4.2.14. Secure Debug Enable Register

The SDER characteristics are:

Purpose

Controls Cortex-A9 debug,

Usage constraints

The SDER is:

  • only accessible in privileged modes.

  • only accessible in Secure state.

    Accesses in Non-secure state cause an undefined instruction exception.

Configurations

Available in all configurations.

Attributes

See the register summary in Table 4.7.

Figure 4.9 shows the SDER bit assignments.

Figure 4.9. SDER bit assignments


Table 4.11 shows the SDER bit assignments.

Table 4.11. SDER bit assignments

BitsNameDescription
[31:2]-Reserved
[1]Secure User Non-Invasive Debug Enable

0 = non-invasive debug not permitted in Secure User mode. This is the reset value.

1 = non-invasive debug permitted in Secure User mode.

[0]Secure User Invasive Debug Enable

0 = invasive debug not permitted in Secure User mode. This is the reset value.

1 = invasive debug permitted in Secure User mode.


To access the SDER, use:

MRC p15,0,<Rd>,c1,c1,1; Read Secure debug enable Register
MCR p15,0,<Rd>,c1,c1,1; Write Secure debug enable Register
Copyright © 2008-2009 ARM. All rights reserved.ARM DDI 0388E
Non-Confidential