Message ID | 1404203268-31404-2-git-send-email-s.trumtrar@pengutronix.de |
---|---|
State | New |
Headers | show |
diff --git a/arch/arm/mach-imx/mach-imx53.c b/arch/arm/mach-imx/mach-imx53.c index 2bad387..5660fc3 100644 --- a/arch/arm/mach-imx/mach-imx53.c +++ b/arch/arm/mach-imx/mach-imx53.c @@ -24,11 +24,18 @@ #include "hardware.h" #include "mx53.h" +static const struct of_device_id aips_of_matches[] __initconst = { + { .compatible = "fsl,imx53-aipstz" }, + { /*sentinel*/ } +}; + static void __init imx53_dt_init(void) { mxc_arch_reset_init_dt(); of_platform_populate(NULL, of_default_bus_match_table, NULL, NULL); + + imx_aips_allow_unprivileged_access(aips_of_matches); } static const char *imx53_dt_board_compat[] __initconst = {
Most peripherals on the i.MX53 have an Off-Platform Peripheral Access Control Register (OPACR) in which the access rights (together with the MPROT registers) can be declared. However, this does not seem to work for example for SSI1+SDMA, because the supervisor bit is not set for the SDMA unit. It does work for SSI2, the QSB for example uses SSI2 for its audio. But SSI2 only works because it does NOT have an OPACR. The right solution would be to fix the access rights for the SDMA, but the unit responsible for this is the Central Security Unit (CSU), which of course is NOT documented. So, until documentation for this is openly available, turn off the supervisor protection because it cripples the hardware. Signed-off-by: Steffen Trumtrar <s.trumtrar@pengutronix.de> --- Changes in v3: - move code pattern to helper function in cpu.c arch/arm/mach-imx/mach-imx53.c | 7 +++++++ 1 file changed, 7 insertions(+)