summaryrefslogtreecommitdiff
path: root/scripts/const_structs.checkpatch
diff options
context:
space:
mode:
authorBryan O'Donoghue <[email protected]>2018-01-26 16:27:58 +0000
committerStefano Babic <[email protected]>2018-02-04 12:14:11 +0100
commitd1ceb0c4881332cb0586920f0a40f8e4a48d99a9 (patch)
treeaa005b3bd0fd5716d8dd3b69c1c55f14a34f5f9e /scripts/const_structs.checkpatch
parent22191ac353445ad8fafc5a78aefcd94e78963041 (diff)
imx: mx7: run sec_init for CAAM RNG
This patch adds a sec_init call into arch_misc_init(). Doing so in conjunction with the patch "drivers/crypto/fsl: assign job-rings to non-TrustZone" enables use of the CAAM in Linux when OPTEE/TrustZone is active. u-boot will initialise the RNG and assign ownership of the job-ring registers to a non-TrustZone context. With recent changes by Lukas Auer to fully initialize the RNG in sec_init() this means that u-boot will hand-off the CAAM in a state that Linux then can use the CAAM without touching the reserved DECO registers. This change is safe both for the OPTEE/TrustZone boot path and the regular non-OPTEE/TrustZone boot path. Signed-off-by: Bryan O'Donoghue <[email protected]> Cc: Fabio Estevam <[email protected]> Cc: Peng Fan <[email protected]> Cc: Marco Franchi <[email protected]> Cc: Vanessa Maegima <[email protected]> Cc: Stefano Babic <[email protected]> Cc: Lukas Auer <[email protected]> Tested-by: Lukas Auer <[email protected]> Reviewed-by: Fabio Estevam <[email protected]>
Diffstat (limited to 'scripts/const_structs.checkpatch')
0 files changed, 0 insertions, 0 deletions