linux-imx/Documentation/ABI/testing/sysfs-bus-coreboot
Bjorn Helgaas ebab9426cd Documentation/ABI: Fix typos
Fix typos in Documentation/ABI.  The changes are in descriptions or
comments where they shouldn't affect use of the ABIs.

Signed-off-by: Bjorn Helgaas <bhelgaas@google.com>
Reviewed-by: Randy Dunlap <rdunlap@infradead.org>
Link: https://lore.kernel.org/r/20230814212822.193684-2-helgaas@kernel.org
Signed-off-by: Jonathan Corbet <corbet@lwn.net>
2023-08-18 11:28:40 -06:00

1.7 KiB

What: /sys/bus/coreboot Date: August 2022 Contact: Jack Rosenthal jrosenth@chromium.org Description: The coreboot bus provides a variety of virtual devices used to access data structures created by the Coreboot BIOS.

What: /sys/bus/coreboot/devices/cbmem- Date: August 2022 Contact: Jack Rosenthal jrosenth@chromium.org Description: CBMEM is a downwards-growing memory region created by Coreboot, and contains tagged data structures to be shared with payloads in the boot process and the OS. Each CBMEM entry is given a directory in /sys/bus/coreboot/devices based on its id. A list of ids known to Coreboot can be found in the coreboot source tree at src/commonlib/bsd/include/commonlib/bsd/cbmem_id.h.

What: /sys/bus/coreboot/devices/cbmem-/address Date: August 2022 Contact: Jack Rosenthal jrosenth@chromium.org Description: This is the physical memory address that the CBMEM entry's data begins at, in hexadecimal (e.g., 0x76ffe000).

What: /sys/bus/coreboot/devices/cbmem-/size Date: August 2022 Contact: Jack Rosenthal jrosenth@chromium.org Description: This is the size of the CBMEM entry's data, in hexadecimal (e.g., 0x1234).

What: /sys/bus/coreboot/devices/cbmem-/mem Date: August 2022 Contact: Jack Rosenthal jrosenth@chromium.org Description: A file exposing read/write access to the entry's data. Note that this file does not support mmap(), as coreboot does not guarantee that the data will be page-aligned.

	The mode of this file is 0600.  While there shouldn't be
	anything security-sensitive contained in CBMEM, read access
	requires root privileges given this is exposing a small subset
	of physical memory.