Arm Community
Site
Search
User
Site
Search
User
Groups
Arm Research
DesignStart
Education Hub
Graphics and Gaming
High Performance Computing
Innovation
Multimedia
Open Source Software and Platforms
Physical
Processors
Security
System
Software Tools
TrustZone for Armv8-M
中文社区
Blog
Announcements
Artificial Intelligence
Automotive
Healthcare
HPC
Infrastructure
Innovation
Internet of Things
Machine Learning
Mobile
Smart Homes
Wearables
Forums
All developer forums
IP Product forums
Tool & Software forums
Pelion IoT Platform
Support
Open a support case
Documentation
Downloads
Training
Arm Approved program
Arm Design Reviews
Community Help
More
Cancel
Developer Community
Tools and Software
Software Tools
Jump...
Cancel
Software Tools
Arm Development Studio forum
TrustZone and CoreSight debug
Tools, Software and IDEs blog
Forums
Videos & Files
Help
Jump...
Cancel
New
Replies
2 replies
Subscribers
127 subscribers
Views
2415 views
Users
0 members are here
Related
TrustZone and CoreSight debug
Offline
china liu
over 7 years ago
Note: This was originally posted on 27th March 2013 at http://forums.arm.com
hi, experts:
If a CPU supports TZ feature.
Could a hacker use coresight debug tool to trace its internal data stream?
best wishes,
Top replies
Offline
Martin Weidmann
over 7 years ago
+1
Note: This was originally posted on 27th March 2013 at http://forums.arm.com There are several signals that control who can debug what. These include SPNIDEN (Secure Privileged Non-Invasive Debug Enable...
Offline
china liu
over 7 years ago
Note: This was originally posted on 28th March 2013 at
http://forums.arm.com
hi, ttfn:
thank you!
best wishes,
Cancel
Up
0
Down
Reply
Cancel
Offline
Martin Weidmann
over 7 years ago
Note: This was originally posted on 27th March 2013 at
http://forums.arm.com
There are several signals that control who can debug what. These include SPNIDEN (Secure Privileged Non-Invasive Debug Enable) and SPIDEN (Secure Privileged Invasive Debug Enable). These signals are sampled by the processor at reset (and only at reset). Based on them, it will either allow/not allow debug of the secure world.
(For reference, Invasive debug is things like stepping and breakpoints. Non-invasive is things like trace.)
What you might expect is the production devices (going into real products) would have these signals tied to disable secure debug. While development boards would might have them tied to enable secure debug.
Debug of User mode is controlled by bits in a register. So it would be up to the secure OS whether you could debug secure apps.
There are also signals to enable/disable non-secure debug.
Cancel
Up
+1
Down
Reply
Cancel
More questions in this forum
By title
By date
By reply count
By view count
By most asked
By votes
By quality
Descending
Ascending
All recent questions
Unread questions
Questions you've participated in
Questions you've asked
Unanswered questions
Answered questions
Questions with suggested answers
Questions with no replies
Suggested Answer
ARM development studio with ARM Juno r2 board
0
Juno Arm Development Platform
Arm Development Studio
Products
Arm Support
5283
views
2
replies
Latest
2 months ago
by
Ronan Synnott
Answered
"Unable to execute remote query (response code 503) " issue
0
5057
views
1
reply
Latest
2 months ago
by
Ronan Synnott
Not Answered
Where can I download DS-5 hardware firmware??
0
4765
views
1
reply
Latest
2 months ago
by
Ronan Synnott
Not Answered
Getting errors after including arm_math.h
0
stm32 h7
Keil
Digital Signal Processor (DSP)
STM32
24123
views
9
replies
Latest
2 months ago
by
roger-liu
Not Answered
freeRTOS demo DS-5 ERROR(CMD360) when trying to debug
+1
9341
views
12
replies
Latest
2 months ago
by
tolc
<
>
View all questions in Arm Development Studio forum