summaryrefslogtreecommitdiffstats
path: root/EmbeddedPkg/Scripts/LauterbachT32/README.txt
diff options
context:
space:
mode:
authoroliviermartin <oliviermartin@6f19259b-4bc3-4df7-8a09-765794883524>2011-04-27 17:21:31 +0000
committeroliviermartin <oliviermartin@6f19259b-4bc3-4df7-8a09-765794883524>2011-04-27 17:21:31 +0000
commit98790d814871cc30bbd536673d3a0948047cd2f0 (patch)
treecfffae42b649cd647a29953a36cae48d933b1554 /EmbeddedPkg/Scripts/LauterbachT32/README.txt
parent2cf57c92af9ae3bd9ac506071c4ef1c6e7535fd5 (diff)
downloadedk2-98790d814871cc30bbd536673d3a0948047cd2f0.tar.gz
edk2-98790d814871cc30bbd536673d3a0948047cd2f0.tar.bz2
edk2-98790d814871cc30bbd536673d3a0948047cd2f0.zip
EmbeddedPkg/LauterbachT32: Lauterbach T32 Debug Scripts
These scripts are used for UEFI Source debugging with Lauterbach T32. They can be used at different stages of the UEFI boot time. A README.txt file explains how to use these scripts. git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@11599 6f19259b-4bc3-4df7-8a09-765794883524
Diffstat (limited to 'EmbeddedPkg/Scripts/LauterbachT32/README.txt')
-rwxr-xr-xEmbeddedPkg/Scripts/LauterbachT32/README.txt7
1 files changed, 7 insertions, 0 deletions
diff --git a/EmbeddedPkg/Scripts/LauterbachT32/README.txt b/EmbeddedPkg/Scripts/LauterbachT32/README.txt
new file mode 100755
index 0000000000..06602ab876
--- /dev/null
+++ b/EmbeddedPkg/Scripts/LauterbachT32/README.txt
@@ -0,0 +1,7 @@
+DXE Phase Debug
+===============
+Update the memsize variable in EfiLoadDxe.cmm for the actual amount of memory available in your system. Allow your system to boot to the point that the DXE core is initialized (so that the System Table and Debug Information table is present in memory) and execute this script (using the toolbar button or ‘do EfiLoadDxe’ from the command area). It will scan memory for the debug info table and load modules in it.
+
+SEC/PEI Phase Debug
+===================
+There is no way to autodetect where these images reside so you must pass an address for the memory-mapped Firmware Volume containing these images. To do this, enter ‘do EfiLoadFv <addr>’ where <addr> is the base address for the firmware volume containing the SEC or PEI code. To be more efficient you may want to create a script that calls this, like MyBoardLoadSec.cmm which contains the call to EfiLoadFv. You can them map this script to a T32 menu or toolbar button for quick access.