The system groups wanted some visibility into the processor while the system
was operating, this included the Program Counter (PC) and some other
important architectural registers. These registers were chosen as they
would provide the best insight into the processor during system debug
phase. Mask and Shadow chain techniques are used for implementing this.
Mask chains are simple scan chains that are used to control the logging
of data that is eventually accessible through the shadow chain. This is
very useful as the mask chain can log the errors and they can be viewed
later by the Shadow scan chain. Shadow/Mask combination can successfully
detect bus protocol violations.