blob: dedbb449632edc1f65a40d39e06650df14831a98 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * linux/arch/arm/vfp/vfpmodule.c
3 *
4 * Copyright (C) 2004 ARM Limited.
5 * Written by Deep Blue Solutions Limited.
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
10 */
11#include <linux/module.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070012#include <linux/types.h>
13#include <linux/kernel.h>
14#include <linux/signal.h>
15#include <linux/sched.h>
16#include <linux/init.h>
Russell Kingd6551e82006-06-21 13:31:52 +010017
18#include <asm/thread_notify.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070019#include <asm/vfp.h>
20
21#include "vfpinstr.h"
22#include "vfp.h"
23
24/*
25 * Our undef handlers (in entry.S)
26 */
27void vfp_testing_entry(void);
28void vfp_support_entry(void);
29
30void (*vfp_vector)(void) = vfp_testing_entry;
31union vfp_state *last_VFP_context;
32
33/*
34 * Dual-use variable.
35 * Used in startup: set to non-zero if VFP checks fail
36 * After startup, holds VFP architecture
37 */
38unsigned int VFP_arch;
39
Russell Kingd6551e82006-06-21 13:31:52 +010040static int vfp_notifier(struct notifier_block *self, unsigned long cmd, void *v)
Linus Torvalds1da177e2005-04-16 15:20:36 -070041{
Russell Kingd6551e82006-06-21 13:31:52 +010042 struct thread_info *thread = v;
Russell King681a4992006-08-27 12:38:34 +010043 union vfp_state *vfp;
Linus Torvalds1da177e2005-04-16 15:20:36 -070044
Russell King681a4992006-08-27 12:38:34 +010045 if (likely(cmd == THREAD_NOTIFY_SWITCH)) {
46 /*
47 * Always disable VFP so we can lazily save/restore the
48 * old state.
49 */
50 fmxr(FPEXC, fmrx(FPEXC) & ~FPEXC_ENABLE);
51 return NOTIFY_DONE;
52 }
53
54 vfp = &thread->vfpstate;
55 if (cmd == THREAD_NOTIFY_FLUSH) {
Russell Kingd6551e82006-06-21 13:31:52 +010056 /*
57 * Per-thread VFP initialisation.
58 */
59 memset(vfp, 0, sizeof(union vfp_state));
Linus Torvalds1da177e2005-04-16 15:20:36 -070060
Russell Kingd6551e82006-06-21 13:31:52 +010061 vfp->hard.fpexc = FPEXC_ENABLE;
62 vfp->hard.fpscr = FPSCR_ROUND_NEAREST;
Linus Torvalds1da177e2005-04-16 15:20:36 -070063
Russell Kingd6551e82006-06-21 13:31:52 +010064 /*
65 * Disable VFP to ensure we initialise it first.
66 */
67 fmxr(FPEXC, fmrx(FPEXC) & ~FPEXC_ENABLE);
Russell Kingd6551e82006-06-21 13:31:52 +010068 }
69
Russell King681a4992006-08-27 12:38:34 +010070 /* flush and release case: Per-thread VFP cleanup. */
71 if (last_VFP_context == vfp)
72 last_VFP_context = NULL;
73
Russell Kingd6551e82006-06-21 13:31:52 +010074 return NOTIFY_DONE;
Linus Torvalds1da177e2005-04-16 15:20:36 -070075}
76
Russell Kingd6551e82006-06-21 13:31:52 +010077static struct notifier_block vfp_notifier_block = {
78 .notifier_call = vfp_notifier,
79};
Linus Torvalds1da177e2005-04-16 15:20:36 -070080
81/*
82 * Raise a SIGFPE for the current process.
83 * sicode describes the signal being raised.
84 */
85void vfp_raise_sigfpe(unsigned int sicode, struct pt_regs *regs)
86{
87 siginfo_t info;
88
89 memset(&info, 0, sizeof(info));
90
91 info.si_signo = SIGFPE;
92 info.si_code = sicode;
93 info.si_addr = (void *)(instruction_pointer(regs) - 4);
94
95 /*
96 * This is the same as NWFPE, because it's not clear what
97 * this is used for
98 */
99 current->thread.error_code = 0;
100 current->thread.trap_no = 6;
101
Russell Kingda411192005-06-29 23:02:02 +0100102 send_sig_info(SIGFPE, &info, current);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700103}
104
105static void vfp_panic(char *reason)
106{
107 int i;
108
109 printk(KERN_ERR "VFP: Error: %s\n", reason);
110 printk(KERN_ERR "VFP: EXC 0x%08x SCR 0x%08x INST 0x%08x\n",
111 fmrx(FPEXC), fmrx(FPSCR), fmrx(FPINST));
112 for (i = 0; i < 32; i += 2)
113 printk(KERN_ERR "VFP: s%2u: 0x%08x s%2u: 0x%08x\n",
114 i, vfp_get_float(i), i+1, vfp_get_float(i+1));
115}
116
117/*
118 * Process bitmask of exception conditions.
119 */
120static void vfp_raise_exceptions(u32 exceptions, u32 inst, u32 fpscr, struct pt_regs *regs)
121{
122 int si_code = 0;
123
124 pr_debug("VFP: raising exceptions %08x\n", exceptions);
125
Daniel Jacobowitz7c6f2512006-08-27 12:42:08 +0100126 if (exceptions == VFP_EXCEPTION_ERROR) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700127 vfp_panic("unhandled bounce");
128 vfp_raise_sigfpe(0, regs);
129 return;
130 }
131
132 /*
133 * If any of the status flags are set, update the FPSCR.
134 * Comparison instructions always return at least one of
135 * these flags set.
136 */
137 if (exceptions & (FPSCR_N|FPSCR_Z|FPSCR_C|FPSCR_V))
138 fpscr &= ~(FPSCR_N|FPSCR_Z|FPSCR_C|FPSCR_V);
139
140 fpscr |= exceptions;
141
142 fmxr(FPSCR, fpscr);
143
144#define RAISE(stat,en,sig) \
145 if (exceptions & stat && fpscr & en) \
146 si_code = sig;
147
148 /*
149 * These are arranged in priority order, least to highest.
150 */
151 RAISE(FPSCR_IXC, FPSCR_IXE, FPE_FLTRES);
152 RAISE(FPSCR_UFC, FPSCR_UFE, FPE_FLTUND);
153 RAISE(FPSCR_OFC, FPSCR_OFE, FPE_FLTOVF);
154 RAISE(FPSCR_IOC, FPSCR_IOE, FPE_FLTINV);
155
156 if (si_code)
157 vfp_raise_sigfpe(si_code, regs);
158}
159
160/*
161 * Emulate a VFP instruction.
162 */
163static u32 vfp_emulate_instruction(u32 inst, u32 fpscr, struct pt_regs *regs)
164{
Daniel Jacobowitz7c6f2512006-08-27 12:42:08 +0100165 u32 exceptions = VFP_EXCEPTION_ERROR;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700166
167 pr_debug("VFP: emulate: INST=0x%08x SCR=0x%08x\n", inst, fpscr);
168
169 if (INST_CPRTDO(inst)) {
170 if (!INST_CPRT(inst)) {
171 /*
172 * CPDO
173 */
174 if (vfp_single(inst)) {
175 exceptions = vfp_single_cpdo(inst, fpscr);
176 } else {
177 exceptions = vfp_double_cpdo(inst, fpscr);
178 }
179 } else {
180 /*
181 * A CPRT instruction can not appear in FPINST2, nor
182 * can it cause an exception. Therefore, we do not
183 * have to emulate it.
184 */
185 }
186 } else {
187 /*
188 * A CPDT instruction can not appear in FPINST2, nor can
189 * it cause an exception. Therefore, we do not have to
190 * emulate it.
191 */
192 }
Russell King928bd1b2006-04-25 20:41:27 +0100193 return exceptions & ~VFP_NAN_FLAG;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700194}
195
196/*
197 * Package up a bounce condition.
198 */
199void VFP9_bounce(u32 trigger, u32 fpexc, struct pt_regs *regs)
200{
201 u32 fpscr, orig_fpscr, exceptions, inst;
202
203 pr_debug("VFP: bounce: trigger %08x fpexc %08x\n", trigger, fpexc);
204
205 /*
206 * Enable access to the VFP so we can handle the bounce.
207 */
208 fmxr(FPEXC, fpexc & ~(FPEXC_EXCEPTION|FPEXC_INV|FPEXC_UFC|FPEXC_IOC));
209
210 orig_fpscr = fpscr = fmrx(FPSCR);
211
212 /*
213 * If we are running with inexact exceptions enabled, we need to
214 * emulate the trigger instruction. Note that as we're emulating
215 * the trigger instruction, we need to increment PC.
216 */
217 if (fpscr & FPSCR_IXE) {
218 regs->ARM_pc += 4;
219 goto emulate;
220 }
221
222 barrier();
223
224 /*
225 * Modify fpscr to indicate the number of iterations remaining
226 */
227 if (fpexc & FPEXC_EXCEPTION) {
228 u32 len;
229
230 len = fpexc + (1 << FPEXC_LENGTH_BIT);
231
232 fpscr &= ~FPSCR_LENGTH_MASK;
233 fpscr |= (len & FPEXC_LENGTH_MASK) << (FPSCR_LENGTH_BIT - FPEXC_LENGTH_BIT);
234 }
235
236 /*
237 * Handle the first FP instruction. We used to take note of the
238 * FPEXC bounce reason, but this appears to be unreliable.
239 * Emulate the bounced instruction instead.
240 */
241 inst = fmrx(FPINST);
242 exceptions = vfp_emulate_instruction(inst, fpscr, regs);
243 if (exceptions)
244 vfp_raise_exceptions(exceptions, inst, orig_fpscr, regs);
245
246 /*
247 * If there isn't a second FP instruction, exit now.
248 */
249 if (!(fpexc & FPEXC_FPV2))
250 return;
251
252 /*
253 * The barrier() here prevents fpinst2 being read
254 * before the condition above.
255 */
256 barrier();
257 trigger = fmrx(FPINST2);
George G. Davisb7d7ef82006-05-05 22:32:23 +0100258 orig_fpscr = fpscr = fmrx(FPSCR);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700259
260 emulate:
261 exceptions = vfp_emulate_instruction(trigger, fpscr, regs);
262 if (exceptions)
263 vfp_raise_exceptions(exceptions, trigger, orig_fpscr, regs);
264}
265
266/*
267 * VFP support code initialisation.
268 */
269static int __init vfp_init(void)
270{
271 unsigned int vfpsid;
272
273 /*
274 * First check that there is a VFP that we can use.
275 * The handler is already setup to just log calls, so
276 * we just need to read the VFPSID register.
277 */
278 vfpsid = fmrx(FPSID);
279
280 printk(KERN_INFO "VFP support v0.3: ");
281 if (VFP_arch) {
282 printk("not present\n");
283 } else if (vfpsid & FPSID_NODOUBLE) {
284 printk("no double precision support\n");
285 } else {
286 VFP_arch = (vfpsid & FPSID_ARCH_MASK) >> FPSID_ARCH_BIT; /* Extract the architecture version */
287 printk("implementor %02x architecture %d part %02x variant %x rev %x\n",
288 (vfpsid & FPSID_IMPLEMENTER_MASK) >> FPSID_IMPLEMENTER_BIT,
289 (vfpsid & FPSID_ARCH_MASK) >> FPSID_ARCH_BIT,
290 (vfpsid & FPSID_PART_MASK) >> FPSID_PART_BIT,
291 (vfpsid & FPSID_VARIANT_MASK) >> FPSID_VARIANT_BIT,
292 (vfpsid & FPSID_REV_MASK) >> FPSID_REV_BIT);
293 vfp_vector = vfp_support_entry;
Russell Kingd6551e82006-06-21 13:31:52 +0100294
295 thread_register_notifier(&vfp_notifier_block);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700296 }
297 return 0;
298}
299
300late_initcall(vfp_init);