| /linux/tools/testing/selftests/arm64/abi/ |
| H A D | syscall-abi.c | 331 ksft_print_msg("SME VL %d ZA does not match\n", sme_vl); in check_za() 360 ksft_print_msg("SME VL %d ZT does not match\n", sme_vl); in check_zt() 412 int sve, sme; in test_one_syscall() local 428 for (sme = 0; sme < sme_vl_count; sme++) { in test_one_syscall() 429 ret = prctl(PR_SME_SET_VL, sme_vls[sme]); in test_one_syscall() 435 sme_vls[sme], in test_one_syscall() 437 "%s SVE VL %d/SME VL %d SM+ZA\n", in test_one_syscall() 439 sme_vls[sme]); in test_one_syscall() 441 sme_vls[sme], SVCR_SM_MASK), in test_one_syscall() 442 "%s SVE VL %d/SME VL %d SM\n", in test_one_syscall() [all …]
|
| H A D | hwcap.c | 892 .name = "SME", 895 .cpuinfo = "sme", 908 .name = "SME 2.1", 915 .name = "SME 2.2", 922 .name = "SME AES", 929 .name = "SME I16I32", 936 .name = "SME BI32I32", 943 .name = "SME B16B16", 950 .name = "SME F16F16", 957 .name = "SME F8F16", [all …]
|
| H A D | syscall-abi-asm.S | 12 // x1: SME VL 83 // Set SVCR if we're doing SME 89 // Load ZA and ZT0 if enabled - uses x12 as scratch due to SME LDR 152 // Load the SVE registers if we're doing SVE/SME 257 // Save SVCR if we're doing SME 263 // Save ZA if it's enabled - uses x12 as scratch due to SME STR 338 // Only save FFR if we wrote a value for SME 355 // Clear SVCR if we were doing SME so future tests don't have ZA
|
| /linux/Documentation/arch/arm64/ |
| H A D | sme.rst | 6 order to support use of the ARM Scalable Matrix Extension (SME). 11 included in SME. 13 This document does not aim to describe the SME architecture or programmer's 15 model features for SME is included in Appendix A. 24 * The presence of SME is reported to userspace via HWCAP2_SME in the aux vector 25 AT_HWCAP2 entry. Presence of this flag implies the presence of the SME 27 described in this document. SME is reported in /proc/cpuinfo as "sme". 34 * Support for the execution of SME instructions in userspace can also be 36 instruction, and checking that the value of the SME field is nonzero. [3] 42 * There are a number of optional SME features, presence of these is reported [all …]
|
| /linux/arch/x86/coco/ |
| H A D | core.c | 44 * the other levels of SME/SEV functionality, including C-bit 59 * SME and SEV are very similar but they are not the same, so there are 60 * times that the kernel will need to distinguish between SME and SEV. The 65 * paging is activated, SME will access all memory as decrypted, but SEV 67 * up under SME the trampoline area cannot be encrypted, whereas under SEV
|
| /linux/tools/testing/selftests/arm64/signal/testcases/ |
| H A D | sme_vl.c | 5 * Check that the SME vector length reported in signal contexts is the 62 .name = "SME VL", 63 .descr = "Check that we get the right SME VL reported",
|
| H A D | sme_trap_za.c | 29 .name = "SME ZA trap",
|
| /linux/drivers/net/wireless/quantenna/qtnfmac/ |
| H A D | commands.c | 2071 struct cfg80211_connect_params *sme) in qtnf_cmd_send_connect() argument 2091 if (sme->bssid_hint) in qtnf_cmd_send_connect() 2092 ether_addr_copy(cmd->bssid_hint, sme->bssid_hint); in qtnf_cmd_send_connect() 2096 if (sme->prev_bssid) in qtnf_cmd_send_connect() 2097 ether_addr_copy(cmd->prev_bssid, sme->prev_bssid); in qtnf_cmd_send_connect() 2101 if ((sme->bg_scan_period >= 0) && in qtnf_cmd_send_connect() 2102 (sme->bg_scan_period <= SHRT_MAX)) in qtnf_cmd_send_connect() 2103 cmd->bg_scan_period = cpu_to_le16(sme->bg_scan_period); in qtnf_cmd_send_connect() 2107 if (sme->flags & ASSOC_REQ_DISABLE_HT) in qtnf_cmd_send_connect() 2109 if (sme->flags & ASSOC_REQ_DISABLE_VHT) in qtnf_cmd_send_connect() [all …]
|
| /linux/tools/testing/selftests/arm64/fp/ |
| H A D | Makefile | 16 rdvl-sme rdvl-sve \ 34 $(OUTPUT)/rdvl-sme: rdvl-sme.c $(OUTPUT)/rdvl.o
|
| H A D | fp-ptrace.c | 247 ksft_print_msg("Failed to set SME VL %d: %d\n", in run_child() 330 read_one_child_regs(child, "SME VL", &iov_parent, &iov_child); in read_child_regs() 597 ksft_print_msg("Mismatch in initial SME VL: %d != %d\n", in check_ptrace_values_za() 995 ksft_print_msg("Mismatch in SME VL: %ld != %d\n", in check_memory_values() 1055 /* Changing the SME VL disables ZA */ in sve_write_supported() 1280 /* Changing the SME VL flushes ZT, SVE state */ in za_write_expected() 1376 snprintf(name, sizeof(name), "%s, SVE %d->%d, SME %d/%x->%d/%x", in run_test() 1385 snprintf(name, sizeof(name), "%s, SME %d/%x->%d/%x", in run_test() 1582 * Every SME VL/SVCR combination in run_sme_tests() 1636 probe_vls("SME", sme_vls, &sme_vl_count, PR_SME_SET_VL); in main() [all …]
|
| H A D | .gitignore | 6 rdvl-sme
|
| H A D | rdvl.S | 4 #include "sme-inst.h"
|
| /linux/arch/arm64/kvm/ |
| H A D | fpsimd.c | 32 * Ensure that any host FPSIMD/SVE/SME state is saved and unbound such in kvm_arch_vcpu_load_fp() 36 * When the host may use SME, fpsimd_save_and_flush_cpu_state() ensures in kvm_arch_vcpu_load_fp() 73 * Currently we do not support SME guests so SVCR is in kvm_arch_vcpu_ctxsync_fp()
|
| /linux/arch/x86/boot/startup/ |
| H A D | map_kernel.c | 40 /* Encrypt the kernel and related (if SME is active) */ in sme_postprocess_startup() 72 * Return the SME encryption mask (if SME is active) to be used as a in sme_postprocess_startup() 121 /* Include the SME encryption mask in the fixup value */ in __startup_64()
|
| /linux/drivers/net/wireless/virtual/ |
| H A D | virt_wifi.c | 229 struct cfg80211_connect_params *sme) in virt_wifi_connect() argument 237 if (!sme->ssid) in virt_wifi_connect() 240 priv->connect_requested_ssid_len = sme->ssid_len; in virt_wifi_connect() 241 memcpy(priv->connect_requested_ssid, sme->ssid, sme->ssid_len); in virt_wifi_connect() 247 if (sme->bssid) { in virt_wifi_connect() 248 ether_addr_copy(priv->connect_requested_bss, sme->bssid); in virt_wifi_connect()
|
| /linux/tools/testing/selftests/arm64/signal/ |
| H A D | sve_helpers.c | 5 * Common helper functions for SVE and SME functionality. 33 * Unlike SVE, SME does not require the minimum vector length in sve_fill_vls()
|
| H A D | sve_helpers.h | 5 * Common helper functions for SVE and SME functionality.
|
| /linux/arch/x86/include/asm/ |
| H A D | processor-flags.h | 28 * On systems with SME, one bit (in a variable position!) is stolen to indicate 39 /* Mask off the address space ID and SME encryption bits. */
|
| /linux/arch/x86/kernel/ |
| H A D | head_64.S | 88 * Activate SEV/SME memory encryption if supported/enabled. This needs to 108 * Perform pagetable fixups. Additionally, if SME is active, encrypt 109 * the kernel and retrieve the modifier (SME encryption mask if SME 186 * Retrieve the modifier (SME encryption mask if SME is active) to be
|
| H A D | head64.c | 200 * If SME is active, this will create decrypted mappings of the in copy_bootdata() 215 * freeing up that memory for use by the system. If SME is active, in copy_bootdata() 258 * SME support may update early_pmd_flags to include the memory in x86_64_start_kernel()
|
| /linux/arch/x86/kernel/cpu/ |
| H A D | amd.c | 551 * support SME. This provides support for performing a successful in early_detect_mem_encrypt() 552 * kexec when going from SME inactive to SME active (or vice-versa). in early_detect_mem_encrypt() 567 * BIOS support is required for SME and SEV. in early_detect_mem_encrypt() 568 * For SME: If BIOS has enabled SME then adjust x86_phys_bits by in early_detect_mem_encrypt() 569 * the SME physical address space reduction value. in early_detect_mem_encrypt() 570 * If BIOS has not enabled SME then don't advertise the in early_detect_mem_encrypt() 571 * SME feature (set in scattered.c). in early_detect_mem_encrypt() 572 * If the kernel has not enabled SME via any means then in early_detect_mem_encrypt() 573 * don't advertise the SME feature. in early_detect_mem_encrypt() 577 * In all cases, since support for SME and SEV requires long mode, in early_detect_mem_encrypt()
|
| /linux/drivers/crypto/ccp/ |
| H A D | hsti.c | 135 …dev_notice(psp->dev, "psp: Both TSME and SME are active, SME is unnecessary when TSME is active.\n… in psp_init_hsti()
|
| /linux/arch/arm64/kernel/pi/ |
| H A D | idreg-override.c | 138 * Similarly to SVE, disabling SME also means disabling all in pfr1_sme_filter() 157 FIELD("sme", ID_AA64PFR1_EL1_SME_SHIFT, pfr1_sme_filter), 238 { "arm64.nosme", "id_aa64pfr1.sme=0" },
|
| /linux/drivers/net/wireless/marvell/mwifiex/ |
| H A D | cfg80211.c | 2268 struct cfg80211_connect_params *sme, bool privacy, in mwifiex_cfg80211_assoc() argument 2327 /* Now handle infra mode. "sme" is valid for infra mode only */ in mwifiex_cfg80211_assoc() 2328 if (sme->auth_type == NL80211_AUTHTYPE_AUTOMATIC) { in mwifiex_cfg80211_assoc() 2332 auth_type = sme->auth_type; in mwifiex_cfg80211_assoc() 2335 if (sme->crypto.n_ciphers_pairwise) { in mwifiex_cfg80211_assoc() 2337 sme->crypto.ciphers_pairwise[0]; in mwifiex_cfg80211_assoc() 2341 if (sme->crypto.cipher_group) { in mwifiex_cfg80211_assoc() 2342 priv->sec_info.encryption_mode = sme->crypto.cipher_group; in mwifiex_cfg80211_assoc() 2345 if (sme->ie) in mwifiex_cfg80211_assoc() 2346 ret = mwifiex_set_gen_ie(priv, sme->ie, sme->ie_len); in mwifiex_cfg80211_assoc() [all …]
|
| /linux/arch/x86/boot/compressed/ |
| H A D | sev.c | 333 /* Check for the SME/SEV support leaf */ in sev_check_cpu_support() 341 * Check for the SME/SEV feature: in sev_check_cpu_support() 401 /* Set the SME mask if this is an SEV guest. */ in sev_enable()
|