摘要:
An apparatus comprises at least one port for coupling signals to the apparatus, a mode selector for setting the apparatus to a normal mode or a debug mode, and a port control for controlling access to secure information in the apparatus through the port in accordance with the selected mode. A method for controlling access to the port is also provided.
摘要:
In general, this disclosure describes techniques for implementing a system-wide reset of multiple devices. The techniques ensure that when any one of the devices of the system is reset, all the devices are reset. For example, a system includes a master reset device and a plurality of slave reset devices that are interconnected by a single reset line to provide improved robustness against electrostatic discharge (ESD) and electromagnetic pulse events. The master reset device detects a reset signal on the reset line and retransmits a true reset signal on the reset line in response to detecting the reset signal. Additionally, the master reset device may enter a blocking state after retransmitting the true reset signal to prevent detecting the reset signal that it transmitted on the reset line to avoid reset lockup.
摘要:
In general, this disclosure describes techniques for implementing a system-wide reset of multiple devices. The techniques ensure that when any one of the devices of the system is reset, all the devices are reset. For example, a system includes a master reset device and a plurality of slave reset devices that are interconnected by a single reset line to provide improved robustness against electrostatic discharge (ESD) and electromagnetic pulse events. The master reset device detects a reset signal on the reset line and retransmits a true reset signal on the reset line in response to detecting the reset signal. Additionally, the master reset device may enter a blocking state after retransmitting the true reset signal to prevent detecting the reset signal that it transmitted on the reset line to avoid reset lockup.
摘要:
A system and method of verifying data transferred along a data path from one buffer, such as a user buffer in the host system to a second buffer, such as a disc drive buffer on a disc drive system by using the receiving device to test the information and provide a confirmation or error signal to the sending device. The system and method appends non-abstract identification tags to the abstract data in the first buffer, i.e., the data to be stored to and/or read from the storage device. The tags are transmitted along with the abstract data and provide unique information that is used by either the disc drive device or the host system to validate data received from the other. The validation is based on a comparison of the tag values to a predetermined control value that may be received prior to receiving the abstract data.
摘要:
A method of communicating between an initial device and a target device connected by a plurality of intermediate segments in a distributed arbitration system is provided. The method includes establishing an arbitration timer for a communication request by the initial device. Furthermore, use of each of the intermediate segments is arbitrated based on the arbitration timer.
摘要:
A method of discovering and assigning unique addresses to devices connected by at least one expander in a system is provided. The method includes locating each expander in the system. Also, devices connected to each of the located expanders in the system are scanned. Additionally, the method includes reporting a status of each device connected to the located expanders.
摘要:
A system and method of verifying data transferred along a data path from one buffer, such as a user buffer in the host system to a second buffer, such as a disc drive buffer on a disc drive system by using the receiving device to test the information and provide a confirmation or error signal to the sending device. The system and method appends non-abstract identification tags to the abstract data in the first buffer, i.e., the data to be stored to and/or read from the storage device. The tags are transmitted along with the abstract data and provide unique information that is used by either the disc drive device or the host system to validate data received from the other. The validation is based on a comparison of the tag values to a predetermined control value that may be received prior to receiving the abstract data.