From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from wout2-smtp.messagingengine.com (wout2-smtp.messagingengine.com [64.147.123.25]) by mx.groups.io with SMTP id smtpd.web12.286.1649698746750306321 for ; Mon, 11 Apr 2022 10:39:07 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@bsdio.com header.s=fm2 header.b=N5mosuXY; spf=pass (domain: bsdio.com, ip: 64.147.123.25, mailfrom: rebecca@bsdio.com) Received: from compute4.internal (compute4.nyi.internal [10.202.2.44]) by mailout.west.internal (Postfix) with ESMTP id 26B0532020C9; Mon, 11 Apr 2022 13:39:03 -0400 (EDT) Received: from mailfrontend2 ([10.202.2.163]) by compute4.internal (MEProxy); Mon, 11 Apr 2022 13:39:03 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdio.com; h=cc :cc:content-transfer-encoding:content-type:date:date:from:from :in-reply-to:in-reply-to:message-id:mime-version:references :reply-to:sender:subject:subject:to:to; s=fm2; t=1649698742; x= 1649785142; bh=vPmXecMRXLmAGeQrQVBLq17043ygCc2vgIXzVprzl6A=; b=N 5mosuXYfIRpjAEGCnKACg/A+27+K/d6Iomvygd9mBJa33ADFqLu3O824U/Tle7Bl v/VttdW3DS0DPL+3udtuGX7xG3rQIe/gGJIsThlbt7+yRy8BHKO8UDX+KjfIn12J ZvRd4XfebIdEMo7ayErSvOz20PHkSJ5tkeQXhmoYU4R+KSoLjGpfp6BsgETTBIvt BICd6pou8O6NObzWss5yWtn8Bl3XWMRztTNzalhBkoZ/44pbc/daPMqamM78WFrx Rva8d/d2ZajU9oKzQeDwGyCgwopXABgGkSHa0ZdWN3KWuj2wE5IFoLzVDfFtINh/ By34rpJahJ6KW+Gjwnkbw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-transfer-encoding :content-type:date:date:from:from:in-reply-to:in-reply-to :message-id:mime-version:references:reply-to:sender:subject :subject:to:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender :x-sasl-enc; s=fm3; t=1649698742; x=1649785142; bh=vPmXecMRXLmAG eQrQVBLq17043ygCc2vgIXzVprzl6A=; b=bNpACZva3u1iBKQyon0p5pyvqOjZd 6jvFBIH5Lcp+yhZQKKPvH4dPANWSDc3B4lmF4aLjsLQaUAuT0fDARDxCzS3zFM6B lM79ngM1YxKVTfGGfQSJNxwkYGVL7ymSkpqqn4hPNWBNJbBLP7uHTa1P5t4Fis9c YRX1mdjOxMIp6AJfuMuOsvgo0rb5DrvMmeH0UfFZgzcgw2NANM9GSWkBG0qGj2H0 0jL/xNq1iYbJuLondbjJhN9O7XMLxahPbCLOhWqyKQ1caHATANCcv57h69C0b2Wd p3W7d5R+1Dad4tP3Iv5BSyVtb9kXJT1H2SOa5d9ixtrenhDw6aQlo4tog== X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudekiedgudduiecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecunecujfgurhepkfffgggfuffvfhfhjggtgfesth ejredttdefjeenucfhrhhomheptfgvsggvtggtrgcuvehrrghnuceorhgvsggvtggtrges sghsughiohdrtghomheqnecuggftrfgrthhtvghrnhepleduvedtledtvedvuedugeeuud eiiedtueduvdffueekfeejffduvdetjeevffdvnecuvehluhhsthgvrhfuihiivgeptden ucfrrghrrghmpehmrghilhhfrhhomheprhgvsggvtggtrgessghsughiohdrtghomh X-ME-Proxy: Received: by mail.messagingengine.com (Postfix) with ESMTPA; Mon, 11 Apr 2022 13:39:02 -0400 (EDT) Message-ID: <3d543f0b-d299-7330-147e-f829739e280c@bsdio.com> Date: Mon, 11 Apr 2022 11:39:00 -0600 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.7.0 Subject: Re: [PATCH 2/3] ArmPlatformPkg: Fix target initialisation in cmd_load_symbols.py To: devel@edk2.groups.io Cc: Leif Lindholm , Ard Biesheuvel References: <20220411011659.191390-1-rebecca@bsdio.com> <20220411011659.191390-3-rebecca@bsdio.com> From: "Rebecca Cran" In-Reply-To: <20220411011659.191390-3-rebecca@bsdio.com> Content-Language: en-US Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Since the documentation was a bit difficult to find, I'll make a note here. For Development Studio 2021.2 it was in /opt/arm/developmentstudio-2021.2/sw/ide/plugins/com.arm.debug.interpreter.jython.api_2021.2.0.20211118_074138/doc/arm_ds.html . -- Rebecca Cran On 4/10/22 19:16, Rebecca Cran wrote: > The debugger in Arm Development Studio 2021.2 doesn't work with > "ec = debugger.getExecutionContext(0)" because it's subsequently unable > to access memory. Fix it by switching to > "ec = debugger.getCurrentExecutionContext()". > > The documentation for waitForStop() says: > > "It is not needed after a call to stop() because stop() is blocking." > > So, remove the call to waitForStop. > > Signed-off-by: Rebecca Cran > --- > ArmPlatformPkg/Scripts/Ds5/cmd_load_symbols.py | 5 ++--- > 1 file changed, 2 insertions(+), 3 deletions(-) > > diff --git a/ArmPlatformPkg/Scripts/Ds5/cmd_load_symbols.py b/ArmPlatformPkg/Scripts/Ds5/cmd_load_symbols.py > index 89d2f28ba27d..cb4db148dedf 100644 > --- a/ArmPlatformPkg/Scripts/Ds5/cmd_load_symbols.py > +++ b/ArmPlatformPkg/Scripts/Ds5/cmd_load_symbols.py > @@ -85,11 +85,10 @@ else: > debugger = Debugger() > > # Initialisation commands > -ec = debugger.getExecutionContext(0) > +ec = debugger.getCurrentExecutionContext() > ec.getExecutionService().stop() > -ec.getExecutionService().waitForStop() > # in case the execution context reference is out of date > -ec = debugger.getExecutionContext(0) > +ec = debugger.getCurrentExecutionContext() > > try: > armplatform_debugger = edk2_debugger.ArmPlatformDebugger(ec, report_file, regions, verbose)