Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp428290pxb; Fri, 28 Jan 2022 02:14:20 -0800 (PST) X-Google-Smtp-Source: ABdhPJwzPn/ivpMilWyX1MO8guwAKJuXAmpZsaF6SmWQDVMF0/Y8ddkIUeWtObzYBu3GdUUdWw0X X-Received: by 2002:a63:f709:: with SMTP id x9mr6097173pgh.428.1643364860172; Fri, 28 Jan 2022 02:14:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643364860; cv=none; d=google.com; s=arc-20160816; b=b3ONzZwe0Ehu15qyaiFq4ptoE2A0ppY5NqElGWOmHc7icRe5lJGDwSoWeP767vJ5lh /MKZjtXh+NAgO0yxOfEOg5MiBFv6cPSEwWR1orf/V1oEwdUmfD0qC/Vmygn7eT9ytHlD bMVzRI/2i2DS5LWCwPPqqopOQnOAS7k/CK48W0z07P2/Kqjf3Sik7FY6Ax6wpDYC24kb uhG7F4teEYB/zPw0q9kIiFzfTtKQ0v1hWMQJwgFgSeqoQeJtNUUTkNh6XSOjHjAhLihI 67OVjq8dx0clUH/K4JHZVcYvG1sxMMldMZgBJ9DeasBfExR73SoJOpl/qQHoYGkKQTBz L2GQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=S51ZapZnYq1k6n2qxYfSXh5MaRdNceh6NgrFguI6b6s=; b=cUuA1tpOK9ZuK2LW8ewhmzd+Uhl+ASF4yPjIa8By9Mq2QT8llRp2Hj83HVV0zfYat0 Km/gZnPk2dxWVAGRi5ym/Q48lubPBt+E3nfiW9oC+gbLVdoy9/jzkQLVNA87eEAoWczD pVqlEppO2w8xy+r9OxPneU5rSJ58Z5xdbkclKP2XNRQRNh4G0nQ72eJ8Upowr8l6AH2b luTGx8MCan+yNSYMXDZ85uBD7ZLz/vtDLa4nvxdZoczKWdDZGv3C8NdQynTFkhsUGH3Q HkY4mTgOJSYfbBFlAVZGVGfTpg/u4ekXKtunvRRdf+UnpghmTHz5FhBwZ6f/SVTdLe5U 8wrA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@walle.cc header.s=mail2016061301 header.b=am4VRjOn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e7si4942007pls.284.2022.01.28.02.14.08; Fri, 28 Jan 2022 02:14:20 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@walle.cc header.s=mail2016061301 header.b=am4VRjOn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243860AbiA0Qhw (ORCPT + 99 others); Thu, 27 Jan 2022 11:37:52 -0500 Received: from ssl.serverraum.org ([176.9.125.105]:49797 "EHLO ssl.serverraum.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229477AbiA0Qhg (ORCPT ); Thu, 27 Jan 2022 11:37:36 -0500 Received: from mwalle01.kontron.local. (unknown [213.135.10.150]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ssl.serverraum.org (Postfix) with ESMTPSA id 2F2D2223EA; Thu, 27 Jan 2022 17:37:34 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=walle.cc; s=mail2016061301; t=1643301454; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=S51ZapZnYq1k6n2qxYfSXh5MaRdNceh6NgrFguI6b6s=; b=am4VRjOnPRhCEqV8KcvKa3taiD2k+m8rnygSVEatXNpj/m7QbYsB1/h8l7FA9nguJ1tyKf p+kyoJjCAIXlTkuTdDD3l0Q2coCVKNgyszQjzjEaLSc/EW8iZQ9ABepUiqRHbdM2zIFlGD M1gjAl+9YccVsgwDCV6le91WvZNKxBk= From: Michael Walle To: devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org Cc: Srinivas Kandagatla , Rob Herring , Shawn Guo , Li Yang , Michael Walle Subject: [PATCH v1 1/3] dt-bindings: nvmem: add fsl,layerscape-sfp binding Date: Thu, 27 Jan 2022 17:37:26 +0100 Message-Id: <20220127163728.3650648-2-michael@walle.cc> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20220127163728.3650648-1-michael@walle.cc> References: <20220127163728.3650648-1-michael@walle.cc> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The Security Fuse Processor provides efuses and is responsible for reading it at SoC startup and configuring it accordingly. Signed-off-by: Michael Walle --- .../bindings/nvmem/fsl,layerscape-sfp.yaml | 38 +++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100644 Documentation/devicetree/bindings/nvmem/fsl,layerscape-sfp.yaml diff --git a/Documentation/devicetree/bindings/nvmem/fsl,layerscape-sfp.yaml b/Documentation/devicetree/bindings/nvmem/fsl,layerscape-sfp.yaml new file mode 100644 index 000000000000..80914b93638e --- /dev/null +++ b/Documentation/devicetree/bindings/nvmem/fsl,layerscape-sfp.yaml @@ -0,0 +1,38 @@ +# SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) +%YAML 1.2 +--- +$id: http://devicetree.org/schemas/nvmem/fsl,layerscape-sfp.yaml# +$schema: http://devicetree.org/meta-schemas/core.yaml# + +title: Freescale Layerscape Security Fuse Processor + +maintainers: + - Michael Walle + +description: | + SFP is the security fuse processor which among other things provide a + unique identifier per part. + +allOf: + - $ref: "nvmem.yaml#" + +properties: + compatible: + enum: + - fsl,ls1028a-sfp + + reg: + maxItems: 1 + +required: + - compatible + - reg + +unevaluatedProperties: false + +examples: + - | + efuse@1e80000 { + compatible = "fsl,ls1028a-sfp"; + reg = <0x1e80000 0x8000>; + }; -- 2.30.2