Precautions#
Device Erase for Secure Debug#
Disabling the Device Erase is mandatory for secure debug as described in the following table.
| Device Erase | Description |
|---|---|
| Enabled | By using erasedevice command, entire Flash contents can be erased, except OTP and Userdata contents. Ifsecurity erasedevice is enabled on production devices, it may expose the device to significant security risks, as malicious actors could potentially reprogram it with unauthorized or malicious firmware. |
| Disabled |
|
Notes:
Advised not to disable Device Erase during development phase as it is one time operation.
Without enabling Secure Debug disabling Device Erase will make the device permanently not usable.
Run the security disabledeviceerase command to disable Device Erase.
commander security disabledeviceerase --device sixg301 --serialno 440326972================================================================================
THIS IS A ONE-TIME command which Permanently disables device erase.
If secure debug lock has not been set, there is no way to regain debug access to this device. Type 'continue' and hit enter to proceed or Ctrl-C to abort:
================================================================================
continue
Disabled device erase successfully
DONESecure Boot and Debug Lock#
The following table describes the different debug lock scenarios on the secure boot-enabled device.
Secure Debug | Device Erase | Debug Lock | State | Recover from Secure Boot Failure |
|---|---|---|---|---|
Disabled | Enabled | Disabled | Standard debug unlock | Flash a correctly signed image. |
Disabled | Enabled | Enabled | Standard debug lock | Flash a correctly signed image after standard debug unlocking the device. |
Disabled | Disabled | Enabled | Permanent debug lock | There is no way to recover the device. Make sure the programmed image is correctly signed before locking the device. |
Enabled | Disabled | Enabled | Secure debug lock | Flash a correctly signed image after secure debug unlocking the device. |
Note: See Recover Devices when Secure Boot Fails in Series 2 and Series 3 Secure Boot with RTSL to flash a correctly signed image on different debug lock scenarios.
Limitation on Roll Challenge#
On Series 2 devices, challenge can be rolled any number of times, whereas on Series 3, challenge can be rolled a maximum of 128 times. Once a user has reached the 128 number of maximum rolls for debug challenges, new challenges will no longer be generated. The user will be able to continue to unlock the device using the last generated challenge..