluateExpression(llvm::StringRef, lldb_private::ExecutionContextScope*, lldb_private::SharingPtr<lldb_private::ValueObject>&, lldb_private::EvaluateExpressionOptions const&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >*) + 418
38 LLDB                     0x000000010364dd06 lldb_private::CommandObjectExpression::EvaluateExpression(llvm::StringRef, lldb_private::Stream*, lldb_private::Stream*, lldb_private::CommandReturnObject*) + 566
39 LLDB                     0x000000010364ec56 lldb_private::CommandObjectExpression::DoExecute(llvm::StringRef, lldb_private::CommandReturnObject&) + 1270
40 LLDB                     0x000000010311877b lldb_private::CommandObjectRaw::Execute(char const*, lldb_private::CommandReturnObject&) + 427
41 LLDB                     0x000000010310fd25 lldb_private::CommandInterpreter::HandleCommand(char const*, lldb_private::LazyBool, lldb_private::CommandReturnObject&, lldb_private::ExecutionContext*, bool, bool) + 2805
42 LLDB                     0x0000000103113d61 lldb_private::CommandInterpreter::IOHandlerInputComplete(lldb_private::IOHandler&, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >&) + 657
43 LLDB                     0x0000000103051f9d lldb_private::IOHandlerEditline::Run() + 285
44 LLDB                     0x00000001030393cb lldb_private::Debugger::ExecuteIOHandlers() + 123
45 LLDB                     0x000000010311489c lldb_private::CommandInterpreter::RunCommandInterpreter(bool, bool, lldb_private::CommandInterpreterRunOptions&) + 156
46 LLDB                     0x0000000102ebdb91 lldb::SBDebugger::RunCommandInterpreter(bool, bool) + 209
47 lldb                     0x0000000102dfe665 Driver::MainLoop() + 2853
48 lldb                     0x0000000102dff5d2 main + 1634
49 libdyld.dylib            0x00007fff6c85d7fd start + 1
50 libdyld.dylib            0x000000000000000f start + 2474256403
Stack dump:
0.  Program arguments: /Applications/Xcode.app/Contents/Developer/usr/bin/lldb -o settings set plugin.process.gdb-remote.target-definition-file Scripts/x86_64_target_definition.py -o gdb-remote 8864 -o target modules add -s GdbSyms/Bin/X64_CLANGPDB/GdbSyms.pdb GdbSyms/Bin/X64_CLANGPDB/GdbSyms.dll -o command script import Scripts/lldb_uefi.py -o command script add -c lldb_uefi.ReloadUefi reload-uefi -o reload-uefi -o b DebugBreak 
./maclldb.tool: line 33: 37722 Segmentation fault: 11  "$LLDB" -o "settings set plugin.process.gdb-remote.target-definition-file Scripts/x86_64_target_definition.py" -o "gdb-remote $LLDB_PORT" -o "target modules add -s GdbSyms/Bin/X64_CLANGPDB/GdbSyms.pdb GdbSyms/Bin/X64_CLANGPDB/GdbSyms.dll" -o "command script import Scripts/lldb_uefi.py" -o "command script add -c lldb_uefi.ReloadUefi reload-uefi" -o "reload-uefi" -o "b DebugBreak"

[-- Attachment #2: Message signed with OpenPGP --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

  reply	other threads:[~2020-03-21 18:36 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-03-20 15:13 CLANGPDB binary debugging Vitaly Cheptsov
2020-03-20 19:14 ` [edk2-devel] " Andrew Fish
2020-03-21 10:28   ` Vitaly Cheptsov
2020-03-21 17:13     ` Andrew Fish
2020-03-21 18:36       ` Vitaly Cheptsov [this message]
2020-03-21 21:06         ` Andrew Fish
2020-03-23  9:10           ` Vitaly Cheptsov
2020-03-25 13:16             ` Liming Gao
2020-03-25 13:20               ` Vitaly Cheptsov

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=5C8DD065-0140-428B-A146-999A5694BC99@ispras.ru \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox