From 6050dfdf1f40f9f4e210078afc61156a136543dc Mon Sep 17 00:00:00 2001 From: Aote Jin Date: Fri, 13 Dec 2024 17:29:34 +0800 Subject: [PATCH] Update intro.adoc (#71) add citation for Smstateen Signed-off-by: Aote Jin --- intro.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/intro.adoc b/intro.adoc index 86dd45d..3f20459 100644 --- a/intro.adoc +++ b/intro.adoc @@ -12,7 +12,7 @@ A summary of the changes introduced by _The RISC-V External Debug Security Speci - *Non-secure debug:* Add a non-secure debug state to relax security constraints. - *Debug Mode entry:* An external debugger can only halt the hart and enter debug mode when debug is allowed in current privilege mode. - *Memory Access:* Memory access from a hart’s point of view, using the Program Buffer or an Abstract Command, must be checked by the hart's memory protection mechanisms as if the hart is running at <>; memory access from the Debug Module using System Bus Access must be checked by a system memory protection mechanism, such as IOPMP or WorldGuard. - - *Register Access:* Register access using the Program Buffer or an Abstract Command works as if the hart is running at <> instead of M-mode privilege level. The debug CSRs (`dcsr` and `dpc` ) are shadowed in supervisor domains while Smtdeleg cite:[smtdeleg] and Smstateen extensions expose the trigger CSRs to supervisor domains. + - *Register Access:* Register access using the Program Buffer or an Abstract Command works as if the hart is running at <> instead of M-mode privilege level. The debug CSRs (`dcsr` and `dpc` ) are shadowed in supervisor domains while Smtdeleg cite:[smtdeleg] and Smstateen cite:[smtdeleg] extensions expose the trigger CSRs to supervisor domains. - *Triggers:* Triggers (with action=1) can only fire or match when external debug is allowed in the current privilege mode. === Terminology