Leif, Since this is a readme file, perhaps those should be changed to `text` markdown style in an ASCII text file and rename the file to README.md so it is rendered correctly from the GitHub web view.
Mike > -----Original Message----- > From: devel@edk2.groups.io <devel@edk2.groups.io> On > Behalf Of Leif Lindholm > Sent: Wednesday, September 18, 2019 3:44 PM > To: devel@edk2.groups.io > Cc: Ard Biesheuvel <ard.biesheu...@linaro.org> > Subject: [edk2-devel] [PATCH 9/9] EmbeddedPkg: convert > Lauterbach README.txt to UTF-8 > > This file contained what looked like windows 1250 > encoded single quotation marks. Convert them to UTF-8. > > Cc: Ard Biesheuvel <ard.biesheu...@linaro.org> > Signed-off-by: Leif Lindholm <leif.lindh...@linaro.org> > --- > EmbeddedPkg/Scripts/LauterbachT32/README.txt | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git > a/EmbeddedPkg/Scripts/LauterbachT32/README.txt > b/EmbeddedPkg/Scripts/LauterbachT32/README.txt > index 06602ab8763a..5b323375ae35 100644 > --- a/EmbeddedPkg/Scripts/LauterbachT32/README.txt > +++ b/EmbeddedPkg/Scripts/LauterbachT32/README.txt > @@ -1,7 +1,7 @@ > DXE Phase Debug > =============== > -Update the memsize variable in EfiLoadDxe.cmm for the > actual amount of memory available in your system. > Allow your system to boot to the point that the DXE > core is initialized (so that the System Table and Debug > Information table is present in memory) and execute > this script (using the toolbar button or do EfiLoadDxe > from the command area). It will scan memory for the > debug info table and load modules in it. > +Update the memsize variable in EfiLoadDxe.cmm for the > actual amount of memory available in your system. > Allow your system to boot to the point that the DXE > core is initialized (so that the System Table and Debug > Information table is present in memory) and execute > this script (using the toolbar button or ‘do > EfiLoadDxe’ from the command area). It will scan > memory for the debug info table and load modules in it. > > SEC/PEI Phase Debug > =================== > -There is no way to autodetect where these images > reside so you must pass an address for the memory- > mapped Firmware Volume containing these images. To do > this, enter do EfiLoadFv <addr> where <addr> is the > base address for the firmware volume containing the SEC > or PEI code. To be more efficient you may want to > create a script that calls this, like > MyBoardLoadSec.cmm which contains the call to > EfiLoadFv. You can them map this script to a T32 menu > or toolbar button for quick access. > +There is no way to autodetect where these images > reside so you must pass an address for the memory- > mapped Firmware Volume containing these images. To do > this, enter ‘do EfiLoadFv <addr>’ where <addr> is the > base address for the firmware volume containing the SEC > or PEI code. To be more efficient you may want to > create a script that calls this, like > MyBoardLoadSec.cmm which contains the call to > EfiLoadFv. You can them map this script to a T32 menu > or toolbar button for quick access. > -- > 2.20.1 > > > -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#47509): https://edk2.groups.io/g/devel/message/47509 Mute This Topic: https://groups.io/mt/34193909/21656 Group Owner: devel+ow...@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-