/** * Enable access to Octeon's COP2 crypto hardware for kernel use. * Wrap any crypto operations in calls to * octeon_crypto_enable/disable in order to make sure the state of * COP2 isn't corrupted if userspace is also performing hardware * crypto operations. Allocate the state parameter on the stack. * * @param state State structure to store current COP2 state in * * @return Flags to be passed to octeon_crypto_disable() */ unsigned long octeon_crypto_enable(struct octeon_cop2_state *state) { int status; unsigned long flags; local_irq_save(flags); status = read_c0_status(); write_c0_status(status | ST0_CU2); if (KSTK_STATUS(current) & ST0_CU2) { octeon_cop2_save(&(current->thread.cp2)); KSTK_STATUS(current) &= ~ST0_CU2; status &= ~ST0_CU2; } else if (status & ST0_CU2) octeon_cop2_save(state); local_irq_restore(flags); return status & ST0_CU2; }
static int cnmips_cu2_call(struct notifier_block *nfb, unsigned long action, void *data) { unsigned long flags; unsigned int status; switch (action) { case CU2_EXCEPTION: prefetch(¤t->thread.cp2); local_irq_save(flags); KSTK_STATUS(current) |= ST0_CU2; status = read_c0_status(); write_c0_status(status | ST0_CU2); octeon_cop2_restore(&(current->thread.cp2)); write_c0_status(status & ~ST0_CU2); local_irq_restore(flags); return NOTIFY_BAD; /* Don't call default notifier */ } return NOTIFY_OK; /* Let default notifier send signals */ }