Arm Community
Site
Search
User
Site
Search
User
Groups
Arm Research
DesignStart
Education Hub
Graphics and Gaming
High Performance Computing
Innovation
Multimedia
Open Source Software and Platforms
Physical
Processors
Security
System
Software Tools
TrustZone for Armv8-M
中文社区
Blog
Announcements
Artificial Intelligence
Automotive
Healthcare
HPC
Infrastructure
Innovation
Internet of Things
Machine Learning
Mobile
Smart Homes
Wearables
Forums
All developer forums
IP Product forums
Tool & Software forums
Pelion IoT Platform
Support
Open a support case
Documentation
Downloads
Training
Arm Approved program
Arm Design Reviews
Community Help
More
Cancel
Developer Community
Tools and Software
Software Tools
Jump...
Cancel
Software Tools
Arm Development Studio forum
TrustZone and CoreSight debug
Tools, Software and IDEs blog
Forums
Videos & Files
Help
Jump...
Cancel
New
Replies
2 replies
Subscribers
127 subscribers
Views
2415 views
Users
0 members are here
Related
TrustZone and CoreSight debug
Offline
china liu
over 7 years ago
Note: This was originally posted on 27th March 2013 at http://forums.arm.com
hi, experts:
If a CPU supports TZ feature.
Could a hacker use coresight debug tool to trace its internal data stream?
best wishes,
Top replies
Offline
Martin Weidmann
over 7 years ago
+1
Note: This was originally posted on 27th March 2013 at http://forums.arm.com There are several signals that control who can debug what. These include SPNIDEN (Secure Privileged Non-Invasive Debug Enable...
Offline
china liu
over 7 years ago
Note: This was originally posted on 28th March 2013 at
http://forums.arm.com
hi, ttfn:
thank you!
best wishes,
Cancel
Up
0
Down
View discussion
Cancel
Offline
Martin Weidmann
over 7 years ago
Note: This was originally posted on 27th March 2013 at
http://forums.arm.com
There are several signals that control who can debug what. These include SPNIDEN (Secure Privileged Non-Invasive Debug Enable) and SPIDEN (Secure Privileged Invasive Debug Enable). These signals are sampled by the processor at reset (and only at reset). Based on them, it will either allow/not allow debug of the secure world.
(For reference, Invasive debug is things like stepping and breakpoints. Non-invasive is things like trace.)
What you might expect is the production devices (going into real products) would have these signals tied to disable secure debug. While development boards would might have them tied to enable secure debug.
Debug of User mode is controlled by bits in a register. So it would be up to the secure OS whether you could debug secure apps.
There are also signals to enable/disable non-secure debug.
Cancel
Up
+1
Down
View discussion
Cancel
More questions in this forum
By title
By date
By reply count
By view count
By most asked
By votes
By quality
Descending
Ascending
All recent questions
Unread questions
Questions you've participated in
Questions you've asked
Unanswered questions
Answered questions
Questions with suggested answers
Questions with no replies
Answered
Dual-core debugging in DS
0
744
views
2
replies
Latest
3 days ago
by
Ivan Savvateev
Answered
Failure to get an evaluation license with error Unable to execute API call /api/v1/connect
0
1889
views
3
replies
Latest
9 days ago
by
Tim Holt
Suggested Answer
DS52020.0 connection to Musca-A/B boards not working
0
Arm Development Studio
Musca-A
3156
views
4
replies
Latest
11 days ago
by
Daniel Oliveira
Suggested Answer
Positioning a function in a Position Independent Executable for ARMV8
0
4089
views
3
replies
Latest
1 month ago
by
Stephen Theobald
Answered
Link a pure binary file to image with scatter file
0
4051
views
3
replies
Latest
1 month ago
by
Ronan Synnott
>
View all questions in Arm Development Studio forum