<feed xmlns='http://www.w3.org/2005/Atom'>
<title>kernel/include/linux/qcom_scm.h, branch linux-4.15.y</title>
<subtitle>Hosts the 0x221E linux distro kernel.</subtitle>
<id>https://universe.0xinfinity.dev/distro/kernel/atom?h=linux-4.15.y</id>
<link rel='self' href='https://universe.0xinfinity.dev/distro/kernel/atom?h=linux-4.15.y'/>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/'/>
<updated>2017-11-18T04:14:10Z</updated>
<entry>
<title>Merge tag 'rproc-v4.15' of git://github.com/andersson/remoteproc</title>
<updated>2017-11-18T04:14:10Z</updated>
<author>
<name>Linus Torvalds</name>
<email>torvalds@linux-foundation.org</email>
</author>
<published>2017-11-18T04:14:10Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=4f88bd23baab4335e96d38828ef38124ec717eb9'/>
<id>urn:sha1:4f88bd23baab4335e96d38828ef38124ec717eb9</id>
<content type='text'>
Pull remoteproc updates from Bjorn Andersson:
 "This adds an interface for configuring Qualcomm's "secure SMMU" and
  adds support for booting the modem Hexagon on MSM8996.

  Two new debugfs entries are added in the remoteproc core to introspect
  the list of memory carveouts and the loaded resource table"

* tag 'rproc-v4.15' of git://github.com/andersson/remoteproc:
  remoteproc: qcom: Fix error handling paths in order to avoid memory leaks
  remoteproc: qcom: Drop pr_err in q6v5_xfer_mem_ownership()
  remoteproc: debug: add carveouts list dump feature
  remoteproc: debug: add resource table dump feature
  remoteproc: qcom: Add support for mss remoteproc on msm8996
  remoteproc: qcom: Make secure world call for mem ownership switch
  remoteproc: qcom: refactor mss fw image loading sequence
  firmware: scm: Add new SCM call API for switching memory ownership
</content>
</entry>
<entry>
<title>firmware: scm: Add new SCM call API for switching memory ownership</title>
<updated>2017-10-31T01:37:07Z</updated>
<author>
<name>Avaneesh Kumar Dwivedi</name>
<email>akdwived@codeaurora.org</email>
</author>
<published>2017-10-24T15:52:24Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=d82bd359972a7fe71a778396cf287bc9f9f3b981'/>
<id>urn:sha1:d82bd359972a7fe71a778396cf287bc9f9f3b981</id>
<content type='text'>
Two different processors on a SOC need to switch memory ownership
during load/unload. To enable this, second level memory map table
need to be updated, which is done by secure layer.
This patch adds the interface for making secure monitor call for
memory ownership switching request.

Acked-by: Andy Gross &lt;andy.gross@linaro.org&gt;
Signed-off-by: Avaneesh Kumar Dwivedi &lt;akdwived@codeaurora.org&gt;
[bjorn: Minor style and kerneldoc updates]
Signed-off-by: Bjorn Andersson &lt;bjorn.andersson@linaro.org&gt;
</content>
</entry>
<entry>
<title>firmware: qcom: scm: Expose secure IO service</title>
<updated>2017-10-12T04:48:27Z</updated>
<author>
<name>Bjorn Andersson</name>
<email>bjorn.andersson@linaro.org</email>
</author>
<published>2017-08-14T22:46:17Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=4e659dbe2d02a56ca0df25c77e099760252a329c'/>
<id>urn:sha1:4e659dbe2d02a56ca0df25c77e099760252a329c</id>
<content type='text'>
The secure IO service provides operations for reading and writing secure
memory from non-secure mode, expose this API through SCM.

Reviewed-by: Stephen Boyd &lt;sboyd@codeaurora.org&gt;
Signed-off-by: Bjorn Andersson &lt;bjorn.andersson@linaro.org&gt;
Signed-off-by: Andy Gross &lt;andy.gross@linaro.org&gt;
</content>
</entry>
<entry>
<title>firmware: qcom_scm: add two scm calls for iommu secure page table</title>
<updated>2017-03-28T21:03:21Z</updated>
<author>
<name>Stanimir Varbanov</name>
<email>stanimir.varbanov@linaro.org</email>
</author>
<published>2017-03-14T15:18:04Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=b182cc4d597a6e73ff04ee1b7fb4f1a28f56ae3d'/>
<id>urn:sha1:b182cc4d597a6e73ff04ee1b7fb4f1a28f56ae3d</id>
<content type='text'>
Those two new SCM calls are needed from qcom-iommu driver in order
to initialize secure iommu page table.

Signed-off-by: Stanimir Varbanov &lt;stanimir.varbanov@linaro.org&gt;
Signed-off-by: Rob Clark &lt;robdclark@gmail.com&gt;
Signed-off-by: Andy Gross &lt;andy.gross@linaro.org&gt;
</content>
</entry>
<entry>
<title>firmware/qcom: add qcom_scm_restore_sec_cfg()</title>
<updated>2017-03-28T21:03:21Z</updated>
<author>
<name>Rob Clark</name>
<email>robdclark@gmail.com</email>
</author>
<published>2017-03-14T15:18:03Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=a2c680c6ce386e9ca6cdf362e8b01789126c9bf7'/>
<id>urn:sha1:a2c680c6ce386e9ca6cdf362e8b01789126c9bf7</id>
<content type='text'>
Signed-off-by: Rob Clark &lt;robdclark@gmail.com&gt;
Signed-off-by: Andy Gross &lt;andy.gross@linaro.org&gt;
</content>
</entry>
<entry>
<title>firmware: qcom_scm: Add set remote state API</title>
<updated>2017-01-17T05:45:04Z</updated>
<author>
<name>Andy Gross</name>
<email>andy.gross@linaro.org</email>
</author>
<published>2017-01-17T05:24:15Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=a811b420b6c13759540070c0e9541b7cd8569168'/>
<id>urn:sha1:a811b420b6c13759540070c0e9541b7cd8569168</id>
<content type='text'>
This patch adds a set remote state SCM API.  This will be used by the
Venus and GPU subsystems to set state on the remote processors.

This work was based on two patch sets by Jordan Crouse and Stanimir
Varbanov.

Signed-off-by: Andy Gross &lt;andy.gross@linaro.org&gt;
</content>
</entry>
<entry>
<title>firmware: qcom: scm: Add empty functions to help compile testing</title>
<updated>2017-01-17T05:07:36Z</updated>
<author>
<name>Stanimir Varbanov</name>
<email>stanimir.varbanov@linaro.org</email>
</author>
<published>2016-11-22T17:03:09Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=e12799125074c67cd30bc3d7a5ff5e2f29ea1411'/>
<id>urn:sha1:e12799125074c67cd30bc3d7a5ff5e2f29ea1411</id>
<content type='text'>
This will help to compile testing drivers which depends on scm
functions with COMPILE_TEST Kconfig option.

Signed-off-by: Stanimir Varbanov &lt;stanimir.varbanov@linaro.org&gt;
Reviewed-by: Stephen Boyd &lt;sboyd@codeaurora.org&gt;
Signed-off-by: Andy Gross &lt;andy.gross@linaro.org&gt;
</content>
</entry>
<entry>
<title>firmware: qcom: scm: Peripheral Authentication Service</title>
<updated>2016-06-25T03:53:50Z</updated>
<author>
<name>Bjorn Andersson</name>
<email>bjorn.andersson@sonymobile.com</email>
</author>
<published>2015-09-23T19:56:12Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=f01e90fe34f563a5e189d4070de4a23948105642'/>
<id>urn:sha1:f01e90fe34f563a5e189d4070de4a23948105642</id>
<content type='text'>
This adds the Peripheral Authentication Service (PAS) interface to the
Qualcomm SCM interface. The API is used to authenticate and boot a range
of external processors in various Qualcomm platforms.

Signed-off-by: Bjorn Andersson &lt;bjorn.andersson@sonymobile.com&gt;
Signed-off-by: Andy Gross &lt;andy.gross@linaro.org&gt;
</content>
</entry>
<entry>
<title>qcom-scm: add missing prototype for qcom_scm_is_available()</title>
<updated>2015-10-14T19:51:22Z</updated>
<author>
<name>Rob Clark</name>
<email>robdclark@gmail.com</email>
</author>
<published>2015-09-29T19:48:55Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=2d3c277ca5b1a9c12cde1f760ff925b87608bc76'/>
<id>urn:sha1:2d3c277ca5b1a9c12cde1f760ff925b87608bc76</id>
<content type='text'>
Signed-off-by: Rob Clark &lt;robdclark@gmail.com&gt;
Signed-off-by: Andy Gross &lt;agross@codeaurora.org&gt;
</content>
</entry>
<entry>
<title>firmware: qcom: scm: Add HDCP Support</title>
<updated>2015-05-28T15:47:45Z</updated>
<author>
<name>jilai wang</name>
<email>jilaiw@codeaurora.org</email>
</author>
<published>2015-04-10T20:15:59Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=9626b6993b2e6faf047d2d96958e8474edc9c7a5'/>
<id>urn:sha1:9626b6993b2e6faf047d2d96958e8474edc9c7a5</id>
<content type='text'>
HDCP driver needs to check if secure environment supports HDCP.  If it's
supported, then it requires to program some registers through SCM.
Add qcom_scm_hdcp_available and qcom_scm_hdcp_req to support these
requirements.

Signed-off-by: Jilai Wang &lt;jilaiw@codeaurora.org&gt;
Signed-off-by: Kumar Gala &lt;galak@codeaurora.org&gt;
</content>
</entry>
</feed>
