SLAAEO4 November 2025 MSPM0G3507 , MSPM0L1306
The serial wire debug (SWD) related policies configure the available functions in the physical debug interface of the device. MSPM0 devices support three generic security levels: no restrictions (Level 0), custom restrictions (Level 1), and fully restricted (Level 2). Table 3-2 shows the three generic security levels, from least restrictive to most restrictive, including the differences between each level.
| Level | Scenario | SW-DP Access Policy | APP Debug Policy | Mass Erase Policy | Factory Reset Policy | TI FA Policy |
|---|---|---|---|---|---|---|
| 0 | No restrictions | EN | EN | EN,DIS(1) | EN | EN |
| 1 | Custom restrictions | EN | EN, EN with PW, DIS | EN, EN with PWDIS | EN, EN with PW,DIS | EN, DIS |
| 2 | Fully restricted | DIS | Do not care(2)(access in not possible when SW-DP is disabled) | |||
By default, TI provides MSPM0 in an unrestricted state. The unrestricted state allows for easy production programming, evaluation, and development. However, this unrestricted state is not recommended for mass production, as the unrestricted states leaves a large attack surface present.
There are 4 main uses of the SWD interface to take into consideration when determining protection needs:
The SWD security policies are implemented as 16-bit pattern-match fields in the NONMAIN memory, with the following characteristics:
SWD also supports customizing four sets of passwords (128 bits in total), used to unlock device using a debug subsystem mailbox (DSSM) command. See the Hardware Programming and Debugger Guide for MSPM0 application note for detailed instructions.