On 04/01/14 20:20, Andrew Fish wrote: > > On Apr 1, 2014, at 11:04 AM, Laszlo Ersek <[email protected]> wrote: > >> On 04/01/14 19:17, Andrew Fish wrote: >>> Are there any tools in the edk2 to patch a PCD in an FD? >>> >>> I was looking at what a debugger has to do to load symbols for the SEC >>> or PEI and it seems like a lot of work. It looks like all you know is >>> the base of the FV. You then have to search that FV for an FFS file then >>> open up the sections of the file to find the PE/COFF section, and then >>> parse the PE/COFF section of that file. >>> >>> It seems bad that you have to include FV cracking code in SEC, just to >>> load symbols. Especially given the data you needs ends up in the >>> *.Fv.map file. The PI spec caches a copy of the PEI Entry Point at a >>> known location so you would not have to include FV cracking code in yet >>> another location. >> >> I've learned about LMFA by sneaking a peek at this commit in Jordan's repo: >> >> https://github.com/jljusten/edk2/commit/e34569a9 >> >> Could be what you want. >> > > Thanks for the Info. The DXE Core case is easy to solve as there is a > HOB with the information in it.
I really don't know how useful LMFA will be for debugging (and in what phases), but the PCD that the patch sets (ie. PcdLoadModuleAtFixAddressEnable) is also used in: - MdeModulePkg/Core/Pei/Dispatcher/Dispatcher.c - MdeModulePkg/Core/Pei/Image/Image.c - MdeModulePkg/Core/Pei/PeiMain/PeiMain.c which is why I thought LMFA could be useful in PEI to the same extent as in DXE (regardless how useful it will prove in DXE, in the absolute sense). Thanks Laszlo ------------------------------------------------------------------------------ _______________________________________________ edk2-devel mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/edk2-devel
