Skip to content

Commit dfae947

Browse files
committed
Merge tag 'qcom-drivers-for-6.7-2' of https://git.kernel.org/pub/scm/linux/kernel/git/qcom/linux into soc/drivers
More Qualcomm driver updates for v6.7 The Qualcomm SMC an QSEECOM drivers are moved into a "qcom" subdirectory, to declutter the base directory. Missing include guards are added to the qseecom header file. Unneded extern specifiers are removed from the scm call wrappers. __counted_by is added to the apr_rx_buf structure, in the APR driver. Lastly in the pmic_glink driver the pmic_glink drm_bridge type is corrected to DisplayPort, over the incorrect "USB" value. The return values are added to error prints for the various typec set() calls. * tag 'qcom-drivers-for-6.7-2' of https://git.kernel.org/pub/scm/linux/kernel/git/qcom/linux: soc: qcom: pmic_glink_altmode: Print return value on error firmware: qcom: scm: remove unneeded 'extern' specifiers firmware: qcom: scm: add a missing forward declaration for struct device firmware: qcom: move Qualcomm code into its own directory soc: qcom: apr: Add __counted_by for struct apr_rx_buf and use struct_size() soc: qcom: pmic_glink: fix connector type to be DisplayPort firmware: qcom: qseecom: add missing include guards Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Arnd Bergmann <[email protected]>
2 parents 759c2e0 + 723d346 commit dfae947

File tree

14 files changed

+93
-70
lines changed

14 files changed

+93
-70
lines changed

MAINTAINERS

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17805,13 +17805,13 @@ QUALCOMM QSEECOM DRIVER
1780517805
M: Maximilian Luz <[email protected]>
1780617806
1780717807
S: Maintained
17808-
F: drivers/firmware/qcom_qseecom.c
17808+
F: drivers/firmware/qcom/qcom_qseecom.c
1780917809

1781017810
QUALCOMM QSEECOM UEFISECAPP DRIVER
1781117811
M: Maximilian Luz <[email protected]>
1781217812
1781317813
S: Maintained
17814-
F: drivers/firmware/qcom_qseecom_uefisecapp.c
17814+
F: drivers/firmware/qcom/qcom_qseecom_uefisecapp.c
1781517815

1781617816
QUALCOMM RMNET DRIVER
1781717817
M: Subash Abhinov Kasiviswanathan <[email protected]>

drivers/firmware/Kconfig

Lines changed: 1 addition & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -212,53 +212,6 @@ config MTK_ADSP_IPC
212212
ADSP exists on some mtk processors.
213213
Client might use shared memory to exchange information with ADSP.
214214

215-
config QCOM_SCM
216-
tristate
217-
218-
config QCOM_SCM_DOWNLOAD_MODE_DEFAULT
219-
bool "Qualcomm download mode enabled by default"
220-
depends on QCOM_SCM
221-
help
222-
A device with "download mode" enabled will upon an unexpected
223-
warm-restart enter a special debug mode that allows the user to
224-
"download" memory content over USB for offline postmortem analysis.
225-
The feature can be enabled/disabled on the kernel command line.
226-
227-
Say Y here to enable "download mode" by default.
228-
229-
config QCOM_QSEECOM
230-
bool "Qualcomm QSEECOM interface driver"
231-
depends on QCOM_SCM=y
232-
select AUXILIARY_BUS
233-
help
234-
Various Qualcomm SoCs have a Secure Execution Environment (SEE) running
235-
in the Trust Zone. This module provides an interface to that via the
236-
QSEECOM mechanism, using SCM calls.
237-
238-
The QSEECOM interface allows, among other things, access to applications
239-
running in the SEE. An example of such an application is 'uefisecapp',
240-
which is required to access UEFI variables on certain systems. If
241-
selected, the interface will also attempt to detect and register client
242-
devices for supported applications.
243-
244-
Select Y here to enable the QSEECOM interface driver.
245-
246-
config QCOM_QSEECOM_UEFISECAPP
247-
bool "Qualcomm SEE UEFI Secure App client driver"
248-
depends on QCOM_QSEECOM
249-
depends on EFI
250-
help
251-
Various Qualcomm SoCs do not allow direct access to EFI variables.
252-
Instead, these need to be accessed via the UEFI Secure Application
253-
(uefisecapp), residing in the Secure Execution Environment (SEE).
254-
255-
This module provides a client driver for uefisecapp, installing efivar
256-
operations to allow the kernel accessing EFI variables, and via that also
257-
provide user-space with access to EFI variables via efivarfs.
258-
259-
Select Y here to provide access to EFI variables on the aforementioned
260-
platforms.
261-
262215
config SYSFB
263216
bool
264217
select BOOT_VESA_SUPPORT
@@ -344,6 +297,7 @@ source "drivers/firmware/efi/Kconfig"
344297
source "drivers/firmware/imx/Kconfig"
345298
source "drivers/firmware/meson/Kconfig"
346299
source "drivers/firmware/psci/Kconfig"
300+
source "drivers/firmware/qcom/Kconfig"
347301
source "drivers/firmware/smccc/Kconfig"
348302
source "drivers/firmware/tegra/Kconfig"
349303
source "drivers/firmware/xilinx/Kconfig"

drivers/firmware/Makefile

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,6 @@ obj-$(CONFIG_FIRMWARE_MEMMAP) += memmap.o
1818
obj-$(CONFIG_MTK_ADSP_IPC) += mtk-adsp-ipc.o
1919
obj-$(CONFIG_RASPBERRYPI_FIRMWARE) += raspberrypi.o
2020
obj-$(CONFIG_FW_CFG_SYSFS) += qemu_fw_cfg.o
21-
obj-$(CONFIG_QCOM_SCM) += qcom-scm.o
22-
qcom-scm-objs += qcom_scm.o qcom_scm-smc.o qcom_scm-legacy.o
23-
obj-$(CONFIG_QCOM_QSEECOM) += qcom_qseecom.o
24-
obj-$(CONFIG_QCOM_QSEECOM_UEFISECAPP) += qcom_qseecom_uefisecapp.o
2521
obj-$(CONFIG_SYSFB) += sysfb.o
2622
obj-$(CONFIG_SYSFB_SIMPLEFB) += sysfb_simplefb.o
2723
obj-$(CONFIG_TI_SCI_PROTOCOL) += ti_sci.o
@@ -37,6 +33,7 @@ obj-$(CONFIG_GOOGLE_FIRMWARE) += google/
3733
obj-y += efi/
3834
obj-y += imx/
3935
obj-y += psci/
36+
obj-y += qcom/
4037
obj-y += smccc/
4138
obj-y += tegra/
4239
obj-y += xilinx/

drivers/firmware/qcom/Kconfig

Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
# SPDX-License-Identifier: GPL-2.0-only
2+
#
3+
# For a description of the syntax of this configuration file,
4+
# see Documentation/kbuild/kconfig-language.rst.
5+
#
6+
7+
menu "Qualcomm firmware drivers"
8+
9+
config QCOM_SCM
10+
tristate
11+
12+
config QCOM_SCM_DOWNLOAD_MODE_DEFAULT
13+
bool "Qualcomm download mode enabled by default"
14+
depends on QCOM_SCM
15+
help
16+
A device with "download mode" enabled will upon an unexpected
17+
warm-restart enter a special debug mode that allows the user to
18+
"download" memory content over USB for offline postmortem analysis.
19+
The feature can be enabled/disabled on the kernel command line.
20+
21+
Say Y here to enable "download mode" by default.
22+
23+
config QCOM_QSEECOM
24+
bool "Qualcomm QSEECOM interface driver"
25+
depends on QCOM_SCM=y
26+
select AUXILIARY_BUS
27+
help
28+
Various Qualcomm SoCs have a Secure Execution Environment (SEE) running
29+
in the Trust Zone. This module provides an interface to that via the
30+
QSEECOM mechanism, using SCM calls.
31+
32+
The QSEECOM interface allows, among other things, access to applications
33+
running in the SEE. An example of such an application is 'uefisecapp',
34+
which is required to access UEFI variables on certain systems. If
35+
selected, the interface will also attempt to detect and register client
36+
devices for supported applications.
37+
38+
Select Y here to enable the QSEECOM interface driver.
39+
40+
config QCOM_QSEECOM_UEFISECAPP
41+
bool "Qualcomm SEE UEFI Secure App client driver"
42+
depends on QCOM_QSEECOM
43+
depends on EFI
44+
help
45+
Various Qualcomm SoCs do not allow direct access to EFI variables.
46+
Instead, these need to be accessed via the UEFI Secure Application
47+
(uefisecapp), residing in the Secure Execution Environment (SEE).
48+
49+
This module provides a client driver for uefisecapp, installing efivar
50+
operations to allow the kernel accessing EFI variables, and via that also
51+
provide user-space with access to EFI variables via efivarfs.
52+
53+
Select Y here to provide access to EFI variables on the aforementioned
54+
platforms.
55+
56+
endmenu

drivers/firmware/qcom/Makefile

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
# SPDX-License-Identifier: GPL-2.0
2+
#
3+
# Makefile for the linux kernel.
4+
#
5+
6+
obj-$(CONFIG_QCOM_SCM) += qcom-scm.o
7+
qcom-scm-objs += qcom_scm.o qcom_scm-smc.o qcom_scm-legacy.o
8+
obj-$(CONFIG_QCOM_QSEECOM) += qcom_qseecom.o
9+
obj-$(CONFIG_QCOM_QSEECOM_UEFISECAPP) += qcom_qseecom_uefisecapp.o
File renamed without changes.

0 commit comments

Comments
 (0)