From patchwork Wed Aug 31 11:18:53 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Michael Walle X-Patchwork-Id: 1672294 Return-Path: X-Original-To: incoming-dt@patchwork.ozlabs.org Delivered-To: patchwork-incoming-dt@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org (client-ip=2620:137:e000::1:20; helo=out1.vger.email; envelope-from=devicetree-owner@vger.kernel.org; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=walle.cc header.i=@walle.cc header.a=rsa-sha256 header.s=mail2022082101 header.b=TZeqX7+e; dkim-atps=neutral Received: from out1.vger.email (out1.vger.email [IPv6:2620:137:e000::1:20]) by legolas.ozlabs.org (Postfix) with ESMTP id 4MHhWs5sgGz1yhR for ; Wed, 31 Aug 2022 21:19:05 +1000 (AEST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230487AbiHaLTE (ORCPT ); Wed, 31 Aug 2022 07:19:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59052 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229486AbiHaLTD (ORCPT ); Wed, 31 Aug 2022 07:19:03 -0400 Received: from mail.3ffe.de (0001.3ffe.de [159.69.201.130]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7214CCC314; Wed, 31 Aug 2022 04:19:02 -0700 (PDT) Received: from mwalle01.kontron.local. (unknown [213.135.10.150]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mail.3ffe.de (Postfix) with ESMTPSA id 8A2BD126D; Wed, 31 Aug 2022 13:19:00 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=walle.cc; s=mail2022082101; t=1661944740; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=p04O/CIBirtCabMm2McxdbE/HL9u16fsZCxrZFi0bCE=; b=TZeqX7+eHd8LkfGWAqMp3qzyhA1pOsBlxXnhto/GU5uDAHhyYFE2jNYE7QqkcbRtZ12Ukb kIuC0JQMcKFbQk2ucgi1wI70VtYkL1zc5/ABv9GfCJDjnQxZwLC7f7jh/jHno9/DIUvRtl tI7gsmi/Uq9XivW8OJs5ebwmSMO6oUin8/yYA4evkQEHdY7H27PzS7nhyxbLHbncw+5p0R gCnndVK53dPxKmyNkc7LPn3t9LmclriqLcaoN9VL5qOHsECWqXgNZigAymNfrOXbvkn68h o0V4MGZqF4haYybUwKPm3Fdiof+y6fRfpEtTQzug3icy4EdZybijMCfjP5dd2g== From: Michael Walle To: "David S . Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Rob Herring , Krzysztof Kozlowski , Lars Povlsen , Steen Hegelund , Horatiu Vultur Cc: UNGLinuxDriver@microchip.com, Philipp Zabel , netdev@vger.kernel.org, devicetree@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Michael Walle Subject: [PATCH net-next 0/2] net: lan966x: make reset optional Date: Wed, 31 Aug 2022 13:18:53 +0200 Message-Id: <20220831111855.1749646-1-michael@walle.cc> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 X-Spam: Yes X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: devicetree@vger.kernel.org This is the remaining part of the reset rework on the LAN966x targetting the netdev tree. The former series can be found at: https://lore.kernel.org/lkml/20220826115607.1148489-1-michael@walle.cc/ Michael Walle (2): dt-bindings: net: sparx5: don't require a reset line net: lan966x: make reset optional .../devicetree/bindings/net/microchip,sparx5-switch.yaml | 2 -- drivers/net/ethernet/microchip/lan966x/lan966x_main.c | 3 ++- 2 files changed, 2 insertions(+), 3 deletions(-)