Hi Andrei,
On using your script I get the following error!!The DebugPkg is taken
from your blog.
Traceback (most recent call last):
File "/<workroot>/edk2/DebugPkg/Scripts/gdb_uefi.py", line 338, in invoke
est = self.search_est ()
File "/<workroot>/edk2/DebugPkg/Scripts/gdb_uefi.py", line 118, in search_est
if estp['Signature'] == self.EST_SIGNATURE:
gdb.MemoryError: Cannot access memory at address 0x0
Error occurred in Python command: Cannot access memory at address 0x0
Thanks and Regards
Satheesh.B.R
-----Original Message-----
From: Andrei E. Warkentin [mailto:[email protected]]
Sent: Sun 7/22/2012 6:05 AM
To: [email protected]
Cc: Satheesh B R
Subject: Re: [edk2] Reg : : GDB for ARM
2012/7/20 Andrew Fish <[email protected]>:
Note you need to add-symbol-file for every module to get
> full source level debug.
>
You may try the following script to simplify reloading symbols -
https://github.com/andreiw/andreiw-wip/blob/master/uefi/DebugPkg/Scripts/gdb_uefi.py
A
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
edk2-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/edk2-devel