05.02.2013 Views

ARM Architecture Reference Manual ARMv7-A and ARMv7-R edition

ARM Architecture Reference Manual ARMv7-A and ARMv7-R edition

ARM Architecture Reference Manual ARMv7-A and ARMv7-R edition

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

in Non-secure state <strong>and</strong> also in Secure User mode.<br />

Invasive Debug Authentication<br />

When Secure User halting debug is not supported, the processor can be configured only so that invasive<br />

non-halting debug is permitted in Secure User mode when invasive debug is not permitted in Secure<br />

privileged modes. Any debug event that would cause entry to Debug state is ignored, unless it is a BKPT<br />

Instruction debug event. Therefore, the alternatives for when a debug event is permitted are:<br />

in all processor modes, in both Secure <strong>and</strong> Non-secure security states<br />

only in Non-secure state<br />

in Non-secure state <strong>and</strong> also, if it will not cause entry to Debug state, in Secure User mode.<br />

In v6.1 Debug <strong>and</strong> v7 Debug, invasive debug authentication can be controlled dynamically, meaning that<br />

whether a debug event is permitted can change while the processor is running, or while the processor is in<br />

Debug state. For more information, see Generation of debug events on page C3-40.<br />

In v6 Debug, invasive debug authentication can be changed only while the processor is in reset.<br />

In the recommended external debug interface, the signals that control the enabling <strong>and</strong> permitting of debug<br />

events are DBGEN <strong>and</strong> SPIDEN. SPIDEN is only implemented on processors that implement Security<br />

Extensions. See Authentication signals on page AppxA-3.<br />

Part C of this manual assumes that the recommended external debug interface is implemented.<br />

Note<br />

DBGEN <strong>and</strong> SPIDEN also control non-invasive debug, see About non-invasive debug authentication<br />

on page C7-2.<br />

For more information about use of the authentication signals see Changing the authentication signals<br />

on page AppxA-4.<br />

If DBGEN is LOW, all invasive debug is disabled.<br />

On processors that do not implement Security Extensions, if DBGEN is HIGH, invasive debug is enabled<br />

<strong>and</strong> permitted in all modes, see Table C2-1:<br />

Table C2-1 Invasive debug authentication, Security Extensions not implemented<br />

DBGEN Modes in which invasive debug is permitted<br />

LOW None. Invasive debug is disabled.<br />

HIGH All modes.<br />

On processors that implement the Security Extensions, if both DBGEN <strong>and</strong> SPIDEN are HIGH, invasive<br />

debug is enabled <strong>and</strong> all debug events are permitted in all modes <strong>and</strong> in both Secure <strong>and</strong> Non-secure security<br />

states.<br />

<strong>ARM</strong> DDI 0406B Copyright © 1996-1998, 2000, 2004-2008 <strong>ARM</strong> Limited. All rights reserved. C2-3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!