On 04/01/14 20:20, Andrew Fish wrote:
> 
> On Apr 1, 2014, at 11:04 AM, Laszlo Ersek <[email protected]> wrote:
> 
>> On 04/01/14 19:17, Andrew Fish wrote:
>>> Are there any tools in the edk2 to patch a PCD in an FD?
>>>
>>> I was looking at what a debugger has to do to load symbols for the SEC
>>> or PEI and it seems like a lot of work. It looks like all you know is
>>> the base of the FV. You then have to search that FV for an FFS file then
>>> open up the sections of the file to find the PE/COFF section, and then
>>> parse the PE/COFF section of that file. 
>>>
>>> It seems bad that you have to include FV cracking code in SEC, just to
>>> load symbols. Especially given the data you needs ends up in the
>>> *.Fv.map file. The PI spec caches a copy of the PEI Entry Point at a
>>> known location so you would not have to include FV cracking code in yet
>>> another location. 
>>
>> I've learned about LMFA by sneaking a peek at this commit in Jordan's repo:
>>
>> https://github.com/jljusten/edk2/commit/e34569a9
>>
>> Could be what you want.
>>
> 
> Thanks for the Info. The DXE Core case is easy to solve as there is a
> HOB with the information in it.

I really don't know how useful LMFA will be for debugging (and in what
phases), but the PCD that the patch sets (ie.
PcdLoadModuleAtFixAddressEnable) is also used in:

- MdeModulePkg/Core/Pei/Dispatcher/Dispatcher.c
- MdeModulePkg/Core/Pei/Image/Image.c
- MdeModulePkg/Core/Pei/PeiMain/PeiMain.c

which is why I thought LMFA could be useful in PEI to the same extent as
in DXE (regardless how useful it will prove in DXE, in the absolute sense).

Thanks
Laszlo

------------------------------------------------------------------------------
_______________________________________________
edk2-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/edk2-devel

Reply via email to