Lines Matching +full:secure +full:- +full:monitor
1 // SPDX-License-Identifier: GPL-2.0-only
25 {.compatible = "brcm,kona-smc"},
26 {.compatible = "bcm,kona-smc"}, /* deprecated name */
40 return -ENODEV; in bcm_kona_smc_init()
45 return -EINVAL; in bcm_kona_smc_init()
49 return -ENOMEM; in bcm_kona_smc_init()
52 pr_info("Kona Secure API initialized\n"); in bcm_kona_smc_init()
60 * Only core 0 can run the secure monitor code. If an "smc" request
67 * cache and interrupt handling while the secure monitor executes.
69 * Parameters to the "smc" request are passed in r4-r6 as follows:
76 * First, the secure monitor call itself (regardless of the specific
117 /* __bcm_kona_smc() should only run on CPU 0, with pre-emption disabled */
127 writel_relaxed(data->arg0, args++); in __bcm_kona_smc()
128 writel_relaxed(data->arg1, args++); in __bcm_kona_smc()
129 writel_relaxed(data->arg2, args++); in __bcm_kona_smc()
130 writel(data->arg3, args); in __bcm_kona_smc()
132 /* Flush caches for input data passed to Secure Monitor */ in __bcm_kona_smc()
135 /* Trap into Secure Monitor and record the request result */ in __bcm_kona_smc()
136 data->result = bcm_kona_do_smc(data->service_id, bcm_smc_buffer_phys); in __bcm_kona_smc()
152 * Due to a limitation of the secure monitor, we must use the SMP in bcm_kona_smc()
153 * infrastructure to forward all secure monitor calls to Core 0. in bcm_kona_smc()