Leif,

Since this is a readme file, perhaps those should be changed
to `text` markdown style in an ASCII text file and rename the
file to README.md so it is rendered correctly from the GitHub
web view.

Mike

> -----Original Message-----
> From: devel@edk2.groups.io <devel@edk2.groups.io> On
> Behalf Of Leif Lindholm
> Sent: Wednesday, September 18, 2019 3:44 PM
> To: devel@edk2.groups.io
> Cc: Ard Biesheuvel <ard.biesheu...@linaro.org>
> Subject: [edk2-devel] [PATCH 9/9] EmbeddedPkg: convert
> Lauterbach README.txt to UTF-8
> 
> This file contained what looked like windows 1250
> encoded single quotation marks. Convert them to UTF-8.
> 
> Cc: Ard Biesheuvel <ard.biesheu...@linaro.org>
> Signed-off-by: Leif Lindholm <leif.lindh...@linaro.org>
> ---
>  EmbeddedPkg/Scripts/LauterbachT32/README.txt | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git
> a/EmbeddedPkg/Scripts/LauterbachT32/README.txt
> b/EmbeddedPkg/Scripts/LauterbachT32/README.txt
> index 06602ab8763a..5b323375ae35 100644
> --- a/EmbeddedPkg/Scripts/LauterbachT32/README.txt
> +++ b/EmbeddedPkg/Scripts/LauterbachT32/README.txt
> @@ -1,7 +1,7 @@
>  DXE Phase Debug
>  ===============
> -Update the memsize variable in EfiLoadDxe.cmm for the
> actual amount of memory available in your system.
> Allow your system to boot to the point that the DXE
> core is initialized (so that the System Table and Debug
> Information table is present in memory) and execute
> this script (using the toolbar button or  do EfiLoadDxe
> from the command area).  It will scan memory for the
> debug info table and load modules in it.
> +Update the memsize variable in EfiLoadDxe.cmm for the
> actual amount of memory available in your system.
> Allow your system to boot to the point that the DXE
> core is initialized (so that the System Table and Debug
> Information table is present in memory) and execute
> this script (using the toolbar button or ‘do
> EfiLoadDxe’ from the command area).  It will scan
> memory for the debug info table and load modules in it.
> 
>  SEC/PEI Phase Debug
>  ===================
> -There is no way to autodetect where these images
> reside so you must pass an address for the memory-
> mapped Firmware Volume containing these images.  To do
> this, enter  do EfiLoadFv <addr>  where <addr> is the
> base address for the firmware volume containing the SEC
> or PEI code.  To be more efficient you may want to
> create a script that calls this, like
> MyBoardLoadSec.cmm which contains the call to
> EfiLoadFv.  You can them map this script to a T32 menu
> or toolbar button for quick access.
> +There is no way to autodetect where these images
> reside so you must pass an address for the memory-
> mapped Firmware Volume containing these images.  To do
> this, enter ‘do EfiLoadFv <addr>’ where <addr> is the
> base address for the firmware volume containing the SEC
> or PEI code.  To be more efficient you may want to
> create a script that calls this, like
> MyBoardLoadSec.cmm which contains the call to
> EfiLoadFv.  You can them map this script to a T32 menu
> or toolbar button for quick access.
> --
> 2.20.1
> 
> 
> 


-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.

View/Reply Online (#47509): https://edk2.groups.io/g/devel/message/47509
Mute This Topic: https://groups.io/mt/34193909/21656
Group Owner: devel+ow...@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub  [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to