audk/SourceLevelDebugPkg
Jeff Fan 9e2364ef12 Fix the potential address overflow issue when checking PE signature.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Jeff Fan <jeff.fan@intel.com>
Reviewed-by: Liming Gao <liming.gao@intel.com>

git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@15602 6f19259b-4bc3-4df7-8a09-765794883524
2014-06-30 06:13:53 +00:00
..
DebugAgentDxe Refine code to make it more safely. 2014-06-25 06:49:53 +00:00
DebugAgentPei Refine code to make it more safely. 2014-06-25 06:49:53 +00:00
Include
Library Fix the potential address overflow issue when checking PE signature. 2014-06-30 06:13:53 +00:00
Contributions.txt
License.txt
Readme.txt
SourceLevelDebugPkg.dec
SourceLevelDebugPkg.dsc

Readme.txt

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

UDK based firmware on UEFI IA-32 and UEFI x64 platforms can be debugged with
SourceLevelDebugPkg in conjunction with Intel(R) UEFI Development Kit Debugger
Tool (Intel (R) UDK Debugger Tool).

The Intel(R) UDK Debugger Tool and its detailed user manual can be obtained
from: http://www.uefidk.com/develop.