]> git.baikalelectronics.ru Git - kernel.git/commit
ARM: dts: Configure omap4 rng to probe with ti-sysc
authorTony Lindgren <tony@atomide.com>
Thu, 12 Dec 2019 17:46:11 +0000 (09:46 -0800)
committerTony Lindgren <tony@atomide.com>
Thu, 23 Jan 2020 16:23:26 +0000 (08:23 -0800)
commitce25961f6cecfcbe6b3e2483579e16bc133516d7
treec998a79a631c334e9d11010483a3a021b8732e89
parentdaf5d4e0e85b20bdcb61c237f7028af2ac3c581d
ARM: dts: Configure omap4 rng to probe with ti-sysc

Add RNG interconnect data for omap4 similar to what dra7 has. The
clock is OMAP4_CM_L4SEC_RNG_CLKCTRL_OFFSET at offset address 0x01c0,
which matches what dra7 also has with DRA7_L4SEC_CLKCTRL_INDEX(0x1c0).

Note that we need to also add the related l4_secure clock entries.
I've only added RNG, the others can be added as they get tested.
They are probably very similar to what we already have for dra7
in dra7_l4sec_clkctrl_regs[].

With the clock tagged CLKF_SOC_NONSEC, clock is set disabled for secure
devices and clk_get() will fail. Additionally we disable the RNG target
module on droid4 to avoid introducing new boot time warnings.

Cc: devicetree@vger.kernel.org
Cc: Rob Herring <robh+dt@kernel.org>
Signed-off-by: Tony Lindgren <tony@atomide.com>
arch/arm/boot/dts/motorola-mapphone-common.dtsi
arch/arm/boot/dts/omap4-l4.dtsi