From: Fan Jeff <vanjeff_919@hotmail.com>
To: Paulo Alcantara <pcacjr@zytor.com>,
"edk2-devel@lists.01.org" <edk2-devel@lists.01.org>
Cc: Laszlo Ersek <lersek@redhat.com>, Eric Dong <eric.dong@intel.com>
Subject: 答复: 答复: [RFC v3 1/3] UefiCpuPkg/CpuExceptionHandlerLib/X64: Add stack trace support
Date: Thu, 23 Nov 2017 14:27:35 +0000 [thread overview]
Message-ID: <CO2PR19MB01379AAEC6501A6DA01AFED9D7210@CO2PR19MB0137.namprd19.prod.outlook.com> (raw)
In-Reply-To: <2da80d1e-8b3a-f56b-6a34-871e32b8aba1@zytor.com>
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #1: Type: text/plain; charset="gb2312", Size: 14163 bytes --]
Hi Paulo,
I¡¯d like to clarify my question.
The following call trace information is abstracted from your x64 dump contents.
Call trace:
0 0x7DBCD580 @ 0x7DBCD000+0x57F (0x7EEC8DDC) in PartitionDxe.dll
1 0x7DBD41BE @ 0x7DBCD000+0x71BD (0x7EEC8DFC) in PartitionDxe.dll
I guess you used CpuBreakpoint() to do your validation.
For 0x7DBCD580, it is return address followed by ¡°int 3¡± from your case.
If we dump obj file, we would see the following asm code.
000000007DBCD57F: CC int 3
000000007DBCD580: C3 ret
(On case 0, the code at offset 0x57F is int 3)
000000007DBD41B9: E8 AF 2A 00 00 call CpuBreakpoint
000000007DBD41BE: XX XX XX XX XXX XXXXXX
(On case 1, what¡¯s the code at offset 0x71BD??)
If the upper asm code is not correct, please copy your obj file here.
If the upper asm code is correct, I think we should show the return address as below, since we cannot calculate the calling IP address on most cases. (return address ¨C 1 is not always the calling IP address on IA arch).
0 0x7DBCD580 @ 0x7DBCD000+0x580 (0x7EEC8DDC) in PartitionDxe.dll
1 0x7DBD41BE @ 0x7DBCD000+0x71BE (0x7EEC8DFC) in PartitionDxe.dll
Thanks!
Jeff
________________________________
From: Paulo Alcantara <pcacjr@zytor.com>
Sent: Monday, November 20, 2017 10:59:41 PM
To: Fan Jeff; edk2-devel@lists.01.org
Cc: Laszlo Ersek; Eric Dong
Subject: Re: ´ð¸´: [edk2] [RFC v3 1/3] UefiCpuPkg/CpuExceptionHandlerLib/X64: Add stack trace support
Hi Jeff,
(sorry for the late response)
On 11/17/2017 5:24 AM, Fan Jeff wrote:
> Paulo,
>
>
> I don't understand why you - 1 when calculating EIP offset in image, it
> confused me.
That's an offset relative to the PE/COFF image base: 0 - (ImageBase +
ImageBaseSize - 1)
Doesn't that look right to you?
Thanks
Paulo
>
>
> + for (;;) {
> + //
> + // Print stack frame in the following format:
> + //
> + // # <RIP> @ <ImageBase>+<RelOffset> (RBP) in [<ModuleName> | ????]
> + //
> + InternalPrintMessage (
> + "%d 0x%016lx @ 0x%016lx+0x%x (0x%016lx) in %a\n",
> + *UnwoundStacksCount - 1,
> + Rip,
> + ImageBase,
> + Rip - ImageBase - 1, // ????
> + Rbp,
> + PdbFileName
> + );
> +
>
> Jeff
>
>
>
>
> ------------------------------------------------------------------------
> *·¢¼þÈË:* edk2-devel <edk2-devel-bounces@lists.01.org> ´ú±í Paulo
> Alcantara <pcacjr@zytor.com>
> *·¢ËÍʱ¼ä:* 2017Äê11ÔÂ17ÈÕ 5:56
> *ÊÕ¼þÈË:* edk2-devel@lists.01.org
> *³ËÍ:* Laszlo Ersek; Eric Dong
> *Ö÷Ìâ:* [edk2] [RFC v3 1/3] UefiCpuPkg/CpuExceptionHandlerLib/X64: Add
> stack trace support
> This patch adds stack trace support during a X64 CPU exception.
>
> It will dump out back trace, stack contents as well as image module
> names that were part of the call stack.
>
> Contributed-under: TianoCore Contribution Agreement 1.1
> Cc: Eric Dong <eric.dong@intel.com>
> Cc: Laszlo Ersek <lersek@redhat.com>
> Signed-off-by: Paulo Alcantara <pcacjr@zytor.com>
> ---
> UefiCpuPkg/Library/CpuExceptionHandlerLib/X64/ArchExceptionHandler.c |
> 376 +++++++++++++++++++-
> 1 file changed, 374 insertions(+), 2 deletions(-)
>
> diff --git
> a/UefiCpuPkg/Library/CpuExceptionHandlerLib/X64/ArchExceptionHandler.c
> b/UefiCpuPkg/Library/CpuExceptionHandlerLib/X64/ArchExceptionHandler.c
> index 65f0cff680..fe776ccc2d 100644
> --- a/UefiCpuPkg/Library/CpuExceptionHandlerLib/X64/ArchExceptionHandler.c
> +++ b/UefiCpuPkg/Library/CpuExceptionHandlerLib/X64/ArchExceptionHandler.c
> @@ -14,6 +14,11 @@
>
> #include "CpuExceptionCommon.h"
>
> +//
> +// Unknown PDB file name
> +//
> +GLOBAL_REMOVE_IF_UNREFERENCED CONST CHAR8 *mUnknownPdbFileName = "????";
> +
> /**
> Return address map of exception handler template so that C code can
> generate
> exception tables.
> @@ -242,6 +247,357 @@ DumpCpuContext (
> );
> }
>
> +/**
> + Get absolute path and file name of PDB file in PE/COFF image.
> +
> + @param[in] ImageBase Base address of PE/COFF image.
> + @param[out] PdbAbsoluteFilePath Absolute path of PDB file.
> + @param[out] PdbFileName File name of PDB file.
> +**/
> +STATIC
> +VOID
> +GetPdbFileName (
> + IN UINTN ImageBase,
> + OUT CHAR8 **PdbAbsoluteFilePath,
> + OUT CHAR8 **PdbFileName
> + )
> +{
> + VOID *PdbPointer;
> + CHAR8 *Str;
> +
> + //
> + // Get PDB file name from PE/COFF image
> + //
> + PdbPointer = PeCoffLoaderGetPdbPointer ((VOID *)ImageBase);
> + if (PdbPointer == NULL) {
> + //
> + // No PDB file name found. Set it to an unknown file name.
> + //
> + *PdbFileName = (CHAR8 *)mUnknownPdbFileName;
> + if (PdbAbsoluteFilePath != NULL) {
> + *PdbAbsoluteFilePath = NULL;
> + }
> + } else {
> + //
> + // Get file name portion out of PDB file in PE/COFF image
> + //
> + Str = (CHAR8 *)((UINTN)PdbPointer +
> + AsciiStrLen ((CHAR8 *)PdbPointer) - sizeof *Str);
> + for (; *Str != '/' && *Str != '\\'; Str--) {
> + ;
> + }
> +
> + //
> + // Set PDB file name (also skip trailing path separator: '/' or '\\')
> + //
> + *PdbFileName = Str + 1;
> +
> + if (PdbAbsoluteFilePath != NULL) {
> + //
> + // Set absolute file path of PDB file
> + //
> + *PdbAbsoluteFilePath = PdbPointer;
> + }
> + }
> +}
> +
> +/**
> + Dump stack contents.
> +
> + @param[in] CurrentRsp Current stack pointer address.
> + @param[in] UnwoundStacksCount Count of unwound stack frames.
> +**/
> +STATIC
> +VOID
> +DumpStackContents (
> + IN UINT64 CurrentRsp,
> + IN INTN UnwoundStacksCount
> + )
> +{
> + //
> + // Check for proper stack pointer alignment
> + //
> + if (((UINTN)CurrentRsp & (CPU_STACK_ALIGNMENT - 1)) != 0) {
> + InternalPrintMessage ("!!!! Unaligned stack pointer. !!!!\n");
> + return;
> + }
> +
> + //
> + // Dump out stack contents
> + //
> + InternalPrintMessage ("\nStack dump:\n");
> + while (UnwoundStacksCount-- > 0) {
> + InternalPrintMessage (
> + "0x%016lx: %016lx %016lx\n",
> + CurrentRsp,
> + *(UINT64 *)CurrentRsp,
> + *(UINT64 *)((UINTN)CurrentRsp + 8)
> + );
> +
> + //
> + // Point to next stack
> + //
> + CurrentRsp += CPU_STACK_ALIGNMENT;
> + }
> +}
> +
> +/**
> + Dump all image module names from call stack.
> +
> + @param[in] SystemContext Pointer to EFI_SYSTEM_CONTEXT.
> +**/
> +STATIC
> +VOID
> +DumpImageModuleNames (
> + IN EFI_SYSTEM_CONTEXT SystemContext
> + )
> +{
> + EFI_STATUS Status;
> + UINT64 Rip;
> + UINTN ImageBase;
> + VOID *EntryPoint;
> + CHAR8 *PdbAbsoluteFilePath;
> + CHAR8 *PdbFileName;
> + UINT64 Rbp;
> + UINTN LastImageBase;
> +
> + //
> + // Set current RIP address
> + //
> + Rip = SystemContext.SystemContextX64->Rip;
> +
> + //
> + // Set current frame pointer address
> + //
> + Rbp = SystemContext.SystemContextX64->Rbp;
> +
> + //
> + // Check for proper frame pointer alignment
> + //
> + if (((UINTN)Rbp & (CPU_STACK_ALIGNMENT - 1)) != 0) {
> + InternalPrintMessage ("!!!! Unaligned frame pointer. !!!!\n");
> + return;
> + }
> +
> + //
> + // Get initial PE/COFF image base address from current RIP
> + //
> + ImageBase = PeCoffSearchImageBase (Rip);
> + if (ImageBase == 0) {
> + InternalPrintMessage ("!!!! Could not find image module names. !!!!");
> + return;
> + }
> +
> + //
> + // Set last PE/COFF image base address
> + //
> + LastImageBase = ImageBase;
> +
> + //
> + // Get initial PE/COFF image's entry point
> + //
> + Status = PeCoffLoaderGetEntryPoint ((VOID *)ImageBase, &EntryPoint);
> + if (EFI_ERROR (Status)) {
> + EntryPoint = NULL;
> + }
> +
> + //
> + // Get file name and absolute path of initial PDB file
> + //
> + GetPdbFileName (ImageBase, &PdbAbsoluteFilePath, &PdbFileName);
> +
> + //
> + // Print out initial image module name (if any)
> + //
> + if (PdbAbsoluteFilePath != NULL) {
> + InternalPrintMessage (
> + "\n%a (ImageBase=0x%016lx, EntryPoint=0x%016lx):\n",
> + PdbFileName,
> + ImageBase,
> + (UINTN)EntryPoint
> + );
> + InternalPrintMessage ("%a\n", PdbAbsoluteFilePath);
> + }
> +
> + //
> + // Walk through call stack and find next module names
> + //
> + for (;;) {
> + //
> + // Set RIP with return address from current stack frame
> + //
> + Rip = *(UINT64 *)((UINTN)Rbp + 8);
> +
> + //
> + // If RIP is zero, then stop unwinding the stack
> + //
> + if (Rip == 0) {
> + break;
> + }
> +
> + //
> + // Search for the respective PE/COFF image based on RIP
> + //
> + ImageBase = PeCoffSearchImageBase (Rip);
> + if (ImageBase == 0) {
> + //
> + // Stop stack trace
> + //
> + break;
> + }
> +
> + //
> + // If RIP points to another PE/COFF image, then find its respective
> PDB file
> + // name.
> + //
> + if (LastImageBase != ImageBase) {
> + //
> + // Get PE/COFF image's entry point
> + //
> + Status = PeCoffLoaderGetEntryPoint ((VOID *)ImageBase, &EntryPoint);
> + if (EFI_ERROR (Status)) {
> + EntryPoint = NULL;
> + }
> +
> + //
> + // Get file name and absolute path of PDB file
> + //
> + GetPdbFileName (ImageBase, &PdbAbsoluteFilePath, &PdbFileName);
> +
> + //
> + // Print out image module name (if any)
> + //
> + if (PdbAbsoluteFilePath != NULL) {
> + InternalPrintMessage (
> + "%a (ImageBase=0x%016lx, EntryPoint=0x%016lx):\n",
> + PdbFileName,
> + ImageBase,
> + (UINTN)EntryPoint
> + );
> + InternalPrintMessage ("%a\n", PdbAbsoluteFilePath);
> + }
> +
> + //
> + // Save last PE/COFF image base address
> + //
> + LastImageBase = ImageBase;
> + }
> +
> + //
> + // Unwind the stack
> + //
> + Rbp = *(UINT64 *)(UINTN)Rbp;
> + }
> +}
> +
> +/**
> + Dump stack trace.
> +
> + @param[in] SystemContext Pointer to EFI_SYSTEM_CONTEXT.
> + @param[out] UnwoundStacksCount Count of unwound stack frames.
> +**/
> +STATIC
> +VOID
> +DumpStackTrace (
> + IN EFI_SYSTEM_CONTEXT SystemContext,
> + OUT INTN *UnwoundStacksCount
> + )
> +{
> + UINT64 Rip;
> + UINT64 Rbp;
> + UINTN ImageBase;
> + CHAR8 *PdbFileName;
> +
> + //
> + // Set current RIP address
> + //
> + Rip = SystemContext.SystemContextX64->Rip;
> +
> + //
> + // Set current frame pointer address
> + //
> + Rbp = SystemContext.SystemContextX64->Rbp;
> +
> + //
> + // Get initial PE/COFF image base address from current RIP
> + //
> + ImageBase = PeCoffSearchImageBase (Rip);
> + if (ImageBase == 0) {
> + InternalPrintMessage ("!!!! Could not find backtrace information.
> !!!!");
> + return;
> + }
> +
> + //
> + // Get PDB file name from initial PE/COFF image
> + //
> + GetPdbFileName (ImageBase, NULL, &PdbFileName);
> +
> + //
> + // Initialize count of unwound stacks
> + //
> + *UnwoundStacksCount = 1;
> +
> + //
> + // Print out back trace
> + //
> + InternalPrintMessage ("\nCall trace:\n");
> +
> + for (;;) {
> + //
> + // Print stack frame in the following format:
> + //
> + // # <RIP> @ <ImageBase>+<RelOffset> (RBP) in [<ModuleName> | ????]
> + //
> + InternalPrintMessage (
> + "%d 0x%016lx @ 0x%016lx+0x%x (0x%016lx) in %a\n",
> + *UnwoundStacksCount - 1,
> + Rip,
> + ImageBase,
> + Rip - ImageBase - 1,
> + Rbp,
> + PdbFileName
> + );
> +
> + //
> + // Set RIP with return address from current stack frame
> + //
> + Rip = *(UINT64 *)((UINTN)Rbp + 8);
> +
> + //
> + // If RIP is zero, then stop unwinding the stack
> + //
> + if (Rip == 0) {
> + break;
> + }
> +
> + //
> + // Search for the respective PE/COFF image based on RIP
> + //
> + ImageBase = PeCoffSearchImageBase (Rip);
> + if (ImageBase == 0) {
> + //
> + // Stop stack trace
> + //
> + break;
> + }
> +
> + //
> + // Get PDB file name
> + //
> + GetPdbFileName (ImageBase, NULL, &PdbFileName);
> +
> + //
> + // Unwind the stack
> + //
> + Rbp = *(UINT64 *)(UINTN)Rbp;
> +
> + //
> + // Increment count of unwound stacks
> + //
> + (*UnwoundStacksCount)++;
> + }
> +}
> +
> /**
> Display CPU information.
>
> @@ -254,9 +610,25 @@ DumpImageAndCpuContent (
> IN EFI_SYSTEM_CONTEXT SystemContext
> )
> {
> + INTN UnwoundStacksCount;
> +
> + //
> + // Dump CPU context
> + //
> DumpCpuContext (ExceptionType, SystemContext);
> +
> + //
> + // Dump stack trace
> + //
> + DumpStackTrace (SystemContext, &UnwoundStacksCount);
> +
> + //
> + // Dump image module names
> + //
> + DumpImageModuleNames (SystemContext);
> +
> //
> - // Dump module image base and module entry point by RIP
> + // Dump stack contents
> //
> - DumpModuleImageInfo (SystemContext.SystemContextX64->Rip);
> + DumpStackContents (SystemContext.SystemContextX64->Rsp,
> UnwoundStacksCount);
> }
> --
> 2.14.3
>
> _______________________________________________
> edk2-devel mailing list
> edk2-devel@lists.01.org
> https://lists.01.org/mailman/listinfo/edk2-devel
>
> edk2-devel Info Page - 01.org
> <https://lists.01.org/mailman/listinfo/edk2-devel>
> lists.01.org
> Your email address: Your name (optional): You may enter a privacy
> password below. This provides only mild security, but should prevent
> others from messing ...
>
>
>
next prev parent reply other threads:[~2017-11-23 14:23 UTC|newest]
Thread overview: 82+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-11-14 12:47 [RFC 0/1] Stack trace support in X64 exception handling Paulo Alcantara
2017-11-14 12:47 ` [RFC 1/1] UefiCpuPkg/CpuExceptionHandlerLib/X64: Add stack trace support Paulo Alcantara
2017-11-14 14:01 ` Andrew Fish
2017-11-14 14:26 ` 答复: " Fan Jeff
2017-11-14 14:38 ` Andrew Fish
2017-11-14 15:30 ` Paulo Alcantara
2017-11-14 16:51 ` Brian J. Johnson
2017-12-29 3:48 ` [RFC v4 0/6] Stack trace support in X64 exception handling Paulo Alcantara
2017-12-29 4:39 ` [RFC v4 1/6] UefiCpuPkg/CpuExceptionHandlerLib/X64: Add stack trace support Paulo Alcantara
2018-01-03 8:53 ` 答复: " Fan Jeff
2018-01-03 14:51 ` Paulo Alcantara
2017-12-29 4:39 ` [RFC v4 2/6] UefiCpuPkg/CpuExceptionHandlerLib: Export GetPdbFileName() Paulo Alcantara
2017-12-29 4:39 ` [RFC v4 3/6] UefiCpuPkg/CpuExceptionHandlerLib/Ia32: Add stack trace support Paulo Alcantara
2017-12-29 4:39 ` [RFC v4 4/6] UefiCpuPkg/CpuExceptionHandlerLib: Add helper to valid memory addresses Paulo Alcantara
2018-01-03 8:42 ` 答复: " Fan Jeff
2018-01-03 14:45 ` Paulo Alcantara
2018-01-03 16:59 ` Brian J. Johnson
2018-01-04 13:03 ` Paulo Alcantara
2018-01-04 1:36 ` Yao, Jiewen
2018-01-04 1:58 ` Yao, Jiewen
2018-01-04 13:29 ` Paulo Alcantara
2018-01-04 14:35 ` Yao, Jiewen
2018-01-04 15:15 ` Paulo Alcantara
2018-01-04 13:18 ` Paulo Alcantara
2017-12-29 4:39 ` [RFC v4 5/6] UefiCpuPkg/CpuExceptionHandlerLib: Ensure valid frame/stack pointers Paulo Alcantara
2018-01-03 8:45 ` 答复: " Fan Jeff
2018-01-03 14:48 ` Paulo Alcantara
2018-01-04 1:07 ` Yao, Jiewen
2017-12-29 4:39 ` [RFC v4 6/6] UefiCpuPkg/CpuExceptionHandlerLib: Correctly print IP addresses Paulo Alcantara
2018-01-03 8:46 ` 答复: " Fan Jeff
2018-01-04 0:59 ` [RFC v4 0/6] Stack trace support in X64 exception handling Yao, Jiewen
2018-01-04 13:36 ` Paulo Alcantara
2018-01-15 0:23 ` [RFC v5 0/8] " Paulo Alcantara
2018-01-15 0:23 ` [RFC v5 1/8] UefiCpuPkg/CpuExceptionHandlerLib/X64: Add stack trace support Paulo Alcantara
2018-01-15 0:23 ` [RFC v5 2/8] UefiCpuPkg/CpuExceptionHandlerLib: Export GetPdbFileName() Paulo Alcantara
2018-01-15 0:23 ` [RFC v5 3/8] UefiCpuPkg/CpuExceptionHandlerLib/Ia32: Add stack trace support Paulo Alcantara
2018-01-15 0:23 ` [RFC v5 4/8] UefiCpuPkg/CpuExceptionHandlerLib: Add helper to validate memory addresses Paulo Alcantara
2018-01-15 0:23 ` [RFC v5 5/8] UefiCpuPkg/CpuExceptionHandlerLib: Ensure valid frame/stack pointers Paulo Alcantara
2018-01-15 0:23 ` [RFC v5 6/8] UefiCpuPkg/CpuExceptionHandlerLib: Correctly print IP addresses Paulo Alcantara
2018-01-15 0:23 ` [RFC v5 7/8] UefiCpuPkg/CpuExceptionHandlerLib: Validate memory address ranges Paulo Alcantara
2018-01-15 0:23 ` [RFC v5 8/8] UefiCpuPkg/CpuExceptionHandlerLib: Add early check in DumpStackContents Paulo Alcantara
2018-01-17 12:57 ` [RFC v5 0/8] Stack trace support in X64 exception handling Yao, Jiewen
2018-01-17 22:48 ` Yao, Jiewen
2018-01-19 0:09 ` Paulo Alcantara
2018-01-19 0:02 ` Paulo Alcantara
2018-01-19 0:15 ` Paulo Alcantara
2018-01-29 13:38 ` Paulo Alcantara
2018-01-31 5:56 ` Yao, Jiewen
2018-01-31 19:05 ` Paulo Alcantara
2017-11-14 13:21 ` [RFC 0/1] " Paulo Alcantara
2017-11-14 14:03 ` 答复: " Fan Jeff
2017-11-14 14:12 ` 答复: " Fan Jeff
2017-11-14 15:37 ` Paulo Alcantara
2017-11-14 16:33 ` Brian J. Johnson
2017-11-14 17:23 ` Andrew Fish
2017-11-14 17:41 ` Brian J. Johnson
2017-11-14 17:56 ` Paulo Alcantara
2017-11-15 13:21 ` 答复: 答复: " Fan Jeff
2017-11-15 14:41 ` Paulo Alcantara
2017-11-15 14:52 ` 答复: " Fan Jeff
2017-11-16 1:18 ` [RFC v2 0/3] " Paulo Alcantara
2017-11-16 1:18 ` [RFC v2 1/3] UefiCpuPkg/CpuExceptionHandlerLib/X64: Add stack trace support Paulo Alcantara
2017-11-16 1:57 ` Yao, Jiewen
2017-11-16 22:13 ` Paulo Alcantara
2017-11-17 3:43 ` Yao, Jiewen
2017-11-20 14:51 ` Paulo Alcantara
2017-11-16 15:43 ` Brian J. Johnson
2017-11-16 22:19 ` Paulo Alcantara
2017-11-16 1:18 ` [RFC v2 2/3] UefiCpuPkg/CpuExceptionHandlerLib: Export GetPdbFileName() Paulo Alcantara
2017-11-16 1:18 ` [RFC v2 3/3] UefiCpuPkg/CpuExceptionHandlerLib/Ia32: Add stack trace support Paulo Alcantara
2017-11-16 1:46 ` [RFC v2 0/3] Stack trace support in X64 exception handling Paulo Alcantara
2017-11-16 5:01 ` Andrew Fish
2017-11-16 22:02 ` Paulo Alcantara
2017-11-16 21:56 ` [RFC v3 " Paulo Alcantara
2017-11-16 21:56 ` [RFC v3 1/3] UefiCpuPkg/CpuExceptionHandlerLib/X64: Add stack trace support Paulo Alcantara
2017-11-17 7:24 ` 答复: " Fan Jeff
2017-11-20 14:59 ` Paulo Alcantara
2017-11-23 14:27 ` Fan Jeff [this message]
2017-11-23 18:34 ` Andrew Fish
2017-11-23 19:49 ` Fan Jeff
2017-11-16 21:56 ` [RFC v3 2/3] UefiCpuPkg/CpuExceptionHandlerLib: Export GetPdbFileName() Paulo Alcantara
2017-11-16 21:56 ` [RFC v3 3/3] UefiCpuPkg/CpuExceptionHandlerLib/Ia32: Add stack trace support Paulo Alcantara
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=CO2PR19MB01379AAEC6501A6DA01AFED9D7210@CO2PR19MB0137.namprd19.prod.outlook.com \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox