05.02.2013 Views

ARM Architecture Reference Manual ARMv7-A and ARMv7-R edition

ARM Architecture Reference Manual ARMv7-A and ARMv7-R edition

ARM Architecture Reference Manual ARMv7-A and ARMv7-R edition

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Application Level Programmers’ Model<br />

A2.1 About the Application level programmers’ model<br />

This chapter contains the programmers’ model information required for application development.<br />

The information in this chapter is distinct from the system information required to service <strong>and</strong> support<br />

application execution under an operating system. However, some knowledge of that system information is<br />

needed to put the Application level programmers' model into context.<br />

System level support requires access to all features <strong>and</strong> facilities of the architecture, a mode of operation<br />

referred to as privileged operation. System code determines whether an application runs in a privileged or<br />

unprivileged manner. When an operating system supports both privileged <strong>and</strong> unprivileged operation, an<br />

application usually runs unprivileged. This:<br />

permits the operating system to allocate system resources to it in a unique or shared manner<br />

provides a degree of protection from other processes <strong>and</strong> tasks, <strong>and</strong> so helps protect the operating<br />

system from malfunctioning applications.<br />

This chapter indicates where some system level underst<strong>and</strong>ing is helpful, <strong>and</strong> where appropriate it:<br />

gives an overview of the system level information<br />

gives references to the system level descriptions in Chapter B1 The System Level Programmers’<br />

Model <strong>and</strong> elsewhere.<br />

The Security Extensions extend the architecture to provide hardware security features that support the<br />

development of secure applications. For more information, see The Security Extensions on page B1-25.<br />

A2-2 Copyright © 1996-1998, 2000, 2004-2008 <strong>ARM</strong> Limited. All rights reserved. <strong>ARM</strong> DDI 0406B

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!