summaryrefslogtreecommitdiff
path: root/docs
diff options
context:
space:
mode:
authordavidcunado-arm <david.cunado@arm.com>2017-12-11 12:29:47 +0000
committerGitHub <noreply@github.com>2017-12-11 12:29:47 +0000
commit211d307c6bfadbe44aa27998e105436143e1b147 (patch)
treea37e6e9abfffa4c98ad3d95894ea7009755c56e6 /docs
parent83df7ce38dd5b2357fa73798ad1f3546c6073482 (diff)
parent3872fc2d1fc58170e0ebc87a0cc20bff6a83ef51 (diff)
Merge pull request #1178 from davidcunado-arm/dc/enable_sve
Enable SVE for Non-secure world
Diffstat (limited to 'docs')
-rw-r--r--docs/user-guide.rst11
1 files changed, 11 insertions, 0 deletions
diff --git a/docs/user-guide.rst b/docs/user-guide.rst
index 138ed8b3..13f09641 100644
--- a/docs/user-guide.rst
+++ b/docs/user-guide.rst
@@ -354,6 +354,17 @@ Common build options
The default is 1 but is automatically disabled when the target architecture
is AArch32.
+- ``ENABLE_SVE_FOR_NS``: Boolean option to enable Scalable Vector Extension
+ (SVE) for the Non-secure world only. SVE is an optional architectural feature
+ for AArch64. Note that when SVE is enabled for the Non-secure world, access
+ to SIMD and floating-point functionality from the Secure world is disabled.
+ This is to avoid corruption of the Non-secure world data in the Z-registers
+ which are aliased by the SIMD and FP registers. The build option is not
+ compatible with the ``CTX_INCLUDE_FPREGS`` build option, and will raise an
+ assert on platforms where SVE is implemented and ``ENABLE_SVE_FOR_NS`` set to
+ 1. The default is 1 but is automatically disabled when the target
+ architecture is AArch32.
+
- ``ENABLE_STACK_PROTECTOR``: String option to enable the stack protection
checks in GCC. Allowed values are "all", "strong" and "0" (default).
"strong" is the recommended stack protection level if this feature is