armv8-a相关文档整理

Arm Armv8-A Architecture Registers(armv8-a寄存器说明)
Trusted Base System Architecture for Armv8-A(armv8-a安全架构)
Arm A-profile A32T32 Instruction Set Architecture(a32和t32指令集架构)
Arm A-profile A64 Instruction Set Architecture(a64指令集架构)
ARM Architecture Reference Manual Supplement ARMv8.1, for ARMv8-A architecture profile(补充介绍 ARM 体系结构 v8.1、ARMv8.1 引入的更改)
Armv8-A memory systems(ARMv8-a内存系统)
ARM® Cortex®-A Series Programmer's Guide for ARMv8-A(armv8-a程序员指南)
Arm Architecture Reference Manual for A-profile architecture(armv8-a和armv9-a的体系架构手册)

下载链接

This manual describes the ARM® architecture v8, ARMv8. The architecture describes the operation of an ARMv8-A Processing element (PE), and this manual includes descriptions of: • The two Execution states, AArch64 and AArch32. • The instruction sets: — In AArch32 state, the A32 and T32 instruction sets, that are compatible with earlier versions of the ARM architecture. — In AArch64 state, the A64 instruction set. • The states that determine how a PE operates, including the current Exception level and Security state, and in AArch32 state the PE mode. • The Exception model. • The interprocessing model, that supports transitioning between AArch64 state and AArch32 state. • The memory model, that defines memory ordering and memory management. This manual covers a single architecture profile, ARMv8-A, that defines a Virtual Memory System Architecture (VMSA). • The programmers’ model, and its interfaces to System registers that control most PE and memory system features, and provide status information. • The Advanced SIMD and floating-point instructions, that provide high-performance: — Single-precision and double-precision floating-point operations. — Conversions between double-precision, single-precision, and half-precision floating-point values. — Integer, single-precision floating-point, and in A64, double-precision vector operations in all instruction sets. — Double-precision floating-point vector operations in the A64 instruction set. • The security model, that provides two security states to support secure applications. • The virtualization model, that support the virtualization of Non-secure operation. • The Debug architecture, that provides software access to debug features.
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值