From patchwork Thu Jul 20 09:55:55 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Maxime Ripard X-Patchwork-Id: 1810490 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=85.214.62.61; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256 header.s=k20201202 header.b=F/QN/c3h; dkim-atps=neutral Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4R6F5X2mXMz1yYm for ; Fri, 21 Jul 2023 00:13:02 +1000 (AEST) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 10BB586751; Thu, 20 Jul 2023 16:12:59 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=kernel.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.b="F/QN/c3h"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 2582D8637D; Thu, 20 Jul 2023 11:56:07 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.2 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 91FF185E73 for ; Thu, 20 Jul 2023 11:56:04 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=kernel.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=mripard@kernel.org Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 7C63461A0A; Thu, 20 Jul 2023 09:56:02 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1FB34C433C7; Thu, 20 Jul 2023 09:56:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1689846961; bh=SExZSkMUyLpxHG8JR6UlsqNU+TgZkqfLKHqy5a+Lxm4=; h=From:Subject:Date:To:Cc:From; b=F/QN/c3h5ECbMHibhfbfJxdbIXOo8Gqy1mL9isDIBTCGq4p0P6KtnBB4Rg8AnTyuM CnkcdiknrA/Fpf3LdaAnpOunNCRDHoeahS2VAJmXcmuip3RPfJEMqnzAt/dIeKFibF jSTG7lPXDkiX/6LHjnomdctvkz/XLH2rvAhSrDhv4Z4mXs3rpkjepCdF/4dnRmav5H TYDuAb/Nv4ljXHI5HMNeRlzucgmdMaEzI6OXJbWAXt1aydEtvmDAORKPfqa+6KTuS4 z119dJp2vxFYkBwonulJzKq1VrWbtwnjQjCoAvBY1Zp4sD1ixlT528gmDH9V7Db6m5 LhIaTYsXvS7IQ== From: Maxime Ripard Subject: [PATCH 0/4] net: ti: am65-cpsw-nuss: Fix DT binding handling of pinctrl Date: Thu, 20 Jul 2023 11:55:55 +0200 Message-Id: <20230720-ti-mdio-pinmux-v1-0-0bd3bd1cf759@kernel.org> MIME-Version: 1.0 X-B4-Tracking: v=1; b=H4sIAKsEuWQC/6tWKk4tykwtVrJSqFYqSi3LLM7MzwNyDHUUlJIzE vPSU3UzU4B8JSMDI2MDcyMD3ZJM3dyUzHzdgsy83NIK3URDI1Mj05SkREtzYyWgpoKi1LTMCrC B0bG1tQDzn8/2YAAAAA== To: Simon Glass , Joe Hershberger , Ramon Fried , Nishanth Menon , Ravi Gunasekaran Cc: Javier Martinez Canillas , Peter Robinson , u-boot@lists.denx.de, Maxime Ripard X-Mailer: b4 0.12.3 X-Developer-Signature: v=1; a=openpgp-sha256; l=1496; i=mripard@kernel.org; h=from:subject:message-id; bh=SExZSkMUyLpxHG8JR6UlsqNU+TgZkqfLKHqy5a+Lxm4=; b=owGbwMvMwCX2+D1vfrpE4FHG02pJDCk7Wdatin/+psT+skLz/KiDr+tNI9qtH5V/58zlfHiwY EK3TIxURykLgxgXg6yYIkuMsPmSuFOzXney8c2DmcPKBDKEgYtTACZS0MXw3//o17RvPX2Ve852 yNhocvH8tO6SeertVRmTtJBZIFqfh+Gv+K0Oqc0fOS4HcN283rtmmvHJ7yUn71w+NF9vnpuf8JI sBgA= X-Developer-Key: i=mripard@kernel.org; a=openpgp; fpr=BE5675C37E818C8B5764241C254BCFC56BF6CE8D X-Mailman-Approved-At: Thu, 20 Jul 2023 16:12:58 +0200 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.8 at phobos.denx.de X-Virus-Status: Clean Hi, This series is based on: https://lore.kernel.org/all/20230713072019.3153871-1-nm@ti.com/ It fixes the issue of Linux booting from the DT embedded by U-boot. The main issue there is that U-Boot doesn't handle the MDIO child node that might have resources attached to it. Thus, any pinctrl configuration that could be attached to the MDIO child node is effectively ignored. Unfortunately, starting with 6.5-rc1, Linux does just that. This was solved by duplicating the pinctrl configuration onto the MAC device node. Unfortunately, this doesn't work for Linux since now it has two devices competing for the same pins. Let me know what you think, Maxime Signed-off-by: Maxime Ripard --- Maxime Ripard (4): pinctrl: Create a select_state variant with the ofnode net: ti: am65-cpsw-nuss: Enforce pinctrl state on the MDIO child node fixup! arm: dts: k3-am62: Bump dtsi from linux v6.5-rc1 fixup! arm: dts: k3-am62: Bump dtsi from linux v6.5-rc1 arch/arm/dts/k3-am625-sk-u-boot.dtsi | 7 ++++-- drivers/net/ti/am65-cpsw-nuss.c | 49 ++++++++++++++++++++++++++++++++++++ drivers/pinctrl/pinctrl-uclass.c | 15 ++++++----- include/dm/pinctrl.h | 26 ++++++++++++++----- 4 files changed, 83 insertions(+), 14 deletions(-) --- base-commit: acff6e7c553d5a839e885730a4018465a34ba5a7 change-id: 20230720-ti-mdio-pinmux-a12525dba973 Best regards,