diff options
author | David Cunado <david.cunado@arm.com> | 2017-10-20 11:30:57 +0100 |
---|---|---|
committer | David Cunado <david.cunado@arm.com> | 2017-11-30 17:45:09 +0000 |
commit | 1a853370ff8e9ff3b147297d1fc7942e7db43dd9 (patch) | |
tree | 5ee1e382ae61df463d74c82d7aadefbda04fa3c1 /docs | |
parent | 3642ca951bfd06afbd8024b295ce3c14860024b3 (diff) | |
download | platform_external_arm-trusted-firmware-1a853370ff8e9ff3b147297d1fc7942e7db43dd9.tar.gz platform_external_arm-trusted-firmware-1a853370ff8e9ff3b147297d1fc7942e7db43dd9.tar.bz2 platform_external_arm-trusted-firmware-1a853370ff8e9ff3b147297d1fc7942e7db43dd9.zip |
Enable SVE for Non-secure world
This patch adds a new build option, ENABLE_SVE_FOR_NS, which when set
to one EL3 will check to see if the Scalable Vector Extension (SVE) is
implemented when entering and exiting the Non-secure world.
If SVE is implemented, EL3 will do the following:
- Entry to Non-secure world: SIMD, FP and SVE functionality is enabled.
- Exit from Non-secure world: SIMD, FP and SVE functionality is
disabled. As SIMD and FP registers are part of the SVE Z-registers
then any use of SIMD / FP functionality would corrupt the SVE
registers.
The build option default is 1. The SVE functionality is only supported
on AArch64 and so the build option is set to zero when the target
archiecture is AArch32.
This build option is not compatible with the CTX_INCLUDE_FPREGS - an
assert will be raised on platforms where SVE is implemented and both
ENABLE_SVE_FOR_NS and CTX_INCLUDE_FPREGS are set to 1.
Also note this change prevents secure world use of FP&SIMD registers on
SVE-enabled platforms. Existing Secure-EL1 Payloads will not work on
such platforms unless ENABLE_SVE_FOR_NS is set to 0.
Additionally, on the first entry into the Non-secure world the SVE
functionality is enabled and the SVE Z-register length is set to the
maximum size allowed by the architecture. This includes the use case
where EL2 is implemented but not used.
Change-Id: Ie2d733ddaba0b9bef1d7c9765503155188fe7dae
Signed-off-by: David Cunado <david.cunado@arm.com>
Diffstat (limited to 'docs')
-rw-r--r-- | docs/user-guide.rst | 11 |
1 files changed, 11 insertions, 0 deletions
diff --git a/docs/user-guide.rst b/docs/user-guide.rst index 79d660d02..04acbe7f3 100644 --- a/docs/user-guide.rst +++ b/docs/user-guide.rst @@ -354,6 +354,17 @@ Common build options The default is 1 but is automatically disabled when the target architecture is AArch32. +- ``ENABLE_SVE_FOR_NS``: Boolean option to enable Scalable Vector Extension + (SVE) for the Non-secure world only. SVE is an optional architectural feature + for AArch64. Note that when SVE is enabled for the Non-secure world, access + to SIMD and floating-point functionality from the Secure world is disabled. + This is to avoid corruption of the Non-secure world data in the Z-registers + which are aliased by the SIMD and FP registers. The build option is not + compatible with the ``CTX_INCLUDE_FPREGS`` build option, and will raise an + assert on platforms where SVE is implemented and ``ENABLE_SVE_FOR_NS`` set to + 1. The default is 1 but is automatically disabled when the target + architecture is AArch32. + - ``ENABLE_STACK_PROTECTOR``: String option to enable the stack protection checks in GCC. Allowed values are "all", "strong" and "0" (default). "strong" is the recommended stack protection level if this feature is |