These scripts are used for UEFI Source debugging with Lauterbach T32. They can be used at different stages of the UEFI boot time. A README.txt file explains how to use these scripts. git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@11599 6f19259b-4bc3-4df7-8a09-765794883524
		
			
				
	
	
		
			71 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			Plaintext
		
	
	
		
			Executable File
		
	
	
	
	
			
		
		
	
	
			71 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			Plaintext
		
	
	
		
			Executable File
		
	
	
	
	
| ;
 | |
| ; Copyright (c) 2011, Hewlett-Packard Company. All rights reserved.<BR>
 | |
| ; 
 | |
| ; This program and the accompanying materials                          
 | |
| ; are licensed and made available under the terms and conditions of the BSD License         
 | |
| ; which accompanies this distribution.  The full text of the license may be found at        
 | |
| ; http://opensource.org/licenses/bsd-license.php                                            
 | |
| ; 
 | |
| ; THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,                     
 | |
| ; WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.             
 | |
| ; 
 | |
| 
 | |
|   LOCAL &imgstart &strippedsize &debugdirentryrva &debugtype &debugrva &dwarfsig &elfbase &elfpath &pathoffset
 | |
|   ENTRY &imgstart
 | |
|   
 | |
|   &imgstart=&imgstart
 | |
|   print "TE image found at &imgstart"
 | |
| 
 | |
|   ; determine pe header bytes removed to account for in rva references
 | |
|   &strippedsize=(Data.Long(a:&imgstart+0x4)&0xffff0000)>>16.
 | |
|   &strippedsize=&strippedsize-0x28
 | |
| 
 | |
|   &debugdirentryrva=Data.Long(a:&imgstart+0x20)
 | |
|   if &debugdirentryrva==0
 | |
|   (
 | |
|     print "no debug dir for image at &imgstart"
 | |
|     enddo
 | |
|   )
 | |
|   &debugdirentryrva=&debugdirentryrva-&strippedsize
 | |
| 
 | |
|   &debugtype=Data.Long(a:&imgstart+&debugdirentryrva+0xc)
 | |
|   if (&debugtype!=0xdf)&&(&debugtype!=0x02)
 | |
|   (
 | |
|     print "debug type is not dwarf for image at &imgstart, it's &debugtype"
 | |
|     enddo
 | |
|   )
 | |
|   
 | |
|   &debugrva=Data.Long(a:&imgstart+&debugdirentryrva+0x14)
 | |
|   &debugrva=&debugrva-&strippedsize;
 | |
|   &dwarfsig=Data.Long(a:&imgstart+&debugrva);
 | |
|   if &dwarfsig==0x66727764
 | |
|   (
 | |
|     &pathoffset=0xc
 | |
|   )
 | |
|   else
 | |
|   (
 | |
|     if &dwarfsig==0x3031424E
 | |
|     (
 | |
|       &pathoffset=0x10
 | |
|     )
 | |
|     else
 | |
|     (
 | |
|       print "debug signature not found for image at &imgstart, its &dwarfsig"
 | |
|       enddo
 | |
|     )
 | |
|   )
 | |
| 
 | |
|   &elfpath=Data.String(c:&imgstart+&debugrva+&pathoffset)
 | |
| 
 | |
|   ; elf base is baseofcode (we hope that for TE images it's not baseofdata)
 | |
|   &elfbase=&imgstart+Data.Long(a:&imgstart+0xc)-&strippedsize
 | |
| 
 | |
|   print "found path &elfpath"
 | |
|   ; $fprintf 50, "load /ni /np /a %s &0x%x\n",elfpath,elfbase$;
 | |
|          ON ERROR GOSUB
 | |
|               return
 | |
|   data.load.elf &elfpath &elfbase /NOCODE /NOCLEAR
 | |
|         ON error
 | |
| 
 | |
| enddo
 |