Blog

In collaboration with the UEFI Forum, Iโ€™ll be presenting Beyond Printf: Real-Time UEFI Debugging on Wednesday, October 27th, 2021 at 10am CT. Register here: https://www.brighttalk.com/webcast/18206/512103 to watch the session live, and/or later view the recorded video. What powerful new debugging and trace features exist on the latest Intel silicon? Continue reading, or watch the webinar.
For debugging firmware, print statements (โ€œprintfโ€) are often our most powerful tool: some bugs are caused by complex sequences of events that are too long and intricate to root-cause using just breakpoints and watch windows. In this article, I write about my explorations into โ€œat-speed printfโ€.
There have been numerous investigations into the use of the Performance Monitoring Counters (PMCs) for malware detection. Below is a quick survey of what Iโ€™ve read so far, as well as an investigation into using JTAG as an alternative access mechanism to traditional ring 0 or restricted OS mechanisms.
In this installment of the Coding to the SED API series, weโ€™ll look at the SED functions that access the OOBMSM, and use it for super-fast retrieval of hardware telemetry data.
For each of the months of January, February and March, I did a webinar on JTAG-based debugging. Since each of the video recordings are about 45 minutes long, I thought it would be helpful to point out the highlights of each, if you donโ€™t have time to sit through the full durations. At the risk of sounding immodest, there are some real gems of information within the demos of each webinar.
Archives