B1.107 Secure Debug Enable Register
The SDER characteristics are:
Purpose
Controls invasive and non-invasive debug in the Secure EL0 state.
Usage constraints
This register is accessible as follows:
EL0
(NS)
EL0
(S)
EL1
(NS)
EL1
(S)
EL2 EL3
(SCR.NS = 1)
EL3
(SCR.NS = 0)
-
-
-
RW -
RW
RW
Configurations
SDER is architecturally mapped to AArch64 register SDER32_EL3. See
This register is accessible only in Secure state.
If EL3 is using AArch32, write access to SDER is disabled when the
CP15SDISABLE2
signal
is asserted HIGH.
Attributes
SDER is a 32-bit register.
31
0
RES
0
SUNIDEN
SUIDEN
1
2
Figure B1-60 SDER bit assignments
[31:2]
Reserved,
RES0
.
SUNIDEN, [1]
Secure User Non-invasive Debug Enable. The possible values are:
0
Non-invasive debug not permitted in Secure EL0 state. This is the Warm reset value.
1
Non-invasive debug permitted in Secure EL0 state.
SUIDEN, [0]
Secure User Invasive Debug Enable. The possible values are:
0
Invasive debug not permitted in Secure EL0 state. This is the Warm reset value.
1
Invasive debug permitted in Secure EL0 state.
To access the SDER:
MRC p15,0,<Rt>,c1,c1,1 ; Read SDER into Rt
MCR p15,0,<Rt>,c1,c1,1 ; Write Rt to SDER
Register access is encoded as follows:
B1 AArch32 system registers
B1.107 Secure Debug Enable Register
100236_0100_00_en
Copyright © 2015–2017, 2019 Arm Limited or its affiliates. All rights
reserved.
B1-337
Non-Confidential
Summary of Contents for Cortex-A35
Page 4: ......
Page 18: ......
Page 26: ......
Page 27: ...Part A Functional Description ...
Page 28: ......
Page 145: ...Part B Register Descriptions ...
Page 146: ......
Page 573: ...Part C Debug ...
Page 574: ......
Page 845: ...Part D Appendices ...
Page 846: ......