Category: Software Debug and Trace – ARM

In Episode 41, Hacking the Linux Kernel, Part 2, I successfully hacked the Linux kernel, both on a native Linux partition, and within a Ubuntu VM on VirtualBox, by using the general directions within the Linux Newbies First Kernel Patch tutorial. This week, I worked towards hacking the Linux kernel using a Yocto-based qemux86 on VirtualBox, as a final step towards actually hacking the kernel on my MinnowBoard.
Rejoice, Linux kernel newbies. Last week, I hacked an Ethernet driver in the Linux kernel, but the hack didnโ€™t work; it turns out that the driver I chose isnโ€™t used in my native Linux image on my PC. This week, I tackled the problem again, with success! And if I can do it, you can, too.
You can always count on Larry Traylor to crank out useful new content for engineers. This time, heโ€™s updated our Application Note on UEFI Debugging using SourcePoint on Intel Platforms.
In the article JTAG and run-control API in BMCs for at-scale debug, I described how embedding the Intel ITP run-control library down on a service processor provides for a rich set of target-based functions for debug forensics. How might this apply to reading MSRs, such as the ones created to address Spectre and Meltdown.
Archives