Category: Software Debug and Trace

Finally! A publicly available board with Intel Direct Connect Interface (DCI) working out of the box. With our SourcePoint JTAG-based debugger, it is now possible to explore the inner workings of low-level firmware with all the power of CPU-hardware-assisted run-control and trace features, including Intel Processor Trace and Architectural Event Trace.
In collaboration with the UEFI Forum, Iโ€™ll be presenting Beyond Printf: Real-Time UEFI Debugging on Wednesday, October 27th, 2021 at 10am CT. Register here: https://www.brighttalk.com/webcast/18206/512103 to watch the session live, and/or later view the recorded video. What powerful new debugging and trace features exist on the latest Intel silicon? Continue reading, or watch the webinar.
For debugging firmware, print statements (โ€œprintfโ€) are often our most powerful tool: some bugs are caused by complex sequences of events that are too long and intricate to root-cause using just breakpoints and watch windows. In this article, I write about my explorations into โ€œat-speed printfโ€.
In this installment of the Coding to the SED API series, weโ€™ll look at the SED functions that access the OOBMSM, and use it for super-fast retrieval of hardware telemetry data.
For each of the months of January, February and March, I did a webinar on JTAG-based debugging. Since each of the video recordings are about 45 minutes long, I thought it would be helpful to point out the highlights of each, if you donโ€™t have time to sit through the full durations. At the risk of sounding immodest, there are some real gems of information within the demos of each webinar.
Archives