VirtualBox

source: vbox/trunk/src/VBox/Devices/EFI/Firmware/EmbeddedPkg/Scripts/LauterbachT32/Readme.md@ 107932

Last change on this file since 107932 was 105670, checked in by vboxsync, 9 months ago

Devices/EFI/FirmwareNew: Merge edk2-stable-202405 and make it build on aarch64, bugref:4643

  • Property svn:eol-style set to native
File size: 957 bytes
Line 
1# DXE Phase Debug
2Allow your system to boot to the point that the DXE
3core is initialized (so that the System Table and Debug Information table is
4present in memory) and execute this script (using the toolbar button or
5'do EfiLoadDxe "0xGST_ADDRESS"' from the command area). 'GST_ADDRESS' is the
6address of the EFI_SYSTEM_TABLE, and can be found by the global `gST`.
7The script will scan memory for the debug info table and load modules in it.
8
9# SEC/PEI Phase Debug
10There is no way to autodetect where these images reside so you must pass an
11address for the memory-mapped Firmware Volume containing these images. To do
12this, enter 'do EfiLoadFv <addr>' where <addr> is the base address for the
13firmware volume containing the SEC or PEI code. To be more efficient you may
14want to create a script that calls this, like MyBoardLoadSec.cmm which contains
15the call to EfiLoadFv. You can them map this script to a T32 menu or toolbar
16button for quick access.
Note: See TracBrowser for help on using the repository browser.

© 2025 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette