Home
last modified time | relevance | path

Searched +full:smc +full:- +full:id (Results 1 – 25 of 321) sorted by relevance

12345678910>>...13

/openbmc/linux/net/smc/
H A Dsmc_diag.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * Shared Memory Communications over RDMA (SMC-R) and RoCE
5 * Monitoring SMC transport protocol sockets
20 #include <net/smc.h>
22 #include "smc.h"
32 return (struct smc_diag_dump_ctx *)cb->ctx; in smc_dump_context()
37 struct smc_sock *smc = smc_sk(sk); in smc_diag_msg_common_fill() local
40 r->diag_family = sk->sk_family; in smc_diag_msg_common_fill()
41 sock_diag_save_cookie(sk, r->id.idiag_cookie); in smc_diag_msg_common_fill()
42 if (!smc->clcsock) in smc_diag_msg_common_fill()
[all …]
H A Dsmc_clc.h1 /* SPDX-License-Identifier: GPL-2.0 */
3 * Shared Memory Communications over RDMA (SMC-R) and RoCE
17 #include <linux/smc.h>
19 #include "smc.h"
27 #define SMC_TYPE_R 0 /* SMC-R only */
28 #define SMC_TYPE_D 1 /* SMC-D only */
29 #define SMC_TYPE_N 2 /* neither SMC-R nor SMC-D */
30 #define SMC_TYPE_B 3 /* SMC-R and SMC-D */
37 #define SMC_CLC_DECL_PEERNOSMC 0x03010000 /* peer did not indicate SMC */
39 #define SMC_CLC_DECL_NOSMCDEV 0x03030000 /* no SMC device found (R or D) */
[all …]
H A Dsmc_core.h1 /* SPDX-License-Identifier: GPL-2.0 */
3 * Shared Memory Communications over RDMA (SMC-R) and RoCE
5 * Definitions for SMC Connections, Link Groups and Links
16 #include <linux/smc.h>
20 #include <net/smc.h>
22 #include "smc.h"
29 * also is the default value for SMC-R v1 and v2.0
32 * SMC-R v2.1 and later negotiation, vendors or
34 * 16-255 as needed.
95 struct smc_ib_device *smcibdev; /* ib-device */
[all …]
/openbmc/linux/drivers/net/fddi/skfp/
H A Ddrvfbi.c1 // SPDX-License-Identifier: GPL-2.0-or-later
19 #include "h/smc.h"
44 * | --------------------- the patched POS_ID of the Adapter
45 * | xxxx = (Vendor ID low byte,
46 * | Vendor ID high byte,
47 * | Device ID low byte,
48 * | Device ID high byte)
49 * +------------------------------ the patched oem_id must be
51 * this is a short id for the driver.
60 #define OEMID(smc,i) oem_id[ID_BYTE0 + i] argument
[all …]
H A Dsmt.c1 // SPDX-License-Identifier: GPL-2.0-or-later
15 #include "h/smc.h"
26 #define m_fc(mb) ((mb)->sm_data[0])
54 static int mac_index(struct s_smc *smc, int mac);
55 static int phy_index(struct s_smc *smc, int phy);
56 static int mac_con_resource_index(struct s_smc *smc, int mac);
57 static int phy_con_resource_index(struct s_smc *smc, int phy);
58 static void smt_send_rdf(struct s_smc *smc, SMbuf *rej, int fc, int reason,
60 static void smt_send_nif(struct s_smc *smc, const struct fddi_addr *dest,
62 static void smt_send_ecf(struct s_smc *smc, struct fddi_addr *dest, int fc,
[all …]
H A Dsmtinit.c1 // SPDX-License-Identifier: GPL-2.0-or-later
20 #include "h/smc.h"
22 void init_fddi_driver(struct s_smc *smc, const u_char *mac_addr);
30 #define OEMID(smc,i) oem_id[i] argument
33 #define OEMID(smc,i) smc->hw.oem_id->oi_mark[i] argument
41 * the OEM ID is already defined.
43 static void set_oem_spec_val(struct s_smc *smc) in set_oem_spec_val() argument
47 mib = &smc->mib ; in set_oem_spec_val()
52 if (OEMID(smc,0) == 'I') { in set_oem_spec_val()
53 mib->fddiSMTConnectionPolicy = POLICY_MM ; in set_oem_spec_val()
[all …]
/openbmc/linux/Documentation/devicetree/bindings/watchdog/
H A Darm-smc-wdt.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/watchdog/arm-smc-wdt.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - $ref: watchdog.yaml#
13 - Julius Werner <jwerner@chromium.org>
18 - arm,smc-wdt
20 arm,smc-id:
23 The ATF smc function id used by the firmware.
27 - compatible
[all …]
/openbmc/linux/arch/arm/mach-omap2/
H A Domap-smc.S1 /* SPDX-License-Identifier: GPL-2.0-only */
23 .arch armv7-a
26 stmfd sp!, {r2-r12, lr}
30 smc #0
31 ldmfd sp!, {r2-r12, pc}
35 * u32 omap_smc2(u32 id, u32 falg, u32 pargs)
37 * @id: Application ID of HAL APIs
43 stmfd sp!, {r4-r12, lr}
46 mov r1, #0x0 @ Process ID
48 mov r12, #0x00 @ Secure Service ID
[all …]
/openbmc/linux/drivers/tee/optee/
H A Doptee_smc.h1 /* SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) */
3 * Copyright (c) 2015-2021, Linaro Limited
8 #include <linux/arm-smccc.h>
19 * Function specified by SMC Calling convention.
28 * Normal cached memory (write-back), shareable for SMP systems and not
36 * 32-bit registers.
40 * Function specified by SMC Calling convention
44 * 384fb3e0-e7f8-11e3-af63-0002a5d5c51b.
54 * Function specified by SMC Calling convention
75 * Used by non-secure world to figure out which Trusted OS is installed.
[all …]
/openbmc/linux/drivers/mfd/
H A Datmel-smc.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * Atmel SMC (Static Memory Controller) helper functions.
8 * Author: Boris Brezillon <boris.brezillon@free-electrons.com>
11 #include <linux/mfd/syscon/atmel-smc.h>
15 * atmel_smc_cs_conf_init - initialize a SMC CS conf
16 * @conf: the SMC CS conf to initialize
27 * atmel_smc_cs_encode_ncycles - encode a number of MCK clk cycles in the
28 * format expected by the SMC engine
36 * (section "SMC Setup/Pulse/Cycle/Timings Register"). This is a generic
40 * If the @ncycles value is too big to be encoded, -ERANGE is returned and
[all …]
/openbmc/u-boot/drivers/tee/optee/
H A Doptee_smc.h1 /* SPDX-License-Identifier: BSD-2-Clause */
3 * Copyright (c) 2015-2018, Linaro Limited
9 #include <linux/arm-smccc.h>
14 * https://github.com/OP-TEE/optee_os/blob/master/core/arch/arm/include/sm/optee_smc.h
26 * Function specified by SMC Calling convention.
35 * Normal cached memory (write-back), shareable for SMP systems and not
43 * 32-bit registers.
47 * Function specified by SMC Calling convention
51 * 65cb6b93-af0c-4617-8ed6-644a8d1140f8
61 * Function specified by SMC Calling convention
[all …]
/openbmc/linux/Documentation/devicetree/bindings/firmware/
H A Darm,scmi.yaml1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause)
4 ---
5 $id: http://devicetree.org/schemas/firmware/arm,scmi.yaml#
6 $schema: http://devicetree.org/meta-schemas/core.yaml#
11 - Sudeep Holla <sudeep.holla@arm.com>
31 - description: SCMI compliant firmware with mailbox transport
33 - const: arm,scmi
34 - description: SCMI compliant firmware with ARM SMC/HVC transport
36 - const: arm,scmi-smc
37 - description: SCMI compliant firmware with ARM SMC/HVC transport
[all …]
H A Dbrcm,kona-smc.yaml1 # SPDX-License-Identifier: GPL-2.0-only OR BSD-2-Clause
3 ---
4 $id: http://devicetree.org/schemas/firmware/brcm,kona-smc.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 A bounce buffer used for non-secure to secure communications.
13 - Florian Fainelli <f.fainelli@gmail.com>
18 - enum:
19 - brcm,bcm11351-smc
20 - brcm,bcm21664-smc
21 - brcm,bcm23550-smc
[all …]
/openbmc/linux/include/linux/
H A Darm-smccc.h1 /* SPDX-License-Identifier: GPL-2.0-only */
13 * This file provides common defines for ARM SMC Calling Convention as
17 * This code is up-to-date with version DEN 0028 C
109 /* KVM UID value: 28b46fb6-2ec5-11e9-a9ca-4b564d003a74 */
132 * this hypercall ID.
140 /* ptp_kvm counter type ID */
193 #define SMCCC_RET_NOT_SUPPORTED -1
194 #define SMCCC_RET_NOT_REQUIRED -2
195 #define SMCCC_RET_INVALID_PARAMETER -3
233 * Returns the SOC ID version.
[all …]
/openbmc/linux/drivers/firmware/
H A Dqcom_scm-legacy.c1 // SPDX-License-Identifier: GPL-2.0-only
13 #include <linux/arm-smccc.h>
14 #include <linux/dma-mapping.h>
23 * @args: The array of values used in registers in smc instruction
31 * struct scm_legacy_command - one SCM command buffer
35 * @id: command to be executed
40 * ------------------- <--- struct scm_legacy_command
42 * ------------------- <--- scm_legacy_get_command_buffer()
44 * ------------------- <--- struct scm_legacy_response and
46 * ------------------- <--- scm_legacy_get_response_buffer()
[all …]
H A Dqcom_scm-smc.c1 // SPDX-License-Identifier: GPL-2.0-only
12 #include <linux/arm-smccc.h>
13 #include <linux/dma-mapping.h>
19 * @args: The array of values used in registers in smc instruction
31 #define SCM_SMC_FIRST_EXT_IDX (SCM_SMC_N_REG_ARGS - 1)
32 #define SCM_SMC_N_EXT_ARGS (MAX_QCOM_SCM_ARGS - SCM_SMC_N_REG_ARGS + 1)
34 #define SCM_SMC_LAST_REG_IDX (SCM_SMC_FIRST_REG_IDX + SCM_SMC_N_REG_ARGS - 1)
36 static void __scm_smc_do_quirk(const struct arm_smccc_args *smc, in __scm_smc_do_quirk() argument
39 unsigned long a0 = smc->args[0]; in __scm_smc_do_quirk()
40 struct arm_smccc_quirk quirk = { .id = ARM_SMCCC_QUIRK_QCOM_A6 }; in __scm_smc_do_quirk()
[all …]
/openbmc/linux/drivers/firmware/arm_scmi/
H A Dsmc.c1 // SPDX-License-Identifier: GPL-2.0
3 * System Control and Management Interface (SCMI) Message SMC/HVC
9 #include <linux/arm-smccc.h>
26 * smc/hvc call to keep it uniform across smc32/smc64 conventions.
30 * scmi instances that are using the same smc-id.
38 #define SHMEM_OFFSET(x) ((x) & (SHMEM_SIZE - 1))
41 * struct scmi_smc - Structure representing a SCMI smc transport
50 * @func_id: smc/hvc call function id
72 scmi_rx_callback(scmi_info->cinfo, in smc_msg_done_isr()
73 shmem_read_header(scmi_info->shmem), NULL); in smc_msg_done_isr()
[all …]
/openbmc/u-boot/include/linux/
H A Darm-smccc.h1 /* SPDX-License-Identifier: GPL-2.0 */
9 * This file provides common defines for ARM SMC Calling Convention as
59 * struct arm_smccc_res - Result from SMC/HVC call
60 * @a0-a3 result values from registers 0 to 3
70 * struct arm_smccc_quirk - Contains quirk information
71 * @id: quirk identification
73 * @a6: Qualcomm quirk entry for returning post-smc call contents of a6
76 int id; member
83 * __arm_smccc_smc() - make SMC calls
84 * @a0-a7: arguments passed in registers 0 to 7
[all …]
/openbmc/linux/Documentation/devicetree/bindings/memory-controllers/
H A Datmel,ebi.txt5 The EBI provides a glue-less interface to asynchronous memories through the SMC
10 - compatible: "atmel,at91sam9260-ebi"
11 "atmel,at91sam9261-ebi"
12 "atmel,at91sam9263-ebi0"
13 "atmel,at91sam9263-ebi1"
14 "atmel,at91sam9rl-ebi"
15 "atmel,at91sam9g45-ebi"
16 "atmel,at91sam9x5-ebi"
17 "atmel,sama5d3-ebi"
18 "microchip,sam9x60-ebi"
[all …]
H A Darm,pl35x-smc.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/memory-controllers/arm,pl35x-smc.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: Arm PL35x Series Static Memory Controller (SMC)
10 - Miquel Raynal <miquel.raynal@bootlin.com>
18 https://documentation-service.arm.com/static/5e8e2524fd977155116a58aa
26 - arm,pl353-smc-r2p1
27 - arm,pl354
29 - compatible
[all …]
/openbmc/linux/arch/arm/mach-bcm/
H A Dbcm_kona_smc.c1 // SPDX-License-Identifier: GPL-2.0-only
25 {.compatible = "brcm,kona-smc"},
26 {.compatible = "bcm,kona-smc"}, /* deprecated name */
40 return -ENODEV; in bcm_kona_smc_init()
45 return -EINVAL; in bcm_kona_smc_init()
49 return -ENOMEM; in bcm_kona_smc_init()
60 * Only core 0 can run the secure monitor code. If an "smc" request
64 * Each "smc" request supplies a service id and the address of a
69 * Parameters to the "smc" request are passed in r4-r6 as follows:
70 * r4 service id
[all …]
/openbmc/u-boot/cmd/
H A Dsmccc.c1 // SPDX-License-Identifier: GPL-2.0+
9 #include <linux/arm-smccc.h>
40 if (!strcmp(argv[0], "smc")) in do_call()
52 smc, 8, 2, do_call,
54 "<fid> [arg1 ... arg6] [id]\n"
55 " - fid Function ID\n"
56 " - arg SMC arguments, passed to X1-X6 (default to zero)\n"
57 " - id Secure OS ID / Session ID, passed to W7 (defaults to zero)\n"
65 "<fid> [arg1...arg7] [id]\n"
66 " - fid Function ID\n"
[all …]
/openbmc/linux/Documentation/devicetree/bindings/mailbox/
H A Dxlnx,zynqmp-ipi-mailbox.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/mailbox/xlnx,zynqmp-ipi-mailbox.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
14 +-------------------------------------+
16 +-------------------------------------+
17 +--------------------------------------------------+
18 TF-A | |
21 +--------------------------+ |
24 +--------------------------------------------------+
[all …]
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/u-boot/corstone1000/
H A D0006-FF-A-v15-arm_ffa-introduce-sandbox-FF-A-support.patch4 Subject: [PATCH] FF-A v15: arm_ffa: introduce sandbox FF-A support
6 Emulate Secure World's FF-A ABIs and allow testing U-Boot FF-A support
8 Features of the sandbox FF-A support:
10 - Introduce an FF-A emulator
11 - Introduce an FF-A device driver for FF-A comms with emulated Secure World
12 - Provides test methods allowing to read the status of the inspected ABIs
14 The sandbox FF-A emulator supports only 64-bit direct messaging.
16 Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>
17 Reviewed-by: Simon Glass <sjg@chromium.org>
18 Upstream-Status: Submitted [cover letter: https://lore.kernel.org/all/20230713132847.176000-1-abdel…
[all …]
/openbmc/u-boot/arch/arm/mach-omap2/
H A Dlowlevel_init.S1 /* SPDX-License-Identifier: GPL-2.0+ */
53 push {r4-r12, lr} @ save registers - ROM code may pollute
60 smc 0 @ SMC #0 to enter monitor mode
62 pop {r4-r12, pc}
66 push {r4-r12, lr} @ save registers - ROM code may pollute
69 mov r12, #0x00 @ Secure Service ID in R12
73 smc 0 @ SMC #0 to enter monitor mode
85 smc 0 @ SMC #0 to enter monitor mode
88 pop {r4-r12, pc}

12345678910>>...13