05 Jun, 2019

1 commit

  • Based on 1 normalized pattern(s):

    this program is free software you can redistribute it and or modify
    it under the terms of the gnu general public license version 2 and
    only version 2 as published by the free software foundation this
    program is distributed in the hope that it will be useful but
    without any warranty without even the implied warranty of
    merchantability or fitness for a particular purpose see the gnu
    general public license for more details

    extracted by the scancode license scanner the SPDX license identifier

    GPL-2.0-only

    has been chosen to replace the boilerplate/reference in 294 file(s).

    Signed-off-by: Thomas Gleixner
    Reviewed-by: Allison Randal
    Reviewed-by: Alexios Zavras
    Cc: linux-spdx@vger.kernel.org
    Link: https://lkml.kernel.org/r/20190529141900.825281744@linutronix.de
    Signed-off-by: Greg Kroah-Hartman

    Thomas Gleixner
     

18 Nov, 2017

1 commit

  • Pull remoteproc updates from Bjorn Andersson:
    "This adds an interface for configuring Qualcomm's "secure SMMU" and
    adds support for booting the modem Hexagon on MSM8996.

    Two new debugfs entries are added in the remoteproc core to introspect
    the list of memory carveouts and the loaded resource table"

    * tag 'rproc-v4.15' of git://github.com/andersson/remoteproc:
    remoteproc: qcom: Fix error handling paths in order to avoid memory leaks
    remoteproc: qcom: Drop pr_err in q6v5_xfer_mem_ownership()
    remoteproc: debug: add carveouts list dump feature
    remoteproc: debug: add resource table dump feature
    remoteproc: qcom: Add support for mss remoteproc on msm8996
    remoteproc: qcom: Make secure world call for mem ownership switch
    remoteproc: qcom: refactor mss fw image loading sequence
    firmware: scm: Add new SCM call API for switching memory ownership

    Linus Torvalds
     

31 Oct, 2017

1 commit

  • Two different processors on a SOC need to switch memory ownership
    during load/unload. To enable this, second level memory map table
    need to be updated, which is done by secure layer.
    This patch adds the interface for making secure monitor call for
    memory ownership switching request.

    Acked-by: Andy Gross
    Signed-off-by: Avaneesh Kumar Dwivedi
    [bjorn: Minor style and kerneldoc updates]
    Signed-off-by: Bjorn Andersson

    Avaneesh Kumar Dwivedi
     

12 Oct, 2017

2 commits

  • In order to aid post-mortem debugging the Qualcomm platforms provide a
    "memory download mode", where the boot loader will provide an interface
    for custom tools to "download" the content of RAM to a host machine.

    The mode is triggered by writing a magic value somewhere in RAM, that is
    read in the boot code path after a warm-restart. Two mechanism for
    setting this magic value are supported in modern platforms; a direct SCM
    call to enable the mode or through a secure io write of a magic value.

    In order for a normal reboot not to trigger "download mode" the magic
    must be cleared during a clean reboot.

    Download mode has to be enabled by including qcom_scm.download_mode=1 on
    the command line.

    Reviewed-by: Stephen Boyd
    Signed-off-by: Bjorn Andersson
    Signed-off-by: Andy Gross

    Bjorn Andersson
     
  • The secure IO service provides operations for reading and writing secure
    memory from non-secure mode, expose this API through SCM.

    Reviewed-by: Stephen Boyd
    Signed-off-by: Bjorn Andersson
    Signed-off-by: Andy Gross

    Bjorn Andersson
     

29 Mar, 2017

2 commits


17 Jan, 2017

1 commit


25 Jun, 2016

5 commits


28 May, 2015

1 commit

  • HDCP driver needs to check if secure environment supports HDCP. If it's
    supported, then it requires to program some registers through SCM.
    Add qcom_scm_hdcp_available and qcom_scm_hdcp_req to support these
    requirements.

    Signed-off-by: Jilai Wang
    Signed-off-by: Kumar Gala

    jilai wang
     

29 Apr, 2015

1 commit