From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753407AbbBXSB4 (ORCPT ); Tue, 24 Feb 2015 13:01:56 -0500 Received: from pmta2.delivery6.ore.mailhop.org ([54.200.129.228]:47793 "EHLO pmta2.delivery6.ore.mailhop.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752445AbbBXSBy (ORCPT ); Tue, 24 Feb 2015 13:01:54 -0500 X-Mail-Handler: DuoCircle Outbound SMTP X-Originating-IP: 104.193.169.186 X-Report-Abuse-To: abuse@duocircle.com (see https://support.duocircle.com/support/solutions/articles/5000540958-duocircle-standard-smtp-abuse-information for abuse reporting information) X-MHO-User: U2FsdGVkX192W3vEscB96wBRuzFbl+G4 Date: Tue, 24 Feb 2015 09:50:57 -0800 From: Tony Lindgren To: Pali =?utf-8?B?Um9ow6Fy?= Cc: Nishanth Menon , Felipe Balbi , Ivaylo Dimitrov , Aaro Koskinen , Sebastian Reichel , Pavel Machek , linux-kernel@vger.kernel.org, linux-omap@vger.kernel.org, linux-crypto@vger.kernel.org Subject: Re: Nokia N900: omap aes is broken Message-ID: <20150224175056.GE28244@atomide.com> References: <201502181321.03774@pali> <201502241838.44317@pali> <20150224173734.GD28244@atomide.com> <201502241849.03170@pali> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <201502241849.03170@pali> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Pali Rohár [150224 09:52]: > On Tuesday 24 February 2015 18:37:34 Tony Lindgren wrote: > > * Pali Rohár [150224 09:42]: > > > On Tuesday 24 February 2015 18:25:12 Tony Lindgren wrote: > > > > * Pali Rohár [150218 16:03]: > > > > > --- a/arch/arm/mach-omap2/omap_hwmod_3xxx_data.c > > > > > +++ b/arch/arm/mach-omap2/omap_hwmod_3xxx_data.c > > > > > @@ -3938,8 +3938,9 @@ int __init > > > > > omap3xxx_hwmod_init(void) > > > > > > > > > > if (r < 0) > > > > > > > > > > return r; > > > > > > > > > > - /* Register GP-only hwmod links. */ > > > > > - if (h_gp && omap_type() == OMAP2_DEVICE_TYPE_GP) { > > > > > +// /* Register GP-only hwmod links. */ > > > > > +// if (h_gp && omap_type() == OMAP2_DEVICE_TYPE_GP) { > > > > > + if (h_gp) { > > > > > > > > > > r = omap_hwmod_register_links(h_gp); > > > > > if (r < 0) > > > > > > > > > > return r; > > > > > > > > > > aes hwmod is defined in GP-only hwmod... > > > > > > > > Doesn't this depend on the bootloader version of n900 to > > > > work? > > > > > > > > Regards, > > > > > > > > Tony > > > > > > Ok, it looks like second patch (omap_hwmod_3xxx_data.c) > > > needs that aes-enabled bootloader. > > > > OK we need some runtime detection somehow for what's enabled.. > > > > What about checking DT if omap-aes is disabled or not? In general that's not a good solution as marking something with status = "disabled" means the device is completely ignored and we will never have the struct device entry created for it and we can never idle it. But in this case however, it may be the right thing to do if the secure mode is using that device. Regards, Tony