From patchwork Mon Jul 24 13:57:29 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Maxime Ripard X-Patchwork-Id: 1811838 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=85.214.62.61; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256 header.s=k20201202 header.b=ACd+zM1v; dkim-atps=neutral Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4R8hdr16LHz1yZw for ; Tue, 25 Jul 2023 00:01:04 +1000 (AEST) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 73EC386860; Mon, 24 Jul 2023 16:00:50 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=kernel.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.b="ACd+zM1v"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 0BBAC86896; Mon, 24 Jul 2023 15:59:32 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.2 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 294FE86824 for ; Mon, 24 Jul 2023 15:58:36 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=kernel.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=mripard@kernel.org Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 4A0F36117E; Mon, 24 Jul 2023 13:57:34 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 35B90C433C8; Mon, 24 Jul 2023 13:57:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1690207053; bh=pHMdVAzUC+YrM90c5EHwPjTAhlpKWco7U2CUYXRRDTI=; h=From:Subject:Date:To:Cc:From; b=ACd+zM1vJ4aQK6YIJrqA/lg4TImZL+BZMaqTkWheHyeiS13lwUoavgv3WpiXFjw7W 9/PhVmdydH6L/DZJCu0aIPZ/hDb9mnS6LLGBqIyDJwCITlpwPL835hmgUciH+t650U sdiZcjIIc8HAeJn+0QCIsN/jSZu6fTCeSSEa2fRKIqbVYsA4GU3YkkBCg0MWkFIqsl /+VRfB+ubdXRMFe2AcuXz69O5CdxHVrWcFsGIqfJRiAEo0l2fdU8EwhZzFqYw7KHaN a13B2rMb1+CRRAQroxAQB1c/usGYYXtlPBsRiXDjfagEf4CIaeRcfo0xordA13+sMM ZhmamAdLNunow== From: Maxime Ripard Subject: [PATCH v4 0/2] net: ti: am65-cpsw-nuss: Fix DT binding handling of pinctrl Date: Mon, 24 Jul 2023 15:57:29 +0200 Message-Id: <20230724-ti-mdio-pinmux-v4-0-18541f976501@kernel.org> MIME-Version: 1.0 X-B4-Tracking: v=1; b=H4sIAEmDvmQC/3XMSw6CMBSF4a2Qjq25fQXryH0YBy0tcKMUUpBgC Hu3MMIQh+ck3z+T3kf0PblmM4l+xB7bkIY8ZaSoTag8RZc24cAF5BzogLRx2NIOQ/OeqGFcceW s0bkgCXXRlzhtwfsj7Rr7oY2frT+y9f2bGhkFCtYJ61hR5krfnj4G/zq3sSJra+R7zw6eJy+tl VJ40KaAgxd7Lw9eJF8WF6G0BWDS/vhlWb46Qa+RLQEAAA== To: Joe Hershberger , Nishanth Menon , Ramon Fried , Ravi Gunasekaran , Roger Quadros , Simon Glass Cc: Javier Martinez Canillas , Peter Robinson , u-boot@lists.denx.de, Maxime Ripard X-Mailer: b4 0.12.3 X-Developer-Signature: v=1; a=openpgp-sha256; l=1906; i=mripard@kernel.org; h=from:subject:message-id; bh=pHMdVAzUC+YrM90c5EHwPjTAhlpKWco7U2CUYXRRDTI=; b=owGbwMvMwCX2+D1vfrpE4FHG02pJDCn7mr14lv1j+zgvfKXR6U1TGnYIrqtR86xSyZI5zSZ1m vXop3saHaUsDGJcDLJiiiwxwuZL4k7Net3JxjcPZg4rE8gQBi5OAZhIkB3DP7NlZ2v4U6678Er0 GudMW/pPPWVPzLEnHruPHdy0k0FZJZ2R4cOvZq6cK4VSAdHrKizzNlrmTLyqzfVERlpzggBPQ6c xKwA= X-Developer-Key: i=mripard@kernel.org; a=openpgp; fpr=BE5675C37E818C8B5764241C254BCFC56BF6CE8D X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.8 at phobos.denx.de X-Virus-Status: Clean Hi, This series is based on: https://lore.kernel.org/all/20230713072019.3153871-1-nm@ti.com/ https://lore.kernel.org/u-boot/20230614222853.574427-1-dannenberg@ti.com/ https://lore.kernel.org/u-boot/20230722193151.117345-1-rogerq@kernel.org/ It fixes the issue of Linux booting from the DT embedded by U-boot. The main issue there is that U-Boot doesn't handle the MDIO child node that might have resources attached to it. Thus, any pinctrl configuration that could be attached to the MDIO child node is effectively ignored. Unfortunately, starting with 6.5-rc1, Linux does just that. This was solved by duplicating the pinctrl configuration onto the MAC device node. Unfortunately, this doesn't work for Linux since now it has two devices competing for the same pins. Let me know what you think, Maxime Signed-off-by: Maxime Ripard --- Changes in v4: - Squashed fixup patches - Link to v3: https://lore.kernel.org/r/20230724-ti-mdio-pinmux-v3-0-fc8359b0014b@kernel.org Changes in v3: - Rebase on top of latest Roger series - Link to v2: https://lore.kernel.org/r/20230721-ti-mdio-pinmux-v2-0-4bb443e09ac0@kernel.org Changes in v2: - Drop the pinctrl API change in favour of a dummy driver - Link to v1: https://lore.kernel.org/r/20230720-ti-mdio-pinmux-v1-0-0bd3bd1cf759@kernel.org --- Maxime Ripard (2): net: ti: am65-cpsw-nuss: Enforce pinctrl state on the MDIO child node fixup! arm: dts: k3-am62: Bump dtsi from linux v6.5-rc1 arch/arm/dts/k3-am625-sk-u-boot.dtsi | 1 - drivers/net/ti/Kconfig | 1 + drivers/net/ti/am65-cpsw-nuss.c | 60 ++++++++++++++++++++++++++++++++++++ 3 files changed, 61 insertions(+), 1 deletion(-) --- base-commit: db7126c87c44c45c448c68925d366510f7a09b11 change-id: 20230720-ti-mdio-pinmux-a12525dba973 Best regards,