The DBGAUTHSTATUS characteristics are:
Provides information about the state of the IMPLEMENTATION DEFINED authentication interface for debug.
This register is part of the Debug registers functional group.
There is one instance of this register that is used in both Secure and Non-secure states.
AArch32 System register DBGAUTHSTATUS is architecturally mapped to AArch64 System register DBGAUTHSTATUS_EL1.
AArch32 System register DBGAUTHSTATUS is architecturally mapped to External register DBGAUTHSTATUS_EL1.
This register is required in all implementations.
DBGAUTHSTATUS is a 32-bit register.
The DBGAUTHSTATUS bit assignments are:
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | SNID | SID | NSNID | NSID |
Reserved, RES0.
Secure non-invasive debug. Possible values of this field are:
SNID | Meaning |
---|---|
00 |
Not implemented. EL3 is not implemented and the implemented Security state is Non-secure state. |
10 |
Implemented and disabled. ExternalSecureNoninvasiveDebugEnabled() == FALSE. |
11 |
Implemented and enabled. ExternalSecureNoninvasiveDebugEnabled() == TRUE. |
Other values are reserved.
Secure invasive debug. Possible values of this field are:
SID | Meaning |
---|---|
00 |
Not implemented. EL3 is not implemented and the implemented Security state is Non-secure state. |
10 |
Implemented and disabled. ExternalSecureInvasiveDebugEnabled() == FALSE. |
11 |
Implemented and enabled. ExternalSecureInvasiveDebugEnabled() == TRUE. |
Other values are reserved.
Non-secure non-invasive debug. Possible values of this field are:
NSNID | Meaning |
---|---|
00 |
Not implemented. EL3 is not implemented and the implemented Security state is Secure state. |
10 |
Implemented and disabled. ExternalNoninvasiveDebugEnabled() == FALSE. |
11 |
Implemented and enabled. ExternalNoninvasiveDebugEnabled() == TRUE. |
Other values are reserved.
Non-secure invasive debug. Possible values of this field are:
NSID | Meaning |
---|---|
00 |
Not implemented. EL3 is not implemented and the implemented Security state is Secure state. |
10 |
Implemented and disabled. ExternalInvasiveDebugEnabled() == FALSE. |
11 |
Implemented and enabled. ExternalInvasiveDebugEnabled() == TRUE. |
Other values are reserved.
This register can be read using MRC with the following syntax:
MRC <syntax>
This syntax uses the following encoding in the System instruction encoding space:
<syntax> | opc1 | opc2 | CRn | coproc | CRm |
---|---|---|---|---|---|
p14, 0, <Rt>, c7, c14, 6 | 000 | 110 | 0111 | 1110 | 1110 |
The register is accessible as follows:
Control | Accessibility | |||||
---|---|---|---|---|---|---|
E2H | TGE | NS | EL0 | EL1 | EL2 | EL3 |
x | x | 0 | - | RO | n/a | RO |
x | 0 | 1 | - | RO | RO | RO |
x | 1 | 1 | - | n/a | RO | RO |
This table applies to all instructions that can access this register.
For a description of the prioritization of any generated exceptions, see section G1.11.2 (Exception priority order) in the ARM® Architecture Reference Manual, ARMv8, for ARMv8-A architecture profile for exceptions taken to AArch32 state, and section D1.13.2 (Synchronous exception prioritization) for exceptions taken to AArch64 state. Subject to the prioritization rules, the following traps and enables are applicable when accessing this register.
When EL2 is implemented and is using AArch64 and SCR_EL3.NS==1 :
If MDCR_EL2.TDA==1, Non-secure read accesses to this register from EL1 are trapped to EL2.
When EL2 is implemented and is using AArch32 and SCR_EL3.NS==1 :
If HDCR.TDA==1, Non-secure read accesses to this register from EL1 are trapped to Hyp mode.
When EL3 is implemented and is using AArch64 :
If MDCR_EL3.TDA==1, read accesses to this register from EL1 and EL2 are trapped to EL3.
28/09/2017 08:24
Copyright © 2010-2017 ARM Limited or its affiliates. All rights reserved. This document is Non-Confidential.