Skip to content

Commit 2784e3b

Browse files
Guru Das Srinageshandersson
authored andcommitted
firmware: qcom_scm: Convert all symbols to EXPORT_SYMBOL_GPL
The `qcom_scm` module is GPL v2-licenced and so there is no reason why the APIs it exports should not be, too. Signed-off-by: Guru Das Srinagesh <quic_gurus@quicinc.com> Reviewed-by: Trilok Soni <quic_tsoni@quicinc.com> Link: https://lore.kernel.org/r/19d9ac0bf79f957574ef9b3b73246ea0113cc0fd.1690503893.git.quic_gurus@quicinc.com Signed-off-by: Bjorn Andersson <andersson@kernel.org>
1 parent 2f17bea commit 2784e3b

1 file changed

Lines changed: 33 additions & 33 deletions

File tree

drivers/firmware/qcom_scm.c

Lines changed: 33 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -347,7 +347,7 @@ int qcom_scm_set_warm_boot_addr(void *entry)
347347
return qcom_scm_set_boot_addr(entry, qcom_scm_cpu_warm_bits);
348348
return 0;
349349
}
350-
EXPORT_SYMBOL(qcom_scm_set_warm_boot_addr);
350+
EXPORT_SYMBOL_GPL(qcom_scm_set_warm_boot_addr);
351351

352352
/**
353353
* qcom_scm_set_cold_boot_addr() - Set the cold boot address for all cpus
@@ -360,7 +360,7 @@ int qcom_scm_set_cold_boot_addr(void *entry)
360360
return qcom_scm_set_boot_addr(entry, qcom_scm_cpu_cold_bits);
361361
return 0;
362362
}
363-
EXPORT_SYMBOL(qcom_scm_set_cold_boot_addr);
363+
EXPORT_SYMBOL_GPL(qcom_scm_set_cold_boot_addr);
364364

365365
/**
366366
* qcom_scm_cpu_power_down() - Power down the cpu
@@ -382,7 +382,7 @@ void qcom_scm_cpu_power_down(u32 flags)
382382

383383
qcom_scm_call_atomic(__scm ? __scm->dev : NULL, &desc, NULL);
384384
}
385-
EXPORT_SYMBOL(qcom_scm_cpu_power_down);
385+
EXPORT_SYMBOL_GPL(qcom_scm_cpu_power_down);
386386

387387
int qcom_scm_set_remote_state(u32 state, u32 id)
388388
{
@@ -401,7 +401,7 @@ int qcom_scm_set_remote_state(u32 state, u32 id)
401401

402402
return ret ? : res.result[0];
403403
}
404-
EXPORT_SYMBOL(qcom_scm_set_remote_state);
404+
EXPORT_SYMBOL_GPL(qcom_scm_set_remote_state);
405405

406406
static int __qcom_scm_set_dload_mode(struct device *dev, bool enable)
407407
{
@@ -511,7 +511,7 @@ int qcom_scm_pas_init_image(u32 peripheral, const void *metadata, size_t size,
511511

512512
return ret ? : res.result[0];
513513
}
514-
EXPORT_SYMBOL(qcom_scm_pas_init_image);
514+
EXPORT_SYMBOL_GPL(qcom_scm_pas_init_image);
515515

516516
/**
517517
* qcom_scm_pas_metadata_release() - release metadata context
@@ -528,7 +528,7 @@ void qcom_scm_pas_metadata_release(struct qcom_scm_pas_metadata *ctx)
528528
ctx->phys = 0;
529529
ctx->size = 0;
530530
}
531-
EXPORT_SYMBOL(qcom_scm_pas_metadata_release);
531+
EXPORT_SYMBOL_GPL(qcom_scm_pas_metadata_release);
532532

533533
/**
534534
* qcom_scm_pas_mem_setup() - Prepare the memory related to a given peripheral
@@ -567,7 +567,7 @@ int qcom_scm_pas_mem_setup(u32 peripheral, phys_addr_t addr, phys_addr_t size)
567567

568568
return ret ? : res.result[0];
569569
}
570-
EXPORT_SYMBOL(qcom_scm_pas_mem_setup);
570+
EXPORT_SYMBOL_GPL(qcom_scm_pas_mem_setup);
571571

572572
/**
573573
* qcom_scm_pas_auth_and_reset() - Authenticate the given peripheral firmware
@@ -602,7 +602,7 @@ int qcom_scm_pas_auth_and_reset(u32 peripheral)
602602

603603
return ret ? : res.result[0];
604604
}
605-
EXPORT_SYMBOL(qcom_scm_pas_auth_and_reset);
605+
EXPORT_SYMBOL_GPL(qcom_scm_pas_auth_and_reset);
606606

607607
/**
608608
* qcom_scm_pas_shutdown() - Shut down the remote processor
@@ -637,7 +637,7 @@ int qcom_scm_pas_shutdown(u32 peripheral)
637637

638638
return ret ? : res.result[0];
639639
}
640-
EXPORT_SYMBOL(qcom_scm_pas_shutdown);
640+
EXPORT_SYMBOL_GPL(qcom_scm_pas_shutdown);
641641

642642
/**
643643
* qcom_scm_pas_supported() - Check if the peripheral authentication service is
@@ -666,7 +666,7 @@ bool qcom_scm_pas_supported(u32 peripheral)
666666

667667
return ret ? false : !!res.result[0];
668668
}
669-
EXPORT_SYMBOL(qcom_scm_pas_supported);
669+
EXPORT_SYMBOL_GPL(qcom_scm_pas_supported);
670670

671671
static int __qcom_scm_pas_mss_reset(struct device *dev, bool reset)
672672
{
@@ -728,7 +728,7 @@ int qcom_scm_io_readl(phys_addr_t addr, unsigned int *val)
728728

729729
return ret < 0 ? ret : 0;
730730
}
731-
EXPORT_SYMBOL(qcom_scm_io_readl);
731+
EXPORT_SYMBOL_GPL(qcom_scm_io_readl);
732732

733733
int qcom_scm_io_writel(phys_addr_t addr, unsigned int val)
734734
{
@@ -743,7 +743,7 @@ int qcom_scm_io_writel(phys_addr_t addr, unsigned int val)
743743

744744
return qcom_scm_call_atomic(__scm->dev, &desc, NULL);
745745
}
746-
EXPORT_SYMBOL(qcom_scm_io_writel);
746+
EXPORT_SYMBOL_GPL(qcom_scm_io_writel);
747747

748748
/**
749749
* qcom_scm_restore_sec_cfg_available() - Check if secure environment
@@ -756,7 +756,7 @@ bool qcom_scm_restore_sec_cfg_available(void)
756756
return __qcom_scm_is_call_available(__scm->dev, QCOM_SCM_SVC_MP,
757757
QCOM_SCM_MP_RESTORE_SEC_CFG);
758758
}
759-
EXPORT_SYMBOL(qcom_scm_restore_sec_cfg_available);
759+
EXPORT_SYMBOL_GPL(qcom_scm_restore_sec_cfg_available);
760760

761761
int qcom_scm_restore_sec_cfg(u32 device_id, u32 spare)
762762
{
@@ -775,7 +775,7 @@ int qcom_scm_restore_sec_cfg(u32 device_id, u32 spare)
775775

776776
return ret ? : res.result[0];
777777
}
778-
EXPORT_SYMBOL(qcom_scm_restore_sec_cfg);
778+
EXPORT_SYMBOL_GPL(qcom_scm_restore_sec_cfg);
779779

780780
int qcom_scm_iommu_secure_ptbl_size(u32 spare, size_t *size)
781781
{
@@ -796,7 +796,7 @@ int qcom_scm_iommu_secure_ptbl_size(u32 spare, size_t *size)
796796

797797
return ret ? : res.result[1];
798798
}
799-
EXPORT_SYMBOL(qcom_scm_iommu_secure_ptbl_size);
799+
EXPORT_SYMBOL_GPL(qcom_scm_iommu_secure_ptbl_size);
800800

801801
int qcom_scm_iommu_secure_ptbl_init(u64 addr, u32 size, u32 spare)
802802
{
@@ -820,7 +820,7 @@ int qcom_scm_iommu_secure_ptbl_init(u64 addr, u32 size, u32 spare)
820820

821821
return ret;
822822
}
823-
EXPORT_SYMBOL(qcom_scm_iommu_secure_ptbl_init);
823+
EXPORT_SYMBOL_GPL(qcom_scm_iommu_secure_ptbl_init);
824824

825825
int qcom_scm_iommu_set_cp_pool_size(u32 spare, u32 size)
826826
{
@@ -835,7 +835,7 @@ int qcom_scm_iommu_set_cp_pool_size(u32 spare, u32 size)
835835

836836
return qcom_scm_call(__scm->dev, &desc, NULL);
837837
}
838-
EXPORT_SYMBOL(qcom_scm_iommu_set_cp_pool_size);
838+
EXPORT_SYMBOL_GPL(qcom_scm_iommu_set_cp_pool_size);
839839

840840
int qcom_scm_mem_protect_video_var(u32 cp_start, u32 cp_size,
841841
u32 cp_nonpixel_start,
@@ -859,7 +859,7 @@ int qcom_scm_mem_protect_video_var(u32 cp_start, u32 cp_size,
859859

860860
return ret ? : res.result[0];
861861
}
862-
EXPORT_SYMBOL(qcom_scm_mem_protect_video_var);
862+
EXPORT_SYMBOL_GPL(qcom_scm_mem_protect_video_var);
863863

864864
static int __qcom_scm_assign_mem(struct device *dev, phys_addr_t mem_region,
865865
size_t mem_sz, phys_addr_t src, size_t src_sz,
@@ -968,7 +968,7 @@ int qcom_scm_assign_mem(phys_addr_t mem_addr, size_t mem_sz,
968968
*srcvm = next_vm;
969969
return 0;
970970
}
971-
EXPORT_SYMBOL(qcom_scm_assign_mem);
971+
EXPORT_SYMBOL_GPL(qcom_scm_assign_mem);
972972

973973
/**
974974
* qcom_scm_ocmem_lock_available() - is OCMEM lock/unlock interface available
@@ -978,7 +978,7 @@ bool qcom_scm_ocmem_lock_available(void)
978978
return __qcom_scm_is_call_available(__scm->dev, QCOM_SCM_SVC_OCMEM,
979979
QCOM_SCM_OCMEM_LOCK_CMD);
980980
}
981-
EXPORT_SYMBOL(qcom_scm_ocmem_lock_available);
981+
EXPORT_SYMBOL_GPL(qcom_scm_ocmem_lock_available);
982982

983983
/**
984984
* qcom_scm_ocmem_lock() - call OCMEM lock interface to assign an OCMEM
@@ -1004,7 +1004,7 @@ int qcom_scm_ocmem_lock(enum qcom_scm_ocmem_client id, u32 offset, u32 size,
10041004

10051005
return qcom_scm_call(__scm->dev, &desc, NULL);
10061006
}
1007-
EXPORT_SYMBOL(qcom_scm_ocmem_lock);
1007+
EXPORT_SYMBOL_GPL(qcom_scm_ocmem_lock);
10081008

10091009
/**
10101010
* qcom_scm_ocmem_unlock() - call OCMEM unlock interface to release an OCMEM
@@ -1027,7 +1027,7 @@ int qcom_scm_ocmem_unlock(enum qcom_scm_ocmem_client id, u32 offset, u32 size)
10271027

10281028
return qcom_scm_call(__scm->dev, &desc, NULL);
10291029
}
1030-
EXPORT_SYMBOL(qcom_scm_ocmem_unlock);
1030+
EXPORT_SYMBOL_GPL(qcom_scm_ocmem_unlock);
10311031

10321032
/**
10331033
* qcom_scm_ice_available() - Is the ICE key programming interface available?
@@ -1042,7 +1042,7 @@ bool qcom_scm_ice_available(void)
10421042
__qcom_scm_is_call_available(__scm->dev, QCOM_SCM_SVC_ES,
10431043
QCOM_SCM_ES_CONFIG_SET_ICE_KEY);
10441044
}
1045-
EXPORT_SYMBOL(qcom_scm_ice_available);
1045+
EXPORT_SYMBOL_GPL(qcom_scm_ice_available);
10461046

10471047
/**
10481048
* qcom_scm_ice_invalidate_key() - Invalidate an inline encryption key
@@ -1068,7 +1068,7 @@ int qcom_scm_ice_invalidate_key(u32 index)
10681068

10691069
return qcom_scm_call(__scm->dev, &desc, NULL);
10701070
}
1071-
EXPORT_SYMBOL(qcom_scm_ice_invalidate_key);
1071+
EXPORT_SYMBOL_GPL(qcom_scm_ice_invalidate_key);
10721072

10731073
/**
10741074
* qcom_scm_ice_set_key() - Set an inline encryption key
@@ -1134,7 +1134,7 @@ int qcom_scm_ice_set_key(u32 index, const u8 *key, u32 key_size,
11341134
dma_free_coherent(__scm->dev, key_size, keybuf, key_phys);
11351135
return ret;
11361136
}
1137-
EXPORT_SYMBOL(qcom_scm_ice_set_key);
1137+
EXPORT_SYMBOL_GPL(qcom_scm_ice_set_key);
11381138

11391139
/**
11401140
* qcom_scm_hdcp_available() - Check if secure environment supports HDCP.
@@ -1156,7 +1156,7 @@ bool qcom_scm_hdcp_available(void)
11561156

11571157
return avail;
11581158
}
1159-
EXPORT_SYMBOL(qcom_scm_hdcp_available);
1159+
EXPORT_SYMBOL_GPL(qcom_scm_hdcp_available);
11601160

11611161
/**
11621162
* qcom_scm_hdcp_req() - Send HDCP request.
@@ -1203,7 +1203,7 @@ int qcom_scm_hdcp_req(struct qcom_scm_hdcp_req *req, u32 req_cnt, u32 *resp)
12031203

12041204
return ret;
12051205
}
1206-
EXPORT_SYMBOL(qcom_scm_hdcp_req);
1206+
EXPORT_SYMBOL_GPL(qcom_scm_hdcp_req);
12071207

12081208
int qcom_scm_iommu_set_pt_format(u32 sec_id, u32 ctx_num, u32 pt_fmt)
12091209
{
@@ -1219,7 +1219,7 @@ int qcom_scm_iommu_set_pt_format(u32 sec_id, u32 ctx_num, u32 pt_fmt)
12191219

12201220
return qcom_scm_call(__scm->dev, &desc, NULL);
12211221
}
1222-
EXPORT_SYMBOL(qcom_scm_iommu_set_pt_format);
1222+
EXPORT_SYMBOL_GPL(qcom_scm_iommu_set_pt_format);
12231223

12241224
int qcom_scm_qsmmu500_wait_safe_toggle(bool en)
12251225
{
@@ -1235,13 +1235,13 @@ int qcom_scm_qsmmu500_wait_safe_toggle(bool en)
12351235

12361236
return qcom_scm_call_atomic(__scm->dev, &desc, NULL);
12371237
}
1238-
EXPORT_SYMBOL(qcom_scm_qsmmu500_wait_safe_toggle);
1238+
EXPORT_SYMBOL_GPL(qcom_scm_qsmmu500_wait_safe_toggle);
12391239

12401240
bool qcom_scm_lmh_dcvsh_available(void)
12411241
{
12421242
return __qcom_scm_is_call_available(__scm->dev, QCOM_SCM_SVC_LMH, QCOM_SCM_LMH_LIMIT_DCVSH);
12431243
}
1244-
EXPORT_SYMBOL(qcom_scm_lmh_dcvsh_available);
1244+
EXPORT_SYMBOL_GPL(qcom_scm_lmh_dcvsh_available);
12451245

12461246
int qcom_scm_lmh_profile_change(u32 profile_id)
12471247
{
@@ -1255,7 +1255,7 @@ int qcom_scm_lmh_profile_change(u32 profile_id)
12551255

12561256
return qcom_scm_call(__scm->dev, &desc, NULL);
12571257
}
1258-
EXPORT_SYMBOL(qcom_scm_lmh_profile_change);
1258+
EXPORT_SYMBOL_GPL(qcom_scm_lmh_profile_change);
12591259

12601260
int qcom_scm_lmh_dcvsh(u32 payload_fn, u32 payload_reg, u32 payload_val,
12611261
u64 limit_node, u32 node_id, u64 version)
@@ -1293,7 +1293,7 @@ int qcom_scm_lmh_dcvsh(u32 payload_fn, u32 payload_reg, u32 payload_val,
12931293
dma_free_coherent(__scm->dev, payload_size, payload_buf, payload_phys);
12941294
return ret;
12951295
}
1296-
EXPORT_SYMBOL(qcom_scm_lmh_dcvsh);
1296+
EXPORT_SYMBOL_GPL(qcom_scm_lmh_dcvsh);
12971297

12981298
static int qcom_scm_find_dload_address(struct device *dev, u64 *addr)
12991299
{
@@ -1328,7 +1328,7 @@ bool qcom_scm_is_available(void)
13281328
{
13291329
return !!__scm;
13301330
}
1331-
EXPORT_SYMBOL(qcom_scm_is_available);
1331+
EXPORT_SYMBOL_GPL(qcom_scm_is_available);
13321332

13331333
static int qcom_scm_assert_valid_wq_ctx(u32 wq_ctx)
13341334
{

0 commit comments

Comments
 (0)