View Single Post
Posts: 11 | Thanked: 35 times | Joined on Dec 2013
#15
Hi,

I just thought I post some of my personal notes here about the eeprom stuff in the toh driver (having written the driver).

The idea originally was to

1. Have some way to automatically instantiate devices to linux kernel (to allow true linux "device-driver" model hot plugging of devices)
2. Have system and application specific configurations provided for userspace (and to some extent kernel)

For system configurations we tried bitmasks and such, but finally converged to just a configuration string (CFG_DATA). Idea there was to have some pre-defined key-value pairs to initiate actions inside kernel and tohd. Simple exaple would be vdd=1, meaning "enable the VDD". Or have some other string for i2c device parameters that the toh-core driver would register onto the bus then (so that corresponding driver would automatically probe).

The user data was meant for any application running in userspace to just read and do anything they need to according to that.

But... At some point of development we shifted gears and went full speed for the NFC based identification and the EEPROM was left a bit unattended. I basically got the CFG_DATA exporting done, but none of the hotplugging things nor exporting user data.

I thought the EEPROM still could serve a purpose for hacker community, as you can (maybe) more easily (and independently of Jolla store or anything outside) do simple detection of your own custom cover. So the driver is still there, but it's not "officially" driven forward at the moment. But were not removing it either, so feel free to use in personal hacking

I'm very interested to see what kind of uses you guys come up with it. Maybe once the recovery options allow safe community kernel development on Jolla, something in form of quality kernel patches could arise that we could pick up into official release as well.
 

The Following 5 Users Say Thank You to kjokinie For This Useful Post: