aboutsummaryrefslogtreecommitdiff
path: root/docs
diff options
context:
space:
mode:
authorOlivier Deprez <olivier.deprez@arm.com>2021-06-30 11:51:04 +0200
committerTrustedFirmware Code Review <review@review.trustedfirmware.org>2021-06-30 11:51:04 +0200
commit81a8b2da2c7e1850b2b7ff3f3bff446cbb105b79 (patch)
tree357108b5c928f59cce3de674947ce4cd0faf83fe /docs
parent204fd9913c3ea1b4f13736a095ecf97d73fb0061 (diff)
parent0c5e7d1ce376cabcebebc43dbf238fe4482ab2dc (diff)
downloadtrusted-firmware-a-81a8b2da2c7e1850b2b7ff3f3bff446cbb105b79.tar.gz
Merge "feat(sve): enable SVE for the secure world" into integration
Diffstat (limited to 'docs')
-rw-r--r--docs/getting_started/build-options.rst8
1 files changed, 7 insertions, 1 deletions
diff --git a/docs/getting_started/build-options.rst b/docs/getting_started/build-options.rst
index 99fc21db32..5844304323 100644
--- a/docs/getting_started/build-options.rst
+++ b/docs/getting_started/build-options.rst
@@ -278,7 +278,8 @@ Common build options
- ``ENABLE_SVE_FOR_NS``: Boolean option to enable Scalable Vector Extension
(SVE) for the Non-secure world only. SVE is an optional architectural feature
for AArch64. Note that when SVE is enabled for the Non-secure world, access
- to SIMD and floating-point functionality from the Secure world is disabled.
+ to SIMD and floating-point functionality from the Secure world is disabled by
+ default and controlled with ENABLE_SVE_FOR_SWD.
This is to avoid corruption of the Non-secure world data in the Z-registers
which are aliased by the SIMD and FP registers. The build option is not
compatible with the ``CTX_INCLUDE_FPREGS`` build option, and will raise an
@@ -286,6 +287,11 @@ Common build options
1. The default is 1 but is automatically disabled when the target
architecture is AArch32.
+- ``ENABLE_SVE_FOR_SWD``: Boolean option to enable SVE for the Secure world.
+ SVE is an optional architectural feature for AArch64. Note that this option
+ requires ENABLE_SVE_FOR_NS to be enabled. The default is 0 and it is
+ automatically disabled when the target architecture is AArch32.
+
- ``ENABLE_STACK_PROTECTOR``: String option to enable the stack protection
checks in GCC. Allowed values are "all", "strong", "default" and "none". The
default value is set to "none". "strong" is the recommended stack protection