Lines Matching defs:dsa
239 uint32_t dsa, irqcode;
254 /* use DSA to find the current siop_cmd */
255 dsa = readl(adp->addr + SIOP_DSA);
256 if (dsa >= local_to_PCI((u_long)adp->xfer) &&
257 dsa < local_to_PCI((u_long)adp->xfer) + SIOP_TABLE_SIZE) {
258 dsa -= local_to_PCI((u_long)adp->xfer);
283 * first restore DSA, in case we were in a S/G
338 " sist=0x%x sstat1=0x%x DSA=0x%x DSP=0x%lx\n",
339 sist, sstat1, dsa,
363 "script interrupt 0x%x with invalid DSA\n",
394 dsa = local_to_PCI((u_long)siop_xfer);
396 dsa + sizeof(struct siop_common_xfer) +
418 printf("done without command, DSA=0x%lx\n",
606 uint32_t dsa, *script = adp->script;
655 /* patch scripts with DSA addr */
656 dsa = local_to_PCI((u_long)siop_xfer);
664 htoc32(dsa + siop_common_xfer_size + Ent_ldsa_select);
683 uint32_t dsa, *scr;
687 dsa = local_to_PCI((u_long)xfer);
689 xfer->siop_tables.t_msgout.addr = htoc32(dsa);
691 xfer->siop_tables.t_msgin.addr = htoc32(dsa + off_msg_in);
693 xfer->siop_tables.t_extmsgin.addr = htoc32(dsa + off_msg_in + 1);
694 xfer->siop_tables.t_extmsgdata.addr = htoc32(dsa + off_msg_in + 3);
696 xfer->siop_tables.t_status.addr = htoc32(dsa + off_status);
707 scr[Ent_rdsa0 / 4] = htoc32(0x78100000 | ((dsa & 0x000000ff) << 8));
708 scr[Ent_rdsa1 / 4] = htoc32(0x78110000 | ( dsa & 0x0000ff00 ));
709 scr[Ent_rdsa2 / 4] = htoc32(0x78120000 | ((dsa & 0x00ff0000) >> 8));
710 scr[Ent_rdsa3 / 4] = htoc32(0x78130000 | ((dsa & 0xff000000) >> 16));
716 htoc32(dsa + sizeof(struct siop_common_xfer) + Ent_ldsa_data);