From mboxrd@z Thu Jan 1 00:00:00 1970 Authentication-Results: mx.groups.io; dkim=pass header.i=@linaro.org header.s=google header.b=FC/eIQ/L; spf=pass (domain: linaro.org, ip: 209.85.128.66, mailfrom: leif.lindholm@linaro.org) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by groups.io with SMTP; Wed, 18 Sep 2019 15:43:45 -0700 Received: by mail-wm1-f66.google.com with SMTP id b24so1719470wmj.5 for ; Wed, 18 Sep 2019 15:43:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=Wt8oEtG1TRI+Ps2mLaNu0bUJrpzZgivW7YRNgNXaeNY=; b=FC/eIQ/LHF2WHmgyc0losYJtZ3NOq8cxJpEgXYqMeIKAFIJSWzUPiTW5LECnC5xgJi erQDBKa0bmTdSqazD9ji82IMOIg7H2KwX7i2vDsaRH+bTVKMB0MCTHrOvvTvTBxAZH2W 2u3452CoHLQ6mkeUkk4qQwOyTHR+Df4t9yLF7eKUYDV4Sf8B8EqdFab7eDm1Z/IKpi3y /WPTHAUNW2sDESQ7cYKoKEUD8suQ/8jfyYXnVz7LAdo2Fh2Y3lCJgE4fTmGyVy4VSL6s 2hHze/yv3BRFrxlOC0hCdQTbLtywYoBwsveTcYai4en840Ww5GMif/AlLaoGT096BQCK Mw8Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=Wt8oEtG1TRI+Ps2mLaNu0bUJrpzZgivW7YRNgNXaeNY=; b=MeOy+wDmMC1DB8X1WC0yQki2C0+JTE6e8tu6H0Zd5W27w30es8tLjnuMZD8s163WFJ bloSkH6EztpA8YpOQZJT/+cB3lTyAG+Vq0oxzDoh9gNB2sSOWuHD0Fau4sQQa2WGDuvp 7x0Qpq6iSyfblbOzTt4/Lh/u8oaDd3Zpu0dRYOFlofHZ3gX2adeqU3R39qBKKlxHRDDT QB1dAwZr3Og7bsncvsCNJmltwJHma6akSJ0EPMWT3kXq+HKMdLvGIdGJJPyCgEw2PtWR 3gQ/ljWa+ov1/9B+ILS5DqT6TJtvHbRgsVmPmoxPgt8ZGTHNbzDR3wqW+3huCynlIRsE Zn1w== X-Gm-Message-State: APjAAAXaYm5F94TFlB6LqhIh/591oP1qxu/HvBk7O26bkESJZ4t92iN7 xLEVfOSxwMqMqVvpC1406TeUYx9KBLI= X-Google-Smtp-Source: APXvYqy5KPowMWcBWtsBoKCvFweTKS70WumRegt1Vghd5Pk3ETkax1/sWeU4fEJrMK4nDV2Ku94s6w== X-Received: by 2002:a05:600c:285:: with SMTP id 5mr166309wmk.161.1568846623799; Wed, 18 Sep 2019 15:43:43 -0700 (PDT) Return-Path: Received: from vanye.hemma.eciton.net (cpc92302-cmbg19-2-0-cust304.5-4.cable.virginm.net. [82.1.209.49]) by smtp.gmail.com with ESMTPSA id y186sm6676950wmd.26.2019.09.18.15.43.42 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 18 Sep 2019 15:43:43 -0700 (PDT) From: "Leif Lindholm" To: devel@edk2.groups.io Cc: Ard Biesheuvel Subject: [PATCH 9/9] EmbeddedPkg: convert Lauterbach README.txt to UTF-8 Date: Wed, 18 Sep 2019 23:43:31 +0100 Message-Id: <20190918224331.23269-10-leif.lindholm@linaro.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190918224331.23269-1-leif.lindholm@linaro.org> References: <20190918224331.23269-1-leif.lindholm@linaro.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This file contained what looked like windows 1250 encoded single quotation marks. Convert them to UTF-8. Cc: Ard Biesheuvel Signed-off-by: Leif Lindholm --- EmbeddedPkg/Scripts/LauterbachT32/README.txt | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/EmbeddedPkg/Scripts/LauterbachT32/README.txt b/EmbeddedPkg/Scripts/LauterbachT32/README.txt index 06602ab8763a..5b323375ae35 100644 --- a/EmbeddedPkg/Scripts/LauterbachT32/README.txt +++ b/EmbeddedPkg/Scripts/LauterbachT32/README.txt @@ -1,7 +1,7 @@ DXE Phase Debug =============== -Update the memsize variable in EfiLoadDxe.cmm for the actual amount of memory available in your system. Allow your system to boot to the point that the DXE core is initialized (so that the System Table and Debug Information table is present in memory) and execute this script (using the toolbar button or ‘do EfiLoadDxe’ from the command area). It will scan memory for the debug info table and load modules in it. +Update the memsize variable in EfiLoadDxe.cmm for the actual amount of memory available in your system. Allow your system to boot to the point that the DXE core is initialized (so that the System Table and Debug Information table is present in memory) and execute this script (using the toolbar button or ‘do EfiLoadDxe’ from the command area). It will scan memory for the debug info table and load modules in it. SEC/PEI Phase Debug =================== -There is no way to autodetect where these images reside so you must pass an address for the memory-mapped Firmware Volume containing these images. To do this, enter ‘do EfiLoadFv ’ where is the base address for the firmware volume containing the SEC or PEI code. To be more efficient you may want to create a script that calls this, like MyBoardLoadSec.cmm which contains the call to EfiLoadFv. You can them map this script to a T32 menu or toolbar button for quick access. +There is no way to autodetect where these images reside so you must pass an address for the memory-mapped Firmware Volume containing these images. To do this, enter ‘do EfiLoadFv ’ where is the base address for the firmware volume containing the SEC or PEI code. To be more efficient you may want to create a script that calls this, like MyBoardLoadSec.cmm which contains the call to EfiLoadFv. You can them map this script to a T32 menu or toolbar button for quick access. -- 2.20.1