Skip to content

Commit bdac188

Browse files
Bartosz Golaszewskiandersson
authored andcommitted
firmware: qcom: move Qualcomm code into its own directory
We're getting more and more qcom specific .c files in drivers/firmware/ and about to get even more. Create a separate directory for Qualcomm firmware drivers and move existing sources in there. Signed-off-by: Bartosz Golaszewski <[email protected]> Acked-by: Elliot Berman <[email protected]> Reviewed-by: Krzysztof Kozlowski <[email protected]> Reviewed-by: Maximilian Luz <[email protected]> Tested-by: Andrew Halaney <[email protected]> # sc8280xp-lenovo-thinkpad-x13s Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Bjorn Andersson <[email protected]>
1 parent ba21d63 commit bdac188

File tree

11 files changed

+69
-53
lines changed

11 files changed

+69
-53
lines changed

MAINTAINERS

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17804,13 +17804,13 @@ QUALCOMM QSEECOM DRIVER
1780417804
M: Maximilian Luz <[email protected]>
1780517805
1780617806
S: Maintained
17807-
F: drivers/firmware/qcom_qseecom.c
17807+
F: drivers/firmware/qcom/qcom_qseecom.c
1780817808

1780917809
QUALCOMM QSEECOM UEFISECAPP DRIVER
1781017810
M: Maximilian Luz <[email protected]>
1781117811
1781217812
S: Maintained
17813-
F: drivers/firmware/qcom_qseecom_uefisecapp.c
17813+
F: drivers/firmware/qcom/qcom_qseecom_uefisecapp.c
1781417814

1781517815
QUALCOMM RMNET DRIVER
1781617816
M: Subash Abhinov Kasiviswanathan <[email protected]>

drivers/firmware/Kconfig

Lines changed: 1 addition & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -212,53 +212,6 @@ config MTK_ADSP_IPC
212212
ADSP exists on some mtk processors.
213213
Client might use shared memory to exchange information with ADSP.
214214

215-
config QCOM_SCM
216-
tristate
217-
218-
config QCOM_SCM_DOWNLOAD_MODE_DEFAULT
219-
bool "Qualcomm download mode enabled by default"
220-
depends on QCOM_SCM
221-
help
222-
A device with "download mode" enabled will upon an unexpected
223-
warm-restart enter a special debug mode that allows the user to
224-
"download" memory content over USB for offline postmortem analysis.
225-
The feature can be enabled/disabled on the kernel command line.
226-
227-
Say Y here to enable "download mode" by default.
228-
229-
config QCOM_QSEECOM
230-
bool "Qualcomm QSEECOM interface driver"
231-
depends on QCOM_SCM=y
232-
select AUXILIARY_BUS
233-
help
234-
Various Qualcomm SoCs have a Secure Execution Environment (SEE) running
235-
in the Trust Zone. This module provides an interface to that via the
236-
QSEECOM mechanism, using SCM calls.
237-
238-
The QSEECOM interface allows, among other things, access to applications
239-
running in the SEE. An example of such an application is 'uefisecapp',
240-
which is required to access UEFI variables on certain systems. If
241-
selected, the interface will also attempt to detect and register client
242-
devices for supported applications.
243-
244-
Select Y here to enable the QSEECOM interface driver.
245-
246-
config QCOM_QSEECOM_UEFISECAPP
247-
bool "Qualcomm SEE UEFI Secure App client driver"
248-
depends on QCOM_QSEECOM
249-
depends on EFI
250-
help
251-
Various Qualcomm SoCs do not allow direct access to EFI variables.
252-
Instead, these need to be accessed via the UEFI Secure Application
253-
(uefisecapp), residing in the Secure Execution Environment (SEE).
254-
255-
This module provides a client driver for uefisecapp, installing efivar
256-
operations to allow the kernel accessing EFI variables, and via that also
257-
provide user-space with access to EFI variables via efivarfs.
258-
259-
Select Y here to provide access to EFI variables on the aforementioned
260-
platforms.
261-
262215
config SYSFB
263216
bool
264217
select BOOT_VESA_SUPPORT
@@ -344,6 +297,7 @@ source "drivers/firmware/efi/Kconfig"
344297
source "drivers/firmware/imx/Kconfig"
345298
source "drivers/firmware/meson/Kconfig"
346299
source "drivers/firmware/psci/Kconfig"
300+
source "drivers/firmware/qcom/Kconfig"
347301
source "drivers/firmware/smccc/Kconfig"
348302
source "drivers/firmware/tegra/Kconfig"
349303
source "drivers/firmware/xilinx/Kconfig"

drivers/firmware/Makefile

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,6 @@ obj-$(CONFIG_FIRMWARE_MEMMAP) += memmap.o
1818
obj-$(CONFIG_MTK_ADSP_IPC) += mtk-adsp-ipc.o
1919
obj-$(CONFIG_RASPBERRYPI_FIRMWARE) += raspberrypi.o
2020
obj-$(CONFIG_FW_CFG_SYSFS) += qemu_fw_cfg.o
21-
obj-$(CONFIG_QCOM_SCM) += qcom-scm.o
22-
qcom-scm-objs += qcom_scm.o qcom_scm-smc.o qcom_scm-legacy.o
23-
obj-$(CONFIG_QCOM_QSEECOM) += qcom_qseecom.o
24-
obj-$(CONFIG_QCOM_QSEECOM_UEFISECAPP) += qcom_qseecom_uefisecapp.o
2521
obj-$(CONFIG_SYSFB) += sysfb.o
2622
obj-$(CONFIG_SYSFB_SIMPLEFB) += sysfb_simplefb.o
2723
obj-$(CONFIG_TI_SCI_PROTOCOL) += ti_sci.o
@@ -37,6 +33,7 @@ obj-$(CONFIG_GOOGLE_FIRMWARE) += google/
3733
obj-y += efi/
3834
obj-y += imx/
3935
obj-y += psci/
36+
obj-y += qcom/
4037
obj-y += smccc/
4138
obj-y += tegra/
4239
obj-y += xilinx/

drivers/firmware/qcom/Kconfig

Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
# SPDX-License-Identifier: GPL-2.0-only
2+
#
3+
# For a description of the syntax of this configuration file,
4+
# see Documentation/kbuild/kconfig-language.rst.
5+
#
6+
7+
menu "Qualcomm firmware drivers"
8+
9+
config QCOM_SCM
10+
tristate
11+
12+
config QCOM_SCM_DOWNLOAD_MODE_DEFAULT
13+
bool "Qualcomm download mode enabled by default"
14+
depends on QCOM_SCM
15+
help
16+
A device with "download mode" enabled will upon an unexpected
17+
warm-restart enter a special debug mode that allows the user to
18+
"download" memory content over USB for offline postmortem analysis.
19+
The feature can be enabled/disabled on the kernel command line.
20+
21+
Say Y here to enable "download mode" by default.
22+
23+
config QCOM_QSEECOM
24+
bool "Qualcomm QSEECOM interface driver"
25+
depends on QCOM_SCM=y
26+
select AUXILIARY_BUS
27+
help
28+
Various Qualcomm SoCs have a Secure Execution Environment (SEE) running
29+
in the Trust Zone. This module provides an interface to that via the
30+
QSEECOM mechanism, using SCM calls.
31+
32+
The QSEECOM interface allows, among other things, access to applications
33+
running in the SEE. An example of such an application is 'uefisecapp',
34+
which is required to access UEFI variables on certain systems. If
35+
selected, the interface will also attempt to detect and register client
36+
devices for supported applications.
37+
38+
Select Y here to enable the QSEECOM interface driver.
39+
40+
config QCOM_QSEECOM_UEFISECAPP
41+
bool "Qualcomm SEE UEFI Secure App client driver"
42+
depends on QCOM_QSEECOM
43+
depends on EFI
44+
help
45+
Various Qualcomm SoCs do not allow direct access to EFI variables.
46+
Instead, these need to be accessed via the UEFI Secure Application
47+
(uefisecapp), residing in the Secure Execution Environment (SEE).
48+
49+
This module provides a client driver for uefisecapp, installing efivar
50+
operations to allow the kernel accessing EFI variables, and via that also
51+
provide user-space with access to EFI variables via efivarfs.
52+
53+
Select Y here to provide access to EFI variables on the aforementioned
54+
platforms.
55+
56+
endmenu

drivers/firmware/qcom/Makefile

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
# SPDX-License-Identifier: GPL-2.0
2+
#
3+
# Makefile for the linux kernel.
4+
#
5+
6+
obj-$(CONFIG_QCOM_SCM) += qcom-scm.o
7+
qcom-scm-objs += qcom_scm.o qcom_scm-smc.o qcom_scm-legacy.o
8+
obj-$(CONFIG_QCOM_QSEECOM) += qcom_qseecom.o
9+
obj-$(CONFIG_QCOM_QSEECOM_UEFISECAPP) += qcom_qseecom_uefisecapp.o
File renamed without changes.

0 commit comments

Comments
 (0)