Skip to content

Commit

Permalink
Update intro.adoc
Browse files Browse the repository at this point in the history
Co-authored-by: Paul Donahue <[email protected]>
Signed-off-by: Aote Jin <[email protected]>
  • Loading branch information
AoteJin and pdonahue-ventana authored Sep 25, 2024
1 parent 8f9ef59 commit 517d8bb
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion intro.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ A summary of the changes introduced by _The RISC-V External Debug Security Speci
- *Per-Hart Trace Control:* Introduce per-hart states to control whether tracing is allowed in M-mode and/or supervisor domains.
- *Non-secure debug:* Add a non-secure debug state to relax security constraints.
- *Debug Mode entry:* External debugger can only halt the hart and enter debug mode when debug is allowed in current privilege mode; all operations are executed with <<dbgaccpriv, debug access privilege>> instead of M-mode privilege.
- *Memory Access:* Memory access from a hart’s point of view using a Program Buffer or the Abstract Command must be checked by the hart's memory protection mechanisms as if the hart is running at <<dbgaccpriv, debug access privilege>>; memory access from Debug Module using System Bus Access block without involving a hart must be checked by system memory protection mechanism, such as IOPMP or WorldGuard.
- *Memory Access:* Memory access from a hart’s point of view using the Program Buffer or an Abstract Command must be checked by the hart's memory protection mechanisms as if the hart is running at <<dbgaccpriv, debug access privilege>>; memory access from the Debug Module using System Bus Access must be checked by a system memory protection mechanism, such as IOPMP or WorldGuard.
- *Register Access:* Register access using Program Buffer or the Abstract Command works as if the hart is running in <<dbgaccpriv, debug access privilege>> instead of M-mode privilege. The debug CSRs (`dcsr` and `dpc` ) are shadowed in supervisor domains while Smtdeleg/Sstcfg extensions expose the trigger CSRs to supervisor domains through indirect CSR access.
- *Triggers:* Triggers (with action=1) can only fire or match when external debug is allowed in current privilege.

Expand Down

0 comments on commit 517d8bb

Please sign in to comment.