Open Access Open Access  Restricted Access Subscription or Fee Access

Linux Kernel on ARM9

Pradip Ram Selokar, PT Karule

Abstract


ARM9 supports the Linux Kernel. On a development system, it is advantageous to load the Root File System (RFS) through Network File System (NFS). Several pieces of software are involved to boot a Linux Kernel on SAM9 products. First is the ROM code which is in charge to check if a valid application is present on supported media (FLASH, DATAFLASH, NANDFLASH, and SDCARD). The boot sequence of Linux for SAM is done in several steps as Boot Program, AT91Bootstrap, U-Boot, Linux kernel and Root File System. The Boot Program is an application to check if a valid application is present in FLASH and if it is the case downloads it into internal SRAM. AT91Bootstrap is in charge of hardware configuration, download U-Boot binary from FLASH to SDRAM, to start the boot loader. U-Boot is the boot loader, in charge of download kernel binaries from FLASH, network, USB key etc. to start the kernel. Linux kernel is the operating system kernel. The Root File system contains applications executed on the target, using the OS kernel services.


Keywords


ARM9, Root File System (RFS), Network File System (NFS), U-Boot, Linux Kernel

Full Text:

PDF

References


Zhang J and Zhang M. Research and Design of Embedded Tank Car Monitoring System Based on ARM9. IEEE Computer Society. Second International Symposium on Computational Intelligence and Design. 2009; (2): 292–295p.

Chen S and Jiang S. Design of Embedded Network Interface Controller Based on ARM9 and ARMLinux. Applied Computing, Computer Science, and Advanced Communication First International Conference on Future Computer and Communication, FCC 2009, Wuhan, China, Proceedings – Springerlink. June 6, 7 2009; 142–149p.

Meyerstein M, Cha I and Shah Y et al. Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications. Security and Privacy in Mobile Information and Communication Systems. First

International ICST Conference, MobiSec 2009, Turin, Italy, Revised Selected Papers – Springerlink. June 3–5, 2009; 214–225p.

Qingvu O, Kai H and Xiaoping W et al. Research on the Embedded Security Architecture Based on the Control Flow Security. IEEE Computer Society: Second International Workshop on Computer Science and Engineering. 2009; (1): 133–137p.

Chandrasekaran, Rajendran S, Annamalai J et al. Data Driven Security Alarm Model for Embedded Applications. Computing, Communication and Networking, ICCCn 2008. International Conference – IEEE xplore digital library. 2008; 1–5p.

Gogniat et al. Reconfigurable hardware for high-security/high-performance embedded systems: the SAFES perspective. IEEE Transactions on Very Large Scale Integration (VLSI) Systems. Feb 2008; 16(2): 144–155p.

Huffmire et al. Managing Security in FPGA based embedded Systems. IEEE CS Digital Library. Nov-Dec 2008; 25(6): 590–598p.

Vaslin et al. A security approach for off-chip memory in embedded microprocessor systems. Elsevier Journal of Microelectronics and Microprocessors. 2009; 33(1): 37–45p.

Eisenbarth et al. Reconfigurable trusted computing in hardware. In Proceedings of the ACM Workshop on Scalable Trusted Computing. Nov 2007; 15–20p.

Elbaz et al. A parallelized way to provide data encryption and integrity checking on a processor-memory bus. In Proceedings of the IEEE/ ACM International Design Automation Conference. July 2006; 506–509p.




DOI: https://doi.org/10.37591/jomea.v2i3.5264

Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 Journal of Microcontroller Engineering and Applications