Platform bring-up is challenging whether validating or debugging hardware. SourcePoint™ supports Intel® CScripts (Customer Scripts) to enable platform debug, error analysis, or error injection via a Python Command Line Interface (CLI) which is integrated with SourcePoint premier UEFI debug capability. SourcePoint runs Intel CScript without the DAL providing better performance, saving development time. ASSET ensures compatibility by providing a dedicated resource to verify the latest CScript releases from Intel. CScript installation is the same as documented in the Intel guide. However, no DAL install or configuration is required. Simply extract the zip and drag and drop the initialization script into the command window. Once initialized, type in the function name and use tab completion as necessary to articulate the exact function needed to run.
CScripts are provided to Original Equipment Manufacturers (OEMs), Original Design Manufacturers (ODMs) and others to ease the task of bringing products based upon Intel processors to market. CScripts are implemented as Python scripts and are used at board bring up as well as at various times during debug or when an error occurs.
CScripts are platform specific and use hardware features enabled within the silicon to accomplish the task of debugging, hardware validation and error injection.
Supporting the CScripts is a Python language-based Command-Line Interpreter (CLI) environment. SourcePoint implements the underlying worker functions directly, instead of using the Intel DAL. SourcePoint provides its own Python CLI environment, which mirrors much of the functionality of the Intel Python CLI.
ScanWorks Embedded Diagnostics (SED) is a custom embedded ITP implementation that provides on target run-control via the Baseboard Management Controller (BMC) for target applications that require 5 nines or 6 nines reliability. In these applications, a failure must be analyzed without the actual plugging in of an ITP JTAG probe. This requirement implies that the software is already resident on the target and that an external processor (BMC) has the ability to conduct forensics on the hung server processor. Intel has implemented the ability for a crashed/hung processor to keep valuable postmortem information available within the CPU.
The purpose of SED is to allow the customer to run CScripts from a remote host connected to the failing server to extract this data prior to system reset.
As each server design and requirements are unique, SED is customized to meet the target constraints to accomplish the goal of data extraction.
Intel® JTAG debugger products are designed to make the developer’s job easier. We have worked with Intel for over fifteen years, providing tools that are feature-rich in both hardware and software making it easy for the user to accelerate development time. An example is UEFI development where we provide macro files that allow for context-sensitive debugging in the PEIM, DXE and the HOBs.
Our tight integration of hardware and software for Intel JTAG debug lends itself to a robust development environment, helping to minimize the challenges associated with debugging code.