您好,欢迎光临本网站![请登录][注册会员]  
文件名称: arm手册.pdf
  所属分类: Android
  开发工具:
  文件大小: 14mb
  下载次数: 0
  上传时间: 2019-07-13
  提 供 者: weixin_********
 详细说明:arm手册 pdfDate Versio Changes 29/0312016A.a Confidential Beta release. limited circulation Beta DDI0553B g Copyright C 2015-2019 Arm Limited or its affiliates. All rights reserved 0-ii1 1D29o32019 Non-confidential Armv8-M Architecture Reference Manual Copyright o 2015-2019 Arm Limited or its affiliates. All rights reserved. The copyright statement reflects the fact that some draft issues of this document have been released. to a limited circulation Proprietary Notice This document is protected by copyright and other related rights and the practice or implementation of the information contained in this document may be protected by one or more patents or pending patent applications. No part of this document may be reproduced in any form by any means without the express prior written permission of Arm. No license, express or implied, by estoppel or otherwise to any intellectual property rights is granted by this document unless specifically stated Your access to the information in this document is conditional upon your acceptance that you will not use or permit others to us the information for the purposes of determining whether implementations infringe any third party patents THIS DOCUMENT IS PROVIDEDAS IS. ARM PROVIDES NO REPRESENTATIONS AND NO WARRANTIES EXPRESS IMPLIED OR STATUTORY INCLUDING WITHOUT LIMITATION. THE IMPLIED WARRANTIES OF MERCHANTABIL ITY, SATISFACTORY QUALITY, NON-INFRINGEMENT OR FITNESS FOR A PARTICULAR PURPOSE WITH RESPECT TO THE DOCUMENT. For the avoidance of doubt, Arm makes no representation with respect to, and has undertaken no analysis o identify or understand the scope and content of, third party patents, copyrights, trade secrets, or other rights This document may include technical inaccuracies or typographical errors TO THE EXTENT NOT PROHIBITED BY LAW. IN NO EVENT WILL ARM BE LIABLE FOR ANY DAMAGES. INCLUD ING WITHOUT LIMITATION ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES. HOWEVER CAUSED AND REGARDLESS OF THE THEORY OF LIABILITY ARISING OUT OF ANY US OF THIS DOCUMENT. EVEN IF ARM HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES This document consists solely of commercial items. You shall be responsible for ensuring that any use, duplication or disclosure of this document complies fully with any relevant export laws and regulations to assure that this document or any portion thereof is not exported, directly or indirectly, in violation of such export laws. Use of the word"partner"in reference to Arms customers is not intended to create or refer to any partnership relationship with any other company. Arm may make changes to this document at any time and without notice If any of the provisions contained in these terms conflict with any of the provisions of any click through or signed written agreement covering this document with Arm, then the click through or signed written agreement prevails over and supersedes the conflicting provisions of these terms. This document may be translated into other languages for convenience, and you agree that if there is any confict between the english version of this document and any translation, the terms of the English version of the Agreement shall prevail The Arm corporate logo and words marked with or TM are registered trademarks or trademarks of Arm Limited or its subsidiaries) in the Us and/or elsewhere. All rights reserved. Other brands and names mentioned in this document may be the trademarks of their respective owners. Please follow Arms trademark usage guidelines at http://www.arm.com/company/policies/trademarks Copyright o 2015-2019 Arm Limited (or its affiliates). All rights reserved Arm Limited. Company 02557590 registered in England 110 Fulbourn Road, Cambridge, England cbl 9NJ LES-PRE-20349 Confidentiality Status This document is Non-confidential. The right to use, copy and disclose this document may be subject to license restrictions in accordance with the terms of the agreement entered into by Arm and the party that arm delivered this document to DDI0553B g Copyright C 2015-2019 Arm Limited or its affiliates. All rights reserved D29o32019 Non-confidential Product status The information in this document is final, that is for a developed product Web address http://www.arm DDI0553B g Copyright C 2015-2019 Arm Limited or its affiliates. All rights reserved 1D29o32019 Non-confidential Contents Armv8-M Architecture Reference Manual Release informatic ArmV8-M Architecture Reference Manual Proprietary Notice Confidentiality s Product status Web Address Preface About this book Using this book XXXVIIl Conventions Typographical conventions Signals Numbers Pseudocode descripti Assembler syntax descriptions Additional reading Arm publications X Other publications Feed back xlii Feedback on this book xIL Part A Armv8-M Architecture Introduction and overview Chapter A Introduction A1.1 Document layout and terminology 46 A1.1. 1 Structure of the document 46 A1.1.2 Scope of the document 47 A1.1.3 Intended audience 47 A1. 1.4 Terminology, phrases 47 A1. 1.5 Terminology, Armv8-M specific terms A1.2 About the Armv8 architecture, and architecture profiles 49 A1. 3 The Armv8-M architecture profile 50 A1.3. 1 Security Extension 50 A1.3.2 MPU model 50 A1.3.3 Nested Vector Interrupt controller A1.3. 4 Stack pointers 50 A1.3.5 The Armv8-M instruction set 51 A1.3.6 Debug .51 A1.3.7 Reliability, Availability, and Serviceability 51 A1.4 ArmV8-M variants 52 A1.4.1 Features of Armv8 1-M A1. 4.2 Interaction between MVE and the Floating-point Extension in Armv8 1-M 58 Part B ArmV8-M Architecture rules Chapter B1 Resets DDI0553B g Copyright C 2015-2019 Arm Limited or its affiliates. All rights reserved D29o32019 Non-confidential Contents B1.1 Resets Cold reset, and Warm reset 62 Chapter b2 Power Management B2.1 Power management 64 B2.1. 1 The Wait for Event(WFE)instruction 64 B2. 1.2 The Event registe 64 B2. 1.3 The Wait for Interrupt(WFI) instruction 65 B2.2 Sleep on exit Chapter B3 Programmers Model B3. PE modes, Thread mode and Handler mode B3. 2 Privileged and unprivileged execution B3.3 Registers B3. 4 Special-purpose CONT ROL register 73 B35 XPSR. APSR. IPSR and EPSR 74 B3.5.1 Interrupt Program Status Register(IPSR 75 B3.5.2 Execution Program Status Register(EPSR B3.6 Security states: Secure state, and Non-secure state B3.7 Security states and register banking between Security states 78 B3.8 Stack pointer B3. 9 EXception numbers and exception priority numbers 81 B3. 10 EXception enable, pending, and active bits 84 B3. 1 1 Security states, exception banking 86 B3.12 Faults 88 B3.13 Priority model 92 B3. 14 Secure address protection B3. 15 Security state transitions 97 B3.16 Function calls from Secure state to Non-secure state 99 B3.17 Function returns from Non -secure state 100 B3. 18 EXception handling 102 B3.19 EXception entry, context stacking 104 B3. 20 Exception entry, register clearing after context stacking 112 B3.21 Stack limit checks 113 B3.22 Exception return B3.23 Integrity signature 120 B3.24 Exceptions during exception entry 121 B3.25 Exceptions during exception return 123 B3.26 Tail-chai 124 B3.27 Exceptions, instruction resume, or instruction restart ,,127 B3.28 Low overhead lo 130 B3.29 Branch future 133 B3.30 Vector tables 135 B3. 31 Hardware-controlled priority escalation to HardFault 137 B3.32 Special-purpose mask registers, PRIMASK, BASEPRI, FAULTMASK, for con figurable priority boosting 138 B3.33 Lockup B3 33.1 Instruction-related lockup behavior 140 B3.33.2 Exception- related lockup behavior 142 Errors when unstacking state on exception return 144 B3. 34 Data independent timing B3.35 Context Synchronization event 149 B3.36 Coprocessor suppe 150 Chapter B4 Floating-point Support B4.1 The optional Floating-point Extension, FPV5 152 DDI0553B g Copyright C 2015-2019 Arm Limited or its affiliates. All rights reserved D29o32019 Non-confidential Contents B4.2 About the Floating-point Status and Control Registers 154 B4.3 Registers for Floating-point data processing, So-S31, or DO-D15 155 B4.4 Floating-point standards and terminology 156 B4.5 Floating-point data representable 157 B4.6 Floating-point encoding formats, half-precision, single-precision, and double precision 158 B4.7 The IEEE 754 Floating-point exceptions 160 B4.8 The flush-to-zero mode 161 B4.8. 1 The Flush to zero mode half-precision calculations 162 B4.9 The Default Nan mode, and Nan handling 163 B4.10 he Default naN 164 B4.11 Combinations of Floating-point exceptions 165 B4.12 Priority of Floating-point exceptions relative to other Floating-point exceptions 166 Chapter B5 Vector Extension B5.1 Vector Extension operation 168 B52 Vector register file 169 B53 anes B54 Beats 171 B55 Exception state B56 Predication/conditional execution 177 B5.6. 1 Loop tail predication 177 B5.6.2 VPT predication 178 B5.6.3 Eftects of predication ....181 B5.6. 4 T block 183 B5.7 MVE interleaving/de- interleaving loads and stores 184 Chapter B6 Memory Model B6. 1 Memory accesses ........187 B6.2 Address space 188 B63 Endianness 189 B6. 4 Alignment behavior 191 B65 Atomicit' 192 B6.5. 1 Single-copy atomicity 192 B6.5.2 Multi-copy atomicity 192 B6.6 Concurrent modification and execution of instructions 194 Access rights 196 B6.8 Observability of memory accesses 198 B6.9 Completion of memory accesses ,,,,,200 B6. 10 Ordering requirements for memory accesses ....201 B6. 11 Ordering of implicit memory accesses .202 B6. 12 Ordering of explicit memory accesses 203 B6. 13 Memory barriers B6.13.1 Instruction Synchronization barrier 204 36. 13.2 Data Memory barrier 204 B6 13.3 Data Synchronization Barrier 05 B6 13.4 Consumption of Speculative Data Barrier 206 B6. 13.5 Physical Speculative Store Bypass Barrier 207 B6. 13.6 Speculative Store Bypass Barrier 207 B6.13.7 Synchronization requirements for System Control Space 208 B614 Normal meme 209 B6.15 Cacheability attributes B6.16 Device mer 212 B6.17 Device memory attributes 214 B6 17.1 Gathering and non-Gathering Device memory attributes .215 DDI0553B g Copyright C 2015-2019 Arm Limited or its affiliates. All rights reserved D29o32019 Non-confidential Contents B6 17.2 Reordering and non -Reordering Device memory attributes 215 B6. 17.3 Early Write Acknowledgement and no Early Write Acknowledgement Device memory attributes 216 B6. 18 Shareability domains 217 B6.19 Shareability attributes 219 B6.20 Memory access restrictions B6.21 Mismatched memory attribute 21 B6.22 Load-EXclusive and Store- Exclusive accesses to Normal memory 223 B6.23 Load-Acquire and Store-Release accesses to memory B6.24 Caches B6.25 Cache identification 228 B6.26 Cache visibilit 229 B6.27 Cache coherency 230 B6.28 Cache enabling and disabling B6.29 Cache behavior at reset 232 B6.30 Behavior of Preload Data(PLD) and Preload Instruction( PLl)instructions with caches 233 B6.31 Branch predictors 234 B6.32 Cache maintenance operations 235 B6.33 Ordering of cache maintenance operations 239 B6. 34 Branch predictor maintenance operations 240 Chapter B7 The System Address Map B71 System address map 242 B7.2 The System region of the system address map .243 B7.3 The System Control Space(SCS 246 Chapter B8 Synchronization and Semaphores B8.1 Exclusive access instructions 248 B8.2 The local monitors 249 B8.3 The global monitor .251 B8.3.1 Load-Exclusive and Store-Exclusive 252 B8.3.2 Load-Exclusive and Store-Exclusive in Shareable memory 253 B8. 4 Exclusive access instructions and the monitors 255 B8.5 Load-Exclusiye and store-Exclusive instruction constraints Chapter B9 The Armv8-M Protected Memory System Architecture B9.1 Memory Protection Unit 259 B9.2 262 B9. 3 Security attribution unit (SAU) .266 B9.4 IMPLEMENTATION DEFINED Attribution Unit (IDAU 267 Chapter B10 The System Timer, Sys Tick B10.1 The system timer, SysTick 269 Chapter B11 Nested Vectored Interrupt Controller B11.1 Nvic definition ....272 B11.2 NVIC operation 273 Chapter B12 Debug B12.1 Debug feature overview 276 B12.1.1 Debug mechanisms B12.1.2 Debug resources ..,.280 B12.1.3 Trace 281 B12.2 Accessing debug features ,..,,283 B12.2.1 ROM table 283 DDI0553B g Copyright C 2015-2019 Arm Limited or its affiliates. All rights reserved D29o32019 Non-confidential B12. 2.2 Debug System registers 285 B12. 2.3 Core Sight and identification registers 286 B12.3 Debug authentication inter 288 B12.3.1 Halting debug authentication 289 B12.3.2 Non-invasive debug authentication 292 B12.3.3 DebugMonitor exception authentication 294 B12.3.4 Unprivileged DebugMonitor Authentication 295 B12.3.5 DAP access permissions B12.4 Debug event behavior 301 B12.4.1 About debug events B12.4.2 Debug stepping 307 B12.4.3 Vector catch 311 B12. 4. 4 Breakpoint instructi 314 B12.4.5 External debug request .315 B12.5 Debug state 317 B12.6 Exiting Debug state 321 B12.7 Multiprocessor support B12.7.1 Cross-halt event 322 B12.7.2 External restart request Chapter B13 Debug and Trace Components B13.1 Instrumentation trace macrocell .324 B13.1.1 About the ITm 324 B13.1.2 M operation 325 B13.1.3 T imestamp support 327 B13.1.4 Synchronization support 331 B13.1.5 Continuation bits 331 B13.2 Data Watchpoint and Trace unit 333 B13.2. 1 About the dWt B13.2.2 DWT unit operation ..334 B13.2.3 Constraints on programming dwt comparators B13.2.4 CMPMATCH trigger events 342 B13.2.5 Matching in detail 342 B13.2.6 DWT match restrictions and relaxations 346 B13.2.7 DWT trace restrictions and relaxations 348 B13.2.8 CYcCNT cycle counter and related timers 349 B13.2. 9 Profiling counter support 35 B13.2.10 Program Counter sampling support 352 B13.3 Embedded Trace Macrocell B13.4 Trace Port Interface Unit 356 B13.5 Flash Patch and breakpoint unit ..358 B13.5.1 About the FPb unit B13.5.2 FPB unit operation 358 B13.5.3 Cache maintenance 361 Chapter B14 The Performance Monitoring Unit Extension B14.1 Counters 363 B14.2 Accuracy of the performance counters 364 B14.3 Security, access, and modes 365 B14. Attributability 366 B145 Coexistence with the dwt performance monitors 367 B14.6 Interrupts and Debug events B14.7 List of supported architectural and microarchitectural events .369 B14.8 Generic architectural and microarchitectural events 375 B14.8.1 Ll CACHE REFILL (Levek instruction cache refi .375 DDI0553B g Copyright C 2015-2019 Arm Limited or its affiliates. All rights reserved 1D29o32019 Non-confidential
(系统自动生成,下载前可以参看下载内容)

下载文件列表

相关说明

  • 本站资源为会员上传分享交流与学习,如有侵犯您的权益,请联系我们删除.
  • 本站是交换下载平台,提供交流渠道,下载内容来自于网络,除下载问题外,其它问题请自行百度
  • 本站已设置防盗链,请勿用迅雷、QQ旋风等多线程下载软件下载资源,下载后用WinRAR最新版进行解压.
  • 如果您发现内容无法下载,请稍后再次尝试;或者到消费记录里找到下载记录反馈给我们.
  • 下载后发现下载的内容跟说明不相乎,请到消费记录里找到下载记录反馈给我们,经确认后退回积分.
  • 如下载前有疑问,可以通过点击"提供者"的名字,查看对方的联系方式,联系对方咨询.
 相关搜索: arm手册下载
 输入关键字,在本站1000多万海量源码库中尽情搜索: