]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - arch/arm/vfp/vfpmodule.c
sched/headers: Prepare for new header dependencies before moving code to <linux/sched...
[mirror_ubuntu-artful-kernel.git] / arch / arm / vfp / vfpmodule.c
CommitLineData
1da177e4
LT
1/*
2 * linux/arch/arm/vfp/vfpmodule.c
3 *
4 * Copyright (C) 2004 ARM Limited.
5 * Written by Deep Blue Solutions Limited.
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
10 */
1da177e4 11#include <linux/types.h>
90b44199 12#include <linux/cpu.h>
746a9d19 13#include <linux/cpu_pm.h>
998de4ac 14#include <linux/hardirq.h>
1da177e4 15#include <linux/kernel.h>
90b44199 16#include <linux/notifier.h>
1da177e4 17#include <linux/signal.h>
3f07c014 18#include <linux/sched/signal.h>
90b44199 19#include <linux/smp.h>
1da177e4 20#include <linux/init.h>
2498814f
WD
21#include <linux/uaccess.h>
22#include <linux/user.h>
73c132c1 23#include <linux/export.h>
d6551e88 24
15d07dc9 25#include <asm/cp15.h>
5aaf2544 26#include <asm/cputype.h>
9f97da78 27#include <asm/system_info.h>
d6551e88 28#include <asm/thread_notify.h>
1da177e4
LT
29#include <asm/vfp.h>
30
31#include "vfpinstr.h"
32#include "vfp.h"
33
34/*
35 * Our undef handlers (in entry.S)
36 */
a85b2257
NP
37asmlinkage void vfp_testing_entry(void);
38asmlinkage void vfp_support_entry(void);
39asmlinkage void vfp_null_entry(void);
1da177e4 40
a85b2257 41asmlinkage void (*vfp_vector)(void) = vfp_null_entry;
af61bdf0 42
f8f2a852
RK
43/*
44 * Dual-use variable.
45 * Used in startup: set to non-zero if VFP checks fail
46 * After startup, holds VFP architecture
47 */
48unsigned int VFP_arch;
49
af61bdf0
RK
50/*
51 * The pointer to the vfpstate structure of the thread which currently
52 * owns the context held in the VFP hardware, or NULL if the hardware
53 * context is invalid.
f8f2a852
RK
54 *
55 * For UP, this is sufficient to tell which thread owns the VFP context.
56 * However, for SMP, we also need to check the CPU number stored in the
57 * saved state too to catch migrations.
af61bdf0
RK
58 */
59union vfp_state *vfp_current_hw_state[NR_CPUS];
1da177e4
LT
60
61/*
f8f2a852
RK
62 * Is 'thread's most up to date state stored in this CPUs hardware?
63 * Must be called from non-preemptible context.
1da177e4 64 */
f8f2a852
RK
65static bool vfp_state_in_hw(unsigned int cpu, struct thread_info *thread)
66{
67#ifdef CONFIG_SMP
68 if (thread->vfpstate.hard.cpu != cpu)
69 return false;
70#endif
71 return vfp_current_hw_state[cpu] == &thread->vfpstate;
72}
73
74/*
75 * Force a reload of the VFP context from the thread structure. We do
76 * this by ensuring that access to the VFP hardware is disabled, and
48af9fea 77 * clear vfp_current_hw_state. Must be called from non-preemptible context.
f8f2a852
RK
78 */
79static void vfp_force_reload(unsigned int cpu, struct thread_info *thread)
80{
81 if (vfp_state_in_hw(cpu, thread)) {
82 fmxr(FPEXC, fmrx(FPEXC) & ~FPEXC_EN);
83 vfp_current_hw_state[cpu] = NULL;
84 }
85#ifdef CONFIG_SMP
86 thread->vfpstate.hard.cpu = NR_CPUS;
87#endif
88}
1da177e4 89
0d782dc4
RK
90/*
91 * Per-thread VFP initialization.
92 */
93static void vfp_thread_flush(struct thread_info *thread)
94{
95 union vfp_state *vfp = &thread->vfpstate;
96 unsigned int cpu;
97
0d782dc4
RK
98 /*
99 * Disable VFP to ensure we initialize it first. We must ensure
19dad35f
RK
100 * that the modification of vfp_current_hw_state[] and hardware
101 * disable are done for the same CPU and without preemption.
102 *
103 * Do this first to ensure that preemption won't overwrite our
104 * state saving should access to the VFP be enabled at this point.
0d782dc4
RK
105 */
106 cpu = get_cpu();
af61bdf0
RK
107 if (vfp_current_hw_state[cpu] == vfp)
108 vfp_current_hw_state[cpu] = NULL;
0d782dc4
RK
109 fmxr(FPEXC, fmrx(FPEXC) & ~FPEXC_EN);
110 put_cpu();
19dad35f
RK
111
112 memset(vfp, 0, sizeof(union vfp_state));
113
114 vfp->hard.fpexc = FPEXC_EN;
115 vfp->hard.fpscr = FPSCR_ROUND_NEAREST;
116#ifdef CONFIG_SMP
117 vfp->hard.cpu = NR_CPUS;
118#endif
0d782dc4
RK
119}
120
797245f5 121static void vfp_thread_exit(struct thread_info *thread)
0d782dc4
RK
122{
123 /* release case: Per-thread VFP cleanup. */
124 union vfp_state *vfp = &thread->vfpstate;
797245f5 125 unsigned int cpu = get_cpu();
0d782dc4 126
af61bdf0
RK
127 if (vfp_current_hw_state[cpu] == vfp)
128 vfp_current_hw_state[cpu] = NULL;
797245f5 129 put_cpu();
0d782dc4
RK
130}
131
c98c0977
CM
132static void vfp_thread_copy(struct thread_info *thread)
133{
134 struct thread_info *parent = current_thread_info();
135
136 vfp_sync_hwstate(parent);
137 thread->vfpstate = parent->vfpstate;
f8f2a852
RK
138#ifdef CONFIG_SMP
139 thread->vfpstate.hard.cpu = NR_CPUS;
140#endif
c98c0977
CM
141}
142
0d782dc4
RK
143/*
144 * When this function is called with the following 'cmd's, the following
145 * is true while this function is being run:
146 * THREAD_NOFTIFY_SWTICH:
147 * - the previously running thread will not be scheduled onto another CPU.
148 * - the next thread to be run (v) will not be running on another CPU.
149 * - thread->cpu is the local CPU number
150 * - not preemptible as we're called in the middle of a thread switch
151 * THREAD_NOTIFY_FLUSH:
152 * - the thread (v) will be running on the local CPU, so
153 * v === current_thread_info()
154 * - thread->cpu is the local CPU number at the time it is accessed,
155 * but may change at any time.
156 * - we could be preempted if tree preempt rcu is enabled, so
157 * it is unsafe to use thread->cpu.
797245f5 158 * THREAD_NOTIFY_EXIT
797245f5
RK
159 * - we could be preempted if tree preempt rcu is enabled, so
160 * it is unsafe to use thread->cpu.
0d782dc4 161 */
d6551e88 162static int vfp_notifier(struct notifier_block *self, unsigned long cmd, void *v)
1da177e4 163{
d6551e88 164 struct thread_info *thread = v;
2e82669a
CM
165 u32 fpexc;
166#ifdef CONFIG_SMP
167 unsigned int cpu;
168#endif
1da177e4 169
2e82669a
CM
170 switch (cmd) {
171 case THREAD_NOTIFY_SWITCH:
172 fpexc = fmrx(FPEXC);
c6428464
CM
173
174#ifdef CONFIG_SMP
2e82669a 175 cpu = thread->cpu;
0d782dc4 176
c6428464
CM
177 /*
178 * On SMP, if VFP is enabled, save the old state in
179 * case the thread migrates to a different CPU. The
180 * restoring is done lazily.
181 */
f8f2a852 182 if ((fpexc & FPEXC_EN) && vfp_current_hw_state[cpu])
af61bdf0 183 vfp_save_state(vfp_current_hw_state[cpu], fpexc);
c6428464
CM
184#endif
185
681a4991
RK
186 /*
187 * Always disable VFP so we can lazily save/restore the
188 * old state.
189 */
228adef1 190 fmxr(FPEXC, fpexc & ~FPEXC_EN);
2e82669a 191 break;
681a4991 192
2e82669a 193 case THREAD_NOTIFY_FLUSH:
0d782dc4 194 vfp_thread_flush(thread);
2e82669a
CM
195 break;
196
197 case THREAD_NOTIFY_EXIT:
797245f5 198 vfp_thread_exit(thread);
c98c0977
CM
199 break;
200
201 case THREAD_NOTIFY_COPY:
202 vfp_thread_copy(thread);
2e82669a
CM
203 break;
204 }
681a4991 205
d6551e88 206 return NOTIFY_DONE;
1da177e4
LT
207}
208
d6551e88
RK
209static struct notifier_block vfp_notifier_block = {
210 .notifier_call = vfp_notifier,
211};
212
1da177e4
LT
213/*
214 * Raise a SIGFPE for the current process.
215 * sicode describes the signal being raised.
216 */
2bbd7e9b 217static void vfp_raise_sigfpe(unsigned int sicode, struct pt_regs *regs)
1da177e4
LT
218{
219 siginfo_t info;
220
221 memset(&info, 0, sizeof(info));
222
223 info.si_signo = SIGFPE;
224 info.si_code = sicode;
35d59fc5 225 info.si_addr = (void __user *)(instruction_pointer(regs) - 4);
1da177e4
LT
226
227 /*
228 * This is the same as NWFPE, because it's not clear what
229 * this is used for
230 */
231 current->thread.error_code = 0;
232 current->thread.trap_no = 6;
233
da41119a 234 send_sig_info(SIGFPE, &info, current);
1da177e4
LT
235}
236
c98929c0 237static void vfp_panic(char *reason, u32 inst)
1da177e4
LT
238{
239 int i;
240
dc457078
NP
241 pr_err("VFP: Error: %s\n", reason);
242 pr_err("VFP: EXC 0x%08x SCR 0x%08x INST 0x%08x\n",
c98929c0 243 fmrx(FPEXC), fmrx(FPSCR), inst);
1da177e4 244 for (i = 0; i < 32; i += 2)
dc457078 245 pr_err("VFP: s%2u: 0x%08x s%2u: 0x%08x\n",
1da177e4
LT
246 i, vfp_get_float(i), i+1, vfp_get_float(i+1));
247}
248
249/*
250 * Process bitmask of exception conditions.
251 */
252static void vfp_raise_exceptions(u32 exceptions, u32 inst, u32 fpscr, struct pt_regs *regs)
253{
254 int si_code = 0;
255
256 pr_debug("VFP: raising exceptions %08x\n", exceptions);
257
7c6f2514 258 if (exceptions == VFP_EXCEPTION_ERROR) {
c98929c0 259 vfp_panic("unhandled bounce", inst);
1da177e4
LT
260 vfp_raise_sigfpe(0, regs);
261 return;
262 }
263
264 /*
dbead405 265 * If any of the status flags are set, update the FPSCR.
1da177e4
LT
266 * Comparison instructions always return at least one of
267 * these flags set.
268 */
dbead405
CM
269 if (exceptions & (FPSCR_N|FPSCR_Z|FPSCR_C|FPSCR_V))
270 fpscr &= ~(FPSCR_N|FPSCR_Z|FPSCR_C|FPSCR_V);
271
1da177e4
LT
272 fpscr |= exceptions;
273
274 fmxr(FPSCR, fpscr);
275
276#define RAISE(stat,en,sig) \
277 if (exceptions & stat && fpscr & en) \
278 si_code = sig;
279
280 /*
281 * These are arranged in priority order, least to highest.
282 */
e0f205d9 283 RAISE(FPSCR_DZC, FPSCR_DZE, FPE_FLTDIV);
1da177e4
LT
284 RAISE(FPSCR_IXC, FPSCR_IXE, FPE_FLTRES);
285 RAISE(FPSCR_UFC, FPSCR_UFE, FPE_FLTUND);
286 RAISE(FPSCR_OFC, FPSCR_OFE, FPE_FLTOVF);
287 RAISE(FPSCR_IOC, FPSCR_IOE, FPE_FLTINV);
288
289 if (si_code)
290 vfp_raise_sigfpe(si_code, regs);
291}
292
293/*
294 * Emulate a VFP instruction.
295 */
296static u32 vfp_emulate_instruction(u32 inst, u32 fpscr, struct pt_regs *regs)
297{
7c6f2514 298 u32 exceptions = VFP_EXCEPTION_ERROR;
1da177e4
LT
299
300 pr_debug("VFP: emulate: INST=0x%08x SCR=0x%08x\n", inst, fpscr);
301
302 if (INST_CPRTDO(inst)) {
303 if (!INST_CPRT(inst)) {
304 /*
305 * CPDO
306 */
307 if (vfp_single(inst)) {
308 exceptions = vfp_single_cpdo(inst, fpscr);
309 } else {
310 exceptions = vfp_double_cpdo(inst, fpscr);
311 }
312 } else {
313 /*
314 * A CPRT instruction can not appear in FPINST2, nor
315 * can it cause an exception. Therefore, we do not
316 * have to emulate it.
317 */
318 }
319 } else {
320 /*
321 * A CPDT instruction can not appear in FPINST2, nor can
322 * it cause an exception. Therefore, we do not have to
323 * emulate it.
324 */
325 }
928bd1b4 326 return exceptions & ~VFP_NAN_FLAG;
1da177e4
LT
327}
328
329/*
330 * Package up a bounce condition.
331 */
c98929c0 332void VFP_bounce(u32 trigger, u32 fpexc, struct pt_regs *regs)
1da177e4 333{
c98929c0 334 u32 fpscr, orig_fpscr, fpsid, exceptions;
1da177e4
LT
335
336 pr_debug("VFP: bounce: trigger %08x fpexc %08x\n", trigger, fpexc);
337
338 /*
c98929c0
CM
339 * At this point, FPEXC can have the following configuration:
340 *
341 * EX DEX IXE
342 * 0 1 x - synchronous exception
343 * 1 x 0 - asynchronous exception
344 * 1 x 1 - sychronous on VFP subarch 1 and asynchronous on later
345 * 0 0 1 - synchronous on VFP9 (non-standard subarch 1
346 * implementation), undefined otherwise
347 *
348 * Clear various bits and enable access to the VFP so we can
349 * handle the bounce.
1da177e4 350 */
c98929c0 351 fmxr(FPEXC, fpexc & ~(FPEXC_EX|FPEXC_DEX|FPEXC_FP2V|FPEXC_VV|FPEXC_TRAP_MASK));
1da177e4 352
c98929c0 353 fpsid = fmrx(FPSID);
1da177e4
LT
354 orig_fpscr = fpscr = fmrx(FPSCR);
355
356 /*
c98929c0 357 * Check for the special VFP subarch 1 and FPSCR.IXE bit case
1da177e4 358 */
c98929c0
CM
359 if ((fpsid & FPSID_ARCH_MASK) == (1 << FPSID_ARCH_BIT)
360 && (fpscr & FPSCR_IXE)) {
361 /*
362 * Synchronous exception, emulate the trigger instruction
363 */
1da177e4
LT
364 goto emulate;
365 }
366
c98929c0 367 if (fpexc & FPEXC_EX) {
85d6943a 368#ifndef CONFIG_CPU_FEROCEON
c98929c0
CM
369 /*
370 * Asynchronous exception. The instruction is read from FPINST
371 * and the interrupted instruction has to be restarted.
372 */
373 trigger = fmrx(FPINST);
374 regs->ARM_pc -= 4;
85d6943a 375#endif
c98929c0
CM
376 } else if (!(fpexc & FPEXC_DEX)) {
377 /*
378 * Illegal combination of bits. It can be caused by an
379 * unallocated VFP instruction but with FPSCR.IXE set and not
380 * on VFP subarch 1.
381 */
382 vfp_raise_exceptions(VFP_EXCEPTION_ERROR, trigger, fpscr, regs);
f2255be8 383 goto exit;
c98929c0 384 }
1da177e4
LT
385
386 /*
c98929c0
CM
387 * Modify fpscr to indicate the number of iterations remaining.
388 * If FPEXC.EX is 0, FPEXC.DEX is 1 and the FPEXC.VV bit indicates
389 * whether FPEXC.VECITR or FPSCR.LEN is used.
1da177e4 390 */
c98929c0 391 if (fpexc & (FPEXC_EX | FPEXC_VV)) {
1da177e4
LT
392 u32 len;
393
394 len = fpexc + (1 << FPEXC_LENGTH_BIT);
395
396 fpscr &= ~FPSCR_LENGTH_MASK;
397 fpscr |= (len & FPEXC_LENGTH_MASK) << (FPSCR_LENGTH_BIT - FPEXC_LENGTH_BIT);
398 }
399
400 /*
401 * Handle the first FP instruction. We used to take note of the
402 * FPEXC bounce reason, but this appears to be unreliable.
403 * Emulate the bounced instruction instead.
404 */
c98929c0 405 exceptions = vfp_emulate_instruction(trigger, fpscr, regs);
1da177e4 406 if (exceptions)
c98929c0 407 vfp_raise_exceptions(exceptions, trigger, orig_fpscr, regs);
1da177e4
LT
408
409 /*
c98929c0
CM
410 * If there isn't a second FP instruction, exit now. Note that
411 * the FPEXC.FP2V bit is valid only if FPEXC.EX is 1.
1da177e4 412 */
5e4ba617 413 if ((fpexc & (FPEXC_EX | FPEXC_FP2V)) != (FPEXC_EX | FPEXC_FP2V))
f2255be8 414 goto exit;
1da177e4
LT
415
416 /*
417 * The barrier() here prevents fpinst2 being read
418 * before the condition above.
419 */
420 barrier();
421 trigger = fmrx(FPINST2);
1da177e4
LT
422
423 emulate:
c98929c0 424 exceptions = vfp_emulate_instruction(trigger, orig_fpscr, regs);
1da177e4
LT
425 if (exceptions)
426 vfp_raise_exceptions(exceptions, trigger, orig_fpscr, regs);
f2255be8
GD
427 exit:
428 preempt_enable();
1da177e4 429}
efe90d27 430
8e140362
RK
431static void vfp_enable(void *unused)
432{
998de4ac
WD
433 u32 access;
434
435 BUG_ON(preemptible());
436 access = get_copro_access();
8e140362
RK
437
438 /*
439 * Enable full access to VFP (cp10 and cp11)
440 */
441 set_copro_access(access | CPACC_FULL(10) | CPACC_FULL(11));
442}
443
7d7d7a41
FF
444/* Called by platforms on which we want to disable VFP because it may not be
445 * present on all CPUs within a SMP complex. Needs to be called prior to
446 * vfp_init().
447 */
448void vfp_disable(void)
449{
450 if (VFP_arch) {
451 pr_debug("%s: should be called prior to vfp_init\n", __func__);
452 return;
453 }
454 VFP_arch = 1;
455}
456
746a9d19 457#ifdef CONFIG_CPU_PM
328f5cc3 458static int vfp_pm_suspend(void)
fc0b7a20
BD
459{
460 struct thread_info *ti = current_thread_info();
461 u32 fpexc = fmrx(FPEXC);
462
463 /* if vfp is on, then save state for resumption */
464 if (fpexc & FPEXC_EN) {
dc457078 465 pr_debug("%s: saving vfp state\n", __func__);
fc0b7a20
BD
466 vfp_save_state(&ti->vfpstate, fpexc);
467
468 /* disable, just in case */
469 fmxr(FPEXC, fmrx(FPEXC) & ~FPEXC_EN);
24b35521
CC
470 } else if (vfp_current_hw_state[ti->cpu]) {
471#ifndef CONFIG_SMP
472 fmxr(FPEXC, fpexc | FPEXC_EN);
473 vfp_save_state(vfp_current_hw_state[ti->cpu], fpexc);
474 fmxr(FPEXC, fpexc);
475#endif
fc0b7a20
BD
476 }
477
478 /* clear any information we had about last context state */
a84b895a 479 vfp_current_hw_state[ti->cpu] = NULL;
fc0b7a20
BD
480
481 return 0;
482}
483
328f5cc3 484static void vfp_pm_resume(void)
fc0b7a20
BD
485{
486 /* ensure we have access to the vfp */
487 vfp_enable(NULL);
488
489 /* and disable it to ensure the next usage restores the state */
490 fmxr(FPEXC, fmrx(FPEXC) & ~FPEXC_EN);
fc0b7a20
BD
491}
492
746a9d19
CC
493static int vfp_cpu_pm_notifier(struct notifier_block *self, unsigned long cmd,
494 void *v)
495{
496 switch (cmd) {
497 case CPU_PM_ENTER:
498 vfp_pm_suspend();
499 break;
500 case CPU_PM_ENTER_FAILED:
501 case CPU_PM_EXIT:
502 vfp_pm_resume();
503 break;
504 }
505 return NOTIFY_OK;
506}
507
508static struct notifier_block vfp_cpu_pm_notifier_block = {
509 .notifier_call = vfp_cpu_pm_notifier,
fc0b7a20
BD
510};
511
fc0b7a20
BD
512static void vfp_pm_init(void)
513{
746a9d19 514 cpu_pm_register_notifier(&vfp_cpu_pm_notifier_block);
fc0b7a20
BD
515}
516
fc0b7a20
BD
517#else
518static inline void vfp_pm_init(void) { }
746a9d19 519#endif /* CONFIG_CPU_PM */
fc0b7a20 520
f8f2a852
RK
521/*
522 * Ensure that the VFP state stored in 'thread->vfpstate' is up to date
523 * with the hardware state.
524 */
ad187f95 525void vfp_sync_hwstate(struct thread_info *thread)
3d1228ea
CM
526{
527 unsigned int cpu = get_cpu();
3d1228ea 528
f8f2a852 529 if (vfp_state_in_hw(cpu, thread)) {
54cb3dbb 530 u32 fpexc = fmrx(FPEXC);
3d1228ea 531
54cb3dbb
RK
532 /*
533 * Save the last VFP state on this CPU.
534 */
535 fmxr(FPEXC, fpexc | FPEXC_EN);
536 vfp_save_state(&thread->vfpstate, fpexc | FPEXC_EN);
ad187f95
RK
537 fmxr(FPEXC, fpexc);
538 }
3d1228ea 539
ad187f95
RK
540 put_cpu();
541}
542
f8f2a852 543/* Ensure that the thread reloads the hardware VFP state on the next use. */
ad187f95
RK
544void vfp_flush_hwstate(struct thread_info *thread)
545{
546 unsigned int cpu = get_cpu();
3d1228ea 547
f8f2a852 548 vfp_force_reload(cpu, thread);
ad187f95 549
3d1228ea
CM
550 put_cpu();
551}
3d1228ea 552
2498814f
WD
553/*
554 * Save the current VFP state into the provided structures and prepare
555 * for entry into a new function (signal handler).
556 */
557int vfp_preserve_user_clear_hwstate(struct user_vfp __user *ufp,
558 struct user_vfp_exc __user *ufp_exc)
559{
560 struct thread_info *thread = current_thread_info();
561 struct vfp_hard_struct *hwstate = &thread->vfpstate.hard;
562 int err = 0;
563
564 /* Ensure that the saved hwstate is up-to-date. */
565 vfp_sync_hwstate(thread);
566
567 /*
568 * Copy the floating point registers. There can be unused
569 * registers see asm/hwcap.h for details.
570 */
571 err |= __copy_to_user(&ufp->fpregs, &hwstate->fpregs,
572 sizeof(hwstate->fpregs));
573 /*
574 * Copy the status and control register.
575 */
576 __put_user_error(hwstate->fpscr, &ufp->fpscr, err);
577
578 /*
579 * Copy the exception registers.
580 */
581 __put_user_error(hwstate->fpexc, &ufp_exc->fpexc, err);
582 __put_user_error(hwstate->fpinst, &ufp_exc->fpinst, err);
583 __put_user_error(hwstate->fpinst2, &ufp_exc->fpinst2, err);
584
585 if (err)
586 return -EFAULT;
ff9a184c
WD
587
588 /* Ensure that VFP is disabled. */
589 vfp_flush_hwstate(thread);
590
591 /*
592 * As per the PCS, clear the length and stride bits for function
593 * entry.
594 */
595 hwstate->fpscr &= ~(FPSCR_LENGTH_MASK | FPSCR_STRIDE_MASK);
2498814f
WD
596 return 0;
597}
598
599/* Sanitise and restore the current VFP state from the provided structures. */
600int vfp_restore_user_hwstate(struct user_vfp __user *ufp,
601 struct user_vfp_exc __user *ufp_exc)
602{
603 struct thread_info *thread = current_thread_info();
604 struct vfp_hard_struct *hwstate = &thread->vfpstate.hard;
605 unsigned long fpexc;
606 int err = 0;
607
56cb2484
WD
608 /* Disable VFP to avoid corrupting the new thread state. */
609 vfp_flush_hwstate(thread);
2498814f
WD
610
611 /*
612 * Copy the floating point registers. There can be unused
613 * registers see asm/hwcap.h for details.
614 */
615 err |= __copy_from_user(&hwstate->fpregs, &ufp->fpregs,
616 sizeof(hwstate->fpregs));
617 /*
618 * Copy the status and control register.
619 */
620 __get_user_error(hwstate->fpscr, &ufp->fpscr, err);
621
622 /*
623 * Sanitise and restore the exception registers.
624 */
625 __get_user_error(fpexc, &ufp_exc->fpexc, err);
626
627 /* Ensure the VFP is enabled. */
628 fpexc |= FPEXC_EN;
629
630 /* Ensure FPINST2 is invalid and the exception flag is cleared. */
631 fpexc &= ~(FPEXC_EX | FPEXC_FP2V);
632 hwstate->fpexc = fpexc;
633
634 __get_user_error(hwstate->fpinst, &ufp_exc->fpinst, err);
635 __get_user_error(hwstate->fpinst2, &ufp_exc->fpinst2, err);
636
637 return err ? -EFAULT : 0;
638}
639
90b44199
RK
640/*
641 * VFP hardware can lose all context when a CPU goes offline.
74c25bee
RK
642 * As we will be running in SMP mode with CPU hotplug, we will save the
643 * hardware state at every thread switch. We clear our held state when
644 * a CPU has been killed, indicating that the VFP hardware doesn't contain
645 * a threads VFP state. When a CPU starts up, we re-enable access to the
e5b61baf 646 * VFP hardware. The callbacks below are called on the CPU which
90b44199
RK
647 * is being offlined/onlined.
648 */
e5b61baf 649static int vfp_dying_cpu(unsigned int cpu)
90b44199 650{
e5b61baf
TG
651 vfp_force_reload(cpu, current_thread_info());
652 return 0;
653}
654
655static int vfp_starting_cpu(unsigned int unused)
656{
657 vfp_enable(NULL);
658 return 0;
90b44199 659}
8e140362 660
ab3da156
AB
661void vfp_kmode_exception(void)
662{
663 /*
664 * If we reach this point, a floating point exception has been raised
665 * while running in kernel mode. If the NEON/VFP unit was enabled at the
666 * time, it means a VFP instruction has been issued that requires
667 * software assistance to complete, something which is not currently
668 * supported in kernel mode.
669 * If the NEON/VFP unit was disabled, and the location pointed to below
670 * is properly preceded by a call to kernel_neon_begin(), something has
671 * caused the task to be scheduled out and back in again. In this case,
672 * rebuilding and running with CONFIG_DEBUG_ATOMIC_SLEEP enabled should
673 * be helpful in localizing the problem.
674 */
675 if (fmrx(FPEXC) & FPEXC_EN)
676 pr_crit("BUG: unsupported FP instruction in kernel mode\n");
677 else
678 pr_crit("BUG: FP instruction issued in kernel mode with FP unit disabled\n");
679}
680
73c132c1
AB
681#ifdef CONFIG_KERNEL_MODE_NEON
682
683/*
684 * Kernel-side NEON support functions
685 */
686void kernel_neon_begin(void)
687{
688 struct thread_info *thread = current_thread_info();
689 unsigned int cpu;
690 u32 fpexc;
691
692 /*
693 * Kernel mode NEON is only allowed outside of interrupt context
694 * with preemption disabled. This will make sure that the kernel
695 * mode NEON register contents never need to be preserved.
696 */
697 BUG_ON(in_interrupt());
698 cpu = get_cpu();
699
700 fpexc = fmrx(FPEXC) | FPEXC_EN;
701 fmxr(FPEXC, fpexc);
702
703 /*
704 * Save the userland NEON/VFP state. Under UP,
705 * the owner could be a task other than 'current'
706 */
707 if (vfp_state_in_hw(cpu, thread))
708 vfp_save_state(&thread->vfpstate, fpexc);
709#ifndef CONFIG_SMP
710 else if (vfp_current_hw_state[cpu] != NULL)
711 vfp_save_state(vfp_current_hw_state[cpu], fpexc);
712#endif
713 vfp_current_hw_state[cpu] = NULL;
714}
715EXPORT_SYMBOL(kernel_neon_begin);
716
717void kernel_neon_end(void)
718{
719 /* Disable the NEON/VFP unit. */
720 fmxr(FPEXC, fmrx(FPEXC) & ~FPEXC_EN);
721 put_cpu();
722}
723EXPORT_SYMBOL(kernel_neon_end);
724
725#endif /* CONFIG_KERNEL_MODE_NEON */
726
1da177e4
LT
727/*
728 * VFP support code initialisation.
729 */
730static int __init vfp_init(void)
731{
732 unsigned int vfpsid;
efe90d27 733 unsigned int cpu_arch = cpu_architecture();
efe90d27 734
e5b61baf
TG
735 /*
736 * Enable the access to the VFP on all online CPUs so the
737 * following test on FPSID will succeed.
738 */
c98929c0 739 if (cpu_arch >= CPU_ARCH_ARMv6)
998de4ac 740 on_each_cpu(vfp_enable, NULL, 1);
1da177e4
LT
741
742 /*
743 * First check that there is a VFP that we can use.
744 * The handler is already setup to just log calls, so
745 * we just need to read the VFPSID register.
746 */
5d4cae5f 747 vfp_vector = vfp_testing_entry;
b9338a78 748 barrier();
1da177e4 749 vfpsid = fmrx(FPSID);
8e140362 750 barrier();
5d4cae5f 751 vfp_vector = vfp_null_entry;
1da177e4 752
dc457078 753 pr_info("VFP support v0.3: ");
6c96a4a6 754 if (VFP_arch) {
dc457078 755 pr_cont("not present\n");
6c96a4a6
SB
756 return 0;
757 /* Extract the architecture on CPUID scheme */
758 } else if ((read_cpuid_id() & 0x000f0000) == 0x000f0000) {
759 VFP_arch = vfpsid & FPSID_CPUID_ARCH_MASK;
760 VFP_arch >>= FPSID_ARCH_BIT;
efe90d27 761 /*
6c96a4a6
SB
762 * Check for the presence of the Advanced SIMD
763 * load/store instructions, integer and single
764 * precision floating point operations. Only check
765 * for NEON if the hardware has the MVFR registers.
efe90d27 766 */
2b94fe2a
SB
767 if (IS_ENABLED(CONFIG_NEON) &&
768 (fmrx(MVFR1) & 0x000fff00) == 0x00011100)
6c96a4a6 769 elf_hwcap |= HWCAP_NEON;
6c96a4a6 770
2b94fe2a
SB
771 if (IS_ENABLED(CONFIG_VFPv3)) {
772 u32 mvfr0 = fmrx(MVFR0);
773 if (((mvfr0 & MVFR0_DP_MASK) >> MVFR0_DP_BIT) == 0x2 ||
774 ((mvfr0 & MVFR0_SP_MASK) >> MVFR0_SP_BIT) == 0x2) {
775 elf_hwcap |= HWCAP_VFPv3;
776 /*
777 * Check for VFPv3 D16 and VFPv4 D16. CPUs in
778 * this configuration only have 16 x 64bit
779 * registers.
780 */
781 if ((mvfr0 & MVFR0_A_SIMD_MASK) == 1)
782 /* also v4-D16 */
783 elf_hwcap |= HWCAP_VFPv3D16;
784 else
785 elf_hwcap |= HWCAP_VFPD32;
786 }
787
788 if ((fmrx(MVFR1) & 0xf0000000) == 0x10000000)
789 elf_hwcap |= HWCAP_VFPv4;
790 }
6c96a4a6
SB
791 /* Extract the architecture version on pre-cpuid scheme */
792 } else {
793 if (vfpsid & FPSID_NODOUBLE) {
794 pr_cont("no double precision support\n");
795 return 0;
18b9dc13 796 }
6c96a4a6
SB
797
798 VFP_arch = (vfpsid & FPSID_ARCH_MASK) >> FPSID_ARCH_BIT;
1da177e4 799 }
6c96a4a6 800
e5b61baf 801 cpuhp_setup_state_nocalls(CPUHP_AP_ARM_VFP_STARTING,
73c1b41e 802 "arm/vfp:starting", vfp_starting_cpu,
e5b61baf 803 vfp_dying_cpu);
6c96a4a6
SB
804
805 vfp_vector = vfp_support_entry;
806
807 thread_register_notifier(&vfp_notifier_block);
808 vfp_pm_init();
809
810 /*
811 * We detected VFP, and the support code is
812 * in place; report VFP support to userspace.
813 */
814 elf_hwcap |= HWCAP_VFP;
815
816 pr_cont("implementor %02x architecture %d part %02x variant %x rev %x\n",
817 (vfpsid & FPSID_IMPLEMENTER_MASK) >> FPSID_IMPLEMENTER_BIT,
818 VFP_arch,
819 (vfpsid & FPSID_PART_MASK) >> FPSID_PART_BIT,
820 (vfpsid & FPSID_VARIANT_MASK) >> FPSID_VARIANT_BIT,
821 (vfpsid & FPSID_REV_MASK) >> FPSID_REV_BIT);
822
1da177e4
LT
823 return 0;
824}
825
0773d73d 826core_initcall(vfp_init);