summaryrefslogtreecommitdiff
path: root/ArmPlatformPkg/Scripts/Ds5/system_table.py
blob: f74554fa654ff097b0553dc3ca1ba7b5b204779b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
#
#  Copyright (c) 2011-2012, ARM Limited. All rights reserved.
#  
#  This program and the accompanying materials                          
#  are licensed and made available under the terms and conditions of the BSD License         
#  which accompanies this distribution.  The full text of the license may be found at        
#  http://opensource.org/licenses/bsd-license.php                                            
#
#  THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,                     
#  WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.             
#

from arm_ds.debugger_v1 import DebugException

import firmware_volume
import struct

class DebugInfoTable:
    CONST_DEBUG_INFO_TABLE_GUID = ( 0x49152E77L, 0x47641ADAL, 0xFE7AA2B7L, 0x8B5ED9FEL)
    
    DebugInfos = []
    
    def __init__(self, ec, debug_info_table_header_offset):
        self.ec = ec
        self.base = debug_info_table_header_offset
        
    def get_debug_info(self):
        count = self.ec.getMemoryService().readMemory32(self.base + 0x4)
        debug_info_table_base = self.ec.getMemoryService().readMemory32(self.base + 0x8)
        
        self.DebugInfos = []
        
        for i in range(0, count):
            # Get the address of the structure EFI_DEBUG_IMAGE_INFO
            debug_info = self.ec.getMemoryService().readMemory32(debug_info_table_base + (i * 4))
            if debug_info:
                debug_info_type = self.ec.getMemoryService().readMemory32(debug_info)
                # Normal Debug Info Type
                if debug_info_type == 1:
                    # Get the base address of the structure EFI_LOADED_IMAGE_PROTOCOL
                    loaded_image_protocol = self.ec.getMemoryService().readMemory32(debug_info + 0x4)
                    
                    image_base = self.ec.getMemoryService().readMemory32(loaded_image_protocol + 0x20)
                    image_size = self.ec.getMemoryService().readMemory32(loaded_image_protocol + 0x28)
                    
                    self.DebugInfos.append((image_base,image_size))
    
    # Return (base, size)
    def load_symbols_at(self, addr):
        if self.DebugInfos == []:
            self.get_debug_info()
        
        found = False
        for debug_info in self.DebugInfos:
            if (addr >= debug_info[0]) and (addr < debug_info[0] + debug_info[1]):
                section = firmware_volume.EfiSectionPE32(self.ec, debug_info[0])
                
                edk2_debugger.load_symbol_from_file(self.ec, section.get_debug_filepath(), section.get_debug_elfbase())

                found = True
                return debug_info

        if found == False:
            raise Exception('DebugInfoTable','No symbol found at 0x%x' % addr)

    def load_all_symbols(self):
        if self.DebugInfos == []:
            self.get_debug_info()
        
        for debug_info in self.DebugInfos:
            section = firmware_volume.EfiSectionPE32(self.ec, debug_info[0])
           
            edk2_debugger.load_symbol_from_file(self.ec, section.get_debug_filepath(), section.get_debug_elfbase())

    def dump(self):
        self.get_debug_info()
        for debug_info in self.DebugInfos:
            base_pe32 = debug_info[0]
            section = firmware_volume.EfiSectionPE32(self.ec, base_pe32)
            print section.get_debug_filepath()
        
class SystemTable:
    CONST_ST_SIGNATURE = ('I','B','I',' ','S','Y','S','T')
    
    def __init__(self, ec, membase, memsize):
        self.membase = membase
        self.memsize = memsize
        self.ec = ec
        
        found = False
        
        # Start from the top of the memory
        offset = self.membase + self.memsize
        # Align to highest 4MB boundary
        offset = offset & ~0x3FFFFF
        # We should not have a System Table at the top of the System Memory
        offset = offset - 0x400000
        
        # Start at top and look on 4MB boundaries for system table ptr structure
        while offset > self.membase:
            try:
                signature = struct.unpack("cccccccc", self.ec.getMemoryService().read(str(offset), 8, 32))
            except DebugException:
                raise Exception('SystemTable','Fail to access System Memory. Ensure all the memory in the region [0x%x;0x%X] is accessible.' % (membase,membase+memsize))
            if signature == SystemTable.CONST_ST_SIGNATURE:
                found = True
                self.system_table_base = self.ec.getMemoryService().readMemory32(offset + 0x8)
                break
            offset = offset - 0x400000
            
        if not found:
            raise Exception('SystemTable','System Table not found in System Memory [0x%x;0x%X]' % (membase,membase+memsize))
        
    def get_configuration_table(self, conf_table_guid):
        # Number of configuration Table entry
        conf_table_entry_count = self.ec.getMemoryService().readMemory32(self.system_table_base + 0x40)
        
        # Get location of the Configuration Table entries
        conf_table_offset = self.ec.getMemoryService().readMemory32(self.system_table_base + 0x44)
        
        for i in range(0, conf_table_entry_count):
            offset = conf_table_offset + (i * 0x14)
            guid = struct.unpack("<IIII", self.ec.getMemoryService().read(str(offset), 16, 32))
            if guid == conf_table_guid:
                return self.ec.getMemoryService().readMemory32(offset + 0x10)
            
        raise Exception('SystemTable','Configuration Table not found')