Lines Matching defs:dsa
262 uint32_t dsa, irqcode;
277 /* use DSA to find the current siop_cmd */
278 dsa = readl(adp->addr + SIOP_DSA);
279 if (dsa >= local_to_PCI((u_long)adp->xfer) &&
280 dsa < local_to_PCI((u_long)adp->xfer) + SIOP_TABLE_SIZE) {
281 dsa -= local_to_PCI((u_long)adp->xfer);
306 * first restore DSA, in case we were in a S/G
359 " sist=0x%x sstat1=0x%x DSA=0x%x DSP=0x%lx\n",
360 sist, sstat1, dsa,
384 "script interrupt 0x%x with invalid DSA\n",
415 dsa = local_to_PCI((u_long)siop_xfer);
417 dsa + sizeof(struct siop_common_xfer) +
439 printf("done without command, DSA=0x%lx\n",
627 uint32_t dsa, *script = adp->script;
676 /* patch scripts with DSA addr */
677 dsa = local_to_PCI((u_long)siop_xfer);
685 htoc32(dsa + siop_common_xfer_size + Ent_ldsa_select);
704 uint32_t dsa, *scr;
708 dsa = local_to_PCI((u_long)xfer);
710 xfer->siop_tables.t_msgout.addr = htoc32(dsa);
712 xfer->siop_tables.t_msgin.addr = htoc32(dsa + off_msg_in);
714 xfer->siop_tables.t_extmsgin.addr = htoc32(dsa + off_msg_in + 1);
715 xfer->siop_tables.t_extmsgdata.addr = htoc32(dsa + off_msg_in + 3);
717 xfer->siop_tables.t_status.addr = htoc32(dsa + off_status);
728 scr[Ent_rdsa0 / 4] = htoc32(0x78100000 | ((dsa & 0x000000ff) << 8));
729 scr[Ent_rdsa1 / 4] = htoc32(0x78110000 | ( dsa & 0x0000ff00 ));
730 scr[Ent_rdsa2 / 4] = htoc32(0x78120000 | ((dsa & 0x00ff0000) >> 8));
731 scr[Ent_rdsa3 / 4] = htoc32(0x78130000 | ((dsa & 0xff000000) >> 16));
737 htoc32(dsa + sizeof(struct siop_common_xfer) + Ent_ldsa_data);