←back to thread

242 points denysvitali | 1 comments | | HN request time: 0.204s | source
Show context
mmastrac ◴[] No.44426797[source]
This is a much better experience than the previous Qualcomm debug experience, which was a hand-rolled set of read/write/execute primitives exposed over USB. It was hilariously undersecured, allowing a few of us to continually get root on various Qualcomm models.

In seriousness, these debug ports are seriously lacking in most mobile chipsets. MediaTek still has the old-style approach in many of their devices, requiring some incantations which expose serial over USB, but not in the way you think -- it's serial over USB pins!

I've done tonnes of work with mobile chipsets and security and this seems like they've finally started down the road to making this functionality accessible. Don't be surprised if you don't see this supported out of the box in most places, though. Most OEMs will certainly disable this once they've adapted their bootloaders to it. The big G doesn't like debuggability in end user devices.

replies(8): >>44426943 #>>44427019 #>>44427872 #>>44429675 #>>44429832 #>>44430190 #>>44432815 #>>44439367 #
Veserv ◴[] No.44426943[source]
Most of those boards have a separate physical JTAG connector (at least in development kits, this article indicates JTAG over USB is disabled in production systems anyways so no difference there) which is what they are expecting you to use for low-level debugging. It only costs like 1,000 $ for a JTAG probe which is like 1 fully-burdened engineer-day of cost. Even fully featured probes enabling hardware trace and time-travel debugging only cost like 1 engineer-week.
replies(4): >>44427021 #>>44427028 #>>44427717 #>>44430179 #
AlotOfReading ◴[] No.44427717[source]
The probes cost enough to exceed individual purchasing limits at hardware companies, which means you need to go through the requisition process. That takes long enough that you have to plan ahead and you don't order more as your needs increase. Then everyone's fighting for the limited probes right before a ship date and they get jealously guarded like priceless jewels.

JTAG also isn't usually exposed through enclosures, so using the probe on a field unit might require destructive entry depending on the application.

replies(2): >>44427838 #>>44432262 #
phkahler ◴[] No.44432262[source]
There's something wrong if you're using Jtag on a field unit. In my experience, once a chip is up and running we implement higher level communication and debug methods.
replies(1): >>44436518 #
1. AlotOfReading ◴[] No.44436518[source]
To give an automotive example, a field unit may fail and be RMA'd to the tier 1 to improve their production line. They don't have access/documentation for the production software, and it wasn't developed to interact with their diagnostic tooling. They'll need to reliably reflash their own test software onto a board with potential hardware failures. JTAG is sometimes what they request to do that.