/openbmc/linux/Documentation/devicetree/bindings/misc/ |
H A D | ti,j721e-esm.yaml | 5 $id: http://devicetree.org/schemas/misc/ti,j721e-esm.yaml# 8 title: Texas Instruments K3 ESM 14 The ESM (Error Signaling Module) is an IP block on TI K3 devices 17 the SoC, and they are handled by the ESM, which routes them to the proper 23 const: ti,j721e-esm 28 ti,esm-pins: 31 integer array of ESM interrupt pins to route to external event pin 39 - ti,esm-pins 48 esm@700000 { 49 compatible = "ti,j721e-esm"; [all …]
|
/openbmc/linux/drivers/misc/ |
H A D | tps6594-esm.c | 3 * ESM (Error Signal Monitor) driver for TI TPS6594/TPS6593/LP8764 PMICs 44 * SoC ESM function is used to power the load switch instead. in tps6594_esm_probe() 45 * As a consequence, ESM can not be used on those PMIC. in tps6594_esm_probe() 54 "ESM not supported for revision 1 PMIC\n"); in tps6594_esm_probe() 71 return dev_err_probe(dev, ret, "Failed to configure ESM\n"); in tps6594_esm_probe() 76 return dev_err_probe(dev, ret, "Failed to start ESM\n"); in tps6594_esm_probe() 93 dev_err(dev, "Failed to stop ESM\n"); in tps6594_esm_remove() 100 dev_err(dev, "Failed to unconfigure ESM\n"); in tps6594_esm_remove() 134 .name = "tps6594-esm", 143 MODULE_ALIAS("platform:tps6594-esm");
|
H A D | Kconfig | 547 Support ESM (Error Signal Monitor) on TPS6594 PMIC devices. 548 ESM is used typically to reboot the board in error condition. 551 will be called tps6594-esm.
|
H A D | Makefile | 68 obj-$(CONFIG_TPS6594_ESM) += tps6594-esm.o
|
/openbmc/linux/arch/powerpc/boot/ |
H A D | main.c | 154 /* Do we have an ESM (Enter Secure Mode) blob? */ in prep_esm_blob() 158 printf("Attached ESM blob at 0x%p-0x%p\n\r", in prep_esm_blob() 164 * If the ESM blob is too low it will be clobbered when the in prep_esm_blob() 175 fatal("Can't allocate memory for ESM blob !\n\r"); in prep_esm_blob() 176 printf("Relocating ESM blob 0x%lx <- 0x%p (0x%lx bytes)\n\r", in prep_esm_blob() 181 /* Tell the kernel ESM blob address via device tree. */ in prep_esm_blob() 182 setprop_val(chosen, "linux,esm-blob-start", (u32)(esm_blob_addr)); in prep_esm_blob() 183 setprop_val(chosen, "linux,esm-blob-end", (u32)(esm_blob_addr + esm_blob_size)); in prep_esm_blob()
|
H A D | wrapper | 16 # -e esm_blob specify ESM blob for secure images 256 echo "ESM blob not support on non-pseries platforms" >&2
|
/openbmc/linux/arch/arm64/boot/dts/ti/ |
H A D | k3-am64-mcu.dtsi | 10 * The MCU domain timer interrupts are routed only to the ESM module, 12 * of limited use without interrupts, and likely reserved by the ESM. 156 mcu_esm: esm@4100000 { 157 compatible = "ti,j721e-esm"; 159 ti,esm-pins = <0>, <1>;
|
H A D | k3-am62-mcu.dtsi | 17 mcu_esm: esm@4100000 { 18 compatible = "ti,j721e-esm"; 20 ti,esm-pins = <0>, <1>, <2>, <85>; 24 * The MCU domain timer interrupts are routed only to the ESM module, 26 * of limited use without interrupts, and likely reserved by the ESM.
|
H A D | k3-am62a-mcu.dtsi | 19 * The MCU domain timer interrupts are routed only to the ESM module, 21 * of limited use without interrupts, and likely reserved by the ESM.
|
H A D | k3-am65-mcu.dtsi | 143 * The MCU domain timer interrupts are routed only to the ESM module, 145 * of limited use without interrupts, and likely reserved by the ESM.
|
H A D | k3-j7200.dtsi | 115 <0x00 0x00700000 0x00 0x00700000 0x00 0x00001000>, /* ESM */
|
H A D | k3-j721e.dtsi | 116 <0x00 0x00700000 0x00 0x00700000 0x00 0x00001000>, /* ESM */
|
H A D | k3-am62-main.dtsi | 227 main_esm: esm@420000 { 228 compatible = "ti,j721e-esm"; 230 ti,esm-pins = <160>, <161>, <162>, <163>, <177>, <178>;
|
H A D | k3-j7200-main.dtsi | 1297 main_esm: esm@700000 { 1298 compatible = "ti,j721e-esm"; 1300 ti,esm-pins = <656>, <657>;
|
H A D | k3-am64-main.dtsi | 367 main_esm: esm@420000 { 368 compatible = "ti,j721e-esm"; 370 ti,esm-pins = <160>, <161>;
|
H A D | k3-j721e-main.dtsi | 2736 main_esm: esm@700000 { 2737 compatible = "ti,j721e-esm"; 2739 ti,esm-pins = <344>, <345>;
|
/openbmc/linux/drivers/s390/cio/ |
H A D | chsc.c | 1486 u8 esm[8]; member 1509 * @esm: 8 1-byte endpoint security mode values 1510 * @esm_valid: validity mask for @esm 1517 int chsc_scud(u16 cu, u64 *esm, u8 *esm_valid) in chsc_scud() argument 1549 memcpy(esm, scud->cudb[0].esm, sizeof(*esm)); in chsc_scud()
|
/openbmc/linux/arch/s390/include/asm/ |
H A D | cio.h | 376 int chsc_scud(u16 cu, u64 *esm, u8 *esm_valid);
|
/openbmc/linux/sound/pci/ |
H A D | es1968.c | 923 static inline void snd_es1968_trigger_apu(struct es1968 *esm, int apu, int mode) in snd_es1968_trigger_apu() argument 926 __apu_set_register(esm, apu, 0, in snd_es1968_trigger_apu() 927 (__apu_get_register(esm, apu, 0) & 0xff0f) | in snd_es1968_trigger_apu() 1785 struct es1968 *esm = pcm->private_data; in snd_es1968_pcm_free() local 1786 snd_es1968_free_dmabuf(esm); in snd_es1968_pcm_free() 1787 esm->pcm = NULL; in snd_es1968_pcm_free()
|
/openbmc/linux/drivers/mfd/ |
H A D | tps6594-core.c | 130 MFD_CELL_RES("tps6594-esm", tps6594_esm_resources),
|
/openbmc/linux/Documentation/powerpc/ |
H A D | ultravisor.rst | 824 uint64_t esm_blob_addr, /* location of the ESM blob */ 846 ESM blob.
|
/openbmc/linux/Documentation/arch/arm64/ |
H A D | booting.rst | 326 - CPTR_EL3.ESM (bit 12) must be initialised to 0b1.
|
/openbmc/qemu/target/arm/ |
H A D | internals.h | 152 FIELD(CPTR_EL3, ESM, 12, 1)
|
H A D | helper.c | 7226 /* CPTR_EL3. Since ESM is negative we must check for EL3. */ in sme_exception_el() 7228 && !FIELD_EX64(env->cp15.cptr_el[3], CPTR_EL3, ESM)) { in sme_exception_el() 7339 /* If EL1 this is a FEAT_NV access and CPTR_EL3.ESM doesn't apply */ in access_smprimap() 7342 && !FIELD_EX64(env->cp15.cptr_el[3], CPTR_EL3, ESM)) { in access_smprimap() 7353 && !FIELD_EX64(env->cp15.cptr_el[3], CPTR_EL3, ESM)) { in access_smpri()
|
/openbmc/linux/drivers/s390/block/ |
H A D | dasd_eckd.c | 1056 u8 esm[8]; in dasd_eckd_read_fc_security() local 1060 rc = chsc_scud(private->uid.ssid, (u64 *)esm, &esm_valid); in dasd_eckd_read_fc_security() 1069 device->path[chp].fc_security = esm[chp]; in dasd_eckd_read_fc_security()
|