Thanks for your response.
I've downloaded and extracted Kernel_Debug_Kit_15.4_build_24E248.dmg.
Here's what I've tried so far to sybolicate the sample kernel panic log.
Note: the kernel passed in to the -o flag of atos(1) is the one that is found in kernel.release.t8112.dSYM/Contents/Resources/DWARF/kernel.release.t8112.
The load address computed as the kernel base addresses given in the kernel panic log minus the corresponding slide
atos -o kernel.release.t8112 -arch arm64e -l FFFFFE0007004000 0xfffffe001cde8ab8 0xfffffe001cf44894 0xfffffe001cf42a90 0xfffffe001cd938c0 0xfffffe001cde83b0 0xfffffe001d66d670 0xfffffe001d86a708 0xfffffe001d86941c 0xfffffe001d866504 0xfffffe001e234bc8 0xfffffe001cf4611c 0xfffffe001cd93938 0xfffffe001cee0a80 0xfffffe001cee0a80 0xfffffe001d38e408 0xfffffe001d3e9304 0xfffffe001ce8c24c 0xfffffe001cedf514 0xfffffe001cd9cc04
No output generated
The value of Kernel slide given in the kernel panic log passed to the -s flag
atos -o kernel.release.t8112 -arch arm64e -s 0000000014610000 0xfffffe001cde8ab8 0xfffffe001cf44894 0xfffffe001cf42a90 0xfffffe001cd938c0 0xfffffe001cde83b0 0xfffffe001d66d670 0xfffffe001d86a708 0xfffffe001d86941c 0xfffffe001d866504 0xfffffe001e234bc8 0xfffffe001cf4611c 0xfffffe001cd93938 0xfffffe001cee0a80 0xfffffe001cee0a80 0xfffffe001d38e408 0xfffffe001d3e9304 0xfffffe001ce8c24c 0xfffffe001cedf514 0xfffffe001cd9cc04
No output generated
The value of KernelCache slide given in the kernel panic log passed to the -s flag
atos -o kernel.release.t8112 -arch arm64e -s 0000000014608000 0xfffffe001cde8ab8 0xfffffe001cf44894 0xfffffe001cf42a90 0xfffffe001cd938c0 0xfffffe001cde83b0 0xfffffe001d66d670 0xfffffe001d86a708 0xfffffe001d86941c 0xfffffe001d866504 0xfffffe001e234bc8 0xfffffe001cf4611c 0xfffffe001cd93938 0xfffffe001cee0a80 0xfffffe001cee0a80 0xfffffe001d38e408 0xfffffe001d3e9304 0xfffffe001ce8c24c 0xfffffe001cedf514 0xfffffe001cd9cc04
No output generated
The value of Kernel text exec slide given in the kernel panic log passed to the -s flag
atos -o kernel.release.t8112 -arch arm64e -s 0000000015D88000 0xfffffe001cde8ab8 0xfffffe001cf44894 0xfffffe001cf42a90 0xfffffe001cd938c0 0xfffffe001cde83b0 0xfffffe001d66d670 0xfffffe001d86a708 0xfffffe001d86941c 0xfffffe001d866504 0xfffffe001e234bc8 0xfffffe001cf4611c 0xfffffe001cd93938 0xfffffe001cee0a80 0xfffffe001cee0a80 0xfffffe001d38e408 0xfffffe001d3e9304 0xfffffe001ce8c24c 0xfffffe001cedf514 0xfffffe001cd9cc04
Output: Looks bogus
__doprnt.digits (in kernel.release.t8112) + 103398
bootstrap_pagetables (in kernel.release.t8112) + 329876
bootstrap_pagetables (in kernel.release.t8112) + 322192
table_10bits (in kernel.release.t8112) + 10400
__doprnt.digits (in kernel.release.t8112) + 101598
recvmsg_x (in kernel.release.t8112) + 332
IOMachPort::noMoreSendersForObject(OSObject*, unsigned int, unsigned int*) (in kernel.release.t8112) + 440
IOUserClient::init(OSDictionary*) (in kernel.release.t8112) + 0
IOServiceMessageUserNotification::MetaClass::~MetaClass() (in kernel.release.t8112) + 528
bootstrap_pagetables (in kernel.release.t8112) + 336156
table_10bits (in kernel.release.t8112) + 10520
ropagetable_end (in kernel.release.t8112) + 2688
ropagetable_end (in kernel.release.t8112) + 2688
ipsec_cleanup_family (in kernel.release.t8112) + 920
pf_test (in kernel.release.t8112) + 3700
ropagetable_begin (in kernel.release.t8112) + 324884
nfU16InvMasks (in kernel.release.t8112) + 112
Can you please instruct me how to symbolicate my sample kernel panic log properly.
Topic:
App & System Services
SubTopic:
Core OS
Tags: