Hi Andrei,

         On using your script I get the following error!!The DebugPkg is taken 
from your blog.

Traceback (most recent call last):
  File "/<workroot>/edk2/DebugPkg/Scripts/gdb_uefi.py", line 338, in invoke
    est = self.search_est ()
  File "/<workroot>/edk2/DebugPkg/Scripts/gdb_uefi.py", line 118, in search_est
    if estp['Signature'] == self.EST_SIGNATURE:   
gdb.MemoryError: Cannot access memory at address 0x0
Error occurred in Python command: Cannot access memory at address 0x0

Thanks and Regards
Satheesh.B.R      



-----Original Message-----
From: Andrei E. Warkentin [mailto:[email protected]]
Sent: Sun 7/22/2012 6:05 AM
To: [email protected]
Cc: Satheesh B R
Subject: Re: [edk2] Reg : : GDB for ARM
 
2012/7/20 Andrew Fish <[email protected]>:
Note you need to add-symbol-file for every module to get
> full source level debug.
>

You may try the following script to simplify reloading symbols -

https://github.com/andreiw/andreiw-wip/blob/master/uefi/DebugPkg/Scripts/gdb_uefi.py

A

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
edk2-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/edk2-devel

Reply via email to