ArmPlatformPkg/Ds5: Added Aarch64 support
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Harry Liebel <Harry.Liebel@arm.com> Signed-off-by: Olivier Martin <olivier.martin@arm.com> git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@14491 6f19259b-4bc3-4df7-8a09-765794883524
This commit is contained in:
committed by
oliviermartin
parent
27be3601d2
commit
e3d495e1b9
@ -27,6 +27,7 @@ class DebugInfoTable:
|
||||
self.base = debug_info_table_header_offset
|
||||
|
||||
def get_debug_info(self):
|
||||
# Get the information from EFI_DEBUG_IMAGE_INFO_TABLE_HEADER
|
||||
count = self.ec.getMemoryService().readMemory32(self.base + 0x4)
|
||||
debug_info_table_base = self.ec.getMemoryService().readMemory32(self.base + 0x8)
|
||||
|
||||
@ -34,16 +35,27 @@ class DebugInfoTable:
|
||||
|
||||
for i in range(0, count):
|
||||
# Get the address of the structure EFI_DEBUG_IMAGE_INFO
|
||||
debug_info = self.ec.getMemoryService().readMemory32(debug_info_table_base + (i * 4))
|
||||
if edk2_debugger.is_aarch64(self.ec):
|
||||
debug_info = self.ec.getMemoryService().readMemory32(debug_info_table_base + (i * 8))
|
||||
else:
|
||||
debug_info = self.ec.getMemoryService().readMemory32(debug_info_table_base + (i * 4))
|
||||
|
||||
if debug_info:
|
||||
debug_info_type = self.ec.getMemoryService().readMemory32(debug_info)
|
||||
# Normal Debug Info Type
|
||||
if debug_info_type == 1:
|
||||
# Get the base address of the structure EFI_LOADED_IMAGE_PROTOCOL
|
||||
loaded_image_protocol = self.ec.getMemoryService().readMemory32(debug_info + 0x4)
|
||||
|
||||
image_base = self.ec.getMemoryService().readMemory32(loaded_image_protocol + 0x20)
|
||||
image_size = self.ec.getMemoryService().readMemory32(loaded_image_protocol + 0x28)
|
||||
if edk2_debugger.is_aarch64(self.ec):
|
||||
# Get the base address of the structure EFI_LOADED_IMAGE_PROTOCOL
|
||||
loaded_image_protocol = self.ec.getMemoryService().readMemory32(debug_info + 0x8)
|
||||
|
||||
image_base = self.ec.getMemoryService().readMemory32(loaded_image_protocol + 0x40)
|
||||
image_size = self.ec.getMemoryService().readMemory32(loaded_image_protocol + 0x48)
|
||||
else:
|
||||
# Get the base address of the structure EFI_LOADED_IMAGE_PROTOCOL
|
||||
loaded_image_protocol = self.ec.getMemoryService().readMemory32(debug_info + 0x4)
|
||||
|
||||
image_base = self.ec.getMemoryService().readMemory32(loaded_image_protocol + 0x20)
|
||||
image_size = self.ec.getMemoryService().readMemory32(loaded_image_protocol + 0x28)
|
||||
|
||||
self.DebugInfos.append((image_base,image_size))
|
||||
|
||||
@ -55,14 +67,16 @@ class DebugInfoTable:
|
||||
found = False
|
||||
for debug_info in self.DebugInfos:
|
||||
if (addr >= debug_info[0]) and (addr < debug_info[0] + debug_info[1]):
|
||||
section = firmware_volume.EfiSectionPE32(self.ec, debug_info[0])
|
||||
if edk2_debugger.is_aarch64(self.ec):
|
||||
section = firmware_volume.EfiSectionPE64(self.ec, debug_info[0])
|
||||
else:
|
||||
section = firmware_volume.EfiSectionPE32(self.ec, debug_info[0])
|
||||
|
||||
try:
|
||||
edk2_debugger.load_symbol_from_file(self.ec, section.get_debug_filepath(), section.get_debug_elfbase(), verbose)
|
||||
except Exception, (ErrorClass, ErrorMessage):
|
||||
if verbose:
|
||||
print "Error while loading a symbol file (%s: %s)" % (ErrorClass, ErrorMessage)
|
||||
pass
|
||||
|
||||
found = True
|
||||
return debug_info
|
||||
@ -75,20 +89,25 @@ class DebugInfoTable:
|
||||
self.get_debug_info()
|
||||
|
||||
for debug_info in self.DebugInfos:
|
||||
section = firmware_volume.EfiSectionPE32(self.ec, debug_info[0])
|
||||
|
||||
if edk2_debugger.is_aarch64(self.ec):
|
||||
section = firmware_volume.EfiSectionPE64(self.ec, debug_info[0])
|
||||
else:
|
||||
section = firmware_volume.EfiSectionPE32(self.ec, debug_info[0])
|
||||
|
||||
try:
|
||||
edk2_debugger.load_symbol_from_file(self.ec, section.get_debug_filepath(), section.get_debug_elfbase(), verbose)
|
||||
except Exception, (ErrorClass, ErrorMessage):
|
||||
if verbose:
|
||||
print "Error while loading a symbol file (%s: %s)" % (ErrorClass, ErrorMessage)
|
||||
pass
|
||||
|
||||
def dump(self):
|
||||
self.get_debug_info()
|
||||
for debug_info in self.DebugInfos:
|
||||
base_pe32 = debug_info[0]
|
||||
section = firmware_volume.EfiSectionPE32(self.ec, base_pe32)
|
||||
if edk2_debugger.is_aarch64(self.ec):
|
||||
section = firmware_volume.EfiSectionPE64(self.ec, base_pe32)
|
||||
else:
|
||||
section = firmware_volume.EfiSectionPE32(self.ec, base_pe32)
|
||||
print section.get_debug_filepath()
|
||||
|
||||
class SystemTable:
|
||||
@ -124,14 +143,24 @@ class SystemTable:
|
||||
raise Exception('SystemTable','System Table not found in System Memory [0x%x;0x%X]' % (membase,membase+memsize))
|
||||
|
||||
def get_configuration_table(self, conf_table_guid):
|
||||
# Number of configuration Table entry
|
||||
conf_table_entry_count = self.ec.getMemoryService().readMemory32(self.system_table_base + 0x40)
|
||||
|
||||
# Get location of the Configuration Table entries
|
||||
conf_table_offset = self.ec.getMemoryService().readMemory32(self.system_table_base + 0x44)
|
||||
if edk2_debugger.is_aarch64(self.ec):
|
||||
# Number of configuration Table entry
|
||||
conf_table_entry_count = self.ec.getMemoryService().readMemory32(self.system_table_base + 0x68)
|
||||
|
||||
# Get location of the Configuration Table entries
|
||||
conf_table_offset = self.ec.getMemoryService().readMemory32(self.system_table_base + 0x70)
|
||||
else:
|
||||
# Number of configuration Table entry
|
||||
conf_table_entry_count = self.ec.getMemoryService().readMemory32(self.system_table_base + 0x40)
|
||||
|
||||
# Get location of the Configuration Table entries
|
||||
conf_table_offset = self.ec.getMemoryService().readMemory32(self.system_table_base + 0x44)
|
||||
|
||||
for i in range(0, conf_table_entry_count):
|
||||
offset = conf_table_offset + (i * 0x14)
|
||||
if edk2_debugger.is_aarch64(self.ec):
|
||||
offset = conf_table_offset + (i * 0x18)
|
||||
else:
|
||||
offset = conf_table_offset + (i * 0x14)
|
||||
guid = struct.unpack("<IIII", self.ec.getMemoryService().read(str(offset), 16, 32))
|
||||
if guid == conf_table_guid:
|
||||
return self.ec.getMemoryService().readMemory32(offset + 0x10)
|
||||
|
Reference in New Issue
Block a user