diff options
author | PrasannaKumar Muralidharan <prasannatsmkumar@gmail.com> | 2020-03-10 13:22:56 +0000 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2020-03-19 07:41:03 +0100 |
commit | 49d37c6b09e19af59ed941722d830eb50faa3fcf (patch) | |
tree | 1eea4831b8f40e05f2f6915708dd6fc4dd9817a5 /Documentation/ABI | |
parent | 4a2addc28769183ff1162c408b4cda55b8c75495 (diff) | |
download | linux-stable-49d37c6b09e19af59ed941722d830eb50faa3fcf.tar.gz linux-stable-49d37c6b09e19af59ed941722d830eb50faa3fcf.tar.bz2 linux-stable-49d37c6b09e19af59ed941722d830eb50faa3fcf.zip |
Documentation: ABI: nvmem: add documentation for JZ4780 efuse ABI
This patch brings support for the JZ4780 efuse. Currently it only exposes
a read only access to the entire 8K bits efuse memory.
Tested-by: Mathieu Malaterre <malat@debian.org>
Signed-off-by: PrasannaKumar Muralidharan <prasannatsmkumar@gmail.com>
Signed-off-by: Mathieu Malaterre <malat@debian.org>
Reviewed-by: Paul Cercueil <paul@crapouillou.net>
Signed-off-by: Srinivas Kandagatla <srinivas.kandagatla@linaro.org>
Link: https://lore.kernel.org/r/20200310132257.23358-14-srinivas.kandagatla@linaro.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'Documentation/ABI')
-rw-r--r-- | Documentation/ABI/testing/sysfs-driver-jz4780-efuse | 16 |
1 files changed, 16 insertions, 0 deletions
diff --git a/Documentation/ABI/testing/sysfs-driver-jz4780-efuse b/Documentation/ABI/testing/sysfs-driver-jz4780-efuse new file mode 100644 index 000000000000..bb6f5d6ceea0 --- /dev/null +++ b/Documentation/ABI/testing/sysfs-driver-jz4780-efuse @@ -0,0 +1,16 @@ +What: /sys/devices/*/<our-device>/nvmem +Date: December 2017 +Contact: PrasannaKumar Muralidharan <prasannatsmkumar@gmail.com> +Description: read-only access to the efuse on the Ingenic JZ4780 SoC + The SoC has a one time programmable 8K efuse that is + split into segments. The driver supports read only. + The segments are + 0x000 64 bit Random Number + 0x008 128 bit Ingenic Chip ID + 0x018 128 bit Customer ID + 0x028 3520 bit Reserved + 0x1E0 8 bit Protect Segment + 0x1E1 2296 bit HDMI Key + 0x300 2048 bit Security boot key +Users: any user space application which wants to read the Chip + and Customer ID |