/openbmc/linux/net/smc/ |
H A D | smc_diag.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * Shared Memory Communications over RDMA (SMC-R) and RoCE 5 * Monitoring SMC transport protocol sockets 20 #include <net/smc.h> 22 #include "smc.h" 32 return (struct smc_diag_dump_ctx *)cb->ctx; in smc_dump_context() 37 struct smc_sock *smc = smc_sk(sk); in smc_diag_msg_common_fill() local 40 r->diag_family = sk->sk_family; in smc_diag_msg_common_fill() 41 sock_diag_save_cookie(sk, r->id.idiag_cookie); in smc_diag_msg_common_fill() 42 if (!smc->clcsock) in smc_diag_msg_common_fill() [all …]
|
H A D | smc_clc.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 3 * Shared Memory Communications over RDMA (SMC-R) and RoCE 17 #include <linux/smc.h> 19 #include "smc.h" 27 #define SMC_TYPE_R 0 /* SMC-R only */ 28 #define SMC_TYPE_D 1 /* SMC-D only */ 29 #define SMC_TYPE_N 2 /* neither SMC-R nor SMC-D */ 30 #define SMC_TYPE_B 3 /* SMC-R and SMC-D */ 37 #define SMC_CLC_DECL_PEERNOSMC 0x03010000 /* peer did not indicate SMC */ 39 #define SMC_CLC_DECL_NOSMCDEV 0x03030000 /* no SMC device found (R or D) */ [all …]
|
H A D | smc_core.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 3 * Shared Memory Communications over RDMA (SMC-R) and RoCE 5 * Definitions for SMC Connections, Link Groups and Links 16 #include <linux/smc.h> 20 #include <net/smc.h> 22 #include "smc.h" 29 * also is the default value for SMC-R v1 and v2.0 32 * SMC-R v2.1 and later negotiation, vendors or 34 * 16-255 as needed. 95 struct smc_ib_device *smcibdev; /* ib-device */ [all …]
|
/openbmc/linux/drivers/net/fddi/skfp/ |
H A D | drvfbi.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 19 #include "h/smc.h" 44 * | --------------------- the patched POS_ID of the Adapter 45 * | xxxx = (Vendor ID low byte, 46 * | Vendor ID high byte, 47 * | Device ID low byte, 48 * | Device ID high byte) 49 * +------------------------------ the patched oem_id must be 51 * this is a short id for the driver. 60 #define OEMID(smc,i) oem_id[ID_BYTE0 + i] argument [all …]
|
H A D | smt.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 15 #include "h/smc.h" 26 #define m_fc(mb) ((mb)->sm_data[0]) 54 static int mac_index(struct s_smc *smc, int mac); 55 static int phy_index(struct s_smc *smc, int phy); 56 static int mac_con_resource_index(struct s_smc *smc, int mac); 57 static int phy_con_resource_index(struct s_smc *smc, int phy); 58 static void smt_send_rdf(struct s_smc *smc, SMbuf *rej, int fc, int reason, 60 static void smt_send_nif(struct s_smc *smc, const struct fddi_addr *dest, 62 static void smt_send_ecf(struct s_smc *smc, struct fddi_addr *dest, int fc, [all …]
|
H A D | smtinit.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 20 #include "h/smc.h" 22 void init_fddi_driver(struct s_smc *smc, const u_char *mac_addr); 30 #define OEMID(smc,i) oem_id[i] argument 33 #define OEMID(smc,i) smc->hw.oem_id->oi_mark[i] argument 41 * the OEM ID is already defined. 43 static void set_oem_spec_val(struct s_smc *smc) in set_oem_spec_val() argument 47 mib = &smc->mib ; in set_oem_spec_val() 52 if (OEMID(smc,0) == 'I') { in set_oem_spec_val() 53 mib->fddiSMTConnectionPolicy = POLICY_MM ; in set_oem_spec_val() [all …]
|
/openbmc/linux/Documentation/devicetree/bindings/watchdog/ |
H A D | arm-smc-wdt.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/watchdog/arm-smc-wdt.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - $ref: watchdog.yaml# 13 - Julius Werner <jwerner@chromium.org> 18 - arm,smc-wdt 20 arm,smc-id: 23 The ATF smc function id used by the firmware. 27 - compatible [all …]
|
/openbmc/linux/arch/arm/mach-omap2/ |
H A D | omap-smc.S | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 23 .arch armv7-a 26 stmfd sp!, {r2-r12, lr} 30 smc #0 31 ldmfd sp!, {r2-r12, pc} 35 * u32 omap_smc2(u32 id, u32 falg, u32 pargs) 37 * @id: Application ID of HAL APIs 43 stmfd sp!, {r4-r12, lr} 46 mov r1, #0x0 @ Process ID 48 mov r12, #0x00 @ Secure Service ID [all …]
|
/openbmc/linux/drivers/tee/optee/ |
H A D | optee_smc.h | 1 /* SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) */ 3 * Copyright (c) 2015-2021, Linaro Limited 8 #include <linux/arm-smccc.h> 19 * Function specified by SMC Calling convention. 28 * Normal cached memory (write-back), shareable for SMP systems and not 36 * 32-bit registers. 40 * Function specified by SMC Calling convention 44 * 384fb3e0-e7f8-11e3-af63-0002a5d5c51b. 54 * Function specified by SMC Calling convention 75 * Used by non-secure world to figure out which Trusted OS is installed. [all …]
|
/openbmc/linux/drivers/mfd/ |
H A D | atmel-smc.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * Atmel SMC (Static Memory Controller) helper functions. 8 * Author: Boris Brezillon <boris.brezillon@free-electrons.com> 11 #include <linux/mfd/syscon/atmel-smc.h> 15 * atmel_smc_cs_conf_init - initialize a SMC CS conf 16 * @conf: the SMC CS conf to initialize 27 * atmel_smc_cs_encode_ncycles - encode a number of MCK clk cycles in the 28 * format expected by the SMC engine 36 * (section "SMC Setup/Pulse/Cycle/Timings Register"). This is a generic 40 * If the @ncycles value is too big to be encoded, -ERANGE is returned and [all …]
|
/openbmc/u-boot/drivers/tee/optee/ |
H A D | optee_smc.h | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 3 * Copyright (c) 2015-2018, Linaro Limited 9 #include <linux/arm-smccc.h> 14 * https://github.com/OP-TEE/optee_os/blob/master/core/arch/arm/include/sm/optee_smc.h 26 * Function specified by SMC Calling convention. 35 * Normal cached memory (write-back), shareable for SMP systems and not 43 * 32-bit registers. 47 * Function specified by SMC Calling convention 51 * 65cb6b93-af0c-4617-8ed6-644a8d1140f8 61 * Function specified by SMC Calling convention [all …]
|
/openbmc/linux/Documentation/devicetree/bindings/firmware/ |
H A D | arm,scmi.yaml | 1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) 4 --- 5 $id: http://devicetree.org/schemas/firmware/arm,scmi.yaml# 6 $schema: http://devicetree.org/meta-schemas/core.yaml# 11 - Sudeep Holla <sudeep.holla@arm.com> 31 - description: SCMI compliant firmware with mailbox transport 33 - const: arm,scmi 34 - description: SCMI compliant firmware with ARM SMC/HVC transport 36 - const: arm,scmi-smc 37 - description: SCMI compliant firmware with ARM SMC/HVC transport [all …]
|
H A D | brcm,kona-smc.yaml | 1 # SPDX-License-Identifier: GPL-2.0-only OR BSD-2-Clause 3 --- 4 $id: http://devicetree.org/schemas/firmware/brcm,kona-smc.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 A bounce buffer used for non-secure to secure communications. 13 - Florian Fainelli <f.fainelli@gmail.com> 18 - enum: 19 - brcm,bcm11351-smc 20 - brcm,bcm21664-smc 21 - brcm,bcm23550-smc [all …]
|
/openbmc/linux/include/linux/ |
H A D | arm-smccc.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 13 * This file provides common defines for ARM SMC Calling Convention as 17 * This code is up-to-date with version DEN 0028 C 109 /* KVM UID value: 28b46fb6-2ec5-11e9-a9ca-4b564d003a74 */ 132 * this hypercall ID. 140 /* ptp_kvm counter type ID */ 193 #define SMCCC_RET_NOT_SUPPORTED -1 194 #define SMCCC_RET_NOT_REQUIRED -2 195 #define SMCCC_RET_INVALID_PARAMETER -3 233 * Returns the SOC ID version. [all …]
|
/openbmc/linux/drivers/firmware/ |
H A D | qcom_scm-legacy.c | 1 // SPDX-License-Identifier: GPL-2.0-only 13 #include <linux/arm-smccc.h> 14 #include <linux/dma-mapping.h> 23 * @args: The array of values used in registers in smc instruction 31 * struct scm_legacy_command - one SCM command buffer 35 * @id: command to be executed 40 * ------------------- <--- struct scm_legacy_command 42 * ------------------- <--- scm_legacy_get_command_buffer() 44 * ------------------- <--- struct scm_legacy_response and 46 * ------------------- <--- scm_legacy_get_response_buffer() [all …]
|
H A D | qcom_scm-smc.c | 1 // SPDX-License-Identifier: GPL-2.0-only 12 #include <linux/arm-smccc.h> 13 #include <linux/dma-mapping.h> 19 * @args: The array of values used in registers in smc instruction 31 #define SCM_SMC_FIRST_EXT_IDX (SCM_SMC_N_REG_ARGS - 1) 32 #define SCM_SMC_N_EXT_ARGS (MAX_QCOM_SCM_ARGS - SCM_SMC_N_REG_ARGS + 1) 34 #define SCM_SMC_LAST_REG_IDX (SCM_SMC_FIRST_REG_IDX + SCM_SMC_N_REG_ARGS - 1) 36 static void __scm_smc_do_quirk(const struct arm_smccc_args *smc, in __scm_smc_do_quirk() argument 39 unsigned long a0 = smc->args[0]; in __scm_smc_do_quirk() 40 struct arm_smccc_quirk quirk = { .id = ARM_SMCCC_QUIRK_QCOM_A6 }; in __scm_smc_do_quirk() [all …]
|
/openbmc/linux/drivers/firmware/arm_scmi/ |
H A D | smc.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * System Control and Management Interface (SCMI) Message SMC/HVC 9 #include <linux/arm-smccc.h> 26 * smc/hvc call to keep it uniform across smc32/smc64 conventions. 30 * scmi instances that are using the same smc-id. 38 #define SHMEM_OFFSET(x) ((x) & (SHMEM_SIZE - 1)) 41 * struct scmi_smc - Structure representing a SCMI smc transport 50 * @func_id: smc/hvc call function id 72 scmi_rx_callback(scmi_info->cinfo, in smc_msg_done_isr() 73 shmem_read_header(scmi_info->shmem), NULL); in smc_msg_done_isr() [all …]
|
/openbmc/u-boot/include/linux/ |
H A D | arm-smccc.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 9 * This file provides common defines for ARM SMC Calling Convention as 59 * struct arm_smccc_res - Result from SMC/HVC call 60 * @a0-a3 result values from registers 0 to 3 70 * struct arm_smccc_quirk - Contains quirk information 71 * @id: quirk identification 73 * @a6: Qualcomm quirk entry for returning post-smc call contents of a6 76 int id; member 83 * __arm_smccc_smc() - make SMC calls 84 * @a0-a7: arguments passed in registers 0 to 7 [all …]
|
/openbmc/linux/Documentation/devicetree/bindings/memory-controllers/ |
H A D | atmel,ebi.txt | 5 The EBI provides a glue-less interface to asynchronous memories through the SMC 10 - compatible: "atmel,at91sam9260-ebi" 11 "atmel,at91sam9261-ebi" 12 "atmel,at91sam9263-ebi0" 13 "atmel,at91sam9263-ebi1" 14 "atmel,at91sam9rl-ebi" 15 "atmel,at91sam9g45-ebi" 16 "atmel,at91sam9x5-ebi" 17 "atmel,sama5d3-ebi" 18 "microchip,sam9x60-ebi" [all …]
|
H A D | arm,pl35x-smc.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/memory-controllers/arm,pl35x-smc.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: Arm PL35x Series Static Memory Controller (SMC) 10 - Miquel Raynal <miquel.raynal@bootlin.com> 18 https://documentation-service.arm.com/static/5e8e2524fd977155116a58aa 26 - arm,pl353-smc-r2p1 27 - arm,pl354 29 - compatible [all …]
|
/openbmc/linux/arch/arm/mach-bcm/ |
H A D | bcm_kona_smc.c | 1 // SPDX-License-Identifier: GPL-2.0-only 25 {.compatible = "brcm,kona-smc"}, 26 {.compatible = "bcm,kona-smc"}, /* deprecated name */ 40 return -ENODEV; in bcm_kona_smc_init() 45 return -EINVAL; in bcm_kona_smc_init() 49 return -ENOMEM; in bcm_kona_smc_init() 60 * Only core 0 can run the secure monitor code. If an "smc" request 64 * Each "smc" request supplies a service id and the address of a 69 * Parameters to the "smc" request are passed in r4-r6 as follows: 70 * r4 service id [all …]
|
/openbmc/u-boot/cmd/ |
H A D | smccc.c | 1 // SPDX-License-Identifier: GPL-2.0+ 9 #include <linux/arm-smccc.h> 40 if (!strcmp(argv[0], "smc")) in do_call() 52 smc, 8, 2, do_call, 54 "<fid> [arg1 ... arg6] [id]\n" 55 " - fid Function ID\n" 56 " - arg SMC arguments, passed to X1-X6 (default to zero)\n" 57 " - id Secure OS ID / Session ID, passed to W7 (defaults to zero)\n" 65 "<fid> [arg1...arg7] [id]\n" 66 " - fid Function ID\n" [all …]
|
/openbmc/linux/Documentation/devicetree/bindings/mailbox/ |
H A D | xlnx,zynqmp-ipi-mailbox.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/mailbox/xlnx,zynqmp-ipi-mailbox.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 14 +-------------------------------------+ 16 +-------------------------------------+ 17 +--------------------------------------------------+ 18 TF-A | | 21 +--------------------------+ | 24 +--------------------------------------------------+ [all …]
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/u-boot/corstone1000/ |
H A D | 0006-FF-A-v15-arm_ffa-introduce-sandbox-FF-A-support.patch | 4 Subject: [PATCH] FF-A v15: arm_ffa: introduce sandbox FF-A support 6 Emulate Secure World's FF-A ABIs and allow testing U-Boot FF-A support 8 Features of the sandbox FF-A support: 10 - Introduce an FF-A emulator 11 - Introduce an FF-A device driver for FF-A comms with emulated Secure World 12 - Provides test methods allowing to read the status of the inspected ABIs 14 The sandbox FF-A emulator supports only 64-bit direct messaging. 16 Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com> 17 Reviewed-by: Simon Glass <sjg@chromium.org> 18 Upstream-Status: Submitted [cover letter: https://lore.kernel.org/all/20230713132847.176000-1-abdel… [all …]
|
/openbmc/u-boot/arch/arm/mach-omap2/ |
H A D | lowlevel_init.S | 1 /* SPDX-License-Identifier: GPL-2.0+ */ 53 push {r4-r12, lr} @ save registers - ROM code may pollute 60 smc 0 @ SMC #0 to enter monitor mode 62 pop {r4-r12, pc} 66 push {r4-r12, lr} @ save registers - ROM code may pollute 69 mov r12, #0x00 @ Secure Service ID in R12 73 smc 0 @ SMC #0 to enter monitor mode 85 smc 0 @ SMC #0 to enter monitor mode 88 pop {r4-r12, pc}
|