diff options
author | davidcunado-arm <david.cunado@arm.com> | 2017-12-11 12:29:47 +0000 |
---|---|---|
committer | GitHub <noreply@github.com> | 2017-12-11 12:29:47 +0000 |
commit | 211d307c6bfadbe44aa27998e105436143e1b147 (patch) | |
tree | a37e6e9abfffa4c98ad3d95894ea7009755c56e6 /docs | |
parent | 83df7ce38dd5b2357fa73798ad1f3546c6073482 (diff) | |
parent | 3872fc2d1fc58170e0ebc87a0cc20bff6a83ef51 (diff) |
Merge pull request #1178 from davidcunado-arm/dc/enable_sve
Enable SVE for Non-secure world
Diffstat (limited to 'docs')
-rw-r--r-- | docs/user-guide.rst | 11 |
1 files changed, 11 insertions, 0 deletions
diff --git a/docs/user-guide.rst b/docs/user-guide.rst index 138ed8b3..13f09641 100644 --- a/docs/user-guide.rst +++ b/docs/user-guide.rst @@ -354,6 +354,17 @@ Common build options The default is 1 but is automatically disabled when the target architecture is AArch32. +- ``ENABLE_SVE_FOR_NS``: Boolean option to enable Scalable Vector Extension + (SVE) for the Non-secure world only. SVE is an optional architectural feature + for AArch64. Note that when SVE is enabled for the Non-secure world, access + to SIMD and floating-point functionality from the Secure world is disabled. + This is to avoid corruption of the Non-secure world data in the Z-registers + which are aliased by the SIMD and FP registers. The build option is not + compatible with the ``CTX_INCLUDE_FPREGS`` build option, and will raise an + assert on platforms where SVE is implemented and ``ENABLE_SVE_FOR_NS`` set to + 1. The default is 1 but is automatically disabled when the target + architecture is AArch32. + - ``ENABLE_STACK_PROTECTOR``: String option to enable the stack protection checks in GCC. Allowed values are "all", "strong" and "0" (default). "strong" is the recommended stack protection level if this feature is |