From nobody Tue Feb 10 10:20:43 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of groups.io designates 66.175.222.12 as permitted sender) client-ip=66.175.222.12; envelope-from=bounce+27952+47615+1787277+3901457@groups.io; helo=web01.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zoho.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+47615+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=linaro.org ARC-Seal: i=1; a=rsa-sha256; t=1568909023; cv=none; d=zoho.com; s=zohoarc; b=LYvBL2T8apILusjk5lTS8kIsFysGRrXDyxkbXw5rANHSUGAkSAqlAXngBY/bdmkXra/srlxRSgPmZgCmZ64eQuktVEAWZooY4lbnhPaq8lnVoJWqKICZ1X4JReQjJE01iTSsllY6cg2q+M78iRNveSu7kyOvpNtn6s10sSBF6NE= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1568909023; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Id:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To:ARC-Authentication-Results; bh=Ftn7agLeVRGUkoGpnlK7kC45SrbDU428+nOY0sbKn4k=; b=YhmpUYsX+euw/Ry0te/SXaI3rTd9QXtmy6kU8Mb7dKUJD4zyQTLqrZHh89XwWgy4yBzqGRhj4k/sWXp5/Wcp20JSzUoNhxim2EP7CgsB5bcnKbyl6gRNxaX7AqhPsbXuT9YdT7tBdtUhsB7CzkgwxnYWKIgv00SQSxdemIAXaxw= ARC-Authentication-Results: i=1; mx.zoho.com; dkim=pass; spf=pass (zoho.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+47615+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) header.from= Received: from web01.groups.io (web01.groups.io [66.175.222.12]) by mx.zohomail.com with SMTPS id 156890902319132.28846500879547; Thu, 19 Sep 2019 09:03:43 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id qO7YYY1788612xtnnca0Q8Bd; Thu, 19 Sep 2019 09:03:42 -0700 X-Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by groups.io with SMTP; Thu, 19 Sep 2019 09:03:41 -0700 X-Received: by mail-wm1-f66.google.com with SMTP id x2so5253959wmj.2 for ; Thu, 19 Sep 2019 09:03:40 -0700 (PDT) X-Gm-Message-State: WrPdq8FG3sCpvMWb18cCLS72x1787277AA= X-Google-Smtp-Source: APXvYqxaByMIOLUikp9hLw4pDPhC/TsDNq3bWLFOEtWqc+ethMENbE+xARS134hlM4rllgMvS0H+aQ== X-Received: by 2002:a7b:c203:: with SMTP id x3mr3693569wmi.8.1568909019408; Thu, 19 Sep 2019 09:03:39 -0700 (PDT) X-Received: from vanye.hemma.eciton.net (cpc92302-cmbg19-2-0-cust304.5-4.cable.virginm.net. [82.1.209.49]) by smtp.gmail.com with ESMTPSA id v4sm15948662wrg.56.2019.09.19.09.03.38 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 19 Sep 2019 09:03:38 -0700 (PDT) From: "Leif Lindholm" To: devel@edk2.groups.io Cc: Ard Biesheuvel , "Kinney, Michael D" Subject: [edk2-devel] [PATCH v2 9/9] EmbeddedPkg: convert Lauterbach README.txt to 7-bit safe Readme.md Date: Thu, 19 Sep 2019 17:03:19 +0100 Message-Id: <20190919160319.16270-10-leif.lindholm@linaro.org> In-Reply-To: <20190919160319.16270-1-leif.lindholm@linaro.org> References: <20190919160319.16270-1-leif.lindholm@linaro.org> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,leif.lindholm@linaro.org Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1568909022; bh=wwPyO9FYdxWFzJKla6LbizEJA4nx8B93NlcIzpXuYfM=; h=Cc:Content-Type:Date:From:Reply-To:Subject:To; b=CJEk/INY1koSl4J/pSMXhCYHXVfnrpC09caoPeEwgg0WPP2DidSVPUEvV0XIyzUL7Ag KMMFrXmcoeZ0Fr6iULXv8ez12CICUOvxpkD7aq2gXqbiX6JrqscZVM3P4XEf7bZ0PsHQf FLt0APEDBiVz1Q6HzziD8TmyKLxhApVe/ag= X-ZohoMail-DKIM: pass (identity @groups.io) This file contained what looked like windows 1250 encoded single quotation marks. Convert them to regular 's. Rework the file to markdown format and and rename it Readme.md while we're at it. Cc: Ard Biesheuvel Cc: "Kinney, Michael D" Signed-off-by: Leif Lindholm --- EmbeddedPkg/Scripts/LauterbachT32/README.txt | 7 ------- EmbeddedPkg/Scripts/LauterbachT32/Readme.md | 16 ++++++++++++++++ 2 files changed, 16 insertions(+), 7 deletions(-) diff --git a/EmbeddedPkg/Scripts/LauterbachT32/README.txt b/EmbeddedPkg/Scr= ipts/LauterbachT32/README.txt deleted file mode 100644 index 06602ab8763a..000000000000 --- a/EmbeddedPkg/Scripts/LauterbachT32/README.txt +++ /dev/null @@ -1,7 +0,0 @@ -DXE Phase Debug -=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D -Update the memsize variable in EfiLoadDxe.cmm for the actual amount of mem= ory available in your system. Allow your system to boot to the point that = the DXE core is initialized (so that the System Table and Debug Information= table is present in memory) and execute this script (using the toolbar but= ton or =EF=BF=BDdo EfiLoadDxe=EF=BF=BD from the command area). It will sca= n memory for the debug info table and load modules in it. -=20 -SEC/PEI Phase Debug -=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D -There is no way to autodetect where these images reside so you must pass a= n address for the memory-mapped Firmware Volume containing these images. T= o do this, enter =EF=BF=BDdo EfiLoadFv =EF=BF=BD where is the = base address for the firmware volume containing the SEC or PEI code. To be= more efficient you may want to create a script that calls this, like MyBoa= rdLoadSec.cmm which contains the call to EfiLoadFv. You can them map this = script to a T32 menu or toolbar button for quick access. diff --git a/EmbeddedPkg/Scripts/LauterbachT32/Readme.md b/EmbeddedPkg/Scri= pts/LauterbachT32/Readme.md new file mode 100644 index 000000000000..51d2c8da5405 --- /dev/null +++ b/EmbeddedPkg/Scripts/LauterbachT32/Readme.md @@ -0,0 +1,16 @@ +# DXE Phase Debug +Update the memsize variable in EfiLoadDxe.cmm for the actual amount of mem= ory +available in your system. Allow your system to boot to the point that the= DXE +core is initialized (so that the System Table and Debug Information table = is +present in memory) and execute this script (using the toolbar button or +'do EfiLoadDxe' from the command area). It will scan memory for the debug= info +table and load modules in it. + +# SEC/PEI Phase Debug +There is no way to autodetect where these images reside so you must pass an +address for the memory-mapped Firmware Volume containing these images. To= do +this, enter 'do EfiLoadFv ' where is the base address for the +firmware volume containing the SEC or PEI code. To be more efficient you = may +want to create a script that calls this, like MyBoardLoadSec.cmm which con= tains +the call to EfiLoadFv. You can them map this script to a T32 menu or tool= bar +button for quick access. --=20 2.20.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#47615): https://edk2.groups.io/g/devel/message/47615 Mute This Topic: https://groups.io/mt/34201154/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-