Skip to content

Commit 010b56a

Browse files
committed
Bump pdf to match with adoc
1 parent 9a77ef7 commit 010b56a

File tree

2 files changed

+1
-1
lines changed

2 files changed

+1
-1
lines changed

external-debug-security.pdf

11 Bytes
Binary file not shown.

intro.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ A summary of the changes introduced by _The RISC-V External Debug Security Speci
1212
- *Non-secure debug:* Add a non-secure debug state to relax security constraints.
1313
- *Debug Mode entry:* An external debugger can only halt the hart and enter debug mode when debug is allowed in current privilege mode.
1414
- *Memory Access:* Memory access from a hart’s point of view, using the Program Buffer or an Abstract Command, must be checked by the hart's memory protection mechanisms as if the hart is running at <<dbgaccpriv, debug access privilege level>>; memory access from the Debug Module using System Bus Access must be checked by a system memory protection mechanism, such as IOPMP or WorldGuard.
15-
- *Register Access:* Register access using the Program Buffer or an Abstract Command works as if the hart is running at <<dbgaccpriv, debug access privilege level>> instead of M-mode privilege level. The debug CSRs (`dcsr` and `dpc` ) are shadowed in supervisor domains while Smtdeleg cite:[smtdeleg] and Smstateen extension exposes the trigger CSRs to supervisor domains.
15+
- *Register Access:* Register access using the Program Buffer or an Abstract Command works as if the hart is running at <<dbgaccpriv, debug access privilege level>> instead of M-mode privilege level. The debug CSRs (`dcsr` and `dpc` ) are shadowed in supervisor domains while Smtdeleg cite:[smtdeleg] and Smstateen extensions expose the trigger CSRs to supervisor domains.
1616
- *Triggers:* Triggers (with action=1) can only fire or match when external debug is allowed in the current privilege mode.
1717

1818
=== Terminology

0 commit comments

Comments
 (0)