0b1010
Unlinked VMID + Context ID match.
0b1011
Linked VMID + Context ID match.
All other values are reserved.
The field break down is:
• BT[3:1]: Base type. If the breakpoint is not context-aware, these bits are
RES0
. Otherwise, the
possible values are:
0b000
Match address. DBGBVR
n
is the address of an instruction.
0b001
Match context ID. DBGBVR
n
[31:0] is a context ID.
0b010
Mismatch address. Behaves as type 0b000 if halting debug-mode is enabled and
halting is allowed.
Otherwise, DBGBVR
n
is the address of an instruction to be stepped.
0b100
Match VMID. DBGBVR
n
[7:0] is a VMID.
0b101
Match VMID and context ID. DBGBVR
n
[31:0] is a context ID, and
DBGBVR
n
[7:0] is a VMID.
• BT[0]: Enable linking.
LBN, [19:16]
Linked breakpoint number. For Linked address matching breakpoints, this specifies the index of
the Context-matching breakpoint linked to.
SSC, [15:14]
Security State Control. Determines the security states that a breakpoint debug event for
breakpoint
n
is generated.
This field must be interpreted with the
Higher Mode Control
(HMC), and
Privileged Mode
Control
(PMC), fields to determine the mode and security states that can be tested.
See the
Arm
®
Architecture Reference Manual Armv8, for Armv8-A architecture profile
for
possible values of the fields.
HMC, [13]
Hyp Mode Control bit. Determines the debug perspective for deciding when a breakpoint debug
event for breakpoint
n
is generated.
This bit must be interpreted with the SSC and PMC fields to determine the mode and security
states that can be tested.
See the
Arm
®
Architecture Reference Manual Armv8, for Armv8-A architecture profile
for
possible values of the fields.
[12:9]
Reserved,
RES0
.
BAS, [8:5]
Byte Address Select. Defines which half-words a regular breakpoint matches, regardless of the
instruction set and execution state. A debugger must program this field as follows:
0x3
Match the T32 instruction at DBGBVR
n
.
0xC
Match the T32 instruction at DBGBVR
n
+2.
0xF
Match the A64 or A32 instruction at DBGBVR
n
, or context match.
All other values are reserved.
The Armv8-A architecture does not support direct execution of Java bytecodes. BAS[3] and
BAS[1] ignore writes and on reads return the values of BAS[2] and BAS[0] respectively.
C6 AArch32 debug registers
C6.2 Debug Breakpoint Control Registers
100236_0100_00_en
Copyright © 2015–2017, 2019 Arm Limited or its affiliates. All rights
reserved.
C6-623
Non-Confidential
Summary of Contents for Cortex-A35
Page 4: ......
Page 18: ......
Page 26: ......
Page 27: ...Part A Functional Description ...
Page 28: ......
Page 145: ...Part B Register Descriptions ...
Page 146: ......
Page 573: ...Part C Debug ...
Page 574: ......
Page 845: ...Part D Appendices ...
Page 846: ......