From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from ma1-aaemail-dr-lapp02.apple.com (ma1-aaemail-dr-lapp02.apple.com [17.171.2.68]) by mx.groups.io with SMTP id smtpd.web11.359.1604347530553750429 for ; Mon, 02 Nov 2020 12:05:30 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@apple.com header.s=20180706 header.b=Pl+LSOQ8; spf=pass (domain: apple.com, ip: 17.171.2.68, mailfrom: afish@apple.com) Received: from pps.filterd (ma1-aaemail-dr-lapp02.apple.com [127.0.0.1]) by ma1-aaemail-dr-lapp02.apple.com (8.16.0.42/8.16.0.42) with SMTP id 0A2K4HIC036185 for ; Mon, 2 Nov 2020 12:05:29 -0800 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=from : content-type : mime-version : subject : message-id : date : to; s=20180706; bh=JZeDJpp+w/Rz4HjiZKm4JZW82qhkqwnFEiCKiAV8MD8=; b=Pl+LSOQ8WhW/qJ15OYFi6NF1aRr/njQykPbGMipN/8aMNT+94Y/mGeOhi7vyiWEq6AAu vot9ye8QgWGl3sjqQ2AcR5E8PwShPGCINbfYRgAmSWWpH7MUPBplw5KORjSA98LATFnV k20HKSccJ++zf1sQjIox6Dk+bUYM0kfmCBrfLZ74dUzSDX6MJk1ldH+ezNouvRt8ThLl kSxa6jpKZ2d1MNjKukvJQKwW28PqYPIOeL0wxgFmI+iwUwELXhAoXj/vu7Cp+weXDMii DgEx0RHJkUzPMSCjYnA7OVocPHSCibJQkB6M4Fn0AS3e+VrthSQCYm3aJ4eeELlRO9gs Mg== Received: from rn-mailsvcp-mta-lapp01.rno.apple.com (rn-mailsvcp-mta-lapp01.rno.apple.com [10.225.203.149]) by ma1-aaemail-dr-lapp02.apple.com with ESMTP id 34h4ksvfxj-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO) for ; Mon, 02 Nov 2020 12:05:29 -0800 Received: from rn-mailsvcp-mmp-lapp04.rno.apple.com (rn-mailsvcp-mmp-lapp04.rno.apple.com [17.179.253.17]) by rn-mailsvcp-mta-lapp01.rno.apple.com (Oracle Communications Messaging Server 8.1.0.6.20200729 64bit (built Jul 29 2020)) with ESMTPS id <0QJ600RXCQH4JLK0@rn-mailsvcp-mta-lapp01.rno.apple.com> for devel@edk2.groups.io; Mon, 02 Nov 2020 12:05:29 -0800 (PST) Received: from process_milters-daemon.rn-mailsvcp-mmp-lapp04.rno.apple.com by rn-mailsvcp-mmp-lapp04.rno.apple.com (Oracle Communications Messaging Server 8.1.0.6.20200729 64bit (built Jul 29 2020)) id <0QJ600800QBD6400@rn-mailsvcp-mmp-lapp04.rno.apple.com> for devel@edk2.groups.io; Mon, 02 Nov 2020 12:05:29 -0800 (PST) X-Va-A: X-Va-T-CD: 5975dd1eaec8696b379f33739df9e0a8 X-Va-E-CD: 3c51537f23ae2f08c056e5b6508c3a32 X-Va-R-CD: f64c5527f3ab2e1d9b86ceadb9afa4fd X-Va-CD: 0 X-Va-ID: 795db082-cf14-441a-aa62-076d5d1c43c4 X-V-A: X-V-T-CD: 5975dd1eaec8696b379f33739df9e0a8 X-V-E-CD: 3c51537f23ae2f08c056e5b6508c3a32 X-V-R-CD: f64c5527f3ab2e1d9b86ceadb9afa4fd X-V-CD: 0 X-V-ID: 9eeee454-5f64-4aee-bc8b-8ae94269f0d1 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.312,18.0.737 definitions=2020-11-02_13:2020-11-02,2020-11-02 signatures=0 Received: from [17.235.30.8] (unknown [17.235.30.8]) by rn-mailsvcp-mmp-lapp04.rno.apple.com (Oracle Communications Messaging Server 8.1.0.6.20200729 64bit (built Jul 29 2020)) with ESMTPSA id <0QJ600H0UQH3GF00@rn-mailsvcp-mmp-lapp04.rno.apple.com> for devel@edk2.groups.io; Mon, 02 Nov 2020 12:05:29 -0800 (PST) From: "Andrew Fish" MIME-version: 1.0 (Mac OS X Mail 14.0 \(3654.20.0.2.1\)) Subject: Turning on frame pointers Message-id: Date: Mon, 02 Nov 2020 12:05:27 -0800 To: edk2-devel-groups-io X-Mailer: Apple Mail (2.3654.20.0.2.1) X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.312,18.0.737 definitions=2020-11-02_13:2020-11-02,2020-11-02 signatures=0 Content-type: multipart/alternative; boundary="Apple-Mail=_10897FCB-1E66-450C-A8C9-E3FA25BA35A4" --Apple-Mail=_10897FCB-1E66-450C-A8C9-E3FA25BA35A4 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 I just noticed a BZ [1] that requested the VS2019 turn on frame = pointers. I happen to work a lot on a toolchain, Xcode, that has frame = pointers enabled. So I=E2=80=99d figured I=E2=80=99d ask to see how = interested folks are in this feature? I=E2=80=99d like to point out it is just not a makes working with the = debugger better kind of feature as it is useful to print out stack = frames on ASSERT and exceptions.=20 For x86 you generally unwind the stack until you hit a zero. It is = probably also a good idea for stack walker to skip guard pages, and = non-canonical addresses so there is probably some set of PCDs that would = useful in this regards.=20 [1] https://bugzilla.tianocore.org/show_bug.cgi?id=3D3043 = Thanks, Andrew Fish= --Apple-Mail=_10897FCB-1E66-450C-A8C9-E3FA25BA35A4 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8
I just noticed a BZ [1] that requested the VS2019 turn on = frame pointers. I happen to work a lot on a toolchain, Xcode, that has = frame pointers enabled. So I=E2=80=99d figured I=E2=80=99d ask to see = how interested folks are in this feature?

I=E2=80=99d like to point out it is = just not a makes working with the debugger better kind of feature as it = is useful to print out stack frames on ASSERT and = exceptions. 

For x86 you generally unwind the stack until you hit a zero. = It is probably also a good idea for stack walker to skip guard pages, = and non-canonical addresses so there is probably some set of PCDs that = would useful in this regards. 

=

Thanks,

Andrew = Fish
= --Apple-Mail=_10897FCB-1E66-450C-A8C9-E3FA25BA35A4--