Blog

Itโ€™s been a few months since I did any work with my MinnowBoard; time seems to fly by during the summer. In this episode, I pick up where I left off, doing various Yocto builds as I worked towards source-level debug of the Linux kernel. But, Iโ€™m having mysterious build failures, with some of the segmentation fault symptoms I had months ago before I RMAโ€™ed my AMD CPU. Could this be raising its ugly head again?
You can always count on Larry Traylor to crank out useful new content for engineers. This time, heโ€™s updated our Application Note on UEFI Debugging using SourcePoint on Intel Platforms.
In my last article, I outlined a short embedded JTAG-based โ€˜Cโ€™ routine to dump machine check errors in the event of a system crash or hang. In todayโ€™s blog, I look at this in the larger context of diagnosing the root cause of system wedges, and what embedded ITP techniques can be used to gather as much forensics data as possible.
ASSET implements in-situ diagnostics via direct support of the x86 JTAG-based run-control API down on the target. The run-control API are synonymous with lower-level Intel In-Target Probe (ITP) procedures. What follows is a sample โ€˜Cโ€™ routine written to dump the contents of the machine check registers, in the event of a system wedge (for example, a three-strike event).
Archives