arm:omap3:am33xx: HACK for bypassing RTC hwmod
authorVaibhav Bedia <vaibhav.bedia@ti.com>
Mon, 10 Oct 2011 20:10:12 +0000 (01:40 +0530)
committerVaibhav Hiremath <hvaibhav@ti.com>
Mon, 23 Jan 2012 19:14:34 +0000 (00:44 +0530)
Temp patch to avoid rtc clock getting reset
Needs to be investigated

Signed-off-by: Vaibhav Bedia <vaibhav.bedia@ti.com>
Signed-off-by: Vaibhav Hiremath <hvaibhav@ti.com>
arch/arm/mach-omap2/omap_hwmod_33xx_data.c

index c8fe4334fdba0e6b5a2d734e751aebad3b2ef437..5663d133e430f606bc14dd3acbbaf88b4ef2811c 100644 (file)
@@ -2524,10 +2524,6 @@ static __initdata struct omap_hwmod *am33xx_hwmods[] = {
        &am33xx_ocmcram_hwmod,
        /* ocpwp class */
        &am33xx_ocpwp_hwmod,
-       /* rtc class */
-#if 0
-       &am33xx_rtc_hwmod,
-#endif
        /* sha0 class */
        &am33xx_sha0_hwmod,
        /* smartreflex class */