EasyManuals Logo

ARM Cortex A9 User Manual

ARM Cortex A9
213 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #45 background imageLoading...
Page #45 background image
Programmers Model
ARM DDI 0388I Copyright © 2008-2012 ARM. All rights reserved. 3-6
ID073015 Non-Confidential
3.5 Security Extensions architecture
Security Extensions enable the construction of a secure software environment. This section
describes the following:
System boot sequence.
See the ARM Architecture Reference Manual for more information.
3.5.1 System boot sequence
Caution
The Security Extensions enable the construction of an isolated software environment for more
secure execution, depending on a suitable system design around the processor. The technology
does not protect the processor from hardware attacks, and you must ensure that the hardware
containing the reset handling code is appropriately secure.
The processor always boots in the Privileged Supervisor mode in the Secure state, with the NS
bit set to 0. This means that code that does not attempt to use the Security Extensions always
runs in the Secure state. If the software uses both Secure and Non-secure states, the less trusted
software, such as a complex operating system, executes in Non-secure state, and the more
trusted software executes in the Secure state.
The following sequence is expected to be typical use of the Security Extensions:
1. Exit from reset in Secure state.
2. Configure the security state of memory and peripherals. Some memory and peripherals
are accessible only to the software running in Secure state.
3. Initialize the secure operating system. The required operations depend on the operating
system, and typically include initialization of caches, MMU, exception vectors, and
stacks.
4. Initialize Secure Monitor software to handle exceptions that switch execution between the
Secure and Non-Secure operating systems.
5. Optionally lock aspects of the secure state environment against additional configuration.
6. Pass control through the Secure Monitor software to the Non-Secure OS with an
SMC
instruction to enable the Non-secure operating system to initialize. The required
operations depend on the operating system, and typically include initialization of caches,
MMU, exception vectors, and stacks.
The overall security of the secure software depends on the system design, and on the secure
software itself.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the ARM Cortex A9 and is the answer not in the manual?

ARM Cortex A9 Specifications

General IconGeneral
ArchitectureARMv7-A
Cores1-4
SIMD ExtensionsNEON
ISAARM
MicroarchitectureCortex-A9
Instruction Width32-bit
Data Width32-bit
MMUYes
Instruction SetARMv7-A
Clock SpeedUp to 2 GHz
L1 Cache32 KB Instruction, 32 KB Data (per core)
Process Technology40 nm, 28 nm
Floating Point UnitVFPv3
Pipeline Depth8 stages
Power ConsumptionLow power design

Related product manuals