Home
last modified time | relevance | path

Searched full:sme (Results 1 – 25 of 89) sorted by relevance

1234

/linux/tools/testing/selftests/arm64/abi/
H A Dsyscall-abi.c331 ksft_print_msg("SME VL %d ZA does not match\n", sme_vl); in check_za()
360 ksft_print_msg("SME VL %d ZT does not match\n", sme_vl); in check_zt()
412 int sve, sme; in test_one_syscall() local
428 for (sme = 0; sme < sme_vl_count; sme++) { in test_one_syscall()
429 ret = prctl(PR_SME_SET_VL, sme_vls[sme]); in test_one_syscall()
435 sme_vls[sme], in test_one_syscall()
437 "%s SVE VL %d/SME VL %d SM+ZA\n", in test_one_syscall()
439 sme_vls[sme]); in test_one_syscall()
441 sme_vls[sme], SVCR_SM_MASK), in test_one_syscall()
442 "%s SVE VL %d/SME VL %d SM\n", in test_one_syscall()
[all …]
H A Dhwcap.c892 .name = "SME",
895 .cpuinfo = "sme",
908 .name = "SME 2.1",
915 .name = "SME 2.2",
922 .name = "SME AES",
929 .name = "SME I16I32",
936 .name = "SME BI32I32",
943 .name = "SME B16B16",
950 .name = "SME F16F16",
957 .name = "SME F8F16",
[all …]
H A Dsyscall-abi-asm.S12 // x1: SME VL
83 // Set SVCR if we're doing SME
89 // Load ZA and ZT0 if enabled - uses x12 as scratch due to SME LDR
152 // Load the SVE registers if we're doing SVE/SME
257 // Save SVCR if we're doing SME
263 // Save ZA if it's enabled - uses x12 as scratch due to SME STR
338 // Only save FFR if we wrote a value for SME
355 // Clear SVCR if we were doing SME so future tests don't have ZA
/linux/Documentation/arch/arm64/
H A Dsme.rst6 order to support use of the ARM Scalable Matrix Extension (SME).
11 included in SME.
13 This document does not aim to describe the SME architecture or programmer's
15 model features for SME is included in Appendix A.
24 * The presence of SME is reported to userspace via HWCAP2_SME in the aux vector
25 AT_HWCAP2 entry. Presence of this flag implies the presence of the SME
27 described in this document. SME is reported in /proc/cpuinfo as "sme".
34 * Support for the execution of SME instructions in userspace can also be
36 instruction, and checking that the value of the SME field is nonzero. [3]
42 * There are a number of optional SME features, presence of these is reported
[all …]
/linux/arch/x86/coco/
H A Dcore.c44 * the other levels of SME/SEV functionality, including C-bit
59 * SME and SEV are very similar but they are not the same, so there are
60 * times that the kernel will need to distinguish between SME and SEV. The
65 * paging is activated, SME will access all memory as decrypted, but SEV
67 * up under SME the trampoline area cannot be encrypted, whereas under SEV
/linux/tools/testing/selftests/arm64/signal/testcases/
H A Dsme_vl.c5 * Check that the SME vector length reported in signal contexts is the
62 .name = "SME VL",
63 .descr = "Check that we get the right SME VL reported",
H A Dsme_trap_za.c29 .name = "SME ZA trap",
/linux/drivers/net/wireless/quantenna/qtnfmac/
H A Dcommands.c2071 struct cfg80211_connect_params *sme) in qtnf_cmd_send_connect() argument
2091 if (sme->bssid_hint) in qtnf_cmd_send_connect()
2092 ether_addr_copy(cmd->bssid_hint, sme->bssid_hint); in qtnf_cmd_send_connect()
2096 if (sme->prev_bssid) in qtnf_cmd_send_connect()
2097 ether_addr_copy(cmd->prev_bssid, sme->prev_bssid); in qtnf_cmd_send_connect()
2101 if ((sme->bg_scan_period >= 0) && in qtnf_cmd_send_connect()
2102 (sme->bg_scan_period <= SHRT_MAX)) in qtnf_cmd_send_connect()
2103 cmd->bg_scan_period = cpu_to_le16(sme->bg_scan_period); in qtnf_cmd_send_connect()
2107 if (sme->flags & ASSOC_REQ_DISABLE_HT) in qtnf_cmd_send_connect()
2109 if (sme->flags & ASSOC_REQ_DISABLE_VHT) in qtnf_cmd_send_connect()
[all …]
/linux/tools/testing/selftests/arm64/fp/
H A DMakefile16 rdvl-sme rdvl-sve \
34 $(OUTPUT)/rdvl-sme: rdvl-sme.c $(OUTPUT)/rdvl.o
H A Dfp-ptrace.c247 ksft_print_msg("Failed to set SME VL %d: %d\n", in run_child()
330 read_one_child_regs(child, "SME VL", &iov_parent, &iov_child); in read_child_regs()
597 ksft_print_msg("Mismatch in initial SME VL: %d != %d\n", in check_ptrace_values_za()
995 ksft_print_msg("Mismatch in SME VL: %ld != %d\n", in check_memory_values()
1055 /* Changing the SME VL disables ZA */ in sve_write_supported()
1280 /* Changing the SME VL flushes ZT, SVE state */ in za_write_expected()
1376 snprintf(name, sizeof(name), "%s, SVE %d->%d, SME %d/%x->%d/%x", in run_test()
1385 snprintf(name, sizeof(name), "%s, SME %d/%x->%d/%x", in run_test()
1582 * Every SME VL/SVCR combination in run_sme_tests()
1636 probe_vls("SME", sme_vls, &sme_vl_count, PR_SME_SET_VL); in main()
[all …]
H A D.gitignore6 rdvl-sme
H A Drdvl.S4 #include "sme-inst.h"
/linux/arch/arm64/kvm/
H A Dfpsimd.c32 * Ensure that any host FPSIMD/SVE/SME state is saved and unbound such in kvm_arch_vcpu_load_fp()
36 * When the host may use SME, fpsimd_save_and_flush_cpu_state() ensures in kvm_arch_vcpu_load_fp()
73 * Currently we do not support SME guests so SVCR is in kvm_arch_vcpu_ctxsync_fp()
/linux/arch/x86/boot/startup/
H A Dmap_kernel.c40 /* Encrypt the kernel and related (if SME is active) */ in sme_postprocess_startup()
72 * Return the SME encryption mask (if SME is active) to be used as a in sme_postprocess_startup()
121 /* Include the SME encryption mask in the fixup value */ in __startup_64()
/linux/drivers/net/wireless/virtual/
H A Dvirt_wifi.c229 struct cfg80211_connect_params *sme) in virt_wifi_connect() argument
237 if (!sme->ssid) in virt_wifi_connect()
240 priv->connect_requested_ssid_len = sme->ssid_len; in virt_wifi_connect()
241 memcpy(priv->connect_requested_ssid, sme->ssid, sme->ssid_len); in virt_wifi_connect()
247 if (sme->bssid) { in virt_wifi_connect()
248 ether_addr_copy(priv->connect_requested_bss, sme->bssid); in virt_wifi_connect()
/linux/tools/testing/selftests/arm64/signal/
H A Dsve_helpers.c5 * Common helper functions for SVE and SME functionality.
33 * Unlike SVE, SME does not require the minimum vector length in sve_fill_vls()
H A Dsve_helpers.h5 * Common helper functions for SVE and SME functionality.
/linux/arch/x86/include/asm/
H A Dprocessor-flags.h28 * On systems with SME, one bit (in a variable position!) is stolen to indicate
39 /* Mask off the address space ID and SME encryption bits. */
/linux/arch/x86/kernel/
H A Dhead_64.S88 * Activate SEV/SME memory encryption if supported/enabled. This needs to
108 * Perform pagetable fixups. Additionally, if SME is active, encrypt
109 * the kernel and retrieve the modifier (SME encryption mask if SME
186 * Retrieve the modifier (SME encryption mask if SME is active) to be
H A Dhead64.c200 * If SME is active, this will create decrypted mappings of the in copy_bootdata()
215 * freeing up that memory for use by the system. If SME is active, in copy_bootdata()
258 * SME support may update early_pmd_flags to include the memory in x86_64_start_kernel()
/linux/arch/x86/kernel/cpu/
H A Damd.c551 * support SME. This provides support for performing a successful in early_detect_mem_encrypt()
552 * kexec when going from SME inactive to SME active (or vice-versa). in early_detect_mem_encrypt()
567 * BIOS support is required for SME and SEV. in early_detect_mem_encrypt()
568 * For SME: If BIOS has enabled SME then adjust x86_phys_bits by in early_detect_mem_encrypt()
569 * the SME physical address space reduction value. in early_detect_mem_encrypt()
570 * If BIOS has not enabled SME then don't advertise the in early_detect_mem_encrypt()
571 * SME feature (set in scattered.c). in early_detect_mem_encrypt()
572 * If the kernel has not enabled SME via any means then in early_detect_mem_encrypt()
573 * don't advertise the SME feature. in early_detect_mem_encrypt()
577 * In all cases, since support for SME and SEV requires long mode, in early_detect_mem_encrypt()
/linux/drivers/crypto/ccp/
H A Dhsti.c135 …dev_notice(psp->dev, "psp: Both TSME and SME are active, SME is unnecessary when TSME is active.\n… in psp_init_hsti()
/linux/arch/arm64/kernel/pi/
H A Didreg-override.c138 * Similarly to SVE, disabling SME also means disabling all in pfr1_sme_filter()
157 FIELD("sme", ID_AA64PFR1_EL1_SME_SHIFT, pfr1_sme_filter),
238 { "arm64.nosme", "id_aa64pfr1.sme=0" },
/linux/drivers/net/wireless/marvell/mwifiex/
H A Dcfg80211.c2268 struct cfg80211_connect_params *sme, bool privacy, in mwifiex_cfg80211_assoc() argument
2327 /* Now handle infra mode. "sme" is valid for infra mode only */ in mwifiex_cfg80211_assoc()
2328 if (sme->auth_type == NL80211_AUTHTYPE_AUTOMATIC) { in mwifiex_cfg80211_assoc()
2332 auth_type = sme->auth_type; in mwifiex_cfg80211_assoc()
2335 if (sme->crypto.n_ciphers_pairwise) { in mwifiex_cfg80211_assoc()
2337 sme->crypto.ciphers_pairwise[0]; in mwifiex_cfg80211_assoc()
2341 if (sme->crypto.cipher_group) { in mwifiex_cfg80211_assoc()
2342 priv->sec_info.encryption_mode = sme->crypto.cipher_group; in mwifiex_cfg80211_assoc()
2345 if (sme->ie) in mwifiex_cfg80211_assoc()
2346 ret = mwifiex_set_gen_ie(priv, sme->ie, sme->ie_len); in mwifiex_cfg80211_assoc()
[all …]
/linux/arch/x86/boot/compressed/
H A Dsev.c333 /* Check for the SME/SEV support leaf */ in sev_check_cpu_support()
341 * Check for the SME/SEV feature: in sev_check_cpu_support()
401 /* Set the SME mask if this is an SEV guest. */ in sev_enable()

1234