The DBGAUTHSTATUS_EL1 characteristics are:
Provides information about the state of the IMPLEMENTATION DEFINED authentication interface for debug.
This register is part of the Debug registers functional group.
AArch64 System register DBGAUTHSTATUS_EL1 is architecturally mapped to AArch32 System register DBGAUTHSTATUS.
AArch64 System register DBGAUTHSTATUS_EL1 is architecturally mapped to External register DBGAUTHSTATUS_EL1.
DBGAUTHSTATUS_EL1 is a 32-bit register.
The DBGAUTHSTATUS_EL1 bit assignments are:
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | SNID | SID | NSNID | NSID |
Reserved, RES0.
Secure non-invasive debug. Possible values of this field are:
SNID | Meaning |
---|---|
00 |
Not implemented. EL3 is not implemented and the implemented Security state is Non-secure state. |
10 |
Implemented and disabled. ExternalSecureNoninvasiveDebugEnabled() == FALSE. |
11 |
Implemented and enabled. ExternalSecureNoninvasiveDebugEnabled() == TRUE. |
Other values are reserved.
Secure invasive debug. Possible values of this field are:
SID | Meaning |
---|---|
00 |
Not implemented. EL3 is not implemented and the implemented Security state is Non-secure state. |
10 |
Implemented and disabled. ExternalSecureInvasiveDebugEnabled() == FALSE. |
11 |
Implemented and enabled. ExternalSecureInvasiveDebugEnabled() == TRUE. |
Other values are reserved.
Non-secure non-invasive debug. Possible values of this field are:
NSNID | Meaning |
---|---|
00 |
Not implemented. EL3 is not implemented and the implemented Security state is Secure state. |
10 |
Implemented and disabled. ExternalNoninvasiveDebugEnabled() == FALSE. |
11 |
Implemented and enabled. ExternalNoninvasiveDebugEnabled() == TRUE. |
Other values are reserved.
Non-secure invasive debug. Possible values of this field are:
NSID | Meaning |
---|---|
00 |
Not implemented. EL3 is not implemented and the implemented Security state is Secure state. |
10 |
Implemented and disabled. ExternalInvasiveDebugEnabled() == FALSE. |
11 |
Implemented and enabled. ExternalInvasiveDebugEnabled() == TRUE. |
Other values are reserved.
This register can be read using MRS with the following syntax:
MRS <Xt>, <systemreg>
This syntax uses the following encoding in the System instruction encoding space:
<systemreg> | op0 | op1 | CRn | CRm | op2 |
---|---|---|---|---|---|
DBGAUTHSTATUS_EL1 | 10 | 000 | 0111 | 1110 | 110 |
The register is accessible as follows:
Control | Accessibility | |||||
---|---|---|---|---|---|---|
E2H | TGE | NS | EL0 | EL1 | EL2 | EL3 |
x | x | 0 | - | RO | n/a | RO |
x | 0 | 1 | - | RO | RO | RO |
x | 1 | 1 | - | n/a | RO | RO |
This table applies to all instructions that can access this register.
For a description of the prioritization of any generated exceptions, see section D1.13.2 (Synchronous exception prioritization) in the ARM® Architecture Reference Manual, ARMv8, for ARMv8-A architecture profile. Subject to the prioritization rules, the following traps and enables are applicable when accessing this register.
When EL2 is implemented and is using AArch64 and SCR_EL3.NS==1 :
If MDCR_EL2.TDA==1, Non-secure read accesses to this register from EL1 are trapped to EL2.
When EL3 is implemented and is using AArch64 :
If MDCR_EL3.TDA==1, read accesses to this register from EL1 and EL2 are trapped to EL3.
02/05/2017 15:43
Copyright © 2010-2017 ARM Limited or its affiliates. All rights reserved. This document is Non-Confidential.