4.12. Tracing security state changes

The following subsections describe the tracing of security state changes:

Note

See the ARM Architecture Reference Manual for the ARM recommendations for changing between Secure and Non-secure security states. To avoid security holes it is very important that you follow these recommendations. This section includes descriptions of the tracing of security state change methods that ARM recommends that you do not use.

Copyright © 1999-2002, 2004-2008, 2011 ARM. All rights reserved.ARM IHI 0035B
Non-ConfidentialID060811