On Mon, 18 Feb 2019 at 15:34, Marek Szyprowski <m.szyprowski@xxxxxxxxxxx> wrote: > > Add defines for the (secure)-memory write for Exynos Secure Monitor > Call. The values comes from the vendor kernel. > > Signed-off-by: Marek Szyprowski <m.szyprowski@xxxxxxxxxxx> > --- > arch/arm/mach-exynos/smc.h | 7 +++++++ > 1 file changed, 7 insertions(+) > > diff --git a/arch/arm/mach-exynos/smc.h b/arch/arm/mach-exynos/smc.h > index f355185d4239..e523e9604ffc 100644 > --- a/arch/arm/mach-exynos/smc.h > +++ b/arch/arm/mach-exynos/smc.h > @@ -25,6 +25,13 @@ > #define SMC_CMD_L2X0INVALL (-24) > #define SMC_CMD_L2X0DEBUG (-25) > > +/* For Accessing CP15/SFR (General) */ > +#define SMC_CMD_REG (-101) > + > +/* defines for SMC_CMD_REG */ > +#define SMC_REG_CLASS_SFR_W (0x1 << 30) > +#define SMC_REG_ID_SFR_W(ADDR) (SMC_REG_CLASS_SFR_W | ((ADDR) >> 2)) Lowercase ADDR. If you are not going to resend entire set for some other reason, I can fix it while applying. Best Regards, Krzysztof