Lines Matching +full:secure +full:- +full:only
1 // SPDX-License-Identifier: GPL-2.0-only
25 {.compatible = "brcm,kona-smc"},
26 {.compatible = "bcm,kona-smc"}, /* deprecated name */
42 return -ENODEV; in bcm_kona_smc_init()
47 return -EINVAL; in bcm_kona_smc_init()
49 /* We assume space for four 32-bit arguments */ in bcm_kona_smc_init()
51 return -EINVAL; in bcm_kona_smc_init()
56 return -EINVAL; in bcm_kona_smc_init()
60 return -ENOMEM; in bcm_kona_smc_init()
63 pr_info("Kona Secure API initialized\n"); in bcm_kona_smc_init()
71 * Only core 0 can run the secure monitor code. If an "smc" request
78 * cache and interrupt handling while the secure monitor executes.
80 * Parameters to the "smc" request are passed in r4-r6 as follows:
87 * First, the secure monitor call itself (regardless of the specific
128 /* __bcm_kona_smc() should only run on CPU 0, with pre-emption disabled */
138 writel_relaxed(data->arg0, args++); in __bcm_kona_smc()
139 writel_relaxed(data->arg1, args++); in __bcm_kona_smc()
140 writel_relaxed(data->arg2, args++); in __bcm_kona_smc()
141 writel(data->arg3, args); in __bcm_kona_smc()
143 /* Flush caches for input data passed to Secure Monitor */ in __bcm_kona_smc()
146 /* Trap into Secure Monitor and record the request result */ in __bcm_kona_smc()
147 data->result = bcm_kona_do_smc(data->service_id, bcm_smc_buffer_phys); in __bcm_kona_smc()
163 * Due to a limitation of the secure monitor, we must use the SMP in bcm_kona_smc()
164 * infrastructure to forward all secure monitor calls to Core 0. in bcm_kona_smc()