lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <AM6PR04MB49666A87566154AF128DC47C80010@AM6PR04MB4966.eurprd04.prod.outlook.com>
Date:   Sun, 18 Oct 2020 05:03:05 +0000
From:   Aisheng Dong <aisheng.dong@....com>
To:     "Franck Lenormand (OSS)" <franck.lenormand@....nxp.com>,
        "shawnguo@...nel.org" <shawnguo@...nel.org>,
        "s.hauer@...gutronix.de" <s.hauer@...gutronix.de>,
        "festevam@...il.com" <festevam@...il.com>
CC:     "kernel@...gutronix.de" <kernel@...gutronix.de>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        "linux-arm-kernel@...ts.infradead.org" 
        <linux-arm-kernel@...ts.infradead.org>,
        dl-linux-imx <linux-imx@....com>, Abel Vesa <abel.vesa@....com>,
        Anson Huang <anson.huang@....com>,
        "linux@...pel-privat.de" <linux@...pel-privat.de>,
        Daniel Baluta <daniel.baluta@....com>,
        Joakim Zhang <qiangqing.zhang@....com>,
        Peng Fan <peng.fan@....com>
Subject: RE: [PATCH v2 4/5] dt-bindings: arm: imx: Documentation of the SC
 secvio driver

> From: Franck Lenormand (OSS) <franck.lenormand@....nxp.com>
> Sent: Tuesday, July 21, 2020 11:21 PM
> 
> This patch adds the documentation for the SECurity VIOlation driver using the
> SCU on imx8x and imx8q.
> 
> Signed-off-by: Franck LENORMAND <franck.lenormand@....nxp.com>
> ---
>  .../bindings/arm/freescale/fsl,imx-sc-secvio.yaml  | 34
> ++++++++++++++++++++++
>  1 file changed, 34 insertions(+)
>  create mode 100644
> Documentation/devicetree/bindings/arm/freescale/fsl,imx-sc-secvio.yaml
> 
> diff --git
> a/Documentation/devicetree/bindings/arm/freescale/fsl,imx-sc-secvio.yaml
> b/Documentation/devicetree/bindings/arm/freescale/fsl,imx-sc-secvio.yaml
> new file mode 100644
> index 0000000..59b9a86
> --- /dev/null
> +++ b/Documentation/devicetree/bindings/arm/freescale/fsl,imx-sc-secvio.
> +++ yaml
> @@ -0,0 +1,34 @@
> +# SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) %YAML 1.2
> +---
> +$id:
> +http://devicetree.org/schemas/arm/freescale/fsl,imx-sc-secvio.yaml#
> +$schema: http://devicetree.org/meta-schemas/core.yaml#
> +
> +title: NXP i.MX Security Violation driver
> +
> +maintainers:
> +  - Franck LENORMAND <franck.lenormand@....com>
> +
> +description: |
> +  Receive security violation from the SNVS via the SCU firmware. Allow
> +to
> +  register notifier for additional processing
> +
> +properties:
> +  compatible:
> +    enum:
> +      - fsl,imx-sc-secvio
> +  nvmem:

Can we use standard nvmem-cells?
Documentation/devicetree/bindings/nvmem/nvmem-consumer.yaml

Regards
Aisheng

> +    $ref: /schemas/types.yaml#/definitions/phandle
> +    description:
> +      Phandle to the nvmem provider.
> +
> +required:
> +  - compatible
> +  - nvmem
> +
> +examples:
> +  - |
> +    sc_secvio: sc-secvio
> +        compatible = "fsl,imx-sc-secvio";
> +        nvmem = <&ocotp>
> +    };
> --
> 2.7.4

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ