From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from out4-smtp.messagingengine.com (out4-smtp.messagingengine.com [66.111.4.28]) by mx.groups.io with SMTP id smtpd.web12.24375.1649639842668697714 for ; Sun, 10 Apr 2022 18:17:22 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@bsdio.com header.s=fm2 header.b=m9w12OBR; spf=pass (domain: bsdio.com, ip: 66.111.4.28, mailfrom: rebecca@bsdio.com) Received: from compute2.internal (compute2.nyi.internal [10.202.2.46]) by mailout.nyi.internal (Postfix) with ESMTP id 037F55C013A; Sun, 10 Apr 2022 21:17:22 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute2.internal (MEProxy); Sun, 10 Apr 2022 21:17:22 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdio.com; h=cc :cc:content-transfer-encoding:date:date:from:from:in-reply-to :in-reply-to:message-id:mime-version:references:reply-to:sender :subject:subject:to:to; s=fm2; bh=eLYO5dMlOR8r9tNMAhors09AjS/C6P hdOco1S6loVGg=; b=m9w12OBRdv38Dq72h5P6eNiEuulxdWO+4l5r9o4VgB61Sc D3u8DwTPyV3QlHJkpxoWQXHtNPO731ncjWzdmRRCqWL+eKCsb4y/uNCSztaCibN+ 5IqNSZGbGsKwJebBa0jBD19PxH7KviBtlZArrvlphXjP5XHGVpKTl1SpT0I5+42a xVlv+g9gxGNDUK/Dfl/RQ/o39As7LJxHzXP5LunFQz+6F/C2rMKR4hHg26UPmzol UFEdf8Ioa1biOcIR49RaKOQf1/jN4iA7jZ66mt93DI4XtGLsUfSrldGiXT9f/boe TMauTBUdQ2efYxYGMGFall4VM7768SvVWCVJuhDA== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-transfer-encoding:date:date :from:from:in-reply-to:in-reply-to:message-id:mime-version :references:reply-to:sender:subject:subject:to:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=eLYO5d MlOR8r9tNMAhors09AjS/C6PhdOco1S6loVGg=; b=OZ+O0pIBi/SoYsNCgwgHJN ycUdzuh9Exv24iWCx53I2AzVz9nGAnjiBCs1WTpJh1KrHR6yzjkwjUYCFMUOSzvG Zvvzqn2d+Bq5vF50sTgEbp4hj+xz8Q14EwNMXiSboIgh/GzdFkh9dRPVv51ltHBi VFg4M04culCJ2HvhXz6n4LnZzOr085pwDzlK8dd4iFgqlQp0yiOrvUDtejGHyJN/ cRrV/vULMtqPrVX7X1sTbAD0EO/sgHjf+T2LILyyujpc2o/5WH79FZ6L72qfIQDT XvBb2SgXl1qjWjTfuGxcQHn7KMX/fGc3CkYp9ptqg86jkDOClnRbWNK7ZeUf7Deg == X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudekhedgfeelucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpefhvffufffkofgjfhgggfestdekre dtredttdenucfhrhhomheptfgvsggvtggtrgcuvehrrghnuceorhgvsggvtggtrgessghs ughiohdrtghomheqnecuggftrfgrthhtvghrnhepveeiffeivdevudetueehiedthedthe fhtdehfeelkeeitdfhhfefleetieehgfevnecuvehluhhsthgvrhfuihiivgeptdenucfr rghrrghmpehmrghilhhfrhhomheprhgvsggvtggtrgessghsughiohdrtghomh X-ME-Proxy: Received: by mail.messagingengine.com (Postfix) with ESMTPA; Sun, 10 Apr 2022 21:17:21 -0400 (EDT) From: "Rebecca Cran" To: devel@edk2.groups.io Cc: Rebecca Cran , Leif Lindholm , Ard Biesheuvel Subject: [PATCH 2/3] ArmPlatformPkg: Fix target initialisation in cmd_load_symbols.py Date: Sun, 10 Apr 2022 19:16:58 -0600 Message-Id: <20220411011659.191390-3-rebecca@bsdio.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220411011659.191390-1-rebecca@bsdio.com> References: <20220411011659.191390-1-rebecca@bsdio.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit The debugger in Arm Development Studio 2021.2 doesn't work with "ec = debugger.getExecutionContext(0)" because it's subsequently unable to access memory. Fix it by switching to "ec = debugger.getCurrentExecutionContext()". The documentation for waitForStop() says: "It is not needed after a call to stop() because stop() is blocking." So, remove the call to waitForStop. Signed-off-by: Rebecca Cran --- ArmPlatformPkg/Scripts/Ds5/cmd_load_symbols.py | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/ArmPlatformPkg/Scripts/Ds5/cmd_load_symbols.py b/ArmPlatformPkg/Scripts/Ds5/cmd_load_symbols.py index 89d2f28ba27d..cb4db148dedf 100644 --- a/ArmPlatformPkg/Scripts/Ds5/cmd_load_symbols.py +++ b/ArmPlatformPkg/Scripts/Ds5/cmd_load_symbols.py @@ -85,11 +85,10 @@ else: debugger = Debugger() # Initialisation commands -ec = debugger.getExecutionContext(0) +ec = debugger.getCurrentExecutionContext() ec.getExecutionService().stop() -ec.getExecutionService().waitForStop() # in case the execution context reference is out of date -ec = debugger.getExecutionContext(0) +ec = debugger.getCurrentExecutionContext() try: armplatform_debugger = edk2_debugger.ArmPlatformDebugger(ec, report_file, regions, verbose) -- 2.25.1