msm: pil: Extract secure PIL operations

Move secure pil code into one file so we stop duplicating it in
each peripheral-reset-$(ARCH) file.

Signed-off-by: Stephen Boyd <sboyd@codeaurora.org>
diff --git a/arch/arm/mach-msm/scm-pas.c b/arch/arm/mach-msm/scm-pas.c
new file mode 100644
index 0000000..5bbffd3
--- /dev/null
+++ b/arch/arm/mach-msm/scm-pas.c
@@ -0,0 +1,110 @@
+/* Copyright (c) 2010-2011, Code Aurora Forum. All rights reserved.
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License version 2 and
+ * only version 2 as published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ */
+
+#include <linux/module.h>
+#include <linux/slab.h>
+#include <linux/string.h>
+
+#include <mach/scm.h>
+#include <mach/socinfo.h>
+#include "scm-pas.h"
+
+#define PAS_INIT_IMAGE_CMD	1
+#define PAS_AUTH_AND_RESET_CMD	5
+#define PAS_SHUTDOWN_CMD	6
+#define PAS_IS_SUPPORTED_CMD	7
+
+int pas_init_image(enum pas_id id, const u8 *metadata, size_t size)
+{
+	int ret;
+	struct pas_init_image_req {
+		u32	proc;
+		u32	image_addr;
+	} request;
+	u32 scm_ret = 0;
+	/* Make memory physically contiguous */
+	void *mdata_buf = kmemdup(metadata, size, GFP_KERNEL);
+
+	if (!mdata_buf)
+		return -ENOMEM;
+
+	request.proc = id;
+	request.image_addr = virt_to_phys(mdata_buf);
+
+	ret = scm_call(SCM_SVC_PIL, PAS_INIT_IMAGE_CMD, &request,
+			sizeof(request), &scm_ret, sizeof(scm_ret));
+	kfree(mdata_buf);
+
+	if (ret)
+		return ret;
+	return scm_ret;
+}
+EXPORT_SYMBOL(pas_init_image);
+
+int pas_auth_and_reset(enum pas_id id)
+{
+	int ret;
+	u32 proc = id, scm_ret = 0;
+
+	ret = scm_call(SCM_SVC_PIL, PAS_AUTH_AND_RESET_CMD, &proc,
+			sizeof(proc), &scm_ret, sizeof(scm_ret));
+	if (ret)
+		return ret;
+
+	return scm_ret;
+}
+EXPORT_SYMBOL(pas_auth_and_reset);
+
+int pas_shutdown(enum pas_id id)
+{
+	int ret;
+	u32 proc = id, scm_ret = 0;
+
+	ret = scm_call(SCM_SVC_PIL, PAS_SHUTDOWN_CMD, &proc, sizeof(proc),
+			&scm_ret, sizeof(scm_ret));
+	if (ret)
+		return ret;
+
+	return scm_ret;
+}
+EXPORT_SYMBOL(pas_shutdown);
+
+static bool secure_pil = true;
+module_param(secure_pil, bool, S_IRUGO);
+MODULE_PARM_DESC(secure_pil, "Use secure PIL");
+
+int pas_supported(enum pas_id id)
+{
+	int ret;
+	u32 periph = id, ret_val = 0;
+
+	if (!secure_pil)
+		return 0;
+
+	/*
+	 * 8660 SCM doesn't support querying secure PIL support so just return
+	 * true if not overridden on the command line.
+	 */
+	if (cpu_is_msm8x60())
+		return 1;
+
+	if (scm_is_call_available(SCM_SVC_PIL, PAS_IS_SUPPORTED_CMD) <= 0)
+		return 0;
+
+	ret = scm_call(SCM_SVC_PIL, PAS_IS_SUPPORTED_CMD, &periph,
+			sizeof(periph), &ret_val, sizeof(ret_val));
+	if (ret)
+		return ret;
+
+	return ret_val;
+}
+EXPORT_SYMBOL(pas_supported);