summaryrefslogtreecommitdiff
path: root/arch/arm/boot/dts/imx7d.dtsi
diff options
context:
space:
mode:
authorulises <ulises.cardenas@freescale.com>2015-11-18 08:10:26 -0600
committerDan Douglass <dan.douglass@freescale.com>2016-03-18 14:28:58 -0500
commitb51b2dab78c43e6483c4d2028253880b36fcfdff (patch)
tree95c3aea88dab6724573bd79287706b8e0b094f11 /arch/arm/boot/dts/imx7d.dtsi
parent52c42162b059bda9461378ca2942766fee7b572f (diff)
MLK-11922 i.mx6: Linux 3.14.28 CAAM & SNVS enabled by default.
JTAG, DS-5 attachment causes exceptions Added properties to device tree, in order to enable and disable alarms. The following are the available alarms: -JTAG active -WatchDOG 2 reset -Internal Boot -External Tamper Detection pad
Diffstat (limited to 'arch/arm/boot/dts/imx7d.dtsi')
-rw-r--r--arch/arm/boot/dts/imx7d.dtsi8
1 files changed, 6 insertions, 2 deletions
diff --git a/arch/arm/boot/dts/imx7d.dtsi b/arch/arm/boot/dts/imx7d.dtsi
index a6fc3f0bcabe..e947783ae4c3 100644
--- a/arch/arm/boot/dts/imx7d.dtsi
+++ b/arch/arm/boot/dts/imx7d.dtsi
@@ -343,8 +343,12 @@
};
irq_sec_vio: caam_secvio {
- compatible = "fsl,imx7d-caam-secvio", "fsl,imx6q-caam-secvio";
- interrupts = <GIC_SPI 20 IRQ_TYPE_LEVEL_HIGH>;
+ compatible = "fsl,imx7d-caam-secvio", "fsl,imx6q-caam-secvio";
+ interrupts = <GIC_SPI 20 IRQ_TYPE_LEVEL_HIGH>;
+ jtag-tamper = "disabled";
+ watchdog-tamper = "enabled";
+ internal-boot-tamper = "enabled";
+ external-pin-tamper = "disabled";
};
pmu {