2 * linux/arch/arm/vfp/vfpmodule.c
4 * Copyright (C) 2004 ARM Limited.
5 * Written by Deep Blue Solutions Limited.
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 #include <linux/module.h>
12 #include <linux/types.h>
13 #include <linux/kernel.h>
14 #include <linux/signal.h>
15 #include <linux/sched.h>
16 #include <linux/init.h>
18 #include <asm/thread_notify.h>
25 * Our undef handlers (in entry.S)
27 void vfp_testing_entry(void);
28 void vfp_support_entry(void);
29 void vfp_null_entry(void);
31 void (*vfp_vector)(void) = vfp_null_entry;
32 union vfp_state *last_VFP_context[NR_CPUS];
36 * Used in startup: set to non-zero if VFP checks fail
37 * After startup, holds VFP architecture
39 unsigned int VFP_arch;
41 static int vfp_notifier(struct notifier_block *self, unsigned long cmd, void *v)
43 struct thread_info *thread = v;
45 __u32 cpu = thread->cpu;
47 if (likely(cmd == THREAD_NOTIFY_SWITCH)) {
48 u32 fpexc = fmrx(FPEXC);
52 * On SMP, if VFP is enabled, save the old state in
53 * case the thread migrates to a different CPU. The
54 * restoring is done lazily.
56 if ((fpexc & FPEXC_EN) && last_VFP_context[cpu]) {
57 vfp_save_state(last_VFP_context[cpu], fpexc);
58 last_VFP_context[cpu]->hard.cpu = cpu;
61 * Thread migration, just force the reloading of the
62 * state on the new CPU in case the VFP registers
65 if (thread->vfpstate.hard.cpu != cpu)
66 last_VFP_context[cpu] = NULL;
70 * Always disable VFP so we can lazily save/restore the
73 fmxr(FPEXC, fpexc & ~FPEXC_EN);
77 vfp = &thread->vfpstate;
78 if (cmd == THREAD_NOTIFY_FLUSH) {
80 * Per-thread VFP initialisation.
82 memset(vfp, 0, sizeof(union vfp_state));
84 vfp->hard.fpexc = FPEXC_EN;
85 vfp->hard.fpscr = FPSCR_ROUND_NEAREST;
88 * Disable VFP to ensure we initialise it first.
90 fmxr(FPEXC, fmrx(FPEXC) & ~FPEXC_EN);
93 /* flush and release case: Per-thread VFP cleanup. */
94 if (last_VFP_context[cpu] == vfp)
95 last_VFP_context[cpu] = NULL;
100 static struct notifier_block vfp_notifier_block = {
101 .notifier_call = vfp_notifier,
105 * Raise a SIGFPE for the current process.
106 * sicode describes the signal being raised.
108 void vfp_raise_sigfpe(unsigned int sicode, struct pt_regs *regs)
112 memset(&info, 0, sizeof(info));
114 info.si_signo = SIGFPE;
115 info.si_code = sicode;
116 info.si_addr = (void __user *)(instruction_pointer(regs) - 4);
119 * This is the same as NWFPE, because it's not clear what
122 current->thread.error_code = 0;
123 current->thread.trap_no = 6;
125 send_sig_info(SIGFPE, &info, current);
128 static void vfp_panic(char *reason, u32 inst)
132 printk(KERN_ERR "VFP: Error: %s\n", reason);
133 printk(KERN_ERR "VFP: EXC 0x%08x SCR 0x%08x INST 0x%08x\n",
134 fmrx(FPEXC), fmrx(FPSCR), inst);
135 for (i = 0; i < 32; i += 2)
136 printk(KERN_ERR "VFP: s%2u: 0x%08x s%2u: 0x%08x\n",
137 i, vfp_get_float(i), i+1, vfp_get_float(i+1));
141 * Process bitmask of exception conditions.
143 static void vfp_raise_exceptions(u32 exceptions, u32 inst, u32 fpscr, struct pt_regs *regs)
147 pr_debug("VFP: raising exceptions %08x\n", exceptions);
149 if (exceptions == VFP_EXCEPTION_ERROR) {
150 vfp_panic("unhandled bounce", inst);
151 vfp_raise_sigfpe(0, regs);
156 * Update the FPSCR with the additional exception flags.
157 * Comparison instructions always return at least one of
164 #define RAISE(stat,en,sig) \
165 if (exceptions & stat && fpscr & en) \
169 * These are arranged in priority order, least to highest.
171 RAISE(FPSCR_DZC, FPSCR_DZE, FPE_FLTDIV);
172 RAISE(FPSCR_IXC, FPSCR_IXE, FPE_FLTRES);
173 RAISE(FPSCR_UFC, FPSCR_UFE, FPE_FLTUND);
174 RAISE(FPSCR_OFC, FPSCR_OFE, FPE_FLTOVF);
175 RAISE(FPSCR_IOC, FPSCR_IOE, FPE_FLTINV);
178 vfp_raise_sigfpe(si_code, regs);
182 * Emulate a VFP instruction.
184 static u32 vfp_emulate_instruction(u32 inst, u32 fpscr, struct pt_regs *regs)
186 u32 exceptions = VFP_EXCEPTION_ERROR;
188 pr_debug("VFP: emulate: INST=0x%08x SCR=0x%08x\n", inst, fpscr);
190 if (INST_CPRTDO(inst)) {
191 if (!INST_CPRT(inst)) {
195 if (vfp_single(inst)) {
196 exceptions = vfp_single_cpdo(inst, fpscr);
198 exceptions = vfp_double_cpdo(inst, fpscr);
202 * A CPRT instruction can not appear in FPINST2, nor
203 * can it cause an exception. Therefore, we do not
204 * have to emulate it.
209 * A CPDT instruction can not appear in FPINST2, nor can
210 * it cause an exception. Therefore, we do not have to
214 return exceptions & ~VFP_NAN_FLAG;
218 * Package up a bounce condition.
220 void VFP_bounce(u32 trigger, u32 fpexc, struct pt_regs *regs)
222 u32 fpscr, orig_fpscr, fpsid, exceptions;
224 pr_debug("VFP: bounce: trigger %08x fpexc %08x\n", trigger, fpexc);
227 * At this point, FPEXC can have the following configuration:
230 * 0 1 x - synchronous exception
231 * 1 x 0 - asynchronous exception
232 * 1 x 1 - sychronous on VFP subarch 1 and asynchronous on later
233 * 0 0 1 - synchronous on VFP9 (non-standard subarch 1
234 * implementation), undefined otherwise
236 * Clear various bits and enable access to the VFP so we can
239 fmxr(FPEXC, fpexc & ~(FPEXC_EX|FPEXC_DEX|FPEXC_FP2V|FPEXC_VV|FPEXC_TRAP_MASK));
242 orig_fpscr = fpscr = fmrx(FPSCR);
245 * Check for the special VFP subarch 1 and FPSCR.IXE bit case
247 if ((fpsid & FPSID_ARCH_MASK) == (1 << FPSID_ARCH_BIT)
248 && (fpscr & FPSCR_IXE)) {
250 * Synchronous exception, emulate the trigger instruction
255 if (fpexc & FPEXC_EX) {
257 * Asynchronous exception. The instruction is read from FPINST
258 * and the interrupted instruction has to be restarted.
260 trigger = fmrx(FPINST);
262 } else if (!(fpexc & FPEXC_DEX)) {
264 * Illegal combination of bits. It can be caused by an
265 * unallocated VFP instruction but with FPSCR.IXE set and not
268 vfp_raise_exceptions(VFP_EXCEPTION_ERROR, trigger, fpscr, regs);
273 * Modify fpscr to indicate the number of iterations remaining.
274 * If FPEXC.EX is 0, FPEXC.DEX is 1 and the FPEXC.VV bit indicates
275 * whether FPEXC.VECITR or FPSCR.LEN is used.
277 if (fpexc & (FPEXC_EX | FPEXC_VV)) {
280 len = fpexc + (1 << FPEXC_LENGTH_BIT);
282 fpscr &= ~FPSCR_LENGTH_MASK;
283 fpscr |= (len & FPEXC_LENGTH_MASK) << (FPSCR_LENGTH_BIT - FPEXC_LENGTH_BIT);
287 * Handle the first FP instruction. We used to take note of the
288 * FPEXC bounce reason, but this appears to be unreliable.
289 * Emulate the bounced instruction instead.
291 exceptions = vfp_emulate_instruction(trigger, fpscr, regs);
293 vfp_raise_exceptions(exceptions, trigger, orig_fpscr, regs);
296 * If there isn't a second FP instruction, exit now. Note that
297 * the FPEXC.FP2V bit is valid only if FPEXC.EX is 1.
299 if (fpexc ^ (FPEXC_EX | FPEXC_FP2V))
303 * The barrier() here prevents fpinst2 being read
304 * before the condition above.
307 trigger = fmrx(FPINST2);
310 exceptions = vfp_emulate_instruction(trigger, orig_fpscr, regs);
312 vfp_raise_exceptions(exceptions, trigger, orig_fpscr, regs);
315 static void vfp_enable(void *unused)
317 u32 access = get_copro_access();
320 * Enable full access to VFP (cp10 and cp11)
322 set_copro_access(access | CPACC_FULL(10) | CPACC_FULL(11));
325 #include <linux/smp.h>
328 * VFP support code initialisation.
330 static int __init vfp_init(void)
333 unsigned int cpu_arch = cpu_architecture();
335 if (cpu_arch >= CPU_ARCH_ARMv6)
339 * First check that there is a VFP that we can use.
340 * The handler is already setup to just log calls, so
341 * we just need to read the VFPSID register.
343 vfp_vector = vfp_testing_entry;
345 vfpsid = fmrx(FPSID);
347 vfp_vector = vfp_null_entry;
349 printk(KERN_INFO "VFP support v0.3: ");
351 printk("not present\n");
352 else if (vfpsid & FPSID_NODOUBLE) {
353 printk("no double precision support\n");
355 smp_call_function(vfp_enable, NULL, 1, 1);
357 VFP_arch = (vfpsid & FPSID_ARCH_MASK) >> FPSID_ARCH_BIT; /* Extract the architecture version */
358 printk("implementor %02x architecture %d part %02x variant %x rev %x\n",
359 (vfpsid & FPSID_IMPLEMENTER_MASK) >> FPSID_IMPLEMENTER_BIT,
360 (vfpsid & FPSID_ARCH_MASK) >> FPSID_ARCH_BIT,
361 (vfpsid & FPSID_PART_MASK) >> FPSID_PART_BIT,
362 (vfpsid & FPSID_VARIANT_MASK) >> FPSID_VARIANT_BIT,
363 (vfpsid & FPSID_REV_MASK) >> FPSID_REV_BIT);
365 vfp_vector = vfp_support_entry;
367 thread_register_notifier(&vfp_notifier_block);
370 * We detected VFP, and the support code is
371 * in place; report VFP support to userspace.
373 elf_hwcap |= HWCAP_VFP;
378 late_initcall(vfp_init);