summaryrefslogtreecommitdiffstats
path: root/EmbeddedPkg
diff options
context:
space:
mode:
authorLeif Lindholm <leif.lindholm@linaro.org>2019-09-18 22:44:56 +0100
committerLeif Lindholm <leif.lindholm@linaro.org>2019-10-04 11:18:22 +0100
commit432418662c7ce75939c3d7cc43c6db294d3fe5de (patch)
treecb97ac283705e3fd68adc50c694cc8ebc7fad10c /EmbeddedPkg
parentd79b63c64f58ac47e570e8d2e9b090525f7e8efd (diff)
downloadedk2-432418662c7ce75939c3d7cc43c6db294d3fe5de.tar.gz
edk2-432418662c7ce75939c3d7cc43c6db294d3fe5de.tar.bz2
edk2-432418662c7ce75939c3d7cc43c6db294d3fe5de.zip
EmbeddedPkg: convert Lauterbach README.txt to 7-bit safe Readme.md
This file contained what looked like windows 1250 encoded single quotation marks. Convert them to regular 's. Rework the file to markdown format and and rename it Readme.md while we're at it. Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org> Cc: "Kinney, Michael D" <michael.d.kinney@intel.com> Signed-off-by: Leif Lindholm <leif.lindholm@linaro.org> Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Reviewed-by: Philippe Mathieu-Daude <philmd@redhat.com>
Diffstat (limited to 'EmbeddedPkg')
-rw-r--r--EmbeddedPkg/Scripts/LauterbachT32/README.txt7
-rw-r--r--EmbeddedPkg/Scripts/LauterbachT32/Readme.md16
2 files changed, 16 insertions, 7 deletions
diff --git a/EmbeddedPkg/Scripts/LauterbachT32/README.txt b/EmbeddedPkg/Scripts/LauterbachT32/README.txt
deleted file mode 100644
index 06602ab876..0000000000
--- a/EmbeddedPkg/Scripts/LauterbachT32/README.txt
+++ /dev/null
@@ -1,7 +0,0 @@
-DXE Phase Debug
-===============
-Update the memsize variable in EfiLoadDxe.cmm for the actual amount of memory available in your system. Allow your system to boot to the point that the DXE core is initialized (so that the System Table and Debug Information table is present in memory) and execute this script (using the toolbar button or ‘do EfiLoadDxe’ from the command area). It will scan memory for the debug info table and load modules in it.
-
-SEC/PEI Phase Debug
-===================
-There is no way to autodetect where these images reside so you must pass an address for the memory-mapped Firmware Volume containing these images. To do this, enter ‘do EfiLoadFv <addr>’ where <addr> is the base address for the firmware volume containing the SEC or PEI code. To be more efficient you may want to create a script that calls this, like MyBoardLoadSec.cmm which contains the call to EfiLoadFv. You can them map this script to a T32 menu or toolbar button for quick access.
diff --git a/EmbeddedPkg/Scripts/LauterbachT32/Readme.md b/EmbeddedPkg/Scripts/LauterbachT32/Readme.md
new file mode 100644
index 0000000000..51d2c8da54
--- /dev/null
+++ b/EmbeddedPkg/Scripts/LauterbachT32/Readme.md
@@ -0,0 +1,16 @@
+# DXE Phase Debug
+Update the memsize variable in EfiLoadDxe.cmm for the actual amount of memory
+available in your system. Allow your system to boot to the point that the DXE
+core is initialized (so that the System Table and Debug Information table is
+present in memory) and execute this script (using the toolbar button or
+'do EfiLoadDxe' from the command area). It will scan memory for the debug info
+table and load modules in it.
+
+# SEC/PEI Phase Debug
+There is no way to autodetect where these images reside so you must pass an
+address for the memory-mapped Firmware Volume containing these images. To do
+this, enter 'do EfiLoadFv <addr>' where <addr> is the base address for the
+firmware volume containing the SEC or PEI code. To be more efficient you may
+want to create a script that calls this, like MyBoardLoadSec.cmm which contains
+the call to EfiLoadFv. You can them map this script to a T32 menu or toolbar
+button for quick access.