From bce46aa3a11b5bac2413b159a1b9176abf455d52 Mon Sep 17 00:00:00 2001 From: Simon Shields Date: Mon, 18 Jun 2018 18:09:03 +1000 Subject: Revert "exynos: also disable TZPC init" By default, all components in the SoC are secure-world only. If we want to use DMA to access any of these (like UART, etc.) then we need to mark them as non-secure, since the peripheral pl330s are non-secure only. This reverts commit a91abc51ec99c74a555e1dc0dff3c272ba42d3d8. --- arch/arm/mach-exynos/lowlevel_init.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'arch') diff --git a/arch/arm/mach-exynos/lowlevel_init.c b/arch/arm/mach-exynos/lowlevel_init.c index 26591aa75d..1e090fd63c 100644 --- a/arch/arm/mach-exynos/lowlevel_init.c +++ b/arch/arm/mach-exynos/lowlevel_init.c @@ -223,7 +223,7 @@ int do_lowlevel_init(void) #endif #endif mem_ctrl_init(actions & DO_MEM_RESET); - //tzpc_init(); + tzpc_init(); } return actions & DO_WAKEUP; -- cgit v1.2.3